Copy Link
Add to Bookmark
Report
Phrack Inc. Volume 04 Issue 42 File 13
==Phrack Magazine==
Volume Four, Issue Forty-Two, File 13 of 14
HoHoCon 1992
Miscellany
The hackers were getting nervous. It was understandable. Just a few weeks
before HoHoCon and already two other "get-togethers" had experienced
turbulence from the authorities.
Rumors began to fly that HoHo was to be the next target. Messages bearing
ill-tidings littered the underground. Everyone got worked into a frenzy about
the upcoming busts at HoHoCon. People began to cancel their reservations
while others merely refused to commit one way or the other.
But, amidst all the confusion and hype, many declared "Let them try to
raid us! I'm going anyway!" These were the few, the proud...the stupid.
-------------------------------------------------------------------------------
HoHoCon as I saw it - Erik Bloodaxe (Chris Goggans)
I arrived at the Allen Park Inn in the mid afternoon on Friday the 18th.
I was promptly greeted by several of my cohorts and a loping transient
who introduced himself as "Crunchhhhhhhhh." Yes, John Draper, the infamous
Captain Crunch had actually ventured outward to attend our little party.
(Yes, Virginia, the rumors are true: The Captain is toothless, unkempt,
overbearing and annoying as all hell.)
I followed Scott Chasin back to our room, the pack of other early arrivals
in close file behind. After storing my gear I noticed that Draper was
looming in the doorway ranting furiously about all the smoking in our room.
"I've never heard of a hacker who smoked," exclaimed the Captain.
Taking this as my cue, I bummed a Djarum off of Crimson Death and took great
glee in adding my fumes to the enveloping fog.
Draper spent the next 30 minutes attempting to eavesdrop on various
conversations in which various old friends were catching up. Not knowing
any of us personally, he nonetheless felt obligated to offer his comments
about our discussions about life and college and music amidst his coughing
and complaining about the smoke.
After some time everyone was banished from the room and several of us
went out to eat. Scott Chasin, myself, two hackers (The Conflict, & Louis
Cypher) along with Gary Poole (covering the entire mess for Unix World) took
off for the nearest grease pit. Taco Bell won in proximity, and once
surrounded by burritos Scott, Conflict and I began our rant about Unix
Security (the lack thereof). Gary whipped out his Unix World pen and pad
and began taking notes. I am uncertain whether or not it was the content
of our spiel or the asides I repeatedly made regarding the bevy of giggling
coeds that garnered the most notes in Gary's booklet.
Back at the Con things were spicing up. More people had begun to arrive
and the Allen Park Inn staff began to worry about their safety and that of
their other guests. One remarked to Jesse (Drunkfux), the sponsor of HoHoCon, "That Draper
fellow needs to stay out of the lobby. He was eating large
amounts of flesh off his hands and it was scaring some of the visitors."
The staff did not know what to think at all when a father arrived with his
three sons and after purchasing a room on his credit card told the boys, "Ok
guys, Mom will be picking you up on Sunday."
This did not concern most of us. It was straight to the bar
for us, where Rambone bought Scott & myself a round of Kamikazes. Also at
the bar was Bootleg who had just gotten out. (Of what, and for what you
can find out on your own.) Bootleg is probably the smartest biker I have
ever had the pleasure to meet. We talked about sex, drugs, hawgs, computers,
cellular fraud and how close the nearest cabaret was.
A small controversy began to arise amidst the hackers at the bar. Stationed
near one end of the room was a table lined with older men. "FEDS," someone
murmured, gesturing at the group.
"Good for them," I said, and left the bar to look for Jesse. When I returned
several minutes later the hackers had engaged the strangers in conversation
and found that they weren't feds after all. Among this group were
Jim Carter of Houston-based Bank Security, and Bernie Milligan of
Communications & Toll Fraud Specialists, Inc. Once this news was out
tensions eased and everyone continued with their libations.
Suddenly I became aware that there was girl in the room. I had seen her out
in the courtyard previously but now she was alone. Turning on my
"Leisure Suit Larry" charm I grabbed the seat next to her. Melissa had arrived
from Austin to cover the event for Mondo-2000. She surprised me by telling
me that she knew who I was, where I worked, and even knew my extension number.
(I almost fell off the barstool.)
Jim & Bernie came over and joined us at the bar. Bootleg, Chaoswiz, Melissa
and I engaged them in wild stories about UFO's, hacking, the NSA & the CIA.
(Bernie alleged that he was ex-NSA, and Jim ex-CIA. We have not yet
determined if they were acting under orders from Col. Jim Beam & Gen. Jack
Daniels.)
After the ensuing debates on the true formation of the NSA, the group broke up
and Melissa and I took off to MC Allah's room to partake of the keg he had
brought. We walked in the room and were greeted with the sight of a four-foot
boy with a syringe sticking out of his arm. This was a bit much, even for me.
I snatched his "medication" away from him and found that it was really only
some type of growth hormone. The boy, 8-Ball, was actually 15 and his parents
had him on hormones to stimulate his growth. 8-Ball was totally whacked
out his mind nonetheless. I think he had ingested such a diverse amount of
God knows what by the time we arrived that he was lucky to remember where
he was. Later that evening he would become convinced that he was Scott
Chasin and confessed to quite a bit of wrongdoing just before he gave offerings
at the porcelain alter.
Conversations in the keg room left something to be desired. One large hacker
named Tony looked at Melissa and in his best British accent asked if he
could fondle her breasts. And the debate between MC Allah and Hunter about
who could drink the most alcohol reached a climax when both stuck their heads
under the keg spigot for extended periods of time.
Sometime just before 11:00 the hotel guard, attired in Raiders jacket and
a really, really big snow hat (the kind with the poofy ball on top) showed
up brandishing his paper baton, (A rolled up Houston Press). "You all
needs to get to yaw roomz, nah. I ain'tz ta gonna tell yaw no mo'."
Everyone looked the guard over and moved back into the keg room. Thus was
born, "Homie da Guard." After he wandered away, everyone moved back out
onto the porch.
It was getting late and I was supposed to speak the next morning so I tried to
get into our room. Scott Chasin, hacker extrordinaire, had locked me out.
After beating on the door for 10 minutes, the windows for 5, the walls for 10,
and letting the phone ring for another 15 minutes I decided that Scott was a
bit too tipsy to unlock the door so I crashed out on Jesse's floor.
That night, the water pipes broke. There was some speculation that those
evil hackers had "hacked the system." Not.
While complaining about the lack of water that night, someone overheard
three young attendees at a bank of pay phones attempting to order up
a few escorts on "credit." Rumor has it they were successful.
The next morning was chaos. By the time we arrived at the conference room
there were about 150 people inside. Louis Cypher sat at the door collecting
money for the raffle and getting everyone to sign the guest book. Jesse
and others were setting up various video equipment and getting things
in order. In the back of the room, Bernie sat scanning the crowd with a
super-ear, recording the conversations of those sitting.
Crunch was up in arms again. "If everyone in here doesn't stop smoking
I won't be able to do my speech. If you all want to hear me talk, you
will have to stop smoking." Several more cigarettes lit up. After
speaking with management, Crunch came back in and asked if everyone smoking
would at least move to one side of the auditorium nearest the door.
With hesitation, the crowd conceded.
The conference got underway with consultant Ray Kaplan taking a census of
those in attendance. The group ranged from under 15 to over 50, had
professionals and hobbyists, and had enthusiasts for every conceivable
type operating system. Ray went on to elaborate on one of his audio
conferences in which an FBI officer alluded that one of their key
sources of information was "I.R.C."
Bootleg got up and spoke on the vast potentials involved with cellular
fraud. He discussed how to monitor the reverse channel to obtain ESNs,
and where to obtain the equipment to allow you to do such a thing. He
later handed out diskettes (IBM format) containing information on how
to reprogram cellular phones and where to obtain the equipment necessary
to pick subscriber numbers out of the air.
Up next, myself and Chasin. Our topic was a bit obscure and cut deliberately
short due to concerns about the nature of our speech. During the Dateline
NBC piece that featured Chasin a piece of information flashed on the screen
that alluded to UFO information stored on military computers. Chasin
and I had gained possession of the research database compiled by the hackers
who were looking into this. We discussed their project, the rumors surrounding
their findings and the fear surrounding the project. Not knowing the true
details of this we declined to comment any further, but made the documentation
available to anyone who wanted a copy. We finished our speech by answering
questions about Comsec, Consultants, etc.
Steve Ryan, a Houston lawyer with a great deal of interest in the
legal aspects of cyberspace spoke next. He covered several of the current
issues affecting the community, spoke on laws in effect, cases pending,
and gave an insight to his background that led him to focus in on
the issues concerning the electronic community.
Next, Jim Carter gave a quick and dirty demonstration of how to monitor
electromagnetic radiation and how to do a simple data recovery from this
noise. He monitored a small data terminal from a portable television set
that was completely unmodified. He then spoke on how to read the
EMR from such things as plumbing, the ground, off of window panes, etc.
Jim's speech, although highly intriguing, got extremely vague at points,
especially regarding technology needed, his own background, etc.
(We will attribute this to his "CIA" training.)
The Hotel Officials showed up and demanded that everyone get out immediately.
Apparently someone had staggered into the kitchen, drunk, and broken
something. Steve Ryan left to smooth things out a bit. After a few minutes
he returned and told everyone that they could stay, but to keep it quiet
tonight. Thus the secret plans of some to drive the hotel golf cart
into the pool were crushed.
The raffle proved to be an exercise in banality. Everything from
flashing street lights to SunOS 4.1.3 to T-shirts to books were
auctioned off. One lucky devil even got an official Michael Jackson
candy bar.
The folks from RDT (Count Zero and White Knight) handed out a large amount
of photocopied goodies such as the new "Forbes" article on hackers,
a complete set of the old 70's telephony 'zine "TEL" as well as assorted other
flyers and pamphlets.
Up next, Louis Cypher spoke about his entanglement with the law
regarding his front-page bust for counterfeiting. He told of his
experiences with the law, how they got involved in such a dastardly
deed, what jail was like on the inside, and advice against anyone
else considering such a thing.
Up last, John Draper. Draper had managed by this time to annoy almost
everyone at the convention. A large portion of those in attendance
left as soon as he got up. They were the unlucky ones. Draper, for all his
oddities, is an intriguing speaker. His life has been quite rich with
excitement and when he can actually focus on a subject he is captivating.
He spoke on his trip to the Soviet Union where he met computer and telephone
enthusiasts in Moscow. He spoke on his unfortunate involvement with
Bill SF and the BART Card duplication scandal. He spoke, with obvious
longing, of the good old days of blue boxing, and stacking tandems to
obtain local trunks, and on verification circuitry.
Listening to Draper talk really brought me back to my beginnings. I could
hear in my head the "cachink-chink" of a tandem waiting for MF. I remembered
stacking tandems to Europe and back to call my other line. I remembered
the thrill of finding never before known trunks and exploring their
connections. I fell into a deep nostalgic high, and walked up to John
to tell him thanks. As I extended my hand to him, he mumbled something
unintelligible and wandered off. So much for paying respect.
About ten of us took off to Chuy's for dinner: Me, Chasin, Conflict,
Rambone, Dispater, Blue Adept, Minor Threat and reporters Joe Abernathy
and Gary Poole were among the diners. Everyone ate heartily and listened
to cordless telephone conversations on Rogue Agent's handheld scanner.
One conversation was between what appeared to be a "pimp" talking to his
"ho" about some money owed him by another in his flock. The conversation
drifted to the Dallas man who had terrorized an entire neighborhood some
months back with prank phone calls. Conflict and Dispater repeated a
few of the choicest of the calls for our amusement.
Back at the hotel, Dr. Hoffman's Problem Child had escaped, and several
casualties were reported.
Conflict, Chasin and I barricaded ourselves in our room and went on a lengthy
stream of consciousness rant about what we needed out of life. Our absolute
essentials were reduced to a small room with a computer hooked into the
Internet, a specially designed contour chair, a small hole through which
a secretary would give us food, virtual reality sex toys, and a toilet.
(Chasin suggested no toilet, but a catheter so we would never have to move.)
Gary Poole was quietly stunned in the corner of the room making mental notes.
Much of the con had moved into a suite that had been converted into a
mass computing arena. Several attendees from Pittsburgh had turned their
room into a lab with four Unix workstations with several terminals throughout
the room including the bathroom! These were hooked into the Internet through
a slip connection that had been rigged somewhere. It was quite a site.
The room was usually completely packed and smelled like a smoky gymnasium.
(It was rumored that after Chasin and I spoke on the UFO conspiracy, several
hackers began their attempts at penetrating the Ames Research Lab. No
reports back on their success.)
After I finished copying several Traci Lords video tapes (ahem) I relinquished
control of the decks to a room downstairs. Dispater played a video
manipulation he and Scott Simpson had produced. They had found a TRW training
video tape during a trashing run and dubbed in their own dialogue. (You'd
have to see it to fully understand.)
After that, I played a few tapes of my own. The first was a short film called
"Red," that chronicled the abusive prank phone calls directed at a bartender.
The film had the actual phone call tapes played with video stills. (Guess
where the Simpsons came up with that nifty idea...)
Following "Red," someone heard on the scanner that the guard was answering
a large noise disturbance in the room we were in. (Yes, they had the hotel
guard's 2-meter frequencies.) Everyone moved into another room before the
guard showed up. He was thoroughly confused.
In the next room I played the ultimate in shock, the sequel to the movie that
I had disturbed the entire con with last year, "Nekromantik II." I won't
go into any detail, since the title says it all. Once again, I reign as
the sickest person at HoHoCon, this honor bestowed upon me by everyone
who witnessed the showing.
As things winded down, several people ended up back in our room to waste
away the last few hours of the night. Several people returned from an
adventure to "an abandoned hospital." No one really understood what they went
to, but it sounded disturbing. Later, that same group would leave to
go climb "an abandoned grain storage tower." Go figure.
Approximately 2:00 am, a local hacker named Zach showed up. Scott had a few
words for Zach, as did most everyone at the Con. Zach lived in a fantasy
land where he was a top notch security consultant with high paying clients
in the telecommunications industry. He also like to name drop names like
Chasin and Goggans as his partners and as people who would swoop down
and terrorize the people he had any problems with. He also liked to turn
in, or threaten to turn in any of his rivals in the software pirating
community. He also like to proposition young boys both in person and
over the phone. At 17, Zach had a few problems.
Trapped in the corner of the room, Zach endured about an hour of questioning
and accusations (all of which he truly deserved.) Eventually Zach left,
apparently not affected by the ordeal at all. We attributed this to his
overly apparent schizophrenia brought on by denial of his sexual
tendencies.
Later that night the Pittsburgh gang blew out the power in their entire
wing. One was overheard, "Hmmm...guess we should have known that when the
power strips kept melting that we were drawing too much power."
The next morning everyone gathered up their gear and said so long. All but
a few who gathered in a room marked "the suite of the elite." Armed with
a nitrous oxide blaster, everyone sat around and viewed the con through
the roaming video eye of Jesse, who had managed to capture everyone
in some kind of compromising position. He will be selling them off
after he edits it a bit. It was dubbed "The Blackmail Tape."
In my opinion this year was much less anarchistic than last year. The
convention might not even be banished from this hotel. (Yeah, right.)
There were no raids, there were no overtly violent or satanic acts,
no fire alarms, no trashing runs (that I saw), no fights,
and there were no strippers (alas). The conference portion of the
event was much better organized, there was much more interesting
information to be shared, and was well worth the distances traveled by
all.
This was HoHoCon '92.
--------------------------
H*O*H*O*C*O*N '92
Frosty's Itinerary
Thursday 8pm Take off and go bar hopping all night long to build up
stamina for the convention.
Thrusday 10pm Quit bar hopping and waste shitloads of money at the
casinos in feeble attempts to get gas money for the trip.
Friday 5am Leave the casino and decide to get some sleep after spending
hours to win a meager $10 over starting cash.
Friday 8am Wake up and decide to pack for the trip. Forget necessities
that we couldn't live without. Remember to bring junk food.
Friday 9am Stuff assembled GCMS members into subcompact Japanese micro
car and leech as much gas money out of them as possible.
Friday 2pm Stop at the friendly convenient store to rob it of precious
sugar-coated necessities and obtain mucho lotto tickets.
Friday 4pm Endure Windrunner's gruelling multi-hour long verbatim
rantings of taking the Purity Test 1500 verbally.
Friday 7pm Pull out many maps and try to find the damn hotel in Houston.
Friday 9pm Arrive at the hotel getting a room for one (car stuffed
with people sits outside the lobby). Request two keys.
Friday 10pm Test the smoke machine on the hotel grounds. Chase young
code-kids out of your way, threatening to disable their
phones.
Friday 11pm Crash in room from lack of sleep. Kick other members out
of your way. Ignore multiple alcoholic beverages lining
the room. Ponder what's sleeping in the chair briefly.
Saturday ??? Try to figure out if you're awake or dead. Take a collection
from those that are still alive. Run to some micro-compact
Japanese convenience store hidden in the middle of suburbia
hell and obtain sugar-coated nutrients with Windrunner and
JunkMaster and Gaijin.
Saturday 1pm Arrive for the conference. Get mega-amounts of raffle tickets.
Saturday 2pm Conference actually gets started a few hours behind schedule.
Tape conversations from the man with the whisper 2000 home
version. Ponder the light orbiting Erik B's head.
Saturday 4pm Witness Steve Ryan in action against the hotel staff.
Wonder where the young hack in the corner got the gallon,
mostly empty now, of wine. Ponder if he's going to spew.
Saturday 6pm Try to figure out what everyone is going to do with the
several hundred flashing construction lights given out.
Calculated the ratio of men to women as 15,000:1, roughly.
Saturday 8pm Try to keep awake while wondering how much torture can be
sustained. Watch Count Zero nodding off. Hitman and I
pulled out our decoder rings to interpret Crunch's hidden
message.
Saturday 10pm Dominoes Pizza makes it to the room. OUR SAVIOR !!! He's
5-minutes late. Custody battle over the pizza ensues. The
manager is called, at which point he lowers the $50 price
for the two pizzas down to $30. We scrape a few dollars and
hand the peon delivery boy some cheap beer.
Saturday Nite Hand out copies of "cindy's torment" to the code kids.
Watch Erik B.'s continuation of necrophiliac desires on
the acquired VCR that mysteriously appeared. Avoided the
hotel security by changing room while monitoring their
frequencies (thanks RDT). Obtained evidence that hackers
were breaking into VR R&D departments to engage in endless
routines of VR sex for Cyborgasmic responses. Saw Crunch's
host's room blow out as the multitudes of computers fry the
circuits. Followed the 'sheep' about the hotel.
Sunday ??? Woke bright and early to a car locked with the keys inside.
Fortunately, 50-odd slim-jims appeared out of nowhere to
save the day. Windrunner chauffeured us back to our lair.
Sunday 3pm Hacked into the Louisiana Lotto machine from an acoustical
modem and laptop from a pay phone to rig the numbers and
then bought a ticket.
Sunday 7pm Returned to hell. Lost the lotto ticket in the growing
pile of sugar-coated necessities sheddings. Cursed.
Sunday 8pm Turned the PC on and hit the networks.
--------------------------
Jim Carter, president of Bank Security in Houston, TX, wrote the
following impressions of HoHoCon for Security Insider Report
(December, 1992)
HoHoCon was in fact "Unphamiliar Territory" for this "good ole boy,"
but it didn't take long till I was into the swing of things and
telling lies of how we cheat and steal to get our information. Of
course, everyone who talked to this "good ole boy" thought he was with
one of the three letter agencies. As the stories rolled on about what
they (the hackers) could do, such as produce virii that would cause
video display terminals and hard drives to smoke, I had to sit back, sip
my brewski and say "wow." We sat back, enjoyed a few more rounds, told
a few more lies and had a good time.
Well, this old boy didn't show until about noon on Saturday. Of course
the conference hadn't started yet so we didn't miss anything. The
program was kicked off with a number of questions about who, what, where
and how. It was difficult to determine how many people were there since
the room was packed like a can of sardines. Our estimate was over two
hundred, not counting the hackers still in their rooms. Was this
another drunken free for all, as in the past? A report was given on
cellular hacking and toll fraud. Hackers' rights were presented by an
attorney. Also discussed was the stupidity of the press and law
enforcement.
Some others talked about suppressed information from the federal
government concerning UFO's and how hackers are gaining this info. And
of course the White House wants to know their sources.
Hand outs were given including virii and virus source code. I did
decline any virii, but who knew what I would get before this was over.
I believe this was the most responsive and gratifying group I have
spoken to this year. I also expect to get more business because of this
presentation than any other this year.
A lengthy door prize was held in which I was the winner of more virii.
Again, I did decline, but passed the winning ticket on. Captain Crunch
was the final speaker. In conclusion, the attendees were the good, the
bad and the ugly. We did find HoHoCon very informative and, yes, we
will attend again. In closing, I hope each and everyone had a very
"Merry HoHoCon."
--------------------------
A (Hacker's) Mind is a Terrible Mind to Waste
Unix World, page 136, March 1993
by Gary Andrew Poole
[Unix World wanted MONEY to reprint this in full...Yeah, right.
Someone already posted it on alt.cyberpunk some time ago
if you can't find it anywhere.]
*-----------------------------------*
Various Stuff Picked up at HoHoCon
*-----------------------------------*
--------------------------
Flyer:
--------------------------
Unphamiliar Territory
Phalcon/Skism Western World Headquarters
The Ghost in The Machine Distribution
Featuring:
- 'Neutral Territory' forum where security issues can be discussed with
top security people in the field.
- Completely LEGAL forums on computer security, hacking, phraud.
- Thousands of textfiles covering all aspects of the underground.
- Hundreds of viruses and virus source code for the serious
programmer.
Information:
- Administrators are Invalid Media, Mercury/NSA, Warlock Bones and
Jaeger.
- Run on a professor Falken/LOD donated ZOOM v32bis
- Mentioned in MONDO 2000 and reviewed in the latest Infoworld.
- Dialin 602-894-1757 / 24 hours
--------------------------
Flyer
--------------------------
In your defense..... Courtesy Freeside Orbital Data Network, HoHoCon '92
- B. O'Blivion
Repeat after me:
"If I am reading this to you, then I believe that you are
questioning, detaining, or arresting me, or searching my person or
possessions in the course of your official duties."
"I do not consent to any search of seizure of any part of my person
or property, nor to any property of others under my control. I do not
consent to any person's examination, search, or removal of any
information storage equipment or media in my possession. You are hereby
notified that such information storage equipment or media contain
private written and electronic mail, confidential communications, and
other material protected under the Electronic Communications Privacy Act
and other statutes."
"I respectfully decline to answer any questions beyond confirmation
of my identity, and require access to legal counsel immediately. I
demand that access to legal counsel be provided to me before any
questioning takes place. I will answer no questions nor give any
information outside the presence of legal counsel. All requests for
interviews, statements, consents, or information of any sort should be
addressed to me through my attorney. I invoke the rights five to me by
the Fifth and Sixth Amendments of the Constitution of the United
States."
"I further notify you that the speech and information contained on
information storage and handling devices at this site are protected
by the First and Fourth Amendments to the Constitution of the United
States, and that any unlawful search or seizure of these items or of
the information they contain will be treated as a violation of the
Constitutional rights of myself and other users of these devices and
media."
"I further notify you that any such violations of any person's legal
or Constitutional rights which are committed at any time, by any person,
will be the subject of civil legal action for all applicable damages
sustained. I require that at this time all officers participating in
this illegal search, seizure, or arrest identify themselves at this time
by name and badge number to me and my legal counsel."
[Include if applicable]
"I further notify you that I am a Computer System Operator providing
private electronic mail, electronic publications, and personal
information storage services to users in this State, and among the
United States. Any person causing a breach of the security of, or
violation of the privacy of, the information and software herein will be
held liable for all civil damages suffered by any and all users
thereof."
--------------------------
Flyer
--------------------------
HoHoCon 1992
Amusing Local Frequencies
courtesy of -=RDT.
Allen Park Inn Security - 464.500 Houston Post - 154.540
173.275
452.975
Houston Police:
North Shepherd Patrol - 460.325
NE Patrol - 460.125
SE Patrol - 460.025
SW Patrol - 460.050
Central Patrol - 460.100
Spec. Op. Traffic - 460.350
Car 2 Car - 460.225
South Central Patrol - 460.550
NW Patrol - 460.475
West Patrol - 460.150
Accident - 460.375
Misc - 460.525
460.575
460.400
Records - 460.425
City Marshalls - 453.900
Paging - 155.670
Police Intercity - 453-550
A number of people have been asking "who is RDT? what the hell is
RDT?" For the record, we're hackers who believe information should be
free. All information. The world is full of phunky electronic gadgets
and networks, and we want to share our information with the hacker
community. We currently write for 2600 magazine, Phrack, Mondo 2000,
Cybertek, and Informatik.
The five "charter members" of RDT are Count Zero, Brian Oblivion,
Magic Man, White Knight, and Omega. Each of us has complementary
skills, and as a group we have a very wide area of technical
knowledge. Feel free to contact us.
Count Zero - count0@ganglia.mgh.harvard.edu
Brian Oblivion - oblivion@ganglia.mgh.harvard.edu
Magic Man - magic@ganglia.mgh.harvard.edu
White Knight - wknight@ganglia.mgh.harvard.edu
Omega - omega@spica.bu.edu
"They are satisfying their appetite to know something that is not theirs
to know." - Asst. District Attorney Don Ingraham
"All-you-can eat buffet...for FREE!" - Restricted Data Transmissions
RDT "Truth is Cheap, but Information Costs."
--------------------------
Magazine
--------------------------
Future Sex
(a very odd pseudo-cyberpunk skin mag)
4 issues for $18, Canada $26, International US $48
1095 Market Street
Suite 809
San Francisco, CA 94103
415-621-5496
415-621-4946 fax
--------------------------
Video
--------------------------
Red $19.95
(Phone Pranks can kill)
Nekromantik II $29.95
(No comment)
Available through
Film Threat Video
P.O. Box 3170
Los Angeles, CA
90078-3170 USA
818-848-8971
Shipping: 1 tape $3.40
2-3 $4.60
4-6 $5.80
6+ $7.00
Visa/MC accepted.
--------------------------
Official HoHoCon Crud
--------------------------
HoHoCon '92
Product Ordering Information
If you are interested in obtaining either HoHoCon shirts or videos,
please contact us at any of the following:
drunkfux@cypher.com
hohocon@cypher.com
cDc@cypher.com
dfx@nuchat.sccsi.com
drunkfux@ganglia.mgh.harvard.edu
359@7354 (WWIV Net)
Freeside Orbital Data Network
ATTN: dFx/HoHoCon
11504 Hughes Road Suite #124
Houston, Texas
77089
713-866-4884 (Voice Mail)
The shirts are $15 plus $2 shipping ($2.50 for two shirts). At this
time, they only come in extra large. We may add additional sizes if
there is a demand for them. The front of the shirt has the following
in a white strip across the chest:
I LOVE FEDS
(Where LOVE = a red heart, very similar to the I LOVE NY logo)
And this on the back:
dFx & cDc Present
HOHOCON '92
December 18-20
Allen Park Inn
Houston, Texas
There is another version of the shirt available with the following:
I LOVE WAREZ
The video includes footage from all three days, is six hours long and
costs $18 plus $2 shipping ($2.50 if purchasing another item also).
Please note that if you are purchasing multiple items, you only need
to pay one shipping charge of $2.50, not a charge for each item. If
you wish to send an order in now, make all checks or money orders
payable to O.I.S., include your phone number and mail it to the street
address listed above. Allow ten working days for arrival.
Thanks to everyone who attended and supported HoHoCon '92. Mail us if
you wish to be an early addition to the HoHoCon '93 (December 17-19)
mailing list.
--------------------------
Text File
--------------------------
Rumors have begun to surface about a group of hackers who were involved in a
project to uncover information regarding the existence of UFOs. The
most public example pertaining to this alleged project was seen on
Dateline NBC on the screen of the mystery hacker "Quentin."
The story goes that this group of individuals decided to put their
skills to work on a project that, if successful, would add legitimacy to
the hacking process by uncovering information on what has been called the
greatest cover-up in the history of the world. Milnet TAC ID cards
were obtained through military officials sympathetic to the cause. Several
sites and networks were targeted that had in the past been linked to UFO
activity. These were sites like the Jet Propulsion Laboratory, Sandia Labs,
TRW Space Research, American Institute of Physics, and various other
educational, government and military sites.
The rumors also emphasize that several sites had what these individuals
called "particularly heavy security." Within several seconds after
connection had been established, system administrators of sites used in
this project were contacted. Further rumors state that there was
information regarding a propulsion system designed utilizing what is
termed "corona discharge" being analyzed at one site. The most sinister
of all rumors states that one particular participant who was allegedly
deeply immersed in TRWs internal network has not been heard from since
uncovering data regarding a saucer being housed at one of their Southern
California installations.
Believe what you will about the reality of this project. Much will be
dismissed as hacker lore, but within the core of every rumor lies a
grain of truth.
Are we being lied to? Why is this information still classified by the NSA?
What are they hiding from us behind a maze of security? Will we continue
to stand idly by and let an uncaring and deliberately evasive government
shield us from what may be the most important, and potential dangerous
news to ever surface? Information wants to be free, and only a
concerted group effort can make this happen. How much do you really
want to know about what is really going on?
What follows is information that has been released regarding this project...
---------------------------------------------------------------------------
PROJECT ALF-1
A Planetary Effort
TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET
TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET
These are the raw data. Where comments are appropriate, they
will be included. The data will be grouped together with dates,
names etc. to make correlations easier.
There are countless references to the aliens, their down space
craft and what the Government is doing with them.
If, as is supposed, the research on the craft and the 'ufonauts'
continues today, then undoubtedly there are computer records, somewhere.
I. Searching the Skies; Tripping the Electronic Fence around the
USA.
US Space Command Space Surveillance Center, Cheyenne Mountain,
Colorado Springs, Box Nine (Electronic Surveillance Room)
(This is where they search for and track UFO activity.)
U.S. Naval Space Surveillance System, Dahlgreen, Virginia, (Main
computer), Lake Kickapoo, Texas (listening post): Search for
'Flash Traffic'
Commander Sheila Mondran
CINC-NORAD
Space Detection and Tracking System
Malabar, Forida
'Teal Amber' search
National Military Command Center - Pentagon
(These are the areas where UFO activity is tracked.
There is a radar shield around the country that is 'tripped' by UFO's.
All tracking and F14 scrambling is done through this system.)
II. The Second Cover Up
Defense Intelligence Agency
Directorate for Management and Operations
Project Aquarius (in conjunction with SRI)
Colonel Harold E. Phillips, Army (where/what Feb. 1987)
UFO Working Group, (formed Dec 1987)
Major General James Pfautz, USAF, Ret. (March 87)
US Army experiments -(Monroe Institute, Faber, VA)
Major General Albert Stubblebine
Capt. Guy Kirkwood,
(thousands of feet of film of UFO's catalogued and on record somewhere.)
The UFO Working Group was formed because one arm of the Govt doesn't
know what the other is doing.)
III. National Security
NSA NAtional Security Agency, Dundee Society (Super secret elite
who have worked on UFO's.)
NSA - Research and Engineering Division
NSA - Intercept Equipment Division
Kirtland Force Base, Office of Special Investigations, Project
Beta. 1979-83-? (Sandia Labs are here.)
Paul Bennewitz
Project Blue
Project Blue Book
(NSA computers do analysis for Pentagon.)
IV. More Secret Players
NASA, Fort Irwin, Barstow, CA
NASA Ames Research Center, Moffet Field Naval Base
SETI
State Dept. Office of Advanced Technology
Any Astronauts from Mercury, Gemini and Apollo
CIA - Office of Scientific Investigation
CIA - Domestic Collection Division
(NASA has known about UFO's since the astronauts saw and photoed them.
Records somewhere.)
V. Dealing with the Secret
MJ-12 (1952)
Majectic 12
Operation Majestic 12
MAJIC-12
Admiral Roscoe H. Hillenkoetter
Dr. Vannevar Bush
Dr. Detlev Bronk
Dr. Jerome Hunsaker
Dr. Donald Menzel
Dr. Lloyd Berkner
General Robt. Montague
Sidney Souers
Gordon Gray
General Hoyt Vandenberg
Sect State James Forrestal
General Nathan Twining
Pres. Truman
Pres. Eisenhower
(One of the biggest secrets ever.)
Nevada Desert, Area 51, S4 (houses UFO's)
(Robert Lazar talked!) 9 space ships on storage. Propulsion by
corona discharge.
(Area 51 is the most protected base on the planet.)
VI. ROSWELL, NM Crashes
Mac Brazel (farmer)
Major Jesse A. Marcel
509th. Bomber Group
Lewis Rickett, CIC Officer
Colonel William Blanchard
Gerald Anderson, witness to crash and aliens
Wright Patterson Air Force Base, (parts lists of UFO's catalogued;
autopsies on record) (Bodies in underground facility)
Foreign Technology Building
USAAF (United States Army Air Force reports: "Early Automation"
Muroc, CA (Base with UFO's for study)
(1 saucer with 4 aliens. They were transported to Wright and then
saved, catalogued and autopsied.)
VII. THOSE ON GOVT SHIT LIST
(People who have gotten close.)
Robert Lazar
Major Donald Keyhoe
William Moore
Stanton Friedman
Jaime Shandera
Whitley Streiber
Timothy Goode, UK
Other UFO Crashes
Del Rio, TX 12/50, Colonel Robert Willingham
Las Vegas, 4/18/62
Kecksburg, PA 12/9/65
VIII. International
Belgian Air Force. (They are going public and have records.
Press conference held 7/12/91.)
Australian Air Force
UK; GCHQ
British Air Force
Belgium:
NATO Radar Stations
IX. UFO Civilian Groups. (What do they really know?)
NICAP, National Investigations Committee on Aerial Phenomena
(private company.)
APRO, Tucson, AZ (Aerial Phenomona Research Organization,
private company.)
MUFON Mutual UFO Network
X. GENERAL
Kenneth Arnold, June 24, 1947
Cattle and Sheep Mutilations
General and Pres. Eisenhower, (private files and library)
President Truman
Wright Field or Wright Patterson Air Force Base, Dayton, OH, (Air
Force Foriegn Technology Division)
USAF Project Saint
USAF Project Gemini
Project Moon Dust
Project Sign
Project Grudge
General Hoyt Vandenberg (1940-1960)
Air Force Regulation 200-2 (8/12/54)
Holloman AFB, NM
Roswell, NM July 7, 1947
XI. Possible Searches
Presidential Libraries
Old USAAF, (United States Army Air Force)
NASA
Astronaut Frank Borman, Gemini 7, pictures of UFO
Neil Armstrong, Apollo 11, saw UFO's on moon.
Colonel Gordon Cooper saw a bunch of them
James McDivitt, 6/66
United Nations
NATO;
General Lionel Max Chassin, French Air Force
Star Wars, United Kingdom, 23 scientists killed in 6 years.
Gulf Breeze, FL
Additional UFO records at NSA, CIA, DIA, FBI
Good Searching.
----------------------------------------------------------------------
Project
->Green Cheese<-
Data Base
---------------------------------------------------------------------
Holloman AFB
Location: New Mexico. Preconceived landing 15 years ago.
DDN Locations:
--------------
NET : 132.5.0.0 : HOLLOMAN :
GATEWAY : 26.9.0.74, 132.5.0.1 : HOLLOMAN-GW.AF.MIL : CISCO-MGS :: EGP,IP/GW :
GATEWAY : 26.9.0.74, 132.5.0.1 : HOLLOMAN-GW.AF.MIL : CISCO-MGS :: EGP,IP/GW :
HOST : 26.10.0.74 : HOLLOMAN-TG.AF.MIL : VAX-8650 : VMS : TCP/FTP,TCP/TELNET,TCP
SMTP :
HOST : 26.6.0.74 : HOLLOMAN-AM1.AF.MIL : WANG-VS100 : VSOS : TCP/TELNET,TCP/FTP,
TCP/SMTP :
Host: DDNVAX2.6585TG.AF.MIL
156.6.1.2
-----------------------------------------------------------------------
Kirtland Air Force Base
Office Of Special Investigations. Sandia Labs are here. Also part of
NSA Intercept Equipment Division.
Key Words/names:
----------------
Sandia Labs
Project Beta (1979-83-?)
Paul Bennewitz
Project Blue
Project Blue Book
DDN Locations:
--------------
NET : 131.23.0.0 : KIRTLAND-NET :
NET : 132.62.0.0 : KIRTLAND2 :
GATEWAY : 26.17.0.48, 131.23.0.1 : KIRTLAND2-GW.AF.MIL,KIRTLAND-GW.AF.MIL
: CISCO-MGS : UNIX : IP/GW,EGP :
GATEWAY : 26.18.0.87, 132.62.0.1
: KIRTLAND1-GW.AF.MIL,KIRTLAND1606ABW-GW.AF.MIL : CISCO-MGS :
: EGP,IP/GW :
HOST : 26.0.0.48 : KIRTLAND.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
HOST : 26.0.0.87 : KIRTLAND2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
HOST : 26.6.0.87 : KIRTLAND-AM1.AF.MIL : WANG-VS300 : VS ::
-----------------------------------------------------------------------
NASA
What can I say about NASA that you couldnt guess for yourself....
(Except that the following sights are SPECIFIC NASA sights, not
just randomly suspected sights).
DDN locations:
--------------
Fort Irwin, Barstow, CA:
-----------------------
NET : 134.66.0.0 : IRWIN :
NET : 144.146.0.0 : FTIRWIN1 :
NET : 144.147.0.0 : FTIRWIN2 :
GATEWAY : 26.24.0.85, 26.7.0.230, 144.146.0.1, 144.147.0.0
: FTIRWIN-GW1.ARMY.MIL : CISCO-GATEWAY : CISCO : IP/GW,EGP :
HOST : 26.14.0.39 : IRWIN-ASBN.ARMY.MIL : NCR-COMTEN-3650 : COS2 ::
HOST : 26.13.0.85 : FTIRWIN-AMEDD.ARMY.MIL : ATT-3B2-600G : UNIX
: TCP/FTP,TCP/SMTP,TCP/TELNET :
HOST : 26.14.0.85 : FTIRWIN-IGNET.ARMY.MIL : DATAPOINT-8605 : RMS ::
HOST : 26.15.0.85 : IRWIN-EMH1.ARMY.MIL,FTIRWIN-EMH1.ARMY.MIL : SPERRY-5000
: UNIX : TCP/FTP,TCP/SMTP,TCP/TELNET :
Moffet Field Naval Base (Ames Research Center):
-----------------------------------------------
GATEWAY : 26.20.0.16, 192.52.195.1 : MOFFETT-FLD-MB.DDN.MIL,AMES-MB.DDN.MIL
: C/70 : CHRYSALIS : IP/GW,EGP :
HOST : 26.0.0.16 : MOFFETT.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
-----------------------------------------------------------------------
Pentagon (National Military Command Center)
One of many places in charge of tracking UFO activity.
Possible DDN sights:
-------------------
GATEWAY : 26.9.0.26, 134.205.123.140 : PENTAGON-GW.HQ.AF.MIL : CISCO-AGS :
: EGP,IP/GW :
GATEWAY : 26.25.0.26, 131.8.0.1 : PENTAGON-GW.AF.MIL,HQUSAFNET-GW.AF.MIL
: CISCO-MGS :: IP/GW,EGP :
GATEWAY : 26.10.0.76, 192.31.75.235 : PENTAGON-BCN-GW.ARMY.MIL : SUN-360
: UNIX : IP/GW,EGP :
GATEWAY : 26.26.0.247, 192.31.75.1 : PENTAGON-GW.ARMY.MIL : SUN-3/160
: UNIX : EGP,IP/GW :
GATEWAY : 26.31.0.247, 26.16.0.26, 141.116.0.1 : PENTAGON-GW1.ARMY.MIL
: CISCO : CISCO : IP/GW,EGP :
HOST : 26.0.0.26 : PENTAGON.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
HOST : 26.24.0.26 : OPSNET-PENTAGON.AF.MIL : VAX-8500 : VMS
: TCP/TELNET,TCP/FTP,TCP/SMTP :
HOST : 26.10.0.76, 192.31.75.235 : PENTAGON-BCN.ARMY.MIL : SUN-360 : UNIX
: TCP/FTP,TCP/SMTP,TCP/TELNET :
HOST : 26.0.0.247 : PENTAGON2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
HOST : 26.7.0.247 : PENTAGON-AMSNET.ARMY.MIL : AMDAHL : MVS
: TCP/TELNET,TCP/FTP :
HOST : 26.14.0.247 : NSSC-PENTAGON.NAVY.MIL : ALTOS-3068A : UNIX
: TCP/FTP,TCP/TELNET,TCP/SMTP :
HOST : 26.18.0.247 : PENTAGON-EMH4.ARMY.MIL : SPERRY-5000/80 : UNIX
: TCP/TELNET,TCP/FTP,TCP/SMTP :
HOST : 26.26.0.247, 192.31.75.1 : PENTAGON-AI.ARMY.MIL : SUN-3/160 : UNIX
: TCP/TELNET,TCP/FTP,TCP/SMTP,TCP/FINGER :
-----------------------------------------------------------------------
Raddaman
Location of infamous building 18a. Suspected saucers and others?
DDN location, yet unknown.
------------------------------------------------------------------------
SECI
?
DDN Locations:
--------------
NET : 192.108.216.0 : ARC-SETI-NET :
------------------------------------------------------------------------
Utah Locations:
GATEWAY : 26.18.0.20, 131.27.0.1 : HILL-GW.AF.MIL,HILLAFBNET-GW.AF.MIL
: CISCO-MGS :: IP/GW,EGP :
GATEWAY : 26.18.0.20, 131.27.0.1 : HILL-GW.AF.MIL,HILLAFBNET-GW.AF.MIL
: CISCO-MGS :: IP/GW,EGP :
HOST : 26.5.0.20 : HILL.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
HOST : 26.0.0.99 : HILL2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
HOST : 26.12.0.99 : HILL-AM1.AF.MIL : WANG-VS100 : VS
: TCP/TELNET,TCP/FTP,TCP/SMTP :
-------------------------------------------------------------------------
Wright Patterson AFB
Catalogued UFO parts list. Autopsies on record. Bodies located in
underground facility of Foreign Technology Building.
DDN Locations:
--------------
HOST : 26.0.0.47 : WRIGHTPAT.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
HOST : 26.8.0.123 : WRIGHTPAT2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
HOST : 26.0.0.124 : WRIGHTPAT3.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
HOST : 26.3.0.170 : WAINWRIGHT-IGNET.ARMY.MIL : CONVERGENT-TECH-CN-100
: CTOS ::
HOST : 26.0.0.176 : WRIGHTPAT4.MT.DDN.MIL : C/30 : TAC : TCP,ICMP :
-------------------------------------------------------------------------
Nevada:
NET : 131.216.0.0 : NEVADA :
-------------------------------------------------------------------------
Random Suspected Nets:
WIN:
Top Secret Network. All coordinator's have last name Win.
NET : 141.8.0.0 : DFN-WIN8 : NET : 141.9.0.0 : DFN-WIN9 :
NET : 141.10.0.0 : DFN-WIN10 : NET : 141.15.0.0 : DFN-WIN15 :
NET : 141.25.0.0 : DFN-WIN25 : NET : 141.26.0.0 : DFN-WIN26 :
NET : 141.28.0.0 : DFN-WIN28 : NET : 141.57.0.0 : DFN-WIN57 :
NET : 141.58.0.0 : DFN-WIN58 : NET : 141.59.0.0 : DFN-WIN59 :
NET : 141.60.0.0 : DFN-WIN60 : NET : 141.61.0.0 : DFN-WIN61 :
NET : 141.62.0.0 : DFN-WIN62 : NET : 141.63.0.0 : DFN-WIN63 :
NET : 141.64.0.0 : DFN-WIN64 : NET : 141.65.0.0 : DFN-WIN65 :
NET : 141.66.0.0 : DFN-WIN66 : NET : 141.67.0.0 : DFN-WIN67 :
NET : 141.68.0.0 : DFN-WIN68 : NET : 141.69.0.0 : DFN-WIN69 :
NET : 141.70.0.0 : DFN-WIN70 : NET : 141.71.0.0 : DFN-WIN71 :
NET : 141.72.0.0 : DFN-WIN72 : NET : 141.73.0.0 : DFN-WIN73 :
NET : 141.74.0.0 : DFN-WIN74 : NET : 141.75.0.0 : DFN-WIN75 :
NET : 141.76.0.0 : DFN-WIN76 : NET : 141.77.0.0 : DFN-WIN77 :
NET : 141.78.0.0 : DFN-WIN78 : NET : 141.79.0.0 : DFN-WIN79 :
NET : 141.80.0.0 : DFN-WIN80 : NET : 141.81.0.0 : DFN-WIN81 :
NET : 141.82.0.0 : DFN-WIN82 : NET : 141.83.0.0 : DFN-WIN83 :
NET : 141.84.0.0 : DFN-WIN84 : NET : 141.85.0.0 : DFN-WIN85 :
NET : 141.86.0.0 : DFN-WIN86 : NET : 141.87.0.0 : DFN-WIN87 :
NET : 141.88.0.0 : DFN-WIN88 : NET : 141.89.0.0 : DFN-WIN89 :
NET : 141.90.0.0 : DFN-WIN90 : NET : 141.91.0.0 : DFN-WIN91 :
NET : 141.92.0.0 : DFN-WIN92 : NET : 141.93.0.0 : DFN-WIN93 :
NET : 141.94.0.0 : DFN-WIN94 : NET : 141.95.0.0 : DFN-WIN95 :
NET : 141.96.0.0 : DFN-WIN96 : NET : 141.97.0.0 : DFN-WIN97 :
NET : 141.98.0.0 : DFN-WIN98 : NET : 141.99.0.0 : DFN-WIN99 :
NET : 188.1.0.0 : WIN-IP : NET : 192.80.90.0 : WINDATA :
-----------------------------------
Scinet:
Sensitive Compartmented Information Network
NET : 192.12.188.0 : BU-SCINET :
-----------------------------------
Disnet:
Defense Integrated Secure Network. Composed of SCINET, WINCS
([World Wide Military and Command Control System] Intercomputer
Network Communication Subsystem), and Secretnet(WIN).
NET : 22.0.0.0 : DISNET :
-----------------------------------