Hostname: page-component-89b8bd64d-r6c6k Total loading time: 0 Render date: 2026-05-11T17:26:54.913Z Has data issue: false hasContentIssue false

The Science of Art Theft: Using Data to Identify Criminal Patterns, 1990–2022

Published online by Cambridge University Press:  16 April 2025

Sandra Clopés*
Affiliation:
Department of Law, Pompeu Fabra University, Barcelona, Spain
Marc Balcells
Affiliation:
Department of Law and Political Science, Open University of Catalonia, Barcelona, Spain
*
Corresponding author: Sandra Clopés; Email: sandra.clopes01@alumni.upf.edu
Rights & Permissions [Opens in a new window]

Abstract

Art theft is still a crime surrounded by inaccuracies. From the perception of flashy fictional thieves to unintentionally misleading monetary claims, the general public and some art and security professionals have a distorted vision of the scope of the criminal enterprise. As there is an alarming lack of empirical studies into the matter, this study aims to remedy the issue through the elaboration of a database to find common characteristics and aspects of interest amongst multiple art heists from the last three decades to provide a better understanding of crucial theft traits such as defeated security measures, methods of deception, timing and target selection, use of weapons and insider participation impact. Results indicate thieves tend to use brute force to defeat security measures; diversions and deceptions are a standard, uniform trends are present in absolute timing matters, and neither the use of weapons nor insiders appears to be the norm.

Information

Type
Article
Creative Commons
Creative Common License - CCCreative Common License - BY
This is an Open Access article, distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/4.0), which permits unrestricted re-use, distribution and reproduction, provided the original article is properly cited.
Copyright
© The Author(s), 2025. Published by Cambridge University Press on behalf of International Cultural Property Society
Figure 0

Table 1. Overview of cases (Table by author)

Figure 1

Figure 1. Types of heists (Photo by author)

Figure 2

Figure 2. Offender’s gender (Photo by author)

Figure 3

Table 2. Defeated security measures (Table by author)

Figure 4

Figure 3. Time security forces were aware of heist (Photo by author)

Figure 5

Figure 4. Time able security forces were able to respond (Photo by author)

Figure 6

Figure 5. Use of deception methods (Photo by author)

Figure 7

Table 3. Deception methods (Table by author)

Figure 8

Figure 6. Time of day heists were committed (Photo by author)

Figure 9

Figure 7. Day of week heists were committed (Photo by author)

Figure 10

Figure 8. Months when heists were committed (photo by author)

Figure 11

Figure 9. Environment types (Photo by author)

Figure 12

Figure 10. Types of loot (Photo by author)

Figure 13

Figure 11. Use of weapons in heists (Photo by author)

Figure 14

Figure 12. Specific types of weapons (Photo by author)

Figure 15

Figure 13. Insider participation (Photo by author)

Figure 16

Table 4. List of defeat methods (Table by author)

Figure 17

Table 5. Deception methods list (Table by author)

Supplementary material: File

Clopés and Balcells supplementary material 1

Clopés and Balcells supplementary material
Download Clopés and Balcells supplementary material 1(File)
File 157.9 KB
Supplementary material: File

Clopés and Balcells supplementary material 2

Clopés and Balcells supplementary material
Download Clopés and Balcells supplementary material 2(File)
File 101.8 KB