Darknet Diaries - 168: LoD

Episode Date: January 6, 2026

The Legion of Doom (LoD) wasn’t just a “hacker group”, it captured the essence of underground hacking in the 80s/90s. BBSes, phreaking, rival crews, and the crackdowns that changed ever...ything. From those humble beginnings came a legacy that still echoes through modern security culture today.SponsorsSupport for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.This show is sponsored by Rippling. Rippling is the unified platform for Global HR, Payroll, IT, and Finance. They’ve helped millions replace their mess of cobbled-together tools with one system designed to give leaders clarity, speed, and control. With Rippling, you can run your entire HR, IT, and Finance operations as one, or pick and choose the products that best fill the gaps in your software stack. Learn more rippling.com/darknet.This show is sponsored by Meter, the company building networks from the ground up. Meter delivers a complete networking stack - wired, wireless, and cellular - in one solution that’s built for performance and scale. Meter’s full-stack solution covers everything from first site survey to ongoing support, giving you a single partner for all your connectivity needs. Go to meter.com/darknet to book a demo now!Sources Book: Masters of Deception (https://amzn.to/4q3O0gJ) Book: The Hacker Crackdown (https://amzn.to/3N4bovY)

Transcript
Discussion (0)
Starting point is 00:00:00 I want to play for you a narration of a piece of classic hacker literature. Everyone should be familiar with this. Some of you may even have parts of this memorized. Here, take a listen from the author himself. Another one got caught today. That's all over the papers. Teenager arrested in computer crime scandal. Hacker arrested after bank tampering.
Starting point is 00:00:22 Damn kids, they're all alike. I'm a hacker. Enter my world. I made a discovery today. I found a computer, and then it happened. A door opened to a world, rushing through the phone line like heroin through an addict's veins. This is it. This is where I belong. But this is our world now, the world of the electron and the switch, the beauty of the bod. We make use of a service already existing without paying for what could be dirt cheap if it wasn't run by profiteering gluttons. And you call us criminals. We explore, and you call us criminals. We seek after knowledge, and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe that it's for our own good. Yet we're the criminals.
Starting point is 00:01:08 Yes, I'm a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and they think, not what they look like. My crime is that of outsmarting you, something that you'll never forgive me for. I'm a hacker, and this is my manifesto. You may stop this individual. but you can't stop us all. After all, we're all alike.
Starting point is 00:01:33 That was written in 1986. My name is Lloyd, by the way. Also known as the mentor. That was indeed Lloyd Blankenship, the author of the legendary Hacker Manifesto, so legendary that it actually appeared in the movie Hackers. Here, take a listen. This is our world now.
Starting point is 00:01:58 The world of the electron and the switch, the beauty of the bond. Yes, I am a criminal. My crime is that of curiosity. I am a hacker, and this is my manifesto. Huh? Right? Manifesto? You may stop me, but you can't stop us all. That's cool. Cool?
Starting point is 00:02:23 Yeah, cool. You think it's cool? It's cool. It's not cool. It's call me bullshit. And Lloyd wrote that a few days after being arrested for hacking. Lloyd was a member of one of the most infamous hacker groups of all time. The Legion of Doom.
Starting point is 00:02:46 These are true stories from the dark side of the Internet. I'm Jack Recyder. This is Darknet Diaries. This episode is sponsored by Threat Locker. Ransomware, supply chain attacks, and zero-day exploits can strike without warning, leaving your business's sensitive data and digital assets vulnerable. But imagine a world where your cybersecurity strategy could prevent these threats. And that's the power of Threat Locker, Zero Trust, End Point Protection Platform.
Starting point is 00:03:32 Robust Cybersecurity is a non-negotiable to safeguard organizations from cyber attacks. Threat Locker implements a proactive, deny-by-default approach to cybersecurity, blocking every action, process, and user unless specifically authorized by your team. This least-privileged strategy mitigates the exploitation of trusted applications and ensures 24-7-365 protection for your organization. The core of Threat Locker is its Protect Suite, including application allow listing, ring fencing, and network control, additional tools like the Threat Locker detect EDR, storage control, elevation control,
Starting point is 00:04:06 and configuration manager, enhance your cybersecurity posture and streamline internal IT and security operations. To learn more about how Threat Locker can help mitigate unknown threats in your digital environment and align your organization with respected compliance frameworks, visit Threatlocker.com. That's Threatlocker.com. This episode is sponsored by RIPLING. IT shouldn't mean endlessly chasing tickets and manually solving access and identity problems.
Starting point is 00:04:36 But when you're running multiple disconnected tools, this is exactly what you get. And that's sad. Software as a disservice. What if you could run IT with one system powered by one source of truth? Meet Rippling. Rippling is the unified platform for global HR, payroll, IT, and finance. They've helped millions replace their mess of cobbled together tools with one system designed give leaders clarity, speed, and control.
Starting point is 00:05:01 By uniting your employees, teams, and departments in one system, Rippling removes the bottlenecks, busy work, and silos your software created. With Rippling, you can run your entire H-R-I-T and finance operations as one or pick and choose the products that best fill the gaps in your software stack. And right now you can get six months free when you go to rippling.com slash darknet. That's spelled R-I-P-P-L-N-G. Ripling.com slash darknet. That's Rippling.com slash darknet.
Starting point is 00:05:28 For six months free, terms and conditions apply. Hey, I am in San Francisco. And I am looking for a specific building. And while I look for it, I'm going to walk. And I'm going to tell you a story. I want you to come with me. So you've probably heard of the term Freaker, right? Spelled with a pH.
Starting point is 00:05:55 This is basically a phone hacker. what a freaker is is someone who manipulates the phone system to make free phone calls or whatever but did you know that the term freaker and the whole idea of it was like injected into the mainstream
Starting point is 00:06:10 by Esquire magazine yeah so in 1971 Esquire interviewed the guy who created the blue box and was like show us how it's done and all this stuff and the blue box is this a magical thing that you push buttons on it It had certain tones and things, and if you hold it up to the phone, you can make a freak phone call or whatever.
Starting point is 00:06:32 It was basically a little box that hacked phones. And so they interviewed this guy, and he showed him how it works and all this sort of thing. And took him kind of a tour of the underground world of freakers, which at the time was very small and esoteric. Like, you had to be a geek of geeks in order to be a freaker at the time. I mean, 1971, this is early freaking days. so that article came out and it pretty much glorified freaking saying like this is your way to like empower yourself so that article came out and it inspired like thousands and tens of thousands of people were reading this saying like how do I get a blue box how do I make this I want to get one too and so there's just all this
Starting point is 00:07:17 fever suddenly about people asking around and kids on college campuses we're now making blue boxes and getting together and trying to build these things. And, of course, it didn't explain in the article how to make it. And so finding that, it was very difficult. Google wasn't around at the time. I mean, gosh, the Internet wasn't even around at the time. So trying to find information on how to build these was pretty hard. But if you looked in the right areas, you could find them.
Starting point is 00:07:39 And you asked the right people. And famously, Steve Wozniak read that article and worked with Steve Jobs to say, hey, let's start building these blue boxes and sell them. And they did. And this was like their very first company before they started. Apple. And they even said, like, if we didn't do that, we'd never make Apple because this was, like, a really good stepping stone to, like, figure out how to work together and build things. And so it wasn't just, like, here's how to do this cool electrical thing. But something about
Starting point is 00:08:06 freaking was just really cool at the time. Like, the cool kids were doing it. They were like wizards that they could do things to the phones that normal people couldn't do. And it was real magical at the time to be able to send these crazy signals into the phone and make it do stuff. But the freakers weren't just cool kids. They were anti-establishers. They were anti-establishers. It was like, we all have these little rebels inside us as teenagers, and this was a way to really let that rebel fly. Freakers were like a way to push back, to empower yourself, to fight the big monopolies of the world, like Maabelle.
Starting point is 00:08:37 And there was a magazine being published at the time called Ramparts, which was being published right here out of San Francisco. That's where I'm headed right now. And Ramparts, I mean, I feel like their whole attitude was poke their finger in the eye of the establishment, right? establishment, right? It was like, big corporations are corrupt, and here's how you can do to fight back. Like, they were very critical of Christianity and sympathetic of Black Panthers, which were, the government considered them a terrorist group at the time. And one of their most famous articles was when
Starting point is 00:09:10 they found evidence that the CIA was secretly funding the student protests and student groups on college campuses to try to manipulate political discourse and ideas. And that turned into a huge investigation and it was a big problem. And so Ramparts was doing
Starting point is 00:09:30 this crazy journalism at the time. And oh, I think I see their office now. And gosh, these buildings are so cool. They're so old and so beautiful. So Ramparts saw the Freaker movement stirring up. And they're like, let's write an article.
Starting point is 00:09:47 And the article came out and it was called How to Hack the Phone Company in Your Home But it would pretend to use the word hack It said regulate, how to regulate the phone company in your home And And I mean, I just read the article So I'll summarize it for you It's basically saying, you've heard of the blue box
Starting point is 00:10:07 But do you know about the mute box? The mute box is pretty cool And basically when you're going to make a long distance call to someone Now this was back in the 70s, right? So I can't believe I have to explain this. There weren't mobile phones yet. So long distance calls actually cost by the minute. And it was very expensive to make long distance phone calls.
Starting point is 00:10:28 So what the article says is that when a long distance phone call connects, there's a certain signal that gets sent from the receiver, from the receiver's phone to the phone company, indicating this call has connected, let the timer start. And so the toll begins. and what this mute box does is it mutes that signal to never let the phone company know that the call started to start the timer for how long the call lasted.
Starting point is 00:10:55 It will allow you to receive free long distance calls. Kind of a weird idea, but that's what a mute box does. And the article goes on to explain, now let's show you how it's done, how to make one. It has a parts list. It's like get a capacitor and get a resistor and get these kind of switches and put it in a box like this,
Starting point is 00:11:13 and it tells you how to solder it, and what wires to connect, and where to put your phone in, and all this kind of stuff. And it is a step-by-step tutorial on how to make a mute box. And not only that, it says, like, now that you've built it, here's how to use it. And then when you're using it, here's how to verify when you're getting a free call. If you're hearing these tones, it's not working. If you're hearing these tones, it is working. Like, it's really in depth of how this works and how to make it.
Starting point is 00:11:40 And I have arrived to where the Ramparts office used to be here on Pine Street. in San Francisco. When they published this article in May of 1972 the police raided this office and they went up and they forced them
Starting point is 00:11:57 to recall all the issues that they published so get them back here call up every new stand that you sold it to everyone that you sent it to get the article back you cannot publish this
Starting point is 00:12:07 and they're like, what? You're crazy and they're like, do you want a felony? Do you want a felony? Get your articles back here. Do you want a big fine? Either that or get your articles back here.
Starting point is 00:12:17 So they felt really pressured and they called up as many places as they could to bring the articles back. It cost them like $50,000 and lost revenue for buying back their articles or their magazines that they've already sold. And when I heard that story, like my immediate thing was, wait, what? The First Amendment of the Constitution says Congress shall make no laws to restrict freedom of speech or freedom of press. And this is a press. I mean, they're just making magazines. Like, they're doing journalistic work here. And what happened was the phone company was so mad that this article came out
Starting point is 00:12:55 that they asked the California police to do something. And what the California police did was they found a rule in the law. California Penal Code 502.7. And it says, you cannot sell devices that will be used to defraud the phone company. And you cannot sell schematics or distribute... plans or teach others how to defraud the phone company. And I am just perplexed by this because what, like, how is any YouTube video exist? And then this law still exists on the books.
Starting point is 00:13:34 It's never been recalled or repealed or anything like that. So how does any YouTube video exist that teaches you how to hack? How does any article exist that teaches you how to hack? I mean, shoot, just a little bit down there. road for me is Stanford and Stanford has classes on how to hack how to do this exact thing. Like there are certificates on how to hack and it's like what all these things exist yet it's against the law to teach someone how to hack. Are you serious? And so ramparts couldn't recover from this and that was the article that ended all articles for them. After that the day, uh, the day
Starting point is 00:14:15 damage to the company, the reputation, the legal threats, the financial blow was too much. And so Ramparts had to shut down. And that was it for them. And I feel like as I'm sitting here looking up at the Rampart's offices, the old building there, I could see that times have changed between then and now. These are old buildings. But that fight still wages on. It's still going strong.
Starting point is 00:14:43 Like, is there forbidden knowledge that we shouldn't share? Is there stuff that should be hushed up? Is there illegal tutorials out there that we shouldn't put out? It's often questioned. And all I got to say is rest in peace, ramparts. I think you started something much bigger than what you were. Okay, I'm back in the studio now, and I just pulled something out of storage. I'm going to turn it on, and you see if you can guess what this is.
Starting point is 00:15:24 That noise right there is so nostalgic to me. It's the sound of the Apple 2E starting up, and this wasn't my computer. It was the family computer, right? I just inherited it. You hear that? This thing's mad because I don't have a disc in the drive. It doesn't. See, here's the thing. This is an Apple 2E, right? And even though it's an Apple product, it does not resemble anything that you imagine an Apple product to resemble. This thing is a full
Starting point is 00:15:53 computer, but has no hard drive. It has no operating system at all. And so for anything to get working, you have to put a floppy disk in the disc drive. That's like opening up an app, though, right? And you can only have one app open on this computer at a time. It is ridiculous. So I have to push this in, close this door, and then, It's still mad. It's still trying to find the disc. Oh, my gosh. Hearing these noises invokes so many memories.
Starting point is 00:16:19 Like, when did circuitry stop humming and making noise? I missed that. These were the days when you didn't just use a computer. You kind of danced with it. Getting things to work felt more like alchemy than anything. You might try something three times that it would work one out of three times, even though you didn't change anything.
Starting point is 00:16:36 Manuals and books were impossible to find, and so you were on your own figuring out commands and settings without a tutorial. There was one sound in particular, that when you heard it, it gave you a rush. It made you feel like this thing is capable of infinite possibilities. And that sound was, the dial tone. Hearing that noise from your computer felt like you had the whole world at your fingertips, a world where you could go anywhere and do anything. The dial tone was the sound of potential, pure potential.
Starting point is 00:17:11 We're so hyper-connected these days that you don't even realize that you're always online. But back in the 80s, it was a big deal to go online. And it wasn't like anything it is now. BBSs were popular then, which stands for bulletin board system.
Starting point is 00:17:25 And it was often just some person running a computer out of their house. And if you call their house with a telephone, which was connected to your computer, you could connect to their computer and read what it had on it. But it was way more complicated than that. Finding their phone number to dial
Starting point is 00:17:39 was hard to start with. Google wasn't around yet to ask, like, hey, what phone numbers should I dial and what BBSs should I check out? So you had to ask around in person, like to your friends and family. Maybe a local electronics shop might be able to help. Hey, do you know any good BBSs I should try? And they might give you a few phone numbers. And then setting up your modem was like a whole thing. You had to configure it for like 20 minutes just to get it to work, right?
Starting point is 00:18:01 And when you finally get it working and you dial the number, the line was busy. Of course, because any popular BBS would have all kinds of people trying to connect to it, see what's there. So you had to just keep dialing it again and again and again in hopes to get through eventually. And when you finally got through, it felt like wizardry. The pixels on your screen would light up, showing you a portal into another world, and you'd get this sudden rush of excitement that you made a successful connection. You were in. Now it was time to look around and see what's in there.
Starting point is 00:18:32 BBSs might show you articles like technical articles or political things. There might be programs to try, or there would just be messages. from other users talking about their day. And as you connected to these BBSs, you'd start to draw a map of the internet. You would take notes of all the places that you visited, their phone numbers, what they had, tips on connecting into it,
Starting point is 00:18:54 your username that you used there. And often a BBS might lead you to another BBS, where it would say, if you like this place, you might also like this other place. And now you're starting to build a list of potential phone numbers that might work. The internet was rapidly changing. So a lot of phone numbers that you got
Starting point is 00:19:08 were old phone numbers. And it didn't work anymore. They were for old BBSs that shut down or just stopped working. And so for a lot of people in the 80s, they really wanted to know more of what was out there. You could dial any phone number, and it may or may not have a computer connected to it. There was no official map or search engine back then
Starting point is 00:19:25 to show you around the Internet. The Internet was very dark, and it was hard to navigate. Like, you have no idea how exhausting it was to try to do all this without a manual or a clear tutorial on how anything worked. But while it was cool and all to connect to a BBS, that's just one other computer in the world. That's just a computer you dialed into at someone's house or something, which wasn't connected to anything else.
Starting point is 00:19:49 Surely there are bigger, more powerful computers in the world out there. But where? And surely there must be whole computer networks out there where you could bounce around from machine to machine. And yes, in fact, businesses, governments, and universities often had the biggest computers and the coolest networks to get into. So what was the biggest computer?
Starting point is 00:20:09 network back then. It was the telephone system, or technically the PSTN, which stands for public switched telephone network. And by the 1980s, the phone system was being more and more controlled by computers. Back in the early days, you had switchboard operators, actual humans that you told them what number you wanted to connect to, and they would connect that call for you by plugging in a wire. And it wasn't until the 1980s where electronic switches became so popular that there was no longer
Starting point is 00:20:36 a need for human switchboard operators. And these electronic phone switches were fascinating. They'd listen to the tones on the phone line to make their decisions, to connect people, to disconnect people. And of course, hackers, or I should say freakers, were very curious what tones they could send the switches to make them do things. As technology progressed, those phone switches became computer-driven, which meant it was possible to get into a phone switch and see all the calls connected, disconnect them if you want. listen in on calls and yeah those computers were sometimes remotely accessible so that the phone company could get in there and configure and troubleshoot things too so it meant that you could technically control the phones from a terminal on your computer in your house it was just a matter of
Starting point is 00:21:25 knowing what phone numbers to dial into and which computers connect to so you can imagine the phone company did not want the phone number to these switches to be publicly known and at the same time Freakers were desperate to find them. And because it was the largest network in the world, it became the coolest thing to hack back in the 1980s. They weren't just trying to figure out how to make free calls. They were also trying to figure out how the phone system worked in general. It was about being able to touch and interact with the largest network in the world.
Starting point is 00:21:57 It was all about learning something new. There was one guy who was very curious how the phone network worked and wanted to get in and learn more. his name was Paul. Paul Stereo was a high schooler living in Queens, New York. What Paul liked doing was war dialing. He'd just dial phone number after phone number to see if there was a computer on the other end that would pick up.
Starting point is 00:22:19 But if you just dial random numbers, you're likely to get someone's house, like someone would pick up the phone and say, hello, and then you'd hang up and try another number. But then someone gave him a tip. They said, hey, try calling higher numbers, like the last numbers in a block. Like, you know, phone numbers are end in 9-9-9-9-9-9.
Starting point is 00:22:34 Those numbers are often reserved by the telephone company themselves, so there's a higher chance that they might be connected to a computer. So he tried calling, like 555-9-0-9-00, then 9-901, and 99-8-7-99-55. He didn't like doing things in sequential order. Eventually, Paul found a few numbers that responded to his calls and had computer tones on the other end. And this is what he was hunting for. A computer on the other end was answering his call. This fascinated him. So he would use his computer to try dialing that phone number, just to see what the computer was saying.
Starting point is 00:23:11 So he connected to it, and it said something, S, S. That's it, one letter, the letter S? What does S even mean? He tried typing some commands, but he just kept getting the same response, S, S, S. That was weird. It seemed like anything he typed, he would just get an S back. Then he tried typing some numbers, but this time he got something different. W. This was all too obscure, and frustrated Paul. S or W is all he was getting from this computer. He started smashing all the keys to see if any of them worked, and nope, all of them either gave S or W back.
Starting point is 00:23:48 Lame. Out of desperation, he picked up his phone, which was connected to his modem, and he just blew into it. Take that computer. And then his computer lit up. Suddenly a series of characters began to fill the screen. He was getting way more than S and W now. And he tried new commands now.
Starting point is 00:24:06 And, whoa, suddenly he could talk to the computer on the other end of the line. And it would respond to him in code. Whoa, he got in. With the brief gust of hot air, Paul had reset and taking control of a machine that belonged to the phone company. He tried typing a command, log in. He had been on BBSs before and read about what commands that phone computers use. So he was just trying random ones. Print, got him access to useful files.
Starting point is 00:24:34 show users. He turned a list of employees that he could impersonate to gain access to get more privileges on this network. He told his friend Eli about this computer. Eli thought, oh, you must have gotten into an SCCS, a switching control center system, aka the beating heart of the city's telephone system. It appeared he was, in fact, in a telephone switch. And this was for the New York telephone company. This controlled calls and phone numbers. It was part of the inner workings of the phone company. He wanted to try something. Nothing big. Just a little. something, just to prove this wasn't a dream. So he looked up his friend's phone number, which was in there, and it showed which features his friend had. So he gave his friend a new feature,
Starting point is 00:25:15 free of charge, three-way calling, and then logged out. This is where you could call two people at once. It was real fancy at the time and cost extra. This was hacking at its finest in the 1980s, discovering a computer all on your own by war dialing. Out of all the numbers in the world, you found one that works. Figuring out a way to get into it, and then finding some useful commands then to do a little something just to prove you were there? Oh, man, how cool. Paul got a real high from this experience. If connecting to BBSs felt like wizardry,
Starting point is 00:25:48 getting into a computer like this was on another level. It wasn't just magic anymore. This was God powers. This was bending reality, creating from nothing, unlocking truths that were buried deep in the mysteries of the Internet. This is what hackers lived for in the 80s. Ever since the Esquire article in 1971, people got more and more interested in freaking, and that just grew and grew.
Starting point is 00:26:13 And by the way, even though Esquire popularized and romanticized blue boxes and freaking, they never got in any trouble for doing that. In November of 1985, a new online magazine published their first issue. It was called Frack, which starts with a pH. It's a combination of freak and hack. Now, back in 1985, there weren't even web browsers yet. So Frack didn't have their own website to publish their eZen to. Instead, they published issue number one on a BBS and encouraged people to just share it, spread it to other BBSs.
Starting point is 00:26:48 And so it did. Any hacker BBS worth it salt back then had a copy of Frack. And honestly, it was just a text document. No photos in it. Text files were king back then, mainly because it was faster to send text over the Internet, because images were really big and took forever to see. files were just where it was at. Issue 1 of frack had some interesting articles like there was one just how to make international calls not for free just how to call internationally if you ever have to
Starting point is 00:27:15 like it had a list of country codes and how to dial them but it had some pranky stuff in there too like did you know you could call the phone company state that you're someone else and tell them I no longer want service and could you please terminate my number and that's how you can get the phone company to disconnect someone else's telephone and there's stuff in there like how to use a PBX, if you're ever on one, and there's an article about how to pick locks, and an article on how to make acetylene balloon bombs, basically saying put some rocks and fun snaps in a plastic bag, filled a plastic bag with acetylene, a highly flammable gas, and throw it off a building, and when it hits the ground, the snaps create a spark, and that explodes the balloon, making a loud
Starting point is 00:27:54 noise and a big ball of fire. See, Anarchy was pretty popular on BBSs back then. It was everywhere you looked, bomb-making tutorials, lock-picking techniques, shoplifting advice, how to bypass security systems, and other urban survival guides. I just ran a Twitter poll asking people if they ever went online when they were a kid and saw plans on how to make a flamethrower. And half my followers said, yes, they did see plans on how to make a flamethrower when they were a kid. A real popular book among teenagers then was the anarchist cookbook, which had schematics and diagrams on how to make bombs, explosives, and cause havoc. I was 15 when I first saw it, and it spooked me a bit. This seemed like serious destruction, but I took a look at it again
Starting point is 00:28:41 just now, and it looks like it was written by kids for kids. It's not very detailed. Some of the ideas don't work at all, and there's no safety precautions to follow. I mean, I remember going into a bookstore when I was a kid. It was Walden Books, actually, in the mall, and I was just walking through the bookstore, and one book caught my eye, and it made me stop dead in my tracks. The title of the book was, steal this book. And it stared at me like a dare. Go ahead, steal me. And I swear, I thought long and hard about it. But ultimately didn't. And I couldn't ask my dad to buy it for me either, because it seemed like it was a book I wasn't supposed to have. So I just grabbed it and flipped through it. And it was wild. Very anti-establishment, part
Starting point is 00:29:26 survival guide, part political manifesto. It was encouraging me to steal, to rebel against capitalism. Crazy stuff was in it, how to hitchhike, how to dumpster dive, where to get free clothes, how to make smoke bombs, and disrupt phone lines, how to run a pirate radio station. And it was written in 1971. And again, it's wild to me that Ramparts was rated for publishing an article on how to make a mute box. But half the kids in the 70s and 80s were finding schematics on how to make bombs online and good percentage of them we're actually trying to make them which is even more wild like eBay has banned the anarchist cookbook now from being sold there which a book that practically half my followers have read as a teenager is now banned on eBay. I'm telling you, anarchy was in style
Starting point is 00:30:13 in the 80s. There was a certain attitude that steal this book and the anarchist cookbook possessed and that seemed to carry right on over into what the internet culture was like in the 80s. It was counterculture, anti-establishment, there was distrust of authority, smash the system. It wasn't just a vibe. It was practically the first principles that a lot of people were operating at. The early Internet wasn't slick or sanitized. It was raw, lawless, DIY. Sharing of text files was like sharing of contraband.
