ATICC 10
(UNCLASSIFIED)
Disclaimer: Information contained in the Stolen Vehicle Database Repository is considered multifarious; modifications to records are made on a daily
basis. Stolen vehicle records were screened for accuracy and normalized for standardization prior to use in this analysis.
Data used in this report is inclusive of vehicles stolen that are reported to the Colorado Crime Information Center with a
date of theft range of January 01, 2019 to December 31, 2019. Stolen vehicles included in this report include vehicles
entered into CCIC as a “stolen vehicle” message. The actual number of auto thefts in Colorado is likely higher than
reported, as some incidences of auto theft may not be reported to law enforcement, law enforcement agencies may not
have entered other stolen vehicles into CCIC due to a stolen vehicle recovery occurring prior to completing the
jurisdiction’s reporting and processing procedures, and other stolen vehicles may have been reported as a carjacking
and/or a felony crime involved stolen vehicle incident. Information contained in the Stolen Vehicle Database Repository
is considered dynamic, as modifications, changes and amendments to the stolen vehicle records are made on a daily basis.
Process 2: CCIC Data Validation
Stolen vehicle records entered into CCIC undergo validation standards established by National Crime Information Center
and CCIC.
Process 3: Data Range
Stolen vehicles were obtained by a query of the SVDR for thefts occurring from January 01, 2019 through December 31,
2019, and this data was pulled on January 14, 2020.
Process 4: Deduplication of the 2019 Dataset
The dataset was reviewed for duplicate records, based on unique record identifier, vehicle identification number, case
number, and license plate number, to ensure a single vehicle theft record is not counted more than one time.
Process 5: Test Records
The 2019 database was examined to identify “test records”, which were not records of actual stolen vehicles, but records
entered as tests in the system. These records were not used in this report.
Process 6: Identification of Removed Vehicles
Records that were removed during the year were not identified as to why the stolen vehicle was inactive from CCIC. ATICC
has identified user errors and misuse of message keys where vehicles are removed from CCIC that may not have been
actually “recovered.” However, ATICC does not have the technological advantage to ensure the appropriate message keys
to validate the purpose of the inactivation, e.g., cancellation, locate or clear (recovery). Briefly stated, removals from the
CCIC database occur from three messages conducted by CCIC authorized users from the Originating Agency who
performed the initial entry. These three CCIC message keys are a “clear”, “locate” and “cancel” of the record. The “clear”
(CV) and “locate” (LV) message is performed when a vehicle has been located and is subsequently removed from the
CCIC/NCIC database. Accordingly, a “clear” is supposed to be performed by the agency that entered the vehicle and then
subsequently recovered it. The “locate” is supposed to be performed when an agency, other than the one who originally
entered the vehicle into CCIC, has located the vehicle. The “cancel” (XV) record is supposed to be performed when an
agency discovers the vehicle was not stolen, yet was originally recorded into CCIC as stolen, and thus needs to be cancelled.
Current data processes/practices within the CCIC system treats the CV, LV and XV message the same, regardless of the
technical definitions. When reviewing the SVDR records for the purpose of removal from CCIC, it was observed that CCIC
Users inappropriately utilize the XV (Cancellation) message key in lieu of the CV (Clear) or LV (Locate). This causes
additional analytical concern as each XV message key had to be examined as to whether or not the vehicle was truly
cancelled or recovered. The process of using a Cancel message key should invoke cases where a previously stolen vehicle
entry was discovered not to have been stolen (e.g., joyriding, mistaken vehicle identity, etc.). However, based on law
enforcement experience of ATICC personnel, the comparative records of “true” XV messages affecting the overall analysis
are minimal. In other words, ATICC believes some of the identified cancellations were a result of stolen vehicles being
recovered. In accordance with NCIC policy and law enforcement practice, an official police report of a stolen vehicle must
be made prior to the CCIC entry. The result of the aforementioned is that ATICC treated the message keys of “inactive,”
“cancel,” “clear,” and “locate” as inactivity in the stolen vehicle database, thus inferring each message key was a recovery.