HOME

TheInfoList



OR:

Cult of the Dead Cow, also known as cDc or cDc Communications, is a computer
hacker A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term ''hacker'' has become associated in popu ...
and
DIY "Do it yourself" ("DIY") is the method of building, modifying, or repairing things by oneself without the direct aid of professionals or certified experts. Academic research has described DIY as behaviors where "individuals use raw and semi ...
media Media may refer to: Communication * Media (communication), tools used to deliver information or data ** Advertising media, various media, content, buying and placement for advertising ** Broadcast media, communications delivered over mass el ...
organization founded in 1984 in
Lubbock, Texas Lubbock ( ) is the 10th-most populous city in the U.S. state of Texas and the seat of government of Lubbock County. With a population of 260,993 in 2021, the city is also the 85th-most populous in the United States. The city is in the northw ...
. The group maintains a
weblog A blog (a truncation of "weblog") is a discussion or informational website published on the World Wide Web consisting of discrete, often informal diary-style text entries (posts). Posts are typically displayed in reverse chronological order ...
on its site, also titled "Cult of the Dead Cow". New media are released first through the blog, which also features thoughts and opinions of the group's members.


Timeline

The group was formed in June 1984 at the Farm Pac
slaughterhouse A slaughterhouse, also called abattoir (), is a facility where animals are slaughtered to provide food. Slaughterhouses supply meat, which then becomes the responsibility of a packaging facility. Slaughterhouses that produce meat that is no ...
by
Grandmaster Ratte' Grandmaster Ratte' (born Kevin Wheeler in April 1970 and formerly known as Swamp Rat and Swamp Ratte') is one of the founders of the Cult of the Dead Cow Hacker (computer security), hacker group, along with Franken Gibe and Sid Vicious. His offi ...
(aka Swamp Ratte'), Franken Gibe, Sid Vicious, and three
BBS BBS may refer to: Ammunition * BBs, BB gun metal bullets * BBs, airsoft gun plastic pellets Computing and gaming * Bulletin board system, a computer server users dial into via dial-up or telnet; precursor to the Internet * BIOS Boot Specificat ...
SysOp A sysop (; an abbreviation of system operator) is an administrator of a multi-user computer system, such as a bulletin board system (BBS) or an online service virtual community.Jansen, E. & James,V. (2002). NetLingo: the Internet dictionary. Netl ...
s. In the 1980s the Cult of the Dead Cow organized and maintained a loose collective of affiliated BBSs across the US and Canada. It was during this time that the cDc is credited with coining the term "31337" as an alternative spelling of " Eleet" or "Elite", an expression denoting skill or greatness in a person, place, or thing. In December 1990, cDc member Drunkfux – the pseudonym of Jesse Dryden, the son of
Jefferson Airplane Jefferson Airplane was an American rock band based in San Francisco, California, that became one of the pioneering bands of psychedelic rock. Formed in 1965, the group defined the San Francisco Sound and was the first from the Bay Area to ac ...
drummer
Spencer Dryden Spencer Charles Dryden (April 7, 1938 – January 11, 2005) was an American musician best known as the drummer for Jefferson Airplane and New Riders of the Purple Sage. He also played with Dinosaurs, and the Ashes (later known as the Peanut Butt ...
and grand nephew of
Charlie Chaplin Sir Charles Spencer Chaplin Jr. (16 April 188925 December 1977) was an English comic actor, filmmaker, and composer who rose to fame in the era of silent film. He became a worldwide icon through his screen persona, the Tramp, and is consider ...
– gave birth to the modern
hacker con A computer security conference is a Convention (meeting), convention for individuals involved in computer security. They generally serve as meeting places for System administrator, system and network administrators, hacker (computer security), hack ...
. HoHoCon, usually held in
Houston, Texas Houston (; ) is the most populous city in Texas, the most populous city in the Southern United States, the fourth-most populous city in the United States, and the sixth-most populous city in North America, with a population of 2,304,580 in ...
, was the first hacker conference which invited the participation of both
journalists A journalist is an individual that collects/gathers information in form of text, audio, or pictures, processes them into a news-worthy form, and disseminates it to the public. The act or process mainly done by the journalist is called journalism ...
and law enforcement. In all, dFx hosted five annual HoHoCons. In 1991, cDc was named "Sassiest Underground Computer Group" by '' Sassy'' magazine. Also in 1991, the group began distributing music in the form of
cassette tape The Compact Cassette or Musicassette (MC), also commonly called the tape cassette, cassette tape, audio cassette, or simply tape or cassette, is an analog magnetic tape recording format for audio recording and playback. Invented by Lou Ottens ...
albums sold through its
post office box A post office box (commonly abbreviated as P.O. box, or also known as a postal box) is a uniquely addressable lockable box located on the premises of a post office. In some regions, particularly in Africa, there is no door to door delivery ...
. Many of these albums are now available online in their entirety. October 1994 saw the creation of the cDc's
Usenet Usenet () is a worldwide distributed discussion system available on computers. It was developed from the general-purpose Unix-to-Unix Copy (UUCP) dial-up network architecture. Tom Truscott and Jim Ellis conceived the idea in 1979, and it was ...
newsgroup A Usenet newsgroup is a repository usually within the Usenet system, for messages posted from users in different locations using the Internet. They are discussion groups and are not devoted to publishing news. Newsgroups are technically distinct ...
, alt.fan.cult-dead-cow. It was thus the first hacking group to have its own Usenet newsgroup. In November of that year, the group claimed responsibility for giving
Ronald Reagan Ronald Wilson Reagan ( ; February 6, 1911June 5, 2004) was an American politician, actor, and union leader who served as the 40th president of the United States from 1981 to 1989. He also served as the 33rd governor of California from 1967 ...
Alzheimer's disease Alzheimer's disease (AD) is a neurodegeneration, neurodegenerative disease that usually starts slowly and progressively worsens. It is the cause of 60–70% of cases of dementia. The most common early symptom is difficulty in short-term me ...
, claiming to have done so in 1986 with a
blowgun A blowgun (also called a blowpipe or blow tube) is a simple ranged weapon consisting of a long narrow tube for shooting light projectiles such as darts. It operates by having the projectile placed inside the pipe and using the force created by ...
. The cDc declared war on the
Church of Scientology The Church of Scientology is a group of interconnected corporate entities and other organizations devoted to the practice, administration and dissemination of Scientology, which is variously defined as a cult, a scientology as a business, bu ...
in 1995 during the alt.religion.scientology controversy, stating In 1997, the cDc began distributing original
MP3 MP3 (formally MPEG-1 Audio Layer III or MPEG-2 Audio Layer III) is a coding format for digital audio developed largely by the Fraunhofer Society in Germany, with support from other digital scientists in the United States and elsewhere. Origin ...
-format music on its website. In August 1998, they presented their popular
Back Orifice Back Orifice (often shortened to BO) is a computer program designed for remote system administration. It enables a user to control a computer running the Microsoft Windows operating system from a remote location.Richtel, Matt.Hacker Group Say ...
tool at DEF CON 6. In February 2000, the cDc was the subject of an 11-minute documentary short titled "Disinformation". Also in February 2000, cDc member
Mudge Mudge is a surname. Notable people with the surname include: Politics * Dirk Mudge (1928–2020), Namibian politician * Geoffrey Mudge, English politician Religion * Enoch Mudge (1776–1850), first Methodist minister reared in New England * ...
briefed President
Bill Clinton William Jefferson Clinton ( né Blythe III; born August 19, 1946) is an American politician who served as the 42nd president of the United States from 1993 to 2001. He previously served as governor of Arkansas from 1979 to 1981 and agai ...
on Internet security.


cDc communications

cDc communications is the parent organisation of Cult of the Dead Cow, one of three groups that fall under cDc communications. The other two are the Ninja Strike Force and
Hacktivismo Hacktivismo is an offshoot of CULT OF THE DEAD COW (cDc), whose beliefs include access to information as a basic human right. It was founded in 1999. The group's beliefs are described fully in The Hacktivismo Declaration, which seeks to apply the ...
.


Ninja Strike Force

In 1996, the cDc announced the birth of its Ninja Strike Force, a group of "
ninja A or was a covert agent or mercenary in feudal Japan. The functions of a ninja included reconnaissance In military operations, reconnaissance or scouting is the exploration of an area by military forces to obtain information about enem ...
" dedicated to achieving the goals of the cDc, an intervention task force both online and offline. The cDc opened the NSF Dojo in 2004. An "NSF Dojo" Member also operates a streaming radio station, which features recordings of
hacker con A computer security conference is a Convention (meeting), convention for individuals involved in computer security. They generally serve as meeting places for System administrator, system and network administrators, hacker (computer security), hack ...
presentations and other educational programming in addition to a wide range of musical styles and artists. Membership in the NSF is granted by the cDc to those individuals who stand out in their support of the cDc and its ideals. Members are recognized for their abilities, capabilities, and being the best of the best in their skills. In 2006 the Ninja Strike Force launched its own
microsite A microsite is an individual web page or a small cluster of pages which are meant to function as a discrete entity (such as an iFrame) within an existing website or to complement an offline activity. The microsite's main landing page can have its ...
.


Hacktivismo

In late 1999, the cDc created Hacktivismo, an independent group under the cDc communications umbrella dedicated to the creation of anti-
censorship Censorship is the suppression of speech, public communication, or other information. This may be done on the basis that such material is considered objectionable, harmful, sensitive, or "inconvenient". Censorship can be conducted by governments ...
technology in furtherance of
human rights Human rights are Morality, moral principles or Social norm, normsJames Nickel, with assistance from Thomas Pogge, M.B.E. Smith, and Leif Wenar, 13 December 2013, Stanford Encyclopedia of PhilosophyHuman Rights Retrieved 14 August 2014 for ce ...
on the
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
. The group's beliefs are described fully in The Hacktivismo Declaration, which seeks to apply the
Universal Declaration of Human Rights The Universal Declaration of Human Rights (UDHR) is an international document adopted by the United Nations General Assembly that enshrines the Human rights, rights and freedoms of all human beings. Drafted by a UN Drafting of the Universal De ...
and the
International Covenant on Civil and Political Rights The International Covenant on Civil and Political Rights (ICCPR) is a multilateral treaty that commits nations to respect the civil and political rights of individuals, including the right to life, freedom of religion, freedom of speech, freedo ...
to the
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
. Among Hacktivismo's beliefs include access to information as a basic
human right Human rights are moral principles or normsJames Nickel, with assistance from Thomas Pogge, M.B.E. Smith, and Leif Wenar, 13 December 2013, Stanford Encyclopedia of PhilosophyHuman Rights Retrieved 14 August 2014 for certain standards of hu ...
. The organization partially shares
Critical Art Ensemble Critical Art Ensemble (CAE) is a collective of five tactical media practitioners of various specializations including computer graphics and web design, film/video, photography, text art, book art, and performance. For CAE, tactical media is situat ...
's (CAE) belief in the value of secrecy, but challenges both with CAE and many
hacktivist In Internet activism, hacktivism, or hactivism (a portmanteau of '' hack'' and '' activism''), is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. With roots in h ...
s on the subject of civil disobedience. The cDc model is, instead, one of disruptive compliance.Wardrip-Fruin, Noah and Nick Montfort, ed (2003). The New Media Reader. pp.782. The MIT Press. . Disruptive, in this case, refers to disruptive technology; compliance refers back to the Internet and its original intent of constructive free-flow and openness. Hacktivismo has also authored its own
software license A software license is a legal instrument (usually by way of contract law, with or without printed material) governing the use or redistribution of software. Under United States copyright law, all software is copyright protected, in both source ...
agreement, the
Hacktivismo Enhanced-Source Software License Agreement The Hacktivismo Enhanced-Source Software License Agreement (HESSLA) is a software license proposed by Hacktivismo that attempts to put ethical restrictions on use and modification of software released under it. The license was written by Oxblood ...
, which is source available (but not
open source Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use the source code, design documents, or content of the product. The open-source model is a decentralized sof ...
). Their work focuses on the development of software that empowers conduct forbidden by repression, rather than enabling (private or public) attacks on repressors. In general cDc hopes that open code can become the
lingua franca A lingua franca (; ; for plurals see ), also known as a bridge language, common language, trade language, auxiliary language, vehicular language, or link language, is a language systematically used to make communication possible between groups ...
of a
hacktivism In Internet activism, hacktivism, or hactivism (a portmanteau of ''hack'' and ''activism''), is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. With roots in hack ...
that seeks to wage peace, not war. While the term isn't used, the software described in cDc's "Waging of Peace on the Internet" would create a set of connections between dissidents that sound in technoliberationist terms,
rhizomatic In botany and dendrology, a rhizome (; , ) is a modified subterranean plant stem that sends out roots and shoots from its nodes. Rhizomes are also called creeping rootstalks or just rootstalks. Rhizomes develop from axillary buds and grow hor ...
.


