Web version / Mobile version

 7/25/18 Subscribe Free LP, AP & IT Security's #1 News Source d-ddaily.net

Facebook Twitter Linkedin






RLPSA Annual Conference
Aug. 5-8

GRAORCA Retail Crime Conference
Aug. 29

Retail Risk -
New York
Sept. 6

New England LP Expo
Sept. 13

Q3 RAM LP Committee Meeting
Sept. 14 -
DCU Center
Worcester, MA

RCC Retail Secure 2018
Sept. 20

Retail Cyber Intelligence Summit
Oct. 2-3

CORCA Conference
Oct. 3-4

Q4 RAM LP Committee Meeting
Nov. 7th
BJ's Wholesale Inc Corp. Office - Westboro, MA

RLPSA Connect
Nov. 15

See More Events




'18 National Retail Security Survey

2017 NRSS Survey

2016 NRSS Survey

2015 NRSS Survey


View all published episodes here






"Your full service physical security team"

Each number on a team member's jersey represents the year they joined the company

Front row, left to right: Bill Crowley, Sean Siegel, Pete Sutton, Duane House, Tom Capranica, Holly Morrison, Steve Hornbeck, Jennifer Graves, Danielle Hoover, Chrissy Miller, Nikki Mobley, Karen Angeles, Julie Wallace, Lili Granger, Chad Kennedy, Tony Kates

Second row, left to right: Dan Israel, Nate Wetmore, Rebecca Boresow, Christian Turner, Matt Brown, Natalie Kimbrell, Cathy Campbell, Heather Benker

Third row, left to right: Keith Padgett, Don Stroh, David Israel, Phil Michael, Rob Wright, Matt Setter, Doug Taylor, John Kupka, Mark Barrett, Mike McCluskey, Ed McCampbell, Brandi Dameron, Jason Hamlin, Sergio Meraz, Stacy Derks, Jacque Britton, Natasha Woodley

Submit Your Group LP Selfie and Group Vendor Selfies Today!

CA Prop 47 Impact - Brought to you by ALTO Alliance

"Rainbow Crews" Theft On the Rise in The Bay
Uptick in San Francisco retail theft

Retail theft is on the uptick in San Francisco, and while luxury goods were once the focus, now it seems as if those stealing are going for lower end merchandise.

Police confirm retail theft is on the uptick specifically in parts of North Beach, Fisherman's Wharf, and Union Square.

While luxury goods were once the prime target, groups of people are now expanding to drug stores.

Viewer video sent to KRON4 shows a robbery at the Walgreens on Columbus and Bay streets last week. But it's not just Walgreens.

The CVS Pharmacy at Stockton and Sutter was hit back in June. People are seen taking what they want with apparently no care in the world.

And there is a video of another robbery at the same store this weekend. Once again, people are seen rifling through merchandise and sticking it in their bag before heading out the door.

A spokesman for CVS says it takes the matter of organized retail crime seriously and it partners with law enforcement and other retailers with a  goal of preventing this activity and bringing to justice those responsible for it.

So far, there have been no arrests in the drug store robberies, nor any indication that those involved are connected, but police say there appears to be a lot of teenagers involved in the recent uptick in these types of crimes. kron4.com

ISCPO's Executive Roundtable Interview Series
John Cannon, Special Agent in Charge of the GBI Major Theft Unit

As part of our Executive Roundtable Interview Series, we sat down with prominent law enforcement veteran John Cannon, Special Agent in Charge (SAC) of the GBI Major Theft Unit with the Georgia Bureau of Investigation (GBI). An active ISCPO board member, he provides a unique perspective when it comes to setting best practices in conducting major theft investigations. We asked him to share his take on where the industry is going in combating crime and how LP practitioners can effectively work with law enforcement to mitigate loss.

ISCPO: How has the industry evolved since you started out, especially related to how technology aids in investigations?

I think the use of technology has increased, especially with high value loads. When tracking devices are utilized by the transportation industry and used correctly, it provides us with a greater opportunity to recover a stolen load. Real time monitoring and timely notification improves the chance of making a full recovery. As with any organized criminals who adjust to investigative techniques, cargo thieves have responded to the use of technology utilized by the transportation industry. On the flip-side. we have seen an increase in the use of GPS jamming devices being used by the organized cargo theft groups, especially the groups from South Florida.

ISCPO: In your experience, how can Public Sector & Law Enforcement can work together with Private Sector better?

Prior to my assignment regarding cargo theft, I spent most of my career in drug enforcement with the GBI. Initially it was difficult for me to understand the concept of sharing information with the private sector. I quickly realized the importance and benefit of working together with private sector investigators. While it may sound easy, it takes time to develop that level of trust to share information.

Read the full interview here

Editor's Note: There's been a number of articles testifying to the success of the GBI since its inception a few years ago and the dramatic impact it's had on reducing cargo theft. A well-deserved article and call out.

CargoNet's Second Quarter 2018 Cargo Theft Trend Analysis
California & Florida Top Almost Every List

In the second quarter of 2018, CargoNet recorded 328 supply chain risk intelligence events in the United States and Canada. Sixty-four percent of incidents involved a stolen vehicle, and 48% involved stolen cargo among several other kinds of events, such as identity theft, missing drivers, and police intelligence. In total, CargoNet recorded 157 cargo thefts across the United States and Canada in second-quarter 2018, a 4% decrease from second-quarter 2017. The average cargo value per theft event was $186,779, for a total estimated loss of $29.3 million across the United States and Canada in this analysis period. There were 342 stolen vehicles recorded, including 120 semi-tractors and 155 semi-trailers.

California reported 34 cargo thefts in second-quarter 2018; thefts in the state were down 21% from second-quarter 2017. Florida was a distant second place, with 22 reported cargo thefts. CargoNet also recorded an increase in cargo theft in the province of Ontario and the state of Illinois. We also note that one of the top states for cargo theft, New Jersey, continued a downward trend in theft. ajot.com

Sports Apparel Giant Fanatics Sued for Racial Discrimination
The U.S. government is suing Fanatics Inc., the sports apparel company whose investors include the National Football League and Major League Baseball, for racial discrimination, harassment and retaliation.

Filed Tuesday in district court in Florida, the suit brought by the U.S. Equal Employment Opportunity Commission centers mainly around claims by a former employee, a black man, who says he was repeatedly subjected to discrimination during his time at the company's Jacksonville headquarters.

The accusations include a team leader using the n-word on the employee's first day of work, and other comments from colleagues and superiors such as "I'm not racist but a lot of you [black] guys can't read" and "Africans in Europe know their place, but not in the United States."

Other Fanatics employees describe the workplace as racially divided, with separate treatment of white and black employees, according the lawsuit. A former Operations Administrator said minorities are "treated like uneducated slave labor."

"Fanatics is committed to treating all employees fairly and takes complaints like this very seriously," the company said in a statement. "We deny any wrongdoing and look forward to vigorously defending these claims in court." bloomberg.com

No other state witnessed as many Identity Fraud reports per capita as Florida throughout 2017
Residents of Florida, Michigan and Nevada are among the most likely in the U.S. to report being targeted by fraudsters and identity thieves, according to a report from the Federal Trade Commission. The FTC's Consumer Sentinel Network recorded roughly 1.1 million reports of fraud in 2017 - with scammers posing as government officials, distant relatives and technical support staff in a bid to trick consumers into paying them. Consumers reported being tricked out of more than $900 million last year, up more than $60 million from their losses in 2016. usnews.com

'Security Guard By Day - Homeless By Night'
London, UK: Tens of thousands of people are working for high street brands while homeless because they can't afford a roof over their head

Set on London's exclusive Bond Street, the Prada boutique attracts a crowd of wealthy patrons spending thousands of pounds on designer clothes and handbags.

Yet for the store's security guard, Kallum, this glamorous world lies in stark contrast to his life outside work. As the store's shutters close, Kallum has no home to return to, and instead sleeps rough on the capital's streets. Even more shockingly, his case is not unique.

Channel 4's Dispatches programme, aired on Monday night, will reveal tens of thousands of people - some working for the nation's most recognisable high street brands - are sleeping rough because they cannot afford a roof over their heads. dailymail.co.uk

Four predictions on how retailing will evolve
The retailers who flourish in the upcoming years will be those that re-imagine and align their stores with the digital age.

End of long-checkout queues: Saying goodbye to long checkout lines will be one of the most well-known retail trends that will go mainstream in the next few years. The future of retail will look more hopeful than ever before by helping consumers dodge queues and offering customers with a hassle-free shopping experience.

Embracing the Millennial mentality: The future of the retail industry will significantly revolve around the preferences and tastes of Millennials. Millennials usually tend to be more loyal to brands that stand for the right values, like authenticity, transparency, and social responsibility. Transparency is one of the retail trends that will soon become a fixed factor in the retail industry.

Stores that recognize customers: The brick-and- mortar retailers are inspired by online retailers to know their customers better. This means that we can soon expect physical stores to find customers in the aisles via facial recognition or biometrics and save their browsing and purchase history immediately.

More small format stores: Small format stores will be a prominent trend in the future of retail. Many retailers are taking an inverse approach to surviving by becoming small and nimble rather than trying to compete with online stores' large catalog and endless aisles.

To view a comprehensive list of the factors affecting the future of the retail industry, click here. chainstoreage.com

Oracle Retail Breaks Down Inventory Barriers with Cloud Service
To empower retailers to more easily track, access and manage inventory in store Oracle Retail has introduced a new Store Inventory Operations Cloud Service. By providing the ability to view inventory by size, color and other key attributes, the Oracle Retail Cloud Service helps retailers improve customer satisfaction and fulfill demand regardless of channel. prnewswirecom

How to Have the Termination Discussion
What to say and what not to say when separating an employee for cause

Termination meetings are always challenging. Minutes before you call the employee into your office, your heart pounds; you experience mixed emotions of guilt, fear and justification; and you mentally rehearse what to say and how to say it.

When a breach of progressive disciplinary warnings results in a termination for cause due to poor performance, you have choices: keep the individual at arm's length throughout the discussion; create a threatening and intimidating atmosphere to persuade the individual not to sue you; or extend an olive branch and help the individual come to terms with this new reality, heal the wound, and get on with his or her life. shrm.org

Vice President Loss Prevention position posted at Fred's Inc., Memphis, TN
The Vice President Loss Prevention is responsible for providing direction, development and leadership to Loss Prevention, Safety, Security and Audit teams for corporate, distribution centers and the field. These teams directly impact enterprise shortage control, security awareness, and program compliance for all Fred's retail locations.  The Vice President manages multiple Security, Loss Prevention and Safety programs and initiatives for stores and in our corporate offices. jobs.net

Fred's, Inc. operates approximately 600 general merchandise and pharmacy stores, including 13 franchised locations.

Director, Risk Management and Safety job posted at Guess, Los Angeles, CA

An anti-Trump boycott ending its crusade against 24 companies that sell Ivanka Trump products

Giant Eagle offers Scan Pay & Go 'as-you-shop' option at 3 central Ohio stores

Quarterly Results
LVMH Q2 revenue up 11%, first half yr. revenue up 10%


All the News - One Place - One Source - One Time
The D&D Daily respects your time & doesn't filter retail's reality



P.O.P. Security Invisi-Shield® System

Are you looking for a simple yet effective solution to secure products and reduce shrink? The innovative and easy-to-use P.O.P. Security Invisi-Shield® System from FFR Merchandising, a siffron company, can help you do just that. This open (not under lock and key) loss prevention system secures high-value, high-theft product while allowing customer access to the product for purchase.

