[Script Info] Title: [Events] Format: Layer, Start, End, Style, Name, MarginL, MarginR, MarginV, Effect, Text Dialogue: 0,0:00:02.34,0:00:05.02,Default,,0000,0000,0000,,Greetings Troublemakers... welcome to Trouble. Dialogue: 0,0:00:05.02,0:00:06.87,Default,,0000,0000,0000,,My name is not important. Dialogue: 0,0:00:06.87,0:00:10.55,Default,,0000,0000,0000,,At 10:30pm on October 29th, 1969, Dialogue: 0,0:00:10.55,0:00:13.45,Default,,0000,0000,0000,,Charlie Kline, a student programer at UCLA, Dialogue: 0,0:00:13.45,0:00:15.57,Default,,0000,0000,0000,,successfully sent the first digital message Dialogue: 0,0:00:15.57,0:00:18.40,Default,,0000,0000,0000,,from one computer terminal to another via the DARPANET, Dialogue: 0,0:00:18.40,0:00:20.06,Default,,0000,0000,0000,,a top-secret research project Dialogue: 0,0:00:20.06,0:00:22.40,Default,,0000,0000,0000,,run by the US Department of Defense. Dialogue: 0,0:00:22.40,0:00:25.58,Default,,0000,0000,0000,,The transmission of this single word, 'login' Dialogue: 0,0:00:25.58,0:00:27.89,Default,,0000,0000,0000,,was a pivotal moment in human history, Dialogue: 0,0:00:27.89,0:00:30.21,Default,,0000,0000,0000,,as it represents the official birth of the Internet. Dialogue: 0,0:00:30.21,0:00:33.39,Default,,0000,0000,0000,,And it was from here that the first message was sent. Dialogue: 0,0:00:33.39,0:00:34.84,Default,,0000,0000,0000,,A revolution began! Dialogue: 0,0:00:34.84,0:00:36.58,Default,,0000,0000,0000,,In the nearly fifty years that have followed, Dialogue: 0,0:00:36.58,0:00:39.01,Default,,0000,0000,0000,,this invention has thoroughly transformed our world Dialogue: 0,0:00:39.01,0:00:42.10,Default,,0000,0000,0000,,and come to dominate virtually all aspects of our lives. Dialogue: 0,0:00:42.10,0:00:44.57,Default,,0000,0000,0000,,It has restructured and rejuvenated capitalism, Dialogue: 0,0:00:44.57,0:00:47.12,Default,,0000,0000,0000,,by revolutionizing finance and transforming the globe Dialogue: 0,0:00:47.12,0:00:49.25,Default,,0000,0000,0000,,into a single interconnected marketplace. Dialogue: 0,0:00:49.25,0:00:52.06,Default,,0000,0000,0000,,It has provided new methods of interacting with one another Dialogue: 0,0:00:52.06,0:00:55.51,Default,,0000,0000,0000,,and helped shape the ways that we receive and process information. Dialogue: 0,0:00:55.51,0:00:57.53,Default,,0000,0000,0000,,And it has provided a place for people to upload Dialogue: 0,0:00:57.53,0:00:59.55,Default,,0000,0000,0000,,terabytes of videos of their cats. Dialogue: 0,0:00:59.74,0:01:02.94,Default,,0000,0000,0000,,This is pinky... he's a male. He's available for adoption. Dialogue: 0,0:01:02.94,0:01:03.98,Default,,0000,0000,0000,,He's pet of the week. Dialogue: 0,0:01:11.48,0:01:13.63,Default,,0000,0000,0000,,The Internet has also become the central pillar Dialogue: 0,0:01:13.63,0:01:15.21,Default,,0000,0000,0000,,of a new form of social control Dialogue: 0,0:01:15.21,0:01:16.94,Default,,0000,0000,0000,,based around mass data collection Dialogue: 0,0:01:16.94,0:01:18.62,Default,,0000,0000,0000,,and the construction of algorithms Dialogue: 0,0:01:18.62,0:01:21.41,Default,,0000,0000,0000,,aimed at better predicting and manipulating human behavior. Dialogue: 0,0:01:21.41,0:01:24.43,Default,,0000,0000,0000,,But while states and digital capitalists have used the Internet Dialogue: 0,0:01:24.43,0:01:27.27,Default,,0000,0000,0000,,as a platform for mass surveillance and pacification, Dialogue: 0,0:01:27.27,0:01:29.01,Default,,0000,0000,0000,,it has also been a site of subversion Dialogue: 0,0:01:29.01,0:01:30.49,Default,,0000,0000,0000,,and created new possibilities Dialogue: 0,0:01:30.49,0:01:32.100,Default,,0000,0000,0000,,for decentralized attacks on the dominant order. Dialogue: 0,0:01:33.44,0:01:34.33,Default,,0000,0000,0000,,We've got a problem. Dialogue: 0,0:01:34.33,0:01:35.07,Default,,0000,0000,0000,,What? Dialogue: 0,0:01:35.07,0:01:37.33,Default,,0000,0000,0000,,Someone synched a RAT to one of my servers. Dialogue: 0,0:01:37.33,0:01:39.45,Default,,0000,0000,0000,,A remote access tool – we're being hacked! Dialogue: 0,0:01:39.45,0:01:41.31,Default,,0000,0000,0000,,On the front-lines of this war are hackers. Dialogue: 0,0:01:41.31,0:01:44.96,Default,,0000,0000,0000,,Those who use curiosity, programming skills and problem solving Dialogue: 0,0:01:44.96,0:01:48.62,Default,,0000,0000,0000,,to unlock closed systems and bend powerful forces to their will. Dialogue: 0,0:01:48.62,0:01:50.09,Default,,0000,0000,0000,,Over the next thirty minutes, Dialogue: 0,0:01:50.09,0:01:52.58,Default,,0000,0000,0000,,we'll share the voices of a number of these individuals Dialogue: 0,0:01:52.58,0:01:55.20,Default,,0000,0000,0000,,as they share their experiences of defacing web sites, Dialogue: 0,0:01:55.20,0:01:58.93,Default,,0000,0000,0000,,leaking emails, developing tools to thwart digital surveillance Dialogue: 0,0:01:58.93,0:02:00.41,Default,,0000,0000,0000,,... and making a whole lot of trouble. Dialogue: 0,0:02:26.49,0:02:29.80,Default,,0000,0000,0000,,Hacking is one of those terms that I think has become Dialogue: 0,0:02:29.80,0:02:31.20,Default,,0000,0000,0000,,a little bit nebulous. Dialogue: 0,0:02:31.20,0:02:34.86,Default,,0000,0000,0000,,I would define it as using technology in a way that wasn't intended, Dialogue: 0,0:02:34.86,0:02:37.56,Default,,0000,0000,0000,,by finding bugs and oversights in designs Dialogue: 0,0:02:37.56,0:02:40.60,Default,,0000,0000,0000,,to make it produce results that were never supposed to happen. Dialogue: 0,0:02:40.60,0:02:42.83,Default,,0000,0000,0000,,Creative subversion of technical systems. Dialogue: 0,0:02:42.83,0:02:47.09,Default,,0000,0000,0000,,You take software and you modify it to get another result. Dialogue: 0,0:02:47.09,0:02:50.14,Default,,0000,0000,0000,,For example, accessing information on a system Dialogue: 0,0:02:50.14,0:02:52.24,Default,,0000,0000,0000,,that you shouldn't be able to access. Dialogue: 0,0:02:52.24,0:02:57.01,Default,,0000,0000,0000,,Or making the system do something that it shouldn't be able to do Dialogue: 0,0:02:57.01,0:02:59.37,Default,,0000,0000,0000,,– or that you shouldn't be able to make it do. Dialogue: 0,0:02:59.37,0:03:02.62,Default,,0000,0000,0000,,There's a lot of different definitions of hacking, depending on who you ask. Dialogue: 0,0:03:02.62,0:03:06.74,Default,,0000,0000,0000,,US criminal law defines computer hacking as unauthorized access Dialogue: 0,0:03:06.74,0:03:10.17,Default,,0000,0000,0000,,to obtain information, transmitting destructive code, etc. Dialogue: 0,0:03:10.17,0:03:12.49,Default,,0000,0000,0000,,I mean, they've basically expanded the definition Dialogue: 0,0:03:12.49,0:03:15.69,Default,,0000,0000,0000,,in their ongoing efforts to criminalize everyday Internet activity. Dialogue: 0,0:03:15.69,0:03:17.20,Default,,0000,0000,0000,,If you ask someone like Richard Stallman, Dialogue: 0,0:03:17.20,0:03:20.50,Default,,0000,0000,0000,,he'll tell you that it's really just a creative solution to a problem. Dialogue: 0,0:03:20.50,0:03:22.44,Default,,0000,0000,0000,,But hackers also do like to break into systems. Dialogue: 0,0:03:22.44,0:03:24.02,Default,,0000,0000,0000,,There are all kinds of systems, Dialogue: 0,0:03:24.02,0:03:26.01,Default,,0000,0000,0000,,and there's all kinds of access Dialogue: 0,0:03:26.01,0:03:28.28,Default,,0000,0000,0000,,and all kinds of ways to gain access. Dialogue: 0,0:03:28.28,0:03:32.24,Default,,0000,0000,0000,,Some hackers choose to fix and protect these systems. Dialogue: 0,0:03:32.24,0:03:34.99,Default,,0000,0000,0000,,They work for the government, Microsoft etc. Dialogue: 0,0:03:34.99,0:03:36.41,Default,,0000,0000,0000,,They call themselves White Hats. Dialogue: 0,0:03:36.41,0:03:37.74,Default,,0000,0000,0000,,They're not even really hackers. Dialogue: 0,0:03:37.74,0:03:40.03,Default,,0000,0000,0000,,They're seen in the hacking scene as sellouts. Dialogue: 0,0:03:40.03,0:03:43.04,Default,,0000,0000,0000,,They do it for the paycheck... or maybe because of the flag. Dialogue: 0,0:03:43.04,0:03:45.58,Default,,0000,0000,0000,,But there are those, of course, who don't don't it for employment. Dialogue: 0,0:03:45.58,0:03:46.80,Default,,0000,0000,0000,,They don't do it for a paycheck, Dialogue: 0,0:03:46.80,0:03:48.99,Default,,0000,0000,0000,,they do it for the love of solving complex puzzles. Dialogue: 0,0:03:48.99,0:03:52.12,Default,,0000,0000,0000,,For the thrill of breaking into whatever artificial borders Dialogue: 0,0:03:52.12,0:03:54.06,Default,,0000,0000,0000,,that these people decide to erect. Dialogue: 0,0:03:54.06,0:03:56.30,Default,,0000,0000,0000,,Everything that's built can be broken. Dialogue: 0,0:03:56.90,0:03:59.85,Default,,0000,0000,0000,,I don't think hacking has changed all that much in the last few years. Dialogue: 0,0:03:59.85,0:04:02.14,Default,,0000,0000,0000,,What really has changed is the scope Dialogue: 0,0:04:02.14,0:04:04.08,Default,,0000,0000,0000,,of things that can be affected with hacking. Dialogue: 0,0:04:04.08,0:04:07.78,Default,,0000,0000,0000,,Before, in the 90's, most of it was just practical jokes Dialogue: 0,0:04:07.78,0:04:10.45,Default,,0000,0000,0000,,because none of it had a lot of impact on real life. Dialogue: 0,0:04:10.45,0:04:11.66,Default,,0000,0000,0000,,And in popular culture, Dialogue: 0,0:04:11.66,0:04:16.49,Default,,0000,0000,0000,,you start to have hackers appear in movies, in television series, Dialogue: 0,0:04:16.49,0:04:18.94,Default,,0000,0000,0000,,where there's this whole figure of these hackers Dialogue: 0,0:04:18.94,0:04:20.64,Default,,0000,0000,0000,,that have these super powers. Dialogue: 0,0:04:20.64,0:04:24.40,Default,,0000,0000,0000,,That can invade computer systems in any way, shape or form. Dialogue: 0,0:04:24.40,0:04:26.03,Default,,0000,0000,0000,,There's a new virus in the database. Dialogue: 0,0:04:26.03,0:04:27.37,Default,,0000,0000,0000,,What's happening? Dialogue: 0,0:04:27.37,0:04:29.100,Default,,0000,0000,0000,,It's replicating... eating up memory.... uhh, what do I do? Dialogue: 0,0:04:29.100,0:04:31.78,Default,,0000,0000,0000,,Type 'cookie' you idiot! Dialogue: 0,0:04:31.78,0:04:33.71,Default,,0000,0000,0000,,Then it gets a lot more popularized. Dialogue: 0,0:04:33.71,0:04:35.64,Default,,0000,0000,0000,,Since the dot-com boom at the end of the 90's, Dialogue: 0,0:04:35.64,0:04:37.52,Default,,0000,0000,0000,,things now have a huge impact Dialogue: 0,0:04:37.52,0:04:39.31,Default,,0000,0000,0000,,and everything tends to be connected to the Internet, Dialogue: 0,0:04:39.31,0:04:40.48,Default,,0000,0000,0000,,or some sort of network. Dialogue: 0,0:04:40.48,0:04:42.98,Default,,0000,0000,0000,,As digital information networks have evolved, Dialogue: 0,0:04:42.98,0:04:46.24,Default,,0000,0000,0000,,a lot of personal information is being stored. Dialogue: 0,0:04:46.24,0:04:50.14,Default,,0000,0000,0000,,Y'know, big data corporations and industries are relying on computers Dialogue: 0,0:04:50.14,0:04:53.75,Default,,0000,0000,0000,,... so hackers have access to this kind of information Dialogue: 0,0:04:53.75,0:04:55.37,Default,,0000,0000,0000,,that these big companies have as well. Dialogue: 0,0:04:55.37,0:04:57.67,Default,,0000,0000,0000,,Hacking can be very simple and very complex. Dialogue: 0,0:04:57.67,0:05:00.48,Default,,0000,0000,0000,,But most times hacking is very simple. Dialogue: 0,0:05:00.48,0:05:03.66,Default,,0000,0000,0000,,By supplying input in a certain way, Dialogue: 0,0:05:03.66,0:05:07.19,Default,,0000,0000,0000,,you're able to make the back-end system Dialogue: 0,0:05:07.19,0:05:09.81,Default,,0000,0000,0000,,believe that what you're supplying Dialogue: 0,0:05:09.81,0:05:11.68,Default,,0000,0000,0000,,is actually part of its own code. Dialogue: 0,0:05:11.68,0:05:16.31,Default,,0000,0000,0000,,Which, in a lot of cases, can give you full access to that system. Dialogue: 0,0:05:16.31,0:05:20.85,Default,,0000,0000,0000,,That's not just limited to computers or telecommunication systems. Dialogue: 0,0:05:20.85,0:05:24.58,Default,,0000,0000,0000,,We can really kind of apply this idea to all kinds of technical systems. Dialogue: 0,0:05:24.58,0:05:28.40,Default,,0000,0000,0000,,So, for example, something like social engineering Dialogue: 0,0:05:28.40,0:05:30.83,Default,,0000,0000,0000,,is a human form of hacking. Dialogue: 0,0:05:30.83,0:05:34.00,Default,,0000,0000,0000,,Y'know, you can pretend to be somebody that you're not Dialogue: 0,0:05:34.00,0:05:37.82,Default,,0000,0000,0000,,and ask another person questions about themselves Dialogue: 0,0:05:37.82,0:05:40.70,Default,,0000,0000,0000,,in order to get them to reveal private information. Dialogue: 0,0:05:40.70,0:05:42.61,Default,,0000,0000,0000,,It's possible that there is software Dialogue: 0,0:05:42.61,0:05:44.65,Default,,0000,0000,0000,,in theory that doesn't have vulnerabilities. Dialogue: 0,0:05:44.65,0:05:47.16,Default,,0000,0000,0000,,But in practice, that's impossible to have. Dialogue: 0,0:05:47.16,0:05:49.27,Default,,0000,0000,0000,,If an application or a system Dialogue: 0,0:05:49.27,0:05:53.32,Default,,0000,0000,0000,,performs queries to a database based on your input, Dialogue: 0,0:05:53.32,0:05:56.84,Default,,0000,0000,0000,,you could possibly alter your input Dialogue: 0,0:05:56.84,0:05:59.61,Default,,0000,0000,0000,,to be able to then alter the database query, Dialogue: 0,0:05:59.61,0:06:03.63,Default,,0000,0000,0000,,and possibly gain access to information that you shouldn't be able to. Dialogue: 0,0:06:03.63,0:06:05.05,Default,,0000,0000,0000,,Mostly what an exploit does, Dialogue: 0,0:06:05.05,0:06:09.02,Default,,0000,0000,0000,,it's a small tool that you run to get access to a special sector Dialogue: 0,0:06:09.02,0:06:11.08,Default,,0000,0000,0000,,of the software you want to get. Dialogue: 0,0:06:11.58,0:06:14.34,Default,,0000,0000,0000,,A lot of exploits and vulnerabilities are discussed publicly Dialogue: 0,0:06:14.34,0:06:15.91,Default,,0000,0000,0000,,and being used in the wild. Dialogue: 0,0:06:15.91,0:06:19.33,Default,,0000,0000,0000,,If you pay attention to lists like Full Disclosure or Security Focus, Dialogue: 0,0:06:19.33,0:06:21.77,Default,,0000,0000,0000,,they'll tell you some of the latest tricks that are being used. Dialogue: 0,0:06:21.77,0:06:24.34,Default,,0000,0000,0000,,Of course, those are the ones that are already publicly known, Dialogue: 0,0:06:24.34,0:06:27.49,Default,,0000,0000,0000,,and that the vendors have often already released patches Dialogue: 0,0:06:27.49,0:06:30.24,Default,,0000,0000,0000,,... but a lot of companies don't always patch. Dialogue: 0,0:06:30.24,0:06:33.17,Default,,0000,0000,0000,,They're not as on-top of it as they'd like to think that they are. Dialogue: 0,0:06:33.17,0:06:35.94,Default,,0000,0000,0000,,For example, the Equifax hacks a couple of weeks ago Dialogue: 0,0:06:35.94,0:06:39.13,Default,,0000,0000,0000,,was running outdated versions of Apache software. Dialogue: 0,0:06:39.13,0:06:41.78,Default,,0000,0000,0000,,Most people don't really do updates regularly. Dialogue: 0,0:06:41.78,0:06:45.63,Default,,0000,0000,0000,,So most people will actually get hacked by something very simple. Dialogue: 0,0:06:45.63,0:06:47.29,Default,,0000,0000,0000,,Denial of service attacks Dialogue: 0,0:06:47.29,0:06:50.98,Default,,0000,0000,0000,,... basically coming up with ways to create an enormous amount Dialogue: 0,0:06:50.98,0:06:52.67,Default,,0000,0000,0000,,of traffic to your server, Dialogue: 0,0:06:52.67,0:06:56.50,Default,,0000,0000,0000,,to the point where it can't continue to provide those services. Dialogue: 0,0:06:56.50,0:06:59.15,Default,,0000,0000,0000,,There's such a thing as Distributed Denial of Service attacks, Dialogue: 0,0:06:59.15,0:07:03.21,Default,,0000,0000,0000,,where that traffic is coming from many places at the same time. Dialogue: 0,0:07:03.21,0:07:07.09,Default,,0000,0000,0000,,The most serious techniques are what they call 'undisclosed vulnerabilities', Dialogue: 0,0:07:07.09,0:07:08.24,Default,,0000,0000,0000,,what they call a 'zero day.' Dialogue: 0,0:07:08.24,0:07:11.52,Default,,0000,0000,0000,,When someone discovers a vulnerability, and instead of reporting it Dialogue: 0,0:07:11.52,0:07:12.94,Default,,0000,0000,0000,,– which is the White Hat way – Dialogue: 0,0:07:12.94,0:07:15.08,Default,,0000,0000,0000,,they continue using it privately. Dialogue: 0,0:07:15.08,0:07:17.65,Default,,0000,0000,0000,,And they don't report it publicly, Dialogue: 0,0:07:17.65,0:07:20.42,Default,,0000,0000,0000,,so that way there's no way for anyone to Dialogue: 0,0:07:20.42,0:07:23.21,Default,,0000,0000,0000,,really adequately protect themselves against it. Dialogue: 0,0:07:23.21,0:07:25.85,Default,,0000,0000,0000,,I think a useful way to think about this is Dialogue: 0,0:07:25.85,0:07:27.78,Default,,0000,0000,0000,,that the Internet is a really hostile place. Dialogue: 0,0:07:27.78,0:07:31.56,Default,,0000,0000,0000,,It was never designed with privacy or security in mind. Dialogue: 0,0:07:31.56,0:07:35.53,Default,,0000,0000,0000,,State actors and corporations control the entire thing. Dialogue: 0,0:07:35.53,0:07:38.29,Default,,0000,0000,0000,,And so when you talk about their ability to exploit it Dialogue: 0,0:07:38.29,0:07:43.40,Default,,0000,0000,0000,,... I mean, to me, so many of the basic services that we use Dialogue: 0,0:07:43.40,0:07:45.11,Default,,0000,0000,0000,,on the Internet are exploitative Dialogue: 0,0:07:45.11,0:07:48.22,Default,,0000,0000,0000,,without thinking about a hacker getting into it, Dialogue: 0,0:07:48.22,0:07:49.89,Default,,0000,0000,0000,,or malware or something like that. Dialogue: 0,0:07:49.89,0:07:52.33,Default,,0000,0000,0000,,State actors like the US government Dialogue: 0,0:07:52.33,0:07:56.02,Default,,0000,0000,0000,,have the ability to observe all Internet traffic in real time, Dialogue: 0,0:07:56.02,0:07:57.48,Default,,0000,0000,0000,,collect it and store it, Dialogue: 0,0:07:57.48,0:07:59.55,Default,,0000,0000,0000,,and then use it later at their discretion. Dialogue: 0,0:07:59.55,0:08:02.72,Default,,0000,0000,0000,,And they work very closely with the digital capitalists Dialogue: 0,0:08:02.72,0:08:05.19,Default,,0000,0000,0000,,– facebook, google and all these other entities Dialogue: 0,0:08:05.19,0:08:07.67,Default,,0000,0000,0000,,– who are already storing that information anyway. Dialogue: 0,0:08:12.21,0:08:15.82,Default,,0000,0000,0000,,The Internet has long been a tool used by social movements Dialogue: 0,0:08:15.82,0:08:17.40,Default,,0000,0000,0000,,of various political stripes, Dialogue: 0,0:08:17.40,0:08:19.51,Default,,0000,0000,0000,,both as a means of disseminating information Dialogue: 0,0:08:19.51,0:08:21.58,Default,,0000,0000,0000,,and a fertile ground for recruitment. Dialogue: 0,0:08:21.58,0:08:24.98,Default,,0000,0000,0000,,Back in the 1990's, the anti-globalization movement Dialogue: 0,0:08:24.98,0:08:28.40,Default,,0000,0000,0000,,arose alongside the open-media publishing platform, Indymedia, Dialogue: 0,0:08:28.40,0:08:31.45,Default,,0000,0000,0000,,which allowed for the virtual coordination of many localized fronts Dialogue: 0,0:08:31.45,0:08:34.36,Default,,0000,0000,0000,,in the global fight against neoliberal capitalism. Dialogue: 0,0:08:37.70,0:08:39.15,Default,,0000,0000,0000,,I need 50,000 people. Dialogue: 0,0:08:39.15,0:08:41.84,Default,,0000,0000,0000,,50,000? You're gonna have to give me some time. Dialogue: 0,0:08:41.84,0:08:42.98,Default,,0000,0000,0000,,And drums. Dialogue: 0,0:08:42.98,0:08:46.49,Default,,0000,0000,0000,,You want drums? OK, I can do that. Dialogue: 0,0:08:46.49,0:08:47.92,Default,,0000,0000,0000,,And what about the Italians? Dialogue: 0,0:08:47.92,0:08:52.34,Default,,0000,0000,0000,,The Italians? Man, they're stuck on the border. Dialogue: 0,0:08:52.34,0:08:53.84,Default,,0000,0000,0000,,They're gonna be with you tomorrow. Dialogue: 0,0:08:53.84,0:08:54.48,Default,,0000,0000,0000,,And the black bloc? Dialogue: 0,0:08:54.48,0:08:56.03,Default,,0000,0000,0000,,The black bloc are already there. Dialogue: 0,0:08:56.03,0:08:58.33,Default,,0000,0000,0000,,You're gonna see black and red like there ain't no tomorrow, kid. Dialogue: 0,0:08:58.33,0:08:59.34,Default,,0000,0000,0000,,You just sit tight. Dialogue: 0,0:08:59.34,0:09:09.82,Default,,0000,0000,0000,,These days, social media platforms like facebook Dialogue: 0,0:09:09.82,0:09:13.34,Default,,0000,0000,0000,,have given rise to a new form of online activity known as 'clicktivism', Dialogue: 0,0:09:13.34,0:09:16.11,Default,,0000,0000,0000,,in which likes, shares and the signing of online petitions Dialogue: 0,0:09:16.11,0:09:19.23,Default,,0000,0000,0000,,have become a popular way for liberals and so-called 'progressives' Dialogue: 0,0:09:19.23,0:09:21.39,Default,,0000,0000,0000,,to project an image of ostensible participation Dialogue: 0,0:09:21.39,0:09:24.83,Default,,0000,0000,0000,,in campaigns centered around a variety of social justice-related issues, Dialogue: 0,0:09:24.83,0:09:28.56,Default,,0000,0000,0000,,and often masking their lack of participation in real world struggles. Dialogue: 0,0:09:28.56,0:09:31.65,Default,,0000,0000,0000,,Real change requires real action. Dialogue: 0,0:09:31.65,0:09:36.93,Default,,0000,0000,0000,,That’s why I always share political articles on facebook, whenever I see them. Dialogue: 0,0:09:36.93,0:09:39.60,Default,,0000,0000,0000,,But not everyone has been lulled into this comforting delusion Dialogue: 0,0:09:39.60,0:09:41.17,Default,,0000,0000,0000,,of how social change works. Dialogue: 0,0:09:41.17,0:09:43.37,Default,,0000,0000,0000,,On both sides of the political spectrum, Dialogue: 0,0:09:43.37,0:09:46.94,Default,,0000,0000,0000,,groups and individuals have continued to use the Internet pragmatically, Dialogue: 0,0:09:46.94,0:09:50.57,Default,,0000,0000,0000,,both to spread their ideologies and coordinate their IRL activities. Dialogue: 0,0:09:52.61,0:09:55.00,Default,,0000,0000,0000,,Anonymous is a decentralized network of hackers and activists Dialogue: 0,0:09:55.00,0:09:57.08,Default,,0000,0000,0000,,that exist in places like IRC and Twitter, Dialogue: 0,0:09:57.08,0:09:59.48,Default,,0000,0000,0000,,and anyone is free to become Anonymous Dialogue: 0,0:09:59.48,0:10:01.55,Default,,0000,0000,0000,,and start their own operations within the network. Dialogue: 0,0:10:01.55,0:10:05.86,Default,,0000,0000,0000,,It's kinda similar to the black bloc tactic used as cover and collective identity. Dialogue: 0,0:10:05.86,0:10:09.22,Default,,0000,0000,0000,,I'm doing ten years in the fence for computer hacking charges Dialogue: 0,0:10:09.22,0:10:11.41,Default,,0000,0000,0000,,related to my involvement in Anonymous. Dialogue: 0,0:10:11.41,0:10:14.01,Default,,0000,0000,0000,,I was hacking police departments, military contractors Dialogue: 0,0:10:14.01,0:10:18.39,Default,,0000,0000,0000,,... defacing their websites, releasing their emails and databases to the public. Dialogue: 0,0:10:18.39,0:10:22.11,Default,,0000,0000,0000,,One of the bigger targets was a company known as Strategic Forecasting Dialogue: 0,0:10:22.11,0:10:24.76,Default,,0000,0000,0000,,– Stratfor – which is a private intelligence firm Dialogue: 0,0:10:24.76,0:10:27.97,Default,,0000,0000,0000,,made up of mostly former State Department and CIA agents. Dialogue: 0,0:10:27.97,0:10:29.23,Default,,0000,0000,0000,,We took down their website. Dialogue: 0,0:10:29.23,0:10:32.07,Default,,0000,0000,0000,,We went on donation sprees with all their clients' credit cards, Dialogue: 0,0:10:32.07,0:10:34.46,Default,,0000,0000,0000,,and gave their email archives to Wikileaks. Dialogue: 0,0:10:34.46,0:10:35.92,Default,,0000,0000,0000,,And Wikileaks pubished them, Dialogue: 0,0:10:35.92,0:10:38.48,Default,,0000,0000,0000,,showed that they had been spying on activist groups Dialogue: 0,0:10:38.48,0:10:40.68,Default,,0000,0000,0000,,on behalf of corporations like Dow Chemical. Dialogue: 0,0:10:40.68,0:10:43.96,Default,,0000,0000,0000,,Groups like Anonymous got really really famous defacing websites. Dialogue: 0,0:10:43.96,0:10:46.14,Default,,0000,0000,0000,,Other groups attacked police websites, Dialogue: 0,0:10:46.14,0:10:51.01,Default,,0000,0000,0000,,getting all the data they have about current police members. Dialogue: 0,0:10:51.01,0:10:55.28,Default,,0000,0000,0000,,There's also groups that were blocking huge institutions, Dialogue: 0,0:10:55.28,0:10:57.59,Default,,0000,0000,0000,,like credit card companies or banks. Dialogue: 0,0:10:57.59,0:10:59.90,Default,,0000,0000,0000,,If they block their transactions, they lose money. Dialogue: 0,0:10:59.90,0:11:03.77,Default,,0000,0000,0000,,So there's a bunch of stuff you can do with hacking. Dialogue: 0,0:11:03.77,0:11:05.48,Default,,0000,0000,0000,,Anonymous, they were really famous for Dialogue: 0,0:11:05.48,0:11:08.68,Default,,0000,0000,0000,,really getting that kind of popular participation in a hacking movement Dialogue: 0,0:11:08.68,0:11:12.61,Default,,0000,0000,0000,,that really didn't mean you had to be an expert to use it. Dialogue: 0,0:11:12.61,0:11:14.15,Default,,0000,0000,0000,,You could download a piece of software, Dialogue: 0,0:11:14.15,0:11:16.18,Default,,0000,0000,0000,,and you could just run it on your computer Dialogue: 0,0:11:16.18,0:11:19.26,Default,,0000,0000,0000,,and you would enter in the target URL Dialogue: 0,0:11:19.26,0:11:25.06,Default,,0000,0000,0000,,and you could begin to participate in what was effectively like a virtual sit-in. Dialogue: 0,0:11:25.06,0:11:27.06,Default,,0000,0000,0000,,Now as far as Anonymous, or hacktivists in general Dialogue: 0,0:11:27.06,0:11:29.12,Default,,0000,0000,0000,,playing a role in revolutionary movements... Dialogue: 0,0:11:29.12,0:11:32.49,Default,,0000,0000,0000,,Anonymous was very active during Occupy Wall Street and the Arab Spring. Dialogue: 0,0:11:32.49,0:11:34.56,Default,,0000,0000,0000,,In general, an overall revolutionary strategy Dialogue: 0,0:11:34.56,0:11:36.63,Default,,0000,0000,0000,,benefits from a diversity of tactics. Dialogue: 0,0:11:36.63,0:11:39.06,Default,,0000,0000,0000,,Multiple attacks converging from all angles, Dialogue: 0,0:11:39.06,0:11:43.44,Default,,0000,0000,0000,,including street protests, to smashed windows, to hacked websites. Dialogue: 0,0:11:43.44,0:11:46.81,Default,,0000,0000,0000,,So Anonymous, y'know, revealing scandalous personal information Dialogue: 0,0:11:46.81,0:11:50.87,Default,,0000,0000,0000,,on individuals associated with a company that is the current target of protests Dialogue: 0,0:11:50.87,0:11:52.91,Default,,0000,0000,0000,,– timed well, it could be very effective. Dialogue: 0,0:11:52.91,0:11:55.01,Default,,0000,0000,0000,,It's a really interesting concept to me. Dialogue: 0,0:11:55.01,0:11:57.90,Default,,0000,0000,0000,,And a lot of people who are members of Anonymous Dialogue: 0,0:11:57.90,0:12:00.17,Default,,0000,0000,0000,,use tools that I work on every day. Dialogue: 0,0:12:00.17,0:12:01.78,Default,,0000,0000,0000,,And I hope they will use them for good. Dialogue: 0,0:12:01.78,0:12:09.50,Default,,0000,0000,0000,,I think the unifying idea is just using anonymity to achieve some end. Dialogue: 0,0:12:09.50,0:12:11.24,Default,,0000,0000,0000,,And doing it with other people. Dialogue: 0,0:12:11.24,0:12:14.61,Default,,0000,0000,0000,,And I think that that speaks to some of their internal contradictions too, Dialogue: 0,0:12:14.61,0:12:17.53,Default,,0000,0000,0000,,because they're not unified by a political ideology. Dialogue: 0,0:12:17.53,0:12:20.74,Default,,0000,0000,0000,,Members