Phantom Access was the name given to a series of hacking programs written by
Patrick Kroupa
Patrick Karel Kroupa (also known as Lord Digital, born January 20, 1969) is an American writer, hacker and activist. Kroupa was a member of the Legion of Doom and Cult of the Dead Cow hacker groups and co-founded MindVox in 1991, with Bruce Fan ...
(a.k.a.,
Lord Digital
Patrick Karel Kroupa (also known as Lord Digital, born January 20, 1969) is an American writer, hacker and activist. Kroupa was a member of the Legion of Doom and Cult of the Dead Cow hacker groups and co-founded MindVox in 1991, with Bruce Fanc ...
) of
LOD
Lod ( he, לוד, or fully vocalized ; ar, اللد, al-Lidd or ), also known as Lydda ( grc, Λύδδα), is a city southeast of Tel Aviv and northwest of Jerusalem in the Central District of Israel. It is situated between the lower Shephe ...
. The programs were worked on during the early to mid-1980s (1982–1986), and designed to run on the
Apple II
The Apple II (stylized as ) is an 8-bit home computer and one of the world's first highly successful mass-produced microcomputer products. It was designed primarily by Steve Wozniak; Jerry Manock developed the design of Apple II's foam-mold ...
computer and
Apple-Cat modem
A modulator-demodulator or modem is a computer hardware device that converts data from a digital format into a format suitable for an analog transmission medium such as telephone or radio. A modem transmits data by modulating one or more c ...
.
History
There are a variety of references to the Phantom Access programs in texts from underground
bulletin board system
A bulletin board system (BBS), also called computer bulletin board service (CBBS), is a computer server running software that allows users to connect to the system using a terminal program. Once logged in, the user can perform functions such ...
s from the 1980s. Reading the files and messages, it appears that the Phantom Access name was a given to an entire series of programs coded by Lord Digital and apparently for internal LOD use, because the programs were not distributed to the "public" or even most other members of the
hacker
A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term ''hacker'' has become associated in popu ...
underground
Underground most commonly refers to:
* Subterranea (geography), the regions beneath the surface of the Earth
Underground may also refer to:
Places
* The Underground (Boston), a music club in the Allston neighborhood of Boston
* The Underground ( ...
of the time.
Much like
Festering Hate, there are references to the programs in a variety of mainstream press articles of the early and mid 90s when
MindVox first came online,. Phantom Access is also where the parent company that launched MindVox,
Phantom Access Technologies, took its name from.
Program Content
Despite obviously being made for internal (rather than public/commercial) release, Phantom Access contains many of the qualities that would be more expected of a commercial release. The use of graphics (including animation), utility programs, extensive formatted documentation and sample "sub-modules" which contain instructions for the Phantom Access program itself is unusual for a program of this kind at this time due to the amount of work involved in setting up those elements when the expectation would be that the limited user-base would be able to manage without them. In addition to the functional aspects of the program there was also bundled
easter egg
Easter eggs, also called Paschal eggs, are eggs that are decorated for the Christian feast of Easter, which celebrates the resurrection of Jesus. As such, Easter eggs are common during the season of Eastertide (Easter season). The oldest trad ...
type media such as random poems, and
Pink Floyd
Pink Floyd are an English rock band formed in London in 1965. Gaining an early following as one of the first British psychedelic groups, they were distinguished by their extended compositions, sonic experimentation, philosophical lyrics an ...
lyrics.
Phantom Access 5.7K
The Phantom Access disks that were leaked, contained one full
Apple II disk side of software and an additional disk of documentation written about the programs. There is another text archive of messages from the era that were apparently posted when Phantom Access was leaked to The Underground BBS in the late 80s.
The programs come on a disk formatted with ZDOS (Zilog DOS), a common operating system used with a
Z80
The Z80 is an 8-bit microprocessor introduced by Zilog as the startup company's first product. The Z80 was conceived by Federico Faggin in late 1974 and developed by him and his 11 employees starting in early 1975. The first working samples were ...
co-processor add-on to the Apple II. Messages from the era indicate that the Phantom Access leak may contain a virus, and taking into account
Festering Hate, it is certainly possible.
Phantom Access itself appears to be a highly-programmable common interface, which follows instructions contained in a variety of files. At the topmost level it seems to be a toolkit for utilizing all the special functions of the Apple-Cat modem, it scans systems, hacks codes, functions as a
blue box
A blue box is an electronic device that produces tones used to generate the in-band signaling tones formerly used within the North American long-distance telephone network to send line status and called number information over voice circuits. ...
, and exports the results into a series of files which can be manipulated using all the other programs in the series.
A quote from the Phantom Access Documentation:
:''Phantom Access 5.7K is the hacker itself. It could be described as the final processing unit of the instruction sets, but without the utilities it would be useless to the end user, as that is ALL it is. Sub-Modules must already exist prior to usage. This was a necessary compromise, as there is NO memory left on a 64K system once the Slider's and Rotation system are activated.''
It uses
EXEC Exec or EXEC may refer to:
* Executive officer, a person responsible for running an organization
* Executive producer, provides finance and guidance for the making of a commercial entertainment product
* A family of kit helicopters produced by Rot ...
files as a form of primitive scripting for the Apple II. Reading through the messages of the era, the scripts are doing direct writes to various
registers and parts of
memory
Memory is the faculty of the mind by which data or information is encoded, stored, and retrieved when needed. It is the retention of information over time for the purpose of influencing future action. If past events could not be remembered ...
using the
POKE command. The programs regularly check memory to see what is running or loaded and generally seem to take over control of the computer.
Final Evolution
Lacking an Apple II computer and Apple-Cat modem, in addition to their historical value, perhaps the most useful and interesting part of the Phantom Access programs is the extensive documentation Kroupa wrote. In addition to explaining how to program the sub-modules, the documents provide an extensive overview of phreaking information, information about the other programs in the Phantom Access series (which appear to have been other system penetration tools and
rootkit
A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the exis ...
s, before the term "rootkit" existed), and the eventual goal of the whole series, which seems to have been turning the entire Apple II computer and Apple-Cat modem into a programmable phreaking box, which could be plugged into the computers Kroupa and other LOD members were abandoning the Apple platform and switching over to (
NeXT
Next may refer to:
Arts and entertainment Film
* ''Next'' (1990 film), an animated short about William Shakespeare
* ''Next'' (2007 film), a sci-fi film starring Nicolas Cage
* '' Next: A Primer on Urban Painting'', a 2005 documentary film
Lit ...
,
Sun
The Sun is the star at the center of the Solar System. It is a nearly perfect ball of hot plasma, heated to incandescence by nuclear fusion reactions in its core. The Sun radiates this energy mainly as light, ultraviolet, and infrared rad ...
and
SGI hardware).
From the Phantom Access documentation:
:''The eventual goal of Phantom Access was to realize a fully automated system for the Apple-Cat modem. The sound sampling and evaluation system has been almost unchanged from revision 4.0 to 5.7 of the series, everything else has been rewritten several times. The final 6.6 revision is a full implementation of the original design (read: it has very little in common with anything in the 5.7 series) with a final processor that is capable of passing data through the Apple-Cat's serial port to an external machine, thus allowing use of the entire Apple computer system as nothing more than a very sophisticated auxiliary modem.''
Towards the late 80s, it looks like Kroupa and LOD had exactly one use left for the Apple II: to utilize the entire computer as a host for the Apple-Cat modem. This makes a very strong statement about how highly valued
Novation's, Apple-Cat modem was amongst
phone phreaks
Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks. The term ''phreak'' is a ...
.
:''This was my solution to working within the Apple's limits. No other modem comes close to having the Apple-Cat's capabilities, but the Apple itself leaves much to be desired.''
Historical Exhibit
Due to its nature as a product designed for a limited set of users, Phantom Access remained extremely obscure to the general public until it was featured by
digital historian and
film-maker
Filmmaking (film production) is the process by which a Film, motion picture is #Production, produced. Filmmaking involves a number of complex and discrete stages, starting with an initial story, idea, or commission. It then continues through scr ...
,
Jason Scott
Jason Scott Sadofsky (born September 13, 1970), more commonly known as Jason Scott, is an American archivist, historian of technology, filmmaker, performer, and actor. Scott has been known by the online pseudonyms Sketch, SketchCow, The Slipped ...
as the first exhibit on
textfiles.com
textfiles.com is a website dedicated to preserving the digital documents that contain the history of the bulletin board system (BBS) world and various subcultures, and thus providing "a glimpse into the history of writers and artists bound by t ...
, in January 2006.
Introduction of Phantom Access Exhibit, by Jason Scott
(Retrieved from Textfiles.com
textfiles.com is a website dedicated to preserving the digital documents that contain the history of the bulletin board system (BBS) world and various subcultures, and thus providing "a glimpse into the history of writers and artists bound by t ...
)
External links
Phantom Access Exhibit
References
{{MindVox
Wikipedia articles with ASCII art
MindVox
Legion of Doom (hacker group)
Phreaking