Welcome to NIJ’s Term of the Month. Each month we are featuring a term from our scientific research portfolios informing significant American justice system issues and solutions.
November 2023 - Body Armor
Torso-worn body armor, commonly referred to as vests, helps protect law enforcement officers from weapons such as guns and knives. Through body armor standards and the Compliance Testing Program, the National Institute of Justice (NIJ) provides law enforcement and corrections agencies and individuals with information about commercial body armor performance. NIJ’s body armor standards provide minimum performance requirements for both ballistic and stab resistant vests, while the Compliance Testing Program allows manufacturers to submit their body armor products for testing to see if they meet the national standard.
NIJ will be publishing a revision to the performance standards for ballistic resistant body armor later this month, with updates including improved test methods for armor designed for women, additional test requirements for both soft and hard body armor, and several standardized procedures and test methods published by ASTM. Ballistic threat tests were part of the previous body armor standard but now will exist as their own standard: “Specification for NIJ Ballistic Protection Levels and Associated Test Threats.” This specification describes which bullets and velocities should be used to test ballistic resistant equipment in conjunction with other performance standards.
Subscribe to be notified when these updated standards are released.
Ballistic Resistant Armor
- Body Armor Compliance Testing Program
- Compliant Products List: Ballistic Resistant Body Armor
- Ballistic Resistant Body Armor and the NIJ Mark
- NIJ Body Armor Poster
Stab Resistant Armor
- Stab Resistance of Personal Body Armor NIJ Standard–0115.00
- Compliant Product List: Stab Resistant Body Armor
Trace DNA, also known as “low copy number DNA” or “touch DNA,” refers to small amounts of DNA left on objects. Trace DNA may originate from shed skin cells from the outer layer of an individual’s hand, or from cells of other body parts or fluids on the hand (e.g., saliva, eyes, nasal fluids). As DNA detection techniques have continued to improve, scientists have become aware of the ability of DNA to be transferred between objects. For example, crime scene investigators who use fingerprint brushes may unknowingly transfer trace amounts of DNA from one surface to another, which may generate misleading results. Because trace DNA deposited on a surface is not visible to the naked eye, it can be difficult to predict the presence or quantity of DNA with the same confidence as one might link a DNA sample isolated from a visible blood stain. For this reason, many forensic investigators prefer to decouple the analysis of trace DNA from specific activities or locations.
In 2018 and 2023, the NIJ Forensic Science Research and Development Technology Working Group called for comprehensive, systematic, well controlled studies that provide both foundational knowledge and practical data about DNA transfer and persistence (the duration of time that the DNA deposit remains detectable). Understanding the behavior of trace DNA deposits should inform how scientists recover, analyze, and interpret this type of evidence. NIJ has supported multiple projects focused on trace DNA analysis.
Reading and Resources
- Persistence of Touch DNA for Analysis | Article
- When DNA Samples Are Complicated: Calculating Variation in Mixed Samples Interpretation | Article
- Who Loaded the Gun? Recovering DNA From Bullet Casings | Article
- Nanoscale Imaging and Chemical Analysis of Extracellular DNA in Trace Evidence Samples | Report
- Webinar by NIJ-Funded Researchers | Webinar
Conjunctive analysis of case configurations is an exploratory data analysis technique that looks at how multiple variables interact.
Many data analysis techniques examine one factor at a time while controlling for all other factors. Conjunctive analysis, on the other hand, examines many risk factors simultaneously. It looks at the complex causal relationships between these factors and how they interact to determine different outcomes.
Terance Miethe, Timothy Hart, and Wendy Regoeczi developed and introduced conjunctive analysis to the criminology field in 2008. Since then, researchers have used the statistical method to better understand patterns in carjacking incidents, intimate partner violence, crime and the distribution of alcohol outlets, police discretion, and the violent victimization of university students. Researchers have also used conjunctive analysis to study homicide investigations, child sexual abuse, robbery risk factors, missing person case outcomes, sentencing disparities, terrorism risk profiles, and more.
Reading and Resources from NIJ:
- Assessing Risk of Terrorist Acts by Looking at Location Data and Demographic and Social Characteristics | Article
Metabolites are substances made when the body breaks down food, drugs, or even its own tissue, such as fat or muscle in the body, while also ridding the body of toxic substances. This process, known as metabolism, creates the energy and makes the materials needed for growth, reproduction, and health maintenance.
Metabolites excreted by the body, usually in urine, can help investigators discern if a person ingested a specific drug. Metabolites are known as markers for one or more parent drug, and the amount and types of metabolites present in a sample can indicate what drug a person has consumed.
For example, heroin quickly metabolizes into a chemical called 6-acetylmorphine (6-MAM), which the body converts, typically within a half hour, into morphine. A similar process occurs with fentanyl, which metabolizes into norfentanyl.
Research is ongoing to determine if metabolites can serve as a postmortem indicator of a person’s time since death, but these studies are in the exploratory stages. Other research is exploring the utility of postmortem metabolic profiling in determining whether cardiovascular diseases, cancers, or diabetes contributed to a death.
Reading and Resources:
- Identification of Metabolites and Potential Biomarkers of Kratom in Urine | Article
- Evaluation of Synthetic Cannabinoid Metabolites in Human Blood in the Absence of Parent Compounds: A Stability Assessment | Article
- Determination of Morphine, Fentanyl and Their Metabolites in Small Sample Volumes Using Liquid Chromatography Tandem Mass Spectrometry | Article
- Applications of Metabolomics in Forensic Toxicology and Forensic Medicine | Article
Drug treatment courts are specialized court docket programs that target persons who have alcohol and other drug dependency problems within the criminal justice system, including adults charged with or convicted of a crime, youth involved in the juvenile justice system, and parents with pending child welfare cases. Although drug courts vary in target populations and resources, the programs are generally managed by a multidisciplinary team that includes judges, prosecutors, defense attorneys, community corrections officers, social workers, and treatment service professionals. Support from stakeholders — representing law enforcement, family, and community members — can participate in hearings, programming, and events, such as graduation. Various types of drug courts have emerged to address issues relevant to specific populations, including tribal healing to wellness, driving while intoxicated, reentry, veterans, mental health, and co-occurring programs.
Reading and Resources:
The field of forensic toxicology combines the principles of analytical and clinical chemistry with pharmacology to aid in medicolegal investigations of drug use, poisoning, and death. Forensic toxicologists determine which non-endogenous (non-naturally occurring) toxic or intoxicating substances are present, in what concentrations, and the probable effect of those chemicals on the individual.
Forensic toxicology includes human performance toxicology (antemortem) and postmortem toxicology. Forensic toxicologists analyze fluid samples, which include blood, urine, and oral fluid, as well as tissue samples such as hair, nails, and organ tissues.
Reading and Resources:
- Field Sobriety Tests and THC Levels Unreliable Indicators of Marijuana Intoxication
- Challenges in Identifying Novel Psychoactive Substances and a Stronger Path Forward| Notes from the Field
- How Good Are the Data? Novel Metric Assesses Probability That an Unknown Drug Sample Matches a Known Sample| Article
- Drug-Impaired Driving: NIJ-Sponsored Panel Points to Priority Needs for Addressing Complex Enforcement Challenges| Article
- Early-Career Forensic Toxicologists Take Home Top Awards for NIJ-Funded Research| News Release
The forensic intelligence model is an analytical strategy that combines using forensic data (both preliminary and confirmed results) with situational and other relevant crime data (such as open-source databases) to produce case leads, link cases, or inform investigative, tactical, operational, or strategic policing. In this strategy, data derived from the forensic analysis of physical evidence can inform the investigation. The forensic data produced for forensic intelligence may not necessarily be the complete forensic report needed for presentation in court, but it can potentially inform investigations if integrated in a timely manner.
Law enforcement can use this model to identify crime trends, guide investigations, and enhance public safety. It allows investigators to leverage local forensic testing results and supporting details from local, state, and even federal law enforcement databases, to create a package that is generally easier to digest than a traditional forensic laboratory analysis.
Collectively, forensic intelligence is based on the subject matter experts’ cumulative experiences from the field, the published literature on the topic, and discussions with other experts. Before using this approach, law enforcement should consider their organizational structure, key partnerships, communications capabilities, and the development of necessary resources. The goal is to eliminate silos of information and encourage communication regarding the connectivity of all the evidence for a specific case, linking cases and informing policing strategies to prevent crime.
Reading and Resources:
- Using Forensic Intelligence To Combat Serial and Organized Violent Crimes |NIJ Journal article
- Using Forensic Intelligence Analysts to Drive Gun Crime Investigations | Article
- National Institute of Justice Gives Overview of Forensic Intelligence Approaches to Data-Driven Policing | News release
Reentry involves an individual’s transition from life in jail or prison to life in the community. Similar to desistance, reentry is a process or continuum of change where consistent support is crucial for the transitioning individual.
Support can take many forms. Research shows that housing, employment, family unification, mental and physical health treatment, and meeting other critical criminogenic needs are vital to fostering post-release success. However, the reentry process looks different from person to person, and programs and services should be tailored to meet an individual’s unique needs.
NIJ continues to support research to improve our understanding of how to better support an individual when they reenter and to inform criminal justice policy and practice. Specific research investments include assessing the impact of young adult reentry programs and examining the effects of traumatic brain injury on criminal justice outcomes such as recidivism and employment. Examinations of risk-need-responsivity strategies and innovative treatment modalities also require research investment, as emerging technologies, including the development of AI and machine-learning tools, have the potential to increase our understanding of reentry and recidivism. NIJ will continue its three-decade long investment in reentry research to help the field answer important questions, with a renewed focus on rigorous research designs.
Reading and Resources:
- Reentry Research at NIJ: Providing Robust Evidence for High-Stakes Decision-Making | Article
- Expungement: Criminal Records as Reentry Barriers | Article
- Emerging Relevance of Neuroscience in Corrections | Article
- Reentry Programs and Practices rated by NIJ’s CrimeSolutions program
Polyvictimization can generally be defined as the experiences of multiple, distinct types of violence, abuse, mistreatment, and other adversities. Although polyvictimization has been defined and operationalized in different ways across the literature, it typically refers to two or more different types of victimization — such as sexual violence, physical abuse, or exposure to family and community violence — rather than multiple episodes of a single type of victimization.
The polyvictimization framework has recently been used to study the abuse of older adults. According to one NIJ-funded study with a nationally representative sample of community-residing older adults in the United States, approximately 2% of older adults experienced polyvictimization in the past year. This translates to over 970,000 older adults. Risk for polyvictimization was greater among older adults who experienced problems accomplishing activities of daily living (for example, shopping for groceries or medicines, bathing), those with low social support, and those who had experienced a past traumatic event. Another NIJ-funded study found that multiple types of polyvictimization in older adults are related to poor physical and mental health outcomes and mortality.
Polyvictimization among children and youth has also been examined and can occur in a variety of settings, including families, schools, communities, and online. Children may be repeatedly traumatized as they are victims and witnesses of multiple abusive experiences, including child abuse, neglect, domestic violence, sexual exploitation, school violence, trafficking, gun violence, hate crimes, dating violence, or bullying.
- “Defining and Studying Elder Abuse Polyvictimization” | Podcast
- Prevalence of Elder Polyvictimization in the United States: Data From the National Elder Mistreatment Study | Article
- Defining Late-Life Poly-victimization and Identifying Associated Mental and Physical Health Symptoms and Mortality | Article
- Youth and the Juvenile Justice System: 2022 National Report | Report
A replication study is a scientific study that attempts to validate findings from prior research by asking the same or similar scientific questions as the original research study. Replication matters because the peer review process alone does not guarantee the integrity of the reported results. Replication studies strengthen science by independently confirming the validity of research findings. When results are consistent across studies, the results of the original study are more likely to reliable.
Research is generalizable if a second study addresses a similar scientific question and finds consistent results in contexts or populations that differ from the original context or populations.
Not all scientific studies can be replicated. Non-replicability can be the result of uncertainty, or study limitations, such as:
- Publication bias
- Misaligned incentives
- Inappropriate statistical inference
- Poor study design
- Researcher errors
- Incomplete reporting of a study
In the social sciences, economics, clinical studies, and other fields, replication studies often include new data collections to verify original findings. A different term, reproducibility, measures whether a second study using the same data and the same or similar procedures as the original research yields consistent results.
The National Institute of Justice requires all research grantees to deposit data collected during the life of an award with the National Archive of Criminal Justice Data, an archive of datasets maintained for secondary analysis, to allow for replication studies.
NIJ research grant solicitations regularly encourage grant proposals for replication research.
- Reproducibility and Replicability in Science | Report, National Academies of Sciences, Engineering, and Medicine
- Reproducibility and Replicability in Science: Highlights for Social and Behavioral Scientists | Report, National Academies of Sciences, Engineering, and Medicine
- “The Global Citizen’s Forum (GCF) Replication Framework” | Article, Analytic Services Inc. (ANSER)
- “Replication and Research Integrity in Criminology: Introduction to the Special Issue” | Article, Jukka Savolainen and Matthew VanEseltine
- “An Open Source Replication of a Winning Recidivism Prediction Model” | Article, Giovanni Circo and Andrew Wheeler
- “Replication Validation of a Human Trafficking Screening Tool for Law Enforcement and Estimation of Prevalence” | Grant, National Institute of Justice
- “Discover data” | Webpage, National Archive of Criminal Justice Data
- “Learning and data guides” | Webpage, National Archive of Criminal Justice Data
- “Share data” | Webpage, National Archive of Criminal Justice Data
Risk terrain modeling is a science-based method of identifying and measuring crime risk posed by the features of a specific physical location — for example, a parking lot, a convenience store, a bar, or a vacant building.
Risk terrain modeling is a tool designed to diagnose crime location patterns. Risk terrain modeling software generates an overall crime risk value for specific locations and explains which terrain features contribute to crime risk.
Assigning a risk value to each characteristic of a location allows public agencies to isolate those characteristics, or combinations of characteristics, that most influence crime.
Two important advantages of risk terrain modeling, in comparison to other proactive policing methods, are:
- Scope of resource response to locations at risk: By identifying the characteristics of a place associated with increased risk of crime, risk terrain modeling creates opportunities for comprehensive responses not limited to law enforcement action. For example, if poor lighting is found to elevate crime risk, then the streets department could be asked to improve it.
- Fourth Amendment protection from unreasonable search and seizure: Risk terrain modeling focuses on attributes of a place, not of a person. Thus, the use of risk terrain modeling to guide officer actions generally may be less likely than other proactive policing methods to be associated with a risk of constitutional rights violations.
By pinpointing crime risk associated with specific places on a map, risk terrain modeling can help guide geographic distribution of law enforcement and other public resources.
Research on the application of risk terrain modeling in multiple communities has found it to be an effective and accurate method of identifying crime risk and altering the characteristics of a place to prevent crime problems.
- Risk Terrain Modeling for Spatial Risk Analysis
- Innovative Methodologies for Assessing Radicalization Risk: Risk Terrain Modeling and Conjunctive Analysis
- Facilitators and Impediments to Designing, Implementing, and Evaluating Risk-Based Policing Strategies Using Risk Terrain Modeling: Insights From a Multi-City Evaluation in the United States
- Systematic Review and Meta‑Analysis of Risk Terrain Modelling (RTM) as a Spatial Forecasting Method
- Risk Terrain Modeling Works
- Evidence-Based Practices and Strategies: Risk Terrain Modeling
Expungement is the process by which a record of criminal conviction is destroyed or sealed from state or federal record. An expungement treats the conviction as if it had never happened, removing it from an individual’s criminal record and, ideally, the public record. However, in the digital age, completely removing any information in the public record has become challenging.
Most expungement proceedings take place in state courts. Each state has its own distinct laws about who is eligible for expungement, which offenses can be expunged, and how records will be managed. Some states have “clean slate” laws that require the state government to automatically expunge minor criminal records for qualifying individuals. Other states require individuals to petition the court to clear part or all of a criminal record.
An individual’s criminal record can create significant reentry barriers. For example, a record can thwart efforts to secure housing or gain employment. Expunging an individual’s criminal record, where appropriate, can be critical to their ability to move forward and live a law-abiding life.
It is important to note that an expungement is not the same as “forgiveness” for committing a crime — that is known as a legal pardon.
A black box study design can be used to measure the overall behavior of a complex system. It disregards the internal processes and simply measures how the final output changes depending on the input. Black box testing has long been used to study complex systems in software engineering, physics, and psychology.
In the forensic sciences, researchers use black box studies to measure the accuracy and reliability of forensic disciplines as they are currently practiced. This includes latent fingerprint examination, bloodstain pattern analysis, forensic firearms examination, and others. These disciplines largely depend on subjective comparison of evidence by human experts. The researcher uses a set of samples with known “ground truth” and treats the examiner as a black box, measuring how often their conclusions are right or wrong. This is important information for the courts to consider when deciding whether to admit forensic testimony.
Conversely, a “white box” study — in the context of forensic science — looks at the details of the examiner’s thought process or methodology to determine which factors have the most effect on the outcome. It allows the researcher to look inside the black box and gain insight into how and why examiners reach their conclusions.
Read an NIJ Journal article on the history and legacy of an influential black box study examining the accuracy and reliability of latent fingerprint examination. Results from a black-box study for digital examiners by the National Institute of Standards and Technology.
Subadult is a categorization used by anthropologists, including forensic anthropologists, to define human skeletal remains believed to be from a person whose age-at-death was 20 or younger. Investigators traditionally have used pelvic differences between males and females and the predictable development of teeth to try to determine the sex and age of skeletal remains of infants, children, and adolescents, but that information is often insufficient to make an accurate determination.
Investigators also look at long bone lengths (femur and tibia, for example) and the fusion growth plates in bones (epiphyseal fusion) to determine age-at-death, but those indicators are only useful during specific periods of a person’s growth and, without a large database for comparison, individual measurements are limited in what they can reveal.
New research is expanding the markers scientists can use to include spinal canal measurements, cranial shape and form measurements, and detailed measurements of the shape and form of teeth. This research, when combined with growing databases of subadult skeletons, is allowing investigators to consider a wide range of markers for determining age and sex, as well as population affinity (ethnicity).
Increasing the number of markers is important because they change significantly as a subadult grows from infancy through adolescence, and the presence or absence of a marker can narrow the age range.
- Subadult Ancestry Estimation Using Craniometrics, Macromorphoscopics, Odontometrics, and Dental Morphology (NIJ grant)
- Development of Modern Subadult Standards: Improved Age and Sex Estimation in U.S. Forensic Practice (NIJ grant)
- Developing Subadult Sex Estimation Standards Using Adult Morphological Sex Traits and an Ontogenetic Approach (NIJ grant)
- The Subadult Virtual Anthropology Database (SVAD): An Accessible Repository of Contemporary Subadult Reference Data (article, Forensic Sciences, 2022)
Virtual comparison microscopy is the use of high-resolution 3D surface scanning and measurement in the field of firearm and tool mark analysis. The accurate surface imaging of bullets and shell casings with 3D visualization tools and advanced algorithms allow forensic examiners to view, annotate, conduct blind verification, and develop a statistical basis for identifying and matching ballistics evidence.
