All Episodes
Aug. 23, 2024 - PBD - Patrick Bet-David
02:04:49
“Security Is An Illusion” Ethical Hacker Exposes Child Predators & Tools To Protect Against Hackers

Patrick Bet-David sits down with Ryan Montgomery, a renowned ethical hacker known for his expertise in cybersecurity and passion for child safety. Montgomery, who has been at the forefront of exposing online predators, shares insights into his journey as a hacker, his motivations for taking down dangerous websites, and the alarming vulnerabilities in today’s digital world. ---- Ⓜ️ Minnect with Ryan Montgomery: https://bit.ly/3yGAt9D 📺 Subscribe to Ryan Montgomery's YouTube Channel: https://bit.ly/4731jFt 🎟️ Join the Minnect League Championships for your chance to meet Dwayne "The Rock" Johnson at The Vault 2024: https://bit.ly/4aMAar8 🇺🇸 Purchase the VT Team USA Gear! Available now at VTMerch.com: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://bit.ly/4cwKbJp 🏦 Purchase tickets to The Vault Conference 2024 featuring Patrick Bet-David, Dwayne "The Rock" Johnson, Nick Saban & more: ⁠https://bit.ly/3WQYZN7 📱Connect one-on-one with the right expert for you on Minnect: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://bit.ly/3T0AX15 📕 Purchase PBD's Book "Choose Your Enemies Wisely": ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://bit.ly/3ST1rS8 👔 Get best-in-class business advice with Bet-David Consulting: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://bit.ly/3X8s7kq 📰 Visit VT.com for the latest news and insights from the world of politics, business and entertainment: https://bit.ly/4duVS4u 🎓 Visit Valuetainment University for the best courses online for entrepreneurs: https://bit.ly/4dpzyJE 💬 Text “PODCAST” to 310-340-1132 to get the latest updates in real-time! SUBSCRIBE TO: @VALUETAINMENT @vtsoscast @ValuetainmentComedy @bizdocpodcast @theunusualsuspectspodcast 📺 Join the channel to get exclusive access to perks: https://bit.ly/3Q9rSQL 🎙️ Download the podcasts on all your favorite platforms: https://bit.ly/3sFAW4N Patrick Bet-David is the founder and CEO of Valuetainment Media. He is the author of the #1 Wall Street Journal Bestseller “Your Next Five Moves” (Simon & Schuster) and a father of 2 boys and 2 girls. He currently resides in Ft. Lauderdale, Florida.

| Copy link to current segment

Time Text
We'll search over 150 billion records that include, you know, passwords, social security numbers, credit cards, addresses, even private messages on websites.
You name it.
And they said, they'll come by tomorrow and we want that data.
We want to investigate it.
I was like, okay, you know what?
I'm going to take this into my own hands.
Somebody's out there that's as good of a hacker as you.
And if they really wanted to get any information on you, could they get it?
I think that security is an illusion.
You're trying to avoid making enemies is what you're trying to do.
I'm making enemies all the time.
You can write custom software onto them that does bad things, which I'll show you more about in a second.
And now I just captured their credentials and they have no idea that it even happened.
Then I was able to confirm that a lot of them, like they weren't fantasizing, pretending to be kids.
There were actual children on this website.
And we could do it right now.
Okay, Rob, go to Teen Chat.
Yeah, just type hi.
And then wait for the private messages to come in on the top.
This might get graphic.
Who knows?
Wow.
What happened?
I'm already getting DMs.
Seriously?
Ridiculous.
And all you said was hi.
Oh, geez.
What's this one saying?
I would say 30,000 in the day.
At 12 or 13 years old.
So back then it was like the Wild West.
And my whole life was consumed by, you know, heroin very quickly.
Inside of this is a Wi-Fi chip, a mini computer.
And this thing emulates a keyboard.
They can type at 860 characters per second.
So we've caught teachers, police officers.
Yeah, we've caught.
I caught a teacher.
Here's that crazy one, sir.
I'm the one.
Okay, so my guest today, you may not know the name, but the moment you hear him speak and you hear what he has to say, you're going to say, I know exactly who he is.
I've seen him all over the place.
Ethical hacker.
And for those of you that are parents, I got four kids.
I don't know how many kids you got.
But this is one of those things that you have to pay very, very close attention to today.
And by the way, aside from being a parent, if you're somebody that runs a business, if you're somebody that's worried about somebody getting the key fob that you have that enters into your garage or your building, you're like, no one's going to find out how to do that.
He's got equipment here.
When he walked in, our guy who deals with our servers, he says, look, man, whatever you do, be nice to us today while you're here in the building.
Anyways, having said that, the one and only, Ryan Montgomery, how are you?
I am great.
Thank you for that awesome introduction.
Yes.
And I am super grateful to be here.
So again, I think I'm more excited to have you than anything else because I've seen a lot of your material and especially with a lot of things going on today.
I remember six years ago at one of these insurance conferences I was a part of, it was the first time I heard every insurance carrier, all they talked about was cybersecurity.
Do you have cybersecurity insurance?
Cybersecurity, you guys never talked about this last year.
Do you have cybersecurity?
I'm cyber cybersecurity.
Did you hear about that one insurance company that was hacked and they got 2 million social security numbers?
All this stuff that they were, obviously we heard what happened two weeks ago.
Oh yeah, I have a lot to say about that.
So I want to hear about that as well.
But one, for the audience that maybe doesn't know the background, what caused you to want to become a hacker?
So to become a hacker outside of the child safety thing was actually a pretty basic story, but I remember it like it was yesterday.
So I was probably around nine years old when I first got access to a computer.
My grandfather worked for a cemetery and I guess they gave him a desktop computer.
It was a monster of a machine.
Just in size, not in speed by any means.
But I didn't know what it was.
I was very young.
And if you remember, some of the people watching will remember AOL used to send these floppy drives in the mail, floppy disks in the mail that would have trials for AOL dial-up internet.
And I saw that the floppy drive had a specific shape to it, as well as the desktop computer where you put the floppy in had a little icon there that looked like that disk.
And I took it out of the free trial case and I put it in there because it looked like it was supposed to go there.
And I saw the AOL logo come from a piece of cardboard onto a screen.
And I remember that, like, it just happened yesterday.
And it blew my mind.
It was like a miracle that I couldn't understand how something in the real world could show up on a screen and I had control over it.
You're nine years old.
How old are you right now?
31.
So 22 years ago.
Yeah, approximately.
Yeah, I mean, give or take a year.
But, you know, that doesn't make you a hacker, but that got my interest peaked in computers.
And very young age, I was helping people fix their computers, learning about computers.
And from there, that turned into how does this work and how do I make it do something it wasn't intended to do in the first place?
That's it.
That's how it started.
So that's how it started.
Now, your brain.
So it starts there, but then it's like, what if I can do this?
And what if I can do this?
And what if I can do this?
Or is it more like, what else can it do?
What else can it do?
Which direction were you going?
So it's manipulating something to do something.
It's manipulating something to do something it wasn't intended to do.
That's basically the definition of hacking.
That could be with anything.
It doesn't have to be a computer.
I think it's a mindset that you either have or you don't have.
As for the technical specifics, they can be applied later, but I think the mindset really helps.
There's a lot more to the story of how I came up in the hacking community and how I learned the methodologies, learned how to find vulnerabilities and things, which I can go into that if you'd like.
Sure, absolutely.
So yeah, I would be here six hours explaining all of it.
But if anyone remembers AOL Instant Messenger, it was called AIM.
There was also something called IRC, which is an internet relay chat, which is ancient, but that's how people communicated back then online.
And I was part of a lot of groups where there were a lot of hackers.
All I knew them by were screen names.
I didn't have their real names for the most part.
Most of them would just go by an alias, and so would I.
They didn't realize I was a little boy.
And I don't know if they were little boys as well or they were grown men.
I have no idea.
But I guess the curiosity in me, and me being one of the kids that always just say why to everything over and over and over, everything was why, I was blessed to have a group of people that were willing to mentor me and teach me the things that were so interesting.
So when I saw something get hacked or I seen a vulnerability in, let's just say, AOL Instant Messenger, I would have a group of people that would be more than happy to teach me how they did that.
And then I would recreate it myself, and I'd get that same adrenaline rush, which is like addictive to say the least, which then went on to more things.
I mean, if you want to get into that, I will.
That turned into me later on in life, I would say maybe 12, 13 years old, joining a hacking group or affiliate marketer slash hacking group called Digital Gangster.
And if you do some research into Digital Gangster, you'll see there's a lot of celebrities and companies that were hacked by the forum and the members on it.
One of them being YT Cracker or Bryce Case is his name.
He hacked NASA and many other government agencies.
I became an administrator of the website Digital Gangster, which was full of hackers and marketers, kind of a combination of both.
So back then it was like the Wild West.
You could send, you know, let's say SIE weight loss berries.
They were paying $9 per sale.
They would give you a unique URL.
You would send that URL out to, let's just say, a million people because there wasn't a junk mailbox.
There wasn't spam filters.
And then you would just start randomly mailing hundreds of thousands or a million people and collect your commissions from these affiliate networks.
So we would combine hacking methodology and affiliate marketing.
And that was kind of the short version of what Digital Gangster was.
Oh, wow.
So affiliate marketing plus hacking combined.
And you said nine cents.
So if you send out 1 million, what was the conversion ratio?
No, no, it wouldn't be like $9 per sale.
$9 per sale.
Yeah, a lot of times people would be paying for an annual subscription to the ⁇ I'm just using SIE Weight Loss Berries as an example, but you could pick any product that would be on a network, which is- I say, are you talking about Manavi or what company are you talking about?
I don't even know.
I mean, like when you sign into an affiliate network, you'll have like business opportunities, dating websites, weight loss pills, any product that the affiliate network is offering.
Got it.
And then you would send the email, and if they buy it, you're getting a commission on it.
Yes.
And the commission structure would be set up differently depending on what you're doing.
What's the most money you ever made on one of these affiliate marketing email campaigns?
Without going into the specific details of what and how, I would say $30,000 in a day.
At 12 or 13 years old?
Probably 13, yeah.
So when it's happening at 13 years old, what money is that?
What account is that money going into?
So there is, I had a PayPal account that got banned, and then my mom's.
Got it.
So what's mom saying the first time you see 30,000?
Is she like, honey, let's do it again?
Or is she like, what are you doing?
What are you up to?
So my mom has always been like a friend to me, but she's still my mother at the end of the day.
Of course.
I love my mom to death.
And my mom has questioned everything I've ever done, but always has my back.
She'll ask me a million questions, but she'll be very supportive.
She knows that I have a good heart.
She knows I would never try to hurt anybody in any type of way.
So I don't think that the I can't remember the conversation verbatim of how that all went.
But yeah, she was fully aware of the people that hired you, Digital Gangster.
Do they know how old you are or they don't know yet?
Because at the time when they're hiring, you're not necessarily putting your age.
So Digital Gangster, you didn't have to be hired.
It was a forum that anybody could join.
And then you could be, like I said, you could use an alias.
You could use your real name.
You could use whatever you wanted.
I joined there under an alias and then earned my way up the ranks without anyone actually knowing who I was.
So nobody really knew.
How are you getting the emails to do the campaigns?
Well, you could just brute force them or you could, like meaning like A3Z.
Yes.
Or you could the way that I was doing it was I had a name generator.
So I would do like, you know, johnsmith1 at blank.com and then or johnsmith2 at blank.com.
So just generate a list of first names and last names for men and women and then and then append a number usually at the end of it and just ship out as many emails as possible.
That was just one of the many ways we were marketing.
But like I said, hacking and affiliate marketing or spamming for other words kind of went hand in hand with what Digital Gangster did.
But Digital Gangster was not a company.
It was just a forum where people talked and hung out.
So what did you do after that?
So now you're starting to realize, okay, I think there's something here that I can make money with.
You're 12, you're 13 years old.
What comes next?
So I was in the marketing world for a while.
I got into some, you know, I would say some gray areas or some black hat areas because there weren't like cybersecurity training platforms like there are now.
There are like not a ton of learning material out there.
You couldn't really go to school for it.
I think the only schooling you could go if you were an adult or even graduated high school for that matter was computer science.
Now is a completely different story.
So when I'm learning from people, I'm learning how to do things the wrong way.
And being a young, dumb kid that was, you know, that's a whole story I think we should get into of my past, you know, making bad decisions as a kid.
I wasn't the best kid in the world.
You know, I didn't hurt anybody physically or anything like that.
But I definitely made an impact and regret some of the decisions I made at a young age.
What were some of the decisions you made?
Well, I guess let me preface it with starting to use drugs at a young age.
So I haven't done drugs since I was 17 years old.
I'm 31 now.
So mostly I got it out of my system early.
I think I started dabbling at 11, 12 years old, and then I stopped.
I remember the exact day when I was 17.
I'm not in recovery.
I'm not in AA or NA or anything like that.
I just choose not to drink.
I don't smoke weed.
I don't do any, I don't just don't do any drugs.
But that was by complete choice.
So when I was younger, I guess I'll start off with the rave scene.
So are you familiar with raves?
Of course.
So a lot of the younger crowd doesn't know what a rave is.
They just know about these new EDM and electronic music festivals.
Are you from here or where are you originally from?
I'm right from right outside of Philadelphia in Pennsylvania.
Got it.
So I was huge into the rave scene at such a young age.
And I would sneak out of my house in the middle of the night.
I would take a bus to Philadelphia.
And I remember one that I used to go to was called God's Basement.
And it was in the basement of a church.
And for whatever reason, for whatever reason, this church was allowing a rave to rent out that space.
Basement.
God's basement.
What is a name for a nightclub?
It's barely a nightclub.
We're talking like, we're talking, this is, it was, it was, you know, disgusting.
Ecstasy County, like, you know, everybody's rolling, drinking water, massaging the whole night.
Ecstasy, ketamine, cocaine, weed, alcohol, even, even, I even saw Mescaline, I remember, which is, I don't think I ever saw again outside of there.
But yeah, you might be able to find God's Basement online.
And this is Philadelphia.
Yeah, and the room probably had two, 300 people in it.
And it's about, you know, if I had to take an approximate like 2,000 square feet.
Is this it?
Yeah, yeah, this is it.
Rob, can you raise the audio?
We can't hear it.
I can't believe you found this.
Laura.
During the week, it's a school cafeteria.
On weekends, it's sometimes party central for ravers.
When we went undercover on a recent Friday, we found drugs, alcohol, and underage teens.
We are so horrified.
If you guys could close this place down, we would be more than grateful.
Parents and staff of the Global Leadership Academy Charter School were ready to protest and block the doors tonight to prevent a Pimps and Ho party scheduled here.
West Philadelphia school rental schools.
That was a crazy name every night.
I mean, there was a foresee rental of the basement.
The school says it's complained for months to the church.
You can pause this, Rob.
We get the idea.
Okay, so God's basement.
So God's basement, yeah.
Me 12, 13 years old walking around this place with 13 years, 12, 13, you're going here.
Yeah, and let me just show you.
I would like this to stay off camera, but let me just show you what I look like so you get a better idea of why they even let me in the doors, which obviously it was an illegal party, but you can see by the way that I looked all messed up on drugs.
I don't think they were going to question me.
I can totally tell by the eyes, man.
Are.
Yeah, I was 16 in that picture.
You're 16 here, 16 there yeah, but I didn't look much different.
You know much different when I when I was on, you know, 13 years old doing heroin.
So I didn't get to that point yet.
But um, at 13, you're doing heroin yeah yeah, yeah so.
So God's Basement is one of many raves I went to in Philadelphia, and where it started was ecstasy.
So somebody gave me ecstasy.
I loved it.
I thought it was the greatest thing to ever to ever be created um, And I would take ecstasy as often as I could, whether that be multiple times a week, or if I could do.
However many raves there were in Philly, they weren't usually not outside of the world.
How much you took on one night?
I'm not sure because ecstasy is so it's variable in the dosages.
So I mean, definitely multiple pills.
But once you get to a certain point with ecstasy, and not advising anybody try it, but once you get to a certain point, you don't feel it anymore.
It doesn't do anything.
I think your brain just runs out of your natural happy chemicals.
But yeah, so I continued to do ecstasy and I really, really liked it.
But that was my main drug of choice.
Most people start with weed or drinking or whatever.
You went straight to it.
Went straight to ecstasy.
Very ambitious, yeah.
Yeah, yeah.
And I love this, but one night I was at God's basement, actually, thinking back, and somebody, I was complaining about the come down feeling.
So when, you know, it's considered a stimulant.
So when you're coming down from it, you start to feel bad.
And these things go till 5, 6, 7 o'clock in the morning.
So the sun's coming up.
You feel absolutely horrible.
And somebody said to me, hey, you can take one of these PERC30s, which is an oxy.
It's actually, they're not actually Percocet, but it's an Oxycodone 30 milligram pill, and it'll make you feel better.
Which at that point, I've never taken any painkillers.
I took a PERC30.
It got rid of that come down feeling completely from the ecstasy.
And so that way I didn't go right to them immediately, but I kept taking ecstasy and then trying to find any opiate that I could, not heroin at this point, but any opiate that I could to come down from the ecstasy.
And then I found out that I was starting to like the opiates better than I liked the ecstasy.
And that's when it became a problem because I was taking the opiates before I even got to the raves.
And I didn't have any energy really to be partying at a rave or doing anything at a rave.
And, you know, those pills were expensive back then.
Like, you know, I was a young kid.
And yeah, I did well in certain areas with marketing, but I wasn't, you know, I couldn't, every day wasn't that good.
You know, I didn't grow up in a great area with a ton of money or anything like that.
And, you know, what happens is you're paying $30 a pill approximately unless you buy it wholesale.
And wholesale, you're going to pay from $17 to $25.
And I'm talking a long time ago.
Now, people, from what I'm being told, if you can find a real pill, we can talk about the fentanyl crisis if you want.
But if you can find a real 30 milligram oxycodone, it'd be $60 a pill on average.
So I couldn't afford it back then when it was $30 a pill.
And then you have to take multiple a day to even, you know, keep yourself from getting sick, going through withdraw.
And then I remember I was in Trenton, New Jersey, and I was out staying at a friend's house who did not know my real age as well.
And I was offered heroin.
So I never tried it before.
For some reason, was not as scary as it would sound to me.
I guess I was so messed up and so sick and just wasn't thinking properly and a young kid and brain not fully developed.
And then this guy comes up, you know, comes up to me in the house with a, I remember it was a CD case and a line of heroin on it.
I snorted one line of heroin out of the bag.
I don't know if it was a full bag or half a bag.
I don't know.
But a bag of heroin is $10.
Me taking multiple perk 30s a day, let's say 60 to $100 plus dollars a day, and sometimes even more, to go from that to $10 is now making me feel better and snorting it was a no-brainer for me.
I could not be sick.
I can do this.
It makes me feel exactly the same, except for a little maybe rush in the beginning, but I was more worried about not being sick.
So my whole life was consumed by heroin very quickly.
The same problem happens.
So $10 a bag turns into you're buying bundles, which is usually from 10 to 14 bags, and they would sell for about $75.
So you'd get bundles of heroin for, I mean, a deal, if you want to call it a deal.
And now you're doing a bundle a day and you're stuck and you can't snort that much powder.
It just won't fit in your nose, literally.
No exaggeration.
So then you end up using needles.
So I ended up as a 13, 14-year-old kid injecting heroin and went back to shooting one, two bags at a time.
And the feeling would go away, which then reduced the amount of money I had to spend, but then ended up in the same problem.
You can only inject so much.
You can only fit so much in a needle until you have to keep hitting yourself every couple hours without getting sick.
And then it just became an absolute catastrophe for not only me, but everyone around me, my mom, my grandma, my grandpa, everybody that cared about me.
And I'm very, you know, my biggest regret is how many people that I worried and hurt and caused whatever financial harm it was on the hacking side of things, as well as the court cost of just getting in trouble as a stupid kid with drugs.
But thankfully, never hurt anybody physically, never had any violent crimes, never gotten any trouble behind the wheel of a car with drugs.
It was all just drug offenses and stupid, minor, petty theft things as a kid.
Did you ever have a close call of killing yourself or no?
So no, no, but I do have a story that I talked about before on a different podcast, but I'd like to bring it up again because it was something that was very important to me.
And we can kind of segue into this if you want, but the fentanyl crisis out there is really bad.
So if you did any, I don't know, did you research me at all?
Or you said you watched.
I watch God knows how much content on you.
Hours.
I appreciate that very much.
So I owned three mental health substance use.
They changed substance abuse to substance abuse.
So three mental health substance use facilities.
I don't want to say the city.
Is that why you moved to where you moved to?
Because it's known for that.
Yeah.
So the reason why I moved down to Florida was to start a treatment facility.
That was the main reason.
And I originally just started one that had partial hospitalization, outpatient, and then outpatients, three different levels of care.
And then I opened a detox, which is considered an inpatient level of care, with residential, which is, so it was five different levels of care and then three different locations.
I had over 120 employees at the end of it.
And I believe it was 144 beds, give or take, depending on what we wanted to fill the rooms, if we wanted one bed per room or two beds per room.
So, I mean, I don't mind saying the facility's name, but it was called Boca Recovery Center, which it still exists.
I live in Florida.
People know that, and I'm not hiding or anything.
But yeah, so one of the main reasons why.
Yeah, so this is the new website.
I don't think you'd find me on it now, but if you looked up an article like Ryan Montgomery Boca Recovery Center, you'd find some articles from back then.
So you founded this and you grew it from zero to 120 employees.
Yeah, so I was the founder and CEO.
I had a business partner as well who got me into the industry because going back to the marketing what I was able to do from Pennsylvania I started a marketing company where I was sending is do you are you familiar with patient brokering no so it's a felony and it's a it's a crime to pay per person to go into like to refer a patient into a rehab or a healthcare facility so the way that I was able to generate leads and I wanted to be compassionate about this because I went through it myself.
I have a lot of family and friends that went through it myself and I'll get into that story after.
But I started a company on my own where I was generating leads for people that wanted treatment, that had private health insurance where they could leave the state.
They would have out of network benefits.
And I was, you know, the average at the time of me starting Boca Recovery Center, the average cost per acquisition, if you want to call it that, to get a patient in the door with private health insurance was around $3,000 for the facility.
I was doing it for about $1,800, which was kind of unheard of to the rehab industry.
The treatment marketers in Florida that were patient brokering would give the clients or the patients, they would sometimes offer them money to go to treatment.
If they didn't meet medical necessity by the insurance company, they would try to get them drunk or high so that they would, so that they would get paid out for getting them admitted into the facility.
And that turned into an absolute disaster, if you can imagine.
You take somebody in a vulnerable position that just wants to get clean or their family, even if they don't want to, if their family wants them to get clean, and you say, hey, I'll give you $1,500 to go into rehab.
And the detox then gets denied by the insurance company.
So the treatment marketer takes them back out.
They bring them to a bar, gets them wasted or high, and brings them back.
They could kill the person.
They could take advantage of them sexually, which has happened.
If you look up Kenny Chapman, he got, I think it was a 27-year sentence, correct me if I'm wrong, for a ridiculous amount of sexual assault on these patients.
It was just absolutely sickening.
So I wanted to have a facility.
Owner on Wednesday courtroom divided Chapman's family.
Middlebrook gave Chapman a 27 and a half year sentence for crimes that Villafana said were never before seen in a federal court, turning his patients into prostitutes.
That is an absolute scumbag.
And that's in Florida?
That's in Florida, yeah.
Wow.
And you met this guy?
You did business with him?
I never did business with anyone like this.
So that's why I wanted to kind of give you the rundown of how this all happened.
So when I lived in Pennsylvania, I had that marketing company, but I never actually talked to the patients myself.
I made sure that they went through an online quiz is basically what I did.
Because I wanted to make sure they met the criteria.
Like, I don't want to send some innocent girl that has an eating disorder and maybe she drinks on the weekends to some facility that she doesn't qualify for, just because I'm going to get paid more money.
So the way that I structured it was I created this quiz, you answered a bunch of questions, it would give you a number to call.
That number would then go to one of the facilities I had a contract with that I trusted, that I knew would help the person out to the best of my knowledge at that time.
And they would pay me a flat fee.
So I would know in the beginning of the month, I'm 100% going to get this amount of money, nothing more, nothing less.
And that avoided the whole patient brokering thing.
It avoided me having to get involved with these treatment marketers.
And I was making money for these facilities and I felt good that I was getting people into treatment.
But the business partner at that time, his name was Christopher Ferry.
Chris Ferry, him?
Yeah.
Okay.
So this guy I had a contract with with another facility called Holistics by the Sea, which I think exists still, but I wasn't really a part of that really.
He was an owner of that facility at one point or his family was of some degree.
I'm not sure the actual specifics on it, but I know he had something to do with it because I had a contract with them.
And it was a flat fee that they would pay me every month.
And Chris, he's an intelligent guy.
So he sends me a text message or a face.
No, it was a text message.
I didn't answer.
And then he FaceTimes me.
And I'm in Pennsylvania at this time.
And he knows I'm doing well.
I'm killing it with the treatment marketing ads.
And he's like, hey, you won't come to Florida right now.
Like, just joking with me on FaceTime.
Three hours later, I'm on a plane.
I call him when I'm at the Fort Lauderdale airport and I'm like, hey, man, I'm here.
And he drives to the Fort Lauderdale airport, picks me up.
I stayed with him for three months at his house.
And we became very close with each other.
I flew back to Pennsylvania.
I got all my stuff in a U-Haul.
I packed up my car on a trailer.
I drove to Florida and I never came back.
What year was that?
That would have been nine years ago.
Okay.
Got it.
Yeah, yeah.
So at that point, I lived with him for a little bit as we as we sold his shares in holistics.
I believe he sold his shares.
I'm not sure how that whole process worked.
You'd have to ask him that.
But I know that when we got involved with Boca Recovery Center together, we were in it together.
It was just us.
We didn't have any, we had a small equity owner, but that was for just logistics.
Did you guys both sell it?
So now you've sold the business.
He's still the CEO and founder or he's still around, still going hard.
He actually opened a fourth facility now.
But yeah, I sold it a couple years back now.
And there's a cool story with that as well, which I keep skipping the main point.
