[Script Info] Title: [Events] Format: Layer, Start, End, Style, Name, MarginL, MarginR, MarginV, Effect, Text Dialogue: 0,0:00:09.57,0:00:20.94,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:00:20.94,0:00:22.84,Default,,0000,0000,0000,,Hi, my name is Molly Sauter. Dialogue: 0,0:00:22.84,0:00:26.34,Default,,0000,0000,0000,,I'm currently a grad student at MIT in comparative media studies Dialogue: 0,0:00:26.34,0:00:30.33,Default,,0000,0000,0000,,and I do research at the center for civic media at the media lab. Dialogue: 0,0:00:30.33,0:00:35.45,Default,,0000,0000,0000,,This talk is going to be laying out an analytical framework Dialogue: 0,0:00:35.45,0:00:37.17,Default,,0000,0000,0000,,that I've been working on for a while Dialogue: 0,0:00:37.17,0:00:40.58,Default,,0000,0000,0000,,of the ethical analysis of activist DDoS actions. Dialogue: 0,0:00:40.58,0:00:45.02,Default,,0000,0000,0000,,And though distributed denial of service attacks have been used Dialogue: 0,0:00:45.02,0:00:49.20,Default,,0000,0000,0000,,as a tool of digital activism for roughly the past 2.5 decades, Dialogue: 0,0:00:49.20,0:00:52.77,Default,,0000,0000,0000,,the past couple of years we have seen this huge explosion of the use Dialogue: 0,0:00:52.77,0:00:54.88,Default,,0000,0000,0000,,and the tactic and the popularization of the tactic Dialogue: 0,0:00:54.88,0:00:57.52,Default,,0000,0000,0000,,as well as a sharp increase in the attention Dialogue: 0,0:00:57.52,0:01:00.69,Default,,0000,0000,0000,,its use attracts for media and state actors. Dialogue: 0,0:01:00.69,0:01:03.69,Default,,0000,0000,0000,,All this attention has brought a lot of criticism and Dialogue: 0,0:01:03.69,0:01:07.75,Default,,0000,0000,0000,,a lot of sort of support from various people in the digital space, Dialogue: 0,0:01:07.75,0:01:09.58,Default,,0000,0000,0000,,including digital activists. Dialogue: 0,0:01:09.58,0:01:14.87,Default,,0000,0000,0000,,However both DDoS's critics and DDoS's proponents seek to declare the tactic Dialogue: 0,0:01:14.87,0:01:21.09,Default,,0000,0000,0000,,as a whole as good or bad, without a nuance understanding the variety of circumstances in contexts Dialogue: 0,0:01:21.09,0:01:24.04,Default,,0000,0000,0000,,that can render the tactics use ethical or unethical. Dialogue: 0,0:01:24.04,0:01:27.22,Default,,0000,0000,0000,,So in this talk I'm gonna lay down the preliminaries for a framework Dialogue: 0,0:01:27.22,0:01:33.13,Default,,0000,0000,0000,,by which to perform an ethical analysis of an activist DDoS action in individual use context. Dialogue: 0,0:01:33.82,0:01:36.92,Default,,0000,0000,0000,,We're gonna go through a brief technical legal note Dialogue: 0,0:01:36.92,0:01:40.10,Default,,0000,0000,0000,,which I assume I'm gonna be able to skip for this audience, Dialogue: 0,0:01:40.10,0:01:46.17,Default,,0000,0000,0000,,criticisms of activist DDoS actions that have been thrown out in the past. Dialogue: 0,0:01:46.17,0:01:49.75,Default,,0000,0000,0000,,Then we're gonna get in to the analytical framework that I'm proposing Dialogue: 0,0:01:49.75,0:01:52.57,Default,,0000,0000,0000,,and then I'm gonna tell you a little about where I'm gonna take this Dialogue: 0,0:01:52.57,0:01:55.95,Default,,0000,0000,0000,,as I write my thesis, which this is. Dialogue: 0,0:01:56.66,0:01:59.99,Default,,0000,0000,0000,,So everybody knows what a DDoS attack is, right? Dialogue: 0,0:01:59.99,0:02:01.81,Default,,0000,0000,0000,,Raise your hand if you know what it is. Dialogue: 0,0:02:01.81,0:02:04.04,Default,,0000,0000,0000,,Awesome, I can totally skip this slide. Dialogue: 0,0:02:04.04,0:02:06.41,Default,,0000,0000,0000,,{\i1}laughter{\i0} Dialogue: 0,0:02:07.32,0:02:10.71,Default,,0000,0000,0000,,DDoS action, distributed denial of service action by which Dialogue: 0,0:02:10.71,0:02:14.87,Default,,0000,0000,0000,,you seek to monopulize the resources of a server or other resource Dialogue: 0,0:02:14.87,0:02:18.32,Default,,0000,0000,0000,,with your resources to prevent other people from using it. Dialogue: 0,0:02:18.32,0:02:20.21,Default,,0000,0000,0000,,Good, we're happy? We're happy. Dialogue: 0,0:02:20.21,0:02:23.63,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:02:23.63,0:02:27.30,Default,,0000,0000,0000,,Alright, brief legal note: unlike this cat I am not a lawyer. Dialogue: 0,0:02:27.30,0:02:29.25,Default,,0000,0000,0000,,I do not have a law degree, haven't studied law. Dialogue: 0,0:02:29.25,0:02:31.62,Default,,0000,0000,0000,,I worked at a law school for a while but that doesn't make me a lawyer. Dialogue: 0,0:02:31.62,0:02:37.04,Default,,0000,0000,0000,,So I'm gonna talk about legal things in this talk, do not take it as legal advice. Dialogue: 0,0:02:37.04,0:02:42.90,Default,,0000,0000,0000,,So DDoS actions and DDoS attacks are illegal in most but not all jurisdictions. Dialogue: 0,0:02:42.90,0:02:45.62,Default,,0000,0000,0000,,In the US they are prosecuted as felonies. Dialogue: 0,0:02:45.62,0:02:51.94,Default,,0000,0000,0000,,Under title 10 section 1030 of the US Code which is complicated and which I won't read. Dialogue: 0,0:02:51.94,0:02:55.87,Default,,0000,0000,0000,,But just so that everyone is aware and this does have a bearing on my talk later: Dialogue: 0,0:02:55.87,0:03:00.51,Default,,0000,0000,0000,,these things are very illegal and this has severe precautions Dialogue: 0,0:03:00.51,0:03:07.82,Default,,0000,0000,0000,,for how organizers should treat them as they engage with them in their protests. Dialogue: 0,0:03:07.82,0:03:13.29,Default,,0000,0000,0000,,So one of the major criticisms of DDoS actions is that they constitute censorship. Dialogue: 0,0:03:13.29,0:03:20.12,Default,,0000,0000,0000,,This is a very popular criticism among sort of "oldschool" hacktivists Dialogue: 0,0:03:20.12,0:03:23.31,Default,,0000,0000,0000,,like cult of the dead cow hacktivism or other groups like that Dialogue: 0,0:03:23.31,0:03:26.18,Default,,0000,0000,0000,,which have denounced the tactic as straight-up censorship. Dialogue: 0,0:03:26.18,0:03:31.62,Default,,0000,0000,0000,,Basically they say you are impinging the movement of bits on the network and that's wrong. Dialogue: 0,0:03:31.62,0:03:34.94,Default,,0000,0000,0000,,If we're going to be engaging in this type of electronic activism Dialogue: 0,0:03:34.94,0:03:39.35,Default,,0000,0000,0000,,we want to be encouring the movement of bits on the network, not stopping them. Dialogue: 0,0:03:39.35,0:03:44.84,Default,,0000,0000,0000,,This criticism privileges the integrity of the network and the rights of specific individuals Dialogue: 0,0:03:44.89,0:03:47.63,Default,,0000,0000,0000,,to unfettered flows of information, Dialogue: 0,0:03:47.72,0:03:54.16,Default,,0000,0000,0000,,and it privileges that overpolitical ideals of activism in civil disobedience present in activist DDoS actions. Dialogue: 0,0:03:54.20,0:04:01.12,Default,,0000,0000,0000,,This criticism also raises very specific unanswered questions about who can engange in censorship. Dialogue: 0,0:04:01.12,0:04:08.67,Default,,0000,0000,0000,,Can in fact non-state actors and non-corporate actors be engaged as censorious bodies? Dialogue: 0,0:04:08.82,0:04:15.03,Default,,0000,0000,0000,,And while DDoS is undeniably a disruptive tactic, does disruption of speech, Dialogue: 0,0:04:15.03,0:04:19.41,Default,,0000,0000,0000,,particularly in context where the target has many other speech outlets, Dialogue: 0,0:04:19.41,0:04:21.97,Default,,0000,0000,0000,,always equal a denial of speech? Dialogue: 0,0:04:21.97,0:04:26.12,Default,,0000,0000,0000,,For instance when this tactic is trained against a corporate target Dialogue: 0,0:04:26.12,0:04:30.41,Default,,0000,0000,0000,,while certain aspects of that organization's presence may be disrupted Dialogue: 0,0:04:30.41,0:04:35.51,Default,,0000,0000,0000,,their abiltiy to engange in political speech through the press and other outlets is not. Dialogue: 0,0:04:35.51,0:04:42.60,Default,,0000,0000,0000,,Therefore the criticism that you're engaging in censorship by waging a DDoS action sort of falls flat. Dialogue: 0,0:04:42.60,0:04:49.07,Default,,0000,0000,0000,,Though the criticism is appropriate in some cases, especially when it's used against organizations Dialogue: 0,0:04:49.07,0:04:54.17,Default,,0000,0000,0000,,that primarily exist online such as ISPs or independent blogs. Dialogue: 0,0:04:55.07,0:05:01.52,Default,,0000,0000,0000,,Second major criticism is a sort of a revamping of this very old debate in activism. Dialogue: 0,0:05:01.52,0:05:07.78,Default,,0000,0000,0000,,Direct action or symbolic/attention-oriented activism, which is better? Dialogue: 0,0:05:07.78,0:05:12.43,Default,,0000,0000,0000,,And the anwswer is, one isn't really better, they are sort of different. Dialogue: 0,0:05:13.10,0:05:16.18,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:05:16.18,0:05:17.44,Default,,0000,0000,0000,,Thank you. Dialogue: 0,0:05:17.44,0:05:22.93,Default,,0000,0000,0000,,One group that's been particularly vocal about this in the past is a group called the critical art ensemble Dialogue: 0,0:05:22.93,0:05:27.94,Default,,0000,0000,0000,,which helped pioneer the idea of electronic civil disobedience in the 90th. Dialogue: 0,0:05:27.94,0:05:33.31,Default,,0000,0000,0000,,And they critized groups like the electronic disturbance theatre for their use of DDoS in their actions. Dialogue: 0,0:05:33.31,0:05:36.15,Default,,0000,0000,0000,,Saying that the use is ineffectual because corporations Dialogue: 0,0:05:36.15,0:05:41.29,Default,,0000,0000,0000,,and states are now ??? waging "media war" with activists. Dialogue: 0,0:05:41.29,0:05:44.77,Default,,0000,0000,0000,,And it is ineffectual when compared with direct action. Dialogue: 0,0:05:44.77,0:05:49.99,Default,,0000,0000,0000,,In addition to just sort of being mean to attention-oriented activism for no reason, Dialogue: 0,0:05:49.99,0:05:56.08,Default,,0000,0000,0000,,this criticism ignores the fact that DDoS is often used as a tool of direct action Dialogue: 0,0:05:56.08,0:06:01.38,Default,,0000,0000,0000,,Such as when it was used by the electrohippies in 1999 against the Internet Dialogue: 0,0:06:01.39,0:06:04.59,Default,,0000,0000,0000,,that the world trade organization was using during their annual meeting Dialogue: 0,0:06:04.59,0:06:07.69,Default,,0000,0000,0000,,or other groups that I'm gonna talk later about in this talk. Dialogue: 0,0:06:07.69,0:06:13.00,Default,,0000,0000,0000,,The CAE's conception of DDoS also leaves the tactic Dialogue: 0,0:06:13.00,0:06:15.62,Default,,0000,0000,0000,,out of the context of larger actions that it is associated with. Dialogue: 0,0:06:15.62,0:06:23.04,Default,,0000,0000,0000,,This tactic