Gregory Saville:

"This book is a breakthrough for the science of crime and prevention and for the criminological enterprise – both academic and practitioner. Osborne has made a contribution of considerable weight. This is a book you should read."

Qualitative Crime Pattern Identification

Saturday, August 31, 2024

Burglary: Further Reading

 Further Reading

Boba, R., Santos, R.(2006).  Burglary at Single-Family House Construction Sites, Problem-Specific Guide Series No. 43.  Problem-Oriented Guides for Police Series, Washington, DC: Office of Community Oriented Policing Services, U.S. Department of Justice.  Available at: https://popcenter.asu.edu/content/burglary-single-family-house-construction-sites-0


Clarke, RV. ( (2002). Burglary of Retail Establishments, Problem-Specific Guide Series No. 15.  Problem-Oriented Guides for Police Series, Washington, DC: Office of Community Oriented Policing Services, U.S. Department of Justice. Available at: https://popcenter.asu.edu/content/burglary-retail-establishments-0


Weisel, D.L. (2002). Burglary of Single-Family Houses, Problem-Specific Guide Series No. 18.  Problem-Oriented Guides for Police Series, Washington, DC: Office of Community Oriented Policing Services, U.S. Department of Justice. Available at: https://popcenter.asu.edu/content/burglary-single-family-houses-0

Wednesday, August 28, 2024

Analyzing Burglaries: The Challenge of Time

Most burglary reports provide a time span  rather than pinpointed an exact time of crime. How does this get analyzed?

See Jerry Ratcliffe's Aoristic analysis for one method

See this research paper for other methods: Evaluating Temporal Analysis Methods Using Residential Burglary Data

Monday, August 26, 2024

Burglar Target Selection

 Read the research article Burglar Target Selection at this link

"These findings support both opportunity-based accounts of offending, those that portray offenders as optimal foragers, and the principle of least effort; such that offenders are consistently attracted to those areas that can be reached quickly and easily, and in which there are an abundance of viable targets. Furthermore, results from two of the three regions studied are compatible with hypotheses that assert the importance of access to vehicles in shaping patterns of offender mobility."


Monday, August 19, 2024

‘Near Repeat’ Burglary Patterns

A near repeat burglary is when those that live near to a burglary victim are victimized soon after; in other words, when one home is burglarized, for a particular time period afterwards, homes nearby are at an elevated risk of burglary. 

Read: 

Interrupting ‘Near Repeat’ Burglary Patterns: Rapid Identification and Interaction with At-Risk Residents After a Burglary

Saturday, August 17, 2024

Research on Linking Serial Burglaries

The 2005 research article Between a ROC and a Hard Place: A Method for Linking Serial Burglaries by Modus Operandi brings up the point that there is very little research on how crimes such as burglary are linked by behavioral variables, and I think that is still true.

Read the reseach article here.

Citation:

Bennell, Craig & Jones, Natalie. (2005). Between a ROC and a hard place: A method for linking serial burglaries by modus operandi. Journal of Investigative Psychology and Offender Profiling. 2. 23 - 41. 10.1002/jip.21. 

Thursday, August 15, 2024

Burglary Prevention Tips

Visit these sites for some burglary prevention tips that your agency might share with its jurisdiction. As you look through them, look for the elements that might appear in burglary patterns. (Hint: one of them is poor lighting.)

Preventing Residential Burglaries

Burglary Prevention

BURGLARY PREVENTION FOR YOUR HOME

RESIDENTIAL BURGLARY PREVENTION

Tuesday, August 13, 2024

Trends in Burglary: What You Need to Know

 The Council on Criminal Justice has published the fact sheet Trends in Burglary: What You Need to Know at this link.

"The rate of burglaries reported to United States law enforcement agencies peaked in 1980, fell to an historic low in 2015, and continued to drop through 2022.

Residential burglary rates in cities with 500,000 to 999,999 residents were twice as high than in cities with fewer than 100,000 people.

The juvenile arrest rate for burglaries, once three times higher than the rate for adults, has decreased dramatically since the 1980s and is now similar to the adult rate.

Following a trend seen with other property crimes, the clearance rate for burglaries has dropped substantially since the 1960s; in 2022, 13% of all burglaries were cleared."

