search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
THEFTS & BREAK-INS


move and collect items in their own unit to be removed later. Access can also be gained by guessing an access code. As unbelievable as it sounds, many facili- ties have static “contractor codes” that are basic, easy-to-remember codes such as 1111 or 1234. These codes are easily guessed. These basic codes should not be used by any facility or any customer. Other ways criminals can gain ac-


cess are: • Code sharing with friends or family.


• Successful bidders of storage auctions are given temporary codes.


• Movers hired by a customer are provided codes.


• Commercial customers share codes with multiple employees.


Prohibiting access to a facility is most often not a realistic option. As a storage facility, we need to be able to let our customers and their agents access their goods. However, strong security practices can and should be in place to discourage criminals and limit the damage they can cause. Understanding what happens once a thief is in a facility and how they com- mit their crime is important to under- standing how to stop it from happening.


Scoping The Job And The Crime Itself Once inside the facility (either gate or building), would-be criminals will often walk around to get a feel for the facil- ity and try to peek inside the units of customers who have their door open to target a few specific units. Most often, perpetrators will target units that can be cut with large bolt cutters. Cutting locks in this manner is fast and quiet, so it doesn’t attract much attention. Disc locks need a grinder to get off, which is a time-consuming and noisy process that often attracts attention, thus discouraging the crime. A common tactic for criminals who don’t know what they’re looking for is the “bulk cut” method. In this attack, crimi- nals take their time to cut every lock they can in a full hallway and open every door quickly and quickly look


for valuable items. They will often throw boxes and stored items into the hallway, making quite a mess and in- termingling goods from many different units. This happens more often when facilities have individual unit alarms. By bulk cutting, they sort quickly and try to be out of the facility before police are on site. This method is very disruptive and leaves a mess for both managers and customers to deal with. Items commonly targeted are the things that can be easily carried and resold online and at local flea markets. Examples are items like tools and toolboxes, electronics, laptops, cameras, and sports collectables. Most items included on insurance claims after a break-in are the result of damage done while tossing a unit, not actually stolen, further evidence that the thieves get frustrated expect- ing to find valuable items but only finding regular everyday household goods. The loss experienced through the damage of items is usually more emotionally damaging than the cash value of the goods, suggesting that the belief that this type of crime is “victimless” is not actually correct. Thieves who rent a unit legitimately may disassemble the interior walls or climb over walls to access adjacent units. With modern construction of storage units, this is not as common. This type of break-in can take a long time before the realization that a theft has occurred, since there is no outward evidence such as a cut lock. Fortunately, this type of theft is limited in the scope of how many customers it can affect, but it is important to remember to watch for these types of thefts as well. Finally, a new unfortunate trend we are seeing is criminals prying the entire latch mechanism off of roll-up doors. This results in extensive damage to the door itself, making it very difficult to repair and secure the unit after the crime has been committed. Unfortunately, there’s no quick fix to this; either new doors will need to be ordered or a fabricator will need to


18


build a new latching mechanism to fix the damaged latch.


What To Do Once It Happens Once a break-in has been identified, several things must happen quickly. 1. Notify the police.


• Call 911 if the crime is in progress (remember to NEVER confront a thief if the crime is in process).


• Call the local non-emergency if discovered after the crime has occurred.


2. Ensure that the crime is no longer in process and the perpetrator is no longer on site. Personal safety should always be your first priority.


3. Secure affected lockers with a manager lock.


4. Follow internal policy (if available) to notify facility owners, managers, and other key internal personnel.


5. Contact customers who have been affected.


6. Take some time to write down as many details as possible. It’s easy to forget these details later on.


7. Take photos. But photos and details must not be shared outside the company without proper consent and permission.


8. Review camera footage and gate logs to see if any key details were captured. This will allow you to better understand the facts and make fewer assumptions about what you think happened vs. what actually happened. This is a big task but worth it. Many recorders overwrite data after a period of time, so it is important to save the data so that it can be saved and replayed.


9. Advise your insurance provider that there has been a break-in.


10.Complete a formal incident re- port. This report should be well- thought-out and include detailed information about the event. This is important so that later on the event is properly recorded and follow-up questions can be properly addressed.


October 2022


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40