| ==Phrack Magazine== |
|
|
| Volume Four, Issue Forty-Two, File 13 of 14 |
|
|
| HoHoCon 1992 |
| Miscellany |
|
|
|
|
|
|
|
|
| The hackers were getting nervous. It was understandable. Just a few weeks |
| before HoHoCon and already two other "get-togethers" had experienced |
| turbulence from the authorities. |
|
|
| Rumors began to fly that HoHo was to be the next target. Messages bearing |
| ill-tidings littered the underground. Everyone got worked into a frenzy about |
| the upcoming busts at HoHoCon. People began to cancel their reservations |
| while others merely refused to commit one way or the other. |
|
|
| But, amidst all the confusion and hype, many declared "Let them try to |
| raid us! I'm going anyway!" These were the few, the proud...the stupid. |
|
|
| ------------------------------------------------------------------------------- |
|
|
| HoHoCon as I saw it - Erik Bloodaxe (Chris Goggans) |
|
|
| I arrived at the Allen Park Inn in the mid afternoon on Friday the 18th. |
| I was promptly greeted by several of my cohorts and a loping transient |
| who introduced himself as "Crunchhhhhhhhh." Yes, John Draper, the infamous |
| Captain Crunch had actually ventured outward to attend our little party. |
| (Yes, Virginia, the rumors are true: The Captain is toothless, unkempt, |
| overbearing and annoying as all hell.) |
|
|
| I followed Scott Chasin back to our room, the pack of other early arrivals |
| in close file behind. After storing my gear I noticed that Draper was |
| looming in the doorway ranting furiously about all the smoking in our room. |
| "I've never heard of a hacker who smoked," exclaimed the Captain. |
| Taking this as my cue, I bummed a Djarum off of Crimson Death and took great |
| glee in adding my fumes to the enveloping fog. |
|
|
| Draper spent the next 30 minutes attempting to eavesdrop on various |
| conversations in which various old friends were catching up. Not knowing |
| any of us personally, he nonetheless felt obligated to offer his comments |
| about our discussions about life and college and music amidst his coughing |
| and complaining about the smoke. |
|
|
| After some time everyone was banished from the room and several of us |
| went out to eat. Scott Chasin, myself, two hackers (The Conflict, & Louis |
| Cypher) along with Gary Poole (covering the entire mess for Unix World) took |
| off for the nearest grease pit. Taco Bell won in proximity, and once |
| surrounded by burritos Scott, Conflict and I began our rant about Unix |
| Security (the lack thereof). Gary whipped out his Unix World pen and pad |
| and began taking notes. I am uncertain whether or not it was the content |
| of our spiel or the asides I repeatedly made regarding the bevy of giggling |
| coeds that garnered the most notes in Gary's booklet. |
|
|
| Back at the Con things were spicing up. More people had begun to arrive |
| and the Allen Park Inn staff began to worry about their safety and that of |
| their other guests. One remarked to Jesse (Drunkfux), the sponsor of HoHoCon, "That Draper |
| fellow needs to stay out of the lobby. He was eating large |
| amounts of flesh off his hands and it was scaring some of the visitors." |
| The staff did not know what to think at all when a father arrived with his |
| three sons and after purchasing a room on his credit card told the boys, "Ok |
| guys, Mom will be picking you up on Sunday." |
|
|
| This did not concern most of us. It was straight to the bar |
| for us, where Rambone bought Scott & myself a round of Kamikazes. Also at |
| the bar was Bootleg who had just gotten out. (Of what, and for what you |
| can find out on your own.) Bootleg is probably the smartest biker I have |
| ever had the pleasure to meet. We talked about sex, drugs, hawgs, computers, |
| cellular fraud and how close the nearest cabaret was. |
|
|
| A small controversy began to arise amidst the hackers at the bar. Stationed |
| near one end of the room was a table lined with older men. "FEDS," someone |
| murmured, gesturing at the group. |
|
|
| "Good for them," I said, and left the bar to look for Jesse. When I returned |
| several minutes later the hackers had engaged the strangers in conversation |
| and found that they weren't feds after all. Among this group were |
| Jim Carter of Houston-based Bank Security, and Bernie Milligan of |
| Communications & Toll Fraud Specialists, Inc. Once this news was out |
| tensions eased and everyone continued with their libations. |
|
|
| Suddenly I became aware that there was girl in the room. I had seen her out |
| in the courtyard previously but now she was alone. Turning on my |
| "Leisure Suit Larry" charm I grabbed the seat next to her. Melissa had arrived |
| from Austin to cover the event for Mondo-2000. She surprised me by telling |
| me that she knew who I was, where I worked, and even knew my extension number. |
| (I almost fell off the barstool.) |
|
|
| Jim & Bernie came over and joined us at the bar. Bootleg, Chaoswiz, Melissa |
| and I engaged them in wild stories about UFO's, hacking, the NSA & the CIA. |
| (Bernie alleged that he was ex-NSA, and Jim ex-CIA. We have not yet |
| determined if they were acting under orders from Col. Jim Beam & Gen. Jack |
| Daniels.) |
|
|
| After the ensuing debates on the true formation of the NSA, the group broke up |
| and Melissa and I took off to MC Allah's room to partake of the keg he had |
| brought. We walked in the room and were greeted with the sight of a four-foot |
| boy with a syringe sticking out of his arm. This was a bit much, even for me. |
| I snatched his "medication" away from him and found that it was really only |
| some type of growth hormone. The boy, 8-Ball, was actually 15 and his parents |
| had him on hormones to stimulate his growth. 8-Ball was totally whacked |
| out his mind nonetheless. I think he had ingested such a diverse amount of |
| God knows what by the time we arrived that he was lucky to remember where |
| he was. Later that evening he would become convinced that he was Scott |
| Chasin and confessed to quite a bit of wrongdoing just before he gave offerings |
| at the porcelain alter. |
|
|
| Conversations in the keg room left something to be desired. One large hacker |
| named Tony looked at Melissa and in his best British accent asked if he |
| could fondle her breasts. And the debate between MC Allah and Hunter about |
| who could drink the most alcohol reached a climax when both stuck their heads |
| under the keg spigot for extended periods of time. |
|
|
| Sometime just before 11:00 the hotel guard, attired in Raiders jacket and |
| a really, really big snow hat (the kind with the poofy ball on top) showed |
| up brandishing his paper baton, (A rolled up Houston Press). "You all |
| needs to get to yaw roomz, nah. I ain'tz ta gonna tell yaw no mo'." |
| Everyone looked the guard over and moved back into the keg room. Thus was |
| born, "Homie da Guard." After he wandered away, everyone moved back out |
| onto the porch. |
|
|
| It was getting late and I was supposed to speak the next morning so I tried to |
| get into our room. Scott Chasin, hacker extrordinaire, had locked me out. |
| After beating on the door for 10 minutes, the windows for 5, the walls for 10, |
| and letting the phone ring for another 15 minutes I decided that Scott was a |
| bit too tipsy to unlock the door so I crashed out on Jesse's floor. |
|
|
| That night, the water pipes broke. There was some speculation that those |
| evil hackers had "hacked the system." Not. |
|
|
| While complaining about the lack of water that night, someone overheard |
| three young attendees at a bank of pay phones attempting to order up |
| a few escorts on "credit." Rumor has it they were successful. |
|
|
| The next morning was chaos. By the time we arrived at the conference room |
| there were about 150 people inside. Louis Cypher sat at the door collecting |
| money for the raffle and getting everyone to sign the guest book. Jesse |
| and others were setting up various video equipment and getting things |
| in order. In the back of the room, Bernie sat scanning the crowd with a |
| super-ear, recording the conversations of those sitting. |
|
|
| Crunch was up in arms again. "If everyone in here doesn't stop smoking |
| I won't be able to do my speech. If you all want to hear me talk, you |
| will have to stop smoking." Several more cigarettes lit up. After |
| speaking with management, Crunch came back in and asked if everyone smoking |
| would at least move to one side of the auditorium nearest the door. |
| With hesitation, the crowd conceded. |
|
|
| The conference got underway with consultant Ray Kaplan taking a census of |
| those in attendance. The group ranged from under 15 to over 50, had |
| professionals and hobbyists, and had enthusiasts for every conceivable |
| type operating system. Ray went on to elaborate on one of his audio |
| conferences in which an FBI officer alluded that one of their key |
| sources of information was "I.R.C." |
|
|
| Bootleg got up and spoke on the vast potentials involved with cellular |
| fraud. He discussed how to monitor the reverse channel to obtain ESNs, |
| and where to obtain the equipment to allow you to do such a thing. He |
| later handed out diskettes (IBM format) containing information on how |
| to reprogram cellular phones and where to obtain the equipment necessary |
| to pick subscriber numbers out of the air. |
|
|
| Up next, myself and Chasin. Our topic was a bit obscure and cut deliberately |
| short due to concerns about the nature of our speech. During the Dateline |
| NBC piece that featured Chasin a piece of information flashed on the screen |
| that alluded to UFO information stored on military computers. Chasin |
| and I had gained possession of the research database compiled by the hackers |
| who were looking into this. We discussed their project, the rumors surrounding |
| their findings and the fear surrounding the project. Not knowing the true |
| details of this we declined to comment any further, but made the documentation |
| available to anyone who wanted a copy. We finished our speech by answering |
| questions about Comsec, Consultants, etc. |
|
|
| Steve Ryan, a Houston lawyer with a great deal of interest in the |
| legal aspects of cyberspace spoke next. He covered several of the current |
| issues affecting the community, spoke on laws in effect, cases pending, |
| and gave an insight to his background that led him to focus in on |
| the issues concerning the electronic community. |
|
|
| Next, Jim Carter gave a quick and dirty demonstration of how to monitor |
| electromagnetic radiation and how to do a simple data recovery from this |
| noise. He monitored a small data terminal from a portable television set |
| that was completely unmodified. He then spoke on how to read the |
| EMR from such things as plumbing, the ground, off of window panes, etc. |
| Jim's speech, although highly intriguing, got extremely vague at points, |
| especially regarding technology needed, his own background, etc. |
| (We will attribute this to his "CIA" training.) |
|
|
| The Hotel Officials showed up and demanded that everyone get out immediately. |
| Apparently someone had staggered into the kitchen, drunk, and broken |
| something. Steve Ryan left to smooth things out a bit. After a few minutes |
| he returned and told everyone that they could stay, but to keep it quiet |
| tonight. Thus the secret plans of some to drive the hotel golf cart |
| into the pool were crushed. |
|
|
| The raffle proved to be an exercise in banality. Everything from |
| flashing street lights to SunOS 4.1.3 to T-shirts to books were |
| auctioned off. One lucky devil even got an official Michael Jackson |
| candy bar. |
|
|
| The folks from RDT (Count Zero and White Knight) handed out a large amount |
| of photocopied goodies such as the new "Forbes" article on hackers, |
| a complete set of the old 70's telephony 'zine "TEL" as well as assorted other |
| flyers and pamphlets. |
|
|
| Up next, Louis Cypher spoke about his entanglement with the law |
| regarding his front-page bust for counterfeiting. He told of his |
| experiences with the law, how they got involved in such a dastardly |
| deed, what jail was like on the inside, and advice against anyone |
| else considering such a thing. |
|
|
| Up last, John Draper. Draper had managed by this time to annoy almost |
| everyone at the convention. A large portion of those in attendance |
| left as soon as he got up. They were the unlucky ones. Draper, for all his |
| oddities, is an intriguing speaker. His life has been quite rich with |
| excitement and when he can actually focus on a subject he is captivating. |
| He spoke on his trip to the Soviet Union where he met computer and telephone |
| enthusiasts in Moscow. He spoke on his unfortunate involvement with |
| Bill SF and the BART Card duplication scandal. He spoke, with obvious |
| longing, of the good old days of blue boxing, and stacking tandems to |
| obtain local trunks, and on verification circuitry. |
|
|
| Listening to Draper talk really brought me back to my beginnings. I could |
| hear in my head the "cachink-chink" of a tandem waiting for MF. I remembered |
| stacking tandems to Europe and back to call my other line. I remembered |
| the thrill of finding never before known trunks and exploring their |
| connections. I fell into a deep nostalgic high, and walked up to John |
| to tell him thanks. As I extended my hand to him, he mumbled something |
| unintelligible and wandered off. So much for paying respect. |
|
|
| About ten of us took off to Chuy's for dinner: Me, Chasin, Conflict, |
| Rambone, Dispater, Blue Adept, Minor Threat and reporters Joe Abernathy |
| and Gary Poole were among the diners. Everyone ate heartily and listened |
| to cordless telephone conversations on Rogue Agent's handheld scanner. |
| One conversation was between what appeared to be a "pimp" talking to his |
| "ho" about some money owed him by another in his flock. The conversation |
| drifted to the Dallas man who had terrorized an entire neighborhood some |
| months back with prank phone calls. Conflict and Dispater repeated a |
| few of the choicest of the calls for our amusement. |
|
|
| Back at the hotel, Dr. Hoffman's Problem Child had escaped, and several |
| casualties were reported. |
|
|
| Conflict, Chasin and I barricaded ourselves in our room and went on a lengthy |
| stream of consciousness rant about what we needed out of life. Our absolute |
| essentials were reduced to a small room with a computer hooked into the |
| Internet, a specially designed contour chair, a small hole through which |
| a secretary would give us food, virtual reality sex toys, and a toilet. |
| (Chasin suggested no toilet, but a catheter so we would never have to move.) |
| Gary Poole was quietly stunned in the corner of the room making mental notes. |
|
|
| Much of the con had moved into a suite that had been converted into a |
| mass computing arena. Several attendees from Pittsburgh had turned their |
| room into a lab with four Unix workstations with several terminals throughout |
| the room including the bathroom! These were hooked into the Internet through |
| a slip connection that had been rigged somewhere. It was quite a site. |
| The room was usually completely packed and smelled like a smoky gymnasium. |
|
|
| (It was rumored that after Chasin and I spoke on the UFO conspiracy, several |
| hackers began their attempts at penetrating the Ames Research Lab. No |
| reports back on their success.) |
|
|
| After I finished copying several Traci Lords video tapes (ahem) I relinquished |
| control of the decks to a room downstairs. Dispater played a video |
| manipulation he and Scott Simpson had produced. They had found a TRW training |
| video tape during a trashing run and dubbed in their own dialogue. (You'd |
| have to see it to fully understand.) |
|
|
| After that, I played a few tapes of my own. The first was a short film called |
| "Red," that chronicled the abusive prank phone calls directed at a bartender. |
| The film had the actual phone call tapes played with video stills. (Guess |
| where the Simpsons came up with that nifty idea...) |
|
|
| Following "Red," someone heard on the scanner that the guard was answering |
| a large noise disturbance in the room we were in. (Yes, they had the hotel |
| guard's 2-meter frequencies.) Everyone moved into another room before the |
| guard showed up. He was thoroughly confused. |
|
|
| In the next room I played the ultimate in shock, the sequel to the movie that |
| I had disturbed the entire con with last year, "Nekromantik II." I won't |
| go into any detail, since the title says it all. Once again, I reign as |
| the sickest person at HoHoCon, this honor bestowed upon me by everyone |
| who witnessed the showing. |
|
|
| As things winded down, several people ended up back in our room to waste |
| away the last few hours of the night. Several people returned from an |
| adventure to "an abandoned hospital." No one really understood what they went |
| to, but it sounded disturbing. Later, that same group would leave to |
| go climb "an abandoned grain storage tower." Go figure. |
|
|
| Approximately 2:00 am, a local hacker named Zach showed up. Scott had a few |
| words for Zach, as did most everyone at the Con. Zach lived in a fantasy |
| land where he was a top notch security consultant with high paying clients |
| in the telecommunications industry. He also like to name drop names like |
| Chasin and Goggans as his partners and as people who would swoop down |
| and terrorize the people he had any problems with. He also liked to turn |
| in, or threaten to turn in any of his rivals in the software pirating |
| community. He also like to proposition young boys both in person and |
| over the phone. At 17, Zach had a few problems. |
|
|
| Trapped in the corner of the room, Zach endured about an hour of questioning |
| and accusations (all of which he truly deserved.) Eventually Zach left, |
| apparently not affected by the ordeal at all. We attributed this to his |
| overly apparent schizophrenia brought on by denial of his sexual |
| tendencies. |
|
|
| Later that night the Pittsburgh gang blew out the power in their entire |
| wing. One was overheard, "Hmmm...guess we should have known that when the |
| power strips kept melting that we were drawing too much power." |
|
|
| The next morning everyone gathered up their gear and said so long. All but |
| a few who gathered in a room marked "the suite of the elite." Armed with |
| a nitrous oxide blaster, everyone sat around and viewed the con through |
| the roaming video eye of Jesse, who had managed to capture everyone |
| in some kind of compromising position. He will be selling them off |
| after he edits it a bit. It was dubbed "The Blackmail Tape." |
|
|
| In my opinion this year was much less anarchistic than last year. The |
| convention might not even be banished from this hotel. (Yeah, right.) |
| There were no raids, there were no overtly violent or satanic acts, |
| no fire alarms, no trashing runs (that I saw), no fights, |
| and there were no strippers (alas). The conference portion of the |
| event was much better organized, there was much more interesting |
| information to be shared, and was well worth the distances traveled by |
| all. |
|
|
| This was HoHoCon '92. |
|
|
| -------------------------- |
|
|
| H*O*H*O*C*O*N '92 |
|
|
| Frosty's Itinerary |
|
|
| Thursday 8pm Take off and go bar hopping all night long to build up |
| stamina for the convention. |
|
|
| Thrusday 10pm Quit bar hopping and waste shitloads of money at the |
| casinos in feeble attempts to get gas money for the trip. |
|
|
| Friday 5am Leave the casino and decide to get some sleep after spending |
| hours to win a meager $10 over starting cash. |
|
|
| Friday 8am Wake up and decide to pack for the trip. Forget necessities |
| that we couldn't live without. Remember to bring junk food. |
|
|
| Friday 9am Stuff assembled GCMS members into subcompact Japanese micro |
| car and leech as much gas money out of them as possible. |
|
|
| Friday 2pm Stop at the friendly convenient store to rob it of precious |
| sugar-coated necessities and obtain mucho lotto tickets. |
|
|
| Friday 4pm Endure Windrunner's gruelling multi-hour long verbatim |
| rantings of taking the Purity Test 1500 verbally. |
|
|
| Friday 7pm Pull out many maps and try to find the damn hotel in Houston. |
|
|
| Friday 9pm Arrive at the hotel getting a room for one (car stuffed |
| with people sits outside the lobby). Request two keys. |
|
|
| Friday 10pm Test the smoke machine on the hotel grounds. Chase young |
| code-kids out of your way, threatening to disable their |
| phones. |
|
|
| Friday 11pm Crash in room from lack of sleep. Kick other members out |
| of your way. Ignore multiple alcoholic beverages lining |
| the room. Ponder what's sleeping in the chair briefly. |
|
|
| Saturday ??? Try to figure out if you're awake or dead. Take a collection |
| from those that are still alive. Run to some micro-compact |
| Japanese convenience store hidden in the middle of suburbia |
| hell and obtain sugar-coated nutrients with Windrunner and |
| JunkMaster and Gaijin. |
|
|
| Saturday 1pm Arrive for the conference. Get mega-amounts of raffle tickets. |
|
|
| Saturday 2pm Conference actually gets started a few hours behind schedule. |
| Tape conversations from the man with the whisper 2000 home |
| version. Ponder the light orbiting Erik B's head. |
|
|
| Saturday 4pm Witness Steve Ryan in action against the hotel staff. |
| Wonder where the young hack in the corner got the gallon, |
| mostly empty now, of wine. Ponder if he's going to spew. |
|
|
| Saturday 6pm Try to figure out what everyone is going to do with the |
| several hundred flashing construction lights given out. |
| Calculated the ratio of men to women as 15,000:1, roughly. |
|
|
| Saturday 8pm Try to keep awake while wondering how much torture can be |
| sustained. Watch Count Zero nodding off. Hitman and I |
| pulled out our decoder rings to interpret Crunch's hidden |
| message. |
|
|
| Saturday 10pm Dominoes Pizza makes it to the room. OUR SAVIOR !!! He's |
| 5-minutes late. Custody battle over the pizza ensues. The |
| manager is called, at which point he lowers the $50 price |
| for the two pizzas down to $30. We scrape a few dollars and |
| hand the peon delivery boy some cheap beer. |
|
|
| Saturday Nite Hand out copies of "cindy's torment" to the code kids. |
| Watch Erik B.'s continuation of necrophiliac desires on |
| the acquired VCR that mysteriously appeared. Avoided the |
| hotel security by changing room while monitoring their |
| frequencies (thanks RDT). Obtained evidence that hackers |
| were breaking into VR R&D departments to engage in endless |
| routines of VR sex for Cyborgasmic responses. Saw Crunch's |
| host's room blow out as the multitudes of computers fry the |
| circuits. Followed the 'sheep' about the hotel. |
|
|
| Sunday ??? Woke bright and early to a car locked with the keys inside. |
| Fortunately, 50-odd slim-jims appeared out of nowhere to |
| save the day. Windrunner chauffeured us back to our lair. |
|
|
| Sunday 3pm Hacked into the Louisiana Lotto machine from an acoustical |
| modem and laptop from a pay phone to rig the numbers and |
| then bought a ticket. |
|
|
| Sunday 7pm Returned to hell. Lost the lotto ticket in the growing |
| pile of sugar-coated necessities sheddings. Cursed. |
|
|
| Sunday 8pm Turned the PC on and hit the networks. |
|
|
|
|
| -------------------------- |
|
|
| Jim Carter, president of Bank Security in Houston, TX, wrote the |
| following impressions of HoHoCon for Security Insider Report |
| (December, 1992) |
|
|
| HoHoCon was in fact "Unphamiliar Territory" for this "good ole boy," |
| but it didn't take long till I was into the swing of things and |
| telling lies of how we cheat and steal to get our information. Of |
| course, everyone who talked to this "good ole boy" thought he was with |
| one of the three letter agencies. As the stories rolled on about what |
| they (the hackers) could do, such as produce virii that would cause |
| video display terminals and hard drives to smoke, I had to sit back, sip |
| my brewski and say "wow." We sat back, enjoyed a few more rounds, told |
| a few more lies and had a good time. |
|
|
| Well, this old boy didn't show until about noon on Saturday. Of course |
| the conference hadn't started yet so we didn't miss anything. The |
| program was kicked off with a number of questions about who, what, where |
| and how. It was difficult to determine how many people were there since |
| the room was packed like a can of sardines. Our estimate was over two |
| hundred, not counting the hackers still in their rooms. Was this |
| another drunken free for all, as in the past? A report was given on |
| cellular hacking and toll fraud. Hackers' rights were presented by an |
| attorney. Also discussed was the stupidity of the press and law |
| enforcement. |
|
|
| Some others talked about suppressed information from the federal |
| government concerning UFO's and how hackers are gaining this info. And |
| of course the White House wants to know their sources. |
|
|
| Hand outs were given including virii and virus source code. I did |
| decline any virii, but who knew what I would get before this was over. |
| I believe this was the most responsive and gratifying group I have |
| spoken to this year. I also expect to get more business because of this |
| presentation than any other this year. |
|
|
| A lengthy door prize was held in which I was the winner of more virii. |
| Again, I did decline, but passed the winning ticket on. Captain Crunch |
| was the final speaker. In conclusion, the attendees were the good, the |
| bad and the ugly. We did find HoHoCon very informative and, yes, we |
| will attend again. In closing, I hope each and everyone had a very |
| "Merry HoHoCon." |
|
|
|
|
| -------------------------- |
|
|
| A (Hacker's) Mind is a Terrible Mind to Waste |
| Unix World, page 136, March 1993 |
|
|
| by Gary Andrew Poole |
|
|
| [Unix World wanted MONEY to reprint this in full...Yeah, right. |
| Someone already posted it on alt.cyberpunk some time ago |
| if you can't find it anywhere.] |
|
|
| *-----------------------------------* |
|
|
| Various Stuff Picked up at HoHoCon |
|
|
| *-----------------------------------* |
|
|
| -------------------------- |
| Flyer: |
| -------------------------- |
|
|
| Unphamiliar Territory |
| Phalcon/Skism Western World Headquarters |
| The Ghost in The Machine Distribution |
|
|
| Featuring: |
|
|
| - 'Neutral Territory' forum where security issues can be discussed with |
| top security people in the field. |
|
|
| - Completely LEGAL forums on computer security, hacking, phraud. |
|
|
| - Thousands of textfiles covering all aspects of the underground. |
|
|
| - Hundreds of viruses and virus source code for the serious |
| programmer. |
|
|
| Information: |
|
|
| - Administrators are Invalid Media, Mercury/NSA, Warlock Bones and |
| Jaeger. |
|
|
| - Run on a professor Falken/LOD donated ZOOM v32bis |
|
|
| - Mentioned in MONDO 2000 and reviewed in the latest Infoworld. |
|
|
| - Dialin 602-894-1757 / 24 hours |
|
|
| -------------------------- |
| Flyer |
| -------------------------- |
|
|
| In your defense..... Courtesy Freeside Orbital Data Network, HoHoCon '92 |
| - B. O'Blivion |
| Repeat after me: |
|
|
| "If I am reading this to you, then I believe that you are |
| questioning, detaining, or arresting me, or searching my person or |
| possessions in the course of your official duties." |
|
|
| "I do not consent to any search of seizure of any part of my person |
| or property, nor to any property of others under my control. I do not |
| consent to any person's examination, search, or removal of any |
| information storage equipment or media in my possession. You are hereby |
| notified that such information storage equipment or media contain |
| private written and electronic mail, confidential communications, and |
| other material protected under the Electronic Communications Privacy Act |
| and other statutes." |
|
|
| "I respectfully decline to answer any questions beyond confirmation |
| of my identity, and require access to legal counsel immediately. I |
| demand that access to legal counsel be provided to me before any |
| questioning takes place. I will answer no questions nor give any |
| information outside the presence of legal counsel. All requests for |
| interviews, statements, consents, or information of any sort should be |
| addressed to me through my attorney. I invoke the rights five to me by |
| the Fifth and Sixth Amendments of the Constitution of the United |
| States." |
|
|
| "I further notify you that the speech and information contained on |
| information storage and handling devices at this site are protected |
| by the First and Fourth Amendments to the Constitution of the United |
| States, and that any unlawful search or seizure of these items or of |
| the information they contain will be treated as a violation of the |
| Constitutional rights of myself and other users of these devices and |
| media." |
|
|
| "I further notify you that any such violations of any person's legal |
| or Constitutional rights which are committed at any time, by any person, |
| will be the subject of civil legal action for all applicable damages |
| sustained. I require that at this time all officers participating in |
| this illegal search, seizure, or arrest identify themselves at this time |
| by name and badge number to me and my legal counsel." |
|
|
| [Include if applicable] |
|
|
| "I further notify you that I am a Computer System Operator providing |
| private electronic mail, electronic publications, and personal |
| information storage services to users in this State, and among the |
| United States. Any person causing a breach of the security of, or |
| violation of the privacy of, the information and software herein will be |
| held liable for all civil damages suffered by any and all users |
| thereof." |
|
|
| -------------------------- |
| Flyer |
| -------------------------- |
|
|
| HoHoCon 1992 |
| Amusing Local Frequencies |
| courtesy of -=RDT. |
|
|
| Allen Park Inn Security - 464.500 Houston Post - 154.540 |
| 173.275 |
|
|
| 452.975 |
| Houston Police: |
|
|
| North Shepherd Patrol - 460.325 |
| NE Patrol - 460.125 |
| SE Patrol - 460.025 |
| SW Patrol - 460.050 |
| Central Patrol - 460.100 |
| Spec. Op. Traffic - 460.350 |
| Car 2 Car - 460.225 |
| South Central Patrol - 460.550 |
| NW Patrol - 460.475 |
| West Patrol - 460.150 |
| Accident - 460.375 |
| Misc - 460.525 |
| 460.575 |
| 460.400 |
| Records - 460.425 |
| City Marshalls - 453.900 |
| Paging - 155.670 |
| Police Intercity - 453-550 |
|
|
| A number of people have been asking "who is RDT? what the hell is |
| RDT?" For the record, we're hackers who believe information should be |
| free. All information. The world is full of phunky electronic gadgets |
| and networks, and we want to share our information with the hacker |
| community. We currently write for 2600 magazine, Phrack, Mondo 2000, |
| Cybertek, and Informatik. |
| The five "charter members" of RDT are Count Zero, Brian Oblivion, |
| Magic Man, White Knight, and Omega. Each of us has complementary |
| skills, and as a group we have a very wide area of technical |
| knowledge. Feel free to contact us. |
|
|
| Count Zero - count0@ganglia.mgh.harvard.edu |
| Brian Oblivion - oblivion@ganglia.mgh.harvard.edu |
| Magic Man - magic@ganglia.mgh.harvard.edu |
| White Knight - wknight@ganglia.mgh.harvard.edu |
| Omega - omega@spica.bu.edu |
|
|
| "They are satisfying their appetite to know something that is not theirs |
| to know." - Asst. District Attorney Don Ingraham |
|
|
| "All-you-can eat buffet...for FREE!" - Restricted Data Transmissions |
|
|
| RDT "Truth is Cheap, but Information Costs." |
|
|
| -------------------------- |
| Magazine |
| -------------------------- |
|
|
| Future Sex |
|
|
| (a very odd pseudo-cyberpunk skin mag) |
|
|
| 4 issues for $18, Canada $26, International US $48 |
|
|
| 1095 Market Street |
| Suite 809 |
| San Francisco, CA 94103 |
| 415-621-5496 |
| 415-621-4946 fax |
|
|
| -------------------------- |
| Video |
| -------------------------- |
|
|
| Red $19.95 |
| (Phone Pranks can kill) |
|
|
| Nekromantik II $29.95 |
| (No comment) |
