[Script Info] Title: [Events] Format: Layer, Start, End, Style, Name, MarginL, MarginR, MarginV, Effect, Text Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Greetings Troublemakers... welcome to Trouble. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,My name is not important. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,At 10:30pm on October 29th, 1969, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Charlie Kline, a student programer at UCLA, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,successfully sent the first digital message Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,from one computer terminal to another via the DARPANET, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,a top-secret research project run by the US Department of Defense. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,The transmission of this single word, 'login' Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,was a pivotal moment in human history, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,as it represents the official birth of the Internet. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,And it was from here that the first message was sent. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,A revolution began! Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,In the nearly fifty years that have followed, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,this invention has thoroughly transformed our world Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,and come to dominate virtually all aspects of our lives. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,It has restructured and rejuvenated capitalism, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,by revolutionizing finance and transforming the globe Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,into a single interconnected marketplace. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,It has provided new methods of interacting with one another Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,and helped shape the ways that we receive and process information. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,And it has provided a place for people to upload terabytes of videos of their cats. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,This is pinky... he's a male. He's available for adoption. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,He's pet of the week. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,The Internet has also become the central pillar of a new form of social control Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,based around mass data collection and the construction of algorithms Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,aimed at better predicting and manipulating human behavior. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,But while states and digital capitalists have used the Internet Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,as a platform for mass surveillance and pacification, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,it has also been a site of subversion Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,and created new possibilities for decentralized attacks on the dominant order. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,We've got a problem. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,What? Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Someone synched a RAT to one of my servers. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,A remote access tool – we're being hacked! Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,On the front-lines of this war are hackers Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,... those who use curiosity, programming skills and problem solving Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,to unlock closed systems and bend powerful forces to their will. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Over the next thirty minutes, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,we'll share the voices of a number of these individuals Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,as they share their experiences of defacing web sites, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,leaking emails, developing tools to thwart digital surveillance Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,... and making a whole lot of trouble. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Hacking is one of those terms that I think has become a little bit nebulous. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,I would define it as using technology in a way that wasn't intended, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,by finding bugs and oversights in designs Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,to make it produce results that were never supposed to happen. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Creative subversion of technical systems. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,You take software and you modify it to get another result. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,For example, accessing information on a system that you shouldn't be able to access. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Or making the system do something that it shouldn't be able to do Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,– or that you shouldn't be able to make it do. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,There's a lot of different definitions of hacking, depending on who you ask. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,US criminal law defines computer hacking as unauthorized access Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,to obtain information, transmitting destructive code, etc. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,I mean, they've basically expanded the definition Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,in their ongoing efforts to criminalize everyday Internet activity. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,If you ask someone like Richard Stallman, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,he'll tell you that it's really just a creative solution to a problem. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,But hackers also do like to break into systems. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,There are all kinds of systems, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,and there's all kinds of access Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,... and all kinds of ways to gain access. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Some hackers choose to fix and protect these systems. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,They work for the government, Microsoft etc. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,They call themselves White Hats. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,They're not even really hackers. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,They're seen in the hacking scene as sellouts. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,They do it for the paycheck... or maybe because of the flag. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,But there are those, of course, who don't don't it for employment. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,They don't do it for a paycheck, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,they do it for the love of solving complex puzzles. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,For the thrill of breaking into whatever artificial borders Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,that these people decide to erect. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Everything that's built can be broken. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,I don't think hacking has changed all that much in the last few years. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,What really has changed is the scope of things that can be affected by hacking. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Before, in the 90's, most of it was just practical jokes Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,because none of it had a lot of impact on real life. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,And in popular culture, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,you start to have hackers appear in movies, in television series, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,where there's this whole figure of these hackers that have these super powers. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,That can invade computer systems in any way, shape or form. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,There's a new virus in the database. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,What's happening? Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,It's replicating... eating up memory.... uhh, what do I do? Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Type 'cookie' you idiot! Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Then it gets a lot more popularized. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Since the dot-com boom at the end of the 90's, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,things now have a huge impact. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,And everything tends to be connected to the Internet, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,or some sort of network. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,As digital information networks have evolved, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,a lot of personal information is being stored. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Y'know, big data corporations and industries are relying on computers Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,... so hackers have access to this kind of information Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,that these big companies have as well. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Hacking can be very simple and very complex. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,But most times hacking is very simple. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,By supplying input in a certain way, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,you're able to make the back-end system believe that what you're supplying Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,is actually part of its own code. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Which, in a lot of cases, can give you full access to that system. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,That's not just limited to computers or telecommunication systems. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,We can really kind of apply this idea to all kinds of technical systems. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,So, for example, something like social engineering Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,is a human form of hacking. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Y'know, you can pretend to be somebody that you're not Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,and ask another person questions about themselves Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,in order to get them to reveal private information. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,It's possible that there is software Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,in theory that doesn't have vulnerabilities. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,But in practice, that's impossible to have. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,If an application or a system performs queries to a database based on your input, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,you could possibly alter your input to be able to then alter the database query, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,and possibly gain access to information that you shouldn't be able to. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Mostly what an exploit does, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,it's a small tool that you run to get access to a special sector Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,of the software you want to get. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,A lot of exploits and vulnerabilities are discussed publicly Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,and being used in the wild. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,If you pay attention to lists like Full Disclosure or Security Focus, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,they'll tell you some of the latest tricks that are being used. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Of course, those are the ones that are already publicly known, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,and that the vendors have already released patches for Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,... but a lot of companies don't always patch. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,They're not as on-top of it as they'd like to think that they are. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,For example, the Equifax hacks a couple of weeks ago Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,was running outdated versions of Apache software. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Most people don't really do updates regularly. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,So most people will actually get hacked by something very simple. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Denial of service attacks Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,... basically coming up with ways to create an enormous amount Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,of traffic to your server, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,to the point where it can't continue to provide those services. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,There's such a thing as Distributed Denial of Service attacks, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,where that traffic is coming from many places at the same time. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,The most serious techniques are what they call 'undisclosed vulnerabilities', Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,what they call a 'zero day.' Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,When someone discovers a vulnerability, and instead of reporting it Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,– which is the White Hat way – Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,they continue using it privately. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,And they don't report it publicly, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,so that way for anyone to really adequately protect themselves against it. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,I think a useful way to think about this is Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,that the Internet is a really hostile place. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,It was never designed with privacy or security in mind. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,State actors and corporations control the entire thing. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,And so when you talk about their ability to exploit it Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,... I mean, to me, so many of the basic services that we use Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,on the Internet are exploitative Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,without thinking about a hacker getting into it, or malware or something like that. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,State actors like the US government Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,have the ability to observe all Internet traffic in real time, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,collect it and store it, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,and then use it later at their discretion. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,And they work very closely with the digital capitalists Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,– facebook, google and all these other entities Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,– who are already storing that information anyway. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,The Internet has long been a tool used by social movements Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,of various political stripes, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,both as a means of disseminating information Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,and a fertile ground for recruitment. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Back in the 1990's, the anti-globalization movement Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,arose alongside the open-media publishing platform, Indymedia, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,which allowed for the virtual coordination of many localized fronts Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,in the global fight against neoliberal capitalism. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,I need 50,000 people. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,50,000? You're gonna have to give me some time. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,And drums. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,You want drums? OK, I can do that. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,And what about the Italians? Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,The Italians? Man, they're stuck on the border. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,They're gonna be with you tomorrow. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,And the black bloc? Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,The black bloc are already there. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,You're gonna see black and red like there ain't no tomorrow, kid. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,You just sit tight. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,These days, social media platforms like facebook Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,have given rise to a new form of online activity known as 'clicktivism', Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,in which likes, shares and the signing of online petitions Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,have become a popular way for liberals and so-called 'progressives' Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,to project an image of ostensible participation Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,in campaigns centered around a variety of social justice-related issues, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,and often masking their lack of participation in real world struggles. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Real change requires real action. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,That’s why I always share political articles on facebook, whenever I see them. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,But not everyone has been lulled into this comforting delusion Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,of how social change works. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,On both sides of the political spectrum, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,groups and individuals have continued to use the Internet pragmatically, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,both to spread their ideologies and coordinate their IRL activities. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Anonymous is a decentralized network of hackers and activists Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,that exist in places like IRC and Twitter, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,and anyone is free to become Anonymous Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,and start their own operations within the network. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,It's kinda similar to the black bloc tactic used as cover and collective identity. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,I'm doing ten years in the fence for computer hacking charges Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,related to my involvement in Anonymous. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,I was hacking police departments, military contractors Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,... defacing their websites, releasing their emails and databases to the public. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,One of the bigger targets was a company known as Strategic Forecasting Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,– Stratfor – which is a private intelligence firm Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,made up of mostly former State Department and CIA agents. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,We took down their website. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,We went on donation sprees with all their clients' credit cards, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,and gave their email archives to Wikileaks. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,And Wikileaks pubished them, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,showed that they had been spying on activist groups Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,on behalf of corporations like Dow Chemical. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Groups like Anonymous got really really famous defacing websites. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Other groups attacked police websites, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,getting all the data they have about current police members. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,There's also groups that were blocking huge institutions, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,like credit card companies or banks. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,If they block their transactions, they lose money. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,So there's a bunch of stuff you can do with hacking. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Anonymous, they were really famous for Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,really getting that kind of popular participation in a hacking movement Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,that really didn't mean you had to be an expert to use it. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,You could download a piece of software, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,and you could just run it on your computer Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,and you would enter in the target URL Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,and you could begin to participate in what was effectively like a virtual sit-in. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Now as far as Anonymous, or hacktivists in general Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,playing a role in revolutionary movements... Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Anonymous was very active during Occupy Wall Street and the Arab Spring. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,In general, an overall revolutionary strategy Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,benefits from a diversity of tactics. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Multiple attacks converging from all angles, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,including street protests, to smashed windows, to hacked websites. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,So Anonymous, y'know, revealing scandalous personal information Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,on individuals associated with a company that is the current target of protests Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,– timed well, it could be very effective. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,It's a really interesting concept to me. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,And a lot of people who are members of Anonymous Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,use tools that I work on every day. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,And I hope they will use them for good. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,I think the unifying idea is just using anonymity to achieve some end. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,And doing it with other people. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,And I think that that speaks to some of their internal contradictions too, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,because they're not unified by a political ideology. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Members of Anonymous fight with each other about that. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,And I think when you have no political ideology motivating work like that Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,– work that has the potential to impact the whole globe, and has before Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,- it can be really dangerous. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,We of Anonymous declare total fucking war on antifa, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,and all who support their criminal and violent actions Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,towards innocent civilians. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,I've seen Anonymous operations go after people Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,in a kind of y'know, right-wing, Pizzagate-type style. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,You know... I mean it originated on 4Chan. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Historically, the hacker community has been very inclusive. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,When everything started, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,nobody really knew who was on the other side of the line. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Everyone was just green text on a black background. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,With that said, there is a lot of sexism in tech generally, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,and I'd say that the people who are recruited from places Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,like Reddit and 4Chan are like, y'know, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,your typical tech bros. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Every community on the Internet, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,and every sub-community within those sites, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,whether it's 4Chan or Reddit or whatever, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,has a dog in the fight in gamergate. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Gamergate and 4Chan, and the origins of the alt-right, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,I think are one of the most obvious confirmations Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,of something that many of us who are radicals already knew Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,... which is that toxic masculinity, misogyny, whatever you wanna call it, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,is an incredibly dangerous and violent force. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,And it never ends there. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Beyond the origins in 4Chan, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,I don't really know exactly where a lot of these young men came from. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,I imagine that it's probably not any more interesting Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,than they are a result of late-capitalist alienation. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,But I think that they started out with, y'know, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,just like your garden variety misogyny. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,And then actual literal fascists went to their forums Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,and whispered fascist poison into the ears of these impressionable men. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,And because they already were prone to violence and bigotry, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,then it was just the natural conclusion. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Doxxing is the practice of exposing information about your opponent Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,that they'd rather have kept secret. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Typically, doxxing happens from information Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,that is already somehow readily available Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,... maybe just a little bit hidden. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,If someone is doing their activism under a pseudonym, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,attackers will search for any connection Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,to their real physical persona and put that information online. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,And then whoever the target is, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,all the people who wanna go after that target Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,will work collectively to terrorize them. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,The result of it can be, y'know, something like Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,getting 50 pizzas delivered to your house Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,... or it can be a SWAT team showing up in response to a fake bomb threat. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Protection against this is best done by Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,compartmentalization of your online activities. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,So keep your activist activities and your regular activities separate. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Use different email accounts when you sign up for services. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Doxxing's also been used by hacker collectives Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,to expose lists of police officers, members of fascist organizations... Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,A lot of people were doxxed after the Charlottesville rally Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,out of just public open-source knowledge, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,and had to back-track on their beliefs Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,and actually had to go out in public and offer apologies. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,In June of 2010, a malicious computer worm Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,called the Stuxnet virus was first discovered Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,by a small Belorussian software company, VBA32. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,It was soon shared with cyber-security experts Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,at Kaspersky Labs, in Moscow, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,and Symantec in Silicon Valley, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,who quickly realized that it was unlike any virus ever seen before. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Far from your run-of-the mill malware, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Stuxnet was a sophisticated weapon, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,comprised of millions of lines of code Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,and believed to have been jointly developed by the cyber-warfare divisions Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,of the American and Israeli military. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Its target was the Natanz nuclear enrichment facility, in Iran. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,For Natanz, it was a CIA-led operation. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,So we had to have agency sign-off. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Someone from the agency stood behind the operator and the analyst Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,and gave the order to launch every attack. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,For months, the virus had lain hidden Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,within the plant's Programmable Logic Controllers, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,machines that are commonly used to regulate and control Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,a wide variety of industrial processes. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Running commands that were completely untraceable to workers in the plant, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Stuxnet targeted centrifuges for sabotage, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,causing them to explode, seemingly without cause. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,The virus was only discovered due to an error in an upgrade patch, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,which allowed it to jump out of the secured military facility Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,and onto the world wide web Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,…. otherwise we would have never even known it existed. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,The Israelis took our code for the delivery system and changed it. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Then, on their own, without our agreement Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,they just fucked up the code. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Instead of hiding, the code started shutting down computers Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,... so naturally people noticed. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Because they were in a hurry, they opened Pandora's Box. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,They let it out and it spread all over the world. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,The Stuxnet virus set an important historical precedent, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,as it heralded the beginnings of a dangerous new chapter in modern warfare. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,Still in its relative infancy, state-led cyber military campaigns Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,are now being conducted under conditions of total secrecy, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,shrouded from public scrutiny, or even knowledge. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,And given the widespread incorporation of digital systems Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,into all aspects of industrial civilization, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,from electrical grids to emergency management systems Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,and even missile launch sites, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,the potential consequences of these types of attacks Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,could lead to truly catastrophic loss of life. Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,And while states have been the first to reach this stage Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,in the development of offensive cyber warfare, Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,corporations and other sub-state actors are already charting their own courses Dialogue: 0,9:59:59.99,9:59:59.99,Default,,0000,0000,0000,,in the militarization of digital systems.