Electronic article surveillance

Last updated

Electronic article surveillance (EAS) is a type of system used to prevent shoplifting [1] from retail stores, pilferage of books from libraries, or unwanted removal of properties from office buildings. EAS systems typically consist of two components: EAS antennas and EAS tags or labels. EAS tags are attached to merchandise; these tags can only be removed or deactivated by employees when the item is properly purchased or checked out. If merchandise bearing an active tag passes by an antenna installed at an entrance/exit, an alarm sounds alerting staff that unauthorized merchandise is leaving the store. Some stores also have antennas at entrances to restrooms to deter shoppers from taking unpaid-for merchandise into the restroom where they could remove the tags.

Contents

History

EAS tags that could be attached to items in stores were invented by Arthur Minasy in 1964. He filed a patent for his "Method and Apparatus for Detecting the Unauthorized Movement of Articles" in 1965 with the patent being granted in 1970. [2]

Arthur Minasy's original patent for Electronic Article Surveillance Arthur Minasy's Patent for METHOD AND APPARATUS FOR DETECTING THE UNAUTHORIZED MOVEMENT OF ARTICLES.pdf
Arthur Minasy's original patent for Electronic Article Surveillance

Types

There are several major types of electronic article surveillance systems:

Concealed EAS systems

CallidusConcealedSolution CallidusConcealedSolution.jpg
CallidusConcealedSolution

These new types of systems have caught on lately as there are no visible pedestals or hindrance in the store facade. These systems are installed below the floor and dropped from the ceiling and can then protect merchandise of retailers from being stolen. There are site conditions and other parameters which enable them to be successfully installed but often it has now been noted that malls insist on concealed system as a mandate to improve the shopping experience.

Electro-magnetic systems

EM labels are available in different sizes and colors. Ws magnetischrp.jpg
EM labels are available in different sizes and colors.

These tags are made of a strip of amorphous metal (metglas) which has a very low magnetic saturation value. Except for permanent tags, this strip is also lined with a strip of ferromagnetic material with a moderate coercive field (magnetic "hardness"). Detection is achieved by sensing harmonics and sum or difference signals generated by the non-linear magnetic response of the material under a mixture of low-frequency (in the 10 Hz to 1000 Hz range) magnetic fields.

When the ferromagnetic material is magnetized, it biases the amorphous metal strip into saturation, where it no longer produces harmonics. Deactivation of these tags is therefore done with magnetization. Activation requires demagnetization.

The EM systems are suitable for libraries to protect books and media. In the retail segment, unlike AM and RF, EM can protect small or round items and products with foil packaging or metal objects, like cosmetics, baby milk cans, medicines, DIY tools, homeware etc. EM systems can also detect objects placed in foil bags or in metal briefcases.

A further application is the Intellectual property (IP) protection against theft: Security paper with embedded microwires, which is used to detect confidential documents if they are removed from a building.

Acousto-magnetic systems

A cutaway image of an acousto-magnetic tag. Acousto-magnetic-tag-cutaway.jpg
A cutaway image of an acousto-magnetic tag.

These are similar to magnetic tags in that they are made of two strips: a strip of magnetostrictive, ferromagnetic amorphous metal and a strip of a magnetically semi-hard metallic strip, which is used as a biasing magnet (to increase signal strength) and to allow deactivation. These strips are not bound together but free to oscillate mechanically. [3] [4]

Amorphous metals are used in such systems due to their good magnetoelastic coupling, which implies that they can efficiently convert magnetic energy into mechanical vibrations.

The detectors for such tags emit periodic tonal bursts at about 58 kHz, the same as the resonance frequency of the amorphous strips. [5] This causes the strip to vibrate longitudinally by magnetostriction, and it continues to oscillate after the burst is over. The vibration causes a change in magnetization in the amorphous strip, which induces an AC voltage in the receiver antenna. If this signal meets the required parameters (correct frequency, repetition, etc.), the alarm is activated.

When the semi-hard magnet is magnetized, the tag is activated. The magnetized strip makes the amorphous strip respond much more strongly to the detectors, because the DC magnetic field given off by the strip offsets the magnetic anisotropy within the amorphous metal. The tag can also be deactivated by demagnetizing the strip, making the response small enough so that it will not be detected by the detectors.

AM tags are three dimensional plastic tags, much thicker than electro-magnetic strips and are thus seldom used for books.

Radio frequency (RF) systems

RF label Ws rfrp.jpg
RF label
Green glass bottle with RFID chip Lagavulin distillery-3192.jpg
Green glass bottle with RFID chip Lagavulin distillery-3170.jpg
RF tag placed under the label of a liquor bottle
Series 304 RF EAS label 304 RF EAS Label.jpg
Series 304 RF EAS label

These tags are essentially an LC tank circuit (L for inductor, C for capacitor) that has a resonance peak anywhere from 1.75 MHz to 9.5 MHz. The standard frequency for retail use is 8.2 MHz. Sensing is achieved by sweeping around the resonant frequency and detecting the dip.

Deactivation for 8.2 MHz label tags is typically achieved using a deactivation pad. In the absence of such a device, labels can be rendered inactive by punching a hole, or by covering the circuit with a metallic label, a "detuner". The deactivation pad functions by partially destroying the capacitor. Though this sounds violent, in reality, both the process and the result are unnoticeable to the naked eye. The deactivator causes a micro short circuit in the label. This is done by submitting the tag to a strong electromagnetic field at the resonant frequency, which induces voltages exceeding the capacitor's breakdown voltage.

In terms of deactivation, radio frequency is the most efficient of the three technologies (RF, EM, AM – there are no microwave labels) given that the reliable "remote" deactivation distance can be up to 30 cm (11.8 in). It also benefits the user in terms of running costs, since the RF de-activator only activates to send a pulse when a circuit is present. Both EM and AM deactivation units are on all the time and consume considerably more electricity. The reliability of "remote" deactivation (i.e. non-contact or non-proximity deactivation) capability makes for a fast and efficient throughput at the checkout.

Efficiency is an important factor when choosing an overall EAS solution given that time lost attempting to deactivate labels can be an important drag of cashier productivity as well as customer satisfaction if unwanted alarms are caused by tags that have not been effectively deactivated at the point of sale.

Deactivation of RF labels is also dependent on the size of the label and the power of the deactivation pad (the larger the label, the greater the field it generates for deactivation to take place. For this reason very small labels can cause issues for consistent deactivation). It is common to find RF deactivation built into barcode flat and vertical scanners at the POS in food retail especially in Europe and Asia where RF EAS technology has been the standard for nearly a decade. In apparel retail deactivation usually takes the form of flat pads of approx. 30x30 cm.

Microwave systems

These permanent tags are made of a non-linear element (a diode) coupled to one microwave and one electrostatic antenna. At the exit, one antenna emits a low-frequency (about 100 kHz) field, and another one emits a microwave field. The tag acts as a mixer re-emitting a combination of signals from both fields. This modulated signal triggers the alarm. These tags are permanent and somewhat costly. They are mostly used in clothing stores and have practically been withdrawn from use.

Source tagging

Source tagging is the application of EAS security tags at the source, the supplier or manufacturer, instead of at the retail side of the chain. [6] For the retailer, source tagging eliminates the labor expense needed to apply the EAS tags themselves, and reduces the time between receipt of merchandise and when the merchandise is ready for sale. For the supplier, the main benefit is the preservation of the retail packaging aesthetics by easing the application of security tags within product packaging. Source tagging allows the EAS tags to be concealed and more difficult to remove.

The high-speed application of EAS labels, suited for commercial packaging processes, was perfected via modifications to standard pressure-sensitive label applicators. Today, consumer goods are source tagged at high speeds with the EAS labels incorporated into the packaging or the product itself.

The most common source tags are AM strips and 8.2 MHz radio frequency labels. Most manufacturers use both when source tagging in the USA. In Europe there is little demand for AM tagging given that the Food and Department Store environments are dominated by RF technology.

Tag pollution

One significant problem from source tagging is something called "tag pollution" caused when non-deactivated tags carried around by customers cause unwanted alarms, decreasing the effectiveness and integrity of the EAS system. [7] [8] The problem is that no store has more than one system. Therefore, if a store actually has an anti-shoplifting system to deactivate a label they will only deactivate the one that is part of their system. If a store does not use an EAS system, they will not deactivate any tags at all. This is often the reason why people trigger an alarm entering a store, which can cause great frustration for both customers and staff.

Discussion

Occasional versus professional shoplifters

EAS systems can provide a solid deterrent against casual theft. The occasional shoplifter, not being familiar with these systems and their mode of operation, will either get caught by them, or preferably, will be dissuaded from attempting any theft in the first place.

Informed shoplifters are conscious of how tags can be removed or deactivated. A common method of defeating RF tags is the use of so-called booster bags. These are typically large paper bags that have been lined with multiple layers of aluminium foil to effectively shield the RF label from detection, much like a Faraday cage. A similar situation would be the loss of signal that a cell phone suffers inside an elevator: The electro-magnetic, or radio waves are effectively blocked, reducing the ability to send or receive information.

However, they may miss some tags or be unable to remove or deactivate all of them, especially if concealed or integrated tags are used. As a service to retailers, many manufacturers integrate security tags in the packaging of their products, or even inside the product itself, though this is rare and not especially desirable either for the retailer or the manufacturer. The practical totality of EAS labels are discarded with the product packaging. This is of particular application in everyday items that consumers might carry on their person to avoid the inconvenience of potentially live reactivated EAS tags when walking in and out of retail stores.

Hard tags, typically used for clothing or ink tags, known as benefit denial tags, may reduce the rate of tag manipulation. Also, shoplifters deactivating or detaching tags may be spotted by the shop staff.

Shoplifting tools are illegal in many jurisdictions, and can, in any case, serve as evidence against the perpetrators. Hence, informed shoplifters, although they decrease their risk of being caught by the EAS, expose themselves to much greater judicial risks if they get caught with tools, booster bags, or while trying to remove tags, as this shows intent to steal.

The possession of shoplifting tools (e.g. lined bags or wire cutters to cut bottle tags) can lead to the suspect being arrested for suspicion of theft or "Going equipped for stealing, etc." within the UK judicial system. [9]

In summary, while even the least expensive EAS systems will catch most occasional shoplifters, a broader range of measures are still required for an effective response that can protect profits without impeding sales.

Tags containing alarms

Tags can be equipped with a built-in alarm which sounds when the tag detects tampering or unauthorized removal from the store. The tag not only triggers the store's electronic article surveillance system, [10] but also sounds an alarm attached to the merchandise. The local alarm continues to sound for several minutes after leaving the store, attracting attention to the shopper carrying the merchandise. [11]

Installation costs

A single EAS detector, suitable for a small shop, is accessible to all retail stores, and should form a part of any coherent loss or profit protection system.

Disposable tags cost a matter of cents and may have been embedded during manufacture. More sophisticated systems are available, which are more difficult to circumvent. These solutions tend to be product category specific as in the case of high value added electronics and consumables; consequently they are more expensive. Examples are "Safers", transparent secure boxes that completely enclose the article to be protected, Spiders that wrap around packaging and Electronic Merchandise Security Systems that allow phones and tablets to be used securely in the store before purchase. All of these require specific detachers or electronic keys at the point-of-sale desk. They have the advantages of being reusable, strong visual deterrents to potential theft.

Tag orientation

Except for microwave, the detection rate for all these tags depends on their orientation relative to the detection loops. For a pair of planar loops forming a Helmholtz coil, magnetic field lines will be approximately parallel in their center. Orienting the tag so that no magnetic flux from the coils crosses them will prevent detection, as the tag won't be coupled to the coils. This shortcoming, documented in the first EAS patents, can be solved by using multiple coils or by placing them in another arrangement such as a figure-of-eight. Sensitivity will still be orientation-dependent but detection will be possible at all orientations.

Detaching

A detacher is used to remove re-usable hard tags. The type of detacher used will depend on the type of tag. There are a variety of detachers available, with the majority using powerful magnets. Any store that uses an anti-shoplifting system and has a detacher should take care to keep it secured such that it cannot be removed. Some detachers actually have security tags inside them, to alert store personnel of them being removed from (or being brought into) the store. With increasing prevalence, stores have metal detectors at the entrance that can warn against the presence of booster bags or detachers.

Electro-magnetic activation and deactivation

Deactivation of magnetic tags is achieved by straightforward magnetization using a strong magnet. Magneto-acoustic tags require demagnetization. However, sticking a powerful magnet on them will bias disposable magnetic tags and prevent resonance in magneto-acoustic tags. Similarly, sticking a piece of metal, such as a large coin on a disposable radio-frequency tag will shield it. Non-disposable tags require stronger magnets or pieces of metal to disable or shield since the strips are inside the casing and thus further away.[ citation needed ]

Shielding

Most systems can be circumvented by placing the tagged goods in a bag lined with aluminum foil. The booster bag will act as a Faraday cage, shielding the tags from the antennas. Although some vendors claim that their acousto-magnetic systems cannot be defeated by bags shielded with aluminum foil, [12] a sufficient amount of shielding (in the order of 30 layers of standard 20 μm foil) will defeat all standard systems. [13]

Although the amount of shielding required depends on the system, its sensitivity, and the distance and orientation of the tags relative to its antennas, total enclosure of tags is not strictly necessary. Indeed, some shoplifters use clothes lined with aluminum foil. Low-frequency magnetic systems will require more shielding than radio-frequency systems due to their use of near-field magnetic coupling. Magnetic shielding, with steel or mu-metal, would be more effective, but also cumbersome and expensive.

The shielding technique is well known amongst shoplifters and store owners. Some countries have specific laws against it. [9] [14] In any case, possession of such a bag demonstrates a prior-intent to commit a crime, which in many jurisdictions raises shoplifting from misdemeanor to felony status, because they are considered a "burglary tool." [15]

To deter the use of booster bags, some stores have add-on metal detector systems which sense metallic surfaces.

Jamming

Like most systems that rely on transmission of electromagnetic signals through a hostile medium, EAS sensors can be rendered inoperative by jamming. As the signals from tags are very low-power (their cross-section is small, and the exits are wide), jamming requires little power. Evidently, shoplifters will not feel the need to follow radio transmission regulations; hence crude, easy-to-build transmitters will be adequate for them. However, due to their high frequency of operation, building a jammer can be difficult for microwave circuits; these systems are therefore less likely to be jammed. Although jamming is easy to perform, it is also easy to detect. A simple firmware upgrade should be adequate for modern DSP-based EAS systems to detect jamming. Nevertheless, the vast majority of EAS systems do not currently detect it.

Interference and health issues

All electronic article surveillance systems emit electromagnetic energy and thus can interfere with electronics.

Magneto-harmonic systems need to bring the tags to magnetic saturation and thus create magnetic fields strong enough to be felt through a small magnet. They routinely interfere with CRT displays. Demagnetization-remagnetization units also create intense fields.

Acousto-magnetic systems use less power but their signals are pulsed in the 100 Hz range.

Radio-frequency systems tend to be the least interfering because of their lower power and operating frequency in the MHz range, making it easy to shield against them.

