You walk into a store expecting a quick checkout and safety, but thieves can hide small devices that steal card data from the terminal. The Secret Service staged targeted sting operations in stores to find and remove skimmers and protect SNAP and other payment cards, so you can be less likely to have your account cloned or drained.
They’ll explain how skimmers work at checkout, how criminals adapt their tactics, and which shoppers and payments face the biggest risk. Stay with the article to learn clear, practical steps to spot tampering and protect your cards when paying in person.
Inside the Secret Service Sting: How Checkout Skimming Schemes Work
Agents and local partners focus on identifying physical devices, checking firmware and transaction logs, and removing compromised hardware before stolen data is used. They examine card readers, ATM fascia, and payment modules for hidden electronics and then trace where skimmed data moves.
What Are Skimming Devices and How Are They Installed
Skimming devices range from low-profile overlays that fit over a card slot to soldered modules hidden inside a payment terminal. Criminals commonly use card skimmers that read magnetic stripe data and tiny cameras or fake keypads to capture PINs.
Installation methods vary. At unattended terminals like gas pumps, thieves remove faceplates and mount skimmer devices inside the housing. At staffed checkouts, they affix an overlay to the point-of-sale reader or swap a merchant’s reader with a tampered unit during deliveries or maintenance.
Investigators look for mismatched screws, loose fittings, glue residue, or aftermarket wiring. The United States Secret Service and local agencies instruct businesses to inspect devices, test firmware integrity, and verify payment terminal serial numbers regularly.
Checkout Devices Targeted: Supermarkets, Gas Pumps, and More
Retail environments with high transaction volume draw attention because they yield more usable cards. Supermarket self-checkout kiosks and grocery registers face risk due to frequent customer use and limited staff oversight. Gas pumps are targeted for long periods of unattended access; thieves exploit external access panels to insert skimmers inside the pump.
Convenience stores, mall kiosks, and small retailers with older terminals that rely on magnetic stripes also attract skimmers. Investigative teams—like units from the Washington Field Office working with Arlington County Police and the D.C. Metropolitan Police Department—prioritize locations with heavy EBT or SNAP transaction volume because those systems historically used magnetic stripe cards.
Businesses can reduce risk by upgrading to EMV-capable terminals, securing access panels with tamper seals, and training staff to perform visual checks at shift changes.
Uncovering the Scale: Recent Stings and Their Impact
In 2025–2026 operations, the U.S. Secret Service coordinated nationwide actions that inspected tens of thousands of payment terminals and removed hundreds of illegal skimmer devices. Task forces from the Washington Field Office teamed with local police to visit thousands of businesses and seize skimmer devices and related hardware.
These stings prevented large potential losses by stopping skimmer installations before mass data exploitation. Investigators like Matt McCool and others documented serial numbers and collected evidence to trace networks that distribute skimmer devices. Outreach efforts also informed merchants about inspection protocols and how to report compromised terminals.
Public reporting and coordinated enforcement reduced repeat compromises at many targeted locations and helped identify common supply chains for skimmer devices and altered payment hardware.
Victims, Evolving Tactics, and What You Can Do
Low-income households, seniors, and people who rely on electronic benefits are often targeted. Criminals now mix physical skimmers, cloned terminals, and remote SIM-backed networks to quietly drain cards and hide the trail.
EBT Fraud: A Growing Threat to Vulnerable Shoppers
EBT skimming often hits grocery checkout lanes, bodegas, and corner stores where SNAP recipients use their cards. Fraudsters attach hidden card readers or install cloned terminals that instantly siphon benefits when a card is swiped or tapped.
Victims usually discover losses only after benefits fail to load or purchases decline, which can leave families without money for food. The Secret Service has prioritized operations that remove skimmers and trace cloned devices across store networks to stop recurring thefts (see the agency’s work dismantling device networks in New York).
Stores that accept EBT without proper authorization or with poorly secured terminals increase risk. Reporting suspicious activity immediately to the store manager and to the card-issuing agency helps freeze funds faster and documents the theft for investigators.
Identity Theft and Financial Losses from Card Skimming
Card skimming captures magnetic stripe and chip data, and combined with PIN-capture tactics it enables full account takeover. Cards used for everyday purchases, credit payments, or public benefits can all be compromised.
After data capture, criminals often clone cards, sell credentials on illicit markets, or use them for withdrawals. Victims face unauthorized charges, drained accounts, credit hits, and the time-consuming process of disputing transactions and replacing IDs.
If someone suspects skimming, they should monitor bank and benefit account activity daily, set up alerts, and freeze cards immediately. Filing fraud reports with the card issuer and with law enforcement creates records that speed restitution and helps investigators link devices to wider criminal schemes.
Protecting Yourself: Spotting and Avoiding Card Skimmers
Know the common signs of a tampered reader: loose or bulky card slots, misaligned keypads, extra wires, or adhesive residue. If a terminal looks altered, pay inside at a staffed counter or use contactless payment via your phone if available.
Use these practical steps:
- Inspect the terminal before inserting a card.
- Cover the keypad when entering a PIN.
- Enable real-time transaction alerts from banks and benefit programs.
- Use single-use virtual card numbers for online transactions where offered.
- Report suspect devices to store management and to law enforcement immediately.
For EBT users specifically, call the benefits hotline as soon as an unexpected balance change appears. Prompt reporting increases chances of recovering funds and helps agencies like the Secret Service identify and remove cloning operations.
More from Decluttering Mom:

