Retailers Lost More Than $33 Billion To Theft In 2009, According To Survey

Retailers lost more than $33 billion to theft last year according to a recent annual survey conducted by the University of Florida with a funding grant from ADT Security Services. The National Retail Security Survey (NRSS) preliminary results show a slight decrease in the rate of theft as a percent of sales from 1.51 percent or $36.5 billion in 2008 to 1.44 percent or $33.5 billion in 2009.

It looks like a very tough economy made loss prevention efforts for retailers even more important in 2009, according to Joe La Rocca, senior asset protection advisor for the National Retail Federation.

"The decrease in the rate of theft is evidence of continued efforts by retailers to protect inventories and hold on to merchandise," he said. "This last year we have seen retailers working closer with law enforcement and really maximizing their investment in loss prevention."

Retail theft includes shoplifting, employee theft, administrative error and vendor fraud. As in years past, employee theft made up the largest portion with $14.4 billion in losses or 43 percent of the total. The second biggest category was shoplifting with a loss of $11.7 billion or 35 percent of the total.

Some retailers like K&G Fashion Superstores, a subsidiary of The Men's Wearhouse Inc., with 107 stores in North America, substantially stepped up loss prevention efforts in 2009 with increased anti-theft technology.

"In an economic downturn we wanted to better serve our customers with higher quality brands at discounted prices," said Frank Serra, director of loss prevention for K&G. "Actively protecting those items allows us to keep costs down and pass that along to our shoppers."

Retailers have stepped up their game in the fight against retail crime and are more aggressively using new technology tools to outsmart the criminals, according to Jeff Bean, vice president, National Accounts and Retail for ADT.

"They are using sophisticated video and software to detect unusual shopping patterns," he said. "Retailers are working more often with law enforcement to match up video with repeat shoplifters and study patterns and trends that can break up theft rings and lead to arrests."

The array of loss prevention technology tools continues to be more sophisticated and efficient. New anti-theft tags allow retailers to protect more products including those with unusual shapes, delicate fabrics or difficult-to-tag packaging. Retailers are also turning to smaller and smarter cameras that operate on a network and have analytic software that can detect unusual behaviors like an entire shelf of jeans disappearing. These same software-based video systems can operate together to follow a suspected shoplifter throughout the entire store.

More retailers are using technologies that work on a network to pull together multiple technologies, including register transactions with video, people counting with sales data and alarms with remote monitoring. All of these systems work together to provide the retailer with information and data that can help limit losses, keep prices down for consumers and operate the store more efficiently.

According to La Rocca, the NRSS preliminary data supports the NRF's recent Organized Retail Crime Survey.

"Organized retail crime, where large amounts of merchandise is stolen in bulk quantities and then sold to consumers and suppliers, is still a significant problem for retailers, but we found that there appears to be a slight decrease over the last year," he said. "The investment retailers have made in loss prevention and awareness has helped, but staying one step ahead of retail criminals is an ongoing job."

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.