đŸ Archived View for clemat.is âș saccophore âș library âș ezines âș 2600 âș 2600_1-2_djvu.txt captured on 2022-01-08 at 14:17:16.
View Raw
More Information
âŹ
ïž Previous capture (2021-12-03)
-=-=-=-=-=-=-
2600 Magazine - Volume 1, Number 2
2600 February, 1984
I l iiMi>"Ii.'iI iiikinl III l hi I S 1 1 .V .141 rtkL'IIMMflHIY Prilimi-r-PlHH. >pt'wmpihi'r*
SHi âiKMultL WmI 4 111 âNNIL Jhi» XU, MiihJk Island. XV I IWV
â 1 â '
VOLUME ONE NUMtifUt TWO
HACKING ON TELENET
Itâs as easy
Telenet. Or, to be more specific, GTE Telenet. A massive
net work formed by the people and technology that were 1
used to develop packet switching for the Department of
Defense. Telenet wai purchased by GTE in 1979 and has
been growing in ante and revenue ever since. *
There are quite a few data networks in existence today.
Datapac* Autonet, Tymnet* Arpanet; to name some of the
better known. A data network is basically a collection of
mainframes, specialized minis, and high-speed lines.
Through Telenet, you can connect to literally thousands of
computers* all over the country, even the world if you know
the proper procedures. All this is possible by making a local
phone call, in most parts of the country. [Telenet access
numbers are made readily available to the public by Telenet
and systems on the network, such as the Source.
CompuServe, etc.]
Once your modem is connected to Telenet, you have to hit
two carriage returns. You'd see:
telenet
XXX XXX
where the first 3 Xâs are the area code you're connected to
and the rest comprise the Telenet node identifier. Youâll then
be asked fo^your terminal identifier Usually âDlâ works
for most terminals, but a simple carriage return is also
accepted:
At this point you first receive the <g* prompt. It is from
here that you get places. And that 1 ! what's io unique about
Teienet-^the ivay in which you get places. You simply type a
"C", a space* and the Telenet address. Then you enter the
area code of the computer you want to connect to. followed
by a two or three digit code. Thatâs all there is to it. Telenet
tells you whether or not youâve found a working computer.
If you want to exit from one computer and connect to
another, just type an Youll then get the Telenet (§>
prompt, Before you type the next address, type "D" to
disconnect from the computer you're still connected to.
Hackers across the country hive for years programmed
their computers to scan the system for interesting things. All
that 1 has to be done is (his: Pick the city you want to scanâ
Id's say Boston. The -area code is 61 7. Have your computer
start its search at address 61 TOOL [f you get connected to a
^-v computer. Telenet will skip a line and print 617 001
CONNECTED. If you donât get connected, there are a
variety of messages you could get. 617 00 i REJECTING,
617 001 NOT RESPONDING, 617 001 NOT REACH-
ABLE. 617 001 REFUSED COLLECT CONNECTION
iincr a few of them. They all mean basically the some thingâ
as 123456!
there is no way to hook up to this address.
At this point, several things can bedone. Naturally, you'll
want to increment the address by one and search for a
computer at address 617002. But how do you have your
computer recognize when a connection has been made? This
is necessary because you can't just keep entering
OXXXXXX over and overâ once you get connected, you
have to enter the â(§T to get baekro the Telenet prompt,
followed by a Of course* you could type C XX XX XX,
followed by â©T followed by *âD" for every attempt, but
that can get rather time consuming. It's better simply to be
able to save to disk or output to a printer the addresses of
connections. And. fortunately for hackers, Telenet makes
that very easy.
You fan either search for a string that has the word
"CONNECT" in it somewhereâ the only time youâd End
one would be when you got the CONNECTED message.
But* as we mentioned earlier* an extra line is skipped right
before the CONNECTED message, for some reason. Why
hot simply look for that extra line? if you get it* record the
address, send the and W D" and increment by L tfyou
donât get the extra line* simply increment by I.
Naturally, you. will be collecting Telenet addresses for
informational purposes only, to find out which computers
are located where, in case you ever have to get onto one in an
emergency of some sort.- Keep in mind that you are not
entering any of these computers; you're merely connecting
for a brief second or two. And there is no login procedure or
identity check for Telenet, so you're not fraudulently using
their system either.
Also, the area code system is not the only system that
works on Telenet. These are simply set up to be convenient,
but an address qati actually have any kind of a number in it.
For example* addresses beginning with 3 1 1 or 909 (the latter
being Telenetâs own private "area code") aiso abound, and
there are certain to be many more.
Without a doubt, though, itâs the existence of the area
code system that has helped Telenet become one of the
easiest data networks to hack. And until they install some
sort of a user idem! Hem ion program, or at least have the
system disconnect after it becomes obvious that there* a
strange person online* hackers will continue to be one or
Telenetâs biggest problems.
If you have information to share with us about this or any
other data network, please send it in. Requests for
anonymity will he respected.
1
ESS: ORWELLâS PROPHECY
. There it as of course no way t?f knowing whether you were
being watched at any given moment. Mow often, or on what
system, the Thought Police plugged in on any individual
wire was guesswork, it was even conceivable that they
watched everybody all the time. But at any rate they could
plug in your wire whenever they wanted to , You had to
liveâ did five , from habit that became instinctâ in the
assumption that every sound you made was overheard \ and
except in darkness, every movement scrutinized.
From Nineteen Eighty-Four
ESS is the big brother of the Bell family. Us very name
strikes fear and apprehension into the hearts of most
phreakers* and for a very good reason. ESS (Electronic
Switching System) knowsthe full story on every telephone
hooked into it. While it may be paranoid to say that all
phreaking will come to a screeching halt under ESS, it's
certainly realistic to admit that any phreak whose central
office turns to ESS will have to be a lot more careful.
Hereâs why.
With electronic switching, every single digit dialed is
recorded. This is useful not only formatting phneaks but for
-settling billing disputes. In the past, there has been no easy
way for the phone company to show you what numbers you
dialed locally. If you protested long enough and loud
enough, they might have pui a pen register on your line to
record everything and prove it to you. Under ESS, the actual,
printout (which will be dug out of a vault somewhere if
needed) shows every fast digit dialed. Every BOO call, every
call to directory assistance, repair service, the operator,
every rendition of the 1313 Overture, everything! Here is an
example of a typical printout* which shows time of connect*
length of connect, and number called.
DATE
TIME
LENGTH UNITS
NUMBER
0603
1511
3
l
4$t7*90
0603
1525
5 -
3
345-67*9
0603
16*1
1
0
â 000-411
0603
1603
l
Y
0(03
1*03
2.35*
112-345-67*9
0(03
I(J4
1
0
OSOC-OH (T5P5)
A thousand calls to âBOO" will show tip adjust thatâ a
thousand calls to "8<XH Every touch tone or pulse is kept
track of and for most p breaks, this in itself wonât be very
pretty.
Somewhere in the hallowed halls of 195 Broadway, a
Traffic Engineer did an exhaustive study of all 800 calls over
the past few years* and reached the following conclusions:
(1) Legitimate calls to 800 numbers last an average of 3
minutes or less. Of the illegal (i.e, p breakers) calls made via
BOO lines* more than 80 percent lasted 5 minutes or longer:
(2) The average residential telephone subscriber makes five
such calls to an 800 number per month. Wheneverp breakers
were being watched, that number was significantly higher.
As a result of this study * one feature of ESS is a daily log
called the **800 Exceptional Calling Report,"
Under ESS, one simply does not place a 2600 hertz tone
on the line, unless of course* they warn a telco security
representative out/ a policeman at theirdoor within an hour!
The new generics of ESS (the ff 5} row in production, with an
operating prototype in Geneva. Illinois, allow the, system to
silently detect all âforeign" tones not available on the
customerâs phone. You have exactly twelve buttons on your
touch-toneÂź phone. ESS knows what they are, and you had
best not sound any other tonei on the line, since the new #5 is
programmed to silently notify a human being in the central
office, while continuing with your call as though nothing
were wrongâ Someone will just punch a few keys on their
terminal, and the whole sordid story will be right in front of
them, and printed out for action by the security
representatives as needed,
Traci ng of calls for whatever reason (a busive ca ills, fraud
calls* etc*) is done by merely asking the computer right from
a terminal in the security department. With ESS, everything
is right up front, nothing hidden Or concealed in
electromechanical frames, etc. Itâs merely a software
program! And a program designed for east in operation by
the phone company. Call tracing has become very
sophisticated and immediate , Thereâs no more running in
the frames and looking for long periods of time. ROM chips
in computers work fast, and that is what ESS is all about.
Phone ph rea ks a re riot t he only reason fo r ESS . but it was
one very important one. The first and foremost reason for
ESS is to provide the phone company with better control on
billing and equipment records* faster handling of calls (i.e,
less equipment tied up in the office at any onetime), and to
help agencies such as the FBI keep better account of who
was calling who from where, etc. When the FBI finds out
that someone whose calls they want to trace is on an ESS
exchange, they are thrilled because itâs so much easier for
them then, ,
The United States wonât be 100 percent ESS until
sometime in the mid 1 990âs. Bui in real practice* all phone
offices in almost every city are getting so me oft he most basic
modifications brought about by ESS. â911" service is an
ESS function. So is AN1 (Automatic Number Identi-
fication) on longdistance calls. âDial tone firstâ pay phones
are also an ESS function. None of these things were
- available prior to ESS. The amount of pure fraud calling via
bogus credit card, third number billing, etc. on Sell s lines
V led to the decision to rapiidly install the AN I* for example,
â even if the rest of the ESS was several years away
in some cases,, , , .. . ,
Depending on how you choose to Look at the whole
concept of ESS* it can be either one of the most
advantageous innovations of all time or one of the scariest.
The system is good for consumers in that it can take a lot of
activity and do lots of things that older systems could never
do. Features such as direct dialing overseas, call forwarding
(both of which open up new worlds of phrcakmg which we II
explore m later bsues), and Call holding are steps forward*
without question. But at the same time, what do all ot tnc
nasty implications mentioned further back mean to the
average person on the sidewalk? The system is perfectly
capable of monitoring anyone, not just phone phreaks.
What would happen if the nice friendly government we have
now somehow got overthrown and a mean nasty one took .is
place? With ESS, they wouldnât have to do too much work,
just come up with some new software. Imagine a phone
system that could tell the authorities how many calls you
placed to certain types of people, I.e blacks, communists,
laundromat service employees ESS could do it. if so
programmed- â
Tins was the first in an occdaiohaf scries on the for and
dangers of ESS-
ABC
UNO
OPER
OPER
Times Changing For Directory Assistance
t'lHTiJiirrd Nm Kwinn
Directory Assistance promises to have a very different
future, both in the US. and in France. Here in the States,
customers are being threatened with a 75c charge for long
distance information requests. In a few parts of the country,
Indiana (812) for instance, a request for a phone number
produces startling results: a human will answer and ask for
the city and name, and after finding it will hit a button,
whereupon . a machine takes over and spits out the number
with a digitized voice. Vou are then given the option to hold
on to be reconnected to another D,A. operator.
This kind of system makes multiple requests quite
inconvenient â forcing one to either wait to be reconnected
-to a human, or dial over and over again. This latest step
towards total mechanization also strikes fear into the hearts
of the D.A. operators, many of whom do not wish to lose
their fun jobs. ,
France* meanwhile; .has a nationalized phone system run
by the Ministry of Posts and Telecommunications* an
agency which has been experimentally offering com-
puterized telephone information (Teletel) to 70*000 users.
The Ministry provides* for free; a small terminal called a
Minitel which Has a keyboard that folds up over the screen.
To find a number* a user enters the name* address, region
of France* and profession of the person theyTe looking for.
If just the name and city are entered* all of the people with
that name m that city will be displayed. The system does not
yet list all of FrttJCb* but should by June, The Ministry
expects to haW Ttfuffitfrt terminals In use within two years.
In addition Id TWttrf; fS-othet services will be provided,
including news, node quotations, shopping catalogs*
banking systems, as well C railroad, airline* and movie
schedules.
Perhaps this Twill pvt AT&T some ideas. Imagine being
able to call a distance city- and get phone numbers for
everybody named Smith! Electronic phone book hacking
could be a cohstderebte amodm of fun.
âą ' â * .â!â â â ; ;
No Hacking While Flying, Please
EL'em^ntll Not
Eastern AirpOwt nbw xpdciftcdly prohibits the use of
The fwUUgatTBttTOW fe thm porttbte computers can
interfere wkh-i%4l equipment^ causing all
kinds of ftrahgt thjM : ^happen. When a company
spokesperson for Ut« Mt#u Mid carrier was asked if any
specific incsd«n^ : : gM^ : Hibw.- pioki^« she responded
that an incid^l^rdbl ^Mj that nothing more
could be said; ; ^* r - . â _ ^ ^ .
A possible bbj^tt bf the airline has been proposed by
Wayne GreeiK pftWh^Oftbdma^iine Miirocompitters
Trick of tftiâMtfftth
}MluN(wibnae ' ' â â â
Many ropetMrici^.bi ttato having passed a u bottle biir
of sorts are machines. You put an
empty alumutUttflfek^tatt mthe machine, UPC code up,
and the mach^ it and gives you money. Well,
some hackers have discovered (hat these machines work for
all beverage can/ depo&i br not. In some stales, Tor
example* n on-carbonated beverages (iced tea) don't carry a
deposit even though the cans are exactly the same as the ones
containing carbonated drinks, A human will not take those
cans back* but the machines will, gladly.
By the way, we haven't heard from anyone whoâs tried
putting a full soda can in one of these machines. It would be
interesting to find out if the machine tries to crush it* More
interesting to see if it succeeds.
Death Star Cards Spell Woe
IbH Nm iiirnci
.Many of the long-awaited AT&T credit cards are now
being distributed. You will be impressed when you get
yours â complete with a picture of the AT&T death star
floating over planet Earth, while the new AT&T red, blue*
and black stripe looks on.
But with these cards come a few problems. For one thing,
many customers of New York Telephone received their PIN
^ards only days before they got their AT&T cards. What is a
PEN card? Well* PIN stands fot Personal Identification
Number* but other than that, it's really the exact same thing
as an AT&T card* except that it doesn't have a magnetic
stripe. It also only has four numbers on itâ the last part of
your 14-digft code {your phone number comprises the first
part). New York Telephone proudly claims that this secures
your code* since if you lose your card, whoever finds it won't
know your phone number nor he able to find out because
your name isn't even on tt. So along comes AT&T sending
out their cardsto everyone who got a PIN card, AT&T cards
have your name and your , 1 4-digit code prominently
displayed fyes, the last four digits are the same as New York
Telephone's). Result: the PIN cards are completely useless,
both because they're redundant and because their purpose
has been defeated,
AT &T has made a serious mistake with these cards. First
of all, since so many of them are in the mail at the same time,
many will be stolen, perhaps within the post office itself.
Second, there are no security precautions whatsoever at
those new credit card phones. You simply plug in the card
and dial away. No identity codes to enter, like the bank cards
require. With 5,000 of these phones (which also accept
American Express card$) scheduled to be installed this year,
credit card fraud for AT&T will almost certainly rise, not so
much due to phone phreaks, but rather, simple common
thieves.
An official at AT&T said that (hey were rot overly
concerned, **WeTe counting on people's honesty," they said.
We'll see what they say next year,
ADS Investigation Moved?
WtirJ of Mvirili
It's been rumoured that the FBI investigation of IBM
Audio Distribution System hackefc has now been
headquartered in another city (i.e, not Detroit). Last month*
2600 published a rather extensive report on the
investigation* including the name of (he city and the
informant who started this whole mess, John Max field of
JFM Industries in Detroit.
Several threats have allegedly been made by Maxfield to a
group of hackers who helped expose him. This is reportedly
being done against the wishes of the FBI. 2600 is currently
investigating the authenticity of (hese threais and, if (hey
check out, you can count on seeing a transcript next month.
3
I
SOME THOUGHTS ON âGARBAGE PICKINGâ
H
Garbage picking is the an of finding things that someone
else has thrown away. Hackers on time-sharing systems are
Long familiar with the technique of asking the operating
system for some memory or mass storage space that has not
yet been zeroed out n and then dumping out whatever was in
[hereto the screen or printer. Things like password files and
system programs are always updated or backed up from
time to time* and that's when a âgarbage copy" will be
created. The alert hacker will find this if he or she Looks hard
enough.
You can even do some garbage picking with your own
microcomputer! Occasionally, when a software house
creates a disk* it copies over an entire disk, not just the
programs that they happen to be selling on that disk. You
might find old copies of the vendorâs programs sitting in
there, or all kinds of other stuff.
For those of you without computers, there are other ways
you can join in on the fun. Many a tale has been told on the
"** Local bulletin boards about the enterprising phone phreaks
who snuck around to their local phone company's central
office early one mornings and snooped through the
dumpsters. Jn the oJd mechanical switching areas, you might
find wires* relays, and other biis and pieces that an
â electronics hobbyist would enjoy. In areas served by
electronic switching, computer printouts are more likely,
jnd you might even find the garbage hoppers locked to
prevent pholks like you from snooping around Remember,
other peopleâs garbage is sometimes considered their private
property, Be sure to check with your local authorities on the
legalities of digging into large corporationsâ back yards
before you find out what the rules are the hard way. One
person who almost got into trouble over this was a Slew
York City sculptor who was poking through the trash cans
around Richard Nixon's townhotise and got picked up by
[he SS (Secret Service). He told the judge that, he was
t I a n n ing to m a ke a scu tp ture of the former presid ent out of
garbage, and he wanted to use the real stuff. The judge*
obviously, a man of refined artistical tastes* allowed the
sculptor to poke through the. garbage without molestation.
Other kinds of garbage picking require some more
' " technical knowledge and a bit of construction ability. One
possibility that could keep you project builders busy is a
cross- talk amplifier. For those of you who arenât familiar
with the term, cross-talk (on your telephone) is when you
a phone conversation that you're having. If you build an
amplifier that can filter out the background noise and
amplify only the narrow bandwidth where the voice is
transmitted through the phone lines* you might be able to
make out what the folks are saying, for ail the good it will do
you. But there are other things you can hear in this electronic
garbage heap. Suppose one day you hear cross-talk of a
modem conversation? if you could amplify it and feed it into
your computer, you would be able to monitor someone
else's entire computer session, Suppose you hear someone
entering in louch-toneÂź codes to some local call extender?
All you have to do is build yourself a tone decoder (you can
find schematics for these things in any Radio Shack) and
figure out what the person entered. Obviously* once you are
able to amplify the cross-talk to a reasonable level* your best
bet is to tape-record the material so that you can experiment
with the best way to feed it into the computer or tone
decoder that will be further deciphering it.
There have been talcs told of one enterprising phreak who
built a tone decoder and then called up his favorite call
extender. He then called some "deadâ* line (such as the silent
half of a loop line somewhere; other possibilities could be a
disconnected number [you hear silence after the recording
finishes] or even your own phone* if you have a second Jine
you can use) and turned on his tape recorder. Jt wasnât too
long before he heard the cross-talk of someone else using the
extender* and he picked up ten new codes inside of a week!
Of course, he needed a working code to sign onto the thing in
the first place* but there are some extenders where you can
âhold the line open" by hitting some key every now and then.
The nice thing about this kind of hacking is that you only
need to make one phone call to find things out, while
standard hacking requires a separate phone call for each
attempt at a new code. No system in existence could detect a
fellow with a tape recorder and a tone decoder listening in,
although it + s certainly possible that someday* someone
could design their phone circuits to be 100% free
of cross-talk.
That's all we have for now on the subject of garbage
i picking. If you come up tyith any more places where an
inquisitive person might find some interesting information
lying around, be sure to write in and let us know. Please
include your method of âdigging up** the garbage, and
suggestions to all those other people out there who will try to
duplicate your results.
Q&A
Q, How doesthe ojierator fmd uui if you are coifing front a
fan? booth or a house font? is there any t cay to defeat this ?
-^California
A, A pay phone is wired up directly to the TSPS (Traffic
Service Position System, basically the. operator at a
switchboard) circuit. A light on the console flashes and
shows the caller to be at a pay phone. To convince the TS PS
that it wasn't actually a pay phone, you would have to go
into ihe switch room and rewire i* r The distinction is not
made within the phone itself, but in the central office. You
receive a dial tone through the TSPS circuit before it goes to
the central officeâ it's connected in scries with it. Everything
you do goes through the TSPS circuit, whei her it's local or
not. In sh on*. i here's no way around it.
Got a question for os? Write it down and send it to usf We 7/
do our best to come up with an answer. Send it along to:
2400
Box 752
Middle /stand, AT II 953
^ ^
2600 needs writers! This could be your big
chance!! If you come up with something to
contribute, send it in to the address at the
end of Q & A. Please send us your
comments and criticisms as well. And
spread the word! 2600 is bringing the good
word of hackers andphreakers throughout
the land of disks and relays!
4
2600
page f
AFGHANISTAN - S3
ALBANIA - 3?5
ALGERIA - 21 - 3. 4. 09 5 *
ANDORRA - 33 - AP 07E
ANGOLA - 244
ARGENTINA - 54 - 1, 21 , 41, OR 51
AUSTRALIA - SI - DI-3
AUSTRIA - 43 - D4
BAHRAIN - 973
BANGLADESH - 880
BELGIUM - 32 - DI-2
BELIZE - 501
BENIN - 229
BHUTAN - * - 1400 PHONES
BOLIVIA - 591
BOTSWANA - 267
BRAZIL - 55 - D2 (XI)
BRUNEI - 673 '
BULGARIA - 359
BURfIR - 95
BURUNDI - 257
CAMEROON * 237
CAPE VERDE - 238
CENT. AFRICAN REPUBLIC - 23G
CHAD - 235
CHILE - 58 - Dl-2
CHINA (MAINLAND) - *
COLOMBIA - 57 - D3 OR D5
COMORO IS. - 2G9
CONGO - 242
COSTA RICA- - 508
CUBA - *
CYPRUS -357-- DZ (XI)
CZECHOSLOVAKIA - 42
DENMARK - 45 - CODES 1-S, FAROES IS 42
DJIBOUTI - 253
DOMINICA - *
ECUADOR - 593 - D2 OR D4
EGYPT - 20
EL SALVADOR - 503 - D2 DR D 4
EBU. GUINEA - 2«0
ETHIOPIA - 251
FALKLAND IS. - *
FIJI - 679
FINLAND,- 35B - CODE O OB D2
FRANCE - 33 - CODE 1 OR D2
FRENCH GUIANA - SS4
FR. âOLYNESIA - 663
GABON - 241
GAMBIA - 2 20
GERMAN DEN. REPUBLIC - 37 - DJ-5
FEDERAL REP, OF GERMANY - 49 - D2-4
GHANA - 233 t
GIBRALTAR - 350
GILBERT IS. - BBS
GREECE ^ 30 - CODE 1 OR D2-3
' GRENADA - *
MACAO - 553
MADAGASCAR - 251
MALAYSIA - 80 - CODES 3* OR 5
MALDIVES - +
MALI - 223
MALTA - 356
MARIANA. IS. - *
MARTINIQUE - 59B
MAURITANIA - 222
MAURITIUS - 230
MEXICO - 52 1
MCNACO - 33
MONGOLIA - 976
MOROCCO - 21 - CODES 0. 1 . . OR 2 *
MOZAMBIQUE - 256
NAURU - 874
NEPAL - 377
NETHERLANDS - 31 - DZ OR D*.
NETH. ANTILLES - 599 - D1
NEW CALEDONIA - 687
NEW HEBRIDES - 678
NEW ZEALAND - 64 - D2-5
NICARAGUA - 505 - Dl-Z
NIGER - 227
NIGERIA - 23 4 - D2-3 (QXX)
NORWAY - 47 - D 1-2
oman - sea
PAKISTAN - 92
PANAMA - 507
PAPUA NEW GUINEA - 675
PARAGUAY - SB5
PERU - 51 - D2-4
PHILIPPINES - S3 - Dl-4.
POLAND - 49
PORTUGAL - 351 - D2
QATAR - 374
REUNION - 262
ROMANIA - *0
RWANDA - 250
ST. HELENA - *
AMER. SAMOA - 664
SAN MARINO - 33'- AP 541
SAO TOME (PRINCIPE) - 239
SAUDI ARABIA - 966 - Dl-2
SENEGAL - 221
SEYCHELLES - 246
SIERRA LEONE -232
SINGAPORE - 65 .
SOLOMON IS. - 57?
SOMALIA - 252
SOUTH AFRICA - 27 - D2 (XI)
fe. W. AFRICA - 284
SPAIN - 34 - Dl-2
SRI LANKA - 34
SUDAN - 249
SURINAME - 597
l-( (
5
âL'ODELOUPE - 590
:>uam - S7i
âUflTEMALA - 502 - CODES 2 Oft B1
y:nea - 224
_ :nep-bissau - 245
â ^YANA - 592
HAITI - 505
j jNDURAS - 304
-ONE KONG - 852 - CODES 3. 5, OR 12
â UNGARY - 3S - Dl-2
CELAND - 354
YD I A - 51 - CODES 11 OR 22
SCONES I A - SZ
âAN - SB - DZ-4 <XXXl>
AG - 964 - Dl-2
ELAND - 353 - Dl-2
. RAEL - 97Z - Dl-2
' ALY - 33 - D2-3
.'CRY COAST - 225
A PAN - B1 - Dl-2
ORDAN - 9G2
AMPUCHEA - 855
iNVA - 254 - AP 2
KOREA - *
; KOREA -SZ - D2
JWAIT - 965
AOS - 856
EBANON - 961 -
6SOTHO - 256
IBERIA - 231
IBYA - 21 - CODES 8" OR 9 *
1ECHTENSTEIN - 41 - AP 75
UXEMBOURG - 352
SWAZILAND - 2SB
SWEDEN - 46 - 01-3
SWITZERLAND - 41 - CODE 1 OR D2
SYRIA - SG3 ^
TAINAN - BE - Dl-2
TANZANIA - 255
THAILAND - 65 - AP 2
TIMOR - 672
TOGO - 228
TONGA - *
TRINIDAD - *
TUNIS - 21 ~ CODE 2 OR B *
TURKEY- - SO - DZ (XI >
TURKS A CAICOS - *
TUVALU t *
UGANDA :- 25S
UAE - S71/S7S/S7S
UK - 44 - Dl-3 - 25 MILLION PHONES
US A/CANADA/ CARIBBEAN - 1 - 03 <XOX OR >! 1 X >
- 190 MILLION PHONES
'* UPPER VOLTA - 22S
URUGUAY - 5SB
USSR - 7 - 20 MILLION PHONES
VATICAN CITY - 39 - AP 6
VENEZUELA - 5B - Dl-2
VIETNAM - B4
WEST. SOMGA - *
YEMEN - 957
YEMEN PDR - 969
YUGOSLAVIA - 3B - D2 (XI)
ZAIRE - 243
ZAMBIA - 250
ZIMBABWE - 263
EFINITIONS:
I
âą*
DX - X REPRESENTS THE NUMBER OP DIGITS IN A COUNTRY'S CITY
CODES. CAN BE OF A RANGE. 'DX-Y' BETWEEN X AND Y DIGITS. .
(XI) TYPICAL ROUTING CODE. X CAN BE ANY DIGIT. 1 IS ARBITRARY.,
â
AP - ALL POINTS. USE THIS IN FRONT OF ANY LOCAL NUMBER.
CODE REPRESENTS AN INDIVIDUAL CITY CODE. USE ANY OF THE CODES
LISTED. OR IF ANOTHER RANGE IS SPECIFIED. ALSO FOLLOW
THAT FORMAT.
- USE INTERNATIONAL OPERATOR EITHER FDR ALL CALLS TO THAT
COUNTRY IF NO CODE IS LISTED. OR FOR CALLS TO PARTICULAR
ARESs DENOTED BY THE
NOTE! USA COUNTRY CODE '1' CDVERS ALL OF THE CONTINENTAL USA, ALL
OF CANADA. ALASKA AND HAWAII. AND PORTIONS OF NORTHERN MEXICO.! '
IN ADDITION, THE USA AREA CODE BOS COVERS PUERTO RICO, THE US
AND BRITISH VIRGIN ISLANDS. AND VARIOUS OTHER CARIBBEAN
ISLANDS. THE 709 AREA CODE IS ROUTED THRU CANADA TO COVER
FRENCH POSSESSIONS IN THE HEMISPHERE, NOTABLY THE ISLANDS OF ST
PIERRE AND MIQUELON.
6