Exploiting Trust (Part 1)
Easy Prey21 Jan

Exploiting Trust (Part 1)

Most security failures don't start with a dramatic breach or a mysterious hacker sitting in a dark room. They usually start quietly. Someone assumes a system is locked down. Someone trusts that a door shouldn't open, or that a machine "just works," or that no one would ever think to look there. Over time, those small assumptions stack up, and that's where things tend to go wrong.

Today's guest is FC Barker, a renowned ethical hacker, social engineer, and global keynote speaker with more than three decades of experience legally breaking into organizations to expose their blind spots. Formerly the head of offensive cybersecurity research at Raytheon and now co-founder of cybersecurity firm Cygenta, FC is also the author of How I Robbed Banks, a book packed with true stories from the field.

In this conversation, FC shares what he's learned from decades of breaking into places he was hired to protect. The stories range from funny to unsettling, but they all point to the same pattern: technology usually isn't the weakest link. People are. From outdated systems that can't be replaced to everyday workplace habits that quietly invite risk, this episode offers a grounded look at how intrusions really happen and what actually makes environments safer.

Show Notes:
  • [03:06] FC grew up before cybersecurity existed and learned computers when manuals were thicker than the machines themselves.
  • [05:27] How early internet culture shifted from curiosity-driven exploration to the rise of malicious actors.
  • [07:15] Why inviting external testers to break into your systems was once an unthinkable idea and how that changed.
  • [09:35] The danger of internal blind spots and why external validation is often more valuable than internal confidence.
  • [10:46] Unexpected discoveries during penetration tests, including systems no one remembered were even running.
  • [12:23] Choosing unusual, esoteric security projects and why unconventional systems often hide the biggest risks.
  • [12:50] A real-world operation that involved reverse-engineering hardware to shut down power infrastructure in seconds.
  • [16:29] One of the easiest break-ins ever happens accidentally, proving how fragile some systems really are.
  • [17:21] The most common technical failure seen across organizations: poor network segmentation.
  • [18:36] How a routine internal scan accidentally knocked an entire country's banking connection offline.
  • [20:04] A bank unknowingly runs its internal network on an IP range owned by the U.S. Department of Defense.
  • [21:43] A mysterious daily network outage turns out to be caused by a single employee's music collection.
  • [23:07] Plugging into a forgotten network switch triggers a fire during a government penetration test.
  • [25:15] Why penetration testers are often blamed first even when nothing has been touched yet.
  • [26:25] Discovering malicious insider code planted by coordinated nation-state actors.
  • [29:41] Why some outdated systems must remain untouched and why "just update everything" isn't realistic.
  • [33:15] Implanting covert hardware inside everyday office devices to gain persistent network access.
  • [35:01] How avoiding people altogether is often the most effective form of social engineering.
  • [37:10] Why attackers move from the top floors down and how authority bias works without a single word spoken.
  • [38:35] Clothing, context, and small visual cues that instantly make people assume you belong.
  • [42:26] A penetration test derailed by an unexpected office costume day—and why randomness can be a defense.
  • [44:33] A simple exercise anyone can use to start thinking like an attacker by examining their own home.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:

Avsnitt(321)

Art Heists

Art Heists

The world of art theft looks glamorous in the movies, but the reality is far more complicated. From multi-million dollar forgery schemes to undercover FBI operations recovering stolen national treasur...

29 Apr 37min

The Power of Prediction

The Power of Prediction

We make predictions all the time including about the weather, about traffic, about what someone is going to say next. It feels natural, even rational. But when algorithms start making predictions abou...

22 Apr 39min

Privacy vs Reality

Privacy vs Reality

Online security advice often sounds simple until you actually try to follow it. Between password managers, privacy settings, and data brokers, protecting yourself can start to feel like a full-time jo...

15 Apr 58min

Wired to Trust

Wired to Trust

It's easy to think scams only work when someone misses something obvious. In reality, most of them don't look obvious at the start. They show up as normal situations with just enough friction to notic...

8 Apr 41min

Intimate Partner Fraud

Intimate Partner Fraud

Most scams leave a digital trail. A fake email, a spoofed number, a fraudulent website. You can trace them, report them, sometimes even reverse them. But what happens when the scam has no digital trai...

1 Apr 45min

Identity without Passwords

Identity without Passwords

Every day, employees at hotels, restaurants, and resorts across the country are doing exactly what they were hired to do: being warm, responsive, and eager to help. It's what makes hospitality work. I...

25 Mars 38min

When Cybercrime Gets Personal

When Cybercrime Gets Personal

Most security breaches don't begin with sophisticated code or elaborate technical exploits. They begin with a phone call, a convincing email, or someone at a help desk who just wanted to be helpful. T...

18 Mars 45min

Stopping Phone Scams

Stopping Phone Scams

Phone scams get dismissed as background noise or just annoying interruptions and unknown numbers with robotic voices we learn to ignore. But behind that noise is an industry built on psychology, autom...

11 Mars 45min

Populärt inom Politik & nyheter

aftonbladet-krim
rss-krimstad
p3-krim
svenska-fall
spar
aftonbladet-daily
flashback-forever
politiken
rss-sanning-konsekvens
rss-expressen-dok
motiv
rss-vad-fan-hande
rss-krimreportrarna
blenda-2
ett-rent-noje
grans
kungligt
rss-aftonbladet-krim
svd-ledarredaktionen
rss-frandfors-horna