RFID Useful In Fight Against Retail Theft, According To Study

Despite modern surveillance technology, retail outlets continue to be plagued by theft. Shoplifters have discovered various methods to deceive or elude electronic-surveillance systems.

Radio-frequency identification of products is one possible tool to combat theft, and the technology performed well in a new feasibility study on its use as a potential sales-floor theft-deterrent system.

The study, conducted by researchers in the RFID Research Center at the University of Arkansas, demonstrated RFID’s usefulness in several shoplifting scenarios, including many items moving through a security/reader portal at a high rate of speed and many items stuffed into a “booster bag,” a traditional shopping bag lined with aluminum foil.

Bill Hardgrave, director of the research center and professor of information systems in the Sam M. Walton College of Business, announced the findings recently at a two-day forum on item-level RFID hosted by the research center, the Voluntary Interindustry Commerce Solutions Association and the Council of Supply Chain Management Professionals.

“The most interesting data came from scenarios involving the booster bag and testers running through portals with many items,” Hardgrave said. “These scenarios included many multiple RFID tags, and we were able to obtain a great deal of information at the entry/exit portal.”

Researchers tested two types of ultra-high frequency, generation 2 RFID tags in various baseline and shoplifting scenarios. The tests involved comparisons to two conventional systems, acousto-magnetic and low-level radio-frequency electronic article surveillance, currently used in many retail stores.

In the baseline tests, the researchers experimented with various tag locations and orientations as the tags moved through portal readers. In each test, the RFID system performed as well as or better than the conventional systems. The specific strength of RFID, as demonstrated in the baseline tests, was its ability to capture individual tags at various locations and orientations. Perhaps more importantly, the RFID technology recorded the total number of individual tags, while the other technologies simply noted the presence of any tag in the read field.

“Because RFID can uniquely identify individual tags, it can provide information on the number of stolen items within a bag or the number of items held by a shoplifter,” Hardgrave said. “Conventional systems cannot uniquely identify individual tags, which means they can report only one item in a bag that may have 20 or 50 stolen items.”

Based on advice of retail loss-prevention professionals and prevention-technology providers, the researchers then tested the technology in these shoplifting scenarios:

  • Fifty tagged items in a booster bag lined with aluminum foil. (The presence of metal tends to reflect ultra-high frequency signals and therefore reduces read rates.)
  • A tagged shoe worn by a shoplifter/tester exiting the store.
  • A tagged shirt, worn under a coat.
  • Tagged socks carried through the portal under a hat worn by a 6-foot-tall tester.
  • A standard shopping bag of 10 tagged items -- an assortment of underwear, socks and shirts -- moving through the portal at running speed.
  • Tagged socks held in a tester’s hand and tucked under the opposite arm.
  • A tagged item in the center of a full shopping bag of untagged items.

In the first scenario, both RFID and the conventional surveillance technologies achieved 100 percent success at detecting at least one stolen item. The researchers were encouraged that the RFID system captured 77.2 percent of all tags, despite the aluminum foil. Again, because the conventional systems do not uniquely identify each item, it was impossible to determine how many were read. The conventional technologies and RFID also scored 100-percent detection success in scenarios four (item placed under a hat), five (ten tagged items held by a tester running through the portal) and seven (one tagged item in a bag of untagged items).

In the second shoplifting scenario -- a tagged shoe worn by a tester walking through the portal -- the RFID system was 95-percent successful. Hardgrave said this result demonstrated a weakness with the RFID system in that it did not read all tags at the foot level.

Scenario three, a tag placed on the collar of a shirt worn under an untagged jacket, also exhibited a weakness. Hardgrave attributed this finding to the tag’s proximity to the tester’s body, which likely absorbed radio-frequency energy and thus compromised the system’s ability to read tags. Likewise, in the sixth scenario -- tagged socks held in a tester’s hand and tucked under the opposite arm -- the RFID system did not perform as well as the conventional surveillance technologies. Again, the human body acting as a shield had a stronger effect on readability of RFID tags.

“Body proximity had an adverse effect on read rates,” Hardgrave said. “That is something we will investigate further. In general, though, RFID fared well. Clothing and cloth material did not significantly interfere, and moving the tags though the portal at different heights did not significantly affect success, either. To see that speed of movement did not cause decreased performance was very encouraging. Overall, RFID performed adequately enough to warrant further investigation.”

The study is available upon request or can be downloaded at http://itri.uark.edu/research. Enter “rfid” as the keyword.

Featured

  • 2025 Security LeadHER Conference Program Announced

    ASIS International and the Security Industry Association (SIA) – the leading membership associations for the security industry – have announced details for the 2025 Security LeadHER conference, a special event dedicated to advancing, connecting and empowering women in the security profession. The third annual Security LeadHER conference will be held Monday, June 9 – Tuesday, June 10, 2025, at the Detroit Marriott Renaissance Center in Detroit, Michigan. This carefully crafted program represents a comprehensive professional development opportunity for women in security this year. To view the full lineup at this year’s event, please visit securityleadher.org. Read Now

    • Industry Events
  • Report: 82 Percent of Phishing Emails Used AI

    KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today launched its Phishing Threat Trend Report, detailing key trends, new data, and threat intelligence insights surrounding phishing threats targeting organizations at the start of 2025. Read Now

  • NRF Supports Federal Bill to Thwart Retail Crime

    The National Retail Federation recently announced its support for the Combating Organized Retail Crime Act of 2025. The act was introduced by Chairman Chuck Grassley, R-Iowa, Senator Catherine Cortez Masto, D-Nev., and Representative Dave Joyce, R-Ohio. Read Now

  • ISC West 2025 Brings Almost 29,000 Industry Professionals to Las Vegas

    ISC West 2025, organized by RX and in collaboration with the Security Industry Association, concluded at the Venetian Expo in Las Vegas last week. The nation’s leading comprehensive and converged security event attracted nearly 29,000 industry professionals and left a lasting impression on the global security community. Over five action-packed days, ISC West welcomed more than 19,000 attendees and featured 750 exhibiting brands. Read Now

    • Industry Events
    • ISC West
  • Tradeshow Work Can Be Fun

    While at ISC West last week, I ran into numerous friends and associates all of which was a pleasant experience. The first question always seemed to be, “How many does this make for you?” Read Now

    • Industry Events
    • ISC West

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.