home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 49.9 KB | 1,209 lines |
- ==Phrack Magazine==
-
- Volume Four, Issue Forty-Two, File 13 of 14
-
- HoHoCon 1992
- Miscellany
-
-
-
-
- The hackers were getting nervous. It was understandable. Just a few weeks
- before HoHoCon and already two other "get-togethers" had experienced
- turbulence from the authorities.
-
- Rumors began to fly that HoHo was to be the next target. Messages bearing
- ill-tidings littered the underground. Everyone got worked into a frenzy about
- the upcoming busts at HoHoCon. People began to cancel their reservations
- while others merely refused to commit one way or the other.
-
- But, amidst all the confusion and hype, many declared "Let them try to
- raid us! I'm going anyway!" These were the few, the proud...the stupid.
-
- -------------------------------------------------------------------------------
-
- HoHoCon as I saw it - Erik Bloodaxe (Chris Goggans)
-
- I arrived at the Allen Park Inn in the mid afternoon on Friday the 18th.
- I was promptly greeted by several of my cohorts and a loping transient
- who introduced himself as "Crunchhhhhhhhh." Yes, John Draper, the infamous
- Captain Crunch had actually ventured outward to attend our little party.
- (Yes, Virginia, the rumors are true: The Captain is toothless, unkempt,
- overbearing and annoying as all hell.)
-
- I followed Scott Chasin back to our room, the pack of other early arrivals
- in close file behind. After storing my gear I noticed that Draper was
- looming in the doorway ranting furiously about all the smoking in our room.
- "I've never heard of a hacker who smoked," exclaimed the Captain.
- Taking this as my cue, I bummed a Djarum off of Crimson Death and took great
- glee in adding my fumes to the enveloping fog.
-
- Draper spent the next 30 minutes attempting to eavesdrop on various
- conversations in which various old friends were catching up. Not knowing
- any of us personally, he nonetheless felt obligated to offer his comments
- about our discussions about life and college and music amidst his coughing
- and complaining about the smoke.
-
- After some time everyone was banished from the room and several of us
- went out to eat. Scott Chasin, myself, two hackers (The Conflict, & Louis
- Cypher) along with Gary Poole (covering the entire mess for Unix World) took
- off for the nearest grease pit. Taco Bell won in proximity, and once
- surrounded by burritos Scott, Conflict and I began our rant about Unix
- Security (the lack thereof). Gary whipped out his Unix World pen and pad
- and began taking notes. I am uncertain whether or not it was the content
- of our spiel or the asides I repeatedly made regarding the bevy of giggling
- coeds that garnered the most notes in Gary's booklet.
-
- Back at the Con things were spicing up. More people had begun to arrive
- and the Allen Park Inn staff began to worry about their safety and that of
- their other guests. One remarked to Jesse (Drunkfux), the sponsor of HoHoCon, "That Draper
- fellow needs to stay out of the lobby. He was eating large
- amounts of flesh off his hands and it was scaring some of the visitors."
- The staff did not know what to think at all when a father arrived with his
- three sons and after purchasing a room on his credit card told the boys, "Ok
- guys, Mom will be picking you up on Sunday."
-
- This did not concern most of us. It was straight to the bar
- for us, where Rambone bought Scott & myself a round of Kamikazes. Also at
- the bar was Bootleg who had just gotten out. (Of what, and for what you
- can find out on your own.) Bootleg is probably the smartest biker I have
- ever had the pleasure to meet. We talked about sex, drugs, hawgs, computers,
- cellular fraud and how close the nearest cabaret was.
-
- A small controversy began to arise amidst the hackers at the bar. Stationed
- near one end of the room was a table lined with older men. "FEDS," someone
- murmured, gesturing at the group.
-
- "Good for them," I said, and left the bar to look for Jesse. When I returned
- several minutes later the hackers had engaged the strangers in conversation
- and found that they weren't feds after all. Among this group were
- Jim Carter of Houston-based Bank Security, and Bernie Milligan of
- Communications & Toll Fraud Specialists, Inc. Once this news was out
- tensions eased and everyone continued with their libations.
-
- Suddenly I became aware that there was girl in the room. I had seen her out
- in the courtyard previously but now she was alone. Turning on my
- "Leisure Suit Larry" charm I grabbed the seat next to her. Melissa had arrived
- from Austin to cover the event for Mondo-2000. She surprised me by telling
- me that she knew who I was, where I worked, and even knew my extension number.
- (I almost fell off the barstool.)
-
- Jim & Bernie came over and joined us at the bar. Bootleg, Chaoswiz, Melissa
- and I engaged them in wild stories about UFO's, hacking, the NSA & the CIA.
- (Bernie alleged that he was ex-NSA, and Jim ex-CIA. We have not yet
- determined if they were acting under orders from Col. Jim Beam & Gen. Jack
- Daniels.)
-
- After the ensuing debates on the true formation of the NSA, the group broke up
- and Melissa and I took off to MC Allah's room to partake of the keg he had
- brought. We walked in the room and were greeted with the sight of a four-foot
- boy with a syringe sticking out of his arm. This was a bit much, even for me.
- I snatched his "medication" away from him and found that it was really only
- some type of growth hormone. The boy, 8-Ball, was actually 15 and his parents
- had him on hormones to stimulate his growth. 8-Ball was totally whacked
- out his mind nonetheless. I think he had ingested such a diverse amount of
- God knows what by the time we arrived that he was lucky to remember where
- he was. Later that evening he would become convinced that he was Scott
- Chasin and confessed to quite a bit of wrongdoing just before he gave offerings
- at the porcelain alter.
-
- Conversations in the keg room left something to be desired. One large hacker
- named Tony looked at Melissa and in his best British accent asked if he
- could fondle her breasts. And the debate between MC Allah and Hunter about
- who could drink the most alcohol reached a climax when both stuck their heads
- under the keg spigot for extended periods of time.
-
- Sometime just before 11:00 the hotel guard, attired in Raiders jacket and
- a really, really big snow hat (the kind with the poofy ball on top) showed
- up brandishing his paper baton, (A rolled up Houston Press). "You all
- needs to get to yaw roomz, nah. I ain'tz ta gonna tell yaw no mo'."
- Everyone looked the guard over and moved back into the keg room. Thus was
- born, "Homie da Guard." After he wandered away, everyone moved back out
- onto the porch.
-
- It was getting late and I was supposed to speak the next morning so I tried to
- get into our room. Scott Chasin, hacker extrordinaire, had locked me out.
- After beating on the door for 10 minutes, the windows for 5, the walls for 10,
- and letting the phone ring for another 15 minutes I decided that Scott was a
- bit too tipsy to unlock the door so I crashed out on Jesse's floor.
-
- That night, the water pipes broke. There was some speculation that those
- evil hackers had "hacked the system." Not.
-
- While complaining about the lack of water that night, someone overheard
- three young attendees at a bank of pay phones attempting to order up
- a few escorts on "credit." Rumor has it they were successful.
-
- The next morning was chaos. By the time we arrived at the conference room
- there were about 150 people inside. Louis Cypher sat at the door collecting
- money for the raffle and getting everyone to sign the guest book. Jesse
- and others were setting up various video equipment and getting things
- in order. In the back of the room, Bernie sat scanning the crowd with a
- super-ear, recording the conversations of those sitting.
-
- Crunch was up in arms again. "If everyone in here doesn't stop smoking
- I won't be able to do my speech. If you all want to hear me talk, you
- will have to stop smoking." Several more cigarettes lit up. After
- speaking with management, Crunch came back in and asked if everyone smoking
- would at least move to one side of the auditorium nearest the door.
- With hesitation, the crowd conceded.
-
- The conference got underway with consultant Ray Kaplan taking a census of
- those in attendance. The group ranged from under 15 to over 50, had
- professionals and hobbyists, and had enthusiasts for every conceivable
- type operating system. Ray went on to elaborate on one of his audio
- conferences in which an FBI officer alluded that one of their key
- sources of information was "I.R.C."
-
- Bootleg got up and spoke on the vast potentials involved with cellular
- fraud. He discussed how to monitor the reverse channel to obtain ESNs,
- and where to obtain the equipment to allow you to do such a thing. He
- later handed out diskettes (IBM format) containing information on how
- to reprogram cellular phones and where to obtain the equipment necessary
- to pick subscriber numbers out of the air.
-
- Up next, myself and Chasin. Our topic was a bit obscure and cut deliberately
- short due to concerns about the nature of our speech. During the Dateline
- NBC piece that featured Chasin a piece of information flashed on the screen
- that alluded to UFO information stored on military computers. Chasin
- and I had gained possession of the research database compiled by the hackers
- who were looking into this. We discussed their project, the rumors surrounding
- their findings and the fear surrounding the project. Not knowing the true
- details of this we declined to comment any further, but made the documentation
- available to anyone who wanted a copy. We finished our speech by answering
- questions about Comsec, Consultants, etc.
-
- Steve Ryan, a Houston lawyer with a great deal of interest in the
- legal aspects of cyberspace spoke next. He covered several of the current
- issues affecting the community, spoke on laws in effect, cases pending,
- and gave an insight to his background that led him to focus in on
- the issues concerning the electronic community.
-
- Next, Jim Carter gave a quick and dirty demonstration of how to monitor
- electromagnetic radiation and how to do a simple data recovery from this
- noise. He monitored a small data terminal from a portable television set
- that was completely unmodified. He then spoke on how to read the
- EMR from such things as plumbing, the ground, off of window panes, etc.
- Jim's speech, although highly intriguing, got extremely vague at points,
- especially regarding technology needed, his own background, etc.
- (We will attribute this to his "CIA" training.)
-
- The Hotel Officials showed up and demanded that everyone get out immediately.
- Apparently someone had staggered into the kitchen, drunk, and broken
- something. Steve Ryan left to smooth things out a bit. After a few minutes
- he returned and told everyone that they could stay, but to keep it quiet
- tonight. Thus the secret plans of some to drive the hotel golf cart
- into the pool were crushed.
-
- The raffle proved to be an exercise in banality. Everything from
- flashing street lights to SunOS 4.1.3 to T-shirts to books were
- auctioned off. One lucky devil even got an official Michael Jackson
- candy bar.
-
- The folks from RDT (Count Zero and White Knight) handed out a large amount
- of photocopied goodies such as the new "Forbes" article on hackers,
- a complete set of the old 70's telephony 'zine "TEL" as well as assorted other
- flyers and pamphlets.
-
- Up next, Louis Cypher spoke about his entanglement with the law
- regarding his front-page bust for counterfeiting. He told of his
- experiences with the law, how they got involved in such a dastardly
- deed, what jail was like on the inside, and advice against anyone
- else considering such a thing.
-
- Up last, John Draper. Draper had managed by this time to annoy almost
- everyone at the convention. A large portion of those in attendance
- left as soon as he got up. They were the unlucky ones. Draper, for all his
- oddities, is an intriguing speaker. His life has been quite rich with
- excitement and when he can actually focus on a subject he is captivating.
- He spoke on his trip to the Soviet Union where he met computer and telephone
- enthusiasts in Moscow. He spoke on his unfortunate involvement with
- Bill SF and the BART Card duplication scandal. He spoke, with obvious
- longing, of the good old days of blue boxing, and stacking tandems to
- obtain local trunks, and on verification circuitry.
-
- Listening to Draper talk really brought me back to my beginnings. I could
- hear in my head the "cachink-chink" of a tandem waiting for MF. I remembered
- stacking tandems to Europe and back to call my other line. I remembered
- the thrill of finding never before known trunks and exploring their
- connections. I fell into a deep nostalgic high, and walked up to John
- to tell him thanks. As I extended my hand to him, he mumbled something
- unintelligible and wandered off. So much for paying respect.
-
- About ten of us took off to Chuy's for dinner: Me, Chasin, Conflict,
- Rambone, Dispater, Blue Adept, Minor Threat and reporters Joe Abernathy
- and Gary Poole were among the diners. Everyone ate heartily and listened
- to cordless telephone conversations on Rogue Agent's handheld scanner.
- One conversation was between what appeared to be a "pimp" talking to his
- "ho" about some money owed him by another in his flock. The conversation
- drifted to the Dallas man who had terrorized an entire neighborhood some
- months back with prank phone calls. Conflict and Dispater repeated a
- few of the choicest of the calls for our amusement.
-
- Back at the hotel, Dr. Hoffman's Problem Child had escaped, and several
- casualties were reported.
-
- Conflict, Chasin and I barricaded ourselves in our room and went on a lengthy
- stream of consciousness rant about what we needed out of life. Our absolute
- essentials were reduced to a small room with a computer hooked into the
- Internet, a specially designed contour chair, a small hole through which
- a secretary would give us food, virtual reality sex toys, and a toilet.
