Group “A” Offenses Group “B” Offenses

Total Page:16

File Type:pdf, Size:1020Kb

Group “A” Offenses Group “B” Offenses Group “A” Offenses Group “B” Offenses Group B’s MUST have an arrest to be NIBRS Reportable NIBRS NIBRS NIBRS OFFENSES CODES NIBRS OFFENSES CODES NIBRS NIBRS Arson 200 Human Trafficking NIBRS OFFENSES CODES NIBRS OFFENSES CODES -Commercial Sex Acts 64A Assault Offenses -Involuntary Servitude 64B Bad Checks 90A Family Offenses, Non- 90F -Aggravated Assault 13A Violent -Simple Assault 13B Kidnapping/Abduction 100 -Intimidation 13C Curfew/Loitering/Vagrancy 90B Liquor Law Violations 90G Larceny/Theft Offenses Violations Bribery 510 -Pocket Picking 23A -Purse Snatching 23B Disorderly Conduct 90C Peeping Tom 90H Burglary/B&E 220 -Shoplifting 23C -Theft from Building 23D Driving Under the Influence 90D Trespassing 90J Counterfeiting/Forgery 250 -Theft from Coin-Operated Machine 23E or Device Drunkenness 90E All Other Offenses 90Z -Theft from Motor Vehicle 23F Destruction/Damage/Vandalism of 290 -Theft of Motor Vehicle Parts or 23G Property Accessories Source: Association of State Uniform Crime Reporting Programs (ASUCRP). Accessed on June 6, 2014. -All Other Larceny 23H Drug/Narcotic Offenses -Drug/Narcotic Violations 35A Motor Vehicle Theft 240 -Drug/Narcotic Equip. Violations 35B Pornography/Obscene Material 370 Embezzlement 270 Prostitution Offenses Extortion/Blackmail 210 -Prostitution 40A -Assisting or Promoting Prostitution 40B Fraud Offenses -Purchasing Prostitution 40C -False Pretenses/Swindle/ Confidence 26A Games -Credit Card/Automatic Teller Machine 26B Robbery 120 Fraud -Impersonation 26C -Welfare Fraud 26D Sex Offenses (Forcible) -Wire Fraud 26E -Forcible Rape 11A -Forcible Sodomy 11B -Sexual Assault with An Object 11C Gambling Offenses -Forcible Fondling 11D -Betting/Wagering 39A Sex Offenses (Non-Forcible) -Operating/Promoting/ Assisting 39B -Incest 36A Gambling -Gambling Equip. Violations 39C -Statutory Rape 36B -Sports Tampering 39D Stolen Property Offenses 280 Homicide Offenses -Murder/Non-Negligent Manslaughter 09A Weapon Law Violations 520 -Negligent Manslaughter 09B -Justifiable Homicide 09C .
Recommended publications
  • Charging Language
    1. TABLE OF CONTENTS Abduction ................................................................................................73 By Relative.........................................................................................415-420 See Kidnapping Abuse, Animal ...............................................................................................358-362,365-368 Abuse, Child ................................................................................................74-77 Abuse, Vulnerable Adult ...............................................................................78,79 Accessory After The Fact ..............................................................................38 Adultery ................................................................................................357 Aircraft Explosive............................................................................................455 Alcohol AWOL Machine.................................................................................19,20 Retail/Retail Dealer ............................................................................14-18 Tax ................................................................................................20-21 Intoxicated – Endanger ......................................................................19 Disturbance .......................................................................................19 Drinking – Prohibited Places .............................................................17-20 Minors – Citation Only
    [Show full text]
  • Shoplifting & Internal Theft Prevention
    Computer fraud To fight the problem, institute strong policies against accepting gifts, make sure employees Many smaller companies are turning to computers require competitive bids, and rotate purchasing for checkout, billing, inventory records and agents and suppliers. Shoplifting & Internal payrolls. The technology may be new, but the crimes are the same – theft, larceny, embezzlement, Good business practices and fraud. Here are some tips to help protect your Theft Prevention business from computer crooks: good management will help avoid many of these problems. Make sure your computer is programmed to reveal unauthorized use or program Tighten your hiring practices alterations. Require job applicants to fill out a detailed application form. Then use it – contact all Separate computer programmer and operator references and former employers. functions. Minimize after-hours access to and use of the Separate functions computer. The bookkeeper should never handle cash. The Make sure programs contain a statement of person who makes purchases should not be the ownership. person who pays the bills. Your accounting system should enforce accountability through a series of Monitor and log all inputs and outputs. checks and balances. Each function should serve as a check on all the transactions that went before. Bribery & kickbacks Have an independent company audit your books The employee who lets a business every year. secret slip for a price … the loading supervisor who ignores a short Set a good personal example order for a little fee … the The boss who takes merchandise and office contracting officer who’ll supplies without paying encourages employees to speed things up for a small do the same.
    [Show full text]
  • Lifetime Likelihood of Victimization
    U. S. Department of Justice I Bureau of Justice Statistics I Lifetime Likelihood of Victimization by Herbert Koppel people's perception of the meaning of BJS Analyst March 1987 annual rates with respect to their own The Bureau of Justice Statistics lives. If the Earth revolved around the This report provides estimates of the National Crime Survey provides sun in 180 days, all of our annual crime likelihood that a person will become a annual victimization rates based rates would be halved, but we would not victim of crime during his or her life- on counts of the number of crimes be safer. time, or that a household will be vic- reported and not reported to timized during a 20-year period. This police in the United States. These Calculating lifetime victimization rates contrasts with the conventional use of a rates are based on interviews 1-year period in measuring crime and twice a year with about 101,000 For this report, lifetime likelihoods criminal victimization. Most promi- persons in approximately 49,000 of victimization were calculated from nently, the National Crime Survey nationally representative NCS annual victimization rates and life (NCS) surveys a sample of U.S. house- households. Those annual rates, tables published by the National Center holds and publishes annual victimization while of obvious utility to for Health statistics.% The probability rates, and the FBI's Uniform Crime policymakers, researchers, and that a person will be victimized at a Reports (UCR) provide annual rates of statisticians, do not convey to particular age basically depends upon crimes reported to the police.
    [Show full text]
  • Have You Been the Victim of Assault, Robbery, Harassment Or Some Other School-Related Crime?
    Have you been the victim of assault, robbery, harassment or some other school-related crime? If you have, are you: Housed at the UFT and staffed by your colleagues who ➤ Feeling vulnerable, anxious, fearful, angry or understand your school environment and both the pressures depressed? and satisfactions of your job, the Victim Support Program is the only one of its kind in the country. Services include: ➤Confused about procedures and forms? ✓ Individual and group counseling conducted by Frustrated by the paperwork involved in securing your ➤ licensed psychologists, specially trained and medical benefits, claiming line-of-duty injury, or dealing with law enforcement or other agencies? experienced in working with people who are suffering trauma. ➤ Apprehensive about returning to work? ✓ Help with forms and procedures. Call the Victim Support Program. Assistance in dealing with the police department and The Victim Support Program was established in 1989 by ✓ the United Federation of Teachers and the New York City other criminal justice agencies. Board of Education to provide comprehensive, practical ✓ Support as we accompany you to court or the Board’s assistance and psychological support to teachers and other Medical Bureau. school personnel following crimes and violent incidents in Visits to schools following violent incidents to deal school. ✓ with “ripple effect” trauma. Our goal is to help you cope with the aftermath of a criminal incident. We will support you as you strive for recovery after what we know is often a professionally and personally traumatic event. Call us. We can help! (212) 598-6853 Monday-Friday, 10 a.m.- 6 p.m.
    [Show full text]
  • The Larceny Act
    LARCENY THE LARCENY ACT ARRANGEMENT OF SECTIONS 1. Short title. PART I. Inferprefafion 2. Interpretation. 3. Definitions. 4. Offensive weapons. PART 11. Indictable Ofences 5. Simple larceny. 6. Larceny of cattle. 7. Killing animals with intent to steal. S. Larceny, etc., of dogs. 9. Larceny of wills. 10. Larceny of documents of title to land, etc. 11. Taking, destroying, etc., documents for a fraudulent purpose. 12. Damaging fixtures with intent to steal. 13. Praedial larceny. 14. Larceny of goods in process of manufxture. 15. Abstracting electricity. 16. Larceny, etc., of ore from mines, etc. 17. Larceny of postal articles. 18. Larceny in dwelling-houses. 19. Larceny from the person. 20. Larceny from ships, docks, etc. 2 1. Larceny by tenants or lodgers. 22. Larceny and embezzlement by clerks or servants. 23. Stealing or embezzlement by officer of Post Office. 24. Conversion. 25. Conversion by trustee. [The inclusion of this page Is authorized by L.N. 180At20061 LARCENY Factors obtaining advances on the property of their principals. Frauds by director. etc. Fraudulently inducing persons to invest money. Falsification of accounts. Falsification of account books of a bank. etc. Clerks. etc.. making out false dividend warrants. Personating the owner of stock. Personation with intent to obtain land. etc. Falsely acknowledging bail. etc. False pretences. Obtaining credit by fraud. Robbery. Sacrilege. Burglary. House-breaking and committing felony. House-breaking with intent to commit felony. Being found by night armed or in possession of house-breaking implements. Extortion. [Repealed by Act 29 of 200.5.] [Repealed by Act 29 of 2005.1 [Repealed byAct 29 of 2OO5.] Receiving.
    [Show full text]
  • Chapter 4: The
    VERSION 2016 THE LAW CHAPTER 4 UTAH STATE BOARD OF EDUCATION CAREER AND TECHNICAL EDUCATION CHAPTER FOUR: THE LAW “True freedom requires the ‘rule of law’ and justice, and a judicial system in which the rights of some are not secured by the denial of the rights of others.” —Johnathan Sacks INTRODUCTION What is the law? The law is a system of rules that a community or country uses to regulate the actions of the people, and that can be enforced by applying sanctions to those who violate these rules. The United States has based its laws on English law. English law is based upon two similar concepts, common law and case law or precedent. Common law centers on tradition or custom, sometimes known as the rules of the common man. This means that what had been done previously becomes the basis for how decisions are to be made today. Case law is the system by which the decision or interpretation of a judge in the original case becomes the standard by which all later identical cases will be decided. U.S. history has seen a development of our laws, and today we have four sources of written law: the Constitution, statutory law, case law, and administrative law. Case law is the set of rulings by the courts that set precedent, or the standard by which all other lower courts must abide. Statutes are laws made by the legislature, and can originate either with the states or the federal government. Administrative laws are the rules created by a regulatory agency, such as the Department of Natural Resources, Division of Fish and Game.
    [Show full text]
  • Individual Incident Entry (IIE)
    Individual Incident Entry (IIE) To begin entering a Group A or Group B incident into the state repository, click the “Incident / Arrest” button. Choose Incident or Arrest Click the “Incident Report” button to begin entering Group A incidents or click “Arrest Report” to begin enter Group B incidents into the repository. If you choose Group A, Incident …. Start with selecting either New Case or Get Previous Case Group A, New Case …. 1 2 After clicking on “New Case”: 1) enter the incident number in the box and 2) click “OK” – these steps are mandatory. Group A, Previous Case …. 1 2 After clicking “Get Previous Case”: 1) enter the incident number or partial number in the box and 2) click “Search”. Either one incident or a list of incidents with the partial number will display. Click the “Select” button to choose the appropriate case. Incident data elements …. Optional: Use only if incident date is Mandatory (if known): unknown Date incident occurred (MM/DD/YYYY) (MM/DD/YYYY) Mandatory: Use military 24-hour time; if incident occurs exactly at If an incident needs to be midnight, consider it to have removed from the repository, occurred at the beginning of the “delete” it here. following day. Optional: Physical address or Mandatory: Answer “no” or “yes” only for the latitude/longitude contribute to the offenses of: repository crime mapping feature. All Other Larceny Bribery Burglary/Breaking & Entering Credit Card/ATM Fraud Embezzlement Extortion/Blackmail False Pretenses/Swindle/Confidence Game (Fraud) Impersonation (Fraud) Motor Vehicle Theft Theft From A Building Theft from a Motor Vehicle Robbery Wire Fraud Victim data elements ….
    [Show full text]
  • WALKER V. GEORGIA
    Cite as: 555 U. S. ____ (2008) 1 THOMAS, J., concurring SUPREME COURT OF THE UNITED STATES ARTEMUS RICK WALKER v. GEORGIA ON PETITION FOR WRIT OF CERTIORARI TO THE SUPREME COURT OF GEORGIA No. 08–5385. Decided October 20, 2008 JUSTICE THOMAS, concurring in the denial of the peti- tion of certiorari. Petitioner brutally murdered Lynwood Ray Gresham, and was sentenced to death for his crime. JUSTICE STEVENS objects to the proportionality review undertaken by the Georgia Supreme Court on direct review of peti- tioner’s capital sentence. The Georgia Supreme Court, however, afforded petitioner’s sentence precisely the same proportionality review endorsed by this Court in McCleskey v. Kemp, 481 U. S. 279 (1987); Pulley v. Harris, 465 U. S. 37 (1984); Zant v. Stephens, 462 U. S. 862 (1983); and Gregg v. Georgia, 428 U. S. 153 (1976), and described in Pulley as a “safeguard against arbitrary or capricious sentencing” additional to that which is constitu- tionally required, Pulley, supra, at 45. Because the Geor- gia Supreme Court made no error in applying its statuto- rily required proportionality review in this case, I concur in the denial of certiorari. In May 1999, petitioner recruited Gary Lee Griffin to help him “rob and kill a rich white man” and “take the money, take the jewels.” Pet. for Cert. 5 (internal quota- tion marks omitted); 282 Ga. 774, 774–775, 653 S. E. 2d 439, 443, (2007). Petitioner and Griffin packed two bicy- cles in a borrowed car, dressed in black, and took a knife and stun gun to Gresham’s house.
    [Show full text]
  • The Unnecessary Crime of Conspiracy
    California Law Review VOL. 61 SEPTEMBER 1973 No. 5 The Unnecessary Crime of Conspiracy Phillip E. Johnson* The literature on the subject of criminal conspiracy reflects a sort of rough consensus. Conspiracy, it is generally said, is a necessary doctrine in some respects, but also one that is overbroad and invites abuse. Conspiracy has been thought to be necessary for one or both of two reasons. First, it is said that a separate offense of conspiracy is useful to supplement the generally restrictive law of attempts. Plot- ters who are arrested before they can carry out their dangerous schemes may be convicted of conspiracy even though they did not go far enough towards completion of their criminal plan to be guilty of attempt.' Second, conspiracy is said to be a vital legal weapon in the prosecu- tion of "organized crime," however defined.' As Mr. Justice Jackson put it, "the basic conspiracy principle has some place in modem crimi- nal law, because to unite, back of a criniinal purpose, the strength, op- Professor of Law, University of California, Berkeley. A.B., Harvard Uni- versity, 1961; J.D., University of Chicago, 1965. 1. The most cogent statement of this point is in Note, 14 U. OF TORONTO FACULTY OF LAW REv. 56, 61-62 (1956): "Since we are fettered by an unrealistic law of criminal attempts, overbalanced in favour of external acts, awaiting the lit match or the cocked and aimed pistol, the law of criminal conspiracy has been em- ployed to fill the gap." See also MODEL PENAL CODE § 5.03, Comment at 96-97 (Tent.
    [Show full text]
  • UNITED STATES DISTRICT COURT for the DISTRICT of COLUMBIA MAHINDER SINGH : : Plaintiff, : Civil Action No.: 10-1615 (RC) : V.
    Case 1:10-cv-01615-RC Document 44 Filed 07/08/14 Page 1 of 36 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA MAHINDER SINGH : : Plaintiff, : Civil Action No.: 10-1615 (RC) : v. : Re Document Nos.: 31, 36 : DISTRICT OF COLUMBIA et al., : : Defendants. : MEMORANDUM OPINION GRANTING IN PART AND DENYING IN PART DEFENDANT’S MOTION FOR PARTIAL SUMMARY JUDGMENT; DISMISSING UNNAMED JOHN AND JANE DOE OFFICERS AS DEFENDANTS; GRANTING PLAINTIFF’S MOTION TO AMEND THE STATEMENT OF MATERIAL FACTS IN DISPUTE I. INTRODUCTION Plaintiff Mahinder Singh brings suit against District of Columbia Metropolitan Police Department (“MPD”) Officer Raj Dohare, unnamed other MPD officers (the “John and Jane Doe Officers”), and the District of Columbia (the “District”), asserting individual and municipal liability claims under 42 U.S.C. § 1983 for violations of his Fourth Amendment right to be free from unreasonable seizures, as well as claims for the common law torts of malicious prosecution, intentional infliction of emotional distress (“IIED”), and abuse of process. Before the Court is the District’s motion for partial summary judgment seeking the following relief: dismissal and/or summary judgment in favor of the John and Jane Doe Officers on all counts; summary judgment on the torts of malicious prosecution, IIED, and abuse of process as to the District’s vicarious Case 1:10-cv-01615-RC Document 44 Filed 07/08/14 Page 2 of 36 liability for the alleged conduct of the John and Jane Doe Officers; and summary judgment as to the District’s municipal liability under Section 1983.1 For the reasons discussed below, the Court will grant the District summary judgment regarding its vicarious liability for the IIED tort allegedly committed by all John and Jane Doe Officers and the abuse of process tort allegedly committed by all John and Jane Doe Officers except for Officer Myisha McConaghey.
    [Show full text]
  • Virginia Model Jury Instructions – Criminal
    Virginia Model Jury Instructions – Criminal Release 20, September 2019 NOTICE TO USERS: THE FOLLOWING SET OF UNANNOTATED MODEL JURY INSTRUCTIONS ARE BEING MADE AVAILABLE WITH THE PERMISSION OF THE PUBLISHER, MATTHEW BENDER & COMPANY, INC. PLEASE NOTE THAT THE FULL ANNOTATED VERSION OF THESE MODEL JURY INSTRUCTIONS IS AVAILABLE FOR PURCHASE FROM MATTHEW BENDER® BY WAY OF THE FOLLOWING LINK: https://store.lexisnexis.com/categories/area-of-practice/criminal-law-procedure- 161/virginia-model-jury-instructions-criminal-skuusSku6572 Matthew Bender is a registered trademark of Matthew Bender & Company, Inc. Instruction No. 2.050 Preliminary Instructions to Jury Members of the jury, the order of the trial of this case will be in four stages: 1. Opening statements 2. Presentation of the evidence 3. Instructions of law 4. Final argument After the conclusion of final argument, I will instruct you concerning your deliberations. You will then go to your room, select a foreperson, deliberate, and arrive at your verdict. Opening Statements First, the Commonwealth's attorney may make an opening statement outlining his or her case. Then the defendant's attorney also may make an opening statement. Neither side is required to do so. Presentation of the Evidence [Second, following the opening statements, the Commonwealth will introduce evidence, after which the defendant then has the right to introduce evidence (but is not required to do so). Rebuttal evidence may then be introduced if appropriate.] [Second, following the opening statements, the evidence will be presented.] Instructions of Law Third, at the conclusion of all evidence, I will instruct you on the law which is to be applied to this case.
    [Show full text]
  • Shoplifting and the Law Shoplifting - a Model Code -And the Law
    If you have issues viewing or accessing this file contact us at NCJRS.gov. ~----------------------------------------------------____~ ____________________m. ____________ ~ __.. __ ~ .................. ~~ .. • • SHOPLIFTING AND THE LAW SHOPLIFTING - A MODEL CODE _ -AND THE LAW Published By NATIONAL COALITION TO PREVENT SHOPLIFTING A MODEL CODE DECA, ARF, GFWC Atlanta, Georgia Judi Rogers, Director . -r MODEL CODE AND COMMENTS Prepared By LA W FIRM OF SHELDON 1. LONDON Washington, D.C. JUVENILE JUSTICE COMMENTS Prepared By JOSEPH L. vmITE @ CoPyt':ght 1980 by th N t' 'b e a tonal Coalition To Prevent Shoplifting L1 rary of Congress Catalog Card ' Atlanta, Georgia Number: 80-85015 Prepared for the National Coalition to Prevent Shoplifting by the law firm of Sheldon I, London I ""--' SHOPLIFTING AND THE LAW - A MODEL CODE - Published By NATIONAL COALITION TO PREVENT SHOPLIFTING DECA, ARF, GFWC u.s. Department of Justice 81811 A tlanta, Georgia National Institute of Justice Judi Rogers, Director •.. This document has been reproduced exactly as received from the pers?n or organization originating it. Points of view or opinions stated In thIS documen~ ~re tho.s.e of the authors and do not necessarily repr~sent the offICIal posItIon or pOlicies of the National Institute of JustIce. Permission to reproduce this copyrighted material in mi­ crofiche onl~ has been granted by JUdl Rogers/Exec. Director NCPS to the National Criminal Justice Reference Service (NCJRS). ~urther reprodu~tion outside of the NCJRS system requires permis­ sIon of the copynght owner. MODEL CODE AND COMMENTS Prepared By LA W FIRM OF SHELDON I. LONDON Washington, D.C. JUVENILE JUSTICE COMMENTS Prepared By JOSEPH L.
    [Show full text]