The David Knight Show - INTERVIEW Is China CyberAttacking USA? When Will WEF's CyberPolygon Kill the Net?

Episode Date: December 13, 2023

Is Ukraine a test of cyberattacks? Do you remember the power grid attack there in 2016? GoatTree wrote about it then and the biggest of the war just happened. He joins to talk about the known infrastr...ucture vulnerabilities (both physical and cyber) that keep being ignoredFind out more about the show and where you can watch it at TheDavidKnightShow.comIf you would like to support the show and our family please consider subscribing monthly here: SubscribeStar https://www.subscribestar.com/the-david-knight-showOr you can send a donation throughMail: David Knight POB 994 Kodak, TN 37764Zelle: @DavidKnightShow@protonmail.comCash App at: $davidknightshowBTC to: bc1qkuec29hkuye4xse9unh7nptvu3y9qmv24vanh7Money is only what YOU hold: Go to DavidKnight.gold for great deals on physical gold/silverFor 10% off Gerald Celente's prescient Trends Journal, go to TrendsJournal.com and enter the code KNIGHTBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-david-knight-show--2653468/support.

Transcript
Discussion (0)
Starting point is 00:00:00 Well, welcome back, and we're talking to Goat Tree, who has been on with us several times before. And we wanted to talk about cyber polygon, cybersecurity issues, things like that, and we're going to talk about that. But as I connected with Goat Tree, he said, I've got something to say about what you've been talking about this morning. So let's start with that. Welcome, Goat Tree. Thanks for joining us. Well, good morning, David. It morning. So let's start with that. Welcome, Goat Tree. Thanks for joining us. Well, good morning, David. It's always great to be on with you.
Starting point is 00:00:30 It's like I was saying, you get on these subjects. I had a show prepared, and I listened to you, and it's so strange. We're working on projects like you were talking about, and the stupidity of everything is this going on right now and uh i thought well hey you're on a trend let's run with it so uh is it artificial intelligence that you're working with some of that stuff that they fake the demo what what is it that you're working on that aligns with what I talked about? Absolutely. It is artificial intelligence, but it's not what people consider artificial intelligence.
Starting point is 00:01:11 Instead of turning it into the master, it's being turned into the slave. And secondly, just so everybody knows, artificial intelligence is what the, uh, unwashed massive years. If you want to talk to serious people about it, it's advanced intelligence. Oh, you start dropping the word advanced intelligence.
Starting point is 00:01:35 You're going to get to serious people talk to you. Oh, okay. Yeah. I thought it was hallucinating intelligence. Honestly. Yeah. Yeah. Yeah. I don't,
Starting point is 00:01:47 uh, I bet. Yeah. It's like one great big, uh, acid trip to quote George Carlin. So, uh,
Starting point is 00:01:56 I, I know you can't talk about, uh, specific details necessarily because of what you're working on, but I mean, what can you tell us about what you're doing with it? Okay. Well,
Starting point is 00:02:06 actually I can, because, uh I mean, what can you tell us about what you're doing with it? Okay, well, actually I can, because it was strange. I was preparing for your show, and I happened to get a phone call, and I warned him. I said, you know, I'm going to drop some stuff out there for David. And he's like, okay, go for it. So, you know how you were showing those pictures of those aborted babies and how that political person is exploiting it? This goes to school safety, and I'm sure Alex Jones, you know, oh, speaking of that, we're coming up on your anniversary
Starting point is 00:02:45 of you and Alex going off separate ways. Yeah. Yeah. Yeah. We're coming up to March 13th. No, I know what you're talking about when I got fired. Yeah. But we went our separate ways in March, but it was December before I got booted out the
Starting point is 00:03:01 door for a security came around and took my stuff and, uh, escorted me out the way out of the place. But yeah, it all began back in March 13th. I think it was December the 17th that I got officially escorted out. It could be. I'll never forget that morning. You text me and say, uh, Alex fired me. And I'm like, what is he stoned or drunk or something?
Starting point is 00:03:21 Let him sober up and I'll see him in the morning. Well, I'd been warned. I'm going to say I'd been warned and I didn't care. It's like, I'm not going along with this stuff. Anyway, but so getting back to advanced intelligence. Okay. Or abortion. You were about to say something about abortion, I think. It's not about abortion, I think. Yeah. Well, it all dovetails into each other. It's not about abortion. It was about these school shootings and these kids,
Starting point is 00:03:52 how children seem to be moving targets and expendable right now. I mean, I don't know where this line of thinking caught fire. And one of the projects that we're working on is securing schools, not only schools, but facilities. I mean, if you have the money, it probably could apply to your house. And it's non-lethal. Is this the one where it detects weapons on people using artificial intelligence? Yes, that's one aspect of it.
Starting point is 00:04:37 But the other aspect is like incorporating quantum magnetics and levitation. Whoa. Some of it is, yeah. Tell us about that. What is quantum magnetics and levitation? Tell us about that. First of all, that sounds interesting. Well, uh, basically you are installing an invisible shield around the facility through the magnetics and, um, nothing to penetrate it.
Starting point is 00:05:02 Once it's activated. Well, we were really in the initial stages of exploring this. Wow. Instead of locking the doors and locking the kids in with a lockdown, you just say, shield's up, and that's it. Yeah. But now, if you're intruders within the shield, we've got things that basically, so far from the envisionment of it, is along the walls.
Starting point is 00:05:31 First off, your security officer or principal or whoever designated security person is, has like a sleeve that they put on, and they can control every aspect of the system. If there's an intruder in the building and you can't lock them out, you can give them a really good nasty blast of some quantum material and it knocks them on their butt. And you just leisurely go over there and take the AR, their assault rifle away from them and do whatever to them.
Starting point is 00:06:11 Maybe you could just play a Yoko Ono song or something. Disable them. Hey, listen. Don't tempt me. I know, we've talked about that before. But that story, that, but that story, that's an interesting story, but,
Starting point is 00:06:26 but okay. So how do you disable somebody with quantum material? What is the quantum material that you're shooting at them? Well, okay. If you're, you're playing with magnetics, you've got to remember these are waves.
Starting point is 00:06:39 And you know, we were, you were talking about, uh, you'll go on and we've talked about playing with brown news. You know, You were talking about Yoko Ono, and we were talking about playing with the brown nose. You hit them with some quantum magnetics, and it's going to turn them for a loop. Yeah, yeah. I guess it would.
