Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Time for smartcards
The Hill ^ | 3 Feb 14 | John J. Mulligan

Posted on 02/03/2014 1:28:40 PM PST by SkyPilot

The data breach that struck our company spotlighted the sophistication of criminal hacker networks operating across the globe. We know the attack created significant concerns for millions of customers. We will learn from this incident and we will work to make Target, and the wider business community, more secure in the future.

One step American businesses could now take that would dramatically improve the security of all credit and debit cards: adoption of chip-enabled smartcards. The technology is already widely used throughout the world. For many reasons, the United States has been slow to embrace the technology at home. We need to change.

At Target, we've been working for years towards adoption of this technology. Since the breach, we are accelerating our own $100 million investment to put chip-enabled technology in place. Our goal: implement this technology in our stores and on our proprietary REDcards by early 2015, more than six months ahead of our previous plan.

Nothing is more important to Target than our customers. We are who we are because of their trust and loyalty. That is why it is so important to move forward with a more secure technology.

For consumers, this technology differs in important ways from what is widely used in the United States today. The standard credit and debit cards we use now have a magnetic stripe containing the customer's information. When first introduced, that stripe was an innovation. But in today's world, more is needed. The latest "smart cards" have tiny microprocessor chips that encrypt the personal data shared with the sales terminals used by merchants. Why is such a change important? Even if a thief manages to steal a smart card number, it's useless without the chip.

(Excerpt) Read more at thehill.com ...


TOPICS: Business/Economy; Crime/Corruption; Editorial; Government; News/Current Events
KEYWORDS: 666; chipandpin; creditcards; debitcards; economy; fazio; faziomechanical; identitytheft; markofthebeast; neiman; neimanmarcus; ramscraper; smartcards; target
Navigation: use the links below to view more comments.
first previous 1-2021-36 last
To: SkyPilot

The fedzilla cannot monitor cash transactions, plus some companies offer a cash discount. And with cash, you don’t go into debt. Whoo Hoo, good stuff.


21 posted on 02/03/2014 3:10:24 PM PST by Texas resident
[ Post Reply | Private Reply | To 20 | View Replies]

To: SkyPilot

And here I was thinking it’s time for cash again.


22 posted on 02/03/2014 4:05:10 PM PST by Alex Murphy ("the defacto Leader of the FR Calvinist Protestant Brigades")
[ Post Reply | Private Reply | To 1 | View Replies]

To: familyop
Everyone with an ongoing good moral education should move toward using cash.

Amen! Last summer I decided, as an experiment, to stop using, as much as possible, my debit card (don't have/don't want a credit card).

I started hitting the ATM for $100 at a time and spending the cash instead of using the card. Results:

· I'm more aware of what I'm spending. With the debit card, sometimes I wouldn't even look at the total.
· I make fewer trips to the store and buy more on each trip. I haven't figured this one out.
· Balancing the checking account is a lot easier as the number of transactions has dropped way down.

The experiment has been a success. I still use the debit card for online shopping, etc., but for everything else I pay cash.

Naturally, YMMV.

23 posted on 02/03/2014 4:50:50 PM PST by upchuck (Stop this abuse now! Get behind Convention of States: http://bit.ly/1ak1Iz9)
[ Post Reply | Private Reply | To 19 | View Replies]

To: SkyPilot

I’ll quit credit cards if they try to make chip imbedded ones mandatory.

I won’t have a smart phone either.


24 posted on 02/03/2014 4:53:37 PM PST by dalereed
[ Post Reply | Private Reply | To 1 | View Replies]

To: upchuck
"I make fewer trips to the store and buy more on each trip. I haven't figured this one out."

Saves on fuel and time! I'm very aware of that, because my monthly round trip for groceries is about 110 miles.


25 posted on 02/03/2014 4:55:58 PM PST by familyop (We Baby Boomers are croaking in an avalanche of corruption smelled around the planet.)
[ Post Reply | Private Reply | To 23 | View Replies]

To: Texas resident

“And with cash, you don’t go into debt.”

I’ve never had any debt other than a mortgage on our 1st home and I use credit cards all the time but they are paid in full the day the bill arrives.

