Cult of the Dead Cow

Last updated
Cult of the Dead Cow
Formation1984
Purpose Hacking/DIY media
Location
  • United States
Origin
Lubbock, Texas
Founders
Grandmaster Ratte'
Franken Gibe
Sid Vicious
Products
The original e-zine
Back Orifice
BO2k
NBName
SMBRelay
Torpark
Key people
Mudge
DilDog
Sir Dystic
The Deth Vegetable
FreqOut
Oxblood Ruffin
Omega
White Knight
Reid Fleming
Krass Katt
Lord Digital
Obscure Images
Tweety Fish
Lady Carolin
ChukE
JavaMan
Sunspot
Count Zero
G.A. Ellsworth
Greenpeace
Myles Long
Mixter
Assrabbit
[1]
Psychedelic Warlord (Beto O'Rourke) [2]
Medus4
Jun34u
Lodri [3]
Affiliations Hacktivismo
Ninja Strike Force
L0pht
Mindvox
Legion of Doom
Masters of Deception
YIPL/TAP
Sacrament of Transition
Hong Kong Blondes
RDT
ACiD Productions
Soulz at Zero
Neon Knights
r00t
Website cultdeadcow.com OOjs UI icon edit-ltr-progressive.svg

Cult of the Dead Cow, also known as cDc or cDc Communications, is a computer hacker and DIY media organization founded in 1984 in Lubbock, Texas. The group maintains a weblog on its site, also titled "[Cult of the Dead Cow]". New media are released first through the blog, which also features thoughts and opinions of the group's members.

Contents

Timeline

 _   _ ((___)) [ x x ]  \   /  (' ')   (U) 
cDc's ASCII art
cowskull logo

The group was formed in June 1984 at the Farm Pac slaughterhouse by Grandmaster Ratte' (aka Swamp Ratte'), Franken Gibe, Sid Vicious, and three BBS SysOps. [lower-alpha 1]

In the 1980s the Cult of the Dead Cow organized and maintained a loose collective of affiliated BBSs across the US and Canada. It was during this time that the cDc is credited with coining the term "31337" as an alternative spelling of "Eleet" or "Elite", [4] an expression denoting skill or greatness in a person, place, or thing.

In December 1990, cDc member Jesse Dryden (aka Drunkfux), the son of Jefferson Airplane drummer Spencer Dryden and grand nephew of Charlie Chaplin, created HoHoCon. It was the first modern hacker conference, which invites the participation of both journalists and law enforcement. It is usually held in Houston, Texas. In all, dFx hosted five annual HoHoCons.[ citation needed ]

In 1991, cDc was named "Sassiest Underground Computer Group" by Sassy magazine. [5] Also in 1991, the group began distributing music in the form of cassette tape albums sold through its post office box. Many of these albums are now available online in their entirety.

October 1994 saw the creation of the cDc's Usenet newsgroup, alt.fan.cult-dead-cow. [6] It was thus the first hacking group to have its own Usenet newsgroup.[ citation needed ] In November of that year, the group claimed responsibility for giving Ronald Reagan Alzheimer's disease, claiming to have done so in 1986 with a blowgun. [7]

The cDc declared war on the Church of Scientology in 1995 during the alt.religion.scientology controversy, [8] [9] stating

We believe that El Ron Hubbard [sic] is actually none other than Heinrich Himmler of the SS, who fled to Argentina and is now responsible for the stealing of babies from hospitals and raising them as 'super-soldiers' for the purpose of overthrowing the U.S. Fed. Govt. in a bloody revolution. We fear plans for a 'Fourth Reich' to be established on our home soil under the vise-like grip of oppression known as Scientology!

In 1997, the cDc began distributing original MP3-format music on its website. [10]

In August 1998, they presented their popular Back Orifice tool at DEF CON 6.

In February 2000, the cDc was the subject of an 11-minute documentary short titled "Disinformation". Also in February 2000, cDc member Mudge briefed President Bill Clinton on Internet security. [11]

cDc communications

cDc communications is the parent organisation of Cult of the Dead Cow, one of three groups that fall under cDc communications. The other two are the Ninja Strike Force and Hacktivismo.

Ninja Strike Force

In 1996, the cDc announced the birth of its Ninja Strike Force, a group of "ninja" dedicated to achieving the goals of the cDc, an intervention task force both online and offline. [12] The cDc opened the NSF Dojo [13] in 2004. An "NSF Dojo" Member also operates a streaming radio station, which features recordings of hacker con presentations and other educational programming in addition to a wide range of musical styles and artists.

Membership in the NSF is granted by the cDc to those individuals who stand out in their support of the cDc and its ideals. Members are recognized for their abilities, capabilities, and being the best of the best in their skills.

In 2006 the Ninja Strike Force launched its own microsite. [14]

Hacktivismo

In late 1999, the cDc created Hacktivismo, an independent group under the cDc communications umbrella dedicated to the creation of anti-censorship technology in furtherance of human rights on the Internet. The group's beliefs are described fully in The Hacktivismo Declaration, which seeks to apply the Universal Declaration of Human Rights and the International Covenant on Civil and Political Rights to the Internet. [15] Among Hacktivismo's beliefs include access to information as a basic human right. The organization partially shares Critical Art Ensemble's (CAE) belief in the value of secrecy, but challenges both with CAE and many hacktivists on the subject of civil disobedience. The cDc model is, instead, one of disruptive compliance. [16] Disruptive, in this case, refers to disruptive technology; compliance refers back to the Internet and its original intent of constructive free-flow and openness. [17] Hacktivismo has also authored its own software license agreement, the Hacktivismo Enhanced-Source Software License Agreement, which is source available (but not open source). [18] Their work focuses on the development of software that empowers conduct forbidden by repression, rather than enabling (private or public) attacks on repressors. [16] In general cDc hopes that open code can become the lingua franca of a hacktivism that seeks to wage peace, not war. While the term isn't used, the software described in cDc's "Waging of Peace on the Internet" [19] would create a set of connections between dissidents that sound in technoliberationist terms, rhizomatic. [16]

Crossover associations with other groups

cDc members at Defcon in 1999 CDc group members at Defcon in 1999.png
cDc members at Defcon in 1999

In addition to the obvious associations between Cult of the Dead Cow, Hacktivismo, and the Ninja Strike Force, the cDc also has crossover associations with several other organizations. These include the L0pht; founding members White Knight and Count Zero and final members Dildog and Mudge are all members of cDc. Additionally, The Nightstalker was a member of Youth International Party Line/Technology Assistance Program. Lord Digital, one of the founders of Mindvox, is a former member of LOD/H and a current member of the Sacrament of Transition. Red Knight was a member of the Masters of Deception. Also, RaD Man, a member of the Ninja Strike Force, is one of the founders of ACiD Productions. Another NSF member, Mark Hinge, is a founding member of the British hacker group The Syndicate Of London. Flack, another Ninja Strike Force member, was a co-founder of the horror "lit group" Soulz at Zero. Mudge later went on to program manage the CINDER program at DARPA, which aimed to detect 'insider threats' like the WikiLeaks sources. [20]

Electronic publication

During the 1980s, the cDc was well known throughout the BBS scene for their underground ezine, also called Cult of the Dead Cow. [21]

The Cult of the Dead Cow has been credited with coining the term "elite" as used in the hacker scene/computer underground in cDc textfiles of the 1980s. [22] [23] [24]

The ezine has led to some criticism of the group over the years; in a 1994 episode of Geraldo entitled "Computer Vice," Geraldo Rivera referred to the group as "a bunch of sickos" for having published an article called "Sex with Satan," originally published in 1988. [25] [26]

Hacktivism

In 1996, cDc member Omega used the term "hacktivism" in an email to other group members. [27] The group has been active in hacktivist causes since that time.

