SlideShare a Scribd company logo
1 of 17
ATM THEFTS




♦ In our first slide you see an individual who apparently is making a
  bank transaction at the ATM.
Placing the trap




♦ What he really is doing is placing a trap in the ATM machine to
  “capture” the next user card.
Lookout Warning




♦ Altering the ATMs is a risky business, these individuals work in
  teams. The lookout warns of any possible eye witnesses / or of the
  next potential victim.
The Victim




♦ Here we see the next client using the ATM, after the trap has
  been set. He inserts his card and begins his transaction.
Springing the TRAP




♦ The ATM card is confiscated, and the customer is confused,
  asking himself, Why has my card been confiscated? However, here
  we see the cavalry coming to help, (HELP!!!).
Honest,Samaritan Offering HELP




♦ Here we see the thief pretending to help. What he is really doing is
  trying to gain the “customers” PIN, now that he has captured his
   card.
Gaining access to the PIN




 ♦ The good Samaritan convinces the “Customer” He can
   recover the card, if he presses his PIN at the same time
    the Samaritan press “cancel” and “enter”.
Situation Hopeless, “They Leave”




  ♦ After several attempts the “customer” is convinced his
    card has been confiscated. The “customer” and the
    Samaritan leave the ATM.
Recovering the CARD




 ♦ Satisfied the area is clear, the thief
 ♦ returns to recover the confiscated card from his trap. He not
   only has the card, he also has the PIN the “customer”
   provided unknowingly.
The Escape




♦ In possession of the card and the PIN he leaves the ATM
  with money from the “Customers” account.
THE TRAP




♦ The trap is made up of XRAY film, which is the preferred material
  by thieves; Simply because of the black color which is similar in
   appearance to the slot on the card reader.
Placing the TRAP




♦ The trap is then inserted into the ATM slot. Care is taken not to
  insert the entire film into the slot, the ends are folded and
  contain glue strips for better adhesion to the inner and outer
  surface of the slots.
INVISIBLE




♦ Once the ends are firmly glued and fixed to the slot, it is almost
  impossible to detect by unsuspecting clients.
How is your card confiscated?




♦ Slits are cut into both sides of the trap, This prevents your card
   being returned prior to completing your transaction.
Retrieval of Confiscated card.




♦ As soon as the “Customer” has gone, and they have your PIN , The
  thief can remove the glued trap, by grasping the folded tips, he
  simply pulls the trap out that has retained your card..
RECOMENDATIONS.




♦ 1.-Once your card has been confiscated, observe the ATM slot and
  the card reader for any signs of tampering. Should you see the film
  tips glued to the slot, unglue, pull the trap out and recover your
  card.
♦ 2.- Report IMMEDIATELY to the BanK.
Send this message to
friends and family
immediately.

More Related Content

What's hot (17)

Debit Card Scam
Debit Card ScamDebit Card Scam
Debit Card Scam
 
Atm Thefts
Atm TheftsAtm Thefts
Atm Thefts
 
Atm Thefts 1
Atm Thefts 1Atm Thefts 1
Atm Thefts 1
 
Atm
AtmAtm
Atm
 
Bank Machine theft - pics
Bank Machine theft - picsBank Machine theft - pics
Bank Machine theft - pics
 
ATM Theft
ATM TheftATM Theft
ATM Theft
 
Atm Thefts 1
Atm Thefts 1Atm Thefts 1
Atm Thefts 1
 
Atm thefts presentation
Atm thefts presentationAtm thefts presentation
Atm thefts presentation
 
Atm Thefts - Watch and Learn!
Atm Thefts - Watch and Learn!Atm Thefts - Watch and Learn!
Atm Thefts - Watch and Learn!
 
Atm thefts
Atm theftsAtm thefts
Atm thefts
 
Atm theft
Atm theftAtm theft
Atm theft
 
ATM THEFT BY PRAKASH JANAWADE
ATM THEFT BY PRAKASH JANAWADEATM THEFT BY PRAKASH JANAWADE
ATM THEFT BY PRAKASH JANAWADE
 
Atm Thefts
Atm TheftsAtm Thefts
Atm Thefts
 
Atm Thefts
Atm TheftsAtm Thefts
Atm Thefts
 
ATM Thefts
ATM TheftsATM Thefts
ATM Thefts
 
ATM Thefts
ATM TheftsATM Thefts
ATM Thefts
 
Atm Thefts
Atm TheftsAtm Thefts
Atm Thefts
 

Viewers also liked

Identificación de riesgos para la seguridad del paciente - CICAT-SALUD
Identificación de riesgos para la seguridad del paciente - CICAT-SALUDIdentificación de riesgos para la seguridad del paciente - CICAT-SALUD
Identificación de riesgos para la seguridad del paciente - CICAT-SALUDCICAT SALUD
 
ENFERMEDADES AUTOINMUNES
ENFERMEDADES AUTOINMUNESENFERMEDADES AUTOINMUNES
ENFERMEDADES AUTOINMUNESJohanna Arias
 
Neah global energy services london oil and gas security summit presentation f...
Neah global energy services london oil and gas security summit presentation f...Neah global energy services london oil and gas security summit presentation f...
Neah global energy services london oil and gas security summit presentation f...KW Miller
 
Sicklemia y talasemias en imagenología
Sicklemia y talasemias en imagenologíaSicklemia y talasemias en imagenología
Sicklemia y talasemias en imagenologíaNery Josué Perdomo
 
WIndows Embedded Compact 2013 – What’s news
WIndows Embedded Compact 2013 – What’s newsWIndows Embedded Compact 2013 – What’s news
WIndows Embedded Compact 2013 – What’s newsMirco Vanini
 
PLANO DE PROJETO DE SOFTWARE para produtos da Lacertae SW
PLANO DE PROJETO DE SOFTWARE para produtos da Lacertae SWPLANO DE PROJETO DE SOFTWARE para produtos da Lacertae SW
PLANO DE PROJETO DE SOFTWARE para produtos da Lacertae SWInstituto Federal de Sergipe
 
Cirugía vitrectomía posterior - CICAT-SALUD
Cirugía vitrectomía posterior - CICAT-SALUDCirugía vitrectomía posterior - CICAT-SALUD
Cirugía vitrectomía posterior - CICAT-SALUDCICAT SALUD
 

Viewers also liked (15)

Identificación de riesgos para la seguridad del paciente - CICAT-SALUD
Identificación de riesgos para la seguridad del paciente - CICAT-SALUDIdentificación de riesgos para la seguridad del paciente - CICAT-SALUD
Identificación de riesgos para la seguridad del paciente - CICAT-SALUD
 
3
33
3
 
O ComéRcio Internacional
O ComéRcio InternacionalO ComéRcio Internacional
O ComéRcio Internacional
 
R10 asturiano
R10 asturianoR10 asturiano
R10 asturiano
 
ENFERMEDADES AUTOINMUNES
ENFERMEDADES AUTOINMUNESENFERMEDADES AUTOINMUNES
ENFERMEDADES AUTOINMUNES
 
Neah global energy services london oil and gas security summit presentation f...
Neah global energy services london oil and gas security summit presentation f...Neah global energy services london oil and gas security summit presentation f...
Neah global energy services london oil and gas security summit presentation f...
 
A FormaçãO De Portugal
A FormaçãO De PortugalA FormaçãO De Portugal
A FormaçãO De Portugal
 
Manual certificado digital
Manual certificado digitalManual certificado digital
Manual certificado digital
 
Sicklemia y talasemias en imagenología
Sicklemia y talasemias en imagenologíaSicklemia y talasemias en imagenología
Sicklemia y talasemias en imagenología
 
WIndows Embedded Compact 2013 – What’s news
WIndows Embedded Compact 2013 – What’s newsWIndows Embedded Compact 2013 – What’s news
WIndows Embedded Compact 2013 – What’s news
 
A FormaçãO De Portugal
A FormaçãO De PortugalA FormaçãO De Portugal
A FormaçãO De Portugal
 
PLANO DE PROJETO DE SOFTWARE para produtos da Lacertae SW
PLANO DE PROJETO DE SOFTWARE para produtos da Lacertae SWPLANO DE PROJETO DE SOFTWARE para produtos da Lacertae SW
PLANO DE PROJETO DE SOFTWARE para produtos da Lacertae SW
 
Cirugía vitrectomía posterior - CICAT-SALUD
Cirugía vitrectomía posterior - CICAT-SALUDCirugía vitrectomía posterior - CICAT-SALUD
Cirugía vitrectomía posterior - CICAT-SALUD
 
Império romano
Império romanoImpério romano
Império romano
 
Neumonia
NeumoniaNeumonia
Neumonia
 

Similar to ATMThefts

Similar to ATMThefts (11)

Atm Thefts 1
Atm Thefts 1Atm Thefts 1
Atm Thefts 1
 
ATM Thefts
ATM TheftsATM Thefts
ATM Thefts
 
Atm Thefts
Atm TheftsAtm Thefts
Atm Thefts
 
Atm Thefts[1]
Atm Thefts[1]Atm Thefts[1]
Atm Thefts[1]
 
Atm Thefts
Atm TheftsAtm Thefts
Atm Thefts
 
Atm frauds
Atm fraudsAtm frauds
Atm frauds
 
Counterfeiting Presentation 2009 Handout
Counterfeiting Presentation 2009   Handout Counterfeiting Presentation 2009   Handout
Counterfeiting Presentation 2009 Handout
 
NR ATM Frauds.pptx
NR ATM Frauds.pptxNR ATM Frauds.pptx
NR ATM Frauds.pptx
 
Atm Thefts
Atm TheftsAtm Thefts
Atm Thefts
 
Penipu Atm
Penipu AtmPenipu Atm
Penipu Atm
 
Maling
MalingMaling
Maling
 

ATMThefts

  • 1. ATM THEFTS ♦ In our first slide you see an individual who apparently is making a bank transaction at the ATM.
  • 2. Placing the trap ♦ What he really is doing is placing a trap in the ATM machine to “capture” the next user card.
  • 3. Lookout Warning ♦ Altering the ATMs is a risky business, these individuals work in teams. The lookout warns of any possible eye witnesses / or of the next potential victim.
  • 4. The Victim ♦ Here we see the next client using the ATM, after the trap has been set. He inserts his card and begins his transaction.
  • 5. Springing the TRAP ♦ The ATM card is confiscated, and the customer is confused, asking himself, Why has my card been confiscated? However, here we see the cavalry coming to help, (HELP!!!).
  • 6. Honest,Samaritan Offering HELP ♦ Here we see the thief pretending to help. What he is really doing is trying to gain the “customers” PIN, now that he has captured his card.
  • 7. Gaining access to the PIN ♦ The good Samaritan convinces the “Customer” He can recover the card, if he presses his PIN at the same time the Samaritan press “cancel” and “enter”.
  • 8. Situation Hopeless, “They Leave” ♦ After several attempts the “customer” is convinced his card has been confiscated. The “customer” and the Samaritan leave the ATM.
  • 9. Recovering the CARD ♦ Satisfied the area is clear, the thief ♦ returns to recover the confiscated card from his trap. He not only has the card, he also has the PIN the “customer” provided unknowingly.
  • 10. The Escape ♦ In possession of the card and the PIN he leaves the ATM with money from the “Customers” account.
  • 11. THE TRAP ♦ The trap is made up of XRAY film, which is the preferred material by thieves; Simply because of the black color which is similar in appearance to the slot on the card reader.
  • 12. Placing the TRAP ♦ The trap is then inserted into the ATM slot. Care is taken not to insert the entire film into the slot, the ends are folded and contain glue strips for better adhesion to the inner and outer surface of the slots.
  • 13. INVISIBLE ♦ Once the ends are firmly glued and fixed to the slot, it is almost impossible to detect by unsuspecting clients.
  • 14. How is your card confiscated? ♦ Slits are cut into both sides of the trap, This prevents your card being returned prior to completing your transaction.
  • 15. Retrieval of Confiscated card. ♦ As soon as the “Customer” has gone, and they have your PIN , The thief can remove the glued trap, by grasping the folded tips, he simply pulls the trap out that has retained your card..
  • 16. RECOMENDATIONS. ♦ 1.-Once your card has been confiscated, observe the ATM slot and the card reader for any signs of tampering. Should you see the film tips glued to the slot, unglue, pull the trap out and recover your card. ♦ 2.- Report IMMEDIATELY to the BanK.
  • 17. Send this message to friends and family immediately.