PBD Podcast - “Security is an Illusion” Ethical Hacker Exposes Child Predators & Tools To Protect Against Hackers | PBD Podcast | Ep. 459

Episode Date: August 23, 2024

Patrick Bet-David sits down with Ryan Montgomery, a renowned ethical hacker known for his expertise in cybersecurity and passion for child safety. Montgomery, who has been at the forefront of exposing... online predators, shares insights into his journey as a hacker, his motivations for taking down dangerous websites, and the alarming vulnerabilities in today’s digital world. ---- 📺 SUBSCRIBE TO RYAN'S YOUTUBE CHANNEL: https://bit.ly/4731jFt Ⓜ️ MINNECT WITH RYAN MONTGOMERY: https://bit.ly/3yGAt9D 🎟️ MINNECT LEAGUE CHAMPIONSHIPS: ⁠bit.ly/4aMAar8⁠ 🇺🇸 VT TEAM USA GEAR: ⁠bit.ly/4cwKbJp⁠ 🏦 THE VAULT 2024: ⁠⁠bit.ly/3WQYZN7⁠ 📱 MINNECT: ⁠bit.ly/3T0AX15⁠ 📕 CHOOSE YOUR ENEMIES WISELY: ⁠bit.ly/3ST1rS8⁠ 👔 BET-DAVID CONSULTING: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠bit.ly/3X8s7kq⁠ 📰 VT.COM: ⁠bit.ly/4duVS4u⁠ 🎓 VALUETAINMENT UNIVERSITY: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠bit.ly/4dpzyJE⁠ 💬 TEXT US: Text “PODCAST” to 310-340-1132 to get the latest updates in real-time! ABOUT US: Patrick Bet-David is the founder and CEO of Valuetainment Media. He is the author of the #1 Wall Street Journal Bestseller “Your Next Five Moves” (Simon & Schuster) and a father of 2 boys and 2 girls. He currently resides in Ft. Lauderdale, Florida. --- Support this podcast: https://podcasters.spotify.com/pod/show/pbdpodcast/support

Transcript
Discussion (0)
Starting point is 00:00:00 We'll search over 150 billion records that include, you know, passwords, social security numbers, credit cards, addresses, even private messages on websites. You name it. And they said, they'll come by tomorrow and we want that data. We want to investigate it. I was like, OK, you know what? I'm going to take this into my own hands. Somebody's out there that's as good of a hacker as you. And if they really wanted to get any information on you, could they get it? I think that security is an illusion. You're trying to avoid making enemies, is what you're trying to do.
Starting point is 00:00:27 You know, I- I'm making enemies all the time. You can write custom software onto them that does bad things, which I'll show you more about in a second. And now I just captured their credentials and they have no idea that it even happened. Then I was able to confirm that a lot of them,
Starting point is 00:00:40 like they weren't fantasizing, pretending to be kids. There were actual children on this website. And we could do it right now. Okay, Rob, go to Teen Chef. Yeah, just type hi. And then wait for the private messages to come in on the top. This might get graphic, who knows. Wow.
Starting point is 00:00:57 What happened? I'm already getting DMs. Seriously? Ridiculous. And all you said was hi. Oh, geez. What's this one saying? I would say 30,000 in the day. At 12 or 13 years old. So back then it was like the Wild West. So my whole life was consumed by,
Starting point is 00:01:12 you know, heroin very quickly. Inside of this is a Wi-Fi chip, a mini computer, and this thing emulates a keyboard. It can type at 860 characters per second. So we've caught teachers, police officers. Teachers? Yeah, yeah. Yeah, we've caught. I caught a teacher. Here's that crazy one. So. 30 seconds. Did you ever think you would make it? I feel I'm so f**ked like it tastes sweet victory.
Starting point is 00:01:47 I know this life meant for me. Yeah, why would you bet on Goliath when we got bet David? Valuetainment, giving values contagious. This world are entrepreneurs, we get no value to haters. I ain't running homie, look what I become. I'm the one. Okay, so my guest today, you may not know the name, but the moment you hear him speak and you hear what he has to say, you're going to say, I know exactly who he is, I've seen him all over the place, ethical hacker, and for those of you that are parents, I've got
Starting point is 00:02:17 four kids, I don't know how many kids you've got, but this is one of those things that you have to pay very, very close attention to today. And by the way, aside from being a parent, if you're somebody that runs a business, if you're somebody that's worried about somebody getting the key fob that you have that enters into your garage or your building, you're like, no one's going to find out how to do that. He's got equipment here. When he walked in, our guy who deals with our servers, he says, look man, whatever you
Starting point is 00:02:44 do, be nice to us while you're here in says, look man, whatever you do, be nice to us while you're here in the building. Anyways, having said that, the one and only Ryan Montgomery. How are you? I am great. Thank you for that awesome introduction. And I am super grateful to be here. So again, I think I'm more excited to have you than anything else because I've seen a
Starting point is 00:02:58 lot of your material, especially with a lot of things going on today. I remember six years ago at one of these insurance conferences I was a part of, it was the first time I heard every insurance carrier all they talked about was cybersecurity. Do you have cybersecurity insurance? You guys never talked about this last year. Do you have cybersecurity? Did you hear about that one insurance company that was hacked and they got two million social security numbers? All this stuff that they were talking about. Obviously we heard what happened two weeks ago. Oh yeah, I have a lot to say about that. I want to hear about that as well.
Starting point is 00:03:27 But one, for the audience that maybe doesn't know the background, what caused you to want to become a hacker? So to become a hacker outside of the child safety thing was actually a pretty basic story, but I remember it like it was yesterday. So I was probably around nine years old when I first got access to a computer. My grandfather worked for a cemetery, and I guess they gave him a desktop computer.
Starting point is 00:03:53 It was a monster of a machine, just in size, not in speed, by any means. But I didn't know what it was. I was very young. And if you remember, some of the people watching will remember AOL used to send these floppy drives in the mail, the floppy disks in the mail, that would have trials for AOL dial-up internet.
Starting point is 00:04:12 And I saw that the floppy drive had a specific shape to it, as well as the desktop computer where you put the floppy in, had a little icon there that looked like that disk. And I took it out of the free trial case and I put it in there because it looked like it was supposed to go there. And I saw the AOL logo come from a piece of cardboard onto a screen.
Starting point is 00:04:35 And I remember that like, it just happened yesterday and it blew my mind. It was like a miracle that I couldn't understand how something in the real world could show up on a screen and I had control over it. You're nine years old, how old are you right now? 31. So 22 years ago.
Starting point is 00:04:50 Yeah, approximately, yeah, give or take a year. But that doesn't make you a hacker, but that got my interest peaked in computers and very young age I was helping people fix their computers, learning about computers. And from there that turned into how does this work And at a very young age, I was helping people fix their computers, learning about computers. And from there, that turned into, how does this work and how do I make it do something it wasn't intended to do in the first place?
Starting point is 00:05:11 That's it. That's how it started. So now, your brain, it starts there, but then it's like, what if I can do this and what if I can do this and what if I can do this? Or is it more like, what else can it do? What else can it do? Which direction were you going? So it's manipulating something to do something. It's manipulating something to do something it wasn't intended to do. That's basically the definition of hacking. That could be with
Starting point is 00:05:35 anything. It doesn't have to be a computer. I think it's a mindset that you either have or you don't have. As for the technical specifics, they can be applied later, but I think the mindset really helps. There's a lot more to the story of how I came up in the hacking community and how I learned the methodologies, learned how to find vulnerabilities in things, which I can go into that if you'd like. Sure, absolutely.
Starting point is 00:05:57 So yeah, we'd be here six hours explaining all of it. But if anyone remembers AOL instant messenger It was called aim. There was also something called IRC, which is a internet relay chat, which you know is ancient But it was that's how people communicated back then online And I was part of a lot of groups where there were a lot of hackers. I all I knew them by were screen names I didn't have their real names for the most part You know most of them would just go by an alias, and that's say what I. They didn't realize I was a little boy.
Starting point is 00:06:31 And I don't know if they were little boys as well or they were grown men. I have no idea. But I guess the curiosity in me, and me being one of the kids that always just say why to everything over and over and over, everything was why, why, why, why, why. I was blessed to have a group of people that were willing to mentor me and teach me the things that were so interesting.
Starting point is 00:06:53 So when I saw something get hacked or I seen a vulnerability in, let's just say, AOL and St. Messenger, I would have a group of people that would be more than happy to teach me how they did that, and then I would recreate recreate it myself and I'd get that same adrenaline rush which is like addictive to say the least, which then went on to more things. I mean, if you want to get into that, I will. That turned into me later on in life, I would say maybe 12, 13 years old, joining a hacking group or affiliate marketer slash hacking group called Digital Gangster.
Starting point is 00:07:28 And if you do some research into Digital Gangster, you'll see there's a lot of celebrities and companies that were hacked by the forum and the members on it, one of them being YT Cracker, or Bryce Case is his name. He hacked NASA and many other government agencies. I became an administrator of the website Digital Gangster, which was full of hackers and marketers, kind of a combination of both. So back then it was like the Wild West. You could send, you know, let's say, SIE weight loss berries. They were paying, you know, $9 per sale. They
Starting point is 00:08:01 would give you a unique URL. You would send that URL out to, let's just say, a million people because there wasn't a junk mailbox, there wasn't spam filters. And then you would just start randomly mailing hundreds of thousands or a million people and collect your commissions from these affiliate networks. So we would combine hacking methodology and affiliate marketing and that was kind of the short version of what Digital Gang gangster was. Oh wow, so affiliate marketing plus hacking combined and you said nine cents so if you send out one million what was the conversion ratio? No, no it would be like nine dollars per sale. Nine dollars per
Starting point is 00:08:39 sale. Yeah a lot of times people would be paying for you know like an annual subscription to the I'm just using AsIE Weight Loss Berries as an example, but you could pick any product that would be on a network which... Are you talking about Monavy or what company are you talking about? I don't even know. I mean, when you sign into an affiliate network, you'll have business opportunities, dating websites, weight loss pills, any product that the affiliate network is offering. Got it.
Starting point is 00:09:07 And then you would send the email and if they buy it, you're getting a commission on it. Yes. And the commission structure would be set up differently depending on what you're doing. What's the most money you ever made on one of these affiliate marketing email campaigns? Without going into the specific details of what and how, I would say 30,000 in a day. At 12 or 13 years old? Probably 13, yeah. So when it's happening at 13 years old, what account is that money going into?
Starting point is 00:09:35 So I had a PayPal account that got banned, and then my mom's. Got it. So what's mom saying the first time you see 30,000? Is she like, honey, let's do it again? Or is she like, what are you doing? What are you up to? So my mom has always been like a friend to me, but she's still my mother at the end of the day. I love my mom to death. And my mom has questioned everything I've ever done, but always has my back. She'll ask me a million questions, but she'll be very supportive. She knows that I have a good heart.
Starting point is 00:10:05 She knows I would never try to hurt anybody in any type of way. So I don't think that the... I can't remember the conversation verbatim of how that all went, but yeah, she was fully aware of the marketing. Now, the people that hired you at Digital Gangster, do they know how old you are or they don't know yet? Because at the time when they're hiring you're not necessarily putting your age. So digital gangster you didn't have to be hired. It was a forum that
Starting point is 00:10:30 anybody could join and then you know you would you could be like I said you could use an alias, you could you could use your real name, you could use whatever you wanted. I joined there as under an alias and and then earned my way up the ranks without anyone actually knowing who I was. So nobody really knew. How were you getting the emails to do the campaigns? Well you could just brute force them, meaning like A through C. The way that I was doing it was I had a name generator. So I would do like John Smith 1 at blank.com or John Smith 2 at blank.com.
Starting point is 00:11:04 So just generate a list of first names and last names for men and women and then and then Append a number usually at the end of it and just ship out as many emails as possible That was just one of the many ways we were marketing But like I said hacking and and affiliate marketing or spamming for other words Kind of went hand-in-hand with whatster did. But Digital Gangster was not a company, it was just a forum where people talked and hung out. So what did you do after that?
Starting point is 00:11:30 So now you're starting to realize, okay, I think there's something here that I can make money with. You're 12, you're 13 years old, what comes next? So I was in the marketing world for a while. I got into some, I would say I would say some gray areas or some black hat areas because there weren't like cybersecurity training platforms like there are now. There are like not a ton of learning material out there. You couldn't really go to school for it. I think the only schooling you could go if you were an adult or even
Starting point is 00:12:01 graduated high school for that matter was computer science. Now is a completely different story. So when I'm learning from people, I'm learning how to do things the wrong way. And being a young dumb kid that was, you know, that's a whole story I think we should get into of my past, you know, making bad decisions as a kid. I wasn't, I wasn't the best kid in the world. I didn't hurt anybody physically or anything like that, but I definitely made an impact and regret some of the decisions I made at a young age. What were some of the decisions you made? Well, I guess, let me preface it
Starting point is 00:12:36 with starting to use drugs at a young age. So I haven't done drugs since I was 17 years old. I'm 31 now. So mostly I got it out of my system early. You know, I think I started dabbling at 11, 12 years old. And then I stopped. I remember the exact day when I was 17. I'm not in recovery.
Starting point is 00:12:56 I'm not in AA or NA or anything like that. I just choose not to drink. I don't smoke weed. I don't do any drugs. But that was by complete choice. I don't smoke weed, I don't do any drugs. But that was by complete choice. So when I was younger, I guess, so I'll start off with the rave scene.
Starting point is 00:13:15 So are you familiar with raves? Of course. So a lot of the younger crowd doesn't know what a rave is. They just know about these new EDM and electronic music festivals. Are you from here or where are you originally from? I'm right from right outside of Philadelphia. Okay.
Starting point is 00:13:28 In Pennsylvania. Got it. So I was huge into the rave scene at such a young age and I would sneak out of my house in the middle of the night. I would take a bus to Philadelphia and I remember one that I used to go to was called God's Basement, and it was in the basement of a church. And for whatever reason, this church was allowing a rave to rent out that space. God's Basement.
Starting point is 00:13:57 God's Basement. What a name for a nightclub. It's barely a nightclub. We're talking, like, we're talking, this is, it was, it was, you know, disgusting. Ecstasy county, like, you know, everybody's rolling, drinking water, massaging the whole night. Ecstasy, ketamine, cocaine, weed, alcohol, even, even, I even saw mescaline, I remember, which is, I don't think I ever saw again outside of there. But yeah, you might be able to find
Starting point is 00:14:21 God's basement online. And this is Philadelphia. Yeah, and the room probably had two, three hundred people in it, and it's about, you know, if I had to take an approximate, like, two thousand square feet. Is this it? Yeah, yeah, this is it. Rob, can you raise the audio? We can't hear it. I can't believe you found this. During the week it's a
Starting point is 00:14:49 school cafeteria. On weekends it's sometimes party central for ravers. When we went undercover on a recent Friday we found drugs, alcohol and underage teens. We are so horrified. If you guys close this place down we would be more than grateful. Parents and staff of the Global Leadership Academy Charter School were ready to protest and block the doors tonight to prevent a Pimson Ho party scheduled here. The West Philadelphia School rents its building and basement from a neighboring church. The church oversees rental of the basement during the weekend.
Starting point is 00:15:21 The school says it's complained for months to the church about having to leave. Okay, you can pause this Rob, we get the idea. Okay, so God's basement. So God's basement, yeah. Me, you know, 12, 13 years old, walking around this place with, you know. At 12, 13, you're going here. Yeah, and let me just show you. I would like this to stay off camera, but let me just show you what I look like so you get a better idea of why they even let me in the doors, which obviously, it was an illegal party, but you can see by the way that I looked,
Starting point is 00:15:49 all messed up on drugs. I don't think they were going to question me. You can totally tell by the eyes, man. You are. Yeah, I was 16 in that picture. You're 16 here. 16 there, yeah. But I didn't look much different, much different when I was 13 years old doing heroin.
Starting point is 00:16:06 So I didn't get to that point yet. At 13 you were doing heroin? Yeah, yeah, yeah. So God's Basement is one of many raves I went to in Philadelphia, and where it started was ecstasy. So somebody gave me ecstasy. I loved it. I thought it was the greatest thing to ever be created.
Starting point is 00:16:29 And I would take Ecstasy as often as I could, whether that be multiple times a week or if I could... However many raves there were in Philly, they weren't usually not outside... What's the most you took on one night? I'm not sure because Ecstasy is so... It's variable in the dosages. So, I mean, definitely multiple pills, but once you get to a certain point with ecstasy, and not advising anybody, try it. But once you get to a certain point, you don't feel it anymore. It doesn't do anything. I think your brain just runs out of the, you know, your natural, your natural happy chemicals. But yeah, so I continued to do ecstasy and I really, really liked it, but that was my main drug of choice. Like most people start with weed or drinking or whatever.
Starting point is 00:17:04 You went straight to it. Went straight to ecstasy. Very ambitious, yeah. Yeah, yeah. And I loved this, but one night I was at God's basement, actually, thinking back, and somebody... I was complaining about the come down feeling. So when... It's considered a stimulant. So when you're coming down from it, you start to feel bad. And these things go till five, six, seven o'clock in the morning. So the sun's coming up, you feel absolutely horrible.
Starting point is 00:17:28 And somebody said to me, hey, you can take one of these PERC 30s, which is an oxy... It's actually, they're not actually PERC, I said, but it's an oxycodone 30-milligram pill, and it'll make you feel better. Which at that point, I've never taken any painkillers. I took a PERC 30, it got rid of that come-down feeling
Starting point is 00:17:47 completely from the ecstasy, and so that way, I didn't go right to them immediately, but I kept taking ecstasy and then trying to find any opiate that I could, not heroin at this point, but any opiate that I could to come down from the ecstasy. And then I found out that I was starting to like the opiates better than I liked the ecstasy. And then I found out that I was starting to like the opiates better than I liked the ecstasy. And that's when it became a problem,
Starting point is 00:18:08 because I was taking the opiates before I even got to the raves, and I didn't have any energy, really, to be partying at a rave or doing anything at a rave. And, you know, those pills were expensive back then. Like, you know, I was a young kid, and yeah, I did well in certain areas with marketing, but I wasn't, you know, I couldn't, every day wasn't that good.
Starting point is 00:18:27 You know, I didn't grow up in a great area with a ton of money or anything like that. And, you know, what happens is you're paying $30 a pill approximately unless you buy wholesale. And wholesale you're going to pay from 17 to 25. And I'm talking a long time ago. Now people, from what I'm being told, if you can find a real pill, we can talk about the Fentanyl crisis
Starting point is 00:18:47 if you want, but if you can find a real 30-milligram oxycodone, it'd be $60 a pill on average. So, I couldn't afford it back then when it was $30 a pill. And then you have to take multiple a day to even, you know, keep yourself from getting sick going through withdrawal. And then I remember I was in Trenton, New Jersey, and I was out staying at a friend's house who did not know my real age as well.
Starting point is 00:19:10 And I was offered heroin. So I, you know, I never tried it before. It, for some reason, was not as scary as it would sound to me. I just, I guess I was so messed up and so sick and just wasn't thinking properly and a young kid and, you know, brain not fully developed. And then this guy comes up to me in the house with, I remember it was a CD case and a line of heroin on it.
Starting point is 00:19:35 I snorted one line of heroin out of the bag. I don't know if it was a full bag or half a bag, I don't know. But a bag of heroin is $10. You know, me taking multiple perk 30s a day, let's say 60 to 100 plus dollars a day, and sometimes even more, to go from that to $10 is now making me feel better. And snorting it was a no brainer for me. I can I could not be sick. I can do this.
Starting point is 00:20:02 It makes me feel exactly the same, except for a little maybe rush in the beginning, but I was more worried about not being sick. So my whole life was consumed by, you know, heroin very quickly. And the same problem happens. So $10 a bag turns into you're buying bundles, which is, you know, usually from 10 to 14 bags, and they would sell for about $75.
Starting point is 00:20:24 So you'd get, you know, bundles of heroin for, I mean, ideal, if you want to call it ideal. And, you know, now you're doing a bundle a day, and you're stuck, and you can't snort that much powder. It just won't fit in your nose, literally. Like, no exaggeration. So then, you end up using needles. So I ended up as a 13, 14-year-old kid injecting heroin and went back to shooting one,
Starting point is 00:20:49 two bags at a time, and the feeling would go away, which then reduced the amount of money I had to spend, but then ended up in the same problem. You can only inject so much without, like, you can only fit so much in a needle until you have to keep hitting yourself every couple hours without getting sick. And then, it just became an absolute catastrophe
Starting point is 00:21:07 for not only me, but everyone around me, my mom, my grandma, my grandpa, everybody that cared about me. And I'm very, you know, my biggest regret is that how many people that, you know, I worried and hurt and caused, you know, whatever financial harm it was on the hacking side of things, as well as the court cost of just getting in trouble as a stupid
Starting point is 00:21:32 kid with drugs. But thankfully, never hurt anybody physically, never had any violent crimes, never gotten any trouble behind the wheel of a car with drugs. It was all just drug offenses and stupid, minor, petty theft things as a kid. Did you ever have a close call of killing yourself or no? So... No, no, but I do have a story that I talked about before on a different podcast, but I'd like to bring it up again because it was something that was very important to me,
Starting point is 00:22:01 and we can kind of segue into this if you want but the Fentanyl crisis out there is really bad so if you did any I don't know did you research me at all or you said you watched God knows how much content on you hours well I appreciate that very much so I owned three mental health substance use they changed substance abuse to substance use so three mental health substance use facilities and is that why to substance use, so three mental health substance use facilities. Is that why, I don't want to say the city, is that why you moved to where you moved to? Because it's known for that.
Starting point is 00:22:31 Yeah, so the reason why I moved down to Florida was to start a treatment facility. That was the main reason. And I originally just started one that had partial hospitalization, outpatient and then outpatients, three different levels of care. And then I opened a detox, which is considered an inpatient level of care with residential, which is, so it was five different levels of care
Starting point is 00:22:54 and then three different locations. I had over 120 employees at the end of it, and we, I believe it was 144 beds, give or take, depending on what we wanted to fill the rooms. If we wanted one bed per room or two beds per room. So, I mean, I don't mind saying the facility's name, but it was called Boca Recovery Center, which it still exists. I live in Florida.
Starting point is 00:23:15 People know that, and I'm not hiding or anything. Yeah. So, one of the main reasons why... Yeah, so this is the new website. I don't think you'd find me on it now, but if you looked up an article like Ryan Montgomery, Boko Recovery Center, you'd find some articles from back then. So you founded this and you grew from zero to 120 employees.
Starting point is 00:23:36 Yeah, so I was the founder and CEO. I had a business partner as well who got me into the industry because it's going back to the marketing. What I was able to do from Pennsylvania, I started a marketing company where I was sending. Are you familiar with patient brokering? No. So it's a felony, and it's a crime to pay per person to go into, to refer a patient into a rehab
Starting point is 00:24:00 or a health care facility. So the way that I was able to generate leads, and I wanted to be compassionate about this because I went through it myself. I have a lot of family and friends that went through it myself, and I'll get into that story after. But I started a company on my own where I was generating leads for people that wanted treatment,
Starting point is 00:24:20 that had private health insurance, where they could leave the state. They would have out-of-the-network benefits. And I was, you know, the average at the time of me starting Boca Recovery Center, the average cost per acquisition, if you want to call it that, to get a patient in the door with private health insurance was around $3,000 for the facility. I was doing it for about $1,800, which was kind of unheard of
Starting point is 00:24:42 to the rehab industry. The treatment marketers in Florida that were patient brokering would give the clients or the patients, they would sometimes offer them money to go to treatment. If they didn't meet medical necessity by the insurance company, they would try to get them drunk or high so that they would, so that they would get paid out for getting them admitted into the facility. And that turned into an absolute disaster, if you can imagine. You take somebody in a vulnerable position
Starting point is 00:25:09 that just wants to get clean, or their family, even if they don't want to, if their family wants them to get clean, and you say, hey, I'll give you $1,500 to go into rehab, and the detox then gets denied by the insurance company, so the treatment marketer takes them back out, they bring them to a bar, gets them wasted or high, and brings them back. They could kill the person, they could take advantage of them sexually,
Starting point is 00:25:31 which has happened, you know, if you look up Kenny Chapman, he got, I think it was a 27 year sentence, correct me if I'm wrong, for a ridiculous amount of sexual assault on these patients. It was just absolutely sickening. So I wanted to have a facility. Dr. Emanuel C. Vigil, M.D.
Starting point is 00:25:48 Owner of the Winslow Rental Court from Divider Chatman's family. Middlebrook gave Chatman a 27 and a half year sentence for crimes that Vilafana said were never before seen in a federal court, turning his patients into prostitutes. Dr. Emanuel C. Vigil, M.D. That is an absolute scumbag. Dr. Emanuel C. Vigil, scumbag. And that's in Florida? That's in Florida, yeah. Wow. And you met this guy? You did business with him? Never did business with anyone like this. So that's why I wanted to kind of give you the
Starting point is 00:26:13 rundown of how this all happened. So when I lived in Pennsylvania, I had that marketing company, but I never actually talked to the patients myself. I made sure that they went through an online quiz is basically what I did. So I wanted to make sure they met the criteria myself, I made sure that they went through an online quiz is basically what I did. So I wanted to make sure they met the criteria. Like I don't want to send some innocent girl that has an eating disorder and maybe she drinks on the weekends to some facility that she doesn't qualify for. You know, just because I'm going to get paid more money. So the way that I structured it was I created this quiz, you answered a bunch of questions, it would give you a number to call, that number would then go to one of the facilities
Starting point is 00:26:47 I had a contract with that I trusted, that I knew would help the person out to the best of my knowledge at that time, and they would pay me a flat fee. So I would know in the beginning of the month, I'm 100% gonna get this amount of money, nothing more, nothing less. And that avoided the whole patient brokering thing, it avoided me having to get involved
Starting point is 00:27:08 with these treatment marketers. And I was making money for these facilities and I felt good, though, getting people into treatment. But the business partner at that time, his name was Christopher Ferry. Chris Ferry, him? Yeah. Okay. So, this guy I had a contract with
Starting point is 00:27:27 with another facility called Holistics by the Sea, which I think exists still, but I wasn't really a part of that really. He was an owner of that facility at one point, or his family was, or of some degree. I'm not sure the actual specifics on it, but I know he had something to do with it because I had a contract with them.
Starting point is 00:27:45 And it was a flat fee that they would pay me every month. And Chris, he's an intelligent guy, so he sends me a text message or a face... No, it was a text message. I didn't answer it. And then he FaceTimes me. And I'm in Pennsylvania at this time, and he knows I'm doing well. I'm killing it with the treatment marketing ads,
Starting point is 00:28:06 and he's like, hey, you won't come to Florida right now. Like, just joking with me on FaceTime. Three hours later, I'm on a plane. I call him when I'm at the Fort Lauderdale Airport, and I'm like, hey, man, I'm here. And he drives to the Fort Lauderdale Airport, picks me up. I stayed with him for three months at his house, and we became very close with each other.
Starting point is 00:28:24 I flew back to Pennsylvania. I got all my stuff in a U-Haul, I packed up my car on a trailer, I drove to Florida and I never came back. What year was that? That would have been nine years ago. Okay, got it. Yeah, yeah, so at that point I lived with him for a little bit as we, as we, he sold his shares in Holistics. I believe he sold his shares. I'm not sure how that whole process worked, that you'd have to ask him that. But I know that when we got involved with Boko Recovery Center together, we were in it together. It was just us. We didn't have any, we had a small equity owner, but that was for just logistics. You guys both sell it, so now you've sold the business.
Starting point is 00:29:02 for just logistics. And, You guys both sell it, so now you've sold the business. He's still, he's the CEO and founder, or just the founder now. I saw his picture on the site, yeah. Yeah, he's still around, still going hard. He actually opened a fourth facility now. But yeah, I sold it a couple years back now.
Starting point is 00:29:16 And there's a cool story with that as well, which I keep skipping the main point, but the cool story with how I ended up doing what I'm doing now is there's, But the cool story with how I ended up doing what I'm doing now is there's the electronic medical record platform, ZenCharts, which the site's gone now, but if you Google it, you'll find out, you'll see the logo for it. Yeah, the website just went down, so.
Starting point is 00:29:44 Maybe the LinkedIn... Yeah, okay, so I can explain what ZenCharts is, but ZenCharts is a medical record platform. If you go to your doctor and they ask you a bunch of questions, you see them typing in notes on the medical record. It's exactly that, just for mental health and substance use facilities. So I happened to use ZenCharts at Boca Recovery Center
Starting point is 00:30:05 at the time, and the owner's actually sitting out in your green room. Really? Yeah, so the owner at that time, so they came to come train my clinicians on how to use ZenCharts, and I'm sitting in the room with them, and they thought that I was an employee of the facility, because I was like 22 years old
Starting point is 00:30:23 or something, 23 at the most. And once they found out I was an employee of the facility because I was like 22 years old or something, 23 at the most. And once they found out I was the owner, we talked. And we got along well. But I didn't really know them that well. And the guy that's sitting out in your green room right now would be even interesting to ask his opinion on it. So he paid $40,000 for a penetration test, which is just paying a group to try to hack your company
Starting point is 00:30:48 and give you a report on what's vulnerable. He just did that prior to doing the training for my rehab. And I said, do you mind if I take a look around, like, you know, just trying to get permission because I don't want to get in trouble or break the law or anything like that. So he says yes, and he says it like cockly, in a cocky way, like he's, I'm not gonna-
Starting point is 00:31:09 What can you do about it? Right, right. So he gets in his car, and before he even gets back to the ZenCharts office, my face was on support.zencharts.com. It was just my face. So when he, when we, my company is pentester.com, and when we're doing our and when we're trying to sell our manual pen test, he brings up that story because even if you spend $40,000 for the best of the best, if they're doing that, in his case, it was the checkbox approach, it's sometimes not enough.
Starting point is 00:31:42 Kind of what we do outside of, I'm not trying to promote my company, I just want to explain, because this is relevant to everything else we're going to talk about. What we do is we try to emulate what the adversaries would do. We try to emulate what an attacker would do, not just check off this box, that one, and that one, and that one, and skip all of the rest. We try to do that.
Starting point is 00:32:01 So, Rick uses that story, Rick Glassers, who was one of the owners of ZenCharts, when trying to make sales for Pentester. So I just looked at the article, USA Today, national public data confirms massive data breach included social security numbers. And you guys are, I believe, quoted in here in this article with USA Today about what Pentester does. So talk about social security.
Starting point is 00:32:26 So we had all these social security numbers being leaked. And it said social security numbers, names, addresses, email addresses, phone numbers were in the 2.9 billion records within a data breed security firm. Pentester tool tells you if your data is involved or not. So to the average person, what does Pentester do? So, in this case, we did something different. So, almost every single article is going to be referencing that site, npd.pentester.com, which stands for National Public Data. So,
Starting point is 00:32:57 what we did was, we were able to access a list that was for sale for $3.5 million in April. And a hacking group took it from a company called National Public Data, which is a crazy story. Do you know anything about this? So the person that was running that website is, I think his name's Salvador, but he was a Florida sheriff. You can look him up. And he, um, he somehow, some way, got 2.9, approximately 3 billion records
Starting point is 00:33:24 that include your first name, last name, address, phone numbers, and social security number for pretty much every single American alive and deceased. Because, you know, our population is not even close to the 3 billion. That's a third of the planet, I believe. So, when I was looking up, you know, my mom, I was seeing addresses when she was a teenager. But the guy, they own the website, and maybe you'll find his name, but he...
Starting point is 00:33:52 The reason... Do you want me to go into how he got compromised? Or more about the... Okay. So, the reason why he got compromised was there was a secondary website that used the exact same login, and they must have been either sharing a server or just had the same technology, that they must have either sharing a server or just had the same technology,
Starting point is 00:34:09 and they had a default password. So, default password attacks are so common, it's unbelievable. Like, somebody leaving the same password on the router or leaving the same password on a device when they buy it or website that just gets set up, it says maybe your password is password123. And then if you Google, you know, let's say Cisco default password,
Starting point is 00:34:29 you'll see the default password. So this guy, he creates a background check company called National Public Data, gets clearance, who knows how, for all of that data with all the Social Security numbers, and leaves the default password, which was, I believe, six digits long, and on a mirror website that mirrored national public data.
Starting point is 00:34:52 So, the attackers used that same credential as an administrator to log in and then extrapolate all of the data. What? Mm-hmm. It was as simple as a credential reuse vulnerability. And then, Pentester, what we do is we, like you saw when you looked it up, you can put your email in there. So, you put in your email, I would recommend using
Starting point is 00:35:14 your primary email, or maybe sometimes even an older one, you should check them all, honestly, on the free scan as well as the paid version. But this is different than the main page, but we'll search over 150 billion records that include passwords, social security numbers, credit cards, addresses, even private messages on websites. You name it, anything that's been leaked on the dark web.
Starting point is 00:35:37 So, for $19, we show you all of that data. We show you every social media account, every profile that's associated with your emails and phone numbers, and that includes for your kids too. So, to know if your kids are signed up for Instagram and all the other apps, if you want to confirm it, you can easily add them in there safely and securely, pay five bucks extra per family member or kid,
Starting point is 00:35:58 and you'll be able to see all of their data. But it's super important to know which passwords are out there and breached for this exact reason, because our entire country got breached. You know, three billion records, the largest breach I've ever seen in my life, and probably the most impactful I've ever seen in my life, happened in the last, I would say, week and a half. Six days straight now, we've been dealing with about 30 to 50,000 users on our website per minute.
Starting point is 00:36:23 I have an interesting screenshot I can show you. 30 to 50,000 per minute. Check this screenshot out. It's been unbelievable and we do not, I'll say this on here, we don't have the support team to handle the amount of traffic we're getting, but we are growing and adapting quick. Look at this number right here. Every blue, every single blue bar there is a single minute. Are you joking? How wild is that? Oh, but most of it is in US. All US, yeah. Canada, UK, Mexico, because US is the one that's, oh my god.
Starting point is 00:36:53 Right. And that's $35,000 paying $19? No, no, no, that's 35,000 people just with the screenshot that I took, 35,000 people at one time using npd.pentester.com which then when they're finished searching there they go to the main pentester website which allows you to search your email and then that'll tell you your passwords your address maybe your social your relatives all kinds of information and then from there you choose remove my data or you know whatever whatever how
Starting point is 00:37:21 do you do it though now that it's public and the guy has it how do you remove your data so you cannot remove data from the dark web, but you can remove data from data brokers, which is huge. The best way to remove data in our eyes is for you to change your passwords because you can't remove it from the dark web. You can't remove it from people's computers
Starting point is 00:37:38 after they download these databases. And I don't know of a better way to explain that because a lot of people don't understand that like we don't have control over deleting data off of people's computers that downloaded it themselves. We do have control over some of the data brokers because they're required to remove your data. So what we do is we take your first name,
Starting point is 00:37:57 your last name, your date of birth, and, you know, as many identifiers as they're willing to give us, and then we send a query on your behalf to all of these major data brokers that... And if you don't know what a data broker is, it's just somebody like, for example, white pages that would store your personal information, including your family's information, phone numbers,
Starting point is 00:38:17 everything, for just a Google, a name, and a state, you'll find yourself. We remove that data for you. All you have to do is just sit back and wait, refresh the page every couple days, see how many removals are in progress, how many have been removed, and then as you're doing that, you can scroll down the page, you'll see all the social
Starting point is 00:38:33 profiles associated with your email and phone number and name, and then underneath of that you have all of your passwords and everything else that's out there. So, you get a really good idea of what your digital footprint is for 19 bucks, and you really can't beat that in my opinion. There's nothing else like it. Like it's, we genuinely don't even have competition because we have a combination of data broker removal and the largest breach database in the world. So it's just kind of unmatched and I'm super... Who else is doing what you're doing right now? Who else does that?
Starting point is 00:39:03 There's not a single competitor. There's not a single competitor. There's not a single competitor? No, not. So how many people have already done the $19 with you? I don't think I should say, but we're doing well. Is it over a million or less than a million? Less than a million paying $19. And it's one time.
Starting point is 00:39:20 It's not like I'm running my credit every time. It's just one time I do it. So your credit's not being run ever? No, I get that. What I'm saying is like a credit test when I run it, this thing I'm running my credit every time. It's just one time I do it. So your credit's not being run ever? No, I get that. What I'm saying is like a credit test when I run it, this thing I'm just doing it one time. No, so it's important to keep it on. So there's two reasons why.
Starting point is 00:39:33 So data brokers, for the most part, will re-index your data every 90 days, and we will go in there automatically to see if it comes back up. And we'll let you know that your data is back and we're removing it again So you're gonna you're gonna keep it for that reason alone And then secondly if a new password gets breached, let's say yours gets breached in the next 10 minutes, right? You're gonna want to get that email saying hey your passwords out there And you're gonna get that email before Google Chrome gives it to you or anyone somebody if somebody's out there That's as good of a hacker as you and if they really wanted to get any information on you, could they get it?
Starting point is 00:40:06 I think the internet's an honor system, you know? I think that security's an illusion. That's exactly what I'm saying. So at the end of the day, there's a part of it that is an illusion. So if a person at the level of hacking as you wanted to find that you're social, ruin your credit, destroy your life, could they do it? And they're not an ethical hacker, they're an unethical hacker, could they destroy your life? If they wanted to destroy my life or anyone's
Starting point is 00:40:34 life? Your life specifically. I mean, they've been, no matter what I do, people have been attacking me for a year and a half now. I'm trying to do, you know, good things, you know, I'm not doing anything wrong a half now, I'm trying to do good things. I'm not doing anything wrong. I'm trying to do the best possible things that I can think of, that I'm capable of at least, and people are still coming after me. My entire credit report was published online. I've had pizzas showing up at my house constantly,
Starting point is 00:40:59 Craigslist ads saying that I'm giving away free stuff. I've had almost everything you can imagine. I don't want to give these guys too much credit, but people even threatening my grandmother on the phone multiple times. It's been, yeah, I mean anybody's vulnerable. Is it like a challenge when somebody is a hacker? They say, okay, other hackers wanted to come out and take you out to say like, I'm a better hacker than you are. Is there that competitiveness within the community or no? Yeah, so that's exactly what's going on.
Starting point is 00:41:30 It's usually younger kids, the younger, you can tell by the way they talk that they're young and they just wanna make a name for themselves and brag to their friends like, oh, I just hacked Zero Day, which is the alias that people know me by online. And really, like they just look like an eye hole. I'm the wrong guy.
Starting point is 00:41:51 Not because I'm going to try to do something back, but because I just want to live in peace. I want to help people. I just don't understand it, but hey, kids will be kids. I get it. I understand that part. So let's go through a couple different things, okay, with regards to hacking. So walk me through the most basic things.
Starting point is 00:42:12 So Wi-Fis, right? We go to a lot of different places. You can use Wi-Fi. What tools do you have to be able to get any kind of information you can through using people's Wi-Fi? So there is so much you can do with Wi-Fi. So do you wanna know about password cracking or? information you can through using people's Wi-Fi. So there is so much you can do with Wi-Fi.
Starting point is 00:42:25 So do you want to know about password cracking? Give me any of it, from the lowest to the highest. So I would say the lowest would be using a weak password or your phone number as your Wi-Fi password. And you may think using your phone number is not something people commonly do. I see it all of the time. And in short, to hack a Wi-Fi network, at least for WPA2, which is saving all the technical details,
Starting point is 00:42:55 you need what's called a four-way handshake. So, what I need to do is I would send what's called a deauthentication packet, which is just telling your devices, disconnect from Wi-Fi. That's what that means. So your device, whatever that tablet is, is gonna say, okay, fine, I'll disconnect. So it disconnects, and then I'm listening on my side for it to reconnect. And in that process,
Starting point is 00:43:19 I'm gonna capture that handshake. So I'll take that handshake, which is just a file, I'll bring that home with me. I could take that from your studio, let's say, and then go home and I have your handshake to try to crack later. And what I mean by crack is I put that handshake file into the computer and I have a huge list of words and passwords
Starting point is 00:43:38 and frequently used things, like frequently used passwords and, you know, it's called a word list. I'm trying to simplify this, but... And one of them is phone numbers. So, let and, you know, like it's called a word list. I'm trying to simplify this, but... And one of them is phone numbers. So let's say you have, in Florida, you would be 954, 516, you know, 305. I have word lists that have every single phone number in the state of Florida.
Starting point is 00:43:58 And when you are cracking a Wi-Fi password offline, it's extremely fast. So I could run through every single phone number in the state of Florida in maybe 10, 15 seconds. So, if you use your password, if you're, I'm sorry, if you use a phone number as your password, it's as simple as me taking 10 or 15 seconds to crack it. But the one caveat is I have to be physically
Starting point is 00:44:20 within range of your Wi-Fi to capture that four-way handshake. So, like, I can bring this on the camera real quick. Yeah, for sure. Go for it. This thing, you can do this with a $20 device on Amazon or even a cheaper device. Like, there are an ESP, I think it's called, ESP32 or 8266, but this is called a Wi-Fi pineapple. And this is not your average pineapple.
Starting point is 00:44:41 This is an enterprise, which you would use this on a big engagement that has like that. What would something like that go for? This is about 800 bucks. Okay. But you can get a regular pineapple, I think, for 100, 200 bucks, something like that. This is way overboard. Yeah, those are the ESP32, ESP. So those, you can customize those in many ways. You can make devices with them,
Starting point is 00:45:06 you can write custom software onto them that does bad things, which I'll show you more about in a second. But this right here is like a super, just think of this as a super-powered Wi-Fi card that can receive and send a ton of data, capture those handshakes I was talking about, and then, you know, you could try to crack it on here, which you're better off trying to crack it on your computer,
Starting point is 00:45:28 but this can also be a man in the middle, so you could trick the computers into thinking, this is the router, so all the traffic has to go through this and then go to the internet, so you can, you know, you think phishing, you know, until you look at the URL, make sure the URL matches the website you're going to, well, I can make it look like it's the right website you're going to because I'm the one routing the traffic.
Starting point is 00:45:48 Or, for example, you go to a hotel room or an airport and you connect to free Wi-Fi and that screen pops up that says, I accept the terms or you gotta watch an ad. That's called a captive portal. This thing, or any other Wi-Fi device, I'm just using this as an example, Wi-Fi card at least.
Starting point is 00:46:06 You can create those captive portals so that when someone connects to a Wi-Fi that they may recognize. Maybe I deauthenticate their house, knock all their devices off of it, name it the same thing as their house, so their devices try to connect back to it because it already knows it.
Starting point is 00:46:21 It's going to pop open that little portal screen and say maybe sign in to Google, sign in to Instagram, sign in to PayPal, whatever. You get all of that information. Yeah, so they put in their information, they press submit, that screen goes away, they're on the internet, they don't think anything of it, and now I just captured their credentials and they have no idea that it even happened. So this device can do way more than that, I'm just trying to simplify the concept. What else could it do? It can do multiple different bands, like a lot of technical details
Starting point is 00:46:48 that I'm trying to stay. Simplify, yeah. Got it. Okay, by the way, let me ask you this. The whole story with you wanting to get a hold of pedophiles, how did that happen? Got it. So I missed explaining even why I got into the rehab business too. I just forgot that too. Should I backtrack? Maybe just give me the concept here because the clip is going to be separate. What caused you to want to go after child pedophilia? Okay, so the reason why I got this passion, where it even came from, I don't have a kid, but, you know, I love kids. I have a ton of cousins, a lot of half-brothers and sisters,
Starting point is 00:47:30 but I didn't have this passion until I get a text from my friend's wife. And my friend's wife sends me some screenshots from this horrible website, if you want me to name, I'll name. And in one of those screenshots, there was a father that posted a picture of their kid in the bathtub, and you could see their backs,
Starting point is 00:47:53 so you could tell they were nude. And it said on the title, they have no idea what's going to happen to them tonight. And then, underneath of that, you could see a bunch of people, you know, just saying what they were going to do to this person's child. And I was out and I whatever, something, obviously it's aggravating I'm sure for whoever's listening to hear that, just that one post. People commenting what they're going to do to the kid. Yeah, yeah. So people were talking about what they were going to do to this person's child. I mean, they weren't directly there, I would assume, because they're just people that were part of this website.
Starting point is 00:48:30 But the father that posted it, who knows what they did to that kid in the past, you know, at that moment and after that. So I left where I was at and I decided I'm going to do whatever it takes to bring this website down. And I literally, like I said, I left. So I'm on my way there, on my way back to my house. I go to this website. Luckily, there wasn't any CSAM, which is child sexual abuse material, on the website itself, but like on the front end at least.
Starting point is 00:49:02 But there were a lot of people talking about it, fantasizing about it, being very graphic about it, which I can read you some of that stuff if you want. But my plan was originally to do what's called a distributed denial of service attack, which just means I'm gonna hold the website down so that it just overflow it with traffic so that it can't function.
Starting point is 00:49:21 That was what I was originally gonna do, which is a very basic, easy thing to do, but that was my plan. And I was what I was originally going to do, which is a very basic, easy thing to do, but that was my plan. And I was advised by an attorney not to explain how I got in, but I can say that it was a custom Zen 4.0 nulled theme that was cracked. That's what nulled means. And I was able to obtain code execution on their server,
Starting point is 00:49:44 which allowed me to extract their entire database, which included all of their users, all of the private messages, anything that I wanted to get, as well as four other databases from their previous websites. But my common sense started to kick in, and I was thinking, well, I don't want to be in possession of any type of illegal material, and, you know, obviously I don't want it anyway, regardless if it's illegal.
Starting point is 00:50:09 I don't even want to see that. So, the easy way for me was to take out things that had, there's a square bracket, the characters, it's called a block or a short code, and I removed anything that had an attachment or an image, and I exported the entire database. So, after exporting that database, I saw the first user, the administrator of the website, was a guy named Nathaniel Larson. He was a person that ran for Congress twice in the state of
Starting point is 00:50:38 Virginia. I was able to confirm without doubt that he was the owner administrator of this website. Rapey.su. R-A-P-E-Y.S-U. And he had three different rapies. There was Rapey.su, Rapey.to, and yes, that's exactly him. So I, at that point, I'm thinking, okay, this guy is a little bit of a nut job, like outside of being a pedophile, like just looking into him. He was into like white supremacy.
Starting point is 00:51:10 He was into being against women. Or just, I think, no, I wasn't against women. I think it was, what's it called, being an incel, like involuntary celibate. So this guy just was a whack job around the board on top of being a pedophile and openly admitting to being a pedophile as running for Congress. So the first thing that I did was I called my lawyer, because I was like, I have all of this data
Starting point is 00:51:36 and there is a politician that is running this website. And my lawyer then reaches out to a task force. I don't know exactly which one he reached out to. I then reach out to the National Center for Missing and Exploited Children. I hit up their tip line with as much data as I could give them, fully expecting them to give me a call or to come to my house to grab that data. And then after hearing nothing from them, you know, I'm sorry, I called an attorney in Virginia as well, where he lived at the time, and told them the story. They were not much help. I was fully expecting
Starting point is 00:52:12 the feds to show up at my door, seize my equipment, do whatever. I was willing to do whatever it took because I knew that 12 people have to tell me I'm a criminal if I take something to trial. And I don't think in this case, with me time stamping everything that I did, and with all of the intentions that I had, it was pretty obvious that my intention was good from the start. 12 people have to say, you broke the law, you're gonna go to jail for exposing a pedophile ring.
Starting point is 00:52:39 So I was willing to take those chances. I'm waiting for them to come take my stuff. Somebody's gonna bail me out, whatever it is, I'm just going to do it. It's all going to be fine. But nobody comes. I'm very confused by that. I have a massive database full of all these people with proof.
Starting point is 00:52:56 I have evidence. This is gold. And then I was like, okay, well maybe I can kind of force the hand a little bit. So I started hitting up media, which I've never done before. So I started hitting up 11 different media sources that I reached out to. I don't have them with me, but if you needed them,
Starting point is 00:53:14 I could try to find some of the recorded phone calls that I recorded with reporters. And every single one, and so it's not the reporter's fault, so I'm not blaming any of them. Every single reporter that I spoke to was excited to run this story. So they all were going to run a story about this politician and the other users of the site. They all got back to me with a very similar answer, saying that their legal team was not
Starting point is 00:53:36 willing to run it or not wanting to take the risk to run it or variations of that. So I said, okay, well, how about you let them know just we won't include any of the illegally obtained material. Just let people know this website exists on the ClearWeb for anyone to visit, including children. And don't include my name. You don't have to include anything that I obtained, you know, illegally. And they still didn't run the story. So six months later, after you know, me just not understanding why nothing is happening, Nathaniel Larson gets arrested at a layover in Denver, Colorado with a 12-year-old girl that he raped and kidnapped. And I remember, right now my stomach just dropped thinking about it, because it
Starting point is 00:54:17 was like I could have prevented that situation. What year is this? Because he's been accused a few times. What year was that? I don't remember the exact year, but if you look up Nathan Larson, Colorado, you'll get the exact year. 2020 he was arrested Larson served 14 months in prison for felony of threatening the president of United States in 2008. So that's one. Then 2020 he was arrested Denver International Airport. So two years ago for kidnapping a 12 year old girl facing up to life in prison So this is yep four years ago when that happened. Yes Yeah
Starting point is 00:54:50 so that was but when he got arrested was six months after I already knew he was a threat to children and It was very frustrating that nothing happened anything those guys they didn't want to do anything about it I wish I knew but at the time I wish that I knew. I know a little more now, but what happened was, so that, you know, this guy ends up going to prison, there's a ton of articles about him getting arrested for that, but there are nothing about his website. They didn't talk about this website anywhere. And there is so much to be discovered, so many people that need to go to prison that are hurting, actively hurting kids and not only just the
Starting point is 00:55:25 weirdos and dangerous people on that site, but the children on that website that were selling themselves to these people. Which I'll go more into that later that I was able to confirm that a lot of them weren't fantasizing, pretending to be kids. There were actual children on this website. And by the way, he ended up dying from committing suicide two years later. That's what I wanted to bring up last was was he went to prison and he starved to death, but they claim it's suicide. I don't care whether it was suicide or not. I don't think he deserves to breathe the same air as us.
Starting point is 00:55:57 But I find it hard to believe that a jail would take on the liability without jamming a straw down your throat or a tube down your throat to feed you and let you die from starvation. I just find it hard to believe. I feel like the inmates- What are you saying? You're saying somebody took them out? I think just, you know, if the inmates are in control of your food and, you know-
Starting point is 00:56:16 I got it. I think that there's a possibility that happened. I'm not a conspiracy theorist, but- Sure. I got you. I just find it hard to believe a jail would take on that liability. Let me ask you a question. So, how much of this do you think is happening right now?
Starting point is 00:56:26 How much you think of pedophilia and pedophiles? Obviously you're seeing a lot of movement with these guys that youtubers are going out there catching people with hey This guy's getting a 13 year old and then boom they're punching him in the face, Rob I'm sure you have some of the clips to show I'm sure you've seen it as well. Yeah, I did it I did it as well. Oh really? Yeah. Yeah, that's that's part of the story So do you did that recently or you used to do that? No, so that had to change, but so the reason why people heard my story in the first place, so let's just segue, I guess, into that,
Starting point is 00:56:52 because this was where that makes sense. So, I was doing this after that, so I'll go back to the beginning of when Nathan Larson got arrested and nothing was done about the website and I still was not acknowledged, I was like, okay, you know what? I'm gonna take this into my own hands. And I saw there were YouTube groups that were confronting them. They weren't hitting them or anything at this time,
Starting point is 00:57:11 but they were confronting them. They were decoying on their own, pretending to be children, grown women, grown men. And then they would confront them in real life. But what I noticed, the common trend of these people was, was they wouldn't know the person's name. They wouldn't know where they lived, didn't know where they worked. They would just show up and say, hey, were you here to do this?
Starting point is 00:57:28 And either the person would sit and talk or they'd walk away, but there'd usually be no arrests, no nothing, no repercussions, unless someone happens to run into that video. So I was like, okay, well, I have some abilities with open source intelligence. OSINT is the short term for it. Let me just offer my services. I want to make sure they don't include my name. I don't want the notoriety for it. But send me your chat logs.
Starting point is 00:57:51 Send me the phone number that you have for the person, the profile photo. Send me everything you can on each person. I reached out to a bunch of YouTubers back then. And I was providing them full case files so that when they showed up to meet these predators, they would know, like, hey, John Smith, I know you work at abc.com and your wife is this.
Starting point is 00:58:14 And so they have a little bit more leverage in telling them, hey, you better sit here and talk to me. And the way that the predator catchers would do it would say, like, hey, you either talk to me or we're going to get the police involved or we're going to call your wife or give them an ultimatum, even though it's going to happen anyway, it just gave them a little bit more leverage. So I did that for quite a few years. By myself, anonymously, nobody other than the predator catching groups knew about that.
Starting point is 00:58:40 And one day I'm sitting with a very good friend of mine, he's a professional MMA fighter, and I see you have some gloves over here. His name is Dustin Scrappy Lampros, and we're sitting in a garage, and we're talking, and I'm like, hey man, you train three times a day, that's your main career, is fighting, you know? And I have this, you know, I can show you how bad it is. So I popped open a teen chat on Google,
Starting point is 00:59:03 and I just typed, I think, Ashley13femalenewjersey was my username, like 13 slash F slash NJ. Or it might have been Florida, I forget what I did. But I hit start, and all I typed was hi in the chat, which I've demonstrated online before. And within seconds, literally seconds, we could emulate it right now, and I guarantee you we get the same result.
Starting point is 00:59:27 There were 20 plus people talking in the private messages wanting to talk to a channel. This is on the dark web or this is just regular? We could Google Teen Chat right now and we could do it right now. Okay, Rob, go to Teen Chat. Yeah, and then just do one where you can enter and then hit guest, any of can enter and then hit guest.
Starting point is 00:59:45 Any of these, it doesn't matter. You could click anyone you want and then just give yourself an username. Like if you actually want to do this, do like just a girl's name. Maria do Maria 13 F Florida or FFL. And then, yeah. Put 13 or what do we put as the age? Well, I put 13 as the age. Is that too old? No, no, that's fine.
Starting point is 01:00:15 That's fine. So just click the Teen Chat. I've never seen this website specifically, but yeah, just type hi and then wait for the private messages to come in on the top. This might get graphic who knows But remember this is the first link on Google for teen chat keep that in mind Wow What happened? I'm already getting DMS seriously. Yep. Yeah open a master What is a let's chat on teleguard
Starting point is 01:00:42 68 female 55 GA 7e yeah they want to chat off-site on a you know obviously that's an adult look at all these people messaging one two three four five different ones so this guy doesn't know I'm sorry these people do not know what this girl looks like they don't know how old she really is but they're sitting in a teen chat and so some of these may be kids like that says Molly 15 that could be a kid but I guarantee you go through a couple of these you just say how old are you just lonely guy yeah that is not a that's not a teenager well let's respond
Starting point is 01:01:14 yeah go ahead ask them how old they are and you know the way that we would do as a decoy for example back let's wait to see what he's telling us to put go ahead what should he put I can't see the screen zoom in a little bit wait to see what he's telling us to put. Go ahead. What should he put? I can't see the screen. Zoom in a little bit Rob to see if the chat shows. There you go. Say, hey, hi, how are you? Hi. Say, hey, how old are you? I would do that for a couple of them. And you're getting blown up with look at all these messages and there should be ridiculous and all you said was hi. Oh geez. What's this one say? Hey guys, my name is Ryan Montgomery also known as Zero Day. I'm proud to be part of the app Manect. If you have any questions regarding child safety, cybersecurity, or even any of the gadgets
Starting point is 01:02:04 that you see me use all over the internet, feel free to reach out. I'd be happy to help you with any questions or concerns you may have. Stay safe. Yeah, say how old are you? What's the user's name? D-H. Okay, just tap on how old are you. You openly ask that question?
