The chain of custody begins when you submit your order — The chain of custody can be used to solve crimes. When I opened my commercial bank account, my banker asked me to describe the nature of my business. He then opened up about having his branch robbed at gunpoint...
Register your stuff like you register a car — When you buy a new car, you tag and title it. By law, there is a linking of the vehicle ID number (VIN) and you. This happens at the federal level, the state level and the county level. A massive database keeps track of...
Low-tech security alternative — Everybody recognizes the old Neighborhood Watch signs on the left, but does anyone recognize the old Operation Identification sticker on the right? The two systems used to be paired, but Operation ID was a hassle and inconvenient, so it...
How the private database protects you — You get a private database that keeps you in control. In other words, if someone recovers a piece of marked property and enters the asset tag ID number into the FOUND page, he or she will learn nothing about you. The system is...
Psyching out the bad guys — The bluff in burglary deterrence is real, but not with my system. You can buy a fake television. You can buy a barking dog alarm. You can buy a dummy camera. You can buy a dummy alarm box. When you go up to a house and see an alarm sticker...
The highly reliable ID tag — ID tags are still a viable security measure because they are the tip of the spear of a more complex system designed to safeguard property from theft and improve recovery. Yes, it’s low tech, but it’s a tried-and-true approach...