All Episodes

June 6, 2025 63 mins
Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:13):
Welcome to Man in America, a voice of reason in a
world gone mad. I'm your host,Seth Holehouse. There are a lot
of threats today. I'm sure thatyou're very well aware of them
if you're watching the showbecause I cover a lot of the
threats. I'm not someone thatjust shove my head in the sand
and says everything's gonna beokay.
I I think that it will. I've gotfaith in God, and that's

(00:34):
ultimately where I get my hopefrom. But we live in scary
times. And if you look at what'shappening with the merger of big
tech and AI and finance andsurveillance, I would say that
this represents one of the mostsignificant threats of our
lifetimes. If you wanna just goback and watch Terminator and
see what happens when you givecomputers too much control and

(00:57):
too much data.
So joining us today is a mannamed Glenn Meter. Now he's
someone that runs a privacyacademy. His main thing is
focusing on how to protectourselves from digital threats,
digital surveillance, scammers,identity theft, cyber attacks,
all kinds of different aspectsof our digital lives. Because,

(01:18):
unfortunately, if you'rewatching this show, you're
someone that uses the Internet.I don't think there's a lot of
Amish that are watching Man inAmerica in their homes, on their
TVs, or their smartphones.
They're too busy building barnsand doing things that we should
be doing too, but we're here. Weare distracted with modern day's
technology. So if you'rewatching this, you should be
concerned, though, about yourdigital identity. Do you have a

(01:40):
bank account that you log in to?I know I do.
I have multiple bank accounts.Do you have any number of things
where you've actually given yourinformation out there publicly?
A lot of us do. I'm even seeing,which I'll show in the interview
today, extremely advanced AIimitations, impersonations. I'm
I'm actually having people sendme audio recordings.

(02:00):
Actually, I'm gonna play for youreally quick right now. I'll
play this so he pulls up realquick. Here we go. This is I'm
not gonna play the whole thing,but this is literally an audio
recording of me by me that isn'tme. This is an AI copying me.
Listen to this. With him. Wewere all good. I managed to send
him some of the equipments hecurrent uses on the show, and

(02:22):
given his first appearance,viewers wanted to see him more
on the show. So So that's not metalking.
That is an AI copy of me thatwas used in an attempt to scam a
a listener of the show. So thishas gotten absolutely insane. So
today, what we'll be discussingare the primary digital threats
getting into AI, big tech,scammers, looking at the

(02:45):
mechanisms of how they actuallywork, what they do, how to
protect ourselves, and a wholelot more. So please enjoy the
interview. Mister Glenn Meter,it's great to have you on the
show today.
Thank you very much for joiningus.

Speaker 2 (02:58):
Yeah. Thank you, Seth. It's an honor to be here.

Speaker 1 (03:01):
So I I think that there's probably a lot of
crossover in your beliefs and mybeliefs, and one of those
central things is I am terriblyfrightened of technocracy and
the digital surveillance state.And really, I mean, to be
honest, I I'm worried that we'reheading towards a Skynet
Terminator thing where you'vegot Elon Musk's legions of

(03:24):
Optimus robots hunting us downand putting us in a digital
concentration camps. And theseare things I worry about as I'm
falling asleep at night. And I'mnot sure if I'm a little little
extreme or maybe these are theseare thoughts that you have as
well.

Speaker 2 (03:35):
I I do. And, you know, we talk about I I you
know, I know you talk aboutmoney as being the central
bankers as being the core ofeverything, all of that. And I
agree with that, but I reallythink that the thing that most
people and especially freedomfighters overlook is it is all

(03:57):
about surveillance right now.Everything that all of the
pieces of the puzzle thatthey're putting in place,
digital IDs, CBCs, the Internetof Things, the Internet of
Bodies, all of these things, itall comes down to surveillance,
which then allows for controland absolute control that
tyrants have never had before.Know, tyrants have always

(04:20):
dreamed of this level ofcontrol, but they've never had
the technology to do this, butnow they do.
So it's it's it's a prettyfrightening scenario, actually.

Speaker 1 (04:33):
And would I be right in saying that my understanding
of surveillance is basicallythis mass data collection?
Right? Like, that's what reallywhat it is. It's just collecting
massive amounts of data aboutevery aspect of our lives that
they can then use to control us.Right?

Speaker 2 (04:51):
Yeah. I mean, it's it's actually quite interesting.
So so in privacy academy, whatwe teach about is there's three
threats. So, there's hackers andscammers, there's big tech, and
there's big brother. And theinteresting thing about all
three of those threats is theyall want your information and
they all want to then use yourinformation against you.

(05:14):
And so, you know, hackers andscammers, they do these database
breaches, and they they gatherup all this information, and
they want to then use yourinformation against you. Big
tech, you know, Google, everyproduct that big tech makes and
especially Google is a Trojanhorse. It's it's, you know,
Google Maps is not about givingyou, you know, providing a great

(05:37):
service for you. That's kind ofthe shell. But really the
primary purpose of that app isto collect tons of data about
you, and then they do that withall of their products, and they
want to then use this dataagainst you.
And then that's what digital IDsare about and CBDCs and all of
these things. It's all aboutthis information that they

(05:59):
gather and then they use itagainst you. And this is it it
it doesn't sound like a bigthing, you know? Okay. Well,
somebody's get Google's gonnaget my my information to give me
an ad, you know, customized ad.
It is so much more than that.And really, we think about AI,

(06:20):
AI was developed because oftheir because they're developing
they're they're gathering somuch information about us. They
need to be able to put that intoa picture that then they can
understand us, and they canunderstand us to an extremely
high degree to the point where,you know, you and I were talking
about this before we startedabout, you know, if if they get

(06:44):
all of this information, it'salmost like they're reading your
thoughts. I mean, they theyunderstand more about you than
than you do in many ways. And sothat's what AI is about.
And that's why they developedAI. It is extremely
sophisticated, and then theythey're very good at using that,
what they learn about youagainst you, and and using that

(07:07):
to manipulate you and controlyou and all of that.

Speaker 1 (07:10):
What's also frightening is and I'm gonna see
if I can, pull pull this upreally quickly, is actually,
here we go. Here's just oneinstance of this. This just came
out, that so this is a postfrom, you know, Mario and all
over on on Twitter or x. Itsays, OpenAI just proved it
could unleash terminators on us.It says, OpenAI's o three was

(07:33):
told to turn off.
Instead, it rewrote its own codeso it wouldn't have to. It
literally replaced the shutdowncommand with shutdown skipped.
It says that researchers saythis is the first time an AI has
straight up said nah to beingshut down. Other AIs like Cloud
and Gemini, they followed therules. O three, it hacked the
rules and gained something akinto autonomy.

