I want to play for you, a narration of a piece of classic hacker literature.
Everyone should be familiar with this.
“Some of you may even have parts of this memorized.”
Here, take a listen from the author himself. Another one got caught today. That's all over the papers. Teenager arrested in computer crime scandal, hacker arrested after bank tampering, damn kids they're all alike.
I'm a hacker, enter my world. I made it discovery today, I found a computer, and then it happened, a door open to a world, rushing through the phone line like heroin through an addict's veins. This is it. This is where I belong.
But this is our world now, the world of the electron in the switch, the beauty of the body. We make use of a service already existing without paying for what could be dirt cheat if it wasn't run by profiteering bloodins and you call us criminals. We explore and you call us criminals.
“We seek after knowledge, and you call us criminals.”
You build atomic bombs, you wage wars, you murder cheat and lie to us, and try to make us believe that it's for our own good. Yet we're the criminals. Yes, I'm a criminal. My crime is that of curiosity.
My crime is that of judging people by what they say and they think, not what they look like.
My crime is that of outsmarting you, something that you'll never forgive me for.
I'm a hacker, and this is my manifesto, you may stop this individual, but you can't stop this all. After all, we're all alike. That was written in 1986. My name is Lloyd, by the way.
Also known as the mentor. That was indeed Lloyd Blinken-Chip, the author of the legendary hacker manifesto. No legendary. That it actually appeared in the movie hackers. Here, take a listen.
This is our world now. The world of the electron and the switch, the beauty of the bond. Yes, I am a criminal. My crime is that of curiosity. I am a hacker, and this is my manifesto.
Right, manifesto? You may stop me, but you can't stop us all. That's cool, cool, yeah cool, you think it's cool, it's cool, it's cool, it's a cool, it's calming bullshit. And Lloyd wrote that a few days after being arrested for hacking.
Lloyd was a member of one of the most infamous hacker groups of all time, the Legion of Doom. These are true stories from the dark side of the internet. I'm Jack Recyter. This is Darknet Diaries. This episode is sponsored by Droughta.
Let's face it. If you're leading GRC at your organization, chances are you're drowning in a sea of spreadsheets every day. Balancing security, risk, and compliance in an ever-changing landscape of threats and regulatory
frameworks can feel like running a never-ending marathon.
Enter Droughta's a Gentic Trust Management platform designed for leaders like you. Droughta automates the tedious tasks, security questionnaires, responses, continuous evidence collection, and much more. Even you hundreds of hours each year, with Droughta you can spend less time chasing documents and more time solving real security problems.
With Droughta, you also get access to a powerful Trust Center, a live customizable product that supports you in expediting your never-ending security review requests in the deal process. It's perfect for sharing your security posture with stakeholders or potential customers cutting down on the back and forth questions and building trust at every interaction.
“Ready to modernize your GRC program and take back your time?”
Visit droughta.com/darknetdires to learn more. That's droughta spelled dr at droughta.com/darknetdires. This episode is sponsored by Vanta. It's not your imagination, risk and regulations are ramping up and customers now expect proof of security just to do business.
That's why Vanta is a game changer.
Vanta automates your compliance process and brings compliance risk and customer trust together in one AI powered platform. Companies like ramp and riders spend 82% less time on audits with Vanta. That's not just faster compliance, it's more time for growth. So whether you're preparing for a SOC 2 audit or running and enterprise GRC program,
Vanta keeps you secure and keeps your deals moving.
It's what I'd use if I needed this kind of service.
Get started at vanta.com/darknetd; that's Vanta spelled V-A-N-T-A. Vanta.com/darknetd. Hey, I am in San Francisco and I am looking for a specific building and while I look for it, I'm going to walk and I'm going to tell you a story. I want you to come with me.
“So you've probably heard of the term "freaker," right?”
It was spelled with a PH.
This is basically a phone hacker.
What a "freaker" is is someone who manipulates the phone system to make phone calls or whatever. But did you know that the term "freaker" and the whole idea of it was injected into the mainstream by S. Squire magazine? So in 1971, S. Squire interviewed the guy who created the blue box. I was like, "Show us how it's done and all this stuff."
And the blue box is this magical thing that you push buttons on it, it had certain tones and things and if you hold it up to the phone, you can make a "freak phone call" or whatever. It was basically a little box that hacked phones. And so the interview this guy and he showed him how it works and all this sort of thing. And took him kind of a tour of the underground world of "freakers," which at the time
was very small and esoteric. Well, you had to be a geek of geeks in order to be a "freaker" at the time. I mean, 1971, this was early freaking days. So that article came out and it pretty much glorified, freaking, saying like, "This is your way to empower yourself."
So that article came out and it inspired thousands and tons of thousands of people were reading this saying, "How do I get a blue box? I don't why I make this. I want to get one soon." And so there's just all this like fever suddenly about people asking around and kids on college
campuses were now making blue boxes and getting together and trying to build these things. And of course, it didn't explain in the article how to make it. So finding that it was very difficult. Google wasn't around at the time. I mean, gosh, the internet wasn't even around at the time.
So trying to find information on how to build these was pretty hard. But if you looked in the right areas, you could find them and you asked to write people. And famously Steve Wozniak read that article and worked with Steve Jobs to say, "Hey, let's start building these blue boxes and sell them." And they did.
And this was like their very first company before they started Apple and they even said,
"If we didn't do that, we'd never make Apple because this was a really good stepping stone.
They're like figure out how to work together and build things." And so, wasn't just like, here's how to do this cool electrical thing. But something about freaking was just really cool at the time. The cool kids were doing it. They were like, "Wizards, they could do things to the phones that normal people
couldn't do." And it was real magical at the time to be able to send these crazy signals into the phone and make it do stuff. But the freakers weren't just cool kids who were anti-established men. It was like, "We all have these little rebels inside us as teenagers."
And this was a way to really let that rubble fly. Freakers were like a way to push back to empower yourself, to fight the big monopolies of the world. Like, "Mah, Belle." And there was a magazine being published at the time called "Ramp Hearts," which was being published right here out of San Francisco.
That's where I'm headed right now. And "Ramp Hearts," I mean, I feel like their whole attitude was,
“"Poke their finger in the eye of the establishment," right?”
It was like, big corporations are corrupt. And here's how you can do to fight back.
Like, they were very critical of Christianity.
And sympathetic of black Panthers, which were considered the materialist group at the time. And one of their most famous articles was when they found evidence that the CIA was secretly funding the student protests and student groups on college campuses to try to manipulate political discourse and ideas. And that turned into a huge investigation, and it was a big problem.
And so, "Ramp Hearts," was doing this crazy journalism at the time. And oh, I think I see their office now. And gosh, these buildings are so cool, they're so old, and so beautiful. So "Ramp Hearts," saw the freaker movement stirring up, and they're like, "That's right, right, an article." And the article came out, and it was called "How to hack
the phone company in your home." But then the use of word hack, it said, "Regulate. How to regulate the phone company in your home." And I mean, I just read the article, so I'll summarize it for you.
“It's basically saying, "You've heard of the blue box, but do you know about the mute box?”
The mute box is pretty cool." And basically, when you're going to make a long distance called to someone, now this is back in the 70s, right? So, I can't believe I have to explain this.
There were mobile phones yet, so long distance calls actually cost by the min...
very expensive to make long distance phone calls. So what the article says is that when a long distance phone call connects, there's a certain signal that gets sent from the receiver, from the receiver's phone to the phone company, indicating this call has connected, let the timer start, and so the toll begins, and what
this mute box does is it mute that signal to never let the phone company know that the
call started to start the timer for how long the call lasted. Well, I'll allow you to receive free long distance calls, kind of a weird idea, but that's what a mute box does, and the article goes on to explain, now let's show you how it's done, how to make one, it has a part list, it's like get a capacitor, and get a resistor, and get these kind of switches, and get put it in a box like this, and it tells you how
to solder it, and how to what wires to connect to where to put your phone in, and all this kind of stuff, and it is a step-by-step tutorial on how to make a mute box, and not only that, it says like, now that you've built it, here's how to use it, and then when you're using it, here's how to verify when you're getting a free call, if you're hearing these tones, it's not working, if you're hearing these tones, it is working, like it's
really in depth of how this works, and how to make it, and I have arrived to where the rampart's office used to be here on Pine Street in San Francisco. When they published this article in May of 1972, the police raided this office, and they went up, and they forced them to recall all the issues that they published, so get them back here, call up every new stand that you sold it to, everyone that you sent it to get the article back, you
“cannot publish this, and they're like, "What? You crazy!" and they're like, "You want a felony?”
Do you want a felony? Get your articles back here. Do you want a big fine? Either that or get your articles back here." So they felt really pressured, and they called up as many places as they could to bring the articles back. It cost them like $50,000, and cost revenue for buying back their articles, or their magazines that they've already
sold, and when I heard that story, like my immediate thing was, "Wait, what? The first amendment
of the Constitution says, "Congress shall make no laws to restrict freedom of speech, or freedom of press." And this is a press. I mean, they're just making magazines. They're doing journalistic work here. And what happened was the phone company was so mad that this article came out that they asked the California Police to do something, and what the California Police did was they found a rule in law. California Pino Code 502.7. And
it says, "You cannot sell devices that will be used to defraud the phone company, and you cannot sell schematics or distribute plans, or teach others how to defraud the phone company." And I am just perplexed by this, because what, like, how is any YouTube video
exist? And then this law still exists on the books. It's never been recalled, or repealed,
“or anything like that. So how does any YouTube video exist that teaches you how to hack?”
How does any article exist that teaches you how to hack? I mean, shoot, just a little bit down the road from me is Stanford. And Stanford has classes on how to hack. How to do this exact thing. Like, there are certificates on how to hack. And it's like, what? All these things exist. Yeah, it's against the law to teach someone how to hack. Are you serious? And so, ramparts to couldn't recover from this. And that was the article that ended
all articles for them. After that, the damage to the company, the reputation, the legal threats, the financial blow was too much. And so ramparts had to shut down. And that was it for them. And I feel like as I'm sitting here looking up at the ramparts offices, you're building there. I could see that times of change between that and now. These are old buildings. But that fight still wages on. It's still going strong. Like, is there forbidden knowledge that we shouldn't
share? Is there stuff that should be hushed up? Is there legal tutorials out there that we shouldn't put out? It's often questioned. And all I got to say is it rests in peace ramparts.
“I think you started something much bigger than what you were.”
Okay, I'm back in the studio now. And I just pulled something out of storage. I'm going to turn it on. And you see if you can guess what this is. That noise right there is so nostalgic to me.
It's the, it's the sound of the Apple 2E starting up.
a family computer, right? I just inherited it. It. You hear that? This thing's mad because I don't have
“a disc in the drive. It doesn't see, here's the thing. This is an Apple 2E, right? And even though”
it's an Apple product, it does not resemble anything that you imagine an Apple product to resemble. This thing is a full computer, but has no hard drive. It has no operating system at all. And so for anything to get working, you have to put a floppy disc in the disc drive. That's like opening up an app though, right? And you can only have one app open on this computer at the time. It is ridiculous. So I have to push this in, close this door, and then it's still mad.
It's still trying to find a disc. Oh my gosh, carrying these noises and folks so many memories. Like when the circuitry stop humming and making noise, I missed that. These were the days when you didn't just use a computer. It kind of danced with it. Getting things to work felt more like alchemy than anything. You might try something three times. It would work one out of three times, even though you then change anything. Manuals and books were impossible to find. So you were on your
“own figuring out commands and settings without it's tutorial. There was one sound in particular”
that when you heard it, it gave you a rush. It made you feel like this thing is capable of infinite possibilities. And that sound was the dial tone. Hearing that noise from your computer felt like you had the whole world at your fingertips. A world where you could go anywhere and do anything. The dial tone was the sound of potential, pure potential. We're so hyper connected these days
that you don't even realize that you're always online. But back in the 80s, it was a big deal
to go online. It wasn't like anything it is now. BBSs were popular then, which stands for bulletin board system. And it was often just some person running a computer out of their house. And if you call their house with a telephone, which was connected to your computer, you could connect to their computer and read what it had on it. But it was way more complicated than that. Finding their phone number to dial was hard to start with. Google wasn't around yet to ask like, hey, what phone number
“should I dial and what BBSs should I check out? So you had to ask around in person like to”
your friends and family. Maybe a local electronics shop might be able to help. Hey, do you know any good BBSs I should try? And they might give you a few phone numbers. And then setting up your modem was like a whole thing. You had to configure it for like 20 minutes just to get it to work
right? And when you finally get it working and you dial the number, the line was busy. Of course,
because any popular BBS would have all kinds of people trying to connect to it, see what's there. So you had to just keep dialing it again and again and again and again and it hopes to get through eventually. And when you finally got through, it felt like wizardry, the pixels on your screen would light up showing you a portal into another world. And you'd get this sudden rush of excitement that you made a successful connection. You were in. Now it was time to look around and see what's
in there. BBSs might show you articles like technical articles or political things that might be programs to try or there would just be messages for other users talking about their day. And as you connected to these BBSs, you'd start to draw a map of the internet. You would take notes of all the places that you visited, their phone numbers, what they had, tips on connecting into it, your username that you used there. And often a BBS might lead you to another BBS, where it would say,
if you like this place, you might also like this other place. And now you're starting to build a list of potential phone numbers that might work. The internet was rapidly changing. So a lot of phone numbers that you got were old phone numbers. I didn't even work anymore. They were for old BBSs that shut down or just stopped working. And so for a lot of people in the 80s, they really wanted to know more of what was out there. You could dial any phone number and it may or may not
have a computer connected to it. There was no official map or search engine back then to show you around the internet. The internet was very dark and it was hard to navigate. Like you have no idea of exhausting it was to try to do all this without a manual or a clear tutorial on how anything worked. But while it was cool and all to connect to a BBS, that's just one other computer in the world. That's just a computer you dialed into at someone's house or something, which
wasn't connected to anything else. Surely, there are bigger, more powerful computers in the
world out there. But where? And surely there must be whole computer networks out there where you could bounce around from machine to machine. And yes, in fact, businesses, governments and universities often had the biggest computers and the coolest networks to get into. So what was the biggest computer network? It was the telephone system, or technically the PSTN, which stands for a public switched telephone network. And by the 1980s, the phone system was being more and more controlled by computers.
Back in the early days, you had switched board operators, actual humans that you told them what number you wanted to connect to, and they would connect that call for you by plugging in a wire.
It wasn't until the 1980s where electronic switches became so popular that th...
longer a need for human switched board operators. And these electronic phone switches were fascinating.
“They listened to the tones on the phone night to make their decisions, to connect people,”
to disconnect people. And of course, hackers, or, I should say, frakers were very curious what tones they could send the switches to make them do things. As technology progressed, those phones switches became computer-driven, which meant it was possible to get into a phone switch and see all the calls connected, disconnect them if you want, listen in on calls, and yeah, those computers were sometimes remotely accessible so that the phone company could get in there and configure
and troubleshoot things too. So it meant that you could technically control the phones from a terminal on your computer, in your house. It was just a matter of knowing what phone
numbers to dial into and which computer to connect to. So you can imagine the phone company
did not want the phone number to these switches to be publicly known. And at the same time,
“frakers were desperate to find them. And because it was the largest network in the world,”
it became the coolest thing to hack back in the 1980s. They weren't just trying to figure out how to make free calls. They were also trying to figure out how the phone system worked in general. It was about being able to touch and interact with the largest network in the world. It was all about learning something new. There was one guy who was very curious how the phone network worked. And wanted to get in and learn more. His name was Paul. Paul Stiro was a high
schooler living in Queens, New York. What Paul, like doing, was war dialing. He just dialed phone
number after phone number to see if there was a computer on the other end that would pick up.
But if you just dial random numbers, you're likely to get someone's house. Like someone who picked up the phone to say hello. And then you'd hang up and try another number. But then someone gave him a tip. They said, hey, try calling higher numbers. Like the last numbers in a block. Like, you know, phone numbers at end in 999. Those numbers are often reserved by the telephone company themselves. So there's a higher chance that they might be connected to a computer.
So he tried calling like 5-5-9-0-0. Then 9-9-0-1. And 9-9-8-7-9-9-5-5. He didn't like doing things in sequential order. Eventually Paul found a few numbers that responded to his calls and had computer tones on the other end. And this is what he was hunting for. Computer on the other end was answering his call. This fascinated him. So he would use his computer to try dialing that phone number, just to see what the computer was saying. So he connected to it. And it said something.
S. S. I'd say it one letter. The letter S. What does S even mean? He tried typing some commands, but he just kept getting the same response. S. S. S. That was weird. It seemed like anything he typed he would just get an S back. Then he tried typing some numbers. But this time he got something different. Double you. This was all too obscure. And frustrated Paul S or W is all he was getting from this computer. He started smashing all the keys to see if any of them worked. And
all of me they gave S or W back. Lame. Out of desperation he picked up his phone, which was connected to his modem and he just blew into it. Take that computer. And then his computer laid up. Suddenly a series of characters began to fill the screen. He was getting way more than S and W now. And he tried new commands now. And whoa. Suddenly he could talk to the computer on the other end of the line. And it would respond to him in code. Oh, he got in. With the brief
gust of hot air, Paul had reset and taking control of a machine that belonged to the phone company. He tried typing a command. Log in. He had been on BBS as before and read about what commands that phone computers use. So he was just trying random ones. Print. Got him access to useful files. Show users. He turned the list of employees that he could impersonate to gain access to get more
“privileges on this network. He told us Frank Eli about this computer. Eli thought, oh, you must have”
gotten into an SCCS, a switching control center system. The beating heart of the city's telephone system. It appeared he was in fact in a telephone switch. And this was for the New York telephone company. This controlled calls and phone numbers. It was part of the inner workings of the phone company. You wanted to try something. Nothing big, just a little something. Just to prove this wasn't a dream. So he looked up his friend's phone number, which was in there. And it showed which features
his friend had. So he gave his friend a new feature free of charge. Three way calling. And then logged out. This is where you could call two people at once. It was real fancy at the time and cost extra. This was hacking at its finest in the 1980s. Discovering a computer all on your own by war dialing out of all the numbers in the world. You found one that works. Figuring out a way to get
Into it.
you were there. Oh man. How cool. Paul got a real high from this experience. If connecting
“to BBS is felt like wizardry, getting into a computer like this was on another level. It wasn't just”
magic anymore. This was God powers. This was bending reality, creating from nothing. Unlocking truths that were very deep in the mysteries of the internet. This is what hackers lived for in the 80s. Ever since that S.quire article in 1971, people got more and more interested in freaking. And that just grew and grew. And by the way, even though S.quire popularized and romanticized blue boxes
and freaking, they never got any trouble for doing that. In November of 1985, a new online magazine
published their first issue. It was called Frack. Which starts with a pH. It's a combination of freak and hack. Now back in 1985, there weren't even web browsers yet. So Frack didn't have their own website to publish their easing to. Instead, they published issue number one on a BBS. And encouraged people to just share it, spread it to other BBSs. And so it did. Any hacker BBS, where that salt back then, had a copy of Frack. And honestly, it was just a text document. No photos
in it. Text files were king back then. Mainly because it was faster to send text over the internet because images were really big and took forever to see. So text files were just where it was at. Issue one of Frack had some interesting articles. There was one just how to make international calls. Not for free. Just how to call internationally if you ever have to. Like, it had a list of country codes and how to dial them. But it had some cranky stuff in there, too.
Like, did you know you could call the phone company state that you're someone else and tell them,
“"I no longer want service and could you please terminate my number?" And that's how you can get the”
phone company to disconnect someone else's telephone. And there's stuff in there like how to use a PBX if you're ever on one. And there's an article about how to pick locks. And an article
on how to make a settling balloon bombs. Basically saying put some rocks and fun snaps and a plastic
bag filled a plastic bag with a settling, a highly vulnerable gas and throw it off a building and when it hits the ground, the snaps create a spark and that explodes the balloon. Making allowed noise in a big ball of fire. See, anarchy was pretty popular on PBS's back then. It was everywhere you looked. Bomb making tutorials, lock picking techniques, shoplifting advice, how to bypass security systems and other urban survival guides. I just ran a Twitter poll asking people if they
everyone online when they were a kid and saw plans on how to make a flamethrower. And half my followers said, "Yes, they did see plans on how to make a flamethrower when they were a kid." Real popular book among teenagers then was the anarchist cookbook which had schematics and diagrams
on how to make bombs explosives and cause havoc. I was 15 when I first saw it and it spooked me a bit.
This seemed like serious destruction but I took a look at it again just now and it looks like it was written by kids for kids. It's not very detailed. Some of the ideas don't work at all and there's
“no safety precautions to follow. I remember going into a bookstore when I was a kid. It was”
Walden books actually in the mall and I was just walking through the bookstore and one book caught my eye and it made me stop dead in my tracks. The title of the book was steal this book and it stared at me like a dare go ahead, steal me and I swear I thought long and hard about it but ultimately didn't and I couldn't ask my dad to buy it for me either because it seemed like it was a book I wasn't supposed to have so I just grabbed it and flipped through it and it was wild. Very anti-establishment
parts survival guide, part political manifesto. It was encouraging me to steal to rebel against capitalism. Crazy stuff was in it. How to hitchhike, how to dumpster dive, where to get free clothes, how to make smoke bombs and disrupt phone lines, how to run a pirate radio station and it was written in 1971 and again it's wild to me that ramparts was raided for publishing an article on how to make a mute box but half the kids in the 70s and 80s were finding schematics on how to make bombs
online and good percentage of them were actually trying to make them which is even more wild like eBay has banned the anarchist cookbook now from being sold there which up a book that practically half my followers have read as a teenager is now banned on eBay. I'm telling you anarchy was in style in the 80s. There was a certain attitude that steal this book and the anarchist cookbook possessed and that seemed to carry right on over into what the internet culture was like in the 80s.
It was counter culture, anti-establishment. There was distrust of authority, smash the system. It wasn't just a vibe. It was practically the first principles that a lot of people were operating
At.
was like sharing of contraband, whether you were reading articles on how to pick a lock or get a
free phone call on how to make a bomb. It all seemed to have some sort of cloak of secrecy and what you were doing was accessing forbidden information that they didn't want you to see. The internet
“felt like a digital back alley where cissops were gatekeepers to secret knowledge. It was punk rock”
at its core. It was cyber anarchy and was the idea that the system could be subverted, bent and reprogrammed. It wasn't just fun. It was freedom. These kids would take the shiny polished world and peel it back. And look into the guts and wires and bits and bites that controlled it. They found themselves in control of it. They didn't need to ask for permission. Use scavenged parts to build computers. You cracked programs instead of buying them. It's like the rules were suddenly optional.
Obstacles were just challenges and the world was incredibly fun for those who were curious of how it worked. And a lot of these ideas were coming across my screen as a teenager. And that shaped me to who I am today. Oh yeah, there is a schematic for how to build a flamethrower on my computer. Interesting. I mean, this stuff gave me an enormous amount
“of destructive power. And I had to learn what to do with that power. Did I make a flamethrower”
as a kid? Absolutely. It was, it was just hair spray and a lighter. But it did spray fire. Did I make bombs? Absolutely. And I've got to say, I'm really lucky that I didn't blow off a finger or set the whole house on fire. Since I could have easily happened with all the things I was doing. And the ethics of stealing would come up again and again. Stealing is wrong. But the free crews of the 1980s had a different way of looking at things.
To them, making a free phone call by hacking the system wasn't theft. It was exploration. Here's the logic. They placed calls late at night when the phone lines weren't very busy. The infrastructure was already up and running. Whether they were using it or not, their calls didn't display anyone else. It didn't congest the network. It didn't cost the phone
“company anything extra. So, if no one lost anything, was anything really taken? That was the”
ethical loophole that they lived in. If there's no marginal cost, no harm, and no deprivation, then how could it be theft? Many frakers genuinely believe this. Others didn't care because let's be honest. A big part of the scene was driven by anti-authoritarianism, curiosity, and a taste for anarchy. Things really started to heat up in 1984 at that time. AT&T wasn't just a phone company. It was the phone company. A telecommunications giant with a
strangled hold on every call made across America. It was massive, monolithic, and seemingly unbreakable. To many in the underground anarchist hackers, frakers, it was the very symbol of centralized control, the system incarnate. But in January of that year, the unthinkable happened. The US government
stepped in and forced a breakup. AT&T was declared a monopoly. Too powerful for its own good,
and under legal pressure, it was torn apart, shattered into eight separate entities. The so-called baby bells. And for those watching from the digital shadows, it was seismic. The unbreakable had broken. A vast unified network had splintered overnight, and with fragmentation came opportunity. New cracks in the system, new seams to explore the wires where alive again, with people probing, learning, exploiting, looking for hidden stuff. It was the dawn of something wild, a freer,
looser, more chaotic network, and the perfect playground for cyber anarchists ready to test their limits. And frack was there, watching it all. The digital magazine seems squarely planted in the hacker, freaker, and anarchy culture. The authors of the articles were kids in the scene, voices from the digital underground. Let me read a passage from frack. During the summer of 1984, an idea
was formulated that would ultimately change the face of the computer underground forever. This particular
summer, a huge surge in interest in computer telecommunications placed an incredibly large number of new enthusiasts on the national computer scene. From out of this chaos came a need for learned instructors to help pass on their store of information to new throngs. The need was met by nine hackers, who formed a group called the Legion of Doom. Now, the name sounds pretty menacing, Legion of Doom, or LOD for short, but really the name comes from a comic book. The group of supervillains
and DC Comics is called the Legion of Doom. In fact, one of the guys who started the LOD hacking group went by the name Lex Luther, which was the arch nemesis of Superman. Fiber optic was one of the
Members of Legion of Doom.
convention in New York 15 years ago explaining what it was. Melody was one of the first organized
hacker groups in a very disorganized computer underground. And the main purpose of LOD initially was to take information primarily that was found trashing at telco central offices and type it in and make it available in what were known as LOD tech journals, which were available online in text file sections of bulletin board systems, so called elite bulletin board systems. Or yeah, trashing was big back then. This is where you go behind an office and look through their
trash. They would look for phone numbers or computers or manuals on how to configure things or any sensitive information that the company had thrown out. And phone companies were of particular interest to trash. And again, the ethics of stealing comes in. Is it stealing when you're taking
it from someone's trash can? The 16th episode of Dateline NBC actually interviewed one of the
Legion of Doom members. Good evening. I'm Jane Paul. And I'm Stone Phillips. And welcome to Dateline NBC. How the real hackers operate and just what kind of damage can they do? It's nowhere to mean that you can turn on the TV back then and learn what trashing was. You love to an elite hacker club called the Legion of Doom. One of the methods he used to
“obtain secret computer codes was to rummage through the trash and go south. The regional phone company”
in the blend. Back a few years ago, they weren't locked. You could just slide the doors open, reach in, grab a bag, and leave. Now one thing that was worth its way in gold to these hackers were simply manuals for how computers worked. Again, there was no Google to search for how something worked. Again, there were no browsers even invented yet. There was no YouTube to walk through a tutorial on how to use a computer or an application. If you got into a computer that was
given you funky messages back, you probably had no idea how to operate it. And a simple manual on how to use that computer would have been amazing, but it was extremely rare. You had no idea what commands to type on it. The phone company did have manuals to these computers. Obviously, someone had to know how to use them. But they were very well guarded documents. They did not want to share it because if the wrong person got the manual, it meant they could do anything they
wanted in the telephone network. Keep in mind, passwords were not always mandatory back then.
Security was often through obscurity, actually. Like, hide your computer by not sharing the phone number with anyone. And don't show anybody how to use it, who is an authorized. So they often relied on nobody knowing what the phone number was, and nobody knowing how to use it even if they did dial it. I mean, the word cybersecurity didn't show up until 1983. We're talking about the land of computers before cybersecurity was even a thing. Put a magical time that was because,
“honestly, the whole internet had like doors wide open anywhere you looked. It's just that the doors”
were hidden and it was up to you to find them. So members of the Legion of Doom would go searching through trash cans behind telephone companies. And when they found something they would type it up and share it on their LODBBS for others to see. In this way, they started amassing all kinds of random manuals and documentation that the phone company was throwing out. Now, I want to stress, so many of these articles didn't show you how to hack anything. It simply was a manual that
the manufacturer gave out for how to use their own computers. Legion of Doom quickly became the most respected, most desirable BBS and the entire hacking scene. Trafficking in all kinds of precious information about telephone and computer systems, it was the place where any hacker worked their salt wanted to be. We're going to take a quick ad break here, but stay with us because when we come back, everything is about to change. This episode is sponsored by Shopify. Starting
“your own business can be really hard. Full creative control sounds great until you have to make”
the logo and design the products on the website and respond to customers and loads more all on your own. What you need is a tool that can help you out and simplify key parts of running a business. For millions, that tool is Shopify. Chances are you're going to need a website and Shopify's design studio ready with hundreds of ready-to-use templates is there to help you build an online store to match your style. Next, marketing. Shopify helps you easily create email and social
media campaigns wherever your customers are scrolling or scrolling. And best yet, Shopify manages everything from inventory to international shipping to returns and beyond. If you're ready to sell, you're ready for Shopify. Start your business today with the industry's best business partner Shopify and start hearing. Sign up for your $1 per month trial today at shopify.com/darknet. Go to shopify.com/darknet. That's shopify.com/darknet.
Okay, so Ronald Reagan comes into our story here. President of the United States of the time. He went to the
Movies and he saw this.
"It's not a real voice. This box just interprets signals from the computer in terms of it
“to sound." "Shall we play a game?" "Oh." "I think I missed them." "Yeah, weird, isn't it?" "Yeah." "You love to." "How about global thermo nuclear war?" "What would”
you with a good game?" "Well, sure." Later, let's play a global thermo nuclear war. "Firm." "Alright!" That's the 1983 movie War Games. It's a film about a kid who got into a computer thinking he was just playing a video game but it turned out to be a military computer and it triggered a bunch of real alerts that the government thought they were under attack and all that war was breaking out. Well, the story goes, President Reagan's side and asked around. "Is that possible that
that could happen to us?" And they thought about it and came back to him and said, "Yes, a kid could trigger war if he got into the wrong computer." Then Reagan said, "Well, what law is there to stop someone from doing that?" "And there wasn't one. There was no law against hacking into computers
in the 1980s. Technology always moves faster than the government. If you broke into a computer,
looked around, downloaded things, changed data on there. There was no law saying that what you were doing was illegal. It was a paradise for hackers to just roam free and explore without worry. "Can you imagine such a time in place?" So Reagan's like, "Whoa, we can't have that." In October 12, 1984, the US Congress passed the comprehensive crime control act or CCCA. It was a classic tough on crime bill. It up to penalties for growing and selling marijuana.
It expanded judges' powers to deny bail to defendants. And it created, for the first time ever, a computer crime law. And the police were excited to use this law to catch them some hackers.
“I think honestly, war games in Hollywood scared the government so bad that they thought hackers were”
capable of anything. And there were dangerous thugs, terrorists, causing chaos and destruction on the internet. They were the next big threat to America. And the feds wanted to get ahead of this and stop it. The police started their campaign with sting boards. BBS is designed to look like a hacker BBS,
but it was secretly operated by the cops. The first ones were created in 1985. There was the
underground tunnel. And it was operated out of Austin, Texas. It was run by a hacker calling himself Pluto. But really, it was just a police sergeant. And there was another BBS set up by the Maricopa County Sheriff's Office in Phoenix, Arizona, called the phone company. It sounded a little like, "On the internet, no one knows you're a dog." Kind of operation. But according to Bruce Sterling, the guy who wrote the book, the hacker tracked down, these sting boards actually worked
at least sometimes. Most hackers at the time were just young men who barely knew how to type 20 words per minute. And maybe they watched the movie War Games themselves. And they were curious on how to hack, so they'd float into a cool sounding BBS, like a new ground tunnel. And it seemed legit and allowed them in, so they'd look around and then they'd slip up and get trouble. Maybe by, like, trying to fire sell some things stolen, like, a credit card. But all they ever saw
were noobs doing dumb things. Like, people saying they can hack into something, but then it's all talk. And police had no evidence to prove that they actually were dangerous. As far as I know, the sting boards did not result in any actual arrests. And I really think it's because most of the free-curs and hackers back then were really doing anything that bad. There was something I came across, which I think really emphasizes the light, a hardiness of it all. Here, let me show you.
Back in the early 90s, there was a radio program called This American Life. And they interviewed some teenage hackers at the time. And they found this one kid who would try to steal credit cards from people and then use that to buy things for himself. Like, it sounds bad when I say it. But listen to how this kid describes how he stole someone's credit card.
Basically, the way it works is this. You call up somebody. You say this is the AT&T operator.
I have a priority collect call for someone's name. You know, and you have the whole point if you
“have to sound like you're not calling somebody up with the intention of getting them. You have to”
sound like you've been sitting in this chair for 10 hours. You want to go home. So you've got to go. You know, this is the AT&T operator of a collect call for call. Reexcept charges sir. Yeah, except charges. Hold on one second. And you tap on the keyboard. You say, I'm sorry, you seem to have a restriction on your phone line. You can't accept collect calls to this line. And then they yell, I'm like, what do you mean? I can accept collect calls to my lawn up and
get collect calls to this lawn for 20 years. And then you got to go, sir, there's nothing I can do about it. My computer says you can't receive a collect call on this line. He's like, trying to alternate billing method in which case they'll proceed to either give you a calling card or a major credit card.
The thing was, despite this clever little plan of theirs, they were wildly un...
I mean, listen to what I read last things of these kids. But care at Mr. Whereas and Fred were
“involved in very low-level types of crimes. All of them involved computers. They pirated software.”
They scammed free CD ROM games. They cheated one of the big online computer services out of a few hundred dollars in online time. Oh, no, they didn't steal very much and they didn't steal very effective way. But they did try to steal. He doesn't think much of these kids does he? Like, he's not scared or intimidated by these crazy hackers at all. He seems to understand just how low-level of a crime this whole thing is. And maybe doesn't even believe that they've done any of this.
Oh, and it's kind of funny. I've been accused of being irreglass a lot, actually. I'm not ira, but this American life was a huge inspiration to me. I adore ira glass even met at once to actually have a picture with me and ira. And he's kind of a hero of mine. But it's wild. In this episode, ira glass follows these three hackers into a hacker convention in New York City. And yeah, it's just really want to stress that, you know, we're not, we're not like in other ways,
we're not bad people. We don't like go around trying to screw off people in any way we can.
Because we're not at all. I mean, like, you know, I do social work. I like, you know, two-third
kids, I, like, do a lot of stuff, which isn't like necessarily evil and, like, more good. But, you know, sometimes it's just like, I don't know, man. I like doing it. I can't explain it.
“Talk about that part of it. Like, what is the thrill of doing it?”
That's the first, that was the reason I started cutting. The reason there's the thrill of, like, you know, going, when we went in there, it was real, like, it was, like, mission impossible. We were like, we went in, we had gloves on and stuff and we, like, picked it up. We had, like, we had it all worked out. We were like, connecting, we had, like, look out and stuff. And it's just, it's a lot of fun. It's like, it's like, you know, you're doing stuff that,
it's not exactly where you go and not really do it all, and it's fun. We took the elevators up to the floor where the hackers convention was taken place. Keyred said that real hackers do not use their skills like this. They do not use their skills for personal game. They don't do carding, they don't steal. The whole idea of computer hacking is, for these guys, anyways, that it's a kind of pure Zen pursuit, you know, and it's an Zen itself. You break into the computer
for for its own sake and to look around and for the knowledge of everyone, especially you. We, we stood in the hallway, people streamed by. We, we tried to move to a corner where we would not be
overheard. And, um, Keyred said actually that they had never really talked about their illegal activities
this much before. With anyone. The most thing I'm worried about is I'm actually starting to for the first time to say this all out loud, everything I've done, and suddenly it doesn't sound as, as hacker much anymore. And I've known that ever since I moved into moving, doing maybe
“some credit card thing. And that's why I'm, in fact, even considering giving up on doing all the”
carding, it's something, which is why I seriously am. My worst fears that I can end up going to hell for doing this, and that's like my worst fear. Do you believe in hell? Yeah, I do. And you think you can go to hell for getting a computer and somebody else's credit card? I don't know, I hope not. I really hope not. See, that's the kind of kids that the police were creating laws for. They were setting up stingbores for the secret service was investigating
kids like this because they thought they were dangerous criminal terrorists. Did they sound like dangerous criminal terrorists? You? The federal authorities were putting a ton of effort and time and resources into stopping these kind of kids. It just seems disproportionate to me. I was just reading the book, Hacker Crackdown today, and I read this part where lawmakers and Arizona, the people who were trying to crack down on hackers, were scared to leave their office at night
because they parked their car in a bad area of downtown Phoenix. They said people would rob their cars, break into windows, and threaten them if they went to their cars too late. Yet these lawmakers seem to ignore the crime going on in their own parking lot and focused on kids like this who often weren't even stealing anything at all, just poking their nose into the phone company's computers just to look around to do something to prove they got in. I mean, listen to what Adam says,
a member of the Legion of Doom went questioned on date line NBC. At Bell Sound, we were able to get into all men or computers, the phones were just themselves. In essence, you got to where you could have turned off everybody's phones in Georgia. Just about anyone if a couple does not have a script in there. The more than a year Adam and his friends had free access to the inner
Workings of 12 Bell Sound computer systems.
one system here. The operator worked for me as could have. You could have done it. Yes, I could
“grab ancient people. You can. See, that's one of the big things I see again and again in this story,”
breaking in versus causing harm. Legion of Doom seemed to love the challenge of getting in, but rarely did much once they did get in. Just getting in was fun enough. There was no need to cause damage. That wasn't their goal. It wasn't what they did. They just liked finding ways in. But the more Legion of Doom got access to, the more the police got more worried that they would take down the whole internet or the phone system or something. And maybe in some way, I could see
why the police were worried because of all this anarchy rhetoric online at the time. I was talking about bomb making and stealing and tearing down the government and smashing the system, might have caused the police to worry even more than they needed to. At times, they did feel like the internet was forming some kind of army to cause chaos. But a lot of hackers and frikers had no intention of causing chaos. The police didn't have a very keen eye when it came to
trying to catch hackers. They didn't understand this culture at all. They accused a lot of people being part of Legion of Doom even when they had nothing to do with LOD. And LOD was trying to be pretty secretive. To get into their VBS, you had to be on the allow list, which meant that the police couldn't get in. It was going on there. And that was a double-edged sword. The more notorious the LOD became, it meant the more interested that the police became in them. But if you did happen to
get the password to get into the LOD BBS, you'd see technical journals describing telecommunications and computer systems in a remarkable level of detail. Just looking at the table of contents of one of their now leaked documents, I see. Part three, step-by-step switching system notes. Part four, a guide to the primos operating system. Part five, identifying and defeating physical security intrusion detection systems part two, the exterior. That last one is written by the LOD
founder, Lex Luther. Lex Luther's post, despite it being part two, is still 5,000 to 200 words long. This kind of insider knowledge and exclusivity was enough to earn LOD plenty of respect. But they also had information that they refused to publish, even to their private board because it was too sensitive. Even members were limited on how much they could see. Like there was a special section on the board called the Fifth Amendment, which had a document describing in detail how to
break into PBX phone systems developed by the role incorporation. A PBX is a device used to make phone calls typically operating internally in the phone network, but sometimes in large businesses, we have a lot of phone lines. And someone at LOD got the manual for this PBX and read through it. And in there they learned that phone technicians can use a PBX to listen in on phone calls to perform maintenance and troubleshoot. Built into the PBX was a way to spy on calls. And because
LOD knew this, they could if they wanted spy on phone calls too. They could listen in on someone else's call. And that was one of the documents posted on their Fifth Amendment BBS, which
members were only allowed to read, but never copy. Here's Fiber Optic, one of the members of LOD
talking about it at the Hope Conference. I want to take a few moments to rewind a little bit and
“speak on behalf of our rules that we live by in our community long before the FBI and Secret”
Service succeeded in infiltrating our community. What I will say is this, is that we've always spoken of the quest for knowledge as being most important in our pursuits, that this was always a noble cause, that the destruction of systems, crashing systems was always something that we avoided doing at all costs, whether by accident or as a joke, it was something that was always frowned upon. The fact that our information about technology should be freely available was something that we
always held to be of great importance. We always frowned upon companies who charged money for
technical documentation and information about operating systems, which was very hard to find in the 1980s, for example, which is why trashing and things of that nature were so popular. A lot of the times was to find manuals on how to use the systems that we were getting access to.
“And I think that was where the heart of it always. The belief that information should be free.”
Not stolen, not sold, free. It was less about exposing secrets and more about liberating knowledge that was locked behind corporate firewalls or buried and obscure systems. Hackers were trying to destroy anything. They were trying to understand it, document it, and share it. Phone manuals,
Switchboard maps, internal memos, obscure technical howtos, all of it was fue...
Publishing that information wasn't just rebellion. It was a public service. It was about leveling
“the playing field about making the closed systems of power readable to anyone with a terminal”
who was willing to learn. For many, that was the real prize. Not money, not chaos, access. The idea that no system should be so sacred that it couldn't be understood, that knowledge wasn't a crime, that documentation wasn't dangerous, that teaching others how things worked wasn't subversion, that was empowerment. Again, let me quote from Frack magazine. "Ellowed members may have entered into systems, numbering in the tens of thousands. They may have peeped into
credit histories. They may have monitored telephone calls. They may have snooped into files and buffered interesting texts. They may still have total control over entire computer networks,
but what damage have they done? None with the exception of the unpaid use of CPU time and
network access charges. What personal gains have any members made? None." They were curious, teens, testing the limits of what was possible. They weren't supposed to
“be able to get into the telco and listen in on phone calls, but they could. And that made it”
feel like what they were doing was impossible. And that brought a great sense of satisfaction on its own. But the police were convinced they were evil and our case supervillains. I mean, lead you to doom is a group of supervillains in the comic books, right? And that's talking was a friend of the other day. And he said that the more menacing a hacker group name sounds, the likely more innocent that they are. And the more innocent the name is, the more dangerous it
probably is. Like Legion of Doom sounds dangerous. And Lizard Squad sounds pretty silly. Yet it's really the other way around. The sting boards caught some of the noobs who wanted to be an LOD, but the police really wanted to stop the core members of Legion of Doom. There was one hacker name, Wasp, who started crashing computers at Bellcore. That's the telecommunications research and development arm of the Bell telephone company. And he was just going
in smashing up the plays, taking things down, just causing havoc in the phone company. And long time Legion of Doom member, it aimed to control C saw this and was like, no, no, no, that's not right. We don't crash the systems. You're going to give hackers a bad name. This guy control C, he has his own story history with Bell. He's to do trashing runs behind the company's branch and Michigan. And he learned what documents they would toss behind. And he learned enough that
way to learn how to hack in and give himself free long distance calling whenever he wanted. Mostly, so he could connect to BBSs around the country without having to pay long distance fees. But Michigan Bell caught control C in 1987 and they found out that this big bad hacker was actually a pretty likable harmless kid. He definitely didn't have any money to pay back all those long distance connections and arresting him wasn't worth their time. So they turned him into a kind of
local mascot. Postures went up with control C's face on them around Michigan Bell's offices, warning employees to shred their trash and he actually signed the posters. Even better, he got on their payroll to help them secure their phone company better. All while he was still in Legion of Doom. This wasn't as uncommon as you think, too. And in this case, it ended up benefiting everyone. So when this wasp guy came in crashing around and Bell coer breaking things,
control C recruited some of his LOD colleagues, which included people from Georgia like the profit, leftist and urvile. And together, the LOD members helped Bell coer's security team lure Wasp into a honeypot, which is a machine used to log a bunch of activity when someone connects to it and Wasp was caught and LOD came out feeling good about it. Don't go crashing systems or LOD will come after you and you don't want a hacker group coming after you. Of course, the cops
didn't focus on that side of LOD. They thought they knew LOD and they stuck to their preconceptions that hackers are troubled criminals. And in fact, the investigation got bigger. The secret service
“started getting involved. I think the FBI starts getting in there. Since hackers are getting”
free, long distance calls, and this makes it a federal crime. Let me read to you a passage from the hacker crackdown, Bruce Sterling's book. As early as 1986, the police were under the vague
impression that everyone in the underground was the Legion of Doom. LOD was never that large,
but LOD got tremendous press, especially in Frac, which at times read like a LOD fan magazine. And Frac was everywhere, especially in the offices of telco security. You couldn't get busted as a phone freak, a hacker, or even a lousy coes kid or wears dude without the cops asking if you were a member of LOD. LOD complained about this in Frac. The Legion of Doom has been called everything from organized crime to a communist threat to national security to an international
conspiracy of computer terrorists bent on destroying the nation's 911 service. Nothing comes closer to the truth and bored adolescents with too much spare time. Now despite the almost total lack of
Cyber security and a lot of systems then, there were hacker conferences going...
running hacker conference is SummerCon. It started in the 80s by Frac magazine. And the feds thought,
"Well, if we want to catch a hacker, SummerCon has the place to be, it's swarming with hackers."
“So in 1988, the secret service went SummerCon in St. Louis to try to find hackers committing crimes.”
Now, if the secret service shows up to a hacker conference with their earpieces and nice suits, they'll stick out like a sore thumb. So they needed a disguise, but not just a disguise. Someone to pose as a hacker themselves, an insider, so they got a mole. Someone who looks and talks like a hacker, they even gave their mole a nickname "Dictator." "Dictator" and the secret service went to St. Louis and got a hotel room right next to the conference. It was your classic
staying operation. The secret service set up in the hotel room right next to Dictator's room
and then drilled holes in the walls of the hotel room so they could put cameras up in one way mirrors and microphones. They had holes surveillance of Dictator's room. So then, "Dictator" goes into SummerCon, "Hey fellow hackers!" and meets some dudes at the conference and invites
“them back to his room for like a hangout, sort of party thing and stuff. The secret service”
got all excited when they saw hackers filling the hotel room. They've watched intently, excited to catch a hacker in the act. Do they sap and watched? Here's perked equipment on. But they were disappointed. It was just a bunch of nerds hanging out talking nerdy like, how frustrated they get when someone picks up the phone in their house and disconnects them from the internet or they were comparing modem speeds. It was a big waste of time. But then,
they do witness a crime. One of the hackers pulls out a can of beer and drinks it. Oh no, he happened to be under legal drinking age and that was the only crime that the secret service saw at SummerCon in 1988. These curious and board teenagers involved with LOD stayed out of trouble for the most part. They didn't think being a hacker was bad or illegal at all. And if we back up a bit, the word "hacker" was coined by the kids at MIT's Model Railroad Club to them, a hack
was simply a playful or clever solution to a technical problem. And the computer hackers of the
80s had their own idea of what a hacker was and it was never criminal. Here's some people at a
hacker camp in the 1980s explaining what they think the word "hacker" means. "Hacker" is just the person who hacks away at the computer keyboard until the program works. Now, cracker, on the other hand, is almost the same thing. He just hacks away at that keyboard, but until he breaks into cracks, the system security on a computer. A hacker never finishes a program. A hacker will get to a point where a program does something and maybe take a deep breath
and say, "How can I make it through this? How can I make it through that?" And I'll just keep working. And a hacker often will show the computer until he collapses in the keyboard or something. They do not have so much the normal friends to distract them. Other activities to go to. They don't generally have girlfriends. Anything that's going to need a larger attachment commitment of their time, the computer is it and only it. That last voice was Steve Wozniak, who we can
easily say was one of the greatest hackers of all time for creating Apple computers. LOD kept out of trouble for the most part, even when they broke into newer and bigger networks. But this wasn't going to last forever. This was going to be the last time the hackers got to enjoy free, unscrutinized, harmless fun. On October 16th, 1986, President Ronald Reagan signed into law an amendment to the CCCA computer crime law I talked about earlier. The amendment
“was called the computer fraud and abuse act or CFA. And this was legendary. This one was important.”
You see, the comprehensive crime control act the CCCA from 1984 only defined a very narrow range of illegal computer crimes. It banned using computers to try to obtain national secrets or financial records or how can a government computers in general? And that was about the just of it. The CFA starts out with a waper of a statement saying, "It's illegal to access a computer without authorization." But wait, it goes on. It also says, "It's illegal to exceed authorized access."
That part, exceeding authorized access is one of the most absurdly broad and legally sloppy phrases to ever make its way into federal law. What does that even mean? Because who decides what's authorized? Because the truth of it is that everyone violates this all day and every day. Because the way it's written means that if you violate the terms of service of an app or a website,
That means you exceeded your authorized access or used the site in a way that...
to do. And that means you just committed a federal offense. So like that lie you put on your dating
“profile. It's against the terms of service to lie on there, which means you're using the site”
in an unauthorized manner. Your company issued you a computer for work? It's for business use only. If you check Facebook on it, that's not authorized activity. Sharing your Netflix or Spotify password with a friend, that's unauthorized use of the service. And I could just go on and on about how many times you've probably violated this. You were used a website in an unauthorized way. Like have you used a browser plug-in to fill in a form or on a job application or when purchasing
concert tickets? That's a violation of their terms of service since you can't use automation when
interacting with the site. Have you played solid hair on a school computer, illegal? You're
authorized to use that computer for educational purposes only. Use the coffee shop Wi-Fi without buying anything illegal? Unauthorized access. That's for customers only. Can you tell I hate the
“CFA? And that's just the first line of it. The CFA effectively criminalizes violating the terms of”
service. Every day millions of people technically breaks this law by doing totally harmless things. And while most people aren't prosecuted, the law gives prosecutors a loaded weapon to easily take someone down. And they do it all the time. The law goes on. It talks about spreading malware, performing denial, service attacks, insider attacks, stealing passwords, altering and destroying
someone else's data. And this law made in 1986 still reigns as one of the predominant computer
hacking laws today. It's poorly written, vague, and outdated, but most of all, it's misused. If you've ever heard someone get arrested on this show, they probably got charged with violating the computer fraud and abuse act of 1986. And what it meant back then for hackers like to LOD was that all of a sudden, a lot of what they were doing was no longer child's play. It was now a federal offense. A federal offense. Did they understand that? Did these guys follow what
politicians were doing in Washington DC? I bet most of them did not have a clue. But more importantly, have you ever met a teenager? The quickest way to get them to do something is to tell them that they can't do it. What's the lesson in your story for other hackers? You don't get caught. Not don't do it. People are going to dare. How do you think it plays to people at home when you tell others simply don't get caught? That's their own business. I don't think it's right for other people
telling me you had to live my life. So I shouldn't tell other people how to live their lives. And yet you acknowledge that hacking is wrong? Smoking is wrong. They can drugs is wrong. People do it all a time. That was Adam, a member of the LOD in September 1988, Adam's friend, another member of the LOD called the Prophet, came across a document that stunk of wrong. He got into a computer at Bell South and was looking at the files on it. Just curiously looking for manuals that might be interesting.
And he stumbled onto a three-page text file called Bell South standard practice control office administration of enhanced 911 services for special services and major account centers data in March 1988. It's a long file name. So I'm just going to call it the E911 file. But it was an incredibly technical and boring document to read. It's just a few pages of the thickest jargon you can imagine. There weren't many people in the country who were able to make sense of this. But the prophet
thought this was something special. Something coveted, a manual for Bell's 911 service. The Prophet grabs his document from Bell South's computer. And again, the ethics of stealing is brought up here. He didn't rob Bell South of the document. He copied the document. And Bell South
“still had their copy and had no idea that he grabbed a copy of it. So is it really stealing?”
The prophet was a little scared of this document. So he stashed it on a friend's computer. And he didn't even want it on his own device. The prophet then shared this E911 manual with Craig Nadeorf. That's white lightning. Craig was one of the founders of Frack magazine. And Craig was like, whoa, and Prophets like, yeah, whoa. And Craig was like, we should publish this in Frack. And Prophets like, I don't know. There's a lot of sense of stuff in here. But together, the two of them
censored out all the extra sense of stuff. Like phone numbers and specific Bell South employees names. And that pesky warning at the top. Not for public use or disclosure. And so on February 25th 1989, Frack published this E911 document under a random name that they made up. I know everyone could see it. It was spreading around all the BBS is an underground. The prophet tried to distance himself from this document. That's why he stashed it on someone else's
Computer.
prophet is who put it there. And he looked at it. And this E911 file looks serious. So he passed it
“onto a friend and his friend agreed and passed it onto AT&T. And they passed it over to Bell South.”
And Bell South was very upset that their manual was exposed. There were two versions, a highly reductive one on Frack and the original one that prophet copied. It made Bell very uncomfortable to see such a highly sensitive document out there in the hands of hackers. By the time Frack published the E911 file, the telephone companies and police were already on high alert for what hackers might be plotting against the phone system. So this made them turn all their attention to Frack.
To find out who is making this and put it into them and who published this article. The worries were validated a few months later. On June 13th, 1989, it was a really weird day for criminals of Palm Beach County Florida. If you had to call your probation officer on that day and you dialed up the number for the Del Ray police station, you'd end up chatting with a lady named Tina. And Tina was a New York and she was a phone sex worker. It would be weird. So you'd be like,
"What? Well." And so you'd hang up and say, "I must have gotten the wrong number." And so you dial the police station again. But again, you would get Tina saying something sexy. Someone had
“rerouted the Palm Beach probation department number to a phone sex line in New York. Which I think is”
pretty funny. I mean, this is classic hacker pranks. Come on, that's funny, right? The cops didn't think it was funny at all, though. Nor did Bell's house. And it was time to put an end to these hackers. Bell long suspected that hackers would come after them. And this was proof that they were able to attack Bell South quickly formed an intrusion task force with more than 40 employees working over time. For weeks, 24 hours a day is security experts rotated in 12-hour shifts running through countless
records trying to piece together what happened, how were these calls being raided to a phone sex line? What they found out shocked them? Someone had remotely connected into the phone company and tampered with the database. They were creating ghost phone numbers with no personal information attached. And nowhere to build to. How dare someone generate phone numbers with no one to build to. Quick, someone tell the secret service how awful this crime is. And so they called the secret
service and told them. And not long before that, the company had introduced a new digital diagnostic program called Remob, short for remote observation. Hackers not only knew about it, they figured out how to reprogram it and take control of it. It allowed them to eavesdrop and spy on any calls they wanted. Ira Glass went into the apartment of one of the hackers who was there in the 80s doing all this. "I've got kind of a lot of equipment around here. I've got a fax machine here. You know, I've got
in my room. I've got five phone lines. I've got a two-line phone, but I've got everything else to connect as computers or fax." There were cheesy kung fu movies on video. On a CD player there was old school rap, nine-inch nails, the doors, Jimmy Hendrix. And then he says, "Let me show you the good stuff." And he pulls that zeroxes of old spiral notebooks. "I have here." What was seized from me? But they had to return back to me.
There's my evidence examination report by the United States Secret Service, subject acid freak.
These notes have basically all the systems I got into.
Look, I have little sketches and diagrams of how things work, different protocols and networks, definitions. So yeah, that stuff was really good. I had stuff outside the country. NASA, there's something different. What is it? Government defense. Government defense. Yeah, that's a Washington number. McDonald's. Since I had telling it, I had McDonald's accounts. If you're a McDonald employee, I can raise your pay.
So that way you get like, you know, $15 an hour for like, shuffling burgers and stuff. So, did you say just at random to help someone out? I didn't do it to anybody. I just wanted to know how.
“Can you imagine that's changing the pay rate of your friends at McDonald's?”
But this guy, Ira interviewed says he didn't do it. However, there was a kid who did. A 16 year old kid in Indiana learned what was needed to get into McDonald's computers. And his friends did work there. So he stole one of the logins for the managers at McDonald's and got access. And he actually gave his friends raises, which was epic. I mean, from then on, that kid was known as the fry guy. Fry guy was immature though, loud, a bit annoying.
He was the kind of kid who would like claim to be an LOD, but actually wasn't. And would never be because
he was a scammer. But he created this crazy elaborate way to steal money from Western Union and credit card companies. It was really intricate. And he would reroute the victims' phone numbers to a nearby pay phone so that when the credit card company would call the victim to confirm a charge,
It would then go to the pay phone outside Fry guy's house and he would answer...
yeah, I do approve that charge. And he ended up stealing $6,000 this way. And he would boast about this on BBS, and people would be like, "Do you are breaking the hacker code stop doing that?" A month after the phone sex prank on July 22nd, the police caught Fry guy and suddenly he wasn't cocky anymore. He buckled pretty quickly under pressure. And he admitted to all the stuff he did. But then he just kept talking. He added like, "Oh, it wasn't all me,
Legion of Doom was doing it too." And this was a story that made sense. In the cop size, the Legion of Doom
were the bad guys. Fry guy offered to testify against the Legion of Doom despite never even being
part of it. And he told the police that, "The Legion of Doom are planning to take out the
“telephone network on a major U.S. holiday. I think it's the 4th of July."”
I'm pretty sure he just made it up to try to get out of trouble. But the cops took him very seriously. He became a golden informant. But this news was every police investigator and phone company's worst nightmare. The Legion of Doom was going to take out the phone company. Man, that would bring America to a standstill. Put your life forth with long ways off. So the prosecutors were starting to think that maybe this kid was just a windbag. And they, again, focused on trying to figure out
who was in LOD and to find them and arrest them. But the LOD was good at hiding. And the cops could simply not find enough evidence on them to figure out who was in it. And would have to wait for someone to slip up. In January 15th, 1990, it was a U.S. holiday. MLK Day. At 225 p.m. Eastern Time, a call routing computer switch at AT&T failed. No problem. There are other switches back up. A single failure is not a big deal. But the failed switch sent a message. Help
me to a second switch. And the second switch didn't help. It failed too. And onto the 3rd,
the 4th, the 5th, the 50th, a cascade of phones switches were all failing one after another. The AT&T network was going dark across the country. In the control room at AT&T headquarters in New Jersey, dozens of screens were stacked two stories high. They showed data feeds, charts, and maps of the U.S. peppered with dots and lines representing phone services to hundreds of millions of people. This afternoon, engineers and technicians watched as red flashes spread
from one screen to another. Around 60,000 people lost their phone service. And this was before the internet. So it wasn't like you could just text someone instead. Businesses froze. Services were interrupted. Conversations and lunch dates were abandoned. Almost 50% of calls
through AT&T failed for around nine hours. More than 70 million phone calls were impacted
“in all. News of this outdated started spreading through all the LOD members. Hey, man, did you hear?”
AT&T is down. Oh, what happened? Nobody knows. Did you do it? Of course not. LOD started to get nervous though. Maybe one of them did do it. If not them. Maybe it was a work of a cyber attack. Maybe someone that they taught. They were puzzle two and worried. And imagine being that U.S. attorney from Indiana that day. For I guy said the LOD was planning a big attack on a major U.S. holiday. And here's a major outage on Martin Luther King, junior day. Was this what the
16-year-old scant predicted? He just got the date wrong? The police thought this must be the work of the Legion of Doom. They were the ones with the stolen telephone manuals hacking the phone companies. And they could reroute calls or mess with the 911 systems. If anyone could take out the phone company, it was definitely Legion of Doom. But was there any evidence? Some initial reports suggested that there might have been a bug in the system. Did hackers exploit that bug or
did they trip over it? Did that matter? The phone companies were down and someone was to blame.
“Nobody really knew. But the police and secret service weren't going to take any chances of”
this happening again. They decided now is the time to strike to take out whoever they thought hacked this system and their number one suspect was the Legion of Doom. But they were going to discover that Legion of Doom was only the beginning. There was a second hacker group called the masters of deception. And this story is about to get way more crazy, not because of the hackers, though, but because of the police who totally got out of control. But you'll have to join me in part two to
hear the rest of the story. Part two comes out in two weeks.


