A beautifully simple Crime prevention intelligence initiative Simon Gardner: BSIA SaferGems.

Slides:



Advertisements
Similar presentations
Rev. 2/05. For Use in Law Enforcement Training Only This training program was developed by the New Jersey Division of Criminal Justice This training program.
Advertisements

Secure Your Store Understand the measures used in securing a retail store.
Protecting our communities together West Forum Date: 13 th February 2014.
Protecting society and helping keep people safe RESTRICTEDSlide 1RESTRICTED Thefts.
PAPER PRESENTATION BY V.Priyanka CSE-A Roll no. 13K41A0548.
A Practical and Easy Guide to Preventing Loss Retailers Association of MA Loss Prevention Committee.
Tim Moss Director of Corporate Strategy Presentation  Overview of Companies House  Fraud facts and Figures  Current Work  Prevention  Future Actions.
Copper Theft Update Mayor and Council May 22, 2012.
Store Security. STORE SECURITY Customer Service Acknowledge all customers Make eye contact. A possible robber will think twice if he thinks that he can.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Express Stores Reducing Shoplifting. The Problem What can Express #892 do to reduce shoplifting?
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
Lecturer: Miljen Matijašević Session 8, 7 May 2014.
Unit 3 Option 2 Stop and Search & Search of Premises
Presented By The Plano Police Department Crime Prevention Unit.
Acorn.gov.au The ACORN REPORT. PROTECT. PREVENT. acorn.gov.au What is cybercrime? REPORT. PROTECT. PREVENT In Australia, the term 'cybercrime' is used.
Chapter 4 Billing Schemes.
Lecturer: Miljen Matijašević G10, room 6, Tue 15:30-16:30 Session 9, 16 Dec 2014.
UK Fraud Perspective The National Fraud Intelligence Bureau (NFIB) Wendy Aldridge Intelligence Analyst National Fraud Intelligence Bureau
Topic 9 Police powers test Topic 9 Police powers test.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Alachua County GUN BOUNTY PROJECT Presented by: Sheriff Sadie Darnell.
Electronic Payment. Amounts transferred through accounts Money transfer instructions Bank’s computer system Other banks / Businesses.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Campus Safety The Sullivan University System There were no hate crimes reported that fit any reportable crime bias categories. In accordance with the Crime.
Lesson 7.3 PROTECT YOUR BUSINESS
CLICKCEOP : MSN Messenger Live CLICKCEOP : Bebo.
Snohomish County Sheriff’s Office Special Investigations Unit n 98% of our investigations involve crimes where the victim has been assaulted by someone.
The Risks of Identity Theft IDENTITY THEFT VICTIMS COULD: Have any and all of their financial accounts invaded and emptied Be asked to repay debts they.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
Powers to stop and Search of Premises POLICE POWERS STOP & SEARCH and SEARCH OF PREMISES.
2006 SISO Executive Conference Legal Issues in Using Mailing Lists: The CAN-SPAM ACT The Junk Fax Prevention Act The National Do Not Call Registry.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Learn how you can provide effective assistance to identity theft victims in your community.
Pre-Trial Procedures Search and Seizure.  The law seeks to balance individual’s right to privacy and need for police to conduct a thorough investigation.
Identifying Risk to Children. Police officers need to have a full understanding of identifying, assessing and investigating child abuse incidents and.
Security Management Providing a Secure Environment.
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
“Scenario One & Two” STRs working Committee DAB, Training Center
Public affairs and the media Part 2: Crime, law enforcement, courts, obituaries.
3.2 – Police Powers – Searching Suspects and property 1 answers/police-powers-and-your-rights/getting- searched.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
THEFT BURGLARY THEFT VIOLENT CRIME THEFT CAR THEFT THEFT BURGLARY THEFT.
Chapter 5 (cont’d) 5.4 – Legal Rights and Search Laws.
Arrest and Detention. Police must follow procedures codified in the Criminal Code Police must follow procedures codified in the Criminal Code If they.
Observed 6 times totalObserved 6 times total Came up with 8 questions to ask each store/security desk 1.How often during the day does the store stop.
WELCOME Shipston Police Safer Neighbourhood Team Contact Number: Beat Manager: PC1681 Craig Purcell PCSO6218 Andy STEVENTON PCSO6230 Emma.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
DATA PROTECTION AND RUNNING A COMPLIANT PUB WATCH SCHEME Nigel Connor Head of Legal –JD Wetherspoon PLC.
What laws should the police focus on?. A case in the news... Find out why Christopher Halliwell nearly got away with murder. 'Don't ask me why because.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
Powers to stop and Search of Premises POLICE POWERS STOP & SEARCH and SEARCH OF PREMISES.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
IRS Resources for Payroll Professionals & IRS Combats ID Theft with the Help of Payroll Professionals June 16, 2016 Nora Huffman.
Training for Employees
M I S S I O N S T A T E M E N T THE PRIMARY MISSION OF THE SIUE POLICE DEPARTMENT IS TO PROVIDE FOR THE SAFETY AND SECURITY OF ALL MEMBERS OF THE SIUE.
Retail Security & Loss Prevention
Tax Identity Theft Presenter Date
Identifying Risk to Children
Red Flags Rule An Introduction County College of Morris
Do you know what you own? -Intro -
Unit 101 Element 4 Maintain a Secure environment for customers, staff and visitors. Maintaining effective security should be the concern of everyone working.
The 'Be Safe’ Mobile Phone Theft Toolkit
Pre-Trial Procedures Search and Seizure.
Review Questions Ch. 3.
Search laws CLU3ME: Unit #3 - Day Five.
Authority of the Police
Police Powers.
Presentation transcript:

A beautifully simple Crime prevention intelligence initiative Simon Gardner: BSIA SaferGems

Implemented in July 2009 following an increase in crime against the jewellery industry Funded by the Jewellery industry through National Association of Goldsmiths and TH March and the BJA Hosted by the BSIA The Background

Record details of crimes against the Jewellery Industry Record details of suspicious activity Link between the Industry and Police Circulate images Circulate new crime trends Circulate details of stolen property Circulate details of seized property Assist Police in linking offences and offenders. The Initiative

9000 jewellers signed up to Safergems Since 2009 to date over 3000 Crimes and suspicious incidents recorded Over 1000 alerts to the Industry 350 alerts and analytical reports to Police Assisted Police with over 70 arrests and convictions 400 reports from members of crime prevented

This year alone: In excess of £1 million stolen by theft Approximately £5 million by robbery/smash and grab raid Almost £2 million by Burglary £1 million by Fraud and Deception All of these crimes have an impact on staff and customers.

Alerts

Current Trends Stolen Watches Scooter Smash and Grab Raids Fraud

HOW TO IDENTIFY SUSPICIOUS CUSTOMERS 1. Is the customer talking on a phone? Inform the person that you will be happy to serve them as soon as they finish their call. 2. Is the customer wearing sunglasses? Suggest that the customer remove the sunglasses to get a better view of the merchandise. 3. Is the person wearing clothing intended to conceal his or her identity? 4. Are large numbers of people entering together? 5. Will you be able to adequately protect your merchandise with a large number of people inside your store? 6. Is the person placing items in the store in order to block your view? 7. Is the person looking with unusual interest at your cameras or security equipment? 8. Is the person asking to see the “most expensive” watch or jewellery item in the store? 9. Is the person making hand signals or other gestures that appear to be communicating with other people?

WHAT TO DO WHEN SUSPICIOUS SIGNS APPEAR? Look at and greet the person who enters your store. Use a pre-established code word to put all staff members on high alert. Have an employee pick up the store phone in an obvious manner, dial someone and talk. Have more than one person wait on the suspicious person or persons. Keep the display cases locked and show only one item at a time. Call the police if you feel there is a criminal risk.

Good News Stories PERSISTENT FRAUDSTER ARRESTED ROBERT MADEJSKI

Testimonials DS Rob Bryant of Surrey Police stated: “It has come to my notice that if it had not been for the involvement and advice from Safer Gems to the jeweller in Guildford, then this suspicious incident would not have come to the notice of the Police and I am convinced that offences would have been committed. Due to the involvement of Safer Gems, Robert MADEJSKI was arrested in the process of purchasing a house in Surrey probably via fraudulent means and he was in possession of a stolen Bentley”. DC Andy Lawrence of Sussex Police also stated: “I visited a jewellers on Friday 17 th January 2013 for a Fraud I was investigating and saw you’re Alert in regards to Madejski and the Bentley visiting a jewellers in Guildford. Well I have been chasing these two for another series of frauds linked to another Bentley, and would like to notify you your information helped me a great deal as they are currently held in custody”.

Good News Stories HIGH VALUE JEWELLERY THIEF JAILED DAVID SYDNEY STEPHENSON

BeverleyBeestonLincoln ChichesterBicesterBlackpool

INTERNATIONAL JEWELLERY THIEF Good News Stories STUGGART 1990 MIAMI 2010 Dusseldorf 2013

Future developments Increase membership Developing even closer links with law enforcement to further enhance police responses to jewellery crime Development of a Watch Register

Background Database Registration Lost/Stolen Reports Search Facilities

Questions?