Greetings Troublemakers... welcome to Trouble.
My name is not important.
At 10:30pm on October 29th, 1969,
Charlie Kline, a student programer at UCLA,
successfully sent the first digital message
from one computer terminal to another via the DARPANET,
a top-secret research project
run by the US Department of Defense.
The transmission of this single word, 'login'
was a pivotal moment in human history,
as it represents the official birth of the Internet.
And it was from here that the first message was sent.
A revolution began!
In the nearly fifty years that have followed,
this invention has thoroughly transformed our world
and come to dominate virtually all aspects of our lives.
It has restructured and rejuvenated capitalism,
by revolutionizing finance and transforming the globe
into a single interconnected marketplace.
It has provided new methods of interacting with one another
and helped shape the ways that we receive and process information.
And it has provided a place for people to upload
terabytes of videos of their cats.
This is pinky... he's a male. He's available for adoption.
He's pet of the week.
The Internet has also become the central pillar
of a new form of social control
based around mass data collection
and the construction of algorithms
aimed at better predicting and manipulating human behavior.
But while states and digital capitalists have used the Internet
as a platform for mass surveillance and pacification,
it has also been a site of subversion
and created new possibilities
for decentralized attacks on the dominant order.
We've got a problem.
What?
Someone synched a RAT to one of my servers.
A remote access tool – we're being hacked!
On the front-lines of this war are hackers.
Those who use curiosity, programming skills and problem solving
to unlock closed systems and bend powerful forces to their will.
Over the next thirty minutes,
we'll share the voices of a number of these individuals
as they share their experiences of defacing web sites,
leaking emails, developing tools to thwart digital surveillance
... and making a whole lot of trouble.
Hacking is one of those terms that I think has become
a little bit nebulous.
I would define it as using technology in a way that wasn't intended,
by finding bugs and oversights in designs
to make it produce results that were never supposed to happen.
Creative subversion of technical systems.
You take software and you modify it to get another result.
For example, accessing information on a system
that you shouldn't be able to access.
Or making the system do something that it shouldn't be able to do
– or that you shouldn't be able to make it do.
There's a lot of different definitions of hacking, depending on who you ask.
US criminal law defines computer hacking as unauthorized access
to obtain information, transmitting destructive code, etc.
I mean, they've basically expanded the definition
in their ongoing efforts to criminalize everyday Internet activity.
If you ask someone like Richard Stallman,
he'll tell you that it's really just a creative solution to a problem.
But hackers also do like to break into systems.
There are all kinds of systems,
and there's all kinds of access
and all kinds of ways to gain access.
Some hackers choose to fix and protect these systems.
They work for the government, Microsoft etc.
They call themselves White Hats.
They're not even really hackers.
They're seen in the hacking scene as sellouts.
They do it for the paycheck... or maybe because of the flag.
But there are those, of course, who don't don't it for employment.
They don't do it for a paycheck,
they do it for the love of solving complex puzzles.
For the thrill of breaking into whatever artificial borders
that these people decide to erect.
Everything that's built can be broken.
I don't think hacking has changed all that much in the last few years.
What really has changed is the scope
of things that can be affected with hacking.
Before, in the 90's, most of it was just practical jokes
because none of it had a lot of impact on real life.
And in popular culture,
you start to have hackers appear in movies, in television series,
where there's this whole figure of these hackers
that have these super powers.
That can invade computer systems in any way, shape or form.
There's a new virus in the database.
What's happening?
It's replicating... eating up memory.... uhh, what do I do?
Type 'cookie' you idiot!
Then it gets a lot more popularized.
Since the dot-com boom at the end of the 90's,
things now have a huge impact
and everything tends to be connected to the Internet,
or some sort of network.
As digital information networks have evolved,
a lot of personal information is being stored.
Y'know, big data corporations and industries are relying on computers
... so hackers have access to this kind of information
that these big companies have as well.
Hacking can be very simple and very complex.
But most times hacking is very simple.
By supplying input in a certain way,
you're able to make the back-end system
believe that what you're supplying
is actually part of its own code.
Which, in a lot of cases, can give you full access to that system.
That's not just limited to computers or telecommunication systems.
We can really kind of apply this idea to all kinds of technical systems.
So, for example, something like social engineering
is a human form of hacking.
Y'know, you can pretend to be somebody that you're not
and ask another person questions about themselves
in order to get them to reveal private information.
It's possible that there is software
in theory that doesn't have vulnerabilities.
But in practice, that's impossible to have.
If an application or a system
performs queries to a database based on your input,
you could possibly alter your input
to be able to then alter the database query,
and possibly gain access to information that you shouldn't be able to.
Mostly what an exploit does,
it's a small tool that you run to get access to a special sector
of the software you want to get.
A lot of exploits and vulnerabilities are discussed publicly
and being used in the wild.
If you pay attention to lists like Full Disclosure or Security Focus,
they'll tell you some of the latest tricks that are being used.
Of course, those are the ones that are already publicly known,
and that the vendors have often already released patches
... but a lot of companies don't always patch.
They're not as on-top of it as they'd like to think that they are.
For example, the Equifax hacks a couple of weeks ago
was running outdated versions of Apache software.
Most people don't really do updates regularly.
So most people will actually get hacked by something very simple.
Denial of service attacks
... basically coming up with ways to create an enormous amount
of traffic to your server,
to the point where it can't continue to provide those services.
There's such a thing as Distributed Denial of Service attacks,
where that traffic is coming from many places at the same time.
The most serious techniques are what they call 'undisclosed vulnerabilities',
what they call a 'zero day.'
When someone discovers a vulnerability, and instead of reporting it
– which is the White Hat way –
they continue using it privately.
And they don't report it publicly,
so that way there's no way for anyone to
really adequately protect themselves against it.
I think a useful way to think about this is
that the Internet is a really hostile place.
It was never designed with privacy or security in mind.
State actors and corporations control the entire thing.
And so when you talk about their ability to exploit it
... I mean, to me, so many of the basic services that we use
on the Internet are exploitative
without thinking about a hacker getting into it,
or malware or something like that.
State actors like the US government
have the ability to observe all Internet traffic in real time,
collect it and store it,
and then use it later at their discretion.
And they work very closely with the digital capitalists
– facebook, google and all these other entities
– who are already storing that information anyway.
The Internet has long been a tool used by social movements
of various political stripes,
both as a means of disseminating information
and a fertile ground for recruitment.
Back in the 1990's, the anti-globalization movement
arose alongside the open-media publishing platform, Indymedia,
which allowed for the virtual coordination of many localized fronts
in the global fight against neoliberal capitalism.
I need 50,000 people.
50,000? You're gonna have to give me some time.
And drums.
You want drums? OK, I can do that.
And what about the Italians?
The Italians? Man, they're stuck on the border.
They're gonna be with you tomorrow.
And the black bloc?
The black bloc are already there.
You're gonna see black and red like there ain't no tomorrow, kid.
You just sit tight.
These days, social media platforms like facebook
have given rise to a new form of online activity known as 'clicktivism',
in which likes, shares and the signing of online petitions
have become a popular way for liberals and so-called 'progressives'
to project an image of ostensible participation
in campaigns centered around a variety of social justice-related issues,
and often masking their lack of participation in real world struggles.
Real change requires real action.
That’s why I always share political articles on facebook,
whenever I see them.
But not everyone has been lulled into this comforting delusion
of how social change works.
On both sides of the political spectrum,
groups and individuals have continued
to use the Internet pragmatically,
both to spread their ideologies and coordinate their IRL activities.
Anonymous is a decentralized network of hackers and activists
that exist in places like IRC and Twitter,
and anyone is free to become Anonymous
and start their own operations within the network.
It's kinda similar to the black bloc tactic
used as cover and collective identity.
I'm doing ten years in the fence for computer hacking charges
related to my involvement in Anonymous.
I was hacking police departments, military contractors
... defacing their websites,
releasing their emails and databases to the public.
One of the bigger targets was a company known as Strategic Forecasting
– Stratfor – which is a private intelligence firm
made up of mostly former State Department and CIA agents.
We took down their websites.
We went on donation sprees with all their clients' credit cards,
and gave their email archives to Wikileaks.
And Wikileaks pubished them,
showed that they had been spying on activist groups
on behalf of corporations like Dow Chemical.
Groups like Anonymous got really really famous defacing websites.
Other groups attacked police websites,
getting all the data they have about current police members.
There's also groups that were blocking huge institutions,
like credit card companies or banks.
If they block their transactions, they lose money.
So there's a bunch of stuff you can do with hacking.
Anonymous, they were really famous for
really getting that kind of popular participation in a hacking movement
that really didn't mean you had to be an expert to use it.
You could download a piece of software,
and you could just run it on your computer
and you would enter in the target URL
and you could begin to participate
in what was effectively like a virtual sit-in.
Now as far as Anonymous, or hacktivists in general
playing a role in revolutionary movements...
Anonymous was very active during
Occupy Wall Street and the Arab Spring.
In general, an overall revolutionary strategy
benefits from a diversity of tactics.
Multiple attacks converging from all angles,
including street protests, to smashed windows, to hacked websites.
So Anonymous, y'know, revealing scandalous personal information
on individuals associated with a company that is the current target of protests
– timed well, it could be very effective.
It's a really interesting concept to me.
And a lot of people who are members of Anonymous
use tools that I work on every day.
And I hope they will use them for good.
I think the unifying idea is just using anonymity to achieve some end.
And doing it with other people.
And I think that that speaks to some of their internal contradictions too,
because they're not unified by a political ideology.
Members of Anonymous fight with each other about that.
And I think when you have no political ideology motivating work like that
– work that has the potential to impact the whole globe,
and has before
- it can be really dangerous.
We of Anonymous declare total fucking war on antifa,
and all who support their criminal and violent actions
towards innocent civilians.
I've seen Anonymous operations go after people
in a kind of y'know, right-wing, Pizzagate-type style.
You know... I mean it originated on 4Chan.
Historically, the hacker community has been very inclusive.
When everything started,
nobody really knew who was on the other side of the line.
Everyone was just green text on a black background.
With that said, there is a lot of sexism in tech generally,
and I'd say that the people who are recruited from
places like Reddit and 4Chan are like, y'know,
your typical tech bros.
Every community on the Internet,
and every sub-community within those sites,
whether it's 4Chan or Reddit or whatever,
has a dog in the fight in gamergate.
Gamergate and 4Chan, and the origins of the alt-right,
I think are one of the most obvious confirmations
of something that many of us who are radicals already knew
... which is that toxic masculinity, misogyny, whatever you wanna call it,
is an incredibly dangerous and violent force.
And it never ends there.
Beyond the origins in 4Chan,
I don't really know exactly where a lot of these young men came from.
I imagine that it's probably not any more interesting
than they are a result of late-capitalist alienation.
But I think that they started out with, y'know,
your just, like, garden variety misogyny.
And then actual literal fascists went to their forums
and whispered fascist poison into the ears
of all these impressionable men.
And because they already were prone to violence and bigotry,
then it was just the natural conclusion.
Doxxing is the practice of exposing information about your opponent
that they'd rather have kept secret.
Typically, doxxing happens from information
that is already somehow readily available
and maybe just a little bit hidden.
If someone is doing their activism under a pseudonym,
attackers will search for any kind of connection
to their real physical persona and put that information online.
And then whoever the target is,
all the people who wanna go after that target
will work collectively to terrorize them.
The result of it can be, y'know, something like
getting 50 pizzas delivered to your house
... or it can be a SWAT team
showing up in response to a fake bomb threat.
Protection against this is best done by
compartmentalization of your online activities.
So keep your activist activities and your regular activities separate.
Use different email accounts when you sign up for services.
Doxxing's also been used by hacker collectives
to expose lists of police officers, members of fascist organizations...
A lot of people were doxxed after the Charlottesville rally
out of just public open-source knowledge,
and had to back-track on their beliefs
and actually had to go out in public and offer apologies.
In June of 2010, a malicious computer worm
called the Stuxnet virus was first discovered
by a small Belorussian software company, VBA32.
It was soon shared with cyber-security experts
at Kaspersky Labs, in Moscow,
and Symantec in Silicon Valley,
who quickly realized that it was unlike any virus ever seen before.
Far from your run-of-the mill malware,
Stuxnet was a sophisticated weapon,
comprised of millions of lines of code
and believed to have been jointly developed
by the cyber-warfare divisions
of the American and Israeli military.
Its target was the Natanz nuclear enrichment facility, in Iran.
For Natanz, it was a CIA-led operation.
So we had to have agency sign-off.
Someone from the agency stood behind the operator and the analyst
and gave the order to launch every attack.
For months, the virus had lain hidden
within the plant's Programmable Logic Controllers,
machines that are commonly used to regulate and control
a wide variety of industrial processes.
Running commands that were completely untraceable
to workers in the plant,
Stuxnet targeted centrifuges for sabotage,
causing them to explode, seemingly without cause.
