Vehicle crime in the Netherlands A research into freight exchange fraud E.V.A. Eijkelenboom Erasmus University Rotterdam Erasmus School of Economics Date: Supervisor: Student number: Master program: August 2012 Mr. Dr. P.A. van Reeven 304873 Urban, Port and Transport Economics Abstract Road transport is a vital part of the Dutch economy. Unfortunately road transport crime occurs frequently in various forms, disturbing the market and creating losses. This thesis aims to start academic research into freight exchange fraud, an upcoming form of crime, and to enhance understanding of vehicle crime in the Netherlands. Vehicle crime originally consists of three components, namely cargo theft, vehicle theft and combination theft. Is freight exchange fraud a new component of vehicle crime or is it an innovation and did vehicle crime increase in total? Or did vehicle crime undergo a change resulting in innovation of vehicle crime and do the same actors behave differently? Our research investigates if freight exchange fraud is an addition to vehicle crime in the Netherlands. We perform a correlation analysis and a vector autoregression to retrieve information about relationships and dependencies between the different components of vehicle crime. Results of our research are mixed. Our research indicates that criminals stealing cargo or vehicles can be seen as experts, who are operating in a homogeneous group of actors. If circumstances remain unchanged, criminals are expected to remain stealing. Cargo theft criminals are found to be different than vehicle theft criminals. We did not find statistical significant evidence for an additional component of vehicle crime. Based on a descriptive analysis freight exchange fraud does seem to be a more advanced way of stealing cargo, vehicles or combinations and can therefore not be seen as an individual component of vehicle crime. Keywords: Vehicle crime, freight exchange, fraud, vector autoregression © E.V.A. Eijkelenboom 2012 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form, or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission, in writing, from the author. Table of Contents LIST OF FIGURES................................................................................................................... III LIST OF TABLES .................................................................................................................... III ACKNOWLEDGEMENTS ......................................................................................................... V CHAPTER 1: INTRODUCTION ...................................................................................................1 1.1 VEHICLE CRIME .......................................................................................................................... 1 1.2 AIM OF THE RESEARCH ................................................................................................................ 2 1.3 STRUCTURE ............................................................................................................................... 3 CHAPTER 2: FREIGHT EXCHANGE FRAUD .................................................................................4 2.1 LIBERALISATION OF EU FREIGHT TRANSPORT .................................................................................. 4 2.2 FREIGHT EXCHANGE .................................................................................................................... 7 2.2.1 Definition ....................................................................................................................... 8 2.2.2 Membership procedure ................................................................................................. 9 2.3 FREIGHT EXCHANGE FRAUD ........................................................................................................ 11 2.3.1 False document companies ......................................................................................... 12 2.3.2 Company take-over ..................................................................................................... 13 2.3.3 The mole ...................................................................................................................... 13 2.3.4 Consequences .............................................................................................................. 14 CHAPTER 3: DATA AND METHODS ........................................................................................ 15 3.1 DATA DESCRIPTION .................................................................................................................. 15 3.1.1 Data transformation .................................................................................................... 16 3.2 CORRELATION ......................................................................................................................... 17 3.2.1 Model I ......................................................................................................................... 17 3.2.2 Model II ........................................................................................................................ 22 3.3.3 Summary and concluding remarks .............................................................................. 27 3.3 MODEL SET UP ........................................................................................................................ 29 3.3.1 Model I ......................................................................................................................... 31 3.3.2 Model II ........................................................................................................................ 34 CHAPTER 4: RESULTS AND ANALYSIS .................................................................................... 37 4.1 MODEL I................................................................................................................................. 37 4.2 MODEL II ............................................................................................................................... 41 4.3 FREIGHT EXCHANGE FRAUD – DESCRIPTIVE ................................................................................... 42 CHAPTER 5: CONCLUSION AND RECOMMENDATIONS ........................................................... 46 5.1 CONCLUSIONS ......................................................................................................................... 46 5.2 POLICY RECOMMENDATIONS ...................................................................................................... 48 5.3 RECOMMENDATIONS FOR FURTHER RESEARCH .............................................................................. 51 LIST OF REFERENCES............................................................................................................. 53 APPENDIX ............................................................................................................................ 55 A. LEGAL FRAMEWORK ........................................................................................................ 55 B. DATA DESCRIPTION .......................................................................................................... 59 i B.1 DATA CHARACTERISTICS ............................................................................................................ 59 B.2 CHOW TEST ............................................................................................................................ 60 C. VECTOR ERROR CORRECTION MODEL ............................................................................... 60 D. MODEL I .......................................................................................................................... 61 D.1 STATIONARY TESTS FOR MODEL I ................................................................................................ 61 D.1.1 Cargo theft................................................................................................................... 61 D.1.2 Combination theft ....................................................................................................... 63 D.1.3 Vehicle theft ................................................................................................................ 66 D.2 LAG SELECTION FOR MODEL I ..................................................................................................... 68 D.3 IMPULSE RESPONSE FUNCTION MODEL I ...................................................................................... 69 D.4 VAR ANALYSIS AND IMPULSE RESPONSE FUNCTION FOR MODEL I INCLUDING FIRST DIFFERENCE OF CARGO THEFT .......................................................................................................................................... 70 D.4.1 Lag selection ................................................................................................................ 70 D.4.2 VAR analysis................................................................................................................. 71 D.4.3 Impulse response function .......................................................................................... 75 E. MODEL II .......................................................................................................................... 75 E.1 STATIONARY TESTS FOR MODEL II................................................................................................ 75 E.1.1 Members ...................................................................................................................... 75 E.1.2 Posted advertisements ................................................................................................ 78 E.1.3 Viewed advertisements ............................................................................................... 80 E.2 LAG SELECTION FOR MODEL II .................................................................................................... 82 E.3 JOHANSEN COINTEGRATION TEST ................................................................................................ 83 E.4 IMPULSE RESPONSE FUNCTION MODEL II ..................................................................................... 85 F. FREIGHT EXCHANGE FRAUD .............................................................................................. 86 F.1 2008 ..................................................................................................................................... 86 F.2 2009 ..................................................................................................................................... 86 F.3 2010 ..................................................................................................................................... 87 F.4 2011 ..................................................................................................................................... 88 ii List of figures Figure 1 Figure 2 Figure 3 Figure 4 Figure 5 Figure 6 Figure 7 Figure 8 Figure 9 Figure 10 Figure 11 Figure 12 Figure 13 Figure 14 Figure 15 Figure 16 Figure 17 Figure 18 Orbis 2008 EVO, 2003 Three components of vehicle crime graphed from January 1996 – December 2012 Impulse response function VAR(2) model I vehicle to vehicle Impulse response function VAR(2) model I cargo to cargo Impulse response function VAR(2) model I combination to combination Impulse response function VAR(2) model I combination to vehicle Impulse response function VAR(1) model II d.cargo to d.cargo Freight exchange fraud monthly percentage allocation Freight exchange fraud daily percentage allocation Freight exchange fraud percentage allocation per region European Union within CMR Liability Impulse response function VAR(4) model I vehicle to vehicle Impulse response function VAR(4) model I, combination to combination Impulse response function VAR(4) d.cargo to d.cargo Impulse response function VAR(4) d.cargo to combination Impulse response function VAR(4) combination to vehicle 6 6 32 38 38 38 39 42 44 44 44 55 58 73 73 73 74 74 List of tables Table 1 Table 2 Table 3 Table 4 Table 5 Table 6 Table 7 Correlation table model I, 1 Correlation table model I, 2 Correlation table model II, 1 Correlation table model II,2 VAR(2) analysis model I VAR(1) analysis model II VAR(4) analysis model I (cargo theft in first difference) 18 20 22 25 37 41 72 iii iv Acknowledgements This thesis and underlying research would not have been possible without the help and support of the following people. First of all I would like to thank Chris Selhorst, my supervisor at the Korps landelijke politiediensten (KLPD). It is because of his help that I was able to conduct an internship at the KLPD, where his enthusiasm, interest in the subject matter, work experience and his large amount of contacts helped me to get a grip on the subject. I appreciate the great amount of time he made available for me and my research, which has not only been a great stimulus for my thesis but made my internship a very valuable and unique experience. Secondly I would like to thank my colleagues at the KLPD, especially Enny Magendans, Frans Dekker and Hans van ‘t Hart of the Landelijk Team Transportcriminaliteit (LTT), who gave me such a warm welcome and made a very pleasant work environment. Furthermore I am grateful to thepersons who were willing to answer my questions and provide me with in depth information about the subject so that I was able to form my opinion. These people were Remco Segerink (KLPD), Roger Busch (Bovenregionale Recherche Zuid-Nederland), Alexander Oebel and Smahan Dahmani (Timocom), Henk Schenk (Teleroute), Wim DeKeyser, Frederik DeKeyser and Dimitri DeKeyser (B.V.B.A. Wim DeKeyser International Loss Adjusters) and last but not least Artur Romanowski, Hilde Sabbe, Cristina Checchinato and Rowan Timmermans (Europol). Fourthly I would like to thank my supervisor Peran van Reeven for supervising me during this process of thesis writing. I am grateful for the fact that he allowed me to write about a subject which is not common in the field of Urban, Port and Transport Economics and supported me from the first research proposal onwards. His reachability, approachability and critical remarks have been of significant positive influence on this final product. Last but not least I would like to thank my friends and family, especially for helping me: by drinking endless amounts of coffee whenever that felt needed (Job Jan, Suzanne); by serving late night drinks (Hilleke, Kimberley); with the statistics (Yvonne, Gert-Jan); sharing happiness or cheering me up (David, Irene, Linda); by constantly supporting me and showing an unceasing amount of interest (mum, dad). v vi Chapter 1: Introduction 1.1 Vehicle crime In March 2008 a new criminal phenomenon in the transport world grabs media attention1 causing a great fuss in the Dutch transport world. An intelligent, well thought through criminal act made it possible to let whole truckloads disappear. No one had seen something like this before. Everyone was aware of dangers like curtain slashing, holdups and corrupted drivers, which caused damages which were costly, but bearable. No one was prepared though for a new type of criminal activity, which made it possible to let a company go into insolvency with only one single criminal act. This new type of criminality is called ‘freight exchange fraud’. Freight exchange fraud is added by the National Police Services Agency (KLPD) to the other already familiar forms of vehicle crime, namely the theft of cargo, the theft of vehicles and the combination of both. This new type of vehicle crime makes one wonder if transport related criminal activities in the Netherlands increases or if the amount of criminal activity stays the same but changes towards a new equilibrium. Since road transport is a vital part of the Dutch economy, being responsible for almost 3% of the GDP2, it is important to investigate activities that threaten this sector. A secure and safe transport environment is beneficial for many parties. Road transport is not only of main importance in the Netherlands, in the European Union it takes 46.6% of the total goods transported for its account.3 Every day more than 1.5 million tonnage of raw materials, food and other cargo is transported by road. Criminals are aware of this continuous cargo flow and they try to interfere in order to find a source of income or use the haul to fund other, more complex criminal activities, such as trafficking in human beings. Criminals perceive cargo theft as a low risk/high reward crime and therefore it is seen as a lucrative business.4 This perception is not only caused by the size of road transport but also by the characteristics of the sector. The goods that are transported are often not secured. This is partially due to the high costs of protection, which are not bearable for the transport 1 See for example: http://www.ttm.nl/nieuws/id23143-Ladingdief_infiltreert_diep_in_Teleroute.html. http://www.rijksoverheid.nl/onderwerpen/goederenvervoer-over-de-weg/beleid-goederenvervoer-overde-weg. 3 European Commission (2011), p. 19. 4 Europol Cargo Theft Report (2009), p. 20. 2 1 companies, who are suffering from low margins. The fact that the goods are not secured properly makes it an easy target for criminals. Pressure exerted by (inter)national policymakers in combination with the low margins force transport companies to drive as efficient as possible.5 Inefficiency in the market creates opportunities for businesses to implement ideas that enhance efficiency. The freight exchange is one of these plans meant to increase efficiency which was successful. The internet platform made it possible for supply and demand to meet in the digital world, exchanging orders and decreasing the empty drives and cargo surplus. The previous years have made it clear that freight exchanges do not only bring positive but also come along with negative externalities. Criminals are currently infiltrating in the freight exchange, using the provided information to make it possible to let whole truckloads disappear, which causes enormous losses for the transport company. Every day, efforts are made to decrease vehicle crime. On a daily base the Landelijk Team Transport6 (LTT) is trying to solve road transport crime including freight exchange fraud, which is reported in the Netherlands. Current agreements7 of interest parties such as insurance companies, the Dutch Transport Operators Association (TLN) and the KLPD deal with a wide variety of criminal aspects in road transport. The attention for road transport crime is necessary since the direct and indirect losses caused by road transport crime are estimated at € 8.2 billion per year for the European Union and € 330 million per year for the Netherlands in specific.8 Diminishing transport criminality, especially freight exchange fraud, will enhance the life of many trucking companies. 1.2 Aim of the research This thesis aims to start academic research into freight exchange fraud and enhance understanding of vehicle crime in the Netherlands. Specifically we test for relationships and 5 In 2009 one in four European trucks drove empty. http://www.logistiek.nl/Distributie/transportmanagement/2010/8/Lege-vrachtwagens-probleem-of-uitdaging-LOGDOS113114W/. 6 The LTT is a part of the KLPD. 7 Tweede Convenant Aanpak Criminaliteit Transportsector, Convenant Aanpak Criminaliteit Wegtransportsector and Convenant Informatie en Registratie Ladingdiefstal. 8 Organised Theft of Commercial Vehicles and Their Loads in the European Union, p.18. It must be emphasized that these values are estimates since statistical data on crime in the road transport sector is relatively poor. 2 dependencies between different components of vehicle crime to be able to answer the following research question: Is freight exchange fraud an addition to vehicle crime? Although the problem of freight exchange fraud only covers a small part of vehicle crime, it causes relatively high losses. The European police is aware of this problem, as is shown by the Europol Report of 20099, but is unable to react due to a lack of information. This thesis tries to provide both information and analysis on freight exchange fraud, in order to provide the transport sector with policy recommendations that are aimed at recognizing criminal behaviour in advance and preventing freight exchange fraud from causing enormous economic damage. For this research we make use of Dutch vehicle crime reports gathered between January 1996 and December 2011 and freight exchange data from between January 2007 and December 2011. We will perform a correlation analysis and vector autoregression to come to our conclusion. 1.3 Structure This thesis is structured as follows. Chapter 2 starts with the history of the European Union to provide the reader with an inside in how the freight exchange could. Furthermore the rise of the freight exchange, working of the freight exchange and freight exchange fraud with its different working methods will be addressed. Chapter 3 will give a description of the available data, a correlation analysis and the model set up to investigate the relations between the different variables. In chapter 4 the results of the vector autoregression analysis complemented with an impulse response analysis are presented. These analyses will verify and complement the correlation analyses. Furthermore freight exchange fraud is described based on the available data. Chapter 5 will conclude this thesis with the main conclusions of this research, it provides policy recommendations and recommendations for further research. 9 Europol Cargo Theft Report. 3 Chapter 2: Freight exchange fraud This chapter will elaborate on the problem of freight exchange fraud. In the first paragraph the emergence of the freight exchange is discussed following the evolution of the European Union, the second paragraph gives a detailed explanation of the working of the freight exchange which will lead towards the third paragraph in which the problem of freight exchange fraud is examined. 2.1 Liberalisation of EU freight transport10 After World War II the idea of a European Union started to form, with the main idea to aim at economic integration of the member states. Collaboration between the member states was seen as a necessity to prevent future European unrest. On the 18th of April 1951 six states – Belgium, Germany, France, Italy, Luxembourg and the Netherlands - signed a treaty based on the Schuman Declaration11, named the Coal and Steel Treaty. This treaty aimed at collective managing of the heavy industries, in order to control the production of weapons. The Treaty of Coal and Steal was successful and the states agreed to expand the collaboration towards other sectors than the coal and steel sectors. On the 25th of March 1957 the Treaty of Rome12 was signed which created the European Economic Community (EEC) or the ‘common market’. The main idea of this treaty was and still is that people, goods and services are allowed to move freely across the borders of the states who signed the treaty. This so called ‘internal market’ is seen as the greatest achievement of the EEC – people, goods, services and money can travel around the different states as easily as they travel around their own country. (Amtenbrink and Vedder, 2010) The allowance of free movement of goods and services within the EEC enlarged the scope of many transport companies and made it a lot easier to cross the borders and trade with foreign partners. The open border policy lead to an increase of market size and was thought to stimulate efficiency, openness and equality, rather for the European consumers than for the 10 This chapter is based on Amtenbrink and Vedder (2010) and on http://europa.eu/about-eu/euhistory/index_nl.htm. 11 On the 9th of May 1950 the French minister Schuman composes a plan which should lead to closer collaboration (The Council of Europe was already established in 1949). Later this plan – the Schuman Declaration - is recognized as the first official step towards a European Union. 12 The official name of the Treaty of Rome is Treaty establishing European Economic Community. 4 transport companies. The scope and business opportunities of transport companies did increase, however at the same time transparency was expected to decrease. This diminished transparency occured for example with contracting. Different languages, diverse build-up of agreements, unknown drivers and transport companies were able to enter the road transport market which made and still makes supervision and control more difficult. European collaboration expanded even further, resulting for example in a common agricultural policy (July 30, 1962) where farmers are paid the same price for their products in every member state. Another example is the removal of custom duties (July 1, 1968) on goods imported by member states and applying the same duties on imported goods from countries other than the member states. This created the biggest trade group and the years after founding, trade between the member states and the rest of the world grew rapidly. Economic integration intensified in 1972 when member states agreed on a common exchange rate mechanism for their currencies (so currencies can only fluctuate within limits). Although trade is supposed to move freely across the European Community since the abolishing of custom duties in 1968, national regulations still prevented that from happening. The transport sector did make use of the international dimension but less than expected. The old network of transport companies stayed intact and although the European aspect is added, the transport sector stayed national oriented. On the 17th of February 1986 the Single European Act13 is launched in order to sort out this malfunctioning, furthermore it gives the European Parliament more power with regard to environmental protection. Environmental policy does influence the transport sector because it pushes the need to drive as efficient as possible (with full drives). The Single European Act therefore has a great impact on the transport sector and pushes it more and more into a European minded direction. This European mind-set is strengthened by the signing of the Treaty on the European Union14 which changed the name of the European Community into the European Union. The treaty states clear rules for future cooperation, for example with respect to a single European currency, foreign and security policy, and justice and home affairs. 13 14 The Single European Act is an amending treaty revising the Treaty of Rome. Maastricht, 7th of March 1992. 5 The 1st of January 1993 is an important moment because the four fundamental freedoms are now officially established for the common market. The policy of the European Union still mainly aims at economic integration of member states.15 The integration of markets of member states followed from policy which is mainly based on the four fundamental freedoms as stated in the treaty on the functioning of the European Union. These fundamental freedoms are the free movement of goods, services, persons and capital. The basic rules following from the fundamental freedoms are applicable on the whole economy only excluding areas which have their own specific policy. Sectors with such a specific policy are the agricultural, nuclear energy and transport sector. (Amtenbrink and Vedder, 2010) Figure 1 Orbis, 2008 Figure 2 EVO, 2003 In the transport sector economic integration is further stimulated by the introduction of cabotage16 – the possibility to transport goods in other countries than where your own vehicle is registered – which should increase the amount of trade and efficiency in the transport sector. The opening of the borders resulted in a large inflow of transport firms since legislation lowered trade barriers in the EU even further. The entry barriers in road haulage are low and the sector is characterized by high internal competition. Consequently firms in the road transport sector operate in a tough business climate characterized by low margins (figure 1). The high labour costs (figure 2) suggest that that is the main cost that should be watched and improved. (Karis and Dinwoodie, 2005) 15 Main point of the Treaty of Rome but is kept as a main ideal as follows from the preambles and the first articles of the Treaty on European Union (TEU) and the Treaty on the functioning of the European Union (TFEU). 16 May 14, 2010. 6 The high internal competition enforces transport companies to control their operating costs closely. Since labour costs are a substantial part of the vehicle operating costs, it might be profitable to use cheap labour, for example by contracting drivers from Eastern Europe which is made possible by the four fundamental freedoms. Using drivers from abroad, or settle a transport company abroad might lower costs but isn’t beneficial for a transparent market. Economic integration of member states increased further when on the 1st of January 1999 the new European currency, the Euro, is introduced and from now on used in business transactions17. Since 1951 the group of six member states has expanded to a total of 27 member states which all signed the Treaty of Lisbon18. This treaty builds on earlier European treaties and still aims at economic integration but also has objectives like a higher rate of democracy, efficiency and transparency within the European Union. This way global problems, for example problems concerning the environment or national safety can be tackled. One currency made trading easier, because it eliminated rate differences within the European Union. This might be a stimulus for road hauliers which operated mainly on a national base to explore the other member states. The high amount of road hauliers currently operating in the European Union in the same competitive business climate enforces competitive behaviour. Efficiency can be improved when trucks always drive fully loaded, which is also stimulated by the EU with its environmental focus. The constantly increasing need to become a European oriented road haulier created the perfect environment for the freight exchange to emerge. The increase of European member states, environmental policies and the high internal competition in the transport sector caused a demand for information and transparency. In order to be competitive the best deals must be made and the drives must always be full, but the amount of countries and companies hinder transparency and lead to asymmetric information. The freight exchange might be helpful in solving this problem of asymmetric information. 2.2 Freight exchange The freight exchange is nowadays an essential part in the transport sector, widely used and known by its stakeholders. In this paragraph we will take a close look at the freight exchange as 17 18 Since 2002 the Euro is not only used in business transactions but became the main European currency. Treaty of Lisbon, December 13, 2007; Ratified by all member states before 1 st of December 2009. 7 an important part of the transport chain.19 This paragraph is subdivided into two parts. The first part will define the freight exchange; the second part will elaborate on the membership procedure. 2.2.1 Definition A freight exchange is a digital platform where shippers and carriers can meet. In Europe the most important, largest and most used freight exchanges are, TimoCom, which is situated in Germany and Teleroute, part of multinational Wolters-Kluwer, located in the Netherlands. Next to these large players, local players are present in the market as well and can be found in France and in different countries in central and Eastern Europe. Our focus will be on the two largest players because of their size which allows them to serve a substantial part of carriers and shippers around Europe. Furthermore the smaller freight exchanges, for example those located in Eastern Europe, only serve a local (national/regional) market which does not correspond with the international character of road transport and the global aspect of the crime following it. A freight exchange offers a service to the transport sector, namely the service to be the platform which gives supply and demand the opportunity to meet. When a shipper has a load but no transport he can enter the freight exchange. On the freight exchange he can post an advertisement for his load. The advertisement will contain information about when the load needs to be shipped, the origin and destination of the load and if special requirements for transport are needed. Examples of these specials requirements are the need for a cooling-trailer or a tank-trailer. It is not allowed to give any other details on the load than the details needed for transport. So the amount of pallets which needs to be transported can be stated in the advertisement but one is not allowed to define the goods on the pallet. After the shipper has posted the advertisement on the freight exchange it is available for all other customers of the freight exchange to see. Such an advertisement targets a carrier who has a transport towards a destination but does not have a load back to his country of origin. To endeavour increased efficiency the carrier will enter the freight exchange and start searching for advertisements which offer loads located on or near his way home. When a carrier sees a load of interest he can contact the shipper via the freight 19 This paragraph is mainly based on conversations with experts of the freight exchange (Alexander Oebel, Shaman Dahmani, and Henk Schenk) and on the websites of the freight exchanges Timocom (www.timocom.de), and Teleroute (www.teleroute.nl). 8 exchange. Closing of the deal takes place without interaction of the freight exchange. Just as on an ordinary exchange, one is able to resell the products one bought. Often not only contractors but also subcontractors are searched via the freight exchange because of possible arbitrage opportunities. This leads to long transport chains with a lot of subsidiaries which causes intransparancy and thereby opportunities for criminal behaviour. The freight exchange does only offer the possibility for shipper and carrier to come in contact with each other and is therefore not liable under current law.20 In order to be successful as a freight exchange a large group of customers is needed because only then you are able to serve the needs of shippers and carriers and give an accurate overview of European supply and demand. The founding of the European Union which came along with a demand for information created the opportunity for freight exchanges like TimoCom and Teleroute to gain such a critical mass21 and therefore they are able to serve a large part of Europe. 2.2.2 Membership procedure Market information is necessary in order to be able to be efficient and competitive in the transport sector. The freight exchange offers such market information and participants of the road transport sector acknowledge its utility and the necessity of becoming a member. This paragraph will give a comprehensive description of the membership procedure of the freight exchange to give an insight in safety procedures taken by the freight exchange Once an application for a membership is received by the freight exchange, a security check process is started. The interested transport company is asked to complete a form containing questions regarding basic company information. This basic information includes amongst others the company address, type of company22, if it possesses trucks, and when this is the case what type of trucks. After completion of the form this information is send to an account manager who tries to gain additional information23 by contacting the interested company. 20 See Appendix A for more information on liability and law in the transport sector. For example, TimoCom has 30.000 members and has daily 300.000 offers posted on its system. 22 E.g: is the company a carrier, shipper or shipping agent. 23 This additional information can be for example a chamber of commerce registration number, insurance, driver license, normal letterhead of the company. 21 9 The large freight exchanges are active in most European countries, but not every country registers and archives all company information, therefore the freight exchange does not require the same additional information from every company. The requested information can differ per company per country per day. Furthermore a financial check is performed to check the creditability of the company. For a freight exchange it is disastrous when companies active on your freight exchange do not pay their business partners, this will be associated with the freight exchange and this might have negative impact. Therefore the financial check is perceived by the freight exchange as an important part of the application procedure.24 The financial check also involves a check of subsistence, a company has to exist and be active for at least six months to make sure the company has a chance of survival in this highly competitive sector. When the additional information is received and the account manager reckons the applicant is legal and creditworthy, the application form and the additional information are sent to the security department. This department double checks the company again and compares the information provided by the company to public sources. By checking for example the yellow papers and verifying the company website, the security department checks if the company truly exists and if this company is not part of obscure activities. When the security department is convinced of the sincere intentions of the company the application is sent back to the account manager. The account manager seeks additional contact to negotiate about the contracts and opens the account. The transport company is now able to take part in the freight exchange and his company information is visible for all other users. It might be possible that a company is granted permission to be active on the freight exchange before the security check is finished. The personal account of the company does however state in which verification level the company is. This information is visible for all members of the freight exchange. Additional rights will be assigned to a company when a greater part of the company is checked. Customers of Teleroute can also choose to sign a ‘Code of Conduct’ which is complementary to all legal rules and lays down the expected behaviour of Teleroutecustomers. By committing to this gentlemen’s agreement you oblige yourself to be honest and sincere. After a company signed the Code of Conduct, this will be made visible for other users in the company’s personal account information. Checks and balances are also found in the peer 24 The freight exchange does also value creditability of their members as an assurance that they are expected to receive the membership fee. 10 review, an elementary part of the freight exchange where users of your company can rate the service offered by the freight exchange. The registration number of the user can be a basic and first check on creditability. The lower the number, the longer a company is part of the freight exchange and a long membership probably refers to a respectable company. The idea that one is dealing with a respectable company is then used by organizations with criminal intentions. 2.3 Freight exchange fraud The emergence of the freight exchange in combination with the characteristics of the road freight transport sector (low margins, intense competition) lead to opportunities for criminal behaviour. Different conversations25 with experts, and police reports led to the following definition of freight exchange fraud: Freight exchange fraud is the deliberate misuse of the freight exchange with the aim to steal cargo to fund other activities of the criminal organization. The first case of freight exchange fraud is reported in the Netherlands in 2008. Since then the phenomenon is observed in many more European countries. Misuse of the freight exchange, as meant in the definition of freight exchange fraud, can occur in a variety of ways. The police tries to retrieve the working methods26 of (a group of) criminals. When formulating the different methods of work it is most important to focus on possible repeating elements and the evolvement of the criminal approach over time. When experts, for example the investigators working at the KLPD, construct the modus operandi they are able to construct a policy to prevent the criminal activity occurring in the future. Also, when the working method is clear the possible targets of the criminals can be warned. It is therefore of great importance to be aware of the modus operandi. This section will construct the working methods for fraudulent transport activities with use of the freight exchange. Although this type of criminal activity is a fairly recent phenomenon, the statements of the deceived, police investigations and conversations with experts from the field show already a transition in working method from the moment freight exchange fraud was noticed for the first time, up till today. 25 This paragraph is based on conversations with the following experts Chris Selhorst, Roger Busch, Remco Segerink, Wim DeKeyser, Frederik DeKeyser, and Dimitri DeKeyser. 26 By the police referred to as ‘modus operandi’. 11 The general procedure of freight exchange fraud is that a variety of transport deals is made with the use of the information presented on the freight exchange. After the deal is made the criminal organization picks up the cargo at the place of origin but does not deliver at the place of destination. The fraudulent company is active for about a week and tries to get as much contracts as it can handle and preferably long drives at the beginning of the week in order to postpone the date of discovery. At first it seemed that electronics and other expensive goods were the main target of these criminals and were therefore seen as high risk-products but lately every type of cargo seems to be at risk. Recently stolen cargo includes frozen meat, chocolate, electronics and used truck tires.27 The observed methods of work can be divided in three main groupings, i.e. false document companies, company take-overs and a method we named ‘the mole’. The different methods of work will be explained in the next three paragraphs. 2.3.1 False document companies The first method is named: false document company. Criminals make use of an existing company name, but fabricate their own documents for that company using existing company details. These companies are totally falsified and imaginary except for their names. This means the insurance papers, e-mail addresses, registration numbers etcetera are all falsified but often based on the original documents. When a falsified company tries to register at the freight exchange it has a low chance of passing through security checks, the company is ought to fail all basis checks. However, most of the time a falsified company will not register at a freight exchange since another company has registered already. An insight in the advertisements is enough to make a deal. The false document company can often be recognized by its contact details since it makes use of free mail providers (e.g. hotmail.com or gmail.com) and mobile phone numbers. Potential business partners should be alerted when observing basic company information including only free mail addresses and mobile phone numbers, which should make them reluctant from doing business with that company. Only a minor investigation will be able to expose the falsity of this business. An example of such a practice is a criminal organization which changed the business location from ‘Randweg’ into ‘Rondweg’. It is only a slight difference and therefore hard to notice when not paying very close attention. The criminals make use of an existing company 27 More information about stolen cargo due to freight exchange fraud can be found in paragraph 4.3. 12 name, therefore a company website and fixed phone connection do exist. Thus, a simple check in advance is possible and easy. The first time a criminal company conducted freight exchange fraud this method was used and caused an enormous damage to a lot of Dutch companies. The security check of the freight exchange should notice this type of falsified company because of their check with real data. In the first halve of 2011, thirteen falsified transport licences were used in Poland. The freight exchange reported this fraud. Unfortunately authorities did not reply or act upon the proposal made by the freight exchange to exchange information on this specific matter. 2.3.2 Company take-over The high probability of detection when using a false document company led to evolvement of this working method. The chance of being caught is smaller when taking over a small business. When taking over a company criminals make use of the good name and reputation the credible company has built. Furthermore, they can use the existing log-in data for the freight exchange, the current insurance papers, the fixed phone connections and business e-mail addresses. In practice this means that such a company is not detectable. When a potential business partner checks the company information, only trustworthy data will be found and nothing will indicate potential criminal activities. The freight exchanges try to guard themselves against criminal activities following from take-overs, by obliging companies to notify the freight exchange when a take-over has taken place. At that time a new security check can take place or a new number can be assigned to the company notifying other users of the freight exchange that the company has changed substantially. In practice however these measures often come tardily28. For freight exchange fraud only a short amount of time is needed to cause enormous damage to others. 2.3.3 The mole ‘The mole’ is a different working method than the methods previously described; the name refers to the placement of a mole into a credible transport company. This method is often used since the existence of freight exchange fraud and can occur in combination with another working method. Transport companies have large planning departments where all people have access to the freight exchange. When a criminal organization makes use of an infiltrator in such 28 One of the police reports stated a transport company which was taken over just before Christmas. The former owner reported the take-over, but because of the holidays it was processed at the freight exchange after new year’s eve. This turned out to be too late because between Christmas and New Year’s eve several loads were already stolen and the new (criminal) owners vanished into thin air. 13 a company they will be notified when valuable cargo is offered and they can contact the supplying company. The criminals then do not need own log-in data but will directly contact the company, they can identify themselves as a false document company or make use of the company name of the infiltrator. An inattentive transport company will than close a contract and loses its freight to the criminals. For the freight exchange the mole strategy is hard to detect. Although there might be a noticeable change in internet behaviour, the new persons in a company could be a logical explanation for the change. This criminal strategy is at the moment mainly observed in eastern European countries like Slovakia. 2.3.4 Consequences The consequences of freight exchange fraud are numerous. When goods are lost insurance companies try to recover the losses by approaching the carrier. (Appendix A) Because of the low margins in road haulage a small carrier will not be able to pay the compensation claims which might lead to bankruptcy. Economically, loss of goods can lead to delayed production. Furthermore trust within the sector will diminish creating high barriers for new entrants. Current trends show that insurance companies consider excluding insurance of losses caused by usage of the freight exchange. For a criminal organization the existence of the freight exchange makes high value/ low risk criminal activities possible. Governments do not prioritize this type of criminal behaviour and therefore police attention stays limited as consequence which is a stimulus for criminals to continue this type of crime. Criminals are able to improve their working methods and keep up with the latest trends, which is enhanced by the low priority given to this type of crime.29 Modern techniques such as access via mobile apps to the freight exchange hinder the, slightly lagging behind, police in identifying the perpetrator. 29 This is confirmed in the report Zware jongens op de weg (2006) p.71. 14 Chapter 3: Data and methods This chapter will give a description of the data concerning vehicle crime of the Netherlands. In the second paragraph a correlation analysis will be performed to create a first insight in the relations that exist between the variables. The third paragraph will construe the models which will be the base for further analysis. 3.1 Data description For this research four parts of vehicle crime are taken into account. The KLPD used to identify three different forms of vehicle crime related to cargo theft, which are vehicle theft, combination theft and cargo theft, but added freight exchange fraud as a fourth category in 2008. The data used in this research originates from Dutch police reports, beginning January 1996 up to December 2011 and is collected on a monthly basis. One report can enclose several incidents but since not all reports are available for examination the number of reports will be the most accurate variable when making comparisons. The different categories of vehicle crime all relate to road haulage. Vehicle theft refers to the theft of heavy vehicles, these vehicles must weigh at least 3500 kg. Combination theft indicates that a heavy vehicle together with its load is stolen. Cargo theft refers to theft of cargo from a heavy vehicle which can include partial theft as well as theft of a whole load. Descriptive statistics and the graphed evolvement over time of these variables can be found in the appendix (Appendix B.1). The analysis will also make use of data provided by the freight exchange. This data covers the amount of posts and the amount of viewed advertisements on the freight exchange. Furthermore the amount of members of the freight exchange is tracked. The dataset provided by the freight exchange contains monthly data starting from January 2007 up to December 2011.30 All variables used in this analysis are time series variables, meaning that we use observations which are obtained over a period of time on regular time intervals, in our case monthly intervals. The observations do not necessarily cover the same objects. Each month is accurately 30 A confidentiality agreement prohibits us to publish descriptive statistics or a graphed evolvement over time of these variables in this thesis. 15 kept track of vehicle crime and freight exchange details leading to a dataset without missing values. We must keep in mind though that not all incidents are reported which leads to an under-registration of the true amount of crime incidents.31 Time series analysis is often used to construct forecasts which can be helpful for prevention of future crime. Data of freight exchange fraud is available from January 2008 up to December 2011. This variable takes in account all reported vehicle crime performed with use of the freight exchange, the different working methods (sub 2.3.1 – 2.3.3) are not taken in account because those narrow down the already relatively small sample, which then might influence the results. Furthermore the small sample size of freight exchange fraud has as a consequence that it cannot be incorporated in the statistical analysis because the number of observations per month is not sufficient. In the next chapter a paragraph will be dedicated to a comprehensive description of freight exchange fraud based on the Dutch police reports to be able to give the reader an insight in the problem of freight exchange fraud so far. 3.1.1 Data transformation In 2010 the KLPD changed their computer system in such a way that crime reports could be processed more accurately. The new computer system allowed linkages between the different Dutch police data storage systems which enhanced national transparency. The increased accuracy of the system made it easier to process the different crime reports and to distinguish the different components of vehicle related crime. Consequence of this new system is that the measuring is more accurate which could lead to an increased crime number with respect to the year before, while that increase may just be caused by the new way of measuring and processing. A sudden increase in the reports might cause a break in the data sample when it is not the reflection of an actual crime increase. When a break exists it is not possible to approach the dataset as one sample. A break needs to be corrected for in a model. The knowledge about the change in the computer systems gives us a strong indication that a break exists. A Chow test is used to verify our expectation.32 The outcome of the test is that the null hypothesis has to be rejected in favour of the alternative that a break exists (Appendix B.2). January 2010 does cause 31 32 This under registration is in practice referred to as the ‘black number’ of crime. The significance level of this test is 5%. 16 a break in our data and therefore a dummy will be incorporated in the models to correct for the break. 3.2 Correlation33 This paragraph introduces an exploratory view on the relationships that might exist between the different variables. Correlation tables are used to show the potential relationships. It might be possible to draw some preliminary conclusions from the observations visualized in the tables. The suggestions in this paragraph are however made with great reluctance since the data used to construct this correlation tables is time series data. Time series data has as a consequence that while the same event is tracked each month, the actors can vary therefore shifts in the data might just be a coincidence instead of having specific relevance. The observations of this paragraph will for that reason be used as basis for further research. This paragraph is divided in two parts. The first part takes the three vehicle crime components in account from January 1996 up till December 2007 and is the base for the construction of model I. The second part of this paragraph will incorporate the three vehicle crime components and the freight exchange variables in the correlation analysis. These variables will cover the period January 2007 up till December 2011 and they will be the basis for model II. Each paragraph will consist of two correlation analyses, starting with a correlation table which describes the correlation between the variables. Thereafter the relation between the variable and its lags - its past observations - will be described since such a within-variable relationship might influence the correlation between the variables. Underneath each correlation table the most important conclusions will be summarized and, where necessary, compared to previous results, after which a more comprehensive analysis will follow. 3.2.1 Model I The correlations of the different components of vehicle crime - vehicle theft, cargo theft, and combination theft - are shown in table 1. 33 A correlation analysis provides information about possible relationships between variables. A correlation analysis does not clarify any causality between variables. Examples given in this chapter regarding the sign and significance of correlation coefficients are meant to clarify the effect of the movement, they do not imply any causal relations, it should therefore be kept in mind that the names of the variables in an example are interchangeable. 17 Table 1 Correlation table model I,1 Correlation table Variable Vehicle theft Vehicle theft Cargo theft Combination theft 1 Cargo theft 0.164 * p-value 0.023 Combination theft 0.440 ** p-value 0.000 1 - 0.264 ** 0.000 1 * significant on a 99% level (0.01), ** signficant on a 95% level (0.05) The table reveals that all correlation between the vehicle crime variables is significant at the 5% significance level. Cargo theft and vehicle theft are positively correlated with a correlation coefficient of 0.164. This coefficient indicates that cargo theft and vehicle theft follow the same pattern, for example when cargo thefts increases, vehicle theft will increase as well. Combination theft and vehicle theft show a significant positive correlation with a coefficient of 0.440 indicating that combination theft and vehicle theft are expected to follow a similar pattern. Combination theft and cargo theft are negatively correlated with a significant correlation coefficient of – 0.264. This correlation coefficient indicates that combination theft and cargo theft are expected to follow an opposite pattern, for example when combination theft increases, cargo theft decreases and vice versa. Vehicle, cargo and combination thefts are clustered in the group ‘vehicle crime’ which indicates a certain connection and equality between those different types of theft. The connection can for example be found in the nature of the thefts since all thefts relate to road haulage, furthermore criminals active in this cluster might be the same. The assumption of the same actors being active in vehicle crime can be supported by the negative correlation coefficient. A negative correlation indicates that variables follow an opposite pattern, thus for example when one type 18 of theft increases, the other type of theft decreases and vice versa. The negative correlation suggests a change in the behaviour of criminals who seem to switch from one to another type of vehicle crime. Such a behavioural change of criminals might be stimulated by a change in external circumstances. It might be that, when external circumstances make it easier to steal vehicles, the ‘cargo-criminals’ shift to combination thefts. Only the negative correlation coefficient between cargo thefts and combination thefts seems to support the assumption of the same actors being active in vehicle crime. On the contrary the other two relationships - vehicle theft related to cargo theft, and vehicle theft related to combination theft - display a positive significant correlation. Following the reasoning of the previous paragraph, does this positive correlation than indicate that different actors are active in those criminal activities? The positive relation might suggest that the actors are different in each crime component assuming that each actor is an expert in a certain type of vehicle crime. When external circumstances improve, all criminal actors will profit from it and the crime rate in each component is expected to increase. This assumption is however not exhaustive since more convenient external circumstances will also cause an increase in crime when the actors in the different kinds of vehicle crime are the same. In the latter situation more ‘profit’ is generated by the same actors in the same period of time. From correlation table 1 we can only make assumptions about the actors, it is however not possible to draw conclusions about the actors’ active in vehicle crime. Correlation table 1 gave us insight in the correlation between the variables. The next table will expand the insight in vehicle crime by adding lagged variables to the analysis to be able to research possible within-variable correlation. To get a general first impression of possible correlation with the past values of the vehicle crime variables, three lags are taken indicating that we look back three months in time. The lag periods are denoted by L1 for the first lag, which looks back one month; L2, for two months back; and L3, three months back. 19 Table 2 Correlation table model I, 2 Correlation table Variable Vehicle theft Vehicle Cargo theft Combination theft 1 p-value Vehicle L1 0.420 ** p-value 0.000 Vehicle L2 0.405 ** p-value 0.000 Vehicle L3 0.435 ** p-value 0.000 Cargo 0.164 * p-value 0.023 1 Cargo L1 0.100 0.820 ** p-value 0.169 0.000 Cargo L2 0.110 0.818 ** p-value 0.130 0.000 Cargo L3 0.048 0.772 ** p-value 0.511 Combi 0.440 ** p-value 0.000 Combi L1 0.311 ** p-value 0.000 Combi L2 0.294 ** p-value 0.000 Combi L3 0.261 ** p-value 0.000 0.000 - 0.264 ** 0.000 - 0.252 ** 0.000 - 0.253** 0.000 - 0.275 ** 0.000 1 0.499 ** 0.000 0.419 ** 0.000 0.315 ** 0.000 * significant on a 99% level (0.01), ** signficant on a 95% level (0.05) The information presented in table 2 shows us that the three vehicle crime components do all positively and significantly correlate at the 1% significance level with their own three lagged variables. The relations between the variables are comparable to the results of table 1. The results of table 2 - significant between-variable correlation and significant within-variable correlation - might be an indicator for noise in the correlation analyses. Vehicle theft does not only show a significant within-variable correlation it does also show a significant positive correlation with cargo theft, which is in accordance with the result from table 20 1. Vehicle theft does not show a significant correlation with the lags of cargo theft indicating that former cargo theft activities do not seem to influence current vehicle crime. Vehicle theft and all three lags of combination theft show a positive significant correlation at the 1% significance level. The positive relation between vehicle and combination theft already became clear in table 1, and table 2 adds to that earlier observation that vehicle theft is significantly positively correlated with the lags of combination theft. Cargo theft is also not only dependent on its own lags but it also shows a negative significant relationship at the 1% significance level with combination theft and the lags of combination theft. This negative significant relation indicates that both variables follow an opposite pattern hence a decrease in combination theft, increases cargo theft even three months later. Each variable shows a positive significant relation at the 1% significant level with its own three lags. These significant within-variable relations might indicate that the same actors are active within each vehicle crime component. When the environment is suitable for criminal behaviour, criminals will make use of the situation. The criminals will keep on stealing until an environmental change makes continuing of ordinary business impossible without adapting to the new situation. The significant correlations of the lagged variables are therefore not unexpected since theft is the ‘profession’ of vehicle criminals which must result in a sufficient ‘salary’. 21 3.2.2 Model II The correlations of the different components of vehicle crime – vehicle theft, cargo theft and combination theft – and the variables presented to us by the freight exchange – posted advertisements, viewed advertisements and the amount of members - are shown in table 3. Table 3 Correlation table model II, 1 Correlation table Variable Vehicle theft Cargo theft Combination theft Posted advertisements Viewed advertisements Members Vehicle theft p-value Cargo theft p-value Combination theft p-value Posted advertisements p-value Viewed advertisements p-value Members p-value 1 0.569 ** 0.000 1 0.031 - 0.115 0.817 0.382 0.288 * 0.589 ** 0.102 0.026 0.000 0.440 - 0.400 ** 0.002 - 0.342 ** 0.008 - 0.717 ** 1 0.118 0.000 - 0.609 ** 0.368 - 0.015 0.000 0.910 1 - 0.695 ** 1 0.000 - 0.698 ** 0.000 0.810 ** 0.000 1 * significant on a 99% level (0.01), ** signficant on a 95% level (0.05) Correlation table 3 reveals that cargo theft and vehicle theft are significantly correlated with each other and with all variables of the freight exchange. Combination theft does not show any significant relations, contrary to table 1 and 2. Vehicle theft is positively and significantly correlated with cargo theft. Different than table 1, vehicle theft does not show a significant correlation with combination theft. The shorter time frame used in this correlation analysis could be a reason for disappearance of the earlier found significant relationship. Vehicle theft correlates significantly with all variables from the freight exchange. A positive relationship is found between vehicle theft and posted advertisements. A negative correlation is 22 found between the viewed advertisements and vehicle theft and the amount of members and vehicle theft. Cargo theft does not show a significant relationship with combination theft unlike the result of table 1. Cargo theft significantly correlates with all variables from the freight exchange; positively with posted advertisements and negatively with viewed advertisements and members. Combination theft does not show any significant correlation with the variables from the freight exchange. The variable ‘posted advertisements’ shows a negative and significant correlation with the amount of members at 1% significance level. The variable ‘viewed advertisements’ does show a positive and significant relation with members. Combination theft does neither show a significant correlation with cargo theft or vehicle theft notwithstanding the results of table 1 and 2. Although the correlation coefficients of table 3 are not significant for combination theft we do notice that the signs of the correlation coefficients between combination theft and the other vehicle crime variables did not change. The vehicle crime components34 show a positive significant relation with posted advertisements and a negative significant relation with viewed advertisements and members. The vehicle crime variables follow a similar pattern as the posted advertisements do, for example an increase in posted advertisements, increases vehicle crime. While an opposite pattern is observed between vehicle crime and viewed advertisements, and vehicle crime and members; for example when the amount of members and the amount of viewed advertisements on the freight increases, vehicle crime decreases. The variable combination theft shows no significant relation with any of the variables used in this correlation analysis, in contrast to table 1. It might be that the detection of the new vehicle crime component in 2008, freight exchange fraud, and the new measurement method from 2010 is of higher influence in this smaller sample, resulting in the non-significance of combination theft. Reporting combination theft might experience difficulties because the elements of combination theft (thus cargo theft and vehicle theft) could be reported separately, 34 With the phrase ‘vehicle crime components’ is in this case referred to vehicle theft and cargo theft which are the components that significantly correlate with the variables of the freight exchange. 23 because of possible different owners or concerned parties. When ‘combination theft’ is reported in two separate reports it has as consequence that these reports are not combined into one combination theft report leading to measurement errors. When freight exchange fraud was detected it became possible to report this new type of vehicle crime which probably led to measurement errors as well. It might be that the linkage with the freight exchange is not made when freight exchange fraud as component of vehicle crime is reported. The category freight exchange fraud might be difficult to work with for the police because a vehicle crime report concerns a missing load, missing vehicle or missing combination and only by asking specific questions the relation with the freight exchange will be become clear. This might be the reason that the correlations between vehicle crime and the freight exchange variables give mixed results about the impact of the freight exchange on vehicle crime. The variables of the freight exchange show on the one hand positive significant correlations (posted advertisements) with vehicle crime and on the other hand negative significant correlations (viewed advertisements and members) with the vehicle crime variables. Table 4 tries to expand the information about the relations between variables of the freight exchange, and vehicle crime variables by adding the lagged variables of vehicle crime. We perform a three lag correlation analysis denoted by L1, for 1 lag, indicating we look back 1 month; L2 for two months; and L3 for three months. The analysis of correlation table 4 will concentrate on the effects of the freight exchange variables on the components of vehicle crime and will shortly describe the relation of the vehicle crime variables with their lagged variables.35 The output of table 4 is in accordance with table three. All significant relations found in table 3 continue in the lagged variables of vehicle crime. Different than table 2, combination theft does not show significant within-variable correlation. Cargo theft shows a significant positive correlation with its three lags at the 1% significance level. Vehicle theft does also show a positive significant relation with its second and third lag. Combination theft does not show significant correlations with its lags. 35 For a more detailed description see sub 3.2.1, table 2 and following. 24 Table 4 Correlation table model II, 2 Correlation table Variable Vehicle theft Vehicle theft p-value Vehicle theft L1 p-value Vehicle theft L2 p-value Vehicle theft L3 p-value 1 Cargo theft Combination theft Posted advertisements Viewed advertisements Members 0.569 ** 0.031 0.288 * - 0.400 ** - 0.342 ** 0.000 0.817 0.026 - 0.039 0.454 ** - 0.528 ** - 0.429 ** 0.769 0.000 0.000 0.001 - 0.011 0.415 ** - 0.536 ** - 0.498 ** 0.937 0.001 - 0.250 0.313 * 0.061 0.018 - 0.115 0.589 ** - 0.717 ** - 0.609 ** 0.382 0.000 0.000 0.000 - 0.200 0.646 ** - 0.824 ** - 0.710 ** 0.130 0.000 0.000 0.000 - 0.095 0.626 ** - 0.802 ** - 0.721 ** 0.479 0.000 0.000 0.000 - 0.079 0.549 ** - 0.820 ** - 0.784 ** 0.000 0.000 0.000 0.102 0.118 - 0.015 0.440 0.368 0.910 0.219 0.062 0.133 0.047 0.096 0.643 0.315 0.724 0.130 - 0.089 0.124 0.058 0.329 0.508 0.353 0.666 - 0.011 - 0.124 0.100 0.053 0.936 0.357 0.459 0.693 - 0.695 ** - 0.698 ** 0.000 0.000 0.091 0.403 ** 0.494 0.002 0.342 ** 0.009 0.316 * 0.017 0.431 ** 0.000 0.267 * 0.045 Cargo theft p-value Cargo theft L1 p-value Cargo theft L2 p-value Cargo theft L3 p-value Combination theft 1 0.692 ** 0.000 0.699 ** 0.000 0.622 ** 0.000 0.557 1 p-value Combination theft L1 p-value Combination theft L2 p-value Combination theft L3 p-value Posted advertisements 1 0.002 0.000 - 0.522 ** 0.000 p-value Viewed advertisements 1 p-value 0.008 0.000 - 0.482 ** 0.000 0.807 ** 0.000 Members 1 p-value * significant on a 99% level (0.01), ** signficant on a 95% level (0.05) 25 The variables posted advertisements, viewed advertisements and members show a significant relation at the 1% significance level with vehicle theft, cargo theft and their lagged variables. In accordance with table 3, combination theft does not show any significant correlations. The significant correlations at the 1% level of vehicle theft and cargo theft with their lagged variables seem to suggest that the same actors are active within a vehicle crime component or that circumstances did not change. For combination theft we do not find significant results with its lags in this analysis. It might be that combination theft is also committed by vehicle thieves and cargo thieves when circumstances allow them to expand their, or switch between, criminal activities. When combination theft is performed by a variety of actors the within-variable correlation could be lower due to less consistency. Over the long run consistency might be higher due to a certain pattern in advantageous criminal circumstances which might explain the significant correlations of combination theft in table 2. The significant negative correlation between the amount of members and vehicle crime, and the amount of viewed advertisements and vehicle crime indicates that those variables follow an opposite pattern, for example when the amount of members or viewed advertisements increase, vehicle theft and cargo theft decrease. The amount of posted advertisements is significantly and positively correlated with vehicle theft and cargo theft. The significant correlations between the freight exchange variables and the vehicle crime variables are rather difficult to interpret and do not seem to lead to an unambiguous explanation. The following hypotheses might explain the results but the suggestions are made with great reluctance. 1. Transporters mostly contract familiar parties when these contracts do not lead to full drives it might be the case that demand for road transport is limited. When current contracts do not offer enough rides, the transporters might start using the freight exchange to find cargo. This indicates the amount of viewed advertisements and members increases. Less road transport means fewer chances for a criminal to steal the load (cargo theft) or to steal the vehicle (vehicle theft). The fact that the correlation is also significant in all the lagged variables of vehicle theft and cargo theft can be explained by the cyclical behaviour of the market. 26 2. When the amount of viewed advertisements on the freight exchange increases the share of criminals watching the advertisements is expected to decline. This means more correct contracts are closed and less freight exchange fraud is committed. Assuming that measurement errors are common regarding reporting of freight exchange fraud, this increase of viewed advertisements is also seen in a decrease of vehicle theft and cargo theft. 3. Following the same reasoning as we saw at hypothesis 1 we might be able to explain the positive correlation between posted advertisements and vehicle crime. When demand for transport is high, subcontractors for loads are sought because they are seen by transporters as a profit opportunity. By subcontracting a transporter is able to earn on a load that he does not drive himself. These subcontractors can be found via the freight exchange which leads to an increase in posted advertisements. When demand for transport is high we might observe an increase of full drives on the road, which is an enlarged chance for criminals to succeed. An increase in vehicle theft and cargo theft might be the result. 3.3.3 Summary and concluding remarks Summarizing the results of table 1 to 4 we see that: 1. Table 1 shows significant correlations between vehicle theft, cargo theft and combination theft; 2. Table 2 adds significant within-variable correlations for all vehicle crime variables for all three lags; 3. Table 3 reveals a different result than table 1 and 2 because combination theft does not show any significant relations anymore. The relation between vehicle theft and cargo theft did not change. The freight exchange variables are significantly correlated with cargo theft and vehicle theft; 4. Table 4 shows that cargo theft and vehicle theft still (see point 2) reveal within- and between-variable correlation, combination theft does not. The freight exchange variables are significantly correlated with all lags of cargo theft and vehicle theft. The within-variable correlations indicate that changes occur in a graduate way. Relating these results to practice strengthens this preliminary conclusion. Stealing can be seen as the 27 profession of a criminal, and changing behaviour and (criminal) habits will take time. Altering criminal behaviour can be done by complicating criminal behaviour as is done for example with the secured parking next to the highway.36 These policy measures take time to implement resulting in graduate changes and explaining partially the significant correlations with the lagged variables. The correlation tables presented in the paragraphs 3.2.1 and 3.2.2 gave us a first glimpse of the relations that do exist between and within the variables, furthermore the results enabled us to draw some preliminary conclusions. In the next paragraph a model will be presented which makes us able to substantiate the preliminary conclusions made in this chapter. 36 Increasing the amount of secured parkings is one of the agreements made in the Tweede Convenant Aanpak Criminaliteit Transportsector by the different parties concerned in the transport sector. 28 3.3 Model set up In this paragraph a vector auto regression model is used to obtain knowledge about the relationships that do exist between the used variables and between the variables and their lags. The outcome of this model will be able to substantiate the correlation analyses. Two models are presented, following the structure of the previous paragraphs. The first model uses the three different components of vehicle crime over the full length of time. The second model covers a shorter time period but includes the variables of the freight exchange. The vector auto regression (VAR) model differs from a normal regression in the way that it portrays the evolution of a set of dependent variables. This set consists of k variables which represent the variables implemented in the model.37 The development of all the variables is followed over the same period of time (t = 1, ..., T), which is in our sample the monthly data starting January 1996 and ending December 201138, and is portrayed as a linear function of only the variables’ own historic development. The historic development is defined by a certain amount of lags implemented in the model, referred to as p. The common used formula for a VAR model of the p-th39 order is: 𝒀𝑡 = 𝒄 + 𝑨1 𝒀𝑡−1 + 𝑨2 𝒀𝑡−2 + … + 𝑨𝑝 𝒀𝑡−𝑝 + 𝒆𝑡 In this formula c is the intercept, which is a k x 1 vector of constants indicating that c should be seen as a one-column matrix wherein each implemented variable (k) is represented. The vector Ai must be interpreted as a k x k matrix for every lag included in the model. The vector 𝑒𝑡 refers to the error term, which is, just like the intercept, a k x 1 vector of error terms. The VAR model requires the error terms to satisfy the following three conditions in order to be white noise process40: 1. E(𝑒𝑡 ) = 0; 2. E(𝑒𝑡 𝑒𝑡′ ) = Ω; ′ 3. E(𝑒𝑡 𝑒𝑡−𝑘 ) = 0. 37 For example in our first model k = 3 because we implement the three components of vehicle crime. The second model makes use of a shorter time frame namely January 2007 up and until December 2011. 39 In short this can be written as VAR(p). 40 A white noise process is a process without any observable structure. 38 29 These conditions indicate that (1) the error term must be unbiased, so have a mean of zero furthermore (2) the expected value of the error term matrix must for every 𝑡 be semi positive definite, so have a value of at least zero; and (3) serial correlation in the individual error terms is not allowed. The conditions must be obeyed to obtain reliable results. (Franses, 1998) The VAR model does not only have requirements for the error term but also for the implemented variables which have to be stationary otherwise results might be spurious. Stationarity indicates that the implemented variables are independent of time.41 Stationarity can be tested for, for example by the Dickey-Fuller test. If a variable is not stationary the variable has to be transformed in order to be able to be implemented in the model.42 (Adkins and Carter Hill, 2011) An important aspect of the VAR model is that it uses past observations (lags) to show relationships between the variables, and to show relationships within a specific variable thus the relation of the variable and its own past. To get a clear view of these relationships and to be able to draw the right conclusions, it is very important to obtain the right amount of lags. The optimum amount of lags is established when no more autocorrelation is found in the error terms. The Breusch-Godfrey test is used to test for autocorrelation in the error terms and can therefore be used to retrieve the amount of lags needed for our model. (Adkins and Carter Hill, 2011) The results of the VAR model will give a clear and non-spurious indication of the relations between the variables and the variables’ past, unlike the earlier presented correlation tables. The output of the VAR analysis will indicate which of the implemented variables have significant impact on the future values of each of the variables implemented in the model. When interpreting a VAR model it is however not possible to explain the sign and the size of the coefficient. Furthermore we cannot explain the duration of the effects from a VAR analysis. (Brooks, 2008) To obtain this knowledge we will perform an impulse response function after the VAR analysis. The impulse response function will be helpful to retrieve the responsiveness of the dependent variables in the model to shocks to each of the variables. (Brooks, 2008) We will 41 So differently stated stationarity implies that the unconditional mean, unconditional variance and autocorrelations of 𝒚𝑡 are constant over time. 42 The variable is than transformed to its first difference which means that a new variable is created which is the difference of two serial observations, this procedure should make the variable stationary. 30 execute an impulse response analysis after the VAR analysis and present the results after the VAR output (sub. 4.1 and 4.2). It should however be kept in mind that it is hard to interpret the results of the impulse response accurately. (Runkle, 1987) A difficulty with time series variables is that cointegration can be of influence on the output of the VAR analysis making the results spurious. Time series variables can often be non-stationary as individual variable but when variables move together over time, the variables are cointegrating. Cointegrating variables indicate that the time series variables are related in the long run caused by a certain influence on the time series. A cointegrating relationship may be seen as a long term equilibrium phenomenon, because in the short run the variables can differ from each other but in the long run their association becomes clear. (Brooks, 2008) When the variables are cointegrated, the VAR model is not sufficient and a vector error correction model (VEC model), based on the VAR model, is needed correct for the cointegration. (Adkins and Carter Hill, 2011) The VEC model differs from the VAR in the sense that is adds error correction features. More details on the VEC model will be provided in appendix C. The significance level (α) throughout the whole analysis is set at 5%. 3.3.1 Model I The first model makes use of the three components of vehicle crime namely vehicle, combination and cargo theft over the period January 1996 – December 2011. We base our hypotheses on the results generated by the correlation tables presented in paragraph 3.2.1 although those might be spurious. Based on the significantly positive correlations of the variables with their lags, each component of vehicle crime is expected to show a positive and significant relation with itself in the VAR and impulse response analysis. Vehicle theft and combination theft have shown a significant and positive correlation indicating they influence each other in a positive way. We expect to see this impact in the VAR analysis as well, so a positive and significant result for the relation between vehicle theft and combination theft, and the relation between combination theft and vehicle theft. 31 In the correlation analysis cargo theft has shown a significant negative correlation with combination theft. We expect to see this relation appear in the VAR and impulse response analysis as well. The impulse response function learns us more about the duration of the influence of an applied shock. We expect each significant relation to have an influence of at least six months because of the time it takes to change behaviour and adapt to newly implemented policy measures. Before constructing the model we have to deal with the requirement of stationary data. We can obtain an idea of the stationarity of the variables by looking at the visual representation of the different components of vehicle crime (figure 3). Recalling that stationarity implies that the means, variances and covariances of the different variables of the time series data cannot depend on the period of time in which they are observed. The variables seem stationary over time because we do not observe a specific pattern in the data. Vehicle crime 80 Number of reports 70 60 50 40 30 20 10 0 Vehicle theft Vehicle and Cargo theft Combination theft Cargo theft Figure 3 Three components of vehicle crime graphed from January 1996 – December 2011. Although we do not observe a specific pattern in figure 3 it does seem plausible that the vehicle crime variables are stationary because they have shown significant correlations – even at the 1% 32 significance level - with their lags and we furthermore we expect crime to be dependent on external circumstances occurring in time. The information visualized in figure 3 might therefore not be enough to be definite about the variables’ stationarity, therefore we test for stationarity by using a selection of tests including the augmented Dickey-Fuller test and Phillips-Perron test. We perform more than one test because of the possible erroneous output of the tests. A variety of different tests should diminish the chance of a spurious outcome. The results of the four tests on stationarity can be found in appendix D.1. The test results of the four performed tests reveal that the variables combination theft and vehicle theft are stationary in their level form. The outcomes of the stationarity tests for cargo theft are ambiguous, revealing stationary as well as non-stationary outputs. Cargo theft is stationary in all tests, when transformed to its first difference. The mixed results of the stationary tests for cargo theft leads us to the decision to perform the analysis twice, the first analysis will include the variables in their level form; the second analysis, found in appendix D.4, includes the variable cargo theft transformed to its first difference. The amount of lags43 we have to implement in our model is two, which results in the following formula for the first model: 𝑦𝑣𝑒,𝑡 [𝑦𝑐𝑜,𝑡 ] = 𝑦𝑐𝑎,𝑡 𝑎1𝑣𝑒,𝑣𝑒 𝑐𝑣𝑒 [𝑐𝑐𝑜 ] + [𝑎1𝑐𝑜,𝑣𝑒 𝑐𝑐𝑎 𝑎1𝑐𝑎,𝑣𝑒 𝑎1𝑣𝑒,𝑐𝑜 𝑎1𝑐𝑜,𝑐𝑜 𝑎1𝑐𝑎,𝑐𝑜 2 𝑎1𝑣𝑒,𝑐𝑜 𝑦𝑣𝑒,𝑡−1 𝑎𝑣𝑒,𝑣𝑒 2 𝑎1𝑐𝑜,𝑐𝑎 ] [𝑦𝑐𝑜,𝑡−1 ] + [𝑎𝑐𝑜,𝑣𝑒 𝑦 2 𝑐𝑎,𝑡−1 𝑎1𝑐𝑎,𝑐𝑎 𝑎𝑐𝑎,𝑣𝑒 2 𝑎𝑣𝑒,𝑐𝑜 2 𝑎𝑐𝑜,𝑐𝑜 2 𝑎𝑐𝑎,𝑐𝑜 2 𝑎𝑣𝑒,𝑐𝑜 𝑦𝑣𝑒,𝑡−2 2 𝑎𝑐𝑜,𝑐𝑎 ] [𝑦𝑐𝑜,𝑡−2 ] 𝑦𝑐𝑎,𝑡−2 2 𝑎𝑐𝑎,𝑐𝑎 𝑒𝑣𝑒,𝑡 + 𝒟𝐵𝑟𝑒𝑎𝑘 + [𝑒𝑐𝑜,𝑡 ] 𝑒𝑐𝑎,𝑡 This can be rewritten as: ̂ 1 𝒀𝑡−1 + 𝚽 ̂ 2 𝒀𝑡−2 + 𝒟𝐵𝑟𝑒𝑎𝑘 + 𝒆̂𝑡 ; 𝒀𝑡 = 𝒄̂ + 𝚽 where 𝑦𝑡 = (𝑣𝑒𝑡 , 𝑐𝑜𝑡, 𝑐𝑎𝑡 )’ in which 𝑣𝑒 stands for vehicle theft, 𝑐𝑜 for combination theft and 𝑐𝑎 for cargo theft. In the model a dummy (𝒟𝐵𝑟𝑒𝑎𝑘 ) is implemented to correct for the new measurement method which is implemented at the KLPD in 2010. 43 The results of the Breusch-Godfrey test can be found in Appendix D.2. 