The David Knight Show - INTERVIEW CyberPolygon Strikes? CrowdStrike's Global Disruption

Episode Date: July 22, 2024

Just as we saw with the shooting at the Trump rally, those who are tasked with protection can be the biggest threat — either through massive incompetence or malice.  In the CrowdStrike global disru...ptions we see the people tasked with "cybersecurity" introducing a bug that shows how fragile our infrastructure is — and that includes CrowdStrike's connection to "election security".15 characters cause millions of computers to crashHow long will it take to correct?The increasingly fragility of our infrastructure due to computer vulnerabilitiesThe WEF linked Global Cyber AllianceCrowdStrike's "Cybersecurity for Election Systems"Find out more about the show and where you can watch it at TheDavidKnightShow.comIf you would like to support the show and our family please consider subscribing monthly here: SubscribeStar https://www.subscribestar.com/the-david-knight-showOr you can send a donation throughMail: David Knight POB 994 Kodak, TN 37764Zelle: @DavidKnightShow@protonmail.comCash App at: $davidknightshowBTC to: bc1qkuec29hkuye4xse9unh7nptvu3y9qmv24vanh7Money should have intrinsic value AND transactional privacy: Go to DavidKnight.gold for great deals on physical gold/silverFor 10% off Gerald Celente's prescient Trends Journal, go to TrendsJournal.com and enter the code KNIGHTBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-david-knight-show--2653468/support.

Transcript
Discussion (0)
Starting point is 00:00:00 At BetMGM, Ontario's best casino action is just a click away. Play thrilling games like Premium Blackjack Pro, the dazzling MGM Grand Emerald Knights, or try to score in Gretzky Gold Lucky Tap. It's all here at BetMGM. Visit BetMGM.com for terms and conditions. 19 plus to wager. Ontario only. Please play responsibly.
Starting point is 00:00:18 If you have questions or concerns about your gambling or someone close to you, please contact Connex Ontario at 1-866-531-2600 to speak to an advisor, free of charge. BetMGM operates pursuant to an operating agreement with iGaming Ontario. Well, joining us now is Goatry, and he's been on several times talking about computer cybersecurity issues
Starting point is 00:00:40 and other things like that. So when I saw what was happening with CrowdStrike, I wanted to get him on to get his take on this. As a matter of fact, he was sending me some stuff as the program was going on Friday, and I didn't see it until after the program. So I wanted to do this special report and put this out. Now, the name may sound familiar to you.
Starting point is 00:01:00 It took me a moment to kind of place it. It's like, oh, yeah, those are the guys that were involved with Hillary Clinton and the Russiagateate stuff and they were the ones who flagged it for her and they were the ones who first put this out and then of course as cnn puts it they said crowd strike was the first to publicly sound the alarm about russia's interference in 2016 election well that's suspicious and then crowd strikes assessment was later confirmed by u.s intelligence agencies who lied left and right and that's all been confirmed now cnn just flushed uh about four or five years of history down the memory hole because we've known
Starting point is 00:01:38 for several years this has been thoroughly debunked and they kept everybody going for a couple of years but all this stuff about 17 security agencies and everything, that was all Hillary Clinton. And we've gone through all that, but it's all still news to CNN who pretends that this didn't happen. So now CrowdStrike is at the center of worldwide outage in all kinds of things, from transportation to banking. We've got stores that are closed that can't do business it is massive because of something that is in their code it does not affect max it doesn't affect linux but it affects windows but it has affected businesses and airports around the world we've got entire airlines that have shut down some of them are using whiteboards to put stuff out. So I guess unless you want to fly Amish air,
Starting point is 00:02:26 you may be out of luck with traveling anywhere. So I want to get Goat Tree on and get his take on this. Thank you for joining us, Goat Tree. Happy Saturday, David. This is going to be fun. Yeah, it is. Go ahead. What do you think is going on with this?
Starting point is 00:02:44 You're looking at this, and one of the things that you pointed out, it's so interesting that it's just one little line of code, 15'll just read how they describe themselves. CrowdStrike services provides the best practice framework needed to access and enhance cybersecurity maturity levels for election systems. Oh, yeah. Election systems, boys and girls, to protect the integrity of the voting process and sanctity of the democratic institutions under which we thrive yeah oh they're already advertising they're going to be handling the elections yeah that's right yeah there it is right there cyber security for election systems and then that great you know we got news guard from microsoft that's going to uh make sure the news is good they got election guard to make sure that elections are going to be good. And we've also got CrowdStrike, who's going to make sure
Starting point is 00:03:48 that the elections are safe from any tampering. Yeah, and I've called this I guess, since it's a cyber security company doing it, we can't call it a hack. Let's call it an exploit yeah uh i've named it the revenge of the closed source strikes again what that means is this is geek speak for bender back doors bender ports open ports whatever geek speak you want to apply to this uh old dos windows operating system yeah and that's the key thing that windows hasn't really fundamentally changed forever right decades of stuff that's
Starting point is 00:04:34 built on top of this garbage that's at the found it's got a really old foundation doesn't it it is antiquated it is not changed they just put new skins on it and these little i mean we mean this has been around since 19 well when did bill gates steal it 1982 yeah that's right and uh it's never been uh uh modified for current operations i I mean, everybody, okay, all these guys that built their careers on Windows and this, I've got to say, you don't know what you're talking about. But basic codes and basic commands are still DOS. And it's not changed. And, well, for instance, it only took 15 characters in this code string. Can you think of
Starting point is 00:05:23 15 characters in this code string. Can you think of 15 characters to crash millions of Windows-operated laptops, desktops, and servers? Can we talk a little bit about what is actually happening? I mean, they're getting the blue screen of death. It's not booting up. Is that correct for the people who have it? Right. And what it has who have it? Right. And what it has done is it's locked. Let me go back for just a second.
Starting point is 00:05:52 I'm working on my notes because this has been like kicking over Pandora's box and Medusa pops out. Because this is not what it looks like. Basically, it is causing these machines to continually try to reboot up, but it's not allowing them to. It's just, it's not allowing them to it's just it's getting your conflicts and you have to go into the back back way in which is through the safe I don't use one this that much I mean I quit use Windows years ago but you have to go
Starting point is 00:06:41 into safe mode then you have to scroll through, find the file, find this one 15-character code, and manually remove it. And, you know, you have billions of lines of code all through these servers and things like that, so you're looking for a 15-character code to remove. You know, right now, if you think about it, it's so surreal because there's trillions of lines of code out there
Starting point is 00:07:19 making things operate. And billions of dollars spent on digital security and a simple little 15 character code bricks millions of Windows devices on the critical infrastructure so if you read this thing and you get into safe mode then you've got to go into some kind of a text editor to try to find that one line those 15 characters remove it is that what the the real hitch is you've got to go into some kind of a text editor to try to find that one line, those 15 characters and remove it. Is that what the real hitch is?
Starting point is 00:07:53 I lost your audio there. Did you drop your phone? No. Okay. We're back. We're back. We're back. Yeah.
Starting point is 00:08:02 Okay. No, what you've got to do is, and this goes back to DOS. I mean these guys that want to argue with me they can argue till their tonsils roll out on the floor you've got to go back to the file which is written on dos backbone open that file and then go through and locate that 15-line code and remove it manually. And that's a time-consuming thing. And that's going to be different for every computer, presumably,
Starting point is 00:08:33 because of the things that have been put in there, where that is located in the file? In theory, yes. So it's not just simply go in and open up. Hopefully the IT people were smart enough not to change the name on the file, but some of them do. Yeah. Well, let me read this to you. This is from Futurism. It says Microsoft recommends rebooting your computer 15 times as blue screen of death strikes worldwide the subtitle is have you tried turning it on and off again which is the first thing takes support i always ask you and then on and on on and off again and again again and they said as the world is reeling
Starting point is 00:09:15 this is their instructions to try 15 times i mean if you want to try the goat tree method hit it with a hammer a couple of times. If that don't work, bounce it off the floor a couple of times. Yeah, I bet there's some people who are doing that. I bet there's some people who are doing that right now because they're so upset about what is happening with this. And so we've got all these computers that have gone down, and they're saying it might take weeks, and I guess it's because it's difficult to find that particular piece of code to fix it, right?
Starting point is 00:09:48 Well, let's put it into concept. You know, average business, let's just say, I don't know, about a million-dollar-a-year business. They probably have 25, maybe 30, some of them, you know, in automation and things like that. And they have 50 laptops or desktops or whatever to operate their business, their people and their business. And they only have one IT guy. Well, it may take one IT guy an hour per laptop desktop server whatever to clear it so you're right there you have got well 50 to 60 manual hours just bringing the
Starting point is 00:10:36 computers back online mm-hmm so if you get these multinationals, their IT is usually no more than, let's see, the way they like to work is seven. Let's just say they've got a thousand computers down. They've got seven IT people. They've got a problem. You know, we're talking weeks or months. Yeah. Yeah. I see what the problem is.
Starting point is 00:11:01 Yeah. Yeah. You multiply it out by all the different computers. Right. It's not the code. Right, it's not the code. It is the correction that is going to be causing the delays. That's right. And, of course, these computers are not necessarily going to be all in one physical location.
Starting point is 00:11:18 They're going to be distributed to a lot of different places for all these IT guys to try to... Oh, yeah. It's crazy. You've been talking about this on a friday there's yeah this occurred on the friday wait till people get get in the office those that weren't in the office on friday wait till they get in on monday and get their surprise yeah wow well you've been talking about this kind of stuff for quite some time uh the kind of exploits you were talking about it with uh railroads and things like that right yeah this is to explain this in a simple way uh you know when we were talking about this palestine ohio railroad crash yeah i sent you that video of the railroad dude opening the remote shack it had the automated safety equipment in it it was all there radio computer
Starting point is 00:12:14 keyboard everything just sitting there waiting to rock and roll this stuff will send in information either event driven or on a schedule well me Mr. Black Hat the only thing between me and it is a padlock so if I would knock that padlock
Starting point is 00:12:39 and get in there and insert I don't know let's just say a 50 character line of code that will take down that railroad. I can insert it, embed it into the hourly or event transmission. When that happens, it's going to deploy on their email server whichever server
Starting point is 00:13:08 it goes to whatever it's routed to when they open it up it starts breaking things and as you pointed out before you know a lot of these things ship with a default passcode that is there in the manual and a lot of times they don't change the default password. And if they do change the default password, frequently what they'll do is write it there next to the password for the next guy who's coming in because it's a hassle for them to write it on the wall. That's just human nature. That's what's happening with these systems. Well, this is the same principle that happened
Starting point is 00:13:48 with this CrowdStrike. CrowdStrike does it as an update. Well, basically, these remote nodes are sending updates. It may be information. And you can insert malware into it and do the same thing I mean at a the header comes a lot comes across one o'clock update everything's fine dandy and at the bottom you insert your code and the And the system is going to read the code too, and it can execute that code. Because machines are dumb.
Starting point is 00:14:31 Computers are dumb. They're driven on commands. So if it sees this update, this operational update, sees code on it, it could actually execute that code. And then you have the domino effect or the waterfall effect happening. Yeah, and we had the... Talk a little bit about the Colonial Pipeline as well, you know, when we had that situation happening. Pen tests? Well, this was one, it was either 2015 or 2016
Starting point is 00:15:07 uh we did some pen testing on a pipeline and these used uh these very small uh devices that basically took pressure flow and all these rates that was needed to make the pipeline function efficiently and they would send in these one-hour updates well they kept these in these plastic they weren't even locked they were in these like plastic things where your water sprinkler is. We popped that open. We took the disc out, put ours in it, and we waited about an hour, and they started getting alarms at the master system,
Starting point is 00:15:58 and ours was not meant to hurt anything. It was just simply a spoof, letting them know that we were in the system. I think we had, I think we were playing disco music and had a flashing screen. And that's what they hire you for. They hire you as a white hat hacker to find the vulnerabilities and report them to them.
Starting point is 00:16:26 And to play some disco music occasionally yeah you know playing some casey in the sunshine man or yoko ono screaming at night yeah no no we only say that for squatters basically we let them know we were in the system, and if we were up to no good, we could do anything we chose to. So we made them listen to some really weird disco music, because they're punished. Yeah, that's interesting. You know, when we look at this, and again, we keep seeing this over and over again.
Starting point is 00:17:07 We've had a couple of, now Colonial Pipeline, they had a hack that, from what it was reported, it attacked their counting system and not the pipeline. Is that correct? Yes. And that seemed to be... But you see... These ancillary systems, I mean, we saw that with the airlines that got shut down for like a 24 hour period because somebody hacked into the NOTAM system, which is a warning system that tells the planes if there's some incident in or around an airport on a runway or something like that.
Starting point is 00:17:39 So it's just kind of a news alert broadcast but if they didn't have that ability to warn planes and that was taken down uh the faa just shut down all of the planes for about a 24 hour period yes well yeah you've got right now just off this exploit of thousands of flights either very delayed or canceled i mean you've got people that are basically stranded at the moment. Well, we're talking about this on Saturday. Yesterday afternoon, I looked and they said that all of United and all of American Airlines were shut down. So I don't know how extensive it is in the United States, but all their planes, all their planes are shut down. And like I said, 15 character codes, what's done it.
Starting point is 00:18:23 And I would hate to be part of their IT department. These guys aren't going to get home for a month. But, you know, you're going back to how to get into these systems. It doesn't matter where you find the vulnerability. You can exploit it. It's like with Colonial Pipelines. Well, they found it in the payroll or whatever department they got into. When you're probing a network, you look for the vulnerability. You don't care where it is because once you get in,
Starting point is 00:18:57 you can burrow to wherever you want to go. So, I mean, I could, in theory, find an unguarded, I don't know, site for their janitorial staff. I'm in. And, you know, you could have the janitorial department of doom sitting there terrorizing the company. That's a real hits-the-fan scenario, isn't it? Yeah. Literally. Well, you know, we like this thing so this thing is caught in this uh loop trying
Starting point is 00:19:29 to boot up i guess is what is happening uh when this thing goes through and they've got to manually remove this and you know it's time consuming for each one of these things just multiply it out by all the computers that this has been uh put on they can't do it evidently remotely because computer can't boot up so it's got to be uh fixed at each and every one of these um you know we talked about this before the the blaster worm and things like that we we got a history of this one one person is going back to y2k they said this is what we feared about y2k but it's really happened and of course it was shortly after that there was a blaster worm as well, right? Yeah, the blaster worm goes back to, I think it was 2003.
Starting point is 00:20:15 It was an old, once again, you know, it goes back to DOS. They'd say, oh, this is all the Windows, blah, blah, blah. Basically, I forget which Windows platform it happened to, but it bricked them up the same way in 2003. And I think it was XP, Windows XP. That's what it was. And, you know, everybody says, oh, it's all corrected. It's fixed.
Starting point is 00:20:41 Well, here it is 21 years later. It's back, same exploit. And the IT people, a lot of them weren't even born or were watching Teletubbies in 2003, and they're getting a dose of something that's been around for 20-some-odd years. Oh, yeah. And everybody, I mean, this goes back to the backbone of Windows. This is all DOS-related. People can argue with me and they can carry on and you know, it's like, that's fine. But if you know
Starting point is 00:21:12 really truly know the architecture of Windows it's 40 something year old architecture. It's just been re-skinned and has some various things added but the crux of it the back backbone of it's same as it was 1984-85 yeah yeah that's true well let's talk a little bit about the uh the um conspiracy theories that are out there uh We've got, this is put out on mainstream media to cover up for this stuff, and it was pushed out by Drudge Report.
Starting point is 00:21:51 Online conspiracy theories abound after the major global IT crash, and it appears, this is a company that I'd never seen their name before, talking about this, and CYABRA, C-Y-A-b-r-a have you heard of them ciabra uh it is a disinformation security company so these are people you know we got people that want to make sure that we don't have any uh disinformation out there but this is disinformation
Starting point is 00:22:20 security company and they're focused on shutting down these conspiracy theories before they travel around the world. Right? Well, good luck with that. Come on, come to me. This information company, I'll take you out of schools. Yeah. I've never heard of them, but I don't pay attention to them because they basically aren't in, aren't in all my radar and they want to make a run at me welcome to i'll show them some different disinformation but i've sent you uh some direct
Starting point is 00:22:54 connections i want you to follow up on because crowd strike is in a partnership with the wef and you know that the world economic pool is a warning of mass cyber strikes yeah yeah and that was a couple years ago they're talking about cyber polygon i think wasn't it i think it was uh 2022 if i'm not mistaken uh but they're warning everybody yeah oh yeah still talking about it it. And so that was really the purpose of this news article was to inoculate the World Economic Forum to give them immunity from these conspiracies. Because people don't like the World Economic Forum, it's been the brunt of these conspiracy theories. Well, it's because they've been talking about how this is what's going to happen. And then it happens with a company that is connected deeply with them.
Starting point is 00:23:49 It's the one that pulls it off. Yes, and CrowdStrike. Well, it gets better, though. WEF and CrowdStrike, it's easy to find. Just go to their website. They'll tell you that they're partners with the WEF. And they are globally involved in elections
Starting point is 00:24:09 with, now this is the good part, working partnership with the WEF linked to Global Cyber Alliance. Now, the misinformation guys you gave me, I'm not even going to pay attention to them. The Global Cyber Alliance going to pay attention to them.
Starting point is 00:24:29 The Global Cyber Alliance is what you need to research. Everybody that's going to be listening to this, have a look at Global Cyber Alliance. You've never heard of them, but they are part of the WEF, and that's really interesting. Yeah-hmm. Mm-hmm. Yeah. And this is... And... Sorry, go ahead. No, no, no. Go ahead.
Starting point is 00:24:52 I just want everybody to focus on this global cyber alliance. Focus on the global cyber alliance and focus on the connections to elections, because that's really what this is about. I think we've got to go back to paper. I mean, it's just, you know, there's no perfect system, but when you go back to something that is physical like that, that keeps the, it keeps away the global thieves that can break in everywhere and
Starting point is 00:25:18 multiply, multiply this, you know, in the same way that what we're talking about in terms of doing the repair on this, it is difficult to get that done because you've got a limited number of people that can go out there and fix these different machines. And that's the very reason why you want to have paper elections. You're going to have some crooked areas like Chicago where they're going to stuff the ballots regardless of what you do or what form they're in. But what you do when you have a physical ballot like that, what you do when you have a physical ballot like that, what you do is you make an obstacle for them that they can't be everywhere all at once
Starting point is 00:25:50 and change all these things. But they can do that if it's computerized. Well, here's where it gets interesting. CrowdStrike are providing security for the United States elections on November 5th. Mm-hmm. security for the United States elections on November 5th. What if these elections aren't going the way they see fit, and they have another
Starting point is 00:26:12 update, and they break the election machines? Well, that's impossible. Well, look what they've just done. Oh, no, I remember I've talked many times about what happened in Brazil with Smartmatic. You know, that was one of the first electronic voting machine companies at the time. It was started in Venezuela with some friends of Hugo Chavez to keep him in office.
Starting point is 00:26:37 But they've had accusations of disruption and fraud in several states in Mexico and the Philippines philippines in brazil and in brazil you had exactly that scenario you had this leftist who was really lagging behind the polls from all indications you know she was booed off of out of the stadium the day before the election uh football stadium and she was losing significantly and then all the machines go down and then they're down for a while and then when they come back up she's switched positions with the other guy and so yeah it is very easy for them to do that type of thing with electronic machines well let's take for instance yesterday well today saturday it would be friday uh arizona was having their early balloting. I don't know what it was. It may have been primaries, early election,
Starting point is 00:27:30 early voting. I don't know. They had that same event happen. Right in the middle of the elections. All from this exploit. Wow. Yeah. From this exploit. It's kind of like, you know know who watches the watchers right that's what that was the problem is uh the problem with government is that we're not angels as madison said uh but uh so we need to have government but when we have government uh who watches the government because there's made up of men who are not angels and same same thing happens when you talk about police or when you talk about cyber security who watches the watchers how do we keep this thing under control
Starting point is 00:28:09 how do we know that uh crowd strike that has been involved in nefarious things uh just eight years ago at the center of um these these false claims about the election at the time how do we know uh what they're doing are Are they an honest broker? They've insinuated themselves pretty much everywhere. I didn't realize they had such a massive footprint globally. Well, the weird part about all this is, okay, they disrupted Arizona elections yesterday. This exploit comes only five days after the attempted assassination of President
Starting point is 00:28:47 Trump. Yeah, that's right. I mean, there's just too many coincidences to ignore here, wouldn't you think? And who watches the watchers there? Who watches the Secret Service to make sure that they're actually doing their job, that they're not setting things up? You know, it's just another example. It's very much like that, except this is the computer version of it.
Starting point is 00:29:09 Yeah, and if they want to send the cyber disinformation dudes after me, bring it. Yeah, after both of us. That's fine. We have to call it the way we see it. It is extremely suspicious.
Starting point is 00:29:26 Their connections to the World Economic Forum and their connections to the elections are very suspicious. At the very least, you know, again, when you're looking at the situation, the shooting there in Pennsylvania with Trump, you look at it in terms of incompetence. And it's always these two things. Is it incompetence or is it maliciousness and when it the incompetence or it could be both yeah exactly because people can use that that incompetence in a malicious way some people can use that and so it's always difficult what's that yeah weaponized incompetence, otherwise known as DEI. Didn't earn it.
Starting point is 00:30:07 Yeah, that's right. Well, it certainly is interesting, and we'll be following this. Anything else that we haven't covered that you want to mention before we call it quits here? No, I mean, that's pretty much it. This is all documented, and if your listeners want to take it upon themselves to go start doing some digging and researching, you know, they're going to be surprised with what they find. Yeah, that's right. And another thing, if we get this word out, the thing about it is,
Starting point is 00:30:43 even if this is actually what we think, shining light on this stuff always makes them alter their game plan. If everybody knows what's up, they suddenly aren't able to operate in the dark, and they may pivot off of whatever they have planned. That's right. If it's malice, you want to shine the light on it. If it's malice, you want to shine the light on it. If it's incompetence, you want to shine the light on it. So, you know, we look at this and it's like, is this incompetence or is it malice? Either way, we need to shine the light on it. And already, you know, we got the CEO of CrowdStrike is out there getting visibly angry with it
Starting point is 00:31:18 because he's had, I don't know how much the stock is down now and off hours trading and everything. But yesterday it lost a little over 10%. Yesterday it probably keep going down if people have still got their computers down. And we'll have a lot of computers down at the beginning of the week. It's going to continue to go into free fall. And I hope he's got a golden parachute because he may be defenestrated pretty soon. Thrown out the window i hate to break that i hate to i hate to admit i live like we're gonna win in rome i shorted him yesterday so i hope he's
Starting point is 00:31:53 trying to profit out there you go that's a way to profit off of this stuff uh well you know they have shortchanged us that's for sure and that'd be a fair response to short their stocks. Created a lot of misery for a lot of people. And it was the cybersecurity thing that actually did it. So we're seeing this over and over again, the structures that are there to protect us. And again, as you and I talk about, the incredible fragility of our infrastructure and how the more complex it gets the more fragile it becomes and the more vulnerable it becomes to somebody who is malicious but with that complexity
Starting point is 00:32:33 and then with dei the whole thing you everybody needs to start shorting the infrastructure and by that i mean going out and prepping for yourself and making sure that you're going to be okay if this house of cards uh falls down because of 15 characters that's really what we're looking at right here well that gentleman you had on yesterday with his uh civil defense books yeah uh i don't know him i've never read them. I think they would be a pretty good investment. Yes. I'm thinking about it. I mean, I've got my basis covers somewhat well, but I'm going to make an investment in getting some of his books.
Starting point is 00:33:18 Yeah, yeah. CivilDefenseManual.com. That's Jack Lawson. He's had a wealth of experience as a mercenary soldier and in the military. And then he knows people in special forces. And so he had them talk about their areas of responsibility. So yeah, you can look at that. And he's got a free chapter there about water because that's the principal thing. You can't go long without water. And we've got all of our water systems are now being hacked left and right all over the place as well. They can mess up the delivery.
Starting point is 00:33:46 They can mess up the water itself in these systems. So as everything goes online, as everything becomes more and more complicated, it gets more and more vulnerable. And I guess that's the key takeaway for people to prepare for themselves. Well, thank you so much for joining us, Bill Tree. Sorry, go ahead. Okay. And you tell Jackie owes me a cup of coffee from promoting this book. Okay.
Starting point is 00:34:11 I'll do that. Yeah. Thank you for coming on. Thank you for doing a Saturday with me. It's important to get this stuff out and people need to start paying attention to this. This is going to be a really wild ride, I think, between now and the election. And I don't think things are going to slow down after the election.
Starting point is 00:34:27 I think that's going to continue to escalate as we come to a close on this fourth turning. We've got another four years of it. And I think we're going to have a lot of crazy things that are going to be happening. And it isn't really from our perspective. You know, we can look at it. Is it malicious or is it incompetence? But either way, you've got to prepare for when this stuff goes down. So thank you for joining us, Goat Tree, and explaining this stuff.
Starting point is 00:34:50 Appreciate it. My pleasure, David. False news has become all too common on social media. More alarmingly, some media outlets have published policies that we are true without checking facts first. Unfortunately, some members of the media use their platforms to push their own personal bias and agenda to control exactly what people think. And this is extremely dangerous to our democracy. This is extremely dangerous to our democracy. This is extremely dangerous to our democracy.
Starting point is 00:35:22 This is extremely dangerous to our democracy. This is extremely dangerous to our democracy. This is extremely dangerous to our democracy. This is extremely dangerous to our democracy. This is extremely dangerous to our democracy. This is extremely dangerous to our democracy. This is extremely dangerous to our democracy. This is extremely dangerous to our democracy. Break free from the usual script with The David Knight Show, a fresh perspective bringing you genuine insights on current events.
Starting point is 00:35:44 But if the show is going to stay on the air, we'll need your continued support. Sharing the show, subscribing, and even just hitting the like button all help. And if you found our show helpful, please consider donating and becoming a part of a community that values the truth. Because independent, listener-funded news, untouched by corporate globalist agendas, is extremely important to our liberties.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.