In Memory of Man Podcast - Robot Crime Blog
In Memory of Man Podcast - Robot Crime Blog
The Internet Died. Now They’re Coming for Your Phone
Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.
The provided podcast warns that the open internet and private communication channels are currently being overwhelmed by an unstoppable wave of AI-generated spam and sophisticated bot activity. The author highlights how new open-source tools allow bad actors to automate perfectly tailored scams across iMessage, Gmail, and phone calls, making traditional red flags like typos obsolete. To combat this, the source outlines a "30-minute bunker" strategy involving technical settings such as filtering unknown callers and enabling two-factor authentication. Crucially, it advises readers to adopt a skeptical mindset, suggesting that any highly specific message from a stranger should be treated as artificial. The overarching goal is to provide a temporary defense for individuals to protect their finances and privacy until major platforms can develop better systemic protections. Ultimately, the text serves as a practical guide for surviving a rapidly collapsing digital ecosystem where human interaction is increasingly difficult to verify.
Um when you lock your front door at night, there's a very specific kind of comfort that comes with it. You know, you turn the deadbolt, you hear that solid metallic click, and you just know that the space inside your house is yours.
SPEAKER_00Right. It's entirely yours. It is private.
SPEAKER_01Exactly. The chaos of the outside world, the noise, uh, the strangers on the street, they're all officially on the other side of that wood and metal.
SPEAKER_00Yeah.
SPEAKER_01And we have always assumed our digital lives work the same way.
SPEAKER_00Yeah, that you have the public internet out there, the chaotic streets and billboards, but then you have your private digital house. Aaron Powell Right.
SPEAKER_01Your text messages, your personal email, your direct phone line. That was supposed to be the safe space.
SPEAKER_00The sanctuary. I mean, the place where only the people you physically gave the key to could ever actually reach you.
SPEAKER_01Aaron Powell But the lock on that digital front door has fundamentally broken. And not just for you, but for every single person listening to this deep dive.
SPEAKER_00Yeah, it's pretty wild.
SPEAKER_01We are looking at a startling set of what the author calls field notes, written by Robert Keesling. He's a Texas trial attorney who runs a blog called Robot Crimeblog.com. And uh he is sounding an absolutely massive alarm right now.
SPEAKER_00He really is.
SPEAKER_01The core premise of his piece is chillingly straightforward. He says, the internet died. Now they're coming for your phone.
SPEAKER_00It is a phenomenal, just ruthless piece of writing. Keisling argues that the open internet, you know, the web we browse every day is already essentially dead. Right. Search engines have been completely strip-mined. Independent publishers are basically starved out. Bots are generating more traffic than actual human beings. I mean, Merriam Webster even named Slop the word of the year for 2025. Oh well.
SPEAKER_01Slopple.
SPEAKER_00Yeah, slop. That is our current reality. The open web is just an endless churning sea of AI-generated filler.
SPEAKER_01Okay, let's unpack this. Because jumping from, you know, the internet is full of junk articles to my private text messages are going to collapse feels like a massive leap to me.
SPEAKER_00It does seem like a jump, yeah.
SPEAKER_01I need to understand the scale of the storm we are supposedly facing here. Because I mean, I already get a hundred spam calls a day. I get the fake car warranty voicemails and the weird credit card alerts. Is it really gonna get that much worse?
SPEAKER_00Unfortunately, yes.
SPEAKER_01I mean, isn't this just the same old robocall annoyance we have been dealing with for a decade?
SPEAKER_00So to understand why this is a completely different tier of threat, we have to look at the receipts Keisling brings to the table. His primary source is Nikita Beer, the head of product at X.
SPEAKER_01Okay.
SPEAKER_00Beer's literal full-time job, like the thing he wakes up every day to do, is stopping bots from eating that massive platform alive. And a few months ago, he made a public prediction that sent absolute shock waves through the tech community. What did he say? Beer predicted that in less than 90 days, the channels we historically thought were safe from automation, so specifically iMessage, phone calls, and Gmail, will be so flooded with hyper-personalized spam that they will become functionally unusable.
SPEAKER_01Functionally unusable.
SPEAKER_00Right. And the terrifying kicker, he explicitly said we will have no way to stop it.
SPEAKER_01Wait, hold on, let me push back on that for a second. Beer works at X. His entire job is dealing with public social media, which, let's be honest, has always been a free-for-all.
SPEAKER_00My point.
SPEAKER_01Why should we trust his prediction about private encrypted channels like iMessage or, you know, enterprise grade systems like Gmail? Those are totally different architectures. Yeah. Apple and Google have billions of dollars dedicated to securing those specific pipelines.
SPEAKER_00You're hitting on the exact blind spot most people have. We just assume those companies have an infinite capacity to filter garbage. But Keisling uses an amazing analogy to explain Beer's panic here.
SPEAKER_01Okay, what's the analogy?
SPEAKER_00He describes the moderation teams at these tech giants as firefighters with garden hoses pointed at a raging forest fire.
SPEAKER_01Oh wow.
SPEAKER_00Yeah. Just to give you the math on this, Beer's team at X was suspending 208 bot accounts every single minute.
SPEAKER_01Every minute.
SPEAKER_00Every single minute. They purged 1.7 million accounts in October 2025 alone. But 48 hours later, those 1.7 million accounts just respawned.
SPEAKER_01That's insane.
SPEAKER_00It is a mathematical impossibility to win a fight using traditional moderation when your enemy has an infinite supply of ammunition.
SPEAKER_01So what changed? I mean, why do they suddenly have infinite ammunition?
SPEAKER_00Kiesling puts it perfectly. He says, someone open source the lighter.
SPEAKER_01I love that phrasing. What is the lighter in this scenario? Because obviously we've had AI chatbots for a while now.
SPEAKER_00Aaron Powell Right. But the lighter here is a piece of software called OpenClaw. It launched in late 2025. And the key detail is that it is completely free and it doesn't require a massive, expensive server farm to run. Aaron Powell Oh, interesting. Yeah, it runs perfectly on a standard off-the-shelf laptop. You give OpenClaw access to a browser, your email, or your messaging apps, and it acts as an entirely autonomous assistant. It reads incoming text, drafts contextual replies, and sends messages around the clock entirely on its own.
SPEAKER_01Aaron Powell Wait, so it's not just a script blasting out one generic message. It is holding conversations.
SPEAKER_00Exactly. And it caught on with unprecedented speed. OpenClaw hit 145,000 GitHub stars in a single week in January. By April, it crossed 300,000.
SPEAKER_01Aaron Powell Okay, for anyone not living in the developer world, why does the GitHub star metric matter? Is that just like a popularity contest?
SPEAKER_00Aaron Powell Far from it, actually. A GitHub star is essentially a developer bookmarking a project to use it. Hitting 300,000 stars means hundreds of thousands of people, and many of them bad actors, are actively downloading and deploying this tool.
SPEAKER_01That is a massive scale.
SPEAKER_00It became the fastest growing open source project in history. It beat out foundational tech like React or TensorFlow. Wow. What this practically means is the barrier to entry for complex conversational spam has dropped to absolute zero. Any amateur with a laptop can point open claw at an entire leaked database of phone numbers and run a thousand message-a-day, highly personalized extortion operation by sundown.
SPEAKER_01And we are already seeing the real-world application of this. Keisling brings up a massive AI spam ring that security researchers at the firm Human exposed recently. They dubbed it Pushpaganda.
SPEAKER_00Oh, yeah, pushpaganda.
SPEAKER_01And the mechanics of this are just wild. This wasn't some minor annoyance where you get a weird email. Pushpaganda generated 240 million ad fraud bid requests across 113 domains in just seven days.
SPEAKER_00Let's break down how that actually makes them money, because the mechanism is incredibly insidious. They didn't just blast out fake links, they used AI to generate highly engaging, totally fabricated news stories.
SPEAKER_01Right.
SPEAKER_00Then they gamed the algorithms to hijack the Google Discover feed, you know, that news feed on your phone to get these fake stories in front of millions of people.
SPEAKER_01So they bait you with a sensational headline.
SPEAKER_00Exactly. Once you click the article, the site would aggressively prompt you to enable browser notifications to quote unquote read the rest of the story. Millions of people just absent-mindedly clicked allow.
SPEAKER_01Oh no, because we're all so used to just clicking through those pop-ups. Right.
SPEAKER_00And the second they had that permission, the crap snapshot. They used those browser notifications to bombard your desktop and phone screen with fake legal threats, fake antivirus warnings, complex financial scam.
SPEAKER_01Just constant pop-ups.
SPEAKER_00Yep. Every time a user clicked one of those panicked alerts or called the fake support number, the scammers monetized it. Google eventually patched the vulnerability, but by the time they did, ten more identical operations using the same open source tools were already running.
SPEAKER_01It's like playing whack-a-mole, but the moles are multiplying.
SPEAKER_00Yeah, exactly. You know, if we connect this to the bigger picture, Keisling points out something crucial. This is not a conspiracy. There is no shadowy villain sitting in a volcano lair trying to ruin the internet.
SPEAKER_01Right. It's not a James Bond movie.
SPEAKER_00It is an emergent failure of an open system. Technology evolved to the point where AI made the production of highly persuasive text essentially free. The market naturally selected for this slop because it generates ad revenue and extortion payouts at an infinite scale.
SPEAKER_01That makes total sense.
SPEAKER_00You can investigate and dismantle a conspiracy, but a market dynamic where the cost of attacking is zero, you just have to outlast it.
SPEAKER_01Which brings us to the core mission of today's deep dive. If the platforms, uh the telecom companies, Google, Apple, are mathematically losing this war right now, they cannot stop the flood from reaching you.
SPEAKER_00They really can't.
SPEAKER_01That means the responsibility for defending your digital front door falls entirely on your shoulders. You have to build the defense. And Keisling calls it the 30-minute bunker.
SPEAKER_00But before we detail the architecture of this bunker, we really have to stress Keisling's massive caveat here. This will not save you permanently.
SPEAKER_01Right, it is not a magical force field.
SPEAKER_00Far from it. The wave of AI garbage is coming regardless of what settings you toggle. What this bunker does is buy you time. It buys you, your parents, and your kids about six months of breathing room, while the rest of the world and the tech giants figure out how to adapt.
SPEAKER_01And it takes about 30 minutes to set up, it costs almost nothing, and you need zero technical skill to execute it. Okay, let's start locking the doors. We'll begin with the phone app, because that is the most immediate disruptive point of contact. Keisling outlines specific settings you need to change right now. For iPhone users, you go into your settings, then phone, then find screen unknown callers. Right. But you don't just set it to silence them, you set it to ask reason for calling.
SPEAKER_00That is such a brilliant, highly underutilized feature. If a number isn't saved in your contacts, the caller physically has to explain to Apple's digital assistant why they are calling before your phone is even allowed to ring.
SPEAKER_01It is exactly like hiring a bouncer for your front door. You are forcing their automated spam bot to try and hold a conversation with your digital robot first.
SPEAKER_00Exactly. Let the bots fight it out.
SPEAKER_01Yeah. And for text messages, the process is similar. You go to settings, then messages, and toggle on filter unknown senders. Anything from a stranger gets silently shoved into a separate folder that doesn't trigger a push notification. You simply never see it unless you go looking for it.
SPEAKER_00And for Android users, the workflow is just as easy. You open the phone app, tap the three dots for settings, find caller ID and spam, and turn on both blocking toggles. Perfect. But Keisling also insists on a third network level layer for your phone, which is activating the free spam blocking apps provided by your cellular carrier.
SPEAKER_01Oh, like the ones from ATT and Verizon.
SPEAKER_00Yeah. We are talking about Verizon Call Filter, ATT Active Armor, or T-Mobile Scam Shield. You are already paying for the network, these apps are free, and they have gotten significantly better at catching the baseline garbage before it even reaches your device's operating system.
SPEAKER_01Okay, so we've put a bouncer on the phone app.
SPEAKER_00Uh-huh.
SPEAKER_01But if a bot army realizes it can't reach my phone, isn't it's next logical move to try and compromise my online accounts directly? Like how do we lock down the email?
SPEAKER_00The foundational defense for email is two-factor authentication, which most people know as 2FA. But Keysling makes a very specific critical distinction that we need to spend some time on. You must use an authenticator app like Google Authenticator or Authy or the system built directly into Apple's password manager. You absolutely cannot rely on those six-digit codes they send you via text message.
SPEAKER_01Wait, really? Because I feel like almost every major bank and website still defaults to texting me a code. Why is that suddenly a massive vulnerability?
SPEAKER_00Because text messages rely on the cellular network protocol, which is surprisingly fragile. A scammer doesn't need to hack your phone to get your text messages. They just need to do what's called a sim swap.
SPEAKER_01I've heard of that. How does that work?
SPEAKER_00They call up ATT or Verizon, pretend to be you. Maybe they bought your social security number on the dark web to answer the security questions.
SPEAKER_01Oh terrifying.
SPEAKER_00Right. And they convince the customer service rep that you lost your phone and need your phone number ported to a new SIM card.
SPEAKER_01And the second that customer service rep clicks approve, your physical phone loses service, and the scammer's phone suddenly receives all your calls and text messages.
SPEAKER_00Which means when they try to log into your Gmail or your bank, and the bank texts that six-digit security code, it goes straight to the scammer.
SPEAKER_01Oh wow. So they're right in.
SPEAKER_00That is why SMS codes are fundamentally broken. Authenticator apps, on the other hand, generate the security code locally on your physical device. It never travels over the airwave, so it cannot be intercepted by a sim swap.
SPEAKER_01That makes total sense. And if you want to go a step beyond the app, Keisling highly recommends what he calls the ultimate$40 deadbolt, which is a physical hardware security key like a UBT.
SPEAKER_00A hardware key is brilliant because it relies on physical cryptography. You literally plug it into your laptop's USB port or tap it to the back of your phone whenever you need to log in.
SPEAKER_01So it's a physical object you have to hold.
SPEAKER_00Yes. You have to physically possess this tiny piece of plastic and metal to access the account. A hacker in another country can have your password and your email, but without that physical key sitting on your keychain, they are completely locked out. Keisling calls it the closest thing to bulletproof your email is going to get for the rest of this decade.
SPEAKER_01Honestly, a$40 piece of hardware to protect your digital life feels like the ultimate bargain right now.
SPEAKER_00It really does.
SPEAKER_01All right. The final tech layer of the bunker is the browser. We talked about that pushpaganda attack earlier where they hijack notifications to push fake legal threats. The defense here is refreshingly blunt, right?
SPEAKER_00Very blunt.
SPEAKER_01You just go into your browser settings, Chrome, Safari, whatever you use, find site permissions or notifications, and you audit the list. If you see anything weird, any random news site or blog you don't recognize, revoke its permission immediately.
SPEAKER_00And then he establishes a hard, non-negotiable rule for the future. When a website asks if it can send you notifications, the answer is always no. Always. A permanent, universal no. He stresses this heavily. There is no website on earth where the correct answer to that prompt is yes. Not your bank, not your favorite news aggregator, not the local weather channel. None of them need the ability to push alerts directly to your desktop. You just have to stop saying yes and you instantly close off that entire avenue of attack.
SPEAKER_01You know, here's where it gets really interesting, though. We have locked down the phone, secured the email with a hardware key, and shut off browser notifications. But Keisling says that even with all these technical settings perfectly dialed in, some of this AI wave is still gonna slip through.
SPEAKER_00It's inevitable.
SPEAKER_01Right. The platforms just aren't perfect. So the final and honestly the most crucial layer of this entire defense is the human firewall. You have to actively retrain your own brain.
SPEAKER_00This requires a complete psychological paradigm shift. Think about how we have all been trained for the last 20 years to spot spam. What do we look for?
SPEAKER_01Typos, usually.
SPEAKER_00Exactly. We look for typos, we look for weird formatting, we look for the classic Nigerian prince syntax where the English is just a little bit broken. Kiesling's most urgent warning is that those rules are completely 100% dead.
SPEAKER_01We basically have to unlearn an entire generation of internet safety. The Nigerian prince has learned perfect English, he has an MBA, and he knows exactly where you went to high school.
SPEAKER_00That is the perfect way to phrase it. The new tell for spam is no longer sloppiness. The new tell is hyper-specificity from a stranger.
SPEAKER_01Hyper specificity.
SPEAKER_00Yes. If a message arrives and it feels perfectly tailored to you, uh, it uses your real name, it references your child's name, it mentions the specific branch of the bank you use, and it is from someone you do not have an existing verified relationship with, you must assume it is an AI attack. The personalization isn't a friendly coincidence. The personalization is the weapon.
SPEAKER_01That is so deeply counterintuitive to how human beings operate. I mean, we are biologically wired to trust things that seem to know us. Yeah. If someone drops my kid's name in a text, my guard naturally dropped because I assume we must have crossed paths.
SPEAKER_00Right. It's human nature.
SPEAKER_01But Keisling is saying that is the exact moment your guard needs to go up the highest. And because the spam is now grammatically perfect and emotionally precise, he introduces the ultimate behavioral rule for money in emergencies, which he calls the two-channel verification rule.
SPEAKER_00This is the absolute cornerstone of the human firewall. It is a rule you need to agree upon right now with your spouse, your aging parents, your business partners. If you receive any request to move money, a wire transfer, buying gift cards, an urgent email from the boss saying a vendor invoice needs to be paid immediately, you verify it on a completely different channel before you take a single action.
SPEAKER_01So if you get an email from your bot saying wire$5,000 to this vendor, you pick up the phone and call them. If you get a text message from your partner saying I'm in trouble, Venmo me$500, you get up, walk down the hall, and talk to them.
SPEAKER_00You never ever verify the request on the same channel it arrived on. Keisling estimates that this single behavioral habit blocks roughly 90% of the actual financial devastation these scams cause.
SPEAKER_01That's huge.
SPEAKER_00It is. The criminals are entirely counting on your momentum. They engineer a sense of absolute panic and urgency specifically to make you act without pausing to make that second call. Refusing to react on their timeline is how you win.
SPEAKER_01I have to be honest. Talking about engineered urgency brings us to a part of the text that made my stomach completely drop. Voice cloning.
SPEAKER_00Yeah. That part is rough.
SPEAKER_01I knew the technology existed, but Keisley notes it is now a five-second tool. Five seconds. A scammer can take 30 seconds of audio from your teenager's public TikTok account, clone their voice flawlessly, and call you sounding exactly like your kid. They will be panicking, crying about being in a horrific car crash, or begging for bail money.
SPEAKER_00It is the ultimate form of emotional manipulation because when you hear your own child crying in terror, the logic centers of your brain completely shut down.
SPEAKER_01Of course they do.
SPEAKER_00You go straight into a primal fight or flight mode. You aren't sitting there analyzing audio artifacts or listening for digital compression. You are just desperately trying to save your kid.
SPEAKER_01As a parent, if I hear my kid screaming on the phone, all logic goes completely out the window. How on earth do you defend against that? Are you really telling me I have to hang up on my own child?
SPEAKER_00It is a brutal rule, but yes, you hang up the phone, even if every fiber of your being is screaming that your daughter is in danger, you hang up and you immediately call her back at the save number you already have in your contacts. Wow. You survive that scam by actively choosing not to be a participant on that specific incoming call. You take back control of the situation by initiating the second channel yourself.
SPEAKER_01Man.
SPEAKER_00Yeah.
SPEAKER_01That takes incredible, almost superhuman discipline. Hanging up on what sounds exactly like your terrified kid, but it is literally the only way to know for sure. You have to break that engineered urgency.
SPEAKER_00And that really summarizes the entire philosophy of Keisling's 30-minute bunker. It is about removing the friction of incoming attacks by letting your phone block them and deliberately creating friction for your own reactions when something does get through.
SPEAKER_01Let's recap what building this bunker actually achieves. We established up front that it won't stop the wave of slop. Your inbox is still going to get hit with AI-generated nonsense. Your phone might still occasionally ring with a cloned voice, and your text messages are going to look increasingly bizarre.
SPEAKER_00Yeah, that part is unavoidable.
SPEAKER_01But what this 30 minutes of effort does is ensure that the wave bounces off you rather than washing through you and destroying your life.
SPEAKER_00It ensures that the perfectly targeted, hyper-specific phishing email gets stopped cold by a physical hardware key. It ensures that the cloned voice of your loved one gets hung up on and verified through a trusted channel. It ensures that the ad fraud spam reaches your blocked folder instead of draining your bank account.
SPEAKER_01It buys you six months. Because Keisling points out a hopeful truth here. The major platforms will eventually catch up. They always do. Apple will release a massive new OS level defense. Google will completely overhaul Gmail's underlying filtering architecture.
SPEAKER_00Right. The telecom carriers will be forced to tighten their network protocols against sim swapping.
SPEAKER_01Exactly. Eventually the wave will plateau and society will settle into a new normal. It might be a slightly more annoying, higher friction normal than we had five years ago, but it will be vastly better than the absolute peak of the storm we are entering right now. The bunker just ensures you survive the storm intact.
SPEAKER_00You know, this raises an important question, though, and it is a thread Kiesling mentions he is exploring in his next set of field notes. We have spent this entire deep dive talking about personal defense, protecting your own bank account, your own family, your own peace of mind.
SPEAKER_01Right.
SPEAKER_00But if we are entering a world where you and I have to baseline assume that perfectly tailored audio, text messages, and emails are entirely fabricated by AI, what happens to society's systems of record? Think about our courts. Oh my. What happens to police reports and the broader justice system when a judge or a jury can no longer definitively tell whether a witness statement, an email chain proving corporate fraud, or a security recording is actually real?
SPEAKER_01That is a staggering problem. If the very concept of digital evidence completely fractures, we are looking at a much bigger societal headache than just ignoring spam text.
SPEAKER_00It's going to be incredibly messy to navigate, and it fundamentally changes how the law operates.
SPEAKER_01But for today, for this weekend, we have to focus on the front door. We can't fix the justice system by Sunday, but we can absolutely fix our phone settings. So I will leave you with Robert Keisling's parting advice, which is essentially the new survival mantra for the digital age. Stay sharp. Trust your gut. Make the second phone call. And whatever you do, don't click the link. Take the 30 minutes to lock that digital deadbolt. Listen for the click and keep the chaos on the outside. outside.