Part 81 (1/2)

A BBS COMPUTER IS DEDICATED TO ONE FUNCTION, BBS'ING SO I POKED AROUND AND FOUND ANOTHER COMPLETE BBS SYSTEM, NOT PART OF FREE- DOM TOO MUCH WAS ENCRYPTED, THOUGH, TO LEARN MUCH BUT WE WILL

Don't get yourself into hot water again

NOT TO WORRY I'LL BECOME ONE OF THEM PLAY THEIR GAMES IT'S EASY TO BE ANYONE YOU WANT I WANT TO SEE WHAT'S GOING ON BEHIND THE SCENES SHOULDN'T TAKE LONG

Friday, Deceil!

by Scott Mason

In July of 1990, the United States Army joined the inner sanctuon had finally realized that the computer is as essen- tial to battlefield operations and coun and the radio

Therefore, as the logic goes, why shouldn't the coets In keeping with that line of thinking, the Army said, use core theabytes and erase deserts of data Perfect for modern warfare

The Ar the private sector to study and design coainst enemy computers The half million dollar contract arded to a Beltway Bandit, a sovern- ment sub-contractor so named for their proxiton, DC

So, the Ars up quite a few questions

Question I How long has the Government known that coic militari- ly offensive fashi+on? RFP's are always preceded by much internal research and consultation with private industry The Government typically will have issued RFI's, (Requests For Information) and RFQ's (Request For Quotes) and already have a darn good idea of what's available and from whom

Question II Has the Government already sponsored such research?

The existence of the EMP-T Bomb has created quite a furor

Question III What if the Aret loose? Who is responsible for silicon based biological warfare on desktop computers?

Question IV Have any coone out of control?

Question V If the Government knew that civilian and military computers could be syste to defend ourselves against a similar assault?

Last e by secret EMP-T boation into suchansere uncovered

In an atteencies, I located a secretive group called OCTAG/0N (Offensive Coy Applications Group/Zero-Noveency project whose sole function is to develop reat distances

According to a highly placed source at the Pentagon, OCTAG/0N allegedly developed computer viruses that will destroy the ene- on-ese, is the hard part ”If we can get at their co anony theet at their coreat distances”

In the battlefield, for exaroups explode snetic pulses at certain frequencies The EM pulses destroy nearby coe) So as in the Teram Other computers, such as those in Air Force One, inside on War Rooranetic pulses associated with above ground nuclear explosions

Intensely focussed energy beams of loer can totally disrupt an unshi+elded computer as far away as three miles Synchronized Interference Techniques provide double duty to both listen in on and jam air borne computer traffic One of OCTAG/0N's pet tricks is to broadcast a coht by a co on the same frequency So simple, yet so devious

In conversations with coround hacker coh tech weaponry has been confir a predictable 'no coain Why hasn't our Governainst an apparently formidable computer weapons complement? I hope ”The Other Guys” aren't so well ar a chastity belt to my modem