==Phrack Inc.== Volume Three, Issue 30, File #12 of 12 PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN P h r a c k W o r l d N e w s PWN PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN PWN Issue XXX/Part 2 PWN PWN PWN PWN Created, Written, and Edited PWN PWN by Knight Lightning PWN PWN PWN PWN Special Thanks to Dark OverLord PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN U.S. Inquiry Into Theft From Apple November 19, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by John Markoff (New York Times) A former Apple Computer Inc. engineer has said he was served with a grand jury subpeona and told by an FBI agent that he is a suspect in a theft of software used by the company to design its Macintosh computer. In June a group identifying itself as the Nu Prometheus League mailed copies of computer disks containing the software to several trade magazines and software developers. Grady Ward, age 38, who worked for Apple until January (1989), said that he received the subpeona from an FBI agent, who identified himself as Steven E. Cook. Ward said the agent told him that he was one of five suspects drawn from a computerized list of people who had access to the material. The agent said the five were considered the most likely to have taken the software. A spokesman for the FBI in San Francisco said the agency would not comment on a continuing investigation. Ward said he had told the FBI he was innocent but would cooperate with the investigation. The theft of Apple's software has drawn a great deal of attention in Silicon Valley, where technology and trade-secret cases have highlighted the crucial role of skilled technical workers and the degree to which corporations depend on their talents. The case is unusual because the theft was apparently undertaken for philosophical reasons and not for personal profit. There is no indication of how many copies of the program were sent by Nu Prometheus. Software experts have said the programs would be useful to a company trying to copy the distinctive appearance of the Macintosh display, but it would not solve legal problems inherent in attempting to sell such a computer. Apple has successfully prevented many imitators from selling copies of its Apple II and Macintosh computers. The disks were accompanied by a letter that said in part: "Our objective at Apple is to distribute everything that prevents other manufacturers from creating legal copies of the Macintosh. As an organization, the Nu Prometheus League has no ambition beyond seeing the genius of a few Apple employees benefit the entire world." The group said it had taken its name from the Greek god who stole fire from the gods and gave it to man. The letter said the action was partially in response to Apple's pending suit against Microsoft Corp. and Hewlett-Packard Co., accusing them of copying the "look and feel" -- the screen appearance -- of the Macintosh. Many technology experts in Silicon Valley believe Apple does not have special rights to its Macintosh technology because most of the features of the computer are copied from research originally done at Xerox Corp.'s Palo Alto Research Center during the 1970s. The Macintosh was not introduced until 1984. The theft came to light in June after Macweek, a trade magazine, published the letter from Nu Prometheus. At the time the theft was reported, executives at Apple, based in Cupertino, California, said they took the incident seriously. A spokeswoman said that Apple would not comment on details of the investigation. Ward said he had been told by the FBI agent that the agency believed Toshiba Corp. had obtained a copy of the software and that copies of the program had reached the Soviet Union. The software is not restricted from export to the Communist bloc. Its main value is commercial as an aid in copying Apple's technology. Ward said the FBI agent would not tell him how it believed Toshiba had obtained a copy of the software. Ward also said the FBI agent told him that a computer programmer had taken a copy of the software to the Soviet Union. Ward said the FBI agent told him he was considered a suspect because he was a "computer hacker," had gone to a liberal college and had studied briefly at the Massachusetts Institute of Technology's Artificial Intelligence Laboratory. The term "hacker" was first used at MIT to describe young programmers and hardware designers who mastered the first interactive computers in the 1960s. Ward is the second person to be interviewed by the FBI in the investigation of the theft. Earlier Charles Farnham, a businessman in San Jose, California, said two FBI agents came to his office, but identified themselves as reporters for United Press International. Farnham, a Macintosh enthusiast, has disclosed information about unannounced Apple products, said that after asking him to come outside his office, the men said they were FBI agents and proceeded to question him about Nu Prometheus group. He said he was not told that he was a suspect in the case. UPI has complained to the FBI because of the incident. Ward said he had joined Apple in 1979 and left last January to start his own company, Illumind. He sells computerized dictionaries used as spelling checkers and pronunciation guides. He said the FBI told him that one person who had been mailed a copy of the Apple software was Mitchell Kapor, founder of Lotus Development Corporation. Kapor returned his copy of the disk unopened, Ward said the agent told him. Ward said the FBI had also said he was suspect because he had founded a group for the gifted known as Cincinnatus, which the agent said had roots in Greek mythology that were similar to the Nu Prometheus group. Ward said the FBI was mistaken, and Cincinnatus is a reference from ancient Roman history, not Greek mythology. _______________________________________________________________________________ Data-Destroying Disc Sent To European Computer Users December 13, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by John Markoff (New York Times) A computer disk containing a destructive program known as a Trojan horse has been mailed to computer users in at least four European countries. It was not clear if any copies of the program had been mailed to people in the United States. The program, which threatens to destroy data unless a user pays a license fee to a fictitious company in Panama City, Panama, may be a widespread attempt to vandalize thousands of personal computers, several computer experts who have studied the program said Tuesday, December 12. Some computer experts said the disk was mailed by a "PC Cyborg" company to subscribers of personal computer trade magazines, apparently using mailing lists. The disk is professionally packaged and accompanied by a brochure that describes it as an "Aids Information Disk," the computer experts said. But when it is installed in the user's computer it changes several files and hides secret programs that later destroy data on the computer disk. Paul Holbrook, a spokesman for the Computer Emergency Response Team, a U.S. government-financed security organization in Pittsburgh, said his group had confirmed the existence of the program, but did not know how widely it had spread. Trojan horses are programs hidden in software that secretly insert themselves in a computer when the software masking them is activated. They are different from other secret programs like viruses and worms because they are not infectious: They do not automatically copy themselves. A licensing agreement that accompanies the disk contains threatening information. It reads in part: "In case of your breach of this license, PC Cyborg reserves the right to take any legal action necessary to recover any outstanding debts payable to the PC Cyborg Corporation and to use program mechanisms to ensure termination of your use of these programs. The mechanisms will adversely affect other programs on your microcomputer." When it destroys data, the program places a message on the screen that asks users to send $387 to a Panama City address. John McAfee, a computer security consultant in Santa Clara, California, said the program had been mailed to people in England, West Germany, France and Italy. _______________________________________________________________________________ The Executive Computer: From Espionage To Using A Printer October 27, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by Peter H. Lewis (New York Times) Those executives who pay attention to computers are more likely to worry about grand issues like productivity and small ones like how to make their personal printers handle envelopes than whether the KGB has penetrated their companies. In a fresh crop of books, they will find lessons on all these matters. Perhaps the most entertaining of the new books is "The Cuckoo's Egg" ($19.95, Doubleday), by Dr. Clifford Stoll, an astronomer. Because he was the rookie in the Lawrence Berkeley Laboratories in California, he was asked to track down and fix a glitch in the lab's accounting software, which had found a 75-cent discrepancy when it tried to balance the books. "First-degree robbery, huh?" was Stoll's first reaction. But by the time he was done nearly a year later, he had uncovered a West German spy ring that had cracked the security of American military and research computer networks, gathering information that it sold to Moscow. Beyond the entertainment value of this cat-and-mouse hunt, the book has lessons for any corporate computer user. The message is clear: Most companies are irresponsible about security. The ease with which the "hacker" penetrated even military installations was astonishing, but not as astonishing as the lack of concern by many of the victims. "The Cuckoo's Egg" follows the hunt for the unknown intruder, who steals without taking and threatens lives without touching, using only a computer keyboard and the telephone system. The detective is an eccentric who sleeps under his desk, prefers bicycles to cars, and suddenly finds himself working with the Federal Bureau of Investigation, the Central Intelligence Agency and the National Security Agency. Although the criminal and the hunter deal in the esoteric realm of computer code and data encryption, Stoll makes the technology accessible. He also discovers that navigating the global electronic grid is less difficult than navigating the bureaucracies of various government agencies. And while he was a whiz at tracing the cuckoo's electronic tracks from Berkeley to Okinawa to Hannover, West Germany, Stoll reveals himself to be helplessly lost on streets and highways and befuddled by such appliances as a microwave oven. Besides the more than 30 academic, military and private government installations that were easy prey for the spies, the victims included Unisys, TRW, SRI International, the Mitre Corporation and Bolt Beranek & Newman Inc. -- some of the very companies that design, build and test computer systems for the government. "No doubt about it, the shoemaker's kids are running around barefoot," Stoll writes. One leading character in the book is Dr. Bob Morris, chief scientist for the National Security Agency and the inventor of the security for the Unix operating system. An epilogue to the book, dealing with an unrelated computer crime, recounts the discovery that it was Morris's son who wrote the rogue program that shut down a national network for several days last year. In "The Macintosh Way" ($19.95, Scott, Foresman & Co.), Guy Kawasaki, a former Apple Computer Inc. executive who is now president of a software company, has written a candid guide about management at high-technology companies. Although his book is intended for those who make and market computer goods, it could prove helpful to anyone who manages a business. _______________________________________________________________________________ Dialing Away U.S. Area Codes November 13, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by Laure O'Brien (Telephony Magazine) The current endangered species in the news may not be an animal at all. The number of available area codes in the United States is dwindling rapidly. Chicago consumed a new code on November 11, 1989 and and New Jersey will gobble up another one on January 1, 1990. There are only nine codes left, and they are expected to be used up by 1995, said Robert McAlesse, North American Numbering Plan administrator and member of Bellcore's technical staff. "In 1947 (Bellcore) started with 86 codes, and they projected exhaustion in 100 to 150 years. They were off by a few years," McAlesse said. When the 152 available codes are exhausted, Bellcore will use a new plan for creating area codes. A total of 138 codes already are assigned. Five of the remaining 14 codes are reserved for service access codes, and 9 are for geographic area codes. Under the current plan, a 0 or a 1 is used as the second digit while the first and last digits can range between 2 and 9. Under the new plan the first digit will be between 2 and 9 and the following two digits will be numbers between 0 and 9, McAlesse said. The new plan will create 640 potential area codes, he said. Bellcore isn't predicting when the newly created codes will run out. "The growth in new services and increase in the number of telephones are exhausting the codes. The biggest increases are cellular telephones, pagers, facsimile machines and new services that can have more than one number," McAlesse said. The current unassigned codes include 210, 310, 410, 706, 810, 905, 909, 910 and 917. The Chicago area took the 708 code, and New Jersey will take 908. In the Chicago metropolitan area, the suburbs were switched from the 312 area code to the new 708 code. Residents and businesses within the city limits retained the 312 code. Illinois Bell started preparing for the change two years ago with the announcements alerting business customers to change stationary and business cards, said Gloria Pope, an Illinois Bell spokeswoman. Now the telco is targeting the residential market with billboard reminders and billing inserts. The cost of technically preparing for the new code, including labor, is expected to reach $15 million. But Pope said that does not include mailings, public relations efforts and business packages designed to smooth out the transition. The telco will absorb the cost with budgeted funds, and no rate increase is expected, she said. Modifying the network to recognize the new code started about six months ago with translation work. Every central office in the Chicago Metropolitan area was adapted with a new foreign-area translator to accept the new code and route the calls correctly, said Audrey Brooks, area manager-Chicago translations. The long distance carriers were ready for the code's debut. AT&T, US Sprint and MCI changed their computer systems to recognize the new code before the Chicago deadline. "We are anticipating a pretty smooth transfer," said Karen Rayl, U.S. Sprint spokeswoman. Businesses will need to adjust their PBX software, according to AT&T technical specialist Craig Hoopman. "This could affect virtually every nationwide PBX," he said. Modern PBX's will take about 15 minutes to adjust while older switches could take four hours. In many cases, customers can make the changes themselves, he said. _______________________________________________________________________________ A New Coating Thwarts Chip Pirates November 7, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by John Markoff (New York Times) Several years ago, clever high-technology pirates removed a chip from a satellite-television descrambling device made by General Instrument Corporation, electronically siphoned out hidden decryption software and studied it to figure out a way to receive clear TV signals. When the company later tried to protect the chips by coating them with epoxy, the pirates simply developed a solvent to remove the protective seal, and stole the software again. Now government researchers at Lawrence Livermore National Laboratory, a weapons and energy research center in Livermore, California, have developed a special coating that protects the chip from attempts to pry out either the chip design or the information it contains. In the semiconductor industry, a competitor's chip design can be copied through a process called reverse engineering, which might include determining the design through an electron microscope or by dissolving successive layers of the chip with a solvent. Already a number of government military and intelligence agencies are using the coating to protect circuits containing secure information. The government has qualified 13 U.S. chip makers to apply the coating to chips used by certain government agencies. The Lawrence Livermore research, known as the Connoisseur Project, has developed a resin about the consistency of peanut butter that is injected into the cavity surrounding the chip after it has been manufactured. The coating is heated and cured; The chip is then sealed with a protective lid. The special protective resin is opaque and resists solvents, heat, grinding and other techniques that have been developed for reverse engineering. A second-generation coating is being developed that will automatically destroy the chip when an attempt is made chemically to break through the protective layer. Another project at the laboratory is exploring even more advanced protection methods that will insert ultra-thin screens between the layers of a chip, making it harder to be penetrated. ______________________________________________________________________________ U.S. Firm Gets Hungarian Telephone Contract December 5, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Taken from the St. Louis Post-Dispatch (via New York Times News Service) U.S. West Inc., one of the seven regional Bell telephone companies, announced that it had signed an agreement with Hungary to build a mobile cellular telephone system in Budapest. The Hungarian cellular system will be the first such telephone network in Eastern Europe. Because of the shortage of telephones in their country, Hungarians are expected to use cellular telephones for basic home service, as well as mobile communications. For Hungary and the other Eastern European countries that have antiquated telephone systems, it will be faster and cheaper for the Government to deliver telephone service by cellular networks than it would be to rebuild the nation's entire telephone apparatus. A cellular telephone network transmits calls on radio waves to small receiving antennas, called "cell" sites, that relay calls to local phone systems. The system to be built in Hungary will transmit calls from cellular phone to cellular phone and through the existing land-based telephone network. The system, which is scheduled to begin operation in the first quarter of 1991, will initially provide cellular communications to Budapest's 2.1 million residents. Eventually, the system will serve all of Hungary, a nation of 10.6 million. Hungary has 6.8 telephone lines for every 100 people, according to The World's Telephones, a statistical compilation produced by AT&T. By comparison, the US has 48.1 lines for every 100 people. _____________________________________________________________________________ 1. Phone Fun (November/December) -- Some students at Columbia University in New York City have added a twist to that ancient annoyance, the chain letter. The students have taken advantage of the school's newly installed, $15 million IBM/Rolm phone system's ability not only to store messages like an answering machine, but also to take and receive messages and send them -- with comments -- to a third party. Last spring, brothers Anil and Ajay Dubey, both seniors, recorded a parody of rapper Tone Loc's Top 10 single "Funky Cold Medina" and sent it to some buddies. Their friends then passed the recording along with comments, to some other pals, who passed it on to other friends... and so on, and so on, and so on. Eventually, the message ran more than ten minutes and proved so popular that the phone mail system became overloaded and was forced to shut down. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2. Get a "Sprint" VISA Card Today (November 14, 1989) -- U.S. Sprint will begin mailing in December, a a Sprint VISA card, which will combine the functionality of a long distance calling card, a credit card and an ATM card. Sprint will market the card which will be issued by State Street Bank and Trust, in Boston. Business travelers will receive a single bill that list all their travel related expenses: Hotel, meals and phone calls. While payment for the phone charges will be done through the regular Visa bill, call detail reports will appear on Sprint's standard FONcard bill. Taken from Communications Week. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 3. The Harpers Forum -- Harpers Magazine came up with an idea for how to gather information about the phreak/hack modem community. They set up shop on The Well (a public access Unix and bulletin board) and invited any and all hackers to join in their multiple discussion subboards. The hackers involved were Acid Phreak, Bernie S., Cap'n Crunch, Cheshire Catalyst, Emmanuel Goldstein, Knight Lightning, Michael Synergy (of Reality Hackers Magazine), Phiber Optik, Piper, Sir Francis Drake, Taran King, and many old TAP subscribers. The Well is accessible through CompuServe's data network. All charges for using The Well by hackers were absorbed by Harpers. There were many people on The Well posing as hackers to try and add to the discussion, but it turns out that some of them like Adel Aide, were shoe salesmen. There were also a few security types, including Clifford Stoll (author of The Cuckoo's Egg), and a reporter or two like Katie Hafner (who writes a lot for Business Week). The contents of the discussion and all related materials will be used in an article in an upcoming issue of Harpers Magazine. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4. Phrozen Ghost has supposedly been arrested for crimes relating to hacking, telecommunications fraud, and drugs. No other details are known at this time. Information sent to PWN by Captain Crook. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 5. SurveillanceCon '89 -- Tuc, Susan Thunder, and Prime Suspect all attended a Security/Surveillance Convention in Washington DC recently at which both Tuc and Susan Thunder gave presentations about computer security. Tuc's presentation dealt largely with bulletin boards like Ripco in Chicago and newsletters like Phrack Inc. Audio cassettes from all the speakers at this convention are available for $9.00 each, however we at PWN have no information about who to contact to purchase these recordings. _______________________________________________________________________________