← All episodes

Joe Rogan Experience #2473 - Bill Thompson

| 16 products mentioned
Watch on YouTube military cyber operations pattern recognition woke culture in military rites of passage rendezvous historical recreation government bureaucracy inefficiency meritocracy vs. diversity mandates

Bill Thompson, a retired military cyber operations specialist, discusses his unconventional path from a trailer in North Dakota to becoming an advanced offensive cyber warfare expert advising generals. Thompson explores how pattern recognition and individual merit-based thinking shaped his worldview, critiques modern military woke culture, and argues that systems naturally optimize around perverse incentives rather than mission outcomes. The conversation weaves together his experiences with rendezvous historical reenactments, military bureaucracy, and his belief that truth and individual accountability should be the foundation of functional societies.

Key takeaways
  • Thompson participated in rendezvous events where participants camp using only pre-1840 technology and materials, including learning traditional skills like brain tanning hides and traditional archery as a coming-of-age experience lacking in modern society.
  • Rites of passage and male socialization are critical missing elements in modern culture; Thompson argues that without structured initiation into adulthood, men remain in perpetual childhood with dangerous societal consequences.
  • Government and military systems optimize around budget execution and organizational growth rather than mission outcomes, creating perverse incentives where officials are punished for saving money and rewarded for spending it.
  • Diversity metrics based on immutable characteristics rather than merit undermine both military effectiveness and individual dignity, as they fail to select for actual diversity of thought while implicitly suggesting merit-based selection is discriminatory.
  • Thompson's career trajectory in signals intelligence and computer network operations evolved from mapping radar emissions in Iraq to developing offensive cyber capabilities, emphasizing that ethical hacking requires government backing to distinguish it from criminal hacking.
  • Pattern analysis reveals why outsider anti-hero figures (Trump, Patton, Petraeus) are necessary to reset corrupt systems, but history shows these figures never end well—they're needed temporarily but ultimately discarded or destroyed.

Recommendations (9)

286SX IBM uses

"he had a old 286SX IBM and uh it was just sitting in his basement and I told my mom I was like hey if I clean for like a month can I have that computer?"

Bill Thompson · ▶ 1:13:47

Windows 3.1

"how could I force this thing to run Windows 3.1 so I could have a GUI instead of using command line?"

Bill Thompson · ▶ 1:14:31

"one time there was a um a coil radio that you could order where with an earpiece and you put this coil radio together and with an earpiece, no battery. It was just the electromagnetic radiation wou..."

Bill Thompson · ▶ 1:11:51

Cellebrite
Cellebrite uses

"you could download things like uh uh cellebrite. You could get a cellebrite uh or there's other things called forensic toolkit"

Bill Thompson · ▶ 1:44:10

"there's other things called forensic toolkit other things like that that allow you to examine your phone at a deeper level"

Bill Thompson · ▶ 1:44:15

Android Open Source Project

"Android also publishes their their their framework in an open source fashion where you can ex you can look at the and it's called AOSP Android open source project"

Bill Thompson · ▶ 1:42:52

WireGuard
WireGuard recommends

"you should run WireGuard on your phone and you should route all of your internet traffic through something like a home terminal at your house through a Raspberry Pi using something like WireGuard. ..."

Bill Thompson · ▶ 1:58:21

Raspberry Pi
Raspberry Pi recommends

"you should take something like a um a a Raspberry Pi and you should run WireGuard on your phone and you should route all of your internet traffic through something like a home terminal at your hous..."

Bill Thompson · ▶ 1:58:18

Signal
Signal recommends

"you could use Signal on there and those other things and you're going to be relatively safe"

Bill Thompson · ▶ 1:58:50

Mentioned (7)

Tesla coil "Would you say Tesla coil, Jamie?" ▶ 1:19:37
Scholastic book order forms
Scholastic book order forms "you get these scholastic book order forms that you'd bring home from school and you could order b..." ▶ 1:11:39
GrapheneOS
GrapheneOS "I can install a custom operating system like Graphine or something like that which I'm not doing ..." ▶ 1:40:46
Pokemon Go
Pokemon Go "Pokémon Go players built a 30 billion photo map. That's how training robots to deliver your pizza" ▶ 1:40:06
The Federalist Papers "if you read the Federalist Papers, was so important to the founders that there was this state tha..." ▶ 2:12:34
Leviathan "You read Thomas Hobbes Leviathan or John Locke or Montesquieu, all of them talked about this grea..." ▶ 2:12:46
Google Drive "like we talked about with uploading photos to Google Drive. It needs that training data" ▶ 2:19:27