Detailed Contents

Preface xvii Acknowledgments xvii

1 Introduction 1 1 Fads and Fashions in 2 The Emergence of Criminology 2 Crime and 3 Sumner’s Types of Norms 3 Crime File 1.1 The FBI’s Ten Most Wanted Fugitives 4 Research Methods Mala in Se and Mala Prohibita 7 2 Social Change and the in Criminology 21 Emergence of 8 Theory and Methodology 21 Consensus Versus Conflict The Research Enterprise Versus Interactionist of Criminology 22 Model of Law 9 Objectivity 22 Crime File 1.2 of the Ethics in Criminological Research 22 Twentieth Century 10 Crime File 2.1 Scientific Evil: Crime and 11 The Guatemala Syphilis Study 23 Who Defines Crime? Who Is Criminal? 24 Criminological Definitions 12 Official Statistics—The Crime File 1.3 What Is Crime? 13 Uniform Crime Report (UCR) 25 The Crime Problem 14 Sources of Crime Statistics 25 The Cost of Crime 15 The Crime Indexes: Violent Summary 16 and Property Crime 26 Key Concepts 17 Issues and Cautions in Studying Review Questions 17 UCR Data 29 Web Sources 17 Crime File 2.2 The Crime Dip 31 Web Exercises 17 Alternative Data-Gathering Selected Readings 18 Strategies 33 Experiments in Criminology 34 Some Examples of Experiments in Criminology 34 Evidence-Based Research 35 Crime File 2.3 CrimeSolutions.gov: Research at the Office of Programs 37 Surveys 37 Victim Surveys 37 National Crime Victimization Survey (NCVS) 38 Crime File 2.4 Were You a Victim of Crime? 38 Issues and Cautions in Studying Crime File 3.4 Racial Profiling 68 Victim Data 39 Crime File 3.5 Native Americans and Self-Report Measures of Crime 40 Crime 69 Crime File 2.5 Self-Reported Regional Variation in Crime 71 Delinquency Items 40 Urban/Rural Differences Participant Observation 41 in Crime 72 Participant Observation of Criminals 41 and Crime 72 Evaluation of the Method of The and Crime 72 Participant Observation 42 Education and Crime 74 Life and Case Studies 43 and Crime 75 Crime File 2.6 Confessions of War and Crime 75 a Dying Thief 43 Economy and Crime 76 Unobtrusive Measures 44 Mass Media and Crime 76 Crime File 2.7 Useful Sources for Summary 78 Criminological Research 44 Key Concepts 79 Crime File 2.8 The Black Dahlia Review Questions 79 45 Web Sources 80 Validity, Reliability, and Triangulation 46 Web Exercises 80 Crime File 2.9 The FBI Reading Selected Readings 80 Room 47 Summary 48 Key Concepts 49 Review Questions 50 Web Sources 50 Web Exercises 50 Selected Readings 51

4 What Is ? 83 Leah Daigle, Georgia State University 83 The Nature of Victimization 83 The Typical Victimization and Victim 85 The Costs of Victimization 86 3 General Characteristics of Economic Costs 86 Crime and Criminals 53 System Costs 88 Crime File 4.1 The Story of James 88 Caution in Interpreting Crime Data 53 Mental Health Consequences International Variations in Crime 54 and Costs 89 The Prevalence of Crime 56 Fear of Crime 90 Trends in Crime 57 Recurring Victimization 90 Crime File 3.1 American Crime Theories of Victimization 91 Problems From a Global The Role of the Victim in Crime 92 Perspective 58 Crime File 4.2 When Offender Age and Crime 59 Becomes Victim 92 Crime File 3.2 Meeting the Challenge of Routine Activities and Lifestyles Transnational Crime 60 Theory 94 Crime File 3.3 What Is the Relationship Structural Causes of Victimization 95 Between Age and Crime? 62 Caring for the Victim 96 Gender Differences in Criminality 64 Victims’ Rights 96 and Crime 65 Victim Remedies and Services 97 Race and Crime 66 Summary 101 Key Concepts 102 Review Questions 103 Web Sources 103 Web Exercises 103 Selected Readings 103

