A
Access controls/requirements
areas of security expertise,
241
card access control system,
515
data processing center,
286
electronic entry systems,
453
high-value/theft-prone goods,
91
in interior space design,
89
natural surveillance,
69–71
TAM countermeasure planning,
542
written documentation,
422
Accident investigations,
76–77
Active physical resistance,
580
Admissions,
41,
49,
234,
244,
255,
380,
441,
483,
539,
644
exception reporting software,
156
interrogator using factual attack,
264–267
interview and interrogation,
246
preparation and room setting,
250
Advanced Systems Technology, Inc., security programs,
231
Agency relationships,
295
Aggressive physical resistance,
580
Alarm field transmitting devices,
Alarm Systems
for cash office security,
32–35
company services for,
5–6
for crime prevention through environmental design,
69
in grocery companies,
196
telephone line security for,
types of keypads for,
4–5
Alcohol, tobacco & firearms federal agents,
268
Alpha negative file,
57,
641
Alphanumeric keypads, for alarm security system,
Amateur shoplifters,
8–9,
361
classifications of persons,
Analog CCTV cameras,
599f
and IP surveillance systems,
601
Auras (Guilt Auras),
10–11
Automated cash handling,
17,
31
Automated fingerprint identification system (AFIS),
453,
454
Automatic gait recognition (AGR),
626
Automatic name identification platform,
189
Automation in LP–Sell more, lose less,
462
Avoidable fires, steps to prevent,
165
B
Background investigations,
22–23,
113,
184,
212,
272,
443,
643
lifestyle interviews,
257
retail crime, security, and loss prevention,
594
retail loss prevention,
232
use of private investigators by retailers,
584–587
Badges,
13–14,
16,
23,
55,
89,
183,
214,
285–286,
380,
422,
429,
452,
525,
597,
603,
605. See also Identification card
Bank deposits,
60,
226,
646
cash register manipulations,
34
escort policy and procedure,
142
for working part time,
15–16
Basic protection officer program,
231
Basic security officer training series,
232
Battery-operated radios,
417
Best practices–shoplifting,
18–22
Bomb threats,
451–452,
467
areas of security expertise,
241
emergency preparedness plan for,
431
for extortion purposes,
22–25
finding of incendiary or explosive device,
268
security or loss prevention incident for,
377
at store, warehouse, distribution center and offices,
120
types of circumstances for,
124–225
Bookstore management,
420
Booster equipment, booster bags, bloomers, boxes, cages, coats, girdles, purses,
642
Breakage, financial leverage of,
188
Brookshire Grocery Company,
198
C
Cable-securing devices,
29
Calls for Service (CFS),
561,
563
Carbon dioxide fire extinguisher,
164
Cash control, automated,
31–32
Cash office security,
32–34
Casino/gaming shops & adjunct retailers,
390–404
Closed-circuit television camera
CCTV camera networks,
455
Celebrity and sensitive arrest,
40–41
Cellular radio transmitters,
Certified Forensic Interviewer (CFI),
244
Certified Fraud Examiner (CFE),
456,
585
Certified Protection Officer program,
231
Certified Protection Professional (CPP),
44,
94,
375–376
professional certification program,
213
Certified security consultant,
213,
241
Charge couple device,
584
Chief Security Officer (CSO),
75,
212,
218
Civil litigation, avoidance and cost control,
299–300
Civil recovery
procedure and recommendations,
49
Civil restitution
demand and collection system,
52
release and issue of extortion,
51
Civil rights violations,
481
Closed-circuit television,
115,
139,
154,
194,
360,
421–422,
552–553,
599f,
631–632
areas of security expertise,
241
and IP surveillance system,
601,
603
single-purpose cameras,
600
usage in grocery industry,
195
use of video cameras,
598
visual surveillance by,
35
Closed-circuit television camera,
327
Code of ethics for loss prevention personnel,
302,
368
Cold War and private security,
212
College & university book stores,
418
Collusion,
52–54,
97,
156,
195,
314,
506,
511,
514,
515,
643
Combustible materials
ignition temperatures of,
164
Company property,
183,
380,
530,
607
employee purchases and package control,
138–140
warehouse and distribution center,
53–55
Computer operations security,
80
Computer programs, in retail environment,
239–240
Computer tracking,
81,
219
Concessionaires and tenants,
55
Confidential tip lines,
290
Conscience letters,
56–57
Consumer Healthcare Products Association,
366
Container Security Initiative (CSI),
516
Contractors,
53–54,
57,
62,
73–74,
79,
88–89,
91,
101,
119,
146,
149,
196,
243,
295,
399,
559,
641
Contract security
in retail environments,
57–62
consent to search, proforma,
58
contractors and consultants,
62
contract security guards,
57
contract store LP agents,
61
service provider, expectations of,
60
Controlled/scheduled drug, stealing of,
340–342
Convenience stores burglary.
See Burglary
Convenience stores robbery.
See Robbery
Counterfeit currency,
62–64
Courtroom appearance and testimony,
65–69
examinations, types of,
65–66
fundamental rules in testifying,
67
Credit card fraud,
132,
137,
212,
225,
232,
389,
454,
521,
529,
530
Crime Prevention Through Environmental Design (CPTED)
distribution center site,
88
enhancing physical security using,
630–631
historical precedence,
70
planning for visual space,
72
visual bubbles, landscape, art, and,
72
Crimes
analysis and definition of,
559
prevention, ,
54,
69–75,
88,
198,
205,
207,
214,
218,
228,
242,
420,
423,
451,
457
Crisis management,
242,
534
combining services for,
193
to deter losses in enterprise,
123
for long-term emergency situation,
122–124
primary responsibility for,
76
product tampering and contamination,
362
for product tampering threat,
364–367
Customer accident investigations
accidents/injuries, types of,
76
Customers, privacy concerns,
170
Customs Trade Partnership Against Terrorism (CTPAT),
88,
90,
503,
516
Cybersecurity rules,
77–83
to customer-centered technology,
81
retail cybersecurity program, features of,
81–82
D
Data-driven security,
551
Deep-seated fire, extinguishment of,
167
Detention restrictions, fitting room,
172
Digital video recorder (DVR),
599
closed circuit television system and,
600
Discount violations,
85–86
Distribution centers (DC),
53–54,
59,
120–121,
161,
202
distribution center site,
88–89
high-value/theft-prone goods,
91
interior space design,
89
screening protocols, for employees,
90–91
shift work at warehouses and,
47
transportation controls,
90
District loss prevention manager,
273
Diversion programs, ,
588
Docks (receiving and shipping),
72,
103,
447,
503
checklist of rules and strategies,
92–93
Documentation
of policies and procedures,
94
report, qualities of,
93–94
Drug enforcement administration,
339
Drug store loss prevention
deterrent measures awareness,
100
security and asset protection,
97–100
Drug testing
employee education and assistance,
102
evidence of illegal drug use,
102–103
for hiring entry-level person,
460
in pharmacy investigation,
346
supervisory training,
102
E
Electrical fire, extinguishment of,
167
Electronic article surveillance (EAS),
51,
98,
105,
111,
194,
217,
360,
421,
455,
483,
488,
552,
644–645
basic technology,
106–108
acousto-magnetic (AM) technology,
107
electro-magnetic (EM) transmitter,
106
METGLAS
®, AM disposable labels,
108
radio frequency (RF) systems,
106–107
contact and proximity deactivation,
106
early successes,
109–110
Home Depot’s source tagging program,
109
EAS source tagging,
108–109
executives objectives,
108
market and detection equipment,
108
source tagging, economics of,
110–111
Electronic incident reporting,
29
Electronic security tags (EAS),
557
E-mail,
79,
102,
118,
157,
196,
220,
222,
292,
385,
530,
536,
539,
598
Emergency planning,
76,
124,
242,
419,
423,
450
continuity of management,
118
contract security services,
122–123
coordination and liaison,
118
crisis management team (CMT),
122
customizing the plan,
119
execution instructions,
117
explosion or major fire,
121
severe weather and flood,
121
Employee Assistance Program (EAP),
541
Employee education programs, for
merchandise protection,
360
Employee fraud,
136,
189
cash refund fraud,
128–130
to house credit cards,
132
to third-party credit cards,
130–132
Employee purchase and package control,
190,
431,
442
elements for scrutiny and verification,
138
Employee theft,
11,
16,
31,
95,
126–127,
194,
196,
216,
242,
267–268,
302,
353,
376,
389,
408,
494. See also See also Internal theft
termination for dishonesty,
139
wrongful termination,
139
Entry Level Protection Officer,
231
Ethical dilemmas
conflict of interest reporting program,
150
ethics-based policies, need for,
144–145
potential conflicts of interest,
148–149
principles for decisions,
144
training to employees,
148
Evidence
for courtroom appearance and testimony,
65
of damage or open cartons,
91
documentary evidence,
153
inadmissible evidence,
155
merchandise inventory,
156
of policies and procedures,
94
proper methods of collecting, preserving, and tracking,
150
sample conflict reporting,
151
Exception reporting,
127,
132,
136,
189,
191,
342,
422,
445,
526
digital video surveillance,
157
Executive vice president (EVP),
75,
218
Expert witnesses,
318,
609
litigation against retailers,
159
F
Failure to Appear (FTA),
460
Failure to Remove (FTR),
34,
645
Federal Anti-Tampering Act,
362
Federal Bureau of Investigation (FBI),
577
Federal sentencing guidelines 1991,
220
Federal Trade Commission,
268
Fibrous material, heat conductivity of,
164
Fine jewelry stores, security measures,
271–272
Fire
brigade, salvage work of,
169
combustible materials,
163
first responders to, in stores,
163
reporting to fire department,
165
suppression equipment, portable and manual,
166–167
Fire extinguishers
guidelines for using,
167
Fitness-for-duty (FFD) evaluation method,
538–541,
543
Fitting room,
36,
61,
192,
275–276,
278–279,
286,
293,
302,
418
theft issues associated with,
170
Food and Drug Administration (FDA) agency, in product tampering regulations,
362
Forged prescriptions, in drug diversion investigations,
346–347
Frauds investigation, by private investigators,
587–588
Fraudulent refunds
issue in United States,
180
misconceptions involving,
181
standards of conduct, for security personnel,
183
technology to combat,
186
Frederick Loeser’s & Company,
215
Fugitive task force, in U.S.,
588
I
Ignition temperature, lowering of,
163
Illuminating Engineering Society of North America (IESNA),
89
Incident reporting system, third-party anonymous
Infrared motion detector,
Injunctions
preparation procedure,
284
procedure for obtaining,
284
Instant credit application (ICAP),
388
Insurance, for retail stores,
230
Interactive video training, in retail environment,
239–240
Internal criminal attacks,
80,
309
Internal theft,
196
controls and procedures,
419
International Association of Chiefs of Police,
214
International Association of Professional Security Consultants (IAPSC),
18–22,
213,
552
development and security expertise areas of,
241–243
and loss prevention industry,
240–241
International Cargo Security Council (ICSC),
517
International Council of Shopping Centers (ICSC),
305
International Foundation for Protection Officers,
457
and loss prevention industry,
230–231
training and certification programs of,
231–232
International Information Systems Security Certification Consortium (ISC2),
213
International Security Conference,
240
Interrogation processes
Wicklander-Zulawski Non-Confrontational Method
®,
265
Inter-store transfers,
202,
241
Interviews
processes
behavioral interviewing and diagrams usages,
259
behavior and relations of people,
245–250
fact gathering and cognitive interviewing,
257–259
Investigative case management,
222,
289
Investigative Consumer Reports FCRA,
586
IP surveillance system
infrastructure provision for,
603
L
Labor dispute
identification of replacement workers,
285
Labor problems (Picketing),
574
Law
during Middle Age period,
206
related to property, inheritance, slaves, and criminal offenses,
204
Law enforcement retail partnership network (LERP)
connected with LERPnet.com,
287
design and implementation,
290
law enforcement assessment,
292–293
Legal cases by subject matter (Case Law),
293–294
Legal considerations
damage in security-related lawsuits,
294–295
Legal issues,
207,
287,
427,
584
legal cases by subject matter-litigation control,
293–296
legal risks & liabilities,
498
Liaison with law enforcement,
300
Lighting, in parking areas,
328
Local area network (LAN),
600
Loss prevention (LP),
29,
302–303
agent
in training and supervision,
312–313
aspects of potential acts,
305
certification program of,
213
contents protection of,
306
department
personnel training programs for,
523
personnel, selection and hiring procedure for,
458–459
LPC
QUALIFIED certification program,
213
M
Management of LP personnel,
240,
282
Managing labor disputes,
281
Manufacturing plant night watchman,
213
Mark Out of Stock (MOS),
526
Mentally disturbed persons,
Merchandise
physical security of,
192
Merchant’s guide for dealing with shoplifting,
297–298
Metropolitan statistical area (MSA),
562
Minorities in loss prevention,
610
Motion detection alarms, , ,
N
National Crime Information Center (NCIC),
288
National Fire Protection Association (NFPA),
552
National Incident-Based Reporting System (NIBRS),
577
National Labor Relations Board,
268
Negligence in LP personnel employment
in training and supervision,
312–313
Nonproductive detention (NPD),
486
O
Off-duty police officers, use for loss
Oleoresin capsicum (OC),
581,
607
Open Web Application Security Project
Operation Safe Commerce (OSC),
516
Optical character recognition (OCR),
373
Organized retail theft (ORT),
97–98,
193,
196–197,
199,
268,
319,
320,
642,
647
problem faced by grocery company,
196
Outsourcing,
50,
54,
62,
158,
173,
196,
222,
513,
637,
638
P
Pain compliance technique,
579
Pan, Tilt, and Zoom (PTZ) cameras,
526
Parking environment of retail stores
basic protection measures in,
330–331
security principles for,
330
Parking lots, ,
16,
20,
35–36,
42,
64,
69,
74,
92,
125,
143,
258
Passive physical resistance,
580
Pass offs definitions,
647
Payment Card Industry Data Security Standard,
82
Performance and development review process, in retail stores
Performance appraisals,
338
Personalization, gift cards,
188
Personal use of computers,
218
Pharmacist in charge (PIC),
95
Pharmacy LP investigations
Employee Polygraph Protection Act,
346–348
Pharmacy recovery network,
347
Photoelectric beams, roof protection using,
Photographing shoplifting suspects,
349
Photographing suspects,
349
Pinkerton Detective Agency,
216
Plaintiffs’ attorneys, duties of,
318
Police powers for LP personnel,
583
Post 9/11, and IP surveillance system,
603
Pre-employment screening,
209,
242,
311,
349,
352,
353,
355,
356,
443,
643,
644
protocol and recommendations for,
356
Pre-strike preparation areas,
281–282
Price lookup (PLU) system,
449
Private investigators (PIs),
268,
411,
457,
458,
593
counterfeit checking by,
588
fraud credit card investigation by,
589–590
sexual harassment investigations by,
593–594
Private patrol operators (PPOs),
584–585
Private security
during ancient and Biblical periods,
203–204
during Middle Age period,
206
during Norman and post Norman period,
206–208
public’s perception of,
214
state regulation of, trend in,
213
Professional Certified Investigator (PCI),
82,
213
Professional shoplifters,
470
Profession and professionalism,
213
Promontory Summit, in Utah,
597
Proprietary
vs. contract staffing,
59
Prosecution
vs. release policies,
368
Prosecution
vs. release protective order,
368
Public (coin operated) lockers,
301
Public law enforcement
community responsibilities,
205
developmental process of,
203
Punishment, common forms of,
205
R
Radio frequency identification (RFID),
218,
373–375,
406
frequencies and standardization,
374
Real time in-store analysis,
462
Requests made by detainees,
383
Restaurants in stores
devices required for danger,
385
Proprietary restaurants,
385
Retail environment, key for,
275
Retailer
fencing strategy adopted by,
161–162
highjacking problem faced by,
202–203
in-house security department of,
215–216
Retail fraud,
385–389
apprehension and prosecution,
389
authentic
vs. manufactured identity,
388
awareness programs to combat,
389
Retail industry
private investigators use in,
584–585
uniform crime report,
577
Retail Industry Leaders Association (RILA),
191,
554
Retail intelligence network,
290
Retail inventory loss statistics,
481
Retail loss prevention, performance review processes in,
331–332
Retail merchandising, in casinos,
390
hospitality industry, retailing in,
393–395
liability repercussions, erroneous statutes,
404–405
misinterpretation and misapplication, statutes,
401–404
retail industry, shopkeeper statutes in,
395–398
theory
vs. reality, statutes application,
398–401
Retail outlets
asset identification and existing security measures,
552–553
strategic risk assessment process,
551
threat assessments in,
550
threat information sources,
554
Retail security/loss prevention
radio frequency identification (RFID) for,
218
store detective and shoplifters,
215–216
uniformed (red blazers) security personnel and,
217
Retail trade associations,
293
Return on investment (ROI),
526
Risk assessment,
534,
537,
550,
551f,
567,
578,
619,
623f,
624,
628,
638
Risk identification and recognition, in retail stores
Robbery
robbery advisory and reporting form,
412–413
Role of private investigator in LP,
268
S
Sales associates, integrity testing of
Sarbanes-Oxley Act 2002,
144,
220
Search, consent to,
57–58
Security and emergency communications,
122
Security department, functions,
309
Security investment, return on,
566
Security measure inventory,
550
Security programs, in parking area,
327–328
Security reports (SRs),
561
Security Supervision and Management Program,
231
Security technology, for retail industry
facial recognition technology,
454–455
fingerprint identification,
453
Sex crimes in retail environment,
462–463
Sexual harassment investigations, by private investigators,
593–594
Shoplifter
profiling, as retail loss prevention tool,
478–482
Shoplifting,
8–11,
30,
35–37,
40–42,
45,
50,
51,
55,
59,
66,
68,
95,
170
apprehension report,
171f
detainees, requests and course of actions for,
383–384
detention of suspects,
18
detentions, six steps for,
298
factors influencing customer theft activity,
483
management attitudes toward shrinkage,
483–484
organized retail theft,
487
plan for shrinkage reduction,
490–491
shortage awareness programs,
489
as subject of retail crime,
482
as threat to profitability of retail stores,
19
Shopping centers (malls),
305
Shopping policy violation, interview for,
237
Shortage awareness programs,
489–490
Shrinkage,
47,
49,
50,
80,
86,
89,
94–97,
126,
139,
161,
162,
180,
191,
192
Silent Witness Incentive Award Programs,
11
Social security numbers by state of issue,
650
Sounders, for alarm system applications,
Special considerations,
132,
238
Standards of conduct, for security personnel,
183
State Department Security (DSS),
37
Steps for successful LP program,
528
Stock areas
horizontal travel prevention,
162
near entrances and exits, vulnerability of,
192
Stockroom prowlers, limited access of,
162
Stockrooms,
25,
161,
162,
192,
275,
277,
365,
418,
433,
447,
448,
466,
482
Storage area network system,
601
Store night depository system,
314
Strike
best practices throughout,
283
Supervision
deployment and productivity,
427
employment of LP personnel,
311–313
in enforcement of wagering games,
402
findings and recommendations,
421
by law enforcement agencies,
legal considerations,
297
of lost or unaccompanied children,
303
shoplifting detection and apprehension,
404
training and certification options,
231
Surveillance-stake out,
651
U
Ultra-high-frequency (UHF),
374
Undercover operations (UC) by private investigators,
586–587
United States (n), U.S. (a),
139
Universal product codes (UPCs),
567
V
Vandalism
in behavioral interviewing,
259
labor picketing and handbilling,
574
in malls and shopping centers,
305
precautionary measures for,
597
against property in parking facilities,
329
retail crime, security, and loss prevention,
350
uniform crime report,
562
Vaults,
17,
24,
33,
74,
243,
435–437,
443,
446,
557,
648
Vendor relations
importance of communication,
597
Vertical traveling prevention, by fences,
162
Video recording technology (VHS),
526
Video tape recorders (VTRs),
35
VIP high profile detentions–Celebrity arrests,
241,
652
Visible security
vs. plainclothes,
604–605
Visitor badging, in retail industry,
603
W
Warehouse theft prevention
auditing and inspection program for,
515
internal theft deterrents,
515
physical security controls for,
514–515
Water
damage phase, of salvage work,
169
as fire extinguishment media,
163
Weapons,
21–22,
40,
64,
158,
201,
385,
391,
410,
412,
533,
539,
540,
607
Wicklander-Zulawski (WZ) non-confrontational method,
265
Wireless system for, IP surveillance
Women
and minorities in retail security,
609–612
Workmen’s compensation employee accidents,
197–198
Workplace violence,
617,
637,
638
crisis response procedures,
633
disaster planning, myths of,
633
elimination, at risk behaviors,
624
emergency protocol with police,
634
enhancement, hiring procedures,
634–635
enhancing physical security,
630–631
external threats/risks to company,
625–626
no weapons in workplace policy,
630
organizational violence assessments,
628–629
prevention strategies and avoiding, robbery,
631–633
workplace violence prevention committee,
623–624
zero tolerance and zero incident,
621–622
World War II and private security,
211