Copy Link
Add to Bookmark
Report
Tolmes News Service 08
#######################################
# #
# #
# ======== =\ = ====== #
# == = \ = = #
# == = \ = ====== #
# == = \ = = #
# == = \= ====== #
# #
# #
# <Tolmes News Service> #
# ''''''''''''''''''''' #
# #
# #
# > Written by Dr. Hugo P. Tolmes < #
# #
# #
#######################################
Issue Number: 08
Release Date: November 19, 1987
This issue of Tolmes News Service will include articles on the following
subjects:
- Iverson Technology
- Bugging
- A Urine Hotline
- CLASS
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
TITLE: Keeping Top Secrets Inside the Computer
FROM: Business Week
DATE: May 25, 1987
The disclosure of security problems at the U.S. embassy in Moscow
may be an embarrassment to Washington, but Donald D. Iverson says it's been a
bonanza for him. As president of Iverson Technology Corp., his
speciality is computer security for the federal government and its contractors.
Iverson's company installs a variety of shields, such as lead linings, on
personal computers, cables, and other devices. The purpose: to prevent the
equipment from emitting electromagnetic signals that could be picked up and
decoded by high-tech spies.
Iverson, a large, lumbering man who drives a red pickup truck, seems
out of place in a James Bonds world. A self-described farm boy, Iverson, 54,
did a stint as an International Business Machines Corp. salesman before
running a string of computer-related businesses. In 1981 he recognized the
opportunity in his current field.
Iverson deals in a shadowy world where most bids aren't publicized, where
his company doesn't always known exactly where the equipment is going, and
where people who don't want to identify themselves call in from all parts of
the world. Appropriately, the company is just down the street from the
Central Intelligence Agency in Mclean, Va., and numbers several former CIA
officials in its ranks. There is also a laboratory facility in Clearwater, Fla.
Iverson, a gruff but talkative, clams up when the subject gets sensitive.
Asked if he has modified computers in the White House, he answers: "Just say
the government."
GROWING FORTUNE
Iverson's market is limited but plush. The company's 500 or so customers
are governments and certified contractors working for the governments of the
U.S., NATO countries, Australia, and New Zealand. but when computers are
converted to customers' specifications, their value is approximately doubled.
And Iverson't profits have also doubled annually, on average over the past
three years, hitting $2.2 million on sales of $23 million last year.
There's plenty of opportunity left in computer shielding, a market that
analyst Alan Ackerman of Gruntal & Co. estimates will grow by 30% a year. But
Iverson is diversifying into other areas. His latest: a hard disk drive
that can be removed and l what we're all
about," he says. "We're going from becoming a small company to a
medium-size company."
For Iverson, that could mean going from a small fortune to a medium-size
one. He and his children own 57.6% of the company. that share is worth $32
million, thanks to the stock's threefold rise since the company went
public in 1985. Iverson syas his newfound wealth hasn't changed him, though.
He keeps a stretch Cadillac in his parking space, but that's only for
driving his soccer team to games, he says. As intriguing as Iverson's
cloak-and-dagger business may be to outsiders, he says his greatest
satisfaction still comes from coaching kids.
By Maria E. Recio in McLean
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
NOTA:
Iverson Technology is one of the major contractors for Operation TEMPEST.
They get a lot of business from government security agencies. As
expressed in the article, their major business comes from protecting computers
from radio-emission espionage.
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
TITLE: Bugging
FROM: Popular Science
DATE: August 1987
Nobody wants to talk about bugs. The Central Intelligence Agency and the
National Security Agency refused to be interviewed. Private companies were
also wary; several prospective sources hung up when they learned why we were
calling. Most manufacturers of bugs make it clear that they will not talk
for publication.
For example, Intelligence Devices Corp. of Fairfield, N.J. advertises 100
different pieces of security equipment. The ad begins: "We supply the most
sophisticated electronic intelligence devices availiable to law enforcement,
but law prohibits us from discussing our products in detail without the
proper written requests... Complete and detailed product information is
availiable only to authorized agencies upon written request on departmental
letterhead."
Despite such problems, we were able to dig out some surprising facts.
Among them:
* Bugs can be made almost any size. The smallest we actually saw was
the one pictured on the cover. It is a tiny electret microphone just 3/16 inch
across at its largest dimension. The security expert who gave it to us
wouldn't say where he got it.
* Bugs are widely availiable. Tiny ones undoubtedly used in industrial
espionage can be bought openly in some European and Asian cities, though
they're illegal there as here. Easily availiable even here, however, are
wireless microphones smaller than a cigarette pack. The have legitimate
uses, but also can be used for bugging.
* Sensitive information in computers is easy to steal;a $500
device can tune in on any unprotected computer at ranges of perhaps a mile
and reproduce anything appearing on the computer's screen. A British expert
recently gave a demonstration that left computer users in a state of shock. --
The variety is endless.
Picking up the handset supplies telephone line voltage to the bug which
then transmits anything said in a nearby receiver.
"We once got a call from a guy who everytime he picked up the telephone
his television went blurry," said Muessel. "We never found what that
meant because he didn't hire us. But there was probably a transmitter
planted inside his phone."
Similar bugs can be designed to send out signals all the time- even when th
e telephone is thought to be inoperative.
"Wires are often put in telephones for nonexistent intercoms or speaker pho
nes," says Manson. "So there is a spare pair of wires."
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
NOTA:
This article actually went on for several pages. I only printed certain
parts that were telecom related. The $500 device described is exactly what
Operation TEMPEST is meant to destroy. That $500 device can easily allow any
person in the vicinity to steal information from a computer. Naturally,
the device could threaten national security... thus comes Operation TEMPEST
and all of the radio-emission shielding.
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
TITLE: Urine Hot-Line
FROM: Omni
DATE: August 1987
You say that you've recently indulged in a little controlled
substance, and you're worried about that upcoming urinalysis at your job?
Well, for two bucks plus toll charges, San Diego's Question Authority has
some help for you: a hot line that gives cogent clues as to how to beat
the urine test. A brief, tape-recorded message tells you how long various
drugs stay in the system and how to disguise the telltale traces in your
urine- even while the doctor is watching. Question Authority's W. Evan
Sloane calls it "the first political use of hot-line technology." Since its
inauguration late last year, he says, the line has had callers from all over
the country- "typically," he reports, "young couples in their mid-thirties
who don't want to lose their jobs just because they smoke a little
marijuana."- Bill Lawren
Access: Dial (619)976-TEST
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
NOTA:
It seems that just about anyone can get a hotline. This hotline has been
getting a great amount of calls. The easiest way to ruin a urinalysis is to
pour some vinegar in it.
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
TITLE: Innovation? Just Hold the Phone!
FROM: The Chicago Tribune
DATE:
Charles Clifford probably would have been worried anyway when his phone
rang recently at 3 a.m. only to have someone hang up before he could answer.
But a recent rash of burglaries in his neighborhood made the Nantez, Miss.
pharmacist even more nervous.
"It made me wonder whether someone was casing me, trying to see if we were
home," Clifford says. So Clifford put his fears to rest. He pressed "99".
Because of an experimental service that South Central Bell and others
offer, he called back the last party that called him, even though he didn't
know who it was.
"When the guy picked up, I just said 'Donmy house
again at 3 a.m. and hang up.'" Clifford recalls. "I could tell by his voice
that I really startled him. He just said 'Believe me, I will never do that
again.'"
Clifford's revenge illustrates a quiet revolution in the telecommunications
business. Phones are getting smarter. They can remember your best friend's
number while automatically screening calls from your mother in law, let you
know who is calling before you pick up the receiver, keep trying to get
through a busy signal while you attend to something else or call a number on
your mere say-so without your even touching the dial. If Alexander Graham
Bell's Watson was startled to hear he was wanted in the other room, phones
today would flabbegast him. "Two important events have influenced phone
technology," says Christopher Jackson, a telecommunications analyst with the
Yankee Group, a Boston research organization. "Before the breakup of
the Bell System, there really wasn't much difference in the phones. They
[Bell] decided to spend money on the network and treat the phones as a
conduit to the consumers. Once the phone business was spun off, a lot more
imagination and money was invested in turning the telephone into a profit
center itself."
