3 Accused of Stealing from Stores; Crashing into Police Car
Three people are accused of stealing thousands of dollars worth of merchandise from stores in Wheaton and Elmhurst and then crashing into a Chicago...
Fraudsters Encoding Stolen Credit Card Data on Barcodes
Crooks are constantly dreaming up new ways to use and conceal stolen credit card data. According to the US Secret Service, the latest scheme...
Pharmacy Chain Hiring Off-Duty NYPD Officers Amid Sharp Spike in Shoplifting
In an effort to stop would-be thieves striking at an alarming rate so far in 2020, some stores — including one of the city's...
Loss Prevention Starts with Protecting Data: 3 Ways to Prevent Insider Threats
It’s evident that there is a new battleground for loss prevention. The product exists as bits and bytes, and it won’t be carried out of stores or looted from warehouses. Indeed, the threat is data theft.
Loss Prevention, Local, and State Police Team Up to Stop Retail Crime
Officers from the Troy Police Department teamed up with the Michigan State Police Fraud Investigation Section to stop shoplifters on January 28th and 29th,...
Unsolved Mystery: No One Charged in $90K Electronics Theft
Employees of the Best Buy in Amherst (New York) got quite a surprise when they went to open the store on June 24, 2016....
Shoplifting Suspect Stabs Self in Neck after Struggle with Police
A man suspected of shoplifting stabbed himself in the neck outside the Evendale Walmart, police said Monday afternoon. It happened around 2 PM at...
Mom Used Infant to Hide Stolen Items While Shoplifting
Police say a woman accompanied by her teenage daughter and an infant shoplifted at an Old Navy and used the infant to conceal the...
Suspected Credit Card Thief Hit by Car While Making Getaway
A man who used a stolen credit card at a Fred Meyer store was struck by a car during his getaway and was arrested...
Genetec Shares Its Top Physical Security Trends Predictions for 2020
The key trends from Genetec’s perspective include artificial intelligence, facial recognition, physical identity management, blockchain, and cybersecurity.