(1) The casual thief steals because he cannot resist the temptation.
This type normally acts alone; he takes small quantities of supplies for
family use in the home.
Pens, pencils, notebook pads, and small handtools
are typical examples.
Poor security measures invite the opportunity for
(2) The systematic thief is one who steals according to preconceived
He steals any and all types of supplies to sell for cash or trade.
Weapons and ammunition are popular targets, since terrorists provide a rich
market for such items. Systematic stealing may be a one-time occurrence; or
it may be extended over a period of months or years. It may consist of one
person or an organized group; and he may or may not be an employee of the
c. Methods of pilfering. Removal of property by the casual thief would
normally be by concealment on the person or in his car. This makes the act
hard to detect and even harder to prove. Systematic thieves use more complex
plans. They may falsify shipping and receiving documents. They may dispose
of property in a trash can and salvage it later.
They have been known to
classify new or serviceable material as salvage.
Using a psychological
deterrent is the best way to control casual theft.
This may be done in a
number of ways. Some are discussed in the following paragraphs.
(1) Search persons and vehicles leaving the post at unannounced times
(2) Set up aggressive security education programs.
information on cases where employees were fired or prosecuted for stealing.
Take caution to avoid identifying those persons; possible civil suits for
defamation of character could result.
(3) Establish enough inventory and control measures to account for
all material, supplies, and equipment. One person should not have control of
all shipping and receiving.
(4) Identify government tools and equipment by some mark or code.
so when possible.
e. Control measures for systematic pilferage.
measures are the best deterrents to systematic theft. Security people such
as yourself must weigh each case, since security needs will vary. Based on
your assumptions, measures such as the ones listed must be used.
you are not limited to only these.
(1) Set up security surveillance of all post exits.
(3) Locate parking areas for private vehicles outside the bounds of