Computer underground Digest Sun Feb 14, 1993 Volume 5 : Issue 13 ISSN 1004-042X Editors: J

Master Index Current Directory Index Go to SkepticTank Go to Human Rights activist Keith Henson Go to Scientology cult

Skeptic Tank!

Computer underground Digest Sun Feb 14, 1993 Volume 5 : Issue 13 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Archivist: Brendan Kehoe Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Copy Editor: Etaion Shrdlu, Seniur CONTENTS, #5.13 (Feb 14, 1993) File 1--Talking with the Underground File 2--System Surfing at U-Cal/Davis File 3--Unemployed Programmers Turning their Talents to Evil File 4--"Hackers" take on the UFOs? Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost from The editors may be contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115. Issues of CuD can also be found in the Usenet news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; in Europe from the ComNet in Luxembourg BBS (++352) 466893; and using anonymous FTP on the Internet from ( in /pub/cud, ( in /cud, ( in /pub/mirror/cud, and ( in /pub/text/CuD. European readers can access the ftp site at: pub/doc/cud. Back issues also may be obtained from the mail server at COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Some authors do copyright their material, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ---------------------------------------------------------------------- Date: 23 Jan 1993 16:14:31 -0700 (MST) From: Subject: File 1--Talking with the Underground (Previously published in the Computer Security Institute's newsletter - The Alert - and the French Chaos Computer Club's Chaos Digest) Talking with the underground by Ray Kaplan and Joe Kovara Information about system and network vulnerabilities is sparse, not readily available and carefully guarded by those segments of the security community that collect and control it. Given that the legitimate security community won't share information about vulnerabilities with us, isn't it logical that we include outsiders (the computer underground or ex-computer criminals) in these discussions. Amid criticism, we decided to let the community ask the advice of experts the crackers who have successfully cracked computer networks. Exploring the details of vulnerabilities Over 300 participants at 25 sites in US, Canada, Europe and Mexico joined law enforcement, members of the security community, and former members of the computer underground as we explored these questions in the November 24, 1992, audio teleconference entitled System and Network Security: How You Will Be Attacked and What to do About It. Our guests included Kevin Mitnick and Lenny DiCicco, who successfully penetrated a range of networks and telephone systems. They were both sentenced in federal court after successfully penetrating Digital Equipment Corporation's computer network in 1988. They stole the source code to VMS, Digital's widely used operating system. Their exploits were profiled in the book Cyberpunk: Outlaws and Hackers on the Computer Frontier, by Katie Hafner and John Markoff (1991, Simon and Schuster). Our panelists included Hal Hendershot, head of the FBI Computer Crime Unit in Washington D.C.; Don Delaney, Senior Investigator with the New York State Police; Computer security consultant Dave Johnson of Talon Systems (Los Alto, CA); Robert Clyde, V.P. of the Security Products Group, RAXCO, Inc.; and Lew, the organizational director of automation for a medium size company a former cracker. The panelists shared their considerable experience and discussed techniques used to break in to computer networks. Among the penetration techniques discussed were the uses of psychological subversion, telecommunications monitoring techniques, and the exploitation of known system and network bugs. Despite the popularity of these attack techniques, they are little known outside of the computer underground and the computer security community. Panelists issue stern warnings about telecommunications security Don Delaney stated that tremendous loss of money from both toll and Private Branch eXchange (PBX) fraud is whats happening in the telecom area. Since the security of a PBX is the responsibility of its owner, such losses are not being absorbed by the telephone companies involved. These losses have been known to force the owners of compromised PBXs into bankruptcy. Delaney joins us in saying that its not a matter of if you will be hit, but when. According to DiCicco, compromising the telephone system gave he and Kevin the ability to attack systems without the fear of discovery - telco tracebacks were simply ineffective. They could attack networks at many different points of entry all over the country. This is why no one could keep them out, even though their victims knew their systems and networks had been compromised. If all of this does not scare you, consider Lenny's admission that at one point he and Kevin had compromised over 50 telco switches in the United States, including all of California, parts of New Jersey, New York and New Hampshire. At one point they even controlled all three of the switches that provided phone service to Manhattan. Yes, the law is ready to help - but the threat is a tough, sophisticated, international one. Threats from abroad? Yes, the threat does exist according to Hal Hendershot of the FBI. Robert Clyde reports getting many calls from people trying to solve security problems. In keeping with what we know of reported computer crimes, most sites see problems from insiders: employees, consultants and vendors. Robert reports that two companies publicly spoke of being approached by former East German agents for hire for as little as $10,000 at a September conference in Sweden where he spoke in 1992. We appear to be seeing the criminalization of hacker activity that many have long feared: hackers and ex-foreign intelligence agents for hire. James Bond is alive and well, thank you In late 1992 Don Delaney reported the first case he's seen of James Bond techniques. Remote surveillance can be done by intercepting, decoding and displaying the Radio Frequency (RF) emanations of various computing devices such as terminals and network cabling. Delaney reports that in late 1992, an antenna was put up on the balcony of a 19th floor room in New York's Helmsley building pointing at Chemical Bank. He indicated that it was being very carefully adjusted before being locked into position. By the time they were able to investigate, the antenna and its manipulator had vanished - presumably having successfully gathered the intelligence that they were after. This is no longer gee, we knew it was possible, but holy shit, it's happening now. Imagine someone reading your terminal screen from across the street. Management's show me attitude Dave Johnson insists that his biggest problem when he was at Lockheed was getting corporate management to understand that there is a problem. One of the areas in which this type of conference can really help is understanding the enemy. Management simply doesn't understand the thinking of hackers. Since it makes no sense to them, they tend to deny its existence until theres proof. Of course, the proof is usually very expensive: once a system has been compromised the work of cleaning it up is a long, hard and complicated. A well-connected system or network makes an excellent platform from which to launch attacks on other hosts or on other networks. A major problem for Digital in securing their network against Kevin Mitnick and Lenny DiCicco was that only one vulnerable system on Digitals EASYnet was needed. From there, they were able to penetrate other systems. Even nodes that were known to have been penetrated and were secured were penetrated repeatedly by using other vulnerable nodes to monitor either users or network traffic accessing the secured nodes. While at Lockheed, Dave Johnson implemented policies, awareness training and widescale authentication for all external access, including dialup lines and telnet connections using challenge-response tokens or smart cards. He does not trust the phone system and assumes that it has been compromised. Kevin Mitnick and Lenny DiCicco illustrated just how vulnerable the phone system was in 1988 and the MOD bust in July 1992 shows that things have not improved. Kevin