Video Summary

Ryan Montgomery - #1 Ethical Hacker Who Hunts Child Predators Catches One Live On Podcast | SRS #56

Shawn Ryan Show

Main takeaways
01

Ryan Montgomery, a top-ranked ethical hacker, infiltrates exploitation sites and has collected thousands of predator leads.

02

During the episode Montgomery demonstrates a live sting by posing as a teen in a chatroom and attracting predators within seconds.

03

He explains investigative techniques (OSINT, database analysis, pen‑testing tools) and the limits of media and law enforcement response.

04

Practical advice for parents: monitor kids, educate them about risks, use security tools and password managers, and consider monitoring apps.

05

Montgomery founded 561 PC and runs Pentester.com to scan sites for vulnerabilities and help protect children and small businesses.

Key moments
Questions answered

What did Ryan Montgomery demonstrate live on the podcast?

He created a decoy profile posing as a teen in a chatroom and showed how quickly predators respond — within seconds to minutes — illustrating how easy it is for adults to solicit minors online.

How does Montgomery identify and investigate online predators?

He combines ethical hacking (finding site vulnerabilities), database analysis, OSINT (open‑source intelligence), decoy operations, and collaboration with partners (e.g., Project Veritas) and law enforcement to trace and document predators.

What practical steps does the episode recommend for parents to protect children?

Parents should educate themselves and their kids about online risks, actively monitor children’s internet use, use password managers and security tools, consider monitoring apps, and teach kids not to share personal information with strangers.

Why did Montgomery help create 561 PC?

Frustrated by perceived inaction from media and authorities after uncovering exploitation sites, he co‑founded 561 PC to continue exposing predators and to coordinate community‑led investigations.

The Disturbing Reality of Online Predators 00:01

"This is the most evil, most disturbing, in the darkest episode we have ever released on the Shawn Ryan Show."

  • The episode focuses on the alarming issue of predators who exploit children online. Ryan Montgomery, recognized as the number one ethical hacker, dedicates his skills to exposing these individuals and their websites.

  • Montgomery has gathered thousands of names of predators that will be revealed, aiming to protect children and raise awareness among the public.

  • The call to action is clear: the information shared in this episode could potentially save many children from harm.

Raising Awareness Among Parents and Children 01:01

"Every parent that watches this needs to smarten up on what their kids are doing on the internet."

  • It is emphasized that both parents and children need to be educated about the dangers lurking online. Parents must become more vigilant regarding their children's internet usage.

  • Children who watch this episode will gain awareness of the prevalence of predators on social media and online platforms.

  • Predators are urged to take notice that their actions can have serious consequences, as the efforts made in this episode will instill fear of exposure and potential imprisonment.

The Fight Against Censorship 01:55

"We've demonetized it ourselves. This isn't about money; this isn't about advertising—this is about saving kids."

  • The creators of the episode have taken steps to avoid censorship, such as demonetizing the content and editing out sensitive material.

  • Montgomery believes there is a powerful network protecting these predators, making it imperative to ensure this episode reaches a wider audience.

  • The urgency of the topic is highlighted, with a plea for viewers to engage and share the content.

The Impact of Educational Initiatives 03:47

"It’s an honor to have you here and educate the world on what you're doing."

  • Ryan Montgomery expresses gratitude for the opportunity to discuss his mission of catching child predators and educating the public on the tactics used by these offenders.

  • With Montgomery's extensive experience in hacking, he instructs parents and children on recognizing and protecting themselves from online threats.

  • The interview aims to create a ripple effect that will lead to increased safety for children by empowering parents with knowledge.

Understanding Bug Bounties and Vulnerabilities 12:53

"These companies are willing to pay depending on the severity of that vulnerability."

  • Ryan Montgomery explains the difference between informational bugs and critical vulnerabilities. An informational bug may involve accidentally revealing non-sensitive employee information, while a critical vulnerability could lead to severe security breaches, such as accessing a company's server or customer credit card details.

  • Major tech companies like Apple offer substantial rewards for identifying critical vulnerabilities, with Montgomery citing that a million-dollar bounty is possible for a "zero-click exploit" that gives full access to a device without the user’s knowledge.

  • Ryan shares that while he has not personally discovered bugs in new iPhones, he has collected significant bounties in the past, though he cannot disclose specific details due to nondisclosure agreements. The highest bounty he's collected was for over $128,000 in credit on a platform, which he preferred over a cash reward.

Transitioning to Cybersecurity Business 14:48

"I focus on the cybersecurity business which is all software and that's a lot more guaranteed."

  • Montgomery mentions that he has collected between 100 to 200 bounties, but he no longer primarily focuses on bug hunting. Instead, he has shifted his attention to running a cybersecurity business initiated with his partners.

  • The enterprise, Pentester.com, allows users to scan their websites for vulnerabilities, identifying potential security flaws like exposed passwords or low-hanging fruit vulnerabilities.

  • He notes that bug bounty hunting can be unstable and unpredictable, leading some to earn significantly one year and much less in subsequent years. He emphasizes that the cybersecurity business offers more stable revenue, compared to the indirect and uncertain nature of bug bounty hunting.

Childhood and Early Influences 16:02

"I started to meet the wrong people and I was in the wrong places doing the wrong things."

  • Montgomery reflects on his childhood, describing a fairly normal upbringing until around eighth grade, where he began associating with the wrong crowd and engaging in drug use, particularly during the rave scene in Philadelphia.

  • His interest in drugs led to deeper problems, where he found himself addicted to opiates. Despite acknowledging this dark time, he feels he has moved away from substance use since childhood.

  • He mentions a supportive family background, particularly with his mother and grandfather, who played a crucial role in his upbringing, although he has had a tumultuous relationship with his father, who has struggled with legal and substance issues.

Journey into Hacking 20:06

"I had a computer at my grandparents' house, and it blew my mind how things worked."

  • Ryan discovered his passion for technology and computers at a young age while using a computer at his grandparents' house, sparking an obsession with understanding how computers function.

  • His journey into hacking began around age eight or nine when he experimented with AOL's floppy disk trials and learned how to communicate online. This early exposure to technology led him to mix with digital marketing communities and eventually to hackers creating automation tools.

  • Montgomery shares a pivotal encounter with a hacker who later faced legal issues for stealing prepaid phone minutes, which solidified his interest in hacking and illicit activities in the tech domain, steered by curiosity and peer influence.

Edwin's Consequences and Rob's Losses 22:41

"Rob ends up with about 20 grand in profit and two years in federal prison."

  • After a scheme involving reselling phone credits went awry, Rob was left in a difficult situation. While his associate, Edwin, enjoyed the high life, Rob faced significant legal trouble. The FBI seized all of Rob's assets, leading him to a meager profit of just $20,000, despite millions in sales, and a two-year sentence in federal prison.

  • Rob's experience highlighted the dangers of being taken advantage of, especially when he was at a vulnerable point in his life.

Awakening to Hacking 23:44

"Rob was the person that helped me at least get started."

  • Rob played a pivotal role in the speaker's introduction to hacking, teaching him the basics during a time when resources like online tutorials were scarce.

  • The speaker recounts that until the age of 11, he had a simple motivation for hacking—disrupting internet connections and finding ways to make money online through digital marketing strategies.

Childhood Ventures in Digital Marketing 25:48

"I wanted to make money ASAP."

  • By the age of 12, the speaker dived into making money online, inspired by observing others succeeding in affiliate marketing.

  • He recalls selling products like acai berries and noted how some marketers were making substantial incomes through techniques like AOL spam, motivating him to automate processes and find exploits to increase profits.

Transition to Ethical Hacking 31:31

"That's when I became an ethical hacker rather than a gray hat or a black hat hacker."

  • The speaker reflects on a significant moment where he transitioned from questionable hacking practices to a focus on cybersecurity.

  • Concerned about the potential repercussions of his previous activities and witnessing the dark side of the hacking community, he chose to pivot towards ethical hacking and business opportunities, marking a turning point in his career.

The Difference Between Hackers 32:16

"If I hacked your website and revealed a vulnerability, you could report me to the FBI or thank me as a gray hat hacker."

  • The discussion begins with a distinction between different types of hackers: gray hat hackers and black hat hackers.

  • Gray hat hackers may expose vulnerabilities to website owners without malicious intent, while black hat hackers exploit these vulnerabilities for personal gain, often coercing victims into paying to avoid data leaks.

  • Black hat hackers are characterized as ruthless, leveraging threats to manipulate their targets into compliance.

The Importance of Cybersecurity and Cryptocurrency 32:51

"Cybersecurity and keeping yourself protected on the Internet is the future."

  • As technology continues to evolve, the need for robust cybersecurity measures is increasingly critical.

  • Individuals must pay attention to warnings from their browsers and news concerning active breaches on major websites; neglecting these can have serious repercussions.

  • The speaker highlights that everything we rely on is interconnected through the internet, making personal security paramount, especially as threats become more intense.

Views on Cryptocurrency Value 34:00

"I think Bitcoin is here to stay; I would love to see it hit the moon."

  • There is optimism about the future of cryptocurrency, particularly Bitcoin, which is currently valued at around $30,000, with potential projections suggesting it could reach upwards of $100,000 or more.

  • The speaker acknowledges the volatile nature of cryptocurrencies but maintains a positive stance on Bitcoin's longevity and success in the market.

Personal Journey into Rehabilitation 34:43

"I started a marketing company to help people get into drug and alcohol rehab."

  • The speaker shares their journey into the rehabilitation industry, which began with a marketing effort aimed at connecting those in need with rehab services.

  • They mention a pivotal moment when an unexpected call led to an opportunity to co-found a treatment center, showcasing the spontaneity of life decisions that can lead to significant career changes.

  • The speaker moved to Florida at the young age of 22 to establish their rehab facility, indicating a deep commitment to helping others with substance abuse issues.

Motivation for Helping Others 37:18

"My motivation was that I just love to help people."

  • The speaker's personal experiences with family struggles, as well as losing friends to addiction, instilled a desire to support others facing similar challenges.

  • The emotional impact of these events has shaped their career path and dedication to providing help and support to those battling addiction, emphasizing a strong sense of empathy and hospitality.

Personal Stories of Loss 38:04

"I lost my best friend to addiction."

  • The speaker recounts tragic experiences of losing friends and family to drug overdoses, illustrating the harsh realities of addiction.

  • They detail a particularly painful moment spent trying to save a close friend from an overdose, emphasizing the deep emotional scars left by such experiences.

  • The narrative highlights the urgency and motivation behind the speaker's commitment to helping others overcome addiction, showcasing the personal stakes involved in their professional pursuits.

The Importance of Sponsorships in Recovery Programs 42:11

"He got the Panthers on board, and um, I think it was the first NHL team to sponsor a wounded warrior team."

  • During the conversation, Ryan Montgomery discusses how someone he knew successfully managed to get the Florida Panthers to sponsor a hockey team for disabled veterans.

  • This achievement is highlighted as a significant milestone, showcasing the potential for individuals to make impactful connections even in challenging circumstances.

  • Montgomery reflects on the personal struggles of his friend, emphasizing how drug addiction can drastically change a person’s appearance and well-being.

Personal Loss and Addiction Awareness 43:10

"You know, I've lost a lot of friends to addiction... all you can do is educate people and try to help more people."

  • Montgomery shares a personal story about losing friends to addiction, including a friend named Ricky, which deeply affected him.

  • He recognizes the importance of education in preventing drug abuse and helps others understand the diverse and dangerous substances prevalent today, such as fentanyl-laced drugs.

  • His message stresses that awareness and outreach can help save lives, as fentanyl has become a leading cause of death among people aged 18 to 49.

The Drew Badgery Scholarship Program 45:10

"We started a scholarship program called the Drew Badgery Scholarship Program to help people get into drug rehab."

  • In response to the growing issue of addiction, Montgomery initiated a scholarship program designed to assist individuals in accessing drug rehabilitation, particularly those lacking the financial means.

  • He shares that when he was younger, he faced similar barriers to accessing rehabilitation services and felt compelled to create opportunities for others in need.

  • Over seven years, the program helped more than a hundred individuals receive treatment fully funded, making a tangible difference in their lives.

Expansion and Adaptation of Treatment Facilities 46:30

"We built programs around trauma and mental health; we opened a detox facility to better serve those in need."

  • Montgomery talks about how his team evolved their approach by creating programs that specifically address trauma, mental health, and co-occurring disorders, recognizing that addiction often correlates with other mental health challenges.

  • They expanded their operations to include multiple facilities to meet the needs of clients better, as they noticed a rising number of patients coming from neighboring states seeking assistance.

  • This development shows the commitment to adapting treatment strategies to ensure effective care for those struggling with addiction.

Career Transition to Cybersecurity 47:38

"I sold my shares in the rehab about two and a half to three years ago... and then I got into the software as a service world."

  • After leaving the rehabilitation facility, Montgomery transitioned to the tech industry, getting involved in software as a service (SaaS) and operating software companies.

  • He shares his interest in cybersecurity, indicating that the skills he developed in recovery could be applied to a new career focused on protecting people from digital threats.

  • Montgomery’s journey showcases a personal mission to continue making a difference, whether in rehabilitation or technology.

Nutritional Supplements and Their Benefits 52:19

"I take this supplement before my morning workout and also during interviews to keep me energetic."

  • Ryan discusses how he uses a specific supplement, Ketone IQ, to maintain energy and focus throughout the day.

  • He recommends taking the supplement before workouts or studying for interviews, highlighting its benefits for sustained energy.

  • The product is available at local Sprouts stores, and viewers can get a 20% discount by using the promo code "Sean" at checkout on hvmn.com.

Introduction to Pen Tester and Its Functionality 53:38

"Pen Tester is a software solution for cybersecurity and protection."

  • Ryan introduces his company, Pen Tester, which provides automated web scanning for cybersecurity vulnerabilities.

  • Manual penetration testing involves checking for compliance and vulnerabilities, which Ryan aims to automate with his service.

  • He clarifies that Pen Tester is the name of his company, distinct from the term "pen testing."

Understanding Website Vulnerabilities 54:59

"When you put your website into Pen Tester, you get a preliminary report that shows all of that data that has been exposed."

  • Ryan explains how users can assess their website's security by entering their domain into Pen Tester.

  • He highlights potential vulnerabilities, such as email breaches, that could impact their site's security.

  • The discussion includes the risks posed by compromised personal emails that may have been involved in prior data breaches.

The Importance of Cybersecurity for Small Businesses 01:02:10

"Small and medium-sized businesses don't realize they are more of a target than they think."

  • Ryan emphasizes that many small businesses overlook the necessity of robust cybersecurity measures.

  • The use of outdated technology and exposed credentials makes them vulnerable to attacks.

  • He promotes Pen Tester as an affordable and effective cybersecurity solution, noting its manual verification capabilities alongside automated services.

Database Breaches and Data Scanning 01:03:14

"We have more records than literally anyone else on the internet."

  • Ryan Montgomery discusses the extensive database he has access to, emphasizing its size and the breadth of records it contains. He suggests that while other websites may offer breach protection, none can match the depth of his database.

  • He explains that even without running a scan, he can provide significant insights based on the existing breaches highlighted within his database.

  • Montgomery mentions the importance of understanding privacy settings when using competition websites that claim to offer leak or breach protection but may not have adequate databases to back up their claims.

Facial Recognition Technology in Action 01:04:14

"You can do my face, and it's going to find every image on the internet that has my face in it."

  • The conversation turns to facial recognition technology, where Montgomery explains how it works by using a photograph to search for matching images across the internet.

  • He shows the capability to find images that may not have been previously available online, stressing that even newly taken photos can be linked back to existing images.

  • As an example, he takes a photo of Shawn Ryan to illustrate the technology, which is capable of identifying images based on a unique facial metric.

The Dark Web Unveiled 01:07:02

"The dark web itself isn't a marketplace; you need to know where to go to visit these horrible websites."

  • Montgomery elaborates on misconceptions about the dark web, clarifying that it is not inherently a marketplace but requires specific information to access illicit websites.

  • He explains the necessity of using the Onion Router (Tor) to navigate the dark web safely, which allows users to access resources often associated with illegal activities.

  • He adds that while the dark web hosts various illegal transactions, many malicious actors often use regular emails and readily accessible information, making their identification possible without deep web exploration.

Investigation Techniques Against Child Predators 01:09:54

"A lot of times these guys will use their regular emails or they'll use an IP address that they've reused."

  • Montgomery discusses his experience investigating child predator cases, stating that many perpetrators do not hide effectively on the dark web and can be traced using standard investigative techniques.

  • He mentions that even when utilizing seemingly anonymous methods, many predators still revert to using identifiable information that can lead to their capture.

  • Montgomery highlights the balance between using the dark web for investigation and recognizing that a lot of tracking is done through conventional cyber detective work.

Breaking Security on Everyday Devices 01:12:55

"Rolling codes have already been broken for most of the models."

  • Ryan Montgomery discusses the vulnerabilities in various everyday devices, most notably those that utilize rolling code technology, which are widely used in car keys and remote controls.

  • He highlights the ease with which an individual can be a victim of credit card theft, emphasizing that someone can skim your information when you are distracted, such as letting your children out at school.

  • Montgomery explains that anything with a battery and a remote connection is potentially hackable, which includes devices like car keys, garage doors, and various infrared devices.

Demonstrating Hacking Capabilities with Flipper Zero 01:14:00

"This right here is a Flipper Zero with some custom modifications."

  • The Flipper Zero is presented as a proof-of-concept hacking device that can be modified for various malicious purposes, demonstrating its capabilities through Wi-Fi hacking examples.

  • Montgomery shows how fake Wi-Fi networks can be generated to deceive users into connecting, allowing the hacker to capture their passwords and other sensitive information.

  • He warns that the ease of creating fake networks poses significant risks in public places like airports and coffee shops, where many people connect to unsecured networks.

Types of Attacks and Their Effects 01:16:15

"It's called a man-in-the-middle attack."

  • Montgomery explains the concept of a man-in-the-middle attack, where an attacker can intercept or manipulate network traffic by making their computer the intermediary between a user and the desired website.

  • This type of attack can happen unnoticed, especially in public Wi-Fi locations, and can lead to significant privacy breaches.

  • Though Montgomery discusses specific networks like GoGo inflight services and claims they are relatively more secure, he emphasizes that public Wi-Fi remains a common target for attackers.

Range and Versatility of Hacking Devices 01:17:50

"This thing's like the size of the palm of your hand."

  • The Flipper Zero, despite its small size, is capable of hacking various devices including wireless mice and keyboards, which are often vulnerable to such attacks.

  • Montgomery warns that hackers can take control of input devices without physical access, thus posing a serious security risk.

  • He goes on to explain other uses of the Flipper Zero, including hacking access control badges and RFID systems, as well as demonstrating its versatility across different protocols and types of wireless communications.

"It’s very illegal to do that, of course."

  • Montgomery touches on the legality of certain hacking practices, pointing out that while receiving signals such as ADS-B from airplanes is lawful, transmitting such data is illegal and risky.

  • He humorously shares how the device can break into jukebox machines at bars, illustrating the playful yet concerning potential of hacking tools.

  • The conversation ultimately reveals the ethical lines that can be crossed in hacking, showcasing Montgomery's commitment to using his skills for constructive and lawful purposes rather than harmful ends.

The Importance of Vigilance in Electronics 01:23:04

"I think they're going to care when they realize how vulnerable they are."

  • The discussion begins with Ryan Montgomery emphasizing that while many may not initially care about the technical specifics of electronic devices, awareness will grow as they realize their vulnerabilities.

  • He reveals that a significant portion of electronics used in homes is sourced from China, estimated at around 90%. This raises concerns about the potential risks associated with these devices, which may be transmitting data to unknown servers.

  • Montgomery shares a personal anecdote about a vacuum mop that connects to a Chinese server. This device can transmit and receive information, including control features that he can manage from his computer, highlighting the potential for unauthorized access and data manipulation.

Data Security Risks in Everyday Devices 01:23:47

"Anything with Wi-Fi capability is going to open up an attack vector."

  • Montgomery explains that nearly any device with Wi-Fi capabilities poses a threat, serving as a potential entry point for hackers. This includes household items like washing machines and refrigerators, which many consumers may not consider as part of their security landscape.

  • He emphasizes that the connection of various devices to external servers can expose users to significant security risks, as these devices might be used for malicious purposes without their owners' knowledge.

The Value of Data in Cybersecurity 01:25:36

"Data is the most important thing to them because it's worth money."

  • The conversation touches on the value of data in today's digital landscape, emphasizing how hackers prioritize data collection. By accessing personal networks, they can gather information that individuals may not even realize they have shared.

  • Montgomery warns that if hackers can intercept data from applications before users actively conduct searches, this information becomes more valuable as it allows for targeted advertising and potential exploitation.

Practical Steps to Enhance Personal Security 01:26:32

"Just use your common sense; if something looks too good to be true, it probably is."

  • Montgomery advises listeners to take proactive measures to protect themselves from hacking. This includes using password managers, antivirus software, and consulting cybersecurity experts for guidance.

  • He highlights the importance of being wary of unknown texts and calls, discussing the risk of zero-click attacks, which can infect devices without any user action.

  • Practical steps like using RFID-blocking wallets and being cautious with website visits can reinforce personal security and help individuals recognize potential red flags.

Emerging Threats and Defense Challenges 01:28:20

"Zero-click attacks are so valuable because there's nothing you can do to defend against them."

  • Montgomery describes how certain sophisticated hacks, such as the Pegasus spyware, can compromise devices without any interaction from the user. This revolutionary approach to hacking raises alarms about privacy and security.

  • He explains that while many hacks require user engagement, the ones that don’t pose an exceptionally high risk because they leave users unaware that their devices have been compromised. The inability to defend against such threats is a significant concern in cybersecurity today.

The Motivation to Act Against Child Predators 01:34:00

"I was at a friend's house and got a text message from my friend's wife with multiple screenshots of this website that was clear from the screenshots that anyone could access it."

  • Ryan Montgomery was introduced to the dark realities of online child exploitation through a message from a concerned friend's wife. The sight of disturbing content prompted a visceral reaction, compelling him to take immediate action.

  • Montgomery quickly left his friend's house to investigate further, demonstrating an urgent desire to confront the issue. He found a vulnerability in the website's platform, allowing him to penetrate its defenses and extract data.

  • The disturbing texts he encountered on the website spurred Montgomery's commitment to combat child exploitation. He noted that he was particularly cautious about what to download, ensuring he avoided any illegal content.

Encountering Disturbing Content 01:37:00

"The title of this post is, 'Who wants these little...?' and then somebody replied underneath, 'I've got first dibs on them.'"

  • Among the deeply confronting messages were chilling posts indicating individuals expressing interest in exploiting children, highlighting the grotesque mindset of the website's users.

  • One such story involved a parent sharing a photo of their child in a bathtub, accompanied by a message that implied imminent harm, showcasing the gravity of the threats faced by vulnerable children online.

  • Montgomery revealed that the site attracted real minors, with some explicitly engaging in self-exploitation through solicitation, proving the real and present danger such websites pose.

The Scale of the Problem 01:40:30

"When I cleaned up the database, I found there were about 7,000 people on just this one website."

  • Montgomery uncovered that the website he infiltrated had approximately 7,000 members, which raised alarm regarding the scale of child exploitation networks online.

  • To join the site, prospective members needed to answer disturbing questions about their willingness to engage in heinous acts. This vetting process effectively filtered potential participants, revealing a chilling environment where only serious predators were granted access.

  • The site operated with a network of communication on platforms like Telegram, where users would share coded language to discuss their dark intentions, complicating the pursuit of justice. Montgomery documented this communicative behavior, highlighting the organized nature of these networks.

Initial Response to Hacked Data 01:43:36

"I actually recommend you come forward so we don’t have to make the story up for you."

  • Ryan Montgomery describes his eagerness to bring attention to the data he had uncovered, feeling confident that it would lead to arrests and justice. He submitted crucial information to the exploited children's tip line and informed various news stations about the website he had accessed, expecting a strong response.

  • He reached out to multiple media outlets including Sun Sentinel, Daily Mail, Business Insider, and Fox, eager to share his findings. While several reporters showed interest in his findings, they ultimately could not report on the alleged illegal content due to legal constraints.

Frustration with Media and Law Enforcement 01:45:55

"Not a single person until now has done anything about this."

  • Montgomery expresses his deep frustration at the lack of action from both media and law enforcement despite his efforts to expose child exploitation. He explains that he had hoped journalists would at least inform parents about the harmful website without disclosing any illegal material he had obtained.

  • Despite his numerous communications with different attorneys, the responses he received were inadequate, leaving him feeling abandoned in his mission to protect children.

The Downfall of Nathan Larson 01:50:44

"Nathan Larson then went to federal prison for that."

  • Montgomery discusses Nathan Larson, a Democratic politician with a troubling history, who was arrested six months after Montgomery reported him. Larson was implicated in kidnapping a twelve-year-old girl and was ultimately sentenced to federal prison.

  • Tragically, Larson's life ended in prison under mysterious circumstances, which Montgomery suggests may have been due to the neglect of his inmates, highlighting the severity of his crimes and the disdain the prison population had for him.

The Development of 561 PC 01:52:38

"I created [561 PC] with a friend... out of frustration that nothing happened from this original ordeal."

  • Motivated by the inadequacy of the responses from law enforcement and media, Montgomery co-founded the organization 561 PC. This initiative allows him to continue advocating against child predators while furthering his investigation anonymously.

  • He collaborates with Scrappy, an MMA fighter, who shares his commitment to the cause. Together, they aim to reveal more instances of exploitation and assist in protecting vulnerable children.

The Realities of Online Predators 01:53:57

"You know, let me show you how bad it is online."

  • The speaker shares an alarming example to highlight the severity of online predation, recounting a story that shocked a friend about the dangers present in teen chat rooms.

  • They conducted a Google search for "teen chat room Florida" and demonstrated how quickly one can get inundated with inappropriate messages by creating a false profile as a 13-year-old girl, receiving overwhelming attention from grown men within minutes.

  • This experience served as a wake-up call for the friend, emphasizing that such risks aren't limited to chat rooms but also pervasive on popular social media platforms like Facebook, Snapchat, Instagram, and more.

Initiating Action Against Predators 01:55:17

"If we get some decoys in there... we can go and try to catch these people and expose them."

  • Following the impactful demonstration, the speaker suggests organizing efforts to capture online predators using decoy accounts, highlighting the necessity of proactive measures to confront such dangers head-on.

  • They partnered with a friend, indicating their commitment to making a tangible difference by aiming to clean up online spaces in their locality, leading to the apprehension of multiple predators within just a few months.

Capturing the First Predator 01:56:21

"The first guy we caught as a team was just a complete test."

  • The initial operation involved using Grindr, a dating app, to connect with potential predators after crafting younger-looking profiles.

  • A meeting was arranged with a suspect who quickly engaged with them, culminating in a dramatic confrontation where the police were called to intervene.

  • The first encounter revealed challenges, such as the suspect fleeing to the bathroom, illustrating how unpredictable and urgent these situations can be.

Obstacles in Prosecuting Cases 01:58:37

"The entire case was thrown out because there was no shower inside Walmart."

  • Despite successfully apprehending suspects, the speaker explains the hurdles faced when attempting to secure convictions, recounting a specific case that was dropped due to a lack of physical evidence.

  • The nuances of the legal system are explored, emphasizing the distinction between evidence collected by vigilantes and what is considered admissible in court by law enforcement.

  • The speaker's experiences underscore the importance of understanding legal processes and the need for detailed evidence to support cases against predators.

Real-Time Demonstration of Online Predation 02:00:29

"I jumped in a chat room... called myself Ashley 13 New Jersey."

  • The speaker demonstrates how quickly predators can respond to seemingly innocent usernames by creating a profile in a teen chat room and immediately receiving multiple messages from older individuals.

  • Within seconds, they receive messages from men, illustrating the alarming speed and frequency of inappropriate outreach from adults in online environments designed for minors.

  • The stark reality of these interactions highlights the vulnerability of children online and the urgent need for protective measures.

Platforms Where Predators Operate 02:03:21

"This is happening on Facebook, Instagram, TikTok, Snapchat... "

  • The speaker lists a variety of popular platforms where children might encounter predators, calling attention to the widespread nature of the problem.

  • Their warning serves as a stark reminder that protective measures need to be in place across all online venues that children frequently use, from gaming platforms like Roblox and Minecraft to social media.

Online Safety for Children in Gaming 02:04:05

"Anywhere where a human can communicate with another human, the child is not safe."

  • Ryan Montgomery emphasizes the importance of parental vigilance in protecting children from online predators, particularly in gaming platforms like Xbox and PlayStation.

  • He warns parents not to assume that simply knowing their child's friends makes them safe and suggests being proactive about understanding who their children are communicating with.

  • He mentions that it's worth being perceived as a "helicopter parent" if it means potentially preventing trauma, urging parents to engage and verify interactions.

The Ease of Online Predation 02:04:47

"It's that easy to find them; they're out there, and they're being predatory."

  • Montgomery discusses the alarming accessibility of predators online, confirming that a large percentage can be convinced to meet in person.

  • He estimates that over 90% of those approached can be persuaded to meet, depending on the duration of the conversation and how the predator perceives the individual as a threat, such as a police officer.

Collaboration with Project Veritas 02:06:50

"Project Veritas said, 'Hey, we will do something about this...bring these people out of the dark corners of the earth.'"

  • Montgomery details his collaboration with Project Veritas, highlighting their commitment to exposing online predators that law enforcement has failed to apprehend.

  • He shares that the collaboration involves investigating specific websites associated with predatory behavior and that they have uncovered significant information from databases.

Investigative Techniques and Operations 02:10:01

"Finding out who they are is called open-source intelligence."

  • Montgomery explains the investigative techniques used in collaboration with Project Veritas, mainly focusing on open-source intelligence (OSINT) to track individuals linked to predatory sites.

  • He outlines how his skills as a hacker complement the efforts to catch predators by collecting and organizing data, leading to more effective operations against them.

Case Study: John Lewis Confrontation 02:10:39

"He admitted to having a fetish for young children...he was fully aware of what he was doing."

  • Montgomery discusses a specific confrontation with John Lewis, who was found on a website soliciting minors and described his struggles with addiction to pornography.

  • He notes the contradiction in Lewis's claims, highlighting that while he acknowledges his problems, he still actively engaged in predatory behavior.

The Challenge of Addressing Online Predation 02:14:10

"There's no way to solve it for sure; it's never going to go away."

  • Montgomery expresses pessimism about completely eradicating online predation, citing attempts in some states to normalize such behaviors.

  • He specifically mentions California's efforts to define certain predatory behaviors as a sexual orientation, which complicates the fight against child exploitation.

The Normalization of Attractiveness to Minors 02:14:35

"In California, they are trying to make it acceptable to have attractions to children as part of sexuality."

  • The discussion revolves around efforts in some states, particularly California, to normalize attractions to minors as a legitimate sexuality. This sentiment raises alarm and disbelief amongst those who oppose these views.

  • The speaker expresses strong disapproval, stating that such beliefs are damaging and can ruin lives. It’s noted that regardless of arguments made by defenders, the impact on children is devastating.

Legislative Responses and Public Outrage 02:15:30

"Florida is trying to pass a bill to issue the death penalty for sex crimes against children."

  • Florida is mentioned as a state with proposed legislation aimed at implementing the death penalty for individuals convicted of sexual crimes against children, signaling a stark contrast to movements perceived as normalizing such behaviors.

  • The conversation reflects a desire for stricter penalties and a moral outrage at the perceived acceptance of child predation, questioning the motivations of those supporting these movements.

The Need for Education and Parental Monitoring 02:17:00

"We need to find a way for parents to be educated and for kids to be educated so that this doesn't happen to them."

  • Emphasizing the need for parental and child education, the speakers stress the importance of awareness to prevent exploitation.

  • Suggestions include aiding organizations that combat human trafficking and sexual assault, as well as developing apps that could assist parents in monitoring their children's online activity for added security.

Importance of Child Safety Measures 02:18:20

"Statistics show that one in ten people before the age of 18 are sexually assaulted."

  • Statistics highlight the prevalence of sexual assault among minors, underscoring the critical need for proactive measures.

  • The importance of utilizing monitoring apps is discussed, illustrating how these tools can help parents keep track of their children's online interactions and ensure their safety against potential threats.

The Role of Technology in Child Protection 02:19:00

"If I knew my parents were watching everything I was doing online, I would second guess my conversations."

  • The impact of monitoring technology on children's behavior is examined, noting that children are likely to be more cautious about their online interactions if they know they are being observed.

  • The speakers share examples of predatory behaviors encountered while monitoring chat rooms and stress the necessity of vigilance to protect children from potential dangers lurking online.

California's Controversial Sex Offender Law 02:25:00

"According to this, a couple of weeks ago, this is dated October 12, 2020, California Governor Gavin Newsom signed a law that would allow judges to decide whether or not to list someone as a sex offender for having sex with a minor."

  • California's recent legislation permits judges to classify an individual as a sex offender based on instances of consensual sex with minors aged 14 or older.

  • This law is controversial as it suggests that children can give consent at the age of 14, a notion that many, including the speaker, strongly oppose.

  • The speaker articulates their belief that minors cannot consent, categorizing the law as "ridiculous" and inappropriate.

Florida's Tough Stance on Pedophiles 02:27:00

"Florida Governor Ron DeSantis has signed a bill that will allow juries to impose the death sentence even if all 12 jurors do not agree."

  • In contrast to California's approach, Florida is enacting more stringent measures against child predators, including allowing the death penalty for individuals convicted of sexual battery against children under 12 years of age.

  • The speaker expresses strong support for Florida's legislative measures, highlighting a personal belief in the responsibility to protect children and denouncing individuals drawn to exploit minors.

Encounter with a Predator 02:28:16

"The man showed up after talking to our decoy, and he was fully aware of the age."

  • The speaker recounts an encounter with a man named Brent, who was a teacher and had been engaging in inappropriate conversations with a decoy posing as a minor.

  • Despite knowing the decoy's age, Brent attempted to evade confrontation by running away upon being approached.

  • Detailed observations indicate Brent's background, including his education and career, raising concerns about the prevalence of such behavior among individuals in positions of trust.

Another Predator Encounter 02:32:00

"We know where he works; we have his information, let’s just go there and order two glasses of water."

  • The narrative continues with a second predator, named Stephen, who had arranged a meeting with a decoy but attempted to bail at the last minute.

  • The speaker and his team strategically approached Stephen at his workplace, ensuring the situation was recorded and questioning him about his intent.

  • After the encounter, they shared gathered information with law enforcement, illustrating the importance of collaboration with authorities to hold predators accountable.

"It's illegal to record an in-person or telephone conversation without the consent of all parties, which could constitute a misdemeanor or third-degree felony."

  • The discussion emphasizes the legal implications of recording conversations without consent. Florida Statute 934.03 outlines that such actions can lead to serious legal consequences, including misdemeanors and potential felony charges.

  • Legal repercussions may also involve civil damages against offenders, highlighting the importance of obtaining proper consent before recording any private communications.

"I don't respect the fact that they're representing a predator, but they haven't filed a lawsuit against me at this point."

  • The speaker addresses the ethical dilemma of legal representation for individuals accused of predatory behavior. There’s a strong disapproval towards attorneys who choose to represent suspected predators, which raises questions about moral responsibilities in the legal profession.

  • The individual firmly states that, despite the ongoing legal ramifications, they refuse to back down from exposing harmful individuals, which is framed as a societal duty to inform and protect the community.

Statistics on Human Trafficking and Child Exploitation 02:36:59

"One in five U.S. teenagers has received an unwanted sexual solicitation online."

  • A series of alarming statistics are presented regarding human trafficking and child exploitation, revealing the extensive risks children face in digital environments. These statistics indicate a significant prevalence of online solicitation among teenagers.

  • Additionally, it’s noted that 13 years is the average age when children first encounter explicit content online, and 75% of children are willing to share personal information with strangers, which raises serious concerns about their safety on social media platforms.

Solutions and Community Action Against Predators 02:38:40

"The public should know, regardless, so they can make their decision based on the evidence gathered."

  • The conversation transitions into potential solutions for addressing these issues, emphasizing the development of a public database that would provide information on known predators. This database would aim to empower citizens to protect their children based on accessible information.

  • The collective effort from citizens, alongside community organizations, is highlighted as critical in combating these behaviors, suggesting that government action may often be slow or ineffective.

The Importance of Raising Awareness 02:43:21

"By doing this show, you're educating kids, and that's going to drop the numbers."

  • The significance of raising awareness through media is reiterated, as educating children and parents about the dangers they face could lead to a reduction in incidents of exploitation and trafficking.

  • Community collaboration is seen as essential in exposing and deterring predatory behavior, showcasing the impact of informed public discourse on child safety initiatives.

Connection and Collaboration In Cybersecurity 02:44:40

"I’d love to connect you with him... I think they will have the courage to help you get the word out."

  • The conversation highlights the importance of networking within the cybersecurity community. The speaker emphasizes the value of connecting with influential figures, such as Danny Jones from a notable podcast, to amplify their message and efforts in combating online predation.

  • The speaker also mentions another individual, Julian Dorian, noting that he does commendable work in this area. By fostering these connections, they aim to enhance their collective impact on raising awareness and conducting significant work.

Resources and Abilities in the Fight Against Predators 02:45:57

"The more resources we have, the more we can do."

  • The discussion underscores the necessity of having adequate resources and team support to effectively tackle child predation and online threats. The speaker shares that both their personal skills and those of their cybersecurity team play a key role in pursuing these missions.

  • There is an emphasis on the need for collaboration, information sharing, and community engagement in order to make significant strides against these issues. It is highlighted that without access to critical leads or tips, their ability to act is hampered.

Call to Action for Victims and the Community 02:46:15

"If you have fallen victim to this or you know somebody that has, speak up about it."

  • The speaker encourages individuals who have been affected by child predation to come forward and share their experiences. They provide resources, including their links and connections to Ryan Montgomery, whom victims can reach out to for support.

  • There is a strong message about the importance of speaking out, as it is a vital step in the battle against predators. The speaker stresses that it is crucial to connect with those who can provide further assistance and to expose these threats in order to protect the community.

Personal Reflections and Future Endeavors 02:47:17

"More to come."

  • The dialogue wraps up with reflections on ongoing efforts and hopes for future developments. The speaker indicates that they may have projects and collaborations on the horizon but are currently assessing which avenues to pursue.

  • There is a sense of pride in their work and determination to continue making a positive impact, noting the importance of personal connections and mutual support in the journey ahead.