Organized Retail Crime Counter Measures Reviewed

Author: Brian Rhodes, Published on Jul 05, 2012

'Organized Retail Crime', or ORC, makes many retailers nervous. Unlike traditional shoplifting, ORC is earmarked by being organized and widespread. What equipment can be used to combat this problem? In this note, we examine how security systems and equipment are deployed to mitigate the risk.

Widespread Problem

With some estimates suggesting ORC costs retailers $30 billion dollars yearly, many retail loss prevention departments are scrambling to address the problem. ORC theft has been reported in all retail channels, from the theft of common household detergents, to luxury perfumes and cosmetics. The video below gives several examples of ORC crimes, including $7,000 worth of handbags, and gives a good overview of the problem:

The question for many in security: "What tools can be applied to mitigate ORC risk?" In the section that follows, we list some of the common solutions many retailers employ to combat the ORC threat.

Solutions Overview

Booster bag detection: One of the most common 'exploitation' methods of ORC theft is the use of 'booster bags' - shopping bags lined with foil - intended to interfere with the detection abilities of EAS systems. Several new sensors types are designed to specifically detect the presence of 'booster bags' when they enter or leave a retail location. While possessing a 'booster bag' may not be criminal, certainly the detecting the presence of such an item is a powerful deterrent to prospective loss. Vendors like Alert MetalGuard sell 'add on' booster bag detection pedestals, used in conjunction with existing EAS systems, to alert on the presence of these items in a retail store.

'Benefit Denial' EAS: The general concept behind 'benefit denial' tags are that if an item is stolen and the tag not properly removed, the tag itself destructs, impacting the appearance or utility of the product. The most common example of this countermeasure are 'dye packs' or 'ink tags' that rupture and indelibly stain stolen product. The brutal reality behind this protection is when product is damaged, it cannot be resold or exchanged as new. Use of 'benefit denial' EAS do not come without risk of accidental discharge, and tag cost is several times more expensive that 'standard' EAS tags. However, the method is very effective at protecting 'softlines' merchandise and other products sold without substantial packaging that might inhibit the effectiveness of the tag.

Secured Product Dispensers: An effective, but restrictive method of protecting product from theft is to keep it locked in protective showcases. 'Dispensing systems' are used to select stock items one at a time, and are often automated and networked to some degree to log stored product inventory. Small, highly valuable products like pharmaceuticals, electronics, and cosmetics are best suited to this type of protection - while product is indeed kept secure, it also takes more time and requires deliberation on part of the honest shopper. As a result, the use of this countermeasure should be carefully weigh the savings in reducing product loss against the overall loss in gross sales due to inconvenience.

Data Analyics: Not to be confused with video analytics, data analytic services featuring 'Receipt Verification/Return Authorization' modules can be used to prevent from converting stolen goods back into cash. Everytime a transaction is generated, it is uniquely identified and stored. Commonly, this record is identified via a barcode on the bottom of a reciept. That data record not only can be used to track the goods sold, it can also be used to verify purchase of an item being returned. When those journal entries are combined into a single dataset, it can be used to verify personal purchasing records of an item, or how many of a certain item was sold by a retailer. In the case of 'exchange fraud', thieves often return stolen merchandise for a cash exchange. Using data analytics can help pinpoint the exact source of when an item was purchased, and therefore validate a cash return. Vendors like Siras and The Retail Equation are specialty vendors of these analytics.

Surveillance Video: The power of video surveillance cannot be overlooked as a fundamental countermeasure to ORC. While the pitfals of poor quality and poorly executed video surveillance in retail are commonplace, effective use of HD resolution images cannot be overstanded. Quality images and videoclips can easily and effectively shared in 'BOLO', or 'Be On the LookOut' reports shared with local security and retailers. Simply being able to recognize suspects and apply human LP resources to ORC threats are a hugely significant, if not the most significant, protection against the threat. Products like 3VR's CrimeDex and LERPnet can also be used in conjunction with local video surveillance to verify and validate ORC threats.

Video Analytics: When dealing with the ORC problem, video analytics used alone have limited value. Because the ORC problem is not simply observable behavior, but because it is a 'nested' type of theft or fraud perpetuated on many levels, video analytics alone are not an effective defense. For example, many video analytics providers cite the use of 'dwell time' as an important indicator of ORC risk, because it can preclude theft planning. In reality, this type of analytic would produce so many false positive alerts on 'casual shoppers' for a typical retailer, it would quickly be discarded as ineffective. In addition, many video analytics providers claim impossible results of face recognition, but these claims are proven time after time to be overstated used in real-world production surveillance systems. Rather, the application of video analytics to combat ORC is, at best, used in conjuction with the methods mentioned above.

Comments : PRO Members only. Login. or Join.

Related Reports

ReconaSense - The AI / Access Control / Analytics / IoT / Video Company Profile on Jun 12, 2018
One company's ISC West booth stood out for displaying a light-up tower of buzzwords. The company, ReconaSense, pledged to be 'making sense of it...
Bosch IVA Video Analytics And Motion+ VMD Tested on Jun 06, 2018
Bosch's video analytics now ship on nearly every model, from indoor domes to high-end 5MP starlight cameras.  In this test, we evaluate Bosch's...
Hanwha Wisenet X Analytics and VMD Test on May 24, 2018
Continuing our updated testing of camera analytics, we tested Hanwha's Wisenet X analytics for over two weeks in multiple scenes, indoors and out,...
The Hikvision Smart Classroom Behavior Management System on May 22, 2018
Hikvision's rapidly growing offering of analytics, which we most recently examined with Hikvision's ethnic minority analytics, is now going into...
Dahua Intrusion Analytics And VMD Tested (Poorly) on May 21, 2018
Dahua ships basic analytics on practically all their cameras, ranging from low cost to high end. To see how these analytics work in real world...
Stealth / UCIT - Remote Video Monitoring Provider Profile on May 18, 2018
Can 2 remote video monitoring companies, Stealth Monitoring from the US and UCIT from Canada combine to impact the market and compete in a changing...
March Networks Targets Cannabis Market on May 10, 2018
Will the next March Networks customer appreciation event be held a steakhouse or at a Taco Bell at 2 am? Can March sell the types of systems to the...
Nortek Acquires IntelliVision on May 08, 2018
One of the largest intrusion manufacturers, Nortek, has acquired the self-proclaimed 'Leader in AI-Based Video Analytics Software',...
Hikvision's Minority Analytics on May 08, 2018
Hikvision has developed and is deploying minority analytics inside China, automatically identifying and categorizing individuals as ethnic...
Hikvision VMD And Intrusion Analytics Tested on May 04, 2018
VMD worked poorly on Hikvision cameras, new IPVM testing found. However, Hikvision ships analytics on practically every IP camera, with intrusion...

Most Recent Industry Reports

IFSEC Show Report Day 2 Report on Jun 20, 2018
IPVM is live from London reporting on the IFSEC show. The Chinese have taken over the UK, centered on Hikvision, flanked by Dahua, Huawei and a...
Mobotix Releases 'Move' Into 21st Century on Jun 20, 2018
For years, Mobotix stood resolutely against, well, every other manufacturer, selling it as a virtue: MOBOTIX equipment is designed with no...
Cybersecurity Startup VDOO Disclosing 10 Manufacturer Vulnerabilities Starting With Axis And Foscam on Jun 20, 2018
Cybersecurity startup VDOO has uncovered significant vulnerabilities in Axis cameras along with many others not yet disclosed. In this report, we...
July 2018 IP Networking Course on Jun 19, 2018
The last chance to save $50 on registration is this Thursday, June 21st. Register now and save. This is the only networking course designed...
Axis Guardian - Cloud VMS And Alarm Monitoring - Released on Jun 19, 2018
Axis has struggled to deliver a cloud-based managed service video platform. Video service providers have utilized AVHS for over a decade, and have...
IPVM Vulnerability Scanner Released on Jun 18, 2018
IPVM is proud to announce video surveillance's first and only cybersecurity vulnerability scanner. This tool allows quickly and simply...
Hikvision Corrects False Cybersecurity Announcement on Jun 18, 2018
Hikvision has corrected a false cybersecurity announcement that claimed a British government-sponsored program endorsed the cybersecurity of...
The Dumb Ones: PSA's Bozeman On Cybersecurity on Jun 15, 2018
The smart ones are the hundred people who flew to Denver and spent $500+ on a 1.5-day conference featuring Dahua as a 'cyber responsible partner',...
Amazon Ring Launches $10 Monthly Professional Alarm Monitoring on Jun 15, 2018
Amazon's Ring has announced an alarm system with 24/7 professional alarm monitoring for $10 per month, a fraction of the $30+ per month traditional...
Axis Releases First New Access Controller In 5 Years (A1601) on Jun 15, 2018
It has been 5 years since Axis 2013 entry in the physical access control market, with the A1001 (IPVM test). Now, Axis has released its second...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact