Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Outsiders, Insiders and Theft

By Bill Zalud
August 22, 2002
With the disappointing headlines from Enron and WorldCom and others, the bottom line for security directors and managers is that insiders can do as much damage, if not more, as compared with outsiders.

There’s obvious proof at retail establishments where losses—called shrinkage—falls into only a few categories ranging from shoplifters and employee theft to vendor theft and simple inventory confusion.

For example, just 30 U.S. retail companies lost over $5 billion to shoplifting and employee theft last year. And there was only 3.45 percent of those losses recovered, according to the fourteenth annual retail theft survey conducted by Jack L. Hayes International, a shrinkage control consulting firm in Fruitland Park, Fla. Says Jack Hayes, this means that for every one dollar recovered, another $27.95 is lost to retail theft.

“The losses continue to amaze us,” adds Mark R. Doyle of Hayes International, “While both the number of dishonest employees apprehended and the dollars recovered from those employee apprehensions finally leveled off after seven consecutive years of increases, our survey participants reported sizable increases in the number of shoplifters apprehended and the dollar recoveries from shoplifting.”

Employee Action

Historic studies show that, while there are more shoplifting incidents, the per incident loss is relatively small compared with the per incident losses from theft of employees and executives at retail establishments.

Hayes says, “Shoplifting and employee theft continue to be costly crimes which negatively impact the bottom line profits of many retailers. The result of these crimes is higher prices for consumers at the cash register, and a loss of jobs for employees when retailers are forced to close stores or even go out of business.”

The survey reports on over 700,000 apprehensions that took place in 30 of the largest retail companies representing 12,833 stores with combined annual sales in excess of $419 billion. Some of the major results from this survey are:

The Numbers Don’t Lie

Total dollar recoveries from both shoplifters and dishonest employees last year exceeded $182 million, an increase of 9.44 percent over 2000.

Survey participants apprehended 622,222 shoplifters, reflecting a 5.19 percent increase over pervious year shoplifter apprehensions (591,545).

Dollars recovered from shoplifting apprehensions totaled $70,954,254 last year, which is an increase of 9.32 percent over previous year recoveries ($64,905,425).

For the fifth consecutive year, the dollars recovered from shoplifters where no apprehension was made increased substantially over the prior year ($41,275,172 vs. $30,315,706, up 36.15 percent), after increasing 27.96 percent in 2000 and 23.45 percent in 1999.

Dishonest employee apprehensions (77,805 last year vs. 78,468 the previous year) and the dollars recovered from those apprehended employees ($70,221,185 vs. $71,494,974) decreased ever so slightly last year, after increasing the prior seven consecutive years.

On a per-company basis, one in every 27 employees was apprehended for theft from their employer.

On a per-person basis, dishonest employees steal approximately 7.9 times the amount stolen by shoplifters ($902.53 vs. $114.03).

Relying on Technology

William J. Reilly of Checkpoint Systems, Inc., Thorofare, N.J., is happy with the “positive apprehension results and the increase in dollar value of the recovered merchandise. However, internal and external shrink numbers still remain too high. A robust loss prevention program and the installation of sophisticated anti-theft technology by retailers can help drive the number of apprehensions to new highs.”

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Half closed laptop

Sudo Vulnerability Discovered, May Exposes Linux Systems

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Vandalism and Theft on Rise: Insiders and Copper Thieves Get More Brazen

    See More
  • Blog Logo

    Insiders Hack Casino Cameras; $33 Million Scammed

    See More
  • Aberdeen-Code42study

    Data breaches from insiders can cost as much as 20% of annual revenue

    See More

Related Products

See More Products
  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

  • effective.jpg

    Effective Physical Security, 5th Edition

  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing