Since the introduction of the ATM, criminals are making continuous attempts to get cash out of ATMs. In several cases these attempts have shown to be successful and for that reason criminals have never stopped attempting to attack ATMs and continue to try new modus operandi to get access to the cash in the ATM. As consequence, ATM deployers have repeatedly been taking countermeasures based on the modus operandum applied by criminals during the most recent ATM attacks. This has led for ATM deployers entering a rat-race of applying defensive measures to prevent criminals to be successful in each new modus operandum. While on the other hand criminals rapidly developing new modus operandi to bypass these defensive measures and with success. The development and deployment of each of these single countermeasures are costly but will only provide protection for one type of modus operandum only. The criminals attacking the ATMs are continuously looking for alternative ways to get cash out of ATM by bypassing these measures deployed by ATM deployers and thus a single countermeasure will protect only for a short period of time. Countermeasures like higher grade ATM safes, additional sensors, mechanical blocks inside the ATM cash dispenser, smoke …
Marcel Bosland & Rui Pereira at Security Summit 2021
Our Feerica Business Development Director for Europe, Marcel Bosland and our R&D Director, Rui Pereira presented a “Holistic and More Effective ATM and Cash Protection Approach” on a panel at Virtual Security Summit 2021. Rui had the pleasure to expose our perspective on ATM Criminality evolution, different attack Modus Operandi and proven solution to mitigate all those threats and the presentation was a success! Many thanks to the organizers and audience. Hope you enjoy it!
SMARTSTAIN EVE tested and certified by the laboratory of CNPP
Again Feerica has successfully passed the CNPP certification in France with the most recent EVE generation of the SmartStain technology on multiple ATM and cassette types.Feerica is very proud of this achievement which reflects the success of our products and the hard work of our team over the past years.
Why do our customers continue investing in SmartStain technology?
The successful protection of cash in the End-to-End cash cycle is an extremely challenging task due to the vast number of threats being faced daily. These threats on ATM’s and Cash Transporters range from various types of physical attacks to cleverly executed logical attacks. The criminal mind constantly seeks new ways to manipulate and override existing technology implemented by the various banks and CIT’s available today. The negative socioeconomic impact on remote towns and rural villages from attacks on their ATM’s can be detrimental as residents rely on that availability of cash. Recent trends have indicated that attacks are more likely to happen in these remote regions as there is typically a low police presence, various escape routes with low traffic congestion and easy access to motorways. The problem is further exacerbated when members of the public get injured in the event of an attack on CIT performing cash services or when there is substantial collateral damage to the Post Office or Supermarket where the ATM is housed. These attacks can range from armed robberies during the replenishment process, using explosives or by vehicle ram-raids to gain access to the cash. The regulation and control of IBNS (Intelligent Banknote Neutralisation …
How Cash-in-Transit Companies are attacked and how to stop it from happening
Cash-in-Transit heists are organized criminal operations, executed with military-style planning and precision. Over the past 30 years there have been many different types of attacks on CIT service providers around the world. In some cases, these attacks lead to severe violence which not only puts the CIT crew and public bystanders’ lives at risk but also leads to substantial collateral damage. The ProblemDue to the growing volumes of cash required in today’s cash supply chain, it makes CIT operators attractive targets for criminals. It is therefore imperative that CIT service providers are prepared for this ongoing risk. Most CIT companies use armoured vehicles with intelligent exit & entry doors in conjunction with drop safes and cubicles inside these vehicles where the cash is kept. Some CIT operators in certain countries are permitted by governing law to use firearms for protection but this often results in aggravating the problem as it increases the level of intensity of attacks from criminals who are also heavily armed. These criminal syndicates generally work in large teams and occasionally recruit corrupt CIT staff as part of their organization to assist them with large heists. The Solution There are many different types of cash movements and country …
How ATM’s are attacked and how to stop it from happening
These are the statistics and the harsh reality of the situation today. At Feerica, we believe we have the solutions to assist in stopping this global problem. We produce high-tech Intelligent Banknote Neutralization Systems (IBNS) for Commercial Banks, IADs, ATM’s and the Cash-In-Transit (CIT) business sector. Since 1982 our approach to the cash protection industry is one of providing solutions to problems. The ProblemThe increasing number of ATM equipment, its geographic spread and the large amounts of cash stored in each machine constitutes a substantial exposure to risk. They are one of the most attractive targets for violent attacks through several methods and techniques which include both physical and logical attacks. Physical attacks include the use of gas and solid explosives, drilling, grinding and ram-raids on cash point machines to gain access to the cash contents. Physical attacks have increased in popularity and have evolved over time as the tools needed are easy to come by and are typically performed in regions where there is a low police presence or quick access to escape routes. These type of attacks have been known to happen shortly after ATM’s are serviced or replenished over month-end periods. Criminals often work in collusion with internal …