Stuff You Should Know explores the fascinating origins of "phone phreaking," the 1960s phenomenon where enthusiasts exploited the newly automated telephone network by emulating audio tones. The episode provides insight into the techniques phreakers used to make free calls and the key figures, like Joe Ingresia and John Draper, who discovered and shared this knowledge.
Josh Clark and Chuck Bryant delve into how phreaking paved the way for early hacker culture and the legal crackdowns imposed by AT&T and the FBI. While outdated, the phreaking spirit lives on as hackers continue exploring emerging technologies. This captivating exploration of phone phreaking highlights a pivotal moment in telecommunications history and the curiosity that drives technical exploration.
Sign up for Shortform to access the whole episode summary along with additional materials like counterarguments and context.
Phone phreaking emerged in the 1960s when tech enthusiasts discovered how to manipulate the newly automated telephone network. Josh Clark and Chuck Bryant explain that before automation, phone operators prevented phreaking, but multi-frequency tones left the system exploitable. Phreakers used whistles or "blue boxes" to emulate tones like 2600 Hz, tricking the system to connect calls for free.
Early pioneers like Joe Ingresia and John Draper, who could recreate the crucial 2600 Hz tone by whistling, helped discover techniques and form a curious community that shared knowledge. Ron Rosenbaum's 1971 Esquire article brought wider attention and inspired future Apple founders Steve Jobs and Steve Wozniak to briefly join the phreaking scene.
Clark notes that phone phreakers laid the groundwork for 1970s/80s hacker culture as their curiosity drove them to understand unseen systems without malice. As computers emerged, phreaks like Jobs and Wozniak transitioned their skills to this new frontier. Legally, AT&T's crackdown set precedents for government surveillance.
Facing huge financial losses, AT&T partnered with the FBI for a major wiretapping operation. By upgrading to digital networks impervious to phreakers' tones, the practice became obsolete by the 1980s. While outdated, the phreaking spirit lives on as hackers exploit emerging technologies.
1-Page Summary
The notoriety of phone phreaking began in the mid-20th century as tech-savvy individuals discovered methods to manipulate the automated telephone network system.
The golden age of phreaking spanned from the mid-1960s to the mid-1970s, coinciding with the replacement of manual switchboard operators by automatic switches. The inventors of the automatic switch, created in the 19th century due to a personal vendetta involving a mortician, did not anticipate that the tones guiding these switches could be replicated by something as simple as a human voice or a toy whistle. This meant that before these technologies, the manual attention of phone operators prevented such exploitation because any odd behavior, such as whistling, would have been immediately noticed.
The automated telephone network operated on a system that used multi-frequency tones, which could be triggered by pressing the numbers on a phone. These tones executed specific actions within the network, such as connecting calls over trunk lines. Each trunk line was designed to carry one voice from a location to another. By emulating the tones, it allowed phreakers to gain control over the system.
Phone phreaks exploited this system by replicating tones that instructed the phone system to perform actions such as connecting a call. Most notably, phreakers could mimic the 2600 Hz tone, which fooled the system into thinking the phone was on the hook. If done during a call to an 800 number, which would not incur charges, the phreak could afterward dial another number, granting free long-distance access. The use of "blue boxes" became infamous. These devices allowed phreakers to generate the necessary tones to conduct free long-distance calls, without ...
The origins and techniques of phone phreaking
Phone phreaking, the exploratory hobby of hacking into the telephone system, was pioneered and spread by a number of technical-minded enthusiasts. Josh Clark and Chuck Bryant discuss the impact of key figures such as Joe Ingresia and John "Captain Crunch" Draper on this early form of technological exploration.
Ingresia, who went by the handle Joybubbles, was an early pioneer of phone phreaking with a remarkable ability to whistle the 2600 Hz signal that controlled the phone system, demonstrating his perfect pitch. Alongside Ingresia was John Draper, also known as Cap'n Crunch, who discovered that a whistle given away in a box of Cap'n Crunch cereal, when modified, could emit the same crucial 2600 Hz tone.
Clark and Bryant highlight the formation of a community of phone phreakers who were united by their curiosity and technical skills. The spread of the master tones through publications and sharing among the community made phone phreaking more accessible and expanded this network of technically gifted individuals who were intent on pushing the boundaries of the telephone system.
Ron Rosenbaum's article "Secrets of ...
Key figures and the spread of phone phreaking
The transition from phone phreaking to hacker culture in the 1970s and 1980s laid the foundation for the technological advances and challenges we face in our connected world today. Josh Clark and others have provided insights into how this shift from exploiting telephone systems to pioneering in the realm of computing occurred.
Phone phreakers, the earliest hackers, were driven by curiosity. They wanted to explore the intricacies of the telephone system, which at the time was the most sophisticated communication network. Their fascination wasn't with creating havoc but with understanding a hidden world.
Phone phreakers embodied the same curiosity and drive to explore as early hackers. They sought to understand the unseen mechanisms of the phone system and often did so by attempting to break it. However, their intent was generally not malicious; they were driven by a quest for knowledge, leading them to push the boundaries of the system's capabilities.
As the personal computer began to proliferate, phone phreaks transitioned their skills to the burgeoning field of computers. Clark notes that individuals connected their phones to their computers using acoustic couplers to dial numbers and seek out modems to hack into. In the 1980s, with the advent of more accessible computers, the tones required for phone phreaking could be generated programmatically, making the practices of phone phreaking more widely accessible. The influence of phone phreaking on early hacker ...
The transition from phone phreaking to early hacker culture
As phone phreaking techniques became increasingly sophisticated and costly for telecommunication companies, particularly AT&T, a robust legal response emerged to curb the illegal practice.
The hosts discuss the significant financial loss AT&T faced due to phone phreaking, estimated at $30 million per year (over $175 million today), which galvanized the company to partner with the FBI to monitor and prosecute phreakers. This collaboration resulted in a massive wiretapping operation known as "Green Star," wherein over 33 million phone calls were recorded. This operation not only targeted phone phreakers but also laid the groundwork for the expansion of government surveillance powers.
Josh Clark and Chuck Bryant discuss how the evolution of telephone technology rendered phone phreaking methods ineffective. AT&T upgraded its system from electromechanical to fully electrical, and then to digital switches that phreakers' tones could not manipulate. This technological advancement, particularly the separation of lines for voice transmission and control tones, made the exploits used by phreakers obsolete.
The legal response and crackdown on phone phreaking
Download the Shortform Chrome extension for your browser