1 00:00:02,340 --> 00:00:05,017 Greetings Troublemakers... welcome to Trouble. 2 00:00:05,017 --> 00:00:06,869 My name is not important. 3 00:00:06,869 --> 00:00:10,547 At 10:30pm on October 29th, 1969, 4 00:00:10,547 --> 00:00:13,446 Charlie Kline, a student programer at UCLA, 5 00:00:13,446 --> 00:00:15,566 successfully sent the first digital message 6 00:00:15,566 --> 00:00:18,404 from one computer terminal to another via the DARPANET, 7 00:00:18,404 --> 00:00:20,064 a top-secret research project 8 00:00:20,064 --> 00:00:22,398 run by the US Department of Defense. 9 00:00:22,398 --> 00:00:25,580 The transmission of this single word, 'login' 10 00:00:25,580 --> 00:00:27,887 was a pivotal moment in human history, 11 00:00:27,887 --> 00:00:30,206 as it represents the official birth of the Internet. 12 00:00:30,206 --> 00:00:33,390 And it was from here that the first message was sent. 13 00:00:33,390 --> 00:00:34,837 A revolution began! 14 00:00:34,837 --> 00:00:36,581 In the nearly fifty years that have followed, 15 00:00:36,581 --> 00:00:39,014 this invention has thoroughly transformed our world 16 00:00:39,014 --> 00:00:42,099 and come to dominate virtually all aspects of our lives. 17 00:00:42,099 --> 00:00:44,571 It has restructured and rejuvenated capitalism, 18 00:00:44,571 --> 00:00:47,124 by revolutionizing finance and transforming the globe 19 00:00:47,124 --> 00:00:49,246 into a single interconnected marketplace. 20 00:00:49,246 --> 00:00:52,061 It has provided new methods of interacting with one another 21 00:00:52,061 --> 00:00:55,508 and helped shape the ways that we receive and process information. 22 00:00:55,508 --> 00:00:57,528 And it has provided a place for people to upload 23 00:00:57,528 --> 00:00:59,548 terabytes of videos of their cats. 24 00:00:59,738 --> 00:01:02,940 This is pinky... he's a male. He's available for adoption. 25 00:01:02,940 --> 00:01:03,981 He's pet of the week. 26 00:01:11,481 --> 00:01:13,631 The Internet has also become the central pillar 27 00:01:13,631 --> 00:01:15,213 of a new form of social control 28 00:01:15,213 --> 00:01:16,943 based around mass data collection 29 00:01:16,943 --> 00:01:18,625 and the construction of algorithms 30 00:01:18,625 --> 00:01:21,413 aimed at better predicting and manipulating human behavior. 31 00:01:21,413 --> 00:01:24,429 But while states and digital capitalists have used the Internet 32 00:01:24,429 --> 00:01:27,271 as a platform for mass surveillance and pacification, 33 00:01:27,271 --> 00:01:29,010 it has also been a site of subversion 34 00:01:29,010 --> 00:01:30,490 and created new possibilities 35 00:01:30,490 --> 00:01:32,996 for decentralized attacks on the dominant order. 36 00:01:33,436 --> 00:01:34,334 We've got a problem. 37 00:01:34,334 --> 00:01:35,066 What? 38 00:01:35,066 --> 00:01:37,332 Someone synched a RAT to one of my servers. 39 00:01:37,332 --> 00:01:39,449 A remote access tool – we're being hacked! 40 00:01:39,449 --> 00:01:41,314 On the front-lines of this war are hackers. 41 00:01:41,314 --> 00:01:44,962 Those who use curiosity, programming skills and problem solving 42 00:01:44,962 --> 00:01:48,618 to unlock closed systems and bend powerful forces to their will. 43 00:01:48,618 --> 00:01:50,089 Over the next thirty minutes, 44 00:01:50,089 --> 00:01:52,583 we'll share the voices of a number of these individuals 45 00:01:52,583 --> 00:01:55,201 as they share their experiences of defacing web sites, 46 00:01:55,201 --> 00:01:58,929 leaking emails, developing tools to thwart digital surveillance 47 00:01:58,929 --> 00:02:00,409 ... and making a whole lot of trouble. 48 00:02:26,487 --> 00:02:29,803 Hacking is one of those terms that I think has become 49 00:02:29,803 --> 00:02:31,203 a little bit nebulous. 50 00:02:31,203 --> 00:02:34,859 I would define it as using technology in a way that wasn't intended, 51 00:02:34,859 --> 00:02:37,565 by finding bugs and oversights in designs 52 00:02:37,565 --> 00:02:40,604 to make it produce results that were never supposed to happen. 53 00:02:40,604 --> 00:02:42,827 Creative subversion of technical systems. 54 00:02:42,827 --> 00:02:47,087 You take software and you modify it to get another result. 55 00:02:47,087 --> 00:02:50,136 For example, accessing information on a system 56 00:02:50,136 --> 00:02:52,236 that you shouldn't be able to access. 57 00:02:52,236 --> 00:02:57,008 Or making the system do something that it shouldn't be able to do 58 00:02:57,008 --> 00:02:59,369 – or that you shouldn't be able to make it do. 59 00:02:59,369 --> 00:03:02,623 There's a lot of different definitions of hacking, depending on who you ask. 60 00:03:02,623 --> 00:03:06,741 US criminal law defines computer hacking as unauthorized access 61 00:03:06,741 --> 00:03:10,171 to obtain information, transmitting destructive code, etc. 62 00:03:10,171 --> 00:03:12,492 I mean, they've basically expanded the definition 63 00:03:12,492 --> 00:03:15,692 in their ongoing efforts to criminalize everyday Internet activity. 64 00:03:15,692 --> 00:03:17,203 If you ask someone like Richard Stallman, 65 00:03:17,203 --> 00:03:20,501 he'll tell you that it's really just a creative solution to a problem. 66 00:03:20,501 --> 00:03:22,435 But hackers also do like to break into systems. 67 00:03:22,435 --> 00:03:24,018 There are all kinds of systems, 68 00:03:24,018 --> 00:03:26,006 and there's all kinds of access 69 00:03:26,006 --> 00:03:28,276 and all kinds of ways to gain access. 70 00:03:28,276 --> 00:03:32,243 Some hackers choose to fix and protect these systems. 71 00:03:32,243 --> 00:03:34,986 They work for the government, Microsoft etc. 72 00:03:34,986 --> 00:03:36,414 They call themselves White Hats. 73 00:03:36,414 --> 00:03:37,741 They're not even really hackers. 74 00:03:37,741 --> 00:03:40,032 They're seen in the hacking scene as sellouts. 75 00:03:40,032 --> 00:03:43,043 They do it for the paycheck... or maybe because of the flag. 76 00:03:43,043 --> 00:03:45,580 But there are those, of course, who don't don't it for employment. 77 00:03:45,580 --> 00:03:46,797 They don't do it for a paycheck, 78 00:03:46,797 --> 00:03:48,992 they do it for the love of solving complex puzzles. 79 00:03:48,992 --> 00:03:52,117 For the thrill of breaking into whatever artificial borders 80 00:03:52,117 --> 00:03:54,065 that these people decide to erect. 81 00:03:54,065 --> 00:03:56,299 Everything that's built can be broken. 82 00:03:56,899 --> 00:03:59,848 I don't think hacking has changed all that much in the last few years. 83 00:03:59,848 --> 00:04:02,145 What really has changed is the scope 84 00:04:02,145 --> 00:04:04,085 of things that can be affected with hacking. 85 00:04:04,085 --> 00:04:07,779 Before, in the 90's, most of it was just practical jokes 86 00:04:07,779 --> 00:04:10,450 because none of it had a lot of impact on real life. 87 00:04:10,450 --> 00:04:11,665 And in popular culture, 88 00:04:11,665 --> 00:04:16,494 you start to have hackers appear in movies, in television series, 89 00:04:16,494 --> 00:04:18,945 where there's this whole figure of these hackers 90 00:04:18,945 --> 00:04:20,635 that have these super powers. 91 00:04:20,635 --> 00:04:24,401 That can invade computer systems in any way, shape or form. 92 00:04:24,401 --> 00:04:26,031 There's a new virus in the database. 93 00:04:26,031 --> 00:04:27,369 What's happening? 94 00:04:27,369 --> 00:04:29,999 It's replicating... eating up memory.... uhh, what do I do? 95 00:04:29,999 --> 00:04:31,785 Type 'cookie' you idiot! 96 00:04:31,785 --> 00:04:33,708 Then it gets a lot more popularized. 97 00:04:33,708 --> 00:04:35,645 Since the dot-com boom at the end of the 90's, 98 00:04:35,645 --> 00:04:37,520 things now have a huge impact 99 00:04:37,520 --> 00:04:39,306 and everything tends to be connected to the Internet, 100 00:04:39,306 --> 00:04:40,485 or some sort of network. 101 00:04:40,485 --> 00:04:42,981 As digital information networks have evolved, 102 00:04:42,981 --> 00:04:46,240 a lot of personal information is being stored. 103 00:04:46,240 --> 00:04:50,135 Y'know, big data corporations and industries are relying on computers 104 00:04:50,135 --> 00:04:53,752 ... so hackers have access to this kind of information 105 00:04:53,752 --> 00:04:55,366 that these big companies have as well. 106 00:04:55,366 --> 00:04:57,674 Hacking can be very simple and very complex. 107 00:04:57,674 --> 00:05:00,479 But most times hacking is very simple. 108 00:05:00,479 --> 00:05:03,655 By supplying input in a certain way, 109 00:05:03,655 --> 00:05:07,192 you're able to make the back-end system 110 00:05:07,192 --> 00:05:09,812 believe that what you're supplying 111 00:05:09,812 --> 00:05:11,680 is actually part of its own code. 112 00:05:11,680 --> 00:05:16,311 Which, in a lot of cases, can give you full access to that system. 113 00:05:16,311 --> 00:05:20,848 That's not just limited to computers or telecommunication systems. 114 00:05:20,848 --> 00:05:24,581 We can really kind of apply this idea to all kinds of technical systems. 115 00:05:24,581 --> 00:05:28,399 So, for example, something like social engineering 116 00:05:28,399 --> 00:05:30,828 is a human form of hacking. 117 00:05:30,828 --> 00:05:34,001 Y'know, you can pretend to be somebody that you're not 118 00:05:34,001 --> 00:05:37,822 and ask another person questions about themselves 119 00:05:37,822 --> 00:05:40,703 in order to get them to reveal private information. 120 00:05:40,703 --> 00:05:42,611 It's possible that there is software 121 00:05:42,611 --> 00:05:44,651 in theory that doesn't have vulnerabilities. 122 00:05:44,651 --> 00:05:47,156 But in practice, that's impossible to have. 123 00:05:47,156 --> 00:05:49,274 If an application or a system 124 00:05:49,274 --> 00:05:53,324 performs queries to a database based on your input, 125 00:05:53,324 --> 00:05:56,840 you could possibly alter your input 126 00:05:56,840 --> 00:05:59,610 to be able to then alter the database query, 127 00:05:59,610 --> 00:06:03,627 and possibly gain access to information that you shouldn't be able to. 128 00:06:03,627 --> 00:06:05,047 Mostly what an exploit does, 129 00:06:05,047 --> 00:06:09,021 it's a small tool that you run to get access to a special sector 130 00:06:09,021 --> 00:06:11,083 of the software you want to get. 131 00:06:11,583 --> 00:06:14,335 A lot of exploits and vulnerabilities are discussed publicly 132 00:06:14,335 --> 00:06:15,914 and being used in the wild. 133 00:06:15,914 --> 00:06:19,330 If you pay attention to lists like Full Disclosure or Security Focus, 134 00:06:19,330 --> 00:06:21,769 they'll tell you some of the latest tricks that are being used. 135 00:06:21,769 --> 00:06:24,341 Of course, those are the ones that are already publicly known, 136 00:06:24,341 --> 00:06:27,486 and that the vendors have often already released patches 137 00:06:27,486 --> 00:06:30,245 ... but a lot of companies don't always patch. 138 00:06:30,245 --> 00:06:33,170 They're not as on-top of it as they'd like to think that they are. 139 00:06:33,170 --> 00:06:35,945 For example, the Equifax hacks a couple of weeks ago 140 00:06:35,945 --> 00:06:39,130 was running outdated versions of Apache software. 141 00:06:39,130 --> 00:06:41,776 Most people don't really do updates regularly. 142 00:06:41,776 --> 00:06:45,626 So most people will actually get hacked by something very simple. 143 00:06:45,626 --> 00:06:47,287 Denial of service attacks 144 00:06:47,287 --> 00:06:50,983 ... basically coming up with ways to create an enormous amount 145 00:06:50,983 --> 00:06:52,670 of traffic to your server, 146 00:06:52,670 --> 00:06:56,497 to the point where it can't continue to provide those services. 147 00:06:56,497 --> 00:06:59,146 There's such a thing as Distributed Denial of Service attacks, 148 00:06:59,146 --> 00:07:03,207 where that traffic is coming from many places at the same time. 149 00:07:03,207 --> 00:07:07,090 The most serious techniques are what they call 'undisclosed vulnerabilities', 150 00:07:07,090 --> 00:07:08,244 what they call a 'zero day.' 151 00:07:08,244 --> 00:07:11,516 When someone discovers a vulnerability, and instead of reporting it 152 00:07:11,516 --> 00:07:12,938 – which is the White Hat way – 153 00:07:12,938 --> 00:07:15,076 they continue using it privately. 154 00:07:15,076 --> 00:07:17,654 And they don't report it publicly, 155 00:07:17,654 --> 00:07:20,418 so that way there's no way for anyone to 156 00:07:20,418 --> 00:07:23,208 really adequately protect themselves against it. 157 00:07:23,208 --> 00:07:25,853 I think a useful way to think about this is 158 00:07:25,853 --> 00:07:27,784 that the Internet is a really hostile place. 159 00:07:27,784 --> 00:07:31,557 It was never designed with privacy or security in mind. 160 00:07:31,557 --> 00:07:35,531 State actors and corporations control the entire thing. 161 00:07:35,531 --> 00:07:38,291 And so when you talk about their ability to exploit it 162 00:07:38,291 --> 00:07:43,399 ... I mean, to me, so many of the basic services that we use 163 00:07:43,399 --> 00:07:45,108 on the Internet are exploitative 164 00:07:45,108 --> 00:07:48,223 without thinking about a hacker getting into it, 165 00:07:48,223 --> 00:07:49,893 or malware or something like that. 166 00:07:49,893 --> 00:07:52,332 State actors like the US government 167 00:07:52,332 --> 00:07:56,022 have the ability to observe all Internet traffic in real time, 168 00:07:56,022 --> 00:07:57,476 collect it and store it, 169 00:07:57,476 --> 00:07:59,554 and then use it later at their discretion. 170 00:07:59,554 --> 00:08:02,716 And they work very closely with the digital capitalists 171 00:08:02,716 --> 00:08:05,192 – facebook, google and all these other entities 172 00:08:05,192 --> 00:08:07,668 – who are already storing that information anyway. 173 00:08:12,849 --> 00:08:15,785 The Internet has long been a tool used by social movements 174 00:08:15,785 --> 00:08:17,355 of various political stripes, 175 00:08:17,355 --> 00:08:19,512 both as a means of disseminating information 176 00:08:19,512 --> 00:08:21,580 and a fertile ground for recruitment. 177 00:08:21,580 --> 00:08:24,978 Back in the 1990's, the anti-globalization movement 178 00:08:24,978 --> 00:08:28,400 arose alongside the open-media publishing platform, Indymedia, 179 00:08:28,400 --> 00:08:31,447 which allowed for the virtual coordination of many localized fronts 180 00:08:31,447 --> 00:08:34,361 in the global fight against neoliberal capitalism. 181 00:08:37,615 --> 00:08:39,348 I need 50,000 people. 182 00:08:39,348 --> 00:08:42,039 50,000? You're gonna have to give me some time. 183 00:08:42,039 --> 00:08:42,976 And drums. 184 00:08:44,236 --> 00:08:46,494 You want drums? OK, I can do that. 185 00:08:46,494 --> 00:08:47,924 And what about the Italians? 186 00:08:50,544 --> 00:08:52,295 The Italians? Man, they're stuck on the border. 187 00:08:52,295 --> 00:08:53,584 They're gonna be with you tomorrow. 188 00:08:53,584 --> 00:08:54,483 And the black bloc? 189 00:08:54,483 --> 00:08:55,860 The black bloc are already there. 190 00:08:55,860 --> 00:08:58,330 You're gonna see black and red like there ain't no tomorrow, kid. 191 00:08:58,330 --> 00:08:59,344 You just sit tight. 192 00:09:06,894 --> 00:09:09,710 These days, social media platforms like facebook 193 00:09:09,710 --> 00:09:13,337 have given rise to a new form of online activity known as 'clicktivism', 194 00:09:13,337 --> 00:09:16,107 in which likes, shares and the signing of online petitions 195 00:09:16,107 --> 00:09:19,229 have become a popular way for liberals and so-called 'progressives' 196 00:09:19,229 --> 00:09:21,391 to project an image of ostensible participation 197 00:09:21,391 --> 00:09:25,000 in campaigns centered around a variety of social justice-related issues, 198 00:09:25,000 --> 00:09:28,499 and often masking their lack of participation in real world struggles. 199 00:09:28,499 --> 00:09:31,649 Real change requires real action. 200 00:09:31,649 --> 00:09:35,858 That’s why I always share political articles on facebook, 201 00:09:35,858 --> 00:09:36,928 whenever I see them. 202 00:09:36,928 --> 00:09:39,507 But not everyone has been lulled into this comforting delusion 203 00:09:39,507 --> 00:09:41,454 of how social change works. 204 00:09:41,454 --> 00:09:43,369 On both sides of the political spectrum, 205 00:09:43,369 --> 00:09:45,329 groups and individuals have continued 206 00:09:45,329 --> 00:09:46,939 to use the Internet pragmatically, 207 00:09:46,939 --> 00:09:50,574 both to spread their ideologies and coordinate their IRL activities. 208 00:09:52,238 --> 00:09:54,844 Anonymous is a decentralized network of hackers and activists 209 00:09:54,844 --> 00:09:57,079 that exist in places like IRC and Twitter, 210 00:09:57,079 --> 00:09:59,477 and anyone is free to become Anonymous 211 00:09:59,477 --> 00:10:01,551 and start their own operations within the network. 212 00:10:01,551 --> 00:10:03,351 It's kinda similar to the black bloc tactic 213 00:10:03,351 --> 00:10:05,861 used as cover and collective identity. 214 00:10:05,861 --> 00:10:09,225 I'm doing ten years in the fence for computer hacking charges 215 00:10:09,225 --> 00:10:11,410 related to my involvement in Anonymous. 216 00:10:11,410 --> 00:10:14,369 I was hacking police departments, military contractors 217 00:10:14,369 --> 00:10:15,988 ... defacing their websites, 218 00:10:15,988 --> 00:10:18,608 releasing their emails and databases to the public. 219 00:10:18,608 --> 00:10:22,114 One of the bigger targets was a company known as Strategic Forecasting 220 00:10:22,114 --> 00:10:24,759 – Stratfor – which is a private intelligence firm 221 00:10:24,759 --> 00:10:28,207 made up of mostly former State Department and CIA agents. 222 00:10:28,207 --> 00:10:29,438 We took down their websites. 223 00:10:29,438 --> 00:10:32,072 We went on donation sprees with all their clients' credit cards, 224 00:10:32,072 --> 00:10:34,405 and gave their email archives to Wikileaks. 225 00:10:34,405 --> 00:10:35,795 And Wikileaks pubished them, 226 00:10:35,795 --> 00:10:38,475 showed that they had been spying on activist groups 227 00:10:38,475 --> 00:10:40,677 on behalf of corporations like Dow Chemical. 228 00:10:40,677 --> 00:10:43,824 Groups like Anonymous got really really famous defacing websites. 229 00:10:43,824 --> 00:10:46,145 Other groups attacked police websites, 230 00:10:46,145 --> 00:10:51,013 getting all the data they have about current police members. 231 00:10:51,013 --> 00:10:55,279 There's also groups that were blocking huge institutions, 232 00:10:55,279 --> 00:10:57,592 like credit card companies or banks. 233 00:10:57,592 --> 00:11:00,346 If they block their transactions, they lose money. 234 00:11:00,346 --> 00:11:03,771 So there's a bunch of stuff you can do with hacking. 235 00:11:03,771 --> 00:11:05,477 Anonymous, they were really famous for 236 00:11:05,477 --> 00:11:08,681 really getting that kind of popular participation in a hacking movement 237 00:11:08,681 --> 00:11:12,433 that really didn't mean you had to be an expert to use it. 238 00:11:12,433 --> 00:11:14,153 You could download a piece of software, 239 00:11:14,153 --> 00:11:16,412 and you could just run it on your computer 240 00:11:16,412 --> 00:11:19,264 and you would enter in the target URL 241 00:11:19,264 --> 00:11:21,300 and you could begin to participate 242 00:11:21,300 --> 00:11:24,840 in what was effectively like a virtual sit-in. 243 00:11:24,840 --> 00:11:27,057 Now as far as Anonymous, or hacktivists in general 244 00:11:27,057 --> 00:11:29,122 playing a role in revolutionary movements... 245 00:11:29,122 --> 00:11:30,682 Anonymous was very active during 246 00:11:30,682 --> 00:11:32,490 Occupy Wall Street and the Arab Spring. 247 00:11:32,490 --> 00:11:34,560 In general, an overall revolutionary strategy 248 00:11:34,560 --> 00:11:36,917 benefits from a diversity of tactics. 249 00:11:36,917 --> 00:11:39,509 Multiple attacks converging from all angles, 250 00:11:39,509 --> 00:11:43,440 including street protests, to smashed windows, to hacked websites. 251 00:11:43,440 --> 00:11:46,813 So Anonymous, y'know, revealing scandalous personal information 252 00:11:46,813 --> 00:11:50,871 on individuals associated with a company that is the current target of protests 253 00:11:50,871 --> 00:11:52,907 – timed well, it could be very effective. 254 00:11:52,907 --> 00:11:54,944 It's a really interesting concept to me. 255 00:11:54,944 --> 00:11:57,899 And a lot of people who are members of Anonymous 256 00:11:57,899 --> 00:11:59,981 use tools that I work on every day. 257 00:11:59,981 --> 00:12:01,781 And I hope they will use them for good. 258 00:12:01,781 --> 00:12:09,502 I think the unifying idea is just using anonymity to achieve some end. 259 00:12:09,502 --> 00:12:11,243 And doing it with other people. 260 00:12:11,243 --> 00:12:14,482 And I think that that speaks to some of their internal contradictions too, 261 00:12:14,482 --> 00:12:17,531 because they're not unified by a political ideology. 262 00:12:17,531 --> 00:12:20,735 Members of Anonymous fight with each other about that. 263 00:12:20,735 --> 00:12:26,170 And I think when you have no political ideology motivating work like that 264 00:12:26,170 --> 00:12:31,021 – work that has the potential to impact the whole globe, 265 00:12:31,021 --> 00:12:32,861 and has before 266 00:12:32,861 --> 00:12:34,200 - it can be really dangerous. 267 00:12:34,200 --> 00:12:37,585 We of Anonymous declare total fucking war on antifa, 268 00:12:37,585 --> 00:12:40,203 and all who support their criminal and violent actions 269 00:12:40,203 --> 00:12:41,813 towards innocent civilians. 270 00:12:41,813 --> 00:12:46,346 I've seen Anonymous operations go after people 271 00:12:46,346 --> 00:12:50,343 in a kind of y'know, right-wing, Pizzagate-type style. 272 00:12:50,343 --> 00:12:52,822 You know... I mean it originated on 4Chan. 273 00:12:52,822 --> 00:12:57,170 Historically, the hacker community has been very inclusive. 274 00:12:57,170 --> 00:12:58,750 When everything started, 275 00:12:58,750 --> 00:13:02,883 nobody really knew who was on the other side of the line. 276 00:13:02,883 --> 00:13:06,292 Everyone was just green text on a black background. 277 00:13:06,292 --> 00:13:10,063 With that said, there is a lot of sexism in tech generally, 278 00:13:10,063 --> 00:13:14,797 and I'd say that the people who are recruited from 279 00:13:14,797 --> 00:13:18,757 places like Reddit and 4Chan are like, y'know, 280 00:13:18,757 --> 00:13:20,662 your typical tech bros. 281 00:13:20,662 --> 00:13:22,516 Every community on the Internet, 282 00:13:22,516 --> 00:13:25,152 and every sub-community within those sites, 283 00:13:25,152 --> 00:13:26,819 whether it's 4Chan or Reddit or whatever, 284 00:13:26,819 --> 00:13:29,254 has a dog in the fight in gamergate. 285 00:13:29,254 --> 00:13:34,678 Gamergate and 4Chan, and the origins of the alt-right, 286 00:13:34,678 --> 00:13:38,354 I think are one of the most obvious confirmations 287 00:13:38,354 --> 00:13:42,681 of something that many of us who are radicals already knew 288 00:13:42,681 --> 00:13:47,185 ... which is that toxic masculinity, misogyny, whatever you wanna call it, 289 00:13:47,185 --> 00:13:50,705 is an incredibly dangerous and violent force. 290 00:13:50,705 --> 00:13:52,655 And it never ends there. 291 00:13:52,655 --> 00:13:54,604 Beyond the origins in 4Chan, 292 00:13:54,604 --> 00:13:59,300 I don't really know exactly where a lot of these young men came from. 293 00:13:59,300 --> 00:14:02,423 I imagine that it's probably not any more interesting 294 00:14:02,423 --> 00:14:06,931 than they are a result of late-capitalist alienation. 295 00:14:06,931 --> 00:14:10,984 But I think that they started out with, y'know, 296 00:14:10,984 --> 00:14:13,657 your just, like, garden variety misogyny. 297 00:14:13,657 --> 00:14:18,059 And then actual literal fascists went to their forums 298 00:14:18,059 --> 00:14:20,656 and whispered fascist poison into the ears 299 00:14:20,656 --> 00:14:23,076 of all these impressionable men. 300 00:14:23,076 --> 00:14:27,990 And because they already were prone to violence and bigotry, 301 00:14:27,990 --> 00:14:30,906 then it was just the natural conclusion. 302 00:14:31,756 --> 00:14:37,476 Doxxing is the practice of exposing information about your opponent 303 00:14:37,476 --> 00:14:40,467 that they'd rather have kept secret. 304 00:14:40,467 --> 00:14:44,704 Typically, doxxing happens from information 305 00:14:44,704 --> 00:14:47,300 that is already somehow readily available 306 00:14:47,300 --> 00:14:48,811 and maybe just a little bit hidden. 307 00:14:48,811 --> 00:14:52,810 If someone is doing their activism under a pseudonym, 308 00:14:52,810 --> 00:14:56,907 attackers will search for any kind of connection 309 00:14:56,907 --> 00:15:00,970 to their real physical persona and put that information online. 310 00:15:00,970 --> 00:15:03,994 And then whoever the target is, 311 00:15:03,994 --> 00:15:06,315 all the people who wanna go after that target 312 00:15:06,315 --> 00:15:09,025 will work collectively to terrorize them. 313 00:15:09,025 --> 00:15:11,344 The result of it can be, y'know, something like 314 00:15:11,344 --> 00:15:13,823 getting 50 pizzas delivered to your house 315 00:15:13,823 --> 00:15:16,538 ... or it can be a SWAT team 316 00:15:16,538 --> 00:15:19,618 showing up in response to a fake bomb threat. 317 00:15:19,618 --> 00:15:22,742 Protection against this is best done by 318 00:15:22,742 --> 00:15:26,226 compartmentalization of your online activities. 319 00:15:26,226 --> 00:15:31,293 So keep your activist activities and your regular activities separate. 320 00:15:31,293 --> 00:15:35,227 Use different email accounts when you sign up for services. 321 00:15:35,227 --> 00:15:38,530 Doxxing's also been used by hacker collectives 322 00:15:38,530 --> 00:15:44,490 to expose lists of police officers, members of fascist organizations... 323 00:15:44,490 --> 00:15:47,754 A lot of people were doxxed after the Charlottesville rally 324 00:15:47,754 --> 00:15:50,175 out of just public open-source knowledge, 325 00:15:50,175 --> 00:15:52,288 and had to back-track on their beliefs 326 00:15:52,288 --> 00:15:55,329 and actually had to go out in public and offer apologies. 327 00:15:57,437 --> 00:16:00,191 In June of 2010, a malicious computer worm 328 00:16:00,191 --> 00:16:02,144 called the Stuxnet virus was first discovered 329 00:16:02,144 --> 00:16:05,908 by a small Belorussian software company, VBA32. 330 00:16:05,908 --> 00:16:08,362 It was soon shared with cyber-security experts 331 00:16:08,362 --> 00:16:10,341 at Kaspersky Labs, in Moscow, 332 00:16:10,341 --> 00:16:12,235 and Symantec in Silicon Valley, 333 00:16:12,235 --> 00:16:15,987 who quickly realized that it was unlike any virus ever seen before. 334 00:16:15,987 --> 00:16:17,653 Far from your run-of-the mill malware, 335 00:16:17,653 --> 00:16:19,561 Stuxnet was a sophisticated weapon, 336 00:16:19,561 --> 00:16:21,439 comprised of millions of lines of code 337 00:16:21,439 --> 00:16:23,279 and believed to have been jointly developed 338 00:16:23,279 --> 00:16:24,715 by the cyber-warfare divisions 339 00:16:24,715 --> 00:16:26,743 of the American and Israeli military. 340 00:16:26,743 --> 00:16:30,193 Its target was the Natanz nuclear enrichment facility, in Iran. 341 00:16:30,193 --> 00:16:33,763 For Natanz, it was a CIA-led operation. 342 00:16:33,763 --> 00:16:36,157 So we had to have agency sign-off. 343 00:16:37,397 --> 00:16:43,606 Someone from the agency stood behind the operator and the analyst 344 00:16:43,606 --> 00:16:46,663 and gave the order to launch every attack. 345 00:16:46,663 --> 00:16:48,657 For months, the virus had lain hidden 346 00:16:48,657 --> 00:16:50,958 within the plant's Programmable Logic Controllers, 347 00:16:50,958 --> 00:16:53,355 machines that are commonly used to regulate and control 348 00:16:53,355 --> 00:16:56,144 a wide variety of industrial processes. 349 00:16:56,144 --> 00:16:58,004 Running commands that were completely untraceable 350 00:16:58,004 --> 00:16:59,358 to workers in the plant, 351 00:16:59,358 --> 00:17:01,950 Stuxnet targeted centrifuges for sabotage, 352 00:17:01,950 --> 00:17:05,084 causing them to explode, seemingly without cause. 353 00:17:05,084 --> 00:17:08,246 The virus was only discovered due to an error in an upgrade patch, 354 00:17:08,246 --> 00:17:11,148 which allowed it to jump out of the secured military facility 355 00:17:11,148 --> 00:17:12,987 and onto the world wide web 356 00:17:12,987 --> 00:17:15,384 …. otherwise we would have never even known it existed. 