6 Biological and Psychological Theories 129 Positivist Theory 129 Precursors of Positivism 130 Biological Theories 130 130 Charles Goring 132 The Jukes and Kallikaks 133 5 Early and Classical Earnest Hooton 133 Criminological Body Types 134 A Critique of Early Biological Theories 107 Theories 135 More Recent Biological Theories 136 Theory 108 Brain Disorders 136 Crime File 5.1 The Nacirema Twin Studies 137 Undergraduate as Criminal: A Adoption Studies 137 Criminological “Why do it?” 108 Problems With Twin/Adoption Major Theoretical Approaches 111 Studies 137 Demonological Theory 111 XYY Syndrome 138 Classical Theory 112 Other Biological Factors 138 Neoclassical Theory 116 A Critique of Neobiological Crime File 5.2 “Designing Out” Theories 141 Gang Homicides and Street Psychological Theories 142 Assaults: Situational Crime Freudian Theory 142 Prevention 117 Psychometry 143 Crime File 5.3 Justifications Hans Eysenck 144 for 118 Crime File 6.1 Crime Profiling 144 Ecological Theory 119 B. F. Skinner 145 Forerunners of Modern Albert Bandura 145 Criminological Thought 123 Samuel Yochelson and Economic Theory 123 Stanton Samenow 145 The Theory–Policy Intelligence and Crime 146 Connection 124 Crime File 6.2 The Insanity Summary 125 Defense 147 Key Concepts 126 Crime File 6.3 The Flynn Effect: Review Questions 126 Sex, Race, and IQ 151 Web Sources 127 The Theory–Policy Connection 151 Web Exercises 127 Summary 152 Selected Readings 127 Key Concepts 154 The Theory–Policy Connection 177 Review Questions 154 Summary 178 Web Sources 154 Key Concepts 179 Web Exercises 154 Review Questions 179 Selected Readings 155 Web Sources 180 Web Exercises 180 Selected Readings 180

7 Sociological Mainstream Theories 157 Major Sociological Theoretical Approaches in Criminology 158 8 Sociological Critical Theories 158 Theories and Integrated Émile Durkheim and Anomie 158 Theories 183 Merton’s Theory of Anomie 159 Robert Agnew’s General Strain Mainstream Versus (GST) 161 Criminology 183 Subcultural Theories 162 184 Cohen’s Lower-Class Reaction 184 Theory 162 Lemert’s “Secondary Deviance” 186 Cloward and Ohlin’s Differential A Critique of Labeling Theory 186 Opportunity Theory 163 John Braithwaite’s Shaming Social Process Theories 164 Theory 187 The Chicago School 164 188 Shaw and McKay’s Social Austin Turk 188 Disorganization Theory 165 William Chambliss and Richard Sutherland’s Theory of Differential Quinney—Conflict Theory 189 Association 167 W. E. B. Du Bois 189 Crime File 7.1 Designing Out Jeffrey Reiman 190 Crime 168 Feminist Criminology 190 Miller’s Focal Concerns Theory 170 New Critical Criminology 191 Matza’s Delinquency and Drift 191 Theory 171 Peacemaking 192 Social Control Theories 173 Crime File 8.1 Incorporating Restorative Reckless’s Containment Theory 173 and Justice Into American Hirschi’s Social Bond Theory 174 Sentencing and 192 Gottfredson and Hirschi’s General Postmodernism 196 Theory of Crime 174 Radical “Marxist” Criminology 196 John Hagan’s Power-Control Richard Quinney—Radical Theory 175 Criminology 196 Developmental and Life William Chambliss 197 Course (DLC) Theories 175 Conflict Versus Marxist Criminology 198 Farrington’s Antisocial Potential Critiques of Conflict and Radical (AP) Theory 176 Criminology 198 Sampson and Laub’s Life Course Klockars’ Critique 198 Criminality 177 Integrated Theories of Crime 199 Delbert Elliott’s Integrative Theory 199 Crime File 9.6 The Problem of Terence Thornberry’s Interactional Acquaintance of College Theory 200 Students 228 Criminal Typologies 201 Robbery 229 A Critique of Typologies 202 Conklin’s Typology of Robbers 230 A Defense of Typologies 202 Domestic Violence 231 Criminal Behavior Systems 202 231 Crime File 8.2 Some Sociological Spouse Abuse 232 Typologies of Criminal Behavior 203 Elder Abuse 234 Theoretical Range and Criminological Kidnapping 234 Explanation 204 Criminal Careers of Violent The Global Fallacy 204 Offenders 234 The Theory–Policy Connection 205 Culture of Violence 234 Summary 208 Subculture of Violence 235 Key Concepts 208 Career Criminals/Violent Review Questions 209 Offenders 236 Web Sources 209 Societal Reaction 236 Web Exercises 209 Theory and Crime 237 Selected Readings 209 Summary 237 Key Concepts 238 Review Questions 239 Web Sources 239 Web Exercises 239 Selected Readings 239

9 Violent Crime 211 History of Violence in the United States 211 Murder and Mayhem 212 Types of Multiple Murder: Multicide 213 Crime File 9.1 International Violent Crime 214 Crime File 9.2 The Virginia Tech Massacre 216 Crime File 9.3 The D.C. Snipers, the BTK Killer, and the Red Lake Massacre 217 Victim Precipitation 218 10 Property Crime: Typology of Violent Offenders 219 Occasional, Legal Aspects 219 Homicide and Assault Statistics 219 Conventional, and Patterns and Trends in Violent Crime 221 Professional 241 Workplace Violence 222 Crime File 9.4 Workplace Violence: Occasional Property Crimes 242 Issues in Response 222 Shoplifting 242 School Violence 223 Vandalism 244 Guns 224 Crime File 10.1 Graffiti 245 Crime File 9.5 Deadly Lessons: Motor Vehicle 245 The Secret Service Study of School Check Forgery 246 Shooters 225 Conventional Property Sexual Assault 226 Crimes 246 Acquaintance Rape 227 Burglary 247 Rape as a Violent Act 227 Fencing Operations 248 Stings 248 Larceny-Theft 248 Arson: A Special-Category Offense 249 Criminal Careers of Occasional and Conventional Property Criminals 250 Societal Reaction 251 Professional Crime 252 The Concept of Professional Crime 252 Characteristics of Professional Crime 253 Argot 253 A Model of Professional Crime 254 Edelhertz’s Typology 254 Scams 255 Big Cons 257 Maurer’s The Big Con 257 Identity Theft 258 Ponzi Schemes 258 White-Collar Crime: Crime File 10.2 Identity Theft 258 11 Pyramid Schemes 260 Occupational and Crime File 10.3 The Bernie Madoff Corporate 281 Affair: “One Big Lie” 261 Religious Cons 262 White-Collar Crime—The The PTL Scandal 262 Classic Statement 281 Crime File 10.4 Emerging Patterns of Related Concepts 282 Professional Crime 263 The Measurement and Cost of Crime File 10.5 Nigerian Letter Occupational and Corporate Scams 264 Crime 282 Boosters 264 The History of Corporate, Organizational, Cannons 265 and Occupational Crime 284 Crime File 10.6 Shoplifting 265 Legal Regulation 286 Professional Burglars 267 Occupations and the Law 286 The Box Man 267 Organizations and the Law 288 The Professional Fence 268 Occupational Crime 290 Paper Hangers 268 Crimes by Employees 290 Crime File 10.7 Busting the Crimes by Employees Against Biggest Band Individuals (the Public) 290 of Cable Pirates in U.S. History 269 Crimes by Employees Against Professional Robbers 270 Employees 295 Professional Arsonists 271 Crimes by Employees Against Professional Auto Theft Rings 271 Organizations 295 Professional Killers 272 Crimes by Individuals (or Members Criminal Careers of of Occupations) 297 Professionals 272 Crime File 11.1 Investigating Crime File 10.8 Car Cloning: A New Insurance Fraud 299 Twist on an Old Crime 273 301 Crime File 10.9 House of Cards: Casino Crimes by Organizations/Corporations Cheating Ring Dismantled 274 Against Individuals (the Public) 302 Societal Reaction 275 Crime File 11.2 Financial Crimes: FBI Theory and Crime 276 Releases Annual Report to the Public 304 Summary 276 Crime File 11.3 The Great Savings and Key Concepts 278 Loan Scandal: The Biggest White-Collar Review Questions 278 Crime in U.S. History 306 Web Sources 279 Crime File 11.4 The Donora Fluoride Web Exercises 279 Death Fog: A Secret History of America’s Selected Readings 279 Worst Air Pollution Disaster 310 Crimes by Organizations Secret Police 329 Against Employees 312 Human Rights Violations 330 Crimes by Organizations (Corporations) Patriarchal Crime 331 Against Organizations 314 Genocide 332 Crime File 11.5 Pirates of the Internet: Crimes by Police 333 Criminal Warez Groups 316 Illegal Surveillance, Disruption, and Criminal Careers of Occupational and Experiments 335 Organizational Offenders 317 Scandal 335 Corporate Environment and Crime 317 Crime File 12.2 White House Corporate Concentration 317 Crime and Scandal: From Rationalizations 317 Washington to George W. Bush 336 Societal Reaction 318 Crimes Against Government 337 Why the Leniency in Punishment? 318 Protest and Dissent 337 Theory and Crime 319 Social Movements 338 Summary 320 Assassination 339 Key Concepts 321 Espionage 341 Review Questions 321 Crime File 12.3 The Robert Web Sources 322 Hanssen Spy Case 343 Web Exercises 322 Political “Whistle-Blowing” 344 Selected Readings 322 Terrorism 345 Crime File 12.4 Narco-Terrorism: Drugs and Terrorism a Dangerous Mixture, DEA Official Tells Senate Judiciary Committee 349 Crime File 12.5 The Turner Diaries, ZOG, and the Silent Brotherhood—The Order 351 Crime File 12.6 State Department Strategic Assessment of International Terrorism 353 Crime Careers of Political Criminals 354 The Doctrine of Raison d’Etat 355 Terrorism and Social Policy 355 Societal Reaction 355 Theory and Crime 356 Summary 356 Key Concepts 358 Review Questions 358 Web Sources 358 Web Exercises 358 Selected Readings 359

12 and Terrorism 325 Ideology 325 Political Crime: A Definition 326 Legal Aspects 326 Crime File 12.1 September 11, 2001 327 The Nuremberg Principle 328 The Universal Declaration of Human Rights 329 13 361 International Law 329 Organized Crime: A Problematic Crimes by Government 329 Definition 361 Sources of Information on Organized Theory and Crime 399 Crime 362 Summary 399 Types of Organized Crime (Generic Key Concepts 401 Definitions) 362 Review Questions 401 The Organized Crime Continuum 364 Web Sources 401 Street Gangs 365 Web Exercises 401 International Organized Crime 367 Selected Readings 402 Yakuza 367 Chinese Triad Societies 368 Russian Organized Crime 369 The Nature of Organized Crime 371 Ethnicity and Organized Crime 371 Crime File 13.1 Kill the Irishman: The Danny Greene Mob and the Death of the Cleveland Mafia 372 Money Laundering 374 Drug Trafficking 375 Colombian Cartels 375 The Underground Empire 376 Mexico’s Drug War 376 Theories of the Nature of Syndicate Crime in the United States 376 14 Public Order The Cosa Nostra Theory Crime 405 (The Cressey Model) 376 Crime File 13.2 The Origin of the Broken Windows 406 Mafia 377 406 The Patron Theory (The Albini Types of Prostitution 407 Model) 378 Massage Parlors 408 The Italian American Syndicate Johns 409 (IAS) 378 Underage Prostitutes 409 The Classic Pattern of Organized Homosexual Behavior 410 Crime 380 Crime File 14.1 Laud Humphreys’ Strategic and Tactical Crimes 380 Tearoom Trade 411 Illegal Businesses and Activities 381 Sexual Offenses 412 Crime File 13.3 “Snakeheads” and Paraphilia 412 Software Mobsters 382 Non-Victimless Sexual Crime File 13.4 Mobsters, Unions, Offenses 413 and the Feds 383 Sexual Predators 413 Crime File 13.5 Human Traffickers Crime File 14.2 Child Sexual Indicted 385 Abuse by Catholic Priests 414 Big Business and Government 386 Incest 415 A Brief History of Organized Crime in the Characteristics of United States 387 Sex Offenders 416 Before 1930 387 Drug Abuse 416 Crime File 13.6 The Evolution of Drugs and History 416 Transnational Organized Crime 388 Crime File 14.3 Moral Panics and the The Luciano Period 390 Strange Career of Captain Richmond The Genovese Period 391 Hobson— 417 The Apalachin Meetings 391 Drug Use in the United States: The Gambino Period 391 The Drug Dip? 418 The Commission Trials 392 Drug Abuse and Crime 419 Crime File 13.7 Mafia Takedown 394 Drunkenness 419 Crime Careers of Organized Special Populations 420 Criminals 396 Societal Reaction 421 Public and Legal Reaction 396 Overcriminalization 421 Drug Control Strategies 396 Decriminalization 422 Investigative Procedures 397 Theory and Crime 423 and Organized Crime 397 Summary 423 Key Concepts 425 Summary 441 Review Questions 425 Key Concepts 442 Web Sources 425 Review Questions 442 Web Exercises 425 Web Sources 442 Selected Readings 426 Web Exercises 442 Selected Readings 442

15 Computer Crime 429 Types of Computer Crime 430 16 Epilogue 445 Crime File 15.1 Operation Ghost Click: The Future of Crime 445 International Cyber Ring That Infected Predicting the Future of Crime: Millions of Computers Dismantled 431 Methods 445 Types of Attacks on Computer Other Crime Predictions 446 Systems 432 Crimewarps 446 Argot of Computer Crime 433 The Future of Digital Crime 447 Crime File 15.2 Operation Bot Roast: Other Predictions 447 Bot-Herders Charged as Part of British Home Office Predictions 447 Initiative 434 Crime File 16.1 Hot Products: Crime File 15.3 Cracking Down on Understanding, Anticipating, and Sexual Predators on the Internet 435 Reducing Demand for Stolen Goods 448 Online Predators 436 Summary 449 Crime File 15.4 The Bogeyman: Online Key Concepts 450 Sexual Predators 436 Review Questions 450 Crime File 15.5 Protecting Children Web Sources 450 in Cyberspace: The ICAC Task Force Web Exercises 450 Program 437 Selected Readings 450 Cyberterrorism 438 Public and Legal Reaction 439 Glossary 451 Theory and Crime 439 Crime File 15.6 Cyberspace Security: References 461 Breaking Ground in the New Photo Credits 505 Frontier 439 Index 507 Crime File 15.7 A Fine Point: Mapping Intel Sources 440 About the Author 527