Why do our customers continue investing in SmartStain technology?

Feerica Articles, ATM Protection, CIT Protection

The successful protection of cash in the End-to-End cash cycle is an extremely challenging task due to the vast number of threats being faced daily. These threats on ATM’s and Cash Transporters range from various types of physical attacks to cleverly executed logical attacks. The criminal mind constantly seeks new ways to manipulate and override existing technology implemented by the various banks and CIT’s available today.  The negative socioeconomic impact on remote towns and rural villages from attacks on their ATM’s can be detrimental as residents rely on that availability of cash. Recent trends have indicated that attacks are more likely to happen in these remote regions as there is typically a low police presence, various escape routes with low traffic congestion and easy access to motorways.  The problem is further exacerbated when members of the public get injured in the event of an attack on CIT performing cash services or when there is substantial collateral damage to the Post Office or Supermarket where the ATM is housed. These attacks can range from armed robberies during the replenishment process, using explosives or by vehicle ram-raids to gain access to the cash. The regulation and control of IBNS (Intelligent Banknote Neutralisation …

Intelligent Active ATM Protection vs. Passive ATM Protection

Feerica Articles, ATM Protection

The Oxford definition of the words Intelligent and Active is: “Intelligent – the ability to learn, understand and think in a logical way about things; Active – is the capability of modifying its state or characteristics automatically in response to input or feedback”. This is exactly what Feerica’s SmartStain ATM Protection technology is all about as it is constantly learning and understanding the threats that surrounds it and therefore protects accordingly. The Problem There are many different ways to attack a cash point machine. These attacks range from traditional physical attacks like cutting, grinding, drilling, ram-raids and the use of either gas or solid explosives. These types of attacks are performed with speed and accuracy with no regard for collateral damage or injury to innocent bystanders. Logical ATM attacks include the use of malware to manipulate the ATM to dispense cash unlawfully. Passive ATM protection systems are plastic bottles that house the ink inside the ATM cassette lids and they lay dormant until such time as there is a tremulous force that ruptures the bottles to release the inks on to the bank notes. Due to the unpredictable nature of explosions, passive ink bottles cannot guarantee success of 100% coverage on all the notes if …

How ATM’s are attacked and how to stop it from happening

Feerica Articles, ATM Protection

These are the statistics and the harsh reality of the situation today. At Feerica, we believe we have the solutions to assist in stopping this global problem. We produce high-tech Intelligent Banknote Neutralization Systems (IBNS) for Commercial Banks, IADs, ATM’s and the Cash-In-Transit (CIT) business sector. Since 1982 our approach to the cash protection industry is one of providing solutions to problems. The ProblemThe increasing number of ATM equipment, its geographic spread and the large amounts of cash stored in each machine constitutes a substantial exposure to risk. They are one of the most attractive targets for violent attacks through several methods and techniques which include both physical and logical attacks.  Physical attacks include the use of gas and solid explosives, drilling, grinding and ram-raids on cash point machines to gain access to the cash contents. Physical attacks have increased in popularity and have evolved over time as the tools needed are easy to come by and are typically performed in regions where there is a low police presence or quick access to escape routes. These type of attacks have been known to happen shortly after ATM’s are serviced or replenished over month-end periods. Criminals often work in collusion with internal …