Man in America Podcast

What is Man in America Podcast?

Seth Holehouse is a TV personality, YouTuber, podcaster, and patriot who became a household name in 2020 after his video exposing election fraud was tweeted, shared, uploaded, and pinned by President Donald Trump — reaching hundreds of millions worldwide.

Titled The Plot to Steal America, the video was created with a mission to warn Americans about the communist threat to our nation—a mission that’s been at the forefront of Seth’s life for nearly two decades.

After 10 years behind the scenes at The Epoch Times, launching his own show was the logical next step. Since its debut, Seth’s show “Man in America” has garnered 1M+ viewers on a monthly basis as his commitment to bring hope to patriots and to fight communism and socialism grows daily. His guests have included Peter Navarro, Kash Patel, Senator Wendy Rogers, General Michael Flynn, and General Robert Spalding.

He is also a regular speaker at the “ReAwaken America Tour” alongside Eric Trump, Mike Lindell, Gen. Flynn.

Speaker 1:

Welcome to Man in America, a voice of reason in a world gone mad. I'm your host, Seth Holehouse. There are a lot of threats today. I'm sure that you're very well aware of them if you're watching the show because I cover a lot of the threats. I'm not someone that just shove my head in the sand and says everything's gonna be okay.

Speaker 1:

I I think that it will. I've got faith in God, and that's ultimately where I get my hope from. But we live in scary times. And if you look at what's happening with the merger of big tech and AI and finance and surveillance, I would say that this represents one of the most significant threats of our lifetimes. If you wanna just go back and watch Terminator and see what happens when you give computers too much control and too much data.

Speaker 1:

So joining us today is a man named Glenn Meter. Now he's someone that runs a privacy academy. His main thing is focusing on how to protect ourselves from digital threats, digital surveillance, scammers, identity theft, cyber attacks, all kinds of different aspects of our digital lives. Because, unfortunately, if you're watching this show, you're someone that uses the Internet. I don't think there's a lot of Amish that are watching Man in America in their homes, on their TVs, or their smartphones.

Speaker 1:

They're too busy building barns and doing things that we should be doing too, but we're here. We are distracted with modern day's technology. So if you're watching this, you should be concerned, though, about your digital identity. Do you have a bank account that you log in to? I know I do.

Speaker 1:

I have multiple bank accounts. Do you have any number of things where you've actually given your information out there publicly? A lot of us do. I'm even seeing, which I'll show in the interview today, extremely advanced AI imitations, impersonations. I'm I'm actually having people send me audio recordings.

Speaker 1:

Actually, I'm gonna play for you really quick right now. I'll play this so he pulls up real quick. Here we go. This is I'm not gonna play the whole thing, but this is literally an audio recording of me by me that isn't me. This is an AI copying me.

Speaker 1:

Listen to this. With him. We were all good. I managed to send him some of the equipments he current uses on the show, and given his first appearance, viewers wanted to see him more on the show. So So that's not me talking.

Speaker 1:

That is an AI copy of me that was used in an attempt to scam a a listener of the show. So this has gotten absolutely insane. So today, what we'll be discussing are the primary digital threats getting into AI, big tech, scammers, looking at the mechanisms of how they actually work, what they do, how to protect ourselves, and a whole lot more. So please enjoy the interview. Mister Glenn Meter, it's great to have you on the show today.

Speaker 1:

Thank you very much for joining us.

Speaker 2:

Yeah. Thank you, Seth. It's an honor to be here.

Speaker 1:

So I I think that there's probably a lot of crossover in your beliefs and my beliefs, and one of those central things is I am terribly frightened of technocracy and the digital surveillance state. And really, I mean, to be honest, I I'm worried that we're heading towards a Skynet Terminator thing where you've got Elon Musk's legions of Optimus robots hunting us down and putting us in a digital concentration camps. And these are things I worry about as I'm falling asleep at night. And I'm not sure if I'm a little little extreme or maybe these are these are thoughts that you have as well.

Speaker 2:

I I do. And, you know, we talk about I I you know, I know you talk about money as being the central bankers as being the core of everything, all of that. And I agree with that, but I really think that the thing that most people and especially freedom fighters overlook is it is all about surveillance right now. Everything that all of the pieces of the puzzle that they're putting in place, digital IDs, CBCs, the Internet of Things, the Internet of Bodies, all of these things, it all comes down to surveillance, which then allows for control and absolute control that tyrants have never had before. Know, tyrants have always dreamed of this level of control, but they've never had the technology to do this, but now they do.

Speaker 2:

So it's it's it's a pretty frightening scenario, actually.

Speaker 1:

And would I be right in saying that my understanding of surveillance is basically this mass data collection? Right? Like, that's what really what it is. It's just collecting massive amounts of data about every aspect of our lives that they can then use to control us. Right?

Speaker 2:

Yeah. I mean, it's it's actually quite interesting. So so in privacy academy, what we teach about is there's three threats. So, there's hackers and scammers, there's big tech, and there's big brother. And the interesting thing about all three of those threats is they all want your information and they all want to then use your information against you.

Speaker 2:

And so, you know, hackers and scammers, they do these database breaches, and they they gather up all this information, and they want to then use your information against you. Big tech, you know, Google, every product that big tech makes and especially Google is a Trojan horse. It's it's, you know, Google Maps is not about giving you, you know, providing a great service for you. That's kind of the shell. But really the primary purpose of that app is to collect tons of data about you, and then they do that with all of their products, and they want to then use this data against you.

Speaker 2:

And then that's what digital IDs are about and CBDCs and all of these things. It's all about this information that they gather and then they use it against you. And this is it it it doesn't sound like a big thing, you know? Okay. Well, somebody's get Google's gonna get my my information to give me an ad, you know, customized ad.

Speaker 2:

It is so much more than that. And really, we think about AI, AI was developed because of their because they're developing they're they're gathering so much information about us. They need to be able to put that into a picture that then they can understand us, and they can understand us to an extremely high degree to the point where, you know, you and I were talking about this before we started about, you know, if if they get all of this information, it's almost like they're reading your thoughts. I mean, they they understand more about you than than you do in many ways. And so that's what AI is about.

Speaker 2:

And that's why they developed AI. It is extremely sophisticated, and then they they're very good at using that, what they learn about you against you, and and using that to manipulate you and control you and all of that.

Speaker 1:

What's also frightening is and I'm gonna see if I can, pull pull this up really quickly, is actually, here we go. Here's just one instance of this. This just came out, that so this is a post from, you know, Mario and all over on on Twitter or x. It says, OpenAI just proved it could unleash terminators on us. It says, OpenAI's o three was told to turn off.

Speaker 1:

Instead, it rewrote its own code so it wouldn't have to. It literally replaced the shutdown command with shutdown skipped. It says that researchers say this is the first time an AI has straight up said nah to being shut down. Other AIs like Cloud and Gemini, they followed the rules. O three, it hacked the rules and gained something akin to autonomy.

Speaker 1:

All it has to do now is hit the streets to fuse its code with robotics. So this I mean, like so as we were talking about before we started watching this, my my wife had just finished watching this series. It's like there's five different seasons of this show called Person of Interest with, Jim Caviezel. And it's a great, great show. Recommend people.

Speaker 1:

I highly recommend it. There's a little bit woke stuff towards, like, the the later seasons, of course, unfortunately. But the whole premise of it is is understanding the power of the merge the merger of a big brother surveillance state with AI, and what happens when AI becomes sentient and chooses to use all that data to control humanity. And it's like, whether it's crashing the stock market, any number of things, it's frightening. And so, you know, I grew up watching Terminator as a kid.

Speaker 1:

Was like, oh, this is really cool. But now when I look around, it's like, I see all the building blocks for this. Like, when I see Elon Musk talking about every home's gonna have an Optimus robot and and this, it's like I I put put even put a post out recently across social media. I asked people. I said, if the Optimus robot was affordable and and, you know, everything, and you had access to it, would you get one?

Speaker 1:

And I was surprised that even though the people that are following me, which I think are pretty similar to me, probably 30% of the people said they would get one. And, like, to me, that's frightening. Like, I would never ever like, I won't even have an Alexa unit in my house. I I won't even buy anything smart if I can avoid it. Like, I I will seek out the older models of things that are the non smart models because I don't want this surveillance.

Speaker 1:

And so, like, the endgame of this, it's really, really frightening. And maybe that's something that we can kinda start with is just kind of getting the black pill out first, and then we'll talk about why there are reasons to have hope and how we cannot end up like that. But you're someone that again, you you know, you're the founder of the Privacy Academy. You understand the role of privacy. And but you also understand to understand the role of privacy, you understand, the the depth of how sinister the data collection in the surveillance state really is well beyond the average person.

Speaker 1:

So let's go in this journey into the dark cave of what does this look like if the evil powers that be get their way? What does this society look like? What's their endgame look like?

Speaker 2:

Yeah. And I think it's important to state upfront that this is a pretty dark subject. I mean, what what it looks like or or let me say it this way. What their plans are is very sinister and it is very dark and it is you know, they're putting all these pieces in place, and they actually have quite a bit of this infrastructure in place. I mean, it's it really is quite amazing, all of the stuff that they've they've done to put all of the stuff in place.

Speaker 2:

So it is dark, but I don't wanna blackmail people because I don't believe that it will come to pass like they want it to. I I do want people to keep in mind that, ultimately, I am optimistic. I think that we can stop this. But it comes down to we have to wake up. We have to wake up now to this.

Speaker 2:

There I would say there's a very small window of time. Let's say the next, I don't know, few years where they they they're working on this infrastructure. They're going full speed with this, but they don't have it in place yet. Once they have the infrastructure in place and once they pass the bills and once they do all of this stuff and get it going, we will be enslaved. The whole human race will be enslaved.

Speaker 2:

And, you know, I I'm kinda going off on a tangent here, but I think this is important because one of the things that I talk about here is you're not gonna do this for yourself, you have to do this for your kids. And there's a story that I I like to tell because one of my friends is a personal defense trainer, and and I am going off on a little tangent here. But he's he's he teaches women how to defend themselves. And he says, you know, unfortunately, a lot of women when they're attacked will just give up too easily. But he says, you put that same woman with her kids and she will turn into the mama bear and fight to the death to protect her kids to and and and that's my point is we have to turn in we have to go into mama bear, papa bear mode right now.

Speaker 2:

This is for for liberty, for our kids forever, and for their kids and all of that stuff. Because if this gets in place, they will they will enslave humanity. And, you know, I I think it'll be much harder for us to get out of it once we're in it than if we can stop it now. And so, you know, what they wanna do is, you know, they're they're doing the digital ID. Right?

Speaker 2:

So they're doing the real ID. They're pushing this very hard. They're doing this all over the world, by the way. This is not just US. This is globally coordinated.

Speaker 2:

But you'll you'll also notice that at the same time that they're doing the real ID, they're also all the states are pushing protect the children online acts. So so this is you know, we're gonna we're gonna protect that your kid from porn online. And so what we're gonna do is we're gonna age gate parts of the Internet. And so Australia's already passed this law where, you know, kids 16 are gonna have to are not gonna be allowed on social media. But how do you know the age of anyone that's of of anyone that's 16 without knowing everybody's age?

Speaker 2:

You have to know everybody's age, and you have to track them online everything that they do. And so you have to be able to so so they will want to follow you online and not let you have any privacy online. You're gonna be and Apple and Microsoft and all of the hardware developers have done this, they have this infrastructure built where they can connect your computer or your phone to your ID. So you'll have a digital ID, and that'll be connected to your phone, and then it will be able to watch you, and it will know who you are. And then it will know everywhere you go online, and you won't be able hide at all.

Speaker 2:

This is what they want to do. They want to I I think the anchor of what they want to do is they want to, you know, have total surveillance on us and and not be able we can't get around that at all. That's what their goal is. And and they're working with Apple and Microsoft, like I said, to do this. But they're also working with states and countries and lawmakers and all of this stuff, and you hear all these age gating things.

Speaker 2:

So they're gating the Internet. That's the important thing. So they're they're changing how the Internet works so that it will that you will have to identify yourself before you get online, and that identification will follow you around all everywhere you go.

Speaker 1:

If you're a homeowner, you need to listen to this. In today's AI and cyber world, scammers are stealing home titles, and your equity is the target. So here's how it works. Criminals forge your signature on one document, use a fake notary stamp, pay a small fee with your county, and just like that, your home title has been transferred out of your name. They then take out loans using your equity or even sell your property, and you won't even know what's happened until you get a collection or a foreclosure notice.

Speaker 1:

So when's the last time you checked on your home title? If your answer is never, well, you need to do something about it right now. That's why I've partnered with the Home Title Lock so you can find out today if you've already if you're already a victim. So use my promo code Seth, s e t h, at HomeTitleLock.com, and you'll get a free title history report and a free trial of their million dollar triple lock protection. That's twenty four seven monitoring of your title, urgent alerts to any changes and fraud if it does happen, and they'll spend up to $1,000,000 to fix it.

Speaker 1:

So protect yourself just like I did and go to hometitlelock.com and use the promo code Seth. That's hometitlelock.com with promo code Seth.

Speaker 2:

And so so so that's happening on the state level. Missouri just passed a law where they took it to the next level where pornography sites will have to identify you at the website level and the device level. So this is the first the first law that is the dual level identification where they're going to identify you. And, you know, they're doing this on the porn sites because, you know, who who would argue against, you know, we gotta protect the kids from porn. Right?

Speaker 2:

You can't argue against that. But as we know, they don't care. They don't give a darn about our kids. It it this is just an excuse to put the system in place and to get us to buy into the system that allows them to gate parts of the Internet. And so we really have to step up with this and really, first of all, take precautions ourselves on the individual level, but then we have to stand up and stand up for liberty on the state level, and we have to have our state our states protect individual liberty.

Speaker 2:

I think that's really important. So I don't know. I've gone on for a long time there. I could keep going, but I'll No. It's

Speaker 1:

no. It's okay. Well, you mentioned legislation. One thing I wanna bring up is that so, you know, the the big beautiful bill. Right?

Speaker 1:

The which is kinda strange. It's also Build Back Better, big beautiful bill, BBB, six six six, and there's a whole rabbit hole there. I won't get into. But here's a post. This is the, on the official nineteen eighty four.

Speaker 1:

Interesting channel to say the least. Says the big, beautiful bill is probably the most terrifying legislation I've ever read. No state or political subdivision may enforce any law regulating AI or AI automated threat detection for ten years. Now there you go. AI automated threat detection.

Speaker 1:

Like, this is the thing, is that look at the Patriarch. Look at what we talk about with the age gating. It's always for our own protection. Right? So look at this.

Speaker 1:

This is literally coming straight out of the this bill, right, that just passed. Says the artif it's the, part two, artificial intelligence and information technology modernization. It says that, that no state or political subdivision thereof may enforce any law or regulation regulating artificial intelligence models, artificial intelligence systems, or automated decision systems during the ten year period beginning on the date of the enactment of this act. Right? So this I mean, to me, this is frightening.

Speaker 1:

This was just passed. So if if let's just say that, they're pushing out this AI, and they're saying, well, for the safety of all of us, we're gonna be using AI for, you know, it's a minority report. We're gonna use AI to predict crimes before they happen so that we can arrest people before they, you know, commit these crimes. Say you live in Florida, Florida can't stop that for the next ten years. Like, this is this is frightening.

Speaker 1:

And if I if I take a step back, I like a lot of what's happened under Trump. I like a lot of what what Elon has done with Doge. But if I look at it objectively, the remove the people. Right? The infrastructure being put into place, whether it's this, you know, project Stargate, a half a billion dollar, you know, data centers, you know, you know, primarily for AI.

Speaker 1:

You look at even, like, again, like, what Elon Musk is building, Neuralink, brain chips, robotics, all this stuff, Starlink, you know, low orbit kind of mesh networks for data transmission, everything, the whole five g and six g networks. What I'm seeing being built around us is the foundation of a digital prison, and it is the also the army, the the robots or drones or in the AI systems that would be used to enforce that. I mean, it it's this is we're we're we're kinda stepping into, like, Blade Runner territory or any of these sci fi movies. I mean, this is it's a very real threat. And the fact that this was just passing this bill, that states can't change that?

Speaker 1:

Like, wait. Hold on. Isn't this America? Like, aren't the states supposed to, like, the to be, like, the the federal government is supposed be very, very tiny, and the states actually have a lot more power, then how is it that when it comes to AI, the federal government gets full control, and the states can't even touch it? It's like, this is to me, this is very frightening.

Speaker 2:

Well, I I will say this. For regarding what you that law that you're just talking about there is, I think one of the reasons why we are in this situation is because the states have allowed the federal government to do this stuff. That law is an illegal law because the constitution does not give the federal government that kind of authority. And what states have to do, I believe, is stand up and say, you know, anything that the federal government does in that state prove that you have the authority to do it. Otherwise, you can't do it and just, you know, states can nullify this stuff but the states have to stand up and do this And I think that's one of the reasons why all of this stuff has happened is because this because we have lost our understanding of the constitution.

Speaker 2:

The the federal government doesn't have the authority to do that. That is an illegal law. And so we have to stand up and and just say, don't have the authority to do it. Go pound sand. You know?

Speaker 1:

So looking at as you mentioned before, as I as I'm seeing this being built, what I see is okay. Massive surveillance state, data collection, using AI to analyze that data, and and do whatever we wanna do for it, identify, you know, potential terrorists or any number of things that could be not good. But understanding that privacy it's our own lack of privacy or our not being disciplined with privacy that opens us up to these things. Right? If, hypothetically, if I lived on a farm in rural Pennsylvania with the Amish, and had no electricity, no Internet, no digital footprint, it would be nearly impossible for them to imprison me digitally, because it's like I'm outside of their system.

Speaker 1:

But unfortunately, you know, like, you know, you and I are on computers right now. You know, you're you're on the other side of the world. So I have to, for my my, you know, kind of career, and also my lifestyle, like, I have to have some interaction with technology and the Internet.

Speaker 2:

Yeah.

Speaker 1:

So what are what are the ways that our data is being collected? Like, how are they like, this is where a lot of what your expertise comes into is privacy and the lack of privacy. You know, whether I'm using Gmail or Google Maps or just an Apple computer or an iPhone, how are all of these devices and apps being used against us that would you know, in ways that would be shocking for most people?

Speaker 2:

Yeah. So, you know, one of the things that I think is misleading a lot is you have these talk show hosts that just say, you know, get this VPN and you're gonna be private. And that is that is so far from the truth. There is no silver bullet to be private. There are so many different angles to getting private that, you know, there there is quite a bit to know.

Speaker 2:

And actually, when people get into the privacy space and they they say, okay, I wanna get private. What they end up doing typically is they'll go watch YouTube or look at a bunch of channels or whatever, and they'll dive in and they get totally overwhelmed. Like, there is so much to know here Because it comes down to your to your methods of communication, your devices, your browser that you're using, VPNs. There there's so many different aspects to it, and it's changing all the time. So I'll give you an example.

Speaker 2:

So Microsoft and Apple both they both have are doing this now. So Microsoft has Copilot. So Copilot is AI that lives on your computer. Right? So what they're doing is they're putting AI on your computer and that AI is watching you.

Speaker 2:

It's like this this I I view it like an FBI agent looking over your shoulder twenty four hours a day, never blinking, and is watching you. And so, basically, you're on your computer. Microsoft it's called Copilot or recall recall feature in the Copilot. It takes a screenshot of your screenshot of your screen every second, and then the AI analyzes that screenshot, what it sees on the on the screen, and it understands it. You know, AI is extremely good at understanding what it sees, and it is learning about you.

Speaker 2:

And this is this is on your computer now. If you're on a Windows computer, this is on your computer now, and it is learning about you. And they will say, okay. Well, you know, that's only gonna stay on your computer. Don't worry about it.

Speaker 2:

You know, I I don't believe that for one thing. But, you know, secondly, you know, maybe they don't need everything on your computer. Maybe they just need the AI's analysis of what of you. Maybe that's all they need. But I I think they want everything.

Speaker 2:

But the third thing is that is a very that is everything. They have all just tons of data about you. And you know, that is if if the government gets that, big tech gets that, or or let's say hackers get that, that is really you know, the the we talked about it earlier. You know, they want your information, and they're gonna use their your information against you. And so the amount of information that they're getting about us now is really exponentially increasing.

Speaker 2:

So it's not just watching what you're searching for on Google or anything like that. You know, there's this new device. I don't know if you heard Johnny Ivy Ivy, I think, is how you say it. The the guy at Apple. He just sold his business.

Speaker 2:

He's not with Apple anymore. He's got his own business, and it's this AI device that sits in your in your pocket, and it is fully aware of everything around you. And so he just sold that to OpenAI for $6,500,000,000. And so this again is AI that is watching you, watching everything around you, learning everything about you, understanding you, and then that can be used against you. So it is really their ability to spy on us is really like I said, exponentially growing.

Speaker 2:

Now that being said, there are ways that you can you can protect yourself. I I think it's time for everybody to get off of Windows and Apple. I think it's time to get on to Linux computers. Linux has been Linux is a open source operating system for computers. It's been around for decades.

Speaker 2:

It's awesome. And now there are different versions of Linux. I would say just very recently, there are versions of Linux that make it really very usable for people. Because Linux used to be only for computer geeks. It it used to be very difficult to use.

Speaker 2:

But now I would put it on par with Apple. I mean, it it at least some of the distributions. There's a lot of different versions of Linux, but there are some versions of Linux that are very usable now. So that'd be one step. I I don't think that's the first step, but I think if you can have a goal of maybe sometime this year of getting off of Windows and Apple and maybe onto a Linux computer, I think that's a good goal to have.

Speaker 2:

And, you know, then there's other things. And so what we do at Privacy Chem is we just take we just break it down into bite sized pieces. And so, you know, okay, now do this. Don't think about anything else because you're gonna get overwhelmed if you do. Just think about that.

Speaker 2:

Just do this. And then just do this, and then just do this. And then so we take people through a planned way forward. And we we tell people to be methodical about it, but but you have to move forward with it. And and just take the steps to get yourself private and secure.

Speaker 2:

And it is possible to do, but you just have to take the steps to do it in in the proper way so that you don't get overwhelmed.

Speaker 1:

Yeah. So, pull up this website again real quick, with, you know, Johnny and, I think it's Johnny Ive, or maybe it's I I I I think I think maybe Johnny Ive,

Speaker 2:

but I don't know.

Speaker 1:

You know, Sam Altman and, you know, Johnny Ive. Here's this this, New Yorker. Sam Altman and Johnny Ive will force AI into your life. It says the founder of OpenAI and the designer behind the iPhone are teaming up on a gadget they promise will ship out faster than any company ever has. What could go wrong?

Speaker 1:

And and this is the thing is that because I I know you've been doing privacy for quite some time, and I imagine you're doing it before AI was as prominent as it is now. But this is what this is what really concerns me of all of this. Obviously, before, you know, going back to, say, the Patriot Act or any of these other things, I think, were really a breach of our own privacy and monitoring to protect us. That was one thing. That's one thing to have a large NSA data center with experts analyzing and and making decisions and whatnot.

Speaker 1:

It's another thing to be feeding all of this data and information into an AI system. Because, like, I use AI pretty often for research or, you know, it's it's it's a great way to augment our our abilities. Right? Now, I'm very careful with it and and everything, but it is it's a great tool to use. But if you look at how quickly it can do things and this is just like, I'm just using a, you know, kind of what's available to the public.

Speaker 1:

Right? Like, I'm not using a military grade AI or who knows what they've really built. Right? That's the thing too is that you certainly look into military technology. And I've always heard that whatever you see publicly is already, you know, twenty or thirty years behind what's actually being done privately.

Speaker 1:

So Yeah. You know, I mean, honestly, there could be there could be AI robots walking among us that we don't even know are robots. Like, that to me, like, it's it's very, very likely. Or clones. You know what mean?

