The David Knight Show - Interview: AI & The IoT: A Digital House of Cards Ready to Collapse
Episode Date: February 20, 2026Cybersecurity veteran GoatTree warns that the Palantir hack, the Nancy Guthrie case, and even FBI search theatrics reveal a deeper truth: our hyper-connected AI infrastructure is riddled with backdoor...s, cloud vulnerabilities, and incompetence at the highest levels. From pacemakers and insulin pumps that can be hacked, to autonomous cars deciding who lives or dies, to drone swarms and IoT devices opening silent entry points, he argues we’re building a fragile house of cards and calling it progress. The solution isn’t more AI—it’s less blind trust in centralized systems that can be weaponized, manipulated, or simply fail at scale.Money should have intrinsic value AND transactional privacy: Go to https://davidknight.gold/ for great deals on physical gold/silver For 10% off Gerald Celente's prescient Trends Journal, go to https://trendsjournal.com/ and enter the code KNIGHT Find out more about the show and where you can watch it at TheDavidKnightShow.com If you would like to support the show and our family please consider subscribing monthly here: SubscribeStar https://www.subscribestar.com/the-david-knight-showOr you can send a donation throughMail: David Knight POB 994 Kodak, TN 37764Zelle: @DavidKnightShow@protonmail.comCash App at: $davidknightshowBTC to: bc1qkuec29hkuye4xse9unh7nptvu3y9qmv24vanh7Become a supporter of this podcast: https://www.spreaker.com/podcast/the-david-knight-show--2653468/support.
Transcript
Discussion (0)
All right, joining us now is a guess that we've had on many times.
We're very interesting and he knows a lot of interesting things.
I want to get him on to talk about what Kim.com was saying in terms of Palantir of all people being hacked.
This is something you see happening over and over again, whether it's the Pentagon or whether it's Palantir or whether it's the NSA.
These people that you think would have the sophistication and not have a problem or constantly getting hacked.
And so I want to talk to him about the increased vulnerability as we become more and more of an internet-connected,
AI-connected system.
But Goetree has something to say about this Nancy Guthrie kidnapping as well,
but goes back to something he was working on more than a decade ago.
Thank you for joining us, Goetree.
My pleasure, David.
It's always great to be back with you.
Yeah, yeah.
Tell us a little bit about your comments about.
this Nancy Guthrie thing. One of the first things I noticed about it was the fact that she had,
you know, they eventually showed this picture of the perp at her door. They said they,
she was not using their online storage system. She didn't pay for that. She was just using it for
real-time monitoring. And so they said at first, well, that only, we only store stuff if it's the
paid accounts and stuff like that. But then it turns out that they were storing it anyway.
That's why it showed up a few days later. But you have other things that you noticed in
Talk to us a little bit about that.
Well, to me, I hate to go off sounding like a conspiracy theorist.
Well, this is the right show for that.
Yeah.
Well, I know.
That's what I'm saying.
The scary part of that is when we turn into conspiracy theorists that comes true.
Yeah.
That's right.
But this thing is striking me as made for TV.
I mean, you turn the news on.
He's breathlessly hanging on to some special analyst giving his special analyst opinion.
And I'm looking at this, and this stuff that they're doing is so amateurish.
I don't know.
Both sides, the criminal and the FBI.
I'm saying, I mean, I can't watch it.
I mean, I'll throw stuff at the TV and start renting.
I just, I don't need to get my blood pressure up over this.
What's some of the amateur stuff that the FBI is doing?
Well, you know, it goes back then for war days.
I sent you that bill that we were doing for the alphabet soup.
Yeah.
And it was a, we called it war driving.
I don't know what sophisticated term they got right now.
But you go run through and you're picking up every.
device, every network,
every team that's being sent out.
And
these things, you could deploy them.
It was a car. I mean, if you want to show the
picture of it. Yeah, it was
an interceptor dodge. So it's one of these
souped up dodges that they give to the police
police intercept. It was a dodge. In
2015, they got
the first hellcats that came
We didn't even know what else that was at the time.
Yeah.
Oh, man, I love that car.
Anyhow.
I remember you said, you can have the Batmobile.
I want this thing.
That's right.
But it was a mobile, complete, it performed several,
six or seven different things at the time.
And one of them was sniffing for cell phones,
cell phone pings.
It was very versatile.
And what we had done is we had went through and actually built into the grill
an amplified sniffer, which, as they were saying with this helicopter,
okay, first off, you've got to start.
The pacemaker only has a range 50 feet.
if you amplify the signal or your sniffer,
we had it up to about a football field.
But we were on a time constraint
and weren't able to really advance it out further than that.
If they wanted to throw more money and gave us more time,
we probably could have expanded it exponentially.
And this was a decade ago,
and I've really not kept up that much with a Nancy Guthrie's story,
but you said they've got a helicopter that's out.
They're trying to find the pacemaker's signal, right?
Yeah, and this is what's blowing my mind,
this is just one of a dozen things that I'm like,
I'm asking, what are they doing?
They are buzzing these houses at apparently 50 feet or less,
since that's as far as the pacemaker will reach out.
And they're searching for that signal.
I'm sitting there, you know, thinking, what are they doing?
I mean, can you imagine the rhoda wash that's hitting the houses and the yards?
Yeah, probably got a lot of small dogs that have gone missing, man.
Yeah, garden gnomes, pink flamingos, raining down in Mexico someplace.
I don't know.
I'm looking at here's this guy sitting in the door of the helicopter with a box.
I'm like, what are they doing?
I mean, they're probably roof shingles, roof tiles, everything else being ripped off these houses, not to mention the vibration.
Lance says, you know, why does a pacemaker need to announce this location in the first place?
And, of course, going back to one of the things we talked about over a decade ago,
these black hack conferences and defcon conferences that have a regular basis in Vegas.
And there was a friend of yours who was showing how they could be hacked.
That was one of the first devices that he's looking at,
how you could kill somebody by hacking into these devices.
And what happened to him?
Barnaby.
Barnaby had a, man, this is one of the first.
I'll say it.
People can argue with me.
I knew him personally.
He was assassinated the night before he was going to the Black Cat Convention and show this.
And the way we clicked to work is we did not show this for malicious intent.
We showed the vulnerability so that people could correct it.
Right, right.
If we showed them how simple it was to hack in the pacemakers, insulin pumps, all this, it's on them.
It is their responsibility to patch this so that they're secure.
And they will not do it unless they're drug out into the public.
Yeah, that's right.
That's right.
That night before Barnaby was supposed to give his demonstration, he died of heroin.
a heroin overdose in the hotel.
That would be like someone saying,
David died of a heroin overdose.
Barney didn't do that kind of stuff.
Yeah.
Yeah.
So that was a big one.
And apparently, I mean, I hate to say it because it really,
it hurts me to say this.
but after that, I dropped it.
But I have my doubts that they have patched any of this.
And I don't want to scare people.
Right.
But.
Well, we know that they tolerate a lot of this.
Yeah.
We know they tolerate a lot of this.
I mean, just take a look at it wasn't that long ago that they had the power issue
and look at in San Francisco or whatever.
Look what happened to Waymo, right?
All of the self-driving cars lost it.
they blocked everything. And that goes back to a novel that was written back in 2011,
Robopocalypse. And it posited how, in that story, the villain was a rogue AI that brought all this
stuff on. But what it was showing was a vulnerability of society once it becomes an internet
of things and an internet of people. You have all these, and that's what's really happening.
I think what's happening with our military. I mean, they are pushing in a really hard
way to try to get everything online and interconnected, which means that it's just a lot more
vulnerable, isn't it?
This is a prime example, David, of the incompetence of both the criminal.
The criminal must have like a sixth grade understanding of technology.
And then the FBI, with all these toys that have been built and given to them, and they
don't know how to use it.
I'm just picturing, I'm just picturing cash with those.
expression if you try to explain some of this stuff.
I'm sure he'd be, I don't know, bug-eyed.
He can call me if he wants to see.
I'll be happy to talk to him.
He's bug-eyed about everything.
Yeah, get your checkbook out, Cash.
We can fix some stuff.
Yeah, that's amazing.
Well, you know, when we look at this,
one of the things that Kim.com said was,
and you've talked about this many times, the back doors,
You know, you look at the technological side of this, the really dangerous thing is that there's backdoors in everything.
And they demand to have it there.
That's correct.
They demand to have it there for the developers.
They demand to have it there for, let's say, the CEOs or whatever.
And once you've got those backdoors, you get into everything.
That's one of the things that Kim.com said in terms of what was revealed with his hack into Palantir.
He said, I'll quote his tweet here that he put out.
He said, they have backdored devices, cars.
jets of world leaders.
They've accumulated the biggest archive
of blackmail material anybody's got.
So basically what he's saying is
Palantir is the new Jeffrey Epstein.
Yeah.
And you know, remember
colonial pipeline?
Oh, yeah.
That fell off, that fell off the map in a hurry.
Because, oh, no, the CEO did it.
It wasn't no big
technology spoof or CFO.
I better be careful here.
One of the insiders did it. I don't know.
Yeah, yeah.
But back doors, back doors and all that.
Then the railroad hacks, you know, it's like back doors.
And there's one reason I left, I finally said enough.
You cannot help the people it's unwilling to help themselves.
Because they will say we've patched it, but nothing's been patched.
You give them top shelf.
Well, they may patch it.
That's like saying the wind is broken.
and you take a hammer and knock more out and then put a piece of plywood over it.
You know, it's like, what?
I remember you're talking about the banking industry, the ATMs and stuff like that,
you know, finding the vulnerabilities in that and you tell the companies,
and they don't want to go out and fix it.
No, I laid the whole thing out where they had tears,
where if you stole over a million dollars in cash, it was cost of operations,
raise rates on your users.
Yeah, we'll just spread it out.
Yeah, and then after you got to a certain level,
which back in the old days, about $5 million,
I mean, it was like the Bangladeshis did.
They went in there and they stole like, I don't know, $100 million.
They had ever read a team in town and every cyberdog they could find turned loose on them.
They got them like it within a week.
which, you know, that was back in the days when people were taking care of business.
There's stuff going on right now.
I'm like, man, what has happened?
But I think this whole thing's orchestrated.
It's like built for the 24-7 news cycle, and you have all these specialists that aren't very special.
Yeah, I look at this, and when I look at this full-speed,
head, let's incorporate AI into everything in the Pentagon.
They've convinced themselves there in an AI race with the Chinese and they've got to get
their first.
Doesn't matter if this stuff works or not.
It doesn't matter if we can control it once we let it loose.
That's the key to it all.
Well, all this technology that we've built and handed to these people, they don't know what
to do it.
They're going to plug it into AI.
Make it simple.
let's keep it, you know, the kiss method.
Keep it simple, David.
We can put a trained orangutangang on it.
Sure, it worked great.
Yeah, it's going to be, you know, when you look at the fact that they are constantly
getting hacked, as I said before, you know, you've had the NSA get hacked.
The CIA is on Vault 7 tools, the tools that they used to hack other people and disguise their
identity.
That got stolen from them.
So it's this spy versus spy countermeasures and counter-countermeasures.
and counter-countermeasures that keep going and going.
And yet in spite of that and the vulnerabilities that all this heavy automation
introduces into every system, they're escalating this at a very rapid rate.
And I think much, much faster than they can actually keep track of it or test it.
Exactly.
And the thing is, if you're not competent enough in person or have a person that can manage it,
you plug it into a mainframe, which is what they'll be running.
Who's going to be running the AI?
The same idiot that can't manage what he's already got?
What do you think about these AI agents?
Because occasionally we get stories when things go really, really wrong.
Like it deletes an entire company's database and says, oh, I just deleted database.
I'm sorry about that.
I know you told me not to do that.
But I did it anyway.
And you can't get it back.
We've actually covered stories like that.
What do you think about this and this race to put AI agents out and give them control over real-world assets?
What do you think?
Well, once again, this is one reason.
I finally just threw the towel in on information security and pen testing and the whole thing.
You've got to go back once again through history, which we've been screaming about for 30 or 40 years.
everything's on the cloud.
What is the cloud?
Well, it's a new term, but it's an old, what we used to call FTP server.
File transfer protocol.
Well, that's in so old school.
Let's name it the cloud.
It's setting on someone else's server.
Someone else is managing it.
You simply use it.
And now you're going to turn AI loose on it.
It's like the fox in the hen house.
All the chickens in the hen house, they've got a real problem.
And what the fox eats is what the fox wants to eat.
Yeah.
Yeah.
And, of course, the Pentagon, I remember when they were talking about the contract,
there's this big competition between Amazon and Microsoft as who was going to provide the Jedi system.
And that was basically putting all the Pentagon stuff on the cloud.
It's like, why would anybody do that?
It gives everybody in the world essentially an opportunity to take a,
have their shot at cracking it, right?
Once you do that.
Yeah.
One stop shopping.
You know, if you know who's owned the cloud, pick the account and start cracking.
Yeah, that's right.
Right.
But, you know, if you put the AI in control.
You give them physical access and then they just need to figure out how to get past the electronic
obstacles under there.
But, you know, they've basically gotten them a great deal the way there.
I mean, if you really wanted to keep something.
that was vitally important and secure, I would think you would remove it off of the ability
for people to be able to even get to it unless they went into some facility, that physically got
into some facility, then they would have to still go through the process of breaking in through
the electronic stuff. But they don't take those kind of precautions, not even with the
stuff that is at the very essence of what these agencies are doing.
You know, I have had calls at 3 in the morning where a hack was in process.
They're downloading a company server.
And my suggestion to them was, kill the power.
Duh.
You can't do that to these clouds.
Yeah, that's right.
You know, I hate to keep going back.
I didn't intend to do this.
But I keep going back to the past.
tech, we got it right the first time.
They keep tinkering with it and don't know how to use it.
They've over-perfected things to the point where it's unusable.
Yeah.
I'm going to tell you this.
Cory Doctor-Roe.
Corey Doctor-Roe, the science fiction writer's got a term for that.
He calls it inshittification.
Sounds good to me.
Yeah, it looks like what we're seeing all the time, doesn't it?
You know, when I came out of compact in 1986,
this is my first expedition into the military.
They wanted to secure the nuclear ballistic missiles.
I'll tell you how we did it and they were never hacked.
The computer system was totally offline.
There was no way to reach it from the outside.
And, you know, you see the movies.
the codes were on five-inch floppy disk.
That was what was in the safe.
If the signals came through, they had a series of releases.
Finally, they would get around to cracking open the safe with the floppy.
The floppies were updated every day.
They were delivered with the mail, I guess.
So then if you got to a certain level,
the operators would put the floppies into the PC and the countdown and start.
Once you got to that zero, you would turn a key like your car key, and then you could push the button.
And all hell would break loose.
They were never hacked, but people don't understand that allowing outside access, your material is your own doings.
you cannot help the stupid.
And that's the key.
Like you and I say,
in terms of putting stuff on the cloud,
we see this happening over and over again.
How did they break into the NSA?
How did they steal the CIA's tools?
How did they get into the Pentagon files?
And it's because they allow people to have access to the database.
And then it becomes a much, much, much simpler problem.
Still, there's some things that you have to get past.
But if you don't keep that offline,
then if it's online, then they've got an opportunity.
Well, I would probably, I've not kept up with Palantir.
I've been off on some other stuff.
But I'm going to venture a guess that either the government or Palantir,
probably since Trump's been doing away with a lot of government employees,
probably have a government employee that was assigned
Palantir or vice versa that was terminated and human resources for whatever reason dropped the ball
and did not take their credentials to that cloud back.
Well, on open market, something like that's very valuable.
If you're unemployed and you've got the opportunity to sell something as simple as your credentials,
boom, done.
Yeah, that's right.
Now, they're probably going to try to invoke something like, oh, it was so complicated you can't understand it.
Well, fine, whatever.
Look at what they're doing to this.
That's three page.
They're displaying.
They don't have very much skills.
But this is how the real world works in cybersecurity.
And stuff that is going on.
They were talking about her ransom in Bitcoin.
I'm like, this guy don't know what he's doing.
Don't you understand that Bitcoin's recorded forever on the blockchain?
That's right.
Yeah.
So I have to go back to John McAfee.
Remember you interviewed him and he was talking about the Monaro coin?
That's right.
That's right.
Yeah.
And now there's a couple of them.
There's also Zano.
Yeah.
That's been around for a long time.
Now they've got several others that are out there.
And it has never been breached.
Mm-hmm.
It's never been breached.
When that goes into the system, it's gone, and there's no way to tracing it.
So that tells me that the dude that don't know how to cover himself in the camera, you know,
and in the camera doesn't understand what he's doing.
Secondly, if I was going to take a ring camera or whatever, pop it out of there,
I'm going to use some real serious low tech, and it's called the Hill of
the boot and crush it.
That's right. Yeah, you know, when you look at this stuff, it's like Bitcoin, for example,
which you said, you know, it's going to be traceable. And that's why I look at this and,
you know, we've had situations where people have had their accounts hacked. One of them was a guy
who was a billionaire and it was nearly a million dollars and, you know, people are saying
there, they're watching these transactions, these large transactions they call from Wales, right? And so,
some guys watching these transactions go by, and he sees nearly a million dollars go through there,
and he goes, hmm, who is that?
And he's able to track the guy down.
There's quite a few.
Yeah, he tracks a guy down, and he calls him up.
There's quite a few that are a billion.
Yeah.
Yeah.
I think it's millions and billions of dollars.
But he found out who this guy was, Goetree.
He finds out he not only sees a transaction there, but he's able to trace that down and figure out who it is
and sends him a text or an email and says,
uh,
did, you know, why, why are you doing this?
There's ask him something about it.
And the guy didn't know that he had been ripped off.
It was a stranger who saw the transaction,
tracked it down to him and,
and contact him.
So when I look at Bitcoin to me, you know,
we talk about putting these things out there where they're available.
It's almost like you have a safe with all your money in it.
And you decide that we're going to keep that safe is going to be on the town square.
that may be a very secure safe but it's at the town square
anybody's got a crack at it that wants to take it right
you've got a $10,000 safe and a $2 lock
that's right
but you know I've got to go back and I can explain some of this to you
I was working with ARPA on the Mimex project
Now, there's something that's going to be really scary when you plug it in the AI.
It's called MEX.
And they had a parallel, I'm trying to recall the code name for it.
They had a naval labs.
Man, my memory is what it used to be.
but they were running in 2014, 2015, they were running a simultaneous blockchain that mimicked Bitcoin.
So I don't know whatever happened to that project, but I did download some of the source data, which I don't know where it got off to.
But you could set up accounts that mimicked each other.
same number same everything but they're on a different blockchain and they would jump from
blockchain to blockchain so if someone got a hold of that i mean literally got a hold of that
and we're able to use that uh technology and convince someone to jump or not even even unknowingly
jump from the blockchain to that uh other blockchain you got them but you got to you got to
control level.
Wow.
And all these work off notes anyhow.
So if you build a clone node,
you can build these
wallets any way you want.
I mean, at one time I was running nodes.
I think I had like 300
Bitcoin wallets.
I don't know.
It's time I was just
experimenting and I just keep clicking
formal wallet.
Now, you know,
anyhow,
I lost a bunch of
Bitcoin doing that, you know, trying to transfer and all that.
But, yeah, and all this comes, everything we're talking about, you throw out of subject,
it all comes back to what it was done right the first time.
And you keep tweaking, keep, it just to the point where it's unworkable,
people are unable to use it.
That's right.
That's right.
Yeah, that's the sort of thing.
We see in engineering.
Usually there's a guy who's got a vision for this thing.
and, you know, you have a very small, you know, one or a couple of people who put together a system.
That's what I've seen.
And people say, oh, that's pretty good.
They buy it.
And then the corporation takes it in.
And then you get a team of people who didn't have anything to do with the development of it,
don't really know what's going on with it.
And they think it's ruined as they maintain it, quote unquote, or add features to it or this or that.
And that's kind of what's going to be happening with the AI stuff, I think.
They're using it for programming.
And I've seen from a lot of people to say,
well, because I didn't put this thing together,
it's really hard for me to maintain it.
I don't really understand what it did or why it did what it did.
And it's kind of opaque,
even though I've been in this for decades doing this.
Of course.
I mean, you could do anything on AI.
You can write books.
You can compose music.
You know, I hate to go way off into the weeds.
But one of my, I thought,
was the funniest thing I'd ever seen on YouTube.
there is a music video called That's One Ugly Baby.
I'd suggest you users like that to watch it.
It's AI.
And they took an old Motown song and modded it to where they're singing about ugly babies.
You know, I was like, man, this is just too crazy.
Yeah.
But with AI, you have got people don't understand.
what they're doing, using it.
And they're going to, once again, let's simplify, let's put everything on AI, let it control it.
It'll give us warning beeps if something's wrong.
No, it won't.
Yeah, as a matter of fact, you go back to Gaza and a lot of people are saying, well, I think
this is set up because this is in an area where the Israeli government had automated guard
towers and things like that, very high-tech, very sophisticated.
And you see things like that.
And everybody believes that because it's high-tech, sophisticated, expensive, that it's
going to be working correctly.
So therefore, they had to have had a false flag.
Now, that may have happened.
However, when you look at some of the things, you sent me a video of a guy that was,
what was it, that was eight years old.
And he was talking about how to become invisible to surveillance cameras.
And it was a really simple idea.
Really simple ideas.
Matter of fact, we got a...
Yeah, we got a...
Where is that clip?
Do you have...
Yeah, here it is right here.
I'm going to pull this up and show the audience here.
What he did was he, look at his head is just this glowing ball and you can't see anything.
And his insight was that since they put these cameras, these surveillance cameras around,
they want them to be somewhat hidden from view in terms of people understanding that they're being surveilled,
they will put a night vision on them.
And so he said, if you get something that has the same frequency that this is using in terms of light stuff,
that you could put that on your glasses and put out a very bright spectrum of light that it's only sensitive to,
but that people can't see.
It's not in the visible spectrum.
But it's going to basically create a massive lens flare for that night vision camera.
And it can't see who you are.
Yeah.
Well, you know, when we were pin testing, we would take these RF diodes that were tiny,
and we'd build a hat band out of them.
And then for the little old, I forget what size battery it was,
and we walked around there just in plain sight, and the cameras couldn't read us.
If we really wanted to get stealthy, we would either, well, I think we sewed them into,
like jackets and stuff.
Mm-hmm.
And you couldn't make heads or tails out of body-shape, face, anything.
It's just one big glowing orb.
That's right.
And we were hacking the, well, hacking ATM machines, and they were like, how are you doing this?
Well, we were doing it at their permission.
Right, right, yeah.
You know, pen testing, hey, your ATM is vulnerable.
But I walk through facilities, and they're like, oh, it's a ghost.
Well, that's the thing. You know, when you look at this, when it's being used for something like the defense industry or something like that, you know, you think that you've got some really sophisticated system. And yet it might have a very, very simple vulnerability like you were just talking about. And, you know, that's the thing I see happening with the rapid introduction of this technology. You know, it used to be back in the day when I was in engineering. That was a long time ago, about 40 years ago. I remember one of the reasons.
that I didn't want to get.
Of course, I didn't want to develop stuff for the military because of what the military was doing
with it.
But I had friends who got into that.
And they were complaining.
They said, the stuff we're using is so old.
We're not allowed to use anything unless it's been around and tested for years, unless they've
taken it to the North Pole, unless they've taken it to the desert and all the rest of this
stuff.
They've got to, you know, have this stuff.
It's got to be tested in all these different environments and have a very long history
behind it.
That's not really what's happening now.
They're rushing to get stuff out.
And I think that's creating a whole new class of vulnerability.
Yeah.
Well, yes.
It's like the technicians and the people that you teach the stuff too, they're retiring.
They're on the way out.
It's like William Benny.
Man, you ought to be able to.
I know he's deep in his age, but you should try to book William Benny and let him tell him tell some stories.
Yeah.
trying to get him.
My son,
my son,
they looked at the footage
and said,
we've been hacked by lens flare.
It's been hacked by the human torch.
Yeah.
It's like,
we've been hacked by aliens.
Where's his spaceship?
Maybe it's Lucifer,
being of light.
Yeah.
But that's what I'm saying.
Back in the day,
you did not put it out
until it was perfected.
Now, you've got these.
And another problem that we have with the tech industry is,
who wants to go to work for the government and sit in a cubicle for 100,000 a year?
When you can go out there, take some existing technology, tweak it a little bit,
and go and have a $100 million IPO.
Mm-hmm, mm-hmm.
Or work for someone, and they pay half a mill or a mill a year for what you know
and know how to make work.
so the government's behind the eight ball on this one big and I was watching that that with that
miss gothry and I'm like what did they do turn loose the village idiots to solve this I mean you've got
the village idiot doing the crime now you've got the village idiots running it oh yeah you really
do literally have the village idiots running the FBI that's that's for sure uh cash for telling crew
is amazing
Tom and cash
yeah
call me
get your check
book out
we'll fix some stuff
anyhow
this kind of stuff
and now you're talking about
AI
the people
that really know AI
they're out there doing
stuff that actually
makes money for themselves
the people that
the $100,000
crew
which I don't mean to be slamming anybody
they really
don't know what they're doing, they're going by the manual.
And you only know what the manual tells you.
Yeah, that's right.
Yeah, that's one reason I just feel up my hands and said, you know, I've got better
things to stay and keep doing this because you tell these people this while I was showing
you these old links and stuff.
We've already solved it.
Where is it at?
Use it.
So where do you see this going?
Where do you see this going as we?
We have our, as technology gets more and more advanced, as the rate of change increases more and more as there's less and less rugged, ruggedness in the system, more and more vulnerabilities.
Where do you see this all happening as, you know, it seems to me like it's getting shakier as it is getting more advanced and it's happening at such a rapid rate that nobody's keeping up with?
Where does this all crash?
Do you see that happening soon?
What do you think is going to happen?
That's what I look at it.
the house cards up this high.
Yeah.
So how high can they continue building that house of cards?
I really don't know.
I think, you know, I think if people had a reality check,
but they're all disbelieving.
They're all not understanding the obvious.
It will continue until something really bad happens.
And I don't know what you define as bad.
You know, where is bad anymore?
Yeah.
Million people dead.
10 million dead.
So, and then when you work for the government, it's that old saying,
politicians and government people, I'm not responsible for the things I do.
Yeah, that's right.
So how can you stop it?
Yeah, how do you stop it?
Mm-hmm.
Yeah, you have so many different systems that are involved in it.
You've got medical systems, infrastructure transportation.
You have defense systems with weapons.
I mean, now there's going to be a major push for autonomous killer weapons,
autonomous killer robots as well as drones and things like that.
By the way, there was also another interesting video.
Do you have that?
Yeah, we've got it.
I'll show the audience this.
This is protecting yourself from an aerial drone using an umbrella.
Thermal drones versus umbrellas.
Yeah.
Go ahead and open.
And it's a split screen here.
It looks like, let's go to IR, I can see anything.
They can see what he's doing.
They puts the umbrella on and he disappears now completely.
I'm looking at a steeper angle.
And it's still quite difficult, to be honest.
I think he's slightly hearing the drone and pointing his umbrella towards that.
Now, can you close it?
Yeah.
And open it again.
That's too good, man.
That's too good.
Yeah, it's kind of interesting because that's where Eric,
Schmidt is hanging out now.
You know, he left Google, and he has been a big man on campus at the Pentagon for
quite some time, setting up very advanced systems and AI-based systems and that type of thing.
And yet, you know, they could go out and spend billions of dollars on some kind of autonomous
killer drone thing.
They're talking about creating a no man's land, which is pretty much what they've done
in the area between Ukraine and Russia now, with all the...
the improvised drones and that's changing the nature of warfare very, very rapidly.
And so you put all that stuff together and then, you know, maybe somebody finds a way to
a vulnerability that's as simple as opening up an umbrella so that they can't see you
with the advanced targeting that it's got.
Well, even worse is they are perfecting the drone forms.
Yeah.
I mean, New Year, you remember, I forget, it was one city that was doing a, uh, uh, uh,
demonstrations of art in the sky with the drone swarm.
Everybody's like, ooh, I'm not even going to tell you how to do it.
It's one simple modification where you can put a bomb on it and it will release it.
So if you've got $550 drones in a swarm loaded with whatever, Molotov cocktails, whatever.
Yeah, yeah.
You've got a force to be reckoned with.
Oh, yeah. As a matter of fact, all this...
Yeah. I was going to say Goetree.
Go ahead. Go ahead. I'm sorry.
All this push about trying to stop ghost guns and the licensing, not licensing, but the requirements that are being talked about in terms of a Washington State, isn't it, Lance?
Yeah, Washington State. There's another bill in New York. And now there's, I think, five states.
that are putting out similar stuff, it's a push.
Yeah, they're trying to stop 3D printers.
And as Lance's take on all this, and I think it's the right one,
he doesn't think there's worried about ghost guns and creating ghost guns
as much as they are worried about stopping people printing their own drones.
Right.
Hey, you could, I'll tell you what, I have a 200 drones for them full of all kinds of nasty stuff
I can drop on you, and you've got a ghost gun.
Who you most worried about.
That's exactly right.
Yeah.
That's the asymmetric warfare of the future right there.
Yeah, you got low-tech people playing with high-tech stuff.
Yeah, and they're desperate to stop that down, shut that down right now.
So, yeah.
Oh, yeah.
It's interesting as we see these things changing very rapidly.
But it is an odd mixture, and that's kind of where you operated as cybersecurity.
this odd mixture of technology and human nature.
And always when I talk to you about the different cases that you're on,
it was always almost kind of like a Colombo thing.
You know, the Occam's razor was, well, who is it that's got a gripe of the company
or who is it that could really profit from this because they know where the back door is?
So really, more often than not, it was really about human nature in terms of finding the culprits in these things.
Well, now here's something.
I've got all mine shut off.
But if you're on automatic updates on your computer or PC, whatever they call them now, your phone, any device that has automatic update, you've got a back door open.
Now, if I wanted to, say if I wanted to, let's stir up Microsoft.
I hack in there and get that code, I can put anything I want.
on your device under their name.
Yeah, yeah.
You aren't sure what they're sending to you,
but you're totally got you.
You've been the door open, and it can come in that way.
They do do a lot of sharing with the government.
So, I mean, who knows who they shared with?
Yeah.
And the reasons why.
A lot of this software, I mean, this is so old school
that they allow you to create back doors if you know how.
So you can have your own personal back door into anything.
And while I'm on my rent,
people really ought to shut off the vendor.
Go download what you're sure your download.
Oh, man, my temper got up,
and I forgot what I was going to say.
So go ahead.
So turn off your automatic updates.
Any other things that you would tell?
I mean, I do that just because I don't want to constantly messing with my machine.
You know, if they put an update, they may break something, even if it's a legit update.
So, yeah, I always turn that off.
Any other things like that that you tell people?
You know, I hate to sound as neelistic as I do, but it's to the point where if you could use 1960s,
technology. That's the only safe place I can think of going. I'm talking about putting in a landline.
I'm talking about finding 1960, 1970s version TVs. Yeah, TVs that don't watch you back.
Yeah. You know, don't don't record when you're what you're doing on TV or what you're watching or
anything else.
You know, it's like we have created such a society, the solar alliance of tech,
that we're letting it get away from us.
Yeah, it really has, yeah.
And I think that's the government's involvement in it.
When you look at what they have funded, it's what Eisenhower warned us about the
military industrial complex, and he said also the academic aspect of it as well.
And it's because the government is funding all this stuff,
that the government is funding things that can be used for centralized control and manipulation of people.
And that's why when we talk about this, we talk about this all the time with Eric Peters when he comes on.
You know, get yourself a car that doesn't have all the electronics, especially not a car that is constantly online because of the types of vulnerabilities that you've pointed out with the Black Act conferences and things like that.
They've illustrated just how dangerous these things can be.
It could be somebody hacking it or it could just be.
that the device itself is not working properly.
You remember when we went back to those automated cars where you just turn it on,
you sit there behind steering wheel and you're not in control of anything?
That's right.
I explained it then that this is all on a sliding scale of basically a
I forget what they even called it.
But it's its own,
BT&T just texted me.
I doubt I'll not talk about them.
It's on a sliding scale, basically a probability.
So let's say the president on that scale 1 to 10,
president gets 10.
It's programmed in your car.
You're going to avoid running into him at all cost.
and it becomes, of course, the programmers, they're going to give themselves a 10 too.
It becomes, who's the decider here?
Let's say you give a school bus load, yeah, the short bus loaded with kids, a eight.
But you have a rare species of squirrel that is in danger, and you give it a nine.
So you're driving alone and that squirrel runs out at you and you've got the short bus coming at you.
The computer's going to say hit the short bus because it's lower rated than the squirrel.
Yeah.
Right.
So, you know, who gets to decide these things?
Who gets to decide of who's a zero?
You know, that means everything runs into you.
Well, and of course, it's not even just that kind of hierarchy that could be imposed on us.
of values, but it's also
if the device is going to work properly.
I mean, we just had a situation where
you know, car was passing
another car and because
the auto lane change
thing misread it,
they're trying to get out of the way of the oncoming
traffic and it pushed them back in
at the last minute. And
they had a head-on collision and killed everybody in the car.
