Penal Code Of Texas, 1925
   HOME

TheInfoList



OR:

The Texas Penal Code is the principal
criminal code A criminal code or penal code is a document that compiles all, or a significant amount of, a particular jurisdiction's criminal law. Typically a criminal code will contain offences that are recognised in the jurisdiction, penalties that might ...
of the U.S. state of
Texas Texas ( , ; or ) is the most populous U.S. state, state in the South Central United States, South Central region of the United States. It borders Louisiana to the east, Arkansas to the northeast, Oklahoma to the north, New Mexico to the we ...
. It was originally enacted in 1856 and underwent substantial revision in 1973, with the passage of the Revised Penal Code, in large part based on the
American Law Institute The American Law Institute (ALI) is a research and advocacy group of judges, lawyers, and legal scholars limited to 3,000 elected members and established in 1923 to promote the clarification and simplification of United States common law and i ...
's
Model Penal Code The Model Penal Code (MPC) is a model act designed to stimulate and assist U.S. state legislatures to update and standardize the penal law of the United States.MPC (Foreword). The MPC was a project of the American Law Institute (ALI), and was pu ...
., p. 66Alt URL
/ref>


History

The first codification of Texas criminal law was the Texas Penal Code of 1856. Prior to 1856, criminal law in Texas was governed by the
common law Common law (also known as judicial precedent, judge-made law, or case law) is the body of law primarily developed through judicial decisions rather than statutes. Although common law may incorporate certain statutes, it is largely based on prece ...
, with the exception of a few penal statutes. In 1854, the fifth Legislature passed an act requiring the Governor to appoint a commission to codify the civil and criminal laws of Texas. Only the Penal Code and Code of Criminal Procedure, both authored by James Willie, were passed by the sixth Legislature and were effective as of February 1, 1857. These came to be referred to as the "Old Codes." The code underwent a major reorganization and reconciliation of existing criminal laws with the adoption of the Texas Penal Code of 1974. According to the Texas Legislative Counsel, the main objectives of the Revised Penal Code were to (1) consolidate, simplify, and clarify the substantive law of crimes; (2) modernize a Penal Code designed for the preindustrialized, rural, and underpopulated Texas society of a century ago; (3) identify and proscribe, with as much precision as possible, all significantly harmful criminal conduct; (4) rationally grade offenses, according to the harm they cause or threaten, and sensibly apportion the sentencing authority between the judiciary and correctional system; (5) codify the general principles of the penal law; and (6) collect in a single code all significant penal law, transferring to more appropriate locations in the statutes regulatory and similar laws that merely employed a penal sanction. Dean
W. Page Keeton Werdner Page Keeton (August 22, 1909 – January 10, 1999) was an attorney and dean of the University of Texas School of Law for a quarter century. Education Keeton was born in McCoy, Atascosa County, Texas, McCoy in Atascosa County, Texas th ...
of the
University of Texas The University of Texas at Austin (UT Austin, UT, or Texas) is a public research university in Austin, Texas, United States. Founded in 1883, it is the flagship institution of the University of Texas System. With 53,082 students as of fall 2 ...
played a key role in drafting, revising, and promoting the Revised Penal Code.


Organization

The Texas Penal Code is organized into titles and chapters. As of 2017, the basic structure is as follows:
Title 1
Introductory Provisions - Declares that all persons are presumed innocent unless
proven Proven is a rural village in the Belgian province of West Flanders, and a "deelgemeente" of the municipality Poperinge. The village has about 1400 inhabitants. The church and parish A parish is a territorial entity in many Christianity, Chr ...
guilty beyond a
reasonable doubt Beyond (a) reasonable doubt is a legal standard of proof required to validate a criminal conviction in most adversarial legal systems. It is a higher standard of proof than the standard of balance of probabilities (US English: preponderance of ...
. ##Chapter 1. General Provisions ##*Sec. 1.02 states the objectives of the penal code: "to establish a system of prohibitions, penalties, and correctional measures to deal with conduct that unjustifiably and inexcusably causes or threatens harm to those individual or public interests for which state protection is appropriate" through deterrence, rehabilitation, and punishment of convicted persons; by giving fair warning of prohibited conduct and consequences of violation; to prescribe penalties proportionate with the seriousness of offenses and take rehabilitation potential into consideration; "to safeguard conduct that is without guilt from condemnation as criminal"; to guide and limit law enforcement; and "to define the scope of state interest in law enforcement against specific offenses and to systematize the exercise of state criminal jurisdiction." ##*Sec. 1.03 provides that conduct not prohibited by law is not a criminal offense. ##*Sec. 1.04 through Sec. 1.09 cover: construction of the code (according to fair import of terms), computation of age, definitions, preemption (prohibiting political subdivisions from enacting or enforcing laws criminalizing same conduct as criminalized in Penal Code), and concurrent jurisdiction for offenses involving state property (granting Attorney General concurrent jurisdiction to prosecute if local prosecutor consents). ##Chapter 2. Burden of Proof ###Sec. 2.01 provides that all persons are presumed innocent unless each element of the offense alleged is proved beyond a reasonable doubt. ###Sec. 2.02 provides that the prosecutor must negate the existence of an exception where an exception is specifically stated in the statute. ###Sec. 2.03 provides that it is not the prosecutor's duty to disprove a defense and that the jury will not be instructed regarding any defense unless evidence is admitted to support the defense, and that if the defense is submitted to a jury, then the jury will be instructed "that a reasonable doubt on the issue requires that the defendant be acquitted." ###Sec. 2.04 provides the standard for affirmative defenses, which is essentially the same as for non-affirmative defenses except that the jury is instructed "that the defendant must prove the affirmative defense by a preponderance of evidence." ###Sec. 2.05 covers presumptions and requires that "if there is sufficient evidence of facts that give rise to the presumption, the issue of the existence of the presumed fact must be submitted to the jury, unless the court is satisfied that the evidence as a whole clearly precludes a finding beyond a reasonable doubt of the presumed fact."
Chapter 3
Multiple Prosecutions ##There is no Chapter 4 or Chapter
Title 2
General Principles of Criminal Responsibility
Chapter 6
Culpability In criminal law, culpability, or being culpable, is a measure of the degree to which an agent, such as a person, can be held morally or legally responsible for action and inaction. It has been noted that the word ''culpability'' "ordinarily has ...
Generally ##*Covers concepts such as ''
mens rea In criminal law, (; Law Latin for "guilty mind") is the mental state of a defendant who is accused of committing a crime. In common law jurisdictions, most crimes require proof both of ''mens rea'' and '' actus reus'' ("guilty act") before th ...
'' and ''
actus reus In criminal law, ''actus reus'' (; : ''actus rei''), Latin for "guilty act", is one of the elements normally required to prove commission of a crime in common law jurisdictions, the other being ("guilty mind"). In the United States, it is some ...
''.
Chapter 7
Criminal Responsibility for Conduct of Another ##*Covers
complicity Complicity in criminal law refers to the participation in a completed criminal act of an accomplice, a partner in the crime who aids or encourages ( abets) other perpetrators of that crime, and who shared with them an intent to act to complete ...
and
corporate liability Corporate liability, also referred to as liability of legal persons, determines the extent to which a company as a legal person can be held liable for the acts and omissions of the natural persons it employs and, in some legal systems, for those o ...
.
Chapter 8
General Defenses to Criminal Responsibility ##*Covers the
insanity defense The insanity defense, also known as the mental disorder defense, is an affirmative Defense (legal), defense by excuse in a criminal case, arguing that the defendant is not responsible for their actions due to a mental illness, psychiatric disease ...
,
mistake of fact In criminal law, a mistake of fact may sometimes mean that, while a person has committed the physical element of an offence, because they were labouring under a mistake of fact, they never formed the mental element. This is unlike a mistake ...
, mistake of law,
intoxication Intoxication — or poisoning, especially by an alcoholic or narcotic substance — may refer to: * Substance intoxication: ** Alcohol intoxication ** LSD intoxication ** Toxidrome ** Tobacco intoxication ** Cannabis intoxication ** Cocaine i ...
,
duress Coercion involves compelling a party to act in an involuntary manner through the use of threats, including threats to use force against that party. It involves a set of forceful actions which violate the free will of an individual in order to i ...
,
entrapment Entrapment is a practice in which a law enforcement agent or an agent of the state induces a person to commit a crime that the person would have otherwise been unlikely or unwilling to commit.''Sloane'' (1990) 49 A Crim R 270. See also agent prov ...
, and the responsibility and capacity of minors, including minors with
mental illness A mental disorder, also referred to as a mental illness, a mental health condition, or a psychiatric disability, is a behavioral or mental pattern that causes significant distress or impairment of personal functioning. A mental disorder is ...
.
Chapter 9
Justification Excluding Criminal Responsibility ##*Covers
self defense Self-defense (self-defence primarily in Commonwealth English) is a countermeasure that involves defending the health and well-being of oneself from harm. The use of the right of self-defense as a legal justification for the use of force in tim ...
,
defense of others The right of self-defense is the right for people as individuals to commit a crime, violent or non-violent, for the purpose of defending their own life (self-defense) and property, or to defend the lives of others, in certain circumstances. F ...
, public duty,
necessity Necessary or necessity may refer to: Concept of necessity * Need ** An action somebody may feel they must do ** An important task or essential thing to do at a particular time or by a particular moment * Necessary and sufficient condition, in l ...
,
suicide prevention Suicide prevention is a collection of efforts to reduce the risk of suicide. Suicide is often preventable, and the efforts to prevent it may occur at the individual, relationship, community, and society level. Suicide is a serious public healt ...
,
defense of property The defence of property is a common method of justification used by defendants who argue that they should not be held liable for any loss and injury that they have caused because they were acting to protect their property. English law Gener ...
, lawful arrest, and
child discipline Child discipline is the methods used to prevent future unwanted behaviour in children. The word ''discipline'' is defined as imparting knowledge and skill, in other words, to teach. In its most general sense, discipline refers to systematic ins ...
. #Title 3. Punishments
Chapter 12
Punishments ##*Prescribes available punishment according to classification of the offense (Class A misdemeanor, Class B misdemeanor, Class C misdemeanor, capital felony, first-degree felony, second-degree felony, state jail felony) along with aggravating circumstances (
repeat Repeat may refer to: * Rerun, a rebroadcast of an episode of a radio or television program * Repeated sequence (DNA), a pattern of nucleic acid (DNA or RNA) that occurs in multiple copies throughout the genome ** CRISPR * The smallest rectangle th ...
and
habitual offender A habitual offender, repeat offender, or career criminal is a person convicted of a crime who was previously convicted of other crimes. Various state and jurisdictions may have laws targeting habitual offenders, and specifically providing for enha ...
s,
hate crime Hate crime (also known as bias crime) in criminal law involves a standard offence (such as an assault, murder) with an added element of bias against a victim (individual or group of individuals) because of their physical appearance or perceived ...
s,
elder abuse Elder abuse (also called elder mistreatment, senior abuse, abuse in later life, abuse of older adults, abuse of older women, and abuse of older men) is a single or repeated act, or lack of appropriate action, occurring within any relationship where ...
,
narcotic The term narcotic (, from ancient Greek ναρκῶ ''narkō'', "I make numb") originally referred medically to any psychoactive compound with numbing or paralyzing properties. In the United States, it has since become associated with opiates ...
s, and crimes committed in a disaster or evacuated area .g., looting">looting.html" ;"title=".g., looting">.g., looting. #Title 4. Inchoate offense">Inchoate Offenses An inchoate offense, preliminary crime, inchoate crime or incomplete crime is a crime of preparing for or seeking to commit another crime. The most common example of an inchoate offense is "attempt". "Inchoate offense" has been defined as the fol ...

Chapter 15
Preparatory Offenses ##*Covers criminal attempt, Conspiracy (criminal), criminal conspiracy, and Solicitation#United States, criminal solicitation.
Chapter 16
Criminal Instruments, Interception of Wire or Oral Communication, and Installation of Tracking Device ##*Covers
wiretapping Wiretapping, also known as wire tapping or telephone tapping, is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connecti ...
, unauthorized computer network penetration, etc. #Title 5. Offenses Against the Person
Chapter 19
Criminal
Homicide Homicide is an act in which a person causes the death of another person. A homicide requires only a Volition (psychology), volitional act, or an omission, that causes the death of another, and thus a homicide may result from Accident, accidenta ...
##*Covers
murder Murder is the unlawful killing of another human without justification (jurisprudence), justification or valid excuse (legal), excuse committed with the necessary Intention (criminal law), intention as defined by the law in a specific jurisd ...
,
capital murder Capital murder refers to a category of murder in some parts of the US for which the perpetrator is eligible for the death penalty. In its original sense, capital murder was a statutory offence of aggravated murder in Great Britain, Northern Irela ...
,
manslaughter Manslaughter is a common law legal term for homicide considered by law as less culpable than murder. The distinction between murder and manslaughter is sometimes said to have first been made by the ancient Athenian lawmaker Draco in the 7th ce ...
, and criminally
negligent homicide Negligent homicide is a criminal charge brought against a person who, through criminal negligence, allows another person to die. Other times, an intentional killing may be negotiated down to this lesser charge as a compromised resolution of a mur ...
.
Chapter 20
Kidnapping Kidnapping or abduction is the unlawful abduction and confinement of a person against their will, and is a crime in many jurisdictions. Kidnapping may be accomplished by use of force or fear, or a victim may be enticed into confinement by frau ...
, Unlawful Restraint, and Smuggling of Persons ##*Covers
false arrest False arrest, unlawful arrest or wrongful arrest is a common law tort, where a plaintiff alleges they were held in custody without probable cause, or without an order issued by a court of competent jurisdiction. Although it is possible to sue ...
, kidnapping,
ransom Ransom refers to the practice of holding a prisoner or item to extort money or property to secure their release. It also refers to the sum of money paid by the other party to secure a captive's freedom. When ransom means "payment", the word ...
, and human trafficking.
Chapter 21
Sexual Offenses ##*Covers
child sexual abuse Child sexual abuse (CSA), also called child molestation, is a form of child abuse in which an adult or older adolescent uses a child for sexual stimulation. Forms of child sexual abuse include engaging in Human sexual activity, sexual activit ...
, homosexual conduct (declared unconstitutional by ''
Lawrence v. Texas ''Lawrence v. Texas'', 539 U.S. 558 (2003), is a List of landmark court decisions in the United States, landmark decision of the Supreme Court of the United States, United States Supreme Court in which the Court ruled that U.S. state laws Sodom ...
'' in 2003),
public lewdness Indecent exposure is the deliberate public exposure by a person of a portion of their body in a manner contrary to local standards of appropriate behavior. Laws and social attitudes regarding indecent exposure vary significantly in different ...
,
indecent exposure Indecent exposure is the deliberate public exposure by a person of a portion of their body in a manner contrary to local standards of appropriate behavior. Laws and social attitudes regarding indecent exposure vary significantly in different ...
, bestiality, indecency with a child, sexual relationships between students and teachers,
secret photography Secret photography is the use of an image or video recording device to photograph or film a person who is unaware that they are being intentionally photographed or filmed. It is sometimes called covert photography. Uses A person may be unawar ...
, unlawful disclosure or promotion of intimate visual material (see
revenge porn Revenge porn is the distribution of sexually explicit images or videos of individuals without their consent, with the punitive intention to create public humiliation or character assassination out of revenge against the victim. The material ma ...
),
voyeurism Voyeurism is the sexual interest in or practice of watching other people engaged in intimate behaviors, such as undressing, sexual activity, or other actions of a private nature. The term comes from the French ''voir'' which means "to see". ...
, and sexual coercion (see webcam blackmailing).
Chapter 22
Assaultive Offenses ##*Covers
assault In the terminology of law, an assault is the act of causing physical harm or consent, unwanted physical contact to another person, or, in some legal definitions, the threat or attempt to do so. It is both a crime and a tort and, therefore, may ...
,
sexual assault Sexual assault is an act of sexual abuse in which one intentionally Physical intimacy, sexually touches another person without that person's consent, or Coercion, coerces or physically forces a person to engage in a sexual act against their w ...
(including
rape Rape is a type of sexual assault involving sexual intercourse, or other forms of sexual penetration, carried out against a person without consent. The act may be carried out by physical force, coercion, abuse of authority, or against a person ...
,
child rape Child sexual abuse (CSA), also called child molestation, is a form of child abuse in which an adult or older adolescent uses a child for sexual stimulation. Forms of child sexual abuse include engaging in sexual activities with a child (whet ...
,
date rape Date rape is a form of acquaintance rape and dating violence. The two phrases are often used interchangeably, but date rape specifically refers to a rape in which there has been some sort of romantic or potentially sexual relationship between ...
and
drug-facilitated sexual assault Drug-facilitated sexual assault (DFSA) is a sexual assault (rape or otherwise) carried out on a person after the person has become intoxicated due to being under the influence of any mind-altering substances, such as having consumed alcohol o ...
, etc.), and aggravated assault (includes assault with a deadly weapon, assault on a public servant,
witness tampering Witness tampering is the act of attempting to improperly influence, alter or prevent the testimony of witnesses within criminal or civil proceedings. Witness tampering and reprisals against witnesses in organized crime cases have been a difficulty ...
, and
drive-by shooting A drive-by shooting is a type of assault that usually involves the perpetrator(s) firing a weapon from within a motor vehicle and then fleeing. Drive-by shootings allow the perpetrators to quickly strike their targets and flee the scene before l ...
s) #Title 6. Offenses Against the Family
Chapter 25
Offenses Against the Family ##*Covers
bigamy In a culture where only monogamous relationships are legally recognized, bigamy is the act of entering into a marriage with one person while still legally married to another. A legal or de facto separation of the couple does not alter their mar ...
,
incest Incest ( ) is sexual intercourse, sex between kinship, close relatives, for example a brother, sister, or parent. This typically includes sexual activity between people in consanguinity (blood relations), and sometimes those related by lineag ...
, interference with
child custody Child custody is a legal term regarding '' guardianship'' which is used to describe the legal and practical relationship between a parent or guardian and a child in that person's care. Child custody consists of ''legal custody'', which is the ri ...
, criminal nonsupport, harboring a
runaway Runaway, Runaways or Run Away may refer to: Engineering * Runaway reaction, a chemical reaction releasing more heat than what can be removed and becoming uncontrollable * Thermal runaway, self-increase of the reaction rate of an exothermic proce ...
child,
domestic violence Domestic violence is violence that occurs in a domestic setting, such as in a marriage Marriage, also called matrimony or wedlock, is a culturally and often legally recognised union between people called spouses. It establishes r ...
,
trafficking of children Trafficking of children, also known as child trafficking, is a form of human trafficking and is defined by the United Nations as the "recruitment, transportation, harbouring, or receipt of a child" for the purpose of slavery, forced labour, and s ...
, etc.). #Title 7. Offenses Against Property
Chapter 28
Arson Arson is the act of willfully and deliberately setting fire to or charring property. Although the act of arson typically involves buildings, the term can also refer to the intentional burning of other things, such as motor vehicles, watercr ...
,
Criminal Mischief Mischief (or malicious mischief) is the name for a class of criminal offenses that are defined differently in different legal jurisdictions. While the wrongful acts will often involve what is popularly described as vandalism, there can be a lega ...
, and Other
Property Damage Property damage (sometimes called damage to property) is the damage or destruction of real or tangible personal property, caused by negligence, willful destruction, or an act of nature. Destruction of property (sometimes called property de ...
or Destruction ##*Also covers
vandalism Vandalism is the action involving deliberate destruction of or damage to public or private property. The term includes property damage, such as graffiti and defacement directed towards any property without permission of the owner. The t ...
and
graffiti Graffiti (singular ''graffiti'', or ''graffito'' only in graffiti archeology) is writing or drawings made on a wall or other surface, usually without permission and within public view. Graffiti ranges from simple written "monikers" to elabor ...
.
Chapter 29
Robbery Robbery is the crime of taking or attempting to take anything of value by force, threat of force, or use of fear. According to common law, robbery is defined as taking the property of another, with the intent to permanently deprive the person o ...

