Timesuck with Dan Cummins - 240 - Anonymous and the World of Hackers

Episode Date: April 19, 2021

“We are Legion. We do not forgive. We do not forget. Expect us.” Anonymous - the hacking collective that for many put hacking on the map. Since 2007, Anonymous has hacked just about everyone: th...e CIA, NSA, the Federal Reserve, other governmental agency websites around the world, the KKK, the Church of Scientology as well. They've released millions of classified documents. They've disrupted business for multimillion-dollar corporations. Why do they do all this? Looking into that today. Also digging in the history of hacking and the culture of hacking they come from. Also looking into some other hacker organizations and some massive hacks they've pulled off, like hacking into ATM networks and deciding when and how much cash an ATM will kick out. The group that did that has stolen over 1.2 billion dollars to date. Hope you learn a lot with this one today. Get ready for lots of techno music and tons of cyber facts. Hail Nimrod! Thanks for helping Bad Magic Productions donate $13,300 this month to The Saint Bernard Project. The SBP will be helping those in Texas, Oklahoma, and Louisiana as they continue to work on their recovery from winter storm Uri. To find out more, go to https://sbpusa.org/ Watch the Suck on YouTube: https://youtu.be/E_mYxxRosHc Thanks to Karl Casey @ White Bat Audio for the hacker sound bed "80s Retrowave Music - Hackers" Merch - https://badmagicmerch.com/ Discord! https://discord.gg/tqzH89v Want to join the Cult of the Curious private Facebook Group? Go directly to Facebook and search for "Cult of the Curious" in order to locate whatever current page hasn't been put in FB Jail :) For all merch related questions/problems: store@badmagicproductions.com (copy and paste) Please rate and subscribe on iTunes and elsewhere and follow the suck on social media!! @timesuckpodcast on IG and http://www.facebook.com/timesuckpodcast Wanna become a Space Lizard? We're over 10,000 strong! Click here: https://www.patreon.com/timesuckpodcast Sign up through Patreon and for $5 a month you get to listen to the Secret Suck, which will drop Thursdays at Noon, PST. You'll also get 20% off of all regular Timesuck merch PLUS access to exclusive Space Lizard merch. You get to vote on two Monday topics each month via the app. And you get the download link for my new comedy album, Feel the Heat. Check the Patreon posts to find out how to download the new album and take advantage of other benefits.

Transcript
Discussion (0)
Starting point is 00:00:00 We are Legion. We do not forgive. We do not forget. Expect us. This is the typical calling card sign-off for anonymous, a hacking collective that is formed by 2007. These hackers slash activists or to use their language, HACTIVists have used their ability to break into the technology that runs our lives to protest governments, bring down websites and expose countless pieces of personal sensitive information. Anonymous has hassled the KKK, the Church of Scientology, and various governments across the world. They've hacked into institutions previously thought to be unhackable, like the NSA,
Starting point is 00:00:35 the U.S. National Security Agency. Who are they? Well as the name implies, they are anonymous. We don't know most of their identities. They hide behind online aliases and the iconic Guy Fox mask from V for vendetta. Anonymous was born on 4chans B board, a forum dedicated to sharing ridiculous content, defensive jokes, and otherwise provide a safe haven for young people with dark senses of humor. Humor like, well mine, probably like yours. And from this community,
Starting point is 00:01:03 would bloom an ethos her around protecting free speech, fighting government corruption, trying not to pay for copyright and movies and music, and sometimes fucking with completely innocent people just for some roles. Anonymous is back, both revolutions and cyberbullying. Today we will dig into the deeds and misdeeds of Anonymous, how they began, what they've done, also dive into the history of hacking. Who are the first hackers? How has hacking evolved over the years?
Starting point is 00:01:27 What kinds of heists have some of the world's most talented and criminally minded hackers pulled off? Been listened to a lot of early 2000s techno this week doing the research. It felt right. For the Cyberpunk keyboard warrior, you might stop this individual, but you can't stop us all, hacker addition of TimeSuck.
Starting point is 00:01:44 This is Michael McDonald, and you're listening to TimeSuck. individual but you can't stop us all hacker addition of time suck. Have you Monday made sacks? Dan Cummins? Suck master? Drug legalization advocate. Maybe still don't do meth though. Maybe easy on the heroin though. Hail Nimrod, Hailu Saphina, Glory B to Triple M and Praise B to Good Boy Bo Jangles.
Starting point is 00:02:13 According to getting the suck dungeon at a cordolaine Idaho, suns out, maybe not quite guns out. Still a bit chilly. Excited for a live scared to death show this Thursday night, Thursday, April 22nd, 6pm, Pacific time, the virtual doors open for a 630 PM star time. Our first virtual show at looped.com for a bad magic show. Excited for that. Go to loops.com for tickets. If you want to check that out.
Starting point is 00:02:37 Remember how I was talking about drugs second ago. Well, since it's also 420 this week, we now have a time suck highly curious 420 collection at badmagicmerge.com. Look at T's hoodies, long sleeves from Bella. We have a whole collection, tote bags, frame canvass art, face masks, stash jars, grinders, bamboo rolling trays, water bottles, gotta stay hydrated, brass lighter cases and accessory pouches. I'm not fucking around.
Starting point is 00:03:04 Don't do drugs, meat sacks, unless you don't have to worry about a random drug test, and you're gonna do them right. You know, be responsible. You're gonna be confident that you're not gonna get caught. Then enjoy them. Best luck, life short. Hey, I'm Luciferina.
Starting point is 00:03:16 Also, had a problem with some venues displaying incorrect dates for some upcoming standup shows recently, gotten some emails and messages. I am not touring anywhere until August. Any venue that has dates for me listed before August of this year, they are not being entirely truthful as in they're not being truthful at all. They need to change up to websites, change up to info. Stop trying to trick people.
Starting point is 00:03:38 In August, the standup Symphony of Insanity tour will start up barring any further waves of closures and lockdowns. And I'm excited for that. I'll have more details in a few months as far as dates and stuff. And that's it for announcements. Now on to the story of anonymous and the world of hacking. I'm going to go over the technical side of hacking today and the development of cybersecurity to protect us from hackers.
Starting point is 00:04:00 I'm going to talk about hacktivism. And then after taking a peek at a few of the biggest online heists of all time and that some especially talented hackers have pulled off so insane. We'll dig into the story of anonymous. We're going to look at how the group started, how the group is organized, if it's organized, what it's been up to since its formation. Anonymous is hacked just about every institution you can think of from the NSA, CIA, NASA, the Federal Reserve, to the the Vatican just about every big corporation out there tell the story of anonymous we're going to wander through some lulls some reddit threads
Starting point is 00:04:32 fuse between collectives and more let's get to Hacken you ever see that movie war games with Matthew Broderick, Allie Shiti, two 80s acting giants? Came out in the summer of 1983. Broderick was only 20 when it was filmed. Classic 80s Cold War flick, where Broderick plays David Lightman, a young hacker, Seattle High Schooler, who unwittingly hacks his way into a giant US military supercomputer program
Starting point is 00:05:00 to predict a nuclear war against a Soviet Union, and make sure the US launches its nukes first. It a big hit. Thinking at first he's playing an early online game David Lightman is actually making the computer's AI think that the Russians are really attacking. And then of course he has to save the day. This young hacker must save the world from a nuclear apocalypse. This movie war games it introduced hacking to mainstream America. Introduced it to me. I don't remember a lot of moments from that movie. I saw it when I was in grade school. I do remember the impression it made on me.
Starting point is 00:05:32 Shortly after seeing this movie, a pop-a-ward grandma Betty bought me an early computer, a Commodore 64. We didn't have internet access yet. Only super nerds could figure out how to get online in 1983. And they sure as shit weren't doing that from Rick and Zydo. Or cable hadn't even been laid. It was satellite TV or three channels over the airwaves. So you got sometimes.
Starting point is 00:05:51 The worldwide web, most casual nerds like myself could figure out how to use wasn't invented until 1990. The very first online game had only been played on arpnet. A rap net. Oh my gosh, arpnet. There we go, Jesus Christ. The precursor to the internet. It's ARPA and ET.
Starting point is 00:06:08 In 1983, years before War Games. But when I saw the movie around 1987 or 1988, I wanted to hack. I wanted to somehow Matthew Broderick my way into Sarah Jessica Parker's vagina. Hey, Elizabethina. No, sorry. I wouldn't fantasize that for about a decade
Starting point is 00:06:23 after Wargames. First Wives Club, that midler? May have watched it was my mom. May have enjoyed it more than I let on since it was marketed towards middle-aged women. May have liked Ser Jessica Parker's character a lot. Later I would be jealous that Browderick was sleeping with Ser Jessica Parker. In the mid 80s when I saw Wargames, I didn't even know what a vagina was. I only knew girls maybe anxious and computers and video games made me happy. I wanted to mass you broader my way into the local bank. Siphon off just a few pennies a day from all of the accounts into my account. No big whoops, who's going to miss a few pennies.
Starting point is 00:06:54 Somehow from that become very, very, very rich. But how can I do that? How can I hack? I knew it had something to do with programming, so I started to teach myself coding. I even joking. I didn't get very far. I learned enough in basic to make a ball bounce across the screen, and then I got frustrated by how many lines of code it would take to just to make one stupid looking little pixelated ball bounce a little bit. And I gave up, and I went back to playing Airborne Ranger and Skater Diet.
Starting point is 00:07:21 Never learned how to hack, probably for the best, probably best for everyone. What even is hacking? Hacking is the gaining of unauthorized access to data in a system or computer. That's the Oxford Dictionary definition. It is the activity of identifying weaknesses in a computer system or a network to exploit the security to gain access to personal data or business data. The term hack originated from MIT students and at first it didn't even refer to computers. Way back in 1961, MIT's tech model railroad club hacked their high tech train sets in order to modify their functions. I love this. This is the nerriest shit ever. The first hackers did not look like Neo from the Matrix. They look like Steve
Starting point is 00:08:03 Irkel from Family Matters. The first hackers were dicking around with model trains at the Massachusetts Institute of Technology, a semi-automatic control system based on telephone relays was installed by these model train nerds in the mid-1950s. It was called the ARRC, the automatic railroad running computer. It could run a train over the entire set of track in both directions, without manual intervention, throwing switches and powering tracks ahead of the train. I pictured them wearing this little conductors hat and everything. Are we done it? Yay! We are hackers! MIT students who worked on programming when switches were thrown and when tracks were powered,
Starting point is 00:08:42 they became the first hackers. They weren't initially hacking in to anything. They were hacking away at different types of code, playing with new forms of programming, inventing new types of programming and programming in early days. They were not actually that into trains. They were into computer systems, and they were learning how to manipulate systems.
Starting point is 00:09:01 They were employing a new style of programming, different from the cut and dried methods employed by the world's very first system programmers. They enjoyed the intellectual challenge of creatively overcoming and circumventing limitations of programming systems and trying to extend the capabilities of programming. These super nerds soon took off their Chuchu train conductor hats and they moved from little model trains to giant computers using the elusive and expensive at the time. IBM 704s at MIT to innovate, explore, create new rules for how these machines functioned and try to expand the tasks that computers could accomplish.
Starting point is 00:09:35 And those early computers truly were giant. They were massive. They weighed over 30,000 pounds each. Only some Avenger or some superhero could use them as a laptop. Spending two over $2 million each, and that's two million dollars at the time. On the first hackers using them weren't trying to break into anything or commit any crimes. They were using hacking as a tool to explore, improve and test the limits of existing programs.
Starting point is 00:09:58 More system manipulation. And then in the 1970s a new type of hacker showed up, phone hackers, And then in the 1970s, a new type of hacker showed up, phone hackers dubbed Freakers, PHR, EAK, ERS. These phone hackers, such as the infamous John Draper, they exploited the operational characteristics in the telephone switching network of the time, which had only recently gone completely electric. John Draper, legendarily, this is such a funny story to me, he discovered that a toy whistle found in Captain Crunch cereal boxes produced the exact tone necessary. 2600 Hertz to indicate to AT&T telephone lines that the line was ready and available to route a new long distance call.
Starting point is 00:10:37 He did this sometime around 1969. At this time telephone lines only relayed audio information, not digital information. So when you pushed a button on your phone, for example, the number set a specific tone into the line. I remember hearing these tones as a kid. These tones traveled through the line to a central switching station. At the station, the tones were converted back into numbers and connected to the right telephone line and eventually to the right telephone on the other end of the line.
Starting point is 00:11:04 And the tone that that Captain Crunch whistle made told the switching station to open up a long distance line for a call without you having to pay for it. It hacked it. It got you a free long distance call. You can call anywhere in the world for free. It bypassed the typical number sequence you had to punch in to make a long distance call that you would be charged for. And while a lot of people, once the news got out, started using Captain Crunch whistles
Starting point is 00:11:27 to place free calls all over the world. It's so funny to me. John Draper, who's still known in hacker circles as either Captain Crunch, Crunch or Crunch Man, he and other freakers, they were not trying to save money by doing this. They were trying to just manipulate the system. And a computer is a type of system, which would lead to the same curiosity being later applied to hacking specifically computers. And then the internet. Some very high profile people or phone breakers before they went legit, including Steve Wozniak and Steve Jobs. Co-founders of Apple, they knew Draper. They were part of
Starting point is 00:12:00 this early group of freakers. Interestingly, hacking today still doesn't necessarily mean committing a crime. Often the term cracking is reserved for criminal hacking. But since the term cracker now is mostly associated with either a thin, tasty wafer, perfect for placing cheese on, or a derogatory, racial slur for a white person, hacker is generally used for both good and bad hackers. By the 1970s, the military used for both good and bad hackers. By the 1970s, the military potential for computers started to be realized, now hacking got a bit more serious. These model train nerds at MIT were really working on artificial intelligence systems
Starting point is 00:12:35 with all their fucking with track switches and such. And some of those early hackers would go on to work on the team that assembled the Internet precursor network known as ARPANET. And ARPANET was funded by the Department of Defense as a means to link government offices across the nation. These early hackers contributed to the technological development of the military industrial complex. Then in the early 70s, counter-culture university students protesting hacker involvement in the Vietnam War would drive a lot of early hackers underground.
Starting point is 00:13:05 It wasn't cool man to help the man. Interesting that a lot of the first hackers were not being hunted down by the government. They were being funded by the government. The military industrial complex funded both the projects that would create modern hacker culture and produce the first anonymous shields for hackers to hide their identities
Starting point is 00:13:22 when they secretly hired programmers in the 70s to continue to work for them clandestinely. Then in the 1980s, when the with the new popularity of personal computers that at first entered the market in 1977, the modern hacker was truly born. The one Matthew Broderick would give a big screen mainstream face to. While there were so large number of hackers interested primarily in tinkering with operating systems, a new breed emerged that was more concerned with personal gain. Instead of using their technological know-how for improving computers, they used it for criminal activities, including pirating software, creating viruses, and breaking into systems to steal sensitive
Starting point is 00:14:00 information. Ian Murphy, aka Captain Zap, was the first hacker called at the time of cracker to be tried and convicted as a felon in 1981. Murphy broke into AT&T computers and changed the internal clocks that metered billing rates. People were getting late night discount rates now when they called through at midday. Nice. Of course, the bargain seekers who waited until midnight to call long distance, they were now being hit with high bills. A big headache for AT&T. AT&T, the first corporation to really start to hate hackers, right? The first to be fucked with starting with Captain
Starting point is 00:14:34 Crunch and his fellow freakers. And now they got to deal with Captain Zap. So many captains to deal with. It was a hacking captain epidemic. 1983 1983, a group of 16-H hackers from Milwaukee calling themselves the 414s, they hacked into 60 different computer systems, including the Security Pacific National Bank and the Los Alamos National Laboratory. Their story broke around the same time war games came out. Got people really talking about hackers. They exposed a wee bit of a security breach since Los Alamos was where atomic bombs were designed. One of the places, a couple military secrets, the, you know, the
Starting point is 00:15:09 US would rather not share with the world being stored there. The teen hackers didn't do much once they broke into these systems, but they could have. And the fact that six kids did break into both sensitive financial information and classified military information systems was a wee bit concerning to Uncle Sam. In 1986, the first legislation related to hacking, the Federal Computer Fraud and Abuse Act, is passed. That same year, a legendary hacker, Lloyd Blankenship, calling himself the mentor, early member of the hacker group, the Legion of Doom, Bucket Cool, as name, is arrested. Shortly after his arrest, he publishes the hacker manifesto,
Starting point is 00:15:45 aka the conscience of a hacker on January 8th, 1986. It's not very long, and it's a very revered document in hacker culture, said to have heavily influenced the hacker ethos and still to influence it. So I will read this thing in its entirety. Another one got caught today. It's all over the papers.
Starting point is 00:16:08 Teenager arrested in computer crime scandal. Hacker arrested after bank tampering. Damn kids, they're all alike. But did you when your three-piece psychology in 1950s techno brain ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick? What forces shaped him? What may have molded him? I am a hacker, enter my world.
Starting point is 00:16:31 Mine is a world that begins with school. I'm smarter than most of the other kids. This crap they teach us boars me. Damn, underachiever, they're all alike. I'm in junior high or high school. I've listened to teachers explain for the 15th time how to reduce a fraction. I understand it.
Starting point is 00:16:47 No missmith, I didn't show my work. I did it in my head. Damn kid, probably copied it. They're all alike. I made a discovery today. I found a computer. Wait a second, this is cool. It does what I wanted to.
Starting point is 00:17:01 If it makes a mistake, it's because I screwed it up. Not because it doesn't like me, or feels threatened by me, or thinks I'm a smart ass, or doesn't like teaching and shouldn't be here. Damn kid, all he does is play games. They're all alike. And then it happened,
Starting point is 00:17:16 a door opened to a world, rushing through the phone line, like heroin through an addict's veins, an electronic pulse of sent out, a refuge from the day-to-day and competencies is sucked, a board is found. This is it. This is where I belong. I know everyone here, even if I've never met them, never talked to them, may never hear
Starting point is 00:17:34 from them again. I know you all. Damn, kid. Time up the phone line again. They're all alike. You bet your ass we're all alike. We've been spoon-fed baby food at school when we've hungered for steak. The bits of meat that you did let slip through were pre-tuned and tasteless.
Starting point is 00:17:49 We've been dominated by satis or ignored by the apathetic. The food that had something to teach us found willing pupils. But those fewer like drops of water in the desert. This is our world now. The world of the electron and the switch, the beauty of the bod. We make use of a service already existing without pain for what could be dirt cheap if it wasn't run by profiteering glutton and you call us criminals. We explore and you call us criminals.
Starting point is 00:18:12 We seek after knowledge and you call us criminals. We exist without skin color, without nationality, without religious bias. And you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet worth the criminals. Yes, I'm a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of about smarting you, something that you will never forget me for.
Starting point is 00:18:43 I am a hacker. And this is my manifesto. You may stop this individual, but you can't stop us all, after all, we're all alike. Damn! Not gonna lie! That shit got my fucking blood moving when I found it! It's feeling some rage against the machine vibes there. Uh, it sounds like something I'd like to write for time suck. Reminds me of my younger self when I wanted to tear everything down.
Starting point is 00:19:05 Sometimes for the right reasons. Sometimes just because I didn't really understand how the world worked and just wanted to create chaos, make myself heard, make the world react to my destruction. Make it, make it, acknowledge my existence. I think this manifesto does some of hacker ethos pretty well, including the ethos of anonymous. Sometimes anonymous has burned shit down to expose and or destroy corruption and punish those who have committed blatantly heinous crimes and actions. Other times, they burn shit down just to watch it burn. So easy to read that manifesto and be like, fuck yeah bro, go hackers, go get
Starting point is 00:19:37 them. Get the man. Fuck the man. Fuck the banks. Fuck the government. Burn it all. And then later, when you have your credit card and banking information stolen, and you're not able to buy groceries or pay your rent because some hackers wiped out your account, you're like, whoa, whoa, whoa, nearly. Hold up hackers, wait a minute. Ha ha, not loving the hackin' right now. I forgot that when you burn it all down,
Starting point is 00:19:55 sometimes you get burnt, and you get trapped in the fires yourself. And then when the bank and their credit company, you know, and they help get your money back, and then the federal law enforcement needs to use track down the hacker who stole it from you Then you're like get those fucking hackers. Fuck them. Get them. Yeah. Yeah A lot more fun to read about hackers exploits than it is to be victimized by hackers
Starting point is 00:20:16 In 1988 in response to a growing number of hackers and security breaches DARPA the defense advanced research projects agency formed cert The computer emergency response team to address cybersecurity. In the 1990s, in an effort to crack down on a growing number of hackers committing computer-based crimes, the US Secret Service begins launching sting investigations, conducting raids, and arresting a number of hackers. Trying to avoid conviction, members in the hacking community begin to inform on each other in exchange for immunity, which of course leads to further arrests. But even as law enforcement cracks down further and further on cyber crimes, the sheer proliferation of computers being sold in the marketplace means more and more and bigger and bigger opportunities for hackers and their ranks swell.
Starting point is 00:20:58 No matter how many they arrest, there are always other hackers continuing to hack. It's like the mentor said, right, in that manifesto. You may stop this individual, but you can't stop us all. Businesses, corporations, government facilities, were now no longer being used, or excuse me, using isolated computer systems, but it moved on to large networks with massive interconnected servers that allowed them to do business more efficiently. It was a fantastic improvement on the previous way
Starting point is 00:21:24 doing business. These larger networks paved the way for today's massive e-commerce, right, industry. These larger networks were also though more vulnerable to hacking. New cyber attacks cost many organizations, millions and millions of dollars each year, exposed countless pieces of private and sensitive information. Since 2010, data breaches have exposed over 38 billion personal records
Starting point is 00:21:47 in 40,650 data hacks in just the US alone according to the cyber security firm, risk-based security. And since there are roughly 327 million Americans according to the latest census estimate, that means that the average person has had 116 of their accounts compromised over the past decade.
Starting point is 00:22:05 Fucking hackers. It gets hard to have really root for them. You know, when you read about stuff like this, I mean, you know, I think they're cool when I watch them in some movie like The Matrix and I fucking hate them. I can't log into some app because I've had to change the password five times in the last two years. And I can't remember what the new password is. And I keep having to change the password because of cybersecurity and cybersecurity exists because of hackers.
Starting point is 00:22:28 While most hacks have led to small data breaches, there have been numerous mega hacks over the years as well. Several companies such as 7-11, what's app, Fortnite? I love Fortnite. A reported security flaw is in the past couple of years. They could have exposed millions of customers' data. The extent of these hacks not been reported, but check out the numbers on some of these other big hacks whose reach was reported.
Starting point is 00:22:52 143 million records were stolen from underarmors my fitness pal app in 2018. That's a lot of payment information. In 2017, Equifax was breached to the point of affecting about 56% of all Americans, 147 million people. Hackers were able to get access to people's names, social security numbers, dates and birth, credit card numbers, even drivers license numbers. Equifax agreed to pay $700 million to settle federal and state investigations into how it handled the massive data breach. An email marketing company, River City Media, made headlines in 2017 for a hack that released 1.4 billion records. The company improperly configured a backup that accidentally placed
Starting point is 00:23:34 their entire database online, which contained details like customers IP addresses, names, even physical addresses. Currently, the title for the largest data breach in history goes to Yahoo, at least as far as we can tell. Yahoo first told the public in September of 2016, it experienced a breach in 2014 that affected 500 million accounts at least. And then that December Yahoo revealed that they had been a victim of an attack all the way back in 2013 that exposed at least a billion user accounts. Jesus. And this is obviously like worldwide.
Starting point is 00:24:07 This number would increase when Verizon bought Yahoo in 2017, revealed the number of accounts compromised in the 2013, 2013, excuse me, hack was more like three billion accounts. I can't believe that many accounts existed. Yahoo eventually agreed to pay $117.5 million to settle a class action lawsuit in April 2019 over how it handled communications around these hacks. A lot of fucking money to have to pay over some hacker bullshit. These are just a few enormous hacks. There's so many others. Hacks happen all the time across the world on big and small scales. That doesn't mean that all hackers have criminal intentions. The old school ways of hacking as a means of improving systems
Starting point is 00:24:44 still there as well as vigilante hacking. Within the hacking community, hackers seem to separate themselves primarily into five different groups. There's a class of hackers that claim to use their powers only for good. Ethical hackers, also known as White Hats. Ethical hacking consists of identifying weakness in a computer system system and or a computer network coming up with countermeasures that protect the weakness. Ethical hackers get written permission from the owner of the computer system before hacking, protect the privacy of the organization and report the weaknesses they find or they're hired by the owner of the system.
Starting point is 00:25:19 The opposite of the white hat is the black hat, also known as a cracker, aka criminal hacker, and a cracker is a silly ass white boy who needs to keep his fucking mouth shut. No, wait, sorry, that's not, that doesn't make any sense for me to say. No, a cracker is a hacker who gains unauthorized access to computer systems for personal game. And most of the time, these are just, you know, called hackers now again, making them cyber criminals. Crackers usually intend to steal corporate data, violate policy rights, transfer funds
Starting point is 00:25:44 from bank accounts, blackmail targets, you know, that kind of thing. Or just simply cause pain and suffering. Their actions fall under the very broad umbrella term of cybercrime. Cybercrimes include computer fraud, privacy violation, sometimes called doxing, identity theft, sharing copyrighted files,
Starting point is 00:26:01 like a legally downloading music, transfer and electronic funds, legally electronic money laundering, ATM fraud, even spam, fucking spammers. Another type of cybercrime is a denial of service attack, a DOS attack. It's used to deny legitimate users access to a resource such as accessing a website, network, emails, etc. Or making it extremely slow. This type of attack is usually implemented by hitting the target resource such as a web server, which is too many requests for information at the same time. Anonymous loves this type of attack.
Starting point is 00:26:34 They've used it very effectively time and time again. It'll come up a lot in the anonymous timeline. A DDoS attack results in the server failing to respond to all the requests. Ideally, this attack crashes the servers. And there's two types of DOS attacks, a basic DOS, which is performed by a single host and a distributed DOS, also called a DDS performed by a number of compromised machines that all target the same victim, much more effective, power numbers. A DDS floods the network with so, so many data packets, way too many, it jams the network, slowing it down, or ideally for the hacker,
Starting point is 00:27:07 crashing the server completely. Right, there's only so much bandwidth, they can only handle so much information at one time. A DDoS fucks up things pretty nicely, but typically not for very long. Most of these attacks don't seem to say, shut a server in a major corporate website down for more than a couple hours.
Starting point is 00:27:24 Or as opposed to, and please listen hackers, maybe replacing the home page with a gift of some super aggressive deep fake porn, making it appear that the CEO is having a real good time with the CFO and the CEO, maybe some farm animals, right? And then changing all the admin passwords to lock out anyone trying to erase that gift and then maybe do that same thing a few hours later after they get their system back online and then do it again and again and again. Just toss out a fun idea,
Starting point is 00:27:49 but don't do it to me please. Actually maybe do. First off, you know, might be kind of funny. Let's see what kind of deep fake porn you could come up with. Some combination of me, Lindsay, maybe Joe, maybe Zach, Logan, Liz, Sophie, the mannequins in the office, the doodles, Penny and Ginger.
Starting point is 00:28:02 Who knows? Might get us some free press and we get to both laugh and play the victim. Anyway, back to the five types of hackers. There's the gray hat, not everyone fits neatly into either white hats or black hats, good and bad. So there's the morally ambiguous gray hats. Sounds like I'm setting up D&D characters here. These are the hackers that break into computer systems without authority, with a view to identify weaknesses and reveal them to the system owner or Dependent on what they find maybe steal and some shit maybe breaking some stuff I feel like I might be a gray hat if I was a hacker. I had sometimes do good things and then sometimes like nah fuck these guys
Starting point is 00:28:38 Then there's what's called script kitties script kitties are like Assistant hackers junior hackers, junior hackers, slacker hackers, hacker lackeys, maybe that one. They like to create a little havoc online, but actually they don't really want to learn the coding skills required to really hack, right? That gets in the way of some fortnight or some call of duty. So they just become part of a larger script kittie army. They work with software that a skilled coder slash hacker has created for them to use. And then finally, there are the hacktivists. This is the class that anonymous and it splinter groups fall under, or at least they consider themselves to be
Starting point is 00:29:12 hacktivists. Hacktivism is the act of using legal or illegal digital tools in pursuit of political ends. Free speech, social messages, that type of thing. Hacktivists are usually motivated by human rights issues, or claim to be an often hijacked websites to display a message about their cause. Now that we've gone over the hacker types, let's say you would like to become a hacker. Hopefully an ethical one, or at least a grant.
Starting point is 00:29:35 As a hacker, what will you need to do? What will you need to learn? Well, you'll need to develop skills that will, you know, obviously help you get the job done. You're going to need knowledge of how computers talk to one another and relate information to a network system, also known as a programming language. Different platforms have different programming languages. As an example, Visual Basic Classic, 3, 4, 5, and 6.0.
Starting point is 00:29:57 And then the successor to Visual Basic, Visual Basic.net, are used to write applications that run on Windows. The most recent version on the .NET framework is Visual Basic 2019. It will be therefore illogical for you to learn how to program in Visual Basic if the program you're trying to hack into runs on JavaScript. Once you know your way around,
Starting point is 00:30:16 how to program these different languages, some good social engineering skills can also help you hack. Social engineering is just a really nice way of saying being manipulative. How can you manipulate the user of a computer system into revealing confidential information that can be used to gain unauthorized access to the computer system? One example is just spam. How can you trick somebody into clicking a link?
Starting point is 00:30:39 How good are you at tricking people into revealing passwords or downloading hacking code that will allow you access to whatever system you want to exploit. You know, how here's an example of a little bit more involved social engineering than just getting somebody to trick a click link. You know, let's say you look into the company director of some company on their website and then you pick an employee that has the access you desire and then you just straight up, stock them. You find them on social media, you find out where they live, you spy on them, you learn
Starting point is 00:31:06 their routine, maybe you sneak an infected flash drive into their laptop, when they go to the bathroom, the download, some type of Trojan horse, worm or virus on to their computer. Trojan horse is a program that allows you to attack the user's computer from a remote location, right, and control it. The program is usually disguised as something that is useful to the user. Once the user has installed the program, it has the ability to install malicious payloads, create backdoors, install other unwanted applications that can be used to compromise the user's computer and so on.
Starting point is 00:31:37 A worm is a malicious computer program that replicates itself, usually over a computer network. An attacker may use a worm to install backdoor entries on victims' computers to send spam emails, perform distributed denial of service attacks, or create opportunities for other malware to exploit. And finally, there are viruses. I'm sure you've heard of them. A virus is a computer program that attaches itself
Starting point is 00:31:59 to legitimate programs and files without the user's consent. Viruses can consume computer resources, such as memory and CPU time. The attack programs and files are said to be infected, and the computer virus may be used to access private data, display annoying messages to the user, corrupt data, even track the user's keystrokes, all kinds of stuff.
Starting point is 00:32:18 And obviously all of this is super illegal. And who are the folks looking to find and arrest these cybercrux, putting all these viruses, worms, Trojan horses, and etc. out there? Well, you will be very surprised. I'm guessing unless you are really knowledgeable about the subject. Initially, long before his career in reality television, the world's most successful cyber cop, really the first kind of, I don't know, quasi-silever quasi celebrity cyber cop way before he had a reality show
Starting point is 00:32:45 was dog the bounty hunter. Dog real name Dwayne Chapman went to MIT for two years before dropping out in 1973. He moved to the Silicon Valley, became one of those freakers. I'm fucking crazy. He and Apple co-founder Steve Woznik were briefly roommates. They shared the same Cupertino apartment for about a month. Dwayne then went to work for Radio Shack. Shortly after the company was founded as a purchaser while living in Columbus, Ohio, expanding the Radio Shack brand in the early 80s, he got real into hacking. Rumored
Starting point is 00:33:15 to have broken into Wells Fargo's primary servers, or some sources say he then moved over $100 million into several offshore accounts in the Cayman Islands. He was about to transfer the funds to Switzerland with the CIA cotton. Is it what the story says? They made him a deal, return the money, come work for us, or spend the rest of your life in prison. And the CIA allegedly told him, we want you to grow your hair and bleach it, and mostly wear leather vests with no shirt underneath. And start wearing Oakley sunglasses all the time, like fucking all the time, especially indoors and change your name to dog and start saying shit like dog is God spelled backwards and born on a mountain, raising a cave, arresting fugitives, all I crave is anyone still
Starting point is 00:33:56 believe the dog to bounty hunter. Had anything to do with the hackers, right? He was the first cyber cop that he once went to MIT. God, I hope someone hit pause. After I said, dog the bounty hunter, once cyber attack Wells Fargo and stole over $100 million and I hope that person is fucking telling everyone they know. Oh my God. You didn't know about dog the bounty hunter's backstory? Before he had to, like, the bleach hair before he was living in Hawaii. Now, he was a hacker. He was like a hacker and then he became like a cyber cop. No, the FBI is lead federal agency for investigating cyber attacks and intrusions followed closely by the Department of Homeland Security.
Starting point is 00:34:30 Under the DHS, the secret service has a cyber intelligence section that works to target financial cyber crimes. The DHS created the enhanced cybersecurity services, ECS, to protect public and private sectors in the US. Cyber security and infrastructure, security agency approves private partners that provide intrusion detection and prevention services through the ECS. States have their own cyber crime units as do many cities,
Starting point is 00:34:54 none of them employ the computer programming, Sivant, that is dog to bounty hunter. Speaking of dog, let's talk about some criminals before we get to our timeline. I love learning this, two of the most criminally successful hackers ever. On January 8, 2013, the Algerian hacker, Hamsa bin Dalij, it was hard to find a pronunciation of his name.
Starting point is 00:35:16 AKA BX1. One by BX1 was arrested in Thailand and extradited to US after a five year international manhunt. Dude was on both the FBI and Interpol's 10 most wanted list. And he was only 24 years old when he was arrested. And because of a big grin, he flattly. He looks like a super nice guy. When the press took a picture of him, he showed that after his arrest, big ol' grin.
Starting point is 00:35:37 He was dubbed the Smiling Hacker. Hamzaa speaks five languages, used his linguistic skills and conjunction with his hacking skills to fuck with people all over the world. He's the co-creator of some real nasty malware called spy eye. And his malware infected over 60 million computers worldwide. And once a computer was infected, he and his Russian malware co-creator Alexander Pinin, aka the hacker, Gribo Demon, could and did steal banking information that they would then use to drain someone's account with.
Starting point is 00:36:08 On April 20, 2016, Hamza was sentenced to 15 years in prison, three years of probation. His accomplice Alexander arrested Atlanta's Hartzfeld Jackson International Airport in the summer of 2013, sentenced to nine years, six months in prison. The US Department of Justice that their trials estimated that these two using their spy eye malware had stolen approximately a billion dollars. Homs also rumored to have hacked into the Israeli government's official website stolen value information, then gave that information to the Palestinian government rumored to have given $280 million to Palestinian nonprofits. No traditional in-person bank robber has ever stolen anywhere near that amount of money.
Starting point is 00:36:48 And that's not even the craziest story of the two. There's the Carbonac Cyber Gang. This should be even more ridiculous. From 2013 to 2018, using a series of malware attacks called Anunac and Carbonac, and then using some modified cobalt strike software turned into malware, this gang targeted financial transfers and ATM networks to still to steal excuse me well over a billion dollars. Cobalt strike is actually a legitimate piece of software that's used to simulate cyber
Starting point is 00:37:16 attacks. It's cyber security software and these fuckers hacked the cyber security software and modified it to use it to pull off real cyber attacks that were very effective. Their leader, a man identified as Ukrainian Dennis Katana, was arrested in Alekante, Spain, March 6, 2018. And check out one of the ways his gang would rob on the evening of July 10, 2016 in Taipei, Taiwan, who was pouring down rain.
Starting point is 00:37:42 Most people were staying inside, not Sergejay, Baroscovy, and Vladimir Berkman. These two Russians walked up to an ATM at first commercial bank, one of Taiwan's top lenders, wearing hats, wearing the kind of mask we see everyone wearing now with COVID. Two witnesses watched them just stand in front of the machine, not touching it for a few moments. And then as the astonished couple in line behind them later told the police, the ATM just started spitting out cash like all of its fucking cash.
Starting point is 00:38:08 Neither man had touched it. Can you imagine seeing that? The two men started shoving all the big bills into the machine to spit out into the satchel. Then they jumped into a waiting black sedan and spit off when the satchel was full. The only reason we know who they are is because one of them fucked up and had a bank card. He didn't even use that night, fall out of his pocket at the scene of the crime and that couple who witnessed this happen, they picked it up and gave it to authorities.
Starting point is 00:38:31 These guys were just two of 15 money mules. They're called who hit 41 ATMs at 22 branches of first commercial over that same stormy weekend, taking in 83 million new Taiwan dollars or about the equivalent of 2.6 million us. How did they do it? CarbonX CyberGang hackers hacked into the bank's ATM network, forced the machine to spit out cash, but how did the machines know when to spit the cash out? Well the gang also hacked into the ATM security camera feeds and were able to watch from a remote computer or computers, wait for the right guys to stand in front of the right ATMs and then fucking there you go.
Starting point is 00:39:06 Bingo, bingo! Here comes the cash. Holy shit. I know bank robbery is fucked up, but this might be the coolest bank robbery I've ever read about. It's like something out of a movie. Hackers on computers, maybe just one hacker could be that dude back in Spain or anywhere else in the world, right?
Starting point is 00:39:24 Just watching on the screen, I picture some big ass fucking screen, some like secret room, you know, just watching the security camera feeds on 41 ATMs and Taipei. And then when the right dude show up in front of the right ATM, just push us a couple buttons and they just pump out all of their cash. And this wasn't the first time they'd done this and it wouldn't be the last time. They also redirected huge money transfers from intended accounts to their accounts over and over again for years. By 2018, they'd hacked into over 100 banks and over 40 nations, including Germany, Russia,
Starting point is 00:39:53 the Ukraine, the US, stolen more than an estimated $1.2 billion, according to Euro pool. They stole the identities of countless network administrators and bank executives, plumb their hard drive files for sensitive information about security and account management. The gang operated through remotely access computers, hid their tracks in a sea of IP addresses. No word on what's currently going on with that Dennis Katana. After his arrest, information on him, as far as what I can tell, goes silent on the web. Don't know that he's even been charged. Just know that he was arrested.
Starting point is 00:40:26 I imagine he can afford some pretty good attorneys. And since his arrest, Carbonacus pulled off new heists, adding a lot of money to their already over $1.2 billion in their cash haul. So his debt is even the real ganglion leader. To quote mentor again, you can stop this individual, but you can't stop us all., he might not even be like the real head of the gang or there could be five other people that can do what he does fucking crazy Okay Now that we've gone over how hacking evolved what kinds of hackers there are how hacking is done Glance to what a few of the most successful criminal hackers have pulled off at least theft wise and
Starting point is 00:41:02 Examined dog the bounty hunters role in all of this. Let's dive into an anonymous timeline after our sponsor break. Thank you for listening. Now let us hack. suck time line. On October 1st, 2003, 4chan, an anonymous English language image board website comes into existence. The site was inspired by 2chanel, 2CH.net, which now redirects to 5CH.net, a massive internet forum, with seemingly random content that was especially popular in Japan. Two channel debuted back in 1999. Most of the initial various forums on 4chan were
Starting point is 00:41:51 based on Japanese pop culture, but their most popular forum quickly became B, like this slash B slash, a forum designated for random content, and in the sea of random content anonymous would form. In the mid 2000s, Aubrey Kotdle was part of a crew of online pranksters who called themselves trolls. One of the OG web trolls, and these trolls met up on 4chan B, also on a site called Something Awful, a comedy website for the blogs, forums, lots of dark humor and memes, you know, the kind of content that got our cult to Curious Private Facebook group, uh, thrown in Facebook prison, or it still sits. Uh, I am still emailing back and forth curious private Facebook group, throwing Facebook present, or still sits.
Starting point is 00:42:25 I am still emailing back and forth with them every week by the way, and only getting a new vague email answer each Monday, that is probably auto generated. Let me know that the Facebook team is still reviewing the cult of the curious. Sorry if you're wait. Damn you queuing on! You fucked up social media for everybody recently.
Starting point is 00:42:41 Anyway, in 2018, Gizmodo ranks something awful as 89th on their list of 100 websites that shape the internet as we know it. 10,000 users were on these forums and image boards back in the early 2000s, almost all of them young men, many likely covered in Cheetos and Doritos dust, full amount and do, worry that mom is going to walk into the rooms and catch them jerking off again. And among these keyboard warriors was an especially die hard band who hung out in the same chat rooms,
Starting point is 00:43:06 viewed it online, and then met up in real life in Toronto, Canada. And these dudes started to call themselves anonymous. The name was derived from the way 4chan presents usernames. If known as specified, the site would display anonymous by default. So there you go on the history of the term.
Starting point is 00:43:22 And 2006, these anonymous tech wizards decided to start attacking people they didn't like. One of the first anonymous attacks, maybe the first big coordinated attack, was against how Turner in December of 2006, a deserving target, I have to say, according to the Southern property law center, Harold C. Howell Turner's white supremacist true believer who has been using radio and internet broadcast to disseminate his hate since the 1990s. This guy's real piecework. What anonymous members did not know when they started fucking with this guy was that he was an informant for the FBI providing information on white supremacist groups for the same government
Starting point is 00:43:55 he frequently railed against. According to how from December 2006 to January 2007, individuals who identified themselves as anonymous took Turner's website offline, costing him thousands of dollars in bandwidth bills. As a result, Turner sued for Chan, E-Bombs World, seven Chan and other websites for copy infringement, and he didn't win shit. He did expose anonymous to the feds, right? Because how was secretly working for the feds, anonymous was put on the government's radar.
Starting point is 00:44:21 And in 2007, an agent from the Canadian Security Intelligence Service, Canada CIA, showed up at Aubrey Coddles Toronto door, or rather at his mom's door. Coddles 20, still living at home, maybe jerking off when they showed up. The agent, according to Coddle, wanted him to raid internet forums for the CSIS. Anonymous had been conducting a fair amount of raids, flooding online games and chat rooms with their army of users to disrupt the space, just to be, you know, kind of dicks. In Fort Chan, began cracking down on organizing raids, anonymous migrated to Coddle's copycat site for 20 Chan, which he created to discuss his principal interests, drugs and professional
Starting point is 00:44:58 wrestling. Coddle became the de facto leader of anonymous, a role he relished. Coddle turned down the cs is offer apparently didn't have enough on him to charge with anything this one him to help them with some hacking and then late two thousand seven anonymous set its sites on a new target to harass on December 7th two thousand seven
Starting point is 00:45:17 the candidate based newspaper the tronel son publishes an article on one chris for can't or can to his fifty three which are with two counts of luring a child under the age of 14 attempting to invite sexual touching, attempted exposure, possessing a dangerous weapon, and carrying a concealed weapon. Anonymous knew about his illegal activities before the police themselves did. How?
Starting point is 00:45:39 Well, this creepy diddler had tried to molest one of the young Toronto hacking members, and they made him fucking pay for it. Love it. The Canadian media group, the Global Television Network identified the group responsible for four cans of rest as a self-described internet vigilante group called anonymous. The article noted this incident marked the first time that a suspected internet predator had been arrested as a result of internet vigilanteism. It's a very cool.
Starting point is 00:46:05 Hail, Nimrod! By 2008, the infamous Guy Fox mask starts to show up in relation to anonymous. Why do they wear this mask? Why do they choose it? Well, they chose it simply because they loved the movie V for Vendetta. And it is a great movie. Highly recommend if you haven't seen it already. The movie is a 2005 film adaptation of a dystopian fiction Alan Moore graphic novel,
Starting point is 00:46:26 Alan Moore's fantastic. A V, the film's protagonist, Don's the Disguise to fight a future fascist police state by fire bombing buildings and virtue the story of the original guy Fox, who was vilified in the English folklore for attempting to blow up Parliament in 1605. David Lloyd, the artist who illustrated the graphic novel,
Starting point is 00:46:44 the movie was based on once told the New York Times that the mask was a great symbol of protest for anyone who sees tyranny. The guy Fox mask has since become a global symbol of dissent. Sometime in the late 2000s, Grammy winner and platinum record selling member of the Rock and Roll Hall of Fame Michael mother fucking McDonald triple and records a very popular ad for Folgers Coffee. The best part of waking up is Folgers in your car. Something you can count on, gets you through your day. And Folgers Richard. It's one of my favorite things.
Starting point is 00:47:20 Yeah. I'll wake up to the smell of coffee. Fuck you. The more presents that place where we all meet in a And of course of a day Wise words wise words You welcome what does that have to do with hacking. It does everything to do with being McDonald's did. Back to anonymous. 2008, anonymous members start wearing those V for Vendetta
Starting point is 00:47:51 Guy Fox mask in relation to an attack on the Church of Scientology. Oh, here we go. Project Chanology time, the era of activism begins. And his core project, Chanology, was a hacker based protest against the Church of Scientology led by a bunch of 4chan Beboard trolls. Things kicked off on January 14th, 2008, when a video produced by the Church of Scientology featuring an insane and unintentionally hilarious interview with Tom Cruise was leaked to the internet and uploaded to YouTube. Such a good video. I played a little excerpt from this video back in
Starting point is 00:48:25 a suck I did on Scientology four years ago. In the video, music from Cruz's mission impossible, that film plays in the background while Cruz makes various wild statements, like saying that Scientologists are the only people who can help you after car accident. And that Scientologists are the only authority when it comes to how to get addicts off of drugs. Let's listen to a little bit of this nonsense. I agree. Being a Scientologist, when you drive past an accident, it's not like anyone else.
Starting point is 00:48:52 Yes, you drive past. You know you have to do something about it, because you know you're the only one that can really help. That's what drives me. It's that I that we have an opportunity and To really yeah help totally to really You know like what's that word help? That's what we do, you know Scientology. We just you know It's heavy, you know, we help we help stuff
Starting point is 00:49:22 I would think a paramedic is who would you want to help you after you got into a car accident. Nope, just call Tom Cruise. One more clip from this fucking nonsense. So, like would have beautiful thing because maybe one day it'll be like that. You know what I'm saying? Maybe one day it will be.
Starting point is 00:49:51 Wow, SP's like, they'll just read about those in the history books, you know? That's the thing. You know? Oh, God. An SP is a suppressive person. By the way, suppressive person, Scientology speak. For anyone who doesn't think the teachings of Scientology
Starting point is 00:50:08 is the one and only true way to live. I'm a very suppressive person, an anonymous full of SPs, they're very suppressive. The Church of Scientology, not a fan of someone posting this video, they claimed that the footage was taken out of context and manipulated, it's just crazy. And then they slapped copyright violation claim
Starting point is 00:50:26 to get YouTube to take the video down. YouTube did take it down and then someone from anonymous re-uploaded it under a new name. You may stop this individual, but you can't stop us all. The video I just played was uploaded by someone with anonymous in their channel name back in 2011. Anonymous formulated project, Chanology in response to Scientology
Starting point is 00:50:44 trying to make this video go away. A member of anonymous told the LA times that as of February 4, 2008, the group consisted of a loose confederation of about 9,000 people who posted anonymously on the internet. Anonymous members saw the copyright actions by the church of Scientology as censorship. Given the church's long history with combatting poor press,
Starting point is 00:51:03 the members started to see themselves as a vanguard against Scientology's scorched Earth Legal Moose. Members of Project Scientology said their main goal was to enlighten the Church of Scientology by any means necessary. They created a website that stated, this will be a game of mental warfare. It will require our talkers, not our hackers. It will require our dedicated anonymity across the world to do their part. Project Scientology stated goals included the complete removal of the Church of Scientology's presence from the internet and to save people from Scientology by reversing the brainwashing. To do this, they organized a series of denial of service attacks against Scientology websites, as well as prank calls, and something called, this would be so annoying if it happened to
Starting point is 00:51:42 you years ago, a black faxes. Black faxes are exactly what they sound like. A faxed full page of black ink. Nothing left open. Takes a long time to print, right? It gums everything up and it wastes a ton of ink. And they can just do this to facts machines over and over and over again. Just make your facts between your, which a lot of times was tied to your printer, completely unusable. Super annoying., fucks up doing some business! On January 21st, 2008, individuals claiming to speak for anonymous announced their goals in intentions via a video posted YouTube titled Message to Scientology. A subsequent press release declares war against the Church of Scientology.
Starting point is 00:52:19 In the press release, the group states that the attacks against the Church of Scientology will continue in order to protect the right of freedom of speech. They also wanted to draw attention to the financial exploitation of church members. A few days later a new video titled Call to Action Appears on YouTube is on January 28, 2008. The video calls for protests outside of various Church of Scientology centers. And just a few days later the protests began. On February 2nd, 2008 to 150 people gather outside of a Church of Scientology centers. And just a few days later, the protests began. On February 2nd, 2008,
Starting point is 00:52:45 150 people gathered outside of a church of Scientology center in Orlando, Florida protesting the organizations practices, and they wear those guy-fox masks. Or otherwise, you know, disguise their identities to protect themselves from reprisals from the church. Small protests also held in Santa Barbara, California, Manchester, England. Then on February 10th, 2008, about 7,000 people protest Scientology in about 93 cities worldwide. Anonymous holds another wave of protests against Scientology March 15th, 2008, and cities all over the world. People gather in Boston, Dallas, Chicago, Los Angeles, London, Paris, Vancouver, Toronto, Berlin, Dublin, many other cities.
Starting point is 00:53:23 The globe will turn out estimated to be around 8,000 people. The church's Scientology is under attack. And on March 28, 2008, they may have fought back online. That day, JavaScript code was maliciously injected into the epilepsy foundation of America's web forums to generate animations that would trigger epileptic seizures. Webit fucked up. Ryan Foltz, a 33-year-old woman who
Starting point is 00:53:47 suffered from pattern-sensitive epilepsy, clicked on a forum post with a legitimate sounding title that day that her browser window resized to fill her screen, which was then taken over by a pattern of squares rapidly flashing in different colors and she had a seizure. An anonymous was blamed for the attack. Members of the epilepsy forum claimed they found a thread in which the attack was being planned at 4chan. But 4chan administrators said they believe the attack was done by the Church of Scientology who were trying to make it look like the attack was done by anonymous to harm their reputation. It's a cyber war, baby. A third wave of protests against Scientology, or maybe fourth, to now takes place on April 12, 2008 named Operation Reconnect. It aimed to increase awareness of the church Scientology's disconnection policy.
Starting point is 00:54:31 The policy basically amounts to the church, pressuring people to discontinue their associations with anyone in their lives that could potentially become hostile to Scientology. Right. People labeled it again as like Tom Cruise was talking about those SPs, those suppressive persons. Okay, going forward in the timeline now, I will not list out every single cyber attack credited to anonymous to keep this timeline from being incredibly boring and repetitive. Also, because the nature of a hacking group like this, it is impossible to fully verify which attacks are in fact carried out by anonymous, because some of these attacks could have been carried out by a different hacking group just claiming to be anonymous. There is still debate over how organized or unorganized this group is or has ever been.
Starting point is 00:55:14 Has it primarily been one group of hackers coordinated attacks or has it been a revolving door of random hackers hiding behind the anonymous banner? We will never know for sure. Anonymous gets more press in September of 2008. Shortly after midnight on September 16th, the private Yahoo male account of former Alaska governor, Sarah Palin is hacked by a forechan user. At this time, Palin was running with John McCain
Starting point is 00:55:37 for the 2008 presidential bid. She was the vice presidential candidate. McCain had announced that he'd chosen Palin, Palin, excuse me, on August 29th, in date no hyal making her the first to last in second woman to run on a major u.s party ticket. The hacker known as rubicoe claimed he had read palin's personal emails because he was looking for something that would quote derail her campaign. But he didn't find anything. Rubicoe reported all he found with some personal stuff and some clerical stuff from when she was governor. Rubicoe claimed used the Sarah Palin, a palin.
Starting point is 00:56:07 God, I once once say palin. He used the Sarah Palin Wikipedia article to find Palin's birthday, one of the standard security questions used by Yahoo. And a minute later, he'd taken over her account. And then he posted the accounts password on four-chans B board. Rubico also posted screenshots from the account to WikiLeaks. So he didn't actually accomplish anything as far as political derailleen, but you know, people were scared that it was so easy for him to hack into a high profile person's account.
Starting point is 00:56:34 In 2009, in January, hackers claiming to be anonymous find another interesting target, a California teenager named McKay Hatch, who ran a website against profanity called the No Cushing Club. This is just silly. Hatch's home address, phone number, other personal information was spread across the internet. Over the following years, his poor family received hate mail, obscene phone calls and frequent deliveries, mostly of pizza and pornography. That's poor kid.
Starting point is 00:57:03 I would love to think otherwise, but had I had the talent to hack and be in a teenager in 2009, I would have absolutely used my hacking skills to do shit like send porn to some other teen who I just didn't like, some teen who started a club called the No Cussing Club. I wonder if he ever finally cussed when more and more porn and pizza just kept showing, you know, up at his door
Starting point is 00:57:27 Beat delivery oh gosh dang a fifth time today. Oh my heck What is it now? Hey, okay? I got three extra large meat lovers that'll be 35 bucks. Oh fuck with heck Peter You know golly darn well. I didn't order these heavens to Betsy. Oh, no What are these magazines laying in front of the door? Uh, looks like copies of, uh, Swank, uh, Barely Legal, Club 17, Asian Babes, uh, Jugs. What the flip? These not even picture books aren't mine, you know that.
Starting point is 00:58:00 Please get off my porch, Peter, and take these Harlett self-pleasure mags with you. Burn them before Satan uses them to steal your heart and soul All right, I'm okay. I'm in I'm sure I'll all like see you tomorrow's them in the like 20 minutes later Hey delivery, oh cord nuts. This is six time today. What is it hey, okay? Hey, Rodrigo. Hey, I got three medium Hawaiians, four X large cheese stuff crust, 17 orders of bread six, dozen liter, Dr. Pepper, it's gonna be $185. How f*** me in the face, Peter?
Starting point is 00:58:34 A rot rigo, I don't even know who I mad at, I'm so discombobulated, gee whiz, I'm flipping peev'd. Oh no, why are there more dirty bits magazines out here? What even are these? Run, Ringo! Uh, this looks like copies of Asian fever, uh, black inches, uh, big titties and small holes, uh, bounding gagged, uh, manshots, uh, cum slappers, uh, dirty bridges, and naughty bitches. God damn it Peter!
Starting point is 00:58:57 I'm losing my mother fucking mind with all this porn and pizza! Or run, Ringo! Fuck, fuck, run, Ringo! Fuck Peter! Fucking anonymous! Fuck everybody in their time shave assholes. Oh, God dang. Oh, sorry Rodrigo. I don't know what came over me. I just crisscrossed the case off. It's been it's been real rough few weeks, you know. If you're worried about the real, uh,
Starting point is 00:59:20 McKay hat, he's fine. He seems fine. I looked into it. Uh, based on his IG account, he's doing all right. And he's still not causing just so you know, uh, you just posted a picture of himself from about a week ago. We're in a hoodie that had shut the front door print on the front. So those pizzas have porn. Ah, they didn't break him. Uh, things got more serious. The international for anonymous activists in the summer of 2009 anonymous turns away from cyberbull bully now. Turns to try to protect free speech and democracy. The results of the June 2009 Iranian presidential election had declared incumbent president Mahmoud Ahmajidin Ahjoud. Oh my god. Ahmajidina Jod, there we go. I did
Starting point is 00:59:59 it. Ahmajidina Jod, the winner, but allegations that the election had been rigged quickly followed. Thousands of Iranians protested. And the Iranian government responded by blocking opposition websites and other media as well as disrupting mobile phone connections. Anonymous working with a bit torrent file sharing website the pirate bay and various iranian hackers launched an iranian green movement support site called anonymous iran which provided users with advice forums to fight government censorship. Very cool, very different than thrown porn and pizzas, some kid doesn't want to cuss. They also encourage Iranian users to use distributed denial of service attacks in order to take down key Iranian government websites. Ultimately, unfortunately, they would not change the outcome of anything though, but at
Starting point is 01:00:42 least they tried to do something about President Mahmoud there. November 2009 would see the first person sent to jail for participating in an anonymous attack. His name was Demetri Guzner, an American 19-year-old. Guzner was arrested after a YouTube video of a real-life protest that mentioned his internet handle, Andy, caught the attention of federal authorities. The FBI and the US Secret Service worked together to identify Andy as Guzner. The search is home in Brooklyn, found one of those guy fox masks. He played guilty to unauthorized impairment of a protected computer in November of 2009
Starting point is 01:01:15 and was sentenced to 366 days in a US federal prison. Cyber-attacking Scientology is what got that guy in trouble Tom Cruise loving it on February 10th 2010 anonymous launches operation tit storm hail Luciferna Not making up that name such a great name God sounds like something DJ iceberg would sage promote some kind of I don't know live wet t-shirt contest It's so big. Yeah, that's just the tip. DJ iceberg. Hey there rock listeners.
Starting point is 01:01:52 Join me, DJ iceberg, down to three amigos barring, grillin' the corner of East Brayton, hellin' on this Friday night at 9pm for Operation Tint Storm. It's a wet t-shirt contest, and I'll be the judge. Motorboat bribes, accepted and appreciated. The winner gets a $3.00 $100 gift certificate and two tickets to Lucky Jack's casino next Saturday night to watch Striper! Fuck it, bro! Be there! Get the city now! Operation tit storm was actually a cyber attack on the Australian government.
Starting point is 01:02:30 I did the best name. The Australian government had decided to crack down on pornography, specifically pornography featuring women with small breasts and female ejaculation. The rationale was that porn featuring these images was more likely to feature underage actors. Anonymous seized this crackdown as Freedom Attacking's censorship. At 8 a.m. on February 10, 2010, Operation Tits Storm was launched. Anonymous hackers used again those denial of service attacks on various Australian government
Starting point is 01:02:57 websites. Australian anti-sensorship groups then complained that the attack only hurt their cause. Australian government members dismissed the attack and said that they would just restore the service when the attack was over. And that's what they did. The attack did not do much, but was worth mentioning because, you know, operation hit storm. Operation payback is a bitch, commences in September of 2010. Sorry, I paused weird there.
Starting point is 01:03:21 The operation is payback as a bitch. It started when the MPAA motion picture association of America and the RIAA recording industry association of America hired the Indian software firm Aplex to launch DDoS attacks on the pirate bay and other websites related to file sharing and retaliation anonymous posted the following operation Operation Payback is a bitch. Date, September 19, 2010, to whom it may concern. This is to inform you that we, anonymous. You know what, I need some music for this. I can't just read this straight. Let's get that hacking music back on. Fuck you. We, anonymous, or organizing an operation called Payback is a bitch.
Starting point is 01:04:02 Anonymous will be attacking the RIAA, the MPAA, and their hired gun Aplex. For attacks against the popular Torrent and File Share inside the pirate bay, we will prevent users to access said enemy sites, and we will keep them down for as long as we can. But why, you ask? Anonymous is tired of corporate interest controlling the internet
Starting point is 01:04:23 and silencing the people's right to spread information. But more importantly, the right to share with one another. The RIAA and the MPAA feigned to aid the artists and their cause, yet they do no such thing. They do, actually. In their eyes is not hope, only dollar signs. Anonymous will not stand this any longer. We wish you the best of luck. Sincerely, anonymous, we are Legion. An anonymous executed DDS attacks on the MPAA, the RIA, and Aplex.
Starting point is 01:04:56 And oh boy, you can really see the age of these hackers come through based on a lot of their recent target choices here. Try and take away their online porn. They're gonna come for you. Try and take away free movies and music that they wanna download and just not fucking pay for. They come for you and make up some weird bullshit to rationalize their theft. Not exactly looking like serious revolutionaries
Starting point is 01:05:16 with some of these attacks. December of 2010 anonymous gets a little more serious again. And they go after MasterCard, Visa, PayPal, the Bank of America and Amazon. That December, the documents super archive WikiLeaks would come under fire. WikiLeaks was ordered to stop publishing US military secrets. And when they didn't, MasterCard, VISA, PayPal, the Bank of America, Amazon, all blocked charitable donations to their site.
Starting point is 01:05:41 In response, anonymous announced its support for WikiLeaks and the anonymous launched DDoS attacks against these companies. Due to the attacks, both MasterCard and Vista's websites were taken down in December 8th, anonymous also launched Operation Avenge Assange, an attack that brought down his Swedish prosecutor's website. This was done in response to WikiLeaks founder Julian Assange's arrest in London. December December 17, 2010, the Tunisian Revolution, also known as the Jasmine Revolution, begins in Tunisia. There should be a big moment for activism in the world. Demonstrations started because of high unemployment, food inflation, corruption, lack of political
Starting point is 01:06:18 freedom, and poor living conditions. An intensive 28-day campaign of civil resistance, included a series of street demonstrations that led to the ousteen of longtime president, Zine L. Abadine Ben Ali. Following these demonstrations, Tunisia would have free elections. The protests inspired similar actions throughout the Arab world, and a chain reaction that would become known as the Arab Spring movement. Anonymous would play an important role in the regime changes to come. Starting on January 2, 2011, websites for the Tunisian Stock Exchange and the Tunisian
Starting point is 01:06:49 Ministry of Industry were brought down by anonymous DDoS attacks. The Tunisian government had tried to restrict the Internet access of its citizens. Anonymous was not having it. By the 6th, Tunisia had arrested a variety of bloggers and cyber activists who had been critical of its government. Protests followed, culminated in the fleeing of President Ben Ali on January 14, 2011, ending the Tunisian revolution. This is a victory in anonymous really helped.
Starting point is 01:07:15 This was huge. Ali would be sentenced in absentia to life imprisonment and would die in exile in 2019. On January 26, 2011, the Egyptian government became anonymous's next target. Effort started with the intention of removing Egyptian President Hosni Mubarak from power. When the government blocked their citizens from accessing Twitter, anonymous brought down Egyptian government websites with DDoS attacks. The sites remained offline until President Hosni Mubarak stepped down. He would do so on February 11th. Another victory that anonymous had a hand in.
Starting point is 01:07:48 During the protests that led to his resignation, anonymous provided protesters with documents required to take down the incumbent government, incumbent government, as well as distributing digital care packages that had, among other things, a tour used to access the dark web and a grease monkey script to avoid proxy interception by the government. They also added in passing information about the protests in and out of the country. The revolution to Egypt and Tunisia were the first in what would become the Arab Spring.
Starting point is 01:08:13 In response to oppressive regimes at a low standard of living, revolutions spread to five after Tunisia, five other countries, Libya, Egypt, Yemen, Syria, and Bahrain. In support of the Arab Spring protests, anonymous also released the names and passwords of the email and email addresses of Middle Eastern government officials. Countries targeted included officials from Bahrain, Egypt, Jordan, and Morocco. So big wins for anonymous hacktivism here. They weren't just fucking around with teens who didn't like profanity. They weren't just going after people who wanted to take away some of their sweet porn. They were also helping topple autocratic regimes. Right, now they're looking like true revolutionaries again.
Starting point is 01:08:47 In 2011, hacking groups like anonymous are big news, they seem invincible, hacking proliferates. Members of anonymous go off to form splinter groups like the infamous Lowell's Sec. Lowell's Sec would become notorious for successfully breaking into a number of corporations and police servers, disabling government security sites, stealing sensitive information, such as credit card details, and defacing commercial websites.
Starting point is 01:09:10 On the weekend of February 5, 2011, anonymous flexes its power yet again. Aaron Barr, the chief executive of the IT Security firm, H.B. Gary Federal, announces that his firm has successfully infiltrated anonymous and is going to take them down. He says he will reveal his findings at a later conference in San Francisco and he done did poke the bear. Oh shit. He done didn't poke the wrong fucking bear.
Starting point is 01:09:35 Whole legion of bears wearing guy fox masks. And it will tear him to shreds and retaliation for bar's claims anonymous hacks the website of HB Gary Federal replaces the welcome page with a message stating that anonymous should not be fucked with. Then, anonymous takes control of the company's email. They dump 68,000 emails from the system, erase additional files, take down their phone system. The documents they leaked revealed sensitive information among the documents was a PowerPoint presentation entitled The WikiLeaks Threat.
Starting point is 01:10:04 HB Gary was trying to figure out how to attack WikiLeaks. Their plans included cyberattacks, disinformation, getting journalists to deny their support for WikiLeaks. Anonymous is pissed off. They loved WikiLeaks. Anonymous then personally attacks Aaron Barb by taking control of his Twitter account, and posting his home address and social security number for anyone who wants to see it. Anonymous also clogs up HP Gary Federal's facts machines for weeks with those black
Starting point is 01:10:29 faxes. Then they make a series of harassing and threatening phone calls to the company to make it all end Aaron bar resigns on February 28th. He didn't take down anonymous anonymous took him down. They fucking destroyed his career back in 2011 anonymous was at the height of their power. They were certainly not to be fucked with. Anonymous announces their intent to tax Sony websites on April 20, 2011 in response to Sony's lawsuit against a man named George Holtz.
Starting point is 01:10:58 Holtz was a hacker and a hip hop artist and software engineer. Sony's PlayStation Network band user GeoHot, who was Holtz, for jail breaking, and modifying his PS3 console. GeoHot attracted Sony's attention by posting info about how to mod PS3s to the internet, Sony fires back with a libel lawsuit. Sony had gained access to the IP addresses of all the people who visited George Holtz's blog. Anonymous didn't like that. They said it was a violation of free speech and internet freedom. Throughout April, the PlayStation Network and various Sony websites are brought down. The organized DDS attacks took a number of weeks until the PlayStation Network was operating
Starting point is 01:11:34 normally again. Cost them an untold amount of money. June 12, 2011, there was another DDS attack on the website of the Spanish police starting at 21 30 GMT anonymous claim responsibility the following day stating that the attack was direct response to the Friday Arrest of three individuals alleged to be associated with acts of cyber civil disobedience attributed to anonymous The site was down for approximately for approximately an hour as a result of their efforts on June 5th 2011 operation Malaysia began as the group launched attacks on 91 websites
Starting point is 01:12:08 of the Malaysian government. This was in response to the Malaysian government censorship of websites like WikiLeaks and the pirate bay fighting that old censorship fight, right? Also advocating for the illegal downloading of copyright and music and movies. Anonymous continues to vacate back and forth between, you know, being revolutionaries and being just angsty teens who just don't wanna pay for their fucking movies. In early August, anonymous hacks,
Starting point is 01:12:31 the Syrian Defense Ministry website replaces it with a vector image of pre-Bahatis, that flag, a symbol of the pro-democracy movement in the country. They also put up a message supporting the 2011 Syrian uprising and call on members of the Syrian army to defect and protest and protect the protesters. Again, no change came from this, but they tried to help. Gotta give them some points there. That same month,
Starting point is 01:12:55 the Bay Area Rapid Transit in San Francisco shuts down cell service in an attempt to disconnect protesters demonstrating against the recent shooting of two men by Bart police and prevent them from assembling. Anonymous would intervene. Anonymous sends out a mass email slash fax bomb to Bart personnel and organizes multiple mass physical protests at the network's civic center station. Anonymous also hacks the Bart website, releasing the personal information of 102 Bart police officers as well as account information for about 2000 customers.
Starting point is 01:13:26 Also in August 2011, in an event dubbed Shooting Sheriff Saturday, anonymous hacks into 70 mostly rural law enforcement websites and releases 10 gigabytes of leaked information in response to other police shootings. The name likely a reference to the song, I shot the sheriff by Bob Marley. On August 16th, 2011. They're busy. Anonymous launches Operation Ferrisy. This time, the target is the Vatican and the Pope's official websites, the goal to protest sexual abuse at the hands of priests and the Catholic Church's cover-up of this abuse. Nice names since Ferrisy can mean a self-righteous hypocrite.
Starting point is 01:14:01 The attack lines up with the Catholic Church's World Youth Day event, which was held that year, starting on August 16th in Madrid, Spain. But anonymous would not be successful. The Vatican had hired a cyber security company called Imperva to protect their networks. Despite a barrage of 34 times the normal traffic from anonymous denial of service attacks, Imperva manages to keep anonymous from doing any damage. And who was running in perva at that time, dog the fucking bounty hunter? No, no, he's busy tackling method users in Hawaii for any. On August 23rd, 2011, anonymous express the support of the Occupy Wall Street movement
Starting point is 01:14:37 with the video post on YouTube. From September 17th on, anonymous and anonymous supporters cover the movement on anonymous related blogs. Excuse me, protesters in person, often seen wearing the guy Fox mask. On October 2011 or in October, anonymous campaigns against child pornography, their specific target was users of child pornography protected by anonymous hosting techniques. This is called Operation Darknet.
Starting point is 01:15:02 They temporarily take down 40 child porn sites and publish the user names of over 1,500 people frequenting one such website. They write, if the FBI, Interpol, or other law enforcement agencies should happen to come across this list, please use it to investigate and bring justice to the people listed here. Love it. Like a lot of people, these hackers are all about protecting individual liberties until you start diddling kids or consuming content based on kid diddling. Then well, fuck your liberties. Too bad anonymous could not take down Jeffrey Epstein. After a few more cyber battles, anonymous wrapped up 2011 and then kicked off 2012 with the bang.
Starting point is 01:15:41 January, anonymous hacked the website of the California Statewide Law Enforcement Association to protest police brutality. Anonymous released the names, addresses, and phone numbers of members of the California Association. They also posted credit card information taken from the Association's online gift store. They called it Project Mayhem. And they posted the following as the reasoning. California police have notorious history of brutality and therefore have been on our hit list for a good minute now. The CS LEA would call them terrorists for their actions.
Starting point is 01:16:13 I gotta say, not a big fan of this hack. They didn't do any research to find cops with multiple complaints of brutality. They just unleashed all the names they found. They just threw odds are a lot more good cops than bad cops under the same bus. And I know many of you disagree with my law enforcement stance and issues like this or instances like this. And I've made it clear before. So, you know, move on for the moment.
Starting point is 01:16:33 January 19, 2012, Operation Mega Upload Begins. This time, anonymous is protesting Hong Kong's closure of the file sharing service mega upload after Hong Kong authorities arrested four workers anonymous DDS, you know, anonymous, excuse me, anonymous DDS is the websites of UMG, a company that was suing mega upload. They also crashed the website belonging to the US Department of Justice, the US stake, the US copyright office, the federal Bureau of investigation, the MPAA, Warner Brothers music, the RIA, the French HADOPI and acronym for a French government organization. I'm not even going to try to pronounce today. The US House representatives had also just recently passed a stop online piracy act and
Starting point is 01:17:18 anonymous was pissed. Also the US Senate was working on the Protect Intellectual Property Act. How dare the US government to protect the intellectual products of people like me? Not at all behind anonymous. This continued stance on piracy. Just buy your fucking movies. Just buy your music. Just buy comedy albums.
Starting point is 01:17:36 You ask holes. Take the cost of money to make that shit. And this is coming from a former chronic shoplifter. All right. It's stealing whether you do it in a store or chronic shoplifter, all right? It's stealing whether you do it in a store or you do it online. Come on, it's no different. January 21, 2012, a series of DDoS attacks on the Polish government websites take place. Anonymous was allegedly furious that members of the Polish government had recently wanted to start
Starting point is 01:17:59 meeting indoors to no longer live in caves in the forest or under bridges. They wanted to learn how to read, write, try and use computers. Uh, JK, no, no, uh, via their Twitter account, anonymous state of the attacks have been revenge for the upcoming signing of the anti counterfeiting trade agreement by the Polish government. Once again, they are attacking legislation aimed at protecting intellectual property. They targeted the Polish prime minister, the president, ministry of Culture and National Heritage, and they shut down numerous websites. Anonymous went after the police's websites, the internal security agency, Ministry of Foreign Affairs.
Starting point is 01:18:34 They shut down the websites of a number of Polish political parties, the ensuing media coverage brought anonymous a lot of attention. The attention increased when anonymous blacked out popular Polish websites entirely on the 24th, a whole bunch of them did tax did lead to Poland abandoning the legislation, but it was passed in numerous other nations that really didn't do much other than just fucking harass Poland for no reason. On February 6, 2012, anonymous breaks into the mail server of the Syrian Ministry of Presidential Affairs and they gain access to some 78 inboxes of Bashar al-Assad staffers.
Starting point is 01:19:07 Embarrassingly, one of the passwords commonly used by Assad's office was 1, 2, 3, 4, 5. Nice. A few months later, in July 2012, anonymous would give over 2.4 million Syrian government emails to WikiLeaks. Four days later, anonymous box with a CIA. On February 10, 2012, anonymous claims responsibility for taking down the CIA's website for more than 5 hours. It doesn't seem they were able to steal any documents, not that the CIA would tell us if they did, just able to crash the site with those DDS attacks. Then two weeks later, some members of anonymous are arrested.
Starting point is 01:19:41 Anonymous now had poked the wrong bear. Not likely to fuck with the CIA in embarrassing and get away with that. On February 28th, Interpol announced they've arrested 25 suspected members of the hacking activist group anonymous in Europe and South America. And with an hour's anonymous strikes back shutting down Interpol's website for a moment. Again, though, no documents were stolen as far as we know. No damage cause, at least is no damage that they're letting us know about. So possibly not much of a victory, just another flex on March 7, 2012, anonymous once again turns their eyes towards the Vatican.
Starting point is 01:20:11 They go after the Vatican's main website. They launch another DDS attack. They do knock the website down, but it's back up later the same day. And then anonymous would go out for the church again five days later, they strike the Vatican site on March 12, 2012, bring it down for a few more hours. Another DDoS attack. They also hack into Vatican radio, gaining access to Vatican radio, their database. What did all this accomplish though? Did it expose any pedophile priests? Sadly no. The majority of their cyber attacks don't actually do any lasting
Starting point is 01:20:41 damage. They're just super fucking annoying. They just irritate whoever the target is. A for effort on this one though. 10 days later on March 22, anonymous launches a more serious attack. This time, the target is the Judge Rottenberg Center in Canton, Massachusetts. The Judge Rottenberg Center is a day in residential school for people
Starting point is 01:21:00 with developmental disabilities, emotional disorders, and behaviors associated with autism spectrum disorder. So, why would anonymous go after them? Well, a video was leaked of a boy being tortured at the JRC by a staff member, a video eventually played on CNN. The school would still exist, also legally tortured hundreds of other students, and five patients have died there over the years in suspicious ways and in ways that many think
Starting point is 01:21:23 was due to improper treatment and abuse. The school was known for its use of the graduated electronic decelerator. The device that administrators used to shock kids through remote control. The device was designed by Matthew Israel, the school's founder, anonymous made a YouTube video to reveal to the center and all their affiliates were now in their sites. Anonymous then hacked the GRC's website, publicly posted the names and addresses of GRC's sponsors, lobbyists, lawyers, and supporters, as well as the founder and principal himself. They didn't get to place closed down, but guessing they did get to school to pay a lot more
Starting point is 01:21:58 attention to how they treat patients going forward. In April 2012, Anonymous hacks 485 Chinese government websites, almost 500 sites to protest the treatment of their citizens. They urge people to fight for justice, fight for freedom, fight for democracy. 2012 would also see sites run by India, Quebec, Cyprus, Australia, Myanmar, the Philippines, Japan, and more hacked on august thirteenth two thousand twelve anonymous hacks to you gone to government websites to protest the country's strict anti gay laws anonymous posted the following message on prime minister a mamba mabezys website
Starting point is 01:22:36 i get my tech on music on again your violations of the rights of lgbt people have discussed it all people have the right to live in dignity free from the repression of someone else's political and religious beliefs. You should be proud of your LGBT citizen, because they clearly have more balls than you will ever have. Real Ugandan pride is demonstrated in standing up to oppression despite fearing the abuse, torture, and murder inflicted on LGBT at the hands of your corrupt government.
Starting point is 01:23:05 So, you know, Hail Memorad, sadly, homosexuality is still illegal in Uganda. This is so fucking barbaric. People found guilty of any of the three different charges for homosexuality, which just include just, you know, being in a homosexual relationship with another consenting adult, can be punished and are punished with life in prison. So absurd. Sadly, Uganda is backwards as fuck in many ways. Anonymous would once again return its sites to Hong Kong in fall of 2012, the HACTIVIS attack Hong Kong's National Education Center in mid-September, which is established a moral and national education curriculum for children from six to 18 years of age.
Starting point is 01:23:45 The new syllabus came under heavy criticism and international media attention because it was frankly a whole bunch of bullshit. It didn't grade students based on how much factual information they learned. Instead, students were graded based on the level of their emotional attachment to the Communist Party of China. Nice. Many both in Hong Kong and in the international community accused the curriculum of being nothing more than brainwashing because you know that's what it is. Critics thought it was a plot by the Chinese government to indoctrinate the city's youth into unquestioned support of the CCP.
Starting point is 01:24:13 And they thought that because that's what it was. Anonymous found this to be in violation of free speech and freedom of expression. They leaked classified government documents, took down the National Education Center's website, revealing all of this in a video posted to YouTube. Anonymous's final act of a very busy 2012 was to repost the names, addresses, and emails of prominent members of the Westboro Baptist Church Hill, Nimrod. Those fucking idiots. They did this on December 16th, responding to the WBC's plans to pick it the funerals
Starting point is 01:24:44 of the victims of the Sandy Hook Elementary School shooting. And they were going to protest that because they are pieces of shit. The anonymous hacked the church's website, found church members, personal social media accounts, and started a white house dot org petition to get the WBC legally termed a hate group. Well done, anonymous doing some good shit again. Instead of just trying to get free music and movies.
Starting point is 01:25:05 On January 13th, 2013, the website belonging to the Mexican Army is hacked by anonymous. All the information found on the hack servers is disclosed, including usernames and passwords. Once again, anonymous claims to be retallying against an oppressive government who had gotten power illegally. January 2013, the group attacks and defaces the US Sentencing Commission website.
Starting point is 01:25:26 In a manifesto left on the defaced page, the group demanded reform to the American justice system. And what the activists said are threats to the free flow of information and then they crashed to website. All this was done in protest of the suicide of Reddit co-founder and activist Aaron Schwartz. This is a sad story. Schwartz was accused of stealing materials from the Massachusetts Institute of Technology
Starting point is 01:25:49 with the intent to distribute them freely. Aaron Schwartz, very interesting, very impressive guy. It seemed like he was never really a kid. He was a genius right out the gate. While kids his age were finishing potty training, he was reading full books as a toddler. 1999 when he was just 13, he created the website, the info.org, a collaborative online library. He was just 14 years old when he started working on creating RSS feeds, just 14.
Starting point is 01:26:18 And this podcast and every podcast you listen to makes it from a host server to your device thanks to an RSS feed. Each podcast has a unique RSS feed. So thank you Aaron Schwartz, Hale Aaron Schwartz. When other RSS feed creators realized one of their colleagues, an important colleague, was a 14 year old. They were shocked that he had been such an integral part of the project. He would speak computer conferences as a team, not as a passing attraction, but as a legit inventor who was pushing technology forward.
Starting point is 01:26:48 He would have to stand on boxes to reach the podiums, even stand on a box. His computer would still cover his face. He was just a kid. Schwartz was one of the early architects of Creative Commons and a developer of the Internet Archives Open Library, a free book database and a digital library open to the public. Big believer and just sharing education, right? That's such a fucking cool thing. Hopefully he would have liked Timesack. He founded a software company called Infogami, which would later merge with Reddit.
Starting point is 01:27:16 Schwartz then became a co-owner of Reddit. Schwartz played a significant role in making government and academic data available to the public, and he would suffer greatly for his efforts. In 2011, Schwartz was accused of using an MIT computer system to download numerous academic articles from the online archive JSTOR. JSTOR charges money for academic papers. I have an account, I use JSTOR for time suck research. Schwartz didn't like this information existing behind a paywall.
Starting point is 01:27:41 He argued that the people who wrote the papers, who did the research, rarely saw plenty of the money that Jay Store made, and he decided that all of Jay Store's information should be free for everyone. And then Jay Store actually decided once he got caught for this to not pursue charges against him. Jay Store even asked the government not to prosecute him, but they did anyway. Shorts would be made an example of, especially given the recent rise of cybercrime. And I think this is super fucked up. If Jay to be made an example of, especially given the recent rise of cybercrime. And I think this is super fucked up. If J-Store had wanted to press charges, well, then you get what you get, right? It's not your decision to decide if a private company should have their information be out
Starting point is 01:28:15 there for free or not, right? That's their choice. But in a non-violent theft situation, if the person or entity you have taken from, in this case, J-Store makes it very, very clear that they do not want to press charges, that they do not want charges to be, you know, pursued against you. Then I think the government should back the fuck off. If the adult victims do not feel victimized, then how hurtful is the crime really? Why pursue criminal charges? But they wanted just to make an example of him. A shorts would pay for the sins of other hackers. He was indicted by federal prosecutors for 13 felony charges.
Starting point is 01:28:48 One of the brightest, most productive minds of our time, now looking down the barrel of several decades in federal prison. Prosecutors bent on heavily punishing Schwartz, refused all of the settlement offers that did not include jail time. They required Schwartz to plead guilty to felony charges. The case was pending when Schwartz died age 26 on January 11, 2013. His girlfriend would find him dead in his apartment, the cause of death hanging, apparently used to aside.
Starting point is 01:29:14 And the week leading up to his death, it seemed as though he was looking at 35 years in prison in around a million dollars in fines. And if he really was going to be giving 35 years in prison, how truly fucked up, right? Dude released academic information to the public. Why was it even an option for him to get more prison time than many who have committed murder or rape, armed robbery, etc. Are just a system in so many ways is fucking absurd. His family and supporters accused overzealous prosecutors and the excessive charges he faced of driving him to suicide. Taryn Steinbrickner-Coffman, Schwartz's girlfriend of the time, would say,
Starting point is 01:29:50 I believe that Aaron's death was caused by a criminal justice system that prioritizes power over mercy, vengeance over justice, a system that punishes innocent people for trying to prove their innocence instead of accepting plea deals that mark them as criminals in perpetuity. A system where incentives and power structures align for prosecutors to destroy the life of an innovator like Aaron in the pursuit of their own ambitions. Yeah, very well said. And again, I'm not saying he didn't do something illegal and I don't think he should have done what he did. I don't think it was his call to make. But man, the punishment does not fit the crime there since his death
Starting point is 01:30:24 shorts his case has inspired proposed amendments to the Computer Fraud in Abuse Act. He was also post-humously. Hopefully I'm saying that right, and I'll fuck that word up in the past. What are the American Library Association's James Madison Award? I think it's posthumously.
Starting point is 01:30:40 Okay, one of those ways is right. I felt confident about it when I saw it on the written page. Now I'm like, I don't know. Anyway, he was given the American Library Association's James Madison Award for being an outspoken advocate for public participation in government and unrestricted access to peer-reviewed scholarly articles. And I'm just gonna randomly really quick
Starting point is 01:30:58 defend my pronunciation stuff, but people have brought this up before, but it is true. I don't like watching very many shows and I legitimately almost never watched like the news. I read a lot. I watch very little. When you read far more than you watch, you know, you just, you don't hear the sounds.
Starting point is 01:31:16 You just like, I know what they mean. I know what that means. I think I can say. Nope. There's a lot of this guy's story. Hard to do it justice here today. Such a sad, strange story in the middle this guy's story. Hard to do with justice here today, such a sad, strange story in the middle of this interesting tale.
Starting point is 01:31:28 Back to the timeline. February 3rd, 2013, anonymous hacks, the Federal Reserve, anonymous posts of the login credentials of over 4,600 banking executives to a government website on Super Bowl Sunday. The page with the URL file name, oops, we did it again, remained accessible until early the following morning.
Starting point is 01:31:47 So that's a big flex. It's the fact that they could get into the Fed Reserve. On April 2, 2013, anonymous would take aim at one of its biggest targets yet, North Korea. It launched a new initiative called Operation Free Korea. The group demanded the resignation of North Korea's psychotic dictator, Kim Jong-un, along with the insta of democracy and free elections. So pretty lofty demands. Other demands included the termination of North Korea's nuclear program and free internet
Starting point is 01:32:13 access for North Korea's citizens. If these conditions were not met, anonymous said they would hold Kim Jong-un down and fuck him. No, they said that they would use their access to the country's local networks, mail servers, and web servers in wage war. The event didn't amount to much, though, bummer. Instead of picture posts on North Korea's flicker site, showed Kim's face with a pig-like snout and a drawing of Mickey Mouse on his chest.
Starting point is 01:32:37 So, they didn't quite recycle. The text beneath the image read threatening world peace with ICBMs and nuclear weapons wasting money while his people starved to death. It would have been one of the most incredible events in the past several decades, if not the past century, if the hacking group would have taken down the North Korean government. Maybe it'll happen in the future. Maybe more revolutions will be fought online. I think they will.
Starting point is 01:32:58 On June 7, 2013, anonymous hacks, the national security agency of the United States. Yep. they hacked. Fuck an NSA. The documents they stole and released were mostly related to prison, code name for a scary surveillance program and supporting operations mostly date from around 2008, not long after prison was initiated. Prison was essentially a covert collaboration between the NSA, FBI, and many major telephone and computer companies like Verizon, Microsoft, and more.
Starting point is 01:33:27 Prison allowed the government unprecedented access to your personal information for at least six years. Access that the government probably still has. Did anonymous stop this from happening? No, but they did at least expose it. So A for effort again, I've got a hard time deciding where I stand on surveillance issues like this. On the one hand, they can stop major acts of terrorism before they happen.
Starting point is 01:33:50 But on the other hand, right, in the wrong hands, they could allow a totalitarian regime to just fucking own you. I see both sides. But today, I got to say I stand on the side of get the fuck out of my business, Uncle Sam, the cons of surveillance I feel like outweigh the pros right it just allows for way too much governmental power and control And then in the name of public safety right surveillance like this to grades our freedom substantially No, thank you big government. Thank you anonymous for for trying to at least expose this
Starting point is 01:34:21 November 5th 2013 would mark the first million masks march on Guy Fox Day. It was a show of anonymous is real physical numbers and the numbers of their supporters as people flooded the streets of London and anonymous masks, kind of. They really flood the streets. They showed up. The numbers were not overwhelming. No articles seemed to reference the number of protesters because I think it would just kind of leave you with a, oh, that's going to be more than that.
Starting point is 01:34:44 Based on some BBC footage, it looks like maybe a couple hundred people showed up in London. I'm thinking the real hackers stayed at home, right? Why risk arrest? These gatherings have continued each year on Guy Fox Day in cities worldwide. The goal of all this, as stated on a UK million mask March Facebook page,
Starting point is 01:35:00 was to see positive change in the world. They wrote, we have seen the abuses and malpractice of this government and governments before it. page was to see positive change in the poor, the elderly, and the disabled. We have seen the capital, profit, and greed of the few put before the well-being of the many, and we say, enough is enough. And one more thing, mkhatch, if you're seeing this, more pizza, more porns come into you, you know cussing motherfucker." Now they didn't say that last part, but they said the rest of they said the rest of it. Uh, that reference to surveillance state. It's pretty scary, right? It makes me think of the Matrix or Wells 1984. Don't want to give Uncle Sam, uh, the means to become big brother. Yeah, definitely feeling more and more against governments of aliens. Uh-huh. Yeah. January 7th, 2015, two French
Starting point is 01:36:01 Muslim brothers, Said Sharif, Gwache, forced their way into the offices of the French satirical weekly newspaper Charlie Hebdo in Paris. They opened fire on the magazine staff, killing 12 and injuring 11. The gunmen identified themselves as belonging to the Islamic terrorist group Al-Qaeda, which took responsibility for the attack. As Muslim extremists, they were taking revenge for the newspapers satirical portrayal of the Islamic prophet Muhammad. In response for this attack, anonymous declares their own war on terror, promising to bring down terrorist websites around the world.
Starting point is 01:36:32 Not long after, they start Operation ISIS. Since ISIS shared the same goals as Al-Qaeda and were a much larger organization at the time, and they stated ISIS, we will hunt you. Take down your sights, accounts, emails, and expose you. From now on, no safe place for you online. You will be treated like a virus, and we are the cure. We own the internet. We are anonymous.
Starting point is 01:37:02 We are Legion. We do not forgive. We do not forgive. We do not forget. Expect us. And it appears they did fuck things up a bit for ISIS, right? Anonymous successfully exposed the name and addresses of some ISIS recruiters in the months that followed. They shut down the social media handles
Starting point is 01:37:18 of an estimated several thousand members of ISIS. In February of 2015, then they go back after they go after pedophiles again. You go after the international pedophile rings in a mission named Operation Death Ears. One of their targets was Jeffrey Epstein. Sadly, they did not take him down or anyone else. It looks like July 17th 2015, an anonymous member in a guy Fox mask is shot and killed by a royal Canadian mountain police officer. This member, a man named J. Mack was protesting a controversial damn project in Dawson Creek, a hydroelectric project on the peace river.
Starting point is 01:37:53 Police reported he had a knife that officers asked him numerous times to put down that he refused and then he was shot. Anonymous felt like he was straight up murdered and they vowed revenge and they initiated operation a non-down. On July 19th, they took down the RCMP website. Over the course of the operation, they bring down 22 Canadian governmental websites. That's a month. Anonymous also went after white supremacist groups in the US, mainly the KKK.
Starting point is 01:38:19 And July anonymous posted a video that stated their aim to attack stormfront. Stormfront was created by former Alabama clan boss longtime white supremacist Don Black in 1995 claiming more than 300,000 registered members as of May 2015. The site has been a very popular online forum for white nationalist and other racial extremists. It is just a fucking dumpster fire of website. Anonymous planned operation stormfront for August 1st 2015 taking downsides and releasing members personal information love it expose those fuckers No hiding behind those hoods. See, and that's why I wish you know
Starting point is 01:38:56 Facebook other groups also would just like let let hate groups say a bunch of shit on the web Right, it lets it lets uh, you know, people like anonymous or the FBI, whoever just track them that much more easily. Let's let's them get exposed that much more easily. Then on October 22nd, 2015, anonymous launches Operation KKK to further damage the hate group and they release more members names. In 2016, things pretty quiet regarding cyber attacks anonymous took credit for that year. there were dozens of high profile arrest though of cyber criminals following followed by heavy sentences for their cyber crimes. Seems that many of the hackers who were not arrested decided to lay low for the while.
Starting point is 01:39:35 In 2017 anonymous launches just one large scale attack that we know of operation dark net relaunch once again went after pedophilia. Hey, I'morad, they hacked servers of websites called Freedom Hosting 2, that hosted websites only accessible by the onion router, right, Tor. That browser that lets you access the dark web. Visitors to more than 10,000 Tor-based websites were met with an alarming announcement.
Starting point is 01:39:57 Hello, Freedom Hosting 2, you have been hacked. Anonymous claimed that of all the data they hacked, half of it was child porn, and that is disturbing. Researchers estimated that the freedom hosting to hosted around 20% of the dark web, meaning the attack took down a fifth of the dark web. That is a lot of information. After this take down anonymous and splinter groups, go silent and stayed silent until very
Starting point is 01:40:21 recently, at least at a big scale. In 2020, a group of hackers hacked United Nations website and added a page for Taiwan. To express support for Taiwan's independence, they did the same on the World Health Organization's website. This act would mark the beginning of a little bit of an anonymous resurgence. Hacks followed in the Philippines, Uganda, Nigeria,
Starting point is 01:40:41 and Brazil, as well as in the US in support of the Black Lives Matter movement. After George Floyd's death on May 25th, Nigeria, and Brazil, as well as in the US in support of the Black Lives Matter movement. After George Floyd's death on March, or May 25, 2020, amid global protests, the Minneapolis Police Department website, its parent site, the website of the city of Minneapolis, taken down a YouTube video claims credit for anonymous. The hack generated a wave of renewed enthusiasm for anonymous, particularly among young people. Twitter accounts associated with the group saw a surge of new followers, a couple of them by the millions.
Starting point is 01:41:09 More hacks followed the release of the video. News outlets speculated that it was also anonymous who had hijacked Chicago police scanners on May 30th and 31st to play NWA's fuck the police and Taze on days chocolate ring. Three weeks later on June 19th, AKA June Taint, a holiday celebrating the emancipation of those who have been enslaved in the U.S., a person identifying as anonymous leaked hundreds of gigabytes of internal police files from more than 200 agencies across the U.S. Since the initial George Floyd protests, anonymous have been pretty quiet.
Starting point is 01:41:42 Many things because, as more hackers have been arrested over the years, as cyber security has gotten more advanced, as law enforcement agencies have gotten better at tracking down cyber criminals, they're just more scared of getting caught. Some say they are more wearies than ever, often openly wondering who among them are police informants. Also, a lot of the members are now simply older. They aren't teens anymore. Hang it out in chat rooms, laughing about sending some kid doesn't like cursing pizza and pussy pics. They don't care as much about pirating music and other media now because they have jobs.
Starting point is 01:42:12 They can afford to buy shit. And they don't have as much time to consume all that content. And an anonymous activist who runs the Twitter account at a non-too-world, recently told a reporter, we've grown up a lot, at least I have, since the beginning of all this. Back in 2010, 2012, we would have decimated anything we could to make a point. Now we realize how we could inadvertently affect people in negative ways.
Starting point is 01:42:35 But a new wave of young tech savvy teens could rise up and take hold of the anonymous banner or some equivalent at any moment. Out of some new chat room or social media platform, maybe rising up from the dark web, the arrival of some new group could be on the horizon right now, ready to pull off the most epic, you know, hack ever. Most epic prank, they can become revolutionaries,
Starting point is 01:42:57 maybe both. Again, as Mentor said, you may stop this individual, but you can't stop us all after all we're all alike. So anonymous or their equivalent not going away and I'm sure we will hear from them or someone like them very, very soon. Good job, soldier. You've made it back. Barely.
Starting point is 01:43:21 Anonymous. What an interesting organization, right? I have some final thoughts about who they are really and more. Before I share those, I am sorry about this. I know we already had a sponsor break, a one last sponsor for today. Today's time suck has brought you once again by DadWatch. A 5013C nonprofit dedicated to solving Dad-related crimes. DadWatch stands for Dads for disappearing where all the corpse is hiding.
Starting point is 01:43:52 And now, DadWatch has a cyber division! Hi, I'm Dea Cummins, DadWatch Founder. Did you know that a lot of dads are doing creepy shit online? Uh huh. Our research has found that 99% of dads are watching online porn. And the other 1%? They just can't figure out where to find it. And that's fine as long as the porn is legal. As long as the porn doesn't lead to online stalking
Starting point is 01:44:19 and other serious cyber crimes. Who is your dad talking to online? What's he jerking off to? Do you know when and where your dad's jerking off? You know if he's stalking someone, behind your mom's back, behind his current wife or girlfriend's back. What the fuck is your dad doing on his phone right now? On his computer? How long has he been in the bathroom? What's he doing in there? Check his search history. Does he follow a lot of half naked Insta models? Huh, that's interesting.
Starting point is 01:44:47 Is he DMing them? Check your dad's DMs. Is he saying the kind of creepy shit to women? Let's say a, uh, serial killer might say, Where are your dad's bodies? Report your dad. You probably should. Hit us up at dadwatch.biz slash fuck your dad's freedom.
Starting point is 01:45:07 We here at Dad Watch including the new Cyber Division team, we're just trying to do what's right. What's right is probably putting your dad behind bars where he fucking belongs. Big thanks to Dad Watch, they've been a great sponsor. Back to Anonymous now, who are they? One insider to the group, compare them to the terrorist group Al-Kaeda saying, if you believe in anonymous and call yourself anonymous,
Starting point is 01:45:31 you are anonymous. How do you stop them? Well, in short, you don't. You can't dismantle an ideal, you can't arrest a general disdain of authority. The power of anonymous in another hacking group's lies in their anonymity. Keep thinking back on that mentor quote, you may stop this individual, but you can't stop
Starting point is 01:45:50 us all. After all, we're all alike. Cybercrimes, hack toism, they're not going anywhere. The internet keeps bringing more and more of the world together. Governments and armies, businesses, etc. All more and more dependent on the online world. Once you're online, you're open to being hacked. And think about what you have online, almost certainly your money or most of it. Possibly your actual business like me, family photos backed up in the cloud, maybe nude photos. So many contacts, phone numbers, addresses, your social security number, your financial transaction history, your home address, your medical records, your education records, your criminal records. If you have a security system with video, you know at your house, somebody can be watching you at your home. All of that can be hacked, which means it can theoretically be manipulated, deleted, replaced, whatever.
Starting point is 01:46:35 How much would that fuck your life up to have somebody alter your credit history and employment history online? What if someone hacked into your social media accounts, right? Started posting horrible shit on your behalf. How much trouble could that get you in? Think about the real power hackers have. Think about that carbon act cyber gang. I talked about earlier hacking into ATM is making them spit out cash at the right moment, taking over bank transfers, rerouting funds, stealing well over a billion dollars. How long until some group that powerful and savvy with tech, folks is less on robbing banks and more on say
Starting point is 01:47:06 Launching missiles as more and more militaries right move their weaponry online hacker so powerful They're only gonna get more powerful as time goes on And one of the biggest early hacking conglomerates that showed the world a glimpse of what that power can look like will always be anonymous Anonymous change the world they helped topp topple regimes, exposed pedophiles, exposed hate groups all online. And it all began in a 4-chand B-board where some teens from Toronto wanted to fuck with people they didn't like online, you know, maybe send pizza and pour into their house. They didn't always go off to the right targets. That's bound to happen when you have a large, loosely organized group with no leader. They're an inigmatic
Starting point is 01:47:42 organization. Quinn Norton, a journalist and hacker expert at Wired Magazine, wrote of anonymous in 2011, I will confess up front that I love anonymous. But not because I think they're heroes. Like Alan Moore's character V, who inspired anonymous to adopt the guy Fox Mask as an icon and fashion item, you're never quite sure if anonymous is the hero
Starting point is 01:48:01 or anti-hero. The trickster is attracted to change and the need for change and that's where anonymous goes, but they're not your personal army. And when they do something, it never goes quite as planned. The internet has no neat endings. I like that summation.
Starting point is 01:48:16 Anonymous to trickster. Sometimes the trickster hacks the world, changes it for the better. Other times, they just wanna light some fires and watch shit burn. Let's review a few things we learned today. Learn something new with today's top five takeaways. Time, suck, top five takeaways. Number one, Dr. Bounty Hunter invented the internet. No, anonymous comes from or came from the
Starting point is 01:48:41 B-board of Fortchan, a place devoted to sharing politically incorrect memes and trolling others. The term anonymous comes from the sites in an in-imit as well as the fact that when a user wasn't logged in, posted on the board, the post would come up as authored by Anonymous. Number two, Anonymous has had many targets over the years, but they've most frequently returned to attack government corruption, censorship laws, pedophile rings, and hate groups like the KKK and the Westboro Baptist Church hail Nimrod. return to attack government corruption, censorship laws, pedophile rings, and hate groups like the KKK and the Westboro Baptist Church, hail Nimrod. This comes from their devotion to free speech, democracy, and their belief that everyone should
Starting point is 01:49:12 be able to access the internet freely. Arguably the most success they've ever had was with the Arab Spring protests, in which people across the Middle East were protesting corrupt governments and poor quality of life. Number three, the carbon-necked cyber game. These hackers have made off with over $1.2 billion in the ice, largely through hijacking online money transfers and taking over ATM networks. On 1 July 2016 weekend in Taipei, they took over 41 ATMs at 22 branches of the first commercial banks, making those AT, it's spent out 83 million new Taiwan dollars or about $2.6 million US dollars.
Starting point is 01:49:47 Not cool, I mean, it is theft, but also pretty fucking cool. Number four, no Custing Club founder, McKay Hatch has to still be pissed about all that pizza and porn. Ah, corn nuts! What the flip? Number five, new info.
Starting point is 01:50:02 Arguably the biggest hack in history happened back in 2012 and it wasn't pulled off by anonymous. A hacker group thought to come from Iran calling itself cutting sort of justice claim responsibility. In August of 2012, a technician working at the Saudi Arabian oil company, aka Saudi Aramco, clicked the wrong spam link and infected his computer with the nasty Shemoon virus. This virus once in compiles a list of files from specific locations on your system, uploads them to the attacker, and then erases them. Finally, the virus overrides the master boot record of the infected computer, making it completely unusable. Basically, this thing gives sensitive data stored on your network's devices to the hacker,
Starting point is 01:50:41 and then just fucking obliterates the devices. In a matter of hours, 35,000 computers were partially wiped or completely destroyed. Without a way to pay them, gasoline tank trucks seeking refills had to be turned away. Saudi-Iromco's ability to supply 10% of the world's oil was suddenly at risk. The entire company had to move offline for months,
Starting point is 01:51:03 no internet, no corporate email, no office phones, employees wrote reports on typewriters. Contracts passed around with inter office mail, lengthy lucrative deals, needing signatures were fact one page at a time. The company temporarily stopped selling oil to domestic gas tank trucks for over two weeks. They went to a new offline system of storage when they did return to computers and they bought so many external hard drives they created a worldwide external hard drive shortage and the hackers were never caught.
Starting point is 01:51:33 The cutting sort of justice said they did it to strike at Saudi Arabia's ruling al-Saud regime in response to crimes and atrocities that took place in various countries around the world, especially in Syria, Bahrain, Yemen, Lebanon, and Egypt. The company never revealed how much this attack cost them, but it listed in a variety of sources, or it is listed, as the single most devastating cyber attack of all time. Time, suck, tough, right, take away. Anonymous, and the world of hackers has been sucked. So glad my computers were not hacked and put this together.
Starting point is 01:52:08 Please do not hack me, anonymous. Come on, I'm a- listen, I'm on your side. Look, I play this music sometimes. I listen to techno, come on, I'm f- I'm cool. You know? Just, you know, I know we don't see eye to eye and everything, but I know I made fun of you for some things, but I gave a lot of credit for some of the cool things you did. If you're gonna go after me just now to send porn and pizza, please don't destroy my website to computers. Thank you to the Bad Magic Productions team for all the help of making time suck again. Queen of Bad Magic, Lindsey Cummins, Reverend Dr. Joe Paisley,
Starting point is 01:52:38 the Script Keeper's Act Flannery, Sophie Fax, Source Reservance, Biddelixer, Logan Art Warlock, Keith, running BadMagicMarch.com. Thank you to you for continuing to listen to this show. I am very grateful for that. Thanks to all those who have joined the new cult of the Curious Private Facebook group. Maybe the old one will come back. That's so many subgroups have formed. The cult of the Curious is like anonymous. You may shut down one of our Facebook pages.
Starting point is 01:53:03 But you can't keep shutting all of them down. You kind of can, but it's hard because you will keep coming back and you probably can't stop us all. At least it will be difficult. I like their quote better. Thanks to Liz Hernandez and her all-seeing eyes keeping the cold and curious live online. Thanks to beef steak and the mods, Guadalajese, Becky and Cody running wild on Discord. We are still alive, you know, on Discord.
Starting point is 01:53:28 Thanks to all the spacers, plain time, soak trivia on the app. Now that I'm recording in advance, it doesn't make a lot of sense to this course. Look and grasp to Bodysunyata for winning Round Nine, two time champion. Next week on Time Suck, we stay on the internet and we go full fucking whack a doodle. We return to the realm of conspiracy theory. With two modern day groups, the media has given a lot of attention to in the past year or so. QAnon and Antifa.
Starting point is 01:53:53 On October 28, 2017, someone called themselves Q, began posting a series of cryptic messages in the 4chan internet forum titled, Call him before the storm. Fuckin' 4chan. Here we go again. Q claimed to be a high-level government insider with access to classified information, and he took that information straight to For Chan, supposedly to covertly, to covertly inform the public
Starting point is 01:54:15 about Donald Trump's master plan to stop a counter to excuse me, to stage a counter coup against members of the child's sex trafficking deep state sadness. In 2018 Time Magazine, countercue against members of the child sex trafficking deep state Satanist. Uh-huh. In 2018 time magazine, place Q is one of the 25 most influential people on the internet. Q followers who called themselves bakers because they follow Q's breadcrumb trail. Ha, I get it.
Starting point is 01:54:37 They spread info about Q's messages and soon form the full fledged cult of Q and on. Now you see people wearing fucking Q and on t-shirts out of the airports. That's pretty sweet. Their beliefs would lead to incidents in the real world, including break-ins, kidnappings, attempted murders and more, all from QAnon believers who thought they were helping to expose, they say, Tannik deep state. QAnon would make his presence known and perhaps the biggest showing of QFORCE to date at the US Capitol breach on January 6th. Then QAnon would blame Antifa for that attack. So who the fuck is Antifa? Antifa is short for Hoho boy. Antifashitisa, Axion.
Starting point is 01:55:10 It's crazy serious, German words. From the group's roots, fighting Nazis in Germany is a leaderless collective, a far-left activist. I'll work on pronouncing that one first, gigantic word next week. They believe in showing up wherever perceived fascists or white supremacists come to town and fighting fire with fire, that's what the kind of the group statement is, or sometimes they just start fire, like anonymous tests, just because they like to watch it burn. All right, some of them seem to be just anarchists who want to destroy mostly because they just like destruction.
Starting point is 01:55:40 To many in the middle of the spectrum, like myself, both of these far leaning extremist groups appear fucking crazy! Getting wild! Sticking with the web next week and Teef and Q-Non on Time Suck. And now let's head on over to this week's Time Sucker updates. Let us begin with a hilarious and loving message from funny and caring meat sack Katie Allen Katie writes hi Dan my partner asked to introduce me to your stand-up and time suck and we started dating I'm a lover of all things weird and interesting
Starting point is 01:56:15 So I very quickly became a dedicated space-user He was able to meet you in Denver for his 21st pre-COVID and he is a huge fan of your work I probably hear your voice more often than my own mothers because we're always listening to time suck or as we dumb or that story about you fucking now. Okay, that's fair, yeah, that's fair. I wanted to shoot you an email because Austin and I are coming up
Starting point is 01:56:34 on our anniversary this weekend. This is so funny to me. K, do you kill me with this message? Austin and I were best friends for eight years beforehand and we've been through a lot together. One of those things was him fucking my other best friend Rachel four years ago. friends for eight years beforehand and we've been through a lot together. One of those things was him fucking my other best friend Rachel four years ago. We were still completely platonic then and we laugh about it all the time.
Starting point is 01:56:52 After they hooked up, he got in his car and drove from her place in Missouri to New York. This also happened to be the first time we listened to Time Suck and it was the Caligulate episode. He has listened to every episode since. We just found out the other day. Oh, no, we just found out that the day he fucked my best friend and listened to time suck for the first time is the exact same day he asked me out. Fucking April 9th man. I thought this was hilarious. I love you. And I hope you would probably appreciate here and as well. I do. It would be the best anniversary gift if you could share all of this on the next episode. Austin, I love you so fucking much and thank you so much for always being
Starting point is 01:57:29 so supportive of me. Being with you is the best thing that's ever happened to me and I'm so happy we get to spend our lives together. Happy dating anniversary, time suck anniversary and fucking our friend anniversary. Thank you, Dan, for everything you do. Your work has gotten Austin through some tough shit and we really appreciate you a lot. Hyluse, Fina, Praiseful Jang Your work has gotten Austin through some tough shit, and we really appreciate you a lot. Hey, Lucifina, praise for jangles. You're a friend, Katie. Oh my god, Katie.
Starting point is 01:57:50 Happy belated fucking Katie's friend, anniversary Austin. Hey, Lucifina, I love that you two laugh over this. That is so healthy, and it's so funny. Hope you two had a great April ninth. Hope you're doing great right now. I'm guessing you are. I'm guessing you two just know how to have fun,
Starting point is 01:58:08 you know, through good times and bad. Thanks for listening and thank you so much for sharing. I love that message. Now I'm murder question coming here from Super Curious Sack, Elmero. El writes, hello Suck Master, long time listener, first time caller, newly birthed space lizard. I'm in Benjantime Suck in my welding job
Starting point is 01:58:23 for the past several months. And one thing that keeps jumping out to me is that so many serial killers use 22 caliber guns to commit at least one murder. Why? Is it because the ammo is cheap? These human filsecs are skimping out on ammo cost? Or is it something else? You would think it would be some cheap 38 special revolver, the so-called Saturday Night Special. Just something I keep noticing. Fuck you, this email is not that long. Keep on the great work. 3.5 stars wouldn't change a thing.
Starting point is 01:58:49 Thank you, that's a good question. I don't know the answer for sure, but I have a guess. And this probably makes me way too into serial killers to even have a speculation on this. A lot of hitmen seem to like using 22 handguns as well as serial killers. And it seems to be a great gun, not for fire fights, not for trying to take someone out
Starting point is 01:59:07 who's also shooting at you, not for trying to take somebody at a long distance, but specifically for executions when you have a serious advantage on the opponent, right? For killing someone who's unarmed, someone you've overpowered. Ammo is cheap and abundant, 22 is easy to get a hold of, that's part of it.
Starting point is 01:59:20 They're, I'm guessing they're light, they don't kick much at all. They're quieter than most of their guns. They don't make a big mess because they're not that powerful. But they still kill someone when you're shooting up close. Actually when a shot at close range or with a shot at close range to the head, and I believe this comes from the iceman's stuff a long time ago. I don't even know why I had this information in my head, but they can pierce the skull,
Starting point is 01:59:39 but they're not powerful enough for the bullets to make it back out of the skull. And then it ricochets around inside the school, doing more damage than a more powerful weapon. And then, you know, in the lightweight, easy to carry around, easy to conceal. Not good for combat, but good for a serial killer who wants to kill relatively quietly, and in most cases, up close and personal. And I feel a little weird putting that all together. I think that's what it is from what I understand.
Starting point is 02:00:03 And I got all that information from a text from my dad. My dad had a lot of opinions about all that. So, make it that way you will. Now, quick Mao Zedong update, kind of. From funny sucker, Human Harden, Human writes, I'd be just listening to the new time suck and I'm extremely worried. My dad got a shit-s-who-dog
Starting point is 02:00:22 and named him Mao Zedong when I was a kid. Now I have to reevaluate where my dad was from his birth in 1948 until now. Thanks, hashtag where was Humaan's dad? Yeah, super weird. Your dad named your dog Mao Zedong. I'm guessing your dad is at least a serial killer. If not a mass murder of some kind,
Starting point is 02:00:43 probably a mass murder. Definitely gonna have the dad watch team, the cyber team looking to his whereabouts. Thank you for doing what's right, and bringing him to our attention. I wish everyone, you know, could just finally just fucking follow their dad and find some dirt. Now three updates and one coming here from SuperSack,
Starting point is 02:00:59 Derek, Devon Tierra. I'm guessing how to say your last name, Derek. You know I'm not good with French. Derek writes, even if your name even is French. Dear Lord Almighty of the Suck, loyal meat sack and dummy, Devo here. Three the latest sucks have hit close to home. I'll try and write this quick.
Starting point is 02:01:13 Blackwater Suck. I went to work for them in 2006 after getting out of the Marines, went to Mooyock for training, while they went to the company headquarters. Met Eric Prince, shook hands. He welcomed me aboard, told me while in training are on deployment. At any time, if I need anything, don't be hesitant to contact him directly.
Starting point is 02:01:30 Lots of opinions good and bad, but I thought I'd share that. Also, I was friends with Scott Helvinson met him in the Marines. He was an absolute PT animal. Often went surfing before he left to go to black water, was sad to hear about the situation that led his death. There was a little memorial outside the headquarters. The mouse suck, I grew up Montana. I worked at a Chinese restaurant during high school. My boss, Paul Chu, was a legendary character. Never could say my name correct, so he called me guy.
Starting point is 02:01:56 I love it, see, that's me. It was my birthday one night. He asked how old I was. I said 18. He sat back with a big sigh and said, you wanna know what I did when I was 18? I swam from mainland China to Hong Kong across Merse Bay to avoid being caught.
Starting point is 02:02:11 He and his brother trained before making the swim. They did get caught once, put in jail for a time. All he said about his time in jail was that it was very bad. He went from Hong Kong to New York, finally ended up in Boseman and opened the great China Wall restaurant, often wonder where he is now. And finally, Grandpa War took me a lot to listen because the way you describe your grandpa
Starting point is 02:02:31 is similar to mine. Everett or Papa, as we call him, he grew up in a one-room house with my aunt and uncle, went into the Navy, was on Iwo Jima at the start of the invasion, holy shit. Afterwards, he and his dad had a fishing shop in Boseman. He then worked as a campus police at MSU, growing up I spent nearly every weekend with him,
Starting point is 02:02:50 going for breakfast, taking a drive to model train shows. I love it. Baseball card shows. Telling me stories of hoboing around Montana on the trains, wherever I went in the world. He would be the first person I called. He always answered with where you at. That's awesome. He got the C word in past in 2012.
Starting point is 02:03:07 Oh man, sorry. I was able to go back and see him. All he said was got some things going on and the dog is trying to fix it. And that's what that story, he said, Jesus, yep. Then you're 100% correct. The last day I saw him before flying back to Japan, we hugged and the look he gave me broke me. I can see the strength in his eyes, but his body was failing.
Starting point is 02:03:25 As I went out the front door, I said, okay, see you later. And I know he knew how much I loved him, but I really wish I'd said it. Where did these onions come from, dang it. Hearing you, another Meetsaxx writing with stories, it shows that that generation produced some legendary people and grandparents. Keep up legendary work, you and the rest of the crew do.
Starting point is 02:03:41 I always recommend your podcast to my friends. Well, thank you, Derek. Man, sounds like you had one hell of a friends. Well, thank you, Derek. Man, sounds like you had one hell of a grandpa. Also, a very cool connection to both Mao and Blackwater. Man, love that Paul Cho's story. I love that he made it to Bozeman. What a beautiful city. Love that. I know I've priced it several times before, maybe not for a while. I love that Kevin Cosner show, Yellowstone, that's set there. Finally got Lindsey to watch it. She thought it was like a dude show and she was obsessed. Such a good show.
Starting point is 02:04:11 Now a cool Mao Zedong update from Traveling Sucker, Pat Hendrix. Pat writes, Hey Suck Master, just finished listening to the episode on Mao Zedong and God was he a terrible meat sack. One thing that stuck out to me was when you talked about the Gwomundang after losing the Chinese Civil War fleeing to Taiwan and setting up the nationalist government there. I've lived and worked at an international school as a social studies teacher in Taiwan for the last five years and have come to consider it my second home. When you discuss modern day Taiwan, I feel like you discredited the amazing transition that this place is made since after the end of military rule in 1987, becoming a very vocal and vibrant representative democracy.
Starting point is 02:04:42 And you know what, you're right. I did not allocate a lot of time for that portion of the episode. Follow me, but I'm glad you are filling in some holes here. Following the end of martial law, Taiwan experienced massive growth as both the economy and government liberalized. The KMT was forced to begin opening up elections to their main opposition party,
Starting point is 02:05:00 the Democratic Progressive Party, DPP. Today, the DPP is the party in power after Taiwan elected its first female president, Sai Ing-wen in 2016 and again 2020. The KMT has really lost steam as the dominant party of Taiwan because of their views on reunification with China. And overwhelming number of younger Taiwanese people feel less and less connected with China, with the most recent poll showing 83% of people feel more Taiwan needs than Chinese.
Starting point is 02:05:27 These numbers are only increasing as China exerts more pressure on Taiwan to fit into the one China policy. Also, in the 2020 democracy index, Taiwan was 11th compared to the US at number 25, showing that Taiwan is as strong democratically as many nations around the world. You're right in saying that Taiwan, the Taiwan issue is a touchy subject, but Taiwan is not China. In the social study, teachers opinion and must be viewed as the strong independent democracy that it is instead of as a province of China.
Starting point is 02:05:56 Sorry for the long email, but not really. Love the show, and I have been a listener ever since I moved to Taiwan and heard you on another podcast. Taiwan number one pact. Also, not be me, not me being weird. That's a big saying here in Taiwan. Well, I love that Taiwan info. Taiwan number one, Pat, from someone who knows so much more about Taiwan than I do, who's over there. That's great to hear. And I do hope that Taiwan can properly break away from China completely, keep the freedom it's fought so hard to achieve.
Starting point is 02:06:25 Love that anonymous has tried to help them here and they're very cool information. Love updates like that. Hail Nimrod to you sir. And finally, could end on some more funny. Recovery and sack, be Arthur. I love your name's Be Arthur. I've said that before.
Starting point is 02:06:40 Be Arthur writes, greeting suck master, I never thought it would happen to me because I usually listen to the suck on YouTube, usually letting it would happen to me because I usually listened to suck on YouTube Usually letting it play in my laptop while I play video games or something in the comfort of my own home Well, Friday the 26th I had major back surgery. I brought my laptop with me I had my YouTube notification, let it play then promptly fell asleep because of having narcotics My nurse came in for vitals and meds while I was sleeping and you were describing how filthy and disgusting Bobby willy was I will come realize what was plain hip pause and apologize deeply. Whatever you just heard, I'm sorry it's a podcast I said and then she said no problem.
Starting point is 02:07:13 Hell no not. I thought you'd enjoy that one not sorry about the length or girth of this message be God damn Arthur. I did enjoy that one be God damn Arthur. Nice. The suck spreads in the weirdest of ways. Sounds like you got lucky with that nurse. Not everyone can handle it. I did enjoy that one, be God damn Arthur, nice. The suck spreads and the weirdest of ways. Sounds like you got lucky with that nurse.
Starting point is 02:07:27 Not everyone can handle it. Bavuille, Bavuille, came up from Bavuille with the hot damn woodhogs. Love all these messages coming in. I hope you all keep sending them in. And also I do wanna say, I keep forgetting this. You do not have to say any nice things about me. To get a message, sometimes I feel like a fucking pompous lunatic.
Starting point is 02:07:46 I just read the messages. I'm appreciative of that and the thing is very nice, but I don't want anyone to think like, oh fuck, I got kisses to ask, yes, suck this guy's dick if I want to get my message on there. You don't. I do not take that into consideration at all when picking the messages.
Starting point is 02:07:59 Just, I needed to get that off of my chest. And that's it. Let's get on out of these updates. Thanks, time suckers. I need a net. We all did. Thanks for listening to this bad Magic Productions podcast, Meat Sacks. Please, please do not destroy our servers this week. Because if you do, how can any of us keep on sucking? Hey guys, I didn't want to say this earlier in the show, but I actually have found some
Starting point is 02:08:40 information on anonymous. Some of their members are not good people and I need to get this out there. Some of them, they go after these pedophiles but actually if you look, if you look deep enough, they are actually the one that some of them doing some of the... Kid, they're at... they're... We are anonymous. We are religion. We do not forgive. We do not forget. Expect us. We do not forgive. We do not forget. Expect us.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.