🎙️
AIPodify

Darknet Diaries

The Secret Phone Numbers That Unlocked the Entire Network Darknet Diaries Ep. 168: LoD

January 6, 2026
The Secret Phone Numbers That Unlocked the Entire Network 📞 Darknet Diaries Ep. 168: LoD

Episode Summary

AI-generated · Mar 2026

AI-generated summary — may contain inaccuracies. Not a substitute for the full episode or professional advice.

This episode of Darknet Diaries delves into the foundational era of hacking and phreaking, exploring the origins of digital rebellion, the clash between hacker ethics and government fear, and the enduring legacy of early cybercrime legislation. Host Jack Rhysider unravels the story by first presenting Loyd Blankenship, known as "The Mentor," reading his iconic 1986 "Hacker Manifesto," a declaration of curiosity and defiance against established systems.

👤 Who Should Listen

  • Anyone interested in the foundational history and culture of hacking and phreaking.
  • Cybersecurity professionals and legal experts examining the evolution of computer crime laws and ethics.
  • Historians of technology, telecommunications, and early digital communities.
  • Listeners curious about the anti-establishment sentiment and philosophical underpinnings of early internet users.
  • Fans of true crime stories involving digital exploits, government crackdowns, and legal battles.
  • Individuals interested in the origins of digital privacy debates and the concept of free information.

🔑 Key Takeaways

  1. 1.Loyd Blankenship (The Mentor) penned his legendary "Hacker Manifesto" in 1986, articulating hacking as an act of curiosity and a challenge to corporate control.
  2. 2.The 1971 Esquire Magazine article, featuring the inventor of the "blue box," was instrumental in popularizing phreaking and inspiring early tech pioneers like Steve Wozniak and Steve Jobs to build and sell blue boxes.
  3. 3.Ramparts magazine was famously raided by police in 1972 after publishing an article detailing how to build a "mute box" for making free long-distance calls, leading to its eventual shutdown.
  4. 4.Early phone hackers like Paul Stira engaged in "war dialing" to discover phone company computers and gained control of systems like the New York Telephone Company's Switching Control Center System to manipulate call features.
  5. 5.Phrack Magazine, launched in 1985 as a text-based e-zine distributed on BBSs, became a central repository for technical hacking information and counter-culture content, ranging from lock-picking to bomb-making tutorials.
  6. 6.The Legion of Doom (LoD), formed in 1984, was a highly respected hacker group known for publishing detailed technical journals derived from "trashing" phone company dumpsters, advocating for the free flow of knowledge while largely eschewing system destruction.
  7. 7.The Computer Fraud and Abuse Act (CFAA) of 1986, influenced by the movie *WarGames*, criminalized accessing computers "without authorization" or "exceeding authorized access," a broadly written law that still governs computer crime today.
  8. 8.The major AT&T network outage on January 15, 1990, which impacted over 70 million phone calls, prompted authorities to intensify their crackdown on suspected hacker groups like the Legion of Doom, despite a lack of direct evidence linking them to the incident.

💡 Key Concepts Explained

Hacker Manifesto

A legendary text written by Loyd Blankenship (The Mentor) in 1986, it outlines hacking as an act of profound curiosity, a quest for knowledge, and a challenge to the perceived profiteering and secrecy of large corporations like telephone companies. This episode presents it as a core philosophical statement of early hacker culture.

Phreaking

A portmanteau of "phone" and "freak," phreaking refers to the manipulation and exploration of the telephone system. The episode highlights its popularization by Esquire Magazine in 1971 and its role as a precursor to computer hacking, driven by a desire to understand and subvert communication networks.

War Dialing

A technique involving systematically dialing a range of phone numbers to identify active modems or computers on the other end. Early hackers like Paul Stira used this method to discover hidden computer systems within the vast telephone network, emphasizing the era's lack of central directories or search engines.

BBS (Bulletin Board System)

In the 1980s, a BBS was a computer system running software that allowed users to connect via modem to exchange messages, download files, and share information. This episode portrays BBSs as crucial early online communities and distribution platforms for "text files" like Phrack Magazine, fostering hacker culture before the widespread internet.

Trashing

The practice of rummaging through discarded materials (like dumpsters) behind corporate offices, particularly telephone companies, to find valuable information such as manuals, phone numbers, or system configurations. Legion of Doom members used trashing to gather intelligence, embodying their belief in liberating knowledge that corporations sought to guard.

Computer Fraud and Abuse Act (CFAA)

A landmark 1986 US federal law that criminalized unauthorized access to computer systems, particularly the clause "exceeding authorized access." The episode critically examines the CFAA's broad and vague language, arguing it effectively criminalizes many common online behaviors (like violating terms of service) and grants excessive prosecutorial power.

Legion of Doom (LoD)

An influential and often misunderstood hacker group from the 1980s, named after DC Comics villains. LoD focused on exploring and documenting telecommunications and computer systems, publishing their findings in "LoD tech journals," generally prioritizing knowledge sharing and curiosity over malicious destruction of systems.

⚡ Actionable Takeaways

  • Reflect on the ethical implications of accessing systems without authorization, distinguishing between curiosity-driven exploration and malicious intent.
  • Examine historical legislation like the Computer Fraud and Abuse Act (CFAA) to understand how early computer laws continue to shape current digital regulations and their broad interpretations.
  • Explore the concept of "security through obscurity" in historical contexts to understand how early computer systems relied on hidden information rather than robust access controls.
  • Investigate the role of early digital communities like Bulletin Board Systems (BBSs) in fostering information sharing and counter-culture movements.
  • Consider the historical shift in how hacking is perceived, from a playful, curious pursuit to a criminal activity, and the factors that drove this change.
  • Read primary source hacker literature, such as "The Hacker Manifesto," to grasp the foundational philosophies that motivated early digital explorers.

⏱ Timeline Breakdown

00:00Loyd Blankenship, "The Mentor," reads his legendary "Hacker Manifesto" from 1986.
02:18Jack introduces the Legion of Doom (LoD), a notorious hacker group Loyd was part of.
03:10Jack begins discussing "phreakers" and how Esquire Magazine popularized the "blue box" in 1971.
06:21Ramparts magazine publishes an article detailing how to build a "mute box" for free long-distance calls.
09:34In May 1972, police raid the Ramparts office, forcing them to recall issues and contributing to the magazine's eventual shutdown.
12:55Jack describes the experience of connecting to early computers and Bulletin Board Systems (BBSs) in the 1980s.
17:28The episode highlights the Public Switched Telephone Network (PSTN) as the largest computer network of the 1980s.
19:28Paul Stira discovers and gains control of a New York Telephone Company SCCS switch through "war dialing," granting free calling features.
23:37Phrack Magazine, combining "phreak" and "hack," publishes its first issue on BBSs in November 1985.
25:30Discussion of the prevalence of anarchy-themed content, including bomb-making and lock-picking tutorials, on 1980s BBSs.
30:43The 1984 breakup of AT&T creates new opportunities and chaos within the phone network for hackers.
32:10The formation of the Legion of Doom (LoD) in the summer of 1984 is detailed, emphasizing their goal of sharing information.
33:54The practice of "trashing" – rummaging through company trash for sensitive documents – is explained as an LoD method.
37:07The 1983 movie *WarGames* and President Reagan's reaction are discussed as catalysts for the first computer crime laws.
38:44The US Congress passes the Comprehensive Crime Control Act (CCCA) on October 12, 1984, including the first computer crime law.
39:27Police initiate "sting boards" (fake hacker BBSs) starting in 1985 to catch hackers.
41:14Audio clips from a *This American Life* episode feature teenage "carders" attempting to steal credit card numbers, highlighting their ineffectiveness.
46:39LoD member Adam, interviewed on Dateline NBC, clarifies that while he *could have* caused damage to Bell South systems, it wasn't their goal.
50:06LoD member Phiber Optik outlines the group's core rules, emphasizing the quest for knowledge and avoidance of system destruction.
54:02LoD member Ctrl C helps Bellcore's security team catch a destructive hacker named Wasp, reinforcing LoD's anti-damage stance.
57:22The Secret Service's sting operation at the 1988 Summercon hacker conference, using a mole, yields only a minor drinking infraction.
59:40Steve Wozniak and other 1980s hackers define "hacker" as a persistent explorer and builder, distinct from a "cracker" who breaks security.
60:56President Reagan signs the Computer Fraud and Abuse Act (CFAA) into law on October 16, 1986, criminalizing unauthorized access and "exceeding authorized access."
65:21In September 1988, LoD member The Prophet copies a sensitive "E911 file" (Bell South manual), which is later published in a censored version by Phrack.
68:19A "phone-sex prank" on June 13, 1989, reroutes police station calls, prompting Bell South to launch a major intrusion task force.
71:34The story of "Fry Guy," a teenager who stole $6,000 and falsely implicated the Legion of Doom to authorities after his arrest.
73:53On January 15, 1990 (MLK Day), a major AT&T network outage impacting 70 million calls occurs, leading to intensified suspicion of the Legion of Doom.

💬 Notable Quotes

"My crime is that of curiosity. My crime is that of judging people by what they say and they think, not what they look like. My crime is that of outsmarting you, something that you'll never forgive me for. I am a hacker, and this is my manifesto." (Loyd Blankenship, 01:01)
"We explore, and you call us criminals. We seek after knowledge, and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us, and try to make us believe that it’s for our own good, yet we're the criminals." (Loyd Blankenship, 00:54)
"The CFAA starts out with a whopper of a statement saying it’s illegal to access a computer without authorization. Wow. But wait, it goes on. It also says it’s illegal to exceed authorized access. That part, exceeding authorized access, is one of the most absurdly broad and legally sloppy phrases to ever make its way into federal law." (Jack Rhysider, 61:36)
"We’ve always spoken of the quest for knowledge as being most important in our pursuits, that this was always a noble cause, that the destruction of systems, crashing systems, was always something that we avoided doing at all costs." (Phiber Optik, 50:43)

📚 Books Mentioned

The Anarchist Cookbook
Amazon →
Steal This Book
Amazon →
The Hacker Crackdown by Bruce Sterling
Amazon →

Listen to Full Episode

📬 Get weekly summaries like this one

No spam. Unsubscribe anytime. By subscribing you agree to our Privacy Policy.