Darknet Diaries
Darknet Diaries

169: MoD

1/20/20261:06:3612,585 words
0:000:00

Legion of Doom, step aside. There’s a new elite hacker group in town, and they’re calling themselves Masters of Deception (MoD). With tactics that are grittier and more sophisticated than those of the...

Transcript

EN

This story picks up for where we left off in part 1, so if you haven't heard ...

you need to go back one episode and listen to that one before listening to this because this is part 2.

These are true stories from the dark side of the internet. I'm Jack Recyter. This is Darknet Diaries. This episode is sponsored by ThreatLocker.

Defenders are always on the back foot, you have to be ready for attacks from all directions,

constantly trying to stay one step ahead of new techniques. But then all your efforts come crumbling down the moment the wrong set of credentials are compromised. This is why zero trust is quickly becoming the future of enterprise security, but implementation is where most teams get stuck.

So ThreatLocker has designed an event to close that gap from March 4th to 6th,

zero trust world will be taking place in Orlando, Florida, and it'll be one of the most interactive cybersecurity events of the year. There'll be opportunities to get involved with hands-on hacking labs, attacker technique walkthroughs, and deep technical training focused on how default deny at execution, stop some merging threats before they can run.

This is a conference for people who actually work in security not just talk about,

and as a Darknet Diaries listener you can get $200 off your pass with the code,

ZTW Darknet Diaries 26. Register now at ZTW.com, that's ZTW.com, and use code ZTW Darknet Diaries 26 at check out for $200 off your pass. This episode is sponsored by Red Canary. Red Canary is a leader in managed detection response, also known as MDR. They serve companies from every size and industry focusing on finding and stopping threats

before they can have a negative impact. As the cornerstone security operations partner for nearly 1,000 organizations, they provide MDR with industry leading threat accuracy across identities, endpoints, and cloud, and a world-class customer experience. For more information about Red Canary visit RedCanary.com, that's RedCanary.com.

The New York telephone company was the face of the phone system in New York City in the 1980s,

whether you were in the New York Stock Exchange, making phone calls, or walking up to pay phones

in the streets of Manhattan, you were using the New York telephone company. And there were two guys who worked there that were in charge of securing the system, Tom Kaiser and Fred Staples. Tom and Fred each had their own specialty. Fred engineered the phone network infrastructure and Tom oversight. If you broke into the system, it was because Fred overlooked some sort of vulnerability,

and then Tom was the one who had to catch you. Their jobs became infinitely more difficult and interesting when a strange letter arrived at Tom's Times Square office in November 1988. It stated that a kid, up in the Bronx, was hacking into the phone grid who was calling himself the technician. The letter wasn't signed. It was an anonymous tip, but Tom suspected it might have been written by a family member of the technician,

because the tone was caring. It was a plea to stop this kid for his own good. Sure enough, when Tom pulled up the records associated with the technicians address, the proof was right there. Technician had been connecting to switches at AT&T from home with no real attempt to hide it either. Tom turned to a nifty device that he had, which was called the dialed number recorder DNR. A DNR is a little box that you might

mistake for an answering machine or a tape recorder. Tom had some small black DNRs that clicked clacked and spat out some paper tape when they were triggered. But these were exactly wiretaps. They couldn't record the contents of what anyone said or typed what they could do is record the metadata, which number connected to which and for how long it was a DNR device that led investigators to catch fry guy. Maybe that same device will be useful here to find out what

this technician guy was doing. And there's an interesting thing to point out that if the police wanted to do that, they would need a court order and approval from the judge to conduct a wiretap, but if the security team at the New York telephone company wanted to do that, they didn't need a court order to monitor the activity of one of their customers. They're a private company. They can do what they want. So Fred and Tom were able to use this DNR phone monitoring tool without

any red tape. A couple of things stood out in the data. First, there was a clear evidence that

this technician was hacking into something called a dial hub, which was in the New York telephone network. The dial hub had just been invented that year and it was pretty new even for Tom and Fred and they even had to ask, "What is this thing?" It was essentially a remote access point into the entire New York telephone company computer network. Employees had a password

That they could use to log in from home to reach whatever system they needed ...

Somehow, this guy, calling himself the technician, had not only learned about the dial hub,

but obtained a log in token for it, meaning he could use it as if he was any employee in the company.

What's worse? Is that Tom? Can it keep track of him once he got in there? This was serious, and this was where Tom's second interesting discovery came in. Over time, whenever the DNR started chirping, Tom would get up from his desk, rush over to it, and read where the technician was calling. Over time, a pattern he merged. First, this Bronx hacker would dial into the phone company network, and he'd hang around there for a bit, do his thing, and then he disconnect,

and then he would always call a phone number after that, which routed to a middle-class

Queen's neighborhood, and it was the same number every time. This call would last for a bit, and then he'd disconnect and check in with Queen's again, and so on, and so on, and so on, back and forth into the phone company, called to Queen's, into the phone company, called to Queen's. Tom and Fred had a guess that the actual brains behind this operation might be in Queen's,

and they looked at all the call records to that number that was going to Queen's,

and they noticed that there were a few other calls that came into that number in Queen's quite often too, and they were able to trace these calls, figure out whose numbers they were, and this led them to discover to other hackers. One was corrupt, and the other was outlaw. Why were so many hackers calling this number in Queen's? Who were these guys? Maybe members of the notorious Legion of Doom? Everyone knew Legion of Doom at the time. The number in Queen's

was registered to a red brick row house. It belonged to Charles Abbeyn, a middle-aged man, who was a school custodian, actually an officer in the school custodians union, not a very likely person to be a hacker, but Charles Abbeyn's son was a teenager who spiked up his hair, he kept terrible bedtime hours, and got a lot of stomach aches. His name was Mark, but online and throughout the country, Mark was known as fiber optic, a notorious hacker.

And even compared to the other members of Legion of Doom, Mark was really good at hacking,

probably too good. Maybe the best phone system hacker in America, no, on the planet. Maybe ever actually, from the compact TLS 80 on his desk, in his tiny bedroom, Mark ingested enough knowledge to outwit even the technicians working at the phone company. He wasn't just flew it in the New York telephone system, but also the 9X, the packet switching networks running all the way up and down New England, basically he had encyclopedic knowledge of telecommunication systems, and he can name

pretty much any of them. He could run off the most obscure details about any random machine or protocol, of course he could play you to call anywhere in the country without paying a scent or triggering any alarms. That was the easy part. When Mark, aka fiber optic, was on a BBS, other hackers listened. He likes sharing his knowledge and the reputation that afforded him, but don't you dare cross him. It was easy enough for him to cut your phone service or overload it with endless calls

or much worse. As I researched this story, the whole earth catalog kept coming up and up, and I didn't really know about it before like I heard about it, but I didn't really look at it,

but now I got a copy of it and I'm looking at it and it's like amazing. It's like one of my favorite

