550 likes | 882 Views
CHAPTER. 2. The Crime Picture. The Value of Data. Data are valuable and can be used to: Shape public policy Analyze and evaluate existing programs Create new programs _________________ Develop funding requests. Sources of Data. Uniform Crime Reports (UCR)
E N D
CHAPTER 2 • The Crime Picture
The Value of Data • Data are valuable and can be used to: • Shape public policy • Analyze and evaluate existing programs • Create new programs • _________________ • Develop funding requests
Sources of Data • Uniform Crime Reports (UCR) • National Incident Based Reporting System (NIBRS) • National Crime Victimization Survey (NCVS) • Offender self-reports • Other regular publications • Example: Sourcebook of Criminal Justice Statistics
The • Criminal • Justice • Funnel
Uniform Crime Reports-UCR • Established by Congress _____: FBI in 400 agencies, 43 states • Approximately 16,000 police agencies ____________ provide data. • Only crimes known to the police are included. • Most information reported as rates of crime & comparisons over time (IACP) • The UCR contains the Crime Index. • Uses the hierarchy rule.
UCR: Crime Index The Index is made up of Part I Offenses (arson added ______). • Part I Offenses • Violent Crime • murder, forcible rape, robbery, aggravated assault • Property Crime • burglary, larceny, motor vehicle theft, arson • Crime Rate = number of crimes • 100,000 population
The UCR/NIBRS Program • 1988, the FBI’s UCR Program initiated development of a new national crime collection effort called the National Incident-Based Reporting System (NIBRS). • NIBRS represents a significant redesign of the original UCR Program. • Whereas the original UCR system was “summary based,” the newly enhanced NIBRS is ________________.
NIBRS 22 offenses include:
The UCR/NIBRS Program(2005) UCR/NIBRS in Transition (2007) FIGURE 2–2 The FBI Crime Clock, Which Shows the Frequency of Commission of Major Crimes in 2007. Source: Adapted from Federal Bureau of Investigation, Crime in the United States, 2007.
UCR: Clearance Rates • number of crimes solved • number of crimes committed ClearanceRate= Clearances are based on arrests, ___judicial dispositions.
The UCR/NIBRS ProgramPart I Offenses – 2007 Cleared by Arrest FIGURE 2–3 Crimes Cleared by Arrest, 2007. Source: Federal Bureau of Investigation, Crime in the United States, 2007.
The UCR/NIBRS ProgramUCR/NIBRS in Transition TABLE 2–2 Major Crimes Known to the Police, 2007 (UCR/NIBRS Part I Offenses)
Murder • …the _______________of a human being by another human being. • Includes: • All willful and unlawful homicides • Non-negligent manslaughter • Excludes: • ____________ • Deaths caused by accidents or negligence • Attempted murders
Data on Murder • Least likely Part I offense to occur • High clearance rate • Rates peak during warmer months • Most common in southern states • People age 20–24 are most at risk • Most perpetrators are age 20–24 • Weapon most often used: ______________ • Most often, victim and offender were “acquaintances” • Unborn Victims of Violence Act (2004)
Forcible Rape • …the carnal knowledge of a female forcibly and against her will (UCR) • Includes: • Assault or attempt to commit rape by force or threat of force • Excludes: • Assault if victim is male (UCR) • ____________________________ • Same-sex rapes • Other sex offenses
Forcible Rape: One of the Most Underreported Violent Crimes • Many victims do ______ report because they: • Think the police won’t be able to catch the suspect. • Believe that the police will be unsympathetic. • Want to avoid the embarrassment of publicity. • Fear reprisal by the rapist. • Fear additional “victimization” by court proceedings. • Want to keep family/friends from knowing.
Robbery • …the unlawful taking or attempted taking of property that is in the immediate possession of another by _________________ and/or by putting the victim in fear. • Excludes: • Pick pocketing • Purse snatching
Aggravated Assault • …unlawful inflicting of serious injury upon the person of another. • Includes: • Attempted assaults, especially when a deadly weapon is used. • The possible use of a gun, knife, or other weapon that could result in serious injury. • Excludes: • Simple assaults ______________________
Burglary • …unlawful entry of a structure to commit a ____________ or theft. • Types of burglaries: • Forcible entry • Unlawful entry without force • Attempted forcible entry 2005 – 2.1 million reported, 12.7% clearance
Larceny–theft …unlawful taking or attempted taking, carrying, leading, or riding away of property from the possession of another. 2005 - 6,776,807 reported, $5.2 billion loss ______________thefts are excluded.
Includes (self propelled, not on rails) automobiles motorcycles motor scooters trucks buses snowmobiles Excludes trains airplanes bulldozers most farm equipment ships boats spacecraft Motor Vehicle Theft
Characteristics of Motor Vehicle Theft (2005 Data) • Over 1.2 million reported: • ___________________ • 13.1% clearance rate • $7.6 billion in losses (average: $6,173) Carjacking…the taking of a motor vehicle directly from the owner by force (vehicle robbery, not cartheft)
Arson …the burning or attempted burning of property, with or without the intent to defraud. …does not include fires of unknown or suspicious origins. …became a Part I offense in 1979.
NIBRS Also collects data on:
National Crime Victimization Survey (NCVS) • Began operation in _______ • Based on victim self-reports from people ___________of age or older • Uses data collected by the Bureau of Justice Statistics • Work with a sample of more than 134,000 • people from 77,200 households • Designed to measure the “dark figure” of • crime
crimes known to the police dark figure Dark Figure of Crime all crime
NCVS • Household crime rates are highest for households: • Headed by younger people • Headed by __________________ • With six or more members • Headed by renters • Located in ________________
UCR Not everyone reports Some crimes are rarely reported Victims inaccuracies Bureaucratic influences Hierarchical counting system Contains only data that FBI thinks is appropriate NCVS There is potential for false or exaggerated reports False reports may be generated by overzealous interviewers Some people won’t respond Respondents may suffer from faulty memories Respondents may misinterpret events Hierarchical counting system Contains only data that BJS thinks is appropriate Problems with the UCR and the NCVS
Special Categories of Crime • Crime against women • Crime against the elderly • Hate crime • Corporate and white-collar crime • Organized crime • Gun crime • Drug crime • High-technology and computer crime • Terrorism
Findings of the National Violence Against Women Survey (NVAWS) • 52% of women surveyed say they have been physically assaulted as a child or as an adult. • Approximately 1.9 million women are physically assaulted in the United States each year. • 25% of women, compared to 8% of men surveyed, said they had experienced partner violence in their lifetime. • 18% of women have experienced a completed or attempted rape at sometime in their life; more than half of these were under 18 when first raped. • Women are significantly more likely to be injured during an assault. • Violence against women is primarily partner violence. • 8% of women have been stalked at some time in their lives.
Violence Against Women Act (VAWA) • Seeks to eliminate violence against women. • Act extends the Rape Shield Law to civil cases and to all criminal cases. • Provided federal funding to: • Educate police, prosecutors, and judges about special needs of female victims. • Encourage pro-arrest policies in cases of domestic abuse. • Provide specialized services for female victims of crime. • Fund battered women's shelters. • Support rape education.
Anti-Stalking Laws • All states have anti-stalking laws, which give additional protection to women. • 80% of stalking victims are women. • Cyberstalking involves using the Internet, email, or other electronic communication technologies to stalk another person.
RECORDING FROM “THE POLICE” Every move you make Every vow you break Every smile you fake Every claim you stake I'll be watching you. Every breath you take Every move you make Every bond you break Every step you take I'll be watching you. Every single day Every word you say Every game you play Every night you stay I'll be watching you. Oh can't you see You belong to me? How my poor heart aches with every step you take.
Elderly Crime Victims • Elderly victims are more likely than younger victims to: • Be victims of property crime than of violent crime. • Face offenders who are armed with guns. • _________________________ • Be victimized in or near their homes during daylight hours. • Report their victimization to the police. • Be physically injured. • Be less likely to try to protect themselves during victimization. • Fall victim to certain types of crime (elder abuse, cons)
Hate Crimes Hate crimes are crimes in which the defendant’s conduct was motivated by hatred, bias, or prejudice, based on the actual or perceived race, color, religion, national origin, ethnicity, gender, or sexual orientation of another individual or group of individuals. • Hate crimes are also called ______________. • Most hate crimes consist of intimidation, although they may also include vandalism, simple and aggravated assault, and murder. • 54.7% Race Related
Special Categories of Crime FIGURE 2–4 Motivation of Hate-Crime Offenders, 2007. Note: Total may be more than 100% due to rounding. Source: Federal Bureau of Investigation, Crime in the United States, 2007.
Corporate and White-Collar Crime • A violation of a criminal statute by a corporate entity or by its executives, employees, or agents acting on behalf of and for the benefit of the corporation, partnership, or other form of business entity. • Non-violent crime for financial gain through ____________. • The human perpetrators of corporate crime are called white-collar criminals.
Sarbanes-Oxley Act of 2002 • Created tough provisions to deter and punish corporate and accounting fraud and corruption and to protect the interests of workers and shareholders. • Mandates that CFOs personally vouch for the truth and accuracy of their companies’ financial statements. • Increased federal penalties for obstructing justice and, specifically, for _____________ or destroying documents that might aid in a criminal investigation of business practices.
Organized Crime • The unlawful activities of members of a highly organized, disciplined association engaged in supplying illegal goods and services, including gambling, prostitution, loan-sharking, narcotics, and labor racketeering, and in other unlawful activities. • Primarily a group activity. • Includes inner-city gangs. • Some organized crime activity is _____________— operating across national boundaries.
Gun Crime • Each year, approximately one million serious crimes involve the use of a handgun. • Typical year, _________murders in the United States using firearms. • Brady Handgun Violence Prevention Act of 1994
High-Tech and Computer Crime Computer crime…any crime perpetrated through the use of computer technology. Also, any violation of a federal or state computer crime statute. Also called ______________ or information technology crime.
High-Tech and Computer Crime • Computer crimes can involve: • ________________ • Communications in furtherance of criminal conspiracies • Information piracy and forgery • The dissemination of offensive materials • Electronic money laundering an d tax evasion • Electronic vandalism and terrorism, including viruses, worms, and Trojan horses • Telemarketing fraud • Illegal interception of telecommunications • Electronic funds transfer fraud
CAN-SPAM Act • 80% of email is spam. • 2004, the federal CAN-SPAM Act regulates the sending of mass emails. Requires commercial email messages contain the following: • Clear identification that the message is an advertisement • An opt-out feature • Valid physical address identifying the sender • Some states enacted similar laws.
Phishing • Computer fraud that uses official-looking e-mail messages to elicit responses from victims. • Directs people to fake websites • Instructs people to validate or update account information • Phishing schemes have targeted companies like PayPal, IBM, and eBay • ___________________form of online fraud.