The P.O.P. Security Invisi-Shield System features clear "invisible" panels that control inventory while providing an unobstructed view of consumer product. Panels slide along a rail to allow single product access for legitimate customers while preventing "shelf sweeping" theft. As customer slides panel to access product, a manual clicking sound alerts store personnel to activity. Available for narrow, wide, or tall products, the panels feature contoured edges that are intuitive and comfortable for shopping.

The plastic panels are nearly unbreakable, even in high-traffic environments, and have been designed to install easily on perforated gondola shelves with minimal to no impact on existing planogram. Optional accessories, such as locking panel, end panels, and security bar cover, provide additional security by further limiting access to the product.

To provide greater protection from shelf sweeping, reduced labor and improved organization, use with any of our Power Zone® Self-facing Systems.

To see how it works, check out the video here.

For more information on the P.O.P. Security Invisi-Shield System and how it works, contact FFR Merchandising at 800.422.2547 or visit www.ffr.com.


The Most Revealing Study We've Reported On
72% of CEOs Steal Corporate IP from Former Employers

Higher security budgets and advanced new tech won't protect your data from a CEO who decides to bring it outside the enterprise - and it turns out many have a habit of doing just that.

There remains a great disparity between how business leaders claim to approach cybersecurity and how they act, researchers found in Code42's 2018 Data Exposure Report, which surveyed 1,034 security and IT leaders (CSOs, CTOs, CISOs, CIOs) and 600 CEOs and business leaders.

Most (78% of) CEOs and 74% of business leaders say intellectual property (IP) is the most valuable asset in the enterprise; however, 72% of CEOs admit to taking IP from a past employer. Nearly half of business leaders and 71% of CMOs claim to have done the same thing.

"I think we all know when people leave companies they take information with them," says Code42 CISO Jadee Hanson. "The startling stat in here is the amount the C-suite executive level answered and said, 'Yes, I take information when I leave a company.'"

The security side is concerned: 78% of CISOs polled say greatest risk to organizations is people who disregard policies and rules to do their jobs the way they want. But it's tricky to convince employees to change dangerous habits when many don't think they're doing anything wrong.

Three-quarters of CEOs say "it's not just corporate data, it's my work, my ideas." Seventy percent of business leaders agree. Both CEOs and businesses leaders feel ownership because, as they state, they "impart" themselves into their work and it should be considered theirs. Nearly all (93% of) CEOs keep a copy of their work on a personal device or storage account.

"People don't even think of it as stealing information and taking it with them," says Hanson.

You Can Click, But You Can't Hide

Half of business leaders and 63% of CEOs admit they've clicked links when they didn't mean to or thought they shouldn't have. As a result, 34% of CEOS had to change their passwords, one-quarter lost control of their accounts and 25% paid ransomware, researchers report.

14% of CEOs and 36% of business leaders don't report these incidents because they thought they could sort it out themselves (36% and 38%), didn't think it posed a security risk (20% and 24%), feared the repercussions (26% and 23%), or "hoped nothing would happen" (27% and 22%).

Think Before You Download

Nearly 60% of CEOs admit to downloading software without knowing whether it's security-approved, which marks a decline from 75% in 2017 but still signifies a major problem. Of the CEOs who download unapproved software, 77% think it would be considered a security risk.

It's not only leadership who's going behind security's back: 70% of CISOs and 62% of IT and security leaders believe all employees are downloading unapproved software. The reasons are varied; employees claim they use unapproved apps because they use the same tools in their personal life, those apps make things easier, or the company-provided software isn't as good. darkreading.com

Editor's Note: Don't Shoot The Messenger
So how does Corporate America and more importantly the CSO's and LP/AP senior leaders deal with this? Is it a matter for the Board's Audit Committee? Does the Board of Directors discuss this and who presents this study to them?

In this new age of total transparency, as mentioned above in an article/study about retail survival, and as evidenced around the country with all of the senior management departures involving miss-conduct obviously it needs to be addressed. Because as AI develops and is integrated more and more this will come to the surface and present some interesting dilemma's for senior leadership and boards.

It will ultimately end up as a contractual obligation which for the most part already exists. The issue is do the boards enforce it, are they even looking at it and once again who presents it? Because in the real world they do shoot the messenger. Just a thought. Gus Downing

IBM Study: Cost of a Data Breach Reaches $350 Million
A study sponsored by IBM Security and conducted by Ponemon Institute found that the average cost of a data breach globally is $3.86 million, a 6.4 percent increase from the 2017 report.

This year for the first time, the 2018 Cost of a Data Breach Study also calculated the costs associated with "mega breaches" ranging from 1 million to 50 million records lost, projecting that these breaches cost companies between $40 million and $350 million respectively.

"While highly publicized data breaches often report losses in the millions, these numbers are highly variable and often focused on a few specific costs which are easily quantified," said Wendi Whitmore, Global Lead for IBM X-Force Incident Response and Intelligence Services (IRIS). "The truth is there are many hidden expenses which must be taken into account, such as reputational damage, customer turnover and operational costs. Knowing where the costs lie, and how to reduce them, can help companies invest their resources more strategically and lower the huge financial risks at stake."

Key findings include:

● Average cost of a data breach of 1 million compromised records is nearly $40 million
● At 50 million records, estimated total cost of a breach is $350 million
● The vast majority of these breaches (10 out of 11) stemmed from malicious and criminal attacks (as opposed to system glitches or human error)
● The average time to detect and contain a mega breach was 365 days - almost 100 days longer than a smaller scale breach (266 days) securitymagazine.com

Business Email Scams Spin Even Wider Webs
Attackers will target the payment method you most commonly use

If the Business Email Compromise (BEC) scam isn't on the radar of every corporate finance executive, it certainly should be. The Federal Bureau of Investigation (FBI) recently issued a public service announcement warning that the BEC scam has now redirected $12 billion worldwide, much of that now having to be written off as a loss for corporates unable to recover the funds.

A new report finds fraudsters are spinning their BEC webs even broader, targeting new channels of business transactions.

More than three quarters of companies became targets of payments fraud last year, yet another all-time high. While the continued strength of BEC scammers may not come as a surprise, the research finds that the scam no longer only reigns in targets with a request for wire transfer. Of the businesses that have been hit by a scam, 77 percent were the target of a BEC scam, the report said. While 54 percent of those scams involved wire transfers, more than a third targeted check payments.

According to the AFP, an attacker will target the payment rail that is most commonly used by the victim to pay suppliers, thus, limiting suspicions. This means that, though ACH payments have developed a reputation of greater security compared with checks, BEC scammers are also committing the scam to request fraudulent ACH transfers, too. Of respondents who said they were targeted by payments fraud last year, a combined 41 percent said the fraud involved ACH transactions, both debit and credit. pymnts.com

You might not always stop the hackers
But you can make sure you bounce back faster after an attack

Murphy's Law: Anything that can go wrong will go wrong

What's the biggest problem with most existing approaches to internet security? Many would say that it only guards effectively against known, easily-identified threats, and takes too long to respond to new ones. Hackers are nothing if not inventive when it comes to finding and exploiting new 'zero day' threats, whether in applications, operating systems or the software infrastructure that underpins websites and services. They're attacking vulnerable endpoints and using them to move laterally across to other systems. They're attacking third-party suppliers or exploiting the weaknesses of employees to find a way into the network. They're finding modes of attack that don't get caught by traditional anti-malware tools.

That's why the focus on protection and protection alone is not enough to protect enterprises and their data. Instead, businesses need to adopt a more balanced strategy; one that backs up protection with resilience. This isn't about lowering your perimeter walls and opening the gates, but accepting that, eventually, some attempts will make it over or through, and having systems in place to deal quickly with any threats and minimise their impact.

Leading security researchers have understood this for some time. As Simon Schiu and Boris Balacheff of HP's Security Labs wrote at the end of 2016: "The security profession is finally accepting this axiom: given enough resources, an attacker will eventually be successful. This means designing not only security protections, but also mechanisms that detect when protections fail and help recover devices or infrastructure to a good state, at both machine speed and at scale." itpro.co.uk

5 Steps for Better Data Protection & Privacy

1. Get to know your own data - Can you identify exactly where all of your organisation's personal data is being held? If not, you need to map out all of your systems to find out. The best way to do this is to track the path of the data from the moment it first enters your organisation, be it physically or digitally. From here, establish where it has ended up and where it has been in the process.

2. Less is more - One excellent recommendation of the EU GDPR is to hold as little personal data as possible. The more information you have, the more attractive you are to hackers and the more you have to lose. Our own advice is to assume that you will certainly be breached at some point and to minimise the damage when that happens. Ideally, when the hacker breaks in they will find nothing of value.

3. Make life harder for hackers - If you do need to keep personal data, put as many obstacles as possible in the way of the fraudster. Use tokenisation or pseudonymisation and separate uniquely identifiable details such as email addresses and telephone numbers from all other data. In this way, complete records are assembled only when a record is actively required for the purposes of a specific transaction or query.

4. Educate your employees - A recent study by HANDD Business Solutions has found that employees are frequently a business's weakest link when it comes to data protection. While it's important to trust your staff, regular training in basic security procedures such as changing passwords and looking out for phishing or spear phishing attacks is absolutely essential. Managers must ensure that policies are kept up to date and hold regular tests to make sure that the entire team knows how to put these into action.

5. It's not just about you - Making sure the customer data that you hold is secure and encrypted is only the first hurdle. If you are working with partners for some aspects of data processing, then it's up to you to make sure that their processes and security measures are as robust as yours. information-age.com

Threat Hunting: Rethinking 'Needle in a Haystack' Security Defenses
Business executives are finally getting the message from IT and security leaders that they need to be more proactive when it comes to cybersecurity. They can't afford to let their cybersecurity teams wait for alerts that may come too late to stop a minor intrusion from becoming a major breach. Threat hunting is the approach business leaders need to detect these incidents early enough to stop them.

Where leadership holds both authority and responsibility for these functions, they may not know enough about threat hunting to provide much-needed direction. It's often up to frontline defenders to figure out how to get that initiative on stable footing.

At any organization, the sheer number of "events" to sort through can make early detection daunting. It's easy to reach for the "needle in a haystack" metaphor, but this is a flawed perception of the problem. The old saying assumes that you know there is a needle, that you know what a needle looks like, and that it is in fact a needle you're looking for. This doesn't address the fact that, in the cyber world, needles (that is, threats) can disappear quickly for a wide variety of reasons - and often long after the malicious party has completed what he or she came to do.

Although there are many factors for cybersecurity teams to juggle, getting started isn't hard. Read on. darkreading.com

BEC Scammer Gets 4 Yrs Prison - Hitting Seven Companies in U.S. & Abroad
for $900K

Emeka Ndukwu, 46, of Upper Marlboro, Md. a dual citizen of the United States and Nigeria, was sentenced today to four years in prison for conspiring to launder the proceeds of scams that tricked seven companies in the United States and abroad into wiring more than $900,000 into accounts controlled by various co-conspirators. Business e-mail ("BEC") compromise schemes; typically a co-conspirator tricks a company into transferring large sums of money into accounts controlled by others participating in the scheme. justice.gov


Canada becomes second nation in the world to legalize marijuana
"Keeping Profits Out of the Hand of Criminals & Organized Crime"

Canada is only the second country in the world -- and the first G7 nation -- to implement legislation to permit a nationwide marijuana market. In the neighboring US, nine states and the District of Columbia now allow for recreational marijuana use, and 30 allow for medical use. Uruguay was the first country to legalize marijuana's production, sale and consumption in December 2013.

Bill C-45, otherwise known as the Cannabis Act, stems from a campaign pledge of Prime Minister Justin Trudeau to keep marijuana away from underage users and reduce related crime.

Although the Canadian government had initially stated its intent to implement by July 2018, provinces and territories, who will be responsible for drafting their own rules for marijuana sales, have advised that they would need eight to 12 weeks after the Senate approval to transition to the new framework.

On June 19, 2018 Justin Trudeau tweeted:

"This is an historic milestone for progressive policy in Canada," she tweeted. "This legislation will help protect our youth from the risks of cannabis while keeping profits out of the hands of criminals and organized crime."

Once the bill is formally approved, adults will be able to carry and share up to 30 grams of legal marijuana in public. They also will be allowed to cultivate up to four plants in their households and prepare products such as edibles for personal use.

However, stringent rules will still govern the purchase and use of marijuana.

Consumers are expected to purchase marijuana from retailers regulated by provinces, territories or -- when neither of those options are available -- federally licensed producers. Marijuana will also not be sold in the same location as alcohol or tobacco.

The Canadian government has also implemented changes to their impaired driving laws, to address repercussions for driving under the influence of cannabis.

The bill set a floor on the minimum age of the consumer at 18 years, and makes the production, distribution, or sale of cannabis products an offense for minors.

Market Boom

C-45 is also expected to spark a billion-dollar industry, given total spending on marijuana could surge as high as 58%, especially as users are expected to be willing to pay a premium for legal access to the drug.

In the United States, BDS Analytics estimated that the pot industry took in nearly $9 billion in sales in 2017. The revenue from the sales is equivalent to the entire snack bar industry.

As provinces decide local rules of implementation, marijuana availability will vary across the country. In Alberta, recreational weed will be widely available at more than 200 private retailers across the province. On the opposite end of the spectrum, marijuana availability will only be provided in 40 state-run shops in Ontario. In Newfoundland and Labrador, it will be available in Loblaws grocery stores. cnn.com

Upcoming Cannabis Legalization is Dominating All Canadian News
RCC Plans Half Day Special Loss Prevention Conference

From Provinces struggling with licenses, locations, amounts, organized crime, and security. Not a day goes by without articles appearing across Canada. Even the Retail Council of Canada is planning a special half day session at their upcoming Loss Prevention conference devoted to the subject.

This is the precursor for the states as the U.S. trend continues as Canada will be the subject matter experts going forward. As mainstream retail will be involved or at least impacted in some form sooner or later. -Gus Downing

LP & Security Impact

Legalization of cannabis a groundswell of opportunity for security providers
"This is a huge business opportunity," says David Hyde, when asked how the upcoming legalization of recreational cannabis under The Cannabis Act will impact the security business.

Hyde, owner and principal consultant at David Hyde and Associates, a risk management and security services consultancy based in Toronto, is not alone in this belief. Even prior to legalization, companies and consultants have seen opportunities to expand their business under the ACMPR, or the Access to Cannabis for Medical Purposes Regulation.

Expanding growth opportunities
Despite the difficulties of entering a new, somewhat "unconventional" industry, there is plenty of evidence to indicate the cannabis market will provide opportunities for growth.

"Within a six-month span, we have grown from just under 20 staff to more than 100 Canada-wide, and we project that we will exceed 200 by the fall of this year," says the owner of 3Sixty Secure.

Retail = revenue
For security service providers looking to enter the market, Hyde says he believes there are plenty of new opportunities. Today, there are 90 cultivation sites that are federally regulated, he says, and this will grow to 150 by mid-summer. Each of these sites will need security systems and guards.

Regulatory gaps
Part of doing your homework includes being aware of regulatory gaps that impact security, particularly transportation security. In fact, under the ACMPR, there are no regulations regarding the transportation of medical cannabis. As a result, the industry, particularly providers of secure transportation services, are setting their own security standards.

Holistic security
To capitalize on the cannabis market, not only is it important to be aware of regulatory gaps, but also of the strict physical security regulations under the ACMPR. The ACMPR focuses on barriers, doors, gates, ceilings and other aspects of the physical security of cannabis facilities. It is also focused on technological security and systems, including cameras, access control, intrusion, and more, explains Hyde. canadiansecuritymag.com

Security policies and legal marijuana
With legal recreational cannabis coming to Canada next year, security professionals may be faced with new questions. Experts and consultants provide an update on the current legal status and what we can expect in 2018. canadiansecuritymag.com

Read the full report here

More Canadian News

Free Webinar on July 26 - Tomorrow!
Active Threats: Are You prepared?
An integrated-rescue system for mass-casualty incident prep

Join Canadian Security, Blue Line and Fire Fighting in Canada on July 26 at 2 pm EST for an exclusive and free webinar on first responders preparing together for active threats.

The recent van attack in Toronto, the 2014 shooting of a reserve army corporal in Ottawa and the 2017 Quebec City mosque shooting are several examples of why efficient emergency response to crisis situations is top of mind. gotowebinar.com

Nominations for 2018 Security Director of the Year close July 27
The Security Director of the Year award, sponsored by Anixter Canada, is awarded each fall to a senior security director or manager working in an end user environment who has demonstrated leadership and achievement in the industry. The winner is chosen by Canadian Security magazine's Editorial Advisory Board from the nominations submitted. The judges consider a number of factors, including a major project or initiative completed in the last year, their contribution to the industry and their commitment to furthering the professionalism of the industry. Deadline for entries is July 27, 2018. surveymonkey.com

RCC Retail Secure 2018 - September 20

RCC Retail Secure is Retail Council of Canada's newly expanded loss prevention conference designed for retailers. This all-day event will explore three significant issues in the changing reality of retail: Fraud Protection, Data Security and Loss Prevention.

To provide depth on these issues, specialized educational sessions have been developed for attendees to customize their learning experience during the conference. Leading security, protection and prevention experts will present best practices and improvement strategies. This event will also feature a full range of exhibitors to provide expertise on the latest in asset protection programs, technology and investigation techniques.

Register for Retail Secure 2018 today

View the agenda




Critical Incident Management - Technology - Response

Pat McEvoy, Sr. Dir of AP Administration, Hudson's Bay Company
Bryan Granata
, Managing Dir of AP,
Saks Fifth Avenue



With lone wolf terrorist attacks happening more frequently in the greater NYC area and active shooter incidents increasing nationwide, the need for critical incident management programs, technology and hardware has never been more important.

