Fencing and Stolen Goods Markets
- LAST REVIEWED: 24 May 2017
- LAST MODIFIED: 24 May 2017
- DOI: 10.1093/obo/9780195396607-0219
- LAST REVIEWED: 24 May 2017
- LAST MODIFIED: 24 May 2017
- DOI: 10.1093/obo/9780195396607-0219
Introduction
Thieves steal particular items in order to sell them to buy whatever it is that motivates them to steal. Dealers in stolen goods (fences) function as a buffer between thieves and consumers by reducing the time a thief remains in possession of incriminating evidence, namely the items stolen, while trying to sell them. Consequently, it is widely believed that the criminological term fence most likely stems from the shortening of “defense” during the 17th century to denote a professional dealer in stolen goods, as someone who is the thief’s defense against detection by way of putting themselves in the position of so-called middleman, or dealer. The fence often operates behind a legitimate business “front” as their own proffered defense as an unwitting buyer of ill-gotten gains. Openly buying from such a trader effectively protects consumers of stolen goods from prosecution for knowingly buying stolen goods. “Stolen goods markets” is an umbrella term for specific subtypes of stolen goods outlets, identified by criminologists. Not all stolen goods markets are operated by fences. Some involve the thief selling goods directly to the public, or through an innocent third party such as an auction house or website. Thieves obviously know that stolen goods markets exist. That simple knowledge has been understood for centuries to play a general motivating role in theft, as most prolific thieves do not steal goods for their own consumption.
General Overviews
Little research has been conducted into stolen goods markets, and police pay little attention to what thieves do with stolen goods. There are few overviews considered essential reading. Henry 1978 provides introductory material. Comprehensive overviews are Sutton 1995, Sutton 2010, and Schneider 2008 (the last two cited under Tackling Markets). One should be careful not to amplify the role stolen goods markets play in theft. To be attributed with being “the,” as opposed to “a contributory” cause, the stimulus must be both a necessary and sufficient condition for an outcome. It takes more than a ready market for theft to happen. The existence of stolen goods markets may be one necessary condition for thieves to convert stolen goods into cash, but they are an insufficient condition to be referred to as “the” cause of theft. Market dynamics such as supply and demand, organizational complications and the roles of thieves, dealers, facilitators, and consumers represent neglected areas of concern. Ethnographic monographs include Klockars 1974, Steffensmeier 1986, and Foster 1990. Klockars 1974 and Steffensmeier 1986 are independent case study ethnographies with different fences in the United States. These works draw back the curtain to reveal how businesses provide a “front” that conceals trading in stolen goods and provides a seemingly legitimate facility for their purchase and retail; it is also a symbolic means for guilt neutralization among thieves and dealers that such stealing and dealing is just another part of profit making in the market-driven world of “business.” Foster’s study of offenders and their social networks in one pub in England during the 1980s provides insight into the dynamics, mores, and norms of informal markets. Klockars, Steffensmeier and Foster, like others who focus on stealing and dealing, hint at the influence of markets for stolen goods on theft levels. Works such as Henry 1978, Cromwell and McElrath 1994, Sutton 1995, Sutton 1998, and Clarke 1999 fully tackle the question of whether theft levels are driven up by demand for stolen goods. They provide a synthesis of old and contemporary knowledge about the role stolen goods markets play in motivating thieves to steal, determining theft levels, influencing the frequency of offending, and motivating the theft of particular things. Sutton 1998 and Clarke 1999 interpret theft and self-reported offending data to offer evidence-led solutions to reduce demand for stolen goods and consequential supply by theft. Clarke 1999 used his CRAVED acronym to argue that a product’s concealability, removability, availability, value, enjoyability, and disposability influence its attractiveness to offenders. Although not mentioned by Holt and Lampke 2010, many CRAVED characteristics fit stolen data marketed on the Internet. Sidebottom, et al. 2011 found disconfirming evidence for the applicability of CRAVED regarding theft of scrap metals such as copper.
Clarke, R. V. 1999. Hot Products: Understanding, anticipating and reducing demand for stolen goods. Police Research Series, Paper 112, Policing and Reducing Crime Unit, Research Development and Statistics Directorate. London: Home Office.
Reveals what is likely to be stolen, the characteristics that make targets suitable for theft, and why. He explains that such characteristics change over time for some things, because thieves tend steal to convert goods into cash. What is a “hot product” at any one time may not remain so in the future. Consequently, it is a truism that high demand for something increases the likelihood of it being stolen.
Cromwell, Paul, and Karen McElrath. 1994. Buying stolen property: An opportunity perspective. Journal of Research in Crime and Delinquency 31.3: 295–310.