Crossover associations with other groups

In addition to the obvious associations between Cult of the Dead Cow, Hacktivismo, and the Ninja Strike Force, the cDc also has crossover associations with several other organizations. These include the
L0pht L0pht Heavy Industries (pronounced "loft") was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area. The L0pht was one of the first viable hackerspaces in the US, and a pioneer of responsible disclosure. ...
; founding members White Knight and Count Zero and final members
Dildog Christien Rioux, also known by his handle DilDog, is the co-founder and chief scientist for the Burlington, Massachusetts based company Veracode, for which he is the main patent holder. Educated at MIT, Rioux was a computer security researcher a ...
and
Mudge Mudge is a surname. Notable people with the surname include: Politics * Dirk Mudge (1928–2020), Namibian politician * Geoffrey Mudge, English politician Religion * Enoch Mudge (1776–1850), first Methodist minister reared in New England * ...
are all members of cDc. Additionally, The Nightstalker was a member of
Youth International Party The Youth International Party (YIP), whose members were commonly called Yippies, was an American youth-oriented radical and countercultural revolutionary offshoot of the free speech and anti-war movements of the late 1960s. It was founded on ...
Line/Technology Assistance Program. Lord Digital, one of the founders of Mindvox, is a former member of LOD/H and a current member of the
Sacrament of Transition Sacrament of Transition is a new religious movement based in Slovenia, based on and promoting the sacramental use of the psychoactive plant ''Tabernanthe iboga'' and its psychoactive chemical constituent ibogaine. The founder of Sacrament of Tran ...
. Red Knight was a member of the
Masters of Deception Masters of Deception (MOD) was a New York City, New York–based group of hackers, most widely known in media for their exploits of telephone company infrastructure and later prosecution. Origin of Masters of Deception MOD's initial members ...
. Also,
RaD Man __NOTOC__ Christian Wirth (born in the 1970s), better known by the pseudonym RaD Man, is an American computer artist and historian. He works in the field of ANSI art, a method of creating art using a limited set of Code page 437, text characters ...
, a member of the Ninja Strike Force, is one of the founders of
ACiD Productions ACiD Productions (ACiD) is a digital art group. Founded in 1990, the group originally specialized in ANSI artwork for BBSes. More recently, they have extended their reach into other graphical media and computer software development. During the BB ...
. Another NSF member, Mark Hinge, is a founding member of the British hacker group The Syndicate Of London. Flack, another Ninja Strike Force member, was a co-founder of the horror "lit group"
Soulz at Zero Soulz at Zero (SAZ) was a lit group formed in 1994 by Jack Flack ( Rob O'Hara) and The Stranger (Stephen Alba). SAZ released 25 monthly packs over a period of two years, beginning in September 1994 and ending in September 1996. The group took its n ...
.
Mudge Mudge is a surname. Notable people with the surname include: Politics * Dirk Mudge (1928–2020), Namibian politician * Geoffrey Mudge, English politician Religion * Enoch Mudge (1776–1850), first Methodist minister reared in New England * ...
later went on to program manage the
CINDER Cinder is an alternate term for scoria. Cinder or Cinders may also refer to: In computing *Cinder (programming library), a C++ programming library for visualization *Cinder, OpenStack's block storage component * Cyber Insider Threat, CINDER, a ...
program at DARPA, which aimed to detect 'insider threats' like the
WikiLeaks WikiLeaks () is an international Nonprofit organization, non-profit organisation that published news leaks and classified media provided by anonymous Source (journalism), sources. Julian Assange, an Australian Internet activism, Internet acti ...
sources.Darpa’s Star Hacker Looks to WikiLeak-Proof Pentagon
Spencer Ackerman, Wired, August 31, 2010, retr 2011 12 5


Electronic publication

During the 1980s, the cDc was well known throughout the
BBS BBS may refer to: Ammunition * BBs, BB gun metal bullets * BBs, airsoft gun plastic pellets Computing and gaming * Bulletin board system, a computer server users dial into via dial-up or telnet; precursor to the Internet * BIOS Boot Specificat ...
scene for their underground ezine, also called ''Cult of the Dead Cow''. The group claims to have invented the
ezine An online magazine is a magazine published on the Internet, through bulletin board systems and other forms of public computer networks. One of the first magazines to convert from a print magazine format to being online only was the computer magaz ...
. The Cult of the Dead Cow has been credited with coining the term "elite" as used in the hacker scene/computer underground in cDc textfiles of the 1980s. The ezine has led to some criticism of the group over the years; in a 1994 episode of ''Geraldo'' entitled "Computer Vice,"
Geraldo Rivera Geraldo Rivera (born Gerald Riviera; July 4, 1943) is an American journalist, attorney, author, political commentator, and former television host. He hosted the tabloid talk show '' Geraldo'' from 1987 to 1998. He gained publicity with the liv ...
referred to the group as "a bunch of sickos" for having published an article called "Sex with Satan," originally published in 1988.


Hacktivism

In 1996, cDc member Omega used the term "
hacktivism In Internet activism, hacktivism, or hactivism (a portmanteau of ''hack'' and ''activism''), is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. With roots in hack ...
" in an email to other group members. The group has been active in hacktivist causes since that time.


Hong Kong Blondes

In the late 1990s, the cDc claimed to have worked with a group of Chinese dissidents called "The Hong Kong Blondes." The group’s ostensible goal was to disrupt computer networks within the
People's Republic of China China, officially the People's Republic of China (PRC), is a country in East Asia. It is the world's most populous country, with a population exceeding 1.4 billion, slightly ahead of India. China spans the equivalent of five time zones and ...
in order to allow citizens to access censored content online. The Hong Kong Blondes were, ostensibly, one of the first hacktivist groups, though the group's existence and actions have proven to be an invented fiction. The cDc first spoke about the group publicly in a presentation at the 1997 Beyond HOPE Conference held at The
Puck Building __FORCETOC__ The Puck Building is a historic building located in the Nolita neighborhood of Manhattan, New York City. It occupies the block bounded by Lafayette, Houston, Mulberry and Jersey Streets. An example of the German Rundbogenstil style o ...
in
New York City New York, often called New York City or NYC, is the List of United States cities by population, most populous city in the United States. With a 2020 population of 8,804,190 distributed over , New York City is also the L ...
. Members claimed to have advised the group on strong encryption techniques. The cDc formally severed ties with the Hong Kong Blondes in December 1998. In 2015, former cDc member
Oxblood Ruffin Oxblood Ruffin is a Canadian hacker. He is a member of the hacker group Cult of the Dead Cow (cDc), for which he serves as "Foreign Minister." He is also the founder and executive director of Hacktivismo, an offshoot of cDc. Ruffin is active in ...
claimed without evidence that the hacking activities attributed to the Hong Kong Blondes were an invention intended to create a diversion and cover for the extraction of several Chinese pro-democracy activists. Asked about the group during a White House meeting in February 2000 organized by then
National Security Advisor A national security advisor serves as the chief advisor to a national government on matters of security. The advisor is not usually a member of the government's cabinet but is usually a member of various military or security councils. National sec ...
Richard A. Clarke with President
Bill Clinton William Jefferson Clinton ( né Blythe III; born August 19, 1946) is an American politician who served as the 42nd president of the United States from 1993 to 2001. He previously served as governor of Arkansas from 1979 to 1981 and agai ...
, Mudge admitted "We made them up."


Cyberwar

On January 7, 1999, the cDc joined with an international coalition of hackers to denounce a call to cyberwar against the governments of
China China, officially the People's Republic of China (PRC), is a country in East Asia. It is the world's most populous country, with a population exceeding 1.4 billion, slightly ahead of India. China spans the equivalent of five time zones and ...
and
Iraq Iraq,; ku, عێراق, translit=Êraq officially the Republic of Iraq, '; ku, کۆماری عێراق, translit=Komarî Êraq is a country in Western Asia. It is bordered by Turkey to Iraq–Turkey border, the north, Iran to Iran–Iraq ...
.


Milošević trial

When questioning
Patrick Ball Patrick Ball (born June 26, 1965) is a scientist who has spent more than twenty years conducting quantitative analysis for truth commissions, non-governmental organizations, international criminal tribunals, and United Nations missions in El Salva ...
during his
International War Crimes Tribunal The Russell Tribunal, also known as the International War Crimes Tribunal, Russell–Sartre Tribunal, or Stockholm Tribunal, was a private People's Tribunal organised in 1966 by Bertrand Russell, British philosopher and Nobel Prize winner, and ...
in 2002,
Slobodan Milošević Slobodan Milošević (, ; 20 August 1941 – 11 March 2006) was a Yugoslav and Serbian politician who was the president of Serbia within Yugoslavia from 1989 to 1997 (originally the Socialist Republic of Serbia, a constituent republic of ...
asked Ball about his relationship with the cDc. Ball had given a talk and been a member of a cDc-sponsored panel on hacktivism at
DEF CON DEF CON (also written as DEFCON, Defcon or DC) is a hacker convention held annually in Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include computer security professionals, journalists, lawyer ...
9 in 2001.


Goolag campaign

In early 2006, the cDc launched the "Goolag" (a play on
gulag The Gulag, an acronym for , , "chief administration of the camps". The original name given to the system of camps controlled by the GPU was the Main Administration of Corrective Labor Camps (, )., name=, group= was the government agency in ...
, Soviet forced labour camps) campaign in response to
Google Google LLC () is an American multinational technology company focusing on search engine technology, online advertising, cloud computing, computer software, quantum computing, e-commerce, artificial intelligence, and consumer electronics. ...
's decision to comply with China's Internet censorship policy and censor search results in the mainland-Chinese version of its search engine. The campaign consists primarily of the use of a parody of Google's logo which reads "Goolag: Exporting censorship, one search at a time." The group encouraged readers to make t-shirts and other merchandise and donate any proceeds from their sale to
Human Rights in China Human rights in mainland China are periodically reviewed by the United Nations Human Rights Committee (UNHRC), on which the Chinese Communist Party (CCP), government of the People's Republic of China (PRC) and various foreign governments and h ...
.
Students for a Free Tibet Students For a Free Tibet (SFT) is a global grassroots network of students and activists working in solidarity with the Tibetan people for human rights and freedom. The group uses education, advocacy, and nonviolent direct action with the goal of ...
held an anti-Google rally in
Dharamsala Dharamshala (; also spelled Dharamsala) is the winter capital of Himachal Pradesh, India. It serves as administrative headquarters of the Kangra district after being relocated from Kangra, a city located away from Dharamshala, in 1855. The ...
,
India India, officially the Republic of India (Hindi: ), is a country in South Asia. It is the seventh-largest country by area, the second-most populous country, and the most populous democracy in the world. Bounded by the Indian Ocean on the so ...
on February 14, 2006, employing the logo in a variety of ways. The cDc then issued a press release about the campaign, wherein it described
Microsoft Microsoft Corporation is an American multinational technology corporation producing computer software, consumer electronics, personal computers, and related services headquartered at the Microsoft Redmond campus located in Redmond, Washing ...
,
Yahoo! Yahoo! (, styled yahoo''!'' in its logo) is an American web services provider. It is headquartered in Sunnyvale, California and operated by the namesake company Yahoo Inc., which is 90% owned by investment funds managed by Apollo Global Man ...
, Google, and
Cisco Cisco Systems, Inc., commonly known as Cisco, is an American-based multinational digital communications technology conglomerate corporation headquartered in San Jose, California. Cisco develops, manufactures, and sells networking hardware, ...
as the "Gang of Four" due to their respective policies of compliance with the Beijing government's Internet policies. The
United States Congress The United States Congress is the legislature of the federal government of the United States. It is bicameral, composed of a lower body, the House of Representatives, and an upper body, the Senate. It meets in the U.S. Capitol in Washing ...
was also called out on this issue in the release. This press release, originally entitled "Congress jerks off, gang of four reach for raincoats," was picked up by many news sources, as an abbreviated version of it was distributed by
PR Web Cision Ltd. is a public relations and earned media software company and services provider. The company is incorporated in the Cayman Islands and headquartered in Chicago, Illinois; with clients worldwide. The company went public via reverse merge ...
(with the altered title of "Cult of the Dead Cow (cDc) Launches Campaign Against Internet Censorship in China").


Tools

The cDc has released several tools, for both hackers/
system administrator A system administrator, or sysadmin, or admin is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems, especially multi-user computers, such as servers. The system administrator seeks to ensu ...
s and for the general public. Many of these are related to
computer security Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, the ...
and are sometimes dubbed "hacker tools".


The Automated Prayer Project

The Automated Prayer Project, written by Javaman, is "a
VT420 The VT420 is an ANSI standard computer terminal introduced in 1990 by Digital Equipment Corporation (DEC). The 420 is the only model in the 400 series, replacing the VT320. There are no color or graphics-capable 400 series terminals; the VT340 rem ...
connected to a
Sun The Sun is the star at the center of the Solar System. It is a nearly perfect ball of hot plasma, heated to incandescence by nuclear fusion reactions in its core. The Sun radiates this energy mainly as light, ultraviolet, and infrared radi ...
Ultra5 via a
serial cable A serial cable is a cable used to transfer information between two devices using a serial communication protocol. The form of connectors depends on the particular serial port used. A cable wired for connecting two DTEs directly is known as a null ...
which displays the output of a continuously running program. The signaling rate is limited to 9600
baud In telecommunication and electronics, baud (; symbol: Bd) is a common unit of measurement of symbol rate, which is one of the components that determine the speed of communication over a data channel. It is the unit for symbol rate or modulatio ...
. The program itself cycles through the
Rosary The Rosary (; la, , in the sense of "crown of roses" or "garland of roses"), also known as the Dominican Rosary, or simply the Rosary, refers to a set of prayers used primarily in the Catholic Church, and to the physical string of knots or b ...
, displaying a new individual prayer once every thirty seconds. Each individual prayer is then sent out via UDP to a random machine on the Internet on a random port."


Back Orifice

Back Orifice (often shortened to BO) is a
computer program A computer program is a sequence or set of instructions in a programming language for a computer to execute. Computer programs are one component of software, which also includes documentation and other intangible components. A computer program ...
designed for remote system administration. It enables a user to control a computer running
Microsoft Windows Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for serv ...
operating system from a remote location. The name is a
pun A pun, also known as paronomasia, is a form of word play that exploits multiple meanings of a term, or of similar-sounding words, for an intended humorous or rhetorical effect. These ambiguities can arise from the intentional use of homophoni ...
on
Microsoft BackOffice Server Microsoft BackOffice Server is a discontinued computer software package featuring Windows NT Server and other Microsoft server products that ran on NT Server. It was marketed during the 1990s and early 2000s for use in branch operations and for ...
software. The program debuted at
DEF CON DEF CON (also written as DEFCON, Defcon or DC) is a hacker convention held annually in Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include computer security professionals, journalists, lawyer ...
6 on August 1, 1998. It was the brainchild of
Sir Dystic ''Sir'' is a formal honorific address in English for men, derived from Sire in the High Middle Ages. Both are derived from the old French "Sieur" (Lord), brought to England by the French-speaking Normans, and which now exist in French only as ...
. According to the group, its purpose was to demonstrate the lack of security in Microsoft's operating system Windows 98.


Back Orifice 2000

Back Orifice 2000 (often shortened to BO2k) is a computer program that is similar in function to Back Orifice. Back Orifice 2000 debuted on July 10, 1999 at DEF CON 7. The original code was written by
Dildog Christien Rioux, also known by his handle DilDog, is the co-founder and chief scientist for the Burlington, Massachusetts based company Veracode, for which he is the main patent holder. Educated at MIT, Rioux was a computer security researcher a ...
. Whereas the original Back Orifice was limited to the
Windows 95 Windows 95 is a consumer-oriented operating system developed by Microsoft as part of its Windows 9x family of operating systems. The first operating system in the 9x family, it is the successor to Windows 3.1x, and was released to manufacturin ...
and
Windows 98 Windows 98 is a consumer-oriented operating system developed by Microsoft as part of its Windows 9x family of Microsoft Windows operating systems. The second operating system in the 9x line, it is the successor to Windows 95, and was released to ...
operating systems, BO2k also supports
Windows NT Windows NT is a proprietary graphical operating system An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. Time-sharing operating systems sc ...
,
Windows XP Windows XP is a major release of Microsoft's Windows NT operating system. It was released to manufacturing on August 24, 2001, and later to retail on October 25, 2001. It is a direct upgrade to its predecessors, Windows 2000 for high-end and ...
and
Windows 2000 Windows 2000 is a major release of the Windows NT operating system developed by Microsoft and oriented towards businesses. It was the direct successor to Windows NT 4.0, and was Software release life cycle#Release to manufacturing (RTM), releas ...
. Some BO2k client functionality has also been implemented for *nix-systems. In addition, BO2k was released under the
GPL The GNU General Public License (GNU GPL or simply GPL) is a series of widely used free software licenses that guarantee end users the four freedoms to run, study, share, and modify the software. The license was the first copyleft for general us ...
. As of 2012, BO2k is being actively developed.


Camera/Shy

Camera/Shy was the first Hacktivismo project released. It debuted in 2002 at the
H.O.P.E. The Hackers on Planet Earth (HOPE) conference series is a hacker convention sponsored by the security hacker magazine '' 2600: The Hacker Quarterly'' that until 2020 was typically held at Hotel Pennsylvania, in Manhattan, New York City. Occ ...
2k2 convention in
New York City New York, often called New York City or NYC, is the List of United States cities by population, most populous city in the United States. With a 2020 population of 8,804,190 distributed over , New York City is also the L ...
. It is a
steganographic Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection. In computing/electronic contexts, a computer file, ...
tool that scans for and delivers decrypted content directly from the world wide web.Einhorn, Bruce.
Hackers to Beijing: Have a Cow!
" ''
Business Week ''Bloomberg Businessweek'', previously known as ''BusinessWeek'', is an American weekly business magazine published fifty times a year. Since 2009, the magazine is owned by New York City-based Bloomberg L.P. The magazine debuted in New York City ...
'' online edition, August 5, 2002. Retrieved July 19, 2006.


NBName

NBName is a computer program that can be used to carry out
denial-of-service attack In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connect ...
s that can disable
NetBIOS NetBIOS () is an acronym for Network Basic Input/Output System. It provides services related to the session layer of the OSI model allowing applications on separate computers to communicate over a local area network. As strictly an API, NetB ...
services on Windows machines. It was written by
Sir Dystic ''Sir'' is a formal honorific address in English for men, derived from Sire in the High Middle Ages. Both are derived from the old French "Sieur" (Lord), brought to England by the French-speaking Normans, and which now exist in French only as ...
and released July 29, 2000 at the DEF CON 8 convention in Las Vegas.


ScatterChat

ScatterChat is an encrypted
instant messaging Instant messaging (IM) technology is a type of online chat allowing real-time text transmission over the Internet or another computer network. Messages are typically transmitted between two or more parties, when each user inputs text and trigge ...
client based on
Gaim Pidgin (formerly named Gaim) is a free and open-source multi-platform instant messaging client, based on a library named libpurple that has support for many instant messaging protocols, allowing the user to simultaneously log in to various s ...
. It was written by J. Salvatore Testa II and released at the H.O.P.E. Number Six conference in New York City on July 22, 2006. It provides
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
as well as integrated
onion routing Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to layers of an onion. The encrypted data is transmitted through a series of net ...
with
Tor Tor, TOR or ToR may refer to: Places * Tor, Pallars, a village in Spain * Tor, former name of Sloviansk, Ukraine, a city * Mount Tor, Tasmania, Australia, an extinct volcano * Tor Bay, Devon, England * Tor River, Western New Guinea, Indonesia Sc ...
, and secure file transfers. Various flaws in the software have been elaborated by researchers.


The Six/Four System

The Six/Four System is a
censorship Censorship is the suppression of speech, public communication, or other information. This may be done on the basis that such material is considered objectionable, harmful, sensitive, or "inconvenient". Censorship can be conducted by governments ...
-resistant
network Network, networking and networked may refer to: Science and technology * Network theory, the study of graphs as a representation of relations between discrete objects * Network science, an academic field that studies complex networks Mathematics ...
proxy Proxy may refer to: * Proxy or agent (law), a substitute authorized to act for another entity or a document which authorizes the agent so to act * Proxy (climate), a measured variable used to infer the value of a variable of interest in climate re ...
written by
Mixter Mixter is a computer security specialist. Mixter first made the transition out of the computer underground into large-scale public awareness, in 2000, at which time newspapers and magazines worldwide mentioned a link to massively destructive and e ...
, a member of both cDc and Hacktivismo. It works by using "trusted peers" to relay network connections over SSL encrypted links. Hacktivismo and the cDc further gained notoriety in 2003 when the Six/Four System became the first product of a hacker group to receive approval from the
United States Department of Commerce The United States Department of Commerce is an executive department of the U.S. federal government concerned with creating the conditions for economic growth and opportunity. Among its tasks are gathering economic and demographic data for bu ...
for export of strong encryption.


