mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
1209 lines
49 KiB
Text
1209 lines
49 KiB
Text
==Phrack Magazine==
|
|
|
|
Volume Four, Issue Forty-Two, File 13 of 14
|
|
|
|
HoHoCon 1992
|
|
Miscellany
|
|
|
|
|
|
|
|
|
|
The hackers were getting nervous. It was understandable. Just a few weeks
|
|
before HoHoCon and already two other "get-togethers" had experienced
|
|
turbulence from the authorities.
|
|
|
|
Rumors began to fly that HoHo was to be the next target. Messages bearing
|
|
ill-tidings littered the underground. Everyone got worked into a frenzy about
|
|
the upcoming busts at HoHoCon. People began to cancel their reservations
|
|
while others merely refused to commit one way or the other.
|
|
|
|
But, amidst all the confusion and hype, many declared "Let them try to
|
|
raid us! I'm going anyway!" These were the few, the proud...the stupid.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
HoHoCon as I saw it - Erik Bloodaxe (Chris Goggans)
|
|
|
|
I arrived at the Allen Park Inn in the mid afternoon on Friday the 18th.
|
|
I was promptly greeted by several of my cohorts and a loping transient
|
|
who introduced himself as "Crunchhhhhhhhh." Yes, John Draper, the infamous
|
|
Captain Crunch had actually ventured outward to attend our little party.
|
|
(Yes, Virginia, the rumors are true: The Captain is toothless, unkempt,
|
|
overbearing and annoying as all hell.)
|
|
|
|
I followed Scott Chasin back to our room, the pack of other early arrivals
|
|
in close file behind. After storing my gear I noticed that Draper was
|
|
looming in the doorway ranting furiously about all the smoking in our room.
|
|
"I've never heard of a hacker who smoked," exclaimed the Captain.
|
|
Taking this as my cue, I bummed a Djarum off of Crimson Death and took great
|
|
glee in adding my fumes to the enveloping fog.
|
|
|
|
Draper spent the next 30 minutes attempting to eavesdrop on various
|
|
conversations in which various old friends were catching up. Not knowing
|
|
any of us personally, he nonetheless felt obligated to offer his comments
|
|
about our discussions about life and college and music amidst his coughing
|
|
and complaining about the smoke.
|
|
|
|
After some time everyone was banished from the room and several of us
|
|
went out to eat. Scott Chasin, myself, two hackers (The Conflict, & Louis
|
|
Cypher) along with Gary Poole (covering the entire mess for Unix World) took
|
|
off for the nearest grease pit. Taco Bell won in proximity, and once
|
|
surrounded by burritos Scott, Conflict and I began our rant about Unix
|
|
Security (the lack thereof). Gary whipped out his Unix World pen and pad
|
|
and began taking notes. I am uncertain whether or not it was the content
|
|
of our spiel or the asides I repeatedly made regarding the bevy of giggling
|
|
coeds that garnered the most notes in Gary's booklet.
|
|
|
|
Back at the Con things were spicing up. More people had begun to arrive
|
|
and the Allen Park Inn staff began to worry about their safety and that of
|
|
their other guests. One remarked to Jesse (Drunkfux), the sponsor of HoHoCon, "That Draper
|
|
fellow needs to stay out of the lobby. He was eating large
|
|
amounts of flesh off his hands and it was scaring some of the visitors."
|
|
The staff did not know what to think at all when a father arrived with his
|
|
three sons and after purchasing a room on his credit card told the boys, "Ok
|
|
guys, Mom will be picking you up on Sunday."
|
|
|
|
This did not concern most of us. It was straight to the bar
|
|
for us, where Rambone bought Scott & myself a round of Kamikazes. Also at
|
|
the bar was Bootleg who had just gotten out. (Of what, and for what you
|
|
can find out on your own.) Bootleg is probably the smartest biker I have
|
|
ever had the pleasure to meet. We talked about sex, drugs, hawgs, computers,
|
|
cellular fraud and how close the nearest cabaret was.
|
|
|
|
A small controversy began to arise amidst the hackers at the bar. Stationed
|
|
near one end of the room was a table lined with older men. "FEDS," someone
|
|
murmured, gesturing at the group.
|
|
|
|
"Good for them," I said, and left the bar to look for Jesse. When I returned
|
|
several minutes later the hackers had engaged the strangers in conversation
|
|
and found that they weren't feds after all. Among this group were
|
|
Jim Carter of Houston-based Bank Security, and Bernie Milligan of
|
|
Communications & Toll Fraud Specialists, Inc. Once this news was out
|
|
tensions eased and everyone continued with their libations.
|
|
|
|
Suddenly I became aware that there was girl in the room. I had seen her out
|
|
in the courtyard previously but now she was alone. Turning on my
|
|
"Leisure Suit Larry" charm I grabbed the seat next to her. Melissa had arrived
|
|
from Austin to cover the event for Mondo-2000. She surprised me by telling
|
|
me that she knew who I was, where I worked, and even knew my extension number.
|
|
(I almost fell off the barstool.)
|
|
|
|
Jim & Bernie came over and joined us at the bar. Bootleg, Chaoswiz, Melissa
|
|
and I engaged them in wild stories about UFO's, hacking, the NSA & the CIA.
|
|
(Bernie alleged that he was ex-NSA, and Jim ex-CIA. We have not yet
|
|
determined if they were acting under orders from Col. Jim Beam & Gen. Jack
|
|
Daniels.)
|
|
|
|
After the ensuing debates on the true formation of the NSA, the group broke up
|
|
and Melissa and I took off to MC Allah's room to partake of the keg he had
|
|
brought. We walked in the room and were greeted with the sight of a four-foot
|
|
boy with a syringe sticking out of his arm. This was a bit much, even for me.
|
|
I snatched his "medication" away from him and found that it was really only
|
|
some type of growth hormone. The boy, 8-Ball, was actually 15 and his parents
|
|
had him on hormones to stimulate his growth. 8-Ball was totally whacked
|
|
out his mind nonetheless. I think he had ingested such a diverse amount of
|
|
God knows what by the time we arrived that he was lucky to remember where
|
|
he was. Later that evening he would become convinced that he was Scott
|
|
Chasin and confessed to quite a bit of wrongdoing just before he gave offerings
|
|
at the porcelain alter.
|
|
|
|
Conversations in the keg room left something to be desired. One large hacker
|
|
named Tony looked at Melissa and in his best British accent asked if he
|
|
could fondle her breasts. And the debate between MC Allah and Hunter about
|
|
who could drink the most alcohol reached a climax when both stuck their heads
|
|
under the keg spigot for extended periods of time.
|
|
|
|
Sometime just before 11:00 the hotel guard, attired in Raiders jacket and
|
|
a really, really big snow hat (the kind with the poofy ball on top) showed
|
|
up brandishing his paper baton, (A rolled up Houston Press). "You all
|
|
needs to get to yaw roomz, nah. I ain'tz ta gonna tell yaw no mo'."
|
|
Everyone looked the guard over and moved back into the keg room. Thus was
|
|
born, "Homie da Guard." After he wandered away, everyone moved back out
|
|
onto the porch.
|
|
|
|
It was getting late and I was supposed to speak the next morning so I tried to
|
|
get into our room. Scott Chasin, hacker extrordinaire, had locked me out.
|
|
After beating on the door for 10 minutes, the windows for 5, the walls for 10,
|
|
and letting the phone ring for another 15 minutes I decided that Scott was a
|
|
bit too tipsy to unlock the door so I crashed out on Jesse's floor.