Hong Kong Blondes

In the late 1990s, the cDc claimed to have worked with a group of Chinese dissidents called "The Hong Kong Blondes." The group’s ostensible goal was to disrupt computer networks within the People's Republic of China in order to allow citizens to access censored content online. The Hong Kong Blondes were, ostensibly, one of the first hacktivist groups, though the group's existence and actions have proven to be an invented fiction. The cDc first spoke about the group publicly in a presentation at the 1997 Beyond HOPE Conference held at The Puck Building in New York City. [28] Members claimed to have advised the group on strong encryption techniques. [29] [30] [31] [32] The cDc formally severed ties with the Hong Kong Blondes in December 1998. [33] In 2015, former cDc member Oxblood Ruffin claimed without evidence that the hacking activities attributed to the Hong Kong Blondes were an invention intended to create a diversion and cover for the extraction of several Chinese pro-democracy activists. [34] When asked about the group during a White House meeting in February 2000 organized by then National Security Advisor Richard A. Clarke with President Bill Clinton, Mudge admitted "We made them up." [35]

Cyberwar

On January 7, 1999, the cDc joined with an international coalition of hackers to denounce a call to cyberwar against the governments of China and Iraq. [36]

Milošević trial

When questioning Patrick Ball during his International War Crimes Tribunal in 2002, Slobodan Milošević asked Ball about his relationship with the cDc. [37] Ball had given a talk and been a member of a cDc-sponsored panel on hacktivism [38] at DEF CON 9 in 2001.

Goolag campaign

In early 2006, the cDc launched the "Goolag" (a play on gulag, Soviet forced labour camps) campaign in response to Google's decision to comply with China's Internet censorship policy and censor search results in the mainland-Chinese version of its search engine. The campaign consists primarily of the use of a parody of Google's logo which reads "Goolag: Exporting censorship, one search at a time." [39] [40] [41] The group encouraged readers to make t-shirts and other merchandise and donate any proceeds from their sale to Human Rights in China.

Students for a Free Tibet held an anti-Google rally in Dharamsala, India on February 14, 2006, employing the logo in a variety of ways. [42] The cDc then issued a press release about the campaign, wherein it described Microsoft, Yahoo!, Google, and Cisco as the "Gang of Four" due to their respective policies of compliance with the Beijing government's Internet policies. The United States Congress was also called out on this issue in the release. [43] This press release, originally entitled "Congress jerks off, gang of four reach for raincoats," was picked up by many news sources, as an abbreviated version of it was distributed by PR Web (with the altered title of "Cult of the Dead Cow (cDc) Launches Campaign Against Internet Censorship in China"). [44]

Tools

The cDc has released several tools, for both hackers/system administrators and for the general public. Many of these are related to computer security and are sometimes dubbed "hacker tools".

The Automated Prayer Project

The Automated Prayer Project, [45] written by Javaman, is "a VT420 connected to a Sun Ultra5 via a serial cable which displays the output of a continuously running program. The signaling rate is limited to 9600 baud. The program itself cycles through the Rosary, displaying a new individual prayer once every thirty seconds. Each individual prayer is then sent out via UDP to a random machine on the Internet on a random port."

Back Orifice

Back Orifice (often shortened to BO) is a computer program designed for remote system administration. It enables a user to control a computer running Microsoft Windows operating system from a remote location. The name is a pun on Microsoft BackOffice Server software. The program debuted at DEF CON 6 on August 1, 1998. It was the brainchild of Sir Dystic. According to the group, its purpose was to demonstrate the lack of security in Microsoft's operating system Windows 98. [46]

Back Orifice 2000

Back Orifice Release By The cDc at Defcon7 Back Orifice Release Defcon00.png
Back Orifice Release By The cDc at Defcon7

Back Orifice 2000 (often shortened to BO2k) is a computer program that is similar in function to Back Orifice. Back Orifice 2000 debuted on July 10, 1999 at DEF CON 7. The original code was written by Dildog. Whereas the original Back Orifice was limited to the Windows 95 and Windows 98 operating systems, BO2k also supports Windows NT, Windows XP and Windows 2000. Some BO2k client functionality has also been implemented for *nix-systems. In addition, BO2k was released under the GPL. [47] As of 2012, BO2k is being actively developed. [48]

Camera/Shy

Camera/Shy, originally called Peek-a-Booty, [49] was the first Hacktivismo project released. It debuted in 2002 at the H.O.P.E. 2k2 convention in New York City. It is a steganographic tool that scans for and delivers decrypted content directly from the world wide web. [50]

NBName

NBName is a computer program that can be used to carry out denial-of-service attacks that can disable NetBIOS services on Windows machines. It was written by Sir Dystic and released July 29, 2000 at the DEF CON 8 convention in Las Vegas.

ScatterChat

ScatterChat is an encrypted instant messaging client based on Gaim. It was written by J. Salvatore Testa II and released at the H.O.P.E. Number Six conference in New York City on July 22, 2006. It provides encryption as well as integrated onion routing with Tor, and secure file transfers. [51] [52] Various flaws in the software have been elaborated by researchers. [53] [54]

The Six/Four System

The Six/Four System is a censorship-resistant network proxy written by Mixter, a member of both cDc and Hacktivismo. It works by using "trusted peers" to relay network connections over SSL encrypted links. [55] Hacktivismo and the cDc further gained notoriety in 2003 when the Six/Four System became the first product of a hacker group to receive approval from the United States Department of Commerce for export of strong encryption. [56]

SMBRelay and SMBRelay2

SMBRelay and SMBRelay2 are computer programs that can be used to carry out SMB man-in-the-middle attacks on Windows machines. They were written by Sir Dystic and released March 21, 2001 at the @lantacon convention in Atlanta, Georgia.

Torpark

XeroBank Browser (formerly known as Torpark) is a variant of the Portable Firefox web browser with Tor built into it. Torpark is intended for use on portable media such as a USB flash drive but it can also be used on any hard disk drive. cDc/Hacktivismo co-released v.1.5.0.7 along with Steve Topletz on September 19, 2006. [57] [58] [59]

Veilid

Veilid is a peer-to-peer network and application framework, described as "like Tor, but for apps". [60] [61] It was released on August 11, 2023 at DEF CON 31 in Las Vegas. [62] [63]

Whisker

RFP talking to some journalists at Defcon 7 in 1999. Rfp at defcon 7 or 8.png
RFP talking to some journalists at Defcon 7 in 1999.

Whisker is a project authored by Rain Forest Puppy that is no longer in development. It checked for thousands of known security vulnerabilities in web servers. [64] Whisker Version 1.4 was co-released by the cDc at DEF CON 8 in 2000.

See also

Notes

  1. The slaughterhouse, a hangout of many Lubbock youth, was burned down in 1996. The burned out building was used as a haunted house for several Halloweens after that. In 2001, the grounds surrounding it were converted into the "West Texas Canyon Amphitheater" and re-opened as the Lone Star Amphitheater in 2006)

Related Research Articles

Back Orifice is a computer program designed for remote system administration. It enables a user to control a computer running the Microsoft Windows operating system from a remote location. The name is a play on words on Microsoft BackOffice Server software. It can also control multiple computers at the same time using imaging.

<span class="mw-page-title-main">Back Orifice 2000</span> Computer program for remote administration

Back Orifice 2000 is a computer program designed for remote system administration. It enables a user to control a computer running the Microsoft Windows operating system from a remote location. The name is a pun on Microsoft BackOffice Server software.

DEF CON is a hacker convention held annually in Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include computer security professionals, journalists, lawyers, federal government employees, security researchers, students, and hackers with a general interest in software, computer architecture, hardware modification, conference badges, and anything else that can be "hacked". The event consists of several tracks of speakers about computer- and hacking-related subjects, as well as cyber-security challenges and competitions. Contests held during the event are extremely varied and can range from creating the longest Wi-Fi connection to finding the most effective way to cool a beer in the Nevada heat.

<span class="mw-page-title-main">Hacktivism</span> Computer-based activities as a means of protest

Internet activism, hacktivism, or hactivism, is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. With roots in hacker culture and hacker ethics, its ends are often related to free speech, human rights, or freedom of information movements.

Hacktivismo is an offshoot of Cult of the Dead Cow (cDc), whose beliefs include access to information as a basic human right. It was founded in 1999.

Josh Buchbinder, better known as Sir Dystic, has been a member of Cult of the Dead Cow (cDc) since May 1997, and is the author of Back Orifice. He has also written several other hacker tools, including SMBRelay, NetE, and NBName. Sir Dystic has appeared at multiple hacker conventions, both as a member of panels and speaking on his own. He has also been interviewed on several television and radio programs and in an award-winning short film about hacker culture in general and cDc in particular.

Christien Rioux, also known by his handle DilDog, is the co-founder and chief scientist for the Burlington, Massachusetts based company Veracode, for which he is the main patent holder.

<span class="mw-page-title-main">Peiter Zatko</span> American computer security expert

Peiter C. Zatko, better known as Mudge, is an American network security expert, open source programmer, writer, and hacker. He is currently the chief information officer of DARPA. He was the most prominent member of the high-profile hacker think tank the L0pht as well as the computer and culture hacking cooperative the Cult of the Dead Cow.

<span class="mw-page-title-main">Oxblood Ruffin</span> Canadian hacker

Oxblood Ruffin is a Canadian hacker. He is a member of the hacker group Cult of the Dead Cow (cDc), for which he serves as "Foreign Minister." He is also the founder and executive director of Hacktivismo, an offshoot of cDc. Ruffin is active in human rights causes and is a vocal proponent of hacktivism, a term which he has helped to define. He has participated in both technology and human rights conferences, both on his own and along with cDc. He also has written articles for The Register and .net. Ruffin is also an infrequent contributor to both the cDc blog and the Hacktivismo News blog.

The Hacktivismo Enhanced-Source Software License Agreement (HESSLA) is a software license proposed by Hacktivismo that attempts to put ethical restrictions on use and modification of software released under it.

<span class="mw-page-title-main">StankDawg</span> American computer programmer (born 1971)

David Blake, also known as StankDawg, is the founder of the hacking group Digital DawgPound (DDP) and a long-time member of the hacking community. He is known for being a regular presenter at multiple hacking conferences, but is best known as the creator of the "Binary Revolution" initiative, including being the founding host and producer of Binary Revolution Radio, a long-running weekly Internet radio show which ran 200 episodes from 2003 to 2007.

NBName is a computer program that can be used to carry out denial-of-service attacks that can disable NetBIOS services on Windows machines. It was written by Sir Dystic of CULT OF THE DEAD COW (cDc) and released July 29, 2000 at the DEF CON 8 convention in Las Vegas.

Summercon is one of the oldest hacker conventions, and America's oldest and longest-running information security conference. It helped set a precedent for more modern "cons" such as H.O.P.E. and DEF CON, although it has remained smaller and more personal. Summercon has been hosted in cities such as Pittsburgh, St. Louis, Atlanta, Washington, D.C., New York City, Austin, Las Vegas, and Amsterdam. Originally run by Phrack, the underground ezine, and held annually in St. Louis, the organizational responsibilities of running Summercon were transferred to clovis in 1998 and the convention took place in Atlanta, dubbed 'Summercon X'.

<span class="mw-page-title-main">Jeremy Hammond</span> American political activist and hacker

Jeremy Alexander Hammond, also known by his online moniker sup_g, is an American anarchist activist and former computer hacker from Chicago. He founded the computer security training website HackThisSite in 2003. He was first imprisoned over the Protest Warrior hack in 2005 and was later convicted of computer fraud in 2013 for hacking the private intelligence firm Stratfor and releasing data to WikiLeaks, and sentenced to 10 years in prison.

<span class="mw-page-title-main">Jeff Moss (hacker)</span> American computer security expert (born 1975)

Jeff Moss, also known as Dark Tangent, is an American hacker, computer and internet security expert who founded the Black Hat and DEF CON computer security conferences.

The Collusion Syndicate, formerly the Collusion Group and sometimes spelled Collu5ion, C0llu5i0n or C011u5i0n, was a Computer Security and Internet Politics Special Interest Group (SIG) founded in 1995 and effectively disbanded around 2002.

Ruffin is a name.

Veilid is a peer-to-peer network and application framework released by the Cult of the Dead Cow on August 11, 2023, at DEF CON 31. Described by its authors as "like Tor, but for apps", it is written in Rust, and runs on Linux, macOS, Windows, Android, iOS, and in-browser WASM. VeilidChat is a secure messaging application built on Veilid.

References

  1. "Cult of the Dead Cow Membership List". www.cultdeadcow.com. Archived from the original on May 6, 2015. Retrieved May 13, 2015.
  2. "Beto O'Rourke's secret membership in America's oldest hacking group". www.reuters.com. March 15, 2019. Archived from the original on May 24, 2023. Retrieved March 15, 2019.
  3. "Cult of the Dead Cow Membership List". www.cultdeadcow.com. Retrieved October 9, 2024.
  4. Mello, John P.(2015) "Google Expands Bug Bounty Program Archived 2023-03-28 at the Wayback Machine " February 2, 2015. E-Commerce Times
  5. Chiesa, Raoul et al(2008). Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking, p. 223. CRC Press.
  6. "Google Groups". groups.google.com. Archived from the original on 2018-02-15. Retrieved 2019-03-18.
  7. Fleming, Reid (November 1, 1994). "Official cDc Press Release Concerning President Reagan". Cult of the Dead Cow. Archived from the original on March 16, 2006. Retrieved April 20, 2006.
  8. Swamp Ratte' (June 4, 1995). "Statement Concerning the 'Church' of Scientology". Cult of the Dead Cow. Archived from the original on March 16, 2006. Retrieved June 14, 2006.
  9. Leyden, John. "Critics split over DDoS attacks on Scientology Archived 2020-01-12 at the Wayback Machine ." The Register , January 25, 2008. Retrieved January 29, 2008.
  10. "'Kingpin' by Weasel-MX". cDc communications. June 27, 1997. Archived from the original on March 16, 2006. Retrieved April 20, 2006.
  11. Young, Steve, Major Garrett, and the Associated Press. "Clinton fights hackers with a Hacker Archived 2006-05-25 at the Wayback Machine ." CNN Online 15 February 2000 retrieved 20 April 2006
  12. "Press Release". cDc communications. October 22, 1996. Archived from the original on March 16, 2006. Retrieved April 20, 2006.
  13. "Invision Power Services CIC Default Page". Archived from the original on 20 February 2008. Retrieved 4 May 2016.
  14. "Cult of the Dead Cow: Ninja Strike Force". Archived from the original on 6 April 2016. Retrieved 4 May 2016.
  15. Ruffin, Oxblood (July 4, 2001). "The Hacktivismo Declaration - International bookburning in progress". Cult of the Dead Cow. Archived from the original on April 22, 2006. Retrieved July 20, 2006.
  16. 1 2 3 Wardrip-Fruin, Noah and Nick Montfort, ed (2003). The New Media Reader. pp.782. The MIT Press. ISBN   0-262-23227-8.
  17. Ruffin, Oxblood. "Waging Peace on the Internet Archived 2011-05-13 at the Wayback Machine ."
  18. Ruffin, Oxblood and Eric Grimm. "Hacktivismo Enhanced-Source Software License Agreement Archived 2012-02-04 at the Wayback Machine ." November 26, 2002. Retrieved July 19, 2006.
  19. "Archived copy". Archived from the original on 2011-05-13. Retrieved 2010-04-29.{{cite web}}: CS1 maint: archived copy as title (link)
  20. Darpa’s Star Hacker Looks to WikiLeak-Proof Pentagon Archived 2013-12-01 at the Wayback Machine , Spencer Ackerman, Wired, August 31, 2010, retr 2011 12 5
  21. "Cult of the Dead Cow". Archived from the original on September 23, 2015. Retrieved 4 May 2016.
  22. McFadden (July 19, 2021). "'Leetspeak' 101: What Exactly Is It?". Interesting Engineering. Archived from the original on July 19, 2021. Retrieved July 20, 2021.
  23. Grammarist (3 October 2016). "Leet, leetspeak and 1337". Grammaristg. Archived from the original on 27 May 2024. Retrieved July 20, 2021.
  24. Mello, John P. (February 2, 2015). "Google Expands Bug Bounty Program". E-Commerce Times. Archived from the original on March 28, 2023. Retrieved February 3, 2015.
  25. Psycoe (February 7, 1988). "Sex with Satan". Cult of the Dead Cow. Archived from the original on June 23, 2007. Retrieved June 29, 2007.
  26. "Computer Vice." Geraldo episode, April 17, 1994. Referenced here (archived version) and here (archived version), both retrieved July 24, 2006.
  27. Mills, Elinor. ""Old-time hacktivists: Anonymous, you've crossed the line" Archived 2012-07-27 at the Wayback Machine ." CNet News , March 30, 2012. Retrieved March 30, 2012.
  28. cDC, Members (August 1997). Beyond HOPE: Cult of the Dead Cow and World Domination (Speech). Beyond HOPE. New York City. Archived from the original on 2021-12-13. Retrieved 20 August 2019.
  29. Hesseldahl, Arik. "Hacking for Human Rights? Archived 2016-11-19 at the Wayback Machine ." Wired News July 14, 1998. Retrieved July 19, 2006.
  30. McKay, Niall. "China: The Great Firewall Archived 2006-09-10 at the Wayback Machine ." Wired News December 1, 1998. Retrieved July 19, 2006.
  31. Ruffin, Oxblood (July 15, 1998). "The Longer March". Cult of the Dead Cow. Archived from the original on March 16, 2006. Retrieved July 19, 2006.
  32. Ruffin, Oxblood (December 23, 1998). "Chinese Checkers". Archived from the original on March 16, 2006. Retrieved July 19, 2006.
  33. "It's splitsville for the cult of the dead cow and the Hong Kong blondes". Cult of the Dead Cow. December 15, 1998. Archived from the original on March 16, 2006. Retrieved July 19, 2006.
  34. Ruffin, Oxblood (March 23, 2015). "Blondie Wong And The Hong Kong Blondes hacking, human rights, and hype". Medium. Archived from the original on August 30, 2015. Retrieved February 1, 2016.
  35. Menn, Joseph (2019). Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World . PublicAffairs. p.  115.
  36. 2600: The Hacker Quarterly; Chaos Computer Club; Cult of the Dead Cow; !Hispahack; L0pht Heavy Industries; Phrack; Pulhas (January 7, 1999). "Hackers on planet earth against infowar". Archived from the original on March 16, 2006. Retrieved April 20, 2006.{{cite web}}: CS1 maint: numeric names: authors list (link)
  37. Macki. "milosevic and the cDc Archived 2023-04-07 at the Wayback Machine ." Politech listserv, March 17, 2002. Retrieved April 20, 2006.
  38. "Hacktivism and Human Rights: Using Technology to Raise the Bar". Archived from the original on 2005-12-17. Retrieved 2006-01-08.
  39. Krass Katt. "cDc launches global campaign against Google Archived 2006-07-16 at the Wayback Machine ." Cult of the Dead Cow blog post, February 12, 2006. Retrieved July 19, 2006.
  40. Jardin, Xeni. "Hacktivists parody Google logo for protest, China human rights fundraiser Archived 2006-08-06 at the Wayback Machine ." Boing Boing blog post, February 12, 2006. Retrieved July 19, 2006.
  41. Dach, Clayton. "The Good, the Bad and the Google Archived 2006-09-26 at the Wayback Machine ." AdBusters #65, May–June 2006. Online edition retrieved October 19, 2006.
  42. Krass Katt. "Goolag/Google protest in Dharamsala Archived 2006-08-10 at the Wayback Machine ." Cult of the Dead Cow blog post, February 14, 2006. Retrieved July 19, 2006.
  43. Ruffin, Oxblood. "Congress jerks off, gang of four reach for raincoats Archived 2006-08-10 at the Wayback Machine ." Cult of the Dead Cow Press Release, February 15, 2006. Retrieved July 19, 2006.
  44. Ruffin, Oxblood. "Cult of the Dead Cow (cDc) Launches Campaign Against Internet Censorship in China." Cult of the Dead Cow Press Release, February 16, 2006. Retrieved July 19, 2006.
  45. "Philtered". Archived from the original on 27 February 2009. Retrieved 4 May 2016.
  46. cDc communications. "Back Orifice Press Release Archived 2012-02-27 at the Wayback Machine ." Cult of the Dead Cow Press Release, July 21, 1998. Retrieved April 20, 2006.
  47. cDc communications. "Back Orifice 2000 Press Release Archived 2005-03-05 at the Wayback Machine ." Cult of the Dead Cow Press Release, July 10, 1999. Retrieved April 20, 2006.
  48. "BO2K". Archived from the original on 2007-08-27. Retrieved 2007-08-17.
  49. "Camera/Shy Outflanks Net Content Censorship". 15 July 2002. Archived from the original on 2024-05-27. Retrieved 2023-01-14.
  50. Einhorn, Bruce. "Hackers to Beijing: Have a Cow! Archived 2002-08-11 at the Wayback Machine ." Business Week online edition, August 5, 2002. Retrieved July 19, 2006.
  51. Tectonic staff, "Secure messenger to guard against totalitarian governments Archived 2006-08-10 at the Wayback Machine ." Tectonic, July 21, 2006. Retrieved July 24, 2006.
  52. Doctorow, Cory, "ScatterChat: anonymous, secure chat Archived 2006-08-11 at the Wayback Machine ." Boing Boing blog post, July 22, 2006. Retrieved July 24, 2006.
  53. Murdoch, Steven J., "Protocol design is hard - Flaws in ScatterChat Archived 2015-06-11 at the Wayback Machine ." Light Blue Touchpaper blog post, August 11, 2006. Retrieved February 6, 2007.
  54. Schneier, Bruce, "ScatterChat Archived 2007-02-12 at the Wayback Machine ." Schneier on Security blog post, July 31, 2006. Retrieved February 6, 2007.
  55. Mixter. "Six/Four System Protocol Specs," 2003. mixter@hacktivismo.com.
  56. LaCroix, Norman E. "Hacktivismo_DoC_BIS.pdf Archived 2006-09-06 at the Wayback Machine ." United States Department of Commerce, January 2003. Retrieved April 20, 2006.
  57. "Hacktivismo Releases Torpark for Anonymous, Portable Web Browsing Archived 2006-10-13 at the Wayback Machine ." Cult of the Dead Cow/Hacktivismo press release, September 19, 2006. Retrieved September 19, 2006.
  58. "Free anonymising browser debuts Archived 2006-09-21 at the Wayback Machine ." BBC News Online , September 20, 2006. Retrieved September 22, 2006.
  59. Broersma, Matthew. "Activists unveil stealth browser Archived 2007-03-12 at the Wayback Machine ." ZDNet , September 22, 2006. Retrieved September 22, 2006.
  60. "Cult of the Dead Cow Launches Encryption Protocol to Save Your Privacy". Gizmodo. 2 August 2023. Archived from the original on 27 May 2024. Retrieved 6 August 2023.
  61. Menn, Joseph (3 August 2023). "Hacking group plans system to encrypt social media and other apps". Washington Post. Archived from the original on 6 August 2023. Retrieved 6 August 2023.
  62. "Press Release 2023-06-22". cultdeadcow.com. Cult of the Dead Cow. Archived from the original on 2023-08-06. Retrieved 2023-08-06.
  63. Christien 'DilDog' Rioux; Katelyn 'Medus4' Bowden. "Launch Talk". Veilid. Archived from the original on 11 August 2023. Retrieved 12 August 2023.{{cite web}}: CS1 maint: numeric names: authors list (link)
  64. "Sleeping with the enemy". 13 August 2002. Archived from the original on 4 June 2016. Retrieved 4 May 2016.