The 414s: Teenage Hackers and the Law That Stopped Them
In 1983, a group of teenage hackers from Milwaukee broke into Los Alamos National Laboratory, Sloan-Kettering Cancer Center, and Security Pacific Bank. Kids with modems and curiosity. Their arrests directly triggered the Computer Fraud and Abuse Act of 1984. The moment hacking became a federal crime.
The 414s: Teenage Hackers and the Law That Stopped Them
The 414s were not trying to start a war. They were teenagers with modems, a packet of free computer time, and the kind of curiosity that moves mountains or breaks laws depending on where you point it. The name came from their area code: Milwaukee, Wisconsin, 414. In 1983, before anyone had heard of hacker collectives or cybercriminals or any language at all for what they were doing, these kids demonstrated that national security systems could be penetrated by people young enough to not have driver's licenses. Congress noticed. Congress responded. The Computer Fraud and Abuse Act of 1984 was born.
The story of the 414s is the story of a legal system scrambling to criminalize activity that had not existed long enough to have laws against it. And the story of American teenagers who, for a few months in 1983, became the most famous hackers in the country.
Who They Were
The 414s consisted of roughly fifteen core members, most of them teenagers, all from the Milwaukee area. The leadership circle included names that would become briefly legendary in hacker history: Neal Patrick (he would later legally change his name to Dalbey), Curtis Bok, and others whose names stayed out of most media coverage because they were minors and the law (at that time) still protected juvenile defendants.
These were not sophisticated criminals plotting elaborate heists. They were kids who had figured out basic techniques like scanning for computers that answered on the public networks, using publicly available documentation to find default passwords, and chaining exploits together to move deeper into systems. They were resourceful. They were curious. And they were absolutely, completely out of their depth in terms of the systems they were accessing.
By their own account, they started as phone phreaks interested in the telephone network. Phone phreaking, the art of manipulating telephone systems to make free calls and explore the network, was an established underground hobby by the early 1980s. John Draper (Captain Crunch) had made it legendary. The 414s started there, learned packet switching and computer networks from the same curious impulse, and discovered they could dial into computers all over the country.
The Breaches
Between 1982 and 1983, the 414s broke into dozens of systems. The list reads like a who's who of American infrastructure: Los Alamos National Laboratory (the birthplace of the atomic bomb, home to cutting-edge nuclear research), Sloan-Kettering Cancer Center (one of the premier cancer research facilities in the world), Security Pacific Bank, Motorola, the U.S. Army's Fort Meade headquarters, and dozens of universities and corporate networks.
The damage, in retrospect, was minimal. They mostly poked around, looked at files, tried to understand what they were accessing. They did not steal data with intent to sell it. They did not sabotage systems. They did not destroy files. They were, in the language that would later become standard, engaged in "unauthorized computer access" and nothing more. But the psychological impact was immense.
Los Alamos officials were terrified. They had assumed their networks were unhackable. Finding out that teenagers in Milwaukee could waltz in and poke around sensitive defense research systems triggered a security crisis. Sloan-Kettering was equally shaken. These were not attacks by foreign intelligence agencies or sophisticated corporate competitors. These were kids.
The breach at Security Pacific Bank created the most direct concern because it involved a financial institution and because it raised the question: if they could get in, what could they have stolen? The answer was, probably not much, but the question itself was enough.
The Arrest and Media Circus
In August 1983, the 414s were arrested. Federal charges were filed. And then something unprecedented happened: the press completely lost its mind.
Teenagers from Milwaukee arrested for hacking into the most secure systems in America? It was a story. Every local news outlet covered it. National news picked it up. Time magazine ran a piece. Computer magazines treated them as celebrities and villains simultaneously. Neal Patrick, as the most prominent member not hidden behind juvenile protection, became the face of the 414s. At 17 years old, he was suddenly famous.
The narrative split immediately. Some outlets painted the 414s as dangerous criminals, proof that computer networks were vulnerable to the next generation of malicious actors. Other outlets treated them as misguided but brilliant kids who had stumbled into territory that no one had bothered to criminalize yet. The truth, as is often the case, was somewhere in the middle.
The trials themselves became media events. Prosecutors argued that unauthorized computer access was inherently dangerous and damaging and had to be stopped before it escalated. Defense attorneys argued that the 414s had not stolen anything, destroyed anything, or caused identifiable harm, and that what they had done was not clearly illegal under existing law.
The Legislative Response
Congress was not interested in nuance. The 414s case triggered urgent legislative action. The message was clear: if teenagers could break into military and medical systems, the law had to change immediately. The Computer Fraud and Abuse Act of 1984 was drafted, debated, and passed with remarkable speed. It became law in October 1984, just over a year after the 414s arrests.
The CFAA created federal criminal liability for unauthorized computer access. It established categories of severity based on the damage or value of information accessed. It created penalties ranging from fines to imprisonment. And it created a legal framework that, for the next forty years, would define how computer crime was prosecuted in the United States.
In many ways, the 414s case created the template for how the government would approach computer crime: aggressive prosecution, mandatory federal involvement, and rapid criminalization of behavior that was technically novel.
Outcomes
Most of the 414s eventually pleaded guilty to reduced charges or were acquitted on some counts. Neal Patrick received the harshest sentence: four years probation, community service, and restitution to some of the affected organizations. Others received lighter sentences or had charges dismissed. None of them served significant prison time, largely because they were juveniles and because the law itself was still being written.
What happened to them afterward? Neal Patrick went on to have a technology career. Some of the other 414s faded from public view. A few remained tangentially involved in the hacker underground, though most moved into legitimate computer science work.
The 414s case accomplished something strange: it criminalized a behavior that had never existed in legal theory before. It showed Congress that computer security was a national concern. And it set a precedent that would be followed repeatedly over the next four decades: when new technology enables new crimes, the response is rapid criminalization, aggressive prosecution, and lengthy prison sentences.
For the teenagers of Milwaukee who just wanted to explore, the 414s case was the moment the law caught up.