5024 Broadway Ave.
Haltom City, TX  76117
817-222-7700

"Stop Thief" Program Discourages Auto Buglaries

In 2010, the Haltom City Police Department responded to over 532 car burglaries. Vehicle burglaries are crimes of opportunity and if citizens can send a message to thieves that the opportunity is not present, those thieves will likely move on to another target. The program also serves to educate and remind the public to remove valuables from their cars.

The "Stop Thief" program is simple, consisting of a printed placard that is placed on the car's rearview mirror each time it is parked. The placard serves as a notice to potential thieves that there are no valuables in the car; it also serves as a reminder to vehicle owners to remove any valuables, including bags, purses, briefcases, money, laptops, radar detectors, etc. The placards are free and can be obtained at the Haltom City Law Enforcement Center, 5110 Broadway Ave. in Haltom City. The Police Department reminds the public, however, that placards should always be removed whenever the vehicle is in motion.

How to use the placard

When a vehicle owner reaches their destination, he/she will:

  • Place “Stop Thief” Placard on rear view mirror of vehicle.
  • Scan vehicle for any items of value, or any items that appear to have value.
  • Remove these items from vehicle.
  • Secure vehicle.
  • When vehicle owner returns to vehicle, remove “Stop Thief” Placard and stow until the next time the vehicle is parked.

Identity Theft Prevention

According to the non‐profit Identity Theft Resource Center, identity theft is sub‐divided into four categories:

  • Financial identity theft (using another's identity to obtain goods and services)
  • Criminal identity theft (posing as another when apprehended for a crime)
  • Identity cloning (using another's information to assume his or her identity in daily life)
  • Business/commercial identity theft (using another's business name to obtain credit

Identity theft may be used to facilitate crimes including illegal immigration, terrorism, and espionage. Identity theft may also be a means of blackmail. There are also cases of identity cloning to attack payment systems, including online credit card processing and medical insurance.

Some of the techniques used for stealing personal information include:

  • Stealing mail or rummaging through rubbish containing personal information (dumpster diving).
  • Mail theft from the local post office has been one of the leading ways to steal checking information. Suspects are using a mail fishing technique to steal mail from the postal drop boxes located in front of the post offices. DO NOT DROP MAIL AFTER HOURS! The times that the thefts occur from the drop boxes are usually between 8PM and 8AM, before the Post Office opens. Checks are washed and cashed the very next day.
  • Retrieving information from redundant equipment, like computer servers that have been disposed of carelessly, e.g. at public dump sites, given away without proper sanitizing etc.
  • Researching about the victim in government registers, internet search engines, or public records search services.
  • Stealing payment or identification cards, either by pick pocketing or surreptitiously by skimming through a compromised card reader.
  • Eavesdropping on public transactions to obtain personal data (shoulder surfing).
  • Stealing personal information in computer databases (Trojan Horses, Hijacking).
  • Sometimes databases are leaked to public due to improper handling or malicious actions. Such databases may include identity information.
  • Advertising bogus job offers (either full‐time or work from home based) to which the victims will reply with their full name, address, curriculum vitae, telephone numbers, and banking details.
  • Infiltration of organizations that store large amounts of personal information
  • Impersonating a trusted company/institution/organization in an electronic communication to promote revealing of personal information (phishing).
  • Obtaining castings of fingers for falsifying fingerprint identification.
  • Browsing social network sites (MySpace, Facebook, Bebo, etc), online for personal details that have been posted by users.
  • Changing your address, thereby diverting billing statements to another location to either get current legitimate account info or to delay discovery of fraudulent accounts.

The best way to not become a victim of identity theft is to be vigilant of your surroundings when out in public. Constantly check your bank accounts or enroll in an identity safe program with your banking institution. Keep tabs on your credit by contacting the three credit reporting agencies.