|
|
|
|
That night, the water pipes broke. There was some speculation that those
|
|
evil hackers had "hacked the system." Not.
|
|
|
|
While complaining about the lack of water that night, someone overheard
|
|
three young attendees at a bank of pay phones attempting to order up
|
|
a few escorts on "credit." Rumor has it they were successful.
|
|
|
|
The next morning was chaos. By the time we arrived at the conference room
|
|
there were about 150 people inside. Louis Cypher sat at the door collecting
|
|
money for the raffle and getting everyone to sign the guest book. Jesse
|
|
and others were setting up various video equipment and getting things
|
|
in order. In the back of the room, Bernie sat scanning the crowd with a
|
|
super-ear, recording the conversations of those sitting.
|
|
|
|
Crunch was up in arms again. "If everyone in here doesn't stop smoking
|
|
I won't be able to do my speech. If you all want to hear me talk, you
|
|
will have to stop smoking." Several more cigarettes lit up. After
|
|
speaking with management, Crunch came back in and asked if everyone smoking
|
|
would at least move to one side of the auditorium nearest the door.
|
|
With hesitation, the crowd conceded.
|
|
|
|
The conference got underway with consultant Ray Kaplan taking a census of
|
|
those in attendance. The group ranged from under 15 to over 50, had
|
|
professionals and hobbyists, and had enthusiasts for every conceivable
|
|
type operating system. Ray went on to elaborate on one of his audio
|
|
conferences in which an FBI officer alluded that one of their key
|
|
sources of information was "I.R.C."
|
|
|
|
Bootleg got up and spoke on the vast potentials involved with cellular
|
|
fraud. He discussed how to monitor the reverse channel to obtain ESNs,
|
|
and where to obtain the equipment to allow you to do such a thing. He
|
|
later handed out diskettes (IBM format) containing information on how
|
|
to reprogram cellular phones and where to obtain the equipment necessary
|
|
to pick subscriber numbers out of the air.
|
|
|
|
Up next, myself and Chasin. Our topic was a bit obscure and cut deliberately
|
|
short due to concerns about the nature of our speech. During the Dateline
|
|
NBC piece that featured Chasin a piece of information flashed on the screen
|
|
that alluded to UFO information stored on military computers. Chasin
|
|
and I had gained possession of the research database compiled by the hackers
|
|
who were looking into this. We discussed their project, the rumors surrounding
|
|
their findings and the fear surrounding the project. Not knowing the true
|
|
details of this we declined to comment any further, but made the documentation
|
|
available to anyone who wanted a copy. We finished our speech by answering
|
|
questions about Comsec, Consultants, etc.
|
|
|
|
Steve Ryan, a Houston lawyer with a great deal of interest in the
|
|
legal aspects of cyberspace spoke next. He covered several of the current
|
|
issues affecting the community, spoke on laws in effect, cases pending,
|
|
and gave an insight to his background that led him to focus in on
|
|
the issues concerning the electronic community.
|
|
|
|
Next, Jim Carter gave a quick and dirty demonstration of how to monitor
|
|
electromagnetic radiation and how to do a simple data recovery from this
|
|
noise. He monitored a small data terminal from a portable television set
|
|
that was completely unmodified. He then spoke on how to read the
|
|
EMR from such things as plumbing, the ground, off of window panes, etc.
|
|
Jim's speech, although highly intriguing, got extremely vague at points,
|
|
especially regarding technology needed, his own background, etc.
|
|
(We will attribute this to his "CIA" training.)
|
|
|
|
The Hotel Officials showed up and demanded that everyone get out immediately.
|
|
Apparently someone had staggered into the kitchen, drunk, and broken
|
|
something. Steve Ryan left to smooth things out a bit. After a few minutes
|
|
he returned and told everyone that they could stay, but to keep it quiet
|
|
tonight. Thus the secret plans of some to drive the hotel golf cart
|
|
into the pool were crushed.
|
|
|
|
The raffle proved to be an exercise in banality. Everything from
|
|
flashing street lights to SunOS 4.1.3 to T-shirts to books were
|
|
auctioned off. One lucky devil even got an official Michael Jackson
|
|
candy bar.
|
|
|
|
The folks from RDT (Count Zero and White Knight) handed out a large amount
|
|
of photocopied goodies such as the new "Forbes" article on hackers,
|
|
a complete set of the old 70's telephony 'zine "TEL" as well as assorted other
|
|
flyers and pamphlets.
|
|
|
|
Up next, Louis Cypher spoke about his entanglement with the law
|
|
regarding his front-page bust for counterfeiting. He told of his
|
|
experiences with the law, how they got involved in such a dastardly
|
|
deed, what jail was like on the inside, and advice against anyone
|
|
else considering such a thing.
|
|
|
|
Up last, John Draper. Draper had managed by this time to annoy almost
|
|
everyone at the convention. A large portion of those in attendance
|
|
left as soon as he got up. They were the unlucky ones. Draper, for all his
|
|
oddities, is an intriguing speaker. His life has been quite rich with
|
|
excitement and when he can actually focus on a subject he is captivating.
|
|
He spoke on his trip to the Soviet Union where he met computer and telephone
|
|
enthusiasts in Moscow. He spoke on his unfortunate involvement with
|
|
Bill SF and the BART Card duplication scandal. He spoke, with obvious
|
|
longing, of the good old days of blue boxing, and stacking tandems to
|
|
obtain local trunks, and on verification circuitry.
|
|
|
|
Listening to Draper talk really brought me back to my beginnings. I could
|
|
hear in my head the "cachink-chink" of a tandem waiting for MF. I remembered
|
|
stacking tandems to Europe and back to call my other line. I remembered
|
|
the thrill of finding never before known trunks and exploring their
|
|
connections. I fell into a deep nostalgic high, and walked up to John
|
|
to tell him thanks. As I extended my hand to him, he mumbled something
|
|
unintelligible and wandered off. So much for paying respect.
|
|
|
|
About ten of us took off to Chuy's for dinner: Me, Chasin, Conflict,
|
|
Rambone, Dispater, Blue Adept, Minor Threat and reporters Joe Abernathy
|
|
and Gary Poole were among the diners. Everyone ate heartily and listened
|
|
to cordless telephone conversations on Rogue Agent's handheld scanner.
|
|
One conversation was between what appeared to be a "pimp" talking to his
|
|
"ho" about some money owed him by another in his flock. The conversation
|
|
drifted to the Dallas man who had terrorized an entire neighborhood some
|
|
months back with prank phone calls. Conflict and Dispater repeated a
|
|
few of the choicest of the calls for our amusement.
|
|
|
|
Back at the hotel, Dr. Hoffman's Problem Child had escaped, and several
|
|
casualties were reported.
|
|
|
|
Conflict, Chasin and I barricaded ourselves in our room and went on a lengthy
|
|
stream of consciousness rant about what we needed out of life. Our absolute
|
|
essentials were reduced to a small room with a computer hooked into the
|
|
Internet, a specially designed contour chair, a small hole through which
|
|
a secretary would give us food, virtual reality sex toys, and a toilet.
|
|
(Chasin suggested no toilet, but a catheter so we would never have to move.)
|
|
Gary Poole was quietly stunned in the corner of the room making mental notes.
