In Memory of Man Podcast - Robot Crime Blog

The Internet Died. Now They’re Coming for Your Phone

RCB Season 1 Episode 64

Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.

0:00 | 22:00

 The provided podcast warns that the open internet and private communication channels are currently being overwhelmed by an unstoppable wave of AI-generated spam and sophisticated bot activity. The author highlights how new open-source tools allow bad actors to automate perfectly tailored scams across iMessage, Gmail, and phone calls, making traditional red flags like typos obsolete. To combat this, the source outlines a "30-minute bunker" strategy involving technical settings such as filtering unknown callers and enabling two-factor authentication. Crucially, it advises readers to adopt a skeptical mindset, suggesting that any highly specific message from a stranger should be treated as artificial. The overarching goal is to provide a temporary defense for individuals to protect their finances and privacy until major platforms can develop better systemic protections. Ultimately, the text serves as a practical guide for surviving a rapidly collapsing digital ecosystem where human interaction is increasingly difficult to verify. 

SPEAKER_01

Um when you lock your front door at night, there's a very specific kind of comfort that comes with it. You know, you turn the deadbolt, you hear that solid metallic click, and you just know that the space inside your house is yours.

SPEAKER_00

Right. It's entirely yours. It is private.

SPEAKER_01

Exactly. The chaos of the outside world, the noise, uh, the strangers on the street, they're all officially on the other side of that wood and metal.

SPEAKER_00

Yeah.

SPEAKER_01

And we have always assumed our digital lives work the same way.

SPEAKER_00

Yeah, that you have the public internet out there, the chaotic streets and billboards, but then you have your private digital house. Aaron Powell Right.

SPEAKER_01

Your text messages, your personal email, your direct phone line. That was supposed to be the safe space.

SPEAKER_00

The sanctuary. I mean, the place where only the people you physically gave the key to could ever actually reach you.

SPEAKER_01

Aaron Powell But the lock on that digital front door has fundamentally broken. And not just for you, but for every single person listening to this deep dive.

SPEAKER_00

Yeah, it's pretty wild.

SPEAKER_01

We are looking at a startling set of what the author calls field notes, written by Robert Keesling. He's a Texas trial attorney who runs a blog called Robot Crimeblog.com. And uh he is sounding an absolutely massive alarm right now.

SPEAKER_00

He really is.

SPEAKER_01

The core premise of his piece is chillingly straightforward. He says, the internet died. Now they're coming for your phone.

SPEAKER_00

It is a phenomenal, just ruthless piece of writing. Keisling argues that the open internet, you know, the web we browse every day is already essentially dead. Right. Search engines have been completely strip-mined. Independent publishers are basically starved out. Bots are generating more traffic than actual human beings. I mean, Merriam Webster even named Slop the word of the year for 2025. Oh well.

SPEAKER_01

Slopple.

SPEAKER_00

Yeah, slop. That is our current reality. The open web is just an endless churning sea of AI-generated filler.

SPEAKER_01

Okay, let's unpack this. Because jumping from, you know, the internet is full of junk articles to my private text messages are going to collapse feels like a massive leap to me.

SPEAKER_00

It does seem like a jump, yeah.

SPEAKER_01

I need to understand the scale of the storm we are supposedly facing here. Because I mean, I already get a hundred spam calls a day. I get the fake car warranty voicemails and the weird credit card alerts. Is it really gonna get that much worse?

SPEAKER_00

Unfortunately, yes.

SPEAKER_01

I mean, isn't this just the same old robocall annoyance we have been dealing with for a decade?

SPEAKER_00

So to understand why this is a completely different tier of threat, we have to look at the receipts Keisling brings to the table. His primary source is Nikita Beer, the head of product at X.

SPEAKER_01

Okay.

SPEAKER_00

Beer's literal full-time job, like the thing he wakes up every day to do, is stopping bots from eating that massive platform alive. And a few months ago, he made a public prediction that sent absolute shock waves through the tech community. What did he say? Beer predicted that in less than 90 days, the channels we historically thought were safe from automation, so specifically iMessage, phone calls, and Gmail, will be so flooded with hyper-personalized spam that they will become functionally unusable.

SPEAKER_01

Functionally unusable.

SPEAKER_00

Right. And the terrifying kicker, he explicitly said we will have no way to stop it.

SPEAKER_01

Wait, hold on, let me push back on that for a second. Beer works at X. His entire job is dealing with public social media, which, let's be honest, has always been a free-for-all.

SPEAKER_00

My point.

SPEAKER_01

Why should we trust his prediction about private encrypted channels like iMessage or, you know, enterprise grade systems like Gmail? Those are totally different architectures. Yeah. Apple and Google have billions of dollars dedicated to securing those specific pipelines.

SPEAKER_00

You're hitting on the exact blind spot most people have. We just assume those companies have an infinite capacity to filter garbage. But Keisling uses an amazing analogy to explain Beer's panic here.

SPEAKER_01

Okay, what's the analogy?

SPEAKER_00

He describes the moderation teams at these tech giants as firefighters with garden hoses pointed at a raging forest fire.

SPEAKER_01

Oh wow.

SPEAKER_00

Yeah. Just to give you the math on this, Beer's team at X was suspending 208 bot accounts every single minute.

SPEAKER_01

Every minute.

SPEAKER_00

Every single minute. They purged 1.7 million accounts in October 2025 alone. But 48 hours later, those 1.7 million accounts just respawned.

SPEAKER_01

That's insane.

SPEAKER_00

It is a mathematical impossibility to win a fight using traditional moderation when your enemy has an infinite supply of ammunition.

SPEAKER_01

So what changed? I mean, why do they suddenly have infinite ammunition?

SPEAKER_00

Kiesling puts it perfectly. He says, someone open source the lighter.

SPEAKER_01

I love that phrasing. What is the lighter in this scenario? Because obviously we've had AI chatbots for a while now.

SPEAKER_00

Aaron Powell Right. But the lighter here is a piece of software called OpenClaw. It launched in late 2025. And the key detail is that it is completely free and it doesn't require a massive, expensive server farm to run. Aaron Powell Oh, interesting. Yeah, it runs perfectly on a standard off-the-shelf laptop. You give OpenClaw access to a browser, your email, or your messaging apps, and it acts as an entirely autonomous assistant. It reads incoming text, drafts contextual replies, and sends messages around the clock entirely on its own.

SPEAKER_01

Aaron Powell Wait, so it's not just a script blasting out one generic message. It is holding conversations.

SPEAKER_00

Exactly. And it caught on with unprecedented speed. OpenClaw hit 145,000 GitHub stars in a single week in January. By April, it crossed 300,000.

SPEAKER_01

Aaron Powell Okay, for anyone not living in the developer world, why does the GitHub star metric matter? Is that just like a popularity contest?

SPEAKER_00

Aaron Powell Far from it, actually. A GitHub star is essentially a developer bookmarking a project to use it. Hitting 300,000 stars means hundreds of thousands of people, and many of them bad actors, are actively downloading and deploying this tool.

SPEAKER_01

That is a massive scale.

SPEAKER_00

It became the fastest growing open source project in history. It beat out foundational tech like React or TensorFlow. Wow. What this practically means is the barrier to entry for complex conversational spam has dropped to absolute zero. Any amateur with a laptop can point open claw at an entire leaked database of phone numbers and run a thousand message-a-day, highly personalized extortion operation by sundown.

SPEAKER_01

And we are already seeing the real-world application of this. Keisling brings up a massive AI spam ring that security researchers at the firm Human exposed recently. They dubbed it Pushpaganda.

SPEAKER_00

Oh, yeah, pushpaganda.

SPEAKER_01

And the mechanics of this are just wild. This wasn't some minor annoyance where you get a weird email. Pushpaganda generated 240 million ad fraud bid requests across 113 domains in just seven days.

SPEAKER_00

Let's break down how that actually makes them money, because the mechanism is incredibly insidious. They didn't just blast out fake links, they used AI to generate highly engaging, totally fabricated news stories.

SPEAKER_01

Right.

SPEAKER_00

Then they gamed the algorithms to hijack the Google Discover feed, you know, that news feed on your phone to get these fake stories in front of millions of people.

SPEAKER_01

So they bait you with a sensational headline.

SPEAKER_00

Exactly. Once you click the article, the site would aggressively prompt you to enable browser notifications to quote unquote read the rest of the story. Millions of people just absent-mindedly clicked allow.

SPEAKER_01

Oh no, because we're all so used to just clicking through those pop-ups. Right.

SPEAKER_00

And the second they had that permission, the crap snapshot. They used those browser notifications to bombard your desktop and phone screen with fake legal threats, fake antivirus warnings, complex financial scam.

SPEAKER_01

Just constant pop-ups.

SPEAKER_00

Yep. Every time a user clicked one of those panicked alerts or called the fake support number, the scammers monetized it. Google eventually patched the vulnerability, but by the time they did, ten more identical operations using the same open source tools were already running.

SPEAKER_01

It's like playing whack-a-mole, but the moles are multiplying.

SPEAKER_00

Yeah, exactly. You know, if we connect this to the bigger picture, Keisling points out something crucial. This is not a conspiracy. There is no shadowy villain sitting in a volcano lair trying to ruin the internet.

SPEAKER_01

Right. It's not a James Bond movie.

SPEAKER_00

It is an emergent failure of an open system. Technology evolved to the point where AI made the production of highly persuasive text essentially free. The market naturally selected for this slop because it generates ad revenue and extortion payouts at an infinite scale.

SPEAKER_01

That makes total sense.

SPEAKER_00

You can investigate and dismantle a conspiracy, but a market dynamic where the cost of attacking is zero, you just have to outlast it.

SPEAKER_01

Which brings us to the core mission of today's deep dive. If the platforms, uh the telecom companies, Google, Apple, are mathematically losing this war right now, they cannot stop the flood from reaching you.

SPEAKER_00

They really can't.

SPEAKER_01

That means the responsibility for defending your digital front door falls entirely on your shoulders. You have to build the defense. And Keisling calls it the 30-minute bunker.

SPEAKER_00

But before we detail the architecture of this bunker, we really have to stress Keisling's massive caveat here. This will not save you permanently.

SPEAKER_01

Right, it is not a magical force field.

SPEAKER_00

Far from it. The wave of AI garbage is coming regardless of what settings you toggle. What this bunker does is buy you time. It buys you, your parents, and your kids about six months of breathing room, while the rest of the world and the tech giants figure out how to adapt.

SPEAKER_01

And it takes about 30 minutes to set up, it costs almost nothing, and you need zero technical skill to execute it. Okay, let's start locking the doors. We'll begin with the phone app, because that is the most immediate disruptive point of contact. Keisling outlines specific settings you need to change right now. For iPhone users, you go into your settings, then phone, then find screen unknown callers. Right. But you don't just set it to silence them, you set it to ask reason for calling.

SPEAKER_00

That is such a brilliant, highly underutilized feature. If a number isn't saved in your contacts, the caller physically has to explain to Apple's digital assistant why they are calling before your phone is even allowed to ring.

SPEAKER_01

It is exactly like hiring a bouncer for your front door. You are forcing their automated spam bot to try and hold a conversation with your digital robot first.

SPEAKER_00

Exactly. Let the bots fight it out.

SPEAKER_01

Yeah. And for text messages, the process is similar. You go to settings, then messages, and toggle on filter unknown senders. Anything from a stranger gets silently shoved into a separate folder that doesn't trigger a push notification. You simply never see it unless you go looking for it.

SPEAKER_00

And for Android users, the workflow is just as easy. You open the phone app, tap the three dots for settings, find caller ID and spam, and turn on both blocking toggles. Perfect. But Keisling also insists on a third network level layer for your phone, which is activating the free spam blocking apps provided by your cellular carrier.

SPEAKER_01

Oh, like the ones from ATT and Verizon.

SPEAKER_00

Yeah. We are talking about Verizon Call Filter, ATT Active Armor, or T-Mobile Scam Shield. You are already paying for the network, these apps are free, and they have gotten significantly better at catching the baseline garbage before it even reaches your device's operating system.

SPEAKER_01

Okay, so we've put a bouncer on the phone app.

SPEAKER_00

Uh-huh.

SPEAKER_01

But if a bot army realizes it can't reach my phone, isn't it's next logical move to try and compromise my online accounts directly? Like how do we lock down the email?

SPEAKER_00

The foundational defense for email is two-factor authentication, which most people know as 2FA. But Keysling makes a very specific critical distinction that we need to spend some time on. You must use an authenticator app like Google Authenticator or Authy or the system built directly into Apple's password manager. You absolutely cannot rely on those six-digit codes they send you via text message.

SPEAKER_01

Wait, really? Because I feel like almost every major bank and website still defaults to texting me a code. Why is that suddenly a massive vulnerability?

SPEAKER_00

Because text messages rely on the cellular network protocol, which is surprisingly fragile. A scammer doesn't need to hack your phone to get your text messages. They just need to do what's called a sim swap.

SPEAKER_01

I've heard of that. How does that work?

SPEAKER_00

They call up ATT or Verizon, pretend to be you. Maybe they bought your social security number on the dark web to answer the security questions.

SPEAKER_01

Oh terrifying.

SPEAKER_00

Right. And they convince the customer service rep that you lost your phone and need your phone number ported to a new SIM card.

SPEAKER_01

And the second that customer service rep clicks approve, your physical phone loses service, and the scammer's phone suddenly receives all your calls and text messages.

SPEAKER_00

Which means when they try to log into your Gmail or your bank, and the bank texts that six-digit security code, it goes straight to the scammer.

SPEAKER_01

Oh wow. So they're right in.

SPEAKER_00

That is why SMS codes are fundamentally broken. Authenticator apps, on the other hand, generate the security code locally on your physical device. It never travels over the airwave, so it cannot be intercepted by a sim swap.

SPEAKER_01

That makes total sense. And if you want to go a step beyond the app, Keisling highly recommends what he calls the ultimate$40 deadbolt, which is a physical hardware security key like a UBT.

SPEAKER_00

A hardware key is brilliant because it relies on physical cryptography. You literally plug it into your laptop's USB port or tap it to the back of your phone whenever you need to log in.

SPEAKER_01

So it's a physical object you have to hold.

SPEAKER_00

Yes. You have to physically possess this tiny piece of plastic and metal to access the account. A hacker in another country can have your password and your email, but without that physical key sitting on your keychain, they are completely locked out. Keisling calls it the closest thing to bulletproof your email is going to get for the rest of this decade.

SPEAKER_01

Honestly, a$40 piece of hardware to protect your digital life feels like the ultimate bargain right now.

SPEAKER_00

It really does.

SPEAKER_01

All right. The final tech layer of the bunker is the browser. We talked about that pushpaganda attack earlier where they hijack notifications to push fake legal threats. The defense here is refreshingly blunt, right?

SPEAKER_00

Very blunt.

SPEAKER_01

You just go into your browser settings, Chrome, Safari, whatever you use, find site permissions or notifications, and you audit the list. If you see anything weird, any random news site or blog you don't recognize, revoke its permission immediately.

SPEAKER_00

And then he establishes a hard, non-negotiable rule for the future. When a website asks if it can send you notifications, the answer is always no. Always. A permanent, universal no. He stresses this heavily. There is no website on earth where the correct answer to that prompt is yes. Not your bank, not your favorite news aggregator, not the local weather channel. None of them need the ability to push alerts directly to your desktop. You just have to stop saying yes and you instantly close off that entire avenue of attack.

SPEAKER_01

You know, here's where it gets really interesting, though. We have locked down the phone, secured the email with a hardware key, and shut off browser notifications. But Keisling says that even with all these technical settings perfectly dialed in, some of this AI wave is still gonna slip through.

SPEAKER_00

It's inevitable.

SPEAKER_01

Right. The platforms just aren't perfect. So the final and honestly the most crucial layer of this entire defense is the human firewall. You have to actively retrain your own brain.

SPEAKER_00

This requires a complete psychological paradigm shift. Think about how we have all been trained for the last 20 years to spot spam. What do we look for?

SPEAKER_01

Typos, usually.

SPEAKER_00

Exactly. We look for typos, we look for weird formatting, we look for the classic Nigerian prince syntax where the English is just a little bit broken. Kiesling's most urgent warning is that those rules are completely 100% dead.

SPEAKER_01

We basically have to unlearn an entire generation of internet safety. The Nigerian prince has learned perfect English, he has an MBA, and he knows exactly where you went to high school.

SPEAKER_00

That is the perfect way to phrase it. The new tell for spam is no longer sloppiness. The new tell is hyper-specificity from a stranger.

SPEAKER_01

Hyper specificity.

SPEAKER_00

Yes. If a message arrives and it feels perfectly tailored to you, uh, it uses your real name, it references your child's name, it mentions the specific branch of the bank you use, and it is from someone you do not have an existing verified relationship with, you must assume it is an AI attack. The personalization isn't a friendly coincidence. The personalization is the weapon.

SPEAKER_01

That is so deeply counterintuitive to how human beings operate. I mean, we are biologically wired to trust things that seem to know us. Yeah. If someone drops my kid's name in a text, my guard naturally dropped because I assume we must have crossed paths.

SPEAKER_00

Right. It's human nature.

SPEAKER_01

But Keisling is saying that is the exact moment your guard needs to go up the highest. And because the spam is now grammatically perfect and emotionally precise, he introduces the ultimate behavioral rule for money in emergencies, which he calls the two-channel verification rule.

SPEAKER_00

This is the absolute cornerstone of the human firewall. It is a rule you need to agree upon right now with your spouse, your aging parents, your business partners. If you receive any request to move money, a wire transfer, buying gift cards, an urgent email from the boss saying a vendor invoice needs to be paid immediately, you verify it on a completely different channel before you take a single action.

SPEAKER_01

So if you get an email from your bot saying wire$5,000 to this vendor, you pick up the phone and call them. If you get a text message from your partner saying I'm in trouble, Venmo me$500, you get up, walk down the hall, and talk to them.

SPEAKER_00

You never ever verify the request on the same channel it arrived on. Keisling estimates that this single behavioral habit blocks roughly 90% of the actual financial devastation these scams cause.

SPEAKER_01

That's huge.

SPEAKER_00

It is. The criminals are entirely counting on your momentum. They engineer a sense of absolute panic and urgency specifically to make you act without pausing to make that second call. Refusing to react on their timeline is how you win.

SPEAKER_01

I have to be honest. Talking about engineered urgency brings us to a part of the text that made my stomach completely drop. Voice cloning.

SPEAKER_00

Yeah. That part is rough.

SPEAKER_01

I knew the technology existed, but Keisley notes it is now a five-second tool. Five seconds. A scammer can take 30 seconds of audio from your teenager's public TikTok account, clone their voice flawlessly, and call you sounding exactly like your kid. They will be panicking, crying about being in a horrific car crash, or begging for bail money.

SPEAKER_00

It is the ultimate form of emotional manipulation because when you hear your own child crying in terror, the logic centers of your brain completely shut down.

SPEAKER_01

Of course they do.

SPEAKER_00

You go straight into a primal fight or flight mode. You aren't sitting there analyzing audio artifacts or listening for digital compression. You are just desperately trying to save your kid.

SPEAKER_01

As a parent, if I hear my kid screaming on the phone, all logic goes completely out the window. How on earth do you defend against that? Are you really telling me I have to hang up on my own child?

SPEAKER_00

It is a brutal rule, but yes, you hang up the phone, even if every fiber of your being is screaming that your daughter is in danger, you hang up and you immediately call her back at the save number you already have in your contacts. Wow. You survive that scam by actively choosing not to be a participant on that specific incoming call. You take back control of the situation by initiating the second channel yourself.

SPEAKER_01

Man.

SPEAKER_00

Yeah.

SPEAKER_01

That takes incredible, almost superhuman discipline. Hanging up on what sounds exactly like your terrified kid, but it is literally the only way to know for sure. You have to break that engineered urgency.

SPEAKER_00

And that really summarizes the entire philosophy of Keisling's 30-minute bunker. It is about removing the friction of incoming attacks by letting your phone block them and deliberately creating friction for your own reactions when something does get through.

SPEAKER_01

Let's recap what building this bunker actually achieves. We established up front that it won't stop the wave of slop. Your inbox is still going to get hit with AI-generated nonsense. Your phone might still occasionally ring with a cloned voice, and your text messages are going to look increasingly bizarre.

SPEAKER_00

Yeah, that part is unavoidable.

SPEAKER_01

But what this 30 minutes of effort does is ensure that the wave bounces off you rather than washing through you and destroying your life.

SPEAKER_00

It ensures that the perfectly targeted, hyper-specific phishing email gets stopped cold by a physical hardware key. It ensures that the cloned voice of your loved one gets hung up on and verified through a trusted channel. It ensures that the ad fraud spam reaches your blocked folder instead of draining your bank account.

SPEAKER_01

It buys you six months. Because Keisling points out a hopeful truth here. The major platforms will eventually catch up. They always do. Apple will release a massive new OS level defense. Google will completely overhaul Gmail's underlying filtering architecture.

SPEAKER_00

Right. The telecom carriers will be forced to tighten their network protocols against sim swapping.

SPEAKER_01

Exactly. Eventually the wave will plateau and society will settle into a new normal. It might be a slightly more annoying, higher friction normal than we had five years ago, but it will be vastly better than the absolute peak of the storm we are entering right now. The bunker just ensures you survive the storm intact.

SPEAKER_00

You know, this raises an important question, though, and it is a thread Kiesling mentions he is exploring in his next set of field notes. We have spent this entire deep dive talking about personal defense, protecting your own bank account, your own family, your own peace of mind.

SPEAKER_01

Right.

SPEAKER_00

But if we are entering a world where you and I have to baseline assume that perfectly tailored audio, text messages, and emails are entirely fabricated by AI, what happens to society's systems of record? Think about our courts. Oh my. What happens to police reports and the broader justice system when a judge or a jury can no longer definitively tell whether a witness statement, an email chain proving corporate fraud, or a security recording is actually real?

SPEAKER_01

That is a staggering problem. If the very concept of digital evidence completely fractures, we are looking at a much bigger societal headache than just ignoring spam text.

SPEAKER_00

It's going to be incredibly messy to navigate, and it fundamentally changes how the law operates.

SPEAKER_01

But for today, for this weekend, we have to focus on the front door. We can't fix the justice system by Sunday, but we can absolutely fix our phone settings. So I will leave you with Robert Keisling's parting advice, which is essentially the new survival mantra for the digital age. Stay sharp. Trust your gut. Make the second phone call. And whatever you do, don't click the link. Take the 30 minutes to lock that digital deadbolt. Listen for the click and keep the chaos on the outside. outside.