| ==Phrack Magazine== | |
| Volume Four, Issue Forty-Two, File 13 of 14 | |
| HoHoCon 1992 | |
| Miscellany | |
| The hackers were getting nervous. It was understandable. Just a few weeks | |
| before HoHoCon and already two other "get-togethers" had experienced | |
| turbulence from the authorities. | |
| Rumors began to fly that HoHo was to be the next target. Messages bearing | |
| ill-tidings littered the underground. Everyone got worked into a frenzy about | |
| the upcoming busts at HoHoCon. People began to cancel their reservations | |
| while others merely refused to commit one way or the other. | |
| But, amidst all the confusion and hype, many declared "Let them try to | |
| raid us! I'm going anyway!" These were the few, the proud...the stupid. | |
| ------------------------------------------------------------------------------- | |
| HoHoCon as I saw it - Erik Bloodaxe (Chris Goggans) | |
| I arrived at the Allen Park Inn in the mid afternoon on Friday the 18th. | |
| I was promptly greeted by several of my cohorts and a loping transient | |
| who introduced himself as "Crunchhhhhhhhh." Yes, John Draper, the infamous | |
| Captain Crunch had actually ventured outward to attend our little party. | |
| (Yes, Virginia, the rumors are true: The Captain is toothless, unkempt, | |
| overbearing and annoying as all hell.) | |
| I followed Scott Chasin back to our room, the pack of other early arrivals | |
| in close file behind. After storing my gear I noticed that Draper was | |
| looming in the doorway ranting furiously about all the smoking in our room. | |
| "I've never heard of a hacker who smoked," exclaimed the Captain. | |
| Taking this as my cue, I bummed a Djarum off of Crimson Death and took great | |
| glee in adding my fumes to the enveloping fog. | |
| Draper spent the next 30 minutes attempting to eavesdrop on various | |
| conversations in which various old friends were catching up. Not knowing | |
| any of us personally, he nonetheless felt obligated to offer his comments | |
| about our discussions about life and college and music amidst his coughing | |
| and complaining about the smoke. | |
| After some time everyone was banished from the room and several of us | |
| went out to eat. Scott Chasin, myself, two hackers (The Conflict, & Louis | |
| Cypher) along with Gary Poole (covering the entire mess for Unix World) took | |
| off for the nearest grease pit. Taco Bell won in proximity, and once | |
| surrounded by burritos Scott, Conflict and I began our rant about Unix | |
| Security (the lack thereof). Gary whipped out his Unix World pen and pad | |
| and began taking notes. I am uncertain whether or not it was the content | |
| of our spiel or the asides I repeatedly made regarding the bevy of giggling | |
| coeds that garnered the most notes in Gary's booklet. | |
| Back at the Con things were spicing up. More people had begun to arrive | |
| and the Allen Park Inn staff began to worry about their safety and that of | |
| their other guests. One remarked to Jesse (Drunkfux), the sponsor of HoHoCon, "That Draper | |
| fellow needs to stay out of the lobby. He was eating large | |
| amounts of flesh off his hands and it was scaring some of the visitors." | |
| The staff did not know what to think at all when a father arrived with his | |
| three sons and after purchasing a room on his credit card told the boys, "Ok | |
| guys, Mom will be picking you up on Sunday." | |
| This did not concern most of us. It was straight to the bar | |
| for us, where Rambone bought Scott & myself a round of Kamikazes. Also at | |
| the bar was Bootleg who had just gotten out. (Of what, and for what you | |
| can find out on your own.) Bootleg is probably the smartest biker I have | |
| ever had the pleasure to meet. We talked about sex, drugs, hawgs, computers, | |
| cellular fraud and how close the nearest cabaret was. | |
| A small controversy began to arise amidst the hackers at the bar. Stationed | |
| near one end of the room was a table lined with older men. "FEDS," someone | |
| murmured, gesturing at the group. | |
| "Good for them," I said, and left the bar to look for Jesse. When I returned | |
| several minutes later the hackers had engaged the strangers in conversation | |
| and found that they weren't feds after all. Among this group were | |
| Jim Carter of Houston-based Bank Security, and Bernie Milligan of | |
| Communications & Toll Fraud Specialists, Inc. Once this news was out | |
| tensions eased and everyone continued with their libations. | |
| Suddenly I became aware that there was girl in the room. I had seen her out | |
| in the courtyard previously but now she was alone. Turning on my | |
| "Leisure Suit Larry" charm I grabbed the seat next to her. Melissa had arrived | |
| from Austin to cover the event for Mondo-2000. She surprised me by telling | |
| me that she knew who I was, where I worked, and even knew my extension number. | |
| (I almost fell off the barstool.) | |
| Jim & Bernie came over and joined us at the bar. Bootleg, Chaoswiz, Melissa | |
| and I engaged them in wild stories about UFO's, hacking, the NSA & the CIA. | |
| (Bernie alleged that he was ex-NSA, and Jim ex-CIA. We have not yet | |
| determined if they were acting under orders from Col. Jim Beam & Gen. Jack | |
| Daniels.) | |
| After the ensuing debates on the true formation of the NSA, the group broke up | |
| and Melissa and I took off to MC Allah's room to partake of the keg he had | |
| brought. We walked in the room and were greeted with the sight of a four-foot | |
| boy with a syringe sticking out of his arm. This was a bit much, even for me. | |
| I snatched his "medication" away from him and found that it was really only | |
| some type of growth hormone. The boy, 8-Ball, was actually 15 and his parents | |
| had him on hormones to stimulate his growth. 8-Ball was totally whacked | |
| out his mind nonetheless. I think he had ingested such a diverse amount of | |
| God knows what by the time we arrived that he was lucky to remember where | |
| he was. Later that evening he would become convinced that he was Scott | |
| Chasin and confessed to quite a bit of wrongdoing just before he gave offerings | |
| at the porcelain alter. | |
| Conversations in the keg room left something to be desired. One large hacker | |
| named Tony looked at Melissa and in his best British accent asked if he | |
| could fondle her breasts. And the debate between MC Allah and Hunter about | |
| who could drink the most alcohol reached a climax when both stuck their heads | |
| under the keg spigot for extended periods of time. | |
