Back in 2006, in a store protected by our company, our guard noticed a cashier opening, for a short period of time, but rather frequently, the cover of the cash register, after making the final summation. Then he reached into the cash register, when there was no customer, and he took out cash.

Studying the case, our team concluded that the cashier observed a flaw of the cash register system, which was the erasure of the transaction when opening the cover of the receipt printer, after making the final summation of the items, and printed a 0 on the receipt block. The deletion of the transaction did not appear on the customer display, there was still the total sum displayed.

 In time, the perpetrator has developed the method to such an extent, by ripping off the receipt that the 0 never appeared on the block, so that the control of the receipt check could never unfold the perpetration method.

We gave considerable thought how to make visible the moment of the flagrante delicto (for example with an opening detector fitted on the printer of the receipt), but eventually we decided on the visualization of the receipt information on the image of the cameras monitoring the cash registers.

We purchased a Samsung cash register, and started to experiment with the visualization of the receipt information. Several video cards can be purchased in commerce that is capable of managing textual information, but we had to realize that they do not display the cash register characters in the right way and place.

 As a first step, we ordered a text conversion program, which can use the character of the cash register, in whatever language (even Russian, or Chinese) the way it appears on the receipt block. After the first successes, we recognized that by detaching and storing the textual information of the video recording, we created a data-base, which was appropriate for searching information as well. Thus, based on the 300 case studies we processed, characteristic to cash registers, we developed the Investigation software, which by the modeling of the perpetration methods is used to focus and separate the risky transactions; the visual observation of these leading to the conclusion whether these actions could or not cause inventory deficit or damage.

Our system has continuously improved, by renewing and modeling itself to the new perpetration methods, and customer’s needs.