home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!cis.ohio-state.edu!zaphod.mps.ohio-state.edu!news.acns.nwu.edu!telecom-request
- Date: Thu, 31 Dec 1992 03:46:00 GMT
- From: cgordon@vpnet.chi.il.us (gordon hlavenka)
- Newsgroups: comp.dcom.telecom
- Subject: Good Opportunity For Fraud
- Message-ID: <telecom12.928.6@eecs.nwu.edu>
- Organization: Vpnet Public Access
- Sender: Telecom@eecs.nwu.edu
- Approved: Telecom@eecs.nwu.edu
- X-Submissions-To: telecom@eecs.nwu.edu
- X-Administrivia-To: telecom-request@eecs.nwu.edu
- X-Telecom-Digest: Volume 12, Issue 928, Message 6 of 13
- Lines: 20
-
- I've been working on a credit card / phone project, and discovered
- something that is probably known to many but was news to me: My PIN is
- _on_ my calling card! Recorded on Track 2, offset 23 characters after
- the SS. In the clear.
-
- The card is an Illinois Bell "America's Calling Card" (the blue one
- with clouds all over it).
-
- The hardware to read this info can be bought for under $200 and is
- trivially simple to use. Someone only needs access to my card for a
- few seconds to start ripping me off.
-
- I suppose it could be argued that validating PINs on-line is a
- difficult task, but on the other hand my ATM card works in London and
- if the PIN is recorded on this card it's encrypted ...
-
-
- Gordon S. Hlavenka cgordon@vpnet.chi.il.us
-
-