Monday, August 12, 2024

Burglary Tools & Equipment

Excerpted from Elements of Crime Patterns:

If an offender uses unusual tools or always uses the same tools, crimes might be linked.

Tools Variable Examples: 

bolt cutter, bump key, car lock bypass tool, chain, coat hanger, crowbar, drill, gardening tool, glass breaking tool, gas torch, glass cutter, hammer, ignition punch, “jaws of life” tool, jiggle key, key, knife, laser cutter, lock de-icer, lock pick, lock-picking kit, lock puller, lock snap gun, pliers, master key, pry bar, pry tool, rake, rope, saw, screwdriver, shimming tool, shovel, siphon, sledgehammer, slim jim, tape, tension wrench, vice grips, wire, wire cutter, wrench

Offenders may have the equipment needed to commit a crime. Knowing the types of equipment used can help link crimes. 

Equipment Variable Examples:

back pack/bag, baggies/packaging materials, binoculars, body armor, bugs, bulletproof vest, burner phones, cords, counterfeit currency, cutting agent (diluents, fillers), demand letter, disposable phones, drone, drug extraction equipment, drug manufacturing equipment (lab, chemicals), drug paraphernalia (pipe, syringe, bong), duct tape, electrical tape, fake identification document, gloves, GPS tracking device, handcuffs,  hidden camera, holographic foils and ribbons, listening device, makeup, mask, metal detectors, night vision goggles, notes, packaging material (bags, wraps), pill presses, RFID signal blocker, scales/weighing equipment, scanner/printer, signal jammer, specialized inks and papers, spy camera, telescope, tow-truck/trailer for stealing vehicles, uniform, watermark replication tools, wig, wiretapping tool, zip ties

Crime-Specific Tools/Equipment

Burglary:

Instruments: bolt cutter, brick, chopping tool, crowbars, cutting tool, cutting torch, drill, hammer, incendiary, key, knife, lock pick, mallet, pliers, prying tool, rock, saw, screwdriver, sledgehammer, stone

Equipment: climbing equipment, camera, gloves, ladder, rappelling gear, rope, special clothes, tape

 

Wednesday, August 7, 2024

Example Burglary Series: Targeting Specific Victims

This is an example of how burglars sometimes target victims based on ethnicity.

"The defendants were directly indicted by a Middlesex Grand Jury on April 18, 2024 for a total of 95 counts of unarmed burglary and breaking and entering a dwelling house in the daytime with intent to commit a felony.  The incidents giving rise to the charges occurred in the communities of Billerica, Boxborough, Carlisle, Easton,Hopkinton, Lincoln, Weston, Sudbury, Andover, Bellingham, Boxford, Franklin, Hudson, Littleton, Medway, Middleton, Millis, North Attleboro, Norwell, Pembroke, Seekonk, Sharon, Southborough, Wenham, and Westwood between July 21, 2018 and March 30, 2024. 

The residents of the majority of homes were persons of Indian or South Asian heritage. Investigators believe that they were targeted based on of their ethnicity relying on a belief that their households were more likely to contain precious metals, jewelry and other valuable heirlooms."

Read:

State Police, Local Police Partners, DA Dismantle Sophisticated B&E Ring

Serial Northeast burglary suspects' 'sophisticated' tactics: 4 ways to protect your home

Monday, August 5, 2024

Entry, Search, & Exit

This brief chapter from Elements of Crime Patterns mainly applies to burglaries and any type of breaking and entering, such as trespass. Offenders may break in to murder or sexually assault victims or commit a home invasion robbery. 

The methods used by an offender to enter, search, and exit a dwelling or building are often the only way (besides commonalities in property taken) to identify a burglary crime pattern. 

Example Variables

Point of Entry and/or Exit: 

adjacent building, back door, balcony door, balcony window, basement door, basement window, basement window well, chimney, cellar door, concealed in building, exterior garage door, fire escape, first-floor window, floor, front door, garage door, interior garage door, loading dock, elevator shaft,  roof, side door, service entrance, shutters, skylight, sliding door, underground service tunnel, underground utility tunnel, unsecured doors, unsecured windows, wall, ventilation shaft, window

Means of Entry (and related behaviors): 

bodily force, broke door panel, broke glass, broke lock, broke skylight, broke through wall, broke window, climbed a pole, climbed a tree, climbed on object to assist entry, climbed to higher floor, climbed to higher level, cut lock, cut through wall, entered through roof, forced door, exploited a gap or hole in a fence or perimeter, gap in structure that facilitated entry, hacking/digital tool, hid in building, jimmied lock, kicked door in, manual force, no force,  opened window, picked lock, pried lock, pushed door in, reached in an unlatched, reached in and unlocked, removed air conditioner, removed door, removed door panel, removed fan, removed jalousie,  removed window,  scaled wall, similar key, smash and grab, smashed glass, stolen key, stood on trash cans, tunneled, used key, used pass key, used passcode, used  plastic card, used roof hatch, used security credentials, used scaffolding platform, used stolen vehicle to ram door/wall/window, used vehicle to ram door/wall/window, went through open window

Detection Avoidance Measures: 

disabled alarm, disabled security devices, hacked a digital lock or security system, tampered with security cameras, tampered with sensors, wore a disguise, wore gloves

Search Type: 

gratuitous mess, messy, neat tidy, unnoticeable, untidy

Extent of Search: 

contents dumped, contents tipped out, cupboards opened, drawers opened, extensive – multiple rooms, limited – one room

Post-offense Behavior: 

This can include behaviors such as quickly selling stolen goods or returning to the scene of the crime.

Presence of Victim:  

absent for a short period, asleep at home, at funeral, at home but unaware of the burglary, at work, away for an extended period, on premises, on vacation

Property Security: 

alarm - audible, alarm - inoperative, alarm - silent, bars, biometric (fingerprints, retinal scan, etc.), security, card-key access system, CCTV system, code entry, community watch, concierge, deadbolt locks, digital password entry, dog on premises, fenced perimeter, guard dog,  home security system, listening device, locks, motion detector, neighborhood watch, no security, private security, security guard, security patrol, surveillance system, unlocked

 


Saturday, August 3, 2024

Repeat Burglaries

Better understanding elements of residential burglary patterns makes sense. According to a British study, 40% of residential burglars repeat offenses and residential repeat burglary victimizations occur at 19% of the time. Because some residences are repeatedly burglarized, we need to pay attention to that element. Look for it in your jurisdiction.

Read the Problem-Oriented Policing Guide Analyzing Repeat Victimization by Deborah Lamm Weisel at this link.

"In basic terms, repeat victimization is a type of crime pattern. There are several types of well-known crime patterns including hot spots, crime series, and repeat offenders. While repeat victimization is a distinct crime pattern, some offenses feature multiple crime patterns; these patterns are discussed later in this guide."

Thursday, August 1, 2024

Burglary

Looking for patterns in burglary has its challenges. There are often no witnesses and the time of the crime often cannot be pinpointed - it occurs in a time range provided by the crime reporter.

The slightly revised chapter on Burglary from the book Elements of Crime Patterns:

Burglary is the unlawful entry into a building or other structure with the intent to commit theft, vandalism, or another felony

See the blog posts later in August Entry, Search, & Exit and Tools & Equipment from Elements of Crime Patterns for important variables to consider in burglary pattern identification.

Burglary MO Variables


Objectives:

Financial Gain: Often, the primary motive is to steal money or valuables.

Thrill-Seeking: Some burglars may be motivated by the thrill of breaking and entering without detection.

Resource Gathering: Acquiring goods for resale or for use in other illegal activities.


Planning and Target Selection:

Reconnaissance: Scouting neighborhoods, businesses, or residences to identify vulnerable targets, which may involve observing routines, checking for security measures, and so on.

Timing: Choosing an opportune time for the burglary, often when occupants are away, or the area is less frequented. (It is often difficult to pinpoint the exact timing of a burglary because no one is present.) 

Information Gathering: Utilizing online platforms, like social media or property records, to gather information about the target.


Tools and Equipment:

Breaking and Entering Tools: Such as crowbars, lock picks, and screwdrivers.

Transport: A vehicle for getting to and from the scene, as well as for transporting stolen items.

Communication Devices: Prepaid mobile phones or radios to communicate with accomplices, if any.


Execution:

Entry Method: Breaking a window, picking a lock, or entering through an unlocked door or window.

Movement Inside: Often fast and directed towards areas likely to contain valuables like bedrooms or offices.

Containment: Use of bags, pillowcases, or other items to gather and contain stolen goods.

