The Illusion of Security in Cybersecurity 00:20
"I think that security is an illusion; you're trying to avoid making enemies."
-
The speaker emphasizes the false sense of security many hold regarding online safety, suggesting that the threat of skilled hackers exists at all times.
-
They reflect on the idea that someone equally as skilled as themselves could easily access sensitive information if they wished to do so.
Introduction to Ethical Hacking 02:05
"I have seen a lot of your material, especially with a lot of things going on today."
-
The guest, Ryan Montgomery, discusses his journey into ethical hacking, inspired by his early encounters with technology.
-
He shares that curiosity led him to explore computer capabilities, manipulating tools to perform functions that weren't originally intended.
Early Experiences with Computers 04:00
"I took it out of the free trial case and I put it in there because it looked like it was supposed to go there."
-
Montgomery recalls his initial experiences with computers at a young age, describing how receiving an AOL trial floppy disk sparked his fascination with technology.
-
This memorable moment marked the beginning of his interest in computers and how they work, leading him down a path towards hacking.
The Relationship Between Hacking and Curiosity 05:28
"It's manipulating something to do something it wasn't intended to do; that's basically the definition of hacking."
-
The definition of hacking is highlighted as a mindset of manipulation where one seeks to understand and control technology beyond its original scope.
-
Montgomery notes that this curiosity-driven exploration can happen with anything—not just computers—indicating a broader application of the hacking mindset.
"I had a group of people that were willing to mentor me and teach me the things that were so interesting."
-
Ryan Montgomery emphasizes the significance of community in the hacking world, where experienced hackers guided him and shared their knowledge.
-
He reflects on how this support and mentorship allowed him to progressively learn and develop his own skills in hacking methodologies.
The Wild West of Early Internet Hacking 07:35
"It was like the wild west; you could just send...100,000 or a million people and collect your commissions."
-
Montgomery describes his involvement in a hacking group where affiliate marketing intersected with hacking, leading to unprecedented opportunities on the internet.
-
He notes that during this time, the absence of spam filters and barriers allowed for creative exploitation in digital marketing, equating the period to a lawless frontier.
Early Ventures into Affiliate Marketing 08:56
"I would say $30,000 in a day at 12 or 13 years old."
-
The speaker details how, at the age of 12 or 13, he engaged in affiliate marketing, which allowed him to earn significant commissions from various products. He describes sending out emails as part of his marketing strategy, leading to impressive earnings for someone so young.
-
He explains the legitimacy of his earnings, mentioning a PayPal account linked to his mother that had since been banned. His mother's reaction to this sudden influx of money was a mix of curiosity and support, showcasing their close relationship.
Communication with Digital Gangsters 10:20
"You could join under an alias, and nobody really knew how old you were."
-
The speaker reveals that when he engaged with digital gangs online, he did so anonymously, using aliases to protect his identity. This allowed him to ascend the ranks without anyone knowing his age or real identity, highlighting the anonymity of online platforms at that time.
-
He employed various tactics for online campaigns, including generating email addresses with a name generator, which illustrates his proactive approach in the realm of digital marketing.
Exploration of Cybersecurity and Early Decisions 11:41
"I started to realize that I think there's something here that I can make money with."
-
As he became more deeply involved in the marketing world, he admits to traversing into "gray areas" and making questionable choices. This period lacked proper cybersecurity training platforms, forcing him to learn through more dubious means.
-
Reflecting on his younger years, he acknowledges that while he made many poor decisions, including engaging with drugs from a young age, he never physically harmed anyone. His early exposure to drugs was tied closely to the rave culture prevalent at the time.
Experiences with Rave Culture 13:15
"I was a huge fan of the rave scene at such a young age."
-
The speaker recounts sneaking out to attend raves in Philadelphia, capturing the essence of the underground party culture. His experiences at various locations, including an illicit venue known as "God's Basement," highlight the recklessness of youth.
-
He describes his initial encounters with drugs like ecstasy, recounting how it quickly became his drug of choice and how it played a significant role in his social experiences during those formative years.
Introduction to Harder Drugs 17:40
"Somebody said to me, 'Hey, you can take one of these perk 30s; it'll make you feel better.'"
-
He vividly recalls the moment he was introduced to oxycodone as a means to cope with the comedown after using ecstasy. This pivotal moment marked the beginning of his relationship with harder substances, illustrating the dangerous intersection of party culture and addiction.
-
The narrative reveals a troubling trajectory fueled by peer influences and a search for relief from negative side effects associated with prior drug use, anchoring his story in real challenges faced by many young people in similar circumstances.
Struggling with Substance Addiction 17:55
"I found out that I was starting to like the opiates better than I liked the Ecstasy."
-
The speaker discusses their transition from using Ecstasy at raves to developing a dependency on opiates. Initially using opiates to manage the comedown from Ecstasy, they soon favored opiates, which led to significant problems.
-
They describe how financial constraints affected their drug use, revealing that the cost of pills was prohibitive given their limited resources.
-
The speaker recalls a turning point when they were offered heroin for the first time while at a friend's house, stating, "For some reason, it was not as scary as it would sound to me," which highlighted the dangerous lure of substance misuse.
-
They explain how the ease of accessing heroin, priced at roughly $10 per bag, shifted their addiction from opiates to heroin, drastically altering their lifestyle and consumption habits.
The Impact of Addiction on Life and Relationships 21:21
"The biggest regret is all the people that I worried and hurt, and caused financial harm to."
-
The consequences of addiction extended beyond the individual, implicating friends and family who were concerned about the speaker's well-being.
-
The speaker acknowledges the extensive harm caused by their drug use, including emotional distress and financial repercussions on loved ones.
-
They reflect on their experiences with the judicial system, revealing a history of drug offenses that never escalated to violent crimes, emphasizing the pervasive issue of addiction without physical aggression.
-
The narrative underscores the chaotic nature of reliance on substances, depicting it as a catastrophe that affected not only their life but also the lives of those around them.
Turning a Business Idea into Reality 26:38
"I created this quiz where you answered a bunch of questions, which would give you a number to call that would then go to one of the facilities I trusted."
-
The speaker devised an innovative quiz system aimed at helping individuals seeking treatment, which efficiently directed users to trusted facilities.
-
This system provided a straightforward financial structure, as the speaker received a flat fee at the beginning of the month, ensuring predictable income.
-
By structuring the business in this way, the speaker successfully avoided the complications associated with patient brokering and treatment marketers, while still feeling good about aiding people in accessing necessary treatment.
A Strong Partnership and Migration to Florida 27:18
"Three hours later, I'm on a plane. I called him when I’m at the Fort Lauderdale airport, and I’m like, 'Hey man, I'm here.'"
-
After a strong start in treatment marketing, the speaker was encouraged by his business partner to relocate to Florida for better opportunities.
-
This partnership not only facilitated the speaker's move but also deepened their friendship, leading to a three-month stay at the partner’s house before permanently moving to Florida.
-
The migration occurred nine years ago, marking a significant turning point in the speaker's career and life.
Business Ventures and Duplication of Systems 29:15
"The owner at that time... paid $40,000 for a penetration test which is just paying a group to try to hack your company."
-
The speaker recalls their journey in the treatment and recovery business, including a collaborative project with a partner, leading to an eventual business venture together.
-
The discussion shifts to penetration testing, showcasing the importance of robust cybersecurity practices, especially in the mental health sector.
-
An anecdote highlights how even substantial investments in penetration testing cannot guarantee safety if vulnerabilities like credential reuse exist.
Insights on Data Breaches and Vulnerabilities 33:09
"Default password attacks are so common it's unbelievable."
-
The speaker provides insights into a massive data breach involving a hacking group accessing around 2.9 billion records, exposing sensitive information of numerous individuals.
-
The breach was enabled by a website's failure to update default passwords, showcasing a common but critical vulnerability in cybersecurity.
-
This incident emphasizes the necessity for organizations to prioritize security measures, including changing default credentials, to protect sensitive personal information from cyber threats.
The Dark Web and Personal Data Exposure 35:29
"For $9, we show you all of that data, including every social media account associated with your emails and phone numbers, for your kids too."
-
The discussion emphasizes the alarming reality of exposed personal data, especially on platforms accessible through the dark web. For a nominal fee, individuals can discover whether their information has been leaked online.
-
This service also allows parents to verify if their children are registered on social media platforms such as Instagram, enhancing family digital safety.
Data Breach Statistics and Their Implications 36:00
"Our entire country got breached, three billion records—the largest breach I've ever seen in my life."
-
A staggering breach affecting billions of records has occurred recently, highlighting the growing issue of data security vulnerabilities.
-
The significant frequency of users visiting relevant websites indicates a surge in public interest and anxiety regarding personal data safety.
Data Removal Options and Limitations 37:25
"You cannot remove data from the dark web, but you can remove data from data brokers."
-
While data on the dark web remains largely permanent, individuals can take action against data brokers who own and distribute their personal information.
-
Users can submit requests to have their information removed, but the efficacy of such measures may vary.
"You get a really good idea of what your digital footprint is for $19, and you really can't beat that in my opinion."
-
This service provides a comprehensive overview of an individual's digital footprint, including associated social profiles and compromised passwords, for a low fee.
-
It is highlighted that such services are invaluable as they combine the removal of data from brokers with access to a massive database of breaches.
The Illusion of Security and Vulnerabilities 40:11
"Security is an illusion."
-
The speaker posits that while certain security measures exist, true protection is often illusory. If a determined hacker targets an individual with malicious intent, they could indeed cause significant harm.
-
The discussion acknowledges the ongoing challenges faced by public figures and ordinary individuals alike in maintaining their privacy against incessant online threats.
"If you use your phone number as your password, it's as simple as me taking 10 or 15 seconds to crack it."
-
Using frequently utilized elements such as passwords based on personal phone numbers can significantly compromise security. An ethical hacker explains that with access to a word list containing every phone number in Florida, they could easily crack a Wi-Fi password within 10 to 15 seconds.
-
The hacker highlights the ease of obtaining a relative's password if they chose something as accessible as their own phone number, requiring only physical proximity to the Wi-Fi source to intercept data during the handshake.
-
They demonstrate a tool called a Wi-Fi pineapple, which is an advanced device used for capturing Wi-Fi handshakes and potentially for carrying out man-in-the-middle attacks that can reroute internet traffic through the hacker's device, allowing them to collect sensitive information.
Ethical Hacking for Child Protection 47:22
"I decided I'm going to do whatever it takes to bring this website down."
-
The ethical hacker recounts a transformative experience that ignited their passion for combating child exploitation; a friend's wife shared troubling screenshots from a website featuring horrifying comments about children.
-
Motivated by a desire to protect vulnerable children, the hacker initially considered launching a basic denial of service attack to take the offending site offline but soon evolved their approach to extracting critical data from its backend.
-
After successfully navigating the site and extracting user databases, they discovered that the site was run by an individual with a history of inappropriate behaviors, leading them to seek help from authorities, including a lawyer and the National Center for Missing and Exploited Children.
-
The hacker remained determined to take action against the site and share the gathered data, feeling a sense of moral obligation to ensure justice for those affected.
The Frustration of Exposing Child Predators 52:35
"I have a massive database full of all these people with proof... I was like, okay, well maybe I can kind of force the hand a little bit."
-
The speaker describes their frustration in attempting to expose a pedophile ring despite having a significant amount of evidence against individuals involved. They made attempts to reach out to multiple media outlets in hopes of bringing attention to the issue but faced obstacles due to legal concerns from the news organizations.
-
Despite the eagerness of reporters to cover the story, every outlet ultimately declined to run with it due to their legal teams' reluctance to take on the potential risks involved. This highlights the challenges faced by whistleblowers when attempting to uncover wrongdoing.
The Arrest of Nathaniel Larson 54:05
"Six months later... Nathaniel Larson gets arrested at a layover in Denver, Colorado, with a 12-year-old girl that he raped and kidnapped."
-
The speaker details how six months passed without any action being taken against Nathaniel Larson, who was eventually arrested for the kidnapping and rape of a minor. This incident served as a painful reminder that their earlier attempts to sound the alarm could have potentially prevented this crime.
-
Larson's past accusations and eventual arrest demonstrate a systemic failure in addressing threats to children who are often overlooked until it's too late.
The Need for Vigilance and Awareness 55:21
"There is so much to be discovered, so many people that need to go to prison that are actively hurting kids."
