2597 lines
127 KiB
Plaintext
2597 lines
127 KiB
Plaintext
+=============================================================================+
|
|
| ## ## ## ###### ###### ###### ### ### ###### ###### ## ## ## |
|
|
| ## ### ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## |
|
|
| ## ## ### ##### ## ## ###### ## ## ###### ## ## #### |
|
|
| ## ## ## ## ###### ## ## ## ## ## ## ## ## ## ## |
|
|
+=============================================##==============================+
|
|
| Apr 24, 1992|
|
|
| [ The Journal of Privileged Information ] |
|
|
| |
|
|
+-----------------------------------------------------------------------------+
|
|
| Issue 03 By: 'Above the Law' |
|
|
+-----------------------------------------------------------------------------+
|
|
| |
|
|
|Informatik--Bringing you all the information you should know... |
|
|
| and a lot you shouldn't... |
|
|
| |
|
|
+=============================================================================+
|
|
|
|
|
|
|
|
/* Introduction */
|
|
By the Informatik staff
|
|
|
|
Welcome to Issue number 3 of Informatik Journal. It's been a
|
|
whopping 3 months since we released our last issue, but at least our time
|
|
table matches that of 2600. Sorry this took so long, but guess what. . .
|
|
we had a hell of a time getting submissions AGAIN. How about putting your
|
|
creative talents to use and writing some articles so we can release
|
|
Informatik a bit more frequently.
|
|
|
|
For our new readers, Informatik is an electronic journal containing
|
|
information that is for one reason or another usually withheld from the
|
|
public. Sometimes it is for "security" reasons, and other times it is simply
|
|
because it is felt that the public does not need to know. Hogwash we say!
|
|
Information is power! Have they something to hide? Are there things in this
|
|
world that we *gasp* just should not know about? I do not think so.
|
|
|
|
In other news, we have decided to reduce our news coverage to
|
|
strictly hack/phreak/fraud type events. No more general computer industry,
|
|
telecommunications news. Our friends at Phrack have that angle covered
|
|
admirably, and there's no reason to waste hard drive space with 60-70k per
|
|
issue of duplicate news items.
|
|
|
|
This issue brings us information on public telephone abuse by Brian
|
|
Oblivion. Could this be the end of red boxing? For you radio phreaks we have
|
|
the tools needed to track down those airphone transmissions, and information
|
|
on how law enforcement monitors suspects and how you can get in on the action.
|
|
Black Manta provides us with schematics on how you can build a simple universal
|
|
garage door opener. HiBias brings us a guide to TRW business reports that
|
|
explains just exactly what all those numbers mean, and another article
|
|
reveals the workings of those nifty credit card verification machines.
|
|
Tid-Bytes is back with some interesting blurbs, and the Hot Flashes of course
|
|
keeps you abreast on all sorts of goings on.
|
|
|
|
We'd like to thank you for your continued readership of Informatik,
|
|
and we'd love it if you recommended it to your friends and upload it to
|
|
your favorite boards, ftp sites, etc. Remember, subscriptions, submissions,
|
|
questions, or suggestions and comments can be sent to our Internet address:
|
|
|
|
inform@doc.cc.utexas.edu
|
|
|
|
That's all for now, see you next issue. . .
|
|
|
|
|
|
Mack Hammer & Sterling
|
|
[Editors]
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
===========================================
|
|
============== - CONTENTS - ===============
|
|
================ Issue 03 =================
|
|
======= Release date April 24, 1992 =======
|
|
===========================================
|
|
|
|
|
|
01) Issue #3 Introduction
|
|
By: Informatik Staff
|
|
|
|
02) Coin Services Update
|
|
By: Brian Oblivion
|
|
|
|
03) Law Enforcement Surveillance Scanning
|
|
By: Sterling
|
|
|
|
04) TRW Business Reports
|
|
By: HiBias
|
|
|
|
05) Building a Garage Door Hacker
|
|
By: Black Manta
|
|
|
|
06) Air Phone Frequency Allocation
|
|
By: Leroy Donnelly
|
|
|
|
07) Credit Card Authorization Machines
|
|
By: Emery Lapinski
|
|
|
|
08) Tid-Bytes--Misc Contributions
|
|
By: Informatik Staff
|
|
|
|
09) Hot Flashes--The Underground News Report
|
|
By: Various Sources
|
|
|
|
10) Submission and Subscription Information
|
|
By: Informatik Staff
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
*DISCLAIMER*
|
|
Informatik Journal is printed for informational purposes only. We
|
|
do not recommend or condone any illegal or fraudulent application of
|
|
the information found in this electronic magazine. As such, we
|
|
accept no liability for any criminal or civil disputes arising from
|
|
said information.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
|
|
***************************************************************************
|
|
* *
|
|
* Straight from the Bellyard: Coin Services Update *
|
|
* *
|
|
* by *
|
|
* Brian Oblivion *
|
|
* *
|
|
* *
|
|
* Courtesy of: Restricted-Data-Transmissions (RDT) *
|
|
* "Truth is cheap, but information costs." *
|
|
* *
|
|
* *
|
|
* 4/17/92 *
|
|
***************************************************************************
|
|
|
|
Introduction
|
|
- ------------
|
|
|
|
Public Telephones: we all know them, and how vulnerable they are
|
|
to fraudulent abuse. Well, so does Bellcore and NYNEX and they
|
|
have come up with a few methods on combatting fraudulent users.
|
|
|
|
Coin deposits by a typical patron of the public telephone are
|
|
communicated to the St Operator
|
|
Services System (OSS) by bursts of certain dual-tone signals. These
|
|
signals consist of the two frequencies 1.7 KHz and 2.2 KHz simul-
|
|
taneously, which are detected in end-office and tandem-office environ-
|
|
ments to provide accurate coin deposit detection.
|
|
|
|
There are two types of interference that are encountered by outside
|
|
origin. These are talkdown and talkoff. Talkdown is the failure to
|
|
recognize a valid dual-tone signal because of interference from
|
|
superimposed speech or other noise that may be from either the
|
|
originating coin line or the terminating end. Talkoff is the false
|
|
acceptance of speech, music, or background noises as valid coin
|
|
deposits. This obviously includes redbox tones, whistles, tape
|
|
reproductions, etc.
|
|
|
|
In order to combat the erroneous acceptance of false credit the
|
|
following methods have been defined and are to be employed
|
|
eventually (if they haven't already), according to recent
|
|
information.
|
|
|
|
Frequency Limits
|
|
- --------- ------
|
|
|
|
The detector must accept dual-tone signals if the frequencies
|
|
of both tones are within +/- 5% of their respective nominal
|
|
values of 1.7 KHz and 2.2 KHz. The detector must also reject
|
|
dual-tone signals if the frequency of either or both tones is
|
|
offset more than +/- 3.5% from its nominal value.
|
|
|
|
Frequency offsets of +/- 1.5 percent are the extremes expected from
|
|
properly designed and maintained coin telephones. The +/- 3.5 percent
|
|
constraint is imposed to minimize the width of the stop-band notch
|
|
filters in anti-fraud notch filters.
|
|
|
|
|
|
Signal Power and Twist
|
|
- ------ ----- --- -----
|
|
|
|
The detector must accept dual-tone signals if the individual
|
|
power levels of both tones are within 0 to -25 dBm0 and within
|
|
5 dB of each other. (Twist is the dB difference between
|
|
power levels of the two tones of a dual-tone signal)
|
|
|
|
The detector must reject dual-tone signals if the individual
|
|
poser level of either or both tones is below -30 dBm0.
|
|
|
|
The range 0 to -25 dBm0 is the maximum expected from properly designed
|
|
and maintained coin telephones and loops. The -30 dBm0 limit is
|
|
imposed to minimize the depth of the stop-band needed in anti-fraud
|
|
notch filters.
|
|
|
|
|
|
Pulse Timing
|
|
- ----- ------
|
|
|
|
Nickels, dimes, and quarters are represented by one, two, and five
|
|
dual-tone TONE-ON pulses. The dollar signal is represented by a
|
|
single long pulse. Each pulse is followed by a TONE-OFF interval.
|
|
The following chart shows the timing specifics for all coin generated
|
|
tones.
|
|
|
|
+----------------------------------------------------------------------------+
|
|
| | Within-Coin | End-of-coin Tone OFF (ms)|
|
|
|---------------------+-------------+-------------+-------+------+-----------|
|
|
| | TONE-ON (ms)| TONE-OFF(ms)| Must | Must |Allowed to |
|
|
| | Must Accept | Must Accept | Accept|Reject|Acc. or Rej|
|
|
|---------------------+-------------+-------------+-------+------+-----------|
|
|
| Nickel | 1 Pulse | 35 - 160 | ---- | >175 | <160 | 160 - 170 |
|
|
|---------+-----------+-------------+-------------+-------+------+-----------|
|
|
| Dime | 1st Pulse | 35 - 160 | 25 - 110 | | | |
|
|
|---------+-----------+-------------+-------------+-------+------+-----------|
|
|
| Dime | 2nd Pulse | 35 - 160 | ---- | > 75 | < 60 | 60 - 75 |
|
|
|---------+-----------+-------------+-------------+-------+------+-----------|
|
|
| Quarter | 1st Pulse | 20 - 100 | 20 - 110 | | | |
|
|
|---------+-----------+-------------+-------------+-------+------+-----------|
|
|
| Quarter | 2nd Pulse | 20 - 60 | 20 - 60 | | | |
|
|
|---------+-----------+-------------+-------------+-------+------+-----------|
|
|
| Quarter | 3rd Pulse | 20 - 60 | 20 - 60 | | | |
|
|
|---------+-----------+-------------+-------------+-------+------+-----------|
|
|
| Quarter | 4th Pulse | 20 - 60 | 20 - 60 | | | |
|
|
|---------+-----------+-------------+-------------+-------+------+-----------|
|
|
| Quarter | 5th Pulse | 20 - 100 | ---- | > 75 | < 60 | 60 - 75 |
|
|
|---------+-----------+-------------+-------------+-------+------+-----------|
|
|
| Dollar | 1 Pulse | 600 - 700 | ---- | > 75 | < 60 | 60 - 75 |
|
|
|---------+-----------+-------------+-------------+-------+------+-----------|
|
|
| Note: The detector is allowed to accept or reject tone-on and within-coin |
|
|
| tone-off durations outside their respective must-accept ranges. |
|
|
+----------------------------------------------------------------------------+
|
|
|
|
|
|
Methods of controlling talkdown and talkoff
|
|
- ------- -- ----------- -------- --- -------
|
|
|
|
Talkdown, is more of a transmission error problem that is generated
|
|
by interference from superimposed speech or ambient noise. This
|
|
noise comes from the originating coin line or from the terminating
|
|
end. Talkdown results in the failure of the detector to recognize
|
|
a valid dual-tone signal.
|
|
|
|
One of the main sources of talkdown is the improper muting of the voice
|
|
path during tone generation. This attenuated speech or ambient noise
|
|
power is superimposed on the coin signals which corrupts the signal.
|
|
|
|
Muting is accomplished by shorting out the speech path with a cap-
|
|
acitor. Minimum muting attenuation is 15 dB at 300 Hz, 25 dB at
|
|
1000 Hz, and 35 dB at 3000 Hz. The attenuated speech or ambient
|
|
noise power is superimposed on the coin signals which could cause
|
|
talkdown.
|
|
|
|
Some talkdown is also generated from the called party, operator
|
|
speech, or automated announcements. These signals can only reach
|
|
the detector by reflection through the trans-hybrid path at a 3-to-4
|
|
wire junction, which is usually located in the originating end
|
|
office.
|
|
|
|
|
|
Talkoff
|
|
- -------
|
|
|
|
Talkoff is the false acceptance of speech, music or background
|
|
noises as valid coin deposit signals by a detector. This is
|
|
what registers a valid deposit when no actual money is deposited.
|
|
|
|
In order to combat, a few countermeasures are expected to be employed.
|
|
|
|
o The call must be terminated or routed to an operator if the
|
|
total amount due for an initial deposit or a subsequent deposit
|
|
has been received within an overall session timeout period.
|
|
|
|
o The overall session timeout must be an adjustable parameter with
|
|
a default value of 45 to 50 seconds.
|
|
|
|
Intentional talkoff can be induced by playing loud music into the
|
|
coin telephone by doing this one hopes to get the detectors to produce
|
|
too many talkoff clusters. A talkoff cluster is a group of talkoffs
|
|
occurring within any 5-minute interval. Single quarter or dollar
|
|
talkoffs are also included in this definition of a cluster. In order
|
|
to combat this the following measures are being taken.
|
|
|
|
o Total talkoffs must not exceed 12 dollars in 70 hours of continuous
|
|
speech or music at a volume level of 0 vu referred to 0 TLP or,
|
|
instead, at an active speech level of +1 dBm0.
|
|
|
|
o The detector must not produce more than 12 talkoff clusters that
|
|
exceed 20, or 40, or 95 cents in 70 hours of continuous speech or
|
|
music at a volume level of 0vu referred to 0 TLP or, instead, at
|
|
an active speech level of +1 dBm0.
|
|
|
|
o Total talkoffs must not exceed 2 dollars in 200 hours of continuous
|
|
speech or music at -17 vu referred to 0 TLP or, instead, at an active
|
|
speech level of -16 dBm0.
|
|
|
|
|
|
Coin-Operated Telephone Fraud
|
|
- ------------- --------- -----
|
|
|
|
Fraud is possible by acoustically coupling accurate coin deposit
|
|
signals into the mouthpiece of the originating coin telephone, or
|
|
>from the called party end. Fraudulent signals coming from the
|
|
coin telephone end can only be stopped within the coin telephone
|
|
with a notch filter to filter out any external fraudulent signals.
|
|
|
|
In order to combat Fraudulent usage the following will be enacted.
|
|
|
|
o End- or tandem-office switching systems will be equipped with
|
|
detectors that monitor signals from the originating coin line.
|
|
|
|
The following methods combat far-end fraud:
|
|
|
|
o Sensing the direction of received coin signals and only
|
|
registering those coming from the coin line.
|
|
|
|
o Increasing the trans-hybrid path loss (using echo cancelers to
|
|
knock down the fraudulent signal's signal strength to that under
|
|
the detector's recognition threshold.)
|
|
|
|
o Inserting a 2200-Hz notch filter in the voice transmission path
|
|
from the far end only when the detector is expecting coin deposits.
|
|
The filters 3 dB bandwidth must be less than 600 Hz centered on
|
|
2200 Hz. and the out-of-band attenuation below 1500 Hz and above
|
|
3000 Hz must be less than 1 dB.
|
|
|
|
|
|
Conclusion
|
|
- ----------
|
|
|
|
The BOCs are now taking action against 'Redboxing' as well as
|
|
against some of their own equipment defects. It was only a matter
|
|
of time, of course. I have no idea how long this conversion will
|
|
take or even if it has started. There has been some indication
|
|
as some start of an anti-fraud campaign in my local area. I have
|
|
gotten word from some people that coin operated telephones have
|
|
not been accepting tones. I am unaware if these machines were
|
|
BOC operated or if they were COCOTS. I believe them to be BOC
|
|
coin operated telephones.
|
|
|
|
- -----------------------------------------------------------------
|
|
|
|
Brian Oblivion can be reached at Oblivion@ATDT.ORG. RDT welcomes
|
|
any questions or comments you may have -- especially any new
|
|
information you may have.
|
|
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
|
|
/\
|
|
/\ / \
|
|
__________/ \ / \ ____________________________________________________
|
|
\/ \ /
|
|
\/
|
|
|
|
Law Enforcement Surveillance Scanning
|
|
|
|
by Sterling
|
|
/\
|
|
/\ / \
|
|
____________________________________________/ \ / \ _________________
|
|
\/ \ /
|
|
\/
|
|
|
|
|
|
|
|
Now days it seems that Big Brother is always listening in. Wherever you
|
|
are, whatever you do, there is a good chance that your private conversations
|
|
aren't so private. The FBI, Secret Service, DEA, local police, and dozens of
|
|
other government agencies are definitely interested in what you have to say.
|
|
What can we do about this? Well, unfortunately they have the badges and the
|
|
guns, so we may as well get used to it. Since we can't beat'em, might as well
|
|
enjoy it, understand it, and learn something from it.
|
|
|
|
|
|
Mikes and Bugs
|
|
~~~~~~~~~~~~~~
|
|
Most FCC legal devices are found in the 150 to 174 MHz band, and other,
|
|
limited parts of the 40 to 952 MHz range. Here is a list of FCC approved bands
|
|
for wireless mike, room bugs, and body mikes. Also note that other bands MAY
|
|
be used with special FCC permission. (An "*" indicates a band that may be used
|
|
by vehicle tracking transmitters. More on that later)
|
|
|
|
42.02 to 42.94 MHz
|
|
44.62 to 46.58 MHz
|
|
47.02 to 47.50 MHz
|
|
72.00 to 76.00 MHz
|
|
150.995 to 151.49 MHz *
|
|
153.74 to 154.445 MHz *
|
|
154.635 to 156.25 MHz *
|
|
157.05 to 157.11 MHz
|
|
158.715 to 159.645 MHz
|
|
166.25 to ------ MHz
|
|
170.15 to 173.40 MHz
|
|
453.05 to 453.95 MHz
|
|
458.05 to 458.95 MHz
|
|
460.025 to 460.625 MHz
|
|
462.95 to 462.975 MHz
|
|
465.025 to 465.625 MHz
|
|
467.95 to 467.975 MHz
|
|
470.00 to 512.00 MHz
|
|
821.00 to 824.00 MHz
|
|
866.00 to 869.00 MHz
|
|
|
|
|
|
If the purpose of the surveillance is not going to be used for criminal
|
|
prosecution, agencies are reported to work outside of FCC restrictions to
|
|
avoid detection. Though the FCC declares them illegal, devices have been
|
|
found that work in the government, TV broadcast, and even aero bands. The
|
|
following areas of the spectrum are known to be used on occasion:
|
|
|
|
73.00 to 74.6 MHz
|
|
137.00 to 138.00 MHz
|
|
216.00 to 222.00 MHz
|
|
400.00 to 406.10 MHz
|
|
608.00 to 614.00 MHz
|
|
|
|
|
|
Surveillance Repeaters
|
|
~~~~~~~~~~~~~~~~~~~~~~
|
|
Law enforcement agencies use mobile repeaters and extenders to retransmit comms
|
|
of interest. These low power (about 15 watts) repeaters are usually located in
|
|
patrol cars. This allows the officer to monitor the surveillance device from
|
|
outside his car via portable handheld transceiver. These are often simply
|
|
little used channels of their normal assigned bands. Surveillance mobile
|
|
repeaters are still quite weak, so if you can hear it, it's probably close by!
|
|
(under your bed ?!) Here is a list of mobile repeaters used by state
|
|
enforcement agencies:
|
|
|
|
Mobile Repeaters (Extenders)
|
|
- ------------------------------------------------------------------------------
|
|
State Frequency Comments
|
|
- ------------------------------------------------------------------------------
|
|
|
|
Alabama - - - - May equip in the future
|
|
Arizona 155.505 15% equipped; no more planned
|
|
Arkansas 154.785 Fully equipped
|
|
California 154.905 Fully equipped
|
|
Colorado - - - - May equip in the future
|
|
Connecticut 154.83 40% equipped
|
|
Delaware 465.475 Fully equipped
|
|
460.50 Alternate frequency
|
|
Florida 465.1625 Fully equipped
|
|
156.18 Turnpike frequency
|
|
Georgia 458.4875 Fully equipped
|
|
Idaho - - - - May be equipped
|
|
Illinois 155.505 Fully equipped
|
|
151.16 Dept. of Criminal Investigation
|
|
Indiana 155.445 Fully equipped
|
|
Iowa 453.625 Fully equipped
|
|
Kansas 154.92 Fully equipped
|
|
Kentucky 154.665 Fully equipped
|
|
Louisiana 453.45 Fully equipped
|
|
Maine 460.225 Some cars equipped
|
|
Maryland 155.73 Fully equipped
|
|
Massachusetts 154.92 About 40% of cars equipped
|
|
Michigan 154.695 Over half of cars equipped
|
|
Minnesota 458.25 Fully equipped
|
|
453.25 Minneapolis
|
|
Mississippi 158.97 Fully equipped
|
|
Missouri 154.905 Fully equipped
|
|
Montana - - - - May or will be equipped
|
|
Nebraska 465.525 Fully equipped
|
|
Nevada 154.92 Fully equipped
|
|
New Hampshire - - - - May be equipped
|
|
New Jersey - - - - Not now equipped
|
|
New Mexico 460.15 Fully equipped
|
|
465.15 Alternate frequency
|
|
New York - - - - Not now equipped
|
|
North Carolina 155.445 Fully equipped, freqs. vary by area
|
|
154.68 Alternate frequency
|
|
154.92 Alternate frequency
|
|
159.21 Alternate frequency
|
|
North Dakota 453.45 Partially equipped
|
|
Ohio 465.55 Northern areas
|
|
465.375 Southern areas
|
|
465.425 Some units
|
|
465.525 Turnpike units
|
|
Oklahoma 154.905 Fully equipped (?)
|
|
465.0125 Alternate frequency
|
|
465.1625 Alternate frequency
|
|
465.3875 Alternate frequency
|
|
465.5625 Alternate frequency
|
|
Oregon - - - - May be equipped or soon will
|
|
Pennsylvania 154.755 Fully equipped
|
|
Rhode Island - - - - May have future plans
|
|
South Carolina 154.445 Some or all cars equipped
|
|
South Dakota 453.375 Some cars equipped
|
|
Tennessee 154.905 Fully equipped
|
|
Texas - - - - Not now equipped
|
|
Utah - - - - May have future plans
|
|
Vermont - - - - May have future plans
|
|
Virginia 453.35 Fully equipped
|
|
Washington 453.475 Some cars equipped
|
|
453.975 Alternate frequency
|
|
West Virginia 155.505 May be equipped, or soon will
|
|
Wisconsin 465.125 Fully equipped
|
|
Wyoming - - - - May be equipped, or soon will
|
|
|
|
|
|
Vehicle Tracking Transmitters
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Enforcement agencies often need to track suspect vehicles, cargo
|
|
shipments, or packages. Tiny transmitters are used that emit a quarter second
|
|
beep once each second. Some contain motion detectors that beep once every ten
|
|
seconds when not in motion. This saves battery life and of course provides
|
|
some information as to the status of the tagged object. Vehicles used for
|
|
tracking these transmitters are easy to spot. Look for four identical
|
|
antennas mounted in a square configuration. (Hmm, that pizza-van has been
|
|
parked across the street for over four days!)
|
|
|
|
|
|
Remote Control Surveillance
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Some transmitters can be set for remote control operation. That way they
|
|
can be turned off during times of inactivity to conserver power. They can also
|
|
be turned off to avoid detection during countersurveillance sweeps to avoid
|
|
detection. Look for these types of systems in the 72.01 to 72.99 MHz and 75.99
|
|
MHz bands (20 kHz steps). Some are thought to operate in the 300 to 350 MHz
|
|
band as well.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
(T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)
|
|
(T) (W)
|
|
)R( TRW Business Reports )R(
|
|
(W) (T)
|
|
)R( by HiBias )R(
|
|
(T) (W)
|
|
(T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)
|
|
|
|
|
|
|
|
TRW keeps tabs on the financial standing of businesses, both big and small.
|
|
Just about everyone from AT&T to Billy-Bud's Bait Shop is referenced in their
|
|
files. Just exactly what kind of information do they have? What kind of data
|
|
do they give to creditors. Exactly what kind of things could reflect
|
|
negatively on your credit standing? Following is a sample of a typical TRW
|
|
business report and a sample small business advisory report. These will show
|
|
the type of information that TRW hands out to creditors and how they interpret
|
|
said information.
|
|
|
|
|
|
TRW SAMPLE REPORT
|
|
~~~~~~~~~~~~~~~~~
|
|
|
|
PAGE RPT DATE TIME PORT TYPE
|
|
1 03-02-90 08:40:13 BC99 PROFILE 219
|
|
- --------------------------------------------------------------------------------
|
|
SAMPLE COMPANY TRW FILE NUMBER: 000000001
|
|
1000 MAIN STREET TRW FILE ESTABLISHED: PRIOR JAN 1977
|
|
ANYTOWN USA 11111 SIC NO: 0000
|
|
PHONE: 714-555-1212 BUS: SELLING GOODS TO AMERICA
|
|
- --------------------------------------------------------------------------------
|
|
EXECUTIVE SUMMARY
|
|
-----------------
|
|
DAYS BEYOND TERMS (DBT) FOR SAMPLE COMPANY
|
|
AS OF 03-02-90 : DBT IS THE AVERAGE NUMBER OF DAYS LATE A FIRM TAKES
|
|
PREDICTION : TO PAY ITS BILLS. THE DBT IS WEIGHTED BY THE DOLLAR
|
|
AMOUNT OF EACH ACCOUNT. THE PREDICTION IS A FORECAST
|
|
DBT NORMS OF THE DBT FOR 60 DAYS INTO THE FUTURE. IT IS BASED
|
|
SAMPLE CO INDUSTRY : ON THE TREND IN DBT, THE TYPE OF INDUSTRY OF THE
|
|
ALL INDUSTRIES : FIRM, ANY DEROGATORY PUBLIC RECORD INFORMATION,
|
|
COLLECTION ACCOUNTS, # OF INQUIRIES, YEARS IN
|
|
BUSINESS/FILE, ETC. THE INDUSTRY INFORMATION IS
|
|
PROVIDED TO EVALUATE HOW THIS FIRM PAYS TODAY
|
|
RELATIVE TO FIRMS IN THE SAME INDUSTRY (AT THE 2
|
|
DIGIT SIC LEVEL).
|
|
CONTINUOUS AND NEWLY REPORTED TRADELINES ARE USED FOR
|
|
THE DBT VALUES. A SUMMARY WILL ONLY BE PROVIDED WHEN
|
|
THERE IS SUFFICIENT DATA.
|
|
HISTORICAL PAYMENT GUIDE
|
|
6 MONTH ACCOUNT BALANCE RANGE : THIS LINE INDICATES THE TOTAL AMOUNT OWED
|
|
BY THE FIRM FOR THE PAST 6 MONTHS AND THE CURRENT
|
|
TOTAL.
|
|
HIGHEST CREDIT AMOUNT EXTENDED: THIS LINE INDICATES THE LARGEST INDIVIDUAL
|
|
AMOUNT OF CREDIT EXTENDED TO THE FIRM IN THE PAST 12
|
|
MONTHS AND THE MEDIAN AMOUNT (IE THAT VALUE IN WHICH
|
|
50% OF THE ACCOUNTS ARE GREATER AND 50% ARE LOWER).
|
|
THE PURPOSE IS TO COMPARE THE CURRENT CREDIT REQUEST
|
|
TO THESE AMOUNTS TO DETERMINE THE CREDIT GRANTOR'S
|
|
RELATIVE RISK.
|
|
INDUSTRY PAYMENT COMPARISON : THIS LINE REPRESENTS THE CONCLUSION FROM A
|
|
COMPARISON OF THE 6 MONTH HISTORICAL DBT OF THE FIRM
|
|
TO ITS INDUSTRY. THREE POSSIBLE CONCLUSIONS CAN BE
|
|
MADE: A FIRM PAYS "THE SAME", "LATER THAN", OR
|
|
"SOONER THAN" RELATED BUSINESSES. TO CONCLUDE A FIRM
|
|
PAYS LATER OR SOONER, 4 OUT OF 6 MONTHS MUST DEVIATE
|
|
FROM AT LEAST 50% OF THE FIRMS IN THE INDUSTRY.
|
|
PAYMENT TREND INDICATION : THIS LINE PROVIDES THE CONCLUSION FROM AN
|
|
ANALYSIS OF HOW THE PAYMENT BEHAVIOR OF THE FIRM IS
|
|
|
|
|
|
|
|
PAGE RPT DATE TIME PORT TYPE
|
|
2 03-02-90 08:40:13 BC99 PROFILE 219
|
|
- -------------------------------------------------------------------------------
|
|
SAMPLE COMPANY TRW FILE NUMBER: 000000001
|
|
- -------------------------------------------------------------------------------
|
|
PAYMENT TREND INDICATION (CONTINUED)
|
|
CHANGING IN THE PAST 6 MONTHS. FOR A TREND TO OCCUR, AT LEAST THE
|
|
MOST RECENT TWO MONTHS OF DBT MUST DEVIATE FROM 70% OF THE NORMAL
|
|
HISTORICAL RANGE OF DBT'S.
|
|
FOUR POSSIBLE CONCLUSIONS CAN BE MADE: THE FIRM IS "IMPROVING
|
|
TOWARD TERM REQUIREMENTS ","INCREASINGLY LATE", "STABLE" OR
|
|
OR "NO TREND IDENTIFIABLE".
|
|
|
|
SIGNIFICANT PUBLIC RECORD DATA
|
|
THIS SECTION SUMMARIZES REPORTED PUBLIC RECORD OR OTHER DEROGATORY
|
|
INFORMATION IN THE FOLLOWING WAYS:
|
|
1) BANKRUPTCY FILINGS WITHIN THE PAST 10 YEARS.
|
|
2) OPEN TAX LIENS/JUDGEMENTS REGARDLESS OF THE AMOUNT OF THE LIEN,
|
|
OR ANY FILING RELEASED WITHIN THE PAST 5 YEARS.
|
|
3) A SUMMARY OF THE NUMBER OF UCC FILINGS WITH ONE OR MORE OF THE
|
|
FOLLOWING PLEDGED COLLATERAL:
|
|
-ACCOUNTS
|
|
-ACCOUNTS RECEIVABLE
|
|
-INVENTORY
|
|
-CONTRACTS
|
|
-HEREAFTER ACQUIRED PROPERTY
|
|
-PROCEEDS
|
|
-LEASES
|
|
-NOTES RECEIVALBE
|
|
4) REPORTED COLLECTION ACCOUNTS.
|
|
5) FRAUDULENT TELECOMMUNICATIONS ACCOUNTS THAT ARE REPORTED AS
|
|
SERVICE DISCONNECTS, WRITE-OFFS, SKIPS, ETC.
|
|
IF NO PUBLIC RECORD DATA IS REPORTED, THEN IT WILL BE STATED.
|
|
RELEVANT DATES AND AMOUNTS WILL BE INCLUDED.
|
|
|
|
TRADE PAYMENT INFORMATION
|
|
-------------------------
|
|
|
|
TRADE PAYMENT EXPERIENCES
|
|
(TRADE LINES WITH AN "*" AFTER DATE REPORTED ARE NEWLY REPORTED)
|
|
|
|
RECENT ------ ACCOUNT STATUS ------
|
|
HIGH -DAYS PAST DUE-
|
|
BUSINESS DATE LAST PAYMENT CREDIT BALANCE 1- 31- 61-
|
|
CATEGORY REP'D SALE TERMS $ $ CUR 30 60 90 91+ COMMENTS
|
|
---------- ----- ----- ------- -------- -------- --- --- --- --- --- ----------
|
|
THIS SECTION PROVIDES THE DETAILED ACCOUNT RECEIVABLE INFORMATION FOR THE FIRM
|
|
INQUIRED UPON. ONLY THOSE ACCOUNTS THAT ARE CONTINUOUSLY REPORTED OR NEWLY
|
|
|
|
|
|
|
|
PAGE RPT DATE TIME PORT TYPE
|
|
3 03-02-90 08:40:13 BC99 PROFILE 219
|
|
- -------------------------------------------------------------------------------
|
|
SAMPLE COMPANY TRW FILE NUMBER: 000000001
|
|
- -------------------------------------------------------------------------------
|
|
TRADE PAYMENT EXPERIENCES (CONTINUED)
|
|
|
|
REPORTED WILL BE INCLUDED IN THIS SECTION. THEREFORE, THE CREDIT GRANTOR IS
|
|
EVALUATING ONLY THE MOST CURRENT TRADE INFORMATION. A CONTINUOUSLY REPORTED
|
|
TRADE LINE MUST BE IN THE TRW FILE FOR AT LEAST SIX MONTHS AND UPDATED AT LEAST
|
|
ONCE IN THE PAST THREE MONTHS. A NEWLY REPORTED TRADE LINE HAS BEEN ADDED TO
|
|
THE FILE WITHIN THE LAST 3 MONTHS. EACH TRADELINE REPRESENTS A UNIQUE CREDIT
|
|
EXPERIENCE.