| Sometime just before 11:00 the hotel guard, attired in Raiders jacket and | |
| a really, really big snow hat (the kind with the poofy ball on top) showed | |
| up brandishing his paper baton, (A rolled up Houston Press). "You all | |
| needs to get to yaw roomz, nah. I ain'tz ta gonna tell yaw no mo'." | |
| Everyone looked the guard over and moved back into the keg room. Thus was | |
| born, "Homie da Guard." After he wandered away, everyone moved back out | |
| onto the porch. | |
| It was getting late and I was supposed to speak the next morning so I tried to | |
| get into our room. Scott Chasin, hacker extrordinaire, had locked me out. | |
| After beating on the door for 10 minutes, the windows for 5, the walls for 10, | |
| and letting the phone ring for another 15 minutes I decided that Scott was a | |
| bit too tipsy to unlock the door so I crashed out on Jesse's floor. | |
| That night, the water pipes broke. There was some speculation that those | |
| evil hackers had "hacked the system." Not. | |
| While complaining about the lack of water that night, someone overheard | |
| three young attendees at a bank of pay phones attempting to order up | |
| a few escorts on "credit." Rumor has it they were successful. | |
| The next morning was chaos. By the time we arrived at the conference room | |
| there were about 150 people inside. Louis Cypher sat at the door collecting | |
| money for the raffle and getting everyone to sign the guest book. Jesse | |
| and others were setting up various video equipment and getting things | |
| in order. In the back of the room, Bernie sat scanning the crowd with a | |
| super-ear, recording the conversations of those sitting. | |
| Crunch was up in arms again. "If everyone in here doesn't stop smoking | |
| I won't be able to do my speech. If you all want to hear me talk, you | |
| will have to stop smoking." Several more cigarettes lit up. After | |
| speaking with management, Crunch came back in and asked if everyone smoking | |
| would at least move to one side of the auditorium nearest the door. | |
| With hesitation, the crowd conceded. | |
| The conference got underway with consultant Ray Kaplan taking a census of | |
| those in attendance. The group ranged from under 15 to over 50, had | |
| professionals and hobbyists, and had enthusiasts for every conceivable | |
| type operating system. Ray went on to elaborate on one of his audio | |
| conferences in which an FBI officer alluded that one of their key | |
| sources of information was "I.R.C." | |
| Bootleg got up and spoke on the vast potentials involved with cellular | |
| fraud. He discussed how to monitor the reverse channel to obtain ESNs, | |
| and where to obtain the equipment to allow you to do such a thing. He | |
| later handed out diskettes (IBM format) containing information on how | |
| to reprogram cellular phones and where to obtain the equipment necessary | |
| to pick subscriber numbers out of the air. | |
| Up next, myself and Chasin. Our topic was a bit obscure and cut deliberately | |
| short due to concerns about the nature of our speech. During the Dateline | |
| NBC piece that featured Chasin a piece of information flashed on the screen | |
| that alluded to UFO information stored on military computers. Chasin | |
| and I had gained possession of the research database compiled by the hackers | |
| who were looking into this. We discussed their project, the rumors surrounding | |
| their findings and the fear surrounding the project. Not knowing the true | |
| details of this we declined to comment any further, but made the documentation | |
| available to anyone who wanted a copy. We finished our speech by answering | |
| questions about Comsec, Consultants, etc. | |
| Steve Ryan, a Houston lawyer with a great deal of interest in the | |
| legal aspects of cyberspace spoke next. He covered several of the current | |
| issues affecting the community, spoke on laws in effect, cases pending, | |
| and gave an insight to his background that led him to focus in on | |
| the issues concerning the electronic community. | |
| Next, Jim Carter gave a quick and dirty demonstration of how to monitor | |
| electromagnetic radiation and how to do a simple data recovery from this | |
| noise. He monitored a small data terminal from a portable television set | |
| that was completely unmodified. He then spoke on how to read the | |
| EMR from such things as plumbing, the ground, off of window panes, etc. | |
| Jim's speech, although highly intriguing, got extremely vague at points, | |
| especially regarding technology needed, his own background, etc. | |
| (We will attribute this to his "CIA" training.) | |
| The Hotel Officials showed up and demanded that everyone get out immediately. | |
| Apparently someone had staggered into the kitchen, drunk, and broken | |
| something. Steve Ryan left to smooth things out a bit. After a few minutes | |
| he returned and told everyone that they could stay, but to keep it quiet | |
| tonight. Thus the secret plans of some to drive the hotel golf cart | |
| into the pool were crushed. | |
| The raffle proved to be an exercise in banality. Everything from | |
| flashing street lights to SunOS 4.1.3 to T-shirts to books were | |
| auctioned off. One lucky devil even got an official Michael Jackson | |
| candy bar. | |
| The folks from RDT (Count Zero and White Knight) handed out a large amount | |
| of photocopied goodies such as the new "Forbes" article on hackers, | |
| a complete set of the old 70's telephony 'zine "TEL" as well as assorted other | |
| flyers and pamphlets. | |
| Up next, Louis Cypher spoke about his entanglement with the law | |
| regarding his front-page bust for counterfeiting. He told of his | |
| experiences with the law, how they got involved in such a dastardly | |
| deed, what jail was like on the inside, and advice against anyone | |
| else considering such a thing. | |
| Up last, John Draper. Draper had managed by this time to annoy almost | |
| everyone at the convention. A large portion of those in attendance | |
| left as soon as he got up. They were the unlucky ones. Draper, for all his | |
| oddities, is an intriguing speaker. His life has been quite rich with | |
| excitement and when he can actually focus on a subject he is captivating. | |
| He spoke on his trip to the Soviet Union where he met computer and telephone | |
| enthusiasts in Moscow. He spoke on his unfortunate involvement with | |
| Bill SF and the BART Card duplication scandal. He spoke, with obvious | |
| longing, of the good old days of blue boxing, and stacking tandems to | |
| obtain local trunks, and on verification circuitry. | |
| Listening to Draper talk really brought me back to my beginnings. I could | |
| hear in my head the "cachink-chink" of a tandem waiting for MF. I remembered | |
| stacking tandems to Europe and back to call my other line. I remembered | |
| the thrill of finding never before known trunks and exploring their | |
| connections. I fell into a deep nostalgic high, and walked up to John | |
| to tell him thanks. As I extended my hand to him, he mumbled something | |
| unintelligible and wandered off. So much for paying respect. | |
| About ten of us took off to Chuy's for dinner: Me, Chasin, Conflict, | |
| Rambone, Dispater, Blue Adept, Minor Threat and reporters Joe Abernathy | |
| and Gary Poole were among the diners. Everyone ate heartily and listened | |
| to cordless telephone conversations on Rogue Agent's handheld scanner. | |
| One conversation was between what appeared to be a "pimp" talking to his | |
| "ho" about some money owed him by another in his flock. The conversation | |
| drifted to the Dallas man who had terrorized an entire neighborhood some | |
| months back with prank phone calls. Conflict and Dispater repeated a | |
| few of the choicest of the calls for our amusement. | |
| Back at the hotel, Dr. Hoffman's Problem Child had escaped, and several | |
| casualties were reported. | |
| Conflict, Chasin and I barricaded ourselves in our room and went on a lengthy | |
| stream of consciousness rant about what we needed out of life. Our absolute | |
| essentials were reduced to a small room with a computer hooked into the | |
| Internet, a specially designed contour chair, a small hole through which | |
| a secretary would give us food, virtual reality sex toys, and a toilet. | |
| (Chasin suggested no toilet, but a catheter so we would never have to move.) | |
| Gary Poole was quietly stunned in the corner of the room making mental notes. | |
| Much of the con had moved into a suite that had been converted into a | |
| mass computing arena. Several attendees from Pittsburgh had turned their | |
| room into a lab with four Unix workstations with several terminals throughout | |
| the room including the bathroom! These were hooked into the Internet through | |
| a slip connection that had been rigged somewhere. It was quite a site. | |
| The room was usually completely packed and smelled like a smoky gymnasium. | |
| (It was rumored that after Chasin and I spoke on the UFO conspiracy, several | |
| hackers began their attempts at penetrating the Ames Research Lab. No | |
| reports back on their success.) | |
| After I finished copying several Traci Lords video tapes (ahem) I relinquished | |
| control of the decks to a room downstairs. Dispater played a video | |
| manipulation he and Scott Simpson had produced. They had found a TRW training | |
| video tape during a trashing run and dubbed in their own dialogue. (You'd | |
| have to see it to fully understand.) | |
| After that, I played a few tapes of my own. The first was a short film called | |
| "Red," that chronicled the abusive prank phone calls directed at a bartender. | |
| The film had the actual phone call tapes played with video stills. (Guess | |
| where the Simpsons came up with that nifty idea...) | |
| Following "Red," someone heard on the scanner that the guard was answering | |
| a large noise disturbance in the room we were in. (Yes, they had the hotel | |
| guard's 2-meter frequencies.) Everyone moved into another room before the | |
| guard showed up. He was thoroughly confused. | |
| In the next room I played the ultimate in shock, the sequel to the movie that | |
| I had disturbed the entire con with last year, "Nekromantik II." I won't | |
| go into any detail, since the title says it all. Once again, I reign as | |
| the sickest person at HoHoCon, this honor bestowed upon me by everyone | |
| who witnessed the showing. | |
| As things winded down, several people ended up back in our room to waste | |
| away the last few hours of the night. Several people returned from an | |
| adventure to "an abandoned hospital." No one really understood what they went | |
| to, but it sounded disturbing. Later, that same group would leave to | |
| go climb "an abandoned grain storage tower." Go figure. | |
| Approximately 2:00 am, a local hacker named Zach showed up. Scott had a few | |
| words for Zach, as did most everyone at the Con. Zach lived in a fantasy | |
| land where he was a top notch security consultant with high paying clients | |
| in the telecommunications industry. He also like to name drop names like | |
| Chasin and Goggans as his partners and as people who would swoop down | |
| and terrorize the people he had any problems with. He also liked to turn | |
| in, or threaten to turn in any of his rivals in the software pirating | |
| community. He also like to proposition young boys both in person and | |
| over the phone. At 17, Zach had a few problems. | |
| Trapped in the corner of the room, Zach endured about an hour of questioning | |
| and accusations (all of which he truly deserved.) Eventually Zach left, | |
| apparently not affected by the ordeal at all. We attributed this to his | |
| overly apparent schizophrenia brought on by denial of his sexual | |
| tendencies. | |
| Later that night the Pittsburgh gang blew out the power in their entire | |
| wing. One was overheard, "Hmmm...guess we should have known that when the | |
| power strips kept melting that we were drawing too much power." | |
| The next morning everyone gathered up their gear and said so long. All but | |
| a few who gathered in a room marked "the suite of the elite." Armed with | |
| a nitrous oxide blaster, everyone sat around and viewed the con through | |
| the roaming video eye of Jesse, who had managed to capture everyone | |
| in some kind of compromising position. He will be selling them off | |
| after he edits it a bit. It was dubbed "The Blackmail Tape." | |
| In my opinion this year was much less anarchistic than last year. The | |
| convention might not even be banished from this hotel. (Yeah, right.) | |
| There were no raids, there were no overtly violent or satanic acts, | |
| no fire alarms, no trashing runs (that I saw), no fights, | |
| and there were no strippers (alas). The conference portion of the | |
| event was much better organized, there was much more interesting | |
| information to be shared, and was well worth the distances traveled by | |
| all. | |
| This was HoHoCon '92. | |
| -------------------------- | |
| H*O*H*O*C*O*N '92 | |
