Entrapment in Cyberspace Jennifer Gregg

Total Page:16

File Type:pdf, Size:1020Kb

Entrapment in Cyberspace Jennifer Gregg Hastings Communications and Entertainment Law Journal Volume 19 | Number 1 Article 6 1-1-1996 Caught in the Web: Entrapment in Cyberspace Jennifer Gregg Follow this and additional works at: https://repository.uchastings.edu/ hastings_comm_ent_law_journal Part of the Communications Law Commons, Entertainment, Arts, and Sports Law Commons, and the Intellectual Property Law Commons Recommended Citation Jennifer Gregg, Caught in the Web: Entrapment in Cyberspace, 19 Hastings Comm. & Ent. L.J. 157 (1996). Available at: https://repository.uchastings.edu/hastings_comm_ent_law_journal/vol19/iss1/6 This Note is brought to you for free and open access by the Law Journals at UC Hastings Scholarship Repository. It has been accepted for inclusion in Hastings Communications and Entertainment Law Journal by an authorized editor of UC Hastings Scholarship Repository. For more information, please contact [email protected]. Caught in the Web: Entrapment in Cyberspace by JENNIFER GREGG* Table of Contents I. Online Child Pornography and the Current Response of Law Enforcem ent ................................................................ 161 II. Overview of Cyberspace ...................................................... 166 A. Levels of Interaction: Terms and Definitions ............ 166 1. Electronic M ail ........................................................ 167 2. Bulletin Board Systems (BBSs) ............... 167 3. FTP & the World Wide Web ................................ 169 B. Unique Attributes of Cyberspace ................ 169 III. History of Entrapment Law ................................................ 170 A. Origin and Underlying Goals ................... 170 B. Subjective Versus Objective Debate ............. 172 1. The Subjective Test ................................................ 172 2. Procedural Summary ............................................... 178 3. The O bjective Test .................................................. 180 C . C riticism s .........................................................................183 IV. Potential Application of Existing Entrapment Law to Child Porn Stings in Cyberspace .................... 186 A. Predisposition in Cyberspace ................... 186 1. Legal Standards ....................................................... i86 2. Evidentiary Issues .................................................... 188 3. Privacy Issues ........................................................... 189 4. Community Standards ............................................ 190 B. Police Inducement Standards ........................................ 191 1. Sliding Scale of Deception .................. 191 2. Privacy Expectations ............................................... 192 * J.D. expected University of California, Hastings College of the Law, 1997; B.A., University of California, Berkeley, 1992. The author would like to thank and acknowledge Scott Bonagofsky and Kristy Wheeler for their contributions in writing this Note. 158 HASTINGS COMM/ENT LJ. [VOL. 19:157 3. Efficient Allocation of Police Resources .............. 192 V. Alternatives Considered ...................................................... 193 A. Private/Non-legislative Solutions ................. 193 1. Parental Supervision ................................................ 193 2. User Awareness ....................................................... 194 3. Sysop Censorship/Monitoring ............... 194 B. Legislative/Public Solutions .................... 195 1. Civil Penalties .......................................................... 195 2. Criminal Penalties .................................................... 195 3. Police Procedure Legislation ................................ 195 V I. Conclusion ............................................................................. 196 19961 CAUGHT IN THE WEB Introduction In September 1995, the Federal Bureau of Investigation made its first nationwide sweep to catch pedophiles who misuse computer networks to solicit sex from minors and transmit illegal pornographic material.' Conducted with search warrants and the permission of America Online (AOL), the two year investigation resulted in 15 arrests and the seizure of 125 suspects' computers and diskettes.2 Agents gathered evidence undercover by posing while "on-line" as underage potential victims and pedophiles,' by monitoring private e- mail and private "chats," or conversations, using AOL services.4 Encouraged by the success of this operation, federal law enforcement authorities have indicated plans to use similar surveillance techniques to fight other computer-related crimes including consumer fraud, money laundering, and stolen credit card rings.5 Since the 1970's, undercover investigations have resulted in an increase in prosecutions in the area of child pornography at both the state