The virus was only discovered due to an error in an upgrade patch,
which allowed it to jump out of the secured military facility
and onto the world wide web
…. otherwise we would have never even known it existed.
The Israelis took our code for the delivery system and changed it.
Then, on their own, without our agreement
they just fucked up the code.
Instead of hiding, the code started shutting down computers
... so naturally people noticed.
Because they were in a hurry, they opened Pandora's Box.
They let it out and it spread all over the world.
The Stuxnet virus set an important historical precedent,
as it heralded the beginnings
of a dangerous new chapter in modern warfare.
Still in its relative infancy, state-led cyber military campaigns
are now being conducted under conditions of total secrecy,
shrouded from public scrutiny, or even knowledge.
And given the widespread incorporation of digital systems
into all aspects of industrial civilization,
from electrical grids to emergency management systems
and even missile launch sites,
the potential consequences of these types of attacks
could lead to truly catastrophic loss of life.
And while states have been the first to reach this stage
in the development of offensive cyber warfare,
corporations and other sub-state actors
are already charting their own courses
in the militarization of digital systems.
A lot of what we have as the Internet now
- a lot of the building blocks of the Internet -
were created by hackers.
Experimenting with the technology, coming up with new uses
for a communications system that was originally designed
to sustain military communication in times of war.
And all of these really talented young programmers
started to found these Internet start-ups
and these companies that become Silicon Valley.
So hackers suddenly go from becoming criminals
to these billionaire entrepreneurs.
These corporations are gathering data at an impressive scale.
People are naturally communicative beings.
So we're constantly emitting information.
And that information is captured by the social media companies
and search engines.
And that information is then taken
and analyzed using algorithms to find patterns.
Facebook actually records everything that you type in the status message
– even if you don't send it.
And maybe you're just thinking out loud when you're doing this.
You're not thinking that you're actually thinking out loud
in a really crowded room,
with everybody having a recorder on them
... but that's actually what you're doing.
I think about our right to privacy
the way that I think about a lot of our other rights,
in that if we actually had them they would be a good start
... but we don't.
Privacy essentially is the right to keep thoughts to ourselves,
and the right to decide who we share them to,
and who can actually see them.
We have a guaranteed right to privacy in the US Constitution,
which says that the state can't just come in
and, like, look around at our stuff and do whatever it wants.
But they do. And they can.
Because the state has a monopoly on power.
Protecting your social information and your personal data
is also defending your self-determination.
There's this notion that's often used
by the state and private companies
that if you don't have anything to hide,
then you don't have to worry about privacy,
and you don't need security, and you don't need encryption.
If you hear anybody saying
“I have nothing to hide. I don't care about my privacy.”
I recommend asking them for their credit card information
or their social security number.
The biggest concern I have with the “I have nothing to hide”
is because today it seems really really easy to say it.
But in the past we have lived in darker times.
And the information we provide is really really useful to hit our groups
... or any kind of political activity.
For example, surveillance cameras on universities
– when you face a bigger threat
... let's say we have a coup d'etat in my country.
That surveillance camera information becomes really really different
from having just a couple of eyes watching them.
What people are really saying, I think,
when they don't care about their right to privacy is
“I'm not like those bad people.
"I'm a good person. I'm a law-abiding citizen.”
Which is a meaningless concept.
Everybody has secrets.
Everybody keeps things to themselves.
Whether or not they like to admit it, everybody puts pants on.
And then we have these new tendencies
like the Internet Research Agency and Cambridge Analytica
finding ways to use our communication and social media
and create these fake interactions
where they can quickly create a profile of us
of who we are, where we are in the political spectrum,
what our tendencies are,
and try to push us in new directions.
And kind of control our view of the world.
And you know, cyber is becoming so big today.
It's becoming something that, a number of years ago,
a short number of years ago, wasn't even a word.
And now the cyber is so big.
We conduct full-spectrum military cyberspace operations
to enable actions in all domains,
ensure the US and allied freedom of action in cyberspace,
and deny the same to any adversary.
Breaking news about Russian interference in our election.
FBI now investigating Vladimir Putin.
And as President Obama promises to retaliate for the cyber attack,
the Russian President continues to deny he ordered it.
Cyber warfare is really cheap.
It requires very little equipment.
It's very quiet. It's easily deniable.
And so it becomes a really powerful tool
for state actors and corporations to use,
because it's very easy for them to just brush it off after
and say “we never did this” or “we don't know who did this.”
Nation states are actively at cyber war with each other.
They each have their own dedicated cyber armies
for purposes of espionage, for purposes of sabotage.
It goes from intelligence gathering
to, really, destroying nuclear programs - as they've done in Iran.
And probably a whole bunch of other things we don't know about.
Because they are so secretive... because they're so easy to hide.
Everything run by a state in this area is run in a very military,
or corporate way.
There are people, y'know, doing shift work.
There are very clear plans and strategies.
Which means that they'll be working
more efficiently towards an actual goal.
The state can also use all of these techniques that it's developed
against the civilian population.
Against any actors it feels are a threat.
Since hacking and compromising someone digitally
is such an abstract thing,
it will probably be easier to pull the trigger on someone,
even if you're not exactly sure if they're
the person you're looking for.
This isn't like conventional warfare either.
They can act in a way that obscures the origins of the attack,
and they're not held to any standards of transparency
or accountability on the world stage.
If we're talking about a government that has no problems
sending drones into a country,
I mean... obviously they're not going to
feel any need to have to answer to their hacking activities.
It's very likely that we'll see a rise
in groups using cyber-warfare to advance their own political gains,
or to counter-attack repression.
It’s often said that there’s no such thing as perfect security.
All systems contain potential vulnerabilities
that can be exploited by determined and capable adversaries.
And when you choose to go up against the state,
you’ve chosen an adversary that is both.
Dozens of FBI agents targeted alleged members
of a loose-knit hacking group.
Armed with search warrants, agents hit six homes in New York,
along with locations across the country.
The best we can do is develop security protocols
that are adequate for the task at hand.
This means being constantly aware of the risks involved
with the actions that we carry out,
and understanding what steps that we can take to mitigate those risks.
When it comes to communication,
this means using methods and tools that are available
to thwart interception and mass data collection
in order to at least make things as difficult and expensive
for our enemies as possible.
How would they tell you to access the material on this phone?
I think they would say what they've said,
which I believe is in good faith.
That we have designed this in response to what we believe to be
the demands of our customers to be immune to any government warrant,
or our (the manufacturer's) efforts to get into that phone.
It’s also important to remember that this truth cuts both ways.
As infallible as the systems of social control may appear,
they too have vulnerabilities that are just waiting to be exploited
by determined and capable adversaries.
Let’s hope we can rise to the challenge.
Someone has broken into the national bank – the Federal Reserve.
A Twenty-First Century thief breaking into files, not into metal safes.
I think there's a lot of interesting things
that anarchist or anti-fascist collectives
could do with hacking for their movements.
But something I think is more interesting to me is:
how can we use technology,
and use hacking skills to come up with new ways
to connect to each other, in a global movement
where we can come to agreements together in a way that's safe
... that doesn't expose us,
that doesn't put us at risk of surveillance?
We should begin with the assumption that the Internet is hostile territory.
It's an ongoing state of war.
Military and law enforcement are using it as a tool for social control.
But it doesn't have to be this way.
And hackers and activists, we could use it to undermine
and subvert these systems of power.
We could create secure communication networks
to coordinate the next big demonstration.
But you certainly would have to be aware of encryption,
of using proxy servers... of using software like Tor.
You have to be able to protect yourself.
Because if not, they're going to use it against us.
I think the first step for any radical to protect themselves on the Internet
is to understand their threat model.
There's a really great resource
that the Electronic Frontier Foundation has
on figuring out your threat model.
And they cover a lot of what you need to be thinking about with these things.
There's this software called Tor that is very good to anonymize yourself
if you want to do something over the Internet.
People are recommending a messaging app for cell phones named Signal.
The Tor browser, which when you install it and when you start it up,
it sets up a connection to a decentralized network.
And then your communication will go via this network
in a number of different hops,
so that if you're browsing to a website,
it's not possible for that website
to actually tell where you're coming from.
One of the most important things that we really need to do
is segment our identities online.
And so don't re-use identities.
Don't make them last for a long time.
You might have a public identity, which you carefully curate,
and then create yourself new identities to really target
special operations that you wanna do.
Special events that happen.
If there's some protest going on,
maybe make a new identity.
It makes things a little bit difficult
because we do tend to operate on a trust basis,
and you need to re-build these connections.
But definitely it's the only way to make sure that you stay protected.
If you have for some reason linked
your regular identity with your Internet persona,
it's going to bring problems if some kind of neo-nazi
wants to publish that information on a board or whatever.
Within the hacker community there's a strong ethos of
shutting the hell up.
Don't talk about things that you've done.
And it comes back to this idea that your identity is really not that important.
Forget the fame.... do it for the actual purpose of the thing you wanna do.
But don't actually care about
whether or not people really will know that it's you.
Don't tell your friends... don't talk.
Shut the hell up.
Use really strong passwords, and a password manager.
That's a really typical avenue that doxxing happens through,
is just people finding your simple password
and gaining access to your accounts.
Use two-factor authentication on all accounts that you can.
If you're trying to learn how to hack,
you are going to have to learn how to program.
How to computer program.
And if you can learn how to develop websites and run servers,
you could look at other people's code
and spot the mistakes that they've made
that allow you to exploit and leverage that vulnerability.
Re-install your computer as often as you can.
Try out new operating systems.
If you've never used Linux, install it.
If you've used Linux before, install another distribution of Linux.
If you've always used Mac OS, maybe try Windows.
Just try new things and don't be afraid to break it,
because in the end if the computer breaks
you can always just reinstall the operating system.
Try the different tutorials you can find on Kali Linux,
and really try and attack your own systems.
Try to think outside the box.
In that way, y'know, hacking is a lot like anarchy
– things are what you make of it.
It's not only about us getting more involved
in technology and using technology.
We also have to bring the politics to technology.
We have to connect with the spaces
where free software is being developed
and make our politics a part of that space.
And I think that's something that's happening, right?
We can see that in a lot of the free software communities.
But it's something we need more of.
Decentralized, ideologically-driven hacker collectives,
if we unite our efforts we could, without any resources whatsoever
can dismantle a corporation, humiliate a politician.
And independent hackers, we have the advantage
since we're not doing it for a paycheck.
We're not doing it for any kind of allegiance to a country.
We're up all night.
We're breaking into systems because we love it.
Because the thrill of breaking into anything that they can build
while being able to undermine their systems of control is a better driver,
a better incentive for hackers than a paycheck
or... America.
If you take the offensive and hack,
expose and destroy these systems of the rich and powerful,
we could drive them offline.
Hack the planet! Hack the planet!
As a deepening awareness has emerged of the role
that Russian hackers played
in swaying the 2016 US Presidential election,
and facebook has been pressured to release information
on the Kremlin’s widespread usage of its targeted ads function
as a means of exacerbating tensions
and sewing political discord among the American public,
hacking has moved from the margins of popular culture
to the center of mainstream political discourse.
If our movements of resistance have any hope of remaining relevant
in this rapidly shifting political climate,
it is vitally important that we understand the ways in which
power is restructuring itself in our current digital age,
and adapt our theory and practice accordingly.
So at this point, we’d like to remind you
that Trouble is intended to be watched in groups,
and to be used as a resource
to promote discussion and collective organizing.
Are you interested in upping your digital security,
or exploring the ways in which you can better incorporate
an offensive online strategy to your organizing campaigns?
Consider getting together with some comrades,
screening this film, discussing how this might be done,
and possibly pairing it with an info-session on how to use Tor,
and how to encrypt your communication devices.
Interested in running regular screenings of Trouble at your campus,
infoshop, community center,
or even just at your home with friends?
Become a Trouble-Maker!
For 10 bucks a month,
we’ll hook you up with an advanced copy of the show
and a screening kit featuring additional resources
and some questions you can use to get a discussion going.
If you can’t afford to support us financially, no worries!
You can stream and/or download all our content for free off our website:
If you’ve got any suggestions for show topics, or just want to get in touch,
drop us a line at trouble@sub.media.
We’d like to remind you that our fundraiser
to grow our subMedia collective is still ongoing.
We will be doing one final push in December,
and hope to reach our goals by the end of the year.
To help make sure this happens, go to sub.media/donate
and become a monthly sustainer for as little as $2 per month.
As always, we’re excited to see that people have been
supporting and screening our work,
and wanna give a big shout out to new troublemaker chapters
in Vancouver, Prince George, Seattle, Bloomington, Brighton,
Ithaca, Quebec City, Prescott and Edinburgh.
If you’ve been organizing screenings in your town
and we haven’t given you a shout-out, let us know!
We will be taking the month of December off,
and will be back with a fresh season of Trouble,
plus a ton of fresh new subMedia content, starting in January.
This episode would not have been possible without the generous support of
Nicholas, Josh, Avispa Midia, Peter and Biella.
Now get out there, and make some trouble!