Special Deal: You've gotten 25% off by being a viewer of our partner!

Claim Discount

Podcasts > The Joe Rogan Experience > #2473 - Bill Thompson

#2473 - Bill Thompson

By Joe Rogan

In this episode of The Joe Rogan Experience, Bill Thompson shares his path from a challenging childhood to a career in military intelligence and cyber operations, including deployments to Iraq, Afghanistan, and the Philippines. Now running Spartan Forge, an outdoor experiences company, Thompson brings his expertise to discussions about mobile technology security, data privacy, and the practices of major tech companies.

The conversation explores broader societal themes, including the modern pathways to manhood and the role of military service and fatherhood in personal development. Thompson and Rogan also examine concerns about government surveillance, data collection, and the balance of power between citizens and government, discussing how federal centralization has affected state-level autonomy and individual rights.

#2473 - Bill Thompson

This is a preview of the Shortform summary of the Mar 25, 2026 episode of the The Joe Rogan Experience

Sign up for Shortform to access the whole episode summary along with additional materials like counterarguments and context.

#2473 - Bill Thompson

1-Page Summary

The Guest's Personal and Professional Background

Bill Thompson discusses his journey from a challenging childhood in a trailer park, struggling with ADHD, to a distinguished military career in intelligence and cyber operations. His service included deployments to Iraq, Afghanistan, and the Philippines, where he supported counter-insurgency operations through signals intelligence and cyber operations. Currently, Thompson runs Spartan Forge, a company focused on outdoor experiences and self-reliance, emphasizing ethical business practices and user privacy protection.

Technological Landscape: Mobile Phones, Cyber Security, Data Privacy

Thompson explores the current state of mobile technology security, highlighting GrapheneOS as a privacy-focused mobile operating system. He warns about various cyber threats, including sophisticated tools like Pegasus and vulnerabilities in Chinese-made devices. Thompson criticizes major tech companies like Apple and Meta for prioritizing data monetization over user privacy, emphasizing that when services are free, users often become the product through data harvesting.

In conversation with Joe Rogan, Thompson discusses the absence of clear pathways to manhood in modern society, contrasting this with traditional rites of passage. He points to military service and fatherhood as transformative experiences that instill responsibility. Thompson also critiques the 17th Amendment for undermining state autonomy and questions the Supreme Court's exercise of judicial review, arguing these changes have eroded individual rights and democratic processes.

Concerns About Government Overreach and Centralization of Power

Thompson expresses concern about government surveillance programs and data collection, suggesting these activities have disrupted the balance of power between citizens and government. He advocates for a return to the Founders' vision of decentralized power, where states have greater autonomy to experiment with different policies. Thompson argues that federal centralization has allowed special interests to influence policy-making, undermining individual rights and state-level decision-making.

1-Page Summary

Additional Materials

Counterarguments

  • While Thompson criticizes major tech companies for prioritizing data monetization, it can be argued that these companies also invest heavily in security and privacy features to protect users, and that their business models require some level of data collection to provide personalized services and maintain their platforms.
  • The assertion that modern society lacks clear pathways to manhood may overlook the diversity of experiences and cultural backgrounds that define masculinity and adulthood in different communities.
  • Military service and fatherhood are significant experiences, but it's important to recognize that responsibility and maturity can also be developed through other life experiences and personal achievements.
  • The critique of the 17th Amendment could be countered by the argument that direct election of senators by the populace increases democratic accountability and reflects the will of the state's citizens more accurately than legislative appointment.
  • The view that the Supreme Court's exercise of judicial review has eroded individual rights and democratic processes may be challenged by the perspective that judicial review is a crucial check on the other branches of government and has been instrumental in upholding civil liberties.
  • Concerns about government surveillance and data collection must be balanced with the recognition that some level of surveillance is necessary for national security and law enforcement purposes, provided there are adequate safeguards and oversight.
  • Advocating for a return to decentralized power and greater state autonomy may not take into account the benefits of federal oversight in ensuring consistent civil rights protections and addressing nationwide issues that transcend state borders.
  • The argument that federal centralization allows special interests to influence policy-making could be met with the counterpoint that state governments are also susceptible to special interest lobbying and may lack the resources to effectively regulate powerful entities.

Actionables

  • You can enhance your mobile privacy by installing a privacy-focused browser and search engine on your current smartphone. While you may not be ready to switch to a specialized operating system like GrapheneOS, using a browser that blocks trackers and a search engine that doesn't track your searches is a straightforward step. For example, try Firefox Focus for browsing and DuckDuckGo for searching.
  • Explore self-reliance by starting a small garden or learning basic outdoor survival skills. Even if you're not an outdoors enthusiast, growing your own herbs or vegetables can give you a taste of self-sufficiency. Alternatively, take a basic survival skills course to understand the principles of self-reliance that are often promoted in outdoor experiences.
  • Educate yourself on the principles of federalism and the balance of power in the U.S. government by reading the Federalist Papers or other foundational documents. Understanding the original intent of the Founders can be as simple as reading Federalist No. 10 or No. 51, which discuss the balance of power and the structure of the government. This knowledge can inform your perspective on current political debates and policies.

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free
#2473 - Bill Thompson

The Guest's Personal and Professional Background

Bill Thompson shares his background, which spans a troubled early life, a significant military career, and now, engagement in entrepreneurial endeavors with a focus on the outdoors and privacy ethics.

The Guest's Early Life and Education

Grew Up In a Trailer Park, Struggled With ADHD and School

Thompson discusses his difficult childhood, growing up in a trailer park without a father from the age of five, and struggling in school. His ADHD and a potential diagnosis of a low-level version of Asperger's syndrome were challenging, as he often disrupted classes and was seen as a troublemaker. Despite this, he was reminded of his family’s intelligence and potential by a teacher, Connie Trenbeth, which suggests he had the ability to excel in school under the right circumstances.

The Guest's Military Experience

Bill Thompson's military service was rooted in both a desire to leave his hometown in North Dakota and a belief in the foundational values of the United States. He worked in intelligence and cyber operations, which involved developing offensive cyber capabilities and using signals intelligence to support combat operations.

Guest Joined Military to Leave North Dakota, Pursued Intelligence and Cyber Operations

Thompson originally intended to become a military policeman but ended up in intelligence due to his high ASVAB scores. His job was in signals intelligence, which evolved to communications intelligence, and eventually to cyber operations. His career took him to Iraq, Afghanistan, the Philippines, and other places where he supported "super badass" personnel by identifying targets.

Guest's Cyber Defense/Offense Work in Iraq, Afghanistan, Philippines

His deployments included counter-insurgency operations in the Philippines against terrorist groups like Abu Sayyaf and Jamaa Islamia. Thompson was part of a tactical military intelligence battalion that focused on cyber defense and offense, including mobile and media forensics, and contri ...

Here’s what you’ll find in our full summary

Registered users get access to the Full Podcast Summary and Additional Materials. It’s easy and free!
Start your free trial today

The Guest's Personal and Professional Background

Additional Materials

Clarifications

  • ADHD (Attention Deficit Hyperactivity Disorder) is a neurodevelopmental condition characterized by difficulty focusing, impulsivity, and hyperactivity. Asperger's syndrome, now part of Autism Spectrum Disorder, involves challenges with social interaction and restricted interests but typically normal intelligence. A "low-level" diagnosis suggests milder symptoms that may not severely impact daily functioning. Both conditions can affect learning and behavior, especially in childhood.
  • The ASVAB (Armed Services Vocational Aptitude Battery) is a standardized test used by the U.S. military to assess a candidate's strengths and suitability for various military jobs. High ASVAB scores can qualify individuals for more technical or specialized roles, such as intelligence or cyber operations. The test covers areas like math, verbal skills, and mechanical knowledge. It helps the military place recruits in positions where they are most likely to succeed.
  • Signals intelligence (SIGINT) is the collection and analysis of electronic signals, such as radio, radar, and communications, to gather information about adversaries. Communications intelligence (COMINT) is a subset of SIGINT focused specifically on intercepting and interpreting voice, text, or data communications between people or organizations. These intelligence types help military and intelligence agencies understand enemy movements, plans, and capabilities. They are critical for making informed decisions in both offensive and defensive operations.
  • Cyber operations in a military context involve using digital tools to defend against or attack enemy computer systems and networks. These operations include gathering intelligence, disrupting enemy communications, and protecting friendly systems from cyberattacks. They can be offensive, such as hacking into adversary networks, or defensive, like detecting and blocking cyber threats. Cyber operations are critical for modern warfare, supporting traditional military actions with digital capabilities.
  • Counter-insurgency operations are military actions aimed at defeating irregular armed groups or insurgents who challenge established governments. These operations combine military, political, and social efforts to weaken insurgent influence and support. They often involve intelligence gathering, targeted strikes, and winning the support of local populations. The goal is to restore stability and government control in conflict areas.
  • Abu Sayyaf is a militant Islamist group based in the southern Philippines, known for kidnappings, bombings, and attacks aimed at establishing an independent Islamic state. Jamaa Islamia, also known as Jemaah Islamiyah, is a Southeast Asian extremist group linked to al-Qaeda, responsible for terrorist attacks in Indonesia and surrounding countries. Both groups have been targeted by regional and international counterterrorism efforts. Their activities have caused significant instability and violence in the region.
  • A tactical military intelligence battalion is a specialized Army unit that collects and analyzes information to support combat operations on the battlefield. It provides commanders with real-time intelligence about enemy forces, terrain, and other critical factors. These battalions use various methods, including signals intelligence and cyber operations, to gather data. Their work directly influences tactical decisions and mission success.
  • Mobile and media forensics involves analyzing digital data from devices like phones, computers, and storage media to uncover evidence. It includes recovering deleted files ...

Actionables

  • You can seek mentorship from individuals who recognize your potential, similar to how Thompson was encouraged by his teacher. Reach out to professionals in your desired field through social media or local community groups, and ask for guidance or the opportunity to shadow them to gain insights into their success.
  • Explore your local community college or vocational school for courses in intelligence analysis or cybersecurity, which could open doors to careers similar to Thompson's military intelligence role. These courses often don't require prior experience and can provide a foundational understanding of the field.
  • Start a small-scale ethica ...

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free
#2473 - Bill Thompson

Technological Landscape: Mobile Phones, Cyber Security, Data Privacy

Joe Rogan and Bill Thompson delve into the changing landscape of technology, discussing the security, privacy, and customization of mobile phones, as well as the broader implications of these advancements.

Mobile Phone Security and Customization

Some Android Phones Offer More User Control and Customization Than Standard Android or iOS

Bill Thompson talks about the user control and customization options available on some Android phones, particularly those that allow for rooting, such as Google Pixel and older Samsung Galaxy phones like the S7 and S10. However, he points out that this is not possible with newer models like the Galaxy Fold due to the inability to unlock the bootloader.

GrapheneOS Boosts Android Security and Privacy

Thompson discusses his past installation of GrapheneOS, a privacy and security-focused mobile OS enhancing Android's open-source project. GrapheneOS requires sideloading of apps and offers more customization and user control than standard firmware from large conglomerates.

Cyber Threats and Data Exploitation

Nation-States, Tech Companies Exploiting Device, Network Vulnerabilities to Access Data

The conversation turns to security concerns, such as Pegasus, which is a sophisticated cell phone implant that initially required user interaction to install but later evolved into a non-click exploit that could infiltrate phones without the user's knowledge. Thompson refers to cyber threats like zero-day vulnerabilities and the diligence of red teams in seeking out hackable issues in their products. He highlights the current administration's efforts to remove Chinese technology suspected of being used by the People's Liberation Army (PLA) to infiltrate critical sectors.

Concerns extend to devices like Huawei phones and ZTE routers, which Thompson claims have been found with built-in access for foreign actors and persistent back doors. The discussion also covers how the Chinese government uses communications infrastructure to monitor resources and activities in Africa, emphasizing the broader implications of data exploitation.

Apple and Meta Prioritize Monetizing Data Over User Privacy

Bill Thompson expresses distrust in Apple and Meta, accusing them of prioritizing their data monetization efforts over user privacy. Apple's data col ...

Here’s what you’ll find in our full summary

Registered users get access to the Full Podcast Summary and Additional Materials. It’s easy and free!
Start your free trial today

Technological Landscape: Mobile Phones, Cyber Security, Data Privacy

Additional Materials

Counterarguments

  • While rooting Android phones can offer more user control, it can also expose the device to security risks if not done properly, potentially making the device more vulnerable to malware and other threats.
  • The inability to unlock the bootloader on newer Android models like the Galaxy Fold may be a security feature intended to protect users from potential threats and maintain device integrity.
  • GrapheneOS, while enhancing privacy and security, may not be as user-friendly for the average consumer, potentially limiting its adoption to a niche audience of tech-savvy users.
  • The discussion of nation-states exploiting vulnerabilities might overlook the efforts and investments these countries make in cybersecurity and the complexity of international cyber relations.
  • The mention of the U.S. administration's efforts to remove Chinese technology could be seen as part of a broader geopolitical struggle rather than purely a cybersecurity measure, and there may be economic and political motivations involved.
  • Accusations against companies like Huawei and ZTE require careful examination of evidence, and there may be counterarguments from these companies and their supporters regarding the security of their devices.
  • While Apple and Meta may monetize user data, they also invest in privacy features and security measures, and their business models are not solely based on data exploitation.
  • Free services like Google Drive offer significant va ...

Actionables

  • You can enhance your smartphone's security by manually reviewing app permissions every month to ensure only necessary access is granted, reducing the risk of data exploitation. Start by going into your phone's settings, locate the 'Apps' or 'Applications' section, and scrutinize the permissions for each app. If an app has access to contacts, location, or camera, and it doesn't need that for its primary function, revoke the permission. This habit can help mitigate the risk of unauthorized data access from both the apps and potential vulnerabilities they might contain.
  • Create a personal data audit routine every quarter to identify what information you're sharing with tech companies and minimize unnecessary exposure. Begin by listing all the services and apps you use regularly, such as Google Drive or social media platforms. For each service, check the privacy settings and terms of service to understand what data you're providing. Where possible, opt out of data collection or delete accounts for services you no longer use. This proactive approach can help you regain control over your personal data and reduce the chances of it being used without your consent.
  • Develop a ha ...

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free
#2473 - Bill Thompson

Issues Related to Masculinity, Responsibility, and Rights

Importance of Rites of Passage and Masculine Responsibility

Joe Rogan and Bill Thompson delve into the void in modern culture regarding the transition from adolescence to manhood. They discuss how ancient cultures and religions utilized rites of passage to signify a young man's entry into adult responsibility—a stark contrast to today's prolonged adolescence for many young men.

Guest Highlights Lack of Pathways to Adulthood For Young Men

Thompson laments the absence of clear markers for manhood in contemporary society. He contrasts this with the natural responsibilities that women take on, arguing that young men often act like adolescents into their adult years due to this absence. Both Rogan and Thompson recognize that many men face difficulties transitioning to adulthood without transformative rites or established pathways.

Military and Fatherhood Instill Responsibility and Adulthood For Guests

Turning points like military service and fatherhood are cited as instilling a sense of duty and adulthood. For Thompson, the military set standards and expectations for mature behavior, a sentiment reinforced by the profound responsibility he felt upon becoming a father.

The Erosion of Individual Rights and State Power

The 17th Amendment has received criticism from Thompson for undermining state autonomy and individual rights by shifting senatorial elections to a popular vote rather than appointments by state legislatures.

Criticizes 17th Amendment: Undermines State Autonomy and Rights

Thompson criticizes the 17th Amendment for eroding the initial intention of the Senate which was to protect state rights and ensure statewide representation. He argues that the amendment has made the Senate redundant with the House and suggests it has led to the central absorption of power by the federal government.

Guest: Supreme Court's Judicial Review Erodes Rights, Democracy

Thompson critiques the Supreme Court for exercising judicial review, a power he asserts was not originally granted by the Constitution. Such power, according to Thompson, has led to an oligarchy where a few judges can declare laws unconstitutional, skewing towards a non-democratic process.

The Need For Discipline, Self-Reliance, and Ethical Behavior

Thompson ...

Here’s what you’ll find in our full summary

Registered users get access to the Full Podcast Summary and Additional Materials. It’s easy and free!
Start your free trial today

Issues Related to Masculinity, Responsibility, and Rights

Additional Materials

Counterarguments

  • Rites of passage are culturally specific and may not be relevant or necessary in all societies for signaling the transition to adulthood.
  • Prolonged adolescence can be a result of economic factors and societal changes rather than the absence of rites of passage.
  • The concept of manhood is socially constructed and can vary greatly between cultures; there is no one-size-fits-all marker for becoming a man.
  • The assumption that women naturally take on responsibilities earlier may overlook the social pressures and expectations placed on women to mature faster.
  • Military service and fatherhood are not universal experiences and may not be suitable or desirable pathways to adulthood for all men.
  • The 17th Amendment was enacted to make the election of senators more democratic by giving the power to the people, which can be seen as enhancing individual rights rather than undermining them.
  • The Senate and the House of Representatives have different roles and functions, and the 17th Amendment does not necessarily make the Senate redundant.
  • Judicial review is a check and balance on the legislative and executive branches of government and is considered an essential aspect of maintaining the rule of law and protecting minority rights within a democracy.
  • Self-reliance and discipline are valuable, but community support and government intervention can play crucial roles in addressing systemic issues and providing for the common good.
  • Ethical behavior and decision-making are c ...

Actionables

  • You can create personal milestones to signify your own transition into adult responsibilities, such as setting a goal to live independently, starting a savings plan for a significant purchase, or committing to a community service project. These self-imposed rites of passage can help you mark your progress and hold yourself accountable to adult standards of responsibility.
  • Develop a habit of daily reflection to cultivate self-reliance and discipline, using a journal to track your progress in areas like personal finance, career goals, and ethical decision-making. This practice can reinforce the importance of these values in your life and provide a clear record of your growth and areas for improvement.
  • Volunteer for a local initiative ...

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free
#2473 - Bill Thompson

Concerns About Government Overreach and Centralization of Power

Surveillance and Data Collection by the Government

Guest Criticizes Government's Data Collection and Surveillance Programs

Bill Thompson expresses strong criticism of the government's extensive data collection and surveillance programs. Although he does not provide specific details, he speaks about various massive data exploits such as Pegasus and network vulnerabilities, suggesting a climate where individual freedoms are at risk.

Guest: Programs Eroded Rights and Power Balance

The guest argues that these programs have eroded individual rights and disrupted the balance of power. Thompson cites the Obama administration's activities, which were continued by the Biden administration, as an example where the government knowingly collected and stored American citizens' data for potential future use, including constructing narratives or targeting individuals. He asserts that these actions contrast heavily with the concept of freedom and worries about the loss of rights and imbalance in power due to government actions.

Influence of Special Interests and Money in Politics

Federal Power Centralization Allows Special Interests and Money to Influence Policy

Thompson touches on how federal centralization facilitates special interests and money influencing policy. He recounts instances, such as the "homeless industrial complex" and money funneling, that suggest a lack of transparency and accountability in government spending influenced by private entities.

Guest Claims Laws Favor Power Over Individual Rights

Thompson observes that the shift to national parties influencing senatorial elections through the popular vote has usurped local state interests and individual rights. With national parties and special interests funding preferred candidates, laws that centralize power at the federal level have been adopted, which, according to the guest, erodes the power and influence of both individuals and states.

The Need For Decentralization and State-Level Experimentation

Return To Founders' Vision: Decentralized Power and Autonomy at State and Local Levels

Thompson calls for a return to the vision of the Fou ...

Here’s what you’ll find in our full summary

Registered users get access to the Full Podcast Summary and Additional Materials. It’s easy and free!
Start your free trial today

Concerns About Government Overreach and Centralization of Power

Additional Materials

Counterarguments

  • Surveillance and data collection can be necessary for national security and preventing crimes, including terrorism and cyber threats.
  • Oversight mechanisms, such as courts and congressional committees, can provide checks and balances on government surveillance programs to prevent abuse.
  • Centralization of certain powers at the federal level can ensure uniformity in critical areas such as civil rights, environmental protection, and consumer safety, which might not be adequately addressed by individual states.
  • Federal involvement can help address systemic issues that cross state lines, such as interstate commerce, national infrastructure, and public health crises.
  • The influence of special interests is not limited to the federal level; state and local governments can also be susceptible to lobbying and corruption.
  • The popular vote for senatorial elections can be seen as a more democratic approach, ensuring that senators represent the will of the entire state's population rather than a potentially unrepresentative state legislature.
  • Some issues require a coordinated national response rather than a patchwork of state-level experiments, such as the response to pandemics or climate change.
  • Federal mandates can provide a minimum standard of service and rights protection across all states, preventing a "race to the bottom" where states might u ...

Actionables

  • Educate yourself on digital privacy by researching and using privacy-focused tools and services to protect your data from unwarranted surveillance. For example, switch to a search engine that doesn't track your searches, use messaging apps with end-to-end encryption, and consider a virtual private network (VPN) to secure your internet connection.
  • Support local and state-level initiatives that align with your views on individual rights and decentralized power by voting in local elections and participating in state-level public comment periods. This could involve researching candidates' stances on privacy and federal overreach, and providing feedback on proposed state legislation that affects individual freedoms.
  • Advocate for transparency and accountabil ...

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free

Create Summaries for anything on the web

Download the Shortform Chrome extension for your browser

Shortform Extension CTA