[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
summary of recent meeting with top Mondex officials (fwd)
---------- Forwarded message ----------
Sender: [email protected]
Subject: summary of recent meeting with top Mondex officials
Date: Mon, 24 Aug 1998 14:07:40 -0400 (EDT)
To: [email protected]
From: David Jones <[email protected]>
Mondex meeting
I would like to give a brief synopsis of the meeting
that I attended two Fridays ago (August 14th) in Toronto.
Present were:
Joanne De Laurentiis, President & CEO, Mondex Canada
David Phillips, Vice-President, General Counsel, Mondex Canada
Deen Farouk, Director, Mondex Canada
Mark Tonnesen, Executive Vice-President, Card Services, Royal Bank
David Braidwood, Senior Manager, Standards and Security, Royal Bank
Martyn Cooper, Senior Manager, Smart Card Industry, Royal Bank
Ann Cavoukian, Privacy Commissioner of Ontario
Carol Markusoff, Policy Analyst, Ontario Privacy Commission
Peter Hope-Tindall, XL Consulting, Special Advisor to Privacy Commissioner
David Jones, President, Electronic Frontier Canada
The purpose of the meeting was to have an open discussion
about privacy and security of the Mondex electronic payment system.
As most of you probably know, Mondex value can be transfered between
smart-cards to make purchases and new value can be downloaded onto the
cards from bank ATMs or over the phone.
For some (highly critical) background, please see:
"Mondex: A House of Smart-Cards?"
http://www.efc.ca/pages/media/convergence.12jul97.html
What actually prompted the meeting was an article that appeared
this summer in the June issue of the Financial Post Magazine.
"Mondo Mondex"
http://www.efc.ca/pages/media/financial-post-magazine.01jun98.html
The meeting got off to an amusing start as two bankers remarked
that I wasn't wearing a tie, although I must say I thought I was
dressed quite fashionably, ... for a professor. I made some remark
about "casual Fridays", but it didn't seem to help. The fact that
I had taken a *bus* in from Hamilton that morning also seemed to be
another clear indication to all present that I didn't hang around in the
same circles as these senior bankers. I must say, it was a very cordial,
informative, and interesting meeting. Everyone was quite charming and
clearly expert in their own fields.
They outlined the different roles that the banks and Mondex play
in the system, including a separate corporate entity called the
"Mondex Canada Originator" that actually "prints money", in the
sense that it issues *new* value on Mondex cards. This is the only
place this occurs: the banks, merchants, and consumers merely push
value around in the system, from card to card.
Interestingly, the "Mondex Canada Originator" is not recognized as a bank,
and is not even recognized as a financial institution by Canadian authorities.
The "float", the account holding real Canadian dollars to back up "value"
stored on cards, is invested to earn a profit, but is *not* backed up
by any federal deposit insurance.
The current implementation of the Mondex system uses a well-known
"symmetric" encryption algorithm for security, implemented on a
Hitachi H8/3102 chip. Interestingly, the value of transactions
is transferred "in the clear" between cards. Encryption is used
for digital signatures. Each card has a transaction log that
stores the following information about up to 10 transactions:
PID,AMT,NAR,AMT,CUR,TIM,SEQ1,SEQ2
PID = purse ID of the *other* card
NAR = 12 characters of "narrative" information (e.g. customer/vendor name)
AMT = amount of value transferred
CUR = currency used
TIM = timestamp (from retail machine or consumer wallet, may be inaccurate)
SEQ1= unique transaction sequence number for *this* purse
SEQ2= unique transaction sequence number for the *other* purse
It's at this point that the privacy commissioner, Ann Cavoukian,
started asking questions about how this transaction data gets used.
Although merchant terminals are able to capture all of this information,
and even have a modem to transmit it back to banks, we were told that
this is not done in Guelph, in part because there is not (yet) any software
on the bank end to process the data. There was also the suggestion that,
in the future, Mondex might choose to rely on contractual limitations
on the use of the data to prevent some vendors (e.g., Walmart) from using
the information for data mining. I am fairly willing to accept that there
are not any terrible privacy problems with Mondex in Guelph *today*,
but it is much more murky when we look to the future and imagine
how the system may eventually be used.
When discussing security and the potential for "hackers" to create
counterfeit Mondex value, it became apparent that the banks themselves
are doing nothing at all to deal with security. It seems to me that a
good analogy could be made with how banks deal with credit cards:
They depend on the credit card company to worry about security and fraud.
With Mondex, the banks are relying on the chip's use of encryption
and their "tamper-resistance" (meaning they are supposed to lock up
if you mess around with them). Only the "Mondex Canada Originator"
has a "crude" risk management system, which monitors that balance of funds
sitting in the "float" account and monitors uploads and downloads
between banks and merchants/customers. If usage patterns deviates
outside normal fluctuations, on the order of 3-4%, then an alarm is
raised to investigate. In the Guelph pilot, this alarm has gone off
"about 5 times", (false alarms, since there has not been any fraud).
In the "unlikely" scenario, that counterfeit Mondex value is created,
the system is supposed to be able to contain the flow of fraudulent
value and limit the damage that might occur. It is surrounding this
point that there seems to be a great deal of confusion and contradictory
information coming from Mondex. For instance, on their web site, Mondex says:
Detection: On-Chip Security
The Mondex chip has its own risk management measures, built-in to
the chip itself. The chips are programmed to automatically react
to 'unusual' card behaviour, such as very high levels of value
redemption and temporarily close down.
URL= http://www.mondex.com/mondex/cgi-bin/...
.../printpage.pl?fname=../documents/detection.txt&doctype=genp
Well, as far as I can tell, based on what I heard at the meeting,
the statement above is not correct.
On a related page, Mondex says:
Recovery: Rogue Cards
Naturally cards identified as being unauthorised, reported stolen,
or potentially fraudulent can delinked immediately from the
banking system.
URL= http://www.mondex.com/mondex/cgi-bin/...
.../printpage.pl?fname=../documents/recovery.txt&doctype=genp
It turns out this statement, as far as I can tell, is also not correct.
The "Mondex Canada Originator" has no authority and no technical ability
to "delink" a card. The Banks also seem to lack the ability to
remotely deactivate cards through their ATMs. I asked how many times
cards in Guelph had been locked out because of suspicious behaviour.
I was told "zero times".
On an interesting technical note, we were told that Mondex cards use
a seven-step protocol to transfer value from one card to another.
It is not possible to "create" value by interrupting a transaction,
but it is possible to "destroy" value, if one card has debited its value
records before the other has credited its value. In such a case,
the card is supposed to keep a record of this "exception", so the bank
can later re-imburse the consumer for the lost value. We were told that
approximately $4,600 has been paid out to customers for such failed
transactions. To put this in context, so far about $2 million has been
issued on Mondex cards in the 18 month pilot study, so this means
roughly 0.25% of value gets destroyed by errant transactions.
The discussion about security explored various "scenarios" about
how someone might try to extract value from the system, assuming that
it was even possible to "hack" a Mondex card. This so exasperated
the Exec VP with the Royal Bank, Mark Tonnesen, that he turned to me
and said, "Look, I'll pay you $100,000 if you can create fake Mondex value".
Hmmm, maybe I'll just take him up on his offer. ;-) ;-)
-- David Jones
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Prof. David G. Jones president, Electronic Frontier Canada
McMaster University email: [email protected]
Dept of Computer Science web: http://www.efc.ca/
1280 Main St West office: +1 (905) 525-9140 ext. 24689
Hamilton, ON, Canada L8S 4K1 fax: +1 (905) 546-9995
-----------------------------------------------------------------------------