Matthew Williams - Anti-Gravity Engine, energia free,urzadzenia,jak zrobic, Antygrawitacja
[ Pobierz całość w formacie PDF ]
Hacker_Found_UFO_Files_At_WPAFB
UK Hacker Says He Found Anti-Gravity Engine File At W/P AFB
Anti-Gravity Engine File
UK Hacker Says He Found Anti-Gravity Engine File At W/P AFB
By Matthew Williams
February 7, 1999
Source: Max Burns AlienHype@aol.com
Mathew Bevan is a 23 old computer hacker with an interest in UFOs. Recently he
made front page world headlines when he was charged with hacking offences which
included access to the most secret military computers of the United States
Military. Mathew was able to access computers, which had the ability to launch
nuclear missiles or other missiles. Described by one pentagon spokesman as being
"The biggest threat to world peace since Adolf Hitler", Mathew Bevan talks to
Matthew Williams about how he did it and the fact that whilst in Wright
Patterson Air Force Base computers he saw plans to a secret Anti Gravity
propulsion engine....
Matthew Williams: How many years have you been into the Internet?
Mathew Bevan: Since about 16. It was a case that over here there were very few
Internet providers. The only one was Demon Internet and the closest phone number
to dial was in Bristol, so it was just easier to do a free (hacked) phonecall to
the States and use a free provider and not worry about paying any bills.
MW: How does one "hack" the phones - what is the procedure involved?
MB: You use a little program on the old computer... The Amiga was the first
computer to be used for "Blueboxing" (hacking phones) and the reason was that it
has four channels of sound whereas the PC could only go "BEEP". To get the
blueboxing to work you had to play dual tones into your phone. There was a set
of frequencies of tone not dissimilar to DTMF which is on most modern phones
(DTMF - the tones played when you press a number on your phone keypad). When the
special tones were played it would cause the network to do a number of special
things.
What you then needed to do is to call a 0800 number for a foreign countries
operator service - such as Columbia or Hawaii. You would play a few tones down
the line and it would cut the operator off and BT would think that you had hung
up the call but in fact you were still in the trunking system and you play a few
more tones and you could re-route your call anywhere.
Page 1
Hacker_Found_UFO_Files_At_WPAFB
MW: Is it complicated to do these things because playing sets of musical tones
down the phone line sounds quite complicated and what if you make a mistake?
MB: Well it is complicated but is a case of playing around to see what you could
do. If you make a mistake you just hang up and try again. There were some other
interesting things you could do like dialling a number and when you get the
engaged signal then play a couple of tones and break into the call and listen
without the two parties knowing you were there.
MW: You are saying that there are ways to listen to calls without being detected
and this can be done from any home phone with such codes!? Are you saying that
you could listen to another call anywhere in the world?
MB: Yes but most of the time I was calling into the States anyway so that's
where I did it the most. I think that secretly listening in is what it was
designed for.
MW: So when did you go from hacking innocent university computers into hacking
the military computers?
MB: It was a case of getting onto a system and getting the password file and
then running the encrypted passwords through a code cracking program so that you
get the passwords. Once you have the passwords then you can get a higher level
of access and get into peoples files and folders and you can monitor the system
to see what it is happening. You can see that there are people that are
themselves who are going from computer to computer with legitimate reasons. Now
it would just happen that some of these people would be working on projects with
the military. You could find that a professor would be contacting a military
site (computer).
One would get fed up with doing small computer systems and would want to try to
hack something bigger. The thing with people is that they tend to like the same
password for multiple systems and so if you have hacked their account on a
relatively unprotected system then the password will probably work on another
more well protected system. The professor probably has some silly password like
"professor" on the university computer and more often than not would use the
same on a military system.
It is not a case of sitting there typing in millions of passwords and hoping
that you get the right one. There are much more intelligent programs to do that
for you and get you in to a system.
We now use things called SNIFFERS, which are covert and do not harm the system
in any way. These sit in the background and watch for people's passwords and
Page 2
Hacker_Found_UFO_Files_At_WPAFB
they send them back to you. This is something that I was charged with and the
offence read "modification to a system with intent to impair the operation of
the computer". Well the whole point of a sniffer is that it sits there and
nobody knows it is there - if it did any harm we wouldn't use them.
Well once inside you would use various hacker techniques to bump up your access
level to that of systems administrator, so that you would have the entire system
under your control. You could connect to other systems on the network with the
same authority. You could monitor people's emails and you could get into their
project folders and look at their research and development work or papers that
they have written. Occasionally you would get into somewhere that was quite
interesting but it wasn't always that way. Most of it was quite boring. Back in
the old days before Internet Browsers that give you nice pictures and buttons to
click on, it was all text based and you had to use the keyboard to type
commands. There were pictures, but you had to manually download them and view
them "offline".
MW: So what were the most exciting computer systems you hacked?
MW: Firstly there was the FLEX system. This stands for Force Level Execution,
and this is the thing which the News of the World newspaper picked up on. The
reason this system was of interest because it had control of nuclear missiles.
To explain what this program does; the official line is to plan an air war and
to find out what things are incoming and what air strikes are pending. The
system would then advise you of where to strike next with the best killing ratio
and where to launch you missiles etc. From looking on the computer and through
the "source code" I got the impression that the system had direct access to real
missiles. What type of missiles I do not know and the News of the World printed
that these were in fact Peacekeeper Missiles, but that didn't come from me - I
don't know where they got those details from...?
The easiest comparison I could make is that it was a very similar system to the
Skynet System in the Terminator movies. This means that the computer has access
to all available information and can make intelligent decisions about how to
operate a war and even control the weapons.
Of course the FLEX system is secret and something that they do not want the
public to know about and the fact that weapons are controlled solely by
computer. You would think that there would be other failsafe system but, as far
as I could tell, that was not the case.
