Shawn Ryan Show

#255 Ryan Montgomery – Roblox & Minecraft: Hacker Exposes the Largest Online Video Games

November 20, 2025

Key Takeaways Copied to clipboard!

  • The initial collaboration between Ryan Montgomery and Shawn Ryan on the Shawn Ryan Show was crucial in exposing a child exploitation website after mainstream media and law enforcement initially failed to act. 
  • Ryan Montgomery demonstrated several advanced, accessible hacking tools, including a Flipper Zero modification capable of rolling code car key cloning and a BLE Shark Nano used to execute a convincing fake Google captive portal attack. 
  • The conversation highlighted significant national security concerns regarding foreign interference, specifically mentioning the discovery of large-scale Chinese SIM card servers in the New York area designed to execute distributed denial of service (DDoS) attacks on cellular infrastructure. 
  • A Distributed Denial of Service (DDoS) attack using numerous SIM servers could flood cellular towers, causing widespread communication chaos in dense areas like Manhattan. 
  • MeshTastic radios offer a decentralized, encrypted, low-power, and long-range communication alternative that functions independently of cellular or power grids. 
  • Cybersecurity aspirants should utilize Capture The Flag (CTF) platforms like TryHackMe for hands-on experience, as offensive knowledge is the best defense. 
  • The guest experienced significant generational trauma, marked by multiple violent deaths and widespread addiction within his family, which heavily influenced his difficult youth. 
  • The guest detailed being prescribed dangerously high levels of controlled substances, including Xanax and multiple stimulants, by a psychiatrist while simultaneously using heroin, highlighting professional misconduct. 
  • The guest's final sobriety was achieved not through rehabilitation but through an extended period of forced isolation in correctional facilities, suggesting that for some, time away from triggers is the necessary catalyst for lasting change. 
  • The Pentester service offers tiered pricing ($19/month and $49/month) that includes data broker removal, breached data checks (passwords, SSN, credit cards), and unique account discovery features, including checking for unauthorized child social media accounts. 
  • Pentester SMS, a new $9/month service, provides essential data removal and breach notifications via text message for users who struggle with website navigation. 
  • Despite the severity of child exploitation and trafficking, federal law enforcement agencies appear overwhelmed or ineffective, as evidenced by the Sentinel Foundation often identifying significantly more leads (e.g., 1,000 users in two months for one case) than the FBI (250 probes for the same case). 
  • The 764 group is a nihilistic Satanist cult originating from Minecraft, which actively coerces minors into extreme violence, self-harm, suicide, and sexual exploitation, often using detailed playbooks for grooming and extortion. 
  • Online platforms like Roblox, with 75 million daily active users, are major luring grounds for predators, and Roblox has actively discouraged vigilante efforts to remove these predators from their platform. 
  • The group known as The COM, which spawned 764, engages in doxing and swatting, and the extreme nature of 764's activities—including murder and animal torture—is often used as 'tradecraft' or proof of loyalty for entry into their private, encrypted groups. 
  • Roblox is actively profiting from and discouraging efforts to remove predators and harmful content, evidenced by issuing cease and desist letters to 'vigilantes' trying to save children on the platform. 
  • Parents are complicit in enabling online dangers by allowing children to use platforms like Roblox and Minecraft without adequate monitoring, as these environments host explicit content and facilitate predatory behavior. 
  • The severity of online predation, including content related to child exploitation and violent simulations, is so extreme that it is causing significant psychological distress to experts like Ryan Montgomery, necessitating professional help. 

Segments

Recap of First Appearance
Copied to clipboard!
(01:01:01)
  • Key Takeaway: Ryan Montgomery’s initial viral clip detailed infiltrating a child exploitation website run by a Virginia politician, leading to widespread attention after initial media silence.
  • Summary: Montgomery recounted how a short clip detailing his infiltration of a predator website, which included evidence against a politician, gained millions of views after traditional media outlets refused to cover the story due to legal concerns. He noted that the FBI tip line (ic3.gov) was utilized, but the subsequent arrest of a known predator, Nathaniel Larson, six months later, was not linked back to the website evidence he provided. Montgomery expressed deep gratitude to Shawn Ryan for taking the risk to broadcast the story when no one else would.
Project Veritas Involvement
Copied to clipboard!
(01:08:42)
  • Key Takeaway: Project Veritas journalists were passionate about the case, but the interim CEO, Hannah Giles, halted the investigation, stating the story was ’not a tidal wave,’ despite 13 identified individuals from the database being convicted of sex crimes afterward.
  • Summary: Project Veritas was the first media group to commit to investigating the database, with their on-the-ground journalists showing significant care for the case. After identifying 500 out of 7,000 users, Hannah Giles took over and allegedly shut down the project, prioritizing a New York Times or Post release instead. Montgomery noted that 13 of the identified 500 individuals were later convicted of sex crimes with children, emphasizing the potential preventative impact that was lost.
Impact of Initial Episode
Copied to clipboard!
(01:15:40)
  • Key Takeaway: The first episode created a ‘perfect storm’ that educated millions of parents and scared numerous predators, leading directly to Montgomery’s increased involvement in fighting exploitation.
  • Summary: The initial episode, despite the risk of platform de-monetization or shutdown, reached hundreds of millions of views, educating parents on the speed of online grooming (demonstrated by a 5-second screen name change to ‘Ashley 13’). Montgomery stated that the collaboration saved countless children by making the threat real and motivated him to continue his work in parallel with law enforcement.
Cybersecurity Gadget Showcase
Copied to clipboard!
(02:29:19)
  • Key Takeaway: The Flipper Zero can be modified with custom firmware to execute advanced rolling code attacks on modern vehicles, and the Dual ESP attachment adds Wi-Fi/Bluetooth capabilities for complex network attacks.
  • Summary: Montgomery demonstrated the Dual ESP, which plugs into the Flipper Zero to add Wi-Fi and Bluetooth functionality, enabling attacks like beacon spamming and targeted de-authentication. He specifically mentioned custom firmware that allows the Flipper to synchronize with a car’s rolling code system, capturing all key fob functions (lock, unlock, trunk) after a single button press. He also demonstrated the BLE Shark Nano creating a fake ‘Free Wi-Fi’ network that hosted a convincing, fake Google captive portal to steal user credentials.
Public Wi-Fi Dangers and Defense
Copied to clipboard!
(03:40:34)
  • Key Takeaway: Users should never enter credentials into any captive portal, as fake login pages are easily spoofed, and the only reliable defense against unknown network threats is using a dedicated secure cellular device.
  • Summary: Captive portals, common in hotels and airports, often look identical to legitimate login screens, making it impossible to verify authenticity by checking the URL alone. Montgomery advised against trusting public Wi-Fi entirely, noting that attackers can steal passwords and credit card information through these fake portals. He gifted Ryan a Glacier secure internet device that connects to a cellular network, encrypting all traffic across 130 countries to bypass insecure public networks.
Cellular Network Threats
Copied to clipboard!
(05:13:37)
  • Key Takeaway: Modified, cheap Verizon hotspots running ‘Ray Hunter’ software can detect the presence of ‘stingrays’ (devices used by agencies to track phone locations), and recent discoveries show large-scale Chinese SIM card server farms exist to launch DDoS attacks on US cell towers.
  • Summary: Montgomery showed a modified $9 Verizon hotspot running Ray Hunter software designed to alert the user if a stingray is nearby, which unexpectedly turned red during the recording, indicating a potential tracking device. He linked this to the recent discovery in New York of 300 SIM card servers containing over 100,000 SIMs intended to flood cell towers with traffic, causing a distributed denial of service attack that would result in absolute chaos in dense areas like Manhattan.
DDoS Attack Mechanics Explained
Copied to clipboard!
(00:59:35)
  • Key Takeaway: A Distributed Denial of Service (DDoS) attack floods cellular towers with massive data volume, rendering them unable to function for calls, texts, and data.
  • Summary: The technical term for flooding communication towers is a denial of service attack, specifically a distributed one coming from multiple angles. This intentional flooding prevents towers from keeping up with the data load, effectively taking all cellular connections offline. Hardwired internet remains unaffected as it does not rely on cellular towers.
MeshTastic Off-Grid Comms Demo
Copied to clipboard!
(01:05:20)
  • Key Takeaway: MeshTastic devices create a decentralized, encrypted mesh network using intermediate devices to relay text messages over long distances without cellular service.
  • Summary: The MeshTastic device operates like a walkie-talkie but uses text messaging and leverages all nearby devices to ‘mesh’ the message to the recipient, enabling communication up to 10 miles or more. The network features a non-encrypted primary channel for general emergencies and a fully encrypted channel for private, off-grid communication. These low-power devices are inexpensive (around $30) and their effectiveness increases with the number of users in an area.
Covert Hacking Gadgets Showcase
Copied to clipboard!
(01:13:28)
  • Key Takeaway: The Screen Crab captures HDMI video footage wirelessly or stores it locally, while the Land Turtle acts as a remote access Trojan upon USB insertion.
  • Summary: The Screen Crab is an in-line device placed behind a monitor to covertly capture or wirelessly stream screen footage, storing large amounts of compressed video on an SD card. The Land Turtle, made by Hack5, immediately connects back to the operator’s server upon being plugged into a USB port, allowing remote pivoting across the internal network. The Nyanbox is a 3D-printed device capable of Wi-Fi, Bluetooth, and protocol jamming, including disabling wireless cameras and RC devices.
Nyanbox Jamming and Sour Apple Attack
Copied to clipboard!
(01:16:48)
  • Key Takeaway: The Nyanbox can jam specific wireless protocols like Wi-Fi and Bluetooth, and execute the ‘Sour Apple’ attack to render modern iPhones unusable without disabling Bluetooth in settings.
  • Summary: Jamming works by flooding the airwaves on a specific frequency with garbage data, preventing devices from communicating, which is a federal crime. The Sour Apple attack exploits an Apple OPSEC flaw, forcing the phone to process numerous setup prompts (like Apple TV pairing) even in airplane mode, making the device unusable until Bluetooth is manually disabled in the settings menu, not just the control center.
Faraday Bags for Evidence Preservation
Copied to clipboard!
(01:21:28)
  • Key Takeaway: Faraday bags are crucial for law enforcement to immediately block all signals to seized phones, preventing remote wiping of evidence via iCloud or Android services.
  • Summary: Faraday bags block all incoming and outgoing signals, locking a phone down instantly upon seizure. This preservation is vital because remote wiping capabilities (like those from Apple or Android) can destroy critical evidence before the device reaches the station. Equipping law enforcement with these inexpensive bags can be the difference between securing a conviction or losing a case.
Cybersecurity Learning and Community
Copied to clipboard!
(01:28:06)
  • Key Takeaway: Aspiring white hat hackers should use CTF platforms like TryHackMe for structured learning, understanding that offensive skills directly inform defensive capabilities.
  • Summary: Platforms like TryHackMe and Hack the Box offer structured walkthroughs covering basics from networking to forensics, alongside competitive Capture The Flag challenges. Learning offensive techniques is emphasized because understanding how an attack works is the best way to know how to defend against it. Joining the associated communities for mentorship is foundational for learning and growth in cybersecurity.
Childhood Trauma and Early Legal Trouble
Copied to clipboard!
(01:42:33)
  • Key Takeaway: Ryan Montgomery’s first criminal charges at age 11 involved marijuana cultivation, stemming from police leveraging a peer’s tip to publicly embarrass his mother.
  • Summary: At age 11, Montgomery was charged with possession with intent to deliver and cultivating marijuana after a peer’s mother reported finding plants at his house, leading to a public spectacle by police. This incident resulted in probation, which increased his risk of further trouble due to mandatory check-ins and drug testing. His early life was marked by severe bullying and exposure to drug addiction within his family, leading to experimentation starting at age 11.
Father’s Imprisonment Aftermath
Copied to clipboard!
(01:58:57)
  • Key Takeaway: The guest’s father served two years in prison following an incident that forced the guest out of his school and town.
  • Summary: The fallout from an event led to the guest’s father serving two years in prison. This incident also resulted in the guest being forced to leave his school and town. The guest noted that his father never held the consequence against him.
Family Tragedies and Trauma
Copied to clipboard!
(01:59:24)
  • Key Takeaway: The guest’s father’s side of the family experienced multiple violent deaths, including a grandfather killed by a machete and an uncle stabbed to death.
  • Summary: The guest detailed a history of violent loss on his father’s side, including a grandfather killed by a machete in Florida and an uncle stabbed to death in Pennsylvania. Another uncle died from an accidental fentanyl overdose via snorting. These events contributed to what the guest termed ‘serious generational trauma’ in the Philadelphia area.
Addiction and Recovery Advice
Copied to clipboard!
(02:01:51)
  • Key Takeaway: For severe addiction, especially involving novel substances like xylosine, the guest suggests forced hospitalization via mechanisms like Florida’s Baker Act to manage physical withdrawal.
  • Summary: The guest, while acknowledging that wanting to be clean is crucial, noted that addicts may not realize they want it until they experience withdrawal. He advocates for forcing individuals into a hospital or detox, especially given the danger of new adulterants like xylosine that Narcan cannot reverse. The goal is to safely manage physical withdrawal before considering further treatment.
Inappropriate Professional Conduct
Copied to clipboard!
(02:07:26)
  • Key Takeaway: During his active drug use as a minor, the guest was involved in inappropriate relationships with both his high school guidance counselor and his psychiatrist.
  • Summary: The guest recounted his guidance counselor visiting his home and bedroom inappropriately while he was in ninth grade. Subsequently, his psychiatrist, after asking him to check her husband’s computer for infidelity, prescribed him excessive amounts of Xanax and three different stimulants while knowing he was a heroin addict.
Detoxification and Institutionalization
Copied to clipboard!
(02:19:26)
  • Key Takeaway: The guest’s severe addiction to Xanax, prescribed by his psychiatrist, led to a dangerous, unmanaged detox in a jail cell involving simultaneous opioid and benzodiazepine withdrawal.
  • Summary: The high dosage of Xanax prescribed by the psychiatrist made stopping extremely difficult, leading to severe withdrawal when he was abruptly taken off all medications in the Lyman Detention Center. Guards, unfamiliar with detoxing someone on this combination of drugs, improperly managed the withdrawal, forcing him through opioid and benzo withdrawal simultaneously.
Heroic Act and Judicial Injustice
Copied to clipboard!
(02:22:26)
  • Key Takeaway: The guest prevented a mass shooting at the Devereux residential facility by reporting a peer’s hidden firearm, yet the court responded by sending him back to detention instead of home.
  • Summary: While at the Devereux facility, the guest discovered a peer possessed a loaded .45 caliber handgun intended for a classroom shooting spree and promptly reported it, earning commendation from an Assistant District Attorney. Despite this life-saving action, the judge sent him back to the juvenile detention center for three months, compounding his negative experiences with the justice system.
Path to Final Sobriety
Copied to clipboard!
(02:31:05)
  • Key Takeaway: The guest’s final sobriety was achieved after serving 20 months total in juvenile and adult facilities, indicating that prolonged physical separation from drugs and associated environments was the necessary catalyst.
  • Summary: The guest’s addiction ended after serving a combined 20 months in custody, which provided the necessary time away from people, places, and things associated with drug use. He states that the thought of using drugs is now completely gone, and he has maintained sobriety for over 14 years since that final incarceration.
Pentester Pricing and Family Features
Copied to clipboard!
(02:55:47)
  • Key Takeaway: The $19 Pentester plan allows users to add family members, including children, to monitor for newly created accounts associated with their emails or phone numbers.
  • Summary: A $19 personal plan was introduced for consumers, allowing users to add family members like spouses, parents, and children to monitor their associated data and discover if unauthorized accounts have been created using their identifiers. This account discovery feature is unique, enabling parents to confirm if a child has created an account on a platform like Snapchat against parental wishes.
Pentester Differentiators and Methodology
Copied to clipboard!
(02:57:08)
  • Key Takeaway: Pentester distinguishes itself from other data removal companies by integrating breached data analysis and facial recognition capabilities, built upon methodologies used to identify predators.
  • Summary: The $49 plan includes data removal services alongside access to breached data, including passwords and credit card information, which other data removal companies often omit. The underlying methodology used for Pentester’s tools is derived from techniques used to identify human traffickers and predators, applied in reverse to map a user’s digital footprint.
Introduction of Pentester SMS
Copied to clipboard!
(02:58:53)
  • Key Takeaway: Pentester SMS is a simplified, $9/month text-based service designed for less tech-savvy users who need automated data removal notifications without accessing the full dashboard tools.
  • Summary: Due to support tickets indicating many older users could not navigate the website, Pentester SMS was created, allowing users to interact with the service entirely through text messaging. This service automatically handles data removals and sends periodic updates, such as confirmation of removals from data brokers, for a lower monthly fee.
Breach Data Actionable Advice
Copied to clipboard!
(03:02:26)
  • Key Takeaway: Breached data like social security numbers cannot be removed from existing hard drives, necessitating credit freezes at Equifax, TransUnion, and Experian as the primary defense.
  • Summary: While Pentester can automatically scrub data from data brokers, information already in breached datasets (like SSNs) cannot be deleted; users must freeze their credit reports to prevent unauthorized queries. Freezing credit is a free, reversible process that stops new credit applications using the frozen identity.
AT&T and NPD Breach Impact
Copied to clipboard!
(04:03:59)
  • Key Takeaway: Specific breach scans like those for AT&T and NPD are available on Pentester’s site, and users affected should search using every state they have ever lived in.
  • Summary: The recent AT&T breach affected 70 million people, exposing sensitive data like full social security numbers and current addresses. Users are urged to check their status via dedicated Pentester links and immediately freeze their credit if affected, emphasizing the need to search across all past residences.
VPN Importance and Trustworthiness
Copied to clipboard!
(03:12:31)
  • Key Takeaway: A VPN encrypts traffic and routes it through a remote server, masking the user’s IP address from their ISP and the destination website, but users must select providers with proven zero-log policies.
  • Summary: VPNs function by routing traffic through an encrypted, remote computer, ensuring the ISP cannot see the activity, though they can see VPN usage. IPVanish was cited as a company caught storing logs, while IVPN proved its zero-log policy under subpoena; Mullvad is favored for accepting anonymous cash payments for subscriptions.
Transition to Sentinel Foundation Work
Copied to clipboard!
(03:16:24)
  • Key Takeaway: Ryan Montgomery transitioned from his vigilante group, 561PC, to the Sentinel Foundation after being contacted by federal agencies like the DEA, CIA, and HSI following his initial podcast appearance.
  • Summary: Montgomery had to cease public vigilante activities to collaborate legitimately with law enforcement, choosing the Sentinel Foundation as his partner. His initial public exposure led to intense contact from multiple federal agencies, including an unnerving encounter with HSI agents at an ATM.
Critique of Predator Catcher Tactics
Copied to clipboard!
(03:24:48)
  • Key Takeaway: Many new predator-catching channels prioritize sensational content (like clown costumes or demanding nudity) over serious investigation, potentially jeopardizing convictions and ignoring the severe reality of child exploitation.
  • Summary: Since Montgomery’s initial viral exposure, numerous new groups have emerged, often prioritizing views through theatrical stunts during predator encounters. Montgomery stresses that these actions are not humorous, as the potential harm to the child victim is severe, and physical confrontation can impede legal convictions.
US Role in Global Exploitation
Copied to clipboard!
(03:36:13)
  • Key Takeaway: The United States is identified as the world’s largest consumer of child sexual abuse material (CSAM), yet many anti-trafficking organizations focus operations overseas rather than domestically.
  • Summary: The commonality across many trafficking discussions is that the US is the primary consumer of exploitative material, yet organizations often focus on poverty-stricken countries abroad. This discrepancy is frustrating, especially when high-profile cases involving US-based actors or foreign nationals on US soil (like the Israeli cyber command official) result in deportation rather than domestic prosecution.
Inefficiency in Federal Investigations
Copied to clipboard!
(03:50:41)
  • Key Takeaway: The FBI reportedly has 250 probes related to the ‘764 case,’ while the six-person Sentinel Foundation team infiltrated three groups in two months, identifying over 1,000 users, suggesting a significant disparity in investigative output.
  • Summary: The comparison between federal and non-profit investigative efforts on the ‘764 case’ highlights perceived government inefficiency, where a small Sentinel team significantly outperformed the FBI’s documented probe count in a short timeframe. This disparity fuels the frustration that government agencies are not prioritizing the issue with the necessary urgency.
Preventative Measures and Government Inaction
Copied to clipboard!
(03:54:10)
  • Key Takeaway: Educating parents about online dangers in games like Roblox is crucial for prevention, but systemic change is stalled by government inaction.
  • Summary: Preventing online harm is considered the most effective solution, requiring parental education on the dangers hidden within seemingly innocent children’s games. The speakers express frustration that government entities are not taking the threat seriously enough to implement necessary widespread solutions. This inaction prevents the complete eradication of these online dangers.
Google Subpoena Data Spike
Copied to clipboard!
(03:55:35)
  • Key Takeaway: Global requests for user information via subpoenas to Google have dramatically increased, tripling or quadrupling in recent years compared to the early 2010s.
  • Summary: The speaker presents data from Google’s transparency report showing a massive surge in global subpoena requests for user information over the last decade. This spike suggests a significant escalation in legal or governmental interest in digital data. The data shown is limited only to Google, implying the overall trend across all tech companies is even larger.
Scammer Payback Anecdote
Copied to clipboard!
(03:57:27)
  • Key Takeaway: Ethical hacker Ryan Montgomery assisted content creator Scammer Payback in successfully intercepting a cash mule attempting to defraud an elderly victim.
  • Summary: The anecdote details an operation where Montgomery and Scammer Payback’s team tracked and confronted a cash mule driving four hours to collect $40,000 from an elderly woman. The mule, who initially spoke English, suddenly became nonverbal in an Asian language upon confrontation, requiring Google Translate for questioning. The evidence gathered, including GPS data matching the route, was subsequently sent to federal authorities.
Introduction to 764 Cult
Copied to clipboard!
(04:04:31)
  • Key Takeaway: The 764 group is a nihilistic, Satanist cult that originated with a 15-year-old in Texas and focuses on extreme violence, including extorting children into self-mutilation and orchestrating live suicides.
  • Summary: The 764 group believes that no human life matters and has been linked to forcing victims to carve usernames into their bodies, commit animal cruelty, and even commit suicide live on camera. The group was influenced by the Order of Nine Angles, promoting ritual violence and the belief that power comes from harming others without hesitation. The FBI has classified 764 as a domestic terrorist group, yet sentences for members involved in horrific acts remain shockingly light.
The COM and Online Harassment
Copied to clipboard!
(04:08:00)
  • Key Takeaway: The COM, an internet community often composed of teenagers and young adults, specializes in doxing and swatting victims, using stolen private investigator data (TLO) to acquire personal information.
  • Summary: The COM engages in malicious activities like swatting, where they falsely report severe crimes to trigger armed police responses at victims’ homes for bragging rights. They primarily obtain personal data by paying small amounts for access to private investigator tools like TLO reports, which reveal credit reports and personal details. Montgomery notes that while The COM is annoying, the 764 group stemming from it represents a far more severe level of evil.
Grooming and Extortion Manuals
Copied to clipboard!
(04:17:47)
  • Key Takeaway: 764 members utilize a 240-page handbook detailing step-by-step instructions on how to groom vulnerable minors found on mental health forums and online games to secure compromising material for extortion.
  • Summary: Grooming involves pretending to offer mental health support to victims struggling with bullying or self-harm before demanding nude photos. Once control is established, extortion escalates to forcing victims into extreme violence, such as cutting themselves deeply or killing pets, to avoid having their material distributed. The group ranks victims by age (9-17 being the average target) based on the success rate of long-term exploitation.
Roblox and Platform Complicity
Copied to clipboard!
(04:55:44)
  • Key Takeaway: Roblox, the world’s largest children’s game with 75 million daily users, actively discourages vigilantes from removing predators and profits from in-game transactions where CP-related content is visible.
  • Summary: Roblox issued a cease and desist letter and a press release against a popular YouTuber who was catching predators on their platform, stating they ban vigilantes. This indicates the platform prioritizes maintaining its user base over actively policing severe criminal activity targeting children. The platform makes 30% of every sale, including items displaying offensive or illegal slogans within the game environment.
Predators in Positions of Power
Copied to clipboard!
(04:58:34)
  • Key Takeaway: Predators gravitate toward positions of trust, such as teachers and police officers, because these roles grant them access to victims.
  • Summary: Predators intentionally seek out roles like teachers, police officers, or gym teachers because these positions provide direct access to children. Individuals who become predators were often one prior to taking these jobs, not after. This pattern explains why predators congregate in environments where they can easily prey on vulnerable populations.
Roblox Platform Failures
Copied to clipboard!
(04:59:15)
  • Key Takeaway: Roblox actively discourages intervention against predators and profits directly from in-game purchases within harmful user-created content.
  • Summary: The largest children’s game platform, Roblox, has issued press releases and cease and desist letters against individuals attempting to save children on the platform. Developers can host games where in-game purchases are made, and Roblox earns a 30% commission on these sales, even if the content is predatory. This financial incentive exists alongside public evidence of servers promoting child exploitation (CP) and satanic imagery.
Assassination Simulators on Roblox
Copied to clipboard!
(05:03:46)
  • Key Takeaway: Publicly accessible, graphic assassination simulators, including one targeting Charlie Kirk, are hosted on Roblox and monetize through Robux purchases.
  • Summary: Roblox hosts publicly facing games where children can participate in graphic assassination simulations, some of which are photorealistic. Roblox profits by taking a 30% commission on the sale of character skins or outfits related to these violent themes, such as a shirt depicting Charlie Kirk being shot. This demonstrates a direct financial benefit derived from content that is highly inappropriate for its young user base.
Parental Responsibility and Monitoring
Copied to clipboard!
(05:07:24)
  • Key Takeaway: Parents must actively research online threats and utilize monitoring software like BARC to protect children from online exploitation.
  • Summary: Parents are advised to research terms like ‘764 Group’ and ‘Roblox Predators’ to become educated on current threats their children face online. Monitoring software such as BARC or Custodio can track bullying, sexual activity, and suicidal ideations on devices. Open communication is crucial so that if a child does encounter danger, they feel comfortable enough to report it to their parents.
Brand Army and Teen Exploitation
Copied to clipboard!
(05:15:24)
  • Key Takeaway: The platform Brand Army allows users as young as 13 to post revealing content, directly profiting parents who then transition these minors to OnlyFans upon turning 18.
  • Summary: Brand Army is a platform where users can begin posting revealing photos at age 13, following a specific ratio of revealing to normal photos. Parents are directly profiting from their children sexualizing themselves on this platform. This behavior is often a precursor to moving the minors onto OnlyFans once they reach the 18-year-old subscription age, indicating premeditated exploitation.
Expert Mental Health Crisis
Copied to clipboard!
(05:17:20)
  • Key Takeaway: Ryan Montgomery acknowledges that years of exposure to gruesome online content are causing physical and subconscious psychological issues requiring professional intervention.
  • Summary: Ryan Montgomery is experiencing physical issues stemming from subconsciously processing years of exposure to the most gruesome online content, worse than murder. He recognizes that compartmentalization is failing and that he needs help, despite internal reservations about therapy due to past experiences. Shawn Ryan strongly urged him to seek help, emphasizing that self-care is necessary to continue saving others.