About
Community
Bad Ideas
Drugs
Ego
Artistic Endeavors
But Can You Dance to It?
Cult of the Dead Cow
Literary Genius
Making Money
No Laughing Matter
On-Line 'Zines
Science Fiction
Self-Improvement
Erotica
Fringe
Society
Technology
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

INFORMATIC MAGAZINE ISSUE #3

+=============================================================================+
| ## ## ## ###### ###### ###### ### ### ###### ###### ## ## ## |
| ## ### ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## |
| ## ## ### ##### ## ## ###### ## ## ###### ## ## #### |
| ## ## ## ## ###### ## ## ## ## ## ## ## ## ## ## |
+=============================================##==============================+
| Apr 24, 1992|
| [ The Journal of Privileged Information ] |
| |
+-----------------------------------------------------------------------------+
| Issue 03 By: 'Above the Law' |
+-----------------------------------------------------------------------------+
| |
|Informatik--Bringing you all the information you should know... |
| and a lot you shouldn't... |
| |
+=============================================================================+


/* Introduction */
By the Informatik staff

Welcome to Issue number 3 of Informatik Journal. It's been a
whopping 3 months since we released our last issue, but at least our time
table matches that of 2600. Sorry this took so long, but guess what. . .
we had a hell of a time getting submissions AGAIN. How about putting your
creative talents to use and writing some articles so we can release
Informatik a bit more frequently.

For our new readers, Informatik is an electronic journal containing
information that is for one reason or another usually withheld from the
public. Sometimes it is for "security" reasons, and other times it is simply
because it is felt that the public does not need to know. Hogwash we say!
Information is power! Have they something to hide? Are there things in this
world that we *gasp* just should not know about? I do not think so.

In other news, we have decided to reduce our news coverage to
strictly hack/phreak/fraud type events. No more general computer industry,
telecommunications news. Our friends at Phrack have that angle covered
admirably, and there's no reason to waste hard drive space with 60-70k per
issue of duplicate news items.

This issue brings us information on public telephone abuse by Brian
Oblivion. Could this be the end of red boxing? For you radio phreaks we have
the tools needed to track down those airphone transmissions, and information
on how law enforcement monitors suspects and how you can get in on the action.
Black Manta provides us with schematics on how you can build a simple universal
garage door opener. HiBias brings us a guide to TRW business reports that
explains just exactly what all those numbers mean, and another article
reveals the workings of those nifty credit card verification machines.
Tid-Bytes is back with some interesting blurbs, and the Hot Flashes of course
keeps you abreast on all sorts of goings on.

We'd like to thank you for your continued readership of Informatik,
and we'd love it if you recommended it to your friends and upload it to
your favorite boards, ftp sites, etc. Remember, subscriptions, submissions,
questions, or suggestions and comments can be sent to our Internet address:

[email protected]

That's all for now, see you next issue. . .

Mack Hammer & Sterling
[Editors]

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -


===========================================
============== - CONTENTS - ===============
================ Issue 03 =================
======= Release date April 24, 1992 =======
===========================================

01) Issue #3 Introduction
By: Informatik Staff

02) Coin Services Update
By: Brian Oblivion

03) Law Enforcement Surveillance Scanning
By: Sterling

04) TRW Business Reports
By: HiBias

05) Building a Garage Door Hacker
By: Black Manta

06) Air Phone Frequency Allocation
By: Leroy Donnelly

07) Credit Card Authorization Machines
By: Emery Lapinski

08) Tid-Bytes--Misc Contributions
By: Informatik Staff

09) Hot Flashes--The Underground News Report
By: Various Sources

10) Submission and Subscription Information
By: Informatik Staff

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

*DISCLAIMER*
Informatik Journal is printed for informational purposes only. We
do not recommend or condone any illegal or fraudulent application of
the information found in this electronic magazine. As such, we
accept no liability for any criminal or civil disputes arising from
said information.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -



***************************************************************************
* *
* Straight from the Bellyard: Coin Services Update *
* *
* by *
* Brian Oblivion *
* *
* *
* Courtesy of: Restricted-Data-Transmissions (RDT) *
* "Truth is cheap, but information costs." *
* *
* *
* 4/17/92 *
***************************************************************************

Introduction
- ------------

Public Telephones: we all know them, and how vulnerable they are
to fraudulent abuse. Well, so does Bellcore and NYNEX and they
have come up with a few methods on combatting fraudulent users.

Coin deposits by a typical patron of the public telephone are
communicated to the St Operator
Services System (OSS) by bursts of certain dual-tone signals. These
signals consist of the two frequencies 1.7 KHz and 2.2 KHz simul-
taneously, which are detected in end-office and tandem-office environ-
ments to provide accurate coin deposit detection.

There are two types of interference that are encountered by outside
origin. These are talkdown and talkoff. Talkdown is the failure to
recognize a valid dual-tone signal because of interference from
superimposed speech or other noise that may be from either the
originating coin line or the terminating end. Talkoff is the false
acceptance of speech, music, or background noises as valid coin
deposits. This obviously includes redbox tones, whistles, tape
reproductions, etc.

In order to combat the erroneous acceptance of false credit the
following methods have been defined and are to be employed
eventually (if they haven't already), according to recent
information.

Frequency Limits
- --------- ------

The detector must accept dual-tone signals if the frequencies
of both tones are within +/- 5% of their respective nominal
values of 1.7 KHz and 2.2 KHz. The detector must also reject
dual-tone signals if the frequency of either or both tones is
offset more than +/- 3.5% from its nominal value.

Frequency offsets of +/- 1.5 percent are the extremes expected from
properly designed and maintained coin telephones. The +/- 3.5 percent
constraint is imposed to minimize the width of the stop-band notch
filters in anti-fraud notch filters.

Signal Power and Twist
- ------ ----- --- -----

The detector must accept dual-tone signals if the individual
power levels of both tones are within 0 to -25 dBm0 and within
5 dB of each other. (Twist is the dB difference between
power levels of the two tones of a dual-tone signal)

The detector must reject dual-tone signals if the individual
poser level of either or both tones is below -30 dBm0.

The range 0 to -25 dBm0 is the maximum expected from properly designed
and maintained coin telephones and loops. The -30 dBm0 limit is
imposed to minimize the depth of the stop-band needed in anti-fraud
notch filters.

Pulse Timing
- ----- ------

Nickels, dimes, and quarters are represented by one, two, and five
dual-tone TONE-ON pulses. The dollar signal is represented by a
single long pulse. Each pulse is followed by a TONE-OFF interval.
The following chart shows the timing specifics for all coin generated
tones.

+----------------------------------------------------------------------------+
| | Within-Coin | End-of-coin Tone OFF (ms)|
|---------------------+-------------+-------------+-------+------+-----------|
| | TONE-ON (ms)| TONE-OFF(ms)| Must | Must |Allowed to |
| | Must Accept | Must Accept | Accept|Reject|Acc. or Rej|
|---------------------+-------------+-------------+-------+------+-----------|
| Nickel | 1 Pulse | 35 - 160 | ---- | >175 | <160 | 160 - 170 |
|---------+-----------+-------------+-------------+-------+------+-----------|
| Dime | 1st Pulse | 35 - 160 | 25 - 110 | | | |
|---------+-----------+-------------+-------------+-------+------+-----------|
| Dime | 2nd Pulse | 35 - 160 | ---- | > 75 | < 60 | 60 - 75 |
|---------+-----------+-------------+-------------+-------+------+-----------|
| Quarter | 1st Pulse | 20 - 100 | 20 - 110 | | | |
|---------+-----------+-------------+-------------+-------+------+-----------|
| Quarter | 2nd Pulse | 20 - 60 | 20 - 60 | | | |
|---------+-----------+-------------+-------------+-------+------+-----------|
| Quarter | 3rd Pulse | 20 - 60 | 20 - 60 | | | |
|---------+-----------+-------------+-------------+-------+------+-----------|
| Quarter | 4th Pulse | 20 - 60 | 20 - 60 | | | |
|---------+-----------+-------------+-------------+-------+------+-----------|
| Quarter | 5th Pulse | 20 - 100 | ---- | > 75 | < 60 | 60 - 75 |
|---------+-----------+-------------+-------------+-------+------+-----------|
| Dollar | 1 Pulse | 600 - 700 | ---- | > 75 | < 60 | 60 - 75 |
|---------+-----------+-------------+-------------+-------+------+-----------|
| Note: The detector is allowed to accept or reject tone-on and within-coin |
| tone-off durations outside their respective must-accept ranges. |
+----------------------------------------------------------------------------+

Methods of controlling talkdown and talkoff
- ------- -- ----------- -------- --- -------

Talkdown, is more of a transmission error problem that is generated
by interference from superimposed speech or ambient noise. This
noise comes from the originating coin line or from the terminating
end. Talkdown results in the failure of the detector to recognize
a valid dual-tone signal.

One of the main sources of talkdown is the improper muting of the voice
path during tone generation. This attenuated speech or ambient noise
power is superimposed on the coin signals which corrupts the signal.

Muting is accomplished by shorting out the speech path with a cap-
acitor. Minimum muting attenuation is 15 dB at 300 Hz, 25 dB at
1000 Hz, and 35 dB at 3000 Hz. The attenuated speech or ambient
noise power is superimposed on the coin signals which could cause
talkdown.

Some talkdown is also generated from the called party, operator
speech, or automated announcements. These signals can only reach
the detector by reflection through the trans-hybrid path at a 3-to-4
wire junction, which is usually located in the originating end
office.

Talkoff
- -------

Talkoff is the false acceptance of speech, music or background
noises as valid coin deposit signals by a detector. This is
what registers a valid deposit when no actual money is deposited.

In order to combat, a few countermeasures are expected to be employed.

o The call must be terminated or routed to an operator if the
total amount due for an initial deposit or a subsequent deposit
has been received within an overall session timeout period.

o The overall session timeout must be an adjustable parameter with
a default value of 45 to 50 seconds.

Intentional talkoff can be induced by playing loud music into the
coin telephone by doing this one hopes to get the detectors to produce
too many talkoff clusters. A talkoff cluster is a group of talkoffs
occurring within any 5-minute interval. Single quarter or dollar
talkoffs are also included in this definition of a cluster. In order
to combat this the following measures are being taken.

o Total talkoffs must not exceed 12 dollars in 70 hours of continuous
speech or music at a volume level of 0 vu referred to 0 TLP or,
instead, at an active speech level of +1 dBm0.

o The detector must not produce more than 12 talkoff clusters that
exceed 20, or 40, or 95 cents in 70 hours of continuous speech or
music at a volume level of 0vu referred to 0 TLP or, instead, at
an active speech level of +1 dBm0.

o Total talkoffs must not exceed 2 dollars in 200 hours of continuous
speech or music at -17 vu referred to 0 TLP or, instead, at an active
speech level of -16 dBm0.

Coin-Operated Telephone Fraud
- ------------- --------- -----

Fraud is possible by acoustically coupling accurate coin deposit
signals into the mouthpiece of the originating coin telephone, or
>from the called party end. Fraudulent signals coming from the
coin telephone end can only be stopped within the coin telephone
with a notch filter to filter out any external fraudulent signals.

In order to combat Fraudulent usage the following will be enacted.

o End- or tandem-office switching systems will be equipped with
detectors that monitor signals from the originating coin line.

The following methods combat far-end fraud:

o Sensing the direction of received coin signals and only
registering those coming from the coin line.

o Increasing the trans-hybrid path loss (using echo cancelers to
knock down the fraudulent signal's signal strength to that under
the detector's recognition threshold.)

o Inserting a 2200-Hz notch filter in the voice transmission path
from the far end only when the detector is expecting coin deposits.
The filters 3 dB bandwidth must be less than 600 Hz centered on
2200 Hz. and the out-of-band attenuation below 1500 Hz and above
3000 Hz must be less than 1 dB.

Conclusion
- ----------

The BOCs are now taking action against 'Redboxing' as well as
against some of their own equipment defects. It was only a matter
of time, of course. I have no idea how long this conversion will
take or even if it has started. There has been some indication
as some start of an anti-fraud campaign in my local area. I have
gotten word from some people that coin operated telephones have
not been accepting tones. I am unaware if these machines were
BOC operated or if they were COCOTS. I believe them to be BOC
coin operated telephones.

- -----------------------------------------------------------------

Brian Oblivion can be reached at [email protected]. RDT welcomes
any questions or comments you may have -- especially any new
information you may have.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -



/\
/\ / \
__________/ \ / \ ____________________________________________________
\/ \ /
\/

Law Enforcement Surveillance Scanning

by Sterling
/\
/\ / \
____________________________________________/ \ / \ _________________
\/ \ /
\/


Now days it seems that Big Brother is always listening in. Wherever you
are, whatever you do, there is a good chance that your private conversations
aren't so private. The FBI, Secret Service, DEA, local police, and dozens of
other government agencies are definitely interested in what you have to say.
What can we do about this? Well, unfortunately they have the badges and the
guns, so we may as well get used to it. Since we can't beat'em, might as well
enjoy it, understand it, and learn something from it.

Mikes and Bugs
~~~~~~~~~~~~~~
Most FCC legal devices are found in the 150 to 174 MHz band, and other,
limited parts of the 40 to 952 MHz range. Here is a list of FCC approved bands
for wireless mike, room bugs, and body mikes. Also note that other bands MAY
be used with special FCC permission. (An "*" indicates a band that may be used
by vehicle tracking transmitters. More on that later)

42.02 to 42.94 MHz
44.62 to 46.58 MHz
47.02 to 47.50 MHz
72.00 to 76.00 MHz
150.995 to 151.49 MHz *
153.74 to 154.445 MHz *
154.635 to 156.25 MHz *
157.05 to 157.11 MHz
158.715 to 159.645 MHz
166.25 to ------ MHz
170.15 to 173.40 MHz
453.05 to 453.95 MHz
458.05 to 458.95 MHz
460.025 to 460.625 MHz
462.95 to 462.975 MHz
465.025 to 465.625 MHz
467.95 to 467.975 MHz
470.00 to 512.00 MHz
821.00 to 824.00 MHz
866.00 to 869.00 MHz

If the purpose of the surveillance is not going to be used for criminal
prosecution, agencies are reported to work outside of FCC restrictions to
avoid detection. Though the FCC declares them illegal, devices have been
found that work in the government, TV broadcast, and even aero bands. The
following areas of the spectrum are known to be used on occasion:

73.00 to 74.6 MHz
137.00 to 138.00 MHz
216.00 to 222.00 MHz
400.00 to 406.10 MHz
608.00 to 614.00 MHz

Surveillance Repeaters
~~~~~~~~~~~~~~~~~~~~~~
Law enforcement agencies use mobile repeaters and extenders to retransmit comms
of interest. These low power (about 15 watts) repeaters are usually located in
patrol cars. This allows the officer to monitor the surveillance device from
outside his car via portable handheld transceiver. These are often simply
little used channels of their normal assigned bands. Surveillance mobile
repeaters are still quite weak, so if you can hear it, it's probably close by!
(under your bed ?!) Here is a list of mobile repeaters used by state
enforcement agencies:

Mobile Repeaters (Extenders)
- ------------------------------------------------------------------------------
State Frequency Comments
- ------------------------------------------------------------------------------

Alabama - - - - May equip in the future
Arizona 155.505 15% equipped; no more planned
Arkansas 154.785 Fully equipped
California 154.905 Fully equipped
Colorado - - - - May equip in the future
Connecticut 154.83 40% equipped
Delaware 465.475 Fully equipped
460.50 Alternate frequency
Florida 465.1625 Fully equipped
156.18 Turnpike frequency
Georgia 458.4875 Fully equipped
Idaho - - - - May be equipped
Illinois 155.505 Fully equipped
151.16 Dept. of Criminal Investigation
Indiana 155.445 Fully equipped
Iowa 453.625 Fully equipped
Kansas 154.92 Fully equipped
Kentucky 154.665 Fully equipped
Louisiana 453.45 Fully equipped
Maine 460.225 Some cars equipped
Maryland 155.73 Fully equipped
Massachusetts 154.92 About 40% of cars equipped
Michigan 154.695 Over half of cars equipped
Minnesota 458.25 Fully equipped
453.25 Minneapolis
Mississippi 158.97 Fully equipped
Missouri 154.905 Fully equipped
Montana - - - - May or will be equipped
Nebraska 465.525 Fully equipped
Nevada 154.92 Fully equipped
New Hampshire - - - - May be equipped
New Jersey - - - - Not now equipped
New Mexico 460.15 Fully equipped
465.15 Alternate frequency
New York - - - - Not now equipped
North Carolina 155.445 Fully equipped, freqs. vary by area
154.68 Alternate frequency
154.92 Alternate frequency
159.21 Alternate frequency
North Dakota 453.45 Partially equipped
Ohio 465.55 Northern areas
465.375 Southern areas
465.425 Some units
465.525 Turnpike units
Oklahoma 154.905 Fully equipped (?)
465.0125 Alternate frequency
465.1625 Alternate frequency
465.3875 Alternate frequency
465.5625 Alternate frequency
Oregon - - - - May be equipped or soon will
Pennsylvania 154.755 Fully equipped
Rhode Island - - - - May have future plans
South Carolina 154.445 Some or all cars equipped
South Dakota 453.375 Some cars equipped
Tennessee 154.905 Fully equipped
Texas - - - - Not now equipped
Utah - - - - May have future plans
Vermont - - - - May have future plans
Virginia 453.35 Fully equipped
Washington 453.475 Some cars equipped
453.975 Alternate frequency
West Virginia 155.505 May be equipped, or soon will
Wisconsin 465.125 Fully equipped
Wyoming - - - - May be equipped, or soon will

Vehicle Tracking Transmitters
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Enforcement agencies often need to track suspect vehicles, cargo
shipments, or packages. Tiny transmitters are used that emit a quarter second
beep once each second. Some contain motion detectors that beep once every ten
seconds when not in motion. This saves battery life and of course provides
some information as to the status of the tagged object. Vehicles used for
tracking these transmitters are easy to spot. Look for four identical
antennas mounted in a square configuration. (Hmm, that pizza-van has been
parked across the street for over four days!)

Remote Control Surveillance
~~~~~~~~~~~~~~~~~~~~~~~~~~~
Some transmitters can be set for remote control operation. That way they
can be turned off during times of inactivity to conserver power. They can also
be turned off to avoid detection during countersurveillance sweeps to avoid
detection. Look for these types of systems in the 72.01 to 72.99 MHz and 75.99
MHz bands (20 kHz steps). Some are thought to operate in the 300 to 350 MHz
band as well.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -


(T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)
(T) (W)
)R( TRW Business Reports )R(
(W) (T)
)R( by HiBias )R(
(T) (W)
(T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)


TRW keeps tabs on the financial standing of businesses, both big and small.
Just about everyone from AT&T to Billy-Bud's Bait Shop is referenced in their
files. Just exactly what kind of information do they have? What kind of data
do they give to creditors. Exactly what kind of things could reflect
negatively on your credit standing? Following is a sample of a typical TRW
business report and a sample small business advisory report. These will show
the type of information that TRW hands out to creditors and how they interpret
said information.

TRW SAMPLE REPORT
~~~~~~~~~~~~~~~~~

PAGE RPT DATE TIME PORT TYPE
1 03-02-90 08:40:13 BC99 PROFILE 219
- --------------------------------------------------------------------------------
SAMPLE COMPANY TRW FILE NUMBER: 000000001
1000 MAIN STREET TRW FILE ESTABLISHED: PRIOR JAN 1977
ANYTOWN USA 11111 SIC NO: 0000
PHONE: 714-555-1212 BUS: SELLING GOODS TO AMERICA
- --------------------------------------------------------------------------------
EXECUTIVE SUMMARY
-----------------
DAYS BEYOND TERMS (DBT) FOR SAMPLE COMPANY
AS OF 03-02-90 : DBT IS THE AVERAGE NUMBER OF DAYS LATE A FIRM TAKES
PREDICTION : TO PAY ITS BILLS. THE DBT IS WEIGHTED BY THE DOLLAR
AMOUNT OF EACH ACCOUNT. THE PREDICTION IS A FORECAST
DBT NORMS OF THE DBT FOR 60 DAYS INTO THE FUTURE. IT IS BASED
SAMPLE CO INDUSTRY : ON THE TREND IN DBT, THE TYPE OF INDUSTRY OF THE
ALL INDUSTRIES : FIRM, ANY DEROGATORY PUBLIC RECORD INFORMATION,
COLLECTION ACCOUNTS, # OF INQUIRIES, YEARS IN
BUSINESS/FILE, ETC. THE INDUSTRY INFORMATION IS
PROVIDED TO EVALUATE HOW THIS FIRM PAYS TODAY
RELATIVE TO FIRMS IN THE SAME INDUSTRY (AT THE 2
DIGIT SIC LEVEL).
CONTINUOUS AND NEWLY REPORTED TRADELINES ARE USED FOR
THE DBT VALUES. A SUMMARY WILL ONLY BE PROVIDED WHEN
THERE IS SUFFICIENT DATA.
HISTORICAL PAYMENT GUIDE
6 MONTH ACCOUNT BALANCE RANGE : THIS LINE INDICATES THE TOTAL AMOUNT OWED
BY THE FIRM FOR THE PAST 6 MONTHS AND THE CURRENT
TOTAL.
HIGHEST CREDIT AMOUNT EXTENDED: THIS LINE INDICATES THE LARGEST INDIVIDUAL
AMOUNT OF CREDIT EXTENDED TO THE FIRM IN THE PAST 12
MONTHS AND THE MEDIAN AMOUNT (IE THAT VALUE IN WHICH
50% OF THE ACCOUNTS ARE GREATER AND 50% ARE LOWER).
THE PURPOSE IS TO COMPARE THE CURRENT CREDIT REQUEST
TO THESE AMOUNTS TO DETERMINE THE CREDIT GRANTOR'S
RELATIVE RISK.
INDUSTRY PAYMENT COMPARISON : THIS LINE REPRESENTS THE CONCLUSION FROM A
COMPARISON OF THE 6 MONTH HISTORICAL DBT OF THE FIRM
TO ITS INDUSTRY. THREE POSSIBLE CONCLUSIONS CAN BE
MADE: A FIRM PAYS "THE SAME", "LATER THAN", OR
"SOONER THAN" RELATED BUSINESSES. TO CONCLUDE A FIRM
PAYS LATER OR SOONER, 4 OUT OF 6 MONTHS MUST DEVIATE
FROM AT LEAST 50% OF THE FIRMS IN THE INDUSTRY.
PAYMENT TREND INDICATION : THIS LINE PROVIDES THE CONCLUSION FROM AN
ANALYSIS OF HOW THE PAYMENT BEHAVIOR OF THE FIRM IS


PAGE RPT DATE TIME PORT TYPE
2 03-02-90 08:40:13 BC99 PROFILE 219
- -------------------------------------------------------------------------------
SAMPLE COMPANY TRW FILE NUMBER: 000000001
- -------------------------------------------------------------------------------
PAYMENT TREND INDICATION (CONTINUED)
CHANGING IN THE PAST 6 MONTHS. FOR A TREND TO OCCUR, AT LEAST THE
MOST RECENT TWO MONTHS OF DBT MUST DEVIATE FROM 70% OF THE NORMAL
HISTORICAL RANGE OF DBT'S.
FOUR POSSIBLE CONCLUSIONS CAN BE MADE: THE FIRM IS "IMPROVING
TOWARD TERM REQUIREMENTS ","INCREASINGLY LATE", "STABLE" OR
OR "NO TREND IDENTIFIABLE".

SIGNIFICANT PUBLIC RECORD DATA
THIS SECTION SUMMARIZES REPORTED PUBLIC RECORD OR OTHER DEROGATORY
INFORMATION IN THE FOLLOWING WAYS:
1) BANKRUPTCY FILINGS WITHIN THE PAST 10 YEARS.
2) OPEN TAX LIENS/JUDGEMENTS REGARDLESS OF THE AMOUNT OF THE LIEN,
OR ANY FILING RELEASED WITHIN THE PAST 5 YEARS.
3) A SUMMARY OF THE NUMBER OF UCC FILINGS WITH ONE OR MORE OF THE
FOLLOWING PLEDGED COLLATERAL:
-ACCOUNTS
-ACCOUNTS RECEIVABLE
-INVENTORY
-CONTRACTS
-HEREAFTER ACQUIRED PROPERTY
-PROCEEDS
-LEASES
-NOTES RECEIVALBE
4) REPORTED COLLECTION ACCOUNTS.
5) FRAUDULENT TELECOMMUNICATIONS ACCOUNTS THAT ARE REPORTED AS
SERVICE DISCONNECTS, WRITE-OFFS, SKIPS, ETC.
IF NO PUBLIC RECORD DATA IS REPORTED, THEN IT WILL BE STATED.
RELEVANT DATES AND AMOUNTS WILL BE INCLUDED.

TRADE PAYMENT INFORMATION
-------------------------

TRADE PAYMENT EXPERIENCES
(TRADE LINES WITH AN "*" AFTER DATE REPORTED ARE NEWLY REPORTED)

RECENT ------ ACCOUNT STATUS ------
HIGH -DAYS PAST DUE-
BUSINESS DATE LAST PAYMENT CREDIT BALANCE 1- 31- 61-
CATEGORY REP'D SALE TERMS $ $ CUR 30 60 90 91+ COMMENTS
---------- ----- ----- ------- -------- -------- --- --- --- --- --- ----------
THIS SECTION PROVIDES THE DETAILED ACCOUNT RECEIVABLE INFORMATION FOR THE FIRM
INQUIRED UPON. ONLY THOSE ACCOUNTS THAT ARE CONTINUOUSLY REPORTED OR NEWLY


PAGE RPT DATE TIME PORT TYPE
3 03-02-90 08:40:13 BC99 PROFILE 219
- -------------------------------------------------------------------------------
SAMPLE COMPANY TRW FILE NUMBER: 000000001
- -------------------------------------------------------------------------------
TRADE PAYMENT EXPERIENCES (CONTINUED)

REPORTED WILL BE INCLUDED IN THIS SECTION. THEREFORE, THE CREDIT GRANTOR IS
EVALUATING ONLY THE MOST CURRENT TRADE INFORMATION. A CONTINUOUSLY REPORTED
TRADE LINE MUST BE IN THE TRW FILE FOR AT LEAST SIX MONTHS AND UPDATED AT LEAST
ONCE IN THE PAST THREE MONTHS. A NEWLY REPORTED TRADE LINE HAS BEEN ADDED TO
THE FILE WITHIN THE LAST 3 MONTHS. EACH TRADELINE REPRESENTS A UNIQUE CREDIT
EXPERIENCE.
------------------------------ -------- -------- --- --- --- --- --- ----------
TRADE LINE TOTALS: DBT: (THE
SAME AS REPORTED
IN THE SUMMARY)

ADDITIONAL PAYMENT EXPERIENCES
(INCLUDES NON-TRADE ACCOUNTS PLUS PREVIOUSLY REPORTED TRADE LINES)

THIS SECTION WILL CONTAIN THOSE ACCOUNTS THAT REPRESENT PAYMENT INFORMATION,
BUT DO NOT BEHAVE THE SAME AS A TRADE CREDIT ACCOUNT (IE THE ACCOUNT TYPE AND
THE REPORTED DATA BEHAVES DIFFERENTLY THAN A TRADE ACCOUNT). FOR EXAMPLE, A
LOAN WILL REFLECT THE TOTAL VALUE OF THE LOAN IN THE BALANCE INFORMATION AND
THE AGING DATA REFLECTS THE CURRENCY OF THE MONTHLY PAYMENT ONLY. THIS SECTION
INCLUDES TRADELINES NOT UPDATED BY CONTRIBUTORS WITHIN THE PAST 6 MONTHS. THE
DATA, HOWEVER, CAN BE USED TO IDENTIFY ANY SIGNIFICANT DEROGATORY ACCOUNTS IN
THE PAST.

PAYMENT TOTALS

RECENT ------ ACCOUNT STATUS ------
HIGH -DAYS PAST DUE-
CREDIT BALANCE 1- 31- 61-
$ $ CUR 30 60 90 91+ COMMENTS
-------- -------- --- --- --- --- --- ----------
CONTINUOUSLY REPORTED LINES: THIS SECTION PROVIDES A SUMMARY OF THE TOTALS
NEWLY REPORTED LINES: FOR THE TWO TRADELINE TYPES. IT CAN BE USED TO
EVALUATE HOW MUCH THE NEW INFORMATION MAY EFFECT
CONCLUSIONS FOR PAST PAYMENT BEHAVIOR.
------------------------------ -------- -------- --- --- --- --- --- ----------
TRADE LINE TOTALS: DBT:


PAGE RPT DATE TIME PORT TYPE
4 03-02-90 08:40:13 BC99 PROFILE 219
- -------------------------------------------------------------------------------
SAMPLE COMPANY TRW FILE NUMBER: 000000001
- -------------------------------------------------------------------------------
PAYMENT TRENDS
(BASED ON CONTINUOUSLY REPORTED TRADE LINES ONLY)

-DAYS PAST DUE-
BALANCE 1- 31- 61-
DBT $ CUR 30 60 90 91+
--- -------- --- --- --- --- ---
AS OF 03-02-90 THIS SECTION EXAMINES THE NEAR TERM CHANGES IN PAY-
12-01-88 MENT TRENDS. IT USES ONLY CONTINUOUSLY REPORTED
11-01-88 TRADELINES IN ORDER TO PROVIDE AN INDICATION OF
10-01-88 WHETHER OR NOT AN IMMEDIATE CHANGE IN PAYMENT
09-01-88 BEHAVIOR IS OCCURING. THE CONCLUSION FROM THE DATA
08-01-88 IS PRESENTED IN THE SUMMARY. A NEAR TERM CHANGE IN
07-01-88 BEHAVIOR CAN BE DUE TO THE WILLINGNESS OR ABILITY
OF THE DEBTOR TO PAY ITS OBLIGATIONS.

PAYMENT HISTORY--QUARTERLY AVERAGES
(BASED ON CONTINUOUSLY AND NEWLY REPORTED TRADE LINES)

-DAYS PAST DUE-
BALANCE 1- 31- 61-
DBT $ CUR 30 60 90 91+
--- -------- --- --- --- --- ---
4TH-Q-89 (OCT-DEC): THIS SECTION PRESENTS A ONE AND A QUARTER YEAR ANAL-
3RD-Q-89 (JUL-SEP): YSIS OF THE PAYMENT TRENDS. THE LONG TERM CHANGES IN
2ND-Q-89 (APR-JUN): DBT REFLECT THE ABILITY OF THE COMPANY TO GENERATE
1ST-Q-89 (JAN-MAR): SUSTAINED CASH FLOW OVER TIME. IF THE DBT IS
4TH-Q-88 (OCT-DEC): BECOMING SIGNIFICANTLY LARGER, IT IS LIKELY THAT THE
COMPANY IS LESS ABLE TO PAY.

PUBLIC RECORD INFORMATION
-------------------------
THIS SECTION REFLECTS THE DETAIL OF BANKRUPTCY, TAX LIENS (FEDERAL, STATE,
AND COUNTY), JUDGEMENTS, AND UCC FILINGS FOR A PARTICULAR ENTITY. IT INCLUDES
THE DATE OF FILINGS, AMOUNTS, LOCATIONS, ETC.

COMMERCIAL BANKING RELATIONSHIPS
--------------------------------
THIS SECTION IDENTIFIES THE NAME, ADDRESS, PHONE NUMBER, AND ACCOUNT NUMBER
OF THE PRIMARY BANK UTILIZED BY THE BUSINESS.


PAGE RPT DATE TIME PORT TYPE
5 03-02-90 08:40:13 BC99 PROFILE 219
- -------------------------------------------------------------------------------
SAMPLE COMPANY TRW FILE NUMBER: 000000001
- -------------------------------------------------------------------------------
KEY FACTS INFORMATION
---------------------
THIS SECTION TYPICALLY INCLUDES THE TYPE OF PRODUCTS/SERVICES OFFERED BY THE
BUSINESSES, THE NUMBER OF YEARS IN BUSINESS, THE BUSINESS OWNERSHIP AND
PRINCIPAL OFFICERS, ETC.

INQUIRIES
----------
BUSINESS 1990 1989
CATEGORY JAN DEC NOV OCT SEP AUG JUL JUN MAY
---------- --- --- --- --- --- --- --- --- ---
THE INQUIRIES WILL BE SUMMARIZED BY THE BUSINESS CATEGORY AND
IDENTIFY THE NUMBER OF INQUIRIES EACH MONTH. THIS ALLOWS THE CREDIT
MANAGER TO QUICKLY DETERMINE WHERE AND WHEN THE MOST FREQUENT CREDIT
ACTIVITY ON THE PART OF THE DEBTOR HAS BEEN OCCURING.

FEDERAL GOVERNMENT INFORMATION
-----------------------------
THIS SECTION CONTINUES TO REFLECT THE FINANCIAL AND CONTRACT DATA PROVIDED BY
GOVERNMENT AGENCIES (EG THE SMALL BUSINESS ADMINISTRATION).

STANDARD & POORS INFORMATION
----------------------------
PROVIDES FINANCIAL INFORMATION ON PUBLICLY HELD COMPANIES AS COMPILED BY
STANDARD AND POORS. THE INFORMATION INCLUDES:
1) THE MOST RECENT THREE YEARS OF PROFIT/LOSS STATEMENTS AND BALANCE SHEETS.
2) CRITICAL RATIOS OF PERFORMANCE RELATIVE TO INDUSRTY AVERAGES.
3) SUMMARY BUSINESS DESCRIPTION AND RECENT DEVELOPMENTS.

THE INFORMATION HEREIN IS FURNISHED IN CONFIDENCE FOR YOUR EXCLUSIVE USE
FOR LEGIMATE BUSINESS PURPOSES AND SHALL NOT BE REPRODUCED. NEITHER
TRW INC, NOR ITS SOURCES OR DISTRIBUTORS WARRENT SUCH INFORMATION NOR
SHALL THEY BE LIABLE FOR YOUR USE OR RELIANCE UPON IT.
COPYRIGHT (C) 1989 TRW INC.
**END REPORT**



TRW SMALL BUSINESS ADVISORY SAMPLE REPORT
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

PAGE RPT DATE TIME PORT TYPE
1 03-02-90 08:40:13 BC99 SBAR 219
- --------------------------------------------------------------------------------
PRINCIPAL NAME/ADDRESS BUSINESS NAME/ADDRESS EMPLOYER NAME/ADDRESS
- --------------------------------------------------------------------------------
JOHN Q PROPRIETOR PROPRIETOR CO AJAX HARDWARE
10655 BIRCH ST 604 BAKER ST 2035 BROADWAY
BURBANK CA 91501 STUDIO CITY CA 90485 LOS ANGELES CA 90019

LAST UPDATE 12-89 AS ACCESSED 03-90 LAST UPDATE 06-88
- --------------------------------------------------------------------------------

RISK PROFILE
------------

CHANCE OF ACCOUNT ENTERING SERIOUSLY DEROGATORY STATUS WITHIN 1 YEAR: 3%

THE PERCENTAGE ABOVE IS CALCULATED BY THE NATIONAL RISK MODEL, WHICH USES A
POINT-SCORING SYSTEM THAT ADDS OR SUBTRACTS POINTS BASED ON A PROPRIETOR'S
CREDIT BEHAVIOR. THE MODEL ONLY EXAMINES INFORMATION THAT APPEARS ON A
PROPRIETOR'S SBAR REPORT, AND DOES NOT TAKE INTO ACCOUNT OTHER DATA, SUCH AS
THE PROPRIETOR'S INCOME OR NET WORTH.

THE PERCENTAGE, REFERRED TO AS A PROBABILITY PERCENTAGE, INDICATES THE
LIKELIHOOD OF A PROPRIETOR BECOMING DEROGATORY IN HIS PAYMENT HABITS.
DEROGATORY CREDIT BEHAVIOR CAN BE DEFINED AS MAINTAINING ACCOUNTS THAT HAVE
DEVELOPED INTO COLLECTION ACCOUNTS, REPOSSESSIONS, CHARGE-OFFS OR BANKRUPTCIES.

THE PERCENTAGES RANGE FROM 0% TO 100%. AS INDICATED ON THE SBAR, APPROXIMATELY
85% OF ALL PROPRIETORS HAVE A 0%-15% CHANCE OF BECOMING SERIOUSLY DEROGATORY
WITHIN 1 YEAR; 12% HAVE A 16%-49% CHANCE; AND 3% HAVE A 50%-100% CHANCE.

IN GENERAL, PROPRIETORS WITH A PROBABILITY PERCENTAGE OF 0%-15% ARE A GOOD

RISK; THOSE WITH A PERCENTAGE OF 16%-49% ARE A MEDIUM RISK; AND PERCENTAGES OF
50%-100% INDICATE A POOR RISK.

YOU MAY WANT TO IDENTIFY SEVERAL RANGES OF PERCENTAGES THAT YOU CONSIDER TO BE
GOOD, MEDIUM, AND POOR RISKS, BASED ON HOW MUCH RISK YOU ARE WILLING TO TAKE
IN EXTENDING CREDIT.

PAGE RPT DATE TIME PORT TYPE
2 03-02-90 08:40:13 BC99 SBAR 219
- --------------------------------------------------------------------------------
PRINCIPAL NAME/ADDRESS BUSINESS NAME/ADDRESS EMPLOYER NAME/ADDRESS
- --------------------------------------------------------------------------------
JOHN Q PROPRIETOR PROPRIETOR CO AJAX HARDWARE
10655 BIRCH ST 604 BAKER ST 2035 BROADWAY
BURBANK CA 91501 STUDIO CITY CA 90485 LOS ANGELES CA 90019

LAST UPDATE 12-89 AS ACCESSED 03-90 LAST UPDATE 06-88
- --------------------------------------------------------------------------------

STATUS CHARACTERISTICS

STATUS CHARACTERISTICS DEFINE THE SPECIFIC CONDITIONS WHICH CONTRIBUTE TO A
PROPRIETOR'S PROBABILITY PERCENTAGE. ONE TO FOUR CHARACTERISTICS ARE DISPLAYED
ON THE SBAR IN ORDER OF IMPORTANCE, AND GIVE YOU ADDITIONAL INSIGHT INTO A
PROPRIETOR'S PERSONAL CREDIT HISTORY.

FOR PROBABILITY PERCENTAGES OF 16%-100%, THE STATUS CHARACTERISTICS ARE A
SIGNIFICANT INDICATOR OF WHY THE PERCENTAGE IS HIGH. FOR PERCENTAGES OF 0%-15%,
THE CHARACTERISTICS ARE NOT A SIGNIFICANT INDICATOR, AND SHOULD NOT CARRY MUCH
WEIGHT IN YOUR CREDIT-GRANTING DECISION.

TO HELP YOU BETTER UNDERSTAND AND INTERPRET THE MEANING OF THE STATUS CHAR-
ACTERISTICS, A "GLOSSARY OF STATUS CHARACTERISTICS" IS INCLUDED IN THE SBAR
BROCHURE AVAILABLE FROM YOUR ACCOUNT EXECUTIVE.

ACCOUNT PROFILES
----------------

PROPRIETORS' ACCOUNTS ARE DIVIDED INTO 3 CATEGORIES: NEGATIVE, POSITIVE, AND
NEUTRAL. EACH TRADE LINE IN THE ACCOUNT PROFILE CONTAINS THE BUSINESS CATEGORY
OF THE COMPANY THAT CONTRIBUTED THE INFORMATION; THE DATE THE INFORMATION WAS
REPORTED; AND THE STATUS OF THE ACCOUNT.

THE TRADE LINE MAY ALSO INCLUDE: THE DATE THE ACCOUNT WAS OPENED; TYPE AND
TERMS OF LOAN; ORIGINAL LOAN AMOUNT; CREDIT LIMIT; HISTORICAL HIGH BALANCE;
BALANCE DUE; SCHEDULED MONTHLY PAYMENT; AMOUNT PAST DUE; DATE LAST PAYMENT WAS
MADE; TRANSACTION RELATIONSHIP; COMMENTS.

ACCOUNT PROFILES PROVIDE YOU WITH DETAILED INFORMATION ABOUT A PROPRIETOR'S
PERSONAL CREDIT PORTFOLIO.


PAGE RPT DATE TIME PORT TYPE
3 03-02-90 08:40:13 BC99 SBAR 219
- --------------------------------------------------------------------------------
PRINCIPAL NAME/ADDRESS BUSINESS NAME/ADDRESS EMPLOYER NAME/ADDRESS
- --------------------------------------------------------------------------------
JOHN Q PROPRIETOR PROPRIETOR CO AJAX HARDWARE
10655 BIRCH ST 604 BAKER ST 2035 BROADWAY
BURBANK CA 91501 STUDIO CITY CA 90485 LOS ANGELES CA 90019

LAST UPDATE 12-89 AS ACCESSED 03-90 LAST UPDATE 06-88
- --------------------------------------------------------------------------------

NEGATIVE ACCOUNT PROFILE
------------------------

THIS SECTION PROVIDES YOU WITH ALL OF THE NEGATIVE TRADE LINES THAT APPEAR ON
THE PROPRIETOR'S REPORT. THESE INCLUDE TRADE LINES THAT HAVE STATUSES SUCH AS
DELINQUENT, REPOSSESSED, WRITE-OFF, CHARGED TO LOSS, BANKRUPT, ETC.

POSITIVE ACCOUNT PROFILE
------------------------

THIS SECTION PROVIDES YOU WITH ALL OF THE POSITIVE TRADE LINES THAT APPEAR ON
THE PROPRIETOR'S REPORT. IN GENERAL, THESE TRADE LINES ARE EITHER CURRENT
ACCOUNTS THAT ARE BEING PAID ACCORDING TO TERMS, OR ACCOUNTS THAT HAVE BEEN
CLOSED AND WERE PAID IN SATISFACTORY TERMS.

NEUTRAL ACCOUNT PROFILE
-----------------------

THIS SECTION PROVIDES YOU WITH ALL OF THE NEUTRAL TRADE LINES THAT APPEAR ON
THE PROPRIETOR'S REPORT. THESE TRADE LINES INCLUDE ONES HAVE BEEN DELINQUENT
AT ONE TIME, BUT ARE NOW CURRENT.

PUBLIC RECORD PROFILE
---------------------

THE PUBLIC RECORD PROFILE ENABLES YOU TO LEARN ABOUT WHAT TYPES OF LEGAL
ACTIONS HAVE BEEN FILED AGAINST THE PROPRIETOR, SUCH AS BANKRUPTCIES, FEDERAL
STATE, AND COUNTY TAX LIENS, JUDGEMENTS, AND SUITS.


PAGE RPT DATE TIME PORT TYPE
4 03-02-90 08:40:13 BC99 SBAR 219
- --------------------------------------------------------------------------------
PRINCIPAL NAME/ADDRESS BUSINESS NAME/ADDRESS EMPLOYER NAME/ADDRESS
- --------------------------------------------------------------------------------
JOHN Q PROPRIETOR PROPRIETOR CO AJAX HARDWARE
10655 BIRCH ST 604 BAKER ST 2035 BROADWAY
BURBANK CA 91501 STUDIO CITY CA 90485 LOS ANGELES CA 90019

LAST UPDATE 12-89 AS ACCESSED 03-90 LAST UPDATE 06-88
- --------------------------------------------------------------------------------

PUBLIC RECORD PROFILE (CONTINUED)
---------------------------------

EACH PUBLIC DATA ENTRY INCLUDES THE TYPE OF LEGAL ACTION FILED, DATE FILED,
COURT NAME, COURT CODE, DOCKET NUMBER, AMOUNT, AND JUDGEMENT CREDITOR.

INQUIRIES
---------

THE INQUIRY SECTION INCLUDES INFORMATION ABOUT INQUIRIES MADE ON THE PROPRIETOR
IN THE PAST 24 MONTHS. THIS TELLS YOU HOW OFTEN THE PROPRIETOR HAS REQUESTED
CREDIT IN THE PAST YEAR, AND THE TYPES AND NUMBER OF COMPANIES THAT HAVE
REQUESTED CREDIT INFORMATION ON HIM.

INQUIRIES INCLUDE THE BUSINESS CATEGORY OF THE COMPANY MAKING THE INQUIRY AND
THE DATE OF THE INQUIRY, AND MAY INCLUDE THE TYPE, TERMS, AND AMOUNT OF THE
LOAN OR CREDIT LINE.

FILE VARIATION REFERENCES
-------------------------

FILE VARIATIONS CAN BE DEFINED AS INFORMATION ABOUT THE PROPRIETOR CONTAINED
IN TRW'S FILE UNDER A DIFFERENT NAME, ADDRESS, OR SOCIAL SECURITY NUMBER
THAN WHAT YOU ENTERED DURING THE INQUIRY PROCESS.

USUALLY, NAME VARIATIONS ARE EITHER MISPELLINGS OR MAIDEN NAMES; ADDRESS
VARIATIONS ARE DEVIATIONS SUCH AS "STREET" INSTEAD OF "DRIVE", OR THE
PROPRIETOR'S PREVIOUS ADDRESS; AND SOCIAL SECURITY NUMBER VARIATIONS ARE
ONE OR TWO DIGIT TYPO MISTAKES.

IN A SMALL NUMBER OF CASES, HOWEVER, THE INFORMATION IN THE FILE VARIATION
SECTION MAY SIGNIFICANTLY CONFLICT WITH WHAT THE PROPRIETOR HAS GIVEN YOU,
AND YOU MAY FIND THAT A MORE THOROUGH REVIEW OF THE PROPRIETOR IS NECESSARY.


PAGE RPT DATE TIME PORT TYPE
5 03-02-90 08:40:13 BC99 SBAR 219
- --------------------------------------------------------------------------------
PRINCIPAL NAME/ADDRESS BUSINESS NAME/ADDRESS EMPLOYER NAME/ADDRESS
- --------------------------------------------------------------------------------
JOHN Q PROPRIETOR PROPRIETOR CO AJAX HARDWARE
10655 BIRCH ST 604 BAKER ST 2035 BROADWAY
BURBANK CA 91501 STUDIO CITY CA 90485 LOS ANGELES CA 90019

LAST UPDATE 12-89 AS ACCESSED 03-90 LAST UPDATE 06-88
- --------------------------------------------------------------------------------

FILE VARIATION REFERENCES (CONTINUED)
-------------------------------------

YOU CAN SEE WHICH TRADE LINES, PUBLIC RECORD DATA, AND INQUIRIES ARE
ASSOCIATED WITH SPECIFIC FILE VARIATIONS IN TRW'S FILE BY MATCHING THE FILE
VARIATION REFERENCES IN THE BODY OF THE REPORT TO THE ONES CONTAINED IN THE
FILE VARIATION REFERENCE SECTION.

CONSUMER STATEMENT
------------------

CONSUMERS MAY ADD EXPLANATIONS TO THEIR CREDIT REPORTS IN ACCORDANCE WITH THE
FAIR CREDIT REPORTING ACT AND STATE REPORTING LAWS. THESE STATEMENTS APPEAR AT
THE END OF THE REPORT.

THE INFORMATION CONTAINED IN THIS SMALL BUSINESS ADVISORY REPORT IS
FURNISHED IN CONFIDENCE AND MUST BE USED EXCLUSIVELY FOR LEGITIMATE
COMMERCIAL CREDIT PURPOSES. THE INFORMATION SHALL NOT BE REPRODUCED.
NEITHER TRW INC., NOR ITS SOURCES OR DISTRIBUTORS WARRANT SUCH
INFORMATION NOR SHALL THEY BE LIABLE FOR YOUR USE OR RELIANCE UPON IT.
COPYRIGHT (C) 1990 TRW INC.
**END SMALL BUSINESS ADVISORY REPORT**

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -



[#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#]
[#] [#]
[#] Building a Garage Door Opener Hacker [#]
[#] [#]
[#] by Black Manta [#]
[#] [#]
[#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#]


Garage door openers employ a DIP switch that the owner sets to his own
personal "code". The code is actually just a binary number created by the
on/off positions of the switch. The device discussed here will enable you to
open any automatic garage door (aside from some of the new dual switch models).

The opener employs a 555 timer as a pulse generator to transmit pulses to a
binary counter. Each pulse will increment the binary counter by one. You can
adjust the speed of the counting by turning R1. You will have to experiment to
find the best speed. If it is too fast, the signal will not be long enough to
open the door. Normally, about 2.5 minutes to complete all 1024 combinations.

As you hit the switch, it will begin counting up, lighting the leds for the
corresponding switches as it turns each on. This will serve as a reference so
that you can set any opener to.

To connect to the garage door opener, first desolder the DIP switches from the
door opener and solder an IC socket into where the DIP switches were. (This
will allow you to put the DIP switches back, when operating in normal mode.)
Second, you should connect the output to a wirewrap IC socket. If you mount
the IC socket on your pc or perfboard you can use the socket to plug right into
the door opener. When connecting the output, be sure that the connections on
the wirewrap socket correspond to the ON setting of the DIP switches.

Parts List
~~~~~~~~~~
Resistors
R1 - PC mount 100k potentiometer
R2 - 1k ohm 1/4 watt

Capacitors
C1 - 22MFD

Integrated Circuits
IC1 - 555CP Timer
IC2 - CD4040BE 12 stage binary counter

Misc Parts
LED1 - 10 Light Emitting Diodes
S1 - Normally Closed Momentary Push Button Switch
Perfboard
9V Battery


10 leds going to the 10 pins of the dip switch

Dip Switch Assemblies (2 of 10 shown)

|------+----------------------------------+--------->>> to ground
| |
| |
led led etc......
| |
| |
+-----> to dip switch # +-----> to dip switch #
| |
| |
+-----> to IC2 pin # +-----> to IC2 pin #

Wire in IC2 through the assemblies as follows.

>From IC2 pin To Dip Switch Assembly
~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~
2 6
3 5
4 7
5 4
6 3
7 2
9 1
12 9
13 8
14 10

>From IC2 pin To
~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~
1 Not Used
10 IC1-pin #3
15 Not Used
16 + 9V


The remaining components and remaining pins of IC2 hook up as follows:

>from IC2 pin #8-----+-----(S1)---->to IC2 pin #11
|
| to +9V
| |
| +---------------+------+
| | | |
| IC1 pin 8 IC1 pin 4 R1
| |
| IC1 pin 7---+
| |
| R2
| |
| IC1 pin 6 |
| | |
| +-----+
| | |
| to IC1 pin 1 IC1 pin 2 C1
| | |
+-----------------+-----------------------+
|
+-->>> to ground


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -



++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+ Air Fone Frequency Allocation +
+ +
+ Based on information from Leroy Donnelly +
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Ever wonder just what those trendy jet-setters talk about on their in-flight
air to ground radiotelephones? The FCC has issued rules on allocation of the
849-851/894-895 MHz bands for air-ground radiotelephone service. Using this
information it is quite easy for ANYONE with a scanner to intercept these
calls. Nothing that is said over the air should be considered secure.
Competiters, enemies, and the news media could be tuning in on "private"
conversations at any time. Here is the information on how it is all set up.

The new action (effective as of September 9, 1991)

1) changes channel spacing from GTE Airfone Inc.'s de
facto standards;

2) orders GTE to make its service available to other
air-ground licensees at non-discriminatory rates;

3) divides each channel block into 6 control channels
(P-1 through P-6) and 29 communications channels
(C-1 through C-29);

4) provides for a communications channel bandwidth of 6
kHz;

5) gives GTE 22 months to modify its current control
channel scheme; during this period, GTE can use
the lower 20 kHz of each channel block, which
includes channels C-1, C-2, and C-3, for control.
GTE then has another 38 months during which it can
only use a 3.2 kHz control channel in channel C-2
of each channel block. After these transition
periods end (September of 1996), GTE must switch
to control channels marked P-1 through P-6 in the
tables below;

6) empowers the FCC to assign exclusively one control
channel to each air-ground licensee;

7) limits the ERP of airborne stations to 30 watts;
maximum, and that of ground stations to 100 watts
maximum;

8) limits the ERP of ground stations to 1 watt when
communicating with aircraft on the ground.


GROUND TO AIR CHANNELS
~~~~~~~~~~~~~~~~~~~~~~
(NOTE" "GB" in these listings denotes Guard Band, a series
of 3 kHz spacings to separate communications channels from
control channels)