DOI: 10.1177/0022427894031003003
Relies upon data from a postal survey in one city in the US state of Texas. Great emphasis is placed upon the hypothetical causal notion of opportunities to buy influencing buying behavior. However, the difficulty of interpretation of the findings is explained as arising from the research team’s failure to collect data on the issue of when offers do or do not occur “out of the blue” or else as a response to any prior behavior by the purchaser.
Foster, J. 1990. Villains: Crime and community in the inner city. London: Routledge.
Provides a rich ethnographic account of the importance of securing a genuine bargain at a discount price. Research subjects provide the author with explanations for their subcultural “acceptance” of stolen goods markets. The seemingly “irresistibility” of desirable stolen goods at discount process is explored in some depth.
Henry, Stuart. 1978. The hidden economy: The context and control of borderline crime. London: Martin Robertson.
Provides a thoughtful introduction to the topic, along with a number of interesting and insightful rhetorical, yet critical criminological insights into the problem of stolen goods markets in commercially oriented westernized industrial societies.
Holt, Thomas J., and Eric Lampke. 2010. Exploring stolen data markets online: Products and market forces. Criminal Justice Studies 23.1: 33–50.
DOI: 10.1080/14786011003634415
Analyzing data from six web forums, this observational research article explores the dynamics of trading and purchasing stolen data on the Internet. Holt and Lampke conclude that a new and improved underworld is developing on the Internet and that future research is needed to explore the links between identity theft and stolen data markets to understand the impact of data sales on financial crime victimization.
Klockars, Carl. 1974. The professional fence. New York: Free Press.
Beginning with some historical insights into the famous fence Jonathan Wild, Klockars focuses on his own research subject “Vincent Swaggi.” This case study provides the first highly detailed longitudinal ethnographic account of the career offender dynamics and difficulties involved in operating successfully as a professional fence in the 20th century. The work relies upon us accepting Swaggi’s plausible version of events as veracious.
Sidebottom, Aiden, Jyoti Belur, Kate Bowers, Lisa Thompson, and Shane D. Johnson. 2011. Theft on price-volatile markets: On the relationship between copper price and copper theft. Journal of Research in Crime and Delinquency 43.3: 396–418.
Analyzing data provided by the British Transport Police, for 2004 to 2007 of all 2,800 incidents of copper cable theft from the railway system of England, Scotland and Wales, revealed an unsurprisingly strong correspondence between increases in copper prices and the trajectories of its theft.
Steffensmeier, Darrell. 1986. The Fence: In the shadow of two worlds. Lanham, MD: Roman and Littlefield.
Follows a career fence over several years and explores in particular depth, his methods for evading detection by the authorities, and how his illegitimate business strategies have evolved over time. Building on the work begun by Klockars 1974, there is more triangulation in this book, as Steffensmeier seeks confirmation from other sources that claims made by his research subject are veracious.
Sutton, M. 1995. Supply by theft: Does the market for second-hand goods play a role in keeping crime figures high? British Journal of Criminology 25.3: 400–416.
DOI: 10.1093/oxfordjournals.bjc.a048524
This article explores the theoretically possible effects of the market for stolen goods as a causal influence upon theft and offending career decisions. Moreover, it provides a general overview of the literature on stolen goods markets.
Sutton, M. 1998. Handling stolen goods and theft: A market reduction approach. Research Study 178. London: Home Office.
This British government research report includes an analysis of data from the nationally representative British Crime Survey 1994. A sample of 8,753 respondents aged sixteen to fifty-nine years, answered an original suite of self-reported offending questions on handling stolen goods. Analysis of that data is triangulated with forty-five in-depth qualitative interviews with offenders. Five subtypes of stolen goods market were identified. Based on this data, the report contains the origination of the research-led crime reduction method known as the Market Reduction Approach to theft.
Users without a subscription are not able to see the full content on this page. Please subscribe or login.
How to Subscribe
Oxford Bibliographies Online is available by subscription and perpetual access to institutions. For more information or to contact an Oxford Sales Representative click here.
Article
- Active Offender Research
- Actus Reus
- Adler, Freda
- Adversarial System of Justice
- Adverse Childhood Experiences
- Aging Prison Population, The
- Airport and Airline Security
- Alcohol and Drug Prohibition
- Alcohol Use, Policy and Crime
- Alt-Right Gangs and White Power Youth Groups
- Animals, Crimes Against
- Anomie
- Arson
- Art Crime
- Back-End Sentencing and Parole Revocation
- Bail and Pretrial Detention
- Batterer Intervention Programs
- Bentham, Jeremy
- Big Data and Communities and Crime
- Biosocial Criminology
- Blackmail
- Black's Theory of Law and Social Control
- Blumstein, Alfred
- Boot Camps and Shock Incarceration Programs
- Burglary, Residential
- Bystander Intervention
- Capital Punishment
- Chambliss, William
- Chicago School of Criminology, The
- Child Maltreatment
- Chinese Triad Society
- Civil Protection Orders
- Collateral Consequences of Felony Conviction and Imprisonm...
- Collective Efficacy
- Commercial and Bank Robbery
- Commercial Sexual Exploitation of Children
- Communicating Scientific Findings in the Courtroom
- Community Change and Crime
- Community Corrections
- Community Disadvantage and Crime
- Community-Based Justice Systems
- Community-Based Substance Use Prevention
- Comparative Criminal Justice Systems
- CompStat Models of Police Performance Management
- Confessions, False and Coerced
- Conservation Criminology
- Consumer Fraud
- Contextual Analysis of Crime
- Control Balance Theory
- Convict Criminology
- Co-Offending and the Role of Accomplices
- Corporate Crime
- Costs of Crime and Justice
- Courts, Drug
- Courts, Juvenile
- Courts, Mental Health
- Courts, Problem-Solving
- Crime and Justice in Latin America
- Crime, Campus
- Crime Control Policy
- Crime Control, Politics of
- Crime, (In)Security, and Islam
- Crime Prevention, Delinquency and
- Crime Prevention, Situational
- Crime Prevention, Voluntary Organizations and
- Crime Trends
- Crime Victims' Rights Movement
- Criminal Career Research
- Criminal Decision Making, Emotions in
- Criminal Justice Data Sources
- Criminal Justice Ethics
- Criminal Justice Fines and Fees
- Criminal Justice Reform, Politics of
- Criminal Justice System, Discretion in the
- Criminal Records
- Criminal Retaliation
- Criminal Talk
- Criminology and Political Science
- Criminology of Genocide, The
- Critical Criminology
- Cross-National Crime
- Cross-Sectional Research Designs in Criminology and Crimin...
- Cultural Criminology
- Cultural Theories
- Cybercrime
- Cybercrime Investigations and Prosecutions
- Cycle of Violence
- Day Fines
- Deadly Force
- Defense Counsel
- Defining "Success" in Corrections and Reentry
- Desistance
- Deterrence
- Developmental and Life-Course Criminology
- Digital Piracy
- Driving and Traffic Offenses
- Drug Control
- Drug Trafficking, International
- Drugs and Crime
- Elder Abuse
- Electronically Monitored Home Confinement
- Employee Theft
- Environmental Crime and Justice
- Experimental Criminology
- Extortion
- Family Violence
- Fear of Crime and Perceived Risk
- Felon Disenfranchisement
- Femicide
- Feminist Theories
- Feminist Victimization Theories
- Fencing and Stolen Goods Markets
- Firearms and Violence
- Forensic Science
- For-Profit Private Prisons and the Criminal Justice–Indust...
- Fraud
- Gambling
- Gangs, Peers, and Co-offending
- Gender and Crime
- Gendered Crime Pathways
- General Opportunity Victimization Theories
- Genetics, Environment, and Crime
- Green Criminology
- Halfway Houses
- Harm Reduction and Risky Behaviors
- Hate Crime
- Hate Crime Legislation
- Healthcare Fraud
- Hirschi, Travis
- History of Crime in the United Kingdom
- History of Criminology
- Homelessness and Crime
- Homicide
- Homicide Victimization
- Honor Cultures and Violence
- Hot Spots Policing
- Human Rights
- Human Trafficking
- Identity Theft
- Immigration, Crime, and Justice
- Incarceration, Mass
- Incarceration, Public Health Effects of
- Income Tax Evasion
- Indigenous Criminology
- Institutional Anomie Theory
- Integrated Theory
- Intermediate Sanctions
- Interpersonal Violence, Historical Patterns of
- Interrogation
- Intimate Partner Violence, Criminological Perspectives on
- Intimate Partner Violence, Police Responses to
- Investigation, Criminal
- Juvenile Delinquency
- Juvenile Justice System, The
- Juvenile Waivers
- Kidnapping
- Kornhauser, Ruth Rosner
- Labeling Theory
- Labor Markets and Crime
- Land Use and Crime
- Lead and Crime
- Legitimacy
- LGBTQ Intimate Partner Violence
- LGBTQ People in Prison
- Life Without Parole Sentencing
- Local Institutions and Neighborhood Crime
- Lombroso, Cesare
- Longitudinal Research in Criminology
- Mandatory Minimum Sentencing
- Mapping and Spatial Analysis of Crime, The
- Mass Media, Crime, and Justice
- Measuring Crime
- Mediation and Dispute Resolution Programs
- Mental Health and Crime
- Merton, Robert K.
- Meta-analysis in Criminology
- Middle-Class Crime and Criminality
- Migrant Detention and Incarceration
- Mixed Methods Research in Criminology
- Money Laundering
- Motor Vehicle Theft
- Multi-Level Marketing Scams
- Murder, Serial
- Narrative Criminology
- National Deviancy Symposia, The
- Nature Versus Nurture
- Neighborhood Disorder
- Neutralization Theory
- New Penology, The
- Offender Decision-Making and Motivation
- Offense Specialization/Expertise
- Organized Crime
- Outlaw Motorcycle Clubs
- Panel Methods in Criminology
- Peacemaking Criminology
- Peer Networks and Delinquency
- Perceptions of Youth, Juvenile Justice Professionals'
- Performance Measurement and Accountability Systems
- Personality and Trait Theories of Crime
- Persons with a Mental Illness, Police Encounters with
- Phenomenological Theories of Crime
- Plea Bargaining
- Poaching
- Police Administration
- Police Cooperation, International
- Police Discretion
- Police Effectiveness
- Police History
- Police Militarization
- Police Misconduct
- Police, Race and the
- Police Use of Force
- Police, Violence against the
- Policing and Law Enforcement
- Policing, Body-Worn Cameras and
- Policing, Broken Windows
- Policing, Community and Problem-Oriented
- Policing Cybercrime
- Policing, Evidence-Based
- Policing, Intelligence-Led
- Policing, Privatization of
- Policing, Proactive
- Policing, School
- Policing, Stop-and-Frisk
- Policing, Third Party
- Polyvictimization
- Positivist Criminology
- Pretrial Detention, Alternatives to
- Pretrial Diversion
- Prison Administration
- Prison Classification
- Prison, Disciplinary Segregation in
- Prison Education Exchange Programs
- Prison Gangs and Subculture
- Prison History
- Prison Labor
- Prison Visitation
- Prisoner Reentry
- Prisons and Jails
- Prisons, HIV in
- Private Security
- Probation Revocation
- Procedural Justice
- Property Crime
- Prosecution and Courts
- Prostitution
- Psychiatry, Psychology, and Crime: Historical and Current ...
- Psychology and Crime
- Public Criminology
- Public Opinion, Crime and Justice
- Public Order Crimes
- Public Social Control and Neighborhood Crime
- Punishment Justification and Goals
- Qualitative Methods in Criminology
- Queer Criminology
- Race and Sentencing Research Advancements
- Race, Ethnicity, Crime, and Justice
- Racial Threat Hypothesis
- Racial Profiling
- Rape and Sexual Assault
- Rape, Fear of
- Rational Choice Theories
- Rehabilitation
- Religion and Crime
- Restorative Justice
- Risk Assessment
- Routine Activity Theories
- School Bullying
- School Crime and Violence
- School Safety, Security, and Discipline
- Search Warrants
- Seasonality and Crime
- Self-Control, The General Theory:
- Self-Report Crime Surveys
- Sentencing Enhancements
- Sentencing, Evidence-Based
- Sentencing Guidelines
- Sentencing Policy
- Sex Crimes
- Sex Offender Policies and Legislation
- Sex Trafficking
- Sexual Revictimization
- Situational Action Theory
- Snitching and Use of Criminal Informants
- Social and Intellectual Context of Criminology, The
- Social Construction of Crime, The
- Social Control of Tobacco Use
- Social Control Theory
- Social Disorganization
- Social Ecology of Crime
- Social Learning Theory
- Social Networks
- Social Threat and Social Control
- Solitary Confinement
- South Africa, Crime and Justice in
- Sport Mega-Events Security
- Stalking and Harassment
- State Crime
- State Dependence and Population Heterogeneity in Theories ...
- Strain Theories
- Street Code
- Street Robbery
- Substance Use and Abuse
- Surveillance, Public and Private
- Sutherland, Edwin H.
- Technology and the Criminal Justice System
- Technology, Criminal Use of
- Terrorism
- Terrorism and Hate Crime
- Terrorism, Criminological Explanations for
- Testimony, Eyewitness
- Therapeutic Jurisprudence
- Trajectory Methods in Criminology
- Transnational Crime
- Truth-In-Sentencing
- Urban Politics and Crime
- US War on Terrorism, Legal Perspectives on the
- Victim Impact Statements
- Victimization, Adolescent
- Victimization, Biosocial Theories of
- Victimization Patterns and Trends
- Victimization, Repeat
- Victimization, Vicarious and Related Forms of Secondary Tr...
- Victimless Crime
- Victim-Offender Overlap, The
- Violence Against Women
- Violence, Youth
- Violent Crime
- White-Collar Crime
- White-Collar Crime, The Global Financial Crisis and
- White-Collar Crime, Women and
- Wilson, James Q.
- Wolfgang, Marvin
- Women, Girls, and Reentry
- Wrongful Conviction