1 99:59:59,999 --> 99:59:59,999 Greetings Troublemakers... welcome to Trouble. 2 99:59:59,999 --> 99:59:59,999 My name is not important. 3 99:59:59,999 --> 99:59:59,999 At 10:30pm on October 29th, 1969, 4 99:59:59,999 --> 99:59:59,999 Charlie Kline, a student programer at UCLA, 5 99:59:59,999 --> 99:59:59,999 successfully sent the first digital message 6 99:59:59,999 --> 99:59:59,999 from one computer terminal to another via the DARPANET, 7 99:59:59,999 --> 99:59:59,999 a top-secret research project run by the US Department of Defense. 8 99:59:59,999 --> 99:59:59,999 The transmission of this single word, 'login' 9 99:59:59,999 --> 99:59:59,999 was a pivotal moment in human history, 10 99:59:59,999 --> 99:59:59,999 as it represents the official birth of the Internet. 11 99:59:59,999 --> 99:59:59,999 And it was from here that the first message was sent. 12 99:59:59,999 --> 99:59:59,999 A revolution began! 13 99:59:59,999 --> 99:59:59,999 In the nearly fifty years that have followed, 14 99:59:59,999 --> 99:59:59,999 this invention has thoroughly transformed our world 15 99:59:59,999 --> 99:59:59,999 and come to dominate virtually all aspects of our lives. 16 99:59:59,999 --> 99:59:59,999 It has restructured and rejuvenated capitalism, 17 99:59:59,999 --> 99:59:59,999 by revolutionizing finance and transforming the globe 18 99:59:59,999 --> 99:59:59,999 into a single interconnected marketplace. 19 99:59:59,999 --> 99:59:59,999 It has provided new methods of interacting with one another 20 99:59:59,999 --> 99:59:59,999 and helped shape the ways that we receive and process information. 21 99:59:59,999 --> 99:59:59,999 And it has provided a place for people to upload terabytes of videos of their cats. 22 99:59:59,999 --> 99:59:59,999 This is pinky... he's a male. He's available for adoption. 23 99:59:59,999 --> 99:59:59,999 He's pet of the week. 24 99:59:59,999 --> 99:59:59,999 The Internet has also become the central pillar of a new form of social control 25 99:59:59,999 --> 99:59:59,999 based around mass data collection and the construction of algorithms 26 99:59:59,999 --> 99:59:59,999 aimed at better predicting and manipulating human behavior. 27 99:59:59,999 --> 99:59:59,999 But while states and digital capitalists have used the Internet 28 99:59:59,999 --> 99:59:59,999 as a platform for mass surveillance and pacification, 29 99:59:59,999 --> 99:59:59,999 it has also been a site of subversion 30 99:59:59,999 --> 99:59:59,999 and created new possibilities for decentralized attacks on the dominant order. 31 99:59:59,999 --> 99:59:59,999 We've got a problem. 32 99:59:59,999 --> 99:59:59,999 What? 33 99:59:59,999 --> 99:59:59,999 Someone synched a RAT to one of my servers. 34 99:59:59,999 --> 99:59:59,999 A remote access tool – we're being hacked! 35 99:59:59,999 --> 99:59:59,999 On the front-lines of this war are hackers 36 99:59:59,999 --> 99:59:59,999 ... those who use curiosity, programming skills and problem solving 37 99:59:59,999 --> 99:59:59,999 to unlock closed systems and bend powerful forces to their will. 38 99:59:59,999 --> 99:59:59,999 Over the next thirty minutes, 39 99:59:59,999 --> 99:59:59,999 we'll share the voices of a number of these individuals 40 99:59:59,999 --> 99:59:59,999 as they share their experiences of defacing web sites, 41 99:59:59,999 --> 99:59:59,999 leaking emails, developing tools to thwart digital surveillance 42 99:59:59,999 --> 99:59:59,999 ... and making a whole lot of trouble. 43 99:59:59,999 --> 99:59:59,999 Hacking is one of those terms that I think has become a little bit nebulous. 44 99:59:59,999 --> 99:59:59,999 I would define it as using technology in a way that wasn't intended, 45 99:59:59,999 --> 99:59:59,999 by finding bugs and oversights in designs 46 99:59:59,999 --> 99:59:59,999 to make it produce results that were never supposed to happen. 47 99:59:59,999 --> 99:59:59,999 Creative subversion of technical systems. 48 99:59:59,999 --> 99:59:59,999 You take software and you modify it to get another result. 49 99:59:59,999 --> 99:59:59,999 For example, accessing information on a system that you shouldn't be able to access. 50 99:59:59,999 --> 99:59:59,999 Or making the system do something that it shouldn't be able to do 51 99:59:59,999 --> 99:59:59,999 – or that you shouldn't be able to make it do. 52 99:59:59,999 --> 99:59:59,999 There's a lot of different definitions of hacking, depending on who you ask. 53 99:59:59,999 --> 99:59:59,999 US criminal law defines computer hacking as unauthorized access 54 99:59:59,999 --> 99:59:59,999 to obtain information, transmitting destructive code, etc. 55 99:59:59,999 --> 99:59:59,999 I mean, they've basically expanded the definition 56 99:59:59,999 --> 99:59:59,999 in their ongoing efforts to criminalize everyday Internet activity. 57 99:59:59,999 --> 99:59:59,999 If you ask someone like Richard Stallman, 58 99:59:59,999 --> 99:59:59,999 he'll tell you that it's really just a creative solution to a problem. 59 99:59:59,999 --> 99:59:59,999 But hackers also do like to break into systems. 60 99:59:59,999 --> 99:59:59,999 There are all kinds of systems, 61 99:59:59,999 --> 99:59:59,999 and there's all kinds of access 62 99:59:59,999 --> 99:59:59,999 ... and all kinds of ways to gain access. 63 99:59:59,999 --> 99:59:59,999 Some hackers choose to fix and protect these systems. 64 99:59:59,999 --> 99:59:59,999 They work for the government, Microsoft etc. 65 99:59:59,999 --> 99:59:59,999 They call themselves White Hats. 66 99:59:59,999 --> 99:59:59,999 They're not even really hackers. 67 99:59:59,999 --> 99:59:59,999 They're seen in the hacking scene as sellouts. 68 99:59:59,999 --> 99:59:59,999 They do it for the paycheck... or maybe because of the flag. 69 99:59:59,999 --> 99:59:59,999 But there are those, of course, who don't don't it for employment. 70 99:59:59,999 --> 99:59:59,999 They don't do it for a paycheck, 71 99:59:59,999 --> 99:59:59,999 they do it for the love of solving complex puzzles. 72 99:59:59,999 --> 99:59:59,999 For the thrill of breaking into whatever artificial borders 73 99:59:59,999 --> 99:59:59,999 that these people decide to erect. 74 99:59:59,999 --> 99:59:59,999 Everything that's built can be broken. 75 99:59:59,999 --> 99:59:59,999 I don't think hacking has changed all that much in the last few years. 76 99:59:59,999 --> 99:59:59,999 What really has changed is the scope of things that can be affected by hacking. 77 99:59:59,999 --> 99:59:59,999 Before, in the 90's, most of it was just practical jokes 78 99:59:59,999 --> 99:59:59,999 because none of it had a lot of impact on real life. 79 99:59:59,999 --> 99:59:59,999 And in popular culture, 80 99:59:59,999 --> 99:59:59,999 you start to have hackers appear in movies, in television series, 81 99:59:59,999 --> 99:59:59,999 where there's this whole figure of these hackers that have these super powers. 82 99:59:59,999 --> 99:59:59,999 That can invade computer systems in any way, shape or form. 83 99:59:59,999 --> 99:59:59,999 There's a new virus in the database. 84 99:59:59,999 --> 99:59:59,999 What's happening? 85 99:59:59,999 --> 99:59:59,999 It's replicating... eating up memory.... uhh, what do I do? 86 99:59:59,999 --> 99:59:59,999 Type 'cookie' you idiot! 87 99:59:59,999 --> 99:59:59,999 Then it gets a lot more popularized. 88 99:59:59,999 --> 99:59:59,999 Since the dot-com boom at the end of the 90's, 89 99:59:59,999 --> 99:59:59,999 things now have a huge impact. 90 99:59:59,999 --> 99:59:59,999 And everything tends to be connected to the Internet, 91 99:59:59,999 --> 99:59:59,999 or some sort of network. 92 99:59:59,999 --> 99:59:59,999 As digital information networks have evolved, 93 99:59:59,999 --> 99:59:59,999 a lot of personal information is being stored. 94 99:59:59,999 --> 99:59:59,999 Y'know, big data corporations and industries are relying on computers 95 99:59:59,999 --> 99:59:59,999 ... so hackers have access to this kind of information 96 99:59:59,999 --> 99:59:59,999 that these big companies have as well. 97 99:59:59,999 --> 99:59:59,999 Hacking can be very simple and very complex. 98 99:59:59,999 --> 99:59:59,999 But most times hacking is very simple. 99 99:59:59,999 --> 99:59:59,999 By supplying input in a certain way, 100 99:59:59,999 --> 99:59:59,999 you're able to make the back-end system believe that what you're supplying 101 99:59:59,999 --> 99:59:59,999 is actually part of its own code. 102 99:59:59,999 --> 99:59:59,999 Which, in a lot of cases, can give you full access to that system. 103 99:59:59,999 --> 99:59:59,999 That's not just limited to computers or telecommunication systems. 104 99:59:59,999 --> 99:59:59,999 We can really kind of apply this idea to all kinds of technical systems. 105 99:59:59,999 --> 99:59:59,999 So, for example, something like social engineering 106 99:59:59,999 --> 99:59:59,999 is a human form of hacking. 107 99:59:59,999 --> 99:59:59,999 Y'know, you can pretend to be somebody that you're not 108 99:59:59,999 --> 99:59:59,999 and ask another person questions about themselves 109 99:59:59,999 --> 99:59:59,999 in order to get them to reveal private information. 110 99:59:59,999 --> 99:59:59,999 It's possible that there is software 111 99:59:59,999 --> 99:59:59,999 in theory that doesn't have vulnerabilities. 112 99:59:59,999 --> 99:59:59,999 But in practice, that's impossible to have. 113 99:59:59,999 --> 99:59:59,999 If an application or a system performs queries to a database based on your input, 114 99:59:59,999 --> 99:59:59,999 you could possibly alter your input to be able to then alter the database query, 115 99:59:59,999 --> 99:59:59,999 and possibly gain access to information that you shouldn't be able to. 116 99:59:59,999 --> 99:59:59,999 Mostly what an exploit does, 117 99:59:59,999 --> 99:59:59,999 it's a small tool that you run to get access to a special sector 118 99:59:59,999 --> 99:59:59,999 of the software you want to get. 119 99:59:59,999 --> 99:59:59,999 A lot of exploits and vulnerabilities are discussed publicly 120 99:59:59,999 --> 99:59:59,999 and being used in the wild. 121 99:59:59,999 --> 99:59:59,999 If you pay attention to lists like Full Disclosure or Security Focus, 122 99:59:59,999 --> 99:59:59,999 they'll tell you some of the latest tricks that are being used. 123 99:59:59,999 --> 99:59:59,999 Of course, those are the ones that are already publicly known, 124 99:59:59,999 --> 99:59:59,999 and that the vendors have already released patches for 125 99:59:59,999 --> 99:59:59,999 ... but a lot of companies don't always patch. 126 99:59:59,999 --> 99:59:59,999 They're not as on-top of it as they'd like to think that they are. 127 99:59:59,999 --> 99:59:59,999 For example, the Equifax hacks a couple of weeks ago 128 99:59:59,999 --> 99:59:59,999 was running outdated versions of Apache software. 129 99:59:59,999 --> 99:59:59,999 Most people don't really do updates regularly. 130 99:59:59,999 --> 99:59:59,999 So most people will actually get hacked by something very simple. 131 99:59:59,999 --> 99:59:59,999 Denial of service attacks 132 99:59:59,999 --> 99:59:59,999 ... basically coming up with ways to create an enormous amount 133 99:59:59,999 --> 99:59:59,999 of traffic to your server, 134 99:59:59,999 --> 99:59:59,999 to the point where it can't continue to provide those services. 135 99:59:59,999 --> 99:59:59,999 There's such a thing as Distributed Denial of Service attacks, 136 99:59:59,999 --> 99:59:59,999 where that traffic is coming from many places at the same time. 137 99:59:59,999 --> 99:59:59,999 The most serious techniques are what they call 'undisclosed vulnerabilities', 138 99:59:59,999 --> 99:59:59,999 what they call a 'zero day.' 139 99:59:59,999 --> 99:59:59,999 When someone discovers a vulnerability, and instead of reporting it 140 99:59:59,999 --> 99:59:59,999 – which is the White Hat way – 141 99:59:59,999 --> 99:59:59,999 they continue using it privately. 142 99:59:59,999 --> 99:59:59,999 And they don't report it publicly, 143 99:59:59,999 --> 99:59:59,999 so that way for anyone to really adequately protect themselves against it. 144 99:59:59,999 --> 99:59:59,999 I think a useful way to think about this is 145 99:59:59,999 --> 99:59:59,999 that the Internet is a really hostile place. 146 99:59:59,999 --> 99:59:59,999 It was never designed with privacy or security in mind. 147 99:59:59,999 --> 99:59:59,999 State actors and corporations control the entire thing. 148 99:59:59,999 --> 99:59:59,999 And so when you talk about their ability to exploit it 149 99:59:59,999 --> 99:59:59,999 ... I mean, to me, so many of the basic services that we use 150 99:59:59,999 --> 99:59:59,999 on the Internet are exploitative 151 99:59:59,999 --> 99:59:59,999 without thinking about a hacker getting into it, or malware or something like that. 152 99:59:59,999 --> 99:59:59,999 State actors like the US government 153 99:59:59,999 --> 99:59:59,999 have the ability to observe all Internet traffic in real time, 154 99:59:59,999 --> 99:59:59,999 collect it and store it, 155 99:59:59,999 --> 99:59:59,999 and then use it later at their discretion. 156 99:59:59,999 --> 99:59:59,999 And they work very closely with the digital capitalists 157 99:59:59,999 --> 99:59:59,999 – facebook, google and all these other entities 158 99:59:59,999 --> 99:59:59,999 – who are already storing that information anyway. 159 99:59:59,999 --> 99:59:59,999 The Internet has long been a tool used by social movements 160 99:59:59,999 --> 99:59:59,999 of various political stripes, 161 99:59:59,999 --> 99:59:59,999 both as a means of disseminating information 162 99:59:59,999 --> 99:59:59,999 and a fertile ground for recruitment. 163 99:59:59,999 --> 99:59:59,999 Back in the 1990's, the anti-globalization movement 164 99:59:59,999 --> 99:59:59,999 arose alongside the open-media publishing platform, Indymedia, 165 99:59:59,999 --> 99:59:59,999 which allowed for the virtual coordination of many localized fronts 166 99:59:59,999 --> 99:59:59,999 in the global fight against neoliberal capitalism. 167 99:59:59,999 --> 99:59:59,999 I need 50,000 people. 168 99:59:59,999 --> 99:59:59,999 50,000? You're gonna have to give me some time. 169 99:59:59,999 --> 99:59:59,999 And drums. 170 99:59:59,999 --> 99:59:59,999 You want drums? OK, I can do that. 171 99:59:59,999 --> 99:59:59,999 And what about the Italians? 172 99:59:59,999 --> 99:59:59,999 The Italians? Man, they're stuck on the border. 173 99:59:59,999 --> 99:59:59,999 They're gonna be with you tomorrow. 174 99:59:59,999 --> 99:59:59,999 And the black bloc? 175 99:59:59,999 --> 99:59:59,999 The black bloc are already there. 176 99:59:59,999 --> 99:59:59,999 You're gonna see black and red like there ain't no tomorrow, kid. 177 99:59:59,999 --> 99:59:59,999 You just sit tight. 