skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 228929 Find in a Library
Title: Correlates of Currency Counterfeiting
Journal: Journal of Criminal Justice  Volume:37  Issue:5  Dated:September-October 2009  Pages:472-477
Author(s): Robert G. Morris; Heith Copes; Kendra Perry-Mullis
Date Published: October 2009
Page Count: 6
Type: Report (Study/Research)
Format: Article
Language: English
Country: Netherlands
Annotation: Using data from closed case files from the U.S. Secret Service in a southern jurisdiction, this study presents a descriptive analysis of currency counterfeiting.
Abstract: The data indicate that in the district studied, consumer computers, printers, and copiers have made it easier to replicate U.S. currency. Sophisticated criminal networks, advanced skills, and expensive tools are no longer needed to counterfeit currency. Anyone with larcenous motivations and access to digital technology can produce passable counterfeit bills. Counterfeiting in the district studied was not overly overrepresented by a specific gender, age, and history of crime compared to more traditional types of offending. The majority of counterfeiting cases involved multiple offenders, particularly among female counterfeiters. Female counterfeiters more often worked in groups; however, there was no way of knowing exactly how many people were involved in making counterfeit currency with home-based tools. The authors advise that generalization from these findings toward counterfeiting in general is unwarranted, as this study provides exploratory findings only. The data was limited since it was based on information from a single Secret Service field office. Another limitation was the narrow scope of the data available from the case files. The case files used for this study were closed from 2003 through mid-2008. Data were limited to cases that involved at least one identifiable offender. The study involved 123 counterfeiting cases that involved 242 individuals identified as currency counterfeiters or being involved in purposely passing counterfeit currency. The data included in the case files pertained to a variety of offender and offense characteristics. 6 tables, 4 notes, and 16 references
Main Term(s): Police policies and procedures
Index Term(s): Computer related crime; Counterfeiting; Criminal methods; Offender profiles
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.