Computer revolution and arrival of the commercial
Internet wasn’t so bright for everybody. Some people were fighting in the front lines
of a battle for the control of the digital realm. It was a battlefield full of police
raids, corporate propaganda, and hacker revolt. Constitution didn’t apply to cyberspace.
There was no freedom of speech, no protection from unreasonable search and seizure.
At the dawn of the Information Age, access to computer technology was still very much
restricted and some people wanted to keep that way. But they were fiercely opposed by
people who believed access to computers and information should be as free and open as
possible. These two sides were engaged in a digital dirty war over access to the computer
power. In the beginning, the Internet used be heavily
decentralized which allowed for greater distribution of information and computer power. For big
telecommunication corporations, this was a problem. They needed technology development
to be proprietary and hidden for the sake of dominant market position. It also made
it much more difficult for governments to control the public opinion and track social
movements hidden behind computer terminals. More than anything, both governments and corporations
feared hackers – people who believed access to computer technology should be free and
open. They were determined to break through those restrictions of corporate dominance
and government control. Before the Internet became mainstream, the
battlefield was taking place in bulletin-board systems. A bulletin-board system, or a BSS,
was a place of online meet-ups, where people could upload and download content, exchange
messages and emails, or read news and boards. They were also used by hackers to share information
and knowledge about hacking and computer systems. But they were also frequented by folks and
even experts from the telecommunications industry. And sometimes these experts didn’t like
what those boards shared about them. On a Thursday morning, March 1, 1990, the
United States Secret Service accompanied by AT&T security officials raided the business
of Steve Jackson Games, a popular publisher of role-playing box games, despite the fact
they had never done anything illegal or suspicious. The raid happened because an AT&T crime expert
didn’t like the people who frequented SJG’s bulletin board. Agents of the Secret Service
seized all of the working and computer equipment, which prevented SJG from conducting the business
for several months. No one from the SJG was charged or arrested the Steve Jackson Games
even won a suit against the US Secret Service for a wrongful raid and invasion of privacy.
and later on, But the raid on Steve Jackson Games was only
one of many during the Hacker Crackdown. An 18-month-long campaign of the US Secret Service
raids and vaguely warranted searches and seizures of hundreds of businesses and homes across
the United States. This is a story of people, for whom cyberspace was a war zone.
One busy morning security officials at Indiana Bell received a very strange phone call. An
adolescent voice boasting about his hacking powers threatened to crash their national
telephone network. He said that they planned to do it together with his “friends” from
the Legion of Doom on July 4th 1989. He hangs up and Indiana Bell rushes to inform
the Secret Service. It isn’t hard for them to track down the caller’s location. It’s
a 16-year-old boy based in Indiana who goes by the name of Fry Guy. The Secret Service
would then install pen register on his phone lines to collect metadata from his incoming
and outgoing phone calls. They would find prove of a long list of Fry Guy’s criminal
activities. But the secret agents also got something much more valuable – a lead on three
Atlanta-based members of the Legion of Doom – Urvile, Prophet, and Leftist.
Fry Guy met with the Atlanta Three only through online hacker boards where hackers commonly
exchanged their knowledge and experience. By teaching Fry Guy about computer intrusion,
no one from Urvile, Prophet or Leftist knew they were digging their own graves.
Fry Guy cared more about his self-gain than he cared about his “friends” and the hacker
culture. By the time Secret Service began following him, he would pile up a very a long
criminal record. Among many of his illicit activities, Fry
Guy once hacked into local MacDonald’s records and gave his friends working there illegitimate
raises. He also found it amusing to redirect calls of Palm Beach County Probation to a
sex worker. He didn’t get caught. So he stepped up his game.
In December 1988 Fry Guy started targeting Western Union. He would steal their customers’
credit card credentials and then social-engineer employees to ask for cash by posing as a legitimate
client. He didn’t get caught for whole 7 months and would steal $,6000 this way.
And that’s when the weight of Fry Guy’s successes snapped his 16-year-old brain and
he made that bragging phone call to Indiana Bell. Getting attention from federal agents
would also put the Legion of Doom in jeopardy. The Secret Service installed pen registers
on phone lines of Prophet, Leftist, and Urvile. On July 22, 1989, the federal agents from
the Secret Service accompanied by police and Bell security officials raided the homes of
the Atlanta Three and Fry Guy. These raids turned out to be a gold mine for
the Secret Service. The Legion of Doom thought they had done nothing
wrong. Fry guy, however, was a wicked coward. While all four of them agreed to cooperate
fully, Fry Guy did something more. Being the only elephant in the room who actually stole
money he blamed all of his corrupted intentions on the Atlanta Three.
Fry Guy agreed to testify against the Legion of Doom. The Secret Service would then use
his long list of criminal charges to describe the activities of Legion of Doom in a public
propaganda. But the Legion of Doom was a totally different
breed than Fry Guy. For the Legion of Doom, hacking was a crusade for open access to the
computer revolution. They didn’t have criminal intent. They did indeed intrude computer networks.
But they never crashed or stole anything. Even if they obtained a proprietary software,
they would never make money off of it. It was their philosophy as hackers. They believed
corporations and governments shouldn’t restrict access to computer technology and that it
should be as free and open as possible. This is why one of the most frequent “victims”
of early hackers were companies like Apple or or big telco industry who liked to claim
monopoly on wisdom, despite the fact they built their successes on the backs of someone
else. This stigma between Apple and true hackers continues to this date.
Needless to stay, intentions of the Legion of Doom didn’t really matter to the law
enforcement. Cyberspace wasn’t attractive only for hackers and telco industry. It was
a vast new area where the government could expand their powers too. For law enforcement
agencies, including the Secret Service, cracking down on hackers, malicious or not, was a matter
of bureaucratic politics. They wanted higher budgets and thus needed to persuade Congress.
For the Secret Service, the Legion of Doom was their scapegoat. They had an underground
hacking group who promised to break the rules and Fry Guy’s crimes to prove their point.
Raids on the Atlanta Three also revealed the true face of who is on which side. In all
three raids, agents of the Secret Service were accompanied by corporate security officials
from BellSouth. They were the ones who determined the guilt of the Legion of Doom. They estimated
a price tag of their intrusions, and the Secret Service would take it at face value. It was
Bell Security officials primarily who decided what would be seized and worth the investigation.
It was as if corporations and government acted inseparably as one body.
At the time, none of the Atlanta Three were arrested or charged. But the raid on Prophet
would give the Secret Service a crucial lead to hunt down the rest of the Legion of Doom.
Prophet was in possession of a proprietary document he obtained while breaking into BellSouth’s
centralized automation system in early September 1988. Shortly referred to as E911, it was
a 12-page-long non-technical document describing Bell’s emergency response system.
Prophet didn’t damage or delete anything from the Bell system. He took E911 as a mere
trophy. He wanted to boast with his hacker skills so he sent a copy of E911 to Knight
Lightning, the editor of a popular hacker magazine PHRACK where they decided to publish
the document. Being too scared of the consequences, Prophet and Knight Lightning edited out all
of the identifiable or potentially sensitive information, essentially shortening the document
by half. On February 25, 1989, Knight Lightning published the heavily edited E911 in PHRACK.
However, before Knight Lighting even obtained E911, BellSouth officials had already known
about it. Prophet made a back-up of E911 on Jolnet board run by Richard Andrews. Andrews
examined the E911 and decided to pass it to his friend working as an AT&T communications
specialist. Being suspicious, Andrews’s friend then forwarded the document to Jerry
Dalton, from AT&T Corporate Information Security and a US Secret Service adviser. Dalton consulted
with Henry Kluepfel, a BellCore expert on telecommunications fraud, what to do. Kluepfel
determined the incident doesn’t deserve their attention and decided to do put it aside
for next 16 months. Until a nerve-wrecking event would suddenly change their position.
It’s Monday afternoon, January 15, 1990. An AT&T’s long-distance telephone switching
station in Manhattan crashed. Nothing too out of the ordinary. Telephone networks are
expected to have blackouts. Earthquakes, floods, fires, or winds can all easily break parts
of the system. This time, however, was different. Station after station across the US, telephone
switches began to crash one after another. 60,000 people lost their telephone service
and 70 million phone calls went uncompleted. This crash was unprecedented and no one knew
why it happened. One thing was clear- it wasn’t due to a physical damage.
For the law enforcement this was a proof of a danger they’ve been longing for. The crash
was too big to be blamed on natural causes. There must’ve been someone behind it. The
law enforcement already had someone like that – hackers. They were preparing for a war
against hackers and all they needed now was just a spark. The crash of AT&T network that
happened on the Martin Luther King Day appeared way too coincidental to be just an accident.
The Secret Service wouldn’t hesitate to crackdown on their scapegoat. The first prey
to the insidious beast was Knight Lightning. Three days after the crash he was visited
by Secret Service agents Foley and Golden along with Bell security officials. They would
search his house and accuse Knight Lightning of the crash. When that didn’t work, as
Knight Lightning had no idea why they were associating him with the crash, Foley confronted
him about the E911 document. Knight Lightning would handle the Secret Service a complete
run of Phrack and would agree to cooperate fully. He was to be in deep trouble for possessing
the document, which the Bell security officials estimated to cost $79,449. A day later Knight
Lightning was indicted for interstate transfer of a stolen property.
The Secret Service continued the manhunt on the Legion of Doom, or anyone associated with
them or the E911 document. On January 24, the Secret Service raided homes of another
three members of the Legion of Doom – Acid Phreak, Phiber Optik, and Scorpion. Raid forces
burst through their doors with guns drawn and would seize all of their computers, notes,
audio tapes, hard disks, floppy disks, telephone answering machines, and even books. When asking
what they had done to deserve so much attention, they were all accused of causing the AT&T
crash. It seemed very odd that the Secret would conduct
a second raid and accuse four people for the crash that the AT&T had officially admitted
to be caused by a software bug. Indeed, on January 17, AT&T’s Chief Executive Officer,
Bob Allen issued a public apology: “AT&T had a major service disruption last
Monday. We didn’t live up to our own standards of quality, and we didn’t live up to yours.
It’s as simple as that. And that’s not acceptable to us. Or to you… . We understand how much
people have come to depend upon AT&T service, so our AT&T Bell Laboratories scientists and
our network engineers are doing everything possible to guard against a recurrence…
. We know there’s no way to make up for the inconvenience this problem may have caused
you.” Needless to say, not one of the trio Acid
Phreak – Phiber Optik – Scorpion, were charged with crime or arrested.
The Secret Service confiscated the Phrack magazine from Kngiht Lightning, which was
publicly available for free anyway, in the hopes of expanding their raiding list.
The most promising case was a 28-year-old hacker by the name of Terminus. Terminus was
a full-time specialist in telecommunications programming. He was once praised for his impressive
computer skills in an interview by Phrack. On February 1, the Secret Service decided
to raid his house in search for evidence. It turned out that Terminus was not in possession
of the E911 document. However, agents found a piece AT&T proprietary software on his computer.
Terminus had been sharing it with other hackers through multiple underground nodes. Jarry
Dalton from AT&T security would evaluate the software at $300,000, a figure which every
IT insider except for the the Secret Service doubted. Terminus have never made nor sought
to make any money. But the Secret Service already had an excuse to raid five more people
whom they suspected of possessing this document. Three days later, Terminus was arrested and
eventually sent to prison for illicit use of a piece of AT&T software. But for the Secret
Service it was a dead end, because none of the Terminus’s acquaintances was charged
with crime or arrested. When the raid on Terminus and his contacts
didn’t lead any further, the Secret Service decided to take a turn. One of the people
whom Terminus exchanged some bits of information was Richard Andrews. That Richard Andrews
who informed AT&T about a rogue of E911 copy on his Jolnet board. Now it was very convenient
for the Secret Service and AT&T to raid his house too. Andrews’s good faith to inform
a company about a possible breach had resulted in having his computer equipment seized from
both his home and workplace. Andrews, as the usual drill goes, was not charged or arrested,
but it started to be obvious that Prophet was the one who broke into BellSouth and accessed
E911. So on February 6, Prophet, Urvile and Leftist were arrested.
After the raid on Terminus, the Secret Service thought they were on track of an underground
gang pirating UNIX software. The Secret Service started following places Terminus frequented.
One such place was Elephant node owned by Robert Izenberg. Izenberg used to be a UNIX
contractor for AT&T. On February 21, the Secret Service led by agent Foley searched his apartment
in Austin, Texas and seized $20,000 worth of computer equipment. They pressured Izenberg
to admit he was in conspiracy with Terminus and the Legion of Doom. But as it usually
went, Izenberg had no idea what they were talking about. He was just a provider of a
frequently visited node by all kinds of people. The Secret Service was blaming a provider
for the crimes of his users. They took his Elephant node along with 800 megabytes of
1990 data of dozens of Izenberg’s innocent users as “evidence”. But this was another
dead-end. Izenberg didn’t know anything about E911 and he was not a member of the
Legion of Doom. He was not charged with any crime or arrested.
When it seemed like this was the end of hunt for E911, it started to become clear that
the document must have circulated among hundreds of boards and nodes all over the US. One such
board was the Phoenix Project, created by two hackers from the Legion of Doom – the
Mentor and Erik Bloodaxe. After what happened to the Elephant node, Mentor decided to shut
down the Phoenix Project. But it was too late. The Phoenix board wasn’t just visited by
hackers, but telco industry experts as well. And even by Henry Kluepfel, a BellCore telecommunications
crime expert. He knew that Phoenix ran Phrack, had the E911 document, and was a haven for
the Legion of Doom. On March 1, Kluepfel would accompany the Secret Service to raid houses
of both Mentor and Erik Bloodaxe. Neither of them were charged or arrested. But Mentor
was employed as a managing editor at Steve Jackson Games. And as you already know, in
heat of the Hacker Crackdown, Kluepfel advised the Secret Service to raid the business of
Steve Jackson Games on the same day. The raid on Mentor and Steve Jackson Games would mark
the end of the hunt for the E911 document. But the crackdown itself could not stop at
few individual cases. They needed something big. Unprecedented. Shocking. And many responsible
people seemed to be on their side. On May 8, 1990, the Secret Service would conduct
their largest crackdown yet. Operation Sundevil. Twenty-seven search warrants, 150 agents,
16 cities across America. The Secret Service seized 23,000 floppy disks, 40 computers,
25 online bulletin boards, and an undisclosed amount of paper documents. Board after board,
they seized computer equipment in search for evidence that was supposed to proof their
point in a final message to the public. With a crackdown of this scale, hundreds must’ve
been arrested and dozens put to jail. From all this effort, they only managed to make
three arrests. But that was enough. Publicly dubbed as crackdown on credit-card fraudsters,
Operation Sundevil was never meant to be about mass arrests of criminals. It was about mass
searches and seizures in digital realm. That’s where the police wanted to expand their power.
That was the unopened door behind which was unchecked power of government surveillance.
At this point, constitutional protections haven’t expanded to cyberspace yet and the
law enforcement wanted to prevent that from ever becoming a reality. And that was the
point of the Hacker Crackdown. That was the point in their message.
“Today, the Secret Service is sending a clear message to those computer hackers who have
decided to violate the laws of this nation in the mistaken belief that they can successfully
avoid detection by hiding behind the relative anonymity of their computer terminals.(…
) “Underground groups have been formed for the
purpose of exchanging information relevant to their criminal activities. These groups
often communicate with each other through message systems between computers called ‘bulletin
boards.’ “Our experience shows that many computer hacker
suspects are no longer misguided teenagers, mischievously playing games with their computers
in their bedrooms. Some are now high tech computer operators using computers to engage
in unlawful conduct.” This message was broadcast to the press from
Assistant Director of the US Secret Service, Garry M. Jenkins. This is, of course, an obligatory
part of keeping healthy public relations. But when you dissect this message, you’ll
see the long-term strategic goals the Secret Service laid out for the future of US law
enforcement. First, the message warns there is a new kind
of danger – anonymous hackers who organize on digital underground to threaten the public
and even national security. Second, this danger is imminent and growing. Hackers are acquiring
new skills, are very well equipped and even infiltrated high level position in tech industry.
And finally, the US law enforcement led by the Secret Service is the most committed to
face this danger. Only they have an unparalleled experience and determination to deal with
this threat and take it to the front to fight these dangerous underground hackers.
If architecture of this message sounds familiar to you, that’s because this very formula
has been repeated in response to every major security issue by the US Government. Replace
hackers with terrorists, and you got yourself perfect “rally-round-the-flag” speech
to persuade the whole nation to go to war or install a total surveillance state. You
can see the same rhetoric is being used by the Russia gate or the drug war narrative.
Always create an assumption of great evil that’s imminently dangerous, and showcase
yourself as the most capable to handle it. And soon, you’ll enjoy the power to determine
what’s right and wrong. These narratives are carefully worded this
way for a reason. They are intended to lead towards expansion of jurisdictions and allocated
budgets. It’s especially true for the Hacker Crackdown as most people the Secret Service
raided were never charged or arrested. The threat of malicious hackers the message from
the Secret Service warned about was actually abysmally small. Operation Sundevil arrested
only three actual credit-card fraudsters and none of the arrested hackers from the entire
Hacker Crackdown ever damaged or deleted anything. The marketing magic of the Hacker Crackdown
didn’t work on a group of civil libertarians who were alarmed by the government’s determination
to crackdown on computer crime without fundamentally understanding the computer technology. They
realized that with the expansion of computers, civil liberties are in danger.
One of them was John Barlow. He had a first-hand experience with the Hacker Crackdown when
he was visited by FBI agents in Wyoming. They questioned him about a stolen source code
from Macintosh simply because an Apple official advised FBI to go to him. Barlow had nothing
to do with the Macintosh incident and this FBI visit would leave a mark on him. He got
in touch with Mitch Kapor who also reported a similar incident. Barlow and Kapor decided
to raise funds in defense of hackers facing jail time over vaguely defined computer crimes.
Their initiative quickly gained publicity. John Gilmore and Steve Wozniak, the co-founder
of Apple, provided further financial support. And that’s how the Electronic Frontier Foundation
was born. The first case for the EFF was the trial of
Knight Lightning on July 24, 1990. Knight Lightning was accused of stealing the E911
document from BellSouth. He pleaded innocent and declared his action of merely publishing
the E911 was protected under the First Amendment. His case was investigated by Henry Kluepfel.
He determined the cost of the 12-page long document at $75,000 as the sum of computer
equipment, resources, and human labor. Kluepfel also accused Knight Lightning of distributing
a dangerous weapon, as he argued the E911 was a “road-map” to the Enhanced 911 system.
And the court took his claims at face value. Knight Lightning was facing 30 years of prison
time. But they had several major flaws. First of all, the cost of the document seemed
way too arbitrary. The defense of Knight Lightning discovered BellSouth was giving this document
to anyone who asked enclosed in a catalog they were selling for $13. And as for Kluepfel’s
second claim, the E911 document contained no technical details, no access codes or passwords,
nothing that would help anyone break in to the Enhanced 911 system. The document merely
described the hierarchy of personal responsibilities and as such, was completely useless in breaking
into computer systems. On July 27, the case was dropped and Knight Lightning was a free
man. At the cost of owing over a $100,000 to his lawyers, despite generous contributions
by the EFF. Knight Lightning’s case would shred the
public credibility of the Hacker crackdown. Nonetheless, other cases didn’t end so victoriously.
Prosecutors failed to prove the Legion of Doom was behind the AT&T crash in January,
or credit card fraud. But still all three Atlanta members of the Legion of Doom were
pressured to plead guilty for intrusion. Urvile and Lefist got 14 months of jail time and
Prophet was sentenced to 21 months. The Atlanta Three also had to pay staggering $233,880
in fines. This is how much BellSouth evaluated their computer passwords and addresses. This
price was not divided among the three, but each one had to pay the full sum individually.
As a cherry on top, the Atlanta Three were forbidden to use computers. The EFF protested
that this punishment was unconstitutional as it would deprive their rights of free association
and free expression through electronic media. Terminus was sent to jail to a year for his
crime of a transferring a UNIX password trapper, again valued by AT&T at $77,000. Acid Phreak
and Scorpion were sent to prison for six months, six months of home detention, and 750 hours
of community service. Phiber Optik was sentenced to a year in prison. Fry Guy, the only real
thieve, was sentenced to forty-four months’ probation and four hundred hours’ of community
service. Steve Jackson Games decided to sue the US
Secret service for damages inflicted by the raid and seizure of essential business equipment.
The court awarded SJG $50,000 in statutory damages and $250,000 in attorney’s fees.
The judge rebuked the Secret Service, suggesting they had no basis to suspect SJG of any wrongdoing.
For AT&T, the Hacker Crackdown was a blessing. At the time of the nationwide crash in January
15, 1990, it turned out to be very fruitful that the law enforcement publicly blamed hackers
for a disruption caused by a bug in AT&T software. This crash, however, wasn’t the only one.
In July 1, 1991, a single mistyped character in a computer software collapsed switching
stations in Washington DC, Pittsburgh, Los Angeles, and San Francisco. The collapse left
12 million people affected. When the New York Times reported on the incident they still
considered the possibility of a hacker sabotage. But when another crash happened 2 months later,
in September 17, vilifying hackers proved to be a fallacy. AT&T was a laughing stock
for regulators and industry competition alike. MCI, AT&T’s long-time rival, capitalized
on this by marketing their long-distance services for the “next time that AT&T goes down.”
AT&T saw the Hacker Crackdown as an opportunity to claim monopoly over network markets but
their own inability to keep their networks stable resulted in a fiasco. At least for
that time. Cracking down on hackers was a war on their
ideology. Telco industry didn’t like that hackers believed software should be free and
open. That’s not how you become a monopoly. And if their ideology attracted law makers,
their business strategies was in jeopardy. Opening up access to computer technology would
enable individuals to compete directly with big corporations and they couldn’t let that
happen. Allying with the Secret Service to portray telco corporations as victims of underground
hacker gangs managed to achieve the desired results. It became politically incorrect to
align with original hacker ideas. None of the constitutional principles extended to
cyberspace. And more than 20 years later, we learned that secret government agencies
continued to collaborate with tech industry to penetrate the digital realm and take full
control of the cyberspace. But true hackers still exist. People who value
principles over personal loyalty are still alive. Despite the ongoing war on Internet
freedoms, privacy is not completely dead and freedom of speech is still breathing. These
people are still hated, vilified, and hunted by the coalition of corporations and governments
around the world. But the fight is far from over.

How the US Government took control of the Internet | The Hacker Crackdown

100 thoughts on “How the US Government took control of the Internet | The Hacker Crackdown

  • April 30, 2019 at 11:25 am
    Permalink

    Outside the apple looks strong and has a fortified skin. The core is rotten.

    Reply
  • April 30, 2019 at 11:57 am
    Permalink

    The state is a form of criminal organization and survive by obliging us to pay taxes(slavery), that should be obvious to everyone and this video shows well how they act.

    Reply
  • May 1, 2019 at 4:56 am
    Permalink

    And now, kids flying in Minecraft are called HACKERS…
    That's fucking depressing.

    Reply
  • May 1, 2019 at 1:41 pm
    Permalink

    Mailing the document to fifty ppl took a clerk fifty hours totaling 853$

    Placing the doc in an index file took two clerks two hours totaling 43$

    GTFO gov doesn’t even try gettin away w inflated bills like that

    Reply
  • May 1, 2019 at 1:50 pm
    Permalink

    Practice counter-economics. Rob the government of its lifeblood – tax revenue. #Agorism

    Reply
  • May 1, 2019 at 9:37 pm
    Permalink

    THEY ARE TRASHING OUR RIGHTS MEHN!! HACK THE PLANET!!! HACK THE PLANET!! MY FELLOW CYBERPUNKS!!!1

    Reply
  • May 1, 2019 at 10:42 pm
    Permalink

    US Government: Exists

    us: omg they took control!

    Reply
  • May 2, 2019 at 1:15 am
    Permalink

    >gets hacked by drunk russians with potatoes

    Reply
  • May 2, 2019 at 2:10 am
    Permalink

    it's as i the US gov wants to prove they can do worse than what people expect, despicable cunts

    Reply
  • May 2, 2019 at 2:25 am
    Permalink

    Great video!

    Reply
  • May 2, 2019 at 4:46 am
    Permalink

    The government didn't "take over" the internet. It invented it! ARPANet was the beginning of the set of protocols we are all familiar with today that bring us our email, let's us watch videos, and allows us to share documents across various machines. ARPA was a government research agency and was later changed to Defense Advanced Research Projects Agency, or DARPA. In fact if you want to know when the internet was weaponized you can look a decade before the 90s at the transfer of ARPANet to Defense Data Network and NSFNet. It was in the mid 90s that they started to commercialize the web, but the government had it's fingers in there for a very long time.

    Reply
  • May 2, 2019 at 5:00 am
    Permalink

    Great video.

    Reply
  • May 2, 2019 at 8:42 am
    Permalink

    Now you understand why so many evil hackers in the early 2000 movies and TV shows

    Reply
  • May 2, 2019 at 10:01 am
    Permalink

    No worries most of these bright minds ended up working for “THA MAN” whitehats

    Reply
  • May 2, 2019 at 4:26 pm
    Permalink

    I find it ironic that before Jobs and Wozniak came out with the Apple computer, they made a Red Box which hacked the long distance telephone system!

    Reply
  • May 2, 2019 at 9:17 pm
    Permalink

    Nerds!

    Reply
  • May 2, 2019 at 11:11 pm
    Permalink

    Wait…So you need a full military to take on a computer nerd?!

    Reply
  • May 3, 2019 at 2:40 am
    Permalink

    Thank you for the truth.

    Reply
  • May 3, 2019 at 7:09 am
    Permalink

    Why don’t you start with the fagot that works at 1 hacker way stupid fucks

    Reply
  • May 3, 2019 at 5:03 pm
    Permalink

    A war agains tyranny was fought for us to be able to watch this video.

    Reply
  • May 3, 2019 at 11:39 pm
    Permalink

    I been hacked and life dusted. Hoping these hackers get caught soon.

    Reply
  • May 4, 2019 at 3:34 pm
    Permalink

    You keep saying "the US Secret Service" but isn't that the President's bodyguard service? Do you mean the FBI???

    Reply
  • May 4, 2019 at 10:32 pm
    Permalink

    2001-Ti crime victim-other Ti's-USDOJ/FBI/Local law Enforcement/US Congress can't end this crime against you other than the public who else is controlling the crime scene

    Reply
  • May 5, 2019 at 6:15 am
    Permalink

    These days you have hackers demanding Corporations like Mozilla be in control of your access to information. They actively advocate for Oligarchy, and restricting people's access to freely communicate. Even the Debian project has embraced the Code of Conduct that Torvalds has rejected. The end is near, and information still demands to be free.

    Reply
  • May 5, 2019 at 7:32 pm
    Permalink

    7:32 a word exists for that: fascism.

    Reply
  • May 6, 2019 at 5:29 am
    Permalink

    Great documentary.

    Reply
  • May 6, 2019 at 7:17 am
    Permalink

    Subbed, bell rang, liked… Hegelian Dialectic

    Reply
  • May 7, 2019 at 10:02 pm
    Permalink

    Fuck the government some people deserve what they get because the government not doing nothing about it or protecting them.

    Reply
  • May 9, 2019 at 4:46 am
    Permalink

    Who told you government and corporations where separate 😂 that’s church and state

    Reply
  • May 9, 2019 at 6:07 am
    Permalink

    The US Gov even murdered Jon Postel to take control of IANA and gain an even stronger grasp on the Internet

    Reply
  • May 9, 2019 at 10:39 pm
    Permalink

    The empire is afraid of hackers exposing the criminal nature of almost everything it touches.

    Reply
  • May 10, 2019 at 12:59 am
    Permalink

    What is this accent?

    Reply
  • May 10, 2019 at 4:36 pm
    Permalink

    Thank you for making this.

    Reply
  • May 10, 2019 at 9:08 pm
    Permalink

    ARPA-Net. Before the D.o.D funded agency, DARPA, added the word 'Defense' to their handle. This V-Network's Arch/structure is, what would eventually become, the backbone of today's Internet Protocol networking procedures.

    Reply
  • May 11, 2019 at 12:50 am
    Permalink

    I hack and pentest for a living if you hack and are bad and know what your doing one man can do so much

    Reply
  • May 12, 2019 at 3:09 am
    Permalink

    Great video, so many hackers back then ….every week or months there always a new hacker popping up.

    Reply
  • May 12, 2019 at 2:48 pm
    Permalink

    'infilitrate high level tech positions' bro who do you think makes all this cool shit? same dudes who go home on a night and break it lol

    Reply
  • May 12, 2019 at 8:42 pm
    Permalink

    This videos title is misleading and all around retarded to the degree of autism

    Reply
  • May 12, 2019 at 9:05 pm
    Permalink

    first the state criminals tried to catch the hackers, now they EMPLOY them for their own criminal activities

    Reply
  • May 12, 2019 at 10:24 pm
    Permalink

    By far THE BEST and most informative video I've seen in a loooong time🔥✌🏽

    Reply
  • May 13, 2019 at 1:57 am
    Permalink

    8:24 ""Being too scared of the" WHAT, now?

    Reply
  • May 13, 2019 at 3:22 am
    Permalink

    So much missinformation, this host is clueless.

    Reply
  • May 13, 2019 at 9:17 am
    Permalink

    US Government took control of the Internet..?what a fucking joke.they can't even take control of that socialist traitor bitch hillary's computer and that Muslim bastard Obama's computer even with all the evidence they have.

    Reply
  • May 13, 2019 at 12:42 pm
    Permalink

    Obama ruined it for everyone and Trump is too dumb to fix it.

    Reply
  • May 13, 2019 at 11:45 pm
    Permalink

    Cool video. My tin-foil hat just got tighter.
    Also, the leverage that government agencies have to seize people's private property without cause and then never give it back is insane to me. I cannot understand how people in the US are not outraged at this abuse. But oh well, guess we should just scarf down a burger and watch TV and forget about the whole thing, huh?

    Reply
  • May 14, 2019 at 1:08 am
    Permalink

    Took control? They've always been playing their part…

    Reply
  • May 14, 2019 at 1:28 am
    Permalink

    Damn heckers

    Reply
  • May 14, 2019 at 5:56 am
    Permalink

    They've been surveying and tracking us since phones existed

    Reply
  • May 14, 2019 at 11:29 am
    Permalink

    Just more proof of corrupt america. Not a new phenomenon.

    Reply
  • May 14, 2019 at 12:55 pm
    Permalink

    Tl;dr we the people lost

    Reply
  • May 14, 2019 at 1:17 pm
    Permalink

    What kind of accent do you have, my man?

    Reply
  • May 14, 2019 at 8:16 pm
    Permalink

    Interesting, well thought out and above all creepy

    Reply
  • May 14, 2019 at 10:27 pm
    Permalink

    This is referencing the 13 russians who were indicted with "biased internet trolling" with regard to undermining US elections as found in the Mueller Report (propaganda)

    Reply
  • May 16, 2019 at 7:08 pm
    Permalink

    they did the same think with alcohol and drugs it just another prohibition and when you stop the people from accessing it they will find a way anyways cus look around your facing the next generation it's impossible to get rid of it

    Reply
  • May 18, 2019 at 4:38 am
    Permalink

    The U.S. Military Industrial complex created the internet for the purpose of military soldiers to communicate with each other when the Internet was invented ….. The U.S.A. Govt. is just taking back what they created.

    Reply
  • May 22, 2019 at 6:50 am
    Permalink

    WHY ISNT THIS VIDEO GOING VIRAL DAMNIT

    Reply
  • May 25, 2019 at 3:30 pm
    Permalink

    25:55
    GAWD! c++ class in high school 2001 all over again!

    Compiler : 100 lines of code, 1 error(s), 0 warning.
    Me : Where is the error?
    Compiler : pfft, fuck, I donno! It's in there somewhere!
    Me : -_- can you at least point me in the general area of which line it is?!
    I need this shit working to get an A on my final!
    Compiler : ….yeah, naw! can't do that….
    Me :  ( O_/O ) can't or won't?!
    Compiler : that's a good question
    Me : BITCH!?!
    Compiler : ( ^_^ )

    Reply
  • May 25, 2019 at 3:35 pm
    Permalink

    27:47
    Who is the girl second from the left?!

    Reply
  • May 26, 2019 at 1:49 pm
    Permalink

    Obligation Association Statistics of Network Regimen Made a Genetic element of what we called
    Network Internet Providers "I have not proven the fact or what the present presented during a Comprehensive Act" Unknown Series 1::20 of Crack56.pka

    Reply
  • June 21, 2019 at 10:06 am
    Permalink

    27:48 NAME THOSE PEOPLE!!!

    Reply
  • June 21, 2019 at 1:54 pm
    Permalink

    We do have technologies to make world freedom,but we build United States of surveillance, distinguish the children if internet becomes a munition to centralization.

    Reply
  • June 21, 2019 at 7:01 pm
    Permalink

    And now….thanks to YouTube and Google…..NSA and all corporate telecomms know you watched this video and have you all personally flagged as ‘dissident sympathisers’. The world is all kinds of f’ked up.

    Reply
  • June 23, 2019 at 9:01 am
    Permalink

    25:30 OH THIS IS THE DUDE THAT MADE MUCHKINS!?!?! I love that game!

    Reply
  • June 25, 2019 at 4:17 pm
    Permalink

    man just seeing how many civilians that had guns drawn at them by the law enforcement that was supposed to protect them is just sickening.

    Reply
  • June 27, 2019 at 10:20 pm
    Permalink

    Anyone know what the most frequent form of “hacking” was back then? It was “dumpster diving.” I worked for Motorola in the ‘90s and during security meetings we were told to watch out for the this and they told us some really funny stories about companies hiring individuals to collect documents from dumpsters. It happened all the time.

    Reply
  • July 1, 2019 at 7:26 am
    Permalink

    In the beginning, the internet was DARPANET. The government “took control” of the internet when they invented it

    Reply
  • July 1, 2019 at 3:44 pm
    Permalink

    This story should be used in schools, as a warning about the evil axis that is GOV+CORP. Just another facet of the Western military industrial complex.

    Reply
  • July 2, 2019 at 7:20 pm
    Permalink

    I have to disagree with on 1:10. Hackers are not "people who belive that Acess to computere technology should be free and open". Some of them are but the word hacker has nothing to doo with an ideal or goal but rather describes an action.

    Reply
  • July 9, 2019 at 9:23 pm
    Permalink

    For an individual who work with the government, hackers are second threat because you can put security, VPN or manage the setting. The first threat is by a bad guy in the government who work with police or ISP to share information with ur collegues to bully u in the department. No matter how is your setting or security, they hv owned your phone. Among co workers, you cannot avoid using google drive and make links or sync to share so files and documents. You cannot control or encrypt everything if u use the same phone.

    Reply
  • July 13, 2019 at 4:13 am
    Permalink

    Thanks for openings my eyes, I was unaware of the evilness of the United States as a whole. They will pay for this!.

    Reply
  • July 28, 2019 at 2:25 am
    Permalink

    Good video men

    Reply
  • July 28, 2019 at 9:39 am
    Permalink

    Messageez serviceez busineseez successeez noticeez Los angeleez

    Reply
  • July 28, 2019 at 9:41 am
    Permalink

    Hail Fry Guy!

    Reply
  • July 29, 2019 at 11:30 pm
    Permalink

    The year is 2019 the corrupt Globalist shadow government. Is near world domination. 5G is one of the last phases. We must stay strong and keep up the resistance.

    Reply
  • September 1, 2019 at 9:18 am
    Permalink

    You are my new favorite youtuber great job on the release of much needed information.

    Reply
  • September 2, 2019 at 9:35 pm
    Permalink

    Fking americans

    Reply
  • September 10, 2019 at 4:04 pm
    Permalink

    How long will it take to break the US's hold over internet?

    Reply
  • September 13, 2019 at 8:24 pm
    Permalink

    "How NSA spying on everyone globally"

    Reply
  • September 24, 2019 at 6:28 am
    Permalink

    Corporations Big tech and government working as one..DUH!

    Reply
  • September 27, 2019 at 2:17 pm
    Permalink

    know who your enemy is

    Reply
  • October 3, 2019 at 4:00 am
    Permalink

    0:17 Let me guess:

    Two computers
    Some radio communication devices (aka "walkie talkies, as some call it")
    Some unused cables
    A telephone
    Some spare change
    Two video game cartridges
    A 9v battery
    A device that is plugged into the radio communication devices (idk tho)
    A black box (idk)
    Maybe some kind of inhaler?
    A bolt driver
    Three floppy disks
    A journal and pen

    Can someone explain to me what all this is and why it was important to a hacker back then? Also, how does this relate to a similar setup someone would use today?

    Reply
  • October 5, 2019 at 9:19 am
    Permalink

    The governments police and corporations have a huge army that keeps them in control , and that huge army is called human zombies of massive ignorance ..

    Reply
  • October 5, 2019 at 11:05 pm
    Permalink

    Thanks for putting that video up. The Hacker Crackdown is the first thing I've read when the mere "IT professional" that I was at the time wanted to expand my knowledge in the real of computer security (which was not even a topic taught at Uni when I went there), and it's also the first thing that made me aware of the actual world we live in, and lead me on a path towards Truth that I never would have imagined back at the time. I am working on making a French translation of this book (it's been on the ice for a while, but well over 75% completed) as I definitely think that this story is one that needs to be seen and understood my the vast majority of people. Great work!

    Reply
  • October 12, 2019 at 6:27 am
    Permalink

    There are two correct answers as to who owns the Internet. It’s both no one, yet at the same time everyone. Don’t let anyone determine otherwise.

    Reply
  • October 14, 2019 at 9:29 pm
    Permalink

    The internet should be free for everyone and no one can take it away

    Reply
  • October 16, 2019 at 10:33 pm
    Permalink

    Free ? There's nothing free in America

    Reply
  • November 2, 2019 at 5:10 am
    Permalink

    "Russians interfered with the elections"

    Reply
  • November 2, 2019 at 7:59 am
    Permalink

    I want to hear about ghost servers and such…Military "satellite" access, altered frequencies, encryption, super computer crunching, spiders and such….boring.

    Reply
  • November 10, 2019 at 3:21 pm
    Permalink

    It's so frustrating with so many people with their eyes closed

    Reply
  • November 26, 2019 at 6:01 am
    Permalink

    hi sam tucker sent me

    Reply
  • November 27, 2019 at 10:07 pm
    Permalink

    why do they have to use so much unnecessary force against those hackers? What can mouses and computers do?

    Reply
  • November 30, 2019 at 6:25 am
    Permalink

    When is the government gonna have checks and balances on the web? As long as the government decides to make the NSA into less of a national security agency and more into an espionage agency.

    Reply
  • December 4, 2019 at 11:57 pm
    Permalink

    The only reason why we have internet is spying and control.

    Reply
  • December 11, 2019 at 3:42 am
    Permalink

    10:50 OMG. A SUN laptop?? Most exotic thing Ive seen. They were massively expensive. Sparc processor? lol.

    Reply
  • December 11, 2019 at 3:46 am
    Permalink

    "And seized $20k of computer equipment" . . . basically one Sun workstation. 😀

    Reply
  • December 12, 2019 at 3:44 am
    Permalink

    Another great video 😊

    Reply
  • December 16, 2019 at 6:52 pm
    Permalink

    Good video. Interesting stuff.

    Reply
  • December 28, 2019 at 9:59 pm
    Permalink

    “To think what the Stasi went through to spy on us. Even they couldn't dream of a world in which citizens voluntarily carried tracking devices, conducted self-surveillance and reported on themselves, morning, noon and night.”
    ― Adam Johnson, Fortune Smiles

    Reply
  • January 2, 2020 at 4:50 am
    Permalink

    Overkill on the part of the U.S. gestapo. Much flamboyance and expensive showboating to arrest a few computer geeks.

    Reply
  • January 2, 2020 at 5:27 am
    Permalink

    America the Free! Haha!!

    Reply

Leave a Reply

Your email address will not be published. Required fields are marked *