2600: the hacker quarterly (volume 1, number 2, february 1984)

Upload: ranko-kohime

Post on 29-May-2018

226 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/9/2019 2600: The Hacker Quarterly (Volume 1, Number 2, February 1984)

    1/6

    2600 February, 1984" l Ih l" I I , ' " 1II01l1lhh h, ~ { . I N ' I f " II K I'te lSI'S. 'HI l ' k : l ' I l U h ~ II.ur t I ' I ! ; " ' ' ' ~ U I ' ' I I . SuhM:nrUHII

    f.lln ; l f l ' ~ I I I , I I I I I U . I I I ~ \ \ ' ' ' h ' lu ] , , , . . 11,,_, n ~ . Mu.ldk h,I'Ukl. I ts.\ VOl.UME ONE. NUMIJEU TWOHAC,KING ON TELENETIt's as easy as 123456!Telenet. Or. to be more specific, GTE Telenet. A massivenetwork formed by the people and technology that were'used to develop packet switching for the Oepartment ofDefense. Telenet was purc.hased by GTE in 1979 and hasbeen growing in size and revenue ever since. ..There are quite a few data networks in existence today.Datapac, Autonet, Tymnet, A r p a n e t ~ to name some of thebetter known. A data network is basically a collection ofmainframes, specialized minis, and high-speed lines.Through Telenet, you can connect to literally thousands ofcomputers, all over the country, even the world i f you knowthe proper procedures. All this is possible by making a localphone call, in most parts of the country. [Telenet accessnumbers are made readily available to the public by Telenet

    and systems on the network, such as the Source,Compuserve, etc.]Once your modem is connected to Telenet, you have to hittwo carriage returns. You'l' see:TELENETXXX XXXwhere the first 3 X's are the area code you're connected toand the rest comprise the Telenet node identifier. You'll thenbe asked for your terminal identifier. Usually "0 I" worksfor most terminals, but a simple carriage return is alsoaccepted.At this point you first receive the @ prompt. It is fromhere that you get places. And that's what's so unique aboutTcicnct-the way in which you get places. You simply typt: a"C", a space, and the Telenet address. Then you enter thearea code of the computer you want to connect to, followedby a two or three digit code. That's all there is to it. Telenettells you whether or not you've found a working computer.If you want to exit from one computer and connect toanother, just type an "@". You'll then get the Telenet @p ~ o m p t . Before you type the next address, type "0 " to,disconnect from the computer you're still connected to.':'ackers across the country have for years programmedtheir computers to scan the system for interesting things. Allthar has to be done is this: Pick the city you want to scanlet's s.ay Boston. The area code is 617. Have your computerstart Its search at address 617OQI. If you get connected to acomputer, Telenet will skip .,a line and print 617 001CONNECTED. If you don't' get connected, there are avariety of messages you could get. 617001 REJECTING,617 001 NOT RESPONDING, 617 001 NOT REACHABLE. 617 001 REFUSED COLLECT CONNECTIONare a few of them. They all mean basically the same thing-

    there is no way to hook up to this aadress.At this poin t, several things ~ a n be done. Naturally. you'llwant to increment the address by one and search for acomputer at address 617002. But how do you have yourcomputer recognize when a connection has been made? Thisis necessary because you can't just keep enteringC'XXXXXX over and over-once you get connected, youhave to enter the "@ " to get back -to the Telenet prompt,followed by a "0". Of course, you could type C XXXXXX,followed by "@", followed by "0 " for every attempt, butthat can get rather time consuming. It's better simply to beable to save to disk or output to a printer the addresses ofconnections. And, fortunately for hackers, Telenet makesthat very easy.You can either search for a string that has the word"CONN'ECT' in it somewhere-the only time you'd findone would be when you got the CONNECTED message.But, as we mentioned earlier, an extra line is skipped rightbefore the CONNECTEO message, for some reason. Whynot simply look for that extra line? If you get it, record theaddress, send the "@ " and "0 " and increment by I. If youdon't get the extra line, simply increment by I.Naturally, you will be collecting Telenet addresses forinformational purposes only, to find out which computersare located where, in case you ever have to get onto one in anemergency of some sort.- Keep in mind that you are notentering any of these computers; you're merely connectingfor a brief second or two. And there is no login procedure ()I"identity check for Te1enet, so you're not fraudulently usingtheir system either.Also, the area code system is not the only system thatworks on Telenet. These are simply set up to be convenient,but an address ~ a n actually have any kind of a number in it.For example, addresses beginning with 311 or909 (the latterbeing Telenet's own private "area code") also abound, andthere are certain to be many more.Without a doubt, though, it's the existence of the areacode system that has helped Telenet become one of theeasiest data networks to hack. And until they install somesort of a user identification program, or at least have thesystem disconnect after it becomes obvious that there's astrange person online, hackers will continue to be one ofTelenet's biggest problems.If you have information to share with us about this or anyother dat'l network, please send it in. Requests foranonymity will be respected.