is pretty much never and frankly should never be used as the sole tactic in a campaign. Dialogue: 0,0:06:23.04,0:06:26.77,Default,,0000,0000,0000,,It should always be used in the context with other tactics Dialogue: 0,0:06:26.77,0:06:31.54,Default,,0000,0000,0000,,and it gets its ethical and politcal viability from the context in which it is used. Dialogue: 0,0:06:31.54,0:06:35.56,Default,,0000,0000,0000,,Not simply because of things inherent to itself. Dialogue: 0,0:06:35.56,0:06:40.36,Default,,0000,0000,0000,,Third major criticism: what is a successful DDoS action? Dialogue: 0,0:06:40.36,0:06:48.72,Default,,0000,0000,0000,,Basically it's really hard to take down a large corporate website with an all volunteer manual DDoS action. Dialogue: 0,0:06:48.72,0:06:51.98,Default,,0000,0000,0000,,If you and all your friends are really just sitting in your chairs Dialogue: 0,0:06:51.98,0:06:58.17,Default,,0000,0000,0000,,hitting refresh a bunch of times on like paypal.com you're not gonna bring it down. Dialogue: 0,0:06:58.17,0:07:02.33,Default,,0000,0000,0000,,So then what are we going to consider a successful DDoS action Dialogue: 0,0:07:02.33,0:07:07.93,Default,,0000,0000,0000,,if we can't rely on downtime to be a measure of success? Dialogue: 0,0:07:07.93,0:07:10.59,Default,,0000,0000,0000,,So there are a couple of different answers to this questions. Dialogue: 0,0:07:10.59,0:07:16.31,Default,,0000,0000,0000,,The first is we want to look at the value of the tactic as something which draws and focuses attention. Dialogue: 0,0:07:16.31,0:07:20.13,Default,,0000,0000,0000,,And this is way more important now that it has become Dialogue: 0,0:07:20.13,0:07:24.62,Default,,0000,0000,0000,,much more of a media magnet than necessarily it was maybe 10 years ago. Dialogue: 0,0:07:24.62,0:07:29.92,Default,,0000,0000,0000,,Another use for the tactic is the biographical impact on the participants Dialogue: 0,0:07:29.92,0:07:33.46,Default,,0000,0000,0000,,and expanding opportunities for engagement and participation. Dialogue: 0,0:07:33.46,0:07:38.78,Default,,0000,0000,0000,,If you have never participated in a political action and you get to participate in a DDoS action Dialogue: 0,0:07:38.78,0:07:43.42,Default,,0000,0000,0000,,and you're in the IRC channel with all of these new friends who you didn't know you had Dialogue: 0,0:07:43.42,0:07:46.13,Default,,0000,0000,0000,,who you didn't know had the political views that you had Dialogue: 0,0:07:46.13,0:07:49.67,Default,,0000,0000,0000,,and you didn't know were willing to participate in ways that you are. Dialogue: 0,0:07:49.67,0:07:53.35,Default,,0000,0000,0000,,That has a huge biographical impact on you and it helps you consider yourself. Dialogue: 0,0:07:53.35,0:07:57.33,Default,,0000,0000,0000,,And activism helps you move up the ??? the ladder of engagement. Dialogue: 0,0:07:57.33,0:08:03.07,Default,,0000,0000,0000,,This enables what Ricardo Dominguez of the EDT calls a permanent culture of resistance Dialogue: 0,0:08:03.07,0:08:10.18,Default,,0000,0000,0000,,where resisting modes of power and resisting oppressive systems is part of the culture. Dialogue: 0,0:08:10.18,0:08:16.00,Default,,0000,0000,0000,,And it isn't simple something you do for special on weekends but it is something that you do all the time. Dialogue: 0,0:08:16.00,0:08:18.27,Default,,0000,0000,0000,,And the value of this symbolic resistence is Dialogue: 0,0:08:18.27,0:08:23.21,Default,,0000,0000,0000,,not necessarily its overt effect on the system that its ostensibly targets Dialogue: 0,0:08:23.21,0:08:28.21,Default,,0000,0000,0000,,but rather its effects on participants and on the reflective fields that surround it as it occurs Dialogue: 0,0:08:28.21,0:08:30.20,Default,,0000,0000,0000,,including media and culture. Dialogue: 0,0:08:30.20,0:08:36.92,Default,,0000,0000,0000,,Basically DDoS acts is a tool for the relevation of what James Scott called hidden transcripts of resistance. Dialogue: 0,0:08:36.92,0:08:39.52,Default,,0000,0000,0000,,It serves as an open action where an individual participant Dialogue: 0,0:08:39.52,0:08:43.51,Default,,0000,0000,0000,,can join a community of resistance with others. Dialogue: 0,0:08:44.90,0:08:46.78,Default,,0000,0000,0000,,Moving on to the second major section: Dialogue: 0,0:08:46.78,0:08:48.90,Default,,0000,0000,0000,,the analytical framework that I'm presenting. Dialogue: 0,0:08:48.90,0:08:52.100,Default,,0000,0000,0000,,There are four major parts of it that I'm gonna talk about in this talk. Dialogue: 0,0:08:52.100,0:08:58.15,Default,,0000,0000,0000,,I'm hoping to expand to maybe five or six later, but not right now. Dialogue: 0,0:08:58.15,0:09:01.56,Default,,0000,0000,0000,,The first is intended effects and actual effects. Dialogue: 0,0:09:01.56,0:09:05.57,Default,,0000,0000,0000,,The second is contacts within a greater campaign which we've already talked about a little bit. Dialogue: 0,0:09:05.57,0:09:09.22,Default,,0000,0000,0000,,The third is technology being utilized in the action. Dialogue: 0,0:09:09.22,0:09:13.80,Default,,0000,0000,0000,,And the fourth is the specific participant and organizer populations ??at play??. Dialogue: 0,0:09:13.80,0:09:16.68,Default,,0000,0000,0000,,I'm gonna go through these one by one. Dialogue: 0,0:09:16.68,0:09:19.28,Default,,0000,0000,0000,,The first is intended and actual effects. Dialogue: 0,0:09:19.28,0:09:26.14,Default,,0000,0000,0000,,What I mean by this is what the group that is waging the action intends to happen by its use of the action Dialogue: 0,0:09:26.14,0:09:28.07,Default,,0000,0000,0000,,what actually happens. Dialogue: 0,0:09:28.07,0:09:31.44,Default,,0000,0000,0000,,So there is a good example of this from 1997. Dialogue: 0,0:09:31.44,0:09:40.05,Default,,0000,0000,0000,,It's called the IGC Euskal Herria Journal action and that's Basque and I totally butchered it but I'm not Basque. Dialogue: 0,0:09:40.05,0:09:44.76,Default,,0000,0000,0000,,Basically what happened was there was an ISP called IGC Dialogue: 0,0:09:44.76,0:09:50.23,Default,,0000,0000,0000,,which was hosting a Basque newspaper publication, an online newspaper. Dialogue: 0,0:09:50.23,0:09:54.34,Default,,0000,0000,0000,,This was during a time in Spain when the Basques were not terribly popular. Dialogue: 0,0:09:54.34,0:09:58.07,Default,,0000,0000,0000,,There was a lot of violence going around Basque seperatives actions. Dialogue: 0,0:09:58.07,0:10:06.77,Default,,0000,0000,0000,,A popular DDoS action was started by people who I don't know, so don't ask me, Dialogue: 0,0:10:06.77,0:10:10.88,Default,,0000,0000,0000,,to pressure IGC to take this website down, Dialogue: 0,0:10:10.88,0:10:16.50,Default,,0000,0000,0000,,the Euskal Herria Journal website down. People didn't like it. Dialogue: 0,0:10:16.50,0:10:18.88,Default,,0000,0000,0000,,It got a lot of popular support. Dialogue: 0,0:10:18.88,0:10:22.28,Default,,0000,0000,0000,,Actually several major newspapers in Spain eventually Dialogue: 0,0:10:22.28,0:10:27.27,Default,,0000,0000,0000,,published target email addresses for email bombs and other things Dialogue: 0,0:10:27.27,0:10:29.74,Default,,0000,0000,0000,,until they eventually decided that was probably a bad idea Dialogue: 0,0:10:29.74,0:10:32.94,Default,,0000,0000,0000,,and they retracted their support. Dialogue: 0,0:10:32.94,0:10:37.14,Default,,0000,0000,0000,,But the stated goal of the actions was always to get the website offline. Dialogue: 0,0:10:37.14,0:10:39.92,Default,,0000,0000,0000,,People didn't like it, they wanted it gone. Dialogue: 0,0:10:39.92,0:10:46.53,Default,,0000,0000,0000,,Eventually it did go down because IGC was flooded with these packets and mail bombs and it was horrible. Dialogue: 0,0:10:46.53,0:10:52.64,Default,,0000,0000,0000,,It rendered inaccessible the websites and emails of their over 13000 subscribers Dialogue: 0,0:10:52.64,0:10:56.68,Default,,0000,0000,0000,,and they couldn't function as a business while this attack was going on. Dialogue: 0,0:10:56.68,0:11:00.67,Default,,0000,0000,0000,,So they did eventually stop hosting the site but under firm protest. Dialogue: 0,0:11:00.67,0:11:05.62,Default,,0000,0000,0000,,As an ISP IGC exists primarily in fact entirely online. Dialogue: 0,0:11:05.62,0:11:11.19,Default,,0000,0000,0000,,Removing its ability to function online removes its core as an organization Dialogue: 0,0:11:11.19,0:11:13.03,Default,,0000,0000,0000,,and its ability to function. Dialogue: 0,0:11:13.03,0:11:17.28,Default,,0000,0000,0000,,So the goal of this action was to remove content Dialogue: 0,0:11:17.28,0:11:23.68,Default,,0000,0000,0000,,by waging the action as long as the DDoS was successful the content was removed. Dialogue: 0,0:11:23.68,0:11:30.70,Default,,0000,0000,0000,,So actually the goal of the action was the permanent imposition of the state of the action. Dialogue: 0,0:11:30.70,0:11:35.61,Default,,0000,0000,0000,,Its intended effects were its actual effects as it was occurring. Dialogue: 0,0:11:35.61,0:11:38.59,Default,,0000,0000,0000,,This fits very well with the criticism that we saw before. Dialogue: 0,0:11:38.59,0:11:41.30,Default,,0000,0000,0000,,This was actually just plain censorship. Dialogue: 0,0:11:41.30,0:11:44.05,Default,,0000,0000,0000,,This was people saying: I don't like that you're hosting that content Dialogue: 0,0:11:44.05,0:11:50.39,Default,,0000,0000,0000,,therefore I'm going to to make you not host that content until you don't host it anymore. Dialogue: 0,0:11:50.39,0:11:55.07,Default,,0000,0000,0000,,This is not very cool and is unethical and bad. Dialogue: 0,0:11:55.90,0:12:01.93,Default,,0000,0000,0000,,The second example that I have up here is the EDT electronic disturbance to Lufthansa action from 2001. Dialogue: 0,0:12:01.93,0:12:07.65,Default,,0000,0000,0000,,This is an example where disrupting content does not equal silencing speech Dialogue: 0,0:12:07.65,0:12:11.06,Default,,0000,0000,0000,,as opposed to the example that I just showed which was depressing. Dialogue: 0,0:12:11.06,0:12:16.52,Default,,0000,0000,0000,,So in this example rather than removing content from the Internet Dialogue: 0,0:12:16.52,0:12:21.26,Default,,0000,0000,0000,,the goal of this action was to raise awareness of Lufthansa's Dialogue: 0,0:12:21.26,0:12:25.74,Default,,0000,0000,0000,,allowing the German government to deport immigrants using its flights. Dialogue: 0,0:12:25.74,0:12:31.46,Default,,0000,0000,0000,,It's part of a much greater action called the deportation class action. Dialogue: 0,0:12:31.46,0:12:36.77,Default,,0000,0000,0000,,While the Lufthansa website itself was rendered inaccessible for brief periods of time, Dialogue: 0,0:12:36.77,0:12:40.89,Default,,0000,0000,0000,,the actual communications of the airline, its ability to fly planes, Dialogue: 0,0:12:40.89,0:12:45.97,Default,,0000,0000,0000,,maintain normal operations and communicate internally with itself and with the media Dialogue: 0,0:12:45.97,0:12:49.62,Default,,0000,0000,0000,,remained for all practical purposes unaffected. Dialogue: 0,0:12:49.62,0:12:52.50,Default,,0000,0000,0000,,So while the stated goal of the Lufthansa action was Dialogue: 0,0:12:52.50,0:12:56.84,Default,,0000,0000,0000,,to draw public attention to a specific aspect of the Airline's business model Dialogue: 0,0:12:56.84,0:13:00.49,Default,,0000,0000,0000,,and through focused attention changed that corporations behavior Dialogue: 0,0:13:00.49,0:13:02.77,Default,,0000,0000,0000,,it was actually rather successful in that. Dialogue: 0,0:13:02.77,0:13:08.21,Default,,0000,0000,0000,,The airline did eventually stop allowing the government to deport immigrants with its flights. Dialogue: 0,0:13:08.21,0:13:12.72,Default,,0000,0000,0000,,Though the action took place on the Internet the effect it sort of had Dialogue: 0,0:13:12.72,0:13:17.81,Default,,0000,0000,0000,,was not limited to, was not even really present in the online space. Dialogue: 0,0:13:17.81,0:13:20.80,Default,,0000,0000,0000,,And in and of itself this action could not have achieved Dialogue: 0,0:13:20.80,0:13:23.76,Default,,0000,0000,0000,,what the electronic disturbance theatre set up to accomplish. Dialogue: 0,0:13:23.76,0:13:29.62,Default,,0000,0000,0000,,It took positive behavior on the part of Lufthansa for the deportation class action to achieve its goals Dialogue: 0,0:13:29.62,0:13:38.01,Default,,0000,0000,0000,,as opposed to the IGC example which was designed to accomplish its intended effects by gross fear. Dialogue: 0,0:13:38.01,0:13:44.53,Default,,0000,0000,0000,,So the third example I'm gonna talk about is something called toywar, or the etoy/toywar campaign. Dialogue: 0,0:13:44.53,0:13:51.86,Default,,0000,0000,0000,,The twelve days of Christmas campaign took place in 1999 and was an online attempt to draw attention to Dialogue: 0,0:13:51.86,0:13:56.16,Default,,0000,0000,0000,,a legal dispute between etoy which was a performance art collective Dialogue: 0,0:13:56.16,0:14:04.28,Default,,0000,0000,0000,,and eToys which was a toy company, an ecommerce company that sold toys online Dialogue: 0,0:14:04.28,0:14:07.70,Default,,0000,0000,0000,,and they were fighting over the domain etoy.com. Dialogue: 0,0:14:07.70,0:14:11.91,Default,,0000,0000,0000,,And writing about this is very kamikaze because etoy and eToys, Dialogue: 0,0:14:11.91,0:14:14.65,Default,,0000,0000,0000,,you have to be very careful. Dialogue: 0,0:14:14.65,0:14:21.20,Default,,0000,0000,0000,,So this action was designed to draw attention to that legal battle. Dialogue: 0,0:14:21.20,0:14:27.59,Default,,0000,0000,0000,,But it had the additional effect of having a fairly significant impact on eToys' bottom line Dialogue: 0,0:14:27.59,0:14:30.97,Default,,0000,0000,0000,,because it took place the twelve days before Christmas Dialogue: 0,0:14:30.97,0:14:33.70,Default,,0000,0000,0000,,which was the primary shopping season. Dialogue: 0,0:14:33.70,0:14:37.17,Default,,0000,0000,0000,,And it did have a major how their website ran. Dialogue: 0,0:14:37.17,0:14:44.60,Default,,0000,0000,0000,,So though their main goal was this attention-oriented campaign in targeting this ecommerce site Dialogue: 0,0:14:44.60,0:14:48.18,Default,,0000,0000,0000,,they were targeting the central purpose of their competitor. Dialogue: 0,0:14:48.18,0:14:53.46,Default,,0000,0000,0000,,They were attacking, they were going after what they were which is an online organization. Dialogue: 0,0:14:53.46,0:14:57.55,Default,,0000,0000,0000,,Etoy, the art ensemble, eventually triumphed in a court case Dialogue: 0,0:14:57.55,0:15:01.59,Default,,0000,0000,0000,,and claimed their role in the financial losses suffered by eToys Inc. Dialogue: 0,0:15:01.59,0:15:03.32,Default,,0000,0000,0000,,that occurred over the course of that actions. Dialogue: 0,0:15:03.32,0:15:05.64,Default,,0000,0000,0000,,Their stock price pretty much plummeted Dialogue: 0,0:15:05.64,0:15:11.00,Default,,0000,0000,0000,,which you can rather blame on the bubble or the action, whichever makes you feel better. Dialogue: 0,0:15:11.00,0:15:20.54,Default,,0000,0000,0000,,So in this instance we have a combining of direct action and attention-oriented activism into the same action. Dialogue: 0,0:15:20.54,0:15:24.97,Default,,0000,0000,0000,,The next part of the framework is context within a larger campaign. Dialogue: 0,0:15:24.97,0:15:27.64,Default,,0000,0000,0000,,As I said DDoS actions very rarely occur by themselves Dialogue: 0,0:15:27.64,0:15:31.07,Default,,0000,0000,0000,,and in fact if they did occur by themselves you'd probably never hear about them Dialogue: 0,0:15:31.07,0:15:33.42,Default,,0000,0000,0000,,because there would be no reason why that site you like Dialogue: 0,0:15:33.42,0:15:35.76,Default,,0000,0000,0000,,is down, it would just be down. Dialogue: 0,0:15:35.76,0:15:39.25,Default,,0000,0000,0000,,Like physical world sit-ins DDoS actions must be embedded Dialogue: 0,0:15:39.25,0:15:41.70,Default,,0000,0000,0000,,within a greater campaign of publicity and messaging Dialogue: 0,0:15:41.70,0:15:45.52,Default,,0000,0000,0000,,to ensure that content disruptions are registered by viewers Dialogue: 0,0:15:45.52,0:15:50.05,Default,,0000,0000,0000,,and passers-by as protest actions and not as mere technical glitches. Dialogue: 0,0:15:50.05,0:15:53.40,Default,,0000,0000,0000,,The EDT/Lufthansa campaign took place within the context of Dialogue: 0,0:15:53.40,0:15:55.84,Default,,0000,0000,0000,,a coordinated multi-pronged campaign Dialogue: 0,0:15:55.84,0:15:59.04,Default,,0000,0000,0000,,which included physical world actions at stock holder meetings, Dialogue: 0,0:15:59.04,0:16:02.37,Default,,0000,0000,0000,,press releases and the distribution of special seatback Dialogue: 0,0:16:02.37,0:16:05.72,Default,,0000,0000,0000,,information cards on Lufthansa airlines that explained Dialogue: 0,0:16:05.72,0:16:07.21,Default,,0000,0000,0000,,what the protest was about. Dialogue: 0,0:16:07.21,0:16:12.35,Default,,0000,0000,0000,,I don't know how they got them into the planes but they did end up in the planes somehow. Dialogue: 0,0:16:12.35,0:16:17.11,Default,,0000,0000,0000,,Similirarly toywar was also embedded within a larger campaign of press coverage. Dialogue: 0,0:16:17.11,0:16:20.86,Default,,0000,0000,0000,,They were covered by Wired, the New York Times, and the AP Dialogue: 0,0:16:20.86,0:16:24.31,Default,,0000,0000,0000,,and there were also solidarity actions and physical world actions Dialogue: 0,0:16:24.31,0:16:26.39,Default,,0000,0000,0000,,at court houses. Dialogue: 0,0:16:26.39,0:16:29.56,Default,,0000,0000,0000,,So if you are going for this type of action, Dialogue: 0,0:16:29.56,0:16:32.24,Default,,0000,0000,0000,,it has to be embedded within many other actions. Dialogue: 0,0:16:32.24,0:16:35.26,Default,,0000,0000,0000,,It can't just be your sole activist ??? Dialogue: 0,0:16:35.26,0:16:39.16,Default,,0000,0000,0000,,You have to use with a bunch of other tools as well. Dialogue: 0,0:16:39.16,0:16:42.96,Default,,0000,0000,0000,,The technology problem is a really interesting one. Dialogue: 0,0:16:42.96,0:16:47.37,Default,,0000,0000,0000,,As I mentioned it's really difficult for a purely volunteer-based DDoS action Dialogue: 0,0:16:47.37,0:16:49.42,Default,,0000,0000,0000,,to bring down a targeted site. Dialogue: 0,0:16:49.42,0:16:52.91,Default,,0000,0000,0000,,As a result we started to see the use of botnets, Dialogue: 0,0:16:52.91,0:16:56.09,Default,,0000,0000,0000,,traffic multipliers, automated attack tools and other exploits Dialogue: 0,0:16:56.09,0:17:01.37,Default,,0000,0000,0000,,to bring the power of such actions in line with the defenses employed by targets. Dialogue: 0,0:17:01.37,0:17:04.89,Default,,0000,0000,0000,,While the use of such technological tools doesn't automatically Dialogue: 0,0:17:04.89,0:17:08.47,Default,,0000,0000,0000,,negatively affect the validity of these actions, Dialogue: 0,0:17:08.47,0:17:12.40,Default,,0000,0000,0000,,the use of non-volunteer botnets is the one thing Dialogue: 0,0:17:12.40,0:17:14.09,Default,,0000,0000,0000,,that is particularly worrying. Dialogue: 0,0:17:14.09,0:17:17.62,Default,,0000,0000,0000,,And the other things do need to be considered within a larger context. Dialogue: 0,0:17:17.62,0:17:20.49,Default,,0000,0000,0000,,Volunteer botnets present their own ethical concerns Dialogue: 0,0:17:20.49,0:17:22.92,Default,,0000,0000,0000,,but are less immediately objectionable. Dialogue: 0,0:17:22.92,0:17:26.86,Default,,0000,0000,0000,,Like marches, sit-ins and other crowd-based tactics Dialogue: 0,0:17:26.86,0:17:30.44,Default,,0000,0000,0000,,DDoS actions gain their ethical and political validity Dialogue: 0,0:17:30.44,0:17:33.64,Default,,0000,0000,0000,,from large numbers of willing participants. Dialogue: 0,0:17:33.64,0:17:35.88,Default,,0000,0000,0000,,The use of traffic multipliers and exploits, Dialogue: 0,0:17:35.88,0:17:38.89,Default,,0000,0000,0000,,while tempting to achieve downtime, Dialogue: 0,0:17:38.89,0:17:46.53,Default,,0000,0000,0000,,undercuts claims by organizers that the actions represent a unified political voice of many different people. Dialogue: 0,0:17:46.53,0:17:50.57,Default,,0000,0000,0000,,So as an organizers, you would have to balance the Dialogue: 0,0:17:50.57,0:17:53.67,Default,,0000,0000,0000,,"do I want downtime at press coverage" or Dialogue: 0,0:17:53.67,0:17:57.10,Default,,0000,0000,0000,,"do I want to remain true to the number of participants Dialogue: 0,0:17:57.10,0:18:01.48,Default,,0000,0000,0000,,that I have and value their participation over publicity". Dialogue: 0,0:18:01.48,0:18:05.77,Default,,0000,0000,0000,,And this is something that lots of organizers have to deal with. Dialogue: 0,0:18:05.77,0:18:10.41,Default,,0000,0000,0000,,Non-volunteer botnets, such as those that were used over the course of Dialogue: 0,0:18:10.41,0:18:13.50,Default,,0000,0000,0000,,Anonymous's operation payback campaign in Dialogue: 0,0:18:13.50,0:18:15.69,Default,,0000,0000,0000,,addition to volunteer botnets, Dialogue: 0,0:18:15.69,0:18:17.17,Default,,0000,0000,0000,,they were used together, Dialogue: 0,0:18:17.17,0:18:19.82,Default,,0000,0000,0000,,present a serious ethical problem. Dialogue: 0,0:18:19.82,0:18:22.34,Default,,0000,0000,0000,,The use of someone else's technological resources Dialogue: 0,0:18:22.34,0:18:24.46,Default,,0000,0000,0000,,without their consent in a political action, Dialogue: 0,0:18:24.46,0:18:27.39,Default,,0000,0000,0000,,particularly one that carries high legal risk, Dialogue: 0,0:18:27.39,0:18:29.50,Default,,0000,0000,0000,,like DDoS actions do, Dialogue: 0,0:18:29.50,0:18:35.02,Default,,0000,0000,0000,,is a pretty extremely unethical action. Dialogue: 0,0:18:35.02,0:18:39.09,Default,,0000,0000,0000,,Moreover it cheapens the participation of activists Dialogue: 0,0:18:39.09,0:18:40.78,Default,,0000,0000,0000,,who are consensually participating and Dialogue: 0,0:18:40.78,0:18:43.92,Default,,0000,0000,0000,,makes it easier for critics to dismiss DDoS actions as Dialogue: 0,0:18:43.92,0:18:47.79,Default,,0000,0000,0000,,criminality cloaked in free speech. Dialogue: 0,0:18:47.79,0:18:51.01,Default,,0000,0000,0000,,Even though, again, it may be tempting to be like Dialogue: 0,0:18:51.01,0:18:53.39,Default,,0000,0000,0000,,"oh let's just rent this creepy-ass botnet Dialogue: 0,0:18:53.39,0:18:58.26,Default,,0000,0000,0000,,from wherever to bring down the site for five minutes" Dialogue: 0,0:18:58.26,0:19:02.89,Default,,0000,0000,0000,,Really not in fitting with ethical use of mass participation Dialogue: 0,0:19:02.89,0:19:05.49,Default,,0000,0000,0000,,in political activism. Dialogue: 0,0:19:05.49,0:19:09.40,Default,,0000,0000,0000,,This brings us to volunteer botnets such as those that were enabled Dialogue: 0,0:19:09.40,0:19:12.70,Default,,0000,0000,0000,,by the hive mind mode of low-orbit ion cannon, again, Dialogue: 0,0:19:12.70,0:19:14.46,Default,,0000,0000,0000,,during operation payback. Dialogue: 0,0:19:14.46,0:19:18.06,Default,,0000,0000,0000,,Participants could pledge their support to an action and then Dialogue: 0,0:19:18.06,0:19:19.59,Default,,0000,0000,0000,,basically walk away. Dialogue: 0,0:19:19.59,0:19:21.67,Default,,0000,0000,0000,,They could say "great, use my computer" Dialogue: 0,0:19:21.67,0:19:23.89,Default,,0000,0000,0000,,"to DDoS whatever you want" Dialogue: 0,0:19:23.89,0:19:27.67,Default,,0000,0000,0000,,"because I trust you and I believe that we are all fighting for the same cause" Dialogue: 0,0:19:27.67,0:19:30.94,Default,,0000,0000,0000,,"I'm gonna go walk the dog now" Dialogue: 0,0:19:30.94,0:19:33.20,Default,,0000,0000,0000,,So they pledge their support for an action and place Dialogue: 0,0:19:33.20,0:19:37.14,Default,,0000,0000,0000,,their computing resources under the control of the organizers of that action. Dialogue: 0,0:19:37.14,0:19:42.06,Default,,0000,0000,0000,,This places on those organizers a strong responsibility Dialogue: 0,0:19:42.06,0:19:45.36,Default,,0000,0000,0000,,to maintain open communication channels to participants Dialogue: 0,0:19:45.36,0:19:48.81,Default,,0000,0000,0000,,and to not make significant changes to the operation of the campaign Dialogue: 0,0:19:48.81,0:19:51.15,Default,,0000,0000,0000,,without the consent of those participants. Dialogue: 0,0:19:51.15,0:19:54.77,Default,,0000,0000,0000,,Changing plans, tactics or targets without the consent Dialogue: 0,0:19:54.77,0:19:57.91,Default,,0000,0000,0000,,of the participant population constitutes a major breach Dialogue: 0,0:19:57.91,0:20:03.01,Default,,0000,0000,0000,,of trust and really should not happen. Dialogue: 0,0:20:03.01,0:20:06.26,Default,,0000,0000,0000,,This brings us to the final ?? bit in the framework Dialogue: 0,0:20:06.26,0:20:08.08,Default,,0000,0000,0000,,which I'm going to go over in this talk Dialogue: 0,0:20:08.08,0:20:11.63,Default,,0000,0000,0000,,which is different participant and organizer populations. Dialogue: 0,0:20:11.63,0:20:14.55,Default,,0000,0000,0000,,The great thing about DDoS actions is that Dialogue: 0,0:20:14.55,0:20:16.50,Default,,0000,0000,0000,,they're relatively easy to join and Dialogue: 0,0:20:16.50,0:20:18.87,Default,,0000,0000,0000,,they're fairly relatively easy to wage in the first place Dialogue: 0,0:20:18.87,0:20:21.82,Default,,0000,0000,0000,,meaning many of these participants in these actions Dialogue: 0,0:20:21.82,0:20:26.99,Default,,0000,0000,0000,,are inexperienced and unaware of the risks they could potentially be taking Dialogue: 0,0:20:26.99,0:20:32.42,Default,,0000,0000,0000,,like accidentally committing a felony from the comfort of your own living room. Dialogue: 0,0:20:32.42,0:20:35.86,Default,,0000,0000,0000,,Therefore it is ??? on organizers to make sure Dialogue: 0,0:20:35.86,0:20:39.51,Default,,0000,0000,0000,,that all participants have enough information to usefully Dialogue: 0,0:20:39.51,0:20:43.01,Default,,0000,0000,0000,,consent to participate in such actions. Dialogue: 0,0:20:43.01,0:20:48.15,Default,,0000,0000,0000,,This includes information about risks that they could be taking Dialogue: 0,0:20:48.15,0:20:51.10,Default,,0000,0000,0000,,and ways to mitigate those risks. Dialogue: 0,0:20:51.10,0:20:53.87,Default,,0000,0000,0000,,This was a very big issue in the fallout from Dialogue: 0,0:20:53.87,0:20:55.40,Default,,0000,0000,0000,,operation payback. Dialogue: 0,0:20:55.40,0:20:58.36,Default,,0000,0000,0000,,when during the course of the campaign a great deal Dialogue: 0,0:20:58.36,0:21:02.22,Default,,0000,0000,0000,,of misinformation was present in organizing channels Dialogue: 0,0:21:02.22,0:21:05.84,Default,,0000,0000,0000,,and the use of the low-orbit ion cannon tool was encouraged Dialogue: 0,0:21:05.84,0:21:09.54,Default,,0000,0000,0000,,despite significant concerns about its security. Dialogue: 0,0:21:09.54,0:21:12.79,Default,,0000,0000,0000,,Training should be provided to participants in ways Dialogue: 0,0:21:12.79,0:21:15.39,Default,,0000,0000,0000,,to mitigate risk and support should be provided in the Dialogue: 0,0:21:15.39,0:21:17.87,Default,,0000,0000,0000,,event of arrest or other negative outcomes. Dialogue: 0,0:21:17.87,0:21:21.79,Default,,0000,0000,0000,,This is similar to the way the physical world activists provide Dialogue: 0,0:21:21.79,0:21:23.87,Default,,0000,0000,0000,,training for their participants in the Dialogue: 0,0:21:23.87,0:21:26.68,Default,,0000,0000,0000,,"we're gonna go outside today and we're gonna hold up Dialogue: 0,0:21:26.68,0:21:28.19,Default,,0000,0000,0000,,a bunch of signs and yell at some people. Dialogue: 0,0:21:28.19,0:21:30.07,Default,,0000,0000,0000,,These people may yell back. Dialogue: 0,0:21:30.07,0:21:32.34,Default,,0000,0000,0000,,These people may also try to physically harm us. Dialogue: 0,0:21:32.34,0:21:33.77,Default,,0000,0000,0000,,If you're totally not interested in that Dialogue: 0,0:21:33.77,0:21:35.90,Default,,0000,0000,0000,,that's ok, we still think you're cool." Dialogue: 0,0:21:35.90,0:21:38.85,Default,,0000,0000,0000,,There should be that type of effort to educate and Dialogue: 0,0:21:38.85,0:21:41.97,Default,,0000,0000,0000,,provide different channels for participation for electronic Dialogue: 0,0:21:41.97,0:21:46.23,Default,,0000,0000,0000,,civil disobedience in the same way there is in the physical world. Dialogue: 0,0:21:46.23,0:21:48.89,Default,,0000,0000,0000,,There are two big things that I want to do with this model Dialogue: 0,0:21:48.89,0:21:52.01,Default,,0000,0000,0000,,in the future as I continue to work on my thesis. Dialogue: 0,0:21:52.01,0:21:55.50,Default,,0000,0000,0000,,The first is: I want to develop an analysis for Dialogue: 0,0:21:55.50,0:21:56.99,Default,,0000,0000,0000,,state/state related actors, Dialogue: 0,0:21:56.99,0:22:00.47,Default,,0000,0000,0000,,particularly patriotic hackers Dialogue: 0,0:22:00.47,0:22:02.77,Default,,0000,0000,0000,,and see how they fit into this framework Dialogue: 0,0:22:02.77,0:22:05.54,Default,,0000,0000,0000,,and how the entrance of states into this area Dialogue: 0,0:22:05.54,0:22:08.30,Default,,0000,0000,0000,,affects the ethical validity of these actions Dialogue: 0,0:22:08.30,0:22:13.12,Default,,0000,0000,0000,,or whether we're just wandering full force into cyberwar territory there. Dialogue: 0,0:22:13.12,0:22:14.99,Default,,0000,0000,0000,,The second thing I want to do is adapt the framework Dialogue: 0,0:22:14.99,0:22:17.93,Default,,0000,0000,0000,,from a reflective model, which it currently is, Dialogue: 0,0:22:17.93,0:22:19.77,Default,,0000,0000,0000,,to a prescriptive model, Dialogue: 0,0:22:19.77,0:22:22.09,Default,,0000,0000,0000,,so be more useful to activists who want to Dialogue: 0,0:22:22.09,0:22:24.95,Default,,0000,0000,0000,,organize their own DDoS campaign and want to find out Dialogue: 0,0:22:24.95,0:22:28.65,Default,,0000,0000,0000,,how to do it effectively and ethically. Dialogue: 0,0:22:28.65,0:22:29.98,Default,,0000,0000,0000,,And that's actually it. Dialogue: 0,0:22:29.98,0:22:31.50,Default,,0000,0000,0000,,Who has questions? Dialogue: 0,0:22:31.50,0:22:42.20,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:22:42.20,0:22:43.78,Default,,0000,0000,0000,,Dude who stood up first. Dialogue: 0,0:22:43.78,0:22:46.08,Default,,0000,0000,0000,,{\i1}Mike{\i0}: No other questions. Dialogue: 0,0:22:46.08,0:22:48.26,Default,,0000,0000,0000,,Hi, I'm Mike. I'm from Poland. Dialogue: 0,0:22:48.26,0:22:51.51,Default,,0000,0000,0000,,I was heavily involved in the anti-ACTA campaign in Poland. Dialogue: 0,0:22:51.51,0:22:53.53,Default,,0000,0000,0000,,I was not doing any DDoSes, Dialogue: 0,0:22:53.53,0:22:55.55,Default,,0000,0000,0000,,I was doing the, you know, subject matter work. Dialogue: 0,0:22:55.55,0:22:57.91,Default,,0000,0000,0000,,{\i1}Molly{\i0}: You don't have to incriminate yourself in this talk. Dialogue: 0,0:22:57.91,0:23:01.51,Default,,0000,0000,0000,,{\i1}Mike{\i0}: Yes. But I can, right? Dialogue: 0,0:23:01.54,0:23:03.91,Default,,0000,0000,0000,,{\i1}laughter{\i0} Dialogue: 0,0:23:03.97,0:23:07.64,Default,,0000,0000,0000,,{\i1}Mike{\i0}: Thank you for this talk Dialogue: 0,0:23:07.64,0:23:11.41,Default,,0000,0000,0000,,because I feel there is much to little talking Dialogue: 0,0:23:11.41,0:23:17.90,Default,,0000,0000,0000,,about ethics in the whole DDoS and hacking area. Dialogue: 0,0:23:17.90,0:23:19.56,Default,,0000,0000,0000,,So thank you for this. Dialogue: 0,0:23:19.56,0:23:23.20,Default,,0000,0000,0000,,Second thing that I would like to add to this talk is that Dialogue: 0,0:23:23.20,0:23:26.55,Default,,0000,0000,0000,,I think the framework works quite well Dialogue: 0,0:23:26.55,0:23:31.44,Default,,0000,0000,0000,,because there is a criticism that I am going to make Dialogue: 0,0:23:31.44,0:23:33.48,Default,,0000,0000,0000,,about DDoS campaigns right now. Dialogue: 0,0:23:33.48,0:23:38.44,Default,,0000,0000,0000,,That is already kind of handled in this framework. Dialogue: 0,0:23:38.44,0:23:43.20,Default,,0000,0000,0000,,The criticism is that while the anti-ACTA campaign in Poland Dialogue: 0,0:23:43.20,0:23:46.53,Default,,0000,0000,0000,,was at full speed and doing stuff and people were Dialogue: 0,0:23:46.53,0:23:47.86,Default,,0000,0000,0000,,protesting on the streets, Dialogue: 0,0:23:47.86,0:23:52.15,Default,,0000,0000,0000,,suddenly Anonymous started DDoSing Polish government websites. Dialogue: 0,0:23:52.15,0:23:52.97,Default,,0000,0000,0000,,{\i1}Molly{\i0}: I've heard about. Dialogue: 0,0:23:52.97,0:23:58.29,Default,,0000,0000,0000,,{\i1}Mike{\i0}: And this had the exact opposite effect. Dialogue: 0,0:23:58.29,0:24:01.79,Default,,0000,0000,0000,,Maybe it was there, but I didn't see that in your presentation Dialogue: 0,0:24:01.79,0:24:04.42,Default,,0000,0000,0000,,that you have to be very very careful with Dialogue: 0,0:24:04.42,0:24:05.59,Default,,0000,0000,0000,,DDoS campaigns Dialogue: 0,0:24:05.59,0:24:09.68,Default,,0000,0000,0000,,because they can actually cause harm to the cause Dialogue: 0,0:24:09.68,0:24:11.34,Default,,0000,0000,0000,,that you're trying to do. Dialogue: 0,0:24:11.34,0:24:15.40,Default,,0000,0000,0000,,I think it was a little bit in the success part Dialogue: 0,0:24:15.40,0:24:18.14,Default,,0000,0000,0000,,but I don't think it was highlighted enough Dialogue: 0,0:24:18.14,0:24:19.57,Default,,0000,0000,0000,,that you have to be very careful Dialogue: 0,0:24:19.57,0:24:21.64,Default,,0000,0000,0000,,because there is this huge framework, Dialogue: 0,0:24:21.64,0:24:23.79,Default,,0000,0000,0000,,other actions that are happening. Dialogue: 0,0:24:23.79,0:24:26.62,Default,,0000,0000,0000,,And maybe, just maybe, doing DDoS right now Dialogue: 0,0:24:26.62,0:24:28.82,Default,,0000,0000,0000,,might actually harm because it will give the Dialogue: 0,0:24:28.82,0:24:31.27,Default,,0000,0000,0000,,government, as was this case, Dialogue: 0,0:24:31.27,0:24:34.69,Default,,0000,0000,0000,,the government the excuse to actually do bad stuff Dialogue: 0,0:24:34.70,0:24:35.99,Default,,0000,0000,0000,,that you don't want them to do. Dialogue: 0,0:24:35.99,0:24:38.35,Default,,0000,0000,0000,,Because they will say: "Oh they're DDoSing our websites." Dialogue: 0,0:24:38.35,0:24:40.56,Default,,0000,0000,0000,,"They are hackers and we don't have to do Dialogue: 0,0:24:40.56,0:24:42.77,Default,,0000,0000,0000,,anything good for them." Dialogue: 0,0:24:42.77,0:24:46.95,Default,,0000,0000,0000,,Well done, because the framework already kind of works for that. Thanks. Dialogue: 0,0:24:47.42,0:24:49.64,Default,,0000,0000,0000,,{\i1}Molly{\i0}: Yeah, I agree with that. Dialogue: 0,0:24:49.64,0:24:52.53,Default,,0000,0000,0000,,This tactic is right now extremely controversial Dialogue: 0,0:24:52.53,0:24:54.33,Default,,0000,0000,0000,,but people keep using it. Dialogue: 0,0:24:54.33,0:24:57.23,Default,,0000,0000,0000,,My view is that as long as we're gonna use it Dialogue: 0,0:24:57.23,0:24:59.58,Default,,0000,0000,0000,,we should at least be using it in some sort of Dialogue: 0,0:24:59.58,0:25:03.53,Default,,0000,0000,0000,,reflective way in which we consider our actions Dialogue: 0,0:25:03.53,0:25:06.78,Default,,0000,0000,0000,,before we just do them. Dialogue: 0,0:25:07.50,0:25:08.98,Default,,0000,0000,0000,,Dude over there. Dialogue: 0,0:25:08.98,0:25:10.94,Default,,0000,0000,0000,,{\i1}Male{\i0}: Hi, I just have a question. Dialogue: 0,0:25:10.94,0:25:18.83,Default,,0000,0000,0000,,You said that disrupting a business which just Dialogue: 0,0:25:18.83,0:25:23.05,Default,,0000,0000,0000,,relies on the Internet is unethical. Dialogue: 0,0:25:23.92,0:25:26.61,Default,,0000,0000,0000,,I just ask why you make this assumption. Dialogue: 0,0:25:26.61,0:25:28.93,Default,,0000,0000,0000,,I would make a different assumption. Dialogue: 0,0:25:28.93,0:25:32.97,Default,,0000,0000,0000,,I would have said that maybe running an unethical business Dialogue: 0,0:25:32.97,0:25:36.63,Default,,0000,0000,0000,,on the Internet is unethical and disrupting it is ethical. Dialogue: 0,0:25:36.63,0:25:39.71,Default,,0000,0000,0000,,{\i1}Molly{\i0}: So, really good point. Yay. Dialogue: 0,0:25:39.71,0:25:42.82,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:25:42.82,0:25:46.72,Default,,0000,0000,0000,,Something that I didn't maybe have make clear is that each of these bits Dialogue: 0,0:25:46.72,0:25:49.19,Default,,0000,0000,0000,,of the framework should not be taken as a Dialogue: 0,0:25:49.19,0:25:52.43,Default,,0000,0000,0000,,"oh you didn't do that, therefore you are totally unethical." Dialogue: 0,0:25:52.43,0:25:57.22,Default,,0000,0000,0000,,This should all be taken as sort of a big lump of stuff which you can Dialogue: 0,0:25:57.22,0:25:58.64,Default,,0000,0000,0000,,sort of massage and be like Dialogue: 0,0:25:58.64,0:26:02.24,Default,,0000,0000,0000,,"well, you're 60% here on that and 45% here on that Dialogue: 0,0:26:02.24,0:26:04.09,Default,,0000,0000,0000,,and we'll figure it out from there". Dialogue: 0,0:26:04.09,0:26:06.20,Default,,0000,0000,0000,,Yes, you're right. Dialogue: 0,0:26:06.20,0:26:08.32,Default,,0000,0000,0000,,That's actually sort of one of the issues that I'm really Dialogue: 0,0:26:08.32,0:26:11.70,Default,,0000,0000,0000,,interested in looking at in the WTO/electrohippies example Dialogue: 0,0:26:11.70,0:26:15.15,Default,,0000,0000,0000,,because I usually don't like it when people are like Dialogue: 0,0:26:15.15,0:26:19.06,Default,,0000,0000,0000,,"I'm gonna protest you by making you fall off the face of the planet" Dialogue: 0,0:26:19.06,0:26:22.01,Default,,0000,0000,0000,,That seems like a bit of an overkill to me. Dialogue: 0,0:26:22.01,0:26:28.24,Default,,0000,0000,0000,,On the other hand disrupting the Internet for the WTO meeting Dialogue: 0,0:26:28.24,0:26:31.70,Default,,0000,0000,0000,,at the Seattle World Trade Organization meeting Dialogue: 0,0:26:31.70,0:26:33.43,Default,,0000,0000,0000,,I'm kind of for that Dialogue: 0,0:26:33.43,0:26:37.74,Default,,0000,0000,0000,,that seems like a good use of resources to me. Dialogue: 0,0:26:37.74,0:26:42.34,Default,,0000,0000,0000,,So I'm very interested in pushing those weeds aside Dialogue: 0,0:26:42.34,0:26:45.94,Default,,0000,0000,0000,,and figuring out when exactly it's ok to basically Dialogue: 0,0:26:45.94,0:26:48.22,Default,,0000,0000,0000,,attack the root of something, Dialogue: 0,0:26:48.22,0:26:52.19,Default,,0000,0000,0000,,as opposed to having a more symbolic protest Dialogue: 0,0:26:52.19,0:26:53.88,Default,,0000,0000,0000,,which I'm generally more in favor of. Dialogue: 0,0:26:53.88,0:26:56.62,Default,,0000,0000,0000,,But you're right, I like you. Dialogue: 0,0:26:56.62,0:27:00.00,Default,,0000,0000,0000,,We're just gonna switch to this mic and then we'll bounce. Dialogue: 0,0:27:00.00,0:27:03.48,Default,,0000,0000,0000,,{\i1}Female{\i0}: I was wondering what your thoughts are on these action impacts Dialogue: 0,0:27:03.48,0:27:05.06,Default,,0000,0000,0000,,on non-participants. Dialogue: 0,0:27:05.06,0:27:08.94,Default,,0000,0000,0000,,Like say you DDoS eBay and then other companies lose business Dialogue: 0,0:27:08.94,0:27:12.34,Default,,0000,0000,0000,,or you say DDoS a health care provider and people can't access health care. Dialogue: 0,0:27:12.34,0:27:14.44,Default,,0000,0000,0000,,Is that a factor in your mind? Dialogue: 0,0:27:14.44,0:27:17.99,Default,,0000,0000,0000,,{\i1}Molly{\i0}: Well, you sort of brought up two wildly divergent examples of Dialogue: 0,0:27:17.99,0:27:24.72,Default,,0000,0000,0000,,eBay which means I can't buy my awesome collectable Battlestar Galactica glasses anymore Dialogue: 0,0:27:24.72,0:27:27.79,Default,,0000,0000,0000,,and my health care provider which means I can't get my tests Dialogue: 0,0:27:27.79,0:27:30.92,Default,,0000,0000,0000,,from that thing that I had that may be cancer. Dialogue: 0,0:27:30.92,0:27:33.78,Default,,0000,0000,0000,,Those seem like very divergent targets to me , Dialogue: 0,0:27:33.78,0:27:35.77,Default,,0000,0000,0000,,just to address that off the bet. Dialogue: 0,0:27:35.77,0:27:39.28,Default,,0000,0000,0000,,Second point, yes, collateral damage is something that does Dialogue: 0,0:27:39.28,0:27:41.34,Default,,0000,0000,0000,,definitely need to be considered. Dialogue: 0,0:27:41.34,0:27:44.86,Default,,0000,0000,0000,,But it is not actually sort of specific to DDoS in itself. Dialogue: 0,0:27:44.86,0:27:47.66,Default,,0000,0000,0000,,Like if you just stay sit-in at a lunch counter, Dialogue: 0,0:27:47.66,0:27:49.94,Default,,0000,0000,0000,,I just wanted to eat lunch. Dialogue: 0,0:27:49.94,0:27:52.57,Default,,0000,0000,0000,,I'm not a bad guy, I really just wanted lunch. Dialogue: 0,0:27:52.57,0:27:56.54,Default,,0000,0000,0000,,But you have a political voice and you're using it to sit-in at this lunch counter. Dialogue: 0,0:27:56.54,0:28:02.16,Default,,0000,0000,0000,,That needs to be part of the overall consideration of Dialogue: 0,0:28:02.16,0:28:05.26,Default,,0000,0000,0000,,"do we think this is an appropriate tactic for whatever question is Dialogue: 0,0:28:05.26,0:28:08.69,Default,,0000,0000,0000,,that you're trying to address with your activism at this time." Dialogue: 0,0:28:08.69,0:28:12.22,Default,,0000,0000,0000,,Because not all tactics are appropriate for all questions. Dialogue: 0,0:28:13.68,0:28:14.57,Default,,0000,0000,0000,,{\i1}Female{\i0}: Thanks. Dialogue: 0,0:28:14.57,0:28:15.87,Default,,0000,0000,0000,,{\i1}Molly{\i0}: Ok, cool. Dialogue: 0,0:28:17.64,0:28:19.03,Default,,0000,0000,0000,,That guy. Dialogue: 0,0:28:22.35,0:28:25.43,Default,,0000,0000,0000,,Sorry, we have a question from the Internet. Dialogue: 0,0:28:25.43,0:28:26.82,Default,,0000,0000,0000,,It hasn't gotten to speak yet. Dialogue: 0,0:28:26.82,0:28:29.90,Default,,0000,0000,0000,,{\i1}Male{\i0}: I have this kind of comment and question. Dialogue: 0,0:28:29.90,0:28:31.31,Default,,0000,0000,0000,,Thank you very much for your talk, Dialogue: 0,0:28:31.31,0:28:34.03,Default,,0000,0000,0000,,it was very original material and I enjoyed it. Dialogue: 0,0:28:34.03,0:28:37.66,Default,,0000,0000,0000,,But however you announced to talk about the ethics of DDoS Dialogue: 0,0:28:37.66,0:28:40.07,Default,,0000,0000,0000,,but you didn't say anything about ethics at all Dialogue: 0,0:28:40.07,0:28:42.61,Default,,0000,0000,0000,,except for some personal beliefs. Dialogue: 0,0:28:43.04,0:28:43.96,Default,,0000,0000,0000,,{\i1}Molly{\i0}: {\i1}laughs{\i0} Dialogue: 0,0:28:43.96,0:28:49.55,Default,,0000,0000,0000,,What kind of ethical framework would you actually suggest to use to analyze DDoS? Dialogue: 0,0:28:49.55,0:28:54.13,Default,,0000,0000,0000,,{\i1}Molly{\i0}: The four bits of the framework that I set out. Dialogue: 