Starting point is 01:02:21 You don't even hesitate? Yeah, yeah, go right, yeah. Usually they'll respond with a real age. These predators are, they don't have hesitate? Yeah, yeah, go right, yeah. Usually they'll respond with a real age. These predators are, they don't have any fear. You know, they just, they're nuts. It's absolutely insane. What's this one say? Yeah, look at that.
Starting point is 01:02:35 So that's either a bot or a real person, I don't know. Okay, Elise, so let's see what else we got. Yeah, and then you can also say hi in the chat again, get some more people going but Yeah, that's an adult are you joking yep, this is just lonely guy turned 19 in may hope you don't mind is his response What do you want to respond to be I mean you could say whatever you want But usually they're like, 40, 50 years old. 19 is still horrible, but that's an adult sitting in a teen chat. And 19 is a teenager, but he shouldn't be talking to what he knows to be a 13-year-old.
Starting point is 01:03:15 Or what did you say to that? 13 or 15? 13. Yeah. Yeah, but the unfortunate part is, I see, when I was doing this, at least with Dustin, which he's still doing it himself, 561PC is the group that we started together, it's still around, you start to see, even on major sites like Instagram, Facebook, and TikTok, that more men are willing to speak with a child than not. And it starts to make you lose a little bit of faith in humanity.
Starting point is 01:03:44 So let me ask you, but okay, so we've had a lot of people on to tell us, it's insane. That's exactly what I'm saying. That's insane. I'm actually trying to see how far along this can get. Look how many there is. It's filling up the whole screen. This guy just offered his age high, 17 male metal gods. That's a kid, okay. You're assuming that's a kid right Hi, how are you? Can we chat? Do you have age preference? Hello limitation? Do you like an older boy? There you go So what do you want to respond with say yes?
Starting point is 01:04:16 How old? So it's unbelievable likes you could sit here all day But this is remember first result for teen chat. So a kid might think this is safe, or a parent might think this is safe. It's a teen chat, the first result on Google. We didn't even go through all these private messages. You're still getting a ton of messages, Rob. What's it say, 27?
Starting point is 01:04:37 Sorry? Yeah, 27-year-old. There you go. Oh, okay. But I mean, you're in teen chat at 27. Unbelievable. So, but here's a question. So if we know this is happening, okay, does the U.S. government, the U.S. government knows
Starting point is 01:04:54 this is happening? Do you know how much of a business this is? We've seen the number thrown around 150 billion dollar a year industry is what it is, right? Human trafficking, child trafficking. And if the U.S. government really wanted to get to the bottom of this, we have the ATF, which is what? The Tobacco, Alcohol, Tobacco Firearms. We have the FBI, Federal Bureau of Investigation, we have CIB. If they really wanted to create a three-letter organization purely dedicated to catching
Starting point is 01:05:29 pedophiles, they obviously could do it. Well, they, I mean, a lot of them do. So Homeland Security Investigations has child crimes units, there's FBI, they have child crimes units. You know how much money they dedicate to it? Not much. No, not that. It's in the millions.
Starting point is 01:05:43 No, and it's the second thing next to the drug war. Why don't they do it though? Why don't they pursue it? I wish I had an answer for you, but I don't. And now being doing what I'm doing, I guess going back to what I was like, I had to stop doing the project with Dustin or Scrappy because they considered vigilante justice. So I couldn't sit in court and be discredited as a vigilante catching predators outside of the law. So, I had to join a group called
Starting point is 01:06:09 Sentinel Foundation, which is awesome. I'm the CTO of Sentinel Foundation. It's full of Green Berets and Delta Force operators and retired Homeland Security. And we work in parallel with law enforcement now. So, I'm able to actually get convictions, actually take down big, you know, big operations rather than one predator at a time, which I think there's incredible value in both, but I had to make a choice, right?
Starting point is 01:06:31 It's either I take this once in a lifetime opportunity to be the CTO of a reputable, I guess, NGO, non-government organization that works with law enforcement or continue to bust them on YouTube and, you YouTube and get one at a time. So Dustin's been doing a fantastic job, and he's been getting arrests, by the way, which is something relatively new. What's the craziest story Dustin has? Craziest story Dustin has? Yeah, in regard to catching a predator.
Starting point is 01:07:01 Maybe even yourself. When you were doing this, what are some of the stories of who caught and and so we've caught teachers, police officers, teachers yeah yeah we've caught I caught a teacher um here's here's a crazy one so so a guy um his name was Brent and he went he was meeting up with what he thought was a 13 year old and um there's a video of me actually chasing him on YouTube but um he uh so he thinks that we're police, which I find out later, but he meets up, he thinks he's meeting with a child, a little girl, and I chase him to his car. He peels off. 10 days later, I get a message from another
Starting point is 01:07:36 predator catcher group on the other side of the country that he got caught again by a different decoy in person. So he got caught twice, and now he's talking to a decoy again that I was recently made aware of. So three times. So think of the times that he has not been caught. And he's a teacher. I mean, you can look him up.
Starting point is 01:07:55 I forget, well, I'd have to look up his name on my computer, but it's Brent something. He had two different teaching positions last I checked. And there's been other teachers that Dustin has caught. What is the profile of how these guys are wired? Is it the fact that even if they get caught, I'll never do it again, I'll never do it again, I'll never do it again, boom, they're back at it again next week doing it again. Is it because they just don't think they're going to get caught? Or is it because they don't care what the consequences are?
Starting point is 01:08:21 I can't think like one of them, so I don't know. But from what it appears to be, it seems to be a compulsion that, you know, I have no sympathy for. It's the only mental health disorder, if you want to call it that, that I have no sympathy for. Like, I could literally watch someone's, I could watch a pedophile or predator or trafficker watch them get beheaded in front of me and I would not lose sleep over it. So, I don't know. I just, I think it's a compulsion that they can't help themselves regardless of the
Starting point is 01:08:49 consequences but I have no sympathy for it and I don't think they deserve to breathe the same air like I said earlier. Rob you know who all said this? You know who all said the same exact thing three weeks ago? Judge from? Sheriff Grady Judd. Oh Grady Judd, yeah. So he worked with us. He worked with you? Yeah. We had him on and he told me about a story of a guy that he went to jail and he told
Starting point is 01:09:11 him and he went and watched a death penalty, if you remember, because the guy told him what he did to a 12-year-old girl and then afterwards, he says, I sat there and I watched him die and I had zero sorrow for what was going on. I actually partly enjoyed it. I believe those were some of his words on what he said. I'm paraphrasing. But I think a lot of people are also where you are.
Starting point is 01:09:35 I just wonder why there's not that much of an interest in wanting to get to the bottom of this, especially if they're mainly targeting kids. Yeah, look at this. Look at this. I mean, the interest should be there, and I've said this in other interviews and videos myself, if you have the ability to do something about this, you should be doing it. But people don't. I know a lot of people in the hacking world, which is a small community, but I know a good majority of it. And there's not enough people doing it. Law enforcement can't handle it
Starting point is 01:10:05 There are a lot of their the Internet crimes against children's technology is very antiquated and and they need like I I talked to one Not too long ago I won't I won't name them because I don't want to embarrass them But they wanted my training and they wanted me to help them with that with their investigations And I'd be happy to do that, but that shouldn't be the case. They shouldn't need my help What are you seeing here? Hey, high school teacher here, you're not cute, any girls want to chat? Oh my gosh.
Starting point is 01:10:28 And this is a teen chat, the first result on Google, guys. Remember that. First result. Wait, he's a teacher asking, and by the way, this website, is this a, this is not a dark web website. No, we can click, we can go click another one. We can go click a different, different teen chat and the same thing will happen. And how does this chat room know that's happening and they allow that? Because that's public, it's not even private.
Starting point is 01:10:51 How does the chat know this is happening and they allow that? This is the part that most people don't understand, is it's every website. It's not just teen chats, it's Instagram, TikTok, Sprout, Meetup, Kick. You don't have any kids? No. Do you want to have kids? I do, butup, kick. You don't have any kids? No. Do you want to have kids? I do, but I'm terrified. Is this what you're terrified of?
Starting point is 01:11:10 Yeah, because every kid has a phone and iPad and it's like an appendage to them. That's something I wanted to talk to. Giving advice to parents is something that I like to do, but I don't have kids, so I feel weird doing it. But in a way, I feel like I have to. If I see something bad, I need to let kids, so it's like I feel weird doing it. But in a way, it's almost like I feel like I have to. If I see something bad, I need to let you know about it. And there's something that's different from when I was a kid. Even though I was attached to the computer, like it was a body part to some degree,
Starting point is 01:11:35 kids really depend on their phone and their iPads and everything else current day. So, let's say your kid is scared to tell you that a high school teacher or a grown man is talking to them because they're scared they're going to get their device taken away, they're just not going to tell you. And then a catastrophe might happen, and then they're going to be dealing with trauma or worse for the rest of their life. So my advice to parents out there is make sure your kids know they can be open and honest with you
Starting point is 01:12:02 without the repercussion of losing their device. Let me ask this question. So let's just say you've got kids, and your kids are 6, 7, 8, 10, 12 years old, whatever. You pick the ages, right? What are you teaching them? What are you telling them? Based on what you know, and you know all these tools, what are you telling them? What are you showing them? I'm telling them to stay off of the social media that I'm not, that they haven't had
Starting point is 01:12:23 my approval to use, I guess. I would like to have access. I don't want to be a helicopter parent, is what I'm kind of trying to get at. So I don't know exactly how I'm gonna do this, because the more that I do, I've been doing it for years now and my brain is so tainted from seeing how screwed up people are, that I don't know what happens when I have a kid, what I'm going to do, but what I can do, I mean, I would probably be following the same advice that I would give other people that are parents, and I would monitor my kids' devices, I'd let them know they can be open with me, and then, you know, I would try not to be overbearing, but I would ask a lot of
Starting point is 01:13:01 questions. Okay. I mean, we can talk about this all day long because to me this is very important. As a father, that's why my kids don't have a phone. They don't have, they only get to play iPad twice a week. That's Saturday, Sunday. If they have C's, they don't get to play iPad at all. Whether it's three months, six months, it doesn't matter.
Starting point is 01:13:19 And I think too many parents are just kind of given their, I'll go to dinner. The other day my wife and I went to dinner. This three-year-old kid, sat down gave him a soska what you know what a soska is what's a what do you do when you give the thing in the kids mouth in Russian they call it soska what did he call it a pinky what do you call the thing the nipple the baby nipple is that go to images pacifier yeah it's a binky pacifier was that Jake in the back is Jake you're so funny like a voice of God.
Starting point is 01:13:45 Yeah, we call it Soska, and that's what we grew up calling it. But anyway, so this kid, the mom gives the kid a Soska, and then gives a phone, and boom. The dinner was two hours at Nobu. The kid was stuck on the phone for two hours. Jen and I are watching saying, are you flipping? And we're there with our three kids. None of them have a phone in front of them. These guys have a phone in front of them. These guys have a phone in front of them.
Starting point is 01:14:05 It's a pretty scary time to have kids. I don't blame parents who are worried about having kids. But let's go to a different thing. So I walk into a business. I look at the business from a different lens. I'll say, okay, is it secure? How many employees do they have here? How many computers?
Starting point is 01:14:22 What are they using? How do they have it set up? How many offices versus how many cubicles? Is it an open environment? Is it a private environment or people talking to each other? Is there a culture built or people hanging up stuff to show what they're all about? Is there family pictures around their table? Because if people have family pictures around their computers, that means they're probably
Starting point is 01:14:37 going to be there a little longer than usual. You're a different story. You're a hacker. You walked into our building. What are you looking at? What are you thinking about? How are you sizing us for our vulnerabilities? So I, in the hacking world they would call it reconnaissance or enumeration. So what I would be doing is trying to see
Starting point is 01:14:57 what type of equipment you have, what computers you're running, what operating system you're running, go on my phone try to figure out what type of Wi-Fi you're running, what operating system you're running, go on my phone, try to figure out what type of Wi-Fi you're running, whether it be WPA, WP3, etc. Why does that matter to you? What kind of Wi-Fi? Different types of attacks, depending on different scenarios. If people have their phones out, is it majority Android or is it majority iPhone? They call it a threat landscape. So I would take the attack surface or threat landscape and then try my best to take over as many devices
Starting point is 01:15:35 as possible and manipulate as many people in this building that I can to get what I want. If we were on an engagement doing a penetration test. If we were on an engagement doing a penetration test. If we were on an engagement doing a penetration test. How long would a penetration test take with you? Depends on the size of the business. Usually, we have a pretty good team. I would say, in my personal opinion, one of the best in the world, if not the best in
Starting point is 01:15:58 the world. Usually fast and done well. A lot of times I get involved as well. And I seem to be very thorough because I care. It's my company. I'm sure you can relate to that. And it's a... Are you naturally more a CTO?
Starting point is 01:16:14 Is that what your wiring is? No, no. I mean, I've always been a CEO. I just happened to be the CTO of Sentinel Foundation because that's what they titled me. But I handle a lot more than just CTO related things with Sentinel Foundation. Let me ask a different question So when it comes on to CIA or you know, Mossad or MI6 or some of these secret intelligence, right? You know, you'll hear stories about the fact that hey, you know These guys have the best secret intelligence. Those guys have the best secret intelligence. If you really wanted to hack into Mossad, the Israeli military intelligence, or MI6, the UK military
Starting point is 01:16:53 intelligence, or even our CIA, could you do it? And how deep could you go in? So if I was, I mean I can't say that I can or can't because I've never tried, but I would say the first thing that I would go for would be an individual. I would try to befriend an individual, whether that be with my real name or with an alias, and I would try to manipulate that individual into doing something that would give me access to their devices. Okay, so that's your pattern on how to... Okay, so let's just say you got in. What are you looking for to get in? Because those guys, they typically have two separate phones, right? And they probably know guys like you, and they probably get trained to be careful on what to do with guys like you, right? Turn off your Bluetooth, turn off your
Starting point is 01:17:35 Wi-Fi when you're around them, or any of that stuff, right? But okay, but let's just say you do. What's your next step after that? So after I get a... Say you got a Mossad agent or an MI6 or a CIA, you got somebody, you get info from them, then what are you doing next? I'm going to try to authenticate to, let's say it's a web server, I'm going to try to authenticate to the web server to see what type of data I can pull from it or hide my persistence on that web server so they can't find me and get rid of me. And then I'm going to try to pivot to the other, you know, computers inside of that network or in that organization, whether it be computers or devices.
