Gregory Saville:

"This book is a breakthrough for the science of crime and prevention and for the criminological enterprise – both academic and practitioner. Osborne has made a contribution of considerable weight. This is a book you should read."

Qualitative Crime Pattern Identification

Monday, September 30, 2024

Theft of and from Vehicles: Further Reading

Further Reading

Clarke, R. (2001). Thefts of and From Cars in Parking Facilities, Problem-Specific Guide No. 10. Problem-Oriented Guides for Police Series. Washington, D.C.: Office of Community Oriented Policing Services, U.S. Department of Justice. Available at: https://popcenter.asu.edu/content/thefts-and-cars-parking-facilities-0

Keister, T. (2007). Thefts of and from Cars on Residential Streets and Driveways, Problem-Specific Guide Series No. 46.  Problem-Oriented Guides for Police Series, Washington, DC: Office of Community Oriented Policing Services, U.S. Department of Justice. Available at: https://popcenter.asu.edu/content/thefts-and-cars-residential-streets-driveways-0


Monday, September 16, 2024

Tools Used in Vehicle Thefts

From the book Elements of Crime Patterns

Vehicle Theft: 

coat hangers, flashlights, glass cutters, gloves, lock picks, pliers, screwdrivers, Slim Jim, spark plugs, window punches



Monday, September 9, 2024

Vehicle Description

Stolen vehicles can be described beyond year, make and model.

From the book Elements of Crime Patterns:

Crimes can be linked based on descriptions of the vehicle or vehicles the offender used to commit crimes. It is important to get detailed information from victims, witnesses, and CCTV cameras regarding any notable features of an offender’s vehicle.

The Gilgo Beach serial murder cold case was solved because, in 2010, a victim's roommate reported the description of the vehicle he had seen the suspect drive, a first-generation Chrysler Avalanche.  Rex Heuermann, arrested in 2023, had been in the house fighting with the victim and the roommate, then left in the vehicle. A state investigator discovered the truck description after the launch of a new task force. A search of a vehicle records database led investigators to Heuermann. 

Offender’s Vehicle Example Variables

General descriptors: make (such as Ford), model (such as Mustang), year

Color: beige, black, blue, bronze, brown, burgundy, camouflage, chrome, copper, cream, dark, gold, gray, green, ivory, light, maroon, multi-colored, pink, purple, red, silver, stainless steel, tan, taupe, teal, white, yellow

License Plate: alphanumeric characters, color, damage, disguise, missing, personalization, province, state, visibility

Vehicle Type: 2-door, 4-door, bike, bus, camper van, caravanette, classic car, convertible, coupe, electric bicycle, electric car, estate, hatchback, hybrid car, jeep, land rover, luxury car, MPV, moped, motor home, people carrier, passenger car, passenger van, pickup truck, recreational vehicle (RV), saloon, sedan, sports car, sport utility vehicle (SUV), station wagon, tractor trailer, truck, van, vintage car

Vehicle Feature/Modification: body kits, bumper stickers, convertible top, custom paint job, decals, ornaments, spoilers, sunroof, tinted windows, unique accessories, unique color

Vehicle Damage: broken or cracked side mirror, broken or cracked rear window, broken or cracked windshield, chipped paint, dents, fresh dents or scrapes, scratches, missing or broken bumper, missing or broken headlight, missing or broken taillight, rust or corrosion

Tire Conditions: custom rims, brand, flat tires, snow chains, worn-out treads

Unusual Noises: engine sound, exhaust sound, rattling parts

Condition: clean, dirty, extra-clean, neglected

Note These Possibilities

The offender(s) used multiple vehicles to commit crime(s).

The offender(s) used a stolen vehicle to commit crime(s).


Thursday, September 5, 2024

Chop Shops

A "chop shop" is party of some vehicle theft patterns - it is the place where the vehicle goes after being stolen.

"CRM 1000-1499

1369. Chop Shops

Title 18 U.S.C. § 2322 makes it an offense to knowingly own, operate, maintain, or control a chop shop. The term "chop shop" is defined as any building, lot, facility, or other structure or premise where one or more persons engage in receiving, concealing, destroying, disassembling, dismantling, reassembling, or storing any passenger motor vehicle part which has been unlawfully obtained in order to alter, counterfeit, deface, destroy, disguise, falsify, forge, obliterate, or remove the identity, including the vehicle identification number or derivative thereof, of such vehicle or vehicle part and to distribute, sell, or dispose of such vehicle or vehicle part in interstate or foreign commerce.

Because motor vehicle parts tend to lose their identity as stolen property after being severed from the vehicle, and because chop shop operators often dispose of stolen parts locally, rather than in interstate commerce, evidence of interstate distribution of stolen parts is difficult to obtain. Consequently, 18 U.S.C. § 2322 has been rarely used. Chop shop operators may be prosecutable under 18 U.S.C. §§ 511, 2313, and 2321."

Examples:

Harris County raids chop shops in auto theft crackdown linked to cartel

14 stolen vehicles, firearms, and drugs recovered from suspected chop shop in Kent

$600k in Camaros, Corvettes recovered after California task force raids Central Valley chop shop



Sunday, September 1, 2024

Theft of and from Vehicles

Theft of and from vehicles involves the unauthorized taking of a vehicle (often termed "auto theft") or stealing items from inside a vehicle ("theft from vehicle"). 

Stolen vehicles and thefts from vehicles are both covered in this chapter, although thefts from vehicles fall under the umbrella of larceny (theft) for federal crime reporting. In some jurisdictions, thefts from vehicles are called auto burglaries. 


Stolen Vehicles MO Variables


Objectives:

Financial Gain: The primary motive is often to resell the vehicle or its parts.

Transport: Some steal vehicles to use as transportation for themselves or for committing other crimes.

Resource Gathering: Stolen vehicles might be used in other illegal activities such as drug trafficking or human smuggling.


Planning and Target Selection:

Vehicle Type: Certain makes and models are targeted due to their resale value, demand for parts, or ease of theft.

Location Scouting: Parking lots, driveways, and streets are surveyed to identify potential targets.

Vulnerability Assessment: Perpetrators look for vehicles with visible vulnerabilities such as unlocked doors, open windows, or keys left inside.


Tools and Equipment:

Lock Picking Tools: Various tools may be used to unlock vehicle doors or disable security systems.

Ignition Bypass Tools: Devices or knowledge to bypass ignition systems, hot-wiring the car.

Electronic Hacking Equipment: Advanced thieves might use electronic devices to hack keyless entry systems.


Execution:

Quick Operation: The actual act of stealing the vehicle is often executed as quickly as possible to minimize the risk of detection.

Minimal Noise and Attention: Efforts are made to operate quietly and without drawing attention.

Vehicle ID Alteration: In some cases, Vehicle Identification Numbers (VIN) are altered on-the-spot before moving the vehicle.


Evasion:

Immediate Exit: Perpetrators quickly drive the stolen vehicle away from the crime scene.

Route Planning: Pre-planned or spontaneous routes are used to evade law enforcement.

Abandonment: In some cases, the stolen vehicle is left at a predetermined location for later retrieval.


Aftermath:

Chop Shops: Vehicles may be taken apart for parts that are then sold individually.

Resale: Stolen vehicles might be resold, often with falsified documents and altered VINs.

Export: In some instances, stolen vehicles are smuggled out of the country for resale in foreign markets.


Adaptation and Variation:

Changing Tactics: Perpetrators adapt their MO based on successful and unsuccessful attempts, media coverage, or changes in law enforcement strategies.


Example Methods

Offenders employ various methods for stealing vehicles, often relying on their knowledge, expertise, and tools to bypass security measures. Here are some common methods used by steal vehicles:

Key theft: Criminals may steal the vehicle owner's keys through various means, such as pickpocketing, burglary, or even robbery. They may target homes, workplaces, or public spaces where keys are left unattended. Criminals can steal a vehicle by stealing the key or using a duplicate key. 

Hot-wiring: This method involves bypassing the ignition system and starting the vehicle without using the key. Skilled thieves can manipulate the wiring system to start the engine, especially in older models that lack advanced security features.

Relay theft: This technique is primarily used for vehicles equipped with keyless entry and start systems. Criminals use relay devices to amplify the signal from the owner's key fob, tricking the vehicle into unlocking and starting. This method is particularly effective when the key fob is within close proximity to the vehicle, even inside the owner's home.

Electronic hacking: Advanced criminals may use electronic hacking tools or devices to gain access to a vehicle's electronic control units (ECUs) and manipulate the security system. By exploiting vulnerabilities in keyless entry systems or the vehicle's network, they can unlock doors, start the engine, or disable security features.

Theft of documentation: Criminals may target individuals' personal belongings to steal vehicle registration documents, title certificates, or other ownership-related paperwork. With these documents in hand, they can sell or transfer the stolen vehicle more easily.

Tow truck theft: In some cases, criminals may use stolen or fraudulent tow trucks to seize parked vehicles. They exploit the assumption that a tow truck is legitimately removing the vehicle, making it less suspicious.

Carjacking: This method involves forcefully stealing a vehicle from its owner or occupant. Carjackers may threaten the driver with weapons, use physical force, or take advantage of vulnerable situations, such as stopping at traffic lights or parking lots.

Vehicle cloning: Criminals sometimes create counterfeit or cloned vehicle identification numbers (VINs) to disguise a stolen vehicle's true identity. They replace the original VIN with a legitimate one from a similar make and model, making it difficult to trace the stolen vehicle back to its original owner.

Illegal acquisition of keys: Some criminals may resort to illicit means to obtain duplicate keys for the targeted vehicle. This can involve corrupting dealership employees or locksmiths or using unauthorized methods to duplicate keys.

Opportunistic theft: In many cases, vehicle theft occurs due to opportunities presented by owners who leave their vehicles unlocked or with keys inside. Criminals look for easy targets and take advantage of carelessness or negligence on the part of vehicle owners.

Tow truck theft: Criminals can use a tow truck to steal a vehicle by towing it away from its location. This method is commonly used when the vehicle is parked in a public place or on the street.

Valet key theft: Some vehicles come with a valet key that can be used to start the vehicle but does not provide access to the trunk or glove compartment. Criminals can steal the valet key and use it to start the vehicle.

Electronic hacking: Criminals can use electronic hacking tools to bypass the vehicle's security system and gain access to the vehicle's computer system, allowing them to start the vehicle remotely.


Example Locations of Vehicle Theft

Urban areas with high crime rates: Cities and urban areas with higher crime rates tend to have a higher incidence of car theft. This can be due to factors such as a larger population, higher demand for stolen vehicles, and more opportunities for thieves.

Parking lots and public areas: Car thefts commonly occur in parking lots, including shopping centers, airports, train stations, and residential complexes. Thieves may target these areas due to the presence of unattended vehicles and a higher likelihood of finding valuable items inside.

Residential neighborhoods: Thieves may target residential areas, especially those with inadequate security measures, as they offer opportunities for theft with less visibility and potential witnesses. Vehicles parked on the street or in driveways are often vulnerable.

Locations near borders or major transportation routes: Areas near international borders or major highways can be attractive to car thieves due to the potential for quick escapes and easier transportation of stolen vehicles across borders or to other locations.

Auto dealerships and repair shops: Car thefts can also occur at auto dealerships or repair shops where vehicles are temporarily stored. Thieves may take advantage of lax security measures or inside knowledge to steal cars from these locations.

Public streets and roadways: Cars parked on public streets are not immune to theft. Thieves may quickly break into parked vehicles, hot-wire them, or use other techniques to steal them.


Specific Location Examples

Specific location variables for where cars are stolen: airports, auto dealerships, car wash facilities, construction sites, gas stations, hotels and motels, parking lots (shopping centers, malls, movie theaters, etc.), public transportation stations (train stations, bus stops, etc.), rental car lots, residential driveways, restaurants and bars, schools and university campuses, sporting event venues (stadiums, arenas, etc.), street parking, workplaces (office complexes, industrial areas, etc.)


Stolen Vehicle Indicators

Altered or Missing Vehicle Identification Number (VIN): The VIN plate on the dashboard or door jamb may be tampered with, missing, or appear altered. Mismatched vehicle identification number (VIN): If the VIN plate on the dashboard or door jamb appears to be tampered with, or if the VIN number on the registration, title, or insurance documents does not match the one on the car, this could be a sign that the car is stolen.

Inconsistent or Missing Documentation: The car's registration, title, or other important documents may be missing, forged, or inconsistent with the vehicle's details.

Broken Ignition or Steering Column: Evidence of a broken or damaged ignition or steering column can indicate forced entry or hot-wiring, which could suggest a stolen vehicle.

