Criminal Redistribution of Stolen Property: the Need for Law Reform

Total Page:16

File Type:pdf, Size:1020Kb

Criminal Redistribution of Stolen Property: the Need for Law Reform Michigan Law Review Volume 74 Issue 8 1976 Criminal Redistribution of Stolen Property: The Need for Law Reform G. Robert Blakey Cornell Law School Michael Goldsmith Vermont State Attorneys' Office Follow this and additional works at: https://repository.law.umich.edu/mlr Part of the Criminal Law Commons Recommended Citation G. R. Blakey & Michael Goldsmith, Criminal Redistribution of Stolen Property: The Need for Law Reform, 74 MICH. L. REV. 1511 (1976). Available at: https://repository.law.umich.edu/mlr/vol74/iss8/2 This Article is brought to you for free and open access by the Michigan Law Review at University of Michigan Law School Scholarship Repository. It has been accepted for inclusion in Michigan Law Review by an authorized editor of University of Michigan Law School Scholarship Repository. For more information, please contact [email protected]. CRIMINAL REDISTRIBUTION OF STOLEN PROPERTY: THE NEED FOR LAW REFORM G. Robert Blakey and Michael Goldsmith TABLE OF CONTENTS I. THE REALITIES OF MODERN FENCING SYSTEMS ___ 1523 A. Marketing Theory and the Fence ______ 1523 B. Patterns of Redistribution _________ 1528 l. The "Neighborhood Connection" _____ 1529 2. The Outlet Fence ______ 1531 3. The Professional Fence ________ 1533 4. The Master Fence __________ 1535 5. The Role of Organz"zed Crime _____ 1538 Il. SoCIAL CONTROL THROUGH LAW ____ 1542 A. Crimz"nal Sanctions _________ 1542 l. The Development of the Law ______ 1542 2. Receiving Stolen Property: A Modern Perspective ______ 1545 a. The "receipt'' of property _____ 1545 b. The goods must be stolen ---------------- 1551 c. The state of mz"nd requz"rement ----------·--------- 1558 (i). The appropriate mens rea _____ 1559 (ii). The availabz"lity of dz"rect evidence es- tablishing mens rea ______ 1562 (iii). The use of circumstantial evidence to establish mens rea _____ 1572 (iv). Strict UabUity ________ 1589 (v). Affirmative defense _______ 1593 3. Sentencing Convicted Receivers _______ 1597 B. Civil Remedz"es for Fencing Crz"mes _____ 1601 Ill CONCLUSION: BASIC TACTICS AND STRATEGY FOR LAW ENFORCEMENT _______________ 1611 Appendz"x A ___ 1614 Appendix B 1620 1511 CRIMINAL REDISTRIBUTION OF STOLEN PROPERTY: THE NEED FOR LAW REFORM G. Robert Blakey* and Michael Goldsmith'~*t Our society is permeated by a consciousness of theft: triple-locked doors of city apartments, guard dogs prowling stores and warehouses at night, retail prices and insurance rates based on the assumption that large quantities of merchandise are simply going to disappear. But our consciousness of theft tends to be limited. It is easy to imag­ ine the act itself-the forced lock or smashed window in the dead of night, the hijacker ordering the driver out of his truck cab at pistol point. It is harder to keep in mind that these acts aren't random or self-contained but are usually practical ways of acquiring goods for an established buyer. As for the dealer in stolen goods-the "fence"-there our imagination seldom goes beyond the owner of a seedy pawnshop or the character who sidles up on the street and mut­ ters, "Hey buddy, wanna buy a watch?"1 HE development of sophisticated fencing systems for the sale of Tstolen property to consumers has paralleled the industrialization of society. Although crimes against property and attempts to con­ trol them have ancient origins,2 most theft before the Industrial Revolution was committed for immediate consumption by the thieves and their accomplices rather than for redistribution in the market­ place. 3 Society's small population, inadequate transportation and * Professor of Law, Cornell Law School, and Director of the Cornell Institute on Organized Crime.-Ed. ** Deputy State Attorney, Burlington, Vt. A.B. 1972, J.D. 1975, Cornell Univer­ sity.-Ed. t These materials originated in work begun during the processing of S.13, 93d Cong. 1st Sess. (1973); S. REP. No. 93-80, 93d Cong., 1st Sess. (1973). The bill passed the Senate by a vote of 81 to O in 1972 as S.16, 92d Cong., 2d Sess. (1972) (118 CoNG. REc. 29379 (1972)) and passed again in 1973 by a voice vote (119 CoNG. REC. 10319 (1973)). No action was taken in the House Judiciary Committee, "not . • . [because of] a lack of support for the bill but . [because of] the com­ mittee's heavy work load." N.Y. Times, May 5, 1974, at 69, col. 3 (late city ed.), New legislation was not introduced in the 94th Congress. 1. Chasan, Good Fences Make Bad Neighbors, N.Y. Times, Dec. 29, 1974, § 6 (Magazine), at 12. 2. Biblical tradition has it that disobedience began with God's first command to man. See Genesis 2:16-17, 3:4-6. Laws concerning theft and robbery may be found in many sections of the Old Testament. See, e.g., Exodus 22: 1-4; Leviticus 6: 1-5, 19: 13; Proverbs 29:24. For a discussion of theft in pdmitive society, see A. DIA­ MOND, THE EVOLUTION OF LAW AND ORDER 12, 35, 50-51, 108-15 (1951). 3. "Until the seventeenth century the amount of movable property available for theft and the opportunities to dispose of this property except by personal consumption 1512 August 1976] Criminal Distribution of Stolen Property 1513 communication systems, and technological inability to mass produce identical goods constrained large-scale fencing because there were few buyers and because stolen property could be readily identified. 4 The unprecedented economic5 and demographic6 growth in eight­ eenth-century Europe, however, removed these practical constraints and made possible the profitable fencing operations7 that are now firmly institutionalized in industrial societies. Although these social and technological developments are impor­ tant, they do not provide a complete explanation for the rising theft rate or for the tremendous amount of property successfully redistrib­ uted annually. 8 Instead, these problems must be attributed in large part to our society's failure to identify properly the economic rela­ tionship underlying theft and redistribution and, consequently, to our inability to develop successful methods of legal control. 9 An understanding of the economic causes of property theft re­ quires brief consideration of the relationship between the two major participants in redistribution systems. First, there are the fences who often find it both profitable and not very risky10 t~ purchase were limited." Chappell & Walsh, "No Questions Asked," A Consideration of the Crime of Criminal Receiving, 20 CRIME & DELINQUENCY 157, 160 (1974) [here­ inaner Chappell & Walsh, "No Questions Asked"]. 4. Prior to the development of mass production techniques, a fence was faced with "the situation of highly individualized property owned on a limited scale . • • ." Id. at 168. Limited production and limited ownership foreclosed the possibility of fencing stolen goods on a large scale because there were too few buyers, and property could be too readily identified. See generally P. MANTOUX, THE INDUSTRIAL REVOLU­ TION IN THE EIGHTEENTII CENTURY 108-12 (rev. ed. 1961). 5. Eighteenth century England experienced an expansion of trade that was of "geometric proportions." J. HALL, THEFT, LAW AND SOCIETY 77 (2d ed. 1952). See P. MANTOUX, supra note 4, at 99-108. See generally H. BEALES, THE INDUSTRIAL REVOLUTION 1780-1850: AN INTRODUCTORY EsSAY 48-56 (1958). 6. See M. FLINN, AN ECONOMIC AND SOCIAL HISTORY OF BRITAIN, 1066-1939, at 115 (1965) and B. MURPHY, A HrsroRY OF nm BRmsH EcONOMY 1086-1970, at 61-62, 100-01, 229-33, 324-34 (1973) (describing dramatic growth of British popula­ tion). During this period the world population experienced similar growth. See K. CHEN, WORLD POPULATION GROWTII AND LMNG STANDARDS 64 (1960). 7. "(.T]oday's fence ... faces an economy in which imperceptibly differing con­ sumer goods are mass-produced and mass-owned and for which there seems to be an insatiable desire." Chappel & Walsh, "No Questions Asked," Hi8. "The relative im­ personality of property items, and the lack of adequate identifying marks on most categories of goods, frequently prevents the establishment of a nexus between the fence and stolen property items, or the return of recovered property to its original owner." Chappell & Walsh, Receiving Stolen -Property: The Need for Systemic Inquiry into the Fencing Process, 11 CRIMINOLOGY 484, 490 (1974) [hereinafter Chappell & Walsh, Receiving Stolen Property]. 8. See Hearings on Criminal Redistribution (Fencing) Systems Before the Senate Select Comm. on Small Business, 93d Cong., 1st Sess., pt. 1 ( 1973) [hereinafter Hearings on Fencing]. 9. See section II infra. 10. See text at notes 22-29 infra. 1514 Michigan Law Review [Vol. 74:1511 stolen goods from thieves and resell them at retail and wholesale levels. Frequently masquerading as legitimate businessmen,11 so­ phisticated fences not only use cheap stolen merchandise to increase their profits and to undercut legitimate competitors, 12 but also operate without much risk of detection since they can easily remove identify­ ing labels from the goods, falsify records to hide illegal purchases, or otherwise "legitimize" the goods, and then quickly dispose of them in the marketplace.13 Second, there are the thieves who, with the growth of viable fencing schemes, have available purchasers for their stolen property. Thus, they too can rapidly dispose of the evi­ dence of their crimes and are then presumably better able to avoid arrest and conviction.14 In general terms, a symbiotic relationship between fences and thieves appears to have developed. Any sketch of this relationship must recognize the primary role played by receivers. Such recognition is crucial if proper legal tech­ niques for controlling theft are to be developed. Unfortunately, law enforcement efforts in the United States have traditionally focused on capturing the thief rather than on eliminating the fence. 16 This "theft-oriented" approach was perhaps sufficient in preindustrial so­ ciety but is inadequate and seriously misdirected today because it fails to recognize that thieves steal primarily for profit rather than for personal consumption.16 Fencing systems play a vital role in 11.
Recommended publications
  • Presidential Documents
    Weekly Compilation of Presidential Documents Monday, October 3, 1994 Volume 30ÐNumber 39 Pages 1835±1915 1 VerDate 14-MAY-98 10:32 May 27, 1998 Jkt 010199 PO 00001 Frm 00001 Fmt 1249 Sfmt 1249 C:\TERRI\P39SE4.000 INET03 Contents Addresses and Remarks Appointments and Nominations See also Bill Signings; Meetings With Foreign Environmental Protection Agency, Deputy Leaders AdministratorÐ1869 Chicago, IL, Democratic Senatorial Campaign National Cancer Advisory Board, membersÐ Committee dinnerÐ1836 1911 Congressional Hispanic Caucus receptionÐ U.S. District Court, judgeÐ1836 1877 Bill Signings New York City Bethel A.M.E. ChurchÐ1851 Departments of Veterans Affairs and Housing Democratic Congressional Campaign and Urban Development, and Independent Committee dinnerÐ1855 Agencies Appropriations Act, 1995, United Nations statementÐ1889 General AssemblyÐ1862 Riegle-Neal Interstate Banking and Branching Luncheon for heads of stateÐ1867 Efficiency Act of 1994, remarksÐ1896 Reception for heads of state and U.N. Communications to Congress delegationsÐ1867 Belarus-U.S. investment treaty, message Radio addressÐ1841 transmittingÐ1836 Receptions for Senate candidates Compact of Free Association With the Alan Wheat in Kansas City, MOÐ1847 Republic of Palau, letterÐ1874 Ann Wynia in Minneapolis, MNÐ1842 General Agreement on Tariffs and Trade, Edward M. Kennedy in McLean, VAÐ1902 messageÐ1876 Visit of Russian President Yeltsin Haiti, message transmitting noticeÐ1909 Business leadersÐ1888 Proliferation of chemical and biological ``In the Beginning'' exhibit at the Library of weapons, messageÐ1907 CongressÐ1880 Russian and American veterans of World Communications to Federal Agencies War IIÐ1872 China, memorandumÐ1911 State dinnerÐ1879 Guatemala, memorandumÐ1911 Welcoming ceremonyÐ1869 Haiti, memorandumÐ1910 (Contents Continued on inside of back cover.) WEEKLY COMPILATION OF regulations prescribed by the Administrative Committee of the Federal Register, approved by the President (37 FR 23607; 1 CFR Part 10).
    [Show full text]
  • Official Game Information
    Official Game Information Yankee Stadium • One East 161st Street • Bronx, NY 10451 Phone: (718) 579-4460 • E-mail: [email protected] • Twitter: @yankeespr & @losyankeespr World Series Champions: 1923, ’27-28, ’32, ’36-39, ’41, ’43, ’47, ’49-53, ’56, ’58, ’61-62, ’77-78, ’96, ’98-2000, ’09 YANKEES BY THE NUMBERS NOTE 2014 (2013) New YORK Yankees (41-40) vs. TAMPA BAY RAYS (36-49) Standing in AL East: ..............3rd, -2.5 Current Streak: .....................Lost 3 RHP Hiroki Kuroda (5-5, 4.23) vs. LHP David Price (6-7, 3.63) Home Record: .............18-21 (46-35) Road Record:. 23-19 (44-37) Tuesday, July 1, 2014 • Yankee Stadium • 7:05 P.M. ET Day Record: ................15-10 (32-24) Night Record: ..............26-30 (53-53) Game #82 • Home Game #40 • TV: YES • Radio: WFAN 660AM/101.9FM Pre-All-Star .................41-40 (51-44) Post-All-Star ...................0-0 (34-33) vs. AL East: ................. 17-16 (37-39) AT A GLANCE: Tonight the Yankees play the second game of a GEHRIG REMEMBERED: On Wednesday, the vs. AL Central: ................ 4-6 (22-11) three-game series vs. Tampa Bay… are 1-3 thus far on their six- Yankees will commemorate the 75th anniversary vs. AL West: ................ 10-11 (17-16) vs. National League: ..........10-7 (9-11) game homestand (are 0-1 vs. the Rays and went 1-2 vs. Boston of Lou Gehrig’s “Luckiest Man” speech (the team is vs. RH starters: ............. 27-27 (53-54) over the weekend)… beginning on Thursday, embark on an on the road on Friday at Minnesota on the actual vs.
    [Show full text]
  • University Microfilms International 300 North Zeeb Road Ann Arbor, Michigan 48106 USA St
    INFORMATION TO USERS This material was produced from a microfilm copy of the original document. While the most advanced technological means to photograph and reproduce this document have been used, the quality is heavily dependent upon the quality of the original submitted. The following explanation of techniques is provided to help you understand markings or patterns which may appear on this reproduction. 1. The sign or "target" for pages apparently lacking from the document photographed is "Missing Page(s)". If it was possible to obtain the missing page(s) or section, they are spliced into the film along with adjacent pages. This may have necessitated cutting thru an image and duplicating adjacent pages to insure you complete continuity. 2. When an image on the film is obliterated with a large round black mark, it is an indication that the photographer suspected that the copy may have moved during exposure and thus cause a blurred image. You will find a good image of the page in the adjacent frame. 3. When a map, drawing or chart, etc., was part of the material being photographed the photographer followed a definite method in "sectioning" the material. It is customary to begin photoing at the upper left hand corner of a large sheet and to continue photoing from left to right in equal sections with a small overlap. If necessary, sectioning is continued again — beginning below the first row and continuing on until complete. 4. The majority of users indicate that the textual content is of greatest value, however, a somewhat higher quality reproduction could be made from "photographs" if essential to the understanding of the dissertation.
    [Show full text]
  • Michael Goldsmith
    BYU Law Review Volume 2010 Issue 2 Article 2 5-1-2010 Michael Goldsmith Frederick Mark Gedicks Follow this and additional works at: https://digitalcommons.law.byu.edu/lawreview Part of the Legal Biography Commons Recommended Citation Frederick Mark Gedicks, �������������� ������������������, 2010 BYU L. Rᴇᴠ. 339. This Article is brought to you for free and open access by the Brigham Young University Law Review at BYU Law Digital Commons. It has been accepted for inclusion in BYU Law Review by an authorized editor of BYU Law Digital Commons. For more information, please contact [email protected]. DO NOT DELETE 4/12/2010 2:52 PM Michael Goldsmith Frederick Mark Gedicks The most fitting way to begin an essay in memory of Michael Goldsmith would be to tell one of his jokes, because Michael had a terrific sense of humor. The trouble is that, as I thought of all of the jokes that Michael had told me over the many years that we knew each other, I couldn’t actually remember one that I could safely tell in public, let alone in print. He did send a lot of them through his BYU Law School email account, however, so it makes me smile to think that somewhere in the vast reaches of the BYU server, these jokes are sitting there, like time bombs waiting to go off, which is its own kind of joke. The first and by far the most important thing to remember about Michael was his love and care for his family. Two of his sisters spoke at the funeral service in Albany, and it was immediately evident how much they loved their brother, and how good he had been to them and to their mother.
    [Show full text]
  • The Supreme Court and Title Iii: Rewriting the Law of Electronic Surveillance
    Journal of Criminal Law and Criminology Volume 74 Article 1 Issue 1 Spring Spring 1983 The uprS eme Court and Title III: Rewriting the Law of Electronic Surveillance Michael Goldsmith Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Michael Goldsmith, The uS preme Court and Title III: Rewriting the Law of Electronic Surveillance, 74 J. Crim. L. & Criminology 1 (1983) This Criminal Law is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/83/7401-1 THE JOURNAL OF CRIMINAL LAW & CRIMINOLOGY . Vol. 74, No. I Copyright © 1983 by Northwestern University School of Law P'ntdin USA. THE SUPREME COURT AND TITLE III: REWRITING THE LAW OF ELECTRONIC SURVEILLANCE MICHAEL GOLDSMITH* I. INTRODUCTION .............................................. 3 II. HISTORICAL ORIGINS OF TITLE III ...................... 7 A. THE ORIGINAL CONSTITUTIONAL FRAMEWORK: OLMSTEAD AND ITS EARLY PROGENY ................ 7 B. THE FEDERAL COMMUNICATIONS ACT OF 1934: STATUTORY PRECURSOR TO TITLE III ................ 10 C. THE REVISED CONSTITUTIONAL FRAMEWORK ........ 13 1. PreliminaqModifiations ........................... 13 2. Berger v. New York and Katz v. United States... 21 III. LEGISLATIVE DESIGN ........................................ 32 A. THE CONTEXT OF REFORM ............................ 32 B. THE MECHANICS OF REFORM .......................... 38 C. TITLE III STANDARDS ................................... 39 1. Prohibitionsand Sanctions .......................... 39 2. Prerequisitesto Lawful Surveillance .................. 41 a. Jurisdictional requirements ................... 41 b. Documentary requirements .................. 42 * Assistant Professor of Law, Vanderbilt Law School.
    [Show full text]
  • Tax Representatives and Practitioners Program
    THE CITY OF NEW YORK DEPARTMENT OF FINANCE BILL DE BLASIO, MAYOR JACQUES JIHA, COMMISSIONER TAX REPRESENTATIVES AND PRACTITIONERS PROGRAM OCTOBER 19, 2015 Fair, Efficient, Transparent, Exceptional Customer Service 2 Taxpayer Representatives and Practitioners Program (TAXRAPP) New York Athletic Club 180 Central Park South New York, NY 10019 Monday, October 19, 2015 Event Program 7:30 - 8:30 REGISTRATION AND CONTINENTAL BREAKFAST 8:30 - 9:00 WELCOME AND INTRODUCTIONS Jacques Jiha, Ph.D., Commissioner New York City Department of Finance Jerry Boone, Commissioner New York State Department of Taxation and Finance 9:00 - 9:50 TRANSPARENCY IN THE AUDIT PROCESS The Department of Finance has undergone a significant shift toward a more transparent business model that makes tax-related information and data, Agency budgeting and spending publicly available to New York City residents. For tax practitioners, that means making sure that our rules, policies, and statements of audit procedure and other written policies are clear and easy to understand. Our goal is to become more transparent in all of our business practices. This panel outlines the major steps we’ve implemented, and provides an overview of our ongoing initiatives. Moderator: Richard Genetelli, President The Genetelli Consulting Group Panelists: Harry Leonard, Esq., Deputy Commissioner, Tax Audit & Enforcement New York City Department of Finance Diana Beinart, Esq., Deputy Commissioner and General Counsel New York City Department of Finance 3 Cesar Bencosme, Assistant Commissioner, Tax Audit New York City Department of Finance 9:55 - 10:50 NEW YORK CITY CORPORATE TAX REFORM: AN ESSENTIAL PRIMER FOR TAX PRACTITIONERS New York City’s Corporate Income Tax has been significantly reformed and is in effect for tax years beginning on or after January 1, 2015.
    [Show full text]
  • ORT Report Dec 2002
    A Report on Organized Retail Theft Researched and written by: Charles I. Miller, CPP, CSP Food Industry Network P.O. Box 1515 Great Falls, VA 22066 Published by: Loss Prevention Services Department Ó Food Marketing Institute 655 15th Street, NW, Suite 700 Washington, DC 20005 Copyright Ó 2003, Food Marketing Institute. All Rights Reserved. Foreword This document was prepared to provide local, state and federal legislators and prosecutors, the judiciary, and law enforcement agencies without previous experience in dealing with organized retail theft, a better understanding of retailing’s major criminal problem today – professional shoplifting or organized retail theft. We urge all who read this report to join our efforts to prevent the loss of billions of dollars worth of products and many millions of dollars in tax revenue. Coalition Against Organized Retail Theft Consumer Healthcare Products Association Eastman Kodak Company Food Marketing Institute GlaxoSmithKline Grocery Manufacturers of America International Mass Retail Association International Formula Council National Association of Chain Drug Stores National Association of Convenience Stores National Community Pharmacists Association National Retail Federation Wal-Mart Stores, Inc. i Acknowledgements The writer wishes to thank the following executives for their assistance in researching and developing this report. Leslie K. Bryant Armando Navarro Supervisory Special Agent Security Director Federal Bureau of Investigation Safeway Inc. Louisville, KY Clackamas, OR Doyle Hulse Janet Scott Director of Loss Prevention Investigative Task Force, Farm Fresh, LLC Legislative Team Leader Virginia Beach, VA Wal-Mart Stores, Inc. Bentonville, AR Steve King Corporate Director of Claims Kathleen Smith The Kroger Co. Vice President, Corporate Security Cincinnati, OH Safeway Inc.
    [Show full text]
  • Organized Crime Control Commission
    If you have issues viewing or accessing this file contact us at NCJRS.gov. • / J ORGANIZED CRIME CONTROL COMMISSION FIRST REPORT II ' ATTORNEY GENERAL EVELLE J. YOUHGER STATE OF CALIFORNIA . [ . ~., MAY 1978 II LD j. I ~B NCJRS OCT !3 1981 ; !.L FIRST REPORT OF THE I ORGANIZED CRIME CONTROL COMMISSION U.S. Department of Justice National Institute of Justice This document has been reproduced exactly as received from the person or organization originating it. Points of view or opinions stated in this document are those of the authors and do not necessarily represent the officia! position or policies of the National Institute of Justice. Permission to reproduce this e~ material has been granted by Charles E. Casey, Chief/Bureau of Crime and Criminal Intelligence to the National Criminal Justice Reference Service (NCJRS). Further reproduction outside of the NCJRS system requires permis- sion of the ee.l~t owner. s---" EVELLE J. YOUNGER STATE OF CALIFORNIA ATTORNEY GENERAL OFFICE OF THE ATTORNEY CENEttAL epartment of jju tire 555 CAPITOL MALL. SUITE 350 SACRAMENTO 95814 {916) 445-9555 May 2, i97~ A REPORT TO THEPEOPLE OF CALIFORNIA FROM ATTORNEY GENERAL EVELLE J. YOUNGER Pursuant to my responsibilities under the Constitution as chief law officer of California and my statutory responsibility to control and eradicate organized crime by conducting continuing analyses, research and the publication of reports on organized crime, on July 28, 1977, I established the Organized Crime Control Commission. I directed the Commission to report to me on the nature and scope of organized crime in California, the current efforts by local and state agencies to combat organ- ized crime, and, if appropriate propose recommendations to improve California's capability in combating organized crime.
    [Show full text]
  • Firearm Use by Offenders
    U.S. Department of Justice Revised 2/04/02, th Office of Justice Programs Bureau of Justice Statistics Special Report November 2001, NCJ 189369 Survey of Inmates in State and Federal Correctional Facilities Firearm Use by Offenders By Caroline Wolf Harlow, Ph.D. BJS Statistician Highlights Approximately 203,300 prisoners Percent of prison inmates • During the offense that brought them serving a sentence in a State or Type of firearm State Federal to prison, 15% of State inmates and Total 18.4% 14.8% Federal prison in 1997 were armed Handgun 15.3 12.8 13% of Federal inmates carried a when they committed the crime for Rifle 1.3 1.3 handgun; about 2% had a military-style which they were serving time. An Shotgun 2.4 2.0 semiautomatic gun or machine gun. estimated 18% of State prison inmates Characteristic of • Among inmates in prison for and 15% of Federal inmates reported inmates who Percent of prison Inmates homicide, a sexual assault, robbery, using, carrying, or possessing a firearm carried firearms possessing a firearm assault or other violent crime, 30% of during the crime for which they were Offense State Federal Violent 30.2% 35.4% State offenders and 35% of Federal sentenced. In 1991, 16% of State Property 3.1 2.9 offenders carried a firearm when inmates and 12% of Federal inmates Drug 8.1 8.7 committing the crime. Almost a fourth said they were armed at the time of Public-order 19.1 27.3 of State inmates and almost a third of their offense.
    [Show full text]
  • The Beggar's Opera
    The Beggar's Opera Return to Renascence Editions The Beggar's Opera John Gay Transcribed, with an Introduction, Notes, and Bibliography, by R.S. Bear, University of Oregon, August 1992; html version created November 1995. Note on this edition: This text was prepared by R.S. Bear from a 1921 B. Huebsch edition of the 1765 text. The text is in the public domain; markup is copyright © The University of Oregon, 1995. Additions, emendations, or commments to the Publisher. Skip to: ● Act I. ● Act II. ● Act III. ● Notes. ● Bibliography. INTRODUCTION http://darkwing.uoregon.edu/%7Erbear/beggar.html (1 of 82)4/5/2005 4:27:43 AM The Beggar's Opera British Museum BAptized at Barnstaple, Devon, on September 16, 1685, during the reign of Charles II, John Gay was orphaned by the age of ten but raised by a kind uncle, who saw to his education at the local grammar school. On reaching adulthood, Gay was apprenticed to a mercer, but he disliked this occupation and found a post, in or near 1712, as secretary to the Duchess of Monmouth. In 1714, with the sponsorship of Jonathan Swift, Gay joined the household of Lord Clarendon, and journeyed with him to the Continent. Gay's friendly and ingratiating character won him many friends, not a few of whom were courtiers who found employment for him, either in their own households, or with the Government, throughout his life. Immediately after losing a small fortune in the South Sea Bubble, Gay was appointed Lottery Commissioner (!!), a post he held nearly to the end of his life.
    [Show full text]
  • THE NEWGATE NOVELS and DRAMA of TIIE 1830S ADRIAN PHILLIPS Phd the UNIVERSITY of YORK JULY 2001
    THE NEWGATE NOVELS AND DRAMA OF TIIE 1830s ADRIAN PHILLIPS PhD THE UNIVERSITY OF YORK DEPARTMENT OF ENGLISH AND RELATED LITERATURE JULY 2001 TABLE OF CONTENTS Page Acknowledgements IV Abstract `' Note on the 'Texts VI INTRODUCTION I CHAPTER I Ruiwer's Newgate Novels and the Reformatory Spirit 23 i Respectability, Truth, and the Workings of Justice: Paul Clifford and Caleb Williams 30 ii Natural Law versus Human Law: Eugene Aram and Utilitarianism 60 iii Working-Class Defiance, Victorian Gentility, and Regency Dandyism: Paul Clifford and Pelham 74 iv Corruption or Correction: Romantic Love and the Shaping of Self 93 CHAPTER 2 Thieves and Thief-Takers: the Newgate Novel, Literary Self-Consciousness, and the Field of Cultural Production 99 i The Newgate Novels and Literary Controversy 104 ii Pelham, the 1820s, and the Privileged Control of Culture 1>; iii hie Criminal as Author: Paul Clifford, Rookw'ood, and the Changing Literary Order I39 iv faul Clifford and the Literary Critic 155 v 'l lie Newgate Novelists and a very Personal Struggle 160 CHAPTER 3 Theatre, Politics, and the Jack Sheppard Adaptations 185 1 The 'Jack Sheppard' Controversy 188 II ii Deceptions and Disguises: Radical Rhetoric and Early 19th-Century 71ieatrc 197 iii Buckstone's'Jack Sheppard' and Other Dramatic Adaptations 221 CONCLUSION 262 BIBLIOGRAPHY 274 A_(-KNOWLE GEN N'I S I would like to thank Dr Jane Moody for her invaluable comments upon two of the chapters in this thesis, and especially her expert advice on 19th-century theatre research. I am most grateful to Rebecca Edwards for her thorough and very helpful reading of the text at short notice.
    [Show full text]
  • Organized Retail Crime
    Organized Retail Crime Kristin M. Finklea Analyst in Domestic Security June 16, 2010 Congressional Research Service 7-5700 www.crs.gov R41118 CRS Report for Congress Prepared for Members and Committees of Congress Organized Retail Crime Summary Organized retail crime (ORC) involves the large-scale theft of everyday consumer items and potentially has much broader implications. Organized groups of professional shoplifters, or “boosters,” steal or fraudulently obtain merchandise that is then sold, or “fenced,” to individuals and retailers through a variety of venues. In an increasingly globalized society, more and more transactions take place online rather than face-to-face. As such, in addition to relying on physical resale markets, organized retail thieves have turned to online marketplaces as means to fence their ill-gotten goods. ORC exposes the United States to costs and harms in the economic, public health, and domestic security arenas. The exact loss from ORC to the retail industry is unknown, but an often-cited estimate of this loss is $15 billion to $30 billion annually. The economic impact, however, extends beyond the manufacturing and retail industry and includes costs incurred by consumers and taxes lost by the states. The theft and resale of stolen consumable or health and beauty products such as infant formula (that may have been repackaged, relabeled, and subjected to altered expiration dates) poses potential safety concerns for individuals purchasing such goods from ORC fences. In addition, some industry experts and policy makers have expressed concern about the possibility that proceeds from ORC may be used to fund terrorist activities. Current efforts to combat ORC largely come from retailers, online marketplaces, and law enforcement alike.
    [Show full text]