Web version / Mobile version


LP, AP & IT Security's #1 News Source











2019 GLPS - Group LP Selfies
Your Team - Your Pride - Our Industry
Building Industry Pride - One Team Selfie at a Time

Lowe's Region 6 Field AP Leaders

Following Delivery of AP University Courses...
"Training In the Trenches"

Pictured (left to right): Larry Robbins, Doug Ginter, Paul Moore, Ben Fredbloom, Albert Latham, Jeremy Roberson, Jay Adair, Ronda Fields, Jay Freeman

Lowe's Region 6 AP Team Members Always "Swinging for the Fences"
- Outside of Louisville Slugger Museum in Louisville, Kentucky

Pictured (left to right): Jay Adair, Katrina Wiese, Jay Freeman, Ben Fredbloom, Jeremy Roberson, Paul Moore, Albert Latham, Larry Robbins, Paul Richardson, Doug Ginter

Thanks to Albert Latham, Regional Asset Protection Director at Lowe's, for submitting this GLPS.


First Vendor Caught:
U.S. Security Manufacturer Selling Chinese Tech Claiming it's Theirs - $88M Fraud

-Aventura Technologies Senior Management Charged with Fraud, Money Laundering & Illegal Importation of Equipment Manufactured in China

-Security Hardware, Software & Peripheral Products Manufacturer on Long Island

A criminal complaint was unsealed in a Brooklyn federal court charging Aventura Technologies, a New York-based surveillance and security equipment company, and seven current and former employees, with selling Chinese-made equipment with known cyber security vulnerability to government and private customers, while claiming the equipment was made in the U.S. Aventura has generated more than $88 million in sales revenue since November 2010, and the charged scheme has been going on since 2006, according to a Nov. 7 press release from the U.S. Department of Justice.

Four of the individual defendants are also charged with defrauding the U.S. government by allegedly falsely claiming that Frances Cabasso was the owner and operator of the company in order to obtain access to government contracts reserved for women-owned businesses when Aventura was allegedly controlled by her husband, Jack Cabasso. The Cabassos are also charged with laundering the monetary proceeds of these fraudulent schemes.

Six of the defendants were arrested on Nov. 7. Law enforcement agents executed search warrants at Aventura's headquarters in Commack, N.Y., and at the home of Jack and Frances Cabasso. The government has also seized the Cabassos' 70-foot luxury yacht, and has frozen approximately $3 million in 12 financial accounts that contain proceeds from the defendants' alleged unlawful conduct. securitymagazine.com

The Counterfeit Fight Continues

Ralph Lauren offers consumers a DIY counterfeit-checking tool
Ralph Lauren Corp. on Tuesday launched Digital Product Identities, which enables consumers to use their mobile phones to verify the authenticity of Ralph Lauren merchandise.

By scanning the Digital Product ID on the product label, consumers can confirm whether their purchase is authentic, as well as learn about product details and receive styling tips and recommendations. For Ralph Lauren, the technology offers real-time visibility to track products from the point of manufacture and improve inventory management.

The technology, developed in a partnership with EVRYTHNG, a connected IoT platform, and Avery Dennison, is being phased into all Polo Ralph Lauren products. "The application of this technology means every Polo product will be 'born-digital' which represents a new milestone in data intelligence innovation in our sector," said David Lauren, Polo chief innovation officer, in a statement.

The launch came the same day a CNBC investigation alleged that The RealReal luxury resale site has been selling counterfeit goods and failing to properly train those responsible for authentication

Start-ups such as Blockverify, Cypheme and Red Points have been gaining attention for using artificial intelligence and/or blockchain and cloud-based services to fight counterfeiting. retailwire.com

CNBC Rips The Prima Donna of 'Authenticated Luxury Consignment' - The RealReal - Counterfeits Slipping Through

RealReal's shares plunge as poor training and tough quotas cast doubt on 'no fakes' pledge

The RealReal is an online luxury consignment store that differentiates itself by saying everything is 100% real. The CEO has said there are "no fakes on our site" and "every single item [is] authenticated."

CNBC spoke with nearly three dozen former employees and obtained internal company documents that show not everything is authenticated by an expert and employees work under strict quotas that lead to fakes being sold on the site.

CNBC read nearly 1,400 online reviews of the company and found that fakes, damaged items and mistakes are top complaints. The RealReal, which refused an interview, defended its authentication process and said it has no tolerance for counterfeits.

The RealReal, launched in 2011, went public this year on June 28. That day, CEO and founder Julie Wainwright said on CNBC's "Squawk on the Street" that "every single item has already been inspected, authenticated before it gets on the site." And in 2016, she told CNBC, "There's no fakes on our site."

