Browse Definitions:

flash rob (flash robbery)

A flash rob (or flash robbery) is a crime in which a large group of people – usually teenagers – converges to steal items from a store and then disperses as suddenly as they gathered.

The crime is a variation on a flash mob, which is a sudden and seemingly spontaneous gathering of people for some special purpose, such as a surprise dance performance in a train station or a protest demonstration. Flash gatherings are often coordinated – at least in part – through electronic media, such as social networking sites and cell phone text messages.

In a flash robbery, the thieves generally behave casually, as if shopping. At the appointed time, however, they exit the store without paying for items. Because of the number of people involved in a flash rob, it is almost impossible for the store owner or employees to do anything to stop the robbery. Also because of the number of people involved, police sometimes approach cautiously, leaving thieves enough time to get away from the location.

In August 2011, the National Retail Federation reported that 10 percent of retail businesses polled had been the victims of a flash robbery.

This was last updated in January 2012

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.


File Extensions and File Formats

Powered by:


  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces.

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...


  • federated identity management (FIM)

    Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same...

  • cross-site scripting (XSS)

    Cross-site scripting (XSS) is a type of injection security attack in which an attacker injects data, such as a malicious script, ...

  • firewall

    In computing, a firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or...



  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...


  • volume manager

    A volume manager is software within an operating system (OS) that controls capacity allocation for storage arrays.

  • external storage device

    An external storage device, also referred to as auxiliary storage and secondary storage, is a device that contains all the ...

  • NetApp SolidFire

    NetApp SolidFire is a business division of NetApp Inc. that specializes in all-flash storage systems.


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.