Darknet Diaries
The Secret Phone Numbers That Unlocked the Entire Network Darknet Diaries Ep. 168: LoD

Episode Summary
AI-generated · Mar 2026AI-generated summary — may contain inaccuracies. Not a substitute for the full episode or professional advice.
This episode of Darknet Diaries delves into the foundational era of hacking and phreaking, exploring the origins of digital rebellion, the clash between hacker ethics and government fear, and the enduring legacy of early cybercrime legislation. Host Jack Rhysider unravels the story by first presenting Loyd Blankenship, known as "The Mentor," reading his iconic 1986 "Hacker Manifesto," a declaration of curiosity and defiance against established systems.
👤 Who Should Listen
- Anyone interested in the foundational history and culture of hacking and phreaking.
- Cybersecurity professionals and legal experts examining the evolution of computer crime laws and ethics.
- Historians of technology, telecommunications, and early digital communities.
- Listeners curious about the anti-establishment sentiment and philosophical underpinnings of early internet users.
- Fans of true crime stories involving digital exploits, government crackdowns, and legal battles.
- Individuals interested in the origins of digital privacy debates and the concept of free information.
🔑 Key Takeaways
- 1.Loyd Blankenship (The Mentor) penned his legendary "Hacker Manifesto" in 1986, articulating hacking as an act of curiosity and a challenge to corporate control.
- 2.The 1971 Esquire Magazine article, featuring the inventor of the "blue box," was instrumental in popularizing phreaking and inspiring early tech pioneers like Steve Wozniak and Steve Jobs to build and sell blue boxes.
- 3.Ramparts magazine was famously raided by police in 1972 after publishing an article detailing how to build a "mute box" for making free long-distance calls, leading to its eventual shutdown.
- 4.Early phone hackers like Paul Stira engaged in "war dialing" to discover phone company computers and gained control of systems like the New York Telephone Company's Switching Control Center System to manipulate call features.
- 5.Phrack Magazine, launched in 1985 as a text-based e-zine distributed on BBSs, became a central repository for technical hacking information and counter-culture content, ranging from lock-picking to bomb-making tutorials.
- 6.The Legion of Doom (LoD), formed in 1984, was a highly respected hacker group known for publishing detailed technical journals derived from "trashing" phone company dumpsters, advocating for the free flow of knowledge while largely eschewing system destruction.
- 7.The Computer Fraud and Abuse Act (CFAA) of 1986, influenced by the movie *WarGames*, criminalized accessing computers "without authorization" or "exceeding authorized access," a broadly written law that still governs computer crime today.
- 8.The major AT&T network outage on January 15, 1990, which impacted over 70 million phone calls, prompted authorities to intensify their crackdown on suspected hacker groups like the Legion of Doom, despite a lack of direct evidence linking them to the incident.
💡 Key Concepts Explained
Hacker Manifesto
A legendary text written by Loyd Blankenship (The Mentor) in 1986, it outlines hacking as an act of profound curiosity, a quest for knowledge, and a challenge to the perceived profiteering and secrecy of large corporations like telephone companies. This episode presents it as a core philosophical statement of early hacker culture.
Phreaking
A portmanteau of "phone" and "freak," phreaking refers to the manipulation and exploration of the telephone system. The episode highlights its popularization by Esquire Magazine in 1971 and its role as a precursor to computer hacking, driven by a desire to understand and subvert communication networks.
War Dialing
A technique involving systematically dialing a range of phone numbers to identify active modems or computers on the other end. Early hackers like Paul Stira used this method to discover hidden computer systems within the vast telephone network, emphasizing the era's lack of central directories or search engines.
BBS (Bulletin Board System)
In the 1980s, a BBS was a computer system running software that allowed users to connect via modem to exchange messages, download files, and share information. This episode portrays BBSs as crucial early online communities and distribution platforms for "text files" like Phrack Magazine, fostering hacker culture before the widespread internet.
Trashing
The practice of rummaging through discarded materials (like dumpsters) behind corporate offices, particularly telephone companies, to find valuable information such as manuals, phone numbers, or system configurations. Legion of Doom members used trashing to gather intelligence, embodying their belief in liberating knowledge that corporations sought to guard.
Computer Fraud and Abuse Act (CFAA)
A landmark 1986 US federal law that criminalized unauthorized access to computer systems, particularly the clause "exceeding authorized access." The episode critically examines the CFAA's broad and vague language, arguing it effectively criminalizes many common online behaviors (like violating terms of service) and grants excessive prosecutorial power.
Legion of Doom (LoD)
An influential and often misunderstood hacker group from the 1980s, named after DC Comics villains. LoD focused on exploring and documenting telecommunications and computer systems, publishing their findings in "LoD tech journals," generally prioritizing knowledge sharing and curiosity over malicious destruction of systems.
⚡ Actionable Takeaways
- →Reflect on the ethical implications of accessing systems without authorization, distinguishing between curiosity-driven exploration and malicious intent.
- →Examine historical legislation like the Computer Fraud and Abuse Act (CFAA) to understand how early computer laws continue to shape current digital regulations and their broad interpretations.
- →Explore the concept of "security through obscurity" in historical contexts to understand how early computer systems relied on hidden information rather than robust access controls.
- →Investigate the role of early digital communities like Bulletin Board Systems (BBSs) in fostering information sharing and counter-culture movements.
- →Consider the historical shift in how hacking is perceived, from a playful, curious pursuit to a criminal activity, and the factors that drove this change.
- →Read primary source hacker literature, such as "The Hacker Manifesto," to grasp the foundational philosophies that motivated early digital explorers.
⏱ Timeline Breakdown
💬 Notable Quotes
“"My crime is that of curiosity. My crime is that of judging people by what they say and they think, not what they look like. My crime is that of outsmarting you, something that you'll never forgive me for. I am a hacker, and this is my manifesto." (Loyd Blankenship, 01:01)”
“"We explore, and you call us criminals. We seek after knowledge, and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us, and try to make us believe that it’s for our own good, yet we're the criminals." (Loyd Blankenship, 00:54)”
“"The CFAA starts out with a whopper of a statement saying it’s illegal to access a computer without authorization. Wow. But wait, it goes on. It also says it’s illegal to exceed authorized access. That part, exceeding authorized access, is one of the most absurdly broad and legally sloppy phrases to ever make its way into federal law." (Jack Rhysider, 61:36)”
“"We’ve always spoken of the quest for knowledge as being most important in our pursuits, that this was always a noble cause, that the destruction of systems, crashing systems, was always something that we avoided doing at all costs." (Phiber Optik, 50:43)”
Listen to Full Episode
📬 Get weekly summaries like this one
No spam. Unsubscribe anytime. By subscribing you agree to our Privacy Policy.
Continue Exploring





