Transaction Search Form: please type in any of the fields below.
Date: November 22, 2024 Fri
Time: 11:55 am
Time: 11:55 am
Results for stolen property
20 results foundAuthor: Europol Title: Cargo Theft Report: Applying the Brakes to Road Cargo Crime in Europe Summary: This report has been produced by a Europol working group, established to look at the issues related to cargo/freight crime on a European level. It consisted of police representatives from several EU Member States and also members of TAPA. This police/industry partnership acknowledged the need to work collaboratively in this area, share information and intelligence, in order to combat an area of crime of mutual concern. The aims and objectives of the report are as follows: To agree on a common definition of cargo crime and standard terminology; To promote awareness of the issues across EU Member States law enforcement agencies; To give an insight into current modi operandi (MOs); To give an insight into the different approaches adopted by MS; and To develop guidelines for both prevention and investigation for this type of crime. Details: The Hague: EUROPOL, 2009. 34p. Source: Internet Resource: Accessed December 23, 2010 at: http://www.europol.europa.eu/publications/Serious_Crime_Overviews/Cargo_Theft_Report.pdf Year: 2009 Country: Europe URL: http://www.europol.europa.eu/publications/Serious_Crime_Overviews/Cargo_Theft_Report.pdf Shelf Number: 120629 Keywords: Cargo TheftFreight IndustryStolen GoodsStolen PropertyTheft from Motor Vehicles |
Author: Whiteacre, Kevin Title: Metals Theft Database Pilot Study Summary: Metal theft describes the theft of items for the value of their constituent metals. These thefts include a variety of crimes, such as: stealing catalytic converters from cars for their platinum, rhodium and palladium; and stealing copper wires and cable; plumbing; air conditioners and parts for the copper; aluminum siding and gutters; and so on. It is generally agreed that metal thefts have gone up because of steep increases in the prices of metals, spurred by an increase in world demand for metals and increased speculative investment in base metals. Jurisdictions across the country are reporting increased concerns over metal thefts. Almost 30 local and state legislatures in the U.S. have enacted, or are considering, metal theft legislation. Yet, few jurisdictions have hard data on the exact numbers and types of metal thefts occurring. Recently, the Indianapolis Metropolitan Police Department (IMPD) and the University of Indianapolis Community Research Center (CRC) began a collaborative effort to collect such data on metal theft in Indianapolis. The Indianapolis Metal Theft Project seeks to gather and analyze a wide variety of data that will provide a clearer understanding of the incidence, types, costs, and impacts of metal theft in Indianapolis in order to inform and implement strategies to reduce these crimes. This is the first report on a pilot study to establish protocol for collecting, coding, and analyzing metal theft data from IMPD crime reports. It provides some descriptive frequencies of metal theft crimes for January through March of 2008. A summary of the findings indicates that: • From January 1 to March 31, 2008, there were 678 metal thefts reported in Indianapolis. This averages out to about 226 per month or about 7 metal thefts each day. Residences accounted for just over half of the crimes. Another 17 percent were automobiles (catalytic converters mostly). Interestingly, churches have been victimized enough to merit their own category. • Copper was the most stolen metal, with copper pipes and plumbing accounting for more than 17 percent of all items and copper wires accounting for another 8 percent. • On average, one catalytic converter was stolen every day during this three month time period. Approximately, one-quarter of the vehicles were Jeeps, suggesting they might be at a higher than average risk for catalytic converter theft. • Twenty-five percent (169) of the crime reports contained estimates, which were provided by the victim reporting the crime, of the values for the stolen items. For those 169 cases, the average value of the stolen items was $4,314 (median = $1,500). The sum of the reported values was $729,112. • Extrapolating those values to the other 75% of cases suggests the value of stolen metal averaged just under $1 million per month for January, February, and March 2008. • The Northeast District had the most residential metal thefts, while the Southeast and Southwest Districts had the most commercial and vehicle related metal thefts. • Possible steps for moving forward include: 1) participating in the Institute of Recycling Industries, Inc. (ISRI) Theft Alert Program; 2) centralizing responsibility for metal thefts; 3) organizing a Metal Theft Task Force; 4) focusing needs-driven prevention efforts on specific districts; 5) improving crime reporting; and 6) continuing collaboration on the Indianapolis Metal Theft Project. Details: Indianapolis, IN: University of Indianapolis, Community Research Center, 2008. 16p. Source: Internet Resource: Accessed April 1, 2011 at: http://socsci.uindy.edu/crc/pdf/metal_theft_study.pdf Year: 2008 Country: United States URL: http://socsci.uindy.edu/crc/pdf/metal_theft_study.pdf Shelf Number: 121208 Keywords: Metal Theft (Indiana)Stolen PropertyTheft Offenses |
Author: Kooi, Brandon R. Title: Theft of Scrap Metal Summary: This guide begins by describing the problem of scrap metal theft and reviewing factors that increase its risk. It then identifies a series of questions to help you analyze your local scrap-metal theft problem. Finally, it reviews responses to the problem, and what is known about these responses from evaluative research and police practice. While stolen precious metals include gold and silver—commonly targeted in residential burglaries — for the purposes of this guide, scrap metal theft includes mainly stolen copper, aluminum, brass, zinc, nickel, platinum, and bronze. These metals have value only when sold to a scrap metal dealer who arranges for the metal to be melted and reshaped for other uses. By contrast, gold and silver commonly have intrinsic value, either to the thief or to someone else who values the metal in its original shape. Scrap metal theft is but one of the larger set of theft and sale of stolen property problems. This guide is limited to addressing the particular harms scrap metal theft causes. Details: Washington, DC: U.S. Department of Justice, Office of Community Oriented Policing Services, 2010. 70p. Source: Internet Resource: Problem-Oriented Guides for Police Problem-Specific Guides Series No. 58; Accessed April 1, 2011 at: http://www.popcenter.org/problems/pdfs/metal_theft.pdf Year: 2010 Country: United States URL: http://www.popcenter.org/problems/pdfs/metal_theft.pdf Shelf Number: 121210 Keywords: Crime PreventionMetal TheftProblem-Oriented PolicingStolen PropertyTheft Offenses |