|
|
------------------------------ -------- -------- --- --- --- --- --- ----------
|
|
TRADE LINE TOTALS: DBT: (THE
|
|
SAME AS REPORTED
|
|
IN THE SUMMARY)
|
|
|
|
ADDITIONAL PAYMENT EXPERIENCES
|
|
(INCLUDES NON-TRADE ACCOUNTS PLUS PREVIOUSLY REPORTED TRADE LINES)
|
|
|
|
THIS SECTION WILL CONTAIN THOSE ACCOUNTS THAT REPRESENT PAYMENT INFORMATION,
|
|
BUT DO NOT BEHAVE THE SAME AS A TRADE CREDIT ACCOUNT (IE THE ACCOUNT TYPE AND
|
|
THE REPORTED DATA BEHAVES DIFFERENTLY THAN A TRADE ACCOUNT). FOR EXAMPLE, A
|
|
LOAN WILL REFLECT THE TOTAL VALUE OF THE LOAN IN THE BALANCE INFORMATION AND
|
|
THE AGING DATA REFLECTS THE CURRENCY OF THE MONTHLY PAYMENT ONLY. THIS SECTION
|
|
INCLUDES TRADELINES NOT UPDATED BY CONTRIBUTORS WITHIN THE PAST 6 MONTHS. THE
|
|
DATA, HOWEVER, CAN BE USED TO IDENTIFY ANY SIGNIFICANT DEROGATORY ACCOUNTS IN
|
|
THE PAST.
|
|
|
|
PAYMENT TOTALS
|
|
|
|
RECENT ------ ACCOUNT STATUS ------
|
|
HIGH -DAYS PAST DUE-
|
|
CREDIT BALANCE 1- 31- 61-
|
|
$ $ CUR 30 60 90 91+ COMMENTS
|
|
-------- -------- --- --- --- --- --- ----------
|
|
CONTINUOUSLY REPORTED LINES: THIS SECTION PROVIDES A SUMMARY OF THE TOTALS
|
|
NEWLY REPORTED LINES: FOR THE TWO TRADELINE TYPES. IT CAN BE USED TO
|
|
EVALUATE HOW MUCH THE NEW INFORMATION MAY EFFECT
|
|
CONCLUSIONS FOR PAST PAYMENT BEHAVIOR.
|
|
------------------------------ -------- -------- --- --- --- --- --- ----------
|
|
TRADE LINE TOTALS: DBT:
|
|
|
|
|
|
|
|
PAGE RPT DATE TIME PORT TYPE
|
|
4 03-02-90 08:40:13 BC99 PROFILE 219
|
|
- -------------------------------------------------------------------------------
|
|
SAMPLE COMPANY TRW FILE NUMBER: 000000001
|
|
- -------------------------------------------------------------------------------
|
|
PAYMENT TRENDS
|
|
(BASED ON CONTINUOUSLY REPORTED TRADE LINES ONLY)
|
|
|
|
-DAYS PAST DUE-
|
|
BALANCE 1- 31- 61-
|
|
DBT $ CUR 30 60 90 91+
|
|
--- -------- --- --- --- --- ---
|
|
AS OF 03-02-90 THIS SECTION EXAMINES THE NEAR TERM CHANGES IN PAY-
|
|
12-01-88 MENT TRENDS. IT USES ONLY CONTINUOUSLY REPORTED
|
|
11-01-88 TRADELINES IN ORDER TO PROVIDE AN INDICATION OF
|
|
10-01-88 WHETHER OR NOT AN IMMEDIATE CHANGE IN PAYMENT
|
|
09-01-88 BEHAVIOR IS OCCURING. THE CONCLUSION FROM THE DATA
|
|
08-01-88 IS PRESENTED IN THE SUMMARY. A NEAR TERM CHANGE IN
|
|
07-01-88 BEHAVIOR CAN BE DUE TO THE WILLINGNESS OR ABILITY
|
|
OF THE DEBTOR TO PAY ITS OBLIGATIONS.
|
|
|
|
PAYMENT HISTORY--QUARTERLY AVERAGES
|
|
(BASED ON CONTINUOUSLY AND NEWLY REPORTED TRADE LINES)
|
|
|
|
-DAYS PAST DUE-
|
|
BALANCE 1- 31- 61-
|
|
DBT $ CUR 30 60 90 91+
|
|
--- -------- --- --- --- --- ---
|
|
4TH-Q-89 (OCT-DEC): THIS SECTION PRESENTS A ONE AND A QUARTER YEAR ANAL-
|
|
3RD-Q-89 (JUL-SEP): YSIS OF THE PAYMENT TRENDS. THE LONG TERM CHANGES IN
|
|
2ND-Q-89 (APR-JUN): DBT REFLECT THE ABILITY OF THE COMPANY TO GENERATE
|
|
1ST-Q-89 (JAN-MAR): SUSTAINED CASH FLOW OVER TIME. IF THE DBT IS
|
|
4TH-Q-88 (OCT-DEC): BECOMING SIGNIFICANTLY LARGER, IT IS LIKELY THAT THE
|
|
COMPANY IS LESS ABLE TO PAY.
|
|
|
|
PUBLIC RECORD INFORMATION
|
|
-------------------------
|
|
THIS SECTION REFLECTS THE DETAIL OF BANKRUPTCY, TAX LIENS (FEDERAL, STATE,
|
|
AND COUNTY), JUDGEMENTS, AND UCC FILINGS FOR A PARTICULAR ENTITY. IT INCLUDES
|
|
THE DATE OF FILINGS, AMOUNTS, LOCATIONS, ETC.
|
|
|
|
COMMERCIAL BANKING RELATIONSHIPS
|
|
--------------------------------
|
|
THIS SECTION IDENTIFIES THE NAME, ADDRESS, PHONE NUMBER, AND ACCOUNT NUMBER
|
|
OF THE PRIMARY BANK UTILIZED BY THE BUSINESS.
|
|
|
|
|
|
|
|
PAGE RPT DATE TIME PORT TYPE
|
|
5 03-02-90 08:40:13 BC99 PROFILE 219
|
|
- -------------------------------------------------------------------------------
|
|
SAMPLE COMPANY TRW FILE NUMBER: 000000001
|
|
- -------------------------------------------------------------------------------
|
|
KEY FACTS INFORMATION
|
|
---------------------
|
|
THIS SECTION TYPICALLY INCLUDES THE TYPE OF PRODUCTS/SERVICES OFFERED BY THE
|
|
BUSINESSES, THE NUMBER OF YEARS IN BUSINESS, THE BUSINESS OWNERSHIP AND
|
|
PRINCIPAL OFFICERS, ETC.
|
|
|
|
INQUIRIES
|
|
----------
|
|
BUSINESS 1990 1989
|
|
CATEGORY JAN DEC NOV OCT SEP AUG JUL JUN MAY
|
|
---------- --- --- --- --- --- --- --- --- ---
|
|
THE INQUIRIES WILL BE SUMMARIZED BY THE BUSINESS CATEGORY AND
|
|
IDENTIFY THE NUMBER OF INQUIRIES EACH MONTH. THIS ALLOWS THE CREDIT
|
|
MANAGER TO QUICKLY DETERMINE WHERE AND WHEN THE MOST FREQUENT CREDIT
|
|
ACTIVITY ON THE PART OF THE DEBTOR HAS BEEN OCCURING.
|
|
|
|
FEDERAL GOVERNMENT INFORMATION
|
|
-----------------------------
|
|
THIS SECTION CONTINUES TO REFLECT THE FINANCIAL AND CONTRACT DATA PROVIDED BY
|
|
GOVERNMENT AGENCIES (EG THE SMALL BUSINESS ADMINISTRATION).
|
|
|
|
STANDARD & POORS INFORMATION
|
|
----------------------------
|
|
PROVIDES FINANCIAL INFORMATION ON PUBLICLY HELD COMPANIES AS COMPILED BY
|
|
STANDARD AND POORS. THE INFORMATION INCLUDES:
|
|
1) THE MOST RECENT THREE YEARS OF PROFIT/LOSS STATEMENTS AND BALANCE SHEETS.
|
|
2) CRITICAL RATIOS OF PERFORMANCE RELATIVE TO INDUSRTY AVERAGES.
|
|
3) SUMMARY BUSINESS DESCRIPTION AND RECENT DEVELOPMENTS.
|
|
|
|
|
|
THE INFORMATION HEREIN IS FURNISHED IN CONFIDENCE FOR YOUR EXCLUSIVE USE
|
|
FOR LEGIMATE BUSINESS PURPOSES AND SHALL NOT BE REPRODUCED. NEITHER
|
|
TRW INC, NOR ITS SOURCES OR DISTRIBUTORS WARRENT SUCH INFORMATION NOR
|
|
SHALL THEY BE LIABLE FOR YOUR USE OR RELIANCE UPON IT.
|
|
COPYRIGHT (C) 1989 TRW INC.
|
|
**END REPORT**
|
|
|
|
|
|
|
|
|
|
TRW SMALL BUSINESS ADVISORY SAMPLE REPORT
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
PAGE RPT DATE TIME PORT TYPE
|
|
1 03-02-90 08:40:13 BC99 SBAR 219
|
|
- --------------------------------------------------------------------------------
|
|
PRINCIPAL NAME/ADDRESS BUSINESS NAME/ADDRESS EMPLOYER NAME/ADDRESS
|
|
- --------------------------------------------------------------------------------
|
|
JOHN Q PROPRIETOR PROPRIETOR CO AJAX HARDWARE
|
|
10655 BIRCH ST 604 BAKER ST 2035 BROADWAY
|
|
BURBANK CA 91501 STUDIO CITY CA 90485 LOS ANGELES CA 90019
|
|
|
|
LAST UPDATE 12-89 AS ACCESSED 03-90 LAST UPDATE 06-88
|
|
- --------------------------------------------------------------------------------
|
|
|
|
RISK PROFILE
|
|
------------
|
|
|
|
CHANCE OF ACCOUNT ENTERING SERIOUSLY DEROGATORY STATUS WITHIN 1 YEAR: 3%
|
|
|
|
THE PERCENTAGE ABOVE IS CALCULATED BY THE NATIONAL RISK MODEL, WHICH USES A
|
|
POINT-SCORING SYSTEM THAT ADDS OR SUBTRACTS POINTS BASED ON A PROPRIETOR'S
|
|
CREDIT BEHAVIOR. THE MODEL ONLY EXAMINES INFORMATION THAT APPEARS ON A
|
|
PROPRIETOR'S SBAR REPORT, AND DOES NOT TAKE INTO ACCOUNT OTHER DATA, SUCH AS
|
|
THE PROPRIETOR'S INCOME OR NET WORTH.
|
|
|
|
THE PERCENTAGE, REFERRED TO AS A PROBABILITY PERCENTAGE, INDICATES THE
|
|
LIKELIHOOD OF A PROPRIETOR BECOMING DEROGATORY IN HIS PAYMENT HABITS.
|
|
DEROGATORY CREDIT BEHAVIOR CAN BE DEFINED AS MAINTAINING ACCOUNTS THAT HAVE
|
|
DEVELOPED INTO COLLECTION ACCOUNTS, REPOSSESSIONS, CHARGE-OFFS OR BANKRUPTCIES.
|
|
|
|
THE PERCENTAGES RANGE FROM 0% TO 100%. AS INDICATED ON THE SBAR, APPROXIMATELY
|
|
85% OF ALL PROPRIETORS HAVE A 0%-15% CHANCE OF BECOMING SERIOUSLY DEROGATORY
|
|
WITHIN 1 YEAR; 12% HAVE A 16%-49% CHANCE; AND 3% HAVE A 50%-100% CHANCE.
|
|
|
|
IN GENERAL, PROPRIETORS WITH A PROBABILITY PERCENTAGE OF 0%-15% ARE A GOOD
|
|
|
|
RISK; THOSE WITH A PERCENTAGE OF 16%-49% ARE A MEDIUM RISK; AND PERCENTAGES OF
|
|
50%-100% INDICATE A POOR RISK.
|
|
|
|
YOU MAY WANT TO IDENTIFY SEVERAL RANGES OF PERCENTAGES THAT YOU CONSIDER TO BE
|
|
GOOD, MEDIUM, AND POOR RISKS, BASED ON HOW MUCH RISK YOU ARE WILLING TO TAKE
|
|
IN EXTENDING CREDIT.
|
|
|
|
|
|
PAGE RPT DATE TIME PORT TYPE
|
|
2 03-02-90 08:40:13 BC99 SBAR 219
|
|
- --------------------------------------------------------------------------------
|
|
PRINCIPAL NAME/ADDRESS BUSINESS NAME/ADDRESS EMPLOYER NAME/ADDRESS
|
|
- --------------------------------------------------------------------------------
|
|
JOHN Q PROPRIETOR PROPRIETOR CO AJAX HARDWARE
|
|
10655 BIRCH ST 604 BAKER ST 2035 BROADWAY
|
|
BURBANK CA 91501 STUDIO CITY CA 90485 LOS ANGELES CA 90019
|
|
|
|
LAST UPDATE 12-89 AS ACCESSED 03-90 LAST UPDATE 06-88
|
|
- --------------------------------------------------------------------------------
|
|
|
|
STATUS CHARACTERISTICS
|
|
|
|
STATUS CHARACTERISTICS DEFINE THE SPECIFIC CONDITIONS WHICH CONTRIBUTE TO A
|
|
PROPRIETOR'S PROBABILITY PERCENTAGE. ONE TO FOUR CHARACTERISTICS ARE DISPLAYED
|
|
ON THE SBAR IN ORDER OF IMPORTANCE, AND GIVE YOU ADDITIONAL INSIGHT INTO A
|
|
PROPRIETOR'S PERSONAL CREDIT HISTORY.
|
|
|
|
FOR PROBABILITY PERCENTAGES OF 16%-100%, THE STATUS CHARACTERISTICS ARE A
|
|
SIGNIFICANT INDICATOR OF WHY THE PERCENTAGE IS HIGH. FOR PERCENTAGES OF 0%-15%,
|
|
THE CHARACTERISTICS ARE NOT A SIGNIFICANT INDICATOR, AND SHOULD NOT CARRY MUCH
|
|
WEIGHT IN YOUR CREDIT-GRANTING DECISION.
|
|
|
|
TO HELP YOU BETTER UNDERSTAND AND INTERPRET THE MEANING OF THE STATUS CHAR-
|
|
ACTERISTICS, A "GLOSSARY OF STATUS CHARACTERISTICS" IS INCLUDED IN THE SBAR
|
|
BROCHURE AVAILABLE FROM YOUR ACCOUNT EXECUTIVE.
|
|
|
|
ACCOUNT PROFILES
|
|
----------------
|
|
|
|
PROPRIETORS' ACCOUNTS ARE DIVIDED INTO 3 CATEGORIES: NEGATIVE, POSITIVE, AND
|
|
NEUTRAL. EACH TRADE LINE IN THE ACCOUNT PROFILE CONTAINS THE BUSINESS CATEGORY
|
|
OF THE COMPANY THAT CONTRIBUTED THE INFORMATION; THE DATE THE INFORMATION WAS
|
|
REPORTED; AND THE STATUS OF THE ACCOUNT.
|
|
|
|
THE TRADE LINE MAY ALSO INCLUDE: THE DATE THE ACCOUNT WAS OPENED; TYPE AND
|
|
TERMS OF LOAN; ORIGINAL LOAN AMOUNT; CREDIT LIMIT; HISTORICAL HIGH BALANCE;
|
|
BALANCE DUE; SCHEDULED MONTHLY PAYMENT; AMOUNT PAST DUE; DATE LAST PAYMENT WAS
|
|
MADE; TRANSACTION RELATIONSHIP; COMMENTS.
|
|
|
|
ACCOUNT PROFILES PROVIDE YOU WITH DETAILED INFORMATION ABOUT A PROPRIETOR'S
|
|
PERSONAL CREDIT PORTFOLIO.
