Contact company icon Add as a preferred source Download PDF version
In order to assist with the reporting and analysis of such devices, and to set a common standard for describing the placement of skimming devices, EAST has produced these Guidelines

These Guidelines have been put together by members of the EAST Expert Group on ATM Fraud

The European ATM Security Team (EAST) has published a document entitled ‘Standardization of Terminology for locations of Card Data Compromise devices at ATMs.’

These Guidelines have been put together by members of the EAST Expert Group on ATM Fraud (EGAF).

Fraudsters have been constantly improving ATM skimming devices since the first basic devices appeared. Various types of ATM skimming devices are used by fraudsters, both digital and analog. Initially fraudsters used simple overlay skimming devices at the card reader throat, but with the evolution of more sophisticated types of skimming devices, the placement of them has moved to other locations around the card reader (both external and internal). Wire-tapping devices (eavesdropping) have also been used to tap data at the card reader pre-read and read heads, and also card reader-electronics.

EAST Has Produced Guidelines For The Industry & Law Enforcement

In order to assist with the reporting and analysis of such devices, and to set a common standard for describing the placement of skimming (and shimming) devices, EAST has produced these Guidelines for the Industry and Law Enforcement. While most skimming devices are designed to skim magnetic stripe data, these Guidelines also consider the possible placement of devices that are used to read data from the Chip (shimming devices) or to perform a relay attack.

These Guidelines are available for download on the EAST Intranet to EAST members (National and Associate), and there is a version available for wider circulation. EAST Associate Membership is free for Law Enforcement Officers.

Find out the state of adoption, trends and opportunities with Artificial Intelligence (AI) in physical security.

In case you missed it

Which Vertical Markets Have The Greatest Growth Potential For Security?
Which Vertical Markets Have The Greatest Growth Potential For Security?

To serve various vertical markets and industries effectively, security professionals must recognize that each sector has unique assets, risks, compliance requirements, and operatio...

eCLIQ Enhances Security At Marin Hospital Of Hendaye
eCLIQ Enhances Security At Marin Hospital Of Hendaye

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

What’s Behind (Perimeter) Door #1?
What’s Behind (Perimeter) Door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measur...