Phantom Access


Phantom Access was the name given to a series of hacking programs written by Patrick Kroupa of LOD. The programs were worked on during the early to mid 80s, and designed to run on the Apple II computer and Apple-Cat modem.

History

There are a variety of references to the Phantom Access programs in texts from underground Bulletin Board Systems from the 80s,. Reading the files and messages, it appears that the Phantom Access name was a given to an entire series of programs coded by Lord Digital and apparently for internal LOD use, because the programs were not distributed to the "public" or even most other members of the hacker underground of the time.
Much like Festering Hate, there are references to the programs in a variety of mainstream press articles of the early and mid 90s when MindVox first came online,. Phantom Access is also where the parent company that launched MindVox, Phantom Access Technologies, took its name from.

Program Content

Despite obviously being made for internal release, Phantom Access contains many of the qualities that would be more expected of a commercial release. The use of graphics, utility programs, extensive formatted documentation and sample "sub-modules" which contain instructions for the Phantom Access program itself is unusual for a program of this kind at this time due to the amount of work involved in setting up those elements when the expectation would be that the limited user-base would be able to manage without them. In addition to the functional aspects of the program there was also bundled easter egg type media such as random poems, and Pink Floyd lyrics.

Phantom Access 5.7K

The Phantom Access disks that were leaked, contained one full Apple II disk side of software and an additional disk of documentation written about the programs. There is another text archive of messages from the era that were apparently posted when Phantom Access was leaked to The Underground BBS in the late 80s.
The programs come on a disk formatted with ZDOS, a common operating system used with a Z80 co-processor add-on to the Apple II. Messages from the era indicate that the Phantom Access leak may contain a virus, and taking into account Festering Hate, it is certainly possible.
Phantom Access itself appears to be a highly-programmable common interface, which follows instructions contained in a variety of files. At the topmost level it seems to be a toolkit for utilizing all the special functions of the Apple-Cat modem, it scans systems, hacks codes, functions as a blue box, and exports the results into a series of files which can be manipulated using all the other programs in the series.
A quote from the Phantom Access Documentation:
It uses EXEC files as a form of primitive scripting for the Apple II. Reading through the messages of the era, the scripts are doing direct writes to various registers and parts of memory using the POKE command. The programs regularly check memory to see what is running or loaded and generally seem to take over control of the computer.

Final Evolution

Lacking an Apple II computer and Apple-Cat modem, in addition to their historical value, perhaps the most useful and interesting part of the Phantom Access programs is the extensive documentation Kroupa wrote. In addition to explaining how to program the sub-modules, the documents provide an extensive overview of phreaking information, information about the other programs in the Phantom Access series, and the eventual goal of the whole series, which seems to have been turning the entire Apple II computer and Apple-Cat modem into a programmable phreaking box, which could be plugged into the computers Kroupa and other LOD members were abandoning the Apple platform and switching over to.
From the Phantom Access documentation:
Towards the late 80s, it looks like Kroupa and LOD had exactly one use left for the Apple II: to utilize the entire computer as a host for the Apple-Cat modem. This makes a very strong statement about how highly valued Novation's, Apple-Cat modem was amongst phone phreaks.

Historical Exhibit

Due to its nature as a product designed for a limited set of users, Phantom Access remained extremely obscure to the general public until it was featured by digital historian and film-maker, Jason Scott as the first exhibit on textfiles.com, in January 2006.