Copyright, Spleens, Blackmail, and Insider Trading

Total Page:16

File Type:pdf, Size:1020Kb

Copyright, Spleens, Blackmail, and Insider Trading California Law Review VOL. 80 DECEMBER 1992 No.6 Copyright © 1992 by California Law Review, Inc. A Theory of Law and Information: Copyright, Spleens, Blackmail, and Insider Trading James Boyle TABLE OF CONTENTS Introduction ................................................... 1416 I. Four Puzzles ............................................ 1426 A. Copyright .......................................... 1426 B. Blackmail .......................................... 1428 C. Insider Trading ..................................... 1429 D. Spleens ............................................. 1429 II. Public and Private in the Liberal State ................... 1433 III. Information in the Liberal State ......................... 1437 IV. The Economics of Information .......................... 1443 V. Property in the Liberal State ............................ 1458 VI. Copyright .............................................. , 1461 VII. Blackmail ............................................... 1470 A. Economic Theories ................................. 1471 B. Libertarian Theories ................................ 1477 C. Third Party Theories ............................... 1481 D. Shared Problems ................................... 1483 VIII. Insider Trading ....................................' ..... 1488 A. Economic Analysis of Information Disparities ....... 1494 1. Baseline Errors. .. 1494 2. Ad Hoc Claims About Behavior ................. 1498 3. Ignoring Contradictions in the Theory ........... 1499 B. Insider Trading Law as a Puzzle .................... 1500 IX. Spleens. .. 1508 A. Worrying About Property .......................... 1511 1413 1414 CALIFORNIA LAW REVIEW 1. Limitations on Property . .. .. ... 1511 2. Utilitarian !ustification of Property .............. 1512 3. Characterization as Property .................... 1513 B. Public and Private; Publicity and Privacy ............ 1514 C. The Author and the Source . .. 1518 x. Conclusion .............................................. 1520 A. "Typing" Information Issues. .. 1520 B. The Search for an Author. .. 1525 C. The Future. .. 1534 1. Information Class ............................... 1534 2. Information Overload ........................... 1536 3. Information Politics ............................. 1538 A Theory of Law and Information: Copyright, Spleens, Blackmail, and Insider Trading James Boylet In this Article, Professor Boyle undertakes an analysis of the law's treatment of information across four apparently disparate realms: copy­ right, genetic information, blackmail, and insider trading. He argues that questions of information regulation, commodification, and access are shaped by two neglected processes of interpretive construction. First, such issues are often decided by pigeonholing them into implicitly contradictory stereotypes of "public" or "private" information. These conflicting stereo­ types have their roots in basic assumptions about politics, the market, and privacy in a liberal state. Second, Professor Boyle argues that tension between these stereotypes is often apparently resolved by the use ofa seduc­ tive image: the romantic author whose original, transformative genius jus­ tifies private property and fuels public debate. Thus, conventional wisdom, courts, and even economic analysts are more likely to favor granting prop- t Copyright 1992, James Boyle, Professor of Law, Washington College of Law, The American University. LL.B. 1980, Glasgow University; LL.M. 1981, S.J.D. 1986, Harvard University. This Article was written while I was a Visiting Professor at Boston University Law School and Harvard Law School. The research funds of those schools supplied valuable assistance. As befits a piece that questions the notion of authorship and originality, this one is marked by fundamental intellectual debts. Four articles have been particularly influential: Peter Jaszi, Toward a Theory of Copyright: The Metamorphoses of "Authorship"; Duncan Kennedy, The Structure of Blackstone's Commentaries; Joseph W. Singer, The Legal Rights Debate in Analytical Jurisprudence from Bentham to Bohfeld; and Martha Woodmansee, The Genius and the Copyright: Economic and Legal Conditions of the Emergence of the "Author." I have also been influenced by the work of Rosemary Coombe, and by the prodigious and sophisticated oeuvre of Wendy Gordon. This Article draws on a theory of authorship and its relevance to property, romance, and interpretation that I first laid out in The Search for an Author: Shakespeare and the Framers. Earlier versions of this Article were presented at the 1991 Case-Western Conference on Intellectual Property and the Construction of Authorship, and at faculty colloquia at Harvard Law School and Boston University Law School. I would like to thank all of the participants for helping me to refine my ideas. Colleagues at Harvard Law School, American University, and Boston University were generous with their time. I have benefitted particularly from comments by Frank Michelman, Fred Schauer, Terry Fisher, Howell Jackson, Terry Martin, David Carlson, Mark Hager, Jack Beermann, Joe Singer, Rudy Peritz, Mark Rose, Margreta de Grazia, Steven Shavell, Louis Kaplow, Bob Bone, and David Seipp. William Alford's work on intellectual property in China was also extremely helpful. Anne Hollander, Gerry Moohr, and the rest of the participants in the Modern Legal Theory Seminar also helped me to refine my ideas. Jae Won Kim, Jennifer Ritter, David Dantzic, and Beth Silberman researched expertly. Above and beyond these other debts, however, this piece only exists because of a conversation carried on over the last eight years with my polymath colleague, Peter Jaszi. It is to him that I would like to dedicate it. 1415 1416 CALIFORNIA LAW REVIEW [Vol. 80:1413 erty rights in information when the controller of this information can con­ vincingly be ascribed the qualities of originality, creativity, and individuality, the defining attributes ofromantic authorship. This is possi­ ble in the copyright domain and for manipulators, if not sources, ofgenetic information. Blackmailers and insider traders cannot so readily be fitted into the romantic author mold, and are classified instead as transgressors against, respectively, the "private" and "public" stereotypes of informa­ tion. The Article concludes by assessing the impact of the implicit stereo­ types on the politics of the "information age." Professor Boyle argues that an emphasis upon the ideology of authorship could be as important to an information society as the notions offreedom of contract and wage labor were to an earlier, industrialized society. This ideology ofauthorship, Pro­ fessor Boyle contends, with its tendency to devalue the claims of sources and of audience, has the potential for strong detrimental effects on the political and economic structure of the "information age. " INTRODUCTION It is hard, nowadays, to find a piece of futurology that doesn't say we are entering an information age. Yet there have been few systematic critical studies of the rhetorical, ideological, political, and, ultimately, legal structures through which we deal with information. 1 At the same 1. Among legal scholars, only the economic analysts oflaw have seemed interested in dealing holistically with information, rather than with the doctrinal categories into which law has traditionally divided it. The two most striking examples of the holistic approach are Frank H. Easterbrook, Insider Trading, Secret Agents, Evidentiary Privileges, and the Production of Information, 1981 SUP. Cr. REv. 309, and Edmund W. Kitch, The Law and Economics ofRights in Valuable Information, 9 J. LEGAL STUD. 683 (1980). In a manner reminiscent of legal realist scholarship, these studies suggest that doctrinal divisions may obscure the need for enlightened policymaking. Easterbrook, for example, is concerned that, "[i]fthe Court puts information cases in securities law or evidence law pigeonholes, it may overlook the need to consider the way in which the incentive to produce information and the demands of current use conflict." Easterbrook, supra, at 314. While I agree with the impulse to treat information holistically, my goals are rather different. Later in this Article, I argue that despite its holistic treatment of information, the law and economics literature is beset by a number of conceptual "baseline" and Hohfeldian errors, and that it presents an ideology of "authorial" incentive as ifit were not ideology, but empirical fact. See infra Part IV. Nonlawyers have come close to my concerns here. Kim L. Scheppelle's book Legal Secrets gives a thoughtful contractarian analysis of secrets in cases related mainly to fraud, privacy, and professional requirements of confidentiality. In the process she offers a critique of Chicago-style law and economics and an interesting defense of egalitarian informational ethics. KIM L. SCHEPPELLE, LEGAL SECRETS: EQUALITY AND EFFICIENCY IN THE COMMON LAW (1988). Literary critics have also contributed to the issue. In a recent book, Susan Stewart offers a fascinating analysis of the intersection of law and a range of "crimes of writing"-forgery, literary imposture, pornography, and graffiti-and the relevance of this intersection to notions of SUbjectivity and authenticity. SUSAN STEWART, CRIMES OF WRmNG: PROBLEMS IN THE CONTAINMENT OF REPRESENTATION (1991). Bernard Edelman's Le Droit Saisit par la Photographie (published in English as BERNARD EDELMAN, OWNERSHIP OF THE IMAGE (1979» goes in the other direction, giving an Althusserian
Recommended publications
  • Crimes Act 2016