This promise is key to the brand's identity: the idea that the company takes an extra step to ensure items are authentic. cnbc.com

The RealReal Defends Itself After CNBC Report on Counterfeits
"CNBC's report does not accurately represent the depth of our team's expertise and the thoroughness of our authentication process. The RealReal has a rigorous authentication process, it is core to what we do and central to our brand. We make every effort to accurately authenticate the items we receive. If there is a question about the authenticity of an item purchased from The RealReal, we will always work with our customers to make things right. We stand behind both our process and authenticity guarantee, and will continue to provide a safe and reliable platform for buying and consigning luxury items."

In an email to customers Wednesday, The RealReal founder and CEO Julie Wainwright appeared to back away from previous statements that there are no fakes sold through its site. "This is a complex problem, and fighting global counterfeiters is hard work. We strive for perfection, but may not be perfect every single time," she wrote.

The missive follows an investigative report from CNBC. retaildive.com

The POS Transformation

The point-of-sale transformation continues
While there are many examples of POS advancement, a few specific specimens seem to be generating the most excitement in the marketplace. These include:

Checkin-based transactions
Traditional checkouts - even self-service iterations - could soon become antiquated thanks to the emergence of autonomous brick-and-mortar payment technology. These solutions leverage sophisticated sensors, cameras and machine-learning software to support genuinely frictionless purchasing experiences. The autonomous checkout system that underpins Amazon's Go stores is perhaps the most visible example here in the U.S.

Contactless credit cards
Credit and debit cards with contactless payment capabilities are commonplace in economies across the globe. An estimated 50% of consumers in the European Union use these payment methods, according to research from A.T. Kearney. Adoption is even higher in Asia. In South Korea, for instance, 96% of shoppers use contactless credit and debit cards. However, these items are essentially nonexistent in the U.S., where just 3% of consumers use them. But experts anticipate this will change - and soon.

Advanced POS hardware
As the retail industry evolves, so too does that POS hardware that makes brick-and-mortar purchasing possible. Hardware developers had largely been focused on making back-end improvements. But with new shopper-POS interaction norms materializing, sellers and their technological partners are now moving forward with more visible changes.

All-in-one POS assets are also rising to the fore, as more and more sellers embrace the pay anywhere in-store concept and seek to equip employees with everything they need to checkout customers, from card swipers and pin-and-chip components to onboard receipt printers and cash drawers. retailcustomerexperience.com

Understanding the Value in Autonomous Checkout
Convenience store retailers continue to grapple with how best to respond to the disruption of frictionless checkout. I recently spoke with Crone Consulting's CEO Richard Crone and Managing Partner Heidi Liebenguth for a podcast on autonomous checkout.

Crone pointed out that Amazon Go is working at a 99.99% confidence level. "If something does fail, from our estimations, somebody is reviewing the video on the backend to see what actually happened and resolving the issue pretty quickly," he said.

"If you donate (your) SKU level data, dwell time and checkout data to (autonomous checkout) startups, you're going to help build a unicorn value in someone else's business while you're giving up the very essence, the most prized asset of your merchandising concept," he said. "And that's your SKU-level customer data while they're in the store."

Customer Identification
Liebenguth pointed out that the real value of the machine vision and machine learning used in autonomous checkout isn't the autonomous checkout itself, but gaining the data behind who the customer is through the check-in process.

"Check-in allows the retailer to personalize the customer journey through the store, not waiting until checkout ...

It's important to recognize that Amazon Go is working from a clean slate and not retrofitting frictionless checkout into an existing retail environment.

Amazon has essentially eliminated many of the exceptions found in traditional retail that would pose challenges.

Another approach is scan and go, but some retailers are seeing shoplifting with this approach.

"Another is order ahead, and this could be a replacement for self-checkout altogether," Liebenguth said.

Data Capture
The advantage and value of autonomous checkout is in making the customer experience more valuable and increasing visits and basket size.

Listen to the full podcast here.  cstoredecisions.com

Combatting Shrink with Scan & Go
Many self-checkout theft tactics can be replicated with scan-and-go technologies

While self-checkout and automated solutions offer many benefits, there's a perception they can also lead to greater theft. One survey of 13 major retailers operating in the United States and Europe found
levels of stock loss were 1 percent in stores with self-checkout, compared with 0.67 percent of those with staffed checkouts.

Although some loss can be attributed to mistakes on the part of the consumer, self-checkout can expand opportunities for theft. Many common self-checkout theft tactics, such as bagging items without scanning them or scanning lower-cost items while bagging more-expensive ones, can be replicated with scan-and-go technologies.

After expanding it to more than 100 stores,
Walmart ended its Scan & Go pilot after only a few months in May; a former head of checkout innovation told Business Insider theft was a major problem. At the time the program ended, Walmart said the program had low adoption in addition to some of its own friction points "such as receipt checks, weighted produce and un-bagged merchandise resulting from using the program."