  • 8/9/2019 2600: The Hacker Quarterly (Volume 1, Number 2, February 1984)

    2/6

    ESS: ORWELL'S PROPHECYThere was u/('()urse no \l'ay c ~ l k n o w i " g whetheryou werebeing watched at any given moment. How o.lien. oron whalSl'slem, Ihe Thoughl Police plugged in on any individual

    ~ ' i r e was guesswork. II was even conceivable Ihal theywatched even'bodv all the lime. But 01 am' role Ihev couldplug in you; wir; whenever they wanted to. You' had tolive-did live. {rom habit that became instinct-in theassumption thai every sound.l '0u mode was overheard, and.except in darkness. every movement scrutinized.F r o ~ Nineteen Eighty-Four

    ESS is the big brother of the Bell family. Its very namestrikes fear and apprehension into the hearts of mostphreakers, and for a very good reason. ESS (ElectronicSwitching System) knows-the full story 011 every telephonehooked into it. While it may be paranoid to say that all,phreaking will come to a screeching halt under ESS, it'scertainly realistic to admit that any phreak whose centraloffice turns to ESS will have to .be a lot more careful.Here's why. .

    With electronic switching, every single digit dialed isrecorded. This is useful not only for nailing phreaks but forsettling billing disputes. In the past, there has been no easyway for the phone company to show you what numbers youdialed locally. If you protested long enough and loudenough, they might have pu t a pen register on your line torecord everything and prove it to you. Under ESS, the actualprintout (which will be dug bu t of a vault somewhere ifneeded) shows every lasl digil dialed. Every SOO call, everycall to directory assistance, repair service, the opel'ator,every rendition of the ISI2 Overture, everything! Here is anexample of a typical printout, which shows time of connect,length of connect, and number called.

    DATE TIME0603 ISI80603 15250603 16020603 1603

    LENGTH llNITS35 3

    0

    NUMBER456-7890345-67890000-411800-555-1212

    0603 1603 10 2.35* 212-345-67890603 1624 1 0 0000-000 (TSPS)A thousand calls to "soo" will show up a& just that -athousand calls to "SOO"! Every touch tone or pulse is kepttrack of and for most phreaks, this in itself won't be verypretty.

    Somewhere in the hallowed halls of 195 Broadway, aTraffic Engineer did an exhaus tive study of allSOO calls overthe past few years, and reached the following conclusions:(I ) Legitimate calls to 800 numbers last an average of 3minutes or less. Of the illegal (i.e. phreakers) calls made viaSOO lines, more than SO percent lasted 5 minutes or longer;(2) The average residential telephone subscriber makes fivesuch calls to an SOO num ber per month. Whenever phreakerswere being watched, that number was significantly higher.As a result of this study, one feature of ESS is a daily logcalled the "soo Exceptional Calling Report."Under ESS, one simply does not place a 2600 hertz tone'on the line, unless of course, they want a teleo securityrepresentative and a policeman at t heir door within an hour!The new generics ofESS (the #5) now in production. with an

    operating prototype in Geneva. Illinois, allow the system tosilently deteci all "foreign" tones not available on thecustomer's phone. You have exactly twelve buttons on your

    touch-tone phone. ESS knows what they are, and you hadbest not sound any other tones 0,:\ the line, since the new #5 isprogrammed to silently notify a human being in the cent.raloffice while continuing with your call as though nothingwere ~ r o n g ! Someone will just p!Jnch a few keys on theirterminal, and the whole sordid story will be right in front of.them, and printed out for action by the securityrepresentatives as needed.

    Tracing of calls for whatever reason (abusive calls, fraudcalls, etc.) is done by merely asking the computer right froma terminal in the security department. With ESS, everythingis right up front, nothing hidden or concealed inelectromechanical frames, etc. It's merely a softwareprogram! And a program designed for ease in operation bythe phone 'company. Call tracing has become. v e ~ y sophisticated and immediate. There's no more running Inthe frames and looking for long periods of time. ROM chipsin computers work fast, and that is what ESS is all about.

    Phone phreaks are not the only reason for ESS, but it wasone very important one. The first and foremost reason forESS is to provide the phone company with better control onbilling and equipment records, faster handling .of calls (i.e.less equipment tied up in the office at anyone tIme), and tohelp agencies such as the FBI keep better account of whowas calling who from where, etc. When the FBI finds outthat someone whose calls they want to trace is on an ESSexchange, they are thrilled becausl: it's so much easier (orthem then. ' .he United States won't be 100 percent ESS untt!sometime in the mid 1990's. But in real practice, all phoneoffices in almost every city are getting some of the most basicmodifications brought about by ESS. "911" service is anESS function. So is ANI (Automatic Number Identification) on long distance calls. "Dial tone first" pay phonesare also an ESS function. None of these things were, available prior to ESS. The amount of pure fraud calling viabogus credit card, third number billing, etc. on Bell's lines\ led to the decision to rapidly install the AN I, for example,even if the rest of the ESS was several years awayin some cases.Depending on how you choose to look at the wholeconcept of ESS, it can be either on e of the ~ o s t advantageous innovations of all t i ~ e or ~ n e of the scarIest.The system is good for consumers m that It can take a lot ofactivity and do lots of things that older systems could n e ~ e r do. Features such as direct dialing overseas, c.all f o r ~ a r d l ~ g (both of which open up new worlds ofphreakmg whIch we IIexplore in later issues), and call h o l ~ m g are steps forward,without question. But at the same time, what do all of thenasty implications mentioned further back m ~ a n to theaverage person on the sidewalk? The system IS perfectlycapable of monitoring anyone, no t just phone phreaks!What would happen if the nice friendly government we h a ~ e now somehow got overthrown and a mean nasty one took Itsplace? With ESS. they wouldn't have to do too .much work,just come up with some new software. Imagme a phonesystem that could tell the a u t h o r i ~ i e s how many calls ~ o u placed to certain Iypes of people. I.e. blacks. c o m ~ u ~ l s t s . laundromat service employees .. ESS could do 11. If soprogrammed.

    This 1\'0.1' ,h(' fir.\1 ill all o('ca.\ional.w''';e.l Oil thc'.Iim (Il1ddOllgers o ( ESS.

  • 8/9/2019 2600: The Hacker Quarterly (Volume 1, Number 2, February 1984)

    3/6

    Times Changing For Directory AssistanceCombined News SourcesDirectory Assistance promises to have a very differentfuture. both in the U.S. and in France. Here in the States.customers are being threatened with a 75 charge for longdistance informatiQn requests. In a few parts of the country,Indiana (812) for instance. a request for a phone numberproduces startling results: a human will answer and ask forthe city and name, and after finding it will hit a button,whereupon a machine takes over and spits out the numberwith a digitized voice. You are then given the option to holdon to be reconnected to another D.A. operator.This kind of system makes multiple requests quiteinconvenient-forcir.g one to either wait to be reconnectedto a human. or dial over and over again. This latest steptowards total mechanization also strikes fear into the heartsof the D.A. operators, many of whom do not wish to losetheir fun jobs.France. meanwhile. has a nationalized phone system runby the Ministry of Posts and Telecommunications, anagency which has been experimentally offering computerized telephone information (Teletel) to 70,000 users.The Ministry provides. for free, a small terminal called aMinitel which has a keyboard that folds up over the screen.

    To find a number, a user enters the name, address, regionof France, and profession of the person they're looking for.If just the name and city are entered. all of the people withthat name in that city will be displayed. The system does no tyet list all of France. Qut should by June. The Ministryexpects to have 3 million terminals in use within two years.In addition to TeleteI, 15 other services will be provided,including news. stock quotations. shopping catalogs,banking systems, as well as railroad, airline. and movieschedules.Perhaps this will give AT&T some ideas. Imagine beingable to call a distance city and get phone numbers foreverybody named Smith! Electronic phone book hackingcould be a considerable amount of fun.No Hacking While Flying, Please

    Combined News SourcesEastern Airlines now specifically prohibits the use ofportable computers on all flights, because of adverse effectsthe airline claims may occur. The new baggage policyexcludes calculators from this ban.The feeling at Eastern is that portable computers caninterfere with radar and "distort equipment," causing allkinds of strange things to happen. When a companyspokesperson for the Miami based carrier was asked if any

    specific incident triggered the new policy, she respondedthat an incident "probably happened" but that nothing morecould be said. A possible boycott of the airline has been proposed byWayne Green. publisher of the magazine MicruculI1flll l l!rs. 1Trick of the Month

    2MI() N.: ..... Scr .. iCC'Many supermarkets in states having passed a "bottle bill"of sorts are installing can-return machines. You put anempty aluminum soda can in the machine. UPC code up.and the machine crunches it and gives you money. Well.some hackers have discovered that these machines work forall beverage cans. deposit or not. I n some states. for

    - - - - ------ - - ------= ------ - - - ---- --- ----- ----= ~ - - = = = - = - -- ' - - - ----- - - - - - - ----------- .... -- - - - - - - - - - - - -

    example. non-carbonated beverages (iced tea) don't carry adeposit even though the cans are exactly the.same as t he onescontaining carbonated drinks. A human will not take thosecans back. but the machines will. gladly.By the way. we haven't heard from anyone who's triedputting afull soda can in one of t h ~ s e m ~ c h i n e s . It ~ o u l d beinteresting to find out if the machine tries to crush It. Moreinteresting to see if it succeeds.Death Star Cards Spell Woe

    2600 News ServiceMany of the long-awaited AT&T credit cards are nowbeing distributed. You will be impressed when you get

    yours-complete with a picture of the AT&T death starfloating over planet Earth. while the new AT&T red, blue.and black stripe looks on.But with these cards come a few problems. For one thing,many customers of New York Telephone received their PIN

    ' ~ a r d s only days before they got their AT&T cards. What is aPIN card? Well, PIN stands for... Personal IdentificationN umber, but other than that, it's really the exact same thingas an AT&T card, except that it doesn't have a magneticstripe. It also only has four numbers on it-the last part ofyour 14-digit code (your phone number comprises the firstpart). New York Telephone proudly claims that this securesyour code, since if you loseyourcard, whoever finds it won'tknow your phone number nor be able to find o ~ t becauseyour name isn't even on it. So along comes AT&T sendingout their cards to everyone who got a PIN card. AT&T cardsh ~ v e your name and your. 14-digit code prominentlydisplayed (yes, the last four digits are the same as New YorkTelephone's). Result: the PIN cards are completely useless,both because they're redundant and because their purposehas been defeated.

    AT&T has made a serious mistake with these cards. Firstof all. since so many of them are in themail at the same time,many will be stolen, perhaps within the post office itself.Second, there are no s e ~ u r i t y precautions whatsoever atthose new credit card phones. You simply plug in the cardand dial away. No identity codes to enter, like the bank cardsr e q u i ~ e . With 5,000 of these phones (which also acceptA m ~ n c a n Express cards) scheduled to be installed this year.credit card fraud for AT&T will almost certainly rise, not somuch due to phone phreaks, but rather, simple commonthieves.

    An official at AT&T said that they were not overlyconcerned. "We're counting on people's honesty," they said.We'lI see what they say next year.ADS Investigation Moved?

    Word of MoulhIt's been rumoured that the FBI investigation of IBMAudio Distribution System hackers has now beenheadquartered in another city (i.e. not Detroit). Last month.

    2600 pu blished a rather extensive report on theinvestigation. including the name of the city and theinformant who started this whole mess, John Maxfield ofJFM I ndustries in Detroit.Several threats have allegedly been made by Maxfield to agroup of hackers who helped expose him. This is reportedlybeing done against the wishes of the FBI. 2600 is currentlyinvestigating the authenticity of these threats and. if theycheck out. you can count on seeing a transcript next month.

    /-9

  • 8/9/2019 2600: The Hacker Quarterly (Volume 1, Number 2, February 1984)

    4/6

    SOME THOUGHTS ON "GARBA GE PICKING"Garbage picking is the ar t of finding things that someoneelse has thrown away. Hackers on time-sharing systems arelong familiar with the technique of asbng the operatingsystem for some memory or mass storage space that has notyet been zeroed out, and then dumping out whatever was inthere to the screen or printer. Things like password files andsystem programs are always updated or backed up from

    lime to time, and that's when a "garbage copy" will becreated. The alert hacker will find this if he or she looks hardenough.You can even do some garbage picking with your ownmicrocomputer! Occasionally, when a software housecreates a disk, it copies over an entire disk, not just theprograms that they happen to be selling on that disk. Youmight find old copies of the vendor's programs sitting inthere, or all kinds of other stuff.For those of you without computers, there are other waysyou can join in on the fun. Many a tale has been told on the

    . - ~ local bulletin boards about the enterprising phone phreakswho snuck around to their local phone company's centraloffice early one morning and snooped through thedumpsters. I n the old mechanical switching areas, you mightfind wires, relays, and other bits and pieces that anelectronics hobbyist would enjoy. In areas served byelectronic switching, computer printouts are more likely,and you might even find the garbage hoppers locked to;Jrevent pholks like you from snooping around. Remember,other people's garbage is sometimes considered their privatepropr:"ty. Be sure to check with your local authoriti es on thelegalities of digging into large corporations' back yardsbefore you find out what the rules are the hard way. Oneperson who almost got into trouble over this was a NewYork City sculptor who was poking through the trash cansaround Richard Nixon's townhouse and got picked up bythe SS (Secret Service). He told the judge that. he was"llanning to make a sculpture of the former president ou t ofgarbage, and he wanted to use the real stuff. The judge,obviously, a man of refined artistical tastes, allowed thesculptor to poke through tbe garbage without molestation.

    Other kinds of garbage' picking require some more. technical knowledge and a bit of construction ability. Onepossibility that could keep you project builders busy is across-talk amplifier. Fo r those of you who aren't familiarwith the term, cross-talk (on your telephone) is when youhear another conver sation usuall ver faintly) underneath

    Q&AQ. HOI\" does the operaror/ind out (fyoll are callingfrom afeme booth or a housefone? Is there any way 10 defeat this?-CaliforniaA. pay ph.o.ne is wired up directly to the TSPS CTrafficS e ~ v l c e PosItIon System, basically the operator at aSWItchboard) circuit. A light on the console flashes andshows the caller to be at a pay phone. To convince the TS PS~ h a t it w a s ~ ' t actually a pay phone, you would have to goInto the SWItch room and rewire it. The distinction is notmad.e with.in the phone itself, but in the central office. YoureceIve a dIal tone through the TSPS circuit before it goes tothe central office-it's connected in series with it. Everythingyou do goes through the TSPS circuit. whether it's local or/lOt. I n short. t here's no way arou nd it.

    a phone conversation that you're having. If you build anamplifier that can filter ou t the background noise andamplify only the narrow bandwidth where the voice istransmitted through the phone lines, you might be able tomake out what the folks are saying,'for all the good it will doyou. But there are other things you can hear in this electronicgarbage heap. Suppose one day you hear cross-talk of amodem conversation? If you could amplify it and feed it intoyour computer, you would be able to monitor someoneelse's entire computer session. Suppose you hear someoneentering in touch-tone codes to some local call extender?All you have to do is build yourself a tone decoder (you canfind schematics for these things in any Radio Shack) andfigure out what the person entered. Obviously, once you areable to amplify the cross-talk to a reasonable level, your bestbet is to tape-record the material so that you can experimentwith the best way to feed it into the computer or tonedecoder that will be further deciphering it.

    There have been tales told of one enterprisingphreak whobuilt a tone decoder and then called up his favorite callextender. He then called some "dead" line (such as the silenthalf of a loop line somewhere; other possibilities could be adisconnected number [you hear silence after the recordingfinishes] or even your own phone, if you have a second lineyou can use) and turned on his tape recorder. It wasn't toolong before he heard the cross-talk of someone else using theextender, and he picked up ten new codes inside of a week!Of course, he needed a working code to sign onto the thing inthe first place, but there are some eX4':nders where you can"hold the line open" by hitting some key every now and then.The nice thing about this kind of hacking is that you onlyneed to make one phone call to find things out, whilestandard hacking requires a separate phone call for eachaltempt at a new code. No system in existence could detect afellow with a tape recorder and a tone decoder listening in,although it's certainly possible that someday, someonecould design their phone circuits to be 100% freeof cross-talk.

    That's all we have for now on the subject of garbage.picking. If you come up with any more places where aninquisitive person might find some interesting informationiying around, be sure to write in and let us know. Pleaseinclude your m"ethod of "digging up" the garbage, andsuggestions to all those other people out there who will try toduplicate your results.

    Got a question fo r us? Write it down and send it to us! We'lldo our best 10 come up I\'ith an ansll'er. Send it along to:2600Box 752

    Middle Island, NY / /9532600 needs 'rvriters! This could be your bigchance!! ((you come up with something tocontribute. send it in to the address at theend o f Q & A. Please send us yourcomments and criticisms as well. Andspread t he word! 2600 is bringing the goodvvord o(hackers andphreakers throughoutthe land of disks and relays!

  • 8/9/2019 2600: The Hacker Quarterly (Volume 1, Number 2, February 1984)

    5/6

    2600AFGHANISTAN - 93ALBANIA - 355ALGERIA - 21 - 3, 4 , OR 5 '*ANDORRA - 33 - AP 078ANGOLA - 244ARGENTINA - 54 - 1 , 2 1 , 41, OR 51AUSTRALIA - 61 - D1-3AUSTRIA - 43 - D4BAHRAIN - 973BANGLADESH - 880B E L G I U ~ - 32 - 01-2B E L ~ Z E - 501BENIN - 229B H U T A ~ - * - 1400 PHONES80 L H' I A - 581BOTSWANA - 267B R A Z ~ L - 55 - D2 (Xl)BRUNEI - 673BULGARIA - 359BURMA - 95BURUNDI - 257CAMEROON - 237CAPE VERDE - 238

    ..

    CENT. AFRICAN REPUBLICCHAD - 235CHILE - 56 - Dl-2

    - 236

    CHINA ( ~ A I N L A N D ) - *COLOMBIA - 57 - D3 D5COMORO IS. - 2G9CONGO - 242COSTA RICA - 506CUBA - '*CYPRUS - 357 - 02 (>(1)C Z E C H O S ~ o V A K ! A - 42DENMARK - 45 - CODES 1-9, FARoES IS 42DJIBOL'TI - 253DOMINICA - ....ECUADOR - 393 - D2 OR D4EGYPT - 20EL SALVADOR - 503 - D2 DR D4EGU. GUINA - 240ETHIOPIA - 25 1FALKLAND IS . - '*FIJI - 679FINLAND - 358 - CODE 0 OR 02FRANCE - 33 - CODE 1 OR 02F R E ~ C H GUIANA - 59 4FR . OLYNES:A - 6 8 ~ GABON - 241GA:-'9IA - 220G E ~ ~ A ~ OEM. ~ E P U B L I C - 37 - ~ 1 - 5 FEDERAL REP. OF G E ~ ~ A N Y - 49 - 02-4GHANA - 233 .,GIBRALTAR - 350GILBERT IS . - G86GREECE - 30 - CODE ! OR D2-3

    ~ G R E N A D A - '*r - I I

    pageMACAO - B53MADAGASCAR - 2 G ~

    1\ MALAW! - 265MALAYSIA - 60 - CODES 3 ~ O R 5MALDIVES - *MALI - 223MALTA - 356MARIANA IS . - '*MARTINIGUE - 596MAURITANIA - 222MAURITIUS - 230M>(ICO - 52MONACO - 33MONGOLIA - 976 ,MOROCCO - 21 - CODES O. 1, ORMoZAMBIGUE - 258NAURU - 674NEPAL - 977NETHERLANDS - 31 - 02 OR D ~ , NETH. ANTILLES - 5S9 - 01NEW CALEDONIA - 687NEW HEBRIDES - 678NEW ZEALAND - 64 - D2-5NICARAGUA - 505 - 01-2NIGER - 227NIGERIA - 2 3 ~ - D2-3 (OXX)NORWAY - 47 - Dl-2OMAN - 968PA.K I STAN - 92PANAMA - 507PAPUA NEW GUINEA - 675PARAGUAV - 595PERU - 51 - D2-4PHILIPPINES - 63 - 01 -4 ,POLAND - 48PORTUGAL - 351 - D2GATAR - 974REUNICN - 262ROMANIA -RWANDA - 250ST. HELENA - *AMER. SAMOA - 684SAN MARINO - 39 ' - 541SAO TOME (PRINCIPE) - 239SAUDI ARABIA - 966 - Dl-2SENEGAL - 221SEYCHELLES - 248SIERRA LEONE -232SINGAPORE - 65SOLOMON IS . - 677SOMALIA - 252SOUTH AFRICA - 27 - 02 (Xl)

    W. AFRICA - 254SPAIN - 34 - ~ ! - 2 SR ! LANKA - 84SUDAN - 24BSURINAME - 597

  • 8/9/2019 2600: The Hacker Quarterly (Volume 1, Number 2, February 1984)

    6/6

    - 580- 671 - 502 - CODES 2 OR 61- 224 - 245'.'ANA - 592508- 504KONG - 852 - CODES 3, 5 , OR 12- 36 - D1-2- 354- 91 - CODES 11 OR 22I A - 62- 98 - 02-4 (XXX1)- 864 - D1-2ELAND - 353 - 01-2RAEL - 872 - 01-238 - 02-3COAST - 225

    - 81 - 01-2- 962- 855- 254 - AP 2OREA - *OREA -82 - 02- 965- 856- 861- 266ERIA - 231VA - 21 - CODES 8 OR 9 *HTENSTEIN - 41 - AP 75- 352

    SWAZlt..AND - 268SWEDEN - 45 - 01-3SWITZERLAND - 41 - CODE 1 OR 02SYRIA - 963T A I ~ A N - 86 - 01-2\ANZANIA - 255THAILAND - 66 - AP 2TIMOR - 672TOGO - 228TONGA - *TRINIDAD - *TUNIS - 21 - CODE 2 ORT U R K E ~ - 90 - 02 (Xl)TURKS . C ~ I C O S - *TUVALU " *U G A N D ~ ,- 256UAE - :971/878/979

    6 *

    UK - 44 - 01-3 - 25 MILLION PHONESU S A / C ~ N A D A / C A R I B B E A N - 1 - (XOX OR X:- 190 MILLION PHONES

    '". UPPER VOLTA - 226URUGUAY - 598USSR - 7 - 20 MILLION PHONESVATICAN CITY - 39 - AP 6VENEZUELA - 58 - D1-2VIETNAM - 84WEST. SOMOA - *YEMEN - 967YEMEN PDR - 968YUGOSLAVIA - 38 - 02 (Xl)ZAIRE - 243ZA!'1BIA - 260ZIMBAgWE - 263

    DX - X REPRESENTS THE NUMBER OF DIGITS IN A COUNTRY'S CITYCODES. CAN BE OF A RANGE 'DX-Y' 8ETWEEN X AND Y DIGITS.(Xl) TYPICAL ROUTING CODE. X CAN BE ANY DIGIT. 1 IS ARBITRARY.AP - ALL POINTS. USE THIS IN FRONT OF ANY LOCAL NUMBER.CODE

    *

    NOTE:

    REPRESENTS AN INDIVIDUAL CITY CODE. USE ANY OF THE CODESLISTED, OR IF ANOTHER RANGE IS SPECIFIED, ALSO FOLLOWTHAT FORMAT.USE I N T E R N A T I O ~ A l OPERATOR EITHER F O ~ ALL CALLS TO THATCOUNTRY IF NO CODE IS LISTED, OR FOR CALLS TO PARTICULARA R E ~ S DENOTED BY THE '*'.USA COUNTRY CODE '1 ' COVERS ALL OF THE CONTINENTAL USA. ALLOF C A ~ A D A , ALASKA AND HAWAII. AND PORTIONS OF NORTHERN MEXICO.!IN ADDITION, THE USA AREA CODE 809 COVERS PUERTO RICO, THE USAND BRITISH VIRGIN ISLANDS, AND VARIOUS OTHER CARIBBEAN ISLANDS. THE 709 AREA CODE IS ROUTED THRU CANADA TO COVERFRENCH POSSESSIONS IN THE HEMISPHERE, NOTABLY THE I S L A ~ D S OF STPIERRE AND MIGUELON.