mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
476 lines
24 KiB
Text
476 lines
24 KiB
Text
==Phrack Inc.==
|
|
|
|
Volume Three, Issue 30, File #12 of 12
|
|
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
PWN PWN
|
|
PWN P h r a c k W o r l d N e w s PWN
|
|
PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN
|
|
PWN Issue XXX/Part 2 PWN
|
|
PWN PWN
|
|
PWN Created, Written, and Edited PWN
|
|
PWN by Knight Lightning PWN
|
|
PWN PWN
|
|
PWN Special Thanks to Dark OverLord PWN
|
|
PWN PWN
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
|
|
|
|
U.S. Inquiry Into Theft From Apple November 19, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by John Markoff (New York Times)
|
|
|
|
A former Apple Computer Inc. engineer has said he was served with a grand jury
|
|
subpeona and told by an FBI agent that he is a suspect in a theft of software
|
|
used by the company to design its Macintosh computer.
|
|
|
|
In June a group identifying itself as the Nu Prometheus League mailed copies of
|
|
computer disks containing the software to several trade magazines and software
|
|
developers.
|
|
|
|
Grady Ward, age 38, who worked for Apple until January (1989), said that he
|
|
received the subpeona from an FBI agent, who identified himself as Steven E.
|
|
Cook.
|
|
|
|
Ward said the agent told him that he was one of five suspects drawn from a
|
|
computerized list of people who had access to the material. The agent said the
|
|
five were considered the most likely to have taken the software.
|
|
|
|
A spokesman for the FBI in San Francisco said the agency would not comment on a
|
|
continuing investigation.
|
|
|
|
Ward said he had told the FBI he was innocent but would cooperate with the
|
|
investigation.
|
|
|
|
The theft of Apple's software has drawn a great deal of attention in Silicon
|
|
Valley, where technology and trade-secret cases have highlighted the crucial
|
|
role of skilled technical workers and the degree to which corporations depend
|
|
on their talents.
|
|
|
|
The case is unusual because the theft was apparently undertaken for
|
|
philosophical reasons and not for personal profit.
|
|
|
|
There is no indication of how many copies of the program were sent by Nu
|
|
Prometheus.
|
|
|
|
Software experts have said the programs would be useful to a company trying to
|
|
copy the distinctive appearance of the Macintosh display, but it would not
|
|
solve legal problems inherent in attempting to sell such a computer. Apple has
|
|
successfully prevented many imitators from selling copies of its Apple II and
|
|
Macintosh computers.
|
|
|
|
The disks were accompanied by a letter that said in part: "Our objective at
|
|
Apple is to distribute everything that prevents other manufacturers from
|
|
creating legal copies of the Macintosh. As an organization, the Nu Prometheus
|
|
League has no ambition beyond seeing the genius of a few Apple employees
|
|
benefit the entire world."
|
|
|
|
The group said it had taken its name from the Greek god who stole fire from the
|
|
gods and gave it to man.
|
|
|
|
The letter said the action was partially in response to Apple's pending suit
|
|
against Microsoft Corp. and Hewlett-Packard Co., accusing them of copying the
|
|
"look and feel" -- the screen appearance -- of the Macintosh.
|
|
|
|
Many technology experts in Silicon Valley believe Apple does not have special
|
|
rights to its Macintosh technology because most of the features of the computer
|
|
are copied from research originally done at Xerox Corp.'s Palo Alto Research
|
|
Center during the 1970s. The Macintosh was not introduced until 1984.
|
|
|
|
The theft came to light in June after Macweek, a trade magazine, published the
|
|
letter from Nu Prometheus.
|
|
|
|
At the time the theft was reported, executives at Apple, based in Cupertino,
|
|
California, said they took the incident seriously.
|
|
|
|
A spokeswoman said that Apple would not comment on details of the
|
|
investigation.
|
|
|
|
Ward said he had been told by the FBI agent that the agency believed Toshiba
|
|
Corp. had obtained a copy of the software and that copies of the program had
|
|
reached the Soviet Union.
|
|
|
|
The software is not restricted from export to the Communist bloc. Its main
|
|
value is commercial as an aid in copying Apple's technology.
|
|
|
|
Ward said the FBI agent would not tell him how it believed Toshiba had obtained
|
|
a copy of the software.
|
|
|
|
Ward also said the FBI agent told him that a computer programmer had taken a
|
|
copy of the software to the Soviet Union.
|
|
|
|
Ward said the FBI agent told him he was considered a suspect because he was a
|
|
"computer hacker," had gone to a liberal college and had studied briefly at the
|
|
Massachusetts Institute of Technology's Artificial Intelligence Laboratory.
|
|
|
|
The term "hacker" was first used at MIT to describe young programmers and
|
|
hardware designers who mastered the first interactive computers in the 1960s.
|
|
|
|
Ward is the second person to be interviewed by the FBI in the investigation of
|
|
the theft.
|
|
|
|
Earlier Charles Farnham, a businessman in San Jose, California, said two FBI
|
|
agents came to his office, but identified themselves as reporters for United
|
|
Press International.
|
|
|
|
Farnham, a Macintosh enthusiast, has disclosed information about unannounced
|
|
Apple products, said that after asking him to come outside his office, the men
|
|
said they were FBI agents and proceeded to question him about Nu Prometheus
|
|
group. He said he was not told that he was a suspect in the case.
|
|
|
|
UPI has complained to the FBI because of the incident.
|
|
|
|
Ward said he had joined Apple in 1979 and left last January to start his own
|
|
company, Illumind. He sells computerized dictionaries used as spelling
|
|
checkers and pronunciation guides.
|
|
|
|
He said the FBI told him that one person who had been mailed a copy of the
|
|
Apple software was Mitchell Kapor, founder of Lotus Development Corporation.
|
|
|
|
Kapor returned his copy of the disk unopened, Ward said the agent told him.
|
|
|
|
Ward said the FBI had also said he was suspect because he had founded a group
|
|
for the gifted known as Cincinnatus, which the agent said had roots in Greek
|
|
mythology that were similar to the Nu Prometheus group.
|
|
|
|
Ward said the FBI was mistaken, and Cincinnatus is a reference from ancient
|
|
Roman history, not Greek mythology.
|
|
_______________________________________________________________________________
|
|
|
|
Data-Destroying Disc Sent To European Computer Users December 13, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by John Markoff (New York Times)
|
|
|
|
A computer disk containing a destructive program known as a Trojan horse has
|
|
been mailed to computer users in at least four European countries.
|
|
|
|
It was not clear if any copies of the program had been mailed to people in the
|
|
United States.
|
|
|
|
The program, which threatens to destroy data unless a user pays a license fee
|
|
to a fictitious company in Panama City, Panama, may be a widespread attempt to
|
|
vandalize thousands of personal computers, several computer experts who have
|
|
studied the program said Tuesday, December 12.
|
|
|
|
Some computer experts said the disk was mailed by a "PC Cyborg" company to
|
|
subscribers of personal computer trade magazines, apparently using mailing
|
|
lists.
|
|
|
|
The disk is professionally packaged and accompanied by a brochure that
|
|
describes it as an "Aids Information Disk," the computer experts said. But
|
|
when it is installed in the user's computer it changes several files and hides
|
|
secret programs that later destroy data on the computer disk.
|
|
|
|
Paul Holbrook, a spokesman for the Computer Emergency Response Team, a U.S.
|
|
government-financed security organization in Pittsburgh, said his group had
|
|
confirmed the existence of the program, but did not know how widely it had
|
|
spread.
|
|
|
|
Trojan horses are programs hidden in software that secretly insert themselves
|
|
in a computer when the software masking them is activated. They are different
|
|
from other secret programs like viruses and worms because they are not
|
|
infectious: They do not automatically copy themselves.
|
|
|
|
A licensing agreement that accompanies the disk contains threatening
|
|
information.
|
|
|
|
It reads in part: "In case of your breach of this license, PC Cyborg reserves
|
|
the right to take any legal action necessary to recover any outstanding debts
|
|
payable to the PC Cyborg Corporation and to use program mechanisms to ensure
|
|
termination of your use of these programs. The mechanisms will adversely
|
|
affect other programs on your microcomputer."
|
|
|
|
When it destroys data, the program places a message on the screen that asks
|
|
users to send $387 to a Panama City address.
|
|
|
|
John McAfee, a computer security consultant in Santa Clara, California, said
|
|
the program had been mailed to people in England, West Germany, France and
|
|
Italy.
|
|
_______________________________________________________________________________
|
|
|
|
The Executive Computer: From Espionage To Using A Printer October 27, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Peter H. Lewis (New York Times)
|
|
|
|
Those executives who pay attention to computers are more likely to worry about
|
|
grand issues like productivity and small ones like how to make their personal
|
|
printers handle envelopes than whether the KGB has penetrated their companies.
|
|
In a fresh crop of books, they will find lessons on all these matters.
|
|
|
|
Perhaps the most entertaining of the new books is "The Cuckoo's Egg" ($19.95,
|
|
Doubleday), by Dr. Clifford Stoll, an astronomer.
|
|
|
|
Because he was the rookie in the Lawrence Berkeley Laboratories in California,
|
|
he was asked to track down and fix a glitch in the lab's accounting software,
|
|
which had found a 75-cent discrepancy when it tried to balance the books.
|
|
|
|
"First-degree robbery, huh?" was Stoll's first reaction. But by the time he
|
|
was done nearly a year later, he had uncovered a West German spy ring that had
|
|
cracked the security of American military and research computer networks,
|
|
gathering information that it sold to Moscow.
|
|
|
|
Beyond the entertainment value of this cat-and-mouse hunt, the book has lessons
|
|
for any corporate computer user. The message is clear: Most companies are
|
|
irresponsible about security.
|
|
|
|
The ease with which the "hacker" penetrated even military installations was
|
|
astonishing, but not as astonishing as the lack of concern by many of the
|
|
victims.
|
|
|
|
"The Cuckoo's Egg" follows the hunt for the unknown intruder, who steals
|
|
without taking and threatens lives without touching, using only a computer
|
|
keyboard and the telephone system.
|
|
|
|
The detective is an eccentric who sleeps under his desk, prefers bicycles to
|
|
cars, and suddenly finds himself working with the Federal Bureau of
|
|
Investigation, the Central Intelligence Agency and the National Security
|
|
Agency.
|
|
|
|
Although the criminal and the hunter deal in the esoteric realm of computer
|
|
code and data encryption, Stoll makes the technology accessible.
|
|
|
|
He also discovers that navigating the global electronic grid is less difficult
|
|
than navigating the bureaucracies of various government agencies.
|
|
|
|
And while he was a whiz at tracing the cuckoo's electronic tracks from Berkeley
|
|
to Okinawa to Hannover, West Germany, Stoll reveals himself to be helplessly
|
|
lost on streets and highways and befuddled by such appliances as a microwave
|
|
oven.
|
|
|
|
Besides the more than 30 academic, military and private government
|
|
installations that were easy prey for the spies, the victims included Unisys,
|
|
TRW, SRI International, the Mitre Corporation and Bolt Beranek & Newman Inc. --
|
|
some of the very companies that design, build and test computer systems for the
|
|
government.
|
|
|
|
"No doubt about it, the shoemaker's kids are running around barefoot," Stoll
|
|
writes.
|
|
|
|
One leading character in the book is Dr. Bob Morris, chief scientist for the
|
|
National Security Agency and the inventor of the security for the Unix
|
|
operating system.
|
|
|
|
An epilogue to the book, dealing with an unrelated computer crime, recounts the
|
|
discovery that it was Morris's son who wrote the rogue program that shut down a
|
|
national network for several days last year.
|
|
|
|
In "The Macintosh Way" ($19.95, Scott, Foresman & Co.), Guy Kawasaki, a former
|
|
Apple Computer Inc. executive who is now president of a software company, has
|
|
written a candid guide about management at high-technology companies.
|
|
|
|
Although his book is intended for those who make and market computer goods, it
|
|
could prove helpful to anyone who manages a business.
|
|
_______________________________________________________________________________
|
|
|
|
Dialing Away U.S. Area Codes November 13, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Laure O'Brien (Telephony Magazine)
|
|
|
|
The current endangered species in the news may not be an animal at all. The
|
|
number of available area codes in the United States is dwindling rapidly.
|
|
Chicago consumed a new code on November 11, 1989 and and New Jersey will gobble
|
|
up another one on January 1, 1990.
|
|
|
|
There are only nine codes left, and they are expected to be used up by 1995,
|
|
said Robert McAlesse, North American Numbering Plan administrator and member of
|
|
Bellcore's technical staff.
|
|
|
|
"In 1947 (Bellcore) started with 86 codes, and they projected exhaustion in 100
|
|
to 150 years. They were off by a few years," McAlesse said.
|
|
|
|
When the 152 available codes are exhausted, Bellcore will use a new plan for
|
|
creating area codes.
|
|
|
|
A total of 138 codes already are assigned. Five of the remaining 14 codes are
|
|
reserved for service access codes, and 9 are for geographic area codes.
|
|
|
|
Under the current plan, a 0 or a 1 is used as the second digit while the first
|
|
and last digits can range between 2 and 9. Under the new plan the first digit
|
|
will be between 2 and 9 and the following two digits will be numbers between 0
|
|
and 9, McAlesse said.
|
|
|
|
The new plan will create 640 potential area codes, he said. Bellcore isn't
|
|
predicting when the newly created codes will run out.
|
|
|
|
"The growth in new services and increase in the number of telephones are
|
|
exhausting the codes. The biggest increases are cellular telephones, pagers,
|
|
facsimile machines and new services that can have more than one number,"
|
|
McAlesse said.
|
|
|
|
The current unassigned codes include 210, 310, 410, 706, 810, 905, 909, 910 and
|
|
917. The Chicago area took the 708 code, and New Jersey will take 908.
|
|
|
|
In the Chicago metropolitan area, the suburbs were switched from the 312 area
|
|
code to the new 708 code. Residents and businesses within the city limits
|
|
retained the 312 code.
|
|
|
|
Illinois Bell started preparing for the change two years ago with the
|
|
announcements alerting business customers to change stationary and business
|
|
cards, said Gloria Pope, an Illinois Bell spokeswoman. Now the telco is
|
|
targeting the residential market with billboard reminders and billing inserts.
|
|
|
|
The cost of technically preparing for the new code, including labor, is
|
|
expected to reach $15 million. But Pope said that does not include mailings,
|
|
public relations efforts and business packages designed to smooth out the
|
|
transition. The telco will absorb the cost with budgeted funds, and no rate
|
|
increase is expected, she said.
|
|
|
|
Modifying the network to recognize the new code started about six months ago
|
|
with translation work. Every central office in the Chicago Metropolitan area
|
|
was adapted with a new foreign-area translator to accept the new code and route
|
|
the calls correctly, said Audrey Brooks, area manager-Chicago translations.
|
|
|
|
The long distance carriers were ready for the code's debut. AT&T, US Sprint
|
|
and MCI changed their computer systems to recognize the new code before the
|
|
Chicago deadline.
|
|
|
|
"We are anticipating a pretty smooth transfer," said Karen Rayl, U.S. Sprint
|
|
spokeswoman.
|
|
|
|
Businesses will need to adjust their PBX software, according to AT&T technical
|
|
specialist Craig Hoopman. "This could affect virtually every nationwide PBX,"
|
|
he said. Modern PBX's will take about 15 minutes to adjust while older
|
|
switches could take four hours. In many cases, customers can make the changes
|
|
themselves, he said.
|
|
_______________________________________________________________________________
|
|
|
|
A New Coating Thwarts Chip Pirates November 7, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by John Markoff (New York Times)
|
|
|
|
Several years ago, clever high-technology pirates removed a chip from a
|
|
satellite-television descrambling device made by General Instrument
|
|
Corporation, electronically siphoned out hidden decryption software and studied
|
|
it to figure out a way to receive clear TV signals.
|
|
|
|
When the company later tried to protect the chips by coating them with epoxy,
|
|
the pirates simply developed a solvent to remove the protective seal, and stole
|
|
the software again.
|
|
|
|
Now government researchers at Lawrence Livermore National Laboratory, a weapons
|
|
and energy research center in Livermore, California, have developed a special
|
|
coating that protects the chip from attempts to pry out either the chip design
|
|
or the information it contains. In the semiconductor industry, a competitor's
|
|
chip design can be copied through a process called reverse engineering, which
|
|
might include determining the design through an electron microscope or by
|
|
dissolving successive layers of the chip with a solvent.
|
|
|
|
Already a number of government military and intelligence agencies are using the
|
|
coating to protect circuits containing secure information. The government has
|
|
qualified 13 U.S. chip makers to apply the coating to chips used by certain
|
|
government agencies.
|
|
|
|
The Lawrence Livermore research, known as the Connoisseur Project, has
|
|
developed a resin about the consistency of peanut butter that is injected into
|
|
the cavity surrounding the chip after it has been manufactured. The coating is
|
|
heated and cured; The chip is then sealed with a protective lid.
|
|
|
|
The special protective resin is opaque and resists solvents, heat, grinding and
|
|
other techniques that have been developed for reverse engineering.
|
|
|
|
A second-generation coating is being developed that will automatically destroy
|
|
the chip when an attempt is made chemically to break through the protective
|
|
layer.
|
|
|
|
Another project at the laboratory is exploring even more advanced protection
|
|
methods that will insert ultra-thin screens between the layers of a chip,
|
|
making it harder to be penetrated.
|
|
______________________________________________________________________________
|
|
|
|
U.S. Firm Gets Hungarian Telephone Contract December 5, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Taken from the St. Louis Post-Dispatch (via New York Times News Service)
|
|
|
|
U.S. West Inc., one of the seven regional Bell telephone companies, announced
|
|
that it had signed an agreement with Hungary to build a mobile cellular
|
|
telephone system in Budapest.
|
|
|
|
The Hungarian cellular system will be the first such telephone network in
|
|
Eastern Europe.
|
|
|
|
Because of the shortage of telephones in their country, Hungarians are expected
|
|
to use cellular telephones for basic home service, as well as mobile
|
|
communications.
|
|
|
|
For Hungary and the other Eastern European countries that have antiquated
|
|
telephone systems, it will be faster and cheaper for the Government to deliver
|
|
telephone service by cellular networks than it would be to rebuild the nation's
|
|
entire telephone apparatus.
|
|
|
|
A cellular telephone network transmits calls on radio waves to small receiving
|
|
antennas, called "cell" sites, that relay calls to local phone systems. The
|
|
system to be built in Hungary will transmit calls from cellular phone to
|
|
cellular phone and through the existing land-based telephone network.
|
|
|
|
The system, which is scheduled to begin operation in the first quarter of 1991,
|
|
will initially provide cellular communications to Budapest's 2.1 million
|
|
residents. Eventually, the system will serve all of Hungary, a nation of 10.6
|
|
million.
|
|
|
|
Hungary has 6.8 telephone lines for every 100 people, according to The World's
|
|
Telephones, a statistical compilation produced by AT&T. By comparison, the US
|
|
has 48.1 lines for every 100 people.
|
|
_____________________________________________________________________________
|
|
|
|
1. Phone Fun (November/December) -- Some students at Columbia University in
|
|
New York City have added a twist to that ancient annoyance, the chain
|
|
letter. The students have taken advantage of the school's newly installed,
|
|
$15 million IBM/Rolm phone system's ability not only to store messages like
|
|
an answering machine, but also to take and receive messages and send them
|
|
-- with comments -- to a third party.
|
|
|
|
Last spring, brothers Anil and Ajay Dubey, both seniors, recorded a parody
|
|
of rapper Tone Loc's Top 10 single "Funky Cold Medina" and sent it to some
|
|
buddies. Their friends then passed the recording along with comments, to
|
|
some other pals, who passed it on to other friends... and so on, and so
|
|
on, and so on. Eventually, the message ran more than ten minutes and
|
|
proved so popular that the phone mail system became overloaded and was
|
|
forced to shut down.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
2. Get a "Sprint" VISA Card Today (November 14, 1989) -- U.S. Sprint will
|
|
begin mailing in December, a a Sprint VISA card, which will combine the
|
|
functionality of a long distance calling card, a credit card and an ATM
|
|
card. Sprint will market the card which will be issued by State Street
|
|
Bank and Trust, in Boston.
|
|
|
|
Business travelers will receive a single bill that list all their travel
|
|
related expenses: Hotel, meals and phone calls. While payment for the
|
|
phone charges will be done through the regular Visa bill, call detail
|
|
reports will appear on Sprint's standard FONcard bill. Taken from
|
|
Communications Week.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
3. The Harpers Forum -- Harpers Magazine came up with an idea for how to
|
|
gather information about the phreak/hack modem community. They set up shop
|
|
on The Well (a public access Unix and bulletin board) and invited any and
|
|
all hackers to join in their multiple discussion subboards.
|
|
|
|
The hackers involved were Acid Phreak, Bernie S., Cap'n Crunch, Cheshire
|
|
Catalyst, Emmanuel Goldstein, Knight Lightning, Michael Synergy (of Reality
|
|
Hackers Magazine), Phiber Optik, Piper, Sir Francis Drake, Taran King, and
|
|
many old TAP subscribers.
|
|
|
|
The Well is accessible through CompuServe's data network. All charges for
|
|
using The Well by hackers were absorbed by Harpers.
|
|
|
|
There were many people on The Well posing as hackers to try and add to the
|
|
discussion, but it turns out that some of them like Adel Aide, were shoe
|
|
salesmen. There were also a few security types, including Clifford Stoll
|
|
(author of The Cuckoo's Egg), and a reporter or two like Katie Hafner (who
|
|
writes a lot for Business Week).
|
|
|
|
The contents of the discussion and all related materials will be used in an
|
|
article in an upcoming issue of Harpers Magazine.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
4. Phrozen Ghost has supposedly been arrested for crimes relating to hacking,
|
|
telecommunications fraud, and drugs. No other details are known at this
|
|
time. Information sent to PWN by Captain Crook.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
5. SurveillanceCon '89 -- Tuc, Susan Thunder, and Prime Suspect all attended a
|
|
Security/Surveillance Convention in Washington DC recently at which both
|
|
Tuc and Susan Thunder gave presentations about computer security. Tuc's
|
|
presentation dealt largely with bulletin boards like Ripco in Chicago and
|
|
newsletters like Phrack Inc. Audio cassettes from all the speakers at this
|
|
convention are available for $9.00 each, however we at PWN have no
|
|
information about who to contact to purchase these recordings.
|
|
_______________________________________________________________________________
|
|
|