Starting point is 00:30:44 Whether you were reading articles on how to pick a lock or get a free phone call on how to make a bomb, it all seemed to have some sort of cloak of secrecy. And what you were doing was accessing forbidden information. that they didn't want you to see. The internet felt like a digital back alley where sysops were gatekeepers to secret knowledge. It was punk rock at its core. It was cyber anarchy.
Starting point is 00:31:06 It was the idea that the system could be subverted, bent, and reprogrammed. It wasn't just fun. It was freedom. These kids would take the shiny polish world and peel it back and look into the guts and wires and bits and bites that controlled it. They found themselves in control of it. They didn't need to.
Starting point is 00:31:24 to ask for permission. You scavenged parts to build computers. You cracked programs instead of buying them. It's like the rules were suddenly optional. Obstacles were just challenges. And the world was incredibly fun for those who were curious of how it worked. And a lot of these ideas were coming across my screen as a teenager. And that shaped me to who I am today. Yeah, there's a schematic for how to build a flamethrower on my computer. Interesting. I mean, this stuff gave me an enormous amount of destructive power. And I had to learn what to do with that power. Did I make a flamethrower as a kid?
Starting point is 00:32:04 Absolutely. It was just hairspray and a lighter, but it did spray fire. Did I make bombs? Absolutely. And I've got to say, I'm really lucky that I didn't blow off a finger or set the whole house on fire, since that could have easily happened with all the things I was doing. And the ethics of stealing would come up again and again. Stealing is wrong, but the freakers of the 1980s had a different way of looking at things. To them, making a free phone call by hacking the system wasn't theft.
Starting point is 00:32:32 It was exploration. Here's the logic. They placed calls late at night when the phone lines weren't very busy. The infrastructure was already up and running, whether they were using it or not. Their calls didn't displace anyone else. It didn't congest the network. It didn't cause the phone company anything extra. So, if no one lost anything, was anything really taken, that was the ethical loophole that they lived in. If there's no marginal cost, no harm, and no deprivation, then how could it be theft?
Starting point is 00:33:00 Many freakers genuinely believe this. Others didn't care because, let's be honest, a big part of the scene was driven by anti-authoritarianism, curiosity, and a taste for anarchy. Things really started to heat up in 1984. At that time, AT&T wasn't just a phone conversation. It was the phone company, a telecommunications giant with a stranglehold on every call made across America. It was massive, monolithic, and seemingly unbreakable. To many in the underground anarchist, hackers, freakers, it was the very symbol of centralized control, the system incarnate. But in January of that year, the unthinkable happened. the U.S. government stepped in and forced a breakup.
Starting point is 00:33:50 AT&T was declared a monopoly, too powerful for its own good, and under legal pressure, it was torn apart, shattered into eight separate entities, the so-called baby bells. And for those watching from the digital shadows, it was seismic. The unbreakable had broken. A vast, unified network had splintered overnight, and with fragmentation came opportunity, new cracks in the system, seems to explore. The wires were alive again with people probing, learning, exploiting,
Starting point is 00:34:22 looking for hidden stuff. It was the dawn of something wild, a freer, looser, more chaotic network, and the perfect playground for cyber anarchists ready to test their limits. And Frack was there watching it all. The digital magazine seemed squarely planted in the hacker, freaker, and anarchy culture. The authors of the articles were kids in the scene, voices from the digital underground. Let me read a passage from Frack. During the summer of 1984, an idea was formulated that would ultimately change the face of the computer underground forever.
Starting point is 00:34:56 This particular summer, a huge surge in interest in computer telecommunications placed an incredibly large number of new enthusiasts on the national computer scene. From out of this chaos came a need for learned instructors to help pass on their store of information to new throngs. The need was met by nine hackers. who formed a group called the Legion of Doom. Now, the name sounds pretty menacing.
Starting point is 00:35:21 Legion of Doom, or LOD for short. But really, the name comes from a comic book. The group of supervillains and DC Comics is called the Legion of Doom. In fact, one of the guys who started the LOD hacking group went by the name Lex Luther, which was the arch nemesis of Superman. Fiber Optic was one of the members of Legion of Doom,
Starting point is 00:35:39 and that's Fiber spelled with a pH. Here's a clip of him talking at a convention in New York, 15 years ago, explaining what it was. LOD was one of the first organized hacker groups in a very disorganized computer underground. And the main purpose of LOD initially was to take information, primarily that was found trashing at Telco Central offices, and type it in
Starting point is 00:36:03 and make it available in what we're known as LOD Tech Journals, which were available online in text file sections of bulletin board systems, so-called elite bulletin board systems. Oh, yeah, trashing was big back then. This is where you would go behind an office and look through their trash. They would look for phone numbers or computers
Starting point is 00:36:23 or manuals on how to configure things or any sensitive information that the company had thrown out. And phone companies were of particular interest to trash. And again, the ethics of stealing comes in. Is it stealing when you're taking it from someone's trash can? The 16th episode of Dateline NBC actually interviewed one of the Legion of Doom members.
Starting point is 00:36:43 Good evening. I'm Jane Pauley. And I'm Stone Phillips, and welcome to Dateline NBC. How do real hackers operate and just what kind of damage can they do? It's so weird to me that you could turn on the TV back then and learn what trashing was. Adam belonged to an elite hacker club called The Legion of Doom. One of the methods he used to obtain secret computer codes was to rummage through the trash at Bell South, the regional phone company in Atlanta. Back a few years ago, they weren't locked.
Starting point is 00:37:12 You could just slide the doors open, reach in, grab a baggie, leave. Now, one thing that was worth its way in gold to these hackers were simply manuals for how computers worked. Again, there was no Google to search for how something worked. Again, there were no browsers even invented yet. There was no YouTube to walk you through a tutorial on how to use a computer or an application. If you got into a computer that was giving you funky messages back,
Starting point is 00:37:36 you probably had no idea how to operate it. and a simple manual on how to use that computer would have been amazing, but it was extremely rare. You had no idea what commands to type on it. The phone company did have manuals to these computers. Obviously, someone had to know how to use them, but they were very well-guarded documents. They did not want to share it because if the wrong person got the manual,
Starting point is 00:37:59 it meant they could do anything they wanted in the telephone network. Keep in mind, passwords were not always mandatory back then. Security was often through obscurity, actually. Like, hide your computer by not sharing the phone number with anyone, and don't show anybody how to use it who isn't authorized. So they often relied on nobody knowing what the phone number was and nobody knowing how to use it even if they did dial it. I mean, the word cybersecurity didn't show up until 1983. We're talking about the land of computers before cybersecurity was even a thing. What a magical time that was, because honestly, the whole internet had like doors wide open, anywhere you looked.
Starting point is 00:38:35 It's just that the doors were hidden and it was up to you to find them. So members of the Legion of Doom would go searching through trash cans behind telephone companies, and when they found something, they would type it up and share it on their LOD BBS for others to see. In this way, they started amassing all kinds of random manuals and documentation that the phone company was thrown out. Now, I want to stress, so many of these articles didn't show you how to hack anything. It simply was a manual that the manufacturer gave out for how to use their own computers. Legion of Doom quickly became the most respected, most desirable BBS, in the entire hacking scene.
Starting point is 00:39:11 Trafficking in all kinds of precious information about telephone and computer systems, it was the place where any hacker worth their salt wanted to be. We're going to take a quick ad break here, but stay with us, because when we come back, everything is about to change.
Starting point is 00:39:28 This episode is sponsored by Meter, the company building networks from the ground up. If you employ and work with IT engineers, you're going to know how hard it is for them to do their job well. What your business wants, is performant, reliable, secure networking infrastructure. But what you get is IT resource constraints, unpredictable pricing, and fragmented tools.
Starting point is 00:39:47 You and your engineers need a modern platform that you can all trust to support your business. Enter meter. Meter delivers a complete networking stack, wired, wireless, and cellular in one solution that's built for performance and scale. Alongside their partners, meter design the hardware, writes the firmware, builds the software, manages deployments, and runs support. That means less time your employees spend writing to multiple vendors. and more time working on improving your IT systems. Meeter's full-stack solution covers everything
Starting point is 00:40:13 from first site survey to ongoing support, giving you a single partner for all your connectivity needs. Thanks to Meeter for sponsoring this show. Go to meter.com slash darknet to book a demo now. That's spelled M-E-T-E-R, meter.com slash darknet, and book a demo now. Okay, so Ronald Reagan comes into our story here, president of the United States at the time,
Starting point is 00:40:39 he went to the movies, and he saw this. People sometimes make mistakes. Yes, they do. How can I talk? It's not a real voice. This box just interprets signals from the computer and turns them into sound. Shall we play a game? Oh.
Starting point is 00:40:59 I think I missed them. Yeah, weird, isn't it? Yeah. Love to. How about... global thermonuclear war. Wouldn't you prefer a good game of chess? Later, let's play.
Starting point is 00:41:19 Global thermonuclear war. Fine. All right. Wow. That's the 1983 movie War Games. It's a film about a kid who got into a computer thinking he was just playing a video game, but it turned out to be a military computer and it triggered a bunch of real alerts
Starting point is 00:41:39 that the government thought they were under attack and all that war was breaking out. Well, the story goes, President Reagan saw it and asked around, is that possible that that could happen to us? And they thought about it and came back to him and said, yes, a kid could trigger war if he got into the wrong computer. Then Reagan said,
Starting point is 00:41:58 well, what law is there to stop someone from doing that? And there wasn't one. There was no law against hacking into computers. computers in the 1980s. Technology always moves faster than the government. If you broke into a computer, looked around, downloaded things, changed data on there, there was no law saying that what you were doing was illegal. It was a paradise for hackers to just roam free and explore without worry.
Starting point is 00:42:21 Can you imagine such a time and place? So Reagan's like, well, we can't have that. In October 12, 1984, the U.S. Congress passed the Comprehensive Crime Control Act, or CCCA. It was a classic tough on crime bill. up to penalties for growing and selling marijuana. It expanded judges' powers to deny bail to defendants. And it created, for the first time ever, a computer crime law. And the police were excited to use this law to catch them some hackers.
Starting point is 00:42:49 I think, honestly, war games in Hollywood scared the government so bad that they thought hackers were capable of anything. And there were dangerous thugs, terrorists, causing chaos and destruction on the internet. They were the next big threat to America. And the feds wanted to get ahead of this and stop it. The police started their campaign with stingboards. BBS is designed to look like a hacker BBS, but it was secretly operated by the cops. The first ones were created in 1985.
Starting point is 00:43:17 There was the underground tunnel, and it was operated out of Austin, Texas. It was run by a hacker calling himself Pluto, but really it was just a police sergeant. And there was another BBS set up by the Maricopa County Sheriff's Office in Phoenix, Arizona, called the Phone Company. It sounded a little like, on the Internet, no one knows you're a dog, kind of operation. But according to Bruce Sterling, the guy who wrote the book, The Hacker Crackdown, these stingboards actually worked, at least sometimes. Most hackers at the time were just young men who barely knew how to type 20 words per minute. And maybe they watched the movie War Games themselves.
Starting point is 00:43:51 And they were curious on how to hack, so they'd float into a cool-sounding BBS, like The Underground Tunnel. And it seemed legit and allowed them in, so they'd look around, and then they'd slip up and get in trouble. maybe by trying to buy or sell something stolen like a credit card. But all they ever saw were noobs doing dumb things. Like people saying they can hack into something, but then it's all talk, and police had no evidence to prove that they actually were dangerous. As far as I know, the stingboards did not result in any actual arrests. And I really think it's because most of the freakers and hackers back then
Starting point is 00:44:26 were really doing anything that bad. There was something I came across, which I think really emphasizes the lightheartedness of it all. Here, let me show you. Back in the early 90s, there was a radio program called This American Life, and they interviewed some teenage hackers at the time, and they found this one kid who would try to steal credit cards from people and then use that to buy things for himself. Like, it sounds bad when I say it, but listen to how this kid describes how he stole someone's credit card. Basically, the way it works is this. You call up somebody. You say, this is the AT&T operator. I have a priority collect call for so-and-so's name. You know, you
Starting point is 00:45:02 And the whole point is you have to sound like you're not calling somebody up with the intention of getting them. You have to sound like you've been sitting in this chair for 10 hours and you want to go home. So you've got to go, you know, this is the 18C operator. I have a collect call for Paul. Will we accept charges, sir? Yeah, I'll accept charges. Hold on one second. And you tap on the keyboard.
Starting point is 00:45:22 You say, I'm sorry, you seem to have a restriction on your phone line. You can't accept collect calls to this line. And then they yell and they go, what do you mean I can't accept collect calls to my line? I've been getting collect calls in this line for 20 years. And then you've got to go, sir, there's nothing I can do about it. My computer says you can't receive a collect call on this line. We should like to try an alternate billing method. In which case, they'll proceed to either give you a calling card or a major credit card.
Starting point is 00:45:44 But the thing was, despite this clever little plan of theirs, they were wildly unsuccessful at it. I mean, listen to what Ira Glass thinks of these kids. But K read, Mr. Weares, and Fred were involved in very low-level types of crimes. All of them involved computers. They pirated software. They scammed free CD-ROM games. They cheated one of the big online computer services
Starting point is 00:46:07 out of a few hundred dollars in online time. Oh, no, they didn't steal very much, and they didn't steal very effectively. But they did try to steal. He doesn't think much of these kids, does he? Like, he's not scared or intimidated by these crazy hackers at all. He seems to understand just how low level of a crime this whole thing is. And maybe doesn't even believe that they've done any of this.
Starting point is 00:46:30 Oh, and it's kind of funny. I've been accused of being Ira Glass a lot, actually. I'm not Ira, but this American life was a huge inspiration to me. I adore Ira Glass, even met up once. So I actually have a picture with me and Ira, and he's kind of a hero of mine. But it's wild. In this episode, Ira Glass follows these three hackers into a hacker convention in New York City. And yeah, I just really want to stress that, you know, we're not bad.
Starting point is 00:46:57 We're not like, in other ways, we're not bad people. and we don't like going around trying to screw off people in any way we can because we're not at all. I mean, like, you know, I do social work. I, like, you know, tutored kids. I, like, do a lot of stuff which isn't, like, necessarily evil and, like, more good. But, you know, sometimes it's just like, I don't know, man.
Starting point is 00:47:19 I like doing it. I can't explain it. Talk about that part of it. Like, what is the thrill of doing it? That's the first, that was the reason I started carting. The reason was the thrill of, like, you know, going, we went in there, it was real, like, this, like, mission impossible. We went in, we had gloves on and stuff, and we, like, picked it up.
Starting point is 00:47:39 We had, like, we had it all worked out. We were, like, connected. We had, like, lookouts and stuff. And it's just a lot of fun. It's like, you know, you're doing stuff that it's not exactly legal and not legal at all, and it's fun. We took the elevators up to the floor where the Hackers Convention was taken place.
Starting point is 00:47:59 KRED said that real hackers do not use their skills like this. They do not use their skills for personal gain. They don't do carding. They don't steal. The whole idea of computer hacking is, for these guys anyways, that it's a kind of pure Zen pursuit. You know, it's an end in itself. You break into the computer for its own sake
Starting point is 00:48:19 and to look around and for the knowledge of everyone, especially you. We stood in the hallway. People streamed by. We tried to move. to a corner where we would not be overheard. And KRAD said actually that they had never really talked about their illegal activities this much before, with anyone.
Starting point is 00:48:38 The most thing I'm worried about is I'm actually starting for the first time to say this all out loud, everything I've done, and suddenly it doesn't sound as hacker much anymore. And I've known that ever since I moved into doing maybe some credit card thing. That's why I'm in fact even considering giving up on doing all the carding and stuff like that, which is why seriously I am. My worst fear is that I'm going to end up going to hell for doing this, and that's like my worst fear. Do you believe in hell?
Starting point is 00:49:03 Yeah. I do. And you think you can go to hell for getting a computer on somebody else's credit card? I don't know. I hope not. I really hope not. See, that's the kind of kids that the police were creating laws for. They were setting up stingboards for. The Secret Service was investigating kids like this. because they thought they were dangerous criminal terrorists.
Starting point is 00:49:29 Did they sound like dangerous criminal terrorists to you? The federal authorities were putting a ton of effort and time and resources into stopping these kind of kids. It just seems disproportionate to me. I was just reading the book, Hacker Crackdown Today, and I read this part where lawmakers in Arizona, the people who were trying to crack down on hackers, were scared to leave their office at night
Starting point is 00:49:52 because they parked their car in a bad air. of downtown Phoenix. They said people would rob their cars, break into windows, and threaten them if they went to their cars too late. Yet these lawmakers seemed to ignore the crime going on in their own parking lot and focused on kids like this
Starting point is 00:50:09 who often weren't even stealing anything at all, just poking their nose into the phone company's computers just to look around, to do something to prove they got in. I mean, listen to what Adam says, a member of the Legion of Doom when questioned on Dateline NBC. At Bell South, we were able to get into all manner of computers. The phone switches themselves. In essence, you got to where you could have turned off everybody's phones in Georgia.
Starting point is 00:50:36 Just about anyone out of a couple dozen of us could have done that. For more than a year, Adam and his friends had free access to the inner workings of 12 Bell South computer systems. They say you could have crashed or broken the 911 system here. Operative word for me is could have. You could have done that. Yes. I could go out and shoot people. You can.
Starting point is 00:51:01 See, that's one of the big things I see again and again in this story. Breaking in versus causing harm. Legion of Doom seemed to love the challenge of getting in, but rarely did much once they did get in. Just getting in was fun enough. There was no need to cause damage. That wasn't their goal. It wasn't what they did.
Starting point is 00:51:19 They just liked finding ways and But the more Legion of Doom got access to, the more the police got more worried that they would take down the whole internet or the phone system or something. And maybe in some way I could see why the police were worried because of all this anarchy rhetoric online at the time. All this talk about bomb making and stealing
Starting point is 00:51:38 and tearing down the government and smashing the system might have caused the police to worry even more than they needed to. At times, they did feel like the internet was forming some kind of army to cause chaos. but a lot of hackers and freakers had no intention of causing chaos the police didn't have a very keen eye
Starting point is 00:51:59 when it came to trying to catch hackers they didn't understand this culture at all they accused a lot of people being part of Legion of Doom even when they had nothing to do with LOD and LOD was trying to be pretty secretive to get into their BBS you had to be on the allow list
Starting point is 00:52:13 which meant that the police couldn't get in to see what was going on there and that was a double-edged sword the more notorious that LOD became it meant the more interested that the police became in them. But if you did happen to get the password to get into the LODBBS, you'd see technical journals describing telecommunications and computer systems and a remarkable level of detail.
Starting point is 00:52:33 Just looking at the table of contents of one of their now leaked documents, I see Part 3, step-by-step switching system notes. Part 4, a guide to the Prime OS operating system. Part 5, identifying and defeating physical security intrusion detection systems, part 2, the exterior. That last one is written by the LOD founder, Lex Luthor. Lex Luthor's post, despite it being part two, is still 5,200 words long. This kind of insider knowledge and exclusivity was enough to earn LOD plenty of respect.
Starting point is 00:53:03 But they also had information that they refused to publish, even to their private board because it was too sensitive. Even members were limited on how much they could see. Like there was a special section on the board called the Fifth Amendment, which had a document describing in detail how to break into PBIX phone, systems developed by the Rome Corporation. A PBX is a device used to make phone calls, typically operating internally in the phone network, but sometimes in large businesses who have a lot of phone lines. And someone at LOD got the manual for this PBX and read through it.
Starting point is 00:53:34 And in there, they learned that phone technicians can use a PBX to listen in on phone calls to perform maintenance and troubleshoot. Built into the PBX was a way to spy on calls. And because LOD knew this, They could, if they wanted, spy on phone calls too. They could listen in on someone else's call. And that was one of the documents posted on their Fifth Amendment BBS, which members were only allowed to read but never copy.
Starting point is 00:54:02 Here's FiberOptic, one of the members of LOD, talking about it at the Hope Conference. I want to take a few moments to rewind a little bit and speak on behalf of our rules that we lived by in our community long before the FBI and Secret Service succeeded in, infiltrating our community. What I will say is this, is that we've always spoken of the quest for knowledge as being most important in our pursuits, that this was always a noble cause, that the destruction
Starting point is 00:54:35 of systems, crashing systems, was always something that we avoided doing at all costs, whether by accident or as a joke, it was something that was always frowned upon. The fact that information about technology should be freely available was something that we always held to be of great importance. We always frowned upon companies who charged money for technical documentation and information about operating systems, which was very hard to find in the 1980s, for example, which is why trashing and things of that nature were so popular. a lot of the times was to find manuals on how to use the systems that we were getting access to. And I think that was where the heart of it all was,
Starting point is 00:55:25 the belief that information should be free, not stolen, not sold, free. It was less about exposing secrets and more about liberating knowledge that was locked behind corporate firewalls or buried in obscure systems. Hackers weren't trying to destroy anything. They were trying to understand it, document,
Starting point is 00:55:46 and share it. Phone manuals, switchboard maps, internal memos, obscure technical how-toes, all of it was fuel for their curiosity. Publishing that information wasn't just rebellion. It was a public service. It was about leveling the playing field, about making the closed systems of power readable to anyone with a terminal who was willing to learn. For many, that was the real prize, not money, not chaos, access. The idea that no system should be so sacred that it couldn't be understood that knowledge wasn't a crime that documentation wasn't dangerous that teaching others how things worked wasn't subversion that was empowerment again let me quote from frack magazine lody members may have entered into systems numbering in the tens of thousands they may have
Starting point is 00:56:33 peeped into credit histories they may have monitored telephone calls they may have snooped into files and buffered interesting texts they may still have total control over entire computer networks but what damage have they done? None, with the exception of the unpaid use of CPU time and network access charges. What personal gains have any members made? None. They were curious teens, testing the limits of what was possible.
Starting point is 00:56:57 They weren't supposed to be able to get into the telco and listen in on phone calls, but they could. And that made it feel like what they were doing was impossible. And that brought a great sense of satisfaction on its own. But the police were convinced they were evil, anarchist supervillains. I mean, Legion of Doom is a group of supervillains in the comic books, right? And I was talking with a friend the other day, and he said that the more menacing a hacker group name sounds, the likely more innocent that they are.
Starting point is 00:57:25 And the more innocent the name is, the more dangerous it probably is. Like Legion of Doom sounds dangerous. And Lizard Squad sounds pretty silly, yet it's really the other way around. The stingboards caught some of the nubes who wanted to be an LOD, but the police really wanted to stop the core members of Legion of Doom. There was one hacker named Wasp who started crashing computers at Bell Corps. That's the telecommunications research and development arm of the Bell Telephone Company. And he was just going in, smashing up the place, taking things down, just causing havoc in the phone company.
Starting point is 00:58:01 And longtime Legion of Doom member named Control C saw this and was like, no, no, no, that's not right. We don't crash systems. You're going to give hackers a bad name. This guy, Control C, he has his own storied history with Bell. He used to do trashing runs behind the company's branch in Michigan, and he learned what documents they would toss behind, and he learned enough that way to learn how to hack in and give himself free long-distance calling whenever he wanted,
Starting point is 00:58:26 mostly so he could connect to BBSs around the country without having to pay long-distance fees. But Michigan Bell caught Control C in 1987, and they found out that this big, bad hacker was actually a pretty likable, harmless kid. He definitely didn't have any money to pay back, back all those long distance connections, and arresting him wasn't worth their time. So they turned him into a kind of local mascot.
Starting point is 00:58:47 Posters went up with Control C's face on them around Michigan Bell's offices, warning employees to shred their trash, and he actually signed the posters. Even better, he got on their payroll to help them secure their phone company better, all while he was still in Legion of Doom. This wasn't as uncommon as you'd think to, and in this case, it ended up benefiting everyone. So when this wasp guy came in crashing around and Bell Cor breaking things, Control C recruited some of his LOD colleagues, which included people from Georgia like the Prophet, Leftist, and Ervile.
Starting point is 00:59:21 And together, the LOD members helped Belcour's security team lure Wasp into a honeypot, which is a machine used to log a bunch of activity when someone connects to it. And Wasp was caught, and LOD came out feeling good about it. Don't go crashing systems, or LOD will come after you, and you don't want a hacker group coming after you. to you. Of course, the cops didn't focus on that side of LOD. They thought they knew LOD and they stuck to their preconceptions that hackers are troubled criminals. And in fact, the investigation got bigger. The Secret Service started getting involved. I think the FBI starts
Starting point is 00:59:55 getting in there since hackers are getting free long distance calls and this makes it a federal crime. Let me read to you a passage from the hacker crackdown, Bruce Sterling's book. As early as 1986, the police were under. the vague impression that everyone in the underground was Legion of Doom. LOD was never that large, but LOD got tremendous press, especially in Frack, which at times read like an LOD fan magazine. And Frack was everywhere, especially in the offices of telco security. You couldn't get busted as a phone freak, a hacker, or even a lousy codes kid, or where's dude, without the cops asking if you were a member of LOD? LOD complained about this in Frac. The Legion of Doom has been
Starting point is 01:00:37 called everything from organized crime to a communist threat to national security to an international conspiracy of computer terrorists bent on destroying the nation's 911 service. Nothing comes closer to the truth than bored adolescence with too much spare time. Now despite the almost total lack of cybersecurity in a lot of systems then, there were hacker conferences going on. The oldest running hacker conference is SummerCon. It started in the 80s by Frack magazine. And the Fed's thought, well, if we want to catch a hacker, SummerCon is the place to be. It's swarming with hackers. So in 1988, the Secret Service went SummerCon in St. Louis to try to find hackers committing crimes. Now, if the Secret Service shows up to a hacker conference with their earpieces
Starting point is 01:01:20 and nice suits, they'll stick out like a sore thumb. So they needed a disguise, but not just a disguise, someone to pose as a hacker themselves, an insider. So they got a mole, someone who looked and talked like a hacker. They even gave their mole a nickname, dictator, dictator. And the secretator. And the Secret Service went to St. Louis and got a hotel room right next to the conference. It was your classic sting operation. The Secret Service set up in the hotel room right next to Dictator's Room and then drilled holes in the walls of the hotel room so they could put cameras up and one-way mirrors and microphones.
Starting point is 01:01:54 They had full surveillance of Dictator's Room. So then Dictator goes into SummerCon, hey, fellow hackers, and meets some dudes at the conference and invites them back to his room for like a hangout sort of party thing. stuff. The Secret Service got all excited when they saw hackers fill in the hotel room. They watched intently, excited to catch a hacker in the act. So they sat and watched, ears perked, equipment on. But they were disappointed. It was just a bunch of nerds hanging out talking nerdy, like how frustrated they get when someone picks up the phone in their house and disconnects them from the internet, or they were comparing modem speeds. It was a big waste of time. But then,
Starting point is 01:02:36 they do witness a crime one of the hackers pulls out a can of beer and drinks it oh no he happened to be under the legal drinking age and that was the only crime that the Secret Service saw
Starting point is 01:02:53 at SummerCon in 1988 these curious and bored teenagers involved with LOD stayed out of trouble for the most part they didn't think being a hacker was bad or illegal at all And if we back up a bit, the word hacker was coined by the kids at MIT's Model Railroad Club.
Starting point is 01:03:12 To them, a hack was simply a playful or clever solution to a technical problem. And the computer hackers of the 80s had their own idea of what a hacker was, and it was never criminal. Here's some people at a hacker camp in the 1980s explaining what they think the word hacker means. A hacker is just a person who hacks away at the computer keyboard until the program works. Now, Cracker, on the other hand, is almost the same thing. He just hacks away at that keyboard, but until he breaks into, cracks the system security on a computer. A hacker never finishes a program. A hacker will get to a point where a program does something and maybe take a deep breath and say,
Starting point is 01:03:51 how can I make it do this? How can I make it do that? And it'll just keep working. And the hacker often won't shut off the computer until he collapses at the keyboard or something. They do not have so much the normal friends to distract them. other activities to go to. They don't generally have girlfriends. Anything that's going to need
Starting point is 01:04:09 a large attachment commitment of their time, the computer is it and only it. That last voice was Steve Wozniak, who we can easily say was one of the greatest hackers of all time for creating Apple computers. LOD kept out of trouble for the most part, even when they broke into newer and bigger networks.
Starting point is 01:04:28 But this wasn't going to last forever. This was going to be the last time the hackers got to enjoy free, unscrutinized, harmless fun. On October 16th, 1986, President Ronald Reagan signed into law an amendment to the CCCA, that computer crime law I talked about earlier.
Starting point is 01:04:46 The amendment was called the Computer, Fraud, and Abuse Act, or CFAA. And this was legendary. This one was important. You see, the Comprehensive Crime Control Act, the CCCA from 1984, only defined a very narrow range of illegal computer crimes.
Starting point is 01:05:03 It banned using computers to try to obtain national secrets or financial records or hack into government computers in general. And that was about the gist of it. The CFAA starts out with a whopper of a statement saying it's illegal to access a computer without authorization. Wow. But wait, it goes on. It also says it's illegal to exceed authorized access. That part, exceeding authorized access is one of the most absurdly. broad and legally sloppy phrases to ever make its way into federal law. What does that even mean?
Starting point is 01:05:38 Because who decides what's authorized? Because the truth of it is that everyone violates this all day, every day. Because the way it's written means that if you violate the terms of service of an app or a website, that means you exceeded your authorized access or used the site in a way that you weren't authorized to do. And that means you just committed a federal offense. So like, that lie you put on your dating profile, it's against the terms of service to lie on there, which means you're using the site in an unauthorized manner. Your company issued you a computer for work? It's for business use only. If you check Facebook on it, that's not authorized activity. Sharing your Netflix or Spotify password with a friend,
Starting point is 01:06:22 that's unauthorized use of the service. And I could just go on and on about how many times you've probably violated this or used a website in an unauthorized way. Like have you used a browser plug in a form on a job application or when purchasing concert tickets, that's a violation of their terms of service since you can't use automation when interacting with the site. Have you played solitaire on a school computer? Illegal, you're authorized to use that computer for educational purposes only. Used a coffee shop Wi-Fi without buying anything. Illegal.
Starting point is 01:06:51 Unauthorized access. That's for customers only. Can you tell I hate the CFAA? And that's just the first line of it. The CFAA effectively criminalizes violating the terms of service. Every day, millions of people technically break this law by doing totally harmless things. And while most people aren't prosecuted, the law gives prosecutors a loaded weapon to easily take someone down. And they do it all the time.
Starting point is 01:07:21 The law goes on. It talks about spreading malware, performing denial of service attacks, insider attacks, stealing passwords, altering and destroying someone else's data. and this law made in 1986 still reigns as one of the predominant computer hacking laws today. It's poorly written, vague, and outdated, but most of all, it's misused. If you've ever heard someone get arrested on this show, they probably got charged with violating the Computer Fraud and Abuse Act of 1986. And what it meant back then for hackers like the LOD was that all of a sudden
Starting point is 01:07:54 a lot of what they were doing was no longer child's play. It was now a federal offense, a federal offense. Did they understand that? Did these guys follow what politicians were doing in Washington, D.C.? I bet most of them did not have a clue. But more importantly, have you ever met a teenager? The quickest way to get them to do something is to tell them that they can't do it. What's the lesson in your story for other hackers?
Starting point is 01:08:20 Don't get caught. Not don't do it. People are going to do what they're going to do. How do you think it plays to be? at home when you tell others simply don't get caught. That's their own business. I don't think it's right for other people who tell me how to live my life. So I shouldn't tell other people how to live their lives.
Starting point is 01:08:42 And yet you acknowledge that hacking is wrong. Smoking is wrong. Taking drugs is wrong. People do it all the time. That was Adam, a member of the LOD. In September 1988, Adam's friend, another member of the LOD called The Prophet, came across a document that stunk of wrong. He got into a computer at Bell South
Starting point is 01:09:04 and was looking at the files on it. Just curiously looking for manuals, that might be interesting. And he stumbled onto a three-page text file called Bell South Standard Practice Control Office Administration of Enhanced 911 Services for Special Services and Major Account Centers dated in March 198888.
Starting point is 01:09:23 It's a long file name, so I'm just going to call it the E911 file. But it was an incredibly technical and boring document to read. It's just a few pages of the thickest jargon you can imagine. There weren't many people in the country who would be able to make sense of this. But the prophet thought this was something special, something coveted, a manual for Bell's 911 service? The Prophet grabbed this document from Bell South's computer. And again, the ethics of stealing is brought up here.
Starting point is 01:09:49 He didn't rob Bell South of the document. He copied the document. And Bell South still had their copy, and it had no idea that he'd, grabbed a copy of it. So is it really stealing? The prophet was a little scared of this document. So he stashed it on a friend's computer. He didn't even want it on his own device. The prophet then shared this E911 manual with Craig Neidorf. That's white lightning. Craig was one of the founders of Frack magazine. And Craig was like, whoa. And Prophet's like, yeah, whoa. And Craig was like, we should publish this in Frack. And Prophet's like, I don't know.
Starting point is 01:10:24 There's a lot of sense of stuff in here. but together the two of them censored out all the extra sensitive stuff like phone numbers and specific Bell South employees' names and that pesky warning at the top not for public use or disclosure and so on February 25th 1989 frack published this E911 document under a random name that they made up and now everyone could see it it was spreading around all the BBSs in the underground the prophet tried to distance himself from this document
Starting point is 01:10:52 that's why he stashed it on someone else's computer but that guy's computer that he stashed it on found it and saw it and saw that profit is who put it there and he looked at it and this e911 file looks serious so he passed it on to a friend and his friend agreed and passed it on to AT&T and they passed it over to Bell South and Bell South was very upset that their manual was exposed there were two versions a highly redacted one on Frack and the original one that profit copied. It made Bell very uncomfortable to see such a highly sensitive document out there in the hands of hackers. By the time Frack published the E911 file, the telephone companies and police were already on high alert for what hackers might be plotting against the phone
Starting point is 01:11:37 system. So this made them turn all their attention to Frack to find out who is making this and put an end to them and who published this article. Their worries were validated a few months later on June 13th, 1989, it was a really weird day for criminals of Palm Beach, County, Florida. If you had to call your probation officer on that day, and you dialed up the number for the Del Rey Police Station, you'd end up chatting with a lady named Tina. And Tina was in New York, and she was a phone sex worker. It would be weird, so you'd be like, what, well? And so you'd hang up and say, I must have gotten the wrong number.
Starting point is 01:12:13 And so you'd dial the police station again, but again, you would get Tina saying something sexy. Someone had rerouted the Palm Beach Probation Department number to a phone sex line in New York, which I think is pretty funny, right? I mean, this is classic hacker pranks. Come on, that's funny, right? The cops didn't think it was funny at all, though, nor did Bell South. And it was time to put an end to these hackers. Bell long suspected that hackers would come after them, and this was proof that they were able to attack. Bell South quickly formed an intrusion task force with more than 40 employees working overtime. For weeks, 24 hours a day, security experts rotated in 12-hour shifts running through countless records trying to piece together what happened. How were these calls
Starting point is 01:12:56 being rerouted to a phone sex line? What they found out shocked them. Someone had remotely connected into the phone company and tampered with the database. They were creating ghost phone numbers with no personal information attached and nowhere to build to. How dare someone generate phone numbers with no one to build to. Quick, someone tell the Secret Service how awful this crime is. And so they called the Secret Service and told them.
Starting point is 01:13:23 And not long before that, the company had introduced a new digital diagnostic program called Remobb, short for remote observation. Hackers not only knew about it, that they figured out how to reprogram it and take control of it. It allowed them to eavesdrop
Starting point is 01:13:36 and spy on any calls they wanted. Ira Glass went into the apartment of one of the hackers who was there in the 80s doing all this. got kind of a lot of equipment around here. I've got a fax machine here. You know, I've got, in my room, I've got five phone lines. I got a two-line phone, but I've got everything else connected to computers or a fax. There were cheesy kung fu movies on video.
Starting point is 01:13:56 On his CD player, there was old school rap, 9-inch nails, the doors, Jimmy Hendricks. And then he says, let me show you the good stuff. And he pulls out Xeroxes of old spiral notebooks. I have here what was ceased for me, but they had to return back to me. This is my evidence examination report by the United States Secret Service. Subject acid freak. These notes have basically all the systems I got into. Look, I have little sketches and diagrams of how things work, different protocols and networks, definitions.
Starting point is 01:14:33 See, a lot of the stuff was really good. I had stuff outside the country. NASA. There's something defense. What is it? Government defense. Government defense. Yeah, that's a Washington number.
Starting point is 01:14:44 McDonald's, since I had Telanet, I had McDonald's accounts. If you're a McDonald's employee, I can raise your pay. So that way you get like, you know, $15 an hour for, like, shuffling burgers and stuff. So did you decide just at random to help someone out? I didn't do it to anybody. I just wanted to know how. Can you imagine that changing the pay rate of your friends at McDonald's? Well, this guy, Ira interviewed, says he didn't do it.
Starting point is 01:15:10 However, there was a kid who did. A 16-year-old kid in Indiana learned what was needed to get into McDonald's computers. And his friends did work there. So he stole one of the logins for the managers at McDonald's and got access. And he actually gave his friends raises, which was epic. I mean, from then on, that kid was known as the Fry Guy. Fry guy was immature, though, loud, a bit annoying. He was the kind of kid who would claim to be an LOD but actually wasn't and would never be because he was a scammer.
Starting point is 01:15:40 Like, he created this crazy elaborate way to steal money from Western Union and credit card companies. It was really intricate, and he would reroute the victim's phone numbers to a nearby pay phone so that when the credit card company would call the victim to confirm a charge, it would then go to the pay phone outside Frye Guy's house, and he would answer it and say, yeah, yeah, I do approve that charge. And he ended up stealing $6,000 this way, and he would boast about this on BBSs, and people would be like, dude, you are breaking the hacker code. Stop doing that.
Starting point is 01:16:07 A month after the phone sex prank on July 22nd, the police caught Fry guy, and suddenly he wasn't cocky anymore. He buckled pretty quickly under pressure, and he admitted to all the stuff he did. But then he just kept talking. He added, like, oh, it wasn't all me. Legion of Doom was doing it, too. And this was a story that made sense.
Starting point is 01:16:29 In the cop's eyes, the Legion of Doom were the bad guys. Frye Guy offered to testify against the Legion of Doom, despite never even being part of it. And he told the police that, The Legion of Doom are planning to take out the telephone network on a major U.S. holiday. I think it's the 4th of July. I'm pretty sure he just made it up to try to get out of trouble.
Starting point is 01:16:51 But the cops took him very seriously. He became a golden informant. But this news was every police investigator and phone company's worst nightmare. The Legion of Doom was going to take out the phone company? Man, that would bring America to a standstill. But July 4th was long ways off, so the prosecutors were starting to think that maybe this kid was just a windbag. And they, again, focused on trying to figure out who was in LOD and to find them and arrest them.
Starting point is 01:17:18 But the LOD was good at hiding. And the cops could simply not find enough evidence on them to figure out who was in it and would have to wait for someone to slip up. On January 15th, 1990, it was a U.S. holiday, MLK Day. At 2.25 p.m. Eastern Time, a call routing computer switch at AT&T failed. No problem. There are other switches, backups. A single failure is not a big deal. But the failed switch sent a message, Help me to a second switch.
Starting point is 01:17:50 And the second switch didn't help. It failed too. And on to the third, the fourth, the fifth, the 50th. A cascade of phone switches were all failing one after another. the AT&T network was going dark across the country. In the control room at AT&T headquarters in New Jersey, dozens of screens were stacked two stories high. They showed data feeds, charts, and maps of the U.S.,
Starting point is 01:18:17 peppered with dots and lines representing phone services to hundreds of millions of people. This afternoon, engineers and technicians watched as red flashes spread from one screen to another. Around 60,000 people lost their phone service. service. And this was before the internet. So it wasn't like you could just text someone instead. Businesses froze. Services were interrupted. Conversations and lunch dates were abandoned. Almost 50% of calls through AT&T failed for around nine hours. More than 70 million phone calls
Starting point is 01:18:49 were impacted in all. News of this outage started spreading through all the LOD members. Hey man, did you hear? AT&T is down. Oh, what happened? Nobody knows. Did you do it? Oh, of Of course not. LOD started to get nervous, though. Maybe one of them did do it. If not them. And maybe it was the work of a cyber attack. Maybe someone that they taught?
Starting point is 01:19:13 They were puzzled too and worried. And imagine being that U.S. attorney from Indiana that day. Fry guy said that LOD was planning a big attack on a major U.S. holiday, and here's a major outage on Martin Luther King Jr. Day. Was this what the 16-year-old scant predicted? He just got the date wrong? The police thought this must be the work of Legion of Doom. They were the ones with the stolen telephone manuals, hacking the phone companies,
Starting point is 01:19:38 and they could reroute calls or mess with the 911 systems. If anyone could take out the phone company, it was definitely Legion of Doom. But was there any evidence? Some initial reports suggested that there might have been a bug in the system. Did hackers exploit that bug, or did they trip over it? Did that matter? The phone companies were down and someone was to blame. Nobody really knew. But the police and Secret Service weren't going to take any chances of this happening again.
Starting point is 01:20:05 They decided now is the time to strike to take out whoever they thought hacked this system. And their number one suspect was the Legion of Doom. But they were going to discover that Legion of Doom was only the beginning. There was a second hacker group called the Masters of Deception. And this story is about to get way more crazy. Not because of the hackers, though, but because of the police who totally got out of control. but you'll have to join me in part two to hear the rest of the story part two comes out in two weeks Thank you.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.