things now. You know what, I'll let Steve Jobs tell you about it. When I was young, there was an amazing publication called the whole earth catalog, which was one of the Bibles of my generation. It was created by a fellow named Stuart Brandt, not far from here in Menlo Park, and he brought it to life with his poetic touch. This was in the late 60s before personal computers and desktop publishing, so it was all made with typewriters, scissors, and

polarite cameras. It was sort of like Google and paperback form, 35 years before Google came along. It was idealistic, overflowing with neat tools and great notions. This catalog is amazing. It's filled with really helpful articles like how to build a shelter or water pump, and it also has glimpses into the future and technologies and ideas for structures and systems. And sometimes there's theoretical things in here, sometimes it's practical,

but there's just a ton of wonderful unique ideas on how to navigate the modern world. In Stuart Brandt, the guy who made this, took a big fascination with computers and especially hacking. He spun up his own BBS called The Well, which stood for whole earth electronic link. It became the place to post helpful information, to post things that were culturally relevant at the time. Things like tech, art, and politics, but also significantly highlighting counter-cultural movements and

ideas that were areas for niche hobbies and sharing software. At the core of it was self-empowerment

and open dialogue. The Well was the internet's first real online community. It attracted journalists

and artists and activists and poets, and yes, hackers. Like Neil Stevenson would pop in there from time to time, Craig from Craigslist was there, and that's where he got inspired to make Craigslist.

The Well was the birthplace for a lot of the internet culture and norms that ...

One more time supporter of hackers, his stored brand, editor of the whole earth catalogs.

They are shy, sweet, incredibly brilliant, and I think more effective in pushing the culture around

now in your good ways than almost any group I can think of. To make his point, Brandt invited 100 top computer designers to an exclusive hackers conference in this occluded campsite north of San Francisco. Despite bad weather and crude living conditions, the camp was a true hacker heaven. Well stocked with plenty of computer toys and of course, enough candy and soda to last through the night. But the real purpose of the get-together was to discuss the unique set of values

that made the computer revolution possible and brainstorm about its future. That last guy talking was John Perry Barlow, who at the time was a poet and essayist and lyricist for the grateful dead. And he stayed true to that mission. He did, in fact, go and publish a declaration of independence of cyberspace. I'm not going to read to you the whole thing, but let me at least quote to you the opening paragraph of this. "Governance of the industrial world,

you wear a dry-ance of flesh and steel. I come from cyberspace, the new home of mind. On behalf of the future I ask, you have the past to leave us alone. You are not welcome among us. You have

no sovereignty where we gather." That's quite an opening for a declaration, right?

John Perry Barlow is a bit of a badass if you ask me. Okay, so Harper's magazine, this was a mainstream magazine at the time, which was covering things like politics, culture, literature, it had a thought-provoking essays in it. And one thing did regularly was featured article that they called the forum, where like three to five contributors would all try to answer big questions like, "What do we owe the planet?" And is the American experiment failing? And the contributors would try to

provide high-minded thoughtful responses? Well Harper saw that these computers were rising in popularity and saw that a lot of great thinkers were gathering there on Stuart Brands, BBS, the well,

so they decided to run their very first virtual forum, basically a live chat room on the well,

where they'd ask users, big questions to get the conversations going for the magazines. Questions like, "Do we have a right to privacy and should hackers respect that right?" What ethical considerations arise when we become more connected digitally? So in December 1989, Harper's magazine held this virtual forum, basically an open chat room for anyone to respond to on the well. John Perry Barlow was there, Clifford Stoll was there,

Steven Levy was there, a lot of influence from people who actually were watching the chance, even some notable hackers like Mark, aka Fiber Optic. And Mark's friend, Ely, who went by the name Acid Freak. But the internet did with the internet does, and it didn't quite fit into the high-minded discourse that Harper's was hoping for, instead the place turned vulgar, immature, insulting, and yeah, lots of ASCII art was posted. In fact, the participants

flooded the chat room with over 100,000 words during the forum. John Perry Barlow thought he was on the hacker side, being libertarian and kind of punked by nature, and really was into computers himself, except these guys were just too annoying on the well, and not at all receptive to the simple arguments that hacking was troublesome. At a heated moment in the chat, John Perry Barlow wrote that quote, "With hackers like Asad Freak and Fiber Optic, the issue is less intelligence than

alienation, trade their modems for skateboards, and only a slight conceptual shift would occur." Asad Freak and Fiber Optic didn't like being called out like that, and they replied, "Yeah, some pair of balls, comparing my talent with that of a skateboarder. Huh, well, this was indeed boring, but nonetheless, Fiber Optic then somehow found a copy of John Perry Barlow's credit history and posted it to the forum for anyone to see. Like, what a crazy thing to drop

in the middle of chat, right? Just someone's credit report bam. Well, that spook, John Perry Barlow, he later wrote about how he felt when he saw his credit history posted like that. He said, quote, "I've been stuck in redneck bars, wing, shoulder-length curls. I've been in police custody while on Asad, and I'm Harlem after midnight, but no one has ever put the spook in me quite as Fiber Optic did

at that moment." It never took anybody long to realize that Mark, aka Fiber Optic,

was the best hacker they knew. And that's how he got in to the Legion of Doom. He borrowed

a password from a friend, and then he navigated to the section where members discussed phone Freaking and thought, "These guys are a joke. Sure, they have a few old technical manuals that I could be sighted by sleep, so he started flooding them with new information, sort of like,

All knowing God.

he liked the attention that people were giving him, who thought he was amazing. And that's how

Eric Bloodax felt about Mark. This guy who went by Eric Bloodax was a short guy with a go-ty and

grungy-long blonde hair and hung out in the LOD forums. Bloodax was a member of the LOD, but Mark Mark said he was, and he was in the forums that it was members only, but he wasn't listed as an actual member. It's like he hacked his way into the group. Well Bloodax was confused, but quickly realized how good Mark was. A few weeks later, Mark was officially voted in. Bloodax respected Mark as a really great hacker, but he didn't really like Mark. He didn't

like how Mark would trap hackers who would talk a big game, and then he would totally embarrass them with his superior skills. And then, one day in 1989, he got a call from Mark,

Mark wanted a back door that he knew Bloodax had to the 9x packet switching network,

but Bloodax was like, "Well, what are you going to give me and return?" If I give you this, exploit, what are you going to give me?" And Mark just hung up and called Bloodax his friend, and told Bloodax his friend, "Hey, Bloodax wants me to have the back door into 9x. Can you send it to me?" And the his friend did send it to him. And then Bloodax found out about this and called Mark back. Bloodax was mad, but Mark wasn't having it. Mark just told him, "I don't know,

you shit." And Bloodax was like, "Whoa, excuse me? I don't know, you shit. I didn't get it from you. I got it from Bob. Fuck you." And Bloodax was like, "What? Did he just really curse

out a member of the LOD?" Mark said, "I don't have time for this." And hung up. And that's how

Mark aka fiber optic got kicked out of the legion of doom by tricking Eric Bloodax's friend

and then giving him an exploit and then cursing out Bloodax. The two clearly didn't get along. Mark figured whatever and shrugged it off. He could run circles around anyone in LOD. All around all of them, combined. If they were ever cool, they definitely weren't anymore. He was convinced that the legion of doom has been, and he wasn't the only one who thought that. In the last episode I told you about this guy, Paul, who was trying to get into computer,

but all he was getting was S's and W's back, and then he blew into the phone, and Halves said he was in. "Well, last we left him. He broke into the phone company, gave us front free three-way calling." And he told this front Eli about this, who's also known as acid freak. And Eli figured this must be a switching control center system of SCCS. And so acid

freak was like, "Oh, that's really cool. We should we should show this to Mark. Okay, fiber optic.

See what he's has to say about this." So they decided to call him up. Eight. What you want, Mark asks. He gets called all the time by a lot of hackers. Paul and Eli were bit intimidated, but excited. So they told Mark that they think they got into an SCCS, but they don't know what to do. You think or you know Mark asked. Paul handed over the information and Mark checked it out. Mark quickly figured it out. It wasn't an SCCS. It was a telephone switch,

specifically a DMS 100 switch. Mark got back on the line. It's not an SCCS. It's a DMS 100. Of course, the system Paul had been trying to figure out for well over a year now. Mark identified in seconds. But Mark was sort of impressed that these two guys brought this to him. And asked if Paul and Eli wanted to meet up. It started with the three of them getting together at Eli's house. Mark did the typing and explaining Paul and Eli watched. And when they got hungry,

they went to the mall. Mark liked to eating the mashed potatoes at KFC because they called the stomach. It was fun, but Eli had bigger plans. He wanted to recruit more hackers to their little club. Like this hot shot kid that they heard about just down the road. They were talking about a hacker calling himself corrupt. Who's real name was actually John Lee. He was a black kid who lived with his mom in bed style, which is a neighborhood in Brooklyn. And this was back when

it was hardcore. Like John was in a gang and not like a cyber gang, but an actual gang where guys robbed and sold drugs and stuff. IRL. But from a little beta Commodore 64 in his cramped bedroom, John Lee was a savant. Eli kept talking saying that John Lee's specialty is Vax computers. And these things have way more hard drive space, more CPU power than anything most people touched those days. And Vaxes were popular in large businesses and universities. Some of the best

secrets in cyber space were kept on Vaxes. He liked called John on his phone. John was impressed what? How'd you get my number? Do you want to join our hacker club? Hmm, I'm interested. So John then came over and he brought his friend Julio, who's hacker name is Outlaw, and he lived in the Bronx and he was barely 15 at the time. And so this new hacker collective was starting to form. The best of the best hackers in New York City were all coming together. There was

Mark aka fiber optic Eli, which was going by acid-freak Paul, who was Scorpion, John Lee, who was corrupt and Julio, who called himself Outlaw. The place they started meeting at was at the City Corp Center. 601 Lexington Avenue in Midtown Manhattan. It's one of the funciest skyscrapers

You'll ever see and makes no sense architecturally.

City Corp Center was home for some of the big-time companies like City Bank, of course. IBM,

law firms. But once a month on a weekend at 6 p.m., a totally different demographic would emerge

from the Grimy Subways, young men and oversized jeans, skateboards, sneakers, and backwards-based ball caps would come into the City Corp building. Because this is where the 2600 meet-up would happen. 2600 is also a hacker magazine, which would host local meet-ups in different cities. It's fracks most well-known counterpart. Readers brought stuff they'd find from their spoils, from dumpster dives, and their latest stolen passwords. They traded knowledge and they

would mess with the pay phones in the atrium, like trying to get free phone calls on them or dial

someone to social engineer them. And of course they always found ways so they didn't have to pay

for it. Somebody would know the right number to call to avoid a toll or they bring a blue box or something. And at this 2600 hacker meet-up is where Mark, Eli, Paul, John Lee, and Julio would meet-up. They enjoyed showing off what they learned, and they learned new things from other hackers.

They'd talk shop, they'd get info, they'd show off their tricks, and network with other hackers.

For the most part, the people who came to the 2600 hacker meet-up didn't have any intent of causing destruction or making money. Everyone was all just so curious. I wanted to know how computers worked, and find really clever ways to do things with them. It was sort of the essence of what they were all about. They shared the Legion of Doom's moral code, no-making money, no-causing harm, but they were also cut from a different cloth. They weren't just as good,

no, they were better than Legion of Doom, definitely better. And a bit tougher, too, not like those guys in the suburbs, like nice computers and drove cars, these guys pulled together, salvaged and scrapped computer parts, to build things. And they rolled the subway. I reglass was able to interview Eli on this American life in the early 90s,

and it's an incredible view into what these kids were doing then. Here, listen.

We did this from payphones, we have a lot of payphones. We get into the computer first, liberate one phone, liberating meaning, make it so that you don't need quarters for that payphone. You just pick up and die like a regular house phone, so that way we can make in this amount of phone calls without print quarters. Next step was to get into the network, find a session that was already going, and then knock them off while they were connected, and then sit there watching them.

In other words, put us in their place, in the place of the computer that we're going to connect to. So next time they try to log in, they would get our computer, and we'd type in login, and they'd put in their login account, then we'd go password, you know, the password,

they'd put their password in, and then we would have, you know, all these things were already

encoded in one key, so we could just hit one key, and you know, it wouldn't look like we were typing it. We would log in with just a peer, we'd pass it on. We'd hit the password key, we'd pass it on, then we'd say login incorrect, and then disconnect from them, but we already got their login password, and then when they reconnect, they would be the regular system, so they figure, hey,

I mean, it would stay typing it in or something, and that's how we would get an account.

It was like, it was funny, you know. You get into things that are good, you start targeting systems that are interesting, and you start developing a collection, it's like baseball cards, I have NASA, I have, you know, NSA, I've got phone-cuff-in-e-computers, I've got Mizer, I've got Cosmos, I've got this, I've got Diamond Donald Douglass, Mariam Marietta, you know, TRW, CBI, Trans Union, what else can I get,

you know, you try to get the big names, you know, so you start developing a collection, you know, then after a while you came fun to like look up famous people, let's look up John Gotti's credit, you know, let's see what he owns, let's look up Julia Roberts, you know, let's get a home phone number, let's get this guy's home phone number, we're just so excited we were getting all that stuff, and there was just a rush, you know, it was the flow, you know, once you start going you can't

stop, you know, you're just steam rolling one after the other, the flow gets you going and then you're just like yeah, we rule, you know, where it breaks down all barriers, nothing could stop the flow, if you got the flow, you could conquer everything, this is what people call being in his own, you know, once you're in there you can't stop, it's the juice. That was Eli talking about with him, Mark Paul John Lee and Julio were doing a new York City back then,

it was a golden time, and Paul came up with an idea, he said it should give their little hacker group a name, like MOD, which was a joke, like LOD, but one letter higher, MOD, did it stand for anything? Nah, who cares? Wait, okay, it could, um, masters of disaster, no, masters of deception, yeah, and so a new hacker group was born, masters of deception.

If anything, it's surprising how little they did with their power of computers.

It was mostly pranks, making somebody's phone ring continuously, turning an enemy's home phone line into a pay phone line, so when the guy picked up his phone at home, it demanded that he deposit a quarter, you know, because there's no way you could do that because it's his home phone. They did actually call Julio Roberts once, they called Queen Elizabeth, too, but there's an emptiness at the heart

of a lot of these stories. Once you've got the Queen on the phone, you know, what he say?

She's like, "Hello!" You know, she's talking to us as stuff, and we don't know what to say. Hi, we're calling from the United States, and this is that, and she knew what was off. It's like, "Okay, hello!" And she said, "Goodbye!" And that was it. You know, we didn't know what to say. What do you say to the Queen Elizabeth? You know? Hi, so, you see that movie? True lies. You know, what do you say? You know, it's just like the fun of it is finding the number.

And probably ask her what kind of computer she has. I mean, she's the Queen. She's got to have the best computer in the world, right? We're going to take a quick ad break here, but stay with us, because when we come back, everything's about to get crazy. This episode is sponsored by Maze. Security teams are drowning in vulnerabilities. 40,000 common vulnerabilities and exposures at Kasev's dropped in 2025 alone.

With attackers being able to exploit new volums and days, not weeks, our backlogs are ticking time bomb. Engineers do not have enough time to manually triage them all, but what if they did? That's the question Maze was created to answer. Maze uses AI agents to triage and remediate cloud of vulnerabilities. Traditional volums canters use rigid rules like if CVE is on a publicly exposed asset,

make it critical. But that's silly. Maze tells me that roughly 90% of vulnerability alerts

are false positives in the first place. Maze's AI agents investigate every vulnerability in your cloud the way your best engineer would. Figuring out what's actually exploitable, not just what's theoretically risky, they remove the noise, prioritize volums that matter, and manage remediation. So your team stops wasting time on meaningless volums. So check out Maze at mazehq.com/darknet to learn more about AI vulnerability management that works. Maze is spelled MAZE. MazeHQ.com/darknet.

Now all that was brewing in New York City right before that big phone outage in AT&T that happened

on MLK Day in 1999. Right where we left off at the last episode, remember the one that caused

millions of calls to knock us through that one that made the police and secret service going to full panic mode. Yeah, LOD was their initial suspect, but maybe this new group MOD had something to do with it too, right? The police didn't necessarily know of masters of deception as their group name, but they definitely were tracking these people individually. Why? Because Tom Kaiser and Fred Staples, the engineers from the New York telephone company were on to them. They were watching their phone

calls and tracing numbers around that number. They kept calling in Queens. That was Mark's number. And the people calling it were Paul Eli, John Lee and Julio. The New York telephone security team was watching all these kids hack into phone systems all over and called the police and the police called the secret service who was already working with Bell South to try to catch hackers.

Bell South cracked down hard on Adam and the others. Even though it acknowledges they never

disrupted phone service or changed any customer accounts. We don't care what the motive may or may not be. Scott Ticer is a corporate spokesman for Bell South. We are not talking about Wallie and the beef much less at a Haskell. We're not dealing with a bunch of mischievous pranksters playing in some high-tech toy. This is a crime. Bell South is just one example of a company stalked by hackers. In a recent New York case, members of a club known as the Masters of Deception

were indicted, accused of hacking into institutions like the Bank of America, Martin Marietta, the Civic Bell, South Western Bell, New York telephone, TRW, Information America and New York University. Jeez, well, a list and the police were trying to piece all this together and trying to figure out

who was doing what? But that's a huge list of companies. How did they get into all those things?

Partly thanks to Jason. Jason snick her aka Paramaster and his strange magical backdoor, a backdoor. That was bigger than any backdoor I've ever heard of. This is another one of

those parts of the story that's so crazy that I didn't even believe it at first but in preparing

for this episode we managed to find and get a hold of Jason and he confirmed what really happened. The story dates back to 1988 when Jason was in high school. He got curious with his modem and

Computer and then I'm getting into a bunch of computers at City Bank.

system that was used to mint debit cards for different banks and Saudi Arabia. He saw this and

tried to mint his own cards and yeah, he was able to use the City Bank computer to create 10,000 new debit card numbers which were all valid since they were in the bank's database. And you know, sharing is getting he couldn't even use a fraction of these cards so he just spread him around and all the hacking forums and now suddenly everyone had their own blank check from the bank. He worried that he might get caught for that but that wasn't his biggest worry.

The way he'd gotten into City Bank in the first place was this backdoor he had and the back door got him into a lot of other places too places in cyberspace that no ordinary person should go. He saw stuff, military secrets, a killer satellite that could cut up Soviet satellites with a

laser, top secret stuff. He wondered if he saw something so important or so top secrets that

if they found out that he saw it, they would delete him because doesn't the government try to make people disappear that they don't like? Even today, almost 40 years later, Jason talks about what he found with some feeling. He told us about a press release that he saw for that

satellite with information about a laser system that never became public. He sent us this ominous

message, quote, "when you could show what is being changed to withhold information, what might the government be protecting?" Just imagine he's being your problems as a teenager. I remember when I was that age, I would get a bad grade in school or some girl wouldn't like me or something and that felt like the end of the world to me. But for Jason's Nick Curry, he was stressed out, simply by knowing things, top secret things that the government didn't really want him to know.

So, he decided to split out of there from California and move to New York, Kony Island. But now, New York State Police were starting to get suspicion of what hackers were up to, and an officer went to spy on the 2600 hacker meetup in the city court building.

Yeah, a cop came to the hacker meetup to try to look around, but luckily Jason wasn't there

to accidentally reveal like what he saw in the military's computers. Because he wasn't keeping these secrets to himself, like while he was in New York, he met up and hung out with John Lee at Grand Central Station. And in a deal, over the phone, he traded his back door to Mark and then almost immediately after that, he got arrested and was brought to court over the

all those stolen credit cards. So, what was this back door that he gave to John Lee and Mark?

Well, it was a back door to let you in a huge network. It would get you into the lowest most inner core of time net. Time net was an international communication network before the internet that we know today was invented. It serviced the kind of organizations that needed to perform heavy duty, possibly international communications, government agencies, large companies, that sort of thing. Today, of course, the idea that you could use a back door

to unlock the core of the internet is ridiculous. But on time net, it was possible because while there were a lot of companies using time net and connected to it, time net itself was operated by a single company. Someone had to manage the infrastructure for it and so it was a centralized network that was a computer which was a supervisor that could oversee the whole network and that's what this back door gave the Maxis 2. They were in a supervisor level of one of the biggest

networks in the world at the time. Jason had managed to get access to this through a network engineer in the company's internal network and he told us that it allowed him to drop right into their shell and he stole time net's source code which was proprietary at the time. This was

about as deep as you could possibly go. And honestly, even now I have questions about this thing

when we asked for specifics, Jason described it more like a numerical algorithm than code, so complicated that he claims even Mark couldn't figure it out. Mark who could figure out anything. Whether he understood or not, for Mark, this magic access must have made him feel like Dorothy stepping into Oz. You know that famous scene where it's black and white and then the screen suddenly fills with color. Mark had a whole new system to explore a whole new network to explore

and so many computers were on this and he was going to master it. And boy did he? The sugar rush that came with hacking company after company. Mark found some of Timeness's own PDP 10s and these were big, whole campaign frames that were used to store administrative manuals and a bunch of other stuff. Administrative manuals might sound boring to you, but to Mark and M.O.D. these were priceless instruction guides for how to go further and further into every corner of the internet

at a certain point. Mark literally couldn't go any deeper. Where time nets staff might only be able to see what's relevant to their jobs and time net users could only see what's on their own networks. The masters of deception could see it all and access it all too. He was tapped into the

Matrix.

this back door. They could easily find their way into a ton of interesting networks. Spying on

any person was simple too because the companies that held everyone's personal information were on time net. Through them, you could look up yourself, your rival hacker or Julie Roberts to see her finances or her phone number or even wishing lived. At this point, the masters of deception must have felt unstoppable. Mark, John and Julio would watch time nets administrators as they changed their passwords or they could read the time net security department's emails to

could anticipate anything that might threaten their access because they knew about new security features and plans before those features and plans were even implemented. Now, remember when I talked about Esquire magazine interviewing the guy who made the blue box in 1971? Well, at one point, Esquire interviewed someone from the masters of deception and said, "Hey, if you're really good as you say you are a prove it, hack into the White House right now." And the story goes that M.O.D. members

hacked into the White House in front of Esquire reporters. That's how wild the time it was.

The masters of deception were the most powerful people in cyberspace.

Legion of who? Oh, yeah, I almost forgot about them. Because by this time, by at least some accounts, the Legion of Doom was dead. Like Frac Magazine published their obituary on May 28, 1990. "The Legion of Doom will long be remembered in the computer underground as an innovative and pioneering force. No other group dedicated to the pursuit of computer and telecommunication knowledge has survived longer and non-probably will. The Legion of Doom, from 1984 to 1990."

And quote, "The article ended with a list of all the L.O.D. members and when they'd laughed and why they laughed, like it was some kind of memorial. The Prophet, member from 88 to 89, reason for leaving bus tacking. Fiber optic 89 to 90, New York, reason for leaving bus tacking.

Which, that's not actually too mark, or a fiber optic, got kicked out, remember?"

You know whose name is not on here is Eric Bloodaxe, whose real name is Chris Goggins, or his sidekick Scott Chasin, which is Doc holiday. And it makes me wonder if this obituary was some kind of power move or a prank? The author was blank. And it's very curious because eight days earlier, L.O.D. released an article which said, "We are still alive." Let's lose the road it. And it says, "If you believe the rumors, L.O.D. has been dead many times,

but that's again untrue." But in reality, due to the C.F.A. being passed, and the major outage at New York arrests were starting to be made on hackers all over. Three days after that major outage at AT&T, on January 18th, 1990, two agents from the U.S. Secret Service, a security employee from Southwestern Bell and a security guard from the University of Missouri knocked on the door of a Frac House, and they found Craig Nightorf, aka Night Lightning, the co-founder

of the notorious hacker magazine, Frac, and accused him of crashing the AT&T phone system. They arrested him and took all his computers and took him into custody. Craig seemed pretty surprised

that the secret service was arresting him. Yeah, he could have done it, sure, but he swore he didn't

and he would never do that. Any fight that Craig had in him, though? Disappeared when the cops

confronted him about the document that he posted to Frac, the E911 file. In a four-hour interrogation, he admitted to publishing it, and he agreed to cooperate with the investigation. And did all happen for the profit, the guy who originally copied the E911 file from Bell South, he also got arrested by the police and the secret service, and they were both charged on seven counts relating to stealing and posting this E911 file. They even told the parents of these guys

"Your son has caused billions of dollars worth of damage." He scratched the AT&T network. Eventually, almost every LOD member, either got busted or gave up. Let's lose her, announced his retirement. He's the one who started LOD. Here's Mark again. There was a lot more government involvement in the hacker, running around in general, and because of that fact, two things happened. A lot of people who had not gotten in trouble yet

didn't want to risk anymore. They were already older, particularly at the older generation of hackers. Some guys that I knew who started LOD, for example, with Drew from the hacker underground, simply didn't want to risk getting in trouble anymore. Now that the climate had changed so much, other hackers, a few, let's say, thought that it might be good to go in the other direction and attempt to gain cloud with the government and tell co-security by inviting them onto a bulletin board

that was set up under the auspices of creating a dialogue between hackers and security people

The FBI and secret service.

but the FBI thought it was great because it gave them a chance to chat with hackers and then

arrest them. So while people from LOD were being napped by the police and others were scattering,

it looks like LOD was dead. But it wasn't entirely, there was one person who was trying to keep it alive. Eric Bloodaxe, aka Chris Garbons. Eric Bloodaxe would be a really great idea to try to bring back LOD to what it was. In the absence of any real leadership in the group anymore,

because anyone who mattered anymore had withdrawn, he basically appointed himself leader of the group.

And he had ideas to take it in a new direction. Bloodaxe himself was a long time member of LOD and was an editor, a frac too, so he suspected the police would come after him too. And they did. On March 1st, 1990, his off-campus townhouse at the University of Texas was rated at six in the morning, but he was expecting them. So even though there were six armed policemen in his bedroom, bloodaxe was pretty calm. In fact, he basically staged the place for them,

like he left out a brochure, that he knew they'd see. And it said, "How to become a secret

service agent." One of the agents, rifling through his stuff, grabbed it and asked him about it. Bloodaxe told him that, "You know, maybe when all this is over, I can help out." He actually had been thinking about switching sides for a while now, and he picked up the idea

from a book called Fighting Computer Crime, released in 1983. But Bloodaxe always held on to the belief

that there shouldn't be any destruction when it comes to hacking. So they didn't find much evidence on him committing crimes, other than he was a member of the Legion of Doom. And they let him go without any charges. Bloodaxe tried making a BBS to bring together hackers, security teams, from telco's and police, but it didn't go well, and it closed up. He then decided to start a business to try to advise companies about hacking from an office in Texas. But he was doing more than that.

There was a great amount of disagreement and dissension within LOD in the late 1980s because

of the fact that there was informing going on several people, several members of the Legion of Doom had gotten busted under mysterious, let's just say, mysterious circumstances. People that we knew people that we were affiliated in other countries, for example, a hacker group in Australia, were busted under suspicious circumstances, which all led to a certain individual that we old, no one loved in Texas, who had started one of the first hacker consultancies under the

auspices of gaining cloud with the FBI and telco's security. The person I'm referring to is Eric Bloodaxe in case it wasn't clear to anyone in the audience. Bloodaxe started a company called ComSecDataSecurity. It became known to even other LOD members who were wondering if I had heard anything about Eric Bloodaxe because they were concerned for their own safety. When they heard about what happened with some hackers in Australia and others and suspected that he was involved,

but he was trying to gain cloud with the government to bolster his business and in doing so was turning in hackers. When hackers found out he was doing this, they began harassing him at his business and so on, which is, you know, what hackers do in general and certainly someone who's informing on other hackers is going to earn the wrath of other hackers. From the city-corp atrium, everyone who could would pick up a pay phone and start calling the ComSec phone number. It was a denial of

service attack, if you will, which tied up the phone lines. It made it so nobody could ever get through to ComSec. And that will last all day and so people got bored and had to go eat dinner at like 830 or so. A legendary hacker feud was starting to stir up LOD versus MOD, but Eric Bloodaxe from LOD could handle all these prank phone calls. This wasn't a big deal to him, so no shots fired back yet. LOD would sometimes host conference calls to chat about what was happening.

John Lee, aka corrupt, a member of MOD, would hear about these calls and join in and when did he jumped on the call and introduced himself as "Dope Fiend" from MOD. And someone shouted, "Get that in, where it off the line!" John Lee was black and took a fence to this. Bloodaxe

would always deny that he was the one who said it, but we called John and John knows what he knows.

John Lee and his buddy Julio joined more of these LOD bridges, but they listened in silently after that without introducing themselves and they heard it again. The slurs that the Texan hackers would use to refer to them, these definitely were not slips of the tongue. So John Lee decided to make Bloodaxe's life hell. He and Julio pranked him incessantly, taunting him, dialing again and again over and over and just hanging up. But still, Bloodaxe kept his cool and didn't do anything back.

Remember earlier in this episode I told you about a super secret file on LOD's Fifth Amendment

BBS, it allowed anyone to hack into the PBX system developed by the company c...

and even LOD members were explicitly instructed to never copy it. Well John Lee got into the Fifth

Amendment and he stole the file and he spread it to other BBSs around the country just to spite LOD. And now Bloodaxe got mad that John took this file and spread it. So in return he took a copy of the history of MOD, a file written by Eli describing the group and how it came together and ran it through a program that converted it to Gye of Language like a comically racist impression of the original text which he then published to the world and everybody knew who he was trying to

annoy. There was only one black hacker in MOD. John Lee then took a shot at Bloodaxe's sidekick, Scott Chasin, by publishing his mom's credit history, phone number and home address on a popular BBS. Now as a bonus he even included some sexual commentary about her. Then Eric Bloodaxe got a password to MOD's BBS from a guy who really didn't like John and this spat just kept going up and up and John Lee wanted to take it a step up. In the summer of 1991 from his humid air condition

this apartment in Brooklyn he wanted to mess with Bloodaxe even more by tapping his phone. He wanted

to get in Bloodaxe's head first. He broke into southwestern bell casually like he's done a

thousand times before. Then he connected to a switch that controlled com sex phone line, which is Bloodaxe's official line. Using computer commands he asked the switch if the line was currently in use and it was. So he tapped into the call and spied on what they were discussing at com sex. What he heard was a call where Eric Bloodaxe was talking to Craig Nightarfe aka Night Lightning, aka the co-founder of Frack Magazine. At the time Craig was as famous as any hacker in the world

was. The kind of guy Bloodaxe was probably wanting to impress. Craig was calling com sex for help. He was getting harassed with constant phone calls lately and he was fed up. Bloodaxe felt his pain.

He'd been dealing with the same problem. He's like, you know who corrupt is?

Okay, John Lee? Yeah, well, it sounds like something he would do. A minute later, Bloodaxe got a call on another line and he told Craig, hang on just one minute, hello? Yeah, that does sound like something I would do. Click that was badass. Eric Bloodaxe knew exactly what just happened. John Lee was listening in on that call. Now Bloodaxe had to go back to the most famous hacker in the country who needed help dealing with an attack on his phone

line and admit that the very call that they were having was under attack and John Lee listened to him in minute. Eric Bloodaxe realized this is no way to run a security company. He had to do something not just about John Lee but about Mark. He knew Mark was the puppet master. Take out Mark and everyone at MOD would scatter. The whole MOD needed to go and this is where the legendary hacker war began between MOD and LOD. Eric Bloodaxe wanted to take out Mark and John Lee wanted

to annoy the hell out of Bloodaxe. Here's Mark again. So he decided that I was responsible for this based on some previous disagreements we had had and decided that he was going to inform on me and various of my friends here in New York by giving information the FBI about us and so on and so forth.

Remember I told you about Tom and Fred the security engineers at the New York telephone company.

Well they figured out the people hacking into their network were John and Julio from MOD. With months and months of records documenting following every single time that they did it, there was enough evidence to send to the police. But the police needed to verify the evidence themselves so a judge looked over the paper trail and decided to approve a wiretap for both John and Julio.

And not just wiretaps. For the first time, US authorities were granted the ability to tap

computer communications to data taps that called it. And I guess the term we might use today is man in the middle or even spyware. In a suite of borrowed offices and man-hattens world trade center, the secret service set up a war room. Well a wire room is actually what they called it. And it was overseen by the FBI filled with computers, storage tapes, disk drives, and cables in every direction. That systems specifically designed for one occasion to track

these teenage hackers on their computers. Staffed by two dozen trained agents of the US government working in 12-hour shifts tapping the lines of these teenagers recording all of their internet behavior. And back then nothing was encrypted so all their passwords and commands and everything that they were doing could easily be seen by the FBI. Listening and watching everything these

kids did with the same intensity of like a Soviet nuclear launch. Meanwhile the secret service

made a deal with Eric Bloodaxx. Anytime Comsec got a call from MOD, he would walk down the street

To a specific payphone and inform his FBI and secret service handler.

name just in case MOD was listening there too. The investigation into the masters of deception took

one year. In June 1992, Mark John Julio Eli and Paul each received an envelope in the mail. Letter informed them that they were the subject of a grand jury investigation, which means they are suspects in a crime. And soon after that they were all arrested and formally charged with violating, yep, you guessed it, the CFAA. I'll let Mark tell it from here. As things fell apart, EFF was supporting us to go to trial.

Wait, the EFF? Sorry, I hate to interrupt here, but I know the story has been like gone in seven different directions and things are mashed together all over, but this is something

I think I need to talk about. When John Perry Barlow clashed with Mark, and he got spooked. Remember

he dropped his credit report in the chat. Spooked more than he's ever been before, but he also realized petty arguments aside. Something much greater is happening in the country right now. And these kids were bearing the front of it. After their argument, John Perry Barlow asked Mark, give me a call and rumor has that he didn't even give Mark his number because he thought

that would be an insult to such a powerful freaker. But soon his phone rang and of course,

he was Mark and later John actually wrote about this call. He said, in this conversation and the others that followed, I encountered an intelligent civilized and surprisingly principled kid of 18 who sounded and continues to sound as if there's little harm in him to man or data. His cracking impulses seemed purely exploratory and I've begun to wonder if we wouldn't also regard spelunkers as desperate criminals if AT&T owned all the caves. It's such a great analogy.

John Perry Barlow wondered whether what Mark and his annoying friends were doing was really as bad as the police would have him believe. His transmission through and otherwise unused data channel really theft, he asked himself this question. Or put another way. Is there a difference between exploring and exploiting? If you break in just to look around and cause no damage? Maybe you're

just exploring in the months that followed. John Perry Barlow kept an eye out as secret service agents

were busting in through hackers doors across the country, including Mark and Eli's houses, carrying guns, taking all of the things and coordinating off their family members. This was all part of what the secret service called Operation Sun Devil, which resulted in 27 warrants for hackers spread across 14 cities. It was a massive crackdown nationwide on hackers. It was very serious and very scary. Search warrants are going out here in Chicago and it does another city's coast

to coast. In an effort to stop computer fraud that is costing companies and consumers millions of dollars. As Elizabeth Vargas reports authorities have already seized computer equipment and thousands of computer records. They say it is the white collar crime of the 90s, raids in Chicago when it

doesn't other cities this week exposed a million dollar ring of high tech computer hackers.

It is not a game. They're attempting and are getting into credit cards or getting into

telephone systems, they're getting into many records, credit records, are getting into everything.

The raids come after a two-year nationwide investigation called Operation Sun Devil. Like even the guy who reported the profit for stealing the E911 file and stashing in his computer, he even got rated. He's like, "Man, I'm the one who found it. I'm the one who turned it in and I'm also suffering." That guy was cooked. John Perry Barlow saw that the government was overstepping and using the CFAA to justify arresting dozens of people for being curious. Everyone in MOD

was accused of violating the CFAA. Members of LOD were arrested for it and so many other innocent bystanders. So John Perry Barlow was seeing all these people get scooped up left and right, and he thought someone needs to do something about this. And he met with Mitch K. Poor. This guy was on the well too, and K. Poor was known for inventing the spreadsheet program called Lotus 1-2-3. They both lived in San Francisco, which is where the well was hosted too. And together,

the two of them got together and said, "Let's do something here." And they started the EFF, the Electronic Frontier Foundation. They wanted to fund education, lobby for digital rights, and help with the legal cases related to constitutional rights in cyberspace. They were worried that law enforcement and lawmakers didn't understand the digital world that they were trying to regulate. And that ignorance was turning curiosity into crime. And I want to remind you that

John Perry Barlow was the guy who wrote the Declaration of Independence of cyberspace. He loved the internet. And so together, they had dinner with big names and tactics to her friend. And Steve wasniac to go over the ideas of what the EFF was. And Steve was so into it that he pitched in some of his own money to get things started. And it was settled. The EFF was born. And it's online

Home at the time was the well.

for advocating for digital rights in the United States. And the thing was, almost all of those arrests were resulting in nothing. The police were rating offices and homes and taking computers, but finding dull evidence of computer crimes at all. And letting people go without any charges. Like the most comical of all these raids was on Steve Jackson Games. So this was a game studio that made board games like roll the dice, roll playing type board games. Right. And one of the

Legion of Doom members worked there. In fact, you heard his voice at the very beginning of the

last episode. The guy who wrote the hacker manifestaled Lloyd Blinken ship. The secret service

was sure that Lloyd hacked into Bell South stole some stuff and was using it at work. The proof that the secret service had, the role playing game that Lloyd was making was a cyberpunk game which had a hacker campaign in it. They thought this was an instruction manual for hackers. So the raided the entirety of Steve Jackson Games seized computers, seized emails, arrested people, took notebooks, took everything. But Steve Jackson himself was like, whoa,

that is not a hacker manual. It's a work of fiction. We just made that story up.

And this was one of the first cases that the EFF took on to help out, claiming the secret

service was totally overreaching with the CFA. And it's just way too broad of a law. This is the dumbest law ever. And so that case got dropped when they found absolutely no evidence of a crime. Which was a huge win for the EFF. In fact, it got dropped so hard that the court criticized the

secret service for such a sloppy understanding of crimes that they were chasing. And then Mark,

AKA if I were optic, was another one of EFF's first cases. They felt that we were not guilty of what the US attorneys were saying we did. There was even at least one attempt by one of the complainants in the case, British telecom time net, wanting to actually interview us, which if we were given the opportunity would have shown cooperation and would have given us the opportunity to tell them exactly what we did. We would have met the engineers that built the network.

They were interested how we defeated their security. Sounds like a movie. But unfortunately the

US attorneys office did not allow them to do this. So we were never given the opportunity to clear

our name. So we were basically treated like criminals. And due to that fact, one by one and my friends the guys that were named in the indictment decided to plead guilty until I was the only one

remaining and it's you know the typical cliche of the last guy standing without a chair in the music

stops. The judge even said a message must be sent. So that was Mark. And then there was Eli, AKA acid freak, one of the members of MOD, who also got arrested. Eli was thrown into prison for a relatively minor offense. Some of the members of his crew broke into the computers that list everybody's credit ratings, you know, and they copied some credit reports and they sold the information to other people. And he was named as a member of this conspiracy. They said we missed

you know we abused our power. But we didn't abuse it at all. We did nothing compared to the things that could have been done. You know what we did was such a small thing. It's such a large scheme of things you know. It's kind of depressing in a way. I mean there's so many things we could have done. We could have monitored you know Peter Lynch you know and what's the next best investment for the day you know and I would make millions of dollars you know investing

or shorting some stock. But we never did and you know now we wonder why. We're like they're

there's so many applications for this kind of stuff. What happened? But then we're like you know we were just kids. MOD co-founders Paul and Eli each got half a year in jail. Mark got a whole year in jail and John Lee got a year in jail too. Julio who did all of John's crimes along with him got off free which is probably because he cooperated with the police. A few LOD members Adam and the profit faced up to $2 million in fines and 40 years in prison which would have been ridiculous but

in the end Adam got sentenced to 14 months and the profit got 21 months in prison and then there was Craig's case aka Knight Lightning the co-founder of Frac. He was in trouble for publishing the E9-1-1 file and he was also one of the first cases that the EFF took on. And if you think about it this is a federal case so they couldn't charge him with just publishing the article because that would just go completely against the first amendment. So instead they were charging him with theft and wire fraud

and interstate transportation of stolen property. Bell Siles was saying that the E9-1-1 file was

Worth $79,000 in contained highly sensitive information.

and he just admitted guilt but Craig was like I am not guilty and so a trial began and the trial

was absolutely ridiculous. For one they wouldn't show the E9-1-1 file to the jury or put it in

evidence for fear that it would become public record and then anyone could see it. Two Bell Siles claimed it cost the company a ridiculous amount of damage but the couldn't produce a shred of evidence to show where they got that number. The prosecutors wanted to put Craig in prison for 30 years and find him $120,000 for publishing this file in Frac. But as the trial went on they learned that the E9-1-1 file didn't in fact have any information on how to configure it, change it or use it. It wasn't

a technical manual at all but more of an escalation path for troubleshooting emergency services. If this breaks, call this office. If that breaks, call this office. That sort of thing. It had a lot of technical jargon which made it incredibly hard to read but it didn't teach anyone how to take down the 9-1-1 system. And the prosecutors were painting their whole argument against how dangerous it was to publish that. Saying that anyone who reads a could go and take down the 9-1-1 system

but it just wasn't the case. All you got out of it were definitions and escalation paths barely anything to actually do anything with. And the trial just kept going on. But then suddenly EFF got a hot tip from someone. It was discovered that if you called up Bell Siles, they would actually send you the E9-1-1 file and just charge you a $13 printing and shipping

fee. It was basically available free from the very company that was accusing him of theft.

From what I understand is that it wasn't the exact same file but the contents had the same

information in it. So whatever was supposed to be secret and sensitive was not in fact secret

or sensitive because they were giving it away. The prosecution had no legs to stand on after that and the case got dropped. This was not a holy manual worth $79,000. It was a common technical document that the very company would give away for free if you just asked for it. This was a monumental win for FRAC and the EFF for FRAC. This put them down into legendary status. They were just a hacker-easing anymore. They were the hackers who got arrested by the secret service, thought the law

and one. How badass is that? And for the EFF, this was proof to them that the CFAA legislation was prone to overreach and was improperly being used to criminalize the dissemination of information. This solidified the idea that the EFF was an important entity that had to keep fighting for our digital rights. Man, there couldn't be a better symbol to wrap up this story last. Because whether the E9-1-1 file was the most dangerous document on the internet's

or just a $13 pamphlet, it almost didn't even matter in the end. Because what if I told you the day before authorities rated Craig and a week before they rated MOD, AT&T admitted very publicly that the outage was caused by a bug in their own software. It was self-inflicted by AT&T itself, by accident, but still it was their own doing. One of their programmers put in the word break in the wrong part of the code and that just caused all their computers which is to crash. So all

of that curfuffle, all those arrests which was triggered by the AT&T outage was all because AT&T broke their own systems. It took years for people to get their lives back on track and there's still a lot of bitterness between people and those circles. And here's the E-Li again and this was where I reglass interviewed him after he got out of prison and wasn't allowed to touch a computer

for a while. So I was like, damn, this is like, I have to fill this void. What's the question I do?

You know, and I didn't know what to do anymore. It was like horrible, just, you know, it was sad. I would call each other up. I usually would be talking about computers and trading passwords

and did we get into this and that. And I remember the first time we called, I was like,

"So what's up?" Nothing. I cleaned my room yesterday. Yeah, they came over and cleaned my room too pretty well. Yeah, I know. So, uh, what do you want to do? I don't know. Because it's like such a large part of our lives at that point. You know, you have so much power to lose it in an instant like that. It's just so, it's such a shock, you know. It's like, bam, you don't have that power anymore. You can't sit on your computer. What are you going to do? I'm a regular guy now. I'm not about

ask it for you getting more. You know, what's ask it for you without a computer, you know. It's just a regular guy. So, it was a bummer. And I think that marks when the sunset on the golden age of hacking. What began as a thousand

Screeching modems and dim bedrooms lit by the glow of heavy monitors fueled b...

it ended in knock-knock knocks at the door. And the wires got heavy. The fun got serious, too

serious. The thrill of dialing blindly into the unknown gave way to lawyers, headlines, and the

cold steel of federal laws written by people who never touched a terminal in their lives.

The federal government raided people's homes. They looked for digital demons and found instead of a bunch of misfit kids arguing about bald rates and antsy colors. But it didn't matter. The spell had been broken. The new digital frontier was now off limits to exploration. You could feel it. The stakes were higher now. The channels were quieter. The boards went dark. The legends disappeared. The ones who stuck around, what they took jobs behind desks that they used to try to

hack into. But back then, during that fleeting stretch of time, it really did feel like this is

our world now. The world of the electron and the switch and the beauty of the broad. Unregulated, uncharted, unsupervised, pure signal and no static punk rock energy. A crooked little utopia that was inside all our computers. And if you were lucky enough to log in while it lasted, you know, it wasn't just hacking. It was freedom. It was adventure into a new frontier. It was the last beautiful accident before the age of control. Because when the CFA showed up,

a law written by people who couldn't tell the difference between terrorism and curiosity, it didn't catch real criminals. Just the kids still believed that the frontier was worth exploring. You can't hack the world forever, but for that brief moment in time, I sure felt like we could. You may stop an individual, but you can't stop us all. After all, we're all alike. This episode was research and written with help from Nate Nelson. Together, we crushed a ton of

books and scarred the far reaches of the internet, and we kept getting pulled in so many directions, which is why this episode was so long. I got super fascinated by so many aspects of hacking in the 80s and went down some really fun memory lanes. I want to specifically mention two books that were super helpful for us to write this episode. There's hacker crackdown by Bruce Sterling and masters of deception by Michelle Slatt-Talla and Joshua Quitner. These books captured what was

happening in the shadows at the time. In such a clear and remarkable way, you definitely should

check them out. If you want to hear more about what happened then, or for a totally different

story of hacking in the 80s, check out the book "Cook Us Egg," which is a classic hacker story. As a reminder, you can get a premium listening experience by going to plus.darknetdires.com. If you sign up, you'll get an ad-free version of the show plus 11 bonus episodes. Not only that,

it's an amazing way to show your support for the show and to keep the lights on over here. If you

like what we're doing and you want more of it, please consider supporting by going to plus.darknetdires.com. This episode was created by me, Sir Crash a lot, Jack Recyter. This episode was written by Freak at you, Nate Nelson. Our editor is the laser disc lord, Tristan Ledger. This episode was scored by the blind as Quil injection Andrew Mary Weather, mixing by proximity sound,

intro music by the mysterious breakmaster's thunder. So I remember I got banned from a BBS.

This was like, you're not welcome here anymore. Why? Because I uploaded 12 incomplete copies of King's Quest because I was trying to download these resources there. This is Darknetdires.

Compare and Explore