-
The importance of awareness surrounding child safety and online predators is emphasized here, underscoring the need for more proactive measures to prevent child exploitation.
-
The speaker indicates that many children are being exploited online, pointing to a larger problem within society that necessitates greater vigilance and reporting mechanisms to protect the vulnerable.
The Role of Ethical Hacking and Collaborations 58:27
"So I was like, okay well I have some abilities with open-source intelligence... let me just offer my services."
-
The speaker describes how they decided to leverage their skills in open-source intelligence to assist organizations and individuals confronting predators. They reached out to various YouTubers, offering anonymous support to help track and expose individuals looking to engage in harmful activities.
-
By collaborating with these groups, the speaker aimed to provide detailed information about potential predators, thus enhancing the chances of accountability through proper identification and confrontation.
Online Child Safety and Predators 01:00:56
"It's absolutely insane what’s happening online. You start to see more men are willing to speak with a child than not."
-
The discussion exposes the alarming reality of adults, often predators, engaging in chatrooms disguised as teenagers. During the demonstration, it becomes apparent that a significant number of adults are participating in teen chats, indicating a higher risk for children using these platforms.
-
A specific example reveals that one individual in a chat claimed to be a 19-year-old who was attempting to engage with what he thought was a 13-year-old. This raises serious concerns about adult presence in spaces meant for minors.
Engagement with Predators in Online Chats 01:01:46
"You could sit here all day; this is the first result for a teen chat."
-
The participants of the podcast illustrate how easy it is for potential predators to infiltrate chat rooms designed for teenagers, emphasizing that the first result on Google could lead a child or parent to mistakenly believe they are in a safe environment.
-
Several interactions showcased in the chat prove that many adults are quick to share personal information, such as their ages, reinforcing the idea that this is a significant issue requiring immediate attention.
Systemic Issues in Combating Human Trafficking 01:04:47
"The US government knows how much of a business this is, $150 billion a year industry in human trafficking."
-
The conversation highlights that human trafficking is a lucrative criminal enterprise, yet despite this, there appears to be a lack of substantial law enforcement action dedicated to combating it.
-
There is skepticism regarding the government's commitment, with queries about why a dedicated organization for catching predators isn't prioritized similarly to drug enforcement agencies.
Personal Experiences of Predator Catching 01:06:30
"I had to make a choice: take this once-in-a-lifetime opportunity with a reputable NGO or continue catching them on YouTube."
-
Ryan Montgomery shares his journey transitioning from individual predator catching to a more organized approach through the Sentinel Foundation, an NGO collaborating with law enforcement.
-
His work now allows for more impactful measures against organized child exploitation, rather than focusing solely on individual predator arrests through public platforms.
The Profile of Predators and Their Compulsions 01:08:31
"It seems to be a compulsion that they can't help themselves regardless of the consequences."
-
Insights into the psychological profile of predators indicate that there may be a compulsive element driving their behavior, often ignoring the risks involved in their actions.
-
The discussion reveals a lack of sympathy for such behaviors, leading to a shared belief that these individuals should face severe consequences due to the nature of their crimes against children.
The Limitations of Law Enforcement in Cybersecurity 01:09:56
"There's not enough people doing it; law enforcement can't handle it. A lot of their technology is very antiquated."
-
The speaker emphasizes the insufficiency of law enforcement in addressing online crimes, particularly against children, stating that many in this community feel that their technological tools are outdated.
-
They recount a conversation with a law enforcement official seeking help to understand hacking techniques, highlighting that law enforcement shouldn't require external assistance for such investigations.
The Accessibility of Online Predators 01:10:25
"This is the part that most people don't understand. It's every website, not just teen chats."
-
The speaker points out that online predators exploit multiple platforms, not just specialized chat rooms, making it a widespread issue affecting social media and gaming apps as well.
-
They demonstrate the alarming ease with which predators can access and engage with minors online, questioning how public platforms permit such interactions to occur.
Parental Awareness and Child Safety Strategies 01:11:42
"Parents need to ensure their kids know they can be open and honest with them without the repercussion of losing their device."
-
The speaker advises parents to create an open dialogue with their children regarding online interactions, reassuring them that they won't face punitive measures for disclosing uncomfortable situations involving online predators.
-
They recommend limiting device access, stressing the importance of monitoring kids' technology use and fostering an environment where children can safely communicate their concerns.
The Importance of Monitoring Children’s Digital Activity 01:12:13
"I'm not trying to be a helicopter parent, but I would monitor my kids' devices and let them know they can be open with me."
-
The speaker reflects on their desire to balance guidance with freedom in parenting, noting the necessity of being informed and protective without being overly controlling.
-
They emphasize that consistent monitoring and asking questions about children’s online activities are crucial for their safety.
Reflection on Parenting Practices and Children’s Technology Use 01:13:20
"It's a pretty scary time to have kids. I don't blame parents who are worried."
-
The speaker describes a personal experience witnessing a child engrossed in a phone while dining, contrasting it with their own children who are not given such devices, branding current parenting challenges as daunting.
-
They discuss the importance of making conscious decisions about children's technology consumption, including restrictions based on performance.
Hacking Mindset and Business Vulnerability Assessment 01:14:14
"In the hacking world, they would call it reconnaissance or enumeration."
-
The speaker explains that hackers begin by assessing a business's vulnerabilities through methods like equipment checks and operating system analyses to identify exploitable weaknesses.
-
This process is described as evaluating the "threat landscape," where the hacker assesses technical details that could be manipulated for unauthorized access.
The Approach to Penetration Testing in Organizations 01:15:51
"How long would a penetration test take? It depends on the size of the business."
-
The speaker outlines that the duration of a penetration test varies with the complexity of the organization, and emphasizes the thoroughness of their own team's approach.
-
They express confidence in their expertise and shared commitment to effective cybersecurity measures in their practice, highlighting the need for precision and depth in such assessments.
Exploiting Vulnerabilities in Networks 01:17:57
"You have to have some point of exploitation or some weakness you take advantage of."
-
The process of hacking begins by attempting to authenticate with a web server to access or pull specific data.
-
A hacker may hide their presence on the server to prevent detection and then look for ways to pivot to other computers or devices within the same network.
-
Identifying a point of weakness, whether it's a person or a device, is crucial in the exploitation process.
"If I really wanted to find out what Epstein had access to, I would swim across that damn ocean and get on his island."
-
References to high-profile cases, such as those involving Julian Assange and Jeffrey Epstein, highlight the complexities surrounding information retrieval and manipulation.
-
The discussion involves how powerful individuals have utilized their positions to control sensitive information and maintain leverage over others.
-
A personal stake, such as having a family member involved in a situation, could drive someone to take extreme measures to uncover hidden information.
The Role of Digital Threats in Societal Issues 01:21:41
"To get extorted in that situation, you have to take advantage of a child."
-
The ethical implications of extortion and manipulation within the context of human trafficking are examined.
-
The conversation emphasizes that consequences for perpetrators should be significant, particularly when vulnerable individuals are involved.
-
The existence of countless individuals who could potentially engage in these criminal activities raises concerns about the effectiveness of current societal responses.
The Landscape of Cybersecurity Talent in the Military 01:22:51
"Less than a thousand people in the entire Army are fighting cyber crime or warfare."
-
There is an alarming gap in specialized talent within military cyber operations, with estimates suggesting fewer than a thousand experts are actively engaged in cyber warfare efforts.
-
The discussion reveals a stark contrast between the number of capable hackers and the personnel tasked with protecting against cyber threats within the military framework.
-
The notion that real change in addressing cyber threats and human trafficking requires skilled individuals who are often not represented within official military systems is brought to light.
The Challenges of Addressing Predatory Behavior 01:26:46
"I don't genuinely know how to address the problem of pedophilia and human trafficking; these offenders keep returning."
-
The discussion highlights the difficulty in solving issues related to pedophilia and human trafficking, emphasizing that current legal frameworks often fail to deter repeat offenders.
-
One participant expresses a desire for a systematic approach to understand and tackle these complex issues, suggesting a hypothetical scenario where a group of ethical hackers could be gathered to pool their resources and skills.
-
Imagining a scenario where 50 skilled individuals are brought together for a dedicated 30-day work period in a controlled environment allows for brainstorming effective strategies against these crimes.
The Role of Technology in Cybersecurity 01:28:20
"Technology plays a crucial role; having the right tools is essential for finding your digital footprint."
-
The dialogue shifts focus towards the necessity of technology in combating online predatory behaviors. Emphasis is placed on providing tools such as computers and access to platforms that facilitate the identification of digital vulnerabilities.
-
One participant shares experiences of successfully utilizing technology, such as PenTester, to help individuals understand their digital footprints and eliminate risks associated with it.
Inspiring a New Generation in Cybersecurity 01:29:40
"My mission is to educate parents and protect children; I aim to inspire more people to enter the cybersecurity field."
-
A main objective shared by one of the speakers is the education of parents regarding online threats to children, prioritizing child protection as a crucial life goal.
-
They also stress the need for more professionals in the cybersecurity industry, which is rapidly growing and offers promising careers.
-
By producing engaging content, the speaker has motivated numerous people to pursue education and careers in cybersecurity, seeing it as both fulfilling and financially rewarding.
Practical Gadgets and Their Implications 01:31:00
"This is a charger that can monitor your keystrokes; it's a perfect example of how technology can be weaponized."
-
The conversation introduces various gadgets that can pose serious cybersecurity threats, specifically a charger that secretly functions as a keylogger.
-
This device is camouflaged to appear like a regular phone charger but contains sophisticated technology that can capture keystrokes at high speeds, demonstrating how everyday objects can be exploited for malicious purposes.
-
The importance of recognizing and understanding such threats is stressed, along with the necessity for vigilance in the digital age.
"These things are wild."
- The discussion highlights the capabilities of certain tools used in ethical hacking, emphasizing how devices could inject keystrokes into a phone or install viruses on Android devices. Despite their legitimate use for testing security, these tools can also be accessed by threat actors for malicious purposes.
"They're intended for penetration testers like myself to do the right thing, but you know, threat actors can buy them as well."
- The ethical use of hacking tools is to conduct penetration tests with the aim of identifying security vulnerabilities in organizations. However, it's critical to recognize that the same tools can be misused by unethical hackers for identity theft, spying, or unauthorized access to networks.
Remote Access and Control 01:38:10
"I now have remote control over this cable."
- A demonstration is provided on how ethical hackers can execute commands remotely through a simple device, illustrating how quick and discreet this process can be. The conversation also emphasizes the danger of such tools, which can be disguised as ordinary charging cables.
Distinguishing Ethical from Unethical Hacking 01:39:36
"An ethical hacker is going to try to access your computer to show where the weaknesses are, so you can make it better."
- Ethical hackers aim to fortify security systems by highlighting weaknesses, while unethical hackers exploit these same vulnerabilities for personal gain. The underlying technologies and tactics may remain the same, but the intentions differ significantly.
Protective Measures Against Malicious Cables 01:40:01
"The way that I would recommend protecting yourself from this would be with what's called a data blocker."
- To combat the risk of malicious cables, the use of data blockers is advised. These devices restrict data transfer while still allowing charging, preventing unauthorized access from potentially harmful connections.
Advanced Security Gadgets and Their Costs 01:40:33
"There's a data blocker called the Unblocker that blocks these attacks but also has payloads in it."
- An interesting gadget is mentioned called the Unblocker, which serves a dual purpose. While it protects against malicious attacks, it also contains potential payloads capable of executing similar hacking techniques, demonstrating the blurred lines in the hacking device market.
The Concept of Surveillance and Privacy Concerns 01:41:54
"With your girl, you'd be surprised... you can find out everything she's doing."
- The conversation touches on privacy and the moral implications of surveillance, suggesting that the ability to access someone else's information can lead to unwanted revelations. It stresses that regardless of one's ability to monitor, trusting personal relationships is essential to avoid unnecessary conflict.
Checking for Unauthorized Devices 01:44:59
"Check behind your screens and look for a device like this, which is a man-in-the-middle type of device that is capturing your screen."
-
The speaker emphasizes the importance of checking digital environments for potential unauthorized surveillance devices, particularly hidden behind screens or computers. These devices can record high-quality video of your activities and should be reported to authorities if found.
-
They suggest that verifying the absence of such devices is a proactive measure to enhance personal security against various threats in the digital space.
"The most expensive tool I have right now is this one, which costs 800 bucks, but some tools used for criminals and traffickers range from 20 to 50 thousand dollars."
-
The discussion reveals a spectrum of hacking tools, indicating that while some are moderately priced, others can be extraordinarily expensive, catering to illegal activities such as data dumping by traffickers and pedophiles.
-
It highlights the alarming reality that sophisticated hacking tools are accessible, which increases the risk of data breaches and exploitation, especially against vulnerable individuals like children.
Project Veritas Involvement and Challenges 01:46:31
"Project Veritas reached out to me and said, 'We'll come to Florida within 24 hours and we want that data.'"
-
The speaker narrates their unexpected collaboration with Project Veritas, detailing how their team promptly traveled to gather critical data for an investigation into online predatory behaviors.
-
The investigation involved identifying over 500 potential child predators from a database, showcasing the urgency and seriousness with which they approached the challenge of confronting these criminal activities.
Setbacks Faced by Investigative Efforts 01:49:15
"After identifying over 500 pedophiles, the interim CEO shut it down, and all of that investigatory work was for almost nothing."
-
Despite extensive investigations and valuable data collection, the speaker expresses disappointment over the halt to further actions by Project Veritas's interim CEO, which resulted in the abandonment of important work aimed at exposing predators.
-
This decision reflects the complexities and hurdles that investigative teams face, especially when leadership changes and differing priorities disrupt ongoing efforts.
"Some reporters that really seemed to care were furious that they couldn't do anything about it."
-
The reaction from reporters indicates a broader concern for child safety and an acknowledgment of the importance of the issue at hand.
-
It points to a network of individuals within the media landscape who may seek to pursue stories that can lead to greater awareness and action against online exploitation, highlighting the collective effort needed to address such serious topics.
Discussion on Plane Security and Hacking Potential 01:53:13
"You can't... there's not too much that you can do other than monitor."
-
The conversation touches upon the security of planes and the potential for hacking. Although some devices can legally intercept plane traffic, transmitting information related to it could be illegal. This raises concerns about who may attempt to manipulate flight safety systems and how that's managed.
-
The host highlights an assassination attempt on President Trump, delving into the implications of air security and the potential for malicious intent against high-profile figures. The discussion emphasizes the need for advanced monitoring and protective measures.
Personal Assessment of Airplane Hacking Risks 01:55:17
"I think that anything is possible, but my main concerns have been a little bit different."
-
The ethical hacker expresses a belief that while hacking planes is theoretically possible, it's not a primary concern of his. His focus appears to be elsewhere, indicating that he believes there are other more pressing digital security issues that warrant attention.
-
The discussion transitions into a reflection on personal experiences relating to air travel. The hacker recalls a particularly turbulent flight, emphasizing that the weather, rather than any hacking attempts, was to blame for the discomfort experienced during the journey.
Hacker's Range of Interests Beyond Cybersecurity 02:00:08
"Computers, hacking, protecting kids is my main priority... but when I'm not doing that, I love fast cars."
-
The hacker reveals his diverse interests outside of cybersecurity work, such as a passion for fast cars and motorsports. He describes building drift trikes, showcasing a blend of technical and adventurous hobbies.
-
This insight into his character highlights that individuals in the cybersecurity field can often have multifaceted interests that extend beyond their professional work. Engaging with various passions can offer a more holistic view of their personalities and lives.
Discussion on Hacking and Child Safety 02:01:42
"I hope that I was able to educate people at least a little bit."
-
The conversation shifts toward the nuances of hacking and the importance of child safety online. Ryan Montgomery, an ethical hacker, shares his insights on the complexity of the hacking world, emphasizing that he values a simple and clear approach to cybersecurity.
-
Patrick Bet-David engages Ryan with inquiries about controversial topics, such as the Franklin child prostitution allegations and the Promis software linked to Robert Maxwell. Ryan admits that he is not extensively familiar with these subjects, indicating that his focus is more straightforward and less entangled in conspiracy theories.
-
Ryan expresses gratitude for the opportunity to share his knowledge, aiming to educate parents and business owners about cybersecurity measures and child safety. He encourages viewers to reach out with questions regarding digital security and the hacking tools he uses.
-
The importance of vigilance and awareness in protecting children from online predators is highlighted, and Ryan reiterates his commitment to assisting others in navigating these complex digital landscapes.