Organized Retail Crime Counter Measures Reviewed

Author: Brian Rhodes, Published on Jul 05, 2012

'Organized Retail Crime', or ORC, makes many retailers nervous. Unlike traditional shoplifting, ORC is earmarked by being organized and widespread. What equipment can be used to combat this problem? In this note, we examine how security systems and equipment are deployed to mitigate the risk.

Widespread Problem

With some estimates suggesting ORC costs retailers $30 billion dollars yearly, many retail loss prevention departments are scrambling to address the problem. ORC theft has been reported in all retail channels, from the theft of common household detergents, to luxury perfumes and cosmetics. The video below gives several examples of ORC crimes, including $7,000 worth of handbags, and gives a good overview of the problem:

The question for many in security: "What tools can be applied to mitigate ORC risk?" In the section that follows, we list some of the common solutions many retailers employ to combat the ORC threat.

Solutions Overview

Booster bag detection: One of the most common 'exploitation' methods of ORC theft is the use of 'booster bags' - shopping bags lined with foil - intended to interfere with the detection abilities of EAS systems. Several new sensors types are designed to specifically detect the presence of 'booster bags' when they enter or leave a retail location. While possessing a 'booster bag' may not be criminal, certainly the detecting the presence of such an item is a powerful deterrent to prospective loss. Vendors like Alert MetalGuard sell 'add on' booster bag detection pedestals, used in conjunction with existing EAS systems, to alert on the presence of these items in a retail store.

'Benefit Denial' EAS: The general concept behind 'benefit denial' tags are that if an item is stolen and the tag not properly removed, the tag itself destructs, impacting the appearance or utility of the product. The most common example of this countermeasure are 'dye packs' or 'ink tags' that rupture and indelibly stain stolen product. The brutal reality behind this protection is when product is damaged, it cannot be resold or exchanged as new. Use of 'benefit denial' EAS do not come without risk of accidental discharge, and tag cost is several times more expensive that 'standard' EAS tags. However, the method is very effective at protecting 'softlines' merchandise and other products sold without substantial packaging that might inhibit the effectiveness of the tag.

Secured Product Dispensers: An effective, but restrictive method of protecting product from theft is to keep it locked in protective showcases. 'Dispensing systems' are used to select stock items one at a time, and are often automated and networked to some degree to log stored product inventory. Small, highly valuable products like pharmaceuticals, electronics, and cosmetics are best suited to this type of protection - while product is indeed kept secure, it also takes more time and requires deliberation on part of the honest shopper. As a result, the use of this countermeasure should be carefully weigh the savings in reducing product loss against the overall loss in gross sales due to inconvenience.

Data Analyics: Not to be confused with video analytics, data analytic services featuring 'Receipt Verification/Return Authorization' modules can be used to prevent from converting stolen goods back into cash. Everytime a transaction is generated, it is uniquely identified and stored. Commonly, this record is identified via a barcode on the bottom of a reciept. That data record not only can be used to track the goods sold, it can also be used to verify purchase of an item being returned. When those journal entries are combined into a single dataset, it can be used to verify personal purchasing records of an item, or how many of a certain item was sold by a retailer. In the case of 'exchange fraud', thieves often return stolen merchandise for a cash exchange. Using data analytics can help pinpoint the exact source of when an item was purchased, and therefore validate a cash return. Vendors like Siras and The Retail Equation are specialty vendors of these analytics.

Surveillance Video: The power of video surveillance cannot be overlooked as a fundamental countermeasure to ORC. While the pitfals of poor quality and poorly executed video surveillance in retail are commonplace, effective use of HD resolution images cannot be overstanded. Quality images and videoclips can easily and effectively shared in 'BOLO', or 'Be On the LookOut' reports shared with local security and retailers. Simply being able to recognize suspects and apply human LP resources to ORC threats are a hugely significant, if not the most significant, protection against the threat. Products like 3VR's CrimeDex and LERPnet can also be used in conjunction with local video surveillance to verify and validate ORC threats.

Video Analytics: When dealing with the ORC problem, video analytics used alone have limited value. Because the ORC problem is not simply observable behavior, but because it is a 'nested' type of theft or fraud perpetuated on many levels, video analytics alone are not an effective defense. For example, many video analytics providers cite the use of 'dwell time' as an important indicator of ORC risk, because it can preclude theft planning. In reality, this type of analytic would produce so many false positive alerts on 'casual shoppers' for a typical retailer, it would quickly be discarded as ineffective. In addition, many video analytics providers claim impossible results of face recognition, but these claims are proven time after time to be overstated used in real-world production surveillance systems. Rather, the application of video analytics to combat ORC is, at best, used in conjuction with the methods mentioned above.

Comments : PRO Members only. Login. or Join.

Related Reports

Cisco Meraki New Cameras and AI Analytics on Dec 14, 2018
Meraki has released their second generation of video surveillance with 3 new cameras, AI-based video analytics, and 2 cloud-based storage...
Top 2019 Trend - AI Video Analytics on Dec 10, 2018
160+ Integrators answered: What do you think the top industry trend will be in 2019? Why? AI / video analytics was the run-away winner with...
Alarm.com "AI" Video Analytics Tested on Nov 30, 2018
Alarm.com has announced what it calls an "artificial intelligence (AI) architecture and video analytics service", touting that  Alarm.com's...
Vintra "AI-Powered" Video Analytics Startup Profile on Nov 27, 2018
Vintra is a Silicon Valley startup focused on AI-based video analytics. They had booths at IACP and ISC West demonstrating their hosted or...
Genetec Kiwi Intrusion Detector Analytics Tested on Nov 27, 2018
Genetec has built Kiwi Security's Intrusion Detection analytics into Security Center, aiming to simplify deployment compared to separate camera...
Top Manufacturers Gaining and Losing 2018 on Nov 26, 2018
This is the 5th year IPVM has tracked manufacturers gaining and losing: Top Manufacturers Gaining and Losing 2014 Top Manufacturers Gaining and...
Intel Neural Compute Stick 2 / Movidius AI Test on Nov 21, 2018
AI is a major trend in video surveillance with manufacturers paying significant attention to Intel's Movidius Myriad chips. Indeed, Avigilon has...
Arcules Cloud VMS Tested on Nov 19, 2018
Arcules is a big bet, or as they describe themselves a 'bold company', spun out and backed by Milestone and Canon.  But how good is Arcules cloud...
Beware Amazon Go Store Hype (Tested) on Nov 13, 2018
IPVM's trip to and testing of Amazon Go's San Francisco store shows a number of significant operational and economic issues that undermine the...
Genetec Privacy Protector Tested on Nov 12, 2018
Genetec has built Kiwi Security's Privacy Protector into Security Center, an analytic which anonymizes individuals in cameras' fields of view...

Most Recent Industry Reports

Imperial Capital Security Investor Conference 2018 Review - ADT, Resideo, Alarm.com, Arlo, Eagle Eye, ACRE, More on Dec 14, 2018
Imperial Capital Security Investor Conference is an event matching industry executives with financiers that frequently leads to future funding...
Cisco Meraki New Cameras and AI Analytics on Dec 14, 2018
Meraki has released their second generation of video surveillance with 3 new cameras, AI-based video analytics, and 2 cloud-based storage...
Foolish Strategy: OEMing Facial Recognition on Dec 13, 2018
Almost as 'hot' as face recognition marketing right now is OEMing facial recognition. Last year, they were a who's who of company's with...
DVR Examiner - Video Recovery from Recorder Hard Drives on Dec 13, 2018
Bypassing passwords and long download times on-site, DVR Examiner collects and organizes video evidence directly from a hard drive extracted from...
2019 Access Control Book Released on Dec 12, 2018
This is the best, most comprehensive access control book in the world, based on our unprecedented research and testing has been significantly...
Huawei Hisilicon Quietly Powering Tens of Millions of Western IoT Devices on Dec 12, 2018
Huawei Hisilicon chips are powering, at least, tens of millions of Western IoT devices, such as IP cameras and surveillance recorders, a fact that...
FLIR Launches Body Cameras Unified With VMS (TruWitness) on Dec 11, 2018
While FLIR is best known for their thermal cameras, now they have expanded into body cameras, launching TruWITNESS, a public safety focused body...
Startup Sunflower Labs' Autonomous Drone Security System on Dec 11, 2018
Startup Sunflower Labs is claiming a unique design on a home security system, combining autonomous drones and 'Sunflower' sensors. Imagine an...
The 2019 Video Surveillance Industry Guide on Dec 10, 2018
The 300 page, 2019 Video Surveillance Industry Guide, covers the key events and the future of the video surveillance market, is now available,...
Multi-Factor Access Control Authentication Guide on Dec 10, 2018
Can a stranger use your credentials? One of the oldest problems facing access control is making credentials as easy to use as keys, but restricting...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact