Welcome!

Wearables Authors: Elizabeth White, Liz McMillan, Yeshim Deniz, Pat Romanski, ManageEngine IT Matters

News Feed Item

NICB's Hot Wheels: America's 10 Most Stolen Vehicles

A 50-50 Split between Domestic and Import

DES PLAINES, Ill., Aug. 18, 2014 /PRNewswire/ --The National Insurance Crime Bureau (NICB) today released its annual Hot Wheels report which identifies the 10 most stolen vehicles in the United States. The report examines vehicle theft data submitted by law enforcement to the National Crime Information Center (NCIC) and determines the vehicle make, model and model year most reported stolen in 2013.

To view the multimedia assets associated with this release, please click http://www.multivu.com/players/English/70506512-national-insurance-crime-bureau-nicb-hot-wheels-10-most-stolen/

Also in today's release is a list of the top 25 2013 vehicle makes and models that were reported stolen in calendar year 2013. 

For 2013, the most stolen vehicles* in the nation were (total thefts in parentheses):                                                                           

1.

Honda Accord 

(53,995)

2.

Honda Civic 

(45,001)

3.

Chevrolet Pickup (Full Size)

(27,809)

4.

Ford Pickup (Full Size) 

(26,494)

5.

Toyota Camry 

(14,420)

6.

Dodge Pickup (Full Size) 

(11,347)

7.

Dodge Caravan

(10,911)

8.

Jeep Cherokee/Grand Cherokee

(9,272)

9.

Toyota Corolla

(9,010)

10.

Nissan Altima  

(8,892)

See the complete report here. Download an infographic here. To watch a video on Hot Wheels, click here.

The following are the top 10 2013 model year vehicles stolen during calendar year 2013:

1.

Nissan Altima

(810)

2.

Ford Fusion

(793)

3.

Ford Pickup Full Size

(775)

4.

Toyota Corolla

(669)

5.

Chevrolet Impala   

(654)

6.

Hyundai Elantra 

(541)

7.

Dodge Charger

(536)

8.

Chevrolet Malibu

(529)

9.

Chevrolet Cruze  

(499)

10.

Ford Focus 

(483)

Download 2013's complete top 25 most stolen list from this spreadsheet.

After a slight increase in 2012, the FBI predicts a reduction in national vehicle thefts of 3.2 percent when final 2013 statistics are released later this year. The peak year for vehicle thefts was 1991 with 1,661,738.  If the FBI's preliminary 2013 vehicle theft estimate holds, thefts will be under 700,000—a number not seen since 1967 and a reduction in vehicle thefts of over 50 percent since 1991.   

"The drop in thefts is good news for all of us," said NICB President and CEO Joe Wehrle. "But it still amounts to a vehicle being stolen every 45 seconds and losses of over $4 billion a year. That's why we applaud the vehicle manufacturers for their efforts to improve anti-theft technology and pledge to continue to work with our insurance company members and law enforcement to identify and seek vigorous prosecution of the organized criminal rings responsible for so many of these thefts."

Nonetheless, drivers must still be vigilant and protect their vehicles from theft. NICB recommends its four "layers of protection" against theft:

Common Sense:  Lock your car and take your keys. It's simple enough, but many thefts occur because owners make it easy for thieves to steal their cars.

Warning Device:  Having and using a visible or audible warning device is another item that can ensure that your car remains where you left it.

Immobilizing Device:  Generally speaking, if your vehicle can't be started, it can't be stolen. "Kill" switches, fuel cut-offs and smart keys are among the devices that are extremely effective.

Tracking Device:  A tracking device emits a signal to the police or to a monitoring station when the vehicle is stolen.  Tracking devices are very effective in helping authorities recover stolen vehicles. Some systems employ "telematics," which combine GPS and wireless technologies to allow remote monitoring of a vehicle.  If the vehicle is moved, the system will alert the owner and the vehicle can be tracked via computer.

Considering a used vehicle purchase?  Check out VINCheck(SM), a free vehicle history service for consumers. Since 2005, NICB has offered this limited service made possible by its participating member companies. Check it out at: www.nicb.org/vincheck.

Anyone with information concerning insurance fraud or vehicle theft can report it anonymously by calling toll-free 800-TEL-NICB (800-835-6422), texting keyword "fraud" to TIP411 (847411) or submitting a form on our website. Or, download the NICB Fraud Tips app on your iPhone or Android device.

About the National Insurance Crime Bureau: headquartered in Des Plaines, Ill., the NICB is the nation's leading not-for-profit organization exclusively dedicated to preventing, detecting and defeating insurance fraud and vehicle theft through data analytics, investigations, training, legislative advocacy and public awareness. The NICB is supported by more than 1,100 property and casualty insurance companies and self-insured organizations. NICB member companies wrote $371 billion in insurance premiums in 2013, or more than 78 percent of the nation's property/casualty insurance. That includes more than 93 percent ($168 billion) of the nation's personal auto insurance. To learn more visit www.nicb.org.

*This report reflects stolen vehicle data contained in NCIC and present in the "NCIC mirror image" when accessed by NICB on March 1, 2014. NCIC records may contain errors based on inaccurate entries submitted by reporting agencies. Full size pickups include half ton and larger capacity models for all makes. 

Facebook
Twitter 
Blog
YouTube  
LinkedIn

 

NICB's Hot Wheels - America's Most Stolen Vehicles

 

NICB's Hot Wheels Infographic

 

To view the multimedia assets associated with this release, please click http://www.multivu.com/players/English/70506512-national-insurance-crime-bureau-nicb-hot-wheels-10-most-stolen/

SOURCE National Insurance Crime Bureau

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - comp...
Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points.
“We're a global managed hosting provider. Our core customer set is a U.S.-based customer that is looking to go global,” explained Adam Rogers, Managing Director at ANEXIA, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Adobe is changing the world though digital experiences. Adobe helps customers develop and deliver high-impact experiences that differentiate brands, build loyalty, and drive revenue across every screen, including smartphones, computers, tablets and TVs. Adobe content solutions are used daily by millions of companies worldwide-from publishers and broadcasters, to enterprises, marketing agencies and household-name brands. Building on its established design leadership, Adobe enables customers not o...
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
SYS-CON Events announced today that Sheng Liang to Keynote at SYS-CON's 19th Cloud Expo, which will take place on November 1-3, 2016 at the Santa Clara Convention Center in Santa Clara, California.
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
24Notion is full-service global creative digital marketing, technology and lifestyle agency that combines strategic ideas with customized tactical execution. With a broad understand of the art of traditional marketing, new media, communications and social influence, 24Notion uniquely understands how to connect your brand strategy with the right consumer. 24Notion ranked #12 on Corporate Social Responsibility - Book of List.
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Businesses are struggling to manage the information flow and interactions between all of these new devices and things jumping on their network, and the apps and IT systems they control. The data businesses gather is only helpful if they can do something with it. In his session at @ThingsExpo, Chris Witeck, Principal Technology Strategist at Citrix, will discuss how different the impact of IoT will be for large businesses, expanding how IoT will allow large organizations to make their legacy ap...
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
What does it look like when you have access to cloud infrastructure and platform under the same roof? Let’s talk about the different layers of Technology as a Service: who cares, what runs where, and how does it all fit together. In his session at 18th Cloud Expo, Phil Jackson, Lead Technology Evangelist at SoftLayer, an IBM company, spoke about the picture being painted by IBM Cloud and how the tools being crafted can help fill the gaps in your IT infrastructure.
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
In his session at @ThingsExpo, Kausik Sridharabalan, founder and CTO of Pulzze Systems, Inc., will focus on key challenges in building an Internet of Things solution infrastructure. He will shed light on efficient ways of defining interactions within IoT solutions, leading to cost and time reduction. He will also introduce ways to handle data and how one can develop IoT solutions that are lean, flexible and configurable, thus making IoT infrastructure agile and scalable.
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...