and federal levels.6 Law enforcement has used extremely creative methods, putting the government in the position of seemingly being one of the major marketing forces of child pornography in the United 1. Michele Quinn, FBI Raids Hit Child Cyberporn, S.F. CHRON., Sept. 14, 1995, at Al. America Online has 3.5 million subscribers nationwide and was America's largest computer network in 1995. Id. Federal and local law enforcement agencies had been using similar techniques since 1993 to conduct investigations on amateur electronic bulletin boards where computer criminals traffic in stolen information, child pornography, poison recipes, and bomb making instructions. Ralph Blumenthal, Cyber Cop Patrols Computer Underworld, S.F. CHRON., Feb. 7, 1993, at 4. Previously, in 1993, a federal investigation, "Operation Long Arm," targeted child-porn rings on amateur bulletin boards. For a description of bulletin board services, see infra Part II.A.2. 40 Computerized Child Porn Locations Raided, One in County, SAN DIEGO UNION- TRIB., Mar. 5, 1993, at A8. 2. Rajiv Chandrasekaran, Undercover on the Dark Side of Cyberspace; Online FBI Agents Troll for those Who Prey on Children but Cybercops Tactics Chill Critics, WASH. POST, Jan. 2, 1996, at D1. AOL was first alerted to the online distribution of child pornography by subscribers who forwarded examples of the distributed material to the company. After determining the material was illegal, AOL sent out warnings to users and contacted law enforcement. Quinn, supra note 1, at Al. 3. In the context of this Note, the term "pedophile" refers to individuals in search of either child pornography or minors to recruit for sex. 4. Bruce Selcraig, Chasing Computer Perverts,PENTHOUSE, Feb. 1996, at 47, 48. 5. Steven Labaton, As PornographyArrests Grow, So Do Plans for Computer Stings, N.Y. TIMES, Sept. 16, 1995, at Al. A discussion of other consensual and conspiratorial computer- related crimes is beyond the scope of this Note. For further information regarding computer- related crimes, see generally Adam Ciongoli, Computer Related Crimes, 31 AM. CRIM. L. REV. 425 (1994); Scott Charney, Computer Crime, 41 FED. B. NEWS &J. 489 (1994). 6. Jack B. Harrison, Case Note, The Government as Pornographer: Government Sting Operationsand Entrapment,61 U. CIN. L. REV. 1067, 1068 (1993). HASTINGS COMM/ENT L.J. [VOL. 19:157 States. 7 The undercover policing of child pornography distribution and related crimes in "cyberspace" 8 creates the potential for new levels of police deception and creativity, and heightens the potential for abuse. This Note focuses on the difficulties of applying existing entrapment doctrine, currently the chief limitation on police deception, to computer sting operations. The following analysis suggests that different settings for undercover police operations merit different levels of protection. Specifically, the unique characteristics of cyberspace warrant greater protection and vigilance against abuse than other "real world" settings. This Note concludes that either the legislature or the appropriate law enforcement agencies must create guidelines for controlling undercover policing in this new forum, rather than continuing to rely on the judicially created entrapment doctrine. Part I introduces the problem of online child pornography distribution and child sex solicitation, and details of how law enforcement agencies have responded to these problems. Part II provides an overview of the terms and definitions of the various levels of interaction in cyberspace. This section also examines the unique attributes making crime detection difficult in this setting. Part III summarizes the decisional developments of entrapment law at the federal and state levels, examining tensions between the various purported goals and underlying policies of the entrapment tests. In addition, Part III describes the existing legal standards for a viable entrapment defense. Part IV analyzes the potential application of existing entrapment doctrine to undercover investigations in cyberspace, and the potential consequences of such an application. Part V explores and critiques alternative methods which have been proposed for detecting and preventing crime in cyberspace. In conclusion, Part VI recommends possible solutions for modifying current entrapment law to accomodate the unique conditions of cyberspace. Additionally, Part VI recommends that legislation is needed which recognizes cyberspace 7. Id. at 1068 (citing Lawrence Stanley, The Child Porn Myth, 7 CARDozo ARTS &ENT. L.J. 269, 321-25 (1989)(describing efforts such as "creating phony businesses, newsletters, and personae in order to encourage the purchase, sale and exchange of child
Recommended publications
  • Potential Liability of Federal Law-Enforcement Agents Engaged in Undercover Child Pornography Investigations