Pat McEvoy, Sr. Director of Asset Protection Administration, Hudson's Bay Company and Bryan Granata, Managing Director of Asset Protection, Saks Fifth Avenue, tell us about the preventative measures their stores are taking from training drills and K9 dogs to gunshot detection systems.

Episode Sponsored By

Rex Gillette Shares How the
ADT/Protection 1 Merger is Going

Rex Gillette, Vice President of Retail Sales for ADT/Protection 1, tells us why a great employee culture with top notch customer service have helped Protection 1 and ADT set itself apart as a leading integrator in the retail security business.




Artificial Intelligence Is Being Used to Combat Luxury Fakes
Entrupy, Goat use AI to find counterfeit handbags and sneakers

In 2017, US Customs seized more than 34,000 shipments of counterfeit goods, an 8 percent increase from 2016. Retailers are scrambling to get ahead of the counterfeiters and have begun to explore how technology can help.

Artificial intelligence has increased the arsenal of tools at their disposal, but AI can be costly to implement. Still, the demand is growing, and a few companies have stopped relying solely on human expertise.

Goat and Entrupy are two very different companies that have developed anti-counterfeit algorithms based on immense databases of information on top luxury brands. They use these databases to look for the tiniest of inconsistencies, ensuring that customers get exactly what they pay for.

Goat is an online platform for luxury sneaker resellers. Luxury sneakers are surging ahead of luxury handbags in popularity, and the boom in counterfeits sneakers has followed. Goat resellers submit photos of their shoes for human experts to analyze before shipping the shoes to Goat for AI authentication.

According to Goat CTO Andy Shin, Goat has the "largest and most comprehensive database of sneakers in the world." He also reports that as time has gone on,
the number of fakes that Goat receives has drastically reduced, as its zero-tolerance reputation increases.

For Entrupy, a company that specializes in luxury handbag authentication, they rely on a higher authority, a
"convolutional neural network," which comprises a data set of microscopic images of luxury handbags. To create this database, they first collected bags they believed to be authentic, dating as far back as 80 years.

Once they had enough samples, their algorithm took over,
analyzing the tiny details that make up the DNA of the genuine articles. They posit that these details are too difficult for counterfeiters to reproduce. racked.com

Online shopping sites see hacking increase despite security efforts
It's estimated eight out of 10 Americans have shopped online, entering sensitive personal data. Credit card numbers, passwords and addresses, for example. And that's a gold mine for cyber-criminals that hack into online sites.

San Jose's Thales eSecurity's latest research says half -- 50 percent -- of all medium and large online retailers it surveyed acknowledge they've been hacked. That's two a half times higher than a year ago. Changes in payment systems are making security more challenging.

This year alone, hackers broke into the retail sites of Adidas, Saks Fifth Avenue, and Under Amour, according to the nonprofit group Privacy Rights Clearinghouse.

The servers of those and all other retailers store sensitive data. That is leading to increased spending to encrypt that data. Or to add two-factor authentication, where a retailer will send a text message with a code to verify it's you. A single breach can cost retailers hundreds of millions of dollars and can impact customer confidence. abc7news.com

Europol busts cyber crime group behind online fraud worth £16 million

EBay deals another blow to PayPal by accepting Apple Pay

Hy-Vee to add speedy online grocery deliveries



One Arrested in Atlanta Yesterday
Two Essex County, New Jersey, Men Charged With $600,000 Credit Card Fraud, Identity Theft Conspiracy

Two Essex County men, with two homes, one in East Orange, N.J., and one in Duluth, GA., were charged today for their alleged roles in a conspiracy that used stolen personal identifying information to open credit cards and defraud a victim bank out of approximately $600,000. One was arrested in Atlanta yesterday morning.

They obtained the stolen personal information from other conspirators and used it to create the fraudulent credit card accounts. Changing the address after establishing accounts to the two homes they then along with other conspirators used the cards at retail stores in New Jersey and Georgia, among other places, to purchase smartphones, tablets, and other high-value items, which were later sold for profit. Overall, the conspirators defrauded Victim Bank 1 of approximately $600,000.

The bank fraud conspiracy charge carries a maximum potential penalty of 30 years in prison and a $1 million fine. The aggravated identity theft charge carries a mandatory sentence of two years in prison, which must run consecutive to any other term imposed. The investigation is ongoing. justice.gov

Fresno, CA: Women who struck Lululemon may be linked to statewide crew
A team of women who ran out of a Lululemon store in Fresno's Fig Garden Village on Sunday with an estimated $10,000 in merchandise may be part of a statewide crew responsible for about $145,000 in thefts from the chain, police said Tuesday. Videos release by police show the trio calmly strolling into the store with large, black shopping bags, walking to shelves where the trendy attire is displayed and quickly loading up the sportswear before making a quick exit. They made off with an estimated 148 pairs of the pants with a retail value of $100 apiece. Lt. Joe Gomez said the crime fits the pattern of similar thefts at stores around the San Francisco Bay Area, including Stanford, Berkeley, Hillsdale and Gilroy. fresnobee.com

Costa Mesa, CA: Burglary crew hits Apple store for $29,000 in merchandise
Costa Mesa Police are searching for five people suspected of burglarizing an Apple store at South Coast Plaza.
Police say the suspects got away with $29,000 worth of merchandise- iPhones and iPads that were taken from displays at the store. Police were called to the mall about 9 p.m. Monday. foxla.com

Fresno, CA: Couple arrested as suspected cigarette and lotto ticket C-Store bandits
A couple has been arrested on suspicion of breaking into several convenience stores in north Fresno and stealing lottery tickets and cigarettes, police said Monday. Sierra Baize, 40, and boyfriend Keith Christenson, 30, were stopped by police Sunday night. Baize was behind the wheel of the car that had been identified in the burglaries, and both were arrested, Lt. Joe Gomez said. Evidence and burglary tools were allegedly found in the car. Christensen admitted to all six of the burglaries and Baize admitted to being the driver during three, Gomez said. fresnobee.com

Miami, FL: Professional Athletes and Coaches among ID thief's victims; Indicted on 22 charges
An identity thief didn't steal just anybody's IDs - he targeted big names such as former Miami Dolphins players Jason Taylor and Zach Thomas and former coach Joe Philbin, Florida officials say. Michael Watters used the fraudulent IDs to create bogus checks that he used to buy merchandise at places like Home Depot, Target and Best Buy, then would return the goods to the same store at another location for a cash refund. A 22-count indictment against Watters named other victims including baseball players Johnny Damon, Jonathan Papelbon and Barry Larkin, tennis player Jennifer Capriati and Orlando Magic player and coach Scott Skiles. sun-sentinel.com

Petaluma, CA: Two arrested in Target theft, refund/gift card scheme;
hit stores in Fairfield, Vallejo and Napa

Two Solano County men went on a burglary spree Monday at stores in multiple cities and ended up in the Sonoma County Jail after their arrest in Petaluma. At the Petaluma Target store just before 7 p.m. the two attempted to steal a few thousand dollars in merchandise, Petaluma Lt. Tim Lyons said Tuesday. They took small appliances, clothing and other items and hid them inside large tote bags, also on sale at the store and then tried to pay for the tote bags but not the concealed merchandise, Lyons said.

Rommel Natan, 36, and John Meurer, 40, were questioned by store security who called police. Officers searched their car and underneath the driver's seat found several drivers' licenses and credit cards for people in cities including Santa Rosa, Sacramento, Fremont and Redwood City. They also found receipts dated Monday and gift cards from stores in Fairfield, Vallejo and Napa indicating items had been returned to those stores and exchanged for gift cards. petaluma360.com

Harrison County, OH: Two men wanted for theft of $8,000 of merchandise from Pawn Shop

Wetumpka, AL: Police seek woman who stole $250 worth of underwear from Dollar General

Berkeley, CA: 13 Lululemon stores in Bay Area robbed in past 12 days

Submit your ORC Association News

Visit the ORC Resource Center


Shootings & Deaths

Johannesburg, South Africa: Shoprite Security Guard shot and killed during store robbery
A security guard was shot dead when a gang of 15 men robbed a Shoprite supermarket in Heidelberg, south of Johannesburg on Friday evening. A video shows the guard and one of the assailants embroiled in a scuffle at the entrance to Ratanda Mall. As they struggled, two more robbers entered the shop. Both men shot the security guard at close range, before more men entered the premises and robbed it. One armed suspect was later arrested. *Warning - graphic video news25.com

Toledo, OH: Police Officer who shot a Dollar General Robbery suspect 'acted within his rights'; Surveillance Video Released
Toledo Police release new information about the moments leading up to a robbery turned deadly in our community. Police released surveillance video showing the suspect inside the Dollar General on Heatherdowns. Detectives say the robber 56 year old Dale Slocum had a fake gun and a knife. The suspect killed 53-year-old Tommy Thacker then took off. A Toledo police officer confronted and ended up shooting and killing Slocum. 13abc.com

Farmersville, CA: Liquor store owner allegedly shoots two, himself inside store
A liquor store owner in Farmersville was arrested Tuesday, after allegedly shooting two people and himself inside the store, police say. When Farmersville officers arrived to Aztec Liquor at 686 E. Visalia Road just after 1 p.m., they found owner Harbhajan Singh Mundi, 61, had allegedly shot himself in the foot accidentally. They also found two other men. One was shot in the body and was in serious condition, and the other was also shot in his foot, police say. They were all treated for their injuries. Police say Mundi had been arguing with the property owner in an ongoing dispute when the shots were fired. The property owner and several other people went to the store to meet with Mundi, police say. fresnobee.com

Robberies, Incidents & Thefts

Nacogdoches, TX: Walmart Market Shoplifter assaulted Police Officer, attempted to take weapon
Monday evening, Latoya Mae Pickard, 35, was arrested on a second-degree felony assault of a public servant charge, a state-jail felony attempting to take a weapon from officer charge, and Class B misdemeanor theft. When an officer made contact with Pickard, she assaulted the officer and caused minor injuries to him or her, the report stated. During the struggle, Pickard also allegedly tried to take one of the NPD officer's weapons. ktre.com

Prince William County, VA: 7-Eleven Armed Robbery suspects wreck get-a-way car on I-95

Woodland, WA: Police and Cowlitz County Sheriff's deputies catch Shoplifting suspect with Drone and K9 unit

Fire & Arson

Minneapolis, MN: Marshalls still closed after suspected arson causes over $500,000 in damage
The Marshalls store in downtown Minneapolis' City Center building has been closed for more than a week following a reported arson that damaged hundreds of thousands of dollars worth of inventory. On July 15, a customer allegedly set fire to a display rack and caused over $500,000 in damage to store clothing, according to a Minneapolis Fire Department report. By time the fire department personnel arrived to the City Center store at the 600 Nicollet Mall block, the fire was out. There were no injuries reported. There have been no arrests, though police have both video evidence and suspect information, said Minneapolis Police Department Sgt. Darcy Horn. bizjournals.ocm


Adult Store - Houston, TX - Robbery
Boost Mobile - Miami, FL - Burglary
C-Store - Atoka, OK - Armed Robbery/Shooting - Clerk wounded
C-Store - Fresno, CA - Burglary
Cash Express - Owensboro, KY - Armed Robbery
Family Dollar - Clifton, NJ - Armed Robbery
Liquor Store - Lawrence, KS - Armed Robbery
Lululemon - Fresno, CA - Robbery
Pharmacy - Adamsville, AL - Robbery
Restaurant - Neptune Beach, FL - Armed Robbery
T-Mobile - Opelika, AL - Armed Robbery
Verizon - Memphis, TN - Armed Robbery
Wawa - Lexington Park, MD - Armed Robbery
Walgreens - Jefferson City, MO - Armed Robbery
Walgreens - Dayton, OH - Robbery
Walmart - Nacogdoches, TX - Robbery/ Assault on Police Officer
Walmart - Monroe, NJ - Robbery
7-Eleven - Henrico County, VA - Armed Robbery
7- Eleven - Cape Coral, Fl - Armed Robbery
7-Eleven - Lowell, MA - Armed Robbery


Daily Totals:
18 robberies
2 burglaries
1 shooting
0 killings








None to report.

Submit Your New Hires/Promotions or New Position




Featured Job Spotlights


Vice President, Asset Protection
Columbus, OH

Oversees and directs all Asset Protection related functions for a Corporate Office, multi-state distribution centers and large retail store network. Responsible for enterprise direction and strategy as it pertains to Asset Protection with a goal of minimizing shrink, reducing loss and maximizing security and associate safety...

Vice President Loss Prevention
Memphis, TN

The Vice President Loss Prevention is responsible for providing direction, development and leadership to Loss Prevention, Safety, Security and Audit teams for corporate, distribution centers and the field...

Director of North America Digital Risk & Control
Beaverton, OR

As the Director of North America Digital Risk & Control, you will provide leadership for payment risk mitigation in our digital business including fraud risk management. You will be responsible for ensuring our resources and capabilities are properly aligned to the execution of key priorities, as you develop and implement ecommerce risk management strategies to appropriate tolerance levels based on advanced data analytics and trends...

Director of Data Privacy and Security, Legal
Los Angeles, California

As Netflix continues to grow and expand, we are looking for a talented team member to join the Data Privacy and Security Legal team to provide support on privacy and data security compliance matters. The position will report to the Global Director of Data Privacy and Security, and will work in an ongoing and collaborative way with relevant Legal, Security and Public Policy groups in carrying out her or his responsibilities...

Director, Risk Management and Safety
Los Angeles, CA

To protect the company's global assets and property from risk of loss via the purchase of insurance and by implementing a global risk management program in the most cost efficient and effective manner...

Financial Analyst (Internal Fraud)
Anaheim, CA

This role is responsible for investigating internal fraud and Cast Privilege abuse at the Disneyland Resort, across all lines of business including but not limited to: merchandise, food & beverage, rooms, ticketing, and employee privileges. Specific investigative tasks will vary but may include: reviewing exception reporting to identify potential fraud trends, conducting in-depth point-of-sale research, reviewing camera surveillance, performing integrity shops and observations, interviewing employees, representing the Company at grievances and unemployment hearings, and partnering with law enforcement as needed...


Regional Loss Prevention Manager
Pacific Northwest
Job responsibilities include, but are not limited to the following:
● Conducts internal investigations related to theft, business abuse, and safety violations by conducting interviews, determining course of action, and writing reports.
● Formal interview training, i.e. Wicklander-Zulawski or Reid Techniques...

Regional Safety & Loss Prevention Specialist
Baltimore, MD

The Safety and Loss Prevention Specialist is a subject matter expert responsible for partnering with both our corporate TUSA stores and franchise store operations to improve the safety and training processes...

Area Loss Prevention Specialist
We are currently looking for an Area Loss Prevention Specialist to join our team in the Boston / Springfield area. This position is responsible for conducting employee investigations, responding to and providing guidance during critical incidents, and assessing new/current retail store locations...

Area Loss Prevention Specialist
Jacksonville, FL
We are currently looking for an Area Loss Prevention Specialist to join our team in Jacksonville, FL. This position is responsible for conducting employee investigations, responding to and providing guidance during critical incidents, and assessing new retail store locations...

Area Loss Prevention Specialist
San Francisco Bay Area
We are currently looking for an Area Loss Prevention Specialist to join our team in San Francisco Bay Area. This position is responsible for conducting employee investigations, responding to and providing guidance during critical incidents, and assessing new/current retail store locations...

Featured Jobs

To apply to any of today's Featured Jobs, Click Here




Today's Daily Job Postings from all around the net - Appearing today only

To apply to today's Internet Jobs, Click Here

Sponsor Today's Internet Jobs 



Become a Better Leader: Secrets from Santa Claus,
5 Leadership Principles, Master Multiple Leadership Styles

10 Timeless Leadership Gifts from
Santa Claus

It's only July, but we've already begun the countdown to Christmas. It's only 5 more months until the special day, but managers everywhere can learn a thing or two now from Santa and his extraordinary leadership skills. Find hidden talent

How This 5-Word Philosophy Can Transform Your Leadership Ability
There's one statement that all leaders can use to develop their leadership initiatives and improve company culture. It's the perfect way to summarize what all leaders should do and how they should be. "Ya' gotta wanna do it"

How to Master the 4 Types of Leadership that Will Make You Successful
When you're in a leadership position, you don't want to be a one-trick pony. It's best and more effective to have multiple leadership approaches at your disposal. Here are four types of leadership styles you'll want to make sure you master. Empowering

The Most Effective Leaders 'Show Up' With These 4 Things Every Day
Every leader, or aspiring leader, wants to be effective and provide value. The best ways to be a memorable leader, one who learns from actions and the actions of others, is to show up with these four things every single day. Open ears




When giving references it is best not to comment on someone if you haven't worked directly with them. Passing on third party information can be extremely detrimental to the employer and the job seeker. If an employer is going to the extent of conducting references and is considering making an investment in an executive than the process warrants direct information that can help both the employer and the job seeker in reaching their decisions. And as most know third party information is extremely unreliable and can cause both parties to make mistakes.

Just a Thought,
Gus Downing


We want to post your tips or advice... Click here


Not getting the Daily? Is it ending up in your spam folder?
Please make sure to add d-ddaily@downing-downing.com to your contact list, address book, trusted sender list, and/or company whitelist to ensure you receive our newsletter. 
Want to know how? Read Here

FEEDBACK    /    www.downing-downing.com    /    Advertise with The D&D Daily