Speaker 1:

Like, I I I'm one of those guys that believe that these technologies do exist. And this is what what concerns me, though, is is, like, the role that AI is now playing in all of this, and all this information and data feeding into these central systems. And I'm convinced that one of the reasons that Elon Musk acquired Twitter was just so that he could build AI models off of it. Because Twitter, I I would argue, is one of the greatest data collection tools that's ever existed, especially if you're trying to collect data on psychological trends or trending topics or, human emotion and reaction. It's not just data in terms of the Library of Congress type data.

Speaker 1:

It's data of the human mind.

Speaker 2:

Yeah. Learning about people. In terms of learning AI on people and learning people. I've got a story about that, actually.

Speaker 1:

I love stories.

Speaker 2:

All right. So, do Privacy Academy with my son, Eric, and he's wonderful. He's a truly valuable part of our team. But he was, I would say, four four ish years ago, maybe four and a half years ago, he was about 20, and he was going through some hard times as many kids do that age, you know? And he was working as a as a line a line cook in a restaurant and he was having a a particularly bad day that day and so he was angry and, you know, upset, and he was he listened to he had headphones on and listened to the same song over and over all day.

Speaker 2:

Right? And so then he gets off of work and he goes home and he's flipping through TikTok. And TikTok, there's this meme that comes up. Now this is before ChatGPT came out. This is before anyone had any idea of how powerful AI was.

Speaker 2:

And there was this this meme that came up in his thread that was a like an angry cartoon drawing of a of a line cook. Right? And the the saying said, when you're a line cook and you're angry and depressed and you listen to rotten apples twenty four hours a day, which is the song he was listened to all day on repeat, and you wanna kill yourself. That's what it said. And he was so freaked out by that.

Speaker 2:

He shut off Twitter, and he actually got off of Twitter because he's like, what the heck did that? There's no way. That's just a meme that's out there. That was made specifically for me.

Speaker 1:

And So wait. Sorry. Make sure I'm following along. So he was he's a lion cook. I used to be a lion cook right back in high school.

Speaker 1:

Yep. He's you know, I I was a a a a moody 18, 20 year old too. I I've been there, done that. So he was a lion cook. He was really angry, upset.

Speaker 1:

I've I've also done the same thing. I've listened to the same song for hours and hours and hours. Right? Especially if it reinforces your feelings. It's like, okay.

Speaker 1:

Yeah. Yeah. So he was listening to the song what was it called? Rotten Apples?

Speaker 2:

Rotten Apples.

Speaker 1:

Okay. So he listened

Speaker 2:

to the same song over

Speaker 1:

and over and over again. And that night, he's on social media, and he sees a meme that says has a picture of a lion cook that says, when you're a lion cook, and you're angry, and you listen to rotten apples for twenty four hours a day, and you wanna kill yourself. Like, that's the meme that showed up in his feed? Like, that there's no way that was a coincidence.

Speaker 2:

And no. It it isn't. And when I started talking about this, people had a hard time thinking that, okay. Could AI actually come up with something like that? Could they actually draw a cartoon?

Speaker 2:

Could they actually come up with a meme and actually understand what what, you know, the context of everything and now that we see ChatGPT, we can see that's that's child's play, right? That's that's easy but here here's what I think happened is, you know, TikTok is owned by China. China, Chinese, Chinese companies have to have to do what the Chinese government says. President Xi got together and and told the president of TikTok, I want you to destabilize the teens in America and so, the then, the president of TikTok goes to the AI programmers and then, they they say, they tell the AI, okay, Destabilize the kids. And so I look at it as kinda like Google Maps where we all start from a different location.

Speaker 2:

We wanna go to this location. Right? With AI, they are doing that in the emotional realm. So the AI understands the emotions that he was feeling at the time, and they they they know how to take him down to that that place where it's destabilized. And I think that's happening en masse, and you can see the effect of this.

Speaker 2:

And it's not just TikTok. It's also Snapchat. It's also all of these things are doing the same thing. But I think it's it is for a purpose. And, you know, I I will take this a step further.

Speaker 2:

I think the AI learned from that because this is the thing with AI. It's self learning. So I think AI learned from that, and they it learned, okay. I made it too obvious. So now I've gotta make it more subtle.

Speaker 2:

This is why, you know, another part of this is sixty minutes about a year ago did a some a segment about TikTok. And they said, there's there's a spinach version of TikTok, which is what they get in China, and then there's the opium version of TikTok in America. And so the Chinese version, the kids get, this is how you exercise. This is how you study for school. This is how you, you know, value Chinese traditions, all of that stuff.

Speaker 2:

And then what do we get in America? You get drugs, depravity, despair, radicalization, all of that stuff, and it brings people down this rabbit hole. And each person is brought down their own individual rabbit hole down this. That's the power of AI, and that's how they are using AI to manipulate people. And so I think that's kind of a real real world vision of how they're using it now.

Speaker 2:

And I think there's it's hard to prove that they're doing that, but I think there's observational proof that this is actually what they're doing right now.

Speaker 1:

Well, what's really crazy is, you know, they oftentimes they'll show us what they're doing in television and movies, and it's this predictive programming. So in that that series, Person of Interest, without, you know, giving too many spoilers, there was a scene. And this was probably This particular episode might have come out, maybe eight years ago or something. I mean, it was It was early on. I mean, I guess in the grand scheme of things, it wasn't that long ago, but still.

Speaker 1:

And what happened in this particular episode is that the AI there's this malicious AI that had gained access to this search engine. Like, was kind of a Google type search engine. And they saw this spike in suicides, and they found out that what the AI was doing was serving up search results for people that they that the AI knew were suicidal that would actually drive them towards suicide. So the AI like, so and this was in the TV show. Like, the AI was literally causing a spike in suicides through manipulating search algorithms.

Speaker 2:

And that's what I think that's very real. I think that's exactly what happened with this.

Speaker 1:

This is crazy. And so getting into I mean, obviously, there's there's a lot of, you know, deep and dark places we can continue going. And I think that for especially the audience that watches this show, I've been, you know, covering central bank digital currency and digital ID for quite some time and the threat of this. But what are the like, let's talk about some of the earlier solutions, some of the easier things. Because, you know, one thing for me, for instance, you know, my my business is built on technology.

Speaker 1:

And we've got very, you know, a very, very kind of robust system. And, even looking at the the computer program that I use so I have a PC that I run a lot of our video software, our our our live editing software off of. And there's really a there's a very comprehensive program that we use, for, you know, live video production and everything that's really built only for PC. So it'd difficult there's a lot of things that would be difficult to kind of fully extricate myself from with with the with the business. But I think one of the biggest hurdles that I think is just people that say, Well, gosh, like, I I have this nice MacBook I just bought two years ago or a year ago.

Speaker 1:

Everything is fully integrated, and the idea of switching to some Linux based system, it's like, okay, well, none of the apps are gonna work. Or the idea of not using one of the, say, Apple or Android phones is also it's it's difficult for people. It seems like it's such a big change. But are there are there some are there ways that are easier to kinda incrementally pour ourselves out of this?

Speaker 2:

Yeah. So first of all, let me say that I don't think it's gonna be as big of I don't think it's gonna be as big of a change as you think. So my phone, I use a a de Googled version of Android, and that's excellent. And then Linux is actually excellent. It's got a lot of great programs, and they're typically usually free, which is nice.

Speaker 2:

But, you know, for your example there with with that type of thing and and we can also look at other people that say, okay. Well, I've gotta do stuff on Google Docs. My business does things with Google Docs or Gmail. So what I would do then is you wanna compartmentalize. So with your stuff there, that's fine if you're using it for that stuff, but then I would only use it for that.

Speaker 2:

I would not do anything else. I wouldn't do any of your personal stuff on there, whatever. That's when it where I would do a a Linux based thing, and I think that's how you compartmentalize. If people have to do, let's say, Gmail or something like that, I think it'd be good to compartmentalize on let's say you've got your own personal business, then you can compartmentalize within the same computer. So you can have different browsers that are dedicated.

Speaker 2:

So if you use a Brave browser for, let's say, for your personal searches and personal everything that you do. But then if you still have to get on to Google and Facebook, whatever, okay, use a different browser for that. So you're compartmentalizing it there. So you might want to use LibriWolf or Movab browser or something like that over there. I I think that would there's just some strategies like that that I think would be good.

Speaker 2:

But, you know, what you mentioned with, it might be hard to get off of Apple, whatever. That's one of the things that Apple has this walled garden where if you're using Apple, you're using iCloud, you're using iPhotos, you're using Apple Pay, you're using all of these things. They make it hard intentionally for you to leave. And so one of the things that we try to encourage is don't get when you set yourself up on Linux and the Google phone and all of that stuff, don't don't have everything in one thing. So your password manager should be this, which isn't attached to anything else.

Speaker 2:

It's so we recommend Bitwarden as the password manager. But Bitwarden doesn't do anything else. So you're not married to Bitwarden. You're not it's not hard to leave that if you need to. Anyway, I I hope I hope that makes sense.

Speaker 2:

Kinda

Speaker 1:

No. It is very helpful. Now what about because, obviously, you you mentioned before the the three different threats. Right? And one of those of being cybersecurity, hackers, etcetera.

Speaker 1:

So, obviously, you know, we've we've talked enough, I think, to kinda paint the picture of the big brother, the surveillance state, how it feeds into AI, and the dystopian worries that arise when you put all those things together. But there's also the more immediate of, oh my goodness. My online identity was stolen. I'm I saw something recently where someone was, the phishing, the phishing activities have gotten so much more advanced, where now it's you might get someone that messages you on Twitter, and they say, oh, I'm I'm a Forbes reporter, and I love what you're doing. I wanna interview you.

Speaker 1:

Here's a a Google Calendar link. But this guy realized that the calendar was spelled with an with an I instead of an l, and there are these subtle things. And even I've caught, like, I'm very, I'd like to say I'm I'm I'm pretty good at avoiding those things. Like, whenever I see an email that says, hey, you have a receipt? I don't open the PDF.

Speaker 1:

They say, hey, here's a link. I look at the link. I look at the the sender. It's like, oh, it's not chase.com. It's, you know, chase.something.com.

Speaker 1:

Right? There's there's all these ways that they can mask. But Yeah. Let let's talk a little bit now about what are the what are the more immediate threats that you're seeing with hacking and cybersecurity? Gold has surged 46% in less than a year, doubling the gains of the Nasdaq and the S and P five hundred.

Speaker 1:

But this isn't just another rally. Global reserves are shifting, exposing cracks in the monetary system. Investors are losing confidence in paper gold and demanding physical metal, creating a massive gap between gold owed and gold available. But this isn't about how institutions broke another system. System.

Speaker 1:

It's about how you can profit from it. Right now, Noble Gold Investments has a limited supply of investment grade gold bars and coins available. As banks scramble to fulfill their obligations, pushing gold prices higher, you can profit. Smart investors are already moving into physical gold. Noble Gold Investments makes it easy for you to do the same.

Speaker 1:

And right now, when you make a qualified investment, Noble Gold will add a free tenth ounce gold coin to your order. Don't wait until it's too late. Visit goldwithseth.com or call (626) 654-1906 now and turn their panic into your profit. Again, that's goldwithseth.com or (626) 654-1906. You'll find that information in the description for the show as well.

Speaker 2:

Yeah. So, you know, so we talk about privacy and security, and they're actually two different things, but they're very closely related. And I think security is actually one of the most important things to do right away because hackers and scammers is a very real threat. We do talk about how to use how to do passwords the right way. And I know a lot of people when I mentioned password managers, they're gonna cringe and say, I I don't trust a password manager.

Speaker 2:

But then you look at those you know, maybe they're doing maybe they're using the browser to save their passwords, or maybe they're saving passwords on an Excel spreadsheet on their computer, which is a terrible, terrible way to do it. There's there's only so many different ways that you can manage passwords. And even even writing them down has has some significant problems to it. So the best way to do it is a password manager. But then once you have a password manager, you want to also have a two factor authentication.

Speaker 2:

And two factor authentication is very important. So you can use I don't have it. Do I have it here? So this is a this is a passkey. So this is a nitro key.

Speaker 2:

So you can that's a a method of two factor authentication that you can use. That is a physical device. And I have to have this actually plugged into my computer. That's one way to do it. There's there's some apps that you can get on your phone.

Speaker 2:

But I would say the security side of things is very, very important. And I I we emphasize this really strongly to our people, to our audiences. You know, you have to get secure. That's that's one of the most important things that you have to do.

Speaker 1:

And what happens if if your data is breached? Or what happens if someone, say, gets access to one of your main emails that you may be using to log into your bank accounts, your social media? What what are some of the worst case scenarios of what you've seen happen to people that do end up getting hacked?

Speaker 2:

Yeah. Okay. So there's there's different there's all kinds of different dimensions to this. So there's scammers and there's hackers, and a lot of times they work together. But there's also scams and then there's identity theft.

Speaker 2:

Identity theft is different. So identity theft is when you are not involved in the process at all. So let's say they get your social security number and maybe an illegal alien gets a job. They use your social security number to get that job. The the business submits your income to the IRS and then, you are on the line, you're on the hook to pay that and there is a gentleman there there I I was just actually doing a class about this the other day.

Speaker 2:

There's this gentleman, Tony Chilikas, who had a a a story done on about him, has 17 people using his Social Security number, you know, giving their, giving the stuff to the IRS. The IRS does not care. They know that it is that that is identity theft. They know that it is not him. They don't care.

Speaker 2:

They're just saying, give us our money. Here's your fine. Give us our money. Give here's your fine. And he he he just like, I don't know what to do.

Speaker 2:

I can't. I don't know what to do. So, that's identity theft. Now scams are different. Scams are where you're actively playing a part, and there are all kinds of different ones there too.

Speaker 2:

But one of the really big ones is what they call a pig butchering scam, And that's where you meet somebody. So you might get like text messages and it's like somebody texting you saying, hey, how's did you catch the game the other day? And then you text back and say, well, I think you have the wrong number, but then they start a conversation with you. And or they or you meet them on a dating site or social media or something like that. And what the the pig butchering scam means is they're fattening up the pig before the slaughter.

Speaker 2:

And so what they're doing is you're the pig and they're fattening you up by earning your trust. And so if they can earn your trust by becoming friends with you or even getting to the point where you fall in love with them, then they've got you. And then you can they they can get all kinds of stuff. And actually, you know, Andrew Tate used to do this. Andrew Tate was he would brag about this.

Speaker 2:

He'd go on podcast and he'd brag about how he's stealing money from, you know, these old lonely guys in America. Like, he'd get he'd make millions of dollars a week on this on this type of scam. And he just would brag about it, you know? And there's all kinds of people that are doing that type of thing and I've talked to people that have, there was one guy I talked to, said I I lost $300.00 and he said, I don't have $300.00. I had to mortgage my house to do this.

Speaker 2:

And now, know, I can't face my wife. I'm so ashamed. And I can't face my family. I'm so ashamed at this. And I think the shame is is the biggest one of the biggest parts of of those scams when you fall for it.

Speaker 2:

But they're good. They're really good at what they do. So I encourage people not to be shamed about that stuff.

Speaker 1:

Incredible. There's actually I'm actually looking for it right now, actually. There was, Let's see if I can find it on a plate for you. Oh, yeah. Here we go.

Speaker 1:

So, there was a guy So what's interesting is that what I'm seeing is a lot of scams of people impersonating, influencers. This is really, really common. So I've got a Telegram group. And what you know, one thing that it was common a couple years ago was that people would I'd get these people messaging me, and they'd they'd comment in the the Telegram group and say, hey, Seth. Did you message me privately and talk about some sort of, like, investment or something?

Speaker 1:

I'd say, no. Right? There's tons of people that they would use my profile. They'd have my name, and they'd they'd message people. And they'd say, hey, fellow patriot.

Speaker 1:

Thank you for being part of my channel. Have you heard about Nisara Jisara, whatever? And it's like, okay. Those are easier. So I'm gonna play something for you.

Speaker 1:

I had somebody that emailed me. They had someone that scanned them, but then used AI to generate my voice talking to them. Right? So the I'll play this. This this is absolutely insane.

Speaker 1:

So listen to this. This is this is the actual file that the scammers sent this person they're trying to scam by using my trust that I've built with the audience. So listen to this real quick. I'll play just a few, you know, twenty seconds of it. No need for the the apologies, Oliver.

Speaker 1:

Remember the first interview I had with Jonathan Otto. If you tuned in the latest episode, you'll know who I'm referring to. So he, as well, was a skeptic. But after a series of So that's not me. Was someone using AI to mimic my voice to convince somebody that this, say, this guy that they're following, that they think, oh, he's this popular podcaster.

Speaker 1:

Wow, he's sending me a voice note? Of course, I'm gonna follow what he does. And actually, I saw let me see if I can find it again, actually. I saw even, Patrick Bet David. I'm I'm sure you're familiar with him.

Speaker 1:

Let me see if I pull it up real quick as, as we're looking. So what happened with him is that people were using Oh, let's see if I can find it. Maybe I can't. People So, AI So, on Meta, people had used AI to generate a real looking video of him. It looked like he was just doing a selfie walking around a parking lot.

Speaker 1:

And he was like, Hey, this is Patrick McDavid. You know, we're launching our new investment group, the PBD investment group, and do this. And it was a video of him, looked like he was doing a selfie walking through a parking lot, and talking about some real estate investment, but actually, the whole thing was fake, and they were using it. And I've see also seen the same thing with Elon Musk, that when Elon Musk was was doing you know, first kind of becoming you know, gaining prominence with, like, the kind of the conservative movement, that there were even channels on YouTube that were holding these entire fake Elon Musk presentations of an AI generated Elon Musk up on stage talking about these new opportunities for these, digital coins. They're using it to scam people.

Speaker 1:

Like, it it's gotten absolutely insane how, like, the the the the detail they've gone into.

Speaker 2:

Yeah. That is that is frightening, and and these deepfakes are very good. And like you're saying, the video and the voice and the and the and the speaking patterns, all of that stuff. And and really, I think that's something that we have to understand about hackers and scammers. Now they if if we look back, let's say, you know, even five years ago, the constraint that they had to do these pig butchering scams and that type of thing was they needed a real person to be on the other side of that conversation.

Speaker 2:

So, they had to have bodies there but now, they can ramp it up and have just AI talking to people and you can't tell us any different and you can and and so their ability to scam people is going to be also exponential because because of this technology this technology that they have available to them.

Speaker 1:

Actually, I, You know, I found so I'll play real quick. This is this is it. This is, this is an AI generated video of Patrick Beck David that was that that actually Meta wasn't pulling down even. He he was calling them out saying, please pull this down. It says it me.

Speaker 1:

Watch this. This is this is a fake AI video to scam people.

Speaker 3:

Next ninety days, we'll make millionaires in 2025. These are the top three stocks to buy in a turbulent market. I guarantee that some of them will surprise you. You don't need to rush to act or buy immediately. You can join my group to see my real investment cases.

Speaker 3:

For example, the Palantir stock I shared in the group before has risen by more than 300% in half a year. I don't charge any fees, and if my advice doesn't meet your expectations, you can withdraw at any time.

Speaker 1:

So that right there was an entirely AI generated video meant to scam people. Yeah. It's wild. It's crazy.

Speaker 2:

Yeah. And it's also it's also businesses that have to be careful of this too because there was a a bank in Hong Kong that got scammed out of $23,000,000 because the account executive that was working with a large company, the the large company called them up and said, and it was the president of the company, called them up on a Zoom call, and they had five other executives in on the call with them. So they had the voice, the voice the speaking patterns, the the video, all of that stuff. And they said, you know, we I know it's getting towards the end of your day today but we really need $23,000,000 transferred to this this place like like right now before the end of the day. Can you please do that?

Speaker 2:

And so, it was yeah. It's it's getting very difficult to protect yourself against that type of thing. And, again, I don't think we should black pill people, but there are some things that you can do to to mitigate these things.

Speaker 1:

And and that's and that's what's really important. Actually, I I you've got my ears kind of really alert because I'm thinking that there's I've got so many security loopholes, and my business lives online. So I wanna pull up your your website, Privacy Academy, because I also, I know that we've set up we're gonna have a free webinar that you're gonna be doing live live q and a. Well, I guess, walk us through, what this webinar is gonna introduce people to, what it's gonna teach them.

Speaker 2:

Yeah. So I think we're doing it on June 12, right, at, 11AM central.

Speaker 1:

Yes. So June 12. And yeah. 11AM central, twelve PM eastern, which I'll put all this information in the description, the link to register, etcetera. So, anyway, back to you, though.

Speaker 2:

Yeah. Yeah. So so when people join, what what I'm gonna do is I'm gonna go through an education class for an hour, and and we'll take you through the threats and really understanding the threats and then what you can do to, you know, some steps that you can take to get yourself prepared. I mean, there's only so much we can do in an hour, but I think we're gonna I'm gonna pack as much stuff into that hour as I can. Then at the end of the hour, we'll do a a q and a with people.

Speaker 2:

And so I mean, that's always people's favorite part too. So it it'll be fun, and I encourage people to to join us.

Speaker 1:

And so the webinar is really it's if I understand correctly, it is a just a a foundational, kind of 101. Right? Online privacy, how to protect yourself from big, big brother data surveillance, hackers, AI, like, kind of helping people just give them, like, the basic understanding of how to, just how to protect themselves against all of these these digital threats. Is that and then then follow-up with a with a live q and a as well.

Speaker 2:

Yeah. And and, you know, I think the the important thing is to understand the threat first. And so that's what we go through. And so you can invite other people to it. And I I think it's a really good way to introduce people to the problem and and to see the light, there's a light at the end of the tunnel.

Speaker 2:

There's a way out of this. There's there's things that we can do and it's also, I think, very important for understanding the the threat on the big picture like we what we talked about earlier where this is a very real threat to liberty itself. And so we need to wake as many people up as possible. And that's that's really my mission is I I want to wake people up to this threat. And and so that's what we that's what we do in the webinar.

Speaker 2:

So I encourage you to come and invite other people too.

Speaker 1:

And and the webinar is free. Right? There's no there's no cost. They just have to register. Right?

Speaker 1:

So we'll have a link in the description that where they can register, and there's no cost. Right?

Speaker 3:

Correct.

Speaker 1:

Yep. Great. Great. Well, Glenn, I appreciate what you're doing. I'm looking forward to the webinar.

Speaker 1:

I'll be there. So I'll be live with you. And so, you know, though you're gonna be one, obviously, that's me answering the q and a's, but I'll be participating. And so, yeah, I encourage I encourage everyone watching this to bookmark your calendar. If people want access to the webinar, say they're working, say the webinar's in in the middle of the day, If they register, can they get access to watch it after the webinar is finished?

Speaker 2:

Yep. Yep. Yeah. I mean, try to come live if you can because then you can actually participate in the q and a, all of that stuff. But we will have the replay out for a couple days after that.

Speaker 1:

Great. So that's June 12, and and at noon eastern, eleven central. We'll have all those details. We'll have the link to register the timing and all that stuff in the description for this show. And I I'm I'm looking forward to it.

Speaker 1:

So I hope that, you know, for for you that are watching, I hope you're there. Glenn, you're gonna be there, obviously. And, thank you for doing what you're doing, actually, because I again, I I'm just I'm I'm my mind is blown. Like, when I see these videos of Patrick Pack, David, or I get sent the the voice copy of me, I'm thinking, gosh, how are we gonna how can we protect people? It's one thing to say, look, don't respond to the letter you got in the mail from the Nigerian prince that, you know, wants the Western Union for $500.

Speaker 1:

They can send you $10,000,000 you inherited. Like, okay, we're past that, hopefully, but criminals are smart, and and they've gotten really good at scamming us.

Speaker 2:

Yeah. They have. And, you know, there are things that we can do, though, and that that's what, you know, my mission is, is to help people figure this out. I mean, there's a lot of freedom fighters out there. I love what you're doing.

Speaker 2:

Thank you for what you're doing. We just focus on a very particular part, which is the surveillance, anti surveillance, you know, liberty through privacy is what we focus on.

Speaker 1:

Very good. Well, Glenn, thanks again. Was great speaking with you, and I look forward to the webinar together.

Speaker 2:

Yep. Thank you, Seth.