Is technology the answer to ATM bombings?

January 2009 Products & Solutions

I refer to the Elvey hand-out inserted in the October issue of Hi-Tech Security Solutions which states quite clearly that “technology is the answer to ATM bombings and cash-in-transit heists”. A rather bold statement. Technology has and always will be only an aid to the security function and not an end in itself. Without competent operators and maintenance technicians (there is a dearth of both these types in South Africa) and well trained response personal (human intervention) guided by comprehensive operating procedures, even the best technology will be futile.

I have no problem with the technical aspects described in the article (Elvey Security Technologies has some excellent technical solutions), but the premise is based on the fact that the video images will not only be received at a control point but will also be seen and correctly analysed by an operator, who will then alert some form of reaction force to be deployed to neutralise the threat.

It has been well documented that an operator watching a number of monitors for more than 20 to 30 minutes at a time will generally not see any changes in the images occurring. Therefore, the operator’s attention needs to be drawn to the monitor on which an incident is happening – that is, event driven such as movement detection or some form of alarm activation. Using this approach, a typical sequence of events could be as follows:

i) Attention of the operator drawn to the incident monitor – takes time – however short. Also operator costs.

ii) Analysis – is it just someone drawing money, some other innocent explanation for the alarm or is there a risk of an attack – more time.

iii) If it looks like an attack then the operator has to assess the situation – is it one or two individuals or a heavily armed gang – more time. Careful positioning of the CCTV cameras would need to be applied in order that a comprehensive view of the ATM area can be seen – a gang is not going to congregate around the ATM. Installation cost implications.

iv) The operator would then communicate with the response force controller who would then decide on whether to send a lightly armed response force (generally one vehicle) or call for reinforcements from the South African Police. It is unlikely that these reinforcements will be on permanent standby and will need to be assembled. All this takes additional time.

v) Having assessed that it is a heavily armed gang then the assembled response force would need to be issued with the appropriate weapons, get in or on the vehicles (assuming they are available) and drive to the incident – more time.

vi) Having arrived at the incident the response force commander would need to assess the situation and deploy his force accordingly. Not an easy job as the criminals will be prepared and will open fire on the vehicles as they arrive.

In this scenario, if the ATM robbery takes 20 minutes to complete and items (i) to (v) take 25 minutes after the initial alarm is raised then the ‘bad guys’ would have already left and you are left with an interesting 'movie' of the event. If they do arrive in time they need to outnumber and outgun the robbers – which is rarely the case.

Just as CCTV does not deter bank robbers, as the chances of them being apprehended are small, so CCTV coverage of ATMs will not deter bombers. CCTV systems deployed at ATMs for this purpose (even if is only at high risk ones) is neither cost-effective nor practical – due to video transmission issues and control room and response force limitations. Local CCTV coverage to counter card fraud has its place.

In terms of ATM bombings the banks need to review their methods of either completely destroying the cash or at least rendering it totally unusable by staining it – as at present some of the cash is still usable after the bombing. A problem in destroying the cash is how to recover its full value from the SA Reserve Bank. If attacks on ATMs result in no useable cash being recovered then the criminals will find another type of target. Physically hardening high risk ATMs after normal business hours or locating ATMs in more secure environments are other options to be considered, among others. However, whatever method of physically protecting ATMs is used there will be a major cost implication for the banks.

Bombing of ATMs is just another facet of the brutal society South Africans have to live with and until the government addresses the violent crime problem by providing the South African Police Service with suitable resources (for example, intelligence gathering – pre-knowledge of an ATM attack will allow the police to mount a counter operation) and enough well trained motivated manpower (that is, visible policing and also the ability to infiltrate crime syndicates and tackle gangs head on) together with a competent judicial system (not like the recent example of a violent career criminal who was jailed for 38 years, released after serving only five years and murdered again within a month of his release) then South African citizens will continue to face violence in their everyday lives. Technology alone will not solve the problem.

Brian Barnes

Security consultant

Hodari Security Technologies





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Counting people and vehicles in large crowds
Products & Solutions
The new Dallmeier AI High Resolution Counting App enables precise counting even with a large number of people and vehicles in the analysis area, including the definition of multiple counting zones.

Read more...
Bosch sells product business to Triton
Bosch Building Technologies News & Events Products & Solutions Facilities & Building Management
Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The division is set to focus on systems integration business in the future.

Read more...
Paradox IPC10 Base Station
Spectrum Security Products Products & Solutions
The Paradox IPC10 Base Station is designed to streamline communication between Paradox alarm systems and central monitoring stations (CMS), bridging Paradox’s encrypted IP protocols with industry-standard CMS protocols.

Read more...
JVA Perimeter Patrol 6
Products & Solutions
Stafix Electric Fence and Security Centres has announced that it now provides customers with the latest JVA Perimeter Patrol 6 software package for standalone and piggyback electric security fence solutions.

Read more...
Workforce management automation for Transguard
IoT & Automation Products & Solutions
Invixium and RTLS-connected worker solutions have been selected to supply 400 rugged biometric solution, IXM TITAN, for time tracking at work sites for Transguard Group, a subsidiary of Emirates Group.

Read more...
Smart access for a safer community
neaMetrics Suprema Access Control & Identity Management Residential Estate (Industry) Products & Solutions Commercial (Industry)
Suprema has released its BioEntry W3 facial authentication access control device with multiple authentication options, including RFID cards as well as mobile credentials, designed for durability and resilience.

Read more...
Smarter ways to secure your space
Elvey Security Technologies Access Control & Identity Management Products & Solutions
Ensuring the safety of people and assets has become more crucial than ever, and access control systems provide essential tools to regulate and monitor who can enter specific areas or access sensitive resources.

Read more...
Guarding data privacy
Suprema Access Control & Identity Management Products & Solutions
Suprema’s BioEntry W3 is designed with data privacy as a top priority, addressing concerns through its display-free design and highly secure ‘Template on Mobile’ (ToM) authentication, making data privacy a top priority.

Read more...
More options for advanced AI analytics
Surveillance Products & Solutions
The new IDIS Edge AI Camera Plus range offers users flexible options to upgrade their video systems by targeting the power of advanced AI video analytics on priority locations for enhanced vigilance and monitoring 24/7.

Read more...
Invixium launches Enterprise Series biometrics
Products & Solutions Access Control & Identity Management
Invixium announced the launch of its new Enterprise Series, which is made up of the IXM ROSTO facial biometric and the IXM TOUCH 3 fingerprint biometric devices.

Read more...