| Frosty's Itinerary | |
| Thursday 8pm Take off and go bar hopping all night long to build up | |
| stamina for the convention. | |
| Thrusday 10pm Quit bar hopping and waste shitloads of money at the | |
| casinos in feeble attempts to get gas money for the trip. | |
| Friday 5am Leave the casino and decide to get some sleep after spending | |
| hours to win a meager $10 over starting cash. | |
| Friday 8am Wake up and decide to pack for the trip. Forget necessities | |
| that we couldn't live without. Remember to bring junk food. | |
| Friday 9am Stuff assembled GCMS members into subcompact Japanese micro | |
| car and leech as much gas money out of them as possible. | |
| Friday 2pm Stop at the friendly convenient store to rob it of precious | |
| sugar-coated necessities and obtain mucho lotto tickets. | |
| Friday 4pm Endure Windrunner's gruelling multi-hour long verbatim | |
| rantings of taking the Purity Test 1500 verbally. | |
| Friday 7pm Pull out many maps and try to find the damn hotel in Houston. | |
| Friday 9pm Arrive at the hotel getting a room for one (car stuffed | |
| with people sits outside the lobby). Request two keys. | |
| Friday 10pm Test the smoke machine on the hotel grounds. Chase young | |
| code-kids out of your way, threatening to disable their | |
| phones. | |
| Friday 11pm Crash in room from lack of sleep. Kick other members out | |
| of your way. Ignore multiple alcoholic beverages lining | |
| the room. Ponder what's sleeping in the chair briefly. | |
| Saturday ??? Try to figure out if you're awake or dead. Take a collection | |
| from those that are still alive. Run to some micro-compact | |
| Japanese convenience store hidden in the middle of suburbia | |
| hell and obtain sugar-coated nutrients with Windrunner and | |
| JunkMaster and Gaijin. | |
| Saturday 1pm Arrive for the conference. Get mega-amounts of raffle tickets. | |
| Saturday 2pm Conference actually gets started a few hours behind schedule. | |
| Tape conversations from the man with the whisper 2000 home | |
| version. Ponder the light orbiting Erik B's head. | |
| Saturday 4pm Witness Steve Ryan in action against the hotel staff. | |
| Wonder where the young hack in the corner got the gallon, | |
| mostly empty now, of wine. Ponder if he's going to spew. | |
| Saturday 6pm Try to figure out what everyone is going to do with the | |
| several hundred flashing construction lights given out. | |
| Calculated the ratio of men to women as 15,000:1, roughly. | |
| Saturday 8pm Try to keep awake while wondering how much torture can be | |
| sustained. Watch Count Zero nodding off. Hitman and I | |
| pulled out our decoder rings to interpret Crunch's hidden | |
| message. | |
| Saturday 10pm Dominoes Pizza makes it to the room. OUR SAVIOR !!! He's | |
| 5-minutes late. Custody battle over the pizza ensues. The | |
| manager is called, at which point he lowers the $50 price | |
| for the two pizzas down to $30. We scrape a few dollars and | |
| hand the peon delivery boy some cheap beer. | |
| Saturday Nite Hand out copies of "cindy's torment" to the code kids. | |
| Watch Erik B.'s continuation of necrophiliac desires on | |
| the acquired VCR that mysteriously appeared. Avoided the | |
| hotel security by changing room while monitoring their | |
| frequencies (thanks RDT). Obtained evidence that hackers | |
| were breaking into VR R&D departments to engage in endless | |
| routines of VR sex for Cyborgasmic responses. Saw Crunch's | |
| host's room blow out as the multitudes of computers fry the | |
| circuits. Followed the 'sheep' about the hotel. | |
| Sunday ??? Woke bright and early to a car locked with the keys inside. | |
| Fortunately, 50-odd slim-jims appeared out of nowhere to | |
| save the day. Windrunner chauffeured us back to our lair. | |
| Sunday 3pm Hacked into the Louisiana Lotto machine from an acoustical | |
| modem and laptop from a pay phone to rig the numbers and | |
| then bought a ticket. | |
| Sunday 7pm Returned to hell. Lost the lotto ticket in the growing | |
| pile of sugar-coated necessities sheddings. Cursed. | |
| Sunday 8pm Turned the PC on and hit the networks. | |
| -------------------------- | |
| Jim Carter, president of Bank Security in Houston, TX, wrote the | |
| following impressions of HoHoCon for Security Insider Report | |
| (December, 1992) | |
| HoHoCon was in fact "Unphamiliar Territory" for this "good ole boy," | |
| but it didn't take long till I was into the swing of things and | |
| telling lies of how we cheat and steal to get our information. Of | |
| course, everyone who talked to this "good ole boy" thought he was with | |
| one of the three letter agencies. As the stories rolled on about what | |
| they (the hackers) could do, such as produce virii that would cause | |
| video display terminals and hard drives to smoke, I had to sit back, sip | |
| my brewski and say "wow." We sat back, enjoyed a few more rounds, told | |
| a few more lies and had a good time. | |
| Well, this old boy didn't show until about noon on Saturday. Of course | |
| the conference hadn't started yet so we didn't miss anything. The | |
| program was kicked off with a number of questions about who, what, where | |
| and how. It was difficult to determine how many people were there since | |
| the room was packed like a can of sardines. Our estimate was over two | |
| hundred, not counting the hackers still in their rooms. Was this | |
| another drunken free for all, as in the past? A report was given on | |
| cellular hacking and toll fraud. Hackers' rights were presented by an | |
| attorney. Also discussed was the stupidity of the press and law | |
| enforcement. | |
| Some others talked about suppressed information from the federal | |
| government concerning UFO's and how hackers are gaining this info. And | |
| of course the White House wants to know their sources. | |
| Hand outs were given including virii and virus source code. I did | |
| decline any virii, but who knew what I would get before this was over. | |
| I believe this was the most responsive and gratifying group I have | |
| spoken to this year. I also expect to get more business because of this | |
| presentation than any other this year. | |
| A lengthy door prize was held in which I was the winner of more virii. | |
| Again, I did decline, but passed the winning ticket on. Captain Crunch | |
| was the final speaker. In conclusion, the attendees were the good, the | |
| bad and the ugly. We did find HoHoCon very informative and, yes, we | |
| will attend again. In closing, I hope each and everyone had a very | |
| "Merry HoHoCon." | |
| -------------------------- | |
| A (Hacker's) Mind is a Terrible Mind to Waste | |
| Unix World, page 136, March 1993 | |
| by Gary Andrew Poole | |
| [Unix World wanted MONEY to reprint this in full...Yeah, right. | |
| Someone already posted it on alt.cyberpunk some time ago | |
| if you can't find it anywhere.] | |
| *-----------------------------------* | |
| Various Stuff Picked up at HoHoCon | |
| *-----------------------------------* | |
| -------------------------- | |
| Flyer: | |
| -------------------------- | |
| Unphamiliar Territory | |
| Phalcon/Skism Western World Headquarters | |
| The Ghost in The Machine Distribution | |
| Featuring: | |
| - 'Neutral Territory' forum where security issues can be discussed with | |
| top security people in the field. | |
| - Completely LEGAL forums on computer security, hacking, phraud. | |
| - Thousands of textfiles covering all aspects of the underground. | |
| - Hundreds of viruses and virus source code for the serious | |
| programmer. | |
| Information: | |
| - Administrators are Invalid Media, Mercury/NSA, Warlock Bones and | |
| Jaeger. | |
| - Run on a professor Falken/LOD donated ZOOM v32bis | |
| - Mentioned in MONDO 2000 and reviewed in the latest Infoworld. | |
| - Dialin 602-894-1757 / 24 hours | |
| -------------------------- | |
| Flyer | |
| -------------------------- | |
| In your defense..... Courtesy Freeside Orbital Data Network, HoHoCon '92 | |
| - B. O'Blivion | |
| Repeat after me: | |
| "If I am reading this to you, then I believe that you are | |
| questioning, detaining, or arresting me, or searching my person or | |
| possessions in the course of your official duties." | |
| "I do not consent to any search of seizure of any part of my person | |
| or property, nor to any property of others under my control. I do not | |
| consent to any person's examination, search, or removal of any | |
| information storage equipment or media in my possession. You are hereby | |
| notified that such information storage equipment or media contain | |
| private written and electronic mail, confidential communications, and | |
| other material protected under the Electronic Communications Privacy Act | |
| and other statutes." | |
| "I respectfully decline to answer any questions beyond confirmation | |
| of my identity, and require access to legal counsel immediately. I | |
| demand that access to legal counsel be provided to me before any | |
| questioning takes place. I will answer no questions nor give any | |
| information outside the presence of legal counsel. All requests for | |
| interviews, statements, consents, or information of any sort should be | |
| addressed to me through my attorney. I invoke the rights five to me by | |
| the Fifth and Sixth Amendments of the Constitution of the United | |
| States." | |
| "I further notify you that the speech and information contained on | |
| information storage and handling devices at this site are protected | |
| by the First and Fourth Amendments to the Constitution of the United | |
| States, and that any unlawful search or seizure of these items or of | |
| the information they contain will be treated as a violation of the | |
| Constitutional rights of myself and other users of these devices and | |
| media." | |
| "I further notify you that any such violations of any person's legal | |
| or Constitutional rights which are committed at any time, by any person, | |
| will be the subject of civil legal action for all applicable damages | |
| sustained. I require that at this time all officers participating in | |
| this illegal search, seizure, or arrest identify themselves at this time | |
| by name and badge number to me and my legal counsel." | |
| [Include if applicable] | |
| "I further notify you that I am a Computer System Operator providing | |
| private electronic mail, electronic publications, and personal | |
| information storage services to users in this State, and among the | |
| United States. Any person causing a breach of the security of, or | |
| violation of the privacy of, the information and software herein will be | |
| held liable for all civil damages suffered by any and all users | |
| thereof." | |
| -------------------------- | |
| Flyer | |
| -------------------------- | |
| HoHoCon 1992 | |
| Amusing Local Frequencies | |
| courtesy of -=RDT. | |
| Allen Park Inn Security - 464.500 Houston Post - 154.540 | |
| 173.275 | |
| 452.975 | |
| Houston Police: | |
| North Shepherd Patrol - 460.325 | |
| NE Patrol - 460.125 | |
| SE Patrol - 460.025 | |
| SW Patrol - 460.050 | |
| Central Patrol - 460.100 | |
| Spec. Op. Traffic - 460.350 | |
| Car 2 Car - 460.225 | |
| South Central Patrol - 460.550 | |
| NW Patrol - 460.475 | |
| West Patrol - 460.150 | |
| Accident - 460.375 | |
| Misc - 460.525 | |
| 460.575 | |
| 460.400 | |
| Records - 460.425 | |
| City Marshalls - 453.900 | |
| Paging - 155.670 | |
| Police Intercity - 453-550 | |
| A number of people have been asking "who is RDT? what the hell is | |
| RDT?" For the record, we're hackers who believe information should be | |
| free. All information. The world is full of phunky electronic gadgets | |
| and networks, and we want to share our information with the hacker | |
| community. We currently write for 2600 magazine, Phrack, Mondo 2000, | |
| Cybertek, and Informatik. | |
| The five "charter members" of RDT are Count Zero, Brian Oblivion, | |
| Magic Man, White Knight, and Omega. Each of us has complementary | |
| skills, and as a group we have a very wide area of technical | |
| knowledge. Feel free to contact us. | |
| Count Zero - count0@ganglia.mgh.harvard.edu | |
| Brian Oblivion - oblivion@ganglia.mgh.harvard.edu | |
| Magic Man - magic@ganglia.mgh.harvard.edu | |
| White Knight - wknight@ganglia.mgh.harvard.edu | |
| Omega - omega@spica.bu.edu | |
| "They are satisfying their appetite to know something that is not theirs | |
| to know." - Asst. District Attorney Don Ingraham | |
| "All-you-can eat buffet...for FREE!" - Restricted Data Transmissions | |
| RDT "Truth is Cheap, but Information Costs." | |
| -------------------------- | |
| Magazine | |
| -------------------------- | |
| Future Sex | |
| (a very odd pseudo-cyberpunk skin mag) | |
| 4 issues for $18, Canada $26, International US $48 | |
| 1095 Market Street | |
| Suite 809 | |
| San Francisco, CA 94103 | |
| 415-621-5496 | |
| 415-621-4946 fax | |
| -------------------------- | |
| Video | |
| -------------------------- | |
| Red $19.95 | |
| (Phone Pranks can kill) | |
| Nekromantik II $29.95 | |
| (No comment) | |
| Available through | |
| Film Threat Video | |
| P.O. Box 3170 | |
| Los Angeles, CA | |
| 90078-3170 USA | |
| 818-848-8971 | |
| Shipping: 1 tape $3.40 | |
| 2-3 $4.60 | |
| 4-6 $5.80 | |
| 6+ $7.00 | |
| Visa/MC accepted. | |
| -------------------------- | |
| Official HoHoCon Crud | |
| -------------------------- | |
| HoHoCon '92 | |
| Product Ordering Information | |
| If you are interested in obtaining either HoHoCon shirts or videos, | |
| please contact us at any of the following: | |
| drunkfux@cypher.com | |
| hohocon@cypher.com | |
| cDc@cypher.com | |
| dfx@nuchat.sccsi.com | |
| drunkfux@ganglia.mgh.harvard.edu | |
| 359@7354 (WWIV Net) | |
| Freeside Orbital Data Network | |
| ATTN: dFx/HoHoCon | |
| 11504 Hughes Road Suite #124 | |
| Houston, Texas | |
| 77089 | |
| 713-866-4884 (Voice Mail) | |
| The shirts are $15 plus $2 shipping ($2.50 for two shirts). At this | |
| time, they only come in extra large. We may add additional sizes if | |
| there is a demand for them. The front of the shirt has the following | |
| in a white strip across the chest: | |
| I LOVE FEDS | |
| (Where LOVE = a red heart, very similar to the I LOVE NY logo) | |
| And this on the back: | |
| dFx & cDc Present | |
| HOHOCON '92 | |
| December 18-20 | |
| Allen Park Inn | |
| Houston, Texas | |
| There is another version of the shirt available with the following: | |
| I LOVE WAREZ | |
| The video includes footage from all three days, is six hours long and | |
| costs $18 plus $2 shipping ($2.50 if purchasing another item also). | |
| Please note that if you are purchasing multiple items, you only need | |
| to pay one shipping charge of $2.50, not a charge for each item. If | |
| you wish to send an order in now, make all checks or money orders | |
| payable to O.I.S., include your phone number and mail it to the street | |
| address listed above. Allow ten working days for arrival. | |
| Thanks to everyone who attended and supported HoHoCon '92. Mail us if | |
| you wish to be an early addition to the HoHoCon '93 (December 17-19) | |
| mailing list. | |
| -------------------------- | |
| Text File | |
| -------------------------- | |
| Rumors have begun to surface about a group of hackers who were involved in a | |
| project to uncover information regarding the existence of UFOs. The | |
| most public example pertaining to this alleged project was seen on | |
| Dateline NBC on the screen of the mystery hacker "Quentin." | |
| The story goes that this group of individuals decided to put their | |
| skills to work on a project that, if successful, would add legitimacy to | |
| the hacking process by uncovering information on what has been called the | |
| greatest cover-up in the history of the world. Milnet TAC ID cards | |
| were obtained through military officials sympathetic to the cause. Several | |
| sites and networks were targeted that had in the past been linked to UFO | |
| activity. These were sites like the Jet Propulsion Laboratory, Sandia Labs, | |
| TRW Space Research, American Institute of Physics, and various other | |
| educational, government and military sites. | |
| The rumors also emphasize that several sites had what these individuals | |
| called "particularly heavy security." Within several seconds after | |
| connection had been established, system administrators of sites used in | |
| this project were contacted. Further rumors state that there was | |
| information regarding a propulsion system designed utilizing what is | |
| termed "corona discharge" being analyzed at one site. The most sinister | |
| of all rumors states that one particular participant who was allegedly | |
| deeply immersed in TRWs internal network has not been heard from since | |
| uncovering data regarding a saucer being housed at one of their Southern | |
| California installations. | |
| Believe what you will about the reality of this project. Much will be | |
| dismissed as hacker lore, but within the core of every rumor lies a | |
| grain of truth. | |
| Are we being lied to? Why is this information still classified by the NSA? | |
| What are they hiding from us behind a maze of security? Will we continue | |
| to stand idly by and let an uncaring and deliberately evasive government | |
| shield us from what may be the most important, and potential dangerous | |
| news to ever surface? Information wants to be free, and only a | |
| concerted group effort can make this happen. How much do you really | |
| want to know about what is really going on? | |
| What follows is information that has been released regarding this project... | |
| --------------------------------------------------------------------------- | |
| PROJECT ALF-1 | |
| A Planetary Effort | |
| TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET | |
| TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET | |
| These are the raw data. Where comments are appropriate, they | |
| will be included. The data will be grouped together with dates, | |
| names etc. to make correlations easier. | |
| There are countless references to the aliens, their down space | |
| craft and what the Government is doing with them. | |
| If, as is supposed, the research on the craft and the 'ufonauts' | |
| continues today, then undoubtedly there are computer records, somewhere. | |
| I. Searching the Skies; Tripping the Electronic Fence around the | |
| USA. | |
| US Space Command Space Surveillance Center, Cheyenne Mountain, | |
| Colorado Springs, Box Nine (Electronic Surveillance Room) | |
| (This is where they search for and track UFO activity.) | |
| U.S. Naval Space Surveillance System, Dahlgreen, Virginia, (Main | |
| computer), Lake Kickapoo, Texas (listening post): Search for | |
| 'Flash Traffic' | |
| Commander Sheila Mondran | |
| CINC-NORAD | |
| Space Detection and Tracking System | |
| Malabar, Forida | |
| 'Teal Amber' search | |
| National Military Command Center - Pentagon | |
| (These are the areas where UFO activity is tracked. | |
| There is a radar shield around the country that is 'tripped' by UFO's. | |
| All tracking and F14 scrambling is done through this system.) | |
| II. The Second Cover Up | |
| Defense Intelligence Agency | |
| Directorate for Management and Operations | |
| Project Aquarius (in conjunction with SRI) | |
| Colonel Harold E. Phillips, Army (where/what Feb. 1987) | |
| UFO Working Group, (formed Dec 1987) | |
| Major General James Pfautz, USAF, Ret. (March 87) | |
| US Army experiments -(Monroe Institute, Faber, VA) | |
| Major General Albert Stubblebine | |
| Capt. Guy Kirkwood, | |
| (thousands of feet of film of UFO's catalogued and on record somewhere.) | |
| The UFO Working Group was formed because one arm of the Govt doesn't | |
| know what the other is doing.) | |
| III. National Security | |
| NSA NAtional Security Agency, Dundee Society (Super secret elite | |
| who have worked on UFO's.) | |
| NSA - Research and Engineering Division | |
| NSA - Intercept Equipment Division | |
| Kirtland Force Base, Office of Special Investigations, Project | |
| Beta. 1979-83-? (Sandia Labs are here.) | |
| Paul Bennewitz | |
| Project Blue | |
| Project Blue Book | |
| (NSA computers do analysis for Pentagon.) | |
| IV. More Secret Players | |
| NASA, Fort Irwin, Barstow, CA | |
| NASA Ames Research Center, Moffet Field Naval Base | |
| SETI | |
| State Dept. Office of Advanced Technology | |
| Any Astronauts from Mercury, Gemini and Apollo | |
| CIA - Office of Scientific Investigation | |
| CIA - Domestic Collection Division | |
| (NASA has known about UFO's since the astronauts saw and photoed them. | |
| Records somewhere.) | |
| V. Dealing with the Secret | |
| MJ-12 (1952) | |
| Majectic 12 | |
| Operation Majestic 12 | |
| MAJIC-12 | |
| Admiral Roscoe H. Hillenkoetter | |
| Dr. Vannevar Bush | |
| Dr. Detlev Bronk | |
| Dr. Jerome Hunsaker | |
| Dr. Donald Menzel | |
| Dr. Lloyd Berkner | |
| General Robt. Montague | |
| Sidney Souers | |
| Gordon Gray | |
| General Hoyt Vandenberg | |
| Sect State James Forrestal | |
| General Nathan Twining | |
| Pres. Truman | |
| Pres. Eisenhower | |
| (One of the biggest secrets ever.) | |
| Nevada Desert, Area 51, S4 (houses UFO's) | |
| (Robert Lazar talked!) 9 space ships on storage. Propulsion by | |
| corona discharge. | |
| (Area 51 is the most protected base on the planet.) | |
| VI. ROSWELL, NM Crashes | |
| Mac Brazel (farmer) | |
| Major Jesse A. Marcel | |
| 509th. Bomber Group | |
| Lewis Rickett, CIC Officer | |
| Colonel William Blanchard | |
| Gerald Anderson, witness to crash and aliens | |
| Wright Patterson Air Force Base, (parts lists of UFO's catalogued; | |
| autopsies on record) (Bodies in underground facility) | |
| Foreign Technology Building | |
| USAAF (United States Army Air Force reports: "Early Automation" | |
| Muroc, CA (Base with UFO's for study) | |
| (1 saucer with 4 aliens. They were transported to Wright and then | |
| saved, catalogued and autopsied.) | |
| VII. THOSE ON GOVT SHIT LIST | |
| (People who have gotten close.) | |
| Robert Lazar | |
| Major Donald Keyhoe | |
| William Moore | |
| Stanton Friedman | |
| Jaime Shandera | |
| Whitley Streiber | |
| Timothy Goode, UK | |
| Other UFO Crashes | |
| Del Rio, TX 12/50, Colonel Robert Willingham | |
| Las Vegas, 4/18/62 | |
| Kecksburg, PA 12/9/65 | |
| VIII. International | |
| Belgian Air Force. (They are going public and have records. | |
| Press conference held 7/12/91.) | |
| Australian Air Force | |
| UK; GCHQ | |
| British Air Force | |
| Belgium: | |
| NATO Radar Stations | |
| IX. UFO Civilian Groups. (What do they really know?) | |
| NICAP, National Investigations Committee on Aerial Phenomena | |
| (private company.) | |
| APRO, Tucson, AZ (Aerial Phenomona Research Organization, | |
| private company.) | |
| MUFON Mutual UFO Network | |
| X. GENERAL | |
| Kenneth Arnold, June 24, 1947 | |
| Cattle and Sheep Mutilations | |
| General and Pres. Eisenhower, (private files and library) | |
| President Truman | |
| Wright Field or Wright Patterson Air Force Base, Dayton, OH, (Air | |
| Force Foriegn Technology Division) | |
| USAF Project Saint | |
| USAF Project Gemini | |
| Project Moon Dust | |
| Project Sign | |
| Project Grudge | |
| General Hoyt Vandenberg (1940-1960) | |
| Air Force Regulation 200-2 (8/12/54) | |
| Holloman AFB, NM | |
| Roswell, NM July 7, 1947 | |
| XI. Possible Searches | |
| Presidential Libraries | |
| Old USAAF, (United States Army Air Force) | |
| NASA | |
| Astronaut Frank Borman, Gemini 7, pictures of UFO | |
| Neil Armstrong, Apollo 11, saw UFO's on moon. | |
| Colonel Gordon Cooper saw a bunch of them | |
| James McDivitt, 6/66 | |
| United Nations | |
| NATO; | |
| General Lionel Max Chassin, French Air Force | |
| Star Wars, United Kingdom, 23 scientists killed in 6 years. | |
| Gulf Breeze, FL | |
| Additional UFO records at NSA, CIA, DIA, FBI | |
| Good Searching. | |
| ---------------------------------------------------------------------- | |
| Project | |
| ->Green Cheese<- | |
| Data Base | |
| --------------------------------------------------------------------- | |
| Holloman AFB | |
| Location: New Mexico. Preconceived landing 15 years ago. | |
| DDN Locations: | |
| -------------- | |
| NET : 132.5.0.0 : HOLLOMAN : | |
| GATEWAY : 26.9.0.74, 132.5.0.1 : HOLLOMAN-GW.AF.MIL : CISCO-MGS :: EGP,IP/GW : | |
| GATEWAY : 26.9.0.74, 132.5.0.1 : HOLLOMAN-GW.AF.MIL : CISCO-MGS :: EGP,IP/GW : | |
| HOST : 26.10.0.74 : HOLLOMAN-TG.AF.MIL : VAX-8650 : VMS : TCP/FTP,TCP/TELNET,TCP | |
| SMTP : | |
| HOST : 26.6.0.74 : HOLLOMAN-AM1.AF.MIL : WANG-VS100 : VSOS : TCP/TELNET,TCP/FTP, | |
| TCP/SMTP : | |
| Host: DDNVAX2.6585TG.AF.MIL | |
| 156.6.1.2 | |
| ----------------------------------------------------------------------- | |
| Kirtland Air Force Base | |
| Office Of Special Investigations. Sandia Labs are here. Also part of | |
| NSA Intercept Equipment Division. | |
| Key Words/names: | |
| ---------------- | |
| Sandia Labs | |
| Project Beta (1979-83-?) | |
| Paul Bennewitz | |
| Project Blue | |
| Project Blue Book | |
| DDN Locations: | |
| -------------- | |
| NET : 131.23.0.0 : KIRTLAND-NET : | |
| NET : 132.62.0.0 : KIRTLAND2 : | |
| GATEWAY : 26.17.0.48, 131.23.0.1 : KIRTLAND2-GW.AF.MIL,KIRTLAND-GW.AF.MIL | |
| : CISCO-MGS : UNIX : IP/GW,EGP : | |
| GATEWAY : 26.18.0.87, 132.62.0.1 | |
| : KIRTLAND1-GW.AF.MIL,KIRTLAND1606ABW-GW.AF.MIL : CISCO-MGS : | |
| : EGP,IP/GW : | |
| HOST : 26.0.0.48 : KIRTLAND.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : | |
| HOST : 26.0.0.87 : KIRTLAND2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : | |
| HOST : 26.6.0.87 : KIRTLAND-AM1.AF.MIL : WANG-VS300 : VS :: | |
| ----------------------------------------------------------------------- | |
| NASA | |
| What can I say about NASA that you couldnt guess for yourself.... | |
| (Except that the following sights are SPECIFIC NASA sights, not | |
| just randomly suspected sights). | |
| DDN locations: | |
| -------------- | |
| Fort Irwin, Barstow, CA: | |
| ----------------------- | |
| NET : 134.66.0.0 : IRWIN : | |
| NET : 144.146.0.0 : FTIRWIN1 : | |
| NET : 144.147.0.0 : FTIRWIN2 : | |
| GATEWAY : 26.24.0.85, 26.7.0.230, 144.146.0.1, 144.147.0.0 | |
| : FTIRWIN-GW1.ARMY.MIL : CISCO-GATEWAY : CISCO : IP/GW,EGP : | |
| HOST : 26.14.0.39 : IRWIN-ASBN.ARMY.MIL : NCR-COMTEN-3650 : COS2 :: | |
| HOST : 26.13.0.85 : FTIRWIN-AMEDD.ARMY.MIL : ATT-3B2-600G : UNIX | |
| : TCP/FTP,TCP/SMTP,TCP/TELNET : | |
| HOST : 26.14.0.85 : FTIRWIN-IGNET.ARMY.MIL : DATAPOINT-8605 : RMS :: | |
| HOST : 26.15.0.85 : IRWIN-EMH1.ARMY.MIL,FTIRWIN-EMH1.ARMY.MIL : SPERRY-5000 | |
| : UNIX : TCP/FTP,TCP/SMTP,TCP/TELNET : | |
| Moffet Field Naval Base (Ames Research Center): | |
| ----------------------------------------------- | |
| GATEWAY : 26.20.0.16, 192.52.195.1 : MOFFETT-FLD-MB.DDN.MIL,AMES-MB.DDN.MIL | |
| : C/70 : CHRYSALIS : IP/GW,EGP : | |
| HOST : 26.0.0.16 : MOFFETT.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : | |
| ----------------------------------------------------------------------- | |
| Pentagon (National Military Command Center) | |
| One of many places in charge of tracking UFO activity. | |
| Possible DDN sights: | |
| ------------------- | |
| GATEWAY : 26.9.0.26, 134.205.123.140 : PENTAGON-GW.HQ.AF.MIL : CISCO-AGS : | |
| : EGP,IP/GW : | |
| GATEWAY : 26.25.0.26, 131.8.0.1 : PENTAGON-GW.AF.MIL,HQUSAFNET-GW.AF.MIL | |
| : CISCO-MGS :: IP/GW,EGP : | |
| GATEWAY : 26.10.0.76, 192.31.75.235 : PENTAGON-BCN-GW.ARMY.MIL : SUN-360 | |
| : UNIX : IP/GW,EGP : | |
| GATEWAY : 26.26.0.247, 192.31.75.1 : PENTAGON-GW.ARMY.MIL : SUN-3/160 | |
| : UNIX : EGP,IP/GW : | |
| GATEWAY : 26.31.0.247, 26.16.0.26, 141.116.0.1 : PENTAGON-GW1.ARMY.MIL | |
| : CISCO : CISCO : IP/GW,EGP : | |
| HOST : 26.0.0.26 : PENTAGON.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : | |
| HOST : 26.24.0.26 : OPSNET-PENTAGON.AF.MIL : VAX-8500 : VMS | |
| : TCP/TELNET,TCP/FTP,TCP/SMTP : | |
| HOST : 26.10.0.76, 192.31.75.235 : PENTAGON-BCN.ARMY.MIL : SUN-360 : UNIX | |
| : TCP/FTP,TCP/SMTP,TCP/TELNET : | |
| HOST : 26.0.0.247 : PENTAGON2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : | |
| HOST : 26.7.0.247 : PENTAGON-AMSNET.ARMY.MIL : AMDAHL : MVS | |
| : TCP/TELNET,TCP/FTP : | |
| HOST : 26.14.0.247 : NSSC-PENTAGON.NAVY.MIL : ALTOS-3068A : UNIX | |
| : TCP/FTP,TCP/TELNET,TCP/SMTP : | |
| HOST : 26.18.0.247 : PENTAGON-EMH4.ARMY.MIL : SPERRY-5000/80 : UNIX | |
| : TCP/TELNET,TCP/FTP,TCP/SMTP : | |
| HOST : 26.26.0.247, 192.31.75.1 : PENTAGON-AI.ARMY.MIL : SUN-3/160 : UNIX | |
| : TCP/TELNET,TCP/FTP,TCP/SMTP,TCP/FINGER : | |
| ----------------------------------------------------------------------- | |
| Raddaman | |
| Location of infamous building 18a. Suspected saucers and others? | |
| DDN location, yet unknown. | |
| ------------------------------------------------------------------------ | |
| SECI | |
| ? | |
| DDN Locations: | |
| -------------- | |
| NET : 192.108.216.0 : ARC-SETI-NET : | |
| ------------------------------------------------------------------------ | |
| Utah Locations: | |
| GATEWAY : 26.18.0.20, 131.27.0.1 : HILL-GW.AF.MIL,HILLAFBNET-GW.AF.MIL | |
| : CISCO-MGS :: IP/GW,EGP : | |
| GATEWAY : 26.18.0.20, 131.27.0.1 : HILL-GW.AF.MIL,HILLAFBNET-GW.AF.MIL | |
| : CISCO-MGS :: IP/GW,EGP : | |
| HOST : 26.5.0.20 : HILL.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : | |
| HOST : 26.0.0.99 : HILL2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : | |
| HOST : 26.12.0.99 : HILL-AM1.AF.MIL : WANG-VS100 : VS | |
| : TCP/TELNET,TCP/FTP,TCP/SMTP : | |
| ------------------------------------------------------------------------- | |
| Wright Patterson AFB | |
| Catalogued UFO parts list. Autopsies on record. Bodies located in | |
| underground facility of Foreign Technology Building. | |
| DDN Locations: | |
| -------------- | |
| HOST : 26.0.0.47 : WRIGHTPAT.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : | |
| HOST : 26.8.0.123 : WRIGHTPAT2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : | |
| HOST : 26.0.0.124 : WRIGHTPAT3.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : | |
| HOST : 26.3.0.170 : WAINWRIGHT-IGNET.ARMY.MIL : CONVERGENT-TECH-CN-100 | |
| : CTOS :: | |
| HOST : 26.0.0.176 : WRIGHTPAT4.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : | |
| ------------------------------------------------------------------------- | |
| Nevada: | |
| NET : 131.216.0.0 : NEVADA : | |
| ------------------------------------------------------------------------- | |
| Random Suspected Nets: | |
| WIN: | |
| Top Secret Network. All coordinator's have last name Win. | |
| NET : 141.8.0.0 : DFN-WIN8 : NET : 141.9.0.0 : DFN-WIN9 : | |
| NET : 141.10.0.0 : DFN-WIN10 : NET : 141.15.0.0 : DFN-WIN15 : | |
| NET : 141.25.0.0 : DFN-WIN25 : NET : 141.26.0.0 : DFN-WIN26 : | |
| NET : 141.28.0.0 : DFN-WIN28 : NET : 141.57.0.0 : DFN-WIN57 : | |
| NET : 141.58.0.0 : DFN-WIN58 : NET : 141.59.0.0 : DFN-WIN59 : | |
| NET : 141.60.0.0 : DFN-WIN60 : NET : 141.61.0.0 : DFN-WIN61 : | |
| NET : 141.62.0.0 : DFN-WIN62 : NET : 141.63.0.0 : DFN-WIN63 : | |
| NET : 141.64.0.0 : DFN-WIN64 : NET : 141.65.0.0 : DFN-WIN65 : | |
| NET : 141.66.0.0 : DFN-WIN66 : NET : 141.67.0.0 : DFN-WIN67 : | |
| NET : 141.68.0.0 : DFN-WIN68 : NET : 141.69.0.0 : DFN-WIN69 : | |
| NET : 141.70.0.0 : DFN-WIN70 : NET : 141.71.0.0 : DFN-WIN71 : | |
| NET : 141.72.0.0 : DFN-WIN72 : NET : 141.73.0.0 : DFN-WIN73 : | |
| NET : 141.74.0.0 : DFN-WIN74 : NET : 141.75.0.0 : DFN-WIN75 : | |
| NET : 141.76.0.0 : DFN-WIN76 : NET : 141.77.0.0 : DFN-WIN77 : | |
| NET : 141.78.0.0 : DFN-WIN78 : NET : 141.79.0.0 : DFN-WIN79 : | |
| NET : 141.80.0.0 : DFN-WIN80 : NET : 141.81.0.0 : DFN-WIN81 : | |
| NET : 141.82.0.0 : DFN-WIN82 : NET : 141.83.0.0 : DFN-WIN83 : | |
| NET : 141.84.0.0 : DFN-WIN84 : NET : 141.85.0.0 : DFN-WIN85 : | |
| NET : 141.86.0.0 : DFN-WIN86 : NET : 141.87.0.0 : DFN-WIN87 : | |
| NET : 141.88.0.0 : DFN-WIN88 : NET : 141.89.0.0 : DFN-WIN89 : | |
| NET : 141.90.0.0 : DFN-WIN90 : NET : 141.91.0.0 : DFN-WIN91 : | |
| NET : 141.92.0.0 : DFN-WIN92 : NET : 141.93.0.0 : DFN-WIN93 : | |
| NET : 141.94.0.0 : DFN-WIN94 : NET : 141.95.0.0 : DFN-WIN95 : | |
| NET : 141.96.0.0 : DFN-WIN96 : NET : 141.97.0.0 : DFN-WIN97 : | |
| NET : 141.98.0.0 : DFN-WIN98 : NET : 141.99.0.0 : DFN-WIN99 : | |
| NET : 188.1.0.0 : WIN-IP : NET : 192.80.90.0 : WINDATA : | |
| ----------------------------------- | |
| Scinet: | |
| Sensitive Compartmented Information Network | |
| NET : 192.12.188.0 : BU-SCINET : | |
| ----------------------------------- | |
| Disnet: | |
| Defense Integrated Secure Network. Composed of SCINET, WINCS | |
| ([World Wide Military and Command Control System] Intercomputer | |
| Network Communication Subsystem), and Secretnet(WIN). | |
| NET : 22.0.0.0 : DISNET : | |
| ----------------------------------- | |