Feeds

Tunnelling Brazilian blaggers lift $63m

Old school heist hits bank hard

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

Those readers who lament the inexorable rise of hands-off cybercrime - Nigerian 419 fraud, phishing scams, ID theft, etc etc - at the expense of old school blags where blokes called Ronnie cosh the driver of the London-Glasgow mail train and leg it with £2.6m hotly pursued by geezers named Jack driving Ford Granadas who answer the query "Fag, guv?" with a perfunctory "Shut it, George", will be delighted to learn that a gang of subterranean Brazilians is once again flying the flag for bunce-hungry firms worldwide.

Staff who arrived for work at a branch of the Central Bank in the northeastern state of Ceara on Monday morning were rather surprised to discover that an estimated six to ten ne'er-do-wells had spent three months tunnelling 260ft from a rented house, had broken through the reinforced floor of the vault and made off with no less than 156 million reais or $68m or £38m or, if you prefer, €55m.

Whichever way you count the swag, that's an awful lot of black balaclavas, classic Jags and sawn-off shooters. It's Brazil biggest-ever heist, and easily tops the modest £30m in today's wonga with which the Great Train Robbers temporarily made merry back in 1963.

Police investigator Francisco Queiroga summed it up quite nicely when he told Reuters by phone: "It's something you see in the movies. They dug a tunnel that goes underneath two [city] blocks. They've been digging for three months."

Indeed, the tunnel was apparently reinforced with timber and equipped with electric light and, to add extra spice to this tale of top-notch villainy, the gang broke into the vault without setting off motion sensors presumably installed to warn the authorities of large numbers of old lags breaking through the floor of said vault.

We can only hope that - having done the donkey work - the Boys from the Bank in Brazil do not make the same mistake which proved the downfall of Ronnie Biggs and his chums. Having relieved the Royal Mail of a considerable quantity of wedge, they then went to ground in a farmhouse, subsequently leaving considerable fingerprint evidence for the pursuing Sweeney. As Jack Regan legendarily put it: "Get your trousers on, you're knicked." ®

Related stories

Mobile fingers UK's thickest armed robber
Banks brace for cashpoint attack
Time employee robs bank

Secure remote control for conventional and virtual desktops

More from The Register

next story
Cops apologise for leaving EXPLOSIVES in suitcase at airport
'Canine training exercise' SNAFU sees woman take home booming baggage
Apple's Mr Havisham: Tim Cook says dead Steve Jobs' office has remained untouched
'I literally think about him every day' says biz baron's old friend
Flaming drone batteries ground commercial flight before takeoff
Passenger had Something To Declare, instead fiddled while plane burned
Every billionaire needs a PANZER TANK, right? STOP THERE, Paul Allen
Angry Microsoftie hauls auctioneers to court over stalled Pzkw. IV 'deal'
Jony Ive: Apple iWatch will SCREW UP Switzerland's economy
Apple's chief designer forgot one crucial point about overpriced bling
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.