Jim Merithew/WIRED
In 1960, an IBM engineer named Forrest Parry was developing a new
type of ID card for the CIA when he had an epiphany: Why not make each
card a tiny data storage device in and of itself? He cut a short length
of half-inch wide magnetic tape from a reel and wrapped it around a
blank plastic card, secured it with Scotch tape, and then, at his wife’s
suggestion, pressed it on with a warm iron.
The magnetic stripe card was born.
Today magstripes are on the backs of millions of US-issued credit and
debit cards, where they hold all the information needed to produce a
flawless counterfeit card—account number, expiration date, and a secret
code called a CVV. That has made Forrest Parry’s invention one of the
computer underground’s most prized targets—more valuable than anything
on your hard drive. We were reminded of that last week, when Home Depot
confirmed that 56 million
shoppers had their credit card data siphoned from the big box
retailer’s point-of-sale systems over six months. That’s 3,000 miles of
magstripe, stolen three inches at a time.
The announcement makes the Home Depot breach the single largest known
theft of credit card data in history, edging out the 40 million cards
stolen from Target late last year, and about the same number taken from TJX in 2006. It may also be one of the last major credit card heists.
But more on that in a moment.
The first magstripe card.
(CC) Jerome Svigals via Wikimedia Commons
First, a bit of history: What happens to stolen bank card data hasn’t
changed in 15 years—the hackers package it and sell it in bulk to the
underground’s third-party resellers. Ten years ago it was the Ukranian
known as “
Maksik”; today it’s the
Ukrainian known as “Rescator.” If
Parry’s innovation
was to take a bulk storage medium and literally slice it into a
wallet-sized one, the computer underground has perfected the opposite
process, compiling all those squirts of information into a big data play
that would make Mark Zuckerberg envious.
Once it’s in an underground shop, card counterfeiters buy the magstripes they need—sometimes ordering by bank or ZIP code—and
copy it onto fake cards
using their own magstripe encoding machines. Then they use the cards to
buy goods they can resell or dispatch crews to do the shopping for them
in exchange for a cut of the profits.
Since about 2001, stolen magstripe swipes, or “dumps,” have been the
pork bellies of a massive hacker commodities market, centered in Eastern
Europe and stretching around the globe. Beyond the hackers who breach
stores like Home Depot, and the resellers like Rescator who market the
cards, there are vendors specializing in the hardware and
material—plastic embossers, fake holograms, blank cards, magstripe
encoders—needed to use the data and others who crank out professional
fake IDs to help pass the fake cards. By the most conservative
estimates, it all adds up to $11 billion in losses annually.
But the golden age of credit card fraud is drawing to a close, and
history will regard Home Depot, TJX, Target, and all other breaches as a
single massive exploit against one catastrophic security hole: The
banks’ use of roughly 23 characters of magnetically encoded data as the
sole authentication mechanism for a consumer payment infrastructure that
generated 26.2 billion transactions in 2012 alone. Engineering students
will study that gaffe with the astonished bemusement with which they
view old footage of the Tacoma Narrows Bridge twisting in the wind.
The fatal problem with the credit card magstripe is that it’s only a
container for unchanging, static data. And if static data is
compromised anywhere in the processing chain, it can be passed around, copied, bought and sold at will.
The solution has been available for years: Put logic in the card.
Thanks to Moore’s Law, an inexpensive tamper-resistant microprocessor
fits comfortably in a space smaller than your driver’s license photo.
With a computer on both edges of the transaction, you can employ
cryptography and authenticate the card interactively, so that
eavesdropping on the transaction gains you nothing. Just as IBM’s Parry
made our wallets smarter by adding computer storage, a modern card is
smarter still by having an entire computer onboard.
Now, after resisting it for 10 years because of the formidable
transition costs, the US is about to finally embrace the secure
chip-based authentication system called EMV—the standard was pioneered
by Europay, MasterCard, and Visa—that the rest of the world has already
adopted. Pushed by mounting fraud costs, credit card companies have
crafted incentives for merchants to switch to the sophisticated readers
needed to accept the cards. “There was a lot of skepticism about whether
it would ever happen in the US,” says Michael Misasi, an analyst with
the Mercator Advisory Group. “All of the data breaches that have
happened have woken people up, and progress has been accelerating this
year.” The first serious milestone is October 2015. By 2020 the
swipe-and-sign magstripe reader will be as hard to find as the credit
card impression rollers they supplanted.
By then, it’s probably safe to say, the entire idea of a credit or
debit “card” will be quaint. With the newly announced Apple Pay joining
Google Wallet as a real-life payment system, even the chip-based credit
cards will be little more than a backup technology. Apple
took some ribbing
for announcing Apple Pay while its iCloud celebrity breaches were still
in the news. But unlike cloud storage, the state of the art of retail
payment is so poor today that Apple can’t possibly fail to improve it.
You can see where this is headed by looking at one of EMV’s early
adopters. Since the UK deployed EMV “chip-and-PIN” cards in 2004,
overall card fraud in that country has fallen 32 percent, from 504.8
million euro in losses that year to 341 million in 2011, according to
the most recent figures from the
UK Card Association.
There are two loopholes that kept criminals from being hit even
harder by the chip cards. First, the UK cards still have magstripes so
UK travelers can use them when visiting the US. Adaptable criminals in
the UK began working with confederates in restaurants and shops,
covertly swiping magstripes from customers and selling them to American
crooks to use at primitive American point-of-sale terminals. These scams
contributed as much as 80 million euro in foreign fraud charges on UK
cards in 2011.
But that loophole will close once the US switches over to EMV. The
second, bigger, loophole is online fraud. Internet transactions aren’t
made any safer by having a chip on your card, and in the UK and
elsewhere criminals were able to make up much of what they lost by
doubling down on fraudulent web purchases.
But the end is nigh for online credit card fraud, too. Systems like Apple Pay and Visa’s newly announced
Visa Token Service
accomplish the same security goals as EMV, but also work online. They
replace the static credit card number with a temporary token that
changes every time. “Initially, Apple Pay’s tokenization will only be
for in-app purchases from mobile phones,” says David Robertson,
publisher of the respected payments industry newsletter
The Nilson Report. “But over time that will broaden.”
Robertson agrees that the simultaneous arrival of EMV and
tokenization in the US will trigger a sea change in the underground.
“There’s every reason to think that the industry will get ahead of the
bad guys again,” he says.
None of this means cybercrime will become unprofitable. Skilled
cyber-criminals will still make tons of money in more elaborate scams,
like account takeovers and identify theft. But the death of the
magstripe will trigger a financial crisis in the unskilled ranks of the
computer underground akin to what the mortgage collapse did to Wall
Street. And Perry’s historic invention, so brilliant at the time, can
relax into its long overdue retirement.