CH. # CHANNEL BLOCK
10 9 8 7 6
C-1 849.0055 849.2055 849.4055 849.6055 849.8055
C-2 849.0115 849.2115 849.4115 849.6115 849.8115
C-3 849.0175 849.2175 849.4175 849.6175 849.8175
C-4 849.0235 849.2235 849.4235 849.6235 849.8235
C-5 849.0295 849.2295 849.4295 849.6295 849.8295
C-6 849.0355 849.2355 849.4355 849.6355 849.8355
C-7 849.0415 849.2415 849.4415 849.6415 849.8415
C-8 849.0475 849.2475 849.4475 849.6475 849.8475
C-9 849.0535 849.2535 849.4535 849.6535 849.8535
C-10 849.0595 849.2595 849.4595 849.6595 849.8595
C-11 849.0655 849.2655 849.4655 849.6655 849.8655
C-12 849.0715 849.2715 849.4715 849.6715 849.8715
C-13 849.0775 849.2775 849.4775 849.6775 849.8775
C-14 849.0835 849.2835 849.4835 849.6835 849.8835
C-15 849.0895 849.2895 849.4895 849.6895 849.8895
C-16 849.0955 849.2855 849.4955 849.6955 849.8955
C-17 849.1015 849.3015 849.5015 849.7015 849.9015
C-18 849.1075 849.3075 849.5075 849.7075 849.9075
C-19 849.1135 849.3135 849.5135 849.7135 849.9135
C-20 849.1195 849.3195 849.5195 849.7195 849.9195
C-21 849.1255 849.3255 849.5255 849.7255 849.9255
C-22 849.1315 849.3315 849.5315 849.7315 849.9315
C-23 849.1375 849.3375 849.5375 849.7375 849.9375
C-24 849.1435 849.3435 849.5435 849.7435 849.9435
C-25 849.1495 849.3495 849.5495 849.7495 849.9495
C-26 849.1555 849.3555 849.5555 849.7555 849.9555
C-27 849.1615 849.3615 849.5615 849.7615 849.9615
C-28 849.1675 849.3675 849.5675 849.7675 849.9675
C-29 849.1735 849.3735 849.5735 849.7735 849.9735
GB 849.1765 849.3765 849.5765 849.7765 849.9765
to to to to to
849.1797 849.3797 849.5797 849.7797 849.9797
P-6 849.1813 849.3813 849.5813 849.7813 849.9813
P-5 849.1845 849.3845 849.5845 849.7845 849.9845
P-4 849.1877 849.3877 849.5877 849.7877 849.9877
P-3 849.1909 849.3909 849.5909 849.7909 849.9909
P-2 849.1941 849.3941 849.5941 849.7941 849.9941
P-1 849.1973 849.3973 849.5973 849.7973 849.9973

5 4 3 2 1
C-1 850.0055 850.2055 850.4055 850.6055 850.8055
C-2 850.0115 850.2115 850.4115 850.6115 850.8115
C-3 850.0175 850.2175 850.4175 850.6175 850.8175
C-4 850.0235 850.2235 850.4235 850.6235 850.8235
C-5 850.0295 850.2295 850.4295 850.6295 850.8295
C-6 850.0355 850.2355 850.4355 850.6355 850.8355
C-7 850.0415 850.2415 850.4415 850.6415 850.8415
C-8 850.0475 850.2475 850.4475 850.6475 850.8475
C-9 850.0535 850.2535 850.4535 850.6535 850.8535
C-10 850.0595 850.2595 850.4595 850.6595 850.8595
C-11 850.0655 850.2655 850.4655 850.6655 850.8655
C-12 850.0715 850.2715 850.4715 850.6715 850.8715
C-13 850.0775 850.2775 850.4775 850.6775 850.8775
C-14 850.0835 850.2835 850.4835 850.6835 850.8835
C-15 850.0895 850.2895 850.4895 850.6895 850.8895
C-16 850.0955 850.2855 850.4955 850.6955 850.8955
C-17 850.1015 850.3015 850.5015 850.7015 850.9015
C-18 850.1075 850.3075 850.5075 850.7075 850.9075
C-19 850.1135 850.3135 850.5135 850.7135 850.9135
C-20 850.1195 850.3195 850.5195 850.7195 850.9195
C-21 850.1255 850.3255 850.5255 850.7255 850.9255
C-22 850.1315 850.3315 850.5315 850.7315 850.9315
C-23 850.1375 850.3375 850.5375 850.7375 850.9375
C-24 850.1435 850.3435 850.5435 850.7435 850.9435
C-25 850.1495 850.3495 850.5495 850.7495 850.9495
C-26 850.1555 850.3555 850.5555 850.7555 850.9555
C-27 850.1615 850.3615 850.5615 850.7615 850.9615
C-28 850.1675 850.3675 850.5675 850.7675 850.9675
C-29 850.1735 850.3735 850.5735 850.7735 850.9735
GB 850.1765 850.3765 850.5765 850.7765 850.9765
to to to to to
850.1797 850.3797 850.5797 850.7797 850.9797
P-6 850.1813 850.3813 850.5813 850.7813 850.9813
P-5 850.1845 850.3845 850.5845 850.7845 850.9845
P-4 850.1877 850.3877 850.5877 850.7877 850.9877
P-3 850.1909 850.3909 850.5909 850.7909 850.9909
P-2 850.1941 850.3941 850.5941 850.7941 850.9941
P-1 850.1973 850.3973 850.5973 850.7973 850.9973

AIR TO GROUND CHANNELS
~~~~~~~~~~~~~~~~~~~~~~
CH. # CHANNEL BLOCK
10 9 8 7 6
C-1 894.0055 894.2055 894.4055 894.6055 894.8055
C-2 894.0115 894.2115 894.4115 894.6115 894.8115
C-3 894.0175 894.2175 894.4175 894.6175 894.8175
C-4 894.0235 894.2235 894.4235 894.6235 894.8235
C-5 894.0295 894.2295 894.4295 894.6295 894.8295
C-6 894.0355 894.2355 894.4355 894.6355 894.8355
C-7 894.0415 894.2415 894.4415 894.6415 894.8415
C-8 894.0475 894.2475 894.4475 894.6475 894.8475
C-9 894.0535 894.2535 894.4535 894.6535 894.8535
C-10 894.0595 894.2595 894.4595 894.6595 894.8595
C-11 894.0655 894.2655 894.4655 894.6655 894.8655
C-12 894.0715 894.2715 894.4715 894.6715 894.8715
C-13 894.0775 894.2775 894.4775 894.6775 894.8775
C-14 894.0835 894.2835 894.4835 894.6835 894.8835
C-15 894.0895 894.2895 894.4895 894.6895 894.8895
C-16 894.0955 894.2855 894.4955 894.6955 894.8955
C-17 894.1015 894.3015 894.5015 894.7015 894.9015
C-18 894.1075 894.3075 894.5075 894.7075 894.9075
C-19 894.1135 894.3135 894.5135 894.7135 894.9135
C-20 894.1195 894.3195 894.5195 894.7195 894.9195
C-21 894.1255 894.3255 894.5255 894.7255 894.9255
C-22 894.1315 894.3315 894.5315 894.7315 894.9315
C-23 894.1375 894.3375 894.5375 894.7375 894.9375
C-24 894.1435 894.3435 894.5435 894.7435 894.9435
C-25 894.1495 894.3495 894.5495 894.7495 894.9495
C-26 894.1555 894.3555 894.5555 894.7555 894.9555
C-27 894.1615 894.3615 894.5615 894.7615 894.9615
C-28 894.1675 894.3675 894.5675 894.7675 894.9675
C-29 894.1735 894.3735 894.5735 894.7735 894.9735
GB 894.1765 894.3765 894.5765 894.7765 894.9765
to to to to to
894.1797 894.3797 894.5797 894.7797 894.9797
P-6 894.1813 894.3813 894.5813 894.7813 894.9813
P-5 894.1845 894.3845 894.5845 894.7845 894.9845
P-4 894.1877 894.3877 894.5877 894.7877 894.9877
P-3 894.1909 894.3909 894.5909 894.7909 894.9909
P-2 894.1941 894.3941 894.5941 894.7941 894.9941
P-1 894.1973 894.3973 894.5973 894.7973 894.9973

5 4 3 2 1
C-1 895.0055 895.2055 895.4055 895.6055 895.8055
C-2 895.0115 895.2115 895.4115 895.6115 895.8115
C-3 895.0175 895.2175 895.4175 895.6175 895.8175
C-4 895.0235 895.2235 895.4235 895.6235 895.8235
C-5 895.0295 895.2295 895.4295 895.6295 895.8295
C-6 895.0355 895.2355 895.4355 895.6355 895.8355
C-7 895.0415 895.2415 895.4415 895.6415 895.8415
C-8 895.0475 895.2475 895.4475 895.6475 895.8475
C-9 895.0535 895.2535 895.4535 895.6535 895.8535
C-10 895.0595 895.2595 895.4595 895.6595 895.8595
C-11 895.0655 895.2655 895.4655 895.6655 895.8655
C-12 895.0715 895.2715 895.4715 895.6715 895.8715
C-13 895.0775 895.2775 895.4775 895.6775 895.8775
C-14 895.0835 895.2835 895.4835 895.6835 895.8835
C-15 895.0895 895.2895 895.4895 895.6895 895.8895
C-16 895.0955 895.2855 895.4955 895.6955 895.8955
C-17 895.1015 895.3015 895.5015 895.7015 895.9015
C-18 895.1075 895.3075 895.5075 895.7075 895.9075
C-19 895.1135 895.3135 895.5135 895.7135 895.9135
C-20 895.1195 895.3195 895.5195 895.7195 895.9195
C-21 895.1255 895.3255 895.5255 895.7255 895.9255
C-22 895.1315 895.3315 895.5315 895.7315 895.9315
C-23 895.1375 895.3375 895.5375 895.7375 895.9375
C-24 895.1435 895.3435 895.5435 895.7435 895.9435
C-25 895.1495 895.3495 895.5495 895.7495 895.9495
C-26 895.1555 895.3555 895.5555 895.7555 895.9555
C-27 895.1615 895.3615 895.5615 895.7615 895.9615
C-28 895.1675 895.3675 895.5675 895.7675 895.9675
C-29 895.1735 895.3735 895.5735 895.7735 895.9735
GB 895.1765 895.3765 895.5765 895.7765 895.9765
to to to to to
895.1797 895.3797 895.5797 895.7797 895.9797
P-6 895.1813 895.3813 895.5813 895.7813 895.9813
P-5 895.1845 895.3845 895.5845 895.7845 895.9845
P-4 895.1877 895.3877 895.5877 895.7877 895.9877
P-3 895.1909 895.3909 895.5909 895.7909 895.9909
P-2 895.1941 895.3941 895.5941 895.7941 895.9941
P-1 895.1973 895.3973 895.5973 895.7973 895.9973


Here is a reference chart of allocated channel blocks around the country.

GEOGRAPHICAL CHANNEL BLOCK LAYOUT
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
(ground stations using the same channel block must be at
least 300 miles apart)

LOCATION CH. BLOCK
ALASKA
Anchorage 8
Cordova 5
Ketchikan 5
Juneau 4
Sitka 7
Yakutat 8
ALABAMA
Birmingham 2
ARIZONA
Phoenix 4
Winslow 6
ARKANSAS
Pine Bluff 8
CALIFORNIA
Blythe 10
Eureka 8
Los Angeles 4
Oakland 1
S. San Fran. 6
Visalia 7
COLORADO
Colorado Spgs. 8
Denver 1
Hayden 6
FLORIDA
Miami 4
Orlando 2
Tallahassee 7
GEORGIA
Atlanta 5
St. Simons Is. 6
HAWAII
Mauna Kapu 5
IDAHO
Blackfoot 8
Caldwell 10
ILLINOIS
Chicago 3
Kewanee 5
Schiller Park 2
INDIANA
Fort Wayne 7
IOWA
Des Moines 1
KANSAS
Garden City 3
Wichita 7
KENTUCKY
Fairdale 6
LOUISIANA
Kenner 3
Shreveport 5
MASSACHUSETTS
Boston 7
MICHIGAN
Bellville 8
Flint 9
Sault S. Marie 6
MINNESOTA
Bloomington 9
MISSISSIPPI
Meridian 9
MISSOURI
Kansas City 6
St. Louis 4
Springfield 9
MONTANA
Lewistown 5
Miles City 8
Missoula 3
NEBRASKA
Grand Island 2
Ogallala 4
NEVADA
Las Vegas 1
Reno 3
Tonopah 9
Winnemucca 4
NEW MEXICO
Alamogordo 8
Albuquerque 10
Aztec 9
Clayton 5
NEW JERSEY
Woodbury 3
NEW YORK
E. Elmhurst 1
Schuyler 2
Staten Island 9
NORTH CAROLINA
Greensboro 9
Wilmington 3
NORTH DAKOTA
Dickinson 7
OHIO
Pataskala 1
OKLAHOMA
Warner 4
Woodward 9
OREGON
Albany 5
Klamath Falls 2
Pendleton 7
PENNSYLVANIA
Coraopolis 4
New Cumberland 8
SOUTH CAROLINA
Charleston 4
SOUTH DAKOTA
Aberdeen 6
Rapid City 5
TENNESSEE
Elizabethton 7
Memphis 10
Nashville 3
TEXAS
Austin 2
Bedford 1
Houston 9
Lubbock 7
Monahans 6
UTAH
Abajo Peak 7
Delta 2
Escalante 5
Green River 3
Salt Lake City 1
VIRGINIA
Arlington 6
WASHINGTON
Seattle 4
Cheney 1
WEST VIRGINIA
Charleston 2
WISCONSIN
Stevens Point 8
WYOMING
Riverton 9

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -



############################################
# Credit Card Authorization Machines #
# Emery Lapinski #
############################################

This article contains information pertaining to VeriFone Credit Card
Authorization machines. I have not run across any files containing information
on this subject, but if anyone knows where I can find more information about
these little grey boxes I would appreciate it.

The VeriFone comes under different names. This file is from hacking a ZON Jr XL,
but I have also seen ones that look much similar under the name TRANZ. If
anoyone has any information on the similarities/differences of these machines
I would appreciate the info....


THIS FILE IS FOR INFORMATIONAL PURPOSES ONLY.
THIS FILE IS INTENDED FOR AUTHORIZED PERSONS IN UNDERSTANDING/OPTIMIZING
THIER MACHINE.
THE AUTHOR TAKES NO RESPONSIBILITY FOR THE ACTS OF OTHERS.

WARNING! Please contact MichiganBankCard and all other applicible agencies
before reading this file.


This is the basic layout the machine, and some information on how it works.

VeriFone ZON Jr XL
(Michigan Bankcard)

|||||||||||||||||||||||||||||||||||
|||||||16 CHARACTER DISPLAY||||||||
|||||||||||||||||||||||||||||||||||

- -sale-- -credit -force- -------
| QZ. | | ABC | | DEF | | |
| 1 | | 2 | | 3 | |CLEAR|
- ------- ------- ------- -------

- ------- -check- -auth-- -------
| GHI | | JKL | | MNO | |BACK-|
| 4 | | 5 | | 6 | |SPACE|
- ------- ------- ------- -------
cash-
- ------- -mgmt-- balance- -------
| PRS | | TUV | | WXY se | |
| 7 | | 8 | | 9 tt |ALPHA|
- -recall -store- ------le -------

- ------- -check- -auth-- -------
| ,'" | | -SP | | | |FUNC |
| * | | 0 | | # | |ENTER|
- ------- ------- ------- -------

CLEAR:
Pressing CLEAR at any time brings the VeriFone back to the READY state.

BACKSPACE:
Used to erase previously enterd characters.

ALPHA:
Used to scroll through the letters on each key. Pressing an 8 will display
8. Pressing ALPHA will change this first to T, and successive presses will
change this to U, then V, then T again.

FUNC/ENTER:
Usually a blue key where all the other keys are grey. Used to indicate
end of input when entering information, or to change the FUNCTIONS of
the keys to do alternate things.

(1)SALE:
Pressing 1(SALE) means you want to process a sale transaction. The VeriFone
will ask for the credit card number. The unit uses the CC number algorithm
to check this number and can display BAD CC NUMBER. The expiration date
may be entered at this time at the end of the CC nunmber, or after pressing
ENTER it will ask for the expiration date which is of the form mmyy or myy.
This information can be entered with the keypad or by sliding the credit card
through the CC reader slot.
Then the amount of the transaction is entered (without a decimal point and
without rounding the cents) followed by ENTER.
The VeriFone calls in to get a 6-digit authorization number. Usually this
is 6 numbers, but I have seen it composed of two letters followed by 4 digits
as well. It usually begins with AP which indicates approval.
If the transaction in not approved it returns various messages depending on
the reason. This could be DECLINE, meaning there is not enough money left
in the account; CALL-HOLD meaning there is enough money but someone has
done an AUTHORIZATION (not a SALE) which reserves some of the accounts money
and will be released after 7-10 days if not DRAFT is recieved; or just
CALL, which usually means the card is stolen or cancelled.
This transaction is stored in the batch, if approved, and the approval number
is displayed.
Pressing CLEAR returns the unit to its READY state.

(2)CREDIT:
Pressing 2(CREDIT) is used for the processing of a CREDIT (as opposed to SALE)
draft. Information same as above but the VeriFone does not call to get any
kind of authorization. After all the information is enterd the unit
retunrs to the READY state.
This information is stored in the batch with CI in place of MC, VI, etc. to
indicate a credit.

(3)FORCE:
Similar to a SALE except that the unit does not call to get an approval
number. Used when an transaction is DENIED, or erased. The unit does not
call to get an approval number. The information is stored in the batch.

(4)UNDEFINED:
Could be used for special services, like AMEX transactions or Collection
Services.

(5)CHECK:
Something to do with authorization of checks and check cashing but I'm
unclear about this one.

(6)AUTH:
Like SALE, returns approval or decline code but is not stored in batch.
Places a HOLD on the card for the entered amount for 7-10 days. A sales
draft can be sent in based on this, otherwise the HOLD will be removed.
Used to reserve money on the account or to check to see if the card is good.

(7)UNDEFINED:
Can be used for more special services.

(8)CASH-MGMT:
I have no idea.

(9)BALANCE & SETTLE FUNCTIONS:
At the end of day or whenever the batch is filled (about 100 transactions)
a batch number is obtained. This is a nine digit number that is used to
reference the batch of transactions when dealing with credit corporations.
First one must BALANCE the batch. Pressing 9 (to BALANCE) will ask for a
password (stored in location 053). Enter this number and press ENTER.
The VeriFone will ask for the number of transactions which is simply a count
of the number of transactions followed by ENTER. If this is correct then
it will ask for total amount, which is the total amount of all the
transactions (the decimal point is not entered but the cents must not
be rounded so that if the total was $174.30 it would be 17430) followed by
ENTER. If either the # of transactions of total amount is incorrect
then the VeriFone diaplays the first entry of the batch which is the
last 5 digits of the credit card number followed by credit card type (VI, MC,
etc.) followed by the 6 digit authorization number, followed by the
amount of the transaction. By entering digits at this time, followed by
ENTER,the amount of the transaction can be changed. The batch is scrolled
forward by pressing ENTER.
When the information is correctly entered, The VeriFone displays READY (or
whatever is stored in location 030.) When the 9 is pressed again (to SETTLE)
it calls to process the batch. It transmits its information (if any of the
information has been changed, it sends it twice) and recieves the 9 digit
batch number, which it displays.

(0)AUTO:
An auto-dialer of some sort. Phone numbers can be stored in memory, and
pressing AUTO will dial it for you and tell yo to pick up the handset when
it is finished. I'm not sure how to use it.

MEMORY FUNCTIONS:
To review the VeriFone's memory, press:
FUNC,7
The screen will display
=
and will wait for you to enter three numbers or press ENTER which will start
at 000. Pressing ENTER will increment the location displayed, ALPHA will
decrement.
To change the Verifone's memory, press:
FUNC,8
You are asked for a password, but this is not the password stored at location
053 (this password is used for functions like getting batch numbers, clearing
the batch, changing the information in the batch, etc.) On the two machines
I have checked this password is 166831, which I obtained to when the local
authorization phone number was changed. It would call this number twice
getting a "The number you have called has been changed . . ." message,
then would call the 1-800 number.

Valid Memory Locations of form ### are:
000-399, 400-412, 500-512, 600-612, 700-712, 800-812, 900-912

Loc# Information Meaning (?)
- --------------------------------------------
000 12146808459 Phone number of some computer.
019 JXL0001 Type of machine
021 2-ART,VIDEO Type of store
022-029 <EMPTY>
030 READY Message Displayed when machine is ready
053 123456 Some functions require password, this is it (?)
056,058 18002221455 More Computers
057,059 18005543363 More Computers
100 9299783 More Computers
108 SALE Message display when 1(SALE) key is pressed
208 CREDIT Message display when 2(CREDIT) key is pressed
#08 Locations 108,208, . . . are messages displayed when
that key is pressed. Not true for 008. Can
be changed to whatever you want.
311-399 <EMPTY>

Many of the other locations contain long strings of characters that are some
sort of password/id/information (up to 40 characters I think) that the
VeriFone passes when it calls in, others are empty or used to store new
information. Chnaging these can upset the functionality of the unit.
Local numbers are called first, and if no successful connection, then the
1-800 number is called.

CLEARING THE BATCH:
Pressing
FUNC,6(?)
followed by the password (location 053) followed by ENTER. The VeriFone asks
"CLEAR BATCH?". Pressing ENTER clears the BATCH, CLEAR cancels this. To
restore the BATCH, FORCE would be used to restore this information insted of
SALE as SALE would obtain a second transaction and approval number.

UNIT SEND & UNIT RECIEVE:
Pressing
FUNC,*
or
FUNC,#(?)
does UNIT SEND or UNIT RECIEVE which does some sort of UPLOAD/DOWNLOAD
functions. I'm not sure how this one works.
Useful if important memory locations of the VeriFone are chnaged and
upset some of the functions, then the central company can replace the
information easily.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -



/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/
-/- -/-
/-/ *> TID-BYTES <* /-/
-/- -/-
/-/ by the Informatik Staff /-/
-/- -/-
/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/

Tid-Bytes is a standing column of miscellaneous bits of information.

This issue we have an update on cordless phone frequencies, a complete CLASS
code list, a list of companies that can provide you with information and
material on bombs, survival, crime, and other fun stuff, and Holistic Hacker
gives us a peek into Bell.

Cordless Phone Update
~~~~~~~~~~~~~~~~~~~~~
This is a little extra info on cordless phone frequencies from issue 01. I
decided that there are times that the handset frequencies could also be handy
for when the base itself is out of range. Note that a good many cordless
phones handsets are simplex, so the conversation will be one-sided. Here is
the list again, with the updated handset frequencies.

channel base handset
1 46.610 49.670
2 46.630 49.845
3 46.670 49.860
4 46.710 49.770
5 46.730 49.875
6 46.770 49.830
7 46.830 49.890
8 46.870 49.930
9 46.930 49.990
10 46.970 46.970



CLASS and Custom Calling Feature Control Codes:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The following list was compiled from comp.dcom.telecom postings and
the Bell Atlantic "IQ services" information line at (800) 365-5810.

(These appear to be standard, but may be changed locally)

*57 Customer Orignated Trace (COT) Activation "call trace"
The number of the last call you received is logged at the CO.
You get an acknowledging recording. Then hang up.
Write down the date and time.
You don't get the number - you must contact the
business office or police.
Costs $1.50 - $3 depending on your area.

*60 Selective Call Rejection (SCR) Activation
(start "call block" list management)

*61 Selective Distinctive Alerting (SDA) Activation
(start "priority call" list management)

*62 Selective Call Acceptance (SCA) Activation

*63 Selective Call Forwarding (SCF) Activation
(start "select forwarding list" management)

*65 ICLID Activation (caller ID)
(turn on caller ID delivery to me, the subscriber)

*66 Automatic Recall (AR) Activation
(activate "repeat call" - retry last number for 30 minutes)

*67 Call Privacy Toggle (block caller ID delivery for next call only)
*68 Computer Access Restriction Toggle
*69 AC Activation "return call" (call last person who called you)
*70 Call waiting disable
"tone block" (prevent call waiting tone, useful for data calls)
*70 // dial tone // the number you're dialing

*71 Ring, no-answer forward activation
*72 Call forwarding immediate Activation (72# on some systems)
*73 Call forwarding Deactivation (73# on some systems)
*74 Speed call 8 program (74# on some systems)
*80 SCR Deactivation "call block"
*81 SDA Deactivation "priority call"
*82 SCA Deactivation
*83 SCF Deactivation "select forwarding"
*85 ICLID Deactivation (turn off caller ID delivery to me, the subscriber)
*86 AR Deactivation "repeat call"
*89 AC Deactivation "return call"
n# speed dial (n=2 to 9)
nn# speed dial (nn=20-49)
72# activate call forwarding
73# deactivate call forwarding
74# set speed dialing (8 numbers)
75# set speed dialing (30 numbers)

Rotary/pulse phones: use 11 for the * (ex: *57 => 1157) (is there a
pulse code for #? I doubt it becuase it's not a prefix)

You do not need to subscribe to call trace to use it. Some areas
allow return call and repeat call on a per use basis. The cost is
higher per use than with a subscription, but you pay nothing for
months where you don't use it.

*65 and *85 are used when you subscribe to Caller-ID if you want to
reduce the number of calls logged because there's a surcharge after
400 calls per month.

New York Telephone has a recorded message system describing their
services. Here's what I gathered from (800) EASY-NYT (327-9698) (this
mostly jives with information from the Bell Atlantic IQ services
information line at (800) 365-5810)

Menu choice:

45 -> A person relays voice/TDD at no additional charge.
This is WITHIN New York State only.
What about calls in/out of New York State?
The operator said the originator should call information for
the relay service. This is a service of AT&T, and is currently
not allowed to call across states.
(800) 421-1220 voice
(800) 662-1220 TDD

The AT&T newsline (908) 221-6397 (221-NEWS)
for Friday June 8, 1991 mentioned that the (Chicago) Illinois
relay center opened June 10.
It is the fourth, others being in New York, Alabama and California.
[and Sprint's in Texas as mentioned in TELECOM Feb 1992]

46 -> restrict outgoing calls to pay services
exchanges 540, 550, 970, 970
area codes 700, 900
This service is free of charge.

14 -> "Ring Mate" allows you to add one or two additional numbers,
each with a unique ring pattern (and call waiting beep).

AT&T has language translation centers. I believe these are the numbers:

(408) 648-5871 AT&T Language Line (outside the USA)
(800) 628-8486 AT&T Language Line (USA only)
(800) 752-6096 AT&T Language Line information

You can get translators (English/Japanese, ...) as needed, but the
cost is rather high. I'm not sure if reservations/appointments are
necessary. It would be interesting to see the setup and costs for a
conference call from the US to Japan, using the translation center and
a TDD relay for the deaf (particularly if the deaf were non-english).
Or better yet -- a video conference from the US to Russia with
translators.

CCITT rules:

How to write a number:

+1 212 555 1212
international
(spaces, NO dashes)

(212) 555 1212
within the country (parentheses around the optional city code)



Politically Incorrect Publishers
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This is a listing of mail-order publishers & distributors of books concerning
weapons, combat, explosives, etc. A pound sign (#) indicates that the company
carries a line of books, but specializes in other items, such as gun leather,
yuppie survival goods, ID cards & certificates, medals & patches, outdoor
clothing, etc. There are all sorts of nify goodies that you can order.

Brigade Quartermasters #
1025 Cobb International Blvd.
Kennesaw, GA 30144-4300
Information: (404) 428-1234
Orders: (800) 338-4327
Fax Orders: (404) 426-7726
Telex: 54-2461

Butokukai
P.O. Box 430
Cornville, AZ 86325
(602) 634-6280

CEP, Incorporated
P.O. Box 865
Boulder, CO 80306
(303) 443-2294

Delta Press, Ltd.
P.O. Box 1625
215 S. Washington St.
El Dorado, AR 71731
Orders: (800) 852-4445
Service: (501) 862-4984

Desert Publications
P.O. Box 1751
716 Harrell St.
El Dorado, AR 71731-1751
Orders: (800) 852-4445
Fax Orders: (501) 862-9671
Information: (501) 862-2077

Eden Press
P.O. Box 8410
Fountain Valley, CA 92728
Orders: (800) 338-8484
Info & CA: (714) 556-2023

Loompanics Unlimited
P.O. Box 1197
Port Townsend, WA 98368
(No phone?)

Mass Army Navy Store #
15 Fordham Road
Boston, MA 02134
Orders: (800) 343-7749
Info & MA: (617) 783-1250
Fax: (617) 254-6607

National Intelligence Book Center
1700 W St., N.W Suite 607
Washington, DC 20006
Phone: (202) 797-1234 (SUBSCRIPTION)
Phone: (202) 337-8084 (ORDER)
fax: (202) 342-2342

NIC, Inc. (Law Enforcement Supply) #
220 Carroll St., Suite D1
P.O. Box 5210
Shreveport, LA 71135-5210
Orders: (318) 222-2970 (24 hr.)
Fax: (318) 869-3228 (24 hr.)

Paladin Press
P.O. Box 1307
Boulder, CO 80306
Orders: (800) 392-2400
Service: (303) 443-7250

Phoenix Systems, Inc. #
P.O. Box 3339
Evergreen, CO 80439
Fax: (303) 278-8101
Throat: (303) 277-0305 (08:00-17:00 MST/MDT)

Quartermaster #
750 Long Beach Blvd
Long Beach, CA 90813
P.O. Box 829
Long Beach, CA 90801-0829
Orders: (800) 444-8643
Info: (800) 933-3135

Survival Books
11106 Magnolias Blvd.
N. Hollywood, CA 91601-3810
(818) 763-0804

U.S. Cavalry #
2855 Centennial Ave.
Radcliff, KY 40160-9000
Orders: (800) 777-7732
Info: (502) 351-1164


Southwestern Bell Visitor Passes
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Holistic Hacker - H0D sends us this note:

I acquired this goody on a visit of the SW Bell facilities in St. Louis
last year. Here's a brief description of it. The pass is on light blue
cardboard stock approximately 2.5" wide by 3.5" high. The Bell logo is
in the top left corner and "Southwestern Bell Telephone" is typed along
the top. Centered about 1.5" from the top is "Visitor Temporary Pass."
Below that is name, company, and admit to, all followed by some lines to
write the appropriate BS in. "Void After" and "Issued By" are farther
down. On my pass, "Admit To" = OBC (One Bell Center) and "Issued By" =
F.A. Too bad I couldn't keep the visitor pass to their data center...

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -



(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)
)%( )%(
(%) > Hot Flashes < (%)
)%( )%(
(%) The Underground News Report (%)
)%( )%(
(%) Edited by: the Informatik Staff (%)
)%( )%(
(%) Jan thru Apr 1992 (%)
)%( )%(
(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)

IMPORTANT NOTE: We have decided to not generally include any future news
features on hacking or phreaking. Occasionally we may include one or two if we
feel that they have not been covered elswhere. Our decision is based on the
fact that Phrack, a long-standing electronic publication devoted to the hacker
community, does an excellent job of collecting them. There is no use in both
of use publishing the same stories over and over. We do plan to keep stories
concerning fraud, government, and other goodies not normally addressed by
Phrack. SO, for most hacking and phreaking news stories check out Phrack.


=====================================
Wireless Cable Lottery Spurring Scams
=====================================

WASHINGTON, D.C., U.S.A., 1992 APR 15 (NB) -- The Federal
Communications Commission's lottery of rights to operate wireless
cable systems is becoming a hotbed for con-men, according to
federal and state officials.

The Bush Administration has said it wants to end the lottery
process and award new frequencies based on auctions, while
Congress wants hearings and awards based on a "public interest"
test. But until all that is sorted out, lotteries, in which people
file applications and the agency chooses winners by lot, are the
way the agency will allocate rights.

The current controversy involves wireless cable television, a
technology using microwave radio technology to transmit TV
programs to viewers' homes, bypassing wired cable systems. The
low capacity of such systems, compared with the high capacity of
existing wired cable systems, makes them a risky business
proposition in large cities wired for cable, but that has not
stopped the con artists.

So far, 18 state securities agencies have investigated or taken
action against suspected scams in Georgia, with Illinois and Florida
adding their voices in the form of press releases and warnings from
state officials. The Federal Trade Commission has also been
investigating lottery fraud, and has filed three lawsuits.

Florida Comptroller, Gerald Lewis, who regulates the state's
banks, claimed at a news conference that "boiler room" operations
touting license lotteries have taken in $50 million nationwide.
He said the con artists claim that for $5,000 they can virtually
guarantee a successful application. The actual filing fee is
$155, and over 36,000 applications have been received so far,
according to the FCC.

Illinois Secretary of State George Ryan estimated in a press
statement that investors have risked $75 million on the schemes,
and his office has taken action against two such companies in that
state. The FCC has been granting wireless cable licenses for nine
years, but fewer than 170 such systems are actually up and running,
he added, indicating the business risk is considerable since
wireless cable works only in a "line of sight" from a central antenna
to a subscriber.

Later this year, the FCC will launch a second and, perhaps, more
lucrative lottery process. This will be for new frequencies to
run communications adjuncts to interactive TV systems like that
offered by TV Answer of Reston, Virginia. TV Answer has won
agreement from Hewlett-Packard to make set-top converters for
its system, which will offer banking, shopping, information, and
games. In this lottery, however, winning bidders will be forced
to build-out at least half their systems before selling their
interests. Applications will cost about $5,000-$10,000, depending
on the size of the market applied for, and total costs to winning
bidders are estimated at $150,000-$250,000, again depending
on the size of the market.

- ------------------------------------------------------------------------------

==============================
SPA Raids Grand Central Camera
==============================

WASHINGTON, DC, U.S.A., 1992 APR 8 (NB) -- On March 25, U.S.
Marshals and representatives of the Software Publishers
Association raided grand Central Cameras (AKA GCT Photo Dealers)
based on charges that the company had been making illegal copies
of software and selling computers preloaded with the programs in
violation of U.S. copyright laws.

SPA member companies whose software has allegedly been copied
include Lotus, Microsoft, WordPerfect, Datastorm Technologies,
Fifth Generation Systems, Interplay Productions, and Sphere.

Copied software was found on 25 seized floppy diskettes which
allegedly served as duplication masters. In addition, sales
records with names of customers were also taken and will
reportedly be used to determine if those obtaining pirated
software will be named in the case against the store.

Also seized in the raid, which was based on a federal court order
issued in the United States Court for the Southern District of
New York, were three desktop computers and two laptops which the
SPA says contained illegal or pirated copies of software.

Grand Central Cameras has agreed to submit to, and the court
subsequently entered, a preliminary injunction forbidding
unauthorized software copying by the reseller.

The SPA maintains an anti-piracy hotline, 800-388-7478, which
collects information from people wishing to report software
copyright violations.

To get a copy of the SPA Self-Audit Kit and SPAudit inventory
management program, companies should write to: SPAudit Software
Publishers Association 1730 M. Street, NW, Suite 700 Washington,
D.C. 20036.

- ------------------------------------------------------------------------------

===================================================
MCI Nixes Billing For Problem Pay-Per-Call Services
===================================================

WASHINGTON, D.C., U.S.A., 1992 APR 1 (NB) -- MCI
Communications has announced it is no longer accepting
applications for the more dubious firms offering financial
services on its premium-rated "900" area code lines.

Specifically, MCI is prohibiting companies offering credit card
and loan advice services on the premium rate services. Newsbytes
notes that the majority of these companies are usually only
dispensing common-sense rules on building credit ratings up and
charging heavily for the privilege.

One "900" number that Newsbytes called in the US recently in
connection with a financial feature turned out to be a thinly-
disguised mail-order operation with a "Gold card" membership
costing $50 that allowed members to buy mail order goods at
normal prices. Considering that callers to the "900" number paid
$10 for the call itself, this was clearly a scam.

In addition to the financial services block on "900" lines, MCI
has also ceased handling billing for job agencies which offer
generic job descriptions and suggestions on how to get a job.

The changes, which take effect from April 1, are in addition to a
previously-announced block on adult services on "900" numbers.

"MCI has instituted these policies to further ensure that consumers
are protected and are subjected to less confusion and fewer
incidences of abusive sales tactics by some 900 information
providers," said Carol Herod, MCI senior vice president for
business marketing, announcing the block.

"While we have previously taken strong policy steps that are
consistent with FCC rules, these additional safeguards can help
to protect consumers during uncertain economic times. At the
same time, we want them to be able to take advantage of the
numerous consumer and business-oriented programs which
offer legitimate and valuable services," she added.

The "900" area code service changes, which were notified to its
major subscribers in February of this year, are likely to cause a
major contraction in the number of companies offering premium
services, Newsbytes notes. MCI, ironically, was one of the first
telecommunications companies to offer "900" area code premium
rate services at the beginning of last year.

- ------------------------------------------------------------------------------

=================================================================
Electronic Filing Breeds Tax Fraud Scams; Include Illegal Refunds
=================================================================
Los Angeles Times, Apr 14, 1992

Los Angeles - Jerome Hearne used to rob people for a living, but sometime
in the late 1980s or early 1990s he turned to a more lucrative livelihood:
robbing the U.S. Treasury.
Hearne's adopted brand of crime was electronic tax fraud.
He and a band of Los Angeles cohorts joined a fast-growing group of crooks
who are raiding millions of taxpayer dollars every year by filing false
returns and getting quick, illegal refunds in the form of bank loans.
The scams bring together clever ringleaders and large numbers of co-
conspirators, often unemployed or homeless people who are willing to have
their real names and Social Security numbers used on fake tax returns.
In Georgia, such fraud is a growing problem, partly because electronic tax
filing has been in place for only three years. "All of the kinks and bugs are
going to have to be ironed out," said Loretta Bush, a spokeswoman for the
Internal Revenue Service in Atlanta.
However, she said, intensified efforts by the government to fight
electronic filing fraud are working. Two Riverdale men recently pleaded guilty
to filing false tax returns electronically. It was the first criminal
prosecution of its kind in the Northern District of Georgia.
The government charged that the men prepared tax returns for clients and,
then without the clients' knowledge, altered the filings and claimed larger
refunds than legally were due.
The men arranged "refund anticipation loans" for their clients, using the
returns with the inflated refunds.
When a bank issued checks for the loans, the men endorsed the clients'
names on the back of the checks, the government said. Then they deposited the
money in their own accounts.
The men then issued checks to their clients for the amount they were
legally owed - and pocketed the difference.
In Los Angeles, the fraud also involved bank loans.
The crooks filed fraudulent returns electronically using the government's
computerized tax-return system. Then they applied for bank loans based on the
anticipated return. It takes only two to three days for the bank to approve
such loans and for the scam artists to have checks in their hands.
By the time IRS auditors discover what has happened, everyone involved
usually has disappeared with the money - sometimes a great deal of it. Hearne
and the government dispute the exact size of the take in his scam, but the
total could top $1 million in false returns.
Hearne, who denies he was the group's ringleader but has pleaded guilty to
tax fraud and conspiracy charges, faces sentencing later this month.
Hearne's case - which involved seven other defendants charged with similar
crimes - is the nation's biggest so far. But Hearne has plenty of company in
the electronic tax-scam business.
"This is a major problem for us," said Dennis Crawford, chief of the
criminal investigation division of the IRS's Los Angeles office. "It's what's
hot right now. We've had to pull people off other areas to deal it."

- ------------------------------------------------------------------------------

=============================================
Ads With '800' Numbers Don't Always Ring True
=============================================
Elliott Brack, The Atlanta Constitution, Apr 1, 1992

Hey, no fooling. You may not believe this, but things aren't always what
they seem. Really!
Yet if anyone gave you a 1-800 telephone number, you would automatically
think that it would be a toll-free call, right?
Not always, we have learned. Though in most cases the 1-800 number is
entirely free, the con artists have found another way to work a scam, aimed at
getting into your pocketbook.
You may remember that over the last few months we have reported a wave of
mail to us and other people offering "free gifts," "free vacations" or
"official notices" that you might have won something free. Actually, the
way the message is composed, it appears that you are guaranteed of winning
some major gift.
In all instances, all you have to do is call the telephone number provided
to learn what you have won. Up to now, it has been a 1-900 number for you to
call, which should have told you it would cost you to dial that number. Yet
the off-chance of winning something big has caused lots of people to pay those
1-900 toll charges - only to find that the prize is either less than they
anticipated or inconsequential.

CHARGES KICK IN IF YOU STAY ON THE LINE
Now comes the new twist.
Recently many people have received notifications, printed like a postcard,
urging them to call a 1-800 number. It goes further than that. It says "call
toll free 1-800 [number] for complete instructions." Now that would make
anyone think there would be no charge for this call, right?
Wrong. When they call the 1-800 number, they are connected to a
computerized voice, which tells them to remain on the line and follow the
instructions. It's here that the computer also warns that they will be billed
for this service if they stay on the line.
But since the postcard said "toll free," many people ignore this warning,
only to find out later they have been billed for the call by their telephone
company.

DON'T BE FOOLED, ESPECIALLY TODAY
If you stay on the line, here's what happens next. The computer asks you to
punch in the 12-digit ID number listed on the postcard, as well as your
telephone number and ZIP code, before the prize will be revealed.
In other words, if you stay on the line, the con artists get enough
information to bill you for telling you what you might have won. The 1- 800
number was used to lure callers, but what eventually happens is just like
calling a 1-900 number.
It all amounts to what appears to be one thing, but is distinctly another.
This reminds me of what consumer advisers continually tell people: Don't give
out your credit card numbers on the phone. Only this time, you also should not
be giving out your telephone number, or else you'll get a bill from what
appeared to be a 1-800 toll-free call.
Today is April Fool's Day. Make a call to a 1-900 number, or even in some
instances to a 1-800 number, and you could be fooled any day of the year.
Things are not always what they seem.

- ------------------------------------------------------------------------------

====================================================================
Teen Accused of Avoiding Payment on $41,000 Worth of Phone-Sex Calls
====================================================================
Jeff Schultz, Atlanta Constitution, Apr 9, 1992

The first bombshell - to outward appearances a normal, $25, no-calls- to-
Uncle-Fred-in-Pago-Pago telephone bill - arrived in the mail in December.
Dorothy Brown opened it, waded through the stack of computer printed pages,
and . . . and . . .
"I nearly had a heart attack," she said. "I mean, $13,000! I thought that
was bad enough. Then I got the next one."
Ms. Brown's next bill from United Telephone arrived at her Mountain City,
Tenn., home in January - this one in excess of $27,000. She still hasn't
gotten over the shock, but at least now there's some knowledge to go with the
palpitations.
Christoper Brown, her 19-year-old son, has been indicted by a grand jury on
a charge of attempting to avoid payment for services valued at more than $500.
The services were phone-sex numbers. The total was nearly $41,000.
Mr. Brown, who is accused of making 746 calls in a two-month period, was
arrested Tuesday and is being held in Johnson County Jail in lieu of $10,000
bond. He will be arraigned May 1.
This is the first time AT&T - the long-distance provider of the 900
services - and United Telephone have indicted somebody for telephone fraud
related to such services. Tennessee is trying the case as a felony theft,
punishable by a prison term, fines and restitution.
Her son's future is only one of many concerns facing Ms. Brown, a machine
operator at Levi Strauss and Co.
During a 15-minute phone interview - she called collect - she asked a
reporter numerous times, "This won't hurt my credit, will it?" and, "Am I
going to have to pay for these calls?"
She said she struggles to support herself and two sons in Mountain City
(population 2,000) and added, "I'm having quite a bit of financial trouble
as it is. I can't afford an attorney."
Neither would she post bond for her son when he called her at work from
jail at 10:30 a.m. Tuesday. "He still didn't act like he was sorry when I
talked to him," she said. "He was kind of giving smart answers. I told him I
couldn't [post bond]. He said, 'Yes, you can. You get down here and sign it.'
I told him, 'No, you should've known better.' "
Ms. Brown said that when she received the first bill, her son denied
placing the calls. She suspected that a prisoner in the state penitentiary, 15
miles from her house, was billing calls to her number.
"Then I started seeing tablets around the house with those numbers written
on it. They're those romance numbers. I know he got them on TV. He don't have
a job so he's home all day. I asked him about the numbers, but he said, 'Oh,
it's nothing.' "
She said that only after the second bill did Mr. Brown, , who last month
was laid off from his job at a chair manufacturer, admit to the calls.
Jim Cosgrove, a spokesman for United Telephone, said telephone fraud
affects the industry to the tune of $500 million annually, "but it's difficult
to get enough evidence to press charges."

- ------------------------------------------------------------------------------

==========================================
Privacy Is Hot-Selling Item At $2 A Minute
==========================================
Marilyn Kalfus, The Orange Country Regester, Apr 2, 1992

Richard Koch says he has no clue who his customers are.
That's the point.
Mr. Koch sells privacy - at $2 a minute.
His Untraceable Phone Calls, based outside Boston, is a nationwide service
that prevents people's telephone numbers from being identified and keeps their
calls from being traced.
So, just who's using this service?
"I'm completely in the dark," Mr. Koch said. "It's kind of a strange
business."
When callers dial Mr. Koch's 900 number, they reach a computer near Las
Vegas. The computer, which connects them to a nationwide long- distance line
Mr. Koch buys from AT&T, gives them a dial tone.
The number? 1-900-Stopper.
"This is not a sleazy 900 service," Mr. Koch said. "It's quite the
opposite.
"The people who call want to have privacy," he said. "The only call that
shows up on their phone bill is the 1-900-Stopper call."
The cost is $2 a minute for calls inside the United States, $5 a minute for
international calls.
The service can be used for local calls, long-distance calls and calls to
800 lines, but not for calls to 900 lines. That way he avoids having to pay
for 900-line calls that charge more than $2 a minute.
Mr. Koch figures his service is especially popular in states that have
approved Caller ID.
"When any call you make or receive can end up in a marketing database, it's
time for concern," he said.
Mr. Koch also says his service is valuable for anyone who doesn't want his
or her phone records showing up in court records.
Daisy Ottmann, a spokeswoman for AT&T, confirmed that it works.
Mr. Koch concedes that some people might use the service to hide criminal
activity, calling it "a double-edged sword."
But he said, "Criminals use the U.S. mail, and we don't keep track of
everyone's mail. Criminals can go out and use a pay telephone and do the same
thing."
Indeed, anyone can conceal his calls by using a pay phone, Mr. Koch and Ms.
Ottmann noted.
"I just provide the convenience of using your home telephone," Mr. Koch
said. "You don't have to stand in line at a pay phone and hope no one's
looking over your shoulder."
He estimates that more than 200,000 untraceable calls have been made on the
system since it started two years ago.
"They can't all be criminals," he said.

- ------------------------------------------------------------------------------

========================================
Italian Crooks Let Others Pay Phone Bill
========================================
Translated from "Tagespiegel" (The Berlin Daily Newspaper), Feb 22, 1992

Lui, Rome, 21. February 1992. [...] Half a million Italians are the proud
owners of portable telephones. The cordless appliance has become the favorite
toy of the Southerners, but the game may soon be over: the "telefonini" are not
protected.

Under the motto "Buy one, pay for two", crooks sell manipulated phones that are
used so that the buyer has to pay for the toll calls of the seller. The trick
works like this: the crooks take a computer with a computing program [whatever
that may be--ed.] like the ones uses to crack automatic teller machines, and
fuss with it until they find the secret code for the telephone. The code is a
combination of the telephone number and the serial number that is supposed to
only be available to the telephone company SIP. When the code has been
cracked, it is no problem to transfer it to a second telephone, so that both
telephones have the same license number. One phone is sold "under the hand" by
the crooks. As an added deal, the buyer not only gets to pay his own phone
bill, but the fees run up on the second phone as well. The Italian underworld
is especially keen on using this method.[...] The mafia uses the "portabili"
for conducting their unclean business.

[... The police] have not been able to find the instigators, but they suspect
that employees of the telephone manufacturing company are involved, as they
have the knowledge of how the phones are constructed. [...] The portable
telephone is well-known for the ease of tapping the telephone conversations
[which cannot, however, be traced to the place of origin. A book calle "Italy,
I hear you calling" with some of the more interesting tapped conversations has
just been published.]

- ------------------------------------------------------------------------------

===========================
Robber 'Foiled Bank System'
===========================
The Independent (Uk), Mar 13, 1992

An electronics expert stole more than (pounds) 17,000 in a high-tech
robbery spree, plundering dozens of accounts from automatic cash dispensers
at banks, Paisley [Scotland] Sheriff Court was told yesterday.

Clydesdale Bank chiefs claimed their dispensing system was foolproof and told
angry customers that members of their own households must have been responsible
for making withdrawals without their knowledge.

Anthony Pratt, 32, a bank engineer, used a hand-held computer inside bank
premises to record transactions being made by customers at "hole-in-the-wall"
machines outside. He recorded the customer's secret number and later used it
on plastic cards he made with magnetic strips. Pratt, of East Kilbride, was
finally arrested after he took cash from a machine in Glasgow. He admitted
conspiracy to rob and robbery. Sentence was deferred for reports until 2 April.

- ------------------------------------------------------------------------------

===============================================
FBI Fear Phone Advances Will Hamper Wiretapping
===============================================
LA Times, Mar 7, 1992

Washington- The FBI, contending that rapidly developing telecommunications
technology is hampering the vital tool of wiretapping, proposed legislation
Friday that would require the industry to ensure that improvements do not
interfere with the ability to secretly record conversations.

It also proposed that consumers pick up the cost of changing current
wiretapping equipment to keep pace with new technology.

If the problem is not solved, "terrorists, violent criminals, kidnapers, drug
cartels and other criminal organizations will be able to carry out their
illegal activities using the telecommunications system without detection." FBI
Director William S. Sessions said. [...]

At issue is the rapid move toward digital telephone communications and
fiber-optic systems in which thousands of conversations can be carried by
filaments roughly the size of a strand of human hair.

William A. Bayse, assistant FBI director for technical services, and other FBI
officals contend that the transmission of hundreds and sometimes thousands of
digital conversations over a single link prevents current wiretapping
technology from isolating conversations for recording as required under the
1968 federal wiretap law. [...]

Other FBI offical said the expense could be passed on to telephone users at a
cost of "probably less than 20 cents an average per month." [...]

FBI officals maintained, however, that they already have encountered
difficulties in recording digitally transmitted conversations, now used by
about 10% of the nations phones. They declined, however, to give any examples
of such difficulties.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -



Informatik Submission & Subscription Policy
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Informatik is an ongoing electronic journal, and thus we are faced with
the ever present need for a steady influx of new material. If you have an
area of interest or expertise that you would like to write about, please do
not hesitate to contribute! We depend on reader submissions, especially for
the "Hot Flashes" news reports. We do ask that any submissions fit the
following guidelines...

General Content
~~~~~~~~~~~~~~~
Material for Informatik should concern information of interest to the
computer underground community. Examples of this include, but are by no
means limited to scams, cellular workings, government agencies, fraud,
clandestine activity, abuse of technology, recent advances in computing
or telecommunications technology, and other of information not readily
available to the public. Please include a title and author name.

Text Format
~~~~~~~~~~~
* standard ASCII test
* 79 characters per line
* no TAB codes
* no special or system specific characters
* mixed case type

News submissions
~~~~~~~~~~~~~~~~
* Submit only recent news items
* Include the headline or title of the article
the author's name (if given)
the publication of origin
the date of publication

Subscriptions and Submission Address
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
We are happy to provide an Internet based subscription service to our
readers. To be on our mailout list, send mail to our Internet address,
"[email protected]" and include the word subscription in the subject
of your message. If you do not have internet access, try to reach us through
the many various BBS's across the USA, or route it through a friend who does
have internet access.

Back Issues
~~~~~~~~~~~
Back issues of Informatik are available via ftp at ftp.eff.org in the
/pub/cud/inform directory. The site also contains a plethora of other
electronic texts of interest to the "computer underground" community including
Phrack, NIA, PHUN, and the LOD tech journals.

/* End; Issue 03 */
------- End of forwarded message -------

 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
Gummo
Who's Your Caddy?
Requiem for a dream
Mobster Movies
Top Ten Movies to Watch on Acid
Any good Asian flicks?
Code Monkeys
A Scanner Darkly
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS