Burglary Chapter 15. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 THE NATURE OF BURGLARY Burglaries are among the most difficult.

Slides:



Advertisements
Similar presentations
Partners National Sheriffs Association Bureau of Justice Assistance, Office of Justice Programs, U.S. Department of Justice.
Advertisements

Patrol Procedures Chapter 3. Traditional Methods Administrative Activities – Activity logs, meetings, traffic studies Officer Initiated Activities – Traffic.
Criminal Justice 2011 Chapter 10: ROBBERY
Store Security. STORE SECURITY Customer Service Acknowledge all customers Make eye contact. A possible robber will think twice if he thinks that he can.
House Security McMaster University Security Services Sgt Cathy O ’ Donnell.
Chapter 10 Crimes Against Property. How has our society developed techniques or habits that have lowered the number of property related crimes?
Protecting Evidence Fire Cause Determination. Fire departments should investigate all fires to determine the cause of the fire. The cause of a fire is.
Essential Qualities of an Investigator
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved Chapter 3 THE CRIME SCENE Discovery, Preservation, Collection, and Transmission of.
Chapter 18 Lesson Goal After completing this lesson, the student shall be able to identify indicators of an incendiary fire and protect and preserve evidence.
1 Book Cover Here Chapter 18 ROBBERY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014, Elsevier Inc. All Rights.
Forensic Science. FORENSIC SCIENCE: The study and application of science to legal matters. Forensics derives from Latin forensis meaning “a public forum”
1 Book Cover Here Chapter 20 BURGLARY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014, Elsevier Inc. All Rights.
General Science 1 Spring ‘08 Adapted from T. Trimpe 2006
Forensic Science T. Trimpe 2006
Chapter 12 Burglary.
1 Book Cover Here Copyright © 2014, Elsevier Inc. All Rights Reserved PART B SEEKING AND OBTAINING INFORMATION: PEOPLE AND RECORDS Criminal Investigation:
Forensic Science T. Trimpe 2006
Housebreaking (a presentation by MCPF Penang)
Lesson Goal After completing this lesson, the student shall be able to identify indicators of an incendiary fire and protect and preserve evidence after.
Search Incident to Arrest MNPD Training Academy Recruit Session 42 David Veile.
8 th Grade Forensic Science T. Trimpe 2006
1 Chapter 14 Obtaining Physical and other Evidence Obtaining Physical and other Evidence.
Criminal Patterns Chapter 5. Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 Crime Patterns & Human Behavior Human beings are largely.
Forensic Science T. Trimpe 2006
Chapter 10 – Crimes Against Property. Arson The willful and malicious burning of a person’s property Intentionally burning a building to defraud the insurance.
Aim: When may force be used against a perpetrator?
4TH AMENDMENT  The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Crime Scene Investigation. “There is not only the effect of the criminal on the scene to be considered, but also the manner in which the scene may have.
Chapter 12 Robbery Hess Introduction Robbery has plagued the human race throughout history Robbery is one of the three most violent crimes against.
Chapter 1 Criminal Investigation: An Overview
Crime Scene Basics Forensic Science
Chapter 10 Robbery.
Searching the Crime Scene
Criminal Evidence Chapter 3
Class Name, Instructor Name
Crime Scene Basics Forensic Science.
Crime Scene Basics Forensic Science.
Crime Scene Basics Forensic Science
Crime Scene Basics Forensic Science
Crime Scene Basics.
Investigative Applications 29.6
Crime Scene Basics Forensic Science.
Forensic Science Unit Two
Crime Scene Basics Forensic Science
8th Grade Forensic Science
Crime Scene Basics Forensic Science.
Crime Scene Basics Forensic Science
Crime Scene Basics Forensic Science
Crime Scene Basics Forensic Science
Science of Crime Scenes
Lecture 3: Crime Scene Basics
Crime Scene Basics Forensic Science
Crime Scene Basics Forensic Science
Crime Scene Basics Forensic Science
Crime Scene Basics Forensic Science
Crime Scene Basics Forensic Science
Crime Scene Basics Forensic Science
Crime Scene Basics Forensic Science
Crime Scene Basics Forensic Science
Crime Scene Basics Forensic Science
Crime Scene Basics Forensic Science
Crime Scene Basics Forensic Science
Crime Scene Basics Forensic Science
Crime Scene Basics Forensic Science.
Crime Scene Basics Forensic Science
Crime Scene Basics Forensic Science
Science of Crime Scenes
Crime Scene Basics Forensic Science
Crime Scene Basics Forensic Science
Presentation transcript:

Burglary Chapter 15

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 2 THE NATURE OF BURGLARY Burglaries are among the most difficult crimes to solve. Contact between burglars and victims is infrequent, and burglaries may not be immediately discovered.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 3 Burglary, Number of Offenses, YearNumber of OffensesRater per 100,000 Inhabitants 20042,143, ,154, ,151, ,116, ,

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 4 LEGAL ASPECTS OF THE CRIME OF BURGLARY Common law burglary – Breaking and entering of the dwelling house of another in the nighttime, with intent to commit a felony therein. Burglary – Entering a building or structure without the consent of the person in possession of that building or structure to commit a crime therein. – In addition, certain state statutes classify it into first-, second-, and even third-degree burglary.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 5 LEGAL ASPECTS OF THE CRIME OF BURGLARY Crimes may be classified as breaking and entering rather than burglary to further distinguish the criminal act. Many people use the terms burglary and breaking and entering as synonyms when referring to any one of these offenses

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 6 TYPES OF BURGLARIES Residential burglary – A burglary committed at a dwelling place, whether occupied or vacant. – Most residential burglars target items of moderate value, such as televisions, stereo equipment, and jewelry, that are easily transported and “fenced” (sold for cash or drugs). Commercial burglary – A burglary committed at a place of business or commerce. – In many cases, commercial burglaries are better planned than residential ones.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 7 Methods of Operation During a Party – The burglar loots bedrooms or other household areas where guests leave their coats, purses, or other valuables during a party. – He or she may be a guest or a person who crashed the party. Following a Telephone Call – The burglar telephones a residence to ascertain if anyone is home.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 8 Methods of Operation Package Delivery – The burglar feigns a package delivery. If no one answers the door, he or she picks the lock and burglarizes the premises. Careless Residents – Occupants leave doors or windows unlocked or spare keys in obvious places

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 9 Methods of Operation Tunnel or Cut-In – The burglar tunnels or cuts through the roof, the ceiling, a wall, or the basement. Cat or Human Fly – Burglar is an aerialist, climbing up or down the side of a building to gain entry through a window or balcony door. Jimmy or Celluloid – Prying tool or instrument of any sort used to force open a door, window, or lock. – Jimmying is the most common method of entry to commit a burglary.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 10 Methods of Operation Hiding Out – The burglar enters a commercial establishment during regular business hours and then conceals him- or herself, remaining hidden until the business has closed and all employees have left. Opportunistic – The burglar drives around residential communities looking for a good target. Smash and Grab – The burglar smashes a store window, grabs jewelry or other display merchandise, and flees.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 11 Methods of Operation Research before Burglary – The burglar researches a potential target before striking. Dishonest Workers – Have keys to the place of employment. False Report – Report a burglary that never happened to conceal crime.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 12 Tools of the Trade Burglary tools – Any assortment of tools, picks, or household items such a scissors, paperclips, or credit cards used in committing a burglary. – The tools chosen by burglars depend on the method of entry and the type of burglary |planned, a residence, a commercial enterprise, a vault, or a safe.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 13 Tools of the Trade Burglary tools may consist of specialized tools used by locksmiths that have few other uses.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 14 INVESTIGATING BURGLARIES During the preliminary stages of a burglary investigation, the investigator should seek evidence to show the following:  The suspect was actually in the building.  The suspect was in the vicinity at the time of the burglary.  The suspect has loot or other property from the burglary.  What was the suspect’s modus operandi?

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 15 INVESTIGATING BURGLARIES The first element in this list is the most difficult to demonstrate. – In the absence of fingerprints or palm prints, investigators should try to find traces of physical evidence on the suspect or the suspect’s clothes that link the suspect to the crime scene.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 16 Precautions during the Preliminary Investigation When responding to a burglary call, an officer should be alert for people standing around, fleeing the area, or sitting in automobiles and for suspicious-looking cars parked near the scene. When answering an alarm call, a call in response to either an audible or silent alarm, officers should search the inside of the building after the owner, proprietor, or security company representative has opened it.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 17 Precautions during the Preliminary Investigation When responding to nonalarm calls, where someone has reported the crime or where the police have discovered it, the circumstances of the case should dictate the procedure required and the decision about whether to search the premises.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 18 Precautions during the Preliminary Investigation Alarm call – Notification of the police by audible or silent alarm that a crime such as a break-in has (or is) occurring. Nonalarm call – Notification of the police by citizen alert or direct observation that a crime such as a break-in has (or is) occurring.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 19 Conducting a Burglary Investigation Preliminary investigation of a burglary – Apprehension of suspects – Protection of the crime scene – Searching for evidence – Determination of the method of operation – Identification of witnesses, victims, and possible suspects

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 20 Conducting a Burglary Investigation Ideally, a burglary investigation should involve more than a single officer. When the first officer arrives on the scene, he or she should take an appropriate vantage point and await the arrival of backup units.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 21 Diagonal Deployment A method of arranging officers to both secure and observe a crime scene. Officers arrange themselves so that each can observe two sides of a building at once by placing themselves at opposing corners of the building.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 22 Burglary Suspects and Their Apprehension After the Miranda warnings have been given, other actions the investigator should take include, but are not limited to, the following: – Seize all of the suspect’s wearing apparel, including shoes, for lab examination. – Review each item of property found in the suspect’s possession. – Search the suspect’s vehicle (obtain a search warrant or the consent of the suspect).

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 23 Burglary Suspects and Their Apprehension Determine the names and addresses of all the suspect’s friends and associates. Record all discovered facts and obtain the suspect’s statement. Check the records bureau, M.O. files, bulletins, computer databases, and other sources for related or similar crimes. Follow up on such items as the suspect’s past activities and whereabouts during questionable dates and times. Fingerprint and photograph the suspect, and obtain handwriting specimens (especially useful where checks or documents may have been stolen). Follow up on any leads that result from any of the previous actions.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 24 Burglary Suspects and Their Apprehension If a search is to be conducted of a suspect’s residence, remember that the suspect’s consent and waiver or a search warrant must be obtained.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 25 Victims of Burglaries Emotional impact it has on the victim can be long term and significant. – Assist in securing the property immediately following the incident’s discovery and investigation (securing doors, windows, locks, etc.). – Suggest how to repair or replace a lock and how to better secure the premises. – Refer the victim to victim assistance agencies that may be able to provide financial aid for replacement of property stolen or for repairs. – Assist victim with filling out various forms (e.g., police forms and insurance forms). – Suggest long-term ways of better securing the premises (e.g., sensor lighting, alarms, or better locking devices).

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 26 SAFE BURGLARIES Generally, safes may be divided into two classifications: – Fire-resistant safes, or fireboxes, and – Burglar-resistant safes, or money chests or vaults. This type of safe is often made of laminated or solid steel and may have dense, heavy insulation intended to make penetration more difficult. Such safes are never burglar proof, but they can ward off a successful attack from a burglar for a certain amount of time.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 27 Attack Methods for Opening Safes Hand Manipulation – All but a lost art – Opening a combination lock by listening to and feeling the tumblers of the lock as they fell into place. – Most safes today are equipped with manipulation- proof locking systems, sometimes involving electronic locking mechanisms.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 28 Attack Methods for Opening Safes Punching – The dial knob of the safe is knocked off and a punch placed on the exposed spindle behind it. – The spindle is then driven backward with sufficient force to break the lockbox loose from its mountings. – Once accomplished, the handle can be turned and the door opened.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 29 Attack Methods for Opening Safes Hauling or Carrying Away – This method is most often used by inexperienced burglars or those who are not skilled enough to quickly and quietly open a safe on the premises. Ripping or Peeling – Fire-resistant safes because of their construction. – Metal outer shell can be peeled off the door with a bar, exposing the locking mechanism.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 30 Attack Methods for Opening Safes Pulling or Dragging – Places a heavy metal plate with a V-shape cut out of it over and behind the dial. – The plate has several heavy bolts through it. – As the screws are tightened, the V plate lifts and pulls the dial and spindle out of the safe, allowing entry. – This method is the opposite of punching. Chopping – The safe is turned upside down, and the bottom is smashed with an ax or a sledgehammer.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 31 Attack Methods for Opening Safes Torching or Burning – The oxyactylene cutting torch is one of the most effective tools used by a safe burglar. Drilling – Drilling can be a highly effective means of opening a safe, but it is time consuming.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 32 Attack Methods for Opening Safes Using Explosives Nitroglycerin, trinitrotoluene (TNT), and various plastic explosives.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 33 Investigating Safe Burglaries Safe burglars usually work in groups of two or more, and they are adept at leaving few traces of their identity at the scene of the crime. Safe burglars often case their jobs to obtain information about: – security systems – guards – possible means of entry and escape – the type and location of the safe and locking mechanisms – the habits of personnel – police patrol patterns – activities of neighborhood residents

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 34 Investigating Safe Burglaries Safe burglars do tend to develop a fairly consistent modus operandi. – Prevent unauthorized persons from entering the location. – Check the premises, inside and out, to determine the points of entry and exit and the modus operandi. – Victims or employees may help by pointing out any disturbed areas (articles that have been moved, doors opened or closed, missing items, and so on). – Attempt to reconstruct the activities of the burglars without disturbing possible trace evidence. – Sketch and photograph the scene. Include the relationship of physical evidence to the safe, the safe itself, the points of entry and exit, and any damage marks.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 35 Investigating Safe Burglaries Collect any physical evidence at the scene. Interview all persons who have access to the safe or its location. Determine the make, size, weight, and serial number of the safe. Check areas adjacent to the premises for possible shoe prints, tire prints, or discarded items.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 36 Investigating Safe Burglaries Have identifiable stolen property indexed in the records bureau. Examine pawnshop and secondhand store records for stolen items. Consult personal or department M.O. files for possible leads. Send bulletins to other police agencies describing the identifiable missing items.

Copyright ©2008 The McGraw-Hill Companies, Inc. All rights reserved. 37 NATIONAL CRIME INFORMATION CENTER Tracing and recovering stolen property is much easier using the National Crime Information Center (NCIC) operated by the FBI. Using connecting terminals throughout the United States, local, state, and federal law enforcement agencies can access the NCIC to obtain information on stolen, missing, or recovered weapons; stolen articles, vehicles, and license plates; and stolen, embezzled, or missing securities. Also available are other databases such as the Missing Persons File and the Violent Gang/Terrorist File.