Gregory Saville:

"This book is a breakthrough for the science of crime and prevention and for the criminological enterprise – both academic and practitioner. Osborne has made a contribution of considerable weight. This is a book you should read."

Qualitative Crime Pattern Identification

Friday, July 26, 2024

Specific Patterns

Here are some specific robbery-type patterns to consider as you analyze crimes:

 

Pattern: Purse Snatching (Robbery)

Perpetrators: mostly males but sometimes females, often lone criminals but also work in groups

Victims: primarily females of any age

Locations: primarily streets, sometimes in other public places 

Times: any time, most often when victim is alone without other observers nearby

Approach Methods: may come from behind, may use weapon, may knock victim to ground

Weapons: may use a weapon or threat of weapon, may assault victim

Tools: may cut purse straps

Vehicles/Transportation Routes: may target victims waiting at bus stops, train stations, on routes to bank or shopping

Stolen Goods: purse, contents of wallet, cash, credit cards

Method: a crime of opportunity, serial purse snatchers may use same MO

Motive: quick cash/profit, sometimes to feed drug habit

Query Terms: purse, bag, knapsack, handbag, strap

Suggestions: track all incidents of purse snatching robberies as these tend to be serial crimes, track all persons arrested for these crimes in case a series emerges where they are the perpetrators

***



Pattern: Carjacking

Perpetrators: suspects in need of quick transportation, suspects who want a vehicle to take to be stripped, suspects who are in gangs 

Victims: may be innocent persons, sometimes related to drug buying/dealing - victims who trade cars for a few hours to a drug dealer and call it a carjacking when they report the loss of their vehicle

Locations: more likely in large urban areas, near drug houses, at intersections when a vehicle is stopped, at gas stations, in parking lots 

Times: various times of day

Entry/Approach Methods: may bump car with another car to initiate opportunity, may be hiding and attack victim

Weapons: often occur at gunpoint or threat of gun not displayed

Vehicles/Transportation Routes: may use vehicle in crime and discard it in their own neighborhood

Stolen Goods: vehicle, sometimes rob victim of wallet/purse/belongings

Method: a carjacking involves robbery of a vehicle while people are in the vehicle and is often a violent crime, sometimes victims are kidnapped as well, in rarer instances crime may lead to sexual assault or murder

Motive: to obtain a vehicle, also may be a need for power, or a need to escape a scene or obtain a vehicle to use in a crime/to commit a crime

Query terms: vehicle, car, robbery, carjacked, carjacking, stopped at light (or sign), fled in victim's vehicle (or car)

Suggestions: it is important to track all carjackings in your area to uncover any sort of patterns; query your databases for stolen cars AND robbery to find all incidents of carjacking; track all known carjackers in your jurisdiction

***



Pattern: Bank Robberies

Perpetrators: variety of perps, from inexperienced (usually drug addicts) to professional (less common), may work alone or in teams

Victims: financial institutions, banks and credit unions

Locations: inside bank – ATM (automatic teller) crime may be involved as well

Times: varies, but serial robbers often follow a pattern in time of day, day of week

Entry/Approach Methods: perps may stake out banks, target banks with easy escape routes, generally robbers just walk in bank

Weapons: often use note with threat of weapon and no weapon is seen, sometimes gun is seen

Vehicles/Transportation Routes: vary, banks in strip malls and/or near highways may be targeted as more vulnerable, may have get-away car accomplice

Stolen Goods: cash – often with dye-pack

Method: suspect may ‘case’ bank undetected prior to robbery, may wear disguise, may bring bag for cash – type of bag may be similar in series so is something to track, may jump over counter, may force victims to the ground, may target same type bank branches, tends toward becoming a serial crime if suspect has success, may be multiple suspects

Motive: cash

Query terms: bank, credit union, safe, unlock, alarm, vault, safety deposit, deposit, names of banks

Suggestions: Map all banks in your jurisdiction, including credit unions. If possible, get data on ATMS, track all known bank robbers on parole in your jurisdiction – know their MO. Familiarize yourself with bank robbery prevention techniques.

***



Pattern: Cab/Taxi /Ride share Driver Victims

Perpetrators: Usually lone males, sometimes two or more males

Victims: Cab/taxi/rideshare drivers

Locations: Usually in a city

Times: Late at night, infrequently in daytime

Entry/Approach Methods: When fare is dropped off, victim is robbed by the fare – sometimes robbery occurs during the ride

Weapons: more often gunpoint, sometimes knifepoint

Vehicles/Transportation Routes: suspects will more often be let out of cab at an intersection rather than a particular address

Stolen Goods: cash, sometimes wallet

Method: robbery occurs during normal course of cab ride – suspect calls cab or hails cab and then robs victim, suspect may wear a disguise, sometimes violent

Motive: crime of opportunity, sometimes becomes a series of crime

Query terms: cab, taxi, fare, driver, meter, Uber, Lyft, rides hare, backseat

Suggestions: Track all robberies of this type in one file to note a series of crimes early. Analyze by company, by time of day, by geography, by weapon, by suspect(s) description, by victimology (old driver? young? race?). Track where rides begin and where they end. 

***



Pattern: Food Delivery Person Robberies

Perpetrators: Most often lone males or small groups of males, often teens

Victims: pizza delivery persons, Chinese restaurant delivery persons

Locations: driveways, alleys, sometimes at vacant houses, sometimes hide in buses, hallways

Times: most often in the evening

Entry/Approach Methods: suspects may attack delivery person from behind or lure them to door of building they do not inhabit and rob them

Weapons: food delivery robberies are often committed at gunpoint. Victims are sometimes assaulted, but usually escape physically unharmed.

Tools: suspect may call to order food using cell phones they purchase and then discard – sometimes they use their own phones which then can be traced

Vehicles/Transportation Routes: suspects often flee on foot.

Stolen Goods: Suspect usually take the money, or both money and food. Rarely do they just take the food.

Method: suspects order food by telephone and rob delivery person

Motive: quick cash, sometimes related to gang activity

Query Terms: pizza, food, delivery, Chinese, names of food delivery services, restaurant, lure , order, driveway, alley, porch, hallway, vacant

Suggestions: Map all your restaurants and pizzerias – differentiate between types of restaurants. Keep track of all food delivery robberies. Keep track of all individuals arrested for such robberies and their MOs for future reference. Some robbers wear masks, hide behind bushes, act in groups. Look for serial crimes whenever you have an “outbreak” of such crimes. Look for repeat targeting of pizzerias/restaurants. Work on target-hardening suggestions.

***



Pattern: Jewelry Store Theft (Larceny, Burglary, Robbery)

Perpetrators: often teams, often are professional thieves

Victims: jewelers, department stores

Locations: jewelry stores and jewelry counters at other types of stores

Times: no specific time pattern

Entry/Approach Methods: may case store, may come in one day and come back another, operate in pairs or more

Weapons: may be armed, often use ruses, sometimes jewelry store robberies escalate to murder if there is resistance

Tools: burglary tools in burglaries, have been known to smash vehicles into stores to grab items

Vehicles/Transportation Routes: jewelry theft rings travel across jurisdiction

Stolen Goods: jewelry, precious metals

Method: distraction, returning purchases with counterfeit jewels, need for a fence for jewelry, smash and grabs, may cut security gates, may disable alarms

Motive: profit

Query Terms: jewelry, gold, diamond, silver, platinum, emerald, ruby, sapphire, pearl, distract, counter, grab, fake

Suggestions: track all jewelry thefts – even residential, looking for patterns, find out where fencing of jewelry may take place, track known criminals of this type

***


No comments:

Post a Comment

Fraud

 Fraud involves deceptive practices with the intention of gaining something of value, often financial, from a victim. Fraud MO Variables Obj...