SMBRelay and SMBRelay2

SMBRelay and SMBRelay2 are computer programs that can be used to carry out SMB
man-in-the-middle attack In cryptography and computer security, a man-in-the-middle, monster-in-the-middle, machine-in-the-middle, monkey-in-the-middle, meddler-in-the-middle, manipulator-in-the-middle (MITM), person-in-the-middle (PITM) or adversary-in-the-middle (AiTM) ...
s on Windows machines. They were written by
Sir Dystic ''Sir'' is a formal honorific address in English for men, derived from Sire in the High Middle Ages. Both are derived from the old French "Sieur" (Lord), brought to England by the French-speaking Normans, and which now exist in French only as ...
and released March 21, 2001 at the @lantacon convention in
Atlanta, Georgia Atlanta ( ) is the capital and most populous city of the U.S. state of Georgia. It is the seat of Fulton County, the most populous county in Georgia, but its territory falls in both Fulton and DeKalb counties. With a population of 498,715 ...
.


Torpark

XeroBank Browser (formerly known as Torpark) is a variant of the
Portable Firefox Mozilla Firefox, Portable Edition (formerly known as Portable Firefox and commonly known as Firefox Portable) is a repackaged version of Mozilla Firefox created by John T. Haller. The application allows Firefox to be run from a USB flash drive ...
web browser A web browser is application software for accessing websites. When a user requests a web page from a particular website, the browser retrieves its files from a web server and then displays the page on the user's screen. Browsers are used on ...
with
Tor Tor, TOR or ToR may refer to: Places * Tor, Pallars, a village in Spain * Tor, former name of Sloviansk, Ukraine, a city * Mount Tor, Tasmania, Australia, an extinct volcano * Tor Bay, Devon, England * Tor River, Western New Guinea, Indonesia Sc ...
built into it. Torpark is intended for use on portable media such as a
USB flash drive A USB flash drive (also called a thumb drive) is a data storage device that includes flash memory with an integrated USB interface. It is typically removable, rewritable and much smaller than an optical disc. Most weigh less than . Since firs ...
but it can also be used on any
hard disk drive A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with magnet ...
. cDc/Hacktivismo co-released v.1.5.0.7 along with Steve Topletz on September 19, 2006.


Whisker

Whisker is a project authored by Rain Forest Puppy that is no longer in development. It checked for thousands of known security vulnerabilities in web servers. Whisker Version 1.4 was co-released by the cDc at DEF CON 8 in 2000.


See also

* ''
2600: The Hacker Quarterly ''2600: The Hacker Quarterly'' is an American seasonal publication of technical information and articles, many of which are written and submitted by the readership, on a variety of subjects including hacking, telephone switching systems, Intern ...
'' *
Chaos Computer Club The Chaos Computer Club (CCC) is Europe's largest association of hackers with 7,700 registered members. Founded in 1981, the association is incorporated as an ''eingetragener Verein'' in Germany, with local chapters (called ''Erfa-Kreise'') in ...
*
DEADBEEF DeaDBeeF is an audio player software available for Linux, Android and other Unix-like operating systems. DeaDBeeF is free and open-source software, except on Android. History The player was first published in August 2009. Its author cited ...
*
H.O.P.E. The Hackers on Planet Earth (HOPE) conference series is a hacker convention sponsored by the security hacker magazine '' 2600: The Hacker Quarterly'' that until 2020 was typically held at Hotel Pennsylvania, in Manhattan, New York City. Occ ...
*
Legion of Doom The Legion of Doom is a group of supervillains who originated in ''Challenge of the Super Friends'', an animated series from Hanna-Barbera based on DC Comics' Justice League. The Legion of Doom has since been incorporated into the main DC Univers ...
*
Masters of Deception Masters of Deception (MOD) was a New York City, New York–based group of hackers, most widely known in media for their exploits of telephone company infrastructure and later prosecution. Origin of Masters of Deception MOD's initial members ...
*
Operation Cybersnare Operation Cybersnare was a United States Secret Service operation in 1995 targeted at hacker (computer security), computer hackers. In January 1995, the Secret Service set up an undercover bulletin board system in Bergen County, New Jersey. This ...
*
Phrack ''Phrack'' is an e-zine written by and for hackers, first published November 17, 1985. Described by Fyodor as "the best, and by far the longest running hacker zine," the magazine is open for contributions by anyone who desires to publish remarkabl ...


Notes


References


External links

* {{Cult of the Dead Cow Wikipedia articles with ASCII art Organizations established in 1984 Hacker groups