By the Time You Notice the Inventory Gap, It's Been 7 Months.
The inventory count is off. A few units here, a pallet short there. Easy to write off as a data entry error or a supplier discrepancy. You investigate loosely, find nothing definitive, and move on.
Three months later, the gap is bigger. You pull the camera footage. Someone was at the dock at 2 AM. You recognize the jacket. And now you're trying to figure out how long this has been going on.
That 7-month detection window isn't an accident. It's a function of how internal theft happens and how most warehouse security setups are built. This post covers warehouse employee theft prevention: what the methods are, why detection takes so long, and what your camera and access control setup actually needs to close it. For the full picture on warehouse security including external cargo theft and temporary coverage, see our warehouse and distribution center security overview.
Warehouse employees account for roughly 60 percent of all inventory theft in U.S. distribution centers, and the average detection window runs 7 months before losses surface in a formal investigation. By then, cumulative theft often reaches 10 to 20 times the per-incident figure reported in insurance claims. (Source: Embroker, ASIS International)
How Warehouse Employee Theft Actually Happens
The Methods That Don't Look Like Theft
Most employee theft in warehouses doesn't involve someone walking out the front door with a box. It happens in ways that blend into normal operations, which is exactly why it's hard to catch.
Product diversion is the most common method. An employee logs goods as damaged, spoiled, or returned to inventory when they're actually being held or removed. The system shows a legitimate loss. The physical goods are gone. Nothing flags as unusual until a physical count reveals the discrepancy.
Shipping fraud is more sophisticated. Shipment records get altered, quantities are understated, or freight labels get swapped so a portion of a load diverts before it's ever logged as received. An employee with access to the WMS or shipping documentation can manipulate records in ways that take weeks to trace.
Loading dock collusion combines internal and external theft. An employee inside signals to an external contact when specific loads are staging, when a dock door is unmonitored, or when the overnight crew is thin. The external theft looks like a break-in. The internal involvement doesn't show up until someone starts asking how the thieves knew exactly what was there and when.
Pilferage is slower: small quantities removed across many shifts, accumulating for months before the total crosses the threshold that triggers a formal investigation.
Why the Detection Window Stays Open So Long
The 7-month average isn't because operators aren't paying attention. It's because the gap between a theft event and a detectable pattern is wide when losses are gradual and no single system creates an automatic alert.
A passive camera system records what happens but doesn't generate an alert when inventory leaves without documentation. An access control system logs who was where but doesn't correlate that log to a missing pallet count. Inventory management software flags discrepancies but can't tell you whether the discrepancy is theft, damage, or a data entry error.
The result: by the time a supervisor notices something wrong and starts pulling the thread, they're working backward through months of activity across multiple systems with no unified timeline. Getting to a provable answer takes longer than most operators expect. The loss keeps running until it does.
What Cameras Catch and What They Don't Prove
Camera coverage is necessary for any warehouse theft investigation. It's also frequently misunderstood in the context of internal loss.
What cameras do well: they record who was physically present, when, and what they were doing while on camera. If an employee is loading boxes into a personal vehicle at 11 PM, that's on footage. If dock doors are opened at an unscheduled hour, it's recorded. If a pallet disappears from a staging area between shifts, cameras may show who was near it and when.
What cameras don't answer on their own: whether the person had authorization to be there. Whether their job function includes access to that zone. Whether the activity was documented and approved or unauthorized and unrecorded.
That gap matters for two reasons. First, footage of an employee in a restricted area is evidence of presence, not unauthorized access. The employee can say they were doing their job. Without documentation showing they weren't supposed to be there, the footage alone isn't enough to act on. Second, insurance carriers and legal teams need a complete record. A claim or termination built on camera footage alone gets challenged.
ValleyGuard's AI cameras flag unusual after-hours interior movement and trigger Intervention Specialist review. That creates a timestamped, documented incident record (camera designation, time, observable activity) that serves as a starting point for an internal investigation. Whether the activity leads to a theft finding or clears as legitimate depends on what the access control record shows. You can see how live monitoring flags suspicious activity in real incidents at the ValleyGuard live monitoring catches page.
What Access Control Records and Why It's Different
Access control does something cameras can't: it creates an authorization record.
Every badge swipe or credential entry is logged with a timestamp, a credential ID, and a door designation. That log answers questions cameras can't answer. Was this person assigned access to this zone? Did they swipe in at this time, or was the door propped? How many times did they access this area in the past 30 days, and is that frequency normal for their role?
Time-restricted access is where the authorization layer gets most useful for internal investigations. If a dock door is configured to accept credentials only during shift hours, a badge swipe at 1 AM isn't just unusual. It's a documented policy violation. That's a different kind of evidence than camera footage of someone near a door.
Zone-specific credentialing limits who can access which areas and when. A shipping clerk doesn't have a credential that opens the high-value cargo room. A maintenance tech doesn't have off-hours access to the stockroom. When access events match what a role requires, nothing flags. When they don't, the log records the anomaly automatically, without anyone having to watch for it.
Access control audit trails also matter for insurance documentation. Most commercial carriers now require verified access logs as part of a theft claim review. A timestamped record of who entered a specific zone during the period in question closes a chain-of-custody gap that camera footage alone leaves open. For more on how access control works at dock doors and cargo areas, see our cargo theft prevention guide.
Running Both: How the Case Gets Built
Valley Alarm's camera systems and access control systems are separate platforms. They don't share a dashboard or automatically link a badge event to a camera timestamp. What they do is generate two independent records that, reviewed together, tell a story neither system can tell alone.
Here's how that works in practice. Camera footage shows an employee at the loading dock at 1:45 AM on a Tuesday. That raises a question: were they authorized to be there? The access control log shows a badge swipe at that door at 1:44 AM under that employee's credential, and the door is configured for access only during the 6 AM to 10 PM window. Two separate records. Both timestamped. Together they document unauthorized access, not just physical presence.
That combination is what makes a case actionable. HR can act on it. Legal can document it. Insurance can verify it. Without the access log, the footage is a starting point. With both, it's a record.
The practical implication: both systems need to be in place before a loss occurs, not after. Pulling footage and access logs after a theft event only works if both were recording during the period in question. An operator with cameras but no access control, or with access control but no interior camera coverage in restricted zones, is missing half the record before the investigation even starts.
Steps to Take When You Suspect Internal Theft
Don't confront the employee before you have documentation. That's the most common mistake. Once someone knows they're under scrutiny, behavior changes and records can be manipulated.
Start with the access control log. Pull the last 30 to 60 days of access events for the relevant zones. Look for after-hours swipes, unusual frequency, and zone access that doesn't match the employee's role. Cross-reference with posted shift schedules.
Then pull camera footage for the flagged dates and times. Look for activity at loading docks, staging areas, or high-value storage zones that corresponds to the access events you've identified. Document timestamps and camera designations in writing before doing anything else.
Get HR and legal involved before any confrontation. In California, wrongful termination exposure is real. Documentation needs to be complete before action is taken. A well-documented case with timestamped access logs and corresponding camera records is defensible. An undocumented confrontation that leads to termination isn't.
If the evidence suggests a pattern across multiple employees or points to external coordination, contact loss prevention counsel before acting. Loading dock collusion involving outside contacts may require law enforcement coordination before internal action is taken.
Frequently Asked Questions
How common is employee theft in warehouses?
Warehouse employees account for roughly 60 percent of all inventory theft in U.S. distribution centers, according to industry data from Embroker and ASIS International. Employee theft is estimated to be 15 times more likely than external theft on a per-incident basis. The 7-month average detection delay means cumulative losses are typically far higher than any single incident report captures.
Can cameras alone catch employee theft?
Cameras record physical presence and activity but can't establish authorization context. Footage of an employee in a restricted area is evidence of presence, not unauthorized access. Without an access control log showing whether that employee was credentialed for that zone and whether their access at that hour was within policy, the footage alone is often insufficient for termination or insurance documentation. Both systems together close that gap.
What does access control add to a warehouse theft investigation?
Access control creates a timestamped record of who entered which zones, when, and whether access was credential-authorized. It also captures failed attempts, door prop events, and out-of-hours activity that time restrictions flag automatically. That record answers the authorization question camera footage can't. Combined with camera documentation, it creates the two-part evidence record most insurers and HR teams require before acting.
Do Valley Alarm's camera and access control systems integrate?
No. They're separate platforms that generate independent records. An investigation using both systems reviews them in parallel and builds a timeline from two separate logs. That process works. It just requires a manual correlation step rather than an automated link. Both systems need to be in place and recording before a loss event to be useful for investigation.
How long should we retain camera footage and access control logs?
Industry standard is 90 days minimum. Insurance carriers and legal teams often request records from 30 to 60 days before a loss is reported, which means retention gaps create evidentiary holes. Best practice for high-value cargo environments is 120 to 180 days of continuous retention across both systems. If a loss is suspected, preserve records immediately. Both camera storage and access logs overwrite on a rolling basis.
What role does live monitoring play in employee theft prevention?
ValleyGuard live monitoring is most effective for deterrence and real-time flagging of unusual after-hours activity in restricted areas. Intervention Specialists can detect interior movement outside operating hours, issue audio warnings, and document the incident with timestamp and camera information. That record becomes a starting point for internal investigation before losses accumulate further. For proactive prevention, live monitoring combined with access control is the most complete setup: cameras flag the activity, access logs establish whether it was authorized.
Internal theft is hard to catch without the right record.
ValleyGuard covers warehouses and distribution centers throughout Greater Los Angeles and the Inland Empire. Talk through a camera and access control setup for your facility.
Related Articles
- →Warehouse Security Guide for Southern California
- →Warehouse and Distribution Center Security in Los Angeles
- →Cargo Theft Prevention for Warehouses in Southern California
- →After-Hours Security for Distribution Centers
- →Warehouse Security Cameras vs. Security Guards
- →Live Video Monitoring Catches on Camera
- →Industrial Security Camera Systems for Los Angeles Facilities
- →Inland Empire Warehouse Security