|
|
| Available through |
|
|
| Film Threat Video |
| P.O. Box 3170 |
| Los Angeles, CA |
| 90078-3170 USA |
|
|
| 818-848-8971 |
|
|
| Shipping: 1 tape $3.40 |
| 2-3 $4.60 |
| 4-6 $5.80 |
| 6+ $7.00 |
|
|
| Visa/MC accepted. |
|
|
| -------------------------- |
| Official HoHoCon Crud |
| -------------------------- |
|
|
|
|
| HoHoCon '92 |
|
|
| Product Ordering Information |
|
|
|
|
| If you are interested in obtaining either HoHoCon shirts or videos, |
| please contact us at any of the following: |
|
|
| drunkfux@cypher.com |
| hohocon@cypher.com |
| cDc@cypher.com |
| dfx@nuchat.sccsi.com |
| drunkfux@ganglia.mgh.harvard.edu |
| 359@7354 (WWIV Net) |
|
|
| Freeside Orbital Data Network |
| ATTN: dFx/HoHoCon |
| 11504 Hughes Road Suite #124 |
| Houston, Texas |
| 77089 |
|
|
| 713-866-4884 (Voice Mail) |
|
|
|
|
| The shirts are $15 plus $2 shipping ($2.50 for two shirts). At this |
| time, they only come in extra large. We may add additional sizes if |
| there is a demand for them. The front of the shirt has the following |
| in a white strip across the chest: |
|
|
|
|
| I LOVE FEDS |
|
|
| (Where LOVE = a red heart, very similar to the I LOVE NY logo) |
|
|
|
|
| And this on the back: |
|
|
| dFx & cDc Present |
|
|
| HOHOCON '92 |
|
|
| December 18-20 |
| Allen Park Inn |
| Houston, Texas |
|
|
|
|
| There is another version of the shirt available with the following: |
|
|
| I LOVE WAREZ |
|
|
| The video includes footage from all three days, is six hours long and |
| costs $18 plus $2 shipping ($2.50 if purchasing another item also). |
| Please note that if you are purchasing multiple items, you only need |
| to pay one shipping charge of $2.50, not a charge for each item. If |
| you wish to send an order in now, make all checks or money orders |
| payable to O.I.S., include your phone number and mail it to the street |
| address listed above. Allow ten working days for arrival. |
|
|
| Thanks to everyone who attended and supported HoHoCon '92. Mail us if |
| you wish to be an early addition to the HoHoCon '93 (December 17-19) |
| mailing list. |
|
|
| -------------------------- |
| Text File |
| -------------------------- |
|
|
| Rumors have begun to surface about a group of hackers who were involved in a |
| project to uncover information regarding the existence of UFOs. The |
| most public example pertaining to this alleged project was seen on |
| Dateline NBC on the screen of the mystery hacker "Quentin." |
|
|
| The story goes that this group of individuals decided to put their |
| skills to work on a project that, if successful, would add legitimacy to |
| the hacking process by uncovering information on what has been called the |
| greatest cover-up in the history of the world. Milnet TAC ID cards |
| were obtained through military officials sympathetic to the cause. Several |
| sites and networks were targeted that had in the past been linked to UFO |
| activity. These were sites like the Jet Propulsion Laboratory, Sandia Labs, |
| TRW Space Research, American Institute of Physics, and various other |
| educational, government and military sites. |
|
|
| The rumors also emphasize that several sites had what these individuals |
| called "particularly heavy security." Within several seconds after |
| connection had been established, system administrators of sites used in |
| this project were contacted. Further rumors state that there was |
| information regarding a propulsion system designed utilizing what is |
| termed "corona discharge" being analyzed at one site. The most sinister |
| of all rumors states that one particular participant who was allegedly |
| deeply immersed in TRWs internal network has not been heard from since |
| uncovering data regarding a saucer being housed at one of their Southern |
| California installations. |
|
|
| Believe what you will about the reality of this project. Much will be |
| dismissed as hacker lore, but within the core of every rumor lies a |
| grain of truth. |
|
|
| Are we being lied to? Why is this information still classified by the NSA? |
| What are they hiding from us behind a maze of security? Will we continue |
| to stand idly by and let an uncaring and deliberately evasive government |
| shield us from what may be the most important, and potential dangerous |
| news to ever surface? Information wants to be free, and only a |
| concerted group effort can make this happen. How much do you really |
| want to know about what is really going on? |
|
|
| What follows is information that has been released regarding this project... |
|
|
| --------------------------------------------------------------------------- |
|
|
| PROJECT ALF-1 |
|
|
| A Planetary Effort |
|
|
| TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET |
| TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET |
|
|
| These are the raw data. Where comments are appropriate, they |
| will be included. The data will be grouped together with dates, |
| names etc. to make correlations easier. |
|
|
| There are countless references to the aliens, their down space |
| craft and what the Government is doing with them. |
| If, as is supposed, the research on the craft and the 'ufonauts' |
| continues today, then undoubtedly there are computer records, somewhere. |
|
|
| I. Searching the Skies; Tripping the Electronic Fence around the |
| USA. |
|
|
| US Space Command Space Surveillance Center, Cheyenne Mountain, |
| Colorado Springs, Box Nine (Electronic Surveillance Room) |
| (This is where they search for and track UFO activity.) |
| U.S. Naval Space Surveillance System, Dahlgreen, Virginia, (Main |
| computer), Lake Kickapoo, Texas (listening post): Search for |
| 'Flash Traffic' |
| Commander Sheila Mondran |
| CINC-NORAD |
| Space Detection and Tracking System |
| Malabar, Forida |
| 'Teal Amber' search |
| National Military Command Center - Pentagon |
| (These are the areas where UFO activity is tracked. |
| There is a radar shield around the country that is 'tripped' by UFO's. |
| All tracking and F14 scrambling is done through this system.) |
|
|
| II. The Second Cover Up |
|
|
| Defense Intelligence Agency |
| Directorate for Management and Operations |
| Project Aquarius (in conjunction with SRI) |
|
|
| Colonel Harold E. Phillips, Army (where/what Feb. 1987) |
| UFO Working Group, (formed Dec 1987) |
| Major General James Pfautz, USAF, Ret. (March 87) |
| US Army experiments -(Monroe Institute, Faber, VA) |
| Major General Albert Stubblebine |
| Capt. Guy Kirkwood, |
| (thousands of feet of film of UFO's catalogued and on record somewhere.) |
| The UFO Working Group was formed because one arm of the Govt doesn't |
| know what the other is doing.) |
|
|
| III. National Security |
|
|
| NSA NAtional Security Agency, Dundee Society (Super secret elite |
| who have worked on UFO's.) |
| NSA - Research and Engineering Division |
| NSA - Intercept Equipment Division |
|
|
| Kirtland Force Base, Office of Special Investigations, Project |
| Beta. 1979-83-? (Sandia Labs are here.) |
| Paul Bennewitz |
| Project Blue |
| Project Blue Book |
|
|
| (NSA computers do analysis for Pentagon.) |
|
|
| IV. More Secret Players |
|
|
| NASA, Fort Irwin, Barstow, CA |
| NASA Ames Research Center, Moffet Field Naval Base |
| SETI |
| State Dept. Office of Advanced Technology |
| Any Astronauts from Mercury, Gemini and Apollo |
| CIA - Office of Scientific Investigation |
| CIA - Domestic Collection Division |
|
|
| (NASA has known about UFO's since the astronauts saw and photoed them. |
| Records somewhere.) |
|
|
| V. Dealing with the Secret |
|
|
| MJ-12 (1952) |
| Majectic 12 |
| Operation Majestic 12 |
| MAJIC-12 |
| Admiral Roscoe H. Hillenkoetter |
| Dr. Vannevar Bush |
| Dr. Detlev Bronk |
| Dr. Jerome Hunsaker |
| Dr. Donald Menzel |
| Dr. Lloyd Berkner |
| General Robt. Montague |
| Sidney Souers |
| Gordon Gray |
| General Hoyt Vandenberg |
| Sect State James Forrestal |
| General Nathan Twining |
| Pres. Truman |
| Pres. Eisenhower |
|
|
| (One of the biggest secrets ever.) |
|
|
| Nevada Desert, Area 51, S4 (houses UFO's) |
| (Robert Lazar talked!) 9 space ships on storage. Propulsion by |
| corona discharge. |
|
|
| (Area 51 is the most protected base on the planet.) |
|
|
| VI. ROSWELL, NM Crashes |
| Mac Brazel (farmer) |
| Major Jesse A. Marcel |
| 509th. Bomber Group |
| Lewis Rickett, CIC Officer |
| Colonel William Blanchard |
| Gerald Anderson, witness to crash and aliens |
|
|
| Wright Patterson Air Force Base, (parts lists of UFO's catalogued; |
| autopsies on record) (Bodies in underground facility) |
| Foreign Technology Building |
| USAAF (United States Army Air Force reports: "Early Automation" |
| Muroc, CA (Base with UFO's for study) |
|
|
| (1 saucer with 4 aliens. They were transported to Wright and then |
| saved, catalogued and autopsied.) |
|
|
|
|
| VII. THOSE ON GOVT SHIT LIST |
|
|
| (People who have gotten close.) |
|
|
| Robert Lazar |
| Major Donald Keyhoe |
| William Moore |
| Stanton Friedman |
| Jaime Shandera |
| Whitley Streiber |
| Timothy Goode, UK |
|
|
| Other UFO Crashes |
| Del Rio, TX 12/50, Colonel Robert Willingham |
| Las Vegas, 4/18/62 |
| Kecksburg, PA 12/9/65 |
|
|
|
|
| VIII. International |
|
|
| Belgian Air Force. (They are going public and have records. |
| Press conference held 7/12/91.) |
| Australian Air Force |
| UK; GCHQ |
| British Air Force |
| Belgium: |
| NATO Radar Stations |
|
|
|
|
| IX. UFO Civilian Groups. (What do they really know?) |
|
|
| NICAP, National Investigations Committee on Aerial Phenomena |
| (private company.) |
|
|
| APRO, Tucson, AZ (Aerial Phenomona Research Organization, |
| private company.) |
|
|
| MUFON Mutual UFO Network |
|
|
| X. GENERAL |
|
|
| Kenneth Arnold, June 24, 1947 |
| Cattle and Sheep Mutilations |
| General and Pres. Eisenhower, (private files and library) |
| President Truman |
| Wright Field or Wright Patterson Air Force Base, Dayton, OH, (Air |
| Force Foriegn Technology Division) |
| USAF Project Saint |
| USAF Project Gemini |
| Project Moon Dust |
| Project Sign |
| Project Grudge |
| General Hoyt Vandenberg (1940-1960) |
| Air Force Regulation 200-2 (8/12/54) |
| Holloman AFB, NM |
| Roswell, NM July 7, 1947 |
|
|
|
|
| XI. Possible Searches |
|
|
| Presidential Libraries |
| Old USAAF, (United States Army Air Force) |
| NASA |
| Astronaut Frank Borman, Gemini 7, pictures of UFO |
| Neil Armstrong, Apollo 11, saw UFO's on moon. |
| Colonel Gordon Cooper saw a bunch of them |
| James McDivitt, 6/66 |
| United Nations |
| NATO; |
| General Lionel Max Chassin, French Air Force |
| Star Wars, United Kingdom, 23 scientists killed in 6 years. |
| Gulf Breeze, FL |
| Additional UFO records at NSA, CIA, DIA, FBI |
|
|
|
|
| Good Searching. |
|
|
| ---------------------------------------------------------------------- |
| Project |
| ->Green Cheese<- |
| Data Base |
| --------------------------------------------------------------------- |
| Holloman AFB |
| Location: New Mexico. Preconceived landing 15 years ago. |
|
|
| DDN Locations: |
| -------------- |
|
|
| NET : 132.5.0.0 : HOLLOMAN : |
|
|
| GATEWAY : 26.9.0.74, 132.5.0.1 : HOLLOMAN-GW.AF.MIL : CISCO-MGS :: EGP,IP/GW : |
| GATEWAY : 26.9.0.74, 132.5.0.1 : HOLLOMAN-GW.AF.MIL : CISCO-MGS :: EGP,IP/GW : |
|
|
| HOST : 26.10.0.74 : HOLLOMAN-TG.AF.MIL : VAX-8650 : VMS : TCP/FTP,TCP/TELNET,TCP |
| SMTP : |
|
|
| HOST : 26.6.0.74 : HOLLOMAN-AM1.AF.MIL : WANG-VS100 : VSOS : TCP/TELNET,TCP/FTP, |
| TCP/SMTP : |
|
|
| Host: DDNVAX2.6585TG.AF.MIL |
| 156.6.1.2 |
|
|
| ----------------------------------------------------------------------- |
|
|
| Kirtland Air Force Base |
| Office Of Special Investigations. Sandia Labs are here. Also part of |
| NSA Intercept Equipment Division. |
|
|
| Key Words/names: |
| ---------------- |
| Sandia Labs |
| Project Beta (1979-83-?) |
| Paul Bennewitz |
| Project Blue |
| Project Blue Book |
|
|
| DDN Locations: |
| -------------- |
|
|
| NET : 131.23.0.0 : KIRTLAND-NET : |
| NET : 132.62.0.0 : KIRTLAND2 : |
| GATEWAY : 26.17.0.48, 131.23.0.1 : KIRTLAND2-GW.AF.MIL,KIRTLAND-GW.AF.MIL |
| : CISCO-MGS : UNIX : IP/GW,EGP : |
| GATEWAY : 26.18.0.87, 132.62.0.1 |
| : KIRTLAND1-GW.AF.MIL,KIRTLAND1606ABW-GW.AF.MIL : CISCO-MGS : |
| : EGP,IP/GW : |
| HOST : 26.0.0.48 : KIRTLAND.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : |
| HOST : 26.0.0.87 : KIRTLAND2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : |
| HOST : 26.6.0.87 : KIRTLAND-AM1.AF.MIL : WANG-VS300 : VS :: |
|
|
| ----------------------------------------------------------------------- |
|
|
| NASA |
| What can I say about NASA that you couldnt guess for yourself.... |
| (Except that the following sights are SPECIFIC NASA sights, not |
| just randomly suspected sights). |
|
|
| DDN locations: |
| -------------- |
|
|
| Fort Irwin, Barstow, CA: |
| ----------------------- |
| NET : 134.66.0.0 : IRWIN : |
| NET : 144.146.0.0 : FTIRWIN1 : |
| NET : 144.147.0.0 : FTIRWIN2 : |
| GATEWAY : 26.24.0.85, 26.7.0.230, 144.146.0.1, 144.147.0.0 |
| : FTIRWIN-GW1.ARMY.MIL : CISCO-GATEWAY : CISCO : IP/GW,EGP : |
| HOST : 26.14.0.39 : IRWIN-ASBN.ARMY.MIL : NCR-COMTEN-3650 : COS2 :: |
| HOST : 26.13.0.85 : FTIRWIN-AMEDD.ARMY.MIL : ATT-3B2-600G : UNIX |
| : TCP/FTP,TCP/SMTP,TCP/TELNET : |
| HOST : 26.14.0.85 : FTIRWIN-IGNET.ARMY.MIL : DATAPOINT-8605 : RMS :: |
| HOST : 26.15.0.85 : IRWIN-EMH1.ARMY.MIL,FTIRWIN-EMH1.ARMY.MIL : SPERRY-5000 |
| : UNIX : TCP/FTP,TCP/SMTP,TCP/TELNET : |
|
|
| Moffet Field Naval Base (Ames Research Center): |
| ----------------------------------------------- |
| GATEWAY : 26.20.0.16, 192.52.195.1 : MOFFETT-FLD-MB.DDN.MIL,AMES-MB.DDN.MIL |
| : C/70 : CHRYSALIS : IP/GW,EGP : |
| HOST : 26.0.0.16 : MOFFETT.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : |
|
|
| ----------------------------------------------------------------------- |
| Pentagon (National Military Command Center) |
| One of many places in charge of tracking UFO activity. |
|
|
| Possible DDN sights: |
| ------------------- |
|
|
| GATEWAY : 26.9.0.26, 134.205.123.140 : PENTAGON-GW.HQ.AF.MIL : CISCO-AGS : |
| : EGP,IP/GW : |
| GATEWAY : 26.25.0.26, 131.8.0.1 : PENTAGON-GW.AF.MIL,HQUSAFNET-GW.AF.MIL |
| : CISCO-MGS :: IP/GW,EGP : |
| GATEWAY : 26.10.0.76, 192.31.75.235 : PENTAGON-BCN-GW.ARMY.MIL : SUN-360 |
| : UNIX : IP/GW,EGP : |
| GATEWAY : 26.26.0.247, 192.31.75.1 : PENTAGON-GW.ARMY.MIL : SUN-3/160 |
| : UNIX : EGP,IP/GW : |
| GATEWAY : 26.31.0.247, 26.16.0.26, 141.116.0.1 : PENTAGON-GW1.ARMY.MIL |
| : CISCO : CISCO : IP/GW,EGP : |
| HOST : 26.0.0.26 : PENTAGON.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : |
| HOST : 26.24.0.26 : OPSNET-PENTAGON.AF.MIL : VAX-8500 : VMS |
| : TCP/TELNET,TCP/FTP,TCP/SMTP : |
| HOST : 26.10.0.76, 192.31.75.235 : PENTAGON-BCN.ARMY.MIL : SUN-360 : UNIX |
| : TCP/FTP,TCP/SMTP,TCP/TELNET : |
| HOST : 26.0.0.247 : PENTAGON2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : |
| HOST : 26.7.0.247 : PENTAGON-AMSNET.ARMY.MIL : AMDAHL : MVS |
| : TCP/TELNET,TCP/FTP : |
| HOST : 26.14.0.247 : NSSC-PENTAGON.NAVY.MIL : ALTOS-3068A : UNIX |
| : TCP/FTP,TCP/TELNET,TCP/SMTP : |
| HOST : 26.18.0.247 : PENTAGON-EMH4.ARMY.MIL : SPERRY-5000/80 : UNIX |
| : TCP/TELNET,TCP/FTP,TCP/SMTP : |
| HOST : 26.26.0.247, 192.31.75.1 : PENTAGON-AI.ARMY.MIL : SUN-3/160 : UNIX |
| : TCP/TELNET,TCP/FTP,TCP/SMTP,TCP/FINGER : |
|
|
| ----------------------------------------------------------------------- |
|
|
| Raddaman |
| Location of infamous building 18a. Suspected saucers and others? |
|
|
| DDN location, yet unknown. |
|
|
| ------------------------------------------------------------------------ |
|
|
| SECI |
| ? |
|
|
| DDN Locations: |
| -------------- |
|
|
| NET : 192.108.216.0 : ARC-SETI-NET : |
|
|
| ------------------------------------------------------------------------ |
|
|
| Utah Locations: |
|
|
| GATEWAY : 26.18.0.20, 131.27.0.1 : HILL-GW.AF.MIL,HILLAFBNET-GW.AF.MIL |
| : CISCO-MGS :: IP/GW,EGP : |
|
|
| GATEWAY : 26.18.0.20, 131.27.0.1 : HILL-GW.AF.MIL,HILLAFBNET-GW.AF.MIL |
| : CISCO-MGS :: IP/GW,EGP : |
|
|
| HOST : 26.5.0.20 : HILL.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : |
| HOST : 26.0.0.99 : HILL2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : |
| HOST : 26.12.0.99 : HILL-AM1.AF.MIL : WANG-VS100 : VS |
| : TCP/TELNET,TCP/FTP,TCP/SMTP : |
|
|
| ------------------------------------------------------------------------- |
|
|
| Wright Patterson AFB |
| Catalogued UFO parts list. Autopsies on record. Bodies located in |
| underground facility of Foreign Technology Building. |
|
|
| DDN Locations: |
| -------------- |
|
|
| HOST : 26.0.0.47 : WRIGHTPAT.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : |
| HOST : 26.8.0.123 : WRIGHTPAT2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : |
| HOST : 26.0.0.124 : WRIGHTPAT3.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : |
| HOST : 26.3.0.170 : WAINWRIGHT-IGNET.ARMY.MIL : CONVERGENT-TECH-CN-100 |
| : CTOS :: |
| HOST : 26.0.0.176 : WRIGHTPAT4.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : |
|
|
| ------------------------------------------------------------------------- |
|
|
| Nevada: |
|
|
| NET : 131.216.0.0 : NEVADA : |
|
|
| ------------------------------------------------------------------------- |
|
|
| Random Suspected Nets: |
|
|
| WIN: |
| Top Secret Network. All coordinator's have last name Win. |
|
|
| NET : 141.8.0.0 : DFN-WIN8 : NET : 141.9.0.0 : DFN-WIN9 : |
| NET : 141.10.0.0 : DFN-WIN10 : NET : 141.15.0.0 : DFN-WIN15 : |
| NET : 141.25.0.0 : DFN-WIN25 : NET : 141.26.0.0 : DFN-WIN26 : |
| NET : 141.28.0.0 : DFN-WIN28 : NET : 141.57.0.0 : DFN-WIN57 : |
| NET : 141.58.0.0 : DFN-WIN58 : NET : 141.59.0.0 : DFN-WIN59 : |
| NET : 141.60.0.0 : DFN-WIN60 : NET : 141.61.0.0 : DFN-WIN61 : |
| NET : 141.62.0.0 : DFN-WIN62 : NET : 141.63.0.0 : DFN-WIN63 : |
| NET : 141.64.0.0 : DFN-WIN64 : NET : 141.65.0.0 : DFN-WIN65 : |
| NET : 141.66.0.0 : DFN-WIN66 : NET : 141.67.0.0 : DFN-WIN67 : |
| NET : 141.68.0.0 : DFN-WIN68 : NET : 141.69.0.0 : DFN-WIN69 : |
| NET : 141.70.0.0 : DFN-WIN70 : NET : 141.71.0.0 : DFN-WIN71 : |
| NET : 141.72.0.0 : DFN-WIN72 : NET : 141.73.0.0 : DFN-WIN73 : |
| NET : 141.74.0.0 : DFN-WIN74 : NET : 141.75.0.0 : DFN-WIN75 : |
| NET : 141.76.0.0 : DFN-WIN76 : NET : 141.77.0.0 : DFN-WIN77 : |
| NET : 141.78.0.0 : DFN-WIN78 : NET : 141.79.0.0 : DFN-WIN79 : |
| NET : 141.80.0.0 : DFN-WIN80 : NET : 141.81.0.0 : DFN-WIN81 : |
| NET : 141.82.0.0 : DFN-WIN82 : NET : 141.83.0.0 : DFN-WIN83 : |
| NET : 141.84.0.0 : DFN-WIN84 : NET : 141.85.0.0 : DFN-WIN85 : |
| NET : 141.86.0.0 : DFN-WIN86 : NET : 141.87.0.0 : DFN-WIN87 : |
| NET : 141.88.0.0 : DFN-WIN88 : NET : 141.89.0.0 : DFN-WIN89 : |
| NET : 141.90.0.0 : DFN-WIN90 : NET : 141.91.0.0 : DFN-WIN91 : |
| NET : 141.92.0.0 : DFN-WIN92 : NET : 141.93.0.0 : DFN-WIN93 : |
| NET : 141.94.0.0 : DFN-WIN94 : NET : 141.95.0.0 : DFN-WIN95 : |
| NET : 141.96.0.0 : DFN-WIN96 : NET : 141.97.0.0 : DFN-WIN97 : |
| NET : 141.98.0.0 : DFN-WIN98 : NET : 141.99.0.0 : DFN-WIN99 : |
| NET : 188.1.0.0 : WIN-IP : NET : 192.80.90.0 : WINDATA : |
|
|
| ----------------------------------- |
|
|
| Scinet: |
| Sensitive Compartmented Information Network |
|
|
| NET : 192.12.188.0 : BU-SCINET : |
|
|
| ----------------------------------- |
|
|
| Disnet: |
| Defense Integrated Secure Network. Composed of SCINET, WINCS |
| ([World Wide Military and Command Control System] Intercomputer |
| Network Communication Subsystem), and Secretnet(WIN). |
|
|
| NET : 22.0.0.0 : DISNET : |
|
|
| ----------------------------------- |
|
|