Starting point is 01:18:13 That would be my next steps. So you have to have some point of exploitation or some point of weakness. You take advantage of that point of weakness, whether it be a person or a device or a website, whatever it may be, and then you want to pivot around that network and look for more devices and more people to infect. Okay, so let's think about WikiLeaks.
Starting point is 01:18:33 Okay, Julian Assange, right? What happened with him? And he just came here. I thought he was here and then he went back to Australia. Not here. I think he went to Bahamas or something like that. He was somewhere around here four weeks ago and then he flew back to Australia. Not here. I think he went to Bahamas or something like that. He was somewhere around here four weeks ago and then he flew back to the Bahamas. A person like a Julian Assange, okay, or a person like you, you know, everybody is wondering what
Starting point is 01:18:56 happened with the Epstein files, right? It's just a lot of, it's on a lot of people's minds. I'm sure. And if these guys did what they did and they held these people hostage, because even this guy named Leon Black, who's a multi-billionaire, he ends up paying some, I don't know what the number was. What did Leon Black pay Epstein for consulting fees? Zoom in $150 million in fees for tax services. I've never heard of that before.
Starting point is 01:19:23 And loan him $30 million and also made a $10 million donation to his charity, right? That's kind of weird to do something like that to Epstein. That's a little odd, right? It gets a guy like you question that. If you really wanted to go into finding out what Epstein had access to, what types of files and videos and stuff like that, and that was your real mission, like you were determined to do, because let's just say one of the girls that he that. And that was your real mission, like you were determined to do because let's just say one of the girls that he was abusing that was underage was a sister of yours or a cousin
Starting point is 01:19:50 of yours or a niece of yours. If that produced the emotion that I think can produce in a person like you, do you think you could find the files of what Epstein had if you really wanted to? I think that if I couldn't find it digitally, I would swim across that damn ocean and get on his island and I would do it that way. I would talk about just keeping it basic with the technology because there's way more attacks than just Wi-Fi. Even if it meant swimming across, getting on a boat, and just going around in a circle with that island, trying to connect to one of those computers if he had one.
Starting point is 01:20:32 I would try everything I possibly could, especially while the island was populated. Now that he's dead, I can only go off of what people have and what's out there. There's only one journalist that I'm familiar with That not from not familiar with that I know of that that has his black book and and his wife Black book I don't know much more that was released about the guy like I I personally don't even know how he became a billionaire I have no idea. I don't know that much about him. We just showed it to you. That's I became a billionaire No, I thought that, I misread that. I thought it said millions. No, no, but that's one client though.
Starting point is 01:21:10 So imagine the accusations that are being made is the fact that he had so much intel on so many people that he would bring to the island and he had videos and things that they did that he would come back and say, hey, now you got to pay me X, Y, Z, or now you got to do this. I need this offer and I need this favor. I need that favor. And I kind of combined you get a lot of people that are willing to pay the kind of money that they're paying you. It doesn't take much to become a good. Well, he was extorting them. Yeah. That's exactly the key. That's what a lot of people accuse him of. Yeah. Well, I mean, it's, but really to get
Starting point is 01:21:39 extorted in that situation, you have to, to take advantage of a child. So, I mean, I, I don't feel bad for either side. I don't feel bad for obviously Jeffrey Epstein or anyone that he extorted if they're going to rape a child. I mean, yeah, I think they deserve that. Yeah. But how many people like you are out there in America? If you were to say I'm capable like you, how many of you are out there?
Starting point is 01:22:04 I mean, it's hard to tell because everyone's anonymous, you know, or going by, not everyone, but most, if I had to take a guess of actual hackers, not just beginners getting into the field. No, no, at the level that you're at, if not higher than you, how many of those are out there? Let's just say 10,000, 50,000. That's a lot though. I can't, I don't know, China, you know, they have a lot of people
Starting point is 01:22:25 And I'm talking us like how many things are us but I would say 10 10 20,000 10,000 of people that can do what you do Yeah, but not working with our army and our military to the extent that people may think What do you mean? Like, you know, I had a recruiter come in when I was speaking at Hack Miami, and the recruiter told me that there were less than a thousand people in the entire army that is fighting for our country with a computer, cybercrime, or cyber warfare. My apologies. Yeah, I just, like, I don't think you would do it because you're not trying to make enemies from the
Starting point is 01:23:06 feeling I'm getting from you is you're trying to avoid making enemies is what you're trying to do. You know? I'm making enemies all the time. So do you think, so let me ask you, who do you think is the biggest, well, I don't know. I don't know because to me, see, I don't know how to do what you do. I don't have that talent. That's your talent. Right.
Starting point is 01:23:25 But if somebody, like let's just say I'm living in a, because I don't think it's that hard to find out what Epstein did. I don't think it's that hard to find out what did he had on his files for him to get rated in Miami and LA. I don't think you guys look at it and say, how do you not know? I think guys like you look at it and say, how the hell do you not go get it? You know you know what happened. Oh, if I had the same authority that somebody that could seize his files and get access to where he was at, if I had that authority, it would be game over for him. But when it's
Starting point is 01:23:59 all sealed up and stored in an evidence locker, it's always... So you still couldn't get through that? It doesn't mean I couldn't do that, but I would be breaking the law if I did, and it's already being handled at that point, hopefully. I don't think it is, though. See, I don't think it is. I think, honestly, I think the saving grace to put a stop to the pedophilia movement and the human trafficking is guys like you. I don't think they look like Navy SEALs.
Starting point is 01:24:30 I don't think they look like me. I think they look like you. I think they fear the hell out of people like you. And by the way, you know how they took down the mob? You know the story how they took down the mob. You know who Rudy Giuliani learned how to go take down the mob? Yeah, I don't know every detail, but yes. There was a professor at Rutgers University that I think it was, can you type in Rudy Giuliani Rutgers mob? Rudy Giuliani Rutgers mob.
Starting point is 01:25:00 Zoom in a little bit to see if there's a story, General Mob, for example. Rutgers Professor. Type in Professor if you can. Rutgers Professor Mob. Zoom in, zoom in, see if that story is out there or not. Okay, I'll find it. Anyways, Rudy Giuliani is trying to find out how to take down the mob. This professor gets ahold of him and says, the way you're going to do it is through, what do you call it,
Starting point is 01:25:26 through RICO laws. And Rudy says, how do we do that? Anyways, the guy eventually coaches him to be able to find out how to go take him out with the RICO, and that's how they did it. Got it. With the RICO Act. They did it with the RICO Act, is the way they did it. And he was able to get him down based on, you know, and then that was the way 240 guys like this got arrested. It was like, oh shit. And then what happened?
Starting point is 01:25:49 Clean up the streets of New York. The mob is gone, okay? And it's no longer what it was that it was in the early 80s or 70s or 60s, 50s. There still hasn't happened an event like that for 40 years where guys are getting locked up and arrested to say, listen guys, we're gonna leave this business of human trafficking.
Starting point is 01:26:12 I wish there was, I wish there were. The issue, like I said, going back to what I was saying is whether they're a big time trafficker and they're dealing, they're trafficking a ton of women and children, or they're just a single predator slash pedophile, or they're a drunk guy that, which I still think pedophile, even if you're a drunk guy that gets horny and decides to meet up with a child, there's variations of how bad these people can get. Like the sheer amount of them that are willing to meet up with a kid on any platform, it makes me think that this is a
Starting point is 01:26:42 problem that I just don't know how, I don't know how we're going to be able to solve up with a kid on any platform, it makes me think that this is a problem that I just don't know how I don't know how we're gonna be able to solve it with the law you know it's you can yeah it's it's illegal you're you could end up on a sex offender registry but these guys keep coming back they keep doing it so I genuinely don't know how to answer that question I don't know if the Rico act would solve this one no and I'm not asking about the RICOAC at all. What I'm saying to you is, I think guys like you, if 50 of you, well, if 50 of you were part of the I don't give a shit community, which is hard to find that 50, if I was the president or if the president assigned me to say, hey, I need you to go find out what's going on with, what do you call it, you know, with pedophilia and human trafficking in America.
Starting point is 01:27:31 You know what I would do? I'd call you and I'd say, hey, we have five other names. We want to have a meeting. I'd have my guys filter you out to see if it matters to you or not. If you didn't give a shit, if you're like, ah, it's honestly right now making so much money, I don't want to get caught up like this, I'm living a decent life, no problem. But I would bring you guys in, 10, 15, 20 of you, I would say, bless you, I would say I need you guys to be with me here for 30 days.
Starting point is 01:28:01 So if you're going to come, you got to come into being with me in this building for 30 days. Yeah, yeah, I would love it. I would want all of us in the same building. We can't get out, okay? I'm going to get you food. I'm going to get you a place to sleep. You're going to get plenty of rest. You don't have to worry about that.
Starting point is 01:28:17 And we're going to turn you into a hero for figuring this thing out. I'm going to say, what tools do you need? You're going to say, if I ask you right now, what tools do you need? What would you say? Technology, what tools do you need you're gonna say if I ask you right now what tools do need? What would you say technology? What tools would it be a laptop? Access to because we built pen tester and this is not an ad but we built pen tester upon the technology I was using to find predators and we Swept we flipped that technology around to help people find their own digital footprint and remove it So I would say give me a computer give, give me access to my own platform,
Starting point is 01:28:46 and then that's it. I mean, yeah, and then internet, you know, I need an internet connection, but that's about it. And then, you know. You're saying within that, if I had a room of 50 of you in the same room, locked up, you can't get out,
Starting point is 01:29:00 you're telling me you guys, and you guys within 30 days, you'd figure out what's going on I mean, it's not a guarantee, but I think you have a pretty good shot of it I mean, I I don't know. It's a it's a it's a fictional scenario. So it's hard to know for sure But yeah, I think I think you guys would though. I believe I believe we would you guys I believe we would but I but it would be It would be me i'd be lying if I was saying for sure, you know Because I because I don't know the scenario. If there was a case and you said this is the details, here's the exact target, you know.
Starting point is 01:29:32 You know, everybody has a mission that they're on and a sword that they're willing to die on. Do you have one or no? My mission is to number one, educate parents and protect children. That's my main life goal at the moment. But secondly, I realized that a lot of my content is very hard and very tough to swallow type information. So I thought, well, what else can I do to help other people? And my thought was, help people get into cybersecurity because it's the number one industry in the world right now. We need more people doing it. And it's fun.
Starting point is 01:30:09 And I love teaching it. I love simplifying it and showing people how much fun you can have doing the right thing. Like, you don't have to take the paths I took as a kid. You can make a ton of money doing it the right way. So I started making 30 to 60 second videos on social media, showing and demonstrating these attacks. And I have people walking up to me literally everywhere that I go, you name it, in a public place, everywhere that I go I have people coming up saying, you know, like, you know, I see you online, and this and that, there's those people. But what really makes me happy is when they come up to me and they say, you know, I was their inspiration for getting into cybersecurity, or I their reason during college for cyber security right now
Starting point is 01:30:47 It's a very promising career. It's a very promising career to get into it It's a it's an honor to know that I had a part in that I don't take credit for it, but to have a part in it is a ration It's it really it motivates me to try doing this right what other tools do you have there that you want to share with? I got some I got something cool that you'll let me see it. I want to see it Ryan, what other tools do you have there that you wanna share with us? I got something cool that you'll appreciate. I wanna see it.
Starting point is 01:31:08 You wanna see something funny while I pull it out, check a email on there, like one of your old Gmail's or something. Type in patrick at thestorybuilders.com. Patrick at thestorybuilders.com. So it's gonna be a little, the site will be a little slower than it normally is because we got like 30 to 50 thousand people on it.
Starting point is 01:31:28 We'll wait until it comes. We'll wait until it comes. But you can show me what you got and we'll get to it. Have you checked the NPD breach too? No. Your social is probably, I would almost guarantee that it's in there. So you should probably handle that
Starting point is 01:31:39 before you post my interview. Okay. Sounds good. Yeah. Okay. So this is, what is this? Just out of curiosity. This looks like something I would use to charge my phone.
Starting point is 01:31:53 Yeah. With a charger, yeah. And you know, that's, so I have every single charger you can imagine and you have all of them, right? So actually what this is, the reason why I have this little orange thing here, because there is no way I'd ever know that this was a charger, I'm sorry, that this was not a charger without this orange tag, because it is that perfect. So the NSA is selling these for $20,000, and I have a friend, MG, he goes by, who is selling them for a couple hundred dollars a piece,
Starting point is 01:32:24 and I have a bunch of them I can show you. But this one I preloaded with something cool, the old Pristia. So this is a charger that will work. I could hand this to you and say, hey, here's my charger, man, or replace yours, right? Whatever you got plugged in, I'm sure I have a replacement for that. You bring this home, it could act like a charger forever, but as soon as this plugs in, inside of this tiny little plastic right here, this inside of this is a Wi-Fi chip, a mini computer, and this thing emulates a keyboard and can type at 860 characters per second.
Starting point is 01:32:56 So what I'll do is, because I'm sure you don't want me to plug this into your computer. No, I don't. So let me get my computer set up real quick. Did you say $20,000 for that? Well, yeah, so the NSA has a look up, if you get it, oh, it's still stuck on the scan, but yeah, definitely check back at that. But look up NSA OMG cable. And then, yeah, you should see that that's the actual cable itself, but if you scroll down to the bottom, you'll probably see where the NSA is selling their own version
Starting point is 01:33:31 of it before my friend. There it is. I just found the $20,000. Yep, I just I'm going to text it to Rob. Wow. Yeah, so MG was able to pull it off for a couple hundred dollars, which is unbelievable. And it is so dangerous, man. It's just that I have so many gadgets with me and we probably don't have enough time to go through. I mean, I have literally 50-plus gadgets with me. So I'll show you a couple of them, but I don't want to go too crazy.
