WEBVTT 00:00:02.340 --> 00:00:05.017 Greetings Troublemakers... welcome to Trouble. 00:00:05.017 --> 00:00:06.869 My name is not important. 00:00:06.869 --> 00:00:10.547 At 10:30pm on October 29th, 1969, 00:00:10.547 --> 00:00:13.446 Charlie Kline, a student programer at UCLA, 00:00:13.446 --> 00:00:15.566 successfully sent the first digital message 00:00:15.566 --> 00:00:18.404 from one computer terminal to another via the DARPANET, 00:00:18.404 --> 00:00:20.064 a top-secret research project 00:00:20.064 --> 00:00:22.398 run by the US Department of Defense. 00:00:22.398 --> 00:00:25.580 The transmission of this single word, 'login' 00:00:25.580 --> 00:00:27.887 was a pivotal moment in human history, 00:00:27.887 --> 00:00:30.206 as it represents the official birth of the Internet. 00:00:30.206 --> 00:00:33.390 And it was from here that the first message was sent. 00:00:33.390 --> 00:00:34.837 A revolution began! 00:00:34.837 --> 00:00:36.581 In the nearly fifty years that have followed, 00:00:36.581 --> 00:00:39.014 this invention has thoroughly transformed our world 00:00:39.014 --> 00:00:42.099 and come to dominate virtually all aspects of our lives. 00:00:42.099 --> 00:00:44.571 It has restructured and rejuvenated capitalism, 00:00:44.571 --> 00:00:47.124 by revolutionizing finance and transforming the globe 00:00:47.124 --> 00:00:49.246 into a single interconnected marketplace. 00:00:49.246 --> 00:00:52.061 It has provided new methods of interacting with one another 00:00:52.061 --> 00:00:55.508 and helped shape the ways that we receive and process information. 00:00:55.508 --> 00:00:57.528 And it has provided a place for people to upload 00:00:57.528 --> 00:00:59.548 terabytes of videos of their cats. 00:00:59.738 --> 00:01:02.940 This is pinky... he's a male. He's available for adoption. 00:01:02.940 --> 00:01:03.981 He's pet of the week. 00:01:11.481 --> 00:01:13.631 The Internet has also become the central pillar 00:01:13.631 --> 00:01:15.213 of a new form of social control 00:01:15.213 --> 00:01:16.943 based around mass data collection 00:01:16.943 --> 00:01:18.625 and the construction of algorithms 00:01:18.625 --> 00:01:21.413 aimed at better predicting and manipulating human behavior. 00:01:21.413 --> 00:01:24.429 But while states and digital capitalists have used the Internet 00:01:24.429 --> 00:01:27.271 as a platform for mass surveillance and pacification, 00:01:27.271 --> 00:01:29.010 it has also been a site of subversion 00:01:29.010 --> 00:01:30.490 and created new possibilities 00:01:30.490 --> 00:01:32.996 for decentralized attacks on the dominant order. 00:01:33.436 --> 00:01:34.334 We've got a problem. 00:01:34.334 --> 00:01:35.066 What? 00:01:35.066 --> 00:01:37.332 Someone synched a RAT to one of my servers. 00:01:37.332 --> 00:01:39.449 A remote access tool – we're being hacked! 00:01:39.449 --> 00:01:41.314 On the front-lines of this war are hackers. 00:01:41.314 --> 00:01:44.962 Those who use curiosity, programming skills and problem solving 00:01:44.962 --> 00:01:48.618 to unlock closed systems and bend powerful forces to their will. 00:01:48.618 --> 00:01:50.089 Over the next thirty minutes, 00:01:50.089 --> 00:01:52.583 we'll share the voices of a number of these individuals 00:01:52.583 --> 00:01:55.201 as they share their experiences of defacing web sites, 00:01:55.201 --> 00:01:58.929 leaking emails, developing tools to thwart digital surveillance 00:01:58.929 --> 00:02:00.409 ... and making a whole lot of trouble. 00:02:26.487 --> 00:02:29.803 Hacking is one of those terms that I think has become 00:02:29.803 --> 00:02:31.203 a little bit nebulous. 00:02:31.203 --> 00:02:34.859 I would define it as using technology in a way that wasn't intended, 00:02:34.859 --> 00:02:37.565 by finding bugs and oversights in designs 00:02:37.565 --> 00:02:40.604 to make it produce results that were never supposed to happen. 00:02:40.604 --> 00:02:42.827 Creative subversion of technical systems. 00:02:42.827 --> 00:02:47.087 You take software and you modify it to get another result. 00:02:47.087 --> 00:02:50.136 For example, accessing information on a system 00:02:50.136 --> 00:02:52.236 that you shouldn't be able to access. 00:02:52.236 --> 00:02:57.008 Or making the system do something that it shouldn't be able to do 00:02:57.008 --> 00:02:59.369 – or that you shouldn't be able to make it do. 00:02:59.369 --> 00:03:02.623 There's a lot of different definitions of hacking, depending on who you ask. 00:03:02.623 --> 00:03:06.741 US criminal law defines computer hacking as unauthorized access 00:03:06.741 --> 00:03:10.171 to obtain information, transmitting destructive code, etc. 00:03:10.171 --> 00:03:12.492 I mean, they've basically expanded the definition 00:03:12.492 --> 00:03:15.692 in their ongoing efforts to criminalize everyday Internet activity. 00:03:15.692 --> 00:03:17.203 If you ask someone like Richard Stallman, 00:03:17.203 --> 00:03:20.501 he'll tell you that it's really just a creative solution to a problem. 00:03:20.501 --> 00:03:22.435 But hackers also do like to break into systems. 00:03:22.435 --> 00:03:24.018 There are all kinds of systems, 00:03:24.018 --> 00:03:26.006 and there's all kinds of access 00:03:26.006 --> 00:03:28.276 and all kinds of ways to gain access. 00:03:28.276 --> 00:03:32.243 Some hackers choose to fix and protect these systems. 00:03:32.243 --> 00:03:34.986 They work for the government, Microsoft etc. 00:03:34.986 --> 00:03:36.414 They call themselves White Hats. 00:03:36.414 --> 00:03:37.741 They're not even really hackers. 00:03:37.741 --> 00:03:40.032 They're seen in the hacking scene as sellouts. 00:03:40.032 --> 00:03:43.043 They do it for the paycheck... or maybe because of the flag. 00:03:43.043 --> 00:03:45.580 But there are those, of course, who don't don't it for employment. 00:03:45.580 --> 00:03:46.797 They don't do it for a paycheck, 00:03:46.797 --> 00:03:48.992 they do it for the love of solving complex puzzles. 00:03:48.992 --> 00:03:52.117 For the thrill of breaking into whatever artificial borders 00:03:52.117 --> 00:03:54.065 that these people decide to erect. 00:03:54.065 --> 00:03:56.299 Everything that's built can be broken. 00:03:56.899 --> 00:03:59.848 I don't think hacking has changed all that much in the last few years. 00:03:59.848 --> 00:04:02.145 What really has changed is the scope 00:04:02.145 --> 00:04:04.085 of things that can be affected with hacking. 00:04:04.085 --> 00:04:07.779 Before, in the 90's, most of it was just practical jokes 00:04:07.779 --> 00:04:10.450 because none of it had a lot of impact on real life. 00:04:10.450 --> 00:04:11.665 And in popular culture, 00:04:11.665 --> 00:04:16.494 you start to have hackers appear in movies, in television series, 00:04:16.494 --> 00:04:18.945 where there's this whole figure of these hackers 00:04:18.945 --> 00:04:20.635 that have these super powers. 00:04:20.635 --> 00:04:24.401 That can invade computer systems in any way, shape or form. 00:04:24.401 --> 00:04:26.031 There's a new virus in the database. 00:04:26.031 --> 00:04:27.369 What's happening? 00:04:27.369 --> 00:04:29.999 It's replicating... eating up memory.... uhh, what do I do? 00:04:29.999 --> 00:04:31.785 Type 'cookie' you idiot! 00:04:31.785 --> 00:04:33.708 Then it gets a lot more popularized. 00:04:33.708 --> 00:04:35.645 Since the dot-com boom at the end of the 90's, 00:04:35.645 --> 00:04:37.520 things now have a huge impact 00:04:37.520 --> 00:04:39.306 and everything tends to be connected to the Internet, 00:04:39.306 --> 00:04:40.485 or some sort of network. 00:04:40.485 --> 00:04:42.981 As digital information networks have evolved, 00:04:42.981 --> 00:04:46.240 a lot of personal information is being stored. 00:04:46.240 --> 00:04:50.135 Y'know, big data corporations and industries are relying on computers 00:04:50.135 --> 00:04:53.752 ... so hackers have access to this kind of information 00:04:53.752 --> 00:04:55.366 that these big companies have as well. 00:04:55.366 --> 00:04:57.674 Hacking can be very simple and very complex. 00:04:57.674 --> 00:05:00.479 But most times hacking is very simple. 00:05:00.479 --> 00:05:03.655 By supplying input in a certain way, 00:05:03.655 --> 00:05:07.192 you're able to make the back-end system 00:05:07.192 --> 00:05:09.812 believe that what you're supplying 00:05:09.812 --> 00:05:11.680 is actually part of its own code. 00:05:11.680 --> 00:05:16.311 Which, in a lot of cases, can give you full access to that system. 00:05:16.311 --> 00:05:20.848 That's not just limited to computers or telecommunication systems. 00:05:20.848 --> 00:05:24.581 We can really kind of apply this idea to all kinds of technical systems. 00:05:24.581 --> 00:05:28.399 So, for example, something like social engineering 00:05:28.399 --> 00:05:30.828 is a human form of hacking. 00:05:30.828 --> 00:05:34.001 Y'know, you can pretend to be somebody that you're not 00:05:34.001 --> 00:05:37.822 and ask another person questions about themselves 00:05:37.822 --> 00:05:40.703 in order to get them to reveal private information. 00:05:40.703 --> 00:05:42.611 It's possible that there is software 00:05:42.611 --> 00:05:44.651 in theory that doesn't have vulnerabilities. 00:05:44.651 --> 00:05:47.156 But in practice, that's impossible to have. 00:05:47.156 --> 00:05:49.274 If an application or a system 00:05:49.274 --> 00:05:53.324 performs queries to a database based on your input, 00:05:53.324 --> 00:05:56.840 you could possibly alter your input 00:05:56.840 --> 00:05:59.610 to be able to then alter the database query, 00:05:59.610 --> 00:06:03.627 and possibly gain access to information that you shouldn't be able to. 00:06:03.627 --> 00:06:05.047 Mostly what an exploit does, 00:06:05.047 --> 00:06:09.021 it's a small tool that you run to get access to a special sector 00:06:09.021 --> 00:06:11.083 of the software you want to get. 00:06:11.583 --> 00:06:14.335 A lot of exploits and vulnerabilities are discussed publicly 00:06:14.335 --> 00:06:15.914 and being used in the wild. 00:06:15.914 --> 00:06:19.330 If you pay attention to lists like Full Disclosure or Security Focus, 00:06:19.330 --> 00:06:21.769 they'll tell you some of the latest tricks that are being used. 00:06:21.769 --> 00:06:24.341 Of course, those are the ones that are already publicly known, 00:06:24.341 --> 00:06:27.486 and that the vendors have often already released patches 00:06:27.486 --> 00:06:30.245 ... but a lot of companies don't always patch. 00:06:30.245 --> 00:06:33.170 They're not as on-top of it as they'd like to think that they are. 00:06:33.170 --> 00:06:35.945 For example, the Equifax hacks a couple of weeks ago 00:06:35.945 --> 00:06:39.130 was running outdated versions of Apache software. 00:06:39.130 --> 00:06:41.776 Most people don't really do updates regularly. 00:06:41.776 --> 00:06:45.626 So most people will actually get hacked by something very simple. 00:06:45.626 --> 00:06:47.287 Denial of service attacks 00:06:47.287 --> 00:06:50.983 ... basically coming up with ways to create an enormous amount 00:06:50.983 --> 00:06:52.670 of traffic to your server, 00:06:52.670 --> 00:06:56.497 to the point where it can't continue to provide those services. 00:06:56.497 --> 00:06:59.146 There's such a thing as Distributed Denial of Service attacks, 00:06:59.146 --> 00:07:03.207 where that traffic is coming from many places at the same time. 00:07:03.207 --> 00:07:07.090 The most serious techniques are what they call 'undisclosed vulnerabilities', 00:07:07.090 --> 00:07:08.244 what they call a 'zero day.' 00:07:08.244 --> 00:07:11.516 When someone discovers a vulnerability, and instead of reporting it 00:07:11.516 --> 00:07:12.938 – which is the White Hat way – 00:07:12.938 --> 00:07:15.076 they continue using it privately. 00:07:15.076 --> 00:07:17.654 And they don't report it publicly, 00:07:17.654 --> 00:07:20.418 so that way there's no way for anyone to 00:07:20.418 --> 00:07:23.208 really adequately protect themselves against it. 00:07:23.208 --> 00:07:25.853 I think a useful way to think about this is 00:07:25.853 --> 00:07:27.784 that the Internet is a really hostile place. 00:07:27.784 --> 00:07:31.557 It was never designed with privacy or security in mind. 00:07:31.557 --> 00:07:35.531 State actors and corporations control the entire thing. 00:07:35.531 --> 00:07:38.291 And so when you talk about their ability to exploit it 00:07:38.291 --> 00:07:43.399 ... I mean, to me, so many of the basic services that we use 00:07:43.399 --> 00:07:45.108 on the Internet are exploitative 00:07:45.108 --> 00:07:48.223 without thinking about a hacker getting into it, 00:07:48.223 --> 00:07:49.893 or malware or something like that. 00:07:49.893 --> 00:07:52.332 State actors like the US government 00:07:52.332 --> 00:07:56.022 have the ability to observe all Internet traffic in real time, 00:07:56.022 --> 00:07:57.476 collect it and store it, 00:07:57.476 --> 00:07:59.554 and then use it later at their discretion. 00:07:59.554 --> 00:08:02.716 And they work very closely with the digital capitalists 00:08:02.716 --> 00:08:05.192 – facebook, google and all these other entities 00:08:05.192 --> 00:08:07.668 – who are already storing that information anyway. 00:08:12.849 --> 00:08:15.785 The Internet has long been a tool used by social movements 00:08:15.785 --> 00:08:17.355 of various political stripes, 00:08:17.355 --> 00:08:19.512 both as a means of disseminating information 00:08:19.512 --> 00:08:21.580 and a fertile ground for recruitment. 00:08:21.580 --> 00:08:24.978 Back in the 1990's, the anti-globalization movement 00:08:24.978 --> 00:08:28.400 arose alongside the open-media publishing platform, Indymedia, 00:08:28.400 --> 00:08:31.447 which allowed for the virtual coordination of many localized fronts 00:08:31.447 --> 00:08:34.361 in the global fight against neoliberal capitalism. 00:08:37.615 --> 00:08:39.348 I need 50,000 people. 00:08:39.348 --> 00:08:42.039 50,000? You're gonna have to give me some time. 00:08:42.039 --> 00:08:42.976 And drums. 00:08:44.236 --> 00:08:46.494 You want drums? OK, I can do that. 00:08:46.494 --> 00:08:47.924 And what about the Italians? 00:08:50.544 --> 00:08:52.295 The Italians? Man, they're stuck on the border. 00:08:52.295 --> 00:08:53.584 They're gonna be with you tomorrow. 00:08:53.584 --> 00:08:54.483 And the black bloc? 00:08:54.483 --> 00:08:55.860 The black bloc are already there. 00:08:55.860 --> 00:08:58.330 You're gonna see black and red like there ain't no tomorrow, kid. 00:08:58.330 --> 00:08:59.344 You just sit tight. 00:09:06.894 --> 00:09:09.710 These days, social media platforms like facebook 00:09:09.710 --> 00:09:13.337 have given rise to a new form of online activity known as 'clicktivism', 00:09:13.337 --> 00:09:16.107 in which likes, shares and the signing of online petitions 00:09:16.107 --> 00:09:19.229 have become a popular way for liberals and so-called 'progressives' 00:09:19.229 --> 00:09:21.391 to project an image of ostensible participation 00:09:21.391 --> 00:09:25.000 in campaigns centered around a variety of social justice-related issues, 00:09:25.000 --> 00:09:28.499 and often masking their lack of participation in real world struggles. 00:09:28.499 --> 00:09:31.649 Real change requires real action. 00:09:31.649 --> 00:09:35.858 That’s why I always share political articles on facebook, 00:09:35.858 --> 00:09:36.928 whenever I see them. 00:09:36.928 --> 00:09:39.507 But not everyone has been lulled into this comforting delusion 00:09:39.507 --> 00:09:41.454 of how social change works. 00:09:41.454 --> 00:09:43.369 On both sides of the political spectrum, 00:09:43.369 --> 00:09:45.329 groups and individuals have continued 00:09:45.329 --> 00:09:46.939 to use the Internet pragmatically, 00:09:46.939 --> 00:09:50.574 both to spread their ideologies and coordinate their IRL activities. 00:09:52.238 --> 00:09:54.844 Anonymous is a decentralized network of hackers and activists 00:09:54.844 --> 00:09:57.079 that exist in places like IRC and Twitter, 00:09:57.079 --> 00:09:59.477 and anyone is free to become Anonymous 00:09:59.477 --> 00:10:01.551 and start their own operations within the network. 00:10:01.551 --> 00:10:03.351 It's kinda similar to the black bloc tactic 00:10:03.351 --> 00:10:05.861 used as cover and collective identity. 00:10:05.861 --> 00:10:09.225 I'm doing ten years in the fence for computer hacking charges 00:10:09.225 --> 00:10:11.410 related to my involvement in Anonymous. 00:10:11.410 --> 00:10:14.369 I was hacking police departments, military contractors 00:10:14.369 --> 00:10:15.988 ... defacing their websites, 00:10:15.988 --> 00:10:18.608 releasing their emails and databases to the public. 00:10:18.608 --> 00:10:22.114 One of the bigger targets was a company known as Strategic Forecasting 00:10:22.114 --> 00:10:24.759 – Stratfor – which is a private intelligence firm 00:10:24.759 --> 00:10:28.207 made up of mostly former State Department and CIA agents. 00:10:28.207 --> 00:10:29.438 We took down their websites. 00:10:29.438 --> 00:10:32.072 We went on donation sprees with all their clients' credit cards, 00:10:32.072 --> 00:10:34.405 and gave their email archives to Wikileaks. 00:10:34.405 --> 00:10:35.795 And Wikileaks pubished them, 00:10:35.795 --> 00:10:38.475 showed that they had been spying on activist groups 00:10:38.475 --> 00:10:40.677 on behalf of corporations like Dow Chemical. 00:10:40.677 --> 00:10:43.824 Groups like Anonymous got really really famous defacing websites. 00:10:43.824 --> 00:10:46.145 Other groups attacked police websites, 00:10:46.145 --> 00:10:51.013 getting all the data they have about current police members. 00:10:51.013 --> 00:10:55.279 There's also groups that were blocking huge institutions, 00:10:55.279 --> 00:10:57.592 like credit card companies or banks. 00:10:57.592 --> 00:11:00.346 If they block their transactions, they lose money. 00:11:00.346 --> 00:11:03.771 So there's a bunch of stuff you can do with hacking. 00:11:03.771 --> 00:11:05.477 Anonymous, they were really famous for 00:11:05.477 --> 00:11:08.681 really getting that kind of popular participation in a hacking movement 00:11:08.681 --> 00:11:12.433 that really didn't mean you had to be an expert to use it. 00:11:12.433 --> 00:11:14.153 You could download a piece of software, 00:11:14.153 --> 00:11:16.412 and you could just run it on your computer 00:11:16.412 --> 00:11:19.264 and you would enter in the target URL 00:11:19.264 --> 00:11:21.300 and you could begin to participate 00:11:21.300 --> 00:11:24.840 in what was effectively like a virtual sit-in. 00:11:24.840 --> 00:11:27.057 Now as far as Anonymous, or hacktivists in general 00:11:27.057 --> 00:11:29.122 playing a role in revolutionary movements... 00:11:29.122 --> 00:11:30.682 Anonymous was very active during 00:11:30.682 --> 00:11:32.490 Occupy Wall Street and the Arab Spring. 00:11:32.490 --> 00:11:34.560 In general, an overall revolutionary strategy 00:11:34.560 --> 00:11:36.917 benefits from a diversity of tactics. 00:11:36.917 --> 00:11:39.509 Multiple attacks converging from all angles, 00:11:39.509 --> 00:11:43.440 including street protests, to smashed windows, to hacked websites. 00:11:43.440 --> 00:11:46.813 So Anonymous, y'know, revealing scandalous personal information 00:11:46.813 --> 00:11:50.871 on individuals associated with a company that is the current target of protests 00:11:50.871 --> 00:11:52.907 – timed well, it could be very effective. 00:11:52.907 --> 00:11:54.944 It's a really interesting concept to me. 00:11:54.944 --> 00:11:57.899 And a lot of people who are members of Anonymous 00:11:57.899 --> 00:11:59.981 use tools that I work on every day. 00:11:59.981 --> 00:12:01.781 And I hope they will use them for good. 00:12:01.781 --> 00:12:09.502 I think the unifying idea is just using anonymity to achieve some end. 00:12:09.502 --> 00:12:11.243 And doing it with other people. 00:12:11.243 --> 00:12:14.482 And I think that that speaks to some of their internal contradictions too, 00:12:14.482 --> 00:12:17.531 because they're not unified by a political ideology. 00:12:17.531 --> 00:12:20.735 Members of Anonymous fight with each other about that. 00:12:20.735 --> 00:12:26.170 And I think when you have no political ideology motivating work like that 00:12:26.170 --> 00:12:31.021 – work that has the potential to impact the whole globe, 00:12:31.021 --> 00:12:32.861 and has before 00:12:32.861 --> 00:12:34.200 - it can be really dangerous. 00:12:34.200 --> 00:12:37.585 We of Anonymous declare total fucking war on antifa, 00:12:37.585 --> 00:12:40.203 and all who support their criminal and violent actions 00:12:40.203 --> 00:12:41.813 towards innocent civilians. 00:12:41.813 --> 00:12:46.346 I've seen Anonymous operations go after people 00:12:46.346 --> 00:12:50.343 in a kind of y'know, right-wing, Pizzagate-type style. 00:12:50.343 --> 00:12:52.822 You know... I mean it originated on 4Chan. 00:12:52.822 --> 00:12:57.170 Historically, the hacker community has been very inclusive. 00:12:57.170 --> 00:12:58.750 When everything started, 00:12:58.750 --> 00:13:02.883 nobody really knew who was on the other side of the line. 00:13:02.883 --> 00:13:06.292 Everyone was just green text on a black background. 00:13:06.292 --> 00:13:10.063 With that said, there is a lot of sexism in tech generally, 00:13:10.063 --> 00:13:14.797 and I'd say that the people who are recruited from 00:13:14.797 --> 00:13:18.757 places like Reddit and 4Chan are like, y'know, 00:13:18.757 --> 00:13:20.662 your typical tech bros. 00:13:20.662 --> 00:13:22.516 Every community on the Internet, 00:13:22.516 --> 00:13:25.152 and every sub-community within those sites, 00:13:25.152 --> 00:13:26.819 whether it's 4Chan or Reddit or whatever, 00:13:26.819 --> 00:13:29.254 has a dog in the fight in gamergate. 00:13:29.254 --> 00:13:34.678 Gamergate and 4Chan, and the origins of the alt-right, 00:13:34.678 --> 00:13:38.354 I think are one of the most obvious confirmations 00:13:38.354 --> 00:13:42.681 of something that many of us who are radicals already knew 00:13:42.681 --> 00:13:47.185 ... which is that toxic masculinity, misogyny, whatever you wanna call it, 00:13:47.185 --> 00:13:50.705 is an incredibly dangerous and violent force. 00:13:50.705 --> 00:13:52.655 And it never ends there. 00:13:52.655 --> 00:13:54.604 Beyond the origins in 4Chan, 00:13:54.604 --> 00:13:59.300 I don't really know exactly where a lot of these young men came from. 00:13:59.300 --> 00:14:02.423 I imagine that it's probably not any more interesting 00:14:02.423 --> 00:14:06.931 than they are a result of late-capitalist alienation. 00:14:06.931 --> 00:14:10.984 But I think that they started out with, y'know, 00:14:10.984 --> 00:14:13.657 your just, like, garden variety misogyny. 00:14:13.657 --> 00:14:18.059 And then actual literal fascists went to their forums 00:14:18.059 --> 00:14:20.656 and whispered fascist poison into the ears 00:14:20.656 --> 00:14:23.076 of all these impressionable men. 00:14:23.076 --> 00:14:27.990 And because they already were prone to violence and bigotry, 00:14:27.990 --> 00:14:30.906 then it was just the natural conclusion. 00:14:31.756 --> 00:14:37.476 Doxxing is the practice of exposing information about your opponent 00:14:37.476 --> 00:14:40.467 that they'd rather have kept secret. 00:14:40.467 --> 00:14:44.704 Typically, doxxing happens from information 00:14:44.704 --> 00:14:47.300 that is already somehow readily available 00:14:47.300 --> 00:14:48.811 and maybe just a little bit hidden. 00:14:48.811 --> 00:14:52.810 If someone is doing their activism under a pseudonym, 00:14:52.810 --> 00:14:56.907 attackers will search for any kind of connection 00:14:56.907 --> 00:15:00.970 to their real physical persona and put that information online. 00:15:00.970 --> 00:15:03.994 And then whoever the target is, 00:15:03.994 --> 00:15:06.315 all the people who wanna go after that target 00:15:06.315 --> 00:15:09.025 will work collectively to terrorize them. 00:15:09.025 --> 00:15:11.344 The result of it can be, y'know, something like 00:15:11.344 --> 00:15:13.823 getting 50 pizzas delivered to your house 00:15:13.823 --> 00:15:16.538 ... or it can be a SWAT team 00:15:16.538 --> 00:15:19.618 showing up in response to a fake bomb threat. 00:15:19.618 --> 00:15:22.742 Protection against this is best done by 00:15:22.742 --> 00:15:26.226 compartmentalization of your online activities. 00:15:26.226 --> 00:15:31.293 So keep your activist activities and your regular activities separate. 00:15:31.293 --> 00:15:35.227 Use different email accounts when you sign up for services. 00:15:35.227 --> 00:15:38.530 Doxxing's also been used by hacker collectives 00:15:38.530 --> 00:15:44.490 to expose lists of police officers, members of fascist organizations... 00:15:44.490 --> 00:15:47.754 A lot of people were doxxed after the Charlottesville rally 00:15:47.754 --> 00:15:50.175 out of just public open-source knowledge, 00:15:50.175 --> 00:15:52.288 and had to back-track on their beliefs 00:15:52.288 --> 00:15:55.329 and actually had to go out in public and offer apologies. 00:15:57.437 --> 00:16:00.191 In June of 2010, a malicious computer worm 00:16:00.191 --> 00:16:02.144 called the Stuxnet virus was first discovered 00:16:02.144 --> 00:16:05.908 by a small Belorussian software company, VBA32. 00:16:05.908 --> 00:16:08.362 It was soon shared with cyber-security experts 00:16:08.362 --> 00:16:10.341 at Kaspersky Labs, in Moscow, 00:16:10.341 --> 00:16:12.235 and Symantec in Silicon Valley, 00:16:12.235 --> 00:16:15.987 who quickly realized that it was unlike any virus ever seen before. 00:16:15.987 --> 00:16:17.653 Far from your run-of-the mill malware, 00:16:17.653 --> 00:16:19.561 Stuxnet was a sophisticated weapon, 00:16:19.561 --> 00:16:21.439 comprised of millions of lines of code 00:16:21.439 --> 00:16:23.279 and believed to have been jointly developed 00:16:23.279 --> 00:16:24.715 by the cyber-warfare divisions 00:16:24.715 --> 00:16:26.743 of the American and Israeli military. 00:16:26.743 --> 00:16:30.193 Its target was the Natanz nuclear enrichment facility, in Iran. 00:16:30.193 --> 00:16:33.763 For Natanz, it was a CIA-led operation. 00:16:33.763 --> 00:16:36.157 So we had to have agency sign-off. 00:16:37.397 --> 00:16:43.606 Someone from the agency stood behind the operator and the analyst 00:16:43.606 --> 00:16:46.663 and gave the order to launch every attack. 00:16:46.663 --> 00:16:48.657 For months, the virus had lain hidden 00:16:48.657 --> 00:16:50.958 within the plant's Programmable Logic Controllers, 00:16:50.958 --> 00:16:53.355 machines that are commonly used to regulate and control 00:16:53.355 --> 00:16:56.144 a wide variety of industrial processes. 00:16:56.144 --> 00:16:58.004 Running commands that were completely untraceable 00:16:58.004 --> 00:16:59.358 to workers in the plant, 00:16:59.358 --> 00:17:01.950 Stuxnet targeted centrifuges for sabotage, 00:17:01.950 --> 00:17:05.084 causing them to explode, seemingly without cause. 00:17:05.084 --> 00:17:08.246 The virus was only discovered due to an error in an upgrade patch, 00:17:08.246 --> 00:17:11.148 which allowed it to jump out of the secured military facility 00:17:11.148 --> 00:17:12.987 and onto the world wide web 00:17:12.987 --> 00:17:15.384 …. otherwise we would have never even known it existed. 