Security tags are something most of us have seen since childhood, small plastic or adhesive tags attached to clothes, books, or retail products that trigger alarms at store exits. These anti-theft tags play a critical role in retail and library security by preventing unauthorized removal of items.
In this guide, we explain the different types of security tags, how EAS systems work, and security tag removal methods used by authorized retail staff, along with the tools required, such as security tag detacher tools and deactivators.
Note: Security tag removal should only be performed by authorized personnel at the point of sale or during asset processing.
Suggested Products
What Are EAS Security Tags?
EAS security tags are part of an Electronic Article Surveillance (EAS) system used to deter theft in retail stores, libraries, and other controlled environments.
An EAS system typically consists of:
- a. Security tags or labels attached to merchandise
- b. EAS security gates (antennas) at store exits
- c. Detachers and deactivators at checkout
- Integration with d. POS systems
If a tagged item passes through the security gates without proper deactivation or removal, the system triggers an alarm; alerting staff to possible theft.
EAS systems are widely adopted because they are cost-effective, reusable, and easy to deploy across large retail environments.
How Do EAS Systems Work?
To understand how to remove security tags, it’s important to first understand how EAS systems work.
EAS tags and security gates communicate using electromagnetic or radio-frequency signals. When an active tag enters the detection field of the gates, it responds in a way that triggers an alarm.
EAS systems are categorized based on the signal technology they use:
- a. Electro-Magnetic (EM)
- b. Acousto-Magnetic (AM)
- c. Radio Frequency (RF)
Each type has a different operating principle and requires a specific security tag removal method.
Types of Security Tags & Their Working Principles
1. Electro-Magnetic (EM) Security Tags
EM tags use a strip of amorphous metal combined with a ferromagnetic bias layer.
How EM tags work:
- a. The amorphous metal strip vibrates when exposed to a low-frequency magnetic field
- b. If the bias layer is not magnetized, the tag is active and detectable
- c. If magnetized, vibration stops and the tag becomes inactive
Key characteristics:
- 1. Uses low-frequency magnetic fields
- 2. Works well near metal objects
- 3. Common in libraries, pharmacies, and bookstores
This makes EM systems ideal where traditional RF tags may struggle.
2. Acousto-Magnetic (AM) Security Tags
AM systems operate at 58 kHz and rely on resonating metal strips that respond to acoustic-magnetic pulses.
Electro-magnetic vs acousto-magnetic tags (key difference):
- 1. EM tags are activated when demagnetized
- 2. AM tags are activated when magnetized
Advantages of AM systems:
- 1. Very high detection accuracy
- 2. Low false alarm rate
- 3. Effective across wide exit areas
Because of this, AM EAS security tags are widely used in large retail stores and supermarkets.
3. RF Security Tags (Radio Frequency EAS)
RF security tags operate using radio waves, most commonly at 8.2 MHz.
How RF tags work:
- 1. The security gate emits RF energy
- 2. The tag resonates and reflects a signal back
- 3. The gate detects the response and triggers an alarm
Benefits of RF EAS systems:
- 1. Slim, lightweight tag designs
- 2. Lower cost
- 3. Easy integration with modern retail infrastructure
RF tags are widely used on apparel, cosmetics, and general merchandise.
RF Security Tags vs RFID Tags
Although often confused, RF-EAS tags and RFID tags are not the same.
|
Feature
|
RF EAS Tags
|
RFID Tags
|
|
Chip-based
|
No
|
Yes
|
|
Item identification
|
No
|
Yes
|
|
Frequency
|
8.2 MHz
|
LF / HF / UHF
|
|
Reusable
|
Yes
|
Depends
|
|
Data storage
|
No
|
Yes
|
RFID tag deactivation is fundamentally different and usually permanent, while EAS tags are reusable.
How to Remove Security Tags Safely (Authorized Methods)
There are two distinct processes:
- a. Removing / detaching a security tag
- b. Deactivating a security tag
Both are standard checkout procedures in retail environments.
How Are EAS Security Tags Detached?
Most hard EAS security tags consist of:
- a. A plastic housing with a locking mechanism
- b. A steel pin inserted through the product
The pin is locked internally and cannot be removed manually.
Security Tag Detacher Tools
Authorized staff use magnetic detachers for EAS tags, which work by releasing the internal lock.
Types of detachers:
- a. Mechanical magnetic detachers
- b. Electronic detachers (electromagnets)
Security tag removal steps (EM & AM):
- 1. Place the tag on the detacher
- 2. Magnetic force releases the lock
- 3. Pin is removed safely without damaging the product
This method applies to EM and AM hard tags.
Removing RF Security Tags
RF labels are often adhesive.
Removal method:
- 1. Peel off the label after deactivation
- 2. If embedded, it can remain without triggering alarms
RF tags are simpler to remove compared to hard tags.
How to Deactivate Security Tags
Deactivation ensures a tag no longer triggers alarms, even if it remains on the item.
EAS Tag Removal Techniques by Type:
- 1. EM tags: Magnetize the bias layer
- 2. AM tags: Demagnetize the resonator strip
- 3. RF tags: Neutralize resonance using RF deactivator pads
Retail stores often use countertop EAS deactivator pads integrated into billing counters.
RFID Tag Deactivation
RFID tags require a different process altogether.
- 1. An RFID reader sends a “kill command”
- 2. The tag permanently disables itself
- 3. The tag cannot be reused
This is commonly used in high-value retail and supply chain applications.
Suggested Products
What Security Tags Cannot Prevent
Security tags are a deterrent, not a complete theft prevention solution. Professional shoplifters sometimes use booster bags, which are lined with aluminum foil to block electromagnetic signals; preventing detection by EAS gates.
This is why modern retail security combines:
- a. EAS systems
- b. CCTV
- c. Inventory analytics
- d. RFID-based tracking
Frequently Asked Questions
● What are the different types of security tags?
There are three types of EAS security tags in the industry: Electro-Magnetic (EM) Tag, Acousto-Magnetic (AM) Tag, and RF Tag.
● How RFID tags are different than EAS tags?
RFID labels or RFID hard tags are completely different than EAS tags, primarily due to an RFID chip which is an essential component of any RFID label (except chipless RFID label). EAS tags on the other hand do not have a chip. RFID labels ensure that each tagged asset has a unique ID and can be tracked, from inventory to shelves but EAS tags can only help with theft prevention, raising an alarm when an unbilled item is taken out of a retail store.
● How to remove an RFID label?
To remove an RFID label, just rip it off the tagged asset. If it is a hard tag, remove it, unscrew it. You can also deactivate it using the kill password to make it useless.
● Do security tags have GPS?
Yes, some selected high-end active RFID tags can have an in-built GPS tracker. However, most of the tags available in the market do not have GPS tracking.
● How do I remove all types of security tags?
Unless you are planning to shoplift from your local supermarket, you can just use a security tag detacher. Just put your tag on the detacher and follow the instructions given in its manual. If you’re a consumer and the billing attendant forgot to remove the tag from your item, you can just use a strong neodymium magnet to detach the tag. Although we advise you to just go back to the store and tell them to detach it.
Disclaimer: The information presented here is for general information purposes only and true to best of our understanding. Users are requested to use any information as per their own understanding and knowledge. Before using any of the information, please refer to our Privacy Policy and Terms and Conditions.