Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Transcript of Digital Resistance
nodes with power
And then it happened... a door opened to a world...
rushing through the phone line like heroin through an addict's veins
, an electronic pulse is sent out,
from the day-to-day incompetencies is sought... a board is found.
"This is it...
this is where I belong
The Mentor [from LoD] , Conscience of a Hacker 
This is our world now...
the world of the electron and the switch
, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons, and you call us criminals.
... and you call us criminals.
after knowledge... and you call us criminals. We exist without skin color, without nationality, without religious bias... and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet we're the criminals.
Yes, I am a criminal. My crime is that of curiosity
. My crime is that of judging people by what they say and think, not what they look like.
My crime is that of outsmarting you, something that you will never forgive me for.
I am a hacker, and this is my manifesto.
You may stop this individual, but you can't stop us all... after all, we're all alike.
WikiLeaks is not quite an organization; it is better described as a media insurgency.
a new space
free flow of information
individual nodes can broadcast to the entire network
all decision making resides with the ends (nodes) while the middle is as non-specialised as possible
PC + modem = trouble
Commodore 64 
Hayes smartmodem 
irrelevance of the state
net as electronic frontier - allusion to the wild west
network architecture formats the flow of information
in the beginning was
Don’t damage computer systems you break into (including crashing them);
don’t change the information in those systems (except for altering logs to cover your tracks); and share information.
[ in Khatchadourian]
the defining human struggle not as left versus right, or faith versus reason, but as individual versus institution
social capital based on reciprocity
414s, LoD, MoD, cDc
recognition and bragging rights based on exploits
hacks the first iteration of the Enigma
builder of the Bombe - automated decryption of subsequent iterations of the Enigma
hacking into phone switches
hacking into network control mainframes
hacking into government servers
War Games 
hacking enters popular culture
introduction of electronic phone network switchboards
the hacker zines
Volume One, Issue One, Phile 1 of 8
Welcome to the Phrack Inc. Philes. Basically, we are a group of phile writers
who have combined our philes and are distributing them in a group. This
newsletter-type project is home-based at Metal Shop. If you or your group are
interested in writing philes for Phrack Inc. you, your group, your BBS, or any
other credits will be included. These philes may include articles on telcom
(phreaking/hacking), anarchy (guns and death & destruction) or kracking. Other
topics will be allowed also to an certain extent. If you feel you have some
material that's original, please call and we'll include it in the next issue
possible. Also, you are welcomed to put up these philes on your BBS/AE/Catfur/
Etc. The philes will be regularly available on Metal Shop. If you wish to say
in the philes that your BBS will also be sponsering Phrack Inc., please leave
feedback to me, Taran King stating you'd like your BBS in the credits. Later on.
as modus operandi
black vs white hat
nmap appears on film
[2006 - present]
case: 'Collateral Murder' video
Electronic Civil Disobedience
Electronic Disturbance Theater 
product of cDc
2003 - present
Operation Payback 
DDoS on multiple targets
using the Low Orbit Ion Cannon software
do you remember
This issue is Volume One, Issue One, released on November 17, 1985. Included are:
1 This Introduction to Phrack Inc. by Taran King
2 SAM Security Article by Spitfire Hacker
3 Boot Tracing on Apple by Cheap Shades
4 The Fone Phreak's Revenge by Iron Soldier
5 MCI International Cards by Knight Lightning
6 How to Pick Master Locks by Gin Fizz and Ninja NYC
7 How to Make an Acetylene Bomb by The Clashmaster
8 School/College Computer Dial-Ups by Phantom Phreaker
Call Metal Shop and leave feedback saying the phile topic and where you got these philes to get your article in Phrack Inc.
METAL SHOP SYSOP
If it is true information we don't care where it comes from. Let people fight with the truth, and when the bodies are cleared there will be bullets of truth everywhere, that's fine.