So you have these types of situations.
Yeah.
Yeah.
And, you know,
people are like, oh, this is great.
I can read, well, nobody reads papers anymore.
I can text crazy stuff on X and drink coffee while on my commute.
You have no clue what your car is programmed to do.
That's right.
You have no input on it.
And actually, I'm sitting, you know, I've got a pristine 19998 car.
They don't even have a CD player.
I'm sitting in it right now.
It's like I don't want to, I can go buy whatever.
Yeah.
Yeah, well, yeah, that's exactly right.
You're going to hack this one.
You have a lot of the cars like Tesla's and things like that.
Even the door locks are under kind of software control.
So if there's an accident, you can't get out of your car.
It's difficult for them to open the car doors.
I had a friend of mine with a Tesla.
He got stuck in the car for quite some time.
He had to get, fortunately, he had his phone with him,
and he contacted tech support to get them to open his door.
And it wasn't the heat of summer.
So, you know, he didn't die of the heat in the meantime.
But, you know, once you overly complicate things, you know, you take away the ability for people to just even crank down their window, for example, since now all the cars have got electric windows.
Now you've got issues of people when they drive into a body of water.
They can't get out of the car like they used to be able to.
So those are just simple examples of what's happening as we needlessly complicate everything.
I think we are turning into a Rube Goldberg society, even if it's not lower.
It's even worse.
It is just out of complacency.
I don't know if complacency is the right word.
Laziness, it has been so simplified that we go with it without thinking about what we got.
Yeah.
You know, oh, okay.
My coffee, and we went over this with IOT years ago.
I've got a IOT coffee pot and you don't.
realize how open iot is everything i don't even know if they call it that anymore yeah the internet
of things exactly yeah well my pet peeve is if i'm a black hat and i will go ahead sorry
well if i'm a black hat and i really hate you i can hack into your iot coffee pot and i don't know
do something to set it on fire and it burn your house down yeah that's right yeah it's to the point
where we have a, I was going to say, we got a television in our living room that is, you know,
of course, they don't give you a knob on the front where you can just turn the thing on or off or even a button,
nothing that you can see. And they put it on the back and it's black on black. And it's like,
I'm trying to reach around. It's almost, you can't see anything and you can't really even feel anything.
They don't even give you some kind of a tactile feedback to turn the thing on or off manually.
And it's like, and now we're struggling to find the remote control.
because we've got a two-year-old that is roaming the house and moving everything around.
But it's like, why complicate this?
Why can't we just have a button that turns it on or off or a knob that turns it off?
Everything is, you know, the geeks are out there thinking, oh, wouldn't it be cool if we hid this and we did that?
We put that under software control.
And they've made everything very, very difficult.
But anything that you would tell people in terms of precautions, like, you know, make sure that you don't have automatic update on, of course.
but other things like that,
that would be of any practical value to people?
When you're not using it,
and everybody's going to say,
I've lost my mind,
but if you're on a router,
turn it off when you're not using it.
Of course,
you're always using it.
So I would go hardwired into computers
and things that are online.
I would plug directly in.
I would not be using Wi-Fi any more than necessary, which I'm doing right now.
But it's a necessity, but it's a necessity, but it's an unneeded necessity because it opens you up to all sorts of things.
Whereas if you plug directly into the wall, you have knocked off a lot of this, well, like I was saying, war driving.
could drive around.
And if I can find a router open, that's what we call it war driving.
I can get in your router and do all kinds of cool stuff.
Yeah, that's right.
And, of course, they can even use the Wi-Fi signals.
They can even use the Wi-Fi signals to see you inside of your house now.
You know, they can kind of reverse engineer those signals that are there.
But you'd have the bonus of a health issue as well.
Hmm?
Oh, yeah.
What you did on your television, you don't even realize it.
I'm going to take a shot in the dark and say it's a Sanyo.
No, I don't know who actually makes it.
It's some off-label thing that we got for cheap sale on.
Okay.
What is it?
FISO or something like that.
So maybe it is made by Sanyo.
I don't know.
But, yeah, go ahead.
Well, what you found is when you turned it off and that black screen,
was there was without even realizing it, these things now have gotten to where they're using
subliminal programming.
Where let's say you sit down and watch the news.
I don't know which news.
It don't matter.
First off, you've got several billion pixels.
You cannot use several billion.
pixels for one image.
So, and I can prove it.
If people want to, I mean, if they care enough, put the TV on the news right now.
Look at the newscaster in the eyes and walk up to the TV until you can see the two white dots in their eyes.
Those white dots there are meant to hold your attention.
So naturally, you're looking at the face.
And in the background, they will have some other pixels dedicated to basically ghost programming.
That is for the advertisers.
So you're fixated on watching that broadcaster.
And on your peripheral vision, you're catching whatever they're advertising.
let's say of
hamburgers
when you sit there long enough
it's going to get into your subconscious
the next thing you know you're craving hamburgers
yeah that's why all those pixels
are there it's like they live right
yeah
behind your laundry deterred something
that's right behind the news
it's saying obey
and comply yeah
and I'll tell you the funniest thing
in the world to do
It's so simple.
Just mute the broadcaster
or you can't hear them and watch them.
They look like the most ridiculous thing on the earth.
I'm serious.
Without that layered sound,
you've got to be going,
what in the world?
But when you combine it all together,
it works as addictive.
Yeah, that's right.
That's right.
Yeah, there's a lot of...
I haven't gone back to the old, I haven't gone back to old Xena TVs yet, but I wish I could.
Yeah, I mean, my big thing is, you know, just the on-off button, you know,
sometimes it's difficult to turn it on.
Sometimes it turns itself like on when you don't want it on, you know.
So ours does that as well.
There's some ghosts in the machine for sure.
Well, maybe it knows best.
It's like David's getting addicted to this.
Let's turn it off.
Yeah, yeah.
Well, you know, that's one of the thing.
Jack Lawson, for example, he's been putting together the Civil Defense Manual for quite some time.
And he always deliberately put it out as a two-volume paper.
Because, again, you know, when it hits the fan, you're going to need to have that book that's there.
And other people that I've talked to that are about prepping and other things that,
they have computers that they have stored things on and they've got it on, let's say, CDs or something like that,
if it's really important and they want to have it.
and it's on an air-gapped computer that's not connected to the internet ever.
And so there's certain things like that that are important for people to do, I think.
That's one of the smartest things, people.
I mean, I'm not saying preppers, but, you know, what if we have a, it could be any incident of hurricane.
Well, you don't have very many hurricanes in Tennessee, but you did have a flood.
And you're isolated for, I don't know, for several days.
And you need knowledge that you've already downloaded.
I don't know, maybe medical knowledge, survival knowledge, whatever.
It's there on hand where you can't access it because it's set on YouTube or something, which is down.
Yeah, yeah.
But if you got it in a book, you got it.
Well, our video, some people got to where they can't read anymore.
It's like, give a little video.
That's right.
Whatever it takes.
But, you know, that collection of knowledge is probably one of the smartest things a person can do.
Yes.
Yes, absolutely.
Well, there's some helpful hints for people.
And it's always great talking to you.
Always interesting talking to you.
And you're not doing cybersecurity anymore, right?
You want to, are you still doing any writing?
Yeah, I am.
I've redirected my focus to something that's.
called uh oh lord it's called quantum uh levitation quantum levitation it is going to it yep and it is in its
infancy and if we can ever crack some codes on some some materials is going to change the world
once again here i am talking about changing the world and reverting back to old school stuff so go figure
Yeah.
If you can imagine, if you can imagine freight trains being powered by, like, leaf blowers,
that's the energy it would take.
You have a thin line where it doesn't touch anything.
It applies to cars.
It applies to everything.
The technology is here, but a lot of the components aren't, and it's still in its infancy.
But when that does hit, you're going to get more industry pushback, probably outlawed.
I mean, you've got, you know, the tire industry is probably a trillion dollar a year business.
Or they are not going to like going the way of the horse and buggy and things like that.
And I'm not talking George Jets and stuff.
But I'm talking where your car is traveling maybe an inch off the ground.
and it also is encapsulated where nothing can run into you.
It's magnetism.
It pushes back, native, pushes back from positive and that sort of thing.
That is interesting.
And also, I was just looking at, go ahead.
Go ahead.
Well, go ahead.
I was just looking.
If you're going to do deep space?
Yeah.
Go ahead.
Oh, okay, go ahead.
No, you go ahead.
If you're doing deep space, if you're doing deep space, if you're doing deep space,
space of travel, you're going to have to have an artificial gravity.
You can't just let people float around and stuff float around in the vehicle for years.
Because if they're unable to, I mean, they get the muscular or not.
They have muscular deterioration, stuff like that.
What if they shoot for a planet that has time 10 gravitation?
They aren't even going to be able to walk.
Yeah.
So, you know,
it applies to everything.
You could put knee pads and elbow pads and I guess a helmet on people that are prone to fall.
They can fall all they want.
They'll never hit the floor.
And it's just, you know, it's just it will rewrite the rules of the world.
And here I am saying, well, you know, I want to go back to 1960s technology.
We had it right first.
But yet I'm doing this, so go figure.
That's right.
That's right.
Yeah, you know, it's kind of interesting.
I just saw an article about how they're, you know, between Musk and Bezos and they got their different ideas about what they want to do with space exploration.
But they're also talking about the same kind of approach that Gerard K. O'Neill was talking about in his book, High Frontiers at the end of the 1970s.
And they're talking about doing maglev launching of materials off the moon's surface.
So, yeah, there's a lot of things like that that are going to change things very, very rapidly.
And again, as we look at it, it's not just us going back and hanging on to the things that are familiar.
There is a lot of wisdom in terms of pulling back against some of these technological things.
Just because it's something new and just because it's some kind of a G-whiz technology thing doesn't necessarily mean that you want to do that.
you know and I guess that's one of things as engineers we look at and we always get caught up in a new way of doing things but sometimes there's wisdom in some of the older things if you are thinking about the consequence of it it's always great talking to you go tree thank you so much for coming on oh it's my pleasure david and i hope you're feeling better yeah a little bit a little bit better thank you so much um and um you know probably you'll need one of those um those helmets and knee pads that you're talking about
before too much longer.
Well, if we could ever get past this liquid,
if we could get past this liquid nitrogen problem,
you'll be the first on my list to get one.
Okay.
All right.
Thanks a lot.
Have a good day.
Thank you again for talking to us, GoTree.
Always great talking to you.
My pleasure.
Bye-bye.
Bye-bye.
The common man.
They created common core to dumb down our children.
They created common past to track and control us.
Their commons project.
to make sure the commoners own nothing and the communist future.
They see the common man as simple, unsophisticated, ordinary.
But each of us has worth and dignity created in the image of God.
That is what we have in common.
That is what they want to take away.
Their most powerful weapons are isolation, deception, intimidation.
They desire to know everything about us.
about us while they hide everything from us.
It's time to turn that around and expose what they want to hide.
Please share the information and links you'll find at the Davidnightshow.com.
Thank you for listening. Thank you for sharing.
If you can't support us financially, please keep us in your prayers.
TheDavidnightshow.com.
