skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 168757 Find in a Library
Title: Investigating High-Tech Robbery and Theft
Journal: Police Chief  Volume:63  Issue:7  Dated:July 1996  Pages:33-35
Author(s): K R Yarbrough; T Meyer; K Flusche; J H Hammond
Date Published: 1996
Page Count: 3
Format: Article
Language: English
Country: United States of America
Annotation: Police agencies in jurisdictions with computer businesses need both proactive and reactive strategies to deal with computer theft and robbery and must work effectively with corporate security personnel as well.
Abstract: Issues to address include physical security, gathering intelligence across State and Federal boundaries, early detection of incidents, and documentation of incidents. A methodical approach was used to fix security at a facility where a major robbery occurred. A team consisting of an independent security consultant, insurance investigators, security specialist, and the local crime watch representative helped develop an effective plan for this facility. Dock theft and transportation theft of high-technology equipment are further forms of theft. The use of an undercover operative and its coordination with surveillance equipment are probably the best solution for a dock theft problem. Factors that hinder efforts to improve dock security include a company's decision to handle corrupt employees without prosecution, a lack of centralized company security, and companies' concerns about employee lawsuits.
Main Term(s): Computer related crime
Index Term(s): Business security; Crime prevention planning; Police policies and procedures; Police-private police cooperation
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.