MoD - Darknet Diaries Recap
Podcast: Darknet Diaries
Published: 2026-01-20
Duration: 1 hr 7 min
Summary
In this episode, we dive deeper into the story of a young hacker known as 'the technician' and his exploits in the New York Telephone Company network during the late 1980s. The episode explores the investigative efforts of Tom Kaiser and Fred Staples as they attempt to uncover the hacker's identity and motivations.
What Happened
Picking up where the previous episode left off, we learn about Tom Kaiser and Fred Staples, who were responsible for securing the New York Telephone Company's systems in the 1980s. Their routine was disrupted when an anonymous letter alerted them to a hacker known as 'the technician' who was exploiting vulnerabilities in the phone grid. The letter served as a plea for help to stop the hacker, and upon investigation, Tom discovered that the technician was indeed accessing the system from the Bronx, using a device called a Dialed Number Recorder (DNR) to monitor his activities without needing a court order.
As they examined the data, Tom and Fred realized that the technician was not just an amateur hacker; he had somehow gained access to a critical component of the telephone network known as a dial hub. This hub allowed employees to remotely connect to the network, and it appeared that the technician had acquired a login token, granting him unauthorized access. The investigation revealed a pattern in the technician's activities, where he would repeatedly connect to the phone company network and then call a specific number in Queens. This led Tom and Fred to suspect that the real mastermind might be located there, prompting further investigation into the calls to that Queens number.
Through their efforts, they traced the number to a seemingly unlikely sourceāa school custodian named Charles Abbey. However, it turned out that Abbey's son, Mark, known online as Fiber Optic, was a notorious hacker with exceptional skills. Mark's deep understanding of telecommunications systems allowed him to manipulate the network with ease, making him a significant figure in the hacking community. As the story unfolds, we see how Mark used his abilities not just for personal gain but also to share knowledge and gain respect among his peers, highlighting the double-edged nature of hacking culture.
Key Insights
- The use of monitoring tools like the Dialed Number Recorder can reveal critical hacking activities without the need for legal oversight.
- The connection between seemingly ordinary individuals and the hacker community can often be surprising, as shown by Mark Abbey's background.
- The exploration of hacking in the 1980s provides insight into both the vulnerabilities of early telecommunications systems and the motivations of young hackers.
- Hacking culture at that time was characterized by a mix of knowledge sharing and territoriality, exemplified by Mark's dual role as a teacher and a potential adversary.