ATMs and Information on the Encoding System


SUBMITTED BY: czzylle

DATE: May 27, 2016, 6:53 a.m.

FORMAT: Text only

SIZE: 14.8 kB

HITS: 418

  1. With the North American continent the being the worlds biggest
  2. consumer of goods and services liquidity of the banking system has
  3. become an important factor in our everyday lives. Savings accounts
  4. were used by people to keep money safe and used by the banks to
  5. provide money for loans. However, due to 'Bankers Hours' (10 AM to
  6. 3 PM) it was often difficult for people to get access to thier
  7. money when they needed it.
  8. The banking system then created the Checking Account system. This
  9. system allowed people to have much easier access to thier money.
  10. Unfortunately the biggest drawback of this system is that people can
  11. not manage thier own money and accounting procedures. Millions of
  12. times each day throughout the North American continent people are
  13. writing checks for more money than they have in thier savings accounts.
  14. This drawback also causes the already-backed up judicial system to
  15. become backed up further. The banking system soon reacted to this
  16. problem by producing 'check verification' methods to prevent people
  17. from forgery, and overdrawing from thier accounts.
  18. "Money makes the world go 'round" and there are many different ways
  19. to make this world spin. Today we have checking accounts, credit
  20. cards, travelers checks, and the most 'liquid' form of money: cash.
  21. Cash transactions are untrackable and widely accepted, so I feel
  22. the "Paperless Society" will never happen. Automated Teller Machines
  23. provide consumers with 24-hour access to cash-sources. By simply
  24. inserting a plastic card into the machine and keypadding-in the
  25. owners' "account password", you can access the owners bank account
  26. and receive cash in-hand. This file will explain some details of
  27. the automated tellers and the plastic card used by the Teller-system.
  28. The automated teller is connected by wires and cables to a "Main
  29. Computer". During each transaction the teller sends signals to
  30. the main computer. The main computer records each transaction
  31. (a deposit or withdrawl) and updates the card-holders account.
  32. It also sends 'approval' or 'denial' signals to the ATM in regard
  33. to the transaction requested. If a card-holder attempts to withdraw
  34. $150.00 from his account and he has only $100.00 in it, the main
  35. computer will tell the ATM to deny the transaction.
  36. The ATM has 2 compartments to store cash in. The first is the "deposits"
  37. compartment. This is a small area that receives the daily deposits.
  38. It is located in the upper-part of the machine, near all the mechanical
  39. devices. However, because most ATM transactions are withdrawls the
  40. complete bottom-half is filled with cash where the withdrawls are
  41. extracted from.
  42. The plastic card inserted into the machine is the same size as a
  43. credit card. The front of the card is embossed with information
  44. about the card-holder. The back-side of the card has a thin strip
  45. of magnetic tape which also holds some important information.
  46. +--------------------------+ +--------------------------+
  47. ] CIRRUS ] ]--------------------------]
  48. ] INSTANT CASH CARD ] ]/////(magnetic strip)/////]
  49. ] ] ]--------------------------]
  50. ] Acct: 12345675 Exp. ] ] ]
  51. ] Joe Schmoe 01/91 ] ] "card-holders signature" ]
  52. ] ] ] ]
  53. +--------------------------+ +--------------------------+
  54. Front-side Back-side
  55. When a cardholder inserts his card into the machine and requests a
  56. transaction, the machine reads the embossed information from the
  57. front-side and compares it with the data stored on the magnetic
  58. strip; looking for a 'match' of the information on both sides.
  59. The information on the front-side is easily readable with your
  60. eyes. However, you can not read the data on the magnetic-strip
  61. so easily. You may ask , "What is stored on the magnetic strip ?".
  62. The answer is; the same information as the embossing plus some
  63. 'confidential' information regarding the cardholders' financial
  64. status is stored there. The magnetic strip has 3 "tracks" on it.
  65. The first track can store 210 BPI (Bytes per inch), and the second
  66. stores 75 BPI, and the third stores 210 BPI. So, we have:
  67. +---------------------------+
  68. Track 1: (210 BPI density)
  69. +---------------------------+
  70. Track 2: ( 75 BPI density)
  71. +---------------------------+
  72. Track 3: (210 BPI density)
  73. +---------------------------+
  74. THE MAGNETIC STRIP
  75. Now, here's the information stored on each track of the strip in
  76. my example:
  77. Track 1: " ;B 12345675 ^ Schmoe/Joe ^ ; LRC "
  78. Track 2: " ;12345675 01/91 ^ 1234 ^ (discriminate data) ; LRC "
  79. Track 3: " ;12345675 ^ 01/91 ^ 5 (discriminate data) ; LRC "
  80. Here's the decoding of the above information:
  81. Track 1: ";" = Beginning of the data character
  82. "B" = Field-Control Character: I believe this character
  83. tells the ATM what type of account (or status)
  84. the user has.
  85. "12345675" = This is the account number of the cardholder.
  86. "^" = Data-field seperator.
  87. "Schmoe/Joe" = Last/First name of cardholder.
  88. "^" = Data-field seperator.
  89. ";" = End of data character.
  90. "LRC" = Longitude Redundancy Check (end of track character).
  91. Track 2: ";" = Beginning of data character
  92. "12345675" = Account number of the cardholder.
  93. "01/91" = Month/Year the card expires.
  94. "^" = Data-field seperator.
  95. "1234" = Process Identification Number (The cardholders 'password',
  96. I think... or it could be a number to verify the
  97. the transaction between the ATM and the Main Computer).
  98. "^" = Data-field seperator
  99. "(dscrmn. data)" = Discriminate Data. Not much is known exactly what is
  100. stored here. Perhaps Bank Identification data or
  101. bank account type (savings, checking?) ?
  102. ";" = End of data character.
  103. "LRC" = Longitude Redundancy Check.
  104. Track 3: ";" = Beginning of data character.
  105. "12345675" = Account number of the cardholder.
  106. "^" = Data-field seperator.
  107. "01/91" = Month/Year the card expires.
  108. "^" = Data-field seperator.
  109. "5" = The crypting-digit. When the transaction request
  110. is sent to the main computer, it is encrypted.
  111. This digit tells which encryption-key is used.
  112. "(dscrmn. data)" = A duplicate of the discriminate data stored on
  113. Track 2.
  114. ";" = End of data character.
  115. "LRC" = Longitude Redundancy Check.
  116. When the card is being processed the ATM tries to match the
  117. account number, expiration date and name stored on each track.
  118. The reason they duplicate data is for verification purposes. But,
  119. notice that the duplicate data is stored on different tracks, each
  120. having different recording densities. Once the information on the
  121. tracks are confirmed to match, the ATM compares them to the embossed
  122. information on the front-side. If all of the information matches
  123. then the transaction will proceed. If it doesn't match, then the card
  124. is considered to be damaged and the ATM will keep the card. It will
  125. give the cardholder a piece of paper instructing the user to notify
  126. the bank who issued his ATM-card so he can receive a replacement
  127. card in the mail (this process takes about 3 weeks).
  128. Now that you know how the ATM-system is designed and what information
  129. is kept where on the card, what "security defects" does this system
  130. contain ? I will outline 4 methods of attacking this system that
  131. have been tried (not by me!).
  132. 1) Vandalization: If you want, you can break-in to the ATM.
  133. However, most ATM's contain 'sensor' devices which sound an
  134. alarm when this is tried. Therefore, if you're going to try
  135. this method I do not suggest using a hammer and chisel on the
  136. ATM because it will take 1/2 an hour to get the machine open
  137. and by that time the police will be there. You could try a
  138. much faster way, dynamite; but that might scatter the money
  139. all-over, making it hard to collect. Also, the bottom-half
  140. is where most of the money is stored (unless you happen to
  141. choose a machine that has issued all of its withdrawl-cash)
  142. so you'll want to break into the bottom-half of the ATM.
  143. In relation to this, you could wait outside the ATM for a
  144. valid-user to complete his withdrawl-transaction and mug him.
  145. As far as I know, the bank holds no responsibilty for placing
  146. the ATM in a 'secure' enviroment. However, usually they will
  147. have lights nearby and placed in 'reasonable' places where
  148. people need money (example: Grocery store) and where the chance
  149. of mugging is slim.
  150. 2) Physical Penetration: There are several ways of doing this.
  151. If you have a stolen card, you could randomly try guessing his
  152. account-password. But, I feel this is a primitive method.
  153. If you try too many attempts at guessing the 'password',
  154. the ATM will return the card to you. But, your attempts
  155. *might* be recorded in the central computer; allowing the
  156. bank to decide whether to cancel that card... However,
  157. this has not been verified by me. If you do get a cash-card,
  158. you can make counterfeit-cards.
  159. A) Counterfiet ATM-cards: The same method for producing
  160. counterfiet credit cards applies to ATM-cards. If you
  161. have a valid ATM-card you can 'clone' it simply by embossing
  162. a blank-card with the same information. Copying the mag-
  163. netic strip is also easy. To do this, you place a blank
  164. strip of the magnetic tape on top of the valid magnetic
  165. strip. Then, using an iron on low-heat, gently rub the
  166. iron across the two strips for a few seconds. Lastly,
  167. peel the new strip apart from the valid one and you've
  168. got a copy of all the data from the valid ATM-card.
  169. B) Also, I've heard a case where some guys had a machine
  170. that could read and write to the magnetic strips (probably
  171. they were employees of a company that produces the ATM-cards).
  172. Using this machine, they were able to create and change
  173. existing data on ATM-cards (such as the expiration date
  174. so they could keep using the same card over a long period
  175. of time).
  176. In relation to this there are other devices available that
  177. can read and write to magnetic strips. Using your own
  178. microcomputer, you can buy a device that allows you to
  179. read and write to these magnetic strips. It looks
  180. similar to a disk drive. If you're interested in
  181. exploring this method, I'll suggest that you contact
  182. the following company:
  183. American Magnetics Corporation
  184. 740 Watsoncenter Road
  185. Carson, California 90745
  186. USA
  187. 213/775-8651
  188. 213/834-0685 FAX
  189. 910-345-6258 TWX
  190. C) WARNING: During each transaction attempted on an ATM a
  191. photo of the person requesting the transaction is taken.
  192. How long this film is stored is unknown, but it probably
  193. is different for each bank (unless there is a federal
  194. regulation regarding this). Also, it is possible that
  195. this is not done at all ATMs.
  196. 3) "Insider" Theft: The above case also crosses over into this
  197. section. The biggest 'security leaks' in any company are
  198. its employees. This is also the easiest way to steal money
  199. from ATMs. The man who collects the deposits from the machine
  200. and inserts cash for withdrawls has the easiest and most
  201. open access to these machines. I was told that this person
  202. can easily steal money from ATMs and not be detected. Another
  203. person with access to these machines is the technician. The
  204. technician who fixes ATMs is the most-knowledgeable person
  205. about ATMs within the bank, therefore he should be a trust-
  206. worthy guy and receive a 'comfortable' salary.. otherwise
  207. he'll begin to collect 'retirement benefits' from the ATM
  208. and this may go undetected.
  209. However, I have heard of some embezzlement-cases involving ATMs,
  210. so I think it's not as easy as it seems. It's only common sense
  211. that a bank would account for every dollar of every transaction.
  212. Whether the accounting is done inside the ATM or the main
  213. computer doesn't make a difference... some form of accounting
  214. is *probably* done.
  215. 4) Data-link Intercept: This method has been very successful. What
  216. you do is 'tap' into the wires that connect the ATM to the Main
  217. computer. By doing this you can intercept and send signals to
  218. the ATM. However, some 'inside information' is needed because
  219. the transmission is encrypted (refer to the Cryptography Digit
  220. stored on the magnetic strip). But, I think you don't need to
  221. know *everything* being transferred. You should need to know
  222. when to send the 'approval' signal to the ATM telling it to
  223. dispense its' cash. I read a case (it may be in Phrack World
  224. News; 1985?) where some guys netted $600,000 from various ATMs
  225. using this method. This seems to be one of the better, and
  226. more ingenious methods of stealing from these machines.
  227. The information in this file should be 'adequate' to introduce you
  228. to how ATMs work. How did I get this information? I went into a
  229. bank and inquired about the computer-technology of ATMs. The man
  230. who was responsible for the ATMs was a bureaucrat and actually knew
  231. very little about the 'guts' of ATMs. Luckily the ATM-technician
  232. was there that day and I agreed to buy him dinner later that evening.
  233. (Please refer to: "Insider" Theft and the principle of Company-Loyalty).
  234. During the dinner at "Toppers" (a neat 1950's Burgers/Milkshake/Beer
  235. restaurant) he provided me with Operation and Repair manuals for the
  236. ATMs. I feel this information is well-worth the $3.82 dinner and
  237. will be of some value to its' readers. Some good information was
  238. screened-out due to its 'delicate nature', but the information I've
  239. provided has been confirmed.

comments powered by Disqus