How do Booster Bags work?

DISCLAIMER: This article is intended for educational purposes only. The authors do not condone shoplifting, and any information contained in this blog post should not be used to engage in illegal activities. In fact, we encourage retailers and their agents to keep abreast of such shoplifting techniques, as this helps to inform them of how their loss prevention strategies may be circumvented.

An example of the Booster BagPut simply, a booster bag (sometimes called a ‘magic bag’) can be used to foil a store’s EAS (electronic article surveillance) detection system by blocking the RF or AM signal which is contained in a security tag or label. Essentially, the bag acts as a shield which prevents the tag from being detected by the security gate as it is passed. The bag is made of tin or aluminium foil, and this can be layered inside a shopping bag, backpack, or even the lining of a pocket inside a piece of clothing.

Unlike opportunistic shoplifters, booster bags are used by professional thieves as an easier means of concealing multiple items in one visit. It also saves time for the would-be thief, as there is no need to remove security tags or labels inside the store. Most often, the shoplifter would use sleight-of-hand or a store blind spot to drop items into the bag. A more crude method involves wrapping ready-made layers of foil around an item at the time of lifting, and then sealing the foil with a fold.


What items are needed to make a booster bag?

In our example we’ll describe how a double-layered booster bag is made. The two layers enable the bag to appear normal when viewed from either the inside or outside (i.e. unlike the picture shown above, it prevents any metal from being seen). In this experiment, you’ll need:

  • Two new (not old and creased) shopping bags
  • A roll of tin foil
  • Adhesive tape (double-sided works best)
  • A pair of scissors

How is the booster bag made? [Log in or reigster to get access to the video]

  1. Find a large, flat surface and lay out your tools.
  2. Fold the first edge of the roll about 5cm (2”) over, reflective side inwards.
  3. Roll-out some foil, reflective side up, and place one bag against the inside edge.
  4. The handle of the bag must not be covered by any foil (you’ll see why later). Also, the bottom part of the bag may be exposed for now, and this is OK.
  5. Unroll some more length, and lay it over the top side of the bag. The new crease should be as close as possible to the edge – do not make it wider than the bag’s width because your outer bag will need to fit over it.
  6. Grab the two corners of the bag that are closest to the roll of foil, then lift the bag upwards, and as more foil unravels, flip the bag underneath so that the newest layer is on top.
  7. Press down the newly made edge so that it creases closely with the edge underneath.
  8. Repeat this process so that it makes four complete layers (remembering that each flip of the bag covers only one side – i.e. half a layer).
  9. When you have completed four layers (this is enough to block any signal from penetrating), tear off the last edge of foil, and use adhesive tape to seal it down.
  10. If the bottom part of your bag is still exposed (i.e. it’s longer than the width of foil), repeat the process above, but ensure that the bottom of the bag sits above the bottom lining of foil with about 5cm (2”) spare.
  11. Next, at the base of your bag, fold the bottom edge of foil upwards, so that excess length is removed. Tape this bottom edge thoroughly so that it creates a nice seal.
  12. Your (rigid) bag now needs to rest inside an outer bag to conceal the foil lining. Carefully insert your foil bag so that it sits all the way inside the outer bag, right down to the bottom.
  13. Tip: You can gently unflatten the foil bag edges so that it puffs out slightly, making it easier to insert (a puffier looking bag is not undesirable, because it makes an empty bag look full).
  14. The bag must be pushed all the way down, so that the handles of both line up evenly.
  15. Fold the top of the outer bag outwards so that the inside bag’s handle is exposed.
  16. Apply double-sided adhesive tape near to the top edge and handle areas of the inside bag (on both sides), so that the outer bag can seal directly on top of it. Avoid placing tape on any of the foil.
  17. Unfold the outer bag and seal it down onto the tape.

How do you test a booster bag?

  1. Place a cell phone inside the your booster bag.
  2. Pick up the bag by the handles, and hold it naturally, as you would in a store.
  3. Call the cell phone from another line. If it doesn’t ring, your bag is secure. If it did, you may need more layers, or check that the top of your bag has been sealed down thoroughly.


Alpha S3 Handkey

[Content updated September 27, 2015 – see the comments section further down]

The Alpha S3 Handkey was once a well guarded, enterprise-level device in which Alpha (a division of Checkpoint Systems, Inc.) successfully prevented mainstream use by way of restricting resale to authorised vendors. This has since changed, however, as the public domain began to share information about the device’s components, enabling it to be broken down, reverse engineered, and eventuallyThis diagram shows the layout of magnets similar to those found in the handkey exploited for all to see. Now, it is possible to purchase no-name replicas of the product, or even make one at home by obtaining instructions on how to make a do-it-yourself handkey.

DISCLAIMER: The diagram shown here is not intended to divulge the intellectual property of Checkpoint Systems, Inc. or any of its subsidiaries. The authors intend only to inform visitors to this site of how generic magnetic handkeys could be constructed at home, and no inference to illegal activity in the use of such a device is made herewith. has been able to obtain documents which show that Sand & Sebolt, LPA acts on behalf of Checkpoint in relation to their patent and intellectual property matters. We understand that, from time to time, their patent attorneys attempt to make contact with unauthorised resellers of this item with a cease a desist notice. Initially this may have been an effective solution, but in recent years the proliferation of generic S3 handkeys that have become available, has forced Checkpoint to rethink its strategy. Over time, this had led to the creation of self-alarming security tags and cables which emit an audible beep when they are detached. We will cover these in a later blog post.

So what types of security devices does the Alpha S3 Handkey open?

In our next blog post we’ll cover the infamous booster bag. We recommend that you register on our site to stay informed of future articles about security tag removers and all things allied. Also, feel free to leave a comment or provide feedback to any of our blog posts. We will keep growing until we become the definitive source for information on tag removal. Join us while we’re still young…