The final countermeasures a retailer can choose includes protective hard- ware and electronic systems. While the total cost of security labor increases, the cost of sophisticated protective systems is decreasing.
This chapter briefly highlights the large variety of available security hard- ware and electronic systems retailers can use to include in their total loss control plans. For more in-depth information on physical systems described in this chapter, refer to the Handbook of Loss Prevention and Crime Preven- tion; second edition, edited by L. Fennelly and published by Butterworth- Heinemann, New York, in 1989.
The security countermeasures discussed in this chapter generally work in three ways. They
1. limit or control access to sensitive or off-limit areas 2. limit the mobility of protected merchandise
3. physically or psychologically discourage dishonest activity
ACCESS CONTROL SYSTEMS
The first line of defense in any program involves limiting access to sensitive assets such as cash, property, or information. ID and access control systems of all types are designed to limit or control access to specific areas. The following are examples of access control systems:
• physical barriers—fences, walls, and barred windows
• Entrance hardware—electric locks
• Color-coded ID cards
• Turnstiles and gates
• guards
Access control technology is constantly changing. Retailers interested in acquiring new systems should carefully review the available products, as well as carefully check references.
123
124 Designing and Implementing Prevention Programs
There are many miscellaneous control devices now available (or soon to be available) that retailers can take advantage of including
• clear trash bags or shopping bags—to discourage individuals from conceal- ing items
• devices designed to make high-loss items less conceaJabJe—plastic attach- ments for compact discs and cassette tapes
• tear-apart price tickets—to make price-switching more difficult
• fitting or dressing room tags—with preprinted numbers or with hanger slots that correspond to the number of items being taken into the dressing room
Physical Barriers
The following physical barriers are designed to delay or deter intruders:
Doors—The barrier at the point of entry must provide maximum delay time by forcing the perpetrator to pick the lock or use sophisticated tools to force entry. The construction must be sturdy enough to resist attack without tools. Door hinges must be inside the door or covered to prevent pin removal.
Roof— If a potential intruder can gain access to the roof of the premises, the roof must be sufficiently constructed to resist entry. Roof hatches, skylights, and vents or smoke stacks must be wired-off, locked, and alarmed.
Floor—If a perpetrator could gain entry through the floor, floor construc- tion must be of material, such as reinforced concrete, designed to resist unauthorized entry.
Fences—Fences are used to define a specific area, deter accidental or non- criminal entry, prevent or delay entry by unauthorized individuals, and guide foot and vehicle traffic from specific areas. Fences should be at least 7 feet tall, anchored to the ground, and of sufficient strength to sup- port a potential intruder.
Windows—Windows are natural entry points for burglars and should be kept locked, hooked up to the store's alarm system, protected by protec- tive film or glaze-coated, illuminated by exterior lights, and barred.
Locks
Locking systems are an important element of any loss control program. Secu- rity specialists must take the time to learn about the basic principles of lock- ing mechanisms to select the brand suitable to their use. Some types of locks commonly used include
Security Systems 125
• door locks of all types (e.g., key, combination, electronic)
• trailer fifth-wheel locks to prevent the unauthorized removal of trailers
• trailer door seals to prevent/detect unauthorized entry into a merchandise trailer.
At this point, it is important to point out some techniques retailers can use to maintain control of keys.
1. Use a key cabinet, which is a cabinet that can be locked, to store all keys.
2. Use a key sign-out log to track keys. This document should also list those individuals who are authorized to check out specific keys. The key log should also be used as an inventory record.
3. Conduct audits of key usage to periodically check key locations.
4. Enforce the rekeying policy and change safe combinations whenever a manager leaves a specific location.
Safes
Any company location at which more than $5000 is stored overnight should be equipped with a safe. Safes are rated by Underwriters Laboratories (UL) based on their fire and/or burglary resistance ability. Keep safes locked at all times. Use cash cache systems to take cash from the point of sale and place it in a secure container. Safes may be imbedded in the floor or mounted in a wall. Locking file cabinets should be treated like safes.
LIGHTING
The use of lighting for security purposes dates back to the beginning of civil- ization. Protective lighting has evolved through the years to the highly effi- cient gas bulbs of today. Lighting is considered the single most cost-effective deterrent to crime, since it reveals to passersby the presence of individuals attempting unauthorized entry of specific locations.
Primary lighting sources are incandescent, mercury vapor, fluorescent, metal halide, and sodium vapor. These sources provide four general types of lighting.
Continuous lighting—provides glare projection or controlled lighting.
Glare lighting projects out from a protected area to form a psychological barrier to intruders. Controlled lighting illuminates a specified area while controlling the amount of glare.
Standby lighting—the same as continuous lighting, but designed to back up or supplement primary lighting systems.
Movable lighting—portable or search light systems.
126 Designing and implementing Prevention Programs
Emergency lighting—generally used during power failure.
Protective lighting can be used inside or outside of any area where a retailer wants to discourage unauthorized activity. High-pressure sodium (HSD) lights are generally regarded as the outdoor security light of choice since they provide fairly accurate color definition, are very energy efficient, and have a long lamp life. HSD lights do have a moderate to high front-end cost, but are more efficient in the long run.
ALARMS
Alarm systems are designed to provide surveillance of or detect intrusion into an area or object without an expensive investment in manpower. It is much more cost-effective to have alarm systems installed in 100 stores than to station guards in every location. Retailers use a variety of alarm systems to protect stores, warehouses, and merchandise.
The primary function of any alarm system is to signal the presence of an intruder or to detect unauthorized removal of a targeted asset. Peripheral benefits include the deterrence of potential offenders by displaying notices of the use of an electronic protection system. The proper alarm system depends on the area and/or item to be protected. Some questions to be asked when selecting an alarm system include
• What is the asset to be protected?
• What is the asset to be protected against?
• What sensors are available to provide needed protection?
• How is the signal to be transmitted and who will respond?
Some of the more common types of alarm systems currently in use with retail operations worldwide include perimeter protection, area/space protec- tion, and object/point protection. Sensors employed in the perimeter protec- tion mode are designed to detect intrusion into a protected area. Doors, win- dows, hatches, and vents are protected by metallic tape, glass-break detec- tors, magnetic contacts, and shock sensors.
Area/space protection sensors are designed to protect outside zones or interior areas of a premises. This system should be separate from the perim- eter system in order to act as a back-up system. If an intruder disables the perimeter system, or gains undetected access, the space protection system should detect the intruder. A space protection system is also very effective at detecting a stay-behind intruder or an individual that gains entry through a wall or the roof. Retailers must realize that interior sensors should be care- fully and thoughtfully installed to gain maximum effectiveness and avoid false alarms. Common types of area/space protection sensors include the following:
Security Systems 127 Photo-electric beams—signal an alarm when their pulse beam is disrupted.
Microwave detectors—detect movement with high frequency radio waves, may be used indoors and outdoors, and may pass through building walls, doors, and windows (application is limited, because of false alarms trig- gered by movement outside of protected areas).
Ultrasonic detectors—sound an alarm when movement is detected by interruption of a radio wave pattern, but will not penetrate walls and may trigger false alarms by air conditioning or water movement.
Infrared detectors—are considered passive since they do not transmit a wave pattern, but sense a thermal object (human) moving in and out of their field of view, and may be used indoors and outdoors.
Sound sensors—either enable a monitoring guard to listen to noise in the protected area or automatically sound an alarm when the sound level increases above the normal pattern.
Object/point protection systems provide direct protection for a single location or specific object. Two types of object/point protection include the following:
Proximity I capacitance detectors—turn the object to be protected (metal) into a sensor (such as a safe) that sounds an alarm when a perpetrator approaches or touches it.
Vibration detectors—may be attached to movable objects or located near a wall or window to detect movement and breakage.
The alarm's sensor detects the intrusion and the annunciator (or alarm) signals it. The signal may be monitored or sounded in one of two ways—as a local alarm or at a central station. Local alarms sound an audio-visual signal that serves to warn local individuals and may deter amateur burglars. Central station-monitoring involves the alarm signal being transmitted over tele- phone wires to a monitoring station.
Before purchasing any alarm system, the loss control director or a quali- fied consultant should consider four factors—correct sensor selection, cor- rect sensor placement, sensor defeat techniques, and alarm follow-up.
Correct Sensor Selection
The security specialist, when evaluating the purchase of an alarm system, should consider the asset to be protected, the level of security required, the environment in which the system will operate, and the budget available.
Ultrasonic, passive infrared, and capacitance sensors each have advantages and disadvantages that must be weighed before a selection is made. Ultra- sonic sensors must be installed and monitored in the area in which they will
128 Designing and implementing Prevention Programs
be located to allow for adjustment of the sensor, since power surges and wind can trigger false alarms. Infrared sensor effectiveness can be downgraded by solid object blockage and confined spaces.
Correct Sensor Placement
Sensors designed to protect a certain area or object must be correctly posi- tioned to achieve maximum effectiveness. Microwave or ultrasonic sensors should be placed so that intruders must walk directly at them. Passive infra- red sensors should be placed so that intruders walk across the collection paths. An intruder could consciously walk between the detection paths by slowly walking straight at the sensor. Because of these differences, a detector unit with both passive infrared and ultrasonic sensors is not usually recom- mended, since both sensors would not perform at maximum capacity.
Just as important as the position of the sensor is the proper aiming of the sensor and keeping the wave or detection path clear of obstruction. The fol- lowing planning data will aid in the placement of exterior and interior intru- sion detectors.
I. Exterior Intrusion Detector Planning Data A. Infrared Sensors
1. Place bottom beam no higher than 6 inches above the ground.
2. Place top beam at least 4 feet above the ground.
3. Overlap detection zones.
B. Microwave Sensors
1. Keep grass and snow lower than 4 inches in the zones between transmitters and receivers.
2. Keep sensors far enough away from fences and other obstacles to avoid interfering with the beam.
3. Overlap detection zones.
C. Fence Disturbance Sensors
1. Keep trees and brush from rubbing up against fences.
2. Secure any moving parts of fences such as signs, loose wires, and gates.
3. Tighten fence posts and fabric to avoid vibration.
II. Interior Intrusion Detector Planning Data A. Infrared Sensors
1. Avoid aiming a heat source or vent at the passive infrared sensor.
2. Avoid mounting sensors over, near, or toward any heat source.
B. Sonic Sensors
1. Avoid placing Sonics sensors where an intruder might hear it before being detected.
C. Ultrasonic Sensors
1. Avoid placing sensor transmitters or receivers near any telephone bells.
Security Systems 129 2. Avoid air conditioning vents or registers when placing sensors.
3. Avoid aiming sensors at items or areas that might vibrate, such as movable partitions or large windows.
4. Do not aim sensors at each other.
D. Microwave Sensors
1. Do not aim sensors at water pipes, walls, or windows that allow the beam to detect movement outside of the protection area.
2. Avoid aiming sensors at vibrating objects or surfaces.
E. Glass Breakage/Vibration Sensors 1. Mount sensors solidly to object.
2. Adjust sensors for specific application.
F. Magnetic Opening Switches
1. Beware of intruders using a magnet to disable the reed contact inside the switch.
2. Tightly shut windows and doors being monitored to avoid false alarms.
G. Proximity/Capacitance Sensors
1. Ground the reference ground plane to allow for proper detection.
H. Photo-electric beams
1. Conceal transmitters, if possible.
2. Don't use mirrors for detection of distances over 100 feet.
I. Audible Sensors
1. Be careful not to locate microphones or sensors close to constant or sporadic noise sources.
Sensor Defeat Techniques
Knowing the techniques some criminals use to defeat intrusion detection sen- sors is helpful when designing the protection system. For example, an ultrasonic sensor can be blocked by placing masking tape over the cover. In- siders working alone or in concert with others may block sensors or mark the detection patterns on the floor for later theft activity.
Infrared sensors can be defeated by blocking the emitter with objects, glass, hair spray, magazines, or plastic garbage bags. Another sensor defeat technique is to set the room temperature to 85-88 degrees Fahrenheit—the approximate temperature of human skin—and remain in the room until the system is turned on.
Alarm Follow-up
To make an intrusion alarm system creditable, it must be responded to and kept in working order. If the individual responding to the alarm determines it was false, the cause must be found and corrected.
If a central station is used to monitor the protection systems of distribu-
130 Designing and implementing Prevention Programs
tion centers and stores, an opening/closing report should be generated that lists the activity next to an employee identification number. This report may be used to indicate trends.
Other Types of Alarms
In addition to intrusion detection systems, retailers use several other types of alarms to signal unauthorized activity. Robbery duress alarms are used to alert law enforcement agencies to a robbery or other violent crime in pro- gress by tripping a switch. This type of alarm can be very dangerous since violent offenders may notice a clerk attempting to actuate a switch or may observe police officers responding and take subsequent violent action.
Merchandise alarms are hooked up to high-cost/high-loss merchandise (such as electronics). This alarm sounds when the circuit is broken by a shoplifter taking the protected item from its display case.
EAS
EAS systems protect merchandise by sounding an alarm when tagged items are removed from a store or distribution center. The detection antennae at the store entrance have a deterrent effect, especially when combined with notification signs on the doors.
There are many types of EAS devices, including a dye tag that when tampered with will break a dye ampule and will ruin the targeted garment.
Another factor to consider when evaluating EAS systems is to determine how it fits in with the total loss prevention effort. Should hard or soft tags be used?
Can the system be integrated with other technologies, such as CCTC or bar coding?
Most EAS companies offer a choice between hard or soft tags, depending on the goods to be protected, the layout of the stores, and the technology used. Figure 13-1 illustrates the characteristics of different EAS tech- nologies.
A growing trend is for merchandise manufacturers to implant dormant EAS circuits into their packaging. These circuits are converted to a live mode by passing through an activation device. By working in concert with manufacturers, EAS companies and retailers all win. The manufacturer moves more products by having their merchandise more openly displayed and retailers more effectively protect their merchandise while increasing sales.
Apparel retailers tend to prefer hard tags that are mixed with soft tags disguised as price tickers, "inspected by" cards that have been placed in pockets or hidden in clothing and shoes. Groceries, auto parts stores, super- markets, and drugstores often use the soft tag systems.
Characteristics Technology
Merchandise Application False Alarm Rate
Detection or Rate
Defeat Techniques
Antennae Width at Exit Tag Application and
Removal Speed Hard and Soft Tag
Integration
Microwave (High Frequency) Soft Goods Very Low
Good
Cover with body or foil, pressure on tag + 20 Feet Fast
Limited
Radio Frequency (Low Frequency) Hard/Soft Goods Frequency Splitting
RF Very Good Frequency Splitting;
Excellent; RF Very Good
Cover with foil; Pressure on tag
+ 8 Feet
Soft Tag—Very Fast;
Hard—Fast Yes
Electro Magnetic Low Frequency) Hard Goods Very Low
Excellent
Sometimes cover foil
+ 2 Feet Very Fast
Yes
(Very
with
Dye Ampule (Non- electronic) Soft Goods N/A: Susceptible to
Vandals N/A
Remove tag outside of store
N/A Moderate
N/A
FIGURE 13-1 Electronic article surveillance operating characteristics.
Security Systems 131
132 Designing and implementing Prevention Programs
The following questions should be asked by any retailer investigating EAS systems:
• What technology is used?
• What is the detection or pick rate?
• What is the false alarm rate and what causes it?
• What types of tags are available?
• How can the system be defeated?
• How close to the alarmed exit can tagged merchandise be placed?
• What are the total costs (e.g., installation, training, maintenance, warranties)?
• What is the system's reputation?
• What are the applicable state laws regarding EAS alarm detection?
The cost of EAS systems can be expensive, but should prove effective.
However, the effectiveness of EAS systems diminishes as time goes by if store employees fail to react to alarms or use other prevention methods. No technology can stand on its own. It must be supplemented with human surveillance and follow-up. In order for any EAS system to prove cost- effective over the long-term, senior management and store management must endorse its use and ensure that it is properly used. Employees must be trained in EAS system use and properly supervised to add creditability to the system. All targeted goods must be kept tagged and alarm situations must be responded to.
CCTV
More and more retailers are using CCTV to prevent, detect, and document theft activity in their stores and distribution centers. In a back-up role, CCTV can verify fire, burglar, and robbery alarms, or other access control systems.
CCTV can be installed outside to observe parking lots and alleys, or in- stalled inside to watch high-loss or unauthorized areas. Camera installation can be temporary or permanent. Portable camera kits are used by retail in- vestigators to respond to suspected theft activity. The carrying case may in- clude a small color-chip camera, two or three types of lenses, a portable monitor for aiming the camera, power cords, tools, mounting brackets, and a time-lapse VCR. These covert surveillance kits allow the investigator to re- spond to a location where theft activity is taking place and quickly install the equipment to record specific unlawful activity. By using this portable equip- ment, the retailer may avoid the investment of equipping an entire store.
Smoked-glass panels or an opti-dome™ may be permanently installed and a camera may be swiftly installed when needed. Aim infrared sensors via lens' to detect movement. Movement triggers the VCR to turn on and the VCR records the target area.