    REPUBLIC OF NAURU Crimes Act 2016 ______________________________ Act No. 18 of 2016 ______________________________ TABLE OF PROVISIONS PART 1 – PRELIMINARY ....................................................................................................... 1 1 Short title .................................................................................................... 1 2 Commencement ......................................................................................... 1 3 Application ................................................................................................. 1 4 Codification ................................................................................................ 1 5 Standard geographical jurisdiction ............................................................. 2 6 Extraterritorial jurisdiction—ship or aircraft outside Nauru ......................... 2 7 Extraterritorial jurisdiction—transnational crime ......................................... 4 PART 2 – INTERPRETATION ................................................................................................ 6 8 Definitions .................................................................................................. 6 9 Definition of consent ................................................................................ 13 PART 3 – PRINCIPLES OF CRIMINAL RESPONSIBILITY ................................................. 14 DIVISION 3.1 – PURPOSE AND APPLICATION ................................................................. 14 10 Purpose
    [Show full text]
  • Competing Theories of Blackmail: an Empirical Research Critique of Criminal Law Theory
    Competing Theories of Blackmail: An Empirical Research Critique of Criminal Law Theory Paul H. Robinson,* Michael T. Cahill** & Daniel M. Bartels*** The crime of blackmail has risen to national media attention because of the David Letterman case, but this wonderfully curious offense has long been the favorite of clever criminal law theorists. It criminalizes the threat to do something that would not be criminal if one did it. There exists a rich liter- ature on the issue, with many prominent legal scholars offering their accounts. Each theorist has his own explanation as to why the blackmail offense exists. Most theories seek to justify the position that blackmail is a moral wrong and claim to offer an account that reflects widely shared moral intuitions. But the theories make widely varying assertions about what those shared intuitions are, while also lacking any evidence to support the assertions. This Article summarizes the results of an empirical study designed to test the competing theories of blackmail to see which best accords with pre- vailing sentiment. Using a variety of scenarios designed to isolate and test the various criteria different theorists have put forth as “the” key to blackmail, this study reveals which (if any) of the various theories of blackmail proposed to date truly reflects laypeople’s moral judgment. Blackmail is not only a common subject of scholarly theorizing but also a common object of criminal prohibition. Every American jurisdiction criminalizes blackmail, although there is considerable variation in its formulation. The Article reviews the American statutes and describes the three general approaches these provisions reflect.
    [Show full text]
  • Conflict of the Criminal Statute of Limitations with Lesser Offenses at Trial
    William & Mary Law Review Volume 37 (1995-1996) Issue 1 Article 10 October 1995 Conflict of the Criminal Statute of Limitations with Lesser Offenses at Trial Alan L. Adlestein Follow this and additional works at: https://scholarship.law.wm.edu/wmlr Part of the Criminal Law Commons Repository Citation Alan L. Adlestein, Conflict of the Criminal Statute of Limitations with Lesser Offenses at Trial, 37 Wm. & Mary L. Rev. 199 (1995), https://scholarship.law.wm.edu/wmlr/vol37/iss1/10 Copyright c 1995 by the authors. This article is brought to you by the William & Mary Law School Scholarship Repository. https://scholarship.law.wm.edu/wmlr CONFLICT OF THE CRIMINAL STATUTE OF LIMITATIONS WITH LESSER OFFENSES AT TRIAL ALAN L. ADLESTEIN I. INTRODUCTION ............................... 200 II. THE CRIMINAL STATUTE OF LIMITATIONS AND LESSER OFFENSES-DEVELOPMENT OF THE CONFLICT ........ 206 A. Prelude: The Problem of JurisdictionalLabels ..... 206 B. The JurisdictionalLabel and the CriminalStatute of Limitations ................ 207 C. The JurisdictionalLabel and the Lesser Offense .... 209 D. Challenges to the Jurisdictional Label-In re Winship, Keeble v. United States, and United States v. Wild ..................... 211 E. Lesser Offenses and the Supreme Court's Capital Cases- Beck v. Alabama, Spaziano v. Florida, and Schad v. Arizona ........................... 217 1. Beck v. Alabama-LegislativePreclusion of Lesser Offenses ................................ 217 2. Spaziano v. Florida-Does the Due Process Clause Require Waivability? ....................... 222 3. Schad v. Arizona-The Single Non-Capital Option ....................... 228 F. The Conflict Illustrated in the Federal Circuits and the States ....................... 230 1. The Conflict in the Federal Circuits ........... 232 2. The Conflict in the States .................. 234 III.
    [Show full text]
  • Reality Is Broken a Why Games Make Us Better and How They Can Change the World E JANE Mcgonigal
    Reality Is Broken a Why Games Make Us Better and How They Can Change the World E JANE McGONIGAL THE PENGUIN PRESS New York 2011 ADVANCE PRAISE FOR Reality Is Broken “Forget everything you know, or think you know, about online gaming. Like a blast of fresh air, Reality Is Broken blows away the tired stereotypes and reminds us that the human instinct to play can be harnessed for the greater good. With a stirring blend of energy, wisdom, and idealism, Jane McGonigal shows us how to start saving the world one game at a time.” —Carl Honoré, author of In Praise of Slowness and Under Pressure “Reality Is Broken is the most eye-opening book I read this year. With awe-inspiring ex­ pertise, clarity of thought, and engrossing writing style, Jane McGonigal cleanly exploded every misconception I’ve ever had about games and gaming. If you thought that games are for kids, that games are squandered time, or that games are dangerously isolating, addictive, unproductive, and escapist, you are in for a giant surprise!” —Sonja Lyubomirsky, Ph.D., professor of psychology at the University of California, Riverside, and author of The How of Happiness: A Scientific Approach to Getting the Life You Want “Reality Is Broken will both stimulate your brain and stir your soul. Once you read this remarkable book, you’ll never look at games—or yourself—quite the same way.” —Daniel H. Pink, author of Drive and A Whole New Mind “The path to becoming happier, improving your business, and saving the world might be one and the same: understanding how the world’s best games work.
    [Show full text]
  • PDF-Download
    Order of the 1st Chamber of the Second Senate of 1 March 2004 – 2 BvR 1570/03 – in the proceedings on the constitutional complaint of the Turkish national A. ... against a) the order of the Higher Administrative Court (Oberverwaltungsgericht) for the Land North Rhine-Westphalia of 19 August 2003 – 18 B 1503/03 –, b) the order of Düsseldorf Administrative Court (Verwaltungsgericht) of 15 July 2003 – 24 L 1977/03 – and application to issue an injunction ... RULING: The constitutional complaint is not admitted for decision. The application to issue an injunction is therewith concluded. GROUNDS: I. 1. a) The applicant objects to his expulsion to Turkey. 1 He was born in Germany in 1983 and grew up here, where his parents and siblings 2 also live. He has had a permanent residence permit since December 1999. The applicant has come to the notice of the police several times since 2000. He was 3 sentenced most recently on 22 July 2002 in respect of joint robbery by blackmail in concurrence of offences with threat, robbery by blackmail in concurrence of offences with bodily harm, threat in concurrence of offences with deprivation of liberty and co- ercion, coercion in concurrence of offences with threat, threat in two cases in concur- rence of offences with theft resembling robbery, coercion and theft, as well as in re- spect of blackmail relating to the two latter convictions, to combined youth custody of three years and six months. In consequence of the latter conviction, the immigration authority expelled him by or- 4 der of 9 May 2003, ordered the immediate enforcement of this expulsion and an- nounced to him that he would be expelled from custody to Turkey.