But the cool story with how I ended up doing what I'm doing now is there's the electronic medical record platform, Zen Charts, which the site's gone now.
But if you Google it, you'll find out to see the logo for it.
Yeah, the website just went down.
So maybe the LinkedIn.
Yeah, okay.
So I can explain what Zen Charts is.
But Zen Charts is a medical record platform.
If you go to your doctor, they ask you a bunch of questions.
You see them typing in notes on the medical record.
It's exactly that, just for mental health and substance use facilities.
Got it.
So I happened to use Zen Charts at Boca Recovery Center at the time.
And the owner's actually sitting out in your green room.
Are they?
Yeah, so the owner at that time, so they came to come train my clinicians on how to use Zen Charts.
And I'm sitting in the room with them.
And they thought that I was an employee of the facility because I was like 22 years old or something, 23 at the most.
And once I found out I was the owner, we talked and we got along well.
But I didn't really know them that well.
And the guy that's sitting out in your green room right now, it would be even interesting to ask his opinion on it.
But he paid $40,000 for a penetration test, which is just paying a group to try to hack your company and give you a report on what's vulnerable.
He just did that prior to doing the training for my rehab.
And I said, do you mind if I take a look around?
Like, you know, just trying to get permission because I don't want to get in trouble or break the law or anything like that.
So he says yes.
And he says it like cockly in a cocky way.
Like he's like, you know, I'm not going to.
What can you do about it?
Right.
Right.
So he gets in his car.
And before he even gets back to the Zen Charts office, my face was on support.zencharts.com.
It was just my face.
So when he, you know, when we, when we're, my company is contester.com.
Yeah.
And when we're trying to sell our manual pen test, he brings up that story because even if you spend $40,000 for the best of the best, if they're doing that, in his case, it was the checkbox approach.
It's sometimes not enough.
Kind of what we do outside of, I'm not trying to promote my company.
I just want to explain, because this is relevant to everything else we're going to talk about.
What we do is we try to emulate what the adversaries would do.
We try to emulate what an attacker would do, not just check off this box, that one, and that one, and that one, and skip all of the rest.
We try to do that.
So Rick uses that story, Rick Glasser, who was one of the owners of Zen Charts, when trying to make sales for PenTester.
So I just looked at the article, USA Today, National Public Data Confirms Massive Data Breach, including Social Security Numbers.
And you guys are, I believe, quoted in here in this article with USA Today about what PenTester does.
So talk about social security.
So we had all these social security numbers being leaked.
And it says social security numbers, names, addresses, email addresses, phone numbers were in the 2.9 billion records within a data breach.
Security firm Pentester tells tool tells you if your data is involved or not.
So to the average person, what does Pentester do?
So in this case, we did something different.
So almost every single article is going to be referencing that site, npd.pentester.com, which stands for national public data.
So what we did was, is we were able to access a list that was for sale for $3.5 million in April.
And a hacking group took it from a company called National Public Data, which is a crazy story.
Do you know anything about this?
So the person that was running that website is, I think his name is Salvador, but he was a Florida sheriff.
You can look him up.
And he somehow, some way got 2.9, approximately 3 billion records that include your first name, last name, address, phone numbers, and social security number for pretty much every single American alive and deceased.
Because our population is not even close to the 3 billion.
That's a third of the, yeah, a third of the planet, I believe.
So when I was looking up, you know, my mom, I was seeing addresses when she was a teenager.
But the guy that owned the website, and maybe you'll find his name, but he, he, the reason, do you want me to go into how he got compromised or more about the reason why he got compromised was there was a secondary website that used the exact same login that they must have been either sharing a server or just had the same the same technology and they had a default password.
So default password attacks are so common, it's unbelievable.
Like somebody leaving the same password on the router or leaving the same password on the device when they buy it or website that just gets set up.
It says maybe your password is password 123.
And then if you Google, you know, let's say Cisco default password, you'll see the default password.
So this guy, he creates a background check company called National Public Data, gets clearance, who knows how, for all of that data with all the social security numbers, and leaves the default password, which was, I believe, six digits long and on a mirror website that mirrored national public data.
So the attackers used that same credential as an administrator to log in and then extrapolate all of the data.
What?
It was as simple as a credential reuse vulnerability.
And then PenTester, what we do is we, like you saw when you looked it up, you can put your email in there.
So you put in your email.
I would recommend using your primary email or maybe sometimes even an older one.
You should check them all, honestly, on the free scan as well as the paid version.
But this is different than the main page.
But We'll search over 150 billion records that include passwords, social security numbers, credit cards, addresses, even private messages on websites.
You name it, anything that's been leaked on the dark web.
So for $19, we show you all of that data.
We show you every social media account, every profile that's associated with your emails and phone numbers.
And that includes for your kids too.
So to know if your kids are signed up for Instagram and all the other apps, if you want to confirm it, you can easily add them in there safely and securely, pay five bucks extra per family member or kid, and you'll be able to see all of their data.
But it's super important to know which passwords are out there and breached for this exact reason because our entire country got breached.
3 billion records, the largest breach I've ever seen in my life and probably the most impactful I've ever seen in my life happened in the last week and a half.
Six days straight now, we've been dealing with about 30 to 50,000 users on our website per minute.
I have an interesting screenshot actually.
30 to 50,000 per minute.
Check this screenshot out.
It's been unbelievable.
And we do not, I can, I'll say this on here.
We don't have the support team to handle the amount of traffic we're getting, but we are growing and adapting quick.
Look at this number right here.
Every single blue bar there is a single minute.
Are you joking?
How wild is that?
Oh, but most of it is in U.S. all U.S., yeah.
Canada, U.K., Mexico, because U.S. is the one that's oh my god.
Right.
And that's 35,000 paying 19 bucks?
No, no, no.
That's 35,000 people at that, just with the screenshot that I took, 35,000 people at one time using npd.pentester.com, which then, when they're finished searching there, they go to the main pen tester website, which allows you to search your email, and then that'll tell you your passwords, your address, maybe your social, your relatives, all kinds of information.
And then from there, you choose remove my data or whatever, whatever.
How do you do it though?
Now that it's public and the guy has it, how do you remove your data?
So you cannot remove data from the dark web, but you can remove data from data brokers, which is huge.
The best way to remove data in our eyes is for you to change your passwords because you can't remove it from the dark web.
You can't remove it from people's computers after they download these databases.
And I don't know of a better way to explain that because a lot of people don't understand that we don't have control over deleting data off of people's computers that downloaded it themselves.
We do have control over some of the data brokers because they're required to remove your data.
So what we do is we take your first name, your last name, your date of birth, and as many identifiers as they're willing to give us.
And then we send a query on your behalf to all of these major data brokers.
And if you don't know what a data broker is, it's just somebody like, for example, White Pages that would store your personal information, including your family's information, phone numbers, everything for the, you know, just to Google a name and a state, you'll find yourself.
We remove that data for you.
All you have to do is just sit back and wait, refresh the page every couple of days, see how many removals are in progress, how many have been removed.
And then as you're doing that, you can scroll down the page.
You'll see all the social profiles associated with your email and phone number and name.
And then underneath of that, you have all of your passwords and everything else that's out there.
So you get a really good idea of what your digital footprint is for $19.
And you really can't beat that, in my opinion.
There's nothing else like it.
We genuinely don't even have competition because we have a combination of data broker removal and the largest breached database in the world.
So it's just kind of unmatched.
Who else is doing what you're doing right now?
Who else does that?
There's not a single competitor.
There's not a single competitor.
No, not.
So how many people have already done the $19 with you?
I don't think I should say, but we're doing well.
Is it over a million or less than a million?
Less than a million paying $19, yeah.
And it's one time.
It's not like I'm running my credit every time.
It's just one time I do it.
So, your credit's not being around ever.
No, no, I get that.
What I'm saying is, like a credit test when I run it, this thing I'm just doing at one time.
No, so it's important to keep it on.
So, there's two reasons why.
So, data brokers, for the most part, will re-index your data every 90 days.
And we will go in there automatically to see if it comes back up.
And we'll let you know that your data is back and we're removing it again.
So, you're going to keep it for that reason alone.
And then, secondly, if a new password gets breached, let's say yours gets breached in the next 10 minutes, you're going to want to get that email saying, Hey, your password's out there, and you're going to get that email before Google Chrome gives it to you or anyone else.
If somebody's out there that's as good of a hacker as you, and if they really wanted to get any information on you, could they get it?
I think the internet's an honor system.
You know, I think that security is an illusion.
That's exactly what I'm saying.
So, at the end of the day, there's a part of it that is an illusion.
So, if a person at the level of hacking as you wanted to find out your social ruin your credit, destroy your life, could they do it?
And they're not an ethical hacker, they're an unethical hacker.
Could they destroy your life?
If they wanted to destroy my life or anyone's life, your life specifically.
I mean, they've been no matter what I do, people have been attacking me for a year and a half now.
I'm trying to do good things, and I'm not doing anything wrong.
I'm trying to do the best possible things that I can think of, you know, that I'm capable of at least, and people are still coming after me.
I'm having my entire credit report was published online.
I've had pizzas showing up at my house constantly, Craigslist ads selling them, saying that I'm giving away free stuff.
I've had almost everything you can imagine.
I don't want to give these guys too much credit, but people even threatening my grandmother on the phone multiple times.
You know, it's been, yeah, I mean, anybody, anybody's a vulnerable person.
Is it like a challenge when somebody is a hacker?
They say, Okay, I'm gonna other hackers wanted to come out and take you out to say, like, I'm a better hacker than you are.
Is there that competitiveness within the community or no?
Yeah, so that's exactly what's going on.
It's usually younger kids, the younger.
You can tell by the way they talk, they're young, and they just want to make a name for themselves and brag to their friends, like, oh, I just hacked Zero Day, which is the alias that people know me by online.
Um, and really, like, they just look like an eighthole, you know, like they're uh, they're like, I'm the wrong guy, like, just not because I'm gonna try to do something back, but because, like, I, I just, you know, I just want to be, I want to live in peace, I want to help people.
Uh, you know, I just don't understand it, but hey, kids will be kids.
I mean, I get it, I understand that part.
So, let's go through a couple different things, okay?
With regards to hacking, so walk me through the most basic thing.
So, Wi-Fi's, right?
We go to a lot of different places, you can use Wi-Fi.
What tools do you have to be able to get any kind of information you can through using people's Wi-Fi?
So, there is so much you can do with Wi-Fi.
So, do you want to know about password cracking or give me any of it from the lowest to the highest?
Okay, so I would say, you know, the lowest would be using a weak password or your phone number as your Wi-Fi password.
And you may think using your phone number is not something people commonly do.
I see it all of the time.
And in short, to hack a Wi-Fi network, at least for WPA2, which is saving all the technical details, you need what's called a four-way handshake.
So, what I need to do is I would send what's called a deauthentication packet, which is just telling your devices, disconnect from Wi-Fi.
That's what that means.
So, your device, whatever that tablet is, is going to say, okay, fine, I'll disconnect.
So, it disconnects, and then I'm listening on my side for it to reconnect.
And in that process, I'm going to capture that handshake.
So I'll take that handshake, which is just a file, I'll bring that home with me.
I could take that from your studio, let's say, and then go home, and I have your handshake to try to crack later.
And what I mean by crack is I put that handshake file into the computer, and I have a huge list of words and passwords and frequently used things, like frequently used passwords.
It's called a word list.
I'm trying to simplify this.
And one of them is phone numbers.
So let's say you have in Florida, you would be 954, 516, 305.
I have word lists that have every single phone number in the state of Florida.
And when you are cracking a Wi-Fi password offline, it's extremely fast.
So I could run through every single phone number in the state of Florida in maybe 10, 15 seconds.
So if you use your password, I'm sorry, if you use a phone number as your password, it's as simple as me taking 10 or 15 seconds to crack it.
But the one caveat is I have to be physically within range of your Wi-Fi to capture that four-way handshake.
So if I can bring this on the camera real quick.
Sure, go for it.
This thing, you can do this with a $20 device on Amazon or even a cheaper device.
Like an ESP, I think it's called, ESP32 or 8266, but this is called a Wi-Fi pineapple.
And this is not your average pineapple.
This is an enterprise, which you would use this on a big engagement that has like that.
What would something like that go for?
This is about 800 bucks.
Okay.
But you can get a regular pineapple, I think, for $100 or $200, something like that.
This is way overboard.
Yeah, those are the ESP32 ESP.
So you can customize those in many ways.
You can make devices with them.
You can write custom software onto them that does its bad things, which I'll show you more about in a second.
But this right here is like a super, just think of this as a super powered Wi-Fi card that can receive and send a ton of data, capture those handshakes I was talking about.
And then, you know, you could try to crack it on here, which you're better off trying to crack it on your computer.
But this can also be a man in the middle, so you could trick the computers into thinking this is the router.
So all the traffic has to go through this and then go to the internet.
So you can, you know, you think phishing, you know, you tell you, look at the URL, make sure the URL matches the website you're going to.
Well, I can make it look like it's the right website you're going to because I'm the one routing the traffic.
Or for example, you go to a hotel room or an airport and you connect a free Wi-Fi and that screen pops up that says, I accept the terms or you got to watch an ad.
That's called a captive portal.
This thing, or any other Wi-Fi device, I'm just using this as an example, Wi-Fi card at least.
You can create those captive portals so that when someone connects to a Wi-Fi that they may recognize.
Maybe I deauthenticate their house, knock all their devices off of it, name it the same thing as their house so their devices try to connect back to it because it already knows it.
It's going to pop open that little portal screen and say maybe sign into Google, sign into Instagram, sign into PayPal, whatever.
You can get all of that information.
Yeah, so they put in their information, they press submit, that screen goes away, they're on the internet, they don't think anything of it, and now I just captured their credentials and they have no idea that it even happened.
So this device can do way more than that.
I'm just trying to simplify the concept.
What else could it do?
It can do multiple different bands, a lot of technical details that I'm trying to stay.
Simplify.
Yeah.
Got it.
Okay.
By the way, let me ask you this.
The whole story with you wanting to get a hold of pedophiles, how did that happen?
Got it.
So I missed explaining even why I got into the rehab business too.
I just forgot that too.
Should I backtrack?
Maybe just give me the concept here because the clip's going to be separate.
What caused you to want to go after child pedophilia?
Okay, so pedophiles, yeah.
So the reason why I got this passion, where it even came from, I don't have a kid, but I love kids.
I have a ton of cousins, a lot of half-brothers and sisters.
But I didn't have this passion until I get a text from my friend's wife.
And my friend's wife sends me some screenshots from this horrible website.
If you want me to name, I'll name.
And in one of those screenshots, there was a father that posted a picture of their kid in the bathtub.
And you could see their back, so you could tell they were nude.
And it said on the title, they have no idea what's going to happen to them tonight.
And then underneath of that, you could see a bunch of people just saying what they were going to do to this person's child.
And I was out, and whatever, something, obviously it's aggravating, I'm sure, for whoever's listening to hear that, just that one post.
People commenting what they're going to do to the kid.
Yeah, yeah.
So people were talking about what they were going to do to this person's child.
I mean, they weren't directly there, I would assume, because they're just people that were part of this website.
But the father that posted it, who knows what they did to that kid in the past, at that moment and after that.
So I left where I was at, and I decided I'm going to do whatever it takes to bring this website down.
And I literally, like I said, I left.
So I'm on my way there.
On my way back to my house, I go to this website.
Luckily, there wasn't any CSAM, which is child sexual abuse material on the website itself, but like on the front end at least.
But there were a lot of people talking about it, fantasizing about it, being very graphic about it, which I can read you some of that stuff if you want.
But my plan was originally to do what's called a distributed denial of service attack, which just means I'm going to hold the website down so that it could just overflow it with traffic so that it can't function.
That was what I was originally going to do, which is a very basic, easy thing to do, but that was my plan.
And I was advised by an attorney not to explain how I got in, but I can say that it was a custom Zen 40 nulled theme that was cracked.
That's what nulled means.
And I was able to obtain code execution on their server, which allowed me to extract their entire database, which included all of their users, all of the private messages, anything that I wanted to get, as well as four other databases from their previous websites.
But my common sense started to kick in, and I was thinking, well, I don't want to be in possession of any type of illegal material.
And obviously I don't want it anyway, regardless if it's illegal.
I don't even want to see that.
So the easy way for me was to take out things that had, there's a square bracket, the characters.
It's called a block or a short code.
And I removed anything that had an attachment or an image and I exported the entire database.
So after exporting that database, I saw the first user, the administrator of the website, was a guy named Nathaniel Larson, Nathan Larson.
And he was a person that ran for Congress twice in the state of Virginia.
And I was able to confirm without doubt that he was the owner administrator of this website, rapey.su, r-a-p-e-y.s-u.
And he had three different rapies.
There was rapy.su, rapie.to, and yes, that's exactly him.
So I, at that point, I'm thinking, okay, this guy is, he's, he's a little bit of a nut job, like outside of being a pedophile.
Like, just looking into him, he was into like white supremacy.
He was into being against women.
I think, no, I wasn't against women.
I think it was, what's it called?
Being an incel, like involuntary celibate.
So this guy just was a whack job around the board on top of being a pedophile and openly admitting to being a pedophile running for Congress.
So the first thing that I did was I called my lawyer because I was like, I have all of this data and there is a politician that is running this website.
And my lawyer then reaches out to a task force.
I don't know exactly which one he reached out to.
I then reach out to the National Center for Missing and Exploited Children.
I hit up their tip line with as much data as I could give them, fully expecting them to give me a call or to come to my house to grab that data.
And then after hearing nothing from them, you know, I'm sorry, I called an attorney in Virginia as well, where he lived at the time, and told them the story.
They were not much help.
And, you know, I was fully expecting the feds to show up at my door, seize my equipment, do whatever.
I was willing to do whatever it took because I knew that 12 people have to tell me I'm a criminal if I take something to trial.
And I don't think in this case, with me time stamping everything that I did and with all of the intentions that I had, it was pretty obvious that my intention was good from the start.
12 people have to say, you broke the law.
You're going to go to jail for exposing a pedophile ring.
So I was willing to take those chances.
I'm waiting for them to come take my stuff.
Somebody's going to bail me out.
Whatever it is, I'm just going to do it.
It's all going to be fine.
But nobody comes.
So, you know, I'm like very confused by that.
I'm like, I have this, I have a massive database full of all these people with proof.
I have evidence.
This is gold.
And then I was like, okay, well, maybe I can kind of force the hand a little bit.
So I started hitting up media, which I have never done before.
So I started hitting up 11 different media sources that I reached out to.
I don't have them with me, but if you needed them, I could try to find some of the recorded phone calls that I recorded with reporters.
And every single one, and so it's not the reporter's fault, so I'm not blaming any of them.
Every single reporter that I spoke to was excited to run this story.
So they all were going to run the story about this politician and the other users of the site.
They all got back to me with a very similar answer saying that their legal team was not willing to run it or not wanting to take the risk to run it or variations of that.
So I said, okay, well, how about you let them know, just we won't include any of the illegally obtained material.
Just let people know this website exists on the ClearWeb for anyone to visit, including children.
And don't include my name.
You don't have to include anything that I obtained illegally.
And they still didn't run the story.
So six months later, after me just not understanding why nothing is happening, Nathaniel Larson gets arrested at a layover in Denver, Colorado with a 12-year-old girl that he raped and kidnapped.
And I remember right now my stomach just dropped thinking about it.
It's because it was like I could have prevented that situation.
What year was that?
I don't remember the exact year, but if you find, if you look up Nathan Larson, Colorado, you'll get the exact year.
In 2020, he was arrested for served 14 months in prison for felony of threatening the President of the United States 2008.
So that's one.
Then 2020, he was arrested at Denver International Airport.
So two years ago for kidnapping a 12-year-old girl facing up to life in prison.
So this is four years ago when that happened.
Yes, yes.
So that was, but when he got arrested was six months after I already knew he was a threat to children.
And it was very frustrating that nothing happened.
Why do you think those guys didn't want to do anything about it?
I wish I knew, but at the time I wish that I knew.
I know a little more now.
But what happened was, so that, you know, this guy ends up going to prison.
There's a ton of articles about him getting arrested for that.
Right.
But there are, you know, nothing about his website.
They didn't talk about this website anywhere.
And there is so much to be discovered.
So many people that need to go to prison that are hurting, actively hurting kids.
And not only just the weirdos and dangerous people on that site, but the children on that website that were selling themselves to these people, which I'll go more into that later, that I was able to confirm that a lot of them, like they weren't fantasizing, pretending to be kids.
There were actual children on this website.
And by the way, he ended up dying from committing suicide two years later.
That's what I wanted to bring up last was he went to prison and that he starved to death.
But they claim it's suicide.
I don't care whether it was suicide or not.
I don't think he deserves to breathe the same air as us.
But he, you know, I just find it hard to believe that a jail would take on the liability without jamming a straw down your throat or a tube down your throat to feed you and let you die from starvation.
I just find it hard to believe.
I feel like the end.
You're saying somebody took him out?
I think just, you know, if the inmates are in control of your food and, you know, I think that there's a possibility that happened.
I'm not a conspiracy theorist, but I just find it hard to believe a jail take on that liability.
Let me ask you a question.
So do you, how much of this do you think is happening right now?
How much do you think of pedophilia and pedophiles?
Obviously, you're seeing a lot of movement with these guys.
The YouTubers are going out there catching people with, hey, this guy's getting a 13-year-old and then boom, they're punching him in the face.
Rob, I'm sure you have some of the clips to show.
I'm sure you've seen it as well.
Yeah, I did it.
I did it as well.
Oh, really?
Yeah, yeah, that's part of this story.
So you did that recently, or you used to do that?
No, so that had to change.
But so the reason why people heard my story in the first place, so let's just segue, I guess, into that because this was where that makes sense.
So I was doing this after that.
So I'll go back to the beginning of when Nathan Larson got arrested and nothing was done about the website and I still was not acknowledged.
I was like, okay, you know what?
I'm going to take this into my own hands.
And I saw there were YouTube groups that were confronting them.
They weren't hitting them or anything at this time.
But they were confronting them.
They were decoying on their own, pretending to be children, grown women, grown men.
And then they would confront them in real life.
But what I noticed, the common trend of these people was, was they would, you know, they wouldn't know the person's name.
They wouldn't know where they lived, didn't know where they worked.
They would just show up and say, hey, were you here to do this?
And either the person would sit and talk or they'd walk away.
But there'd usually be no arrest, no nothing, no repercussions, unless someone happens to run into that video.
So I was like, okay, well, I have some abilities with open source intelligence.
It's OSINT is the short term for it.
Let me just offer my services.
I want to make sure they, you know, don't include my name.
I don't want the notoriety for it, but send me your chat logs.
Send me the phone number that you have for the person, the profile photo, send me everything you can on each person.
I reached out to a bunch of YouTubers back then, and I was providing them full case files so that when they showed up to meet these predators, they would know, like, hey, hey, you know, John Smith, I know you work at ABC.com and your wife is this.
So you have a little bit more leverage in telling them, hey, you better sit here and talk to me.
And the way that the predator catchers would do it would say, hey, you either talk to me or we're going to get the police involved or we're going to call your wife or give them an ultimatum, even though it's going to happen anyway.
It just gave them a little bit more leverage.
So I did that for quite a few years by myself anonymously.
Nobody other than the predator catching groups knew about that.
And one day I'm sitting with a very good friend of mine.
He's a professional MMA fighter.
And I see you have some clubs over here.
His name's Dustin Scrappy Lampros.
And we're sitting in a garage and we're talking.
And I'm like, hey, man, you train three times a day.
That's your main career is fighting, you know?
And I have this, you know, I can show you how bad it is.
So I popped open a teen chat on Google and I, you know, I just typed, I think Ashley13 Female New Jersey was my username, like 13 slash F slash NJ, or it might have been Florida.
Forget what I did, but I hit start and all I typed was, hi in the chat, which I've demonstrated online before, and you know, within seconds, literally seconds, we could.
We could emulate it right now and I guarantee you we get the same result.
There were, you know, 20 plus people talking in the private messages, wanting to talk to us on the dark web, or this is just regular.
We could google teen chat right now and we could do it right now.
Okay Rob, go to teen chat yeah, and then just kick uh, do one where you can yeah, enter and then hit guest any of these, it doesn't matter, you could click anyone you want and then just give yourself a username like, if you actually want to do this, do like uh, just a girl's name, Maria Do Maria 13f, Florida or ffl.
and then yeah put 13 or what do we put as the age Well, I put 13 as the age.
Is that too old?
Um no no, that's fine.
That's fine.
So just click the teen chat.
I've never seen this website specifically but yeah, just type hi and then wait for the private messages to come in on the top.
This might get graphic, who knows?
But remember this is the first link on google for teen chat.
Keep that in mind.
Wow, what happened?
I'm already getting dms seriously.
Yep yeah, open them up.
Seriously what it say.
Let's chat on teleguard.
Uh, 68 female, 55 ga, 7e.
Yeah, they want to chat off-site on a.
You know, obviously that's an adult.
What are all these people messaging?
One two three four, five different ones.
So this guy doesn't know, and i'm sorry, these people do not know what this girl looks like, they don't know how old she really is, but they're sitting in a teen chat and so some of these may be kids.
Like that says Molly 15.
That could be a kid, but I guarantee you go through a couple of these.
You just say, how old are you?
Just lonely guy?
Yeah, that is not a, that's not a teenager.
Well, let's respond.
Yeah, go ahead, ask them how old they are.
And you know the way that we would do it, as a decoy, for example, let's wait to to see what he's telling us to put.
Go ahead, what should he put?
I can't see the screen.
Zoom in a little bit Rob, to see if the chat shows.
There you go.
So hey hi, how are you?
Say, hey, how old are you?
I would do that for a couple of them.
and you're getting blown up with look at all these messages and there should be ridiculous and all you said was hi oh geez what's this one say hey guys my name is ryan montgomery also known as zero day i'm proud to be part of the appmanect if you have any questions regarding child safety cyber security or even any of the gadgets that you see me use all over the internet feel free to reach out i'd be happy to help you with any any questions or concerns you may have stay safe yeah say how old are you
okay just type in how old are you you openly ask that question you don't even hesitate yeah yeah go right yeah usually they'll respond with a real age these these these predators They don't have any fear.
They're nuts.
It's absolutely insane.
What's this one saying?
Yeah, look at that.
So that's either a bot or a real person.
I don't know.
Okay, Alise.
So let's see what else we got.
Yeah, and then you can also say hi in the chat again, get some more people going, but yeah, so that's an adult.
Are you joking?
Yep, this is just Lonely Guy turned 19 in May.
Hope you don't mind is his response.
What do you want to respond to be?
I mean, you could say whatever you want, but usually they're like, you know, 30, 40, 50 years old.
19 is still horrible.
But yeah, that's an adult sitting in a teen chat.
And 19 is a teenager, but he shouldn't be talking to what he knows to be a 13-year-old.
Or would you say to that?
13 or 13?
13.
Yeah.
Yeah, but the unfortunate part is I see when I was doing this, at least with Dustin, which he's still doing it himself.
561PC is the group that we started together.
It's still around.
You start to see, even on major sites like Instagram, Facebook, and TikTok, that more men are willing to speak with a child than not.
And it starts to make you lose a little bit of faith in humanity.
So let me ask you, okay, so we've had a lot of people on to tell us.
Look at this.
Look at this.
It's insane.
That's exactly what I'm saying.
That's insane.
I'm actually trying to see how far along this can get.
Look how many there is.
It's filling up the whole screen.
This guy just offered his age high 17 male metal gods.
That's a kid.
Okay.
You're assuming that's a kid, right?
You said that.
Hi, how are you?
Can we chat?
Do you have age preference or limitation?
Do you like an older boy?
There you go.
So what do you want to respond with?
Say yes.
How old?
So it's unbelievable.
Like, you could sit here all day, but this is, remember, first result for teen chat.
So a kid might think this is safe, or a parent might think this is safe.
It's a teen chat.
The first result on Google.
We didn't even go through all these private messages.
You're still getting a ton of messages, Rob.
What's it say?
27?
Sorry?
Yeah, 27-year-old.
There you go.
Oh, okay.
I mean, you're in teen chat at 27.
Unbelievable.
But here's a question.
So if we know this is happening, okay, does the U.S. government, the U.S. government knows this has happened and they know how much of a business this is.
We've seen the number thrown around $150 billion your industry is what it is, right?
Human trafficking, child trafficking.
And if the U.S. government really wanted to get to the bottom of this, okay, we have the ATF, right?
Which is what?
The tobacco fire alcohol, tobacco firearms, right?
We have the, you know, we have FBI, Federal Bureau of Investigator.
We have CIB.
If they really wanted to create a three-letter organization purely dedicated to catching pedophiles, they obviously could do it.
Well, I mean, a lot of them do.
So Homeland Security Investigations has child crimes units.
There's FBI.
They have child crimes units.
You know how much money they dedicated to it?
Not much.
No, not much.
Not in the millions.
No, and it's the second thing next to the drug war.
Why don't they do it, though?
Why don't they pursue it?
I wish I had an answer for you, but I don't.
And now doing what I'm doing, I guess going back to what I had to stop doing the project with Dustin or Scrappy because they considered vigilante justice.
So I couldn't sit in court and be discredited as a vigilante catching predators outside of the law.
So I had to join a group called Sentinel Foundation, which is awesome.
I'm the CTO of Sentinel Foundation.
It's full of Green Berets and Delta Force operators and retired Homeland Security.
And we work in parallel with law enforcement now.
So I'm able to actually get convictions, actually take down big, you know, big operations rather than one predator at a time, which I think there's incredible value in both, but I had to make a choice, right?
It's either I take this once-in-a-lifetime opportunity to be the CTO of a reputable, I guess, NGO, non-government organization that works with law enforcement or continue to bust them on YouTube and get one at a time.
So Dustin's been doing a fantastic job.
And he's been getting arrested, by the way, which is something relatively new.
What's the craziest story Dustin has?
Craziest story Dustin has.
Yeah, in regard to catching a predator.
Maybe even yourself.
When you were doing this, what are some of the stories of who you caught?
So we've caught teachers, police officers.
Teachers.
Yeah, yeah.
I caught a teacher.
Here's a crazy one.
So a guy, his name was Brent, and he was meeting up with what he thought was a 13-year-old.
And there's a video of me actually chasing him on YouTube.
So he thinks that we're police, which I find that out later.
But he meets up.
He thinks he's meeting with a child, a little girl.
And I chase him to his car.
He peels off.
10 days later, I get a message from another predator catcher group on the other side of the country that he got caught again by a different decoy in person.
So he got caught twice.
And now he's talking to a decoy again that I was recently made aware of.
So three times.
So think of the times that he has not been caught.
And he's a teacher.
I mean, you can look him up.
I forget.
Well, I'd have to look up his name on my computer, but it's Brent something.
He had two different teaching positions last I checked.
And there's been other teachers that Dustin has caught.
What is the profile of how these guys are wired?
Is it the fact that even if they get caught, I'll never do it again.
I'll never do it again.
I'll never do it again.
Boom, they're back at it again next week doing it again.
Is it because they just don't think they're going to get caught?
Or is it because they don't care what the consequences are?
I can't think like one of them, so I don't know.
But from what it appears to be, it seems to be a compulsion that I have no sympathy for.
It's the only mental health disorder, if you want to call it that, that I have no sympathy for.
I could literally watch someone's...
I could watch a pedophile or predator or trafficker, watch them get beheaded in front of me, and I would not lose sleep over it.
So I don't know.
I think it's a compulsion that they can't help themselves regardless of the consequences.
But I have no sympathy for it, and I don't think they deserve to breathe the same air like I said earlier.
Rob, you know who all said this?
You know who else said the same exact thing three weeks ago?
Judge from Sheriff Grady Judd.
Oh, Grady Judd, yeah.
We had him on.
He worked with us.
He worked with you?
Yeah.
Yeah, we had him on, and he told me about a story of a guy that he went to jail and he told him and he went and watched a death penalty, if you remember, because the guy told him what he did to a 12-year-old girl.
And then afterwards, how he says, I sat there and I watched him die, and I had zero sorrow for what was going on.
I actually partly enjoyed it.
I believe those were some of his words on what he said.
I'm paraphrasing.
But I think a lot of people are also where you are.
I just wonder why there's not that much of an interest in wanting to get to the bottom of this, especially if they're mainly targeting kids.
Yeah, look at this.
Look at this.
I mean, the interest should be there.
And I've said this in other interviews and videos myself.
If you have the ability to do something about this, you should be doing it.
But people don't.
I mean, I know a lot of people in the hacking world, which is a small community, but I know a good majority of it.
And there's not enough people doing it.
Law enforcement can't handle it.
A lot of the internet crimes against children's technology is very antiquated.
I talked to one not too long ago.
I won't name them because I don't want to embarrass them, but they wanted my training and they wanted me to help them with their investigations.
And I'd be happy to do that.
But that shouldn't be the case.
They shouldn't need my help.
What are you seeing here?
Hey, high school teacher here.
And cute, any girls want to chat?
Oh, my gosh.
And this is a teen chat.
The first result on Google, guys.
Remember that.
First result.
Wait, he's a teacher asking.
And by the way, this website, is this a, this is not a dark web website.
This is a good thing.
We can go click another one.
We can go click a different teen chat and the same thing will happen.
And how does this chat room know that's happening and they allow that?
Because that's public.
It's not even private.
How does the chat know this is happening?
This is the part that most people don't understand is it's every website.
It's not just teen chats.
It's Instagram, TikTok, Sprout, Meetup, Kick.
You don't have any kids?
No.
Do you want to have kids?
I do, but I'm terrified.
Is this what you're terrified of?
Yeah, because every kid has a phone and iPad and it's like an appendage to them.
That's something I wanted to talk to.
Giving advice to parents is something that I like to do, but I don't have kids, so it's like, I feel weird doing it.
But in a way, it's almost like I feel like I have to.
If I see something bad, I need to let you know about it.
And there's something that's different from when I was a kid, even though I was attached to the computer, like it was a body part to some degree.
Kids really depend on their phone and their iPads and everything else current day.
So when you, let's say your kid is scared to tell you that a high school teacher or a grown man is talking to them because they're scared they're going to get their device taken away, they're just not going to tell you.
And then a catastrophe might happen and then they're going to be dealing with trauma or worse for the rest of their life.
So my advice to parents out there is make sure your kids know that they can be open and honest with you without the repercussion of losing their device.
Let me ask this question.
So let's just say you got kids and your kids are six, seven, eight, 10, 12 years old, whatever.
You pick the ages, right?
What are you teaching them?
What are you telling them?
Based on what you know, and you know all these tools, what are you telling them?
What are you showing them?
I'm telling them to stay off of the social media that I'm not, that they haven't had my approval to use, I guess.
I would like to have access.
I don't want to be a helicopter parent is what I'm kind of trying to get at.
So I don't know exactly how I'm going to do this because the more that I do, I've been doing it for years now and my brain is so tainted from seeing how screwed up people are that I don't know what happens when I have a kid, what I'm going to do, but what I can do.
I mean, I would probably be following the same advice that I would give other people, other people that are parents.
And I would monitor my kids' devices.
I'd let them know they can be open with me.
And then, you know, I would try not to be overbearing, but I would ask a lot of questions.
Okay.
I mean, we can talk about this all day long because to me, this is very important.
As a father, that's why my kids don't have a phone.
They don't have, they only get to play iPad twice a week.
That's Saturday, Sunday.
If they have C's, they don't get to play iPad at all.
Whether it's three months, six months, it doesn't matter.
And I think too many parents are just kind of giving their, I'll go to dinner.
The other day, my wife and I went to dinner.
This three-year-old kid, parents sat down, gave him a Soska.
You know what a Sosuka is?
What do you do when you give the thing in the kid's mouth?
In Russian, they call it Soska.
What do they call it?
The binky?
What do you call the thing?
Oh, the nipple, the baby nipple?
Go to images?
The pacifier.
Yeah, pacifier.
It's a binky pacifier.
Was that Jake in a back?
Jake, you're so funny, like a voice of God.
Yeah, we call it Soska, and that's what we grew up calling it.
But anyway, so this kid, the mom gives a kid a Soska and then gives a phone and boom.
The dinner was two hours at Nobu.
The kid was stuck on her phone for two hours.
I'm just, Jen and I were watching saying, are you flipping?
And we're there in dinner with our three kids.
None of them have a phone in front of them.
These guys have a phone in front of them.
It's a pretty scary time to have kids.
I don't blame parents who are worried, who aren't, not parents, people like yourself that are worried about having kids.
But let's go to a different thing.
So I walk into a business, I look at the business from a different lens.
I'll say, okay, is it secure?
How many employees do they have here?
How many computers?
What are they using?
How do they have it set up?
How many offices versus how many cubicles?
Is it an open environment?
Is it a private environment?
Are people talking to each other?
Is there a culture built?
Are people hanging up stuff to show what they're all about?
Is there family pictures around their table?
Because if people have family pictures around their computers, that means they're probably going to be there a little longer than usual.
You're a different story.
You're a hacker.
You walked into our building.
What are you looking at?
What are you thinking about?
How are you sizing us for our vulnerabilities?
So in the hacking world, they would call it reconnaissance or enumeration.
So what I would be doing is trying to see what type of equipment you have, what computers you're running, what operating system you're running.
Go on my phone, try to figure out what type of Wi-Fi you're running, whether it be WPA, WP3, et cetera.
Why does that matter to you?
What kind of Wi-Fi?
Different types of attacks depending on some different scenarios.
And if people have their phones out, is it majority Android or is it a majority iPhone?
They call it a threat landscape.
So I would take the attack surface or threat landscape and then try my best to take over as many devices as possible and manipulate as many people in this building that I can to get what I want.
If we were on an engagement doing a penetration test.
If we were in an engagement doing a penetration test, and how long would a penetration test take with you?
Depends on the size of the business.
But usually, I mean, we have a pretty good team.
I mean, I would say, in my personal opinion, one of the best in the world, if not the best in the world.
So usually fast and done well.
But a lot of times I get involved as well.
And I seem to be very thorough because I care.
It's my company.
I'm sure you can relate to that.
Are you naturally more a CTO?
Is that what your wiring is?
No, no.
I mean, I've always been a CEO.
I just happened to be the CTO of Sentinel Foundation because that's what they titled me.
But I handle a lot more than just CTO-related things with Sentinel Foundation.
Let me ask a different question.
So when it comes down to CIA or Mossad or MI6 or somebody's secret intelligence, right?
You'll hear stories about the fact that, hey, these guys have the best secret intelligence.
Those guys have the best secret intelligence.
If you really wanted to, you know, hack into Mossad, okay, the Israeli military intelligence, or MI6, UK military, or even our CIA, could you do it?
And how deep could you go in?
So if I was, I mean, I can't say that I can or can't because I don't know, I've never tried, but I would say the first thing that I would go for would be an individual.
I would try to befriend an individual, whether that be with my real name or with an alias, and I would try to manipulate that individual into doing something that would give me access to their devices.
Okay, so that's your pattern on how to.
Okay, so let's just say you got in.
What are you looking for to get in?
Because those guys, they typically have two separate phones, right?
And they probably know guys like you, and they probably get trained to be careful on what to do with guys like you, right?
Turn off your Bluetooth, turn off your Wi-Fi when you're on them, or any of that stuff, right?
Yeah.
But okay, but let's just say you do.
What's your next step after that?
So after I after I get a like.
Say you got a Mossad agent or an MI6 or a CIA.
You got somebody.
You get info from them.
Then what are you doing next?
I'm going to try to authenticate to, let's say it's a web server.
I'm going to try to authenticate to the web server, see what type of data I can pull from it or hide my persistence on that web server so they can't find me and get rid of me.
And then I'm going to try to pivot to the other computers inside of that network or in that organization, whether it be computers or devices.
That would be my next steps.
So you have to have some point of exploitation or some point of weakness.
You take advantage of that point of weakness, whether it be a person or a device or a website, whatever it may be.
And then you want to pivot around that network and look for more devices and more people to infect.
Okay, so let's think about Wikileaks.
Okay, Julian Assange, right?
What happened with him?
And he just came here.
I thought he was here and then he went back to Australia.
Not here.
I think he went to Bahamas or something like that.
He was somewhere around here four weeks ago and then he flew back to the Bahamas.
A person like a Julian Assange, okay, or a person like you, you know, everybody is wondering what happened with the Epstein files, right?
It's just a lot of, it's on a lot of people's minds.
I'm sure.
And if these guys did what they did and they held these people hostage, because like even this guy named Leon Black, who's a multi-billionaire, he ends up paying some, I don't know what the number was.
What did Leon Black pay Epstein for consulting fees?
Zoom in $150 million in fees for tax services.
I've never heard of that before.
And load him $30 million and also made a $10 million donation to his charity, right?
That's kind of weird to do something like that.
That's a little odd, right?
It gets a guy like you question that.
If you really wanted to go into finding out what Epstein had access to, what types of files and videos and stuff like that, and that was your real mission, like you were determined to do, because let's just say one of the girls that he was abusing that was underage was a sister of yours or a cousin of yours or a niece of yours.
If that produced the emotion that I think can produce in a person like you, do you think you could find the files of what Epstein had if you really wanted to?
I think that if I couldn't find it digitally, I would swim across that damn ocean and get on his island and I'd find it.
I would do it that way.
I would talk about just keeping it basic with the technology because there's way more attacks than just Wi-Fi.
But just, you know, even if it meant swimming across, getting on a boat and just going around in a circle with that island, trying to connect to one of those computers if he had one.
And, you know, I would try everything I possibly could, especially while the island was populated.
Now that he's dead, I can only go off of what people have, you know, and what's out there.
And there's only one journalist that I'm familiar with that, I'm not familiar with that, that I know of, that has his black book and his wife at the black book.
I don't know much more that was released about the guy.
Like, I personally don't even know how he became a billionaire.
I have no idea.
I don't know that much about him.
We just showed it to you.
That's how he became a billionaire.
I thought that I misread that.
I thought it said millions.
No, no, but that's one client, though.
So imagine the accusations that are being made is the fact that he had so much intel on so many people that he would bring to the island and he had videos and things that they did that he would come back and say, hey, now you got to pay me XYZ or now you got to do this.
I need this offer and I need this favor.
I need that favor.
And I kind of combined.
You get a lot of people that are willing to pay the kind of money that they're paying you.
It doesn't take much to become a person.
So he was extorting them.
That's exactly the key.
That's what a lot of people accuse him of.
Yeah, well, I mean, but really, to get extorted in that situation, you have to take advantage of a child.
So, I mean, I don't feel bad for either side.
I don't feel bad for, obviously, Jeffrey Epstein or anyone that he extorted.
If they're going to rape a child, I mean, I think they deserve that.
Yeah, but how many people like you are out there in America?
If you were to say capable like you, how many of you are out are out there?
I mean, it's hard to tell because everyone's anonymous, you know, or going by.
Not everyone, but most, if I had to take a guess of actual hackers, not just beginners getting into the field.
No, no, at the level that you're at, if not higher than you, how many of those are out there?
Let's just say 10,000 to 50,000.
That's a lot, though.
I don't know if China, you know, they have a lot of people.
I'm talking U.S. like how many do you think there are?
U.S., I would say 10,000, 20,000.
10,000 of people that can do what you do.
Yeah, but not working with our army and our military to the extent that people may think.
What do you mean?
Like, you know, I had a recruiter come in when I was speaking at Hack Miami, and the recruiter told me that there were less than 1,000 people in the entire army that's fighting for our country with a computer, cybercrime, or cyber warfare, my apologies.
Yeah, I just like I don't think you would do it because you're not trying to make enemies.
From the feeling I'm getting from you is you're trying to avoid making enemies is what you're trying to do.
I'm making enemies all the time.
So do you think, so let me ask you, who do you think is the biggest, well, I don't know.
I don't know.
Because to me, see, I don't know how to do what you do.
I don't have that talent.
That's your talent, right?
But if somebody, like, let's just say I'm living in a, in a, because I don't think it's that hard to find out what Epstein did.
I don't think it's that hard to find out what Diddy had on his files for him to get raided in Miami and L.A.
I don't think you guys look at it and say, how do you not know?
I think guys like you look at him and say, how the hell do you not go get it?
You know, you know what happened.
Oh, if I had the same authority that somebody that could seize his files or get access to where he was at, if I had that authority, it'd be game over for him.
But when it's all sealed up and stored in an evidence locker, so you still couldn't get through that?
I mean, it doesn't mean I couldn't do that, but I would be breaking the law if I did.
And it's already being handled at that point, hopefully.
I just, I don't think it is, though.
See, I don't think it is.
I think, honestly, I think the saving grace to put a stop to the pedophilia movement and the human trafficking is guys like you.
I don't think they look like Navy SEALs.
I don't think they look like me.
I think they look like you.
I think they fear the hell out of people like you.
And by the way, you know how they took down the mob?
Yeah.
You know the story how they took down the mob.
You know who Rudy Giuliani learned how to go take down the mob?
Yeah, I don't know every detail, but yes.
There was a professor at Rutgers University that, I think it was Rutgers.
Can you type in Rudy Giuliani Rutgers mob?
Rudy Giuliani Rutgers mob.
Zoom in a little bit to see if there's a story of Jim Johnson.
Rutgers professor.
Type in professor if you can, Rutgers Professor, Professor, Professor Mob.
Zoom in, Zoom in, see if that story is out there or not.
Okay, I'll find it.
Anyways, Rudy Giuliani is trying to find out how to take down the mob.
This professor gets a hold of him and says, the way you're going to do it is through the way you're going to do it is through, what do you call it, through RICO laws.
And Rudy says, how do we do that?
Anyways, the guy eventually coaches him to be able to find out how to go take him out with the, and that's how they did it.
Got it.
With the RICO Act.
They did it with the RICO Act is the way they did it.
And he was able to get him down based on, you know, and then that was the way 240 guys like this got arrested.
Right.
It's like, oh, shit.
And then what happened?
Clean up the streets of New York.
The mob is gone.
Okay.
And it's no longer what it was that it was in the early 80s or 70s or 60s, 50s.
You know, there still hasn't happened an event like that for 40 years where guys are getting locked up and arrested to say, listen, guys, we're going to leave this business of human trafficking.
Oh, I wish there was.
I wish there were.
The issue, like I said, going back to what I was saying, is whether they're a big-time trafficker and they're dealing, you know, they're trafficking a ton of women and children, or they're just a single predator slash pedophile, or they're a drunk guy that, which I still think pedophile, even if you're a drunk guy that gets horny and decides to meet up with a child, there's variations of how bad these people can get.
Like the sheer amount of them that are willing to meet up with a kid on any platform, it makes me think that this is a problem that I just don't know how.
I don't know how we're going to be able to solve it with the law.
You know, it's, you can, yeah, it's illegal.
You could end up on a sex offender registry, but these guys keep coming back.
They keep doing it.
So I genuinely don't know how to answer that question.
I don't know if the RICO Act would solve this one.
No, no, I'm not asking about the RICO Act at all.
What I'm saying to you is, I think guys like you, if 50 of you, well, if 50 of you were part of the I don't give a shit community, which is hard to find that 50.
If I was the president or if the president assigned me to say, hey, I need you to go find out what's going on with, what do you call it, you know, with pedophilia and human trafficking in America.
You know what I would do?
I'd call you and I'd say, hey, we have five other names.
We want to have a meeting.
I'd have my guys filter you out to see if it matters to you or not.
If you didn't give a shit if you're like, ah, it's honestly right now I'm making so much money.
I don't want to get caught up like this.
I'm living a decent life.
No problem.
But I would bring you guys in, 10, 15, 20 of you.
I would say, I bless you.
I would say, I need you guys to be with me here for 30 days.
So if you're going to come, you've got to come into being with me in this building for 30 days.
Yeah, yeah, I would love it.
I would want all of us in the same building.
We can't get out.
Okay.
I'm going to get you food.
I'm going to get you a place to sleep.
You're going to get plenty of rest.
You don't have to worry about that.
And we're going to turn you into a hero for figuring this thing out.
I'm going to say, what tools do you need?
You're going to say, if I ask you right now, what tools do you need?
What would you say?
Technology, what tools would it be?
A laptop access to, because we built PenTester, and this is not an ad, but we built PenTester upon the technology I was using to find predators.
And we flipped that technology around to help people find their own digital footprint and remove it.
So I would say, give me a computer, give me access to my own platform, and then that's it.
You need it to work.
Yeah, and then internet.
You know, I need an internet connection, but that's about it.
And then, you know, you're saying within that, if I had a room of 50 of you in the same room, locked up, you can't get out.
You're telling me you guys, and you guys, within 30 days, you'd figure out what's going on.
I mean, it's not a guarantee, but I think you have a pretty good shot of it.
I mean, I don't know.
It's a fictional scenario, so it's hard to know for sure.
Yeah, I think you guys would, though.
I believe we would.
I believe we would, but it would be me.
I'd be lying if I was saying for sure, because I don't know the scenario.
If there was a case and you said, this is the details, here's the exact target.
You know, everybody has a mission that they're on and a sword that they're willing to die on.
Do you have one or no?
My mission is to, number one, educate parents and protect children.
That's my main life goal at the moment.
But secondly, I realize that a lot of my content is very hard and very, very, you know, very Tough to swallow type data information.
So, I thought, well, what else can I do to help other people?
And my thought was help people get into cybersecurity because it's the number one industry in the world right now.
We need more people doing it.
And it's fun.
And I love teaching it.
I love simplifying it and showing people how much fun you can have doing the right thing.
Like, you don't have to take the paths I took as a kid.
You can make a ton of money doing it the right way.
So I started making 30 to 60 second videos on social media showing and demonstrating these attacks.
And I have people walking up to me literally everywhere that I go.
You name it in a public place.
Everywhere that I go, I have people coming up saying, you know, like, you know, see you online, been this, this, and that.
There's those people.
But what really makes me happy is when they come up to me and they say, you know, I was their inspiration for getting into cybersecurity, or I'm their reason that they're in college for cybersecurity right now.
It's a career.
It's a very promising career to get into.
Right, but it's an honor to know that I had a part in that.
I'm not going to take credit for it, but to have a part in it.
Inspiration.
It really motivates me to keep doing this.
Ryan, what other tools do you have there that you want to share with us?
I got something cool that you'll appreciate it.
I want to see it.
Hold on.
If you want to see something funny while I pull it out, check an email on there, like one of your old Gmails or something.
Type in patrick at the storybuilders.com.
Patrick at the storybuilders.com.
So it's going to be a little the site will be a little slower than it normally is because we got like 30 to 40.
We'll wait until it comes.
It will wait until it comes.
But you can show me what you got in it.
We'll get to it.
Have you checked the NPD breach too?
Your socials probably, I would almost guarantee that it's in there.
So you should probably handle that before you post my interview.
Okay.
Yeah.
Sounds good.
Okay.
So this is what is this?
Just out of curiosity.
This looks like something I would use to charge my phone.
Yeah.
With a charger.
Yeah.
And you know, that's so.
I have every single charger you can imagine and all of them, right?
So actually, what this is, the reason why I have this little orange thing here is because there is no way I'd ever know that this was a charger.
I'm sorry, that this was not a charger without this orange tag because it is that that perfect.
So the NSA is selling these for $20,000.
And I have a friend, MG, he goes by who is selling them for a couple hundred dollars a piece.
And I have a bunch of them I can show you.
But this one I preloaded with something cool that you'll appreciate.
So this is a charger that will work.
I could hand this to you and say, hey, here's my charger, man, or replace yours, right?
Whatever you got plugged in, I'm sure I have a replacement for that.
You bring this home, it could act like a charger forever.
But as soon as this plugs in, inside of this tiny little plastic right here, inside of this is a Wi-Fi chip, a mini computer, and this thing emulates a keyboard and can type at 860 characters per second.
So what I'll do is, because I'm sure you don't want me to plug this into your computer, I don't.
So let me get my computer set up real quick.
Did you say $20,000 for that?
Well, the NSA has a look up.
If you get it, oh, it's still stuck on the scan.
But yeah, definitely check back at that.
But look up NSA OMG cable.
And then, yeah, you should see that that's the actual cable itself.
But if you scroll down to the bottom, you'll probably see where the NSA is selling their own version of it.
Before my friend, there it is.
I just found it.
$20,000.
Yep, I just, I'm going to text it to you.
Wow.
Yeah, so MG was able to pull it off for a couple hundred dollars, which is unbelievable.
And it is so dangerous, man.
It's just I have so many gadgets with me and we probably don't have enough time to go through I mean I have literally 50 plus gadgets with me so I'll show you a couple of them but like don't want to don't want to go too crazy
Yeah that's a European site that you can buy it from yeah right there's this complete wireless pen testing payload platform and visibility embed inside a cable originally a clandestine NSA tool costing over $20,000 now available to everyone 200 bucks.
Yeah there's a name for it to I think I can't remember the exact name the NSA was calling it but you could see the actual government document with the cost for the for the exactly the same thing.
So now what does this do?
So I'm going to show you what it does but it can it can monitor your keystrokes so you can put this in line in between your key.
Are you kidding me?
Yeah you can put this inline in between your keyboard and your computer.
I could put this in straight into your phone.
I could put this I can type keys like I said at 860 words per second.
I can leave it there and come back later.
This thing has its own Wi-Fi network that I connect to inside of this.
And then if you were to like you can match this up to yours and see it's absolutely identical.
100% same thing.
Yeah so if you didn't have that little orange thing on there you'd easily lose that.
Wow.
Yeah is the one you have the is this is that the new design or is that the I couldn't even tell you this is just well I just meant like is it the woven one or is that the one that's the Apple one.
This is actual Apple.
Okay so let me show you the Apple one while my computer is booting.
I don't know why it's not booted up yet.
I have so many of them.
He gave me a ton.
Yeah here look at this one.
That is not an Apple charger.
This is the same thing as the other one?
Yeah.
And so let's just say you give this to somebody you're spying on, okay?
They put it to charge.
You're now seeing who I'm texting, what I'm doing, videos I'm playing, everything I'm doing, you're seeing all of it.
Not texting, because I can't, but on the computer, yes.
Yeah, on the phone, I'm able to inject keystrokes into the phone.
Like, let's say I want to install a virus on your Android or something.
I could do that with that device, but I can't tell what you're typing.
On your computer, I can tell what you're typing.
So these things are wild.
200 bucks.
Yeah, per cable.
Who buys them?
Who uses them?
So they're intended for penetration testers like myself to do the right thing.
But threat actors can buy them as well.
All right.
So let's skip this thing.
They're intended for penetration tests that you do for companies.
Yes.
Okay.
So make sure everything's plugged in.
We're not on any.
Yeah, there's no internet here.
All right.
So what I'm going to do is, and you can see here that without this orange thing I have on here just so I don't lose it with my actual charger.
But I don't have to have that on here.
I just don't want to lose it.
So I'm going to plug this into USB-C, which, you know, you can pick whatever one you want.
So that's plugged into USB-C.
This side, I'm not going to connect to anything.
I could charge my phone with it.
I could do whatever I want with it.
But what I'm going to do is on my phone, I'm going to go to Wi-Fi.
I'm going to click OMG.
Now I've just created a network from this cable that's plugged in.
It's not plugged in.
We don't have an OMG network here.
No, no, no.
No, and this is not plugged into anything.
So this is creating a Wi-Fi network.
Yep.
I'm going to go to it in my browser.
And then now I have an interface here that I can connect with.
So I'm going to go in the file menu.
I'm going to load payload one.
There we go.
All right.
So ready?
Now I'm going to hit build and run, which I could be very far away from the computer.
This is just showing an example of it.
See how fast that's typing?
What's it doing?
It's typing PBD podcast and zero day was here.
Get at it.
So that could have been anything.
Yeah.
That could have been a malicious command.
That could have been a virus that it downloaded.
That could have been anything that I wanted it to be.
And I have now remote control over this cable that if I plug right into my phone, watch, plug it into my phone.
Charges.
Charging.
You would have no idea that this implant is in your house.
Just because there's a Wi-Fi in here?
And more.
There's more in there.
I'm just simplifying it.
So this is like a small little computer.
Yeah.
Yeah, and it weighs the same, looks the same, feels the same.
You would never know that that thing is extremely dangerous.
And so this is used for an ethical person to do a penetration test on a company.
What does an unethical hacker do with that tool right there?
An unethical hacker can use this tool to steal people's credentials, to monitor and spy on people, to look through your webcam, to try to get access to your network, to your phone.
They're going to do it for, the criminals do bad things.
An ethical hacker is going to try to access your computer, to access other computers, to try to take over your company so that you can show where the weaknesses are so you can make it better.
So it's essentially the same concepts, though, but one has a good goal in mind.
The other one has, you know, screwing someone over in mind.
$20,000.
NSA used to use it now $200.
Yeah, and that's just for one cable.
I have, I mean, I could show you all of them if you want to see them all.
Same exact type of a cable.
Yeah, they just look like a real cable.
And I got a real funny one, actually.
So the way that I would recommend protecting yourself from this would be with what's called a data blocker, right?
So a data blocker is something like this.
I'll show you.
Okay, so here's, here is, there's two things here I want to show you.
So you can buy a data blocker for about $5 on Amazon.
You can plug any USB device into it, and it's only going to limit it to charging so that even if it is a malicious cable, it can't be abused.
This, this is funny.
So this was kind of a joke that my friend, he made this, but it's a product he sells.
It's a data blocker called the unblocker that blocks these attacks, but also has payloads in it to do the same thing.
So it's a USB data blocker and looks just like one, but also does what you just saw.
It allows you to inject wireless keystrokes and monitor keys, etc.
So that is for what?
That is for somebody to protect themselves against what somebody could do?
Yeah.
And that's how much?
Five bucks?
No, this one's like $150.
That's $150.
Yeah.
Who needs that?
I mean, I don't think you need it.
I think it's safer to use a real data blocker, pay $5, $10 on Amazon for one.
This one's more of just a joke like, here's a data blocker that I'll swap yours out with, and then I can inject payloads through your data blocker.
Is that like an RFID or no?
That's different.
No, it's different.
I'll show you that in a second, actually.
And this is the malicious cable detector, which is his other thing.
and I feel like I'm promoting the crap out of him right now and I'm trying I'm sure he's appreciating I'm sure he's getting a lot of business right now.
Well, I hope so.
But he's such a nice guy.
He was a help desk guy that ended up doing extremely cool things in the hacking world.
But this is a malicious cable detector that he also sells that if you want to be extra overboard, you can buy, plug it into this, and it'll tell you if it's a malicious cable or not.
Got it.
Got it.
So yeah, let me put these back, but I want to show you one more, I'm sorry, one more thing that you, you know, to worry about, something you can check at home that is kind of an interesting concept.
So you got a girlfriend?
Yeah.
So with your girl, I mean, you probably know everything she's doing.
So you'd be surprised.
A lot of people think that.
A lot of people think that having a girlfriend and having the ability to go through her stuff basically whenever I wanted to, I'm going to take that.
You really could.
I mean, you can find out everything she's doing.
I could, but I don't, and I haven't done that, you know, almost, I've done it maybe when I was younger a few times, but as an adult, I realized that no matter who you are, you're going to find something you don't like no matter what, whether it be a smile.
I'm not a jealous guy by any means, but you're going to find a smiley face here or there.
You're going to find a hard emoji here.
It's like, do I want to piss myself off for no reason?
So I just don't.
I don't look.
If they're going to cheat, they're going to cheat on you regardless of what you tell them they're going to do or tell them what you want them to do, who they can and who they can talk to.
Don't even try.
They're going to cheat on you or they're not going to cheat on you.
So that's just my mentality on it.
Good for you.
And so what is that?
Do you get those Ritz Cheese Krispies because that's like your?
Yeah, we're going to promote Ritz on the.
I've got this point.
I'm sitting down with the greatest salesman of all time.
We got Ritz cheesecrackers here at the DBD podcast.
But yeah, I don't know.
I just was hungry.
I brought these cheese.
I thought you were going to do something with that.
I'm like, so he brought Ritz.
No, I was just hungry.
My kids would be running here right now if that was your.
You'd become their best friend.
I love Ritz bits, but my mouth is so dry, those things would probably kill me right now.
But screen crab, this thing, this one's an interesting one.
So the cameras aren't set up in a way for me to demonstrate it, but check this out.
So you can probably, oh gosh, it's in there.
Okay.
So this device, if you see on one side, it has USB-C, which you could do USB-C to USB-A, which is just this little square USB, and then HDMI, HDMI, and then it also has a little antenna.
Okay.
Right?
You don't need the antenna.
It also has one other thing here for an SD card, which you can fit right here with, you know, you can put two terabytes in this thing or a terabyte, a lot, a lot of storage.
Put your HDMI in, put your power in.
Every TV, every monitor for the most part is going to have a USB port.
So get a small USB port, a small HDMI.
Put this in the back of a computer screen or the back of a computer desktop.
And you can even put a little post-a-note saying like HDMI enhancer or do not remove or IT only, like something that, you know, would scare somebody from unplugging it.
And this thing can wirelessly, from quite some distance, transmit with almost no delay in high quality what's going on on the screen.
And if you're not within proximity, let's say you go out of the proximity of this antenna, it stores all of that footage on the SD card, which could be, from what I was actually told by a friend, years, depending on the interval of how often it's taking snapshots.
So check behind your screens, check behind your computers, look for a device like this, which is like a man-in-the-middle type of device that is capturing your screen.
And there's so much more out there to be scared of, but this is something that you could easily check.
If it's there, unplug it and throw it in the trash, call the police, do whatever you got to.
So that's going to record everything you're doing on your screen.
Yes, in high quality too.
So how much is that?
I don't know.
I don't know.
What's the most expensive tool he's got that he's selling?
Does he have some?
So these are all different people.
Yeah, these are all.
What's the most expensive tool out of all these tools that you know that?
Most expensive one I have with me right now is this one because it's just enterprise.
800 bucks.
But what else?
What's something that's astronomical, but it's what it does is ridiculous.
I would say, I can't give you all the specifics on how it works, but the Celebrite, which is how some phones are dumped, they're very expensive.
Like dumped for all the data that's on them.
And they're used usually for criminals and traffickers and pedophiles.
Celebrite is a very expensive.
Celebrate or Celebrite?
Celebrate.
That one right there?
Yeah, Celebrate.
And how much would that be?
They range, I think, from 20 to 50,000.
I don't know.
I don't want to give you a false number.
So some wild number.
Got it.
And so I'm assuming when you're going through stuff like this, you probably have some guys that reach out to you.
I know I heard about a story with you and James O'Keefe where Project Veritas reached out to you.
How did that end up with the story?
So James O'Keefe himself did not reach out to me.
He was already gone, I guess, by that point.
I didn't know anything about Project Veritas.
I did see a momentary clip of them with a previous story that they had, but I didn't know anything about him.
I'm not a big politics guy.
I don't know much about, I just don't, I don't know.
It's just not my thing.
So I seen them just passing around the internet, but whatever the case is, they, going back to what we were saying earlier, I went on a small podcast with, well, I think a guy you know named Gerard.
And Gerard questioned me.
He said, why did you get involved in this same question you asked me?
What piqued your interest, right?
So I answered that question talking about these screenshots from my friend's wife and then much more.
And that clip gets over 10 million views overnight.
And now all of the media, all kinds of people want to know the full story.
And it's like, okay, it had to be force-fed to the public for people to take action on this.
But the first person that reached out that had some type of credibility, at least on the outside of what it appeared to be, was Project Veritas.
I didn't know anything about them.
I just saw they had a lot of followers.
I've never heard of them before until they reach out to you.
Right.
Okay.
Yeah.
I mean, other than I remember their logo from a video, but that's it.
Got it.
I don't know any of their inner dynamics.
You're not really a political guy.
You're not in that world where politics is something you're interested in.
Not at all.
Okay.
Yeah.
Yeah.
So I didn't even know who James O'Keefe was.
So Project Veritas reaches out and they said, we'll come to Florida within 24 hours.
We'll come by tomorrow.
And we want that data.
We want to investigate it.
And I was like, okay, great.
So Project Veritas jumps on a plane.
They come to Florida.
They take the data from me.
And they actually did commit to their word.
So what happened was, is they grabbed the data.
There was a lot of people on their team.
I would say at least bare minimum, there was six working at all times, going through each user individually, identifying who they were, and then confronting these people in real life, showing up where they were at with cameras, confronting them from being on this website.
And that was going incredible.
I was like, okay, I finally have a group of people that are taking it seriously.
These people are going to get exposed.
They're going to prison.
Like, this is awesome.
So a couple of weeks later, I go on the Sean Ryan show, which he's an awesome guy.
Sean Ryan is an incredible guy.
Very good at what he does.
Yeah, and such a nice, kind-hearted, intelligent man.
And same thing with Sean Ryan.
I've never seen a podcast because I didn't even know who he was.
He's very good at what he does.
I love him.
I love him.
He's a great guy.
And I was willing to go on his podcast, but the way that it was structured was Project Veritas was going to do their release, which was catching one of the predators from that database, which they did.
They released their first video, which was, it went okay for them, but not great because they were getting a lot of hate at the time for James O'Keefe.
Sean Ryan then released early because he made an agreement with Project Veritas that they were going to have their second release after I went on the Sean Ryan show.
Well, they had an interim CEO come in.