357 00:17:15,384 --> 00:17:20,207 The Israelis took our code for the delivery system and changed it. 358 00:17:21,417 --> 00:17:24,082 Then, on their own, without our agreement 359 00:17:24,082 --> 00:17:25,921 they just fucked up the code. 360 00:17:26,621 --> 00:17:30,125 Instead of hiding, the code started shutting down computers 361 00:17:30,125 --> 00:17:32,910 ... so naturally people noticed. 362 00:17:32,910 --> 00:17:35,781 Because they were in a hurry, they opened Pandora's Box. 363 00:17:36,991 --> 00:17:41,139 They let it out and it spread all over the world. 364 00:17:41,139 --> 00:17:44,304 The Stuxnet virus set an important historical precedent, 365 00:17:44,304 --> 00:17:45,614 as it heralded the beginnings 366 00:17:45,614 --> 00:17:48,222 of a dangerous new chapter in modern warfare. 367 00:17:48,222 --> 00:17:51,604 Still in its relative infancy, state-led cyber military campaigns 368 00:17:51,604 --> 00:17:54,442 are now being conducted under conditions of total secrecy, 369 00:17:54,442 --> 00:17:57,374 shrouded from public scrutiny, or even knowledge. 370 00:17:57,374 --> 00:18:00,104 And given the widespread incorporation of digital systems 371 00:18:00,104 --> 00:18:02,473 into all aspects of industrial civilization, 372 00:18:02,473 --> 00:18:04,913 from electrical grids to emergency management systems 373 00:18:04,913 --> 00:18:06,556 and even missile launch sites, 374 00:18:06,556 --> 00:18:08,855 the potential consequences of these types of attacks 375 00:18:08,855 --> 00:18:11,243 could lead to truly catastrophic loss of life. 376 00:18:11,243 --> 00:18:14,003 And while states have been the first to reach this stage 377 00:18:14,003 --> 00:18:16,306 in the development of offensive cyber warfare, 378 00:18:16,306 --> 00:18:18,126 corporations and other sub-state actors 379 00:18:18,126 --> 00:18:19,658 are already charting their own courses 380 00:18:19,658 --> 00:18:21,670 in the militarization of digital systems. 381 00:18:23,461 --> 00:18:25,549 A lot of what we have as the Internet now 382 00:18:25,549 --> 00:18:27,033 - a lot of the building blocks of the Internet - 383 00:18:27,033 --> 00:18:28,339 were created by hackers. 384 00:18:28,339 --> 00:18:31,244 Experimenting with the technology, coming up with new uses 385 00:18:31,244 --> 00:18:35,626 for a communications system that was originally designed 386 00:18:35,626 --> 00:18:39,595 to sustain military communication in times of war. 387 00:18:39,595 --> 00:18:42,797 And all of these really talented young programmers 388 00:18:42,797 --> 00:18:45,363 started to found these Internet start-ups 389 00:18:45,363 --> 00:18:48,417 and these companies that become Silicon Valley. 390 00:18:48,417 --> 00:18:50,884 So hackers suddenly go from becoming criminals 391 00:18:50,884 --> 00:18:53,948 to these billionaire entrepreneurs. 392 00:18:53,948 --> 00:18:58,504 These corporations are gathering data at an impressive scale. 393 00:18:58,504 --> 00:19:02,042 People are naturally communicative beings. 394 00:19:02,042 --> 00:19:05,688 So we're constantly emitting information. 395 00:19:05,688 --> 00:19:09,636 And that information is captured by the social media companies 396 00:19:09,636 --> 00:19:11,284 and search engines. 397 00:19:11,284 --> 00:19:13,524 And that information is then taken 398 00:19:13,524 --> 00:19:17,110 and analyzed using algorithms to find patterns. 399 00:19:17,110 --> 00:19:20,101 Facebook actually records everything that you type in the status message 400 00:19:20,101 --> 00:19:22,168 – even if you don't send it. 401 00:19:22,168 --> 00:19:24,587 And maybe you're just thinking out loud when you're doing this. 402 00:19:24,587 --> 00:19:26,824 You're not thinking that you're actually thinking out loud 403 00:19:26,824 --> 00:19:28,558 in a really crowded room, 404 00:19:28,558 --> 00:19:30,745 with everybody having a recorder on them 405 00:19:30,745 --> 00:19:32,295 ... but that's actually what you're doing. 406 00:19:32,295 --> 00:19:34,078 I think about our right to privacy 407 00:19:34,078 --> 00:19:36,595 the way that I think about a lot of our other rights, 408 00:19:36,595 --> 00:19:40,691 in that if we actually had them they would be a good start 409 00:19:40,691 --> 00:19:41,901 ... but we don't. 410 00:19:41,901 --> 00:19:45,328 Privacy essentially is the right to keep thoughts to ourselves, 411 00:19:45,328 --> 00:19:47,968 and the right to decide who we share them to, 412 00:19:47,968 --> 00:19:49,519 and who can actually see them. 413 00:19:49,519 --> 00:19:53,083 We have a guaranteed right to privacy in the US Constitution, 414 00:19:53,083 --> 00:19:55,314 which says that the state can't just come in 415 00:19:55,314 --> 00:19:58,649 and, like, look around at our stuff and do whatever it wants. 416 00:19:58,649 --> 00:20:01,308 But they do. And they can. 417 00:20:01,308 --> 00:20:04,017 Because the state has a monopoly on power. 418 00:20:04,017 --> 00:20:07,727 Protecting your social information and your personal data 419 00:20:07,727 --> 00:20:10,281 is also defending your self-determination. 420 00:20:10,281 --> 00:20:12,221 There's this notion that's often used 421 00:20:12,221 --> 00:20:14,089 by the state and private companies 422 00:20:14,089 --> 00:20:16,725 that if you don't have anything to hide, 423 00:20:16,725 --> 00:20:18,630 then you don't have to worry about privacy, 424 00:20:18,630 --> 00:20:21,468 and you don't need security, and you don't need encryption. 425 00:20:21,988 --> 00:20:24,037 If you hear anybody saying 426 00:20:24,037 --> 00:20:26,909 “I have nothing to hide. I don't care about my privacy.” 427 00:20:26,909 --> 00:20:29,343 I recommend asking them for their credit card information 428 00:20:29,343 --> 00:20:30,580 or their social security number. 429 00:20:32,058 --> 00:20:34,941 The biggest concern I have with the “I have nothing to hide” 430 00:20:34,941 --> 00:20:38,228 is because today it seems really really easy to say it. 431 00:20:38,228 --> 00:20:41,147 But in the past we have lived in darker times. 432 00:20:41,147 --> 00:20:45,278 And the information we provide is really really useful to hit our groups 433 00:20:45,278 --> 00:20:47,397 ... or any kind of political activity. 434 00:20:47,397 --> 00:20:50,402 For example, surveillance cameras on universities 435 00:20:50,402 --> 00:20:51,979 – when you face a bigger threat 436 00:20:51,979 --> 00:20:56,332 ... let's say we have a coup d'etat in my country. 437 00:20:56,332 --> 00:20:59,582 That surveillance camera information becomes really really different 438 00:20:59,582 --> 00:21:01,844 from having just a couple of eyes watching them. 439 00:21:01,844 --> 00:21:03,661 What people are really saying, I think, 440 00:21:03,661 --> 00:21:05,901 when they don't care about their right to privacy is 441 00:21:05,901 --> 00:21:08,703 “I'm not like those bad people. 442 00:21:08,703 --> 00:21:11,703 "I'm a good person. I'm a law-abiding citizen.” 443 00:21:11,703 --> 00:21:13,071 Which is a meaningless concept. 444 00:21:13,071 --> 00:21:14,077 Everybody has secrets. 445 00:21:14,077 --> 00:21:16,001 Everybody keeps things to themselves. 