Modified or Removed Key Locks: If the key locks have been changed or damaged, or if there are signs of tampering, it may indicate unauthorized access to the vehicle.

Unauthorized License Plates: The car may have license plates from a different state or mismatched plates that do not correspond to the vehicle's make and model.

Fresh Paint or Repairs: Recently applied paint, mismatched paint colors, or signs of repair work that don't match the vehicle's history could be an indicator of attempts to conceal the car's identity.

Altered or Removed VIN Tags: The VIN tags on major parts of the vehicle, such as the engine or frame, may be missing, altered, or scratched off.

Stolen Parts or Accessories: If the car contains stolen parts, such as a stereo system, airbags, or tires, or if valuable accessories are missing, it could suggest the vehicle has been stolen.

Stolen Vehicle Reports: Checking databases or contacting the local authorities to see if the vehicle has been reported as stolen is an important step.

No license plates or altered license plates: A car without any license plates or with altered plates is a potential sign that the car has been stolen.

Keys that don't fit: If the keys that come with the car don't work, or if the ignition or door locks have been tampered with, this could indicate that the car has been stolen

Low price: If the price of the car is significantly lower than its market value, this could be a red flag that the car is stolen.

Out-of-state plates: If the car has out-of-state license plates or temporary plates that have been on the car for an extended period, this could be an indication that the car is stolen or has been taken across state lines to avoid detection.

Signs of forced entry: If there are signs of forced entry, such as a broken window or a damaged lock, this could indicate that the car has been stolen.

Inability to access the trunk: If the trunk cannot be opened or if the lock has been tampered with, this could be a sign that the car is stolen and that the thief is trying to hide something in the trunk.




Thefts from Vehicles

The crime of stealing from vehicles is often referred to as "theft from auto" or "car break-ins." 



Offender Characteristics:

Motive: Financial gain, opportunistic theft, thrill-seeking, or necessity (such as stealing a GPS for re-sale vs. grabbing loose change). 

Skill Level: Experienced thieves may be adept at quickly bypassing locks or disabling alarms, while amateurs might only target unlocked cars.

Criminal History: Offenders with a past criminal record may use more sophisticated methods.

Risk Tolerance: Willingness to commit the crime in high-surveillance areas or during peak hours.

Local Knowledge: Familiarity with the area can impact the choice of location and timing for the theft.

Addiction: many offenders have addiction problems and commit this crime to fuel their addiction.


Situational Factors:

Vehicle Type: Some vehicles may be targeted more frequently due to the perceived value of their contents.

Visibility of Valuables: The presence of visible items like electronics, bags, or loose change can make a vehicle more attractive to thieves.

Vehicle Condition: Older or poorly maintained vehicles might be perceived as easier targets.

Time of Day: Thefts commonly occur during the night or when the vehicle is expected to be unattended for an extended period.

Entry Method: Whether the vehicle was unlocked, or if forced entry was used (such as smashing windows, jimmying locks).

Presence of Security Measures: Car alarms, steering wheel locks, or surveillance cameras can act as deterrents.


Environmental Considerations:

Location: High-crime areas, secluded spots, and locations far from police stations may be preferred by offenders.

Surveillance: Areas with low visibility or lack of CCTV can provide thieves more opportunities.

Social Cohesion: Neighborhoods with low social interaction may have fewer natural 'eyes on the street,' making it easier for thieves to operate without being noticed.

Police Presence: The frequency of patrolling can serve as a deterrent.

Lighting: Poorly lit areas may offer offenders more cover.


Examples of Items Stolen from Vehicles

Stolen from vehicles:  airbags, automotive tools, backpacks, bags, bicycles, car audio systems, car batteries, car speakers, car stereos, cash, catalytic converters, clothing, construction tools, credit cards, debit cards, driver's license, fishing gear, garage door opener, golf clubs, GPS device, jewelry, ladders, loose change, luggage, laptop, passport, personal documents, personal identification, portable DVD player, portable music player, power tools, prescription medications, purse, rims, shopping bags, smartphone, social security card, sporting goods, tablet, tires, toolboxes, tools, watch, wallet


Impersonation, Lies, & Disguise

Sometimes offenders gain the trust of victims through means of deception.  They use disguises to avoid identification. Deception and disguis...