|
|
|
|
|
|
|
|
PAGE RPT DATE TIME PORT TYPE
|
|
3 03-02-90 08:40:13 BC99 SBAR 219
|
|
- --------------------------------------------------------------------------------
|
|
PRINCIPAL NAME/ADDRESS BUSINESS NAME/ADDRESS EMPLOYER NAME/ADDRESS
|
|
- --------------------------------------------------------------------------------
|
|
JOHN Q PROPRIETOR PROPRIETOR CO AJAX HARDWARE
|
|
10655 BIRCH ST 604 BAKER ST 2035 BROADWAY
|
|
BURBANK CA 91501 STUDIO CITY CA 90485 LOS ANGELES CA 90019
|
|
|
|
LAST UPDATE 12-89 AS ACCESSED 03-90 LAST UPDATE 06-88
|
|
- --------------------------------------------------------------------------------
|
|
|
|
NEGATIVE ACCOUNT PROFILE
|
|
------------------------
|
|
|
|
THIS SECTION PROVIDES YOU WITH ALL OF THE NEGATIVE TRADE LINES THAT APPEAR ON
|
|
THE PROPRIETOR'S REPORT. THESE INCLUDE TRADE LINES THAT HAVE STATUSES SUCH AS
|
|
DELINQUENT, REPOSSESSED, WRITE-OFF, CHARGED TO LOSS, BANKRUPT, ETC.
|
|
|
|
POSITIVE ACCOUNT PROFILE
|
|
------------------------
|
|
|
|
THIS SECTION PROVIDES YOU WITH ALL OF THE POSITIVE TRADE LINES THAT APPEAR ON
|
|
THE PROPRIETOR'S REPORT. IN GENERAL, THESE TRADE LINES ARE EITHER CURRENT
|
|
ACCOUNTS THAT ARE BEING PAID ACCORDING TO TERMS, OR ACCOUNTS THAT HAVE BEEN
|
|
CLOSED AND WERE PAID IN SATISFACTORY TERMS.
|
|
|
|
NEUTRAL ACCOUNT PROFILE
|
|
-----------------------
|
|
|
|
THIS SECTION PROVIDES YOU WITH ALL OF THE NEUTRAL TRADE LINES THAT APPEAR ON
|
|
THE PROPRIETOR'S REPORT. THESE TRADE LINES INCLUDE ONES HAVE BEEN DELINQUENT
|
|
AT ONE TIME, BUT ARE NOW CURRENT.
|
|
|
|
PUBLIC RECORD PROFILE
|
|
---------------------
|
|
|
|
THE PUBLIC RECORD PROFILE ENABLES YOU TO LEARN ABOUT WHAT TYPES OF LEGAL
|
|
ACTIONS HAVE BEEN FILED AGAINST THE PROPRIETOR, SUCH AS BANKRUPTCIES, FEDERAL
|
|
STATE, AND COUNTY TAX LIENS, JUDGEMENTS, AND SUITS.
|
|
|
|
|
|
|
|
PAGE RPT DATE TIME PORT TYPE
|
|
4 03-02-90 08:40:13 BC99 SBAR 219
|
|
- --------------------------------------------------------------------------------
|
|
PRINCIPAL NAME/ADDRESS BUSINESS NAME/ADDRESS EMPLOYER NAME/ADDRESS
|
|
- --------------------------------------------------------------------------------
|
|
JOHN Q PROPRIETOR PROPRIETOR CO AJAX HARDWARE
|
|
10655 BIRCH ST 604 BAKER ST 2035 BROADWAY
|
|
BURBANK CA 91501 STUDIO CITY CA 90485 LOS ANGELES CA 90019
|
|
|
|
LAST UPDATE 12-89 AS ACCESSED 03-90 LAST UPDATE 06-88
|
|
- --------------------------------------------------------------------------------
|
|
|
|
PUBLIC RECORD PROFILE (CONTINUED)
|
|
---------------------------------
|
|
|
|
EACH PUBLIC DATA ENTRY INCLUDES THE TYPE OF LEGAL ACTION FILED, DATE FILED,
|
|
COURT NAME, COURT CODE, DOCKET NUMBER, AMOUNT, AND JUDGEMENT CREDITOR.
|
|
|
|
INQUIRIES
|
|
---------
|
|
|
|
THE INQUIRY SECTION INCLUDES INFORMATION ABOUT INQUIRIES MADE ON THE PROPRIETOR
|
|
IN THE PAST 24 MONTHS. THIS TELLS YOU HOW OFTEN THE PROPRIETOR HAS REQUESTED
|
|
CREDIT IN THE PAST YEAR, AND THE TYPES AND NUMBER OF COMPANIES THAT HAVE
|
|
REQUESTED CREDIT INFORMATION ON HIM.
|
|
|
|
INQUIRIES INCLUDE THE BUSINESS CATEGORY OF THE COMPANY MAKING THE INQUIRY AND
|
|
THE DATE OF THE INQUIRY, AND MAY INCLUDE THE TYPE, TERMS, AND AMOUNT OF THE
|
|
LOAN OR CREDIT LINE.
|
|
|
|
FILE VARIATION REFERENCES
|
|
-------------------------
|
|
|
|
FILE VARIATIONS CAN BE DEFINED AS INFORMATION ABOUT THE PROPRIETOR CONTAINED
|
|
IN TRW'S FILE UNDER A DIFFERENT NAME, ADDRESS, OR SOCIAL SECURITY NUMBER
|
|
THAN WHAT YOU ENTERED DURING THE INQUIRY PROCESS.
|
|
|
|
USUALLY, NAME VARIATIONS ARE EITHER MISPELLINGS OR MAIDEN NAMES; ADDRESS
|
|
VARIATIONS ARE DEVIATIONS SUCH AS "STREET" INSTEAD OF "DRIVE", OR THE
|
|
PROPRIETOR'S PREVIOUS ADDRESS; AND SOCIAL SECURITY NUMBER VARIATIONS ARE
|
|
ONE OR TWO DIGIT TYPO MISTAKES.
|
|
|
|
IN A SMALL NUMBER OF CASES, HOWEVER, THE INFORMATION IN THE FILE VARIATION
|
|
SECTION MAY SIGNIFICANTLY CONFLICT WITH WHAT THE PROPRIETOR HAS GIVEN YOU,
|
|
AND YOU MAY FIND THAT A MORE THOROUGH REVIEW OF THE PROPRIETOR IS NECESSARY.
|
|
|
|
|
|
|
|
PAGE RPT DATE TIME PORT TYPE
|
|
5 03-02-90 08:40:13 BC99 SBAR 219
|
|
- --------------------------------------------------------------------------------
|
|
PRINCIPAL NAME/ADDRESS BUSINESS NAME/ADDRESS EMPLOYER NAME/ADDRESS
|
|
- --------------------------------------------------------------------------------
|
|
JOHN Q PROPRIETOR PROPRIETOR CO AJAX HARDWARE
|
|
10655 BIRCH ST 604 BAKER ST 2035 BROADWAY
|
|
BURBANK CA 91501 STUDIO CITY CA 90485 LOS ANGELES CA 90019
|
|
|
|
LAST UPDATE 12-89 AS ACCESSED 03-90 LAST UPDATE 06-88
|
|
- --------------------------------------------------------------------------------
|
|
|
|
FILE VARIATION REFERENCES (CONTINUED)
|
|
-------------------------------------
|
|
|
|
YOU CAN SEE WHICH TRADE LINES, PUBLIC RECORD DATA, AND INQUIRIES ARE
|
|
ASSOCIATED WITH SPECIFIC FILE VARIATIONS IN TRW'S FILE BY MATCHING THE FILE
|
|
VARIATION REFERENCES IN THE BODY OF THE REPORT TO THE ONES CONTAINED IN THE
|
|
FILE VARIATION REFERENCE SECTION.
|
|
|
|
CONSUMER STATEMENT
|
|
------------------
|
|
|
|
CONSUMERS MAY ADD EXPLANATIONS TO THEIR CREDIT REPORTS IN ACCORDANCE WITH THE
|
|
FAIR CREDIT REPORTING ACT AND STATE REPORTING LAWS. THESE STATEMENTS APPEAR AT
|
|
THE END OF THE REPORT.
|
|
|
|
THE INFORMATION CONTAINED IN THIS SMALL BUSINESS ADVISORY REPORT IS
|
|
FURNISHED IN CONFIDENCE AND MUST BE USED EXCLUSIVELY FOR LEGITIMATE
|
|
COMMERCIAL CREDIT PURPOSES. THE INFORMATION SHALL NOT BE REPRODUCED.
|
|
NEITHER TRW INC., NOR ITS SOURCES OR DISTRIBUTORS WARRANT SUCH
|
|
INFORMATION NOR SHALL THEY BE LIABLE FOR YOUR USE OR RELIANCE UPON IT.
|
|
COPYRIGHT (C) 1990 TRW INC.
|
|
**END SMALL BUSINESS ADVISORY REPORT**
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
|
|
|
|
[#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#]
|
|
[#] [#]
|
|
[#] Building a Garage Door Opener Hacker [#]
|
|
[#] [#]
|
|
[#] by Black Manta [#]
|
|
[#] [#]
|
|
[#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#]
|
|
|
|
|
|
|
|
Garage door openers employ a DIP switch that the owner sets to his own
|
|
personal "code". The code is actually just a binary number created by the
|
|
on/off positions of the switch. The device discussed here will enable you to
|
|
open any automatic garage door (aside from some of the new dual switch models).
|
|
|
|
The opener employs a 555 timer as a pulse generator to transmit pulses to a
|
|
binary counter. Each pulse will increment the binary counter by one. You can
|
|
adjust the speed of the counting by turning R1. You will have to experiment to
|
|
find the best speed. If it is too fast, the signal will not be long enough to
|
|
open the door. Normally, about 2.5 minutes to complete all 1024 combinations.
|
|
|
|
As you hit the switch, it will begin counting up, lighting the leds for the
|
|
corresponding switches as it turns each on. This will serve as a reference so
|
|
that you can set any opener to.
|
|
|
|
To connect to the garage door opener, first desolder the DIP switches from the
|
|
door opener and solder an IC socket into where the DIP switches were. (This
|
|
will allow you to put the DIP switches back, when operating in normal mode.)
|
|
Second, you should connect the output to a wirewrap IC socket. If you mount
|
|
the IC socket on your pc or perfboard you can use the socket to plug right into
|
|
the door opener. When connecting the output, be sure that the connections on
|
|
the wirewrap socket correspond to the ON setting of the DIP switches.
|
|
|
|
|
|
Parts List
|
|
~~~~~~~~~~
|
|
Resistors
|
|
R1 - PC mount 100k potentiometer
|
|
R2 - 1k ohm 1/4 watt
|
|
|
|
Capacitors
|
|
C1 - 22MFD
|
|
|
|
Integrated Circuits
|
|
IC1 - 555CP Timer
|
|
IC2 - CD4040BE 12 stage binary counter
|
|
|
|
Misc Parts
|
|
LED1 - 10 Light Emitting Diodes
|
|
S1 - Normally Closed Momentary Push Button Switch
|
|
Perfboard
|
|
9V Battery
|
|
|
|
|
|
|
|
10 leds going to the 10 pins of the dip switch
|
|
|
|
Dip Switch Assemblies (2 of 10 shown)
|
|
|
|
|------+----------------------------------+--------->>> to ground
|
|
| |
|
|
| |
|
|
led led etc......
|
|
| |
|
|
| |
|
|
+-----> to dip switch # +-----> to dip switch #
|
|
| |
|
|
| |
|
|
+-----> to IC2 pin # +-----> to IC2 pin #
|
|
|
|
|
|
Wire in IC2 through the assemblies as follows.
|
|
|
|
>From IC2 pin To Dip Switch Assembly
|
|
~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~
|
|
2 6
|
|
3 5
|
|
4 7
|
|
5 4
|
|
6 3
|
|
7 2
|
|
9 1
|
|
12 9
|
|
13 8
|
|
14 10
|
|
|
|
|
|
>From IC2 pin To
|
|
~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~
|
|
1 Not Used
|
|
10 IC1-pin #3
|
|
15 Not Used
|
|
16 + 9V
|
|
|
|
|
|
|
|
The remaining components and remaining pins of IC2 hook up as follows:
|
|
|
|
|
|
>from IC2 pin #8-----+-----(S1)---->to IC2 pin #11
|
|
|
|
|
| to +9V
|
|
| |
|
|
| +---------------+------+
|
|
| | | |
|
|
| IC1 pin 8 IC1 pin 4 R1
|
|
| |
|
|
| IC1 pin 7---+
|
|
| |
|
|
| R2
|
|
| |
|
|
| IC1 pin 6 |
|
|
| | |
|
|
| +-----+
|
|
| | |
|
|
| to IC1 pin 1 IC1 pin 2 C1
|
|
| | |
|
|
+-----------------+-----------------------+
|
|
|
|
|
+-->>> to ground
|
|
|
|
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
+ Air Fone Frequency Allocation +
|
|
+ +
|
|
+ Based on information from Leroy Donnelly +
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
|
|
|
|
Ever wonder just what those trendy jet-setters talk about on their in-flight
|
|
air to ground radiotelephones? The FCC has issued rules on allocation of the
|
|
849-851/894-895 MHz bands for air-ground radiotelephone service. Using this
|
|
information it is quite easy for ANYONE with a scanner to intercept these
|
|
calls. Nothing that is said over the air should be considered secure.
|
|
Competiters, enemies, and the news media could be tuning in on "private"
|
|
conversations at any time. Here is the information on how it is all set up.
|
|
|
|
The new action (effective as of September 9, 1991)
|
|
|
|
1) changes channel spacing from GTE Airfone Inc.'s de
|
|
facto standards;
|
|
|
|
2) orders GTE to make its service available to other
|
|
air-ground licensees at non-discriminatory rates;
|
|
|
|
3) divides each channel block into 6 control channels
|
|
(P-1 through P-6) and 29 communications channels
|
|
(C-1 through C-29);
|
|
|
|
4) provides for a communications channel bandwidth of 6
|
|
kHz;
|
|
|
|
5) gives GTE 22 months to modify its current control
|
|
channel scheme; during this period, GTE can use
|
|
the lower 20 kHz of each channel block, which
|
|
includes channels C-1, C-2, and C-3, for control.
|
|
GTE then has another 38 months during which it can
|
|
only use a 3.2 kHz control channel in channel C-2
|
|
of each channel block. After these transition
|
|
periods end (September of 1996), GTE must switch
|
|
to control channels marked P-1 through P-6 in the
|
|
tables below;
|
|
|
|
6) empowers the FCC to assign exclusively one control
|
|
channel to each air-ground licensee;
|
|
|
|
7) limits the ERP of airborne stations to 30 watts;
|
|
maximum, and that of ground stations to 100 watts
|
|
maximum;
|
|
|
|
8) limits the ERP of ground stations to 1 watt when
|
|
communicating with aircraft on the ground.
|
|
|
|
|
|
|
|
GROUND TO AIR CHANNELS
|
|
~~~~~~~~~~~~~~~~~~~~~~
|
|
(NOTE" "GB" in these listings denotes Guard Band, a series
|
|
of 3 kHz spacings to separate communications channels from
|
|
control channels)
|
|
|
|
CH. # CHANNEL BLOCK
|
|
10 9 8 7 6
|
|
C-1 849.0055 849.2055 849.4055 849.6055 849.8055
|
|
C-2 849.0115 849.2115 849.4115 849.6115 849.8115
|
|
C-3 849.0175 849.2175 849.4175 849.6175 849.8175
|
|
C-4 849.0235 849.2235 849.4235 849.6235 849.8235
|
|
C-5 849.0295 849.2295 849.4295 849.6295 849.8295
|
|
C-6 849.0355 849.2355 849.4355 849.6355 849.8355
|
|
C-7 849.0415 849.2415 849.4415 849.6415 849.8415
|
|
C-8 849.0475 849.2475 849.4475 849.6475 849.8475
|
|
C-9 849.0535 849.2535 849.4535 849.6535 849.8535
|
|
C-10 849.0595 849.2595 849.4595 849.6595 849.8595
|
|
C-11 849.0655 849.2655 849.4655 849.6655 849.8655
|
|
C-12 849.0715 849.2715 849.4715 849.6715 849.8715
|
|
C-13 849.0775 849.2775 849.4775 849.6775 849.8775
|
|
C-14 849.0835 849.2835 849.4835 849.6835 849.8835
|
|
C-15 849.0895 849.2895 849.4895 849.6895 849.8895
|
|
C-16 849.0955 849.2855 849.4955 849.6955 849.8955
|
|
C-17 849.1015 849.3015 849.5015 849.7015 849.9015
|
|
C-18 849.1075 849.3075 849.5075 849.7075 849.9075
|
|
C-19 849.1135 849.3135 849.5135 849.7135 849.9135
|
|
C-20 849.1195 849.3195 849.5195 849.7195 849.9195
|
|
C-21 849.1255 849.3255 849.5255 849.7255 849.9255
|
|
C-22 849.1315 849.3315 849.5315 849.7315 849.9315
|
|
C-23 849.1375 849.3375 849.5375 849.7375 849.9375
|
|
C-24 849.1435 849.3435 849.5435 849.7435 849.9435
|
|
C-25 849.1495 849.3495 849.5495 849.7495 849.9495
|
|
C-26 849.1555 849.3555 849.5555 849.7555 849.9555
|
|
C-27 849.1615 849.3615 849.5615 849.7615 849.9615
|
|
C-28 849.1675 849.3675 849.5675 849.7675 849.9675
|
|
C-29 849.1735 849.3735 849.5735 849.7735 849.9735
|
|
GB 849.1765 849.3765 849.5765 849.7765 849.9765
|
|
to to to to to
|
|
849.1797 849.3797 849.5797 849.7797 849.9797
|
|
P-6 849.1813 849.3813 849.5813 849.7813 849.9813
|
|
P-5 849.1845 849.3845 849.5845 849.7845 849.9845
|
|
P-4 849.1877 849.3877 849.5877 849.7877 849.9877
|
|
P-3 849.1909 849.3909 849.5909 849.7909 849.9909
|
|
P-2 849.1941 849.3941 849.5941 849.7941 849.9941
|
|
P-1 849.1973 849.3973 849.5973 849.7973 849.9973
|
|
|
|
|
|
5 4 3 2 1
|
|
C-1 850.0055 850.2055 850.4055 850.6055 850.8055
|
|
C-2 850.0115 850.2115 850.4115 850.6115 850.8115
|
|
C-3 850.0175 850.2175 850.4175 850.6175 850.8175
|
|
C-4 850.0235 850.2235 850.4235 850.6235 850.8235
|
|
C-5 850.0295 850.2295 850.4295 850.6295 850.8295
|
|
C-6 850.0355 850.2355 850.4355 850.6355 850.8355
|
|
C-7 850.0415 850.2415 850.4415 850.6415 850.8415
|
|
C-8 850.0475 850.2475 850.4475 850.6475 850.8475
|
|
C-9 850.0535 850.2535 850.4535 850.6535 850.8535
|
|
C-10 850.0595 850.2595 850.4595 850.6595 850.8595
|
|
C-11 850.0655 850.2655 850.4655 850.6655 850.8655
|
|
C-12 850.0715 850.2715 850.4715 850.6715 850.8715
|
|
C-13 850.0775 850.2775 850.4775 850.6775 850.8775
|
|
C-14 850.0835 850.2835 850.4835 850.6835 850.8835
|
|
C-15 850.0895 850.2895 850.4895 850.6895 850.8895
|
|
C-16 850.0955 850.2855 850.4955 850.6955 850.8955
|
|
C-17 850.1015 850.3015 850.5015 850.7015 850.9015
|
|
C-18 850.1075 850.3075 850.5075 850.7075 850.9075
|
|
C-19 850.1135 850.3135 850.5135 850.7135 850.9135
|
|
C-20 850.1195 850.3195 850.5195 850.7195 850.9195
|
|
C-21 850.1255 850.3255 850.5255 850.7255 850.9255
|
|
C-22 850.1315 850.3315 850.5315 850.7315 850.9315
|
|
C-23 850.1375 850.3375 850.5375 850.7375 850.9375
|
|
C-24 850.1435 850.3435 850.5435 850.7435 850.9435
|
|
C-25 850.1495 850.3495 850.5495 850.7495 850.9495
|
|
C-26 850.1555 850.3555 850.5555 850.7555 850.9555
|
|
C-27 850.1615 850.3615 850.5615 850.7615 850.9615
|
|
C-28 850.1675 850.3675 850.5675 850.7675 850.9675
|
|
C-29 850.1735 850.3735 850.5735 850.7735 850.9735
|
|
GB 850.1765 850.3765 850.5765 850.7765 850.9765
|
|
to to to to to
|
|
850.1797 850.3797 850.5797 850.7797 850.9797
|
|
P-6 850.1813 850.3813 850.5813 850.7813 850.9813
|
|
P-5 850.1845 850.3845 850.5845 850.7845 850.9845
|
|
P-4 850.1877 850.3877 850.5877 850.7877 850.9877
|
|
P-3 850.1909 850.3909 850.5909 850.7909 850.9909
|
|
P-2 850.1941 850.3941 850.5941 850.7941 850.9941
|
|
P-1 850.1973 850.3973 850.5973 850.7973 850.9973
|
|
|
|
AIR TO GROUND CHANNELS
|
|
~~~~~~~~~~~~~~~~~~~~~~
|
|
CH. # CHANNEL BLOCK
|
|
10 9 8 7 6
|
|
C-1 894.0055 894.2055 894.4055 894.6055 894.8055
|
|
C-2 894.0115 894.2115 894.4115 894.6115 894.8115
|
|
C-3 894.0175 894.2175 894.4175 894.6175 894.8175
|
|
C-4 894.0235 894.2235 894.4235 894.6235 894.8235
|
|
C-5 894.0295 894.2295 894.4295 894.6295 894.8295
|
|
C-6 894.0355 894.2355 894.4355 894.6355 894.8355
|
|
C-7 894.0415 894.2415 894.4415 894.6415 894.8415
|
|
C-8 894.0475 894.2475 894.4475 894.6475 894.8475
|
|
C-9 894.0535 894.2535 894.4535 894.6535 894.8535
|
|
C-10 894.0595 894.2595 894.4595 894.6595 894.8595
|
|
C-11 894.0655 894.2655 894.4655 894.6655 894.8655
|
|
C-12 894.0715 894.2715 894.4715 894.6715 894.8715
|
|
C-13 894.0775 894.2775 894.4775 894.6775 894.8775
|
|
C-14 894.0835 894.2835 894.4835 894.6835 894.8835
|
|
C-15 894.0895 894.2895 894.4895 894.6895 894.8895
|
|
C-16 894.0955 894.2855 894.4955 894.6955 894.8955
|
|
C-17 894.1015 894.3015 894.5015 894.7015 894.9015
|
|
C-18 894.1075 894.3075 894.5075 894.7075 894.9075
|
|
C-19 894.1135 894.3135 894.5135 894.7135 894.9135
|
|
C-20 894.1195 894.3195 894.5195 894.7195 894.9195
|
|
C-21 894.1255 894.3255 894.5255 894.7255 894.9255
|
|
C-22 894.1315 894.3315 894.5315 894.7315 894.9315
|
|
C-23 894.1375 894.3375 894.5375 894.7375 894.9375
|
|
C-24 894.1435 894.3435 894.5435 894.7435 894.9435
|
|
C-25 894.1495 894.3495 894.5495 894.7495 894.9495
|
|
C-26 894.1555 894.3555 894.5555 894.7555 894.9555
|
|
C-27 894.1615 894.3615 894.5615 894.7615 894.9615
|
|
C-28 894.1675 894.3675 894.5675 894.7675 894.9675
|
|
C-29 894.1735 894.3735 894.5735 894.7735 894.9735
|
|
GB 894.1765 894.3765 894.5765 894.7765 894.9765
|
|
to to to to to
|
|
894.1797 894.3797 894.5797 894.7797 894.9797
|
|
P-6 894.1813 894.3813 894.5813 894.7813 894.9813
|
|
P-5 894.1845 894.3845 894.5845 894.7845 894.9845
|
|
P-4 894.1877 894.3877 894.5877 894.7877 894.9877
|
|
P-3 894.1909 894.3909 894.5909 894.7909 894.9909
|
|
P-2 894.1941 894.3941 894.5941 894.7941 894.9941
|
|
P-1 894.1973 894.3973 894.5973 894.7973 894.9973
|
|
|
|
|
|
5 4 3 2 1
|
|
C-1 895.0055 895.2055 895.4055 895.6055 895.8055
|
|
C-2 895.0115 895.2115 895.4115 895.6115 895.8115
|
|
C-3 895.0175 895.2175 895.4175 895.6175 895.8175
|
|
C-4 895.0235 895.2235 895.4235 895.6235 895.8235
|
|
C-5 895.0295 895.2295 895.4295 895.6295 895.8295
|
|
C-6 895.0355 895.2355 895.4355 895.6355 895.8355
|
|
C-7 895.0415 895.2415 895.4415 895.6415 895.8415
|
|
C-8 895.0475 895.2475 895.4475 895.6475 895.8475
|
|
C-9 895.0535 895.2535 895.4535 895.6535 895.8535
|
|
C-10 895.0595 895.2595 895.4595 895.6595 895.8595
|
|
C-11 895.0655 895.2655 895.4655 895.6655 895.8655
|
|
C-12 895.0715 895.2715 895.4715 895.6715 895.8715
|
|
C-13 895.0775 895.2775 895.4775 895.6775 895.8775
|
|
C-14 895.0835 895.2835 895.4835 895.6835 895.8835
|
|
C-15 895.0895 895.2895 895.4895 895.6895 895.8895
|
|
C-16 895.0955 895.2855 895.4955 895.6955 895.8955
|
|
C-17 895.1015 895.3015 895.5015 895.7015 895.9015
|
|
C-18 895.1075 895.3075 895.5075 895.7075 895.9075
|
|
C-19 895.1135 895.3135 895.5135 895.7135 895.9135
|
|
C-20 895.1195 895.3195 895.5195 895.7195 895.9195
|
|
C-21 895.1255 895.3255 895.5255 895.7255 895.9255
|
|
C-22 895.1315 895.3315 895.5315 895.7315 895.9315
|
|
C-23 895.1375 895.3375 895.5375 895.7375 895.9375
|
|
C-24 895.1435 895.3435 895.5435 895.7435 895.9435
|
|
C-25 895.1495 895.3495 895.5495 895.7495 895.9495
|
|
C-26 895.1555 895.3555 895.5555 895.7555 895.9555
|
|
C-27 895.1615 895.3615 895.5615 895.7615 895.9615
|
|
C-28 895.1675 895.3675 895.5675 895.7675 895.9675
|
|
C-29 895.1735 895.3735 895.5735 895.7735 895.9735
|
|
GB 895.1765 895.3765 895.5765 895.7765 895.9765
|
|
to to to to to
|
|
895.1797 895.3797 895.5797 895.7797 895.9797
|
|
P-6 895.1813 895.3813 895.5813 895.7813 895.9813
|
|
P-5 895.1845 895.3845 895.5845 895.7845 895.9845
|
|
P-4 895.1877 895.3877 895.5877 895.7877 895.9877
|
|
P-3 895.1909 895.3909 895.5909 895.7909 895.9909
|
|
P-2 895.1941 895.3941 895.5941 895.7941 895.9941
|
|
P-1 895.1973 895.3973 895.5973 895.7973 895.9973
|
|
|
|
|
|
|
|
Here is a reference chart of allocated channel blocks around the country.
|
|
|
|
GEOGRAPHICAL CHANNEL BLOCK LAYOUT
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
(ground stations using the same channel block must be at
|
|
least 300 miles apart)
|
|
|
|
LOCATION CH. BLOCK
|
|
ALASKA
|
|
Anchorage 8
|
|
Cordova 5
|
|
Ketchikan 5
|
|
Juneau 4
|
|
Sitka 7
|
|
Yakutat 8
|
|
ALABAMA
|
|
Birmingham 2
|
|
ARIZONA
|
|
Phoenix 4
|
|
Winslow 6
|
|
ARKANSAS
|
|
Pine Bluff 8
|
|
CALIFORNIA
|
|
Blythe 10
|
|
Eureka 8
|
|
Los Angeles 4
|
|
Oakland 1
|
|
S. San Fran. 6
|
|
Visalia 7
|
|
COLORADO
|
|
Colorado Spgs. 8
|
|
Denver 1
|
|
Hayden 6
|
|
FLORIDA
|
|
Miami 4
|
|
Orlando 2
|
|
Tallahassee 7
|
|
GEORGIA
|
|
Atlanta 5
|
|
St. Simons Is. 6
|
|
HAWAII
|
|
Mauna Kapu 5
|
|
IDAHO
|
|
Blackfoot 8
|
|
Caldwell 10
|
|
ILLINOIS
|
|
Chicago 3
|
|
Kewanee 5
|
|
Schiller Park 2
|
|
INDIANA
|
|
Fort Wayne 7
|
|
IOWA
|
|
Des Moines 1
|
|
KANSAS
|
|
Garden City 3
|
|
Wichita 7
|
|
KENTUCKY
|
|
Fairdale 6
|
|
LOUISIANA
|
|
Kenner 3
|
|
Shreveport 5
|
|
MASSACHUSETTS
|
|
Boston 7
|
|
MICHIGAN
|
|
Bellville 8
|
|
Flint 9
|
|
Sault S. Marie 6
|
|
MINNESOTA
|
|
Bloomington 9
|
|
MISSISSIPPI
|
|
Meridian 9
|
|
MISSOURI
|
|
Kansas City 6
|
|
St. Louis 4
|
|
Springfield 9
|
|
MONTANA
|
|
Lewistown 5
|
|
Miles City 8
|
|
Missoula 3
|
|
NEBRASKA
|
|
Grand Island 2
|
|
Ogallala 4
|
|
NEVADA
|
|
Las Vegas 1
|
|
Reno 3
|
|
Tonopah 9
|
|
Winnemucca 4
|
|
NEW MEXICO
|
|
Alamogordo 8
|
|
Albuquerque 10
|
|
Aztec 9
|
|
Clayton 5
|
|
NEW JERSEY
|
|
Woodbury 3
|
|
NEW YORK
|
|
E. Elmhurst 1
|
|
Schuyler 2
|
|
Staten Island 9
|
|
NORTH CAROLINA
|
|
Greensboro 9
|
|
Wilmington 3
|
|
NORTH DAKOTA
|
|
Dickinson 7
|
|
OHIO
|
|
Pataskala 1
|
|
OKLAHOMA
|
|
Warner 4
|
|
Woodward 9
|
|
OREGON
|
|
Albany 5
|
|
Klamath Falls 2
|
|
Pendleton 7
|
|
PENNSYLVANIA
|
|
Coraopolis 4
|
|
New Cumberland 8
|
|
SOUTH CAROLINA
|
|
Charleston 4
|
|
SOUTH DAKOTA
|
|
Aberdeen 6
|
|
Rapid City 5
|
|
TENNESSEE
|
|
Elizabethton 7
|
|
Memphis 10
|
|
Nashville 3
|
|
TEXAS
|
|
Austin 2
|
|
Bedford 1
|
|
Houston 9
|
|
Lubbock 7
|
|
Monahans 6
|
|
UTAH
|
|
Abajo Peak 7
|
|
Delta 2
|
|
Escalante 5
|
|
Green River 3
|
|
Salt Lake City 1
|
|
VIRGINIA
|
|
Arlington 6
|
|
WASHINGTON
|
|
Seattle 4
|
|
Cheney 1
|
|
WEST VIRGINIA
|
|
Charleston 2
|
|
WISCONSIN
|
|
Stevens Point 8
|
|
WYOMING
|
|
Riverton 9
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
|
|
|
|
############################################
|
|
# Credit Card Authorization Machines #
|
|
# Emery Lapinski #
|
|
############################################
|
|
|
|
|
|
This article contains information pertaining to VeriFone Credit Card
|
|
Authorization machines. I have not run across any files containing information
|
|
on this subject, but if anyone knows where I can find more information about
|
|
these little grey boxes I would appreciate it.
|
|
|
|
The VeriFone comes under different names. This file is from hacking a ZON Jr XL,
|
|
but I have also seen ones that look much similar under the name TRANZ. If
|
|
anoyone has any information on the similarities/differences of these machines
|
|
I would appreciate the info....
