CHAPTER 5 — THE KID, THE DOT-MATRIX, THE WAR GAMES

Hacker Origins: Memoir of Early Network Intrusion and Cyber Exposure

early hacking memoir computer intrusion bulletin board systems cybersecurity origins
Early hacking environments and network exploration in the pre-internet era

Hacker memoir and early cybersecurity exposure begins with curiosity, access, and systems that were never meant to be reached. This chapter documents the origin of network intrusion, early bulletin board systems, and the path from curiosity to capability.

Category: Memoir / Cybersecurity / Investigative Narrative

From COERCION / WHITE SITES — A Memoir by LeRoy Nellis


I DON’T FUCKING LOSE.

That mantra didn’t start in a jail cell. It started in a dim bedroom lit by a flickering monitor, dot-matrix paper spooling onto the carpet like a magician’s endless scarf…

I was thirteen, skinny as a rail and wired like caffeine. Everyone else wanted BMX bikes and girlfriends. I wanted access.

My first “hack,” if you could call it that, was stumbling across a modem number that dialed me into a bulletin board system.

That was my drug.

Every menu option was a new high. Every beep of the modem was a pulse in my veins.

And then I slipped deeper.

Somewhere in that blur of sleepless nights, I found myself inside systems that were never meant for a kid.

AS400 mainframes — digital temples tied to Ivy League universities and government research labs.

Phone numbers. Hostnames. Administrator contacts.

It was like someone had left the master Rolodex of America’s networks sitting open.

So I printed it.

I wasn’t stealing.

I wasn’t vandalizing.

I was mapping.

Cartography of the forbidden.

If you want to know what I was like at that age, go watch WarGames.

Curiosity becomes capability.

Capability becomes attention.

And attention — sooner or later — becomes a file with your name on it.

White Hat vs Black Hat: Cybersecurity and Hacker Culture

Vegas has a way of splitting a man in half.

By daylight I was a Network Security Engineer — corporate, clean, accountable.

But you don’t catch wolves by reading fairy tales.

You catch wolves by running with them.

Black Hat. DEF CON. The real arena.

The alphabet agencies filled the rooms — FBI, NSA, DHS — watching, learning, documenting.

Wolves teaching shepherds how to repair the fence.

Then DEF CON hit — and the masks came off.

Handles replaced names. Reputation replaced résumés.

Hack-offs became digital cage fights.

Everyone watching.

Everyone hungry.

And the feds?

They were always there.

Plain clothes. Quiet eyes. Taking notes.

Who made noise.

Who stood out.

Who might matter later.

Vegas split my life in two.

White hat by day.

Black hat by night.

Every badge flip was another point on a map I didn’t know was being drawn.

A map that would later be called a dossier.


End of Chapter 5

For broader context, see the Williamson County investigative timeline.

Discover more from LeRoy Nellis

Subscribe now to keep reading and get access to the full archive.

Continue reading