0,0:28:54.13,0:28:57.25,Default,,0000,0000,0000,,I'm looking at you because you were talking, not because you're the Internet. Dialogue: 0,0:28:57.25,0:29:00.01,Default,,0000,0000,0000,,{\i1}laughter{\i0} Dialogue: 0,0:29:00.01,0:29:06.44,Default,,0000,0000,0000,,Basically you cannot just say that DDoS is ethical or unethical. Dialogue: 0,0:29:06.44,0:29:10.34,Default,,0000,0000,0000,,The way that I'm looking at, you have to look at it Dialogue: 0,0:29:10.34,0:29:15.14,Default,,0000,0000,0000,,in the context of these at least four aspects, possibly more. Dialogue: 0,0:29:15.14,0:29:18.19,Default,,0000,0000,0000,,But you can't just simply slam your hand down and be like Dialogue: 0,0:29:18.19,0:29:22.50,Default,,0000,0000,0000,,"nope, this one action which actually has very little political value Dialogue: 0,0:29:22.50,0:29:25.80,Default,,0000,0000,0000,,because it's just a bunch of bits swimming around a bunch of tubes, Dialogue: 0,0:29:25.80,0:29:31.44,Default,,0000,0000,0000,,has real ethical value." Dialogue: 0,0:29:31.44,0:29:34.01,Default,,0000,0000,0000,,I'm sure a lot of people were gonna be like Dialogue: 0,0:29:34.01,0:29:37.36,Default,,0000,0000,0000,,"she's gonna say that DDoS is right or wrong one way or another Dialogue: 0,0:29:37.36,0:29:40.16,Default,,0000,0000,0000,,and then I will feel good and/or bad about myself." Dialogue: 0,0:29:40.16,0:29:41.71,Default,,0000,0000,0000,,{\i1}laughter{\i0} Dialogue: 0,0:29:41.71,0:29:45.60,Default,,0000,0000,0000,,I'm sorry, that wasn't what was gonna happen. Dialogue: 0,0:29:45.60,0:29:48.63,Default,,0000,0000,0000,,I'm far more interesting in looking at these very nuanced questions Dialogue: 0,0:29:48.63,0:29:52.30,Default,,0000,0000,0000,,of how this fits into political economy and protest methodology Dialogue: 0,0:29:52.30,0:29:53.98,Default,,0000,0000,0000,,which is far squishier than just saying Dialogue: 0,0:29:53.98,0:29:57.01,Default,,0000,0000,0000,,this is ethical or unethical straight off the bet. Dialogue: 0,0:29:57.01,0:29:59.38,Default,,0000,0000,0000,,I hope that answers the Internet's question. Dialogue: 0,0:29:59.38,0:30:02.13,Default,,0000,0000,0000,,{\i1}Male{\i0}: Yeah, I would also come back to the ethics. Dialogue: 0,0:30:02.13,0:30:06.64,Default,,0000,0000,0000,,Because I wouldn't like to start talking whether DDoS is good or bad. Dialogue: 0,0:30:06.64,0:30:09.06,Default,,0000,0000,0000,,But I think DDoS is a very interesting example Dialogue: 0,0:30:09.06,0:30:14.36,Default,,0000,0000,0000,,because it can make us question our ethics again Dialogue: 0,0:30:14.36,0:30:16.95,Default,,0000,0000,0000,,because basically I, like you, I believe that DDoS Dialogue: 0,0:30:16.95,0:30:20.48,Default,,0000,0000,0000,,is really a pretty violent act of censorship Dialogue: 0,0:30:20.48,0:30:22.69,Default,,0000,0000,0000,,but I think it can be very often justified Dialogue: 0,0:30:22.69,0:30:27.51,Default,,0000,0000,0000,,because this violent act can simply give us benefits Dialogue: 0,0:30:27.51,0:30:30.29,Default,,0000,0000,0000,,that couldn't be made any other way. Dialogue: 0,0:30:30.29,0:30:35.17,Default,,0000,0000,0000,,So basically I think that when we think about DDoS and when we want to act with DDoS Dialogue: 0,0:30:35.17,0:30:42.47,Default,,0000,0000,0000,,we have to think about violence and making violence an ethical act, actually. Dialogue: 0,0:30:42.47,0:30:44.24,Default,,0000,0000,0000,,Your comment? Dialogue: 0,0:30:44.24,0:30:47.34,Default,,0000,0000,0000,,{\i1}Molly{\i0}: Violence is a pretty prejudicial term. Dialogue: 0,0:30:47.34,0:30:49.10,Default,,0000,0000,0000,,I prefer not to use it. Dialogue: 0,0:30:49.10,0:30:51.32,Default,,0000,0000,0000,,You also notice that I usually don't say DDoS attacks. Dialogue: 0,0:30:51.32,0:30:55.44,Default,,0000,0000,0000,,I try to say DDoS actions because attacks is also a pretty prejudicial term. Dialogue: 0,0:30:55.44,0:30:59.96,Default,,0000,0000,0000,,I think a lot of the "violence" inherent in DDoS has a lot to do with Dialogue: 0,0:30:59.96,0:31:04.73,Default,,0000,0000,0000,,the inherent power structures that play among the people who are participating. Dialogue: 0,0:31:04.73,0:31:11.98,Default,,0000,0000,0000,,For instance, if I am a state government and you have a free press blog Dialogue: 0,0:31:11.98,0:31:14.49,Default,,0000,0000,0000,,and you like to critize me in your blog Dialogue: 0,0:31:14.49,0:31:18.78,Default,,0000,0000,0000,,and I hire a bunch of people to DDoS your blog Dialogue: 0,0:31:18.78,0:31:20.96,Default,,0000,0000,0000,,that's not really cool. Dialogue: 0,0:31:20.96,0:31:22.61,Default,,0000,0000,0000,,That's fairly violent. Dialogue: 0,0:31:22.61,0:31:27.07,Default,,0000,0000,0000,,I am silencing your speech using my superior power as a big state. Dialogue: 0,0:31:27.07,0:31:31.34,Default,,0000,0000,0000,,On the other hand, if you are a private citizen Dialogue: 0,0:31:31.34,0:31:36.79,Default,,0000,0000,0000,,and you and a bunch of friends use floodnet to attack whitehouse.gov Dialogue: 0,0:31:36.79,0:31:41.01,Default,,0000,0000,0000,,I feel that there's less violence inherent in that system. Dialogue: 0,0:31:41.01,0:31:44.58,Default,,0000,0000,0000,,{\i1}Male{\i0}: I would partially agree but I think that both acts Dialogue: 0,0:31:44.58,0:31:47.72,Default,,0000,0000,0000,,are violent but basically the ethics are different. Dialogue: 0,0:31:47.72,0:31:52.17,Default,,0000,0000,0000,,So instead of avoiding the word I think that we should just think about the term. Dialogue: 0,0:31:52.17,0:31:54.36,Default,,0000,0000,0000,,That's my opinion. Dialogue: 0,0:31:54.36,0:31:59.59,Default,,0000,0000,0000,,{\i1}Molly{\i0}: The grad student in me wants to come up with a new word, but yeah. Dialogue: 0,0:31:59.59,0:32:03.43,Default,,0000,0000,0000,,{\i1}Male{\i0}: Hello, has the decision process who attacks Dialogue: 0,0:32:03.43,0:32:10.70,Default,,0000,0000,0000,,which website at what point any effects on the ethical part? Dialogue: 0,0:32:10.70,0:32:12.05,Default,,0000,0000,0000,,{\i1}Molly{\i0}: On the organizing? Dialogue: 0,0:32:12.05,0:32:14.81,Default,,0000,0000,0000,,{\i1}Male{\i0}: Yeah. Dialogue: 0,0:32:14.81,0:32:17.33,Default,,0000,0000,0000,,{\i1}Molly{\i0}: I can't say that I do. Dialogue: 0,0:32:17.33,0:32:21.60,Default,,0000,0000,0000,,I think that falls into the purview of the people who are actually organizing these actions. Dialogue: 0,0:32:21.60,0:32:24.73,Default,,0000,0000,0000,,As someone who is not an organizer I can't really comment Dialogue: 0,0:32:24.73,0:32:28.76,Default,,0000,0000,0000,,on the organizing process, having never sat in one. Dialogue: 0,0:32:28.76,0:32:31.61,Default,,0000,0000,0000,,Yes? That makes sense? Okay. Dialogue: 0,0:32:31.61,0:32:33.70,Default,,0000,0000,0000,,We're gonna switch back to this mic. Dialogue: 0,0:32:33.70,0:32:44.46,Default,,0000,0000,0000,,{\i1}Male{\i0}: Aside from the coercive vs. non-coerciveness of volunteer vs. non-volunteer action Dialogue: 0,0:32:44.46,0:32:49.07,Default,,0000,0000,0000,,which maybe falls into ethical standpoint Dialogue: 0,0:32:49.07,0:32:53.38,Default,,0000,0000,0000,,other than that, there's a question of liability. Dialogue: 0,0:32:53.38,0:32:57.63,Default,,0000,0000,0000,,If you're for instance participating in a volunteer action Dialogue: 0,0:32:57.63,0:32:59.66,Default,,0000,0000,0000,,and you have a packet sniffer going on that network, Dialogue: 0,0:32:59.66,0:33:01.33,Default,,0000,0000,0000,,then you can trace it back to Dialogue: 0,0:33:01.33,0:33:03.37,Default,,0000,0000,0000,,"ok you obviously volunteered to this action, Dialogue: 0,0:33:03.37,0:33:06.16,Default,,0000,0000,0000,,therefore you're obviously culpable for those actions" Dialogue: 0,0:33:06.16,0:33:15.93,Default,,0000,0000,0000,,vs. if it's "box that's been compromised" and ??? Dialogue: 0,0:33:15.93,0:33:21.53,Default,,0000,0000,0000,,that person is theoretically not liable for those actions Dialogue: 0,0:33:21.53,0:33:27.33,Default,,0000,0000,0000,,because it was a ??? or a virus or ??? Dialogue: 0,0:33:27.33,0:33:28.82,Default,,0000,0000,0000,,{\i1}Molly{\i0}: Yes. Dialogue: 0,0:33:28.82,0:33:32.99,Default,,0000,0000,0000,,{\i1}Male{\i0}: I just wanted to point that out. Dialogue: 0,0:33:32.99,0:33:34.33,Default,,0000,0000,0000,,{\i1}Molly{\i0}: Yes, no, you're right. Dialogue: 0,0:33:34.33,0:33:36.22,Default,,0000,0000,0000,,That is a thing that also needs to be considered Dialogue: 0,0:33:36.22,0:33:37.66,Default,,0000,0000,0000,,but it also comes back to Dialogue: 0,0:33:37.66,0:33:40.90,Default,,0000,0000,0000,,"there needs to be more education" upon people who Dialogue: 0,0:33:40.90,0:33:42.73,Default,,0000,0000,0000,,are organizing these actions to be like Dialogue: 0,0:33:42.73,0:33:45.65,Default,,0000,0000,0000,,"hey, you know you could be committing a felony." Dialogue: 0,0:33:45.65,0:33:47.14,Default,,0000,0000,0000,,"you could lose your house." Dialogue: 0,0:33:47.14,0:33:50.83,Default,,0000,0000,0000,,"that's a thing that could totally happen if you get arrested in the course of this action." Dialogue: 0,0:33:50.83,0:33:53.03,Default,,0000,0000,0000,,as oppossed to if you get arrested for chaining yourself to Dialogue: 0,0:33:53.03,0:33:54.12,Default,,0000,0000,0000,,the ??? of the White House Dialogue: 0,0:33:54.12,0:33:55.81,Default,,0000,0000,0000,,because you don't like the tarsands pipeline. Dialogue: 0,0:33:55.81,0:33:59.33,Default,,0000,0000,0000,,You really unlikely lose your house in that instance. Dialogue: 0,0:33:59.33,0:34:02.14,Default,,0000,0000,0000,,This is something that I have a huge problem with. Dialogue: 0,0:34:02.14,0:34:06.10,Default,,0000,0000,0000,,I think the state response to these actions is completely out of proportion Dialogue: 0,0:34:06.10,0:34:10.29,Default,,0000,0000,0000,,and bad and chilling and not good at all. Dialogue: 0,0:34:11.46,0:34:14.57,Default,,0000,0000,0000,,Until that changes there just needs to be Dialogue: 0,0:34:14.57,0:34:17.68,Default,,0000,0000,0000,,way more education, way more informed consent happening Dialogue: 0,0:34:17.68,0:34:23.61,Default,,0000,0000,0000,,among the activist population who participating in these actions. Dialogue: 0,0:34:23.61,0:34:30.91,Default,,0000,0000,0000,,{\i1}Male{\i0}: In terms of looking to the sources of products used to make DDoS, Dialogue: 0,0:34:30.91,0:34:35.89,Default,,0000,0000,0000,,how do you think about the ethical responsibility of a company based in Redmond, Dialogue: 0,0:34:35.89,0:34:40.93,Default,,0000,0000,0000,,allowing with their products to very easy make big botnets Dialogue: 0,0:34:40.93,0:34:42.90,Default,,0000,0000,0000,,and use it for DDoS. Dialogue: 