Chapter 30
Burglary Burglary, also called breaking and entering (B&E) or housebreaking, is a property crime involving the illegal entry into a building or other area without permission, typically with the intention of committing a further criminal offence. Usually ...
and Criminal
Trespass Trespass is an area of tort law broadly divided into three groups: trespass to the person (see below), trespass to chattels, and trespass to land. Trespass to the person historically involved six separate trespasses: threats, assault, battery ...

Chapter 31
Theft Theft (, cognate to ) is the act of taking another person's property or services without that person's permission or consent with the intent to deprive the rightful owner of it. The word ''theft'' is also used as a synonym or informal shor ...
##*Consolidates as simply "theft" distinct charges previously known as theft by false
pretext A pretext (: ''pretextual'') is an excuse to do something or say something that is not accurate. Pretexts may be based on a half-truth or developed in the context of a misleading fabrication. Pretexts have been used to conceal the true purpose or r ...
,
conversion Conversion or convert may refer to: Arts, entertainment, and media * ''The Convert'', a 2023 film produced by Jump Film & Television and Brouhaha Entertainment * "Conversion" (''Doctor Who'' audio), an episode of the audio drama ''Cyberman'' * ...
by a
bailee Bailment is a legal relationship in common law, where the owner of personal property ("chattel") transfers physical possession of that property to another, who holds the property for a certain purpose, but retains ownership. The owner who sur ...
, theft from the person,
shoplifting Shoplifting (also known as shop theft, shop fraud, retail theft, or retail fraud) is the theft of goods from a retail establishment during business hours. The terms ''shoplifting'' and ''shoplifter'' are not usually defined in law, and genera ...
, acquisition of property by threat, swindling, swindling by worthless check,
embezzlement Embezzlement (from Anglo-Norman, from Old French ''besillier'' ("to torment, etc."), of unknown origin) is a type of financial crime, usually involving theft of money from a business or employer. It often involves a trusted individual taking ...
,
extortion Extortion is the practice of obtaining benefit (e.g., money or goods) through coercion. In most jurisdictions it is likely to constitute a criminal offence. Robbery is the simplest and most common form of extortion, although making unfounded ...
, receiving or concealing embezzled property, and receiving or concealing stolen property. Also covers theft of
trade secrets A trade secret is a form of intellectual property (IP) comprising confidential information that is not generally known or readily ascertainable, derives economic value from its secrecy, and is protected by reasonable efforts to maintain its conf ...
, vehicle theft, signal theft, EAS shielding and deactivation instruments (see booster bag), skimming, cargo theft, and
petroleum Petroleum, also known as crude oil or simply oil, is a naturally occurring, yellowish-black liquid chemical mixture found in geological formations, consisting mainly of hydrocarbons. The term ''petroleum'' refers both to naturally occurring un ...
theft.
Chapter 32
Fraud In law, fraud is intent (law), intentional deception to deprive a victim of a legal right or to gain from a victim unlawfully or unfairly. Fraud can violate Civil law (common law), civil law (e.g., a fraud victim may sue the fraud perpetrato ...
##*Covers
forgery Forgery is a white-collar crime that generally consists of the false making or material alteration of a legal instrument with the specific mens rea, intent to wikt:defraud#English, defraud. Tampering with a certain legal instrument may be fo ...
,
counterfeiting A counterfeit is a fake or unauthorized replica of a genuine product, such as money, documents, designer items, or other valuable goods. Counterfeiting generally involves creating an imitation of a genuine item that closely resembles the original ...
,
carding In Textile manufacturing, textile production, carding is a mechanical process that disentangles, cleans and intermixes fibres to produce a continuous web or sliver (textiles), sliver suitable for subsequent processing. This is achieved by passi ...
, fraudulent loan applications,
lottery scam A lottery scam is a type of advance-fee fraud which begins with an unexpected email notification, phone call, or mailing (sometimes including a large check) explaining that "You have won!" a large sum of money in a lottery. The recipient of the m ...
s and fake
sweepstake In the United States, a sweepstake is a type of contest where a prize or prizes may be awarded to a winner or winners. Sweepstakes began as a form of lottery that were tied to products sold. In response, the FCC and FTC refined U.S. broadcast ...
s,
essay mill An essay ( ) is, generally, a piece of writing that gives the author's own argument, but the definition is vague, overlapping with those of a letter, a paper, an article, a pamphlet, and a short story. Essays have been sub-classified as for ...
s,
identity theft Identity theft, identity piracy or identity infringement occurs when someone uses another's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. ...
, etc.
Chapter 33
Computer Crimes ##*Covers hacking,
phishing Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware. Phishing attacks have become increasingly sophisticate ...
, online solicitation of a minor (see, e.g.,
To Catch a Predator ''To Catch a Predator'' is an American reality television series in the television news magazine program ''Dateline NBC'' featuring confrontations of host Chris Hansen, partly filmed with a hidden camera, with adult men arriving at a Sting oper ...
),
denial-of-service attack In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host co ...
s and other
cyber-attack A cyberattack (or cyber attack) occurs when there is an unauthorized action against computer infrastructure that compromises the CIA triad, confidentiality, integrity, or availability of its content. The rising dependence on increasingly comple ...
s,
ransomware Ransomware is a type of malware that Encryption, encrypts the victim's personal data until a ransom is paid. Difficult-to-trace Digital currency, digital currencies such as paysafecard or Bitcoin and other cryptocurrency, cryptocurrencies are com ...
,
computer virus A computer virus is a type of malware that, when executed, replicates itself by modifying other computer programs and Code injection, inserting its own Computer language, code into those programs. If this replication succeeds, the affected areas ...
es,
cryptovirology Cryptovirology refers to the study of cryptography use in malware, such as ransomware and asymmetric backdoors. Traditionally, cryptography and its applications are defensive in nature, and provide privacy, authentication, and security to users. ...
, etc.
Chapter 33A
Telecommunications Crime ##*Covers
phone fraud Phone fraud, or more generally communications fraud, is the use of telecommunications products or services with the intention of illegally acquiring money from, or failing to pay, a telecommunication company or its customers. Many operators hav ...
,
caller ID spoofing Caller ID spoofing is a spoofing attack which causes the telephone network's Caller ID to indicate to the receiver of a call that the originator of the call is a station other than the true originating station. This can lead to a display showin ...
, etc.
Chapter 34
Money Laundering Money laundering is the process of illegally concealing the origin of money obtained from illicit activities (often known as dirty money) such as drug trafficking, sex work, terrorism, corruption, and embezzlement, and converting the funds i ...

Chapter 35
Insurance Fraud Insurance fraud is any intentional act committed to deceive or mislead an insurance company during the application or claims process, or the wrongful denial of a legitimate claim by an insurance company. It occurs when a claimant knowingly attem ...

Chapter 35A
Medicaid Medicaid is a government program in the United States that provides health insurance for adults and children with limited income and resources. The program is partially funded and primarily managed by U.S. state, state governments, which also h ...
Fraud #Title 8. Offenses Against Public Administration
Chapter 36
Bribery Bribery is the corrupt solicitation, payment, or Offer and acceptance, acceptance of a private favor (a bribe) in exchange for official action. The purpose of a bribe is to influence the actions of the recipient, a person in charge of an official ...
and Corrupt Influence
Chapter 37
Perjury Perjury (also known as forswearing) is the intentional act of swearing a false oath or falsifying an affirmation to tell the truth, whether spoken or in writing, concerning matters material to an official proceeding."Perjury The act or an insta ...
and Other Falsification
Chapter 38
Obstructing Governmental Operation
Chapter 39
Abuses of Office #Title 9. Offenses Against Public Order and Decency
Chapter 42
Disorderly Conduct Disorderly conduct is a crime in most jurisdictions, such as the United States and China. Typically, "disorderly conduct" is a term used to refer to any behavior that is considered unacceptable in a formal, civilized or controlled environment. ...
and Related Offenses
Chapter 43
Public Indecency #Title 10. Offenses Against Public Health, Safety, and Morals
Chapter 46
Weapons
Chapter 47
Gambling Gambling (also known as betting or gaming) is the wagering of something of Value (economics), value ("the stakes") on a Event (probability theory), random event with the intent of winning something else of value, where instances of strategy (ga ...

Chapter 48
Conduct Affecting Public Health
Chapter 49
Intoxication and Alcoholic Beverage Offenses ##*Covers driving, flying, and boating while intoxicated,
vehicular manslaughter Vehicular homicide is a crime that involves the death of a person other than the driver as a result of either criminally negligent or murderous operation of a motor vehicle. In cases of criminal negligence, the defendant is commonly charged w ...
, etc. #Title 11.
Organized Crime Organized crime is a category of transnational organized crime, transnational, national, or local group of centralized enterprises run to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a f ...

Chapter 71
Organized Crime ##*Covers
mafia "Mafia", as an informal or general term, is often used to describe criminal organizations that bear a strong similarity to the Sicilian Mafia, original Mafia in Sicily, to the Italian-American Mafia, or to other Organized crime in Italy, organiz ...
s,
street gang A gang is a social group, group or secret society, society of associates, friends, or members of a family with a defined leadership and internal organization that identifies with or claims control over Wiktionary:territory#Noun, territory in a ...
s,
crime boss A crime boss, also known as a crime lord, mafia don, mob boss, kingpin, or godfather is the leader of a criminal organization. Description A crime boss has absolute or nearly absolute control over the other members of the organization and is ...
es, etc.


References

Crime in Texas Criminal codes U.S. state criminal legislation Texas law {{Statutory codes of the United States by U.S. state