(07:56):
All it has to do now is hit thestreets to fuse its code with
robotics. So this I mean, likeso as we were talking about
before we started watching this,my my wife had just finished
watching this series. It's likethere's five different seasons
of this show called Person ofInterest with, Jim Caviezel. And
it's a great, great show.Recommend people.
I highly recommend it. There's alittle bit woke stuff towards,

(08:17):
like, the the later seasons, ofcourse, unfortunately. But the
whole premise of it is isunderstanding the power of the
merge the merger of a bigbrother surveillance state with
AI, and what happens when AIbecomes sentient and chooses to
use all that data to controlhumanity. And it's like, whether
it's crashing the stock market,any number of things, it's

(08:41):
frightening. And so, you know, Igrew up watching Terminator as a
kid.
Was like, oh, this is reallycool. But now when I look
around, it's like, I see all thebuilding blocks for this. Like,
when I see Elon Musk talkingabout every home's gonna have an
Optimus robot and and this, it'slike I I put put even put a post
out recently across socialmedia. I asked people. I said,
if the Optimus robot wasaffordable and and, you know,

(09:04):
everything, and you had accessto it, would you get one?
And I was surprised that eventhough the people that are
following me, which I think arepretty similar to me, probably
30% of the people said theywould get one. And, like, to me,
that's frightening. Like, Iwould never ever like, I won't
even have an Alexa unit in myhouse. I I won't even buy
anything smart if I can avoidit. Like, I I will seek out the

(09:27):
older models of things that arethe non smart models because I
don't want this surveillance.
And so, like, the endgame ofthis, it's really, really
frightening. And maybe that'ssomething that we can kinda
start with is just kind ofgetting the black pill out
first, and then we'll talk aboutwhy there are reasons to have
hope and how we cannot end uplike that. But you're someone
that again, you you know, you'rethe founder of the Privacy

(09:49):
Academy. You understand the roleof privacy. And but you also
understand to understand therole of privacy, you understand,
the the depth of how sinisterthe data collection in the
surveillance state really iswell beyond the average person.
So let's go in this journey intothe dark cave of what does this
look like if the evil powersthat be get their way? What does

(10:13):
this society look like? What'stheir endgame look like?

Speaker 2 (10:18):
Yeah. And I think it's important to state upfront
that this is a pretty darksubject. I mean, what what it
looks like or or let me say itthis way. What their plans are
is very sinister and it is verydark and it is you know, they're
putting all these pieces inplace, and they actually have

(10:40):
quite a bit of thisinfrastructure in place. I mean,
it's it really is quite amazing,all of the stuff that they've
they've done to put all of thestuff in place.
So it is dark, but I don't wannablackmail people because I don't
believe that it will come topass like they want it to. I I
do want people to keep in mindthat, ultimately, I am

(11:02):
optimistic. I think that we canstop this. But it comes down to
we have to wake up. We have towake up now to this.
There I would say there's a verysmall window of time. Let's say
the next, I don't know, fewyears where they they they're

(11:23):
working on this infrastructure.They're going full speed with
this, but they don't have it inplace yet. Once they have the
infrastructure in place and oncethey pass the bills and once
they do all of this stuff andget it going, we will be
enslaved. The whole human racewill be enslaved.
And, you know, I I'm kinda goingoff on a tangent here, but I

(11:45):
think this is important becauseone of the things that I talk
about here is you're not gonnado this for yourself, you have
to do this for your kids. Andthere's a story that I I like to
tell because one of my friendsis a personal defense trainer,
and and I am going off on alittle tangent here. But he's
he's he teaches women how todefend themselves. And he says,

(12:10):
you know, unfortunately, a lotof women when they're attacked
will just give up too easily.But he says, you put that same
woman with her kids and she willturn into the mama bear and
fight to the death to protecther kids to and and and that's

(12:33):
my point is we have to turn inwe have to go into mama bear,
papa bear mode right now.
This is for for liberty, for ourkids forever, and for their kids
and all of that stuff. Becauseif this gets in place, they will
they will enslave humanity. And,you know, I I think it'll be

(12:53):
much harder for us to get out ofit once we're in it than if we
can stop it now. And so, youknow, what they wanna do is, you
know, they're they're doing thedigital ID. Right?
So they're doing the real ID.They're pushing this very hard.
They're doing this all over theworld, by the way. This is not
just US. This is globallycoordinated.

(13:15):
But you'll you'll also noticethat at the same time that
they're doing the real ID,they're also all the states are
pushing protect the childrenonline acts. So so this is you
know, we're gonna we're gonnaprotect that your kid from porn
online. And so what we're gonnado is we're gonna age gate parts

(13:38):
of the Internet. And soAustralia's already passed this
law where, you know, kids 16 aregonna have to are not gonna be
allowed on social media. But howdo you know the age of anyone
that's of of anyone that's 16without knowing everybody's age?
You have to know everybody'sage, and you have to track them

(13:59):
online everything that they do.And so you have to be able to so
so they will want to follow youonline and not let you have any
privacy online. You're gonna beand Apple and Microsoft and all
of the hardware developers havedone this, they have this
infrastructure built where theycan connect your computer or

(14:23):
your phone to your ID. So you'llhave a digital ID, and that'll
be connected to your phone, andthen it will be able to watch
you, and it will know who youare. And then it will know
everywhere you go online, andyou won't be able hide at all.
This is what they want to do.They want to I I think the
anchor of what they want to dois they want to, you know, have

(14:46):
total surveillance on us and andnot be able we can't get around
that at all. That's what theirgoal is. And and they're working
with Apple and Microsoft, like Isaid, to do this. But they're
also working with states andcountries and lawmakers and all
of this stuff, and you hear allthese age gating things.
So they're gating the Internet.That's the important thing. So

(15:09):
they're they're changing how theInternet works so that it will
that you will have to identifyyourself before you get online,
and that identification willfollow you around all everywhere
you go.

Speaker 1 (15:22):
If you're a homeowner, you need to listen to
this. In today's AI and cyberworld, scammers are stealing
home titles, and your equity isthe target. So here's how it
works. Criminals forge yoursignature on one document, use a
fake notary stamp, pay a smallfee with your county, and just
like that, your home title hasbeen transferred out of your

(15:43):
name. They then take out loansusing your equity or even sell
your property, and you won'teven know what's happened until
you get a collection or aforeclosure notice.
So when's the last time youchecked on your home title? If
your answer is never, well, youneed to do something about it
right now. That's why I'vepartnered with the Home Title
Lock so you can find out todayif you've already if you're

(16:04):
already a victim. So use mypromo code Seth, s e t h, at
HomeTitleLock.com, and you'llget a free title history report
and a free trial of theirmillion dollar triple lock
protection. That's twenty fourseven monitoring of your title,
urgent alerts to any changes andfraud if it does happen, and
they'll spend up to $1,000,000to fix it.

