313 lines
16 KiB
Plaintext
313 lines
16 KiB
Plaintext
#######################################
|
|
# #
|
|
# #
|
|
# ======== =\ = ====== #
|
|
# == = \ = = #
|
|
# == = \ = ====== #
|
|
# == = \ = = #
|
|
# == = \= ====== #
|
|
# #
|
|
# #
|
|
# <Tolmes News Service> #
|
|
# ''''''''''''''''''''' #
|
|
# #
|
|
# #
|
|
# > Written by Dr. Hugo P. Tolmes < #
|
|
# #
|
|
# #
|
|
#######################################
|
|
|
|
|
|
Issue Number: 08
|
|
Release Date: November 19, 1987
|
|
|
|
|
|
This issue of Tolmes News Service will include articles on the following
|
|
subjects:
|
|
|
|
- Iverson Technology
|
|
- Bugging
|
|
- A Urine Hotline
|
|
- CLASS
|
|
|
|
|
|
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
|
|
|
|
|
TITLE: Keeping Top Secrets Inside the Computer
|
|
FROM: Business Week
|
|
DATE: May 25, 1987
|
|
|
|
|
|
The disclosure of security problems at the U.S. embassy in Moscow
|
|
may be an embarrassment to Washington, but Donald D. Iverson says it's been a
|
|
bonanza for him. As president of Iverson Technology Corp., his
|
|
speciality is computer security for the federal government and its contractors.
|
|
Iverson's company installs a variety of shields, such as lead linings, on
|
|
personal computers, cables, and other devices. The purpose: to prevent the
|
|
equipment from emitting electromagnetic signals that could be picked up and
|
|
decoded by high-tech spies.
|
|
Iverson, a large, lumbering man who drives a red pickup truck, seems
|
|
out of place in a James Bonds world. A self-described farm boy, Iverson, 54,
|
|
did a stint as an International Business Machines Corp. salesman before
|
|
running a string of computer-related businesses. In 1981 he recognized the
|
|
opportunity in his current field.
|
|
Iverson deals in a shadowy world where most bids aren't publicized, where
|
|
his company doesn't always known exactly where the equipment is going, and
|
|
where people who don't want to identify themselves call in from all parts of
|
|
the world. Appropriately, the company is just down the street from the
|
|
Central Intelligence Agency in Mclean, Va., and numbers several former CIA
|
|
officials in its ranks. There is also a laboratory facility in Clearwater, Fla.
|
|
Iverson, a gruff but talkative, clams up when the subject gets sensitive.
|
|
Asked if he has modified computers in the White House, he answers: "Just say
|
|
the government."
|
|
|
|
GROWING FORTUNE
|
|
|
|
Iverson's market is limited but plush. The company's 500 or so customers
|
|
are governments and certified contractors working for the governments of the
|
|
U.S., NATO countries, Australia, and New Zealand. but when computers are
|
|
converted to customers' specifications, their value is approximately doubled.
|
|
And Iverson't profits have also doubled annually, on average over the past
|
|
three years, hitting $2.2 million on sales of $23 million last year.
|
|
There's plenty of opportunity left in computer shielding, a market that
|
|
analyst Alan Ackerman of Gruntal & Co. estimates will grow by 30% a year. But
|
|
Iverson is diversifying into other areas. His latest: a hard disk drive
|
|
that can be removed and l what we're all
|
|
about," he says. "We're going from becoming a small company to a
|
|
medium-size company."
|
|
For Iverson, that could mean going from a small fortune to a medium-size
|
|
one. He and his children own 57.6% of the company. that share is worth $32
|
|
million, thanks to the stock's threefold rise since the company went
|
|
public in 1985. Iverson syas his newfound wealth hasn't changed him, though.
|
|
He keeps a stretch Cadillac in his parking space, but that's only for
|
|
driving his soccer team to games, he says. As intriguing as Iverson's
|
|
cloak-and-dagger business may be to outsiders, he says his greatest
|
|
satisfaction still comes from coaching kids.
|
|
|
|
By Maria E. Recio in McLean
|
|
|
|
|
|
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
|
|
|
NOTA:
|
|
|
|
Iverson Technology is one of the major contractors for Operation TEMPEST.
|
|
They get a lot of business from government security agencies. As
|
|
expressed in the article, their major business comes from protecting computers
|
|
from radio-emission espionage.
|
|
|
|
|
|
|
|
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
|
|
|
|
|
TITLE: Bugging
|
|
FROM: Popular Science
|
|
DATE: August 1987
|
|
|
|
Nobody wants to talk about bugs. The Central Intelligence Agency and the
|
|
National Security Agency refused to be interviewed. Private companies were
|
|
also wary; several prospective sources hung up when they learned why we were
|
|
calling. Most manufacturers of bugs make it clear that they will not talk
|
|
for publication.
|
|
For example, Intelligence Devices Corp. of Fairfield, N.J. advertises 100
|
|
different pieces of security equipment. The ad begins: "We supply the most
|
|
sophisticated electronic intelligence devices availiable to law enforcement,
|
|
but law prohibits us from discussing our products in detail without the
|
|
proper written requests... Complete and detailed product information is
|
|
availiable only to authorized agencies upon written request on departmental
|
|
letterhead."
|
|
Despite such problems, we were able to dig out some surprising facts.
|
|
Among them:
|
|
|
|
|
|
* Bugs can be made almost any size. The smallest we actually saw was
|
|
the one pictured on the cover. It is a tiny electret microphone just 3/16 inch
|
|
across at its largest dimension. The security expert who gave it to us
|
|
wouldn't say where he got it.
|
|
|
|
* Bugs are widely availiable. Tiny ones undoubtedly used in industrial
|
|
espionage can be bought openly in some European and Asian cities, though
|
|
they're illegal there as here. Easily availiable even here, however, are
|
|
wireless microphones smaller than a cigarette pack. The have legitimate
|
|
uses, but also can be used for bugging.
|
|
* Sensitive information in computers is easy to steal;a $500
|
|
device can tune in on any unprotected computer at ranges of perhaps a mile
|
|
and reproduce anything appearing on the computer's screen. A British expert
|
|
recently gave a demonstration that left computer users in a state of shock. --
|
|
The variety is endless.
|
|
|
|
Picking up the handset supplies telephone line voltage to the bug which
|
|
then transmits anything said in a nearby receiver.
|
|
"We once got a call from a guy who everytime he picked up the telephone
|
|
his television went blurry," said Muessel. "We never found what that
|
|
meant because he didn't hire us. But there was probably a transmitter
|
|
planted inside his phone."
|
|
Similar bugs can be designed to send out signals all the time- even when th
|
|
e telephone is thought to be inoperative.
|
|
"Wires are often put in telephones for nonexistent intercoms or speaker pho
|
|
nes," says Manson. "So there is a spare pair of wires."
|
|
|
|
|
|
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
|
|
|
NOTA:
|
|
|
|
This article actually went on for several pages. I only printed certain
|
|
parts that were telecom related. The $500 device described is exactly what
|
|
Operation TEMPEST is meant to destroy. That $500 device can easily allow any
|
|
person in the vicinity to steal information from a computer. Naturally,
|
|
the device could threaten national security... thus comes Operation TEMPEST
|
|
and all of the radio-emission shielding.
|
|
|
|
|
|
|
|
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
|
|
|
|
|
TITLE: Urine Hot-Line
|
|
FROM: Omni
|
|
DATE: August 1987
|
|
|
|
|
|
You say that you've recently indulged in a little controlled
|
|
substance, and you're worried about that upcoming urinalysis at your job?
|
|
Well, for two bucks plus toll charges, San Diego's Question Authority has
|
|
some help for you: a hot line that gives cogent clues as to how to beat
|
|
the urine test. A brief, tape-recorded message tells you how long various
|
|
drugs stay in the system and how to disguise the telltale traces in your
|
|
urine- even while the doctor is watching. Question Authority's W. Evan
|
|
Sloane calls it "the first political use of hot-line technology." Since its
|
|
inauguration late last year, he says, the line has had callers from all over
|
|
the country- "typically," he reports, "young couples in their mid-thirties
|
|
who don't want to lose their jobs just because they smoke a little
|
|
marijuana."- Bill Lawren
|
|
|
|
|
|
Access: Dial (619)976-TEST
|
|
|
|
|
|
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
|
|
|
NOTA:
|
|
|
|
It seems that just about anyone can get a hotline. This hotline has been
|
|
getting a great amount of calls. The easiest way to ruin a urinalysis is to
|
|
pour some vinegar in it.
|
|
|
|
|
|
|
|
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
|
|
|
|
|
TITLE: Innovation? Just Hold the Phone!
|
|
FROM: The Chicago Tribune
|
|
DATE:
|
|
|
|
|
|
Charles Clifford probably would have been worried anyway when his phone
|
|
rang recently at 3 a.m. only to have someone hang up before he could answer.
|
|
But a recent rash of burglaries in his neighborhood made the Nantez, Miss.
|
|
pharmacist even more nervous.
|
|
"It made me wonder whether someone was casing me, trying to see if we were
|
|
home," Clifford says. So Clifford put his fears to rest. He pressed "99".
|
|
Because of an experimental service that South Central Bell and others
|
|
offer, he called back the last party that called him, even though he didn't
|
|
know who it was.
|
|
"When the guy picked up, I just said 'Donmy house
|
|
again at 3 a.m. and hang up.'" Clifford recalls. "I could tell by his voice
|
|
that I really startled him. He just said 'Believe me, I will never do that
|
|
again.'"
|
|
Clifford's revenge illustrates a quiet revolution in the telecommunications
|
|
|
|
business. Phones are getting smarter. They can remember your best friend's
|
|
number while automatically screening calls from your mother in law, let you
|
|
know who is calling before you pick up the receiver, keep trying to get
|
|
through a busy signal while you attend to something else or call a number on
|
|
your mere say-so without your even touching the dial. If Alexander Graham
|
|
Bell's Watson was startled to hear he was wanted in the other room, phones
|
|
today would flabbegast him. "Two important events have influenced phone
|
|
technology," says Christopher Jackson, a telecommunications analyst with the
|
|
Yankee Group, a Boston research organization. "Before the breakup of
|
|
the Bell System, there really wasn't much difference in the phones. They
|
|
[Bell] decided to spend money on the network and treat the phones as a
|
|
conduit to the consumers. Once the phone business was spun off, a lot more
|
|
imagination and money was invested in turning the telephone into a profit
|
|
center itself."
|
|
That means two forces are working to improve telephone technology.
|
|
Because they sell the phones themselves, some local service companies
|
|
are introducing features they hope will provide new profit sources. Meanwhile,
|
|
companies that manufacture the phones are designing features they hope will
|
|
entice consumers to choose their products from the dizzying number of
|
|
competitors.
|
|
"The second thing is the way telephones are built," Jackson says.
|
|
"The Bell telephone was basically a piece of machineray with moving parts
|
|
inside. Today they're built electronically with integrated circuits
|
|
and chips. That has made it much easier to make telephones intelligent." For
|
|
example, the chip that enables you to call back the last number you dialed by
|
|
pressing only one button costs about 25 cents which explains why that more
|
|
popular feature appears on even the most inexpensive phones. Several
|
|
companies, including Indiana Bell and Pennsylvainia Bell are experimenting
|
|
with far more sophisticated services than one touch redial services that
|
|
enable you to call back the last party that called you, alter the ring in
|
|
certain ways to tip you off about who is calling before you pick up the
|
|
receiver and screen certain calls while letting others through.
|
|
Two of South Central Bell's most popular experimental features are "call
|
|
return" and "repeat dialing". They essentially work the same way. First
|
|
you press the asterisk and then a special two number code. Call return
|
|
can reopen the last telephone line into your phone. By pressing the proper code
|
|
for repeat dialing the phone will continue dialing the last number called
|
|
until it gets a ring. Then your phone also rings, alerting you that the call
|
|
is going through. A related service is call tracing. Customers can initiate a
|
|
trace on annoying calls. You won't be able to learn the identity the phone compa
|
|
ny representatives will confront the
|
|
party, or in the case of abusive calls, they will alert the police. Another
|
|
experimental service, distinctive alert, enables you to know who is
|
|
calling without picking up the phone. You program up to 10 telephone numbers
|
|
into your phone. Any incoming call from one of theses numbers will cause the
|
|
phone to ring in a different fashion. You could let the office call ring
|
|
indefinitely while never missing that hot tip from your bookie. For the more
|
|
daring, there's selective call rejection. This allows you to program
|
|
as many as six numbers-people you really don't want to hear from-into the
|
|
phone. Instead of ringing in your home, incoming calls from these numbers will
|
|
automatically trigger a recording that says, "sorry, the party will not accept
|
|
your call." Several phone companies have offered call forwarding, in which
|
|
calls to your home are directed to another number.
|
|
Some companies are experimenting with selective call forwarding that
|
|
enables you to program as many as six numbers to be forwarded to a third
|
|
party, while all other calls come through. Just how profitable these
|
|
services are is something the phone companies want to find out before
|
|
committing themselves systemwide. Some companies are considering charging
|
|
customers each time they use one of the features. Other companies are
|
|
considering charging a flat fee of $2 to $5 a month per service, as they do
|
|
for basic phone service.
|
|
But how widespread these services will become is unclear. Only a handful
|
|
if companies are testing them in a limited way. Michigan Bell is
|
|
considering trying four of the enhanced features: repeat dialing, auto recall
|
|
that dials the last incoming call, distinctive ringing and selective call
|
|
forwarding. The company intends to file for permission with the Michigan Public
|
|
Service Commission next year to launch those services. But it could be several
|
|
years before Michigan Bell gets apporval.
|
|
Even the companies that are experimenting with the new services are
|
|
doing so in only limited ways. South Central Bell, for example, covers
|
|
Alabama, Missisipi, Louisiana, Tennessee and Kentucky, but is only
|
|
testing its enhanced services in Natchez, a town of only 20,000 people.
|
|
"We're interested in expanding the service as the technology is
|
|
availiable." says company representative Cathye MacDonald.
|
|
|
|
|
|
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
|
|
|
NOTA:
|
|
|
|
This article goes on for about 5 more paragraphs. The rest of the things that
|
|
are discussed: special phones that hold numbers, speech-synthesis dialers,
|
|
voice dialers.. and from one paragraph about ESS: "The next big jump in smart
|
|
phones may come when the phone companies completely go digital." The
|
|
rest of the article talks about personal computers sending data at
|
|
higher speeds, electronic banking, Pacific Bell offering bulletin boards,
|
|
and using the phone to monitor utility use. The main part of the article
|
|
describes CLASS or LASS. Experimental systems such as the one described have
|
|
been expanded to more are$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|