
Susan Thunder
The Master Social Engineer Who Vanished, The Woman Who Hacked Hearts and Minds
Shane Brown
7/18/20258 min read


Susan Thunder: The Master Social Engineer Who Vanished
The Woman Who Hacked Hearts and Minds
Picture this: It's 1981, and while most people are still figuring out what a computer even is, a young woman named Susan Thunder is sweet talking her way into some of the most secure phone systems in America. No fancy hacking tools, no lines of complex code, just her voice, her wit, and an uncanny ability to make people trust her completely.
Susan Thunder (born Susan Headley in 1959) wasn't your typical hacker. While her male counterparts were getting arrested and making headlines, she was perfecting what we now call "social engineering" basically the art of convincing people to hand over their secrets voluntarily. Think of it as psychological magic tricks, but with potentially devastating consequences.
What makes Susan's story so fascinating isn't just her technical skills, it's how she turned personal trauma into a superpower, revolutionized cybersecurity thinking, and then disappeared into thin air, leaving behind only whispers and legends.
From Trauma to Tech Wizardry
Susan's journey into hacking began with pain. Born in small-town Illinois and later moving to California, her childhood was marked by abuse from multiple stepfathers. But here's where her story takes an unexpected turn: instead of being broken by these experiences, Susan learned to fight back using her mind.
At just 11 years old, she did something remarkable. After being abused by her Navy officer stepfather, Susan marched into the Central Library in downtown Los Angeles and researched everything she could about polygraph tests. She taught herself how to beat lie detector tests by manipulating the baseline readings and ultimately helped convict her abuser.
This early victory taught Susan a philosophy that would guide her entire career: "Everything is a system, and every system can be cracked."
Her relationship with technology started with something we all take for granted: the telephone. After her father abandoned the family, young Susan found comfort in the phone system itself. She'd spend hours listening to dial tones, discovering she could manipulate calls by tapping the handset's button. She even dreamed of becoming the recorded voice that plays when calls get disconnected—a detail that feels both heartbreaking and prophetic.
The Groupie Years: An Unexpected Education
At 14, Susan ran away to become what was called a "baby groupie" in 1970s Hollywood. She reinvented herself as "Susan Thunder" a name inspired by her grandmother's belief that she'd been "blessed by thunder."
Working the switchboard at an answering service gave her access to something incredibly valuable: unlisted phone numbers of famous musicians and entertainment figures. As she put it, this was "a groupie's goldmine."
Susan claims she's one of only three women to have slept with all four Beatles (securing Paul McCartney through an elaborate scheme involving his wife Linda). She even had business cards printed: "Susy Thunder: Specializes in Parties with Scottish, British, and Irish Rock Bands."
But here's the thing, her groupie years weren't just about rock stars. They were an intensive course in social engineering. She learned how carrying a clipboard could get you into almost any restricted area, how authority works, and most importantly, how to read people and give them exactly what they wanted to hear.
Welcome to the Underground
The Phone Phreaking Revolution
Susan discovered the hacker underground through Los Angeles' phone phreaking scene in the late 1970s. Phone phreaking was essentially hacking before personal computers were widespread—it involved manipulating telephone systems to make free calls, access restricted numbers, or just explore the vast network that connected the world.
These early phone hackers (or "phreaks") had colorful names like "Dan Dual Phase" and "Regina Watts Towers." They spent their nights on 24-hour conference lines, sharing techniques and exploring the Bell telephone network like digital explorers mapping uncharted territory.
When phone systems became electronic, these hackers adapted. They'd meet at places like Shakey's Pizza in Hollywood, sharing methods for making free long-distance calls, erasing phone bills, and yes, spying on each other. Susan followed this evolution, eventually moving to dedicated bulletin board systems (BBSes) think of them as the internet's awkward teenage years.
The Art of Social Engineering
While other hackers focused on technical exploits, Susan mastered something far more powerful: people. Her specialty was social engineering, the practice of manipulating human psychology to gain unauthorized access to information.
Picture Susan calling a secure facility with her "honey sweet" voice, claiming to be a telephone operator dealing with a "system emergency." Or imagine her posing as an overworked secretary who just needs to "verify some account information real quick." She wasn't breaking into computer systems through code, she was walking through the front door because she convinced someone to hold it open for her.
As Susan once explained at a hacker conference: "Whether I perform some kind of ruse to gain access, or whether I just go seduce the guy and blackmail him afterwards... if I want to get into that computer, I'm going to get into it. That's one advantage women hackers have over you guys, if you're willing to use it."
This wasn't just about gender, it was about understanding that humans are often the weakest link in any security system. Susan realized that passwords might be hard to crack, but people are easy.
The Legendary Heists
The US Leasing Incident
One of Susan's most significant moments came in December 1980, when she witnessed her boyfriend Lewis DePayne (known as "Roscoe") hack into US Leasing, a San Francisco company that leased electronic equipment. According to Susan, she watched Lewis access the company's computer system and delete files as an act of revenge.
When their relationship went sour, Susan did something that would define her controversial legacy: she contacted the FBI. She provided them with handwritten notes containing access codes that Lewis had given her, helping to secure one of the first prosecutions for electronic intrusion under California's computer crime laws.
This incident also involved Kevin Mitnick, who would later become one of the world's most famous hackers. Mitnick received a year's probation as a juvenile, while Lewis served 150 days in jail. Susan's testimony helped make it happen.
The Pacific Bell Non-Pub File Heist
Perhaps Susan's most audacious solo operation was her theft of Pacific Bell's "non-pub file" a comprehensive list of unpublished phone numbers belonging to celebrities, politicians, and other public figures. This was like stealing the ultimate VIP contact list, and Susan pulled it off with style.
She spent months casing a Pacific Bell office in East Los Angeles, initially trying to find discarded microfiche (think tiny photographs of documents) in dumpsters. When that didn't work, she executed a plan that sounds like something from a heist movie.
Susan entered the building during cleaning hours and convinced the cleaning crew she was an employee working late. She then systematically searched the office, found the microfiche files stored in small drawers, and swapped out a section with dummy microfiche she'd gotten from a library. Later, she sold the stolen celebrity phone numbers to a tabloid.
No computers were harmed in the making of this hack, just pure social engineering and old-fashioned sneaking around.
Going Public
Congressional Testimony
On October 25, 1983, Susan Thunder did something unprecedented: she testified before the U.S. Senate about the technical capabilities and motivations of modern hackers and phone phreakers. This was a time when computer security was becoming a national concern, and lawmakers were scrambling to understand threats they could barely comprehend.
Susan's insights helped bridge that gap, explaining the human element of cybersecurity to people who were still thinking in terms of locked doors and physical security.
Television Appearances
Susan also appeared on ABC's 20/20 program in a segment about "electronic delinquency" hosted by Geraldo Rivera. She demonstrated hacking techniques to a national television audience, helping to raise awareness about computer security vulnerabilities at a time when most people didn't even know such vulnerabilities existed.
Later, she became a fixture at security conventions and hacker conferences, including a memorable keynote at DEFCON 3 in 1995, where she discussed social engineering techniques and the psychology of human manipulation.
The Great Disappearing Act
Here's where Susan's story gets really interesting: she got out of the game while she was ahead. In 1994, she made a complete career change, becoming the elected City Clerk of California City, California. From underground hacker to local government administrator, talk about a plot twist.
After leaving the hacking world, Susan pursued various legitimate careers, including working as a professional poker player at the Las Vegas Stardust casino and becoming an eBay dealer specializing in ancient Roman coins. Coin collecting remains one of her hobbies to this day.
The Art of Staying Invisible
Perhaps Susan's greatest legacy is something most people never think about: she demonstrated that the most successful hackers are those who never get caught. As she once explained: "All the best hackers, all the best phreakers in the world, we don't know who they are because they never got arrested. And they never went to prison. This is why you don't know who the best ones in the world are."
While Kevin Mitnick became famous through his arrests and eventual book deals, Susan Thunder achieved something potentially more valuable: she proved you could have a legendary hacking career and then transition to a completely normal life.
Why Susan Thunder Still Matters
Susan's techniques aren't just historical curiosities, they're incredibly relevant today. Every time you get a suspicious email claiming to be from your bank, or someone calls pretending to be from tech support, you're seeing Susan Thunder's influence. Modern cybersecurity threats often rely on the same psychological principles she mastered decades ago:
Phishing attacks that trick people into giving up passwords or personal information mirror Susan's telephone operator impersonations. Social media reconnaissance, where criminals research their targets online, follows Susan's playbook of gathering personal information to make scams more convincing. Business email compromise schemes, where criminals impersonate executives to authorize fraudulent transactions, use the same authority manipulation techniques Susan pioneered.
The fundamental insight Susan discovered in the 1980s remains true today: it's often easier to trick a person than to break through technical security measures.
The Complex Legacy
Susan's story isn't without controversy. Her relationship with Kevin Mitnick remains complicated, while they were collaborators in the early 1980s, their relationship soured after Susan's testimony about the US Leasing hack. Mitnick has publicly disputed Susan's version of events, and their conflict highlights the personal dramas that often drove early hacker community disputes.
But regardless of the interpersonal drama, Susan Thunder's impact on cybersecurity thinking cannot be understated. She showed that effective hacking requires understanding people as much as understanding technology.
Lessons for the Modern World
Susan Thunder's story teaches us several important lessons:
Human factors matter most: No matter how sophisticated our technical security becomes, humans remain the most vulnerable point in any system. Susan proved this long before it became conventional wisdom.
Social engineering is timeless: The specific technologies change, but the psychological principles Susan used remain constant. People still want to be helpful, still respect authority, and still make snap judgments based on limited information.
The best security is invisible: Susan's greatest achievement might be that she got out of the hacking world without getting caught. In cybersecurity, the threats we don't see are often the most dangerous.
Everything is a system: Susan's childhood insight that "everything is a system, and every system can be cracked" remains relevant. Whether we're talking about computer networks, corporate hierarchies, or social conventions, understanding systems means understanding vulnerabilities.
The Woman Who Vanished
Today, Susan Thunder remains largely invisible, exactly as she planned. While her male contemporaries wrote books, gave interviews, and built careers on their hacking notoriety, Susan demonstrated a different path: use your skills, make your impact, and then disappear into ordinary life.
Her story reminds us that the history of technology isn't just about code and hardware, it's about the people who use, maintain, and yes, exploit these systems. Susan Thunder's contribution to hacking history lies not just in her technical achievements, but in her demonstration that the most powerful hack of all might be hacking human nature itself.
In an age where we're constantly warned about cybersecurity threats, Susan Thunder's story offers a sobering reminder: the most dangerous hacker might not be the one with the most sophisticated tools, but the one with the most charming voice on the other end of the phone.
And somewhere out there, Susan Thunder is probably reading this and smiling, knowing she pulled off the greatest hack of all: becoming a legend and then disappearing completely, leaving the rest of us to wonder what other systems she might have cracked that we'll never even know about.
Innovate
Building websites and securing your digital presence.
Connect
Support
Info@sinistergatedesigns.com
© Sinister Gate Designs, LLC 2025. All rights reserved.