News. cDc releases Goolag Scanner (posted by MiB on Februari 20th, 2008) SECURITY ADVISORY: The following program may screw a large Internet search engine and make the Web a safer place.
LUBBOCK, TX, February 20th -- Today CULT OF THE DEAD COW (cDc), the world's most attractive hacker group, announced the release of Goolag Scanner, a web auditing tool. Goolag Scanner enables everyone to audit his or her own web site via Google. The scanner technology is based on "Google hacking," a form of vulnerability research developed by Johnny I Hack Stuff. Cult of the Dead Cow. To further the Cult's stated goal of "Global Domination Through Media Saturation," over the years cDc members have granted interviews to major newspapers, print magazines, online news sites, and international television news programs.
 Timeline The group was formed in June 1984 at the Farm Pac slaughterhouse by Grandmaster Ratte' (aka Swamp Ratte'), Franken Gibe, and Sid Vicious, three BBS SysOps. The slaughterhouse, a hangout of many Lubbock youth, was burned in 1996. 'Hacktivists' of All Persuasions Take Their Struggle to the Web. Intervasion of the UK. The Intervasion of the UK was a 1994 electronic civil disobedience and collective action against John Major's Criminal Justice Bill which sought to outlaw outdoor dance festivals and "music with a repetitive beat".
Launched by a group called The Zippies from San Francisco's 181 Club on Guy Fawkes Day, November 5, 1994, it resulted in government websites going down for at least a week. It utilised a form of Distributed Denial of Service (DDoS) known as the Email bomb in order to overload servers as a form of online protest and Internet activism. It was the first such use of the Internet and technology as a weapon of struggle and/or civil disobedience, and preceded the 1995 Italian NetStrike.
This fact has yet to be acknowledged by the Electronic Disturbance Theater which claims to have pioneered the technique or the Free Range Electrohippies in the United Kingdom, who appear to have taken most of the credit for the event. Campaign against the CJB Legitimate civil disobedience: Wikileaks and the layers of backlash. (Update/edit note, 12/15: If you, like me, tend not to read comments in general because they’re troll-fests, I suggest suspending your disbelief and reading the comments on this post.
There’s an incredibly useful, thoughtful and productive discussion going on. With that, let me also say that I’m a tyrannical comment moderator and delete unproductive/trolling comments.) (Note: There are so many parts to the Wikileaks story that it’s almost impossible to cover them all–once you start to detangle one angle, you discover twenty more. Slip down that rabbit hole, and you’ll come out dizzier than when you went in. Wikileaks Infowar not the first online protest action. The past week’s DDOS protest campaign against websites and businesses which pulled the plug on Wikileaks brings back memories of the 1994 Intervasion of the UK .
The electronic disruption and email jamming collective action called in response to John Major’s Criminal Justice Bill briefly shut down access to the Internet for some of the UK’s top ranking politicians. It was the first use of the online tactic for the purposes of legitimate civil disobedience and ushered in a new age of “Infowar and Cyberbattle”. “This will do for the Internet, what Tiananmen Square did for the fax machine”, read one of the Intervasion flyers, distributed via email. “Tim Leary wants you for the Virtual Invasion of Great Britain” read another, as the protest action joined a book launch of Leary’s Chaos & Cyberculture, where the Zippies intervened by “kidnapping Tim and forcing him to DDOS the web page of John Major” according to his publisher Ronin Press. Julian Assange: The Curious Origins of Political Hacktivism. Real hacktivism is at least as old as October 1989 when the US Deptartment of Energy and NASA machines world wide were penetrated by the anti-nuclear WANK worm.
The worm was the second ever to be unleashed, but its provenance was a curious contrast to its forebear. For you see, worm #1 had been traced to the son of National Security Agency chief cryptographer Robert Morris. That WANK had a bold political intent was immediate. WANK penetrated machines had their login screens altered to: