Gregory Saville:

"This book is a breakthrough for the science of crime and prevention and for the criminological enterprise – both academic and practitioner. Osborne has made a contribution of considerable weight. This is a book you should read."

Qualitative Crime Pattern Identification

Sunday, July 7, 2024

More Elements in Some Robbery Patterns

 


Timing of demand: The moment a robber chooses to reveal their intentions can be a crucial part of their MO. Those who wait until a transaction is in progress might do so to ensure cash drawers are open or to catch victims off-guard. Immediate demands upon entry might be chosen for speed or to maximize control of the situation from the outset. Some robbers might consistently time their demands to coincide with specific events, like shift changes or delivery times.

Use of hostages: While less common, hostage-taking can be a significant element of some robbers' MOs. This might involve detaining employees or customers, using them as leverage for demands or to secure escape. The method of selecting hostages (e.g., choosing managers or avoiding children) and how they're treated can be consistent across a series of robberies by the same perpetrator or group.

Insider information: Robbers who consistently use insider information might have a network of informants or a method for gathering intelligence. This could involve befriending employees, conducting extended surveillance, or exploiting personal connections. The type of information sought (e.g., security protocols, cash handling procedures) and how it's obtained can form a pattern.

Props or tools: The specific tools used can be highly characteristic. For example, a robber might consistently use a particular type of duffel bag for loot, specific lock-picking tools, or a certain style of disguise. The choice and use of these items can reflect planning, professionalism, or even personal quirks of the robber.

Communication methods: In group robberies, communication patterns can be distinctive. Some might use coded phrases, hand signals, or specific technology like earpieces or messaging apps. The complexity and consistency of these communication methods can indicate the level of planning and professionalism of the group.

Target victim demographics: Robbers who consistently target specific demographics might do so based on perceived vulnerability, expected wealth, or personal biases. For instance, targeting elderly victims, focusing on tourists in certain areas, or specifically choosing victims of a particular gender or ethnicity.

Distraction techniques: Specific distraction methods can become part of a robber's signature. This might include creating a diversion like setting off a fire alarm, using an accomplice to stage an argument or medical emergency, or employing sleight-of-hand techniques to misdirect attention.

Post-robbery behavior: The actions taken immediately after a robbery can be as distinctive as the robbery itself. This might include specific routes taken to leave the scene, methods of ditching identifiable clothing or weapons, or rituals like celebrating at a particular location. Some robbers might have a consistent pattern of lying low or, conversely, making conspicuous purchases soon after a crime.

Use of drugs or alcohol: The consistent use of substances can significantly impact the nature of the robberies. Drug-influenced robbers might display erratic behavior or excessive aggression. Those using alcohol might be more prone to mistakes or leaving evidence. The type of substance and its apparent effects can form part of the MO.

Signature elements: These non-essential actions can be highly individualistic. Examples might include leaving a playing card at the scene, quoting from a specific movie, or arranging items in a particular way. While often counterproductive from a criminal perspective, these elements can stem from psychological needs or desires of the perpetrator.

Method of selecting specific targets: The selection process might involve a consistent pattern of surveillance, perhaps always observing a target for a set number of days. Some robbers might have specific criteria, like only targeting businesses with a certain number of visible security cameras or choosing victims based on the type of car they drive.

Robbery duration: The length of time a robber spends at the scene can be a consistent element of their MO. Some might adhere to a strict time limit, perhaps tied to expected police response times. Others might take a more methodical approach, systematically searching for additional valuables beyond the initial target.

No comments:

Post a Comment

Impersonation, Lies, & Disguise

Sometimes offenders gain the trust of victims through means of deception.  They use disguises to avoid identification. Deception and disguis...