File size: 49,895 Bytes
8ecd256
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
                           ==Phrack Magazine==

               Volume Four, Issue Forty-Two, File 13 of 14

                              HoHoCon 1992
                               Miscellany




The hackers were getting nervous.  It was understandable.  Just a few weeks
before HoHoCon and already two other "get-togethers" had experienced
turbulence from the authorities.

Rumors began to fly that HoHo was to be the next target.  Messages bearing
ill-tidings littered the underground.  Everyone got worked into a frenzy about
the upcoming busts at HoHoCon.  People began to cancel their reservations
while others merely refused to commit one way or the other.

But, amidst all the confusion and hype, many declared "Let them try to
raid us!  I'm going anyway!"  These were the few, the proud...the stupid.

-------------------------------------------------------------------------------

HoHoCon as I saw it - Erik Bloodaxe (Chris Goggans)

I arrived at the Allen Park Inn in the mid afternoon on Friday the 18th.
I was promptly greeted by several of my cohorts and a loping transient
who introduced himself as "Crunchhhhhhhhh."  Yes, John Draper, the infamous
Captain Crunch had actually ventured outward to attend our little party.
(Yes, Virginia, the rumors are true:  The Captain is toothless, unkempt,
overbearing and annoying as all hell.)

I followed Scott Chasin back to our room, the pack of other early arrivals
in close file behind.  After storing my gear I noticed that Draper was
looming in the doorway ranting furiously about all the smoking in our room.
"I've never heard of a hacker who smoked," exclaimed the Captain.
Taking this as my cue, I bummed a Djarum off of Crimson Death and took great
glee in adding my fumes to the enveloping fog.

Draper spent the next 30 minutes attempting to eavesdrop on various
conversations in which various old friends were catching up.  Not knowing
any of us personally, he nonetheless felt obligated to offer his comments
about our discussions about life and college and music amidst his coughing
and complaining about the smoke.

After some time everyone was banished from the room and several of us
went out to eat.  Scott Chasin, myself, two hackers (The Conflict, & Louis
Cypher) along with Gary Poole (covering the entire mess for Unix World) took
off for the nearest grease pit.  Taco Bell won in proximity, and once
surrounded by burritos Scott, Conflict and I began our rant about Unix
Security (the lack thereof).  Gary whipped out his Unix World pen and pad
and began taking notes.  I am uncertain whether or not it was the content
of our spiel or the asides I repeatedly made regarding the bevy of giggling
coeds that garnered the most notes in Gary's booklet.

Back at the Con things were spicing up.  More people had begun to arrive
and the Allen Park Inn staff began to worry about their safety and that of
their other guests.  One remarked to Jesse (Drunkfux), the sponsor of HoHoCon, "That Draper
fellow needs to stay out of the lobby.  He was eating large
amounts of flesh off his hands and it was scaring some of the visitors."
The staff did not know what to think at all when a father arrived with his
three sons and after purchasing a room on his credit card told the boys, "Ok
guys, Mom will be picking you up on Sunday."

This did not concern most of us.  It was straight to the bar
for us, where Rambone bought Scott & myself a round of Kamikazes.  Also at
the bar was Bootleg who had just gotten out.  (Of what, and for what you
can find out on your own.)  Bootleg is probably the smartest biker I have
ever had the pleasure to meet.  We talked about sex, drugs, hawgs, computers,
cellular fraud and how close the nearest cabaret was.

A small controversy began to arise amidst the hackers at the bar.  Stationed
near one end of the room was a table lined with older men.  "FEDS," someone
murmured, gesturing at the group.

"Good for them," I said, and left the bar to look for Jesse.  When I returned
several minutes later the hackers had engaged the strangers in conversation
and found that they weren't feds after all.  Among this group were
Jim Carter of Houston-based Bank Security, and Bernie Milligan of
Communications & Toll Fraud Specialists, Inc.  Once this news was out
tensions eased and everyone continued with their libations.

Suddenly I became aware that there was girl in the room.  I had seen her out
in the courtyard previously but now she was alone.  Turning on my
"Leisure Suit Larry" charm I grabbed the seat next to her.  Melissa had arrived
from Austin to cover the event for Mondo-2000.  She surprised me by telling
me that she knew who I was, where I worked, and even knew my extension number.
(I almost fell off the barstool.)

Jim & Bernie came over and joined us at the bar.  Bootleg, Chaoswiz, Melissa
and I engaged them in wild stories about UFO's, hacking, the NSA & the CIA.
(Bernie alleged that he was ex-NSA, and Jim ex-CIA.  We have not yet
determined if they were acting under orders from Col. Jim Beam & Gen. Jack
Daniels.)

After the ensuing debates on the true formation of the NSA, the group broke up
and Melissa and I took off to MC Allah's room to partake of the keg he had
brought.  We walked in the room and were greeted with the sight of a four-foot
boy with a syringe sticking out of his arm.  This was a bit much, even for me.
I snatched his "medication" away from him and found that it was really only
some type of growth hormone.  The boy, 8-Ball, was actually 15 and his parents
had him on hormones to stimulate his growth.  8-Ball was totally whacked
out his mind nonetheless.  I think he had ingested such a diverse amount of
God knows what by the time we arrived that he was lucky to remember where
he was.  Later that evening he would become convinced that he was Scott
Chasin and confessed to quite a bit of wrongdoing just before he gave offerings
at the porcelain alter.

Conversations in the keg room left something to be desired.  One large hacker
named Tony looked at Melissa and in his best British accent asked if he
could fondle her breasts.  And the debate between MC Allah and Hunter about
who could drink the most alcohol reached a climax when both stuck their heads
under the keg spigot for extended periods of time.

Sometime just before 11:00 the hotel guard, attired in Raiders jacket and
a really, really big snow hat (the kind with the poofy ball on top) showed
up brandishing his paper baton, (A rolled up Houston Press).  "You all
needs to get to yaw roomz, nah.  I ain'tz ta gonna tell yaw no mo'."
Everyone looked the guard over and moved back into the keg room.  Thus was
born, "Homie da Guard."  After he wandered away, everyone moved back out
onto the porch.

