‘My jag got stolen and the police did nothing – here's how I got it back'
For a moment, I doubted myself. Had I parked it around the corner? I called my husband Mark who was working (he is a litigator while I am a former lawyer-turned-mediator and coach) to see if he had moved it overnight. When he confirmed he hadn't, we were utterly baffled.
This wasn't the first car that had vanished from that spot: about seven years ago our Fiat Abarth had been stolen and, concerned about that, Mark had installed a second immobiliser in the Jaguar on top of the one it came with. This required the driver to press a series of buttons to turn it on – I often had trouble with it so couldn't imagine how a criminal would be able to bypass it. Then we remembered the AirTag. If it was still working, it might show us where it was.
Mark opened the app. To his surprise, the car was less than three miles away from our house in Brook Green – on a quiet street in Chiswick called Gladstone Road. It dawned on us that it had indeed been stolen, but that it hadn't gone far.
Unsure of what to do, Mark did a quick Google search and then called 999. The police were very busy but said they might send a patrol car at some point – if they did, they would let us know. It was a very uncertain response.
Worried that we only had a short window to get the car back before it was gone forever, and desperate to avoid the nightmare of insurance claims, I persuaded Mark that we could investigate for ourselves. We set off in my little Volkswagen Polo, heading to Chiswick.
On the nine-minute drive, our natural personalities came out. Mark was cautious and tense: he thinks everything through quite carefully, whereas I am more gung-ho. He grew up in Kent, while I'm a born-and-bred Londoner and have always found it to be an incredibly safe place. I simply couldn't believe that I would be hurt in broad daylight in this city I have always called home.
Mark was also worried that people might be hanging around the car while I felt that anyone who steals cars wouldn't want to show their face and so would be unlikely to confront us. In retrospect, I wonder if – as a man – Mark thought he needed to protect me, whereas I didn't feel that responsibility. I just wanted to get the car back as quickly as possible.
My biggest fear was that we would find the AirTag abandoned on the tarmac – so much of modern life is about being disappointed, that this seemed the most likely scenario. So when we turned onto the road and saw the Jaguar sitting there, I was delighted. And maybe a little triumphant that our adventure had concluded so well.
We inspected the car. Outside, it was untouched, but inside it was a bit of a mess: ripped up carpets and air vents torn apart. Clearly, someone had tried to bypass the immobiliser but failed. Their efforts however, meant the car was now locked; even though we had the keys in our hands, there was no way of getting it home.
We stood on the empty street, which had a small block of council flats on one side, for a few minutes before deciding to go back to our house and sort out the problem from there. A couple of hours later, after proving ownership, the Jaguar was delivered on a flatbed by a tow-truck company.
Over time, we started piecing together what had happened. The AirTag showed that the car had been in Brook Green at 3.20am, and the neighbours said they had heard a commotion about an hour or two after that, which they had assumed was the binmen coming early, but which must have been the criminals loading the car onto a flatbed. The police had asked us to keep them informed, so we called 101 and told them what had happened.
As for fixing the car up, that has been relatively easy – we had to sort out the immobiliser and then put the carpets and the air vent back as they were. The incident occurred last Tuesday and by the weekend, we were driving it to the countryside. I felt slightly icky as we set off, knowing that strangers had been inside, but mostly I was okay. They weren't too disrespectful, and I was grateful for that.
What hadn't been made clear was that by fixing it up and then using it, we were destroying evidence. When forensics examined the car a week after the incident, they said there was no hope of finding any usable DNA as far too many people handled it in the interim. Yes, it would have been inconvenient not to use it, but we would have done so if it meant they could have gathered some evidence. Not telling us this was an oversight on the police's part and one I found very frustrating.
Still, I am keen not to place too much blame on them. Blame feels good – but it is too simplistic. An officer once told me that it is normal to have 20 urgent calls on a peak night and only two to three people on duty. It is so easy to say that the increase in crime is all the police's fault – but the reality is more complex. The system is broken: there is too much focus on locking people up, but putting them in prison just teaches them how to become better criminals. If you rehabilitate them, then they become better members of society. Sadly, this is not popular with voters - but my hope is that public opinion can change.
Mostly, I worry about deterrents. If there are none, crimes like these will only proliferate. The people who stole my car were sophisticated criminals: they knew how to hack an immobiliser and had access to a flatbed. We need to ask whether it is good for society that the police force lacks the funding to investigate them properly – and think seriously about what the consequences of not doing so might be.
As told to Melissa Twigg
Broaden your horizons with award-winning British journalism. Try The Telegraph free for 1 month with unlimited access to our award-winning website, exclusive app, money-saving offers and more.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles

Epoch Times
4 hours ago
- Epoch Times
Appeals Court Tosses Lawsuit Against Social Media Companies Over 2022 Buffalo Shooting
A New York appellate court on July 25 dismissed a lawsuit filed against Meta, Google, and several other social media and Internet-based companies, in connection with the 2022 mass shooting at a grocery store in Buffalo, New York. The mass shooting at Tops Friendly Markets in Buffalo on May 14, 2022, left 10 people dead and three injured. Police arrested Payton Gendron, an 18-year-old white man, who, in November 2022, pleaded guilty to murder and hate-motivated terrorism charges. Gendron apologized for the attack.

