Post by propertea1 on Dec 3, 2008 13:58:40 GMT -8
Shoplifting tips
WARNING- Contents of this thread are for educational purposes ONLY. It is strongly suggested that you do not use this knowledge for illegal purposes! The Sticker Minion Forum Staff isn't responsible for this thread (see original poster) aside from allowing it to be shown (freedom of speech). The Sticker Minion Forum Staff will not be held responsible for any repercussions.
heres some helpful tips for anyone that racks stuffz
"Accidental" stealing
In "Accidental" stealing, a thief takes his place in the queue with the items he intends to steal, and pays for only one of those items while holding what he intends to steal in full view to cause confusion (or places said items into his pockets), while avoiding suspicion due to his apparent intention of payment. In the unlikely event of being caught, the thief can simply pass off the attempt at stealing as accidental. This method is also referred to as "left handing," a reference to the stolen item being held in the left hand while payment is made with the right.
Baby stroller boxes
This scam involves the use of baby stroller boxes, which tend to be quite large in size. A would-be shoplifter removes the stroller from the box and proceeds to conceal a large amount of merchandise inside. The would-be shoplifter then reseals the box and takes it to a checkout aisle, where he pays the purchase price for the stroller. If the scam is successful the would-be shoplifter walks out of the retailer with concealed merchandise still inside the stroller box.
Bagging, Simple
The '''Simple Bagging''' Tactic is when a would be shoplifter bags the item in a bag that they have brought into the store (ex. purse or shopping bag from another store). This generally done while no one is watching.
Bag switching
Bag switching methods are generally attempted by a group of two shoplifters. Typically the first shoplifter will have a large bag and gather a large amount of merchandise quickly to get the attention of a Loss Prevention Investigator. Once the first shoplifter knows that he is being followed he will conceal the merchandise into the bag. The first shoplifter will then switch his bag with the second shoplifter, who usually has a matching bag that is already filled with items that don’t belong to the retailer. Often the Loss Prevention Investigator will miss the switch and arrest the first shoplifter. Subsequently, the first shoplifter may claim false arrest and receive a gift card from the retailer.
Barcode counterfeiting
In barcode counterfeiting the shoplifter will bring in pre-made barcodes from low value items. They are then applied over the barcodes on higher value items. This allows the shoplifter to go through the check out process, make a payment, have any secruity tags deactivated by the clerk and walk out without any suspicious behavior. The shoplifter might be working with the check out clerk to ensure the incorrect prices are not noticed.
Barcode Switching
This is when a shoplifter switches the tags/barcodes between to pieces of merchandise most likely putting the cheaper tag on the product they wish to obtain
Booster boxes (bag)
A booster box is a device that allows a would be shoplifter to conceal a large quantity of merchandise on his person. These boxes are lined with metal or some other substance to prevent security tags from setting off the security gates at the exit. Typically professional shoplifters of large girth most commonly attempt this scam. The use of booster boxes is most prevalent at clothing retailers due to the fact that clothing merchandise can be easily molded to fit inside the box. Some professional shoplifters have been known in the past to attempt to use booster boxes to conceal electronics and DVDs.
Coupon returns
One of the more common scams involves returning items that were paid for partially with coupons. Some stores, including Target, refund the entire item amount, including the amount discounted by coupons. Shoplifters involved in this scam often shop at multiple stores, and have family members return items so that no suspicion is aroused.
Defective software scam
A person buys a piece of software from a computer store, exits, opens software, and records serial number/CD key for single license of the software purchased. After at least a few hours the same person re-enters the store he bought the software at and complains to customer service that the installation disc is defective. Most computer store policies allow same-item exchange for opened computer software, so person is given a different copy of the same software. The scammer now has two licenses after only paying for one. A more convincing variation includes intentionally nicking the top layer of installation CD/DVD, rendering the discs actually defective before exchanging it.
Double cart
Two shoplifters are usually involved with this scam. They fill two carts with goods and approach the checkout. They load the checkout with the high value goods first. The cashier scans the items and removes the security tags. One of the shoplifters bags the items and places them back into the now empty first trolley. As the second trolley is being scanned the first shoplifter leaves with the first trolley while the second shoplifter stays at the checkout. The remaining goods are scanned and the cashier awaits payment. The second shoplifter puts on an act of a forgotten wallet. This gives the first shoplifter time to load the goods into a vehicle. The second shoplifter then makes an excuse to go and get her wallet, and leaves the remaining goods at the checkout. She then leaves the store and they escape with the high value goods.
Fake return
Sometimes shoplifters will actually gather an item from the selling floor and try to receive money for it without a receipt at the return station. Although this method is not as fool proof as the receipt matching method, it is very effective particularly when done to an inexperienced cashier. Usually the shoplifter will start complaining to the cashier about his inability to return the merchandise. Typically the shoplifter will state that he lost his receipt or threaten the cashier by stating that he wants to talk to the employee's supervisor. To avoid confrontation the cashier will ring up the return and give the shoplifter the value of the merchandise. (See refund theft.)
False alarm scam
The shoplifter grabs something with a tag on it, puts it into someone else's bag, and waits for him to walk out. As soon as the alarm goes off the shoplifter walks out with whatever he's stolen without being stopped.
Fitting room bagging
Typically this scam is seen in large clothing retailers. This scam generally preys upon the common Loss Prevention policy of prohibiting the apprehension of shoplifters when concealment is not actually seen by an investigator. The shoplifter enters a retail establishment with a large bag, and then selects a large amount of merchandise and takes it to a fitting room. Once inside, the shoplifter conceals the merchandise into the bag out of sight of store employees and store investigators.
This technique is very effective due to the fact that most department stores do not supervise the dressing room (they do not check the amount of clothes a person has before and after using a dressing room). Also, because it is common to leave clothes in the dressing room that one does not wish to purchase, entering a dressing room with clothing and exiting with none will arouse no suspicion.
Gift card cloning
In this scam, a normal store gift card with no value attached is stolen from a store. The shoplifter then clones the magnetic strip on the back of the gift card and makes a copy or copies of it. The original gift card is then returned to the store by the shoplifter. The gift card is activated once purchased by another customer, and the dollar amount applied to the legitimate gift card is passed to all the cloned gift cards.
Grab and run
A common shoplifting technique is known by the Loss Prevention community as a "grab and run." Simply put, a shoplifter enters a retail establishment usually with prior knowledge of what he is looking for. The shoplifter moves very quickly toward the merchandise he or she wishes to steal. Once the shoplifter has found the merchandise, he or she proceeds toward the nearest store exit, usually while running. Due to the short amount of time that the shoplifter is inside the store, persons who attempt this scam are seldom caught or, in some cases, even detected.
Less common is for a group of people to rush into a store, grab as much merchandise as possible, and then rush out. The speed at which this happens as well as the large number of people involved make this approach difficult to stop.
Metal-lined clothing or containers
Metal-lined sacks, containers, or clothing (such as aluminum foil-lined undergarments) allow a would-be shoplifter to shield the RFID tags attached to merchandise concealed on his person from the scanners at the door of a store (see Faraday cage). 2001 colourado House Bill 01-1221 made it a misdemeanor to possess, use, or know about and fail to report others who possess RFID shielding devices with intent to foil anti-shoplifting devices.
WARNING- Contents of this thread are for educational purposes ONLY. It is strongly suggested that you do not use this knowledge for illegal purposes! The Sticker Minion Forum Staff isn't responsible for this thread (see original poster) aside from allowing it to be shown (freedom of speech). The Sticker Minion Forum Staff will not be held responsible for any repercussions.
heres some helpful tips for anyone that racks stuffz
"Accidental" stealing
In "Accidental" stealing, a thief takes his place in the queue with the items he intends to steal, and pays for only one of those items while holding what he intends to steal in full view to cause confusion (or places said items into his pockets), while avoiding suspicion due to his apparent intention of payment. In the unlikely event of being caught, the thief can simply pass off the attempt at stealing as accidental. This method is also referred to as "left handing," a reference to the stolen item being held in the left hand while payment is made with the right.
Baby stroller boxes
This scam involves the use of baby stroller boxes, which tend to be quite large in size. A would-be shoplifter removes the stroller from the box and proceeds to conceal a large amount of merchandise inside. The would-be shoplifter then reseals the box and takes it to a checkout aisle, where he pays the purchase price for the stroller. If the scam is successful the would-be shoplifter walks out of the retailer with concealed merchandise still inside the stroller box.
Bagging, Simple
The '''Simple Bagging''' Tactic is when a would be shoplifter bags the item in a bag that they have brought into the store (ex. purse or shopping bag from another store). This generally done while no one is watching.
Bag switching
Bag switching methods are generally attempted by a group of two shoplifters. Typically the first shoplifter will have a large bag and gather a large amount of merchandise quickly to get the attention of a Loss Prevention Investigator. Once the first shoplifter knows that he is being followed he will conceal the merchandise into the bag. The first shoplifter will then switch his bag with the second shoplifter, who usually has a matching bag that is already filled with items that don’t belong to the retailer. Often the Loss Prevention Investigator will miss the switch and arrest the first shoplifter. Subsequently, the first shoplifter may claim false arrest and receive a gift card from the retailer.
Barcode counterfeiting
In barcode counterfeiting the shoplifter will bring in pre-made barcodes from low value items. They are then applied over the barcodes on higher value items. This allows the shoplifter to go through the check out process, make a payment, have any secruity tags deactivated by the clerk and walk out without any suspicious behavior. The shoplifter might be working with the check out clerk to ensure the incorrect prices are not noticed.
Barcode Switching
This is when a shoplifter switches the tags/barcodes between to pieces of merchandise most likely putting the cheaper tag on the product they wish to obtain
Booster boxes (bag)
A booster box is a device that allows a would be shoplifter to conceal a large quantity of merchandise on his person. These boxes are lined with metal or some other substance to prevent security tags from setting off the security gates at the exit. Typically professional shoplifters of large girth most commonly attempt this scam. The use of booster boxes is most prevalent at clothing retailers due to the fact that clothing merchandise can be easily molded to fit inside the box. Some professional shoplifters have been known in the past to attempt to use booster boxes to conceal electronics and DVDs.
Coupon returns
One of the more common scams involves returning items that were paid for partially with coupons. Some stores, including Target, refund the entire item amount, including the amount discounted by coupons. Shoplifters involved in this scam often shop at multiple stores, and have family members return items so that no suspicion is aroused.
Defective software scam
A person buys a piece of software from a computer store, exits, opens software, and records serial number/CD key for single license of the software purchased. After at least a few hours the same person re-enters the store he bought the software at and complains to customer service that the installation disc is defective. Most computer store policies allow same-item exchange for opened computer software, so person is given a different copy of the same software. The scammer now has two licenses after only paying for one. A more convincing variation includes intentionally nicking the top layer of installation CD/DVD, rendering the discs actually defective before exchanging it.
Double cart
Two shoplifters are usually involved with this scam. They fill two carts with goods and approach the checkout. They load the checkout with the high value goods first. The cashier scans the items and removes the security tags. One of the shoplifters bags the items and places them back into the now empty first trolley. As the second trolley is being scanned the first shoplifter leaves with the first trolley while the second shoplifter stays at the checkout. The remaining goods are scanned and the cashier awaits payment. The second shoplifter puts on an act of a forgotten wallet. This gives the first shoplifter time to load the goods into a vehicle. The second shoplifter then makes an excuse to go and get her wallet, and leaves the remaining goods at the checkout. She then leaves the store and they escape with the high value goods.
Fake return
Sometimes shoplifters will actually gather an item from the selling floor and try to receive money for it without a receipt at the return station. Although this method is not as fool proof as the receipt matching method, it is very effective particularly when done to an inexperienced cashier. Usually the shoplifter will start complaining to the cashier about his inability to return the merchandise. Typically the shoplifter will state that he lost his receipt or threaten the cashier by stating that he wants to talk to the employee's supervisor. To avoid confrontation the cashier will ring up the return and give the shoplifter the value of the merchandise. (See refund theft.)
False alarm scam
The shoplifter grabs something with a tag on it, puts it into someone else's bag, and waits for him to walk out. As soon as the alarm goes off the shoplifter walks out with whatever he's stolen without being stopped.
Fitting room bagging
Typically this scam is seen in large clothing retailers. This scam generally preys upon the common Loss Prevention policy of prohibiting the apprehension of shoplifters when concealment is not actually seen by an investigator. The shoplifter enters a retail establishment with a large bag, and then selects a large amount of merchandise and takes it to a fitting room. Once inside, the shoplifter conceals the merchandise into the bag out of sight of store employees and store investigators.
This technique is very effective due to the fact that most department stores do not supervise the dressing room (they do not check the amount of clothes a person has before and after using a dressing room). Also, because it is common to leave clothes in the dressing room that one does not wish to purchase, entering a dressing room with clothing and exiting with none will arouse no suspicion.
Gift card cloning
In this scam, a normal store gift card with no value attached is stolen from a store. The shoplifter then clones the magnetic strip on the back of the gift card and makes a copy or copies of it. The original gift card is then returned to the store by the shoplifter. The gift card is activated once purchased by another customer, and the dollar amount applied to the legitimate gift card is passed to all the cloned gift cards.
Grab and run
A common shoplifting technique is known by the Loss Prevention community as a "grab and run." Simply put, a shoplifter enters a retail establishment usually with prior knowledge of what he is looking for. The shoplifter moves very quickly toward the merchandise he or she wishes to steal. Once the shoplifter has found the merchandise, he or she proceeds toward the nearest store exit, usually while running. Due to the short amount of time that the shoplifter is inside the store, persons who attempt this scam are seldom caught or, in some cases, even detected.
Less common is for a group of people to rush into a store, grab as much merchandise as possible, and then rush out. The speed at which this happens as well as the large number of people involved make this approach difficult to stop.
Metal-lined clothing or containers
Metal-lined sacks, containers, or clothing (such as aluminum foil-lined undergarments) allow a would-be shoplifter to shield the RFID tags attached to merchandise concealed on his person from the scanners at the door of a store (see Faraday cage). 2001 colourado House Bill 01-1221 made it a misdemeanor to possess, use, or know about and fail to report others who possess RFID shielding devices with intent to foil anti-shoplifting devices.