I’ve never even bought a car that I didn’rt pay for in full including my 1st one when i was 14.


26 posted on 02/03/2014 5:00:48 PM PST by dalereed
[ Post Reply | Private Reply | To 21 | View Replies]

To: F15Eagle

Some Euro nations have gone to biometrics for passports. We used biometrics extensively in Iraq to track insurgents.


27 posted on 02/03/2014 5:01:38 PM PST by redleghunter
[ Post Reply | Private Reply | To 15 | View Replies]

To: Vigilanteman
I don't know why we've been so slow to embrace the technology.

Possibly ---> Thumbprint scans already come with every single new iPhone so that only you can use it. To those who believe in Bible prophecy, hang onto your hats.

This knowledge base must be diminished first...

28 posted on 02/03/2014 7:04:38 PM PST by Elsie (Heck is where people, who don't believe in Gosh, think they are not going...)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Buckeye McFrog
http://www.buckeyeinteractive.com/2013/10/kid-turn-in-announces-new-qr-code-temporary-tattoo-child-locator/
“Our latest family trip to Disney World felt safer and less nerve-wracking because all of the kids in our family had Kid Turn In temporary tattoos,” 
 
 
 
 
 
 
 
 
 
 
 
 
https://www.google.com/search?q=qr+tattoo&rls=com.microsoft:en-US:IE-Address&rlz=1I7ADRA_enUS475&source=lnms&tbm=isch&sa=X&ei=I1nwUtXlOsbgyQHbloHYDA&ved=0CAkQ_AUoAQ&biw=1366&bih=622#facrc=_&imgdii=_&imgrc=kdDf7UzcywTI5M%253A%3BsSueF-TLAJvKbM%3Bhttp%253A%252F%252Frack.2.mshcdn.com%252Fmedia%252FZgkyMDEzLzA0LzA2Lzg0L3FyX2NvZGVfZnVsLjNmYTBkLmpwZwpwCXRodW1iCTEyMDB4OTYwMD4%252F645a5001%252F30b%252Fqr_code_fullsize.jpg%3Bhttp%253A%252F%252Fmashable.com%252F2013%252F04%252F07%252Fqr-code-tattoo-comic%252F%3B1200%3B1213
 
 
 

29 posted on 02/03/2014 7:12:47 PM PST by Elsie (Heck is where people, who don't believe in Gosh, think they are not going...)
[ Post Reply | Private Reply | To 11 | View Replies]

To: lurk; SkyPilot; Vigilanteman; dalereed; familyop; morphing libertarian; All
Now, that would be absolutely secure, eh?

The chip-and-pin system is, certainly, an advancement over magnetic strip cards (which are easier to "skim") but in the case of Target and Neiman Marcus and other retailers, the breach of security had nothing to do with physical cards' security features.

People who understand little about card-payment technology simply use this incident to again glom onto the usual "Others (Europeans?) do it better" and old and tired "American banks and credit card companies just don't want to spend money on security because it's cheaper for them to absorb the costs of fraud" laments.

Actually, the magnetic strip cards hold minimal amount of information, so while it's easier to manufacture a forged one, it's also easier to cancel and replace without criminals getting too much of your personal info.

The problem with this particular security breach is that it happened on the back-end of payment processing, using an old (at least, since before 2007) vulnerability that likely has not been patched up by certain payment processors, despite warnings from Visa and security experts.

From What the Heck Is a RAM Scraper? - Re/code, by Arik Hesseldahl, 2014 January 13

As can be seen, the US companies are not alone in being attacked by this method, because vulnerability has nothing to do with magnetic strips or other physical cards' properties.

Chip-and-pin wouldn't protect from this attack, it could only help making it more difficult to counterfeit the physical card, which is mostly a waste of time, anyway - much less important than the identity info on the payment processors' servers.

30 posted on 02/03/2014 11:38:17 PM PST by CutePuppy (If you don't ask the right questions you may not get the right answers)
[ Post Reply | Private Reply | To 5 | View Replies]

To: CutePuppy
The chip-and-pin system is, certainly, an advancement over magnetic strip cards (which are easier to "skim") but in the case of Target and Neiman Marcus and other retailers, the breach of security had nothing to do with physical cards' security features.

I'll even bet that most of these so called HACKING incidences are merely INSIDE jobs.

Not very many men (or women) have the virtue to resist the highest bidder.

31 posted on 02/04/2014 3:30:00 AM PST by Elsie (Heck is where people, who don't believe in Gosh, think they are not going...)
[ Post Reply | Private Reply | To 30 | View Replies]

To: dalereed

Cool. I bought my first car at 15. $700 for a 1970 VW beetle. Ran it until it started spitting the spark plugs out.


32 posted on 02/04/2014 3:56:54 AM PST by Texas resident
[ Post Reply | Private Reply | To 26 | View Replies]

To: Texas resident

Awe, Man! I paid $1400.00 for a baby-blue Beetle, also my first car.


33 posted on 02/04/2014 6:41:48 AM PST by Diana in Wisconsin (I don't have 'Hobbies.' I'm developing a robust Post-Apocalyptic skill set...)
[ Post Reply | Private Reply | To 32 | View Replies]

To: CutePuppy

Great information. Thanks.


34 posted on 02/04/2014 12:19:00 PM PST by SkyPilot
[ Post Reply | Private Reply | To 30 | View Replies]

To: CutePuppy
As can be seen, the US companies are not alone in being attacked by this method, because vulnerability has nothing to do with magnetic strips or other physical cards' properties.

In a properly-designed smartcard-based system, the merchant's computer should request from the card issuer a random security token, and should never--even for a microsecond--hold enough information to perform a transaction not associated with that token. The card issuer would know that the token was issued to the merchant, and could require that any money taken from the card using it must go to an account associated with the merchant.

Ideally, credit-card-entry terminals would be constructed in such a way that a plugged-in smart card would get first "dibs" at keyboard data, nothing else could see it unless the smart card passed it along, and no change to such behavior would be possible without physically compromising the card entry terminal. In such a design, no remotely-programmable machine would ever see a customer's PIN, and thus even attack code with full access to ram-scrape all reprogrammable devices would not gain access to it.

Given the extent to which financial institutions have failed to achieve the level of security which would be possible even with simple magnetic stripe cards, and checks, I wouldn't expect them to implement the best possible smart-card system; nonetheless, a well-designed smart-card system could be made much more secure than would be possible without smart cards.

35 posted on 02/04/2014 4:03:28 PM PST by supercat (Renounce Covetousness.)
[ Post Reply | Private Reply | To 30 | View Replies]

To: supercat; Elsie

I think you are confusing the POS terminal software with the [back-end] payment processing server software where the malware actually resided (it would be near impossible to infect enough terminals to affect the records of 70 million people over a period of a few months).

Whether smartcard or magnetic-strip card is used at the POS (Point Of Sale) terminal is irrelevant - the encrypted data/tokens are passed to the payment processing server of one of the PPS companies, such as BluePay, Chase Paymentech, Global Payments, Heartland Payment Systems, International Payment Processing Company, National Processing Company, Pathfinder Processing Solutions, Payment Systems Corp., PayPros etc. etc. (2013 Top 50 Payment Processing Companies)

If Target and Neiman Marcus had the same (or similarly infected) payment processor, it easily explains how otherwise unrelated millions of people in different corners of the US and other countries had their data compromised simply by swiping their cards — the POS terminals and the cards were not the weak point, the servers infected with the RAM Scraper were.

That's why in my post I put the emphasis on and specifically underlined the back-end / processing server software as the infected culprit.

Quite possible. Security industry stats show and it is generally agreed that at least 90% of the enterprise data theft is done not through outside infections or break-ins, glorified in many "hacker" movies, but rather using either in-house accomplice or the kind of "social engineering" popularized by Kevin Mitnick.

36 posted on 02/04/2014 5:49:23 PM PST by CutePuppy (If you don't ask the right questions you may not get the right answers)
[ Post Reply | Private Reply | To 35 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-36 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson