Feeds

War against shoplifters goes hi-tech

Birmingham system predicts crime

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

A Birmingham- based crime reduction scheme has developed technology to help retailers to stay one step ahead of shoplifters in the fight against retail crime.

Birmingham’s Retail Crime Operation (RCO) has gone live with a new database system that can predict patterns of criminal behaviour based on past experiences.

Chris James, MD of Birmingham’s Retail Crime Operation (RCO), said the scheme has used database systems since its inception in 1999 but the new system is far more advanced.

"The new system has a predictive element. We can look at patterns of data and analyse it in far greater details," he told El Reg. "By getting a clearer picture of what's likely to happen stores can be more pro-active rather than relying on chance to catch shoplifters."

The database system, dubbed Active Crime Intelligence System (ACIS), is based on Microsoft Access. It was developed in-house by Birmingham’s Retail Crime Operation (RCO) over the last 10 months. "There was nothing on the market that gave us what we wanted," said James.

James, a former police officer, said the system enabled it to warn member stores of who to look out for before crooks strike. This information could be used to prevent well know offenders from entering stores. Stores are emailed daily reports in the form of encrypted Word documents. These 'intelligence reports' contain photographs of suspects.

The system contains details of the criminal behaviour of more than 7,800 offenders. The system can help prevent stock loss, costs from which are ultimately paid by honest customers.

Active Crime Intelligence System has proved its worth in two months of operation. James reckons crooks are unlikely to change their offending behaviour in response to the technology.

"People are creatures of habit," he said. ®

Remote control for virtualized desktops

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.