This Is Scary: The Power Of AI | Glenn Meder

By Liberty and Finance

Share:

Key Concepts

  • AI as a Control Grid: Artificial Intelligence is presented as a tool for creating a digital control grid based on surveillance, aiming to manipulate and control individuals.
  • Three Major Threats: Hackers and scammers, Big Tech, and Big Brother (government) are identified as the primary threats to financial freedom, privacy, and liberty.
  • Data Weaponization: All three threats are motivated by the desire to collect and weaponize personal data against individuals.
  • Digital ID and Surveillance: The push for digital IDs is seen as a gateway to total surveillance, eliminating online privacy and anonymity.
  • Erosion of Rights: There's a concern about the creeping and sudden inversion of natural rights, where privacy is no longer presumed and individuals are treated as guilty until proven innocent.
  • AI's Manipulative Power: AI's ability to learn through observation and predict/manipulate human behavior is highlighted as its most dangerous superpower.
  • Privacy Academy's Approach: The Privacy Academy aims to simplify privacy education by breaking down complex issues into manageable, bite-sized steps.
  • Local Action and Personal Privacy: The emphasis is on organizing at the local level and prioritizing personal privacy as a first step to counter larger systemic threats.

Summary

This discussion with Glenn Meter, founder of the Privacy Academy, on Liberty and Finance, addresses critical threats to individual freedom, privacy, and financial security in the digital age, with a particular focus on the role of Artificial Intelligence (AI).

The Digital Control Grid and Major Threats

Glenn Meter posits that the most important issue facing humanity is the creation of a "control grid" based on surveillance, being implemented rapidly and often without public awareness. He identifies three major threats that all share the common goal of acquiring and weaponizing personal data:

  1. Hackers and Scammers: These actors are becoming increasingly sophisticated, now supercharged by AI, posing an immediate and dangerous threat.
  2. Big Tech: Companies in this sector are driven by data collection, building detailed profiles of individuals.
  3. Big Brother (Government): This represents a globally coordinated effort to establish a control grid through surveillance, with digital IDs being a key component.

The core motivation behind all these threats is the desire to "collect your data," "weaponize this data against you," and gain control.

The "Cheese" and the "Trap": Loyalty Programs and Data Exploitation

A real-world example illustrates the danger of seemingly innocuous data collection. The speaker recounts an experience with a grocery store loyalty card, where a fraudulent charge appeared on their Visa account. The store attributed the issue to the loyalty card, highlighting how a "bad actor" could exploit loyalty card numbers to rack up illegal charges, which then get passed on to the individual's credit card. This exemplifies the "trap behind the cheese" – the convenience or discount offered by loyalty programs masks the underlying risk of data exploitation.

The Existential Threat of Big Brother and Digital IDs

While hackers and scammers are an immediate concern, Meter identifies "Big Brother" as the more "existential threat." He points to a globally coordinated effort to implement a control grid based on surveillance, with digital IDs as a central element. Examples cited include:

  • Online Child Safety Laws: These are presented as a pretext for implementing digital IDs. Texas's "online child safety act" quickly led to requirements for digital identity verification to download apps.
  • Search Engine and Platform Restrictions: Australia requires identity verification to use search engines, and the UK mandates facial scans for platforms like Discord.

These measures are designed to eliminate online privacy and anonymity, leading to total surveillance and the suppression of freedom of speech.

The Inversion of Rights and the COVID-19 Precedent

The discussion touches upon the erosion of "God-given natural intrinsic unalienable rights," including privacy. The shift from "innocent until proven guilty" to a state of constant surveillance, akin to being "under house arrest," is a significant concern. Meter draws a parallel to the COVID-19 pandemic, which he views as a "trial run" for this control grid. He notes that resistance in "red states" was based on the belief that rights come from God and cannot be infringed upon by the state. However, he expresses concern that even "red states" are now implementing measures like online child safety acts, often under the guise of protection, which ultimately serve to expand government control. The speaker criticizes the inversion of bill titles, where measures intended for control are framed as protective.