It was getting late and I was supposed to speak the next morning so I tried to
get into our room.  Scott Chasin, hacker extrordinaire, had locked me out.
After beating on the door for 10 minutes, the windows for 5, the walls for 10,
and letting the phone ring for another 15 minutes I decided that Scott was a
bit too tipsy to unlock the door so I crashed out on Jesse's floor.

That night, the water pipes broke.  There was some speculation that those
evil hackers had "hacked the system."  Not.

While complaining about the lack of water that night, someone overheard
three young attendees at a bank of pay phones attempting to order up
a few escorts on "credit."  Rumor has it they were successful.

The next morning was chaos.  By the time we arrived at the conference room
there were about 150 people inside.  Louis Cypher sat at the door collecting
money for the raffle and getting everyone to sign the guest book.  Jesse
and others were setting up various video equipment and getting things
in order.  In the back of the room, Bernie sat scanning the crowd with a
super-ear, recording the conversations of those sitting.

Crunch was up in arms again.  "If everyone in here doesn't stop smoking
I won't be able to do my speech.  If you all want to hear me talk, you
will have to stop smoking."  Several more cigarettes lit up. After
speaking with management, Crunch came back in and asked if everyone smoking
would at least move to one side of the auditorium nearest the door.
With hesitation, the crowd conceded.

The conference got underway with consultant Ray Kaplan taking a census of
those in attendance.  The group ranged from under 15 to over 50, had
professionals and hobbyists, and had enthusiasts for every conceivable
type operating system.  Ray went on to elaborate on one of his audio
conferences in which an FBI officer alluded that one of their key
sources of information was "I.R.C."

Bootleg got up and spoke on the vast potentials involved with cellular
fraud.  He discussed how to monitor the reverse channel to obtain ESNs,
and where to obtain the equipment to allow you to do such a thing.  He
later handed out diskettes (IBM format) containing information on how
to reprogram cellular phones and where to obtain the equipment necessary
to pick subscriber numbers out of the air.

Up next, myself and Chasin.  Our topic was a bit obscure and cut deliberately
short due to concerns about the nature of our speech.  During the Dateline
NBC piece that featured Chasin a piece of information flashed on the screen
that alluded to UFO information stored on military computers.  Chasin
and I had gained possession of the research database compiled by the hackers
who were looking into this.  We discussed their project, the rumors surrounding
their findings and the fear surrounding the project.  Not knowing the true
details of this we declined to comment any further, but made the documentation
available to anyone who wanted a copy.  We finished our speech by answering
questions about Comsec, Consultants, etc.

Steve Ryan, a Houston lawyer with a great deal of interest in the
legal aspects of cyberspace spoke next.  He covered several of the current
issues affecting the community, spoke on laws in effect, cases pending,
and gave an insight to his background that led him to focus in on
the issues concerning the electronic community.

Next, Jim Carter gave a quick and dirty demonstration of how to monitor
electromagnetic radiation and how to do a simple data recovery from this
noise.  He monitored a small data terminal from a portable television set
that was completely unmodified.  He then spoke on how to read the
EMR from such things as plumbing, the ground, off of window panes, etc.
Jim's speech, although highly intriguing, got extremely vague at points,
especially regarding technology needed, his own background, etc.
(We will attribute this to his "CIA" training.)

The Hotel Officials showed up and demanded that everyone get out immediately.
Apparently someone had staggered into the kitchen, drunk, and broken
something.  Steve Ryan left to smooth things out a bit.  After a few minutes
he returned and told everyone that they could stay, but to keep it quiet
tonight.  Thus the secret plans of some to drive the hotel golf cart
into the pool were crushed.

The raffle proved to be an exercise in banality.  Everything from
flashing street lights to SunOS 4.1.3 to T-shirts to books were
auctioned off.  One lucky devil even got an official Michael Jackson
candy bar.

The folks from RDT (Count Zero and White Knight) handed out a large amount
of photocopied goodies such as the new "Forbes" article on hackers,
a complete set of the old 70's telephony 'zine "TEL" as well as assorted other
flyers and pamphlets.

Up next, Louis Cypher spoke about his entanglement with the law
regarding his front-page bust for counterfeiting.  He told of his
experiences with the law, how they got involved in such a dastardly
deed, what jail was like on the inside, and advice against anyone
else considering such a thing.

Up last, John Draper.  Draper had managed by this time to annoy almost
everyone at the convention.  A large portion of those in attendance
left as soon as he got up.  They were the unlucky ones.  Draper, for all his
oddities, is an intriguing speaker.  His life has been quite rich with
excitement and when he can actually focus on a subject he is captivating.
He spoke on his trip to the Soviet Union where he met computer and telephone
enthusiasts in Moscow.  He spoke on his unfortunate involvement with
Bill SF and the BART Card duplication scandal.  He spoke, with obvious
longing, of the good old days of blue boxing, and stacking tandems to
obtain local trunks, and on verification circuitry.

Listening to Draper talk really brought me back to my beginnings.  I could
hear in my head the "cachink-chink" of a tandem waiting for MF.  I remembered
stacking tandems to Europe and back to call my other line.  I remembered
the thrill of finding never before known trunks and exploring their
connections.  I fell into a deep nostalgic high, and walked up to John
to tell him thanks.  As I extended my hand to him, he mumbled something
unintelligible and wandered off.  So much for paying respect.

About ten of us took off to Chuy's for dinner:  Me, Chasin, Conflict,
Rambone, Dispater, Blue Adept, Minor Threat and reporters Joe Abernathy
and Gary Poole were among the diners.  Everyone ate heartily and listened
to cordless telephone conversations on Rogue Agent's handheld scanner.
One conversation was between what appeared to be a "pimp" talking to his
"ho" about some money owed him by another in his flock.  The conversation
drifted to the Dallas man who had terrorized an entire neighborhood some
months back with prank phone calls.  Conflict and Dispater repeated a
few of the choicest of the calls for our amusement.

Back at the hotel, Dr. Hoffman's Problem Child had escaped, and several
casualties were reported.

Conflict, Chasin and I barricaded ourselves in our room and went on a lengthy
stream of consciousness rant about what we needed out of life.  Our absolute
essentials were reduced to a small room with a computer hooked into the
Internet, a specially designed contour chair, a small hole through which
a secretary would give us food, virtual reality sex toys, and a toilet.
(Chasin suggested no toilet, but a catheter so we would never have to move.)
Gary Poole was quietly stunned in the corner of the room making mental notes.

Much of the con had moved into a suite that had been converted into a
mass computing arena.  Several attendees from Pittsburgh had turned their
room into a lab with four Unix workstations with several terminals throughout
the room including the bathroom!  These were hooked into the Internet through
a slip connection that had been rigged somewhere.  It was quite a site.
The room was usually completely packed and smelled like a smoky gymnasium.

(It was rumored that after Chasin and I spoke on the UFO conspiracy, several
hackers began their attempts at penetrating the Ames Research Lab.  No
reports back on their success.)

After I finished copying several Traci Lords video tapes (ahem) I relinquished
control of the decks to a room downstairs.  Dispater played a video
manipulation he and Scott Simpson had produced.  They had found a TRW training
video tape during a trashing run and dubbed in their own dialogue.  (You'd
have to see it to fully understand.)

After that, I played a few tapes of my own.  The first was a short film called
"Red," that chronicled the abusive prank phone calls directed at a bartender.
The film had the actual phone call tapes played with video stills.  (Guess
where the Simpsons came up with that nifty idea...)

Following "Red," someone heard on the scanner that the guard was answering
a large noise disturbance in the room we were in.  (Yes, they had the hotel
guard's 2-meter frequencies.)  Everyone moved into another room before the
guard showed up.  He was thoroughly confused.

In the next room I played the ultimate in shock, the sequel to the movie that
I had disturbed the entire con with last year, "Nekromantik II."  I won't
go into any detail, since the title says it all.  Once again, I reign as
the sickest person at HoHoCon, this honor bestowed upon me by everyone
who witnessed the showing.

As things winded down, several people ended up back in our room to waste
away the last few hours of the night.  Several people returned from an
adventure to "an abandoned hospital."  No one really understood what they went
to, but it sounded disturbing.  Later, that same group would leave to
go climb "an abandoned grain storage tower."  Go figure.

Approximately 2:00 am, a local hacker named Zach showed up.  Scott had a few
words for Zach, as did most everyone at the Con.  Zach lived in a fantasy
land where he was a top notch security consultant with high paying clients
in the telecommunications industry.  He also like to name drop names like
Chasin and Goggans as his partners and as people who would swoop down
and terrorize the people he had any problems with.  He also liked to turn
in, or threaten to turn in any of his rivals in the software pirating
community.  He also like to proposition young boys both in person and
over the phone.  At 17, Zach had a few problems.

Trapped in the corner of the room, Zach endured about an hour of questioning
and accusations (all of which he truly deserved.)  Eventually Zach left,
apparently not affected by the ordeal at all.  We attributed this to his
overly apparent schizophrenia brought on by denial of his sexual
tendencies.

Later that night the Pittsburgh gang blew out the power in their entire
wing.  One was overheard, "Hmmm...guess we should have known that when the
power strips kept melting that we were drawing too much power."

The next morning everyone gathered up their gear and said so long.  All but
a few who gathered in a room marked "the suite of the elite."  Armed with
a nitrous oxide blaster, everyone sat around and viewed the con through
the roaming video eye of Jesse, who had managed to capture everyone
in some kind of compromising position.  He will be selling them off
after he edits it a bit.  It was dubbed "The Blackmail Tape."

In my opinion this year was much less anarchistic than last year.  The
convention might not even be banished from this hotel.  (Yeah, right.)
There were no raids, there were no overtly violent or satanic acts,
no fire alarms, no trashing runs (that I saw), no fights,
and there were no strippers (alas).  The conference portion of the
event was much better organized, there was much more interesting
information to be shared, and was well worth the distances traveled by
all.

This was HoHoCon '92.

--------------------------

                 H*O*H*O*C*O*N '92

                 Frosty's Itinerary

Thursday 8pm  Take off and go bar hopping all night long to build up
              stamina for the convention.

Thrusday 10pm Quit bar hopping and waste shitloads of money at the
              casinos in feeble attempts to get gas money for the trip.

Friday   5am  Leave the casino and decide to get some sleep after spending
              hours to win a meager $10 over starting cash.

Friday   8am  Wake up and decide to pack for the trip.  Forget necessities
              that we couldn't live without.  Remember to bring junk food.

Friday   9am  Stuff assembled GCMS members into subcompact Japanese micro
              car and leech as much gas money out of them as possible.

Friday   2pm  Stop at the friendly convenient store to rob it of precious
              sugar-coated necessities and obtain mucho lotto tickets.

Friday   4pm  Endure Windrunner's gruelling multi-hour long verbatim
              rantings of taking the Purity Test 1500 verbally.

Friday   7pm  Pull out many maps and try to find the damn hotel in Houston.

Friday   9pm  Arrive at the hotel getting a room for one (car stuffed
              with people sits outside the lobby).  Request two keys.

Friday  10pm  Test the smoke machine on the hotel grounds.  Chase young
              code-kids out of your way, threatening to disable their
              phones.

Friday  11pm  Crash in room from lack of sleep.  Kick other members out
              of your way.  Ignore multiple alcoholic beverages lining
              the room.  Ponder what's sleeping in the chair briefly.

Saturday ???  Try to figure out if you're awake or dead.  Take a collection
              from those that are still alive.  Run to some micro-compact
              Japanese convenience store hidden in the middle of suburbia
              hell and obtain sugar-coated nutrients with Windrunner and
              JunkMaster and Gaijin.

Saturday 1pm  Arrive for the conference.  Get mega-amounts of raffle tickets.

Saturday 2pm  Conference actually gets started a few hours behind schedule.
              Tape conversations from the man with the whisper 2000 home
              version.  Ponder the light orbiting Erik B's head.

Saturday 4pm  Witness Steve Ryan in action against the hotel staff.
              Wonder where the young hack in the corner got the gallon,
              mostly empty now, of wine.  Ponder if he's going to spew.

Saturday 6pm  Try to figure out what everyone is going to do with the
              several hundred flashing construction lights given out.
              Calculated the ratio of men to women as 15,000:1, roughly.

Saturday 8pm  Try to keep awake while wondering how much torture can be
              sustained.  Watch Count Zero nodding off.  Hitman and I
              pulled out our decoder rings to interpret Crunch's hidden
              message.

Saturday 10pm Dominoes Pizza makes it to the room.  OUR SAVIOR !!!  He's
              5-minutes late.  Custody battle over the pizza ensues.  The
              manager is called, at which point he lowers the $50 price
              for the two pizzas down to $30.  We scrape a few dollars and
              hand the peon delivery boy some cheap beer.

Saturday Nite Hand out copies of "cindy's torment" to the code kids.
              Watch Erik B.'s continuation of necrophiliac desires on
              the acquired VCR that mysteriously appeared.  Avoided the
              hotel security by changing room while monitoring their
              frequencies (thanks RDT).  Obtained evidence that hackers
              were breaking into VR R&D departments to engage in endless
              routines of VR sex for Cyborgasmic responses.  Saw Crunch's
              host's room blow out as the multitudes of computers fry the
              circuits.  Followed the 'sheep' about the hotel.

Sunday ???    Woke bright and early to a car locked with the keys inside.
              Fortunately, 50-odd slim-jims appeared out of nowhere to
              save the day.  Windrunner chauffeured us back to our lair.

Sunday 3pm    Hacked into the Louisiana Lotto machine from an acoustical
              modem and laptop from a pay phone to rig the numbers and
              then bought a ticket.

Sunday 7pm     Returned to hell.  Lost the lotto ticket in the growing
               pile of sugar-coated necessities sheddings.  Cursed.

Sunday 8pm     Turned the PC on and hit the networks.


--------------------------

Jim Carter, president of Bank Security in Houston, TX, wrote the
following impressions of HoHoCon for Security Insider Report
(December, 1992)

HoHoCon was in fact "Unphamiliar Territory" for this "good ole boy,"
but it didn't take long till I was into the swing of things and
telling lies of how we cheat and steal to get our information.  Of
course, everyone who talked to this "good ole boy" thought he was with
one of the three letter agencies.  As the stories rolled on about what
they (the hackers) could do, such as produce virii that would cause
video display terminals and hard drives to smoke, I had to sit back, sip
my brewski and say "wow."  We sat back, enjoyed a few more rounds, told
a few more lies and had a good time.

Well, this old boy didn't show until about noon on Saturday.  Of course
the conference hadn't started yet so we didn't miss anything.  The
program was kicked off with a number of questions about who, what, where
and how.  It was difficult to determine how many people were there since
the room was packed like a can of sardines.  Our estimate was over two
hundred, not counting the hackers still in their rooms.  Was this
another drunken free for all, as in the past?  A report was given on
cellular hacking and toll fraud.  Hackers' rights were presented by an
attorney.  Also discussed was the stupidity of the press and law
enforcement.

Some others talked about suppressed information from the federal
government concerning UFO's and how hackers are gaining this info.  And
of course the White House wants to know their sources.

Hand outs were given including virii and virus source code.  I did
decline any virii, but who knew what I would get before this was over.
I believe this was the most responsive and gratifying group I have
spoken to this year.  I also expect to get more business because of this
presentation than any other this year.

A lengthy door prize was held in which I was the winner of more virii.
Again, I did decline, but passed the winning ticket on.  Captain Crunch
was the final speaker.  In conclusion, the attendees were the good, the
bad and the ugly.  We did find HoHoCon very informative and, yes, we
will attend again.  In closing, I hope each and everyone had a very
"Merry HoHoCon."


--------------------------

A (Hacker's) Mind is a Terrible Mind to Waste
Unix World, page 136, March 1993

by Gary Andrew Poole

[Unix World wanted MONEY to reprint this in full...Yeah, right.
 Someone already posted it on alt.cyberpunk some time ago
 if you can't find it anywhere.]

*-----------------------------------*

 Various Stuff Picked up at HoHoCon

*-----------------------------------*

--------------------------
Flyer:
--------------------------

Unphamiliar Territory
Phalcon/Skism Western World Headquarters
The Ghost in The Machine Distribution

Featuring:

- 'Neutral Territory' forum where security issues can be discussed with
top security people in the field.

- Completely LEGAL forums on computer security, hacking, phraud.

- Thousands of textfiles covering all aspects of the underground.

- Hundreds of viruses and virus source code for the serious
programmer.

Information:

- Administrators are Invalid Media, Mercury/NSA, Warlock Bones and
Jaeger.

- Run on a professor Falken/LOD donated ZOOM v32bis

- Mentioned in MONDO 2000 and reviewed in the latest Infoworld.

- Dialin 602-894-1757 / 24 hours

--------------------------
Flyer
--------------------------

In your defense..... Courtesy Freeside Orbital Data Network, HoHoCon '92
                                       - B. O'Blivion
Repeat after me:

    "If I am reading this to you, then I believe that you are
questioning, detaining, or arresting me, or searching my person or
possessions in the course of your official duties."

    "I do not consent to any search of seizure of any part of my person
or property, nor to any property of others under my control.  I do not
consent to any person's examination, search, or removal of any
information storage equipment or media in my possession.  You are hereby
notified that such information storage equipment or media contain
private written and electronic mail, confidential communications, and
other material protected under the Electronic Communications Privacy Act
and other statutes."

    "I respectfully decline to answer any questions beyond confirmation
of my identity, and require access to legal counsel immediately.  I
demand that access to legal counsel be provided to me before any
questioning takes place.  I will answer no questions nor give any
information outside the presence of legal counsel.  All requests for
interviews, statements, consents, or information of any sort should be
addressed to me through my attorney.  I invoke the rights five to me by
the Fifth and Sixth Amendments of the Constitution of the United
States."

    "I further notify you that the speech and information contained on
information storage and handling devices at this site are protected
by the First and Fourth Amendments to the Constitution of the United
States, and that any unlawful search or seizure of these items or of
the information they contain will be treated as a violation of the
Constitutional rights of myself and other users of these devices and
media."

    "I further notify you that any such violations of any person's legal
or Constitutional rights which are committed at any time, by any person,
will be the subject of civil legal action for all applicable damages
sustained.  I require that at this time all officers participating in
this illegal search, seizure, or arrest identify themselves at this time
by name and badge number to me and my legal counsel."

[Include if applicable]

    "I further notify you that I am a Computer System Operator providing
private electronic mail, electronic publications, and personal
information storage services to users in this State, and among the
United States.  Any person causing a breach of the security of, or
violation of the privacy of, the information and software herein will be
held liable for all civil damages suffered by any and all users
thereof."

--------------------------
Flyer
--------------------------

HoHoCon 1992
Amusing Local Frequencies
courtesy of -=RDT.

Allen Park Inn Security - 464.500           Houston Post - 154.540
                                                           173.275

                                                           452.975
Houston Police:

North Shepherd Patrol - 460.325
NE Patrol - 460.125
SE Patrol - 460.025
SW Patrol - 460.050
Central Patrol - 460.100
Spec. Op. Traffic - 460.350
Car 2 Car - 460.225
South Central Patrol - 460.550
NW Patrol - 460.475
West Patrol - 460.150
Accident - 460.375
Misc - 460.525
       460.575
       460.400
Records - 460.425
City Marshalls - 453.900
Paging - 155.670
Police Intercity - 453-550

  A number of people have been asking "who is RDT?  what the hell is
RDT?"  For the record, we're hackers who believe information should be
free.  All information.  The world is full of phunky electronic gadgets
and networks, and we want to share our information with the hacker
community.  We currently write for 2600 magazine, Phrack, Mondo 2000,
Cybertek, and Informatik.
  The five "charter members" of RDT are Count Zero, Brian Oblivion,
Magic Man, White Knight, and Omega.  Each of us has complementary
skills, and as a group we have a very wide area of technical
knowledge.  Feel free to contact us.

Count Zero - count0@ganglia.mgh.harvard.edu
                         Brian Oblivion - oblivion@ganglia.mgh.harvard.edu
Magic Man - magic@ganglia.mgh.harvard.edu
                         White Knight - wknight@ganglia.mgh.harvard.edu
                         Omega - omega@spica.bu.edu

"They are satisfying their appetite to know something that is not theirs
to know."   - Asst. District Attorney Don Ingraham

"All-you-can eat buffet...for FREE!"  - Restricted Data Transmissions

RDT  "Truth is Cheap, but Information Costs."

--------------------------
Magazine
--------------------------

Future Sex

(a very odd pseudo-cyberpunk skin mag)

4 issues for $18, Canada $26, International US $48

1095 Market Street
Suite 809
San Francisco, CA 94103
415-621-5496
415-621-4946 fax

--------------------------
Video
--------------------------

Red  $19.95
(Phone Pranks can kill)

Nekromantik II $29.95
(No comment)

Available through

Film Threat Video
P.O. Box 3170
Los Angeles, CA
90078-3170 USA

818-848-8971

Shipping:  1 tape  $3.40
           2-3     $4.60
           4-6     $5.80
           6+      $7.00

Visa/MC accepted.

--------------------------
Official HoHoCon Crud
--------------------------


                                HoHoCon '92

                        Product Ordering Information


    If you are interested in obtaining either HoHoCon shirts or videos,
                 please contact us at any of the following:

                            drunkfux@cypher.com
                             hohocon@cypher.com
                               cDc@cypher.com
                            dfx@nuchat.sccsi.com
                      drunkfux@ganglia.mgh.harvard.edu
                            359@7354 (WWIV Net)

                       Freeside Orbital Data Network
                             ATTN: dFx/HoHoCon
                       11504 Hughes Road  Suite #124
                               Houston, Texas
                                   77089

                         713-866-4884 (Voice Mail)


     The shirts are $15 plus $2 shipping ($2.50 for two shirts). At this
     time, they only come in extra large. We may add additional sizes if
     there is a demand for them. The front of the shirt has the following
     in a white strip across the chest:


                                I LOVE FEDS

       (Where LOVE = a red heart, very similar to the I LOVE NY logo)


                           And this on the back:

                             dFx & cDc Present

                                HOHOCON '92

                               December 18-20
                               Allen Park Inn
                               Houston, Texas


     There is another version of the shirt available with the following:

                                I LOVE WAREZ

     The video includes footage from all three days, is six hours long and
     costs $18 plus $2 shipping ($2.50 if purchasing another item also).
     Please note that if you are purchasing multiple items, you only need
     to pay one shipping charge of $2.50, not a charge for each item. If
     you wish to send an order in now, make all checks or money orders
     payable to O.I.S., include your phone number and mail it to the street
     address listed above. Allow ten working days for arrival.

     Thanks to everyone who attended and supported HoHoCon '92. Mail us if
     you wish to be an early addition to the HoHoCon '93 (December 17-19)
     mailing list.

--------------------------
Text File
--------------------------

Rumors have begun to surface about a group of hackers who were involved in a
project to uncover information regarding the existence of UFOs.  The
most public example pertaining to this alleged project was seen on
Dateline NBC on the screen of the mystery hacker "Quentin."

The story goes that this group of individuals decided to put their
skills to work on a project that, if successful, would add legitimacy to
the hacking process by uncovering information on what has been called the
greatest cover-up in the history of the world.  Milnet TAC ID cards
were obtained through military officials sympathetic to the cause. Several
sites and networks were targeted that had in the past been linked to UFO
activity.  These were sites like the Jet Propulsion Laboratory, Sandia Labs,
TRW Space Research, American Institute of Physics, and various other
educational, government and military sites.

The rumors also emphasize that several sites had what these individuals
called "particularly heavy security."  Within several seconds after
connection had been established, system administrators of sites used in
this project were contacted.  Further rumors state that there was
information regarding a propulsion system designed utilizing what is
termed "corona discharge" being analyzed at one site.  The most sinister
of all rumors states that one particular participant who was allegedly
deeply immersed in TRWs internal network has not been heard from since
uncovering data regarding a saucer being housed at one of their Southern
California installations.

Believe what you will about the reality of this project.  Much will be
dismissed as hacker lore, but within the core of every rumor lies a
grain of truth.

Are we being lied to?  Why is this information still classified by the NSA?
What are they hiding from us behind a maze of security?  Will we continue
to stand idly by and let an uncaring and deliberately evasive government
shield us from what may be the most important, and potential dangerous
news to ever surface?  Information wants to be free, and only a
concerted group effort can make this happen.  How much do you really
want to know about what is really going on?

What follows is information that has been released regarding this project...

---------------------------------------------------------------------------

PROJECT ALF-1

A Planetary Effort

TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET
TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET

These are the raw data.  Where comments are appropriate, they
will be included.  The data will be grouped together with dates,
names etc. to make correlations easier.

There are countless references to the aliens, their down space
craft and what the Government is doing with them.
If, as is supposed, the research on the craft and the 'ufonauts'
continues today, then undoubtedly there are computer records, somewhere.

I. Searching the Skies; Tripping the Electronic Fence around the
USA.

US Space Command Space Surveillance Center, Cheyenne Mountain,
Colorado Springs, Box Nine (Electronic Surveillance Room)
(This is where they search for and track UFO activity.)
U.S. Naval Space Surveillance System, Dahlgreen, Virginia, (Main
computer), Lake Kickapoo, Texas (listening post): Search for
'Flash Traffic'
Commander Sheila Mondran
CINC-NORAD
Space Detection and Tracking System
Malabar, Forida
'Teal Amber' search
National Military Command Center - Pentagon
(These are the areas where UFO activity is tracked.
There is a radar shield around the country that is 'tripped' by UFO's.
All tracking and F14 scrambling is done through this system.)

II. The Second Cover Up

Defense Intelligence Agency
Directorate for Management and Operations
Project Aquarius (in conjunction with SRI)

Colonel Harold E. Phillips, Army (where/what Feb. 1987)
UFO Working Group, (formed Dec 1987)
Major General James Pfautz, USAF, Ret. (March 87)
US Army experiments -(Monroe Institute, Faber, VA)
Major General Albert Stubblebine
Capt. Guy Kirkwood,
(thousands of feet of film of UFO's catalogued and on record somewhere.)
The UFO Working Group was formed because one arm of the Govt doesn't
know what the other is doing.)

III. National Security

NSA NAtional Security Agency, Dundee Society (Super secret elite
who have worked on UFO's.)
NSA - Research and Engineering Division
NSA - Intercept Equipment Division

Kirtland Force Base, Office of Special Investigations, Project
Beta. 1979-83-?  (Sandia Labs are here.)
Paul Bennewitz
Project Blue
Project Blue Book

(NSA computers do analysis for Pentagon.)

IV. More Secret Players

NASA, Fort Irwin, Barstow, CA
NASA Ames Research Center, Moffet Field Naval Base
SETI
State Dept. Office of Advanced Technology
Any Astronauts from Mercury, Gemini and Apollo
CIA - Office of Scientific Investigation
CIA - Domestic Collection Division

(NASA has known about UFO's since the astronauts saw and photoed them.
Records somewhere.)

V.  Dealing with the Secret

MJ-12 (1952)
Majectic 12
Operation Majestic 12
MAJIC-12
Admiral Roscoe H. Hillenkoetter
Dr. Vannevar Bush
Dr. Detlev Bronk
Dr. Jerome Hunsaker
Dr. Donald Menzel
Dr. Lloyd Berkner
General Robt. Montague
Sidney Souers
Gordon Gray
General Hoyt Vandenberg
Sect State James Forrestal
General Nathan Twining
Pres. Truman
Pres. Eisenhower

(One of the biggest secrets ever.)

Nevada Desert, Area 51, S4 (houses UFO's)
(Robert Lazar talked!) 9 space ships on storage. Propulsion by
corona discharge.

(Area 51 is the most protected base on the planet.)

VI. ROSWELL, NM Crashes
Mac Brazel (farmer)
Major Jesse A. Marcel
509th. Bomber Group
Lewis Rickett, CIC Officer
Colonel William Blanchard
Gerald Anderson, witness to crash and aliens

Wright Patterson Air Force Base, (parts lists of UFO's catalogued;
autopsies on record) (Bodies in underground facility)
Foreign Technology Building
USAAF (United States Army Air Force reports: "Early Automation"
Muroc, CA (Base with UFO's for study)

(1 saucer with 4 aliens.  They were transported to Wright and then
saved, catalogued and autopsied.)


VII. THOSE ON GOVT SHIT LIST

(People who have gotten close.)

Robert Lazar
Major Donald Keyhoe
William Moore
Stanton Friedman
Jaime Shandera
Whitley Streiber
Timothy Goode, UK

Other UFO Crashes
Del Rio, TX 12/50, Colonel Robert Willingham
Las Vegas, 4/18/62
Kecksburg, PA 12/9/65


VIII. International

Belgian Air Force.  (They are going public and have records.
Press conference held 7/12/91.)
Australian Air Force
UK; GCHQ
British Air Force
Belgium:
NATO Radar Stations


IX. UFO Civilian Groups. (What do they really know?)

NICAP, National Investigations Committee on Aerial Phenomena
(private company.)

APRO, Tucson, AZ (Aerial Phenomona Research Organization,
private company.)

MUFON Mutual UFO Network

X. GENERAL

Kenneth Arnold, June 24, 1947
Cattle and Sheep Mutilations
General and Pres. Eisenhower, (private files and library)
President Truman
Wright Field or Wright Patterson Air Force Base, Dayton, OH, (Air
Force Foriegn Technology Division)
USAF Project Saint
USAF Project Gemini
Project Moon Dust
Project Sign
Project Grudge
General Hoyt Vandenberg (1940-1960)
Air Force Regulation 200-2 (8/12/54)
Holloman AFB, NM
Roswell, NM July 7, 1947


XI. Possible Searches

Presidential Libraries
Old USAAF, (United States Army Air Force)
NASA
Astronaut Frank Borman, Gemini 7, pictures of UFO
Neil Armstrong, Apollo 11, saw UFO's on moon.
Colonel Gordon Cooper saw a bunch of them
James McDivitt, 6/66
United Nations
NATO;
General Lionel Max Chassin, French Air Force
Star Wars, United Kingdom, 23 scientists killed in 6 years.
Gulf Breeze, FL
Additional UFO records at NSA, CIA, DIA,  FBI


Good Searching.

