 |  Criminal Investigation, 8/e Charles R. Swanson,
University of Georgia Neil C. Chamelin,
Assistant State Attorney, Second Judicial Circuit Leonard Territo,
University of South Florida- Tampa
Burglary
Chapter Objectives
1) Be familiar with different types of burglars. |
 |  |  | 2) Describe appropriate responses to burglaries in progress. |
 |  |  | 3) Recognized burglary tools. |
 |  |  | 4) Explain several methods of attacking safes. |
 |  |  | 5) Identify types of evidence to be collected in safe burglaries. |
 |  |  | 6) Describe the characteristics of residential burglaries. |
 |  |  | 7) Understand the investigator’s burglary prevention role. |
 |  |  | 8) Outline strategies for investigating criminal fences and other stolen-property outlets. |
 |  |  | 9) Describe techniques for reducing the risk for commercial burglary. |
|