A March 2007 study by the Mayo Clinic in Rochester, Minnesota, reported instances where acousto-magnetic EAS systems located at the front of retail stores caused a pacemaker to fail and a defibrillator to trigger, shocking the persons in which they were implanted. [16]

There are also concerns that some installations are intentionally reconfigured to exceed the rated specifications by the manufacturer, thereby exceeding tested and certified magnetic field levels.[ citation needed ]

See also

Related Research Articles

<span class="mw-page-title-main">Inductor</span> Passive two-terminal electrical component that stores energy in its magnetic field

An inductor, also called a coil, choke, or reactor, is a passive two-terminal electrical component that stores energy in a magnetic field when electric current flows through it. An inductor typically consists of an insulated wire wound into a coil.

<span class="mw-page-title-main">Electromagnetic compatibility</span> Electrical engineering concept

Electromagnetic compatibility (EMC) is the ability of electrical equipment and systems to function acceptably in their electromagnetic environment, by limiting the unintentional generation, propagation and reception of electromagnetic energy which may cause unwanted effects such as electromagnetic interference (EMI) or even physical damage to operational equipment. The goal of EMC is the correct operation of different equipment in a common electromagnetic environment. It is also the name given to the associated branch of electrical engineering.

<span class="mw-page-title-main">Coaxial cable</span> Electrical cable type with concentric inner conductor, insulator, and conducting shield

Coaxial cable, or coax, is a type of electrical cable consisting of an inner conductor surrounded by a concentric conducting shield, with the two separated by a dielectric ; many coaxial cables also have a protective outer sheath or jacket. The term coaxial refers to the inner conductor and the outer shield sharing a geometric axis.

<span class="mw-page-title-main">Radio wave</span> Type of electromagnetic radiation

Radio waves are a type of electromagnetic radiation with the lowest frequencies and the longest wavelengths in the electromagnetic spectrum, typically with frequencies below 300 gigahertz (GHz) and wavelengths greater than 1 millimeter, about the diameter of a grain of rice. Like all electromagnetic waves, radio waves in a vacuum travel at the speed of light, and in the Earth's atmosphere at a slightly slower speed. Radio waves are generated by charged particles undergoing acceleration, such as time-varying electric currents. Naturally occurring radio waves are emitted by lightning and astronomical objects, and are part of the blackbody radiation emitted by all warm objects.

<span class="mw-page-title-main">Faraday cage</span> Enclosure of conductive mesh used to block electric fields

A Faraday cage or Faraday shield is an enclosure used to block electromagnetic fields. A Faraday shield may be formed by a continuous covering of conductive material, or in the case of a Faraday cage, by a mesh of such materials. Faraday cages are named after scientist Michael Faraday, who first constructed one in 1836.

Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system consists of a tiny radio transponder, a radio receiver and transmitter. When triggered by an electromagnetic interrogation pulse from a nearby RFID reader device, the tag transmits digital data, usually an identifying inventory number, back to the reader. This number can be used to track inventory goods.

<span class="mw-page-title-main">Shoplifting</span> Theft of goods from a retail establishment

Shoplifting, shop theft, retail theft, or retail fraud is the theft of goods from a retail establishment during business hours, typically by concealing a store item on one's person, in pockets, under clothes or in a bag, and leaving the store without paying. With clothing, shoplifters may put on items from the store and leave the store wearing the clothes. The terms shoplifting and shoplifter are not usually defined in law. The crime of shoplifting generally falls under the legal classification of larceny. Shoplifting is distinct from burglary, robbery, or armed robbery. In the retail industry, the word shrinkage can be used to refer to merchandise lost by shoplifting, but the word also includes loss by other means, such as waste, uninsured damage to products and theft by store employees.

<span class="mw-page-title-main">Electromagnetic shielding</span> Using conductive or magnetic materials to reduce electromagnetic field intensity

In electrical engineering, electromagnetic shielding is the practice of reducing or redirecting the electromagnetic field (EMF) in a space with barriers made of conductive or magnetic materials. It is typically applied to enclosures, for isolating electrical devices from their surroundings, and to cables to isolate wires from the environment through which the cable runs. Electromagnetic shielding that blocks radio frequency (RF) electromagnetic radiation is also known as RF shielding.

Anti-theft systems protect valuables such as vehicles and personal property like wallets, phones, and jewelry. They are also used in retail settings to protect merchandise in the form of security tags and labels. Anti-theft systems include devices such as locks and keys, RFID tags, and GPS locators.

<span class="mw-page-title-main">Retail loss prevention</span> Practices to reduce loss of goods in retail stores

Retail loss prevention is a set of practices employed by retail companies to preserve profit. Loss prevention is mainly found within the retail sector but also can be found within other business environments.

In electronics, a ferrite core is a type of magnetic core made of ferrite on which the windings of electric transformers and other wound components such as inductors are formed. It is used for its properties of high magnetic permeability coupled with low electrical conductivity. Moreover, because of their comparatively low losses at high frequencies, they are extensively used in the cores of RF transformers and inductors in applications such as switched-mode power supplies, and ferrite loopstick antennas for AM radio receivers.

RuBee is a two-way active wireless protocol designed for harsh environments and high-security asset visibility applications. RuBee utilizes longwave signals to send and receive short data packets in a local regional network. The protocol is similar to the IEEE 802 protocols in that RuBee is networked by using on-demand, peer-to-peer and active radiating transceivers. RuBee is different in that it uses a low frequency carrier. One result is that RuBee is slow compared to other packet-based network data standards (Wi-Fi). 131 kHz as an operating frequency provides RuBee with the advantages of ultra-low power consumption and normal operation near steel and/or water. These features make it easy to deploy sensors, controls, or even actuators and indicators.

<span class="mw-page-title-main">Ink tag</span>

Ink tags are a form of retail loss prevention that is commonly used in clothing stores. These tags contain glass vials filled with permanent ink and have a thick plastic cover. The tags are attached to the items they protect with a magnetic lock which requires a special tool to remove. When forcibly removed from the item the vials of ink will shatter, releasing the ink and irreparably damaging the fabric. The tags typically have warning labels to discourage tampering. Ink tags fall into the loss prevention category called benefit denial. As the name suggests, an ink tag discourages theft by denying the shoplifter any benefit for their efforts. Ink tags are most effective if used together with another anti-shoplifting system.

<span class="mw-page-title-main">Booster bag</span>

A booster bag is a handmade bag used to shoplift, typically from retail stores, libraries, and any other location employing electronic security detectors to deter theft. The booster bag can be an ordinary shopping bag, backpack, pocketed garment, or other inconspicuous container whose inside is lined with a special conductive material, typically multiple layers of aluminium foil.

Checkpoint Systems is an American company that specializes in loss prevention and merchandise visibility for retail companies. It makes products that allow retailers to check inventory, quicken the replenishment cycle, prevent out-of-stocks and reduce theft. Checkpoint offers Electronic Article Surveillance (EAS) radio frequency solutions for retail, high-theft and loss-prevention solutions, RFID hardware, software, and labeling capabilities.

Return fraud is the act of defrauding a retail store by means of the return process. There are various ways in which this crime is committed. For example, the offender may return stolen merchandise to secure cash, steal receipts or receipt tape to enable a falsified return, or use somebody else's receipt to try to return an item picked up from a store shelf.

RFID on metal are radio-frequency identification (RFID) tags which perform a specific function when attached to metal objects. The ROM tags overcome some of the problems traditional RFID tags suffer when near metal, such as detuning and reflecting of the RFID signal, which can cause poor tag read range, phantom reads, or no read signal at all.

Magnadata Group, also known as Magnadata International, was a printing company based in Boston in Lincolnshire, specialising in the development and manufacture of security and access control media including magnetic smart tickets and tags. It was placed into administration in 2015, and was subsequently sold to Paragon Group.

The IEEE 1902.1-2009 standard is a wireless data communication protocol also known as RuBee, operates within the Low Frequency radio wave range of 30–900 kHz. Although very resistant to interference, metal, water and obstacles, it is very limited in range, usually only suitable for short-range networks. The baud rate is limited to 1,200 kB/s, making it a very low-rate communication network as well. This standard is aimed at the conception of wireless network of sensors and actuators in industrial and military environments. One of the major advantage 1902.1 tags is they are extremely low power and last for years on a simple coin size battery and they can be sealed in a MIL STD 810G package. RuBee tags emit virtually no RF and do not produce any Compromising Emanations, as a result are used in high security facilities. RuBee tags are safe and in use near and on high explosive facilities.

Chipless RFID tags are RFID tags that do not require a microchip in the transponder.

References

  1. 1 2 Zahid, M. N.; Jiang, J.; Rafique, U.; Eric, D. (October 2020). "Modified Planar Square-Loop Antenna for Electronic Article Surveillance Radio Frequency Identification Applications". Journal of Communications Technology and Electronics. 65 (10): 1161–1166. doi:10.1134/S1064226920100071. ISSN   1064-2269. S2CID   226364958. Archived from the original on 2023-11-09. Retrieved 2021-04-12.
  2. "Method and apparatus". ppubs.uspto.gov. Archived from the original on 19 January 2023. Retrieved 19 May 2023.
  3. Herzer, G. (2003). "Magnetic materials for electronic article surveillance". Journal of Magnetism and Magnetic Materials. 254 (254–255): 598–602. Bibcode:2003JMMM..254..598H. doi:10.1016/S0304-8853(02)00930-7.
  4. "How Anti-shoplifting Devices Work". HowStuffWorks.com. April 2000. Archived from the original on 2006-04-27. Retrieved 2006-05-12.
  5. "System types". Vitag Security. Archived from the original on 2010-03-18. Retrieved 2010-03-16.
  6. Sensormatic, "Global Source Tagging" Archived 2010-03-12 at the Wayback Machine .
  7. VeriPak Products, Tag Pollution Survey Results, http://veripakproducts.com/Tag%20Pollution%20Survey%20Results.pdf Archived 2011-07-17 at the Wayback Machine
  8. Sensormatic, "Global Source Tagging / Glossary of Terms", http://www.sensormatic.com/Products/GST/glossary.aspx Archived 2010-03-08 at the Wayback Machine
  9. 1 2 Statute Law database, Theft Act (1968) (c. 60) s. 25(1), "Going equipped for stealing, etc.", http://www.statutelaw.gov.uk/content.aspx?LegType=All+P...1&activeTextDocId=2922479&linkToATDocumentId=1204274&linkToATVersionNumber=3&showProsp=1&#1854591 Archived 2023-11-09 at the Wayback Machine
  10. "Checkpoint label business solutions and Sensormatic tags". Dragon Guard. Archived from the original on 2016-11-27. Retrieved 2016-11-27.
  11. "2 & 3 Alarm Hard Tag". Alpha High Theft Solutions. Archived from the original on September 11, 2016. Retrieved August 28, 2016.
  12. "Acousto-Magnetic Technology]". Archived from the original on 2007-08-29.
  13. "About booster bags". Archived from the original on 2008-02-07.
  14. "Newsbrief: Shoplifting bag". The Independent. 14 June 1994. Archived from the original on 29 August 2018. Retrieved 27 August 2017.
  15. "Retailers Applaud Senate Crackdown on Booster Bag Thefts". Retail Council NYS.[ permanent dead link ]
  16. J. Rod Gimbel; James W. Cox Jr (March 2007). "Electronic Article Surveillance Systems and Interactions With Implantable Cardiac Devices: Risk of Adverse Interactions in Public and Commercial Spaces" (PDF). Mayo Clinic Proceedings. Archived from the original (PDF) on 2007-09-28. Retrieved 2007-04-22.{{cite journal}}: Cite journal requires |journal= (help) Study referenced in news article "Cell phones safe to use in hospitals: U.S. study". Reuters. 2007-03-09. Archived from the original on 2007-03-20. Retrieved 2007-04-22.