-
Notifications
You must be signed in to change notification settings - Fork 3
/
Copy path29c3-5206-en-the_ethics_of_activists_ddos_actions_en.srt
3007 lines (2256 loc) · 68.7 KB
/
29c3-5206-en-the_ethics_of_activists_ddos_actions_en.srt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1
00:00:09,574 --> 00:00:20,937
<i>applause</i>
2
00:00:20,937 --> 00:00:22,840
Hi, my name is Molly Sauter.
3
00:00:22,840 --> 00:00:26,337
I'm currently a grad student at MIT in comparative media studies
4
00:00:26,337 --> 00:00:30,334
and I do research at the center for civic media at the media lab.
5
00:00:30,334 --> 00:00:35,448
This talk is going to be laying out an analytical framework
6
00:00:35,448 --> 00:00:37,168
that I've been working on for a while
7
00:00:37,168 --> 00:00:40,584
of the ethical analysis of activist DDoS actions.
8
00:00:40,584 --> 00:00:45,023
And though distributed denial of service attacks have been used
9
00:00:45,023 --> 00:00:49,201
as a tool of digital activism for roughly the past 2.5 decades,
10
00:00:49,201 --> 00:00:52,767
the past couple of years we have seen this huge explosion of the use
11
00:00:52,767 --> 00:00:54,882
and the tactic and the popularization of the tactic
12
00:00:54,882 --> 00:00:57,520
as well as a sharp increase in the attention
13
00:00:57,520 --> 00:01:00,686
its use attracts for media and state actors.
14
00:01:00,686 --> 00:01:03,687
All this attention has brought a lot of criticism and
15
00:01:03,687 --> 00:01:07,751
a lot of sort of support from various people in the digital space,
16
00:01:07,751 --> 00:01:09,585
including digital activists.
17
00:01:09,585 --> 00:01:14,868
However both DDoS's critics and DDoS's proponents seek to declare the tactic
18
00:01:14,868 --> 00:01:21,090
as a whole as good or bad, without a nuance understanding the variety of circumstances in contexts
19
00:01:21,090 --> 00:01:24,039
that can render the tactics use ethical or unethical.
20
00:01:24,039 --> 00:01:27,217
So in this talk I'm gonna lay down the preliminaries for a framework
21
00:01:27,217 --> 00:01:33,129
by which to perform an ethical analysis of an activist DDoS action in individual use context.
22
00:01:33,822 --> 00:01:36,923
We're gonna go through a brief technical legal note
23
00:01:36,923 --> 00:01:40,103
which I assume I'm gonna be able to skip for this audience,
24
00:01:40,103 --> 00:01:46,169
criticisms of activist DDoS actions that have been thrown out in the past.
25
00:01:46,169 --> 00:01:49,752
Then we're gonna get in to the analytical framework that I'm proposing
26
00:01:49,752 --> 00:01:52,573
and then I'm gonna tell you a little about where I'm gonna take this
27
00:01:52,573 --> 00:01:55,952
as I write my thesis, which this is.
28
00:01:56,660 --> 00:01:59,992
So everybody knows what a DDoS attack is, right?
29
00:01:59,992 --> 00:02:01,810
Raise your hand if you know what it is.
30
00:02:01,810 --> 00:02:04,044
Awesome, I can totally skip this slide.
31
00:02:04,044 --> 00:02:06,411
<i>laughter</i>
32
00:02:07,319 --> 00:02:10,706
DDoS action, distributed denial of service action by which
33
00:02:10,706 --> 00:02:14,870
you seek to monopulize the resources of a server or other resource
34
00:02:14,870 --> 00:02:18,319
with your resources to prevent other people from using it.
35
00:02:18,319 --> 00:02:20,212
Good, we're happy? We're happy.
36
00:02:20,212 --> 00:02:23,628
<i>applause</i>
37
00:02:23,628 --> 00:02:27,300
Alright, brief legal note: unlike this cat I am not a lawyer.
38
00:02:27,300 --> 00:02:29,252
I do not have a law degree, haven't studied law.
39
00:02:29,252 --> 00:02:31,618
I worked at a law school for a while but that doesn't make me a lawyer.
40
00:02:31,618 --> 00:02:37,045
So I'm gonna talk about legal things in this talk, do not take it as legal advice.
41
00:02:37,045 --> 00:02:42,900
So DDoS actions and DDoS attacks are illegal in most but not all jurisdictions.
42
00:02:42,900 --> 00:02:45,625
In the US they are prosecuted as felonies.
43
00:02:45,625 --> 00:02:51,938
Under title 10 section 1030 of the US Code which is complicated and which I won't read.
44
00:02:51,938 --> 00:02:55,871
But just so that everyone is aware and this does have a bearing on my talk later:
45
00:02:55,871 --> 00:03:00,507
these things are very illegal and this has severe precautions
46
00:03:00,507 --> 00:03:07,815
for how organizers should treat them as they engage with them in their protests.
47
00:03:07,815 --> 00:03:13,289
So one of the major criticisms of DDoS actions is that they constitute censorship.
48
00:03:13,289 --> 00:03:20,123
This is a very popular criticism among sort of "oldschool" hacktivists
49
00:03:20,123 --> 00:03:23,312
like cult of the dead cow hacktivism or other groups like that
50
00:03:23,312 --> 00:03:26,181
which have denounced the tactic as straight-up censorship.
51
00:03:26,181 --> 00:03:31,618
Basically they say you are impinging the movement of bits on the network and that's wrong.
52
00:03:31,618 --> 00:03:34,940
If we're going to be engaging in this type of electronic activism
53
00:03:34,940 --> 00:03:39,349
we want to be encouring the movement of bits on the network, not stopping them.
54
00:03:39,349 --> 00:03:44,839
This criticism privileges the integrity of the network and the rights of specific individuals
55
00:03:44,889 --> 00:03:47,629
to unfettered flows of information,
56
00:03:47,721 --> 00:03:54,163
and it privileges that overpolitical ideals of activism in civil disobedience present in activist DDoS actions.
57
00:03:54,201 --> 00:04:01,118
This criticism also raises very specific unanswered questions about who can engange in censorship.
58
00:04:01,118 --> 00:04:08,670
Can in fact non-state actors and non-corporate actors be engaged as censorious bodies?
59
00:04:08,824 --> 00:04:15,026
And while DDoS is undeniably a disruptive tactic, does disruption of speech,
60
00:04:15,026 --> 00:04:19,413
particularly in context where the target has many other speech outlets,
61
00:04:19,413 --> 00:04:21,972
always equal a denial of speech?
62
00:04:21,972 --> 00:04:26,121
For instance when this tactic is trained against a corporate target
63
00:04:26,121 --> 00:04:30,410
while certain aspects of that organization's presence may be disrupted
64
00:04:30,410 --> 00:04:35,510
their abiltiy to engange in political speech through the press and other outlets is not.
65
00:04:35,510 --> 00:04:42,596
Therefore the criticism that you're engaging in censorship by waging a DDoS action sort of falls flat.
66
00:04:42,596 --> 00:04:49,073
Though the criticism is appropriate in some cases, especially when it's used against organizations
67
00:04:49,073 --> 00:04:54,174
that primarily exist online such as ISPs or independent blogs.
68
00:04:55,066 --> 00:05:01,524
Second major criticism is a sort of a revamping of this very old debate in activism.
69
00:05:01,524 --> 00:05:07,777
Direct action or symbolic/attention-oriented activism, which is better?
70
00:05:07,777 --> 00:05:12,427
And the anwswer is, one isn't really better, they are sort of different.
71
00:05:13,104 --> 00:05:16,184
<i>applause</i>
72
00:05:16,184 --> 00:05:17,442
Thank you.
73
00:05:17,442 --> 00:05:22,930
One group that's been particularly vocal about this in the past is a group called the critical art ensemble
74
00:05:22,930 --> 00:05:27,945
which helped pioneer the idea of electronic civil disobedience in the 90th.
75
00:05:27,945 --> 00:05:33,314
And they critized groups like the electronic disturbance theatre for their use of DDoS in their actions.
76
00:05:33,314 --> 00:05:36,146
Saying that the use is ineffectual because corporations
77
00:05:36,146 --> 00:05:41,289
and states are now ??? waging "media war" with activists.
78
00:05:41,289 --> 00:05:44,771
And it is ineffectual when compared with direct action.
79
00:05:44,771 --> 00:05:49,989
In addition to just sort of being mean to attention-oriented activism for no reason,
80
00:05:49,989 --> 00:05:56,079
this criticism ignores the fact that DDoS is often used as a tool of direct action
81
00:05:56,079 --> 00:06:01,378
Such as when it was used by the electrohippies in 1999 against the Internet
82
00:06:01,393 --> 00:06:04,594
that the world trade organization was using during their annual meeting
83
00:06:04,594 --> 00:06:07,686
or other groups that I'm gonna talk later about in this talk.
84
00:06:07,686 --> 00:06:13,005
The CAE's conception of DDoS also leaves the tactic
85
00:06:13,005 --> 00:06:15,617
out of the context of larger actions that it is associated with.
86
00:06:15,617 --> 00:06:23,037
This tactic is pretty much never and frankly should never be used as the sole tactic in a campaign.
87
00:06:23,037 --> 00:06:26,768
It should always be used in the context with other tactics
88
00:06:26,768 --> 00:06:31,539
and it gets its ethical and politcal viability from the context in which it is used.
89
00:06:31,539 --> 00:06:35,562
Not simply because of things inherent to itself.
90
00:06:35,562 --> 00:06:40,356
Third major criticism: what is a successful DDoS action?
91
00:06:40,356 --> 00:06:48,715
Basically it's really hard to take down a large corporate website with an all volunteer manual DDoS action.
92
00:06:48,715 --> 00:06:51,977
If you and all your friends are really just sitting in your chairs
93
00:06:51,977 --> 00:06:58,173
hitting refresh a bunch of times on like paypal.com you're not gonna bring it down.
94
00:06:58,173 --> 00:07:02,331
So then what are we going to consider a successful DDoS action
95
00:07:02,331 --> 00:07:07,927
if we can't rely on downtime to be a measure of success?
96
00:07:07,927 --> 00:07:10,594
So there are a couple of different answers to this questions.
97
00:07:10,594 --> 00:07:16,308
The first is we want to look at the value of the tactic as something which draws and focuses attention.
98
00:07:16,308 --> 00:07:20,129
And this is way more important now that it has become
99
00:07:20,129 --> 00:07:24,618
much more of a media magnet than necessarily it was maybe 10 years ago.
100
00:07:24,618 --> 00:07:29,919
Another use for the tactic is the biographical impact on the participants
101
00:07:29,919 --> 00:07:33,465
and expanding opportunities for engagement and participation.
102
00:07:33,465 --> 00:07:38,782
If you have never participated in a political action and you get to participate in a DDoS action
103
00:07:38,782 --> 00:07:43,424
and you're in the IRC channel with all of these new friends who you didn't know you had
104
00:07:43,424 --> 00:07:46,132
who you didn't know had the political views that you had
105
00:07:46,132 --> 00:07:49,667
and you didn't know were willing to participate in ways that you are.
106
00:07:49,667 --> 00:07:53,352
That has a huge biographical impact on you and it helps you consider yourself.
107
00:07:53,352 --> 00:07:57,329
And activism helps you move up the ??? the ladder of engagement.
108
00:07:57,329 --> 00:08:03,070
This enables what Ricardo Dominguez of the EDT calls a permanent culture of resistance
109
00:08:03,070 --> 00:08:10,175
where resisting modes of power and resisting oppressive systems is part of the culture.
110
00:08:10,175 --> 00:08:16,002
And it isn't simple something you do for special on weekends but it is something that you do all the time.
111
00:08:16,002 --> 00:08:18,270
And the value of this symbolic resistence is
112
00:08:18,270 --> 00:08:23,214
not necessarily its overt effect on the system that its ostensibly targets
113
00:08:23,214 --> 00:08:28,210
but rather its effects on participants and on the reflective fields that surround it as it occurs
114
00:08:28,210 --> 00:08:30,201
including media and culture.
115
00:08:30,201 --> 00:08:36,920
Basically DDoS acts is a tool for the relevation of what James Scott called hidden transcripts of resistance.
116
00:08:36,920 --> 00:08:39,518
It serves as an open action where an individual participant
117
00:08:39,518 --> 00:08:43,511
can join a community of resistance with others.
118
00:08:44,896 --> 00:08:46,785
Moving on to the second major section:
119
00:08:46,785 --> 00:08:48,904
the analytical framework that I'm presenting.
120
00:08:48,904 --> 00:08:52,997
There are four major parts of it that I'm gonna talk about in this talk.
121
00:08:52,997 --> 00:08:58,150
I'm hoping to expand to maybe five or six later, but not right now.
122
00:08:58,150 --> 00:09:01,564
The first is intended effects and actual effects.
123
00:09:01,564 --> 00:09:05,567
The second is contacts within a greater campaign which we've already talked about a little bit.
124
00:09:05,567 --> 00:09:09,218
The third is technology being utilized in the action.
125
00:09:09,218 --> 00:09:13,799
And the fourth is the specific participant and organizer populations ??at play??.
126
00:09:13,799 --> 00:09:16,678
I'm gonna go through these one by one.
127
00:09:16,678 --> 00:09:19,277
The first is intended and actual effects.
128
00:09:19,277 --> 00:09:26,140
What I mean by this is what the group that is waging the action intends to happen by its use of the action
129
00:09:26,140 --> 00:09:28,072
what actually happens.
130
00:09:28,072 --> 00:09:31,442
So there is a good example of this from 1997.
131
00:09:31,442 --> 00:09:40,047
It's called the IGC Euskal Herria Journal action and that's Basque and I totally butchered it but I'm not Basque.
132
00:09:40,047 --> 00:09:44,763
Basically what happened was there was an ISP called IGC
133
00:09:44,763 --> 00:09:50,234
which was hosting a Basque newspaper publication, an online newspaper.
134
00:09:50,234 --> 00:09:54,338
This was during a time in Spain when the Basques were not terribly popular.
135
00:09:54,338 --> 00:09:58,068
There was a lot of violence going around Basque seperatives actions.
136
00:09:58,068 --> 00:10:06,772
A popular DDoS action was started by people who I don't know, so don't ask me,
137
00:10:06,772 --> 00:10:10,876
to pressure IGC to take this website down,
138
00:10:10,876 --> 00:10:16,500
the Euskal Herria Journal website down. People didn't like it.
139
00:10:16,500 --> 00:10:18,880
It got a lot of popular support.
140
00:10:18,880 --> 00:10:22,285
Actually several major newspapers in Spain eventually
141
00:10:22,285 --> 00:10:27,270
published target email addresses for email bombs and other things
142
00:10:27,270 --> 00:10:29,745
until they eventually decided that was probably a bad idea
143
00:10:29,745 --> 00:10:32,937
and they retracted their support.
144
00:10:32,937 --> 00:10:37,135
But the stated goal of the actions was always to get the website offline.
145
00:10:37,135 --> 00:10:39,923
People didn't like it, they wanted it gone.
146
00:10:39,923 --> 00:10:46,529
Eventually it did go down because IGC was flooded with these packets and mail bombs and it was horrible.
147
00:10:46,529 --> 00:10:52,639
It rendered inaccessible the websites and emails of their over 13000 subscribers
148
00:10:52,639 --> 00:10:56,682
and they couldn't function as a business while this attack was going on.
149
00:10:56,682 --> 00:11:00,671
So they did eventually stop hosting the site but under firm protest.
150
00:11:00,671 --> 00:11:05,621
As an ISP IGC exists primarily in fact entirely online.
151
00:11:05,621 --> 00:11:11,186
Removing its ability to function online removes its core as an organization
152
00:11:11,186 --> 00:11:13,034
and its ability to function.
153
00:11:13,034 --> 00:11:17,284
So the goal of this action was to remove content
154
00:11:17,284 --> 00:11:23,682
by waging the action as long as the DDoS was successful the content was removed.
155
00:11:23,682 --> 00:11:30,702
So actually the goal of the action was the permanent imposition of the state of the action.
156
00:11:30,702 --> 00:11:35,613
Its intended effects were its actual effects as it was occurring.
157
00:11:35,613 --> 00:11:38,586
This fits very well with the criticism that we saw before.
158
00:11:38,586 --> 00:11:41,304
This was actually just plain censorship.
159
00:11:41,304 --> 00:11:44,052
This was people saying: I don't like that you're hosting that content
160
00:11:44,052 --> 00:11:50,386
therefore I'm going to to make you not host that content until you don't host it anymore.
161
00:11:50,386 --> 00:11:55,073
This is not very cool and is unethical and bad.
162
00:11:55,904 --> 00:12:01,931
The second example that I have up here is the EDT electronic disturbance to Lufthansa action from 2001.
163
00:12:01,931 --> 00:12:07,652
This is an example where disrupting content does not equal silencing speech
164
00:12:07,652 --> 00:12:11,063
as opposed to the example that I just showed which was depressing.
165
00:12:11,063 --> 00:12:16,519
So in this example rather than removing content from the Internet
166
00:12:16,519 --> 00:12:21,255
the goal of this action was to raise awareness of Lufthansa's
167
00:12:21,255 --> 00:12:25,739
allowing the German government to deport immigrants using its flights.
168
00:12:25,739 --> 00:12:31,457
It's part of a much greater action called the deportation class action.
169
00:12:31,457 --> 00:12:36,770
While the Lufthansa website itself was rendered inaccessible for brief periods of time,
170
00:12:36,770 --> 00:12:40,889
the actual communications of the airline, its ability to fly planes,
171
00:12:40,889 --> 00:12:45,971
maintain normal operations and communicate internally with itself and with the media
172
00:12:45,971 --> 00:12:49,624
remained for all practical purposes unaffected.
173
00:12:49,624 --> 00:12:52,500
So while the stated goal of the Lufthansa action was
174
00:12:52,500 --> 00:12:56,835
to draw public attention to a specific aspect of the Airline's business model
175
00:12:56,835 --> 00:13:00,486
and through focused attention changed that corporations behavior
176
00:13:00,486 --> 00:13:02,767
it was actually rather successful in that.
177
00:13:02,767 --> 00:13:08,214
The airline did eventually stop allowing the government to deport immigrants with its flights.
178
00:13:08,214 --> 00:13:12,725
Though the action took place on the Internet the effect it sort of had
179
00:13:12,725 --> 00:13:17,808
was not limited to, was not even really present in the online space.
180
00:13:17,808 --> 00:13:20,797
And in and of itself this action could not have achieved
181
00:13:20,797 --> 00:13:23,759
what the electronic disturbance theatre set up to accomplish.
182
00:13:23,759 --> 00:13:29,623
It took positive behavior on the part of Lufthansa for the deportation class action to achieve its goals
183
00:13:29,623 --> 00:13:38,014
as opposed to the IGC example which was designed to accomplish its intended effects by gross fear.
184
00:13:38,014 --> 00:13:44,531
So the third example I'm gonna talk about is something called toywar, or the etoy/toywar campaign.
185
00:13:44,531 --> 00:13:51,865
The twelve days of Christmas campaign took place in 1999 and was an online attempt to draw attention to
186
00:13:51,865 --> 00:13:56,161
a legal dispute between etoy which was a performance art collective
187
00:13:56,161 --> 00:14:04,279
and eToys which was a toy company, an ecommerce company that sold toys online
188
00:14:04,279 --> 00:14:07,699
and they were fighting over the domain etoy.com.
189
00:14:07,699 --> 00:14:11,909
And writing about this is very kamikaze because etoy and eToys,
190
00:14:11,909 --> 00:14:14,649
you have to be very careful.
191
00:14:14,649 --> 00:14:21,195
So this action was designed to draw attention to that legal battle.
192
00:14:21,195 --> 00:14:27,590
But it had the additional effect of having a fairly significant impact on eToys' bottom line
193
00:14:27,590 --> 00:14:30,969
because it took place the twelve days before Christmas
194
00:14:30,969 --> 00:14:33,704
which was the primary shopping season.
195
00:14:33,704 --> 00:14:37,170
And it did have a major how their website ran.
196
00:14:37,170 --> 00:14:44,596
So though their main goal was this attention-oriented campaign in targeting this ecommerce site
197
00:14:44,596 --> 00:14:48,178
they were targeting the central purpose of their competitor.
198
00:14:48,178 --> 00:14:53,460
They were attacking, they were going after what they were which is an online organization.
199
00:14:53,460 --> 00:14:57,550
Etoy, the art ensemble, eventually triumphed in a court case
200
00:14:57,550 --> 00:15:01,594
and claimed their role in the financial losses suffered by eToys Inc.
201
00:15:01,594 --> 00:15:03,321
that occurred over the course of that actions.
202
00:15:03,321 --> 00:15:05,639
Their stock price pretty much plummeted
203
00:15:05,639 --> 00:15:11,003
which you can rather blame on the bubble or the action, whichever makes you feel better.
204
00:15:11,003 --> 00:15:20,536
So in this instance we have a combining of direct action and attention-oriented activism into the same action.
205
00:15:20,536 --> 00:15:24,968
The next part of the framework is context within a larger campaign.
206
00:15:24,968 --> 00:15:27,641
As I said DDoS actions very rarely occur by themselves
207
00:15:27,641 --> 00:15:31,067
and in fact if they did occur by themselves you'd probably never hear about them
208
00:15:31,067 --> 00:15:33,418
because there would be no reason why that site you like
209
00:15:33,418 --> 00:15:35,757
is down, it would just be down.
210
00:15:35,757 --> 00:15:39,252
Like physical world sit-ins DDoS actions must be embedded
211
00:15:39,252 --> 00:15:41,700
within a greater campaign of publicity and messaging
212
00:15:41,700 --> 00:15:45,520
to ensure that content disruptions are registered by viewers
213
00:15:45,520 --> 00:15:50,049
and passers-by as protest actions and not as mere technical glitches.
214
00:15:50,049 --> 00:15:53,400
The EDT/Lufthansa campaign took place within the context of
215
00:15:53,400 --> 00:15:55,837
a coordinated multi-pronged campaign
216
00:15:55,837 --> 00:15:59,041
which included physical world actions at stock holder meetings,
217
00:15:59,041 --> 00:16:02,370
press releases and the distribution of special seatback
218
00:16:02,370 --> 00:16:05,720
information cards on Lufthansa airlines that explained
219
00:16:05,720 --> 00:16:07,206
what the protest was about.
220
00:16:07,206 --> 00:16:12,351
I don't know how they got them into the planes but they did end up in the planes somehow.
221
00:16:12,351 --> 00:16:17,112
Similirarly toywar was also embedded within a larger campaign of press coverage.
222
00:16:17,112 --> 00:16:20,857
They were covered by Wired, the New York Times, and the AP
223
00:16:20,857 --> 00:16:24,306
and there were also solidarity actions and physical world actions
224
00:16:24,306 --> 00:16:26,389
at court houses.
225
00:16:26,389 --> 00:16:29,559
So if you are going for this type of action,
226
00:16:29,559 --> 00:16:32,242
it has to be embedded within many other actions.
227
00:16:32,242 --> 00:16:35,256
It can't just be your sole activist ???
228
00:16:35,256 --> 00:16:39,158
You have to use with a bunch of other tools as well.
229
00:16:39,158 --> 00:16:42,957
The technology problem is a really interesting one.
230
00:16:42,957 --> 00:16:47,368
As I mentioned it's really difficult for a purely volunteer-based DDoS action
231
00:16:47,368 --> 00:16:49,425
to bring down a targeted site.
232
00:16:49,425 --> 00:16:52,906
As a result we started to see the use of botnets,
233
00:16:52,906 --> 00:16:56,087
traffic multipliers, automated attack tools and other exploits
234
00:16:56,087 --> 00:17:01,373
to bring the power of such actions in line with the defenses employed by targets.
235
00:17:01,373 --> 00:17:04,889
While the use of such technological tools doesn't automatically
236
00:17:04,889 --> 00:17:08,466
negatively affect the validity of these actions,
237
00:17:08,466 --> 00:17:12,400
the use of non-volunteer botnets is the one thing
238
00:17:12,400 --> 00:17:14,086
that is particularly worrying.
239
00:17:14,086 --> 00:17:17,622
And the other things do need to be considered within a larger context.
240
00:17:17,622 --> 00:17:20,489
Volunteer botnets present their own ethical concerns
241
00:17:20,489 --> 00:17:22,924
but are less immediately objectionable.
242
00:17:22,924 --> 00:17:26,865
Like marches, sit-ins and other crowd-based tactics
243
00:17:26,865 --> 00:17:30,436
DDoS actions gain their ethical and political validity
244
00:17:30,436 --> 00:17:33,641
from large numbers of willing participants.
245
00:17:33,641 --> 00:17:35,885
The use of traffic multipliers and exploits,
246
00:17:35,885 --> 00:17:38,887
while tempting to achieve downtime,
247
00:17:38,887 --> 00:17:46,533
undercuts claims by organizers that the actions represent a unified political voice of many different people.
248
00:17:46,533 --> 00:17:50,573
So as an organizers, you would have to balance the
249
00:17:50,573 --> 00:17:53,668
"do I want downtime at press coverage" or
250
00:17:53,668 --> 00:17:57,104
"do I want to remain true to the number of participants