Shawn Ryan Show - #56 Ryan Montgomery - #1 Ethical Hacker Who Hunts Child Predators Catches One Live On Podcast

Episode Date: May 8, 2023

1 in 5 children in the United States will be sexually exploited online. Every 9 minutes, Child Protective Services finds evidence of child sexual abuse. 93% of victims know the perpetrator. These are ...horrifying and sobering statistics that drove the Shawn Ryan Show to expose this topic–this is where Ryan Montgomery comes in. Ryan is the #1 "ethical hacker" in the world and it's a title he's earned by infiltrating websites that host child exploitation and exposing the predators that run rampant there. Ryan takes us into the underbelly of this dark-web hidden world and lights it up in real time. During the filming of this show, Ryan ran a mini-sting operation from his laptop in a chatroom, posing as a teen–it took less than 60 seconds for a predator to take the bait. This episode is a cold, hard look at the pervasive problem that is child exploitation. Although it's difficult to stomach, we do believe that this episode will educate parents and save thousands of children. Ryan has dedicated his life to saving human life via his treatment center for those with addiction and by forcing this vile topic into the light. We are honored to share his message. Shawn Ryan Show Sponsors: https://hvmn.com - USE CODE "SHAWN" https://moinkbox.com/shawn https://LearShawn.com | Call 800-741-0551 Information contained within Lear Capital’s website is for general educational purposes and is not investment, tax, or legal advice. Past performance may not be indicative of future results. Consult with your tax attorney or financial professional before making an investment decision. https://mudwtr.com/shawn - USE CODE "SHAWNMUD" https://blackbuffalo.com - USE CODE "SRS" Ryan Montgomery Links: https://pentester.com https://www.instagram.com/0day https://www.youtube.com/@561predcatchers Please leave us a review on Apple & Spotify Podcasts. Vigilance Elite/Shawn Ryan Links: Website | Patreon | TikTok | Instagram Learn more about your ad choices. Visit podcastchoices.com/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 This episode is brought to you by Sold the Genero. As Sold the Genero, touch isn't just for screens. Physical connection is so essential to how we communicate, it's infused in everything we offer. Since so irresistible, PDA is guaranteed. Textures are so luscious, skin is huggable. Get into a Sold the Genero state of mind. Receive 10% off on your first order on Sold the Genero.com.
Starting point is 00:00:24 Plus free shipping with the code Soldagenero10. This episode is brought to you by RedboxRx. Get extension-like lashes without the work with RedboxRx. They'll help provide a prescription for BermataProst, a medically proven eyelash serum with the same FDA-approved active ingredient as Lateez. You could see longer, thicker, darker eyelashes in just eight weeks, and at Redbox RX, it's only $11.40 a week. You won't find a cheaper price online.
Starting point is 00:00:52 Take a free assessment today and use the code Spotify for 10% off at redboxrx.com. This is the most evil, the most disturbing in the darkest episode we have ever released on the Sean Ryan show. It has to do with predators who are praying sexually on children. Ryan Montgomery, the number one ranked ethical hacker in the world has dedicated his life to hacking into these websites and exposing the predators who are praying on our children to the world.
Starting point is 00:01:40 And he has thousands and thousands of names now that he's releasing. This is gonna save a lot of kids. And I want you to share this with everybody you know, the public needs to be informed of this. And here's how the kids are gonna be saved because everybody says, oh, share my stuff, right? Here's how they'll be saved. Every parent that watches this will smarten up on what their kids doing on the internet.
Starting point is 00:02:13 Every kid that watches this is going to smarten up and become aware of how prevalent this stuff is on the internet. And every one of you predators is on the internet. And every one of you predators that's watching this, it's going to put the fear of God into you because when you're caught, you will be humiliated and hopefully in prison. That's how this is going to save these kids. People are going to smarten up, they're going to realize this is everywhere, this is on every social media platform, every chat room, everywhere you go on the internet, these people are hanging out. And unfortunately, we have to fight censorship here because here's one thing, these predators
Starting point is 00:03:00 have a lot of powerful people throughout the world and government and Hollywood all over the place that are sticking up for this community. So we've done everything we possibly can to avoid censorship. We have demonetized it ourselves. This isn't about money, this isn't about advertising, this is about saving kids, and that's it. So we've demonetized the video ourselves, we've pulled footage, we've bleeped every bad word on this video in hopes that it does not get censored, because the masses and the people need to watch this now. This is a battle between good and evil, and I can tell you right now, good is losing. Unless people like you start to stand up and get loud about this subject. This isn't about politics.
Starting point is 00:04:03 This isn't even about the country. This is about kids all over the world. This is happening. Please pay attention and share this with everyone you know. If you wanna see the unedited stuff, it'll be on my Patreon and it will be on Rumble in a few days. and it will be on rumble in a few days.
Starting point is 00:04:30 In Patreon, like I said, we demonetize this one, you, you alone, are who's making this possible. So thank you for the support, because if it wasn't for you, this wouldn't be happening. With that being said, I want to just say Brian Montgomery, I'm real proud to know you, man, and it was a real honor to have you in here and get this interview and educate the world on what you're doing and how these predators are reaching our kids, and it's an honor to be your friend. Thank you. educate the world on what you're doing and how these predators are reaching our kids. And it's an honor to be your friend.
Starting point is 00:05:08 Thank you. One last thing. If you did get anything out of this, please take ten seconds out of your day and go to Spotify and go to Apple Podcasts and leave us a review and tell us what you got out of this. That helps the algorithm push these episodes farther and get more reach. And this is a subject everybody needs to hear. Thank you.
Starting point is 00:05:38 Ryan Montgomery, welcome to the Sean Ryan show, Van. Thank you for having me. It's an honor to have you. So I found you, I found a, maybe a 30-second short on Instagram, and we'll get into that later of you exposing, I believe it was a father who was exploiting his daughter in a bathtub. You would hack in and exploited that. And so I reached out thinking,
Starting point is 00:06:07 there's no way in hell this guy's gonna give me the time of day because it doesn't look like you're very active on the on the gram and then, and then I got you. Yeah, so I'm like, I'm just super excited to be here interviewing you right now. Did you or just you are doing amazing things, saving, who knows how many kids. You know, I mean, if you think of the impact
Starting point is 00:06:30 of what you're doing, you know, and we'll get into it, you'll never know the full impact of how many kids that you've saved. By kids smartening up about what they're doing online, parents smartening up about what their kids are doing online, and these pedophiles, you're gonna put the fear of God in them. Oh, for sure. And so that's the goal.
Starting point is 00:06:52 There's gonna be less of them praying on these kids. So anyways, we'll get into all that stuff. I just wanted to say how excited I am. Likewise, I'm very excited to be here and it means the world to me and especially the reach that you have, the amount of parents that will be educated based on some of the stuff that we talk about here,
Starting point is 00:07:18 even if we save one kid, it's worth it. Yes. So let me give you a little bit of an intro here. You're the number one ranked ethical hacker in the world. You're a serial entrepreneur, cybersecurity, professional, and now a child safety warrior with your company, 561 PC. Oh, not my company. 561 PC is not a company.
Starting point is 00:07:39 My company is actually Pentaster, which is a cybersecurity company, PENTESTER.com. 5-6-1-PC is an organization that I created with my friend Dustin Lamprose, or Scrappie's, a professional MMA fighter. We'll get into that soon. And your goal, protecting children and trying to make South Florida and the world a better place by catching one child predator at a time. That's a damn good goal. You go by zero day on Instagram. You're like a modern day vigilante.
Starting point is 00:08:13 Just some stuff about your hacking life. Zero day code for discovered security vulnerability with zero days to fix the flaw. That's the meaning of it. 19 plus years hacking, your self-taught, no college, no formal education. You claim to have imposter syndrome. You mentor and teach others on how to learn this trade. You've made money from working with Amazon, PayPal, and Facebook, and you say that hacking is the best decision
Starting point is 00:08:46 you've ever made in your life. Sometimes you hack up to 10 hours a day. Yeah, yeah, or more, but working with some of those big companies there would be through Bunk Bounty programs. I don't know if you're familiar with them. I'm not. That was prior to us starting Pentastry.com,
Starting point is 00:09:03 which is a cybersecurity platform for small, medium-sized businesses at the moment, to make sure that they're safe online, to check for data leaks, to check where your face, where your identity is being broadcasted all over the internet, which goes hand in hand with what we're doing with predators.
Starting point is 00:09:23 And the, sorry, I'm got mixed up there. It's all good. While you're thinking, every guest that comes on the show gets a gift. Mm-hmm. Thank you very much. Oh wow. There you go, go ahead, open it up.
Starting point is 00:09:41 Got vigilance, earn a vigilance elite, gummy bears. That's right, made in the USA, legal in all 50 states. Gummy bear. Right now. Yeah. And wow, how did you find out about this? We researched you.
Starting point is 00:10:00 So I know you love rich cheese crackers. You eat what is chicken tenders every day at noon at Burger King and Campbell soup every night for you. I quit the burger king. I now I'm on the Chick-fil-A. At 12.30. I do eat Ritz Bitz cheese crackers. Every single day I can Campbell's Chicken Noodles Soup.
Starting point is 00:10:27 Actually, I walked two miles last night to Walmart. I could at Uber, but I walked two miles last night to Walmart to get one single can of Campbell's Chicken Noodles Soup. And I didn't realize there was a microwave in the hotel room, so I even contemplated putting the metal can on the iron to heat it up. So that I could eat it last night. So I even contemplated putting the metal can on the iron to heat it up so that
Starting point is 00:10:46 I could eat it last night. You got two miles for a can of Campbell soup. Yeah, for a night and I said can of Campbell soup. Yep, incredible. Well, if you come here again, I'll have that wait in your hotel room for you. That's all right. But So moving on in the interview, you have a interesting childhood it sounds like overcoming addiction. I wanna get into your childhood,
Starting point is 00:11:12 how you got into hacking. Some of the stuff we can do to protect ourselves from hackers, what hackers are capable of. And then the second half of the interview, I wanna get into all the stuff you're doing, catching these predators. I think that that's very interesting. This is going to be one of the most informative interviews I've ever done. But, um, keeping it light right off the bat. How did you get, how did you get involved with Facebook and Amazon and who is the PayPal? Okay. so that was actually what I was thinking about prior to you giving me the awesome gifts.
Starting point is 00:11:47 What a bug bounty program is. So I don't personally own a bug bounty program, but I work with a team of hackers that we all work together on projects. To do that legally, there's things called bug bounties. So companies like Amazon, Facebook, YouTube, Netflix, all the huge companies out there, they offer a monetary value for a bug or a vulnerability that's found in their site. So what I mean by help protect these large organizations,
Starting point is 00:12:22 it is through their bug bounty program. They may not be a direct client of the company or some of them maybe, you know, but can't really talk about that publicly. But yes, I've helped protect all of the above. So basically, this is like some type of a Red Cell program where you try to penetrate these big tech companies and then they basically give you a reward if you reveal how you did it. Right, so you have to reveal how you did it. So let's say it's an informational bug. An informational bug could be, you forgot that a page exists and it shows some of your employee's information. So that may be informational, if it doesn't impact anything further than that.
Starting point is 00:13:10 Whereas something very critical, like I could get access to your server or all the credit cards or all your clients attached to your company, that would be a critical vulnerability. And these companies are willing to pay depending on the severity of that vulnerability. So Apple, for example, if you were able to take over an iPhone, they'll pay you a million dollars for something like that. They'll pay you a million dollars. Yeah, a million dollars for it,
Starting point is 00:13:34 what they call it a zero click exploit, meaning I can send you something that you won't even know happened and I have full access to your phone, million dollar bug bounty. Have you done that before? No, I haven't personally found any bugs in the new iPhones, but if I did, I'd be sure to report it to Apple. So, if you don't mind me asking, what's the biggest bounty you've collected
Starting point is 00:13:57 and what was it for? I can't tell you what it was for, but I could tell you because there's the closures and there's non-disclosures. So I can't disclose the company or what the vulnerability was, but it was for over, it was $128,000 in credit on a platform. I chose that over the cash. Really? So these are good-sized bounties.
Starting point is 00:14:22 Yeah. How many bounties have he collected? I don't know, quite a bit. 100, 200. If you combine my team, hundreds. Hundreds. Yeah, but that isn't what I focus on anymore. I focus on the cybersecurity business,
Starting point is 00:14:41 which is all software, and that's a lot more guaranteed, whereas bug bounty, there's nothing against people that do bug bounties, but it's not guaranteed revenue or income. You have to just keep taking shots at companies trying to find something and hope that you get paid, where there's no stability in that. There's bug bounty hunters that make a million dollars, two million dollars a year, but then the next year maybe they make 10 grand or less. So they spend six months on one project
Starting point is 00:15:13 and they make zero dollars. It's not sustainable for me. So I started a company with my business partners, Rick, Sean and Dan, and like I said, it's called pentester.com. It's very simple. You just go to the site, you put in the name of your website,
Starting point is 00:15:30 you press scan, and it does a preliminary scan, tells you what, you know, basically, if you have any, like, low hanging fruit vulnerabilities, and leaks, you know, like passwords associated with your emails or your employees. And you can sign up for an account and do a more invasive scan that will give you a lot more information. Interesting. Interesting. Well, let's dive into your childhood.
Starting point is 00:15:57 Sure. Where'd you grow up? I grew up right outside of West Philadelphia in Delaware County, Pennsylvania. And I, yeah, I live there most of my life. What are you into as a kid? For the most part, I was a normal kid. But after eighth grade or so, I started to meet the wrong people. And I was in the wrong places, doing the wrong things. I met some people that were on drugs that were a little older than me. I started to adapt.
Starting point is 00:16:34 I started to go to these, at that time, there was a rape scene in Philadelphia. I really liked that. I loved going to the raves and doing drugs, you know, and acting like a nut, you know. And I was just a young kid that nobody knew that I, and I never told anybody my age back then. I, to be honest with you, I was lying to people about my age back then. And those raves turned into getting, you know, doing ecstasy and other types of drugs out the raves. And I found out over time that I didn't really like the raves as much as I like the drugs.
Starting point is 00:17:14 And then I figured out that when I took something to come down from the ecstasy that I actually liked when I was coming down from the ecstasy with more than I like the ecstasy. Really? Yeah, which was opiates, and that turned into a bigger problem. Yeah, that can turn into a massive problem. Did you?
Starting point is 00:17:34 Did you think you were full on addict? At the time, yeah, I was in full belief that I was a drug addict. I was physically withdrawing from opiates at one point in my life. So yeah, I had every reason to believe that I was. And I don't know how far you want to go into it at this point, but there was a time where I realized that I went through a bad phase as a child. But I do know that addiction exists. I have a lot of it in my family, especially in my dad's side.
Starting point is 00:18:05 And I did some things to combat that, you know, because of those reasons. But, me personally, I haven't used drugs or alcohol in a very long time, since I was a child pretty much. And no drugs. Just, but I wouldn't say that I'm in recovery either. I just, I kind of moved away from that. What was the family life like?
Starting point is 00:18:27 Good family life. You close with your parents. So I was, I'm very close with my mom. My grandfather passed away a few years ago, and he was like a father to me. He raised me, you know, the best father I could have asked for. I wouldn't know what a father's like without him. And he passed a few years ago, and it was very rough,
Starting point is 00:18:50 but I was blessed to be there. I was with him when he passed. And he had a great life, and it was a great man. My mom, my mom, is absolutely fantastic. I've been supportive with me, even at my absolute worst. And I put her through hell. And as for my dad, he's been in and out of my life. During this interview, while we speak right now,
Starting point is 00:19:17 he is currently in jail for something stupid this time. It was, you know, drinking, I think he had an open container of alcohol and he stole some stuff from Coles. But, you know, my dad and I, you know, I have some step brothers and sisters that I love and he, when he's messed up on drugs in alcohol, he's not the best dad.
Starting point is 00:19:40 So, we, you know, we go on and off talking to each other. So, from what I understand, you're a high school dropout. I am, yeah. What grade did you drop out? Going into 10th grade. Going into 10th grade. So you have up to a 9th grade education. Yeah, it's actually here.
Starting point is 00:19:57 And you are the number one ethical hacker in the world. How did you get into hacking? It kind of just happened because I was very young and it didn't just happen. I mean, there was a lot of stuff that happened in between it, but when I was very young, my grandparents had a computer at the house and I don't know if you remember this, but back in the day, A.O.L. used to send floppy disks in the mail and they give you a trial. I remember the shape of the floppy disk and I remember seeing the front of this desktop
Starting point is 00:20:28 that my grandpa, I think he brought it home from work or something back then. And I remember seeing the shape of the floppy disk and there was a little icon of it on the desktop computer. And I was like, I wonder what would happen if I put this floppy disk in the computer. And I saw the AOL logo from the mail
Starting point is 00:20:48 show up on the computer screen. And it blew my mind as a kid. It blew my mind. I was like, how did that just happen? How old are you? I'm 29. No, I mean, how old are you at this time? I had to have been like eight, nine years old at that time.
Starting point is 00:21:03 Maybe. That blew my mind and I wanted to know how it worked. From that point on, I just had this obsession with how do computers work? Why did that just come from a piece of cardboard and show up on the screen? I just kept learning and learning about computers and fixing computers and meeting people on the internet through AOL and messenger and other apps. Then I found it actually started with a marketing community at first. People that were doing digital marketing back in the AOL days, so just spamming out massive amount of emails,
Starting point is 00:21:44 like millions and millions of emails. But then in that community, there were some hackers, you know, people that were writing automation tools and finding exploits and finding ways to convert on ads better and this and that. And I ran across this one guy who ended up going to prison later for hacking, I believe it was AT&T and a few other major cellular carriers. He stole some prepaid minutes and back then prepaid minutes were a big deal.
Starting point is 00:22:12 So he stole millions of dollars worth of prepaid minutes with his partner in crime Edwin was his partner and the guy that I'm talking about is Robert Moore and his hacker name, what he went by Moore or Moore R. And he ended up stealing these credits and Edwin would go to these places all over the malls and the small cell phone stores and he would resell these credits for a cheaper price than the carriers would sell them for. So they sold, like I said, a ton of those. And Edwin decided to leave the country. He left the country, he was doing all this fancy stuff,
Starting point is 00:22:48 private jets, yachts, hotels, girls, cars, doing it all. While Rob was sitting at home, hacking for this guy's guy, wasn't doing anything but selling the minutes. And then Rob gets a knock on the doors, the FBI, and they come in, they seize everything he has. Rob ends up out of all of this, out of millions of dollars worth of sold minutes. Rob ends up with like 20 grand in profit and two years in federal prison, and they confiscated
Starting point is 00:23:19 all of his stuff, everything that he had, and he gets out of prison, they, and Edwin's on the run, they finally get Edwin. I believe Edwin got like 10 years or something, which he deserves it honestly, because he took advantage of Rob. And a weak point in Rob's life, he took advantage, and Rob is not meant for federal prison, and he ended up there.
Starting point is 00:23:39 But yeah, Rob is the person that, from, like I was saying with the instant messenger chats, Rob's the person that motivated me to learn about hacking and spent the time with me and showed me some things because there weren't learning sites like TriHack Me or getHub.com or any air or stack overflow or Google. There wasn't none of that existed back then. So you couldn't look up certain methodologies
Starting point is 00:24:05 or hacking or how to do reconnaissance. There was none, there was, it didn't exist. So Rob gave me some pointers. It's not a cookie cutter thing. Hacking is very broad. So let's backtrack real quick. How old, so you're, I believe you said you started hacking at 10 years old. 11. Yeah. 11 years old.
Starting point is 00:24:28 So 11. 11. At what point are you conversing with more? Probably when I was 11, he might not have known I was a lucky person. How did you guys like, how did you find him? Group chats. Back in the aim days. How does that, I mean. How does that conversation go?
Starting point is 00:24:47 Hey, I'm looking for some hackers to teach me a couple things. No, I was marketing and interested. I was just active in the communities and I knew what Rob was capable of. He could do some really cool stuff with a computer and it was was really just asking questions, you know? And Rob and I got along so well. And I actually flew out to see him later in life to Washington State. I stayed with him for a week. But we kicked it off for some reason.
Starting point is 00:25:15 I don't know what that reason was. I can't remember that far back. But Rob was the person that helped me, at least, get started in what I do today. What were you one hack in at 11? I think it was more interesting just shutting people's internet connections off, like simple stuff, you know, nothing crazy
Starting point is 00:25:34 and making money, marketing, you know, it's a lot of 11 year olds would probably not think about selling things on the internet, but I wasn't making a ton of money as a kid. I didn't have rich parents or anything like that. And I wanted to make money ASAP. And I knew that digital marketing, like the groups that I was in, I was seeing all these people making fortunes selling, you know, one example, we were selling OCE weight loss berries. And it was a huge thing back in the day. And there was some affiliate marketers making 30 grand a day doing AOL spams, making millions
Starting point is 00:26:08 of millions of emails per day, making 30 grand a day on average. I would blow my mind. And I don't remember every specific about names and what programs they were on, like affiliate programs they were on back then. But I knew I wanted to be involved in that. I thought that automating it and finding exploits in websites or people's computers would enhance my profits. It did. And different. But then all the money that I made there, all the money that I went to drugs and doing
Starting point is 00:26:50 dumb stuff. But I wouldn't take it back because I learned a lot, I grew up quick and there's some benefits there and some things that aren't so good there. But let's stick with childhood hacking. So what point in your childhood did you start making money doing this? No, probably, probably 12, 11, 12 years old. I was right into it. I mean, how much money are we talking?
Starting point is 00:27:15 A couple grand here and there. Which is a lot for a kid. That's a lot for a 12 year old. It felt like a billion dollars to me. And so, were you always an ethical hacker? No. What are some of the things that you've done, that you've hacked into?
Starting point is 00:27:32 What's one of the... Give us some examples. So, I guess depends on what you wanna know. Like people or organizations or both. Let's go and know all of it. Oh my gosh. Yeah, I mean, I'm limited, I'm limited by what I could say here.
Starting point is 00:27:49 I know there's a statute of limitations. I'm sure it'd be fine, but there's some things that I would, I regret that I would take back. But what there is one thing out there that's public, there's a rap song that mentions me about, you know, are you familiar with crypto mining? Yes. Okay, so I packed a ton of computers. I had a method. I won't explain the method
Starting point is 00:28:11 because it still could work today, where I could infect computers with malware. And a lot of people that infect computers with malware, which is just people, you know, if you don't know what malware is, it comes in various forms, but the type that I'm talking about is called a remote access Trojan. And that's like the equivalent of me standing in front of your computer with full access to it. And I can look through your webcam, I can control your keyboard, your mouse,
Starting point is 00:28:36 look at your screen, do anything I want without you knowing that I'm there. And I infected a ton of computers. And instead of having the remote access Trojan functionality where I could do, you know, I could take control of these computers, I decided to do crypto mining. So at that time, it was just Bitcoin and Litecoin. And, you know, I had quite a bit of an infected computer mining at all times.
Starting point is 00:29:04 The thing that I did that was, if you could say nice, quite a bit of an infected computer is mining at all times. The thing that I did that was, if you could say nice, was that when the computer was idle, it would use 100% of the processor and the graphics card to mine the coins. And when the computer was in use, it would only use 20%. So they wouldn't have a horrible experience with their computer just being bogged down the entire time.
Starting point is 00:29:26 But that was a, I guess, so you had started around that. So you would hacked in to how many computers? 100, thousands. 10,000, yeah, probably tens of thousands. And so all of these tens of thousands computers are mining cryptocurrency and going into your account. They were going into a pool.
Starting point is 00:29:50 So pooled mining is a lot of people mining together and then all of the whoever is putting in the most, I guess the reward is split based upon the contribution. So if you're contributing twice as much as me, you'll get twice as much of a profit. So it was all being sent to a specific pool of shores. Why did that stop? I have morals. And there was a situation that came up where obviously the bots, you know, if let's say I had to change a pool or something went wrong, they had to be updated across the board, you
Starting point is 00:30:32 know, every single bot would have to be updated to be pointed at a different address. I still had access to be able to do that. And I was in a community at that time with some bad people who wanted to, you know, kind of buy access to my bots. And I wasn't okay with that. And it kind of lined up perfectly with another business opportunity that I had in life where I kind of just said,
Starting point is 00:30:58 you know what, screw this, I'm done, not taking the risk, you know, if I get in trouble with what they call a botnet, if I get in trouble with this botnet, I'm doing a long time in prison and it's just it's not worth it to me I can't get in trouble and I stopped I stopped on my own will I didn't get caught There was people that knew about it, you know hackers that they may not have known it was me now Now they know it's me but at the time they didn't know that it was me But no, I didn't get caught
Starting point is 00:31:25 and I'm passed the statute of limitations. I didn't hurt anybody. Maybe your power bill went up a couple cents, but that's about it. But yeah, that was the extent of that specific hack. Was that the one that, was that the hack that changed you, the turn to ethical or was there?
Starting point is 00:31:46 Oh, I would say, yeah, I would say yeah, yeah, because around that time I switched to doing cybersecurity and starting the other businesses that we're gonna talk about. So yeah, I would say yeah, yeah, I never really thought of it till now, but that's when I would say that's when I became an ethical hacker,
Starting point is 00:32:05 rather than a gray hat or a black hat hacker. What is the gray hat hacker? Gray hat is in between. So somebody that, for example, if I went to your website, I hacked your website and I set you an email and said, Hey, I found a vulnerability in your site. You could call the FBI and say, Hey, this guy just hacked my site and I didn't give him permission, or you could say, Thank you. That's the gray hat hacker. And that was a great headhacker.
Starting point is 00:32:26 And a black hat? Black hat just, you know, takes over your website, tells you, hey, you better pay me or I'm releasing all your information or deleting your site. And here's all the information about you and your wife and your family and everything blah, blah, blah, blah. Black hat hackers are, you know, they're kind of ruthless. So, you're in the cryptocurrency business. Being a hacker, or you were, is this the way of the future? What do you think? What's your opinion on this?
Starting point is 00:32:55 Yeah, yeah, I mean, cybersecurity and keeping yourself protected on the internet is the future. If you're not paying attention to that now, you, I mean, and you're not seeing your browser that now, you, I mean, you're not seeing your browser that's warning you, the TV that's warning you, the constant news, the constant ransomware notices. I mean, if you haven't heard about the active breaches right now on all of these major websites and you're not doing anything about it, you really should start because it is the future and it's only going to get more intense and it's only
Starting point is 00:33:25 going to get more dangerous and everything that you have, like, you know, is attached to the internet, everything. I mean, unless you live out in the middle of nowhere with no internet connection, and even the power in your house is controlled by a remote switch, you know? Like, what if I turned off your power for a week and you live out in the middle of nowhere? You just, you really have to take your securities here seriously. That's just a random thought, but it's possibility.
Starting point is 00:33:51 I meant, I actually, I'm glad you brought that up, but I actually meant cryptocurrency. What's your opinion on cryptocurrency? Is it here to stay? It's very volatile. Very volatile. I think the Bitcoin coins here to stay. Yeah. Yeah.
Starting point is 00:34:07 Are you all in on Bitcoin? Um, can't you firmer tonight? Would you like to see Bitcoin? I would love to see Bitcoin hit the moon. I mean, it's doing well at this moment. It's around 30 grand. But I would love to see what it was projected to be at in the hundreds thousand, possibly a million of coin. You think that's possible?
Starting point is 00:34:28 Absolutely. I mean, it was, when I started, it was only, you know, maybe a couple dollars at the most for coin. Damn. Well, what brought you to South Florida? I got, so I started a marketing company for, to help people get into a drug and alcohol rehab. And for anyone that's familiar with that topic, they're gonna think, okay, we had a marketing company
Starting point is 00:34:52 who was doing a thing called patient brokering, which is a felony. And I was not doing that. I didn't even know what that was at the time. I just knew I could generate leads from the internet. And I started this company called the Treatment Source, which was just a website that they filled out a survey, and the survey would bring them to a 1-800 number
Starting point is 00:35:09 if they had mental health or substance abuse. They changed the term substance use issues. And I would then send those patients or clients to a drug and alcohol rehab in South Florida. And I was generating a ton of clients and doing really well with the internet marketing campaigns. And one day I got a call from a guy who says to, he was like, hey, you won't come to Fort Lauderdale Airport
Starting point is 00:35:36 right now. And this is like, right when I'm waking up. And I was like, yeah, I will. I was just, you know, he thought I was joking. I call him a couple hours later. I booked my flight. And I was like, hey, I will. I was just, you know, he thought I was joking. I call him a couple hours later. I booked my flight and I was like, hey, I'm at the Fort Lauderdale airport. He didn't believe me. And he picks me up at the airport and, you know, he was blown away that I even showed up there. But, you know, I just like a week's worth of stuff packed with me.
Starting point is 00:35:59 And when I got back to his house, we were talking about, you know, like the rehab business and, you know, the marketing and all the intricacies of the industry. And we became good friends at that point. And I, you know, I was thinking, well, why don't I start a rehab? You know, like maybe I could do this myself. If I can generate the business for a rehab, maybe we can do it together. So he was like, yeah, I own one now, obviously,
Starting point is 00:36:28 because he was one of my customers at that time. And he decided to sell his shares in his rehab and use that to buy, or I'm sorry, to invest into one with me. And we started a treatment center together. And I decided to move to Florida. So I went back to P.A. I put my car on the back of a U-Haul,
Starting point is 00:36:48 filled it up with all my stuff, drove down to Florida from Pennsylvania, and never looked back and started a drug and alcohol and mental health facility. How old are you at this point? 22. You started a rehab at age 22. Yeah, I think I was the youngest owners
Starting point is 00:37:05 in the treatment world at that time, yeah. Wow. What, so what was your motivation for this? Because you are, from our research, you are all about helping humans. Yeah, yeah, so my motivation was, like I said earlier, my family, my dad's side specifically had some serious drug issues, still dealing with them.
Starting point is 00:37:31 I went through some serious drug issues. A lot of friends of mine have gone through drug issues, are still going through drug issues. And I just, maybe I got this from my mom, my grandma, my grandpa, but I just love to help people. I don't know what it is. It makes me happy. And I guess, would that be hospitality? Is that hospitality? Is always just been something that makes me happy.
Starting point is 00:37:55 Well, you had some pretty tragic experiences as well. If I remember correctly, do you want to go into any of those? Well, there's a lot of them. So are you talking more of the addiction side of things? Yeah, you had a couple of friends die. Mm-hmm. So I've had a lot of friends die due to heroin overdose, or car fetinol, fetinol, butyl, fetinol,
Starting point is 00:38:17 cedol, fetinol, and all of the different fetinols that are getting over here and being, you know, put in heroin and I understand that they chose to use drugs regardless of what was in it. But they definitely weren't planning on dying. I'll tell you, I mean, I lost my uncle Richie to an overdose.
Starting point is 00:38:37 I lost my best friend, Ricky Reves, to an overdose. And I'll tell you that story because this is, this is how something else happened. But I got a call from Ricky's parents a couple of years back. And they were like, you know, I haven't heard from Ricky since this morning. And do you mind going over there and checking on him? He was about a 15 minute drive from me. He wasn't at a turn my phone calls, and at this time he wasn't on drugs. He wasn't messing up or anything. He worked for me at the rehab,
Starting point is 00:39:10 and we spent every day together. So I go to his condo, I walk in the door, and I look to my left, and I see him in the bathroom, and he had his face up against the vanity. And he was wearing his shorts and I saw that he had a needle and a spoon and just, you know, it didn't look good. So I ran over and I tried to wake him up and it wasn't waking up.
Starting point is 00:39:36 So I called 911 and I'm running down through the elevator to go to get, I didn't think anything was wrong with him. So I didn't bring Narcan upstairs or anything. Like Narcan's, but saves opiate addicts from overdosing. So I ran to my car. I grabbed that 911s, tell me what to do. I get back to the room. And they told me to take him off the toilet
Starting point is 00:39:57 and put him on the floor. And his body was still in the position that it was in when I saw him sitting there. And his face was sideways from being on the vanity. And I'm still in denial at this point. I gave him the Narcan and his leg. I was, you know, giving them CPR like they said to do and I just, I remember when the cops showed up and the ambulance showed up they, they didn't talk to his parents. I did. I told his parents that their son was gone. And which I thought was a little bit ridiculous.
Starting point is 00:40:30 I thought that the detective should be the one handling especially with how I was, you know, I wasn't, I was crying my eyes out. Like, he lost my best friend, you know. No. Sorry. I lost my best friend to addiction too. Yeah.
Starting point is 00:40:46 Yep. So, sorry. Yeah, my best friend, he was a seal. I worked with him at the agency. He experienced a lot of trauma. He became addicted to opiates for injuries. And that just became a, you know, straight addiction. They cut the pills.
Starting point is 00:41:21 He went to heroin and he spent a lot of time trying to get him better. Moved him with me, got him back on his feet, got his family involved, got him into therapy. I mean it was, I love this motherfucker, you know, we'd been through a lot of shit together. And he was a phenomenal hockey player. And I used to live in Boca Raton too. And so he lived right by me. And he kept telling me he wanted to start this hockey nonprofit for wounded warriors
Starting point is 00:42:05 And that he was gonna get the panthers to sponsor it now He wasn't he's one of the smartest human beings I've ever met in my life even when he was high but Is it got worse and worse? I mean you didn't even just his appearance. He didn't even want to be around him. He just looked sick. And I was in the back of my head. I was like, yeah, okay, you're going to get the Panthers on board. Well, I'll be damned. The son of a bitch got the fucking Panthers on board. And he, I think it was the first NHL team to sponsor a wounded war. You had to be a disabled veteran to play on the hockey team.
Starting point is 00:42:49 Okay. He had somebody helping them. The panthers called the guy that was helping them to tell them, hey, we're going to do it. We're going to sponsor the team. You got the NHL sponsor. We're going to sponsor the team. That guy went over to tell them, hey, dude, you did it. And nobody answered the door and trying to keep my shit together here. But I understand. Yeah. He didn't answer the door, got on a stool to see, you know, the top part and there he was,
Starting point is 00:43:30 laying on the floor, you know, and um... Sorry to hear that, man. Yeah, so I know what it feels like. I just want to, once you know I can relate and I've lost a lot of friends to addiction. Likewise. That was the first one, obviously, that happened to me. And I, you know, I found them. And I can't explain that.
Starting point is 00:43:50 And you know, I can't bring them back. But what you can do is educate people and try to help more people so that it doesn't happen to them. And you can't fix everybody. You know, you can't get it through everybody's head. They need to stop. And it's dangerous. And it's not just heroin and opi.
Starting point is 00:44:04 It's like it used to be. It's a, you know, it's coke, it's meth, it's painkillers that are pressed, it's Xanax, they all are being caught with fentanyl. This isn't a conspiracy theory, it's fact. I mean, the number one leading cause of death, 18 to 49 right now, it's fentanyl. That's more than car accidents, more than anything else. 18 to 49 years old, it's fentanyl. That's more than car accidents, more than anything else. 18 to 49 years old, fentanyl. So any drug that you're doing, you have to be careful
Starting point is 00:44:31 that you know, not be careful. You have to just try to get away from it or get a testing kit. If you refuse to stop doing drugs, get testing kits because fentanyl will kill you. Yeah. And yeah, yeah, it's it's pretty rough. But with the rehab program around that time, not not long before I lost Ricky, I lost another friend
Starting point is 00:44:53 Drew and my business partner at that time, you know, him and I, we both, you know, were friends with Drew. And I was closer with with Ricky. And we decided to start a scholarship program, and it was called, we named it the Drew Badgey Scholarship program, which was to help people get in to drug rehab that didn't have the financial means to pay. And the reason, that's important is because when I was a kid, I didn't have private health insurance or money. So there was no way I was going to a nice facility
Starting point is 00:45:24 like one I had or other ones in Florida or other states that are private. The government facilities, they take Medicare or Medicaid, but some of them have two, three months waiting list. Attics can't wait two, three months. They die and as you know, it could take one bad dose, they're dead.
Starting point is 00:45:44 So having a private facility and somebody that really wants to get clean, if they don't have the right insurance or the right money, you have to turn them down. And it just bothered me so much that you can't help somebody that I was in their shoes. You know, I wanted help or people in my family wanted help and couldn't get it. I started that scholarship program with my old business partner. We brought a ton of people in, probably over 100 in the seven years, seven or so years that I was there. It may be even more than that, but at least 100.
Starting point is 00:46:20 Full scholarship, they didn't spend a dollar. A lot of them did well, some of them relapsed. You can't fix everybody. But after time went on, we adapted to how a scholarship program, we built programs around that. We built programs around trauma. We built programs around specifically mental health, specifically co-occurring mental health and self-sensuality disorder, all kinds of different things.
Starting point is 00:46:51 And then we branched out, so we opened a detox, which was another facility, because at that point we had partial hospitalization, intensive outpatient and outpatient, but we didn't have detox, so we were sending them to other facilities and then we would take them, so then we had two facilities, and then we realized, okay, well,'t have detox. So we were sending them to other facilities and then we would take them. So then we had two facilities.
Starting point is 00:47:06 And then we realized, okay, well, a lot of our people were getting are coming from New Jersey or Pennsylvania, New York, Virginia, Massachusetts, up in that area. So we decided to start another facility in New Jersey. And we started, it was called the Shore Detox, but it got changed. Again, the name of it got changed.
Starting point is 00:47:23 And I sold my shares in the rehab about two and a half, two and a half, three years ago, right around the time that I started to catch the predators. And I got into the software as a service world and buying software companies and operating them and selling them. So. You are an amazing human being, man. To do something that has that amount of impact at that young age. I mean, that's just to do it in general is amazing. You know, and you did it at what, what'd you say, 22? 22, yeah.
Starting point is 00:48:02 That's incredible. You realize that? I appreciate it. You're welcome. I'm still on the mission. It's not over, you know? The very early. So there's so much more to come. And one spot that I forgot there was the electronic medical record system that we use,
Starting point is 00:48:18 like the same thing you would see at your doctor when they put in notes about you being, you know, at your visit. We used one called, I will say the name, but we used one and I got involved with those guys afterwards. And like after I sold my shares, I went right to their office and I set up one of those plastic tables, put my computer in there,
Starting point is 00:48:38 even though I wasn't involved at that time in that business. I wanted to work out of their office because I liked the software world. And at that point, I wasn to work out of their office because I liked the software world. And at that point, I wasn't sure if I was going to do digital marketing or other things, or cybersecurity or both. But being around them every day, I was like, I got to do it with them.
Starting point is 00:48:54 So I got involved with their businesses, and then we decided together we're going to do a ton of software companies. And that's where we're at now. Like I said, with pentaster.com and many more, but that's the one that makes the most sense to talk about here today. Well, let's take a quick break
Starting point is 00:49:10 and when we come back, we'll dive into that. Okay. Cool. I wanna tell you all about this new meat delivery service I found called Moink. What I really, really like about Moink is they are from a small rural farm town of Missouri, La Bell, Missouri, right by where I grew up and I love supporting
Starting point is 00:49:34 small town business, USA. Now when I started looking into Moink, they educated me on the meat industry and I want to share with you all a couple of facts according to Moinkt Magazine. 60% of all pork is produced by one company in the US, and that is 100% owned by the Chinese. Four companies control over 80% of the meat industry in the United States. More than 10,000 different additives are allowed in the U.S. food supply. 99% of chicken, 95% of hog, 78% of cattle in the U.S. are raised in confinement buildings
Starting point is 00:50:15 or feed lots. These are not moving around freely. 80% of the antibiotics consumed in the U.S. are fed to animals. Here's a stat. In 2016, 18.4 million pounds of antibiotics were sold for livestock. And that's what you're eating. Suicide rates amongst farmers are the highest than any other profession.
Starting point is 00:50:40 And that includes veterans, believe it or not. I found that alarming. Now here's what Moink is doing to combat some of this stuff, which I really appreciate. Their livestock is 100% born and raised and harvested humanely in the United States of America. Their farms practice regenerative, agricultural methods.
Starting point is 00:51:03 They are free of GMOs, antibiotics, and all hormones. Their Alaska salmon is wild caught. Their beef and lamb are grass fed and grass finished. Their boxes ship from rural America, right in small town Missouri, love it. Their chicken and pork are pasture raised. So guys, check them out, Mwink. Keep America farming going by signing up
Starting point is 00:51:32 at mwinkbox.com slash SRS. Right now listeners on this show get free bacon in your first box. It will be the best bacon you will ever taste, but it's only for a limited time. It's spelled m-o-i-n-k-box.com slash SRS. That's minkbox.com slash SRS. You've probably heard me talk about my psychedelic journey last year and all the benefits that came from doing it
Starting point is 00:52:06 One being that I haven't drank in almost a year I've not had any caffeine in almost a year my anxiety has gone my anger has gone a whole list of benefits came from that And it led me down this journey of researching benefits of mushrooms and fungi in general in my research I found this company called mud water mud water is a coffee alternative with four adaptogenic mushrooms and fungi in general. In my research, I found this company called Mudwater. Mudwater is a coffee alternative with four adaptogenic mushrooms and herbs with a fraction of the caffeine as a cup of coffee. I have energy without anxiety, jitters,
Starting point is 00:52:35 or the crash of coffee, what I really like about mudwaters, that they took the time to find the perfect ingredients to make a product to help you feel better every day. I genuinely believe that mud water is a good product. It's Whole 30 approved 100% USD organic non-GMO gluten-free vegan and kosher certified. Mud water also donates monthly to the Berkeley Center for Science of Psychedelics as mud water believes the country's on mental health epidemic and so do I go to Mudwater.com
Starting point is 00:53:06 slash Sean to support the show and use the code Sean mud for 15% off. That's Mudwater.com slash Sean use the code Sean mud for 15% off. All right, Ryan, we're back from the break. We're getting ready to dive into your company, PENTESTER. So what is PENTESTER? PENTESTER is a software solution for cybersecurity and protection. So there's a PENTESTER, a manual PENTESTER, where somebody would go into your company
Starting point is 00:53:41 or a group of people, where they would check down a list of boxes of things for your compliance, look for vulnerabilities based upon your platform and give you a report of findings, vulnerabilities. Pentester.com, it can get confusing because pen testing and pen tester.com, like pen testing is a term, pen tester.com is the name of my company.
Starting point is 00:54:03 Okay. And what we do is we try to automate as much of what a pen tester would do digitally. So pentester.com is an automated web scanning framework. As of right now, we're building it out to be more than just a web scanner and sorry, I'm getting mixed up. No, it's fine. So let me just ask this then. It's hard to explain. So I'm trying to make everybody understand. Let me, yeah, I get it, because I'm
Starting point is 00:54:36 going to tell me what this stuff is. Not you, not you. So let me ask you a question then. So if I go to pentester.com and I type in Sean Ryan Show.com, what kind of vulnerabilities might I have? Here's my website. Basically, I sold gummy bears on it. And we post upcoming episodes.
Starting point is 00:54:56 Your episode's going to be on there. We collect email addresses for a database to we send out a free newsletter all the time. Right. And then we got like some, if you want to, if you want to apply for a job here, everyone wants to know we'll post that. They can run their resumes. We just did a thing where we're looking for a new video editor for shorts and they're sending in a bunch of, we have an competition for it.
Starting point is 00:55:25 But so for a website like, and we have advertising inquiries, for a website like that, it's run off Shopify. What kind of vulnerabilities would I be looking at? So you're, there's many things. The first thing to come to mind was email breaches. If you have contact at seanrion.com, is that your website?
Starting point is 00:55:49 seanrion.com? SeanrionShow.com. SeanrionShow.com. So contact at seanrionShow.com or Seanrion at the website or anyone that works here, I can look up that domain with pen tester and see if it's been involved in any breaches or if it's been involved in any botnet traffic where it's scraped all of the cookies and passwords from people's browsers.
Starting point is 00:56:13 Okay, hold on. What is botnet, what tracking? Traffic. Botnet traffic. Right, so let's say you were infected with some type of malware and that person grabbed from your Chrome or your Safari, all of the saved passwords and all of the sessions, like a website, to be signed into a website you have to have a session.
Starting point is 00:56:36 So if I took that session and replaced mine with yours, now I'm without a password. So some of that stuff gets released on the dark web or it's tour, I like to call it tour, TOR, the onion router, that's what the dark web is. But it gets released there and sometimes on the public really facing web. And a lot of people aren't aware of what information is actually out there. So when you put your website into Pentester,
Starting point is 00:57:05 you get a preliminary report that shows all of that data that has been exposed related to your domain name. Well, it goes a little further than that, because let's say it doesn't find anything, maybe you're a brand new website, and Shopify is doing a good job with all of the plugins you're using, because remember, each one of those plugins
Starting point is 00:57:23 is by an individual creator that could have messed up at any point in their code. So you're only as strong as your strongest plugin. So that's one thing that Shopify has their own security, and then you have your own security based on your plugins. As for the emails, let's say I get nothing with the SeanRionShow.com. Now I'm going to start looking into the Gmail accounts in the Gmail, hotmail, awell, y'all, whatever, of all of your employees, your family, and then I'm going to see breaches associated with them, which I guarantee you that there is. I'm so sure that if I pulled my laptop out and I put in one of your personal emails that I'll have at least one of
Starting point is 00:58:02 your passwords, and that password could be reused for Shopify, or maybe it's used to access that list of data with your customers that you were saying you have a client list of the newsletters, the applicants for the jobs. Maybe it's the same password you use for that. And now I have access to that data that I can either ransom you with, I could escalate my permissions on Shopify with and take over your entire site. Maybe it's the credentials to your social media platform, like YouTube, Instagram, TikTok, whatever you're on, you know, those credentials could be reused.
Starting point is 00:58:38 So it is important, like, as you said, using a password manager, because all it takes is someone like me with a bad moral compass to take a advantage of everything that you have. Could you demonstrate that right now? Yeah. Just type it in my email. Yeah, for sure. I'll try the Sean Ryan show first.
Starting point is 00:59:03 .com, right? Yeah. Okay, so we have, there is some some sensitive information, but nothing, nothing that would be a big deal. I can show it to you actually, if you want, it's not gonna hurt anything. Yeah, let's see it.
Starting point is 00:59:31 So it's not, this isn't specifically passwords there. But it is what came from leaks on the internet. This isn't, you know, it isn't anything other than leaked data. So nothing there is sensitive to my eyes. So we're doing a good job for the Sean Ryan show. But if you throw in one of your Gmail's there or something any other email that you may be using for a long period of time. Just type it in here. Yep. Take a second to load. It loads over 140 billion records. Nothing, nothing on that website. There's two E's supposed to be there.
Starting point is 01:00:33 Yeah, it seems so. No shit. I don't see the thing. All right, my IT guys gonna live to see another paycheck. Well, it's not your IT guy though. Even that one just doesn't seem to be registered with a bunch of accounts. Like, for example, if you were in 2019,
Starting point is 01:00:49 LinkedIn breach or like, or a drop box, if you use any of that, like vigilante, it's like a saying vigilante, I'm sorry. Vigilance elite, I do have this password. And I do have the address Who's the address? I have an apartment and
Starting point is 01:01:10 P****s Interesting I have an IP address for P****s I have an address in where we're at right now With the zip code ending in 64, and a phone number, and then the s***. All that s***'s on there?
Starting point is 01:01:29 Yeah. And I have a lot more than that. If you wanna look, take a look yourself. Oh yeah, let me take a look. Yeah, this is on halfway through if you can scroll up and down. How do we clean this up? You can't.
Starting point is 01:01:41 You just gotta change, you gotta change the information if you don't want it there. There is no way to get rid of it. Okay, so what oh my gosh. So that's why small medium-sized businesses that don't realize that they're a target. There are more of a target than they think. They get attacked because they either have exposed credentials out there or they're using old technology and they just get grouped in with a ton of other people that are similar
Starting point is 01:02:10 targets. A lot of them don't realize they need to take their cybersecurity more seriously. Pen tester, this is kind of like a shameless plug, but for 50 bucks a month, it's worth the money. We are the cheapest to my knowledge in this cybersecurity world. And we're not only giving you a software solution, but we're giving you a hands-on manual confirmation for anything that we're not sure of.
Starting point is 01:02:34 So for 50 bucks, like, someone would have offered that to me prior to being a hacker myself. I was a little kid, but let's just say I wasn't ever, you know, I'd be more than happy to pay $50 a month for something like this. This is just one of the, one of many things we offer. Okay. So is my website safe for customers? That's up to you to decide. I mean, I haven't run a scan. This is just a breach check.
Starting point is 01:03:00 Oh, that's just a breach check. Yeah. And this is, we have more records than literally anyone else on the internet. So we're going to be able to tell you more than most people. Some people are going to have access to these private databases that we have as well as the public ones. But if you download certain other competition websites that say, or I'm sorry, sign up for other competition websites that say that they offer breach protection or the leak leak protection, breach or leak protection is what they'll say.
Starting point is 01:03:33 They don't have a database as big as ours, I'm sure of it. I mean, I'm very confident in that. And this is without running, like I said, this is without running a scan. So you know, like, I'll keep the computer ready for when you wanna see a face, but I'll show you how wild that can get. Let's do that. Now you wanna see it?
Starting point is 01:03:52 Yeah, let's do it. So describe what you're gonna do. So I'm gonna, do you want, I can do my face, your face, anyone's face that you wanna do. Does it, you just tell me who's the face. Yeah, we can do my face. Okay. It's gonna be a lot of pictures of you,
Starting point is 01:04:07 obviously, because of your podcast, but. So basically what you're doing, is you're taking a photo of me, it's gonna do the facial recognition and find every image on the internet that has my face in it. Yeah. Whether I'm tagged in it or not.
Starting point is 01:04:21 Yeah. Like it's strict, you could find my face in the middle of the Super Bowl stadium. As long as it's on the internet. So yeah, let me take a picture and send it to myself. Okay. So I took a picture of your face and you can see it's just a picture that this has never been on the internet, right?
Starting point is 01:04:51 That is a really good looking man right there. Amazing. So I uploaded that to here. So you took a picture. Yep. And now you can go through these and see if there's anything that's not, I don't know if there's going to be anything that you don't want on there or not, if you click them it will give you a link to where that picture is hosted at.
Starting point is 01:05:16 But remember I used a picture that was never on the internet to find those photos of you. So it measured your face, measured 120 points on your face, associated a picture that's never touched the internet with you. And for somebody that doesn't have as big of a following or as many photos out there, there may be less results, but you could be in a photo that you're not aware of or there could be some stuff out there that you would want to be aware of.
Starting point is 01:05:45 Oh wow, this is really, this is like everything. Yeah, it just keeps going. Cool stuff. That's insane. Like most people, you'd be crazy not to pay $50 for that as a business. It's just getting that messaging in somebody's hands, and I'm sorry, in somebody's brain, when they look at the website or they see an ad for, hey, are you taking your cybersecurity seriously? And then they run their website through a light scan. They see, here's some breach credentials. Here's some pictures that we found on your site, here's some vulnerabilities.
Starting point is 01:06:27 And you have an option to sign up for free, which you get a preliminary report for free. And then you have your option for $50 for a small business. And you just say, you know what, screw it, I don't need that. I just, I can't comprehend why you wouldn't want that. So yeah. Damn. Let's talk about the dark web. So I hear a lot about the dark web. So, yeah. Damn. Let's talk about the dark web. So I hear a lot about the dark web.
Starting point is 01:06:47 Yeah, the buzzword. Drugs on it, you can find child pornography on it. You can, it sounds like it's just the black market, the new black market, correct? Yeah. So what I've heard about it, I know about it, I know it's all stuff you shouldn't be doing. But how do you get on it?
Starting point is 01:07:08 What is, where is it? Okay, so the Dark Web itself isn't a marketplace, like what you're thinking, all right, so the black market or whatever you wanna call it. Once you're connected to the Dark Web tour, the onion router, what I was explaining before, you still need to know where to go to visit these horrible websites.
Starting point is 01:07:28 And they're like, you know, imagine a very long string of letters and numbers and the website instead of dot com, it'd be dot onion. You can't visit those websites in a regular browser. You have to do that while you're connected to the onion router, which you can download at the tour, TOR's website. And then you could go to the onion router, which you could download at the TOR TOR's website. And then you could go to a thing called the Hidden Wiki. And the Hidden Wiki will show you all
Starting point is 01:07:51 different categories of these websites with a link to them. And there's marketplaces, there's horrible things on there, like you said, for kids. And even murder for hire, there's counterfeit money, there's fake IDs, there are all kinds of different websites that do horrible things. What is the onion router? So the onion router is a tool, an open source project that was created to anonymize your traffic on the internet.
Starting point is 01:08:22 And it decentralizes, I believe decentralized would be the word for Decentralize is, I believe, decentralized would be the word for it. Your internet traffic, it keeps you anonymous beyond a VPN. I still recommend that you use a virtual private network on top of tour if you want to be anonymous, but it's just a layer of security that's free.
Starting point is 01:08:41 For example, let's say you use Comcast for your internet service provider. They could see that you're using TOR, but they can't see what you're looking at. If you use a VPN and then you use TOR, they can only tell you're using a VPN, but they can't tell you using TOR. So it's just an internet within an internet. So can I get on, can I check my email through the dark web? Yes, would you go to any website? Would you recommend using the dark web
Starting point is 01:09:14 to just do regular... It's slow as hell. Internet stuff. It's very slow, yeah. Yeah, I mean, you could, and it would keep you safer, but it's not a foolproof way to keep yourself safe and it's painstakingly slow.
Starting point is 01:09:28 Okay. Do you use the dark web for investigations, yeah? What kind of investigations? For like the predator and pedophile cases, yeah. So are you able to track these guys down from the dark web, even though they're technically anonymous? A lot of times it doesn't need to go that far. A lot of times these guys will use their regular emails
Starting point is 01:09:53 or they'll use an IP address that's been, they'll reuse for multiple emails or their face that they're using as their profile picture. I can find them from the same way I just found your face, or they're using a phone number that traces right back to them. The dark web, it's not really a huge part of catching predators and pedophiles.
Starting point is 01:10:16 One thing, I guess the only thing on the dark web, quote unquote, I hate that word, but the dark web quote unquote that I had access to was when I originally hacked the website that we're going to talk about they branched out to have not only a website on the clear net on the regular internet but their website was mirrored on the dark web and I had three back doors in their system and it branched out over to the dark web. So I had a back door on the dark web too, which was kind of a cool thing to have.
Starting point is 01:10:49 So I needed to be connected to tour the onion router to connect to my back door. But that was, I was only using that back door to exfilterate data every single day, which was just user information. Because I didn't want to get there posts or anything. I didn't want to be in possession of anything horrible that they were sending each other.
Starting point is 01:11:08 But their user info was enough for us as, I'm sure you'll learn shortly. Yeah. What are some things that people can do to protect themselves from hackers? Let's actually, let me briefphrase this quote. Let me back up. What are some vulnerabilities?
Starting point is 01:11:29 Just let's go through all the things that you personally could hack if you wanted to. I mean, it's countless, but I could give you some major daily things. Absolutely. Let's talk about some of the devices. The devices you have right here. Let's talk about all the stuff you can hack into.
Starting point is 01:11:47 Sure. And then we'll get into maybe how we can prevent that a little bit. So I guess we'll just start with a daily routine. You wake up in the morning. You make your coffee or maybe you take your phone off the charger and you check your phone in the morning. You might check your email. You might have, you gotta make sure you,
Starting point is 01:12:06 you ever email that you have while you're half asleep is coming from a real person. It's not a fishing email. Someone pretending to be a company that they're not stealing your credentials. Then you go outside to your garage, you get in your car, and you have to make sure that there's nobody out there
Starting point is 01:12:21 listening for your car key frequency while jamming your car so that they could steal your car later or access your car later. And then when you go hit your garage door button, this somebody doesn't capture that frequency on 433 megahertz. Those rolling codes have already been broken for most of the models. So then you get in your car and you're driving to to your office or to your kid's school doing whatever you want and you know you could get out you let your kid out to school and now somebody as you walk into school just skimmed your back pocket and stole your credit card
Starting point is 01:12:56 information. So I mean all of that plus you remote, infrared, like a TV remote that goes for projectors, audio devices, ceiling fans, I mean, very simple stuff, along with access control badges, anything sub-gig or like key fobs or remote controls for anything, parking gates, so much. Everything. Everything. Everything. I mean, anything with a battery and a connection,
Starting point is 01:13:27 a remote connection, and any type of way where it reaches the outside of that device is hackable or has been hacked. What are these devices here? This is a water bottle. Ah! Ah! Ah!
Starting point is 01:13:44 So this right here is a this is a flicker zero with some custom modifications. And it does a lot. So this is just a proof of concept device. But when you start to add your own little additions onto it like this, let me, let me enable, for example, Wi-Fi. I'm not going to hack your Wi-Fi, but I'll give you a little example of what I could do. I'll just do something stupid, but. Okay, now we'll do, I'm not gonna shut your network down. Okay, so now, if I can show you on my phone or you can look at your phone, but you'll
Starting point is 01:14:35 see that instead of me mirroring your network, I just created a bunch of fake networks. So all of these networks here, they probably appear to be legitimate, right? Yeah. But they're not. These are all fake networks. They're all powered by me. So as soon as you connect to any of those, I have your password, I have anything in between.
Starting point is 01:15:07 So that's one thing, that's just Wi-Fi. And you just, oh man. So this is, is this how people are stealing information? This is one of the anyways. And airport. In an airport? Oh yeah, I mean, airport, Starbucks, when you, it's called a man in the middle attack.
Starting point is 01:15:28 So if I'm on the same network as you, I can essentially control the traffic, as if I was the modem or router. So instead of when you type google.com, instead of your computer telling the router, you want google.com, you're telling my computer, you want google.com, and I my computer you want google.com and I'm giving you what I I'm telling you google.com is
Starting point is 01:15:48 So that would be called a DNS DNS attack. So Is this what people are using in the airports when there's not this specific device? This is just something that I concocted together, but the flipper you can buy this thing on the top here is is custom I guess what I'm asking is this the method they throw soipper you can buy, this thing on the top here is custom. I guess what I'm asking is this the method? So could you, so let's, what is, what is Wi-Fi flight or go-go? Go-go in flight? Yes, go-go. They're actually, I mean, you can obviously,
Starting point is 01:16:19 you can hack anything, but go-go in flight, they have a pretty good segment on their network. So you're pretty safe with gogo. There's a chance of getting hacked, but not the same as like a Starbucks or here. Your network has to be segmented into chunks. And gogo segments it pretty well. Okay, I guess what I'm saying is
Starting point is 01:16:41 because you create a fake Wi-Fi network with that thing that says go go In flight one Yeah, I could do that. That must be it. I can do that here. I mean, it's I can make any any they're called sbssid's ssid's the name of a network You could do that with any name, but instead of that what you do is you just scan the local area And then you know, I just scan the local area. And then, you know, I know all the networks names around here, and then I'll target all of them
Starting point is 01:17:08 at the same time so that that way anyone in this complex or where we're at, you know, anyone that connects to a network is going to, you know, think it's their network and they're gonna connect to me instead. Holy shit. That's just one of many Wi-Fi attacks, so there's many ways to do Wi-Fi. What else can this thing do?
Starting point is 01:17:28 This thing's like the size of the palm of your hand. Yeah, well, with this little custom extension, especially when I have my big, these aren't the big antennas, but I got big antennas because I wanna get long range, but that's Wi-Fi. This side of things is also Wi-Fi, but also it's an NRF 24.
Starting point is 01:17:48 So it does wireless mice and keyboards. So if you use a wireless mouse and keyboard, not every single one of them is vulnerable but a lot of them are. I'd highly recommend you go back to wired, even though it sounds old school, that's what you should do. Because I could control your mouse and keyboard
Starting point is 01:18:04 with this device, and send keystrokes way faster than you can type them, and take over your computer without even having to see you or it, so I can do that through the wall. Let's scare this shit out of me. And then I, you know, I, this sub-gig or heard stuff with bigger antennas. Of course, I can go further away. So with car, car keys, garage, just gates, anything that's radio frequency I could do with this RFID. That's access control badges for doors and pull keys.
Starting point is 01:18:40 You know, anything that has like a little beeper where you beep into the, the door. Yeah. And NFC is credit cards and access control. And it does all some more things too. You could also like, I could tap your phone and give you my Instagram or tap your phone and give you my business card. So NFC is a little more versatile than RFID.
Starting point is 01:18:59 But they both essentially, I believe it's called passive devices. They're powered by the receiver. essentially or I believe it's called passive devices, they're powered by the receiver. They don't have a battery in them. So what, let's just run through just a list of all the things you can hack with that one little device. I mean, I don't wanna make it into an ad about flipper because it's not flipper itself.
Starting point is 01:19:21 Like I'll tell you, but I'm just saying that flipper itself, if you're gonna go online and buy one of these and expect to be able to do everything that I'm talking about, you need to have custom firmware, or software, whatever you wanna call it, that allows you to do that and you need to know how to modify it.
Starting point is 01:19:37 So don't go out spending $180 on this device, thinking you're gonna hack somebody's car or steal their credit card, because that's not gonna happen. But if you wanna go down the list, I mean, there's a ton of things. There's like, you know, all the radio things are just told you about the RFID stuff,
Starting point is 01:19:54 the NFC, which is the credit cards and more, infrared, which is TVs, projectors, and many other devices. GPIO, which is just anything that connects to the outside of this device, so I can make devices work, and this be the controller for it. I button, which is a form of authentication
Starting point is 01:20:12 that uses these things, these little metal prongs as a key. Bad USB, which emulates a keyboard, types like a couple thousand words a second. Oh, I'm sorry, I'm sorry, I you know, a couple thousand words a second. I'm sorry, I'm meant it. I'm sorry, a thousand words, a couple thousand words a minute. And then it also has some use cases that aren't hacking, like a two factor authentication.
Starting point is 01:20:34 This is a, you know, offline device where you can generate your two factor without needing a device that's connected to the internet. So it does that too. And then there's a ton of other sub applications that are on here, like hundreds of them that do little things. So a lot, just with this one device, this thing,
Starting point is 01:20:52 you know, it does just radio, but it does a lot more than this thing. Really? Yeah. What does that one do? This one you can hack airplanes with. I mean, that's the an extreme, but that's something that you can actually accomplish with. I mean, I mean, that's an extreme, but that's something
Starting point is 01:21:05 that you can actually accomplish with this using ADSB. You can choose either receive or transmit. So you can choose either receiver transmit ADSB with this device, and that's the frequency to teleplane, you know, it's call sign, and more and It's very illegal to do that of course, but if I wanted to go outside right now I could even demonstrate later for you. They can I pull this antenna. This is just a small antenna And we can receive airplanes to see where they're at. There's nothing illegal about receiving them Transmitting is where it gets a little bit funky, you know. But yeah, ADSB, this one does a lot. Something like a joke, for example, touch tunes, they're at a bar. There's a little jukebox machines, jukebox machines that you pay for. This device, brute forces them, meaning
Starting point is 01:21:59 it goes through 0, 0, 0, 0, to 999, looking for a pin code. And once it gets it, I can fully control that jukebox like I have on the owner of it. So you know, just for fun. Or Subaru Car, some years of Subaru, I have this pre-programmed that can unlock and unlock and lock a Subaru, no problem. I could do that with this as well,
Starting point is 01:22:22 but this thing way stronger, bigger range, way more support, way more programs out there. This device is a lot more dangerous in my eyes than that device. Really? Yep. Man, you are a, I think this is the fifth time I've said it, I think you are a dangerous man. Well, I'm safe, safe, you know, ethical.
Starting point is 01:22:44 You could be if you wanted to be. I'm trying to go into detail about these things just for the just for the nerds out there like me that are listening. I'm not going into exhaustive detail about these devices because most people are not going to care. So I'm just giving the general overview. Oh, I think I think they're going to care when they realize how vulnerable they are. No, I don't mean they don't care about what they can do, but they care about the technical specifics. We get a lot of our, pretty much everything that we have is from China. Okay. You know, all of our electronics, everything.
Starting point is 01:23:18 It all, what do you say, 90% of it probably comes from China? Do you think we need to worry about what they're putting in our electronics? Yeah, yeah, I mean, I'll give you one example. I bought this awesome vacuum and mop that's in one, all in one vacuum mop called Tinnico, and it completely connects to a Chinese server to transmit and receive information.
Starting point is 01:23:45 Like I made a joke out of actually I have a video of it where you can turn the audio on for it. Like when you plug in and it says charging, it started charging stopped. Like when you port it on and off, I can control that with my computer through a Chinese cloud server. There's no reason that that vacuum and mop
Starting point is 01:24:02 should connect to a Chinese cloud, cloud infrastructure, whatsoever, but it does. At any point, they could change the way that functionality works and take over my home network with this vacuum mop. Are you certain with a vacuum mop? Yep. How many devices do you think have these things in them? Anything with a Wi-Fi connection that's, you know, not everything's going to be China
Starting point is 01:24:30 be caning back and forth, but anything with a Wi-Fi, you know, anything with Wi-Fi capability is going to open up, you know, an attack vector. Washing machines, refrigerators, just, oh yeah. Why does a vacuum mop? I don't know. Wi-Fi capability. I'd love to tell you. machines, refrigerators, just, what is a vacuum mop? I don't know. Wi-Fi capability. I'd love to tell you, I have the video I could show you.
Starting point is 01:24:50 I could find it sometime, but I have that, and then I have the app. I could show you. I could adjust the volume. I could check when the last time I used it, it doesn't need to be cleaned. It tells you all that stuff, but it's using a Chinese server that I can control from my computer now that I've captured the traffic between the mop and the server. How many devices do you think we have that are connected to a Chinese server? And what would they be getting out of it?
Starting point is 01:25:18 I mean, it's all about data nowadays. So I mean, I think that data is the most important thing to them because it's worth money. And advertising dollars are, it would be spent better with targeted demographics. So I think that they're using that information to target you on the stuff that you need. You know, if you or someone that you love is looking up something, obviously Google's going to figure out how to target you on that thing and then sell that data to other people and they call it retargeting. Whereas if they have access to your direct network and they can see
Starting point is 01:25:57 things that you didn't even fully search out or you're typing on a different application like a chat application where you're not even searching about, you're just talking about it, that data is very valuable because they know about something before Google does, or somebody, some other large data broker. Interesting. What are five simple things that people can do to protect themselves from hackers?
Starting point is 01:26:24 Use a password manager, install an antivirus or consult with an IT company that has cybersecurity expertise or a cybersecurity company. One of those many options, but talk to somebody unless you're an expert yourself. Use an RFID blocking wallet, potentially if you want to be extra safe use a key fob that has an RFID shield on it. That way your key fob doesn't work outside
Starting point is 01:26:54 of that shield. Can't be cloned. Some cars require you know tap to start. So you know use something like that. Be careful with the websites that you're visiting. If the browser's telling you the site looks unsafe, then it's probably unsafe. And if you're told otherwise, make sure who's telling you otherwise is legitimate. And just be careful. And just use your common sense. If something looks too good to be true, it probably is.
Starting point is 01:27:22 Okay, what about we live in a day and age where you're getting spam calls every five minutes, you're getting spam texts every five minutes and a new marketing emails coming in every two minutes. It's ridiculous. Do we need to worry about that stuff? If I open a text, could I be hacked just from opening the text? Technically, yes.
Starting point is 01:27:47 I mean, like I said earlier, the zero-click attacks that they're willing to pay a ton of money for, there's government agencies that already have them. There was one going around for quite a long time. There was one going around for quite a long time called Pegasus. And then there was another one called Pegasus 2.0. And it didn't require any user interaction from anyone.
Starting point is 01:28:10 You would just send to a phone number, they'd have full remote access to your phone. Even without opening the text. Without opening anything. Holy shit. How do you defend against something like that? You can't. There's no way to defend.
Starting point is 01:28:24 That's why they're so valuable, because there's nothing you can do. How do most hackers get in? Do you have to click a link? Yeah, yeah. I mean, sometimes it's a link, sometimes it's a file, sometimes it's a photo, sometimes it's a chain of exploits, of multiple things that turn into it.
Starting point is 01:28:43 It could be a Word document. It could be anything. When it comes to zero days and zero click exploits, it doesn't require any user interaction and you will not know that your phone's infected. Damn. Yeah, so I can't even give you a good answer for it. This is scary stuff.
Starting point is 01:29:02 I could, I might as well have it on my phone right now. I have no clue. I mean, I'd as well have it on my phone right now. I have no clue. I mean, I'd likely see the traffic going in and out of it, but there is still the chance that it could have it. All right, let's take a quick break. And when we come back, we'll get into what you're doing now. I want to tell you about a product
Starting point is 01:29:21 that personally resonates with me as a former long-time dipper in the military. Black Buffalo. Black Buffalo is a tobacco alternative that does not contain tobacco leaf or stem. It's made here in the USA with only the finest ingredients. Like specific varieties of edible green leaves, food grade ingredients, both with and without nicotine. Black Buffalo delivers the same experience as traditional smokeless products. The Black Buffalo herd never compromises taste, value, or quality. Being a part of the Black Buffalo herd is not about following.
Starting point is 01:29:56 It's about charging ahead on a path to keep the ritual. If you're a smokeless tobacco user, give Black Buffalo a try. I'm pretty confident. I'll see you on the new trail. Black Buffalo is available for sale online and in thousands of stores across the country, like racetrack here in Tennessee. Head to blackbuffalo.com to buy or check the store locator to find a retailer near you. Use the code SRS at blackbuffalo.com right now and say 15% off your first order. Black Buffalo. No compromise. Different leaf. Same ritual. Warning. This product contains nicotine. nicotine is an addictive chemical. Black Buffalo
Starting point is 01:30:39 products are strictly intended for use by current adult 21 plus consumers of nicotine or tobacco products. The US dollar. How many of you out there still have any confidence what's so ever in the US dollar? Probably not very many. I don't either. You see, there is a growing concern on the devalueization of the US dollar right now. And rightly so, here's why inflation. We are at an all time high right now on inflation. It will now cost you $12 to buy one cart of eggs that is absolutely absurd. Let's talk about interest rates. Interest rates through the roof. If you're in the market to buy house right now, you're going to get roughly 50% less house
Starting point is 01:31:34 because they've raised the interest rates so high. Let's talk about the stock market. Way down, especially the tech stocks, crypto, way down, Congress, spending more money than you or I or anyone else we know can even fathom counting. And the feds, what are they doing? They're just printing money like it's nobody's business, devaluing our dollar. Meanwhile, China is running around the globe right now. Striken deals, latest one, Saudi Arabia and Iran,
Starting point is 01:32:11 new oil deals, trying to turn the yen into the new reserve currency, which in turn will devalue our dollar. It might be time to start looking at where to protect your money, and you might want to look at precious metals. I believe golden silver is one of the safest assets to protect your savings in your retirement against inflation and recession. If you're interested in investing in gold, I suggest you call my friends at Lear Capital. A lot of folks these days are extremely concerned about the 401Ks. Ladies and gents, if you're looking for a solid investment, talk to Lear, they can roll precious metals investment right into your 401K, call them today.
Starting point is 01:32:57 It 1-800-741-0551 or go to learshon.com. I started investing in gold back in 2020 when I saw what was going on back then. I knew we were in for a financial crisis and I started investing in precious metals immediately. Once again, call lear at 800 741 0551 or go to learSean.com and get your free gold and silver investor guides and receive up to $15,000 in free bonus metals with a qualified purchase. Information contained within Lear Capital's website is for general educational purposes and is not investment, tax, or legal advice. Past performance may not be indicative of future results, consult with your tax attorney or financial professional before making an investment decision. All right, Ryan. We're back from the break. We just got a whole class on hacking and all the
Starting point is 01:33:58 stuff that you're capable of and all the things we need to be worried about. But let's talk about why you came here and that's what you're doing now. You're basically hunting down these people that are exploiting children sexually on the internet and in person. I know you have a couple of horrific stories. One guy that was, I think it was his daughter in the bathtub. Yeah, yeah, so I'll start, you know, kinda where that all came from. I was at a friend's house, and I got a text message from my friend's wife.
Starting point is 01:34:37 And it was multiple photos of screenshots of this website that was, it was clear from the screenshots that the website was on the regular internet, anyone could access it. And should I name the website? Yeah. It's no longer up, but it was. .co.
Starting point is 01:34:56 So. .co, and that website went down and ended up being .co, like T.As and Thomas, oh, as an Oscar. So I see this website and I see the content in these screenshots that my friend's wife sent me. She doesn't know anything about computers, but she has kids herself and she was like, can you do something about this?
Starting point is 01:35:17 And I read this content and one of them was talking about a mother that wanted to have kids and then have the kids be b******, so that when the kids grew up, that they could have b****** and go even further. I mean, I'll pull up the screenshots because I'd like to explain where my head was at that time. But as soon as I read these messages,
Starting point is 01:35:47 I guess I switched flipped to my brain, and I left my friend's house immediately as I got the text, and I was, I went home, I didn't know for sure that I was going to be able to get into this website, I just knew I wanted to do something about it. And I found a vulnerability in their platform. I got in, and from that point on, I started to to exfiltrate the data every single day. All the users, I noticed that a lot of people were soliciting on the site. So I didn't want to download those messages in case of the fact
Starting point is 01:36:21 that I'd pull in some images that I'm not allowed to have. And nor do I want. So I made sure to only download the publicly-facing stuff, which didn't include... It had some very graphic text, but it didn't include anything illegal, which I think it should be illegal to talk that way, but it was horrible stuff.
Starting point is 01:36:40 What were some of the... So you started this basically from a text conversation with a concerned mom. That's what got you into it. What's some of the text that you saw on a record? I'd like to read them too, if you want. I still have them. Read them.
Starting point is 01:36:59 So this is, before I was, before I ever caught a single predator in my life, this was the beginning and what set my brain off to wanna help. That this is before I even heard of this website, before I heard of anything to do with it. Okay, here they are. So the title, should I read these, like their graphic?
Starting point is 01:37:27 Yeah, I read them. So the title of this post is, who wants to bang these little little and then somebody replied underneath, I've got first dibs on the little Joseph Fritzel, Maximilian, which is there's two different users there.
Starting point is 01:37:47 Pick for yourselves. And this was the photo that they used. Oh my God. That's just one of three. Three tech business. These girls look like they're six. Very young. Yeah. And then there was that one story where I told you about the I can't see it, but the story I told you about the bathtub situation where there was a father who posted their child in the bathtub and They it's said underneath of it. Um, they have no idea what's gonna happen to them tonight and then underneath of it, they have no idea what's going to happen to them tonight.
Starting point is 01:38:26 And then underneath of that, there were people that were part of this website who were saying what they were going to do to this child. And this wasn't just some fantasy that this guy was talking about. This was a guy posting his child in the bathtub, like, for real. It really was his child. I assume he was a man, but it was apparent. You know, so that really got to me. And then I got another part of this text message.
Starting point is 01:38:53 I'll just read one more of the three. And this one says that they are a 16 year old. A lot of these people were role playing to be children. And in our investigations, we found out there was a lot of actual kids on this website, real kids, that were under 18 at the time of this, when I hacked the site. What are they doing on there?
Starting point is 01:39:14 They're selling their bodies for money to these people. Yeah. Kids prostituting themselves. Yes. Yeah, so one of them, I don't know if this is a real 16 year old or not, but what was said was pretty disturbing regardless. It said, God, I really want to be a mom.
Starting point is 01:39:32 I need someone who wants to. It's 16 year old. When I have our daughter, I'd let you do whatever you wanted from whatever age. Make me watch as you. It's a It's a It's a It's a It's a It's a It's a It's a It's a
Starting point is 01:39:42 It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a It's a Make me watch as you... BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP BEEP trying to f***ing little. Oh my God. So when I got these text messages and reading them even in current day right now, it makes me sick to my stomach to even think about and I know they're gone. So, I mean, not all, these people are still out there,
Starting point is 01:40:23 but the website's down. How many people are on this website? At first, I thought it was a couple thousand. When I cleaned up the database and figured it out, there's about 7,000 people in just this one website, and we have a total of five. You have 7,000 people on one website. You've...
Starting point is 01:40:44 And you couldn't become a member of this website, You have 7,000 people on one website. You've... Mm-hmm. And you couldn't become a member of this website unless you answered an application where you had to answer a question that was something like, are you okay with doing something horrible with a three-year-old and all of their holes? You had to answer that question in detail. I forget the exact verbage of the holes. You had to answer that question in detail. I forget the exact verbage of the question. It's posted somewhere in regards to this interview or project veritas, one or the other, but you had to fill that out to become a member of the website you just saw. And which would tell me that either you're an
Starting point is 01:41:20 undercover cop or you're an actual predator on the site. I mean, who would answer a question like that, even if they were just curious? These are multiple, so it's a whole questionnaire you have to do to get into the site. There was a few questions. I think two or three, they were really horrible, but you had to answer them, or they would not approve you to join the site.
Starting point is 01:41:39 Is there any other prerequisites to get on sites like these? Yes, so what I learned in this process doing the investigation and exporting, everything that I could legally export, I found that they used a chat app called Telegram and they were going back and forth talking about, about, you know, a **** and then they would call it cheese pizza
Starting point is 01:42:03 and use all kinds of different phrases for it. And I realized there was these moderators in the chat rooms outside of the website where if you would send them they would let you into another group which was full of but of course I couldn't do that. So I never got to see past that part but I do have evidence of that being a thing when I have
Starting point is 01:42:28 Because I exported all the chat logs so I can it shows that if I were to send something horrible to one of those moderators I would have seen something even worse which is hard to imagine and you know, we are already seeing here What did you what did you do with that information? It helped, actually, let me backtrack. I'm sorry. How long did it take you to crack into that website and get this information? I wasn't sure, like I said, when I got the text messages
Starting point is 01:42:56 and I wanted to try to take, my goal was to just take the site down. And I knew I could make that happen because it was on the clear net, regular internet for anyone to visit. I knew I could do that, but I didn't know if I could actually get access to their server. Once I found the vulnerability, maybe an hour, two hours at the most,
Starting point is 01:43:16 if I could remember correctly, it wasn't long. And they never found out they were hacked. So to this day, they never found out. And they will never find out. I mean, unless, unless somebody in that database is watching this, now you know, you're on, you're, I have your data and we will find you. I actually recommend you come forward so we don't have to make the story up for you. What did you do with this information? So, as soon as I got the information,
Starting point is 01:43:48 I thought it was a slam dunk. I thought like these people were going to jail. And I thought that maybe I solved something that the FBI or somebody was working on for a long time. And I instantly went to the Exploited Children Tip Line, and I submitted, you know, saying who the owner of the website was, that I had access to all the data, and that they're welcome to have it, basically. Then, I reached out to a bunch of news articles, I'm sorry, news stations, and talked to a
Starting point is 01:44:21 ton of reporters, and all of them were super excited to talk to me. What news stations? Sunset and all, Daily Mail, Business Insider, Fox, some influencers, Ronan Farrow, Candacellans, they both didn't read my messages, but as for the news stations, I had full conversations with the reporters, they knew what they were getting themselves into.