33 3.3.2 Model II The second model makes use of six variables gathered over a regular monthly time interval starting January 2007 and ending December 2011. The variables which will be implemented in the model are cargo theft, vehicle theft and combination theft and, as exogenous variables, the three variables offered to us by the freight exchange namely the amount of members, the amount of viewed advertisements, and the amount of posted advertisements. By adding the variables of the freight exchange as exogenous variables we want to learn more about the influence of the freight exchange on vehicle crime and hope to be able to tell something about freight exchange fraud. We have generated hypotheses based upon the results of our correlation analysis (sub 3.3.2) although we are aware of the fact that those might be spurious. Based on the significantly positive correlations between of the variables cargo theft and vehicle theft with their lags variables (table 4) we expect that vehicle theft and cargo theft show a positive and significant relation with itself in the VAR and thereto belonging impulse response analysis. We expect a positive significant relation between posted advertisements and cargo theft and between posted advertisements and vehicle theft because of the significant correlations (tables 3 and 4). We expect a negative significant relation between viewed advertisements and cargo theft and between viewed advertisements and vehicle theft. Furthermore we expect a negative significant relation between members and vehicle theft and between members and cargo theft. The impulse response function informs us about the duration of the influence of an applied shock. We expect each significant relation to have an influence of at least six months because of the time it takes to change behaviour and adapt to newly implemented policy measures. Before constructing the model we have to cope with the stationarity requirement which is also applicable for exogenous variables. The vehicle crime variables are already tested on stationarity (sub 3.3.1, appendix D.1). The stationarity tests of the freight exchange variables will be performed in the same way as we did with the vehicle crime variables.44 The four tests for stationarity can be found in appendix E.1. The tests reveal that the variables of the freight 44 Due to a confidentiality agreement we are not able to show the variables graphed in a figure. 34 exchange are non-stationary in their level form but are stationary in their first differences. This might be an indication for cointegrating relationships amongst those variables. Because there are more than two variables, more than one linear relationship between the variables could exist. The Johansen test for cointegration is able to reveal more than one cointegrating relationship, if present. (Brooks, 2008) A requirement for the cointegration test is that variables can only be implemented in the test if they are non-stationary in their level form but are in first difference. The variables meet this requirement and we are able to conduct a cointegration test. The H0 of the Johansen test of at most one cointegrating vector is rejected.45 Therefore an error correction for two cointegrating vectors should be implemented in the VEC model. When implementing one lag, the VEC model will look like this in formula form: 𝚫𝟏 𝒀𝑡 = 𝒄 + 𝚪1 𝚫𝟏 𝒀𝑡−1 + 𝒟𝐵𝑟𝑒𝑎𝑘 + 𝑝𝑎𝑡 + 𝑣𝑎𝑡 + 𝑚𝑡 + 𝚷𝒀𝑡−𝑝 + 𝒆𝑡 where 𝑦𝑡 = (𝑣𝑒𝑡 , 𝑐𝑎𝑡 , 𝑐𝑜, )’ in which 𝑣𝑒 stands for vehicle theft, 𝑐𝑎 for cargo theft, 𝑐𝑜 for combination theft. The variables of the freight exchange are added as exogenous variables in which posted advertisements is denoted as 𝑝𝑎𝑡 , viewed advertisements as 𝑣𝑎𝑡 and members is represented by 𝑚𝑡 . Just like in model I a dummy (𝒟𝐵𝑟𝑒𝑎𝑘 ) is implemented to correct for the data break in 2010. Unfortunately we are not able to perform this VEC model since the statistical program Eviews (version 7.0) cannot correct for cointegrating relations in implemented exogenous variables.46 Therefore we have decided to perform a VAR model with the three freight exchange variables added as exogenous variables in their first difference.47 We are aware that usage of the VAR model instead of the VEC model might influence our results, therefore we will be reluctant when interpreting the results and we might be able to draw some preliminary conclusions. We will execute the VAR analysis twice, following the working method of paragraph 3.3.1, the first VAR model will implement cargo theft in its level form, the second VAR model with cargo theft in its first difference. The Breusch Godfrey test indicates for our first model that we have 45 Results of the Johansen cointegration test can be found in appendix E.3. For more information see the technical support helpdesk of the statistical computerprogram Eviews: http://forums.eviews.com/viewtopic.php?f=4&t=5340. 47 The VAR model requires implemented variables to be stationary. The variables of the freight exchange are implemented in their first difference because they are only stationary in their first difference. 46 35 to implement zero lags.48 Implementing zero lags is inconsistent with the main idea behind the VAR analysis. Recall that VAR stands for vector autoregression, which is a statistical method that makes use of multiple time series variables with the aim to explain the development of the variables by looking at the lags of the variable itself and the lags of the other variables implemented in the model.49 Lagged variables are an essential part of the VAR analysis and therefore we cannot perform a VAR without lagged variables. For the model which implements cargo theft in its first difference the Breusch Godfrey test indicates that we need to implement one lag in the VAR model which leads to the following formula: ̂ 1 𝒀𝑡−1 + 𝒟𝐵𝑟𝑒𝑎𝑘 + 𝑑𝑝𝑎𝑡 + 𝑑𝑣𝑎𝑡 + 𝑑𝑚𝑡 + 𝒆̂𝑡 ; 𝒀𝑡 = 𝒄̂ + 𝚽 In this formula a dummy (𝒟𝐵𝑟𝑒𝑎𝑘 ) is implemented to correct for the new measurement method which is implemented at the KLPD in 2010. The three freight exchange variables are denoted as 𝑑𝑝𝑎𝑡 for the first difference of posted advertisements; 𝑑𝑣𝑎𝑡 for the first difference of viewed advertisements, and 𝑑𝑚𝑡 for the first difference of members. In the VAR(1) 𝑦𝑡 = (𝑣𝑒𝑡 , 𝑐𝑜𝑡, 𝑑𝑐𝑎𝑡 ) in which 𝑣𝑒 stands for vehicle theft, 𝑐𝑜 for combination theft and 𝑑𝑐𝑎 for the first difference of cargo theft. 48 The VAR model which is tested for by the Breusch Godfrey test does include the vehicle crime variables in their level form. The results for the lag selection test can be found in appendix E.2. 49 Autoregression can be divided in the word ‘auto’ which means self, and ‘regression’ which means return to an earlier stage. This translation indicates the importance of lagged variables in the VAR analysis. 36 Chapter 4: Results and analysis In this chapter we will discuss the results of the VAR analysis of model I and II, as presented in the previous chapter (sub 3.3.1 and 3.3.1). This chapter is divided into three paragraphs; the first two paragraphs will present the results of the VAR analysis of model I and II respectively. The results of the VAR are followed by the outcome of the associated impulse response functions to show the effect of structural shocks on the dependent variables in our model. The last paragraph will present a descriptive analysis of the freight exchange fraud data. 4.1 Model I50 The results of the VAR(2) analysis of model 1 can be found in table 5. Table 5 VAR(2) analysis model I Vector Auto Regression (2 lags) Observations: 190 Variable Vehicle L1 Vehicle theft Cargo theft Combination theft 0.233 * - 0.116 0.104 * 0.078 2.998 0.108 - 1.073 0.048 2.169 0.183 * - 0.205 0.138 * 0.082 2.240 0.113 - 1.816 0.050 2.753 Cargo L1 - 0.018 0.295 * - 0.038 Standard error t-statistic 0.052 - 0.349 0.072 4.074 0.032 - 1.166 Cargo L2 0.006 0.336 * - 0.049 Standard error t-statistic 0.053 0.109 0.074 4.564 0.033 - 1.486 Combination L1 0.176 0.171 0.233 * Standard error t-statistic 0.126 1.399 0.174 0.985 0.077 3.010 Combination L2 0.162 - 0.003 0.090 Standard error t-statistic 0.122 1.327 0.169 - 0.016 0.075 1.200 Standard error t-statistic Vehicle L2 Standard error t-statistic Constant 8.861 * 10.509 * 3.937 * Standard error t-statistic 2.054 4.315 2.840 3.700 1.265 3.112 Dumbreak 4.207 21.145 * 0.826 Standard error t-statistic 2.934 1.434 4.058 5.211 1.807 0.457 * signficant on a 95% level 50 Results of the VAR model including cargo theft in its first difference are comparable to the results presented in this paragraph. Results of model I including cargo theft in its first difference can be found in appendix D.4. 37 8 8 4 4 Response to Cholesky One S.D. Innovations ± 2 S.E. The VAR(2) output is complemented by the thereto0belonging impulse response analysis.51 We 0 Response of CARGO to VEHICLE Response of CARGO to COMBINATION are able to explain significant relations, signs and effects of the different variables when 12 22 12 -4 combining 2 4 6 both 8 10outputs. 12 14 24 16 18 20 22 2 8 4 6 8 10 12 14 16 18 20 22 24 8 O Response of VEHICLE to VEHICLE 4 -4 24 Response of VEHICLE to COMBINATION The VAR analysis shows a significant result of 8 4 8 vehicle theft and its two lags. The impulse 0 6 6 0 response function shows us that, considering the 4 sign of4 the response to the applied shock, vehicle -4 24 -4 2 2 4 6 8 10 12 14 16 18 20 22 0 Response of VEHICLE to VEHICLE 24 4 8 10 12 14 16 18 20 22 24 always22 has a 6positive impact on itself since the impulse response is positive. The effect of a 0 Response of VEHICLE to COMBINATION 8 shock dies down after about seven months. 8 -2 22 24 RGO -2 2 6 10 12 14 16 18 20 22 24 8 10 12 14 16 18 20 22 24 6 4 2 4dies down which indicates that our model is 0 about seven months. (figure 5) After that, the shock stable. The impact of the variable cargo theft on -2itself is positive as we can observe in the graph. 2 4 6 8 10 12 14 16 18 20 22 2 2 24 4 6 8 10 12 14 16 18 20 22 24 Response to Cholesky One S.D. Innovations ± 2 S.E. 0 Response of COMBINATION to COMBINATION Response of CARGO to VEHICLE 12 Re 12 6 -2 12 -2 24 4 2 8 2 0 4 6 8 10 12 14 16 18 20 22 24 2 4 6 8 10 12 14 16 18 20 22 24 4 8 8 4 2 4 4 0 0 0 0 -4 -2 24 6 function adds to this observation that a shock 2applied to cargo theft will be of influence for 6 22 4 Response of COMBINATION to COMBINATION 4 0 Response of Response COMBINATION to VEHICLE of CARGO to CARGO O 2 6 Response of COMBINATION to VEHICLE 6 -2 8 The VAR analysis gives significant results for cargo theft and its two lags. The impulse response 2 24 6 Figure 4 Impulse response function VAR(2) model I 4 0 4 2 4 -4 -2 62 84 6 10 8 12 10 16 12 18 14 20 16 22 18 14 20 24 22 24 Response of VEHICLE to CARGO Figure 5 Impulse response function VAR(2) model I 2 -4 4 26 48 610 812 10 14 12 16 1418 1620 1822 2024 22 24 2 Response of VEHICLE to VEHICLE Figure 6 Impulse response function VAR(2) model I 8 Re 8 8 The VAR analysis revealed a significant result for combination theft and its first lag. A shock 6 6 6 4 4 2 2 applied to the variable combination theft results in a positive effect which has a duration of 4 about 3 months after which the shock dies down. 2 51 The full impulse response function of model I can be found in Appendix D.3, in the main text only the 0 0 impulse responses of the significant relations are shown. 38 -2 0 -2 2 4 6 8 10 12 14 16 18 20 22 24 Response of COMBINATION to CARGO -2 2 4 6 8 10 12 14 16 18 20 22 24 Response of COMBINATION to VEHICLE 2 Respo -4 6 8 10 12 14 16 18 20 22 24 -4 2 esponse of VEHICLE to CARGO 4 6 8 10 12 14 16 18 20 22 24 2 Response of VEHICLE to VEHICLE 4 6 8 10 12 14 16 18 2 Response of VEHICLE to COMBIN 8 8 6 6 The relation between combination theft and vehicle theft is the only relation between the 4 vehicle crime variables that is significant in the VAR analysis. When looking at4the VAR output 2 between combination theft and the first and second 2 lag of vehicle we see a significant result theft. The impulse response analysis adds that the response of combination 0theft to vehicle 0 theft is positive for the first seven months and does than die out. This indicates -2that the result of -2 6 8 10 12 14 16 18 20 22 24 2 4 6 8 10 12 14 16 18 20 22 24 ponse of COMBINATION to CARGO Response of COMBINATION to VEHICLE 8 10 12 14 16 18 20 22 6 4 4 2 2 0 0 24 4 6 8 10 12 14 16 18 2 Response of COMBINATION to COM 6 -2 6 2 combination theft is partially dependent on the development of vehicle theft. -2 2 4 6 8 10 12 14 16 18 20 22 24 2 4 6 8 Figure 7 Impulse response function VAR(2) model I Relating the output of the VAR analysis and impulse response analysis to our hypotheses (sub 3.3.1) we can conclude that most of our hypotheses are confirmed. Each component of vehicle crime does show a significant and positive relation with its own lagged variables. This strengthens our idea of the same actors being active in a certain component or that circumstances do not change. Combination theft is only significantly related to its first lag, indicating a lesser dependence on past results than vehicle theft and cargo theft show. This might be because of the fact that combination theft is a difficult category to report. More than one party may be concerned with the theft. Furthermore could this result be an indication that a variety of parties is active in the combination theft component, making the result less dependent on each other. The correlation analysis showed a significant positive correlation between vehicle theft and combination theft which resulted in a similar hypothesis. This hypothesis is confirmed; the output of the VAR analysis shows that combination theft is significantly related to the two lags of vehicle theft. The impulse response function shows that the impact of vehicle crime on combination theft is positive and that a shock applied to vehicle theft will be visible for around 39 10 12 14 16 18 2 seven months in combination theft. Furthermore this result adds to the correlation analysis that combination theft is dependent on vehicle crime but vehicle crime is not dependent on combination theft. This result might indicate that the criminals active in vehicle theft are able to switch to combination theft. An incident in vehicle theft will than result in an effect in combination theft. This idea is strengthens when we look at the impulse response functions. We expected the duration of shocks to be 6 months based on the time it takes to adapt to new policy measures. This hypothesis is confirmed for vehicle theft, cargo theft and combination to vehicle theft. Each of these impulse response functions show us a timeframe of the shock to work out of the system of about seven months. Combination theft shows a timeframe of about two months indicating that combination thefts adapt quicker than the other vehicle crime components. This result might be an indication that combination theft might be performed by different parties for example by vehicle theft criminals. When the environment is advantageous a vehicle criminal might take the cargo as well. Severing the circumstances might than lead to a shift making it plausible that combination theft adapts quicker to shocks. We expected to see a significant relation between cargo theft and combination theft but the VAR output does not show any significant output between cargo theft and combination theft. Relating these results to the correlation analysis (3.2.1, tables 1 and 2) we see that: 1. All within-variable correlation is supported by the VAR analysis; 2. Between-variable correlation was significant for all vehicle crime components. The VAR only reveals a significant relation between vehicle theft and combination theft but adds a causality to it. 40 4.2 Model II The results of the VAR(1) of model 2 can be found in table 6. Table 6 VAR(1) analysis model II Vector Auto Regression (1 lags) Observations: Variable Vehicle theft D.Cargo theft Combination theft Vehicle L1 - 0.181 - 0.253 - 0.040 Standard error t-statistic 0.147 - 1.231 0.346 - 0.732 0.085 - 0.471 Cargo L1 - 0.008 - 0.522 * - 0.043 Standard error t-statistic 0.056 - 0.148 0.133 - 3.923 0.033 -1.323 Combination L1 0.085 0.459 0.260 Standard error t-statistic 0.241 0.353 0.569 0.806 0.140 1.858 22.048 * 0.946 7.261 * 3.557 6.199 8.391 0.113 2.062 3.521 7.949 * 3.614 - 0.003 2.079 3.823 4.905 0.737 1.206 - 0.002 2.38E-05 1.21E-04 1.17E-05 3.9E-05 0.607 9.2E-05 1.310 2.3E-05 0.517 Constant Standard error t-statistic Dumbreak Standard error t-statistic D.Posted advertisements Standard error t-statistic D.Viewed advertisements 6.16E-06 2.01E-05 -1.35E-06 Standard error t-statistic 1.0E-05 0.601 2.4E-05 0.830 5.9E-06 -0.228 D.Members -0.045 0.087 - 0.024 Standard error t-statistic 0.075 - 0.597 0.177 0.488 0.044 - 0.540 * signficant on a 95% level Most of the hypotheses formulated in sub 3.3.2 cannot be confirmed because the output of the VAR analysis of model II contains only one signficant result. The first difference of cargo theft is significantly related to its first lag. The transformation of the variable has effect on the impulse response analysis which shows us a positive as well as negative influence. Such a graph is hard to interpret correctly (Runkle, 1987). We can derive from the graph however that the impulse response function is stable since the shock works it way out of the system and dies down after five months. Another conclusion we can draw is that the variable cargo theft does have a significant impact on itself. 41 Response to Cholesky One S.D. Innova Response of DIF_CARGO to DIF_CARGO Response of DIF_CARGO to VEH 20 20 10 10 0 0 -10 -10 -20 -20 2 4 6 8 10 12 14 16 18 20 2 Response VEHICLE to DIF_CARGO Figure 8 Impulseof response function VAR(1) model II 8 4 6 8 10 12 14 16 Response of VEHICLE to VEHI 8 We build this model because we wanted to know more about the relation between the freight 6 6 exchange and vehicle crime but we cannot confirm or reject our hypotheses because the VAR 4 4 output does not show any significant results between freight exchange variables and vehicle 2 2 crime variables. 0 0 -2 -2 -4 -4 It might be that because of the small sample (60 12 observations) significant results are limited. 2 4 6 8 10 14 16 18 20 2 4 6 8 10 12 14 16 Also the fact that we were not able to implement the cointegrating relationship in the Response of COMBINATION to DIF_CARGO exogenous variables might be of influence on the results. 6 Response of COMBINATION to VE 6 4 4 Relating the result of this VAR analysis to our correlation analyses and VAR model I we can see 2 2 that only the within-variable correlation of cargo theft is able to endure all tests while all other significant effects dissapeared 0 4.3 Freight exchange-2 fraud –4 descriptive 2 6 8 10 0 -2 12 14 16 18 20 2 4 6 The phenomenon of freight exchange fraud is known since 2008 but because of the small amount of yearly reports a thorough statistical analysis is not possible, this paragraph will therefore give a description of the available data of freight exchange fraud. Tables containing all information can be found in appendix F. All reports are from the Netherlands and made available by the KLPD. In 2008 freight exchange fraud is reported eight times. In the majority of the reports, seven cases, the missing cargo concerned electronics. All frauds were committed in the spring and the winter in the midst week and halve of the crimes were reported in Limburg. The preliminary conclusion might be drawn with great reluctance that the south of Netherlands is at greater risk. 42 8 10 12 14 16 This conclusion seems plausible while the borders of the Netherlands are found there so that thefts can be moved out of the country very easily making retrieving more difficult due inadequate jurisdiction. In 2009 only three reports of freight exchange fraud are made in the Netherlands. Noticeable is that two of the three reports concern a transport towards the Netherlands while in 2008 all reports concerned a trip from the Netherlands. The type of cargo is also different than in 2008, now alcoholic beverages and food supplies are missing. All reports are from the spring and summer months. Although the goods stolen are less valuable they are still easily transferable and therefore probably of great value for the criminals. Furthermore high value loads are often better secured than food supplies making the latter easier to steal. In 2010 the amount of reports came up to the level of 2008 with a total of thirteen reports. With reluctance we conclude that we observe a spread in region, month and day of committing of the crime and type of targeted cargo; still we might observe a slide preference for the end of week (Wednesday – Friday) and March as a popular month. The missing cargo varies from electronics, alcoholic beverages, food supplies and car components amongst others. The idea rises that the type of good seems to be not the main consideration when preparing a crime. In 2011 the increase in reports continues and reaches the amount of seventeen. In 2011 it is difficult to point out the most popular crime committing month as the spread seems quit even. The days of the week do not show a clear trend, but the end of the week (Wednesday – Thursday) still seems most attractive for committing a crime. Noticeable is though that in 2011 crimes are also committed on weekend days, while that was not the case in the months before. Most of the missing cargo concerns food supplies. A graphed representation, allocated in percentages, of the committed crimes subdivided in months, days and region respectively can be found in figures 9 - 11. 43 Percentage 70% 60% 50% 40% 30% 20% 10% 0% 2008 2009 2010 2011 Month Percentage Figure 9 Freight exchange fraud montly percentage allocation 70% 60% 50% 40% 30% 20% 10% 0% 2008 2009 2010 2011 Day Figure 10 Freight exchange fraud daily percentage allocation 60% 40% 30% Unknown Noord-Holland Zuid-Holland Zeeland Limburg Brabant Utrecht Flevoland 2010 Gelderland 2009 0% Overijsel 10% Drenthe 2008 Friesland 20% Groningen Amount 50% Region Figure 11 Freight exchange fraud percentage allocation per region 44 2011 Although it is difficult to say something about trends in such a small dataset our preliminary conclusion regarding the region (figure 14) is that the southern provinces of the Netherlands are most often hit by freight exchange fraud. A possible explanation for this might be that those provinces are close to the border (Belgium, Germany). Although the European Union aims at European unity and collaboration police forces of different countries do not cooperate very easily. So when stolen goods cross the border it is far more difficult to instantly act upon and trace the goods. The highways in the southern regions (A2, A67, and A73) are important trade routes indicating that a lot of cargo passes those regions increasing the chance of vehicle crime incidents. Furthermore do the graphs seem to show a slight preference for March as a popular month and Wednesday as a day of interest for freight exchange fraud. It is interesting to see (Appendix F) that there seems no explicit interest in a typical type of cargo. The stolen goods vary from expensive goods like electronics and copper to alcoholic beverages and food supplies. The stolen goods do have in common that they are all easily transferable. The spread of goods stolen did appear later on. In 2008 only electronics were stolen en in 2009 just food and alcoholic beverages (Appendix F.1 and F.2). Reason to change the targeted goods might be due to the fact that national transport companies do know each other quite well and that a new type of crime which seems to focus on electronics is spread fast by the word of mouth. Maybe the reaction of transport companies was by adding additional security on electronics drives which made the electronics market more difficult to target which lead to a switch. The rise of freight exchange fraud did change vehicle crime by adding a new dimension to it, the internet. Although the observations made in this chapter cannot add statistical significant conclusions to our research they do add a first insight in the fourth component of vehicle crime. 45 Chapter 5: Conclusion and recommendations This chapter will present in the first paragraph the conclusions of the research, followed by policy recommendations and will conclude with limitations and areas for further research. 5.1 Conclusions This thesis began with the aim to start academic research into freight exchange fraud and enhance understanding of vehicle crime in the Netherlands, in order to answer the main research question: Is freight exchange fraud an addition to vehicle crime? We will come to our conclusion by looking back on the obtained knowledge in each of the previous chapters. Liberalisation of EU freight transport lead to the opportunity for the freight exchange to enhance efficiency but also came along with a new form of crime, freight exchange fraud. The freight exchange and freight exchange fraud were examined based on conversations with experts and inspection of police reports. This research resulted in the following definition of freight exchange fraud: Freight exchange fraud is the deliberate misuse of the freight exchange with the aim to steal cargo to fund other activities of the criminal organization. According to our definition, the target of freight exchange fraud is cargo. Based on the definition, freight exchange fraud does not seem an addition to vehicle crime but an innovation in vehicle crime. Cargo criminals seem to have enlarged their scope by involving the freight exchange as addition source of knowledge. The different working methods of freight exchange fraud – false document companies, company take-overs and infiltrators – seem to be complex, but lucrative, ways to prepare cargo thefts. We have performed a variety of correlation analyses. The first two analyses revealed that the components of vehicle crime – cargo theft, vehicle theft and combination theft – significantly depend on each other. In addition to significant between-variable correlation, also significant, at 46 the 1% significance level, within-variable correlation with all three lags is found for each of the vehicle crime variables. The significant within-variable correlation seems to suggest that actors are the same within a specific component of vehicle crime or that the circumstances did not change and that the criminals keep on performing a certain crime. The significant between-variable correlation might on the one hand plea for the same actors and on the other hand for different actors. From this result we might be able to conclude, although with great reluctance, that when actors are different, freight exchange fraud is expected to be an addition to vehicle crime. When the actors are the same, this would indicate that freight exchange fraud is perceived as an innovation to vehicle crime. We also included some variables from the freight exchange in our correlation analysis (sub. 3.2.2 tables 3 and 4) and cargo theft and vehicle theft showed significant correlations with all three variables of the freight exchange. The freight exchange and vehicle crime are related, a result which could indicate that freight exchange fraud is an innovation in vehicle crime rather than an addition to it. Interpreting correlation results of time series variables has to be done with great reluctance. Therefore we performed a vector autoregression with an impulse response analysis for model I and model II in chapter four. The vector autoregression and impulse response analysis showed that all three vehicle components generated positive significant results with their lagged variables, in accordance with the results of the correlation analysis. Between the variables only combination theft and vehicle theft showed a significant relationship. The second model only revealed a significant within-variable relationship of cargo theft. Relating the results of the VAR analyses to our main research question we know that withinvariable relations are significant which is an indication for the same group of criminals being active in a certain crime component and for circumstances to be unchanged. The relation between combination theft and vehicle theft seems to suggest that combinations are stolen when the circumstances make it possible. Combination theft does therefore seem to consist of 47 experts in vehicle theft and perhaps also out of cargo theft experts.52 Based on these results we cannot conclude that there is, or is not, an additional party active in vehicle crime In the last paragraph of chapter four freight exchange fraud is described based on the Dutch police reports. It is interesting to see that a wide variety of cargo is stolen from food supplies to used tires but that vehicle theft or combination theft is not mentioned. The descriptions of paragraph 4.3 could indicate that freight exchange fraud is an innovation of cargo theft. The cargo criminals make use of modern techniques to trace down valuable cargo and by using different fraud-techniques they are able to steal numerous goods in a short period of time. This research did not reveal an unambiguous answer to our main research question. Although some results seem to indicate that freight exchange fraud is no addition to vehicle crime but an extension of the vehicle crime component cargo theft. By trying to answer this research question we did succeed in enhancing the knowledge of vehicle crime. This thesis pioneered in defining and describing freight exchange fraud. By analyzing how the freight exchange could evolve and how it works we were able to retrieve the origin of freight exchange fraud which helps the understanding of vehicle crime. The obtained knowledge is not only applicable on national but also on international road transport due to the international character of crime. 5.2 Policy recommendations Vehicle crime and freight exchange fraud unfortunately became a familiar aspect of the current transport market, which is not only recognized by the (inter)national police, but also by trade organizations and policy makers. Based on the results of the analyses and conversations we composed some policy recommendations. The significant results generated by VAR analysis and impulse response function enhanced our knowledge about vehicle crime. The analysis shows that it is very important to monitor the different types of crime and collect data. The data regarding vehicle crime should be as complete as possible and constantly kept up to date. It is therefore recommended that the different (inter)national police forces work together and share information. Difficulties for the police are however found in legislation which hardens the cooperation opportunities between different (inter)national parties. Rules for privacy protection prevent the ability to share 52 See appendix D.4 for the VAR analysis of model I including cargo theft in its first difference. 48 knowledge and also international cooperation requires formal procedures which take a long time and complicated police actions. We therefore recommend policymakers to reconsider current legislation. At the moment different police forces in the Netherlands are actively dealing with crime, since it is possible to report crime at every police station. The reports and thereto belonging information concerning vehicle crime are collected and processed at one central point, at the Landelijk Team Transport (LTT) of the KLPD. In other European countries the police force is not as strictly organized as in the Netherlands, leading to splintered parts of information across different parties. The international police force, Europol, has the ability to generate a European coordinated action against criminal organizations but will only start an investigation if there is evidence for criminal organizations which are active in different European member states. It therefore seems recommendable for national governments to revise their police systems and add expertise clusters in order to decline information asymmetry across different parties. Not only keeping track of the knowledge on criminal behaviour is important but also accurate sharing and acting upon the collected knowledge is of great importance. Transport companies can be protected when all related parties are transparent and communicate on a regular basis. The professional trade organizations look after the concerns of transporters, they can be influential and are able to address a substantial part of road transport companies. When such an influential party receives up to date information about a vehicle crime threat, it can quickly act upon it by immediately warning its members. We recommend policymakers to look at opportunities to enable such an instant warning system. We advise the different parties involved in such a warning system to invest in relations and transparency. There are difficult procedures of the legal transfer of risks and ownership and a wide amount of (inter)national legislation applicable on the transport sector. These factors, together with the real risks a transporter experiences on the road, create the need for insurance. Insurers fulfil an important role in the transport sector since they take over parts of the risk of the transporter against the payment of a premium. However, the complex laws regarding road transport make it difficult for transporters to retrieve loss compensation when their load is stolen. This is reinforced by the contrary interests of the insurer and the insured. Jaap Stalenburg, employee at TVM Insurance Company argues that transport companies are too easily captured by criminals. 49 According to Stalenburg transport companies need to think before they act.53 He praises the freight exchange for their safety measures. The private Belgium detective Wim DeKeyser does not completely agree. He mentions that freight exchanges promote themselves with their excellent security checks and safety measures which lead to the wrongful thought among members that the customers of the freight exchange are all screened and watched, and therefore trustworthy.54 The expression of both opinions makes clear that transparency is needed. Based upon the previous paragraph we recommend freight exchanges to be clear towards their members; not only about what they screen but also what they screen for. An investigation in how current information is perceived at the members of the freight exchange might help in enhancing transparency, because it can reveal where the members’ assumptions do not stroke with the freight exchanges’ meaning. Members of the freight exchange might have too much confidence in the safety checks. Although freight exchange fraud is only a very small percentage of all deals closed via the freight exchange the freight exchange might be able to diminish this number any further. In paragraph 2.2 the procedure of closing deals on the freight exchange is explained, after placing the advertisement, the contact is made outside the freight exchange. By obliging members to make the first contact via the website of the freight exchange, an extra first safety check is implemented and the transporter knows that he is doing business with a real freight exchange member. This could be done by only releasing the contact details after the first contact. The freight exchange retrieves more information about their members and to what extent they use the freight exchange and website. Transporters gain as well, because by following this working method they are at least sure the company is a member of the freight exchange. Transporters are advised to stay critical and alert when closing a contract, with or without interference of the freight exchange. When transporters notice that a potential business partner only works with a free mail address or is only reachable by mobile phone a transporter should be alerted and do some additional checks. The warnings provided by experts55 such as police, 53 Met gezond verstand de digitale vrachtbeurs op, p. 10. Work cited (note 42), p. 11. 55 Warnings can for example be found in industry-specific magazines such as the Belgian magazine Private Veiligheid •Sécurité Privée (nr 50, 2011) in which the Belgium private investigator Wim DeKeyser raises 54 50 freight exchange and professional trade unions to transport companies should alert transporters and make them more aware of the dangers, on order for them to be better prepared. 5.3 Recommendations for further research The results of our analysis enhanced our knowledge about vehicle crime. We researched freight exchange fraud, but based our conclusions on information about cargo theft, vehicle theft and combination theft. We would recommend repeating this research in the future when there is more data available on freight exchange fraud to verify the conclusions made in this research. One of the mayor limitations of this research is that the data used for the statistical analysis solely makes use of Dutch police reports concerning vehicle crime. Liberalisation of the EU and the rise of the internet enhanced the possibility for transport to cross national borders. As a consequence vehicle crime became more international as well. Although we are aware of the international aspect of crime it is left unaccounted in current research. We therefore recommend including European vehicle crime reports when repeating this research. Model II (sub 4.2) resulted in only one significant result. This could be due to the fact that the analysis could not be performed as it should be. When statistical programs allow us to perform the test we aimed at the results might be different. Furthermore it could be that the lack of results is due to the amount of available data. The model included data from the freight exchange starting January 2007 up till December 2011 on a monthly base, which is only 60 observations per variable. Making use of a larger timeframe might enhance the results. This thesis tried to investigate the upcoming phenomenon of freight exchange fraud. Different parties56 active in the field of vehicle crime agreed on the fact that freight exchange fraud is a rising problem but we were not able to support or reject the idea of growth of freight exchange fraud with a statistical significant analysis. The limited availability of data on the freight exchange fraud complicated a thorough analysis of freight exchange fraud. We recommend investigating freight exchange fraud in a few years when more data is available. Cooperation with other countries in data collection is expected to speed up the possibility to investigate freight exchange fraud. awareness for freight exchange fraud; or in the Transport en Logistiek, the magazine of industry association Transport Logistiek Nederland, warns Hélène Minderman thransporters for vehicle crime. 56 Including the KLPD, Bovenregionale recherche Zuid-Nederland and DeKeyser B.V.B.A. amongst others. 51 This thesis followed an economic approach; nevertheless other disciplines did gain some attention as well. For a more complete view on vehicle crime and in particular freight exchange fraud, we advise to study this subject again from a different point of view. Behavioural studies might fathom the criminal mind and could help identifying the method of work of criminals. A legal approach might help comprehend the complex liability questions which often rise in criminal incidents. Furthermore questions concerning contracts can be addressed when performing a legal study. Policy recommendations can supply recommendations for legislative change. Forecasts might be helpful for crime prevention, thus also constructing forecasts might be of interest. We believe a multidisciplinary analysis will contribute to a better understanding of freight exchange fraud. 52 List of references Adkins, L.C. and Carter Hill, R. (2011), Using Stata For Principles of Econometrics, John Wiley & Sons, Inc. Amtenbrink, F. and Vedder, H.H.B. (2010), Recht van de Europese Unie, 4th edition, Boom Juridische uitgevers. Brooks, C. (2008), Introductory Econometrics for Finance, 2nd edition, Cambridge University Press. Dekeyser, W. (2011) Nieuw fenomeen bij ladingsdiefstallen, Private Veiligheid •Sécurité Privée, September, 50, p. 30 – 33. European Commission (2011), EU Transport in Figures: Statistical Pocketbook 2011, Luxembourg. Franses, Ph. H. (1998), Time series models for business and economic forecasting, Cambridge University Press. Haak, K.F. and Zwitser, R. (2010), Van Haven en Handel. Hoofdzaken van het handelsverkeersrecht, 2nd edition, Kluwer. Karis, B. and Dinwoodie, J. (2005), Impact of the road transport directive: a survey of road hauliers in the Netherlands, Transport Policy, 12, p. 79-88. KLPD, BVOM and VvV (2007), Convenant Informatie en Registratie Ladingdiefstal, January. Kuppens, J., de Vries Robbé, E., van Leiden, I., and Ferwerda, H. (2006), Zware jongens op de weg. Een onderzoek naar georganiseerde diefstal in de wegtransportsector, Advies- en Onderzoekgroep Beke, June, Arnhem. Minderman, H. (2011), Pas op uw lading!, Transport & Logistiek, 19e jaargang, nr. 50, October 6, p. 32 – 33. Ministerie van Economische Zaken (2004), Convenant Aanpak Criminaliteit Wegtransportsector, October, The Hague. Ministerie van Economische Zaken (2009), Tweede Convenant Aanpak Criminaliteit Transportsector, December, nr. 09OI56, The Hague. Engel, A.W. van den and Prummel, E. (2007), Organised Theft of Commercial Vehicles and Their Loads in the European Union, May, European Parliament, Brussels. Runkle, D.E. (1987), Vector Autoregressions and Reality, Journal of Business and Economic Statistics, 5(4), 437-442. 53 Theft Report (2009), Applying the Brakes to Road Cargo Crime in Europe, The Hague. Unknown (2012), Met gezond verstand de digitale vrachtbeurs op, Nieuwsblad Transport, nr. 3, January 20. Legislation Treaty establishing the European Coal and Steel Community (1951) Convention on the Contract for the International Carriage of Goods by Road (1956) Treaty establishing the European Economic Community (1957) Treaty on European Union (1992) Treaty of Lisbon (2007) Websites www.europa.eu www.eviews.com www.logistiek.nl www.rijksoverheid.nl www.teleroute.nl www.timocom.de www.tln.nl www.ttm.nl 54 Appendix A. Legal Framework57 Road transport is most often an international business as goods are carried from one country to another. During international road transport national laws can be valid but usually the (CMR) is preferred. When a truck or load is damaged or stolen the CMR lays down rules for liability. The legal framework presented in this chapter has a direct influence on the willingness of carriers to report theft and thereby influences the available statistics on the economic damage caused by cargo theft. This chapter will not take specific national law in consideration because of differences between the EU countries. International carriage of goods by road is regulated by the Treaty of Geneva from 1956, called the Convention on the Contract for the International Carriage of Goods by Road or in short the CMR. The Netherlands ratified the CMR as one of the first countries, and in 1961 the CMR came into force. The CMR became a huge success and even crossed the European borders. The red countries in figure A1 show the countries that have ratified the CMR, the yellow countries show the countries of the European Union. Figure 12 European Union within CMR 57 Based upon Van Haven en handel, hoofdzaken van het handelsverkeersrecht (Haak and Zwitser, 2010). 55 One may conclude from the above figure, that the CMR is a widely spread and very important convention which may not be neglected in international road transport. The CMR is the starting point when looking at the legal aspects of transport law, national law may be applied when it deviates and in practice in the Netherlands the Algemene Vervoerscondities 2011 (AVC) complement national law and CMR. Specific national law including the AVC won’t be described while that will be too detailed for an economic paper. The CMR applies on the carriage of goods when sender or receiver of the goods resides in a country subject to the CMR (art. 1 CMR). The CMR is obligatory and parties can only in exceptional cases diverge from it. The importance of the CMR for the concept of fraud on the freight exchange follows from the rules of responsibility. Article 17 of the CMR states: “1. The carrier shall be liable for the total or partial loss of the goods and for damage thereto occurring between the time when he takes over the goods and the time of delivery, as well as for any delay in delivery” In the case of fraud the goods do not reach their final destination and the contractor of the carrier can legally hold the carrier responsible for the loss. Here the first difficulty arises; the carrier had the intention to steal the fraud and therefore already made use of a false identity so isn’t traceable that easy. It becomes even more complex when the transport chain consists of more than one carrier. Our research shows that these complex constructions are often found in a case of fraud via the freight exchange. The CMR states in article 3: “[..] the carrier shall be responsible for the acts of omissions of his agents and servants and of any other persons of whose services he makes use for the performance of carriage, when such agents, servants or other persons are acting within the scope of their employment, as if such acts or omissions were his own”. This indicates that a carrier which is subject to the CMR is responsible for all the parties he contracts to effectuate the job. This responsibility is extensive and not excludable. The rule from article 17 applies, so the contractor of the main carrier can hold him responsible for the lost 56 cargo but the carrier himself probably can’t find the fraudulent substitute carrier tohold responsible for the loss he experiences. The responsibility of the carrier is however limited. Article 23 of the CMR states that the compensation for the lost goods has its base in the value of the goods at the moment of sending, the compensation is limited to 8.33 SDR58 per kg. Compensation can also be given for costs following from the transport but not being consequential damage. “4. In addition, the carriage charges, Customs duties and other charges incurred in respect of the carriage of goods shall be refunded in full in case of total loss […], but no further damage shall be payable.” For example: When a carrier is supposed to transport a printer weighing 1000 kg and worth €50.000 from Belgium to France but the printer does not arrive at the printing house. The compensation is limited to a maximum of 1000 kg * 8,33 SDR (8,33 SDR/kg * 1,34 Euro/SDR * 1000 kg = € 11.162) and eventual toll charges. The loss of production for the printing house which is generated by the missing printer cannot be refunded. The CMR does provide the opportunity to bypass the limited responsibility in the contract but in practice these opportunities are hardly ever used. Reason for this observation might be that in practice everyone is used to the concept of limited liability, it is the most common way of contracting in the carriage of goods but even more important is that the insurance practice is adjusted to the concept of limited liability. It is possible however to bypass the limited liability later on by applying article 29. “1.The carrier shall not be entitled to avail himself of the provisions of this chapter which exclude or limit his liability or which shift the burden of proof if the damage was caused by his wilful misconduct or by such default on his part as, in accordance with the law of the court or tribunal seised of the case, is considered as equivalent to wilful misconduct.” The exact definition of wilful misconduct differs per court so forumshopping is enhanced. But generally speaking criminal intentions are a wilful misconduct. The combination of article 3 and 58 The SDR (Special Drawing Right) is a fictive unit made up out of the value of the four prominent currencies (Euro, Dollar, Yen and Pound). The SDR should make sure the compensation subject to the responsibility is as stable as possible. The rate of the SDR can be found on www.imf.org, February 2012 the rate was 1 SDR is approximately €1.34. 57 29 of the CMR leads therefore to the conclusion that the first contractor is fully liable for the loss. The main rule when you want to hold someone responsible for missing cargo is that you can only approach your contracting party (figure A2). The CMR prevents alternative claims based on different laws (article 28) so the carrier and substitute carriers stay responsible for the obliged limited amount. Noticeable is that the freight exchange in current law systems cannot be hold responsible for possible fraudulent activities. Figure 13– liability, only parties connected by an arrow can sue each other. 58 B. Data description B.1 Data characteristics Vehicle crime 80 Number of reports 70 60 50 40 30 20 10 0 Vehicle theft Variable Vehicle and Cargo theft Combination theft Cargo theft Observations Mean Standard Deviation Minimum Maximum Vehicle theft 192 22.099 8.226 1 45 Combination theft 192 11.203 5.437 0 33 Cargo theft 192 21.245 20.245 0 81 59 B.2 Chow test . reg vl 11.vl 11.v 11.l break break_v break_vl break_l note: break_v omitted because of collinearity note: break_l omitted because of collinearity Source df MS Model Residual 239.198598 5274.17509 5 184 47.8397197 28.663995 Total 5513.37368 189 29.1712893 vl Coef. 11.vl 11.v 11.l break break_v break_vl break_l _cons -.633475 -1.497506 .8856457 -3.336637 (omitted) 3.285649 (omitted) 11.68446 . test break ( ( ( ( SS 1) 2) 3) 4) Std. Err. t Number of obs F( 5, 184) Prob > F R-squared Adj R-squared Root MSE P>|t| = = = = = = 190 1.67 0.1441 0.0434 0.0174 5.3539 [95% Conf. Interval] 1.614404 2.750053 1.852669 1.201313 -0.39 -0.54 0.48 -2.78 0.695 0.587 0.633 0.006 -3.818597 -6.923197 -2.76956 -5.706757 2.551647 3.928185 4.540851 -.9665179 5.702329 0.58 0.565 -7.964707 14.536 .4437258 26.33 0.000 10.80902 12.55991 break_v break_vl break_l break = 0 o.break_v = 0 break_vl = 0 o.break_l = 0 Constraint 2 dropped Constraint 4 dropped F( 2, 184) = Prob > F = 3.86 0.0229 C. Vector error correction model The formula for the Vector error correction (VEC) model can be derived from the VAR model. Recall the formula for the VAR model. 𝒀𝑡 = 𝒄 + 𝑨1 𝒀𝑡−1 + 𝑨2 𝒀𝑡−2 + … + 𝑨𝑝 𝒀𝑡−𝑝 + 𝒆𝑡 In this model the matrices (𝑨) can be denoted as follows: 𝒀𝑡 = 𝒄 + 𝚽1 𝒀𝑡−1 + 𝚽2 𝒀𝑡−2 + … + 𝚽𝑝 𝒀𝑡−𝑝 + 𝒆𝑡 For our transformation to the VEC model it is convenient to write the VAR formula with an (m x 1) time series 𝒀𝑡 as follows: 𝚫𝟏 𝒀𝑡 = 𝒄 + 𝚪1 𝚫𝟏 𝒀𝑡−1 + 𝚪𝟐 𝚫1 𝒀𝑡−2 + … + 𝚪𝑝−1 𝚫𝟏 𝒀𝑡−𝑝+1 + 𝚷𝒀𝑡−𝑝 + 𝒆𝑡 where 60 𝚪𝑖 = (𝚽1 + 𝚽2 + … + 𝚽𝑖 ) − 𝐈𝑚 , for 𝑖 = 1,2, …, p – 1 and 𝚷 = 𝚽1 + 𝚽2 + … + 𝚽𝑝 − 𝐈𝑚 The symbol Π stands for information about potential cointegrating relationships between the different elements of 𝐘t and is therefore implemented in the model. (Franses, 1998) The VEC model can be used when the variables are (1) not stationary in their levels, but are in their differences; and (2) when the variables are cointegrated. After the VEC model an impulse response option can be applied. When applying an impulse response function after a VEC model the standard error bands in the impulse response function will be absent because the VEC model already corrects the error and can therefore not provide additional standard error correction bands for the impulse response function. D. Model I D.1 Stationary tests for model I D.1.1 Cargo theft CARGO Augmented DF test Phillips-Perron test KPSS test ERS test Stationary in level form No Yes No No Stationary in first difference Yes Yes Yes Yes Augmented Dickey-Fuller test Null Hypothesis: CARGO has a unit root Exogenous: Constant Lag Length: 4 (Automatic - based on SIC, maxlag=14) Augmented Dickey-Fuller test statistic Test critical values: 1% level 5% level 10% level t-Statistic Prob.* -1.006461 -3.465392 -2.876843 -2.575006 0.7508 *MacKinnon (1996) one-sided p-values. Null Hypothesis: D(CARGO) has a unit root Exogenous: Constant 61 Lag Length: 3 (Automatic - based on SIC, maxlag=14) Augmented Dickey-Fuller test statistic Test critical values: 1% level 5% level 10% level t-Statistic Prob.* -11.11186 -3.465392 -2.876843 -2.575006 0.0000 Adj. t-Stat Prob.* -3.695682 -3.464643 -2.876515 -2.574831 0.0049 Adj. t-Stat Prob.* -55.38305 -3.464827 -2.876595 -2.574874 0.0001 *MacKinnon (1996) one-sided p-values. Phillips-Perron test Null Hypothesis: CARGO has a unit root Exogenous: Constant Bandwidth: 4 (Newey-West automatic) using Bartlett kernel Phillips-Perron test statistic Test critical values: 1% level 5% level 10% level *MacKinnon (1996) one-sided p-values. Null Hypothesis: DIF_CARGO has a unit root Exogenous: Constant Bandwidth: 147 (Newey-West automatic) using Bartlett kernel Phillips-Perron test statistic Test critical values: 1% level 5% level 10% level *MacKinnon (1996) one-sided p-values. KPSS test Null Hypothesis: CARGO is stationary Exogenous: Constant Bandwidth: 10 (Newey-West automatic) using Bartlett kernel LM-Stat. Kwiatkowski-Phillips-Schmidt-Shin test statistic Asymptotic critical values*: 1% level 5% level 10% level *Kwiatkowski-Phillips-Schmidt-Shin (1992, Table 1) Null Hypothesis: DIF_CARGO is stationary Exogenous: Constant 62 1.141658 0.739000 0.463000 0.347000 Bandwidth: 42 (Newey-West automatic) using Bartlett kernel LM-Stat. Kwiatkowski-Phillips-Schmidt-Shin test statistic Asymptotic critical values*: 1% level 5% level 10% level 0.129781 0.739000 0.463000 0.347000 *Kwiatkowski-Phillips-Schmidt-Shin (1992, Table 1) ERS test Null Hypothesis: CARGO has a unit root Exogenous: Constant Lag length: 4 (Spectral OLS AR based on SIC, maxlag=14) Sample: 1996M01 2011M12 Included observations: 192 P-Statistic Elliott-Rothenberg-Stock test statistic Test critical values: 1% level 5% level 10% level 6.368408 1.913200 3.165200 4.317200 *Elliott-Rothenberg-Stock (1996, Table 1) Null Hypothesis: DIF_CARGO has a unit root Exogenous: Constant Lag length: 3 (Spectral OLS AR based on SIC, maxlag=14) Sample (adjusted): 1996M02 2011M12 Included observations: 191 after adjustments P-Statistic Elliott-Rothenberg-Stock test statistic Test critical values: 1% level 5% level 10% level 0.778095 1.913600 3.164600 4.315600 *Elliott-Rothenberg-Stock (1996, Table 1) D.1.2 Combination theft COMBINATION Augmented DF test Phillips-Perron test KPSS test ERS test Stationary in level form Yes Yes Yes Yes Stationary in first difference Yes Yes Yes No Augmented Dickey-Fuller test Null Hypothesis: COMBINATION has a unit root Exogenous: Constant Lag Length: 3 (Automatic - based on SIC, maxlag=14) 63 Augmented Dickey-Fuller test statistic Test critical values: 1% level 5% level 10% level t-Statistic Prob.* -3.596150 -3.465202 -2.876759 -2.574962 0.0067 *MacKinnon (1996) one-sided p-values. Null Hypothesis: DIF_COMBINATION has a unit root Exogenous: Constant Lag Length: 5 (Automatic - based on SIC, maxlag=14) Augmented Dickey-Fuller test statistic Test critical values: 1% level 5% level 10% level t-Statistic Prob.* -10.05907 -3.465780 -2.877012 -2.575097 0.0000 *MacKinnon (1996) one-sided p-values. Phillips-Perron test Null Hypothesis: COMBINATION has a unit root Exogenous: Constant Bandwidth: 7 (Newey-West automatic) using Bartlett kernel Phillips-Perron test statistic Test critical values: 1% level 5% level 10% level Adj. t-Stat Prob.* -8.741524 -3.464643 -2.876515 -2.574831 0.0000 Adj. t-Stat Prob.* -55.91330 -3.464827 -2.876595 -2.574874 0.0001 *MacKinnon (1996) one-sided p-values. Null Hypothesis: DIF_COMBINATION has a unit root Exogenous: Constant Bandwidth: 64 (Newey-West automatic) using Bartlett kernel Phillips-Perron test statistic Test critical values: 1% level 5% level 10% level *MacKinnon (1996) one-sided p-values. KPSS test Null Hypothesis: COMBINATION is stationary Exogenous: Constant Bandwidth: 9 (Newey-West automatic) using Bartlett kernel 64 LM-Stat. Kwiatkowski-Phillips-Schmidt-Shin test statistic Asymptotic critical values*: 1% level 5% level 10% level 0.389400 0.739000 0.463000 0.347000 *Kwiatkowski-Phillips-Schmidt-Shin (1992, Table 1) Null Hypothesis: DIF_COMBINATION is stationary Exogenous: Constant Bandwidth: 90 (Newey-West automatic) using Bartlett kernel LM-Stat. Kwiatkowski-Phillips-Schmidt-Shin test statistic Asymptotic critical values*: 1% level 5% level 10% level 0.205791 0.739000 0.463000 0.347000 *Kwiatkowski-Phillips-Schmidt-Shin (1992, Table 1) ERS test Null Hypothesis: COMBINATION has a unit root Exogenous: Constant Lag length: 3 (Spectral OLS AR based on SIC, maxlag=14) Sample: 1996M01 2011M12 Included observations: 192 P-Statistic Elliott-Rothenberg-Stock test statistic Test critical values: 1% level 5% level 10% level 1.829434 1.913200 3.165200 4.317200 *Elliott-Rothenberg-Stock (1996, Table 1) Null Hypothesis: DIF_COMBINATION has a unit root Exogenous: Constant Lag length: 5 (Spectral OLS AR based on SIC, maxlag=14) Sample (adjusted): 1996M02 2011M12 Included observations: 191 after adjustments P-Statistic Elliott-Rothenberg-Stock test statistic Test critical values: 1% level 5% level 10% level 10.14157 1.913600 3.164600 4.315600 *Elliott-Rothenberg-Stock (1996, Table 1) 65 D.1.3 Vehicle theft VEHICLE Augmented DF test Phillips Perron test KPSS test ERS test Stationary in level form Yes Yes Yes Yes Stationary in first difference Yes Yes Yes Yes Augmented Dickey-Fuller test Null Hypothesis: VEHICLE has a unit root Exogenous: Constant Lag Length: 3 (Automatic - based on SIC, maxlag=14) Augmented Dickey-Fuller test statistic Test critical values: 1% level 5% level 10% level t-Statistic Prob.* -3.180142 -3.465202 -2.876759 -2.574962 0.0227 t-Statistic Prob.* -13.29381 -3.465202 -2.876759 -2.574962 0.0000 Adj. t-Stat Prob.* -10.38149 -3.464643 -2.876515 -2.574831 0.0000 *MacKinnon (1996) one-sided p-values. Null Hypothesis: DIF_VEHICLE has a unit root Exogenous: Constant Lag Length: 2 (Automatic - based on SIC, maxlag=14) Augmented Dickey-Fuller test statistic Test critical values: 1% level 5% level 10% level *MacKinnon (1996) one-sided p-values. Phillips-Perron test Null Hypothesis: VEHICLE has a unit root Exogenous: Constant Bandwidth: 9 (Newey-West automatic) using Bartlett kernel Phillips-Perron test statistic Test critical values: 1% level 5% level 10% level *MacKinnon (1996) one-sided p-values. Null Hypothesis: DIF_VEHICLE has a unit root Exogenous: Constant Bandwidth: 14 (Newey-West automatic) using Bartlett kernel 66 Phillips-Perron test statistic Test critical values: 1% level 5% level 10% level Adj. t-Stat Prob.* -42.47017 -3.464827 -2.876595 -2.574874 0.0001 *MacKinnon (1996) one-sided p-values. KPSS test Null Hypothesis: VEHICLE is stationary Exogenous: Constant Bandwidth: 10 (Newey-West automatic) using Bartlett kernel LM-Stat. Kwiatkowski-Phillips-Schmidt-Shin test statistic Asymptotic critical values*: 1% level 5% level 10% level 0.414301 0.739000 0.463000 0.347000 *Kwiatkowski-Phillips-Schmidt-Shin (1992, Table 1) Null Hypothesis: DIF_VEHICLE is stationary Exogenous: Constant Bandwidth: 4 (Newey-West automatic) using Bartlett kernel LM-Stat. Kwiatkowski-Phillips-Schmidt-Shin test statistic Asymptotic critical values*: 1% level 5% level 10% level 0.025703 0.739000 0.463000 0.347000 *Kwiatkowski-Phillips-Schmidt-Shin (1992, Table 1) ERS test Null Hypothesis: VEHICLE has a unit root Exogenous: Constant Lag length: 3 (Spectral OLS AR based on SIC, maxlag=14) Sample: 1996M01 2011M12 Included observations: 192 P-Statistic Elliott-Rothenberg-Stock test statistic Test critical values: 1% level 5% level 10% level 1.818627 1.913200 3.165200 4.317200 *Elliott-Rothenberg-Stock (1996, Table 1) Null Hypothesis: DIF_VEHICLE has a unit root Exogenous: Constant Lag length: 2 (Spectral OLS AR based on SIC, maxlag=14) 67 Sample (adjusted): 1996M02 2011M12 Included observations: 191 after adjustments P-Statistic Elliott-Rothenberg-Stock test statistic Test critical values: 1% level 5% level 10% level 2.91E-05 1.913600 3.164600 4.315600 *Elliott-Rothenberg-Stock (1996, Table 1) D.2 Lag selection for model I VAR Lag Order Selection Criteria Endogenous variables: CARGO VEHICLE COMBINATION Exogenous variables: C DUMBREAK Date: 08/08/12 Time: 15:50 Sample: 1996M01 2011M12 Included observations: 184 Lag LogL LR FPE AIC SC HQ 0 1 2 3 4 5 6 7 8 -1907.413 -1844.298 -1823.716 -1813.794 -1808.837 -1802.106 -1794.980 -1781.670 -1776.018 NA 122.7998 39.37253 18.65927 9.158820 12.21805 12.70297 23.29301* 9.706560 216281.1 120110.2 105916.7 104887.2* 109649.8 112466.7 114896.1 109786.0 114056.5 20.79796 20.20976 20.08387 20.07384* 20.11779 20.14246 20.16283 20.11598 20.15237 20.90280 20.47184* 20.50321 20.65044 20.85164 21.03355 21.21118 21.32158 21.51522 20.84045 20.31598 20.25384* 20.30754 20.41523 20.50363 20.58774 20.60462 20.70475 * indicates lag order selected by the criterion LR: sequential modified LR test statistic (each test at 5% level) FPE: Final prediction error AIC: Akaike information criterion SC: Schwarz information criterion HQ: Hannan-Quinn information criterion VAR Residual Serial Correlation LM Tests Null Hypothesis: no serial correlation at lag order h Date: 08/08/12 Time: 15:55 Sample: 1996M01 2011M12 Included observations: 189 68 Lags LM-Stat Prob 1 2 3 4 5 6 7 9.981372 5.455356 10.11484 7.344354 11.39669 11.50631 25.66212 0.3520 0.7929 0.3413 0.6013 0.2495 0.2426 0.0023 8 9 10 11 12 16.16161 5.309461 14.31505 8.591891 19.71498 0.0636 0.8065 0.1116 0.4758 0.0198 Probs from chi-square with 9 df. D.3 Impulse response function Model I Response to Cholesky One S.D. Innovations ± 2 S.E. Response of CARGO to CARGO Response of CARGO to VEHICLE Response of CARGO to COMBINATION 12 12 12 8 8 8 4 4 4 0 0 0 -4 -4 2 4 6 8 10 12 14 16 18 20 22 24 -4 2 Response of VEHICLE to CARGO 4 6 8 10 12 14 16 18 20 22 24 2 Response of VEHICLE to VEHICLE 8 8 6 6 6 4 4 4 2 2 2 0 0 0 -2 2 4 6 8 10 12 14 16 18 20 22 24 4 6 8 10 12 14 16 18 20 22 24 2 Response of COMBINATION to VEHICLE 6 6 4 4 4 2 2 2 0 0 0 -2 2 4 6 8 10 12 14 16 18 20 22 24 10 12 14 16 18 20 22 24 4 6 8 10 12 14 16 18 20 22 24 Response of COMBINATION to COMBINATION 6 -2 8 -2 2 Response of COMBINATION to CARGO 6 Response of VEHICLE to COMBINATION 8 -2 4 -2 2 4 6 8 10 12 14 16 18 20 22 24 2 4 6 8 10 12 14 16 18 20 22 24 69 D.4 VAR analysis and impulse response function for Model I including first difference of cargo theft D.4.1 Lag selection VAR Lag Order Selection Criteria Endogenous variables: DIF_CARGO COMBINATION VEHICLE Exogenous variables: C DUMBREAK Sample: 1996M01 2011M12 Included observations: 183 Lag LogL LR FPE AIC SC HQ 0 1 2 3 4 5 6 7 8 -1905.568 -1842.851 -1827.261 -1818.640 -1804.485 -1802.099 -1788.032 -1778.341 -1771.500 NA 122.0056 29.81846 16.20433 26.14451 4.328741 25.05951 16.94556* 11.73838 237476.0 132031.5 122871.2 123415.2 116708.2* 125546.2 118903.6 118172.2 121211.2 20.89145 20.30439 20.23236 20.23651 20.18016* 20.25245 20.19707 20.18952 20.21311 20.99668 20.56746* 20.65327 20.81527 20.91677 21.14690 21.24936 21.39966 21.58109 20.93411 20.41102 20.40297* 20.47111 20.47875 20.61501 20.62362 20.68005 20.76762 * indicates lag order selected by the criterion LR: sequential modified LR test statistic (each test at 5% level) FPE: Final prediction error AIC: Akaike information criterion SC: Schwarz information criterion HQ: Hannan-Quinn information criterion VAR Residual Serial Correlation LM Tests Null Hypothesis: no serial correlation at lag order h Sample: 1996M01 2011M12 Included observations: 189 Lags LM-Stat Prob 1 2 3 4 5 6 7 8 9 10 11 12 21.54681 23.63641 23.83941 10.74413 5.161498 15.35836 24.66798 13.81390 4.715356 10.21039 14.29852 22.20811 0.0104 0.0049 0.0046 0.2937 0.8200 0.0816 0.0034 0.1291 0.8584 0.3337 0.1121 0.0082 Probs from chi-square with 9 df. 70 D.4.2 VAR analysis The amount of lags (following from appendix D.4.1) we have to implement in our model is four, which leads us to the following formula for the model: 𝑎1𝑣𝑒,𝑣𝑒 𝑦𝑣𝑒,𝑡 𝑐𝑣𝑒 [𝑦𝑐𝑜,𝑡 ] = [𝑐𝑐𝑜 ] + [𝑎1𝑐𝑜,𝑣𝑒 𝑦𝑐𝑎,𝑡 𝑐𝑐𝑎 𝑎1𝑐𝑎,𝑣𝑒 3 𝑎𝑣𝑒,𝑣𝑒 3 + [𝑎𝑐𝑜,𝑣𝑒 3 𝑎𝑐𝑎,𝑣𝑒 𝑎1𝑣𝑒,𝑐𝑜 𝑎1𝑐𝑜,𝑐𝑜 𝑎1𝑐𝑎,𝑐𝑜 3 𝑎𝑣𝑒,𝑐𝑜 3 𝑎𝑐𝑜,𝑐𝑜 3 𝑎𝑐𝑎,𝑐𝑜 2 𝑎1𝑣𝑒,𝑐𝑜 𝑦𝑣𝑒,𝑡−1 𝑎𝑣𝑒,𝑣𝑒 2 𝑎1𝑐𝑜,𝑐𝑎 ] [𝑦𝑐𝑜,𝑡−1 ] + [𝑎𝑐𝑜,𝑣𝑒 2 𝑎1𝑐𝑎,𝑐𝑎 𝑦𝑐𝑎,𝑡−1 𝑎𝑐𝑎,𝑣𝑒 3 4 𝑎𝑣𝑒,𝑐𝑜 𝑎𝑣𝑒,𝑣𝑒 𝑦𝑣𝑒,𝑡−3 3 4 𝑎𝑐𝑜,𝑐𝑎 ] [𝑦𝑐𝑜,𝑡−3 ] + [𝑎𝑐𝑜,𝑣𝑒 𝑦𝑐𝑎,𝑡−3 3 4 𝑎𝑐𝑎,𝑐𝑎 𝑎𝑐𝑎,𝑣𝑒 2 𝑎𝑣𝑒,𝑐𝑜 2 𝑎𝑐𝑜,𝑐𝑜 2 𝑎𝑐𝑎,𝑐𝑜 4 𝑎𝑣𝑒,𝑐𝑜 4 𝑎𝑐𝑜,𝑐𝑜 4 𝑎𝑐𝑎,𝑐𝑜 2 𝑎𝑣𝑒,𝑐𝑜 𝑦𝑣𝑒,𝑡−2 2 𝑎𝑐𝑜,𝑐𝑎 ] [𝑦𝑐𝑜,𝑡−2 ] 𝑦𝑐𝑎,𝑡−2 2 𝑎𝑐𝑎,𝑐𝑎 4 𝑎𝑣𝑒,𝑐𝑜 𝑦𝑣𝑒,𝑡−4 4 𝑎𝑐𝑜,𝑐𝑎 ] [𝑦𝑐𝑜,𝑡−4 ] 𝑦𝑐𝑎,𝑡−4 4 𝑎𝑐𝑎,𝑐𝑎 𝑒𝑣𝑒,𝑡 + 𝒟𝐵𝑟𝑒𝑎𝑘 + [𝑒𝑐𝑜,𝑡 ] 𝑒𝑐𝑎,𝑡 This can be rewritten as: ̂ 1 𝒀𝑡−1 + 𝚽 ̂ 2 𝒀𝑡−2 + 𝚽 ̂ 3 𝒀𝑡−3 + 𝚽 ̂ 4 𝒀𝑡−4 + 𝒟𝐵𝑟𝑒𝑎𝑘 + 𝒆̂𝑡 ; 𝒀𝑡 = 𝒄̂ + 𝚽 where 𝑦𝑡 = (𝑣𝑒𝑡 , 𝑐𝑜𝑡, 𝑑𝑐𝑎𝑡 )’ in which 𝑣𝑒 stands for vehicle theft, 𝑐𝑜 for combination theft and 𝑑𝑐𝑎 for the first difference of cargo theft. In the model a dummy is implemented to correct for the new measurement method which is implemented at the KLPD in 2010. The results of the VAR analysis can be found in table 7 and the results of the thereto belonging impulse response analysis can be found in appendix D.4.3. 71 Table 7 VAR(4) analysis model I (cargo theft in first difference) Vector Auto Regression (4 lags) Observations: 187 Variable Vehicle theft D.Cargo theft Combination theft Vehicle L1 0.158 * -0.179 0.057 Standard error t-statistic 0.080 1.983 0.115 -1.556 0.051 1.124 0.106 * Vehicle L2 0.119 0.180 Standard error t-statistic 0.082 1.457 0.118 - 1.525 0.053 2.019 Vehicle L3 0.238 * - 0.079 0.114 * Standard error t-statistic 0.084 2.845 0.121 - 0.651 0.054 2.129 Vehicle L4 0.118 0.008 0.016 * Standard error t-statistic 0.085 1.382 0.123 0.069 0.054 2.129 D.Cargo L1 0.039 - 0.657 * 0.014 Standard error t-statistic 0.053 0.736 0.076 - 8.587 0.034 0.414 D.Cargo L2 0.102 - 0.304 * 0.015 Standard error t-statistic 0.062 1.646 0.089 - 3.421 0.040 0.377 D.Cargo L3 - 0.031 - 0.275 * 0.002 Standard error t-statistic 0.062 - 0.507 0.089 - 3.088 0.040 0.063 D.Cargo L4 - 0.031 - 0.317 * - 0.009 Standard error t-statistic 0.052 - 0.601 0.075 - 4.256 0.033 - 0.268 Combination L1 0.093 0.356 * 0.248 * Standard error t-statistic 0.123 0.754 0.178 2.001 0.079 3.135 Combination L2 0.035 0.142 0.071 Standard error t-statistic 0.126 0.277 0.182 0.781 0.081 0.877 Combination L3 - 0.060 - 0.147 - 0.109 Standard error t-statistic 0.125 - 0.483 0.181 - 0.816 0.080 - 1.355 Combination L4 0.142 0.219 0.167 * Standard error t-statistic 0.119 1.192 0.172 1.274 0.077 2.183 Constant 5.542 * 2.891 0.945 Standard error t-statistic 1.941 2.855 2.798 1.033 1.244 0.759 Dumbreak 1.939 5.824 * - 3.551 * Standard error t-statistic 1.941 0.999 2.798 2.082 1.244 - 2.854 * signficant on a 95% level We see that, according to our expectations of sub 3.3.1, the variables vehicle theft, cargo theft and combination theft show significant relations with their own lagged variables. Vehicle theft is significantly related to its first and third lag; cargo theft is significantly related to all of its four lags; and combination theft is related to its first and fourth lag. 72 0 30 35 1 -5 0 -10 -1 40 5 OMBINATION 5 10 10 15 15 20 20 25 25 30 30 35 0 0 -5 -5 -10 40 35 40 Response of VEHICLE to VEHICLE Response of COMBINATION to DIF_CARGO -10 5 10 15 20 25 30 35 40 5 Response of COMBINATION to COMBINATION Response o 5 8 5 5 4 6 4 4 3 3 2 2 1 1 0 0 3 10 4 2 2 1 30 35 0 0 -1 -2 5 40 -1 10 5 15 10 20 15 25 20 30 25 35 30 40 35 Response of VEHICLE to DIF_CARGO Figure 14 Impulse response function VAR(4) model I Response of DIF_CARGO to DIF_CARGO 15 20 25 30 35 40 5 15 8 Response to Cholesky One S.D. Innovations ± 2 S.E. 8 6 Response of DIF_CARGO to COMBINATION 6 2 4 2 2 0 of vehicle theft to vehicle theft (figure 14) 0 -2 shows us -5 5 -2 in figure 14 – 16. The impulse response function 5 5 0 0 10 5 0 -2 10 15 20 25 30 35 40 that, considering the signs of the 10 15 20 25 30 35 40 Respons 15 4 crime 10 component with their own lags are shown 10 10 Respons The 15impulse response functions of the vehicle 4 -5 5 10 Response of VEHICLE to COMBINATION Figure 15 Impulse response function VAR(4) model I 8 6 -1 5 40 0 -5 5 10 responses, vehicle theft always has a positive -10 -10 -10 40 15 the 20 impulse 25 30 35 40 impact on 5itself10 since response is Figure 16 Impulse response function VAR(4) model I positive.Response The effect of a shock dies down after of COMBINATION to COMBINATION 5 10 15 20 25 30 35 Response of COMBINATION to DIF_CARGO 59 5 Response about twelve months. The impulse response function of combination theft shows us a positive 5 4 impact of about four months after which the shock4 appears to have worked itself out of the 4 3 3 system. It is hard to interpret the variable cargo theft since we have transformed it to its first 3 5 5 2 2 2 1 1 1 0 0 0 difference. The impulse response function (figure 16) does show us that the shock appears to have worked its way out of the system after five periods. The impulse response function is stable since the effect of the shock dies down. -1 5 10 15 20 25 30 35 -1 40 10 -1 5 10 15 20 25 30 35 40 5 10 The VAR output reveals significant relations between the variables cargo theft and the first lag Response of VEHICLE to DIF_CARGO Response of VEHICLE to COMBINATION of8 combination theft and between combination theft and the second, third and fourth lag of 8 vehicle theft. Respo 8 6 6 6 4 4 4 2 2 2 59 0 We 0 two periods, because of the revival of the do notice the standard error band crossing the zero at standard error band we have interpreted that the shock truly died out after twelve periods. -2 0 -2 5 10 15 20 25 30 35 40 5 10 15 20 25 30 35 -2 40 73 5 10 0 0 0 -5 -5 -10 35 40 15 20 25 30 35 40 Response of DIF_CARGO to COMBINATION Response of COMBINATION to COMBINATION 5 15 4 10 4 10 3 5 2 0 20 25 30 35 40 5 0 1 -5 0 -1 15 2 1 3540 10 Response of DIF_CARGO to VEHICLE Response of COMBINATION to VEHICLE 15 3 3035 5 5 0 -1 -10 5 40 CARGO o DIF_CARGO 0 10 Response to Cholesky One S.D. Innovations ± 2 S.E. DIF_CARGO F_CARGO 0 -10 5 510 15 10 20 15 25 20 30 25 35 30 40 35 40 -5 -10 5 105 15 10 20 15 2520 3025 3530 4035 40 Response of of VEHICLE to COMBINATION Response of VEHICLE toVAR(4) VEHICLE Response COMBINATION to COMBINATION Response offunction COMBINATION to VEHICLE Figure 17 Impulse response function VAR(4) model I Figure 18 Impulse response model I 8 5 8 5 6 4 6 4 4 3 Although we found a significant relation between4 cargo3 theft and the first lag of combination 2 2 2 theft the impulse response function shows that the impact of the shock is close to zero. This 2 0 1 1 indicates that the significant relation between the two variables seems not to be of any 0 0 0 influence. A shock of combination theft does not impact cargo theft. -2 35 30 40 35 40 -1 -2 5 10 5 15 10 20 15 25 20 30 25 35 30 40 35 40 -1 5 10 5 15 10 20 15 25 20 30 25 35 30 40 35 The relationship between combination and vehicle theft (figure 18) is positive and the shock 40 60 VEHICLE COMBINATION Response of VEHICLE to VEHICLE appearsResponse to have ofworked itstoway out of the system after thirteen months. The response of IF_CARGO 8 8 combination to combination is positive for four months. After that the shock seems to gradually 6 its way out of the system. work 6 4 4 The results of this analysis match the results of the analysis presented in sub 4.1. Each variable 2 2 0 0 shows within variable significance and between the variables combination and vehicle are significantly related. The result of this analysis between cargo theft and combination theft is not 30 35 40 -2 -2 found in sub 4.1, but the significant relation does not seem to be of any influence (figure 17). 5 10 15 20 25 30 35 40 5 10 15 20 25 30 35 Conclusions drawn in sub 4.1 can therefore be applied on this section as well. 60 We do notice the standard error band crossing the zero in the first period of the impulse response function but because of the revival of the standard error band in the second period we have interpreted that the shock to truly die out after thirteen periods. 74 40 D.4.3 Impulse response function Response to Cholesky One S.D. Innovations ± 2 S.E. Response of DIF_CARGO to DIF_CARGO Response of DIF_CARGO to COMBINATION Response of DIF_CARGO to VEHICLE 15 15 15 10 10 10 5 5 5 0 0 0 -5 -5 -5 -10 -10 -10 5 10 15 20 25 30 35 40 5 Response of COMBINATION to DIF_CARGO 10 15 20 25 30 35 40 5 Response of COMBINATION to COMBINATION 5 5 4 4 4 3 3 3 2 2 2 1 1 1 0 0 0 -1 -1 -1 10 15 20 25 30 35 40 5 Response of VEHICLE to DIF_CARGO 10 15 20 25 30 35 40 5 Response of VEHICLE to COMBINATION 8 8 6 6 6 4 4 4 2 2 2 0 0 0 -2 5 10 15 20 25 30 35 40 20 25 30 35 40 10 15 20 25 30 35 40 Response of VEHICLE to VEHICLE 8 -2 15 Response of COMBINATION to VEHICLE 5 5 10 -2 5 10 15 20 25 30 35 40 5 10 15 20 25 30 35 40 E. Model II E.1 Stationary tests for model II E.1.1 Members MEMBERS Augmented DF test Phillips-Perron test KPSS test ERS test Stationary in level form No No No No Stationary in first difference Yes Yes No Yes 75 Augmented Dickey-Fuller test Null Hypothesis: MEMBERS has a unit root Exogenous: Constant Lag Length: 0 (Automatic - based on SIC, maxlag=10) Augmented Dickey-Fuller test statistic Test critical values: 1% level 5% level 10% level t-Statistic Prob.* 0.503898 -3.546099 -2.911730 -2.593551 0.9855 t-Statistic Prob.* -7.541604 -3.548208 -2.912631 -2.594027 0.0000 Adj. t-Stat Prob.* 0.503898 -3.546099 -2.911730 -2.593551 0.9855 Adj. t-Stat Prob.* -7.541057 -3.548208 -2.912631 -2.594027 0.0000 *MacKinnon (1996) one-sided p-values. Null Hypothesis: D(MEMBERS) has a unit root Exogenous: Constant Lag Length: 0 (Automatic - based on SIC, maxlag=10) Augmented Dickey-Fuller test statistic Test critical values: 1% level 5% level 10% level *MacKinnon (1996) one-sided p-values. Phillips-Perron test Null Hypothesis: MEMBERS has a unit root Exogenous: Constant Bandwidth: 0 (Newey-West automatic) using Bartlett kernel Phillips-Perron test statistic Test critical values: 1% level 5% level 10% level *MacKinnon (1996) one-sided p-values. Null Hypothesis: D(MEMBERS) has a unit root Exogenous: Constant Bandwidth: 1 (Newey-West automatic) using Bartlett kernel Phillips-Perron test statistic Test critical values: 1% level 5% level 10% level *MacKinnon (1996) one-sided p-values. 76 KPSS test Null Hypothesis: MEMBERS is stationary Exogenous: Constant Bandwidth: 6 (Newey-West automatic) using Bartlett kernel LM-Stat. Kwiatkowski-Phillips-Schmidt-Shin test statistic Asymptotic critical values*: 1% level 5% level 10% level 0.595542 0.739000 0.463000 0.347000 *Kwiatkowski-Phillips-Schmidt-Shin (1992, Table 1) Null Hypothesis: D(MEMBERS) is stationary Exogenous: Constant Bandwidth: 1 (Newey-West automatic) using Bartlett kernel LM-Stat. Kwiatkowski-Phillips-Schmidt-Shin test statistic Asymptotic critical values*: 1% level 5% level 10% level 0.768809 0.739000 0.463000 0.347000 *Kwiatkowski-Phillips-Schmidt-Shin (1992, Table 1) ERS test Null Hypothesis: MEMBERS has a unit root Exogenous: Constant Lag length: 0 (Spectral OLS AR based on SIC, maxlag=10) Sample: 2007M01 2011M12 Included observations: 60 P-Statistic Elliott-Rothenberg-Stock test statistic Test critical values: 1% level 5% level 10% level 22.34798 1.886000 2.998000 3.962000 *Elliott-Rothenberg-Stock (1996, Table 1) Null Hypothesis: D(MEMBERS) has a unit root Exogenous: Constant Lag length: 0 (Spectral OLS AR based on SIC, maxlag=10) Sample (adjusted): 2007M02 2011M12 Included observations: 59 after adjustments 77 P-Statistic Elliott-Rothenberg-Stock test statistic Test critical values: 1% level 5% level 10% level 1.584276 1.884400 2.995200 3.956800 *Elliott-Rothenberg-Stock (1996, Table 1) E.1.2 Posted advertisements POSTED ADVERTISEMENTS Augmented DF test Phillips-Perron test KPSS test ERS test Stationary in level form No No No Yes Stationary in first difference Yes Yes Yes Yes Augmented Dickey-Fuller test Null Hypothesis: POSTED_ADDS has a unit root Exogenous: Constant Lag Length: 0 (Automatic - based on SIC, maxlag=10) Augmented Dickey-Fuller test statistic Test critical values: 1% level 5% level 10% level t-Statistic Prob.* -2.804993 -3.546099 -2.911730 -2.593551 0.0637 t-Statistic Prob.* -7.984689 -3.548208 -2.912631 -2.594027 0.0000 *MacKinnon (1996) one-sided p-values. Null Hypothesis: D(POSTED_ADDS) has a unit root Exogenous: Constant Lag Length: 0 (Automatic - based on SIC, maxlag=10) Augmented Dickey-Fuller test statistic Test critical values: 1% level 5% level 10% level *MacKinnon (1996) one-sided p-values. Phillips-Perron test Null Hypothesis: POSTED_ADDS has a unit root Exogenous: Constant Bandwidth: 4 (Newey-West automatic) using Bartlett kernel 78 Phillips-Perron test statistic Test critical values: 1% level 5% level 10% level Adj. t-Stat Prob.* -2.651499 -3.546099 -2.911730 -2.593551 0.0887 Adj. t-Stat Prob.* -10.94176 -3.548208 -2.912631 -2.594027 0.0000 *MacKinnon (1996) one-sided p-values. Null Hypothesis: D(POSTED_ADDS) has a unit root Exogenous: Constant Bandwidth: 22 (Newey-West automatic) using Bartlett kernel Phillips-Perron test statistic Test critical values: 1% level 5% level 10% level *MacKinnon (1996) one-sided p-values. KPSS test Null Hypothesis: POSTED_ADDS is stationary Exogenous: Constant Bandwidth: 5 (Newey-West automatic) using Bartlett kernel LM-Stat. Kwiatkowski-Phillips-Schmidt-Shin test statistic Asymptotic critical values*: 1% level 5% level 10% level 0.595158 0.739000 0.463000 0.347000 *Kwiatkowski-Phillips-Schmidt-Shin (1992, Table 1) Null Hypothesis: D(POSTED_ADDS) is stationary Exogenous: Constant Bandwidth: 26 (Newey-West automatic) using Bartlett kernel LM-Stat. Kwiatkowski-Phillips-Schmidt-Shin test statistic Asymptotic critical values*: 1% level 5% level 10% level 0.175021 0.739000 0.463000 0.347000 *Kwiatkowski-Phillips-Schmidt-Shin (1992, Table 1) ERS test 79 Null Hypothesis: POSTED_ADDS has a unit root Exogenous: Constant Lag length: 0 (Spectral OLS AR based on SIC, maxlag=10) Sample: 2007M01 2011M12 Included observations: 60 P-Statistic Elliott-Rothenberg-Stock test statistic Test critical values: 1% level 5% level 10% level 2.572423 1.886000 2.998000 3.962000 *Elliott-Rothenberg-Stock (1996, Table 1) Null Hypothesis: D(POSTED_ADDS) has a unit root Exogenous: Constant Lag length: 0 (Spectral OLS AR based on SIC, maxlag=10) Sample (adjusted): 2007M02 2011M12 Included observations: 59 after adjustments P-Statistic Elliott-Rothenberg-Stock test statistic Test critical values: 1% level 5% level 10% level 0.863896 1.884400 2.995200 3.956800 *Elliott-Rothenberg-Stock (1996, Table 1) E.1.3 Viewed advertisements VIEWED ADVERTISEMENTS Augmented DF test Phillips-Perron test KPSS test ERS test Stationary in level form No No No No Stationary in first difference Yes Yes Yes Yes Augmented Dickey-Fuller test Null Hypothesis: VIEWED_ADDS has a unit root Exogenous: Constant Lag Length: 2 (Automatic - based on SIC, maxlag=10) Augmented Dickey-Fuller test statistic Test critical values: 1% level 5% level 10% level 80 t-Statistic Prob.* -0.554578 -3.550396 -2.913549 -2.594521 0.8720 *MacKinnon (1996) one-sided p-values. Null Hypothesis: D(VIEWED_ADDS) has a unit root Exogenous: Constant Lag Length: 1 (Automatic - based on SIC, maxlag=10) Augmented Dickey-Fuller test statistic Test critical values: 1% level 5% level 10% level t-Statistic Prob.* -9.508594 -3.550396 -2.913549 -2.594521 0.0000 Adj. t-Stat Prob.* -1.176349 -3.546099 -2.911730 -2.593551 0.6791 Adj. t-Stat Prob.* -18.10566 -3.548208 -2.912631 -2.594027 0.0000 *MacKinnon (1996) one-sided p-values. Phillips-Perron test Null Hypothesis: VIEWED_ADDS has a unit root Exogenous: Constant Bandwidth: 3 (Newey-West automatic) using Bartlett kernel Phillips-Perron test statistic Test critical values: 1% level 5% level 10% level *MacKinnon (1996) one-sided p-values. Null Hypothesis: D(VIEWED_ADDS) has a unit root Exogenous: Constant Bandwidth: 14 (Newey-West automatic) using Bartlett kernel Phillips-Perron test statistic Test critical values: 1% level 5% level 10% level *MacKinnon (1996) one-sided p-values. KPSS test Null Hypothesis: VIEWED_ADDS is stationary Exogenous: Constant Bandwidth: 6 (Newey-West automatic) using Bartlett kernel LM-Stat. Kwiatkowski-Phillips-Schmidt-Shin test statistic Asymptotic critical values*: 1% level 5% level 10% level 0.910652 0.739000 0.463000 0.347000 81 *Kwiatkowski-Phillips-Schmidt-Shin (1992, Table 1) Null Hypothesis: D(VIEWED_ADDS) is stationary Exogenous: Constant Bandwidth: 4 (Newey-West automatic) using Bartlett kernel LM-Stat. Kwiatkowski-Phillips-Schmidt-Shin test statistic Asymptotic critical values*: 1% level 5% level 10% level 0.066125 0.739000 0.463000 0.347000 *Kwiatkowski-Phillips-Schmidt-Shin (1992, Table 1) ERS test Null Hypothesis: VIEWED_ADDS has a unit root Exogenous: Constant Lag length: 2 (Spectral OLS AR based on SIC, maxlag=10) Sample: 2007M01 2011M12 Included observations: 60 P-Statistic Elliott-Rothenberg-Stock test statistic Test critical values: 1% level 5% level 10% level 69.47715 1.886000 2.998000 3.962000 *Elliott-Rothenberg-Stock (1996, Table 1) Null Hypothesis: D(VIEWED_ADDS) has a unit root Exogenous: Constant Lag length: 1 (Spectral OLS AR based on SIC, maxlag=10) Sample (adjusted): 2007M02 2011M12 Included observations: 59 after adjustments P-Statistic Elliott-Rothenberg-Stock test statistic Test critical values: 1% level 5% level 10% level 0.509050 1.884400 2.995200 3.956800 *Elliott-Rothenberg-Stock (1996, Table 1) E.2 Lag selection for model II The first panel shows the lag selection test for model II including cargo theft in its level form. The test results indicate a lag order of zero which does not stroke with the idea 82 behind a vector autoregression. The second panel shows the results of the lag selection test of model II including cargo theft in its first difference. Based on Akaike information criterium a VAR(1) seems appropriate. VAR Lag Order Selection Criteria Endogenous variables: VEHICLE CARGO COMBINATION Exogenous variables: C DUMBREAK DIF_POSTED_ADDS DIF_VIEWED_ADDS DIF_MEMBERS Sample: 2007M01 2011M12 Included observations: 55 Lag LogL LR FPE AIC SC HQ 0 1 2 3 4 5 -542.3001 -535.9674 -530.7233 -521.4930 -511.2974 -508.1658 NA* 10.82315 8.390602 13.76155 14.08847 3.985675 127177.4* 140794.3 163046.9 164613.2 162144.2 209304.4 20.26546* 20.36245 20.49903 20.49065 20.44718 20.66057 20.81291* 21.23838 21.70343 22.02353 22.30852 22.85039 20.47716* 20.70118 20.96478 21.08343 21.16698 21.50739 * indicates lag order selected by the criterion LR: sequential modified LR test statistic (each test at 5% level) FPE: Final prediction error AIC: Akaike information criterion SC: Schwarz information criterion HQ: Hannan-Quinn information criterion VAR Lag Order Selection Criteria Endogenous variables: DIF_CARGO VEHICLE COMBINATION Exogenous variables: C DUMBREAK DIF_POSTED_ADDS DIF_VIEWED_ADDS DIF_MEMBERS Sample: 2007M01 2011M12 Included observations: 54 Lag LogL LR FPE AIC SC HQ 0 1 2 3 4 5 -549.7849 -539.4687 -530.5045 -524.5420 -518.7588 -514.0496 NA 17.57570* 14.27636 8.833344 7.925016 5.930164 244243.9 233787.9* 236627.8 269880.2 313308.9 383984.0 20.91796 20.86921* 20.87054 20.98304 21.10218 21.26110 21.47045* 21.75320 22.08603 22.53002 22.98066 23.47108 21.13103* 21.21013 21.33930 21.57965 21.82664 22.11340 * indicates lag order selected by the criterion LR: sequential modified LR test statistic (each test at 5% level) FPE: Final prediction error AIC: Akaike information criterion SC: Schwarz information criterion HQ: Hannan-Quinn information criterion E.3 Johansen cointegration test Date: 08/09/12 Time: 16:20 83 Sample (adjusted): 2007M03 2011M12 Included observations: 58 after adjustments Trend assumption: Linear deterministic trend Series: MEMBERS POSTED_ADDS VIEWED_ADDS Exogenous series: DUMBREAK Warning: Critical values assume no exogenous series Lags interval (in first differences): 1 to 1 Unrestricted Cointegration Rank Test (Trace) Hypothesized No. of CE(s) Eigenvalue Trace Statistic 0.05 Critical Value Prob.** None * At most 1 * At most 2 0.353786 0.273508 0.030253 45.63863 20.31438 1.781756 29.79707 15.49471 3.841466 0.0004 0.0087 0.1819 Trace test indicates 2 cointegrating eqn(s) at the 0.05 level * denotes rejection of the hypothesis at the 0.05 level **MacKinnon-Haug-Michelis (1999) p-values Unrestricted Cointegration Rank Test (Maximum Eigenvalue) Hypothesized No. of CE(s) Eigenvalue Max-Eigen Statistic 0.05 Critical Value Prob.** None * At most 1 * At most 2 0.353786 0.273508 0.030253 25.32425 18.53262 1.781756 21.13162 14.26460 3.841466 0.0121 0.0100 0.1819 Max-eigenvalue test indicates 2 cointegrating eqn(s) at the 0.05 level * denotes rejection of the hypothesis at the 0.05 level **MacKinnon-Haug-Michelis (1999) p-values The panels show the results of the Johansen cointegration test for the variables members, posted advertisements and viewed advertisements of the freight exchange. The trace test (panel 1) rejects the H0 that of at most one cointegrating vectors. The max test (panel 2) confirms the rejection of the H0 of one cointegrating vector. Two integrating equations should be implemented in our model. 84 E.4 Impulse response function Model II Response to Cholesky One S.D. Innovations ± 2 S.E. Response of DIF_CARGO to DIF_CARGO Response of DIF_CARGO to VEHICLE Response of DIF_CARGO to COMBINATION 20 20 20 10 10 10 0 0 0 -10 -10 -10 -20 -20 2 4 6 8 10 12 14 16 18 20 -20 2 Response of VEHICLE to DIF_CARGO 4 6 8 10 12 14 16 18 20 2 Response of VEHICLE to VEHICLE 8 8 6 6 6 4 4 4 2 2 2 0 0 0 -2 -2 -2 -4 2 4 6 8 10 12 14 16 18 20 4 6 8 10 12 14 16 18 20 2 Response of COMBINATION to VEHICLE 6 6 4 4 4 2 2 2 0 0 0 -2 2 4 6 8 10 12 14 16 18 20 10 12 14 16 18 20 4 6 8 10 12 14 16 18 20 Response of COMBINATION to COMBINATION 6 -2 8 -4 2 Response of COMBINATION to DIF_CARGO 6 Response of VEHICLE to COMBINATION 8 -4 4 -2 2 4 6 8 10 12 14 16 18 20 2 4 6 8 10 12 14 16 85 18 20 F. Freight exchange fraud F.1 2008 2008 Region Month Day Transport section Load Loss Amount of reports 8 Gelderland-Midden Kennemerland Limburg-Noord Zeeland Unknown February March May December Tuesday Wednesday Thursday Within the Netherlands The Netherlands - Italy The Netherlands - Germany Unknown Electronics Unknown € 50.000 - € 100.00 > € 250.000 Unknown 1 1 4 1 1 3 3 1 1 2 3 3 1 3 3 1 7 1 2 1 5 Amount of reports 3 Haaglanden Kennemerland Midden- en West-Brabant April May August Tuesday Wednesday Spain – The Netherlands France – The Netherlands Spain - Belgium Alcoholic beverages Food supplies € 50.000 - € 100.00 Unknown 1 1 1 1 1 1 2 1 1 1 1 2 1 2 1 F.2 2009 2009 Region Month Day Transport section Load Loss 86 F.3 2010 2010 Region Month Day Transport section Load Loss Amount of reports Amsterdam-Amstelland Brabant Zuid-Oost Flevoland Gelderland Midden Kennemerland Limburg-Noord Noord- en Oost-Gelderland Utrecht Zuid-Holland Zuid Unknown January March June October December Unknown Monday Tuesday Wednesday Thursday Friday Unknown The Netherlands - France The Netherlands - Italy The Netherlands - Germany Italy – The Netherlands Spain – Belgium Unknown Electronics Alcoholic beverages Car components Miscellaneous Food supplies Unknown < € 50.000 € 50.000 - € 100.000 € 100.000 - € 250.000 > € 250.000 Unknown 13 2 1 1 1 1 1 1 2 1 2 1 8 1 1 1 1 1 1 3 3 4 1 2 2 6 1 1 1 7 1 1 2 1 1 3 2 5 2 1 87 F.4 2011 2011 Region Month Day Transport section Load 88 Amount of reports Amsterdam-Amstelland Brabant Noord Flevoland Groningen Limburg-Noord Limburg - Zuid Midden- en West-Brabant Noord- en Oost-Gelderland Rotterdam-Rijnmond Utrecht Zeeland Zuid-Holland Zuid March April May August September October December Monday Tuesday Wednesday Thursday Friday Saturday Sunday The Netherlands - France The Netherlands - Italy The Netherlands - Spain The Netherlands – United Kingdom The Netherlands – Czech Republic The Netherlands - Poland Spain – The Netherlands Austria – The Netherlands Belgium - France Germany - France Belgium - Spain Alcoholic beverages 17 1 1 1 1 3 1 1 2 2 2 1 1 3 2 3 2 2 3 2 2 3 5 4 1 1 1 3 1 3 1 1 1 2 2 1 1 1 1 Loss Car components Miscellaneous Food supplies Copper < € 50.000 € 50.000 - € 100.000 € 100.000 - € 250.000 > € 250.000 Unknown 1 1 13 1 3 5 1 1 7 89