SlideShare a Scribd company logo
1 of 4
Download to read offline
While other books have tackled the military-internet complex, tech-enabled intelligence
gathering, and cyberwarfare, together with WikiLeaks, Edward Snowden, and the 2016 US
election, there is a crucial element to the stories missing in all of
them. In his revelatory new book, CULT OF THE DEAD COW: How
the Original Hacking Supergroup Might Just Save the World,
acclaimed journalist Joseph Menn profiles the people dedicated
to information security who are out of the spotlight and in the
shadows, fighting to protect our personal data and freedom as
well as our national security.
CULT OF THE DEAD COW is the story of the oldest surviving,
most respected, and most famous hacking group of all time. Its
members released tools that forced giant companies to work
harder to protect consumers, and then they launched the broad
movement known as hacktivism.
Though it has never had more than twenty active members at a time, the Cult of the Dead Cow
(cDc) has multiple claims on history. As it evolved from a pre-web community, cDc members
developed hacking software that is still being used by criminals, spies, and professional network
administrators. They released the top tool for testing password security and created what was
for years the best technique for controlling computers from afar. They contributed to the
development of Tor, the most important privacy tool on the net, and helped build cyberweapons
that advanced US security without injuring anyone. The Cult of the Dead Cow defined hacktivism
and tirelessly promoted the idea to the public and fellow hackers, leading the movement and
urging programmers to wield their keyboards in service of human rights. As cDc matured, its
members became leaders in changing hacking from a hobby to a profession to a mode of
warfare.
Though most Cult of the Dead Cow members have remained anonymous through the years,
sixteen have agreed to be named for the first time in these pages, including all the previously
cloaked core participants, many of whom are available for interviews to discuss CULT OF THE
DEAD COW. With its origins in the earliest days of the Internet, the cDc is full of powerful
characters—spies, activists, musicians, and politicians—some of whom are now woven into the
top ranks of the American establishment.
A few members have become not only public but famous over the years. cDc figures and those
they trained have advised US presidents, cabinet members, and the chief executives of Google,
Apple, and Facebook. As revealed here, the most famous is former Texas Congressman and
current presidential candidate Beto O’Rourke, whose time in the cDc led him to found a tech
business, launch an alternative publication in El Paso, and embark on unconventional
campaigns.
As issues of tech security become
matters of public safety, national
security, and ultimately the future
of democracy, the Cult of the Dead
Cow’s influence figures in critical
decisions and national dialogue,
even if many are unaware of it.
Serious hacking requires critical
thinking, and the cDc members
continued to engage in it as the
battlefield expanded from exposing
flawed software programs to taking
on the broader industry and social
issues. At a time when a shortage
of critical thinking has wreaked dire
consequences, the cDc story is an
antidote. Today, this small group and their followers represent the best hope for making
technology a force for good instead of for surveillance and oppression.
CULT OF THE DEAD COW shows a way forward, both for those involved in privacy, security, and
internet regulation as well as those within the broader technological world as ethical debates
make daily international headlines. CULT OF THE DEAD COW shows how governments,
corporations, and criminals came to hold immense power over individuals and how to fight back
against them.
The small membership of the Cult of the Dead Cow included, in its
earliest years, Beto O’Rourke. He hacked phone service as a teen in
order to connect to bulletin boards, the precursor of the Web and
what O’Rourke calls “the Facebook of its day.” CULT OF THE DEAD
COW explains how O’Rourke built on that sense of community,
appreciation for innovation, and guerrilla style of communication to
launch a technology company and an alternative publication that
served as a springboard for his entry into politics.
15 of the other core members of the Cult of the Dead Cow are named in print for the first time in
this book. They joined a remarkably diverse group for the early hacking scene, including a young
woman brought in by O’Rourke, a future Long Island prosecutor, contractors for U.S. intelligence
agencies, and the founder of one of the most innovative companies improving software security,
Veracode.
One of the previously known core members is Peiter “Mudge” Zatko. He went on to advise
President Bill Clinton and Democratic Sen. Mark Warner and
lead grantmaking on offensive and defensive cyber capabilities
at DARPA, the Pentagon skunkworks that created the internet.
Other Cult of the Dead Cow members launched the modern
hacking conference, influenced the development of Tor, and for
a time worked with WikiLeaks founder Julian Assange.
The FBI investigated the group for years after it released tools that let average computer users
hijack machines running Windows, but it ultimately closed the case without charges.
The father of the hacktivism movement, Cult member Oxblood Ruffin, was surprisingly close to
Western intelligence agencies that shared his distaste for the Chinese government. As other
groups and individuals have claimed the mantle of hacktivism since, multiple countries have
carried out political hacks disguised as moral actions, likely including some celebrated breaches
of spyware vendors serving Western governments.
In their pursuit of media attention for fun and for causes, the Cult of the Dead Cow had an
uneven relationship with the truth. One of their most famous stories, that of a collaboration with
Chinese dissidents called the Hong Kong Blondes, was at least in large part fiction, internal
emails show. The adventures of this group were reported as fact in publications including Wired
and the Los Angeles Times, but the tale set off a chain of events that brought Oxblood and other
technologists close to the orbit of the Dalai Lama, where they would play critical roles in
defending Tibetans from Chinese spying and exposing that country’s massive overseas
espionage.
Oxblood Ruffin directly inspired the Citizen Lab at the University of Toronto, the paragon for
academics working with technologists and other experts to expose governments spying on their
own people.
After formative years in the cDc-inspired culture of media hacks, members of a cDc offshoot
spread racially divisive memes during the 2016 election and promoted exiled neo-Nazi hacker
Andrew Auernheimer, who has kept the Daily Stormer and other hate-filled publications alive.
The fate of Texan Jesse Dryden, the founder of the pioneering hacking conference series
HoHoCon and the son of the drummer for Sixties fusion band Jefferson Airplane, is
undetermined. Dryden was a master social engineer who hasn’t been seen by his oldest friends
for years, and they are unsure if he disappeared by choice or if he is no longer living.
Mudge’s innovative security boutique @Stake trained many of today’s top defenders, including
Alex Stamos, the Facebook chief security officer who exposed Russian interference on the
world’s most important social network.
An investigative reporter for Reuters, Joseph Menn is one of
the longest serving and most respected mainstream
journalists on cyber security. He has won three Best in
Business awards from the Society of American Business
Editors & Writers and been a finalist for three Gerald Loeb
Awards.
His previous book Fatal System Error: The Hunt for the New
Crime Lords who are Bringing Down the Internet exposed
the Russian government's collaboration with organized criminal hackers and was named one of
the 10 best nonfiction books of 2010 by Hudson Booksellers. It was placed on the official
reading list of the US Strategic Command and was compared by the New Yorker to the novels of
Stieg Larsson. He also wrote the definitive All the Rave: The Rise and Fall of Shawn Fanning's
Napster, an Investigative Reports & Editors Inc. finalist for book of the year.
He previously worked for The Financial Times, Los Angeles Times and Bloomberg and has been
interviewed on NPR, PBS, BBC, Fox Business, MSNBC, and many more. In addition, Menn has
spoken at conferences including Def Con, Black Hat and RSA. He grew up near Boston and lives
in San Francisco.
“The author narrates a fast-paced story about how a little-known movement that could trace its
roots to the psychedelic rock of the 1960s—one visionary was the son of the Jefferson Airplane's
drummer, while another was a lyricist for the Grateful Dead—would eventually serve as security
advisory for the Pentagon, the cybernetics industry, and geopolitical forces around the globe… A
quick tale of black hats and white hats, with a lot of gray area in between.” – Kirkus Reviews
“Menn’s work serves as a spirited examination of the art of hacking and how it might be used for
good.” – Publishers Weekly
"Long before there was a multi-billion dollar cyber industry, there were some ethical hackers who
showed us that the Silicon Valley emperors had no clothes. They looked like misfits, but they
showed us how insecure the Internet was and how to make it better. Joe Menn makes this
previously untold story entertaining and relevant to today's cyber threats." – Richard A. Clarke,
first White House "Cyber Czar"
"Cult of the Dead Cow is an exhilarating and essential look into a part of the hacker underground
that has shaped the modern world in profound ways. Readers will be amazed by this crew of
eccentric, impassioned geniuses who have so often served as the Internet's conscience while
lurking unknown in the shadows. The depth of Joe Menn's reporting is as astonishing as his
storytelling - no one could have captured this tale better." – Ashlee Vance, author of Elon Musk:
Tesla, SpaceX, and the Quest for a Fantastic Future
"Cult of the Dead Cow reveals a story few know about the origins of white hat hacking and the
heroes it celebrates. Despite the title, hacking isn't dead yet!" – Vint Cerf, co-inventor of the
Internet
"This dramatic story of how the Internet's first hackers learned to handle their outsized abilities
can help us grapple to control the power of today's technology titans." – Bruce Schneier, Harvard
fellow and lecturer and author of Click Here to Kill Somebody

More Related Content

What's hot

2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)Felipe Prado
 
Targeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the SkyTargeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the SkyTeresa Long
 
Astroturfing ppt 42512
Astroturfing ppt  42512Astroturfing ppt  42512
Astroturfing ppt 42512dmdyslin
 
Astroturfing ppt 42512
Astroturfing ppt  42512Astroturfing ppt  42512
Astroturfing ppt 42512dmdyslin
 
The hacker crackdown 3 law and order
The hacker crackdown 3 law and orderThe hacker crackdown 3 law and order
The hacker crackdown 3 law and orderrmvvr143
 
Understanding social media & free speech
Understanding social media & free speechUnderstanding social media & free speech
Understanding social media & free speechAngela Bakken Henderson
 
The Anatomy of Economic Terrorism
The Anatomy of Economic TerrorismThe Anatomy of Economic Terrorism
The Anatomy of Economic TerrorismDeborah Kayatani
 
Cracking the Code of Emerging Social Media Communications
Cracking the Code of Emerging Social Media CommunicationsCracking the Code of Emerging Social Media Communications
Cracking the Code of Emerging Social Media CommunicationsScott Rickard
 
Case studies emt santos
Case studies emt santosCase studies emt santos
Case studies emt santosEmt John
 
Psychology of the Insider Threat
Psychology of the Insider ThreatPsychology of the Insider Threat
Psychology of the Insider ThreatDavid Sweigert
 
Pornography on the internet presentation
Pornography on the internet presentationPornography on the internet presentation
Pornography on the internet presentationJoe Dimech
 
The undeclared war against wikileaks
The undeclared war against wikileaksThe undeclared war against wikileaks
The undeclared war against wikileaksgorin2008
 

What's hot (18)

2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)
 
Wikileaks
WikileaksWikileaks
Wikileaks
 
Targeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the SkyTargeted Surveillance: Big Brother Takes to the Sky
Targeted Surveillance: Big Brother Takes to the Sky
 
Watchdog Jeopardy
Watchdog JeopardyWatchdog Jeopardy
Watchdog Jeopardy
 
Astroturfing ppt 42512
Astroturfing ppt  42512Astroturfing ppt  42512
Astroturfing ppt 42512
 
Astroturfing ppt 42512
Astroturfing ppt  42512Astroturfing ppt  42512
Astroturfing ppt 42512
 
The hacker crackdown 3 law and order
The hacker crackdown 3 law and orderThe hacker crackdown 3 law and order
The hacker crackdown 3 law and order
 
Understanding social media & free speech
Understanding social media & free speechUnderstanding social media & free speech
Understanding social media & free speech
 
The Anatomy of Economic Terrorism
The Anatomy of Economic TerrorismThe Anatomy of Economic Terrorism
The Anatomy of Economic Terrorism
 
I gangs hi tech gang communication-handout
I gangs hi tech gang communication-handoutI gangs hi tech gang communication-handout
I gangs hi tech gang communication-handout
 
Cracking the Code of Emerging Social Media Communications
Cracking the Code of Emerging Social Media CommunicationsCracking the Code of Emerging Social Media Communications
Cracking the Code of Emerging Social Media Communications
 
Online Piracy Paper
Online Piracy PaperOnline Piracy Paper
Online Piracy Paper
 
Case studies emt santos
Case studies emt santosCase studies emt santos
Case studies emt santos
 
Psychology of the Insider Threat
Psychology of the Insider ThreatPsychology of the Insider Threat
Psychology of the Insider Threat
 
Pornography on the internet presentation
Pornography on the internet presentationPornography on the internet presentation
Pornography on the internet presentation
 
The undeclared war against wikileaks
The undeclared war against wikileaksThe undeclared war against wikileaks
The undeclared war against wikileaks
 
Master of deception (mod)
Master of deception (mod)Master of deception (mod)
Master of deception (mod)
 
Assignment 3
Assignment 3Assignment 3
Assignment 3
 

Similar to DEF CON 27 - JOSEPH MENN - change the world c dc style

Essay On Theodore Kaczynski
Essay On Theodore KaczynskiEssay On Theodore Kaczynski
Essay On Theodore KaczynskiLisa Kennedy
 
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docxgilbertkpeters11344
 
Cloning Essays
Cloning EssaysCloning Essays
Cloning Essaysbdg81dzt
 
The Square and the Tower, by Niall Ferguson
The Square and the Tower, by Niall FergusonThe Square and the Tower, by Niall Ferguson
The Square and the Tower, by Niall FergusonNiall Ferguson
 
Bjmc i, met, unit-i, defination of media
Bjmc i, met, unit-i, defination of mediaBjmc i, met, unit-i, defination of media
Bjmc i, met, unit-i, defination of mediaRai University
 
P A R T VCyber Terrorism The New”Face of Terrorism.docx
P A R T  VCyber Terrorism The New”Face of Terrorism.docxP A R T  VCyber Terrorism The New”Face of Terrorism.docx
P A R T VCyber Terrorism The New”Face of Terrorism.docxgerardkortney
 
Ccot Essay Latin America. Online assignment writing service.
Ccot Essay Latin America. Online assignment writing service.Ccot Essay Latin America. Online assignment writing service.
Ccot Essay Latin America. Online assignment writing service.Sandy Rodriguez
 
5 of the world’s most famous hackers
5 of the world’s most famous hackers5 of the world’s most famous hackers
5 of the world’s most famous hackersMohsinHusenManasiya
 
31 Persuasive Essay Topics JournalBuddies.Com
31 Persuasive Essay Topics  JournalBuddies.Com31 Persuasive Essay Topics  JournalBuddies.Com
31 Persuasive Essay Topics JournalBuddies.ComCarolyn Ostwalt
 
HacktivismPaper.docx
HacktivismPaper.docxHacktivismPaper.docx
HacktivismPaper.docxDesarae Veit
 
Free Helpful Printables Persuasive Writing Graphic
Free Helpful Printables Persuasive Writing GraphicFree Helpful Printables Persuasive Writing Graphic
Free Helpful Printables Persuasive Writing GraphicAlicia Brooks
 
A Detailed Summary of ESG and How ESG Can Shape Politics | Paulo Dalla Nora M...
A Detailed Summary of ESG and How ESG Can Shape Politics | Paulo Dalla Nora M...A Detailed Summary of ESG and How ESG Can Shape Politics | Paulo Dalla Nora M...
A Detailed Summary of ESG and How ESG Can Shape Politics | Paulo Dalla Nora M...Paulo Dalla Nora Macedo
 

Similar to DEF CON 27 - JOSEPH MENN - change the world c dc style (16)

SMP textfile
SMP textfileSMP textfile
SMP textfile
 
Essay On Theodore Kaczynski
Essay On Theodore KaczynskiEssay On Theodore Kaczynski
Essay On Theodore Kaczynski
 
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx
45SpringSummer 2010 • volume xvi, issue ii45Copyr.docx
 
Cloning Essays
Cloning EssaysCloning Essays
Cloning Essays
 
The Square and the Tower, by Niall Ferguson
The Square and the Tower, by Niall FergusonThe Square and the Tower, by Niall Ferguson
The Square and the Tower, by Niall Ferguson
 
Bjmc i, met, unit-i, defination of media
Bjmc i, met, unit-i, defination of mediaBjmc i, met, unit-i, defination of media
Bjmc i, met, unit-i, defination of media
 
P A R T VCyber Terrorism The New”Face of Terrorism.docx
P A R T  VCyber Terrorism The New”Face of Terrorism.docxP A R T  VCyber Terrorism The New”Face of Terrorism.docx
P A R T VCyber Terrorism The New”Face of Terrorism.docx
 
Ccot Essay Latin America. Online assignment writing service.
Ccot Essay Latin America. Online assignment writing service.Ccot Essay Latin America. Online assignment writing service.
Ccot Essay Latin America. Online assignment writing service.
 
S10_E02_How to Pimp Social Media 101.pptx
S10_E02_How to Pimp Social Media 101.pptxS10_E02_How to Pimp Social Media 101.pptx
S10_E02_How to Pimp Social Media 101.pptx
 
5 of the world’s most famous hackers
5 of the world’s most famous hackers5 of the world’s most famous hackers
5 of the world’s most famous hackers
 
10 notorious female hackers.pptx
10 notorious female hackers.pptx10 notorious female hackers.pptx
10 notorious female hackers.pptx
 
31 Persuasive Essay Topics JournalBuddies.Com
31 Persuasive Essay Topics  JournalBuddies.Com31 Persuasive Essay Topics  JournalBuddies.Com
31 Persuasive Essay Topics JournalBuddies.Com
 
HacktivismPaper.docx
HacktivismPaper.docxHacktivismPaper.docx
HacktivismPaper.docx
 
Famous hackers group
Famous hackers groupFamous hackers group
Famous hackers group
 
Free Helpful Printables Persuasive Writing Graphic
Free Helpful Printables Persuasive Writing GraphicFree Helpful Printables Persuasive Writing Graphic
Free Helpful Printables Persuasive Writing Graphic
 
A Detailed Summary of ESG and How ESG Can Shape Politics | Paulo Dalla Nora M...
A Detailed Summary of ESG and How ESG Can Shape Politics | Paulo Dalla Nora M...A Detailed Summary of ESG and How ESG Can Shape Politics | Paulo Dalla Nora M...
A Detailed Summary of ESG and How ESG Can Shape Politics | Paulo Dalla Nora M...
 

More from Felipe Prado

DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryDEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryFelipe Prado
 
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...Felipe Prado
 
DEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got antsDEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got antsFelipe Prado
 
DEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryptionDEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryptionFelipe Prado
 
DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101Felipe Prado
 
DEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a governmentDEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a governmentFelipe Prado
 
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareDEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareFelipe Prado
 
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...Felipe Prado
 
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationDEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationFelipe Prado
 
DEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interfaceDEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interfaceFelipe Prado
 
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionistDEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionistFelipe Prado
 
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksDEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksFelipe Prado
 
DEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud securityDEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud securityFelipe Prado
 
DEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portalsDEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portalsFelipe Prado
 
DEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitchDEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitchFelipe Prado
 
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...Felipe Prado
 
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksDEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksFelipe Prado
 
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationDEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationFelipe Prado
 
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncDEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncFelipe Prado
 
DEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devicesDEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devicesFelipe Prado
 

More from Felipe Prado (20)

DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryDEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
 
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
 
DEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got antsDEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got ants
 
DEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryptionDEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryption
 
DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101
 
DEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a governmentDEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a government
 
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareDEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
 
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
 
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationDEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
 
DEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interfaceDEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interface
 
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionistDEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
 
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksDEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
 
DEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud securityDEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud security
 
DEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portalsDEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portals
 
DEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitchDEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitch
 
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
 
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksDEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
 
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationDEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
 
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncDEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
 
DEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devicesDEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devices
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

DEF CON 27 - JOSEPH MENN - change the world c dc style

  • 1. While other books have tackled the military-internet complex, tech-enabled intelligence gathering, and cyberwarfare, together with WikiLeaks, Edward Snowden, and the 2016 US election, there is a crucial element to the stories missing in all of them. In his revelatory new book, CULT OF THE DEAD COW: How the Original Hacking Supergroup Might Just Save the World, acclaimed journalist Joseph Menn profiles the people dedicated to information security who are out of the spotlight and in the shadows, fighting to protect our personal data and freedom as well as our national security. CULT OF THE DEAD COW is the story of the oldest surviving, most respected, and most famous hacking group of all time. Its members released tools that forced giant companies to work harder to protect consumers, and then they launched the broad movement known as hacktivism. Though it has never had more than twenty active members at a time, the Cult of the Dead Cow (cDc) has multiple claims on history. As it evolved from a pre-web community, cDc members developed hacking software that is still being used by criminals, spies, and professional network administrators. They released the top tool for testing password security and created what was for years the best technique for controlling computers from afar. They contributed to the development of Tor, the most important privacy tool on the net, and helped build cyberweapons that advanced US security without injuring anyone. The Cult of the Dead Cow defined hacktivism and tirelessly promoted the idea to the public and fellow hackers, leading the movement and urging programmers to wield their keyboards in service of human rights. As cDc matured, its members became leaders in changing hacking from a hobby to a profession to a mode of warfare. Though most Cult of the Dead Cow members have remained anonymous through the years, sixteen have agreed to be named for the first time in these pages, including all the previously
  • 2. cloaked core participants, many of whom are available for interviews to discuss CULT OF THE DEAD COW. With its origins in the earliest days of the Internet, the cDc is full of powerful characters—spies, activists, musicians, and politicians—some of whom are now woven into the top ranks of the American establishment. A few members have become not only public but famous over the years. cDc figures and those they trained have advised US presidents, cabinet members, and the chief executives of Google, Apple, and Facebook. As revealed here, the most famous is former Texas Congressman and current presidential candidate Beto O’Rourke, whose time in the cDc led him to found a tech business, launch an alternative publication in El Paso, and embark on unconventional campaigns. As issues of tech security become matters of public safety, national security, and ultimately the future of democracy, the Cult of the Dead Cow’s influence figures in critical decisions and national dialogue, even if many are unaware of it. Serious hacking requires critical thinking, and the cDc members continued to engage in it as the battlefield expanded from exposing flawed software programs to taking on the broader industry and social issues. At a time when a shortage of critical thinking has wreaked dire consequences, the cDc story is an antidote. Today, this small group and their followers represent the best hope for making technology a force for good instead of for surveillance and oppression. CULT OF THE DEAD COW shows a way forward, both for those involved in privacy, security, and internet regulation as well as those within the broader technological world as ethical debates make daily international headlines. CULT OF THE DEAD COW shows how governments, corporations, and criminals came to hold immense power over individuals and how to fight back against them. The small membership of the Cult of the Dead Cow included, in its earliest years, Beto O’Rourke. He hacked phone service as a teen in order to connect to bulletin boards, the precursor of the Web and what O’Rourke calls “the Facebook of its day.” CULT OF THE DEAD COW explains how O’Rourke built on that sense of community, appreciation for innovation, and guerrilla style of communication to launch a technology company and an alternative publication that served as a springboard for his entry into politics. 15 of the other core members of the Cult of the Dead Cow are named in print for the first time in this book. They joined a remarkably diverse group for the early hacking scene, including a young woman brought in by O’Rourke, a future Long Island prosecutor, contractors for U.S. intelligence agencies, and the founder of one of the most innovative companies improving software security, Veracode. One of the previously known core members is Peiter “Mudge” Zatko. He went on to advise President Bill Clinton and Democratic Sen. Mark Warner and lead grantmaking on offensive and defensive cyber capabilities at DARPA, the Pentagon skunkworks that created the internet. Other Cult of the Dead Cow members launched the modern hacking conference, influenced the development of Tor, and for a time worked with WikiLeaks founder Julian Assange.
  • 3. The FBI investigated the group for years after it released tools that let average computer users hijack machines running Windows, but it ultimately closed the case without charges. The father of the hacktivism movement, Cult member Oxblood Ruffin, was surprisingly close to Western intelligence agencies that shared his distaste for the Chinese government. As other groups and individuals have claimed the mantle of hacktivism since, multiple countries have carried out political hacks disguised as moral actions, likely including some celebrated breaches of spyware vendors serving Western governments. In their pursuit of media attention for fun and for causes, the Cult of the Dead Cow had an uneven relationship with the truth. One of their most famous stories, that of a collaboration with Chinese dissidents called the Hong Kong Blondes, was at least in large part fiction, internal emails show. The adventures of this group were reported as fact in publications including Wired and the Los Angeles Times, but the tale set off a chain of events that brought Oxblood and other technologists close to the orbit of the Dalai Lama, where they would play critical roles in defending Tibetans from Chinese spying and exposing that country’s massive overseas espionage. Oxblood Ruffin directly inspired the Citizen Lab at the University of Toronto, the paragon for academics working with technologists and other experts to expose governments spying on their own people. After formative years in the cDc-inspired culture of media hacks, members of a cDc offshoot spread racially divisive memes during the 2016 election and promoted exiled neo-Nazi hacker Andrew Auernheimer, who has kept the Daily Stormer and other hate-filled publications alive. The fate of Texan Jesse Dryden, the founder of the pioneering hacking conference series HoHoCon and the son of the drummer for Sixties fusion band Jefferson Airplane, is undetermined. Dryden was a master social engineer who hasn’t been seen by his oldest friends for years, and they are unsure if he disappeared by choice or if he is no longer living. Mudge’s innovative security boutique @Stake trained many of today’s top defenders, including Alex Stamos, the Facebook chief security officer who exposed Russian interference on the world’s most important social network. An investigative reporter for Reuters, Joseph Menn is one of the longest serving and most respected mainstream journalists on cyber security. He has won three Best in Business awards from the Society of American Business Editors & Writers and been a finalist for three Gerald Loeb Awards. His previous book Fatal System Error: The Hunt for the New Crime Lords who are Bringing Down the Internet exposed the Russian government's collaboration with organized criminal hackers and was named one of the 10 best nonfiction books of 2010 by Hudson Booksellers. It was placed on the official reading list of the US Strategic Command and was compared by the New Yorker to the novels of Stieg Larsson. He also wrote the definitive All the Rave: The Rise and Fall of Shawn Fanning's Napster, an Investigative Reports & Editors Inc. finalist for book of the year. He previously worked for The Financial Times, Los Angeles Times and Bloomberg and has been interviewed on NPR, PBS, BBC, Fox Business, MSNBC, and many more. In addition, Menn has spoken at conferences including Def Con, Black Hat and RSA. He grew up near Boston and lives in San Francisco.
  • 4. “The author narrates a fast-paced story about how a little-known movement that could trace its roots to the psychedelic rock of the 1960s—one visionary was the son of the Jefferson Airplane's drummer, while another was a lyricist for the Grateful Dead—would eventually serve as security advisory for the Pentagon, the cybernetics industry, and geopolitical forces around the globe… A quick tale of black hats and white hats, with a lot of gray area in between.” – Kirkus Reviews “Menn’s work serves as a spirited examination of the art of hacking and how it might be used for good.” – Publishers Weekly "Long before there was a multi-billion dollar cyber industry, there were some ethical hackers who showed us that the Silicon Valley emperors had no clothes. They looked like misfits, but they showed us how insecure the Internet was and how to make it better. Joe Menn makes this previously untold story entertaining and relevant to today's cyber threats." – Richard A. Clarke, first White House "Cyber Czar" "Cult of the Dead Cow is an exhilarating and essential look into a part of the hacker underground that has shaped the modern world in profound ways. Readers will be amazed by this crew of eccentric, impassioned geniuses who have so often served as the Internet's conscience while lurking unknown in the shadows. The depth of Joe Menn's reporting is as astonishing as his storytelling - no one could have captured this tale better." – Ashlee Vance, author of Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future "Cult of the Dead Cow reveals a story few know about the origins of white hat hacking and the heroes it celebrates. Despite the title, hacking isn't dead yet!" – Vint Cerf, co-inventor of the Internet "This dramatic story of how the Internet's first hackers learned to handle their outsized abilities can help us grapple to control the power of today's technology titans." – Bruce Schneier, Harvard fellow and lecturer and author of Click Here to Kill Somebody