In 2001, he went into business with several former LOD members, building new bridges with former rivalsCorrupt, whose real name was John Lee, stayed away from technology after he was released from prison. Nine days after the AT&T outage, the FBI and Secret Service served warrants on several MOD members, including Corrupt and Phiber Optik. And personality conflicts forced others out… like Phiber Optik, a kid named Mark Abene, who was kicked out of LOD in 1989.That bad blood carried over into the new group Optik started with some fellow New Yorkers: the Masters of Deception, or MOD.The brash nature of the New Yorkers had always rubbed the more Southern LOD the wrong way, but it was some of that good ol’ boy language that really set the conflict off. This case is unique in that it happened between two separate groups of black hat hackers, and not just between individuals. The prosecutions that came from those investigations were seen as a warning sign among many in the hacking community, and those who were able to preserve their anonymity largely remain out of sight even today. Their exploits had the air of exploration and learning.

War had been declared.Corrupt, joined by his MOD allies, made it his mission in life to make life miserable for the LOD crew, particularly one member known as Erik Bloodaxe. The harassment of Bloodaxe’s phones also continued and spread to include his work lines.Whether it was a case of throwing in the towel or feeling legitimately aggrieved, Bloodaxe finally called the FBI on his rivals.The FBI was already interested. Months earlier, the Secret Service had arrested a 16-year-old hacker nicknamed Fry Guy who had told them, under interrogation, that a hacker gang he was associated with had been planning to crash the system on a national holiday.That gang, the Legion of Doom, was suddenly on the law enforcement radar screen in a big way. In the historic record, compared to today’s conflicts between nation-states and shadowy criminal groups that take in millions of dollars in stolen information, the LOD/MOD war seems quaint even at its most bloodthirsty.But it’s also easy to see it as a precursor to today’s conflicts. The group all but ceased to exist, enjoying a Pyrrhic victory over MOD at best.Erik Bloodaxe, whose real name was Chris Goggans, was raided by the Secret Service in March 1990 but was never charged. The Texas-centric group was in the midst of an online feud with a New York-based rival, the Masters of Deception. LOD and MOD, as they were known, were at each others throats and the battleground happened to run through the phone switches and computer systems of America.This case is unique in that it happened between two separate groups of black hat hackers, and not just between individuals.
Eavesdropping and combing systems for information that could be used to strike at enemies is just as useful today as it was in 1990.If anything, the LOD/MOD conflict taught hacker groups to stay more under the radar and stay out of the sights of law enforcement. Phone company investigators had been investigating MOD and accumulating evidence.

On a conference call set up by LOD on a hacked phone company line, a MOD member nicknamed Corrupt suddenly joined in.Not only did Corrupt not sound like one of the drawling LOD regulars on the line, he sounded like something else: a black kid from inner city New York, which he was. Others took the arrests as a sign and quietly dropped off the radar screen, or went white-hat entirely.

Many members had been picked off by Federal authorities within the same timespan, caught up in the general sweep of illegal hacking activity. Hackers around the fringes, like Fry Guy, had fewer ethical constraints and used their technical skills to line their own pockets or damage systems. With participants with monickers like Phiber Optik, Acid Phreak, and Erik Bloodaxe, it sounds more like the plot from a comic book.But the two groups were doing battle online through civilian computer systems that they had hacked and taken control of. Servers and personal computers belonging to innocent third parties are co-opted into massive bot-nets used to strike at hacker’s targets of choice, just as phone systems were repurposed for that use before. But they weren’t alone. The MLK Day outage was later traced back to bad code written by AT&T’s own engineers, a vulnerability that allowed the hackers to run rampant and unchecked through their systems.LOD was the older group, a collective of sorts formed in 1984 that originally incorporated many of the ethos of the original hackers of the 1970s. And one of the LOD members on the call instantly took offense and responded with a disgusting racial slur – that mother of all verbal bombs.The conference bridge fell silent. The racial angle continued. It was a frightening outage that rang alarm bells in more places than just AT&T headquarters.

In December, shortly after Bloodaxe’s call, they were arrested and charged with computer tampering and trespass, to which all plead guilty.LOD declared victory, but in truth didn’t fare much better. Erik’s home phone would ring at all hours; his service would be switched randomly; MOD hackers would listen in on his calls.Bloodaxe, in return, started slurring the MOD crew on BBS (Bulletin Board Systems) and in other conference bridges. He went on to form his own computer security firm and remains in the industry today.Perhaps unsurprisingly, Mark Abene also went into information security work after his release in 1994.