Understanding and Countering AI's Power

Glenn Meter provides a detailed explanation of AI:

  • Definition: AI is described as an "incredibly powerful software program that is self-learning," capable of learning through observation without direct programmer input. It "understands" what it sees, potentially in ways different from humans.
  • Purpose: AI was created to organize and understand the vast amounts of data collected by entities like Google and the NSA. This data is used to build profiles, understand individual habits, and predict actions.
  • Superpower: Manipulation: AI's most significant capability is its ability to "manipulate us."
  • Personal Anecdote: A powerful personal story illustrates AI's manipulative potential. Meter's son, a line cook experiencing depression, was listening to a specific song ("Rotten Apples" by Alice in Chains) repeatedly. Upon opening TikTok, he encountered a meme specifically tailored to his situation – a line cook listening to "Rotten Apples," feeling angry and depressed, and contemplating suicide. Meter argues this was not a coincidence but a targeted AI-generated post designed to "push him over the edge." He emphasizes that this is a precursor to the capabilities seen in tools like ChatGPT.
  • AI as "Google Maps" for the Mind: Meter likens AI to Google Maps, but instead of navigating physical locations, it navigates "mental states of mind" or "emotional states of mind." It can be programmed to take individuals down specific paths, such as despair or radicalization, as seen with TikTok, which is owned by China and allegedly tasked by the communist government to "destabilize the teens in the West."

The Device-Centric World and the Need for Action

The conversation highlights how younger generations are increasingly absorbed in a "device-centric world," where virtual interactions replace real-world experiences. This, combined with the intentional manipulation by AI, creates a dangerous environment.

Steps Towards Reclaiming Privacy

Recognizing the overwhelming nature of these threats, Meter stresses that there is "no silver bullet." Privacy is a complex subject, but the Privacy Academy aims to simplify it. Key recommendations include:

  • Technical Measures: Using private browsers, search engines, and trustworthy VPNs.
  • Device Security: Being aware of AI built into devices. For example, Windows 11's "Copilot" takes screenshots every second to learn about the user.
  • Organizing Locally: Meter believes the federal government may be beyond saving and advocates for organizing and taking action at the local and state levels.
  • Prioritizing Personal Privacy: The first step is to "get ourselves private" and "get our own house in order."

Simplifying Privacy: The Privacy Academy's Approach

Acknowledging the bewilderment many feel regarding privacy and technology, Meter explains that the Privacy Academy breaks down complex issues into "bite-sized pieces." They provide a plan and guide individuals through each step at their own pace. They emphasize that even seemingly daunting tasks, like managing passwords, can be simplified and made easier with the right approach. The academy has seen success with individuals of all ages, including elderly participants who are achieving "next-level privacy steps."

Upcoming Webinar and Resources

An upcoming one-hour educational webinar on November 20th is announced. It will outline the privacy problem, offer five immediate steps for individuals to begin their privacy journey, and include a live Q&A session. Links to information about the webinar and the Privacy Academy website (privacyacademy.com) will be provided in the video description. The Liberty and Finance website (libertyandfinance.com) also offers a free newsletter with daily interview summaries.

Conclusion

The discussion concludes with a call to action, urging viewers to be aware of the threats posed by AI and the expanding surveillance state. The emphasis is on proactive steps to reclaim personal privacy and resist the erosion of freedoms, starting with individual action and local organization.

Miles Franklin Weekly Specials (November 3rd - November 10th, 2025)

  • 10 oz Silver Buffalo Bars: $349 over spot per ounce.
  • 2025 2 oz Silver Canadian Rockies Coins: $449 over spot per ounce.
  • 1 oz Gold Rand Refinery Bars: $135 over spot.
  • Pre-33 XF $5 Gold Liberty Coins: $45 over melt per coin.

To order, call 1-888-1-LIBERTY (1-888-15-4237).

Chat with this Video

AI-Powered

Hi! I can answer questions about this video "This Is Scary: The Power Of AI | Glenn Meder". What would you like to know?

Chat is based on the transcript of this video and may not be 100% accurate.

Related Videos

Ready to summarize another video?

Summarize YouTube Video