Summary

Masters of Deception (also known as MOD) was one of the most infamous and important hacking groups of the late 1980s and early 1990s. Based in New York, this group was the fruit of a diaspora within the Legion of Doom hacking group. Together, these groups initiated the period known as the “hacking wars.”

The origins of MOD

MOD was founded around 1989 by Mark Abene (aka Phiber Optik), Elias Ladopoulos (aka Acid Phreak), and Paul Stira (aka Scorpion). They broke away from Legion of Doom after internal disputes and accusations that LoD had become elitist and overly centralized.

MOD’s formation was partly ideological: they saw themselves as the “people’s hackers”, challenging the old guard and breaking open systems that LoD had kept secret.

MOD emerged as the rival to the Legion of Doom (LoD) — essentially, the East Coast versus the South. The MOD hackers gained fame among their peers for their technical sophistication, social engineering skills, and ability to penetrate telephone company and government systems. Unlike many hacking groups of their era, MOD’s members were urban, often teenagers or very young adults, with strong ties to the New York phreaking scene.

Who was part of MOD?

Key early members were: 

Many of them were still in their teens during the group’s heyday.

The hacks

MOD members weren’t script kiddies; they understood telephone infrastructure in depth.

In particular, they specialized in telephone company system intrusions (such as NYNEX, Bellcore, AT&T, Southern Bell), PBX (private branch exchange) takeovers, customer records (accessing private data of celebrities, corporations, and law enforcement) and social engineering to gain operator privileges or credentials. MOD members were also masters in exploiting SS7 and switching systems, voicemail systems, and billing databases. They also eavesdropped on law enforcement communications and private lines.

MOD weren’t about one “big hack” like Kevin Mitnick or Albert Gonzalez. Their legacy comes from a series of high-profile penetrations of phone companies, corporate systems, and government networks that pushed the limits of what was possible in the late ’80s and early ’90s.

MOD vs LOD: the hacker wars

The “war” between MOD and LoD wasn’t about territory but about reputation and philosophy: LoD was more hierarchical, with older members who saw themselves as guardians of knowledge. MOD had a younger base and  shared information more widely.

Both sides engaged in doxxing, trashing each other’s systems, and trying to out-hack each other. Media portrayed it as a “cyber gang war,” but it was more about control of underground BBSs, bragging rights, and ideology.

The FBI Crackdown

In the early 1990s, the U.S. Secret Service and FBI launched Operation Sundevil and related investigations into hacking. In 1990, MOD got blamed for the AT&T network crash, which was actually caused by a software bug. In 1991, Phiber Optik’s home was raided, and his computers were seized. In 1992, several MOD members got indicted on charges of computer fraud and wire fraud.

In 1993, the trials and plea deals began. Phiber Optik was sentenced to one year and one day in federal prison. Other members received probation or lesser sentences. These prosecutions were some of the first high-profile hacker cases in the U.S. and were widely covered by the media.

What happened to MOD?

After serving their sentences, most of the MOD’s members went legitimate. Mark Abene became a respected security consultant and speaker on ethical hacking. Others moved into cybersecurity, networking, or media.

MOD’s story helped fuel the early “hacker as antihero” narrative in the press. They also highlighted how vulnerable telephone systems were. These lessons informed future security practices.

The cultural impact of MOD

The impact of MOD on popular culture didn’t stop there. In 1995, Michele Slatalla and Joshua Quittner published Masters of Deception: The Gang That Ruled Cyberspace, the definitive book chronicling MOD and the LoD/MOD war.

MOD became part of the mythos of the “golden age” of hacking: payphones, BBSs, tone generators, and pre-Internet exploration. Their exploits influenced later hacker ethics debates about freedom of information, privacy, and security research.

Share this post :

Leave a Reply