{"id":8924,"date":"2015-10-20T10:26:10","date_gmt":"2015-10-20T15:26:10","guid":{"rendered":"http:\/\/hcstx.org\/?p=8924"},"modified":"2015-10-20T10:26:10","modified_gmt":"2015-10-20T15:26:10","slug":"the-chip-and-pin-credit-card-hack","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2015\/10\/20\/the-chip-and-pin-credit-card-hack\/","title":{"rendered":"The Chip and Pin Credit Card Hack"},"content":{"rendered":"<p><a href=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2015\/10\/cc-hack.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-8925\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2015\/10\/cc-hack.jpg\" alt=\"CC hack\" width=\"289\" height=\"513\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><span class=\"lede\">THE CHIP-ENABLED CREDIT <\/span>card system long used in Europe, a <a href=\"http:\/\/www.wired.com\/2015\/09\/big-security-fix-credit-cards-wont-stop-fraud\/\">watered down version of which<\/a> is rolling out for the first time in America, is meant to create a double check against fraud. In a so-called <a href=\"http:\/\/www.wired.com\/2015\/04\/hacker-lexicon-chip-pin-cards\/\/\">\u201cchip-and-PIN\u201d system<\/a>, a would-be thief has to both steal a victim\u2019s chip-enabled card and be able to enter the victim\u2019s PIN. But French forensics researchers have dissected a real-world case in which criminals outsmarted that system with a seamless chip-switching trick\u2014and pulled off the feat with a slip of plastic that\u2019s almost indistinguishable from a normal credit card.<\/p>\n<figure id=\"attachment_1914212\" class=\"carve wp-caption portrait alignnone fade-in-up\">French computer security researchers at the \u00c9cole Normale Sup\u00e9rieure university and the science and technology institute CEA late last week\u00a0<a href=\"http:\/\/eprint.iacr.org\/2015\/963.pdf\">published a paper<\/a>\u00a0detailing a unique case of credit card fraud they analyzed as investigators in a criminal case. Five French citizens (whom the researchers didn\u2019t name in either their paper or an interview with WIRED) were arrested in 2011 and 2012 for using a clever workaround to spend nearly 600,000 euros (about $680,000) from stolen credit cards in spite of the cards\u2019 chip-and-PIN protections. Through an investigation that included microscopic analysis and even X-ray scans, the researchers discovered that the now-convicted fraudsters actually altered stolen credit cards to implant a second chip inside of them, capable of spoofing the PIN verification required by point-of-sale terminals.<\/figure>\n<p>Read the Remainder at <strong><a href=\"http:\/\/www.wired.com\/2015\/10\/x-ray-scans-expose-an-ingenious-chip-and-pin-card-hack\/?mbid=nl_101915\">Wired<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; THE CHIP-ENABLED CREDIT card system long used in Europe, a watered down version of which is rolling out for the first time in America, is meant to create a double check against fraud. In a so-called \u201cchip-and-PIN\u201d system, a would-be thief has to both steal a victim\u2019s chip-enabled card and be able to enter&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[13,74,1928,1189,65],"tags":[2621,2622,2623,1805],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/8924"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=8924"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/8924\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=8924"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=8924"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=8924"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}