💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › INFORMATIK › inform-3.phk captured on 2022-06-12 at 12:57:54.

View Raw

More Information

-=-=-=-=-=-=-

+=============================================================================+
|    ##  ##  ##  ###### ######  ######   ### ###     ###### ######  ##  ## ## |
|   ##  ### ##  ##     ##  ##  ##  ##   ## ## ##    ##  ##   ##    ##  ## ##  |
|  ##  ## ###  #####  ##  ##  ######   ##     ##   ######   ##    ##  ####    |
| ##  ##  ##  ##     ######  ##   ##  ##      ##  ##  ##   ##    ##  ##  ##   |
+=============================================##==============================+
|                                                                 Apr 24, 1992|
|                   [ The Journal of Privileged Information ]                 |
|                                                                             |
+-----------------------------------------------------------------------------+
| Issue 03                                                By: 'Above the Law' |
+-----------------------------------------------------------------------------+
|                                                                             |
|Informatik--Bringing you all the information you should know...              |
|            and a lot you shouldn't...                                       |
|                                                                             |
+=============================================================================+



/* Introduction */
   By the Informatik staff

       Welcome to Issue number 3 of Informatik Journal.  It's been a
whopping 3 months since we released our last issue, but at least our time
table matches that of 2600.  Sorry this took so long, but guess what. . .
we had a hell of a time getting submissions AGAIN.  How about putting your
creative talents to use and writing some articles so we can release
Informatik a bit more frequently.

       For our new readers, Informatik is an electronic journal containing
information that is for one reason or another usually withheld from the
public.  Sometimes it is for "security" reasons, and other times it is simply
because it is felt that the public does not need to know.  Hogwash we say!
Information is power!  Have they something to hide?  Are there things in this
world that we *gasp* just should not know about?  I do not think so.

       In other news, we have decided to reduce our news coverage to
strictly hack/phreak/fraud type events.  No more general computer industry,
telecommunications news.  Our friends at Phrack have that angle covered
admirably, and there's no reason to waste hard drive space with 60-70k per
issue of duplicate news items.

       This issue brings us information on public telephone abuse by Brian
Oblivion.  Could this be the end of red boxing?  For you radio phreaks we have
the tools needed to track down those airphone transmissions, and information
on how law enforcement monitors suspects and how you can get in on the action.
Black Manta provides us with schematics on how you can build a simple universal
garage door opener.  HiBias brings us a guide to TRW business reports that
explains just exactly what all those numbers mean, and another article
reveals the workings of those nifty credit card verification machines.
Tid-Bytes is back with some interesting blurbs, and the Hot Flashes of course
keeps you abreast on all sorts of goings on.

       We'd like to thank you for your continued readership of Informatik,
and we'd love it if you recommended it to your friends and upload it to
your favorite boards, ftp sites, etc.  Remember, subscriptions, submissions,
questions, or suggestions and comments can be sent to our Internet address:

                          inform@doc.cc.utexas.edu

       That's all for now, see you next issue. . .


                                Mack Hammer & Sterling
                                       [Editors]

 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -



                  ===========================================
                  ============== - CONTENTS - ===============
                  ================ Issue 03 =================
                  ======= Release date April 24, 1992 =======
                  ===========================================


01)  Issue #3 Introduction
     By:  Informatik Staff

02)  Coin Services Update
     By:  Brian Oblivion

03)  Law Enforcement Surveillance Scanning
     By:  Sterling

04)  TRW Business Reports
     By:  HiBias

05)  Building a Garage Door Hacker
     By:  Black Manta

06)  Air Phone Frequency Allocation
     By:  Leroy Donnelly

07)  Credit Card Authorization Machines
     By:  Emery Lapinski

08)  Tid-Bytes--Misc Contributions
     By:  Informatik Staff

09)  Hot Flashes--The Underground News Report
     By:  Various Sources

10)  Submission and Subscription Information
     By:  Informatik Staff

 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    *DISCLAIMER*
        Informatik Journal is printed for informational purposes only.  We
        do not recommend or condone any illegal or fraudulent application of
        the information found in this electronic magazine.  As such, we
        accept no liability for any criminal or civil disputes arising from
        said information.

 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -




  ***************************************************************************
  *                                                                         *
  *            Straight from the Bellyard:  Coin Services Update            *
  *                                                                         *
  *                                    by                                   *
  *                              Brian Oblivion                             *
  *                                                                         *
  *                                                                         *
  * Courtesy of:         Restricted-Data-Transmissions (RDT)                *
  *                      "Truth is cheap, but information costs."           *
  *                                                                         *
  *                                                                         *
  *                                                                4/17/92  *
  ***************************************************************************
 
Introduction
- ------------
 
Public Telephones: we all know them, and how vulnerable they are
to fraudulent abuse.  Well, so does Bellcore and NYNEX and they
have come up with a few methods on combatting fraudulent users.
 
Coin deposits by a typical patron of the public telephone are
communicated to the St Operator
Services System (OSS) by bursts of certain dual-tone signals.  These
signals consist of the two frequencies 1.7 KHz and 2.2 KHz simul-
taneously, which are detected in end-office and tandem-office environ-
ments to provide accurate coin deposit detection.
 
There are two types of interference that are encountered by outside
origin.  These are talkdown and talkoff.  Talkdown is the failure to
recognize a valid dual-tone signal because of interference from
superimposed speech or other noise that may be from either the
originating coin line or the terminating end.  Talkoff is the false
acceptance of speech, music, or background noises as valid coin
deposits.  This obviously includes redbox tones, whistles, tape
reproductions, etc.
 
In order to combat the erroneous acceptance of false credit the
following methods have been defined and are to be employed
eventually (if they haven't already), according to recent
information.
 
Frequency Limits
- --------- ------
 
The detector must accept dual-tone signals if the frequencies
of both tones are within +/- 5% of their respective nominal
values of 1.7 KHz and 2.2 KHz.  The detector must also reject
dual-tone signals if the frequency of either or both tones is
offset more than +/- 3.5% from its nominal value.
 
Frequency offsets of +/- 1.5 percent are the extremes expected from
properly designed and maintained coin telephones.  The +/- 3.5 percent
constraint is imposed to minimize the width of the stop-band notch
filters in anti-fraud notch filters.
 
 
Signal Power and Twist
- ------ ----- --- -----
 
The detector must accept dual-tone signals if the individual
power levels of both tones are within 0 to -25 dBm0 and within
5 dB of each other.  (Twist is the dB difference between
power levels of the two tones of a dual-tone signal)
 
The detector must reject dual-tone signals if the individual
poser level of either or both tones is below -30 dBm0.
 
The range 0 to -25 dBm0 is the maximum expected from properly designed
and maintained coin telephones and loops.  The -30 dBm0 limit is
imposed to minimize the depth of the stop-band needed in anti-fraud
notch filters.
 
 
Pulse Timing
- ----- ------
 
Nickels, dimes, and quarters are represented by one, two, and five
dual-tone TONE-ON pulses.  The dollar signal is represented by a
single long pulse.  Each pulse is followed by a TONE-OFF interval.
The following chart shows the timing specifics for all coin generated
tones.
 
 +----------------------------------------------------------------------------+
 |                                   | Within-Coin | End-of-coin Tone OFF (ms)|
 |---------------------+-------------+-------------+-------+------+-----------|
 |                     | TONE-ON (ms)| TONE-OFF(ms)|  Must | Must |Allowed to |
 |                     | Must Accept | Must Accept | Accept|Reject|Acc. or Rej|
 |---------------------+-------------+-------------+-------+------+-----------|
 | Nickel  | 1 Pulse   |   35 - 160  |    ----     | >175  | <160 | 160 - 170 |
 |---------+-----------+-------------+-------------+-------+------+-----------|
 | Dime    | 1st Pulse |   35 - 160  |   25 - 110  |       |      |           |
 |---------+-----------+-------------+-------------+-------+------+-----------|
 | Dime    | 2nd Pulse |   35 - 160  |    ----     | > 75  | < 60 |  60 - 75  |
 |---------+-----------+-------------+-------------+-------+------+-----------|
 | Quarter | 1st Pulse |   20 - 100  |   20 - 110  |       |      |           |
 |---------+-----------+-------------+-------------+-------+------+-----------|
 | Quarter | 2nd Pulse |   20 - 60   |   20 - 60   |       |      |           |
 |---------+-----------+-------------+-------------+-------+------+-----------|
 | Quarter | 3rd Pulse |   20 - 60   |   20 - 60   |       |      |           |
 |---------+-----------+-------------+-------------+-------+------+-----------|
 | Quarter | 4th Pulse |   20 - 60   |   20 - 60   |       |      |           |
 |---------+-----------+-------------+-------------+-------+------+-----------|
 | Quarter | 5th Pulse |   20 - 100  |    ----     | > 75  | < 60 |  60 - 75  |
 |---------+-----------+-------------+-------------+-------+------+-----------|
 | Dollar  | 1 Pulse   |  600 - 700  |    ----     | > 75  | < 60 |  60 - 75  |
 |---------+-----------+-------------+-------------+-------+------+-----------|
 | Note:  The detector is allowed to accept or reject tone-on and within-coin |
 |        tone-off durations outside their respective must-accept ranges.     |
 +----------------------------------------------------------------------------+
 
 
Methods of controlling talkdown and talkoff
- ------- -- ----------- -------- --- -------
 
Talkdown, is more of a transmission error problem that is generated
by interference from superimposed speech or ambient noise.  This
noise comes from the originating coin line or from the terminating
end.  Talkdown results in the failure of the detector to recognize
a valid dual-tone signal.
 
One of the main sources of talkdown is the improper muting of the voice
path during tone generation.  This attenuated speech or ambient noise
power is superimposed on the coin signals which corrupts the signal.
 
Muting is accomplished by shorting out the speech path with a cap-
acitor.  Minimum muting attenuation is 15 dB at 300 Hz, 25 dB at
1000 Hz, and 35 dB at 3000 Hz.  The attenuated speech or ambient
noise power is superimposed on the coin signals which could cause
talkdown.
 
Some talkdown is also generated from the called party, operator
speech, or automated announcements.  These signals can only reach
the detector by reflection through the trans-hybrid path at a 3-to-4
wire junction, which is usually located in the originating end
office.
 
 
Talkoff
- -------
 
Talkoff is the false acceptance of speech, music or background
noises as valid coin deposit signals by a detector.  This is
what registers a valid deposit when no actual money is deposited.
 
In order to combat, a few countermeasures are expected to be employed.
 
      o The call must be terminated or routed to an operator if the
        total amount due for an initial deposit or a subsequent deposit
        has been received within an overall session timeout period.
 
      o The overall session timeout must be an adjustable parameter with
        a default value of 45 to 50 seconds.
 
      Intentional talkoff can be induced by playing loud music into the
      coin telephone by doing this one hopes to get the detectors to produce
      too many talkoff clusters.  A talkoff cluster is a group of talkoffs
      occurring within any 5-minute interval.  Single quarter or dollar
      talkoffs are also included in this definition of a cluster.  In order
      to combat this the following measures are being taken.
 
      o Total talkoffs must not exceed 12 dollars in 70 hours of continuous
        speech or music at a volume level of 0 vu referred to 0 TLP or,
        instead, at an active speech level of +1 dBm0.
 
      o The detector must not produce more than 12 talkoff clusters that
        exceed 20, or 40, or 95 cents in 70 hours of continuous speech or
        music at a volume level of 0vu referred to 0 TLP or, instead, at
        an active speech level of +1 dBm0.
 
      o Total talkoffs must not exceed 2 dollars in 200 hours of continuous
        speech or music at -17 vu referred to 0 TLP or, instead, at an active
        speech level of -16 dBm0.
 
 
Coin-Operated Telephone Fraud
- ------------- --------- -----
 
Fraud is possible by acoustically coupling accurate coin deposit
signals into the mouthpiece of the originating coin telephone, or
>from the called party end.  Fraudulent signals coming from the
coin telephone end can only be stopped within the coin telephone
with a notch filter to filter out any external fraudulent signals.
 
In order to combat Fraudulent usage the following will be enacted.
 
      o End- or tandem-office switching systems will be equipped with
        detectors that monitor signals from the originating coin line.
 
The following methods combat far-end fraud:
 
      o Sensing the direction of received coin signals and only
        registering those coming from the coin line.
 
      o Increasing the trans-hybrid path loss (using echo cancelers to
        knock down the fraudulent signal's signal strength to that under
        the detector's recognition threshold.)
 
      o Inserting a 2200-Hz notch filter in the voice transmission path
        from the far end only when the detector is expecting coin deposits.
        The filters 3 dB bandwidth must be less than 600 Hz centered on
        2200 Hz. and the out-of-band attenuation below 1500 Hz and above
        3000 Hz must be less than 1 dB.
 
 
Conclusion
- ----------
 
The BOCs are now taking action against 'Redboxing' as well as
against some of their own equipment defects.  It was only a matter
of time, of course.  I have no idea how long this conversion will
take or even if it has started.  There has been some indication
as some start of an anti-fraud campaign in my local area.  I have
gotten word from some people that coin operated telephones have
not been accepting tones.  I am unaware if these machines were
BOC operated or if they were COCOTS.  I believe them to be BOC
coin operated telephones.
 
- -----------------------------------------------------------------
 
Brian Oblivion can be reached at Oblivion@ATDT.ORG.  RDT welcomes
any questions or comments you may have -- especially any new
information you may have.


 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -




                  /\
           /\    /  \
__________/  \  /    \    ____________________________________________________
              \/      \  /
                       \/

                    Law Enforcement Surveillance Scanning

                                by Sterling
                                                     /\
                                              /\    /  \
 ____________________________________________/  \  /    \    _________________
                                                 \/      \  /
                                                          \/



     Now days it seems that Big Brother is always listening in.  Wherever you
are, whatever you do, there is a good chance that your private conversations
aren't so private.  The FBI, Secret Service, DEA, local police, and dozens of
other government agencies are definitely interested in what you have to say.
What can we do about this?  Well, unfortunately they have the badges and the
guns, so we may as well get used to it.  Since we can't beat'em, might as well
enjoy it, understand it, and learn something from it.


Mikes and Bugs
~~~~~~~~~~~~~~
     Most FCC legal devices are found in the 150 to 174 MHz band, and other,
limited parts of the 40 to 952 MHz range.  Here is a list of FCC approved bands
for wireless mike, room bugs, and body mikes.  Also note that other bands MAY
be used with special FCC permission.  (An "*" indicates a band that may be used
by vehicle tracking transmitters.  More on that later)

 42.02  to  42.94  MHz
 44.62  to  46.58  MHz
 47.02  to  47.50  MHz
 72.00  to  76.00  MHz
150.995 to 151.49  MHz *
153.74  to 154.445 MHz *
154.635 to 156.25  MHz *
157.05  to 157.11  MHz
158.715 to 159.645 MHz
166.25  to ------  MHz
170.15  to 173.40  MHz
453.05  to 453.95  MHz
458.05  to 458.95  MHz
460.025 to 460.625 MHz
462.95  to 462.975 MHz
465.025 to 465.625 MHz
467.95  to 467.975 MHz
470.00  to 512.00  MHz
821.00  to 824.00  MHz
866.00  to 869.00  MHz


     If the purpose of the surveillance is not going to be used for criminal
prosecution,  agencies are reported to work outside of FCC restrictions to
avoid detection.  Though the FCC declares them illegal, devices have been
found that work in the government, TV broadcast, and even aero bands.  The
following areas of the spectrum are known to be used on occasion:

 73.00 to  74.6 MHz
137.00 to 138.00 MHz
216.00 to 222.00 MHz
400.00 to 406.10 MHz
608.00 to 614.00 MHz


Surveillance Repeaters
~~~~~~~~~~~~~~~~~~~~~~
Law enforcement agencies use mobile repeaters and extenders to retransmit comms
of interest.  These low power (about 15 watts) repeaters are usually located in
patrol cars.  This allows the officer to monitor the surveillance device from
outside his car via portable handheld transceiver.  These are often simply
little used channels of their normal assigned bands.  Surveillance mobile
repeaters are still quite weak, so if you can hear it, it's probably close by!
(under your bed ?!)  Here is a list of mobile repeaters used by state
enforcement agencies:

                         Mobile Repeaters (Extenders)
- ------------------------------------------------------------------------------
State                  Frequency         Comments                             
- ------------------------------------------------------------------------------

Alabama                - - - -           May equip in the future
Arizona                155.505           15% equipped; no more planned
Arkansas               154.785           Fully equipped
California             154.905           Fully equipped
Colorado               - - - -           May equip in the future
Connecticut            154.83            40% equipped
Delaware               465.475           Fully equipped
                       460.50            Alternate frequency
Florida                465.1625          Fully equipped
                       156.18            Turnpike frequency
Georgia                458.4875          Fully equipped
Idaho                  - - - -           May be equipped
Illinois               155.505           Fully equipped
                       151.16            Dept. of Criminal Investigation
Indiana                155.445           Fully equipped
Iowa                   453.625           Fully equipped
Kansas                 154.92            Fully equipped
Kentucky               154.665           Fully equipped
Louisiana              453.45            Fully equipped
Maine                  460.225           Some cars equipped
Maryland               155.73            Fully equipped
Massachusetts          154.92            About 40% of cars equipped
Michigan               154.695           Over half of cars equipped
Minnesota              458.25            Fully equipped
                       453.25            Minneapolis
Mississippi            158.97            Fully equipped
Missouri               154.905           Fully equipped
Montana                - - - -           May or will be equipped
Nebraska               465.525           Fully equipped
Nevada                 154.92            Fully equipped
New Hampshire          - - - -           May be equipped
New Jersey             - - - -           Not now equipped
New Mexico             460.15            Fully equipped
                       465.15            Alternate frequency
New York               - - - -           Not now equipped
North Carolina         155.445           Fully equipped, freqs. vary by area
                       154.68            Alternate frequency
                       154.92            Alternate frequency
                       159.21            Alternate frequency
North Dakota           453.45            Partially equipped
Ohio                   465.55            Northern areas
                       465.375           Southern areas
                       465.425           Some units
                       465.525           Turnpike units
Oklahoma               154.905           Fully equipped (?)
                       465.0125          Alternate frequency
                       465.1625          Alternate frequency
                       465.3875          Alternate frequency
                       465.5625          Alternate frequency
Oregon                 - - - -           May be equipped or soon will
Pennsylvania           154.755           Fully equipped
Rhode Island           - - - -           May have future plans
South Carolina         154.445           Some or all cars equipped
South Dakota           453.375           Some cars equipped
Tennessee              154.905           Fully equipped
Texas                  - - - -           Not now equipped
Utah                   - - - -           May have future plans
Vermont                - - - -           May have future plans
Virginia               453.35            Fully equipped
Washington             453.475           Some cars equipped
                       453.975           Alternate frequency
West Virginia          155.505           May be equipped, or soon will
Wisconsin              465.125           Fully equipped
Wyoming                - - - -           May be equipped, or soon will


Vehicle Tracking Transmitters
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     Enforcement agencies often need to track suspect vehicles, cargo
shipments, or packages.  Tiny transmitters are used that emit a quarter second
beep once each second.  Some contain motion detectors that beep once every ten
seconds when not in motion.  This saves battery life and of course provides
some information as to the status of the tagged object.  Vehicles used for
tracking these transmitters are easy to spot.  Look for four identical
antennas mounted in a square configuration.  (Hmm, that pizza-van has been
parked across the street for over four days!)


Remote Control Surveillance
~~~~~~~~~~~~~~~~~~~~~~~~~~~
     Some transmitters can be set for remote control operation.  That way they
can be turned off during times of inactivity to conserver power.  They can also
be turned off to avoid detection during countersurveillance sweeps to avoid
detection.  Look for these types of systems in the 72.01 to 72.99 MHz and 75.99
MHz bands (20 kHz steps).  Some are thought to operate in the 300 to 350 MHz
band as well.

 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -



   (T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)
    (T)                                                                (W)
    )R(                      TRW Business Reports                      )R(
    (W)                                                                (T)
    )R(                           by HiBias                            )R(
    (T)                                                                (W)
   (T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)(T)(R)(W)



TRW keeps tabs on the financial standing of businesses, both big and small.
Just about everyone from AT&T to Billy-Bud's Bait Shop is referenced in their
files.  Just exactly what kind of information do they have?  What kind of data
do they give to creditors.  Exactly what kind of things could reflect
negatively on your credit standing?  Following is a sample of a typical TRW
business report and a sample small business advisory report.  These will show
the type of information that TRW hands out to creditors and how they interpret
said information.


TRW SAMPLE REPORT
~~~~~~~~~~~~~~~~~

PAGE  RPT DATE      TIME        PORT        TYPE
  1   03-02-90    08:40:13      BC99       PROFILE        219
- --------------------------------------------------------------------------------
SAMPLE COMPANY                        TRW FILE NUMBER: 000000001                
1000 MAIN STREET                      TRW FILE ESTABLISHED: PRIOR JAN 1977      
ANYTOWN USA 11111                     SIC NO: 0000                              
PHONE: 714-555-1212                   BUS: SELLING GOODS TO AMERICA             
- --------------------------------------------------------------------------------
                           EXECUTIVE SUMMARY                                    
                           -----------------                                    
 DAYS BEYOND TERMS (DBT) FOR SAMPLE COMPANY                                     
      AS OF 03-02-90     : DBT IS THE AVERAGE NUMBER OF DAYS LATE A FIRM TAKES  
      PREDICTION         : TO PAY ITS BILLS. THE DBT IS WEIGHTED BY THE DOLLAR  
                           AMOUNT OF EACH ACCOUNT. THE PREDICTION IS A FORECAST 
      DBT NORMS            OF THE DBT FOR 60 DAYS INTO THE FUTURE. IT IS BASED  
      SAMPLE CO INDUSTRY : ON THE TREND IN DBT, THE TYPE OF INDUSTRY OF THE     
      ALL INDUSTRIES     : FIRM, ANY DEROGATORY PUBLIC RECORD INFORMATION,      
                           COLLECTION ACCOUNTS, # OF INQUIRIES, YEARS IN        
                           BUSINESS/FILE, ETC. THE INDUSTRY INFORMATION IS      
                           PROVIDED TO EVALUATE HOW THIS FIRM PAYS TODAY        
                           RELATIVE TO FIRMS IN THE SAME INDUSTRY (AT THE 2     
                           DIGIT SIC LEVEL).                                    
                           CONTINUOUS AND NEWLY REPORTED TRADELINES ARE USED FOR
                           THE DBT VALUES. A SUMMARY WILL ONLY BE PROVIDED WHEN 
                           THERE IS SUFFICIENT DATA.                            
 HISTORICAL PAYMENT GUIDE                                                       
      6 MONTH ACCOUNT BALANCE RANGE : THIS LINE INDICATES THE TOTAL AMOUNT OWED 
                           BY THE FIRM FOR THE PAST 6 MONTHS AND THE CURRENT    
                           TOTAL.                                               
      HIGHEST CREDIT AMOUNT EXTENDED: THIS LINE INDICATES THE LARGEST INDIVIDUAL
                           AMOUNT OF CREDIT EXTENDED TO THE FIRM IN THE PAST 12 
                           MONTHS AND THE MEDIAN AMOUNT (IE THAT VALUE IN WHICH 
                           50% OF THE ACCOUNTS ARE GREATER AND 50% ARE LOWER).  
                           THE PURPOSE IS TO COMPARE THE CURRENT CREDIT REQUEST 
                           TO THESE AMOUNTS TO DETERMINE THE CREDIT GRANTOR'S   
                           RELATIVE RISK.                                       
     INDUSTRY PAYMENT COMPARISON    : THIS LINE REPRESENTS THE CONCLUSION FROM A
                           COMPARISON OF THE 6 MONTH HISTORICAL DBT OF THE FIRM 
                           TO ITS INDUSTRY. THREE POSSIBLE CONCLUSIONS CAN BE   
                           MADE: A FIRM PAYS "THE SAME", "LATER THAN", OR       
                           "SOONER THAN" RELATED BUSINESSES. TO CONCLUDE A FIRM 
                           PAYS LATER OR SOONER, 4 OUT OF 6 MONTHS MUST DEVIATE 
                           FROM AT LEAST 50% OF THE FIRMS IN THE INDUSTRY.      
     PAYMENT TREND INDICATION       : THIS LINE PROVIDES THE CONCLUSION FROM AN 
                           ANALYSIS OF HOW THE PAYMENT BEHAVIOR OF THE FIRM IS  
                                                                                
                                                                                
                                                                                
PAGE  RPT DATE      TIME        PORT        TYPE                                
  2   03-02-90    08:40:13      BC99       PROFILE        219                   
- ------------------------------------------------------------------------------- 
SAMPLE COMPANY                        TRW FILE NUMBER: 000000001                
- ------------------------------------------------------------------------------- 
      PAYMENT TREND INDICATION (CONTINUED)                                      
              CHANGING IN THE PAST 6 MONTHS. FOR A TREND TO OCCUR, AT LEAST THE 
              MOST RECENT TWO MONTHS OF DBT MUST DEVIATE FROM 70% OF THE NORMAL 
              HISTORICAL RANGE OF DBT'S.                                        
              FOUR POSSIBLE CONCLUSIONS CAN BE MADE: THE FIRM IS "IMPROVING     
              TOWARD TERM REQUIREMENTS ","INCREASINGLY LATE", "STABLE" OR       
              OR "NO TREND IDENTIFIABLE".                                       
                                                                                
 SIGNIFICANT PUBLIC RECORD DATA                                                 
 THIS SECTION SUMMARIZES REPORTED PUBLIC RECORD OR OTHER DEROGATORY             
 INFORMATION IN THE FOLLOWING WAYS:                                             
   1) BANKRUPTCY FILINGS WITHIN THE PAST 10 YEARS.                              
   2) OPEN TAX LIENS/JUDGEMENTS REGARDLESS OF THE AMOUNT OF THE LIEN,           
      OR ANY FILING RELEASED WITHIN THE PAST 5 YEARS.                           
   3) A SUMMARY OF THE NUMBER OF UCC FILINGS WITH ONE OR MORE OF THE            
      FOLLOWING PLEDGED COLLATERAL:                                             
        -ACCOUNTS                                                               
        -ACCOUNTS RECEIVABLE                                                    
        -INVENTORY                                                              
        -CONTRACTS                                                              
        -HEREAFTER ACQUIRED PROPERTY                                            
        -PROCEEDS                                                               
        -LEASES                                                                 
        -NOTES RECEIVALBE                                                       
    4) REPORTED COLLECTION ACCOUNTS.                                            
    5) FRAUDULENT TELECOMMUNICATIONS ACCOUNTS THAT ARE REPORTED AS              
       SERVICE DISCONNECTS, WRITE-OFFS, SKIPS, ETC.                             
 IF NO PUBLIC RECORD DATA IS REPORTED, THEN IT WILL BE STATED.                  
 RELEVANT DATES AND AMOUNTS WILL BE INCLUDED.                                   
                                                                                
                          TRADE PAYMENT INFORMATION                             
                          -------------------------                             
                                                                                
                          TRADE PAYMENT EXPERIENCES                             
       (TRADE LINES WITH AN "*" AFTER DATE REPORTED ARE NEWLY REPORTED)         
                                                                                
                                 RECENT  ------ ACCOUNT STATUS ------           
                                  HIGH                -DAYS PAST DUE-           
 BUSINESS   DATE  LAST  PAYMENT  CREDIT   BALANCE     1-  31- 61-               
 CATEGORY   REP'D SALE   TERMS      $        $    CUR 30  60  90  91+ COMMENTS  
 ---------- ----- ----- ------- -------- -------- --- --- --- --- --- ----------
 THIS SECTION PROVIDES THE DETAILED ACCOUNT RECEIVABLE INFORMATION FOR THE FIRM 
 INQUIRED UPON. ONLY THOSE ACCOUNTS THAT ARE CONTINUOUSLY REPORTED OR NEWLY     
                                                                                
                                                                                
                                                                                
PAGE  RPT DATE      TIME        PORT        TYPE                                
  3   03-02-90    08:40:13      BC99       PROFILE        219                   
- ------------------------------------------------------------------------------- 
SAMPLE COMPANY                        TRW FILE NUMBER: 000000001                
- ------------------------------------------------------------------------------- 
                     TRADE PAYMENT EXPERIENCES (CONTINUED)                      
                                                                                
 REPORTED WILL BE INCLUDED IN THIS SECTION. THEREFORE, THE CREDIT GRANTOR IS    
 EVALUATING ONLY THE MOST CURRENT TRADE INFORMATION. A CONTINUOUSLY REPORTED    
 TRADE LINE MUST BE IN THE TRW FILE FOR AT LEAST SIX MONTHS AND UPDATED AT LEAST
 ONCE IN THE PAST THREE MONTHS. A NEWLY REPORTED TRADE LINE HAS BEEN ADDED TO   
 THE FILE WITHIN THE LAST 3 MONTHS. EACH TRADELINE REPRESENTS A UNIQUE CREDIT   
 EXPERIENCE.                                                                    
 ------------------------------ -------- -------- --- --- --- --- --- ----------
 TRADE LINE TOTALS:                                                   DBT: (THE 
                                                                SAME AS REPORTED
                                                                 IN THE SUMMARY)
                                                                                
                        ADDITIONAL PAYMENT EXPERIENCES                          
       (INCLUDES NON-TRADE ACCOUNTS PLUS PREVIOUSLY REPORTED TRADE LINES)       
                                                                                
 THIS SECTION WILL CONTAIN THOSE ACCOUNTS THAT REPRESENT PAYMENT INFORMATION,   
 BUT DO NOT BEHAVE THE SAME AS A TRADE CREDIT ACCOUNT (IE THE ACCOUNT TYPE AND  
 THE REPORTED DATA BEHAVES DIFFERENTLY THAN A TRADE ACCOUNT). FOR EXAMPLE, A    
 LOAN WILL REFLECT THE TOTAL VALUE OF THE LOAN IN THE BALANCE INFORMATION AND   
 THE AGING DATA REFLECTS THE CURRENCY OF THE MONTHLY PAYMENT ONLY. THIS SECTION 
 INCLUDES TRADELINES NOT UPDATED BY CONTRIBUTORS WITHIN THE PAST 6 MONTHS. THE  
 DATA, HOWEVER, CAN BE USED TO IDENTIFY ANY SIGNIFICANT DEROGATORY ACCOUNTS IN  
 THE PAST.                                                                      
                                                                                
                                PAYMENT TOTALS                                  
                                                                                
                                 RECENT  ------ ACCOUNT STATUS ------           
                                  HIGH                -DAYS PAST DUE-           
                                 CREDIT   BALANCE     1-  31- 61-               
                                    $        $    CUR 30  60  90  91+ COMMENTS  
                                -------- -------- --- --- --- --- --- ----------
 CONTINUOUSLY REPORTED LINES:   THIS SECTION PROVIDES A SUMMARY OF THE TOTALS   
 NEWLY REPORTED LINES:          FOR THE TWO TRADELINE TYPES. IT CAN BE USED TO  
                                EVALUATE HOW MUCH THE NEW INFORMATION MAY EFFECT
                                CONCLUSIONS FOR PAST PAYMENT BEHAVIOR.          
 ------------------------------ -------- -------- --- --- --- --- --- ----------
 TRADE LINE TOTALS:                                                   DBT:      
                                                                                
                                                                                
                                                                                
PAGE  RPT DATE      TIME        PORT        TYPE                                
  4   03-02-90    08:40:13      BC99       PROFILE        219                   
- ------------------------------------------------------------------------------- 
SAMPLE COMPANY                        TRW FILE NUMBER: 000000001                
- ------------------------------------------------------------------------------- 
                                PAYMENT TRENDS                                  
                 (BASED ON CONTINUOUSLY REPORTED TRADE LINES ONLY)              
                                                                                
                                                      -DAYS PAST DUE-           
                                          BALANCE     1-  31- 61-               
                            DBT              $    CUR 30  60  90  91+           
                            ---          -------- --- --- --- --- ---           
           AS OF 03-02-90   THIS SECTION EXAMINES THE NEAR TERM CHANGES IN PAY- 
                 12-01-88   MENT TRENDS. IT USES ONLY CONTINUOUSLY REPORTED     
                 11-01-88   TRADELINES IN ORDER TO PROVIDE AN INDICATION OF     
                 10-01-88   WHETHER OR NOT AN IMMEDIATE CHANGE IN PAYMENT       
                 09-01-88   BEHAVIOR IS OCCURING. THE CONCLUSION FROM THE DATA  
                 08-01-88   IS PRESENTED IN THE SUMMARY. A NEAR TERM CHANGE IN  
                 07-01-88   BEHAVIOR CAN BE DUE TO THE WILLINGNESS OR ABILITY   
                            OF THE DEBTOR TO PAY ITS OBLIGATIONS.               
                                                                                
                      PAYMENT HISTORY--QUARTERLY AVERAGES                       
            (BASED ON CONTINUOUSLY AND NEWLY REPORTED TRADE LINES)              
                                                                                
                                                      -DAYS PAST DUE-           
                                          BALANCE     1-  31- 61-               
                            DBT              $    CUR 30  60  90  91+           
                            ---          -------- --- --- --- --- ---           
       4TH-Q-89 (OCT-DEC):  THIS SECTION PRESENTS A ONE AND A QUARTER YEAR ANAL-
       3RD-Q-89 (JUL-SEP):  YSIS OF THE PAYMENT TRENDS. THE LONG TERM CHANGES IN
       2ND-Q-89 (APR-JUN):  DBT REFLECT THE ABILITY OF THE COMPANY TO GENERATE  
       1ST-Q-89 (JAN-MAR):  SUSTAINED CASH FLOW OVER TIME. IF THE DBT IS        
       4TH-Q-88 (OCT-DEC):  BECOMING SIGNIFICANTLY LARGER, IT IS LIKELY THAT THE
                            COMPANY IS LESS ABLE TO PAY.                        
                                                                                
                             PUBLIC RECORD INFORMATION                          
                             -------------------------                          
 THIS SECTION REFLECTS THE DETAIL OF BANKRUPTCY, TAX LIENS (FEDERAL, STATE,     
 AND COUNTY), JUDGEMENTS, AND UCC FILINGS FOR A PARTICULAR ENTITY. IT INCLUDES  
 THE DATE OF FILINGS, AMOUNTS, LOCATIONS, ETC.                                  
                                                                                
                         COMMERCIAL BANKING RELATIONSHIPS                       
                         --------------------------------                       
 THIS SECTION IDENTIFIES THE NAME, ADDRESS, PHONE NUMBER, AND ACCOUNT NUMBER    
 OF THE PRIMARY BANK UTILIZED BY THE BUSINESS.                                  
                                                                                
                                                                                
                                                                                
PAGE  RPT DATE      TIME        PORT        TYPE                                
  5   03-02-90    08:40:13      BC99       PROFILE        219                   
- ------------------------------------------------------------------------------- 
SAMPLE COMPANY                        TRW FILE NUMBER: 000000001                
- ------------------------------------------------------------------------------- 
                               KEY FACTS INFORMATION                            
                               ---------------------                            
 THIS SECTION TYPICALLY INCLUDES THE TYPE OF PRODUCTS/SERVICES OFFERED BY THE   
 BUSINESSES, THE NUMBER OF YEARS IN BUSINESS, THE BUSINESS OWNERSHIP AND        
 PRINCIPAL OFFICERS, ETC.                                                       
                                                                                
                                  INQUIRIES                                     
                                  ----------                                    
 BUSINESS   1990 1989                                                           
 CATEGORY   JAN  DEC  NOV  OCT  SEP  AUG  JUL  JUN  MAY                         
 ---------- ---  ---  ---  ---  ---  ---  ---  ---  ---                         
            THE INQUIRIES WILL BE SUMMARIZED BY THE BUSINESS CATEGORY AND       
            IDENTIFY THE NUMBER OF INQUIRIES EACH MONTH. THIS ALLOWS THE CREDIT 
            MANAGER TO QUICKLY DETERMINE WHERE AND WHEN THE MOST FREQUENT CREDIT
            ACTIVITY ON THE PART OF THE DEBTOR HAS BEEN OCCURING.               
                                                                                
                          FEDERAL GOVERNMENT INFORMATION                        
                          -----------------------------                         
 THIS SECTION CONTINUES TO REFLECT THE FINANCIAL AND CONTRACT DATA PROVIDED BY  
 GOVERNMENT AGENCIES (EG THE SMALL BUSINESS ADMINISTRATION).                    
                                                                                
                           STANDARD & POORS INFORMATION                         
                           ----------------------------                         
 PROVIDES FINANCIAL INFORMATION ON PUBLICLY HELD COMPANIES AS COMPILED BY       
 STANDARD AND POORS. THE INFORMATION INCLUDES:                                  
   1) THE MOST RECENT THREE YEARS OF PROFIT/LOSS STATEMENTS AND BALANCE SHEETS. 
   2) CRITICAL RATIOS OF PERFORMANCE RELATIVE TO INDUSRTY AVERAGES.             
   3) SUMMARY BUSINESS DESCRIPTION AND RECENT DEVELOPMENTS.                     
                                                                                
                                                                                
 THE INFORMATION HEREIN IS FURNISHED IN CONFIDENCE FOR YOUR EXCLUSIVE USE       
 FOR LEGIMATE BUSINESS PURPOSES AND SHALL NOT BE REPRODUCED. NEITHER            
 TRW INC, NOR ITS SOURCES OR DISTRIBUTORS WARRENT SUCH INFORMATION NOR          
 SHALL THEY BE LIABLE FOR YOUR USE OR RELIANCE UPON IT.                         
                                               COPYRIGHT (C) 1989 TRW INC.      
 **END REPORT**                                                                 




TRW SMALL BUSINESS ADVISORY SAMPLE REPORT                                       
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                                                                                
PAGE  RPT DATE      TIME        PORT        TYPE                                
  1   03-02-90    08:40:13      BC99        SBAR          219                   
- --------------------------------------------------------------------------------
 PRINCIPAL NAME/ADDRESS    BUSINESS NAME/ADDRESS   EMPLOYER NAME/ADDRESS        
- --------------------------------------------------------------------------------
 JOHN Q PROPRIETOR         PROPRIETOR CO           AJAX HARDWARE                
 10655 BIRCH ST            604 BAKER ST            2035 BROADWAY                
 BURBANK CA 91501          STUDIO CITY CA 90485    LOS ANGELES CA 90019         
                                                                                
 LAST UPDATE 12-89         AS ACCESSED 03-90       LAST UPDATE 06-88            
- --------------------------------------------------------------------------------
                                                                                
                                  RISK PROFILE                                  
                                  ------------                                  
                                                                                
 CHANCE OF ACCOUNT ENTERING SERIOUSLY DEROGATORY STATUS WITHIN 1 YEAR:  3%      
                                                                                
 THE PERCENTAGE ABOVE IS CALCULATED BY THE NATIONAL RISK MODEL, WHICH USES A    
 POINT-SCORING SYSTEM THAT ADDS OR SUBTRACTS POINTS BASED ON A PROPRIETOR'S     
 CREDIT BEHAVIOR. THE MODEL ONLY EXAMINES INFORMATION THAT APPEARS ON A         
 PROPRIETOR'S SBAR REPORT, AND DOES NOT TAKE INTO ACCOUNT OTHER DATA, SUCH AS   
 THE PROPRIETOR'S INCOME OR NET WORTH.                                          
                                                                                
 THE PERCENTAGE, REFERRED TO AS A PROBABILITY PERCENTAGE, INDICATES THE         
 LIKELIHOOD OF A PROPRIETOR BECOMING DEROGATORY IN HIS PAYMENT HABITS.          
 DEROGATORY CREDIT BEHAVIOR CAN BE DEFINED AS MAINTAINING ACCOUNTS THAT HAVE    
 DEVELOPED INTO COLLECTION ACCOUNTS, REPOSSESSIONS, CHARGE-OFFS OR BANKRUPTCIES.
                                                                                
 THE PERCENTAGES RANGE FROM 0% TO 100%. AS INDICATED ON THE SBAR, APPROXIMATELY 
 85% OF ALL PROPRIETORS HAVE A 0%-15% CHANCE OF BECOMING SERIOUSLY DEROGATORY   
 WITHIN 1 YEAR; 12% HAVE A 16%-49% CHANCE; AND 3% HAVE A 50%-100% CHANCE.       
                                                                                
 IN GENERAL, PROPRIETORS WITH A PROBABILITY PERCENTAGE OF 0%-15% ARE A GOOD     
                                                                                
 RISK; THOSE WITH A PERCENTAGE OF 16%-49% ARE A MEDIUM RISK; AND PERCENTAGES OF 
 50%-100% INDICATE A POOR RISK.                                                 
                                                                                
 YOU MAY WANT TO IDENTIFY SEVERAL RANGES OF PERCENTAGES THAT YOU CONSIDER TO BE 
 GOOD, MEDIUM, AND POOR RISKS, BASED ON HOW MUCH RISK YOU ARE WILLING TO TAKE   
 IN EXTENDING CREDIT.                                                           
                                                                                
                                                                                
PAGE  RPT DATE      TIME        PORT        TYPE                                
  2   03-02-90    08:40:13      BC99        SBAR          219                   
- --------------------------------------------------------------------------------
 PRINCIPAL NAME/ADDRESS    BUSINESS NAME/ADDRESS   EMPLOYER NAME/ADDRESS        
- --------------------------------------------------------------------------------
 JOHN Q PROPRIETOR         PROPRIETOR CO           AJAX HARDWARE                
 10655 BIRCH ST            604 BAKER ST            2035 BROADWAY                
 BURBANK CA 91501          STUDIO CITY CA 90485    LOS ANGELES CA 90019         
                                                                                
 LAST UPDATE 12-89         AS ACCESSED 03-90       LAST UPDATE 06-88            
- --------------------------------------------------------------------------------
                                                                                
 STATUS CHARACTERISTICS                                                         
                                                                                
 STATUS CHARACTERISTICS DEFINE THE SPECIFIC CONDITIONS WHICH CONTRIBUTE TO A    
 PROPRIETOR'S PROBABILITY PERCENTAGE. ONE TO FOUR CHARACTERISTICS ARE DISPLAYED 
 ON THE SBAR IN ORDER OF IMPORTANCE, AND GIVE YOU ADDITIONAL INSIGHT INTO A     
 PROPRIETOR'S PERSONAL CREDIT HISTORY.                                          
                                                                                
 FOR PROBABILITY PERCENTAGES OF 16%-100%, THE STATUS CHARACTERISTICS ARE A      
 SIGNIFICANT INDICATOR OF WHY THE PERCENTAGE IS HIGH. FOR PERCENTAGES OF 0%-15%,
 THE CHARACTERISTICS ARE NOT A SIGNIFICANT INDICATOR, AND SHOULD NOT CARRY MUCH 
 WEIGHT IN YOUR CREDIT-GRANTING DECISION.                                       
                                                                                
 TO HELP YOU BETTER UNDERSTAND AND INTERPRET THE MEANING OF THE STATUS CHAR-    
 ACTERISTICS, A "GLOSSARY OF STATUS CHARACTERISTICS" IS INCLUDED IN THE SBAR    
 BROCHURE AVAILABLE FROM YOUR ACCOUNT EXECUTIVE.                                
                                                                                
                                ACCOUNT PROFILES                                
                                ----------------                                
                                                                                
 PROPRIETORS' ACCOUNTS ARE DIVIDED INTO 3 CATEGORIES: NEGATIVE, POSITIVE, AND   
 NEUTRAL. EACH TRADE LINE IN THE ACCOUNT PROFILE CONTAINS THE BUSINESS CATEGORY 
 OF THE COMPANY THAT CONTRIBUTED THE INFORMATION; THE DATE THE INFORMATION WAS  
 REPORTED; AND THE STATUS OF THE ACCOUNT.                                       
                                                                                
 THE TRADE LINE MAY ALSO INCLUDE: THE DATE THE ACCOUNT WAS OPENED; TYPE AND     
 TERMS OF LOAN; ORIGINAL LOAN AMOUNT; CREDIT LIMIT; HISTORICAL HIGH BALANCE;    
 BALANCE DUE; SCHEDULED MONTHLY PAYMENT; AMOUNT PAST DUE; DATE LAST PAYMENT WAS 
 MADE; TRANSACTION RELATIONSHIP; COMMENTS.                                      
                                                                                
 ACCOUNT PROFILES PROVIDE YOU WITH DETAILED INFORMATION ABOUT A PROPRIETOR'S    
 PERSONAL CREDIT PORTFOLIO.                                                     
                                                                                
                                                                                
                                                                                
PAGE  RPT DATE      TIME        PORT        TYPE                                
  3   03-02-90    08:40:13      BC99        SBAR          219                   
- --------------------------------------------------------------------------------
 PRINCIPAL NAME/ADDRESS    BUSINESS NAME/ADDRESS   EMPLOYER NAME/ADDRESS        
- --------------------------------------------------------------------------------
 JOHN Q PROPRIETOR         PROPRIETOR CO           AJAX HARDWARE                
 10655 BIRCH ST            604 BAKER ST            2035 BROADWAY                
 BURBANK CA 91501          STUDIO CITY CA 90485    LOS ANGELES CA 90019         
                                                                                
 LAST UPDATE 12-89         AS ACCESSED 03-90       LAST UPDATE 06-88            
- --------------------------------------------------------------------------------
                                                                                
                            NEGATIVE ACCOUNT PROFILE                            
                            ------------------------                            
                                                                                
 THIS SECTION PROVIDES YOU WITH ALL OF THE NEGATIVE TRADE LINES THAT APPEAR ON  
 THE PROPRIETOR'S REPORT. THESE INCLUDE TRADE LINES THAT HAVE STATUSES SUCH AS  
 DELINQUENT, REPOSSESSED, WRITE-OFF, CHARGED TO LOSS, BANKRUPT, ETC.            
                                                                                
                            POSITIVE ACCOUNT PROFILE                            
                            ------------------------                            
                                                                                
 THIS SECTION PROVIDES YOU WITH ALL OF THE POSITIVE TRADE LINES THAT APPEAR ON  
 THE PROPRIETOR'S REPORT. IN GENERAL, THESE TRADE LINES ARE EITHER CURRENT      
 ACCOUNTS THAT ARE BEING PAID ACCORDING TO TERMS, OR ACCOUNTS THAT HAVE BEEN    
 CLOSED AND WERE PAID IN SATISFACTORY TERMS.                                    
                                                                                
                            NEUTRAL ACCOUNT PROFILE                             
                            -----------------------                             
                                                                                
 THIS SECTION PROVIDES YOU WITH ALL OF THE NEUTRAL TRADE LINES THAT APPEAR ON   
 THE PROPRIETOR'S REPORT. THESE TRADE LINES INCLUDE ONES HAVE BEEN DELINQUENT   
 AT ONE TIME, BUT ARE NOW CURRENT.                                              
                                                                                
                             PUBLIC RECORD PROFILE                              
                             ---------------------                              
                                                                                
 THE PUBLIC RECORD PROFILE ENABLES YOU TO LEARN ABOUT WHAT TYPES OF LEGAL       
 ACTIONS HAVE BEEN FILED AGAINST THE PROPRIETOR, SUCH AS BANKRUPTCIES, FEDERAL  
 STATE, AND COUNTY TAX LIENS, JUDGEMENTS, AND SUITS.                            
                                                                                
                                                                                
                                                                                
PAGE  RPT DATE      TIME        PORT        TYPE                                
  4   03-02-90    08:40:13      BC99        SBAR          219                   
- --------------------------------------------------------------------------------
 PRINCIPAL NAME/ADDRESS    BUSINESS NAME/ADDRESS   EMPLOYER NAME/ADDRESS        
- --------------------------------------------------------------------------------
 JOHN Q PROPRIETOR         PROPRIETOR CO           AJAX HARDWARE                
 10655 BIRCH ST            604 BAKER ST            2035 BROADWAY                
 BURBANK CA 91501          STUDIO CITY CA 90485    LOS ANGELES CA 90019         
                                                                                
 LAST UPDATE 12-89         AS ACCESSED 03-90       LAST UPDATE 06-88            
- --------------------------------------------------------------------------------
                                                                                
                        PUBLIC RECORD PROFILE (CONTINUED)                       
                        ---------------------------------                       
                                                                                
 EACH PUBLIC DATA ENTRY INCLUDES THE TYPE OF LEGAL ACTION FILED, DATE FILED,    
 COURT NAME, COURT CODE, DOCKET NUMBER, AMOUNT, AND JUDGEMENT CREDITOR.         
                                                                                
                                   INQUIRIES                                    
                                   ---------                                    
                                                                                
 THE INQUIRY SECTION INCLUDES INFORMATION ABOUT INQUIRIES MADE ON THE PROPRIETOR
 IN THE PAST 24 MONTHS. THIS TELLS YOU HOW OFTEN THE PROPRIETOR HAS REQUESTED   
 CREDIT IN THE PAST YEAR, AND THE TYPES AND NUMBER OF COMPANIES THAT HAVE       
 REQUESTED CREDIT INFORMATION ON HIM.                                           
                                                                                
 INQUIRIES INCLUDE THE BUSINESS CATEGORY OF THE COMPANY MAKING THE INQUIRY AND  
 THE DATE OF THE INQUIRY, AND MAY INCLUDE THE TYPE, TERMS, AND AMOUNT OF THE    
 LOAN OR CREDIT LINE.                                                           
                                                                                
                           FILE VARIATION REFERENCES                            
                           -------------------------                            
                                                                                
 FILE VARIATIONS CAN BE DEFINED AS INFORMATION ABOUT THE PROPRIETOR CONTAINED   
 IN TRW'S FILE UNDER A DIFFERENT NAME, ADDRESS, OR SOCIAL SECURITY NUMBER       
 THAN WHAT YOU ENTERED DURING THE INQUIRY PROCESS.                              
                                                                                
 USUALLY, NAME VARIATIONS ARE EITHER MISPELLINGS OR MAIDEN NAMES; ADDRESS       
 VARIATIONS ARE DEVIATIONS SUCH AS "STREET" INSTEAD OF "DRIVE", OR THE          
 PROPRIETOR'S PREVIOUS ADDRESS; AND SOCIAL SECURITY NUMBER VARIATIONS ARE       
 ONE OR TWO DIGIT TYPO MISTAKES.                                                
                                                                                
 IN A SMALL NUMBER OF CASES, HOWEVER, THE INFORMATION IN THE FILE VARIATION     
 SECTION MAY SIGNIFICANTLY CONFLICT WITH WHAT THE PROPRIETOR HAS GIVEN YOU,     
 AND YOU MAY FIND THAT A MORE THOROUGH REVIEW OF THE PROPRIETOR IS NECESSARY.   
                                                                                
                                                                                
                                                                                
PAGE  RPT DATE      TIME        PORT        TYPE                                
  5   03-02-90    08:40:13      BC99        SBAR          219                   
- --------------------------------------------------------------------------------
 PRINCIPAL NAME/ADDRESS    BUSINESS NAME/ADDRESS   EMPLOYER NAME/ADDRESS        
- --------------------------------------------------------------------------------
 JOHN Q PROPRIETOR         PROPRIETOR CO           AJAX HARDWARE                
 10655 BIRCH ST            604 BAKER ST            2035 BROADWAY                
 BURBANK CA 91501          STUDIO CITY CA 90485    LOS ANGELES CA 90019         
                                                                                
 LAST UPDATE 12-89         AS ACCESSED 03-90       LAST UPDATE 06-88            
- --------------------------------------------------------------------------------
                                                                                
                      FILE VARIATION REFERENCES (CONTINUED)                     
                      -------------------------------------                     
                                                                                
 YOU CAN SEE WHICH TRADE LINES, PUBLIC RECORD DATA, AND INQUIRIES ARE           
 ASSOCIATED WITH SPECIFIC FILE VARIATIONS IN TRW'S FILE BY MATCHING THE FILE    
 VARIATION REFERENCES IN THE BODY OF THE REPORT TO THE ONES CONTAINED IN THE    
 FILE VARIATION REFERENCE SECTION.                                              
                                                                                
                               CONSUMER STATEMENT                               
                               ------------------                               
                                                                                
 CONSUMERS MAY ADD EXPLANATIONS TO THEIR CREDIT REPORTS IN ACCORDANCE WITH THE  
 FAIR CREDIT REPORTING ACT AND STATE REPORTING LAWS. THESE STATEMENTS APPEAR AT 
 THE END OF THE REPORT.                                                         
                                                                                
 THE INFORMATION CONTAINED IN THIS SMALL BUSINESS ADVISORY REPORT IS            
 FURNISHED IN CONFIDENCE AND MUST BE USED EXCLUSIVELY FOR LEGITIMATE            
 COMMERCIAL CREDIT PURPOSES. THE INFORMATION SHALL NOT BE REPRODUCED.           
 NEITHER TRW INC., NOR ITS SOURCES OR DISTRIBUTORS WARRANT SUCH                 
 INFORMATION NOR SHALL THEY BE LIABLE FOR YOUR USE OR RELIANCE UPON IT.         
                                               COPYRIGHT (C) 1990 TRW INC.      
 **END SMALL BUSINESS ADVISORY REPORT**                                         

 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -





[#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#]
  [#]                                                                 [#]
 [#]              Building a Garage Door Opener Hacker                 [#]
  [#]                                                                 [#]
 [#]                        by Black Manta                             [#]
  [#]                                                                 [#]
[#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#] [#]



Garage door openers employ a DIP switch that the owner sets to his own
personal "code".  The code is actually just a binary number created by the
on/off positions of the switch.  The device discussed here will enable you to
open any automatic garage door (aside from some of the new dual switch models).

The opener employs a 555 timer as a pulse generator to transmit pulses to a
binary counter.  Each pulse will increment the binary counter by one.  You can
adjust the speed of the counting by turning R1.  You will have to experiment to
find the best speed.  If it is too fast, the signal will not be long enough to
open the door.  Normally, about 2.5 minutes to complete all 1024 combinations.

As you hit the switch, it will begin counting up, lighting the leds for the
corresponding switches as it turns each on. This will serve as a reference so
that you can set any opener to.

To connect to the garage door opener, first desolder the DIP switches from the
door opener and solder an IC socket into where the DIP switches were.  (This
will allow you to put the DIP switches back, when operating in normal mode.)
Second, you should connect the output to a wirewrap IC socket.  If you mount
the IC socket on your pc or perfboard you can use the socket to plug right into
the door opener.  When connecting the output, be sure that the connections on
the wirewrap socket correspond to the ON setting of the DIP switches.


Parts List
~~~~~~~~~~
Resistors
     R1 - PC mount 100k potentiometer
     R2 - 1k ohm 1/4 watt

Capacitors
     C1 - 22MFD

Integrated Circuits
     IC1 - 555CP Timer
     IC2 - CD4040BE 12 stage binary counter

Misc Parts
     LED1 - 10 Light Emitting Diodes
     S1 - Normally Closed Momentary Push Button Switch
     Perfboard
     9V Battery



10 leds going to the 10 pins of the dip switch

Dip Switch Assemblies (2 of 10 shown)

 |------+----------------------------------+--------->>> to ground
        |                                  |
        |                                  |
       led                                led          etc......
        |                                  |
        |                                  |
        +-----> to dip switch #            +-----> to dip switch #
        |                                  |
        |                                  |
        +-----> to IC2 pin #               +-----> to IC2 pin #


Wire in IC2 through the assemblies as follows.

>From IC2 pin            To Dip Switch Assembly
~~~~~~~~~~~~            ~~~~~~~~~~~~~~~~~~~~~~
     2                          6
     3                          5
     4                          7
     5                          4
     6                          3
     7                          2
     9                          1
    12                          9
    13                          8
    14                         10


>From IC2 pin                    To
~~~~~~~~~~~~            ~~~~~~~~~~~~~~~~~~~~~~
     1                        Not Used
     10                      IC1-pin #3
     15                       Not Used 
     16                         + 9V



The remaining components and remaining pins of IC2 hook up as follows:


>from IC2 pin #8-----+-----(S1)---->to IC2 pin #11
                    |
                    |                to +9V
                    |                  |
                    |                  +---------------+------+
                    |                  |               |      |
                    |             IC1 pin 8       IC1 pin 4   R1
                    |                                         |
                    |                             IC1 pin 7---+
                    |                                         |
                    |                                         R2
                    |                                         |
                    |                             IC1 pin 6   |
                    |                                   |     |
                    |                                   +-----+
                    |                                   |     |
                    |            to IC1 pin 1     IC1 pin 2   C1
                    |                 |                       |
                    +-----------------+-----------------------+
                                      |
                                      +-->>> to ground



 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -




 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 +                         Air Fone Frequency Allocation                      +
 +                                                                            +
 +                   Based on information from Leroy Donnelly                 +
 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

 
Ever wonder just what those trendy jet-setters talk about on their in-flight
air to ground radiotelephones?  The FCC has issued rules on allocation of the
849-851/894-895 MHz bands for air-ground radiotelephone service.  Using this
information it is quite easy for ANYONE with a scanner to intercept these
calls.  Nothing that is said over the air should be considered secure.
Competiters, enemies, and the news media could be tuning in on "private" 
conversations at any time.  Here is the information on how it is all set up.
 
The new action (effective as of September 9, 1991)
 
     1) changes channel spacing from GTE Airfone Inc.'s de
          facto standards;
 
     2) orders GTE to make its service available to other
          air-ground licensees at non-discriminatory rates;
 
     3) divides each channel block into 6 control channels
          (P-1 through P-6) and 29 communications channels
          (C-1 through C-29);
 
     4) provides for a communications channel bandwidth of 6
          kHz;
 
     5) gives GTE 22 months to modify its current control
          channel scheme; during this period, GTE can use
          the lower 20 kHz of each channel block, which
          includes channels C-1, C-2, and C-3, for control.
          GTE then has another 38 months during which it can
          only use a 3.2 kHz control channel in channel C-2
          of each channel block. After these transition
          periods end (September of 1996), GTE must switch
          to control channels marked P-1 through P-6 in the
          tables below;
 
     6) empowers the FCC to assign exclusively one control
          channel to each air-ground licensee;
 
     7) limits the ERP of airborne stations to 30 watts;
          maximum, and that of ground stations to 100 watts
          maximum;
 
     8) limits the ERP of ground stations to 1 watt when
          communicating with aircraft on the ground.
 


GROUND TO AIR CHANNELS
~~~~~~~~~~~~~~~~~~~~~~
(NOTE" "GB" in these listings denotes Guard Band, a series
of 3 kHz spacings to separate communications channels from
control channels)
 
CH. #                         CHANNEL BLOCK
               10        9         8         7         6
C-1       849.0055  849.2055  849.4055  849.6055  849.8055
C-2       849.0115  849.2115  849.4115  849.6115  849.8115
C-3       849.0175  849.2175  849.4175  849.6175  849.8175
C-4       849.0235  849.2235  849.4235  849.6235  849.8235
C-5       849.0295  849.2295  849.4295  849.6295  849.8295
C-6       849.0355  849.2355  849.4355  849.6355  849.8355
C-7       849.0415  849.2415  849.4415  849.6415  849.8415
C-8       849.0475  849.2475  849.4475  849.6475  849.8475
C-9       849.0535  849.2535  849.4535  849.6535  849.8535
C-10      849.0595  849.2595  849.4595  849.6595  849.8595
C-11      849.0655  849.2655  849.4655  849.6655  849.8655
C-12      849.0715  849.2715  849.4715  849.6715  849.8715
C-13      849.0775  849.2775  849.4775  849.6775  849.8775
C-14      849.0835  849.2835  849.4835  849.6835  849.8835
C-15      849.0895  849.2895  849.4895  849.6895  849.8895
C-16      849.0955  849.2855  849.4955  849.6955  849.8955
C-17      849.1015  849.3015  849.5015  849.7015  849.9015
C-18      849.1075  849.3075  849.5075  849.7075  849.9075
C-19      849.1135  849.3135  849.5135  849.7135  849.9135
C-20      849.1195  849.3195  849.5195  849.7195  849.9195
C-21      849.1255  849.3255  849.5255  849.7255  849.9255
C-22      849.1315  849.3315  849.5315  849.7315  849.9315
C-23      849.1375  849.3375  849.5375  849.7375  849.9375
C-24      849.1435  849.3435  849.5435  849.7435  849.9435
C-25      849.1495  849.3495  849.5495  849.7495  849.9495
C-26      849.1555  849.3555  849.5555  849.7555  849.9555
C-27      849.1615  849.3615  849.5615  849.7615  849.9615
C-28      849.1675  849.3675  849.5675  849.7675  849.9675
C-29      849.1735  849.3735  849.5735  849.7735  849.9735
GB        849.1765  849.3765  849.5765  849.7765  849.9765
               to        to        to        to        to
          849.1797  849.3797  849.5797  849.7797  849.9797
P-6       849.1813  849.3813  849.5813  849.7813  849.9813
P-5       849.1845  849.3845  849.5845  849.7845  849.9845
P-4       849.1877  849.3877  849.5877  849.7877  849.9877
P-3       849.1909  849.3909  849.5909  849.7909  849.9909
P-2       849.1941  849.3941  849.5941  849.7941  849.9941
P-1       849.1973  849.3973  849.5973  849.7973  849.9973
 
 
               5         4         3         2         1
C-1       850.0055  850.2055  850.4055  850.6055  850.8055
C-2       850.0115  850.2115  850.4115  850.6115  850.8115
C-3       850.0175  850.2175  850.4175  850.6175  850.8175
C-4       850.0235  850.2235  850.4235  850.6235  850.8235
C-5       850.0295  850.2295  850.4295  850.6295  850.8295
C-6       850.0355  850.2355  850.4355  850.6355  850.8355
C-7       850.0415  850.2415  850.4415  850.6415  850.8415
C-8       850.0475  850.2475  850.4475  850.6475  850.8475
C-9       850.0535  850.2535  850.4535  850.6535  850.8535
C-10      850.0595  850.2595  850.4595  850.6595  850.8595
C-11      850.0655  850.2655  850.4655  850.6655  850.8655
C-12      850.0715  850.2715  850.4715  850.6715  850.8715
C-13      850.0775  850.2775  850.4775  850.6775  850.8775
C-14      850.0835  850.2835  850.4835  850.6835  850.8835
C-15      850.0895  850.2895  850.4895  850.6895  850.8895
C-16      850.0955  850.2855  850.4955  850.6955  850.8955
C-17      850.1015  850.3015  850.5015  850.7015  850.9015
C-18      850.1075  850.3075  850.5075  850.7075  850.9075
C-19      850.1135  850.3135  850.5135  850.7135  850.9135
C-20      850.1195  850.3195  850.5195  850.7195  850.9195
C-21      850.1255  850.3255  850.5255  850.7255  850.9255
C-22      850.1315  850.3315  850.5315  850.7315  850.9315
C-23      850.1375  850.3375  850.5375  850.7375  850.9375
C-24      850.1435  850.3435  850.5435  850.7435  850.9435
C-25      850.1495  850.3495  850.5495  850.7495  850.9495
C-26      850.1555  850.3555  850.5555  850.7555  850.9555
C-27      850.1615  850.3615  850.5615  850.7615  850.9615
C-28      850.1675  850.3675  850.5675  850.7675  850.9675
C-29      850.1735  850.3735  850.5735  850.7735  850.9735
GB        850.1765  850.3765  850.5765  850.7765  850.9765
               to        to        to        to        to
          850.1797  850.3797  850.5797  850.7797  850.9797
P-6       850.1813  850.3813  850.5813  850.7813  850.9813
P-5       850.1845  850.3845  850.5845  850.7845  850.9845
P-4       850.1877  850.3877  850.5877  850.7877  850.9877
P-3       850.1909  850.3909  850.5909  850.7909  850.9909
P-2       850.1941  850.3941  850.5941  850.7941  850.9941
P-1       850.1973  850.3973  850.5973  850.7973  850.9973
 
AIR TO GROUND CHANNELS
~~~~~~~~~~~~~~~~~~~~~~ 
CH. #                         CHANNEL BLOCK
               10        9         8         7         6
C-1       894.0055  894.2055  894.4055  894.6055  894.8055
C-2       894.0115  894.2115  894.4115  894.6115  894.8115
C-3       894.0175  894.2175  894.4175  894.6175  894.8175
C-4       894.0235  894.2235  894.4235  894.6235  894.8235
C-5       894.0295  894.2295  894.4295  894.6295  894.8295
C-6       894.0355  894.2355  894.4355  894.6355  894.8355
C-7       894.0415  894.2415  894.4415  894.6415  894.8415
C-8       894.0475  894.2475  894.4475  894.6475  894.8475
C-9       894.0535  894.2535  894.4535  894.6535  894.8535
C-10      894.0595  894.2595  894.4595  894.6595  894.8595
C-11      894.0655  894.2655  894.4655  894.6655  894.8655
C-12      894.0715  894.2715  894.4715  894.6715  894.8715
C-13      894.0775  894.2775  894.4775  894.6775  894.8775
C-14      894.0835  894.2835  894.4835  894.6835  894.8835
C-15      894.0895  894.2895  894.4895  894.6895  894.8895
C-16      894.0955  894.2855  894.4955  894.6955  894.8955
C-17      894.1015  894.3015  894.5015  894.7015  894.9015
C-18      894.1075  894.3075  894.5075  894.7075  894.9075
C-19      894.1135  894.3135  894.5135  894.7135  894.9135
C-20      894.1195  894.3195  894.5195  894.7195  894.9195
C-21      894.1255  894.3255  894.5255  894.7255  894.9255
C-22      894.1315  894.3315  894.5315  894.7315  894.9315
C-23      894.1375  894.3375  894.5375  894.7375  894.9375
C-24      894.1435  894.3435  894.5435  894.7435  894.9435
C-25      894.1495  894.3495  894.5495  894.7495  894.9495
C-26      894.1555  894.3555  894.5555  894.7555  894.9555
C-27      894.1615  894.3615  894.5615  894.7615  894.9615
C-28      894.1675  894.3675  894.5675  894.7675  894.9675
C-29      894.1735  894.3735  894.5735  894.7735  894.9735
GB        894.1765  894.3765  894.5765  894.7765  894.9765
               to        to        to        to        to
          894.1797  894.3797  894.5797  894.7797  894.9797
P-6       894.1813  894.3813  894.5813  894.7813  894.9813
P-5       894.1845  894.3845  894.5845  894.7845  894.9845
P-4       894.1877  894.3877  894.5877  894.7877  894.9877
P-3       894.1909  894.3909  894.5909  894.7909  894.9909
P-2       894.1941  894.3941  894.5941  894.7941  894.9941
P-1       894.1973  894.3973  894.5973  894.7973  894.9973
 
 
               5         4         3         2         1
C-1       895.0055  895.2055  895.4055  895.6055  895.8055
C-2       895.0115  895.2115  895.4115  895.6115  895.8115
C-3       895.0175  895.2175  895.4175  895.6175  895.8175
C-4       895.0235  895.2235  895.4235  895.6235  895.8235
C-5       895.0295  895.2295  895.4295  895.6295  895.8295
C-6       895.0355  895.2355  895.4355  895.6355  895.8355
C-7       895.0415  895.2415  895.4415  895.6415  895.8415
C-8       895.0475  895.2475  895.4475  895.6475  895.8475
C-9       895.0535  895.2535  895.4535  895.6535  895.8535
C-10      895.0595  895.2595  895.4595  895.6595  895.8595
C-11      895.0655  895.2655  895.4655  895.6655  895.8655
C-12      895.0715  895.2715  895.4715  895.6715  895.8715
C-13      895.0775  895.2775  895.4775  895.6775  895.8775
C-14      895.0835  895.2835  895.4835  895.6835  895.8835
C-15      895.0895  895.2895  895.4895  895.6895  895.8895
C-16      895.0955  895.2855  895.4955  895.6955  895.8955
C-17      895.1015  895.3015  895.5015  895.7015  895.9015
C-18      895.1075  895.3075  895.5075  895.7075  895.9075
C-19      895.1135  895.3135  895.5135  895.7135  895.9135
C-20      895.1195  895.3195  895.5195  895.7195  895.9195
C-21      895.1255  895.3255  895.5255  895.7255  895.9255
C-22      895.1315  895.3315  895.5315  895.7315  895.9315
C-23      895.1375  895.3375  895.5375  895.7375  895.9375
C-24      895.1435  895.3435  895.5435  895.7435  895.9435
C-25      895.1495  895.3495  895.5495  895.7495  895.9495
C-26      895.1555  895.3555  895.5555  895.7555  895.9555
C-27      895.1615  895.3615  895.5615  895.7615  895.9615
C-28      895.1675  895.3675  895.5675  895.7675  895.9675
C-29      895.1735  895.3735  895.5735  895.7735  895.9735
GB        895.1765  895.3765  895.5765  895.7765  895.9765
               to        to        to        to        to
          895.1797  895.3797  895.5797  895.7797  895.9797
P-6       895.1813  895.3813  895.5813  895.7813  895.9813
P-5       895.1845  895.3845  895.5845  895.7845  895.9845
P-4       895.1877  895.3877  895.5877  895.7877  895.9877
P-3       895.1909  895.3909  895.5909  895.7909  895.9909
P-2       895.1941  895.3941  895.5941  895.7941  895.9941
P-1       895.1973  895.3973  895.5973  895.7973  895.9973
 
 

Here is a reference chart of allocated channel blocks around the country.

GEOGRAPHICAL CHANNEL BLOCK LAYOUT
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
(ground stations using the same channel block must be at
least 300 miles apart)
 
LOCATION            CH. BLOCK
ALASKA
     Anchorage      8
     Cordova        5
     Ketchikan      5
     Juneau         4
     Sitka          7
     Yakutat        8
ALABAMA
     Birmingham     2
ARIZONA
     Phoenix        4
     Winslow        6
ARKANSAS
     Pine Bluff     8
CALIFORNIA
     Blythe         10
     Eureka         8
     Los Angeles    4
     Oakland        1
     S. San Fran.   6
     Visalia        7
COLORADO
     Colorado Spgs. 8
     Denver         1
     Hayden         6
FLORIDA
     Miami          4
     Orlando        2
     Tallahassee    7
GEORGIA
     Atlanta        5
     St. Simons Is. 6
HAWAII
     Mauna Kapu     5
IDAHO
     Blackfoot      8
     Caldwell       10
ILLINOIS
     Chicago        3
     Kewanee        5
     Schiller Park  2
INDIANA
     Fort Wayne     7
IOWA
     Des Moines     1
KANSAS
     Garden City    3
     Wichita        7
KENTUCKY
     Fairdale       6
LOUISIANA
     Kenner         3
     Shreveport     5
MASSACHUSETTS
     Boston         7
MICHIGAN
     Bellville      8
     Flint          9
     Sault S. Marie 6
MINNESOTA
     Bloomington    9
MISSISSIPPI
     Meridian       9
MISSOURI
     Kansas City    6
     St. Louis      4
     Springfield    9
MONTANA
     Lewistown      5
     Miles City     8
     Missoula       3
NEBRASKA
     Grand Island   2
     Ogallala       4
NEVADA
     Las Vegas      1
     Reno           3
     Tonopah        9
     Winnemucca     4
NEW MEXICO
     Alamogordo     8
     Albuquerque    10
     Aztec          9
     Clayton        5
NEW JERSEY
     Woodbury       3
NEW YORK
     E. Elmhurst    1
     Schuyler       2
     Staten Island  9
NORTH CAROLINA
     Greensboro     9
     Wilmington     3
NORTH DAKOTA
     Dickinson      7
OHIO
     Pataskala      1
OKLAHOMA
     Warner         4
     Woodward       9
OREGON
     Albany         5
     Klamath Falls  2
     Pendleton      7
PENNSYLVANIA
     Coraopolis     4
     New Cumberland 8
SOUTH CAROLINA
     Charleston     4
SOUTH DAKOTA
     Aberdeen       6
     Rapid City     5
TENNESSEE
     Elizabethton   7
     Memphis        10
     Nashville      3
TEXAS
     Austin         2
     Bedford        1
     Houston        9
     Lubbock        7
     Monahans       6
UTAH
     Abajo Peak     7
     Delta          2
     Escalante      5
     Green River    3
     Salt Lake City 1
VIRGINIA
     Arlington      6
WASHINGTON
     Seattle        4
     Cheney         1
WEST VIRGINIA
     Charleston     2
WISCONSIN
     Stevens Point  8
WYOMING
     Riverton       9

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -





              ############################################      
                    # Credit Card Authorization Machines #
                    #           Emery Lapinski           #
                    ############################################


This article contains information pertaining to VeriFone Credit Card
Authorization machines.  I have not run across any files containing information
on this subject, but if anyone knows where I can find more information about
these little grey boxes I would appreciate it.

The VeriFone comes under different names. This file is from hacking a ZON Jr XL,
but I have also seen ones that look much similar under the name TRANZ.  If 
anoyone has any information on the similarities/differences of these machines
I would appreciate the info....



               THIS FILE IS FOR INFORMATIONAL PURPOSES ONLY.
   THIS FILE IS INTENDED FOR AUTHORIZED PERSONS IN UNDERSTANDING/OPTIMIZING
                                   THIER MACHINE.
        THE AUTHOR TAKES NO RESPONSIBILITY FOR THE ACTS OF OTHERS.

WARNING!  Please contact MichiganBankCard and all other applicible agencies
          before reading this file.



This is the basic layout the machine, and some information on how it works.

        VeriFone  ZON Jr XL 
        (Michigan Bankcard)
 
 |||||||||||||||||||||||||||||||||||
 |||||||16 CHARACTER DISPLAY||||||||
 |||||||||||||||||||||||||||||||||||

- -sale--   -credit   -force-   -------
| QZ. |   | ABC |   | DEF |   |     | 
|  1  |   |  2  |   |  3  |   |CLEAR|
- -------   -------   -------   -------

- -------   -check-   -auth--   -------
| GHI |   | JKL |   | MNO |   |BACK-|
|  4  |   |  5  |   |  6  |   |SPACE|
- -------   -------   -------   -------
           cash-            
- -------   -mgmt--   balance-  -------
| PRS |   | TUV |   | WXY se  |     |
|  7  |   |  8  |   |  9  tt  |ALPHA|
- -recall   -store-   ------le  -------

- -------   -check-   -auth--   -------
| ,'" |   | -SP |   |     |   |FUNC |
|  *  |   |  0  |   |  #  |   |ENTER|
- -------   -------   -------   -------

CLEAR:
Pressing CLEAR at any time brings the VeriFone back to the READY state.

BACKSPACE:
Used to erase previously enterd characters.

ALPHA:
Used to scroll through the letters on each key.  Pressing an 8 will display
8.  Pressing ALPHA will change this first to T, and successive presses will
change this to U, then V, then T again.

FUNC/ENTER:
Usually a blue key where all the other keys are grey.  Used to indicate
end of input when entering information, or to change the FUNCTIONS of
the keys to do alternate things.

(1)SALE:
Pressing 1(SALE) means you want to process a sale transaction.  The VeriFone
will ask for the credit card number.  The unit uses the CC number algorithm
to check this number and can display BAD CC NUMBER.  The expiration date
may be entered at this time at the end of the CC nunmber, or after pressing
ENTER it will ask for the expiration date which is of the form mmyy or myy.  
This information can be entered with the keypad or by sliding the credit card 
through the CC reader slot.
Then the amount of the transaction is entered (without a decimal point and
without rounding the cents) followed by ENTER.
The VeriFone calls in to get a 6-digit authorization number.  Usually this
is 6 numbers, but I have seen it composed of two letters followed by 4 digits
as well.  It usually begins with AP which indicates approval.
If the transaction in not approved it returns various messages depending on 
the reason.  This could be DECLINE, meaning there is not enough money left
in the account; CALL-HOLD meaning there is enough money but someone has
done an AUTHORIZATION (not a SALE) which reserves some of the accounts money
and will be released after 7-10 days if not DRAFT is recieved; or just
CALL, which usually means the card is stolen or cancelled.
This transaction is stored in the batch, if approved, and the approval number
is displayed.
Pressing CLEAR returns the unit to its READY state.

(2)CREDIT:
Pressing 2(CREDIT) is used for the processing of a CREDIT (as opposed to SALE)
draft.  Information same as above but the VeriFone does not call to get any
kind of authorization.  After all the information is enterd the unit
retunrs to the READY state.
This information is stored in the batch with CI in place of MC, VI, etc. to
indicate a credit.

(3)FORCE:
Similar to a SALE except that the unit does not call to get an approval
number.  Used when an transaction is DENIED, or erased.  The unit does not 
call to get an approval number.  The information is stored in the batch.

(4)UNDEFINED:
Could be used for special services, like AMEX transactions or Collection
Services.

(5)CHECK:
Something to do with authorization of checks and check cashing but I'm 
unclear about this one.

(6)AUTH:
Like SALE, returns approval or decline code but is not stored in batch.
Places a HOLD on the card for the entered amount for 7-10 days.  A sales
draft can be sent in based on this, otherwise the HOLD will be removed.
Used to reserve money on the account or to check to see if the card is good.

(7)UNDEFINED:
Can be used for more special services.

(8)CASH-MGMT:
I have no idea.

(9)BALANCE & SETTLE FUNCTIONS:
At the end of day or whenever the batch is filled (about 100 transactions)
a batch number is obtained.  This is a nine digit number that is used to
reference the batch of transactions when dealing with credit corporations.
First one must BALANCE the batch.  Pressing 9 (to BALANCE) will ask for a
password (stored in location 053).  Enter this number and press ENTER.
The VeriFone will ask for the number of transactions which is simply a count
of the number of transactions followed by ENTER.  If this is correct then
it will ask for total amount, which is the total amount of all the
transactions  (the decimal point is not entered but the cents must not
be rounded so that if the total was $174.30 it would be 17430) followed by
ENTER.  If either the # of transactions of total amount is incorrect  
then the VeriFone diaplays the first entry of the batch which is the
last 5 digits of the credit card number followed by credit card type (VI, MC,
etc.) followed by the 6 digit authorization number, followed by the
amount of the transaction.  By entering digits at this time, followed by 
ENTER,the amount of the transaction can be changed.  The batch is scrolled
forward by pressing ENTER.
When the information is correctly entered, The VeriFone displays READY (or
whatever is stored in location 030.)  When the 9 is pressed again (to SETTLE)
it calls to process the batch.  It transmits its information (if any of the 
information has been changed, it sends it twice) and recieves the 9 digit 
batch number, which it displays.

(0)AUTO:
An auto-dialer of some sort.  Phone numbers can be stored in memory, and
pressing AUTO will dial it for you and tell yo to pick up the handset when
it is finished.  I'm not sure how to use it.

MEMORY FUNCTIONS:
To review the VeriFone's memory, press:
        FUNC,7
The screen will display 
        =
and will wait for you to enter three numbers or press ENTER which will start
at 000.  Pressing ENTER will increment the location displayed, ALPHA will
decrement.
To change the Verifone's memory, press:
        FUNC,8
You are asked for a password, but this is not the password stored at location
053 (this password is used for functions like getting batch numbers, clearing
the batch, changing the information in the batch, etc.)  On the two machines
I have checked this password is 166831, which I obtained to when the local
authorization phone number was changed.  It would call this number twice 
getting a "The number you have called has been changed . . ." message,
then would call the 1-800 number.

Valid Memory Locations of form ### are:
000-399, 400-412, 500-512, 600-612, 700-712, 800-812, 900-912

Loc#    Information     Meaning (?)
- --------------------------------------------
000     12146808459     Phone number of some computer.
019     JXL0001         Type of machine
021     2-ART,VIDEO     Type of store
022-029 <EMPTY>         
030     READY           Message Displayed when machine is ready
053     123456          Some functions require password, this is it (?)
056,058 18002221455     More Computers
057,059 18005543363     More Computers
100     9299783         More Computers
108     SALE            Message display when 1(SALE) key is pressed
208     CREDIT          Message display when 2(CREDIT) key is pressed
#08                     Locations 108,208, . . . are messages displayed when
                                that key is pressed. Not true for 008.  Can
                                be changed to whatever you want.
311-399 <EMPTY>

Many of the other locations contain long strings of characters that are some
sort of password/id/information (up to 40 characters I think) that the
VeriFone passes when it calls in, others are empty or used to store new
information.  Chnaging these can upset the functionality of the unit.
Local numbers are called first, and if no successful connection, then the
1-800 number is called.

CLEARING THE BATCH:
Pressing
        FUNC,6(?)
followed by the password (location 053) followed by ENTER.  The VeriFone asks
"CLEAR BATCH?".  Pressing ENTER clears the BATCH, CLEAR cancels this.  To
restore the BATCH, FORCE would be used to restore this information insted of 
SALE as SALE would obtain a second transaction and approval number.

UNIT SEND & UNIT RECIEVE:
Pressing 
        FUNC,* 
or 
        FUNC,#(?) 
does UNIT SEND or UNIT RECIEVE which does some sort of UPLOAD/DOWNLOAD 
functions.  I'm not sure how this one works.
Useful if important memory locations of the VeriFone are chnaged and
upset some of the functions, then the central company can replace the
information easily.

 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -




                   /-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/
                   -/-                                 -/-
                   /-/         *> TID-BYTES <*         /-/
                   -/-                                 -/-
                   /-/     by the Informatik Staff     /-/
                   -/-                                 -/-
                   /-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/

     Tid-Bytes is a standing column of miscellaneous bits of information.

This issue we have an update on cordless phone frequencies, a complete CLASS
code list, a list of companies that can provide you with information and
material on bombs, survival, crime, and other fun stuff, and Holistic Hacker
gives us a peek into Bell.


Cordless Phone Update
~~~~~~~~~~~~~~~~~~~~~
This is a little extra info on cordless phone frequencies from issue 01.  I
decided that there are times that the handset frequencies could also be handy
for when the base itself is out of range.  Note that a good many cordless
phones handsets are simplex, so the conversation will be one-sided.  Here is
the list again, with the updated handset frequencies.

channel          base            handset
1               46.610           49.670
2               46.630           49.845
3               46.670           49.860
4               46.710           49.770
5               46.730           49.875
6               46.770           49.830
7               46.830           49.890
8               46.870           49.930
9               46.930           49.990
10              46.970           46.970




CLASS and Custom Calling Feature Control Codes:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The following list was compiled from comp.dcom.telecom postings and
the Bell Atlantic "IQ services" information line at (800) 365-5810.

(These appear to be standard, but may be changed locally)


        The number of the last call you received is logged at the CO.
        You get an acknowledging recording.  Then hang up.
        Write down the date and time.
        You don't get the number - you must contact the
        business office or police.
        Costs $1.50 - $3 depending on your area.


        (start "call block" list management)


        (start "priority call" list management)




        (start "select forwarding list" management)


        (turn on caller ID delivery to me, the subscriber)


        (activate "repeat call" - retry last number for 30 minutes)


        "tone block" (prevent call waiting tone, useful for data calls)
        *70 // dial tone // the number you're dialing


n#   speed dial (n=2 to 9)
nn#  speed dial (nn=20-49)
72#  activate call forwarding
73#  deactivate call forwarding
74#  set speed dialing (8 numbers)
75#  set speed dialing (30 numbers)

Rotary/pulse phones: use 11 for the * (ex: *57 => 1157) (is there a
pulse code for #?  I doubt it becuase it's not a prefix)

You do not need to subscribe to call trace to use it.  Some areas
allow return call and repeat call on a per use basis.  The cost is
higher per use than with a subscription, but you pay nothing for
months where you don't use it.


reduce the number of calls logged because there's a surcharge after
400 calls per month.

New York Telephone has a recorded message system describing their
services.  Here's what I gathered from (800) EASY-NYT (327-9698) (this
mostly jives with information from the Bell Atlantic IQ services
information line at (800) 365-5810)

Menu choice:

45 ->   A person relays voice/TDD at no additional charge.
        This is WITHIN New York State only.
        What about calls in/out of New York State?
        The operator said the originator should call information for
        the relay service.  This is a service of AT&T, and is currently
        not allowed to call across states.
        (800) 421-1220  voice
        (800) 662-1220  TDD

        The AT&T newsline (908) 221-6397  (221-NEWS)
        for Friday June 8, 1991 mentioned that the (Chicago) Illinois
        relay center opened June 10.
        It is the fourth, others being in New York, Alabama and California.
        [and Sprint's in Texas as mentioned in TELECOM Feb 1992]

46 ->   restrict outgoing calls to pay services
                exchanges 540, 550, 970, 970
                area codes 700, 900
        This service is free of charge.

14 ->   "Ring Mate" allows you to add one or two additional numbers, 
        each with a unique ring pattern (and call waiting beep).

AT&T has language translation centers.  I believe these are the numbers:

(408) 648-5871  AT&T Language Line (outside the USA)
(800) 628-8486  AT&T Language Line (USA only)
(800) 752-6096  AT&T Language Line information

You can get translators (English/Japanese, ...) as needed, but the
cost is rather high.  I'm not sure if reservations/appointments are
necessary.  It would be interesting to see the setup and costs for a
conference call from the US to Japan, using the translation center and
a TDD relay for the deaf (particularly if the deaf were non-english).
Or better yet -- a video conference from the US to Russia with
translators.

CCITT rules:

How to write a number:

+1 212 555 1212
        international
        (spaces, NO dashes)

(212) 555 1212
        within the country (parentheses around the optional city code)





Politically Incorrect Publishers
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This is a listing of mail-order publishers & distributors of books concerning
weapons, combat, explosives, etc.  A pound sign (#) indicates that the company
carries a line of books, but specializes in other items, such as gun leather,
yuppie survival goods, ID cards & certificates, medals & patches, outdoor
clothing, etc.  There are all sorts of nify goodies that you can order.

Brigade Quartermasters #
1025 Cobb International Blvd.
Kennesaw, GA 30144-4300
Information: (404) 428-1234
Orders:      (800) 338-4327
Fax Orders:  (404) 426-7726
Telex:       54-2461

Butokukai
P.O. Box 430
Cornville, AZ 86325
(602) 634-6280

CEP, Incorporated
P.O. Box 865
Boulder, CO 80306
(303) 443-2294

Delta Press, Ltd.
P.O. Box 1625
215 S. Washington St.
El Dorado, AR 71731
Orders:   (800) 852-4445
Service:  (501) 862-4984

Desert Publications
P.O. Box 1751
716 Harrell St.
El Dorado, AR 71731-1751
Orders:      (800) 852-4445
Fax Orders:  (501) 862-9671
Information: (501) 862-2077

Eden Press
P.O. Box 8410
Fountain Valley, CA 92728
Orders:    (800) 338-8484
Info & CA: (714) 556-2023

Loompanics Unlimited
P.O. Box 1197
Port Townsend, WA 98368
(No phone?)

Mass Army Navy Store #
15 Fordham Road
Boston, MA 02134
Orders:    (800) 343-7749
Info & MA: (617) 783-1250
Fax:       (617) 254-6607

National Intelligence Book Center
1700 W St., N.W Suite 607 
Washington, DC 20006
Phone: (202) 797-1234 (SUBSCRIPTION)
Phone: (202) 337-8084 (ORDER)
fax: (202) 342-2342

NIC, Inc.  (Law Enforcement Supply) #
220 Carroll St., Suite D1
P.O. Box 5210
Shreveport, LA 71135-5210
Orders: (318) 222-2970  (24 hr.)
Fax:    (318) 869-3228  (24 hr.)

Paladin Press
P.O. Box 1307
Boulder, CO 80306
Orders:  (800) 392-2400
Service: (303) 443-7250

Phoenix Systems, Inc. #
P.O. Box 3339
Evergreen, CO 80439
Fax:    (303) 278-8101
Throat: (303) 277-0305 (08:00-17:00 MST/MDT)

Quartermaster #
750 Long Beach Blvd
Long Beach, CA 90813
P.O. Box 829
Long Beach, CA 90801-0829
Orders: (800) 444-8643
Info:   (800) 933-3135

Survival Books
11106 Magnolias Blvd.
N. Hollywood, CA 91601-3810
(818) 763-0804

U.S. Cavalry #
2855 Centennial Ave.
Radcliff, KY 40160-9000
Orders: (800) 777-7732
Info:   (502) 351-1164



Southwestern Bell Visitor Passes
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Holistic Hacker - H0D sends us this note:

   I acquired this goody on a visit of the SW Bell facilities in St. Louis
last year.  Here's a brief description of it.  The pass is on light blue
cardboard stock approximately 2.5" wide by 3.5" high.  The Bell logo is
in the top left corner and "Southwestern Bell Telephone" is typed along
the top.  Centered about 1.5" from the top is "Visitor Temporary Pass."
Below that is name, company, and admit to, all followed by some lines to
write the appropriate BS in.  "Void After" and "Issued By" are farther
down.  On my pass, "Admit To" = OBC (One Bell Center) and "Issued By" =
F.A.  Too bad I couldn't keep the visitor pass to their data center...


 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -




               (%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)
               )%(                                         )%(
               (%)             > Hot Flashes <             (%)
               )%(                                         )%(
               (%)       The Underground News Report       (%)
               )%(                                         )%(
               (%)     Edited by:  the Informatik Staff    (%)
               )%(                                         )%(
               (%)            Jan thru Apr 1992            (%)
               )%(                                         )%(
               (%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)%(%)


IMPORTANT NOTE:  We have decided to not generally include any future news
features on hacking or phreaking.  Occasionally we may include one or two if we
feel that they have not been covered elswhere.  Our decision is based on the
fact that Phrack, a long-standing electronic publication devoted to the hacker
community, does an excellent job of collecting them.  There is no use in both
of use publishing the same stories over and over.  We do plan to keep stories
concerning fraud, government, and other goodies not normally addressed by
Phrack.  SO, for most hacking and phreaking news stories check out Phrack.



=====================================
Wireless Cable Lottery Spurring Scams
=====================================

WASHINGTON, D.C., U.S.A., 1992 APR 15 (NB) -- The Federal 
Communications Commission's lottery of rights to operate wireless 
cable systems is becoming a hotbed for con-men, according to 
federal and state officials. 

The Bush Administration has said it wants to end the lottery 
process and award new frequencies based on auctions, while 
Congress wants hearings and awards based on a "public interest" 
test. But until all that is sorted out, lotteries, in which people 
file applications and the agency chooses winners by lot, are the 
way the agency will allocate rights. 

The current controversy involves wireless cable television, a 
technology using microwave radio technology to transmit TV 
programs to viewers' homes, bypassing wired cable systems. The 
low capacity of such systems, compared with the high capacity of 
existing wired cable systems, makes them a risky business 
proposition in large cities wired for cable, but that has not 
stopped the con artists. 

So far, 18 state securities agencies have investigated or taken 
action against suspected scams in Georgia, with Illinois and Florida 
adding their voices in the form of press releases and warnings from 
state officials. The Federal Trade Commission has also been 
investigating lottery fraud, and has filed three lawsuits. 

Florida Comptroller, Gerald Lewis, who regulates the state's 
banks, claimed at a news conference that "boiler room" operations 
touting license lotteries have taken in $50 million nationwide. 
He said the con artists claim that for $5,000 they can virtually 
guarantee a successful application. The actual filing fee is 
$155, and over 36,000 applications have been received so far, 
according to the FCC. 

Illinois Secretary of State George Ryan estimated in a press 
statement that investors have risked $75 million on the schemes, 
and his office has taken action against two such companies in that 
state. The FCC has been granting wireless cable licenses for nine 
years, but fewer than 170 such systems are actually up and running, 
he added, indicating the business risk is considerable since 
wireless cable works only in a "line of sight" from a central antenna 
to a subscriber. 

Later this year, the FCC will launch a second and, perhaps, more 
lucrative lottery process. This will be for new frequencies to 
run communications adjuncts to interactive TV systems like that 
offered by TV Answer of Reston, Virginia. TV Answer has won 
agreement from Hewlett-Packard to make set-top converters for 
its system, which will offer banking, shopping, information, and 
games. In this lottery, however, winning bidders will be forced 
to build-out at least half their systems before selling their 
interests. Applications will cost about $5,000-$10,000, depending 
on the size of the market applied for, and total costs to winning 
bidders are estimated at $150,000-$250,000, again depending 
on the size of the market. 

- ------------------------------------------------------------------------------


==============================
SPA Raids Grand Central Camera
==============================

WASHINGTON, DC, U.S.A., 1992 APR 8 (NB) -- On March 25, U.S.
Marshals and representatives of the Software Publishers
Association raided grand Central Cameras (AKA GCT Photo Dealers)
based on charges that the company had been making illegal copies
of software and selling computers preloaded with the programs in
violation of U.S. copyright laws. 

SPA member companies whose software has allegedly been copied
include Lotus, Microsoft, WordPerfect, Datastorm Technologies,
Fifth Generation Systems, Interplay Productions, and Sphere.

Copied software was found on 25 seized floppy diskettes which
allegedly served as duplication masters. In addition, sales
records with names of customers were also taken and will
reportedly be used to determine if those obtaining pirated
software will be named in the case against the store. 

Also seized in the raid, which was based on a federal court order
issued in the United States Court for the Southern District of
New York, were three desktop computers and two laptops which the
SPA says contained illegal or pirated copies of software.

Grand Central Cameras has agreed to submit to, and the court
subsequently entered, a preliminary injunction forbidding
unauthorized software copying by the reseller.

The SPA maintains an anti-piracy hotline, 800-388-7478, which
collects information from people wishing to report software
copyright violations.

To get a copy of the SPA Self-Audit Kit and SPAudit inventory
management program, companies should write to: SPAudit Software
Publishers Association 1730 M. Street, NW, Suite 700 Washington,
D.C. 20036.

- ------------------------------------------------------------------------------


===================================================
MCI Nixes Billing For Problem Pay-Per-Call Services
===================================================

WASHINGTON, D.C., U.S.A., 1992 APR 1 (NB) -- MCI 
Communications has announced it is no longer accepting 
applications for the more dubious firms offering financial 
services on its premium-rated "900" area code lines.

Specifically, MCI is prohibiting companies offering credit card
and loan advice services on the premium rate services. Newsbytes
notes that the majority of these companies are usually only
dispensing common-sense rules on building credit ratings up and
charging heavily for the privilege.

One "900" number that Newsbytes called in the US recently in
connection with a financial feature turned out to be a thinly-
disguised mail-order operation with a "Gold card" membership
costing $50 that allowed members to buy mail order goods at
normal prices. Considering that callers to the "900" number paid
$10 for the call itself, this was clearly a scam.

In addition to the financial services block on "900" lines, MCI
has also ceased handling billing for job agencies which offer
generic job descriptions and suggestions on how to get a job.

The changes, which take effect from April 1, are in addition to a
previously-announced block on adult services on "900" numbers.

"MCI has instituted these policies to further ensure that consumers 
are protected and are subjected to less confusion and fewer 
incidences of abusive sales tactics by some 900 information
providers," said Carol Herod, MCI senior vice president for
business marketing, announcing the block.

"While we have previously taken strong policy steps that are
consistent with FCC rules, these additional safeguards can help
to protect consumers during uncertain economic times. At the
same time, we want them to be able to take advantage of the
numerous consumer and business-oriented programs which 
offer legitimate and valuable services," she added.

The "900" area code service changes, which were notified to its
major subscribers in February of this year, are likely to cause a
major contraction in the number of companies offering premium
services, Newsbytes notes. MCI, ironically, was one of the first
telecommunications companies to offer "900" area code premium 
rate services at the beginning of last year.

- ------------------------------------------------------------------------------


=================================================================
Electronic Filing Breeds Tax Fraud Scams; Include Illegal Refunds
=================================================================
Los Angeles Times, Apr 14, 1992

    Los Angeles - Jerome Hearne used to rob people for a living, but sometime
 in the late 1980s or early 1990s he turned to a more lucrative livelihood:
 robbing the U.S. Treasury.
    Hearne's adopted brand of crime was electronic tax fraud.
    He and a band of Los Angeles cohorts joined a fast-growing group of crooks
 who are raiding millions of taxpayer dollars every year by filing false
 returns and getting quick, illegal refunds in the form of bank loans.
    The scams bring together clever ringleaders and large numbers of co-
 conspirators, often unemployed or homeless people who are willing to have
 their real names and Social Security numbers used on fake tax returns.
    In Georgia, such fraud is a growing problem, partly because electronic tax
 filing has been in place for only three years. "All of the kinks and bugs are
 going to have to be ironed out," said Loretta Bush, a spokeswoman for the
 Internal Revenue Service in Atlanta.
    However, she said, intensified efforts by the government to fight
 electronic filing fraud are working. Two Riverdale men recently pleaded guilty
 to filing false tax returns electronically. It was the first criminal
 prosecution of its kind in the Northern District of Georgia.
    The government charged that the men prepared tax returns for clients and,
 then without the clients' knowledge, altered the filings and claimed larger
 refunds than legally were due.
    The men arranged "refund anticipation loans" for their clients, using the
 returns with the inflated refunds.
    When a bank issued checks for the loans, the men endorsed the clients'
 names on the back of the checks, the government said. Then they deposited the
 money in their own accounts.
    The men then issued checks to their clients for the amount they were
 legally owed - and pocketed the difference.
    In Los Angeles, the fraud also involved bank loans.
    The crooks filed fraudulent returns electronically using the government's
 computerized tax-return system. Then they applied for bank loans based on the
 anticipated return. It takes only two to three days for the bank to approve
 such loans and for the scam artists to have checks in their hands.
    By the time IRS auditors discover what has happened, everyone involved
 usually has disappeared with the money - sometimes a great deal of it. Hearne
 and the government dispute the exact size of the take in his scam, but the
 total could top $1 million in false returns.
    Hearne, who denies he was the group's ringleader but has pleaded guilty to
 tax fraud and conspiracy charges, faces sentencing later this month.
    Hearne's case - which involved seven other defendants charged with similar
 crimes - is the nation's biggest so far. But Hearne has plenty of company in
 the electronic tax-scam business.
    "This is a major problem for us," said Dennis Crawford, chief of the
 criminal investigation division of the IRS's Los Angeles office. "It's what's
 hot right now. We've had to pull people off other areas to deal it."

- ------------------------------------------------------------------------------


=============================================
Ads With '800' Numbers Don't Always Ring True
=============================================
Elliott Brack, The Atlanta Constitution, Apr 1, 1992

    Hey, no fooling. You may not believe this, but things aren't always what
 they seem. Really!
    Yet if anyone gave you a 1-800 telephone number, you would automatically
 think that it would be a toll-free call, right?
    Not always, we have learned. Though in most cases the 1-800 number is
 entirely free, the con artists have found another way to work a scam, aimed at
 getting into your pocketbook.
    You may remember that over the last few months we have reported a wave of
 mail to us and other people offering "free gifts," "free vacations" or
 "official notices" that you might have won something free. Actually, the
 way the message is composed, it appears that you are guaranteed of winning
 some major gift.
    In all instances, all you have to do is call the telephone number provided
 to learn what you have won. Up to now, it has been a 1-900 number for you to
 call, which should have told you it would cost you to dial that number. Yet
 the off-chance of winning something big has caused lots of people to pay those
 1-900 toll charges - only to find that the prize is either less than they
 anticipated or inconsequential.

                     CHARGES KICK IN IF YOU STAY ON THE LINE
    Now comes the new twist.
    Recently many people have received notifications, printed like a postcard,
 urging them to call a 1-800 number. It goes further than that. It says "call
 toll free 1-800 [number] for complete instructions." Now that would make
 anyone think there would be no charge for this call, right?
    Wrong. When they call the 1-800 number, they are connected to a
 computerized voice, which tells them to remain on the line and follow the
 instructions. It's here that the computer also warns that they will be billed
 for this service if they stay on the line.
    But since the postcard said "toll free," many people ignore this warning,
 only to find out later they have been billed for the call by their telephone
 company.

                        DON'T BE FOOLED, ESPECIALLY TODAY
    If you stay on the line, here's what happens next. The computer asks you to
 punch in the 12-digit ID number listed on the postcard, as well as your
 telephone number and ZIP code, before the prize will be revealed.
    In other words, if you stay on the line, the con artists get enough
 information to bill you for telling you what you might have won. The 1- 800
 number was used to lure callers, but what eventually happens is just like
 calling a 1-900 number.
    It all amounts to what appears to be one thing, but is distinctly another.
 This reminds me of what consumer advisers continually tell people: Don't give
 out your credit card numbers on the phone. Only this time, you also should not
 be giving out your telephone number, or else you'll get a bill from what
 appeared to be a 1-800 toll-free call.
    Today is April Fool's Day. Make a call to a 1-900 number, or even in some
 instances to a 1-800 number, and you could be fooled any day of the year.
 Things are not always what they seem.

- ------------------------------------------------------------------------------


====================================================================
Teen Accused of Avoiding Payment on $41,000 Worth of Phone-Sex Calls
====================================================================
Jeff Schultz, Atlanta Constitution, Apr 9, 1992

    The first bombshell - to outward appearances a normal, $25, no-calls- to-
 Uncle-Fred-in-Pago-Pago telephone bill - arrived in the mail in December.
 Dorothy Brown opened it, waded through the stack of computer printed pages,
 and . . . and . . .
    "I nearly had a heart attack," she said. "I mean, $13,000! I thought that
 was bad enough. Then I got the next one."
    Ms. Brown's next bill from United Telephone arrived at her Mountain City,
 Tenn., home in January - this one in excess of $27,000. She still hasn't
 gotten over the shock, but at least now there's some knowledge to go with the
 palpitations.
    Christoper Brown, her 19-year-old son, has been indicted by a grand jury on
 a charge of attempting to avoid payment for services valued at more than $500.
 The services were phone-sex numbers. The total was nearly $41,000.
    Mr. Brown, who is accused of making 746 calls in a two-month period, was
 arrested Tuesday and is being held in Johnson County Jail in lieu of $10,000
 bond. He will be arraigned May 1.
    This is the first time AT&T - the long-distance provider of the 900
 services - and United Telephone have indicted somebody for telephone fraud 
 related to such services. Tennessee is trying the case as a felony theft,
 punishable by a prison term, fines and restitution.
    Her son's future is only one of many concerns facing Ms. Brown, a machine
 operator at Levi Strauss and Co.
    During a 15-minute phone interview - she called collect - she asked a
 reporter numerous times, "This won't hurt my credit, will it?" and, "Am I
 going to have to pay for these calls?"
    She said she struggles to support herself and two sons in Mountain City
 (population 2,000) and added, "I'm having quite a bit of financial trouble
 as it is. I can't afford an attorney."
    Neither would she post bond for her son when he called her at work from
 jail at 10:30 a.m. Tuesday. "He still didn't act like he was sorry when I
 talked to him," she said. "He was kind of giving smart answers. I told him I
 couldn't [post bond]. He said, 'Yes, you can. You get down here and sign it.'
 I told him, 'No, you should've known better.' "
    Ms. Brown said that when she received the first bill, her son denied
 placing the calls. She suspected that a prisoner in the state penitentiary, 15
 miles from her house, was billing calls to her number.
    "Then I started seeing tablets around the house with those numbers written
 on it. They're those romance numbers. I know he got them on TV. He don't have
 a job so he's home all day. I asked him about the numbers, but he said, 'Oh,
 it's nothing.' "
    She said that only after the second bill did Mr. Brown, , who last month
 was laid off from his job at a chair manufacturer, admit to the calls.
    Jim Cosgrove, a spokesman for United Telephone, said telephone fraud 
 affects the industry to the tune of $500 million annually, "but it's difficult
 to get enough evidence to press charges."

- ------------------------------------------------------------------------------


==========================================
Privacy Is Hot-Selling Item At $2 A Minute
==========================================
Marilyn Kalfus, The Orange Country Regester, Apr 2, 1992

    Richard Koch says he has no clue who his customers are.
    That's the point.
    Mr. Koch sells privacy - at $2 a minute.
    His Untraceable Phone Calls, based outside Boston, is a nationwide service
 that prevents people's telephone numbers from being identified and keeps their
 calls from being traced.
    So, just who's using this service?
    "I'm completely in the dark," Mr. Koch said. "It's kind of a strange
 business."
    When callers dial Mr. Koch's 900 number, they reach a computer near Las
 Vegas. The computer, which connects them to a nationwide long- distance line
 Mr. Koch buys from AT&T, gives them a dial tone.
    The number? 1-900-Stopper.
    "This is not a sleazy 900 service," Mr. Koch said. "It's quite the
 opposite.
    "The people who call want to have privacy," he said. "The only call that
 shows up on their phone bill is the 1-900-Stopper call."
    The cost is $2 a minute for calls inside the United States, $5 a minute for
 international calls.
    The service can be used for local calls, long-distance calls and calls to
 800 lines, but not for calls to 900 lines. That way he avoids having to pay
 for 900-line calls that charge more than $2 a minute.
    Mr. Koch figures his service is especially popular in states that have
 approved Caller ID.
    "When any call you make or receive can end up in a marketing database, it's
 time for concern," he said.
    Mr. Koch also says his service is valuable for anyone who doesn't want his
 or her phone records showing up in court records.
    Daisy Ottmann, a spokeswoman for AT&T, confirmed that it works.
    Mr. Koch concedes that some people might use the service to hide criminal
 activity, calling it "a double-edged sword."
    But he said, "Criminals use the U.S. mail, and we don't keep track of
 everyone's mail. Criminals can go out and use a pay telephone and do the same
 thing."
    Indeed, anyone can conceal his calls by using a pay phone, Mr. Koch and Ms.
 Ottmann noted.
    "I just provide the convenience of using your home telephone," Mr. Koch
 said. "You don't have to stand in line at a pay phone and hope no one's
 looking over your shoulder."
    He estimates that more than 200,000 untraceable calls have been made on the
 system since it started two years ago.
    "They can't all be criminals," he said.

- ------------------------------------------------------------------------------


========================================
Italian Crooks Let Others Pay Phone Bill
========================================
Translated from "Tagespiegel" (The Berlin Daily Newspaper), Feb 22, 1992

Lui, Rome, 21. February 1992. [...] Half a million Italians are the proud
owners of portable telephones. The cordless appliance has become the favorite
toy of the Southerners, but the game may soon be over: the "telefonini" are not
protected.

Under the motto "Buy one, pay for two", crooks sell manipulated phones that are
used so that the buyer has to pay for the toll calls of the seller.  The trick
works like this: the crooks take a computer with a computing program [whatever
that may be--ed.] like the ones uses to crack automatic teller machines, and
fuss with it until they find the secret code for the telephone.  The code is a
combination of the telephone number and the serial number that is supposed to
only be available to the telephone company SIP.  When the code has been
cracked, it is no problem to transfer it to a second telephone, so that both
telephones have the same license number.  One phone is sold "under the hand" by
the crooks.  As an added deal, the buyer not only gets to pay his own phone
bill, but the fees run up on the second phone as well.  The Italian underworld
is especially keen on using this method.[...]  The mafia uses the "portabili"
for conducting their unclean business.

[... The police] have not been able to find the instigators, but they suspect
that employees of the telephone manufacturing company are involved, as they
have the knowledge of how the phones are constructed. [...]  The portable
telephone is well-known for the ease of tapping the telephone conversations
[which cannot, however, be traced to the place of origin. A book calle "Italy,
I hear you calling" with some of the more interesting tapped conversations has
just been published.]

- ------------------------------------------------------------------------------


===========================
Robber 'Foiled Bank System'
===========================
The Independent (Uk), Mar 13, 1992

An electronics expert stole more than (pounds) 17,000 in a high-tech
robbery spree, plundering dozens of accounts from automatic cash dispensers
at banks, Paisley [Scotland] Sheriff Court was told yesterday.

Clydesdale Bank chiefs claimed their dispensing system was foolproof and told
angry customers that members of their own households must have been responsible
for making withdrawals without their knowledge.

Anthony Pratt, 32, a bank engineer, used a hand-held computer inside bank
premises to record transactions being made by customers at "hole-in-the-wall"
machines outside.  He recorded the customer's secret number and later used it
on plastic cards he made with magnetic strips.  Pratt, of East Kilbride, was
finally arrested after he took cash from a machine in Glasgow.  He admitted
conspiracy to rob and robbery. Sentence was deferred for reports until 2 April.

- ------------------------------------------------------------------------------


===============================================
FBI Fear Phone Advances Will Hamper Wiretapping
===============================================
LA Times, Mar 7, 1992

Washington- The FBI, contending that rapidly developing telecommunications
technology is hampering the vital tool of wiretapping, proposed legislation
Friday that would require the industry to ensure that improvements do not
interfere with the ability to secretly record conversations.

It also proposed that consumers pick up the cost of changing current
wiretapping equipment to keep pace with new technology.

If the problem is not solved, "terrorists, violent criminals, kidnapers, drug
cartels and other criminal organizations will be able to carry out their
illegal activities using the telecommunications system without detection." FBI
Director William S. Sessions said.   [...]

At issue is the rapid move toward digital telephone communications and
fiber-optic systems in which thousands of conversations can be carried by
filaments roughly the size of a strand of human hair.

William A. Bayse, assistant FBI director for technical services, and other FBI
officals contend that the transmission of hundreds and sometimes thousands of
digital conversations over a single link prevents current wiretapping
technology from isolating conversations for recording as required under the
1968 federal wiretap law.  [...]

Other FBI offical said the expense could be passed on to telephone users at a
cost of "probably less than 20 cents an average per month."   [...]

FBI officals maintained, however, that they already have encountered
difficulties in recording digitally transmitted conversations, now used by
about 10% of the nations phones.  They declined, however, to give any examples
of such difficulties.

 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -




                  Informatik Submission & Subscription Policy
                  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


     Informatik is an ongoing electronic journal, and thus we are faced with
the ever present need for a steady influx of new material.  If you have an
area of interest or expertise that you would like to write about, please do
not hesitate to contribute!  We depend on reader submissions, especially for
the "Hot Flashes" news reports.  We do ask that any submissions fit the
following guidelines...

General Content
~~~~~~~~~~~~~~~
     Material for Informatik should concern information of interest to the
     computer underground community.  Examples of this include, but are by no
     means limited to scams, cellular workings, government agencies, fraud,
     clandestine activity, abuse of technology, recent advances in computing
     or telecommunications technology, and other of information not readily
     available to the public.  Please include a title and author name.

Text Format
~~~~~~~~~~~
     * standard ASCII test
     * 79 characters per line
     * no TAB codes
     * no special or system specific characters
     * mixed case type

News submissions
~~~~~~~~~~~~~~~~
     * Submit only recent news items
     * Include the headline or title of the article
               the author's name (if given)
               the publication of origin
               the date of publication

Subscriptions and Submission Address
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     We are happy to provide an Internet based subscription service to our
readers.  To be on our mailout list, send mail to our Internet address,
"inform@doc.cc.utexas.edu" and include the word subscription in the subject
of your message.  If you do not have internet access, try to reach us through
the many various BBS's across the USA, or route it through a friend who does
have internet access.

Back Issues
~~~~~~~~~~~
     Back issues of Informatik are available via ftp at ftp.eff.org in the
/pub/cud/inform directory.  The site also contains a plethora of other
electronic texts of interest to the "computer underground" community including
Phrack, NIA, PHUN, and the LOD tech journals.

/* End; Issue 03 */
------- End of forwarded message -------