Jack Recider
👤 PersonAppearances Over Time
Podcast Appearances
He told them their real names, their location, even the name of the company that employed them. And they passed this phone around to at least five different agents to talk to him. And of course, any information that Jim does get from hacking these scammers, he reports it.
He told them their real names, their location, even the name of the company that employed them. And they passed this phone around to at least five different agents to talk to him. And of course, any information that Jim does get from hacking these scammers, he reports it.
So like if he sees that they use a certain service, he'll report that to the service provider that scammers are using their product and this is their user ID. And he's gotten some of them actually banned from using certain software, but they can just like make a new company and then register the software again under a new company name.
So like if he sees that they use a certain service, he'll report that to the service provider that scammers are using their product and this is their user ID. And he's gotten some of them actually banned from using certain software, but they can just like make a new company and then register the software again under a new company name.
And sometimes when these scam centers make new company names, they even get their company listed by the Better Business Bureau and then even get some people to make fake reviews about their company. So if he can find this, he'll definitely report that to the Better Business Bureau and he'll do everything he can to slow down these scammers and waste their time.
And sometimes when these scam centers make new company names, they even get their company listed by the Better Business Bureau and then even get some people to make fake reviews about their company. So if he can find this, he'll definitely report that to the Better Business Bureau and he'll do everything he can to slow down these scammers and waste their time.
Once he got into a scammer's computer and grabbed all their files, and in there was a plane ticket for a recent trip. So Jim had this guy's real name, his travel details, and from there he could look the guy up on Facebook and find his friends and family.
Once he got into a scammer's computer and grabbed all their files, and in there was a plane ticket for a recent trip. So Jim had this guy's real name, his travel details, and from there he could look the guy up on Facebook and find his friends and family.
And yeah, when these scammers call him up and have no idea that Jim has all this information on them, it's quite a riot to watch the whole thing unfold. The question does come up, though, and I'm sure you've answered this a thousand times, which is like, hold on a second. Hacking is illegal. You can't just go hack people's stuff. And here you are hacking into someone else's machine.
And yeah, when these scammers call him up and have no idea that Jim has all this information on them, it's quite a riot to watch the whole thing unfold. The question does come up, though, and I'm sure you've answered this a thousand times, which is like, hold on a second. Hacking is illegal. You can't just go hack people's stuff. And here you are hacking into someone else's machine.
What's going on here? Where's your justification? Where's your moral compass or ethical framework in this way? Yeah.
What's going on here? Where's your justification? Where's your moral compass or ethical framework in this way? Yeah.
This is a really nice ethical line you've painted yourself. Like, okay, you know what? Unless you walk into my home and get onto my computer and attempt to steal money from me, I'm not going to do anything to you. And once they do that and you open your door to allow that to happen and you see that, okay.
This is a really nice ethical line you've painted yourself. Like, okay, you know what? Unless you walk into my home and get onto my computer and attempt to steal money from me, I'm not going to do anything to you. And once they do that and you open your door to allow that to happen and you see that, okay.
There's almost no recourse that they can have. I mean, I'm assuming you haven't had any legal complaints that you've had to seriously take care of.
There's almost no recourse that they can have. I mean, I'm assuming you haven't had any legal complaints that you've had to seriously take care of.
Okay, so my absolute favorite video of Jim's is when he hacked into an entire call center and could watch everything that was going on there. Wait, first, before we get into this story, how do you typically find these scammers?
Okay, so my absolute favorite video of Jim's is when he hacked into an entire call center and could watch everything that was going on there. Wait, first, before we get into this story, how do you typically find these scammers?