skip to main content

Title: The perfect heist :

Of the many facets of the criminal world, few have captured societys fascination as has that of high stakes robbery. The combination of meticulousness, cunning, and audacity required to execute a real-life Oceans Eleven may be uncommon among criminals, but fortunately it is common enough to extract a wealth of lessons for the protection of high-value assets. To assist in informing the analyses and decisions of security professionals, this paper surveys 23 sophisticated and high-value heists that have occurred or been attempted around the world, particularly over the past three decades. The results, compiled in a Heist Methods and Characteristics Database, have been analyzed qualitatively and quantitatively, with the goals of both identifying common characteristics and characterizing the range and diversity of criminal methods used. The analysis is focused in six areas: (1) Defeated Security Measures and Devices, (2) Deception Methods, (3) Timing, (4) Weapons, (5) Resources, and (6) Insiders.
Authors:
; ; ;
Publication Date:
OSTI Identifier:
1154957
Report Number(s):
SAND2014-1790
506235
DOE Contract Number:
AC04-94AL85000
Resource Type:
Technical Report
Research Org:
Sandia National Laboratories (SNL-CA), Livermore, CA (United States); United States.,
Sponsoring Org:
USDOE National Nuclear Security Administration (NNSA)
Country of Publication:
United States
Language:
English