Gregory Saville:

"This book is a breakthrough for the science of crime and prevention and for the criminological enterprise – both academic and practitioner. Osborne has made a contribution of considerable weight. This is a book you should read."

Qualitative Crime Pattern Identification

Wednesday, July 31, 2024

Robbery: Further Reading

 Further Reading

Altizio, A., York, D. (2007). Robbery of Convenience Stores, Problem-Specific Guide Series No. 48.  Problem-Oriented Guides for Police Series, Washington, DC: Office of Community Oriented Policing Services, U.S. Department of Justice.  Available at: https://popcenter.asu.edu/content/robbery-convenience-stores-0

Heinonen, JA, Eck, JE (2012). Home Invasion Robbery, Problem-Specific Guide Series No. 70.  Problem-Oriented Guides for Police Series, Washington, DC: Office of Community Oriented Policing Services, U.S. Department of Justice.  Available at: https://popcenter.asu.edu/content/home-invasion-robbery-0

Jiang, S., Felson, M., Scott, M.S., Tapp, K. (2023). Carjacking, Problem-Specific Guide Series No. 75.  Problem-Oriented Guides for Police Series, Washington, DC: Office of Community Oriented Policing Services, U.S. Department of Justice.  Available at: https://popcenter.asu.edu/content/carjacking

La Vigne, N., Wartell, J. (2016). Robberies of Pharmacies, Problem-Specific Guide Series No. 73.  Problem-Oriented Guides for Police Series, Washington, DC: Office of Community Oriented Policing Services, U.S. Department of Justice.  Available at: https://popcenter.asu.edu/content/robbery-pharmacies

Monk, KM, Heinonen, JA, Eck, JE. (2010) Street Robberies, Problem-Specific Guide Series No. 59.  Problem-Oriented Guides for Police Series, Washington, DC: Office of Community Oriented Policing Services, U.S. Department of Justice. Available at: https://popcenter.asu.edu/content/street-robbery-0

Scott, M.S. (2001). Robbery at Automated-Teller Machines, Problem-Specific Guide Series No. 8.  Problem-Oriented Guides for Police Series, Washington, DC: Office of Community Oriented Policing Services, U.S. Department of Justice. Available at: https://popcenter.asu.edu/content/robbery-automated-teller-machines-0

Smith, M. (2005). Robbery of Taxi Drivers. Problem-Oriented Guides for Police, Problem-Specific Guide Series No. 34.  Problem-Oriented Guides for Police Series, Washington, DC: Office of Community Oriented Policing Services, U.S. Department of Justice. Available at: https://popcenter.asu.edu/content/robbery-taxi-drivers-0

Weisel, D.L. (2007). Bank Robbery, Problem-Specific Guide Series No. 48.  Problem-Oriented Guides for Police Series, Washington, DC: Office of Community Oriented Policing Services, U.S. Department of Justice. Available at: https://popcenter.asu.edu/content/bank-robbery-0



Tuesday, July 30, 2024

Robbery Data

 Data Needed to Uncover Robbery Crime Patterns

Incident Reports: Detailed records of each robbery, including date, time, location, and MO.

Victim Statements: Information on victim demographics, behavior, and relationship to the offender.

Offender Information: Characteristics of the suspect(s), if known, and any patterns in their behavior or MO.

Geospatial Data: Mapping of robbery incidents to identify hotspots or geographic trends.

Temporal Data: Analysis of the timing of robberies to identify patterns related to time of day, day of the week, or season.

Comparative Data: Comparison with historical data or data from other jurisdictions to identify broader trends or unique local patterns.

Improving Collection of Robbery Modus Operandi Information 

To improve the collection of modus operandi (MO) information on robberies, we need a systematic approach involving training, standardized procedures, and effective data management. Here's a breakdown of how to address this:

1. Training officers:
* Develop comprehensive training programs focusing on the importance of MO data.
* Conduct regular workshops on identifying and documenting MO elements.
* Provide real-case examples to illustrate the value of detailed MO information.
* Implement mentoring programs pairing experienced detectives with patrol officers.

2. Standardized data collection:
* Create detailed, user-friendly forms specifically for robbery MO information.
* Develop a checklist of key MO elements to ensure consistency.
* Implement digital data entry systems for easy recording and retrieval.
* Establish clear guidelines on what constitutes relevant MO information.

3. Information needed:
* Detailed description of the approach and initiation of the robbery
* Weapons used and how they were employed
* Verbal commands and specific phrases used
* Description of disguises or attempts to conceal identity
* Method of controlling victims
* Specific items targeted and selection process
* Escape method and route
* Any unique behaviors or actions during the crime
* Time, date, and duration of the robbery
* Environmental factors (lighting, security measures present, etc.)

4. Sources of information:
* Victim and witness statements
* Surveillance footage
* Physical evidence from the crime scene
* Social media and local community information
* Crime scene photographs and sketches
* Audio recordings (e.g., 911 calls)
* Forensic analysis reports
* Comparisons with similar cases in the area

5. Implementing technology:
* Utilize mobile devices for on-scene data entry
* Implement AI-assisted analysis tools to identify patterns
* Create a centralized database accessible to all relevant personnel
* Use data visualization tools to help officers see patterns across cases

6. Collaboration and information sharing:
* Establish regular briefings to discuss recent robberies and emerging MO trends
* Create inter-department task forces for analyzing and sharing MO data
* Develop partnerships with neighboring jurisdictions to share information
* Engage with federal agencies for broader pattern analysis

7. Incentivizing thorough data collection:
* Recognize officers who consistently provide detailed and useful MO information
* Demonstrate the value of good MO data by sharing success stories in solving cases
* Include MO data collection in performance evaluations

8. Regular review and update of procedures:
* Conduct periodic audits of MO data quality
* Solicit feedback from officers on the data collection process
* Stay updated on new criminal trends and adjust data collection accordingly

9. Engaging with the community:
* Educate the public on the importance of providing detailed information
* Develop anonymous tip lines specifically for MO-related information
* Work with local businesses to improve their ability to observe and report MO details

10. Leveraging academic partnerships:
* Collaborate with criminology departments for research on MO patterns
* Engage students in internships focused on MO data analysis
* Participate in academic studies to refine MO data collection methods

Monday, July 29, 2024

Carjackings

"Although carjacking is technically a form of robbery, carjacking is a hybrid offense because it draws from elements of both regular robbery and motor vehicle theft."

From the research article Carjacking: Scope, Structure, Process, and Prevention 


Bureau of Justice Statistics 2022 Report:

Carjacking Victimization, 1995–2021

"Key Findings

Based on 3-year moving averages, the rate of nonfatal carjacking victimization1 declined 78%, from 0.53 per 1,000 persons age 16 or older in 1995 to 0.12 per 1,000 in 2021 (figure 1).2

Over the past 10 years (2012–2021), the rate of nonfatal carjacking victimization has ranged from 0.09 per 1,000 persons to 0.15 per 1,000.

During 2012–21, nonfatal carjackings were more likely to take place at or near the victim’s home (39%) than in other locations.

The majority of nonfatal carjackings involved an offender with a weapon (59%). Offenders armed with firearms accounted for 38% of nonfatal carjackings.

Victims were as likely to resist the offender in a nonfatal carjacking (53%) as to not resist during the crime (47%). About one in four (26%) nonfatal carjackings resulted in victim injury.

Offenders in nonfatal carjackings were more likely to be strangers to the victim (64%) than known to the victim (26%).

Males were as likely as females to experience nonfatal carjackings (0.12 per 1,000 each).

Black persons (0.26 per 1,000) were more likely than white persons (0.07 per 1,000) and as likely as Hispanic persons (0.22 per 1,000) to experience nonfatal carjackings.

The rate of nonfatal carjacking victimization of persons in households with annual incomes of below $75,000 (0.16 per 1,000) was more than three times that of those in households with incomes of $75,000 or more (0.05 per 1,000)."


New York Times article:

Ohio Mother Killed Trying to Stop a Carjacking With Her Son Inside

Sunday, July 28, 2024

Guide to Preventing Violence, Robbery & Theft

 Guide to Preventing Violence, Robbery & Theft

"This booklet presents best practices drawn from organizations across Nova Scotia and Canada that will help you prevent workplace violence and deal with incidents effectively if they do occur. Most of the information in this booklet will be useful to both employers and employees; however, Section 3, Preventing Violence, is aimed specifically at employers. Section 4, Possible Scenarios in Retail, includes tips for both employers and employees."


Saturday, July 27, 2024

Crime Pattern Bulletin Template

The website www.policinginstitute.org offers a template for creating a crime pattern bulletin which you might find helpful.

See the link here.

Trends in Robbery: What You Need to Know

 The Council on Criminal Justice has published the fact sheet Trends in Robbery: What You Need to Know at this link.

"The rate of robberies reported to United States law enforcement agencies peaked in 1991, then dropped by 2020 to levels not seen since the early 1960s.

The majority of reported robberies involve a weapon, with a firearm being the most common weapon.

While both juvenile and adult arrest rates for robbery have declined since the 1990s, in 2020, the juvenile rate was about 65% higher than the adult rate.

Following a trend seen with other crimes, the clearance rate for robberies has dropped since the 1960s; in 2022, 23% of all robberies were cleared by law enforcement."

Friday, July 26, 2024

Specific Patterns

Here are some specific robbery-type patterns to consider as you analyze crimes:

 

Pattern: Purse Snatching (Robbery)

Perpetrators: mostly males but sometimes females, often lone criminals but also work in groups

Victims: primarily females of any age

Locations: primarily streets, sometimes in other public places 

Times: any time, most often when victim is alone without other observers nearby

Approach Methods: may come from behind, may use weapon, may knock victim to ground

Weapons: may use a weapon or threat of weapon, may assault victim

Tools: may cut purse straps

Vehicles/Transportation Routes: may target victims waiting at bus stops, train stations, on routes to bank or shopping

Stolen Goods: purse, contents of wallet, cash, credit cards

Method: a crime of opportunity, serial purse snatchers may use same MO

Motive: quick cash/profit, sometimes to feed drug habit

Query Terms: purse, bag, knapsack, handbag, strap

Suggestions: track all incidents of purse snatching robberies as these tend to be serial crimes, track all persons arrested for these crimes in case a series emerges where they are the perpetrators

***



Pattern: Carjacking

Perpetrators: suspects in need of quick transportation, suspects who want a vehicle to take to be stripped, suspects who are in gangs 

Victims: may be innocent persons, sometimes related to drug buying/dealing - victims who trade cars for a few hours to a drug dealer and call it a carjacking when they report the loss of their vehicle

Locations: more likely in large urban areas, near drug houses, at intersections when a vehicle is stopped, at gas stations, in parking lots 

Times: various times of day

Entry/Approach Methods: may bump car with another car to initiate opportunity, may be hiding and attack victim

Weapons: often occur at gunpoint or threat of gun not displayed

Vehicles/Transportation Routes: may use vehicle in crime and discard it in their own neighborhood

Stolen Goods: vehicle, sometimes rob victim of wallet/purse/belongings

Method: a carjacking involves robbery of a vehicle while people are in the vehicle and is often a violent crime, sometimes victims are kidnapped as well, in rarer instances crime may lead to sexual assault or murder

Motive: to obtain a vehicle, also may be a need for power, or a need to escape a scene or obtain a vehicle to use in a crime/to commit a crime

Query terms: vehicle, car, robbery, carjacked, carjacking, stopped at light (or sign), fled in victim's vehicle (or car)

Suggestions: it is important to track all carjackings in your area to uncover any sort of patterns; query your databases for stolen cars AND robbery to find all incidents of carjacking; track all known carjackers in your jurisdiction

***



Pattern: Bank Robberies

Perpetrators: variety of perps, from inexperienced (usually drug addicts) to professional (less common), may work alone or in teams

Victims: financial institutions, banks and credit unions

Locations: inside bank – ATM (automatic teller) crime may be involved as well

Times: varies, but serial robbers often follow a pattern in time of day, day of week

Entry/Approach Methods: perps may stake out banks, target banks with easy escape routes, generally robbers just walk in bank

Weapons: often use note with threat of weapon and no weapon is seen, sometimes gun is seen

Vehicles/Transportation Routes: vary, banks in strip malls and/or near highways may be targeted as more vulnerable, may have get-away car accomplice

Stolen Goods: cash – often with dye-pack

Method: suspect may ‘case’ bank undetected prior to robbery, may wear disguise, may bring bag for cash – type of bag may be similar in series so is something to track, may jump over counter, may force victims to the ground, may target same type bank branches, tends toward becoming a serial crime if suspect has success, may be multiple suspects

Motive: cash

Query terms: bank, credit union, safe, unlock, alarm, vault, safety deposit, deposit, names of banks

Suggestions: Map all banks in your jurisdiction, including credit unions. If possible, get data on ATMS, track all known bank robbers on parole in your jurisdiction – know their MO. Familiarize yourself with bank robbery prevention techniques.

***



Pattern: Cab/Taxi /Ride share Driver Victims

Perpetrators: Usually lone males, sometimes two or more males

Victims: Cab/taxi/rideshare drivers

Locations: Usually in a city

Times: Late at night, infrequently in daytime

Entry/Approach Methods: When fare is dropped off, victim is robbed by the fare – sometimes robbery occurs during the ride

Weapons: more often gunpoint, sometimes knifepoint

Vehicles/Transportation Routes: suspects will more often be let out of cab at an intersection rather than a particular address

Stolen Goods: cash, sometimes wallet

Method: robbery occurs during normal course of cab ride – suspect calls cab or hails cab and then robs victim, suspect may wear a disguise, sometimes violent

Motive: crime of opportunity, sometimes becomes a series of crime

Query terms: cab, taxi, fare, driver, meter, Uber, Lyft, rides hare, backseat

Suggestions: Track all robberies of this type in one file to note a series of crimes early. Analyze by company, by time of day, by geography, by weapon, by suspect(s) description, by victimology (old driver? young? race?). Track where rides begin and where they end. 

***



Pattern: Food Delivery Person Robberies

Perpetrators: Most often lone males or small groups of males, often teens

Victims: pizza delivery persons, Chinese restaurant delivery persons

Locations: driveways, alleys, sometimes at vacant houses, sometimes hide in buses, hallways

Times: most often in the evening

Entry/Approach Methods: suspects may attack delivery person from behind or lure them to door of building they do not inhabit and rob them

Weapons: food delivery robberies are often committed at gunpoint. Victims are sometimes assaulted, but usually escape physically unharmed.

Tools: suspect may call to order food using cell phones they purchase and then discard – sometimes they use their own phones which then can be traced

Vehicles/Transportation Routes: suspects often flee on foot.

Stolen Goods: Suspect usually take the money, or both money and food. Rarely do they just take the food.

Method: suspects order food by telephone and rob delivery person

Motive: quick cash, sometimes related to gang activity

Query Terms: pizza, food, delivery, Chinese, names of food delivery services, restaurant, lure , order, driveway, alley, porch, hallway, vacant

Suggestions: Map all your restaurants and pizzerias – differentiate between types of restaurants. Keep track of all food delivery robberies. Keep track of all individuals arrested for such robberies and their MOs for future reference. Some robbers wear masks, hide behind bushes, act in groups. Look for serial crimes whenever you have an “outbreak” of such crimes. Look for repeat targeting of pizzerias/restaurants. Work on target-hardening suggestions.

***



Pattern: Jewelry Store Theft (Larceny, Burglary, Robbery)

Perpetrators: often teams, often are professional thieves

Victims: jewelers, department stores

Locations: jewelry stores and jewelry counters at other types of stores

Times: no specific time pattern

Entry/Approach Methods: may case store, may come in one day and come back another, operate in pairs or more

Weapons: may be armed, often use ruses, sometimes jewelry store robberies escalate to murder if there is resistance

Tools: burglary tools in burglaries, have been known to smash vehicles into stores to grab items

Vehicles/Transportation Routes: jewelry theft rings travel across jurisdiction

Stolen Goods: jewelry, precious metals

Method: distraction, returning purchases with counterfeit jewels, need for a fence for jewelry, smash and grabs, may cut security gates, may disable alarms

Motive: profit

Query Terms: jewelry, gold, diamond, silver, platinum, emerald, ruby, sapphire, pearl, distract, counter, grab, fake

Suggestions: track all jewelry thefts – even residential, looking for patterns, find out where fencing of jewelry may take place, track known criminals of this type

***


Wednesday, July 24, 2024

A Low-Tech Way to Track Robbery Patterns

 


An example Excel workbook worksheet for metal theft (a larceny) can be found at this link.

Note that in the video I did not name all the fields to track - add any you want in your workbooks. Make sure you back up files often so that you do not lose all your work.

Tuesday, July 23, 2024

Stolen Goods Markets

In examining burglary patterns, it is useful to consider the markets for the stolen goods.

Read this guide to find out more about this topic:

Sutton, M. (2010). Stolen Goods Markets, Problem-Specific Guide Series No. 57.  Problem-Oriented Guides for Police Series, Washington, DC: Office of Community Oriented Policing Services, U.S. Department of Justice. Available at: https://popcenter.asu.edu/content/stolen-goods-markets-0


Pharmacy/Drugstore Robberies

The May 2016 article from Pharmacists Mutual (at this link) states that:

The Offender: Pharmacy robbers and burglars are most often white (90%), male (96%) and older than the typical offender (i.e., mid-20s to mid-40s, average 34). The majority has a high school education (40%) and were employed (61%) at the time of the crime. 78% of offenders had a prior criminal history of which 38% involved a pharmaceutical nexus.

How they View Pharmacies: Offenders viewed pharmacies as banks. Given a limited supply and a high street value for CPDs, the rewards that one received from the crime outweighed perceived risks. As one offender put it, “”¦to be honest with you pharmacies are better than banks. They are. They’re better than banks. It’s the only place of business in today’s society that you can go in and steal the product that it offers and get more than what it’s worth.”

The Pharmacies they Target: 42% of the offenders targeted a locally owned or “ma and pop” store. The majority (72%) reported they had visited the targeted pharmacy before the crime and most did so while filling a prescription.

See the Problem-Oriented Policing guide "Robbery of Pharmacies" at this link

See the Pharmacists Mutual Insurance Companies report "Pharmacy Crime" at this link.







Sunday, July 21, 2024

And More Possible Elements of Robbery Patterns

Entry and exit points: Some robbers may consistently prefer certain types of entry and exit points. For example, always using back doors, fire exits, or windows. This choice can be based on factors like ease of access, reduced visibility, or quicker escape routes.

 Time between robberies: The frequency of crimes can be part of an MO. Some robbers might have a consistent pattern of time between offenses, whether it's days, weeks, or months. This could be related to financial needs, risk management, or even superstitious beliefs.

Victim handling: How robbers interact with victims beyond initial demands can be distinctive. Some might consistently isolate certain types of victims (e.g., managers or security personnel), while others might have specific methods of restraining or positioning victims.

Evidence elimination: Specific techniques for avoiding leaving evidence or eliminating it after the fact can be part of an MO. This might include wearing gloves, using bleach to clean surfaces, or destroying security footage in a particular way.

Vehicle use patterns: For robbers who use vehicles, there might be consistent patterns in the types of vehicles chosen (e.g., always stolen vehicles, or always non-descript sedans), or in how vehicles are acquired and disposed of.

Escalation or de-escalation patterns: Some robbers might show a consistent pattern of escalating their crimes over time, becoming more violent or ambitious. Others might show a de-escalation pattern, perhaps becoming more cautious after close calls.

Reaction to resistance: How a robber consistently responds to unexpected resistance or non-compliance from victims can be a key part of their MO. Some might immediately resort to violence, others might flee, and some might have rehearsed verbal responses.

Use of written notes: In some robberies, particularly bank robberies, the use of written demand notes is common. The content, handwriting, and delivery method of these notes can be highly characteristic.

Specific verbal commands or phrases: Beyond general verbal strategies, some robbers might consistently use very specific phrases or commands, almost like a script.

Target acquisition radius: The geographic range in which a robber operates can be part of their MO. Some might consistently travel long distances to commit crimes, while others stick to a small, familiar area.

Response to alarms or intervention: How a robber consistently reacts to triggered alarms, unexpected arrivals, or law enforcement intervention can be a defining part of their MO.

Seasonal patterns: Some robbers might be more active during certain seasons, whether due to financial pressures (like holiday expenses) or environmental factors (like darker winter evenings).


Saturday, July 20, 2024

More About What Robbers Steal

 Further elaboration on the patterns and implications of what robbers choose to steal:

1. Cash: The approach to stealing cash can be highly revealing:

* Robbers who only take loose cash from registers might be opportunistic or inexperienced.

* Those who come prepared to access safes or time-lock devices show more planning and possibly insider knowledge.

* Some robbers might have a specific amount they aim for, stopping once they reach it. This could indicate a particular financial need or an attempt to stay under certain legal thresholds.

* The denominations taken can be telling - some might avoid dye packs or marked bills, showing sophistication.

* Seasonal patterns in cash theft, like targeting businesses after major shopping days, indicate strategic thinking.

2. Jewelry and precious metals: The specifics of jewelry theft can indicate a robber's expertise:

* Targeting only certain types of gems or metals might suggest connections to specific black markets.

* Some robbers might bring tools to quickly assess the authenticity and value of items, showing preparation and knowledge.

* The choice between taking many small items versus a few high-value pieces can reflect different risk assessments and fencing capabilities.

* Robbers who target jewelry but ignore watches (or vice versa) might have specific resale channels or limitations.

3. Electronics: The evolution of electronic theft reflects broader technological trends:

* Some robbers might focus on stealing unlock codes or forcing biometric unlocks, showing awareness of device security.

* Targeting components (like computer chips) rather than whole devices can indicate connections to specialized black markets.

* The preference for certain brands or models might reflect current market demands or ease of resale.

* Some might specifically seek devices with corporate data, suggesting more sophisticated motives beyond simple resale.

4. Pharmaceuticals: Pharmaceutical theft patterns can reveal much about drug market dynamics:

* Shifts in targeted medications can reflect changes in street drug preferences or law enforcement pressures.

* Some robbers might have very specific lists, suggesting pre-orders from dealers or users.

* The quantity taken can indicate whether it's for personal use, small-scale distribution, or larger trafficking operations.

* Ignoring opioids in favor of other drugs might suggest changing addiction patterns or market saturation.

5. Personal information: The targeting of personal data shows the evolving nature of crime:

* Some robbers might prioritize devices or documents with personal information over more traditionally valuable items.

* The specific types of information sought (financial, medical, corporate) can indicate different criminal objectives.

* Methods used to quickly access or copy data during a robbery can show technological sophistication.

6. Specific high-value items: Specialization in unique or rare items reveals a different criminal profile:

* Such robbers often have extensive knowledge of niche markets and may work on commission.

* The level of care taken with these items during the robbery can indicate expertise and potential connections to collectors.

* Some might target items more for their cultural or historical value than monetary worth, suggesting different motivations.

7. Vehicles: Vehicle theft as part of robberies has its own patterns:

* Some robbers might have preferences for vehicles that are easy to hotwire or have common keys.

* Targeting specific models could indicate connections to chop shops or export operations.

* The treatment of the vehicle (abandoned quickly vs. kept for resale) can show different levels of organization.

8. Combination approaches: The order and method of taking multiple types of items can be revealing:

* A systematic approach might indicate military or law enforcement background.

* Seemingly random grabbing of items could suggest desperation or inexperience.

* Some might have a primary target but take other items as a distraction or to mislead investigators.

9. Unusual or specific items: The theft of odd or very specific items can be particularly intriguing:

* It might indicate a contract theft for a collector or rival business.

* In some cases, it could be related to espionage or corporate sabotage.

* Occasionally, it might reveal personal obsessions or fetishes of the robber.

10. Nothing taken: Cases where nothing is stolen despite the opportunity can be complex:

* It might indicate a novice robber who panicked.

* In some cases, it could suggest the robbery was a cover for another crime (like planting surveillance devices).

* Rarely, it might be part of a larger pattern of intimidation or terrorism.

Thursday, July 18, 2024

Consider: How Did the Robber Approach the Victim

A robber may use similar methods to approach victims in a series of robberies. Consider this variable when examining robbery and victim interview reports. 

From the book Elements of Crime Patterns:

Approach Variables Examples:

Followed victim: hid in victim’s vehicle, used third person to lure victim, made contact by telephone, made contact on social media, made contact by email, administered drug, stalked

By surprise: awakened victim, forceful sudden entry, lay in wait in building, lay in wait in vehicle, lay in wait outdoors, threatened with weapon

By blitz (direct, immediate assault): choked victim, hit victim with hand and/or fist, hit victim with clubbing weapon, shot victim, stabbed, or cut victim


Wednesday, July 17, 2024

SWOT Analysis: Disrupting a Robbery Series

The primary role of a law enforcement analyst is to be a thinker. Don't rule out newer technology like Chat GPT as an aid to your thinking just because it cannot be used with police data, which must be guarded from misuse. Here is an example of one way to use it.


I asked Chat GPT this:

Do a SWOT analysis on the best ways to disrupt a robbery series. 


Result: 


SWOT Analysis: Disrupting a Robbery Series


Strengths


High-Tech Surveillance:

Capability: Advanced surveillance systems, including AI-driven cameras and facial recognition technology, provide real-time monitoring and evidence collection.

Impact: Enhances the ability to identify suspects quickly and accurately, leading to faster apprehensions.


Data-Driven Policing:

Capability: Utilizes crime data analysis to predict and prevent future robberies by identifying patterns and hotspots.

Impact: Enables proactive deployment of resources and targeted interventions in high-risk areas.


Community Engagement:

Capability: Strong relationships with community members foster trust and encourage information sharing.

Impact: Increases the likelihood of tips and cooperation from the public, aiding in the identification and apprehension of suspects.


Collaboration with Other Agencies:

Capability: Partnerships with local, state, and federal law enforcement agencies enhance resource sharing and coordination.

Impact: Strengthens investigative efforts through combined expertise and resources.


Weaknesses


Resource Limitations:

Challenge: Limited personnel and budget constraints can hinder comprehensive surveillance and investigative efforts.

Impact: May lead to gaps in coverage and slower response times, allowing robbers to exploit vulnerabilities.


Training Deficiencies:

Challenge: Inadequate training in new technologies and data analysis techniques for law enforcement personnel.

Impact: Reduces the effectiveness of high-tech tools and data-driven strategies.


Bureaucratic Hurdles:

Challenge: Slow decision-making processes and rigid protocols can delay the implementation of innovative strategies.

Impact: Prevents timely responses and adaptations to evolving robbery patterns.


Community Distrust:

Challenge: Historical tensions and mistrust between law enforcement and certain communities can impede cooperation.

Impact: Reduces the flow of crucial information and support from the public.


Opportunities


Advancements in Technology:

Opportunity: Continued development of AI, predictive analytics, and mobile apps for real-time reporting and monitoring.

Impact: Enhances the precision and speed of identifying and disrupting robbery series.


Policy Reforms:

Opportunity: Legislative changes that support innovative policing strategies and community-based approaches.

Impact: Provides a more flexible and responsive framework for law enforcement efforts.


Public Awareness Campaigns:

Opportunity: Educational initiatives to inform the public about the importance of reporting suspicious activities and cooperating with police.

Impact: Increases community vigilance and participation in crime prevention.


Interagency Information Sharing:

Opportunity: Improved communication and data sharing between law enforcement agencies and private security firms.

Impact: Creates a comprehensive and cohesive approach to disrupting robbery series.


Threats


Evolving Criminal Tactics:

Threat: Robbers continuously adapt their methods to circumvent law enforcement strategies.

Impact: Makes it challenging to maintain effective preventive measures and stay ahead of criminals.


Cybersecurity Risks:

Threat: Increased reliance on technology exposes systems to cyber-attacks and data breaches.

Impact: Compromises sensitive information and operational capabilities.


Legal and Privacy Concerns:

Threat: Public concerns about surveillance and data privacy can lead to restrictions on law enforcement practices.

Impact: Limits the use of certain technologies and techniques, reducing effectiveness.


Economic and Social Factors:

Threat: Economic downturns and social unrest can lead to an increase in criminal activities, including robberies.

Impact: Strains law enforcement resources and complicates efforts to disrupt robbery series.

Tuesday, July 16, 2024

Book Interview


I discuss my book Elements of Crime Patterns and crime patterns themselves with coach, trainer, and analyst Dawn Reeby.

Sunday, July 14, 2024

Robbery Prevention Tips

The law enforcement sources below have provided tips for robbery prevention. 

See Palm Beach County Sheriff's Robbery prevention and awareness training at this link.

See Douglas County Sheriff's Bank Robbery Prevention at this link.

See Orange County Sheriff's Bank Robbery: Prevention and Awareness at this link.

See Kansas City (MO) Police Department Robbery Prevention Tips at this link.

See Houston Police Department's Robbery Prevention flyer at this link.

See Lee County Sheriff's Office A Guide to Robbery Prevention and Response at this link.

See Euclid Police Department's Robbery Prevention & Awareness at this link.



Thursday, July 11, 2024

Consider: What was the Robber Saying?

Robbery suspects are people with habitual ways of speaking and specific verbal styles that may be repeatedly used when committing crimes. One may identify a robbery pattern by including these variables for analysis.

Sometimes a suspect uses the same phrase in crimes, such as "I am sorry to do this" or "Get down on the floor, motherf****r." This reuse of a phrase, along with other similar modus operandi variables, can help one infer crimes are related to one another.

From the book Elements of Crime Patterns:

Speech/Voice: did not speak, flat affect, foreign accent, high-pitched voice, lisp, loud, monotonous, mumbled, nasal, quiet, regional pronunciation or accent, slurred words, soft-spoken, sounded drunk, sounded high, sounded intoxicated, stuttered, talkative, talked quickly, talked slowly, whispered, used profanity, used quotable statement, used unique words, used unique phrases

Verbal Demeanor: apologetic, commanding, concerned, complimentary, demanding, derogatory, ego-satisfying, hostile, inquisitive, knowledgeable, negotiating, nervous, neutral, personal, polite, profane, reassuring, rude, self-demeaning, threatening


Wednesday, July 10, 2024

Robberies: 44 in 2 months this series!

 


In this series, the robbery crew of 4 (3 adults and 1 juvenile) operated all over Los Angeles primarily stealing scratch-off lottery tickets from 7-11 stores 44 times over a period of 9 weeks. The total value of what they stole, inclduding other retail items, was $250,000.

Similar elements of this crime pattern:
  • targeted item: lottery tickets
  • specific location: 42 sites were 7-11 convenience stores, the other two were also at convenience stores
  • method: strong-arm robberies rather than use of weapon
  • suspects: multiple rather than one
There may be other similar elements not indicated in the video and articles below, such as time of day, vehicles used, nuances in suspect descriptions, words used by robbers, time of day patterns, etc.

The goal of law enforcement is to end such a series as soon as possible once it is identified. Early identification is crucial as well.

You can read more about this series here: 



Tuesday, July 9, 2024

Share Your Robbery Patterns

Robbery patterns cross jurisdictions, thus it is crucial to share those you uncover. Newsletters and bulletins are standard methods of sharing.

Here is an example of how that can work.








Monday, July 8, 2024

Robbery and Recidivism

According to the report Federal Robbery: Prevalence, Trends, and Factors in Sentencing, "Robbery offenders have criminal histories that are more extensive and more serious than other violent offenders." 

From a thirty-year old study, Recidivism of Prisoners Released in 1994, used for statistics in the article on "Recidivism" on Wikipedia:

Released prisoners with the highest rearrest rates were —

robbers (70.2%)

burglars (74.0%)

larcenists (74.6%)

motor vehicle thieves (78.8%) possessors/sellers of

stolen property (77.4%) possessors/sellers of

illegal weapons (70.2%)

~

Rearrest does not mean a convicted robber was released and then committed another robbery - their offense could be drug-related or for another crime. That said, in some cases, those convicted of robbery do get out of jail/prison and commit other robberies.

See an example at this link.

We in the United States do not track a criminal's modus operandi as part of their official record, and thus find it harder to link crimes to their preferred methods if they use them in another crime pattern.

As an analyst or an intelligence officer, it is important to track the modus operandi of the arrested and convicted for robbery.

~

Read more about robbery and recidivism here:

Robbery, Recidivism, And The Limits Of The Criminal Justice System



Sunday, July 7, 2024

More Elements in Some Robbery Patterns

 


Timing of demand: The moment a robber chooses to reveal their intentions can be a crucial part of their MO. Those who wait until a transaction is in progress might do so to ensure cash drawers are open or to catch victims off-guard. Immediate demands upon entry might be chosen for speed or to maximize control of the situation from the outset. Some robbers might consistently time their demands to coincide with specific events, like shift changes or delivery times.

Use of hostages: While less common, hostage-taking can be a significant element of some robbers' MOs. This might involve detaining employees or customers, using them as leverage for demands or to secure escape. The method of selecting hostages (e.g., choosing managers or avoiding children) and how they're treated can be consistent across a series of robberies by the same perpetrator or group.

Insider information: Robbers who consistently use insider information might have a network of informants or a method for gathering intelligence. This could involve befriending employees, conducting extended surveillance, or exploiting personal connections. The type of information sought (e.g., security protocols, cash handling procedures) and how it's obtained can form a pattern.

Props or tools: The specific tools used can be highly characteristic. For example, a robber might consistently use a particular type of duffel bag for loot, specific lock-picking tools, or a certain style of disguise. The choice and use of these items can reflect planning, professionalism, or even personal quirks of the robber.

Communication methods: In group robberies, communication patterns can be distinctive. Some might use coded phrases, hand signals, or specific technology like earpieces or messaging apps. The complexity and consistency of these communication methods can indicate the level of planning and professionalism of the group.

Target victim demographics: Robbers who consistently target specific demographics might do so based on perceived vulnerability, expected wealth, or personal biases. For instance, targeting elderly victims, focusing on tourists in certain areas, or specifically choosing victims of a particular gender or ethnicity.

Distraction techniques: Specific distraction methods can become part of a robber's signature. This might include creating a diversion like setting off a fire alarm, using an accomplice to stage an argument or medical emergency, or employing sleight-of-hand techniques to misdirect attention.

Post-robbery behavior: The actions taken immediately after a robbery can be as distinctive as the robbery itself. This might include specific routes taken to leave the scene, methods of ditching identifiable clothing or weapons, or rituals like celebrating at a particular location. Some robbers might have a consistent pattern of lying low or, conversely, making conspicuous purchases soon after a crime.

Use of drugs or alcohol: The consistent use of substances can significantly impact the nature of the robberies. Drug-influenced robbers might display erratic behavior or excessive aggression. Those using alcohol might be more prone to mistakes or leaving evidence. The type of substance and its apparent effects can form part of the MO.

Signature elements: These non-essential actions can be highly individualistic. Examples might include leaving a playing card at the scene, quoting from a specific movie, or arranging items in a particular way. While often counterproductive from a criminal perspective, these elements can stem from psychological needs or desires of the perpetrator.

Method of selecting specific targets: The selection process might involve a consistent pattern of surveillance, perhaps always observing a target for a set number of days. Some robbers might have specific criteria, like only targeting businesses with a certain number of visible security cameras or choosing victims based on the type of car they drive.

Robbery duration: The length of time a robber spends at the scene can be a consistent element of their MO. Some might adhere to a strict time limit, perhaps tied to expected police response times. Others might take a more methodical approach, systematically searching for additional valuables beyond the initial target.

Friday, July 5, 2024

What Robbers Steal

 What robbers choose to steal is indeed a crucial aspect of their modus operandi and can provide significant insights into their motivations, planning, and overall criminal profile. 

1. Cash: This remains the most common target for many robbers due to its universal value and ease of use. However, the specific approach to cash can vary:

* Some robbers might focus only on easily accessible cash, like register contents.

* Others might target safes or vaults, indicating more planning and potentially inside information.

* The amount of cash taken can be telling - some might have a specific target amount, while others take whatever is available.

* Some robbers might specifically target businesses during cash-heavy periods, like after holiday sales.

2. Jewelry and precious metals: These are popular due to their high value-to-size ratio and relative ease of fencing:

* Some robbers might specialize in specific types of jewelry, indicating knowledge of the market.

* Others might focus on raw materials like gold or silver, which are easier to melt down and sell.

* The choice between targeting high-end jewelry stores versus pawn shops can indicate different levels of risk tolerance and expertise.

3. Electronics: Modern robbers often target electronic devices:

* Smartphones are common targets due to their ubiquity and resale value.

* Some might focus on easily portable items like laptops and tablets.

* Others might target shipments or warehouses for bulk electronic goods.

* The specificity of electronic targets (e.g., only taking certain brands) can indicate connections to specific resale markets.

4. Pharmaceuticals: This is a specialized target that often indicates a connection to drug trafficking:

* Some robbers might focus on specific high-value or addictive medications.

* Others might take whatever they can get, suggesting personal use or less organized resale plans.

* Targeting pharmacies versus delivery vehicles can indicate different levels of planning and risk assessment.

5. Personal information: Identity theft-motivated robberies are increasingly common:

* Some robbers might focus on stealing documents, credit cards, or digital devices specifically for personal information.

* Others might combine this with traditional theft, taking valuables as well as information-rich items.

6. Specific high-value items: Some robbers specialize in targeting particular high-value goods:

* This could include art, rare collectibles, or specific luxury goods.

* Such specialization often indicates a pre-arranged buyer or specialized knowledge of niche markets.

7. Vehicles: While carjacking is often considered a separate crime, some robbers incorporate vehicle theft into their MO:

* This might involve stealing getaway vehicles as part of the robbery.

* Some might target specific high-value vehicles as the primary object of the robbery.

8. Combination approaches: Many robbers don't limit themselves to one category:

* Some might have a primary target (like cash) but opportunistically take other valuable items.

* Others might have a systematic approach to taking a variety of items in a specific order.

9. Unusual or specific items: Sometimes, robbers target items that seem odd or overly specific:

* This could indicate a pre-arranged theft for a specific client.

* It might also suggest personal motivations beyond financial gain.

10. Nothing: In some cases, robbers might leave without taking anything:

* This could be due to interruption or unexpected resistance.

* In rare cases, it might indicate that the primary motive was not theft (e.g., intimidation or thrill-seeking).

The choice of what to steal can reveal much about the robber:

* Level of planning and preparation

* Knowledge of markets and resale opportunities

* Connections to larger criminal networks

* Personal addictions or financial pressures

* Risk tolerance and experience level

Thursday, July 4, 2024

Consider: What was the Robber Wearing?

The suspect description in a robbery can be useful in linking crimes into a possible pattern. Sometimes the suspect wears the same items over and over again, such as in the case of a robbery series of fast food restaurants where the suspects wore an orange coat.

Hats, footwear, shirts with logos, and glasses are exmaples of things people repeatedly wear, but sometimes other clothing and accessories show up in more than one crime in a pattern. 

From the book Elements of Crime Patterns:

Example clothing and accessories variables:

Hat: color, style, logos, ornaments, how it is worn (bill forward, backward, to one side), (baseball cap, beanie, fedora, headscarf, hijab, sunhat) 

Coat: color, style, hood, buttons, fasteners, pockets (suit coat, jacket, topcoat, overcoat)

Shirt/Sweatshirt/Blouse/Dress: color, design, pattern, sleeves, collar, buttons, fasteners, length

Trousers/Pants/Slacks/Skirt: color, pattern, style, cuffs, buttons, fasteners, length

Belts/Suspenders: color, buckles, style

Leggings/Tights/Socks: note color, pattern, length

Footwear: color, style, brand name for sneakers, laces, condition, (shoes, sneakers, boots, sandals, clogs, crocs)

Accessories: sweater, scarf, gloves, necktie, sunglasses, glasses, purse, bag, backpack, briefcase, fanny-pack

Jewelry: rings (note what finger worn on), watch (note what arm worn on), bracelets, necklaces, ankle bracelet piercing jewelry, earrings, nose ring, pins

Clothes General Appearance: neat or sloppy, clean or dirty,  rips, tears, stains in clothing – note location, worn-out shoes/sneakers

Oddities: clothing too large or too small, odd colors, patchwork, badges

Layering of clothes

Facial covering


Wednesday, July 3, 2024

Examples of Serial Robberies

Below are a few examples of serial robbery cases. Notice how important specific details are in linking such crimes.

Serial armed robbery suspect may be tied to 50 cases in western Washington

A pair of unique looking shoes helped link some of the above cases of robbery.

Police identify 14 suspects, including ringleader from Venezuela, in NY robbery spree

The above robberies involved suspects driving mopeds or scooters and stealing purses and cellphones, similarities that helped link the crimes. that were widespread - in every borough of New York City.

Romanian men posed as immigration agents to rob Latino workers in Orange County, authorities say

The above robbers impersonated immigration agents and threatened to deport Latino street vendors and day laborers.

Crime Stoppers Featured Case #19-02 - Serial Robberies

In the above series, twelve thefts and robberies were similar in that they targeted elderly Asian women carrying purses.

Tuesday, July 2, 2024

Key Elements in Robbery Patterns

Here are some key elements in robbery patterns:

Weapon choice: 

The selection of weapons can vary widely among robbers. Firearms are often chosen for their intimidation factor, but they also carry higher legal penalties if caught. Knives or other edged weapons are sometimes preferred for their concealability. Some robbers use replica or toy guns to reduce legal risk while maintaining the threat level. Blunt objects or even improvised weapons might be used in opportunistic robberies. The choice often reflects the robber's access to weapons, their level of commitment to violence, and their assessment of what will be most effective in controlling victims.

Approach tactics: 

Robbers employ various strategies to initiate their crimes. The surprise attack involves suddenly confronting the victim, often from behind or around a corner, to maximize shock and compliance. The deception approach might involve asking for directions or the time before revealing criminal intent. Some robbers pose as authority figures or service personnel to gain trust and access. In business robberies, robbers might enter as apparent customers before revealing their intentions. The choice of approach often depends on the target type and the robber's personal style.

Verbal strategies: 

The language used during a robbery can be highly characteristic. Some robbers use aggressive, threatening language to instill fear and ensure compliance. Others might adopt a calmer tone, attempting to minimize panic and reduce the likelihood of resistance or calling attention to the crime. Specific phrases or demands can become part of a robber's signature. For example, consistently using phrases like "This is a robbery" or specific instructions like "Put the money in a bag" can form part of the MO.

Target type consistency: 

Many robbers specialize in particular types of targets based on factors like perceived ease, expected payoff, and familiarity. Some focus on businesses like convenience stores or gas stations, which often have cash on hand and may be open late with few staff. Others might target individuals on the street, choosing areas known for wealthy pedestrians or tourists. Bank robberies, while less common, are often committed by individuals who specialize in this high-risk, potentially high-reward target. The consistency in target selection can be due to the robber developing expertise in a particular type of robbery or feeling more comfortable with familiar scenarios.

Time and location patterns: 

Robbers often have preferred times and locations for their crimes. These patterns might be based on factors like the availability of targets, reduced police presence, or the cover of darkness. For example, street robbers might operate primarily in the evening when there are still pedestrians but visibility is lower. Commercial robbers might target businesses at opening or closing times when cash handling occurs. Location patterns could involve focusing on specific neighborhoods, near transit hubs, or in areas with quick escape routes.

Escape methods: 

The way a robber leaves the scene is often a crucial and consistent part of their MO. Some prefer to escape on foot, relying on their knowledge of the area to evade capture. Others might use a vehicle, which could be their own, stolen, or driven by an accomplice. Public transportation can be used as it allows for blending into crowds quickly. Some robbers might have pre-planned routes, while others might improvise based on circumstances. The choice of escape method often reflects the robber's resources, local knowledge, and risk assessment.

Number of perpetrators: 

The decision to work alone or with others is a significant aspect of a robbery MO. Solo robbers might prefer the simplicity and reduced risk of betrayal, while groups can provide more control over the situation and potential lookouts. Pairs are common, with one person typically taking a more active role while the other watches for threats or manages the escape. Larger groups might be involved in more complex operations, like armored car robberies. The number of perpetrators often correlates with the scale and complexity of the target.

Level of violence: 

The degree of force used can be a consistent element in a robber's MO. Some rely purely on the threat of violence, never actually engaging in physical harm. Others might use minimal force, such as pushing or restraining victims. On the extreme end, some robbers consistently use severe violence as a means of control or even as a primary motivation alongside the theft. The level of violence can be influenced by factors like the robber's personality, past experiences, and assessment of what's necessary to accomplish their goals.

Use of disguises: 

Concealment of identity is often a key concern for robbers. Some might consistently use full face coverings like masks or balaclavas. Others might opt for less conspicuous methods like sunglasses and hats. Some robbers might use more elaborate disguises, such as wigs or fake beards. The choice of disguise often balances the need for anonymity with the desire to avoid drawing attention before the robbery begins. Consistent use of certain disguise elements can become part of a robber's signature MO.

Technology use: 

In the modern era, technology plays an increasing role in robbery MOs. Some robbers might consistently use technology to their advantage, such as using social media to identify potential targets or their schedules. Others might focus on disabling security systems or surveillance cameras as part of their method. On the flip side, some robbers might deliberately avoid areas with known camera coverage or eschew personal technology use to minimize digital evidence. The use or deliberate non-use of technology can be a defining aspect of a robber's MO in today's world.

Monday, July 1, 2024

Robbery

This month I will be covering the elements of robbery patterns in depth and, by the end of the month, I will have covered the elements of robbery patterns extensively, including examples of serial robberies and related resources for readers.

Robbery serial patterns are more easily identified than most crime patterns. A robbery has a witness who often can provide information on the offender(s) description, approach, and characteristics, as well as vehicle description (if relevant), the weapon(s) used, exact time and place, and what specific property was taken. Thus, commonalities are easier to find for crime pattern identification.

This month I will present the elements of robbery patterns in various ways, which will have some repetition. This repetition will help you look at the variables from different angles. I use material from my book as well as the results from LLMs such as Chat-GPT and Claude.

~

This is the short chapter "Robbery" in the book "Elements of Crime Patterns:"

Robbery is the unlawful taking of property from another person through force or intimidation.

Robbery serial patterns are more easily identified than most crime patterns. A robbery has a witness who can provide information on the offender(s) description, approach, and characteristics, as well as vehicle description, the weapon(s) used, exact time and place, and the property was taken. Thus, commonalities are easier to find for crime pattern identification.

Robbery MO Variables

Objectives:

Financial Gain: The most common motive is the immediate acquisition of money or valuable goods.

Resource Funding: In organized crime or terrorist activities, robbery can serve as a way to fund other operations.

Intimidation or Power: Some robbers are motivated by the psychological gain involved in risking and confrontation.

Planning and Organization:

Target Selection: Whether targeting an individual, a residence, or a commercial establishment, robbers may scout locations for vulnerabilities.

Timing: Robberies often happen when victims are most vulnerable—early mornings, late nights, or during particular events.

Accomplices: More organized robberies might involve multiple individuals with defined roles such as lookouts, drivers, and the primary robber.

Technical Framework:

Weapons: The use of weapons, like guns or knives, is common to intimidate victims into compliance.

Disguise: Masks, fake uniforms, or other disguises may be employed to conceal identity.

Communication: In-group communication may involve untraceable phones, coded language, or hand signals.

Execution:

Approach Method: This may vary from a stealthy, surprise attack to a confrontational approach.

Escape Plan: A well-thought-out escape route or vehicle may be arranged in advance.

Diversion Tactics: Distractions or other diversions may be used.

Intermediaries:

Fencing Operations: Stolen goods are often quickly sold or traded through intermediaries.

Financiers: In some cases, particularly in organized crime, a financier may back the operation in return for a cut of the proceeds.

Legal Evasion:

Changing MO: To avoid detection, a robber may change their methods or targets periodically.

Alibis: False alibis may be prepared in advance to deflect suspicion.

Counter-Surveillance: Measures might be taken to detect and avoid police or security presence.

Aftermath:

Laundering: Cash or valuable items may be laundered through various means to make them difficult to trace.

Relocation: Perpetrators might leave the area or even the country to avoid capture, especially after high-stakes robberies.


Serial Robbery Type Examples

ATM Robberies: These involve targeting individuals withdrawing money from ATMs. It can be done opportunistically or  by carefully observing a target. Serial offenders might choose the same type of location (isolated, poorly lit) and time (usually late at night) for their crimes. Series of these crimes usually follow a pattern based on the types and locations of targeted ATMs.

Bank Robberies: These include robberies of credit unions, location is often in a commercial or shopping district, mostly male offenders who target branch offices at the counter, offender often presents a note to the bank teller that demands money and implies or explicitly states that the robber is armed, may exploit knowledge of bank procedures and layouts. 

 Carjacking: This is stealing a person's vehicle while they're in it, most often one person in the car, offender most often has a weapon, may target specific models of cars, locations, or times of day, more likely to occur at or near person’s home, males, and females equally targeted. 

Cash-in-Transit Robberies: Offenders target vehicles moving cash or other valuables between locations, may use force and/or weapons to overpower the drivers, possibly organized crime group. 

Convenience Store Robberies: These may involve one or two individuals who rob small retail stores during late-night hours when fewer witnesses are around, may use firearms or other weapons, and typically target cash registers or safe boxes. May have a repeat offense pattern of location, time, and modus operandi, often armed robberies, due to the late operating hours and often minimal security measures, may work quickly, threatening staff, and take cash from registers or safes

Delivery Person: Delivery persons are often alone and may be more susceptible when carrying goods or cash. The offender intercepts the delivery person at the delivery point, or earlier, sometimes posing as a customer.

Delivery Truck Robberies/Hijackings: This form of robbery involves the interception and robbery of delivery trucks; criminals often operate in teams and have inside information about delivery routes and schedules.

Gas Station Robberies: Criminals often target gas stations due to the consistent cash flow and often minimal security. Serial robbers might target stations along specific highways or regions, and usually, act quickly, often armed. Serial robbers frequently target gas stations because they're often open late and staffed by a single clerk. 

Home Invasions: This involves breaking into houses when they are occupied, often threatening and sometimes assaulting residents and stealing valuables. The serial home invader may prefer a specific neighborhood or type of home and often develops a consistent method of entry and escape. They may use a ruse to gain entry.

Liquor Store Robberies: Like convenience store robberies, these target small liquor stores. These crimes might follow patterns concerning time (often after dark), location (isolated areas), and method (quick, sometimes violent).

Pharmacy Robberies: Criminals might target pharmacies for prescription drugs to use or sell. Serial pharmacy robbers may have a consistent strategy, such as presenting fraudulent prescriptions before resorting to threats or violence and may target chains in similar locations. They may also use disguises or wear hats and sunglasses to avoid being recognized by CCTV cameras.

Purse Snatching: This involves stealing women's purses directly from their persons. Serial purse snatchers might target specific locations (like shopping malls or parking lots) and use consistent methods. Commonalities in approach method can help link crimes.

Restaurant Robberies: These occur in restaurants, especially fast-food restaurants, often at closing time when the day's earnings are still on the premises. Serial restaurant robbers might target the same chain or similar types of establishments, often with a consistent strategy. 

Retail Store: These involve robbers who specialize in specific types of retail stores, such as electronics or jewelry stores, where stolen items may be resold easily in the black markets.

Street Robberies: This involves robbing individuals in public spaces, typically involving a threat of violence. Serial muggers might target specific types of victims (tourists, older individuals) or certain locations, often late at night. 

Taxi Driver  Robberies: Taxi drivers are targeted because they have contact with many strangers or people they do not know well, often work in high-crime areas, may carry cash with them in an unsecured manner and handle money as payment, usually work alone, often go to, or through, isolated locations, often work late at night or early in the morning . With ride-share alternatives available, taxi driver robberies may be less likely; ride share drivers are also targeted for robbery. Offenders can create fake profiles to use their services and target them. 



Impersonation, Lies, & Disguise

Sometimes offenders gain the trust of victims through means of deception.  They use disguises to avoid identification. Deception and disguis...