Telenet The 1983 Hacking Incidents and The Construction of Network Security in The United States
Telenet The 1983 Hacking Incidents and The Construction of Network Security in The United States
Telenet The 1983 Hacking Incidents and The Construction of Network Security in The United States
This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MAHC.2023.3347632
Telenet, the 1983 Hacking Incidents, and the Construction of Network Security in the United States
Brian K. Vagts
Annals-2023-09-0030.R1_Vagts
Author Bio: Brian Vagts is an Associate Professor of History at Northern Virginia Community College in
Alexandria, Virginia, USA. His research interests include the development of behavior on early digital
networks and the Northern Virginia technology industry. Vagts has a M.A. in History from George
Mason University and is currently enrolled in the Science and Technology Studies program at Virginia
Authorized licensed use limited to: UNIVERSIDAD DE SALAMANCA. Downloaded on January 29,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Annals of the History of Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MAHC.2023.3347632
Abstract
1983 marked an important point in the development of how people behaved regarding security on
data networks in the United States. The confluence of the movie WarGames with a series of high-profile
network breaches of Telenet, one of the biggest commercial data networking providers at the time,
created a great deal of popular media attention. This public attention exposed how multiple social groups
approached security in the formative period of data networking. As seen through these hacking incidents,
persistent problems in network security such as the use of insecure passwords were well established and
understood in the 1980s, and led to shifts in social behavior and expectations rather than a change in the
technology.
Introduction
The behavior of people on networked computer systems developed over the decades into its own
distinct set of cultural practices, including attitudes and actions related to network security. A series of
events in 1983 contributed to the social construction of network security that had lasting impacts in the
United States. At the time the Internet as currently known did not exist, and its most direct precursor, the
ARPANET, was still limited to a relatively small group of specialists. Most users of data networking at
the time used discrete networks that, while large, were usually not interconnected. These data networks
were commercial entities rather than governmental or academic organizations such as ARPANET. Their
large user-base and commercial orientation provides an important historical input to the construction of
networked security. ARPANET provided the technological basis for the modern Internet, but Telenet and
other commercial data networks provided much of the social basis. The less commercialized BBS
systems, as documented by Kevin Driscoll, also made significant contributions, creating “norms and
practices that continue to shape the social media systems we rely on today.”1 These different systems
1
Driscoll, The Modem World, 27.
Authorized licensed use limited to: UNIVERSIDAD DE SALAMANCA. Downloaded on January 29,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Annals of the History of Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MAHC.2023.3347632
made up a “paleo-Internet” that helped to shape networked human behavior that later became embedded
1983 saw multiple instances where the Telenet commercial data network was used to access
computer systems without authorization, a practice popularly known as hacking. The conjunction of these
events as well as the release of the movie WarGames allowed computer hacking and security to enter
mainstream consciousness in a new way. The interactions between the different user groups of Telenet
reveal how the construction of network security prioritized the interests of data communication providers
and large enterprises while simultaneously failing to address the resistance towards effective security
practices by end users. Long-term impacts of this approach include a particular division of responsibility
for security between the different agents engaged in networked computing, a focus on securing host
computers rather than the network itself, and an over-reliance on a socially flawed authentication system
based on passwords.
The paper looks at the events of 1983 based on the published material from the period including
newspapers, the movie WarGames, hacker accounts, contemporary academic articles, and congressional
testimony. The first parts establish the context of data networking in the United States at the time,
including a look at Telenet and the events of 1983 itself. It then proceeds to look at network security as a
social construction. The social construction of technology (SCOT) framework is used to examine how
different social groups built conceptions of network security. Finally, it looks at what alternatives existed
in 1983 as well as the opinions of social groups who were reflecting on the events.
Telenet is just as much a child of ARPANET as the modern Internet. Telenet was established in
1972 as a subsidiary of Bolt Beranek and Newman, Inc. (BBN), an important provider of much of the
early underlying technology of ARPANET.2 In 1973, Larry Roberts, director of the Information
Processing Techniques Office (IPTO) at Advanced Research Projects Agency (ARPA), left government
2
Mathison, “The History of Telenet,” pp. 32.
Authorized licensed use limited to: UNIVERSIDAD DE SALAMANCA. Downloaded on January 29,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Annals of the History of Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MAHC.2023.3347632
service and joined Telenet as its president. In the process the company relocated from Cambridge,
Massachusetts, USA to the Northern Virginia suburbs of Washington, DC, USA.3 Telenet began
operations as the “first public packet-switched data communications service in the United States” in
1975.4 In 1976 Telenet, along with multiple international partners, played an important role in developing
the basis for what would become the X.25 standard, which was important in early networking.5 X.25 was
a substantial competitor with TCP/IP for much of the 1980s and Telenet’s role is an indicator of its
Being the first commercial packet-switched network in the United States was a point of pride for
Telenet, but it was only true with a substantial caveat. TYMNET, a service provided by Tymshare, Inc.,
had started operations in 1971 and also offered data networking services as an adjacent service to its
primary computer time-sharing business.7 However, the early TYMNET was offered on an unregulated
basis, and was spun off as a regulated communication service in 1976 after a regulatory complaint by
Telenet.8 The two companies competed for the same customers and were the predominant data
communications providers at the time. Telenet was acquired by GTE in 1979 and TYMNET by
In 1983 Telenet was formally known as GTE Telenet and was an operating unit in GTE’s
Communication Services group and reported providing service in 325 cities in fifty-one countries.9 While
Telenet did have an international presence, the events documented here appear to be limited to the United
3
Mathison, “The History of Telenet,” pp. 33.
4
Mathison, “Telenet Inaugurates Service.”
5
Rybczynski, “A New Communication Protocol for Accessing Data Networks,” pp. 477.
6
Abbate, Inventing the Internet, pp. 154-155.
7
Tymes, “Routing and Flow Control in TYMNET,” pp. 392.
8
Mathison, “The History of Telenet,” pp. 36.
9
“GTE 1983 Annual Report,” pp. 25, 33. It is not clear when this was published but the CEO’s “To Our
Shareholders” introduction is dated February 29, 1984.
Authorized licensed use limited to: UNIVERSIDAD DE SALAMANCA. Downloaded on January 29,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Annals of the History of Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MAHC.2023.3347632
States. Telenet first became profitable in 1983, and the division of GTE that it was a part of reported
revenue of $578 million, though Telenet’s share of that was not broken out separately.10
Security on ARPANET was a concern from the beginning. A basic form of access control had
been provided by attempting to limit access to the ARPANET to those who had contractual relationships
with the Department of Defense. Quinn DuPont and Bradley Fidler showed how experiments with
encryption was an important, if mostly experimental, part of ARPANET from an early date.11 This
restriction created an opening for commercial vendors like Telenet, and while ARPANET continued to
create the technologies that resulted in the modern Internet like TCP/IP in the 1970s and 1980s, the
commercial services like Telenet and TYMNET likely had more users. In 1983 Telenet was estimated to
have 2,000 customers and about 200,000 users.12 In contrast, in 1983 before the ARPANET/MILNET
split there were a total of 113 nodes in the ARPANET.13 Each customer of Telenet was roughly
However, some of those Telenet users and customers may have only used the Telemail email service
provided directly by Telenet without having their own systems connected as a node, and likewise each
computer would have had varying numbers of users. As such it is difficult to establish a direct
comparison between the two systems in terms of users and numbers of computers connected, but Telenet
appears to be vastly larger than the ARPANET of the time. The users of Telenet would more resemble the
populations using the Internet in the following decades as most were non-computer specialists using the
While there were examples of hacking and phone phreaking prior to 1983, the release of the
movie WarGames played an important role in making the public aware of it. The movie revolves around
10
“GTE 1983 Annual Report,” pp. 32-33.
11
DuPont, “Edge Cryptography.”
12
Ackland, “Lawmakers Hear Tales of Computerized Capones,” pp. 3.
13
Hafner, Where Wizards Stay Up Late, pp. 249.
Authorized licensed use limited to: UNIVERSIDAD DE SALAMANCA. Downloaded on January 29,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Annals of the History of Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MAHC.2023.3347632
the idea of a hacker innocently accessing a Department of Defense computer to play games. The game in
this case happened to almost trigger a nuclear exchange between the United States and the Soviet Union.
WarGames was fictional, but it did create public interest in the issue. The movie shows that the stereotype
of the teenage male hacker was already established. It also proved concerning to officials in the military.
The Los Angeles Times in July ran a long article where the North American Aerospace Defense
Command (NORAD) disputed the possibilities shown in the movie. The article asserts that the movie was
marketed as “a motion picture based on what could really happen.”14 It goes on to interview Lieutenant
While Alderfer’s assessment of the security of the nuclear systems was likely accurate, events later in the
In August 1983 a group of teenaged and young adult hackers, called the “414s” after the
Wisconsin area code where they lived, managed to gain access to the computer systems of different
organizations. One of these was at the Los Alamos National Laboratory.16 This computer only contained
“unclassified correspondence and unclassified abstracts of scientific papers” and was not directly
connected to any weapons systems.17 Nevertheless the unauthorized access of a computer at one of the
laboratories responsible for the production of nuclear weapons did little to address concerns that were
raised by WarGames. Reporters make a point of mentioning that the NORAD computers were isolated
14
Lee, “Wargames Playground,” pp.1.
15
Lee, “Wargames Playground,” pp.14.
16
Fritsch, “Young Computer Buffs Rocked the System,” pp. 19.
17
Burnham, “Computer Security Raises Questions,” pp. 7.
Authorized licensed use limited to: UNIVERSIDAD DE SALAMANCA. Downloaded on January 29,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Annals of the History of Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MAHC.2023.3347632
and unable to be accessed via a network.18 This same group of hackers also breached a computer involved
An incident in October of that year continued the trend. In this case, a Telenet Telemail server,
which provided email service, was hacked by a group called the “Inner Circle,” putting the
communications of those who used the service at risk. Initial reports regarding the incident were dramatic.
Four teenaged boys “had linked up with the huge system at the invitation of “The Cracker,” a mysterious
computer wizard from the San Diego area who they had never met.”20 Up to 17,000 mailboxes were at
risk of compromise.21 The reality was that “The Cracker” was another teen, Bill Landreth, who was
convicted of wire-fraud in 1984.22 The example of the 414s and the Inner Circle would be important for
reinforcing the notion of the curious but not ill-intentioned teenaged hacker that was prevalent prior to
this time. It is unclear if these boys were simply curious, or if this much publicized naivety and curiosity
was created as a means of legal defense. Regardless, this notion of the innocent, young, male hacker had
Telenet’s Response
Telenet’s unintentional involvement with these incidents was impossible to avoid. A Chicago
Tribune article stated that “many of the recent hacker intrusions have been done through the public data
network run by GTE Telenet.”23 Telenet was both an attack vector and an attack victim: the 414s hackers
used Telenet to access their targets while the Inner Circle targeted Telenet itself.24 Responding to these
well-publicized incidents would involve balancing several competing factors. Moving too aggressively
could undermine user confidence in the system, but likewise having no response could also do the same.
18
Burnham, “Computer Security Raises Questions,” pp. 7.
19
Fritsch, “Young Computer Buffs Rocked the System,” pp. 19.
20
Emmons, “GTE May Prosecute,” pp.1.
21
Emmons, “GTE May Prosecute,” pp. 3.
22
Halvorson, Code Nation, pp. 208.
23
Ackland, “Lawmakers Hear Tales of Computerized Capones,” pp. 3.
24
Fritsch, “Young Computer Buffs Rocked the System,” pp.19.
Authorized licensed use limited to: UNIVERSIDAD DE SALAMANCA. Downloaded on January 29,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Annals of the History of Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MAHC.2023.3347632
Responding by increasing network security would also increase the difficulty of accessing the service,
Telenet’s response to the 414s’ hacks of their customer computers was restrained. Telenet was
used as a communications medium in this incident and its own systems were not breached. Telenet
attempted to strike a balance here, emphasizing the responsibility of the customer’s host computer for
security, while at the same time not alienating its customer. Telenet defended its access controls in place,
“Security is entirely dependent on the host computer,” Floyd Trogdon, head of network services
at Telenet, said in a telephone interview. “We have a public network; it needs to be user-
friendly,” he said, meaning understandable by the layman. “Would we consider making it harder
to penetrate? We might. But you have to recognize that we provide a service and that the general
customer wants easy access.”25
Telenet, unlike the commercialized data services of the 1990s and later, was classified as a common
carrier. It was the mission of the common carrier to provide communications services to any member of
the public. It was on the customers to implement security. TYMNET, by 1983 also a common carrier,
appeared to agree:
“Unfortunately, we have found that companies are not particularly tight in the way they protect
access to these networks,” said Alan P. Zucchino, a vice president of Tymshare in Cupertino,
Calif. “The reality is that companies are issued passwords and hand them out freely to many
employees—and then there is nothing we can do.”26
Outside of the data networking industry few voices were interested in the lack of network security.
Observers made a parallel to irresponsibility with valuable, easily stolen property such as cars:
“It’s terribly unethical for computer centers and networks to have the low level of security that
they do,” said Dr. Martin E. Hellman, a computer scientist at Stanford University who advises the
Federal Government on the subject of cryptography. “It’s like leaving the keys in the ignition of
an unlocked car.”27
This criticism, however, was seldom mentioned in the press. Telenet’s response and the media coverage
of the 414s’ hacks seem to be heavily informed by their status as a common carrier of communication
25
Broad, “Rising Use of Computer Networks Raises Issues of Security and Law,” pp. A15.
26
Sanger, “Computer Security Methods Weighed,” pp. D4.
27
Broad, “Rising Use of Computer Networks Raises Issues of Security and Law,” pp. A1.
Authorized licensed use limited to: UNIVERSIDAD DE SALAMANCA. Downloaded on January 29,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Annals of the History of Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MAHC.2023.3347632
services. As a common carrier, responsibility resides outside of the company for the issue of security on
customers’ systems. The issue changed a few months later when Telenet’s Telemail service itself was
hacked.
Telenet’s strategy regarding the Telemail hack focused on the agency of the hacker as a criminal
rather than issues of network security. While the Telemail hack was being investigated Telenet
spokesperson Claudia Houston said that “It is GTE Telenet’s intent, following the identification of
individual suspects, to pursue all available legal recourse, including criminal prosecution.”28 She declined
to comment on any security changes Telenet made, stating that it was against company policy. That might
have been a new policy, as two months earlier Telenet indicated that it was studying a way to provide
greater security via call screening, which would limit access to specific phone-numbers with a correct
password.29 Indeed, there do not seem to be any external communications regarding security at Telenet.
GTE’s 1983 annual report does not mention the incidents at all when discussing its Telenet subsidiary.30
A review of employment ads for Telenet does not show a specific interest in hiring security specialists.
While Telenet was ambiguous about what security implementations they were adding, hackers
were convinced that the company had done nothing. The January 1984 edition of 2600 had an article
called “The Trouble With Telemail” that asserted that it was “still just as easy to access as it was last year,
prior to the October raids on computer owners who had allegedly broken into the system.”31 It concluded
Telenet sought to place most of the responsibility for security breaches with that of the parties
who committed the breach, the hacker. There was a risk of an overreaction given that most of the hackers
involved were teenagers. News coverage of the breaches often emphasized the young age of the hackers.
The headlines include “Young Computer Buffs Rocked the System,” “‘Hackers’ Ignore Consequences of
28
Sugawara, “Va. Firm Calls in FBI: Computer Invaders Sought.”
29
Sanger, “Computer Security Methods Weighed,” pp. D4.
30
“GTE 1983 Annual Report,” pp. 25.
31
Corley, “The Trouble with Telemail.”
32
Corley, “The Trouble with Telemail.”
Authorized licensed use limited to: UNIVERSIDAD DE SALAMANCA. Downloaded on January 29,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Annals of the History of Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MAHC.2023.3347632
their High-Tech Joy Rides” and “Young Computer Bandits Byte Off More Than They Could Chew.”33
An article stressed how the teens were influenced by WarGames, and how they were “average-to-good
students.”34 Against this backdrop of sympathetic coverage, Telenet must not have been particularly
happy to see the headline “GTE May Prosecute: Irvine Boys Say Computer Break-In Not Intentional.”35
Faced with the breach of its own systems, Telenet attempted to emphasize the responsibility of the hacker
Telenet launched an advertising campaign in December 1983 to emphasize the role of the hacker.
The ad appeared in at least the Chicago Tribune, Los Angeles Times, New York Times, Wall Street
Journal, and Washington Post.36 It displays a photo of four criminals including Al Capone, Bonnie
Parker, John Dillinger, and a fourth, unidentified individual above the line “What makes the computer
In the old days criminals looked like criminals. And they toted submachine guns to prove it.
Today, there’s a new breed of criminal. His weapon is the personal computer. His target: the
corporate computer. Unfortunately, this criminal is unwittingly assisted by hackers who make
computer trespassing seem innocent. It is not. Computer crime is costing businesses millions of
dollars a year. And the problem is growing.37
Telenet here linked the famous violent criminals of the past with the modern issue of improper access to
computer systems. The youth and “innocence” of the hackers was dealt with by stating that they were
unwitting assistants, as directly attacking them would have put Telenet at odds with the sympathetic
media portrayals of teenage hackers. Telenet skirted this by implying that organized crime lurks behind
these innocent kids. The advertisement then discusses the limited nature of state and federal laws against
computer crime, provided a toll-free number for more information, and encourages readers to write to
their legislators. The problem of applying telecommunications law to data services was long known.
33
Fritsch, “Young Computer Buffs Rocked the System.”; Thornton, “’Hackers’ Ignore Consequences of
their High-Tech Joy Rides.”; Gellman, “Young Computer Bandits Byte Off More Than They Could
Chew,” pp. A2.
34
Treaster, “Trial and Error by Intruders Led to Entry into Computers,” pp. A14.
35
Emmons, “GTE May Prosecute.”
36
“Display Ad 25 -- No Title,” pp. A28. This is the version from the Washington Post, but the ads are
identical, and all are available ProQuest.
37
“Display Ad 25 -- No Title,” pp. A28.
Authorized licensed use limited to: UNIVERSIDAD DE SALAMANCA. Downloaded on January 29,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Annals of the History of Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MAHC.2023.3347632
10
Mathison and Walker had discussed the limits of the law for security back in 1970, stating that federal
law only addressed the security of “transmission rather than…the storage and processing of
information.”38 The situation had not changed much thirteen years later, as one of the articles said:
“We need a better definition of property,” said Tony Adamski, chief of the F.B.I’s financial
crimes unit, which handles many of the bureau’s computer cases. “Another thing is the notion of
trespass. The idea under common law is that going into someone else’s home is trespass, but
that’s not the case with a computer, at least from a criminal point of view.”39
In short, contemporary laws gave the government limited jurisdiction to intervene unless the data was
intercepted during transmission, which was not the case with the hacking incidents of 1983.
Other factors helped reinforce the idea of the hacker as criminal. In the case of the Telemail
breach, the first people identified as being part of it were four high-school students in California. They
engaged in a very public campaign to present themselves as innocent dupes of a master criminal:
“We know now ‘The Cracker’ is a high-level computer criminal,” said 17-year-old Wayne
Correia. “We had no intention of ripping off any company,” Knutson said. “…I definitely believe
‘The Cracker’ wanted to get us in trouble.” If so, “The Cracker” succeeded.40
These statements were provided in a press conference held in their high school theater. Emmons’ reported
that the press conference had been arranged by school officials, but given the potential of criminal
charges it is likely, though unstated, that lawyers were working with the families of the students to craft a
narrative. “The Cracker” appeared in multiple accounts as a shadowy agent manipulating others, and all
responsibility was transferred onto him. This public strategy appeared to have worked. When “The
Cracker” was identified as Bill Landreth, he was charged with and subsequently pled guilty to wire
fraud.41 Some of the earlier 414s hackers had pled guilty to misdemeanor charges.42 While Landreth
appears to have been more deeply involved in the actual breach of Telemail, with the others in the Inner
Circle simply enjoying the access he provided, there was a significant difference in treatment. Like the
38
Mathison, “Computers and Telecommunications.” pp. 214.
39
Broad, “Rising use of Computer Networks Raises Issues of Security and Law,” pp. A15.
40
Emmons, “S.D. ‘Wizard’ Involved,” pp. 1.
41
Landreth, Out of the Inner Circle, pp. 212.
42
Corley, “414s Plead Guilty.”
Authorized licensed use limited to: UNIVERSIDAD DE SALAMANCA. Downloaded on January 29,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Annals of the History of Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MAHC.2023.3347632
11
others, he was a teenaged high-school student in California, just one for whom a media narrative had been
Accordingly, Telenet chose to focus on the actions of individual criminals, rather than the security
of the network itself, while creating an exception for those individuals that might be sympathetic. It was a
sensible decision that was in line with its business interests, absent a security-based backlash which didn’t
occur. The opportunity to address a problem that has haunted the security of data networks to this day was
lost: that there are few network-based means of securing who can access the network or can access data.
Likewise, the concept of multi-party responsibility for security was minimized. When a comprehensive
law addressing computer security was passed in 1986, it focused on criminalizing the external intruders
The use of passwords for most security systems are at the root of the problems of 1980s network
security, not the ambiguity of the legal code. Passwords are an ancient technology and have long been
used in computing. Mathison lists passwords as the first means of controlling access to a computer system
well before the incorporation of Telenet.44 The security limitations of passwords were well known in
“The real weak link isn’t machines, it’s people” said Mr. Borden of the Yankee Group. “If
somebody tells you a password, it’s all over.”45
According to Bill Landreth, “The Cracker,” the initial penetration of Telemail came from when a default
password for a user account was leaked. Using the unprivileged user account, the Inner Circle determined
the names of users with “admin” access, which were then attacked. Landreth reported that using the first
name of a user with an admin account as a password worked “in a few cases.”46 In a later account
43
Slayton, “Framing Computer Security and Privacy, 1967-1992,” pp. 323.
44
Mathison, Computers and Telecommunications, pp. 210-211.
45
Broad, “Rising Use of Computer Networks Raises Issue of Security and Law,” pp. A15.
46
Landreth, Out of the Inner Circle, pp. 209.
Authorized licensed use limited to: UNIVERSIDAD DE SALAMANCA. Downloaded on January 29,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Annals of the History of Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MAHC.2023.3347632
12
Landreth said that some of the passwords consisted of the users last name with a capital-A appended.47
Compromise of a password goes much beyond the act of one person leaking a password. Due to the need
for a user to remember a password, they are often simple, which makes them easy to guess. The
protagonist in WarGames penetrated the school computer after finding the password “Pencil” written
down on a piece of paper.48 This fictional password appears more secure than other passwords used in the
real world. Some of the passwords documented to have been used by the 414s includes “SYSTEM”,
“TEST”, “MAINTENANCE” and “DEMO”.49 These easily guessed passwords made it quite easy for
unauthorized users to access a system. Once in, the passwords were shared, allowing for one person’s
is an open question why they are such an important part of networked security. Alternative methods of
security exist but are cumbersome for administrators and users, and so the use of passwords continues in a
way that is little changed from the 1980s. The technological means of security continues to depend on the
low cost and complexity of passwords, while the changes resulting from network security breaches are
The Social Construction of Technology (SCOT) model proposed by Trevor Pinch and Wiebe
Bijker provides the best theoretical framework for understanding the development of passwords and other
elements of networked computing in the 1970s and 1980s.50 SCOT holds that technology is created by an
iterative process where different social groups engaged in development of a technology influence that
development. Technology itself is not a fixed entity, but rather a construction shaped by the competing
interests of different groups of people. Obvious examples of the social groups engaged in the construction
of network security in 1983 include the data networking providers and three groups within a business
47
Novak, “The Untold Story of the Teen Hackers Who Transformed the Early Internet.”
48
Badham, WarGames, “David is sent to principal’s office, high school.”
49
Gellman, “Young Computer Bandits Byte Off More Than They Could Chew,” pp. A2.
50
Pinch “The Social Construction of Facts and Artifacts,” pp. 28.
Authorized licensed use limited to: UNIVERSIDAD DE SALAMANCA. Downloaded on January 29,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Annals of the History of Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MAHC.2023.3347632
13
organization: ownership and management, systems administrators, and end users within the businesses.
The interests of these different social groups had an important impact on the development of networked
Ronald Kline and Trevor Pinch’s examination of user resistance provides a useful addition to this
model. They expanded the SCOT framework by including power relations into the feedback process.51
Users have their own idea about how to use technology that can be interpreted as resistance based on the
power differential between the users and the providers of technology. Data networking provides a third
party between the networking providers and the day-to-day user in the form of the business organizations
that subscribe to the data networking service, but the basic model holds as the different social groups have
Bruce Schneier’s discussion of the economic factors behind computer security is very reminiscent
of the factors that were present in the 1980s as surely as they are present in the 21st century. Schneier says
The costs are significant: time, expense, reduced functionality, frustrated end users. On the other
hand, the costs of ignoring security and getting hacked are small: the possibility of bad press and
angry customers, maybe some network downtime, none of which is permanent. And there’s some
regulatory pressure, from audits or lawsuits, that add additional costs. The result: a smart
organization does what everyone else does, and no more.52
Data communication providers have little incentive to implement strong security, it represents cost and
complexity that is magnified by the potential loss of customers due to that complexity. Business
organizations do have an incentive to protect security, but that is balanced by the need to keep business
operations smooth and by the cost of the security. System administrators are caught between security
mandates and the realities of managing complex systems and user interactions. End users have an
incentive to reduce complexity of the passwords, and they may not care about security if their own
personal data is not at risk. Even if there are consequences from a data breach the risks are hypothetical
51
Kline, “Resisting Consumer Technology in Rural America,” pp. 53.
52
Schneier, “Computer Security: It’s the Economics, Stupid.”
Authorized licensed use limited to: UNIVERSIDAD DE SALAMANCA. Downloaded on January 29,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Annals of the History of Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MAHC.2023.3347632
14
and not certain, and the benefits from ease of use immediate and clear. As such, there is no significant
Although using passwords to access computer systems is an old technique, Telenet was operating
on a vastly larger scale than previous systems and had some of the largest user bases until the Internet
started to go mainstream in the 1990s. As such, understanding the social groups involved can provide
insight into the social construction of network security in a historical context. The interests of these social
groups is inferred from the published record, and refining their understanding of these events would be a
valuable area of additional research. The events of 1983 did not end up prompting much change to the
technology of data networking itself, but it did have an impact on how society regarded responsibility for
Telenet, as the data communication provider, was one of the most important of these social
groups as it built and deployed the core data networking technology. Being a part of GTE meant that it
was part of the telecommunication companies that were contesting the domination of AT&T. Smaller
companies like GTE were substantially threatened by a more aggressive entry into the data networking
space by established commercial entities like AT&T or IBM. Accordingly, Telenet had to expand as fast
as it could to fortify itself against challengers. Unlike government-backed ARPANET, Telenet had to
make a profit and as such had to make sure its network was both easy to use and had a wide reach.
Telenet’s strong public response to the Telemail breach made sense to bolster confidence in the service,
but it is unclear if there was much done behind the scenes to increase security. Growing the business was
the primary interest, and security remained a secondary issue unless the intrusions became a threat to the
business model.
The businesses that subscribed to Telenet would be the social groups that were most interested in
security, as they would be the ones most impacted by security breaches. However, businesses had to also
consider multiple other considerations such as costs. As the benign nature of the hackers in 1983 did not
act to impose substantial costs to security breaches, both Telenet and business management seemed
Authorized licensed use limited to: UNIVERSIDAD DE SALAMANCA. Downloaded on January 29,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Annals of the History of Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MAHC.2023.3347632
15
content to continue to rely on the use of passwords to determine access. Schneier’s assertion that cost
concerns override security concerns seems as valid in 1983 as they do in the 21st century.
End users and system administrators provided most of the resistance to effective password use.
Poor password security among end users created avenues for executing attacks against the more powerful
system administrator account.53 System administrators seem to have been just as reluctant as other users
to follow strong password use, as some of the released passwords seemed oriented towards operations.54
These passwords are especially weak given the attractiveness of administrative accounts for the high level
Both system administrators and end users can be seen as engaging in resistance to the intent of
password use. A strong password provides a good level of security when effectively used. However, a
strong password is complex and increases the complexity of any transaction that uses it. As such
individuals in both groups resisted the proper use of passwords, creating substantial opportunity for
security breaches.
Several secondary social groups played minor roles in these incidents. Computer and software
manufacturers influenced the social construction of any technology involved in computing, but they did
not play an obvious role in these events. The absence of involvement by regulatory bodies indicated that
regulation would not play a major role in the social construction of this technology, which is important as
regulation is one of the primary ways that security can be imposed in the absence of market forces.
Competitors like TYMNET could have provided these market forces, but their public response indicated
that they took a position like Telenet’s. Some unidentified customers discussed moving their business off
public data networks based on security concerns, but there is no evidence of competitive pressure on
53
Landreth, Out of the Inner Circle, pp. 209.
54
Gellman, “Young Computer Bandits Byte Off More Than They Could Chew,” pp. A2.
55
Sanger, “Computer Security Methods Weighed,” pp. D4.
Authorized licensed use limited to: UNIVERSIDAD DE SALAMANCA. Downloaded on January 29,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Annals of the History of Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MAHC.2023.3347632
16
WarGames was involved in the events of 1983 by increasing public interest and concern, but it
played only a limited role in the hacking events. Landreth stated he had penetrated Telenet the previous
year, and the short time between the release of the movie and the discovery of the hacking incidents make
it probable that the others were engaged prior to the movie.56 But the movie’s popularity did factor into
the public understanding of the events, and many of the hackers admitted to seeing it.
The news media played an important role in shaping the public's response. Overwhelmingly, the
newspapers minimized the criminal intent or repercussions of the hacker’s activity on the targeted
systems. The male hacker’s young age, good grades, and intelligence was usually emphasized. Although
these hackers were mostly benign, the issues they unintentionally exposed were quite dangerous. The
characteristics of the hackers created a perception that minimized the risk and limited the incorporation of
the feedback that the hackers provided to the social construction of networked security.
Hackers make up an odd subgroup of users as they are participating in the social construction of
the technology while being actively, if ineffectively, excluded. Unlike social groups such as the media,
hackers are directly using the systems in question. Nonetheless they provided critical feedback that
demonstrated that the resistance to strong password use created significant vulnerabilities. While at the
time hackers represented a small group of people, their involvement is an early indicator of what was to
come as computing became more diffused throughout society. Once the domain of computer science, big
business, and government, hackers were among the vanguard of those spreading this technology into a
The social feedback was not effectively incorporated into the technological systems of network
security in 1983. The permissive media coverage of the network breaches did not reinforce the public
perception of risk created by WarGames, and the disconnect between the non-fictional and the fictional
may have dissuaded people from appreciating the importance of this feedback. In contrast, Telenet’s
response contributed to the perception that responsibility for security breaches was held by the hackers,
56
Landreth, Out of the Inner Circle, pp. 209.
Authorized licensed use limited to: UNIVERSIDAD DE SALAMANCA. Downloaded on January 29,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Annals of the History of Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MAHC.2023.3347632
17
not the system. Instead of changes to technology, these events instead contribute to shifts in how society
Alternatives to Passwords
While issues of cost and complexity consistently are the most influential factor in shaping the
social groups’ considerations towards networks security, there were tools available that could have
supplemented passwords to provide increased security. Understanding these alternatives demonstrates the
constraints and choices that social groups operated in as network security was constructed. Increased
security of the network itself regarding access control would have been a valuable addition, as the
password-based vulnerability of the host systems was magnified by the fact that hackers could access the
network without authentication. The use of callback units could have improved network level security.
Upon accessing the network, a user would enter an ID code and hang up.57 The network would cross
reference the ID code with a list of authorized users, and if valid, call back the user at a pre-arranged
telephone number. While the ID code could be compromised, it would be difficult to exploit this without
also gaining control of the telephone number it was associated with. These callback units are likely the
“call screening” that Telenet indicated it was looking at.58 These systems do not appear to have ever been
deployed widely, but they would have been a useful non-password-based tool to increase security.
Encryption of stored data would have eased the vulnerability of data on hosts in the event of a
security breach. When the Telemail servers were compromised, the hackers were able to access user data
as it was not encrypted in storage. Encryption in the 1980s was computationally expensive and subject to
export controls that could complicate business plans. It was also complex, requiring key management,
creating issues for data recoverability, and generally increased the complexity of the user experience.
DuPont and Fidler stated that public-key based cryptography was gaining in popularity in the 1980s, but
this was not usually discussed in public accounts of the breaches.59 Callback units and encryption were
57
Landreth, Out of the Inner Circle, pp. 149.
58
Sanger, “Computer Security Methods Weighed,” pp. D4.
59
DuPont, “Edge Cryptography,” pp. 68.
Authorized licensed use limited to: UNIVERSIDAD DE SALAMANCA. Downloaded on January 29,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Annals of the History of Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MAHC.2023.3347632
18
certainly not flawless, but they were available measures that could have been taken to create a more
secure networking environment regarding the feedback from user password resistance and hackers.
Multiple entities such as the major telecommunications companies, time-sharing computing, and
the academic world did not directly participate in the events of 1983, but very much shaped and reflected
the social landscape those events operated in. The centrality of network access as a first step in breaching
computer systems raises the question of what the social expectations regarding network access were. The
mere proximity and power of AT&T in the period prior to 1983 must be considered. While AT&T in
1983 was in the late stages of being broken up, this had not yet been completed. Early in 1983 AT&T had
released the Net 1000 services, which was a direct competitor with Telenet.60 AT&T was also an
important provider of the leased lines that formed much of the basis for the physical infrastructure of data
networking. They also provided an immediately relevant counterpoint to how security was being
constructed. AT&T was known for maintaining an iron grip on access to its network. The primary
concern, at least in a regulatory sense, was the possibility of creating interference on the network due to
improper “attachments.” This, in theory, can be regarded as a form of network security as telephone
interference would cause conditions similar to the denial-of-service concerns seen with hacking
incidences such as the one at Sloan-Kettering Memorial Cancer Center, which interrupted computer
service.61 Interference might have been the concern that justified AT&T’s wishes, but the control being
exerted over network access well exceeded that concern. The Carterfone decision was critical for Telenet
in that it opened the telephone lines to acoustically coupled modems that Telenet users and hackers relied
A.T.&T. has urged that since the telephone companies have the responsibility to establish, operate
and improve the telephone system, they must have absolute control over the quality, installation,
and maintenance of all parts of the system in order effectively to carry out that responsibility.
Installation of unauthorized equipment, according to the telephone companies, would have at least
two negative results. First, it would divide the responsibility for assuring that each part of the
60
Mathison, “The History of Telenet,” pp. 42.
61
Fritsch, “Young Computer Buffs Rocked the System,” pp. 22.
Authorized licensed use limited to: UNIVERSIDAD DE SALAMANCA. Downloaded on January 29,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Annals of the History of Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MAHC.2023.3347632
19
system is able to function effectively and, second, it would retard development of the system
since the independent equipment supplier would tend to resist changes which would render his
equipment obsolete.62
This broad ranging network access control even in cases where interference was not an issue such as
Carterfone indicates that security itself was not the primary goal of AT&T regarding access to its
network. There appears to be little impact on the security landscape by this usage of network level
control. Notably, AT&T lacked the ability to proactively block access to the network of unauthorized
devices. Much like how other companies dealt with hacking, unauthorized use of the network was legally
1983 is a transitional period between earlier time-sharing and the later dominance of personal
computers. Most of the users of Telenet at this point were operating in a manner similar to that of time-
sharing in that they were accessing larger, multi-user systems. Telenet’s competitor TYMNET in fact
developed out of providing remote users access to Tymshare’s time-shared computing resources. The
security expectations and concerns of time-shared systems would have been quite relevant to users in the
mid-1980s. Tung-Hui Hu’s discussion of “digital hygiene” (a term he attributes to Jussi Parikka) in the
context of time-shared systems provides a good model for the social connotations of network security at
the time. Hu describes digital hygiene as “the idea that a user is responsible for keeping her data from
mixing with others, for avoiding infection with computer viruses, and so forth.”63 Digital hygiene serves
as a powerful metaphor by equating privacy, and hence security in general, with the social mandate to
remain clean.
Opinions regarding the criminality of unauthorized access to remote systems were mixed and
contested in 1983. Some reacted with alarm over the implications of unauthorized access to various
computing resources; others didn’t see substantial problems and ascribed the hackers’ actions to youthful
curiosity. The hackers of 1983 were relatively benign, but it didn’t take much imagination to recognize
this could change. Donn Parker’s congressional testimony in September 1983 critiqued both the popular
62
“In the Matter of USE OF THE CARTERFONE DEVICE.”
63
Hu, A Prehistory of the Cloud, pp. 57.
Authorized licensed use limited to: UNIVERSIDAD DE SALAMANCA. Downloaded on January 29,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Annals of the History of Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MAHC.2023.3347632
20
celebration of the 414s as well as pointing out then recent examples of monetary fraud that were
facilitated by electronic access to banking records.64 Parker linked those crimes to “amateur white collar
perpetrators in positions of trust” but mentioned that it was moving over to organized crime and the
attacking of computer systems.65 Linking electronic crime with remote access presented a frightening
view of the future. This tension between those who saw unauthorized remote access as an imminent threat
and those who saw it as technological pranks informed most of the responses in 1983.
It is interesting that unauthorized access to computer systems in 1983 was often conflated with
the issue of software piracy. An article about hacking from 1984 interviews Richard Stallman, who
discussed the “immorality” of copyrighted computer code.66 Parker’s 1983 congressional testimony also
discussed the problems with software piracy in the same paragraph as hostile computer access and
describes the issues as “closely associated.”67 In earlier congressional testimony in 1982, Parker and
As computer technology advances, a new kind of computer criminal, the malicious system
hacker, has emerged…. A serious epidemic of system hacking and computer program piracy is
evident across the country as high school and college students learn computer methods and gain
access to telephone terminals and personal microcomputers.68
In WarGames the protagonist hacked enterprise systems of game developers to access unpublished
games.69 However, acquiring illegal software did not seem to be a significant motivation behind the 1983
hacking events. It is also unlikely that the large, multi-user enterprise systems that the hackers were
accessing would have much in the way of useful software to be pirated given the extremely different
software and computer architectures between those systems and the ones used by home users. It seems
likely that there was a conflation between the remote, unauthorized access of enterprise systems as seen
64
Parker, “Testimony,” pp. 12, 15.
65
Parker, “Testimony,” pp. 13.
66
Thornton, “’Hackers’ Ignore Consequences of Their High-Tech Joy Rides,” pp. A9.
67
Parker, “Testimony,” pp. 13.
68
Denning, “Computers, Crime and Privacy,” pp. 314.
69
Badham, WarGames, “David successfully hacks Protovision & sees a list of their games, David’s
Room.”
Authorized licensed use limited to: UNIVERSIDAD DE SALAMANCA. Downloaded on January 29,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Annals of the History of Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MAHC.2023.3347632
21
by the 1983 hackers and the remote, permitted access to BBS and other systems specifically for the
purposes of exchanging pirated software. Both involve the then new element of remote access, but the
transgressive behavior is entirely different. The fluidity of movement between these different forms of
unauthorized computer activity indicated a developing definition of what computer crime was. Teens
accessing computers without authorization and software piracy smoothly merged into discussions of
multi-million-dollar banking fraud. Despite the widespread accounts of hacker criminality in the media,
government, and business communities, there were individuals who pushed back against this narrative.
Bill Landreth’s book suggests multiple ways of dealing with computer intrusion, but one of the
more interesting is the notion of utilizing the hacker as a consultant. He stated that:
If the hacker got in, there is a security problem. Very likely, he could help you see just where
your security system needs work. Many companies find consulting a hacker in this way very
valuable.70
This is similar to “white hat” hacking, but with the substantial difference that there is no prearranged
agreement, making it more similar to a networked version of software “bug bounty” programs. No doubt
Landreth would have preferred to have been treated this way by Telenet, and there was some precedent
for it. The system administrator of the Sloan-Kettering computer system offered the unidentified intruder
an account on the system in order to minimize damage.71 This appears to have not worked, as the hacker
was reported to have not complied with the restrictions placed on his activity and was then referred to the
police.
Some pushed back against the very notion of hacking as a criminal activity. David Bellin, writing
slightly more than a year later in 1985, stated that hackers cited three elements as driving their hacking:
that it was exciting, a challenge, and a good way of learning how computers work.72 Parker regards such
explanations as an attempt to “rationalize” their behavior.73 Bellin also questioned whether criminal intent
70
Landreth, “Out of the Inner Circle,” pp. 203.
71
Fritsch, “Man Tied to Cancer Unit Computer Crash,” pp. 6.
72
Bellin, “High School Hackers: Heroes or Criminals?,” pp. 16.
73
Parker, “Testimony,” pp.14.
Authorized licensed use limited to: UNIVERSIDAD DE SALAMANCA. Downloaded on January 29,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Annals of the History of Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MAHC.2023.3347632
22
existed and stated that most damage was accidental. His critique of the opponents of hacking is sharp. He
claims that politicians were attempting to tighten access to information and that the “emotional issue of
high school kids intentionally sabotaging computer networks fits in very nicely with the Reagan policy of
tightening government controls.”74 Computer companies were criticized for marketing computers based
on connectivity without mention of ethics, while data centers were criticized for concealing poor
security.75 Bellin instead advanced the idea of criminalizing negligence on the part of computer operators.
This echoes Hellman’s critique, to the point that both used the same metaphor of leaving the keys in the
ignition of a car.76 Bellin’s suggestion to hold operators and companies responsible for the security of
their systems is reflective of later writers like Schneier. This concept of a multi-party liability for network
The social landscape of network security of the 1980s was a mess of competing visions. With one
foot remaining in the time-shared systems of the past and another foot in the highly networked systems of
the future, the 1983 hackers inhabited a landscape where their actions were simultaneously viewed as
illegal and harmless. The true harm inflicted by their actions was limited, while the potential harm the
public could imagine as seen in WarGames stoked fear. Multiple types of crimes regarding networked
computers were envisioned, but their borders were fluid and poorly defined. Almost all parties agreed that
the current legal framework was inadequate for the situation, and over time the perspective that hacking
was dangerous rather than harmless began to dominate. The development of the definitions, laws, and
expectations at this time provided the context for what would occur a decade later as the Internet proper
started to rapidly expand on the social framework that had been created by its predecessors in the paleo-
Internet.
74
Bellin, “High School Hackers,” pp. 17.
75
Bellin, “High School Hackers,” pp. 17.
76
Broad, “Rising Use of Computer Networks Raises Issues of Security and Law,” pp. A1.
Authorized licensed use limited to: UNIVERSIDAD DE SALAMANCA. Downloaded on January 29,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Annals of the History of Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MAHC.2023.3347632
23
Data communication services in the 1970s and 1980s provided an important formative phase for
networked computers before the development of the Internet. The number of users and, in turn, the stakes
involved in security breaches were much lower than they would be just a decade later, and there was a
window of time for a multi-directional feedback cycle to occur that could have resulted in a better match
between security and usage. The early security challengers such as the hackers of 1983 provoked concern
but little effective response in the technology itself. Instead, we see reactions, such as the Computer Fraud
and Abuse Act of 1986, which criminalized acts such as the unauthorized access of a computer or
trafficking in passwords. The change in legal responsibility reflects how social expectations regarding
Telenet’s response to the hacking incidents was in line with the prevailing views of the time. As a
common carrier, the network operator was not responsible for a user abusing the service. But failing to
respond to the security feedback, for instance by providing a greater degree of security on the network
itself, helped ensure that the problems exposed in 1983 continued. It is a distinct possibility that the
feedback regarding passwords was not incorporated simply because the solutions were limited. Access
controls in general in the 1980s were inadequate. Like most telephone-based networking systems,
accessing Telenet required a connection to the network before authenticating oneself to the network.
Telenet’s authentication occurred when logging into a host computer, and there was no mechanism in
place to prevent unauthorized users from using the network and attempting to find weak passwords on
host systems. The mechanisms that existed to prevent this were expensive and cumbersome, and easily
While the social construction of most forms of technology involves many rounds of feedback
between the relevant social groups, this process does not seem to have been effective in the case of
passwords and other forms of technological security in data networking. There was resistance to the
reliance on passwords as a means of security, but the organizations did not respond to this. Iterative
processes and experimentation to resolve the resistance were limited. Security breaches resulted in
Authorized licensed use limited to: UNIVERSIDAD DE SALAMANCA. Downloaded on January 29,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Annals of the History of Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MAHC.2023.3347632
24
exhortations to practice better “digital hygiene” but no real change. Security and its associated costs were
left to the corporate or individual user, especially since security was focused on the side of the host
system versus other layers of the network stack. Interest in minimizing costs and maximizing ease-of-use
appears to have consistently superseded any other concern. The technology of security changed little, but
the social expectations of the responsibility for security did. Unauthorized computer access went from an
activity that was contested in terms of its illegality and social function to one that was clearly defined as
criminal. Poor security practices on the host side were discouraged but produced little in the way of
liability. The feedback provided by user resistance and hackers to the sociotechnical problem of network
security resulted in social, but not technological, changes that did not effectively address the problem at
hand. This represents a profound failure in the construction of an important technological system.
The paleo-Internet data communication systems such as Telenet provide an essential insight to
how human behavior on networks developed. While the Internet was celebrated as a buzzword in the
1990s, the factors that were engaged in its social construction had been operating for several decades.
ARPANET provided the technical basis for the packet-switched Internet, but prior to the 1990s the larger
number of people and commercial orientation of Telenet provides a better model for human behavior in
the social construction of networks. This social construction shows intermeshed relationships between the
different social groups engaged in the construction of network security. The events of 1983 expanded
social notions of responsibility for computer security by adding the criminal responsibility of
unauthorized network usage to already existing ideas regarding the responsibility of a host operator to
secure their systems. However, this only partially addressed the complexity of the social factors that
created network vulnerabilities in the first place. Most of the groups engaged in networked data services
shared an interest in ease-of-use, whereas security was seldom a primary concern. The failure to
effectively address the inadequacy of the social components of networked computer security is
transmitted to later data networks. The people engaged in these 1980s systems and their experiences
moved onto newer networks as they developed, including the modern Internet. Decades later, where
security presents a substantial cost and threat to the huge range of transactions carried out on the Internet,
Authorized licensed use limited to: UNIVERSIDAD DE SALAMANCA. Downloaded on January 29,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Annals of the History of Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MAHC.2023.3347632
25
this failure continues to fester. The momentum and social expectations established in the 1980s, however,
Authorized licensed use limited to: UNIVERSIDAD DE SALAMANCA. Downloaded on January 29,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Annals of the History of Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MAHC.2023.3347632
26
Bibliography
[1] J. Abbate, Inventing the Internet. Cambridge, MA, USA: MIT Press, 2000.
[2] L. Ackland, “Lawmakers hear tales of computerized Capones,” Chicago Tribune (1963-1996),
Tribune Publishing Company, LLC, Chicago, IL., USA, Oct. 30, 1983, pp. 3. [Online]. Available:
https://www.proquest.com/docview/176065828/abstract/6107D7EE36474503PQ/1
[3] J. Badham, dir., WarGames, MGM, 1983, Streaming.
[4] D. Bellin, “High school hackers: heroes or criminals?,” SIGCAS Comput. Soc., vol. 14,15, no.
1,2,3,4, Jan., 1985, pp. 16–17, doi: 10.1145/379486.379507.
[5] W. J. Broad, “Rising Use of Computer Networks Raises Issues of Security and Law,” New York
Times, New York, NY, USA, Aug. 26, 1983, pp. A1. [Online]. Available:
https://www.proquest.com/docview/122303657/abstract/7BFF46205C4542B9PQ/1
[6] D. Burnham, “Computer Security Raises Questions,” New York Times, New York, NY, USA,
Aug. 13, 1983, pp. 7. [Online]. Available:
https://www.proquest.com/docview/122269908/abstract/58D20B8143604379PQ/1
[7] E. G. Corley, Ed., “414’s Plead Guilty,” 2600, vol. 1, Apr., 1984, Accessed: Apr. 23, 2023.
[Online]. Available: http://archive.org/details/the-hacker-digest-volume-01
[8] E. G. Corley, Ed., “The Trouble with Telemail,” 2600, vol. 1, Jan., 1984, Accessed: Apr.
23, 2023. [Online]. Available: http://archive.org/details/the-hacker-digest-volume-01
[9] P. J. Denning, “Computers, crime and privacy—a national dilemma: congressional testimony
from the industry,” Commun. ACM, vol. 27, no. 4, Apr., 1984, pp. 312–313,
doi: 10.1145/358027.358033.
[10] Display Ad 25 -- No Title, The Washington Post (1974-), WP Company LLC d/b/a The
Washington Post, Washington, D.C., USA, Dec. 19, 1983, pp. A28. [Online]. Available:
https://www.proquest.com/docview/147506031/citation/78576A92831B4ACBPQ/1
[11] K. Driscoll, The Modem World: A Prehistory of Social Media. New Haven, CT, USA: Yale
University Press, 2022. Accessed: Dec. 13, 2023. [Online]. Available:
https://www.proquest.com/docview/2634872703/3B7701A1D1A64678PQ/2?sourcetype=Books
[12] Q. DuPont and B. Fidler, “Edge Cryptography and the Codevelopment of Computer Networks
and Cybersecurity,” IEEE Annals Hist. Comput., vol. 38, no. 4, Oct., 2016, pp. 55–73,
doi:10.1109/MAHC.2016.49.
[13] S. Emmons, “GTE May Prosecute: Irvine Boys Say Computer Break-In Not Intentional,” Los
Angeles Times (1923-1995), Tribune Publishing Company, LLC, Los Angeles, CA, USA, Oct.
14, 1983, pp. oc1. [Online]. Available:
https://www.proquest.com/docview/153610253/abstract/C8D573B2818E4F28PQ/18
[14] S. Emmons, “S.D. ‘Wizard’ Involved: FBI Raids the Homes of 4 Youths in Computer Caper,”
Los Angeles Times (1923-1995), Tribune Publishing Company, LLC, Los Angeles, CA, USA,
Oct. 14, 1983, pp. sd1. [Online]. Available:
https://www.proquest.com/docview/153612241/abstract/E4D69C2090A84B15PQ/1
[15] J. Fritsch, “Man tied to cancer unit computer crash,” Chicago Tribune (1963-1996), Tribune
Publishing Company, LLC, Chicago, IL, USA, Aug. 18, 1983, pp. 1. [Online]. Available:
https://www.proquest.com/docview/176011962/abstract/4074DD0838C04591PQ/137
[16] J. Fritsch, “Young computer buffs rocked the system,” Chicago Tribune (1963-1996), Tribune
Publishing Company, LLC, Chicago, IL, USA, Aug. 21, 1983, pp. 19. [Online]. Available:
https://www.proquest.com/docview/176020705/abstract/4074DD0838C04591PQ/153
[17] B. Gellman, “Young Computer Bandits Byte Off More Than They Could Chew,” The
Washington Post (1974-), WP Company LLC d/b/a The Washington Post, Washington, D.C.,
USA, Aug. 30, 1983, pp. A2. [Online]. Available:
https://www.proquest.com/docview/147591146/abstract/2664A4C6F84D45E4PQ/1
[18] GTE 1983 Annual Report, 1984. Accessed: Mar. 31, 2023. [Online]. Available:
https://www.mergentarchives.com
Authorized licensed use limited to: UNIVERSIDAD DE SALAMANCA. Downloaded on January 29,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Annals of the History of Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MAHC.2023.3347632
27
[19] K. Hafner and M. Lyon, Where Wizards Stay Up Late: The Origins of the Internet. New York,
NY, USA: Simon & Schuster Paperbacks, 2006.
[20] M. J. Halvorson, Code Nation: Personal Computing and the Learn to Program Movement in
America, vol. 32. New York, NY, USA: Association for Computing Machinery, 2020,
doi: https://doi.org/10.1145/3368274.
[21] T.-H. Hu, A Prehistory of the Cloud. Cambridge, MA, USA: The MIT Press, 2015. [Online].
Available: https://ieeexplore.ieee.org/servlet/opac?bknumber=7288688
[22] “In the Matter of USE OF THE CARTERFONE DEVICE IN MESSAGE TOLL TELEPHONE
SERVICE, 13 F.C.C.2d 420, 1968. [Online]. Available:
https://web.archive.org/web/20150120021035/http://www.uiowa.edu/~cyberlaw/FCCOps/%0919
68/13F2-420.html
[23] R. Kline, “Resisting Consumer Technology in Rural America: The Telephone and
Electrification,” in How Users Matter: The Co-Construction of Users and Technology, N.
Oudshoorn and T. Pinch, Eds., Cambridge, MA, USA: MIT Press, 2003, pp. 51–66. Accessed:
Sep. 24, 2022. [Online]. Available: https://www.ebsco.com
[24] B. Landreth, Out of the Inner Circle: A Hacker’s Guide to Computer Security. Bellevue,
WA, USA: Microsoft Press, 1985.
[25] G. Lee, “Wargames Playground,” Los Angeles Times (1923-1995), Tribune Publishing Company,
LLC, Los Angeles, CA, USA, Jul. 03, 1983, pp. p1. [Online]. Available:
https://www.proquest.com/docview/153537640/abstract/BF474141F8E4931PQ/3
[26] S. L. Mathison, “Telenet inaugurates service,” SIGCOMM Comput. Commun. Rev., vol. 5, no. 4,
Oct., 1975, pp. 24–28, doi: 10.1145/1015671.1015674.
[27] S. L. Mathison, L. G. Roberts, and P. M. Walker, “The History of Telenet and the
Commercialization of Packet Switching in the U.S.,” IEEE Communications Magazine, vol. 50,
no. 5, May 2012, pp. 28–45, doi: 10.1109/MCOM.2012.6194380.
[28] S. L. Mathison and P. M. Walker, Computers and Telecommunications: Issues in Public Policy.
NJ, USA: Prentice-Hall, Inc., 1970.
[29] M. Novak, “The Untold Story of the Teen Hackers Who Transformed the Early Internet,”
Gizmodo. Accessed: Apr. 23, 2023. [Online]. Available: https://gizmodo.com/the-untold-story-
of-the-teen-hackers-who-transformed-th-1770977586
[30] D. B. Parker, “Testimony,” SIGSOFT Softw. Eng. Notes, vol. 8, no. 5, Oct., 1983, pp. 10–17,
doi:10.1145/1010914.1010915.
[31] T. Pinch and W. E. Bijker, “The Social Construction of Facts and Artifacts: Or How the
Sociology of Science and the Sociology of Technology Might Benefit Each Other,” in The Social
Construction of Technological Systems, W. E. Bijker, Ed., Cambridge, MA, USA: MIT Press,
2012.
[32] A. Rybczynski, B. Wessler, R. Despres, and J. Wedlake, “A new communication protocol for
accessing data networks: the international packet-mode interface,” in Proceedings of the June 7-
10, 1976, national computer conference and exposition, in AFIPS ’76. New York, NY, USA:
Association for Computing Machinery, Jun., 1976, pp. 477–482, doi: 10.1145/1499799.1499869.
[33] D. E. Sanger, “Computer Security Methods Weighed,” New York Times, New York, NY, USA,
pp. D4, Aug. 16, 1983. [Online]. Available:
https://www.proquest.com/docview/122257411/abstract/C8D573B2818E4F28PQ/3
[34] B. Schneier, “Computer Security: It’s the Economics, Stupid,” presented at the Economics and
Information Security Workshop, Berkeley, CA, USA, 2002.
[35] R. Slayton, “Framing Computer Security and Privacy, 1967-1992,” in Communities of
Computing: Computer Science and Society in the ACM, T. J. Misa, Ed., New York, NY, USA:
Association for Computing Machinery and Morgan & Claypool, 2017, doi:
10.1145/2973856.
Authorized licensed use limited to: UNIVERSIDAD DE SALAMANCA. Downloaded on January 29,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Annals of the History of Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MAHC.2023.3347632
28
[36] S. Sugawara, “Va. Firm Calls in FBI: Computer Invaders Sought,” The Washington Post (1974-),
WP Company LLC d/b/a The Washington Post, Washington, D.C., USA, Oct. 14, 1983. [Online].
Available: https://www.proquest.com/docview/147577472/abstract/C8D573B2818E4F28PQ/13
[37] M. Thornton, “‘Hackers’ Ignore Consequences of Their High-Tech Joy Rides,” The Washington
Post (1974-), WP Company LLC d/b/a The Washington Post, Washington, D.C., USA, May 21,
1984. [Online]. Available:
https://www.proquest.com/docview/138287707/abstract/2DFDC1719AD14992PQ/2
[38] J. B. Treaster, “Trial and Error by Intruders Led to Entry into Computers,” New York, NY, USA,
1983, pp. A1. [Online]. Available:
https://www.proquest.com/docview/122139031/abstract/714B98B796CB43EEPQ/1
[39] L. R. Tymes, “Routing and Flow Control in TYMNET,” IEEE Transactions on Communications,
vol. 29, no. 4, Apr., 1981, pp. 392–398, doi: 10.1109/TCOM.1981.1095020.
Authorized licensed use limited to: UNIVERSIDAD DE SALAMANCA. Downloaded on January 29,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.