    NO TES THE POTENTIAL LIABILITY OF FEDERAL LAW-ENFORCEMENT AGENTS ENGAGED IN UNDERCOVER CHILD PORNOGRAPHY INVESTIGATIONS HOWARD ANGLIN* In the course of enforcing laws against child pornography,law enforcement agents often engage in undercover operations that involve mailing child pornography to suspected consumers. In this Note, Howard Anglin argues that Congress and the Supreme and circuit courts have clearly established that children portrayed in por- nography are harmed every time the pornographicimages are viewed. The current law enforcement practice of mailing child pornography therefore injures children each time it is carried out. Under the doctrine formulated in Bivens v. Six Un- known Named Agents of Federal Bureau of Narcotics, this injury is actionable by the children involved and may lead to monetary damage awards against the agents who choose to send pornography to criminal suspects. Thus, law enforcement agencies should alter their practices to avoid Bivens liability and adhere to Con- gressional admonitions not to injure the innocent in order to catch the guilty. INTRODUCTION "Governmental 'investigation' involving participation in activities that result in injury to the rights of its citizens is a course that courts should be extremely reluctant to sanction."1 -Judge Henry J. Friendly Sex crimes against children occupy a place of particular horror and fascination in the public imagination. 2 Appealing simultaneously to the most paternal and prurient human instincts, child pornography * This is not an ambitious Note, but I have enjoyed writing it as an exercise in legal analysis and investigation. Thanks are due to Professor Amy Adler for her counsel, to Adav Noti for his invaluable editorial work, and to Travis J.
    [Show full text]
  • Undercover Law Enforcement Operatives' Perceptions of Post
    Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 2020 Undercover Law Enforcement Operatives’ Perceptions of Post Critical Incident Mental Health Services David B. Spinella Walden University Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations Part of the Psychology Commons This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Walden University College of Social and Behavioral Sciences This is to certify that the doctoral dissertation by David B. Spinella has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. Jana Price-Sharps, Committee Chairperson, Psychology Faculty Dr. Jason Roach, Committee Member, Psychology Faculty Dr. Christopher Bass, University Reviewer, Psychology Faculty Chief Academic Officer and Provost Sue Subocz, Ph.D. Walden University 2020 Abstract Undercover Law Enforcement Operatives‘ Perceptions of Post Critical Incident Mental Health Services by David B. Spinella MBA, University of Phoenix, 2007 MA, Chapman University, 1990 BS, Southern Illinois University Carbondale, 1985 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Forensic Psychology Walden University August 2020 Abstract Undercover officers experience unique job-related stressors due to the covert nature and sometimes long duration of their tasks. Undercover officers adopt false identities that involve taking on a personality and lifestyle that the officer might find personally objectionable.
    [Show full text]
  • Case 3:14-Cr-00085-JAM Document 112 Filed 11/17/14 Page 1 of 22
    Case 3:14-cr-00085-JAM Document 112 Filed 11/17/14 Page 1 of 22 UNITED STATES DISTRICT COURT DISTRICT OF CONNECTICUT UNITED STATES OF AMERICA v. No. 3:14-cr-00085 (JAM) CARLOS COLON, et al. RULING ON DEFENDANTS’ JOINT MOTIONS FOR DISCOVERY (Doc. #36) AND TO DISMISS THE INDICTMENT (Doc. #37) This case involves seven criminal defendants who were set up by undercover law enforcement agents to rob a fictional drug ―stash house‖ in Connecticut. They fell victim to a ruse that federal law enforcement agents have deployed with remarkable success against countless suspects nationwide. All seven defendants—some of them armed—gathered one day last April at a parking lot somewhere in Stamford, expecting that they would momentarily proceed to a nearby stash house to rob and help themselves to 15 kilograms or more of lightly guarded cocaine. Instead, a flood of law enforcement agents swept in to arrest them. Each of the defendants now stands charged with conspiracies to engage in robbery, drug trafficking, and related weapons offenses. For their plans to rob a house and cocaine that never existed, each of the defendants likely faces at least 15 years of mandatory minimum imprisonment if convicted on these charges. Defendants jointly move to dismiss the indictment on the ground that the stash-house sting operation that was launched against them amounted to outrageous government conduct in violation of their constitutional rights under the Due Process Clause. Relatedly, defendants contend that they were targeted on account of their race in violation of the Equal Protection 1 Case 3:14-cr-00085-JAM Document 112 Filed 11/17/14 Page 2 of 22 Clause, and they seek discovery to support their claim of selective enforcement and prosecution.
    [Show full text]
  • Drug Trafficking
    If you have issues viewing or accessing this file contact us at NCJRS.gov. NATIONAL DRUG ENFORCEMENT POLICY BOARD Federal Drug Enforcement Progress Report 1984 - 1985 March 1986 PREFACE This report is submitted to Congress pursuant to the National Narcotics Act of 1984. As Chairman of the National Drug Enforcement Policy Board, the Attorney General is required to submit biannual reports to Congress. On July 9, 1985, the Policy Board forwarded its first report, which described the Board's law enforcement policies and strategies. Beginning with this second report, the Board must give to Congress "a full and complete report reflecting accomplishments ...." Even though the Policy Board was not created until the middle of fiscal year 1985, this report describes accomplishments in drug enforcement during fiscal years 1984 and 1985. Although this report focuses primarily on law enforcement efforts to reduce the supply of drugs in the United States, the Policy Board recognizes the importance of efforts to reduce the demand for drugs. A major section of this report describes the Organized Crime Drug Enforcement Task Force (OCDETF) Program. Annual reports of the OCDETF Program were prepared for calendar years 1983 and 1984. The Policy Board has decided to consolidate reporting on 1985 OCDETF accomplishments within this report. i TABLE OF CONTENTS Preface ..................................................... i List of Tables and Figures .................................. iii Introduction ................................................. I I , The Drug Problem in 1985 .......................... 6 II. Investigation & Prosecution ....................... 12 A. Combined Federal Effort ....................... 13 B. Organized Crime Drug Enforcement Task Force Program ............................ 43 III. Interdiction ...................................... 120 IV. International Drug Control ........................ 146 V. Domestic Cannabis Eradication ..................... 174 VI.
    [Show full text]
  • Entrapment and Terrorism Dru Stevenson
    Boston College Law Review Volume 49 Article 3 Issue 1 Number 1 1-1-2008 Entrapment and Terrorism Dru Stevenson Follow this and additional works at: http://lawdigitalcommons.bc.edu/bclr Part of the National Security Law Commons Recommended Citation Dru Stevenson, Entrapment and Terrorism, 49 B.C.L. Rev. 125 (2008), http://lawdigitalcommons.bc.edu/bclr/vol49/iss1/3 This Article is brought to you for free and open access by the Law Journals at Digital Commons @ Boston College Law School. It has been accepted for inclusion in Boston College Law Review by an authorized editor of Digital Commons @ Boston College Law School. For more information, please contact [email protected]. ENTRAPMENT AND TERRORISM DRU STEVENSON * Abstract: Antiterrorism is a national priority and undercover sting opera- dons are a main antiterrorism tool. As our legal system's primary device for regulating undercover stings, the scope and vigor of the entrapment defense will impact the effectiveness of antiterrorism stings. The federal courts follOw the subjective test of entrapment, focusing on whether the • defendant was predisposed to commit the crime, or if rather the govern- ment induced the defendant to breach a legal norm. This Article argues that given the difficulty of preventing terrorist acts and the civil liberties implications of intrusive surveillance—the alternative to stings—there should be a rebuttable presumption that anyone who provides material support to terrorism was predisposed to do so. This Article argues that terrorism is such a heinous crime that it is unlikely the government could induce someone to support such criminals unless the person was one of the few predisposed to do so.
