Site Map - Loss Prevention

China's Pirates Move Up Value Chain

- China’s counterfeiters are becoming increasingly sophisticated. A two-volume analysis of the economic impact of counterfeiting and piracy around the world by Paris-based OECD contains extensive data on counterfeiting in China.

China's Pirates Move Up Value Chain

- As counterfeit goods from China become more sophisticated, legitimate businesses in the region are joining law enforcement to seek solutions.

Store Losses Studied

- Despite billions spent to curtail it, retailers' losses due to shoplifting, fraud, and administrative errors continue to mount.

Retailers Fight E-Fencing

- The Internet is becoming the venue of choice for criminals who want to fence their stolen goods for more profit than on the street.

Did You Know That?

- Watch those tractors, loaders, and backhoes. According to the National Equipment Register (NER), these are the types of heavy equipment--used for construction, farming, and related fields--that are most often stolen. The high incidence is attributable to the equipment's mobility, according to the NER. @ An NER report, available via SM Online, includes theft information by state and site, as well as recovery statistics.

Tagging RFID's Privacy Problems

- A new bill introduced by California State Senator Debra Bowen (D-Redondo Beach) would restrict the use of information collected by radio frequency identification (RFID) tags.


- The Legislature of West Virginia has approved a bill (H.B. 4101) that will make it a felony to create more than 14 fake bar code labels with the intent of stealing from retailers. Perpetrators face a sentence of up to two years in prison.


- Sen. Joseph Biden (D-DE) has introduced a bill (S. 2227) that would make it illegal to traffic in "illicit authentication features." Authentication features help companies determine that an item is not counterfeit; illicit authentication features would be intended to facilitate illegal copying of movies, music, or computer programs. Such a feature would also be a genuine authentication feature that has been distributed without authorization from the copyright owner. A copyright owner could file a civil lawsuit against the perpetrator.

No Gambling on Surveillance

- Atlantic City's treasure, the Borgata Casino and Spa, minds it gaming floor with a massive camera system and other loss-prevention technologies.

Counterfeiting Exposed: Protecting Your Brand and Customers.

- Targeted to owners of intellectual property, including brands, trademarks, patents, and copyrights, the book explains what they can do to protect themselves from counterfeiters. The advice includes something for just about everyone.

The Retail Manager's Guide to Crime and Loss Prevention

-  Retail loss prevention measures are equally important to mom-and-pop stores and major retail chains, but smaller operations may lack the resources to hire a full-time security professional. Here, author Liz Martinez focuses on smaller and less sophisticated retailers that have little or no corporate loss prevention support.

What's True About False Arrests?

- This study of false-arrest lawsuits shows companies the security procedures and policies that are most likely to land them in court.

Intellectual Property: It Really is a Matter of Life and Death

- Protecting intellectual property rights may sound like arcana of interest to corporate attorneys rather than to law enforcement agents. After all, tracking down the sellers of fake watches or designer purses appears to pale in comparison to catching a murderer.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.