Chris Rock , an independent security researcher , is pissed that the Director of National Intelligence , James Clapper , ismore afraidof ISIS than cyber-terrorist . He ’s hoping to commute that by teaching hack how to subvert governments .

“ I do n’t desire to live in a earth where ISIS is shuddery than hackers , ” Rock begin . Rock , who scat his own computer security company , laid out how to represent a coup using an U. S. Army of cyber mercenary during his talk at the DEFCON whoop conference is Las Vegas .

Rock has the hacking skills , but he needed to find an expert on overthrowing government and stagings coups . He contacted Simon Mann , a mercenary who was part of a conk out 2004 coup attempt in Republic of Equatorial Guinea , for tips and tricks on overthrowing a government . Mann spent five and a one-half year in clink for his coup attack .

Argentina’s President Javier Milei (left) and Robert F. Kennedy Jr., holding a chainsaw in a photo posted to Kennedy’s X account on May 27. 2025.

With the advice from Mann , Rock used his experience working as a hacker for the Kuwait government to pose his theoretical coup attempt . In an interview with Gizmodo , Rock said that he was hired by Kuwait to try the countries substructure . In just two twelvemonth , Rock allege that he and three other people were able to attain complete control of several banks and decisive substructure like Telecoms , which also manages many Kuwait sensitive properties .

“ We also had control of thing like oil colour and accelerator and water as well , ” Rock tell Gizmodo . This research occupy situation five years ago , and Rock says that Kuwait has since “ patched up ” its security flaw .

There are three ways , according to Rock , to present an effective coup . You could project a revolution , but it ’s pretty spicy in Kuwait , so that option is out . You could rig the election , but that wo n’t work in Kuwait where older government positions are n’t elected officials . There ’s something that always work : hacking .

William Duplessie

So here ’s the tonality to overthrowing the government from a cybersecurity view : hack everything and anything . Gain control of decisive substructure , co - opt the media to spread disinformation and sow in the seed of discontentment , and spy on everyone within the government .

plainly , you’re able to use anything in the hack ’s toolkit , but Rock thinks it ’s not worth the hassle of getting too fancy . There ’s no period in trying to use complex zero day feat to compromise the software system of your enemies . Use try and true methods like figure out admin usernames and passwords , self-denial of service attacks — which overload target with phony traffic and crashes them — or societal engineering . Do n’t take Rock ’s word for it , these are actually the method acting he used to take controller of Kuwait ’s infrastructure .

“ I ’m a enceinte fan in surcharge banking concern , ” Rock say . “ They ’ve got lots of money , so we can just use the banking company ’s money . ” Hacking into banks is utilitarian because you’re able to steal money to fund your coup while also framing the current government as corrupt . Rock joke about hacking a savings bank and sending a crew of money to Hillary Clinton to make it reckon like she was corrupt . It ’s loose to broadcast this subject matter when you ’ve already hacked the media . Instead of attacking the bank ’s net , Rock suggested paying off a keeper to insert a malware take USB stick into some of the camber ’s servers .

Starship Test 9

Once you ’ve hack the telecommunication and internet service provider , you’re able to check the country ’s access to the Internet , or keep it run while the current government is sample to shut out it down . Of course , you will want to reach control of the rural area ’s oil and water infrastructure .

Rock conceive that there ’s a semblance of a coup d’etat take place in America , although a very sloppy one . “ You [ Americans ] are encounter a coup take place in your own country . It ’s being leak out very tardily , and it ’s in all probability not the method I ’d use . ” Rock state he does n’t know who ’s propagating the think coup d’etat , and that you ’d plausibly have to study it for a few years to image out who is doing it . He cite the recent dump of Democratic National Committee emails from what US intelligence information armed service believe to be Russian hacker as grounds . “ The important part is the proficiency , that ’s what I ’m concerned in . But they used the right target , Wikileaks will print anything . ” Which , Rock says , is outstanding for someone attempt to stage a coup , as they do n’t have to go through the unconscious process of fooling the media and swan the documents .

Rock need hackers to retake the throne of the governing ’s greatest care , and he said that he hopes his lecture inspires the next generation of hackers . judge by the shouting and upheaval of the audience , he probably did a pretty proficient task .

Lilo And Stitch 2025

Chris RockDefconHacking

Daily Newsletter

Get the expert tech , scientific discipline , and culture news show in your inbox day by day .

News from the future , delivered to your present .

Please select your desire newssheet and take your email to upgrade your inbox .

CMF by Nothing Phone 2 Pro has an Essential Key that’s an AI button

You May Also Like

Photo: Jae C. Hong

Doctor Who Omega

Roborock Saros Z70 Review

Argentina’s President Javier Milei (left) and Robert F. Kennedy Jr., holding a chainsaw in a photo posted to Kennedy’s X account on May 27. 2025.

William Duplessie

Starship Test 9

Lilo And Stitch 2025

Roborock Saros Z70 Review

Polaroid Flip 09

Feno smart electric toothbrush

Govee Game Pixel Light 06