74:—a film that was released earlier that year. The 414s themselves were not entirely harmless, doing $ 1,500 worth of damage at Sloan-Kettering during their June 3, 1983 break-in by accidentally deleting billing records. Patrick and the 414s did cause real concern, as experts realized that others could duplicate their techniques and do real damage.
120:
in 1983 which included installing data-capture equipment on their phone lines. Winslow (20), Wondra (21), and
Patrick (17) were all visited by FBI agents. Most of the members of the 414s were not prosecuted, in various agreements to stop their activities and pay restitutions. Winslow, Wondra, and
64:
The 414s were described as meeting the profile of computer hackers at the time: "Young, male, intelligent, highly motivated and energetic". Neal
Patrick claimed his only motivation was the challenge of getting into places he was not supposed to, and remaining there undetected. Another member, Tim
121:
another defendant were charged and each pleaded guilty on two counts of "making harassing telephone calls". Patrick, due to being a minor, was not at risk for prosecution and used the public attention to appear on various television shows. A
612:
96:
Among those reporting unusual hacking activities was Chen Chui, an administrator who discovered an electronic break-in, left a message for the intruders, and contacted the
93:
published in DEC's manufacturer guides to log in to various timeshare systems. The 414s exploited a lack of administrative oversight and password care for systems.
200:. The film features present-day interviews with some of the original 414s as they reflect on the early days of hacking and the media attention that followed.
294:
104:
and eventually traced the calls back to
Milwaukee. Gerald Wondra, 22 at the time, was the first visited by the FBI. Wondra lived with his mother in
337:
122:
161:
he was asked if he had regrets, to which he replied "In hindsight, I really wish that accessing those systems just wasn't so easy."
89:
operating systems. They used inexpensive personal computers, analog modems, and simple hacking techniques, such as using common or
222:
cover story of the incident, which correctly displays "414 Hacker Neal
Patrick" and in a subsequent episode called "The 214s" (a
137:, emerged as their spokesman and an "instant celebrity" during the brief frenzy of interest, which included Patrick appearing on
45:, in 1982 and 1983. Of note, these "414s" are not affiliated with the "414" biker gang also based out of Milwaukee, Wisconsin.
38:
523:
407:
431:
214:
34:
653:
648:
169:
78:
54:
223:
658:
587:
547:
157:
562:
473:
268:
Covert, Colin (August 28, 1983). "High-Tech
Hijinks Seven Curious Teenagers Wreak Havoc Via Computer".
173:
30:
376:
168:
called for an investigation and new laws about computer hacking. Neal
Patrick testified before the
133:
There was widespread media coverage of them at the time, and 17-year-old Neal
Patrick, a student at
347:
226:, where the show is set), a plot point includes a character attempting to recreate the break-in.
643:
193:
134:
61:. They ranged in age from 16 to 22 and many met in an Explorer Scout program sponsored by IBM.
145:
42:
505:
53:
They were eventually identified as six teenagers, taking their name after the IBM-sponsored
20:
8:
478:
33:
from
Milwaukee who broke into dozens of high-profile computer systems, including ones at
529:
412:
381:
270:
248:
65:
Winslow, began learning computers on a teletype his math teacher brought in to school.
519:
613:"Halt and Catch Fire: Some Techsplanations and Background for Episode 8, "The 214s""
533:
125:
request made to the FBI on
November 8, 2020, returned as "No Responsive Documents".
511:
417:
386:
209:
139:
90:
548:"CNN Films Acquires 'The 414s' Documentary to Launch Short Film Series – Sundance"
342:
501:
177:
637:
58:
295:"The Story of the 414s: The Milwaukee Teenagers Who Became Hacking Pioneers"
108:, a Milwaukee suburb. Wondra said he was "curious, he was just having fun".
165:
515:
105:
502:"Attacks on Computers: Congressional Hearings and Pending Legislation"
57:
in their hometown of
Milwaukee, Wisconsin, which used the telephone
458:
151:
70:
101:
82:
149:
in August 1983, and appeared on the September 5, 1983 cover of
86:
19:
This article is about the hacker group. For other uses, see
320:
Profits of Deceit: Dispatches from the Front Lines of Fraud
68:
Many saw them as harmless pranksters, sort of a real life
197:
117:
97:
77:
The systems they broke into were exclusively running
241:
239:
474:"Timeline: The U.S. Government and Cybersecurity"
236:
116:The 414s were investigated and identified by the
635:
560:
331:
329:
246:"Teen tells Congress how to foil 'hackers'".
510:. Oakland, CA, USA: IEEE. pp. 180–186.
335:
172:on September 26, 1983, about the dangers of
507:1984 IEEE Symposium on Security and Privacy
326:
408:"TWO WHO RAIDED COMPUTERS PLEADING GUILTY"
164:As a result of news coverage, congressman
462:. September 5, 1983. pp. 42–46, 48.
336:Elmer-DeWitt, Philip (August 29, 1983).
317:
180:were introduced in the House that year.
359:
357:
636:
499:
267:
196:and was picked up for distribution by
190:The 414s: The Original Teenage Hackers
263:
261:
259:
192:premiered in competition at the 2015
354:
289:
287:
285:
283:
281:
111:
13:
561:Casey Cipriani (9 December 2014).
256:
203:
14:
670:
278:
155:. During an appearance on NBC's
605:
580:
554:
540:
493:
466:
449:
424:
400:
369:
311:
183:
43:Security Pacific National Bank
35:Los Alamos National Laboratory
1:
229:
170:U.S. House of Representatives
79:Digital Equipment Corporation
39:Sloan-Kettering Cancer Center
563:"Sundance 2015: Short Films"
500:Bailey, David (April 1984).
346:. p. 75. Archived from
338:"The 414 Gang Strikes Again"
7:
456:"Beware: Hackers at play".
318:Franklin, Patricia (1990).
176:, and six bills concerning
10:
675:
123:Freedom of Information Act
48:
18:
377:"Computer User Sentenced"
128:
194:Sundance Film Festival
135:Rufus King High School
516:10.1109/SP.1984.10012
252:. September 27, 1983.
188:A documentary called
146:The Phil Donahue Show
654:Hacking in the 1980s
649:History of Milwaukee
588:"Sundance Institute"
350:on December 2, 2007.
21:414 (disambiguation)
479:The Washington Post
432:"FBI: The 414 Gang"
215:Halt and Catch Fire
659:1980s in Milwaukee
550:. 23 January 2015.
413:The New York Times
382:The New York Times
271:Detroit Free Press
249:Detroit Free Press
525:978-0-8186-0532-1
438:. 8 November 2020
299:Discover Magazine
112:FBI Investigation
91:default passwords
666:
628:
627:
625:
623:
609:
603:
602:
600:
598:
584:
578:
577:
575:
573:
558:
552:
551:
544:
538:
537:
497:
491:
490:
488:
487:
470:
464:
463:
453:
447:
446:
444:
443:
428:
422:
421:
418:Associated Press
404:
398:
397:
395:
394:
387:Associated Press
373:
367:
361:
352:
351:
333:
324:
323:
315:
309:
308:
306:
305:
291:
276:
275:
265:
254:
253:
243:
224:Dallas area code
212:television show
174:computer hacking
140:CBS Morning News
31:computer hackers
29:were a group of
674:
673:
669:
668:
667:
665:
664:
663:
634:
633:
632:
631:
621:
619:
611:
610:
606:
596:
594:
586:
585:
581:
571:
569:
559:
555:
546:
545:
541:
526:
498:
494:
485:
483:
472:
471:
467:
455:
454:
450:
441:
439:
430:
429:
425:
406:
405:
401:
392:
390:
375:
374:
370:
362:
355:
334:
327:
316:
312:
303:
301:
293:
292:
279:
266:
257:
245:
244:
237:
232:
206:
204:Popular culture
186:
131:
114:
51:
24:
17:
12:
11:
5:
672:
662:
661:
656:
651:
646:
630:
629:
604:
579:
553:
539:
524:
492:
465:
448:
423:
399:
368:
364:Enter Magazine
353:
325:
310:
277:
255:
234:
233:
231:
228:
205:
202:
185:
182:
178:computer crime
158:The Today Show
130:
127:
113:
110:
50:
47:
15:
9:
6:
4:
3:
2:
671:
660:
657:
655:
652:
650:
647:
645:
644:Hacker groups
642:
641:
639:
618:
614:
608:
593:
589:
583:
568:
564:
557:
549:
543:
535:
531:
527:
521:
517:
513:
509:
508:
503:
496:
482:. 16 May 2003
481:
480:
475:
469:
461:
460:
452:
437:
433:
427:
420:. 1984-03-17.
419:
415:
414:
409:
403:
389:. May 1, 1984
388:
384:
383:
378:
372:
365:
360:
358:
349:
345:
344:
339:
332:
330:
322:. p. 35.
321:
314:
300:
296:
290:
288:
286:
284:
282:
274:. p. 1F.
273:
272:
264:
262:
260:
251:
250:
242:
240:
235:
227:
225:
221:
218:features the
217:
216:
211:
201:
199:
195:
191:
181:
179:
175:
171:
167:
162:
160:
159:
154:
153:
148:
147:
142:
141:
136:
126:
124:
119:
109:
107:
103:
100:, who placed
99:
94:
92:
88:
84:
80:
75:
73:
72:
66:
62:
60:
59:area code 414
56:
55:Explorer Post
46:
44:
40:
36:
32:
28:
22:
620:. Retrieved
616:
607:
595:. Retrieved
592:sundance.org
591:
582:
570:. Retrieved
566:
556:
542:
506:
495:
484:. Retrieved
477:
468:
457:
451:
440:. Retrieved
435:
426:
411:
402:
391:. Retrieved
380:
371:
366:, March 1984
363:
348:the original
341:
319:
313:
302:. Retrieved
298:
269:
247:
219:
213:
207:
189:
187:
166:Dan Glickman
163:
156:
150:
144:
138:
132:
115:
95:
76:
69:
67:
63:
52:
26:
25:
16:Hacker group
184:Documentary
81:'s (DEC's)
638:Categories
597:24 January
572:24 January
486:2006-04-14
442:2020-11-17
393:2006-12-30
304:2020-11-08
230:References
106:West Allis
567:Indiewire
622:14 April
534:15187375
459:Newsweek
436:MuckRock
220:Newsweek
152:Newsweek
102:wiretaps
71:WarGames
27:The 414s
49:History
617:tv.com
532:
522:
87:RSTS/E
41:, and
530:S2CID
129:Media
624:2015
599:2015
574:2015
520:ISBN
343:Time
208:The
85:and
512:doi
210:AMC
198:CNN
118:FBI
98:FBI
83:VMS
640::
615:.
590:.
565:.
528:.
518:.
504:.
476:.
434:.
416:.
410:.
385:.
379:.
356:^
340:.
328:^
297:.
280:^
258:^
238:^
143:,
37:,
626:.
601:.
576:.
536:.
514::
489:.
445:.
396:.
307:.
23:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.