ATM fraud

Chris Torek chris at mimsy.UUCP
Sat Dec 17 13:56:39 AEST 1988


(I was hoping not to have to post this on a comp.unix group, but
things are not getting any quieter, so:)

Real Facts about ATMs:

> Each system is different.  One cannot even count on the machines from
  a specific manufacturer (e.g., IBM or Diebold) all to act the same, as
  many (if not all) of these systems can be configured by the purchasing
  bank.  Therefore:

> Every blanket statement about ATMs is wrong (including this one).

> Some common systems do put PINs on cards; some common systems do not.

> Some systems allow `local' operation of an ATM station when the net
  is down; some do not.  (Local operation may be used to overrun daily
  limits.)

> Some systems use DES encryption (in just what ways I am not sure).
  Of those that do, they may not do it in a `secure' manner.  (You will
  find it very hard to pull this particular bit of information out of
  your local bank, particularly if they know it is insecure.)

> Some systems `batch' the PIN verification with the first operation
  (so that a wrong PIN is not noticed until after a deposit, etc.).
  Others check the PIN immediately, even if it requires a network
  transaction.  Thus you cannot conclude anything about where the
  PIN is stored based on when the machine rejects an invalid PIN.

> Many systems that allow more than four digits for a PIN in fact only
  use the first four.

> Some systems count PIN errors globally; some count it per-ATM; some
  use a mix (count locally iff net is down).  Many set a `keep the card'
  threshold at 3 errors.  Typically the count is reset once a day.

Now can we stop with ATM security messages on comp.unix.questions?
(And why do I ask such a silly question? :-) )
-- 
In-Real-Life: Chris Torek, Univ of MD Comp Sci Dept (+1 301 454 7163)
Domain:	chris at mimsy.umd.edu	Path:	uunet!mimsy!chris



More information about the Comp.unix.questions mailing list