Phantom Access
   HOME

TheInfoList



OR:

Phantom Access was the name given to a series of hacking programs written by Patrick Kroupa (a.k.a., Lord Digital) of
LOD Lod (, ), also known as Lydda () and Lidd (, or ), is a city southeast of Tel Aviv and northwest of Jerusalem in the Central District of Israel. It is situated between the lower Shephelah on the east and the coastal plain on the west. The ci ...
. The programs were worked on during the early to mid-1980s (1982–1986), and designed to run on the
Apple II Apple II ("apple Roman numerals, two", stylized as Apple ][) is a series of microcomputers manufactured by Apple Computer, Inc. from 1977 to 1993. The Apple II (original), original Apple II model, which gave the series its name, was designed ...
computer and Novation CAT#The Apple-CAT II, Apple-Cat modem.


History

There are a variety of references to the Phantom Access programs in texts from underground bulletin board systems from the 1980s. Reading the files and messages, it appears that the Phantom Access name was a given to an entire series of programs coded by Lord Digital and apparently for internal LOD use, because the programs were not distributed to the "public" or even most other members of the
hacker A hacker is a person skilled in information technology who achieves goals and solves problems by non-standard means. The term has become associated in popular culture with a security hackersomeone with knowledge of bug (computing), bugs or exp ...
underground of the time. Much like Festering Hate, there are references to the programs in a variety of mainstream press articles of the early and mid 90s when
MindVox MindVox was an early Internet service provider in New York City. The service was referred to as "the Hells Angels of Cyberspace". The service was founded in 1991 by Bruce Fancher ( Dead Lord) and Patrick Kroupa ( Lord Digital), two former me ...
first came online. Phantom Access is also where the parent company that launched MindVox, Phantom Access Technologies, took its name from.


Program Content

Despite obviously being made for internal (rather than public/commercial) release, Phantom Access contains many of the qualities that would be more expected of a commercial release. The use of graphics (including animation), utility programs, extensive formatted documentation and sample "sub-modules" which contain instructions for the Phantom Access program itself is unusual for a program of this kind at this time due to the amount of work involved in setting up those elements when the expectation would be that the limited user-base would be able to manage without them. In addition to the functional aspects of the program there was also bundled
easter egg Easter eggs, also called Paschal eggs, are eggs that are decorated for the Christian holiday of Easter, which celebrates the resurrection of Jesus. As such, Easter eggs are commonly used during the season of Eastertide (Easter season). The ...
type media such as random poems, and
Pink Floyd Pink Floyd are an English Rock music, rock band formed in London in 1965. Gaining an early following as one of the first British psychedelic music, psychedelic groups, they were distinguished by their extended compositions, sonic experiments ...
lyrics.


Phantom Access 5.7K

The Phantom Access disks that were leaked, contained one full Apple II disk side of software and an additional disk of documentation written about the programs. There is another text archive of messages from the era that were apparently posted when Phantom Access was leaked to The Underground BBS in the late 80s. The programs come on a disk formatted with ZDOS (Zilog DOS), a common operating system used with a
Z80 The Zilog Z80 is an 8-bit microprocessor designed by Zilog that played an important role in the evolution of early personal computing. Launched in 1976, it was designed to be software-compatible with the Intel 8080, offering a compelling altern ...
co-processor add-on to the Apple II. Messages from the era indicate that the Phantom Access leak may contain a virus, and taking into account Festering Hate, it is certainly possible. Phantom Access itself appears to be a highly-programmable common interface, which follows instructions contained in a variety of files. At the topmost level it seems to be a toolkit for utilizing all the special functions of the Apple-Cat modem, it scans systems, hacks codes, functions as a
blue box A blue box is an Electronics, electronic device that produces tones used to generate the in-band signaling tones formerly used within the North American long-distance telephone network to send line status and called number information over voi ...
, and exports the results into a series of files which can be manipulated using all the other programs in the series. A quote from the Phantom Access Documentation: :''Phantom Access 5.7K is the hacker itself. It could be described as the final processing unit of the instruction sets, but without the utilities it would be useless to the end user, as that is ALL it is. Sub-Modules must already exist prior to usage. This was a necessary compromise, as there is NO memory left on a 64K system once the Slider's and Rotation system are activated.'' It uses EXEC files as a form of primitive scripting for the Apple II. Reading through the messages of the era, the scripts are doing direct writes to various registers and parts of
memory Memory is the faculty of the mind by which data or information is encoded, stored, and retrieved when needed. It is the retention of information over time for the purpose of influencing future action. If past events could not be remembe ...
using the
POKE Poke may refer to: Arts, entertainment, and media * Poke (Ender's Game), Poke (''Ender's Game''), a fictional character * Poke (game), a two-player card game * Poke, a fictional bar owner in the television series ''Treme (season 2), Treme'' * The ...
command. The programs regularly check memory to see what is running or loaded and generally seem to take over control of the computer.


Final Evolution

Lacking an Apple II computer and Apple-Cat modem, in addition to their historical value, perhaps the most useful and interesting part of the Phantom Access programs is the extensive documentation Kroupa wrote. In addition to explaining how to program the sub-modules, the documents provide an extensive overview of phreaking information, information about the other programs in the Phantom Access series (which appear to have been other system penetration tools and
rootkit A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the exist ...
s, before the term "rootkit" existed), and the eventual goal of the whole series, which seems to have been turning the entire Apple II computer and Apple-Cat modem into a programmable phreaking box, which could be plugged into the computers Kroupa and other LOD members were abandoning the Apple platform and switching over to (
NeXT NeXT, Inc. (later NeXT Computer, Inc. and NeXT Software, Inc.) was an American technology company headquartered in Redwood City, California that specialized in computer workstations for higher education and business markets, and later develope ...
,
Sun The Sun is the star at the centre of the Solar System. It is a massive, nearly perfect sphere of hot plasma, heated to incandescence by nuclear fusion reactions in its core, radiating the energy from its surface mainly as visible light a ...
and SGI hardware). From the Phantom Access documentation: :''The eventual goal of Phantom Access was to realize a fully automated system for the Apple-Cat modem. The sound sampling and evaluation system has been almost unchanged from revision 4.0 to 5.7 of the series, everything else has been rewritten several times. The final 6.6 revision is a full implementation of the original design (read: it has very little in common with anything in the 5.7 series) with a final processor that is capable of passing data through the Apple-Cat's serial port to an external machine, thus allowing use of the entire Apple computer system as nothing more than a very sophisticated auxiliary modem.'' Towards the late 80s, it looks like Kroupa and LOD had exactly one use left for the Apple II: to utilize the entire computer as a host for the Apple-Cat modem. This makes a very strong statement about how highly valued Novation's, Apple-Cat modem was amongst
phone phreaks Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks. The term ''phreak'' is a sen ...
. :''This was my solution to working within the Apple's limits. No other modem comes close to having the Apple-Cat's capabilities, but the Apple itself leaves much to be desired.''


Historical Exhibit

Due to its nature as a product designed for a limited set of users, Phantom Access remained extremely obscure to the general public until it was featured by digital historian and
film-maker Filmmaking or film production is the process by which a motion picture is produced. Filmmaking involves a number of complex and discrete stages, beginning with an initial story, idea, or commission. Production then continues through screenwritin ...
,
Jason Scott Jason Scott Sadofsky (born September 13, 1970) is an American archivist, historian of technology, filmmaker, performer, and actor. Scott has been known by the online pseudonyms Sketch, SketchCow, Sketch The Cow, The Slipped Disk, and textfiles. ...
as the first exhibit on textfiles.com, in January 2006.Introduction of Phantom Access Exhibit, by Jason Scott
(Retrieved from Textfiles.com)


External links


Phantom Access Exhibit


References

{{MindVox Wikipedia articles with ASCII art MindVox Legion of Doom (hacker group) Phreaking