of Anonymous fight with each other about that. Dialogue: 0,0:12:20.74,0:12:26.17,Default,,0000,0000,0000,,And I think when you have no political ideology motivating work like that Dialogue: 0,0:12:26.17,0:12:32.25,Default,,0000,0000,0000,,– work that has the potential to impact the whole globe, and has before Dialogue: 0,0:12:32.25,0:12:34.28,Default,,0000,0000,0000,,- it can be really dangerous. Dialogue: 0,0:12:34.28,0:12:37.72,Default,,0000,0000,0000,,We of Anonymous declare total fucking war on antifa, Dialogue: 0,0:12:37.72,0:12:40.20,Default,,0000,0000,0000,,and all who support their criminal and violent actions Dialogue: 0,0:12:40.20,0:12:41.81,Default,,0000,0000,0000,,towards innocent civilians. Dialogue: 0,0:12:41.81,0:12:45.89,Default,,0000,0000,0000,,I've seen Anonymous operations go after people Dialogue: 0,0:12:45.89,0:12:50.34,Default,,0000,0000,0000,,in a kind of y'know, right-wing, Pizzagate-type style. Dialogue: 0,0:12:50.34,0:12:52.46,Default,,0000,0000,0000,,You know... I mean it originated on 4Chan. Dialogue: 0,0:12:52.46,0:12:57.17,Default,,0000,0000,0000,,Historically, the hacker community has been very inclusive. Dialogue: 0,0:12:57.17,0:12:58.75,Default,,0000,0000,0000,,When everything started, Dialogue: 0,0:12:58.75,0:13:02.88,Default,,0000,0000,0000,,nobody really knew who was on the other side of the line. Dialogue: 0,0:13:02.88,0:13:06.29,Default,,0000,0000,0000,,Everyone was just green text on a black background. Dialogue: 0,0:13:06.29,0:13:10.06,Default,,0000,0000,0000,,With that said, there is a lot of sexism in tech generally, Dialogue: 0,0:13:10.06,0:13:14.40,Default,,0000,0000,0000,,and I'd say that the people who are recruited from places Dialogue: 0,0:13:14.40,0:13:18.22,Default,,0000,0000,0000,,like Reddit and 4Chan are like, y'know, Dialogue: 0,0:13:18.22,0:13:20.77,Default,,0000,0000,0000,,your typical tech bros. Dialogue: 0,0:13:20.77,0:13:22.52,Default,,0000,0000,0000,,Every community on the Internet, Dialogue: 0,0:13:22.52,0:13:25.15,Default,,0000,0000,0000,,and every sub-community within those sites, Dialogue: 0,0:13:25.15,0:13:26.82,Default,,0000,0000,0000,,whether it's 4Chan or Reddit or whatever, Dialogue: 0,0:13:26.82,0:13:29.33,Default,,0000,0000,0000,,has a dog in the fight in gamergate. Dialogue: 0,0:13:29.33,0:13:33.91,Default,,0000,0000,0000,,Gamergate and 4Chan, and the origins of the alt-right, Dialogue: 0,0:13:33.91,0:13:38.49,Default,,0000,0000,0000,,I think are one of the most obvious confirmations Dialogue: 0,0:13:38.49,0:13:42.68,Default,,0000,0000,0000,,of something that many of us who are radicals already knew Dialogue: 0,0:13:42.68,0:13:47.18,Default,,0000,0000,0000,,... which is that toxic masculinity, misogyny, whatever you wanna call it, Dialogue: 0,0:13:47.18,0:13:50.70,Default,,0000,0000,0000,,is an incredibly dangerous and violent force. Dialogue: 0,0:13:50.70,0:13:52.42,Default,,0000,0000,0000,,And it never ends there. Dialogue: 0,0:13:52.42,0:13:54.60,Default,,0000,0000,0000,,Beyond the origins in 4Chan, Dialogue: 0,0:13:54.60,0:13:59.30,Default,,0000,0000,0000,,I don't really know exactly where a lot of these young men came from. Dialogue: 0,0:13:59.30,0:14:02.42,Default,,0000,0000,0000,,I imagine that it's probably not any more interesting Dialogue: 0,0:14:02.42,0:14:06.93,Default,,0000,0000,0000,,than they are a result of late-capitalist alienation. Dialogue: 0,0:14:06.93,0:14:10.98,Default,,0000,0000,0000,,But I think that they started out with, y'know, Dialogue: 0,0:14:10.98,0:14:13.66,Default,,0000,0000,0000,,just like your garden variety misogyny. Dialogue: 0,0:14:13.66,0:14:17.96,Default,,0000,0000,0000,,And then actual literal fascists went to their forums Dialogue: 0,0:14:17.96,0:14:23.08,Default,,0000,0000,0000,,and whispered fascist poison into the ears of these impressionable men. Dialogue: 0,0:14:23.08,0:14:27.70,Default,,0000,0000,0000,,And because they already were prone to violence and bigotry, Dialogue: 0,0:14:27.70,0:14:30.91,Default,,0000,0000,0000,,then it was just the natural conclusion. Dialogue: 0,0:14:30.91,0:14:37.48,Default,,0000,0000,0000,,Doxxing is the practice of exposing information about your opponent Dialogue: 0,0:14:37.48,0:14:40.56,Default,,0000,0000,0000,,that they'd rather have kept secret. Dialogue: 0,0:14:40.56,0:14:44.70,Default,,0000,0000,0000,,Typically, doxxing happens from information Dialogue: 0,0:14:44.70,0:14:47.42,Default,,0000,0000,0000,,that is already somehow readily available Dialogue: 0,0:14:47.42,0:14:49.11,Default,,0000,0000,0000,,... maybe just a little bit hidden. Dialogue: 0,0:14:49.11,0:14:52.81,Default,,0000,0000,0000,,If someone is doing their activism under a pseudonym, Dialogue: 0,0:14:52.81,0:14:56.91,Default,,0000,0000,0000,,attackers will search for any connection Dialogue: 0,0:14:56.91,0:15:01.21,Default,,0000,0000,0000,,to their real physical persona and put that information online. Dialogue: 0,0:15:01.21,0:15:03.99,Default,,0000,0000,0000,,And then whoever the target is, Dialogue: 0,0:15:03.99,0:15:06.32,Default,,0000,0000,0000,,all the people who wanna go after that target Dialogue: 0,0:15:06.32,0:15:09.02,Default,,0000,0000,0000,,will work collectively to terrorize them. Dialogue: 0,0:15:09.02,0:15:11.34,Default,,0000,0000,0000,,The result of it can be, y'know, something like Dialogue: 0,0:15:11.34,0:15:14.02,Default,,0000,0000,0000,,getting 50 pizzas delivered to your house Dialogue: 0,0:15:14.02,0:15:19.62,Default,,0000,0000,0000,,... or it can be a SWAT team showing up in response to a fake bomb threat. Dialogue: 0,0:15:19.62,0:15:22.61,Default,,0000,0000,0000,,Protection against this is best done by Dialogue: 0,0:15:22.61,0:15:26.47,Default,,0000,0000,0000,,compartmentalization of your online activities. Dialogue: 0,0:15:26.47,0:15:31.29,Default,,0000,0000,0000,,So keep your activist activities and your regular activities separate. Dialogue: 0,0:15:31.29,0:15:35.23,Default,,0000,0000,0000,,Use different email accounts when you sign up for services. Dialogue: 0,0:15:35.23,0:15:38.23,Default,,0000,0000,0000,,Doxxing's also been used by hacker collectives Dialogue: 0,0:15:38.23,0:15:44.49,Default,,0000,0000,0000,,to expose lists of police officers, members of fascist organizations... Dialogue: 0,0:15:44.49,0:15:47.89,Default,,0000,0000,0000,,A lot of people were doxxed after the Charlottesville rally Dialogue: 0,0:15:47.89,0:15:50.18,Default,,0000,0000,0000,,out of just public open-source knowledge, Dialogue: 0,0:15:50.18,0:15:52.41,Default,,0000,0000,0000,,and had to back-track on their beliefs Dialogue: 0,0:15:52.41,0:15:55.33,Default,,0000,0000,0000,,and actually had to go out in public and offer apologies. Dialogue: 0,0:15:57.44,0:16:00.19,Default,,0000,0000,0000,,In June of 2010, a malicious computer worm Dialogue: 0,0:16:00.19,0:16:02.26,Default,,0000,0000,0000,,called the Stuxnet virus was first discovered Dialogue: 0,0:16:02.26,0:16:05.71,Default,,0000,0000,0000,,by a small Belorussian software company, VBA32. Dialogue: 0,0:16:05.71,0:16:08.36,Default,,0000,0000,0000,,It was soon shared with cyber-security experts Dialogue: 0,0:16:08.36,0:16:10.34,Default,,0000,0000,0000,,at Kaspersky Labs, in Moscow, Dialogue: 0,0:16:10.34,0:16:12.34,Default,,0000,0000,0000,,and Symantec in Silicon Valley, Dialogue: 0,0:16:12.34,0:16:15.70,Default,,0000,0000,0000,,who quickly realized that it was unlike any virus ever seen before. Dialogue: 0,0:16:15.70,0:16:17.65,Default,,0000,0000,0000,,Far from your run-of-the mill malware, Dialogue: 0,0:16:17.65,0:16:19.56,Default,,0000,0000,0000,,Stuxnet was a sophisticated weapon, Dialogue: 0,0:16:19.56,0:16:21.55,Default,,0000,0000,0000,,comprised of millions of lines of code Dialogue: 0,0:16:21.55,0:16:24.72,Default,,0000,0000,0000,,and believed to have been jointly developed by the cyber-warfare divisions Dialogue: 0,0:16:24.72,0:16:26.74,Default,,0000,0000,0000,,of the American and Israeli military. Dialogue: 0,0:16:26.74,0:16:30.19,Default,,0000,0000,0000,,Its target was the Natanz nuclear enrichment facility, in Iran. Dialogue: 0,0:16:30.19,0:16:33.76,Default,,0000,0000,0000,,For Natanz, it was a CIA-led operation. Dialogue: 0,0:16:33.76,0:16:36.16,Default,,0000,0000,0000,,So we had to have agency sign-off. Dialogue: 0,0:16:36.16,0:16:43.78,Default,,0000,0000,0000,,Someone from the agency stood behind the operator and the analyst Dialogue: 0,0:16:43.78,0:16:46.66,Default,,0000,0000,0000,,and gave the order to launch every attack. Dialogue: 0,0:16:46.66,0:16:48.81,Default,,0000,0000,0000,,For months, the virus had lain hidden Dialogue: 0,0:16:48.81,0:16:50.96,Default,,0000,0000,0000,,within the plant's Programmable Logic Controllers, Dialogue: 0,0:16:50.96,0:16:53.52,Default,,0000,0000,0000,,machines that are commonly used to regulate and control Dialogue: 0,0:16:53.52,0:16:55.83,Default,,0000,0000,0000,,a wide variety of industrial processes. Dialogue: 0,0:16:55.83,0:16:59.36,Default,,0000,0000,0000,,Running commands that were completely untraceable to workers in the plant, Dialogue: 0,0:16:59.36,0:17:01.95,Default,,0000,0000,0000,,Stuxnet targeted centrifuges for sabotage, Dialogue: 0,0:17:01.95,0:17:04.90,Default,,0000,0000,0000,,causing them to explode, seemingly without cause. Dialogue: 0,0:17:04.90,0:17:08.25,Default,,0000,0000,0000,,The virus was only discovered due to an error in an upgrade patch, Dialogue: 0,0:17:08.25,0:17:11.25,Default,,0000,0000,0000,,which allowed it to jump out of the secured military facility Dialogue: 0,0:17:11.25,0:17:12.67,Default,,0000,0000,0000,,and onto the world wide web Dialogue: 0,0:17:12.67,0:17:15.38,Default,,0000,0000,0000,,…. otherwise we would have never even known it existed. Dialogue: 0,0:17:15.38,0:17:20.25,Default,,0000,0000,0000,,The Israelis took our code for the delivery system and changed it. Dialogue: 0,0:17:20.25,0:17:24.38,Default,,0000,0000,0000,,Then, on their own, without our agreement Dialogue: 0,0:17:24.38,0:17:25.92,Default,,0000,0000,0000,,they just fucked up the code. Dialogue: 0,0:17:25.92,0:17:30.30,Default,,0000,0000,0000,,Instead of hiding, the code started shutting down computers Dialogue: 0,0:17:30.30,0:17:32.36,Default,,0000,0000,0000,,... so naturally people noticed. Dialogue: 0,0:17:32.36,0:17:35.78,Default,,0000,0000,0000,,Because they were in a hurry, they opened Pandora's Box. Dialogue: 0,0:17:35.78,0:17:41.14,Default,,0000,0000,0000,,They let it out and it spread all over the world. Dialogue: 0,0:17:41.14,0:17:44.30,Default,,0000,0000,0000,,The Stuxnet virus set an important historical precedent, Dialogue: 0,0:17:44.30,0:17:47.99,Default,,0000,0000,0000,,as it heralded the beginnings of a dangerous new chapter in modern warfare. Dialogue: 0,0:17:47.99,0:17:51.60,Default,,0000,0000,0000,,Still in its relative infancy, state-led cyber military campaigns Dialogue: 0,0:17:51.60,0:17:54.44,Default,,0000,0000,0000,,are now being conducted under conditions of total secrecy, Dialogue: 0,0:17:54.44,0:17:57.37,Default,,0000,0000,0000,,shrouded from public scrutiny, or even knowledge. Dialogue: 0,0:17:57.37,0:18:00.21,Default,,0000,0000,0000,,And given the widespread incorporation of digital systems Dialogue: 0,0:18:00.21,0:18:02.56,Default,,0000,0000,0000,,into all aspects of industrial civilization, Dialogue: 0,0:18:02.56,0:18:05.11,Default,,0000,0000,0000,,from electrical grids to emergency management systems Dialogue: 0,0:18:05.11,0:18:06.75,Default,,0000,0000,0000,,and even missile launch sites, Dialogue: 0,0:18:06.75,0:18:08.86,Default,,0000,0000,0000,,the potential consequences of these types of attacks Dialogue: 0,0:18:08.86,0:18:11.00,Default,,0000,0000,0000,,could lead to truly catastrophic loss of life. Dialogue: 0,0:18:11.00,0:18:14.00,Default,,0000,0000,0000,,And while states have been the first to reach this stage Dialogue: 0,0:18:14.00,0:18:16.31,Default,,0000,0000,0000,,in the development of offensive cyber warfare, Dialogue: 0,0:18:16.31,0:18:19.80,Default,,0000,0000,0000,,corporations and other sub-state actors are already charting their own courses Dialogue: 0,0:18:19.80,0:18:21.67,Default,,0000,0000,0000,,in the militarization of digital systems. Dialogue: 0,0:18:23.70,0:18:25.65,Default,,0000,0000,0000,,A lot of what we have as the Internet now Dialogue: 0,0:18:25.65,0:18:27.15,Default,,0000,0000,0000,,- a lot of the building blocks of the Internet - Dialogue: 0,0:18:27.15,0:18:28.53,Default,,0000,0000,0000,,were created by hackers. Dialogue: 0,0:18:28.53,0:18:30.92,Default,,0000,0000,0000,,Experimenting with the technology, coming up with new uses Dialogue: 0,0:18:30.92,0:18:35.63,Default,,0000,0000,0000,,for a communications system that was originally designed Dialogue: 0,0:18:35.63,0:18:39.60,Default,,0000,0000,0000,,to sustain military communication in times of war. Dialogue: 0,0:18:39.60,0:18:42.80,Default,,0000,0000,0000,,And all of these really talented young programmers Dialogue: 0,0:18:42.80,0:18:45.36,Default,,0000,0000,0000,,started to found these Internet start-ups Dialogue: 0,0:18:45.36,0:18:48.48,Default,,0000,0000,0000,,and companies that become Silicon Valley. Dialogue: 0,0:18:48.48,0:18:50.59,Default,,0000,0000,0000,,So hackers suddenly go from becoming criminals Dialogue: 0,0:18:50.59,0:18:53.76,Default,,0000,0000,0000,,to these billionaire entrepreneurs. Dialogue: 0,0:18:53.76,0:18:58.22,Default,,0000,0000,0000,,These corporations are gathering data at an impressive scale. Dialogue: 0,0:18:58.22,0:19:02.12,Default,,0000,0000,0000,,People are naturally communicative beings. Dialogue: 0,0:19:02.12,0:19:05.69,Default,,0000,0000,0000,,So we're constantly emitting information. Dialogue: 0,0:19:05.69,0:19:09.34,Default,,0000,0000,0000,,And that information is captured by the social media companies Dialogue: 0,0:19:09.34,0:19:11.28,Default,,0000,0000,0000,,and search engines. Dialogue: 0,0:19:11.28,0:19:13.63,Default,,0000,0000,0000,,And that information is then taken Dialogue: 0,0:19:13.63,0:19:17.24,Default,,0000,0000,0000,,and analyzed using algorithms to find patterns. Dialogue: 0,0:19:17.24,0:19:21.43,Default,,0000,0000,0000,,Facebook actually records everything that you type in the status message Dialogue: 0,0:19:21.43,0:19:21.100,Default,,0000,0000,0000,,– even if you don't send it. Dialogue: 0,0:19:21.100,0:19:24.64,Default,,0000,0000,0000,,And maybe you're just thinking out loud when you're doing that. Dialogue: 0,0:19:24.64,0:19:26.82,Default,,0000,0000,0000,,You're not thinking that you're actually thinking out loud Dialogue: 0,0:19:26.82,0:19:28.56,Default,,0000,0000,0000,,in a really crowded room, Dialogue: 0,0:19:28.56,0:19:30.74,Default,,0000,0000,0000,,with everybody having a recorder on them Dialogue: 0,0:19:30.74,0:19:32.38,Default,,0000,0000,0000,,... but that's actually what you're doing. Dialogue: 0,0:19:32.38,0:19:34.08,Default,,0000,0000,0000,,I think about our right to privacy Dialogue: 0,0:19:34.08,0:19:36.60,Default,,0000,0000,0000,,in the way that I think about a lot of our other rights, Dialogue: 0,0:19:36.60,0:19:40.69,Default,,0000,0000,0000,,in that if we actually had them they would be a good start Dialogue: 0,0:19:40.69,0:19:42.11,Default,,0000,0000,0000,,... but we don't. Dialogue: 0,0:19:42.11,0:19:45.33,Default,,0000,0000,0000,,Privacy essentially is the right to keep thoughts to ourselves, Dialogue: 0,0:19:45.33,0:19:47.97,Default,,0000,0000,0000,,and the right to decide who we share them to, Dialogue: 0,0:19:47.97,0:19:49.67,Default,,0000,0000,0000,,and who can actually see them. Dialogue: 0,0:19:49.67,0:19:53.08,Default,,0000,0000,0000,,We have a guaranteed right to privacy in the US Constitution, Dialogue: 0,0:19:53.08,0:19:55.31,Default,,0000,0000,0000,,which says that the state can't just come in Dialogue: 0,0:19:55.31,0:19:58.15,Default,,0000,0000,0000,,and, like, look around at our stuff and do whatever it wants. Dialogue: 0,0:19:58.15,0:20:01.31,Default,,0000,0000,0000,,But they do. And they can. Dialogue: 0,0:20:01.31,0:20:04.16,Default,,0000,0000,0000,,Because the state has a monopoly on power. Dialogue: 0,0:20:04.16,0:20:07.73,Default,,0000,0000,0000,,Protecting your social information and your personal data Dialogue: 0,0:20:07.73,0:20:10.28,Default,,0000,0000,0000,,is also defending your self-determination. Dialogue: 0,0:20:10.28,0:20:14.09,Default,,0000,0000,0000,,There's this notion that's often used by the state and private companies Dialogue: 0,0:20:14.09,0:20:16.72,Default,,0000,0000,0000,,that if you don't have anything to hide, Dialogue: 0,0:20:16.72,0:20:18.63,Default,,0000,0000,0000,,then you don't have to worry about privacy, Dialogue: 0,0:20:18.63,0:20:21.47,Default,,0000,0000,0000,,and you don't need security... you don't need encryption. Dialogue: 0,0:20:21.47,0:20:23.83,Default,,0000,0000,0000,,If you hear anybody saying Dialogue: 0,0:20:23.83,0:20:26.91,Default,,0000,0000,0000,,“I have nothing to hide. I don't care about my privacy.” Dialogue: 0,0:20:26.91,0:20:29.34,Default,,0000,0000,0000,,I recommend asking them for their credit card information Dialogue: 0,0:20:29.34,0:20:30.72,Default,,0000,0000,0000,,or their social security number. Dialogue: 0,0:20:32.06,0:20:34.94,Default,,0000,0000,0000,,The biggest concern I have with the “I have nothing to hide” Dialogue: 0,0:20:34.94,0:20:37.90,Default,,0000,0000,0000,,is because today it seems really really easy to say it. Dialogue: 0,0:20:37.90,0:20:41.26,Default,,0000,0000,0000,,But in the past we have lived darker times. Dialogue: 0,0:20:41.26,0:20:45.28,Default,,0000,0000,0000,,And the information we provide is really really useful to hit our groups Dialogue: 0,0:20:45.28,0:20:47.40,Default,,0000,0000,0000,,... or any kind of political activity. Dialogue: 0,0:20:47.40,0:20:50.40,Default,,0000,0000,0000,,For example, surveillance cameras on universities Dialogue: 0,0:20:50.40,0:20:51.98,Default,,0000,0000,0000,,– when you face a bigger threat Dialogue: 0,0:20:51.98,0:20:56.33,Default,,0000,0000,0000,,... let's say we have a coup d'etat in my country. Dialogue: 0,0:20:56.33,0:20:59.36,Default,,0000,0000,0000,,That surveillance camera information becomes really really different Dialogue: 0,0:20:59.36,0:21:02.00,Default,,0000,0000,0000,,from having just a couple of eyes watching them. Dialogue: 0,0:21:02.00,0:21:03.66,Default,,0000,0000,0000,,What people are really saying, I think, Dialogue: 0,0:21:03.66,0:21:05.90,Default,,0000,0000,0000,,when they don't care about their right to privacy is Dialogue: 0,0:21:05.90,0:21:11.70,Default,,0000,0000,0000,,“I'm not like those bad people. I'm a good person. I'm a law-abiding citizen.” Dialogue: 0,0:21:11.70,0:21:13.20,Default,,0000,0000,0000,,Which is a meaningless concept. Dialogue: 0,0:21:13.20,0:21:14.22,Default,,0000,0000,0000,,Everybody has secrets. Dialogue: 0,0:21:14.22,0:21:16.00,Default,,0000,0000,0000,,Everybody keeps things to themselves. Dialogue: 0,0:21:16.00,0:21:19.17,Default,,0000,0000,0000,,Whether or not they like to admit it, everybody puts pants on. Dialogue: 0,0:21:19.17,0:21:24.44,Default,,0000,0000,0000,,And then we have these new tendencies Dialogue: 0,0:21:24.44,0:21:28.50,Default,,0000,0000,0000,,like the Internet Research Agency and Cambridge Analytica Dialogue: 0,0:21:28.50,0:21:31.78,Default,,0000,0000,0000,,finding ways to use our communication and social media Dialogue: 0,0:21:31.78,0:21:36.74,Default,,0000,0000,0000,,and create these fake interactions where they can quickly create a profile of us Dialogue: 0,0:21:36.74,0:21:42.01,Default,,0000,0000,0000,,– who we are, where we are in the political spectrum, what our tendencies are – Dialogue: 0,0:21:42.01,0:21:44.52,Default,,0000,0000,0000,,and try to push us in new directions. Dialogue: 0,0:21:44.52,0:21:47.21,Default,,0000,0000,0000,,And kind of control our view of the world. Dialogue: 0,0:21:47.21,0:21:49.60,Default,,0000,0000,0000,,And you know, cyber is becoming so big today. Dialogue: 0,0:21:49.60,0:21:52.92,Default,,0000,0000,0000,,It's becoming something that, a number of years ago, Dialogue: 0,0:21:52.92,0:21:55.24,Default,,0000,0000,0000,,a short number of years ago, wasn't even a word. Dialogue: 0,0:21:55.24,0:21:57.84,Default,,0000,0000,0000,,And now the cyber is so big. Dialogue: 0,0:21:57.84,0:22:00.79,Default,,0000,0000,0000,,We conduct full-spectrum military cyberspace operations Dialogue: 0,0:22:00.79,0:22:02.46,Default,,0000,0000,0000,,to enable actions in all domains, Dialogue: 0,0:22:02.46,0:22:05.86,Default,,0000,0000,0000,,ensure the US and allied freedom of action in cyberspace, Dialogue: 0,0:22:05.86,0:22:08.39,Default,,0000,0000,0000,,and deny the same to any adversaries. Dialogue: 0,0:22:08.39,0:22:11.47,Default,,0000,0000,0000,,Breaking news about Russian interference in our election. Dialogue: 0,0:22:11.47,0:22:13.62,Default,,0000,0000,0000,,FBI now investigating Vladimir Putin. Dialogue: 0,0:22:13.62,0:22:16.94,Default,,0000,0000,0000,,And as President Obama promises to retaliate for the cyber attack, Dialogue: 0,0:22:16.94,0:22:19.42,Default,,0000,0000,0000,,the Russian President continues to deny he ordered it. Dialogue: 0,0:22:22.29,0:22:23.92,Default,,0000,0000,0000,,Cyber warfare is really cheap. Dialogue: 0,0:22:23.92,0:22:25.92,Default,,0000,0000,0000,,It requires very little equipment. Dialogue: 0,0:22:25.92,0:22:29.53,Default,,0000,0000,0000,,It's very quiet. It's easily deniable. Dialogue: 0,0:22:29.53,0:22:34.03,Default,,0000,0000,0000,,And so it becomes a really powerful tool for state actors and corporations to use, Dialogue: 0,0:22:34.03,0:22:37.20,Default,,0000,0000,0000,,because it's very easy for them to just brush it off after Dialogue: 0,0:22:37.20,0:22:39.96,Default,,0000,0000,0000,,and say “we never did this” or “we don't know who did this.” Dialogue: 0,0:22:42.32,0:22:45.80,Default,,0000,0000,0000,,Nation states are actively at cyber war with each other. Dialogue: 0,0:22:45.80,0:22:48.93,Default,,0000,0000,0000,,They each have their own dedicated cyber armies Dialogue: 0,0:22:48.93,0:22:52.42,Default,,0000,0000,0000,,for purposes of espionage, for purposes of sabotage. Dialogue: 0,0:22:52.42,0:22:54.49,Default,,0000,0000,0000,,It goes from intelligence gathering Dialogue: 0,0:22:54.49,0:22:57.98,Default,,0000,0000,0000,,to, really, destroying nuclear programs - as they've done in Iran. Dialogue: 0,0:22:57.98,0:23:00.73,Default,,0000,0000,0000,,And probably a whole bunch of other things we don't know about. Dialogue: 0,0:23:00.73,0:23:03.49,Default,,0000,0000,0000,,Because they are so secretive... because they're so easy to hide. Dialogue: 0,0:23:03.49,0:23:08.43,Default,,0000,0000,0000,,Everything run by a state in this area is run in a very military, Dialogue: 0,0:23:08.43,0:23:09.98,Default,,0000,0000,0000,,or corporate way. Dialogue: 0,0:23:09.98,0:23:13.50,Default,,0000,0000,0000,,There are people, y'know, doing shift work. Dialogue: 0,0:23:13.50,0:23:16.87,Default,,0000,0000,0000,,There are very clear plans and strategies. Dialogue: 0,0:23:16.87,0:23:22.51,Default,,0000,0000,0000,,Which means that they'll be working more efficiently towards an actual goal. Dialogue: 0,0:23:22.51,0:23:26.65,Default,,0000,0000,0000,,The state can also use all of these techniques that it's developed Dialogue: 0,0:23:26.65,0:23:28.72,Default,,0000,0000,0000,,against the civilian population. Dialogue: 0,0:23:28.72,0:23:31.32,Default,,0000,0000,0000,,Against any actors it feels are a threat. Dialogue: 0,0:23:31.32,0:23:34.08,Default,,0000,0000,0000,,Since hacking and compromising someone digitally Dialogue: 0,0:23:34.08,0:23:36.52,Default,,0000,0000,0000,,is such an abstract thing, Dialogue: 0,0:23:36.52,0:23:41.47,Default,,0000,0000,0000,,it will probably be easier to pull the trigger on someone, Dialogue: 0,0:23:41.47,0:23:46.06,Default,,0000,0000,0000,,even if you're not exactly sure they're the person you're looking for. Dialogue: 0,0:23:46.06,0:23:47.88,Default,,0000,0000,0000,,This isn't like conventional warfare either. Dialogue: 0,0:23:47.88,0:23:50.92,Default,,0000,0000,0000,,They can act in a way that obscures the origins of the attack, Dialogue: 0,0:23:50.92,0:23:53.63,Default,,0000,0000,0000,,and they're not held to any kind of standards of transparency Dialogue: 0,0:23:53.63,0:23:55.67,Default,,0000,0000,0000,,or accountability on the world stage. Dialogue: 0,0:23:55.67,0:23:57.78,Default,,0000,0000,0000,,If we're talking about a government that has no problems Dialogue: 0,0:23:57.78,0:24:00.36,Default,,0000,0000,0000,,sending drones into a country, I mean... obviously they're not going to Dialogue: 0,0:24:00.36,0:24:03.90,Default,,0000,0000,0000,,feel any need to have to answer to their hacking activities. Dialogue: 0,0:24:03.90,0:24:05.57,Default,,0000,0000,0000,,It's very likely that we'll see a rise Dialogue: 0,0:24:05.57,0:24:10.01,Default,,0000,0000,0000,,in groups using cyber-warfare to advance their own political gains, Dialogue: 0,0:24:10.01,0:24:12.13,Default,,0000,0000,0000,,or to counter-attack repression. Dialogue: 0,0:24:14.76,0:24:17.36,Default,,0000,0000,0000,,It’s often said that there’s no such thing as perfect security. Dialogue: 0,0:24:17.36,0:24:19.74,Default,,0000,0000,0000,,All systems contain potential vulnerabilities Dialogue: 0,0:24:19.74,0:24:22.66,Default,,0000,0000,0000,,that can be exploited by determined and capable adversaries. Dialogue: 0,0:24:22.66,0:24:24.98,Default,,0000,0000,0000,,And when you choose to go up against the state, Dialogue: 0,0:24:24.98,0:24:27.16,Default,,0000,0000,0000,,you’ve chosen an adversary that is both. Dialogue: 0,0:24:27.16,0:24:31.67,Default,,0000,0000,0000,,Dozens of FBI agents targeted alleged members of a loose-knit hacking group. Dialogue: 0,0:24:31.67,0:24:35.12,Default,,0000,0000,0000,,Armed with search warrants, agents hit six homes in New York, Dialogue: 0,0:24:35.12,0:24:37.42,Default,,0000,0000,0000,,along with locations across the country. Dialogue: 0,0:24:37.42,0:24:40.10,Default,,0000,0000,0000,,The best we can do is develop security protocols Dialogue: 0,0:24:40.10,0:24:42.12,Default,,0000,0000,0000,,that are adequate for the task at hand. Dialogue: 0,0:24:42.12,0:24:44.62,Default,,0000,0000,0000,,This means being constantly aware of the risks involved Dialogue: 0,0:24:44.62,0:24:46.58,Default,,0000,0000,0000,,with the actions that we carry out, Dialogue: 0,0:24:46.58,0:24:49.67,Default,,0000,0000,0000,,and understanding what steps that we can take to mitigate those risks. Dialogue: 0,0:24:49.67,0:24:51.49,Default,,0000,0000,0000,,When it comes to communication, Dialogue: 0,0:24:51.49,0:24:54.00,Default,,0000,0000,0000,,this means using methods and tools that are available Dialogue: 0,0:24:54.00,0:24:56.48,Default,,0000,0000,0000,,to thwart interception and mass data collection Dialogue: 0,0:24:56.48,0:24:59.28,Default,,0000,0000,0000,,... in order to at least make things as difficult and expensive Dialogue: 0,0:24:59.28,0:25:01.06,Default,,0000,0000,0000,,for our enemies as possible. Dialogue: 0,0:25:01.51,0:25:04.30,Default,,0000,0000,0000,,How would they tell you to access the material on this phone? Dialogue: 0,0:25:04.30,0:25:07.35,Default,,0000,0000,0000,,I think they would say what they've said, Dialogue: 0,0:25:07.35,0:25:08.77,Default,,0000,0000,0000,,which I believe is in good faith. Dialogue: 0,0:25:08.77,0:25:11.94,Default,,0000,0000,0000,,That we have designed this in response to what we believe to be Dialogue: 0,0:25:11.94,0:25:16.85,Default,,0000,0000,0000,,the demands of our customers to be immune to any government warrant, Dialogue: 0,0:25:16.85,0:25:20.26,Default,,0000,0000,0000,,or our (the manufacturer's) efforts