Strategie
Andrea Scholz exposed the international network of the “Pink Panthers”.

“If it weren‘t for me, no-one would have heard of the Pink Panthers”

Diamond heist Pink Panthers
The jewel thieves from Serbia, Montenegro, Croatia and Bosnia are responsible for the most spectacular robberies worth an estimated 500 million dollars. Collaboration with Europol, Interpol and a team comprising members of the German counter-terrorism unit (GSG9), the German federal office of criminal investigation (Bundeskriminalamt, BKA), mobile task forces (MEK) and special forces has provided her with unique insights.

Ms Scholz, how do perpetrators prepare for major robberies? What resources do they need and what do they do?

Basically, nothing is left to chance in this setting. Which is why I chose a saying by Voltaire as my motto when I started working in various risk areas: “Chance is a word void of sense; nothing can exist without a cause.” Perpetrators select their objects systematically, rather than making random decisions during breakfast. There are numerous “scouts” who “visit” various facilities to thoroughly study the procedures, doing reconnaissance. They register all security-relevant details required to get access to the object of desire. Even the most trivial details that wouldn’t be noticed by employees or real customers may be decisive for the subsequent decision to break into or rob a particular facility.

In addition, major undertakings require a lot of man-power and know-how. The financial means required to buy getaway vehicles, passports, tickets, weapons and the like are calculated and offset against the anticipated profit: a cost/benefit analysis as in any other well-managed enterprise. Only if the profit seems worth the trouble will the preparations for the criminal act be continued. Otherwise, the project will be abandoned, and some other object that can be “entered more easily” will be chosen. A full reconnaissance is made with regard to mechanical, electronic and personal security measures. If they find any weak spots, this is where they start. A minimum of time is calculated for executing the robbery, for once an alarm is triggered, perpetrators are often caught very quickly. In order to prevent this, the getaway part following the robbery is also perfectly organised down to the tiniest detail.

The means of escape and any disguises that may have been used are discarded during the getaway. Sometimes a change of clothes is involved as well. There is only a very short period of time during which the perpetrators could be caught with the stolen goods. After a few minutes, hours at most, the stolen goods will be on their previously well-thought-out transport route – either smuggled or even shipped legally, with forged transport documents. The perpetrators will take an entirely different route.

If the robbery succeeds – what were the decisive factors for its success?

Basically, it’s the security measures involved. First of all those that were put in place to protect the goods, subsequently also those that were implemented by the perpetrators for their own protection (getaway and time factors to conduct the robbery).

It is always the time factor that is decisive: how long does it take for the desired goods to be stolen and for the perpetrators to escape safely? Weak spots are analysed relentlessly, and even tested. For instance, long before the date of the planned robbery, an alarm may be triggered at night to see what happens. If the mechanical and electronic safety measures are excellent, the human factor may be the weakest link in the chain of security measures, and options involving social engineering or kidnapping will be evaluated.

Perpetrators have all the time in the world to achieve their goal. It simply doesn’t matter whether they have to stake out a person for months just to crack a key position.

What kind of person is behind such a scheme?

The person behind it is just someone “like you and me”. People with a family, with children, who enjoy spending a holiday on the beach. The majority of organised gangs are based on strictly hierarchical structures. There are those who actually perform the criminal acts, then there’s the scouts who stake out safety systems and victim behaviour, also drivers, helpers, fences, and the principal. The latter is never in direct contact with the lower tiers.

Communication is effected and redirected via every conceivable channel. When it comes to extremely important matters, face-to-face meetings still are the measure of choice. Every member of the team has their task and has perfected their expertise over the years: some of them are outstanding experts who would earn a large salary on the regular job market with their expert knowledge as specialists for alarm systems or the characteristics of glass.

However, we are not completely and utterly at the mercy of such perpetrators. There are ways and means to protect ourselves: on the one hand, by means of security measures such as reasonable mechanical, electronic and video systems, on the other hand, and that is even much more important, through wellinformed and well-trained personnel. Anyone who knows how perpetrators work will be able to act with greater confidence and knowledge when it comes to security. For training to be effective in an emergency, courses meant to convey the relevant knowledge must be adjusted to the new practices and conducted on a regular basis.