home *** CD-ROM | disk | FTP | other *** search
- ==Phrack Inc.==
-
- Volume Three, Issue 30, File #12 of 12
-
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
- PWN PWN
- PWN P h r a c k W o r l d N e w s PWN
- PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN
- PWN Issue XXX/Part 2 PWN
- PWN PWN
- PWN Created, Written, and Edited PWN
- PWN by Knight Lightning PWN
- PWN PWN
- PWN Special Thanks to Dark OverLord PWN
- PWN PWN
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
-
-
- U.S. Inquiry Into Theft From Apple November 19, 1989
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by John Markoff (New York Times)
-
- A former Apple Computer Inc. engineer has said he was served with a grand jury
- subpeona and told by an FBI agent that he is a suspect in a theft of software
- used by the company to design its Macintosh computer.
-
- In June a group identifying itself as the Nu Prometheus League mailed copies of
- computer disks containing the software to several trade magazines and software
- developers.
-
- Grady Ward, age 38, who worked for Apple until January (1989), said that he
- received the subpeona from an FBI agent, who identified himself as Steven E.
- Cook.
-
- Ward said the agent told him that he was one of five suspects drawn from a
- computerized list of people who had access to the material. The agent said the
- five were considered the most likely to have taken the software.
-
- A spokesman for the FBI in San Francisco said the agency would not comment on a
- continuing investigation.
-
- Ward said he had told the FBI he was innocent but would cooperate with the
- investigation.
-
- The theft of Apple's software has drawn a great deal of attention in Silicon
- Valley, where technology and trade-secret cases have highlighted the crucial
- role of skilled technical workers and the degree to which corporations depend
- on their talents.
-
- The case is unusual because the theft was apparently undertaken for
- philosophical reasons and not for personal profit.
-
- There is no indication of how many copies of the program were sent by Nu
- Prometheus.
-
- Software experts have said the programs would be useful to a company trying to
- copy the distinctive appearance of the Macintosh display, but it would not
- solve legal problems inherent in attempting to sell such a computer. Apple has
- successfully prevented many imitators from selling copies of its Apple II and
- Macintosh computers.
-
- The disks were accompanied by a letter that said in part: "Our objective at
- Apple is to distribute everything that prevents other manufacturers from
- creating legal copies of the Macintosh. As an organization, the Nu Prometheus
- League has no ambition beyond seeing the genius of a few Apple employees
- benefit the entire world."
-
- The group said it had taken its name from the Greek god who stole fire from the
- gods and gave it to man.
-
- The letter said the action was partially in response to Apple's pending suit
- against Microsoft Corp. and Hewlett-Packard Co., accusing them of copying the
- "look and feel" -- the screen appearance -- of the Macintosh.
-
- Many technology experts in Silicon Valley believe Apple does not have special
- rights to its Macintosh technology because most of the features of the computer
- are copied from research originally done at Xerox Corp.'s Palo Alto Research
- Center during the 1970s. The Macintosh was not introduced until 1984.
-
- The theft came to light in June after Macweek, a trade magazine, published the
- letter from Nu Prometheus.
-
- At the time the theft was reported, executives at Apple, based in Cupertino,
- California, said they took the incident seriously.
-
- A spokeswoman said that Apple would not comment on details of the
- investigation.
-
- Ward said he had been told by the FBI agent that the agency believed Toshiba
- Corp. had obtained a copy of the software and that copies of the program had
- reached the Soviet Union.
-
- The software is not restricted from export to the Communist bloc. Its main
- value is commercial as an aid in copying Apple's technology.
-
- Ward said the FBI agent would not tell him how it believed Toshiba had obtained
- a copy of the software.
-
- Ward also said the FBI agent told him that a computer programmer had taken a
- copy of the software to the Soviet Union.
-
- Ward said the FBI agent told him he was considered a suspect because he was a
- "computer hacker," had gone to a liberal college and had studied briefly at the
- Massachusetts Institute of Technology's Artificial Intelligence Laboratory.
-
- The term "hacker" was first used at MIT to describe young programmers and
- hardware designers who mastered the first interactive computers in the 1960s.
-
- Ward is the second person to be interviewed by the FBI in the investigation of
- the theft.
-
- Earlier Charles Farnham, a businessman in San Jose, California, said two FBI
- agents came to his office, but identified themselves as reporters for United
- Press International.
-
- Farnham, a Macintosh enthusiast, has disclosed information about unannounced
- Apple products, said that after asking him to come outside his office, the men
- said they were FBI agents and proceeded to question him about Nu Prometheus
- group. He said he was not told that he was a suspect in the case.
-
- UPI has complained to the FBI because of the incident.
-
- Ward said he had joined Apple in 1979 and left last January to start his own
- company, Illumind. He sells computerized dictionaries used as spelling
- checkers and pronunciation guides.
-
- He said the FBI told him that one person who had been mailed a copy of the
- Apple software was Mitchell Kapor, founder of Lotus Development Corporation.
-
- Kapor returned his copy of the disk unopened, Ward said the agent told him.
-
- Ward said the FBI had also said he was suspect because he had founded a group
- for the gifted known as Cincinnatus, which the agent said had roots in Greek
- mythology that were similar to the Nu Prometheus group.
-
- Ward said the FBI was mistaken, and Cincinnatus is a reference from ancient
- Roman history, not Greek mythology.
- _______________________________________________________________________________
-
- Data-Destroying Disc Sent To European Computer Users December 13, 1989
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by John Markoff (New York Times)
-
- A computer disk containing a destructive program known as a Trojan horse has
- been mailed to computer users in at least four European countries.
-
- It was not clear if any copies of the program had been mailed to people in the
- United States.
-
- The program, which threatens to destroy data unless a user pays a license fee
- to a fictitious company in Panama City, Panama, may be a widespread attempt to
- vandalize thousands of personal computers, several computer experts who have
- studied the program said Tuesday, December 12.
-
- Some computer experts said the disk was mailed by a "PC Cyborg" company to
- subscribers of personal computer trade magazines, apparently using mailing
- lists.
-
- The disk is professionally packaged and accompanied by a brochure that
- describes it as an "Aids Information Disk," the computer experts said. But
- when it is installed in the user's computer it changes several files and hides
- secret programs that later destroy data on the computer disk.
-
- Paul Holbrook, a spokesman for the Computer Emergency Response Team, a U.S.
- government-financed security organization in Pittsburgh, said his group had
- confirmed the existence of the program, but did not know how widely it had
- spread.
-
- Trojan horses are programs hidden in software that secretly insert themselves
- in a computer when the software masking them is activated. They are different
- from other secret programs like viruses and worms because they are not
- infectious: They do not automatically copy themselves.
-
- A licensing agreement that accompanies the disk contains threatening
- information.
-
- It reads in part: "In case of your breach of this license, PC Cyborg reserves
- the right to take any legal action necessary to recover any outstanding debts
- payable to the PC Cyborg Corporation and to use program mechanisms to ensure
- termination of your use of these programs. The mechanisms will adversely
- affect other programs on your microcomputer."
-
- When it destroys data, the program places a message on the screen that asks
- users to send $387 to a Panama City address.
-
- John McAfee, a computer security consultant in Santa Clara, California, said
- the program had been mailed to people in England, West Germany, France and
- Italy.
- _______________________________________________________________________________
-
- The Executive Computer: From Espionage To Using A Printer October 27, 1989
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Peter H. Lewis (New York Times)
-
- Those executives who pay attention to computers are more likely to worry about
- grand issues like productivity and small ones like how to make their personal
- printers handle envelopes than whether the KGB has penetrated their companies.
- In a fresh crop of books, they will find lessons on all these matters.
-
- Perhaps the most entertaining of the new books is "The Cuckoo's Egg" ($19.95,
- Doubleday), by Dr. Clifford Stoll, an astronomer.
-
- Because he was the rookie in the Lawrence Berkeley Laboratories in California,
- he was asked to track down and fix a glitch in the lab's accounting software,
- which had found a 75-cent discrepancy when it tried to balance the books.
-
- "First-degree robbery, huh?" was Stoll's first reaction. But by the time he
- was done nearly a year later, he had uncovered a West German spy ring that had
- cracked the security of American military and research computer networks,
- gathering information that it sold to Moscow.
-
- Beyond the entertainment value of this cat-and-mouse hunt, the book has lessons
- for any corporate computer user. The message is clear: Most companies are
- irresponsible about security.
-
- The ease with which the "hacker" penetrated even military installations was
- astonishing, but not as astonishing as the lack of concern by many of the
- victims.
-
- "The Cuckoo's Egg" follows the hunt for the unknown intruder, who steals
- without taking and threatens lives without touching, using only a computer
- keyboard and the telephone system.
-
- The detective is an eccentric who sleeps under his desk, prefers bicycles to
- cars, and suddenly finds himself working with the Federal Bureau of
- Investigation, the Central Intelligence Agency and the National Security
- Agency.
-
- Although the criminal and the hunter deal in the esoteric realm of computer
- code and data encryption, Stoll makes the technology accessible.
-
- He also discovers that navigating the global electronic grid is less difficult
- than navigating the bureaucracies of various government agencies.
-
- And while he was a whiz at tracing the cuckoo's electronic tracks from Berkeley
- to Okinawa to Hannover, West Germany, Stoll reveals himself to be helplessly
- lost on streets and highways and befuddled by such appliances as a microwave
- oven.
-
- Besides the more than 30 academic, military and private government
- installations that were easy prey for the spies, the victims included Unisys,
- TRW, SRI International, the Mitre Corporation and Bolt Beranek & Newman Inc. --
- some of the very companies that design, build and test computer systems for the
- government.
-
- "No doubt about it, the shoemaker's kids are running around barefoot," Stoll
- writes.
-
- One leading character in the book is Dr. Bob Morris, chief scientist for the
- National Security Agency and the inventor of the security for the Unix
- operating system.
-
- An epilogue to the book, dealing with an unrelated computer crime, recounts the
- discovery that it was Morris's son who wrote the rogue program that shut down a
- national network for several days last year.
-
- In "The Macintosh Way" ($19.95, Scott, Foresman & Co.), Guy Kawasaki, a former
- Apple Computer Inc. executive who is now president of a software company, has
- written a candid guide about management at high-technology companies.
-
- Although his book is intended for those who make and market computer goods, it
- could prove helpful to anyone who manages a business.
- _______________________________________________________________________________
-
- Dialing Away U.S. Area Codes November 13, 1989
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Laure O'Brien (Telephony Magazine)
-
- The current endangered species in the news may not be an animal at all. The
- number of available area codes in the United States is dwindling rapidly.
- Chicago consumed a new code on November 11, 1989 and and New Jersey will gobble
- up another one on January 1, 1990.
-
- There are only nine codes left, and they are expected to be used up by 1995,
- said Robert McAlesse, North American Numbering Plan administrator and member of
- Bellcore's technical staff.
-
- "In 1947 (Bellcore) started with 86 codes, and they projected exhaustion in 100
- to 150 years. They were off by a few years," McAlesse said.
-
- When the 152 available codes are exhausted, Bellcore will use a new plan for
- creating area codes.
-
- A total of 138 codes already are assigned. Five of the remaining 14 codes are
- reserved for service access codes, and 9 are for geographic area codes.
-
- Under the current plan, a 0 or a 1 is used as the second digit while the first
- and last digits can range between 2 and 9. Under the new plan the first digit
- will be between 2 and 9 and the following two digits will be numbers between 0
- and 9, McAlesse said.
-
- The new plan will create 640 potential area codes, he said. Bellcore isn't
- predicting when the newly created codes will run out.
-
- "The growth in new services and increase in the number of telephones are
- exhausting the codes. The biggest increases are cellular telephones, pagers,
- facsimile machines and new services that can have more than one number,"
- McAlesse said.
-
- The current unassigned codes include 210, 310, 410, 706, 810, 905, 909, 910 and
- 917. The Chicago area took the 708 code, and New Jersey will take 908.
-
- In the Chicago metropolitan area, the suburbs were switched from the 312 area
- code to the new 708 code. Residents and businesses within the city limits
- retained the 312 code.
-
- Illinois Bell started preparing for the change two years ago with the
- announcements alerting business customers to change stationary and business
- cards, said Gloria Pope, an Illinois Bell spokeswoman. Now the telco is
- targeting the residential market with billboard reminders and billing inserts.
-
- The cost of technically preparing for the new code, including labor, is
- expected to reach $15 million. But Pope said that does not include mailings,
- public relations efforts and business packages designed to smooth out the
- transition. The telco will absorb the cost with budgeted funds, and no rate
- increase is expected, she said.
-
- Modifying the network to recognize the new code started about six months ago
- with translation work. Every central office in the Chicago Metropolitan area
- was adapted with a new foreign-area translator to accept the new code and route
- the calls correctly, said Audrey Brooks, area manager-Chicago translations.
-
- The long distance carriers were ready for the code's debut. AT&T, US Sprint
- and MCI changed their computer systems to recognize the new code before the
- Chicago deadline.
-
- "We are anticipating a pretty smooth transfer," said Karen Rayl, U.S. Sprint
- spokeswoman.
-
- Businesses will need to adjust their PBX software, according to AT&T technical
- specialist Craig Hoopman. "This could affect virtually every nationwide PBX,"
- he said. Modern PBX's will take about 15 minutes to adjust while older
- switches could take four hours. In many cases, customers can make the changes
- themselves, he said.
- _______________________________________________________________________________
-
- A New Coating Thwarts Chip Pirates November 7, 1989
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by John Markoff (New York Times)
-
- Several years ago, clever high-technology pirates removed a chip from a
- satellite-television descrambling device made by General Instrument
- Corporation, electronically siphoned out hidden decryption software and studied
- it to figure out a way to receive clear TV signals.
-
- When the company later tried to protect the chips by coating them with epoxy,
- the pirates simply developed a solvent to remove the protective seal, and stole
- the software again.
-
- Now government researchers at Lawrence Livermore National Laboratory, a weapons
- and energy research center in Livermore, California, have developed a special
- coating that protects the chip from attempts to pry out either the chip design
- or the information it contains. In the semiconductor industry, a competitor's
- chip design can be copied through a process called reverse engineering, which
- might include determining the design through an electron microscope or by
- dissolving successive layers of the chip with a solvent.
-
- Already a number of government military and intelligence agencies are using the
- coating to protect circuits containing secure information. The government has
- qualified 13 U.S. chip makers to apply the coating to chips used by certain
- government agencies.
-
- The Lawrence Livermore research, known as the Connoisseur Project, has
- developed a resin about the consistency of peanut butter that is injected into
- the cavity surrounding the chip after it has been manufactured. The coating is
- heated and cured; The chip is then sealed with a protective lid.
-
- The special protective resin is opaque and resists solvents, heat, grinding and
- other techniques that have been developed for reverse engineering.
-
- A second-generation coating is being developed that will automatically destroy
- the chip when an attempt is made chemically to break through the protective
- layer.
-
- Another project at the laboratory is exploring even more advanced protection
- methods that will insert ultra-thin screens between the layers of a chip,
- making it harder to be penetrated.
- ______________________________________________________________________________
-
- U.S. Firm Gets Hungarian Telephone Contract December 5, 1989
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Taken from the St. Louis
- Post-Dispatch (via New York Times News Service)
-
- U.S. West Inc., one of the seven regional Bell telephone companies, announced
- that it had signed an agreement with Hungary to build a mobile cellular
- telephone system in Budapest.
-
- The Hungarian cellular system will be the first such telephone network in
- Eastern Europe.
-
- Because of the shortage of telephones in their country, Hungarians are expected
- to use cellular telephones for basic home service, as well as mobile
- communications.
-
- For Hungary and the other Eastern European countries that have antiquated
- telephone systems, it will be faster and cheaper for the Government to deliver
- telephone service by cellular networks than it would be to rebuild the nation's
- entire telephone apparatus.
-
- A cellular telephone network transmits calls on radio waves to small receiving
- antennas, called "cell" sites, that relay calls to local phone systems. The
- system to be built in Hungary will transmit calls from cellular phone to
- cellular phone and through the existing land-based telephone network.
-
- The system, which is scheduled to begin operation in the first quarter of 1991,
- will initially provide cellular communications to Budapest's 2.1 million
- residents. Eventually, the system will serve all of Hungary, a nation of 10.6
- million.
-
- Hungary has 6.8 telephone lines for every 100 people, according to The World's
- Telephones, a statistical compilation produced by AT&T. By comparison, the US
- has 48.1 lines for every 100 people.
- _____________________________________________________________________________
-
- 1. Phone Fun (November/December) -- Some students at Columbia University
- in New York City have added a twist to that ancient annoyance, the
- chain letter. The students have taken advantage of the school's newly
- installed, $15 million IBM/Rolm phone system's ability not only to store
- messages like an answering machine, but also to take and receive messages
- and send them -- with comments -- to a third party.
-
- Last spring, brothers Anil and Ajay Dubey, both seniors, recorded a parody
- of rapper Tone Loc's Top 10 single "Funky Cold Medina" and sent it to some
- buddies. Their friends then passed the recording along with comments, to
- some other pals, who passed it on to other friends... and so on, and so
- on, and so on. Eventually, the message ran more than ten minutes and
- proved so popular that the phone mail system became overloaded and was
- forced to shut down.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- 2. Get a "Sprint" VISA Card Today (November 14, 1989) -- U.S. Sprint will
- begin mailing in December, a a Sprint VISA card, which will combine the
- functionality of a long distance calling card, a credit card and an ATM
- card. Sprint will market the card which will be issued by State Street
- Bank and Trust, in Boston.
-
- Business travelers will receive a single bill that list all their travel
- related expenses: Hotel, meals and phone calls. While payment for the
- phone charges will be done through the regular Visa bill, call detail
- reports will appear on Sprint's standard FONcard bill. Taken from
- Communications Week.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- 3. The Harpers Forum -- Harpers Magazine came up with an idea for how to
- gather information about the phreak/hack modem community. They set up shop
- on The Well (a public access Unix and bulletin board) and invited any and
- all hackers to join in their multiple discussion subboards.
-
- The hackers involved were Acid Phreak, Bernie S., Cap'n Crunch, Cheshire
- Catalyst, Emmanuel Goldstein, Knight Lightning, Michael Synergy (of Reality
- Hackers Magazine), Phiber Optik, Piper, Sir Francis Drake, Taran King, and
- many old TAP subscribers.
-
- The Well is accessible through CompuServe's data network. All charges for
- using The Well by hackers were absorbed by Harpers.
-
- There were many people on The Well posing as hackers to try and add to the
- discussion, but it turns out that some of them like Adel Aide, were shoe
- salesmen. There were also a few security types, including Clifford Stoll
- (author of The Cuckoo's Egg), and a reporter or two like Katie Hafner (who
- writes a lot for Business Week).
-
- The contents of the discussion and all related materials will be used in an
- article in an upcoming issue of Harpers Magazine.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- 4. Phrozen Ghost has supposedly been arrested for crimes relating to hacking,
- telecommunications fraud, and drugs. No other details are known at this
- time. Information sent to PWN by Captain Crook.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- 5. SurveillanceCon '89 -- Tuc, Susan Thunder, and Prime Suspect all attended a
- Security/Surveillance Convention in Washington DC recently at which both
- Tuc and Susan Thunder gave presentations about computer security. Tuc's
- presentation dealt largely with bulletin boards like Ripco in Chicago and
- newsletters like Phrack Inc. Audio cassettes from all the speakers at this
- convention are available for $9.00 each, however we at PWN have no
- information about who to contact to purchase these recordings.
- _______________________________________________________________________________
-