|
|
|
|
Much of the con had moved into a suite that had been converted into a
|
|
mass computing arena. Several attendees from Pittsburgh had turned their
|
|
room into a lab with four Unix workstations with several terminals throughout
|
|
the room including the bathroom! These were hooked into the Internet through
|
|
a slip connection that had been rigged somewhere. It was quite a site.
|
|
The room was usually completely packed and smelled like a smoky gymnasium.
|
|
|
|
(It was rumored that after Chasin and I spoke on the UFO conspiracy, several
|
|
hackers began their attempts at penetrating the Ames Research Lab. No
|
|
reports back on their success.)
|
|
|
|
After I finished copying several Traci Lords video tapes (ahem) I relinquished
|
|
control of the decks to a room downstairs. Dispater played a video
|
|
manipulation he and Scott Simpson had produced. They had found a TRW training
|
|
video tape during a trashing run and dubbed in their own dialogue. (You'd
|
|
have to see it to fully understand.)
|
|
|
|
After that, I played a few tapes of my own. The first was a short film called
|
|
"Red," that chronicled the abusive prank phone calls directed at a bartender.
|
|
The film had the actual phone call tapes played with video stills. (Guess
|
|
where the Simpsons came up with that nifty idea...)
|
|
|
|
Following "Red," someone heard on the scanner that the guard was answering
|
|
a large noise disturbance in the room we were in. (Yes, they had the hotel
|
|
guard's 2-meter frequencies.) Everyone moved into another room before the
|
|
guard showed up. He was thoroughly confused.
|
|
|
|
In the next room I played the ultimate in shock, the sequel to the movie that
|
|
I had disturbed the entire con with last year, "Nekromantik II." I won't
|
|
go into any detail, since the title says it all. Once again, I reign as
|
|
the sickest person at HoHoCon, this honor bestowed upon me by everyone
|
|
who witnessed the showing.
|
|
|
|
As things winded down, several people ended up back in our room to waste
|
|
away the last few hours of the night. Several people returned from an
|
|
adventure to "an abandoned hospital." No one really understood what they went
|
|
to, but it sounded disturbing. Later, that same group would leave to
|
|
go climb "an abandoned grain storage tower." Go figure.
|
|
|
|
Approximately 2:00 am, a local hacker named Zach showed up. Scott had a few
|
|
words for Zach, as did most everyone at the Con. Zach lived in a fantasy
|
|
land where he was a top notch security consultant with high paying clients
|
|
in the telecommunications industry. He also like to name drop names like
|
|
Chasin and Goggans as his partners and as people who would swoop down
|
|
and terrorize the people he had any problems with. He also liked to turn
|
|
in, or threaten to turn in any of his rivals in the software pirating
|
|
community. He also like to proposition young boys both in person and
|
|
over the phone. At 17, Zach had a few problems.
|
|
|
|
Trapped in the corner of the room, Zach endured about an hour of questioning
|
|
and accusations (all of which he truly deserved.) Eventually Zach left,
|
|
apparently not affected by the ordeal at all. We attributed this to his
|
|
overly apparent schizophrenia brought on by denial of his sexual
|
|
tendencies.
|
|
|
|
Later that night the Pittsburgh gang blew out the power in their entire
|
|
wing. One was overheard, "Hmmm...guess we should have known that when the
|
|
power strips kept melting that we were drawing too much power."
|
|
|
|
The next morning everyone gathered up their gear and said so long. All but
|
|
a few who gathered in a room marked "the suite of the elite." Armed with
|
|
a nitrous oxide blaster, everyone sat around and viewed the con through
|
|
the roaming video eye of Jesse, who had managed to capture everyone
|
|
in some kind of compromising position. He will be selling them off
|
|
after he edits it a bit. It was dubbed "The Blackmail Tape."
|
|
|
|
In my opinion this year was much less anarchistic than last year. The
|
|
convention might not even be banished from this hotel. (Yeah, right.)
|
|
There were no raids, there were no overtly violent or satanic acts,
|
|
no fire alarms, no trashing runs (that I saw), no fights,
|
|
and there were no strippers (alas). The conference portion of the
|
|
event was much better organized, there was much more interesting
|
|
information to be shared, and was well worth the distances traveled by
|
|
all.
|
|
|
|
This was HoHoCon '92.
|
|
|
|
--------------------------
|
|
|
|
H*O*H*O*C*O*N '92
|
|
|
|
Frosty's Itinerary
|
|
|
|
Thursday 8pm Take off and go bar hopping all night long to build up
|
|
stamina for the convention.
|
|
|
|
Thrusday 10pm Quit bar hopping and waste shitloads of money at the
|
|
casinos in feeble attempts to get gas money for the trip.
|
|
|
|
Friday 5am Leave the casino and decide to get some sleep after spending
|
|
hours to win a meager $10 over starting cash.
|
|
|
|
Friday 8am Wake up and decide to pack for the trip. Forget necessities
|
|
that we couldn't live without. Remember to bring junk food.
|
|
|
|
Friday 9am Stuff assembled GCMS members into subcompact Japanese micro
|
|
car and leech as much gas money out of them as possible.
|
|
|
|
Friday 2pm Stop at the friendly convenient store to rob it of precious
|
|
sugar-coated necessities and obtain mucho lotto tickets.
|
|
|
|
Friday 4pm Endure Windrunner's gruelling multi-hour long verbatim
|
|
rantings of taking the Purity Test 1500 verbally.
|
|
|
|
Friday 7pm Pull out many maps and try to find the damn hotel in Houston.
|
|
|
|
Friday 9pm Arrive at the hotel getting a room for one (car stuffed
|
|
with people sits outside the lobby). Request two keys.
|
|
|
|
Friday 10pm Test the smoke machine on the hotel grounds. Chase young
|
|
code-kids out of your way, threatening to disable their
|
|
phones.
|
|
|
|
Friday 11pm Crash in room from lack of sleep. Kick other members out
|
|
of your way. Ignore multiple alcoholic beverages lining
|
|
the room. Ponder what's sleeping in the chair briefly.
|
|
|
|
Saturday ??? Try to figure out if you're awake or dead. Take a collection
|
|
from those that are still alive. Run to some micro-compact
|
|
Japanese convenience store hidden in the middle of suburbia
|
|
hell and obtain sugar-coated nutrients with Windrunner and
|
|
JunkMaster and Gaijin.
|
|
|
|
Saturday 1pm Arrive for the conference. Get mega-amounts of raffle tickets.
|
|
|
|
Saturday 2pm Conference actually gets started a few hours behind schedule.
|
|
Tape conversations from the man with the whisper 2000 home
|
|
version. Ponder the light orbiting Erik B's head.
|
|
|
|
Saturday 4pm Witness Steve Ryan in action against the hotel staff.
|
|
Wonder where the young hack in the corner got the gallon,
|
|
mostly empty now, of wine. Ponder if he's going to spew.
|
|
|
|
Saturday 6pm Try to figure out what everyone is going to do with the
|
|
several hundred flashing construction lights given out.
|
|
Calculated the ratio of men to women as 15,000:1, roughly.
|
|
|
|
Saturday 8pm Try to keep awake while wondering how much torture can be
|
|
sustained. Watch Count Zero nodding off. Hitman and I
|
|
pulled out our decoder rings to interpret Crunch's hidden
|
|
message.
|
|
|
|
Saturday 10pm Dominoes Pizza makes it to the room. OUR SAVIOR !!! He's
|
|
5-minutes late. Custody battle over the pizza ensues. The
|
|
manager is called, at which point he lowers the $50 price
|
|
for the two pizzas down to $30. We scrape a few dollars and
|
|
hand the peon delivery boy some cheap beer.