Dr Teodor Mitew
think of the JP Barlow manifesto
the PC revolution leads to the appearance of a
The Mentor [from LoD] , Conscience of a Hacker 
[I describe this] as a censorship pyramid. It's quite interesting. So, on the top of the pyramid there are the murders of journalists and publishers. And the next level there is political attacks on journalists and publishers. So you think, what is a legal attack? A legal attack is simply a delayed use of coercive force.
Which doesn't necessarily result in murder but may result in incarceration or asset seizure. So the next level down, and remember the volume... the area of the pyramid.... volume of the pyramid! The volume of the pyramid increases significantly as you go down from the peak. And in this example that means that the number of acts of censorship also increases as you go down. So there are very few people who are murdered, there are a few people who suffer legal... there is a few number of public legal attacks on individuals and corporations, and then at the next level there is a tremendous amount of self censorship, and this self censorship occurs in part because people don't want to move up into the upper parts of the pyramid. They don't want to come to legal attacks or uses of coercive force. But they also don't want to be killed.
So that discourages people from behaving... and then there are other forms of self censorship that are concerned about missing out on business deals, missing out on promotions and those are even more significant because they are lower down the pyramid. At the very bottom - which is the largest volume - is all those people who cannot read, do not have access to print, do not have access to fast communications or where there is no profitable industry in providing that.
So we took the position that we would need to have a publishing system whose only defense was anonymity...
the bullets of truth:
case: WikiLeaks Cables
the bullets of truth:
251,287 documents, from 28th December 1966 to 28th February 2010
case: Edward Snowden [NSA leaks]
[2013 - ongoing]
Snowden sure is a dissident defector, and boy is he ever. Americans don’t even know how to think about characters like Snowden — the American Great and the Good are blundering around on the public stage like blacked-out drunks, blithering self-contradictory rubbish. It’s all “gosh he’s such a liar” and “give us back our sinister felon,” all while trying to swat down the jets of South American presidents.
Then there’s Julian Assange. Yeah, him, the silver-haired devil, the Mycroft Holmes of the Ecuadorian Embassy. Bradley Manning’s not at all NSA material, he’s just a leaky clerk with a thumb-drive. But Julian’s quite a lot closer to the NSA — because he’s a career cypherpunk. Julian has turned out to be a Tim Leary at the NSA’s psychiatric convention. He’s a lasting embarrassment who also spiked their Kool-Aid. Crushing Julian, cutting his funding, that stuff didn’t help one bit. He’s still got a roof and a keyboard. That’s all he ever seems to need.
More astonishing yet: this guy Assange, and his tiny corps of hacker myrmidons, actually managed to keep Edward Snowden out of US custody. Not only did Assange find an effective bolthole for himself, he also faked one up on the fly for this younger guy. Assange liberated Snowden, who really is NSA, or rather a civilian outsourced contractor for the NSA, like there’s any practical difference.
It’s incredible to me that, among the eight zillion civil society groups on the planet that hate and fear spooks and police spies, not one of them could offer Snowden one shred of practical help, except for Wikileaks.
This valiant service came from Julian Assange, a dude who can’t even pack his own suitcase without having a fit.
You can see that in the recent epic photo of Richard Stallman — the Saint Francis of Free Software, the kind of raw crank who preaches to birds and wanders the planet shoeless – shoulder-to-shoulder with an unshaven Assange, sporting his manly work shirt. The two of them, jointly holding up a little propaganda pic of Edward Snowden.
They have the beatific look of righteousness rewarded. Che Guevara in his starred beret had more self-doubt than these guys. They are thrilled with themselves.
People, you couldn’t trust any of these three guys to go down to the corner grocery for a pack of cigarettes. Stallman would bring you tiny peat-pots of baby tobacco plants, then tell you to grow your own. Assange would buy the cigarettes, but smoke them all himself while coding up something unworkable. And Ed would set fire to himself, to prove to an innocent mankind that tobacco is a monstrous and cancerous evil that must be exposed at all costs.
And yet the three of them together, they look just amazing.
They are fantastic figures, like the promise of otherworldly aid from a superhero comic. They are visibly stronger than they’ve ever been before. They have the initiative in a world afflicted with comprehensive helplessness.
And there’s more coming. Lots, lots more.