How the World Got Owned Episode 2: The 1990s, Part One

Risky Business

How the World Got Owned Episode 2: The 1990s, Part One

Risky BusinessApr 3, 2026

Why It Matters

Understanding the 1990s hacking boom reveals the roots of today’s cybersecurity challenges, from disclosure debates to the culture of hacker conferences that still shape threat research. The episode is timely for anyone navigating modern cyber threats, as it shows how early community norms and media misconceptions continue to influence policy, industry responses, and public perception of security.

Key Takeaways

  • 1990s hacking shifted from curiosity to organized conferences
  • DefCon originated from a spontaneous farewell party in 1993
  • Media misrepresentation fueled public fear and fed paranoia
  • Community values included sharing manuals, dumpster diving, and inclusivity
  • Federal raids like Operation Sun Devil spurred EFF formation

Pulse Analysis

The 1990s marked a turning point for hacking, moving beyond the exploratory spirit of the 1980s into a decade of organized gatherings and rapid skill sharing. Figures like Jeff Moss launched seminal events such as DEF CON and Black Hat, turning informal BBS meet‑ups into global cybersecurity conferences. Early hackers exchanged red‑box and blue‑box schematics, dumpster‑dived for manuals, and built a culture where a handful of technically gifted individuals could feel like “lords of the Internet.” This communal knowledge base laid the groundwork for modern vulnerability research.

At the same time, mainstream media sensationalized the scene, turning movies like Hackers and The Net into caricatures that amplified public fear. Law‑enforcement agencies responded with high‑profile raids such as Operation Sun Devil, a 1990 Secret Service sweep that seized thousands of floppy disks and sparked the creation of the Electronic Frontier Foundation. The resulting fed paranoia forced hackers to confront legal risks while still valuing open collaboration. These confrontations highlighted the tension between security research and regulatory frameworks, a dynamic that continues to shape policy debates today.

Today, the legacy of 1990s hacking culture endures in the open‑source ethos and the thriving conference circuit that businesses rely on for threat intelligence. Companies such as SentinelOne sponsor retrospectives to remind security teams that community‑driven discovery often outpaces proprietary solutions. Understanding the era’s blend of camaraderie, ego‑driven competition, and legal pushback helps modern enterprises appreciate the value of collaborative research and responsible disclosure. As cyber threats grow more sophisticated, the lessons from DEF CON’s humble beginnings—transparent sharing, inclusive networking, and a willingness to challenge authority—remain essential for protecting corporate assets.

Episode Description

In this special documentary episode, Patrick Gray and Amberleigh Jack take a look back at hacking throughout the 1990s, from the feel-good vibes of the early hacking communities to the antics of young hackers who wound up on the run from the FBI.

Part one features recollections from:

Jeff Moss (The Dark Tangent), DefCon and Black Hat founder

Chris Wysopal (Weld Pond), L0pht member, co-founder, @Stake

Kevin Poulsen (Dark Dante), 1990s hacker turned journalist

Elias Levy (Aleph One), author of Smashing the Stack for Fun and Profit, Phrack, 1996

How the World Got Owned is produced in partnership with SentinelOne.

Show notes

Elias Levy (Aleph1), Former Principle Engineer, Google

Kevin Poulsen, Journalist

Jeff Moss, DefCon founder

Chris Wysopal, @Stake founder, L0pht member

Hackers testifying at the United States Senate, May 19, 1998

Hackers May ‘Net’ Good PR for Studio

DefCon Archives | DefCon 1

A Not So Terribly Brief History of the Electronic Frontier Foundation

Innocent Hackers Want Their Computers Back

Breakdowns in Computer Security

Unsolved Mysteries, Season 3, Episode 4

The Last Hacker: He Called Himself Dark Dante. His Compulsion Led Him to Secret Files and, Eventually, The Bar of Justice

Justia appeal summary, Kevin Poulsen, 1994

Smashing the Stack for Fun and Profit, Phrack Magazine, November 1996

From subversives to CEOs: How radical hackers built today’s cybersecurity industry

Show Notes

Comments

Want to join the conversation?

Loading comments...