The owners of a 2015 Fiat 500 contacted the Bell Police Department to report that a known suspect had stolen car keys from their residence and had driven off in the vehicle without permission. The Bell PD verified the theft and entered the vehicle information into the state and federal crime computers which automatically activated

Read More

The owner of a 1993 Dodge D350 dually pickup contacted the Bernalillo County Sheriff’s Office to report the vehicle was stolen. The BCSO deputy verified the auto theft and entered the vehicle information into the state and federal crime computers which automatically activated the LoJack® System concealed in the Dodge. Within just 25 minutes after

Read More

The owner of a 2007 Cadillac Escalade had loaned his vehicle to an acquaintance for a couple of weeks. After several months and numerous attempts to have his “friend” return the Cadillac, the owner contacted the Miami Gardens Police Department to report their vehicle stolen. The police verified the theft and entered the vehicle information

Read More

Washington, D.C.September 28, 2015 FBI National Press Office(202) 324-3691 In the FBI’s Uniform Crime Reporting (UCR) Program, motor vehicle theft is defined as the theft or attempted theft of a motor vehicle. A motor vehicle is defined in the UCR Program as a self-propelled vehicle that runs on land surfaces and not on rails. Examples

Read More

The owner of a 2000 Chevrolet Silverado 1500 contacted the Albuquerque Police Department to report the vehicle was stolen.  The Chevrolet was stolen from the area of Wyoming and Academy in the Northeast Area Command.  The Albuquerque PD verified the theft and entered the vehicle information into the state and federal crime computers which automatically

Read More

The owners of a 2013 Ford Edge contacted the Los Angeles Police Department to report that their vehicle was stolen. The owner was shopping when she noticed that someone had taken her car keys from her purse. The LAPD verified the theft and entered the vehicle information into the state and federal crime computers which

Read More