Seems cool like the concepts a screenwriter comes up to impress an audience but as I have always said and believed, the real security threats are the ones you don't hear about.
One thing I use to gauge a security threat is to actually plan on carrying it out. This gives a person an insight on what the threat really is.
Let's say this is really good information and I want to steal from a total stranger. Again let's say I successfully got his/her pin number, what's next?
Steal the card? (yeah, when the card goes missing the person dials the bank immediately to deactivate it. Plus, we're reduced from high-tech savvy criminals to pick pocketers lol.)
Log in to the person's online banking? (Even the most basic banks don't rely on simple pin for online transactions, plus you need the actual log in information)
Admittedly there's one use I want to try this on. Right now, there are restricted areas where I don't have access that may rely on pin codes instead of card swipes. I'll see if I can make use of it there.