Starting point is 00:06:53 I don't know. I've never been tasered with quantum forces. Of course, nobody has yet. We're playing with it. That's very interesting. I'm not sure who the guinea pig will be on that experiment. Maybe Biden will mandate the military to do it. You know, it seems to be a theme with it.
Starting point is 00:07:16 So, you know, first layer of protection of like the barrier and then get past that that's how they got the diving tables I was told when I took my scuba diving course they said we just did a trial and error with navy divers you know it's like okay you go down this level and you come up and you stay at that level for a certain amount of time
Starting point is 00:07:41 that was just trial and error it's like you know you bring the guy up it's like no that didn't work I had to't even move it further down because this guy's all bent i mean it's uh but uh yeah yeah yeah i'll give him this full va uh benefit for a little while is all we need you know yeah oh man so uh well that need, you know? Yeah. Oh, man. So, well, that's interesting. Yeah, it's interesting because I've already seen some stuff where, you know, they're doing, it was some Navy SEALs who put together a company and they were selling the services to churches and to schools and saying, you know, we're going to use artificial intelligence to try to analyze if somebody's got a
Starting point is 00:08:20 weapon on them or something. And then I guess, you know, call somebody who's going to physically intervene that is also part of the program right there is what you just said it is identifying the intruder before the intruder is able to get close enough to the facility so in theory if you've got the AI giving a warning which man I don't think I'd be able to drive by a school. I am a walking threat, but anyhow, it's up shields and basically identifies the intruder and that they're looking at other ways, drone technology and whatnot, where it would, in theory, prevent the school shootings. Yeah, I've seen this for a while. You know, there was another AI that was called anticipatory intelligence,
Starting point is 00:09:21 and they were trying to scope this stuff out, which is a little bit of what you're talking about. When they first started doing it a couple of decades ago you know they had ai that was watching people walking around and things like that and um call swat team on somebody who's changing his flat tire because this guy's suspicious he's walking around this car he's now squatted down i can't see it because they couldn't see on the other side of the car that he was changing a tire and so they call a swat team on him. So, you know, hopefully it's getting better than that. Well, that's why they call it artificial intelligence. And then you had the advanced intelligence.
Starting point is 00:09:53 Yeah. Yeah. So let Elon and them keep playing with artificial intelligence and, you know, let it insult him. I'm sure he enjoys all that, but it's the advanced intelligence you have to look out for. Yeah, and so I guess we've got a lot of different AIs. We've got artificial intelligence, advanced intelligence, anticipatory intelligence, and I would call the schools aborting intelligence. Well, it's funny you say that
Starting point is 00:10:20 because this system is not as expensive as you may think. I think in theory we would like to keep it around a million dollars to protect a school or a government building or basically your dog if you want it to. But there's no interest in it. And it was like you were talking about with these abortions. People seem to have, and I say people, government, we're not looking at private people's money so that you can't allow, they'll have no pitch for that one.
Starting point is 00:10:58 It was just, we're trying to get the government to help us out with it. But it's like these, like you were saying, with this Planned Parenthood, they've got money raining on them. What do they do? They kill children. What are we trying to do?
Starting point is 00:11:17 Save children. And the duality of it, and we're using technology to do it. Some of this, you know, you're sitting there talking about it. I've got my temper building. And it just so happened that I do want you to put this guy on your show one of these days because he'll represent it properly. He's the one I was telling you about. But, you know, my temper's building because he's out looking, you know,
Starting point is 00:11:44 he's trying to get funding to actually do something that will protect children and you're sitting here talking about the planned parenthood getting all this forgiveness and all this money that rings on me what do they do they kill children and it's like what in the world's going on with our society yeah yeah well let's just take a look at the military industrial complex i mean that's you know, as Julian Assange said, the goal is not to win a war. The goal is to perpetuate a war, to have it go forever. And you just have Zelensky who comes in and, you know, Biden decrees that he's going to give him, I forget how many millions of dollars. But, you know, Congress is supposed to approve this stuff i mean we just are so what is so out of control and and the weapons that are
Starting point is 00:12:25 being sent to ukraine are leaking like a sieve and going everywhere including to terrorist organizations and of course the all the weapons that were left behind in afghanistan are going to terrorist organizations i mean we literally are always in all of these conflicts we're arming both sides of the conflict and knowingly doing so they continue to put the money there no accountability whatsoever for any of this stuff and so yeah it's all about killing uh people and um you know on both sides and they just keep it going amazing well this technology in theory would could apply to individuals where you know you can shoot your your pimps all day long and not harm a person. But they're more fixated on taking weapons away than the next level solution. Well, even to take away bulletproof vests, right?
Starting point is 00:13:21 Yeah, you're not even allowed those. Yeah, and you shouldn't be allowed to sell an insert that somebody could put in their backpack and then use their backpack as a shield. Oh, no, can't have that. No, I mean, it's harder to kill them. Yeah. And we've got to kill stuff, remember? Yeah. I talked about that at one point in time.
Starting point is 00:13:38 At one point, InfoWars, I don't know if they still sell or not. They had a bulletproof thing, and it was a size that you could insert it into your backpack and and there was a situation where this guy had had mental illness issues and he'd gone to the fbi and he said you know i need to take a look at me or whatever but he couldn't get them interested and he winds up getting on a plane in alaska and flying to florida and he was able to go through all the airport security and somehow he took a pistol with him and they never caught it of course you know tsa's failing significantly many times but he gets to the he gets to to florida and he starts shooting people in the baggage claim area and so i said you know well if you had one of these things in your backpack
Starting point is 00:14:20 that you could take on with you on the plane. Since they won't let you, a normal person, take a gun, but they'll let a psycho take a gun. I said, at least you could use this as a shield. And I was attacked by the Daily Beast or somebody. They said, look at this. He's shamefully profiteering off of this shooting. It's like, what? How is that profiteering off of a shooting?
Starting point is 00:14:42 It's crazy. But anyway. Yeah. You know, what's next? Are we profiteering off these a shooting. It's crazy. But anyway. Yeah. You know, what's next? Are we profiteering off a school shooting? That's right. We're living in crazy land. Nothing makes sense anymore.
Starting point is 00:14:53 That's right. I was struck by that when I was doing the research. You know, you said you wanted to do cybersecurity, which, and I was struck by just how absolutely ridiculous this is. Last night when we were talking about this, I sent you that article I had written from 2016 addressing infrastructure, stuff that everybody's going on with the Chinese are doing it, the hackers are doing it. All they've done is change the names. They've changed the technological names.
Starting point is 00:15:24 And this is almost like eight ten years ago it's like hey people here's how you fix it and uh you know so frustrating when it's like this uh every project where you're trying to advance things and do something that's a benefit. Something that is beneficial to society that you're ridiculed for. Yeah, yeah. Or like you with the school backpack. Wait a minute. You're just trying to save a kid.
Starting point is 00:15:57 Yeah, yeah. Yeah, you sent me the article. This is something you wrote back in, I think it was 2016, if I'm correct. Black Energy 3 Trojan you sent me the article this is something you wrote back in uh i think it was 2016 if i'm correct they're not black energy three trojan and the ukrainian infrastructure attack now we just had the last couple of days the biggest ukrainian infrastructure attack uh that they have seen but you talked about this uh uh what is it seven seven or eight years ago and it was something that happened uh december the 15th through january uh of 2000 i'm sorry december the 26 2015 through january the 2nd 2016 as you wrote a massive
Starting point is 00:16:33 worldwide surge in cyber attacks i truly thought a global cyber war had kicked off i'm still suspicious if this was rehearsal for a big, and here we are nearly a decade later. So what do you think is happening? You're talking about it. Yeah. Well, you see that time frame that was used on that Ukrainian exploit? That time frame is coming up because people don't understand this in the holidays. Everybody takes off. So from about December 20 through January 2nd and 3rd, this is hackers' fun time. Everybody's off.
Starting point is 00:17:15 Everybody's off. You've got the Fort Spring guys sitting there, the guys straight out of the Internet School of Cyber you know their degrees sitting there uh and they don't know what's going on i mean they barely protect their own laptop much less the whole system and if this is going to go off this year i would suspect that it's going to go off between december 20 and uh january 2nd and 3rd and oddly, you get the Obama movie out, and then you've got all these warnings, you know, red lights, warning, warning. And it makes me suspicious. And, you know, like eight years ago, nothing's changed, only the news. It's no longer Black Hat Hackers. hackers. Yeah, as a matter of fact, I've got a little 30-second clip here
Starting point is 00:18:05 about people talking about the Washington Post saying there's a whole bunch of Chinese cyber attacks. I want to talk to you about that. Here's a 30-second clip. What's up, guys? John here. Are you ready for the massive cyber attack? Because it could have just started. China has now alleged
Starting point is 00:18:20 to have attacked the U.S. infrastructure. Hackers affiliated with China's People's Liberation Army have infiltrated critical services here in the U.S. This is 1.1 million views in the last couple hours. Every mainstream media outlet is talking about this. What they're not talking about is this eerie connection between Barack Obama's movie that just came out,
Starting point is 00:18:42 and I watched it last night, it was pretty shocking, because everything that they were talking about in this movie is now happening today. Yeah, I talked about that yesterday, and of course, the little clip that I played, Cyber Apocalypse has happened, and it was Netflix money that they gave to Barack Obama and Michelle Obama, and what they produced was this cyber apocalypse. And the little clip there is like, and one more thing, don't trust any white people. You know, it's like, this is, so, I mean, that's what they're selling,
Starting point is 00:19:16 racism in the midst of an apocalypse. I mean, these people will never stop with their hatred of white people. It's amazing to me. But what's going on? I mean, is it really something? How do they know for example i'm suspicious right away because it's a washington post and i'm also suspicious because you know we've had vault seven and um you know that's been put out a few years ago and that was the tools from our government about how they could spoof to be anybody that they wanted they could look like
Starting point is 00:19:41 they were any country uh anyone that they want to do when they hacked into other people. And now not only the manual, but then eventually the code got published. And so how can anybody know that this is the Chinese, for example? I mean, it could be the NSA. It could be the CIA, right? How do they know? Absolutely. You know, the Chinese, now let's put this so this is where it gets all uh
Starting point is 00:20:07 really to the point where you're confusing it's convoluted but how do you know that's chinese haven't uh recruited a diversity hire to do it yeah it could be something really simple yeah you know uh what was that? Congressman, uh, the goofy one, uh, which one? He's he's data of communist, uh, uh, spas. So, I mean, for all I know, maybe he's fine. I better not say that, but yeah. Yeah.
Starting point is 00:20:38 He had some, uh, Chinese, uh, honeypot or something that was, um, uh, he was shacking up. Yeah. Eric Swalwell, yeah. Whatever became of that? He sent her home and said, honey, we can't do this no more. What happened to that? I mean.
Starting point is 00:20:55 Yeah, we don't care, right? Maybe hold some hearings on it, but like every hearing that they hold, they never do anything about it. But, yeah, you're right. It could be the very old-fashioned type of thing that's happening. And again, if they break into something, you know, you look at the Washington Post, and you look at the fact, oh, it's Chinese that are happening. We've got cyber attacks that are happening.
Starting point is 00:21:13 Okay, well, maybe there are cyber attacks that are happening. And you can speak to that if you see that kind of stuff happening. But if there are cyber, that's the only thing we know, the cyber attacks that are happening. For them to identify the Chinese, we that is who the our government wants to identify as the threat in all particular cases they want to use it to establish a precedent to shut down social media websites with tiktok so of course the chinese are going to be behind anything that's bad but they don't know i mean there's absolutely no way that they can know right no it's it's trying to form a narrative yeah you know the old school
Starting point is 00:21:48 terminology for this was iot you know internet of things yeah i don't know what grand name they changed it to they do this uh it's very self-serving and confusing when they change the name it's like black hat hackers are now, uh, uh, threat opportunities or threat somethings. Basically they've been doing this since the dawn of computers, but we've got to change the name of them so that those of us in the know, uh, we can keep our jargon exclusive and other people don't know what we're talking about. You see, so this is what these guys are doing is, uh, uh, trying to hike this up to the point where, uh,
Starting point is 00:22:35 they have exclusivity on the narrative, but going back to the infrastructure, we did a pen test. I don't know, 2015, 20, it was way back. It was for a pipeline, a gas pipeline, like Colonial, except it wasn't inside or to it. We took a feeder line down with a hammer. A kinetic attack, right? A kinetic attack. Yeah, the Neanderthal attack.
Starting point is 00:23:07 What it was, these little IoT cards are about the size of a credit card. And have you ever had a sprinkler system at your house where it's housed in these little plastic containers where you just pop it open six times and all that?
Starting point is 00:23:23 Well, I thought they were housed there. But I had a little clip up there that was the security. You walk up there with a pair of wire cutters, cut it off, whack it with a hammer, and it just starts a whole system, the domino effect, and pretty soon you're taking down miles of a pipeline. Wow. Just with a hammer. Yeah.
Starting point is 00:23:42 Well, they haven't improved this. It's still, all these years later, we could write until our fingers fall off, telling these people about this, and it's still there. And you've told me that story about one industry after the other. They'll hire you to identify a threat, you know, figure out where our vulnerabilities are, and, you know, and then report back to us about how you were able to break this system here. And then you report back to them about how easily the system was broken, and they do nothing about it. Yeah, they wait until the factory across the street from them exploded in no time, and then they'll say, well, we better do something about our security. So you give them the solutions and whatnot, and they go, well, this costs a lot.
Starting point is 00:24:24 Maybe we'll just ignore it. Well, I'm feeling lucky. I'm feeling lucky today. Yeah, we'll keep our fingers crossed. Yeah, I know. And so we see this over and over again. Now, going back to this 2016 thing, you said you were suspicious that it was a rehearsal for something that was bigger. And we've got the World Economic Forum talking about something that is bigger.
Starting point is 00:24:47 Here's our favorite Bond villain talking about what else happened. He's my hero. Klaus Schwab. Hang on a second. When I grow up, I want to be like Charles Schwab. No, Klaus Schwab. Hang on. Disrespect as a small disturbance in comparison to a major cyber attack. This guy can barely contain his enthusiasm.
Starting point is 00:25:31 He does everything except go mwahaha at the end of it. What a cartoon villain he has become, isn't he? There's a good use for SMAI. Put that on there with him. Exactly. Exactly. Yeah, so he's warning Yeah. It's a, so,
Starting point is 00:25:45 you know, he, he's warning everybody. He's warning everybody, but you look at what they have at the world economic forum about this. And it's almost like, you know, well,
Starting point is 00:25:52 if you could do this, then you could get that, you know, it's almost a manual, you know, like everybody says, uh, 1984 was not supposed to be a manual,
Starting point is 00:26:00 but they use it that way. Then I can imagine that they're using his, uh, cyber polygon thing as a, as a manual for what they want to do as well. There's no different than dark winter. Remember? That's right.
Starting point is 00:26:12 When you were on top of that, I remember, I think, you know, when I sent that to you way back when you, the first broadcast you did, it was like January 3rd. I don't remember if it was 18 or 17. And, uh, you know much heat you caught over that? Well, you're a conspiracy theory. You're this, you're that. And suddenly, boom, you were the leading authority when they kicked it off.
Starting point is 00:26:34 Yeah, that's right. Yeah. You told me you were seeing a lot of chat about Dark Wonder 2. And so, yeah, so let's talk about that. And, you know, is this going to be a real thing or is it going to be another dress rehearsal? Are they going to amp it up to the next stage? And I think they amped it up to the next stage. But, yeah, it was a dark winter, too.
Starting point is 00:26:52 And, you know, they had practiced it for 20 years, essentially 19 years. Well, Klaus Schwab sitting here, or Klaus, Klaus, I keep wanting to call him Charles. Klaus is basically so excited about the plans that they have for everything. He's telegraphing what they have planned in the future. Yeah, yeah. Then he'll take credit for it. He'll take credit for it. I warned everybody.
Starting point is 00:27:16 It's like you probably from the blueprints, you know. It's no different than the dark winter. You know, these guys are so excited about it that they're telegraphing it years ahead of time. And, uh, this like the clip you play, he can't contain himself. It's like, look what we've done. Just imagine we're going to see some global power because. And people are like, well, he's not just ignoring. And the guy sitting there clearly tell it telegraphing what they have planned.
Starting point is 00:27:49 It's just a digital dark winter. Yes, exactly. And if we go back to, again, that was 2016. We can talk a little bit more about that. But if you go back to just this last week, stories about what happened in Ukraine. Major cyber attack on Ukrainian mobile operator disrupts banking services and air raid sirens and all the rest of this stuff.
Starting point is 00:28:12 They said this is the, they've had a lot of different cyber attacks since the war has happened, but this is the one that had the most impact on anything. Damaged infrastructure at a mobile operator, forcing the company to shut down network connections to contain the incident and they've got about 25 million customers there.
Starting point is 00:28:30 And the, uh, Kiev, um, uh, internet, um, thing that was affected. And, um, so it shut down, uh, communications, which also included, uh, people being able to be warned about air raid sirens and the thing, but it shut down the banking industry. That was the key thing, uh thing that they did this last week. And so it had a lot of effect. And it seems like it's always, at least so far, not necessarily a direct attack on the grid or on a pipeline or on a bank or on planes. But they get these ancillary systems that everybody depends on.
Starting point is 00:29:02 And they can't operate their business or safely operate their pipeline or safely operate planes. They attack those things to take down the whole system. And then everybody says, Ooh, well, if we don't have that, we just shut the system down and we can't do anything. Well, yeah, it's been that way for years. People have been lulled to sleep on this. And those of us that are out here saying, Hey, Hey guys, you, hey, guys, here's a real problem you might want to look at. Let's solve it.
Starting point is 00:29:29 It's like, well, you're a conspiracy theorist. Go away. Well, here's the data. We're not interested. We're busy. And that's the way the game's played. And yet you've got the techie on the other side, Bill Gates, who I knew since he was poor.
Starting point is 00:29:48 Look at what this guy's doing. He's out there wreaking anarchy, destruction, the whole nine yards, and everybody's taking him like some sort of big authority. Yeah, yeah. And, you know, Bill Gates, he don't need money. He's got people throwing money at him so he can go on and destroy and kill. And he goes back to what we started the conversation with is, what in the world are these people thinking?
Starting point is 00:30:13 Yes. Yes, exactly. Now, you know, when you look at this and you're trying, somebody calls you when they've had a, you know, a lot of times they'll call you to, again, try to find vulnerabilities and identify them for them. But a lot of times they'll call you to again, try to find vulnerabilities and identify them for them. But a lot of times they'll call you after something has happened to do an investigation.
Starting point is 00:30:29 And you've told me many times that it's usually an inside job. Surprisingly, isn't that interesting? Yeah. Talk a little bit about that. You know, the motivation of these, these ransomware attacks or some other things like that,
Starting point is 00:30:41 it's usually somebody on the inside or more. Okay. Well, let's say you like to call in. Well, I gotta be careful with that one. Let's uh, let's say you're, you're, uh, okay, David, you're, you're, uh, looking at the retirement at your age and, uh, you're an executive of let's say abc uh pipeline and you're like i'm really disappointed in my uh retirement package how can i fix this oh i know i can internally launch a uh ransomware attack and select a million dollars. Hey, I just saw my retirement problem. Yeah.
Starting point is 00:31:28 You get a free, you want to fire me while I quit? I retired free room and board in a prison for 20 years. If they catch him, right. That's one retirement. Wait, when's the last time you read about a hacker going to a prison for anything? That's right.
Starting point is 00:31:42 That's right. Yeah. I mean, look, look at the colonial pipeline. When's the last time you heard anything about that? Suddenly they discover it and they drop it like a hot potato. Or take the no-tan. And all that guys. I mean, you had the whole East Coast without gasoline for days or a week.
Starting point is 00:31:59 That's right. And that's some pretty extreme stuff. But you didn't hear about anybody getting charged with anything on that. That's right. That's right. That's right. Or even if you have a government system, like the FAA shut down as many planes as they had on 9-11 aftermath, and that was the NOTAM system, and that went on for something like 12 hours or something like that, and they said, oh, it's not a hack.
Starting point is 00:32:23 We haven't been hacked. We can't get hacked and then immediately after they came back online canada went down for the same thing and that's this auxiliary system that notifies everybody if there's some kind of a problem at an airport or a runway or something like that and when they when that thing broke down they just said all right ground the planes and so i always uh have believed it'd be interesting to uh interested to know what you think about this but i've always believed that the notam uh shut down at the faa and then following with that with canada and there's only lasted about an hour and a half but it happened sequentially i've always believed
Starting point is 00:32:58 that that was a cyber hack that they didn't want to admit to. Sure. I mean, I've seen a few videos and articles of people literally sitting on the plane hacking it. You know, you've got to be pretty low IQ to crash, you know, be sitting on a plane, you want to crash what you're flying on. But I mean, it does exist. I guess they got a Gremlin app for that, right? Just like the Twilight Zone. Right. I mean, why as well start writing movies about this stupidity?
Starting point is 00:33:31 But it would probably be more productive. But, you know, let's go back to, you remember the Norfolk Southern train wreck up in Ohio? Yeah, yeah. And how we were looking at that and i sent you that clip of this uh railroad worker open up one of the shanties and here's the computer system here's the uh here's the radio oh look the passwords are written on the wall that's right yeah exactly yeah yeah the password to this you know you just walk into the little shed and it's like yeah let's not we're gonna keep losing this thing and i keep getting calls in the middle of the night.
Starting point is 00:34:05 Let's just write the password on the wall here. Yeah. I can't remember the password. Let's write it on the wall. So all you do is cut the lock off the little shack. You go in there, you can play on the radio. You know, it's like, uh, whenever you decide to broadcast on radio or you can tap on the computer and have trains doing all kinds of fun things. you know,
Starting point is 00:34:29 look at what happened in Ohio. The impact that had. And yet you can cut the lock off of a shack and pretty much seize control of a railroad line. Yeah. You know,
Starting point is 00:34:42 you remember Adam's family where uh where gomez is always uh crashing his toy trains yeah yeah absolutely well you know you could be doing that in real life and it is so insane but to put uh upgrades in there and remember passwords is hard and we cannot do hard things in this country anymore. Yeah, it's with all the signs alongside the highway roads, you see them all the time. Warning zombies ahead, warning T-Rex or whatever. They put all kinds of crazy messages on there. And the reason that that happens is because they ship them all with the same password and nobody wants to even change it you know the default password is right there in the manual as you sent me some of the some of the stuff showing that they've got the
Starting point is 00:35:32 the password in the manual for the other equipment as well absolutely so i mean but but it's it's not just that industry it's everything these are the back doors. Yeah. These default passwords. And it doesn't matter if they disclose what they are or not. It is the back doors that control the system. So instead of relinquishing, when I sell you a software, instead of relinquishing control of it, I have got the back door. You may not. You, the owner of it, may not, the back door. You may not, you the owner of it may not, but I do. Yes. Yes.
Starting point is 00:36:09 And you pointed out, you know, there's different levels of it. You know, the developers will put in a back door. The owner might have his own, you know, access with a password. Governments will get their own access to it. So there's all these different people have access to different aspects of the software there with the back doors. And, you know, it is, it's amazing to me because as we look at our, as our system becomes more and more complex, and even with the extent as Jack Lawson,
Starting point is 00:36:39 who I've talked to many times about all this stuff, he says, you know, you look at how we've got our just-in-time delivery. And so that means that at all these different stages of product manufacturing as well as delivery, you've got all these different links there. And all you have to do is break transportation or break one of those links, and you've got the system all balled up. And then we saw, after he and i talked about that we saw what they did with the lockdown and so we have this very fragile system of
Starting point is 00:37:10 distribution and manufacturing that is very complicated and distributed and then we also have uh all of this automation and computer programs which are all uh very vulnerable very vulnerable even to the extent we're talking about earlier about vault 7 they stole that from the CIA, the NSA, all these guys who are supposed to be the most sophisticated. They got hacked and had their stuff stolen. We've had all the Pentagon personnel files hacked and stolen and things like that. So none of this stuff is secure. And so the question is, you know, as he pointed out, as the World Economic Forum put out, and let me just show people this. Internet governance, this is from the World Economic Forum, what happens when, somebody underscored that, the Internet shuts down?
Starting point is 00:37:53 In other words, not a question of if, but it's when it happens. And as they point out in their article, when we're talking about a shutdown, they said, we're talking about the government doing it to its own people. And they're doing this everywhere. But, of course, that's authoritarianism. But, you know, who is, uh, when we're talking about a shutdown, they said, we're talking about the government doing it to its own people and they're doing this everywhere. But of course that's authoritarianism. Uh, but you know, who cares? Right. When you got the kill switch. Yeah, that's right. The kill switch.
Starting point is 00:38:13 Yeah. But you see right there, you go back to the WF. There they are. Bright red flashing letters predicting, not predicting, but actually telling you it's going to happen. That's right. That's right. And saying it's going to happen before 2025 or sometime in the next few years. So sometime in 2024, sometime 2025.
Starting point is 00:38:36 So everybody's trying to make a guess as to when it's going to happen. Personally, I think that it'll be a situation like we saw with 9-11 where they'll pull this off after the next election. And I think a large part of that is going to be to try to—this next president who comes in after the 2024 election, he's going to take office in 2025. And he's going to have four years, and it's going to take us right through all this 2030 great reset stuff that they want, where they want their new society and thereby 2030. So I think they will pull something like this off. They will use it to reset the board, to reset society. And I think a lot, you know, regardless of who happens,
Starting point is 00:39:14 who happens to win this thing, they're going to be the tool of these people to change society like we saw back in 2020. You see, the means that they'll accomplish this through will be a new and improved Patriot Act, taking even more rights. Yes. I've got the yard people out there, and he seems to want to stay under my office window with the leaf blower. It's not too loud.
Starting point is 00:39:42 It's okay. That's fine. Okay. Yeah, it'll be interesting to see what happens now. Let me ask you about the F 35 thing that happened because, um, uh, we've just had, uh, a story that went public in the, uh, South China morning post. And it was a Taiwanese, uh, Lieutenant Colonel who has been arrested and charged. And the charging papers, the allegations from the prosecutors
Starting point is 00:40:07 about this guy was that uh he was talking to the chinese about stealing a chinook helicopter american helicopter and he was going to fly it to a rendezvous part place and turn it over to the chinese put it on their aircraft carrier they were going to then give him a new life in Thailand and some money with his girlfriend. And so they found out about this, and they arrested him. But, you know, when we look at the F-35, you and I were joking about that. You know, the F-35, they've hacked the plans. They've reproduced the plane.
Starting point is 00:40:43 Maybe not everything in it, but, you know, maybe they did everything in it. We don't know. We can see the outside. They've reproduced the plane. Maybe not everything in it, but maybe they did everything in it. We don't know. We can see the outside. They reproduced it. They hacked the plans. And so it is certainly conceivable that they had the capability to hack into the F-35 and even eject that pilot. And once again, using the Colonial Pipeline, it was an insider that was going along with the program. But do you remember a couple of years ago where the Chinese was actually literally hacking destroyers, American destroyers in the South China Sea?
Starting point is 00:41:19 And we were going back and forth on that. I showed you how they did it. Yeah, yeah, That's right. You know, I'm more worried about a nuclear armed ship being compromised on an F-35. Yeah, that's right. But this is all history. And,
Starting point is 00:41:36 uh, once again, you raise red flag, Hey, they're going to take over your ship. The people, the personnel on the ship, they're just going to be bystanders.
Starting point is 00:41:45 Mm-hmm. Mm-hmm. And no one will take it seriously hopefully they've been hopefully i mean for all i know maybe corrected these uh okay i'm fixing to go throw a brick at the dude that's one of the reasons why you were laughing about it with the f-35 uh you said that can you imagine the surprise of the pilot he's going along all of a sudden that's actually what happened now that they disclosed that he's flying alone mind his own business he knows he's being ejected out of the plane and the only question is a lot of people said so then what happened to the plane and uh they came up with a cover story that would never made any sense that you know nobody saw this plane you got one guy that they talked to it's like yeah i heard but do you see anything no i didn't see anything you know and uh and so supposedly uh
Starting point is 00:42:30 this this plane went down right away but that wasn't the original story so a lot of people said so they hack this thing and they fly it to a rendezvous where they can uh uh you know grab this thing or what is what is uh what really happened with it? But, uh, I don't know if you heard anything else about that F 35, uh, oddly enough, it's like the colonial pipeline. It just goes dark, you know, give everybody 30 seconds, their attention span time and, uh, don't forget about it. Yeah. Oh yeah. You know, anybody brings it up, uh, call them a conspiracy theorist. You know, hey, you know, we already told you what happened there. No, you didn't.
Starting point is 00:43:08 Yeah, we did, conspiracy theorists. Okay. You know. Yeah. Yeah. That's the way the program works now. Absolutely. Yeah.
Starting point is 00:43:16 And going back to this article about Black Energy 3, the Trojan, that you talked about back in 2016. Again, this is a ukrainian electric grid attack and um and at the time you said um a lot of this stuff is smoke and mirrors you said but pay attention to this one thing what was it that they should pay attention to you know david that's been so long ago i don't remember remind me you got black energy three plug-ins a file system operation system information, parasitic infector, the fact that it was remote. You believe that it was remote execution.
Starting point is 00:43:52 Yes, yes, yes, yes. Okay, it was RAT, remote access, basically remote access control. And, I mean, if you can install the malware that's wrapped uh i mean you pick the facility let's say three mile island just because it's infamous i can sit here uh on my iphone and have three mile island doing all kinds of neat stuff there's no different what what happened in iran with their nuclear reactors well their program overspeed the system to where it collapses and puts them out of business for years uh it was basically that type thing you don't have to go in there and create explosions and chaos you can destroy equipment that takes years to rebuild yes yes you know and
Starting point is 00:44:48 especially when you look at how you know when i was talking to jack lawson last week he said yeah okay we got this cyber security stuff but he goes look you know you you can and we've already had a situation on it theoretical you can have a situation where some people can come in with a gun and shoot up a transformer and uh it takes a long time to get those transformers replaced and when you look at the fact that our borders are wide open it's no wonder you know that's just a that's a physical example of how cavalier and disinterested our own government is about protecting this country it's infrastructure and other things because any uh state and um enemy of ours you know we're talking about the
Starting point is 00:45:26 iranians or the chinese or whatever they could all just walk through the border and they could just start you know positioning themselves in place and taking out our entire electric grid with physical damage that isn't going to be booted back up again they could do that very easy do you find it strange they all qualify as a diversity hire? Yeah, exactly. Diversity spies. Yeah. You know, it goes back to what we were talking about with the Patriot Act and the TSA. You and I cannot get through the airport.
Starting point is 00:45:58 We're American citizens. We have really, well, I don't have any reason to harm America. But like the other 99% of Americans, we don't really want to blow up where we live. But you look at us, we're being molested, scammed, poked, prodded, and everything else just get on a stupid airplane. And you've got millions of who knows who coming across the border spreading out. Yeah. Hey, welcome to America. Oh, yeah.
Starting point is 00:46:28 Yeah. I mean, how serious are they about security? They locked the border down with the Trump orders. Nobody's coming into this country, blah, blah, blah. But then when they have the illegal aliens, they were flying them around, you know, like Typhoid Mary, if they really believed this narrative. They don't have to wear any mask, and we're going to transport them from point A to point B and no issues at all about that. We just had a, a picture.
Starting point is 00:46:50 I saw a report. I didn't get into details of, but they, they got a picture of a guy who stenciled on a Nazi swastika on a, I think it was a Jewish building or something is why he did it. And, and yet they got him on surveillance footage, and it was a Chinese guy, and it was an illegal alien Chinese guy.
Starting point is 00:47:09 Now, what he's trying to do is he's trying to create social friction by doing that, putting a swastika on a Jewish facility. But he's a Chinese guy coming in to do this, just trying to mix it up, you know, just trying to get people fighting with each other. Yeah, well, that's one of the programs but i think it was you and joe biggs that went down to the border and didn't y'all uh or was it just joe biggs himself that down that al-qaeda camp right across the border no that's joe big so i wasn't with him yeah okay oh okay well i knew you and joe uh ran some exploits and
Starting point is 00:47:42 y'all really yeah yeah he really uncovered some some eyes startling stuff we got into the asymmetric warfare facility at the place that's now been renamed uh something else but it was at the time it was ap hill and uh yeah but joe went to the border on his own and found that camp there well i'm quite sure if they have a camp sitting there on the border they uh uh they're probably already here. I mean, I'm just making crazy guesses, but why would Al Qaeda have a camp on the border? Yeah, that's right. Yeah.
Starting point is 00:48:12 And what are they up to? And they probably got, uh, lots of pallets, a hundred dollar bills and weapons that were left behind in Afghanistan. That's what you think? Yeah. Yeah. They have all kinds of cool stuff that we aren't doing. You know, PP, that forbids us from having.
Starting point is 00:48:28 Yeah. You know, look at their names. Those guys out in Oregon, they were doing those exposés. Look how they were treated. What were they doing? They were running cattle on land. Yeah, yeah. You know, you've got government out there shooting them. Yeah.
Starting point is 00:48:47 Yeah. We had Al-Qaeda on the border. We have people roaming around this country. We don't know who they are. They don't know who they are. We have the cartels. Again, we have the Patriot Act to keep us safe. Yeah.
Starting point is 00:49:01 As you're talking about that, it is, about that, it is painfully obvious to everybody that our government does not care about protecting Americans. It is trying to protect itself from Americans. It's trying to surveil Americans, and it's trying to protect power abroad, and it cares about the borders of other countries, but not about our own countries. And I think a good example of this is this Section 702 reauthorization. There's a lot of smoke and mirrors that are happening with this, whether or not this is in, you know, whether it's going to be in the NDAA
Starting point is 00:49:34 or whether they're going to vote on it today. Thomas Massey yesterday said, I'm a hell no on reauthorization of the FISA 702 program that allows warrantless surveillance of Americans, but it looks like the Senate will attach it to the National Defense Authorization Act tomorrow, meaning today, and the House will probably vote on it on Thursday. Shame, he says. And other people are saying that this is like the Patriot Act on steroids, because one of the things that it's doing, and I wanted to ask you this, Gautri, one of the things that it's doing i wanted to ask you this um goat tree one
Starting point is 00:50:05 of the things that is different about this one is that um you know prior to this the government has been able to compel uh anybody that provides communications like phone companies and things like this they can compel them to give information but now this would give them the authority to compel anybody anywhere that is around any computer system whatsoever. I mean, it could just be a person doing maintenance. It could be a hotel or a restaurant or a coffee shop where you sign on to their Wi-Fi and it could compel them to turn over their records or to spy on you and other things like that. I mean, they're really extending this.
Starting point is 00:50:50 I mean, what does it tell us about our own government when they are this paranoid and conspiratorial? You know, you're talking about that. And years ago, I told you about the Long Lines building. Here's your listener to the project. Go search for a Long Lines building. The original one was in New York, and it became public, and they shut it down. Now you've got Long Lines buildings in all the
Starting point is 00:51:23 major cities. Okay. The program they use, the exploit's called Titanfall, T-A-I-T-A-N-F-A-L-L. They've been doing this for years. It was illegal. Now they're trying to make it legal. Secondly, AT&T was hacked a couple of years ago. You had, quote, hackers take all this information. Everything you have, if you have an AT&T account, they took it.
Starting point is 00:51:55 Credit, everything. You know how AT&T got out of any kind of penalties or anything for that? They said, look at your user agreement. You agreed to this. So that's how they get away with this. There's never no penalties because when you sign the user agreement, you're basically giving them your permission to hack you. Yes.
Starting point is 00:52:20 And they've laid this foundation quite carefully and done it iteratively over a period of time. If we go back and we look at AT&T in the middle of the 20th century, where they were the phone company, had a monopoly essentially. And they would collect pin numbers on people, and it was actually taken to the Supreme Court. The Supreme Court said, well, if you're using them for your phone service, that means all the information that they have on you belongs to them, not to you. And so they can come to them and ask them, I'd like to have all the information about David Knight. They don't have to.
Starting point is 00:52:56 You're not saying, well, I'm compelling you to do this. Here's my search warrant. You just go to them and say, I'd like to have all that information. And they can voluntarily turn it over. As a matter of fact, on January the 6th, we saw the Bank of America voluntarily, quote unquote, voluntarily. And I guess maybe they did try to curry favor, but they voluntarily gave information to the FBI about anybody who bought anything anywhere around, you know, Washington, D.C. On those dates, as well as anybody who bought guns anywhere and let them coordinate all that stuff.
Starting point is 00:53:26 And, uh, also about people who are flying. So you got all these different corporate spies out there who are putting the stuff in. And that was a key thing about CISPA and ACTA and SOPA and PIPA and CISPA, C-I-S-P-A, uh, cybersecurity infrastructure act. They pulled out the P. The P was there to protect the companies who were going to turn the data over to them. It was to protect them from lawsuits from customers.
Starting point is 00:53:54 But you can't sue them because you've given them permission to turn it over. Yeah, oh yeah. It's in your user agreement. Yeah, yeah. Well, I think part of it was, you know, you had some companies who did not want to turn it over and and so you know they could say well i i don't want to do this and i might get sued because i don't have it in my user agreement and so the government comes through with
Starting point is 00:54:16 this new legislation and says no i'm not going to let them sue you so now turn it over to me you don't have to remove their excuse to remove anything where they would push back on this with reluctance. They said, no, we've indemnified you against that. So now give us their information. And now they're taking it to the next step. You know, it's not just going to be your phone company or service provider. It's going to be any business anywhere, a restaurant, a coffee shop, anybody, a motel. All of them are going to be turning this stuff over to the feds.
Starting point is 00:54:45 Yeah. But that applies to us, the United States citizens, not the illegals. That's right. That's right. Yeah. So, you know, you have to sit back and question what the motives are. You know, uh, that's like with this this technological security and these technological advances there's none being made you know we go back to ukraine you're you're you know we're reading
Starting point is 00:55:15 what they're predicting right now in ukraine ukraine seems to become uh the the petri dish of the world. I mean, you know, okay, we got a new killing system. Let's give it to their military. If they get blown up, who cares? Oh, look, let's hack their infrastructure. Oh, look, we can wonder, you know, laundering money on an industrial scale there.
Starting point is 00:55:44 And that's what I think it's been about a lot. I think that's what's been the base of a lot of these wars since Vietnam. As I said before, you know, Vietnam was really about them testing out weapon systems. We don't care who gets killed. Let's just stay there. We'll refine and test our systems. It'll be a test bed. Oh, okay, the Vietnam War is over. Let's have another one somewhere else.
Starting point is 00:55:59 They just keep these wars going. And as you said, it's a petri dish for all of this stuff. We can test cyber warfare. We can test kinetic warfare. Weri dish for all of this stuff we can test cyber warfare we can test kinetic warfare we got all these different weapons that we can test let's just keep the war going exactly and uh you know going back to what i was telling you at the start where if you actually were able to to use quantum magnetics and quantum levitation and all this quantum technology it were right on the cusp of deploying you can stand all that can you imagine the horror that you have a net over a whole country you can't have a
Starting point is 00:56:36 war because bullets are basically frozen in air yeah that is amazing it is we named it some real sci-fi stuff and of course you know they're starting to deploy um uh laser beam or should say a higher high energy directed beam technology or whatever you want to call it uh you know it's anti-ballistic stuff as well uh but you know just real quickly back to the 702 thing one of the reasons that you look at this a lot of people poo-poo it's yeah it's nothing new and it's nothing dangerous and there's nothing to see here move on but one of the reasons that a lot of people are concerned about this is because you had a fisa court uh a friend of the court posted a blog to warn people about this and as one person said i can't overstate how unusual it is for a fisa court amici to take to the airwaves
Starting point is 00:57:28 in this manner and so they're concerned about this and how it's going to be used internally and we'd be foolish to ignore it but this is our own government uh to hack our identities to follow us to spy on us with everything and of course this seems to be every day I see this innumerable ways that they want to, you know, follow us, track us, you know, index, stamp index, brief and debrief us, as the prisoner said. It's just a sensational, insatiable appetite to put us in an open air prison. Don't forget brain chips and chips and all that they want you to have too after we back you yeah oh yeah that's right yeah yeah that's the thing about that's the thing about our friend musk it was like uh so you're telling me that you you know we can trust the world's richest man who became that rich because uh he did everything the governments around the world wanted him to do and
Starting point is 00:58:23 he's also a technocrat and a transhumanist. So yeah. What's to worry about it. Who wants to get into our minds? You know, it depends on what mood Elon wakes up with, you know, is he going to be good today?
Starting point is 00:58:36 Or is he going to destroy the world? Yeah. Oh yeah. Yeah, it truly is. And, uh, as long as he keeps up the facade,
Starting point is 00:58:43 well, I'm depending free speech. Well, Elon must be good. Yeah. Oh, yeah. I think he's playing. I think he's playing a long game there. He has to be.
Starting point is 00:58:53 Yeah. Yeah. Yeah. I think it's a game that he's playing that is going to be for his own good because that's the way these guys operate. There's not any of these billionaires out there who are altruistic saviorsors but everybody wants to believe that it's truly is amazing uh there is no tony stark out there that's a a creature of the comic books and it is comical that people continue to think that and to place their hope on that it truly is amazing to me but uh of course we've got trump who
Starting point is 00:59:22 is cutting up the suit that he took his mugshot and into selling it off for thousands of dollars to suckers. I mean, it's amazing what these people will do. And it's amazing. I, again, I don't fault Trump as much as I do the people who are sending him the money and following everything and making him their little demigod. I mean, it's just amazing to, to watch this happen. And, and, and it's never ce to to watch this happen and and and it's it never ceases to amaze me how these people here we are three years after all this stuff and people still haven't caught on and they get furious with me it's just unbelievable you know when i started telling about this they don't yeah you know it's like a taxing citizens. You point out, hey, dudes, y'all are funding your own demise.
Starting point is 01:00:08 And they're like, shut up, conspiracy theorists. Without the funding, none of this could happen. That's right. That's right. Well, we certainly do have an out-of-control government, and we have a government that's not interested in addressing known vulnerabilities. And as you've seen, it's not just the government, but it's also individual corporations. They hire you to tell them what's wrong, and then they don't do anything about it. And so we've got the Congress who will hold a hearing, but they will never do anything
Starting point is 01:00:37 about anything. So that's kind of where we are right now. We're kind of paralyzed in this system, and it's really strange how everybody's just kind of frozen and watching it happen uh it seems like no way to to get anybody to activate to do anything about it even in their own interests you know when you look at these people in congress um they are when they allow us to be censored us to be spied upon of course there's that is an interesting person, and they're going to get the same treatment in spades, and they don't care about it. It truly is amazing. Well, it's always great talking to you, Goat Tree, and thank you for coming on and talking to us about this.
Starting point is 01:01:16 People need to be aware of this, and you need to be aware that you can do some things about this, even if the people in power are not going to do anything about it. Always good to talk to you, Goat Tree. Thank you. Appreciate it. Well, my pleasure, David. You take care, and I hope your health gets better.
Starting point is 01:01:31 Man, you made a really good Christmas album. Well, thank you. I really do appreciate it. By the way, thanks for the plug. Find it at thedavidknightshow.com, and you can get a download version of that there. So thank you, Goat Tree. I appreciate that. And thank you to everybody. Sure thing version of that there. So thank you. Goat tree. I appreciate that. And thank you to everybody.
Starting point is 01:01:47 Thank you. Thank you. All right. Have a good day, everybody. If you like the Eagles, the cars and Huey Lewis in the news, you'll love the classic hits channel at APS radio, love the Classic Hits channel at APS Radio.
Starting point is 01:02:05 Download our app or listen now at APSradio.com. The David Knight Show is a critical thinking super spreader. If you've been exposed to logic by listening to the David Knight Show, please do your part and try not to spread it. Financial support or simply telling others about the show causes this dangerous information to spread farther. People have to trust me. I mean, trust the science. Wear your mask. Take your vaccine.
Starting point is 01:02:59 Don't ask questions. Using free speech to free minds. It's the David Knight Show.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.