Introduction

In recent years, there has been a wealth of research into the nature of burglary, and, in particular, the practices of burglars. Such work covers a range of areas, including offenders’ target selection (Maguire and Bennett 1982; Cromwell et al. 1991a; Armitage 2006; Taylor 2014; Townsley et al. 2015; Vandeviver et al. 2015), motivations (Cromwell et al. 1991b; Wright and Decker 1994; Nee and Meenaghan 2006; Sanders et al. 2017), modus operandi (Bennett and Wright 1984; Bernasco 2008; Markson et al. 2010; Fox and Farrington 2012), as well as the offloading of stolen goods in order to acquire cash and/or drugs (Schneider 2005; Sutton 2010). From an offender’s perspective, this latter element remains as important a part of the offence chain as the burglary act itself (Sutton 2010).

With victim reports from the Crime Survey for England and Wales estimating the total value of stolen goods at £1.8bnFootnote 1 (Shaw et al. 2015), there has been a multitude of research into stolen goods markets in recent years. This research has illustrated the varying nature of such markets, whether these include commercial ‘fences’ (dealers of stolen goods), residential fences, sales between offenders, the sale of goods in bars/pubs or door to door, or through online markets (Sutton 1998, 2010). It is anticipated that developing knowledge of these markets will help identify opportunities for intervention to try and minimise these activities, through the Market Reduction ApproachFootnote 2 (Sutton 1998).

Research into stolen goods markets has revealed a particular specialism amongst offenders, specifically, those who steal-to-order, whereby they will steal specific items as requested by potential buyers. Previous research has acknowledged the presence of steal-to-order offenders (Maguire and Bennett 1982; Nee and Meenaghan 2006; Sutton 2008), with Sutton (2008) exploring the interplay between steal-to-order offenders, their fences, and the demand for goods. However, there has generally been limited research into the practices of offenders during the course of these offences, which the current paper seeks to address.

Why look at steal-to-order offenders?

One of the key reasons for work into offender behaviour is to develop a better understanding of the offending process, with a view to illustrating how this may be disrupted though identifying specific points for intervention. In relation to burglary, research has explored the varying typologies of offenders, to help develop a greater understanding of offender behaviour, support crime prevention, and support police investigation efforts (Vaughn et al. 2008; Fox and Farrington 2012). The current paper furthers this work by advancing understanding of the practices employed by offenders during steal-to-order offences. However, those who engage in steal-to-order offences may also steal-to-offer, whereby they will offer stolen goods to a number of potential buyers, and will not necessarily steal-to-order exclusively (Sutton 1998). Nevertheless, if it can be identified that the practices of offenders during steal-to-order offences differ, for example, to those exhibited during non-steal-to-order offences, in terms of what they steal, how they approach the offence, and how they offload their goods, this may help to identify ways in which intervention can be targeted to help reduce or disrupt such offences in future. This may be used to help inform subsequent crime prevention approaches, as well as to support police investigation efforts.

Burglary, theory, and stealing to order

There is a clear link between steal-to-order offences and environmental criminology. Whilst some criminological explanations of crime help to account for the locations that offenders may target (i.e. Routine Activity Theory—Cohen and Felson 1979; Crime Pattern Theory—Brantingham and Brantingham 1993), other theoretical perspectives help to shed light on the behaviour of offenders during the offence process. Rational Choice Theory is one such perspective. Devised by Clarke and Cornish (1985), the theory is based on the notion that when faced with a decision to commit crime, an offender will weigh up the potential benefits (financial reward) against subsequent risks (detection). Though initially concerned with the decision of whether or not to commit crime at a given opportunity, the features of this theory (i.e. the conscious, decision-making process) may be applied to most aspects of the criminal offence process, from deciding to commit an offence, through to offloading goods following an offence. Critics of this theory argue that the perspective views offenders as highly rational, reasoning individuals (De Haan and Vos 2003), and overlooks some of the key emotional processes present within offending, including fear, guilt and shame, as well as factors such as moral ambiguity and impulsiveness. Nevertheless, there has been a wealth of literature that has identified a growing number of offenders as being highly rational individuals (Bennett and Wright 1984; Nee and Taylor 1988; Cromwell et al. 1991a; Nee and Meenaghan 2006; Taylor 2014; Nee 2015). Such literature has identified the use of reasoned decision making amongst a ‘professional’ category of offender, and, as such, Rational Choice Theory would appear to lend itself to offenders who may be deemed more ‘professional’ in nature (which may include offenders who steal-to-order).

Within the context of burglary, there is a vast body of literature that depicts burglars as ‘professional’ in their approach, demonstrating a degree of planning in their offending (Shover 1973; Maguire and Bennett 1982; Fox and Farrington 2012). Moreover, past research has illustrated the level of procedural and perceptual expertise within the decision-making process of burglars (Wright et al. 1995; Clare 2011; Nee 2015), suggesting how offenders demonstrating such expertise also engage in a process of rational decision making during the offending process. For example, Nee and Meenaghan (2006) identified how more ‘professional’ offenders often had some prior knowledge of the target and its occupants, usually for a number of days prior to the offence. In their work into burglary, Maguire and Bennett (1982) identified a ‘high-level professional’ burglar, who would typically plan their offences, target valuable items, and may steal-to-order during the course of their offending. Such offenders evolved through the cultivation of relationships with more discerning, trusted buyers of stolen goods, which could often take a number of years to foster. Similarly, in their research into experienced burglars, Nee and Meenaghan (2006) also identified the presence of steal-to-order offenders; however, their findings suggested there to be a general increase in the sophistication exhibited by offenders in their disposal of stolen goods. As such, these papers help to situate steal-to-order offenders amongst a more ‘professional’ class of offender. Nevertheless, what these papers fail to do is reveal the nature or practices of offenders during steal-to-order offences.

A key piece of work which has helped to shed light on steal-to-order offenders is that of Sutton (2008), who undertook interviews with 20 offenders under supervision within Mansfield and Nottingham’s prolific offender units. Offenders reported being involved in steal-to-order offences, through requests for specific products at a specific time, or for a particular make and model of car. In such instances, offenders would retain a mental note of such demands and wait for the opportunity to steal the item, or until they were aware another offender was selling these items (Sutton 2008). It was found through this work that stealing to order could influence the development of an individual’s criminal career, the frequency of offending, or the types of goods taken and offences committed. For example, one participant was encouraged to steal cigarettes, and, as a consequence, turned to commercial burglaries to fulfil this request. Similarly, Sutton (2008) gives the example of an offender who stole whiskey regularly from supermarkets to sell to his friends, despite concerns he had about being detected, as this was outweighed by the knowledge that he could sell this on within 30 min following the offence. It was acknowledged through this research that once people in the community become aware that an offender is able to supply specific goods, they are subsequently approached on a regular basis with orders for particular items (Sutton 2008), illustrating the dynamic between supply and demand with this type of offence. This work also illustrated the value of commercial burglaries in supporting steal-to-order operations, whereby offenders will target commercial premises to enable them to supply large quantities of items (such as cigarettes or alcohol) through residential and/or commercial fences (Sutton 2008).

The research by Sutton (2008) has been invaluable in illustrating the dynamics between steal-to-order offenders, their fences and the demand for goods, as well as providing an initial insight into the behaviours of such offenders. Nevertheless, it is hoped the current paper can build on this work, through offering a more detailed look into the practices exhibited during steal-to-order offences. Given the premeditated nature of these offences, it is important to examine the practices of offenders prior to, during, and following steal-to-order offences, exploring any key differences with non-steal-to-order burglaries, and, where appropriate, identifying any suitable opportunities for targeted intervention.

Data and methods

The research presented in this paper took place between January and December 2015 in West Yorkshire, England. To provide some context to the current paper, interviews were undertaken in an adult male prison with a sample of 23 offenders who held prior or current convictions for burglary, with a view to developing a greater understanding of offenders’ target selection and offending practices. Of this sample, 15 reported having stolen to order previously, and it was from this sub-sample that the current paper is based. Offenders in the current sub-sample were largely similar to those of the broader sample in terms of age, though had received on average a greater number of convictions and committed a greater number of burglary offences.Footnote 3

The average age of participants in the current sample was 36 years. All participants had received previous convictions for burglary. Specifically, participants had received an average of 18 convictions for burglary, for an estimated average of 111 burglary offences (that were known and recorded, a number of which had been taken into consideration, or ‘TIC-ed’, at the time of the offender’s arrestFootnote 4). It is of note that a number of offenders stated that they had committed 100s (if not 1000s) more burglary offences for which they had never been caught (and which were not recorded). All participants reported taking drugs in the months leading up to their incarceration for their current sentence, the nature of which varied considerably amongst participants. As such, burglary appeared to play a varying role in offenders’ drug use, whether this was to directly fund a physical addiction, or to support a lifestyle in which the use of drugs was an important component.

Interviews took place in the prison’s legal visits department, and were recorded using written notes due to restrictions on the use of recording equipment. It is acknowledged that, as a result, it was not possible to record all responses verbatim. It is also pertinent to acknowledge the researcher’s recognition of the potential for offenders to falsify accounts or present themselves favourably during interview, whether this may be through detaching themselves from criminal acts or overstating their role in an offence (Elffers 2010). However, it was decided that offender accounts would not be verified for the current project, not only due to the resources required to verify the accuracy of such accounts, but also to help maintain the researcher’s rapport with individuals during the interview process.

Interviews were semi-structured to ensure key areas were explored regarding offenders’ offending practices whilst providing sufficient flexibility to explore areas raised. Interviews focused on exploring the practices of offenders who had previously stolen goods to order; this included the demand for goods, the type of goods stolen, the means and speed of disposal, and the range/nature of techniques used by offenders. The interviews were purposely broad in nature to allow the researcher the opportunity to explore the practices adopted by offenders.

Interviews were transcribed and then analysed using a qualitative form of content analysis: ‘Ethnographic Content Analysis’ (ECA, as developed by Altheide and Schneider 2013). Similar to the more traditional content analysis approach, ECA seeks out the presence of pre-determined themes within the interview transcripts; however, it provides a greater degree of flexibility than more traditional approaches. Under this approach, initial categories may be formed, yet may be amended and revised through the analysis of subsequent interview scripts, using an iterative approach. This affords greater flexibility to move between the phases of analysis, conceptualisation, and interpretation than more traditional forms of quantitative content analysis (Altheide and Schneider 2013). However, a more traditional form of content analysis was also used to quantify the occurrence of certain responses regarding offender practices. This was chosen to help understand the differences/similarities between offenders with regard to factors such as type of goods stolen, means of disposal, or speed of disposal.

Findings

Steal-to-order or steal-to-offer?

Though this paper is concerned with offenders who have stolen to order during a burglary offence, as highlighted earlier in the paper it is important to acknowledge that offenders may also ‘steal-to-offer’, whereby they will steal goods before offering these to a number of potential individuals/groups (Sutton et al. 2001). Indeed, the offenders in the current sample also deployed steal-to-offer strategies as part of their offending repertoire:

Getting rid of it - within the hour. 2 buyers - they will take everything. Do jobs, on way to friends, ring buyers say I’ve got this, they will offer money etc., may be in a car, then meet and do deal (Participant Eight).

Go and try and get rid of it. Had buyers lined up anyway. 10/20 different buyers - different things. Know what people would buy (Participant Ten).

We had a scrap man that we knew, go to guy (Participant Two).

Indeed, it was apparent that participants were able to draw on a range of buyers that they knew would purchase specific goods, even if they didn’t have buyers already lined up. Such buyers included commercial and residential fences, as well as network salesFootnote 5, supporting previous work into this area (Sutton 1998, 2008). Interestingly, in instances where offenders were unable to sell on goods, they described how they would make use of these for other purposes. For example, in such instances, offenders described utilising such vehicles to help facilitate their offences: “Sometimes, if couldn’t sell’em, use cars, take plates from a matching car” (Participant 13).

It is also important to recognise that amongst the current sample of offenders who reported stealing to order, this was not the exclusive remit of their offending. Through interviews it emerged that stealing to order was simply one ‘facet’ of their offending as and when it was required; it is during the uptake of such opportunities that the current paper sought to explore. Interestingly, however, this was in contrast to the work of Sutton (2008), who found that some offenders only ever stole goods to order.

During interviews there emerged four key areas in which similarities/differences were identified in the practices of offenders during steal-to-order and non-steal-to-order offences, and it is these areas that provide the framework for the remainder of the results section. These areas were identified as follows: goods taken/demand for goods, means of disposal, speed of disposal, and the professionalism exhibited by offenders. For the purposes of interviews, stealing to order was defined as the stealing of goods specifically to fulfil an order placed by would-be buyers in advance of the offence.

Goods taken/demand for goods

The goods taken by offenders during steal-to-order offences are illustrated in Table 1.

Table 1 Steal-to-order goods targeted

The two most commonly stolen-to-order items were technology products and jewellery. It became apparent that there appeared a degree of flexibility amongst offenders with regard to what they chose to take, depending on what was ordered at any given time: “Phone, wallet, jewellery, money, antiques, whatever people ordered” (Participant 11). The nature of goods stolen is consistent with the literature into items commonly stolen (Shaw et al. 2015). However, the above quote also illustrates how one of the primary drivers underpinning the items taken was the nature of orders received. One offender talked about how he had different people phoning him for different goods, creating a steady demand for goods: “Did steal-to-order; had different groups of people - they phone up to ask” (Participant 15). Offenders often described how they would “Keep an eye out for stuff” (Participant 11) once they had received an order for goods. One offender also described the immediacy of acting on an order if the price was sufficient: “If it was good money I would go straight out to do it after the order, otherwise I would just do it as part of my normal offending” (Participant Seven).

As can be seen in Table 2, in the current research the demand for goods was driven predominantly through network sales, in addition to commercial fences. As was also found in the work by Sutton (2008, p. 42), offenders were sometimes given a ‘shopping list’ or ‘loot list’ from different buyers for goods that they would look out for in their offences: “Laptops etc. I sometimes had a shopping list” (Participant Ten). Moreover, when looking for particular goods, offenders reported that they would generally know the types of areas to target for goods: “Know types of areas [I would] go for money, and jewellery, etc.” (Participant 11).

Table 2 Preferred methods of disposal

As well as being driven by the demand for goods, for a number of offenders, their preference for goods was also influenced by those that were easy to conceal and carry on their person: “Gold is favourite - easy to conceal and get rid of” (Participant One) or “Phones easier to take. Normally a laptop bag around, or carry without. Xbox in carrier bag” (Participant Three). This provides direct support for Clarke’s ‘CRAVED’ hypothesis (1999), which denotes the main features of goods taken by offending during acquisitive offending: ‘Concealable’, ‘Removable’, ‘Available’, ‘Valuable’, ‘Enjoyable’, and ‘Disposable’. This also supports previous work which has highlighted the importance of ease of disposal in influencing burglars’ targeting of particular goods (Stevenson and Forsythe 1998; Schneider 2005) and, as such, highlights the importance of this factor when taking orders from would-be customers. What became apparent during interview was the degree of opportunism exhibited by offenders, whereby aside from targeting specific goods, the majority of offenders also demonstrated an inclination to take other goods that may be available, of high value, and easily disposable, providing further support for Clarke’s CRAVED hypothesis (1999): “Only started burglaries for car keys. Used to steal cars. But as got more advanced had to have keys, so burgled to steal keys. But then whilst there may as well take everything else from there” (Participant 14).

What is also prudent to note at this point is the distinction between more general items that are stolen to order (for example, technology products such as laptops), and more specific items stolen to order (such as a particular make and model of car). With the latter, the demands of the buyer may be much more specific, and consequently offenders may need to be more discerning in their acquisition of such goods, particularly when compared to the procurement of more general items, which are likely to be more readily available. This distinction was particularly apparent amongst the current sample with the ordering of particular makes and models of car.

As is highlighted in Table 1, six offenders in the sample reported that they had stolen cars to order previously. It emerged that such offences predominantly targeted high performance cars: “When steal-to-order - performance cars: Audis, BMWs, R32 - 2/3 K, BMW - M5, Audi - RS5, Mazda, Golfs” (Participant 14), “Have stolen to order, i.e. Golf, £1000/£1500 per car. At time, don’t think about specific features” (Participant Six), and “Always got a specific car to get. Ford Mondeos. Others as and when” (Participant 13).

Offenders reported how they would receive orders for cars from “Different groups of people - they’ll ring and ask” (Participant 15). Often offenders would make initial contact from would-be buyers to take orders over the phone: “Go out on night - phone car dealer in Bradford - if he was after a car or general cars he would tell me cars he wanted” (Participant 13). A hybrid steal-to-order/steal-to-offer model was also described by one offender in relation to high value bicycles: “Lot of high value pedal bikes… If saw good bike, ring dealer, ask if they want them, and then do job and take it to them” (Participant Four).

Once offenders received an order for cars, it appeared that they would go out and actively search for these; as one participant put it, such offences were “Opportunist but [with] some element of planning” (Participant 14). The same offender described how he would search for cars during the day, and, once a vehicle had been found, return later that evening to target the property in order to access the car: “Drive through the day, find somewhere, night-time, go drive there with tools”. It appeared that this offender only became involved in burglary because of the enhancements in vehicle security which meant that cars could not be stolen without keys: “Only started burglaries for car keys. Used to steal cars. But as got more advanced had to have keys, so burgled to steal keys”. This supports previous work into the use of car key (or so-called ‘Hanoi’Footnote 6) burglaries, where properties are targeted to access car keys in order to steal a vehicle (Levesley et al. 2004; Shaw et al. 2010).

Offenders described how they would tailor the location of their search to the nature of the car they were looking for: “Depends on what car - go to right estate” (Participant 15). Offenders also appeared to demonstrate a somewhat flexible approach to searching for cars ordered: “Go out that night, looking for car…if couldn’t find car, go to new area, always find it” (Participant 13). One offender described how he would target more affluent areas specifically to achieve this: “Would target nice areas, Harrogate, York, Leeds, Weetwood, Pudsey, all over. Drive about and see” (Participant Six). This was mirrored by other offenders, who described how they would often have to take more time to find specific cars (or would receive specific intelligence in relation to the location of such models): “Go to get car. Ford - straightaway. If more exotic - take longer. Drive around, or get details of where they are” [Despite follow-up questioning, the offender would not report on the nature of intelligence received in relation to this] (Participant 15). The same offender reported how he could drive potentially anywhere in the country to locate such vehicles: “If had to, could go anywhere. Length of the country for cars”.

Means of disposal

The process of offloading stolen goods following a burglary offence was explored with offenders, with their preferences illustrated in Table 2. Unsurprisingly, an overwhelming majority of offenders (93%) reported that they would offload goods to one or more buyers already lined up. This supports previous work into this area; for example, Schneider (2005) identified handlers as being the first choice of disposal for burglars.

The majority of offenders described having at least one or more ‘contacts’ who would buy stolen goods from them, suggesting a clear demand for stolen goods: “Had buyers lined up anyway. 10/20 different buyers - different things. Know what people would buy” (Participant Ten) and “Good 50/60 buyers. Phone me on daytime - asking for stuff” (Participant Four). As well as reporting having a number of contacts whom they could draw on to sell stolen goods, some offenders reported only selling on to one associate, with whom they had developed a working relationship: “Got a guy, Polish guy, he will get rid of everything. Takes it back to Poland money he’s made. He’s met me before, and picked me up in the car” (Participant Five) and “Stopped going to pawn shops, had mate on estate - buy off me” (Participant Six). Other offenders reported having particular relationships with buyers for specific types of goods: “Just get laptopsetc. - got a guy on [the] market who buys them” (Participant 13).

What was of particular interest was how drug dealers were also used to sell on goods; whether this meant that offending jobs were given to offenders in exchange for drugs, or where drug dealers would simply pay offenders in drugs: “Drug dealers would co-ordinate things. They would feed you drugs and you do jobs for them. All goods [mostly] go to drug dealers, then drug dealers give out drugs” (Participant One) and “Loads of drug dealers - take anything off your hands. Always buyers - they can give you most money for stuff. Give you more money in drugs than money. Worth it to do like that. And then sell drugs on” (Participant Four). As such, this helps to illustrate the varying dynamics between offenders and drug dealers, including the potential exploitation of offenders by drug dealers in order to facilitate the commissioning of offences.

Other means of offloading stolen items included the use of public houses and jewellery stores. Importantly, pawn shops were reported by a third of offenders, supporting previous work into this area (Wright and Decker 1994; Clare 2011): “Handling and selling stolen goods, Cash Converters” (Participant Four).

Speed of disposal

As well as seeking the safest/most effective methods to offload stolen goods, the speed at which goods were offloaded also emerged as an important finding. It was found that offenders’ journeys away from an offence were predominantly dictated by the need to sell on their stolen goods. Specifically, 87% of offenders questioned described how they would travel directly from an offence to get rid of their stolen goods. As can be seen in Table 3, 67% of offenders reported that they would get rid of goods within the hour following an offence, and all but one of the sample would typically get rid of goods within two hours following an offence, supporting previous research into the disposal of stolen goods amongst burglars more generally (Sutton 2003, 2008). Of particular interest was the concept of a ‘burglary-to-disposal window’, which emerged during interview with one offender, who described how he would only offend once he knew he would be able to dispose of the goods immediately: “Standard cars - get as soon as can get rid” (Participant 15).

Table 3 Time taken to dispose of goods

There appeared to be one key factor impacting on the speed at which stolen goods were offloaded: the time of the offence. To some extent, this appeared to be governed by the way in which goods were offloaded, for example, through specific retailers, although this was also dependent on the nature of goods to sell: “As 2/3 in the morning, can’t get rid of it then, laptop shopsetc.” (Participant Three). Conversely, other offenders in the sample reported how the time of day had little impact on this process; this appeared to be dependent on offenders’ means for selling on stolen items and the way in which these were disposed of: “Always sell on. Too ‘hot’. Don’t keep’owt from burglaries. 30 min/half hour to get rid - hour at most. Go to people on way home. Even at 3 or 4 in the morning” (Participant Nine). As such, this work highlights not only the speed in which offenders are able to offload stolen goods, but also the 24-hour nature of the stolen goods market (Sutton 2008).

Nevertheless, what this research raises is the quandary faced by steal-to-order offenders; whilst having a buyer already lined up provides greater security as to a guaranteed sale, this may limit the flexibility with which offenders have to sell on goods around the clock, as it is the buyer who will ultimately govern when this will take place. This also presented as an issue for those who would steal-to-offer, who may be forced to stash goods so that they could sell these during business hours: “Also take goods to pawn shops and pubs. Landlords know people who will buy it, or they will buy it themself. Keep stash elsewhere” (Participant One). Having a buyer already lined up may also limit offenders’ ability to negotiate on price for goods stolen, as this limited any potential competition between would-be buyers, subsequently restricting any bargaining power that may otherwise have been held by offenders.

Sense of professionalism

Finally, what emerged during interviews was the degree of professionalism exhibited by offenders during the course of steal-to-order offences. This included ‘blending in’ to their surroundings to minimise their risk of detection: “It is all about not being out of place” (Participant Two) or “I will try and blend in, if no-one thinks I’m out of place there, dress smart, not be shifty/suspicious” (Participant 12). This supports the work of Cromwell and Olson (2005), who highlight the importance of not standing out during burglary offences to help evade detection.

A further method adopted by offenders during the offending process was the use of tools to access a property. However, offenders recognised the dangers of carrying tools with them; this referred to the risk of being caught in possession with tools that may be used to help facilitate a burglary offence, resulting in a subsequent conviction for ‘Going equipped for stealing’ under the Theft Act (Theft Act 1968). Offenders described how they would often attempt to access a property without the use of tools, or how they could often access such tools through the gardens of properties (or nearby properties) they were looking to target: “Sometimes something [other tools] in the garden they can use - if not, then next dooretc.” (Participant Ten) or “Brickwork - shops and car washesetc., estate agents, lump hammer and chisel. Within 10 gardens, always a tool you can use” (Participant Four). This demonstrates a clear opportunity for crime prevention efforts amongst local residents, to ensure there are no ‘facilitatory resources’ available that may support an offender’s efforts (Ekblom and Tilley 2000, p. 382).

Offenders also demonstrated an awareness of police movement during their offences, which they used to support their evasion of the police: “[Aware of police movement?] Yes. Had police scanners, before they went digital. Listen for ‘XRAY99’ [helicopter], also listen out for animal section” (Participant 14). As such, this indicates the sophistication of techniques utilised by offenders to help evade detection by the police, and supports previous work that highlights the professionalism exhibited by offenders during the completion of their offences (Clare 2011; Nee 2015).

During interview, offenders described the operations that supported the facilitation of stealing and offloading of cars to order. In particular, this involved the replacing of number plates from stolen vehicles with number plates from matching makes and models of cars. Often, offenders would research the details of matching number plates (and create replica plates) in advance of an offence, so that they were able to ‘plate up’ immediately following the offence: “Originally - steal and plate them up - same spec…nick car - that night, [get] plate details - that day” (Participant 15), and “Took plates, cordless drill - carry with it [So could plate there and then]” (Participant 13). This latter quote demonstrates the level of planning involved in such offences. The same offender described how he would only replace number plates once ANPR technologyFootnote 7 had developed: “Before ANPR came in - didn’t bother [plating up]” (Participant 15). This helps illustrate one of the ways in which offenders have adopted their practices in line with technological advancements, to help facilitate their offences and evade detection by the authorities.

One offender discussed this process in detail, describing how he would utilise existing websites to facilitate the transition of number plates from matching ‘legitimate’ (insured) vehicles, to stolen vehicles, so as not to arouse suspicion by the authorities. Specifically, the offender described checking for number plates of existing vehicles that were the same make, model, and colour of vehicles that had been stolen, using the ‘Auto Trader’ used-car sales website (where prospective sellers will often post pictures of cars they are selling; these images often reveal the number plates of such vehicles). Once the offender had identified a number plate from a matching make and model of car, he would then check that the car to which those number plates were registered was insured and would not subsequently alert the authorities. To do this, he used the ‘askMID.com’ website, which is a motor insurance database, allowing users to check whether a vehicle is insured. The website was designed initially to assist motorists in checking the insurance details of other parties involved in a roadside collision (www.askMID.com 2018). However, this service has subsequently been exploited by offenders to assist in the facilitation of offloading stolen vehicles. When used in conjunction, these two websites proved highly effective in supporting the construction of replica plates for stolen vehicles that would not arouse suspicion by the authorities: “[Number] Plates - go Auto Trader - see 30 mile radius - see cars. Also, go onto askMID.COM - make sure insured cars - so don’t flag up issuesetc.” (Participant 14). To the author’s knowledge, there have been no prior studies that have revealed this mechanism amongst offender groups.

The above example represents a clear opportunity for offenders to make use of existing databases to facilitate the effective disposal of stolen goods. However, this also represents a clear opportunity for specific intervention to disrupt this process. This may be achieved, for example, through introducing more stringent access on the askMID.com site. Anonymising the number plates of matching vehicles on the Auto Trader site would also mean that offenders were unable to access this information readily. Whilst it is acknowledged that offenders could still search for number plates of matching vehicles in their local area, this would involve much greater effort on their part and be more time-consuming, thus presenting a much lesser attractive option for offenders.

Discussion and Conclusion

This paper has explored the nature and practices of offenders when committing steal-to-order offences. This research has illustrated how a number of behavioural features demonstrated during steal-to-order offences share parallels with current literature into burglary offenders/offences more generally; these include the nature of goods taken, the means of disposal, and the speed of disposal.

With regard to goods taken, technology, jewellery, and cars were identified as the most popular items stolen during steal-to-order operations. Supporting Clarke’s (1999) ‘CRAVED’ hypothesis, it is known by offenders that these items will command higher prices (Sutton 2010), with smaller items also being concealable. Offenders reported that the most popular means of disposal was through a handler/buyer, as is consistent with previous research (Schneider 2005); this was subsequently followed by a second-hand shop, which has previously also been recognised as an important avenue for disposal (Wright and Decker 1994; Clare 2011). As such, this paper highlights the value of both network sales and commercial fences in supporting the stolen goods market for steal-to-order offences. Interestingly, the offenders in the current sample reported engaging in steal-to-order offences during domestic rather than commercial burglary offences. Though there are similarities in the types of goods taken during domestic and commercial burglary offences (so-called ‘hot’ products; for example, jewellery or technology items), burglars engaging in commercial offences have the added benefit of being able to steal (more general) items ‘in bulk’, for example, cigarettes (Sutton 2008). Moreover, whilst both domestic and commercial burglaries recognise the value of commercial fences in offenders’ disposal of goods (Sutton 2008), the current work appears to place greater prominence on the role of network sales in supporting the selling of stolen goods from domestic burglaries. Nevertheless, this work found that offenders largely tended to dispose of goods within one or two hours following the offence, supporting previous work into the prompt disposal of goods amongst domestic and commercial burglars (Sutton 1998, 2003, 2008).

This paper has also revealed a number of novel findings on the practices of steal-to-order offenders. Specifically, this paper has identified a behavioural continuum amongst those who engage in steal-to-order offences: those who steal-to-offer, those who steal more general items to order, and those who steal more specialist goods to order. The paper has also demonstrated the nature of professionalism exhibited by offenders during the course of steal-to-order offences, particularly in relation to the stealing of more specialist items. Nevertheless, it was recognised that for offenders who engage in steal-to-order offences, there may be less flexibility with regard to the disposal of stolen items because of their commitment to one specific buyer.

What this research has also illustrated is how offenders who engage in steal-to-order offences are not a homogenous offender group. This paper has identified a spectrum of behaviour amongst burglars who engage in steal-to-order offences, akin to the apparent spectrum of professionalism exhibited by burglars (Maguire and Bennett 1982; Nee and Meenaghan 2006). Specifically, this research has highlighted three broad groups who engage in steal-to-order offences, on a sliding scale of professionalism: those who steal-to-offer, those who steal-to-order more general items (such as laptops), and those who steal-to-order more specialist items. Such specialist items may include goods, such as cars, or collectors’ items, such as antiques. Though those questioned at the higher end of this spectrum predominantly targeted particular makes and models of cars over collectors’ items (only one offender reported targeting antiques), specific collectors’ items (such as antiques) remain a specialist item targeted by sophisticated offenders (who may engage in steal-to-order offences; Nee and Meenaghan 2006). Nevertheless, it is anticipated that regardless of the nature of specialist items, a similar degree of research and preparatory work would be required to facilitate such offences, as was highlighted in the stealing of particular makes and models of vehicle. For example, the paper has revealed how steal-to-order offenders who stole cars demonstrated a rather sophisticated and professional setup, in which the stealing of cars is just one part of the process. Other steps in this process include the order being placed for cars, the locating of cars, the locating of legitimate replica number plates, and the making up and attaching of replica plates, before selling on the vehicle to the buyer.

Interestingly, steal-to-order offenders who stole cars appeared to exclusively steal cars to order, whereas offenders who stole more general items appeared to be more flexible in what they did or did not steal-to-order (though there was no evidence to suggest that these groups crossed over). Furthermore, it appeared that offenders who stole more general items did not need to take as professional approach as those who stole cars. The process for these offences appeared to be less complex: receiving an order for goods, keeping an eye out for such items, and taking these as and when the opportunity arose. Further research to explore the nature of such a spectrum amongst this group will help to identify future opportunities for intervention. Moreover, future work to investigate the practices of offenders who steal collectors’ items to order will help to establish whether the practices employed are similar to those targeting specific makes and models of car.

This work has also helped illustrate the potential lack of flexibility experienced by offenders with regard to committing to offload goods to one (or more) specific buyer(s). This may well cause difficulties for offenders with regard to offloading stolen items, as offenders may be unable to offload goods within the preferred timeframe of one or two hours. This holds substantial implications for understanding the incidence of criminal behaviour and decision making of offenders, as well as highlighting existing difficulties with criminological theory. For example, according to Routine Activity Theory (Cohen and Felson 1979), a motivated offender will choose a suitable target to burgle, in the absence of a capable guardian. However, this theory, whilst acknowledging the role of offender(s) and victim(s), fails to acknowledge the role of the buyer of stolen goods. The opportunity (or lack of) for offenders to offload goods immediately after an offence may well impact on an offender’s decision to commit an offence at a specific point in time. Thus, essentially, offences such as burglary should be considered a two-stage process (Sutton 2010): the stealing of goods, and the disposal of such items, which should both be taken into account when developing theory to understand (acquisitive) criminal behaviour. Within the context of steal-to-order offences, this could be extended to a three-stage process, incorporating the ‘ordering of goods’ as a preceding step to the offence stage.

Though this research has helped to reveal insights into the nature of steal-to-order offenders, it is acknowledged that with a sample size of 15 it remains difficult to generalise the findings. Enhancing the sample size would help to improve the reliability of the findings in future. In addition, increasing the breadth of the sample (i.e. through interviewing offenders from different geographical areas) will also help to enhance the representativeness of the findings. For example, this research found that the timing of burglaries was in some cases constrained by the routine activities of the potential buyers. Therefore, it may be that the timings and practices of offenders who steal-to-order are somewhat restricted by the nature of local markets in which they operate (Stevenson and Forsythe 1998; Sutton 2010). Incorporating offenders in the community in addition to those who are incarcerated may also help to improve the reliability of the findings. Future research would also benefit from the ability to verify offender accounts, to establish whether any aspect of offenders’ accounts may reflect an element of bravado or post-degree rationalisation, as this presented a challenge with the current work.

Implications for crime prevention

In terms of how this work may be applied to reduce crime, there appears greater scope to disrupt the process amongst those who steal cars to order, due to the precise nature of operations that underpin these offences. The potential intervention point here relates to the process of making up replica number plates. Whilst this may not prevent instances of crime from occurring per se, this will help to make it more difficult for offenders to successfully offload stolen cars and thereby successfully deliver the ‘supply’ element of this criminal market (in line with the Market Reduction Approach, Sutton 1998). What this research has shown is how offenders may utilise online car sales sites as a means to identify the number plates for matching makes and models of cars to stolen vehicles, which, when used in conjunction with a website that can inform offenders whether a car is insured, can be used to support the production of replica plates to facilitate the process of offloading stolen vehicles.

As such, this paper demonstrates clear impact on public policy, through helping develop public understanding on the nature of mechanisms used by steal-to-order offenders to facilitate the offloading of stolen cars. Such understanding may be used by the public to ensure that any information they submit online relating to vehicles for sale are anonymised (including number plate information), in an attempt to try and disrupt this process. This research has also illustrated to organisations how their businesses may be exploited by offenders to facilitate the effective offloading of stolen cars, whilst highlighting a key opportunity for such organisations to take steps to restrict the ability for offenders to exploit loopholes in their systems for their own means. Such opportunity has clear potential across both a national and international scale. Increasing the level of security required to access information about whether a car holds valid insurance, as well as anonymising the number plate information from cars shown on online car sales websites, will help to disrupt this process. Such changes, if implemented, would help to make it more difficult for offenders to ‘pass off’ stolen cars as legitimate vehicles, and help to disrupt the stolen cars market.

Simple steps taken by residents may also help to reduce the ease with which steal-to-order offenders can operate, for example, ensuring no items that may be used as tools are left within gardens, thereby reducing the opportunity for offenders to successfully accomplish crimes. A further way in which residents may take steps to disrupt the operations of steal-to-order offenders is through considering Clarke’s ‘CRAVED’ hypothesis (1999). Residents may support such efforts through taking steps to minimise the ‘Removable’ and ‘Disposable’ facets of this hypothesis. With regard to the ‘Removable’ facet, this may involve ensuring that valuable items are securely stored, whether this is through a lockable safe or other secure storage unit. With regard to disrupting the ‘Disposable’ component, this would involve taking steps to help raise the difficulty encountered by offenders in successfully offloading stolen goods. This may involve activating tracking technology on items such as tablets or smartphones, using secure passwords or encryption technology on phones/laptops (some may even have an auto-erase function after a number of failed sign-in attempts), or through using secure property marking. As such, this indicates how also taking small steps can help to disrupt/prevent somewhat sophisticated offenders, highlighting the importance of a co-ordinated effort in the fight against steal-to-order offending.