    [Show full text]
  • Domestic Terrorism: Overview of Federal Criminal Law and Constitutional Issues
    Domestic Terrorism: Overview of Federal Criminal Law and Constitutional Issues July 2, 2021 Congressional Research Service https://crsreports.congress.gov R46829 SUMMARY R46829 Domestic Terrorism: Overview of Federal July 2, 2021 Criminal Law and Constitutional Issues Peter G. Berris Federal statute defines domestic terrorism to include dangerous criminal acts intended to Legislative Attorney intimidate or coerce a civilian population or to influence or affect government policy or conduct within the jurisdiction of the United States. Despite the federal statutory definition, no federal Michael A. Foster criminal provision expressly prohibits “domestic terrorism.” Nevertheless, numerous federal Legislative Attorney statutes offer prosecutors options in charging violent and destructive conduct consistent with the statutory definition of domestic terrorism. Some of these statutes can be characterized as expressly focused on terrorism, listing criminal offenses to include, among others, providing Jonathan M. Gaffney material support or resources to terrorists and engaging in terrorism transcending domestic Legislative Attorney boundaries. Other generally applicable federal criminal laws may also be relevant to domestic terrorism prosecutions. For example, depending on the defendant’s motive, target, or means, various federal criminal statutes protecting certain property or persons, prohibiting violence motivated by particular biases, or criminalizing possession or use of specific weapons may apply. Depending on the circumstances, prosecutors may also rely on accomplice liability or inchoate offenses such as attempt, conspiracy, or solicitation to charge conduct consistent with the definition of domestic terrorism. Beyond applicable offenses, domestic terrorism may be relevant in federal sentencing, either through specific statutes that authorize additional penalties in the domestic terrorism context or through the United States Sentencing Guidelines, which include an upward adjustment for offenses connected to terrorism.
    [Show full text]
  • Reassessing the Citizens Protection Act: a Good Thing It Passed, and a Good Thing It Failed
    Georgetown University Law Center Scholarship @ GEORGETOWN LAW 2013 Reassessing the Citizens Protection Act: A Good Thing It Passed, and a Good Thing It Failed Rima Sirota [email protected] This paper can be downloaded free of charge from: https://scholarship.law.georgetown.edu/facpub/1611 43 Sw. L. Rev. 51 This open-access article is brought to you by the Georgetown Law Library. Posted with permission of the author. Follow this and additional works at: https://scholarship.law.georgetown.edu/facpub Part of the Criminal Procedure Commons, Legal Ethics and Professional Responsibility Commons, and the Legal Profession Commons 2.SIROTA.ARTICLE.MACRO (DO NOT DELETE) 2/28/2014 4:28 PM REASSESSING THE CITIZENS PROTECTION ACT: A GOOD THING IT PASSED, AND A GOOD THING IT FAILED Rima Sirota* INTRODUCTION Critics have lambasted the Citizens Protection Act of 1998 (the CPA)1 from all ideological perspectives.2 The criticism began at the earliest stages of the legislative debate and continues through the present. With the advantage of fifteen years hindsight, this article demonstrates that the CPA succeeded where it should have and failed where it should have. The CPA has left us—even if inadvertently—with a remarkably coherent and consistent approach to regulating a federal prosecutor’s ability to effectively * Professor of Legal Research and Writing, Georgetown University Law Center; previously Attorney Advisor, U.S. Dept. of Justice Professional Responsibility Advisory Office. I extend my thanks to Julie Ross, Jeffrey Shulman, Kristen Tiscione, Julie O’Sullivan, Patricia Weiss, and Anita Gay for their comments and encouragement and to Sarah Scott for her excellent research assistance.
    [Show full text]
  • Deception in Undercover Investigations: Conduct-Based Vs
    Deception in Undercover Investigations: Conduct-Based vs. Status-Based Ethical Analysis Barry R. Temkint 1. INTRODUCTION The ABA Model Rules of Professional Conduct (Model Rules), by their terms, bar lawyers from engaging in conduct involving "dishonesty, fraud, deceit or misrepresentation." 1ye rsT frhome ci rcuMmveontidng tehe lrul es by proxy. Yet, lawyers throughout the RUniteud Stlatese supservis e undercover investigators who misrepresent their aidentitiles ins ordeor to garner admissions or other evidence from unsus- pectinrg woeuld-bve adeversanries. These adversaries believe that they are tdealin g with members of the general public, not investigators who plan lto help aarrest or swue them.- There has been some debate about whether lawyer involvement in undercover deception is or should be barred by the literal language o f Model Rule 8.4, which proscribes deceit and dishonesty? There is a ten- sion between the language of the Model Rules and the actual practice in most jurisdictions, in which government lawyers, especially prosecutors, regularly supervise undercover investigations. Lawyers who supervise undercover investigations employ deception, albeit, generally speaking, indirectly through investigators. A federal prosecutor supervising a criminal terrorism investigation approves of the use of a false name and identity by the undercover investigator. A civil rights attorney preparing t Barry R. Temkin is an adjunct professor at New York Law School and Chair of the New York County Lawyers Association Professional Ethics Committee. The views expressed in this article are those of the author alone, as are the errors. The author thanks Elizabeth Chambliss, Carol A. Buck- ler, and James B. Kobak, Jr., for generously reviewing and commenting on an earlier draft of this article.
    [Show full text]
  • Books for You: an Annotated Booklist for Senior High. NCTE Bibliography
    DOCUMENT RESUME ED 454 525 CS 217 591 AUTHOR Beers, Kylene, Ed.; Lesesne, Teri S., Ed. TITLE Books for You: An Annotated Booklist for Senior High. Fourteenth Edition. NCTE Bibliography Series. INSTITUTION National Council of Teachers of English, Urbana, IL. ISBN ISBN-0-8141-0372-3 ISSN ISSN-1051-4740 PUB DATE 2001-00-00 NOTE 439p.; Produced with the Committee on the Senior High School Booklist, NCTE. Foreword by Michael Cart. For the 13th edition, see ED 415 506. AVAILABLE FROM National Council of Teachers of English, 1111 W. Kenyon Road, Urbana, IL 61801-1096 (Stock No. 03723: $24.95 members; $34.95 nonmembers). Tel: 800-369-6283 (Toll Free); Web site http://www.ncte.org. PUB TYPE Books (010)-- Reference Materials Bibliographies (131) EDRS PRICE MF01/PC18 Plus Postage. DESCRIPTORS *Adolescent Literature; Annotated Bibliographies; *Fiction; High School Students; High Schools; Independent Reading; Mass Media; *Nonfiction; Reading Interests; *Reading Material Selection; Recreational Reading IDENTIFIERS Information Books; Multicultural Materials; *Trade Books ABSTRACT Beginning with a history of young adult literature and ending with a history of the National Council of Teachers of English (NCTE) "Books for You" booklist project, this fourteenth edition collection offers high school students, teachers, and librarians a comprehensive annotated list of more than a thousand books published between 1997 and 1999. Whether adventure, detailed how-to, helpful study guide for the SAT, historical account, biography, or fantasy, readers will find much to engage with and think about in the collection. In thematically arranged chapters, readers can explore through brief entries that include bibliographic information and informative summaries.
    [Show full text]
  • Book Reviews
    Cornell Law Review Volume 92 Article 5 Issue 4 May 2007 Book Reviews Follow this and additional works at: http://scholarship.law.cornell.edu/clr Part of the Law Commons Recommended Citation Book Reviews, 92 Cornell L. Rev. 833 (2007) Available at: http://scholarship.law.cornell.edu/clr/vol92/iss4/5 This Book Review is brought to you for free and open access by the Journals at Scholarship@Cornell Law: A Digital Repository. It has been accepted for inclusion in Cornell Law Review by an authorized administrator of Scholarship@Cornell Law: A Digital Repository. For more information, please contact [email protected]. BOOK REVIEW THE PROMISE AND SHORTCOMINGS OF FORENSIC LINGUISTICS Tom Liningert CREATING LANGUAGE CRIMES: How LAW ENFORCEMENT USES (AND MISUSES) LANGUAGE. By Roger W Shuy. New York: Oxford University Press, 2005. Pp. 185. $29.95. INTRODUCTION When many people think of expert testimony in the criminal jus- tice system, they imagine testimony involving the forensic techniques employed by the fictional investigators on the television show CSI: Crime Scene Investigation.I In a high-profile case, jurors expect to hear about DNA testing, ballistics analysis, fingerprint matching, handwrit- ing comparisons, and autopsies.2 Indeed, jurors have developed a 3 near reverence for such expert testimony in criminal trials. Professor Roger Shuy would add a new category of forensic ex- pertise to the pantheon: linguistics. In his latest book, Creating Lan- guage Crimes: How Law Enforcement Uses (and Misuses) Language, Professor Shuy points out that police, either by themselves or through their cooperating witnesses, have been known to manipulate language t Assistant Professor, University of Oregon School of Law.
    [Show full text]
  • CONNECT PREP Onair & Social Media Ready Features, Kickers and Interviews
    CONNECT PREP OnAir & Social Media ready features, kickers and interviews. FOR THURSDAY, July 30th, 2020 CORONAVIRUS LIFE COVID Doctor Exhausted By Misinformation AUDIO: Dr. Joseph Varon SOCIAL MEDIA: Photo LENGTH: 00:00:17 LEAD: Misleading and false information about COVID-19 is all over the place. And a doctor in Houston has had enough. He says he's been battling two wars - one on COVID and one on stupidity. He says the war on COVID is easier to win. Recently, even videos shared by the President and his son have been pulled off social media due to misleading information. Don Jr.'s social media account was temporarily suspended because of it. OUTCUE: difficult to treat PROTESTS Cops In Plainclothes Force 18 Year Old Into Unmarked Minivan AUDIO: Nats LENGTH: 00:00:06 LEAD: Some scary footage coming out of New York City. It looks like those undercover law enforcement antics we’re seeing in Portland have infiltrated the Big Apple. A video is circulating social media of some officers dressed in plainclothes forcing an 18-year-old woman into an unmarked minivan. Onlookers said it looked like a kidnapping. The mayor of New York told reporters he didn’t think the incident was handled correctly. OUTCUE: (yelling) MOVIES AND TV Katie Holmes On Quarantine Life AUDIO: Katie Holmes (ET Interview) SOCIAL MEDIA: Video LENGTH: 00:00:09 LEAD: Katie Holmes is sharing the lessons she's learned amid quarantine and the coronavirus pandemic. The 41-year-old actress stars in the upcoming film ‘The Secret: Dare to Dream.’ It’s about what it means to get what we expect.
    [Show full text]
  • Kaiser Breaks Ground on New Hospital Tower Ranking the Top 5 Burgers In
    Thursday, July 26, 2018 Vol. 17 No. 16 PAGING DR. FRISCHER ENTERTAINMENT NEWS FEATURES An aversion What’s new Candidate for A golden to mushrooms on Netflix alumni president summer concert SEE PAGE 7 SEE PAGE 8 SEE PAGE 4 SEE PAGE 2 Downey Kaiser breaks ground on new restaurant hospital tower grades Captain Don’s Liquor 12818 Paramount Blvd. Friday ► GROUNDBREAKING: The Downey Date Inspected: 7/24/18 Weekend91˚ hospital is adding 96 beds, making it Grade: A at a the second largest Kaiser Permanente Glance facility in Southern California. Jim’s Burgers Saturday 88˚⁰ 7322 Firestone Blvd. Friday 68 Date Inspected: 7/24/18 By Alex Dominguez Staff Writer Grade: A Sunday 88˚ Producto’s Naturales 70⁰ DOWNEY – Kaiser 9077 Imperial Hwy. Saturday Permanente officially broke Date Inspected: 7/24/18 ground on their new hospital Grade: A expansion Wednesday morning, kicking off a project THINGS TO DO that will add more than Starbucks 90 new beds and updated 12016 Lakewood Blvd. technology to the campus Date Inspected: 7/20/18 once completed. Grade: A Once erected, the new tower will house 96 additional Blizz Frozen Yogurt beds, as well as the best of 10033 Paramount Blvd. Ste E “high-tech” and “high- Kaiser Permanente broke ground on a new tower Wednesday, adding 96 beds to the hospital. Date Inspected: 7/20/18 Photo by Claudia Gomez. touch” medicine in the form Grade: A of the latest technological Ozomatli innovations currently in Burger King [addition], we’ll be a 448-bed the morning, what motivates going to be a great addition Saturday - Pershing Square, 7 pm medicine.
    [Show full text]