to get into that phone. Dialogue: 0,0:25:20.49,0:25:23.59,Default,,0000,0000,0000,,It’s also important to remember that this truth cuts both ways. Dialogue: 0,0:25:23.59,0:25:26.74,Default,,0000,0000,0000,,As infallible as the systems of social control may appear, Dialogue: 0,0:25:26.74,0:25:29.71,Default,,0000,0000,0000,,they too have vulnerabilities that are just waiting to be exploited Dialogue: 0,0:25:29.71,0:25:31.90,Default,,0000,0000,0000,,by determined and capable adversaries. Dialogue: 0,0:25:31.90,0:25:33.93,Default,,0000,0000,0000,,Let’s hope we can rise to the challenge. Dialogue: 0,0:25:34.91,0:25:38.80,Default,,0000,0000,0000,,Someone has broken into the national bank – the Federal Reserve. Dialogue: 0,0:25:38.80,0:25:43.86,Default,,0000,0000,0000,,A Twenty-First Century thief breaking into files, not into metal safes. Dialogue: 0,0:25:43.86,0:25:47.48,Default,,0000,0000,0000,,I think there's a lot of interesting things Dialogue: 0,0:25:47.48,0:25:50.30,Default,,0000,0000,0000,,that anarchist or anti-fascist collectives Dialogue: 0,0:25:50.30,0:25:52.66,Default,,0000,0000,0000,,could do with hacking for their movements. Dialogue: 0,0:25:52.66,0:25:55.09,Default,,0000,0000,0000,,But something I think is more interesting to me is: Dialogue: 0,0:25:55.09,0:25:57.89,Default,,0000,0000,0000,,how can we use technology, Dialogue: 0,0:25:57.89,0:26:00.86,Default,,0000,0000,0000,,and use hacking skills to come up with new ways Dialogue: 0,0:26:00.86,0:26:04.44,Default,,0000,0000,0000,,to connect to each other, in a global movement Dialogue: 0,0:26:04.44,0:26:08.09,Default,,0000,0000,0000,,where we can come to agreements together in a way that's safe Dialogue: 0,0:26:08.09,0:26:09.59,Default,,0000,0000,0000,,... that doesn't expose us, Dialogue: 0,0:26:09.59,0:26:12.10,Default,,0000,0000,0000,,that doesn't put us at risk of surveillance? Dialogue: 0,0:26:12.10,0:26:16.44,Default,,0000,0000,0000,,We should begin with the assumption that the Internet is hostile territory. Dialogue: 0,0:26:16.44,0:26:18.43,Default,,0000,0000,0000,,It's an ongoing state of war. Dialogue: 0,0:26:18.43,0:26:22.61,Default,,0000,0000,0000,,Military and law enforcement are using it as a tool for social control. Dialogue: 0,0:26:22.61,0:26:24.15,Default,,0000,0000,0000,,But it doesn't have to be this way. Dialogue: 0,0:26:24.15,0:26:26.75,Default,,0000,0000,0000,,And hackers and activists, we could use it to undermine Dialogue: 0,0:26:26.75,0:26:28.53,Default,,0000,0000,0000,,and subvert these systems of power. Dialogue: 0,0:26:28.53,0:26:30.97,Default,,0000,0000,0000,,We could create secure communication networks Dialogue: 0,0:26:30.97,0:26:33.28,Default,,0000,0000,0000,,to coordinate the next big demonstration. Dialogue: 0,0:26:33.28,0:26:37.50,Default,,0000,0000,0000,,But you certainly would have to be aware of encryption, Dialogue: 0,0:26:37.50,0:26:41.31,Default,,0000,0000,0000,,of using proxy servers... of using software like Tor. Dialogue: 0,0:26:41.31,0:26:42.60,Default,,0000,0000,0000,,You have to be able to protect yourself. Dialogue: 0,0:26:42.60,0:26:44.89,Default,,0000,0000,0000,,Because if not, they're going to use it against us. Dialogue: 0,0:26:44.89,0:26:49.31,Default,,0000,0000,0000,,I think the first step for any radical to protect themselves on the Internet Dialogue: 0,0:26:49.31,0:26:51.51,Default,,0000,0000,0000,,is to understand their threat model. Dialogue: 0,0:26:51.51,0:26:54.88,Default,,0000,0000,0000,,There's a really great resources that the Electronic Frontier Foundation has Dialogue: 0,0:26:54.88,0:26:57.81,Default,,0000,0000,0000,,on figuring out your threat model. Dialogue: 0,0:26:57.81,0:27:00.73,Default,,0000,0000,0000,,And they cover a lot of what you need to be thinking about with these things. Dialogue: 0,0:27:00.73,0:27:06.73,Default,,0000,0000,0000,,There's this software called Tor that is very good to anonymize yourself Dialogue: 0,0:27:06.73,0:27:09.46,Default,,0000,0000,0000,,if you want to do something over the Internet. Dialogue: 0,0:27:09.46,0:27:13.10,Default,,0000,0000,0000,,People are recommending a messaging app for cell phones named Signal. Dialogue: 0,0:27:13.10,0:27:18.54,Default,,0000,0000,0000,,The Tor browser, which when you install it and when you start it up, Dialogue: 0,0:27:18.54,0:27:22.88,Default,,0000,0000,0000,,it sets up a connection to a decentralized network. Dialogue: 0,0:27:22.88,0:27:26.57,Default,,0000,0000,0000,,And then your communication will go via this network Dialogue: 0,0:27:26.57,0:27:28.19,Default,,0000,0000,0000,,in a number of different hops, Dialogue: 0,0:27:28.19,0:27:30.96,Default,,0000,0000,0000,,so that if you're browsing to a website, Dialogue: 0,0:27:30.96,0:27:34.85,Default,,0000,0000,0000,,it's not possible for that website to actually tell where you're coming from. Dialogue: 0,0:27:34.85,0:27:37.61,Default,,0000,0000,0000,,One of the most important things that we really need to do Dialogue: 0,0:27:37.61,0:27:39.64,Default,,0000,0000,0000,,is segment our identities online. Dialogue: 0,0:27:39.64,0:27:41.74,Default,,0000,0000,0000,,And so don't re-use identities. Dialogue: 0,0:27:41.74,0:27:43.42,Default,,0000,0000,0000,,Don't make them last for a long time. Dialogue: 0,0:27:43.42,0:27:46.42,Default,,0000,0000,0000,,You might have a public identity, which you carefully curate,. Dialogue: 0,0:27:46.42,0:27:49.22,Default,,0000,0000,0000,,and then create yourself new identities to really target Dialogue: 0,0:27:49.22,0:27:52.63,Default,,0000,0000,0000,,special operations that you wanna do. Dialogue: 0,0:27:52.63,0:27:56.33,Default,,0000,0000,0000,,Special events that happen... if there's some protest that's going on, Dialogue: 0,0:27:56.33,0:27:57.83,Default,,0000,0000,0000,,maybe make a new identity. Dialogue: 0,0:27:57.83,0:27:59.33,Default,,0000,0000,0000,,It makes things a little bit difficult Dialogue: 0,0:27:59.33,0:28:01.68,Default,,0000,0000,0000,,because we do tend to operate on a trust basis, Dialogue: 0,0:28:01.68,0:28:03.71,Default,,0000,0000,0000,,and you need to re-build these connections. Dialogue: 0,0:28:03.71,0:28:07.33,Default,,0000,0000,0000,,But definitely it's the only way to make sure that you stay protected Dialogue: 0,0:28:07.33,0:28:11.47,Default,,0000,0000,0000,,If you have for some reason linked Dialogue: 0,0:28:11.47,0:28:16.54,Default,,0000,0000,0000,,your regular identity with your Internet persona, Dialogue: 0,0:28:16.54,0:28:19.50,Default,,0000,0000,0000,,it's going to bring problems if some sort of neo-nazi Dialogue: 0,0:28:19.50,0:28:24.30,Default,,0000,0000,0000,,wants to publish that information on a board or whatever. Dialogue: 0,0:28:24.30,0:28:29.89,Default,,0000,0000,0000,,Within the hacker community there's a strong ethos of shutting the hell up. Dialogue: 0,0:28:29.89,0:28:31.55,Default,,0000,0000,0000,,Don't talk about things that you've done. Dialogue: 0,0:28:31.55,0:28:36.21,Default,,0000,0000,0000,,And it comes back to this idea that your identity is really not that important. Dialogue: 0,0:28:36.21,0:28:39.86,Default,,0000,0000,0000,,Forget the fame.... do it for the actual purpose of the thing you wanna do. Dialogue: 0,0:28:39.86,0:28:44.41,Default,,0000,0000,0000,,But don't actually care about whether or not people will know that it's you. Dialogue: 0,0:28:44.41,0:28:46.31,Default,,0000,0000,0000,,Don't tell your friends... don't talk. Dialogue: 0,0:28:46.31,0:28:47.33,Default,,0000,0000,0000,,Shut the hell up. Dialogue: 0,0:28:47.33,0:28:50.82,Default,,0000,0000,0000,,Use really strong passwords, and a password manager. Dialogue: 0,0:28:50.82,0:28:53.83,Default,,0000,0000,0000,,That's a really typical avenue that doxxing happens through, Dialogue: 0,0:28:53.83,0:28:57.81,Default,,0000,0000,0000,,is just people finding your simple password and gaining access to your accounts. Dialogue: 0,0:28:57.81,0:29:02.11,Default,,0000,0000,0000,,Use two-factor authentication on all accounts that you can. Dialogue: 0,0:29:02.11,0:29:04.46,Default,,0000,0000,0000,,If you're trying to learn how to hack, Dialogue: 0,0:29:04.46,0:29:06.44,Default,,0000,0000,0000,,you are going to have to learn how to program. Dialogue: 0,0:29:06.44,0:29:07.99,Default,,0000,0000,0000,,How to computer program. Dialogue: 0,0:29:07.99,0:29:11.63,Default,,0000,0000,0000,,And if you can learn how to develop websites and run servers, Dialogue: 0,0:29:11.63,0:29:16.09,Default,,0000,0000,0000,,you could look at other people's code and spot the mistakes that they've made Dialogue: 0,0:29:16.09,0:29:18.68,Default,,0000,0000,0000,,that allow you to exploit and leverage that vulnerability. Dialogue: 0,0:29:18.68,0:29:22.29,Default,,0000,0000,0000,,Re-install your computer as often as you can. Dialogue: 0,0:29:22.29,0:29:25.34,Default,,0000,0000,0000,,Try out new operating systems. Dialogue: 0,0:29:25.34,0:29:27.12,Default,,0000,0000,0000,,If you've never used Linux, install it. Dialogue: 0,0:29:27.12,0:29:31.37,Default,,0000,0000,0000,,If you've used Linux before, install a new distribution of Linux. Dialogue: 0,0:29:31.37,0:29:35.04,Default,,0000,0000,0000,,If you've always used Mac OS, maybe try Windows. Dialogue: 0,0:29:35.04,0:29:38.11,Default,,0000,0000,0000,,Just try new things and don't be afraid to break it, Dialogue: 0,0:29:38.11,0:29:40.06,Default,,0000,0000,0000,,because in the end if the computer breaks Dialogue: 0,0:29:40.06,0:29:42.77,Default,,0000,0000,0000,,you can always just reinstall the operating system. Dialogue: 0,0:29:42.77,0:29:46.99,Default,,0000,0000,0000,,Try the different tutorials you can find on Kali Linux, Dialogue: 0,0:29:46.99,0:29:48.91,Default,,0000,0000,0000,,and really try and attack your own system. Dialogue: 0,0:29:48.91,0:29:52.11,Default,,0000,0000,0000,,Try to think outside the box. Dialogue: 0,0:29:52.11,0:29:55.19,Default,,0000,0000,0000,,In that way, y'know, hacking is a lot like anarchy Dialogue: 0,0:29:55.19,0:29:56.92,Default,,0000,0000,0000,,– things are what you make of it. Dialogue: 0,0:29:56.92,0:30:03.58,Default,,0000,0000,0000,,It's not only about us getting more involved in technology and using technology. Dialogue: 0,0:30:03.58,0:30:06.18,Default,,0000,0000,0000,,We also have to bring the politics to technology. Dialogue: 0,0:30:06.18,0:30:11.46,Default,,0000,0000,0000,,We have to connect with the spaces where free software is being developed Dialogue: 0,0:30:11.46,0:30:14.94,Default,,0000,0000,0000,,and make our politics a part of that space. Dialogue: 0,0:30:14.94,0:30:17.54,Default,,0000,0000,0000,,And I think that's something that's happening, right? Dialogue: 0,0:30:17.54,0:30:21.12,Default,,0000,0000,0000,,We can see that in a lot of the free software communities. Dialogue: 0,0:30:21.12,0:30:22.86,Default,,0000,0000,0000,,But it's something we need more of. Dialogue: 0,0:30:22.86,0:30:25.90,Default,,0000,0000,0000,,Decentralized, ideologically-driven hacker collectives, Dialogue: 0,0:30:25.90,0:30:29.38,Default,,0000,0000,0000,,if we unite our efforts we could – without any resources whatsoever – Dialogue: 0,0:30:29.38,0:30:32.21,Default,,0000,0000,0000,,we could dismantle a corporation, humiliate a politician. Dialogue: 0,0:30:32.21,0:30:34.84,Default,,0000,0000,0000,,And independent hackers, we have the advantage Dialogue: 0,0:30:34.84,0:30:37.08,Default,,0000,0000,0000,,since we're not doing it for a paycheck. Dialogue: 0,0:30:37.08,0:30:40.56,Default,,0000,0000,0000,,We're not doing it for any kind of allegiance to a country. Dialogue: 0,0:30:40.56,0:30:42.03,Default,,0000,0000,0000,,We're up all night. Dialogue: 0,0:30:42.03,0:30:44.10,Default,,0000,0000,0000,,We're breaking into systems because we love it. Dialogue: 0,0:30:44.10,0:30:46.90,Default,,0000,0000,0000,,Because the thrill of breaking into anything that they can build Dialogue: 0,0:30:46.90,0:30:51.92,Default,,0000,0000,0000,,while being able to undermine their systems of control is a better driver, Dialogue: 0,0:30:51.92,0:30:56.77,Default,,0000,0000,0000,,a better incentive for hackers than a paycheck... or America. Dialogue: 0,0:30:56.77,0:30:58.31,Default,,0000,0000,0000,,If you take the offensive and hack, Dialogue: 0,0:30:58.31,0:31:01.07,Default,,0000,0000,0000,,expose and destroy these systems of the rich and powerful, Dialogue: 0,0:31:01.07,0:31:02.61,Default,,0000,0000,0000,,we could drive them offline. Dialogue: 0,0:31:02.61,0:31:06.71,Default,,0000,0000,0000,,Hack the planet! Hack the planet! Dialogue: 0,0:31:09.87,0:31:12.02,Default,,0000,0000,0000,,As a deepening awareness has emerged of the role Dialogue: 0,0:31:12.02,0:31:16.04,Default,,0000,0000,0000,,that Russian hackers played in swaying the 2016 US Presidential election, Dialogue: 0,0:31:16.04,0:31:18.56,Default,,0000,0000,0000,,and facebook has been pressured to release information Dialogue: 0,0:31:18.56,0:31:21.52,Default,,0000,0000,0000,,on the Kremlin’s widespread usage of its targeted ads function Dialogue: 0,0:31:21.52,0:31:22.98,Default,,0000,0000,0000,,as a means of exacerbating tensions Dialogue: 0,0:31:22.98,0:31:25.70,Default,,0000,0000,0000,,and sewing political discord among the American public, Dialogue: 0,0:31:25.70,0:31:27.97,Default,,0000,0000,0000,,hacking has moved from the margins of popular culture Dialogue: 0,0:31:27.97,0:31:30.24,Default,,0000,0000,0000,,to the center of mainstream political discourse. Dialogue: 0,0:31:30.24,0:31:33.28,Default,,0000,0000,0000,,If our movements of resistance have any hope of remaining relevant Dialogue: 0,0:31:33.28,0:31:35.30,Default,,0000,0000,0000,,in this rapidly shifting political climate, Dialogue: 0,0:31:35.30,0:31:38.00,Default,,0000,0000,0000,,it is vitally important that we understand the ways in which Dialogue: 0,0:31:38.00,0:31:40.93,Default,,0000,0000,0000,,power is restructuring itself in our current digital age, Dialogue: 0,0:31:40.93,0:31:43.25,Default,,0000,0000,0000,,and adapt our theory and practice accordingly. Dialogue: 0,0:31:43.25,0:31:45.84,Default,,0000,0000,0000,,So at this point, we’d like to remind you Dialogue: 0,0:31:45.84,0:31:47.79,Default,,0000,0000,0000,,that Trouble is intended to be watched in groups, Dialogue: 0,0:31:47.79,0:31:51.41,Default,,0000,0000,0000,,and to be used as a resource to promote discussion and collective organizing. Dialogue: 0,0:31:51.41,0:31:53.96,Default,,0000,0000,0000,,Are you interested in upping your digital security, Dialogue: 0,0:31:53.96,0:31:56.44,Default,,0000,0000,0000,,or exploring the ways in which you can better incorporate Dialogue: 0,0:31:56.44,0:31:59.69,Default,,0000,0000,0000,,an offensive online strategy to your organizing campaigns? Dialogue: 0,0:31:59.69,0:32:01.79,Default,,0000,0000,0000,,Consider getting together with some comrades, Dialogue: 0,0:32:01.79,0:32:04.76,Default,,0000,0000,0000,,screening this film, discussing how this might be done, Dialogue: 0,0:32:04.76,0:32:07.56,Default,,0000,0000,0000,,and possibly pairing it with an info-session on how to use Tor, Dialogue: 0,0:32:07.56,0:32:10.40,Default,,0000,0000,0000,,and how to encrypt your communication devices. Dialogue: 0,0:32:10.40,0:32:13.64,Default,,0000,0000,0000,,Interested in running regular screenings of Trouble at your campus, Dialogue: 0,0:32:13.64,0:32:15.54,Default,,0000,0000,0000,,infoshop, community center, Dialogue: 0,0:32:15.54,0:32:17.57,Default,,0000,0000,0000,,or even just at your home with friends? Dialogue: 0,0:32:17.57,0:32:18.98,Default,,0000,0000,0000,,Become a Trouble-Maker! Dialogue: 0,0:32:18.98,0:32:22.83,Default,,0000,0000,0000,,For 10 bucks a month, we’ll hook you up with an advanced copy of the show Dialogue: 0,0:32:22.83,0:32:25.23,Default,,0000,0000,0000,,and a screening kit featuring additional resources Dialogue: 0,0:32:25.23,0:32:27.67,Default,,0000,0000,0000,,and some questions you can use to get a discussion going. Dialogue: 0,0:32:27.67,0:32:30.87,Default,,0000,0000,0000,,If you can’t afford to support us financially, no worries! Dialogue: 0,0:32:30.87,0:32:34.81,Default,,0000,0000,0000,,You can stream and/or download all our content for free off our website Dialogue: 0,0:32:36.71,0:32:40.69,Default,,0000,0000,0000,,If you’ve got any suggestions for show topics, or just want to get in touch, Dialogue: 0,0:32:40.69,0:32:43.25,Default,,0000,0000,0000,,drop us a line at trouble@sub.media. Dialogue: 0,0:32:43.25,0:32:45.44,Default,,0000,0000,0000,,We’d like to remind you that our fundraiser Dialogue: 0,0:32:45.44,0:32:47.91,Default,,0000,0000,0000,,to grow our subMedia collective is still ongoing. Dialogue: 0,0:32:47.91,0:32:50.07,Default,,0000,0000,0000,,We will be doing one final push in December, Dialogue: 0,0:32:50.07,0:32:52.54,Default,,0000,0000,0000,,and hope to reach our goals by the end of the year. Dialogue: 0,0:32:52.54,0:32:56.39,Default,,0000,0000,0000,,To help make sure this happens, go to sub.media/donate Dialogue: 0,0:32:56.39,0:32:59.63,Default,,0000,0000,0000,,and become a monthly sustainer for as little as $2 per month. Dialogue: 0,0:32:59.63,0:33:02.59,Default,,0000,0000,0000,,As always, we’re excited to see that people have been Dialogue: 0,0:33:02.59,0:33:04.46,Default,,0000,0000,0000,,supporting and screening our work, Dialogue: 0,0:33:04.46,0:33:06.89,Default,,0000,0000,0000,,and wanna give a big shout out to new troublemaker chapters Dialogue: 0,0:33:06.89,0:33:10.86,Default,,0000,0000,0000,,in Vancouver, Prince George, Seattle, Bloomington, Brighton, Dialogue: 0,0:33:10.86,0:33:13.91,Default,,0000,0000,0000,,Ithaca, Quebec City, Prescott and Edinburgh. Dialogue: 0,0:33:13.91,0:33:16.01,Default,,0000,0000,0000,,If you’ve been organizing screenings in your town Dialogue: 0,0:33:16.01,0:33:18.29,Default,,0000,0000,0000,,and we haven’t given you a shout-out, let us know! Dialogue: 0,0:33:18.29,0:33:21.13,Default,,0000,0000,0000,,We will be taking the month of December off, Dialogue: 0,0:33:21.13,0:33:23.04,Default,,0000,0000,0000,,and will be back with a fresh season of Trouble, Dialogue: 0,0:33:23.04,0:33:26.69,Default,,0000,0000,0000,,plus a ton of fresh new subMedia content, starting in January. Dialogue: 0,0:33:26.69,0:33:30.50,Default,,0000,0000,0000,,This episode would not have been possible without the generous support of Dialogue: 0,0:33:30.50,0:33:34.24,Default,,0000,0000,0000,,Nicholas, Josh, Avispa Midia, Peter and Biella. Dialogue: 0,0:33:34.24,0:33:36.63,Default,,0000,0000,0000,,Now get out there, and make some trouble!