178 99:59:59,999 --> 99:59:59,999 These days, social media platforms like facebook 179 99:59:59,999 --> 99:59:59,999 have given rise to a new form of online activity known as 'clicktivism', 180 99:59:59,999 --> 99:59:59,999 in which likes, shares and the signing of online petitions 181 99:59:59,999 --> 99:59:59,999 have become a popular way for liberals and so-called 'progressives' 182 99:59:59,999 --> 99:59:59,999 to project an image of ostensible participation 183 99:59:59,999 --> 99:59:59,999 in campaigns centered around a variety of social justice-related issues, 184 99:59:59,999 --> 99:59:59,999 and often masking their lack of participation in real world struggles. 185 99:59:59,999 --> 99:59:59,999 Real change requires real action. 186 99:59:59,999 --> 99:59:59,999 That’s why I always share political articles on facebook, whenever I see them. 187 99:59:59,999 --> 99:59:59,999 But not everyone has been lulled into this comforting delusion 188 99:59:59,999 --> 99:59:59,999 of how social change works. 189 99:59:59,999 --> 99:59:59,999 On both sides of the political spectrum, 190 99:59:59,999 --> 99:59:59,999 groups and individuals have continued to use the Internet pragmatically, 191 99:59:59,999 --> 99:59:59,999 both to spread their ideologies and coordinate their IRL activities. 192 99:59:59,999 --> 99:59:59,999 Anonymous is a decentralized network of hackers and activists 193 99:59:59,999 --> 99:59:59,999 that exist in places like IRC and Twitter, 194 99:59:59,999 --> 99:59:59,999 and anyone is free to become Anonymous 195 99:59:59,999 --> 99:59:59,999 and start their own operations within the network. 196 99:59:59,999 --> 99:59:59,999 It's kinda similar to the black bloc tactic used as cover and collective identity. 197 99:59:59,999 --> 99:59:59,999 I'm doing ten years in the fence for computer hacking charges 198 99:59:59,999 --> 99:59:59,999 related to my involvement in Anonymous. 199 99:59:59,999 --> 99:59:59,999 I was hacking police departments, military contractors 200 99:59:59,999 --> 99:59:59,999 ... defacing their websites, releasing their emails and databases to the public. 201 99:59:59,999 --> 99:59:59,999 One of the bigger targets was a company known as Strategic Forecasting 202 99:59:59,999 --> 99:59:59,999 – Stratfor – which is a private intelligence firm 203 99:59:59,999 --> 99:59:59,999 made up of mostly former State Department and CIA agents. 204 99:59:59,999 --> 99:59:59,999 We took down their website. 205 99:59:59,999 --> 99:59:59,999 We went on donation sprees with all their clients' credit cards, 206 99:59:59,999 --> 99:59:59,999 and gave their email archives to Wikileaks. 207 99:59:59,999 --> 99:59:59,999 And Wikileaks pubished them, 208 99:59:59,999 --> 99:59:59,999 showed that they had been spying on activist groups 209 99:59:59,999 --> 99:59:59,999 on behalf of corporations like Dow Chemical. 210 99:59:59,999 --> 99:59:59,999 Groups like Anonymous got really really famous defacing websites. 211 99:59:59,999 --> 99:59:59,999 Other groups attacked police websites, 212 99:59:59,999 --> 99:59:59,999 getting all the data they have about current police members. 213 99:59:59,999 --> 99:59:59,999 There's also groups that were blocking huge institutions, 214 99:59:59,999 --> 99:59:59,999 like credit card companies or banks. 215 99:59:59,999 --> 99:59:59,999 If they block their transactions, they lose money. 216 99:59:59,999 --> 99:59:59,999 So there's a bunch of stuff you can do with hacking. 