Contact company icon Add as a preferred source Download PDF version
In order to assist with the reporting and analysis of such devices, and to set a common standard for describing the placement of skimming devices, EAST has produced these Guidelines

These Guidelines have been put together by members of the EAST Expert Group on ATM Fraud

The European ATM Security Team (EAST) has published a document entitled ‘Standardization of Terminology for locations of Card Data Compromise devices at ATMs.’

These Guidelines have been put together by members of the EAST Expert Group on ATM Fraud (EGAF).

Fraudsters have been constantly improving ATM skimming devices since the first basic devices appeared. Various types of ATM skimming devices are used by fraudsters, both digital and analog. Initially fraudsters used simple overlay skimming devices at the card reader throat, but with the evolution of more sophisticated types of skimming devices, the placement of them has moved to other locations around the card reader (both external and internal). Wire-tapping devices (eavesdropping) have also been used to tap data at the card reader pre-read and read heads, and also card reader-electronics.

EAST Has Produced Guidelines For The Industry & Law Enforcement

In order to assist with the reporting and analysis of such devices, and to set a common standard for describing the placement of skimming (and shimming) devices, EAST has produced these Guidelines for the Industry and Law Enforcement. While most skimming devices are designed to skim magnetic stripe data, these Guidelines also consider the possible placement of devices that are used to read data from the Chip (shimming devices) or to perform a relay attack.

These Guidelines are available for download on the EAST Intranet to EAST members (National and Associate), and there is a version available for wider circulation. EAST Associate Membership is free for Law Enforcement Officers.

Find out the state of adoption, trends and opportunities with Artificial Intelligence (AI) in physical security.

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...