0,0:34:42.90,0:34:44.06,Default,,0000,0000,0000,,{\i1}Molly{\i0}: {\i1}laughs{\i0} Dialogue: 0,0:34:44.06,0:34:46.60,Default,,0000,0000,0000,,{\i1}Male{\i0}: Especially this company is working in a country where Dialogue: 0,0:34:46.60,0:34:51.40,Default,,0000,0000,0000,,DDoS is a crime so they could be forced to change this very easily. Dialogue: 0,0:34:51.40,0:34:52.92,Default,,0000,0000,0000,,{\i1}Molly{\i0}: That's a hell of a question. Dialogue: 0,0:34:52.92,0:34:56.06,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:34:56.06,0:34:59.17,Default,,0000,0000,0000,,{\i1}Molly{\i0}: And I think I'm going to politely decline a comment Dialogue: 0,0:34:59.17,0:35:00.49,Default,,0000,0000,0000,,until I learn more about it Dialogue: 0,0:35:00.49,0:35:04.03,Default,,0000,0000,0000,,but we can totally talk about this, not right now. Dialogue: 0,0:35:04.77,0:35:07.75,Default,,0000,0000,0000,,{\i1}laughs{\i0} Sorry. Dialogue: 0,0:35:09.12,0:35:11.01,Default,,0000,0000,0000,,{\i1}Molly{\i0}: Sorry, was there more of that? Dialogue: 0,0:35:11.01,0:35:11.76,Default,,0000,0000,0000,,{\i1}Male{\i0}: Why? Dialogue: 0,0:35:11.76,0:35:16.18,Default,,0000,0000,0000,,{\i1}Molly{\i0}: Why? Because I don't like to talk about things that I don't know Dialogue: 0,0:35:16.18,0:35:18.73,Default,,0000,0000,0000,,a lot about and that I'm not competent talking about. Dialogue: 0,0:35:18.73,0:35:21.98,Default,,0000,0000,0000,,I'm a grad student, sorry. Dialogue: 0,0:35:21.98,0:35:28.29,Default,,0000,0000,0000,,{\i1}Male{\i0}: Do you really think that DDoS attacks will have a big role in activism in the future? Dialogue: 0,0:35:28.29,0:35:36.14,Default,,0000,0000,0000,,Because I think the media interest in those kind of attacks is diminishing. Dialogue: 0,0:35:36.14,0:35:42.58,Default,,0000,0000,0000,,When I think of, I mean, you talk about this partially as Dialogue: 0,0:35:42.58,0:35:45.90,Default,,0000,0000,0000,,very useful means of activism Dialogue: 0,0:35:45.90,0:35:51.28,Default,,0000,0000,0000,,but when I think of DDoS I think of a few people sitting in their cellars, Dialogue: 0,0:35:51.28,0:35:58.84,Default,,0000,0000,0000,,being bored in the IRC room and just hitting their LOICs just like they hit the retweet button Dialogue: 0,0:35:58.84,0:36:00.79,Default,,0000,0000,0000,,and think they save the world Dialogue: 0,0:36:00.79,0:36:05.52,Default,,0000,0000,0000,,I don't think that this will make any difference in the future. Dialogue: 0,0:36:05.52,0:36:11.28,Default,,0000,0000,0000,,{\i1}Molly{\i0}: So you roled up a lot of things in that, including a valid, not-so-valid critism of slacktivism Dialogue: 0,0:36:11.28,0:36:13.26,Default,,0000,0000,0000,,which I will also address in this answer. Dialogue: 0,0:36:14.54,0:36:16.04,Default,,0000,0000,0000,,You're right. Dialogue: 0,0:36:16.04,0:36:21.01,Default,,0000,0000,0000,,There are a lot of DDoS attacks happening, not a lot of them getting a lot of coverage. Dialogue: 0,0:36:21.01,0:36:23.86,Default,,0000,0000,0000,,On the other hand there are a lot of street marches happening Dialogue: 0,0:36:23.86,0:36:25.77,Default,,0000,0000,0000,,and not a lot of them get a lot coverage. Dialogue: 0,0:36:25.77,0:36:30.66,Default,,0000,0000,0000,,People still get their signs together and march in the streets sometimes. Dialogue: 0,0:36:30.66,0:36:35.33,Default,,0000,0000,0000,,There's a concept in social movement theory called the ladder of engagement Dialogue: 0,0:36:35.33,0:36:37.29,Default,,0000,0000,0000,,which is basically like it's what it sounds like Dialogue: 0,0:36:37.29,0:36:39.46,Default,,0000,0000,0000,,you start at the bottom and you work your way up Dialogue: 0,0:36:39.46,0:36:44.39,Default,,0000,0000,0000,,to more and more complex modes of political engagement over the course of time. Dialogue: 0,0:36:44.39,0:36:46.74,Default,,0000,0000,0000,,You can't just jump straight to the top of the ladder Dialogue: 0,0:36:46.74,0:36:49.44,Default,,0000,0000,0000,,because you're not Superman and you don't do that usually Dialogue: 0,0:36:49.44,0:36:52.63,Default,,0000,0000,0000,,cause you'd fall off and hurt yourself. Dialogue: 0,0:36:52.63,0:36:56.68,Default,,0000,0000,0000,,DDoS is a very useful tool to get on that first rung. Dialogue: 0,0:36:56.68,0:37:01.21,Default,,0000,0000,0000,,It's easy, it's low financial cost, Dialogue: 0,0:37:01.21,0:37:03.75,Default,,0000,0000,0000,,it's generally pretty easy to advertise, Dialogue: 0,0:37:03.75,0:37:07.34,Default,,0000,0000,0000,,it doesn't look like it will cost you a lot of time and money. Dialogue: 0,0:37:07.34,0:37:11.12,Default,,0000,0000,0000,,All you have to do is really press a button and suddenly you are participating in this thing. Dialogue: 0,0:37:11.12,0:37:16.79,Default,,0000,0000,0000,,The sense of participating has a big impact on something that is called biographical impact Dialogue: 0,0:37:16.79,0:37:19.60,Default,,0000,0000,0000,,which is how you view yourself as an activist. Dialogue: 0,0:37:19.60,0:37:23.74,Default,,0000,0000,0000,,It is really pushing people over the edge to view themselves as activists Dialogue: 0,0:37:23.74,0:37:26.88,Default,,0000,0000,0000,,and the beginning is very very important. Dialogue: 0,0:37:26.88,0:37:35.36,Default,,0000,0000,0000,,So while DDoS may not be "effective" or "successful" as a standalone protest tactic, Dialogue: 0,0:37:35.36,0:37:41.15,Default,,0000,0000,0000,,as part of larger system I think it is still useful. Dialogue: 0,0:37:41.15,0:37:43.91,Default,,0000,0000,0000,,I think it will probably continue to be useful, Dialogue: 0,0:37:43.91,0:37:49.26,Default,,0000,0000,0000,,just like retweeting someone saying something vaguely political Dialogue: 0,0:37:49.26,0:37:52.51,Default,,0000,0000,0000,,on Twitter is also useful. Dialogue: 0,0:37:52.51,0:37:56.04,Default,,0000,0000,0000,,Or liking someone's status or sharing something on Facebook Dialogue: 0,0:37:56.04,0:37:59.58,Default,,0000,0000,0000,,or turning your Twitter icon green because you like the Iranian election. Dialogue: 0,0:37:59.58,0:38:02.64,Default,,0000,0000,0000,,No one in Iran cares that you turn your Twitter icon green. Dialogue: 0,0:38:02.64,0:38:03.57,Default,,0000,0000,0000,,They don't even know you. Dialogue: 0,0:38:03.57,0:38:05.51,Default,,0000,0000,0000,,They don't know that you've turned your Twitter icon green Dialogue: 0,0:38:05.51,0:38:10.07,Default,,0000,0000,0000,,but what that does is that it connects you with all the other people Dialogue: 0,0:38:10.07,0:38:12.66,Default,,0000,0000,0000,,on Twitter who turn their Twitter icons green. Dialogue: 0,0:38:12.66,0:38:15.62,Default,,0000,0000,0000,,You can see all the other people who turn the Twitter icon green. Dialogue: 0,0:38:15.62,0:38:18.01,Default,,0000,0000,0000,,Suddenly you're not just sitting there in your living room Dialogue: 0,0:38:18.01,0:38:20.78,Default,,0000,0000,0000,,saying I really support democracy in Iran. Dialogue: 0,0:38:20.78,0:38:24.82,Default,,0000,0000,0000,,You are part of this community of green people on Twitter Dialogue: 0,0:38:24.82,0:38:27.17,Default,,0000,0000,0000,,who all support democracy in Iran. Dialogue: 0,0:38:27.17,0:38:30.40,Default,,0000,0000,0000,,That's way more powerful to you as a person. Dialogue: 0,0:38:30.40,0:38:36.50,Default,,0000,0000,0000,,Not necessarily to anybody else. But to you as a person it matters. {\i1}laughter{\i0} Dialogue: 0,0:38:36.50,0:38:38.84,Default,,0000,0000,0000,,And that's important. Dialogue: 0,0:38:38.84,0:38:41.27,Default,,0000,0000,0000,,That's important for getting people onto that ladder of engagement Dialogue: 0,0:38:41.27,0:38:43.41,Default,,0000,0000,0000,,and making them feel like activists. Dialogue: 0,0:38:43.41,0:38:47.60,Default,,0000,0000,0000,,Feeling like activists is just a couple of ladders away from being an activist Dialogue: 0,0:38:47.60,0:38:49.71,Default,,0000,0000,0000,,which is even better. Dialogue: 0,0:38:49.71,0:38:50.61,Default,,0000,0000,0000,,Yeah. Dialogue: 0,0:38:50.61,0:38:57.49,Default,,0000,0000,0000,,{\i1}applause{\i0} Dialogue: 0,0:38:57.49,0:38:59.05,Default,,0000,0000,0000,,{\i1}Molly{\i0}: They're clapping for you. Dialogue: 0,0:38:59.05,0:39:02.74,Default,,0000,0000,0000,,{\i1}Male{\i0}: {\i1}laughs{\i0} I'm from Austria and we have an organization Dialogue: 0,0:39:02.74,0:39:06.93,Default,,0000,0000,0000,,in Austria, it's called Austromechana. Dialogue: 0,0:39:06.93,0:39:17.84,Default,,0000,0000,0000,,Its website got DDoSes on May 11, 2012 Dialogue: 0,0:39:17.84,0:39:22.16,Default,,0000,0000,0000,,and they didn't get the website on until now. Dialogue: 0,0:39:22.16,0:39:24.13,Default,,0000,0000,0000,,They used this as an argument: Dialogue: 0,0:39:24.13,0:39:27.26,Default,,0000,0000,0000,,"Oh my god, the Internet is so cruel." Dialogue: 0,0:39:27.26,0:39:34.49,Default,,0000,0000,0000,,"It's bad and we can do nothing against them." Dialogue: 0,0:39:34.49,0:39:44.69,Default,,0000,0000,0000,,"They play with... they have weapons we can't do something against it." Dialogue: 0,0:39:44.69,0:39:51.65,Default,,0000,0000,0000,,I'm not sure if in this case the DDoS was the right tool Dialogue: 0,0:39:51.65,0:40:01.81,Default,,0000,0000,0000,,to get Aufmerksamkeit, attention. Dialogue: 0,0:40:01.81,0:40:08.39,Default,,0000,0000,0000,,I'm not sure if it was helpful in this case. Dialogue: 0,0:40:08.39,0:40:20.06,Default,,0000,0000,0000,,I don't think it's a good weapon for everything and there was not enough messaging with it. Dialogue: 0,0:40:20.06,0:40:21.13,Default,,0000,0000,0000,,{\i1}Molly{\i0}: No, you're right. Dialogue: 0,0:40:21.13,0:40:23.08,Default,,0000,0000,0000,,DDoS is not appropriate for all cases. Dialogue: 0,0:40:23.08,0:40:27.04,Default,,0000,0000,0000,,Given that I know nothing about your organization and didn't hear about that action Dialogue: 0,0:40:27.04,0:40:30.26,Default,,0000,0000,0000,,they probably didn't have enough messaging. Dialogue: 0,0:40:30.26,0:40:31.60,Default,,0000,0000,0000,,I don't know. Dialogue: 0,0:40:31.60,0:40:33.50,Default,,0000,0000,0000,,But I'm sorry your website went down. Dialogue: 0,0:40:33.50,0:40:37.01,Default,,0000,0000,0000,,{\i1}Male{\i0}: Not my website. Dialogue: 0,0:40:37.01,0:40:45.69,Default,,0000,0000,0000,,It was from the people who want to have the Festplattenabgabe, I don't know the English word. Dialogue: 0,0:40:45.69,0:40:47.66,Default,,0000,0000,0000,,It was their site. Dialogue: 0,0:40:47.66,0:40:48.52,Default,,0000,0000,0000,,{\i1}Molly{\i0}: Okay. Dialogue: 0,0:40:50.40,0:40:51.07,Default,,0000,0000,0000,,Hi! Dialogue: 0,0:40:51.61,0:40:52.63,Default,,0000,0000,0000,,{\i1}Female{\i0}: Hi. Dialogue: 0,0:40:52.63,0:41:01.29,Default,,0000,0000,0000,,What exactly are your parameters for deciding if a DDoS action was ethical right or wrong? Dialogue: 0,0:41:01.29,0:41:03.92,Default,,0000,0000,0000,,I'm still waiting for this. Dialogue: 0,0:41:03.92,0:41:07.30,Default,,0000,0000,0000,,{\i1}Molly{\i0}: Like I said, this is a very holistic model Dialogue: 0,0:41:07.30,0:41:10.12,Default,,0000,0000,0000,,in that you look at a bunch of different factors and say Dialogue: 0,0:41:10.12,0:41:14.47,Default,,0000,0000,0000,,"well, these things fell on one or either side of these different factors, Dialogue: 0,0:41:14.47,0:41:16.67,Default,,0000,0000,0000,,therefore I'm gonna look at it, squint my eyes Dialogue: 0,0:41:16.67,0:41:19.27,Default,,0000,0000,0000,,and say ok, I think that this was ethical Dialogue: 0,0:41:19.27,0:41:21.16,Default,,0000,0000,0000,,and that this was unethical". Dialogue: 0,0:41:21.16,0:41:24.05,Default,,0000,0000,0000,,Like I said, this is probably much less scientific Dialogue: 0,0:41:24.05,0:41:26.29,Default,,0000,0000,0000,,than a lot of people here were looking for. Dialogue: 0,0:41:27.29,0:41:30.61,Default,,0000,0000,0000,,Liberal studies major. What do you want? Dialogue: 0,0:41:30.61,0:41:31.95,Default,,0000,0000,0000,,{\i1}laughter{\i0} Dialogue: 0,0:41:31.95,0:41:36.74,Default,,0000,0000,0000,,So, this is not gonna give you sort of a tick list for things Dialogue: 0,0:41:36.74,0:41:40.26,Default,,0000,0000,0000,,that you can say "oh we did this, oh we didn't do that Dialogue: 0,0:41:40.26,0:41:44.27,Default,,0000,0000,0000,,therefore we're totally on the right side of god and the law". Dialogue: 0,0:41:44.27,0:41:51.21,Default,,0000,0000,0000,,Instead what I'm hoping that this system will give people is a way to look at these actions Dialogue: 0,0:41:51.21,0:41:53.43,Default,,0000,0000,0000,,to give them different factors to consider Dialogue: 0,0:41:53.43,0:41:57.47,Default,,0000,0000,0000,,when saying yes this was appropriate or yes this wasn't appropriate. Dialogue: 0,0:41:57.47,0:42:01.99,Default,,0000,0000,0000,,Cause I feel right now the debate right now is really a bunch of people being like Dialogue: 0,0:42:01.99,0:42:04.14,Default,,0000,0000,0000,,"this is always awesome" Dialogue: 0,0:42:04.14,0:42:05.23,Default,,0000,0000,0000,,and a bunch of other people going Dialogue: 0,0:42:05.23,0:42:07.08,Default,,0000,0000,0000,,"this is never awesome" Dialogue: 0,0:42:07.08,0:42:09.59,Default,,0000,0000,0000,,and that's not very useful. Dialogue: 0,0:42:09.59,0:42:12.05,Default,,0000,0000,0000,,{\i1}Female{\i0}: But don't you think that's quite outstanding that Dialogue: 0,0:42:12.05,0:42:16.31,Default,,0000,0000,0000,,you are the one who is getting to decide which is ethical right and wrong? Dialogue: 0,0:42:16.31,0:42:17.78,Default,,0000,0000,0000,,{\i1}Molly{\i0}: You can also decide. Dialogue: 0,0:42:17.78,0:42:20.23,Default,,0000,0000,0000,,I would love it if someone else would come up with a framework Dialogue: 0,0:42:20.23,0:42:21.75,Default,,0000,0000,0000,,so that I didn't have to do all the work. Dialogue: 0,0:42:21.75,0:42:23.92,Default,,0000,0000,0000,,{\i1}Female{\i0}: I thought it's your scientific study, so... Dialogue: 0,0:42:24.32,0:42:26.09,Default,,0000,0000,0000,,{\i1}Molly{\i0}: It's not terribly scientific. Dialogue: 0,0:42:26.09,0:42:29.54,Default,,0000,0000,0000,,It's me reviewing a bunch of case studies Dialogue: 0,0:42:29.54,0:42:31.42,Default,,0000,0000,0000,,and saying these are the things that happened, Dialogue: 0,0:42:31.42,0:42:35.93,Default,,0000,0000,0000,,this is were they fall on these different factors Dialogue: 0,0:42:35.93,0:42:38.72,Default,,0000,0000,0000,,and this is now what I think of this action. Dialogue: 0,0:42:38.72,0:42:43.66,Default,,0000,0000,0000,,For instance, Lufthansa/EDT action, I think that actually was ethical. Dialogue: 0,0:42:43.69,0:42:48.36,Default,,0000,0000,0000,,I think it was ethical because it occurred within the framework of a much larger campaign Dialogue: 0,0:42:48.36,0:42:57.04,Default,,0000,0000,0000,,because it focused on a corporate website that didn't attack the central core of the corporation. Dialogue: 0,0:42:57.04,0:42:58.47,Default,,0000,0000,0000,,It didn't stopped it from communicating, Dialogue: 0,0:42:58.47,0:43:01.23,Default,,0000,0000,0000,,it didn't stop it from responding to the action, Dialogue: 0,0:43:01.23,0:43:04.86,Default,,0000,0000,0000,,it just made itself known in that way. Dialogue: 0,0:43:04.86,0:43:07.31,Default,,0000,0000,0000,,And it did a great deal of publicity work. Dialogue: 0,0:43:07.31,0:43:09.97,Default,,0000,0000,0000,,In the end it actually worked, Dialogue: 0,0:43:09.97,0:43:12.82,Default,,0000,0000,0000,,The effect that it wanted to have in that, Dialogue: 0,0:43:12.82,0:43:16.46,Default,,0000,0000,0000,,they wanted Lufthansa to stop flying immigrants out of the country, Dialogue: 0,0:43:16.46,0:43:17.63,Default,,0000,0000,0000,,actually took place. Dialogue: 0,0:43:17.63,0:43:20.89,Default,,0000,0000,0000,,And that also has an impact on the ethical validity of an action Dialogue: 0,0:43:20.89,0:43:23.41,Default,,0000,0000,0000,,which is why this is currently a reflective framework Dialogue: 0,0:43:23.41,0:43:25.03,Default,,0000,0000,0000,,and not a prescriptive framework. Dialogue: 0,0:43:25.03,0:43:28.61,Default,,0000,0000,0000,,{\i1}Female{\i0}: Thanks. Good luck with your studies then. Dialogue: 0,0:43:28.61,0:43:30.32,Default,,0000,0000,0000,,{\i1}Molly{\i0}: Yay. Dialogue: 0,0:43:31.72,0:43:33.22,Default,,0000,0000,0000,,There's another question. Dialogue: 0,0:43:33.22,0:43:37.96,Default,,0000,0000,0000,,{\i1}Male{\i0}: My naive approach to judge the ethics of a DDoS attack Dialogue: 0,0:43:37.96,0:43:41.32,Default,,0000,0000,0000,,would have been to compare it to usual demonstrations, Dialogue: 0,0:43:41.32,0:43:43.40,Default,,0000,0000,0000,,just marching on the street. Dialogue: 0,0:43:43.40,0:43:47.29,Default,,0000,0000,0000,,Because I guess what has a rather good feeling on what the ethics are there. Dialogue: 0,0:43:47.29,0:43:49.60,Default,,0000,0000,0000,,You didn't highlight that too much in your talk. Dialogue: 0,0:43:49.60,0:43:52.34,Default,,0000,0000,0000,,Was this on purpose or can you say something about that? Dialogue: 0,0:43:52.34,0:43:57.15,Default,,0000,0000,0000,,{\i1}Molly{\i0}: People really like, and lots of people really like to say Dialogue: 0,0:43:57.15,0:44:02.03,Default,,0000,0000,0000,,"oh DDoS is just a sit-in, except on the Internet". Dialogue: 0,0:44:02.03,0:44:04.44,Default,,0000,0000,0000,,I really don't like that comparison. Dialogue: 0,0:44:04.44,0:44:12.02,Default,,0000,0000,0000,,I think it's really attractive because it sort of feels like a sit-in, Dialogue: 0,0:44:12.02,0:44:14.97,Default,,0000,0000,0000,,You feel like you are monopolizing resources in the same way Dialogue: 0,0:44:14.97,0:44:17.46,Default,,0000,0000,0000,,that sitting in a lunch counter is monopolizing resources. Dialogue: 0,0:44:17.46,0:44:22.34,Default,,0000,0000,0000,,But it's not in the physical world, it's on the Internet. Dialogue: 0,0:44:22.34,0:44:24.27,Default,,0000,0000,0000,,And frankly, these are two different things. Dialogue: 0,0:44:24.27,0:44:27.04,Default,,0000,0000,0000,,We can't just say "oh this is just like it" Dialogue: 0,0:44:27.04,0:44:27.86,Default,,0000,0000,0000,,because it's not. Dialogue: 0,0:44:27.86,0:44:30.37,Default,,0000,0000,0000,,What it is just like, it is just like a DDoS. Dialogue: 0,0:44:30.37,0:44:33.08,Default,,0000,0000,0000,,It's not just like a sit-in. Dialogue: 0,0:44:33.08,0:44:37.00,Default,,0000,0000,0000,,Disruptive tactics in both areas are very parallel Dialogue: 0,0:44:37.00,0:44:39.46,Default,,0000,0000,0000,,but they are very different. Dialogue: 0,0:44:39.47,0:44:43.28,Default,,0000,0000,0000,,That is something that I want to go into much greater detail on, Dialogue: 0,0:44:43.28,0:44:47.76,Default,,0000,0000,0000,,specifically both in sort of the socially acceptable disruptive tactics Dialogue: 0,0:44:47.76,0:44:49.55,Default,,0000,0000,0000,,like sit-ins and street marches Dialogue: 0,0:44:49.55,0:44:52.31,Default,,0000,0000,0000,,but also the non-socially-acceptable disruptive tactics Dialogue: 0,0:44:52.31,0:44:54.73,Default,,0000,0000,0000,,like black bloc tactics. Dialogue: 0,0:44:54.73,0:44:57.59,Default,,0000,0000,0000,,I'd really love to compare that to other modes of Dialogue: 0,0:44:57.59,0:44:59.58,Default,,0000,0000,0000,,disruptive activism online, Dialogue: 0,0:44:59.58,0:45:01.96,Default,,0000,0000,0000,,and other modes of disruptive activism Dialogue: 0,0:45:01.96,0:45:03.53,Default,,0000,0000,0000,,and destructive activism. Dialogue: 0,0:45:03.53,0:45:07.07,Default,,0000,0000,0000,,So that is, if you are interested in reading my Master's thesis, Dialogue: 0,0:45:07.07,0:45:09.29,Default,,0000,0000,0000,,I will have a whole chapter on this Dialogue: 0,0:45:09.29,0:45:12.34,Default,,0000,0000,0000,,that I could not fit into this talk. Dialogue: 0,0:45:12.34,0:45:15.39,Default,,0000,0000,0000,,Because there is a lot of that there. Dialogue: 0,0:45:15.39,0:45:19.65,Default,,0000,0000,0000,,But the instinct to fall back on the physical analogy is, Dialogue: 0,0:45:19.65,0:45:22.41,Default,,0000,0000,0000,,I think, inherently damaging to the discourse of Dialogue: 0,0:45:22.41,0:45:27.08,Default,,0000,0000,0000,,electronic civil disobedience and digital activism Dialogue: 0,0:45:27.08,0:45:29.68,Default,,0000,0000,0000,,because you fall back on these tropes Dialogue: 0,0:45:29.68,0:45:31.100,Default,,0000,0000,0000,,that don't really fit and then Dialogue: 0,0:45:31.100,0:45:34.59,Default,,0000,0000,0000,,when people point out that they don't really fit Dialogue: 0,0:45:34.59,0:45:37.23,Default,,0000,0000,0000,,you're sort of left with nothing. Dialogue: 0,0:45:37.23,0:45:39.94,Default,,0000,0000,0000,,When you say like "that's not actually a sit-in, that's a DDoS" Dialogue: 0,0:45:39.94,0:45:42.77,Default,,0000,0000,0000,,you sitting there going "but I said it was a sit-in Dialogue: 0,0:45:42.77,0:45:44.98,Default,,0000,0000,0000,,and you like sit-ins, right?" Dialogue: 0,0:45:44.98,0:45:47.58,Default,,0000,0000,0000,,and then you're sort of: that's it. Dialogue: 0,0:45:47.58,0:45:51.48,Default,,0000,0000,0000,,So I'd like to push the argument beyond that point. Dialogue: 0,0:45:51.48,0:45:53.11,Default,,0000,0000,0000,,{\i1}Male{\i0}: Thanks. Dialogue: 0,0:45:54.68,0:46:01.14,Default,,0000,0000,0000,,{\i1}Male{\i0}: Ok, so it looks like we have no more questions. Thank you very much, Molly, for the talk. Dialogue: 0,0:46:01.14,0:46:12.38,Default,,0000,0000,0000,,{\i1}applause{\i0}