Welcome!

News Feed Item

NICB's Hot Wheels: America's 10 Most Stolen Vehicles

A 50-50 Split between Domestic and Import

DES PLAINES, Ill., Aug. 18, 2014 /PRNewswire/ --The National Insurance Crime Bureau (NICB) today released its annual Hot Wheels report which identifies the 10 most stolen vehicles in the United States. The report examines vehicle theft data submitted by law enforcement to the National Crime Information Center (NCIC) and determines the vehicle make, model and model year most reported stolen in 2013.

To view the multimedia assets associated with this release, please click http://www.multivu.com/players/English/70506512-national-insurance-crime-bureau-nicb-hot-wheels-10-most-stolen/

Also in today's release is a list of the top 25 2013 vehicle makes and models that were reported stolen in calendar year 2013. 

For 2013, the most stolen vehicles* in the nation were (total thefts in parentheses):                                                                           

1.

Honda Accord 

(53,995)

2.

Honda Civic 

(45,001)

3.

Chevrolet Pickup (Full Size)

(27,809)

4.

Ford Pickup (Full Size) 

(26,494)

5.

Toyota Camry 

(14,420)

6.

Dodge Pickup (Full Size) 

(11,347)

7.

Dodge Caravan

(10,911)

8.

Jeep Cherokee/Grand Cherokee

(9,272)

9.

Toyota Corolla

(9,010)

10.

Nissan Altima  

(8,892)

See the complete report here. Download an infographic here. To watch a video on Hot Wheels, click here.

The following are the top 10 2013 model year vehicles stolen during calendar year 2013:

1.

Nissan Altima

(810)

2.

Ford Fusion

(793)

3.

Ford Pickup Full Size

(775)

4.

Toyota Corolla

(669)

5.

Chevrolet Impala   

(654)

6.

Hyundai Elantra 

(541)

7.

Dodge Charger

(536)

8.

Chevrolet Malibu

(529)

9.

Chevrolet Cruze  

(499)

10.

Ford Focus 

(483)

Download 2013's complete top 25 most stolen list from this spreadsheet.

After a slight increase in 2012, the FBI predicts a reduction in national vehicle thefts of 3.2 percent when final 2013 statistics are released later this year. The peak year for vehicle thefts was 1991 with 1,661,738.  If the FBI's preliminary 2013 vehicle theft estimate holds, thefts will be under 700,000—a number not seen since 1967 and a reduction in vehicle thefts of over 50 percent since 1991.   

"The drop in thefts is good news for all of us," said NICB President and CEO Joe Wehrle. "But it still amounts to a vehicle being stolen every 45 seconds and losses of over $4 billion a year. That's why we applaud the vehicle manufacturers for their efforts to improve anti-theft technology and pledge to continue to work with our insurance company members and law enforcement to identify and seek vigorous prosecution of the organized criminal rings responsible for so many of these thefts."

Nonetheless, drivers must still be vigilant and protect their vehicles from theft. NICB recommends its four "layers of protection" against theft:

Common Sense:  Lock your car and take your keys. It's simple enough, but many thefts occur because owners make it easy for thieves to steal their cars.

Warning Device:  Having and using a visible or audible warning device is another item that can ensure that your car remains where you left it.

Immobilizing Device:  Generally speaking, if your vehicle can't be started, it can't be stolen. "Kill" switches, fuel cut-offs and smart keys are among the devices that are extremely effective.

Tracking Device:  A tracking device emits a signal to the police or to a monitoring station when the vehicle is stolen.  Tracking devices are very effective in helping authorities recover stolen vehicles. Some systems employ "telematics," which combine GPS and wireless technologies to allow remote monitoring of a vehicle.  If the vehicle is moved, the system will alert the owner and the vehicle can be tracked via computer.

Considering a used vehicle purchase?  Check out VINCheck(SM), a free vehicle history service for consumers. Since 2005, NICB has offered this limited service made possible by its participating member companies. Check it out at: www.nicb.org/vincheck.

Anyone with information concerning insurance fraud or vehicle theft can report it anonymously by calling toll-free 800-TEL-NICB (800-835-6422), texting keyword "fraud" to TIP411 (847411) or submitting a form on our website. Or, download the NICB Fraud Tips app on your iPhone or Android device.

About the National Insurance Crime Bureau: headquartered in Des Plaines, Ill., the NICB is the nation's leading not-for-profit organization exclusively dedicated to preventing, detecting and defeating insurance fraud and vehicle theft through data analytics, investigations, training, legislative advocacy and public awareness. The NICB is supported by more than 1,100 property and casualty insurance companies and self-insured organizations. NICB member companies wrote $371 billion in insurance premiums in 2013, or more than 78 percent of the nation's property/casualty insurance. That includes more than 93 percent ($168 billion) of the nation's personal auto insurance. To learn more visit www.nicb.org.

*This report reflects stolen vehicle data contained in NCIC and present in the "NCIC mirror image" when accessed by NICB on March 1, 2014. NCIC records may contain errors based on inaccurate entries submitted by reporting agencies. Full size pickups include half ton and larger capacity models for all makes. 

Facebook
Twitter 
Blog
YouTube  
LinkedIn

 

NICB's Hot Wheels - America's Most Stolen Vehicles

 

NICB's Hot Wheels Infographic

 

To view the multimedia assets associated with this release, please click http://www.multivu.com/players/English/70506512-national-insurance-crime-bureau-nicb-hot-wheels-10-most-stolen/

SOURCE National Insurance Crime Bureau

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
In his session at 19th Cloud Expo, Claude Remillard, Principal Program Manager in Developer Division at Microsoft, contrasted how his team used config as code and immutable patterns for continuous delivery of microservices and apps to the cloud. He showed how the immutable patterns helps developers do away with most of the complexity of config as code-enabling scenarios such as rollback, zero downtime upgrades with far greater simplicity. He also demoed building immutable pipelines in the cloud ...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
Hardware virtualization and cloud computing allowed us to increase resource utilization and increase our flexibility to respond to business demand. Docker Containers are the next quantum leap - Are they?! Databases always represented an additional set of challenges unique to running workloads requiring a maximum of I/O, network, CPU resources combined with data locality.
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
Due of the rise of Hadoop, many enterprises are now deploying their first small clusters of 10 to 20 servers. At this small scale, the complexity of operating the cluster looks and feels like general data center servers. It is not until the clusters scale, as they inevitably do, when the pain caused by the exponential complexity becomes apparent. We've seen this problem occur time and time again. In his session at Big Data Expo, Greg Bruno, Vice President of Engineering and co-founder of StackIQ...
Security, data privacy, reliability, and regulatory compliance are critical factors when evaluating whether to move business applications from in-house, client-hosted environments to a cloud platform. Quality assurance plays a vital role in ensuring that the appropriate level of risk assessment, verification, and validation takes place to ensure business continuity during the migration to a new cloud platform.
"Tintri was started in 2008 with the express purpose of building a storage appliance that is ideal for virtualized environments. We support a lot of different hypervisor platforms from VMware to OpenStack to Hyper-V," explained Dan Florea, Director of Product Management at Tintri, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and containers together help companies achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of Dev...
One of the hottest areas in cloud right now is DRaaS and related offerings. In his session at 16th Cloud Expo, Dale Levesque, Disaster Recovery Product Manager with Windstream's Cloud and Data Center Marketing team, will discuss the benefits of the cloud model, which far outweigh the traditional approach, and how enterprises need to ensure that their needs are properly being met.
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
Big Data, cloud, analytics, contextual information, wearable tech, sensors, mobility, and WebRTC: together, these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at @ThingsExpo, Erik Perotti, Senior Manager of New Ventures on Plantronics’ Innovation team, provided an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it m...
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
In their general session at 16th Cloud Expo, Michael Piccininni, Global Account Manager - Cloud SP at EMC Corporation, and Mike Dietze, Regional Director at Windstream Hosted Solutions, reviewed next generation cloud services, including the Windstream-EMC Tier Storage solutions, and discussed how to increase efficiencies, improve service delivery and enhance corporate cloud solution development. Michael Piccininni is Global Account Manager – Cloud SP at EMC Corporation. He has been engaged in t...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus o...