----------------------------------------------------------------------
                    Project
                ->Green Cheese<-
                   Data Base
---------------------------------------------------------------------
Holloman AFB
   Location: New Mexico.  Preconceived landing 15 years ago.

DDN Locations:
--------------

NET : 132.5.0.0 : HOLLOMAN :

GATEWAY : 26.9.0.74, 132.5.0.1 : HOLLOMAN-GW.AF.MIL : CISCO-MGS :: EGP,IP/GW :
GATEWAY : 26.9.0.74, 132.5.0.1 : HOLLOMAN-GW.AF.MIL : CISCO-MGS :: EGP,IP/GW :

HOST : 26.10.0.74 : HOLLOMAN-TG.AF.MIL : VAX-8650 : VMS : TCP/FTP,TCP/TELNET,TCP
       SMTP :

HOST : 26.6.0.74 : HOLLOMAN-AM1.AF.MIL : WANG-VS100 : VSOS : TCP/TELNET,TCP/FTP,
       TCP/SMTP :

Host: DDNVAX2.6585TG.AF.MIL
      156.6.1.2

-----------------------------------------------------------------------

Kirtland Air Force Base
    Office Of Special Investigations.  Sandia Labs are here. Also part of
    NSA Intercept Equipment Division.

Key Words/names:
----------------
Sandia Labs
Project Beta (1979-83-?)
Paul Bennewitz
Project Blue
Project Blue Book

DDN Locations:
--------------

NET : 131.23.0.0 : KIRTLAND-NET :
NET : 132.62.0.0 : KIRTLAND2 :
GATEWAY : 26.17.0.48, 131.23.0.1 : KIRTLAND2-GW.AF.MIL,KIRTLAND-GW.AF.MIL
        : CISCO-MGS : UNIX : IP/GW,EGP :
GATEWAY : 26.18.0.87, 132.62.0.1
        : KIRTLAND1-GW.AF.MIL,KIRTLAND1606ABW-GW.AF.MIL : CISCO-MGS :
        : EGP,IP/GW :
HOST : 26.0.0.48 : KIRTLAND.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
HOST : 26.0.0.87 : KIRTLAND2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
HOST : 26.6.0.87 : KIRTLAND-AM1.AF.MIL : WANG-VS300 : VS ::

-----------------------------------------------------------------------

NASA
   What can I say about NASA that you couldnt guess for yourself....
   (Except that the following sights are SPECIFIC NASA sights, not
   just randomly suspected sights).

DDN locations:
--------------

Fort Irwin, Barstow, CA:
-----------------------
NET : 134.66.0.0 : IRWIN :
NET : 144.146.0.0 : FTIRWIN1 :
NET : 144.147.0.0 : FTIRWIN2 :
GATEWAY : 26.24.0.85, 26.7.0.230, 144.146.0.1, 144.147.0.0
        : FTIRWIN-GW1.ARMY.MIL : CISCO-GATEWAY : CISCO : IP/GW,EGP :
HOST : 26.14.0.39 : IRWIN-ASBN.ARMY.MIL : NCR-COMTEN-3650 : COS2 ::
HOST : 26.13.0.85 : FTIRWIN-AMEDD.ARMY.MIL : ATT-3B2-600G : UNIX
     : TCP/FTP,TCP/SMTP,TCP/TELNET :
HOST : 26.14.0.85 : FTIRWIN-IGNET.ARMY.MIL : DATAPOINT-8605 : RMS ::
HOST : 26.15.0.85 : IRWIN-EMH1.ARMY.MIL,FTIRWIN-EMH1.ARMY.MIL : SPERRY-5000
     : UNIX : TCP/FTP,TCP/SMTP,TCP/TELNET :

Moffet Field Naval Base (Ames Research Center):
-----------------------------------------------
GATEWAY : 26.20.0.16, 192.52.195.1 : MOFFETT-FLD-MB.DDN.MIL,AMES-MB.DDN.MIL
        : C/70 : CHRYSALIS : IP/GW,EGP :
HOST : 26.0.0.16 : MOFFETT.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :

-----------------------------------------------------------------------
Pentagon (National Military Command Center)
    One of many places in charge of tracking UFO activity.

Possible DDN sights:
-------------------

GATEWAY : 26.9.0.26, 134.205.123.140 : PENTAGON-GW.HQ.AF.MIL : CISCO-AGS :
        : EGP,IP/GW :
GATEWAY : 26.25.0.26, 131.8.0.1 : PENTAGON-GW.AF.MIL,HQUSAFNET-GW.AF.MIL
        : CISCO-MGS :: IP/GW,EGP :
GATEWAY : 26.10.0.76, 192.31.75.235 : PENTAGON-BCN-GW.ARMY.MIL : SUN-360
        : UNIX : IP/GW,EGP :
GATEWAY : 26.26.0.247, 192.31.75.1 : PENTAGON-GW.ARMY.MIL : SUN-3/160
        : UNIX : EGP,IP/GW :
GATEWAY : 26.31.0.247, 26.16.0.26, 141.116.0.1 : PENTAGON-GW1.ARMY.MIL
        : CISCO : CISCO : IP/GW,EGP :
HOST : 26.0.0.26 : PENTAGON.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
HOST : 26.24.0.26 : OPSNET-PENTAGON.AF.MIL : VAX-8500 : VMS
     : TCP/TELNET,TCP/FTP,TCP/SMTP :
HOST : 26.10.0.76, 192.31.75.235 : PENTAGON-BCN.ARMY.MIL : SUN-360 : UNIX
     : TCP/FTP,TCP/SMTP,TCP/TELNET :
HOST : 26.0.0.247 : PENTAGON2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
HOST : 26.7.0.247 : PENTAGON-AMSNET.ARMY.MIL : AMDAHL : MVS
     : TCP/TELNET,TCP/FTP :
HOST : 26.14.0.247 : NSSC-PENTAGON.NAVY.MIL : ALTOS-3068A : UNIX
     : TCP/FTP,TCP/TELNET,TCP/SMTP :
HOST : 26.18.0.247 : PENTAGON-EMH4.ARMY.MIL : SPERRY-5000/80 : UNIX
     : TCP/TELNET,TCP/FTP,TCP/SMTP :
HOST : 26.26.0.247, 192.31.75.1 : PENTAGON-AI.ARMY.MIL : SUN-3/160 : UNIX
     : TCP/TELNET,TCP/FTP,TCP/SMTP,TCP/FINGER :

-----------------------------------------------------------------------

Raddaman
   Location of infamous building 18a.  Suspected saucers and others?

DDN location, yet unknown.

------------------------------------------------------------------------

SECI
     ?

DDN Locations:
--------------

NET : 192.108.216.0 : ARC-SETI-NET :

------------------------------------------------------------------------

Utah Locations:

GATEWAY : 26.18.0.20, 131.27.0.1 : HILL-GW.AF.MIL,HILLAFBNET-GW.AF.MIL
       : CISCO-MGS :: IP/GW,EGP :

GATEWAY : 26.18.0.20, 131.27.0.1 : HILL-GW.AF.MIL,HILLAFBNET-GW.AF.MIL
        : CISCO-MGS :: IP/GW,EGP :

HOST : 26.5.0.20 : HILL.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
HOST : 26.0.0.99 : HILL2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
HOST : 26.12.0.99 : HILL-AM1.AF.MIL : WANG-VS100 : VS
     : TCP/TELNET,TCP/FTP,TCP/SMTP :

-------------------------------------------------------------------------

Wright Patterson AFB
 Catalogued UFO parts list.  Autopsies on record.  Bodies located in
 underground facility of Foreign Technology Building.

DDN Locations:
--------------

HOST : 26.0.0.47 : WRIGHTPAT.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
HOST : 26.8.0.123 : WRIGHTPAT2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
HOST : 26.0.0.124 : WRIGHTPAT3.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
HOST : 26.3.0.170 : WAINWRIGHT-IGNET.ARMY.MIL : CONVERGENT-TECH-CN-100
     : CTOS ::
HOST : 26.0.0.176 : WRIGHTPAT4.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :

-------------------------------------------------------------------------

Nevada:

NET : 131.216.0.0 : NEVADA :

-------------------------------------------------------------------------

Random Suspected Nets:

WIN:
  Top Secret Network.  All coordinator's have last name Win.

NET : 141.8.0.0  : DFN-WIN8  : NET : 141.9.0.0  : DFN-WIN9  :
NET : 141.10.0.0 : DFN-WIN10 : NET : 141.15.0.0 : DFN-WIN15 :
NET : 141.25.0.0 : DFN-WIN25 : NET : 141.26.0.0 : DFN-WIN26 :
NET : 141.28.0.0 : DFN-WIN28 : NET : 141.57.0.0 : DFN-WIN57 :
NET : 141.58.0.0 : DFN-WIN58 : NET : 141.59.0.0 : DFN-WIN59 :
NET : 141.60.0.0 : DFN-WIN60 : NET : 141.61.0.0 : DFN-WIN61 :
NET : 141.62.0.0 : DFN-WIN62 : NET : 141.63.0.0 : DFN-WIN63 :
NET : 141.64.0.0 : DFN-WIN64 : NET : 141.65.0.0 : DFN-WIN65 :
NET : 141.66.0.0 : DFN-WIN66 : NET : 141.67.0.0 : DFN-WIN67 :
NET : 141.68.0.0 : DFN-WIN68 : NET : 141.69.0.0 : DFN-WIN69 :
NET : 141.70.0.0 : DFN-WIN70 : NET : 141.71.0.0 : DFN-WIN71 :
NET : 141.72.0.0 : DFN-WIN72 : NET : 141.73.0.0 : DFN-WIN73 :
NET : 141.74.0.0 : DFN-WIN74 : NET : 141.75.0.0 : DFN-WIN75 :
NET : 141.76.0.0 : DFN-WIN76 : NET : 141.77.0.0 : DFN-WIN77 :
NET : 141.78.0.0 : DFN-WIN78 : NET : 141.79.0.0 : DFN-WIN79 :
NET : 141.80.0.0 : DFN-WIN80 : NET : 141.81.0.0 : DFN-WIN81 :
NET : 141.82.0.0 : DFN-WIN82 : NET : 141.83.0.0 : DFN-WIN83 :
NET : 141.84.0.0 : DFN-WIN84 : NET : 141.85.0.0 : DFN-WIN85 :
NET : 141.86.0.0 : DFN-WIN86 : NET : 141.87.0.0 : DFN-WIN87 :
NET : 141.88.0.0 : DFN-WIN88 : NET : 141.89.0.0 : DFN-WIN89 :
NET : 141.90.0.0 : DFN-WIN90 : NET : 141.91.0.0 : DFN-WIN91 :
NET : 141.92.0.0 : DFN-WIN92 : NET : 141.93.0.0 : DFN-WIN93 :
NET : 141.94.0.0 : DFN-WIN94 : NET : 141.95.0.0 : DFN-WIN95 :
NET : 141.96.0.0 : DFN-WIN96 : NET : 141.97.0.0 : DFN-WIN97 :
NET : 141.98.0.0 : DFN-WIN98 : NET : 141.99.0.0 : DFN-WIN99 :
NET : 188.1.0.0  : WIN-IP    : NET : 192.80.90.0 : WINDATA  :

-----------------------------------

Scinet:
      Sensitive Compartmented Information Network

NET : 192.12.188.0 : BU-SCINET :

-----------------------------------

Disnet:
      Defense Integrated Secure Network.  Composed of SCINET, WINCS
      ([World Wide Military and Command Control System] Intercomputer
      Network Communication Subsystem), and Secretnet(WIN).

NET : 22.0.0.0 : DISNET :

-----------------------------------