With a virtual comparison microscopy system, the bullets and casings are scanned, creating a detailed topographical map that can be shared between crime labs. The electronic file allows for the verification of findings by a second examiner. The traditional 2D comparison method requires the actual evidence — spent bullets or shell casings — to be examined directly.
Because virtual comparison microscopy files can be easily shared, they allow for better training, error-rate studies, and proficiency testing in crime labs. Although researchers expect human examiners to conduct ballistics testing for the foreseeable future, as the database of bullets, casings, and guns grows, sophisticated algorithms and machine learning could allow computers to play a significant role.
Select Resources and Funded Awards:
- A Century of Ballistics Comparison Giving Way to Virtual 3D Methods (Article)
- Evaluation of 3D Virtual Comparison Microscopy for Firearm Forensics within the Crime Lab
- Expanding the Scope and Efficiency of 3D Surface Topography Analysis in Firearm Forensics
- Assessing Class Consistency and Common Source Using 3D Virtual Comparison Microscopy in Firearm Forensics
- Additional NIJ funded research on Virtual Comparison Microscopy
A student threat assessment is a systematic approach to evaluating the likelihood that a student will carry out a violent act after an expressed threat or threatening behaviors.
Threat assessments are performed by interdisciplinary school-based teams. The teams can give schools a proactive, effective alternative to reactive disciplinary practices such as zero tolerance discipline and exclusionary discipline such as student suspensions.
Threat assessments can prove challenging, however. Schools must substantiate information received in threat assessments, and threat assessments will not be a practical means of assessing all tips related to threatened school violence.
- Student Threat Assessment as a Safe and Supportive Prevention Strategy
- School Safety: Research on Gathering Tips and Addressing Threats
- Threat Assessment and Reporting
- Threat Assessment as a School Violence Prevention Strategy
- Preparing for and Responding to Threats and Violence - Breakout Session, NIJ Virtual Conference on School Safety
Deradicalization refers to an individual’s or group’s disavowal of, or shift away from, extremist beliefs that can support terrorism. The term can also refer to policies, practices, or strategies designed to advance a deradicalization process. Deradicalization is one element of a comprehensive approach to preventing extremist violence.
NIJ continues to support research on deradicalization and related topics. A 2022 NIJ research solicitation called for “research to better understand the deradicalization and disengagement phenomena. NIJ is particularly interested in understanding factors that promote withdrawal and independence from extremist behaviors, as well as those factors that play a role in encouraging individuals to depart radical ideologies (or at least shift away to less-extreme beliefs).”
Microbial forensics is the investigation of the cloud of biological evidence humans leave behind at crime scenes that includes bacteria, fungi, viruses, and other microbial evidence. Researchers have learned over the past 20 years that each person carries a distinct microbial signature that is shed into the environment and left on objects that are touched. The number of microbes in the biological clouds that surround each of us is enormous, but because they are invisible to the eye, we are unaware of them.
The microbial communities living in association with the human body make up an individual’s microbiome, and the bacteria alone are typically 10 times more prevalent on a body than human cells. About 3% of a person’s body mass is made up of microbes.
The birth of microbial forensics came with the 2001 attacks in Washington, D.C. using anthrax spores. The efforts to identify the strain of anthrax established microbial forensics as an investigative tool, and since that time it has been used to detect microbial traces on phones, doorknobs, keyboards, and other objects a suspect may have touched. In the future a microbial signature may reveal details about a person’s diet, health, and drug use.
- The Search for a Microbial Death Clock (article)
- The Forensic Microbiome: The Invisible Traces We Leave Behind (article)
- The Evidence We Leave Behind: Part 1 (podcast)
- The Evidence We Leave Behind: Part 2 (podcast) available on June 6 from NIJ’s podcast page.
- NIJ Microbiome Grants
Unmanned aircraft systems is a term that encompasses not only the unmanned aircraft vehicle but also the flight controller on the ground, and the system of communication between the two. Under FAA Part 107, unmanned aircraft vehicles are air vehicles weighing between a half and 55 pounds that operate by remote pilot and are often fitted with specialized cameras, GPS, and/or other sensors that collect and often relay information via a communications link to a variety of destinations, including the remote pilot and/or a command center. In law enforcement, unmanned aircraft systems are used in a variety of ways, including crowd control, traffic and accident reporting, search and rescue, crime scene reconstruction, pre-operational situational awareness to optimize officer and individual safety (e.g. by gathering information for bomb threats and hostage situations), and even as first responders.
Unmanned aircraft systems are subject to the rules set forth by the Federal Aviation Administration to maintain safe national airspace, specifically Unmanned Aircraft Rules (Part 107). Since unmanned aircraft systems also are operated from a remote command and control center and relay information, equipment must be certified by the Federal Communications Commission to minimize harmful radio interference. Most unmanned aircraft system pilots are required to maintain visual-line-of-sight (VLOS) with their aircrafts, with the exception of those who have beyond-visual-line-of-sight (BVLOS) certification.
- Detecting and Processing Clandestine Human Remains with Unmanned Aerial Systems and Multispectral Remote Sensing (Grant)
- Unmanned Aircraft Systems Can Support Law Enforcement in Crash Scene Reconstruction (Article)
- Evaluation of Terrestrial and Aerial Remote Sensing with Small Unmanned Aircraft Systems (SUAS) for Forensic Crime-Scene Reconstruction (Grant)
- Evaluating Aerial Systems for Crime-Scene Reconstruction (Article)
- A Comparison of Small Unmanned Aircraft System (SUAS) Aerial and Terrestrial Methods for Accident Scene Investigation Information Collection (Grant)
- How Law Enforcement Can Harness the Benefits of an Unmanned Aircraft Systems (UAS) Program (Article)
Community corrections is a term for managing individuals convicted of a crime and serving their sentences in a community setting, rather than in prison or jail. Community supervision is another term for community corrections. Probation and parole are two primary forms of community corrections. Community supervision may also be ordered for individuals awaiting trial.
Probation is an alternative to jail, or sometimes prison, ordered when the sentencing court decides that the crime does not warrant incarceration. Probation officers supervise individuals on probation, monitoring their activities and ensuring compliance with conditions of supervision. Conditions of supervision include avoidance of crime and association with individuals with felony sentences and may include school attendance, employment, testing for drugs or alcohol, or other milestones to be met by the sentenced individual.
Parole is supervised release from prison after a portion of a sentence has been served. Parole is granted when a parole board or other authorized public body determines that release of an individual from confinement is justified in light of evidence of rehabilitation and public safety interests. Persons on parole, like those on probation, regularly meet with supervision officers and satisfy conditions of parole to complete their sentence.
The philosophy underlying community corrections is to prevent criminal behavior through close supervision and the imposition of restrictions on probation or parole in an environment designed to be more conducive to rehabilitation while maintaining public safety. A related goal of community corrections is the reduction of overcrowding of prisons and jails.
- Community Corrections, NIJ.gov Topic page with article listings.
- “Tapping into Artificial Intelligence: Advanced Technology to Prevent Crime and Support Reentry,” by Eric Martin and Angela Moore, NIJ.gov, August 6, 2020. NIJ.gov. This article originally appeared in the June/July 2020 issue of Corrections Today, as submitted by the National Institute of Justice. It was reprinted with permission of the American Correctional Association.
- “The Role of Human Service Providers During Community Supervision,” by Cecelia Klingele, National Institute of Justice, NIJ.gov, September 2021.
- “Crime and Desistance: Probing How Probationers' Thoughts on Crime May Inform Their Conduct,” July 20, 2021, NIJ.gov article based upon the research report “Research on Offender Decision-Making and Desistance From Crime: A Multi-Theory Assessment of Offender Cognition Change.” Principal Investigator: Caleb D. Lloyd. The research was funded by NIJ award 2014-R2-CX-0009, awarded to The University of Texas at El Paso.
- “The NIJ Recidivism Forecasting Challenge: Contextualizing the Results,” by Veronica White, D. Michael Applegarth, Joel Hunt, and Caleb Hudgins, National Institute of Justice, February 2022.
- Community corrections programs and practices rated by NIJ’s CrimeSolutions.
Situational crime prevention (SCP) is a crime reduction strategy used by law enforcement that stemmed from the analysis of circumstances that give rise to particular types of crime. SCP posits that criminal acts may be deterred by strategic environmental or managerial changes. It differs from other crime prevention strategies because it focuses on the setting for crime, rather than those committing criminal acts. The main goal of situational crime prevention is to make criminal acts less attractive to people who might potentially offend.
There are a multitude of ways this can be accomplished, including increasing the risk and reducing the reward of committing a crime, removing the target, increasing surveillance, controlling weapons, and alerting the offending person’s conscience. As such, it requires assistance from the leadership at a number of public and private locations that tend to attract crime, including schools, hospitals, parks, bars, stores, and transit.
- Understanding the Causes of School Violence Using Open Source Data
- Evaluation of a Situational Crime Prevention Approach in Three Jails: The Jail Sexual Assault Prevention Project
- Understanding the Causes of School Violence Using Open Source Data
- Situational Approaches to Making Communities and Correction Institutions Safer
There also are promising practices related to situational crime prevention on CrimeSolutions:
- Closed Circuit Television (CCTV) Surveillance
- Improved Street Lighting
- Metal Detectors and Security Screenings at Airports as a Counterterrorism Strategy
- Alley Gating in the United Kingdom
NIJ continues to fund research with the goals of understanding the effects and usefulness of situational crime prevention. Ongoing research projects include:
A major theory in socio-behavioral and other sciences, life course theory posits that individual life experience is connected to dynamics that are driven by historical and socioeconomical factors.
In the criminological context, the central idea of life course theory is that childhood antisocial behavior, adolescent delinquency, and early adult criminal infractions are more likely when an individual's bond to society is weak or broken. It stresses turning points that may occur over an individual’s life course which affect their connection to society and its institutions, levels of social control, and thus likelihood to become involved in criminal behavior.
The theory is an effort to offer a comprehensive outlook on the study of criminal activity by considering a multitude of factors that affect offending across different time periods and contexts. The goal is to explain the onset of, persistence of, and desistance from offending behavior over the life course of an individual.
- Understanding the Causes of School Violence Using Open Source Data
- Pathways to School Shootings: An Integrated Developmental and Life Course Criminological Approach
- Determining the Effects of Neighborhood Peer and Family
[note 1] Sampson, R.J. & J.H. Laub. (1993). Crime in the Making: Pathways and Turning Points Through Life. Boston: Harvard University Press.
The Trafficking Victims Protection Act (TVPA) of 2000 was the first Federal law to address the trafficking of persons, aimed at the prevention, protection, and prosecution of both labor trafficking and sex trafficking. The TVPA created the most widely accepted definition of labor trafficking: "the recruitment, harboring, transportation, provision, or obtaining of a person for labor or services, through the use of force, fraud, or coercion for the purpose of subjection to involuntary servitude, peonage, debt bondage, or slavery” (DHS Human Trafficking Laws & Regulations).
Per the National Action Plan to Combat Human Trafficking, “Labor trafficking occurs across many different industries, including domestic work, traveling sales crews, food services, peddling and begging, agriculture, health and beauty services, construction, hospitality, and landscaping.”
- Article: How Does Labor Trafficking Occur in U.S. Communities and What Becomes of the Victims?
- Article: The Prevalence of Labor Trafficking in the United States
- Podcast: Human and Labor Trafficking in the U.S.
- Data-collection: Human Trafficking Reporting System
- Report: Prosecuting Human Trafficking Cases: Lessons Learned and Promising Practices
- Report: Understanding the Organization, Operation and Victimization of Labor Trafficking in the United States
- Report: An Exploratory Study of Labor Trafficking Among U.S. Citizen Victims
NIJ continues to fund research with the goals of understanding and preventing labor trafficking. Select ongoing research projects:
- Understanding the Trafficking of Children for the Purpose of Labor in the United States
- Evaluating the OHTS Tool and Assessing Outcomes for Human Trafficking Survivors
- Labor trafficking in construction and hospitality: Analyzing victim recruitment, exploitation, and service needs to identify strategies for prevention and intervention
- Understanding What Works in the Successful Identification, Investigation, and Prosecution of Labor Trafficking Cases in the United States
Machine learning is the study of computer algorithms that improve automatically through experience. It refers to the development of systems that can learn from data. A machine learning algorithm can, after exposure to an initial set of data, evaluate new, previously unseen examples and relate them to the initial “training” data. It is ideally suited for classification problems that involve implicit patterns, and it is most effective when used in conjunction with large amounts of data.
Criminal justice applications of machine learning include detecting patterns and anomalous behavior, predicting crowd behavior and crime patterns, protecting critical infrastructure, and uncovering criminal networks.
Read an NIJ Journal article on the role of machine learning in criminal justice.
Desistance is generally understood to mean the reduction in criminal behavior over time. It is the process of individuals ceasing engagement in criminal activities. Varying definitions and measurement strategies have evolved over the years. Early scholarship tended to view desistance as a discrete event — that is, the termination of offending or end of a criminal career. More recent definitions, however, suggest that desistance is instead a developmental process by which criminality declines over time.
In NIJ’s new publication Desistance From Crime: Implications for Research, Policy, and Practice, Dr. Michael Rocque offers an updated, theoretically grounded definition as a foundation for future work: Desistance is “the process by which criminality, or the individual risk for antisocial conduct, declines over the life-course, generally after adolescence.”
- Links to each chapter in Desistance From Crime: Implications for Research, Policy, and Practice
- NIJ hosted a webinar during which the authors presented and discussed key themes from each of their chapters. Watch a recording of the webinar.
Historically called domestic violence, intimate partner violence describes physical, sexual, or psychological harm by a current or former intimate partner or spouse. Types of intimate partner violence include physical violence, sexual violence, threats of physical or sexual violence, psychological/emotional violence, and stalking.
Violence by an intimate partner is linked to both immediate and long-term health, social, and economic consequences. Factors at all levels — individual, relationship, community, and societal — contribute to intimate partner violence. This type of violence can occur among heterosexual or same-sex couples.
Preventing intimate partner violence requires reaching a clear understanding of those factors, coordinating resources, and fostering and initiating change in individuals, families, and society.
- Roadmap to Violence Against Women Research: The NIJ Compendium
- New Approaches to Policing High-Risk Intimate Partner Victims and Offenders (NIJ Journal Issue 282)
- Employing Research To Understand Violence Against Women (NIJ Journal Issue 281)
- Child Trauma Response Team (CTRT): Pilot Program
- Intimate Partner Violence topic page
Dual system youth are a subset of “crossover youth” — juveniles who have been victims of maltreatment and have also engaged in delinquent acts. The dual system youth population consists of crossover youth who have entered, at some point, both the child welfare and juvenile justice systems. This vulnerable and high-risk group has unique, complex needs that demand a collaborative approach by the child welfare and juvenile justice systems.
The Dual System Youth Design Study, led by investigators at California State University Los Angeles and supported by NIJ and the Office of Juvenile Justice and Delinquency Prevention, suggests that more than half of the juvenile justice population has or will have child welfare involvement.
In forensic science, an alternate light source uses monochromatic light to detect and identify physical evidence, including bruises, body fluids, hair, clothing fibers, and other trace materials. This technology takes advantage of a material’s inherent luminescent properties that cause it to glow when struck with a specific wavelength of light.
Novel psychoactive substances (NPS), also referred to as designer drugs and synthetic drugs, are an emerging or re-emerging type of illicit substance. NPS are similar in structure and effect to common drugs of abuse, but differ enough that they evade detection with traditional tests and require new scheduling laws. NPS pose serious complications for both consumers and forensic scientists because their use may be linked to severe health problems and their chemical modifications makes them difficult to identify.
Read about research on NPS in the NIJ Journal article, Identifying New Illicit Drugs and Sounding the Alarm in Real Time, and in an article written by NIJ scientist Frances Scott, NPS Discovery and the Hunt for New Drugs of Abuse.
Mass spectrometry is a tool for measuring different fragments of a compound. In forensic science, mass spectrometry can be used, for example, to identify and discriminate individual drugs in seized substances. A mass spectrometer takes a sample, ionizes and breaks the compounds in it, and sorts the fragments by the ratio of their weight to their charge. The pattern of the captured fragments makes a spectral signature that can be used to identify the compound.
- Fast and Portable Drug Testing: Dual-Method Prototype Shows Promise for Court-Admissible Drug Testing
- Carbon-Based Fingerprint Powder as a One-Step Development and Matrix Application for High-Resolution Mass Spectrometry Imaging of Latent Fingerprints
- NIJ-funded research involving mass spectrometry
- Publications from NIJ-funded research involving mass spectrometry
NamUs is a national repository and resource center of information related to missing, unidentified, and unclaimed person cases. Funded and administered by the National Institute of Justice, NamUs fills the nation’s need for a central, online, secure database of unidentified remains and missing persons records. The database is searchable by all, with biometric and other secure case information accessible only to appropriate, vetted criminal justice users. All NamUs resources are provided at no cost to law enforcement, medical examiners, coroners, allied forensic professionals, and family members of the missing.
- Justice Department Fights for the Missing
- Justice Department Partnership Finds More than 300 Unidentified Persons Through Fingerprint Analysis
- Serial Killer Connections Through Cold Cases
- Searching for the Missing in a City of Millions
- Lost But Not Forgotten: Finding the Nation's Missing
Reintegration is when an individual transitions from being incarcerated in a prison or jail to living in a community and attempting to maintain a crime-free lifestyle.
Technology-facilitated abuse refers to harmful acts or courses of conduct facilitated through digital means that can compromise victims’ privacy and cause them to fear for their safety. Examples of such conduct are cyberstalking, nonconsensual pornography, swatting, doxing, and sextortion.
Personal harm from digital abuse extends far beyond the digital realm. These acts can cause serious psychological distress and damage relationships with family, friends, and partners and disrupt educational and professional pursuits.
Sextortion — A form of cyber extortion featuring an online attack on victim systems, for example through ransomware, in which and individual demands sexual images, sexual favors, or other things of value in exchange for stopping the attack.
Nonconsensual pornography — Distribution of nude or sexually explicit images or videos of an individual without consent.
Cyberstalking — Repeated use of electronic communications to stalk a person or group.
Doxing — Public release of private and sensitive personal identifying information about an individual without their consent. (The word “doxing” is derived from “documents.”)
Swatting — False report of an emergency to trigger an emergency response, specifically deployment of a SWAT team, to a location where no emergency exists.
Pediatric bruising patterns are tell-tale bruising patterns in injured children in order to differentiate between accidental injuries and physical abuse. Bruising on a child’s ear, buttocks, feet, or hands, for example, are not typical of accidental injuries and should alert physicians to possible abuse.
- Child Abuse or Accident? Bringing Science to Pediatric Emergency Departments and Forensic Investigations
- Impact Sites Representing Potential Bruising Locations Associated With Rearward Falls in Children
- Development of a Surrogate Bruising Detection System to Describe Bruising Patterns Associated with Common Childhood Falls
- Bruising as a Forensic Marker of Physical Elder Abuse
Using data, analysis, and research to complement experience and professional judgment, in order to provide the best possible police service to the public.
Evidence-Based Policing refers to scientific evidence, not evidence in the legal or investigative sense.