U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Gang Snitch Profile

NCJ Number
168060
Journal
Journal of Gang Research Volume: 4 Issue: 3 Dated: (Spring 1997) Pages: 1-16
Author(s)
J A Laskey
Date Published
1997
Length
16 pages
Annotation
This research presents information that may be useful for a better understanding of the process of developing and using confidential informants who are gang members; the analysis seeks to identify those factors that significantly differentiate "snitch" behavior among a large sample of self-reported gang members.
Abstract
Data for this study were taken from Project GANGECON, a national task force study conducted by the National Gang Crime Research Center. This project samples 1,015 gang members from a number of different social contexts. Included in the project were just over 225 gangs, most of which fall into the Crip, Blood, People, Folks classification system. Three variables were measured in Project GANGECON about "snitch" behavior among gang members. The variables were designed to measure various levels of reward for the "snitch" behavior. The profile developed in this paper addresses the first of these measures of "snitch" behavior: whether they would testify in a secret grand jury against a gang leader for $1,000 cash. Some 19.5 percent of the gang members indicated they would do this. The findings show that such "snitch" behavior is most likely by the less committed gang member who does not have a permanent tattoo, has previously attempted to quit the gang, does not listen to gangster rap, believes that the gang exploits members over money, has fewer arrests than other gang members, and has fathered a child. Since such a high percentage of gang members would inform on other gang members under the right conditions, this suggests that efforts to counter gangs should exploit this weakness. 4 tables and 21 references

Downloads

No download available

Availability