enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. List of Texas slave traders - Wikipedia

    en.wikipedia.org/wiki/List_of_Texas_slave_traders

    This is a list of slave traders operating within the present-day boundaries of Texas before 1865, including the eras of Spanish Texas (before 1821), Mexican Texas (1821–1836), the Republic of Texas (1836–1846), and antebellum U.S. and Confederate Texas (1846–1865). Tom Banks, Richmond and Texas [1] Daniel Berry, Tennessee and Texas [2]

  3. Texas Penal Code - Wikipedia

    en.wikipedia.org/wiki/Texas_Penal_Code

    The first codification of Texas criminal law was the Texas Penal Code of 1856. Prior to 1856, criminal law in Texas was governed by the common law, with the exception of a few penal statutes. [3] In 1854, the fifth Legislature passed an act requiring the Governor to appoint a commission to codify the civil and criminal laws of Texas.

  4. Embezzlement - Wikipedia

    en.wikipedia.org/wiki/Embezzlement

    An example of conversion is when a person logs checks in a check register or transaction log as being used for one specific purpose and then explicitly uses the funds from the checking account for another and completely different purpose. [3] When embezzlement occurs as a form of theft, distinguishing between embezzlement and larceny can be ...

  5. Corruption in local government - Wikipedia

    en.wikipedia.org/wiki/Corruption_in_local_government

    Forms of corruption pertaining to money like bribery, extortion, embezzlement, and graft are found in local government systems. Other forms of political corruption are nepotism and patronage systems. One historical example was the Black Horse Cavalry, a group of New York state legislators accused of blackmailing corporations.

  6. Extortion - Wikipedia

    en.wikipedia.org/wiki/Extortion

    Neither extortion nor blackmail requires a threat of a criminal act, such as violence, merely a threat used to elicit actions, money, or property from the object of the extortion. Such threats include the filing of reports (true or not) of criminal behavior to the police, revelation of damaging facts (such as pictures of the object of the ...

  7. Federal prosecution of public corruption in the United States

    en.wikipedia.org/wiki/Federal_prosecution_of...

    The Crimes Act of 1825 added the offenses of extortion under color of office, theft or embezzlement by a Second Bank employee, and coin embezzlement or dilution by a Mint employee. [ 7 ] The mail fraud statute, 18 U.S.C. § 1341, "[t]he oldest statute used to address public corruption," was enacted in 1872 and first used against public ...

  8. Texas’s homicide statute could also be used to bring charges against someone who conspires or assists a pregnant person to access an abortion in the state, per the Texas Policy Evaluation Project.

  9. Racketeering - Wikipedia

    en.wikipedia.org/wiki/Racketeering

    The traditional and historically most common example of a racket is the "protection racket", in which racketeers offer to protect a business from robbery or vandalism; however, the racketeers will themselves coerce or threaten the business into accepting this service, often with the threat (implicit or otherwise) that failure to acquire the ...