- (Chasin suggested no toilet, but a catheter so we would never have to move.)
- Gary Poole was quietly stunned in the corner of the room making mental notes.
-
- Much of the con had moved into a suite that had been converted into a
- mass computing arena. Several attendees from Pittsburgh had turned their
- room into a lab with four Unix workstations with several terminals throughout
- the room including the bathroom! These were hooked into the Internet through
- a slip connection that had been rigged somewhere. It was quite a site.
- The room was usually completely packed and smelled like a smoky gymnasium.
-
- (It was rumored that after Chasin and I spoke on the UFO conspiracy, several
- hackers began their attempts at penetrating the Ames Research Lab. No
- reports back on their success.)
-
- After I finished copying several Traci Lords video tapes (ahem) I relinquished
- control of the decks to a room downstairs. Dispater played a video
- manipulation he and Scott Simpson had produced. They had found a TRW training
- video tape during a trashing run and dubbed in their own dialogue. (You'd
- have to see it to fully understand.)
-
- After that, I played a few tapes of my own. The first was a short film called
- "Red," that chronicled the abusive prank phone calls directed at a bartender.
- The film had the actual phone call tapes played with video stills. (Guess
- where the Simpsons came up with that nifty idea...)
-
- Following "Red," someone heard on the scanner that the guard was answering
- a large noise disturbance in the room we were in. (Yes, they had the hotel
- guard's 2-meter frequencies.) Everyone moved into another room before the
- guard showed up. He was thoroughly confused.
-
- In the next room I played the ultimate in shock, the sequel to the movie that
- I had disturbed the entire con with last year, "Nekromantik II." I won't
- go into any detail, since the title says it all. Once again, I reign as
- the sickest person at HoHoCon, this honor bestowed upon me by everyone
- who witnessed the showing.
-
- As things winded down, several people ended up back in our room to waste
- away the last few hours of the night. Several people returned from an
- adventure to "an abandoned hospital." No one really understood what they went
- to, but it sounded disturbing. Later, that same group would leave to
- go climb "an abandoned grain storage tower." Go figure.
-
- Approximately 2:00 am, a local hacker named Zach showed up. Scott had a few
- words for Zach, as did most everyone at the Con. Zach lived in a fantasy
- land where he was a top notch security consultant with high paying clients
- in the telecommunications industry. He also like to name drop names like
- Chasin and Goggans as his partners and as people who would swoop down
- and terrorize the people he had any problems with. He also liked to turn
- in, or threaten to turn in any of his rivals in the software pirating
- community. He also like to proposition young boys both in person and
- over the phone. At 17, Zach had a few problems.
-
- Trapped in the corner of the room, Zach endured about an hour of questioning
- and accusations (all of which he truly deserved.) Eventually Zach left,
- apparently not affected by the ordeal at all. We attributed this to his
- overly apparent schizophrenia brought on by denial of his sexual
- tendencies.
-
- Later that night the Pittsburgh gang blew out the power in their entire
- wing. One was overheard, "Hmmm...guess we should have known that when the
- power strips kept melting that we were drawing too much power."
-
- The next morning everyone gathered up their gear and said so long. All but
- a few who gathered in a room marked "the suite of the elite." Armed with
- a nitrous oxide blaster, everyone sat around and viewed the con through
- the roaming video eye of Jesse, who had managed to capture everyone
- in some kind of compromising position. He will be selling them off
- after he edits it a bit. It was dubbed "The Blackmail Tape."
-
- In my opinion this year was much less anarchistic than last year. The
- convention might not even be banished from this hotel. (Yeah, right.)
- There were no raids, there were no overtly violent or satanic acts,
- no fire alarms, no trashing runs (that I saw), no fights,
- and there were no strippers (alas). The conference portion of the
- event was much better organized, there was much more interesting
- information to be shared, and was well worth the distances traveled by
- all.
-
- This was HoHoCon '92.
-
- --------------------------
-
- H*O*H*O*C*O*N '92
-
- Frosty's Itinerary
-
- Thursday 8pm Take off and go bar hopping all night long to build up
- stamina for the convention.
-
- Thrusday 10pm Quit bar hopping and waste shitloads of money at the
- casinos in feeble attempts to get gas money for the trip.
-
- Friday 5am Leave the casino and decide to get some sleep after spending
- hours to win a meager $10 over starting cash.
-
- Friday 8am Wake up and decide to pack for the trip. Forget necessities
- that we couldn't live without. Remember to bring junk food.
-
- Friday 9am Stuff assembled GCMS members into subcompact Japanese micro
- car and leech as much gas money out of them as possible.
-
- Friday 2pm Stop at the friendly convenient store to rob it of precious
- sugar-coated necessities and obtain mucho lotto tickets.
-
- Friday 4pm Endure Windrunner's gruelling multi-hour long verbatim
- rantings of taking the Purity Test 1500 verbally.
-
- Friday 7pm Pull out many maps and try to find the damn hotel in Houston.
-
- Friday 9pm Arrive at the hotel getting a room for one (car stuffed
- with people sits outside the lobby). Request two keys.
-
- Friday 10pm Test the smoke machine on the hotel grounds. Chase young
- code-kids out of your way, threatening to disable their
- phones.
-
- Friday 11pm Crash in room from lack of sleep. Kick other members out
- of your way. Ignore multiple alcoholic beverages lining
- the room. Ponder what's sleeping in the chair briefly.
-
- Saturday ??? Try to figure out if you're awake or dead. Take a collection
- from those that are still alive. Run to some micro-compact
- Japanese convenience store hidden in the middle of suburbia
- hell and obtain sugar-coated nutrients with Windrunner and
- JunkMaster and Gaijin.
-
- Saturday 1pm Arrive for the conference. Get mega-amounts of raffle tickets.
-
- Saturday 2pm Conference actually gets started a few hours behind schedule.
- Tape conversations from the man with the whisper 2000 home
- version. Ponder the light orbiting Erik B's head.
-
- Saturday 4pm Witness Steve Ryan in action against the hotel staff.
- Wonder where the young hack in the corner got the gallon,
- mostly empty now, of wine. Ponder if he's going to spew.
-
- Saturday 6pm Try to figure out what everyone is going to do with the
- several hundred flashing construction lights given out.
- Calculated the ratio of men to women as 15,000:1, roughly.
-
- Saturday 8pm Try to keep awake while wondering how much torture can be
- sustained. Watch Count Zero nodding off. Hitman and I
- pulled out our decoder rings to interpret Crunch's hidden
- message.
-
- Saturday 10pm Dominoes Pizza makes it to the room. OUR SAVIOR !!! He's
- 5-minutes late. Custody battle over the pizza ensues. The
- manager is called, at which point he lowers the $50 price
- for the two pizzas down to $30. We scrape a few dollars and
- hand the peon delivery boy some cheap beer.
-
- Saturday Nite Hand out copies of "cindy's torment" to the code kids.
- Watch Erik B.'s continuation of necrophiliac desires on
- the acquired VCR that mysteriously appeared. Avoided the
- hotel security by changing room while monitoring their
- frequencies (thanks RDT). Obtained evidence that hackers
- were breaking into VR R&D departments to engage in endless
- routines of VR sex for Cyborgasmic responses. Saw Crunch's
- host's room blow out as the multitudes of computers fry the
- circuits. Followed the 'sheep' about the hotel.
-
- Sunday ??? Woke bright and early to a car locked with the keys inside.
- Fortunately, 50-odd slim-jims appeared out of nowhere to
- save the day. Windrunner chauffeured us back to our lair.
-
- Sunday 3pm Hacked into the Louisiana Lotto machine from an acoustical
- modem and laptop from a pay phone to rig the numbers and
- then bought a ticket.
-
- Sunday 7pm Returned to hell. Lost the lotto ticket in the growing
- pile of sugar-coated necessities sheddings. Cursed.
-
- Sunday 8pm Turned the PC on and hit the networks.
-
-
- --------------------------
-
- Jim Carter, president of Bank Security in Houston, TX, wrote the
- following impressions of HoHoCon for Security Insider Report
- (December, 1992)
-
- HoHoCon was in fact "Unphamiliar Territory" for this "good ole boy,"
- but it didn't take long till I was into the swing of things and
- telling lies of how we cheat and steal to get our information. Of
- course, everyone who talked to this "good ole boy" thought he was with
- one of the three letter agencies. As the stories rolled on about what
- they (the hackers) could do, such as produce virii that would cause
- video display terminals and hard drives to smoke, I had to sit back, sip
- my brewski and say "wow." We sat back, enjoyed a few more rounds, told
- a few more lies and had a good time.
-
- Well, this old boy didn't show until about noon on Saturday. Of course
- the conference hadn't started yet so we didn't miss anything. The
- program was kicked off with a number of questions about who, what, where
- and how. It was difficult to determine how many people were there since
- the room was packed like a can of sardines. Our estimate was over two
- hundred, not counting the hackers still in their rooms. Was this
- another drunken free for all, as in the past? A report was given on
- cellular hacking and toll fraud. Hackers' rights were presented by an
- attorney. Also discussed was the stupidity of the press and law
- enforcement.
-
- Some others talked about suppressed information from the federal
- government concerning UFO's and how hackers are gaining this info. And
- of course the White House wants to know their sources.
-
- Hand outs were given including virii and virus source code. I did
- decline any virii, but who knew what I would get before this was over.
- I believe this was the most responsive and gratifying group I have
- spoken to this year. I also expect to get more business because of this
- presentation than any other this year.
-
- A lengthy door prize was held in which I was the winner of more virii.
- Again, I did decline, but passed the winning ticket on. Captain Crunch
- was the final speaker. In conclusion, the attendees were the good, the
- bad and the ugly. We did find HoHoCon very informative and, yes, we
- will attend again. In closing, I hope each and everyone had a very
- "Merry HoHoCon."
-
-
- --------------------------
-
- A (Hacker's) Mind is a Terrible Mind to Waste
- Unix World, page 136, March 1993
-
- by Gary Andrew Poole
-
- [Unix World wanted MONEY to reprint this in full...Yeah, right.
- Someone already posted it on alt.cyberpunk some time ago
- if you can't find it anywhere.]
-
- *-----------------------------------*
-
- Various Stuff Picked up at HoHoCon
-
- *-----------------------------------*
-
- --------------------------
- Flyer:
- --------------------------
-
- Unphamiliar Territory
- Phalcon/Skism Western World Headquarters
- The Ghost in The Machine Distribution
-
- Featuring:
-
- - 'Neutral Territory' forum where security issues can be discussed with
- top security people in the field.
-
- - Completely LEGAL forums on computer security, hacking, phraud.
-
- - Thousands of textfiles covering all aspects of the underground.
-
- - Hundreds of viruses and virus source code for the serious
- programmer.
-
- Information:
-
- - Administrators are Invalid Media, Mercury/NSA, Warlock Bones and
- Jaeger.
-
- - Run on a professor Falken/LOD donated ZOOM v32bis
-
- - Mentioned in MONDO 2000 and reviewed in the latest Infoworld.
-
- - Dialin 602-894-1757 / 24 hours
-
- --------------------------
- Flyer
- --------------------------
-
- In your defense..... Courtesy Freeside Orbital Data Network, HoHoCon '92
- - B. O'Blivion
- Repeat after me:
-
- "If I am reading this to you, then I believe that you are
- questioning, detaining, or arresting me, or searching my person or
- possessions in the course of your official duties."
-
- "I do not consent to any search of seizure of any part of my person
- or property, nor to any property of others under my control. I do not
- consent to any person's examination, search, or removal of any
- information storage equipment or media in my possession. You are hereby
- notified that such information storage equipment or media contain
- private written and electronic mail, confidential communications, and
- other material protected under the Electronic Communications Privacy Act
- and other statutes."
-
- "I respectfully decline to answer any questions beyond confirmation
- of my identity, and require access to legal counsel immediately. I
- demand that access to legal counsel be provided to me before any
- questioning takes place. I will answer no questions nor give any
- information outside the presence of legal counsel. All requests for
- interviews, statements, consents, or information of any sort should be
- addressed to me through my attorney. I invoke the rights five to me by
- the Fifth and Sixth Amendments of the Constitution of the United
- States."
-
- "I further notify you that the speech and information contained on
- information storage and handling devices at this site are protected
- by the First and Fourth Amendments to the Constitution of the United
- States, and that any unlawful search or seizure of these items or of
- the information they contain will be treated as a violation of the
- Constitutional rights of myself and other users of these devices and
- media."
-
- "I further notify you that any such violations of any person's legal
- or Constitutional rights which are committed at any time, by any person,
- will be the subject of civil legal action for all applicable damages
- sustained. I require that at this time all officers participating in
- this illegal search, seizure, or arrest identify themselves at this time
- by name and badge number to me and my legal counsel."
-
- [Include if applicable]
-
- "I further notify you that I am a Computer System Operator providing
- private electronic mail, electronic publications, and personal
- information storage services to users in this State, and among the
- United States. Any person causing a breach of the security of, or
- violation of the privacy of, the information and software herein will be
- held liable for all civil damages suffered by any and all users
- thereof."
-
- --------------------------
- Flyer
- --------------------------
-
- HoHoCon 1992
- Amusing Local Frequencies
- courtesy of -=RDT.
-
- Allen Park Inn Security - 464.500 Houston Post - 154.540
- 173.275
-
- 452.975
- Houston Police:
-
- North Shepherd Patrol - 460.325
- NE Patrol - 460.125
- SE Patrol - 460.025
- SW Patrol - 460.050
- Central Patrol - 460.100
- Spec. Op. Traffic - 460.350
- Car 2 Car - 460.225
- South Central Patrol - 460.550
- NW Patrol - 460.475
- West Patrol - 460.150
- Accident - 460.375
- Misc - 460.525
- 460.575
- 460.400
- Records - 460.425
- City Marshalls - 453.900
- Paging - 155.670
- Police Intercity - 453-550
-
- A number of people have been asking "who is RDT? what the hell is
- RDT?" For the record, we're hackers who believe information should be
- free. All information. The world is full of phunky electronic gadgets
- and networks, and we want to share our information with the hacker
- community. We currently write for 2600 magazine, Phrack, Mondo 2000,
- Cybertek, and Informatik.
- The five "charter members" of RDT are Count Zero, Brian Oblivion,
- Magic Man, White Knight, and Omega. Each of us has complementary
- skills, and as a group we have a very wide area of technical
- knowledge. Feel free to contact us.
-
- Count Zero - count0@ganglia.mgh.harvard.edu
- Brian Oblivion - oblivion@ganglia.mgh.harvard.edu
- Magic Man - magic@ganglia.mgh.harvard.edu
- White Knight - wknight@ganglia.mgh.harvard.edu
- Omega - omega@spica.bu.edu
-
- "They are satisfying their appetite to know something that is not theirs
- to know." - Asst. District Attorney Don Ingraham
-
- "All-you-can eat buffet...for FREE!" - Restricted Data Transmissions
-
- RDT "Truth is Cheap, but Information Costs."
-
- --------------------------
- Magazine
- --------------------------
-
- Future Sex
-
- (a very odd pseudo-cyberpunk skin mag)
-
- 4 issues for $18, Canada $26, International US $48
-
- 1095 Market Street
- Suite 809
- San Francisco, CA 94103
- 415-621-5496
- 415-621-4946 fax
-
- --------------------------
- Video
- --------------------------
-
- Red $19.95
- (Phone Pranks can kill)
-
- Nekromantik II $29.95
- (No comment)
-
- Available through
-
- Film Threat Video
- P.O. Box 3170
- Los Angeles, CA
- 90078-3170 USA
-
- 818-848-8971
-
- Shipping: 1 tape $3.40
- 2-3 $4.60
- 4-6 $5.80
- 6+ $7.00
-
- Visa/MC accepted.
-
- --------------------------
- Official HoHoCon Crud
- --------------------------
-
-
- HoHoCon '92
-
- Product Ordering Information
-
-
- If you are interested in obtaining either HoHoCon shirts or videos,
- please contact us at any of the following:
-
- drunkfux@cypher.com
- hohocon@cypher.com
- cDc@cypher.com
- dfx@nuchat.sccsi.com
- drunkfux@ganglia.mgh.harvard.edu
- 359@7354 (WWIV Net)
-
- Freeside Orbital Data Network
- ATTN: dFx/HoHoCon
- 11504 Hughes Road Suite #124
- Houston, Texas
- 77089
-
- 713-866-4884 (Voice Mail)
-
-
- The shirts are $15 plus $2 shipping ($2.50 for two shirts). At this
- time, they only come in extra large. We may add additional sizes if
- there is a demand for them. The front of the shirt has the following
- in a white strip across the chest:
-
-
- I LOVE FEDS
-
- (Where LOVE = a red heart, very similar to the I LOVE NY logo)
-
-
- And this on the back:
-
- dFx & cDc Present
-
- HOHOCON '92
-
- December 18-20
- Allen Park Inn
- Houston, Texas
-
-
- There is another version of the shirt available with the following:
-
- I LOVE WAREZ
-
- The video includes footage from all three days, is six hours long and
- costs $18 plus $2 shipping ($2.50 if purchasing another item also).
- Please note that if you are purchasing multiple items, you only need
- to pay one shipping charge of $2.50, not a charge for each item. If
- you wish to send an order in now, make all checks or money orders
- payable to O.I.S., include your phone number and mail it to the street
- address listed above. Allow ten working days for arrival.
-
- Thanks to everyone who attended and supported HoHoCon '92. Mail us if
- you wish to be an early addition to the HoHoCon '93 (December 17-19)
- mailing list.
-
- --------------------------
- Text File
- --------------------------
-
- Rumors have begun to surface about a group of hackers who were involved in a
- project to uncover information regarding the existence of UFOs. The
- most public example pertaining to this alleged project was seen on
- Dateline NBC on the screen of the mystery hacker "Quentin."
-
- The story goes that this group of individuals decided to put their
- skills to work on a project that, if successful, would add legitimacy to
- the hacking process by uncovering information on what has been called the
- greatest cover-up in the history of the world. Milnet TAC ID cards
- were obtained through military officials sympathetic to the cause. Several
- sites and networks were targeted that had in the past been linked to UFO
- activity. These were sites like the Jet Propulsion Laboratory, Sandia Labs,
- TRW Space Research, American Institute of Physics, and various other
- educational, government and military sites.
-
- The rumors also emphasize that several sites had what these individuals
- called "particularly heavy security." Within several seconds after
- connection had been established, system administrators of sites used in
- this project were contacted. Further rumors state that there was
- information regarding a propulsion system designed utilizing what is
- termed "corona discharge" being analyzed at one site. The most sinister
- of all rumors states that one particular participant who was allegedly
- deeply immersed in TRWs internal network has not been heard from since
- uncovering data regarding a saucer being housed at one of their Southern
- California installations.
-
- Believe what you will about the reality of this project. Much will be
- dismissed as hacker lore, but within the core of every rumor lies a
- grain of truth.
-
- Are we being lied to? Why is this information still classified by the NSA?
- What are they hiding from us behind a maze of security? Will we continue
- to stand idly by and let an uncaring and deliberately evasive government
- shield us from what may be the most important, and potential dangerous
- news to ever surface? Information wants to be free, and only a
- concerted group effort can make this happen. How much do you really
- want to know about what is really going on?
-
- What follows is information that has been released regarding this project...
-
- ---------------------------------------------------------------------------
-
- PROJECT ALF-1
-
- A Planetary Effort
-
- TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET
- TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET
-
- These are the raw data. Where comments are appropriate, they
- will be included. The data will be grouped together with dates,
- names etc. to make correlations easier.
-
- There are countless references to the aliens, their down space
- craft and what the Government is doing with them.
- If, as is supposed, the research on the craft and the 'ufonauts'
- continues today, then undoubtedly there are computer records, somewhere.
-
- I. Searching the Skies; Tripping the Electronic Fence around the
- USA.
-
- US Space Command Space Surveillance Center, Cheyenne Mountain,
- Colorado Springs, Box Nine (Electronic Surveillance Room)
- (This is where they search for and track UFO activity.)
- U.S. Naval Space Surveillance System, Dahlgreen, Virginia, (Main
- computer), Lake Kickapoo, Texas (listening post): Search for
- 'Flash Traffic'
- Commander Sheila Mondran
- CINC-NORAD
- Space Detection and Tracking System
- Malabar, Forida
- 'Teal Amber' search
- National Military Command Center - Pentagon
- (These are the areas where UFO activity is tracked.
- There is a radar shield around the country that is 'tripped' by UFO's.
- All tracking and F14 scrambling is done through this system.)
-
- II. The Second Cover Up
-
- Defense Intelligence Agency
- Directorate for Management and Operations
- Project Aquarius (in conjunction with SRI)
-
- Colonel Harold E. Phillips, Army (where/what Feb. 1987)
- UFO Working Group, (formed Dec 1987)
- Major General James Pfautz, USAF, Ret. (March 87)
- US Army experiments -(Monroe Institute, Faber, VA)
- Major General Albert Stubblebine
- Capt. Guy Kirkwood,
- (thousands of feet of film of UFO's catalogued and on record somewhere.)
- The UFO Working Group was formed because one arm of the Govt doesn't
- know what the other is doing.)
-
- III. National Security
-
- NSA NAtional Security Agency, Dundee Society (Super secret elite
- who have worked on UFO's.)
- NSA - Research and Engineering Division
- NSA - Intercept Equipment Division
-
- Kirtland Force Base, Office of Special Investigations, Project
- Beta. 1979-83-? (Sandia Labs are here.)
- Paul Bennewitz
- Project Blue
- Project Blue Book
-
- (NSA computers do analysis for Pentagon.)
-
- IV. More Secret Players
-
- NASA, Fort Irwin, Barstow, CA
- NASA Ames Research Center, Moffet Field Naval Base
- SETI
- State Dept. Office of Advanced Technology
- Any Astronauts from Mercury, Gemini and Apollo
- CIA - Office of Scientific Investigation
- CIA - Domestic Collection Division
-
- (NASA has known about UFO's since the astronauts saw and photoed them.
- Records somewhere.)
-
- V. Dealing with the Secret
-
- MJ-12 (1952)
- Majectic 12
- Operation Majestic 12
- MAJIC-12
- Admiral Roscoe H. Hillenkoetter
- Dr. Vannevar Bush
- Dr. Detlev Bronk
- Dr. Jerome Hunsaker
- Dr. Donald Menzel
- Dr. Lloyd Berkner
- General Robt. Montague
- Sidney Souers
- Gordon Gray
- General Hoyt Vandenberg
- Sect State James Forrestal
- General Nathan Twining
- Pres. Truman
- Pres. Eisenhower
-
- (One of the biggest secrets ever.)
-
- Nevada Desert, Area 51, S4 (houses UFO's)
- (Robert Lazar talked!) 9 space ships on storage. Propulsion by
- corona discharge.
-
- (Area 51 is the most protected base on the planet.)
-
- VI. ROSWELL, NM Crashes
- Mac Brazel (farmer)
- Major Jesse A. Marcel
- 509th. Bomber Group
- Lewis Rickett, CIC Officer
- Colonel William Blanchard
- Gerald Anderson, witness to crash and aliens
-
- Wright Patterson Air Force Base, (parts lists of UFO's catalogued;
- autopsies on record) (Bodies in underground facility)
- Foreign Technology Building
- USAAF (United States Army Air Force reports: "Early Automation"
- Muroc, CA (Base with UFO's for study)
-
- (1 saucer with 4 aliens. They were transported to Wright and then
- saved, catalogued and autopsied.)
-
-
- VII. THOSE ON GOVT SHIT LIST
-
- (People who have gotten close.)
-
- Robert Lazar
- Major Donald Keyhoe
- William Moore
- Stanton Friedman
- Jaime Shandera
- Whitley Streiber
- Timothy Goode, UK
-
- Other UFO Crashes
- Del Rio, TX 12/50, Colonel Robert Willingham
- Las Vegas, 4/18/62
- Kecksburg, PA 12/9/65
-
-
- VIII. International
-
- Belgian Air Force. (They are going public and have records.
- Press conference held 7/12/91.)
- Australian Air Force
- UK; GCHQ
- British Air Force
- Belgium:
- NATO Radar Stations
-
-
- IX. UFO Civilian Groups. (What do they really know?)
-
- NICAP, National Investigations Committee on Aerial Phenomena
- (private company.)
-
- APRO, Tucson, AZ (Aerial Phenomona Research Organization,
- private company.)
-
- MUFON Mutual UFO Network
-
- X. GENERAL
-
- Kenneth Arnold, June 24, 1947
- Cattle and Sheep Mutilations
- General and Pres. Eisenhower, (private files and library)
- President Truman
- Wright Field or Wright Patterson Air Force Base, Dayton, OH, (Air
- Force Foriegn Technology Division)
- USAF Project Saint
- USAF Project Gemini
- Project Moon Dust
- Project Sign
- Project Grudge
- General Hoyt Vandenberg (1940-1960)
- Air Force Regulation 200-2 (8/12/54)
- Holloman AFB, NM
- Roswell, NM July 7, 1947
-
-
- XI. Possible Searches
-
- Presidential Libraries
- Old USAAF, (United States Army Air Force)
- NASA
- Astronaut Frank Borman, Gemini 7, pictures of UFO
- Neil Armstrong, Apollo 11, saw UFO's on moon.
- Colonel Gordon Cooper saw a bunch of them
- James McDivitt, 6/66
- United Nations
- NATO;
- General Lionel Max Chassin, French Air Force
- Star Wars, United Kingdom, 23 scientists killed in 6 years.
- Gulf Breeze, FL
- Additional UFO records at NSA, CIA, DIA, FBI
-
-
- Good Searching.
-
- ----------------------------------------------------------------------
- Project
- ->Green Cheese<-
- Data Base
- ---------------------------------------------------------------------
- Holloman AFB
- Location: New Mexico. Preconceived landing 15 years ago.
-
- DDN Locations:
- --------------
-
- NET : 132.5.0.0 : HOLLOMAN :
-
- GATEWAY : 26.9.0.74, 132.5.0.1 : HOLLOMAN-GW.AF.MIL : CISCO-MGS :: EGP,IP/GW :
- GATEWAY : 26.9.0.74, 132.5.0.1 : HOLLOMAN-GW.AF.MIL : CISCO-MGS :: EGP,IP/GW :
-
- HOST : 26.10.0.74 : HOLLOMAN-TG.AF.MIL : VAX-8650 : VMS : TCP/FTP,TCP/TELNET,TCP
- SMTP :
-
- HOST : 26.6.0.74 : HOLLOMAN-AM1.AF.MIL : WANG-VS100 : VSOS : TCP/TELNET,TCP/FTP,
- TCP/SMTP :
-
- Host: DDNVAX2.6585TG.AF.MIL
- 156.6.1.2
-
- -----------------------------------------------------------------------
-
- Kirtland Air Force Base
- Office Of Special Investigations. Sandia Labs are here. Also part of
- NSA Intercept Equipment Division.
-
- Key Words/names:
- ----------------
- Sandia Labs
- Project Beta (1979-83-?)
- Paul Bennewitz
- Project Blue
- Project Blue Book
-
- DDN Locations:
- --------------
-
- NET : 131.23.0.0 : KIRTLAND-NET :
- NET : 132.62.0.0 : KIRTLAND2 :
- GATEWAY : 26.17.0.48, 131.23.0.1 : KIRTLAND2-GW.AF.MIL,KIRTLAND-GW.AF.MIL
- : CISCO-MGS : UNIX : IP/GW,EGP :
- GATEWAY : 26.18.0.87, 132.62.0.1
- : KIRTLAND1-GW.AF.MIL,KIRTLAND1606ABW-GW.AF.MIL : CISCO-MGS :
- : EGP,IP/GW :
- HOST : 26.0.0.48 : KIRTLAND.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
- HOST : 26.0.0.87 : KIRTLAND2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
- HOST : 26.6.0.87 : KIRTLAND-AM1.AF.MIL : WANG-VS300 : VS ::
-
- -----------------------------------------------------------------------
-
- NASA
- What can I say about NASA that you couldnt guess for yourself....
- (Except that the following sights are SPECIFIC NASA sights, not
- just randomly suspected sights).
-
- DDN locations:
- --------------
-
- Fort Irwin, Barstow, CA:
- -----------------------
- NET : 134.66.0.0 : IRWIN :
- NET : 144.146.0.0 : FTIRWIN1 :
- NET : 144.147.0.0 : FTIRWIN2 :
- GATEWAY : 26.24.0.85, 26.7.0.230, 144.146.0.1, 144.147.0.0
- : FTIRWIN-GW1.ARMY.MIL : CISCO-GATEWAY : CISCO : IP/GW,EGP :
- HOST : 26.14.0.39 : IRWIN-ASBN.ARMY.MIL : NCR-COMTEN-3650 : COS2 ::
- HOST : 26.13.0.85 : FTIRWIN-AMEDD.ARMY.MIL : ATT-3B2-600G : UNIX
- : TCP/FTP,TCP/SMTP,TCP/TELNET :
- HOST : 26.14.0.85 : FTIRWIN-IGNET.ARMY.MIL : DATAPOINT-8605 : RMS ::
- HOST : 26.15.0.85 : IRWIN-EMH1.ARMY.MIL,FTIRWIN-EMH1.ARMY.MIL : SPERRY-5000
- : UNIX : TCP/FTP,TCP/SMTP,TCP/TELNET :
-
- Moffet Field Naval Base (Ames Research Center):
- -----------------------------------------------
- GATEWAY : 26.20.0.16, 192.52.195.1 : MOFFETT-FLD-MB.DDN.MIL,AMES-MB.DDN.MIL
- : C/70 : CHRYSALIS : IP/GW,EGP :
- HOST : 26.0.0.16 : MOFFETT.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
-
- -----------------------------------------------------------------------
- Pentagon (National Military Command Center)
- One of many places in charge of tracking UFO activity.
-
- Possible DDN sights:
- -------------------
-
- GATEWAY : 26.9.0.26, 134.205.123.140 : PENTAGON-GW.HQ.AF.MIL : CISCO-AGS :
- : EGP,IP/GW :
- GATEWAY : 26.25.0.26, 131.8.0.1 : PENTAGON-GW.AF.MIL,HQUSAFNET-GW.AF.MIL
- : CISCO-MGS :: IP/GW,EGP :
- GATEWAY : 26.10.0.76, 192.31.75.235 : PENTAGON-BCN-GW.ARMY.MIL : SUN-360
- : UNIX : IP/GW,EGP :
- GATEWAY : 26.26.0.247, 192.31.75.1 : PENTAGON-GW.ARMY.MIL : SUN-3/160
- : UNIX : EGP,IP/GW :
- GATEWAY : 26.31.0.247, 26.16.0.26, 141.116.0.1 : PENTAGON-GW1.ARMY.MIL
- : CISCO : CISCO : IP/GW,EGP :
- HOST : 26.0.0.26 : PENTAGON.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
- HOST : 26.24.0.26 : OPSNET-PENTAGON.AF.MIL : VAX-8500 : VMS
- : TCP/TELNET,TCP/FTP,TCP/SMTP :
- HOST : 26.10.0.76, 192.31.75.235 : PENTAGON-BCN.ARMY.MIL : SUN-360 : UNIX
- : TCP/FTP,TCP/SMTP,TCP/TELNET :
- HOST : 26.0.0.247 : PENTAGON2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
- HOST : 26.7.0.247 : PENTAGON-AMSNET.ARMY.MIL : AMDAHL : MVS
- : TCP/TELNET,TCP/FTP :
- HOST : 26.14.0.247 : NSSC-PENTAGON.NAVY.MIL : ALTOS-3068A : UNIX
- : TCP/FTP,TCP/TELNET,TCP/SMTP :
- HOST : 26.18.0.247 : PENTAGON-EMH4.ARMY.MIL : SPERRY-5000/80 : UNIX
- : TCP/TELNET,TCP/FTP,TCP/SMTP :
- HOST : 26.26.0.247, 192.31.75.1 : PENTAGON-AI.ARMY.MIL : SUN-3/160 : UNIX
- : TCP/TELNET,TCP/FTP,TCP/SMTP,TCP/FINGER :
-
- -----------------------------------------------------------------------
-
- Raddaman
- Location of infamous building 18a. Suspected saucers and others?
-
- DDN location, yet unknown.
-
- ------------------------------------------------------------------------
-
- SECI
- ?
-
- DDN Locations:
- --------------
-
- NET : 192.108.216.0 : ARC-SETI-NET :
-
- ------------------------------------------------------------------------
-
- Utah Locations:
-
- GATEWAY : 26.18.0.20, 131.27.0.1 : HILL-GW.AF.MIL,HILLAFBNET-GW.AF.MIL
- : CISCO-MGS :: IP/GW,EGP :
-
- GATEWAY : 26.18.0.20, 131.27.0.1 : HILL-GW.AF.MIL,HILLAFBNET-GW.AF.MIL
- : CISCO-MGS :: IP/GW,EGP :
-
- HOST : 26.5.0.20 : HILL.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
- HOST : 26.0.0.99 : HILL2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
- HOST : 26.12.0.99 : HILL-AM1.AF.MIL : WANG-VS100 : VS
- : TCP/TELNET,TCP/FTP,TCP/SMTP :
-
- -------------------------------------------------------------------------
-
- Wright Patterson AFB
- Catalogued UFO parts list. Autopsies on record. Bodies located in
- underground facility of Foreign Technology Building.
-
- DDN Locations:
- --------------
-
- HOST : 26.0.0.47 : WRIGHTPAT.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
- HOST : 26.8.0.123 : WRIGHTPAT2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
- HOST : 26.0.0.124 : WRIGHTPAT3.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
- HOST : 26.3.0.170 : WAINWRIGHT-IGNET.ARMY.MIL : CONVERGENT-TECH-CN-100
- : CTOS ::
- HOST : 26.0.0.176 : WRIGHTPAT4.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
-
- -------------------------------------------------------------------------
-
- Nevada:
-
- NET : 131.216.0.0 : NEVADA :
-
- -------------------------------------------------------------------------
-
- Random Suspected Nets:
-
- WIN:
- Top Secret Network. All coordinator's have last name Win.
-
- NET : 141.8.0.0 : DFN-WIN8 : NET : 141.9.0.0 : DFN-WIN9 :
- NET : 141.10.0.0 : DFN-WIN10 : NET : 141.15.0.0 : DFN-WIN15 :
- NET : 141.25.0.0 : DFN-WIN25 : NET : 141.26.0.0 : DFN-WIN26 :
- NET : 141.28.0.0 : DFN-WIN28 : NET : 141.57.0.0 : DFN-WIN57 :
- NET : 141.58.0.0 : DFN-WIN58 : NET : 141.59.0.0 : DFN-WIN59 :
- NET : 141.60.0.0 : DFN-WIN60 : NET : 141.61.0.0 : DFN-WIN61 :
- NET : 141.62.0.0 : DFN-WIN62 : NET : 141.63.0.0 : DFN-WIN63 :
- NET : 141.64.0.0 : DFN-WIN64 : NET : 141.65.0.0 : DFN-WIN65 :
- NET : 141.66.0.0 : DFN-WIN66 : NET : 141.67.0.0 : DFN-WIN67 :
- NET : 141.68.0.0 : DFN-WIN68 : NET : 141.69.0.0 : DFN-WIN69 :
- NET : 141.70.0.0 : DFN-WIN70 : NET : 141.71.0.0 : DFN-WIN71 :
- NET : 141.72.0.0 : DFN-WIN72 : NET : 141.73.0.0 : DFN-WIN73 :
- NET : 141.74.0.0 : DFN-WIN74 : NET : 141.75.0.0 : DFN-WIN75 :
- NET : 141.76.0.0 : DFN-WIN76 : NET : 141.77.0.0 : DFN-WIN77 :
- NET : 141.78.0.0 : DFN-WIN78 : NET : 141.79.0.0 : DFN-WIN79 :
- NET : 141.80.0.0 : DFN-WIN80 : NET : 141.81.0.0 : DFN-WIN81 :
- NET : 141.82.0.0 : DFN-WIN82 : NET : 141.83.0.0 : DFN-WIN83 :
- NET : 141.84.0.0 : DFN-WIN84 : NET : 141.85.0.0 : DFN-WIN85 :
- NET : 141.86.0.0 : DFN-WIN86 : NET : 141.87.0.0 : DFN-WIN87 :
- NET : 141.88.0.0 : DFN-WIN88 : NET : 141.89.0.0 : DFN-WIN89 :
- NET : 141.90.0.0 : DFN-WIN90 : NET : 141.91.0.0 : DFN-WIN91 :
- NET : 141.92.0.0 : DFN-WIN92 : NET : 141.93.0.0 : DFN-WIN93 :
- NET : 141.94.0.0 : DFN-WIN94 : NET : 141.95.0.0 : DFN-WIN95 :
- NET : 141.96.0.0 : DFN-WIN96 : NET : 141.97.0.0 : DFN-WIN97 :
- NET : 141.98.0.0 : DFN-WIN98 : NET : 141.99.0.0 : DFN-WIN99 :
- NET : 188.1.0.0 : WIN-IP : NET : 192.80.90.0 : WINDATA :
-
- -----------------------------------
-
- Scinet:
- Sensitive Compartmented Information Network
-
- NET : 192.12.188.0 : BU-SCINET :
-
- -----------------------------------
-
- Disnet:
- Defense Integrated Secure Network. Composed of SCINET, WINCS
- ([World Wide Military and Command Control System] Intercomputer
- Network Communication Subsystem), and Secretnet(WIN).
-
- NET : 22.0.0.0 : DISNET :
-
-