|
|
|
|
|
|
|
|
THIS FILE IS FOR INFORMATIONAL PURPOSES ONLY.
|
|
THIS FILE IS INTENDED FOR AUTHORIZED PERSONS IN UNDERSTANDING/OPTIMIZING
|
|
THIER MACHINE.
|
|
THE AUTHOR TAKES NO RESPONSIBILITY FOR THE ACTS OF OTHERS.
|
|
|
|
WARNING! Please contact MichiganBankCard and all other applicible agencies
|
|
before reading this file.
|
|
|
|
|
|
|
|
This is the basic layout the machine, and some information on how it works.
|
|
|
|
VeriFone ZON Jr XL
|
|
(Michigan Bankcard)
|
|
|
|
|||||||||||||||||||||||||||||||||||
|
|
|||||||16 CHARACTER DISPLAY||||||||
|
|
|||||||||||||||||||||||||||||||||||
|
|
|
|
- -sale-- -credit -force- -------
|
|
| QZ. | | ABC | | DEF | | |
|
|
| 1 | | 2 | | 3 | |CLEAR|
|
|
- ------- ------- ------- -------
|
|
|
|
- ------- -check- -auth-- -------
|
|
| GHI | | JKL | | MNO | |BACK-|
|
|
| 4 | | 5 | | 6 | |SPACE|
|
|
- ------- ------- ------- -------
|
|
cash-
|
|
- ------- -mgmt-- balance- -------
|
|
| PRS | | TUV | | WXY se | |
|
|
| 7 | | 8 | | 9 tt |ALPHA|
|
|
- -recall -store- ------le -------
|
|
|
|
- ------- -check- -auth-- -------
|
|
| ,'" | | -SP | | | |FUNC |
|
|
| * | | 0 | | # | |ENTER|
|
|
- ------- ------- ------- -------
|
|
|
|
CLEAR:
|
|
Pressing CLEAR at any time brings the VeriFone back to the READY state.
|
|
|
|
BACKSPACE:
|
|
Used to erase previously enterd characters.
|
|
|
|
ALPHA:
|
|
Used to scroll through the letters on each key. Pressing an 8 will display
|
|
8. Pressing ALPHA will change this first to T, and successive presses will
|
|
change this to U, then V, then T again.
|
|
|
|
FUNC/ENTER:
|
|
Usually a blue key where all the other keys are grey. Used to indicate
|
|
end of input when entering information, or to change the FUNCTIONS of
|
|
the keys to do alternate things.
|
|
|
|
(1)SALE:
|
|
Pressing 1(SALE) means you want to process a sale transaction. The VeriFone
|
|
will ask for the credit card number. The unit uses the CC number algorithm
|
|
to check this number and can display BAD CC NUMBER. The expiration date
|
|
may be entered at this time at the end of the CC nunmber, or after pressing
|
|
ENTER it will ask for the expiration date which is of the form mmyy or myy.
|
|
This information can be entered with the keypad or by sliding the credit card
|
|
through the CC reader slot.
|
|
Then the amount of the transaction is entered (without a decimal point and
|
|
without rounding the cents) followed by ENTER.
|
|
The VeriFone calls in to get a 6-digit authorization number. Usually this
|
|
is 6 numbers, but I have seen it composed of two letters followed by 4 digits
|
|
as well. It usually begins with AP which indicates approval.
|
|
If the transaction in not approved it returns various messages depending on
|
|
the reason. This could be DECLINE, meaning there is not enough money left
|
|
in the account; CALL-HOLD meaning there is enough money but someone has
|
|
done an AUTHORIZATION (not a SALE) which reserves some of the accounts money
|
|
and will be released after 7-10 days if not DRAFT is recieved; or just
|
|
CALL, which usually means the card is stolen or cancelled.
|
|
This transaction is stored in the batch, if approved, and the approval number
|
|
is displayed.
|
|
Pressing CLEAR returns the unit to its READY state.
|
|
|
|
(2)CREDIT:
|
|
Pressing 2(CREDIT) is used for the processing of a CREDIT (as opposed to SALE)
|
|
draft. Information same as above but the VeriFone does not call to get any
|
|
kind of authorization. After all the information is enterd the unit
|
|
retunrs to the READY state.
|
|
This information is stored in the batch with CI in place of MC, VI, etc. to
|
|
indicate a credit.
|
|
|
|
(3)FORCE:
|
|
Similar to a SALE except that the unit does not call to get an approval
|
|
number. Used when an transaction is DENIED, or erased. The unit does not
|
|
call to get an approval number. The information is stored in the batch.
|
|
|
|
(4)UNDEFINED:
|
|
Could be used for special services, like AMEX transactions or Collection
|
|
Services.
|
|
|
|
(5)CHECK:
|
|
Something to do with authorization of checks and check cashing but I'm
|
|
unclear about this one.
|
|
|
|
(6)AUTH:
|
|
Like SALE, returns approval or decline code but is not stored in batch.
|
|
Places a HOLD on the card for the entered amount for 7-10 days. A sales
|
|
draft can be sent in based on this, otherwise the HOLD will be removed.
|
|
Used to reserve money on the account or to check to see if the card is good.
|
|
|
|
(7)UNDEFINED:
|
|
Can be used for more special services.
|
|
|
|
(8)CASH-MGMT:
|
|
I have no idea.
|
|
|
|
(9)BALANCE & SETTLE FUNCTIONS:
|
|
At the end of day or whenever the batch is filled (about 100 transactions)
|
|
a batch number is obtained. This is a nine digit number that is used to
|
|
reference the batch of transactions when dealing with credit corporations.
|
|
First one must BALANCE the batch. Pressing 9 (to BALANCE) will ask for a
|
|
password (stored in location 053). Enter this number and press ENTER.
|
|
The VeriFone will ask for the number of transactions which is simply a count
|
|
of the number of transactions followed by ENTER. If this is correct then
|
|
it will ask for total amount, which is the total amount of all the
|
|
transactions (the decimal point is not entered but the cents must not
|
|
be rounded so that if the total was $174.30 it would be 17430) followed by
|
|
ENTER. If either the # of transactions of total amount is incorrect
|
|
then the VeriFone diaplays the first entry of the batch which is the
|
|
last 5 digits of the credit card number followed by credit card type (VI, MC,
|
|
etc.) followed by the 6 digit authorization number, followed by the
|
|
amount of the transaction. By entering digits at this time, followed by
|
|
ENTER,the amount of the transaction can be changed. The batch is scrolled
|
|
forward by pressing ENTER.
|
|
When the information is correctly entered, The VeriFone displays READY (or
|
|
whatever is stored in location 030.) When the 9 is pressed again (to SETTLE)
|
|
it calls to process the batch. It transmits its information (if any of the
|
|
information has been changed, it sends it twice) and recieves the 9 digit
|
|
batch number, which it displays.
|
|
|
|
(0)AUTO:
|
|
An auto-dialer of some sort. Phone numbers can be stored in memory, and
|
|
pressing AUTO will dial it for you and tell yo to pick up the handset when
|
|
it is finished. I'm not sure how to use it.
|
|
|
|
MEMORY FUNCTIONS:
|
|
To review the VeriFone's memory, press:
|
|
FUNC,7
|
|
The screen will display
|
|
=
|
|
and will wait for you to enter three numbers or press ENTER which will start
|
|
at 000. Pressing ENTER will increment the location displayed, ALPHA will
|
|
decrement.
|
|
To change the Verifone's memory, press:
|
|
FUNC,8
|
|
You are asked for a password, but this is not the password stored at location
|
|
053 (this password is used for functions like getting batch numbers, clearing
|
|
the batch, changing the information in the batch, etc.) On the two machines
|
|
I have checked this password is 166831, which I obtained to when the local
|
|
authorization phone number was changed. It would call this number twice
|
|
getting a "The number you have called has been changed . . ." message,
|
|
then would call the 1-800 number.
|
|
|
|
Valid Memory Locations of form ### are:
|
|
000-399, 400-412, 500-512, 600-612, 700-712, 800-812, 900-912
|
|
|
|
Loc# Information Meaning (?)
|
|
- --------------------------------------------
|
|
000 12146808459 Phone number of some computer.
|
|
019 JXL0001 Type of machine
|
|
021 2-ART,VIDEO Type of store
|
|
022-029 <EMPTY>
|
|
030 READY Message Displayed when machine is ready
|
|
053 123456 Some functions require password, this is it (?)
|
|
056,058 18002221455 More Computers
|
|
057,059 18005543363 More Computers
|
|
100 9299783 More Computers
|
|
108 SALE Message display when 1(SALE) key is pressed
|
|
208 CREDIT Message display when 2(CREDIT) key is pressed
|
|
#08 Locations 108,208, . . . are messages displayed when
|
|
that key is pressed. Not true for 008. Can
|
|
be changed to whatever you want.
|
|
311-399 <EMPTY>
|
|
|
|
Many of the other locations contain long strings of characters that are some
|
|
sort of password/id/information (up to 40 characters I think) that the
|
|
VeriFone passes when it calls in, others are empty or used to store new
|
|
information. Chnaging these can upset the functionality of the unit.
|
|
Local numbers are called first, and if no successful connection, then the
|
|
1-800 number is called.
|
|
|
|
CLEARING THE BATCH:
|
|
Pressing
|
|
FUNC,6(?)
|
|
followed by the password (location 053) followed by ENTER. The VeriFone asks
|
|
"CLEAR BATCH?". Pressing ENTER clears the BATCH, CLEAR cancels this. To
|
|
restore the BATCH, FORCE would be used to restore this information insted of
|
|
SALE as SALE would obtain a second transaction and approval number.
|
|
|
|
UNIT SEND & UNIT RECIEVE:
|
|
Pressing
|
|
FUNC,*
|
|
or
|
|
FUNC,#(?)
|
|
does UNIT SEND or UNIT RECIEVE which does some sort of UPLOAD/DOWNLOAD
|
|
functions. I'm not sure how this one works.
|
|
Useful if important memory locations of the VeriFone are chnaged and
|
|
upset some of the functions, then the central company can replace the
|
|
information easily.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
|
|
/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/
|
|
-/- -/-
|
|
/-/ *> TID-BYTES <* /-/
|
|
-/- -/-
|
|
/-/ by the Informatik Staff /-/
|
|
-/- -/-
|
|
/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/
|
|
|
|
Tid-Bytes is a standing column of miscellaneous bits of information.
|
|
|
|
This issue we have an update on cordless phone frequencies, a complete CLASS
|
|
code list, a list of companies that can provide you with information and
|
|
material on bombs, survival, crime, and other fun stuff, and Holistic Hacker
|
|
gives us a peek into Bell.
|
|
|
|
|
|
Cordless Phone Update
|
|
~~~~~~~~~~~~~~~~~~~~~
|
|
This is a little extra info on cordless phone frequencies from issue 01. I
|
|
decided that there are times that the handset frequencies could also be handy
|
|
for when the base itself is out of range. Note that a good many cordless
|
|
phones handsets are simplex, so the conversation will be one-sided. Here is
|
|
the list again, with the updated handset frequencies.
|
|
|
|
channel base handset
|
|
1 46.610 49.670
|
|
2 46.630 49.845
|
|
3 46.670 49.860
|
|
4 46.710 49.770
|
|
5 46.730 49.875
|
|
6 46.770 49.830
|
|
7 46.830 49.890
|
|
8 46.870 49.930
|
|
9 46.930 49.990
|
|
10 46.970 46.970
|
|
|
|
|
|
|
|
|
|
CLASS and Custom Calling Feature Control Codes:
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
The following list was compiled from comp.dcom.telecom postings and
|
|
the Bell Atlantic "IQ services" information line at (800) 365-5810.
|
|
|
|
(These appear to be standard, but may be changed locally)
|
|
|
|
*57 Customer Orignated Trace (COT) Activation "call trace"
|
|
The number of the last call you received is logged at the CO.
|
|
You get an acknowledging recording. Then hang up.
|
|
Write down the date and time.
|
|
You don't get the number - you must contact the
|
|
business office or police.
|
|
Costs $1.50 - $3 depending on your area.
|
|
|
|
*60 Selective Call Rejection (SCR) Activation
|
|
(start "call block" list management)
|
|
|
|
*61 Selective Distinctive Alerting (SDA) Activation
|
|
(start "priority call" list management)
|
|
|
|
*62 Selective Call Acceptance (SCA) Activation
|
|
|
|
*63 Selective Call Forwarding (SCF) Activation
|
|
(start "select forwarding list" management)
|
|
|
|
*65 ICLID Activation (caller ID)
|
|
(turn on caller ID delivery to me, the subscriber)
|
|
|
|
*66 Automatic Recall (AR) Activation
|
|
(activate "repeat call" - retry last number for 30 minutes)
|
|
|
|
*67 Call Privacy Toggle (block caller ID delivery for next call only)
|
|
*68 Computer Access Restriction Toggle
|
|
*69 AC Activation "return call" (call last person who called you)
|
|
*70 Call waiting disable
|
|
"tone block" (prevent call waiting tone, useful for data calls)
|
|
*70 // dial tone // the number you're dialing
|
|
|
|
*71 Ring, no-answer forward activation
|
|
*72 Call forwarding immediate Activation (72# on some systems)
|
|
*73 Call forwarding Deactivation (73# on some systems)
|
|
*74 Speed call 8 program (74# on some systems)
|
|
*80 SCR Deactivation "call block"
|
|
*81 SDA Deactivation "priority call"
|
|
*82 SCA Deactivation
|
|
*83 SCF Deactivation "select forwarding"
|
|
*85 ICLID Deactivation (turn off caller ID delivery to me, the subscriber)
|
|
*86 AR Deactivation "repeat call"
|
|
*89 AC Deactivation "return call"
|
|
n# speed dial (n=2 to 9)
|
|
nn# speed dial (nn=20-49)
|
|
72# activate call forwarding
|
|
73# deactivate call forwarding
|
|
74# set speed dialing (8 numbers)
|
|
75# set speed dialing (30 numbers)
|
|
|
|
Rotary/pulse phones: use 11 for the * (ex: *57 => 1157) (is there a
|
|
pulse code for #? I doubt it becuase it's not a prefix)
|
|
|
|
You do not need to subscribe to call trace to use it. Some areas
|
|
allow return call and repeat call on a per use basis. The cost is
|
|
higher per use than with a subscription, but you pay nothing for
|
|
months where you don't use it.
|
|
|
|
*65 and *85 are used when you subscribe to Caller-ID if you want to
|
|
reduce the number of calls logged because there's a surcharge after
|
|
400 calls per month.
|
|
|
|
New York Telephone has a recorded message system describing their
|
|
services. Here's what I gathered from (800) EASY-NYT (327-9698) (this
|
|
mostly jives with information from the Bell Atlantic IQ services
|
|
information line at (800) 365-5810)
|
|
|
|
Menu choice:
|
|
|
|
45 -> A person relays voice/TDD at no additional charge.
|
|
This is WITHIN New York State only.
|
|
What about calls in/out of New York State?
|
|
The operator said the originator should call information for
|
|
the relay service. This is a service of AT&T, and is currently
|
|
not allowed to call across states.
|
|
(800) 421-1220 voice
|
|
(800) 662-1220 TDD
|
|
|
|
The AT&T newsline (908) 221-6397 (221-NEWS)
|
|
for Friday June 8, 1991 mentioned that the (Chicago) Illinois
|
|
relay center opened June 10.
|
|
It is the fourth, others being in New York, Alabama and California.
|
|
[and Sprint's in Texas as mentioned in TELECOM Feb 1992]
|
|
|
|
46 -> restrict outgoing calls to pay services
|
|
exchanges 540, 550, 970, 970
|
|
area codes 700, 900
|
|
This service is free of charge.
|
|
|
|
14 -> "Ring Mate" allows you to add one or two additional numbers,
|
|
each with a unique ring pattern (and call waiting beep).
|
|
|
|
AT&T has language translation centers. I believe these are the numbers:
|
|
|
|
(408) 648-5871 AT&T Language Line (outside the USA)
|
|
(800) 628-8486 AT&T Language Line (USA only)
|
|
(800) 752-6096 AT&T Language Line information
|
|
|
|
You can get translators (English/Japanese, ...) as needed, but the
|
|
cost is rather high. I'm not sure if reservations/appointments are
|
|
necessary. It would be interesting to see the setup and costs for a
|
|
conference call from the US to Japan, using the translation center and
|
|
a TDD relay for the deaf (particularly if the deaf were non-english).
|
|
Or better yet -- a video conference from the US to Russia with
|
|
translators.
|
|
|
|
CCITT rules:
|
|
|
|
How to write a number:
|
|
|
|
+1 212 555 1212
|
|
international
|
|
(spaces, NO dashes)
|
|
|
|
(212) 555 1212
|
|
within the country (parentheses around the optional city code)
|
|
|
|
|
|
|
|
|
|
|
|
Politically Incorrect Publishers
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
This is a listing of mail-order publishers & distributors of books concerning
|
|
weapons, combat, explosives, etc. A pound sign (#) indicates that the company
|
|
carries a line of books, but specializes in other items, such as gun leather,
|
|
yuppie survival goods, ID cards & certificates, medals & patches, outdoor
|
|
clothing, etc. There are all sorts of nify goodies that you can order.
|
|
|
|
Brigade Quartermasters #
|
|
1025 Cobb International Blvd.
|
|
Kennesaw, GA 30144-4300
|
|
Information: (404) 428-1234
|
|
Orders: (800) 338-4327
|
|
Fax Orders: (404) 426-7726
|
|
Telex: 54-2461
|
|
|
|
Butokukai
|
|
P.O. Box 430
|
|
Cornville, AZ 86325
|
|
(602) 634-6280
|
|
|
|
CEP, Incorporated
|
|
P.O. Box 865
|
|
Boulder, CO 80306
|
|
(303) 443-2294
|
|
|
|
Delta Press, Ltd.
|
|
P.O. Box 1625
|
|
215 S. Washington St.
|
|
El Dorado, AR 71731
|
|
Orders: (800) 852-4445
|
|
Service: (501) 862-4984
|
|
|
|
Desert Publications
|
|
P.O. Box 1751
|
|
716 Harrell St.
|
|
El Dorado, AR 71731-1751
|
|
Orders: (800) 852-4445
|
|
Fax Orders: (501) 862-9671
|
|
Information: (501) 862-2077
|
|
|
|
Eden Press
|
|
P.O. Box 8410
|
|
Fountain Valley, CA 92728
|
|
Orders: (800) 338-8484
|
|
Info & CA: (714) 556-2023
|
|
|
|
Loompanics Unlimited
|
|
P.O. Box 1197
|
|
Port Townsend, WA 98368
|
|
(No phone?)
|
|
|
|
Mass Army Navy Store #
|
|
15 Fordham Road
|
|
Boston, MA 02134
|
|
Orders: (800) 343-7749
|
|
Info & MA: (617) 783-1250
|
|
Fax: (617) 254-6607
|
|
|
|
National Intelligence Book Center
|
|
1700 W St., N.W Suite 607
|
|
Washington, DC 20006
|
|
Phone: (202) 797-1234 (SUBSCRIPTION)
|
|
Phone: (202) 337-8084 (ORDER)
|
|
fax: (202) 342-2342
|
|
|
|
NIC, Inc. (Law Enforcement Supply) #
|
|
220 Carroll St., Suite D1
|
|
P.O. Box 5210
|
|
Shreveport, LA 71135-5210
|
|
Orders: (318) 222-2970 (24 hr.)
|
|
Fax: (318) 869-3228 (24 hr.)
|
|
|
|
Paladin Press
|
|
P.O. Box 1307
|
|
Boulder, CO 80306
|
|
Orders: (800) 392-2400
|
|
Service: (303) 443-7250
|
|
|
|
Phoenix Systems, Inc. #
|
|
P.O. Box 3339
|
|
Evergreen, CO 80439
|
|
Fax: (303) 278-8101
|
|
Throat: (303) 277-0305 (08:00-17:00 MST/MDT)
|
|
|
|
Quartermaster #
|
|
750 Long Beach Blvd
|
|
Long Beach, CA 90813
|
|
P.O. Box 829
|
|
Long Beach, CA 90801-0829
|
|
Orders: (800) 444-8643
|
|
Info: (800) 933-3135
|
|
|
|
Survival Books
|
|
11106 Magnolias Blvd.
|
|
N. Hollywood, CA 91601-3810
|
|
(818) 763-0804
|
|
|
|
U.S. Cavalry #
|
|
2855 Centennial Ave.
|
|
Radcliff, KY 40160-9000
|
|
Orders: (800) 777-7732
|
|
Info: (502) 351-1164
|
|
|
|
|
|
|
|
Southwestern Bell Visitor Passes
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Holistic Hacker - H0D sends us this note:
|
|
|
|
I acquired this goody on a visit of the SW Bell facilities in St. Louis
|
|
last year. Here's a brief description of it. The pass is on light blue
|
|
cardboard stock approximately 2.5" wide by 3.5" high. The Bell logo is
|
|
in the top left corner and "Southwestern Bell Telephone" is typed along
|
|
the top. Centered about 1.5" from the top is "Visitor Temporary Pass."
|
|
Below that is name, company, and admit to, all followed by some lines to
|
|
write the appropriate BS in. "Void After" and "Issued By" are farther
|
|
down. On my pass, "Admit To" = OBC (One Bell Center) and "Issued By" =
|
|
F.A. Too bad I couldn't keep the visitor pass to their data center...
|
|
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
|
|
(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)
|
|
)%( )%(
|
|
(%) > Hot Flashes < (%)
|
|
)%( )%(
|
|
(%) The Underground News Report (%)
|
|
)%( )%(
|
|
(%) Edited by: the Informatik Staff (%)
|
|
)%( )%(
|
|
(%) Jan thru Apr 1992 (%)
|
|
)%( )%(
|
|
(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)
|
|
|
|
|
|
IMPORTANT NOTE: We have decided to not generally include any future news
|
|
features on hacking or phreaking. Occasionally we may include one or two if we
|
|
feel that they have not been covered elswhere. Our decision is based on the
|
|
fact that Phrack, a long-standing electronic publication devoted to the hacker
|
|
community, does an excellent job of collecting them. There is no use in both
|
|
of use publishing the same stories over and over. We do plan to keep stories
|
|
concerning fraud, government, and other goodies not normally addressed by
|
|
Phrack. SO, for most hacking and phreaking news stories check out Phrack.
|
|
|
|
|
|
|
|
=====================================
|
|
Wireless Cable Lottery Spurring Scams
|
|
=====================================
|
|
|
|
WASHINGTON, D.C., U.S.A., 1992 APR 15 (NB) -- The Federal
|
|
Communications Commission's lottery of rights to operate wireless
|
|
cable systems is becoming a hotbed for con-men, according to
|
|
federal and state officials.
|
|
|
|
The Bush Administration has said it wants to end the lottery
|
|
process and award new frequencies based on auctions, while
|
|
Congress wants hearings and awards based on a "public interest"
|
|
test. But until all that is sorted out, lotteries, in which people
|
|
file applications and the agency chooses winners by lot, are the
|
|
way the agency will allocate rights.
|
|
|
|
The current controversy involves wireless cable television, a
|
|
technology using microwave radio technology to transmit TV
|
|
programs to viewers' homes, bypassing wired cable systems. The
|
|
low capacity of such systems, compared with the high capacity of
|
|
existing wired cable systems, makes them a risky business
|
|
proposition in large cities wired for cable, but that has not
|
|
stopped the con artists.
|
|
|
|
So far, 18 state securities agencies have investigated or taken
|
|
action against suspected scams in Georgia, with Illinois and Florida
|
|
adding their voices in the form of press releases and warnings from
|
|
state officials. The Federal Trade Commission has also been
|
|
investigating lottery fraud, and has filed three lawsuits.
|
|
|
|
Florida Comptroller, Gerald Lewis, who regulates the state's
|
|
banks, claimed at a news conference that "boiler room" operations
|
|
touting license lotteries have taken in $50 million nationwide.
|
|
He said the con artists claim that for $5,000 they can virtually
|
|
guarantee a successful application. The actual filing fee is
|
|
$155, and over 36,000 applications have been received so far,
|
|
according to the FCC.
|
|
|
|
Illinois Secretary of State George Ryan estimated in a press
|
|
statement that investors have risked $75 million on the schemes,
|
|
and his office has taken action against two such companies in that
|
|
state. The FCC has been granting wireless cable licenses for nine
|
|
years, but fewer than 170 such systems are actually up and running,
|
|
he added, indicating the business risk is considerable since
|
|
wireless cable works only in a "line of sight" from a central antenna
|
|
to a subscriber.
|
|
|
|
Later this year, the FCC will launch a second and, perhaps, more
|
|
lucrative lottery process. This will be for new frequencies to
|
|
run communications adjuncts to interactive TV systems like that
|
|
offered by TV Answer of Reston, Virginia. TV Answer has won
|
|
agreement from Hewlett-Packard to make set-top converters for
|
|
its system, which will offer banking, shopping, information, and
|
|
games. In this lottery, however, winning bidders will be forced
|
|
to build-out at least half their systems before selling their
|
|
interests. Applications will cost about $5,000-$10,000, depending
|
|
on the size of the market applied for, and total costs to winning
|
|
bidders are estimated at $150,000-$250,000, again depending
|
|
on the size of the market.
|
|
|
|
- ------------------------------------------------------------------------------
|
|
|
|
|
|
==============================
|
|
SPA Raids Grand Central Camera
|
|
==============================
|
|
|
|
WASHINGTON, DC, U.S.A., 1992 APR 8 (NB) -- On March 25, U.S.
|
|
Marshals and representatives of the Software Publishers
|
|
Association raided grand Central Cameras (AKA GCT Photo Dealers)
|
|
based on charges that the company had been making illegal copies
|
|
of software and selling computers preloaded with the programs in
|
|
violation of U.S. copyright laws.
|
|
|
|
SPA member companies whose software has allegedly been copied
|
|
include Lotus, Microsoft, WordPerfect, Datastorm Technologies,
|
|
Fifth Generation Systems, Interplay Productions, and Sphere.
|
|
|
|
Copied software was found on 25 seized floppy diskettes which
|
|
allegedly served as duplication masters. In addition, sales
|
|
records with names of customers were also taken and will
|
|
reportedly be used to determine if those obtaining pirated
|
|
software will be named in the case against the store.
|
|
|
|
Also seized in the raid, which was based on a federal court order
|
|
issued in the United States Court for the Southern District of
|
|
New York, were three desktop computers and two laptops which the
|
|
SPA says contained illegal or pirated copies of software.
|
|
|
|
Grand Central Cameras has agreed to submit to, and the court
|
|
subsequently entered, a preliminary injunction forbidding
|
|
unauthorized software copying by the reseller.
|
|
|
|
The SPA maintains an anti-piracy hotline, 800-388-7478, which
|
|
collects information from people wishing to report software
|
|
copyright violations.
|
|
|
|
To get a copy of the SPA Self-Audit Kit and SPAudit inventory
|
|
management program, companies should write to: SPAudit Software
|
|
Publishers Association 1730 M. Street, NW, Suite 700 Washington,
|
|
D.C. 20036.
|
|
|
|
- ------------------------------------------------------------------------------
|
|
|
|
|
|
===================================================
|
|
MCI Nixes Billing For Problem Pay-Per-Call Services
|
|
===================================================
|
|
|
|
WASHINGTON, D.C., U.S.A., 1992 APR 1 (NB) -- MCI
|
|
Communications has announced it is no longer accepting
|
|
applications for the more dubious firms offering financial
|
|
services on its premium-rated "900" area code lines.
|
|
|
|
Specifically, MCI is prohibiting companies offering credit card
|
|
and loan advice services on the premium rate services. Newsbytes
|
|
notes that the majority of these companies are usually only
|
|
dispensing common-sense rules on building credit ratings up and
|
|
charging heavily for the privilege.
|
|
|
|
One "900" number that Newsbytes called in the US recently in
|
|
connection with a financial feature turned out to be a thinly-
|
|
disguised mail-order operation with a "Gold card" membership
|
|
costing $50 that allowed members to buy mail order goods at
|
|
normal prices. Considering that callers to the "900" number paid
|
|
$10 for the call itself, this was clearly a scam.
|
|
|
|
In addition to the financial services block on "900" lines, MCI
|
|
has also ceased handling billing for job agencies which offer
|
|
generic job descriptions and suggestions on how to get a job.
|
|
|
|
The changes, which take effect from April 1, are in addition to a
|
|
previously-announced block on adult services on "900" numbers.
|
|
|
|
"MCI has instituted these policies to further ensure that consumers
|
|
are protected and are subjected to less confusion and fewer
|
|
incidences of abusive sales tactics by some 900 information
|
|
providers," said Carol Herod, MCI senior vice president for
|
|
business marketing, announcing the block.
|
|
|
|
"While we have previously taken strong policy steps that are
|
|
consistent with FCC rules, these additional safeguards can help
|
|
to protect consumers during uncertain economic times. At the
|
|
same time, we want them to be able to take advantage of the
|
|
numerous consumer and business-oriented programs which
|
|
offer legitimate and valuable services," she added.
|
|
|
|
The "900" area code service changes, which were notified to its
|
|
major subscribers in February of this year, are likely to cause a
|
|
major contraction in the number of companies offering premium
|
|
services, Newsbytes notes. MCI, ironically, was one of the first
|
|
telecommunications companies to offer "900" area code premium
|
|
rate services at the beginning of last year.
|
|
|
|
- ------------------------------------------------------------------------------
|
|
|
|
|
|
=================================================================
|
|
Electronic Filing Breeds Tax Fraud Scams; Include Illegal Refunds
|
|
=================================================================
|
|
Los Angeles Times, Apr 14, 1992
|
|
|
|
Los Angeles - Jerome Hearne used to rob people for a living, but sometime
|
|
in the late 1980s or early 1990s he turned to a more lucrative livelihood:
|
|
robbing the U.S. Treasury.
|
|
Hearne's adopted brand of crime was electronic tax fraud.
|
|
He and a band of Los Angeles cohorts joined a fast-growing group of crooks
|
|
who are raiding millions of taxpayer dollars every year by filing false
|
|
returns and getting quick, illegal refunds in the form of bank loans.
|
|
The scams bring together clever ringleaders and large numbers of co-
|
|
conspirators, often unemployed or homeless people who are willing to have
|
|
their real names and Social Security numbers used on fake tax returns.
|
|
In Georgia, such fraud is a growing problem, partly because electronic tax
|
|
filing has been in place for only three years. "All of the kinks and bugs are
|
|
going to have to be ironed out," said Loretta Bush, a spokeswoman for the
|
|
Internal Revenue Service in Atlanta.
|
|
However, she said, intensified efforts by the government to fight
|
|
electronic filing fraud are working. Two Riverdale men recently pleaded guilty
|
|
to filing false tax returns electronically. It was the first criminal
|
|
prosecution of its kind in the Northern District of Georgia.
|
|
The government charged that the men prepared tax returns for clients and,
|
|
then without the clients' knowledge, altered the filings and claimed larger
|
|
refunds than legally were due.
|
|
The men arranged "refund anticipation loans" for their clients, using the
|
|
returns with the inflated refunds.
|
|
When a bank issued checks for the loans, the men endorsed the clients'
|
|
names on the back of the checks, the government said. Then they deposited the
|
|
money in their own accounts.
|
|
The men then issued checks to their clients for the amount they were
|
|
legally owed - and pocketed the difference.
|
|
In Los Angeles, the fraud also involved bank loans.
|
|
The crooks filed fraudulent returns electronically using the government's
|
|
computerized tax-return system. Then they applied for bank loans based on the
|
|
anticipated return. It takes only two to three days for the bank to approve
|
|
such loans and for the scam artists to have checks in their hands.
|
|
By the time IRS auditors discover what has happened, everyone involved
|
|
usually has disappeared with the money - sometimes a great deal of it. Hearne
|
|
and the government dispute the exact size of the take in his scam, but the
|
|
total could top $1 million in false returns.
|
|
Hearne, who denies he was the group's ringleader but has pleaded guilty to
|
|
tax fraud and conspiracy charges, faces sentencing later this month.
