Is technology the answer to ATM bombings?

January 2009 Products & Solutions

I refer to the Elvey hand-out inserted in the October issue of Hi-Tech Security Solutions which states quite clearly that “technology is the answer to ATM bombings and cash-in-transit heists”. A rather bold statement. Technology has and always will be only an aid to the security function and not an end in itself. Without competent operators and maintenance technicians (there is a dearth of both these types in South Africa) and well trained response personal (human intervention) guided by comprehensive operating procedures, even the best technology will be futile.

I have no problem with the technical aspects described in the article (Elvey Security Technologies has some excellent technical solutions), but the premise is based on the fact that the video images will not only be received at a control point but will also be seen and correctly analysed by an operator, who will then alert some form of reaction force to be deployed to neutralise the threat.

It has been well documented that an operator watching a number of monitors for more than 20 to 30 minutes at a time will generally not see any changes in the images occurring. Therefore, the operator’s attention needs to be drawn to the monitor on which an incident is happening – that is, event driven such as movement detection or some form of alarm activation. Using this approach, a typical sequence of events could be as follows:

i) Attention of the operator drawn to the incident monitor – takes time – however short. Also operator costs.

ii) Analysis – is it just someone drawing money, some other innocent explanation for the alarm or is there a risk of an attack – more time.

iii) If it looks like an attack then the operator has to assess the situation – is it one or two individuals or a heavily armed gang – more time. Careful positioning of the CCTV cameras would need to be applied in order that a comprehensive view of the ATM area can be seen – a gang is not going to congregate around the ATM. Installation cost implications.

iv) The operator would then communicate with the response force controller who would then decide on whether to send a lightly armed response force (generally one vehicle) or call for reinforcements from the South African Police. It is unlikely that these reinforcements will be on permanent standby and will need to be assembled. All this takes additional time.

v) Having assessed that it is a heavily armed gang then the assembled response force would need to be issued with the appropriate weapons, get in or on the vehicles (assuming they are available) and drive to the incident – more time.

vi) Having arrived at the incident the response force commander would need to assess the situation and deploy his force accordingly. Not an easy job as the criminals will be prepared and will open fire on the vehicles as they arrive.

In this scenario, if the ATM robbery takes 20 minutes to complete and items (i) to (v) take 25 minutes after the initial alarm is raised then the ‘bad guys’ would have already left and you are left with an interesting 'movie' of the event. If they do arrive in time they need to outnumber and outgun the robbers – which is rarely the case.

Just as CCTV does not deter bank robbers, as the chances of them being apprehended are small, so CCTV coverage of ATMs will not deter bombers. CCTV systems deployed at ATMs for this purpose (even if is only at high risk ones) is neither cost-effective nor practical – due to video transmission issues and control room and response force limitations. Local CCTV coverage to counter card fraud has its place.

In terms of ATM bombings the banks need to review their methods of either completely destroying the cash or at least rendering it totally unusable by staining it – as at present some of the cash is still usable after the bombing. A problem in destroying the cash is how to recover its full value from the SA Reserve Bank. If attacks on ATMs result in no useable cash being recovered then the criminals will find another type of target. Physically hardening high risk ATMs after normal business hours or locating ATMs in more secure environments are other options to be considered, among others. However, whatever method of physically protecting ATMs is used there will be a major cost implication for the banks.

Bombing of ATMs is just another facet of the brutal society South Africans have to live with and until the government addresses the violent crime problem by providing the South African Police Service with suitable resources (for example, intelligence gathering – pre-knowledge of an ATM attack will allow the police to mount a counter operation) and enough well trained motivated manpower (that is, visible policing and also the ability to infiltrate crime syndicates and tackle gangs head on) together with a competent judicial system (not like the recent example of a violent career criminal who was jailed for 38 years, released after serving only five years and murdered again within a month of his release) then South African citizens will continue to face violence in their everyday lives. Technology alone will not solve the problem.

Brian Barnes

Security consultant

Hodari Security Technologies





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The role of safe storage in mitigating burglary and fire risk
Gunnebo Safe Storage Africa Products & Solutions Fire & Safety Smart Home Automation
Household burglary and fire remain amongst the most common threats to household assets in South Africa. Statistics South Africa’s 2024 Victims of Crime Survey reported approximately 1,5 million incidents of housebreaking in a single year.

Read more...
South African counter-drone system completes trials
Products & Solutions Perimeter Security, Alarms & Intruder Detection IoT & Automation
Pretoria-based military engineering company Centauri Technologies has announced that its TriAD counter-drone system successfully completed integrated, multi-layered C-UAS (counter-unmanned aerial system) capability trials in a vehicle-mounted configuration.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Edge AI-powered night vision
Surveillance Products & Solutions
By eliminating the need for supplemental lighting, the VIVOTEK Chroma24 low-light full-colour AI camera series provides quiet, unobtrusive protection, while also reducing power consumption and minimising impact on people, ecosystems, and the environment.

Read more...
Inside the RealScan SG10
neaMetrics Access Control & Identity Management Products & Solutions
The SG10 was optimised for speed at every stage, from capture to processing. The result is faster fingerprint acquisition and near-instant response for operators.

Read more...
AI-powered classification across large areas
Axis Communications SA Surveillance Products & Solutions AI & Data Analytics
Axis Communications announced the upcoming launch of two innovative radars. Each device delivers a 180° or 270° horizontal field of detection, with accurate AI-powered classification across large areas, 24/7, in all weather and lighting conditions.

Read more...
Gallagher releases Command Centre v9.40
Gallagher Products & Solutions Integrated Solutions
Gallagher Security has released Command Centre v9.40, introducing new capabilities for the Controller 7000 product range and supporting optional licencing expansion to up to 24 doors per controller, more than doubling the previous limit of 10.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Protecting high-value data from AI
CASA Software Infrastructure Information Security Products & Solutions
As artificial intelligence accelerates the speed and sophistication of cyberattacks, protecting high-value data, such as financial records, legal files, patient data, intellectual property, and compliance records, has never been more urgent.

Read more...
Identity-led security in banking
Secutel Technologies Access Control & Identity Management Products & Solutions
Traditional keys, cards, and siloed systems are no longer sufficient in a world where security, compliance, and operational efficiency must work together seamlessly. In 2026, the focus is firmly on smart access.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.