[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]


..[ Phrack Magazine ]..
.:: The Open Barn Door ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ] [ 70 ] [ 71 ]
Current issue : #39 | Release date : 1992-06-26 | Editor : Dispater
IntroductionDispater
Phrack LoopbackPhrack Staff
Phrack Pro-Phile on Shadow Hawk 1Shadow Hawk 1 & Dispater
Network Miscellany VDatastream Cowboy
DIALOG Information NetworkBrian Oblivion
Centigram Voice Mail System Consolesunknown
Special Area Codes IIBill Huttig
Air Fone FrequenciesLeroy Donnelly
The Open Barn DoorDouglas Waller
PWN/Part 1Datastream Cowboy
PWN/Part 2Datastream Cowboy
PWN/Part 3Datastream Cowboy
PWN/Part 4Datastream Cowboy
Title : The Open Barn Door
Author : Douglas Waller
                                ==Phrack Inc.==

                  Volume Four, Issue Thirty-Nine, File 9 of 13

                               THE OPEN BARN DOOR

                  U.S. Firms Face A Wave Of Foreign Espionage

                               By Douglas Waller
                         Newsweek, May 4, 1992, Page 58


     It's tough enough these days for American companies to compete with their
Pacific Rim rivals, even when the playing field is level.  It's a lot tougher
when your trade secrets are peddled by competitors.  One Dallas computer
maker, for example, recently spotted its sensitive pricing information in the
bids of a South Korean rival.  The firm hired a detective agency, Phoenix
Investigations, which found an innocent-looking plastic box in a closet at its
headquarters.  Inside was a radio transmitter wired to a cable connected to a
company fax machine.  The bug had been secretly installed by a new worker -- a
mole planted by the Korean company.  "American companies don't believe this
kind of stuff can happen," says Phoenix president Richard Aznaran.  "By the
time they come to us the barn door is wide open."

     Welcome to a world order where profits have replaced missiles as the
currency of power.  Industrial espionage isn't new, and it isn't always
illegal, but as firms develop global reach, they are acquiring new
vulnerability to economic espionage.  In a survey by the American Society for
Industrial Security last year, 37 percent of the 165 U.S. firms responding said
they had been targets of spying.  The increase has been so alarming that both
the CIA and the FBI have beefed up their economic counterintelligence programs.
The companies are mounting more aggressive safeguards, too.  Kellog Company has
halted public tours at its Battle Creek, Michigan, facility because spies were
slipping in to photograph equipment.  Eastman Kodak Company classifies
documents, just like the government.  Lotus Development Corporation screens
cleaning crews that work at night.  "As our computers become smaller, it's
easier for someone to walk off with one," says Lotus spokesperson Rebecca Seel.

     To be sure, some U.S. firms have been guilty of espionage themselves --
though they tend not to practice it overseas, because foreign companies have a
tighter hold on their secrets.  And American companies now face an additional
hazard:  The professional spy services of foreign nations.  "We're finding
intelligence organizations from countries we've never looked at before who are
active in the U.S.," says the FBI's R. Patrick Watson.  Foreign intelligence
agencies traditionally thought friendly to the United States "are trying to
plant moles in American high-tech companies [and] search the briefcases of
American business men traveling overseas," warns CIA Director Robert Gates.
Adds Noell Matchett, a former National Security Agency official:  "What we've
got is this big black hole of espionage going on all over the world and a naive
set of American business people being raped."

     No one knows quite how much money U.S. businesses lost to this black hole.
Foreign governments refuse to comment on business intelligence they collect.
The victims rarely publicize the espionage or report it to authorities for fear
of exposing vulnerabilities to stockholders.  But more than 30 companies and
security experts NEWSWEEK contacted claimed billions of dollars are lost
annually from stolen trade secrets and technology.  This week a House Judiciary
subcommittee is holding hearings to assess the damage.  IBM, which has been
targeted by French and Japanese intelligence operations, estimates $1 billion
lost from economic espionage and software piracy.  IBM won't offer specifics,
but says that the espionage "runs the gamut from items missing off loading
docks to people looking over other people's shoulders in airplanes."

     Most brazen: France's intelligence service, the Direction Generale de la
Securite Exterieure (DGSE), has been the most brazen about economic espionage,
bugging seats of businessmen flying on airliners and ransacking their hotel
rooms for documents, say intelligence sources.  Three years ago the FBI
delivered private protests to Paris after it discovered DGSE agents trying to
infiltrate European branch offices of IBM and Texas Instruments to pass secrets
to a French competitor.  The complaint fell on deaf ears.  The French
intelligence budget was increased 9 percent this year, to enable the hiring of
1,000 new employees.  A secret CIA report recently warned of French agents
roaming the United States looking for business secrets.  Intelligence sources
say the French Embassy in Washington has helped French engineers spy on the
stealth technology used by American warplane manufacturers.  "American
businessmen who stay in Paris hotels should still assume that the contents of
their briefcases will be photocopied," says security consultant Paul Joyal.
DGSE officials won't comment.

     The French are hardly alone in business spying.  NSA officials suspect
British intelligence of monitoring the overseas phone calls of American firms.
Investigators who just broke up a kidnap ring run by former Argentine
intelligence and police officials suspect the ring planted some 500 wiretaps on
foreign businesses in Buenos Aires and fed the information to local firms.  The
Ackerman Group Inc., a Miami consulting firm that tracks espionage, recently
warned clients about Egyptian intelligence agents who break into the hotel
rooms of visiting execs with "distressing frequency."

     How do the spies do it?  Bugs and bribes are popular tools.  During a
security review of a U.S. manufacturer in Hong Kong, consultant Richard
Hefferman discovered that someone had tampered with the firm's phone-switching
equipment in a closet.  He suspects that agents posing as maintenance men
sneaked into the closet and reprogrammed the computer routing phone calls so
someone outside the building -- Heffernan never determined who -- could listen
in simply by punching access codes into his phone.  Another example:  After
being outbid at the last minute by a Japanese competitor, a Midwestern heavy
manufacturer hired Parvus Company, a Maryland security firm made up mostly of
former CIA and NSA operatives.  Parvus investigators found that the Japanese
firm had recruited one of the manufacturer's midlevel managers with a drug
habit to pass along confidential bidding information.

     Actually, many foreign intelligence operations are legal.  "The science
and technology in this country is theirs for the taking so they don't even have
to steal it," says Michael Sekora of Technology Strategic Planning, Inc.  Take
company newsletters, which are a good source of quota data.  With such
information in hand, a top agent can piece together production rates.
American universities are wide open, too: Japanese engineers posing as students
feed back to their home offices information on school research projects.
"Watch a Japanese tour team coming through a plant or convention," says Robert
Burke with Monsanto Company.  "They video everything and pick up every sheet of
paper."

     Computer power:  In the old days a business spy visited a bar near a plant
to find loose-lipped employees.  Now all he needs is a computer, modem and
phone.  There are some 10,000 computer bulletin boards in the United States --
informal electronic networks that hackers, engineers, scientists and
government bureaucrats set up with their PCs to share business gossip, the
latest research on aircraft engines, even private White House phone numbers.

     An agent compiles a list of key words for the technology he wants, which
trigger responses from bulletin boards.  Then, posing as a student wanting
information, he dials from his computer the bulletin boards in a city where
the business is located and "finds a Ph.D. who wants to show off," says Thomas
Sobczak of Application Configured Computers, Inc.  Sobczak once discovered a
European agent using a fake name who posed questions about submarine engines to
a bulletin board near Groton, Connecticut.  The same questions, asked under a
different hacker's name, appeared on bulletin boards in Charleston, South
Carolina, and Bremerton, Washington.  Navy submarines are built or based at all
three cities.

     Using information from phone intercepts, the NSA occasionally tips off
U.S. firms hit by foreign spying.  In fact, Director Gates has promised he'll
do more to protect firms from agents abroad by warning them of hostile
penetrations.  The FBI has expanded its economic counterintelligence program.
The State Department also has begun a pilot program with 50 Fortune 500
companies to allow their execs traveling abroad to carry the same portable
secure phones that U.S. officials use.

     But U.S. agencies are still groping for a way to join the business spy
war.  The FBI doesn't want companies to have top-of-the-line encryption devices
for fear the bureau won't be able to break their codes to tap phone calls in
criminal investigations.  And the CIA is moving cautiously because many of the
foreign intelligence services "against whom you're going to need the most
protection tend to be its closest friends," says former CIA official George
Carver.  Even American firms are leery of becoming too cozy with their
government's agents.  But with more foreign spies coming in for the cash,
American companies must do more to protect their secrets.

                              How the Spies Do It

MONEY TALKS

     Corporate predators haven't exactly been shy about greasing a few palms.
In some cases they glean information simply by bribing American employees.  In
others, they lure workers on the pretense of hiring them for an important job,
only to spend the interview pumping them for information.  If all else fails,
the spies simply hire the employees away to get at their secrets, and chalk it
all up to the cost of doing business.

STOP, LOOK, LISTEN

     A wealth of intelligence is hidden in plain sight -- right inside public
records such as stockholder reports, newsletters, zoning applications and
regulatory filings.  Eavesdropping helps, too.  Agents can listen to execs'
airplane conversations from six seats away.  Some sponsor conferences and
invite engineers to present papers.  Japanese businessmen are famous for
vacuuming up handouts at conventions and snapping photos on plant tours.

BUGS

     Electronic transmitters concealed inside ballpoint pens, pocket
calculators and even wall paneling can broadcast conversations in sensitive
meetings.  Spies can have American firms' phone calls rerouted from the
switching stations to agents listening in.  Sometimes, they tap cables attached
to fax machines.

HEARTBREAK HOTEL

     Planning to leave your briefcase back at the hotel?  The spooks will love
you.  One of their ploys is to sneak into an room, copy documents and pilfer
computer disks.  Left your password sitting around?  Now they have entry to
your company's entire computer system.
_______________________________________________________________________________
[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2024, Phrack Magazine.