Starting point is 01:34:08 Yeah, that's a European site that you can buy it from. Yeah, right. There's this complete wireless pen testing payload platform invisibly embed inside a cable. Originally a clandestine NSA tool costing over $20,000 now available to everyone. Yeah. Yeah, there's a name for it too. I think it was, I can't remember the exact name the NSA was calling it, but you could see the actual government document with the cost for the exactly the same thing. So now what does this do? So I'm going to show you what it does, but it can monitor your keystrokes. So you can put this in line in between your keystrokes. can monitor your key strokes. So you can put this in line in between your car. Are you kidding me?
Starting point is 01:34:47 Yeah, you can put this in line in between your keyboard and your computer. I could put this in straight into your phone. I could put this I can type keys, like I said, at 860 words per second. I can leave it there and come back later. This thing has its own Wi Fi network that I connect to inside of this. And then if you were to like you can match this up to yours and see it's absolutely identical. A hundred percent same thing. Yeah so if you didn't have that little orange thing on there you easily lose that. Wow. Is the one you
Starting point is 01:35:20 have, is that the new design or is that the... I couldn't even tell you this is just... Well I just meant like is it the woven one? This is the one you have, is that the new design or is that the... I couldn't even tell you, this is just a... Well, I just meant like is it the woven one or is that the... This is the one that's the Apple one, this is actual Apple. Okay, so let me show you the Apple one while my computer is booting. I don't know why it's not booted up yet. I have so many of them. He gave me a ton. Yeah, here, look at this one.
Starting point is 01:35:44 That is not an Apple charger. This is the same thing as the other one? He gave me a ton. Look at this one. That is not an Apple charger. Dr. Abbasi This is the same thing as the other one? Dr. Barswick Yeah. Dr. Abbasi So let's just say you give this to somebody you're spying on, okay? They put it to charge. You're now seeing who I'm texting, what I'm doing, videos I'm playing, everything I'm
Starting point is 01:36:01 doing, you're seeing all of it. Dr. Barswick Not texting, because because I can't but on the computer. Yes Yeah on the phone. I'm able to inject keystrokes into the phone Like let's say I want to install a virus on your Android or something I could do that with that device, but I can't tell what you're typing on your phone your computer I can tell what you're typing So these things these things are wild 200 bucks.
Starting point is 01:36:27 Yeah, per cable, you know. Who buys them? Who uses them? So they're intended for penetration testers like myself to do the right thing. But you know, threat actors can buy them as well. All right, so let's get this thing. They're intended for penetration tests that you do for companies.
Starting point is 01:36:50 Yes. Okay, so make sure everything's plugged in. We're not on any. There's no internet here. All right, so what I'm going to do is, and you can see here, that without this orange thing I have on here, just so I don't lose it with my actual charger, but I don't have to have that on here.
Starting point is 01:37:13 I just don't wanna lose it. So I'm gonna plug this into USB-C, which, you know, you can pick whatever one you want. So that's plugged into USB-C. This side, I'm not gonna connect to anything. I could charge my phone with it. I could do whatever I want with it, but what I'm gonna do is on my phone,
Starting point is 01:37:33 I'm gonna go to Wi-Fi. I'm gonna click OMG. Now I've just created a network from this cable that's plugged in. It's not plugged in. We don't have an OMG network here. No, no, no. No, and this is not plugged into anything. So this is creating a that's plugged in. So that's not a... we don't have an OMG network here. No, no, no.
Starting point is 01:37:46 And this is not plugged into anything. So this is creating a Wi-Fi network. I'm going to go to it in my browser. And then I have... now I have an interface here that I can connect with. So I'm going to go in the file menu, I'm going to load payload one. There we go. Alright. So ready? Now, I'm going to on the File menu, I'm gonna load payload 1. There we go. Alright, is it ready?
Starting point is 01:38:05 Now, I'm gonna hit Build and Run, which I could be very far away from the computer. This is just showing an example of it. See how fast that's typing? What's it doing? It's typing PBD Podcast, and Zero Day was here. Get out of here. So that could have been anything. That could have been a malicious command, What are you doing? It's typing PBD podcast and Zero Day was here. Get out of here.
Starting point is 01:38:25 So that could have been anything. Yeah. That could have been a malicious command. That could have been a virus that it downloaded. That could have been anything that I wanted it to be. And I have now remote control over this cable that if I plug right into my phone, watch, plug it into my phone. Charges.
Starting point is 01:38:40 Charging. You would have no idea that this implant is in your house just because there's a Wi-Fi in here and and more there's more in there I'm just simplifying it so this is like a smaller computer yeah and it weighs the same looks the same feels the same you would never know that that thing is extremely dangerous and you did so this is used for an ethical person to do a penetration test on a company What does an unethical hacker do with that tool right there an unethical hacker can use this tool to steal people's credentials?
Starting point is 01:39:12 to monitor and you know just to spy on people to Look through your webcam to to try to get access to your network to your phone to what you know They they're gonna do it for you know They got the criminals do bad things and ethical hackers going to try to access your computer to access other computers to try to take over your company so that you can show where the weaknesses are so you can make it better so it's essentially the same concepts though but one has a good goal in mind the other one has you know screwing someone over in mind $20,000 and they say you used to use it now $200.
Starting point is 01:39:48 Yeah, and that's just for one cable. I can show you all of them if you want to see them all. Same exact type of a cable. Yeah, they just look like a real cable. And I got a real funny one actually. So the way that I would recommend protecting yourself from this would be with what's called a data blocker. So a data blocker is something like this. I'll show you. Okay, so here's here is there's two things here I want to show you. So you can buy a data blocker for about $5 on Amazon, you can plug any USB device into it, and it's only going to limit it to charging so that even if it is a malicious cable it can't be abused. This, this is funny, so this was kind of a joke that my friend
Starting point is 01:40:30 he made this but it's a product he sells. It's a data blocker called the unblocker that blocks these attacks but also has payloads in it to do the same thing. So it's a USB data blocker and looks just like one but also does what you just saw it allows you to inject Wireless keystrokes and monitor keys, etc. So that is for what that is for somebody to protect themselves against what somebody could do Yeah, and that's how much five bucks. No, this this one's like 150 bucks. That's 150 bucks. Yeah, this is who needs that I mean, I don't think you need it I think it's just it's safer to use a real data blocker, pay five, ten dollars on Amazon for one. This one's more of just a joke, like
Starting point is 01:41:10 here's a data blocker that I'll swap yours out with and then I can then I can inject payloads through your data blocker. Is that like an RFID or no? That's different. No, it's different. I'll show you that in a second actually. And this is the malicious cable detector, which is his other thing. And I feel like I'm promoting the crap out of him right now. I'm sure he's appreciating. I'm sure he's getting a lot of business right now. Well, I hope so. But he's such a nice guy. He was a help desk guy that ended up doing extremely cool things in the hacking world. But this is a malicious cable detector that
Starting point is 01:41:41 he also sells, that if you want to be extra overboard, you can buy, plug it into this, and it'll tell you if it's a malicious cable detector that he also sells that if you want to be extra overboard You can buy plug it into this and it'll tell you if it's a malicious cable or not Got it. Got it. So yeah, let me put these back, but I want to show you one more I'm sorry one more thing that you know to worry about something you can check at home that is a Kind of an interesting concept. So you got a girlfriend? Yeah, so with your girl, I mean you probably know everything she's doing so you'd be surprised I A lot of people think that a lot of people think that having having a girlfriend
Starting point is 01:42:16 And having the ability to go through her stuff basically whenever I wanted to I'm gonna take that you really could I mean you can Find out everything she's doing I could but I Don't and I haven't done that, you know almost I've done it maybe when I was younger a few times, but As an adult I realized that no matter who you are You're gonna find something you don't like no matter what whether it be a smile I'm not a jealous guy by any means, but you're gonna find a smiley face here or there You're gonna find a heart emoji here It's like do I want to piss myself off for no reason? So I just don't.
Starting point is 01:42:45 I don't look. If they're going to cheat, they're going to cheat on you regardless of what you tell them they're going to do or tell them what you want them to do, who they can and who they can talk to. Don't even try. They're going to cheat on you or they're not going to cheat on you. So that's just my mentality. Good for you.
Starting point is 01:42:58 And so what is that? Do you get those Ritz cheese crispies because that's like your... Yeah, we're going to those Ritz cheese crispies because that's like your... This one? Yeah, we're gonna promote Ritz on the... Look at this point! I'm sitting down with the greatest salesman of all time. We got Ritz cheese crackers here at the TBD podcast. But yeah, I don't know, I just was hungry. I brought these. I thought you were gonna do something with that. I'm like, so you brought Ritz. No, I was just hungry.
Starting point is 01:43:23 My kids would be running here right now if that was you. You'd become their best friend. I love Ritz bits, but my mouth is so dry, those things would probably kill me right now. But screen crab, this thing, this one's an interesting one. So the cameras aren't set up in a way for me to demonstrate it, but check this out. So you can probably
Starting point is 01:43:51 Gosh it's in there. Okay, so this device you see on one side it has USB-C. Yep, what you could do USB-C to USB-A Which is just this little square USB and then HDMI HDMI and then it also has a little antenna Okay, right. You don't need the antenna It also has one other thing here for an SD card, which you can fit right here with, you could put two terabytes in this thing, or a terabyte, a lot of storage. Put your HDMI in, put your power in.
Starting point is 01:44:16 Every TV, every monitor, for the most part, is gonna have a USB port. So get a small USB port, a small HDMI, put this in the back of a computer screen or the back of a computer desktop, and you could even put a little post-it note saying like, HDMI enhancer or do not remove or IT only, like something that, you know, would scare somebody from unplugging it. And this thing can wirelessly, from quite some distance, transmit with almost no delay in high quality what's going on on the screen.
Starting point is 01:44:49 And if you're not within proximity, let's say you go out of the proximity of this antenna, it stores all of that footage on the SD card, which could be, from what I was actually told by a friend, years, depending on the interval of how often it's taking snapshots. So, check behind your screens, check behind your computers, look for a device like this, which is like a man in the middle type of device that is capturing your screen. And, you know, there's so much more out there to be scared of, but this is something that you could easily check.
Starting point is 01:45:21 If it's there, unplug it and throw it in the trash, call the police, do whatever you got to do. So that's going to record everything you're doing on your screen? Yes, in high quality too. And how much is that? I don't know. What's the most expensive tool he's got that he's selling? These are all different people.
Starting point is 01:45:39 What's the most expensive tool out of all these tools that you know that you know most expensive one I have with me right now is this one because it's just enterprise enterprise 800 bucks but what else what's something that's astronomical but it's what it does is ridiculous I would say I can't give you all the specifics on how it works but the cell cell bright which is how they you know some phones are dumped. They're very expensive. Like dumped for all the data that's on them. And they're usually for criminals and traffickers and pedophiles.
Starting point is 01:46:11 Cellebrite is a very... Cellebrite or celebrite? Celebrite. That one right there? Yeah, celebrate. And how much would that be? They range, I think, from 20 to 50,000. I don't know, I don't want to give you a false number.
Starting point is 01:46:25 So some wild number. Dr. Abbasi So I'm assuming when you're going through stuff like this, you probably have some guys that reach out to you. I know I heard about a story with you and James O'Keefe where Project Veritas reached out to you. How did that end up with the story? Dr. Bensky So James O'Keefe himself did not reach out to me.
Starting point is 01:46:44 He was already gone, I guess, by that point. I didn't know anything about Project Veritas. I did see a momentary clip of them with the previous story that they had, but I didn't know anything about them. I'm not a big politics guy. I don't know much about... I just don't know. It's just not my thing.
Starting point is 01:47:01 So, I seen them just passing around the internet, but whatever the case is, they, going back to what we were saying earlier, I went on a small podcast with, well, I think a guy you know named Gerard, and Gerard questioned me. He said, why did you get involved in this? Same question you asked me, what piqued your interest, right?
Starting point is 01:47:21 So I answered that question, talking about these screenshots from my friend's wife and then much more, and that clip gets 10 over 10 million views overnight and now all of the media all kinds of people want to know the full story and it's like okay I had to be force-fed to the public for people to take action on this but the first person that reached out that had some type of credibility at least on the outside of what it appeared to be was project Veritas. I didn't know anything about them.
Starting point is 01:47:45 I just saw they had a lot of followers. So you've never heard of them before until they reach out to you. Right. Okay. Yeah, I mean other than I remember their logo from a video, but that's it. Got it. I don't know any of their inner dynamics. You're not really a political guy. You're not in that world, you know, where politics is something you're interested in. Not at all. Okay. Yeah. Yeah, so I didn't even know who James O'Keefe was. interested in? Not at all. Okay. Yeah. So I didn't even know who James O'Keefe was.
Starting point is 01:48:05 So Project Veritas reaches out and they said, we'll come to Florida within 24 hours. We'll come by tomorrow and we want that data. We want to investigate it. And I was like, okay, great. So Project Veritas jumps on a plane. They come to Florida. They take the data from me. And they actually did commit to their word.
Starting point is 01:48:22 So what happened was, is they grabbed the data. There was a lot of people on their team, I would say, at least bare minimum, there was six working at all times, going through each user individually, identifying who they were, and then confronting these people in real life, showing up where they were at with cameras, confronting them for being on this website.
Starting point is 01:48:42 And that was going incredible. I was like, OK, I finally have a group of people that are taking it seriously. These people are going to get exposed. They're going to prison. This is awesome. So a couple of weeks later, I go on The Sean Ryan Show, which he's an awesome guy.
Starting point is 01:48:57 Sean Ryan is an incredible guy. Very good at what he does. Yeah, yeah, and such a nice, kindhearted, intelligent man. And same thing with Sean Ryan. I've never seen a podcast of his. I didn't even know who he was. He's very good at what he does. I love him.
Starting point is 01:49:10 I love him. He's a great guy. And I was willing to go on his podcast, but the way that it was structured was Project Baritas was going to do their release, which was catching one of the predators from that database, which they did. They released their first video, which was... It went OK for them, but not great,
Starting point is 01:49:31 because they were getting a lot of hate at the time for James O'Keefe. Sean Ryan then released early, because he made an agreement with Project Barrett House that they were going to have their second release after I went on The Sean Ryan Show. Well, they had an interim CEO come in, her name was Hannah, who then got on the phone with me and told me that she's looking for more of a tsunami and this is not something that they want to continue with.
Starting point is 01:49:55 So after identifying over 500 pedophiles, and in a huge database of pedophiles, so there was way more work to do, way more people to confront, this interim CEO shuts it down, huge database of pedophiles, but so there was way more work to do, way more people to confront. This interim CEO shuts it down, and then the Sean Ryan show, I end it by saying, you know, we're going to be releasing more information, basically, and it never happens because the interim CEO shut it down. So all of that investigatory work that was done by all of the people at Project Veritas,
Starting point is 01:50:21 it was for almost nothing, which was sad to see because those people really tried hard and I respect them how much time did they put into it with you I mean a lot of time I mean I would say there's 500 of them and they didn't want to do anything with 500 they confronted a few of them in real life yeah but after I got shut down by that interim CEO no no and is that interim CEO still there or no? I don't know. I would check if I'm kind of curious. Her name was Hannah.
Starting point is 01:50:51 Project Veritas CEO Hannah Jowes quits. The chief executive of Project Veritas said Monday she stepped down from a role at Project Veritas. So who is Project Veritas' strong evidence of past illegality is interesting. I don't know this person. I don't know what she's done. Yeah, I've never met her in person. I just talked to her on the phone once and she told me that the story was not a tidal wave. But what I would say back to Hannah now, if she was watching this show, is, well, there's about two billion views on the internet to say otherwise.
Starting point is 01:51:26 And she should have taken the story seriously because it would have not only helped Project Veritas and the brand at the time, but the more important part is it would have helped a ton of people. What brand was that? Project Veritas. Like, they were getting so much hate at that time for the owner, James O'Keefe, leaving or getting fired or whatever really happened. This would have been a perfect opportunity for them to restore their name and do something
Starting point is 01:51:52 good in the meantime. And she just shut it down because she didn't believe in it for whatever reason. After she stepped down, did anybody else ever reach out to you? Have you talked to anybody else or no? Yeah. So some of the reporters that would, like I have no problem with the reporters that helped me out. There was a few of them guys that really seemed to care and were very furious that they couldn't
Starting point is 01:52:11 do anything about it. They actually moved on. Some of them worked for the Crowder Show, now the Steven Crowder. They moved, they've kind of jumped all over the place, but them guys really cared about this project, especially when they saw how many children were on the site. Because remember, four-year-old data, approximately, some of these kids were 16 that we can now identify now. We see they're 18, 19, so they must have been children when they were members, and they
Starting point is 01:52:35 were claiming to be kids at that time. So they were selling their bodies to adults for money on this website and much more. Why do you think she didn't go live with it? I wish I could tell you. I don't know. It's not a tidal wave with her words. That's not a tidal wave? I mean, I don't understand why.
Starting point is 01:52:52 I mean, I remember the exact time when she told you it's not a tidal wave. I wonder how much previous, what the timeline was prior to her stepping down. Would you know the month-ish? Oh, when did she step down? December of 23. December of 23. December of 23. That would have been, so May 8th is when the Sean Ryan show released. I remember that because Pentester got a ton of traffic at that time. So she must, I mean the Sean Ryan show being released and then
Starting point is 01:53:19 that thing blew up pretty quick. So it would have been right around that time. So May, so it's seven months later because December 11th when she stepped down. Yeah, something like that. Yeah. Yeah. Well, she's gonna see this. No, I mean, Hannah, I don't get it, but you know, it is what it is that the situation is being handled regardless. It's not like it got thrown away. Just Project Veritas wasn't the group that was able to solve it or investigate it further. I had to take other avenues, which thankfully I'm capable of doing now. But I didn't have the ability to do what I'm doing now prior to force, like I said, force-feeding the public, which I didn't even mean to do either. It just happened that way. Well, no, you're everywhere. I mean, at this point
Starting point is 01:54:03 there's nothing you can do about it You're everywhere and we see videos of you 20 million 25 million 30 million then you have so many clips that have gone all over The place but let me ask a different question. So one of the things you showed a tool Was that you can intercept where planes are going and traffic and you said that's legal you can do that, right? However, you said you also have the ability to influence it, which that's illegal, right? Transmitting on that ADS-B is illegal. Illegal, okay.
Starting point is 01:54:32 So we saw three months ago, or a couple months ago, President Trump assassination attempt on him. I say three months ago, Rob, it feels like three months. I don't think it was three months ago. What was the date, July 13th or? July 13th. Okay, so we're talking about, it's only five weeks. It's as if it was a year ago, right, that no one's talking about. So July 13th assassination attempt on the president. They missed him half an inch away. We're having a different conversation today on who's running
Starting point is 01:54:59 for president on the conservative side. We know what happened on the left. It could have stayed Joe Biden, but we would know who's going to be running on the conservative side. We know what happened on the left. It could have stayed Joe Biden, but we would know who's going to be running on the conservative side. He's had to have emergency landings being made. I think he had to do one, Rob, if I'm not mistaken. I think even JD Vance had to do one last week. Is there tools that if somebody was really wanting to do something to manipulate with a plane and a Boeing plane, is there tools to be able to hack into planes or no? Yeah, well, I mean, these planes are very old. I'm not saying that that one device that I've showed online is capable of redirecting a Boeing 757 or whatever, but, you know, I wouldn't play around either. You know, I wouldn't be transmitting radio while I'm in a plane
Starting point is 01:55:43 trying to mess with the pilot's controls or their radio. But yeah, it would be unreasonable to think that it's not a possibility with the... Think of how old these airplanes are that are flying around. If you look at the average age of even an American... Like name the airline, other than Spirit and Frontier, because they got brand new planes for whatever reason, These planes are 20 plus years old. Well, his plane is 33 years old. Yeah, I mean... His first flight is 91, May 21st, 91. Of course, technology can be upgraded, so who knows what the status is.
Starting point is 01:56:14 When it comes down to plane, it's slightly different because what you're doing is upgrading the engine. Sometimes the engines cost $750,000 to a million and a half, depending on the size of the plane or what it is. Some can go even higher. And then on the inside, you just want to fix up the place. It's like rebuilding a house, right? And then the tube is the tube.
Starting point is 01:56:31 It's not like you need to do anything with the tube. And then tires, just like cars, tires, you can adjust them. But technology is different. If the board is the same technology as it was in 1991, now you've got a problem there. Oh yeah, I would say so. Well then, how about we flip it? Let's say Trump is your uncle. You love the guy, okay?
Starting point is 01:56:53 And you want to do anything because you have a good relationship with the guy, you want to protect him. You've got all these tools you've got access to. What would you do to make sure nothing, to minimize the level of threats that he's going to have? I would probably obviously vet the people around them. Like if you mean him being on a plane. Equipment wise. I'm talking purely equipment wise on a plane. On a plane? I mean you can't, there's not too much that you can do other than monitor.
Starting point is 01:57:19 Like if I could monitor for people trying to mess with things, but I can't. So you could monitor somebody trying trying to mess with things, but I can't. So you could monitor somebody trying to hack into the plane? Depending on if it's wireless. If it's not wireless, then no. I mean, I would have to have access to the actual plane itself and know how the plane works and I don't know how Boeing works electronically for me to determine if somebody was hacking or not.
Starting point is 01:57:48 If I was in that scenario, to answer your question, if he was my uncle or someone I cared about deeply, I would figure it out. But I don't know enough to give you an answer in depth. For a guy like you that's a hacker and you know he's got a lot of people that are enemies of his that don't like him, does that at all cross your mind? Were you concerned about that with plane? Right now today, for me to come to you today to do the interview, I was in Tampa. I went to Tampa this morning at 7.45, 8 a.m.
Starting point is 01:58:14 I did the business that I needed to do, got on a plane, flew back. The worst, probably top three worst flight I've ever been on, and I've been on a thousand flights in the last 25 years. Okay? One of the top five worst flights ever, you know, with turbulence. It was very bad. Like people were about to throw up and it was choppy coming in, right? Okay, now that's turbulence, right?
Starting point is 01:58:40 It wasn't like it was somebody was manipulating with it. It's weather, it was bad coming in, it's Florida, it's a little bit weird. It's a 30-minute flight. Whenever you have a 30-minute flight, the problem with a 30-minute flight is your elevation doesn't go that high, so you always stay in the middle, and in the middle you're right in between the clouds. And so it's too many issues to cause it to be that bad. But for you, as a hacker, and you're in the community of other people that are in it,
Starting point is 01:59:05 does the idea of somebody being able to attack it from this angle at all concern you, or not really? No, not at the moment. No. No, I think that anything is possible, but my main concerns have been a little bit different. I'm not super educated on the security around around airplanes You're not you're not that On what the planes like I don't know what type of software they're running or how they're but you could figure it out If you wanted yes
Starting point is 01:59:34 Okay, but you're not too worried about it. No, not at the moment. No, it's not a priority of yours So maybe what we need to do is send you to ancestry to see if Trump is an uncle of yours for you to start Caring, you know for you do, you know, hey if they want to hire me to check out their planes, I'll learn it I'll figure it out. That's a different story. Got it. Okay Do you aside from this being your world and this being your interest what other interests you have like do you study history? Do you are you do you study spies? Do you study like different secret intelligence? Do you study anything like that you study different secret intelligence? Do you study anything like that?
Starting point is 02:00:06 What interests do you have? It's actually quite surprising. So computers, hacking, protecting kids, and business is my main priorities. But when I'm not doing that, I love fast cars. I love dirt bikes. I love go-karts. I like drifting. So I build my own drift trikeskes like three-wheel drift trikes
Starting point is 02:00:28 I'm kind of like a hybrid nerd, you know I like computers, but I also like the cool quote-unquote cool kids stuff the cool kids stuff I know there's got a nice watch on and thank you. You like the nice cars my kids right now We went to you know, the biggest Ferrari dealership in the world is down the street here I don't know if you've been to it or not. I have been to it. Okay My kids right now, we went to the biggest Ferrari dealership in the world is down the street here. I don't know if you've been to it or not. I have been to it. I went to it with my friend Dr. Teresa.
Starting point is 02:00:50 She loves cars as well. Dr. Teresa? Yeah. She likes nice cars. Yep. Well, good for Dr. Teresa. Did she buy anything or no? No.
Starting point is 02:01:00 So have you been there lately? It's been a long time. So what do you like? Are you a Ferrari or a Lambo guy? Lambo guy. Okay. You know what you would look good in? An orange Lambo with black wheels.
Starting point is 02:01:12 It's not like, it's not like Nostradamus. I don't know, I think it's just this stuff that you're teaching, you know, sharing, some's happening to me and I'm able to kind of predict the future that a car like that, by the way, I think I had the same exact car, just so you know that. Like literally, I think at the end. If you type in Patrick B. David Orange Lamborghini, if the picture comes up, I swear to God, I'm going to crack up. Patrick B. David Orange Lamborghini.
Starting point is 02:01:40 Let's see if it'll come up. Zoom in. Just go to images. Go to images right there. There should be one. There it is. Let's see if it'll come up zoom in just go to images go to images right there There should be one there it is. Oh, that is literally the same car. That's it No way, you can you're gonna love the car is what I'm saying I have a feeling you're gonna love it anyways at this for Lauderdale dealership. They have That SP ones
Starting point is 02:02:03 That SP tools. I don't know if you're familiar with the Monza a little bit. They have SP1s, they have SP2s, I don't know if you're familiar with the Monza. A little bit. They have an SP3, they got a LaFerrari, and I think they got an Enzo. They got a very, very nice collection here. The LaFerrari's are crazy. If you like it, they got all of that right now if you're that crazy into it. So question on a couple things, because when I think about hacking, I think about the world you're in. I pulled up a couple things. I'm curious how much hacking I think about the world you're in I pulled up a couple things
Starting point is 02:02:25 I'm curious in how much of the stuff like this you're even into have you ever studied the Franklin child prostitution allegations or no? No, you don't know much about that. No, okay. How familiar are you with the promised? software with Robert Maxwell the promise software Robert Maxwell that was sold To other countries that was so advanced I mean it definitely rings a bell but I don't know it so I don't think I know much about it got it yeah and whatever reason and studying spies and things like that that's not you you're not and you're not so you have fairly simple guys said from this kind of stuff yeah a lot more simple than
Starting point is 02:03:03 people think yeah I mean I thought you're gonna be somebody that's a but you know what it is It's not one of those are actually type of guys. Yeah, you're not that guy. No, well, I'm kind of grateful You're not it's better to be just the way you are because just the way you are is Positively impact in a world which is great to see and and again for Parents who are watching this and you're asking yourself, I got a lot of questions for a guy like this on how to be careful with the stuff that's going on. He's also on Manect. You can ask him any question you want on Manect and he will get back to
Starting point is 02:03:35 you as well as some of you guys that are business owners who have some questions for him to want to maybe do a penetration test or find out what other things that he's doing. You can also set up a call, ask him a question. He's also on the neck. Ryan, this has been a blast. I appreciate you for coming here. I will give you the last thoughts on what you want to tell the audience before we wrap up.
Starting point is 02:03:54 Thank you. And it was an absolute pleasure. I was super nervous coming onto the show. And I know I missed a ton of things, but I hope that I was able to educate people at least a little bit. And I want to make, you know, obviously I'm on Manect. You can reach out to me. You can reach out to me on other socials.
Starting point is 02:04:10 I go by a different name, 0-D-A-Y, like the digit zero, not the word zero. Zero day. So feel free to reach out. But Manect, for your podcast and for your business as well, right? Yeah. So thank you very much for having me on the show. Thank you for everything that you're doing. And yeah, stay safe, everyone. Oh, man.
Starting point is 02:04:32 Appreciate you. Well, hey, guys. My name is Ryan Montgomery, also known as Zero Day. I'm proud to be part of the app Manect. If you have any questions regarding child safety, cybersecurity, or even any of the gadgets that you see me use all over the internet, feel free to reach out.
Starting point is 02:04:46 I'd be happy to help you with any questions or concerns you may have. Stay safe.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.