Author: International Road Transport Union Title: Attacks on Drivers of International Heavy Goods Vehicles; Survey Results Summary: Since the tragic events in the United States on 11th September 2001, it has been increasingly recognised that all transport modes are at risk from terrorism and crime. Those involved in road freight transport also face a number of specific challenges, which include theft of goods and vehicles, attacks on truck drivers, illegal immigration, special risks related to the movement of dangerous goods by road, as well as smuggling. In addition to these often crime-related challenges, authorities and operators must remain vigilant to possible terrorist use or targeting of vehicles and infrastructure. These challenges – and their responses – pose serious daily problems for all actors involved in this sector: the drivers, transport companies, police / law enforcement agencies, authorities, politicians, trade associations, unions, insurers, truckstop operators and other players. Road freight transport, a vital element of international production schemes, trade and economic relations across frontiers in Europe and elsewhere, faces this challenge of enhanced security requirements against the background of a highly competitive road freight market. The number of vehicle thefts and freight robbery incidents appear to be increasing in many countries. The need to protect drivers, their vehicles and the freight carried is now becoming an issue of increasing concern. It can however be noted with satisfaction that measures of protection and prevention have already proved efficient in a few countries. Indeed, much work has already been done to address many of the multiple threats faced by the European transport sector. One type of threat in particular, attacks on international HGV drivers, has consistently been cited as a significant problem. To date, however, information needed to better understand the nature and scale of the problem and its consequences on transport drivers, companies and the sector as a whole has been lacking and only anecdotal evidence of attacks on drivers has been available. The apparent reasons for this are varied: drivers frequently do not inform the police of the attacks for multiple reasons such as language difficulty and lack of trust in authorities and insufficient information about where and to whom the attacks should be reported. When they are reported, these incidents are very often not centrally recorded or properly responded to. Indeed in many countries a comprehensive policy and decision-making framework at local and national level is not yet in place to countervail spreading crime on the roads. The most effective measures to fight crime, such as for example, a wider use of protective devices on board vehicles, providing sufficient secure truck parking areas, setting up efficient and accessible incident reporting and recording structures, implementing intra-company preventive and protective security measures, raising awareness, improving training and so on, are, in most countries, not or hardly implemented. Details: Geneva: IRU, 2008. 11p. Source: Internet Resource: Accessed May 11, 2011 at: http://www.internationaltransportforum.org/IntOrg/ecmt/crime/pdf/08AttackSurvey.pdf Year: 2008 Country: International URL: http://www.internationaltransportforum.org/IntOrg/ecmt/crime/pdf/08AttackSurvey.pdf Shelf Number: 121712 Keywords: AssaultsCargo TheftFreight IndustryStolen GoodsStolen PropertyTransport SecurityVehicle TheftWorkplace Crime |
Author: Engel, A.W. van den Title: Organised Theft of Commercial Vehicles and their Loads in the European Union Summary: This study analyses the problems, developments and implications of organised theft of commercial vehicles and their loads in the EU. It gives an overview of the volume, nature and yearly damage of this form of organised theft. Furthermore, it analyses how the problem is tackled in the Member States and on the EU level. The final chapter contains recommendations on how European and national policy should deal with organised theft in the road transport sector in the future. Details: Brussels: European Parliament, Directorate-General for Internal Policies of the Union, Policy Department Structural and Cohension Policies, 2007. 89p. Source: Internet Resource: Accessed July 11, 2011 at: http://www.setpos.eu/docs/organised%20theft%20of%20commercial%20vehicles%20and%20their%20loads%20in%20the%20EU%20july%202007%20EN.pdf Year: 2007 Country: Europe URL: http://www.setpos.eu/docs/organised%20theft%20of%20commercial%20vehicles%20and%20their%20loads%20in%20the%20EU%20july%202007%20EN.pdf Shelf Number: 122017 Keywords: Cargo TheftFreight IndustryStolen GoodsStolen PropertyTheft (Europe)Transport IndustryTransport TheftTransportation Security |
Author: Szelp, Attila Title: Cargo Security Initiatives in the EU and the USA, their Impact on Business Operations and Mutual Recognition with Focus on AEO and C-TPAT Summary: The terrorist attacks of September 11, 2001 had a tremendous impact on international trade policy. The USA was the first country to introduce cargo security and facilitation measures as a counteraction. The EU and international organizations also established new security programs in order to better secure cargo movements across borders. This thesis gives an overview of security initiatives introduced by international organizations, the EU and the USA, with an emphasis on the trade facilitation programs Authorised Economic Operator (AEO) and Customs-Trade Partnership against Terrorism (C-TPAT) and a comparison of them. The process towards mutual recognition of these programs is then described. Three case studies put the topic under the microscope: The perception as well as actual benefits and disadvantages from economic actors' points of view are presented and implementation and operational processes in companies are demonstrated. The case studies include port authorities, carriers and logistics providers. Finally, the author reflects on his findings. Details: Vienna: WU Vienna University of Economics and Business, Institut für Transportwirtschaft und Logistik, 2010. 132p. Source: Internet Resource: Thesis: Accessed October 21, 2011 at: http://epub.wu.ac.at/3013/1/Szelp.pdf Year: 2010 Country: International URL: http://epub.wu.ac.at/3013/1/Szelp.pdf Shelf Number: 123074 Keywords: Cargo SecurityCargo TheftMaritime SecurityStolen GoodsStolen PropertyTerrorism |
Author: Veiter, Daniela Title: Cargo Security Initiatives in the United States, Canada and Mexico and their Effect on Trade in the NAFTA Region Summary: Cross-border trade today is an essential driver of nations’ prosperity. A prolonged disruption in a supply chain has an enormous impact on a country’s as well as the global economy. The international transportation network and its long supply chains are very fragile and vulnerable to terrorist abuse or similar attacks. The high number of agents add another level of risk. The products, factories, supply chain facilities and supply chain partners, carriers, people and information could all present danger to the supply chain. Globalization turned the market place into a competitive environment where companies seek to hire the most affordable workers as well as choose the cheapest suppliers or service providers. This trend spreads business practices out all over the world and increases the need for transportation while adding complexity to a company’s value chain. The most effective way is a worldwide cooperation of countries on securing the global trade system without hindering the trade flow. A global partnership involving all agents along a supply chain with harmonised and compatible systems, both for customs work and for the exchange of information would be the perfect solution. And collaboration and coordinated work reduces the risk of disruptions and is more cost-effective too. Since the terror attacks of September 11, 2001 on New York and Washington DC, the international trade community has dedicated more time and money on the issue of security. The U.S. government, the Canadian government and the Mexican government have established a multi-layered defense strategy to protect their people and country. International cargo that is being shipped to certain target countries poses a significant security risk. In particular, cargo containers can be abused to carry weapons, in particular weapons of mass destruction (WMD) or other dangerous items. Those containers are particularly vulnerable to changes from their legitimate commercial purpose due to the numerous transfers within the transport chain they are subject to. Those very same internationally moving containers, though, are of utter importance to global commerce as they ship about 95% of the world’s international cargo, in terms of value. Over 48 million containers are being shipped between seaports around the world. Intermodal transport has enabled trucks and trains to move goods around continents in the ocean containers. Any terrorist actions can have largescale damage to a country’s society and economy and thus it is essential to have systems in place that can prevent such events from happening beforehand. The United States of America was the first country to start introducing plans to identify high risk cargo shipments and soon Canada and Mexico followed. The initiatives seek to ensure security over different levels. There are three main areas of risk that these security initiatives seek to address. First, the security of vital cargo information relating to the contents and destination of the shipment must be accessible by customs authorities. This also includes IT security. Then there is the level of physical control through inspections and screening. The last level covers the entire supply chain through screening and background checks of every agent involved in the process. This includes all groups between the manufacturer and the final destination of the product. This thesis talks about cargo security initiatives in the NAFTA countries of the United States, Canada and Mexico for any shipments crossing borders between those countries by either road, sea, air or rail. It shows the development and intensification of those security regulations over the last years, analyses their purpose and recommends how to best deal with them if you are a business located in this area. Details: Vienna: Institut für Transportwirtschaft und Logistik, WU Vienna University of Economics and Business, 2009. 133p. Source: Internet Resource: Dissertation: http://epub.wu.ac.at/822/1/document.pdf Year: 2009 Country: International URL: http://epub.wu.ac.at/822/1/document.pdf Shelf Number: 123240 Keywords: Cargo Security (U.S., Canada, Mexico)Cargo TheftMaritime CrimeStolen GoodsStolen PropertySupply ChainsTerrorism |
Author: Comeau, Michelle Title: Analysis of 2010 Rochester-City Pawn Shop Transactions Summary: The following report analyzes 2010 data on Rochester pawn shops. Within this paper, pawn shops are listed by pseudonym based on their level of business for 2010. Although many pawn shops may be legitimate businesses, questions of crime and stolen property have become a focus on some pawn shops recently; with the Monroe County Sheriff/FBI raid on Rochester Pawn Brokers, Inc. and several other pawnshops late last September, there is a noted concern of whether these businesses are being utilized to fence stolen property and the frequency to which this occurs. It is for this reason that an analysis of local pawn shops could be fruitful. Pawn shops are second-hand businesses where people may bring goods to either be sold for cash or loaned for a short period of time. Due to limitations in how the data was recorded, our analysis cannot delineate between individuals who pawned and individuals who sold items to the shops; “pawner” will be used to describe any individual who sold or pawned an item. Almost 24,000 transactions occurred within Rochester pawn shops in 2010 – transactions being instances where an individual either pawned or sold an item. Among the 24,000 transactions there were instances of very-active and not-so-active pawners. For this reason, the data will be analyzed by looking at pawners as a whole as well as looking specifically at the most active pawners. The twenty most frequent pawners all sold 30 or more items during this one-year period. The twenty pawners who received the most amount of money for their items were also briefly examined. Furthermore, although there are currently 41 registered pawn shops in Rochester, some pawn shops recorded much higher transactions than others. Fourteen shops recorded fewer than ten transactions for the year – six recorded only one. It is highly probable that several of these shops were the result of typographical errors – in three out of the fourteen shops the addresses were not able to be found. Additionally, Doing Business As information was available for 36 of the pawn shops; of these, 72% opened within the last decade. Details: Rochester, NY: Center for Public Safety Initiatives, Rochester Institute of Technology, 2011. 14p. Source: Center for Public Safety Initiatives Working Paper #2011-03: Internet Resource: Accessed February 19, 2012 at http://www.rit.edu/cla/cpsi/WorkingPapers/2011/2011-03.pdf Year: 2011 Country: United States URL: http://www.rit.edu/cla/cpsi/WorkingPapers/2011/2011-03.pdf Shelf Number: 124202 Keywords: Crime StatisticsNew YorkPawn ShopsStolen Property |
Author: Victoria. Sentencing Advisory Council Title: Sentencing Trends in the Higher Courts of Victoria 2007–08 to 2011–12; Handling Stolen Goods Summary: This Sentencing Snapshot describes sentencing outcomes1 for the offence of handling stolen goods and details the age and gender2 of people sentenced for this offence in the County Court of Victoria between 2007–08 and 2011–12.3 Except where noted otherwise, the data represent sentences imposed at first instance rather than sentences imposed following appeal. A person is guilty of handling stolen goods if he or she dishonestly receives or deals with goods, and knows or believes them to be stolen. Handling stolen goods is an indictable offence that carries a maximum penalty of 15 years’ imprisonment4 and/or a fine of 1800 penalty units.5 Indictable offences are more serious offences triable before a judge and jury in the County or Supreme Court. Handling stolen goods can also be tried summarily by the Magistrates’ Court if the property involved meets certain criteria,6 the Magistrates’ Court considers it appropriate and the defendant consents.7 Handling stolen goods was the principal offence8 in 0.4% of cases sentenced in the higher courts between 2007–08 and 2011–12. Details: Melbourne: Sentencing Advisory Council, 2013. 12p. Source: Internet Resource: Sentencing Snapshot No. 136: Accessed March 30, 2013 at: https://sentencingcouncil.vic.gov.au/sites/sentencingcouncil.vic.gov.au/files/snapshot_136_sentencing_trends_for_handling_stolen_goods_in_the_higher_courts_of_victoria_march_2013.pdf Year: 2013 Country: Australia URL: https://sentencingcouncil.vic.gov.au/sites/sentencingcouncil.vic.gov.au/files/snapshot_136_sentencing_trends_for_handling_stolen_goods_in_the_higher_courts_of_victoria_march_2013.pdf Shelf Number: 128174 Keywords: Fencing Stolen GoodsProperty CrimeSentencing (Victoria, Australia)Stolen Property |
Author: Paine, Colin Title: Solvability Factors in Dwelling Burglaries in Thames Valley Summary: This study replicates previous research aimed at identifying those factors associated with solved residential burglaries. This study analyses all cases of residential burglary in Thames Valley between 1st March 2010 and 31st October 2011. Analysis identified a host of factors correlated to solved cases, but of these just 12 are recognised as effective solvability factors. This study confirms the findings of previous studies in identifying the following variables as effective solvability factors, a) fingerprints recovered; b) offender seen; c) witness recorded; d) offender’s vehicle sighted; e) offender disturbed; f) description of the suspect is recorded. However, this study advances the list of known solvability factors further by identifying six new variables that were traditionally overlooked and some of which result from advances in science, these are a) footwear marks; b) DNA; c) citizens’ reports on the burglary being in progress, d) the stolen property is recovered; e) articles left the scene by the offender and f) whether a vehicle was stolen in the crime. The magnitude of these effects, measured with standardised mean differences, suggest that the presence of these factors is strongly associated with solvability, some with very large effect sizes often exceeding Cohen’s d = 1.0. The analyses suggest that over 50% of all burglaries had one or more solvability factors present, and having one or more of these solvability factors was associated with over 60% accuracy in detection. If used as a screening tool, this solvability analysis approach Thames Valley Police would be required to investigate just over 40% of cases for investigation, as all other cases are unlikely to be solved. The policy implications of using solvability factors analysis is clear; implementing this approach as a screening tool enables police leaders to choose a suitable cut-off point that will allow an optimal balance between resource usage and detection levels. Sensitivity analysis identified that the geographical distribution of burglary solvability factors across Thames Valley is not even. The policy implication being that differential targets may offer a fairer and more effective incentive to police area commanders instead of force wide targets. Details: Cambridge, UK: University of Cambridge, 2012. 153p. Source: Internet Resource: Thesis: Accessed May 29, 2013 at: http://library.college.police.uk/docs/Burglary-Solvability-2013.pdf Year: 2012 Country: United Kingdom URL: http://library.college.police.uk/docs/Burglary-Solvability-2013.pdf Shelf Number: 128847 Keywords: Crime AnalysisCriminal InvestigationResidential Burglary (U.K.)Stolen Property |
Author: Gerney, Arkadi Title: Lost and Stolen Guns from Gun Dealers Summary: Every year tens of thousands of guns are discovered to be missing from the inventories of federally licensed gun dealers. Guns that go missing from dealer inventories, whether they are stolen, illegally sold without proper documentation, or misplaced due to negligent recordkeeping, pose two main risks to public safety: 1. Guns stolen from dealers often end up in criminal hands. Following a two-year study of gun-trafficking investigations, the Bureau of Alcohol, Tobacco, Firearms and Explosives, or ATF, reported that 14 percent of gun-trafficking investigations involved guns stolen from gun dealers. 2. Guns lost or stolen from dealers are more difficult to trace because there is no record of who initially purchased the gun from the dealer. When these guns are used in crimes, any investigative lead offered by finding the gun at the crime scene goes cold when it is discovered that the gun dealer has no record of who purchased it. Since 2004 Congress has imposed restrictions on ATF in its annual budget that make it especially difficult for the agency to police lost and stolen guns. One such restriction prevents ATF from requiring gun dealers to conduct an annual inventory, a process that would allow dealers to promptly identify and report missing guns. In the administration’s fiscal year 2014 budget request to Congress, however, President Barack Obama requested for the first time that Congress remove this harmful budget rider. This issue brief presents the aggregated data on guns that are lost and stolen from dealers each year, discusses example cases of how guns missing from particular dealers have put the public at risk, and explains how Congress has hindered law-enforcement efforts to prevent and investigate thefts from gun dealers. Details: Washington, DC: Center for American Progress, 2013. 10p. Source: Internet Resource: Accessed July 3, 2013 at: http://www.americanprogress.org/wp-content/uploads/2013/06/GerneyInventoryBrief-1.pdf Year: 2013 Country: United States URL: http://www.americanprogress.org/wp-content/uploads/2013/06/GerneyInventoryBrief-1.pdf Shelf Number: 129241 Keywords: Gun DealersGun-Related ViolenceGuns (U.S.)Stolen PropertyTrafficking in Weapons |
Author: FreightWatch International Title: 2013 Global Cargo Theft Threat Assessment Summary: Global cargo theft risks as shown on the above map vary greatly from country to country. Even within individual countries, risks can vary from region to region. On a country-by-country basis, cargo theft threats, as most other criminal activity, are typically rooted in social, economic and cultural conditions. The prevention of cargo theft on a global scale requires intimate knowledge of incident trends on a regional basis, as security programs and mitigation techniques do not always transfer successfully from region to region. Organizations must diligently gather intelligence and adapt their anti-theft programs to address local threats. The purpose of this report is to outline the risk of cargo theft on a global level, highlighting significant countries in the global supply chain in order to assist industry decision-makers in determining their supply chain security needs. According to data collected by FreightWatch International from numerous sources across the globe, including but not limited to FreightWatch International's own databases, its customers, law enforcement agencies, industry organizations, insurance industry sources and news reports, Mexico, Brazil, South Africa, the United States and Russia are the countries most at risk for cargo theft globally. Unless otherwise noted in this assessment report, when specific theft statistics are noted in this assessment report those statistics are derived from FreightWatch International's own data based on cargo security services provided by FreightWatch International to its customers. As such, total theft figures for a particular country or region are likely higher than stated. Please note that this assessment report expresses the opinions of FreightWatch International based on the specific data reviewed. Global cargo theft circumstances and risks can and do change, sometimes frequently and/or quickly, and in ways that may make the facts and opinions expressed in this assessment report no longer complete or valid. As such, the extent to which you rely on the facts and opinions expressed in this assessment should be made entirely by you, in your sole discretion, only after careful analysis of all relevant facts applicable to your business. Details: Austin, TX: FreightWatch International, 2013. 70p. Source: Internet Resource: Accessed September 15, 2014 at: http://www.freightwatchintl.com/sites/default/files/attachments/FreightWatch%202013%20Global%20Cargo%20Theft%20Threat%20Assesment%20Full_0.pdf Year: 2013 Country: International URL: http://www.freightwatchintl.com/sites/default/files/attachments/FreightWatch%202013%20Global%20Cargo%20Theft%20Threat%20Assesment%20Full_0.pdf Shelf Number: 133313 Keywords: Cargo TheftCrimes Against BusinessesFreight IndustryStolen Property |
Author: Benson, Bernadine Carol Title: Addressing heritage crime in Gauteng, South Africa : an integrative exposition Summary: This research explored, described and explained the nature and the extent of heritage crime as it manifested in the Gauteng Province of South Africa for the period 2006-2010. Gauteng was selected since it is deemed to be the hub of the legal trade. An operational definition of heritage objects was drafted for this study as objects of artistic, cultural, historic or archaeological value regardless of age, housed in or curated by museums or galleries within Gauteng, and which are both tangible and moveable. Heritage crime for the purpose of this study was the illegal removal of any heritage object from a museum or gallery. The annual crime statistics released by the South African Police Services (SAPS) contain no reference to heritage crime of any sort. Therefore this research attempted to quantify the incidents of thefts experienced by museums and galleries in Gauteng for the period 2006-2010. Using a mixed method approach, data were gathered by qualitative and quantitative surveys. A total of 28 qualitative interviews were conducted. These data were integrated with the quantitative data which permitted the achievement of the strategic aims set out for this research. The following aims were achieved: The roles and responsibilities of the custodians of the national estate were clarified; International conventions designed to assist in combating crime perpetrated against cultural property were discussed; The national legislation which guides the management, preservation and protection of heritage objects as well as the trade therein within South Africa was examined; Policing agencies at the forefront of combating heritage crime were interviewed and international best practices were identified and compared with that which the SAPS are doing to address crime of this nature. These police agencies are situated in Italy, the United Kingdom, the USA and Germany; The dynamics of the reported incidents of loss/theft were examined. Several anomalies were identified. Among these are the identification of the typologies of items being targeted and the possible identification of the type of thief perpetrating these crimes. Through analysis of incidents it was also possible to highlight that the majority of thefts occur during the time when museums and galleries are open and that the items stolen are usually on open display (not affixed to the surface and not behind a barrier of any sort). Through the analysis of the data for legal trade and the theft incidents it was possible to design a Framework depicting the interface between the legal and illegal markets for trade in heritage objects. The research also provides law enforcement with minimum guidelines to ensure that crimes of this nature are addressed more effectively Details: Pretoria: University of South Africa, 2013. 345p. Source: Internet Resource: Dissertation: Accessed October 9, 2014 at: http://uir.unisa.ac.za/bitstream/handle/10500/13055/Phd%20Benson%20FINAL%20cover%20and%20body%20after%20exam%202013-08-26.pdf?sequence=1 Year: 2013 Country: South Africa URL: http://uir.unisa.ac.za/bitstream/handle/10500/13055/Phd%20Benson%20FINAL%20cover%20and%20body%20after%20exam%202013-08-26.pdf?sequence=1 Shelf Number: 133905 Keywords: Art Theft (South Africa)Cultural PropertyHeritage CrimeIllegal TradeMuseumsStolen Property |
Author: Dugato, Marco Title: Maritime Piracy Worldwide Summary: The phenomenon of maritime piracy dates back to the beginning of seafaring. Since the 1980s, maritime piracy has re-emerged as an international problem because of a significant rise in the recorded attacks. The security of maritime routes is a matter of concern for national governments, ship owners and trade companies whose vessels face the risk of being robbed of their cargo or hijacked for a ransom. Maritime piracy is a complex phenomenon that, according to the definition used, comprises different criminal behaviours (e.g., theft, robbery, kidnapping), modus operandi (e.g., massive armed attacks, insiders, use of skiffs and mother ships) and targets (e.g., the goods carried on the ship, the belongings of the crew, the ship itself). These features may change over time and over space. Looking at the evolution and peculiarities of this phenomenon in different areas can help to identify regularities and implement more effective countermeasures. In recent years, Transcrime has been active in promoting the idea that actual reductions of complex crime phenomena can be reached through specific prevention strategies. This approach relies on accurate analyses of the available data to identify regular patterns and risk factors. This study summarises some of the findings that emerged from the research Transcrime conducted on maritime piracy, using a comparative approach. Details: Trento: Transcrime - Universita degli Studi di Trento, 2015. 15p. Source: Internet Resource: Transcrime Research in Brief no. 1: Accessed march 16, 2015 at: http://www.transcrime.it/wp-content/uploads/2015/02/maritime-piracy.pdf Year: 2015 Country: International URL: http://www.transcrime.it/wp-content/uploads/2015/02/maritime-piracy.pdf Shelf Number: 134932 Keywords: Cargo TheftMaritime Crime (International:Piracy/PiratesShipping IndustryStolen PropertyTheft of Goods |
Author: Shaw, Oliver Title: Crime and the value of stolen goods Summary: - This paper uses the Crime Survey for England and Wales (CSEW) to investigate the value of stolen goods and its relationship to crime trends. The analysis aims to determine: - the types of stolen goods and their value, and how these have changed over time; - whether these changes have played a role in the crime drop since the mid-1990s; - the extent to which the value of goods affects what types of crimes are committed and which items stolen within these crime types; - whether there is a link between the value of stolen goods and the rate at which crime is reported to the police, i.e. are demands on the police and the wider criminal justice system affected by changes to the value of stolen goods? - The total value of all stolen goods, as reported by victims, was estimated to be $1.8bn in 2013/14. This has fallen from $6.9bn in 1995, a 74 per cent drop. There are two components to this. The number of thefts with loss has fallen by about 60 per cent. But this report shows that the average value of stolen goods from a single theft has also fallen, by about 35 per cent. In other words, the overall economic harm to victims from theft has probably declined by an even greater amount than the number of thefts. - Although there are a number of crime types not fully covered by the CSEW, notably fraud, analysis here suggests that changes in the levels of plastic card fraud have not substantially offset the reduction in overall economic harm to victims. - Theft of vehicles has been the biggest contributor to the fall in value of stolen goods between 1995 and 2013/14. This is due to both the large reduction in numbers of thefts (theft of vehicles is down by 88% since 1995) and a small fall in the mean value of the vehicles stolen. - The distribution of criminal gains from theft is heavily skewed. In 2013/14, just 2 per cent of all thefts accounted for 46 per cent of the total value of goods stolen. This means that the mean value of goods stolen per theft is markedly higher than the median value, and that the latter better represents the typical criminal gain from any one incident of theft (bold highlighted in Table 5). - There has been a high degree of stability in the types of items that are stolen. Cash is most frequently stolen with vehicle parts/accessories, the second most stolen item for every year in which the CSEW has run from 1981 to 2013/14. Of the items stolen that would feasibly be resold by a thief, just nine types of goods - vehicle parts/accessories, cars/vans, bicycles, stereo/hi-fi equipment, clothes, jewellery, tools, garden furniture and mobile phones - account for the top six most stolen items in every year. Value is clearly a factor in determining which goods are most stolen, but it is not the only factor. Details: London: Home Office, 2015. 56p. Source: Internet Resource: Research Report 81: Accessed October 15, 2015 at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/468003/horr81.pdf Year: 2015 Country: United Kingdom URL: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/468003/horr81.pdf Shelf Number: 136989 Keywords: Crime TrendsEconomics of CrimeStolen GoodsStolen PropertyTheft |
Author: Great Britain. Home Office Title: Reducing Mobile Phone Theft and Improving Security. Paper 2 Summary: In September 2014 the Home Office and the Behavioural Insights Team published the joint paper: Reducing Mobile Phone Theft and Improving Security1. That paper used data from Crime Surveys (Crime Survey for England and Wales) conducted between 2005/06 and 2012/13, together with data from the Metropolitan Police about the theft of mobile phones in London between August 2012 and January 2014, to set out a detailed picture of how and when mobile phones are stolen and the types of phone most likely to be stolen. It also included the first Mobile Phone Theft Ratio. When we published that material, we were conscious that the picture it presented might well have changed following the widespread introduction of device based solutions by manufacturers from September 2013 onwards. They were introduced to help reduce mobile phone theft. This paper provides an updated picture of mobile phone theft, including an updated Mobile Phone Theft Ratio, to provide a more contemporary picture capturing the impact that the security features introduced by manufacturers have had on levels of theft. Our findings show: - there has been a fall in levels of mobile phone theft since the introduction of device based solutions such as Apple iOS7 and Samsung Reactivation Lock; - there has been a fall in the proportion of mobile phone thefts across all age groups and genders, except for 22-24 year old males; - 18-21 year old females remain the most vulnerable to mobile phone theft; and - methods such as pick-pocketing and snatch theft, followed by theft of unattended items such as leaving a mobile phone on a bar or restaurant table, are the most common methods used by criminals. Details: London: Home Office, 2016. 28p. Source: Internet Resource: Accessed March 26, 2016 at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/509855/PRINT-6-1946-HO-Reducing_Mobile_Phone_Theft_and_Improving_Security_March....pdf Year: 2016 Country: United Kingdom URL: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/509855/PRINT-6-1946-HO-Reducing_Mobile_Phone_Theft_and_Improving_Security_March....pdf Shelf Number: 138426 Keywords: Cell PhonesCrime PreventionMobile PhonesPick-PocketingStolen PropertyTheft |
Author: Brodie, Neil Title: How to Control the Internet Market in Antiquities? The Need for Regulation and Monitoring Summary: Illicit antiquities, some pilfered from war zones where jihadist groups operate, are increasingly finding their way online where they are being snapped up by unknowing buyers and further driving the rampant plunder of archaeological sites. These internet sales are spurring a vicious cycle: increasing demand for antiquities, which drives the looting, producing a greater supply of artifacts, which further increases demand. While global auction sales of art and antiquities declined in 2015 - falling as much as 11 percent -online sales skyrocketed by 24 percent, reaching a staggering $3.27 billion dollars. According to Forbes, "This suggests that the art market may not be 1 cooling, exactly, but instead shifting to a new sales model, e-commerce." How can an online buyer guarantee that a potential purchase is not stolen property, a "blood antiquity," or a modern forgery? The best protection is to demand evidence of how the object reached the market in the first place. However, as in more traditional sales, most antiquities on the internet lack any such documentation. Online shoppers therefore have limited means of knowing what they are buying or from whom. This is a particularly serious concern given the industrial scale looting now taking place in Iraq and Syria, which the United Nations Security Council warns is financing Daesh (commonly known as ISIS, ISIL, or Islamic State), al Qaeda, and their affiliates. Despite the clear implications for both cultural preservation and national security, so far public policy has completely failed to regulate the online antiquities trade. This is particularly true in the United States, which remains the world's largest art market and a major center for the internet market in antiquities. American inaction has 3 made it impossible to combat the problem globally, and moreover, is in great contrast to positive steps taken by other "demand" nations like Germany. This paper offers practical solutions to help better protect good faith consumers from purchasing looted or fake antiquities - while also protecting online businesses from facilitating criminal behavior. After briefly reviewing what is known of the organization and operation of the internet market in antiquities, it considers some possible cooperative responses aimed at educating consumers and introducing workable regulation. These responses draw upon the German example, as well as recent criminological thinking about what might constitute effective regulation. Finally, the paper makes seven policy recommendations, which while geared towards the American market, are applicable to any country where antiquities are bought and sold online. Details: Washington, DC: Antiquities Coalition, 2017. 16p. Source: Internet Resource: Policy Brief No. 3: Accessed September 15, 2017 at: http://thinktank.theantiquitiescoalition.org/wp-content/uploads/2017/07/Policy-Brief-3-2017-07-20.pdf Year: 2017 Country: International URL: http://thinktank.theantiquitiescoalition.org/wp-content/uploads/2017/07/Policy-Brief-3-2017-07-20.pdf Shelf Number: 147333 Keywords: Antiquities Cultural Property Heritage Crime Internet CrimeInternet TradeLooting Stolen Property Trafficking in Antiquities |
Author: Global Initiative Against Transnational Organized Crime Title: Transnational Organized Crime and the Impact on the Private Sector: The Hidden Battalions Summary: his paper is based on a detailed review of the scale and nature of organised crime's infiltration of the private sector. These findings are a 'call to arms' for the international private and public sectors to transform their co-operation and teamwork. We have adopted a practical definition of organized crime as that which is carried out by a group of people, suspected of serious criminal offences, over a prolonged period, motivated by profit or power. In our analysis of six major private sector industries, six specific forms of organised crime stood out as either having material impact on the private sector, or using the private sector as facilitators. Money laundering is the process of making dirty money look clean. One estimate puts it at 2% of global GDP - c.$1.5 trillion. Money-laundering is an 'enabling crime', facilitating organized crime (as well as terrorism) with social and economic costs. Asset misappropriation refers to stealing from businesses. For example, cargo thefts cost as much as $30 billion in losses each year worldwide. Counterfeiting and contraband, whilst thought of as being a consumer goods crime, is rife in a broad range of sectors, in particular technology products and pharmaceuticals, to devastating effect. It is estimated by OECD at $461billion, or 2.5% of world trade. Fraud and extortion remain strongly present in the financial, construction and real estate industries. In construction extortion could account for of 20-30 per cent of lost project value. Human trafficking. High volume, low skilled labour enterprises such as construction and building, have the highest penetration of trafficking incidence in the private sector. Cyber Crime. Hacking attacks cost the average American firm $15.4 million per year over. In 2015 68,000 URLs containing child sexual exploitation and abuse (CSEA) images were hosted online on 1,991 domains. The reputational impact means major tech companies apply significant collaborative resources to weeding out criminal, terrorist and CSEA activity. Finding#1: The Scale and Impact of Crime in the Private Sector is Truly Staggering. A conservative estimate of the value of organized crime was $3.6-$4.8 trillion, in 2015/2016, 7% of global GDP. The broader impact of organized crime is difficult to assess as it is multi-dimensional, and shared across the private, public sector, and society itself. The impact on the private sector only - in terms of revenue loss - is estimated at c$130 billion. The Institute of Economics and Peace (IEP) calculated the financial cost of terrorism at over $52 billion in 2014. A conservative estimate of total transnational organized crime is $870 billion a year. This is more than six times the amount of official development assistance and close to 7% of the world's exports of merchandise Finding #2 Private sectors are either facilitators or targets. Crimes are either done 'to' private sector organisations, or 'through' them. Sectors are either the targets of fraud or asset theft themselves, particularly in construction, consumer goods ($460 billion counterfeit goods), and financial card fraud, or they facilitate crime unwittingly, through use of technology networks by fraudsters to target victims, e.g. the real estate sector laundering dirty funds or the transport industry moving illicit goods. Regulation varies between the 'victim' and 'enabling' industries. Laws are in place to criminalise the use of the private sector for technology or money laundering crime. The victim industries, however, often are reliant on existing laws around theft, or copyright infringement, which are not tailored to the activities of TOC groups and tend to have lower penalties for infringement. Finding #3 Organized crime's impact on the private sector is growing not shrinking. Counterfeit goods have risen from $250 billion to $461 billion in the last 8 years. Asset theft in the transport and logistics theft rose by over 90% 2015 to 2016. There is a sense that regulation is not working: money laundering seizures equated to 0.2% of all laundered funds in one study; and after the dark web's Silk Road was taken down, many sites sprung up to take on and indeed grow the trade. Finding #4 Direct impact of Crime Disproportionately felt in the global south. Sweatshops flourish in South Asia; trafficking of labour and sex workers originates predominantly in Africa, Asia and Eastern Europe; corruption in natural resources damages production in Africa and the Caucasus; technology fraud is driven from eastern and southern Europe, West Africa and the Middle East. Whereas in developed economies counterfeit drugs may comprise less than 0.2 percent of the market developing markets are often beset by 30% fakes, as a UNODC report showed for anti-malarial drugs in Africa. Globalization is increasing the 'attack surface' for TOC groups. The abuse of the often weaker regulatory regimes in the Global South by TOC groups further increases the risk for the private sector operating in these areas. Finding #5 Responses re confrontational rather than collaborative. There are very few examples of successful public and private sector co-operation against TOC groups. Private sector organisations complain that communication with the law enforcement sector is one-way and that the regulatory reporting burden, designed to combat crime, can act as a deterrent to co-operation. Tangible results have been seen when industries take the lead on disrupting the work of TOC groups, such as TAPA the Transported Asset Protection Association Details: Geneva, SWIT: The Global Initiative, 2017. 84p. Source: Internet Resource: accessed December 7, 2017 at: http://globalinitiative.net/wp-content/uploads/2017/12/gitoc_tocprivatesector_web-1.pdf Year: 2017 Country: International URL: http://globalinitiative.net/wp-content/uploads/2017/12/gitoc_tocprivatesector_web-1.pdf Shelf Number: 148755 Keywords: Cargo TheftContrabandCounterfeit GoodsCybercrimeExtortionHuman TraffickingIllicit TradeMoney LaunderingOrganized CrimePrivate SectorStolen PropertyTheft of Goods |
Author: New Jersey. Commission of Investigation Title: Corrupt Commerce: Heroin, Thievery and the Underground Trade in Stolen Goods Summary: In two years, he burned through an $800,000 inheritance, lost his home and allowed his family business to die. Desperate and broke, he found a lucrative new way to fund the heroin addiction that consumed his fortune and his life: stolen metal. He tore wire and copper pipe from buildings. He heaved manhole covers from the streets, ripped storm drains from parking lots, pulled heavy metal pins from construction barriers. Then, in an old sedan weighed down nearly to the pavement, he routinely took his haul to a booming scrap yard linked to organized crime in Hillsborough, Somerset County. There, the owner and employees readily bought the stolen metal for cash, no questions asked, not a word to the police. A hundred miles to the south, a young woman hit upon her own way to remedy the dopesickness that dictated her daily rhythms. She led a crew that shoplifted more than $100,000 in goods from major retail chains, then returned the items for gifts cards in the amount of the stolen merchandise. She sold those cards for 50 cents on the dollar to willing businesses across South Jersey. Again, no questions asked, no alert about suspicious behavior. The State Commission of Investigation has found that these circumstances are emblematic of a corrupt and enduring commerce in New Jersey's lightly regulated and often lawless world of scrap yards, pawn shops, cash-for-gold outlets and secondhand goods operations. Driven largely by the heroin and opioid epidemic, this shadowy underground economy is being exploited for profit across the state by convicted felons and elements of organized crime. In business after business, Commission investigators identified owners and employees with extensive criminal histories, including convictions for fraud, burglary, receiving stolen property, assault, firearms violations, narcotics distribution and racketeering. The SCI found evidence of drug-dealing directly from the counter at one shop, the illegal sale of handguns at another and links to a mob-related loansharking scheme at a third. At those locations and others, investigators found that owners and employees regularly accepted stolen goods, from jewelry to power tools, and in some cases directed customers to steal in-demand items likely to maximize profits upon resale. Collectively, the Commission estimates, the businesses have bought and sold tens of millions of dollars in stolen goods in recent years. This thriving marketplace, operating with little oversight or accountability, incentivizes theft and promotes destructive acts against both public and private infrastructure, putting residents in jeopardy. The widespread plundering of copper wiring and heavy-duty backup batteries from cell phone towers undermines cellular service during power outages. The theft of wire that transmits signals along train tracks delays commuters, requires costly repairs and strains an already overtaxed transit system. The removal of electricity-conducting wire from utility substations compromises the power grid. Little is off limits. Scrap hunters have ripped the risers from bleachers at schools, made off with aluminum street lamps from highways and stolen bronze vases from graves. The enormous costs of the illicit bargain between thieves and unscrupulous owners are borne by all New Jerseyans: the ratepayers who see higher bills for cell service and electricity; the consumers who pay more for goods at retail stores; the taxpayers ultimately responsible for replacing infrastructure that has vanished in the night. By providing an easy route for drug addicts and opportunists to cash in on stolen metal and merchandise, these enterprises have helped spawn an endless cycle of theft, one that law enforcement cannot keep pace with, much less end, without a muscular response from the State. The Commission carried out this investigation in keeping with its 50-year-old statutory mandate to identify and expose corruption, to highlight government laxity and gaps in oversight, to determine the effectiveness of New Jersey's laws and to inform the Governor, the Legislature, the Attorney General and the public about the influence and intrusion of organized crime. In particular, the findings set forth in this report build upon groundbreaking investigative work dating back nearly a decade when the SCI became one of the first agencies of government to identify the burgeoning opioid and heroin epidemic. Over the course of this inquiry, SCI investigators issued scores of subpoenas, analyzed banking records and conducted more than 100 interviews with law enforcement officers, metal recyclers, state and municipal officials, representatives of the telecommunications and retail industries, and the owners and employees of outfits engaged in suspect or illegal behavior. Just as significantly, the SCI interviewed those with the clearest view of interactions with these businesses: the addicts and former addicts who carried out thefts for drug money. SCI agents also conducted surveillance at suspect establishments and, in cooperation with police departments and confidential sources, participated in sting operations at scrap yards and secondhand goods stores. In those cases, items purchased by the Commission or lawfully obtained from utilities, phone companies and retail stores were sold to owners or employees with the fictive understanding the items had been stolen. The inquiry found that state and municipal regulations governing these businesses are scattershot, inadequate and unevenly enforced. The State licenses traditional pawn shops, which provide collateral-based loans, while municipalities license cash-for-gold shops, secondhand goods stores and scrap yards. Ordinances vary widely in strength and effectiveness from municipality to municipality. Laws governing some aspects of the businesses have proven to be window dressing, too minimal in scope and so erratically enforced they have failed to deter the prodigious flow of stolen goods. Equally troubling, SCI investigators found that many owners regularly flout the few rules that apply to them with little or no consequence. In some towns, the Commission found, law enforcement officials were unaware their governing bodies had passed ordinances giving police the means to crack down on the businesses - a breakdown in communication and coordination that has sapped accountability. The Commission is mindful that pawn outlets, secondhand goods stores and scrap metal recyclers contribute to the tax base in their communities and provide services helpful to the public. Local scrap yards are building blocks in the international commerce of recycled metal. In addition, not all owners and employees operate flagrantly outside the bounds of decency and the law. But in the absence of meaningful oversight, far too many of these operations have been subverted by criminal activity. The Commission recommends the State take the lead in licensing and regulating these industries. As the Legislature in recent decades has moved to root out organized crime from New Jersey's trash-hauling companies and casinos, so, too, should the State ban mob associates and those with extensive criminal records from trades that remain obvious and attractive pathways for the disposal of stolen property. Further, the Commission recommends requiring owners and employees to record all transactions in an online database accessible by law enforcement. Two such databases are already in use in neighboring states and in a minority of New Jersey municipalities, allowing investigators to more efficiently track sales, identify trends, find stolen merchandise and hold dishonest owners and employees accountable. Details: Trenton: The Commission, 2018. 108p. Source: Internet Resource: Accessed June 21, 2018 at: https://www.nj.gov/sci/pdf/Stolen%20Goods%20Report%20Final.pdf Year: 2018 Country: United States URL: https://www.nj.gov/sci/pdf/Stolen%20Goods%20Report%20Final.pdf Shelf Number: 150626 Keywords: Illegal TradeMetal TheftNarcoticsOpioid CrisisOrganized CrimeScrap Metal TheftStolen GoodsStolen PropertyTrafficking in NarcoticsUnderground Economy |
Author: Ekwall, Daniel Title: Value and incident categories for cargo theft in Europe: Analysing TAPA EMEA statistics Summary: Purpose of this paper To analysis the relationship between value (reported stolen value) and different incident categories in order to find patterns and trends in cargo theft within Europe. Design/methodology/approach The research is explorative as this type of research is missing in logistics but also deductive as it utilizes theories from criminology. The analysis is based on TAPA EMEA's IIS transport related crime database. The result is analyzed and discussed within a frame of reference consisting of theories from logistics and criminology. Findings There are seasonal variations of incident categories. This variation is found both between months of the year and the day of the week for many of the incident categories, but the patterns are different for different incident categories. Within this understanding there are many changes in hot spots, modus operandi, theft endangered objects and handling methods during time, but the basic theoretical frame of reference is still more or less the same. Research limitations/implications The research is based on theories deduced from criminology and logistics together with secondary data regarding cargo theft. The geographically limitation to the Europe is done of practical reasons whiles the frame of reference can be used globally for analysis antagonistic threats against transports. Practical implications This research is limited by the content and classification within the TAPA EMEA IIS database. Nevertheless, this database is the best available database and the reports comes mainly from the industry itself, represented by the different TAPA members how report their losses anonymous, nevertheless the quality of the data limits the possibility to make normative statements about cargo theft prevention. What is original/value of paper This paper is the first within supply chain risk management that utilizes actual crime statistics reported by the industry itself, in order to analyze the occurrence of cargo theft by focusing on the value of the stolen vehicle/goods in relation with incident categories. Details: Conference paper, 2012. 17p. Source: Internet Resource: Accessed July 14, 2018 at: http://www.diva-portal.org/smash/get/diva2:887489/FULLTEXT01.pdf Year: 2012 Country: Europe URL: http://www.diva-portal.org/smash/get/diva2:887489/FULLTEXT01.pdf Shelf Number: 150871 Keywords: Cargo TheftFreight IndustryRisk ManagementStolen GoodsStolen PropertySupply Chain SecurityTheft of GoodsTransport Security |