home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!paladin.american.edu!howland.reston.ans.net!zaphod.mps.ohio-state.edu!news.acns.nwu.edu!telecom-request
- Date: 3 Jan 93 00:34:25 CST
- From: sean@cobra.dra.com
- Newsgroups: comp.dcom.telecom
- Subject: Re: Good Opportunity For Fraud
- Message-ID: <telecom13.5.8@eecs.nwu.edu>
- Organization: Data Research Associates, Inc.
- Sender: Telecom@eecs.nwu.edu
- Approved: Telecom@eecs.nwu.edu
- X-Submissions-To: telecom@eecs.nwu.edu
- X-Administrivia-To: telecom-request@eecs.nwu.edu
- X-Telecom-Digest: Volume 13, Issue 5, Message 8 of 9
- Lines: 26
-
- In article <telecom12.928.6@eecs.nwu.edu>, cgordon@vpnet.chi.il.us
- (gordon hlavenka) writes:
-
- > I've been working on a credit card / phone project, and discovered
- > something that is probably known to many but was news to me: My PIN is
- > _on_ my calling card! Recorded on Track 2, offset 23 characters after
- > the SS. In the clear.
-
- If you are working on a credit card/phone project a good introduction
- is "Credit Card Validation and Security" by David Jordan (MCI
- Corporate Systems Integrity Organization), Telecommunication Journal,
- Vol.59 (April 1992).
-
- Mr. Jordan wrote:
-
- "In the United States, several administrations utilize 14-digit
- card numbers, with the last four digits referred to as the customer
- PIN. For customer convenience the PIN is printed on these cards. The
- fraud deterrent capability associated with the use of the PIN in these
- implementations is negated."
-
-
- Sean Donelan, Data Research Associates, Inc, St. Louis, MO
- Domain: sean@sdg.dra.com, Voice: (Work) +1 314-432-1100
-
-