[H[71C1 Network Procedure Differences[K The Global Telecommunications Network (GTN) is Citibanks's international data network, which allows Citicorp customers and personnel to access Citibank's worldwide computerized services. [KTwo different sign on procedures exist: Type A and Type B. All users, except some in the U.S., must use Type B. (U.S. users: the number you dial into and the Welcome Banner you receive determine what sign-on procedure to follow.) Welcome banners are as follows: [KTYPE A: WELCOME TO CITIBANK. PLEASE SIGN ON. XXXXXXXX[8C[K[11C[K PASSWORD = [K@[[KTYPE B: PLEASE ENTER YOUR ID:-1-> [75C[H[71C2 PLEASE ENTER YOUR PASSWORD:-2-> CITICORP (CITY NAME). KEY GHELP FOR HELP.[K XXX.XXX[K PLEASE SELECT SERVICE REQUIRED.-3-> [KType A User Commands[K [KUser commands are either instructions or information you send to the network for it to follow. The commands available are listed below. User Action: Purpose: @ (CR) To put you in command mode (mode in which you can put [8Cyour currently active service on hold and ask the network for information, or log-off the service). (NOTE: This[54Dsymbol also serves as the network prompt; see Type A [8Cmessages.) BYE (CR) To leave service from command mode. [K[75C[H[71C3 Continue (CR) To return to application from command mode (off hold) D (CR) To leave service from command mode. ID To be recognized as a user by the network (beginning of[55Dsign on procedure), type ID, then a space and your[50Dassigned network ID. (Usually 5 or 6 characters long) [KStatus (CR)[13CTo see a listing of network address (only from @[49D[1K prompt). You need this address when "reporting a [53D[1K problem."[K Type A messages The network displays a variety of messages on your screen which either require a user command or provide you with information.[K[38D[K Screen shows: Explanation: [K[19D @ Network prompt -- request for Network ID. [KBAD PASSWORD Network does not except your password. [75C[H[71C4 [K BUSY The address is busy, try back later. WELCOME TO CITIBANK.[62DNetwork welcome banner. Second line provides address PLEASE SIGN ON. # to be used when reporting "problems." XXX.XXX[K[27D[K[20DILLEGAL You typed in an address that doesn't exist.[K CONNECTED Your connection has been established. DISCONNECTED Your [68Dconnect has been disconnected. NOT CONNECTED You're not connected to [69Dany service at the time. NUI REQUIRED Enter your network user ID.[65DPASSWORD = Request for your assigned password. STILL CONNECTED You are still connected to the service you were using. ? Network doesn't[68Dunderstand your entry. Type B User Commands and Messages Since the Type B procedure is used with GTN dial-ups, it requires fewer commands to control the network. There is only 1 Type B command.[64DBreak plus (CR) allows you to retain connection to one service, and connect with another. Screen Shows: Explanation: CITICORP (CITY[63DNAME). Network Welcome banner. Type in service address. PLEASE SELECT SERVICE COM Connection made. DER The port is closed out of[65Dorder, or no open routes are available. DISCONNECTED You have disconnected from the service and the network. ERR Error in service [75C[H[71C5[68Dselected. INV Error in system. MOM Wait, the connection is being[64Dmade. NA Not authorized for this service. NC Circuits busy, try[63Dagain. NP Check service address. OCC Service busy, try again. [62DSign-on Procedures: There are two types of sign on procedures. Type [68DA and Type B. Type A: To log onto a system with type A logon[60Dprocedure, the easiest way is through Telenet. Dial your local[62DTelenet port. When you receive the "@" prompt, type in the Type-A[65Dservice address (found later in the article) then follow the[60Dinstructions from there on. Type-B: Dial the your GTN telephone #,[66Dthen hit return twice. You will then see: "PLEASE ENTER YOUR [68DID:-1->" Type in a network ID number and hit return. You will then[66Dsee "PLEASE ENTER YOUR PASSWORD:-2->" Type in Network Password and[66Dhit return. Finally you will see the "CITICORP (city name)" welcome [68Dbanner, and it will ask you to select the service you wish to log [66Donto. Type the address and hit return. (A list of addresses will be[67Dprovided later) Trouble Shooting: If you should run into any [64Dproblems, the Citicorp personnel will gladly help their "employees"[67Dwith any questions. Just pretend you work for Citibank and they will[68Dgive you a lot. This has been tried and tested. Many times, when you[68Dattempt to log on to a system and you make a mistake with the [65Dpassword, the system will give you a number to call for help. Call[66Dit and tell them that you forgot your pass or something. It usually [75C[H[71C6[68Dworks, since they don't expect people to be lying to them. If you[65Dhave any questions about the network itself, call 305-975-5223. It[66Dis the Technical Operations Center (TOC) in Pompano, Florida[60DDial-Ups: The following list of dial-ups is for North America. I [67Dhave a list of others, but I don't think that they would be required[68Dby anyone. Remember: Dial-ups require Type-B log-on procedure.[61Dype-A is available on systems accessible through Telenet. Canada[65DToronto 416-947-2992 (1200 Baud V.22 Modem Standard) U.S.A. Los[63DAngeles 213-629-4025 (300/1200 Baud U.S.A. Modem Standard) Jersey [66DCity 201-798-8500 New York City 212-269-1274 212-809-1164 Service[65DAddresses: The following is a VERY short list of just some of the [66D100's of service addresses. In a later issue I will publish a [66Dcomplete list. Application Name: Type-A Type-B CITIADVICE 2240001600[68DCADV CITIBANKING ATHENS 2240004000 :30 CITIBANKING PARIS 2240003300[67D:33 CITIBANKING TOKYO 2240008100 :81 CITICASH MANAGER INTERNATIONAL[67D1 (NAFG CORP) 2240001200 CCM1 INTERNATIONAL 7 (DFI/WELLS FARGO)[63D2240013700 CCM7 COMPMARK ON-LINE 2240002000 CS4 ECONOMIC WEEK [67DON-LINE 2240011100 FAME1 INFOPOOL/INFOTEXT 2240003800 IP EXAMPLE OF [68DLOGON PROCEDURE: THE FOLLOWING IS THE BUFFERED TEXT OF A LOG-ON TO [68DCITIBANKING PARIS THROUGH TELENET. CONNECT 1200 TELENET 216 13.41[65DTERMINAL=VT100 @2240003300 223 90331E CONNECTED ENTER TYPE NUMBER OR[68DRETURN TYPE B IS BEEHIVE DM20 TYPE 1 IS DEC VT100 TYPE A IS DEC [75C[H[71C7[68DVT100 ADV VIDEO TYPE 5 IS DEC VT52 TYPE C IS CIFER 2684 TYPE 3 IS[65DLSI ADM 3A TYPE L IS LSI ADM 31 TYPE I IS IBM 3101 TYPE H IS HP 2621[68DTYPE P IS PERKIN ELMER 1200 TYPE K IS PRINTER KEYBOARD TYPE M IS MAI[68DBASIC 4 TYPE T IS TELEVIDEO 9XX TYPE V IS VOLKER CRAIG 4404 TYPE S[66DIS SORD MICRO WITH CBMP RELEASE BSC9.5 - 06JUN85 FOR 300 BAUD KEY ! [68DAND CARRIAGE RETURN CONFIG. K1.1-I11H-R-C-B128 ENTER TYPE NUMBER OR[67DRETURN K CONNECTED TO CITIBANK PARIS - CBP1 ,PORT 5 Have fun with[65Dthis info, and remember, technology will rule in the end. =====[63DPhrack Magazine presents Phrack 16 ===== ===== File 5 of 12 =====[65D--------------------------------------------------------------------[68D-------- | The Laws Governing Credit Card Fraud | | | | Written by[66DTom Brokaw | | September 19, 1987 | | | | Written exclusively for: |[68D| Phrack Magazine | | |[K[23D--------------------------------------------------------------------[68D-------- (A Tom Brokaw/Disk Jockey Law File Production) [67DIntroduction: ------------ In this article, I will try to explain[65Dthe laws concerning the illegal use of credit cards. Explained will[67Dbe the Michigan legislative view on the misuse and definition of [67Dcredit cards. Definition: ---------- Well, Michigan Law section 157,[68Ddefines a credit card as "Any instrument or device which is sold,[65Dissued or otherwise distributed by a business organization [68Didentified thereon for obtaining goods, property, services or [75C[H[71C8[68Danything of value." A credit card holder is defined as: 1) "The [65Dperson or organization who requests a credit card and to whom or for[68Dwhose benefit a credit card is subsequently issued" or 2) "The [68Dperson or organization to whom a credit card was issued and who uses[68Da credit card whether the