The Criminal Justice System

Goals of the CJS

Justice: keeping order, correct reprimanding of actions

Crime Control

Crime Prevention

3 Components

Courts: Prosecution of accused, defense of the accused, preservation of rights, adjudication

Corrections

Police: A visual representation of the law, maintains status quo of behavior, crime prevention, social services

Decision Making Process: Charging, initial appearance, preliminary hearing/grand jury, information/indictment, arraignment, trial, sentencing, appeals, corrections, release

Community Corrections: Probation, house arrest, community service, fines, classes, therapy/treatment programs

Institutional Corrections: functioning closed institutions, jails and prisons, mental institutions

Herbert Packer Models of the CJS and Administration

Due Process: Protection of liberty, individual rights, adversarial, innocent until proven guilty

Crime Control: Crime repression, emphasis on ability of Law Enforcement Officers/courts to find and punish criminals

Disparity: a difference between groups that can be explained either by legitimate factors, or by discrimination

Crime and Victimization

Discrimination: Differential treatment of individuals or groups based on race, ethnicity, gender, sexual orientation, or economic status, instead of on their behavior or qualifications

Types of Crime: Visible, Occupational, Organized, Transnational, Victimless, Political, Cyber

Visibile: not just crime that we see, but crime we see more often

Violent Crime: homicide, assault, battery, rape, robbery

Property Crime: Theft, larceny, shoplifting, embezzlement, burglary

Public Order: Threaten the well-being of society and challenge accepted moral principles; public intox, panhandling, vandalism, disorderly conduct

Occupational: dealing with crimes within the workplace and the privileges within it

White Collar Crime: Financially motivated, non-violent crime committed by business and government officials

Skimming: taking cash "off the top"; starts to add up especially when dealing with multi-million companies

Insider Trading: The illegal practice of trading on the stock exchange to one's own advantage through having access to confidential information

Tax Evasion: The illegal nonpayment or underpayment of tax

Organized: Profit through illegal activities: drugs, prostitution, gambling; maintains through use of threats, force, or corruption of public officials (allows them to remain "safe" in the business); ties in other types of crimes: visible, occupational, transnational and cyber

Transnational: Crossing borders

Victimless: Is there a victimless crime? Willing and private exchange of goods or services that are strong in demand but illegal: prostitution, gambling, drug sales/use

Political: Acts committed by or against the government for ideological reasons; governments influence, secrets, document leaking

Cyber: Over the internet; intimidation/extortion, child pornography

Counterfeit Products: Fakes or unauthorized replicas of the real products, often produced with the intent to take advantage of the superior value of the imitated product

Money Laundering: The act of concealing the transformation of profits from illegal activities and corruption into "legitimate" assets

Fraud: Wrongful or criminal deception intended to result in financial or personal gain

Drug Trafficking, smuggling, human trafficking, bribery, extortion and financial crimes

Extortion: The practice of obtaining something, especially money, through force or threats (blackmail)

Human Trafficking: The trade of humans for the purpose of forced labour, sexual slavery, or commercial sexual exploitation for the trafficker or others; not only on borders of port access areas;

Election Rigging: Electoral fraud, election manipulation, or vote rigging is illegal interference with the process of an election, either by increasing the vote share of the favored candidate, depressing the vote share of the rival candidates, or both

Treason: The crime of betraying one's country, especially by attempting to kill the sovereign or overthrow the government

Terrorism: The unlawful use of violence and intimidation, especially against civilians, in the pursuit of political aims

Phishing Schemes: Bait email trying to get you to give out your personal and private information

Hacking: Use of a computer to gain unauthorized access to data in a system.