Battling Ma Bell

Before there were hackers, there were phone phreaks.


Exploding the Phone: The Untold Story of the Teenagers and Outlaws Who Hacked Ma Bell, by Phil Lapsley, Grove Press, 431 pages, $26.

During the Cold War, a shadowy group hacked its way into a system the technologist and entrepreneur Phil Lapsley calls "the world's largest machine." AT+T's phone network was a vast enterprise of early cyberinfrastructure, combining hardware, information architecture, and an army of human experts. It was an irresistible lure to the phone phreaks, a group of curious folk who saw the government-protected monopoly's empire as both a puzzle and a playground. Exploding the Phone, Lapsley's delightful account of their adventures, sheds light on an underappreciated chapter in the history of technology. It also reveals the forerunners to the hacking subculture of today.

Exploding presents the stories of individual phreakers in chronological order, starting with the first people (AT+T employees excluded) who figured out how to poke into the phone company's innards by generating unusual sounds. These included college students who built "blue boxes," devices that emitted signals the phone network understood as legitimate commands. They also included several blind teenagers who could imitate those sounds by whistling. These proto-phreaks communicated in the early '60s with free conference calls and other shared phone services, building a virtual community. Some created recordings and made them available via repurposed phone lines, and they sound like today's Web or yesterday's Usenet. "Most were comedy skits," Lapsley writes, and "some were horoscope readings, others were political commentary and humor."

Before they were labeled phreaks (that happened in 1971, via an Esquire article) these outside explorers built machines to imitate the phone system's signals and to link two phones to make an ad hoc conference call; they methodically discovered codes for bouncing long-distance calls across multiple cities, reaching hidden exchanges. Meanwhile, as AT+T gradually realized that they were being invaded, the company slowly developed policy responses, including working with the FBI, tracking users, and ultimately recording millions of phone calls.

Many Americans, we see, saw the phone company as powerful, frustrating, sometimes terrifying, even fantastically megalomaniacal, a Leviathan anyone who's seen the 1960s conspiracy comedy The President's Analyst will recognize:

The contrast with the scrappy phreaks gives Lapsley's book a David-and-Goliath flavor, an emotionally satisfying dynamic that gives life to his occasionally dry subjects. We can understand how outgunned the phreaks felt, then appreciate their boldness. The fact that so many phreaks were blind heightens the emotional investment. But Exploding the Phone doesn't get trapped in the available underdog vs. evil empire clichés. AT+T's enforcers sometimes appear as charming and clever, the phreaks' doubles on the other side of a war. (One of the book's revelations is that some phone workers were phreaks on the side.) Similarly, the phreaks are not always sympathetic. Nor are they always clever: In one particularly foolish mistake, the legendary phreak John "Cap'n Crunch" Draper, invites a warrantless FBI unit to search his belongings. The book's characters are never cyphers for the larger struggle. (Draper got his nom de phreak by discovering that a toy whistle given away in Cap'n Crunch cereal made precisely the 2600 Hz tone needed to convince the phone system not to charge for a call.)

By the early 1970s, that struggle had escalated into a multi-agency campaign, with trials and prison time for the enemies of the phone company. Some of the more criminally inclined were killed in their line of work. Draper was the first to be jailed. After making a very visible presence of himself and pulling some impressive pranks—Crunch claimed to have called then-president Nixon in the White House, at which point he complained about a toilet paper shortfall—he served several years behind bars.

The book ends by guiding us through the transition from phone phreaking to computer hacking. Some explorers used early computers to increase their capacities to find more numbers and codes, while others took jobs with the post-breakup remains of the once-giant Bell. Two men who used to build and sell blue boxes—a couple of fellows named Steve Wozniak and Steve Jobs—founded a little company called Apple Computer. (Draper, meanwhile, created Apple's first word processor.) Other phreaks moved into other passions as digital telephony gradually replaced the old analog systems, closing off the playground.

Nearly every chapter of the book takes time to patiently introduce another one of AT+T's extraordinary technical achievements, either at the macro or micro scales. Lapsley introduces us to a shadow lexicon of terms: loop arounds, step-tandem switching, tandem stacking, open sleeve-lead conferences, inward operators, simultaneous seizures, to say nothing of blue boxes, black boxes, red boxes, and cheeseboxes. Yet this backgrounding never becomes overwhelming. Like a good teacher, Lapsley lays out small amounts of information at each encounter, carefully returning to those dollops in succeeding chapters.

Why should we care about this combination of technical minutiae, eccentric characters, and byzantine organization? For one thing, the phreaking story gives us a first draft of the world of hacking. We see similar groups of determined youth spooking their elders, developing new identities, forming virtual communities. The phreaks demonstrate the hacker's love of tinkering, for working through a puzzle for its own sake (plus the bragging rights). They use social engineering to winnow secrets and publish work through their own media – for the telephone it was the Yippie-spawned zine Youth International Party Line, later called TAP. They probe into the recesses of power, including the tools of a raging Cold War. (One FBI/AT+T/NSA investigation sought to determine if a phreaking method would let the proto-hackers scramble fighter planes.) The authorities fight and sometimes hire them.

History never repeats exactly, of course, and the differences between hackers and phreaks are instructive. We don't associate hackers with blindness, for example. And while hackers have inspired a lot of media panic, phreaking enjoyed mostly serious and supportive commentary from media outlets—not just Esquire but Ramparts, The Wall Street Journal, and NPR show.

Phone phreaks also speak to non-hacking concerns. Their activities elicited several sorts of surveillance, both corporate and governmental, which in turn raised questions of when such entities could violate individual privacy—a debate that, needless to say, is still ongoing. The use of a virtual world to make up for offline limitations, be they visual impairment or social constriction, is one we've become accustomed to at a global scale. Perhaps as we see surveillance and and other forms of social control rise at the expense of personal freedom, the phone phreaks' story will inspire some readers to probe other systems for weaknesses and mysteries. "If idle hands are the devil's tools," Lapsley informs us, "then a clever teenager with idle hands and a methodical personality is the devil's munitions factory."

NEXT: High School Teacher Faces Discipline for Informing Students About Their Rights

Editor's Note: We invite comments and request that they be civil and on-topic. We do not moderate or assume any responsibility for comments, which are owned by the readers who post them. Comments do not represent the views of or Reason Foundation. We reserve the right to delete any comment for any reason at any time. Report abuses.

  1. A+T? AT+T?

    How about a fucking ampersand, Bryan?

  2. How did Doherty miss out on this, Phil is a fellow Burning Man attendee and all-round cool guy.

  3. “they sound like today’s Web or yesterday’s Usenet”? What about today’s Usenet?

  4. Hey, my question disappeared!

    Having read The Victorian Internet, about how the telegraph presaged email in its disruptions of daily life, were there any telegraph hackers, say tapping a telegraph line to send private messages or tricking the regular telegraphers into acting on their behalf?

    1. I am sure there were, but have not fun across that.

      I read something by Bruce Sterling that the first Bell system employees came from the ranks of telegraph boys, like young Thomas Edison was. But they had to switch to women because the boys were constantly destroying phone equipment. He said it was in Mr. Watson’s biography, but I have not found a copy of his biography anywhere.

      1. The book indicates that they originally used teenage boys as operators which worked fine for the connecting-calls part, but not so much for the customer-service part.

    2. I’ve never read anything about that, SR. But it would be an interesting plot point for steampunk fiction.

      Phone hacking came about because of the wide availablility of phones in private homes (opportunity) and the phone system’s use of in-band control signals (means).

      1. Couldn’t have anything to do with Soviet engineers feeding technical data to the Hoffmans and others of the left. Nay, nothing to see there (until they do their next every 40 years archives opening).

  5. Draper was the first to be jailed. After making a very visible presence of himself and pulling some impressive pranks?Crunch claimed to have called then-president Nixon in the White House, at which point he complained about a toilet paper shortfall?he served several years behind bars.

    Draper is truly lucky to be alive. It seems like every era he does something to get himself in the cross hairs of someone for something. While he was in prison, some mob guys asked him how to red-box (make freebie pay phone calls), so he intentionally gave them bad information. When the method didn’t work, they beat the hell out of him.

    In the 1990s, IIRC, he somehow pissed off the whole K-Rad (explosive loving) hacker nation, who repeatedly destroyed every online presence he had for making any sort of living (he was homeless at the time, self-imposed he said).

    After Internet Underground interviewed him for their October 1996 edition (there is an on-again-off-again archive for the magazine, that seems to be off right now) Draper demanded final edit rights and I forgot what else.

    However, besides creating the first Apple word processor EasyWriter, I believe he created their first phone interface board, “The Charlie Board,” that was never put into production, along with several software items that did get used.

    1. Draper is a weird and somewhat creepy dude. I met him a couple of times.

      There was related, not-really-hacking activity that went on circa the early ’70s. Big corporations had special numbers for their employees on the road to make long distance calls. The numbers were dialed as a sort of long prefix to the actual number. Underground newspapers would sometimes publish these numbers, and a few times I used them from pay phones to make “free” long distance calls.

      1. A guy I used to fly with was a commercial radio engineer on his civilian job. He was one of the first people I ever knew with his own home computer in the early 1980s. One of the primary tasks he gave it was dialing Sprint LD access numbers, then trying PIN codes until he had enough for all of his LD calls (if I recall the process correctly).

    2. All covered in the book, but Draper has consistently been his own worst enemy.

  6. I’m about halfway through this and recommend it to anyone with an interest in phone phreaking, hacking, the Steves or Draper.

    1. The only Steve Jobs contribution to the world was making computers pretty. Otherwise, he is own of the worst Americans since FDR.

      1. You clearly don’t know much about computer history.

        1. I know enough that nearly every single claim of Job’s about computers is false, right down to the Apple “invention” of the switching power supply. And he knew they were false.

          His lawsuits all over the place for cases that resembled Apple, or anything else that resembled anything Apple thought of was at least as bad as Eli Whitney and his Cotton Gin lawsuits.

          What version did you decide to believe?

  7. thanks for sharing this dead composed content i love your content

  8. like this blog thank you for share stick with it

  9. regards for helping out thoroughly enjoyed your gardens sites of interest

  10. absolutely love this site perfectly quality content you are a very intelligent

  11. totally what i wanted to find where can i find out more? i am so grateful for your article post

  12. truly amazing it helped me very much so much excellent

  13. i’ve read and find good information from your articles top post very informative post

  14. carry on it top post great post

  15. good luck iam happy linked to this place you are a very clever person

Please to post comments

Comments are closed.