Starting point is 01:44:45 They were very excited about reporting on it. And once it got back from legal, they weren't allowed to report on it. And I said, well, okay, if you're not allowed to report on the illegally obtained material that I have, just let parents know that this website exists and whatever you want, but just keep whatever legal out of it. I just want them to, parents know that this website exists and whatever you want, but just keep whatever legal out of it. I just want them to, parents and no,
Starting point is 01:45:08 that this website exists. You don't need to put my name, you don't need to put the material that I've obtained. Nothing. Every single one of them completely disregarded me. I send a lot of those notes over to Project Veritas with some evidence of that, but not a single person until now has done anything about this.
Starting point is 01:45:27 Not one, not any conservative media, not any liberal media, because unfortunately that's a day and age we live in now, right? Right. None of them, none of them would touch this. None of them want to be involved in saving kids. When I say I tried, I tried so hard and nobody wanted to do anything.
Starting point is 01:45:51 So what wound up happening with the information? So... Non-forcement didn't want to get involved either. No, so I called my attorney locally and I called an attorney in Virginia because the owner of the website happened to be a Democratic politician and ran for Congress two times. His name is Nathan Larson, and I'll explain more about him in a second, but I talked to a lawyer in Virginia because I knew that's where he lived, and I wanted to see what I could
Starting point is 01:46:21 do from there. So the lawyer in Virginia basically told me she didn't know what this site, she never heard of anything like this. The lawyer in Florida reached out to the local task force, let them know that I had access to the information and then as well as doing that tip line. So from that point on, all of these new stations
Starting point is 01:46:43 and all the law enforcement connections, whatever you want to call them, they all were fully aware that Nathan Larson was running this website, that he ran for Congress twice, that he was an extremist, he did crazy things, but he did run for Congress two different times in Virginia. So I thought that they would take that seriously. Well, completely ignored. Completely ignored it. Project Veritas gave me access to some of the stuff
Starting point is 01:47:11 you guys are working on together. And in one of those videos, you're reading a quote from Nathan Larson. I'm gonna read it right now. This is from Nathan Larson, Democratic politician in the Ramfork B.A. Congress multiple times, ran a website for pedos to discuss their dark intentions and fantasies. Here's the quote, it's not enough kids and take their innocence. You also need to reproduce the next generation with them. Let them see that you prefer to
Starting point is 01:47:45 the offspring you have with them, then to continue to have with a woman who is no longer jailbait. The quote continues, but you can still be sometimes just let her know though that what you love her for the most is producing with you is producing with you a fresh new young girl And that this is her main value in contribution hat you think finally of her This is disgusting. Yeah, sorry. You think finally of her for because that beautiful daughter reminds you of her. The average on farm income in the United States was a loss of $1,100. 60% of US port comes from one company, wholly owned by the Chinese.
Starting point is 01:48:43 And farmers are more likely to commit suicide than veterans. Folks, we got a problem. I'm Lucinda, a generation farmer and founder of Moink. Lu plus oint. We offer grass bed and grass finished beef and lamb, pastured pork and chicken, and wild caught a laskin salmon, shipped straight from the heart of rural America. Come stand shoulder to shoulder with us by putting the family farm at the center of your supper table.
Starting point is 01:49:07 What's in it for you? You mean besides saving the family farm and enjoying the highest quality meat on God's green earth? Geez, want me to hang a moon for you too? I'd love to. Go to MonkBox.com slash yum right now and get a free gift in your first order. Get to getting one of the good news good. Go to MonkBox.com slash yum.
Starting point is 01:49:26 Monkbox.com slash yum. I guarantee you're fixing to say, oink oink, I'm just so happy I got more. It's unimaginable. It's like how do people think this way? But there's so many people that think this way that it's alarming It's the word for it. I don't know how how else to put it It's way more people than you'd think and you'd like to believe
Starting point is 01:49:54 Cobb words pizza and cooking and Cheese pizza. Mm-hmm stands for Yep Mm-hmm. Stands for... ...s**t. Yep. This is disgusting. Yeah. It gets only worse than that. You know, it's really bad. How much worse does it get?
Starting point is 01:50:20 Worse. I mean, people... This is a person talking about it, and it makes me uncomfortable, it just isn't much as it makes you uncomfortable, but you know, these people, what they're talking about, they're doing, you know, this guy isn't some guy with a bunch of fantasies, this guy got arrested six months after, nobody did anything about it, and you know, like I said, I try my best, he gets arrested six months later with a 12 year old at a layover at an airport after he's a fucking kidnapped her.
Starting point is 01:50:49 So not only did he talk about it, he did it, and he got caught. You know, as for some other people, I don't know how much more I can go into it, but one guy we're investigating as of 2020, which is after I submitted the data. He got in trouble for doing something horrible to a child as well, became a fugitive, and I think they eventually got him. But, you know, we're not even close to through the list yet, and, you know, we got a lot more people to expose,
Starting point is 01:51:17 and they're not just talking about it, they're doing it. Let's backtrack real quick, because you kind of breezed over what happened. So, the guy with the pit, with the daughter in the bathtub. Yeah. What happened? That guy with the daughter in the bathtub, I don't know where he went.
Starting point is 01:51:35 He's part of the database. I'm talking about the guy that got arrested in Denver. Oh, that's Nathan Larson. Okay. So Nathan Larson, he got arrested six months after the fact. After I hacked his site, after I submitted it to the authorities to all the new stations, he gets arrested with a 12 year old girl and gets arrested for kidnapping. And I don't think he got charged with rape, but he got the kidnapping charge.
Starting point is 01:52:01 Nathan Larson then went to federal prison for that. And you know, the website went down. And you know, he sat in prison for, I forget what the sentence was, but it was quite a long time. And to my knowledge, when you're a person like him, you are going to be put, you're going to be separated in a federal prison from the regular inmates. And, you know, spoiler alert, but Nathan Larsen's dead.
Starting point is 01:52:32 And the reason why he's dead is due to starvation. The news says that it's suicide. If I had to guess the inmates that were, you know, responsible for feeding him, just let him starve to death. And I believe he deserved every second of that pain. You and me both. So there's been five other sites that you've cracked into.
Starting point is 01:52:58 So when I hacked RAPI, Nathan left backups of his previous websites on the same server. So I really only took one site to get for all five. How many names altogether? I can't give you an exact number. I'm not sure. I bet it's tens of thousands. Tens of thousands, if people. Are these people all in... Do you know where they're all at?
Starting point is 01:53:24 They're all over the country. Some are international, but most of them are in the country. So when did 561 PC start? So 561 PC is an organization that I created with a friend, Scrappy, is a MMA fighter. It started because of the frustration that nothing happened from this original, this whole ordeal. We're talking two and a half years after the fact,
Starting point is 01:53:53 I've been looking into information on predators for organizations on YouTube, anonymously, with my name not attached, whatsoever, just finding information and sending it over to the organizations, and then they would go and confront them themselves. And I did that for many organizations, like I said, completely anonymously. I wasn't looking for recognition
Starting point is 01:54:15 or my name to be attached to anything. I meet Scrappy, Dustin Lamproge, whatever you wanna call him. He's a really good dude. And he had... Scrappy's a really good dude. And he's a... Scrappy's a professional MMA fighter in the UFC, correct? Well, he didn't get his call for the UFC yet, but he's, you know, eight no one defeated, seven knockouts. He's likely going to get the call.
Starting point is 01:54:36 He's on the way. Yeah, yeah. And even Dana White knows who he is, I believe. It's, you know, he's a good dude outside of fighting. He's a very nice guy, gentle heart, you know, religious guy, you know, great, great person in my eyes. So he was a good partner to pick for this upcoming project. And I brought up, I was like, hey man, you know,
Starting point is 01:54:59 do you know how bad it is on the internet? Like I told him the story that I just told you. He was blown away by the fact that nothing happened. And I told him, I said, like, you know, let me show you, let me show you how bad it is, not just tell you. So I was like, Google search, uh, teen chatroom, Florida, or, you know, it was something of that, something similar to that. So we googled it. I told him, click any chatroom, I don't care which one it is. He clicks the chat room, you click guess, you click guessed, you know, you don't have to make an account, made his name, Ashley 13, female, Florida, something like that.
Starting point is 01:55:31 And just said hi in the chat room. And within five minutes, he must have got 40, 50, 60 messages from grown men, some naked, some, been trying to video chat, some saying that, you know, they want to meet up, and very horrible things, like grown men hanging out in these teen chat rooms. From that point on, he realized how serious this actually was. And I was like, hey, well, you know
Starting point is 01:55:54 that it's not just these chat rooms, it's most of the time it's social media apps, like Facebook, Snapchat, Instagram, Twitter, TikTok, Tinder, all of them. It's anywhere kid has access to Roblox, Instagram, Twitter, TikTok, Tinder, all of them. It's anywhere a kid has access to roblox, Minecraft, their Xbox, when they're talking to their friends, these predators are on everything. So I said to them, hey, if we get some decoys in there
Starting point is 01:56:16 and they grown women or grown men, they pretend to be children. We can go and try to catch these people and expose them in real life. Just the same way I've been helping organizations for two and a half years do it, except instead of me sending it to them, we'll do it ourselves. We'll clean up our, you know, at least try our best to clean up our, our, our town in South Florida. And he was like, yeah, man, I'm definitely down to do it.
Starting point is 01:56:40 And of course, you know, at first you think when somebody says they're down to do something like that, it's a hit or miss, but he was like he was all-point ready to go and You know, we've caught 14 people now in a couple months of doing it and you know local law enforcement delirious police have been incredible and We're just going to continue to grow you, if anybody's interested in checking that out, it's at 5, 6, 1, PC, like 5, 6, 1, Predator Catchers on Instagram, same for YouTube. And yeah, you'll find me there,
Starting point is 01:57:15 and you'll also find Scrapie there. Let's rewind. What was your first operation like? My first what? Your first operation. What's the first guy you guys caught together as a team? How did that go down? So the first guy we caught as a team was just a complete test Scrappy and I used an app called Grindr which is a gay dating app for the most part not not only gave it mostly gay and
Starting point is 01:57:42 We both used a filter to make ourselves look younger. And we just started talking to any guy that messaged us. We didn't message anybody first. We waited for people to message us. And one guy eventually, within an hour, decided to talk to us. And we went out and met him, called the cops. And the guy ran to the bathroom.
Starting point is 01:58:03 We couldn't film in the bathroom. Where'd you meet him? Right on the Atlantic Ave in Del Rey in front of a million people. And I embarrassed. I screamed at the top of my lungs at what he was there to do. And I don't do that anymore because you can get it to sort of be conduct for that.
Starting point is 01:58:18 I didn't know that at the time. But that was my first encounter. The guy just ran to the bathroom, though, and hid until the cops got there. And at that time, the cops had no clue what was going on so they just let him go. Have you gotten anybody arrested? Yeah, multiple people.
Starting point is 01:58:34 How many? Uh, three so far. Let's go over the first one that you got arrested. What did that operation look like? Um, I want to actually, actually, do you mind if I go over the guy that I know that full story of right now? Some of them are active. So one guy, we have a YouTube video
Starting point is 01:59:02 and we made them, you know, I do pull up. I'm sorry we're gonna do push-ups and set-ups, you know to distract them while the cops were on their way and He said that you know that the girl had breeding hips and I believe he said something about I wanted to take a shower with or something like that and to take a shower with or something like that. And how Florida works is they have the police station and then they have the state attorney. Some states have district attorneys,
Starting point is 01:59:30 some states have state attorneys. I think they have the same thing, but they're just named differently. But the state attorney is one that ultimately makes a decision on the, if the person's gonna be convicted or charged with these charges, but the cops make a decision on whether they're being charged with.
Starting point is 01:59:45 So, who meet the guy, he admits to everything, you know, that he said in the chat logs, he admits to maybe even a little bit more, then he admits it again to the police officers. He goes in the interrogation room, I send the chat logs and the video to them while they're interrogating. He admits everything to them
Starting point is 02:00:03 because it's not evidence until the predator says it. Like, our evidence isn't valuable because we're vigilante. So, you know, it's not technically evidence unless the police obtain it. So, all of that went well. The cops spent Delray Police spent a ton of time building the report out for this guy,
Starting point is 02:00:23 state attorney, you know, was kind of iffy about it, it seemed. And the entirety of the case was thrown out because there's no shower inside of Walmart. So there's no way he could have showered. You've got to be shitting me. Yeah. So it's a little bit rough. We had to meet him. Do you know who's responsible for that case getting dropped.
Starting point is 02:00:47 I don't, I know it's a state attorney for whoever Palm Beach County, for Palm Beach County, but yeah, I don't know the exact name. Is that an elected slot? I believe so. We should let that name up and post it right here. It's wild to me, but the one thing that I can say is that one of the sergeants who used to be a detective did have a meeting with us right after that and told us what the state attorney would be looking for to secure a conviction.
Starting point is 02:01:14 So we are trying to fall within those guidelines now. We call the cops regardless every time, but we're not sure if we're going to get in a rest or not. Unless it falls within the guidelines that we're told. Ryan, do you think you could demonstrate right here, right now, how fast these sexual predators will show up in a chat room? Yeah.
Starting point is 02:01:34 Fire your computer up, let's do it. There's one guy here who was 47 years old, less than a minute, who wants to talk to a child in a teen chat, and I only said hi in the chat room, nothing else. Holy shit, dude. You jumped in a chat room. You called yourself Ashley 13, New Jersey. Literally less than 10 seconds. We have a 47 year old Wanted to want to have sex with a 13 year old girl. Yeah
Starting point is 02:02:04 Yeah, that's how quick it is. Like, I Google Teen Chat. I'm in a different state. So I get different results here for the local Teen Chat. There was no way for me to set it up. You know, all I did was say, high in the chat room and press enter. And, you know, a bunch of messages came in,
Starting point is 02:02:22 somewhere for actual Teenagers as it should be in a teen chat. And one of the guys, who knows if they really are teenagers, that's another thing, but one guy was open about that he was 47 years old and he was completely fine with the age. Where all is this happening? Is this happening just list off where this is happening that's that everyday people use all the time.
Starting point is 02:02:47 Facebook, Instagram, TikTok, Snapchat, kick, WhatsApp, Roblox, Minecraft, Xbox, PlayStation, Xbox and PlayStation. Yeah, because you can chat with random people in games that could represent themselves as whoever they want. Yeah, yeah, I mean, the list goes on. chat with random people in games. They could represent themselves as whoever they want. Yeah, yeah, I mean, the list goes on. Anywhere where a human can communicate with another human, the child is not safe, so parents need to be watching that.