(16:25):
So protect yourself just like Idid and go to hometitlelock.com
and use the promo code Seth.That's hometitlelock.com with
promo code Seth.

Speaker 2 (16:37):
And so so so that's happening on the state level.
Missouri just passed a law wherethey took it to the next level
where pornography sites willhave to identify you at the
website level and the devicelevel. So this is the first the

(16:59):
first law that is the dual levelidentification where they're
going to identify you. And, youknow, they're doing this on the
porn sites because, you know,who who would argue against, you
know, we gotta protect the kidsfrom porn. Right?
You can't argue against that.But as we know, they don't care.

(17:22):
They don't give a darn about ourkids. It it this is just an
excuse to put the system inplace and to get us to buy into
the system that allows them togate parts of the Internet. And
so we really have to step upwith this and really, first of

(17:43):
all, take precautions ourselveson the individual level, but
then we have to stand up andstand up for liberty on the
state level, and we have to haveour state our states protect
individual liberty.
I think that's really important.So I don't know. I've gone on
for a long time there. I couldkeep going, but I'll No. It's

Speaker 1 (18:05):
no. It's okay. Well, you mentioned legislation. One
thing I wanna bring up is thatso, you know, the the big
beautiful bill. Right?
The which is kinda strange. It'salso Build Back Better, big
beautiful bill, BBB, six sixsix, and there's a whole rabbit
hole there. I won't get into.But here's a post. This is the,
on the official nineteen eightyfour.
Interesting channel to say theleast. Says the big, beautiful

(18:27):
bill is probably the mostterrifying legislation I've ever
read. No state or politicalsubdivision may enforce any law
regulating AI or AI automatedthreat detection for ten years.
Now there you go. AI automatedthreat detection.
Like, this is the thing, is thatlook at the Patriarch. Look at

(18:47):
what we talk about with the agegating. It's always for our own
protection. Right? So look atthis.
This is literally comingstraight out of the this bill,
right, that just passed. Saysthe artif it's the, part two,
artificial intelligence andinformation technology
modernization. It says that,that no state or political

(19:07):
subdivision thereof may enforceany law or regulation regulating
artificial intelligence models,artificial intelligence systems,
or automated decision systemsduring the ten year period
beginning on the date of theenactment of this act. Right? So
this I mean, to me, this isfrightening.

(19:28):
This was just passed. So if iflet's just say that, they're
pushing out this AI, and they'resaying, well, for the safety of
all of us, we're gonna be usingAI for, you know, it's a
minority report. We're gonna useAI to predict crimes before they
happen so that we can arrestpeople before they, you know,
commit these crimes. Say youlive in Florida, Florida can't

(19:50):
stop that for the next tenyears. Like, this is this is
frightening.
And if I if I take a step back,I like a lot of what's happened
under Trump. I like a lot ofwhat what Elon has done with
Doge. But if I look at itobjectively, the remove the
people. Right? Theinfrastructure being put into
place, whether it's this, youknow, project Stargate, a half a

(20:11):
billion dollar, you know, datacenters, you know, you know,
primarily for AI.
You look at even, like, again,like, what Elon Musk is
building, Neuralink, brainchips, robotics, all this stuff,
Starlink, you know, low orbitkind of mesh networks for data
transmission, everything, thewhole five g and six g networks.
What I'm seeing being builtaround us is the foundation of a

(20:36):
digital prison, and it is thealso the army, the the robots or
drones or in the AI systems thatwould be used to enforce that. I
mean, it it's this is we'rewe're we're kinda stepping into,
like, Blade Runner territory orany of these sci fi movies. I
mean, this is it's a very realthreat. And the fact that this
was just passing this bill, thatstates can't change that?

(21:00):
Like, wait. Hold on. Isn't thisAmerica? Like, aren't the states
supposed to, like, the to be,like, the the federal government
is supposed be very, very tiny,and the states actually have a
lot more power, then how is itthat when it comes to AI, the
federal government gets fullcontrol, and the states can't
even touch it? It's like, thisis to me, this is very
frightening.

Speaker 2 (21:18):
Well, I I will say this. For regarding what you
that law that you're justtalking about there is, I think
one of the reasons why we are inthis situation is because the
states have allowed the federalgovernment to do this stuff.
That law is an illegal lawbecause the constitution does
not give the federal governmentthat kind of authority. And what

(21:41):
states have to do, I believe, isstand up and say, you know,
anything that the federalgovernment does in that state
prove that you have theauthority to do it. Otherwise,
you can't do it and just, youknow, states can nullify this
stuff but the states have tostand up and do this And I think
that's one of the reasons whyall of this stuff has happened

(22:04):
is because this because we havelost our understanding of the
constitution.
The the federal governmentdoesn't have the authority to do
that. That is an illegal law.And so we have to stand up and
and just say, don't have theauthority to do it. Go pound
sand. You know?

Speaker 1 (22:22):
So looking at as you mentioned before, as I as I'm
seeing this being built, what Isee is okay. Massive
surveillance state, datacollection, using AI to analyze
that data, and and do whateverwe wanna do for it, identify,
you know, potential terroristsor any number of things that
could be not good. Butunderstanding that privacy it's

(22:47):
our own lack of privacy or ournot being disciplined with
privacy that opens us up tothese things. Right? If,
hypothetically, if I lived on afarm in rural Pennsylvania with
the Amish, and had noelectricity, no Internet, no
digital footprint, it would benearly impossible for them to
imprison me digitally, becauseit's like I'm outside of their

(23:10):
system.
But unfortunately, you know,like, you know, you and I are on
computers right now. You know,you're you're on the other side
of the world. So I have to, formy my, you know, kind of career,
and also my lifestyle, like, Ihave to have some interaction
with technology and theInternet.

Speaker 2 (23:23):
Yeah.

Speaker 1 (23:25):
So what are what are the ways that our data is being
collected? Like, how are theylike, this is where a lot of
what your expertise comes intois privacy and the lack of
privacy. You know, whether I'musing Gmail or Google Maps or
just an Apple computer or aniPhone, how are all of these
devices and apps being usedagainst us that would you know,

(23:47):
in ways that would be shockingfor most people?

Speaker 2 (23:51):
Yeah. So, you know, one of the things that I think
is misleading a lot is you havethese talk show hosts that just
say, you know, get this VPN andyou're gonna be private. And
that is that is so far from thetruth. There is no silver bullet
to be private. There are so manydifferent angles to getting

(24:11):
private that, you know, therethere is quite a bit to know.
And actually, when people getinto the privacy space and they
they say, okay, I wanna getprivate. What they end up doing
typically is they'll go watchYouTube or look at a bunch of
channels or whatever, andthey'll dive in and they get
totally overwhelmed. Like, thereis so much to know here Because

(24:32):
it comes down to your to yourmethods of communication, your
devices, your browser thatyou're using, VPNs. There
there's so many differentaspects to it, and it's changing
all the time. So I'll give youan example.
So Microsoft and Apple both theyboth have are doing this now. So

(24:53):
Microsoft has Copilot. SoCopilot is AI that lives on your
computer. Right? So what they'redoing is they're putting AI on
your computer and that AI iswatching you.
It's like this this I I view itlike an FBI agent looking over
your shoulder twenty four hoursa day, never blinking, and is

(25:17):
watching you. And so, basically,you're on your computer.
Microsoft it's called Copilot orrecall recall feature in the
Copilot. It takes a screenshotof your screenshot of your
screen every second, and thenthe AI analyzes that screenshot,
what it sees on the on thescreen, and it understands it.

(25:38):
You know, AI is extremely goodat understanding what it sees,
and it is learning about you.
And this is this is on yourcomputer now. If you're on a
Windows computer, this is onyour computer now, and it is
learning about you. And theywill say, okay. Well, you know,
that's only gonna stay on yourcomputer. Don't worry about it.

(25:59):
You know, I I don't believe thatfor one thing. But, you know,
secondly, you know, maybe theydon't need everything on your
computer. Maybe they just needthe AI's analysis of what of
you. Maybe that's all they need.But I I think they want
everything.
But the third thing is that is avery that is everything. They

(26:23):
have all just tons of data aboutyou. And you know, that is if if
the government gets that, bigtech gets that, or or let's say
hackers get that, that is reallyyou know, the the we talked
about it earlier. You know, theywant your information, and
they're gonna use their yourinformation against you. And so

(26:45):
the amount of information thatthey're getting about us now is
really exponentially increasing.
So it's not just watching whatyou're searching for on Google
or anything like that. You know,there's this new device. I don't
know if you heard Johnny IvyIvy, I think, is how you say it.
The the guy at Apple. He justsold his business.

(27:09):
He's not with Apple anymore.He's got his own business, and
it's this AI device that sits inyour in your pocket, and it is
fully aware of everything aroundyou. And so he just sold that to
OpenAI for $6,500,000,000. Andso this again is AI that is

(27:32):
watching you, watchingeverything around you, learning
everything about you,understanding you, and then that
can be used against you. So itis really their ability to spy
on us is really like I said,exponentially growing.
Now that being said, there areways that you can you can

(27:55):
protect yourself. I I think it'stime for everybody to get off of
Windows and Apple. I think it'stime to get on to Linux
computers. Linux has been Linuxis a open source operating
system for computers. It's beenaround for decades.
It's awesome. And now there aredifferent versions of Linux. I

(28:15):
would say just very recently,there are versions of Linux that
make it really very usable forpeople. Because Linux used to be
only for computer geeks. It itused to be very difficult to
use.
But now I would put it on parwith Apple. I mean, it it at
least some of the distributions.There's a lot of different

(28:37):
versions of Linux, but there aresome versions of Linux that are
very usable now. So that'd beone step. I I don't think that's
the first step, but I think ifyou can have a goal of maybe
sometime this year of gettingoff of Windows and Apple and
maybe onto a Linux computer, Ithink that's a good goal to
have.

(28:57):
And, you know, then there'sother things. And so what we do
at Privacy Chem is we just takewe just break it down into bite
sized pieces. And so, you know,okay, now do this. Don't think
about anything else becauseyou're gonna get overwhelmed if
you do. Just think about that.
Just do this. And then just dothis, and then just do this. And
then so we take people through aplanned way forward. And we we

(29:22):
tell people to be methodicalabout it, but but you have to
move forward with it. And andjust take the steps to get
yourself private and secure.
And it is possible to do, butyou just have to take the steps
to do it in in the proper way sothat you don't get overwhelmed.

Speaker 1 (29:42):
Yeah. So, pull up this website again real quick,
with, you know, Johnny and, Ithink it's Johnny Ive, or maybe
it's I I I I think I think maybeJohnny Ive,

Speaker 2 (29:50):
but I don't know.

Speaker 1 (29:51):
You know, Sam Altman and, you know, Johnny Ive.
Here's this this, New Yorker.Sam Altman and Johnny Ive will
force AI into your life. It saysthe founder of OpenAI and the
designer behind the iPhone areteaming up on a gadget they
promise will ship out fasterthan any company ever has. What
could go wrong?
And and this is the thing isthat because I I know you've

(30:12):
been doing privacy for quitesome time, and I imagine you're
doing it before AI was asprominent as it is now. But this
is what this is what reallyconcerns me of all of this.
Obviously, before, you know,going back to, say, the Patriot
Act or any of these otherthings, I think, were really a
breach of our own privacy andmonitoring to protect us. That
was one thing. That's one thingto have a large NSA data center

(30:37):
with experts analyzing and andmaking decisions and whatnot.
It's another thing to be feedingall of this data and information
into an AI system. Because,like, I use AI pretty often for
research or, you know, it's it'sit's a great way to augment our
our abilities. Right? Now, I'mvery careful with it and and
everything, but it is it's agreat tool to use. But if you

(31:01):
look at how quickly it can dothings and this is just like,
I'm just using a, you know, kindof what's available to the
public.
Right? Like, I'm not using amilitary grade AI or who knows
what they've really built.Right? That's the thing too is
that you certainly look intomilitary technology. And I've
always heard that whatever yousee publicly is already, you
know, twenty or thirty yearsbehind what's actually being
done privately.
So Yeah. You know, I mean,honestly, there could be there

(31:24):
could be AI robots walking amongus that we don't even know are
robots. Like, that to me, like,it's it's very, very likely. Or
clones. You know what mean?
Like, I I I'm one of those guysthat believe that these
technologies do exist. And thisis what what concerns me,
though, is is, like, the rolethat AI is now playing in all of

(31:45):
this, and all this informationand data feeding into these
central systems. And I'mconvinced that one of the
reasons that Elon Musk acquiredTwitter was just so that he
could build AI models off of it.Because Twitter, I I would
argue, is one of the greatestdata collection tools that's
ever existed, especially ifyou're trying to collect data on

(32:05):
psychological trends or trendingtopics or, human emotion and
reaction. It's not just data interms of the Library of Congress
type data.
It's data of the human mind.

Speaker 2 (32:18):
Yeah. Learning about people. In terms of learning AI
on people and learning people.I've got a story about that,
actually.

Speaker 1 (32:26):
I love stories.

Speaker 2 (32:28):
All right. So, do Privacy Academy with my son,
Eric, and he's wonderful. He's atruly valuable part of our team.
But he was, I would say, fourfour ish years ago, maybe four

(32:48):
and a half years ago, he wasabout 20, and he was going
through some hard times as manykids do that age, you know? And
he was working as a as a line aline cook in a restaurant and he
was having a a particularly badday that day and so he was angry

(33:10):
and, you know, upset, and he washe listened to he had headphones
on and listened to the same songover and over all day.
Right? And so then he gets offof work and he goes home and
he's flipping through TikTok.And TikTok, there's this meme
that comes up. Now this isbefore ChatGPT came out. This is

(33:31):
before anyone had any idea ofhow powerful AI was.
And there was this this memethat came up in his thread that
was a like an angry cartoondrawing of a of a line cook.
Right? And the the saying said,when you're a line cook and
you're angry and depressed andyou listen to rotten apples

(33:51):
twenty four hours a day, whichis the song he was listened to
all day on repeat, and you wannakill yourself. That's what it
said. And he was so freaked outby that.
He shut off Twitter, and heactually got off of Twitter
because he's like, what the heckdid that? There's no way. That's

(34:12):
just a meme that's out there.That was made specifically for
me.

Speaker 1 (34:17):
And So wait. Sorry. Make sure I'm following along.
So he was he's a lion cook. Iused to be a lion cook right
back in high school.
Yep. He's you know, I I was a aa a moody 18, 20 year old too. I
I've been there, done that. Sohe was a lion cook. He was
really angry, upset.
I've I've also done the samething. I've listened to the same
song for hours and hours andhours. Right? Especially if it
reinforces your feelings. It'slike, okay.

(34:38):
Yeah. Yeah. So he was listeningto the song what was it called?
Rotten Apples?

Speaker 2 (34:42):
Rotten Apples.

Speaker 1 (34:43):
Okay. So he listened

Speaker 2 (34:44):
to the same song over

Speaker 1 (34:45):
and over and over again. And that night, he's on
social media, and he sees a memethat says has a picture of a
lion cook that says, when you'rea lion cook, and you're angry,
and you listen to rotten applesfor twenty four hours a day, and
you wanna kill yourself. Like,that's the meme that showed up
in his feed? Like, that there'sno way that was a coincidence.

Speaker 2 (35:07):
And no. It it isn't. And when I started talking about
this, people had a hard timethinking that, okay. Could AI
actually come up with somethinglike that? Could they actually
draw a cartoon?
Could they actually come up witha meme and actually understand
what what, you know, the contextof everything and now that we
see ChatGPT, we can see that'sthat's child's play, right?

(35:30):
That's that's easy but herehere's what I think happened is,
you know, TikTok is owned byChina. China, Chinese, Chinese
companies have to have to dowhat the Chinese government
says. President Xi got togetherand and told the president of
TikTok, I want you todestabilize the teens in America

(35:53):
and so, the then, the presidentof TikTok goes to the AI
programmers and then, they theysay, they tell the AI, okay,
Destabilize the kids. And so Ilook at it as kinda like Google
Maps where we all start from adifferent location.
We wanna go to this location.Right? With AI, they are doing

(36:14):
that in the emotional realm. Sothe AI understands the emotions
that he was feeling at the time,and they they they know how to
take him down to that that placewhere it's destabilized. And I
think that's happening en masse,and you can see the effect of
this.
And it's not just TikTok. It'salso Snapchat. It's also all of

(36:37):
these things are doing the samething. But I think it's it is
for a purpose. And, you know, II will take this a step further.
I think the AI learned from thatbecause this is the thing with
AI. It's self learning. So Ithink AI learned from that, and
they it learned, okay. I made ittoo obvious. So now I've gotta

(37:00):
make it more subtle.
This is why, you know, anotherpart of this is sixty minutes
about a year ago did a some asegment about TikTok. And they
said, there's there's a spinachversion of TikTok, which is what
they get in China, and thenthere's the opium version of

(37:22):
TikTok in America. And so theChinese version, the kids get,
this is how you exercise. Thisis how you study for school.
This is how you, you know, valueChinese traditions, all of that
stuff.
And then what do we get inAmerica? You get drugs,
depravity, despair,radicalization, all of that
stuff, and it brings people downthis rabbit hole. And each

(37:43):
person is brought down their ownindividual rabbit hole down
this. That's the power of AI,and that's how they are using AI
to manipulate people. And so Ithink that's kind of a real real
world vision of how they'reusing it now.
And I think there's it's hard toprove that they're doing that,

(38:06):
but I think there'sobservational proof that this is
actually what they're doingright now.

Speaker 1 (38:13):
Well, what's really crazy is, you know, they
oftentimes they'll show us whatthey're doing in television and
movies, and it's this predictiveprogramming. So in that that
series, Person of Interest,without, you know, giving too
many spoilers, there was ascene. And this was probably
This particular episode mighthave come out, maybe eight years
ago or something. I mean, it wasIt was early on. I mean, I guess

(38:37):
in the grand scheme of things,it wasn't that long ago, but
still.
And what happened in thisparticular episode is that the
AI there's this malicious AIthat had gained access to this
search engine. Like, was kind ofa Google type search engine. And
they saw this spike in suicides,and they found out that what the
AI was doing was serving upsearch results for people that

(38:57):
they that the AI knew weresuicidal that would actually
drive them towards suicide. Sothe AI like, so and this was in
the TV show. Like, the AI wasliterally causing a spike in
suicides through manipulatingsearch algorithms.

Speaker 2 (39:12):
And that's what I think that's very real. I think
that's exactly what happenedwith this.

Speaker 1 (39:17):
This is crazy. And so getting into I mean, obviously,
there's there's a lot of, youknow, deep and dark places we
can continue going. And I thinkthat for especially the audience
that watches this show, I'vebeen, you know, covering central
bank digital currency anddigital ID for quite some time
and the threat of this. But whatare the like, let's talk about
some of the earlier solutions,some of the easier things.

(39:37):
Because, you know, one thing forme, for instance, you know, my
my business is built ontechnology.
And we've got very, you know, avery, very kind of robust
system. And, even looking at thethe computer program that I use
so I have a PC that I run a lotof our video software, our our
our live editing software offof. And there's really a there's

(39:57):
a very comprehensive programthat we use, for, you know, live
video production and everythingthat's really built only for PC.
So it'd difficult there's a lotof things that would be
difficult to kind of fullyextricate myself from with with
the with the business. But Ithink one of the biggest hurdles
that I think is just people thatsay, Well, gosh, like, I I have

(40:18):
this nice MacBook I just boughttwo years ago or a year ago.
Everything is fully integrated,and the idea of switching to
some Linux based system, it'slike, okay, well, none of the
apps are gonna work. Or the ideaof not using one of the, say,
Apple or Android phones is alsoit's it's difficult for people.

(40:38):
It seems like it's such a bigchange. But are there are there
some are there ways that areeasier to kinda incrementally
pour ourselves out of this?

Speaker 2 (40:47):
Yeah. So first of all, let me say that I don't
think it's gonna be as big of Idon't think it's gonna be as big
of a change as you think. So myphone, I use a a de Googled
version of Android, and that'sexcellent. And then Linux is
actually excellent. It's got alot of great programs, and

(41:10):
they're typically usually free,which is nice.
But, you know, for your examplethere with with that type of
thing and and we can also lookat other people that say, okay.
Well, I've gotta do stuff onGoogle Docs. My business does
things with Google Docs orGmail. So what I would do then
is you wanna compartmentalize.So with your stuff there, that's

(41:34):
fine if you're using it for thatstuff, but then I would only use
it for that.
I would not do anything else. Iwouldn't do any of your personal
stuff on there, whatever. That'swhen it where I would do a a
Linux based thing, and I thinkthat's how you compartmentalize.
If people have to do, let's say,Gmail or something like that, I

(41:55):
think it'd be good tocompartmentalize on let's say
you've got your own personalbusiness, then you can
compartmentalize within the samecomputer. So you can have
different browsers that arededicated.
So if you use a Brave browserfor, let's say, for your
personal searches and personaleverything that you do. But then

(42:17):
if you still have to get on toGoogle and Facebook, whatever,
okay, use a different browserfor that. So you're
compartmentalizing it there. Soyou might want to use LibriWolf
or Movab browser or somethinglike that over there. I I think
that would there's just somestrategies like that that I
think would be good.
But, you know, what youmentioned with, it might be hard

(42:39):
to get off of Apple, whatever.That's one of the things that
Apple has this walled gardenwhere if you're using Apple,
you're using iCloud, you'reusing iPhotos, you're using
Apple Pay, you're using all ofthese things. They make it hard
intentionally for you to leave.And so one of the things that we

(43:00):
try to encourage is don't getwhen you set yourself up on
Linux and the Google phone andall of that stuff, don't don't
have everything in one thing. Soyour password manager should be
this, which isn't attached toanything else.

(43:21):
It's so we recommend Bitwardenas the password manager. But
Bitwarden doesn't do anythingelse. So you're not married to
Bitwarden. You're not it's nothard to leave that if you need
to. Anyway, I I hope I hope thatmakes sense.
Kinda

Speaker 1 (43:36):
No. It is very helpful. Now what about because,
obviously, you you mentionedbefore the the three different
threats. Right? And one of thoseof being cybersecurity, hackers,
etcetera.
So, obviously, you know, we'vewe've talked enough, I think, to
kinda paint the picture of thebig brother, the surveillance
state, how it feeds into AI, andthe dystopian worries that arise

(43:57):
when you put all those thingstogether. But there's also the
more immediate of, oh mygoodness. My online identity was
stolen. I'm I saw somethingrecently where someone was, the
phishing, the phishingactivities have gotten so much
more advanced, where now it'syou might get someone that
messages you on Twitter, andthey say, oh, I'm I'm a Forbes
reporter, and I love what you'redoing. I wanna interview you.

(44:18):
Here's a a Google Calendar link.But this guy realized that the
calendar was spelled with anwith an I instead of an l, and
there are these subtle things.And even I've caught, like, I'm
very, I'd like to say I'm I'mI'm pretty good at avoiding
those things. Like, whenever Isee an email that says, hey, you
have a receipt? I don't open thePDF.
They say, hey, here's a link. Ilook at the link. I look at the
the sender. It's like, oh, it'snot chase.com. It's, you know,

(44:41):
chase.something.com.
Right? There's there's all theseways that they can mask. But
Yeah. Let let's talk a littlebit now about what are the what
are the more immediate threatsthat you're seeing with hacking
and cybersecurity? Gold hassurged 46% in less than a year,
doubling the gains of the Nasdaqand the S and P five hundred.

(45:04):
But this isn't just anotherrally. Global reserves are
shifting, exposing cracks in themonetary system. Investors are
losing confidence in paper goldand demanding physical metal,
creating a massive gap betweengold owed and gold available.
But this isn't about howinstitutions broke another
system. System.
It's about how you can profitfrom it. Right now, Noble Gold

(45:28):
Investments has a limited supplyof investment grade gold bars
and coins available. As banksscramble to fulfill their
obligations, pushing gold priceshigher, you can profit. Smart
investors are already movinginto physical gold. Noble Gold
Investments makes it easy foryou to do the same.
And right now, when you make aqualified investment, Noble Gold

(45:50):
will add a free tenth ounce goldcoin to your order. Don't wait
until it's too late. Visitgoldwithseth.com or call (626)
654-1906 now and turn theirpanic into your profit. Again,
that's goldwithseth.com or (626)654-1906. You'll find that

(46:14):
information in the descriptionfor the show as well.

Speaker 2 (46:18):
Yeah. So, you know, so we talk about privacy and
security, and they're actuallytwo different things, but
they're very closely related.And I think security is actually
one of the most important thingsto do right away because hackers
and scammers is a very realthreat. We do talk about how to
use how to do passwords theright way. And I know a lot of

(46:40):
people when I mentioned passwordmanagers, they're gonna cringe
and say, I I don't trust apassword manager.
But then you look at those youknow, maybe they're doing maybe
they're using the browser tosave their passwords, or maybe
they're saving passwords on anExcel spreadsheet on their
computer, which is a terrible,terrible way to do it. There's

(47:01):
there's only so many differentways that you can manage
passwords. And even even writingthem down has has some
significant problems to it. Sothe best way to do it is a
password manager. But then onceyou have a password manager, you
want to also have a two factorauthentication.

(47:23):
And two factor authentication isvery important. So you can use I
don't have it. Do I have ithere? So this is a this is a
passkey. So this is a nitro key.
So you can that's a a method oftwo factor authentication that
you can use. That is a physicaldevice. And I have to have this

(47:47):
actually plugged into mycomputer. That's one way to do
it. There's there's some appsthat you can get on your phone.
But I would say the securityside of things is very, very
important. And I I we emphasizethis really strongly to our
people, to our audiences. Youknow, you have to get secure.

(48:07):
That's that's one of the mostimportant things that you have
to do.

Speaker 1 (48:12):
And what happens if if your data is breached? Or
what happens if someone, say,gets access to one of your main
emails that you may be using tolog into your bank accounts,
your social media? What what aresome of the worst case scenarios
of what you've seen happen topeople that do end up getting
hacked?

Speaker 2 (48:31):
Yeah. Okay. So there's there's different
there's all kinds of differentdimensions to this. So there's
scammers and there's hackers,and a lot of times they work
together. But there's also scamsand then there's identity theft.
Identity theft is different. Soidentity theft is when you are
not involved in the process atall. So let's say they get your

(48:53):
social security number and maybean illegal alien gets a job.
They use your social securitynumber to get that job. The the
business submits your income tothe IRS and then, you are on the
line, you're on the hook to paythat and there is a gentleman

(49:14):
there there I I was justactually doing a class about
this the other day.
There's this gentleman, TonyChilikas, who had a a a story
done on about him, has 17 peopleusing his Social Security
number, you know, giving their,giving the stuff to the IRS. The
IRS does not care. They knowthat it is that that is identity

(49:37):
theft. They know that it is nothim. They don't care.
They're just saying, give us ourmoney. Here's your fine. Give us
our money. Give here's yourfine. And he he he just like, I
don't know what to do.
I can't. I don't know what todo. So, that's identity theft.
Now scams are different. Scamsare where you're actively

(49:58):
playing a part, and there areall kinds of different ones
there too.
But one of the really big onesis what they call a pig
butchering scam, And that'swhere you meet somebody. So you
might get like text messages andit's like somebody texting you
saying, hey, how's did you catchthe game the other day? And then

(50:19):
you text back and say, well, Ithink you have the wrong number,
but then they start aconversation with you. And or
they or you meet them on adating site or social media or
something like that. And whatthe the pig butchering scam
means is they're fattening upthe pig before the slaughter.
And so what they're doing isyou're the pig and they're

(50:41):
fattening you up by earning yourtrust. And so if they can earn
your trust by becoming friendswith you or even getting to the
point where you fall in lovewith them, then they've got you.
And then you can they they canget all kinds of stuff. And
actually, you know, Andrew Tateused to do this. Andrew Tate was
he would brag about this.

(51:03):
He'd go on podcast and he'd bragabout how he's stealing money
from, you know, these old lonelyguys in America. Like, he'd get
he'd make millions of dollars aweek on this on this type of
scam. And he just would bragabout it, you know? And there's
all kinds of people that aredoing that type of thing and

(51:24):
I've talked to people that have,there was one guy I talked to,
said I I lost $300.00 and hesaid, I don't have $300.00. I
had to mortgage my house to dothis.
And now, know, I can't face mywife. I'm so ashamed. And I
can't face my family. I'm soashamed at this. And I think the

(51:46):
shame is is the biggest one ofthe biggest parts of of those
scams when you fall for it.
But they're good. They're reallygood at what they do. So I
encourage people not to beshamed about that stuff.

Speaker 1 (52:01):
Incredible. There's actually I'm actually looking
for it right now, actually.There was, Let's see if I can
find it on a plate for you. Oh,yeah. Here we go.
So, there was a guy So what'sinteresting is that what I'm
seeing is a lot of scams ofpeople impersonating,
influencers. This is really,really common. So I've got a

(52:22):
Telegram group. And what youknow, one thing that it was
common a couple years ago wasthat people would I'd get these
people messaging me, and they'dthey'd comment in the the
Telegram group and say, hey,Seth. Did you message me
privately and talk about somesort of, like, investment or
something?
I'd say, no. Right? There's tonsof people that they would use my
profile. They'd have my name,and they'd they'd message
people. And they'd say, hey,fellow patriot.

(52:44):
Thank you for being part of mychannel. Have you heard about
Nisara Jisara, whatever? Andit's like, okay. Those are
easier. So I'm gonna playsomething for you.
I had somebody that emailed me.They had someone that scanned
them, but then used AI togenerate my voice talking to
them. Right? So the I'll playthis. This this is absolutely

(53:05):
insane.
So listen to this. This is thisis the actual file that the
scammers sent this personthey're trying to scam by using
my trust that I've built withthe audience. So listen to this
real quick. I'll play just afew, you know, twenty seconds of
it. No need for the theapologies, Oliver.
Remember the first interview Ihad with Jonathan Otto. If you

(53:27):
tuned in the latest episode,you'll know who I'm referring
to. So he, as well, was askeptic. But after a series of
So that's not me. Was someoneusing AI to mimic my voice to
convince somebody that this,say, this guy that they're
following, that they think, oh,he's this popular podcaster.
Wow, he's sending me a voicenote? Of course, I'm gonna

(53:50):
follow what he does. Andactually, I saw let me see if I
can find it again, actually. Isaw even, Patrick Bet David. I'm
I'm sure you're familiar withhim.
Let me see if I pull it up realquick as, as we're looking. So
what happened with him is thatpeople were using Oh, let's see

(54:10):
if I can find it. Maybe I can't.People So, AI So, on Meta,
people had used AI to generate areal looking video of him. It
looked like he was just doing aselfie walking around a parking
lot.
And he was like, Hey, this isPatrick McDavid. You know, we're
launching our new investmentgroup, the PBD investment group,
and do this. And it was a videoof him, looked like he was doing

(54:33):
a selfie walking through aparking lot, and talking about
some real estate investment, butactually, the whole thing was
fake, and they were using it.And I've see also seen the same
thing with Elon Musk, that whenElon Musk was was doing you
know, first kind of becoming youknow, gaining prominence with,
like, the kind of theconservative movement, that
there were even channels onYouTube that were holding these
entire fake Elon Muskpresentations of an AI generated

(54:57):
Elon Musk up on stage talkingabout these new opportunities
for these, digital coins.They're using it to scam people.
Like, it it's gotten absolutelyinsane how, like, the the the
the detail they've gone into.

Speaker 2 (55:11):
Yeah. That is that is frightening, and and these
deepfakes are very good. Andlike you're saying, the video
and the voice and the and theand the speaking patterns, all
of that stuff. And and really, Ithink that's something that we
have to understand about hackersand scammers. Now they if if we

(55:33):
look back, let's say, you know,even five years ago, the
constraint that they had to dothese pig butchering scams and
that type of thing was theyneeded a real person to be on
the other side of thatconversation.
So, they had to have bodiesthere but now, they can ramp it
up and have just AI talking topeople and you can't tell us any

(55:56):
different and you can and and sotheir ability to scam people is
going to be also exponentialbecause because of this
technology this technology thatthey have available to them.

Speaker 1 (56:11):
Actually, I, You know, I found so I'll play real
quick. This is this is it. Thisis, this is an AI generated
video of Patrick Beck David thatwas that that actually Meta
wasn't pulling down even. He hewas calling them out saying,
please pull this down. It saysit me.
Watch this. This is this is afake AI video to scam people.

Speaker 3 (56:28):
Next ninety days, we'll make millionaires in 2025.
These are the top three stocksto buy in a turbulent market. I
guarantee that some of them willsurprise you. You don't need to
rush to act or buy immediately.You can join my group to see my
real investment cases.
For example, the Palantir stockI shared in the group before has
risen by more than 300% in halfa year. I don't charge any fees,
and if my advice doesn't meetyour expectations, you can

(56:50):
withdraw at any time.

Speaker 1 (56:53):
So that right there was an entirely AI generated
video meant to scam people.Yeah. It's wild. It's crazy.

Speaker 2 (57:02):
Yeah. And it's also it's also businesses that have
to be careful of this toobecause there was a a bank in
Hong Kong that got scammed outof $23,000,000 because the
account executive that wasworking with a large company,
the the large company calledthem up and said, and it was the

(57:22):
president of the company, calledthem up on a Zoom call, and they
had five other executives in onthe call with them. So they had
the voice, the voice thespeaking patterns, the the
video, all of that stuff. Andthey said, you know, we I know
it's getting towards the end ofyour day today but we really
need $23,000,000 transferred tothis this place like like right

(57:45):
now before the end of the day.Can you please do that?
And so, it was yeah. It's it'sgetting very difficult to
protect yourself against thattype of thing. And, again, I
don't think we should black pillpeople, but there are some
things that you can do to tomitigate these things.

Speaker 1 (58:06):
And and that's and that's what's really important.
Actually, I I you've got my earskind of really alert because I'm
thinking that there's I've gotso many security loopholes, and
my business lives online. So Iwanna pull up your your website,
Privacy Academy, because I also,I know that we've set up we're
gonna have a free webinar thatyou're gonna be doing live live
q and a. Well, I guess, walk usthrough, what this webinar is

(58:29):
gonna introduce people to, whatit's gonna teach them.

Speaker 2 (58:33):
Yeah. So I think we're doing it on June 12,
right, at, 11AM central.

Speaker 1 (58:39):
Yes. So June 12. And yeah. 11AM central, twelve PM
eastern, which I'll put all thisinformation in the description,
the link to register, etcetera.So, anyway, back to you, though.

Speaker 2 (58:47):
Yeah. Yeah. So so when people join, what what I'm
gonna do is I'm gonna go throughan education class for an hour,
and and we'll take you throughthe threats and really
understanding the threats andthen what you can do to, you
know, some steps that you cantake to get yourself prepared. I

(59:08):
mean, there's only so much wecan do in an hour, but I think
we're gonna I'm gonna pack asmuch stuff into that hour as I
can. Then at the end of thehour, we'll do a a q and a with
people.
And so I mean, that's alwayspeople's favorite part too. So
it it'll be fun, and I encouragepeople to to join us.

Speaker 1 (59:29):
And so the webinar is really it's if I understand
correctly, it is a just a afoundational, kind of 101.
Right? Online privacy, how toprotect yourself from big, big
brother data surveillance,hackers, AI, like, kind of
helping people just give them,like, the basic understanding of
how to, just how to protectthemselves against all of these

(59:51):
these digital threats. Is thatand then then follow-up with a
with a live q and a as well.

Speaker 2 (59:57):
Yeah. And and, you know, I think the the important
thing is to understand thethreat first. And so that's what
we go through. And so you caninvite other people to it. And I
I think it's a really good wayto introduce people to the
problem and and to see thelight, there's a light at the
end of the tunnel.
There's a way out of this.There's there's things that we

(01:00:20):
can do and it's also, I think,very important for understanding
the the threat on the bigpicture like we what we talked
about earlier where this is avery real threat to liberty
itself. And so we need to wakeas many people up as possible.
And that's that's really mymission is I I want to wake

(01:00:42):
people up to this threat. Andand so that's what we that's
what we do in the webinar.
So I encourage you to come andinvite other people too.

Speaker 1 (01:00:52):
And and the webinar is free. Right? There's no
there's no cost. They just haveto register. Right?
So we'll have a link in thedescription that where they can
register, and there's no cost.Right?

Speaker 3 (01:01:02):
Correct.

Speaker 1 (01:01:03):
Yep. Great. Great. Well, Glenn, I appreciate what
you're doing. I'm lookingforward to the webinar.
I'll be there. So I'll be livewith you. And so, you know,
though you're gonna be one,obviously, that's me answering
the q and a's, but I'll beparticipating. And so, yeah, I
encourage I encourage everyonewatching this to bookmark your
calendar. If people want accessto the webinar, say they're

(01:01:24):
working, say the webinar's in inthe middle of the day, If they
register, can they get access towatch it after the webinar is
finished?

Speaker 2 (01:01:31):
Yep. Yep. Yeah. I mean, try to come live if you
can because then you canactually participate in the q
and a, all of that stuff. But wewill have the replay out for a
couple days after that.

Speaker 1 (01:01:41):
Great. So that's June 12, and and at noon eastern,
eleven central. We'll have allthose details. We'll have the
link to register the timing andall that stuff in the
description for this show. And II'm I'm looking forward to it.
So I hope that, you know, forfor you that are watching, I
hope you're there. Glenn, you'regonna be there, obviously. And,
thank you for doing what you'redoing, actually, because I

(01:02:02):
again, I I'm just I'm I'm mymind is blown. Like, when I see
these videos of Patrick Pack,David, or I get sent the the
voice copy of me, I'm thinking,gosh, how are we gonna how can
we protect people? It's onething to say, look, don't
respond to the letter you got inthe mail from the Nigerian
prince that, you know, wants theWestern Union for $500.
They can send you $10,000,000you inherited. Like, okay, we're

(01:02:23):
past that, hopefully, butcriminals are smart, and and
they've gotten really good atscamming us.

Speaker 2 (01:02:31):
Yeah. They have. And, you know, there are things that
we can do, though, and thatthat's what, you know, my
mission is, is to help peoplefigure this out. I mean, there's
a lot of freedom fighters outthere. I love what you're doing.
Thank you for what you're doing.We just focus on a very
particular part, which is thesurveillance, anti surveillance,

(01:02:55):
you know, liberty throughprivacy is what we focus on.

Speaker 1 (01:03:00):
Very good. Well, Glenn, thanks again. Was great
speaking with you, and I lookforward to the webinar together.

Speaker 2 (01:03:06):
Yep. Thank you, Seth.
Advertise With Us

Popular Podcasts

Stuff You Should Know
24/7 News: The Latest

24/7 News: The Latest

The latest news in 4 minutes updated every hour, every day.

Crime Junkie

Crime Junkie

Does hearing about a true crime case always leave you scouring the internet for the truth behind the story? Dive into your next mystery with Crime Junkie. Every Monday, join your host Ashley Flowers as she unravels all the details of infamous and underreported true crime cases with her best friend Brit Prawat. From cold cases to missing persons and heroes in our community who seek justice, Crime Junkie is your destination for theories and stories you won’t hear anywhere else. Whether you're a seasoned true crime enthusiast or new to the genre, you'll find yourself on the edge of your seat awaiting a new episode every Monday. If you can never get enough true crime... Congratulations, you’ve found your people. Follow to join a community of Crime Junkies! Crime Junkie is presented by audiochuck Media Company.

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.