reminds us that you must assume the telephone system is insecure: even robust challenge-response systems can be compromised. You simply have to play the telecommunications game for real. Kevin reminds us that unless you use encryption, all bets are off. As an example of how deep, long lived and dedicated a serious attack can be, consider that Kevin and Lenny were in DEC's network for years. They knew exactly what DEC and telco security were doing in their efforts to catch them since they were reading the security personnel's email. They evaded the security forces for over 12 months and they had a pervasive, all powerful, privileged presence on DEC's internal network. I've seen the enemy and them is us (this is a quote from Pogo). Mitnick insists that people are the weakest link. According to his considerable experience, you don't even need to penetrate a system if you can talk someone on the inside into doing it for you. Why bother breaking in to a computer system if you can talk someone in accounts payable into cutting you a check? Using the finely tuned tools of psychological subversion, practiced social manipulators can get most anything that they want from the ranks of the generally unsuspecting (uncaring?) employees that inhabit most of our organizations today. The only cure is a massive and complete educational program that fosters loyalty, awareness and proper skepticism in every employee. In the end Perhaps the strongest message from everyone was that you can't trust the phone system. Telephone companies have been, and continue to be, compromised. While Mitnick & DiCicco's penetration of DEC's internal network happened in 1988, the 1992 MOD bust showed us that the same techniques are still being used successfully today. Data and voice, including FAX transmissions, are subject to eavesdropping and spoofing. Encryption is absolutely required for secure, trustworthy communications. The coupling of social engineering and technical skills is a potent threat. Most sites that have addressed technical security are still wide open to penetration from people who have well-practiced social engineering skills. However, in all, you don't even need social engineering skills to get into most systems. Are your systems and networks secure? Are your systems and networks at risk? What will you do if you are attacked? Although the questions seem simple, they are not. Future teleconferences will explore both the questions and the answers in more detail. ++++ Ray Kaplan and Joe Kovara have been independent computer consultants for more than a decade. They specialize in operating systems, networks and solving system and network security problems. Ray Kaplan is also a well-known writer and lecturer. He is a regular contributor to Digital News and Review and other computer trade publications. Tapes and handout materials for the System and Network Security teleconference series are available from Ray Kaplan, P.O. Box 42650, Tucson, AZ USA 85733 FAX (602) 791-3325 Phone (602) 323-4606. ------------------------------ From: sc03281@LLWNET.LINKNET.COM(Cheshire HS) Subject: File 2--System Surfing at U-Cal/Davis Date: Mon, 1 Feb 93 17:44:45 EST FROM THE 2-1-93 ISSUE OF INFORMATION WEEK (page 16) HACKER JOYRIDE: Using the University of California at Davis's computer system to access government networks, more than 100 young hackers went for a "joyride" that elicited an FBI investigation. The suspects range in age from 12 to 22 and hail from several states and countries, including Finland, Australia, and the former Czechoslovakia. No arrests have been made as yet pending a formal investigation, according to John Crowell, manager of workstation support for UC Davis's IT division. The hackers were detected in mid-October when charges began piling up on a dormant computer account. Using the Internet network, the hackers raided systems belonging to the CIA, the Defense Department, and NASA, among others. del 1/15 19 21;num;l ------------------------------ Date: 03 Feb 93 18:04:58 EST From: Gordon Meyer <72307.1502@COMPUSERVE.COM> Subject: File 3--Unemployed Programmers Turning their Talents to Evil Computer hackers in former communist countries are creating mischievous and sometimes costly viruses that threaten computers around the world. Anti-virus researchers and special police units in the US and Europe are trying to thwart the viruses and find the culprits, US and British authorities say. "You've got a lot of frustrated programmers in the East who've turned their attention to creating viruses," says Detective Constable Chris Pierce, a member of Scotland Yard's 5-member computer crime unit. Investigators say Bulgaria is the source of more than 200 viruses that threaten Western computers, including the irritating Yankee Doodle, which makes infected machines stop normal functions to play the all-American song. The Bulgarian virus industry developed, Pierce says, because programmers there have a lot of knowledge and skill but no market for their services in the economically depressed country. Computer viruses are commands usually hidden in legitimate programs and designed to attach themselves to files on the computer's "hard drive" data storage device. Once on the hard drive, viruses perform pranks, ranging from emitting harmless noises to eating up files. They can foul up home computers, and companies have lost hundreds of thousands of dollars rooting them out. Some of the newest and most insidious viruses reportedly are coming from Russia, including one called LoveChild, which lies dormant but sets up a countdown that could take years. After an infected computer is turned on the 5000th time, all its memory is erased. Paul Mungo and Bryan Clough, in the February issue of Discover magazine, say an unidentified East Coast company lost $1 million because of a virus created by a Bulgarian known as the Dark Avenger. The article, excerpted from an upcoming book, describes the electronic exploits of the Avenger, whose work is known to Western police agencies. The authors call 1 of his latest creations, Mutating Engine, "the most dangerous virus ever" because it can disguise itself 4 billion ways and has no constant characteristic that would let anti-virus scanners detect it. Little is known of the Avenger, the authors say, except that he probably graduated from Sofia University in math or science, needs money and is infatuated with Diana, princess of Wales, whose name pops up in some of his viruses. Mungo and Clough chronicle the Dark Avenger's appearances on international computer bulletin boards. One Bulgarian-based board, they say, has been set up just to exchange viruses. Pierce says most viruses written in Bulgaria and Russia are not actually "out in the wild," where they can get into foreign computers. ------------------------------ Date: Sat, 23 Jan 93 01:15:50 PST From: Subject: File 4--"Hackers" take on the UFOs? ((MODERATORS' COMMENT: We've read a bit of discussion about UFOs, "hackers," and guerilla investigators. Whether myth or reality, the discussions represent a segment of computer culture that others might find interesting. So, we run the following as a reflection of one segment of the culture that, even if myth, raises that age-old question: Is it live, or is it memorex?)). Rumors have begun to surface about a group of hackers who were involved in a project to uncover information regarding the existence of UFOs. The most public example pertaining to this alleged project was seen on Dateline NBC on the screen of the mystery hacker "Quentin." The story goes that this group of individuals decided to put their skills to work on a project that, if successful, would legitimize the hacking process by uncovering information on what has been called the greatest cover-up in the history of the world. Milnet TAC ID cards were obtained through military officials sympathetic to the cause. Several sites and networks were targeted that had in the past been linked to UFO activity. These were sites like the Jet Propulsion Laboratory, Sandia Labs, TRW Space Research, American Institute of Physics, and various other educational, government and military sites. The rumors also emphasize that several sites had what these individuals called "particularly heavy security." Within several seconds after connection had been established, system administrators of sites used in this project were contacted. Further rumors state that there was information regarding a propulsion system designed utilizing what is termed "corona discharge" being analyzed at one site. The most sinister of all rumors states that one particular participant who was allegedly deeply immersed in TRWs internal network has not been heard from since uncovering data regarding a saucer being housed at one of their Southern California installations. Believe what you will about the reality of this project. Much will be dismissed as hacker lore, but within the core of every rumor lies a grain of truth. Are we being lied to? Why is this information still classified by the NSA? What are they hiding from us behind a maze of security? Will we continue to stand idly by and let an uncaring and deliberately evasive government shield us from what may be the most important, and potential dangerous news to ever surface? Information wants to be free, and only a concerted group effort can make this happen. How much do you really want to know about what is really going on? What follows is information that has been released regarding this project... ++++++++++++++++++++++++ PROJECT ALF-1 A Planetary Effort TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET TOP SECRET These are the raw data. Where comments are appropriate, they will be included. The data will be grouped together with dates, names etc. to make correlations easier. There are countless references to the aliens, their down space craft and what the Government is doing with them. If, as is supposed, the research on the craft and the 'ufonauts' continues today, then undoubtedly there are computer records, somewhere. I. Searching the Skies; Tripping the Electronic Fence around the USA. US Space Command Space Surveillance Center, Cheyenne Mountain, Colorado Springs, Box Nine (Electronic Surveillance Room) (This is where they search for and track UFO activity.) U.S. Naval Space Surveillance System, Dahlgreen, Virginia, (Main computer), Lake Kickapoo, Texas (listening post): Search for 'Flash Traffic' Commander Sheila Mondran CINC-NORAD Space Detection and Tracking System Malabar, Florida 'Teal Amber' search National Military Command Center - Pentagon (These are the areas where UFO activity is tracked. There is a radar shield around the country that is 'tripped' by UFO's. All tracking and F14 scrambling is done through this system.) II. The Second Cover Up Defense Intelligence Agency Directorate for Management and Operations Project Aquarius (in conjunction with SRI) Colonel Harold E. Phillips, Army (where/what Feb. 1987) UFO Working Group, (formed Dec 1987) Major General James Pfautz, USAF, Ret. (March 87) US Army experiments -(Monroe Institute, Faber, VA) Major General Albert Stubblebine Capt. Guy Kirkwood, (thousands of feet of film of UFO's catalogued and on record somewhere.) The UFO Working Group was formed because one arm of the Govt doesn't know what the other is doing.) III. National Security NSA NAtional Security Agency, Dundee Society (Super secret elite who have worked on UFO's.) NSA - Research and Engineering Division NSA - Intercept Equipment Division Kirtland Force Base, Office of Special Investigations, Project Beta. 1979-83-? (Sandia Labs are here.) Paul Bennewitz Project Blue Project Blue Book (NSA computers do analysis for Pentagon.) IV. More Secret Players NASA, Fort Irwin, Barstow, CA NASA Ames Research Center, Moffet Field Naval Base SETI State Dept. Office of Advanced Technology Any Astronauts from Mercury, Gemini and Apollo CIA - Office of Scientific Investigation CIA - Domestic Collection Division (NASA has known about UFO's since the astronauts saw and photoed them. Records somewhere.) V. Dealing with the Secret MJ-12 (1952) Majectic 12 Operation Majestic 12 MAJIC-12 Admiral Roscoe H. Hillenkoetter Dr. Vannevar Bush Dr. Detlev Bronk Dr. Jerome Hunsaker Dr. Donald Menzel Dr. Lloyd Berkner General Robt. Montague Sidney Souers Gordon Gray General Hoyt Vandenberg Sect State James Forrestal General Nathan Twining Pres. Truman Pres. Eisenhower (One of the biggest secrets ever.) Nevada Desert, Area 51, S4 (houses UFO's) (Robert Lazar talked!) 9 space ships on storage. Propulsion by corona discharge. (Area 51 is the most protected base on the planet.) VI. ROSWELL, NM Crashes Mac Brazel (farmer) Major Jesse A. Marcel 509th. Bomber Group Lewis Rickett, CIC Officer Colonel William Blanchard Gerald Anderson, witness to crash and aliens Wright Patterson Air Force Base, (parts lists of UFO's catalogued; autopsies on record) (Bodies in underground facility) Foreign Technology Building USAAF (United States Army Air Force reports: "Early Automation" Muroc, CA (Base with UFO's for study) (1 saucer with 4 aliens. They were transported to Wright and then saved, catalogued and autopsied.) VII. THOSE ON GOVT SHIT LIST (People who have gotten close.) Robert Lazar Major Donald Keyhoe William Moore Stanton Friedman Jaime Shandera Whitley Streiber Timothy Goode, UK Other UFO Crashes Del Rio, TX 12/50, Colonel Robert Willingham Las Vegas, 4/18/62 Kecksburg, PA 12/9/65 VIII. International Belgian Air Force. (They are going public and have records. Press conference held 7/12/91.) Australian Air Force UK; GCHQ British Air Force Belgium: NATO Radar Stations IX. UFO Civilian Groups. (What do they really know?) NICAP, National Investigations Committee on Aerial Phenomena (private company.) APRO, Tucson, AZ (Aerial Phenomena Research Organization, private company.) MUFON Mutual UFO Network X. GENERAL Kenneth Arnold, June 24, 1947 Cattle and Sheep Mutilations General and Pres. Eisenhower, (private files and library) President Truman Wright Field or Wright Patterson Air Force Base, Dayton, OH, (Air Force Foreign Technology Division) USAF Project Saint USAF Project Gemini Project Moon Dust Project Sign Project Grudge General Hoyt Vandenberg (1940-1960) Air Force Regulation 200-2 (8/12/54) Holloman AFB, NM Roswell, NM July 7, 1947 XI. Possible Searches Presidential Libraries Old USAAF, (United States Army Air Force) NASA Astronaut Frank Borman, Gemini 7, pictures of UFO Neil Armstrong, Apollo 11, saw UFO's on moon. Colonel Gordon Cooper saw a bunch of them James McDivitt, 6/66 United Nations NATO; General Lionel Max Chassin, French Air Force Star Wars, United Kingdom, 23 scientists killed in 6 years. Gulf Breeze, FL Additional UFO records at NSA, CIA, DIA, FBI Good Searching. +++++++++++++++++ Project ->Green Cheese<- Data Base ++++++++++++++++++ Holloman AFB Location: New Mexico. Preconceived landing 15 years ago. DDN Locations: +++++++ NET : : HOLLOMAN : GATEWAY :, : HOLLOMAN-GW.AF.MIL : CISCO-MGS :: EGP,IP/GW : GATEWAY :, : HOLLOMAN-GW.AF.MIL : CISCO-MGS :: EGP,IP/GW : HOST : : HOLLOMAN-TG.AF.MIL : VAX-8650 : VMS : TCP/FTP,TCP/TELNET,TCP SMTP : HOST : : HOLLOMAN-AM1.AF.MIL : WANG-VS100 : VSOS : TCP/TELNET,TCP/FTP, TCP/SMTP : Host: DDNVAX2.6585TG.AF.MIL +++++++++++++++++++++++ Kirtland Air Force Base Office Of Special Investigations. Sandia Labs are here. Also part of NSA Intercept Equipment Division. Key Words/names: ++++++++ Sandia Labs Project Beta (1979-83-?) Paul Bennewitz Project Blue Project Blue Book DDN Locations: +++++++ NET : : KIRTLAND-NET : NET : : KIRTLAND2 : GATEWAY :, : KIRTLAND2-GW.AF.MIL,KIRTLAND-GW.AF.MIL : CISCO-MGS : UNIX : IP/GW,EGP : GATEWAY :, : KIRTLAND1-GW.AF.MIL,KIRTLAND1606ABW-GW.AF.MIL : CISCO-MGS : : EGP,IP/GW : HOST : : KIRTLAND.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : HOST : : KIRTLAND2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : HOST : : KIRTLAND-AM1.AF.MIL : WANG-VS300 : VS :: +++++++++++++++++++++++ NASA What can I say about NASA that you couldn't guess for yourself.... (Except that the following sights are SPECIFIC NASA sights, not just randomly suspected sights). DDN locations: +++++++ Fort Irwin, Barstow, CA: +++++++++ NET : : IRWIN : NET : : FTIRWIN1 : NET : : FTIRWIN2 : GATEWAY :,,, : FTIRWIN-GW1.ARMY.MIL : CISCO-GATEWAY : CISCO : IP/GW,EGP : HOST : : IRWIN-ASBN.ARMY.MIL : NCR-COMTEN-3650 : COS2 :: HOST : : FTIRWIN-AMEDD.ARMY.MIL : ATT-3B2-600G : UNIX : TCP/FTP,TCP/SMTP,TCP/TELNET : HOST : : FTIRWIN-IGNET.ARMY.MIL : DATAPOINT-8605 : RMS :: HOST : : IRWIN-EMH1.ARMY.MIL,FTIRWIN-EMH1.ARMY.MIL : SPERRY-5000 : UNIX : TCP/FTP,TCP/SMTP,TCP/TELNET : Moffet Field Naval Base (Ames Research Center): +++++++++++++++++++++ GATEWAY :, : MOFFETT-FLD-MB.DDN.MIL,AMES-MB.DDN.MIL : C/70 : CHRYSALIS : IP/GW,EGP : HOST : : MOFFETT.