446 00:21:16,001 --> 00:21:19,168 Whether or not they like to admit it, everybody puts pants on. 447 00:21:22,028 --> 00:21:24,439 And then we have these new tendencies 448 00:21:24,439 --> 00:21:28,498 like the Internet Research Agency and Cambridge Analytica 449 00:21:28,498 --> 00:21:31,779 finding ways to use our communication and social media 450 00:21:31,779 --> 00:21:34,005 and create these fake interactions 451 00:21:34,005 --> 00:21:36,675 where they can quickly create a profile of us 452 00:21:36,675 --> 00:21:40,344 of who we are, where we are in the political spectrum, 453 00:21:40,344 --> 00:21:42,014 what our tendencies are, 454 00:21:42,014 --> 00:21:44,523 and try to push us in new directions. 455 00:21:44,523 --> 00:21:47,096 And kind of control our view of the world. 456 00:21:47,096 --> 00:21:49,511 And you know, cyber is becoming so big today. 457 00:21:49,511 --> 00:21:52,658 It's becoming something that, a number of years ago, 458 00:21:52,658 --> 00:21:55,190 a short number of years ago, wasn't even a word. 459 00:21:55,190 --> 00:21:57,726 And now the cyber is so big. 460 00:21:57,726 --> 00:22:00,794 We conduct full-spectrum military cyberspace operations 461 00:22:00,794 --> 00:22:02,739 to enable actions in all domains, 462 00:22:02,739 --> 00:22:05,862 ensure the US and allied freedom of action in cyberspace, 463 00:22:05,862 --> 00:22:08,216 and deny the same to any adversary. 464 00:22:08,536 --> 00:22:11,397 Breaking news about Russian interference in our election. 465 00:22:11,397 --> 00:22:13,935 FBI now investigating Vladimir Putin. 466 00:22:13,935 --> 00:22:16,734 And as President Obama promises to retaliate for the cyber attack, 467 00:22:16,734 --> 00:22:19,419 the Russian President continues to deny he ordered it. 468 00:22:22,052 --> 00:22:23,675 Cyber warfare is really cheap. 469 00:22:23,675 --> 00:22:25,916 It requires very little equipment. 470 00:22:25,916 --> 00:22:29,526 It's very quiet. It's easily deniable. 471 00:22:29,526 --> 00:22:31,683 And so it becomes a really powerful tool 472 00:22:31,683 --> 00:22:33,993 for state actors and corporations to use, 473 00:22:33,993 --> 00:22:37,204 because it's very easy for them to just brush it off after 474 00:22:37,204 --> 00:22:39,904 and say “we never did this” or “we don't know who did this.” 475 00:22:42,316 --> 00:22:45,796 Nation states are actively at cyber war with each other. 476 00:22:45,796 --> 00:22:49,032 They each have their own dedicated cyber armies 477 00:22:49,032 --> 00:22:52,418 for purposes of espionage, for purposes of sabotage. 478 00:22:52,418 --> 00:22:54,486 It goes from intelligence gathering 479 00:22:54,486 --> 00:22:57,976 to, really, destroying nuclear programs - as they've done in Iran. 480 00:22:57,976 --> 00:23:00,733 And probably a whole bunch of other things we don't know about. 481 00:23:00,733 --> 00:23:03,850 Because they are so secretive... because they're so easy to hide. 482 00:23:03,850 --> 00:23:08,427 Everything run by a state in this area is run in a very military, 483 00:23:08,427 --> 00:23:10,157 or corporate way. 484 00:23:10,157 --> 00:23:13,495 There are people, y'know, doing shift work. 485 00:23:13,495 --> 00:23:16,829 There are very clear plans and strategies. 486 00:23:16,829 --> 00:23:19,361 Which means that they'll be working 487 00:23:19,361 --> 00:23:22,511 more efficiently towards an actual goal. 488 00:23:22,511 --> 00:23:26,650 The state can also use all of these techniques that it's developed 489 00:23:26,650 --> 00:23:28,720 against the civilian population. 490 00:23:28,720 --> 00:23:31,228 Against any actors it feels are a threat. 491 00:23:31,228 --> 00:23:34,080 Since hacking and compromising someone digitally 492 00:23:34,080 --> 00:23:36,796 is such an abstract thing, 493 00:23:36,796 --> 00:23:41,472 it will probably be easier to pull the trigger on someone, 494 00:23:41,472 --> 00:23:44,297 even if you're not exactly sure if they're 495 00:23:44,297 --> 00:23:46,057 the person you're looking for. 496 00:23:46,057 --> 00:23:47,880 This isn't like conventional warfare either. 497 00:23:47,880 --> 00:23:50,923 They can act in a way that obscures the origins of the attack, 498 00:23:50,923 --> 00:23:53,632 and they're not held to any standards of transparency 499 00:23:53,632 --> 00:23:55,670 or accountability on the world stage. 500 00:23:55,670 --> 00:23:57,710 If we're talking about a government that has no problems 501 00:23:57,710 --> 00:23:59,080 sending drones into a country, 502 00:23:59,080 --> 00:24:00,365 I mean... obviously they're not going to 503 00:24:00,365 --> 00:24:03,904 feel any need to have to answer to their hacking activities. 504 00:24:03,904 --> 00:24:05,566 It's very likely that we'll see a rise 505 00:24:05,566 --> 00:24:10,011 in groups using cyber-warfare to advance their own political gains, 506 00:24:10,011 --> 00:24:12,131 or to counter-attack repression. 507 00:24:14,407 --> 00:24:17,359 It’s often said that there’s no such thing as perfect security. 508 00:24:17,359 --> 00:24:19,550 All systems contain potential vulnerabilities 509 00:24:19,550 --> 00:24:22,659 that can be exploited by determined and capable adversaries. 510 00:24:22,659 --> 00:24:24,976 And when you choose to go up against the state, 511 00:24:24,976 --> 00:24:27,551 you’ve chosen an adversary that is both. 512 00:24:27,551 --> 00:24:30,151 Dozens of FBI agents targeted alleged members 513 00:24:30,151 --> 00:24:31,911 of a loose-knit hacking group. 514 00:24:31,911 --> 00:24:35,116 Armed with search warrants, agents hit six homes in New York, 515 00:24:35,116 --> 00:24:37,332 along with locations across the country. 516 00:24:37,332 --> 00:24:40,096 The best we can do is develop security protocols 517 00:24:40,096 --> 00:24:42,123 that are adequate for the task at hand. 518 00:24:42,123 --> 00:24:44,624 This means being constantly aware of the risks involved 519 00:24:44,624 --> 00:24:46,584 with the actions that we carry out, 520 00:24:46,584 --> 00:24:50,107 and understanding what steps that we can take to mitigate those risks. 521 00:24:50,107 --> 00:24:51,488 When it comes to communication, 522 00:24:51,488 --> 00:24:54,003 this means using methods and tools that are available 523 00:24:54,003 --> 00:24:56,754 to thwart interception and mass data collection 524 00:24:56,754 --> 00:24:59,130 in order to at least make things as difficult and expensive 525 00:24:59,130 --> 00:25:01,057 for our enemies as possible. 526 00:25:01,061 --> 00:25:04,604 How would they tell you to access the material on this phone? 527 00:25:05,844 --> 00:25:07,352 I think they would say what they've said, 528 00:25:07,352 --> 00:25:08,613 which I believe is in good faith. 529 00:25:08,613 --> 00:25:11,939 That we have designed this in response to what we believe to be 530 00:25:11,939 --> 00:25:16,851 the demands of our customers to be immune to any government warrant, 531 00:25:16,851 --> 00:25:20,258 or our (the manufacturer's) efforts to get into that phone. 532 00:25:20,492 --> 00:25:23,589 It’s also important to remember that this truth cuts both ways. 533 00:25:23,589 --> 00:25:26,740 As infallible as the systems of social control may appear, 534 00:25:26,740 --> 00:25:29,712 they too have vulnerabilities that are just waiting to be exploited 535 00:25:29,712 --> 00:25:31,904 by determined and capable adversaries. 