|
|
Hearne's case - which involved seven other defendants charged with similar
|
|
crimes - is the nation's biggest so far. But Hearne has plenty of company in
|
|
the electronic tax-scam business.
|
|
"This is a major problem for us," said Dennis Crawford, chief of the
|
|
criminal investigation division of the IRS's Los Angeles office. "It's what's
|
|
hot right now. We've had to pull people off other areas to deal it."
|
|
|
|
- ------------------------------------------------------------------------------
|
|
|
|
|
|
=============================================
|
|
Ads With '800' Numbers Don't Always Ring True
|
|
=============================================
|
|
Elliott Brack, The Atlanta Constitution, Apr 1, 1992
|
|
|
|
Hey, no fooling. You may not believe this, but things aren't always what
|
|
they seem. Really!
|
|
Yet if anyone gave you a 1-800 telephone number, you would automatically
|
|
think that it would be a toll-free call, right?
|
|
Not always, we have learned. Though in most cases the 1-800 number is
|
|
entirely free, the con artists have found another way to work a scam, aimed at
|
|
getting into your pocketbook.
|
|
You may remember that over the last few months we have reported a wave of
|
|
mail to us and other people offering "free gifts," "free vacations" or
|
|
"official notices" that you might have won something free. Actually, the
|
|
way the message is composed, it appears that you are guaranteed of winning
|
|
some major gift.
|
|
In all instances, all you have to do is call the telephone number provided
|
|
to learn what you have won. Up to now, it has been a 1-900 number for you to
|
|
call, which should have told you it would cost you to dial that number. Yet
|
|
the off-chance of winning something big has caused lots of people to pay those
|
|
1-900 toll charges - only to find that the prize is either less than they
|
|
anticipated or inconsequential.
|
|
|
|
CHARGES KICK IN IF YOU STAY ON THE LINE
|
|
Now comes the new twist.
|
|
Recently many people have received notifications, printed like a postcard,
|
|
urging them to call a 1-800 number. It goes further than that. It says "call
|
|
toll free 1-800 [number] for complete instructions." Now that would make
|
|
anyone think there would be no charge for this call, right?
|
|
Wrong. When they call the 1-800 number, they are connected to a
|
|
computerized voice, which tells them to remain on the line and follow the
|
|
instructions. It's here that the computer also warns that they will be billed
|
|
for this service if they stay on the line.
|
|
But since the postcard said "toll free," many people ignore this warning,
|
|
only to find out later they have been billed for the call by their telephone
|
|
company.
|
|
|
|
DON'T BE FOOLED, ESPECIALLY TODAY
|
|
If you stay on the line, here's what happens next. The computer asks you to
|
|
punch in the 12-digit ID number listed on the postcard, as well as your
|
|
telephone number and ZIP code, before the prize will be revealed.
|
|
In other words, if you stay on the line, the con artists get enough
|
|
information to bill you for telling you what you might have won. The 1- 800
|
|
number was used to lure callers, but what eventually happens is just like
|
|
calling a 1-900 number.
|
|
It all amounts to what appears to be one thing, but is distinctly another.
|
|
This reminds me of what consumer advisers continually tell people: Don't give
|
|
out your credit card numbers on the phone. Only this time, you also should not
|
|
be giving out your telephone number, or else you'll get a bill from what
|
|
appeared to be a 1-800 toll-free call.
|
|
Today is April Fool's Day. Make a call to a 1-900 number, or even in some
|
|
instances to a 1-800 number, and you could be fooled any day of the year.
|
|
Things are not always what they seem.
|
|
|
|
- ------------------------------------------------------------------------------
|
|
|
|
|
|
====================================================================
|
|
Teen Accused of Avoiding Payment on $41,000 Worth of Phone-Sex Calls
|
|
====================================================================
|
|
Jeff Schultz, Atlanta Constitution, Apr 9, 1992
|
|
|
|
The first bombshell - to outward appearances a normal, $25, no-calls- to-
|
|
Uncle-Fred-in-Pago-Pago telephone bill - arrived in the mail in December.
|
|
Dorothy Brown opened it, waded through the stack of computer printed pages,
|
|
and . . . and . . .
|
|
"I nearly had a heart attack," she said. "I mean, $13,000! I thought that
|
|
was bad enough. Then I got the next one."
|
|
Ms. Brown's next bill from United Telephone arrived at her Mountain City,
|
|
Tenn., home in January - this one in excess of $27,000. She still hasn't
|
|
gotten over the shock, but at least now there's some knowledge to go with the
|
|
palpitations.
|
|
Christoper Brown, her 19-year-old son, has been indicted by a grand jury on
|
|
a charge of attempting to avoid payment for services valued at more than $500.
|
|
The services were phone-sex numbers. The total was nearly $41,000.
|
|
Mr. Brown, who is accused of making 746 calls in a two-month period, was
|
|
arrested Tuesday and is being held in Johnson County Jail in lieu of $10,000
|
|
bond. He will be arraigned May 1.
|
|
This is the first time AT&T - the long-distance provider of the 900
|
|
services - and United Telephone have indicted somebody for telephone fraud
|
|
related to such services. Tennessee is trying the case as a felony theft,
|
|
punishable by a prison term, fines and restitution.
|
|
Her son's future is only one of many concerns facing Ms. Brown, a machine
|
|
operator at Levi Strauss and Co.
|
|
During a 15-minute phone interview - she called collect - she asked a
|
|
reporter numerous times, "This won't hurt my credit, will it?" and, "Am I
|
|
going to have to pay for these calls?"
|
|
She said she struggles to support herself and two sons in Mountain City
|
|
(population 2,000) and added, "I'm having quite a bit of financial trouble
|
|
as it is. I can't afford an attorney."
|
|
Neither would she post bond for her son when he called her at work from
|
|
jail at 10:30 a.m. Tuesday. "He still didn't act like he was sorry when I
|
|
talked to him," she said. "He was kind of giving smart answers. I told him I
|
|
couldn't [post bond]. He said, 'Yes, you can. You get down here and sign it.'
|
|
I told him, 'No, you should've known better.' "
|
|
Ms. Brown said that when she received the first bill, her son denied
|
|
placing the calls. She suspected that a prisoner in the state penitentiary, 15
|
|
miles from her house, was billing calls to her number.
|
|
"Then I started seeing tablets around the house with those numbers written
|
|
on it. They're those romance numbers. I know he got them on TV. He don't have
|
|
a job so he's home all day. I asked him about the numbers, but he said, 'Oh,
|
|
it's nothing.' "
|
|
She said that only after the second bill did Mr. Brown, , who last month
|
|
was laid off from his job at a chair manufacturer, admit to the calls.
|
|
Jim Cosgrove, a spokesman for United Telephone, said telephone fraud
|
|
affects the industry to the tune of $500 million annually, "but it's difficult
|
|
to get enough evidence to press charges."
|
|
|
|
- ------------------------------------------------------------------------------
|
|
|
|
|
|
==========================================
|
|
Privacy Is Hot-Selling Item At $2 A Minute
|
|
==========================================
|
|
Marilyn Kalfus, The Orange Country Regester, Apr 2, 1992
|
|
|
|
Richard Koch says he has no clue who his customers are.
|
|
That's the point.
|
|
Mr. Koch sells privacy - at $2 a minute.
|
|
His Untraceable Phone Calls, based outside Boston, is a nationwide service
|
|
that prevents people's telephone numbers from being identified and keeps their
|
|
calls from being traced.
|
|
So, just who's using this service?
|
|
"I'm completely in the dark," Mr. Koch said. "It's kind of a strange
|
|
business."
|
|
When callers dial Mr. Koch's 900 number, they reach a computer near Las
|
|
Vegas. The computer, which connects them to a nationwide long- distance line
|
|
Mr. Koch buys from AT&T, gives them a dial tone.
|
|
The number? 1-900-Stopper.
|
|
"This is not a sleazy 900 service," Mr. Koch said. "It's quite the
|
|
opposite.
|
|
"The people who call want to have privacy," he said. "The only call that
|
|
shows up on their phone bill is the 1-900-Stopper call."
|
|
The cost is $2 a minute for calls inside the United States, $5 a minute for
|
|
international calls.
|
|
The service can be used for local calls, long-distance calls and calls to
|
|
800 lines, but not for calls to 900 lines. That way he avoids having to pay
|
|
for 900-line calls that charge more than $2 a minute.
|
|
Mr. Koch figures his service is especially popular in states that have
|
|
approved Caller ID.
|
|
"When any call you make or receive can end up in a marketing database, it's
|
|
time for concern," he said.
|
|
Mr. Koch also says his service is valuable for anyone who doesn't want his
|
|
or her phone records showing up in court records.
|
|
Daisy Ottmann, a spokeswoman for AT&T, confirmed that it works.
|
|
Mr. Koch concedes that some people might use the service to hide criminal
|
|
activity, calling it "a double-edged sword."
|
|
But he said, "Criminals use the U.S. mail, and we don't keep track of
|
|
everyone's mail. Criminals can go out and use a pay telephone and do the same
|
|
thing."
|
|
Indeed, anyone can conceal his calls by using a pay phone, Mr. Koch and Ms.
|
|
Ottmann noted.
|
|
"I just provide the convenience of using your home telephone," Mr. Koch
|
|
said. "You don't have to stand in line at a pay phone and hope no one's
|
|
looking over your shoulder."
|
|
He estimates that more than 200,000 untraceable calls have been made on the
|
|
system since it started two years ago.
|
|
"They can't all be criminals," he said.
|
|
|
|
- ------------------------------------------------------------------------------
|
|
|
|
|
|
========================================
|
|
Italian Crooks Let Others Pay Phone Bill
|
|
========================================
|
|
Translated from "Tagespiegel" (The Berlin Daily Newspaper), Feb 22, 1992
|
|
|
|
Lui, Rome, 21. February 1992. [...] Half a million Italians are the proud
|
|
owners of portable telephones. The cordless appliance has become the favorite
|
|
toy of the Southerners, but the game may soon be over: the "telefonini" are not
|
|
protected.
|
|
|
|
Under the motto "Buy one, pay for two", crooks sell manipulated phones that are
|
|
used so that the buyer has to pay for the toll calls of the seller. The trick
|
|
works like this: the crooks take a computer with a computing program [whatever
|
|
that may be--ed.] like the ones uses to crack automatic teller machines, and
|
|
fuss with it until they find the secret code for the telephone. The code is a
|
|
combination of the telephone number and the serial number that is supposed to
|
|
only be available to the telephone company SIP. When the code has been
|
|
cracked, it is no problem to transfer it to a second telephone, so that both
|
|
telephones have the same license number. One phone is sold "under the hand" by
|
|
the crooks. As an added deal, the buyer not only gets to pay his own phone
|
|
bill, but the fees run up on the second phone as well. The Italian underworld
|
|
is especially keen on using this method.[...] The mafia uses the "portabili"
|
|
for conducting their unclean business.
|
|
|
|
[... The police] have not been able to find the instigators, but they suspect
|
|
that employees of the telephone manufacturing company are involved, as they
|
|
have the knowledge of how the phones are constructed. [...] The portable
|
|
telephone is well-known for the ease of tapping the telephone conversations
|
|
[which cannot, however, be traced to the place of origin. A book calle "Italy,
|
|
I hear you calling" with some of the more interesting tapped conversations has
|
|
just been published.]
|
|
|
|
- ------------------------------------------------------------------------------
|
|
|
|
|
|
===========================
|
|
Robber 'Foiled Bank System'
|
|
===========================
|
|
The Independent (Uk), Mar 13, 1992
|
|
|
|
An electronics expert stole more than (pounds) 17,000 in a high-tech
|
|
robbery spree, plundering dozens of accounts from automatic cash dispensers
|
|
at banks, Paisley [Scotland] Sheriff Court was told yesterday.
|
|
|
|
Clydesdale Bank chiefs claimed their dispensing system was foolproof and told
|
|
angry customers that members of their own households must have been responsible
|
|
for making withdrawals without their knowledge.
|
|
|
|
Anthony Pratt, 32, a bank engineer, used a hand-held computer inside bank
|
|
premises to record transactions being made by customers at "hole-in-the-wall"
|
|
machines outside. He recorded the customer's secret number and later used it
|
|
on plastic cards he made with magnetic strips. Pratt, of East Kilbride, was
|
|
finally arrested after he took cash from a machine in Glasgow. He admitted
|
|
conspiracy to rob and robbery. Sentence was deferred for reports until 2 April.
|
|
|
|
- ------------------------------------------------------------------------------
|
|
|
|
|
|
===============================================
|
|
FBI Fear Phone Advances Will Hamper Wiretapping
|
|
===============================================
|
|
LA Times, Mar 7, 1992
|
|
|
|
Washington- The FBI, contending that rapidly developing telecommunications
|
|
technology is hampering the vital tool of wiretapping, proposed legislation
|
|
Friday that would require the industry to ensure that improvements do not
|
|
interfere with the ability to secretly record conversations.
|
|
|
|
It also proposed that consumers pick up the cost of changing current
|
|
wiretapping equipment to keep pace with new technology.
|
|
|
|
If the problem is not solved, "terrorists, violent criminals, kidnapers, drug
|
|
cartels and other criminal organizations will be able to carry out their
|
|
illegal activities using the telecommunications system without detection." FBI
|
|
Director William S. Sessions said. [...]
|
|
|
|
At issue is the rapid move toward digital telephone communications and
|
|
fiber-optic systems in which thousands of conversations can be carried by
|
|
filaments roughly the size of a strand of human hair.
|
|
|
|
William A. Bayse, assistant FBI director for technical services, and other FBI
|
|
officals contend that the transmission of hundreds and sometimes thousands of
|
|
digital conversations over a single link prevents current wiretapping
|
|
technology from isolating conversations for recording as required under the
|
|
1968 federal wiretap law. [...]
|
|
|
|
Other FBI offical said the expense could be passed on to telephone users at a
|
|
cost of "probably less than 20 cents an average per month." [...]
|
|
|
|
FBI officals maintained, however, that they already have encountered
|
|
difficulties in recording digitally transmitted conversations, now used by
|
|
about 10% of the nations phones. They declined, however, to give any examples
|
|
of such difficulties.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
|
|
Informatik Submission & Subscription Policy
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
|
|
Informatik is an ongoing electronic journal, and thus we are faced with
|
|
the ever present need for a steady influx of new material. If you have an
|
|
area of interest or expertise that you would like to write about, please do
|
|
not hesitate to contribute! We depend on reader submissions, especially for
|
|
the "Hot Flashes" news reports. We do ask that any submissions fit the
|
|
following guidelines...
|
|
|
|
General Content
|
|
~~~~~~~~~~~~~~~
|
|
Material for Informatik should concern information of interest to the
|
|
computer underground community. Examples of this include, but are by no
|
|
means limited to scams, cellular workings, government agencies, fraud,
|
|
clandestine activity, abuse of technology, recent advances in computing
|
|
or telecommunications technology, and other of information not readily
|
|
available to the public. Please include a title and author name.
|
|
|
|
Text Format
|
|
~~~~~~~~~~~
|
|
* standard ASCII test
|
|
* 79 characters per line
|
|
* no TAB codes
|
|
* no special or system specific characters
|
|
* mixed case type
|
|
|
|
News submissions
|
|
~~~~~~~~~~~~~~~~
|
|
* Submit only recent news items
|
|
* Include the headline or title of the article
|
|
the author's name (if given)
|
|
the publication of origin
|
|
the date of publication
|
|
|
|
Subscriptions and Submission Address
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
We are happy to provide an Internet based subscription service to our
|
|
readers. To be on our mailout list, send mail to our Internet address,
|
|
"inform@doc.cc.utexas.edu" and include the word subscription in the subject
|
|
of your message. If you do not have internet access, try to reach us through
|
|
the many various BBS's across the USA, or route it through a friend who does
|
|
have internet access.
|
|
|
|
Back Issues
|
|
~~~~~~~~~~~
|
|
Back issues of Informatik are available via ftp at ftp.eff.org in the
|
|
/pub/cud/inform directory. The site also contains a plethora of other
|
|
electronic texts of interest to the "computer underground" community including
|
|
Phrack, NIA, PHUN, and the LOD tech journals.
|
|
|
|
/* End; Issue 03 */
|
|
------- End of forwarded message -------
|
|
|
|
|