217 99:59:59,999 --> 99:59:59,999 Anonymous, they were really famous for 218 99:59:59,999 --> 99:59:59,999 really getting that kind of popular participation in a hacking movement 219 99:59:59,999 --> 99:59:59,999 that really didn't mean you had to be an expert to use it. 220 99:59:59,999 --> 99:59:59,999 You could download a piece of software, 221 99:59:59,999 --> 99:59:59,999 and you could just run it on your computer 222 99:59:59,999 --> 99:59:59,999 and you would enter in the target URL 223 99:59:59,999 --> 99:59:59,999 and you could begin to participate in what was effectively like a virtual sit-in. 224 99:59:59,999 --> 99:59:59,999 Now as far as Anonymous, or hacktivists in general 225 99:59:59,999 --> 99:59:59,999 playing a role in revolutionary movements... 226 99:59:59,999 --> 99:59:59,999 Anonymous was very active during Occupy Wall Street and the Arab Spring. 227 99:59:59,999 --> 99:59:59,999 In general, an overall revolutionary strategy 228 99:59:59,999 --> 99:59:59,999 benefits from a diversity of tactics. 229 99:59:59,999 --> 99:59:59,999 Multiple attacks converging from all angles, 230 99:59:59,999 --> 99:59:59,999 including street protests, to smashed windows, to hacked websites. 231 99:59:59,999 --> 99:59:59,999 So Anonymous, y'know, revealing scandalous personal information 232 99:59:59,999 --> 99:59:59,999 on individuals associated with a company that is the current target of protests 233 99:59:59,999 --> 99:59:59,999 – timed well, it could be very effective. 234 99:59:59,999 --> 99:59:59,999 It's a really interesting concept to me. 235 99:59:59,999 --> 99:59:59,999 And a lot of people who are members of Anonymous 236 99:59:59,999 --> 99:59:59,999 use tools that I work on every day. 237 99:59:59,999 --> 99:59:59,999 And I hope they will use them for good. 238 99:59:59,999 --> 99:59:59,999 I think the unifying idea is just using anonymity to achieve some end. 239 99:59:59,999 --> 99:59:59,999 And doing it with other people. 240 99:59:59,999 --> 99:59:59,999 And I think that that speaks to some of their internal contradictions too, 241 99:59:59,999 --> 99:59:59,999 because they're not unified by a political ideology. 242 99:59:59,999 --> 99:59:59,999 Members of Anonymous fight with each other about that. 243 99:59:59,999 --> 99:59:59,999 And I think when you have no political ideology motivating work like that 244 99:59:59,999 --> 99:59:59,999 – work that has the potential to impact the whole globe, and has before 245 99:59:59,999 --> 99:59:59,999 - it can be really dangerous. 246 99:59:59,999 --> 99:59:59,999 We of Anonymous declare total fucking war on antifa, 247 99:59:59,999 --> 99:59:59,999 and all who support their criminal and violent actions 248 99:59:59,999 --> 99:59:59,999 towards innocent civilians. 249 99:59:59,999 --> 99:59:59,999 I've seen Anonymous operations go after people 250 99:59:59,999 --> 99:59:59,999 in a kind of y'know, right-wing, Pizzagate-type style. 251 99:59:59,999 --> 99:59:59,999 You know... I mean it originated on 4Chan. 252 99:59:59,999 --> 99:59:59,999 Historically, the hacker community has been very inclusive. 253 99:59:59,999 --> 99:59:59,999 When everything started, 254 99:59:59,999 --> 99:59:59,999 nobody really knew who was on the other side of the line. 255 99:59:59,999 --> 99:59:59,999 Everyone was just green text on a black background. 256 99:59:59,999 --> 99:59:59,999 With that said, there is a lot of sexism in tech generally, 257 99:59:59,999 --> 99:59:59,999 and I'd say that the people who are recruited from places 258 99:59:59,999 --> 99:59:59,999 like Reddit and 4Chan are like, y'know, 259 99:59:59,999 --> 99:59:59,999 your typical tech bros. 260 99:59:59,999 --> 99:59:59,999 Every community on the Internet, 261 99:59:59,999 --> 99:59:59,999 and every sub-community within those sites, 262 99:59:59,999 --> 99:59:59,999 whether it's 4Chan or Reddit or whatever, 263 99:59:59,999 --> 99:59:59,999 has a dog in the fight in gamergate. 