There were other systems such as Wright Patterson Air Force base and White Sands
Missile Testing Ground, some now I forget - I went to a lot. I had been to so
many I had to tell the police that I could not remember all the systems I had
been in.
Page 3
Hacker_Found_UFO_Files_At_WPAFB
The lawyers couldn't get their stories straight even for a trial of this type,
which you would have expected. They would not present evidence to show how I was
able to hack into their systems. So with the details of the computer systems
real purpose having been removed from the case then I am now pretty sure that I
did have a good idea about the real function of the programs - they didn't want
this information out in any form. This was probably the reason that they were so
pissed off about it because I came forward and told everyone. You see after I
was arrested then I started to get some very strange phone calls from people
claiming to be in the military, Koreans and other people. I had weird
semi-threatening things said to me and this is why I moved away to get away from
these treats and this is another reason that I spilled the beans, in order to
keep myself and my wife safe, after all what is the point of silencing me after
I had talked.
MW: Where were you living and did the police give you any assistance in your
moving because of these threats?
MB: Firstly I was living in Grangetown and then I was moved by the benefits
agency to another location. They were aware of the court case and the
sensitivity and people from Scotland Yard were helping in this respect also. I
was given a new name under the benefits agency computers and was living under
name of Mr Smith for a while.
MW: Why do you think they were prepared to go to this trouble to help you?
MB: What you have to understand is the fact that there was a big Senate hearing
on the fact that two hackers had got into secret computer systems. One of these
was a 16-year-old who they had arrested and the other person was supposedly
thought to be a foreign spy who was paying the 16-year-old for information. I
was made out to be the foreign spy and I was prepared to believe from the
threats I was getting that these people were serious. So I had to move home.
To give you an idea of the level of the ominous phone calls I was getting, at
the time I was just about to change my phone over to British Telecom. Just days
before I was arrested I was due to sign the BT phone forms and send them off,
but had not done do at that point. Then I had another threatening phone call and
I told them to **** off and said that I was now having my number changed. The
voice on the other end of the line said "yeah we know that your new number is
going to be 01222 233blah blah blah" and so they knew my new number already! My
wife asked often who was speaking and one name we got was Chung Lee Makasuki and
he gave some phone number in China, I think.
MW: When you were arrested what happened?
Page 4
Hacker_Found_UFO_Files_At_WPAFB
MB: I was working at Admiral Insurance at the time in their computer department
for around a year and a half. One of the managers came in and asked me to come
and have a look at one of their computer systems and I got up and went with him.
I went with him to the MDs office and there were seven people in the office,
your typical men in black so to speak but as this was the MDs office I didn't at
first see this as abnormal. When I got inside one of then said to me "Mathew
Bevan" and I replied "yes" and then he put up his hand and said "I am placing
you under arrest for hacking of NASA and various Air Force bases." I was
standing there stunned and I was going "Oh, gosh... ummm." They then told me
that they were going to search my desk, which they did, then they took me back
to my house and searched there too.
When they got to the house they took all my X Files videos and X Files posters
and the reason was because the "KUJI" hacker that they were after had a computer
user description which read "The Truth Is Out There". So they wanted to use the
X Files material to prove that they had the correct "KUJI". They just wanted to
pin me on anything they could. They took all of my computer kit as well as my
passport.
During the interview I agreed that I used the handle 'Kuji' and afterwards the
police gave me my property back such as the X Files videos, posters,monitor and
the keyboard back but they kept everything else.
I was taken to the Central Police station in Cardiff. The officers were from the
computer crime unit of the Met Police. I believe that the C.C.U. also uses the
code S.O.6 which leads me to believe that they are intelligence (MI6) related
but I don't think they would admit that.
MW: What was the atmosphere like in the interviews?
MB: It was a good cop bad cop scenario. The one person was very nice and the
other guy was quite nasty and was giving snide remarks and shouting at me. There
were bits in the interviews that were really stupid too where I was asked by the
nice cop if I had any political leanings and I said no - then the other cop
stepped in and said "Yeah, but your a vegetarian" and he then said "So you do
have a leaning then.". To this I then replied "Well if being vegetarian is a
political leaning then I plead guilty!". The other copper then steps in and make
a lighthearted comment and then the other one steps in again and says "ah so you
indicate a leaning then" and so on.
I was under arrest for the best part of 36 hours but there was about 28 hours
spent in the cells. I wasn't allowed to speak to my wife or anyone else. They
threatened that they would arrest my wife and I pointed out that she knew
nothing about computers and they said tough because they would arrest her
anyway. This was part of their oppression tactics. I said what do I have to do
Page 5
[ Pobierz całość w formacie PDF ]
Tematy
- Strona pocz±tkowa
- magazynowanie energii wiatrowej, Energetyka odnawialna, Energetyka Wiatrowa
- Matthews Jessica - Jesteś zbyt blisko, Książki - Literatura piękna, Bonia, Harlequin Medical
- Matthew.Woodring.Stover.-.Ostrze.Tyshalle'a.ks.1.(P2PNet.pl), !!!!!!! NOWE !!!!!!!!!(hasło=1234)
- Matthews Jessica - Dzień radości(1), Książki - Literatura piękna, H 2011- ostatnie
- MacDonald Matthew - Silverlight 2 Visual Essentials, Informatyka(1)
- Matthews Jessica - Prawdziwa perła, ●Ksiazki, ALFABETYCZNIE
- MacDonald Matthew - Pro Silverlight 2 in C#, Informatyka(1)
- Matthews Carole - Cukiernia w ogrodzie,
- Matthew Hart, ebooki2
- Mazda5 Engine, motoryzacja, Mazda5
- zanotowane.pl
- doc.pisz.pl
- pdf.pisz.pl
- wzzw.htw.pl