Nicole McMillan, Matt Schuling, and Austin Stein February 23, 2010.

Slides:



Advertisements
Similar presentations
Criminal Law Chapter 5.
Advertisements

Chapter 13 Abuse in Relationships. Nature of Relationship Abuse Physical abuse (violence): deliberate infliction of physical harm by either partner on.
Assault, Domestic Violence, Stalking and Elder Abuse
Extremist Speech Online. Introduction United States v. Alkhabaz Planned Parenthood v. American Coalition of Life Activists.
Forms of Cyberbullying
Criminal Law and Procedure
Prosecuting Stalking Fiona Gray Trial Advocate Office of the
Purdue University Calumet Counseling Center Gyte
Sandra Abbott th ST. Suite D Charlottesville, VA Phone: Fax: 434—
Stalking California passes first state legislation on stalking in 1990 By 1997, all 50 states had stalking laws.
STALKING AND CYBERSTALKING: When your life changes at some else's hands.
Cyberbullying.
 CLOSED ALL YOUR ACCOUNTS  STOLE ALL YOUR MONEY FROM YOUR BANK ACCOUNTS  HAD YOUR MEDICAL INSURANCE CANCELLED  MADE FALSE CLAIMS  DESTROYED YOUR.
Criminal Law and Cyber Crime
Chapter 3 Tort Law.
The Internet is Forever
Threatening Communications & Interstate Stalking Sean B. Hoar (voice)
Bullying Facts and Fiction. Bullying defined Any willful attempt or threat to inflict on another person when accompanied by an apparent present ability.
BELL QUIZ ON CHAPTER 2 What court has original jurisdiction over most federal court cases? What court has limited jurisdiction? Who is the party who accuses.
Listening to Women’s Voices Conversations with Women about Domestic Violence and Family Law.
Harsher Punishments for Cyberbullies By: Janeca Latore Section 001.
Unit 3- Criminal Code of Canada PP3 Property Crimes Other Crimes Offenses and Penalties.
4Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART Intentional Torts Section 4.1.
Stalking Stalking is a serious crime that occurs when one person engages in actions directed at another person (the target) which causes this person to.
Our Criminal Law Chapter 5.
Quick! What is a crime?. So, just how much has to be proven in court to find someone guilty of a crime? Burden of Proof The prosecution has the burden.
A Question of Freedom Adapted from.
Sutton Public Schools Anti-Bullying Law Overview.
WHAT WE ALL NEED TO KNOW. WHO’S BEHIND THE MASK..
DIGITAL LAW. SEXTING – A Modern Phenomena Sample scenario: A 17 yr old boy and a 15 yr old girl meet at a party. The girl sends a playful, but sexually.
Harassment and Violence POLICY. POLICY This school seeks to maintain an environment that is free from: Religious Harassment Racial Harassment Sexual Harassment.
3Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART What Is a Crime? Section 3.1.
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
3Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART What Is a Crime?
August 17, 2015 Sarah O. Edwards Assistant General Counsel Office of Legal Affairs The Campus SaVE Act: Understanding the Problems of Sexual Harassment.
Cyber Bullying Texting/Instant Messaging Lesson One Social Development 1 8th Grade.
Criminal Law and Cyber Crimes Chapters 6 & 7. Civil and Criminal Law Compared.
Introduction to Criminal Law
CHAPTERS 3 & 4 STUDY GUIDE. Arson- the willful and malicious burning of a house or building.
Use of force Ocga
Technology & Stalking. Every single datum about my life is private? That's silly," Scalia [said].
 Assault =  Any attempt or threat to carry out a physical attack upon another person  Battery =  Any unlawful physical contact inflicted by one person.
Stalking Awareness And Prevention Francis A. Arenas, Esq.
What’s New 2012 Virginia’s Sentencing Guidelines.
Basic Criminal Law: The United States Constitution, Procedure and Crimes Anniken U. Davenport ©2006 Pearson Education, Inc. Pearson Prentice Hall Upper.
 Discussion  Any inappropriate, unwanted, or cruel behavior (verbal or physical) that targets a person or group of people.  Can you think of examples.
1.A guilty state of mind: means that the prohibited act was done intentionally, knowingly, or willingly. 2.When lawyers discuss the requirement for a.
Tarasoff v. Regents of the University of California - revisited Wendy Packman PhD Used with permission.
Criminal Law Chapter 3. Classifications of Crimes Crime: –Considered an act against the public good Plaintiff: –The party that accuses a person of a crime.
Crimes against persons 7.3 Stalking, Cyberstalking and Hazing Forensics – November 12,
STALKING STALKING STALKINGSTALKING. What is Stalking? A course of conduct directed at a specific person that would cause a reasonable person to feel fear.
DIGITAL LAW. SEXTING – A Modern Phenomena Sample scenario: A 17 yr old boy and a 15 yr old girl meet at a party. The girl sends a playful, but sexually.
Domestic Violence Mercer Island High School Ms. Emery’s Class.
LAW for Business and Personal Use © 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
The First Amendment status of threats  Watts and later cases make clear that the 1st Amendment permits a State to ban a "true threat.”  What are the.
{ Cyber Bullying. Cyber Bullying is typically referred to as “ a communication or posting by one or more people using cybertechnology or digital media.
Violence in the Workplace LTC Policy # HR
Title IX: Our Community’s Responsibility for a Safer SEU.
4Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART Intentional Torts Section 4.1.
Intentional Torts Chapter 19. Types of Damages Compensatory Damages- money awarded to compensate for monetary loss and pain and suffering Nominal Damages-
Civil Law An overview of Tort Law – the largest branch of civil law Highlight the differences between tort law and criminal law How torts developed historically.
Virginia RULES Teens Learn & Live the Law Crimes Against Persons.
Assault Any unlawful attempt or offer with force or violence to do a corporal hurt to another, whether from malice or wantonness Aggravated.
 Cyber-bullying is "the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group,
Law for Business and Personal Use © Thomson South-Western CHAPTER 4 Criminal Law and Procedure 4-1 Criminal Law 4-2 Criminal Procedure.
Bodily Injury Crimes Whether actual or threatened.
Sutton Public Schools Anti-Bullying Law Overview
Crimes Against Persons
Bullying.
VIOLENCE.
Presentation transcript:

Nicole McMillan, Matt Schuling, and Austin Stein February 23, 2010

 The owner of a costume shop went to the public library and had harassing calls sent to a competing business owner. She asked a news crew to come to her place of business so she could tell her side of the story.  649A

(a) Whoever transmits in interstate or foreign commerce any communication containing any demand or request for a ransom or reward for the release of any kidnapped person, shall be fined under this title or imprisoned not more than twenty years, or both. (b) Whoever, with intent to extort from any person, firm, association, or corporation, any money or other thing of value, transmits in interstate or foreign commerce any communication containing any threat to kidnap any person or any threat to injure the person of another, shall be fined under this title or imprisoned not more than twenty years, or both. (c) Whoever transmits in interstate or foreign commerce any communication containing any threat to kidnap any person or any threat to injure the person of another, shall be fined under this title or imprisoned not more than five years, or both. (d)Whoever, with intent to extort from any person, firm, association, or corporation, any money or other thing of value, transmits in interstate or foreign commerce any communication containing any threat to injure the property or reputation of the addressee or of another or the reputation of a deceased person or any threat to accuse the addressee or any other person of a crime, shall be fined under this title or imprisoned not more than two years, or both.

You can’t communicate or transmit any of the following in interstate commerce: 1. A ransom demand 2. A threat to kidnap or injure someone with intent to extort money or anything else 3. Any threat to kidnap or injure someone (without monetary goal, lighter sentence) 4. Any threat to injure someone’s property or reputation with intent to extort money or anything else

 Prohibit using interstate communications for extortion purposes.  Not just to protect people, also protect against the threat itself. The statute is about the threat, not necessarily the crime that is threatened.  Protect people, property, and reputation.

Boyfriend sent a bomb threat to his girlfriend’s work via instant message. The message went from his home in Utah to the AOL hub in Virginia, then back to his girlfriend’s office in Utah. The message satisfied the jurisdictional element of § 875(c) because threat was transmitted across state lines, and there was no requirement that anyone in another state actually see it. The fact that the sender and the recipient were in the same state was irrelevant.

The threat must be one that a reasonable person would interpret as an expression of intent to inflict harm and actually cause fear in the recipient. Intent to communicate a threat is required; intent to actually get money is not. Intent to actually carry out the communicated threat is not required.

Conduct intended to harass or annoy someone, absent a specific threat. The Alkhabaz case provides an example of this problem.

Out-of-state s and stories posted on a website expressing interest in sexual violence towards women and girls. Posted a story about the torture, rape, and murder of a woman who shared a name with a college classmate. Held: the messages were not threatening communications. The court said no one would have taken these as serious expressions of intent to inflict harm, and they weren’t sent to intimidate anyone.

Elements of § 875(c): (1) Sends message in interstate commerce (2) Message contains a threat (3) The threat was a threat to kidnap or injure But … To not receive protection under the First Amendment the threat must qualify as a “true threat.”

 According to Justice O’Conner:  "True threats are not protected by the First Amendment and encompass those statements when the speaker means to communicate a serious intent to commit an act of unlawful violence to a particular individual or group of individuals; the speaker need not actually intend to carry out the threat.” Virginia v. Black.

 In other words …  Most circuits have held that a true threat is likely unprotected by the First Amendment when a communication is:  (1) reasonably intended to inspire fear in someone, and  (2) the person to whom the threat is communicated would reasonably conclude that the communication was meant to inspire fear of bodily injury in the person who is the object of the threat.

 Elements of a true threat according to the Sixth Circuit in Alkhabaz : (1) A reasonable person would understand the message as a serious intention to inflict bodily harm; (2) A reasonable person would understand the message as being communicated to effect some change or achieve some goal through intimidation.

  Lesson: People you meet on social networking sites are not always who they say they are, and they might be creepy stalkers.

 In 1990, California was the first state to enact an anti-stalking statute.  Half a million people are victims of stalking every year. 85% of stalking victims are not famous.  2001 Statistics  LA – 20% of 600 stalking cases involved cyberstalking  NY – 40% of stalking cases involved cyberstalking

 Enacted as part of the Violence Against Women Act (VAWA).  To protect people from stalkers (obviously).  Intent to harm need not materialize before crossing the state line.

Whoever-- (1) travels in interstate or foreign commerce or within the special maritime and territorial jurisdiction of the United States, or enters or leaves Indian country, with the intent to kill, injure, harass, or place under surveillance with intent to kill, injure, harass, or intimidate another person, and in the course of, or as a result of, such travel places that person in reasonable fear of the death of, or serious bodily injury to, or causes substantial emotional distress to that person, a member of the immediate family of that person, or the spouse or intimate partner of that person; or (2) with the intent-- (A) to kill, injure, harass, or place under surveillance with intent to kill, injure, harass, or intimidate, or cause substantial emotional distress to a person in another State or tribal jurisdiction or within the special maritime and territorial jurisdiction of the United States; or (B) to place a person in another State or tribal jurisdiction, or within the special maritime and territorial jurisdiction of the United States, in reasonable fear of the death of, or serious bodily injury to-- (i) that person; (ii) a member of the immediate family of that person; or (iii) a spouse or intimate partner of that person; uses the mail, any interactive computer service, or any facility of interstate or foreign commerce to engage in a course of conduct that causes substantial emotional distress to that person or places that person in reasonable fear of the death of, or serious bodily injury to, any of the persons described in clauses (i) through (iii) of subparagraph (B); shall be punished as provided in § 2261(B) of this title.

 You can’t travel or send communications across state lines  with intent to kill, injure, or harass someone.  nor can you place someone under surveillance  with intent to kill injure, harass, intimidate, or cause substantial emotional distress.  Or any of the above that places the person in reasonable fear of death or serious injury to themselves, their family, or their spouse.

 Cyberstalking can be viewed by anyone in the world.  Cyberstalking can occur from anywhere in the world.  Cyberstalkers can remain anonymous.

Stalked his favorite newswoman by ing her, mailing her, calling her, and leaving messages on her answering machine. This went on for over a year. The FBI was involved and was concerned for her safety. The court found Bowker used interstate communications to engage in conduct that caused emotional distress and reasonable fear in the newscaster. He had intent to injure, harass, place under surveillance. The quantity and content of his messages placed her in reasonable fear.

 Bowker was charged under § 2261A(1), which is covered by USSG § 2A6.2  § 2A6.2. Stalking or Domestic Violence  (a) Base Offense Level: 14  (b) Specific Offense Characteristic  (1) if the offense involved … “a pattern of activity involving stalking, threatening, harassing, or assaulting the same victim, increase by 2 levels.” Application Notes: “5. If the defendant received an enhancement under subsection (b)(1) … an upward departure may be warranted.”

§ 5K2.3. Extreme Psychological Injury (Policy Statement) “Psychological injury would be sufficiently severe to warrant [an upward departure] when there is a substantial impairment of the intellectual, psychological, emotional, or behavioral functioning of a victim, when the impairment is likely to be of an extended or continuous duration, and when the impairment manifests itself by physical or psychological symptoms or by changes in behavior patterns.” Bowker’s sentence was later vacated by the Supreme Court because … Under the Sixth Amendment, all USSG sentencing factors must be proved to a jury beyond a reasonable doubt. US v. Booker.

 Where a cyberstalker pretends to be the victim and encourages third parties to harass the victim.

In CA, a cyberstalker used the internet to solicit the rape of a woman who had rejected him.

 A cyberstalker sent hate in the victim’s name to groups of satanists, drug users, and pornographers.

The cyberstalker posted inflammatory comments on the web and sent s in her name to third parties. He also advertised her phone number and address in an alt.sex advertisement for “sadistic interaction.” She sued the cyberstalker, but he was never found liable.

 Feel free to ask question and clap loudly