News. cDc releases Goolag Scanner (posted by MiB on Februari 20th, 2008) SECURITY ADVISORY: The following program may screw a large Internet search engine and make the Web a safer place.
LUBBOCK, TX, February 20th -- Today CULT OF THE DEAD COW (cDc), the world's most attractive hacker group, announced the release of Goolag Scanner, a web auditing tool. Goolag Scanner enables everyone to audit his or her own web site via Google. The scanner technology is based on "Google hacking," a form of vulnerability research developed by Johnny I Hack Stuff. He's a lovely fellow. "It's no big secret that the Web is the platform," said cDc spokesmodel Oxblood Ruffin. Goolag Scanner will be released open source under the GNU Affero General Public license. Goolag Scanner is a standalone windows GUI based application. Press Contact Oxblood Ruffin oxblood at hacktivismo.com. Cult of the Dead Cow. To further the Cult's stated goal of "Global Domination Through Media Saturation," over the years cDc members have granted interviews to major newspapers, print magazines, online news sites, and international television news programs.
 Timeline The group was formed in June 1984 at the Farm Pac slaughterhouse by Grandmaster Ratte' (aka Swamp Ratte'), Franken Gibe, and Sid Vicious, three BBS SysOps. The slaughterhouse, a hangout of many Lubbock youth, was burned in 1996. (The burned out building was used as a haunted house for several Halloweens after that. In December 1990, cDc member Drunkfux - the pseudonym of Jesse Dryden, the son of Jefferson Airplane drummer Spencer Dryden and great-nephew of Charlie Chaplin - gave birth to the modern hacker con. 'Hacktivists' of All Persuasions Take Their Struggle to the Web. Intervasion of the UK. The Intervasion of the UK was a 1994 electronic civil disobedience and collective action against John Major's Criminal Justice Bill which sought to outlaw outdoor dance festivals and "music with a repetitive beat".
Launched by a group called The Zippies from San Francisco's 181 Club on Guy Fawkes Day, November 5, 1994, it resulted in government websites going down for at least a week. It utilised a form of Distributed Denial of Service (DDoS) known as the Email bomb in order to overload servers as a form of online protest and Internet activism. It was the first such use of the Internet and technology as a weapon of struggle and/or civil disobedience, and preceded the 1995 Italian NetStrike. Legitimate civil disobedience: Wikileaks and the layers of backlash. (Update/edit note, 12/15: If you, like me, tend not to read comments in general because they’re troll-fests, I suggest suspending your disbelief and reading the comments on this post.
There’s an incredibly useful, thoughtful and productive discussion going on. With that, let me also say that I’m a tyrannical comment moderator and delete unproductive/trolling comments.) (Note: There are so many parts to the Wikileaks story that it’s almost impossible to cover them all–once you start to detangle one angle, you discover twenty more. Slip down that rabbit hole, and you’ll come out dizzier than when you went in. In any case, this isn’t meant to be a comprehensive discussion of the entire topic, but to expand on a conversation sparked yesterday.) I attended Personal Democracy Forum’s symposium on Wikileaks yesterday–a fantastic lineup of speakers and attendees, gathered quickly to discuss one of the most complicated intersections of Internet and politics that we’ve seen in a while. Wikileaks Infowar not the first online protest action. The past week’s DDOS protest campaign against websites and businesses which pulled the plug on Wikileaks brings back memories of the 1994 Intervasion of the UK .
The electronic disruption and email jamming collective action called in response to John Major’s Criminal Justice Bill briefly shut down access to the Internet for some of the UK’s top ranking politicians. Julian Assange: The Curious Origins of Political Hacktivism. Real hacktivism is at least as old as October 1989 when the US Deptartment of Energy and NASA machines world wide were penetrated by the anti-nuclear WANK worm. The worm was the second ever to be unleashed, but its provenance was a curious contrast to its forebear. For you see, worm #1 had been traced to the son of National Security Agency chief cryptographer Robert Morris. That WANK had a bold political intent was immediate. WANK penetrated machines had their login screens altered to: \ Your System Has Been Officically WANKed / You talk of times of peace for all, and then prepare for war.
In our book Underground , Suelette Dreyfus and I trace the source of the worm to Melbourne, Australia. Additionally in 1984, New Zealand, a country with which Australians feel a special affinity, had under Labour pri-minister David Lange, made NZ a nuclear free territory, precluding the admission of nuclear armed or powered warships into NZ ports. But New Zealand’s nuclear woes were not to end there.