00:17:15.384 --> 00:17:20.207 The Israelis took our code for the delivery system and changed it. 00:17:21.417 --> 00:17:24.082 Then, on their own, without our agreement 00:17:24.082 --> 00:17:25.921 they just fucked up the code. 00:17:26.621 --> 00:17:30.125 Instead of hiding, the code started shutting down computers 00:17:30.125 --> 00:17:32.910 ... so naturally people noticed. 00:17:32.910 --> 00:17:35.781 Because they were in a hurry, they opened Pandora's Box. 00:17:36.991 --> 00:17:41.139 They let it out and it spread all over the world. 00:17:41.139 --> 00:17:44.304 The Stuxnet virus set an important historical precedent, 00:17:44.304 --> 00:17:45.614 as it heralded the beginnings 00:17:45.614 --> 00:17:48.222 of a dangerous new chapter in modern warfare. 00:17:48.222 --> 00:17:51.604 Still in its relative infancy, state-led cyber military campaigns 00:17:51.604 --> 00:17:54.442 are now being conducted under conditions of total secrecy, 00:17:54.442 --> 00:17:57.374 shrouded from public scrutiny, or even knowledge. 00:17:57.374 --> 00:18:00.104 And given the widespread incorporation of digital systems 00:18:00.104 --> 00:18:02.473 into all aspects of industrial civilization, 00:18:02.473 --> 00:18:04.913 from electrical grids to emergency management systems 00:18:04.913 --> 00:18:06.556 and even missile launch sites, 00:18:06.556 --> 00:18:08.855 the potential consequences of these types of attacks 00:18:08.855 --> 00:18:11.243 could lead to truly catastrophic loss of life. 00:18:11.243 --> 00:18:14.003 And while states have been the first to reach this stage 00:18:14.003 --> 00:18:16.306 in the development of offensive cyber warfare, 00:18:16.306 --> 00:18:18.126 corporations and other sub-state actors 00:18:18.126 --> 00:18:19.658 are already charting their own courses 00:18:19.658 --> 00:18:21.670 in the militarization of digital systems. 00:18:23.461 --> 00:18:25.549 A lot of what we have as the Internet now 00:18:25.549 --> 00:18:27.033 - a lot of the building blocks of the Internet - 00:18:27.033 --> 00:18:28.339 were created by hackers. 00:18:28.339 --> 00:18:31.244 Experimenting with the technology, coming up with new uses 00:18:31.244 --> 00:18:35.626 for a communications system that was originally designed 00:18:35.626 --> 00:18:39.595 to sustain military communication in times of war. 00:18:39.595 --> 00:18:42.797 And all of these really talented young programmers 00:18:42.797 --> 00:18:45.363 started to found these Internet start-ups 00:18:45.363 --> 00:18:48.417 and these companies that become Silicon Valley. 00:18:48.417 --> 00:18:50.884 So hackers suddenly go from becoming criminals 00:18:50.884 --> 00:18:53.948 to these billionaire entrepreneurs. 00:18:53.948 --> 00:18:58.504 These corporations are gathering data at an impressive scale. 00:18:58.504 --> 00:19:02.042 People are naturally communicative beings. 00:19:02.042 --> 00:19:05.688 So we're constantly emitting information. 00:19:05.688 --> 00:19:09.636 And that information is captured by the social media companies 00:19:09.636 --> 00:19:11.284 and search engines. 00:19:11.284 --> 00:19:13.524 And that information is then taken 00:19:13.524 --> 00:19:17.110 and analyzed using algorithms to find patterns. 00:19:17.110 --> 00:19:20.101 Facebook actually records everything that you type in the status message 00:19:20.101 --> 00:19:22.168 – even if you don't send it. 00:19:22.168 --> 00:19:24.587 And maybe you're just thinking out loud when you're doing this. 00:19:24.587 --> 00:19:26.824 You're not thinking that you're actually thinking out loud 00:19:26.824 --> 00:19:28.558 in a really crowded room, 00:19:28.558 --> 00:19:30.745 with everybody having a recorder on them 00:19:30.745 --> 00:19:32.295 ... but that's actually what you're doing. 00:19:32.295 --> 00:19:34.078 I think about our right to privacy 00:19:34.078 --> 00:19:36.595 the way that I think about a lot of our other rights, 00:19:36.595 --> 00:19:40.691 in that if we actually had them they would be a good start 00:19:40.691 --> 00:19:41.901 ... but we don't. 00:19:41.901 --> 00:19:45.328 Privacy essentially is the right to keep thoughts to ourselves, 00:19:45.328 --> 00:19:47.968 and the right to decide who we share them to, 00:19:47.968 --> 00:19:49.519 and who can actually see them. 00:19:49.519 --> 00:19:53.083 We have a guaranteed right to privacy in the US Constitution, 00:19:53.083 --> 00:19:55.314 which says that the state can't just come in 00:19:55.314 --> 00:19:58.649 and, like, look around at our stuff and do whatever it wants. 00:19:58.649 --> 00:20:01.308 But they do. And they can. 00:20:01.308 --> 00:20:04.017 Because the state has a monopoly on power. 00:20:04.017 --> 00:20:07.727 Protecting your social information and your personal data 00:20:07.727 --> 00:20:10.281 is also defending your self-determination. 00:20:10.281 --> 00:20:12.221 There's this notion that's often used 00:20:12.221 --> 00:20:14.089 by the state and private companies 00:20:14.089 --> 00:20:16.725 that if you don't have anything to hide, 00:20:16.725 --> 00:20:18.630 then you don't have to worry about privacy, 00:20:18.630 --> 00:20:21.468 and you don't need security, and you don't need encryption. 00:20:21.988 --> 00:20:24.037 If you hear anybody saying 00:20:24.037 --> 00:20:26.909 “I have nothing to hide. I don't care about my privacy.” 00:20:26.909 --> 00:20:29.343 I recommend asking them for their credit card information 00:20:29.343 --> 00:20:30.580 or their social security number. 00:20:32.058 --> 00:20:34.941 The biggest concern I have with the “I have nothing to hide” 00:20:34.941 --> 00:20:38.228 is because today it seems really really easy to say it. 00:20:38.228 --> 00:20:41.147 But in the past we have lived in darker times. 00:20:41.147 --> 00:20:45.278 And the information we provide is really really useful to hit our groups 00:20:45.278 --> 00:20:47.397 ... or any kind of political activity. 00:20:47.397 --> 00:20:50.402 For example, surveillance cameras on universities 00:20:50.402 --> 00:20:51.979 – when you face a bigger threat 00:20:51.979 --> 00:20:56.332 ... let's say we have a coup d'etat in my country. 00:20:56.332 --> 00:20:59.582 That surveillance camera information becomes really really different 00:20:59.582 --> 00:21:01.844 from having just a couple of eyes watching them. 00:21:01.844 --> 00:21:03.661 What people are really saying, I think, 00:21:03.661 --> 00:21:05.901 when they don't care about their right to privacy is 00:21:05.901 --> 00:21:08.703 “I'm not like those bad people. 00:21:08.703 --> 00:21:11.703 "I'm a good person. I'm a law-abiding citizen.” 00:21:11.703 --> 00:21:13.071 Which is a meaningless concept. 00:21:13.071 --> 00:21:14.077 Everybody has secrets. 00:21:14.077 --> 00:21:16.001 Everybody keeps things to themselves. 00:21:16.001 --> 00:21:19.168 Whether or not they like to admit it, everybody puts pants on. 00:21:22.028 --> 00:21:24.439 And then we have these new tendencies 00:21:24.439 --> 00:21:28.498 like the Internet Research Agency and Cambridge Analytica 00:21:28.498 --> 00:21:31.779 finding ways to use our communication and social media 00:21:31.779 --> 00:21:34.005 and create these fake interactions 00:21:34.005 --> 00:21:36.675 where they can quickly create a profile of us 00:21:36.675 --> 00:21:40.344 of who we are, where we are in the political spectrum, 00:21:40.344 --> 00:21:42.014 what our tendencies are, 00:21:42.014 --> 00:21:44.523 and try to push us in new directions. 00:21:44.523 --> 00:21:47.096 And kind of control our view of the world. 00:21:47.096 --> 00:21:49.511 And you know, cyber is becoming so big today. 00:21:49.511 --> 00:21:52.658 It's becoming something that, a number of years ago, 00:21:52.658 --> 00:21:55.190 a short number of years ago, wasn't even a word. 00:21:55.190 --> 00:21:57.726 And now the cyber is so big. 00:21:57.726 --> 00:22:00.794 We conduct full-spectrum military cyberspace operations 00:22:00.794 --> 00:22:02.739 to enable actions in all domains, 00:22:02.739 --> 00:22:05.862 ensure the US and allied freedom of action in cyberspace, 00:22:05.862 --> 00:22:08.216 and deny the same to any adversary. 00:22:08.536 --> 00:22:11.397 Breaking news about Russian interference in our election. 00:22:11.397 --> 00:22:13.935 FBI now investigating Vladimir Putin. 00:22:13.935 --> 00:22:16.734 And as President Obama promises to retaliate for the cyber attack, 00:22:16.734 --> 00:22:19.419 the Russian President continues to deny he ordered it. 00:22:22.052 --> 00:22:23.675 Cyber warfare is really cheap. 00:22:23.675 --> 00:22:25.916 It requires very little equipment. 00:22:25.916 --> 00:22:29.526 It's very quiet. It's easily deniable. 00:22:29.526 --> 00:22:31.683 And so it becomes a really powerful tool 00:22:31.683 --> 00:22:33.993 for state actors and corporations to use, 00:22:33.993 --> 00:22:37.204 because it's very easy for them to just brush it off after 00:22:37.204 --> 00:22:39.904 and say “we never did this” or “we don't know who did this.” 00:22:42.316 --> 00:22:45.796 Nation states are actively at cyber war with each other. 00:22:45.796 --> 00:22:49.032 They each have their own dedicated cyber armies 00:22:49.032 --> 00:22:52.418 for purposes of espionage, for purposes of sabotage. 00:22:52.418 --> 00:22:54.486 It goes from intelligence gathering 00:22:54.486 --> 00:22:57.976 to, really, destroying nuclear programs - as they've done in Iran. 00:22:57.976 --> 00:23:00.733 And probably a whole bunch of other things we don't know about. 00:23:00.733 --> 00:23:03.850 Because they are so secretive... because they're so easy to hide. 00:23:03.850 --> 00:23:08.427 Everything run by a state in this area is run in a very military, 00:23:08.427 --> 00:23:10.157 or corporate way. 00:23:10.157 --> 00:23:13.495 There are people, y'know, doing shift work. 00:23:13.495 --> 00:23:16.829 There are very clear plans and strategies. 00:23:16.829 --> 00:23:19.361 Which means that they'll be working 00:23:19.361 --> 00:23:22.511 more efficiently towards an actual goal. 00:23:22.511 --> 00:23:26.650 The state can also use all of these techniques that it's developed 00:23:26.650 --> 00:23:28.720 against the civilian population. 00:23:28.720 --> 00:23:31.228 Against any actors it feels are a threat. 00:23:31.228 --> 00:23:34.080 Since hacking and compromising someone digitally 00:23:34.080 --> 00:23:36.796 is such an abstract thing, 00:23:36.796 --> 00:23:41.472 it will probably be easier to pull the trigger on someone, 00:23:41.472 --> 00:23:44.297 even if you're not exactly sure if they're 00:23:44.297 --> 00:23:46.057 the person you're looking for. 00:23:46.057 --> 00:23:47.880 This isn't like conventional warfare either. 00:23:47.880 --> 00:23:50.923 They can act in a way that obscures the origins of the attack, 00:23:50.923 --> 00:23:53.632 and they're not held to any standards of transparency 00:23:53.632 --> 00:23:55.670 or accountability on the world stage. 00:23:55.670 --> 00:23:57.710 If we're talking about a government that has no problems 00:23:57.710 --> 00:23:59.080 sending drones into a country, 00:23:59.080 --> 00:24:00.365 I mean... obviously they're not going to 00:24:00.365 --> 00:24:03.904 feel any need to have to answer to their hacking activities. 00:24:03.904 --> 00:24:05.566 It's very likely that we'll see a rise 00:24:05.566 --> 00:24:10.011 in groups using cyber-warfare to advance their own political gains, 00:24:10.011 --> 00:24:12.131 or to counter-attack repression. 00:24:14.407 --> 00:24:17.359 It’s often said that there’s no such thing as perfect security. 00:24:17.359 --> 00:24:19.550 All systems contain potential vulnerabilities 00:24:19.550 --> 00:24:22.659 that can be exploited by determined and capable adversaries. 00:24:22.659 --> 00:24:24.976 And when you choose to go up against the state, 00:24:24.976 --> 00:24:27.551 you’ve chosen an adversary that is both. 00:24:27.551 --> 00:24:30.151 Dozens of FBI agents targeted alleged members 00:24:30.151 --> 00:24:31.911 of a loose-knit hacking group. 00:24:31.911 --> 00:24:35.116 Armed with search warrants, agents hit six homes in New York, 00:24:35.116 --> 00:24:37.332 along with locations across the country. 00:24:37.332 --> 00:24:40.096 The best we can do is develop security protocols 00:24:40.096 --> 00:24:42.123 that are adequate for the task at hand. 00:24:42.123 --> 00:24:44.624 This means being constantly aware of the risks involved 00:24:44.624 --> 00:24:46.584 with the actions that we carry out, 00:24:46.584 --> 00:24:50.107 and understanding what steps that we can take to mitigate those risks. 00:24:50.107 --> 00:24:51.488 When it comes to communication, 00:24:51.488 --> 00:24:54.003 this means using methods and tools that are available 00:24:54.003 --> 00:24:56.754 to thwart interception and mass data collection 00:24:56.754 --> 00:24:59.130 in order to at least make things as difficult and expensive 00:24:59.130 --> 00:25:01.057 for our enemies as possible. 00:25:01.061 --> 00:25:04.604 How would they tell you to access the material on this phone? 00:25:05.844 --> 00:25:07.352 I think they would say what they've said, 00:25:07.352 --> 00:25:08.613 which I believe is in good faith. 00:25:08.613 --> 00:25:11.939 That we have designed this in response to what we believe to be 00:25:11.939 --> 00:25:16.851 the demands of our customers to be immune to any government warrant, 00:25:16.851 --> 00:25:20.258 or our (the manufacturer's) efforts to get into that phone. 00:25:20.492 --> 00:25:23.589 It’s also important to remember that this truth cuts both ways. 00:25:23.589 --> 00:25:26.740 As infallible as the systems of social control may appear, 00:25:26.740 --> 00:25:29.712 they too have vulnerabilities that are just waiting to be exploited 00:25:29.712 --> 00:25:31.904 by determined and capable adversaries. 00:25:31.904 --> 00:25:33.931 Let’s hope we can rise to the challenge. 00:25:34.728 --> 00:25:38.799 Someone has broken into the national bank – the Federal Reserve. 00:25:38.799 --> 00:25:43.865 A Twenty-First Century thief breaking into files, not into metal safes. 00:25:45.175 --> 00:25:47.476 I think there's a lot of interesting things 00:25:47.476 --> 00:25:50.305 that anarchist or anti-fascist collectives 00:25:50.305 --> 00:25:52.558 could do with hacking for their movements. 00:25:52.558 --> 00:25:55.091 But something I think is more interesting to me is: 00:25:55.091 --> 00:25:58.070 how can we use technology, 00:25:58.070 --> 00:26:00.865 and use hacking skills to come up with new ways 00:26:00.865 --> 00:26:04.435 to connect to each other, in a global movement 00:26:04.435 --> 00:26:08.088 where we can come to agreements together in a way that's safe 00:26:08.088 --> 00:26:09.591 ... that doesn't expose us, 00:26:09.591 --> 00:26:12.095 that doesn't put us at risk of surveillance? 00:26:12.995 --> 00:26:16.444 We should begin with the assumption that the Internet is hostile territory. 00:26:16.444 --> 00:26:18.430 It's an ongoing state of war. 00:26:18.430 --> 00:26:22.610 Military and law enforcement are using it as a tool for social control. 00:26:22.610 --> 00:26:24.149 But it doesn't have to be this way. 00:26:24.149 --> 00:26:26.620 And hackers and activists, we could use it to undermine 00:26:26.620 --> 00:26:28.534 and subvert these systems of power. 00:26:28.534 --> 00:26:31.456 We could create secure communication networks 00:26:31.456 --> 00:26:33.282 to coordinate the next big demonstration. 00:26:33.282 --> 00:26:37.505 But you certainly would have to be aware of encryption, 00:26:37.505 --> 00:26:41.306 of using proxy servers... of using software like Tor. 00:26:41.306 --> 00:26:42.495 You have to be able to protect yourself. 00:26:42.495 --> 00:26:45.329 Because if not, they're going to use it against us. 00:26:45.329 --> 00:26:49.312 I think the first step for any radical to protect themselves on the Internet 00:26:49.312 --> 00:26:51.510 is to understand their threat model. 00:26:51.510 --> 00:26:52.890 There's a really great resource 00:26:52.890 --> 00:26:55.017 that the Electronic Frontier Foundation has 00:26:55.017 --> 00:26:57.596 on figuring out your threat model. 00:26:57.596 --> 00:27:00.727 And they cover a lot of what you need to be thinking about with these things. 00:27:01.757 --> 00:27:07.177 There's this software called Tor that is very good to anonymize yourself 00:27:07.177 --> 00:27:09.455 if you want to do something over the Internet. 00:27:09.455 --> 00:27:13.105 People are recommending a messaging app for cell phones named Signal. 00:27:13.605 --> 00:27:18.428 The Tor browser, which when you install it and when you start it up, 00:27:18.428 --> 00:27:22.708 it sets up a connection to a decentralized network. 00:27:22.708 --> 00:27:26.394 And then your communication will go via this network 00:27:26.394 --> 00:27:28.050 in a number of different hops, 00:27:28.050 --> 00:27:30.829 so that if you're browsing to a website, 00:27:30.829 --> 00:27:32.532 it's not possible for that website 00:27:32.532 --> 00:27:35.202 to actually tell where you're coming from. 00:27:35.202 --> 00:27:37.614 One of the most important things that we really need to do 00:27:37.614 --> 00:27:39.641 is segment our identities online. 00:27:39.641 --> 00:27:41.741 And so don't re-use identities. 00:27:41.741 --> 00:27:43.286 Don't make them last for a long time. 00:27:43.286 --> 00:27:46.417 You might have a public identity, which you carefully curate, 00:27:46.417 --> 00:27:50.489 and then create yourself new identities to really target 00:27:50.489 --> 00:27:52.478 special operations that you wanna do. 00:27:52.478 --> 00:27:54.168 Special events that happen. 00:27:54.168 --> 00:27:56.327 If there's some protest going on, 00:27:56.327 --> 00:27:57.829 maybe make a new identity. 00:27:57.829 --> 00:27:59.332 It makes things a little bit difficult 00:27:59.332 --> 00:28:01.685 because we do tend to operate on a trust basis, 00:28:01.685 --> 00:28:03.484 and you need to re-build these connections. 00:28:03.484 --> 00:28:08.058 But definitely it's the only way to make sure that you stay protected. 00:28:08.058 --> 00:28:11.637 If you have for some reason linked 00:28:11.637 --> 00:28:16.538 your regular identity with your Internet persona, 00:28:16.538 --> 00:28:19.504 it's going to bring problems if some kind of neo-nazi 00:28:19.504 --> 00:28:24.865 wants to publish that information on a board or whatever. 00:28:24.865 --> 00:28:28.919 Within the hacker community there's a strong ethos of 00:28:28.919 --> 00:28:29.889 shutting the hell up. 00:28:29.889 --> 00:28:31.549 Don't talk about things that you've done. 00:28:31.549 --> 00:28:36.300 And it comes back to this idea that your identity is really not that important. 00:28:36.300 --> 00:28:39.986 Forget the fame.... do it for the actual purpose of the thing you wanna do. 00:28:39.986 --> 00:28:41.650 But don't actually care about 00:28:41.650 --> 00:28:44.410 whether or not people really will know that it's you. 00:28:44.410 --> 00:28:46.312 Don't tell your friends... don't talk. 00:28:46.312 --> 00:28:47.783 Shut the hell up. 00:28:47.783 --> 00:28:50.743 Use really strong passwords, and a password manager. 00:28:50.743 --> 00:28:53.709 That's a really typical avenue that doxxing happens through, 00:28:53.709 --> 00:28:56.246 is just people finding your simple password 00:28:56.246 --> 00:28:58.076 and gaining access to your accounts. 00:28:58.076 --> 00:29:02.598 Use two-factor authentication on all accounts that you can. 00:29:02.598 --> 00:29:04.456 If you're trying to learn how to hack, 00:29:04.456 --> 00:29:06.442 you are going to have to learn how to program. 00:29:06.442 --> 00:29:07.986 How to computer program. 00:29:07.986 --> 00:29:12.090 And if you can learn how to develop websites and run servers, 00:29:12.090 --> 00:29:14.250 you could look at other people's code 00:29:14.250 --> 00:29:15.979 and spot the mistakes that they've made 00:29:15.979 --> 00:29:19.025 that allow you to exploit and leverage that vulnerability. 00:29:19.965 --> 00:29:22.292 Re-install your computer as often as you can. 00:29:22.292 --> 00:29:25.336 Try out new operating systems. 00:29:25.336 --> 00:29:27.124 If you've never used Linux, install it. 00:29:27.124 --> 00:29:31.374 If you've used Linux before, install another distribution of Linux. 00:29:31.374 --> 00:29:35.036 If you've always used Mac OS, maybe try Windows. 00:29:35.036 --> 00:29:38.108 Just try new things and don't be afraid to break it, 00:29:38.108 --> 00:29:40.064 because in the end if the computer breaks 00:29:40.064 --> 00:29:42.972 you can always just reinstall the operating system. 00:29:42.972 --> 00:29:46.991 Try the different tutorials you can find on Kali Linux, 00:29:46.991 --> 00:29:48.907 and really try and attack your own systems. 00:29:49.957 --> 00:29:52.040 Try to think outside the box. 00:29:52.040 --> 00:29:55.194 In that way, y'know, hacking is a lot like anarchy 00:29:55.194 --> 00:29:57.095 – things are what you make of it. 00:29:58.285 --> 00:30:01.697 It's not only about us getting more involved 00:30:01.697 --> 00:30:03.577 in technology and using technology. 00:30:03.577 --> 00:30:06.184 We also have to bring the politics to technology. 00:30:06.184 --> 00:30:08.459 We have to connect with the spaces 00:30:08.459 --> 00:30:11.459 where free software is being developed 00:30:11.459 --> 00:30:15.243 and make our politics a part of that space. 00:30:15.243 --> 00:30:17.323 And I think that's something that's happening, right? 00:30:17.323 --> 00:30:21.115 We can see that in a lot of the free software communities. 00:30:21.115 --> 00:30:22.856 But it's something we need more of. 00:30:23.516 --> 00:30:25.989 Decentralized, ideologically-driven hacker collectives, 00:30:25.989 --> 00:30:29.266 if we unite our efforts we could, without any resources whatsoever 00:30:29.266 --> 00:30:32.214 can dismantle a corporation, humiliate a politician. 00:30:32.214 --> 00:30:34.842 And independent hackers, we have the advantage 00:30:34.842 --> 00:30:37.082 since we're not doing it for a paycheck. 00:30:37.082 --> 00:30:40.369 We're not doing it for any kind of allegiance to a country. 00:30:40.369 --> 00:30:42.034 We're up all night. 00:30:42.034 --> 00:30:44.103 We're breaking into systems because we love it. 00:30:44.103 --> 00:30:46.901 Because the thrill of breaking into anything that they can build 00:30:46.901 --> 00:30:51.925 while being able to undermine their systems of control is a better driver, 00:30:51.925 --> 00:30:55.118 a better incentive for hackers than a paycheck 00:30:55.118 --> 00:30:56.578 or... America. 00:30:56.578 --> 00:30:58.213 If you take the offensive and hack, 00:30:58.213 --> 00:31:01.069 expose and destroy these systems of the rich and powerful, 00:31:01.069 --> 00:31:03.072 we could drive them offline. 00:31:03.072 --> 00:31:06.710 Hack the planet! Hack the planet! 00:31:09.801 --> 00:31:12.023 As a deepening awareness has emerged of the role 00:31:12.023 --> 00:31:13.102 that Russian hackers played 00:31:13.102 --> 00:31:16.042 in swaying the 2016 US Presidential election, 00:31:16.042 --> 00:31:18.562 and facebook has been pressured to release information 00:31:18.562 --> 00:31:21.523 on the Kremlin’s widespread usage of its targeted ads function 00:31:21.523 --> 00:31:22.984 as a means of exacerbating tensions 00:31:22.984 --> 00:31:25.702 and sewing political discord among the American public, 00:31:25.702 --> 00:31:27.970 hacking has moved from the margins of popular culture 00:31:27.970 --> 00:31:30.237 to the center of mainstream political discourse. 00:31:30.237 --> 00:31:33.283 If our movements of resistance have any hope of remaining relevant 00:31:33.283 --> 00:31:35.304 in this rapidly shifting political climate, 00:31:35.304 --> 00:31:38.005 it is vitally important that we understand the ways in which 00:31:38.005 --> 00:31:40.927 power is restructuring itself in our current digital age, 00:31:40.927 --> 00:31:43.707 and adapt our theory and practice accordingly. 00:31:43.707 --> 00:31:45.841 So at this point, we’d like to remind you 00:31:45.841 --> 00:31:47.792 that Trouble is intended to be watched in groups, 00:31:47.792 --> 00:31:49.132 and to be used as a resource 00:31:49.132 --> 00:31:51.407 to promote discussion and collective organizing. 00:31:51.407 --> 00:31:53.964 Are you interested in upping your digital security, 00:31:53.964 --> 00:31:56.440 or exploring the ways in which you can better incorporate 00:31:56.440 --> 00:31:59.686 an offensive online strategy to your organizing campaigns? 00:31:59.686 --> 00:32:01.789 Consider getting together with some comrades, 00:32:01.789 --> 00:32:04.759 screening this film, discussing how this might be done, 00:32:04.759 --> 00:32:07.560 and possibly pairing it with an info-session on how to use Tor, 00:32:07.560 --> 00:32:10.290 and how to encrypt your communication devices. 00:32:10.600 --> 00:32:13.637 Interested in running regular screenings of Trouble at your campus, 00:32:13.637 --> 00:32:15.542 infoshop, community center, 00:32:15.542 --> 00:32:17.568 or even just at your home with friends? 00:32:17.568 --> 00:32:18.978 Become a Trouble-Maker! 00:32:18.978 --> 00:32:20.398 For 10 bucks a month, 00:32:20.398 --> 00:32:22.834 we’ll hook you up with an advanced copy of the show 00:32:22.834 --> 00:32:25.029 and a screening kit featuring additional resources 00:32:25.029 --> 00:32:27.666 and some questions you can use to get a discussion going. 00:32:27.666 --> 00:32:30.870 If you can’t afford to support us financially, no worries! 00:32:30.870 --> 00:32:34.807 You can stream and/or download all our content for free off our website: 00:32:36.709 --> 00:32:40.692 If you’ve got any suggestions for show topics, or just want to get in touch, 00:32:40.692 --> 00:32:43.247 drop us a line at trouble@sub.media. 00:32:43.247 --> 00:32:45.439 We’d like to remind you that our fundraiser 00:32:45.439 --> 00:32:47.910 to grow our subMedia collective is still ongoing. 00:32:47.910 --> 00:32:50.067 We will be doing one final push in December, 00:32:50.067 --> 00:32:52.542 and hope to reach our goals by the end of the year. 00:32:52.542 --> 00:32:56.162 To help make sure this happens, go to sub.media/donate 00:32:56.162 --> 00:32:59.631 and become a monthly sustainer for as little as $2 per month. 00:32:59.631 --> 00:33:02.591 As always, we’re excited to see that people have been 00:33:02.591 --> 00:33:04.237 supporting and screening our work, 00:33:04.237 --> 00:33:06.891 and wanna give a big shout out to new troublemaker chapters 00:33:06.891 --> 00:33:10.857 in Vancouver, Prince George, Seattle, Bloomington, Brighton, 00:33:10.857 --> 00:33:13.912 Ithaca, Quebec City, Prescott and Edinburgh. 00:33:13.912 --> 00:33:15.829 If you’ve been organizing screenings in your town 00:33:15.829 --> 00:33:18.750 and we haven’t given you a shout-out, let us know! 00:33:18.750 --> 00:33:21.126 We will be taking the month of December off, 00:33:21.126 --> 00:33:23.038 and will be back with a fresh season of Trouble, 00:33:23.038 --> 00:33:27.189 plus a ton of fresh new subMedia content, starting in January. 00:33:27.189 --> 00:33:30.505 This episode would not have been possible without the generous support of 00:33:30.505 --> 00:33:34.239 Nicholas, Josh, Avispa Midia, Peter and Biella. 00:33:34.239 --> 00:33:36.411 Now get out there, and make some trouble!