Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Scams :: atmrep.txt

British ATM fraud cases




                   Claims Involving Electronic Payment Systems
 
                                Ross J. Anderson

              Computer Laboratory, Pembroke Street, Cambridge CB2 3QG


Abstract
--------

Many existing and proposed electronic payment systems are quite insecure
and the number of claims involving fraudulent or disputed transactions is
rising steeply. The banks' recent action in limiting customers' liability
for such transactions through automatic teller machine (ATM) systems to
50 Pounds may in practice limit ATM claims to those cases where
consequential losses are involved, but growing fraud against signature-based
card systems such as Switch will continue to be an issue, as will disputes
involving other electronic payment and trading systems. In particular,
Electronic Document Interchange (EDI) systems are proliferating with very
little thought being given to protecting transactions against fraudulent
manipulation.

For these reasons, it is quite likely that practising lawyers will have to
deal with electronic payment disputes at some time in their careers. The
technical details can be extremely complex, as the proper cryptographic
protection of transactions involves a range of mathematical and engineering
disciplines. However the basic principles are relatively straightforward.
In this article we outline a number of possible attacks against electronic
trading and payment systems, and discuss the issue of liability for disputed
transactions.

Introduction
------------

An unpublished survey carried out recently by a leading consumer organisation
indicates that about a third of account holders at UK banks have had some
dispute with their bank over an electronic banking transaction. These
often concern `phantom withdrawals', debits posted for ATM transactions of
which the account holder has no knowledge.

Although US banks are required to make good any such losses unless they
can prove that the customer was at fault, British banks have traditionally
claimed that their systems are infallible, and that no withdrawals can be
made without both the customer's card and PIN (personal identification
number). The implication is usually that the customer must have been
defrauded by a member of his own family, and this can cause considerable
anger and distress to the victims.

The situation has been ackowledged by the report of the Commission on Banking
Services Law (the `Jack Report' -reference [8]) as unsatisfactory, with
one-sided contracts and no effective competition (section 9.21); the banks
try to discourage any public discussion of system security (10.03), although
the PIN concept has never been tested in the UK courts (10.04) and a majority
of expert evidence sees the PIN system as vulnerable from a security
standpoint (10.06). It appears that the banks see anti fraud investment as
not being cost effective (10.11), and this can be expected to continue for so
long as customers whose accounts have been raided can be made to carry the
loss.

The UK clearers' response to these criticisms has been to agree to limit
customer liability to 50 Pounds in the case of some of the more common types
of disputed transaction. The expectation is probably that this will reduce the
risk of a case ever getting to court amd setting a precedent which could put
the onus clearly on the bank, as is the case in the USA.

This may not succeed, as consequential losses can often flow from phantom
withdrawals. In one current case, which has been widely reported in the press,
the plaintiff is an elderly account holder who claims that her bank so
harrassed her about an overdraft arising from a series of phantom withdrawals,
that she suffered health problems as a result.

What can a lawyer realistically hope to achieve for an aggrieved client? How
can one establish that the client has been defrauded, or at least that the bank
has failed to carry out its general duty to observe the customer's mandate?
In order to answer this question, we will have to understand the various ways
in which an ATM system can be defrauded.

The Evolution of ATM Systems
----------------------------

Automatic Teller Machines, or ATMs, were like most computer systems in that
they were originally developed without much concern for security other than
the obvious protection against violent external assault. The first examples
were introduced in the UK in 1968 and simply accepted a punched card and a PIN,
checked the PIN against the card, and dispensed a fixed amount of cash
(typically 10 Pounds). The card was retained by the ATM, processed as a cheque
and returned to the customer with his statement at the end of the month. The
PIN was introduced to add value: without it, the card could have been used by
anyone to draw cash, and so would have been of no more use than cash to most
customers.

A fraud problem arose in some countries overseas, where criminals (and in
Israel, even enterprising but misguided students) worked out the relationship
between the holes punched in the card and the corresponding PIN. There was
also a concern about what would happen if a customer repudiated a transaction.
How could a bank satisfy a judge the their system was secure, even in the face
of testimony from a plausible witness?

These pressures led to a number of research programs being carried out into
ATM security, and in particular PIN security, in the late 1970's and early
1980's, with the aim of tackling the problem by making forgery impossible.
A number of systems were developed, of which two captured most of the market.
These were the IBM system, developed by Meyer, Matyas and others; and the
VISA system, developed by Carl Campbell. They share a core concept, which is
to derive the PIN from the customer's account number.

The business objective was to ensure that no-one at the bank could ever get
to know any customer's PIN. The derived technical objectives were to avoid
having a file of PINs, as this file might be stolen or copied by one of the
bank's programmers; and to avoid having the PIN on the card, where it could
be accessible to thieves or forgers. At the same time, most banks wanted to
be able to check PINs in ATMs which were offline, that is, not connected to
the bank's computer.

The solution developed by IBM and VISA was to encipher the customer's account
number using a secret encryption key, the PIN key, and use the first four
digits of the result as the PIN. The details of the process are described in
the open literature [1], [4], and so the security of the system depends
entirely on each bank keeping its PIN key secret.

The usual procedure was to keep this key in two or more components, each
held by a different official. Although familiar from the management of safe
combinations, this scheme gave rise to problems in practice: a bank may
have over a thousand ATMs and thus over two thousand key custodians, each
with a copy of one part or other of the key.

Carl Campbell's innovation was to devise a hierarchy of cryptographic keys
which enables central control to be maintained. This system is quite involved
but the heart of it is a device called a security module which generates all
the customer PINs and cryptographic keys used by the bank. Master keys are
generated in several components for manual loading into ATMs as before, but
once this initial loading is complete, all subsequent key management is done
automatically by the security module, which sends each ATM working keys from
time to time which are encrypted under its master keys.

The two main international card organisations, VISA and Mastercard, now
require all banks joining their scheme to build their ATM systems round
security modules. However, only about a third of existing member banks
have so far made this investment, often pleading the difficulty of system
change or the pressure of other development work. As a result, the new
entrants to the ATM business (such as the building societies) tend to
have more secure systems than the established players, and in fact some
three-quarters of disputed ATM transactions currently being reported seem
to concern the cardholders of one particular clearing bank.

There is no doubt that PINs have provided a useful first line of defence
against fraud. Indeed, VISA reports that the incidence of fraud on systems
which are PIN-based is about one hundredth of that from signature-based cards.
Given that fraud on the latter varies from 0.1% and 1% depending on the
country and the issuing bank, PINs must be saving billions. However, PIN-based
systems have a number of weaknesses which are not always well understood, and
as bankers become complacent, and technical knowledge of their systems
continues to spread, both the incidence of fraud and the likelihood of a really
major incident continue to grow.

Attacks on Signature Based Card Systems
---------------------------------------

Before considering how ATM systems can be attacked, we should first look at
signature based systems such as credit cards and Switch, as frauds are both
fairly easy and much more common than with PIN-based systems.

In a recent case at Winchester Crown Court (R v Stone and Hider, 910321.5,
29 July 1991), the defendants were convicted of defrauding the Switch system.
They obtained a magnetic reader writer with which they could easily alter
the magnetic strip of bank cards, and reencoded their own Switch cards with
the account numbers of various members of the public. This account information
was obtained by picking up discarded ATM receipts.

The case highlighted some of the banks' difficulties. Firstly, record keeping
was so poor that the banks could not establish how much had been stolen, and
the prosecution had to proceed on the basis of an amount admitted by the
defence. Most banks appear to keep no central record of disputed transactions,
and many people defrauded in this matter may have had their claims summarily
dismissed by branch staff.

Secondly, these reader writers are easy to obtain, and despite such frauds
being widespread overseas and well reported in the security press, the UK
banks had not bothered to implement the best overseas practice, which is to
print only the last six digits of the account number on ATM and other receipts.

US banks are also starting to equip cards with card verification values (CVVs),
which are three digit codes written to the magnetic strip but not on the
receipt or the card face. Like the PIN, the CVV is derived cryptographically
from the account number, and can be checked by payment terminals. However,
organised criminals in the US now copy the entire magnetic strip by
installing card readers in shops or restaurants belonging to accomplices
[6]. Potentially, any purchase you make in the USA other than at a major chain
may be put through a bogus terminal and could result in a spate of fraudulent
debits appearing on your next statement.

There is evidence of increasing international cooperation between credit card
fraudsters. We can recall only one isolated case in the mid 80's of stolen card
numbers being used systematically on the other side of the Atlantic, but in the
last year or two this appears to have become a standard operating procedure as
criminals have realised that most `hot card lists' are only distributed
locally. In fact we learned recently from a senior US bank official that their
fraud loss tripled last year from about 0.3% to almost 1% of turnover.
Disputed transactions will be an increasing part of our future, and it is
highly likely that credit card operators will initially resist most claims,
for fear of suffering an avalanche of fraudulent claims of fraud.

Attacks on ATM Systems
----------------------

Banks have traditionally maintained a defence of infallibility in ATM
disputes. They claim that no transaction can possibly be made without the
card and the PIN, and so the client must have been negligent. Indeed, it is
not unknown for ATM cards to be `borrowed' by family members. However, the
blanket defence of infallibility is quite erroneous, as admitted in the Jack
Report [8], and has never been tested in a UK court; it would appear that in
practice the banks always settle.

In what follows, we list a number of ways in which an ATM system can be
subverted. The list is not exhaustive, but should give some idea of what may
have gone wrong, and help with the construction of arguments and
interrogatories in particular cases.

(1) The system can be compromised easily by poor administration. For example,
in February this year the author asked for an increased card limit: the bank
sent not one, but two, cards and PINs through the post. This was a near miss:
the cards arrived only a few days after intruders had got hold of our apartment
block's mail and gone through it looking for valuables. There appear to be no
statistics available for losses arising from this kind of incident, but we
expect that they account for thousands of cases a year.

(2) In our experience, banks in the English speaking world dismiss, or ask for
the resignation of, about one percent of their staff every year for
disciplinary reasons. A nontrivial proportion of these are for petty fraud or
embezzlement, in which ATMs are often involved. A clearing bank with 50,000
staff, which issued PINs predominantly through the branches rather than by
post, could expect about two incidents per business day of staff stealing cards
and PINs. These could be test cards, or cards otherwise used to milk the bank's
internal accounts; but it is simpler, and so much more common, for dishonest
staff to issue duplicate cards on ordinary accounts, or help themselves to
cards which have not yet been issued to customers.

(3) It may in some banks be possible for a dishonest teller to pass to a
customer's account a debit which masquerades as an ATM withdrawal, without
going near the ATM system. Such facilities may be provided in banking computer
systems in order to allow branch staff to rectify mistakes, and may be abused
from time to time. A policy of denying the existence of `phantom withdrawals',
and telling customers that they must have been defrauded by their own
relatives, may be expected to encourage this kind of embezzlement.

(4) Another source of trouble has been the existence of test transactions.
There was a test facility on one of the Olivetti 2000 series ATMs which would
output ten banknotes when a fourteen digit sequence was entered at the
keyboard. One bank published this sequence in its branch manual, and there
was a spate of fraud until all the banks using this type of machine had put
through a software change.

(5) Various program bugs and operational errors will also cause a certain
number of mistakes, such as duplicate transactions and debits posted to the
wrong account. These are familiar enough to heavy users of any bank's cheque
processing facilities, who correct them by reconciling their accounts and
demanding to see vouchers for stray debits. However, with ATM systems, the
customer cannot usually demand to inspect tally rolls, transaction logs and
balancing records; and any attempt at checking a disputed transaction is
generally frustrated in various ways by the bank. In view of the established
procedures for dispute resolution on cheque transactions, this may be a very
weak point in the banks' case. From our own banking systems experience, we
would expect an error rate from various causes of between 0.1% and 0.01% of
transactions; this is in order-of-magnitude agreement with surveys which show
that some 35% of UK cardholders have had an ATM dispute at some time in their
lives, but slightly higher than the Jack report's figure of one disputed ATM
transaction per hour in the UK. One can reconcile these differing error
estimates by the reasonable assumption that most victims of ATM errors
realise after contacting their branch that pursuing the matter will be futile.

(6) In addition to the above general problems, there are a number of
technical ways in which ATM systems can be attacked. One of the most
famous, at least within the computer security community, occurred at the
Chemical Bank in New York in about 1985. An ATM technician, who had been
dismissed, stood in ATM queues and observed customers' PINs as they were
entered. He would then pick up the discarded receipt, which contained the
account number, and write this number to the magnetic strip of a blank
card, just as with the R v Stone and Hider case. He managed to steal over
$80,000 before the bank saturated the area with security men and caught
him in the act. Needless to say, the emergence of worldwide ATM networks
during the past few years makes such attacks much more easy to mount, and
much more difficult to stop. In fact, it was this attack which motivated many
overseas banks to print only the last six digits of the account number on the
receipt.

(7) An even more sophisticated attack was reported from the USA in 1988. In
this case, the fraudsters had constructed a vending machine which would
accept any card and PIN, and dispense a packet of cigarettes. They placed this
in a shopping mall, and used the PINs and magnetic strip information it
recorded to forge cards for use in ATMs.

(8) Another technical attack relies on the fact that most ATM networks do not
encrypt the authorisation response to the ATM. This means that an attacker can
record a `pay' response from the bank to the machine, and continually replay it
until the machine is empty. This technique, known as `jackpotting', is not
limited to `hackers' - it appears to have been used in South Africa in
1987 by a bank's operations staff, who used network control devices to jackpot
ATMs where accomplices were waiting.

(9) Some banks decided to hold the encrypted PINs on a database. This meant
that a programmer, who knew that his own PIN was 1537, would observe that his
encrypted PIN was (say) 32AD6409BCA4331, and then search the database
for all other account numbers with the same PIN. If the bank has five
million cards outstanding, there should be at least five hundred of these.

(10) Banks which do not use security modules are open to much more direct
attacks. A system programmer can simply observe clear PINs passing through
the mainframe computer, compile a list of corresponding account numbers and
PINs, and make up forged cards.

(11) The worst case of all for the bank is when the PIN key itself becomes
known. We know of two cases of this, both of which were `inside jobs'
involving technical personnel. It is also just within the bounds of
possibility for a bank's PIN key to be determined by outsiders using
cryptanalysis - although this would be a major undertaking, and has been
estimated to need about 30,000 pounds worth of computer time [2]. However,
computing resources are rapidly becoming cheaper, and one could even envisage
a situation in which the codebreaking resources of the former USSR were
misused for private gain.

Electronic Document Interchange
-------------------------------

A number of vendors are selling systems for Electronic Document Interchange
(EDI). The idea is to save time and money by replacing paper documents such as
invoices, statements and so on with messages which are passed electronically
from one company to another. Of course, there exist quite substantial
opportunities for fraud in this area, as these electronic documents can
quite easily be altered by employees at either party to the transaction or even
by outsiders.

It is a matter of some concern to us that, although vendors make occasional
noises about security, few of the systems we have seen make any provision for
authenticating these electronic transactions.

Tampering could be undertaken to cover up theft of stock, support VAT frauds
or to introduce bogus invoices into a company's accounting system. As EDI
systems will also generate documents for official bodies such as HM Customs,
it is quite likely that they will become targets for drug smugglers wishing
to hide their shipments among those of a respectable importer.

We feel that vendors of EDI systems which do not offer facilities for
the authentication of all electronic documents according to best international
practice may be making themselves liable for large damages in the event of
these systems having to be substantially modified in the light of frauds
which are highly predictable today. It is concluded in the Jack report that
even following best practice is not a comprehensive defence against a claim
that a supplier has not discharged a duty of care, and that such a practice
may need to be reinforced by contract or by statute. Suppliers who do not even
bother to follow best practice may find themselves very vulnerable indeed
when the first big losses arrive.

This raises two related questions, namely what constitutes best practice; and
how can one prove, whether to a counterparty or an arbitrator, that a
transaction was in fact originated by a particular party.

Practice, Proof and Liability
-----------------------------

Most large banks worldwide now offer their corporate clients some kind of
cash management system, whereby the company treasurer can dial the bank's
mainframe computer from his PC and perform online account enquiries and
transactions. These transactions may be limited to moving money between the
company's various trading and deposit accounts so as to minimise overdraft
charges or maximise interest payments, or they may extend to making payments
to suppliers as well.

Needless to say, such systems need good security, for, if they are penetrated,
enormous sums could be siphoned off by the attackers. As a result, a lot of
work has been done on authenticating and encrypting electronic banking
transactions, and these developments now provide an example of good practice
to which EDI suppliers should adhere and which EDI customers should demand.
There are EEC standards on secure systems [3] but they are still at an early
stage of evolution and phrased in such general terms that, in our view, anyone
engaged in certifying an EDI system would have to look at its near analogues,
such as electronic funds transfer systems, for guidance.

Now a corporate banking system will typically provide three layers of security:
firstly, it will identify each user of the system positively, whether by means
of a password or by using a token such as a smartcard; secondly, it will
compute one or more digital signatures to authenticate each transaction;
and thirdly, it will encrypt the message traffic, in order to protect client
confidentiality.

The hard issue is: how can one verify the correctness of any given scheme
for authentication and encryption? What solutions are available to the
practical problem of arbitrating between two parties, one of whom claims his
system is secure, while the other claims that a transaction has been forged?

Such solutions will inevitably be technical in nature, and there are currently
two streams of research on the problem. The first, originating at MIT in
America, uses a technique known as public key cryptography to generate
digital signatures on transactions which can then be checked by anybody.
While mathematically elegant, this technique is rather slow and (in the US at
least) the subject of patents whose holders charge a significant royalty.

The second, which originated and continues here at Cambridge, uses the
techniques of formal logic to investigate the security claims made for
particular cryptographic systems, and to assist in the design of systems on
which great reliance must be placed.

Given that we can now produce designs whose correctness can be formally
verified, that such systems are in regular use overseas [7], and that any
desired arbitration function can be built in, it is hard to see how
purveyors of insecure systems can escape liability.

This is the standard view overseas. As already noted, the US government
imposes full liability on payment system operators such as banks, on the
grounds that they are the main beneficiaries when these systems are installed.
US Federal Reserve regulations ensure that it is the bank, rather than the
customer, who pays for disputed ATM and other EFT transactions, unless of
course the bank can prove fraud or negligence by the customer. With the
exception of Germany, countries which have investigated the liability issues
of electronic banking and transaction processing tend towards the American
view.

Conclusions
-----------

ATMs have been described as one of the top 100 ideas of the 20th century.
However, the current security technology of magnetic cards and PINs may be
due for review and upgrade. Recently reported figures [5] show that plastic
card fraud in the UK was 166,000,000 pounds in 1991, up 35% from 1990.
There will be a further sharp increase next year, as the banks' agreement to
carry all but the first 50 pounds of loss will cause many losses previously
borne by customers to be recorded in the official figures.

A number of prospective successor technologies have been available for several
years now. These include watermark cards, smart cards, and biometrics.

The first two are, for our present purposes, just cards whih are designed to be
difficult to forge. Watermark cards achieve this by embedding a serial number
in the magnetic strip which cannot be altered after manufacture, while smart
cards dispense with the magnetic strip altogether and store the customer
information in an embedded integrated circuit.

Biometrics refers to the automatic measurement of personal characteristics,
such as voiceprints, fingerprints or signatures; pilot projects have been
reported using fingerprints to identify bank customers in India and using
voiceprints to control the payment of pensions in South Africa, while the
industry giant IBM has launched devices for automatic signature recognition.

The problem therefore is not so much a shortage of technological options
as the banks' nervousness in committing to a new technology, out of fear that
a different technology might eventually become standard. Where this
nervousness has been overcome, for example in France, we have seen the
introduction of advanced payment systems based on smartcards [7].

However, mounting losses make clear that it is time for credit and debit card
operators to take the plunge and start building the next generation of
payment systems. These, together with the emerging EDI networks, should be
designed to be secure, and this will be more likely to happen once it is
accepted in the UK, as it already is overseas, that system operators should
be liable for all frauds and errors. After all, these are now largely
avoidable and will only be significant if the system suppliers take a more or
less conscious decision to economise on security.

Up till now, as the Jack report observed, UK banks tended not to see
electronic security as being a cost-effective investment, especially
as existing systems were cheap, alternatives less so, and the poor
customer could almost always be made to foot the bill for fraud.

This will all change. In the meantime, we have noted a strong tendency for
claims involving ATM and EFT disputes to be settled. An initial offer of
50% of the claim seems to be about normal, but settlement in full is usually
a reasonable goal where the plaintiff is a clearly credible witness.
The banks appear to perceive that the cost to them of an unfavourable
precedent could be very high indeed, and to be quite apprehensive about the
possibility of an avalanche of fraudulent claims of fraud. Even if this turns
out to be unfounded, they are not keen to expose their system security to
critical examination and are well aware that having to pay the full amount of
all disputed transactions, as in the USA, would be a significant exra expense.

In conclusion, practising lawyers should be aware that electronic transaction
systems are not infallible and that claims can very often be pursued with a
high expectation of settlement.

Bibliography
------------

[1]
D. W. Davies and W. L. Price,
'Security for Computer Networks', John Wiley and Sons 1984.

[2]
G. Garon and R. Outerbridge,
"DES Watch: An examination of the Sufficiency of the Data
Encryption Standard for Financial Institution Information Security in the
1990's", In Cryptologia, XV, no. 3 (July 1991) pp 177 - 193

[3]
Information Technology Security Evaluation Criteria, Provisional
Harmonised Criteria, June 1991, EC document COM(90) 314

[4]
C. H. Meyer and S. M. Matyas, 'Cryptography: A New Dimension in Computer Data Security', John Wiley and Sons 1982.

[5]
Sunday Telegraph, 8 March 1992

[6]
Times, 23 March 1992

[7]
R. J. Anderson, "UEPS - A Second Generation Electronic Wallet", to appear in
ESORICS 92

[8]
Report of the Review Committee on Banking Services Law, HMSO, 1989


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH