fig3_stolen-info-list