issuance of the credit card was requested[67Dor not." In other words, if the company or individual is issued a [67Dcard, once using it, they automatically agree to all the laws and[65Dconditions that bind it. Stealing, Removing, Retaining or [63DConcealment: -------------------------------------------- Michigan[66DLaw states, that it is illegal to "steal, knowingly take or remove a[68Dcredit card from a card holder." It also states that it is wrongful[67Dto "conceal a credit card without the consent of the card holder." [68DNotice that it doesn't say anything about carbons or numbers[60Dacquired from BBSes, but I think that it could be considered part of[68Dthe laws governing the access of a persons account without the[62Dknowledge of the cardholder, as described above. Possession with [65DIntent to Circulate or Sell[K[27D------------------------------------------- The law states that it[66Dis illegal to possess or have under one's control, or receive a [68Dcredit card if his intent is to circulate or sell the card. It is[65Dalso illegal to deliver, circulate or sell a credit card, knowing[65Dthat such a possession, control or receipt without the cardholders [75C[H[71C9[68Dconsent, shall be guilty of a FELONY. Notice again, they say nothing[68Dabout possession of carbons or numbers directly. It also does not [68Dclearly state what circulation or possession is, so we can only[63Dstipulate. All it says is that possession of a card (material [68Dplastic) is illegal. Fraud, forgery, material alteration, [67Dcounterfeiting. ----------------------------------------------------[68DHowever, it might not be clearly illegal to possess a carbon or CC[66Dnumber. It IS illegal to defraud a credit card holder. Michigan law[67Dstates that any person who, with intent to defraud, forge, [66Dmaterially alter or counterfeit a credit card, shall be guilty of a [68Dfelony. Revoked or cancelled card, use with intent to defraud. [67D------------------------------------------------------ This states[66Dthat "Any person who knowingly and with intent to defraud for the[65Dpurpose of obtaining goods, property or services or anything of [68Dvalue on a credit card which has been revoked or cancelled or [62Dreported stolen by the issuer or issuee, has been notified of the[65Dcancellation by registered or certified mail or by another personal[67Dservice shall be fined not more than $1,000 and not imprisoned no[65Dmore than a year, or both. However, it does not clearly say if it is[68Da felony or misdemeanor or civil infraction. My guess is that it [65Dwould be dependant on the amount and means that you used and [65Dreceived when you defraud the company. Usually, if it is under $100, [75C[H[70C40[68Dit is a misdemeanor but if it is over $100, it is a felony. I guess [68Dthey figure that you should know these things. The People of The [65DState of Michigan vs. Anderson (possession)[K[43D------------------------------------------------ On April 4, 1980,[66DH. Anderson attempted to purchase a pair of pants at Danny's Fashion[68DShops, in the Detroit area. He went up to the cashier to pay for the[68Dpants and the cashier asked him if he had permission to use the [66Dcredit card. He said "No, I won it last night in a card game". The [67Dguy said that I could purchase $50 dollars worth of goods to pay[64Dback the debt. At the same time, he presumed the card to be a valid[67Done and not stolen. Well, as it turned out it was stolen but he had[67Dno knowledge of this. Later, he went to court and pleased guilty of[67Dattempted possession of a credit card of another with intent or [65Dcirculate or sell the same. At the guilty hearings, Mr. Anderson[64Dstated that the credit card that he attempted to use had been[61Dacquired by him in payment of a gambling debt and assumed that the[66Dperson was the owner. The trial court accepted his plea of guilty. [67DAt the sentencing, Mr. Anderson, denied that he had any criminal [66Dintent. Anderson appealed the decision stating that the court had [68Derred by accepting his plea of guilty on the basis of insufficient[66Dfactual data. Therefore, the trial court should not have convicted[66Dhim of attempted possession and reversed the charges. The People of [75C[H[71C1[68Dthe State of Michigan vs. Willie Dockery[K[40D------------------------------------------------------ On June 23,[66D1977, Willie Dockery attempted to purchase gas at a Sears gas[61Dstation by using a stolen credit card. The attendant noticed that [66Dhis driver's license picture was pasted on and notified the police. [68DDockery stated that he had found the credit card and the license at [68Dan intersection, in the city of Flint. He admitted that he knowingly[68Dused the credit card and driver's license without the consent of the[68Downer but he said that he only had purchased gasoline on the card.[66DIt turns out tha[6Ccredit card and driver's license was stolen [67Dfrom a man, whose grocery store had been robbed. Dockery said that [67Dhe had no knowledge of the robbery and previous charges on the [67Dcardwhich totalled$1,373.21. He admitted that he did paste his [63Dpicture on the driver's license. Butagain the court screws up, they[67Dreceive evidence that the defendant had a record of felonies dating[67Dback to when he was sixteen and then assumed that he was guilty on[66Dthe basis of his prior offenses. The judge later said that the [66Dpresent sentence could not stand in this court so the case was [64Dreferred to another court. Conclusion ---------- I hope that I have[67Dgiven you a better understanding about the law, that considers the[66Dillegal aspects of using credit cards. All this information was [66Dtaken from The Michigan Compiled Laws Annotated Volume 754.157a-s [75C[H[71C2[68Dand from The[10CAppeals Report. In my next file I will talk[65Dabout the laws concerning Check Fraud. -Tom Brokaw ===== Phrack [66DMagazine presents Phrack 16 ===== ===== File 6 of 12 ===== [61D********************************************************************[68D********** * * * Tapping Telephone Lines * * * * Voice or Data * * *[68D* For Phun, Money, and Passwords * * * * Or How to Go to Jail for a[67DLong Time. * * * [K[17D********************************************************************[68D********** Written by Agent Steal 08/87 Included in this file is...[67D* Equipment needed * Where to buy it * How to connect it * How to[65Dread recorded data But wait!! There's more!! * How I found a Tymnet[67Dnode * How I got in ************* THE EQUIPMENT ************* First[67Dthing you need is an audio tape recorder. What you will be [62Drecording, whether it be voice or data, will be in an analog audio [67Dformat. >From now on, most references will be towards data [67Drecording. Most standard cassette recorders will work just fine. [66DHowever, you are limited to 1 hour recording time per side. This can[60Da problem in some situations. A reel to reel can also be[64Dused. The limitations here are size and availability of A.C. Also, [67Dsome reel to reels lack a remote jack that will be used to start and[68Dstop the recorder while the line is being used. This may not present[68Da problem. More later. The two types of recorders I would advise [75C[H[71C3[68Dstaying away from (for data) are the micro cassette recorders and[65Dthe standard cassette recorders that have been modified for 8 to 10[67Dhour record time. The speed of these units is too unstable. The next[68Ditem you need, oddly enough, is sold by Radio Shack under the name [68D"Telephone recording control" part # 43-236 $24.95. See page 153 of [68Dthe 1987 Radio Shack catalog. ***************** HOW TO CONNECT IT [67D***************** The Telephone recording control (TRC) has 3 wires[67Dcoming out of it. #1 Telco wire with modular jack. Cut this and [68Dreplace with alligator clips. #2 Audio wire with miniature phone [67Djack (not telephone). This plugs into the microphone level input [65Djack of the tape recorder. #3 Audio wire with sub miniature phone [67Djack. This plugs into the "REM" or remote control jack of the tape [67Drecorder. Now all you need to do is find the telephone line, connect[68Dthe alligator clips, turn the recorder on, and come back later. [66DWhenever the line goes off hook, the recorder starts. It's that[63Dsimple. **************** READING THE DATA **************** This is[66Dthe tricky part. Different modems and different software respond [68Ddifferently but there are basics. The modem should be connected as[64Dual to the telco line and computer. Now connect the speaker output[68Dof the tape player directly to the telephone line. Pick up the phone[68Dand dial the high side of a loop so your line doesn't make a lot of [68Dnoise and garble up your data. Now, command your modem into the [75C[H[71C4[68Danswer mode and press play. The tape should be lined up at the [65Dbeginning of the recorded phone call, naturally, so you can see the[67Dlogin. Only one side of the transmission between the host and [68Dterminal can be monitored at a time. Going to the originate mode you[68Dwill see what the host transmitted. This will include the echoes[60Dterminal. Of course the password will be echoed as ####### for[66Dexample, but going to the answer mode will display exactly what the[67Dterminal typed. You'll understand when you see it. A couple of [63Dproblems you might run into will be hum and garbage characters on[65Dthe screen. Try connecting the speaker output to the microphone of[66Dthe hand set in your phone. Use a 1 to 1 coupling transformer [65Dbetween the tape player input and the TRC audio output. These [66Dproblems are usually caused when using A.C. powered equipment. The [68Dcommon ground of this equipment interferes with the telco ground[64Dwhich is D.C. based. I was a little reluctant to write this file[64Dbecause I have been unsuccessful in reading any of the 1200 baud [66Ddata I have recorded. I have spoke with engineers and techs. Even[65Done of the engineers who designs modems. All of them agree that it[66DIS possible, but can't tell me why I am unable to do this. I believe[68Dthat the problems is in my cheap ass modem. One tech told me I [68Dneeded a modem with phase equalization circuitry which is found in [67Dmost expensive 2400 baud modems. Well one of these days I'll find [75C[H[71C5[68D$500 lying on the street and I'll have nothing better to spend it[65Don! Ha! Actually, I have a plan and that's another file..... I [67Dshould point out one way of reading 1200 baud data. This should work[68Din theory, however, I have not attempted it. Any fully Hayes [68Dcompatible modem has a command that shuts off the carrier and allows[68Dyou to monitor the phone line. The command is ATS10. You would then[67Dtype either answer or originate depending on who you wanted to [67Dmonitor. It would be possible to write a program that records the[65Dfirst 300 or so characters then writes it to disk, thus allowing [65Dunattended operation. ************** HOW CRAZY I AM **************[66DPASSWORDS GALORE!!!! After numerous calls to several Bell offices, I[68Dfound the one that handled Tymnet's account. Here's a rough [61Dtranscript: Op: Pacific Bell priority customer order dept. How may I[68Dhelp you? Me: Good Morning, this is Mr. Miller with Tymnet Inc. [64DWe're interested in adding some service to our x town location. Op:[67DI'll be happy to help you Mr. Miller. Me: I need to know how many[65Dlines we have coming in on our rotary and if we have extra pairs on[66Dur trunk. We are considering adding ten additional lines on that [66Drotary and maybe some FX service. Op: Ok....What's the number this [68Dis referenced to? Me: xxx-xxx-xxxx (local node #) Op: Hold on a[63Dmin....Ok bla, bla, bla. Well you get the idea. Anyway, after asking[68Dher a few more unimportant questions I asked her for the address. No [75C[H[71C6[68Dproblem, she didn't even hesitate. Of course this could have been[65Davoided if the CN/A in my area would give out addresses, but they[65Ddon't, just listings. Dressed in my