home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!cs.utexas.edu!torn!cunews!revcan!software.mitel.com!grayt
- From: grayt@Software.Mitel.COM (Tom Gray)
- Newsgroups: sci.crypt
- Subject: Re: ATM fraud
- Message-ID: <12833@grayt>
- Date: 11 Sep 92 12:01:58 GMT
- References: <JIM.92Sep9125700@hunter.cs.strath.ac.uk> <6289@transfer.stratus.com> <7161518255083@c00506-119rd.eos.ncsu.edu>
- Organization: Mitel. Kanata (Ontario). Canada.
- Lines: 28
-
- In article <7161518255083@c00506-119rd.eos.ncsu.edu> cddukes@c00506-119rd.eos.ncsu.edu (PakRat's Anonymous) writes:
- >One point worth making. Even with an ATM card that challenges the
- >machine to see if it is authentic, an individual could either tap
- >the keyboard and appropriate elements to find out who belongs
- >to the pin number. Or design a front that records what is
- >going on and relays it to a a working secure machine.
-
-
-
-
- Perhaps a comment from a layman will be thought appropriate.
- ATM fraud is an economic enterprise. That is the crook is going
- to have to make money on the deal. Complicated schemes to gather
- thousands of PIN's to rob thousands of accounts are all very well.
- However if the outcome of this is too deposit thousands of individual
- sums into the account of Joe Bloggs (computer thief and chef international),
- the long arm of the law will not be far behind him on the electronic road.
- The cops say to break up an elaborate criminal conspiracy, one should
- follow the money. Here the crook is not only leaving a paper path, he
- is providing a road map.
-
- IMHO anyway
-
-
-
-
- --
- i.sinature
-