Hear, hear. Or is it here, here? Anyway, I agree. This is a fantastic story. I'd never heard about the Whistler before, but I had heard about Woz and Jobs and the blue boxes. And as it is told here, I do see the logic in the Whistler being at least partly, if not completely, responsible for the formation of Apple. Great stuff.
Wasn't there a whole slew of these people in the 70's. I think one was called "Captain Crunch" who also sold these boxes? And to think today - at least in the USA, long distance is effectively free. My how times have changed!
Yes. Captain Crunch is probably the most widely known. You can find videos of him on youtube. He got his name from the captain crunch whistle he started with. He found it was the perfect tone to trick the phone into giving him things. Later, he got to where he could just whistle the tones as well.
Yep, that movie did a fantastic job on a few things. They showed that hacking was mostly a social manipulation game as well. A good percentage of the time you never touch a computer. You con people into giving you the information you want instead.
This was a good story, but come on. We all know the FBI did what they wanted to do doing the 60's and early 70's. I really appreciate the article. There were a bunch of guys like this during that time period but their stories will never be told. But thanks for a visit from the past.
@Charles.Desassure, I'm glad you liked it. It's a good documentary. I watched the full 50 minutes! The Computer History Museum in Mountain View, CA may have one of those blue box keypads from Woz (who is a big supporter of the museum). I like that Woz, Draper, and Mitnick are sitting at the table together at the end. Two of them had some tough go of it, didn't they.
My wife casually mentioned that she had used a small phreaking box as a teenager. She was surprised to see me get excited. She had no idea what a pivotal role that piece of hardware had played in our tech/security history.
"Here's my collection of the 10 best docs/movies about hacking."
This reminded me of one the best books written early on about hacking - The Cuckoo's Egg, by Clifford Stoll. I remember picking it up at the library when it first came out not knowing what to expect and then not being able to put it down. A real page turner!
Ah, the old days. When I attended Berkeley in the early '70s, I didn't know anyone who actually paid for long-distance calls, which were quite expensive back then. Blue boxes, black boxes, credit cards, phony 3rd party calls, and other techniques were shared ad freely as spare change. The bad part was that the phone companies would always end up calling the people that you called after a couple of months, threatening them with criminal action for committing misprison of a crime. I never heard of anyone getting into actual trouble for it, aside from the hackers who built the boxes.
Arrggghhh -- that's right -- now I remrember you bringing one of these to my office and telling me that this was what Clifford wa sdoing. I must admit that when O wrote my comment there wa ssomething at th eback of my mind about this -- but these days I seem to forget more than I... sorry, what were we talking about? :-)
Thanks, Caleb. Clifford Stoll spoke twice at the Embedded Systems Conference about 10 years. We still have the video of him running around, hair flying. He was very inspirational, funny, and fun. THanks for this video collection.
I'm sure there were lots of people disappearing, but these kids were probably just seen as peculiar annoyances. They weren't tied to any of our "enemies" and they were just screwing with phone relay systems. In the 60s and 70s the FBI had more pressing issues.
Of course, all that changed, and now you can get in serious trouble even for contacting a company to tell them you stumbled onto a security flaw.
It is remarkable what an influential role some of the "phone phreaks" played in creating the hacker culture -- both the mischevious kind of hacking and the tinkering-with-electronics kind that fueled the microcomputer revolution.
The apple connection is a thin one, but it is there. Woz and jobs learned how to build the phreaking boxes that Jo had helped design. The two built them and sold them, then went on to keep building and selling things together, like the first apple.
Thanks for enlightening me on the Apple connection.
In the olden days when companies used to put a physical lock on the telephone rotary dial, to restrict the use of the phones by employees for private purpose, I have developed the skill of tapping the hook to imitate the dial pulses to dial a desired number without using the dial. Most of the time I succeeded.
For the complete story about phone phreaks, blue boxes, and the AT&T phone system, read the excellent book, "Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell," by Phil Lapsley.
He discovered that a plastic Bosun's whistle that came in Captain Crunch cereal emitted a frequency of exactly 2600 hertz, which was the phone company's "knock-down" tone between central office tandems. This allowed him to make free calls worldwide. He got in BIG trouble over it.
BTW- Don't get any ideas- his scheme won't work with most modern phone exchanges.
Is there any love out there for the other Kevin, not Mitnik but Paulsen? I read his Biography called the Watchmen, or something like that. It was one of the most interesting books I've ever read. I highly recommend it for anyone who wants an awesome trip back into the Eighties and a superb view into the world of an A-List Phreak.
It's better to create your job than apply for a job. Jo's story inspires not only Wozniak and Jobs but also others. Jo has created his job by hacking into phone line. There are a lot of enterprenenurs creating their own job by reinventing business. Thinking outside the box and challenging the existing operation seem to be critical to creation.
Try to get around digital rights management in your iAnything and I'll bet the big Apple sends its lawyers after you, like Ma Bell did to the Phreakers. Is it the proper place for a publication, blogger, or corporation (like the author's) to encourage people to break the law so they can circumvent a company's product revenue. Not a hero.
As a kid I, too, read about Blue Boxes, the Captain Crunch whistle, and the thrill of routing (expensive) phone calls across satellites and continents. There was a very nice article detailing it all in "Esquire" magazine back long ago (late 60's?). I've got a "Xerox" of it around here somewhere.
As I recall, the phone company stopped (limited) the Blue Boxes and whistles by making the toll switching equipment respond only to 2600 Hz tones originating from Central Offices.
It's hard to see how Blue Boxes inspired the Apple II, Mac, iPods, or anything else. It might have given idle minds a source of $ that allowed them to keep thinking of something better to do.
I hear there was a deaf guy long ago who ended up writing some of the world's most beautiful symphonies. Ludwig somebody.
It's interesting to see how stories about hackers inspire a lot of us.
While some of us might be dismayed by the law-breaking nature of certain hacking, others are definitely cheering for hackers -- really smart, but not exactly the mainstream engineers -- to win. It's the ultimate underdog story we have all come to love.
No matter how you slice it, Steve and Woz look like the brains and leaders of a pack of thieves, as illustrated in their first blue box business venture. What is the difference between their blue boxes and a lock pick from an ethical standpoint?
The definition of a thief is someone who bypasses what security there is and takes something of value. Just because it's high-tech is no excuse. Why does our society accept white collar crime compared to blue collar crime, despite the damage that white collar crime does is far greater? Just look at the financial meltdown.
Once a thief always a thief. Apple went on to lift the technology of the MacIntosh from Xerox etc. etc. Steve even bragged about not inventing anything - he just took what he needed and attacked all competitors with his team of lawyers.
The Apple logo says it all. The apple that Eve took a byte off. Who is the serpent supposed to be?
The reason I can feel ok celebrating them(phreakers) is that, at that point in time it was simply exploration, they were pioneers! Since then, we've come up with better ways of exploring these things that are more ethical. Just look at the things going on at blackhat conferences. We now have entire industries built around penetration testing and hacking.
As far as business leaders using other people's ideas, well that happens. Sometimes it is the implementation of the idea that really makes a difference. However, you're spot on with the complaint about the apple lawyers.
Wow. Woz et al., committed the original sin? If we want to go back really far, we can say the Europeans stole North America from the Native Americans. So all these corporations (like the phone company) are really just a party to that original sin and therefore thieves.
Did you ever see my blog Who Woz That Masked Man? in which I met the Wos (and vice versa, of course). The strange thing was that he and Jobs were always billed as "hippies," but he was in a suite and I was in my usual garb...
What are the engineering and design challenges in creating successful IoT devices? These devices are usually small, resource-constrained electronics designed to sense, collect, send, and/or interpret data. Some of the devices need to be smart enough to act upon data in real time, 24/7. Specifically the guests will discuss sensors, security, and lessons from IoT deployments.