Starting point is 02:03:17 And not just assuming like, if your kid says, hey, I'm on that phone with my friend, which friend is it? Is it one that I know? You can't be scared of being a helicopter parent because if your kids aggravated at you for a couple of minutes or being overprotective in these scenarios, I think it's worth,
Starting point is 02:03:37 it's not your fault regardless of what happens, but to save them from a life of trauma, I think it might be worth the extra couple of minutes or aggravating your kid to See who they're actually talking to see which who their friends really are and Just spend that extra time because it could save a lifelong Battle with trauma this happened to somebody I know in in parkland, you know I'm remember I used to live in Boga, so I got a lot of friends down there.
Starting point is 02:04:05 Having in Parkland, he's got a daughter, couple daughters, and she was, she was blackmailed by somebody and had taken pictures and it's everywhere, just as you just demonstrated it, I mean, 10 seconds, less than 10 seconds, I mean, 10 seconds. Less than 10 seconds. And he's on there. Yeah, is this the case every single time? Uh, yeah, yeah. Some of the guys want to chat for longer before they meet up in person.
Starting point is 02:04:36 But, uh, yeah, it's that easy. It's not good that it's easy, but it is that easy to find them. They're out there, and they are being predatory. Like the name states. How? I don't know what to call it. I don't want to call it a success rate. But what is the percentage of people that you're talking to on here that will come and meet?
Starting point is 02:05:08 Depends on how long you talk to them, and if you can convince them that you're not a police officer, would you say the majority of them? Way more than the majority, yeah. 90%? Yeah. Over 90%? It depends if they asked to meet or not yet, because sometimes it takes a while for them to chat.
Starting point is 02:05:27 So I would say yeah, if they asked to meet 95% plus, if they asked to meet up. 95% you think? Yeah. Damn. How did Project Burritos get involved with it? They saw a viral podcast and me talking about the website and they were interested and they said, well, I want to help you bring justice to what the other stations failed to bring justice to. And the FBI even failed to or everybody failed me. I felt like they failed me. And Project Veritas said, hey, we will do something about this.
Starting point is 02:06:07 We'll put our whole team on it. We're going to bring light to this. We're going to bring these people out of the dark corners of the earth. And it made me feel like, okay, I have a team here. I have people that we're willing to fly across the country and meet me in a 24 hour notice, which they did, to have a conversation. They flew me out to New York to do an interview, you know, just off my word. You know, I could have been lying.
Starting point is 02:06:37 I could have been a member of this. Who knows what they, what they didn't know who I was. So they just took my word for it and they gave me the most compassionate love that I more compassionate love than I would have ever expected and still are to this day. What is this collaboration between you and them look like? How are they? Are you you're obviously feeding them all the information that you've uncovered so far? Are you still getting more information? So no, so right now we're going off the data that I already have, which is so much, especially
Starting point is 02:07:11 with Nathan Larson's websites. The one we're focusing on at the moment is rapy.co and .to. So anyone that was on that list is going to be investigated. We have all of their information or ways to find it. So we're just going to go down that list, keep exposing them in person and we've found quite a few already. So it's only going to get more extreme, especially as the team gets bigger.
Starting point is 02:07:37 And hopefully we do some justice, put some more in prison, uncover some secrets. just put some more in prison, uncover some secrets. How are you guys, so they sent me, so this interview is time perfectly. When Project Veritas starts to release this information, we're right behind them, we've talked to them, we're collaborating with them. We wanna just dump gas and amplify what you guys are doing to get this word out. So what does this collaboration look like between you and them?
Starting point is 02:08:09 You're feeding them the information and then how are they reaching out to these guys and how are they getting them to come in and confess to this stuff? So they have their own ways of dealing with undercover operations and like filming undercover. But when we find the information on the people, we're going off the database, we're taking the information per user, we're tying that to what we know. We have some archived images of when the website did exist. So we can say, this user said this at this time or replied to this at that time, figure out who that user is, and then organize a team to go out there and meet them. But the process of finding out who
Starting point is 02:08:54 they are is called Ocent or open source intelligence. And Project Baratoss has been doing that already for years, as well as me. It's I specialize in an Ocent and obviously being a hacker. It just comes with the territory. So, working together as a team, finding these people has been no different than what I would do on a daily basis, except it's just making a bigger impact. How many guys have you guys put in prison so far? I don't think I can talk about that part yet.
Starting point is 02:09:24 Okay. Yeah. We'll wait. of you guys put in prison so far. I don't think I can talk about that part yet. Okay. Yeah. We'll wait. Let's talk about the John Lewis confrontation. He was on rapy.to website with his email link to it. He says he found the website through a telegram group. Yeah.
Starting point is 02:09:44 First, he admits to having a fetish to young children, went to therapy for help with that addiction. His God has been going for many years and has made a little progress with his addiction. Addiction to porn, right? Yeah. Yeah. Do you want to talk about that interview at all? Have you seen that? Yeah, I watched the interview and Do you want to talk about that interview at all? Have you seen that? Yeah, I watched the interview and the guy is in a facility for his addiction to porn, but was completely cognizant and coherent, or, you know, he wasn't like a mental health
Starting point is 02:10:14 case to where he couldn't, he didn't know right from wrong. He definitely was fully aware of what he was doing. He, like I said, he's one of 7,000 on that list, but he did admit on an undercover camera that, you know, he was to child, he was soliciting, and that he was a member of not only but those telegram groups I mentioned earlier that were, you know, trading and soliciting child. He admitted all of that clear his day on camera. So that will be forwarded along to the police and we'll see what happens from
Starting point is 02:10:51 there but that was very recent. His confrontation. The application question to join the group. We've already gone over this. If a man wants to his three-year-old daughter in every while she is s*** Do you have a problem with that? Please elaborate on your thought process so we can better judge your suitability for this site. John Lewis's response,
Starting point is 02:11:15 I do have a problem with that, that's disgusting. Then they expose the conversation, make a video s*** in the school basement. Denied it, it was a lie, denied receipt, passed. He only admits to having seen but did not distribute it. and then confessed who have looked or seen images, never physically acting on those urges. And then later confessed, right, and says that he never did any of that,
Starting point is 02:12:01 and if what he says that he did on the forum, he legitimately says that he did in the formula, legitimately says that he's a kid in the basement across from the school, and just by a chance, that's where he lives across from the school, whereas parents live. So, you know, he could say he did, nor he did, but the fact that he admitted to... Like, I've been in some very, very tough spots in my life,
Starting point is 02:12:24 but I've never thought about a child. Ever. And I doubt you have either. It's a... If you... I don't trust anything you say. So, if you tell me on a forum that you... ...can't the basement, you probably...
Starting point is 02:12:41 ...can't the basement. That's what I'm gonna safely assume. Do you know what happened to this guy? That's like I said, so that one's so new that I'm not sure what's gonna happen to him, but hopefully... He's still out there right now though. Yeah.
Starting point is 02:13:01 Yeah. How do we solve this shit, man? There's no way to solve it for sure, like, you know, it's never going to go away. And unfortunately, we have some states that are trying to normalize it. We have states that are trying to make it a sexual orientation. And then we have other states like California being the main one that I know of. What are they doing? They're trying to make it a sexual orientation. I think they're calling it something attracted minors or something.
Starting point is 02:13:29 They're making it a little bit more attractive. They're making it okay. We need to accept. So now we need to accept people who are little kids. Yes. That's what they're trying to do. We need to accept that now. Yeah. California is one state that they're trying to do. They're trying to do. Yeah, California is one state
Starting point is 02:13:46 that they're trying to make it part of a sexuality to be attracted to children. It's a sexuality to be attracted to children. Do you have any other states that are doing this? I could Google it, but in California is the main one that I know of. Not surprising. Yeah, not surprising either.
Starting point is 02:14:04 Not surprising at all. Yeah, so that blows my mind that that's even a thought. And then there's people that defend these guys. It's a mental illness, it's a sickness, it's that. I don't care what it is, because it affects somebody else. It's gonna ruin somebody's life forever. Why do you think these states are pushing the ship? I don't know.
Starting point is 02:14:24 I don't know. I don't know. But Florida, I'll give you a good example. I mean, DeSantis is trying to pass a bill to issue the death penalty for sex crimes against children. From what I understand, that's in place. Is that in place now? Is it locked in? I mean, it must have been recent, if so, but...
Starting point is 02:14:41 I don't want to misspeak, but the way I understood it is that it is in there now. and that if you're doing this shit and you get caught, they're going to fucking kill you. I love that. Why is it... That should be the case everywhere. My opinion. Why are all the Democrat states trying to legalize this shit
Starting point is 02:15:04 and make this normal. I don't fucking understand that. I don't know. I don't know how you can vote for that shit. I don't know how you can affiliate with that shit. I don't know how you can think it's okay. It's fucking disgusting. Yeah.
Starting point is 02:15:18 Yeah, I agree with you. I agree with you. It's like, you know, they're not only like that. They're not only like that. Kids. Yeah. They're creating people who defend, they're not only styzing kids. Yeah. They're creating people who defend them.
Starting point is 02:15:27 And people are voting this shit in. Yeah. Fucking Newsom, Gavin Newsom got recalled and they voted him in again. And look at this shit. Now he's making this shit normal. I mean, I hate to get fucking political, but what the fuck is wrong with these people?
Starting point is 02:15:42 I agree with you. Great. So I can't explain. I wish I could. I wish I could explain why we just got a message in 10 seconds and a random chat room from a 47 year old man wanting to... BEEP! But I can't. I have no explanation.
Starting point is 02:15:59 And all I know is that we need to find a way for parents to be educated and for kids when they get old enough to be educated so that this doesn't happen to them. Now, that's all I know that I could do. And the only other thing I know I could do outside of educating parents, schools, children is help some organizations out that de-cumin trafficking and victims of any type of sexual assault, whether they're children or adults. I have the resources and the team and the skill set
Starting point is 02:16:32 to be able to help people. I just need those people to be put in place. As well as let's say parents monitoring their child on an app. I have some ideas in my head for apps, but I don't want to plug a specific app if I don't know if it's great or if I can trust them. So, even if you don't plug an app, Brian, what do these apps do?
Starting point is 02:16:53 Like, so, if I put this app on my son's phone, what do I get? So, you're going to know where he's at at all times. You're going to be able to read his text messages. You'll be able to check his app usage. You'll be able to, you know to lock down certain parts of the phone that you don't want him to be on. And just basically as if you have access to the phone, but you have more access than him.
Starting point is 02:17:17 I think it's more important to do that and have your kid aggravated at you than like I said, the latter. Yeah, I mean, I would 100% agree with you. So basically these apps. With the one in 10 people before the age of 18 are sexually assaulted and 40% are 12 years older under. I didn't know that.
Starting point is 02:17:39 Yeah, I mean, that's 40%. 40% are under 12. So it's important to do this stuff, you know? So with these apps, so the way I'm understanding what you're saying is if I put one of these apps on anybody's phone, I basically get control just like you were talking about earlier, people's computer, I can control everything they're doing
Starting point is 02:18:05 What's a commercial remote access Trojan? How easy is it to To manipulate the app. I mean because here's my concern. I'm getting old and my son's gonna be A lot more tech savvy than I am right. So he's gonna learn how to defeat that. Yeah, for sure So I don't think that it's gonna be easy. As of right now, I know it's not easy. I know of one that my uncle's using. And it hasn't been beaten by his daughter. So I don't think it'll be that easy.
Starting point is 02:18:39 Nothing's impossible. They could always get on a computer, which there's other ways to protect the computer. If it was me as a kid, maybe I'd get a little more crafty because that's what I like to do. I like to have computers. But I don't know.
Starting point is 02:18:53 It would stop me and make me second guess what I was doing if I knew my parents or parent was watching everything that I was doing online. I would second guess my conversations and who I talked to. Damn, man. This shit is... Like, I'll give you one example. A guy was talking to our de-coi. This is like the second or third person that we caught.
Starting point is 02:19:18 Talking to our de-coi in a normal chat room, not like that. Like, you know, regular social media site. And it was using a photo of some guy that was in a normal chat room, not like that, like a regular social media site, and was using a photo of some guy that was in a band as a profile photo, using a fake phone number, fake age, and a fake name. And we were like, we can't find information on them, like, we can meet up with them, but we're not going to know anything about the guy. So we eventually got the decoy to get the guy to send pictures of his face. And he sent some real pictures of his face. I was able to find him on the internet, found a real name, found that he was not the age
Starting point is 02:19:51 that he said, not the name that he said. He wasn't even using his real photos. He booked a hotel room, a hotel room. He even actually ordered pizza to the hotel room thinking that he was meeting with an 11 year old at that time. And it's, you know, you gotta remember that the 11 year old he thought he was talking to was under the assumption they were meeting some guy from a band that was younger, that got a hotel for the night, that just ordered pizza when in reality,
Starting point is 02:20:21 it's some guy in his mid 40s, sh** them. When in reality it's some guy in his mid 40s It's it's unbelievably messed up. Let's take a break. I need a break I want to take a minute to tell you about vigilance elite patreon Patron support is what makes this show possible and gives me the ability to bring these one-of-a-kind stories to the public. Go to patreon.com slash vigilance elite and support the Sean Ryan show today. Thank you for listening to the Sean Ryan show. If you haven't already, please take a minute, head over to iTunes, and leave
Starting point is 02:21:06 the Sean Ryan Show review. We read every review that comes through, and we really appreciate the support. Thank you. Let's get back to the show. Alright, Ryan. We're back from the break. Sorry, man, I had to, is getting a little too angry before the break. So I wanted to, I understand. Wanted to cool off for a minute, but while we were on the break, I want to clear a couple of things up. We were talking about the California law and the Florida law.
Starting point is 02:21:39 So we've printed some stuff up. This is from the Liberty Champion. I didn't realize this got, this stuff in California got signed from the Liberty Champion. I didn't realize this got this stuff in California got signed into law in 2020. Right. Yeah. And I don't know, you know, God knows what more they've done since then. Yeah. Who knows? I know the LGBTQ plus community from what it says in one of those articles, they were not happy at all about this decision. So it seems they're not in support of,
Starting point is 02:22:05 or at least the LGBTQ movement is not in support of the sexual, or sexually attracted to minors or men. I can't remember the other. Yes, so the plus, is that what this is? I believe so, but I don't wanna be wrong. Yeah, let's just stick to what we know. So I'm just gonna read this.
Starting point is 02:22:23 This is a report from the Liberty Champion. It is an opinion poll. I think this portion is factual. You can look it up. We're on a time crunch, so whatever. Look it up. But according to this, a couple of weeks ago, this is dated October 12, 2020.
Starting point is 02:22:41 A couple of weeks ago, California governor, Gavin Newsom signed a law that would allow judges to decide whether or not to list someone as a sex offender for having... or with a minor. According to the bill, it only applies to consensual sex, whether it be Between a minor 14 years old or older So as long as they're 14 you're good in California. I guess they believe it's good It's up to the judge. It's up to the judge and they believe that children can consent at that age And then from just you know from what know, just hearing things or reading things, that there is a stake, they want to make it a sexuality in certain states, one being
Starting point is 02:23:34 California, that you're attracted to minors overall. And I don't believe kids can consent personally, not in the slightest. This goes on to say, yeah, it looks like this is an opinion poll, so I don't wanna get to before in the weeds, but yeah, it looks like they're adding it to the LGBTQ plus community. Miners deserve the right to consensual sex too. No, it's ridiculous. That's not for me. That's from this.
Starting point is 02:24:06 Right. I totally disagree with this shit. I agree. Does somebody tries to make a weird sound? Yeah, I don't agree with it either. But then we go, and then the Florida thing, this is April 20th, 2023. This is from ABC News.
Starting point is 02:24:22 They're really upset about this, if you read the whole article. But Florida governor, Rhonda Santis on Thursday, signed a bill that will allow juries to impose the death sentence, even if all 12 jurors do not agree. He is also likely to approve a second bill passed by the lawmakers on Tuesday, next Tuesday, that would make sexual battery
Starting point is 02:24:47 of a 12-year-old, I'm sorry, sexual battery of a child under the age of 12, a death penalty offense. It's quite the difference between the two states there. Oh, agreed. I know where I'd want to live. Yeah, and I do live in Florida and totally agree with what he's what he's trying to do. I still can't believe people are into this shit. Yeah, I do it every day and I still can't believe it.
Starting point is 02:25:12 But so we're going to kind of wrap things up here. There's a couple of things that we haven't talked about yet. I know you got a couple of facts, statistics that you want to rattle off. Sure. Before we get to that real quick, let's go over a couple of examples on our break. You were talking about confronting a man in Delray Beach who then was later caught. And then we also talked about a letter that you got
Starting point is 02:25:39 from a, I don't wanna say a gentleman's attorney, a pedophiles attorney, basically standing up for him, trying to pay you, I'll leave it to you from here. Let's start with the teach. So I'll start with the guy. The video as of this, as of recording now, isn't on our YouTube channel, but by the time this, this is released, people will be able to watch this man's video. He showed up after talking to our de-coi and talking sexually.
Starting point is 02:26:11 He was fully aware of the age. I looked into the guy. The guy went to school to be a teacher. He has a bachelor's in teaching to some degree. I don't know what specific topic or if teaching is just a degree, but he is a teacher. He taught at two different schools.
Starting point is 02:26:31 What schools? I have them on my computer. I don't have them off top of my head. Local Florida schools. One is an online tutor school and another one is not. So, but he has two properties. One in Massachusetts and one in Florida. He showed
Starting point is 02:26:47 up to me, his name was Brent. And I walked up to him with the camera, scrappy behind me, and we called his name, and the guy just starts walking away while he's on the phone with our decoy. And we're like, hey, we have all your information, we know where you live, we know you're like, you know, all your information. We know where you live. We know you're like, you know, instead of just saying, we know where you live or giving them the address, we're telling them where, you know, his name, we're telling him where he's worked.
Starting point is 02:27:12 We're telling the age, like this guy knew that we knew who he was and he kept walking and kept walking. Then he goes into a full sprint. He's full sprinting through the Walmart. And, you know, I'm not a big runner. So I just start chasing after him. You know, I'm not a big runner. So, I just start chasing after him. You know, I'm running as fast as I can to catch up with him.
Starting point is 02:27:30 I got the camera in my hand and I'm screaming at the guy saying, you know, what are you doing here? Like, what's going through your head? Guy gets in his car, he drives away. Didn't get a word out of the guy. So we thought, okay, let's just report it to the police. We'll put the video up, it'll just be a short video. We'll attach some of the chat logs with people see he was a teacher. And I thought that was the end of it. A couple of days later, I get a text message from a friend
Starting point is 02:27:55 that says, Hey, didn't you just catch this guy? Her name's Courtney Elizabeth. She's a predator catcher. She texted me a screenshot from another predator catcher, 1200 miles away in Pennsylvania. So, we're in Florida originally. This guy is drove to Pennsylvania for whatever reason. I don't know why he was there, if he was on his way to Massachusetts. I don't know what he was doing there, but got caught again by another predator catching group. And I reached out to that predator catcher, Lizarin County predator catcher, he does his county and is known in that specific area. And he sent me all the chat logs.
Starting point is 02:28:34 One of the chat logs said that he was chased out of Walmart by two police officers. And the guy has no idea who we were because we didn't get a chance to say, we didn't get a chance to even tell him what we were doing. So just that the point of the matter is he didn't get the point the first time. He likely ran from Florida because he thought he was being
Starting point is 02:28:57 investigated or wanted by the police. And then you also have to think, if you got caught twice by two predator catchers, which is the most common profession or niche in the world, how many times this man hasn't been, has not been caught. So it's disgusting, that he's a teacher and disgusting that he'd do it twice, but just think of the amount of times this man
Starting point is 02:29:20 has probably not been caught. That was one thing. And then we caught another guy that I wanted to reference. We caught another guy named Stephen. When he went to his job, we asked for him. What was his job? He was a manager at a seafood restaurant. And we showed up there.
Starting point is 02:29:42 We sat at the table. He was supposed to meet with our decoy. At that point, it was 13 or 14 years old. My memory serves me correctly. And he bailed last second that day. A lot of times these guys will bail, and then they'll come back. They never really disappear because they can't control themselves.
Starting point is 02:30:02 This guy was very sexual. He said that he wanted our decoy to sit on his face, he wanted her to come back to his house. Horrible things. So we were like, you know what? We're not going to let this guy just bail and disappear. We know where he works. We have his information. Let's just go there, order two glasses of water. We know he's the manager. So he'll come up after we request the manager and we'll bring him outside and have a conversation. So we did that. He was fully aware that it was being recorded and Everything that everything you know was it was very transparent what was going on You know, we asked questions. He told us the answers to them
Starting point is 02:30:36 He knew we weren't police. He knew he was free to go in any time and he offered a ton of information that was up to him So and he offered a ton of information that was up to him. So, you know, that gets over with, police come, we give the police all the information that we have and some time goes by and I get an email, which the original email was, you know, saying to take the video down off of the internet. And it went, originally that went to scrappy cell phone
Starting point is 02:31:05 and he didn't see it at first with them when he did. He sent it to me. And then I replied to it. But the first email was straight to the point like, take this video down. It's an abilation of this statute of the privacy laws of Florida. And last time I checked, you can record in public, you know, it's you have no expectation of privacy in a public place, audio or video. And so I wasn't too concerned about the threat from the law firm who's representing our predator. So I sent the reply back and I said, take a look at the person that you are representing. Here are the chat logs if you want, if you want to be clear, because I didn't release them with the video.
Starting point is 02:31:45 So the attorney could read all of the horrible things that the guy not only admitted in the video, but that he said himself in the chats with pictures of his face, then they reply a few days later and I'll read you their reply. They said, thank you for your response. In accordance with Florida statute 934.03. We are requesting they remove the video. As stated in my previous email, this video is exposing Mr. Blank to an increased risk of physical harm.
Starting point is 02:32:13 In the video, you have exposed his face and full name without his consent, which is a violation of privacy laws. See below. And then this is from the statute. In Florida, it's illegal to record an in-person or telephone conversation without the consent of all parties. By relating this law, constitutes either a misdemeanor or third degree felony, depending on the offenders intent and conviction history can also subject the offender to civil damages. And then at the bottom, this is the
Starting point is 02:32:42 kicker. We respect everything that you do and acknowledge your mission of doing what is right and protecting the public. In fact, we would like to offer you $1,000 to support your cause and for the administrative costs for the removal. I will also be at your service if you need our help in the future, if you face any legal issues with your channel. Again, we're not looking for a battle, we're looking for your help. Respectfully, blank. So, I will not release their
Starting point is 02:33:11 firm's name. I don't respect the fact that they're representing a predator, but they haven't filed a lawsuit against me at this point. If they do, this email is in my possession. It was sent to me. I can release this email. It's not a threat by any means, but I will release it to let the public know that somebody's representing a predator and trying to make my life and scrap his life more difficult, about exposing a local predator.
Starting point is 02:33:37 And then number two, the fact that they said that they would want to represent us. Why would we ever want legal advice from somebody that would take most likely 500 bucks from a predator to take down a video that is educating the people in the area who's dangerous? Why would we want to be represented by somebody that's okay with that?
Starting point is 02:33:57 So I just want to let you know that one. I blew my mind. This stuff just goes on and on and on and, and, and, Ryan, I want to get you back here again to dive into this more, maybe in six months or so, because I know there's going to be a bunch of stuff that develops. But, yeah. So, I know you have a couple of statistics you want to rattle off. And, um, let's rattle those off and then let's try to end this with some,
Starting point is 02:34:24 with something positive. I agree. So these are just some statistics about human trafficking, which goes coincides with exactly what we're doing, catching predators and these pedophile ring websites. One in five US teen ages who received an unwanted sexual solicitation online. That's crimes against children research
Starting point is 02:34:51 center. 13-year-old is the average age at which a child first encounters and explicit website which comes from guard child. 75% of children are willing to share personal information with strangers. That comes from eSafety Commissioner. 75%. 75%.
Starting point is 02:35:13 50% of sexual exploitation incidents involving children that begin on social media platforms. What was that percentage? 50% they begin, which I believe it's higher. 27% of online child exploitation cases involving a perpetrator who is a family member or a acquaintance, source national center for missing and exploited children, the people that ignored me. But, yeah, 27% of people are cases involving family members
Starting point is 02:35:45 and acquaintances, which I think that number's higher too. So they're just statistics. They're not always accurate. But either way, they're still horrible, regardless of which way you look at it. Yeah, you know, it's something to try to wrap your head around and understand the severity and how much this shit happens. and understand the severity and how much this shit happens.
Starting point is 02:36:12 But moving on, let's get into some good news. Let's talk about how we solve this thing, which seems when you look at it and you see, you can enter just any chat room and somebody shows up in five seconds to literally, within 10 seconds, we had that message or it might have been five. Yeah. And we'll find out when the video, when we edit. But, you know, just to bring some hope to people,
Starting point is 02:36:38 you know, we actually, actually, the videographer came up with a great option, at least to start. And he was saying, you make a database. We'd pull all of your information, intelligence, that you've yanked out of these sites. And hopefully you'll continue to exploit these sites
Starting point is 02:37:04 with that information. and make a database, a public database that has all the people that are associated with these sites, names, addresses, pictures, if we can get them, all of it. And then people, schools, businesses, people that are looking to hire parents, anybody can just go under this database, type in a name, see if it pops up. Or a face.
Starting point is 02:37:30 Or a face. Or both. I think that's a phenomenal idea. Yeah, of course. I mean, like we were saying on the break, it's not like these people are innocent by, there's no possible chance of them being innocent. There's chat logs of them talking sexually to what they believe is a minor. And then there's video evidence of them showing up there. At the time they say they're going
Starting point is 02:37:56 to be there, most of the time on the phone with what they think is a child while they're walking through the store or through a public place to meet who they think is a kid. So the database of, you know, if a cop can't, you know, if a cop can't get a charge to stick where the state attorney doesn't want to go through with the case, well then the public should know regardless because then they can make their decision based on the evidence that was gathered by the public. You know, I don't know what the legalities would be either, but if you are an attorney
Starting point is 02:38:31 who knows the subject and you want to help reach out to zero day, reach out to project veritas, reach out to us. All those links will be in the description. But I think that would be, you know what else I think? We should shame the attorneys who are representing predators. Yeah, I think it's ridiculous. I mean, there's nobody in the world
Starting point is 02:38:56 that you could pay me to get rid of this information, to stop the journey that I'm on right now. I don't care what you offered me, it's not happening. It's not worth it. I care too much about kids. I don't care what you offered me, it's not happening. It's not worth it. I care too much about kids. I don't even have a kid. And again, off the break, I said, I can't, I don't know how I'm gonna act when I have a kid.
Starting point is 02:39:15 I'm already crazy and it's about my friends' kids. I'm gonna be, I need to find a balance between being a crazy parent and letting my kid have their own space because I'm terrified. Yeah, me too. I don't even, the stuff really gets to me. And when we connected, I told you my goal this year is to dive into this subject and bring a lot of awareness
Starting point is 02:39:45 to it. And man, this shit eats me alive. And then you've brewed stuff like what California's doing. And it's, I mean, they're making this up, we're trying to normalize it. So if you're a pito, move to California. Right, yeah, move it. If you're not down with that, move out of California.
Starting point is 02:40:07 I guess so. It's getting to be that simple, you know. They're gonna look what's going on there, you know. Yeah, they'll hold anyways, whatever. But you know, I wanna, I really want your word to get out and I wanna connect with some people. I wanna connect with my friend Matt Murphy, who's doing Operation Light Shine. He's making a huge dent in this stuff.
Starting point is 02:40:33 I think how this ends, obviously, government's not going to get involved, especially in particular states. I guess Florida is getting involved. But whatever government moves as slow as a snail, so I think what it's going to be is it's going to be this collaborative effort from citizens, people like you, people like Matt Murphy going after these guys. There's other organizations out there and it's this big collapse, turning into this big collaborative effort to you know, to get rid of these people and expose what they're doing and educate the public on how to keep your kids safe. And just Ryan, just with what you're doing, I think I may have brought this up at the beginning,
Starting point is 02:41:17 but I mean, if you think about the impact that you're having, you know, you're educating kids, kids are going to wise up to this stuff. That's gonna drop the numbers. Parents are gonna be listening to this. They're gonna wise up to this. That's gonna drop numbers. Predators are gonna watch this and realize we're coming for them.
Starting point is 02:41:40 And they are heavily. And they're gonna get scared and some of them are gonna stop. So just by doing this show, this one show, it's gonna stop a handful. It's gonna save at least one kid. I can guarantee that. One kid is good with me.
Starting point is 02:41:58 I want to also actually already sent the text, but I wanna introduce you to a podcast that's, they do phenomenal work. It's called Concrete. It's run their host as a guy named Danny Jones. I think he's somewhere in the Tampa area. I'd love to connect you with him. I have an even met him in person,
Starting point is 02:42:20 but I'm a huge fan of their podcast. That's one that I watched. They actually did that. I've actually seen it. I've seen it with, it with one of the guys. Oh, good. Yeah, I didn't meet any of the producers of the show. Somebody that was interviewed.
Starting point is 02:42:35 Oh, he was a fraud guy. But yeah, well, I'd like to introduce you to them because I think they'll, I think they will have the courage to help you get the word out. And there's another guy, uh, Julian Dorian, uh, who I'm actually going on his show here pretty soon. And I want to make that connection to because that guy, he does some really, really, really good work. And, uh, I'd love to, I'd love to make all three of those connections with Matt, And I'd love to make all three of those connections with Matt, concrete guys, and Jillian Dorian.
Starting point is 02:43:08 So I really appreciate that very much. And the more we can make, more noise we make, the better. And like I said, the resources that I have, and the abilities that I have, and the abilities my team has, especially with cybersecurity company, and my hacking team combined, the more resources the more we can do. I mean, it's very simple. I just, if I don't have access to these missions or I don't have access to some tips or what, I can't do anything.
Starting point is 02:43:39 Yeah. So, yeah, when I want to end this, I want to say, if you have fallen victim to this, or you know somebody that's fallen victim to this, speak up about it, get in touch with Rhymon Gummary. All your links are going to be in the description. Zero day, your Instagram with a zero, not spelled zero, five, six, one, PC, that'll be linked project Veritas and everything that they're doing. All that stuff's going to be linked in the description. And if you don't want to reach out to them, you can reach out to us and we'll put you
Starting point is 02:44:20 in contact with them because they're the ones doing the real work. And this is how we battle this shit. You gotta speak up. You've gotta get to people that can lead you to the right people and we gotta expose these people, you know, the predators. Man, what a heavy subject. Yeah, unbelievable. What do you got coming up?
Starting point is 02:44:49 Well, I'll believe it, you know, this release comes out and I have some people reaching out and not entirely sure I want to do them based on some things we just researched. But yeah, more to come, more to come. It's, I think that I'll start with your connections. Right on, man. Well, Ryan, I just want to say, man, it's, you're just a great human. Helping addiction, helping people that are addicts out, and then morphed
Starting point is 02:45:19 into this. And you obviously have a heart of gold, and and it shows and I'm just proud to know. Likewise man. Likewise. I appreciate you. Alright brother, best of luck and I'll see you soon. See you soon. The Bullwork Podcast focuses on political analysis and reporting without partisan loyalties. Real sense of day juggles sprinkled on our PTSD. So things are going well, I guess.
Starting point is 02:45:57 Every Monday through Friday, Charlie Sykes speaks with guests about the latest stories from inside Washington and around the world. You document in a very compelling way. All of the positive things have come out of this, but it also feels like we have this massive hangover. No shouting or grandstanding. Principles over partisanship, the Bullwork podcast, wherever you listen.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.