####################################### # # # # # ======== =\ = ====== # # == = \ = = # # == = \ = ====== # # == = \ = = # # == = \= ====== # # # # # # # # ''''''''''''''''''''' # # # # # # > Written by Dr. Hugo P. Tolmes < # # # # # ####################################### Issue Number: 08 Release Date: November 19, 1987 This issue of Tolmes News Service will include articles on the following subjects: - Iverson Technology - Bugging - A Urine Hotline - CLASS $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ TITLE: Keeping Top Secrets Inside the Computer FROM: Business Week DATE: May 25, 1987 The disclosure of security problems at the U.S. embassy in Moscow may be an embarrassment to Washington, but Donald D. Iverson says it's been a bonanza for him. As president of Iverson Technology Corp., his speciality is computer security for the federal government and its contractors. Iverson's company installs a variety of shields, such as lead linings, on personal computers, cables, and other devices. The purpose: to prevent the equipment from emitting electromagnetic signals that could be picked up and decoded by high-tech spies. Iverson, a large, lumbering man who drives a red pickup truck, seems out of place in a James Bonds world. A self-described farm boy, Iverson, 54, did a stint as an International Business Machines Corp. salesman before running a string of computer-related businesses. In 1981 he recognized the opportunity in his current field. Iverson deals in a shadowy world where most bids aren't publicized, where his company doesn't always known exactly where the equipment is going, and where people who don't want to identify themselves call in from all parts of the world. Appropriately, the company is just down the street from the Central Intelligence Agency in Mclean, Va., and numbers several former CIA officials in its ranks. There is also a laboratory facility in Clearwater, Fla. Iverson, a gruff but talkative, clams up when the subject gets sensitive. Asked if he has modified computers in the White House, he answers: "Just say the government." GROWING FORTUNE Iverson's market is limited but plush. The company's 500 or so customers are governments and certified contractors working for the governments of the U.S., NATO countries, Australia, and New Zealand. but when computers are converted to customers' specifications, their value is approximately doubled. And Iverson't profits have also doubled annually, on average over the past three years, hitting $2.2 million on sales of $23 million last year. There's plenty of opportunity left in computer shielding, a market that analyst Alan Ackerman of Gruntal & Co. estimates will grow by 30% a year. But Iverson is diversifying into other areas. His latest: a hard disk drive that can be removed and l what we're all about," he says. "We're going from becoming a small company to a medium-size company." For Iverson, that could mean going from a small fortune to a medium-size one. He and his children own 57.6% of the company. that share is worth $32 million, thanks to the stock's threefold rise since the company went public in 1985. Iverson syas his newfound wealth hasn't changed him, though. He keeps a stretch Cadillac in his parking space, but that's only for driving his soccer team to games, he says. As intriguing as Iverson's cloak-and-dagger business may be to outsiders, he says his greatest satisfaction still comes from coaching kids. By Maria E. Recio in McLean $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ NOTA: Iverson Technology is one of the major contractors for Operation TEMPEST. They get a lot of business from government security agencies. As expressed in the article, their major business comes from protecting computers from radio-emission espionage. $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ TITLE: Bugging FROM: Popular Science DATE: August 1987 Nobody wants to talk about bugs. The Central Intelligence Agency and the National Security Agency refused to be interviewed. Private companies were also wary; several prospective sources hung up when they learned why we were calling. Most manufacturers of bugs make it clear that they will not talk for publication. For example, Intelligence Devices Corp. of Fairfield, N.J. advertises 100 different pieces of security equipment. The ad begins: "We supply the most sophisticated electronic intelligence devices availiable to law enforcement, but law prohibits us from discussing our products in detail without the proper written requests... Complete and detailed product information is availiable only to authorized agencies upon written request on departmental letterhead." Despite such problems, we were able to dig out some surprising facts. Among them: * Bugs can be made almost any size. The smallest we actually saw was the one pictured on the cover. It is a tiny electret microphone just 3/16 inch across at its largest dimension. The security expert who gave it to us wouldn't say where he got it. * Bugs are widely availiable. Tiny ones undoubtedly used in industrial espionage can be bought openly in some European and Asian cities, though they're illegal there as here. Easily availiable even here, however, are wireless microphones smaller than a cigarette pack. The have legitimate uses, but also can be used for bugging. * Sensitive information in computers is easy to steal;a $500 device can tune in on any unprotected computer at ranges of perhaps a mile and reproduce anything appearing on the computer's screen. A British expert recently gave a demonstration that left computer users in a state of shock. -- The variety is endless. Picking up the handset supplies telephone line voltage to the bug which then transmits anything said in a nearby receiver. "We once got a call from a guy who everytime he picked up the telephone his television went blurry," said Muessel. "We never found what that meant because he didn't hire us. But there was probably a transmitter planted inside his phone." Similar bugs can be designed to send out signals all the time- even when th e telephone is thought to be inoperative. "Wires are often put in telephones for nonexistent intercoms or speaker pho nes," says Manson. "So there is a spare pair of wires." $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ NOTA: This article actually went on for several pages. I only printed certain parts that were telecom related. The $500 device described is exactly what Operation TEMPEST is meant to destroy. That $500 device can easily allow any person in the vicinity to steal information from a computer. Naturally, the device could threaten national security... thus comes Operation TEMPEST and all of the radio-emission shielding. $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ TITLE: Urine Hot-Line FROM: Omni DATE: August 1987 You say that you've recently indulged in a little controlled substance, and you're worried about that upcoming urinalysis at your job? Well, for two bucks plus toll charges, San Diego's Question Authority has some help for you: a hot line that gives cogent clues as to how to beat the urine test. A brief, tape-recorded message tells you how long various drugs stay in the system and how to disguise the telltale traces in your urine- even while the doctor is watching. Question Authority's W. Evan Sloane calls it "the first political use of hot-line technology." Since its inauguration late last year, he says, the line has had callers from all over the country- "typically," he reports, "young couples in their mid-thirties who don't want to lose their jobs just because they smoke a little marijuana."- Bill Lawren Access: Dial (619)976-TEST $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ NOTA: It seems that just about anyone can get a hotline. This hotline has been getting a great amount of calls. The easiest way to ruin a urinalysis is to pour some vinegar in it. $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ TITLE: Innovation? Just Hold the Phone! FROM: The Chicago Tribune DATE: Charles Clifford probably would have been worried anyway when his phone rang recently at 3 a.m. only to have someone hang up before he could answer. But a recent rash of burglaries in his neighborhood made the Nantez, Miss. pharmacist even more nervous. "It made me wonder whether someone was casing me, trying to see if we were home," Clifford says. So Clifford put his fears to rest. He pressed "99". Because of an experimental service that South Central Bell and others offer, he called back the last party that called him, even though he didn't know who it was. "When the guy picked up, I just said 'Donmy house again at 3 a.m. and hang up.'" Clifford recalls. "I could tell by his voice that I really startled him. He just said 'Believe me, I will never do that again.'" Clifford's revenge illustrates a quiet revolution in the telecommunications business. Phones are getting smarter. They can remember your best friend's number while automatically screening calls from your mother in law, let you know who is calling before you pick up the receiver, keep trying to get through a busy signal while you attend to something else or call a number on your mere say-so without your even touching the dial. If Alexander Graham Bell's Watson was startled to hear he was wanted in the other room, phones today would flabbegast him. "Two important events have influenced phone technology," says Christopher Jackson, a telecommunications analyst with the Yankee Group, a Boston research organization. "Before the breakup of the Bell System, there really wasn't much difference in the phones. They [Bell] decided to spend money on the network and treat the phones as a conduit to the consumers. Once the phone business was spun off, a lot more imagination and money was invested in turning the telephone into a profit center itself." That means two forces are working to improve telephone technology. Because they sell the phones themselves, some local service companies are introducing features they hope will provide new profit sources. Meanwhile, companies that manufacture the phones are designing features they hope will entice consumers to choose their products from the dizzying number of competitors. "The second thing is the way telephones are built," Jackson says. "The Bell telephone was basically a piece of machineray with moving parts inside. Today they're built electronically with integrated circuits and chips. That has made it much easier to make telephones intelligent." For example, the chip that enables you to call back the last number you dialed by pressing only one button costs about 25 cents which explains why that more popular feature appears on even the most inexpensive phones. Several companies, including Indiana Bell and Pennsylvainia Bell are experimenting with far more sophisticated services than one touch redial services that enable you to call back the last party that called you, alter the ring in certain ways to tip you off about who is calling before you pick up the receiver and screen certain calls while letting others through. Two of South Central Bell's most popular experimental features are "call return" and "repeat dialing". They essentially work the same way. First you press the asterisk and then a special two number code. Call return can reopen the last telephone line into your phone. By pressing the proper code for repeat dialing the phone will continue dialing the last number called until it gets a ring. Then your phone also rings, alerting you that the call is going through. A related service is call tracing. Customers can initiate a trace on annoying calls. You won't be able to learn the identity the phone compa ny representatives will confront the party, or in the case of abusive calls, they will alert the police. Another experimental service, distinctive alert, enables you to know who is calling without picking up the phone. You program up to 10 telephone numbers into your phone. Any incoming call from one of theses numbers will cause the phone to ring in a different fashion. You could let the office call ring indefinitely while never missing that hot tip from your bookie. For the more daring, there's selective call rejection. This allows you to program as many as six numbers-people you really don't want to hear from-into the phone. Instead of ringing in your home, incoming calls from these numbers will automatically trigger a recording that says, "sorry, the party will not accept your call." Several phone companies have offered call forwarding, in which calls to your home are directed to another number. Some companies are experimenting with selective call forwarding that enables you to program as many as six numbers to be forwarded to a third party, while all other calls come through. Just how profitable these services are is something the phone companies want to find out before committing themselves systemwide. Some companies are considering charging customers each time they use one of the features. Other companies are considering charging a flat fee of $2 to $5 a month per service, as they do for basic phone service. But how widespread these services will become is unclear. Only a handful if companies are testing them in a limited way. Michigan Bell is considering trying four of the enhanced features: repeat dialing, auto recall that dials the last incoming call, distinctive ringing and selective call forwarding. The company intends to file for permission with the Michigan Public Service Commission next year to launch those services. But it could be several years before Michigan Bell gets apporval. Even the companies that are experimenting with the new services are doing so in only limited ways. South Central Bell, for example, covers Alabama, Missisipi, Louisiana, Tennessee and Kentucky, but is only testing its enhanced services in Natchez, a town of only 20,000 people. "We're interested in expanding the service as the technology is availiable." says company representative Cathye MacDonald. $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ NOTA: This article goes on for about 5 more paragraphs. The rest of the things that are discussed: special phones that hold numbers, speech-synthesis dialers, voice dialers.. and from one paragraph about ESS: "The next big jump in smart phones may come when the phone companies completely go digital." The rest of the article talks about personal computers sending data at higher speeds, electronic banking, Pacific Bell offering bulletin boards, and using the phone to monitor utility use. The main part of the article describes CLASS or LASS. Experimental systems such as the one described have been expanded to more are$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$