Her name was Hannah, who then got on the phone with me and told me that she's looking for more of a tsunami, and this is not something that they want to continue with.
So, after identifying over 500 pedophiles in a huge database of pedophiles, so there was way more work to do, way more people to confront.
This interim CEO shuts it down.
And then the Sean Ryan show, I end it by saying, you know, we're going to be releasing more information, basically.
And it never happens because the interim CEO shut it down.
So, all of that investigatory work that was done by all of the people at Project Veritas, it was for almost nothing, which was sad to see because those people really tried hard.
And I respect them.
How much time did they put into it with you?
I mean, a lot of time.
I mean, I would say.
There were 500 of them and they didn't want to do anything with 500.
They confronted a few of them in real life, but after it got shut down by that interim CEO, no.
No.
And is that interim CEO still there or no?
I don't know.
I would check.
I'm kind of curious.
Her name was Hannah.
Project Veritas Johanna Jows quits.
The chief executive of Project Veritas said Monday she stepped down from a role at Project Veritas.
So who is Project Veritas's strong evidence of past illegality is interesting.
I mean, I don't know this person.
I don't know what she's done.
Yeah, I've never met her in person.
I just talked to her on the phone once and she told me that the story was not a title wave.
But what I would say back to Hannah now if she was watching this show is, well, there's about 2 billion views on the internet to say otherwise.
And she should have taken the story seriously because it would have not only helped Project Veritas and the brand at the time, but the more important part is it would have helped a ton of people.
What brand was that?
Project Veritas.
They were getting so much hate at that time for the owner, James O'Keefe, leaving or getting fired or whatever really happened.
This would have been a perfect opportunity for them to restore their name and do something good in the meantime.
And she just shut it down because she didn't believe in it for whatever reason.
After she stepped down, did anybody else ever reach out to you?
Have you talked to anybody else or no?
Yeah, so some of the reporters that would, like, I have no problem with the reporters that helped me out.
There was a few of them guys that really seemed to care and were very furious that they couldn't do anything about it.
They actually moved on.
Some of them work for the Crowder show now, the Steven Crowder.
They've moved, they've kind of jumped all over the place.
But them guys really cared about this project, especially when they saw how many children were on this site.
Because remember, four-year-old data, approximately.
You know, some of these kids were 16 that we can now identify now.
We see they're 18, 19, so they must have been children when they were members.
And they were claiming to be kids at that time.
So they were selling their bodies to adults for money on this website and much more.
Why do you think she didn't go live with it?
I wish I could tell you.
I don't know.
It's not a title wave, was her words.
That's not a tidal wave?
I mean, I don't understand why.
Do you remember the exact time when she told you it's not a title wave?
I wonder how much the timeline was previous to her stepping down.
Would you know the month?
Oh, when did she step down?
December of 23.
December of 23.
That would have been so May 8th is when the Sean Ryan show released.
I remember that because Pen Tester got a ton of traffic at that time.
So she, I mean, the Sean Ryan show being released, and then that thing blew up pretty quick.
So it would have been right around that time.
So May, so it's seven months later because December 11th when she stepped down.
Yeah, something like that.
Yeah.
Yeah.
Well, she's going to see this.
No, I mean, Hannah, I don't get it.
But it is what it is.
The situation is being handled regardless.
It's not like it got thrown away.
Just Project Veritas wasn't the group that was able to solve it or investigate it further.
I had to take other avenues, which thankfully I'm capable of doing now.
But I didn't have the ability to do what I'm doing now prior to, like I said, force-feeding the public, which I didn't even mean to do either.
It just happened that way.
Well, no, you're everywhere.
I mean, at this point, there's nothing you can do about it.
You're everywhere, and we see videos of you, 20 million, 25 million, 30 million.
You have so many clips that have gone all over the place.
But let me ask a different question.
So one of the things you showed, a tool, was that you can intercept where planes are going and traffic.
And you said that's illegal.
You can do that, right?
However, you said you also have the ability to influence it, which that's illegal.
Yes.
Right?
Transmitting on that ADSB is illegal.
Illegal.
Okay.
So we saw three months ago or, you know, a couple months ago, President Trump assassination attempt on him.
I say three months ago, Rob, it feels like three months.
I don't think it was three months ago.
What was the date?
July 13th or July 13th.
Okay, so we're talking about, it's only five weeks.
It's as if it was a year ago, right?
That no one's talking about.
So July 13th assassination attempt on the president.
They missed him half an inch away.
We're having a different conversation today on who's running for president on the conservative side.
We know what happened on the left.
It could have stayed Joe Biden, but we would know who's going to be running on the conservative side.
He's had to have emergency landings being made.
I think he had to do one, Rob, if I'm not mistaken.
I think even Jay DeVance had to do one last week.
Is there tools that if somebody was really wanting to do something to manipulate with a plane and a Boeing plane, is there tools to be able to hack into planes or no?
Yeah, well, I mean, these planes are very old.
I'm not saying that that one device that I've showed online is capable of redirecting a Boeing 757 or whatever, but I wouldn't play around either.
I wouldn't be transmitting radio while I'm in a plane trying to mess with the pilot's controls or their radio.
But yeah, it would be unreasonable to think that it's not a possibility with the, you know, think of how old these airplanes are that are flying around.
If you look at the average age of even an American air, like name the airline, other than Spirit and Frontier, because they got brand new planes for whatever reason, these planes are 20-plus years old.
Well, his plane is 33 years old.
Yeah.
His first flight is 91.
Technology can be upgraded.
So who knows what the status is?
When it comes down to plane, it's slightly different because what you're doing is upgrading the engine.
Sometimes the engines cost $750,000 to a million and a half, depending on the size of the plane on what it is.
You know, some can go even higher.
And then on the inside, you just want to fix up the place.
It's like rebuilding a house, right?
And then the tube is the tube.
It's not like you need to do anything with the tube.
And then tires, just like cars, tires, you can adjust them.
But technology is different.
If the board is the same technology as it was in 91, now you got a problem.
Oh, right.
Yeah, I would say so.
Well, then how about we flip it?
Okay.
Let's say Trump is your uncle.
You love the guy.
Okay.
And you want to do anything because you have a good relationship with the guy.
You want to protect him.
You got all these tools you got access to.
What would you do to make sure nothing to minimize the level of threats that he's going to have?
I would probably train, obviously, vet the people around him.
Like, if you mean him being on a plane.
I'm talking purely equipment-wise on a plane.
On a plane?
I mean, you can't, there's not too much that you can do other than monitor.
Like, I could monitor for people trying to mess with things, but I can't.
So you could monitor somebody trying to hack into the plane.
Depending on if it's wireless.
If it's not wireless, then no.
I mean, I would have to have access to the actual plane itself and know how the plane works.
I don't know how Boeing works electronically for me to determine if somebody was hacking or not.
But I mean, if I was in that scenario to answer your question, if he was my uncle or someone I cared about deeply, I would figure it out.
But I don't know enough to give you an answer in that.
For a guy like you that's a hacker, and you know he's got a lot of people that are enemies of his that don't like him.
Does that at all cross your mind?
Were you concerned about that with plane?
Like right now today, for me to come to you today to do the interview, I was in Tampa.
I went to Tampa this morning, got 7.45, 8 a.m. I did the business that I needed to do, got on a plane, flew back.
The worst, probably top three worst flight I've ever been on, and I've been on a thousand flights in the last 25 years, okay?
One of the top five worst flights ever, you know, with turbulence.
It was very bad.
Like people were about to throw up and it was choppy coming in, right?
Okay.
Now that's turbulence, right?
It wasn't like it was somebody was manipulating with it.
It's weather.
It was bad coming in.
It's Florida.
It's a little bit weird.
You know, it's a 30-minute flight.
Whenever you have a 30-minute flight, the problem with a 30-minute flight is your elevation doesn't go that high, so you always stay in the middle.
And in the middle, you're right in between the clouds.
And so it's too many issues to cause it to be that bad.
But for you, as a hacker, and you're in the community of other people that are in it, does the idea of somebody being able to attack it from this angle at all concern you or not really?
No, not at the moment.
No.
No, I think that anything is possible, but my main concerns have been a little bit different.
I'm not super educated on the security around airplanes.
You're not, you're not that, uh, on, on what the planes.
Like, I don't know what type of software they're running or how they're.
But you could figure it out if you wanted to.
Yes.
Okay.
But you're not too worried about it.
No, not at the moment.
No.
It's not a priority of yours.
So maybe what we need to do is send you to Ancestry to see if Trump is an uncle of yours for you to start caring.
You know, for you to, you know.
Well, hey, if they want to hire me to check out their planes, I'll learn it.
I'll figure it out.
That's a different story.
Got it.
Okay.
Do you, aside from this being your world and this being your interest, what other interests do you have?
Like, do you study history?
Do you study spies?
Do you study like different secret intelligence?
Do you study anything like that?
Or what interests do you have?
It's actually quite surprising.
So, you know, computers, hacking, protecting kids in business is my main priorities.
But when I'm not doing that, I love fast cars.
I love dirt bikes.
I love go-karts.
I like drifting.
So I build my own drift trikes, like three-wheeled drift trikes.
I'm kind of like a hybrid nerd, you know?
I like computers, but I also like the cool, the quote-unquote, cool kids stuff.
The cool kids stuff.
I noticed you got a nice watch on.
And you like the nice cars.
My kids right now, we went to the, you know, the biggest Ferrari dealership in the world is down the street here.
I don't know if you've been to it or not.
I have been to it.
Okay, it's a lot of fun.
I went to it with my friend Dr. Teresa.
She loves cars as well.
Dr. Teresa?
Yeah.
She likes a lot of, she likes nice cars.
Yep.
Well, good for Dr. Teresa.
Did she buy anything or no?
No.
So have you been there lately?
It's been a long time.
So they got, what do you like?
Are you a Ferrari or a Lambo guy?
Lambo guy.
Okay.
You know what you would look good in?
An orange Lambo with black wheels.
It's not like Nostradamus.
I don't know.
I think it's just this stuff that you're teaching, you know, sharing something's happening to me.
And I'm able to kind of predict the future that a car like that, by the way, I think I had the same exact car, just so you know that.
Literally.
I think at the end, if you, if you type in Patrick By David Orange Lamborghini, if the picture comes up, I swear to god, i'm gonna crack up Patrick By David Orange Lamborghini, let's see if it'll come up.
Uh, zoom in just to go to images.
Go to images right there.
Uh, there should be one.
There it is.
Oh, that is literally the same car, that's it.
No way you can.
You're gonna love the car, is what i'm saying I, I have a feeling you're gonna love it.
Anyways, at this uh, for Lauderdale dealership, they have um, They have SP1s, they have SP2s.
I don't know if you're familiar with the Manza.
A little bit.
They have an SP3.
They got a La Ferrari.
And I think they got an answer.
They got a very, very nice collection here.
The La Ferraris are crazy.
If you like it, they got all of that right now if you're that crazy into it.
So, question on a couple things.
Because when I think about hacking, I think about the world you're in.
I'll pull up a couple things.
I'm curious how much of the stuff like this you're even into.
Have you ever studied the Franklin child prostitution allegations or no?
No.
You don't know much about that?
No.
Okay.
How familiar are you with the promised software with Robert Maxwell?
The Promise software, Robert Maxwell, that was sold to other countries that was so advanced.
I mean, it definitely rings a bell, but I don't know it.
So I don't think I know much about it.
Got it.
Yeah, for some whatever reason.
And studying spies and things like that, that's not you.
So you have fairly simple guys, aside from this kind of stuff.
Yeah, a lot more simple than people think.
Yeah, I mean, I thought you're going to be somebody that's a, but you know what it is?
You're not one of those actually type of guys.
Yeah, you're not that guy.
No.
Well, I'm kind of grateful you're not.
It's better to be just the way you are because just the way you are is positively impacting the world, which is great to see.
And again, for parents who are watching this and you're asking yourself, man, I got a lot of questions for a guy like this on how to be careful with the stuff that's going on.
He's also on Manect.
You can ask him any question you want on Manect and he will get back to you, as well as some of you guys that are business owners who have some questions for him to want to maybe do a penetration test or find out what other things that he's doing.
You can also set up a call, ask him a question.
He's also on Manect.
Ryan, this has been a blast.
I appreciate you for coming here.
I will give you the last thoughts on what you want to tell the audience before we wrap up.
Thank you.
And it was an absolute pleasure.
I was super nervous coming onto the show.
And I know I missed a ton of things, but I hope that I was able to educate people at least a little bit.
And I want to make, you know, obviously I'm on Minect.
You can reach out to me.
You can reach out to me on other socials.
I go by a different name, zero D-A-Y, like the digit zero, not the word zero.
Zero Day.
So feel free to reach out.
But Minect, for your podcast and that's your business as well, correct?
Yeah.
So thank you very much for having me on the show.
Thank you for everything that you're doing.
And yeah, stay safe, everyone.
Amen.
Appreciate you.
Hey guys, my name is Ryan Montgomery, also known as Zero Day.
I'm proud to be part of the app Minect.
If you have any questions regarding child safety, cybersecurity, or even any of the gadgets that you've seen me use all over the internet, feel free to reach out.
I'd be happy to help you with any questions or concerns you may have.
Export Selection