
Car theft is a serious problem in South Africa with the police receiving an average of 96 reports of stolen vehicles per day.
With modern vehicles becoming cleverer almost by the hour, criminals have also adapted their techniques accordingly to be able to stay in business.
As per vehicle tracking and telematics firm Cartrack, thieves follow a structured modus operandi to carry out their crimes, starting with determining their target and planning the attack, all the way to the execution of the act and how they intend to escape.
Target selection and surveillance
Once they know the vehicle they are after, which is usually determined by a specific order or increased demand for a particular model on the black market, vehicle theft syndicates start by researching their targets, the types of cars they own, and the locations they frequent.
This can include following you around to learn your routines, as well as talking with people you’ve come into contact with.
“Criminals can collaborate with insiders, like your complex’s security, car guards, car dealerships, and repair shop employees to get to you,” said Cartrack.
“You might wonder how insiders agree to cooperate; some are bribed, while others are coerced.”
Cartrack highlights that the most common ways syndicates get insiders to talk include financial incentives, coercion or threats, manipulation, and grooming.
Sometimes the individual does not fully understand the breadth of their actions and may simply divulge sensitive information to a stranger without thinking twice.
Planning and coordination
Syndicates are usually very particular with their timing, targeting big events or general areas where security isn’t tight, said Cartrack.
They are increasingly operating online, too, using the internet to coordinate their activities, share information, and sell stolen vehicles or parts.
“This shift to online operations lets them reach a wider audience. It also allows for more discreet transactions,” said Cartrack.
“This makes it harder for law enforcement to track their activities.”
The most popular ways thieves employ the internet to facilitate their nefarious practices include:
- Online Marketplaces – Stolen vehicles or parts can be sold on social media, classified ads, or specialised websites.
- Information Gathering – Syndicates can gather intelligence on vehicle models and locations online. Victims can also be stalked via social media.
- Communication – Criminals may use encrypted messaging apps to communicate and coordinate activities discreetly.
- Remote Key Programming – Syndicate members can use advanced online tools to program keys or unlock vehicles from a distance.
- Hacking and Scams – Some may use hacking to steal customer data or create fake ads to lure victims.
- Virtual Auctions – Stolen vehicles can be auctioned off online, making it easier to reach a wider audience.
A typical syndicate comprises a driver, the actual thief, a lookout, and a tech-savvy individual who work together to complete the theft as well as hide and dispose of the goods thereafter.
Execution of theft
Once the groundwork has been laid, the attack is carried out in a meticulous fashion.
One of the most prevalent forms of theft in the modern era involves signal boosting on vehicles with keyless entry functions.
In this scenario, thieves use devices to intercept and boost the signal from key fobs, allowing them to unlock and start vehicles without needing the physical key.
This technique enables them to steal cars with minimal effort.
In a similar vein, signal jamming is a common method in which criminals employ sophisticated jamming devices to disable key fob locks, leaving victims unaware that their vehicles remain unlocked.
Key cloning is another high-tech technique regularly reported in car theft cases.
Thieves use advanced devices to clone a key code onto a blank fob, which allows them to make duplicates that can unlock and start vehicles.
“This method shows their skill in exploiting modern security systems for theft,” said Cartrack.
For those who are not as adept with modern technologies, lockpicking and physically stealing keys from owners remain the methods of choice.
Escape
Organised car theft syndicates have a well-planned escape strategy and know the best routes to avoid the police, and they often use other stolen vehicles as getaway cars to add a layer of deception.
“By driving vehicles that may have been reported missing, confusion is created for investigators,” said Cartrack.
“This makes it tough for the police to track them down and stop future thefts.”
Once back at their hideout, the thieves get to work disposing of the cars either through stripping them for spares, selling them to chop shops, or smuggling them across the border.
They may also tamper with the VIN to mask the vehicle’s real identity and make it more difficult to track down by the authorities.