Download PDF version Contact company
In order to assist with the reporting and analysis of such devices, and to set a common standard for describing the placement of skimming devices, EAST has produced these Guidelines

These Guidelines have been put together by members of the EAST Expert Group on ATM Fraud

The European ATM Security Team (EAST) has published a document entitled ‘Standardisation of Terminology for locations of Card Data Compromise devices at ATMs.’

These Guidelines have been put together by members of the EAST Expert Group on ATM Fraud (EGAF).

Fraudsters have been constantly improving ATM skimming devices since the first basic devices appeared. Various types of ATM skimming devices are used by fraudsters, both digital and analogue. Initially fraudsters used simple overlay skimming devices at the card reader throat, but with the evolution of more sophisticated types of skimming devices, the placement of them has moved to other locations around the card reader (both external and internal). Wire-tapping devices (eavesdropping) have also been used to tap data at the card reader pre-read and read heads, and also card reader-electronics.

EAST has produced Guidelines for the Industry & Law Enforcement

In order to assist with the reporting and analysis of such devices, and to set a common standard for describing the placement of skimming (and shimming) devices, EAST has produced these Guidelines for the Industry and Law Enforcement. While most skimming devices are designed to skim magnetic stripe data, these Guidelines also consider the possible placement of devices that are used to read data from the Chip (shimming devices) or to perform a relay attack.

These Guidelines are available for download on the EAST Intranet to EAST members (National and Associate), and there is a version available for wider circulation. EAST Associate Membership is free for Law Enforcement Officers.

Download PDF version Download PDF version

In case you missed it

How should security adapt to the unique aspects of the corrections market?
How should security adapt to the unique aspects of the corrections market?

Physical security technologies are a prominent tool used by correctional facilities to provide a safe, secure, and controlled environment for staff, inmates, and the wider communit...

How retailers can use AI video security to combat the retail theft crisis
How retailers can use AI video security to combat the retail theft crisis

Retailers now often find themself in a precarious situation. Profit margins are being squeezed by widespread shoplifting: The Council on Criminal Justice reports that between the f...

Upskilling and evolving: the changing role of systems integrators
Upskilling and evolving: the changing role of systems integrators

Technology advances in the security industry are transforming the way modern systems are designed and installed. Customers today are looking for greater scalability and flexibility...

Quick poll
Which trend do you think will define physical security in the next 5 years?