Feeds

Captain Crunch sets up security firm

Legendary 70s phreaker returns from obscurity

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

Legendary hacking figure Captain Crunch is returning from years of relative obscurity to set himself up as a security consultant.

Perhaps the most well known figure in the digital underground besides Kevin Mitnick, John Draper made his name in 1971 when he discovered that the toy whistle in the Cap'n Crunch cereal box could trick the telephone network into giving him free calls.

Draper's activities as a phreaker, who was able to illegally control the US telephone network, are documented in a seminal article in the October 1971 issue of Esquire, called "Secrets of the Little Blue Box", a reference to an electronic gizmo used to generate the tones necessary for sending commands down the phone network.

Apple founders Steve Jobs and Stephen Wozniak, who was then a student at the University of California at Berkeley, were so impressed by the article that they sought out Draper. After getting in touch with Draper, legend has it he turned up at Wozniak's dormitory sporting an outlandish moustache and horn rim glasses who announced, "It is I!" A typically flamboyant entrance for Draper, who is well known for his manic intensity and insistent curiosity.

According to the International Herald Tribune, Draper schooled Wozniak and Jobs in the art of making their own 'blue boxes', electronic devices that allow users to gain free and illegal access to the phone network. Legend has it that the two novice entrepreneurs sold the blue boxes door-to-door on the Berkeley campus, several years before they founded Apple Computer.

However the Esquire article also brought Draper to the attention of the FBI.

He was subsequently arrested and sent to prison on a number of occasions for telephone 'phreaking', or obtaining free phone calls. However, Draper did not waste his time inside and while in prison designed EasyWriter, a word processing program developed for Apple machines that came with the first IBM PC in 1981, beating Bill Gates to the punch in doing so.

Latterly Draper has been travelling the world, picking up work that used some of his skills, like living in Goa and designing Web sites for an Indian entrepreneur.

Now Draper has stepped into the spotlight again by joining with a number of partners to set up an security software and consulting firm called, ShopIP.

Draper, now 57, describes himself as a "white hat" hacker and sees the creation of ShopIP as a way he can repay society for his past indiscretions, as he explains in an interview with the International Herald Tribune, where he acknowledges the problems he has in living down his colourful past.

"I'm not a bad guy," he said. "But I'm being treated like a fox trying to guard the hen house." ®

Related Link

ShopIP
International Herald Tribune article on Captain Crunch

Security for virtualized datacentres

More from The Register

next story
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.