|
|
|
|
Saturday Nite Hand out copies of "cindy's torment" to the code kids.
|
|
Watch Erik B.'s continuation of necrophiliac desires on
|
|
the acquired VCR that mysteriously appeared. Avoided the
|
|
hotel security by changing room while monitoring their
|
|
frequencies (thanks RDT). Obtained evidence that hackers
|
|
were breaking into VR R&D departments to engage in endless
|
|
routines of VR sex for Cyborgasmic responses. Saw Crunch's
|
|
host's room blow out as the multitudes of computers fry the
|
|
circuits. Followed the 'sheep' about the hotel.
|
|
|
|
Sunday ??? Woke bright and early to a car locked with the keys inside.
|
|
Fortunately, 50-odd slim-jims appeared out of nowhere to
|
|
save the day. Windrunner chauffeured us back to our lair.
|
|
|
|
Sunday 3pm Hacked into the Louisiana Lotto machine from an acoustical
|
|
modem and laptop from a pay phone to rig the numbers and
|
|
then bought a ticket.
|
|
|
|
Sunday 7pm Returned to hell. Lost the lotto ticket in the growing
|
|
pile of sugar-coated necessities sheddings. Cursed.
|
|
|
|
Sunday 8pm Turned the PC on and hit the networks.
|
|
|
|
|
|
--------------------------
|
|
|
|
Jim Carter, president of Bank Security in Houston, TX, wrote the
|
|
following impressions of HoHoCon for Security Insider Report
|
|
(December, 1992)
|
|
|
|
HoHoCon was in fact "Unphamiliar Territory" for this "good ole boy,"
|
|
but it didn't take long till I was into the swing of things and
|
|
telling lies of how we cheat and steal to get our information. Of
|
|
course, everyone who talked to this "good ole boy" thought he was with
|
|
one of the three letter agencies. As the stories rolled on about what
|
|
they (the hackers) could do, such as produce virii that would cause
|
|
video display terminals and hard drives to smoke, I had to sit back, sip
|
|
my brewski and say "wow." We sat back, enjoyed a few more rounds, told
|
|
a few more lies and had a good time.
|
|
|
|
Well, this old boy didn't show until about noon on Saturday. Of course
|
|
the conference hadn't started yet so we didn't miss anything. The
|
|
program was kicked off with a number of questions about who, what, where
|
|
and how. It was difficult to determine how many people were there since
|
|
the room was packed like a can of sardines. Our estimate was over two
|
|
hundred, not counting the hackers still in their rooms. Was this
|
|
another drunken free for all, as in the past? A report was given on
|
|
cellular hacking and toll fraud. Hackers' rights were presented by an
|
|
attorney. Also discussed was the stupidity of the press and law
|
|
enforcement.
|
|
|
|
Some others talked about suppressed information from the federal
|
|
government concerning UFO's and how hackers are gaining this info. And
|
|
of course the White House wants to know their sources.
|
|
|
|
Hand outs were given including virii and virus source code. I did
|
|
decline any virii, but who knew what I would get before this was over.
|
|
I believe this was the most responsive and gratifying group I have
|
|
spoken to this year. I also expect to get more business because of this
|
|
presentation than any other this year.
|
|
|
|
A lengthy door prize was held in which I was the winner of more virii.
|
|
Again, I did decline, but passed the winning ticket on. Captain Crunch
|
|
was the final speaker. In conclusion, the attendees were the good, the
|
|
bad and the ugly. We did find HoHoCon very informative and, yes, we
|
|
will attend again. In closing, I hope each and everyone had a very
|
|
"Merry HoHoCon."
|
|
|
|
|
|
--------------------------
|
|
|
|
A (Hacker's) Mind is a Terrible Mind to Waste
|
|
Unix World, page 136, March 1993
|
|
|
|
by Gary Andrew Poole
|
|
|
|
[Unix World wanted MONEY to reprint this in full...Yeah, right.
|
|
Someone already posted it on alt.cyberpunk some time ago
|
|
if you can't find it anywhere.]
|
|
|
|
*-----------------------------------*
|
|
|
|
Various Stuff Picked up at HoHoCon
|
|
|
|
*-----------------------------------*
|
|
|
|
--------------------------
|
|
Flyer:
|
|
--------------------------
|
|
|
|
Unphamiliar Territory
|
|
Phalcon/Skism Western World Headquarters
|
|
The Ghost in The Machine Distribution
|
|
|
|
Featuring:
|
|
|
|
- 'Neutral Territory' forum where security issues can be discussed with
|
|
top security people in the field.
|
|
|
|
- Completely LEGAL forums on computer security, hacking, phraud.
|
|
|
|
- Thousands of textfiles covering all aspects of the underground.
|
|
|
|
- Hundreds of viruses and virus source code for the serious
|
|
programmer.
|
|
|
|
Information:
|
|
|
|
- Administrators are Invalid Media, Mercury/NSA, Warlock Bones and
|
|
Jaeger.
|
|
|
|
- Run on a professor Falken/LOD donated ZOOM v32bis
|
|
|
|
- Mentioned in MONDO 2000 and reviewed in the latest Infoworld.
|
|
|
|
- Dialin 602-894-1757 / 24 hours
|
|
|
|
--------------------------
|
|
Flyer
|
|
--------------------------
|
|
|
|
In your defense..... Courtesy Freeside Orbital Data Network, HoHoCon '92
|
|
- B. O'Blivion
|
|
Repeat after me:
|
|
|
|
"If I am reading this to you, then I believe that you are
|
|
questioning, detaining, or arresting me, or searching my person or
|
|
possessions in the course of your official duties."
|
|
|
|
"I do not consent to any search of seizure of any part of my person
|
|
or property, nor to any property of others under my control. I do not
|
|
consent to any person's examination, search, or removal of any
|
|
information storage equipment or media in my possession. You are hereby
|
|
notified that such information storage equipment or media contain
|
|
private written and electronic mail, confidential communications, and
|
|
other material protected under the Electronic Communications Privacy Act
|
|
and other statutes."
|
|
|
|
"I respectfully decline to answer any questions beyond confirmation
|
|
of my identity, and require access to legal counsel immediately. I
|
|
demand that access to legal counsel be provided to me before any
|
|
questioning takes place. I will answer no questions nor give any
|
|
information outside the presence of legal counsel. All requests for
|
|
interviews, statements, consents, or information of any sort should be
|
|
addressed to me through my attorney. I invoke the rights five to me by
|
|
the Fifth and Sixth Amendments of the Constitution of the United
|
|
States."
|
|
|
|
"I further notify you that the speech and information contained on
|
|
information storage and handling devices at this site are protected
|
|
by the First and Fourth Amendments to the Constitution of the United
|
|
States, and that any unlawful search or seizure of these items or of
|
|
the information they contain will be treated as a violation of the
|
|
Constitutional rights of myself and other users of these devices and
|
|
media."
|
|
|
|
"I further notify you that any such violations of any person's legal
|
|
or Constitutional rights which are committed at any time, by any person,
|
|
will be the subject of civil legal action for all applicable damages
|
|
sustained. I require that at this time all officers participating in
|
|
this illegal search, seizure, or arrest identify themselves at this time
|
|
by name and badge number to me and my legal counsel."
|
|
|
|
[Include if applicable]
|
|
|
|
"I further notify you that I am a Computer System Operator providing
|
|
private electronic mail, electronic publications, and personal
|
|
information storage services to users in this State, and among the
|
|
United States. Any person causing a breach of the security of, or
|
|
violation of the privacy of, the information and software herein will be
|
|
held liable for all civil damages suffered by any and all users
|
|
thereof."
|
|
|
|
--------------------------
|
|
Flyer
|
|
--------------------------
|
|
|
|
HoHoCon 1992
|
|
Amusing Local Frequencies
|
|
courtesy of -=RDT.
|
|
|
|
Allen Park Inn Security - 464.500 Houston Post - 154.540
|
|
173.275
|
|
|
|
452.975
|
|
Houston Police:
|
|
|
|
North Shepherd Patrol - 460.325
|
|
NE Patrol - 460.125
|
|
SE Patrol - 460.025
|
|
SW Patrol - 460.050
|
|
Central Patrol - 460.100
|
|
Spec. Op. Traffic - 460.350
|
|
Car 2 Car - 460.225
|
|
South Central Patrol - 460.550
|
|
NW Patrol - 460.475
|
|
West Patrol - 460.150
|
|
Accident - 460.375
|
|
Misc - 460.525
|
|
460.575
|
|
460.400
|
|
Records - 460.425
|
|
City Marshalls - 453.900
|
|
Paging - 155.670
|
|
Police Intercity - 453-550
|
|
|
|
A number of people have been asking "who is RDT? what the hell is
|
|
RDT?" For the record, we're hackers who believe information should be
|
|
free. All information. The world is full of phunky electronic gadgets
|
|
and networks, and we want to share our information with the hacker
|
|
community. We currently write for 2600 magazine, Phrack, Mondo 2000,
|
|
Cybertek, and Informatik.
|
|
The five "charter members" of RDT are Count Zero, Brian Oblivion,
|
|
Magic Man, White Knight, and Omega. Each of us has complementary
|
|
skills, and as a group we have a very wide area of technical
|
|
knowledge. Feel free to contact us.
|
|
|
|
Count Zero - count0@ganglia.mgh.harvard.edu
|
|
Brian Oblivion - oblivion@ganglia.mgh.harvard.edu
|
|
Magic Man - magic@ganglia.mgh.harvard.edu
|
|
White Knight - wknight@ganglia.mgh.harvard.edu
|
|
Omega - omega@spica.bu.edu
|
|
|
|
"They are satisfying their appetite to know something that is not theirs
|
|
to know." - Asst. District Attorney Don Ingraham
|
|
|
|
"All-you-can eat buffet...for FREE!" - Restricted Data Transmissions
|
|
|
|
RDT "Truth is Cheap, but Information Costs."
|
|
|
|
--------------------------
|
|
Magazine
|
|
--------------------------
|
|
|
|
Future Sex
|
|
|
|
(a very odd pseudo-cyberpunk skin mag)
|
|
|
|
4 issues for $18, Canada $26, International US $48
|
|
|
|
1095 Market Street
|
|
Suite 809
|
|
San Francisco, CA 94103
|
|
415-621-5496
|
|
415-621-4946 fax
|
|
|
|
--------------------------
|
|
Video
|
|
--------------------------
|
|
|
|
Red $19.95
|
|
(Phone Pranks can kill)
|
|
|
|
Nekromantik II $29.95
|
|
(No comment)
|
|
|
|
Available through
|
|
|
|
Film Threat Video
|
|
P.O. Box 3170
|
|
Los Angeles, CA
|
|
90078-3170 USA
|
|
|
|
818-848-8971
|
|
|
|
Shipping: 1 tape $3.40
|
|
2-3 $4.60
|
|
4-6 $5.80
|
|
6+ $7.00
|
|
|
|
Visa/MC accepted.
|
|
|
|
--------------------------
|
|
Official HoHoCon Crud
|
|
--------------------------
|
|
|
|
|
|
HoHoCon '92
|
|
|
|
Product Ordering Information
|
|
|
|
|
|
If you are interested in obtaining either HoHoCon shirts or videos,
|
|
please contact us at any of the following:
|
|
|
|
drunkfux@cypher.com
|
|
hohocon@cypher.com
|
|
cDc@cypher.com
|
|
dfx@nuchat.sccsi.com
|
|
drunkfux@ganglia.mgh.harvard.edu
|
|
359@7354 (WWIV Net)
|
|
|
|
Freeside Orbital Data Network
|
|
ATTN: dFx/HoHoCon
|
|
11504 Hughes Road Suite #124
|
|
Houston, Texas
|
|
77089
|
|
|
|
713-866-4884 (Voice Mail)
|
|
|
|
|
|
The shirts are $15 plus $2 shipping ($2.50 for two shirts). At this
|
|
time, they only come in extra large. We may add additional sizes if
|
|
there is a demand for them. The front of the shirt has the following
|
|
in a white strip across the chest:
|
|
|
|
|
|
I LOVE FEDS
|
|
|
|
(Where LOVE = a red heart, very similar to the I LOVE NY logo)
|
|
|
|
|
|
And this on the back:
|
|
|
|
dFx & cDc Present
|
|
|
|
HOHOCON '92
|
|
|
|
December 18-20
|
|
Allen Park Inn
|
|
Houston, Texas
|
|
|
|
|
|
There is another version of the shirt available with the following:
|
|
|
|
I LOVE WAREZ
|
|
|
|
The video includes footage from all three days, is six hours long and
|
|
costs $18 plus $2 shipping ($2.50 if purchasing another item also).
|
|
Please note that if you are purchasing multiple items, you only need
|
|
to pay one shipping charge of $2.50, not a charge for each item. If
|
|
you wish to send an order in now, make all checks or money orders
|
|
payable to O.I.S., include your phone number and mail it to the street
|
|
address listed above. Allow ten working days for arrival.
|
|
|
|
Thanks to everyone who attended and supported HoHoCon '92. Mail us if
|
|
you wish to be an early addition to the HoHoCon '93 (December 17-19)
|
|
mailing list.
|
|
|
|
--------------------------
|
|
Text File
|
|
--------------------------
|
|
|
|
Rumors have begun to surface about a group of hackers who were involved in a
|
|
project to uncover information regarding the existence of UFOs. The
|
|
most public example pertaining to this alleged project was seen on
|
|
Dateline NBC on the screen of the mystery hacker "Quentin."
|
|
|
|
The story goes that this group of individuals decided to put their
|
|
skills to work on a project that, if successful, would add legitimacy to
|
|
the hacking process by uncovering information on what has been called the
|
|
greatest cover-up in the history of the world. Milnet TAC ID cards
|
|
were obtained through military officials sympathetic to the cause. Several
|
|
sites and networks were targeted that had in the past been linked to UFO
|
|
activity. These were sites like the Jet Propulsion Laboratory, Sandia Labs,
|
|
TRW Space Research, American Institute of Physics, and various other
|
|
educational, government and military sites.
|
|
|
|
The rumors also emphasize that several sites had what these individuals
|
|
called "particularly heavy security." Within several seconds after
|
|
connection had been established, system administrators of sites used in
|
|
this project were contacted. Further rumors state that there was
|
|
information regarding a propulsion system designed utilizing what is
|
|
termed "corona discharge" being analyzed at one site. The most sinister
|
|
of all rumors states that one particular participant who was allegedly
|
|
deeply immersed in TRWs internal network has not been heard from since
|
|
uncovering data regarding a saucer being housed at one of their Southern
|
|
California installations.
|
|
|
|
Believe what you will about the reality of this project. Much will be
|
|
dismissed as hacker lore, but within the core of every rumor lies a
|
|
grain of truth.
|
|
|
|
Are we being lied to? Why is this information still classified by the NSA?
|
|
What are they hiding from us behind a maze of security? Will we continue
|
|
to stand idly by and let an uncaring and deliberately evasive government
|
|
shield us from what may be the most important, and potential dangerous
|
|
news to ever surface? Information wants to be free, and only a
|
|
concerted group effort can make this happen. How much do you really
|
|
want to know about what is really going on?
|
|
|
|
What follows is information that has been released regarding this project...
|
|
|
|
---------------------------------------------------------------------------
|
|
|
|
PROJECT ALF-1
|
|
|
|
A Planetary Effort
|
|
|
|
TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET
|
|
TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET
|
|
|
|
These are the raw data. Where comments are appropriate, they
|
|
will be included. The data will be grouped together with dates,
|
|
names etc. to make correlations easier.
|
|
|
|
There are countless references to the aliens, their down space
|
|
craft and what the Government is doing with them.
|
|
If, as is supposed, the research on the craft and the 'ufonauts'
|
|
continues today, then undoubtedly there are computer records, somewhere.
|
|
|
|
I. Searching the Skies; Tripping the Electronic Fence around the
|
|
USA.
|
|
|
|
US Space Command Space Surveillance Center, Cheyenne Mountain,
|
|
Colorado Springs, Box Nine (Electronic Surveillance Room)
|
|
(This is where they search for and track UFO activity.)
|
|
U.S. Naval Space Surveillance System, Dahlgreen, Virginia, (Main
|
|
computer), Lake Kickapoo, Texas (listening post): Search for
|
|
'Flash Traffic'
|
|
Commander Sheila Mondran
|
|
CINC-NORAD
|
|
Space Detection and Tracking System
|
|
Malabar, Forida
|
|
'Teal Amber' search
|
|
National Military Command Center - Pentagon
|
|
(These are the areas where UFO activity is tracked.
|
|
There is a radar shield around the country that is 'tripped' by UFO's.
|
|
All tracking and F14 scrambling is done through this system.)
|
|
|
|
II. The Second Cover Up
|
|
|
|
Defense Intelligence Agency
|
|
Directorate for Management and Operations
|
|
Project Aquarius (in conjunction with SRI)
|
|
|
|
Colonel Harold E. Phillips, Army (where/what Feb. 1987)
|
|
UFO Working Group, (formed Dec 1987)
|
|
Major General James Pfautz, USAF, Ret. (March 87)
|
|
US Army experiments -(Monroe Institute, Faber, VA)
|
|
Major General Albert Stubblebine
|
|
Capt. Guy Kirkwood,
|
|
(thousands of feet of film of UFO's catalogued and on record somewhere.)
|
|
The UFO Working Group was formed because one arm of the Govt doesn't
|
|
know what the other is doing.)
|
|
|
|
III. National Security
|
|
|
|
NSA NAtional Security Agency, Dundee Society (Super secret elite
|
|
who have worked on UFO's.)
|
|
NSA - Research and Engineering Division
|
|
NSA - Intercept Equipment Division
|
|
|
|
Kirtland Force Base, Office of Special Investigations, Project
|
|
Beta. 1979-83-? (Sandia Labs are here.)
|
|
Paul Bennewitz
|
|
Project Blue
|
|
Project Blue Book
|
|
|
|
(NSA computers do analysis for Pentagon.)
|
|
|
|
IV. More Secret Players
|
|
|
|
NASA, Fort Irwin, Barstow, CA
|
|
NASA Ames Research Center, Moffet Field Naval Base
|
|
SETI
|
|
State Dept. Office of Advanced Technology
|
|
Any Astronauts from Mercury, Gemini and Apollo
|
|
CIA - Office of Scientific Investigation
|
|
CIA - Domestic Collection Division
|
|
|
|
(NASA has known about UFO's since the astronauts saw and photoed them.
|
|
Records somewhere.)
|
|
|
|
V. Dealing with the Secret
|
|
|
|
MJ-12 (1952)
|
|
Majectic 12
|
|
Operation Majestic 12
|
|
MAJIC-12
|
|
Admiral Roscoe H. Hillenkoetter
|
|
Dr. Vannevar Bush
|
|
Dr. Detlev Bronk
|
|
Dr. Jerome Hunsaker
|
|
Dr. Donald Menzel
|
|
Dr. Lloyd Berkner
|
|
General Robt. Montague
|
|
Sidney Souers
|
|
Gordon Gray
|
|
General Hoyt Vandenberg
|
|
Sect State James Forrestal
|
|
General Nathan Twining
|
|
Pres. Truman
|
|
Pres. Eisenhower
|
|
|
|
(One of the biggest secrets ever.)
|
|
|
|
Nevada Desert, Area 51, S4 (houses UFO's)
|
|
(Robert Lazar talked!) 9 space ships on storage. Propulsion by
|
|
corona discharge.
|
|
|
|
(Area 51 is the most protected base on the planet.)
|
|
|
|
VI. ROSWELL, NM Crashes
|
|
Mac Brazel (farmer)
|
|
Major Jesse A. Marcel
|
|
509th. Bomber Group
|
|
Lewis Rickett, CIC Officer
|
|
Colonel William Blanchard
|
|
Gerald Anderson, witness to crash and aliens
|
|
|
|
Wright Patterson Air Force Base, (parts lists of UFO's catalogued;
|
|
autopsies on record) (Bodies in underground facility)
|
|
Foreign Technology Building
|
|
USAAF (United States Army Air Force reports: "Early Automation"
|
|
Muroc, CA (Base with UFO's for study)
|
|
|
|
(1 saucer with 4 aliens. They were transported to Wright and then
|
|
saved, catalogued and autopsied.)
|
|
|
|
|
|
VII. THOSE ON GOVT SHIT LIST
|
|
|
|
(People who have gotten close.)
|
|
|
|
Robert Lazar
|
|
Major Donald Keyhoe
|
|
William Moore
|
|
Stanton Friedman
|
|
Jaime Shandera
|
|
Whitley Streiber
|
|
Timothy Goode, UK
|
|
|
|
Other UFO Crashes
|
|
Del Rio, TX 12/50, Colonel Robert Willingham
|
|
Las Vegas, 4/18/62
|
|
Kecksburg, PA 12/9/65
|
|
|
|
|
|
VIII. International
|
|
|
|
Belgian Air Force. (They are going public and have records.
|
|
Press conference held 7/12/91.)
|
|
Australian Air Force
|
|
UK; GCHQ
|
|
British Air Force
|
|
Belgium:
|
|
NATO Radar Stations
|
|
|
|
|
|
IX. UFO Civilian Groups. (What do they really know?)
|
|
|
|
NICAP, National Investigations Committee on Aerial Phenomena
|
|
(private company.)
|
|
|
|
APRO, Tucson, AZ (Aerial Phenomona Research Organization,
|
|
private company.)
|
|
|
|
MUFON Mutual UFO Network
|
|
|
|
X. GENERAL
|
|
|
|
Kenneth Arnold, June 24, 1947
|
|
Cattle and Sheep Mutilations
|
|
General and Pres. Eisenhower, (private files and library)
|
|
President Truman
|
|
Wright Field or Wright Patterson Air Force Base, Dayton, OH, (Air
|
|
Force Foriegn Technology Division)
|
|
USAF Project Saint
|
|
USAF Project Gemini
|
|
Project Moon Dust
|
|
Project Sign
|
|
Project Grudge
|
|
General Hoyt Vandenberg (1940-1960)
|
|
Air Force Regulation 200-2 (8/12/54)
|
|
Holloman AFB, NM
|
|
Roswell, NM July 7, 1947
|
|
|
|
|
|
XI. Possible Searches
|
|
|
|
Presidential Libraries
|
|
Old USAAF, (United States Army Air Force)
|
|
NASA
|
|
Astronaut Frank Borman, Gemini 7, pictures of UFO
|
|
Neil Armstrong, Apollo 11, saw UFO's on moon.
|
|
Colonel Gordon Cooper saw a bunch of them
|
|
James McDivitt, 6/66
|
|
United Nations
|
|
NATO;
|
|
General Lionel Max Chassin, French Air Force
|
|
Star Wars, United Kingdom, 23 scientists killed in 6 years.
|
|
Gulf Breeze, FL
|
|
Additional UFO records at NSA, CIA, DIA, FBI
|
|
|
|
|
|
Good Searching.
|
|
|
|
----------------------------------------------------------------------
|
|
Project
|
|
->Green Cheese<-
|
|
Data Base
|
|
---------------------------------------------------------------------
|
|
Holloman AFB
|
|
Location: New Mexico. Preconceived landing 15 years ago.
|
|
|
|
DDN Locations:
|
|
--------------
|
|
|
|
NET : 132.5.0.0 : HOLLOMAN :
|
|
|
|
GATEWAY : 26.9.0.74, 132.5.0.1 : HOLLOMAN-GW.AF.MIL : CISCO-MGS :: EGP,IP/GW :
|
|
GATEWAY : 26.9.0.74, 132.5.0.1 : HOLLOMAN-GW.AF.MIL : CISCO-MGS :: EGP,IP/GW :
|
|
|
|
HOST : 26.10.0.74 : HOLLOMAN-TG.AF.MIL : VAX-8650 : VMS : TCP/FTP,TCP/TELNET,TCP
|
|
SMTP :
|
|
|
|
HOST : 26.6.0.74 : HOLLOMAN-AM1.AF.MIL : WANG-VS100 : VSOS : TCP/TELNET,TCP/FTP,
|
|
TCP/SMTP :
|
|
|
|
Host: DDNVAX2.6585TG.AF.MIL
|
|
156.6.1.2
|
|
|
|
-----------------------------------------------------------------------
|
|
|
|
Kirtland Air Force Base
|
|
Office Of Special Investigations. Sandia Labs are here. Also part of
|
|
NSA Intercept Equipment Division.
|
|
|
|
Key Words/names:
|
|
----------------
|
|
Sandia Labs
|
|
Project Beta (1979-83-?)
|
|
Paul Bennewitz
|
|
Project Blue
|
|
Project Blue Book
|
|
|
|
DDN Locations:
|
|
--------------
|
|
|
|
NET : 131.23.0.0 : KIRTLAND-NET :
|
|
NET : 132.62.0.0 : KIRTLAND2 :
|
|
GATEWAY : 26.17.0.48, 131.23.0.1 : KIRTLAND2-GW.AF.MIL,KIRTLAND-GW.AF.MIL
|
|
: CISCO-MGS : UNIX : IP/GW,EGP :
|
|
GATEWAY : 26.18.0.87, 132.62.0.1
|
|
: KIRTLAND1-GW.AF.MIL,KIRTLAND1606ABW-GW.AF.MIL : CISCO-MGS :
|
|
: EGP,IP/GW :
|
|
HOST : 26.0.0.48 : KIRTLAND.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
|
|
HOST : 26.0.0.87 : KIRTLAND2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
|
|
HOST : 26.6.0.87 : KIRTLAND-AM1.AF.MIL : WANG-VS300 : VS ::
|
|
|
|
-----------------------------------------------------------------------
|
|
|
|
NASA
|
|
What can I say about NASA that you couldnt guess for yourself....
|
|
(Except that the following sights are SPECIFIC NASA sights, not
|
|
just randomly suspected sights).
|
|
|
|
DDN locations:
|
|
--------------
|
|
|
|
Fort Irwin, Barstow, CA:
|
|
-----------------------
|
|
NET : 134.66.0.0 : IRWIN :
|
|
NET : 144.146.0.0 : FTIRWIN1 :
|
|
NET : 144.147.0.0 : FTIRWIN2 :
|
|
GATEWAY : 26.24.0.85, 26.7.0.230, 144.146.0.1, 144.147.0.0
|
|
: FTIRWIN-GW1.ARMY.MIL : CISCO-GATEWAY : CISCO : IP/GW,EGP :
|
|
HOST : 26.14.0.39 : IRWIN-ASBN.ARMY.MIL : NCR-COMTEN-3650 : COS2 ::
|
|
HOST : 26.13.0.85 : FTIRWIN-AMEDD.ARMY.MIL : ATT-3B2-600G : UNIX
|
|
: TCP/FTP,TCP/SMTP,TCP/TELNET :
|
|
HOST : 26.14.0.85 : FTIRWIN-IGNET.ARMY.MIL : DATAPOINT-8605 : RMS ::
|
|
HOST : 26.15.0.85 : IRWIN-EMH1.ARMY.MIL,FTIRWIN-EMH1.ARMY.MIL : SPERRY-5000
|
|
: UNIX : TCP/FTP,TCP/SMTP,TCP/TELNET :
|
|
|
|
Moffet Field Naval Base (Ames Research Center):
|
|
-----------------------------------------------
|
|
GATEWAY : 26.20.0.16, 192.52.195.1 : MOFFETT-FLD-MB.DDN.MIL,AMES-MB.DDN.MIL
|
|
: C/70 : CHRYSALIS : IP/GW,EGP :
|
|
HOST : 26.0.0.16 : MOFFETT.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
|
|
|
|
-----------------------------------------------------------------------
|
|
Pentagon (National Military Command Center)
|
|
One of many places in charge of tracking UFO activity.
|
|
|
|
Possible DDN sights:
|
|
-------------------
|
|
|
|
GATEWAY : 26.9.0.26, 134.205.123.140 : PENTAGON-GW.HQ.AF.MIL : CISCO-AGS :
|
|
: EGP,IP/GW :
|
|
GATEWAY : 26.25.0.26, 131.8.0.1 : PENTAGON-GW.AF.MIL,HQUSAFNET-GW.AF.MIL
|
|
: CISCO-MGS :: IP/GW,EGP :
|
|
GATEWAY : 26.10.0.76, 192.31.75.235 : PENTAGON-BCN-GW.ARMY.MIL : SUN-360
|
|
: UNIX : IP/GW,EGP :
|
|
GATEWAY : 26.26.0.247, 192.31.75.1 : PENTAGON-GW.ARMY.MIL : SUN-3/160
|
|
: UNIX : EGP,IP/GW :
|
|
GATEWAY : 26.31.0.247, 26.16.0.26, 141.116.0.1 : PENTAGON-GW1.ARMY.MIL
|
|
: CISCO : CISCO : IP/GW,EGP :
|
|
HOST : 26.0.0.26 : PENTAGON.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
|
|
HOST : 26.24.0.26 : OPSNET-PENTAGON.AF.MIL : VAX-8500 : VMS
|
|
: TCP/TELNET,TCP/FTP,TCP/SMTP :
|
|
HOST : 26.10.0.76, 192.31.75.235 : PENTAGON-BCN.ARMY.MIL : SUN-360 : UNIX
|
|
: TCP/FTP,TCP/SMTP,TCP/TELNET :
|
|
HOST : 26.0.0.247 : PENTAGON2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
|
|
HOST : 26.7.0.247 : PENTAGON-AMSNET.ARMY.MIL : AMDAHL : MVS
|
|
: TCP/TELNET,TCP/FTP :
|
|
HOST : 26.14.0.247 : NSSC-PENTAGON.NAVY.MIL : ALTOS-3068A : UNIX
|
|
: TCP/FTP,TCP/TELNET,TCP/SMTP :
|
|
HOST : 26.18.0.247 : PENTAGON-EMH4.ARMY.MIL : SPERRY-5000/80 : UNIX
|
|
: TCP/TELNET,TCP/FTP,TCP/SMTP :
|
|
HOST : 26.26.0.247, 192.31.75.1 : PENTAGON-AI.ARMY.MIL : SUN-3/160 : UNIX
|
|
: TCP/TELNET,TCP/FTP,TCP/SMTP,TCP/FINGER :
|
|
|
|
-----------------------------------------------------------------------
|
|
|
|
Raddaman
|
|
Location of infamous building 18a. Suspected saucers and others?
|
|
|
|
DDN location, yet unknown.
|
|
|
|
------------------------------------------------------------------------
|
|
|
|
SECI
|
|
?
|
|
|
|
DDN Locations:
|
|
--------------
|
|
|
|
NET : 192.108.216.0 : ARC-SETI-NET :
|
|
|
|
------------------------------------------------------------------------
|
|
|
|
Utah Locations:
|
|
|
|
GATEWAY : 26.18.0.20, 131.27.0.1 : HILL-GW.AF.MIL,HILLAFBNET-GW.AF.MIL
|
|
: CISCO-MGS :: IP/GW,EGP :
|
|
|
|
GATEWAY : 26.18.0.20, 131.27.0.1 : HILL-GW.AF.MIL,HILLAFBNET-GW.AF.MIL
|
|
: CISCO-MGS :: IP/GW,EGP :
|
|
|
|
HOST : 26.5.0.20 : HILL.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
|
|
HOST : 26.0.0.99 : HILL2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
|
|
HOST : 26.12.0.99 : HILL-AM1.AF.MIL : WANG-VS100 : VS
|
|
: TCP/TELNET,TCP/FTP,TCP/SMTP :
|
|
|
|
-------------------------------------------------------------------------
|
|
|
|
Wright Patterson AFB
|
|
Catalogued UFO parts list. Autopsies on record. Bodies located in
|
|
underground facility of Foreign Technology Building.
|
|
|
|
DDN Locations:
|
|
--------------
|
|
|
|
HOST : 26.0.0.47 : WRIGHTPAT.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
|
|
HOST : 26.8.0.123 : WRIGHTPAT2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
|
|
HOST : 26.0.0.124 : WRIGHTPAT3.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
|
|
HOST : 26.3.0.170 : WAINWRIGHT-IGNET.ARMY.MIL : CONVERGENT-TECH-CN-100
|
|
: CTOS ::
|
|
HOST : 26.0.0.176 : WRIGHTPAT4.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
|
|
|
|
-------------------------------------------------------------------------
|
|
|
|
Nevada:
|
|
|
|
NET : 131.216.0.0 : NEVADA :
|
|
|
|
-------------------------------------------------------------------------
|
|
|
|
Random Suspected Nets:
|
|
|
|
WIN:
|
|
Top Secret Network. All coordinator's have last name Win.
|
|
|
|
NET : 141.8.0.0 : DFN-WIN8 : NET : 141.9.0.0 : DFN-WIN9 :
|
|
NET : 141.10.0.0 : DFN-WIN10 : NET : 141.15.0.0 : DFN-WIN15 :
|
|
NET : 141.25.0.0 : DFN-WIN25 : NET : 141.26.0.0 : DFN-WIN26 :
|
|
NET : 141.28.0.0 : DFN-WIN28 : NET : 141.57.0.0 : DFN-WIN57 :
|
|
NET : 141.58.0.0 : DFN-WIN58 : NET : 141.59.0.0 : DFN-WIN59 :
|
|
NET : 141.60.0.0 : DFN-WIN60 : NET : 141.61.0.0 : DFN-WIN61 :
|
|
NET : 141.62.0.0 : DFN-WIN62 : NET : 141.63.0.0 : DFN-WIN63 :
|
|
NET : 141.64.0.0 : DFN-WIN64 : NET : 141.65.0.0 : DFN-WIN65 :
|
|
NET : 141.66.0.0 : DFN-WIN66 : NET : 141.67.0.0 : DFN-WIN67 :
|
|
NET : 141.68.0.0 : DFN-WIN68 : NET : 141.69.0.0 : DFN-WIN69 :
|
|
NET : 141.70.0.0 : DFN-WIN70 : NET : 141.71.0.0 : DFN-WIN71 :
|
|
NET : 141.72.0.0 : DFN-WIN72 : NET : 141.73.0.0 : DFN-WIN73 :
|
|
NET : 141.74.0.0 : DFN-WIN74 : NET : 141.75.0.0 : DFN-WIN75 :
|
|
NET : 141.76.0.0 : DFN-WIN76 : NET : 141.77.0.0 : DFN-WIN77 :
|
|
NET : 141.78.0.0 : DFN-WIN78 : NET : 141.79.0.0 : DFN-WIN79 :
|
|
NET : 141.80.0.0 : DFN-WIN80 : NET : 141.81.0.0 : DFN-WIN81 :
|
|
NET : 141.82.0.0 : DFN-WIN82 : NET : 141.83.0.0 : DFN-WIN83 :
|
|
NET : 141.84.0.0 : DFN-WIN84 : NET : 141.85.0.0 : DFN-WIN85 :
|
|
NET : 141.86.0.0 : DFN-WIN86 : NET : 141.87.0.0 : DFN-WIN87 :
|
|
NET : 141.88.0.0 : DFN-WIN88 : NET : 141.89.0.0 : DFN-WIN89 :
|
|
NET : 141.90.0.0 : DFN-WIN90 : NET : 141.91.0.0 : DFN-WIN91 :
|
|
NET : 141.92.0.0 : DFN-WIN92 : NET : 141.93.0.0 : DFN-WIN93 :
|
|
NET : 141.94.0.0 : DFN-WIN94 : NET : 141.95.0.0 : DFN-WIN95 :
|
|
NET : 141.96.0.0 : DFN-WIN96 : NET : 141.97.0.0 : DFN-WIN97 :
|
|
NET : 141.98.0.0 : DFN-WIN98 : NET : 141.99.0.0 : DFN-WIN99 :
|
|
NET : 188.1.0.0 : WIN-IP : NET : 192.80.90.0 : WINDATA :
|
|
|
|
-----------------------------------
|
|
|
|
Scinet:
|
|
Sensitive Compartmented Information Network
|
|
|
|
NET : 192.12.188.0 : BU-SCINET :
|
|
|
|
-----------------------------------
|
|
|
|
Disnet:
|
|
Defense Integrated Secure Network. Composed of SCINET, WINCS
|
|
([World Wide Military and Command Control System] Intercomputer
|
|
Network Communication Subsystem), and Secretnet(WIN).
|
|
|
|
NET : 22.0.0.0 : DISNET :
|
|
|
|
-----------------------------------
|