SlideShare a Scribd company logo
1 of 8
Oil Field Theft -
   Overview
Oil Field Theft
ODESSA, Texas (AP) – Ten people have been arrested in the theft of about $2
million worth of oil and gas condensate from oil companies and producers in
three West Texas counties.

The arrests yesterday came following a seven-month investigation by the
Permian Basin Oilfield Theft Task Force of an oilfield theft ring operating in
Midland, Ector and Andrews counties.

Six of the suspects were charged with federal wire fraud, mail fraud and
conspiracy charges and four were arrested on state money laundering charges.

Midland County Sheriff Gary Painter said the suspects stole, in one month,
about 8,000 barrels of oil from their companies, the Odessa American reported.

Officials said the operation was a partnership between a group of men who sold
the stolen oil and gas to buyers who didn’t know of the theft.
Oil Field Theft
Taft, Calif. - A Taft woman is facing grand theft and embezzlement
charges for the alleged theft of pumping units from Aera Energy
LLC.

Investigators from the Kern County Sheriff’s Rural Crimes
Investigations Unit arrested Susan Marie Rubadeau on Oct. 8.

According to a news release, Rubadeau, a manger for SME
Corporation, arranged for the pumping units to be removed from
Aera property in the area and sold to a third party.

Investigators said the scheme was discovered when the pumping
units were eventually sold back to Aera. Rubadeau has pleaded
not guilty to the charges. She is due back in court on Dec. 14 for a
readiness hearing. She is currently free on $20,000 bail.
Oil Field Theft
Class A Misdemeanor
– $500 or more but less than $1,500

State Jail Felony
– $1,500 or more but less than $20,000

Felony of the Third Degree
– $20,000 or more but less than $100,000

Felony of the Second Degree
– $100,000 or more but less than $200,000

Felony of the First Degree
– $200,000 or more.
Oil Field Theft

Let's also assume that you are operating on
       a 5% profit margin, after taxes.

If one piece of equipment is stolen and that
 piece of equipment cost $50,000.00, it will
take $1,000,000.00 in gross sales to make
           up the $50,000.00 loss.
Oil Field Theft
 Criminals will steal whatever they can get their hands on -
     and they can get their hands on a lot of expensive
equipment in the oilfield. From $100 tools to $10,000 tongs,
      it all adds up to a big problem for energy sector
                        organizations.

    Tip of the iceberg
      some is not reported
   More at stake than just money
      bonuses, benefits, cutbacks
   Has to be something they can fence or sell outright
      Accomplished could spread through an entire network
Oil Field Theft
                             Prevent theft
Update your security systems to deny entry to unauthorized personnel.
   Add surveillance cameras and remote monitoring to leverage the
effectiveness of your security team. Educate the crew about the scope
     of the problem and how important simple things like locking a
                            doghouse are.

                                Deterrence
 Post signs alerting potential criminals that all equipment is marked and
traceable. Even if surveillance cameras didn’t prevent a crime, they can
    provide footage of the crime that helps law enforcement. Place a
   sticker on all your equipment to let thieves know they’ll have a hard
                     time fencing their ill-gotten goods.

                               GPS
Consider investing in GPS sensors for your most valuable equipment.
Oil Field Theft
                     Inventory control
  Make sure you can quickly identify when equipment is
   stolen and alert law enforcement in a timely manner

                Record Serial Numbers
  Ensure that you have the information you need to help
                   catch the criminals.

             Report Stolen Items Yesterday
Always report stolen items as quickly as possible after the
    occurrence. Confirm serial numbers before buying
equipment. By preventing the sale of stolen equipment you
 hinder the ability of thieves to profit, and thus reduce the
             desirability of oilfield equipment.

More Related Content

Viewers also liked

Viewers also liked (12)

Courage wendy et al
Courage wendy et alCourage wendy et al
Courage wendy et al
 
Windows7sins
Windows7sinsWindows7sins
Windows7sins
 
Oswal Advertisement
Oswal AdvertisementOswal Advertisement
Oswal Advertisement
 
Stenstrom Elementary Teachers Explore STEM Concepts During STEM Teacher Train...
Stenstrom Elementary Teachers Explore STEM Concepts During STEM Teacher Train...Stenstrom Elementary Teachers Explore STEM Concepts During STEM Teacher Train...
Stenstrom Elementary Teachers Explore STEM Concepts During STEM Teacher Train...
 
Jaime claudia et al
Jaime claudia et alJaime claudia et al
Jaime claudia et al
 
BarbaraZigmanResume 2016
BarbaraZigmanResume 2016BarbaraZigmanResume 2016
BarbaraZigmanResume 2016
 
Reflective Journaling in the Science, Technology, Engineering, and Math (STEM...
Reflective Journaling in the Science, Technology, Engineering, and Math (STEM...Reflective Journaling in the Science, Technology, Engineering, and Math (STEM...
Reflective Journaling in the Science, Technology, Engineering, and Math (STEM...
 
Engaging k 12 students in science through inquiry-based investigations
Engaging k 12 students in science through inquiry-based investigationsEngaging k 12 students in science through inquiry-based investigations
Engaging k 12 students in science through inquiry-based investigations
 
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
 
Preventing theft of revenue
Preventing theft of revenuePreventing theft of revenue
Preventing theft of revenue
 
Fuel Management Systems 2015
Fuel Management Systems 2015Fuel Management Systems 2015
Fuel Management Systems 2015
 
ELECTRONIC NOSE
ELECTRONIC NOSEELECTRONIC NOSE
ELECTRONIC NOSE
 

Similar to Oil field theft_-_overview

Investigating Insurance Fraud
Investigating Insurance FraudInvestigating Insurance Fraud
Investigating Insurance FraudCase IQ
 
2011 Orc We Have Come A Long Way 2
2011 Orc We Have Come A Long Way 22011 Orc We Have Come A Long Way 2
2011 Orc We Have Come A Long Way 2Alan Greggo
 
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareWhat the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareJeremiah Grossman
 
Magnum Defense Marketing Deck
Magnum Defense Marketing DeckMagnum Defense Marketing Deck
Magnum Defense Marketing DeckMichael Goldstein
 
Identity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyIDIdentity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyIDjonaspatrick12
 
Retail Cyberthreat Summit: Insights and Strategies from Industry Experts
Retail Cyberthreat Summit: Insights and Strategies from Industry ExpertsRetail Cyberthreat Summit: Insights and Strategies from Industry Experts
Retail Cyberthreat Summit: Insights and Strategies from Industry ExpertsTripwire
 

Similar to Oil field theft_-_overview (7)

Shubham tripathi
Shubham tripathiShubham tripathi
Shubham tripathi
 
Investigating Insurance Fraud
Investigating Insurance FraudInvestigating Insurance Fraud
Investigating Insurance Fraud
 
2011 Orc We Have Come A Long Way 2
2011 Orc We Have Come A Long Way 22011 Orc We Have Come A Long Way 2
2011 Orc We Have Come A Long Way 2
 
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareWhat the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
 
Magnum Defense Marketing Deck
Magnum Defense Marketing DeckMagnum Defense Marketing Deck
Magnum Defense Marketing Deck
 
Identity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyIDIdentity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyID
 
Retail Cyberthreat Summit: Insights and Strategies from Industry Experts
Retail Cyberthreat Summit: Insights and Strategies from Industry ExpertsRetail Cyberthreat Summit: Insights and Strategies from Industry Experts
Retail Cyberthreat Summit: Insights and Strategies from Industry Experts
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 

Oil field theft_-_overview

  • 1. Oil Field Theft - Overview
  • 2. Oil Field Theft ODESSA, Texas (AP) – Ten people have been arrested in the theft of about $2 million worth of oil and gas condensate from oil companies and producers in three West Texas counties. The arrests yesterday came following a seven-month investigation by the Permian Basin Oilfield Theft Task Force of an oilfield theft ring operating in Midland, Ector and Andrews counties. Six of the suspects were charged with federal wire fraud, mail fraud and conspiracy charges and four were arrested on state money laundering charges. Midland County Sheriff Gary Painter said the suspects stole, in one month, about 8,000 barrels of oil from their companies, the Odessa American reported. Officials said the operation was a partnership between a group of men who sold the stolen oil and gas to buyers who didn’t know of the theft.
  • 3. Oil Field Theft Taft, Calif. - A Taft woman is facing grand theft and embezzlement charges for the alleged theft of pumping units from Aera Energy LLC. Investigators from the Kern County Sheriff’s Rural Crimes Investigations Unit arrested Susan Marie Rubadeau on Oct. 8. According to a news release, Rubadeau, a manger for SME Corporation, arranged for the pumping units to be removed from Aera property in the area and sold to a third party. Investigators said the scheme was discovered when the pumping units were eventually sold back to Aera. Rubadeau has pleaded not guilty to the charges. She is due back in court on Dec. 14 for a readiness hearing. She is currently free on $20,000 bail.
  • 4. Oil Field Theft Class A Misdemeanor – $500 or more but less than $1,500 State Jail Felony – $1,500 or more but less than $20,000 Felony of the Third Degree – $20,000 or more but less than $100,000 Felony of the Second Degree – $100,000 or more but less than $200,000 Felony of the First Degree – $200,000 or more.
  • 5. Oil Field Theft Let's also assume that you are operating on a 5% profit margin, after taxes. If one piece of equipment is stolen and that piece of equipment cost $50,000.00, it will take $1,000,000.00 in gross sales to make up the $50,000.00 loss.
  • 6. Oil Field Theft Criminals will steal whatever they can get their hands on - and they can get their hands on a lot of expensive equipment in the oilfield. From $100 tools to $10,000 tongs, it all adds up to a big problem for energy sector organizations. Tip of the iceberg some is not reported More at stake than just money bonuses, benefits, cutbacks Has to be something they can fence or sell outright Accomplished could spread through an entire network
  • 7. Oil Field Theft Prevent theft Update your security systems to deny entry to unauthorized personnel. Add surveillance cameras and remote monitoring to leverage the effectiveness of your security team. Educate the crew about the scope of the problem and how important simple things like locking a doghouse are. Deterrence Post signs alerting potential criminals that all equipment is marked and traceable. Even if surveillance cameras didn’t prevent a crime, they can provide footage of the crime that helps law enforcement. Place a sticker on all your equipment to let thieves know they’ll have a hard time fencing their ill-gotten goods. GPS Consider investing in GPS sensors for your most valuable equipment.
  • 8. Oil Field Theft Inventory control Make sure you can quickly identify when equipment is stolen and alert law enforcement in a timely manner Record Serial Numbers Ensure that you have the information you need to help catch the criminals. Report Stolen Items Yesterday Always report stolen items as quickly as possible after the occurrence. Confirm serial numbers before buying equipment. By preventing the sale of stolen equipment you hinder the ability of thieves to profit, and thus reduce the desirability of oilfield equipment.