| ==Phrack Inc.== | |
| Volume Three, Issue 30, File #12 of 12 | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| PWN PWN | |
| PWN P h r a c k W o r l d N e w s PWN | |
| PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN | |
| PWN Issue XXX/Part 2 PWN | |
| PWN PWN | |
| PWN Created, Written, and Edited PWN | |
| PWN by Knight Lightning PWN | |
| PWN PWN | |
| PWN Special Thanks to Dark OverLord PWN | |
| PWN PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| U.S. Inquiry Into Theft From Apple November 19, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by John Markoff (New York Times) | |
| A former Apple Computer Inc. engineer has said he was served with a grand jury | |
| subpeona and told by an FBI agent that he is a suspect in a theft of software | |
| used by the company to design its Macintosh computer. | |
| In June a group identifying itself as the Nu Prometheus League mailed copies of | |
| computer disks containing the software to several trade magazines and software | |
| developers. | |
| Grady Ward, age 38, who worked for Apple until January (1989), said that he | |
| received the subpeona from an FBI agent, who identified himself as Steven E. | |
| Cook. | |
| Ward said the agent told him that he was one of five suspects drawn from a | |
| computerized list of people who had access to the material. The agent said the | |
| five were considered the most likely to have taken the software. | |
| A spokesman for the FBI in San Francisco said the agency would not comment on a | |
| continuing investigation. | |
| Ward said he had told the FBI he was innocent but would cooperate with the | |
| investigation. | |
| The theft of Apple's software has drawn a great deal of attention in Silicon | |
| Valley, where technology and trade-secret cases have highlighted the crucial | |
| role of skilled technical workers and the degree to which corporations depend | |
| on their talents. | |
| The case is unusual because the theft was apparently undertaken for | |
| philosophical reasons and not for personal profit. | |
| There is no indication of how many copies of the program were sent by Nu | |
| Prometheus. | |
| Software experts have said the programs would be useful to a company trying to | |
| copy the distinctive appearance of the Macintosh display, but it would not | |
| solve legal problems inherent in attempting to sell such a computer. Apple has | |
| successfully prevented many imitators from selling copies of its Apple II and | |
| Macintosh computers. | |
| The disks were accompanied by a letter that said in part: "Our objective at | |
| Apple is to distribute everything that prevents other manufacturers from | |
| creating legal copies of the Macintosh. As an organization, the Nu Prometheus | |
| League has no ambition beyond seeing the genius of a few Apple employees | |
| benefit the entire world." | |
| The group said it had taken its name from the Greek god who stole fire from the | |
| gods and gave it to man. | |
| The letter said the action was partially in response to Apple's pending suit | |
| against Microsoft Corp. and Hewlett-Packard Co., accusing them of copying the | |
| "look and feel" -- the screen appearance -- of the Macintosh. | |
| Many technology experts in Silicon Valley believe Apple does not have special | |
| rights to its Macintosh technology because most of the features of the computer | |
| are copied from research originally done at Xerox Corp.'s Palo Alto Research | |
| Center during the 1970s. The Macintosh was not introduced until 1984. | |
| The theft came to light in June after Macweek, a trade magazine, published the | |
| letter from Nu Prometheus. | |
| At the time the theft was reported, executives at Apple, based in Cupertino, | |
| California, said they took the incident seriously. | |
| A spokeswoman said that Apple would not comment on details of the | |
| investigation. | |
| Ward said he had been told by the FBI agent that the agency believed Toshiba | |
| Corp. had obtained a copy of the software and that copies of the program had | |
| reached the Soviet Union. | |
| The software is not restricted from export to the Communist bloc. Its main | |
| value is commercial as an aid in copying Apple's technology. | |
| Ward said the FBI agent would not tell him how it believed Toshiba had obtained | |
| a copy of the software. | |
| Ward also said the FBI agent told him that a computer programmer had taken a | |
| copy of the software to the Soviet Union. | |
| Ward said the FBI agent told him he was considered a suspect because he was a | |
| "computer hacker," had gone to a liberal college and had studied briefly at the | |
| Massachusetts Institute of Technology's Artificial Intelligence Laboratory. | |
| The term "hacker" was first used at MIT to describe young programmers and | |
| hardware designers who mastered the first interactive computers in the 1960s. | |
| Ward is the second person to be interviewed by the FBI in the investigation of | |
| the theft. | |
| Earlier Charles Farnham, a businessman in San Jose, California, said two FBI | |
| agents came to his office, but identified themselves as reporters for United | |
| Press International. | |
| Farnham, a Macintosh enthusiast, has disclosed information about unannounced | |
| Apple products, said that after asking him to come outside his office, the men | |
| said they were FBI agents and proceeded to question him about Nu Prometheus | |
| group. He said he was not told that he was a suspect in the case. | |
| UPI has complained to the FBI because of the incident. | |
| Ward said he had joined Apple in 1979 and left last January to start his own | |
| company, Illumind. He sells computerized dictionaries used as spelling | |
| checkers and pronunciation guides. | |
| He said the FBI told him that one person who had been mailed a copy of the | |
| Apple software was Mitchell Kapor, founder of Lotus Development Corporation. | |
| Kapor returned his copy of the disk unopened, Ward said the agent told him. | |
| Ward said the FBI had also said he was suspect because he had founded a group | |
| for the gifted known as Cincinnatus, which the agent said had roots in Greek | |
| mythology that were similar to the Nu Prometheus group. | |
| Ward said the FBI was mistaken, and Cincinnatus is a reference from ancient | |
| Roman history, not Greek mythology. | |
| _______________________________________________________________________________ | |
| Data-Destroying Disc Sent To European Computer Users December 13, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by John Markoff (New York Times) | |
| A computer disk containing a destructive program known as a Trojan horse has | |
| been mailed to computer users in at least four European countries. | |
| It was not clear if any copies of the program had been mailed to people in the | |
| United States. | |
| The program, which threatens to destroy data unless a user pays a license fee | |
| to a fictitious company in Panama City, Panama, may be a widespread attempt to | |
| vandalize thousands of personal computers, several computer experts who have | |
| studied the program said Tuesday, December 12. | |
| Some computer experts said the disk was mailed by a "PC Cyborg" company to | |
| subscribers of personal computer trade magazines, apparently using mailing | |
| lists. | |
| The disk is professionally packaged and accompanied by a brochure that | |
| describes it as an "Aids Information Disk," the computer experts said. But | |
| when it is installed in the user's computer it changes several files and hides | |
| secret programs that later destroy data on the computer disk. | |
| Paul Holbrook, a spokesman for the Computer Emergency Response Team, a U.S. | |
| government-financed security organization in Pittsburgh, said his group had | |
| confirmed the existence of the program, but did not know how widely it had | |
| spread. | |
| Trojan horses are programs hidden in software that secretly insert themselves | |
| in a computer when the software masking them is activated. They are different | |
| from other secret programs like viruses and worms because they are not | |
| infectious: They do not automatically copy themselves. | |
| A licensing agreement that accompanies the disk contains threatening | |
| information. | |
| It reads in part: "In case of your breach of this license, PC Cyborg reserves | |
| the right to take any legal action necessary to recover any outstanding debts | |
| payable to the PC Cyborg Corporation and to use program mechanisms to ensure | |
| termination of your use of these programs. The mechanisms will adversely | |
| affect other programs on your microcomputer." | |
| When it destroys data, the program places a message on the screen that asks | |
| users to send $387 to a Panama City address. | |
| John McAfee, a computer security consultant in Santa Clara, California, said | |
| the program had been mailed to people in England, West Germany, France and | |
| Italy. | |
| _______________________________________________________________________________ | |
| The Executive Computer: From Espionage To Using A Printer October 27, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Peter H. Lewis (New York Times) | |
| Those executives who pay attention to computers are more likely to worry about | |
| grand issues like productivity and small ones like how to make their personal | |
| printers handle envelopes than whether the KGB has penetrated their companies. | |
| In a fresh crop of books, they will find lessons on all these matters. | |
| Perhaps the most entertaining of the new books is "The Cuckoo's Egg" ($19.95, | |
| Doubleday), by Dr. Clifford Stoll, an astronomer. | |
| Because he was the rookie in the Lawrence Berkeley Laboratories in California, | |
| he was asked to track down and fix a glitch in the lab's accounting software, | |
| which had found a 75-cent discrepancy when it tried to balance the books. | |
| "First-degree robbery, huh?" was Stoll's first reaction. But by the time he | |
| was done nearly a year later, he had uncovered a West German spy ring that had | |
| cracked the security of American military and research computer networks, | |
| gathering information that it sold to Moscow. | |
| Beyond the entertainment value of this cat-and-mouse hunt, the book has lessons | |
| for any corporate computer user. The message is clear: Most companies are | |
| irresponsible about security. | |
| The ease with which the "hacker" penetrated even military installations was | |
| astonishing, but not as astonishing as the lack of concern by many of the | |
| victims. | |
| "The Cuckoo's Egg" follows the hunt for the unknown intruder, who steals | |
| without taking and threatens lives without touching, using only a computer | |
| keyboard and the telephone system. | |
| The detective is an eccentric who sleeps under his desk, prefers bicycles to | |
| cars, and suddenly finds himself working with the Federal Bureau of | |
| Investigation, the Central Intelligence Agency and the National Security | |
| Agency. | |
| Although the criminal and the hunter deal in the esoteric realm of computer | |
| code and data encryption, Stoll makes the technology accessible. | |
| He also discovers that navigating the global electronic grid is less difficult | |
| than navigating the bureaucracies of various government agencies. | |
| And while he was a whiz at tracing the cuckoo's electronic tracks from Berkeley | |
| to Okinawa to Hannover, West Germany, Stoll reveals himself to be helplessly | |
| lost on streets and highways and befuddled by such appliances as a microwave | |
| oven. | |
| Besides the more than 30 academic, military and private government | |
| installations that were easy prey for the spies, the victims included Unisys, | |
| TRW, SRI International, the Mitre Corporation and Bolt Beranek & Newman Inc. -- | |
| some of the very companies that design, build and test computer systems for the | |
| government. | |
| "No doubt about it, the shoemaker's kids are running around barefoot," Stoll | |
| writes. | |
| One leading character in the book is Dr. Bob Morris, chief scientist for the | |
| National Security Agency and the inventor of the security for the Unix | |
| operating system. | |
| An epilogue to the book, dealing with an unrelated computer crime, recounts the | |
| discovery that it was Morris's son who wrote the rogue program that shut down a | |
| national network for several days last year. | |
| In "The Macintosh Way" ($19.95, Scott, Foresman & Co.), Guy Kawasaki, a former | |
| Apple Computer Inc. executive who is now president of a software company, has | |
| written a candid guide about management at high-technology companies. | |
| Although his book is intended for those who make and market computer goods, it | |
| could prove helpful to anyone who manages a business. | |
| _______________________________________________________________________________ | |
| Dialing Away U.S. Area Codes November 13, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Laure O'Brien (Telephony Magazine) | |
| The current endangered species in the news may not be an animal at all. The | |
| number of available area codes in the United States is dwindling rapidly. | |
| Chicago consumed a new code on November 11, 1989 and and New Jersey will gobble | |
| up another one on January 1, 1990. | |
| There are only nine codes left, and they are expected to be used up by 1995, | |
| said Robert McAlesse, North American Numbering Plan administrator and member of | |
| Bellcore's technical staff. | |
| "In 1947 (Bellcore) started with 86 codes, and they projected exhaustion in 100 | |
| to 150 years. They were off by a few years," McAlesse said. | |
| When the 152 available codes are exhausted, Bellcore will use a new plan for | |
| creating area codes. | |
| A total of 138 codes already are assigned. Five of the remaining 14 codes are | |
| reserved for service access codes, and 9 are for geographic area codes. | |
| Under the current plan, a 0 or a 1 is used as the second digit while the first | |
| and last digits can range between 2 and 9. Under the new plan the first digit | |
| will be between 2 and 9 and the following two digits will be numbers between 0 | |
| and 9, McAlesse said. | |
| The new plan will create 640 potential area codes, he said. Bellcore isn't | |
| predicting when the newly created codes will run out. | |
| "The growth in new services and increase in the number of telephones are | |
| exhausting the codes. The biggest increases are cellular telephones, pagers, | |
| facsimile machines and new services that can have more than one number," | |
| McAlesse said. | |
| The current unassigned codes include 210, 310, 410, 706, 810, 905, 909, 910 and | |
| 917. The Chicago area took the 708 code, and New Jersey will take 908. | |
| In the Chicago metropolitan area, the suburbs were switched from the 312 area | |
| code to the new 708 code. Residents and businesses within the city limits | |
| retained the 312 code. | |
| Illinois Bell started preparing for the change two years ago with the | |
| announcements alerting business customers to change stationary and business | |
| cards, said Gloria Pope, an Illinois Bell spokeswoman. Now the telco is | |
| targeting the residential market with billboard reminders and billing inserts. | |
| The cost of technically preparing for the new code, including labor, is | |
| expected to reach $15 million. But Pope said that does not include mailings, | |
| public relations efforts and business packages designed to smooth out the | |
| transition. The telco will absorb the cost with budgeted funds, and no rate | |
| increase is expected, she said. | |
| Modifying the network to recognize the new code started about six months ago | |
| with translation work. Every central office in the Chicago Metropolitan area | |
| was adapted with a new foreign-area translator to accept the new code and route | |
| the calls correctly, said Audrey Brooks, area manager-Chicago translations. | |
| The long distance carriers were ready for the code's debut. AT&T, US Sprint | |
| and MCI changed their computer systems to recognize the new code before the | |
| Chicago deadline. | |
| "We are anticipating a pretty smooth transfer," said Karen Rayl, U.S. Sprint | |
| spokeswoman. | |
| Businesses will need to adjust their PBX software, according to AT&T technical | |
| specialist Craig Hoopman. "This could affect virtually every nationwide PBX," | |
| he said. Modern PBX's will take about 15 minutes to adjust while older | |
| switches could take four hours. In many cases, customers can make the changes | |
| themselves, he said. | |
| _______________________________________________________________________________ | |
| A New Coating Thwarts Chip Pirates November 7, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by John Markoff (New York Times) | |
| Several years ago, clever high-technology pirates removed a chip from a | |
| satellite-television descrambling device made by General Instrument | |
| Corporation, electronically siphoned out hidden decryption software and studied | |
| it to figure out a way to receive clear TV signals. | |
| When the company later tried to protect the chips by coating them with epoxy, | |
| the pirates simply developed a solvent to remove the protective seal, and stole | |
| the software again. | |
| Now government researchers at Lawrence Livermore National Laboratory, a weapons | |
| and energy research center in Livermore, California, have developed a special | |
| coating that protects the chip from attempts to pry out either the chip design | |
| or the information it contains. In the semiconductor industry, a competitor's | |
| chip design can be copied through a process called reverse engineering, which | |
| might include determining the design through an electron microscope or by | |
| dissolving successive layers of the chip with a solvent. | |
| Already a number of government military and intelligence agencies are using the | |
| coating to protect circuits containing secure information. The government has | |
| qualified 13 U.S. chip makers to apply the coating to chips used by certain | |
| government agencies. | |
| The Lawrence Livermore research, known as the Connoisseur Project, has | |
| developed a resin about the consistency of peanut butter that is injected into | |
| the cavity surrounding the chip after it has been manufactured. The coating is | |
| heated and cured; The chip is then sealed with a protective lid. | |
| The special protective resin is opaque and resists solvents, heat, grinding and | |
| other techniques that have been developed for reverse engineering. | |
| A second-generation coating is being developed that will automatically destroy | |
| the chip when an attempt is made chemically to break through the protective | |
| layer. | |
| Another project at the laboratory is exploring even more advanced protection | |
| methods that will insert ultra-thin screens between the layers of a chip, | |
| making it harder to be penetrated. | |
| ______________________________________________________________________________ | |
| U.S. Firm Gets Hungarian Telephone Contract December 5, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Taken from the St. Louis Post-Dispatch (via New York Times News Service) | |
| U.S. West Inc., one of the seven regional Bell telephone companies, announced | |
| that it had signed an agreement with Hungary to build a mobile cellular | |
| telephone system in Budapest. | |
| The Hungarian cellular system will be the first such telephone network in | |
| Eastern Europe. | |
| Because of the shortage of telephones in their country, Hungarians are expected | |
| to use cellular telephones for basic home service, as well as mobile | |
| communications. | |
| For Hungary and the other Eastern European countries that have antiquated | |
| telephone systems, it will be faster and cheaper for the Government to deliver | |
| telephone service by cellular networks than it would be to rebuild the nation's | |
| entire telephone apparatus. | |
| A cellular telephone network transmits calls on radio waves to small receiving | |
| antennas, called "cell" sites, that relay calls to local phone systems. The | |
| system to be built in Hungary will transmit calls from cellular phone to | |
| cellular phone and through the existing land-based telephone network. | |
| The system, which is scheduled to begin operation in the first quarter of 1991, | |
| will initially provide cellular communications to Budapest's 2.1 million | |
| residents. Eventually, the system will serve all of Hungary, a nation of 10.6 | |
| million. | |
| Hungary has 6.8 telephone lines for every 100 people, according to The World's | |
| Telephones, a statistical compilation produced by AT&T. By comparison, the US | |
| has 48.1 lines for every 100 people. | |
| _____________________________________________________________________________ | |
| 1. Phone Fun (November/December) -- Some students at Columbia University in | |
| New York City have added a twist to that ancient annoyance, the chain | |
| letter. The students have taken advantage of the school's newly installed, | |
| $15 million IBM/Rolm phone system's ability not only to store messages like | |
| an answering machine, but also to take and receive messages and send them | |
| -- with comments -- to a third party. | |
| Last spring, brothers Anil and Ajay Dubey, both seniors, recorded a parody | |
| of rapper Tone Loc's Top 10 single "Funky Cold Medina" and sent it to some | |
| buddies. Their friends then passed the recording along with comments, to | |
| some other pals, who passed it on to other friends... and so on, and so | |
| on, and so on. Eventually, the message ran more than ten minutes and | |
| proved so popular that the phone mail system became overloaded and was | |
| forced to shut down. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 2. Get a "Sprint" VISA Card Today (November 14, 1989) -- U.S. Sprint will | |
| begin mailing in December, a a Sprint VISA card, which will combine the | |
| functionality of a long distance calling card, a credit card and an ATM | |
| card. Sprint will market the card which will be issued by State Street | |
| Bank and Trust, in Boston. | |
| Business travelers will receive a single bill that list all their travel | |
| related expenses: Hotel, meals and phone calls. While payment for the | |
| phone charges will be done through the regular Visa bill, call detail | |
| reports will appear on Sprint's standard FONcard bill. Taken from | |
| Communications Week. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 3. The Harpers Forum -- Harpers Magazine came up with an idea for how to | |
| gather information about the phreak/hack modem community. They set up shop | |
| on The Well (a public access Unix and bulletin board) and invited any and | |
| all hackers to join in their multiple discussion subboards. | |
| The hackers involved were Acid Phreak, Bernie S., Cap'n Crunch, Cheshire | |
| Catalyst, Emmanuel Goldstein, Knight Lightning, Michael Synergy (of Reality | |
| Hackers Magazine), Phiber Optik, Piper, Sir Francis Drake, Taran King, and | |
| many old TAP subscribers. | |
| The Well is accessible through CompuServe's data network. All charges for | |
| using The Well by hackers were absorbed by Harpers. | |
| There were many people on The Well posing as hackers to try and add to the | |
| discussion, but it turns out that some of them like Adel Aide, were shoe | |
| salesmen. There were also a few security types, including Clifford Stoll | |
| (author of The Cuckoo's Egg), and a reporter or two like Katie Hafner (who | |
| writes a lot for Business Week). | |
| The contents of the discussion and all related materials will be used in an | |
| article in an upcoming issue of Harpers Magazine. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 4. Phrozen Ghost has supposedly been arrested for crimes relating to hacking, | |
| telecommunications fraud, and drugs. No other details are known at this | |
| time. Information sent to PWN by Captain Crook. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 5. SurveillanceCon '89 -- Tuc, Susan Thunder, and Prime Suspect all attended a | |
| Security/Surveillance Convention in Washington DC recently at which both | |
| Tuc and Susan Thunder gave presentations about computer security. Tuc's | |
| presentation dealt largely with bulletin boards like Ripco in Chicago and | |
| newsletters like Phrack Inc. Audio cassettes from all the speakers at this | |
| convention are available for $9.00 each, however we at PWN have no | |
| information about who to contact to purchase these recordings. | |
| _______________________________________________________________________________ | |