Welcome!

News Feed Item

Hot Wheels Classics: Ford Thunderbird

Four Times Motor Trend "Car of the Year"

DES PLAINES, Ill., Jan. 14, 2013 /PRNewswire-USNewswire/ -- The National Insurance Crime Bureau (NICB) today released its latest Hot Wheels Classics report on another automotive icon, the Ford Thunderbird. Hot Wheels is NICB's analysis of vehicle theft information reported by law enforcement and contained in the National Crime Information Center's (NCIC) database.  

Thunderbird History

The first Thunderbird rolled off Ford's Dearborn, Mich., assembly line on Sept. 9, 1954, and went on sale on Oct. 22, 1954, as a 1955 model. The Thunderbird was an instant hit, and sales grew steadily.

The Thunderbird went through several design changes over its life, and production halted after the 1997 model year. Production resumed in 2001 with a look reminiscent of its 1955 ancestor and lasted through the 2005 model year when the Thunderbird finally ended its run with a 50th anniversary limited edition.

Work on the concept for a Ford sports car began in 1953 when Ford authorized its engineers and designers to create a two-seat convertible weighing 2,525 pounds, equipped with Ford's Interceptor V-8 engine and the ability to reach a top speed of more than 100 mph.

Naming the new car was not so easy until a young Ford stylist, Alden Giberson, submitted the name Thunderbird. It was inspired by the legend of the Thunderbird, a mythical creature that is popular in the culture of the many indigenous peoples of North America. It was an instant winner.

The base sticker price of $2,695 included the removable hardtop, but not the soft top. Clock, tachometer, power-operated seats and a 292 CID V-8 engine also were standard equipment. However, practically none of the early Thunderbirds left the dealership without either overdrive or automatic transmission and most of the power options. Prices of the 1955 models ranged from $3,000 to $4,000.

Beginning with the 1958 model, Ford moved production of the Thunderbird from Dearborn to its Wixom, Mich., assembly plant where it remained until Ford retired the nameplate in 2005. A total of 4.3 million Thunderbirds were produced over its life span*.

Sales vs. Thefts

As with other classic cars, many of them capture the interest of thieves, as well as enthusiasts and collectors. The Thunderbird is no different.

NICB reviewed Thunderbird theft data from 1981-2011 and identified 179,625 theft records. Although theft records exist from 1955, only theft records from 1981 on are included in this report. That was the year when the National Highway Traffic Safety Administration (NHTSA) required vehicle identification number (VIN) standardization.

In 1981, a total of 9,914 Thunderbirds were reported stolen. For the 30-year span reviewed by NICB, the 1978 Thunderbird was the most stolen model year with 14,288 thefts reported.

Top 10 Model Year Thefts

Rank

Model Year

Total Thefts

1

1978

14,288

2

1979

12,100

3

1977

11,972

4

1984

10,390

5

1985

9,185

6

1986

8,958

7

1980

7,302

8

1988

6,981

9

1983

6,869

10

1987

6,510

 

Top 10 Theft Years 1981-2011

Rank

Theft Year

Total Thefts

1

1981

9,914

2

1989

8,284

3

1988

8,227

4

1990

7,962

5

1991

7,931

6

1982

7,889

7

1986

7,846

8

1995

7,811

9

1987

7,751

10

1985

7,679

 

Top 10 Theft States 1981-2011

Rank

State

Total Thefts

1

CA

27,521

2

TX

14,771

3

NY

13,338

4

FL

9,794

5

MI

8,335

6

IL

8,090

7

NJ

5,456

8

PA

4,944

9

MA

4,864

10

OH

4,476

See all Thunderbird theft data here.

During the 30-year period from 1981-2011, a total of 179,625 Thunderbirds were reported stolen in the United States and Puerto Rico. From 1955-2005, a total of 4.3 million were sold. The year with the most U.S. sales was 1977 with 304,430 sold. The year with the fewest Thunderbird sales was 1998 when just 2,243 units were sold.

At NICB, we have been in the business of identifying and recovering stolen vehicles since 1912. Our expertise has been sought by law enforcement agencies all over the nation to assist with major auto theft investigations. Frequently, NICB recovers stolen vehicles that have long since been forgotten—except by their owners.

Whether or not you own a classic 1963 split-window Corvette or a 1955 Thunderbird, take steps to protect your vehicle from theft. NICB urges motorists to follow its "layered approach" to auto theft prevention." By employing these simple, low-cost suggestions, people can make their vehicles less attractive to thieves.

Anyone with information concerning vehicle theft and insurance fraud can report it anonymously by calling toll-free 1-800-TEL-NICB (1-800-835-6422), texting keyword "fraud" to TIP411 (847411) or by visiting our website at www.nicb.org. Or, iPhone or iPad users can download the NICB Fraud Tips app to make it easy to quickly send a tip and get a response.

*All Thunderbird historical information, including verbatim passages appear courtesy of Ford Motor Company at: http://media.ford.com/article_display.cfm?article_id=20429

About the National Insurance Crime Bureau:  headquartered in Des Plaines, Ill., the NICB is the nation's leading not-for-profit organization exclusively dedicated to preventing, detecting and defeating insurance fraud and vehicle theft through data analytics, investigations, training, legislative advocacy and public awareness. The NICB is supported by more than 1,100 property and casualty insurance companies and self-insured organizations. NICB member companies wrote over $339 billion in insurance premiums in 2011, or approximately 80 percent of the nation's property/casualty insurance. That includes more than 94 percent ($156 billion) of the nation's personal auto insurance. To learn more visit www.nicb.org.

SOURCE National Insurance Crime Bureau

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
In his session at @DevOpsSummit at 20th Cloud Expo, Kelly Looney, director of DevOps consulting for Skytap, showed how an incremental approach to introducing containers into complex, distributed applications results in modernization with less risk and more reward. He also shared the story of how Skytap used Docker to get out of the business of managing infrastructure, and into the business of delivering innovation and business value. Attendees learned how up-front planning allows for a clean sep...
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, shared examples from a wide range of industries – including en...
Detecting internal user threats in the Big Data eco-system is challenging and cumbersome. Many organizations monitor internal usage of the Big Data eco-system using a set of alerts. This is not a scalable process given the increase in the number of alerts with the accelerating growth in data volume and user base. Organizations are increasingly leveraging machine learning to monitor only those data elements that are sensitive and critical, autonomously establish monitoring policies, and to detect...
Enterprise architects are increasingly adopting multi-cloud strategies as they seek to utilize existing data center assets, leverage the advantages of cloud computing and avoid cloud vendor lock-in. This requires a globally aware traffic management strategy that can monitor infrastructure health across data centers and end-user experience globally, while responding to control changes and system specification at the speed of today’s DevOps teams. In his session at 20th Cloud Expo, Josh Gray, Chie...
To get the most out of their data, successful companies are not focusing on queries and data lakes, they are actively integrating analytics into their operations with a data-first application development approach. Real-time adjustments to improve revenues, reduce costs, or mitigate risk rely on applications that minimize latency on a variety of data sources. Jack Norris reviews best practices to show how companies develop, deploy, and dynamically update these applications and how this data-first...
Intelligent Automation is now one of the key business imperatives for CIOs and CISOs impacting all areas of business today. In his session at 21st Cloud Expo, Brian Boeggeman, VP Alliances & Partnerships at Ayehu, will talk about how business value is created and delivered through intelligent automation to today’s enterprises. The open ecosystem platform approach toward Intelligent Automation that Ayehu delivers to the market is core to enabling the creation of the self-driving enterprise.
"At the keynote this morning we spoke about the value proposition of Nutanix, of having a DevOps culture and a mindset, and the business outcomes of achieving agility and scale, which everybody here is trying to accomplish," noted Mark Lavi, DevOps Solution Architect at Nutanix, in this SYS-CON.tv interview at @DevOpsSummit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
"We're here to tell the world about our cloud-scale infrastructure that we have at Juniper combined with the world-class security that we put into the cloud," explained Lisa Guess, VP of Systems Engineering at Juniper Networks, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
SYS-CON Events announced today that Grape Up will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct. 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Grape Up is a software company specializing in cloud native application development and professional services related to Cloud Foundry PaaS. With five expert teams that operate in various sectors of the market across the U.S. and Europe, Grape Up works with a variety of customers from emergi...
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In his session at 20th Cloud Expo, Mike Johnston, an infrastructure engineer at Supergiant.io, discussed how to use Kubernetes to set up a SaaS infrastructure for your business. Mike Johnston is an infrastructure engineer at Supergiant.io with over 12 years of experience designing, deploying, and maintaining server and workstation infrastructure at all scales. He has experience with brick and mortar data centers as well as cloud providers like Digital Ocean, Amazon Web Services, and Rackspace. H...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You’re looking at private cloud solutions based on hyperconverged infrastructure, but you’re concerned with the limits inherent in those technologies.
Consumers increasingly expect their electronic "things" to be connected to smart phones, tablets and the Internet. When that thing happens to be a medical device, the risks and benefits of connectivity must be carefully weighed. Once the decision is made that connecting the device is beneficial, medical device manufacturers must design their products to maintain patient safety and prevent compromised personal health information in the face of cybersecurity threats. In his session at @ThingsExpo...
DevOps is under attack because developers don’t want to mess with infrastructure. They will happily own their code into production, but want to use platforms instead of raw automation. That’s changing the landscape that we understand as DevOps with both architecture concepts (CloudNative) and process redefinition (SRE). Rob Hirschfeld’s recent work in Kubernetes operations has led to the conclusion that containers and related platforms have changed the way we should be thinking about DevOps and...