SIMTEL20
Computer System

The true and complete story of a United States military computer system hijacked by a gang of Federal Government Employees and their Contractor co-conspirators who used every imaginable scam to rip off the taxpayer while stuffing their pockets with gobs of cash.

Early History of the SIMTEL20.  The name is an acronym derived from SIMulation and TELeprocessing DECSYSTEM-20. The U.S. Army White Sands Missile Range, New Mexico purchased a Digital Equipment Corporation DECSYSTEM-20 model 2040 / 2065 “mainframe” in the early 1980s for use by its Army Missile Test and Evaluation (ARMTE) Directorate. Intended for both simulation of projected performance, and evaluation of data from live fire artillery and guided missile projectiles, the system was soon diverted for the personal gain of a larcenous gang of racketeers. Read the full history of the system, from its purchase authorization in 1979 to its September 1993 demise that brought down high ranking civilian and military officials amid a flood of scandal and coverup.

The Actors.  Biographies of all the swindlers – both government and contractor, and the military and government officials they duped, including those alive and those now dead. Complete details of their careers and criminal histories. Every person who had any part in the SIMTEL20 scams is laid bare, complete with mug shots for most of them.

The Scams.  Here are just a few you will read about: Operation of the SIMTEL20 as a commercial Internet Service Provider (ISP) in competition with private companies, and in violation of federal law, with cash kickbacks going directly to the conspirators. Fraudulent “Telecommuting.” Fraudulent Overtime. Fraudulent Night Differential Pay. Fraudulent Performance Awards. Fraudulent Travel to Resorts. Fraudulent Travel Reimbursement Vouchers. $100 Million in Software Piracy and Theft. And countless other scams invented by the villains to enrich themselves as they plundered the U.S. Government treasury and raped the U.S. taxpayer in the process.

The Most Vile, Disgusting and Evil Scam of All.  Read about how the two principal conspirators schemed to have every single item of military electronic communications throughout the world diverted and routed through the SIMTEL20 during the 1990-1991 First Gulf War (Operation Desert Shield / Desert Storm). This communications, which under normal circumstances traveled through thousands of independent circuits with countless fail-safe alternate routes, was to be forced through the SIMTEL20’s limited bandwidth, notoriously unreliable and unsecure circuits, making the SIMTEL20 not just a bandwidth bottleneck, but a single point of failure that would shut down the military’s entire communication system upon its failure. The premise of the scheme was that one of the conspirators would be declared a “hero” of the war effort, and the other would present him with a “performance” award of $250,000 at the end of the conflict. The two of them would then split the ill-gotten proceeds between themselves. All this at the expense of American and Allied soldiers whose lives depended on fast, secure, and reliable communications. Making the scam all the more odious was that both of the conspirators were notorious draft dodgers during the 1960s and 1970s. Learn how the scam fell apart when one of the few senior executives with a brain in his head pulled the plug before the scheme could be put in motion.

The Coverup.  How high-ranking military and civilian officials sought to cover up the scams and thefts, and repeatedly attempted reprisals against security and law enforcement personnel whose mission it was to investigate the SIMTEL20 crimes.

The Six Million Dollar Man.  The SIMTEL20 crime ring was finally put out of business in 1993, almost wholly through the investigative work of a single security management official who, in the face of repeated orders to cover up the affair, threats and intimidation, finally broke the back of the cartel. The U.S. Government paid six million dollars in damages to this official, and is said to be still—25 years later—dragging its feet to comply with a court judgement of an additional $30M for which it was also found liable.

Official SIMTEL20 Government Documents Archive.  Searchable PDF scans of seven thousand documents ranging from RFPs, purchase contracts, hardware upgrade contracts, service and support contracts granted to co-conspirators of the federally employed masterminds, travel orders, pay records and performance awards of the scammers, memoranda, disposition forms (DFs), and every other paper document associated with the SIMTEL20.

SIMTEL20 E-Mail Archive.  The complete archive of tens of thousands of e-mails sent and received by users of the SIMTEL20 system, not only on the SIMTEL20 itself, but on all other White Sands Missile Range electronic mail systems. Follow their day-to-day larcenous machinations through incredibly detailed and damning correspondence which they thought was secure. In searchable PDF format.

Bringing Miscreants to Justice.  There is no statute of limitations on most of the federal crimes committed in connection with the SIMTEL20 computer. Learn how those with even the slightest affiliation with the SIMTEL20 can help with the arrest and prosecution of the gang of criminals still running loose after all these years!

Discussion Forum.  Exchange comments and information with others who have an interest in the sordid history of the SIMTEL20.

 

AT&T 3B5 Computers BBN C/70 C-70 computers TAC terminal access controller TIP Road Agents on the Information Super Highway White Horse Communication Whitehorse Communication WSMR White Sands Missile Range NM 88002 White Sands Proving Ground New Mexico Information Superhighway Infobahn I-bahn I-way cyberspace contract fraud property theft misuse of government computers misuse of government equipment and services, software copyright infringement and theft payroll fraud administrative misconduct sexual misconduct reprisal actions sexual harassment fraud waste and abuse GS-5 GS-6 GS-7 GS-9 GS-11 GS-12 GS-13 GS-14 GS-15 GM-14 GM-15 SES WG-10 WG-11 WG-12 computer phreaks cyber freaks computer hackers Electronic Bulletin Board System BBS civil service Army Criminal Investigation Division CID Army Inspector General IG Army Military Police Investigations MPI Federal Bureau of Investigation FBI U.S. Office of Special Counsel OSC Launch Complex 38 LC-38 Elwood D. Baas Elwood Baas 1712 Boulders Dr. Las Cruces New Mexico 88011-4056 Delores Baas Ronald R. Boykin Ron Boykin U.S. Army Colonel Col. Director Directorate of Information Management Robert Bruce Owner Walnut Creek CD-ROM 1547 Palos Verdes Mall Suite 260 Walnut Creek CA 94596 Marsha J. Burroughs Richard L. Conn Stringer employee Management Assistance Corporation of America MACA Employee MITRE Corporation BCODE: 23588 Mail Stop FTMO 145 Wyckoff Road Suite 201 Eatontown NJ 07724 Mark R. Crispin Employee of University of Washington Seattle WA 98105. Owner of Panda Programming 6158 Lariat Loop NE Bainbridge Island WA 98110-2098 Ruth E. French Arizona Ruth Elizabeth Channel French Ruth Elizabeth French 512-62-4015 MG John C. Freyer Jr. U.S. Army Major General National War College Ft. McNair Washington DC 20319-6000 Kimberly A. Harrison 553-96-5116 El Paso County Community College District 9570 Gateway North El Paso TX 79924 Teresa L. Jackson Terri Jackson 585-17-5037 Albert Johnson Owner / CEO Management Assistance Corporation of America MACA 8600 Boeing Dr. El Paso TX 79925 Steven P. Kadner Partner Aquila Technologies Group Inc. 1704 Moon NE Albuquerque NM 87112 P. O. Box 10300 Albuquerque NM 87184 Former owner of BFA Enterprises El Paso TX 79925 8401 Washington Pl. NE 87113 505-828-9100 www.aquilagroup.com Judy Beckes Talcott Mike White International Atomic Energy Agency IAEA Argentine-Brazilian Agency for Accounting and Control of Nuclear Materials ABACC European Atomic Energy Community EAEC or Euratom DOE International Nuclear Materials Management INMM Treasurer Waste Management Symposia Markku Koskelo Mike Moran Col. Arthur M. Kelly Jr. Art Kelly U.S. Army Colonel Retired. Former Director Directorate of Information Management DOIM Palm Coast FL 32137 Lt. Col. John A. Krump U.S. Army Lieutenant Colonel Director Office of Staff Judge Advocate Legal Office White Sands Missile Range NM 88002 Jane H. Madrid Christopher D. McDonald 562-74-3478 Chris McDonald Charles K. McPherson Chuck McPherson Technology Insertion Branch Headquarters Army Materiel Command AMCIO-TS Room 4E08 5001 Eisenhower Ave. Alexandria VA 22333 Brenda Myers ARMTE LC-38 Materiel Test Directorate Keith B. Petersen Stringer employee Management Assistance Corporation of America El Paso TX. Owner of SIMTEL20 CD ROM Co. 1142 N. Main St. Rochester MI 48063. Owner of Coyote Data Ltd. 1142 N. Main st. Rochester MI 48063. Owner of Detroit Download 32172 Knollwood Dr. Warren MI 48092 Emery G. Peterson Pruitt David Dave Pruitt Office of the Inspector General IG David J. Sutton Dave Sutton Francis J. Wancho 10560 Lakewood Ave. El Paso TX 79925. 915-598-3000 136-34-6312 Pancho Wancho Frank Wancho Lawrence M. Watts Ersilia E. Yurmann Contract Management Branch Directorate of Information Management Louis E. Wheeler Co. P.O. Box 888 Oceano CA 93445 805-481-5687 initiated a $2 million lawsuit Lou Wheeler The Ada Software Repository and the Defense Data Network: A Resource printed in 1987 publisher is a subsidy or “vanity” publisher ARMTE Computer Oriented Simulation System ARCOSS Test and Evaluation Command TECOM Aberdeen MD Life Cycle Management LCM Army Materiel Command AMC in Washington DC Alexandria VA Robert J. Toom Joseph Mroz Brussels Belgium NATO Headquarters BFA Enterprises Aquila Technologies Group Horizons Technology Inc. U.S. Army Tank & Automotive Command TACOM Contract Number DAAD07-89-C-0001/68914001 ByteSize Software Sarasota Florida U.S. Air Force at Gunter Air Force Base AL Paul Bradley University of Washington Seattle Dr. Terry Gray Ron Johnson electronic bulletin board system BBS mirror site computers oak.oakland.edu William S. Watts Office of Computer Services Oakland University Rochester MI wuarchive.wustl.edu Chris B. Myers W. Univ. St. Louis MO ftp.uu.net Andrew Partan 3110 Fairview Park Drive Ste. 570 Falls Church VA 22032 nic.funet.fi Harri Salminen Finnish University & Research Net Otaniemi Espoo Finland netcops src.doc.ic.ac.uk Lee McLoughlin Tel 44-1-589-511 ext 5085 England United Kingdom Britain nic.switch.ch Willi Huber Switch Teleinformatics Services Limmatquai 138 CH-8001 Zurich Switzerland nctuccca.edu.tw Zi-Di Liu Ministry of Education Computer Center 12th Floor No. 106 Section 2 Ho-Ping East Road Taipei Taiwan China Wheeler Software Co. copyright infringement outright software theft international banditry National Science Foundation NSF Tax fraud New Mexico state income tax Major General MG Ronald V. Hite Ruben Rede Brenda Myers fraudulent overtime night differential COL Arthur M. Kelly Computer Crime Law William Reich Bill Reich wheel super user access capability capabilities anti-abortion right to life Kenneth Ken Clodfelter 2320 Rosedale Dr. 575-525-1864 Emery G. Peterson Leonard G. Calix Leonard Gonzales Calix Leo Calix Leon Calix Liduvina S. Calix Liduvina Sotelo Calix Liddy Calix born Mexico Leonard Sotelo Calix Joshua Sotelo Calix Public Affairs Officer Office BG Jerry L. Laws Commanding General STEWS-CG Rodolfo Ayala Rudy Ayala Richard Whisman Dick Whisman Military Police Investigations MPI Office of Special Counsel OSC Col. Robert Baker Bob Baker Deputy Commander STEWS-CG William P. Fugelso Bill Fugelso STEWS-JA Staff Judge Advocate extremist religious views chiseler insane mentally unstable psychiatric treatment for mental instability cyber psychosis hacking electronic mail e-mail email network hackers cyber phreaks cybercrooks fat oaf pasty pallor spending life cloistered with a computer terminal nerd cyberfreak cyber freak cyberphreak cyber phreak cybersurfer cyber surfer web surfer W. J. Strader MD Robert L. Young MD Michael Wayne Wolfenbarger 409-78-3137 David LaMacchia Captain Capt. Ringdahl Hacker Hobby Shop HACKERS-R-US cyber freak religious extremism cyber criminals cybercriminals