Skip to playerSkip to main content
  • 2 minutes ago
welcome
Transcript
00:10Welcome to the debate.
00:12Right now, sitting in an open, unencrypted database on the web, there are over a million
00:18highly explicit images.
00:21But here is the terrifying part.
00:24The people in those photos never actually took them.
00:26Exactly.
00:27They are completely innocent teenagers.
00:30Their faces were pulled from public social media profiles and weaponized by artificial
00:35intelligence in a matter of seconds.
00:37We are looking at a fundamentally new era of digital extortion.
00:42And the real world consequences are already devastating.
00:45I mean, we've we've seen the tragic loss of 16 year old Evan Butler to a highly organized
00:50blackmail scheme.
00:51It's an event that is becoming horrifyingly common.
00:54Which brings us to the core of our discussion today.
00:56If you're a parent listening to this or just someone trying to understand the sheer scale
01:01of this online extortion epidemic, the immediate question is, how do we stop it?
01:07Where is the critical point of failure?
01:10I argue that our primary focus must squarely target the unregulated technological infrastructure.
01:15Right, the tech platforms.
01:17Right, the tech platforms.
01:18Yes, negligent tech platforms, leaky generative AI tools, and indifferent social media giants
01:23are the catalyst here.
01:25They have completely erased the barrier to entry, and by doing so, they have manufactured this
01:30crisis.
01:30I hear the focus on the tech, but if we only look at the software, we are entirely missing
01:35the engine driving the crime.
01:36My perspective is that focusing predominantly on the technological tools obscures a much
01:41darker root reality.
01:43Which is?
01:43What we are dealing with is deeply entrenched, highly organized transnational syndicate
01:50crime.
01:50It's driven by severe economic disparity.
01:53If we don't treat this fundamentally as a socioeconomic and geopolitical crisis and dismantle
02:00the human networks running these operations, these syndicates will simply adapt.
02:05They will bypass whatever technological barriers we try to erect.
02:09But to understand why I place the blame on the technology, you have to look at the sheer
02:14terrifying scale of what this tech enables right now.
02:18Cybersecurity researcher Jeremiah Fowler didn't just find a few bad actors.
02:23He uncovered a database where roughly 10,000 new fabricated images were being added every
02:30single day.
02:31The volume is staggering.
02:32There's no denying that.
02:34It is.
02:35Previously, victims of sextortion were typically individuals who had actually been caught in
02:39coerced into sharing intimate content.
02:41That was the bottleneck, right?
02:43Generative AI has removed the bottleneck completely.
02:47Yeah, but the mechanics?
02:48Well, the mechanics behind it are what we really need to understand.
02:53We are looking at AI tools like Magic Edit and DreamPal.
02:57These were originally integrated into platforms offering standard digital marketing services.
03:02But they were explicitly linked to creating sexualized content.
03:06I mean, DreamPal explicitly noted in its FAQ that filters for explicit content were disabled,
03:13right?
03:14Exactly.
03:15They literally said it was so as not to limit users, quote, intimate fantasies.
03:20Which is just a grotesque abdication of corporate responsibility.
03:24Totally.
03:25Let's break down how this actually works for the listener.
03:28A bad actor takes a totally innocuous photo, say, a kid holding a trophy at a baseball game.
03:35They feed it into this AI.
03:37The algorithm maps the geometry of the face, matches the lighting, and within seconds overlays
03:42it onto a completely fabricated, hyper-realistic, explicit body.
03:46Right.
03:47The technology creates a threat vector out of thin air.
03:50Exactly.
03:51It isn't just facilitating a crime that already existed.
03:54By making it so accessible and scalable, the algorithm is doing the heavy lifting.
04:00Anyone can become a victim now, entirely regardless of their own actions.
04:04That is a very real threat landscape, yes.
04:07But you are isolating the tool from the hands that wield it.
04:10Have you considered the organizational structure that is actually weaponizing these apps?
04:15You mean the networks in Nigeria?
04:17Yes.
04:18If we look at the recent BBC investigation into the hustle kingdoms of Lagos, we see a picture
04:24that is far more structural than just opportunistic bad actors downloading an AI generator.
04:29You're talking about the operations in Makoko, right?
04:32Exactly.
04:33In impoverished districts like Makoko, it is essentially a massive settlement built on stilts
04:38over the Lagos Lagoon.
04:40And amidst this extreme poverty, you have these highly structured scamming syndicates.
04:44We aren't seeing isolated teenagers playing with image generators in a basement.
04:49Right.
04:49It's organized.
04:50Highly organized.
04:52We are seeing operations that physically and structurally resemble corporate call centers.
04:56You have dozens of young men sitting shoulder to shoulder in a room with laptops.
05:00They are passing around fake profiles, trading highly refined psychological scripts, and systematically
05:06running victims through a designated sales funnel.
05:09Wait, so they're literally running this like a 9-to-5 corporate call center?
05:13That is exactly it.
05:14It's an enterprise.
05:15The profits all flow upwards to syndicate leaders, figures operating under aliases like
05:21Ghost.
05:22And the underlying driver here is cold, hard economic desperation paired with ruthless efficiency.
05:29Right.
05:30I mean, listen to the words of one of the scammers, Ola.
05:33He stated plainly to investigators, I don't feel bad.
05:37I need the money.
05:39They are systematically grooming young boys in their early teens into these networks in Lagos,
05:43imposing debts on them and teaching them the trade.
05:47Technology is merely the latest vehicle for this established criminal enterprise.
05:50I hear you.
05:52But let's pause on the vehicle versus the engine for a second.
05:56Before we can assign accountability, we have to agree on what is truly accelerating the crisis.
06:02Okay.
06:02Is the organized network simply upgrading its tools or is the ease of the technology fundamentally
06:08manufacturing the scale of the crime?
06:10Think of it this way.
06:12Giving a burglar a master key to every single house in a city doesn't just make burglary a
06:17little easier. It fundamentally changes the nature and scale of the crime itself.
06:21A master key is a powerful tool, certainly, but it's still just a tool.
06:26But it alters the structural reality of security. Without generative AI, creating a convincing,
06:32fake, explicit image required hours of meticulous, skilled Photoshop work. You had to match skin
06:39tones, fix shadows, blend pixels. The barrier to entry was high, which naturally limited the number
06:45of victims. True.
06:47Now, AI lowers that barrier to zero. The intention to extort might exist in Makoko, but the capacity
06:53to extort at this massive, global, industrialized scale is entirely a product of the algorithm.
07:00The ease of the tech is the true catalyst.
07:02I have to push back hard on that. The intent, the organization, and the psychological manipulation
07:09precede the tool entirely. These syndicates are not opportunistic bottom feeders who just
07:15stumbled upon an AI app.
07:17But they rely on it now.
07:19They treat it as a capital investment. The source material highlights a fascinating,
07:23if disturbing, case of a scammer who spent $3,500 on a professional-grade face-swapping
07:29deepfake application.
07:30Wow. That's a massive amount of money in that economic context.
07:34It's a massive capital expenditure. And it gets more complex. They didn't just buy the software.
07:40They actually hired a live woman, Rachel, to act as the face of the con. The software mapped her
07:46real-time facial expressions and movements onto the deepfake, so that when they video-called victims,
07:51the digital mask didn't glitch or tear when she turned her head.
07:54Oh, that is chilling.
07:57Right? That is a calculated business expenditure designed to maximize returns.
08:02But doesn't the fact that they're investing heavily in deepfake technology actually prove my point?
08:08I mean, the technology is what allows the scam to be so convincing and so profitable.
08:13How so?
08:14Well, without the deepfake, Rachel is just a person on a screen. With it, she's whoever the victim most
08:19desires or trusts. The tech scales the manipulation.
08:22It proves they will utilize whatever resources are available to them. But the driving force remains
08:28human enterprise. To understand how deeply cultural and systemic this is, look at the evolution of the
08:35Yahoo Boys, a term for these internet scammers in Nigeria.
08:38Right.
08:39They are currently transitioning into a subculture they call Yahoo Plus.
08:44Wait, what exactly does Yahoo Plus entail? How does that differ from just running the
08:49standard scam scripts?
08:50It brings a deeply spiritual and cultural element into the cybercrime. It involves young men visiting
08:57traditional healers and cyber spiritualists. We are talking about physical ceremonies involving
09:03the sacrifice of a dove spilling its blood to cast spells.
09:07You're kidding.
09:09No, it's real. The belief is that this ritual will make their remote digital victims more compliant
09:15and will spiritually bind the scammer to sudden wealth.
09:19That is surreal. So they are tying traditional spiritual rituals directly to the success of an
09:25online extortion campaign.
09:26Yes. And that is exactly my point. This is not about an algorithm. This is a deeply entrenched
09:32socioeconomic subculture where extortion is viewed as a legitimate, even spiritually sanctioned
09:38path out of poverty. You cannot patch a cultural and economic crisis with a software update.
09:43I mean, that is a fascinating, dark reality. But let's bring this back to the practical
09:50reality of stopping it. The cultural aspects in Legos are profound. But since the tools and
09:56the networks are both highly sophisticated, we have to ask who bears the practical burden
10:01of stopping the abuse today?
10:03Law enforcement, ideally.
10:04But who actually has the power to cut off the oxygen to this crime right now? I point the finger
10:10squarely at the tech giants. Platforms like Meta and Snapchat, they own the infrastructure where
10:16this psychological manipulation occurs.
10:18They certainly provide the arena, but you are asking them to police human nature.
10:23I'm asking them to police their own deliberately designed ecosystems. Look at the tragedy of
10:28Brandon Guffey in South Carolina. His 17-year-old son, Gavin, took his own life after being targeted
10:35by these scammers on Instagram.
10:37Yeah, that case is heartbreaking.
10:39It is. And after his son's death, Brandon realized that while one account used to blackmail
10:45Gavin was removed, other accounts operated by the exact same scammers remained completely active.
10:52Meta claims they have 40,000 people working on safety and security globally.
10:56They tout a $30 billion investment over the last decade.
11:00Which sounds impressive on an earnings call.
11:02Exactly. But the reality internally is vastly different.
11:06Whistleblower Arturo Bejar testified under oath to Congress that Meta's leadership routinely
11:12ignored repeated data-driven warnings about children being in harm's way on their platforms.
11:18Right.
11:18When Meta puts out a press release saying they took down 63,000 sextortion accounts linked to
11:23Nigeria in a single sweep, critics rightfully point out that this operates more like a PR stunt than
11:29a structural fix.
11:30Oh, it is absolutely a PR stunt.
11:32Right. Because if you have the algorithmic capability to identify and pull down 63,000
11:38malicious accounts in one day, why are children still being actively targeted the next?
11:44Because the accounts are easily replaceable.
11:46But it's also because the platforms lack the structural incentive to fundamentally change their
11:51architecture. They could implement default messaging constraints for minors. They could require robust
11:56identity verification. But they don't because friction reduces engagement. They are the gatekeepers and
12:02they're leaving the gates wide open.
12:04You're entirely right that the platform failures are egregious. The corporate negligence that Bejar
12:09exposed is appalling. But you're asking Meta to solve a transnational socioeconomic crisis.
12:14That's fundamentally impossible.
12:15But they could do more.
12:17Relying on platform level account bans is like trying to empty a sinking ship with a teaspoon while
12:23the syndicates are using industrial pumps to flood it. You ban 63,000 accounts today. The hustle
12:29kingdom uses automated scripts and fake name generators to spin up 63,000 more by tomorrow morning.
12:35But if the platforms implemented stricter verification, they could break those automated scripts.
12:39They might slow them down temporarily, but it ignores the systemic realities of international law
12:45enforcement, which is where the real catastrophic failure lies. Let's look closely at the Evan
12:50Butler case. Here you have a 16-year-old boy contacted by an account named Jenny T60 on Snapchat.
12:57Right.
12:58The social engineering is so aggressive and the panic induced is so intense that just 90 minutes
13:04later, he takes his own life.
13:0590 minutes. I mean, the speed of that escalation is just horrific.
13:09It is. And after the tragedy, the FBI gets involved. They do the digital forensics. They finally secure
13:17an IP address that was left behind when the scammer demanded Evan's Facebook login. For the listener,
13:23an IP address is essentially the digital street address of the device connecting to the internet.
13:27It tells you exactly where in the world the signal is coming from.
13:31Exactly. That digital footprint leads the FBI directly to a specific Nigerian internet service
13:38provider called Glow World.
13:40So they had a concrete lead. They knew exactly whose door to knock on.
13:43They had the digital thread right in their hands. But that lead evaporated entirely. By Nigerian law,
13:51Glow World was legally required to retain user information for two years. But they simply failed to do so.
13:57The data was gone. Oh, wow. Yeah, the FBI's trail went completely cold. This highlights the stark
14:04limitations of your tech first approach. We are trying to fight a geopolitical crime wave with terms of service
14:11violations. The jurisdictional hurdles are undeniably a nightmare. It's more than a hurdle. It's an impenetrable
14:19wall. Without international cooperation, without holding foreign internet service providers accountable,
14:25and without physically dismantling the hustle kingdoms in places like Makoko,
14:29tweaking Instagram's privacy settings doesn't solve the problem. The syndicates operate with near total
14:34impunity because the geopolitical reality protects them.
14:37I concede that the Glow World failure is a prime example of how international borders protect cybercriminals.
14:45But that actually reinforces my next point. Given the systemic failures of both international law
14:51enforcement and platform moderation, what is the reality for the individual parent or teenager trying
14:58to protect themselves today? Well, we cannot simply wait for a geopolitical miracle to dismantle the
15:05hustle kingdoms. We have to focus on individual digital defense and footprint reduction.
15:10You mean retreating from the public digital sphere entirely? I mean, recognizing the reality of the
15:16battlefield. In the era of generative AI, an ordinary public photo is a loaded weapon.
15:22Cybersecurity experts are increasingly clear on this. Aggressively protecting your privacy on social
15:27media is the primary measure for safeguarding your peace of mind. Right, but... We have to advocate for the
15:33use of tools like Privacy Checker, which systematically goes through and secures accounts across major
15:39platforms. And tools like Kaspersky Safe Kids, which allows parents to monitor their children's digital
15:45exposure. By making social media profiles entirely private, we cut off the supply chain.
15:51The supply chain of images.
15:52Exactly. We starve the AI generators of the innocent photos they require to fabricate this explicit material.
16:00If the raw data isn't there, the machine cannot generate the threat.
16:04While digital hygiene is undeniably important, we have to question whether that is a sustainable
16:10societal solution or if it is simply capitulating to the criminals. Are we really saying the only
16:16way a teenager can be safe in the modern world is to become a digital ghost?
16:20It's not capitulation, it's defense.
16:22Furthermore, the practical limits of privacy settings are glaring when you consider how social
16:27engineering actually functions.
16:29But surely reducing the attack surface mitigates the damage? I mean, if they can't see the photo,
16:35they can't steal it.
16:36True. But you are assuming the scammer is just scraping public pages. Let's say a kid
16:41locks down his profile. The scammer doesn't try to hack the profile. They use a script to figure out
16:47what high school the kid goes to.
16:49Oh, I see where you're going with this.
16:51Right. They create a highly sophisticated fake persona of a girl from a neighboring school.
16:56They send a follower request. They build trust over weeks. They bypass the privacy wall by
17:03manipulating the human behind it. And then they extract the photo directly. The social engineering
17:08bypasses the privacy wall entirely.
17:10That is insidious. But there are also technological safety nets being built for when that happens.
17:17Tools that help remove content before it spreads.
17:19They do exist. And they are valuable. To an extent. The Internet Watch Foundation,
17:26for example, has a brilliant tool called Report Remove, designed specifically for under 18s.
17:32In just eight months, they actioned over 700 reports, a significant portion dedicated to sextortion.
17:39Right. And for the listener, the way Report Remove works is through a process called hashing.
17:43When a victim submits an image they are being blackmailed with, the system runs it
17:48through an algorithm to generate a hash. It's basically a long, unique string of letters
17:54and numbers that acts as a digital fingerprint for that exact file.
17:58Right. Once that fingerprint is in the database, if anyone tries to upload that image anywhere on
18:04the participating networks, the system automatically flags and blocks it. And it does this without
18:10a human moderator even needing to look at it.
18:13It is a phenomenal piece of engineering. I won't deny that. However, the IWF itself
18:19admits the glaring blind spots. That hashing technology is completely powerless against
18:24end-to-end encrypted networks like WhatsApp. Ah, because they can't see the messages.
18:28Exactly. The platforms literally cannot see the file to check its fingerprint. And it is completely
18:33useless if the file is saved directly to a scammer's local hard drive in Lagos,
18:38which is what they use to terrorize the victim over a live video call.
18:42Which brings me right back to why stopping the image from being generated in the first place
18:47through strict privacy and platform friction is so crucial.
18:51But you can't rely on privacy settings to shield youth from the core vulnerabilities these syndicates
18:56prey upon. High sex drives, the deep desire for connection, and the paralyzing fear of social ruin.
19:03Scammers prey on the terror that a boy's classmates or parents will see these images. The technology
19:08facilitates the threat, but the leverage is entirely psychological.
19:12It is a multi-layered nightmare. But as we look at the whole picture, I maintain my stance that the
19:18technological infrastructure is the critical point of failure, and therefore it's the most
19:23actionable point of leverage. Generative AI has essentially weaponized the digital footprint.
19:29Tech platforms have continually prioritized frictionless engagement over user safety.
19:33True. Forcing strict technological accountability, whether that's mandating robust age verification,
19:42changing default messaging limits, or starving AI of public data, is the most direct way to cut off
19:48the oxygen to this crime today. Now, I maintain that treating this
19:51merely as a tech governance issue is dangerously reductive. It completely ignores the deeply rooted
19:58socioeconomic syndicates operating in impoverished areas. These hustle kingdoms are driven by financial
20:04desperation and structured like corporate enterprises. Right.
20:08Until we address the geopolitical failures that allow these networks to operate with impunity,
20:13they will inevitably find new avenues for extortion. The engine will just find a new vehicle,
20:19regardless of how many apps we ban or privacy settings we toggle. You know,
20:22despite our different focuses on where to strike first, I think there is a profound area of
20:29convergence here. We both clearly recognize that the fusion of advanced generative AI capabilities
20:36with highly structured, relentless criminal syndicates represents an unprecedented and catastrophic
20:43threat to vulnerable populations. I completely agree. The synthesis of this rapidly advancing technology
20:50and organized human exploitation has created an absolute crisis, and it is our youth who are caught in
20:56the crosshairs. The current safeguards, whether they are platform moderation policies or international
21:02law enforcement treaties, are catastrophically failing them. It really highlights the value of looking deeply at
21:08both the technological facilitators and the human networks to fully grasp the mechanics of modern cybercrime.
21:14There is certainly much more to explore in the source material regarding the geopolitical
21:19complexities of cross-border data retention. I mean, we saw that with the Glow World ISP.
21:24Absolutely. And the massive ethical debate surrounding AI development, we have only scratched the surface of
21:29the international and psychological complexities involved. As we conclude, we leave it to you,
21:34the listener, to weigh these perspectives on where society's resources are best spent in the fight
21:39against online sextortion. It brings us back to that terrifying reality we started with. The traditional
21:45vaults are gone. We are living in glass houses, and the tools to shatter that glass are now available
21:51to anyone, anywhere in the world. Right. The question remains, do we focus our immediate efforts
21:57on redesigning the glass or on stopping the people throwing the stones? Thank you for joining us.
Comments

Recommended