The Quest for Hidden UFO Secrets
Between 1992 and 2002, the big three UFO hackers made headlines by penetrating highly secure US government and military computer systems. Their mission wasn’t financial gain or sabotage—they were searching for evidence of UFOs and suppressed alien technology. The “big three UFO hackers” claimed to have found proof of non-terrestrial officers, unknown spacecraft, and even anti-gravity technology. Their stories highlight not only the evolution of cybersecurity but also the lengths some will go to uncover what they believe is hidden truth about extraterrestrial contact.
Who Were the Big Three UFO Hackers?
Quenton: The Pioneer (1992)
The story begins with a hacker known only by the alias “Quenton,” who appeared on NBC Dateline in 1992 with his face obscured and voice altered. During the segment, Quenton claimed to have accessed government files related to UFOs by penetrating military computer systems at Kirtland and Wright-Patterson Air Force bases—locations long rumored in UFO circles to house alien technology and information.
The full text that appeared on Quenton’s screen during the broadcast was later published in 1993 in a hacker e-zine called “Frack.” Despite attempts by UFO researcher T. Scott Crane to learn more about Quenton through letters to NBC in 1994, the mysterious hacker never responded, and his true identity remains unknown to this day.
Quenton’s activities served as inspiration for the two more famous UFO hackers who would follow in his footsteps creating the big three UFO hackers:
Matthew “Kuji” Bevan (1994-1996)
Four years after Quenton made his television appearance, British hacker Matthew Bevan (using the handle “Kuji”) used a modest Commodore Amiga 1200 to access systems belonging to the US Air Force, NASA, and NATO. His primary target was Wright-Patterson Air Force Base, where he claimed to have discovered plans for an anti-gravity drive.
Bevan was arrested in 1996 for his hacking activities, which reportedly began around 1994. During this time, he briefly worked with another young hacker named Richard “Datastream Cowboy” Price, who was more of a general hacker without a specific focus on UFOs. Price’s activities eventually led authorities to Bevan.
In an interesting turn of events, Bevan was let go in 1997 due to lack of evidence. According to Bevan himself, this was because “the Air Force didn’t want to disclose what their security vulnerability was” and “they didn’t want to show how their monitoring or logging software worked.” Additionally, the prosecution faced legal challenges because their evidence consisted primarily of hearsay, which is not admissible in UK courts.
Gary McKinnon Hacker (2001-2002)
Perhaps the most famous of the big three UFO hackers, Gary McKinnon carried out what was described at the time as “the biggest military computer hack of all time” between 2001 and 2002. McKinnon’s interest in UFOs had been lifelong, and he was inspired by the testimony of Donna Hare, a NASA photo lab worker who claimed UFOs were being airbrushed out of photos at Johnson Space Center’s Building 8.
Using remarkably simple methods, McKinnon targeted systems with default or blank administrator passwords. During his explorations, he claims to have discovered spreadsheets titled “Non-Terrestrial Officers” and “Fleet-to-Fleet Transfers” with names of ships not known to be in the US Navy fleet. He also reported seeing an image of a UFO on a NASA computer in Building 8, but was unable to download it when a user noticed his presence and disconnected him.
McKinnon’s hacking activities led to a 12-year legal battle as the United States sought his extradition from the UK, where he faced up to 80 years in an American prison. The case took a toll on his mental health, and he was eventually diagnosed with Asperger syndrome (now classified under autism spectrum disorder). In 2012, the UK blocked his extradition on human rights grounds, though McKinnon still cannot leave the UK for fear of being detained and extradited from another country.
What Did the Big Three UFO Hackers Claim to Find?
Classified UFO Documents
All three hackers reported accessing files related to unidentified flying objects. While Quenton didn’t provide specific details about his findings in his public appearance, both Bevan and McKinnon were more forthcoming about what they discovered.
Non-Terrestrial Officers and Secret Space Program
Gary McKinnon’s most startling claim involved discovering spreadsheets listing “non-terrestrial officers” and “fleet-to-fleet transfers” involving ship names not recognized as part of the known US Navy. While McKinnon has stated he doesn’t remember specific ship names that have been attributed to him in some reports, he confirmed via email that he does believe in a secret space program.
These claims align with theories proposed by some ufologists about a classified space force operating beyond public knowledge long before the official establishment of the US Space Force in 2019.
Anti-Gravity Technology
Matthew Bevan claimed to have found plans for an anti-gravity drive at Wright-Patterson Air Force Base. This aligns with persistent rumors in UFO research circles that the US government has been reverse-engineering alien propulsion systems since at least the alleged Roswell crash in 1947.
The concept of anti-gravity technology has significant implications beyond just UFO research. Such technology, if real, would revolutionize transportation, energy production, and our understanding of physics.
Airbrushed UFO Images
McKinnon was specifically targeting NASA’s Johnson Space Center Building 8 based on testimony from Donna Hare about UFOs being removed from official photos. He claims to have seen an image of a UFO on a computer there but was unable to download it before being detected.
The Legal Aftermath and Public Response
McKinnon’s Extradition Battle
Gary McKinnon’s case received the most public attention, largely due to the unprecedented 12-year legal battle over his extradition. The case highlighted disparities between US and UK extradition treaties and raised questions about proportional punishment for computer crimes.
McKinnon became something of a folk hero in both UFO research circles and among digital rights advocates. His diagnosis with Asperger syndrome brought attention to neurodiversity issues in relation to computer hacking and the legal system.
Today, McKinnon runs an SEO company (Small SEO) in the UK but still cannot travel internationally due to the risk of extradition to the US.
Matthew Bevan Hacker Case Dismissal
Matthew Bevan’s case was ultimately dismissed due to lack of evidence, with prosecutors unwilling to reveal details about security vulnerabilities or monitoring systems. This precedent may have influenced later cases and highlighted the challenges governments face when prosecuting hackers without compromising sensitive security information.
The UFO Community’s Reaction
The UFO research community has largely embraced the three big ufo hackers as whistleblowers who risked their freedom to expose government secrets. In interviews, such as those conducted with Gary McKinnon, the response has been overwhelmingly positive, with many seeing them as having been unfairly targeted by governments more interested in maintaining secrecy than addressing the underlying questions about UFO evidence.
Cybersecurity Evolution: From the 1990s to Today
The Changing Nature of Hacking
In the 1990s and early 2000s, hacking was often viewed as a game or challenge rather than the serious crime it’s considered today. Security systems were poorly protected, with many using default passwords or even no passwords at all. As Tom Hastings, a cybersecurity professional interviewed in the transcript, notes: “Security was so lax that hacking NASA was almost like a rite of passage for teenagers.”
The techniques used by hackers like McKinnon—targeting systems with administrator passwords of “administrator,” “password,” or blank passwords—would rarely succeed today due to improved security practices and awareness.
From Hackers to Security Professionals
Interestingly, many former hackers have transitioned into careers as cybersecurity professionals. Their experience thinking like attackers makes them valuable in identifying and closing security vulnerabilities. This career path represents a positive channeling of hacking skills toward protecting rather than penetrating systems.
Hastings himself followed this trajectory, moving from hacking his high school’s computer systems to a career in cybersecurity. This pattern demonstrates how curiosity and technical skills that might lead to hacking can be redirected toward legitimate security work.
Modern Cyber Threats and Nation-State Actors
Today’s cybersecurity landscape is dominated by Advanced Persistent Threats (APTs)—a term used in cyber intelligence to describe nation-state actors such as China or Russia engaged in cyber espionage. These sophisticated operations are far more dangerous than the relatively simple hacks carried out by the big three UFO hackers of the 1990s.
Modern threats include:
- Cyber espionage targeting military and intelligence secrets
- Backdoored hardware and software from foreign manufacturers
- Sophisticated social engineering attacks rather than purely technical exploits
- Supply chain compromises affecting critical infrastructure
Lessons in Cybersecurity from the UFO Hackers
The Human Element Remains the Weakest Link
Despite technological advances, social engineering—manipulating people rather than technology—remains one of the most effective hacking techniques. As Hastings notes: “The weakness is always the human element.”
Basic Security Practices That Everyone Should Follow
Based on the interview, here are key cybersecurity practices everyone should implement:
- Use two-factor authentication – Preferably with an authentication app rather than SMS, as phones can be compromised through SIM swapping
- Use passphrases instead of passwords – Length is more important than complexity
- Implement password managers – To create unique passwords for every site and service
- Consider passwordless login with biometrics – These use cryptographic keys linked to biometric data for more secure authentication
- Be vigilant against phishing – Learn to identify suspicious emails by checking sender addresses, watching for typos, and being wary of urgent requests
The Evolution of Security Responses
Government and corporate approaches to security vulnerabilities have evolved significantly since the UFO hacker cases. Today, many organizations operate bug bounty programs that pay ethical hackers to find and report security flaws rather than prosecuting them.
The Legacy of the UFO Hackers
Did They Do the Country a Service?
While their methods were illegal, the UFO hackers inadvertently performed a service by highlighting serious security vulnerabilities in critical government systems. Their activities prompted improvements in cybersecurity that might have otherwise taken years to implement.
As Hastings suggests: “Rather than hiring or thanking Gary McKinnon for pointing out the security weaknesses, the government got egg on its face and spent a dozen years trying to prosecute him.”
The Continuing Search for UFO Truth
The big three UFO hackers represent an unusual intersection between cybersecurity history and UFO disclosure efforts. Their stories continue to inspire both UFO researchers and those interested in the early history of hacking.
For those interested in learning more about these cases, resources like UFOHackers.org (created by Tom Hastings) compile interviews, articles, and documentation related to all of the big three UFO hackers and their claims.
Conclusion: Beyond the Big Three UFO Hackers
The era of the “Big Three UFO Hackers” effectively ended with Gary McKinnon’s case, as security systems became more sophisticated and penalties for hacking grew more severe. However, their legacy lives on in both UFO research circles and cybersecurity discussions.
As governments increasingly acknowledge the reality of unidentified aerial phenomena through official programs and disclosures, the motivations behind these historic hacking cases remain relevant. Were these individuals simply breaking the law, or were they civil disobedients exposing important hidden truths?
Whatever one believes about their claims or methods, the cases of Quenton, Matthew Bevan, and Gary McKinnon serve as fascinating chapters in both the history of cybersecurity and the ongoing efforts to uncover potential government secrets regarding extraterrestrial evidence.
Protecting Yourself in Today’s Cyber Landscape
While most of us aren’t trying to hack into government systems looking for UFO evidence, we can all benefit from the cybersecurity lessons these cases highlight. As threats evolve from simple password guessing to sophisticated social engineering and nation-state attacks, maintaining good security practices is more important than ever.
By implementing strong authentication methods, using unique passwords, remaining vigilant against phishing attempts, and keeping systems updated, individuals and organizations can significantly reduce their vulnerability to modern cyber threats—whether they come from curious hackers, criminal organizations, or foreign governments.
The story of the UFO hackers reminds us that security is never perfect, but also that the consequences of poor security practices can extend far beyond what we might imagine. Whether their claimed discoveries were real or misinterpreted, their cases permanently changed how governments approach cybersecurity.