Employee theft is the single largest controllable cost in convenience store operations. According to the National Association of Convenience Stores (NACS), internal theft accounts for approximately 42% of all theft-related inventory losses — more than shoplifting, vendor fraud, and administrative errors combined.
The challenge isn't that these theft methods are sophisticated. Most are shockingly simple. The challenge is that they're invisible without the right monitoring systems in place. Here are the 10 most common ways convenience store employees steal, and how to detect each one.
1. Cash Skimming
How it works: The employee takes cash directly from the register drawer — either during a transaction or during a quiet period. The simplest method is pocketing bills during the shift and hoping the shortage goes unnoticed or gets attributed to a counting error.
More sophisticated skimmers process a legitimate cash transaction, hand the customer their change, then void or cancel the transaction — removing it from the POS record while keeping the customer's cash in the drawer. At the end of the shift, the drawer balances to the POS total, but the actual cash sales were higher than what was recorded. The skimmer pockets the difference.
Detection methods:
- Daily per-shift cash reconciliation — shortages will appear consistently on the skimmer's shifts
- POS void and cancellation analysis — high void rates on specific cashiers
- Video review of no-sale drawer opens — any time the drawer opens without a transaction warrants review
- Trend analysis — consistent $20-50 shortages on the same shifts
2. Void Abuse
How it works: The cashier completes a legitimate sale, accepts payment, and then voids the transaction immediately after the customer walks away. The POS system now shows no sale occurred, but the customer paid and left with merchandise. The cashier removes the cash equivalent from the drawer.
A variation involves voiding specific high-value items from a multi-item transaction. The customer pays the full price, but the POS records a lower total. The difference stays in the drawer until the cashier can remove it.
Detection methods:
- Video audit of every void — verify that a customer was present and merchandise was returned
- Void-to-sales ratio by cashier — flag anyone processing 3x or more voids than peers
- Time-of-void analysis — voids processed immediately after a sale closes are suspicious
- Post-close voids — voids processed during closing procedures or after the store appears empty
3. Sweethearting
How it works: The cashier deliberately fails to scan one or more items for a friend, family member, or regular customer. The customer places 5 items on the counter; the cashier scans 3 and bags all 5. No cash is stolen from the drawer — the theft is in unrealized revenue.
Detection methods:
- POS + video correlation — the only reliable method. Watch the counter and compare items placed vs. items scanned.
- Items-per-transaction analysis by cashier — consistently low averages suggest items are being skipped
- Inventory variance by category — high-value categories (tobacco, energy drinks) showing unexplained shrinkage
4. Lottery Ticket Theft
How it works: Several methods exist. The most common: a cashier activates a scratch-off ticket pack, peels off tickets for personal use, and either doesn't report the activation or hides the shortage in the next inventory count. Others cash winning tickets through the lottery terminal and pocket the payout without recording it in the POS.
Some employees test scratch-off tickets during slow periods, keeping winners and re-rolling losers back into the rack. Others sell tickets to friends at a discount or give them away entirely.
Detection methods:
- Daily lottery terminal reconciliation against POS lottery sales
- Physical ticket inventory counts at every shift change
- Video audit of lottery terminal area — every activation and payout should correspond to a customer transaction
- State lottery commission reports — compare reported sales to your POS records
5. Tobacco and Vape Theft
How it works: Tobacco products (cigarettes, cigars, vape cartridges) are high-value, small, and easy to conceal. Employees steal them directly from inventory — tucking packs into pockets, bags, or hiding them behind the counter for later retrieval. Some process a "return" or "damage" in the POS for tobacco products they actually took home.
Because tobacco is an age-restricted product stored behind the counter, the opportunity for theft is constant — every time the employee reaches for a customer's pack, they have access to the entire tobacco inventory.
Detection methods:
- Daily tobacco inventory counts against POS sales data
- Scan data reconciliation — compare physical stock to what the POS says should be on the shelf
- Video review of tobacco cabinet access during non-transaction periods
- Damage and return logs — flag tobacco returns or damages that exceed 1-2% of sales
6. Buddy Punching
How it works: An employee who isn't at work has a co-worker clock them in, creating phantom payroll hours. The absent employee gets paid for hours they didn't work. While technically payroll fraud rather than register theft, buddy punching costs the business real money — an estimated 2.5 hours of wasted payroll per day when 5 employees each ghost 30 minutes.