Despite the concerns, the potential for shrink can be overcome with the right optimization of staff and technology, says Jerry Sheldon, a retail analyst with IHL. Spot checks by associates combined with new camera technology and AI can also help retailers identify behaviors related to nefarious activities.

But in contrast to basic self-checkout, many of these new technologies can even reduce theft and error, says Michael Suswal, COO and co-founder of Standard Cognition. For example,
Standard Cognition's AI-powered autonomous checkout platform can detect when someone is not logged into the system and it appears they are about to leave the store with items they have not scanned. The system can then alert associates about the issue.

When armed with the right information, associates can remedy the problem or prevent the theft with non-confrontational questions, such as asking the person if they need help downloading the app or if they were able to find everything they were looking for.

Grabango, a Silicon Valley startup, can even charge potential shoplifters for all items on their person, even if hidden from view at checkout or while leaving the store. As the system does the work, store personnel don't even need to confront suspected shoplifters. stores.org

C-Stores Represent the Canary in the Cage Type Testing Ground
Appears to be Leading in the POS Transformation Process

Small enough to install, monitor and change almost instantly and has the numbers of stores and transaction types necessary to truly test a large consumer base quickly. Just an opinion.

What Not to Say in Written Communications

Phrases early-career professionals should avoid in work e-mail

A recent article in Forbes highlights the importance of communication in the workplace. A report from the World Economic Forum on the top skills required for jobs in 2020 lists communication as one of the top 10. And employers have identified communication skills as the No. 1 trait they desire among recent graduates.

E-Mail Tips

Keep in mind that when someone reads your message, interpreting tone, intent and meaning is difficult. There are certain phrases that should not be included in any message, including the ones listed below.

"What specifically do you want?" - "I can't," "they can't," "it can't," "unfortunately we can't," "I don't," "we don't," "they don't" or "I am unable." - "I've been in meetings."

"I am unavailable." - "This is too late." - "Do you have ... ?" "Can you ... ?" or "You should." - "Let me know if there's a further issue." - "Dear [misspelled name] ... " - "Are the results in?" "As I mentioned" or "like I said."

Use written communication to accomplish these four goals: 1. Build and maintain relationships. 2. Build your professional image. 3. Demonstrate consideration for others. 4. Share context. shrm.org

"It's Not As Much What You Say
But What They Remember You Said Six Months From Now"
Gus Downing

6th Annual ISCPO Global Supply Chain Security Conference: Open For Registration
The International Supply Chain Protection Organization (ISCPO) is pleased to announce its 6th annual conference is open for registration at ISCPO.org. The conference will be held March 3-5, 2020 in Dallas, TX where ISCPO members and loss prevention professionals will hear from industry veterans and get the latest trends in supply chain security, industry theft, global trends, and investigation.

ISCPO's annual conference brings together loss prevention, security, and protection professionals working within the global supply chain for two days of networking, education, and collaboration. iscpo.org

ROFDA to Join Forces with NGA

KKR Makes Formal Approach to Walgreens Boots on Record Buyout

Spin-off of Old Navy in doubt amid sudden departure of Gap CEO

Global Smart Supply Chain Summit 2019:
Technology Is Driving Improvement in the Efficiency of Supply Chains

UPS expects 26% jump in returns this peak season


Last week's #1 article --

Security Systems News Welcomes "40 Under 40" Class of 2019 Winners
Security Systems News is excited to bring you this year's inaugural "40 under 40" class of 2019, made up of a diverse and talented mix of young professionals representing the next generation of leaders in security.

Opening the award up to consultants for the first time added new depth and perspective to this year's class, bringing all winners - consultants, integrators, monitoring professionals and end users - together into one "40 under 40" class. Prior to this year, the award was called "20 under 40" and included two classes, comprising 20 end users and 20 integrators. This year's "40 under 40" class includes 14 end users, 11 integrators, 10 consultants and 6 monitoring professionals.

For a full list of all the winners, click here: securitysystemsnews.com

In case you missed it --

KPMG: Online, mass merchants will grab biggest share of holiday purchases

Walmart turning its international money transfer service into a marketplace

Kroger is rebranding with a new logo and slogan

All the News - One Place - One Source - One Time
Thanks to our sponsors/partners - Take the time to thank them as well please.
If it wasn't for them The Daily wouldn't be here every day for you.




PD: Gilbert couple arrested, charged with trafficking $2.7 million
in stolen property

According to Gilbert police, 42-year-old Zach Robbins and his wife, 47-year-old Jie Robbins, were taken into custody at their home near Warner and Higley roads on Friday. During the arrest and search of the home, officers recovered around $500,000 - $750,000 worth of stolen over the counter health and beauty products.

Police said they became aware of the operation about three months ago. Their investigation revealed the Robbins' have been operating an interstate sales of stolen property for more than four years. Detectives say the suspects initiated sales through eBay and Amazon storefronts. The couple allegedly paid others to shoplift items from local stores and then resold the merchandise online. Read more

For further information on PROACT, email inquiries to PROACT@eBay.com.





S-TRON's Continued Salute to our Nation's Veterans

Pictured Left to Right: Corporal Palacios, Marine Corps (4 years); Petty Officer 2nd Class Rosado, Navy (8 years); Petty Officer 2nd Class Mattschull, Navy (8 years); Petty Officer 1st Class Dunn, Navy (6 years); Private First Class McCory, Army (3 years); Staff Sergeant Volk, Air Force (6 years); Not pictured: Petty Officer 3rd Class Benson, Navy (4 years)

On this Veterans Day, S-TRON is very proud to be a part of a Country and Community that honors those that have put the United States of America before themselves. We understand the debt of gratitude that Veterans are owed by us.

One of S-TRON's founding principles is recognizing and rewarding service, whether on the battlefield defending our country, or in the support of our community and customers.

The mission of our leadership team is to maintain a company and customer focus based on this principle, so that we may "pay it forward" in a way that demonstrates our commitment and gratitude. We are forever grateful for those continuing to "Stand the Watch" and those who "Stand Relieved."

God Bless You, God Bless Us and God Bless America!

S-TRON is a National Electronic Security Solution Provider focused on exceeding customer expectations. With a constant evolving offering, we provide new and creative solutions and technologies to meet our customers everchanging challenges.

"Standing by to Serve": www.s-tron.com





Cybersecurity Workshop at NRF Big Show in NYC
Wednesday, January 15 / 8:00am - 1:30pm / New York Marriot Marquis

This workshop will provide retail business leaders and information security professionals with strategic insights on cybersecurity threats and how they can mitigate cyber-related risks to the retail enterprise through in-depth discussions of the major cybersecurity challenges facing the retail sector. This workshop is for retailers only and not open to press. nrfbigshow.nrf.com

Sponsored by Deloitte

Removing a CISO After a Breach Is a Tough Call, Experts Say
Ousting an executive can sometimes do more harm than good, such as losing valuable knowledge for the company.

A cybersecurity incident can put a stain on the corporate security chief, but senior leaders must be sure that removing the executive doesn't further harm the company, experts say.

The calculation involves evaluating whether the problem could have been prevented as well as assessing the chief information security officer's protection strategies. Data breaches will happen at some point for companies that have valuable data. He said the question is whether the breach was preventable or unpredictable.

Removing an executive after a scandal isn't unusual and it can help mitigate financial fallout. "Investors do like to see firms taking action, doing something to try to rectify or alleviate the situation," she said.

At a breached firm, the board and senior leaders should be sure the CISO was at fault before moving to oust or demote the executive, she said. "It's not if a breach will happen, but when, and it may not be anything the CISO did wrong."

High-profile breaches tend to trigger executive changes. Equifax Inc. announced the retirement of its chief information officer and chief security officer soon after disclosing a breach in 2017.

Firing a CISO after a high-profile security lapse can signal that the organization takes data security seriously. But that can be a mistake, she added: "When the CISO walks out the door, a tremendous amount of knowledge leaves with them."

A more effective strategy, she said, is for the CEO to take accountability for the lapse, allowing the CISO to focus on developing a tighter security program.

A survey of CISOs conducted by security firm Optiv Security Inc. in September found that 58% said experiencing a data breach actually made them more attractive to other employers. Around three-quarters of those surveyed said they expected CISO roles to be a path to chief executive jobs in the future. wsj.com

Insider Threats Hits Two in 1 week
Security's Biggest Challenge

Trend Micro Employee Sold Consumer Data to Scammers
A Trend Micro employee stole and then sold contact information for 68,000 of the company's consumer subscribers, which led to a raft of unsolicited tech support scam calls, the company says.

The employee has been fired and law enforcement has been contacted, the company reports in a statement on its website. The employee accessed the data "with a clear criminal intent," Trend Micro says.

The incident is an embarrassment for Trend Micro. It also highlights a problem that is regarded as one of the most difficult computer security challenges: a well-placed insider who decides to steal information from a company, or the "insider threat." "Credit should be given to Trend Micro for being so open about this issue," Honan says. govinfosecurity.com

Feds Allege Saudi Spies Infiltrated Twitter
The U.S. Department of Justice has charged three men with perpetrating a campaign to infiltrate Twitter and spy on critics of the Saudi government, and acting as illegal agents of a foreign government.

On Wednesday, prosecutors unsealed a criminal complaint against two ex-employees of Twitter: Ali Alzabarah, 35, of Saudi Arabia, and Ahmad Abouammo, 41, of Seattle. The complaint also names Ahmed Almutairi, aka Ahmed Aljbreen, a 30-year old Saudi national. Alzabarah has been accused of sharing 6,000 Twitter users' private details with Saudi officials in 2015 and was arrested Wednesday in Seattle. While the other two are back in Saudi Arabia. Abouammo Worked as Media Partnership Manager in Seattle. Alzabarah Worked as Site Reliability Engineer (IT) in San Bruno, Calif. govinfosecurity.com

Twitter & Trend Micro Fall Victim to Malicious Insiders
Two separate incidents reported last week have once again highlighted how insiders with legitimate access to systems and data can be far more dangerous to enterprise security than external attackers.

"The premise of 'you can't deny what is granted' applies in that if an insider has legitimate access, then it is difficult to determine if a behavior is allowable," Poschman says. True intent can be hard to determine until after damage is done because legitimate user behavior can often be erratic, he adds.

Several tools are available to address insider threats, including user behavior analytics and risk-based authentication products. Data-centric measures such as tokenization and format-preserving encryption can also help by limiting access to sensitive data for all users regardless of the permissions they have, Poschman says.

Terry Ray, senior vice president at Imperva, says trying to proactively restrict all employees to just the data they need can be complex and even next to impossible for enterprise security organizations. Even a zero-trust approach - where every access request to a network or app is vetted for trustworthiness - has limitations when it comes to malicious insiders, he says. "The only aspect of zero trust that might have benefited Trend Micro would be least privileged access - the idea that each individual should only have access to what they need for their role," he says.

To be effective, insider controls have to be based on a continuous monitoring of all user access to protected data. To spot unusual behavior, organizations need to be constantly analyzing who accesses data, what they access, how they access it, from where, and whether they should they have access to it.

"Monitoring user activity on corporate data is not only fully accepted, it's assumed by employees," Ray says. darkreading.com

Apple Card issuer investigated over credit algorithm gender bias claims
Goldman Sachs is facing a probe due to allegations that men are being offered higher credit limits than women.

Last week, co-founder & CTO of Basecamp David Heinemeier Hansson published a series of tweets calling Apple's new Card program "sexist." "Apple Card is a sexist program," Heinemeier Hansson continued. "It does not matter what the intent of individual Apple reps are, it matters what THE ALGORITHM they've placed their complete faith in does. And what it does is discriminate."

As the Twitter thread gained traction over the weekend, Apple co-founder Steve Wozniak chimed in, saying that the same thing happened with him and his partner. The couple has no separate bank accounts, credit card accounts, or assets. zdnet.com

Why Is Third-Party Risk Management So Complex?
Organizations should develop a comprehensive strategy for managing third-party security risks and avoid over-reliance on any one tool, such as vendor security risk assessment, monitoring or ratings services, says analyst Jie Zhang of Gartner.

Risk management professionals should use security risk resources carefully "and you should really have your own strategy in terms of third-party risk," she says in an interview with Information Security Media Group.

"For any organization today, third-party risk is a very messy area. That's because there is no [dedicated] third-party risk organization in general, within most organizations," she notes. "The risk ownership or accountability is being shared among multiple functional areas within the organization."

Too many organizations lack a centralized way of evaluating their vendors, she notes. "So these third parties are coming to the organization from different angles. There is no central role or program that is designed to go through all these third parties from an intake process," she says.

Organizations that use the services of hundreds or thousands of third parties "have to think about a governance perspective," she says. govinfosecurity.com

UPS, CVS Make First Residential Drone Deliveries of Prescription Medicines

Ring Flaw Underscores Impact of IoT Vulnerabilities

Getting Ready for the NIST Privacy Framework

Goodbye, Symantec for Consumers; Hello NortonLifeLock



Critical Incident Management - Technology - Response

Pat McEvoy, Sr. Dir of AP Administration, Hudson's Bay Company
Bryan Granata
, Sr. Dir. of Asset Protection, Hudson's Bay Company



With lone wolf terrorist attacks happening more frequently in the greater NYC area and active shooter incidents increasing nationwide, the need for critical incident management programs, technology and hardware has never been more important.

Pat McEvoy, Sr. Director of Asset Protection Administration, Hudson's Bay Company and Bryan Granata, Sr. Director Asset Protection, Hudson's Bay Company, tell us about the preventative measures their stores are taking from training drills and K9 dogs to gunshot detection systems.

Episode Sponsored By

Rex Gillette Shares How the
ADT/Protection 1 Merger is Going

Rex Gillette, Vice President of Retail Sales for ADT/Protection 1, tells us why a great employee culture with top notch customer service have helped Protection 1 and ADT set itself apart as a leading integrator in the retail security business.




More US retailers set to participate in Alibaba's Singles Day
The Nov. 11 Extravaganza is the Biggest Shopping Event of the Year

Alibaba's annual e-commerce extravaganza is about to begin. And as the Chinese retail giant has courted more brands to participate, retailers around the world are bracing for the biggest shopping event of the year.

Alibaba's Singles Day debuted on Nov. 11, 2009, as a day for those people not in romantic relationships to celebrate themselves by shopping online. The 24-hour phenomenon trounces Amazon's Prime Day. In fact, it is expected to generate more sales than the U.S. shopping holidays Black Friday and Cyber Monday and spending on Thanksgiving Day combined, according to Adobe Analytics.

Adobe, which checks the online transactions of 80 of the top 100 internet retailers in the U.S., has forecast the five-day stretch from Thanksgiving to Cyber Monday this year will bring in $29 billion in online sales. Alibaba's Singles Day in 2018 did over $30 billion, and that number is expected to grow. About 24% of U.S. retailers say they plan to run promotions for Singles Day, Adobe said, after conducting a poll of 402 U.S. retailers that do annual sales of more than $500,000. cnbc.com

Alibaba Singles' Day Set to Challenge $31 Billion Record
Alibaba Group Holding Ltd. has logged more than 215 billion yuan ($30.7 billion) of purchases during its Singles' Day bonanza, exceeding last year's record haul about two-thirds of the way through its 24-hour shopping marathon. bloomberg.com

Kount Introduces Industry's First Complete Solution for Criminal and Friendly Fraud

US Holiday Sales to Cross $1 Trillion for First Time

Surveys: Online shoppers opt for Walmart over Amazon


San Francisco, CA: Police arrest CEO, execs at East Bay business accused of peddling stolen phones
Police arrested the CEO and top executives of a Hayward electronics business alleged to have been buying phones stolen from cars and trucks in the Bay Area, and selling them overseas, the Fremont Police Department announced Friday. Detectives said they learned during a seven-month investigation that Torspin Wireless was working with several street criminals to acquire stolen goods, including an Oakland-based burglary crew that was stealing iPhones from FedEx and UPS trucks. Authorities netted 1,800 stolen phones and large amounts of cash in a sting operation that busted two California shops for buying and selling stolen electronics. sfchronicle.com

Fuel-theft rings fill South Florida roads with 'moving bombs'
These criminals lug huge amounts of stolen gas across South Florida's roadways, hiding hundreds of gallons in modified trucks and SUVs.. Authorities refer to the gas thieves' converted trucks as moving bombs because of the hazard they pose if one were to crash and explode. "They're out there, they're so common - trying to blend with people who go to work every day," said Florida Highway Patrol Trooper Alexis Otano. "God forbid one of these vehicles gets into an accident." And officials say the gas theft has been on the rise. Such fuel pilfering cases are up in Broward County, with 16 people charged so far this year compared with 10 last year. Between 2013 and 2017, only seven were charged. sun-sentinel.com

Santa Fe, NM: Burglars steal over $100,000 in Western style belt buckles and jewelry from boutique

Vero Beach, FL: Woman switches tags to buy $1.8K in electronics for $3.70 at Walmart

Natick, MA: Natick Mall Shoplifters used poncho to hide $650 of goods; Police say 'brazen but sloppy'

West Monroe, LA: Housewife pays for 2 items at self-checkout, steals 44 (valued at over $500), inside her purse is meth, pipe, scales and 26 Klonopin pills


View ORC Archives Case Goes Public?
Share it with the industry

Submit your ORC Association News

Visit ORC
Resource Center


Shootings & Deaths

Miami, FL: Shopping Center Security Guard accidentally shot, killed a 62 year old woman
Detective Angel Rodriguez of the Miami-Dade Police department said the shooting occurred shortly after 1 p.m. at a business is located inside the Seastone Shopping Center. "Once the officers arrived, they discovered a female suffering from an apparent gunshot wound," Rodriguez explained. "The preliminary investigation revealed the victim was shot by an armed security guard stationed at the business," Rodriguez said. "Investigators are interviewing the security guard to determine the details surrounding the incident." Police did not immediately identify the woman who was shot or the 54-year-old security guard. miami.cbslocal.com

Boston, MA: Deadly, accidental mix of acid and bleach blamed for Buffalo Wild Wings manager's death
An accidental mix of cleaners - acid and bleach - generated toxic fumes that killed the manager of a Buffalo Wild Wings in Massachusetts, authorities said Friday. The eatery's 32-year-old manager, Ryan Baldera, was killed and 13 others were taken to the hospital, according to the Fire Department in Burlington, Massachusetts, a Boston suburb. The accident occurred shortly after 5:30 p.m. Thursday when a worker began cleaning the kitchen floor just before the dinner rush. But that employee did not know that an acid-based cleaner, Scale Kleen, had been spilled on the floor earlier, Patterson said. So when the worker used chlorine- and bleached-based Super 8 on the floor, the mixture turned green and started to bubble, Burlington Fire Chief Michael Patterson Patterson stated. nbcnews.com

Louisville, KY: Update: Kentucky Police Respond To An Active Shooter at Kroger
The man who allegedly fired at Louisville police officers outside of a Portland Kroger on Thursday night before the officers fatally shot him has been identified. Shelby Gazaway, 32, of Louisville, was pronounced dead at the scene just after 6:20 p.m. Thursday, according to the Jefferson County Coroner's Office. Dramatic police body camera footage released shows officers outside a Louisville Kroger grocery store engaged in a shootout with a suspect who was killed in the firefight. The man that was shooting inside the store came out and started shooting at officers, they returned fire, killing that man. courier-journal.com

Otay Mesa, CA: Church's Chicken shooting victim remembered, mourned during candlelight vigil
Newlywed Maribel Ibanez, 28, was killed when a gunman opened fire on employees at a Church's Chicken Restaurant in Otay Mesa Wednesday evening. A family friend said Ibanez was a newlywed and had been working at the Church's Chicken in Otay Mesa for several years as a shift leader. Ibanez's friend said Ibanez took the brunt of the gunfire when an unknown man walked into the restaurant at around 5:35 p.m. and shot at three employees across the service counter. The family friend also identified the other two employees wounded in the restaurant shooting: Mario Rojas and Humberto Ruiz. Police said Thursday that one of those victims had been released from the hospital, while the other was still being treated and was expected to recover. sandiegouniontribune.com

Atascocita, TX: Jewelry store owner shoots suspects after smash-and-grab attempt
Delton Hayes looked out on the showroom of his jewelry store that was transformed in a matter of seconds by a 4 person robbery crew. In the end, the store owner got the last laugh, despite the damage. Mid-afternoon, a man tugged at the front door of the store, which is controlled by a security buzzer. Moments later, four robbers masked with bandanas rushed the store and hammered away at the glass showcase. Hayes later learned two of them had been wounded. "One was shot in the hand, according to a deputy. I shot the other one in the butt," he said. abc13.com

Update: University Park, TX: Pregnant employee shot during robbery CVS is improving, along with her baby

Robberies, Incidents & Thefts

Kokomo, IN: Three arrested after alleged strong-armed robbery in Kokomo, three county pursuit
Three woman were arrested after allegedly stealing UGG boots from the mall and leading authorities on a chase in three counties. Kokomo Police Department officers were called just before 5 p.m. Friday to the Markland Mall after mall security officers said the woman stole UGG boots. One woman allegedly pepper sprayed a security officer as he attempted to stop them. The vehicle they allegedly left the mall in was later located by Howard County Sheriff's deputies, according to the release. The suspects allegedly threw stolen property out of the window during the pursuit. They were later stopped near Clay Terrace Shopping Center in Hamilton County. theindychannel.com

North Phoenix, AZ: Man allegedly stealing diapers pulls gun on security guard
The Phoenix Police Department is asking for your help identifying a man who allegedly stole diapers from a grocery store and pointed a gun at a security guard. According to police, the suspect was last seen at El Rancho Market near 19th and Dunlap avenues on October 27 around 10 p.m. Police say the suspect entered El Rancho Market and allegedly stole diapers, hiding them under his shirt. When he was confronted by a security guard at the front door, police say the suspect "pointed a semi-auto handgun from his front waist area and pointed the gun at the victim before fleeing the store with the diapers. abc15.com

Pittsburgh, PA: Do It Best Home Center Shoplifter Flees Police In Broad Daylight, Crashes Into Hillside

Englewood, OH: Three arrested in relation to Verizon robbery



Bentonville, AR: Man gets Life in prison for robbing Dollar General
Tracy Wright, 48, was found guilty Thursday night of aggravated robbery and theft of property. The punishment for aggravated robbery is usually 10 to 40 years or life imprisonment. Wright was charged as a habitual offender, which meant he faced a mandatory life sentence because of previous felony convictions. Wright had two previous residential burglary convictions from Kansas. He also had a conviction for battery on a law enforcement officer and a previous aggravated robbery conviction. Bryan Sexton, deputy prosecutor, told jurors Wright robbed the business with a toy gun. arkansasonline.com


Cargo Theft

UK: Northamptonshire: Thieves steal cargo of Sex Toys worth over $1 million from truck parked at roadside




Daily Totals:
• 15 robberies
• 9 burglaries
• 0 shootings
• 0 killed


Click to enlarge map


Rachel Ramey
promoted to Market Asset Protection Manager for Walmart
Max Chasin named Organized Retail Crime Investigator for
Abercrombie & Fitch
Kiara Coates promoted to Area Manager for Nordstrom Rack

Christopher Bellamy named Regional Loss Prevention Manager for Family Dollar

Submit Your New Hires/Promotions or New Position




Featured Job Spotlights


Regional Loss Prevention Manager
Greater Toronto Area, Canada

Become the Newest Member of the VF Family. As the Regional Loss Prevention Manager, you will have the critical function to support an entire region of stores and serve as the subject matter expert in loss mitigation. You will have the great responsibility to own and oversee all matters and investigations of internal and external theft...

Senior ORC Investigator
Boca Raton, FL

The Senior Investigator is part of a fast-growing, ever changing environment that partners with Store Operations to ensure we provide the best experience to our customers. The Senior Investigator is responsible for assisting with implementing a strategy to combat organized retail crime and external theft across the TJMaxx and Marshalls brands...

Loss Prevention Investigator
Seattle, WA

The Loss Prevention Investigator is part of a fast-growing, ever changing environment that partners with Store Operations to ensure we provide the best experience to our internal and external customers. With a focus on internal cases, the Investigator takes complex investigations head-on through establishing solid partnerships with store and LP leadership...

Loss Prevention Investigator
San Jose, CA

The Loss Prevention Investigator is part of a fast-growing, ever changing environment that partners with Store Operations to ensure we provide the best experience to our internal and external customers. With a focus on internal cases, the Investigator takes complex investigations head-on through establishing solid partnerships with store and LP leadership...
Area LP Manager
San Jose or Fresno, CA

The Area Loss Prevention Manager (ALPM) drives shrink improvement and asset protection programs for two (2) to four (4) Districts which contain approximately 25-65 Ulta Beauty Stores. The Area Loss Prevention Manager is responsible to assess store procedures, promote awareness and methods to prevent, protect and control losses...

Area LP Manager
Sacramento, CA

The Area Loss Prevention Manager (ALPM) drives shrink improvement and asset protection programs for two (2) to four (4) Districts which contain approximately 25-65 Ulta Beauty Stores. The Area Loss Prevention Manager is responsible to assess store procedures, promote awareness and methods to prevent, protect and control losses...

Regional Asset Protection Manager (North East)
Boston, MA

The successful candidate will be responsible for the management of the Asset Protection function in their assigned area. Guide the implementation and training of Asset Protection programs, enforcement of policies and procedures, auditing, investigations and directing of shrink reduction efforts...
Area Loss Prevention Manager
Charlotte, NC

Our Area Loss Prevention Managers ensure safe and secure stores through the objective identification of loss and risk opportunities. Our Area Loss Prevention Managers plan and prioritize to provide an optimal customer experience to their portfolio of stores. They thrive on supporting and building high performance teams that execute with excellence...
Area Loss Prevention Manager
Seattle, Portland or Salt Lake City

Our Area Loss Prevention Managers ensure safe and secure stores through the objective identification of loss and risk opportunities. Our Area Loss Prevention Managers plan and prioritize to provide an optimal customer experience to their portfolio of stores. They thrive on supporting and building high performance teams that execute with excellence...
Area Loss Prevention Manager
Calabasas, CA

Our Area Loss Prevention Managers ensure safe and secure stores through the objective identification of loss and risk opportunities. Our Area Loss Prevention Managers plan and prioritize to provide an optimal customer experience to their portfolio of stores. They thrive on supporting and building high performance teams that execute with excellence...

Loss Prevention Operations Specialist
Tucscon, AZ
The Loss Prevention Specialist will oversee the Burglar/Fire Alarm and overall Physical Security function for stores including CCTV for all new stores, renovations, acquisitions, closing, existing stores and warehouses. In addition, this position supports the security/property control component for the Corporate Headquarters main campus...

Featured Jobs

To apply to any of today's Featured Jobs, Click Here


View Featured Jobs   |   Post Your Job




Networking has always been a key to career development and finding that next job. However, if you're not careful it can also limit you, eliminate you and even work against you. If your network is comprised of executives doing exactly what you do, then you may have competition and may even find some working against you. You've got to broaden and expand your network outside your immediate group and establish relationships outside your company and your professional circle. Remembering that quantity is no substitute for quality and, as in any mutually beneficial relationship, what you bring to the table for them is as important as what they bring to the table for you.

Just a Thought,

We want to post your tips or advice... Click here


Not getting the Daily? Is it ending up in your spam folder?
Please make sure to add d-ddaily@downing-downing.com to your contact list, address book, trusted sender list, and/or company whitelist to ensure you receive our newsletter. 
Want to know how? Read Here

FEEDBACK    /    www.downing-downing.com    /    Advertise with The D&D Daily