536 00:25:31,904 --> 00:25:33,931 Let’s hope we can rise to the challenge. 537 00:25:34,728 --> 00:25:38,799 Someone has broken into the national bank – the Federal Reserve. 538 00:25:38,799 --> 00:25:43,865 A Twenty-First Century thief breaking into files, not into metal safes. 539 00:25:45,175 --> 00:25:47,476 I think there's a lot of interesting things 540 00:25:47,476 --> 00:25:50,305 that anarchist or anti-fascist collectives 541 00:25:50,305 --> 00:25:52,558 could do with hacking for their movements. 542 00:25:52,558 --> 00:25:55,091 But something I think is more interesting to me is: 543 00:25:55,091 --> 00:25:58,070 how can we use technology, 544 00:25:58,070 --> 00:26:00,865 and use hacking skills to come up with new ways 545 00:26:00,865 --> 00:26:04,435 to connect to each other, in a global movement 546 00:26:04,435 --> 00:26:08,088 where we can come to agreements together in a way that's safe 547 00:26:08,088 --> 00:26:09,591 ... that doesn't expose us, 548 00:26:09,591 --> 00:26:12,095 that doesn't put us at risk of surveillance? 549 00:26:12,995 --> 00:26:16,444 We should begin with the assumption that the Internet is hostile territory. 550 00:26:16,444 --> 00:26:18,430 It's an ongoing state of war. 551 00:26:18,430 --> 00:26:22,610 Military and law enforcement are using it as a tool for social control. 552 00:26:22,610 --> 00:26:24,149 But it doesn't have to be this way. 553 00:26:24,149 --> 00:26:26,620 And hackers and activists, we could use it to undermine 554 00:26:26,620 --> 00:26:28,534 and subvert these systems of power. 555 00:26:28,534 --> 00:26:31,456 We could create secure communication networks 556 00:26:31,456 --> 00:26:33,282 to coordinate the next big demonstration. 557 00:26:33,282 --> 00:26:37,505 But you certainly would have to be aware of encryption, 558 00:26:37,505 --> 00:26:41,306 of using proxy servers... of using software like Tor. 559 00:26:41,306 --> 00:26:42,495 You have to be able to protect yourself. 560 00:26:42,495 --> 00:26:45,329 Because if not, they're going to use it against us. 561 00:26:45,329 --> 00:26:49,312 I think the first step for any radical to protect themselves on the Internet 562 00:26:49,312 --> 00:26:51,510 is to understand their threat model. 563 00:26:51,510 --> 00:26:52,890 There's a really great resource 564 00:26:52,890 --> 00:26:55,017 that the Electronic Frontier Foundation has 565 00:26:55,017 --> 00:26:57,596 on figuring out your threat model. 566 00:26:57,596 --> 00:27:00,727 And they cover a lot of what you need to be thinking about with these things. 567 00:27:01,757 --> 00:27:07,177 There's this software called Tor that is very good to anonymize yourself 568 00:27:07,177 --> 00:27:09,455 if you want to do something over the Internet. 569 00:27:09,455 --> 00:27:13,105 People are recommending a messaging app for cell phones named Signal. 570 00:27:13,605 --> 00:27:18,428 The Tor browser, which when you install it and when you start it up, 571 00:27:18,428 --> 00:27:22,708 it sets up a connection to a decentralized network. 572 00:27:22,708 --> 00:27:26,394 And then your communication will go via this network 573 00:27:26,394 --> 00:27:28,050 in a number of different hops, 574 00:27:28,050 --> 00:27:30,829 so that if you're browsing to a website, 575 00:27:30,829 --> 00:27:32,532 it's not possible for that website 576 00:27:32,532 --> 00:27:35,202 to actually tell where you're coming from. 577 00:27:35,202 --> 00:27:37,614 One of the most important things that we really need to do 578 00:27:37,614 --> 00:27:39,641 is segment our identities online. 579 00:27:39,641 --> 00:27:41,741 And so don't re-use identities. 580 00:27:41,741 --> 00:27:43,286 Don't make them last for a long time. 581 00:27:43,286 --> 00:27:46,417 You might have a public identity, which you carefully curate, 582 00:27:46,417 --> 00:27:50,489 and then create yourself new identities to really target 583 00:27:50,489 --> 00:27:52,478 special operations that you wanna do. 584 00:27:52,478 --> 00:27:54,168 Special events that happen. 585 00:27:54,168 --> 00:27:56,327 If there's some protest going on, 586 00:27:56,327 --> 00:27:57,829 maybe make a new identity. 587 00:27:57,829 --> 00:27:59,332 It makes things a little bit difficult 588 00:27:59,332 --> 00:28:01,685 because we do tend to operate on a trust basis, 589 00:28:01,685 --> 00:28:03,484 and you need to re-build these connections. 590 00:28:03,484 --> 00:28:08,058 But definitely it's the only way to make sure that you stay protected. 591 00:28:08,058 --> 00:28:11,637 If you have for some reason linked 592 00:28:11,637 --> 00:28:16,538 your regular identity with your Internet persona, 593 00:28:16,538 --> 00:28:19,504 it's going to bring problems if some kind of neo-nazi 594 00:28:19,504 --> 00:28:24,865 wants to publish that information on a board or whatever. 595 00:28:24,865 --> 00:28:28,919 Within the hacker community there's a strong ethos of 596 00:28:28,919 --> 00:28:29,889 shutting the hell up. 597 00:28:29,889 --> 00:28:31,549 Don't talk about things that you've done. 598 00:28:31,549 --> 00:28:36,300 And it comes back to this idea that your identity is really not that important. 599 00:28:36,300 --> 00:28:39,986 Forget the fame.... do it for the actual purpose of the thing you wanna do. 600 00:28:39,986 --> 00:28:41,650 But don't actually care about 601 00:28:41,650 --> 00:28:44,410 whether or not people really will know that it's you. 602 00:28:44,410 --> 00:28:46,312 Don't tell your friends... don't talk. 603 00:28:46,312 --> 00:28:47,783 Shut the hell up. 604 00:28:47,783 --> 00:28:50,743 Use really strong passwords, and a password manager. 605 00:28:50,743 --> 00:28:53,709 That's a really typical avenue that doxxing happens through, 606 00:28:53,709 --> 00:28:56,246 is just people finding your simple password 607 00:28:56,246 --> 00:28:58,076 and gaining access to your accounts. 608 00:28:58,076 --> 00:29:02,598 Use two-factor authentication on all accounts that you can. 609 00:29:02,598 --> 00:29:04,456 If you're trying to learn how to hack, 610 00:29:04,456 --> 00:29:06,442 you are going to have to learn how to program. 611 00:29:06,442 --> 00:29:07,986 How to computer program. 612 00:29:07,986 --> 00:29:12,090 And if you can learn how to develop websites and run servers, 613 00:29:12,090 --> 00:29:14,250 you could look at other people's code 614 00:29:14,250 --> 00:29:15,979 and spot the mistakes that they've made 615 00:29:15,979 --> 00:29:19,025 that allow you to exploit and leverage that vulnerability. 616 00:29:19,965 --> 00:29:22,292 Re-install your computer as often as you can. 617 00:29:22,292 --> 00:29:25,336 Try out new operating systems. 618 00:29:25,336 --> 00:29:27,124 If you've never used Linux, install it. 619 00:29:27,124 --> 00:29:31,374 If you've used Linux before, install another distribution of Linux. 620 00:29:31,374 --> 00:29:35,036 If you've always used Mac OS, maybe try Windows. 621 00:29:35,036 --> 00:29:38,108 Just try new things and don't be afraid to break it, 622 00:29:38,108 --> 00:29:40,064 because in the end if the computer breaks 623 00:29:40,064 --> 00:29:42,972 you can always just reinstall the operating system. 624 00:29:42,972 --> 00:29:46,991 Try the different tutorials you can find on Kali Linux, 625 00:29:46,991 --> 00:29:48,907 and really try and attack your own systems. 626 00:29:49,957 --> 00:29:52,040 Try to think outside the box. 627 00:29:52,040 --> 00:29:55,194 In that way, y'know, hacking is a lot like anarchy 628 00:29:55,194 --> 00:29:57,095 – things are what you make of it. 629 00:29:58,285 --> 00:30:01,697 It's not only about us getting more involved 630 00:30:01,697 --> 00:30:03,577 in technology and using technology. 631 00:30:03,577 --> 00:30:06,184 We also have to bring the politics to technology. 632 00:30:06,184 --> 00:30:08,459 We have to connect with the spaces 633 00:30:08,459 --> 00:30:11,459 where free software is being developed 634 00:30:11,459 --> 00:30:15,243 and make our politics a part of that space. 635 00:30:15,243 --> 00:30:17,323 And I think that's something that's happening, right? 636 00:30:17,323 --> 00:30:21,115 We can see that in a lot of the free software communities. 637 00:30:21,115 --> 00:30:22,856 But it's something we need more of. 638 00:30:23,516 --> 00:30:25,989 Decentralized, ideologically-driven hacker collectives, 639 00:30:25,989 --> 00:30:29,266 if we unite our efforts we could, without any resources whatsoever 640 00:30:29,266 --> 00:30:32,214 can dismantle a corporation, humiliate a politician. 641 00:30:32,214 --> 00:30:34,842 And independent hackers, we have the advantage 642 00:30:34,842 --> 00:30:37,082 since we're not doing it for a paycheck. 643 00:30:37,082 --> 00:30:40,369 We're not doing it for any kind of allegiance to a country. 644 00:30:40,369 --> 00:30:42,034 We're up all night. 645 00:30:42,034 --> 00:30:44,103 We're breaking into systems because we love it. 646 00:30:44,103 --> 00:30:46,901 Because the thrill of breaking into anything that they can build 647 00:30:46,901 --> 00:30:51,925 while being able to undermine their systems of control is a better driver, 648 00:30:51,925 --> 00:30:55,118 a better incentive for hackers than a paycheck 649 00:30:55,118 --> 00:30:56,578 or... America. 650 00:30:56,578 --> 00:30:58,213 If you take the offensive and hack, 651 00:30:58,213 --> 00:31:01,069 expose and destroy these systems of the rich and powerful, 652 00:31:01,069 --> 00:31:03,072 we could drive them offline. 653 00:31:03,072 --> 00:31:06,710 Hack the planet! Hack the planet! 654 00:31:09,801 --> 00:31:12,023 As a deepening awareness has emerged of the role 655 00:31:12,023 --> 00:31:13,102 that Russian hackers played 656 00:31:13,102 --> 00:31:16,042 in swaying the 2016 US Presidential election, 657 00:31:16,042 --> 00:31:18,562 and facebook has been pressured to release information 658 00:31:18,562 --> 00:31:21,523 on the Kremlin’s widespread usage of its targeted ads function 659 00:31:21,523 --> 00:31:22,984 as a means of exacerbating tensions 660 00:31:22,984 --> 00:31:25,702 and sewing political discord among the American public, 661 00:31:25,702 --> 00:31:27,970 hacking has moved from the margins of popular culture 662 00:31:27,970 --> 00:31:30,237 to the center of mainstream political discourse. 663 00:31:30,237 --> 00:31:33,283 If our movements of resistance have any hope of remaining relevant 664 00:31:33,283 --> 00:31:35,304 in this rapidly shifting political climate, 665 00:31:35,304 --> 00:31:38,005 it is vitally important that we understand the ways in which 666 00:31:38,005 --> 00:31:40,927 power is restructuring itself in our current digital age, 667 00:31:40,927 --> 00:31:43,707 and adapt our theory and practice accordingly. 668 00:31:43,707 --> 00:31:45,841 So at this point, we’d like to remind you 669 00:31:45,841 --> 00:31:47,792 that Trouble is intended to be watched in groups, 670 00:31:47,792 --> 00:31:49,132 and to be used as a resource 671 00:31:49,132 --> 00:31:51,407 to promote discussion and collective organizing. 672 00:31:51,407 --> 00:31:53,964 Are you interested in upping your digital security, 673 00:31:53,964 --> 00:31:56,440 or exploring the ways in which you can better incorporate 674 00:31:56,440 --> 00:31:59,686 an offensive online strategy to your organizing campaigns? 675 00:31:59,686 --> 00:32:01,789 Consider getting together with some comrades, 676 00:32:01,789 --> 00:32:04,759 screening this film, discussing how this might be done, 677 00:32:04,759 --> 00:32:07,560 and possibly pairing it with an info-session on how to use Tor, 678 00:32:07,560 --> 00:32:10,290 and how to encrypt your communication devices. 679 00:32:10,600 --> 00:32:13,637 Interested in running regular screenings of Trouble at your campus, 680 00:32:13,637 --> 00:32:15,542 infoshop, community center, 681 00:32:15,542 --> 00:32:17,568 or even just at your home with friends? 682 00:32:17,568 --> 00:32:18,978 Become a Trouble-Maker! 683 00:32:18,978 --> 00:32:20,398 For 10 bucks a month, 684 00:32:20,398 --> 00:32:22,834 we’ll hook you up with an advanced copy of the show 685 00:32:22,834 --> 00:32:25,029 and a screening kit featuring additional resources 686 00:32:25,029 --> 00:32:27,666 and some questions you can use to get a discussion going. 687 00:32:27,666 --> 00:32:30,870 If you can’t afford to support us financially, no worries! 688 00:32:30,870 --> 00:32:34,807 You can stream and/or download all our content for free off our website: 689 00:32:36,709 --> 00:32:40,692 If you’ve got any suggestions for show topics, or just want to get in touch, 690 00:32:40,692 --> 00:32:43,247 drop us a line at trouble@sub.media. 691 00:32:43,247 --> 00:32:45,439 We’d like to remind you that our fundraiser 692 00:32:45,439 --> 00:32:47,910 to grow our subMedia collective is still ongoing. 693 00:32:47,910 --> 00:32:50,067 We will be doing one final push in December, 694 00:32:50,067 --> 00:32:52,542 and hope to reach our goals by the end of the year. 695 00:32:52,542 --> 00:32:56,162 To help make sure this happens, go to sub.media/donate 696 00:32:56,162 --> 00:32:59,631 and become a monthly sustainer for as little as $2 per month. 697 00:32:59,631 --> 00:33:02,591 As always, we’re excited to see that people have been 698 00:33:02,591 --> 00:33:04,237 supporting and screening our work, 699 00:33:04,237 --> 00:33:06,891 and wanna give a big shout out to new troublemaker chapters 700 00:33:06,891 --> 00:33:10,857 in Vancouver, Prince George, Seattle, Bloomington, Brighton, 701 00:33:10,857 --> 00:33:13,912 Ithaca, Quebec City, Prescott and Edinburgh. 702 00:33:13,912 --> 00:33:15,829 If you’ve been organizing screenings in your town 703 00:33:15,829 --> 00:33:18,750 and we haven’t given you a shout-out, let us know! 704 00:33:18,750 --> 00:33:21,126 We will be taking the month of December off, 705 00:33:21,126 --> 00:33:23,038 and will be back with a fresh season of Trouble, 706 00:33:23,038 --> 00:33:27,189 plus a ton of fresh new subMedia content, starting in January. 707 00:33:27,189 --> 00:33:30,505 This episode would not have been possible without the generous support of 708 00:33:30,505 --> 00:33:34,239 Nicholas, Josh, Avispa Midia, Peter and Biella. 709 00:33:34,239 --> 00:33:36,411 Now get out there, and make some trouble!