home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!gossip.pyramid.com!pyramid!lstowell
- From: lstowell@pyrnova.mis.pyramid.com (Lon Stowell)
- Newsgroups: alt.folklore.computers
- Subject: Re: Jackpotting ATM's for $$$$
- Message-ID: <184385@pyramid.pyramid.com>
- Date: 24 Nov 92 01:11:37 GMT
- Sender: daemon@pyramid.pyramid.com
- Reply-To: lstowell@pyrnova.pyramid.com (Lon Stowell)
- Organization: Pyramid Technology Corp., Mountain View, CA
- Lines: 23
-
- >
- In article <By6MIt.HB4@news.cso.uiuc.edu> robm@void.ncsa.uiuc.edu (Rob McCool) writes:
- >Yes, I heard the same thing but was waiting for someone else to bring it up
- > because I didn't remember where I had heard it. The story I heard is that the
- > original ATMs were unencrypted until someone dug up the line in his/her/its
- > backyard and put a PC into it, and "jackpotted" the machine. I think it was
- > somewhere in New York. Anyway, I heard that that was why they started
- > encrypting the data.
- >
- I can't say if someone managed to jackpot one, but it wouldn't
- surprise me a bit. The original series of ATM's by Docutel and
- others were not only unencrypted, there was NO verification
- whatever that commands which the machine received even made
- sense.
-
- Using a simple datacomm emulator (the days of these types of
- ATM's FAR predated PC's....sorry...) you could make them spit
- cash. When I demonstrated this to the DP director of an
- [unnamed] teller terminal network in SLC, using Atlantic
- Research's Intershake DTM-2, he just turned white.
- He also asked me just how common ARC's equipment was back then,..
- >:-)
-
-