ASTM E3017-2015 Standard Practice for Examining Magnetic Card Readers《检查磁卡阅读器的标准实施规程》.pdf
《ASTM E3017-2015 Standard Practice for Examining Magnetic Card Readers《检查磁卡阅读器的标准实施规程》.pdf》由会员分享,可在线阅读,更多相关《ASTM E3017-2015 Standard Practice for Examining Magnetic Card Readers《检查磁卡阅读器的标准实施规程》.pdf(8页珍藏版)》请在麦多课文档分享上搜索。
1、Designation: E3017 15Standard Practice forExamining Magnetic Card Readers1This standard is issued under the fixed designation E3017; the number immediately following the designation indicates the year oforiginal adoption or, in the case of revision, the year of last revision. A number in parentheses
2、 indicates the year of last reapproval. Asuperscript epsilon () indicates an editorial change since the last revision or reapproval.1. Scope1.1 Magnetic card readers, when used for illegal purposes,are commonly referred to as skimmers. This practice providesinformation on seizing, acquiring, and ana
3、lyzing skimmingdevices capable of acquiring and storing personally identifiableinformation (PII) in an unauthorized manner.1.2 This standard does not purport to address all of thesafety concerns, if any, associated with its use. It is theresponsibility of the user of this standard to establish appro
4、-priate safety and health practices and determine the applica-bility of regulatory limitations prior to use.2. Referenced Documents2.1 ASTM Standards:2E2763 Practice for Computer ForensicsE2916 Terminology for Digital and Multimedia EvidenceExamination2.2 ISO Standards:3ISO/IEC 7812 Identification C
5、ardsIdentification of IssuersISO/IEC 7813 Information TechnologyIdentificationCardsFinancial Transaction Cards2.3 SWGDE Standards:4SWGDE Best Practices for Computer ForensicsSWGDE Recommendations for Validation Testing3. Terminology3.1 Definitions of Terms Specific to This Standard:3.1.1 parasitic s
6、kimmer, na type of device manufacturedfor the capture of account data from magnetically encodedcards that operates in-line with the originalATM, gas pump, orother card reading device.3.1.2 start sentinel, na 5-bit binary sequence, or equiva-lent ASCII character, used to signify the beginning of trac
7、kdata. (See ISO/IEC 7813).3.1.3 skimmer, na magnetic card reader, specifically whenused for an illegal purpose.3.1.4 skimming, nusing a skimmer to acquire PII in anunauthorized manner.3.1.5 swipe, vto manually pass a magnetically encodedcard through a card reader device to transfer information fromt
8、he card.3.2 Acronyms:3.2.1 ADPCM, nadaptive pulse code modulation3.2.2 AES, nadvanced encryption standard3.2.3 ASCII, nAmerican standard code for informationinterchange3.2.4 BFSK, nbinary frequency-shift keying3.2.5 CVV, ncard verification value3.2.6 CVV2, ncard verification value 23.2.7 EEPROM, nel
9、ectrically erasable programmableread only memory3.2.8 IIN, nissuer identification number3.2.9 PAN, nprimary account number3.2.10 PCM, npulse code modulation3.2.11 PII, npersonally identifiable information3.2.12 PIN, npersonal identification number3.2.13 USB, nuniversal serial bus3.2.14 XOR, nexclusi
10、ve or3.2.15 ZIF, adjzero insertion force3.2.16 BIN, nbank identification number4. Significance and Use4.1 As a skimming device is not typically deemed contra-band in of itself, it is the responsibility of the examiner todetermine if the device contains unauthorized account infor-mation. The purpose
11、of this practice is to describe bestpractices for seizing, acquiring, and analyzing the data con-tained within magnetic card readers.4.2 LimitationsSkimmers present unique examinationchallenges due to:1This practice is under the jurisdiction of ASTM Committee E30 on ForensicSciences and is the direc
12、t responsibility of Subcommittee E30.12 on Digital andMultimedia Evidence.Current edition approved May 1, 2015. Published June 2015. DOI: 10.1520/E3017-15.2For referenced ASTM standards, visit the ASTM website, www.astm.org, orcontact ASTM Customer Service at serviceastm.org. For Annual Book of ASTM
13、Standards volume information, refer to the standards Document Summary page onthe ASTM website.3Available from National Institute of Standards and Technology (NIST), 100Bureau Dr., Stop 1070, Gaithersburg, MD 20899-1070, http:/www.nist.gov.4Available from the Scientific Working Group on Digital Evide
14、nce (SWDGE),https:/www.swgde.org.Copyright ASTM International, 100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959. United States14.2.1 Rapid changes in technology,4.2.2 Difficulty of device disassembly,4.2.3 Lack of standards in use of the technology,4.2.4 Use of alternate/repurpos
15、ed components,4.2.5 Use of encryption,4.2.6 Multiple data encoding/modulation formats,4.2.7 Prevention of chip identification by obfuscation of thedevice,4.2.8 Availability of training and documentation,4.2.9 Lack of chip information/documentation,4.2.10 Lack of adapters available for chip reading,4
16、.2.11 Lack of softwares ability to support reading chipdata, and4.2.12 Lack of commercial software available to analyzeencrypted data extracted from skimmers.5. Technical Background5.1 As skimmers are often unique in design andimplementation, examination processes vary depending uponthe category or
17、type of device, or both.5.2 In general, skimmers may be broken down into thefollowing three categories:5.2.1 Hand-held,5.2.2 Altered hand-held, and5.2.3 Custom.5.3 The processes used in examinations vary greatly de-pending on the device itself and the manner in which the storedinformation is encoded
18、.5.4 Hand-HeldData extraction of hand-held skimmers(Fig. 1) is accomplished by connecting the skimmer to theexaminers computer by means of a data cable. Onceconnected, a program is executed that extracts all of the storedtrack data from the device.5.5 Altered Hand-HeldIt is common for commercialskim
19、mer devices to be dismantled and used for parts (canni-balized). These devices are commonly seized from automatedteller machines (ATMs), bank point-of-sale terminals, and gaspumps. Examination of these devices is frequently performedin a manner similar to hand-held devices. Wireless-enabledskimmers
20、are often seen as an alteration of commercialskimmers (Figs. 2 and 35).5.6 Custom:5.6.1 By far, the most complicated and difficult-to-examineskimmers are custom-manufactured devices (Fig. 4). Thesedevices use many different circuit designs and proprietary dataencoding, modulation, and encryption sch
21、emes. These skim-mers can be combined with a pinhole camera or a keypadoverlay to capture the personal identification number (PIN) ofthe account holder.5.6.2 As it is common in some larger metropolitan areaATMs to require a customer to use their account card for entryto a vestibule, subjects can imp
22、lant foreign circuitry into thedoor reader (Fig. 5).5.6.3 Some skimming devices may have the capability tooutput captured data by means of wireless communicationmethods (Fig. 6). These devices may transmit their data inreal-time or batch mode. The transmitting ability of thesedevices and the choice
23、of transmission protocols used makedetection of receivers difficult.5.7 Card Data/Structure:5A trademark of Bluetooth SIG, Inc., Kirkland, WA.FIG. 1 Example of a Hand-Held SkimmerFIG. 2 Example of an Altered Hand-Held SkimmerFIG. 3 Example of an Altered Hand-Held Skimmer with Bluetooth5FIG. 4 Exampl
24、e of a Custom SkimmerE3017 1525.7.1 Fundamentals of Track Data:5.7.1.1 The International Standards Organization (ISO) cre-ated ISO/IEC 7812, which specifies, “a numbering system forthe identification of issuers of cards that require an issueridentification number (IIN) to operate in international, i
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ASTME30172015STANDARDPRACTICEFOREXAMININGMAGNETICCARDREADERS 检查 磁卡 阅读器 标准 实施 规程 PDF

链接地址:http://www.mydoc123.com/p-532246.html