The Perfect Heist: Recipes from Around the World Sandia Labs report SAND 2014-1790
- Jarret M. Lafleur, Ph.D., Systems Research and Analysis IV
- Liston K. Purvis, Ph.D., Systems Research and Analysis I
- Alex W. Roesler, Ph.D., National Security and Policy Analysis
- MIDN Paul Westland
Of the many facets of the criminal world, few have captured society’s fascination as has that of high stakes robbery. The combination of meticulousness, cunning, and audacity required to execute a real-life Ocean’s Eleven may be uncommon among criminals, but fortunately it is common enough to extract a wealth of lessons for the protection of high-value assets. To assist in informing the analyses and decisions of security professionals, this paper surveys 23 sophisticated and high-value heists that have occurred or been attempted around the world, particularly over the past three decades. The results, compiled in a Heist Methods and Characteristics Database, have been analyzed qualitatively and quantitatively, with the goals of both identifying common characteristics and characterizing the range and diversity of criminal methods used. The analysis is focused in six areas: (1) Defeated Security Measures and Devices, (2) Deception Methods, (3) Timing, (4) Weapons, (5) Resources, and (6) Insiders.
For a copy of the report, see http://prod.sandia.gov/techlib/access-control.cgi/2014/141790.pdf
Thanks to Steve Pierce for alerting me to this study of security systems and how they fail.