meta_pixel
Tapesearch Logo
Log in
Malicious Life

The Location Data Brokers – A CYBER Podcast Special

Malicious Life

Malicious Life

Technology

4.81K Ratings

🗓️ 24 January 2019

⏱️ 46 minutes

🧾️ Download transcript

Summary

CYBER is a new podcast from Motherboard, a very well known and respected technology blog and online magazine.

The episode you’ll hear shortly is about the shady market of data aggregators and brokers who sell smartphone location data to bounty hunters, bail bondsmen, landlords, used car salesmen, and anyone who can afford it. We learn how bounty hunters go right up to the edge of what the law allows and use "neuro linguistic mind manipulation" to get people to give them information. Advertising Inquiries: https://redcircle.com/brands

Transcript

Click on a timestamp to play from that location

0:00.0

Hi and welcome to malicious life in collaboration with Cyberism. I'm Ran Levy.

0:20.0

Yes, I know I know you're all waiting for the second part of our last episode, the fall of Mount Gocks. We're still working on it and we'll have it ready in a week or so per our usual episode release schedule.

0:26.7

In the meantime, here's something different. In between episodes, you know.

0:31.6

Two weeks ago, I played for you an episode from the

0:34.7

Darknet Diaries podcast and today I'd like to play for you another episode this

0:39.8

time from a podcast called Cyber. Cyber is a new podcast from Motherwood

0:45.0

a very well known and respected technology blog and online magazine

0:50.0

the episode you'll hear shortly

0:52.0

is about the shady market of data aggregators and brokers who sell smartphone location data to bounty hunters, Dale Bonsman, landlords, used Carl Sales salesman, and anyone who can afford it.

1:05.2

We learn how bounty hunters go right up to the edge of what the law allows

1:10.6

and use neurolinguistic mind manipulation to get people to give them information.

1:16.0

Very, very exciting stuff and I'm sure you'll enjoy it.

1:20.0

I'll see you again on the other side of the episode. Enjoy. It's got the code it's going to launch.

1:35.0

It's got the code it's going to launch.

1:40.0

It's a Unix system.

1:42.0

I know it is.

1:44.0

It's all the files of the whole park.

1:47.0

It tells her everything.

1:48.0

Sir, he's uploading the virus.

1:51.0

The Eagle One, the package is being delivered.

1:55.0

Earlier this month, motherboard reporter Joseph Cox transferred $300 to a bounty hunter.

2:00.7

Moments later, he got sent a Google Maps screenshot. The bounty hunter had found the current

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from Malicious Life, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Malicious Life and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.