That means two forces are working to improve telephone technology.
Because they sell the phones themselves, some local service companies
are introducing features they hope will provide new profit sources. Meanwhile,
companies that manufacture the phones are designing features they hope will
entice consumers to choose their products from the dizzying number of
competitors.
"The second thing is the way telephones are built," Jackson says.
"The Bell telephone was basically a piece of machineray with moving parts
inside. Today they're built electronically with integrated circuits
and chips. That has made it much easier to make telephones intelligent." For
example, the chip that enables you to call back the last number you dialed by
pressing only one button costs about 25 cents which explains why that more
popular feature appears on even the most inexpensive phones. Several
companies, including Indiana Bell and Pennsylvainia Bell are experimenting
with far more sophisticated services than one touch redial services that
enable you to call back the last party that called you, alter the ring in
certain ways to tip you off about who is calling before you pick up the
receiver and screen certain calls while letting others through.
Two of South Central Bell's most popular experimental features are "call
return" and "repeat dialing". They essentially work the same way. First
you press the asterisk and then a special two number code. Call return
can reopen the last telephone line into your phone. By pressing the proper code
for repeat dialing the phone will continue dialing the last number called
until it gets a ring. Then your phone also rings, alerting you that the call
is going through. A related service is call tracing. Customers can initiate a
trace on annoying calls. You won't be able to learn the identity the phone compa
ny representatives will confront the
party, or in the case of abusive calls, they will alert the police. Another
experimental service, distinctive alert, enables you to know who is
calling without picking up the phone. You program up to 10 telephone numbers
into your phone. Any incoming call from one of theses numbers will cause the
phone to ring in a different fashion. You could let the office call ring
indefinitely while never missing that hot tip from your bookie. For the more
daring, there's selective call rejection. This allows you to program
as many as six numbers-people you really don't want to hear from-into the
phone. Instead of ringing in your home, incoming calls from these numbers will
automatically trigger a recording that says, "sorry, the party will not accept
your call." Several phone companies have offered call forwarding, in which
calls to your home are directed to another number.
Some companies are experimenting with selective call forwarding that
enables you to program as many as six numbers to be forwarded to a third
party, while all other calls come through. Just how profitable these
services are is something the phone companies want to find out before
committing themselves systemwide. Some companies are considering charging
customers each time they use one of the features. Other companies are
considering charging a flat fee of $2 to $5 a month per service, as they do
for basic phone service.
But how widespread these services will become is unclear. Only a handful
if companies are testing them in a limited way. Michigan Bell is
considering trying four of the enhanced features: repeat dialing, auto recall
that dials the last incoming call, distinctive ringing and selective call
forwarding. The company intends to file for permission with the Michigan Public
Service Commission next year to launch those services. But it could be several
years before Michigan Bell gets apporval.
Even the companies that are experimenting with the new services are
doing so in only limited ways. South Central Bell, for example, covers
Alabama, Missisipi, Louisiana, Tennessee and Kentucky, but is only
testing its enhanced services in Natchez, a town of only 20,000 people.
"We're interested in expanding the service as the technology is
availiable." says company representative Cathye MacDonald.
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
NOTA:
This article goes on for about 5 more paragraphs. The rest of the things that
are discussed: special phones that hold numbers, speech-synthesis dialers,
voice dialers.. and from one paragraph about ESS: "The next big jump in smart
phones may come when the phone companies completely go digital." The
rest of the article talks about personal computers sending data at
higher speeds, electronic banking, Pacific Bell offering bulletin boards,
and using the phone to monitor utility use. The main part of the article
describes CLASS or LASS. Experimental systems such as the one described have
been expanded to more are$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$