Sunteți pe pagina 1din 2

enhancing security

As the user inputs his PIN it is captured


ATM Threat and Risk by the pinhole camera. In some cases,
the criminals will overlay a gel pad on

Mitigation the keypad to record your PIN code


and transmit it to the HDD. The trans-
action is processed as if everything is
normal. After a large volume of data
Written by: Frank DeSomer is captured, either after a set period
of time or a high volume of users, the
thieves will then recover the HDD and
In 2007 a major holding banking com- nearby, perhaps in a flowerpot, bicy- return to a safe-house to download
pany in Asia conducted an assessment cle/motorcycle or some other decora- the information and pair times of use
on operational risk associated with tive object within 20 feet of the ATM. to PINs entered, based on captured
Vo l u m e 2 / 2 0 0 8

ATM’s and Point of Sale (POS) Card Targeted ATM’s include major bank video and other data. The thieves will
processors in the Asia-Pacific region. and commercial ATM’s throughout return to the ATM to repeat the proc-
The study showed that 70 % of their the city, some of which are located in ess, and at the same time begin using
incidents occurred in Thailand, which clear public view and in highly traf- other ATMs to withdraw money from
subsequently drove them to new and ficable areas. The thieves will conduct accounts captured. In a one-month
innovative methods to counter the a visit to the area to determine the period, criminals stole approximately
criminals and mitigate the threat. location of security cameras, type of U.S.$18,000 from 14 ATMs, using six
Thai-American Business

keypad and card reader on the ma- successfully cloned accounts. In total
ATM SECURITY chine and law enforcement presence. over 800 accounts were compromised
during this period.
The primary tactic for this theft is Once the components are installed on
“skimming,” a process in which your the machine, the process begins. When POINT OF SALE TRANSACTIONS
card’s magnetic strip is scanned and a user inserts their card it is instantly
recorded on a hard disk drive (HDD) scanned and the scanned data is wire- POS transaction machines are victim
to be later paired with your PIN code lessly transmitted to a recorder HDD. as well. In one recorded case a store’s
and used to access your account.
Today’s thieves are getting more
technical and tactical in their efforts
to steal your property and, in some In a one-month period, criminals stole
cases, personal identity. The process is approximately U.S.$18,000…using six
comprised of three major elements: a
pinhole camera, card skimming device successfully cloned accounts.
and a wireless HDD recorder located

28 False gel keypad capturing your PIN in place over an original bank keypad.
enhancing security

sponse Teams of compromised cards;


• Improved lighting;
• High quality cameras, including in-
tegrated camera systems and digital
color images;
• Fraudulent device inhibitors, which
include brightly colored plastic
modifications placed over the card
slot which prevent the installation

The American Chamber Of Commerce In Thailand


of a scanner;
• Public awareness stickers on ma-
chines;
• Awareness messages on the login
screen with notices such as “Guard
your PIN”;
Card skimming false front - notice the exact paint match. • Active law enforcement engage-
ment;
closed circuit television showed two The banking industry has established • Card cancellation procedures; and
thieves standing at the cash register several risk mitigation measures in • Outreach to the security industry.
ringing up goods. While one distracted response to these actions, which
the attendants the other unplugged the include: SECURE YOUR TRANSACTIONS
POS machine and replaced it with his
own corrupt machine. The two pro- • Security patrols to higher risk areas, ATM and POS users should take the
ceeded to check out and leave. including stand-alone machines, following steps to ensure their transac-
low traffic areas and poorly lit tions are secure:
RISK MITIGATION areas;
• Installation of “Jitter Devices,” de- • Use a major bank’s ATM inside a
From this point on, the corrupt ma- vices which are designed to shake banking institution for cash with-
chine recorded all data from POS and jitter the card as it is slowly drawals;
transactions. After a set duration of time drawn into the machine, thus • Use your free hand to completely
(5-8 days), the thieves returned to re- disrupting the skimmer’s attempt to cover the keypad when entering
cover the machine and replace it with scan if installed on the machine; your PIN;
another corrupt machine. They returned • Compromised card number filters • Look for modifications to the ma-
to their safe house and were able to which place stolen card numbers chine, card slot and keypad;
download all personal data stored and on a bank’s “watch list,” send SMS • Be aware of your surroundings, es-
begin to illegally access the accounts. alerts to victims and alert Quick Re- pecially people in line behind you
eavesdropping; and
• Be sure to remove all material from
the ATM, including your card,
receipt and other belongings.

In short, be aware of your surround-


ings. If something about the machine
you are using seems suspicious, walk
away. Report your suspicions to the
bank which owns the ATM. The five
or ten minutes you spend looking for
another machine is well worth it when
you consider the potential financial
and personal loss at risk.

Frank DeSomer is Operations Manager for


Peak Systems International Co., Ltd and the
Co-Chairman of AMCHAM’s Security/OSAC
Committee. He may be reached at:
desomerf@psi-protection.com
Rear View of false front with transmitter and camera built in.
29

S-ar putea să vă placă și