{"id":88710,"date":"2019-03-16T07:02:24","date_gmt":"2019-03-16T14:02:24","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2019\/03\/beto-orourke-could-be-the-first-hacker-president"},"modified":"2019-03-16T07:02:24","modified_gmt":"2019-03-16T14:02:24","slug":"beto-orourke-could-be-the-first-hacker-president","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2019\/03\/beto-orourke-could-be-the-first-hacker-president","title":{"rendered":"Beto O\u2019Rourke could be the first hacker president"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/beto-orourke-could-be-the-first-hacker-president.jpg\"><\/a><\/p>\n<p>Democratic presidential candidate Beto O\u2019Rourke has revealed he was a member of a notorious decades-old hacking group.<\/p>\n<p>The former congressman was a member of the Texas-based hacker group, the <a href=\"https:\/\/knowyourmeme.com\/memes\/people\/cult-of-the-dead-cow\">Cult of the Dead Cow<\/a>, known for inspiring early hacktivism in the internet age and building exploits and hacks for Microsoft Windows. The group used the internet as a platform in the 1990s to protest real-world events, often to promote human rights and denouncing censorship. Among its many releases, the Cult of the Dead Cow was best known for its Back Orifice program, a remote access and administration tool.<\/p>\n<p>O\u2019Rourke went by the handle \u201cPsychedelic Warlord,\u201d as revealed by Reuters, which <a href=\"https:\/\/www.reuters.com\/investigates\/special-report\/usa-politics-beto-orourke\/\">broke the story<\/a>.<\/p>\n<p><!-- Link: <a href=\"https:\/\/techcrunch.com\/2019\/03\/15\/beto-the-hacker\/\">https:\/\/techcrunch.com\/2019\/03\/15\/beto-the-hacker\/<\/a> --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Democratic presidential candidate Beto O\u2019Rourke has revealed he was a member of a notorious decades-old hacking group. The former congressman was a member of the Texas-based hacker group, the Cult of the Dead Cow, known for inspiring early hacktivism in the internet age and building exploits and hacks for Microsoft Windows. The group used the [\u2026]<\/p>\n","protected":false},"author":466,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,5,418],"tags":[],"class_list":["post-88710","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-geopolitics","category-internet"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/88710","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/466"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=88710"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/88710\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=88710"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=88710"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=88710"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}