Signature Behaviors: Eating food, defecating, watching TV, or leaving graffiti  on a wall are some examples.


Evasion and Exit:

Quick Exit: Efficient routes preplanned for leaving the scene quickly.

Disguise or Change of Appearance: To avoid identification by witnesses or security cameras.

Destruction of Evidence: Disposing of tools, clothing, or stolen items packaging to leave no trace.


Intermediaries and Aftermath:

Fencing: Selling stolen goods quickly, often through pawn shops, online marketplaces, or  known associates.

Laundering Proceeds: Through various means, such as cryptocurrencies, cash businesses, or gambling.

Cooling-Off Period: A period of low activity to reduce the chances of detection, especially if the burglary attracts significant media or police attention.


Adaptation:

Changing MO: Adapting techniques, targeting different areas, or changing appearance to avoid capture or identification.


Vulnerable Residential Burglary Targets

Located near burglarized homes, on the outskirts of neighborhoods, previously burglarized, routinely vacant during the day, unoccupied for periods, vacant for extended periods 

Proximity to athletic venues, drug markets, major thoroughfares, parks, pawnshops, schools, stores, transit centers, treatment centers

Qualities: careless about security, concealing architectural designs, covered (trees and dense shrubs), displays of wealth, easily entered through side or back doors or windows, few security devices, new to neighborhood, next to alleys, no dogs, no security devices, on a corner, poor lighting, secluded, weakened entry points


Example Types of Burglary

Opportunistic Burglaries: This is the most common type of residential burglary, where a burglar takes advantage of an opportunity such as an open or unlocked door or window.

Forced Entry Burglaries: The burglar forcibly gains entry to the home by breaking a window, picking a lock, or kicking in a door.

Unlawful Entry without Force: The burglar gains entry to a home without using force, such as through an unlocked door or window.

Sneak-in Burglaries: These occur when a burglar enters a home while the residents are present, often while they are distracted or in a different part of the house.

Distraction Burglaries: In these cases, one burglar distracts the resident (often an elderly or vulnerable person) while another burglar enters the property to steal.

Ruse Entry Burglaries: The burglar poses as a utility worker, delivery person, or another trusted individual in order to gain access to the home.

Second-Story Burglaries: The burglar gains entry to a home through a second-story window, balcony, or other access point.

Garage Burglaries: The burglar gains entry through an attached garage, often by stealing or duplicating a garage door opener.

Unoccupied Residential Burglaries: These are burglaries that occur when the residents are away from home, such as during work hours, vacation, or an extended absence. Burglars may watch a home for signs of absence before striking.

Loft or Apartment Burglaries: These are burglaries in shared residential buildings. Burglars may exploit lax security in common areas or take advantage of close proximity to other residences..

Rural Burglaries: These occur in less densely populated areas, where homes may be more isolated and thus seen as easier targets.


Non-Residential Burglary

Serial non-residential burglaries refer to a series of burglaries carried out by the same person or group of people, often using similar methods, or targeting similar types of non-residential premises, such as schools or businesses. Here are some common types:

Smash and Grab: This is the most common type of commercial burglary. In this case, the burglars usually break the store's glass windows or doors (hence the name 'smash') and quickly take as much as they can before leaving the scene ('grab'). This method is fast and requires little skill.

Lock Manipulation: In these types of burglaries, the criminals manipulate or pick the locks to enter the premises. This often requires a higher level of skill and equipment, but it can be less detectable as it may not cause immediate visible damage.

Safe Cracking: These types of burglars target businesses with safes. They either force the safe open or manipulate the locking mechanism to access the contents. This requires more skill and time, but the rewards can also be higher.

Roof Entry: Some burglars will access commercial buildings via the roof, often by cutting through it. This can allow them to bypass security measures at the main entrances and go undetected until after they have left.

Rear or Side Entry: Many commercial burglaries involve entering the building through a back or side door, where there's often less visibility and less security than at the front.

Utility Access: In some cases, burglars might gain access to the premises through utility entrances, such as air vents or sewer systems. This requires a good knowledge of building layouts and systems.

Sophisticated burglaries: These are burglaries where advanced technology or equipment is used. This could include jamming alarm systems, using cloned key cards or hacking into security systems.






Fraud

 Fraud involves deceptive practices with the intention of gaining something of value, often financial, from a victim. Fraud MO Variables Obj...