Detection methods:
- GPS geofence time clocking — employees must be within a set radius of the store to clock in
- Photo-verified clock-in (available through DohOps) — eliminates proxy clock-ins entirely
- Video audit of clock-in times — verify the employee is physically present when the system shows them clocked in
- Cross-reference POS activity with clock-in data — if an employee is "clocked in" but has no POS transactions for 2+ hours, verify they're actually on premises
7. Vendor Collusion
How it works: An employee works with a vendor delivery driver to receive less merchandise than what the delivery ticket shows. The driver delivers 8 cases but writes a receipt for 10. The store pays for 10 cases. The 2 extra cases are split between the employee and the driver — either sold elsewhere or consumed.
This works particularly well with high-frequency deliveries (beverage, snack, tobacco) where the volume makes small discrepancies easy to hide.
Detection methods:
- Video audit of receiving area during deliveries — count what comes off the truck
- Independent delivery receipt verification — compare what was signed for vs. what was received
- Vendor invoice reconciliation against POS sell-through — if you received 10 cases but only sold 7, where are the other 3?
- Rotate receiving staff — don't let the same employee always receive from the same vendor
8. Refund Fraud
How it works: The employee processes a fictitious refund — a "customer return" that never happened. The POS records the refund, reducing the register's expected cash balance. The employee pockets the refunded cash amount. Since the POS expects less cash in the drawer, the register balances at end-of-shift despite the cash being removed.
This is harder to detect than void abuse because the POS shows a legitimate-looking refund transaction. Without video, there's no way to know whether a customer was actually present.
Detection methods:
- Video audit of every refund — was a customer present? Did merchandise return?
- Refund-to-sales ratio by cashier and shift — flag abnormal rates
- Return authorization policies — require manager approval for any refund
- Receipt requirement — only process refunds with original receipt, and verify receipt authenticity
9. Coupon Abuse
How it works: The employee applies coupons to transactions that don't qualify — either customer-facing (applying a coupon to a friend's purchase) or self-serving (scanning coupons on their own purchases or phantom transactions). Some employees collect coupons from newspapers, the internet, or other sources and apply them to cash sales, pocketing the coupon value.
In manufacturer coupon schemes, the store submits the coupon for reimbursement from the manufacturer, but the employee already pocketed the cash "savings."
Detection methods:
- Coupon usage analysis by cashier — flag employees processing significantly more coupons than peers
- Coupon-to-transaction matching — verify each coupon corresponds to a legitimate product purchase
- Video review of coupon redemptions — was a physical coupon presented by a customer?
- Manufacturer coupon reconciliation — ensure redeemed coupons match actual customer purchases
10. Back-Dock Theft
How it works: Employees steal merchandise through the back door, receiving area, or loading dock. Items are placed in trash bags, hidden in personal bags, or staged near the back exit for retrieval after the shift. High-value, concealable items — tobacco cartons, cases of energy drinks, full liquor bottles — are the most common targets.
The "trash run" scheme is especially common: an employee takes a garbage bag to the dumpster, but the bag also contains merchandise. After the shift, they retrieve the merchandise from behind the dumpster.
Detection methods:
- Camera coverage of back door, dumpster area, and employee entry/exit points
- Video audit of trash removal — every trash run should be verified
- Bag checks — require employees to store personal bags in a designated area away from merchandise
- Inventory variance analysis — if specific categories show unexplained shrinkage, cross-reference with employee schedules
Frequently Asked Questions
Cash skimming and void abuse typically account for the largest dollar losses because they involve direct cash removal. However, sweethearting is often the highest-volume method — it happens more frequently but in smaller per-incident amounts. Tobacco theft is also significant due to the high per-unit value of cigarettes and vape products.
Frame your loss prevention measures as professional standards, not distrust. "All transactions are reviewed daily as part of our quality assurance process" sounds very different from "We're watching you because we think you steal." Most honest employees welcome clear accountability — it protects them from false accusations and ensures they work in a fair environment.
Industry surveys (U.S. Chamber of Commerce, Jack L. Hayes International) suggest that approximately 75% of employees have stolen from their employer at least once — though most incidents are low-value (office supplies, food). In cash-handling positions, the rate of significant theft is lower but the per-incident cost is substantially higher: the average dishonest employee case in retail is $1,890.