Epoch Times
6 hours ago
- Epoch Times
‘The Medusa Protocol': Hugs, Not Guns
'The Medusa Protocol' is the second in a series of thriller novels about professional assassins attempting to forge better paths in life by using the Alcoholics Anonymous model. The novel isn't a satirical commentary or a Frederick Forsyth or Gregg Hurwitz-style thriller. Mined for Memories The first book in the series, 'Assassins Anonymous,' centered on Mark, professionally known as 'Pale Horse.' He tries to redeem himself and avoid being killed by people from his past. Its sequel, 'The Medusa Protocol,' shifts back and forth between the perspectives of Mark and his would-be love interest, another assassin named Astrid. 'The Medusa Protocol' begins with Astrid waking up in a cell, having been roughly abducted and shipped to an unknown international location. Stoic professional henchmen are everywhere; the newly constructed cell suggests they are looking to hold her captive for a long time. They also blare 'Come On, Eileen' by Dexys Midnight Runners from hidden speakers for hours on end. The future doesn't look promising for Astrid.


Forbes
7 hours ago
- Forbes
FBI Warning To 10 Million Android Users — Disconnect Your Devices Now
Discconnect now, FBI warns 10 million Android users. Update, July 26, 2025: This story, originally published on July 25, has been updated with a statement from the researchers which initially disclosed and disrupted the BadBox 2.0 operation that the FBI and Google are tackling head-on. In March, I reported that one of the largest botnets of its kind ever detected had impacted over a million Android devices. That massive attack was known as BadBox, but it has now been eclipsed by BadBox 2.0, with at least 10 million Android devices infected. Google has taken action to protect users as best it can, as well as launching legal action against the attackers, and the FBI has urged impacted users to disconnect their devices from the internet. Here's what you need to know. The FBI, Google And Others Warn Of Android BadBox 2.0 Attacks The FBI cybersecurity alert, I-060525-PSA, could not have been clearer: ongoing attacks are targeting everything from streaming devices, digital picture frames, third-party aftermarket automobile infotainment systems and other assorted home smart devices. The devices, all low-cost and uncertified, mostly originating in China, allow attackers to access your home network and beyond by, the FBI warned, 'configuring the product with malicious software prior to the user's purchase.' It has also been noted, however, that mandatory 'software updates' during the installation process can also install a malicious backdoor. Point Wild's Threat Intelligence Lat61 Team reverse-engineered the BadBox 2 infection chain and, as a result, uncovered new indicators of compromise that have been shared with global Computer Emergency Response Teams, as well as law enforcement. 'This Android-based malware is pre-installed in the firmware of low-cost IoT devices, smart TVs, TV boxes, tablets, before they even leave the factory,' Kiran Gaikwad from the LAT61 team said, 'It silently turns them into residential proxy nodes for criminal operations like click fraud, credential stuffing, and covert command and control (C2) routing.' Google, meanwhile, confirmed in a July 17 statement that it had 'filed a lawsuit in New York federal court against the botnet's perpetrators.' Google also said that it has 'updated Google Play Protect, Android's built-in malware and unwanted software protection, to automatically block BadBox-associated apps.' Human Security Behind Initial BadBox 2.0 Disclosure And Disruption Human Security, whose Satori Threat Intelligence and Research Team originally both disclosed and disrupted the BadBox 2.0 threat campaign, said at the time that researchers believed 'several threat actor groups participated in BadBox 2.0, each contributing to parts of the underlying infrastructure or the fraud modules that monetize the infected devices, including programmatic ad fraud, click fraud, proxyjacking, and creating and operating a botnet across 222 countries and territories.' If nothing else, that provides some context to the scale of this campaign. Now, Stu Solomon, the Human Security CEO, has issued the following statement: 'We applaud Google's decisive action against the cybercriminals behind the BadBox 2.0 botnet our team uncovered. This takedown marks a significant step forward in the ongoing battle to secure the internet from sophisticated fraud operations that hijack devices, steal money, and exploit consumers without their knowledge. Human's mission is to protect the integrity of the digital ecosystem by disrupting cybercrime at scale, and this effort exemplifies the power of collective defense. We're proud to have been deeply involved in this operation, working in close partnership with Google, TrendMicro, and the Shadowserver Foundation. Their collaboration has been invaluable in helping us expose and dismantle this threat.' FBI Recommendations And Mitigations — Disconnect Your Devices Now The FBI has recommended that Android users should be on the lookout for a number of potential clues that your Chinese-manufactured smart device could be infected with BadBox 2.0 malware. When it comes to mitigation, the advice is straightforward: users should 'consider disconnecting suspicious devices from their networks,' the FBI said.