SlideShare a Scribd company logo
1 of 25
Burglary
Definition
• Burglary is the crime that occurs when an offender breaks into and
enters a home, place of business or other building or structure for the
purpose of committing a criminal offence. Typical offences associated
with burglary include: theft, robbery and sexual assault.
• In Canada, the Criminal Code provisions for burglary have been
replaced by the offence of ‘break and enter.’ However, the term
‘burglary’ remains in use in jurisdictions in the U.S. and elsewhere.
Stats and facts:
• Because ‘break and enter’ (‘B and E’) is most commonly associated
with property theft, it is treated as a property crime in Canadian
criminal justice statistics.
• The most recent Canadian crime statistics (2015) reveal that police
reported ‘B and Es’ (151,900 break-ins in 2014) accounted for 14% of
all property-related offences. Since 2003, rates of B and E have been
declining in Canada.
What do we know about burglary?
Research on burglary has focused largely on 5 factors:
1. offender motives and types – perhaps not surprisingly, research into
offender motives suggests that many offenders are driven by a desire
for quick, easy cash in support of an already criminal lifestyle (usually
associated with drugs and alcohol). Some researchers, notably Fox and
Farrington (2012) have developed typologies of burglary offenders
based on crime scene behaviour and demographic characteristics of
offenders in solved cases.
2. familiarity – offenders typically select targets within neighbourhoods they
know, because increased familiarity with a space means they will better
understand where there are more vulnerable and more protected spaces,
places to hide and exit and entrance routes into the area, among others. As a
result, most offenders do not travel very far to commit their offences
(Brantingham and Brantingham 1981).
3. occupancy – with the exception of sexual burglaries and home
invasions (breaking into someone’s house in order to rob them), most
burglars prefer unoccupied targets. Before attempting to break in,
burglars will check for signs that someone is home (lights, noises,
parked cars in the drive way, human silhouettes).
• 4. signs of potential rewards: since the motivation for most burglars is
financial, an important aspect of target selection is the possibility of
being able to steal items of high value. Thus, offenders look for signs
that a potential target will yield financial rewards.
5. the built environment: often found in discussions of Crime Prevention
Through Environment Design (CPTED), this is a term used to describe those
features of an area that are designed and built by humans. In relation to
burglary, the built environment typically refers to those features of a
neighbourhood or community that can increase or decrease communal
safety.
An excellent example of how a built environment can potentially deter
burglary is the gated community, which controls access to the homes within
through the use of deterrent fencing, guards, CCTV cameras and remote
control access.
More on familiarity
repeat victimization – several studies suggest that once an address has been
victimized, it can be further re-victimized multiple times. This is because it is
easier for offenders to repeat a crime where they have already been
successful than to identify a new target (Pease 1998).
In a study by Ericsson (1997), 76% of burglars interviewed stated they had
gone back to previously targeted houses to re-burgle them after a period of
time (during which the owners would likely purchase new items). Some
offenders advised they had burgled the same house between 2 and 5 times.
Familiarity continued:
• Not all homes or businesses are at equal risk of being re-victimized.
• Homes in higher-income neighbourhoods are typically re-burgled less
frequently.
• One explanation is that, once victimized, home owners spend money
installing and upgrading security features.
• Another explanation is that burglary in affluent neighbourhoods
typically requires some planning and travel, making repeats less likely,
whereas burglary in lower-income neighbourhoods, where burglars
likely live, can be more random and opportunistic (Bowers and
Johnson 2005).
Familiarity continued:
• near repeats – once a home or apartment in an area has been
burglarized, nearby residences or structures are at increased risk of
becoming victimized because it signals to the offender that this is a
‘safe’ neighbourhood within which to commit further offences. Once
a home in a neighbourhood has been victimized, subsequent victims
in the area are termed a ‘near repeat’ (Morgan 2000).
More on occupancy – day-time burglary
• Daytime burglaries are often committed by younger, less experienced
offenders, often in pairs and on foot. Ie. amateurs
• While being on foot exposes them to increased risks of being seen,
many select low-density, less secure homes with vegetation or other
cover to reduce their visibility.
• Daytime is also more opportune for avoiding
home owners; younger offenders are less willing to
risk encountering victims directly (Montoya et al. 2015).
More on occupancy – night-time burglary
• Night-time burglaries are more frequently committed by older, more
experienced offenders, working alone, and usually closer to home. Ie.
professionals
• Working at night increases the risk of encountering a victim, as does
the fact they may select more heavily guarded structures (Coupe &
Blake, 2006).
Crime prevention
A key concept in burglary prevention:
target hardening – making a home or other structure less attractive by
a. decreasing the odds of successful entry and/or
b. increasing the risk of the perpetrator getting caught.
What works to deter day-time burglaries?
In a study by Montoya and others (2015), houses were less likely to be
victimized by day-time offenders when they:
• Had a front yard or front garden
• Were attached or semi-detached dwellings (they were more likely to
be victimized if on a corner lot).
• Were located within a stable neighbourhood
• Were close to commercial establishments
• Had window screening
What works to deter night-time burglaries?
• Houses were less likely to be victimized by night-time offenders when:
• they were undetached
• they had window screening
• there were signs of a dog present
• there was visibility into the back yard or garden
Target hardening & displacement effects
• Target hardening efforts can produce a displacement effect by
making nearby homes without security measures more attractive to
offenders.
• Research by Bowers and Johnson (2005) found that near-repeats
were more likely in wealthier neighbourhoods, where the original
victim could afford to install security measures (by way of contrast,
repeat burglaries of the same dwelling more common in low income
housing).
Police response & detection
4 police strategies tested/being tested to
reduce burglary & improve detection rates:
Offender profiles
• One study tested the use of offender profiles in two areas (one area
in which the profiles were used, and another in which they were not).
• Examining arrest rates before and after the introduction of this
profiling technique, the researchers found that arrests tripled in the
test area, indicating that the profiles were more effective than
standard detection strategies (Fox and Farrington 2015). This may be
a promising area of future investigation.
Improving police response rates
• can also have a positive effect on burglary detection. A study of 2007
service calls to the Houston Police Department, found that rapid
response time can increase the probability of catching burglary
offenders in progress during the day. However, no matter how fast the
response, police were less likely to make burglary arrests at night-
time, likely due to lower visibility (Cihan et al. 2012).
• An UK study similarly found that faster response times increase the
likelihood of detection, particularly for property offenses (Vidal and
Kirchamier 2015).
Crime analysis and proactive
policing
• since burglars often return to re-victimize particular places and
neighbourhoods, creating area ‘hot spots’ and ‘hot zones’, police
agencies can effectively identify at-risk areas and target them through
increased presence, thereby increasing the chances of catching
perpetrators and/or decreasing the risk of further criminal events.
• Crime analysis has been used to catch burglars, robbers, repeat
offenders, and to break property crime rings by helping police better
target resources.
Crime prevention tactics
• by understanding how burglaries can generate ‘repeats’ and ‘near
repeats’, police can work to increase awareness of residents and
businesses of area burglaries and provide crime prevention
information to assist with target hardening, area surveillance and
crime reporting.
Thank-you!

More Related Content

What's hot

Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekar
Raghunath G
 
David GLENNON linkedin CV 2017 updated
David GLENNON linkedin CV 2017 updatedDavid GLENNON linkedin CV 2017 updated
David GLENNON linkedin CV 2017 updated
David Glennon
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
Bilal Ali
 

What's hot (10)

Gangcoptechspeak
GangcoptechspeakGangcoptechspeak
Gangcoptechspeak
 
Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"
 
Introduction to hackers
Introduction to hackersIntroduction to hackers
Introduction to hackers
 
Suspicious Activity Reporting
Suspicious Activity ReportingSuspicious Activity Reporting
Suspicious Activity Reporting
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekar
 
Social Engineering By Rakesh Nagekar
Social Engineering By Rakesh NagekarSocial Engineering By Rakesh Nagekar
Social Engineering By Rakesh Nagekar
 
David GLENNON linkedin CV 2017 updated
David GLENNON linkedin CV 2017 updatedDavid GLENNON linkedin CV 2017 updated
David GLENNON linkedin CV 2017 updated
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
 
Hernandez, Rimsky
Hernandez, RimskyHernandez, Rimsky
Hernandez, Rimsky
 
Paul Iulo is a veteran in law enforcement, private security and fire security
Paul Iulo is a veteran in law enforcement, private security and fire securityPaul Iulo is a veteran in law enforcement, private security and fire security
Paul Iulo is a veteran in law enforcement, private security and fire security
 

Similar to An Intro to Research on Burglary

Chapter 8 - External Threats and CountermeasuresSecurity a.docx
Chapter 8 - External Threats and CountermeasuresSecurity a.docxChapter 8 - External Threats and CountermeasuresSecurity a.docx
Chapter 8 - External Threats and CountermeasuresSecurity a.docx
christinemaritza
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptx
ZakiAhmed70
 
2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)
Fabio Pietrosanti
 
City of Oakland - Client Presentation
City of Oakland - Client PresentationCity of Oakland - Client Presentation
City of Oakland - Client Presentation
Joseph Duffy, MBA
 
Contemporary crime reduction strategies[1]stu
Contemporary crime reduction strategies[1]stuContemporary crime reduction strategies[1]stu
Contemporary crime reduction strategies[1]stu
mattyp99
 
murali_radhika_assignment#6_CS684.doc
murali_radhika_assignment#6_CS684.docmurali_radhika_assignment#6_CS684.doc
murali_radhika_assignment#6_CS684.doc
Radhika Murali
 

Similar to An Intro to Research on Burglary (20)

Investigation & report writing
Investigation & report writingInvestigation & report writing
Investigation & report writing
 
Burglary
BurglaryBurglary
Burglary
 
Chapter 8 - External Threats and CountermeasuresSecurity a.docx
Chapter 8 - External Threats and CountermeasuresSecurity a.docxChapter 8 - External Threats and CountermeasuresSecurity a.docx
Chapter 8 - External Threats and CountermeasuresSecurity a.docx
 
Social engineering, Emerging tech and victim support.pptx
Social engineering, Emerging tech and victim support.pptxSocial engineering, Emerging tech and victim support.pptx
Social engineering, Emerging tech and victim support.pptx
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptx
 
2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)2009: Voice Security And Privacy (Security Summit - Milan)
2009: Voice Security And Privacy (Security Summit - Milan)
 
FBI Statistics Reveal that Most Home Burglaries Happen During the Day
FBI Statistics Reveal that Most Home Burglaries Happen During the DayFBI Statistics Reveal that Most Home Burglaries Happen During the Day
FBI Statistics Reveal that Most Home Burglaries Happen During the Day
 
City of Oakland - Client Presentation
City of Oakland - Client PresentationCity of Oakland - Client Presentation
City of Oakland - Client Presentation
 
A Tale of One City
A Tale of One CityA Tale of One City
A Tale of One City
 
Home security
Home securityHome security
Home security
 
Contemporary crime reduction strategies[1]stu
Contemporary crime reduction strategies[1]stuContemporary crime reduction strategies[1]stu
Contemporary crime reduction strategies[1]stu
 
murali_radhika_assignment#6_CS684.doc
murali_radhika_assignment#6_CS684.docmurali_radhika_assignment#6_CS684.doc
murali_radhika_assignment#6_CS684.doc
 
Something is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid ThemSomething is Phishy: Cyber Scams and How to Avoid Them
Something is Phishy: Cyber Scams and How to Avoid Them
 
Social media competence and ethics Oklahoma
Social media competence and ethics OklahomaSocial media competence and ethics Oklahoma
Social media competence and ethics Oklahoma
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptx
 
TITLE IX CONFLICTS & ROLES: MHA NASPA Law Conference 2011
TITLE IX CONFLICTS & ROLES: MHA NASPA Law Conference 2011TITLE IX CONFLICTS & ROLES: MHA NASPA Law Conference 2011
TITLE IX CONFLICTS & ROLES: MHA NASPA Law Conference 2011
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
 

More from Laura Huey (7)

Interviewing Infographic
Interviewing InfographicInterviewing Infographic
Interviewing Infographic
 
Content Analysis Infographic
Content Analysis InfographicContent Analysis Infographic
Content Analysis Infographic
 
Ethnography Infographic
Ethnography InfographicEthnography Infographic
Ethnography Infographic
 
Qualitative & Quantitative Infographic
Qualitative & Quantitative InfographicQualitative & Quantitative Infographic
Qualitative & Quantitative Infographic
 
Scoping Review Infographic
Scoping Review InfographicScoping Review Infographic
Scoping Review Infographic
 
Harm focused policing
Harm focused policingHarm focused policing
Harm focused policing
 
Evidence Based Policing - Intro
Evidence Based Policing - IntroEvidence Based Policing - Intro
Evidence Based Policing - Intro
 

Recently uploaded

Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
mayurchatre90
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
RRR Chambers
 
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
ca2or2tx
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
E LSS
 

Recently uploaded (20)

Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
 

An Intro to Research on Burglary

  • 2. Definition • Burglary is the crime that occurs when an offender breaks into and enters a home, place of business or other building or structure for the purpose of committing a criminal offence. Typical offences associated with burglary include: theft, robbery and sexual assault. • In Canada, the Criminal Code provisions for burglary have been replaced by the offence of ‘break and enter.’ However, the term ‘burglary’ remains in use in jurisdictions in the U.S. and elsewhere.
  • 3. Stats and facts: • Because ‘break and enter’ (‘B and E’) is most commonly associated with property theft, it is treated as a property crime in Canadian criminal justice statistics. • The most recent Canadian crime statistics (2015) reveal that police reported ‘B and Es’ (151,900 break-ins in 2014) accounted for 14% of all property-related offences. Since 2003, rates of B and E have been declining in Canada.
  • 4. What do we know about burglary?
  • 5. Research on burglary has focused largely on 5 factors: 1. offender motives and types – perhaps not surprisingly, research into offender motives suggests that many offenders are driven by a desire for quick, easy cash in support of an already criminal lifestyle (usually associated with drugs and alcohol). Some researchers, notably Fox and Farrington (2012) have developed typologies of burglary offenders based on crime scene behaviour and demographic characteristics of offenders in solved cases.
  • 6. 2. familiarity – offenders typically select targets within neighbourhoods they know, because increased familiarity with a space means they will better understand where there are more vulnerable and more protected spaces, places to hide and exit and entrance routes into the area, among others. As a result, most offenders do not travel very far to commit their offences (Brantingham and Brantingham 1981).
  • 7. 3. occupancy – with the exception of sexual burglaries and home invasions (breaking into someone’s house in order to rob them), most burglars prefer unoccupied targets. Before attempting to break in, burglars will check for signs that someone is home (lights, noises, parked cars in the drive way, human silhouettes).
  • 8. • 4. signs of potential rewards: since the motivation for most burglars is financial, an important aspect of target selection is the possibility of being able to steal items of high value. Thus, offenders look for signs that a potential target will yield financial rewards.
  • 9. 5. the built environment: often found in discussions of Crime Prevention Through Environment Design (CPTED), this is a term used to describe those features of an area that are designed and built by humans. In relation to burglary, the built environment typically refers to those features of a neighbourhood or community that can increase or decrease communal safety. An excellent example of how a built environment can potentially deter burglary is the gated community, which controls access to the homes within through the use of deterrent fencing, guards, CCTV cameras and remote control access.
  • 10. More on familiarity repeat victimization – several studies suggest that once an address has been victimized, it can be further re-victimized multiple times. This is because it is easier for offenders to repeat a crime where they have already been successful than to identify a new target (Pease 1998). In a study by Ericsson (1997), 76% of burglars interviewed stated they had gone back to previously targeted houses to re-burgle them after a period of time (during which the owners would likely purchase new items). Some offenders advised they had burgled the same house between 2 and 5 times.
