Gregory Saville:

"This book is a breakthrough for the science of crime and prevention and for the criminological enterprise – both academic and practitioner. Osborne has made a contribution of considerable weight. This is a book you should read."

Qualitative Crime Pattern Identification

Sunday, September 1, 2024

Theft of and from Vehicles

Theft of and from vehicles involves the unauthorized taking of a vehicle (often termed "auto theft") or stealing items from inside a vehicle ("theft from vehicle"). 

Stolen vehicles and thefts from vehicles are both covered in this chapter, although thefts from vehicles fall under the umbrella of larceny (theft) for federal crime reporting. In some jurisdictions, thefts from vehicles are called auto burglaries. 


Stolen Vehicles MO Variables


Objectives:

Financial Gain: The primary motive is often to resell the vehicle or its parts.

Transport: Some steal vehicles to use as transportation for themselves or for committing other crimes.

Resource Gathering: Stolen vehicles might be used in other illegal activities such as drug trafficking or human smuggling.


Planning and Target Selection:

Vehicle Type: Certain makes and models are targeted due to their resale value, demand for parts, or ease of theft.

Location Scouting: Parking lots, driveways, and streets are surveyed to identify potential targets.

Vulnerability Assessment: Perpetrators look for vehicles with visible vulnerabilities such as unlocked doors, open windows, or keys left inside.


Tools and Equipment:

Lock Picking Tools: Various tools may be used to unlock vehicle doors or disable security systems.

Ignition Bypass Tools: Devices or knowledge to bypass ignition systems, hot-wiring the car.

Electronic Hacking Equipment: Advanced thieves might use electronic devices to hack keyless entry systems.


Execution:

Quick Operation: The actual act of stealing the vehicle is often executed as quickly as possible to minimize the risk of detection.

Minimal Noise and Attention: Efforts are made to operate quietly and without drawing attention.

Vehicle ID Alteration: In some cases, Vehicle Identification Numbers (VIN) are altered on-the-spot before moving the vehicle.


Evasion:

Immediate Exit: Perpetrators quickly drive the stolen vehicle away from the crime scene.

Route Planning: Pre-planned or spontaneous routes are used to evade law enforcement.

Abandonment: In some cases, the stolen vehicle is left at a predetermined location for later retrieval.


Aftermath:

Chop Shops: Vehicles may be taken apart for parts that are then sold individually.

Resale: Stolen vehicles might be resold, often with falsified documents and altered VINs.

Export: In some instances, stolen vehicles are smuggled out of the country for resale in foreign markets.


Adaptation and Variation:

Changing Tactics: Perpetrators adapt their MO based on successful and unsuccessful attempts, media coverage, or changes in law enforcement strategies.


Example Methods

Offenders employ various methods for stealing vehicles, often relying on their knowledge, expertise, and tools to bypass security measures. Here are some common methods used by steal vehicles:

Key theft: Criminals may steal the vehicle owner's keys through various means, such as pickpocketing, burglary, or even robbery. They may target homes, workplaces, or public spaces where keys are left unattended. Criminals can steal a vehicle by stealing the key or using a duplicate key. 

Hot-wiring: This method involves bypassing the ignition system and starting the vehicle without using the key. Skilled thieves can manipulate the wiring system to start the engine, especially in older models that lack advanced security features.

Relay theft: This technique is primarily used for vehicles equipped with keyless entry and start systems. Criminals use relay devices to amplify the signal from the owner's key fob, tricking the vehicle into unlocking and starting. This method is particularly effective when the key fob is within close proximity to the vehicle, even inside the owner's home.

Electronic hacking: Advanced criminals may use electronic hacking tools or devices to gain access to a vehicle's electronic control units (ECUs) and manipulate the security system. By exploiting vulnerabilities in keyless entry systems or the vehicle's network, they can unlock doors, start the engine, or disable security features.

Theft of documentation: Criminals may target individuals' personal belongings to steal vehicle registration documents, title certificates, or other ownership-related paperwork. With these documents in hand, they can sell or transfer the stolen vehicle more easily.

Tow truck theft: In some cases, criminals may use stolen or fraudulent tow trucks to seize parked vehicles. They exploit the assumption that a tow truck is legitimately removing the vehicle, making it less suspicious.

Carjacking: This method involves forcefully stealing a vehicle from its owner or occupant. Carjackers may threaten the driver with weapons, use physical force, or take advantage of vulnerable situations, such as stopping at traffic lights or parking lots.

Vehicle cloning: Criminals sometimes create counterfeit or cloned vehicle identification numbers (VINs) to disguise a stolen vehicle's true identity. They replace the original VIN with a legitimate one from a similar make and model, making it difficult to trace the stolen vehicle back to its original owner.

Illegal acquisition of keys: Some criminals may resort to illicit means to obtain duplicate keys for the targeted vehicle. This can involve corrupting dealership employees or locksmiths or using unauthorized methods to duplicate keys.

Opportunistic theft: In many cases, vehicle theft occurs due to opportunities presented by owners who leave their vehicles unlocked or with keys inside. Criminals look for easy targets and take advantage of carelessness or negligence on the part of vehicle owners.

Tow truck theft: Criminals can use a tow truck to steal a vehicle by towing it away from its location. This method is commonly used when the vehicle is parked in a public place or on the street.

Valet key theft: Some vehicles come with a valet key that can be used to start the vehicle but does not provide access to the trunk or glove compartment. Criminals can steal the valet key and use it to start the vehicle.

Electronic hacking: Criminals can use electronic hacking tools to bypass the vehicle's security system and gain access to the vehicle's computer system, allowing them to start the vehicle remotely.


Example Locations of Vehicle Theft

Urban areas with high crime rates: Cities and urban areas with higher crime rates tend to have a higher incidence of car theft. This can be due to factors such as a larger population, higher demand for stolen vehicles, and more opportunities for thieves.

Parking lots and public areas: Car thefts commonly occur in parking lots, including shopping centers, airports, train stations, and residential complexes. Thieves may target these areas due to the presence of unattended vehicles and a higher likelihood of finding valuable items inside.

Residential neighborhoods: Thieves may target residential areas, especially those with inadequate security measures, as they offer opportunities for theft with less visibility and potential witnesses. Vehicles parked on the street or in driveways are often vulnerable.

Locations near borders or major transportation routes: Areas near international borders or major highways can be attractive to car thieves due to the potential for quick escapes and easier transportation of stolen vehicles across borders or to other locations.

Auto dealerships and repair shops: Car thefts can also occur at auto dealerships or repair shops where vehicles are temporarily stored. Thieves may take advantage of lax security measures or inside knowledge to steal cars from these locations.

Public streets and roadways: Cars parked on public streets are not immune to theft. Thieves may quickly break into parked vehicles, hot-wire them, or use other techniques to steal them.


Specific Location Examples

Specific location variables for where cars are stolen: airports, auto dealerships, car wash facilities, construction sites, gas stations, hotels and motels, parking lots (shopping centers, malls, movie theaters, etc.), public transportation stations (train stations, bus stops, etc.), rental car lots, residential driveways, restaurants and bars, schools and university campuses, sporting event venues (stadiums, arenas, etc.), street parking, workplaces (office complexes, industrial areas, etc.)


Stolen Vehicle Indicators

Altered or Missing Vehicle Identification Number (VIN): The VIN plate on the dashboard or door jamb may be tampered with, missing, or appear altered. Mismatched vehicle identification number (VIN): If the VIN plate on the dashboard or door jamb appears to be tampered with, or if the VIN number on the registration, title, or insurance documents does not match the one on the car, this could be a sign that the car is stolen.

Inconsistent or Missing Documentation: The car's registration, title, or other important documents may be missing, forged, or inconsistent with the vehicle's details.

Broken Ignition or Steering Column: Evidence of a broken or damaged ignition or steering column can indicate forced entry or hot-wiring, which could suggest a stolen vehicle.

Modified or Removed Key Locks: If the key locks have been changed or damaged, or if there are signs of tampering, it may indicate unauthorized access to the vehicle.

Unauthorized License Plates: The car may have license plates from a different state or mismatched plates that do not correspond to the vehicle's make and model.

Fresh Paint or Repairs: Recently applied paint, mismatched paint colors, or signs of repair work that don't match the vehicle's history could be an indicator of attempts to conceal the car's identity.

Altered or Removed VIN Tags: The VIN tags on major parts of the vehicle, such as the engine or frame, may be missing, altered, or scratched off.

Stolen Parts or Accessories: If the car contains stolen parts, such as a stereo system, airbags, or tires, or if valuable accessories are missing, it could suggest the vehicle has been stolen.

Stolen Vehicle Reports: Checking databases or contacting the local authorities to see if the vehicle has been reported as stolen is an important step.

No license plates or altered license plates: A car without any license plates or with altered plates is a potential sign that the car has been stolen.

Keys that don't fit: If the keys that come with the car don't work, or if the ignition or door locks have been tampered with, this could indicate that the car has been stolen

Low price: If the price of the car is significantly lower than its market value, this could be a red flag that the car is stolen.

Out-of-state plates: If the car has out-of-state license plates or temporary plates that have been on the car for an extended period, this could be an indication that the car is stolen or has been taken across state lines to avoid detection.

Signs of forced entry: If there are signs of forced entry, such as a broken window or a damaged lock, this could indicate that the car has been stolen.

Inability to access the trunk: If the trunk cannot be opened or if the lock has been tampered with, this could be a sign that the car is stolen and that the thief is trying to hide something in the trunk.




Thefts from Vehicles

The crime of stealing from vehicles is often referred to as "theft from auto" or "car break-ins." 



Offender Characteristics:

Motive: Financial gain, opportunistic theft, thrill-seeking, or necessity (such as stealing a GPS for re-sale vs. grabbing loose change). 

Skill Level: Experienced thieves may be adept at quickly bypassing locks or disabling alarms, while amateurs might only target unlocked cars.

Criminal History: Offenders with a past criminal record may use more sophisticated methods.

Risk Tolerance: Willingness to commit the crime in high-surveillance areas or during peak hours.

Local Knowledge: Familiarity with the area can impact the choice of location and timing for the theft.

Addiction: many offenders have addiction problems and commit this crime to fuel their addiction.


Situational Factors:

Vehicle Type: Some vehicles may be targeted more frequently due to the perceived value of their contents.

Visibility of Valuables: The presence of visible items like electronics, bags, or loose change can make a vehicle more attractive to thieves.

Vehicle Condition: Older or poorly maintained vehicles might be perceived as easier targets.

Time of Day: Thefts commonly occur during the night or when the vehicle is expected to be unattended for an extended period.

Entry Method: Whether the vehicle was unlocked, or if forced entry was used (such as smashing windows, jimmying locks).

Presence of Security Measures: Car alarms, steering wheel locks, or surveillance cameras can act as deterrents.


Environmental Considerations:

Location: High-crime areas, secluded spots, and locations far from police stations may be preferred by offenders.

Surveillance: Areas with low visibility or lack of CCTV can provide thieves more opportunities.

Social Cohesion: Neighborhoods with low social interaction may have fewer natural 'eyes on the street,' making it easier for thieves to operate without being noticed.

Police Presence: The frequency of patrolling can serve as a deterrent.

Lighting: Poorly lit areas may offer offenders more cover.


Examples of Items Stolen from Vehicles

Stolen from vehicles:  airbags, automotive tools, backpacks, bags, bicycles, car audio systems, car batteries, car speakers, car stereos, cash, catalytic converters, clothing, construction tools, credit cards, debit cards, driver's license, fishing gear, garage door opener, golf clubs, GPS device, jewelry, ladders, loose change, luggage, laptop, passport, personal documents, personal identification, portable DVD player, portable music player, power tools, prescription medications, purse, rims, shopping bags, smartphone, social security card, sporting goods, tablet, tires, toolboxes, tools, watch, wallet


No comments:

Post a Comment

Impersonation, Lies, & Disguise

Sometimes offenders gain the trust of victims through means of deception.  They use disguises to avoid identification. Deception and disguis...