264 99:59:59,999 --> 99:59:59,999 Gamergate and 4Chan, and the origins of the alt-right, 265 99:59:59,999 --> 99:59:59,999 I think are one of the most obvious confirmations 266 99:59:59,999 --> 99:59:59,999 of something that many of us who are radicals already knew 267 99:59:59,999 --> 99:59:59,999 ... which is that toxic masculinity, misogyny, whatever you wanna call it, 268 99:59:59,999 --> 99:59:59,999 is an incredibly dangerous and violent force. 269 99:59:59,999 --> 99:59:59,999 And it never ends there. 270 99:59:59,999 --> 99:59:59,999 Beyond the origins in 4Chan, 271 99:59:59,999 --> 99:59:59,999 I don't really know exactly where a lot of these young men came from. 272 99:59:59,999 --> 99:59:59,999 I imagine that it's probably not any more interesting 273 99:59:59,999 --> 99:59:59,999 than they are a result of late-capitalist alienation. 274 99:59:59,999 --> 99:59:59,999 But I think that they started out with, y'know, 275 99:59:59,999 --> 99:59:59,999 just like your garden variety misogyny. 276 99:59:59,999 --> 99:59:59,999 And then actual literal fascists went to their forums 277 99:59:59,999 --> 99:59:59,999 and whispered fascist poison into the ears of these impressionable men. 278 99:59:59,999 --> 99:59:59,999 And because they already were prone to violence and bigotry, 279 99:59:59,999 --> 99:59:59,999 then it was just the natural conclusion. 280 99:59:59,999 --> 99:59:59,999 Doxxing is the practice of exposing information about your opponent 281 99:59:59,999 --> 99:59:59,999 that they'd rather have kept secret. 282 99:59:59,999 --> 99:59:59,999 Typically, doxxing happens from information 283 99:59:59,999 --> 99:59:59,999 that is already somehow readily available 284 99:59:59,999 --> 99:59:59,999 ... maybe just a little bit hidden. 285 99:59:59,999 --> 99:59:59,999 If someone is doing their activism under a pseudonym, 286 99:59:59,999 --> 99:59:59,999 attackers will search for any connection 287 99:59:59,999 --> 99:59:59,999 to their real physical persona and put that information online. 288 99:59:59,999 --> 99:59:59,999 And then whoever the target is, 289 99:59:59,999 --> 99:59:59,999 all the people who wanna go after that target 290 99:59:59,999 --> 99:59:59,999 will work collectively to terrorize them. 291 99:59:59,999 --> 99:59:59,999 The result of it can be, y'know, something like 292 99:59:59,999 --> 99:59:59,999 getting 50 pizzas delivered to your house 293 99:59:59,999 --> 99:59:59,999 ... or it can be a SWAT team showing up in response to a fake bomb threat. 294 99:59:59,999 --> 99:59:59,999 Protection against this is best done by 295 99:59:59,999 --> 99:59:59,999 compartmentalization of your online activities. 296 99:59:59,999 --> 99:59:59,999 So keep your activist activities and your regular activities separate. 297 99:59:59,999 --> 99:59:59,999 Use different email accounts when you sign up for services. 298 99:59:59,999 --> 99:59:59,999 Doxxing's also been used by hacker collectives 299 99:59:59,999 --> 99:59:59,999 to expose lists of police officers, members of fascist organizations... 300 99:59:59,999 --> 99:59:59,999 A lot of people were doxxed after the Charlottesville rally 301 99:59:59,999 --> 99:59:59,999 out of just public open-source knowledge, 302 99:59:59,999 --> 99:59:59,999 and had to back-track on their beliefs 303 99:59:59,999 --> 99:59:59,999 and actually had to go out in public and offer apologies. 304 99:59:59,999 --> 99:59:59,999 In June of 2010, a malicious computer worm 305 99:59:59,999 --> 99:59:59,999 called the Stuxnet virus was first discovered 306 99:59:59,999 --> 99:59:59,999 by a small Belorussian software company, VBA32. 307 99:59:59,999 --> 99:59:59,999 It was soon shared with cyber-security experts 308 99:59:59,999 --> 99:59:59,999 at Kaspersky Labs, in Moscow, 309 99:59:59,999 --> 99:59:59,999 and Symantec in Silicon Valley, 310 99:59:59,999 --> 99:59:59,999 who quickly realized that it was unlike any virus ever seen before. 311 99:59:59,999 --> 99:59:59,999 Far from your run-of-the mill malware, 312 99:59:59,999 --> 99:59:59,999 Stuxnet was a sophisticated weapon, 313 99:59:59,999 --> 99:59:59,999 comprised of millions of lines of code 314 99:59:59,999 --> 99:59:59,999 and believed to have been jointly developed by the cyber-warfare divisions 315 99:59:59,999 --> 99:59:59,999 of the American and Israeli military. 316 99:59:59,999 --> 99:59:59,999 Its target was the Natanz nuclear enrichment facility, in Iran. 317 99:59:59,999 --> 99:59:59,999 For Natanz, it was a CIA-led operation. 318 99:59:59,999 --> 99:59:59,999 So we had to have agency sign-off. 319 99:59:59,999 --> 99:59:59,999 Someone from the agency stood behind the operator and the analyst 320 99:59:59,999 --> 99:59:59,999 and gave the order to launch every attack. 321 99:59:59,999 --> 99:59:59,999 For months, the virus had lain hidden 322 99:59:59,999 --> 99:59:59,999 within the plant's Programmable Logic Controllers, 323 99:59:59,999 --> 99:59:59,999 machines that are commonly used to regulate and control 324 99:59:59,999 --> 99:59:59,999 a wide variety of industrial processes. 325 99:59:59,999 --> 99:59:59,999 Running commands that were completely untraceable to workers in the plant, 326 99:59:59,999 --> 99:59:59,999 Stuxnet targeted centrifuges for sabotage, 327 99:59:59,999 --> 99:59:59,999 causing them to explode, seemingly without cause. 328 99:59:59,999 --> 99:59:59,999 The virus was only discovered due to an error in an upgrade patch, 329 99:59:59,999 --> 99:59:59,999 which allowed it to jump out of the secured military facility 330 99:59:59,999 --> 99:59:59,999 and onto the world wide web 331 99:59:59,999 --> 99:59:59,999 …. otherwise we would have never even known it existed. 332 99:59:59,999 --> 99:59:59,999 The Israelis took our code for the delivery system and changed it. 333 99:59:59,999 --> 99:59:59,999 Then, on their own, without our agreement 334 99:59:59,999 --> 99:59:59,999 they just fucked up the code. 335 99:59:59,999 --> 99:59:59,999 Instead of hiding, the code started shutting down computers 336 99:59:59,999 --> 99:59:59,999 ... so naturally people noticed. 337 99:59:59,999 --> 99:59:59,999 Because they were in a hurry, they opened Pandora's Box. 338 99:59:59,999 --> 99:59:59,999 They let it out and it spread all over the world. 339 99:59:59,999 --> 99:59:59,999 The Stuxnet virus set an important historical precedent, 340 99:59:59,999 --> 99:59:59,999 as it heralded the beginnings of a dangerous new chapter in modern warfare. 341 99:59:59,999 --> 99:59:59,999 Still in its relative infancy, state-led cyber military campaigns 342 99:59:59,999 --> 99:59:59,999 are now being conducted under conditions of total secrecy, 343 99:59:59,999 --> 99:59:59,999 shrouded from public scrutiny, or even knowledge. 344 99:59:59,999 --> 99:59:59,999 And given the widespread incorporation of digital systems 345 99:59:59,999 --> 99:59:59,999 into all aspects of industrial civilization, 346 99:59:59,999 --> 99:59:59,999 from electrical grids to emergency management systems 347 99:59:59,999 --> 99:59:59,999 and even missile launch sites, 348 99:59:59,999 --> 99:59:59,999 the potential consequences of these types of attacks 349 99:59:59,999 --> 99:59:59,999 could lead to truly catastrophic loss of life. 350 99:59:59,999 --> 99:59:59,999 And while states have been the first to reach this stage 351 99:59:59,999 --> 99:59:59,999 in the development of offensive cyber warfare, 352 99:59:59,999 --> 99:59:59,999 corporations and other sub-state actors are already charting their own courses 353 99:59:59,999 --> 99:59:59,999 in the militarization of digital systems.