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : +++++++++++++++++++++++ Pentagon (National Military Command Center) One of many places in charge of tracking UFO activity. Possible DDN sights: +++++++ GATEWAY :, : PENTAGON-GW.HQ.AF.MIL : CISCO-AGS : : EGP,IP/GW : GATEWAY :, : PENTAGON-GW.AF.MIL,HQUSAFNET-GW.AF.MIL : CISCO-MGS :: IP/GW,EGP : GATEWAY :, : PENTAGON-BCN-GW.ARMY.MIL : SUN-360 : UNIX : IP/GW,EGP : GATEWAY :, : PENTAGON-GW.ARMY.MIL : SUN-3/160 : UNIX : EGP,IP/GW : GATEWAY :,, : PENTAGON-GW1.ARMY.MIL : CISCO : CISCO : IP/GW,EGP : HOST : : PENTAGON.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : HOST : : OPSNET-PENTAGON.AF.MIL : VAX-8500 : VMS : TCP/TELNET,TCP/FTP,TCP/SMTP : HOST :, : PENTAGON-BCN.ARMY.MIL : SUN-360 : UNIX : TCP/FTP,TCP/SMTP,TCP/TELNET : HOST : : PENTAGON2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : HOST : : PENTAGON-AMSNET.ARMY.MIL : AMDAHL : MVS : TCP/TELNET,TCP/FTP : HOST : : NSSC-PENTAGON.NAVY.MIL : ALTOS-3068A : UNIX : TCP/FTP,TCP/TELNET,TCP/SMTP : HOST : : PENTAGON-EMH4.ARMY.MIL : SPERRY-5000/80 : UNIX : TCP/TELNET,TCP/FTP,TCP/SMTP : HOST :, : PENTAGON-AI.ARMY.MIL : SUN-3/160 : UNIX : TCP/TELNET,TCP/FTP,TCP/SMTP,TCP/FINGER : +++++++++++++++++++++++ Raddaman Location of infamous building 18a. Suspected saucers and others? DDN location, yet unknown. ++++++++++++++++++++++++++ SECI ? DDN Locations: +++++++ NET : : ARC-SETI-NET : ++++++++++++++++++++++++++ Utah Locations: GATEWAY :, : HILL-GW.AF.MIL,HILLAFBNET-GW.AF.MIL : CISCO-MGS :: IP/GW,EGP : GATEWAY :, : HILL-GW.AF.MIL,HILLAFBNET-GW.AF.MIL : CISCO-MGS :: IP/GW,EGP : HOST : : HILL.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : HOST : : HILL2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : HOST : : HILL-AM1.AF.MIL : WANG-VS100 : VS : TCP/TELNET,TCP/FTP,TCP/SMTP : ++++++++++++++++++++++++ Wright Patterson AFB Catalogued UFO parts list. Autopsies on record. Bodies located in underground facility of Foreign Technology Building. DDN Locations: +++++++ HOST : : WRIGHTPAT.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : HOST : : WRIGHTPAT2.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : HOST : : WRIGHTPAT3.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : HOST : : WAINWRIGHT-IGNET.ARMY.MIL : CONVERGENT-TECH-CN-100 : CTOS :: HOST : : WRIGHTPAT4.MT.DDN.MIL : C/30 : TAC : TCP,ICMP : ++++++++++++++++++++++++ Nevada: NET : : NEVADA : ++++++++++++++++++++++++ Random Suspected Nets: WIN: Top Secret Network. All coordinator's have last name Win. NET : : DFN-WIN8 : NET : : DFN-WIN9 : NET : : DFN-WIN10 : NET : : DFN-WIN15 : NET : : DFN-WIN25 : NET : : DFN-WIN26 : NET : : DFN-WIN28 : NET : : DFN-WIN57 : NET : : DFN-WIN58 : NET : : DFN-WIN59 : NET : : DFN-WIN60 : NET : : DFN-WIN61 : NET : : DFN-WIN62 : NET : : DFN-WIN63 : NET : : DFN-WIN64 : NET : : DFN-WIN65 : NET : : DFN-WIN66 : NET : : DFN-WIN67 : NET : : DFN-WIN68 : NET : : DFN-WIN69 : NET : : DFN-WIN70 : NET : : DFN-WIN71 : NET : : DFN-WIN72 : NET : : DFN-WIN73 : NET : : DFN-WIN74 : NET : : DFN-WIN75 : NET : : DFN-WIN76 : NET : : DFN-WIN77 : NET : : DFN-WIN78 : NET : : DFN-WIN79 : NET : : DFN-WIN80 : NET : : DFN-WIN81 : NET : : DFN-WIN82 : NET : : DFN-WIN83 : NET : : DFN-WIN84 : NET : : DFN-WIN85 : NET : : DFN-WIN86 : NET : : DFN-WIN87 : NET : : DFN-WIN88 : NET : : DFN-WIN89 : NET : : DFN-WIN90 : NET : : DFN-WIN91 : NET : : DFN-WIN92 : NET : : DFN-WIN93 : NET : : DFN-WIN94 : NET : : DFN-WIN95 : NET : : DFN-WIN96 : NET : : DFN-WIN97 : NET : : DFN-WIN98 : NET : : DFN-WIN99 : NET : : WIN-IP : NET : : WINDATA : +++++++++++++++ Scinet: Sensitive Compartmented Information Network NET : : BU-SCINET : +++++++++++++++ Disnet: Defense Integrated Secure Network. Composed of SCINET, WINCS ([World Wide Military and Command Control System] Intercomputer Network Communication Subsystem), and Secretnet(WIN). NET : : DISNET : ------------------------------ End of Computer Underground Digest #5.13 ************************************


E-Mail Fredric L. Rice / The Skeptic Tank