best telco outfit, Pac*Bell [68Dbaseball cap, tool belt and test set, I was out the door. There it[66Dwas, just an office building, even had a computer store in it. After[68Dexploring the building for awhile, I found it. A large steel door [67Dwith a push button lock. Back to the phone. After finding the number[68Dwhere the service techs were I called it and talked to the tech [65Dmanager. Mgr: Hello this is Joe Moron. Me: Hi this is Mr. Miller (I[67Dlike that name) with Pacific Bell. I'm down here at your x town node[68Dand we're having problems locating a gas leak in one of our Trunks. [68DI believe our trunk terminates pressurization in your room. Mgr: I'm[68Dnot sure... Me: Well could you have someone meet me down here or [68Dgive me the entry code? Mgr: Sure the code is 1234. Me: Thanks, I'll[68Dlet you know if there's any trouble. So, I ran home, got my VCR [67D(stereo), and picked up another TRC from Trash Shack. I connected[65Dthe VCR to the first two incoming lines on the rotary. One went to [67Deach channel (left,right). Since the volume of calls is almost [65Dconsistent, it wasn't necessary to stop the recorder between calls.[67DI just let it run. I would come back the next day to change the[63Dtape. The VCR was placed under the floor in case a tech happened to [68Dcome by for maintenance. These nodes are little computer rooms with [75C[H[71C7[68Dair conditioners and raised floors. The modems and packet switching[67Dequipment are all rack mounted behind glass. Also, most of the nodes[68Dare unmanned. What did I get? Well a lot of the logins were 1200, so[68DI never found out what they were. Still have 'em on tape though! [66DAlso a large portion of traffic on both Tymnet and Telenet is those [68Dlittle credit card verification machines calling up Visa or Amex.[65DThe transaction takes about 30 secs and there are 100's on my tapes.[68DThe rest is as follows: Easylink CompuServe Quantumlink 3Mmail [63DPeopleLink Homebanking USPS Chrysler parts order Yamaha Ford Dow [67DJones And a few other misc. systems of little interest. I'm sure if [68DI was persistent, I'd get something a little more interesting. I [67Dspent several months trying to figure out my 1200 baud problem. When[68DI went back down there the code had been changed. Why? Well I didn't[68Dwant to find out. I was out of there! I had told a couple of people [68Dwho I later found could not be trusted. Oh well. Better safe than[65Dsorry. ************************************** Well, if you need to[66Dreach me,try my VMS at 415-338-7000 box 8130. But no telling how [66Dlong that will last. And of course there's always P-80 systems at[65D304-744-2253. Probably be there forever. Thanks Scan Man, whoever [67Dyou are. Also read my file on telco local loop wiring. It will help[67Dyou understand how to find the line you are looking for. It should [67Dbe called Telcowiring.Txt <<< AGENT STEAL >>> ===== Phrack Magazine [75C[H[71C8[68Dpresents Phrack 16 ===== ===== File 7 of 12 =====[K[49D--------------------------------------------------------------------[68D---- - The Disk Jockey - - presents: - - - - Reading Trans-Union [68DReports: - - A lesson in terms used - - (A 2af presentation) - [64D--------------------------------------------------------------------[68D---- This file is dedicated to all the phreaks/hacks that were [65Dbusted in the summer of 1987, perhaps one of the most crippling [68Dsummers ever for us. Preface: ------- Trans-Union is a credit [62Dservice much like CBI, TRW or Chilton, but offers more competitive[66Drates, and is being used more and more by many credit checking [67Dagencies. Logging in: ---------- Call one of the Trans Union [64Ddial-ups at 300,E,7,1, Half Duplex. Such a dial-up is 314-XXX-XXXX. [68DAfter connecting, hit Ctrl-S. The system will echo back a 'GO ' and [68Dthen awaits you to begin the procedure of entering the account and [67Dpassword, then mode, i.e.: S F1111,111,H,T. The system will then [65Dtell you what database you are logged on to, which is mostly [66Dinsignificant for your use. To then pull a report, you would type[65Dthe following: P JONES,JIM* 2600,STREET,CHICAGO,IL,60604** . The [65Dname is Jim Jones, 2600 is his street address, street is the street[67Dname, Chicago is the city, IL is the state, 60604 is the zip. The [67DReport: ---------- The report will come out, and will look rather [66Dodd, with all types of notation. An example of a Visa card would be: [75C[H[71C9[68DSUB NAME/ACCT# SUB# OPEND HICR DTRP/TERM BAL/MAX.DEL PAY.PAT MOP[64DCITIBANK B453411 3/87 $1000 9/87A $0 12111 R01 4128XXXXXXXXX $1500 [68D5/87 $120 Ok, Citibank is the issuing bank. B453411 is their [64Dsubscriber code. 3/87 is when the account was opened. HICR is the[65Dmost that has been spent on that card. 9/87 is when the report was [68Dlast updated (usually monthly if active). $1000 is the credit line.[67D$0 is the current balance. 12111 is the payment pattern, where [63D1=pays in 30 days and 2=pays in 60 days. R01 means that it is a[63D"Revolving" account, meaning that he can make payments rather than[66Dpay the entire bill at once. 4128-etc is his account number (card[65Dnumber). $1500 is his credit line. 5/87 is when he was late on a[64Dpayment last. $120 is the amount that he was late with. Here is a [67Dlist of terms that will help you identify and understand the reports[68Dbetter: ECOA Inquiry and Account Designators[K[44D------------------------------------ I Individual account for sole[66Duse of applicant C Joint spousal contractual liability A Authorized[67Duser of shared account P Participant in use of account that is [65Dneither C nor A S Co-signer, not spouse M Maker primarily liable for[68Daccount, co-signer involved T Relationship with account terminated U[68DUndesignated N Non-Applicant spouse inquiry Remarks and FCBA Dispute[68DCodes --[10C------------------ AJP Adjustment pending BKL [65DBankruptcy loss CCA Consumer counseling account CLA Placed for [75C[H[70C50[68Dcollection CLO Closed to further purchases CTS Contact Subscriber[65DDIS Dispute following resolution DRP Dispute resolution pending FCL[67DForeclosure MOV Moved, left no forwarding address ND No dispute PRL[67DProfit and loss write-off RFN Account refinanced RLD Repossession,[66Dpaid by dealer RLP Repossession, proceeds applied towards debt RPO[66DRepossession RRE Repossession, redeemed RS Dispute resolved RVD [67DReturned voluntarily, paid by dealer RVN Returned voluntarily RVP[65DReturned voluntarily, proceeds go towards debt RVR Returned [63Dvoluntarily, redeemed SET Settled for less than full balance STL [66DPlate (card) stolen or lost TRF Transferred to another office Type[66Dof Account --------------- O Open account (30 or 90 days) R [64DRevolving or option account (open-end) I Installment (fixed number[66Dof payments) M Mortgage C Check credit (line of credit at a bank) [68DUsual Manner of Payment ----------------------- 00 Too new to rate;[67Dapproved, but not used or not rated 01 Pays (or paid) within 30 days[68Dof billing, pays accounts as agreed 02 Pays in more than 30 days, [67Dbut not more than 60 days 03 Pays in more than 60 days, but not more[68Dthan 90 days 04 Pays in more than 90 days, but not more than 120 [68Ddays 05 Pays in 120 days or more 07 Makes payments under wage earner[68Dplan or similar arrangement 08 Repossession 8A Voluntary [68Drepossession 8D Legal repossession 8R Redeemed repossession 09 Bad[66Ddebt; placed for collection; suit; judgement; skip 9B Placed for [75C[H[71C1[57DUR Unrated UC Unclassified Kinds of Business [65DClassification ------------------------------- A Automotive B Banks[67DC Clothing D Department and variety F Finance G Groceries H Home [67Dfurnishings I Insurance J Jewelry and cameras K Contractors L [66DLumber, building materials M Medical and related health N National[66Dcredit card O Oil and national credit card P Personal services other[68Dthan medical Q Mail order houses R Real estate and public [65Daccommodations S Sporting goods T Farm and garden supplies U[60DUtilities and fuel V Government W Wholesale X Advertising Y [64DCollection services Z Miscellaneous Type of Installment Loan [66D-----------[13C AF Appliance/Furniture AP Airplane AU[62DAutomobile BT Boat CA Camper CL Credit line CM Co-maker CO [66DConsolidation EQ Equipment FH FHA contract loan FS Finance statement[68DHI Home improvement IN Insurance LE Leases MB Mobile home MC [67DMiscellaneous MT Motor home PI Property improvement plan PL Personal[68Dloan RE Real estate ST Student loan SV Savings bond, stock, etc. US[67DUnsecured VA Veteran loan Date Codes ---------- A Automated, most [68Dcurrent information available C Closed date F Repossessed/Written[65Doff M Further updates stopped P Paid R Reported data S Date of last [68Dsale V Verified date Employment Verification Indicator [56D--------------------------------- D Declined verification I Indirect[68DN No record R Reported, but not verified S Slow answering T [75C[H[71C2[68DTerminated V Verified X No reply Hope this helps. Anyone that has[65Dused Trans-Union will surely appreciate this, as the result codes [67Dare sometimes hard to decipher. -The Disk Jockey #### PHRACK [64DPRESENTS ISSUE 16 #### ^*^*^*^Phrack World News, Part 1^*^*^*^ ****[67DFile 8 of 12 **** >From the 9/16 San Francisco Chronicle, page A19:[67DGERMAN HACKERS BREAK INTO NASA NETWORK (excerpted) Bonn A group of [68DWest German computer hobbyists broke into an international computer[67Dnetwork of the National Aeronautics and Space Administration and[64Drummaged freely among the data for at least three months before they[68Dwere discovered, computer enthusiasts and network users said[60Dyesterday. An organization in Hamburg called the Chaos Computer[63DClub, which claimed to be speaking for an anonymous group that broke[68Dinto the network, said the illicit users managed to install a [68D"Trojan horse," and gain entry into 135 computers on the European[65Dnetwork. A "Trojan Horse" is a term for a permanent program that [68Denables amateur computer enthusiasts [as opposed to professionals?],[68Dor "hackers," to use a password to bypass all the security [65Dprocedures of a system and gain access to all the data in a target[66Dcomputer. [Actually, this type of program is a 'back door' or a [67D'trap door.' The group may very well have *used* a Trojan horse to[66Denable them to create the back door, but it probably wasn't a Trojan[68Dhorse per se. A Trojan horse is a program that does something [75C[H[71C3[68Dillicit and unknown to the user in addition to its expected task.[65DSee Phrack xx-x, "Unix Trojan Horses," for info on how to create a[66DTrojan horse which in turn creates a trap door into someone's[61Daccount.] The NASA network that was broken into is called the Space[67DPhysics Analysis Network [ooh!] and is chiefly designed to provide [67Dauthorized scientists and organizations with access to NASA data. [66DThe security system in the network was supplied by an American [67Dcompany, the Digital Equipment Corp. [Probably DECNET. Serves them[65Dight.] Users said the network is widely used by scientists in the [68DUnited States, Britain, West Germany, Japan and five other countries[68Dand does not carry classified information. A Chaos club spokesman,[66DWau Holland, denied that any data had been changed. This, he said, [68Dwent against "hacker ethics." West German television reports said[65Dthat computer piracy carries a penalty of three years in prison in[66DWest Germany. The government has not said what it plans to do. The[66DChaos club clearly views its break-in as a major coup. Holland, [68Dreached by telephone in Hamburg, said it was "the most successful[65Drunning of a Trojan horse" to his knowledge, and the club sent a [66Dlengthy telex message to news organizations. It said the "Trojan[64Dhorse" was spotted by a user in August, and the infiltrating group[66Dthen decided to go public because "they feared that they had entered[68Dthe dangerous field of industry espionage, economic crime, East- [75C