Scanning for Skimmers

5 Simple steps that can save your identity at the fuel pump

Security Executives
Homeland Security
Published in
3 min readFeb 21, 2016

--

You have probably heard of scamming devices attached to ATM’s before that would seize an unsuspecting victim’s card, only to be retrieved later by an identity thief. Unfortunately, like all technology, scamming is getting better, cheaper and smaller.

The original units would let the victim know right away there was a problem, because it would seize their card. The new units overlay the existing scanner. They don’t seize the card, but allow the victim to scan the card as normal and complete the transaction, without knowing all the information on the card was stolen. Often they are accompanied by an overlay over the keypad so the thieves can obtain the PIN information as well.

The thieves can come back and remove the scanner at a later date and receive a week’s worth of cards. The real sophisticated units don’t even need to be removed, they transmit the stolen data over a blue-tooth connection. Because of the advances, these devices are becoming much more prevalent, and are not only being found on ATM’s, but more commonly on fuel pump card readers. You can follow these simple steps to protect your cards and your identity.

  1. Inspect the reader: If the ATM reader looks funny or seems like it is sticking out too far, don’t use it. At fuel pumps, look at the other pumps. It is very uncommon for them to be any different. If the one you are using is different, chances are it has been tampered with. Usually these devices are installed on the pumps furthest away from or obstructed from the view of the cashiers inside. It makes is easier for the thieves to install and remove the devices without being caught.
  2. Wiggle the reader and key pad: ATM’s and fuel pumps are solidly built. If the reader or keypad moves easily, it has probably been tampered with.
  3. Pay smart: Paying with cash is the safest way to avoid the problem altogether, but this is very inconvenient and sometimes just not practical. The next best method of payment is a pre-paid debit card, so even if they get your information, they will only have access to a limited and set amount of cash. Credit cards are a better option than normal debit cards because they usually have better fraud protection. If you have to use your debit card, select the credit option so you don’t have to enter your PIN.
  4. Cover your numbers: When you are using an ATM and have to enter your PIN, there is still value in using your hand to cover your numbers. The high tech thieves will use pad overlays, but some of the low tech thieves will still use classic observation and cameras to obtain your PIN number.
  5. Monitor your accounts: Despite your best efforts, your card information may still be stolen. Catching it early may minimize your losses.
SECURITY EXECUTIVES

Like us on Facebook and check out our other stories: https://www.facebook.com/Security-Executives-Inc-1769689529926440/?fref=photo

Here are some other publications from your professionals at Security Executives:

https://medium.com/homeland-security/heroin-demands-it-bbdcb5e08a28?source=your-stories

Full Body Scanning — A Search Between Privacy and Security

Florida’s Infrastructure Report Card

How to Survive in a World Gone Mad

8 Things You Should Know About Zika

Invasion of the Bloodsucking Parasites

Reefer Madness, an Uncharted Path

Bomb Voyage, What Does it Mean to You?

So You Really Want to Join ISIS?

--

--