  • 11. Familiarity continued: • Not all homes or businesses are at equal risk of being re-victimized. • Homes in higher-income neighbourhoods are typically re-burgled less frequently. • One explanation is that, once victimized, home owners spend money installing and upgrading security features. • Another explanation is that burglary in affluent neighbourhoods typically requires some planning and travel, making repeats less likely, whereas burglary in lower-income neighbourhoods, where burglars likely live, can be more random and opportunistic (Bowers and Johnson 2005).
  • 12. Familiarity continued: • near repeats – once a home or apartment in an area has been burglarized, nearby residences or structures are at increased risk of becoming victimized because it signals to the offender that this is a ‘safe’ neighbourhood within which to commit further offences. Once a home in a neighbourhood has been victimized, subsequent victims in the area are termed a ‘near repeat’ (Morgan 2000).
  • 13. More on occupancy – day-time burglary • Daytime burglaries are often committed by younger, less experienced offenders, often in pairs and on foot. Ie. amateurs • While being on foot exposes them to increased risks of being seen, many select low-density, less secure homes with vegetation or other cover to reduce their visibility. • Daytime is also more opportune for avoiding home owners; younger offenders are less willing to risk encountering victims directly (Montoya et al. 2015).
  • 14. More on occupancy – night-time burglary • Night-time burglaries are more frequently committed by older, more experienced offenders, working alone, and usually closer to home. Ie. professionals • Working at night increases the risk of encountering a victim, as does the fact they may select more heavily guarded structures (Coupe & Blake, 2006).
  • 16. A key concept in burglary prevention: target hardening – making a home or other structure less attractive by a. decreasing the odds of successful entry and/or b. increasing the risk of the perpetrator getting caught.
  • 17. What works to deter day-time burglaries? In a study by Montoya and others (2015), houses were less likely to be victimized by day-time offenders when they: • Had a front yard or front garden • Were attached or semi-detached dwellings (they were more likely to be victimized if on a corner lot). • Were located within a stable neighbourhood • Were close to commercial establishments • Had window screening
  • 18. What works to deter night-time burglaries? • Houses were less likely to be victimized by night-time offenders when: • they were undetached • they had window screening • there were signs of a dog present • there was visibility into the back yard or garden
  • 19. Target hardening & displacement effects • Target hardening efforts can produce a displacement effect by making nearby homes without security measures more attractive to offenders. • Research by Bowers and Johnson (2005) found that near-repeats were more likely in wealthier neighbourhoods, where the original victim could afford to install security measures (by way of contrast, repeat burglaries of the same dwelling more common in low income housing).
  • 20. Police response & detection
  • 21. 4 police strategies tested/being tested to reduce burglary & improve detection rates: Offender profiles • One study tested the use of offender profiles in two areas (one area in which the profiles were used, and another in which they were not). • Examining arrest rates before and after the introduction of this profiling technique, the researchers found that arrests tripled in the test area, indicating that the profiles were more effective than standard detection strategies (Fox and Farrington 2015). This may be a promising area of future investigation.
  • 22. Improving police response rates • can also have a positive effect on burglary detection. A study of 2007 service calls to the Houston Police Department, found that rapid response time can increase the probability of catching burglary offenders in progress during the day. However, no matter how fast the response, police were less likely to make burglary arrests at night- time, likely due to lower visibility (Cihan et al. 2012). • An UK study similarly found that faster response times increase the likelihood of detection, particularly for property offenses (Vidal and Kirchamier 2015).
  • 23. Crime analysis and proactive policing • since burglars often return to re-victimize particular places and neighbourhoods, creating area ‘hot spots’ and ‘hot zones’, police agencies can effectively identify at-risk areas and target them through increased presence, thereby increasing the chances of catching perpetrators and/or decreasing the risk of further criminal events. • Crime analysis has been used to catch burglars, robbers, repeat offenders, and to break property crime rings by helping police better target resources.
  • 24. Crime prevention tactics • by understanding how burglaries can generate ‘repeats’ and ‘near repeats’, police can work to increase awareness of residents and businesses of area burglaries and provide crime prevention information to assist with target hardening, area surveillance and crime reporting.