Logo

BLOG

The Chain of Custody

The Chain of Custody

The chain of custody begins when you submit your order — The chain of custody can be used to solve crimes. When I opened my commercial bank account, my banker asked me to describe the nature of my business. He then opened up about having his branch robbed at gunpoint...

read more
Tag and Title Your Portable Electronics

Tag and Title Your Portable Electronics

Register your stuff like you register a car — When you buy a new car, you tag and title it. By law, there is a linking of the vehicle ID number (VIN) and you. This happens at the federal level, the state level and the county level. A massive database keeps track of...

read more
Neighborhood Watch tied to Operation I.D.

Neighborhood Watch tied to Operation I.D.

Low-tech security alternative — Everybody recognizes the old Neighborhood Watch signs on the left, but does anyone recognize the old Operation Identification sticker on the right? The two systems used to be paired, but Operation ID was a hassle and inconvenient, so it...

read more
The Private Database Keeps You in Control

The Private Database Keeps You in Control

How the private database protects you — You get a private database that keeps you in control. In other words, if someone recovers a piece of marked property and enters the asset tag ID number into the FOUND page, he or she will learn nothing about you. The system is...

read more
The Bluff in Burglary Deterrence

The Bluff in Burglary Deterrence

Psyching out the bad guys — The bluff in burglary deterrence is real, but not with my system. You can buy a fake television. You can buy a barking dog alarm. You can buy a dummy camera. You can buy a dummy alarm box. When you go up to a house and see an alarm sticker...

read more
Id Tags: The Tip of the Spear for Home Security

Id Tags: The Tip of the Spear for Home Security

The highly reliable ID tag — ID tags are still a viable security measure because they are the tip of the spear of a more complex system designed to safeguard property from theft and improve recovery. Yes, it's low tech, but it's a tried-and-true approach that has...

read more
A Pet Recovery System for Your Other Valuables

A Pet Recovery System for Your Other Valuables

No need for microchips or bar-codes when you have eyeballs — With a pet recovery system, valuable dogs and cats are micro-chipped. Before that, they were tattooed. Valuable portable electronics and tools need neither because there is a serial number embedded in the...

read more
A Security System That Arrives in an Envelope

A Security System That Arrives in an Envelope

A simple security system with over 50 years of proven use — We sell a single product. It is an anti-theft security system that arrives in an envelope, but is tied to your online account the instant your order is placed. It has no electronics or moving parts. It is a...

read more
Layered Security from ‘Curb to Cockpit’

Layered Security from ‘Curb to Cockpit’

Security services will use any tool no matter how small — In the United States, Homeland Security and the TSA utilize layered security tactics at airports from "curb to cockpit." In other words, they utilize multiple strategies to keep the bad guys guessing. My...

read more
Anti-Theft Security System

Anti-Theft Security System

There are no guarantees, but there are deterrents — The My Property ID Registry security system has a deterrent effect because burglars are less likely to target portable items that are registered and marked. This is based on research done over the last 50 years that...

read more

Categories

Archives

HOME        FOUND         FAQ         BLOG         MEDIA         ABOUT          CONTACT


WARNING: 
This website is monitored by the MyPropertyID security team. Abuse of this service is a violation of our Terms and Privacy policies. We take the Safety of all of our users seriously and will not hesitate to involve law enforcement if there is evidence of abuse or harassment.