    [Show full text]
  • Digital Blackmail As an Emerging Tactic 2016
    September 9 DIGITAL BLACKMAIL AS AN EMERGING TACTIC 2016 Digital Blackmail (DB) represents a severe and growing threat to individuals, small businesses, corporations, and government Examining entities. The rapid increase in the use of DB such as Strategies ransomware; the proliferation of variants and growth in their ease of use and acquisition by cybercriminals; weak defenses; Public and and the anonymous nature of the money trail will only increase Private Entities the scale of future attacks. Private sector, non-governmental organization (NGO), and government cybersecurity experts Can Pursue to were brought together by the Office of the Director of National Contain Such Intelligence and the Department of Homeland Security to determine emerging tactics and countermeasures associated Attacks with the threat of DB. In this paper, DB is defined as illicitly acquiring or denying access to sensitive data for the purpose of affecting victims’ behaviors. Threats may be made of lost revenue, the release of intellectual property or sensitive personnel/client information, the destruction of critical data, or reputational damage. For clarity, this paper maps DB activities to traditional blackmail behaviors and explores methods and tools, exploits, protection measures, whether to pay or not pay the ransom, and law enforcement (LE) and government points of contact for incident response. The paper also examines the future of the DB threat. Digital Blackmail as an Emerging Tactic Team Members Name Organization Caitlin Bataillon FBI Lynn Choi-Brewer
    [Show full text]
  • Games of Idealized Courtship and Seduction in the Paintings of Antoine Watteau and Jean-Honoré Fragonard and in Laclos' Novel, Dangerous Liaisons Barbara C
    Florida State University Libraries Electronic Theses, Treatises and Dissertations The Graduate School 2009 Games of Idealized Courtship and Seduction in the Paintings of Antoine Watteau and Jean-Honoré Fragonard and in Laclos' Novel, Dangerous Liaisons Barbara C. Robinson Follow this and additional works at the FSU Digital Library. For more information, please contact [email protected] FLORIDA STATE UNIVERSITY COLLEGE OF ARTS AND SCIENCES GAMES OF IDEALIZED COURTSHIP AND SEDUCTION IN THE PAINTINGS OF ANTOINE WATTEAU AND JEAN­HONORĖ FRAGONARD AND IN LACLOS’ NOVEL, DANGEROUS LIAISONS By BARBARA C. ROBINSON A Dissertation submitted to the Department of Interdisciplinary Humanities in partial fulfillment of the requirements for the degree of Doctor of Philosophy Degree Awarded: Spring Semester, 2009 The members of the Committee approve the Dissertation of Barbara C. Robinson defended on March 19, 2009. ____________________________________ William Cloonan Professor Directing Dissertation ____________________________________ Barry S. Sapolsky Outside Committee Member ____________________________________ Raymond Fleming Committee Member ____________________________________ Stanley E. Gontarski Committee Member Approved: _____________________________________________________ Nancy Warren, Chair, Department of Interdisciplinary Humanities The Graduate School has verified and approved the above named committee members. ii ACKNOWLEDGEMENTS I wish to thank the many friends and colleagues who have given me support and encouragement throughout this long process. In particular, I wish to acknowledge Jennifer Boyles, Judy Crawford, Ercelle Fishburn, Chet Kennedy and Ron Motter who have been with me from the beginning. Dr. William Cloonan, my major professor, deserves special thanks for pushing me beyond my limits and teaching me to think. I also owe thanks to the members of my committee – Dr. Ray Fleming, Dr.
    [Show full text]
  • Nebraska Incident-Based Reporting System (NIBRS)
    Nebraska Incident-Based Reporting System (NIBRS) Manual for Automated Agencies November, 2000 Nebraska Commission on Law Enforcement and Criminal Justice 301 Centennial Mall South, P.O. Box 94946 Lincoln, Nebraska 68509-4946 (402) 471-2194 TABLE OF CONTENTS NEBRASKA INCIDENT-BASED REPORTING SYSTEM (NIBRS) ........................ 1 Definition of "Incident” ...................................................... 4 DATA REQUIREMENTS .......................................................... 7 Requirements for each Group A Offense ......................................... 8 Requirements for Arrests for Group A and Group B Offenses ......................... 15 DEFINITIONS OF BASIC CORE, ADDITIONAL DATA ELEMENT AND ARRESTEE ELEMENTS Age .................................................................... 17 Aggravated Assault / Homicide Circumstances .................................... 17 Armed With . 18 Arrest Date . 19 Arrest (Transaction) Number ................................................. 19 Arrest Offense Code ........................................................ 19 Attempted / Completed ..................................................... 19 Criminal Activity Type ..................................................... 20 Date Recovered ........................................................... 20 Disposition of Arrestee Under Age 18 .......................................... 20 Drug Type / Type Criminal Activity (Arrestee) ................................... 21 Estimated Drug Quantity / Type Drug Measurement ..............................
    [Show full text]
  • The University of Chicago Playfulness 1947-2017
    THE UNIVERSITY OF CHICAGO PLAYFULNESS 1947-2017: HERMENEUTICS, AESTHETICS, GAMES A DISSERTATION SUBMITTED TO THE FACULTY OF THE DIVISION OF THE HUMANITIES IN CANDIDACY FOR THE DEGREE OF DOCTOR OF PHILOSOPHY DEPARTMENT OF ENGLISH LANGUAGE AND LITERATURE BY PETER DOUGLAS MCDONALD CHICAGO, ILLINOIS JUNE 2018 Copyright © 2018 by Peter McDonald All Rights Reserved For those who pretended a world into being, and those who made belief. TABLE OF CONTENTS LIST OF FIGURES v ACKNOWLEDGEMENTS vi ABSTRACT ix Introduction Interpreting Play 1 Chapter One Replayability: Play without Truth 32 Chapter Two Secrecy: Play without Reason 87 Chapter Three Trickiness: Play without Rules 142 Chapter Four Fairness: Play without End 200 BIBLIOGRAPHY 262 iv LIST OF FIGURES Figure 1.1. A still from Video Chess depicting Duchamp in sepia. .............................................. 40 Figure 1.2. A still from Video Chess depicting overlaid photos. .................................................. 42 Figure 1.3. A still from Video Chess depicting outlined bodies. .................................................. 42 Figure 1.4. A still from Video Chess depicting abstract outlines.................................................. 43 Figure 1.5. A still from Video Chess depicting blurred areas of color. ........................................ 44 Figure 1.6. Two stills depicting Duchamp and Kubota playing against nude opponents. ............ 47 Figure 1.7. Specrtum Holobyte’s 1987 release of Tetris for the Amiga computer. ...................... 79 Figure 1.8. SexTetris (1993), a variant on the theme of Tetris. .................................................... 80 Figure 2.1. Takako Saito, Spice Chess (1977). ............................................................................. 92 Figure 2.2. A line of empty green blocks leads to a secret exit in Super Mario World. ............. 132 Figure 2.3. Secret exit in “Cheese Bridge,” from Super Mario World.
    [Show full text]
  • The Unique Cultural & Innnovative Twelfty 1820
    Chekhov reading The Seagull to the Moscow Art Theatre Group, Stanislavski, Olga Knipper THE UNIQUE CULTURAL & INNNOVATIVE TWELFTY 1820-1939, by JACQUES CORY 2 TABLE OF CONTENTS No. of Page INSPIRATION 5 INTRODUCTION 6 THE METHODOLOGY OF THE BOOK 8 CULTURE IN EUROPEAN LANGUAGES IN THE “CENTURY”/TWELFTY 1820-1939 14 LITERATURE 16 NOBEL PRIZES IN LITERATURE 16 CORY'S LIST OF BEST AUTHORS IN 1820-1939, WITH COMMENTS AND LISTS OF BOOKS 37 CORY'S LIST OF BEST AUTHORS IN TWELFTY 1820-1939 39 THE 3 MOST SIGNIFICANT LITERATURES – FRENCH, ENGLISH, GERMAN 39 THE 3 MORE SIGNIFICANT LITERATURES – SPANISH, RUSSIAN, ITALIAN 46 THE 10 SIGNIFICANT LITERATURES – PORTUGUESE, BRAZILIAN, DUTCH, CZECH, GREEK, POLISH, SWEDISH, NORWEGIAN, DANISH, FINNISH 50 12 OTHER EUROPEAN LITERATURES – ROMANIAN, TURKISH, HUNGARIAN, SERBIAN, CROATIAN, UKRAINIAN (20 EACH), AND IRISH GAELIC, BULGARIAN, ALBANIAN, ARMENIAN, GEORGIAN, LITHUANIAN (10 EACH) 56 TOTAL OF NOS. OF AUTHORS IN EUROPEAN LANGUAGES BY CLUSTERS 59 JEWISH LANGUAGES LITERATURES 60 LITERATURES IN NON-EUROPEAN LANGUAGES 74 CORY'S LIST OF THE BEST BOOKS IN LITERATURE IN 1860-1899 78 3 SURVEY ON THE MOST/MORE/SIGNIFICANT LITERATURE/ART/MUSIC IN THE ROMANTICISM/REALISM/MODERNISM ERAS 113 ROMANTICISM IN LITERATURE, ART AND MUSIC 113 Analysis of the Results of the Romantic Era 125 REALISM IN LITERATURE, ART AND MUSIC 128 Analysis of the Results of the Realism/Naturalism Era 150 MODERNISM IN LITERATURE, ART AND MUSIC 153 Analysis of the Results of the Modernism Era 168 Analysis of the Results of the Total Period of 1820-1939
    [Show full text]
  • Texas Law Review See Also
    Texas Law Review See Also Response Taking It to the Streets Stuart P. Green* For more than fifty years, some of the best minds in criminal law theory have applied some of the most sophisticated tools of analysis in an effort to solve the seemingly insolvable blackmail paradox.1 Whether any of these theorists has been successful is debatable. In Competing Theories of Blackmail: An Empirical Research Critique of Criminal Law Theory, Paul Robinson, Michael Cahill, and Daniel Bartels advance the novel—dare I say, paradoxical—notion that one way to solve the problem is to ask a collection of laypersons, untutored in law or philosophy, what they think should count as blackmail.2 There is much about the article that is admirable: The way the authors derive concrete scenarios from abstract theories is ingenious; their summary of the various blackmail theories is a model of conciseness; the methodological techniques they use are exemplary. As is the norm for brief responses of this sort, however, I shall focus on what I perceive as the article’s shortcomings rather than its strengths. In so doing, I do not mean to minimize the authors’ achievement. * Professor of Law and Justice Nathan L. Jacobs Scholar, Rutgers School of Law–Newark. 1. The seminal piece is Glanville Williams, Blackmail, CRIM. L. REV. 79 (1954). See also, e.g., JOEL FEINBERG, HARMLESS WRONGDOING (1988); Mitchell N. Berman, The Evidentiary Theory of Blackmail: Taking Motives Seriously, 65 U. CHI. L. REV. 795 (1998); George P. Fletcher, Blackmail: The Paradigmatic Crime, 141 U. PA. L. REV. 1617 (1993); Leo Katz, Blackmail and Other Forms of Arm-Twisting, 141 U.
    [Show full text]
  • Informational Blackmail: Survived by Technicality? Chen Yehudai
    Marquette Law Review Volume 92 Article 6 Issue 4 Summer 2009 Informational Blackmail: Survived by Technicality? Chen Yehudai Follow this and additional works at: http://scholarship.law.marquette.edu/mulr Part of the Law Commons Repository Citation Chen Yehudai, Informational Blackmail: Survived by Technicality?, 92 Marq. L. Rev. 779 (2009). Available at: http://scholarship.law.marquette.edu/mulr/vol92/iss4/6 This Article is brought to you for free and open access by the Journals at Marquette Law Scholarly Commons. It has been accepted for inclusion in Marquette Law Review by an authorized administrator of Marquette Law Scholarly Commons. For more information, please contact [email protected]. INFORMATIONAL BLACKMAIL: SURVIVED BY TECHNICALITY? CHEN YEHUDAI Blackmail constitutes one of the most intriguing puzzles in criminal law: How can two legal rights—i.e., a threat to disclose true but reputation-damaging information and, independently, a simple demand for money—make a legal wrong? The puzzle gets even more complicated when we take into account that it is not unlawful for one who holds embarrassing information to accept an offer of payment made by an unthreatened recipient in return for a promise not to disclose the information. In order to answer this question, this Article surveys and analyzes the development of the law of informational blackmail and criminal libel in English and American law and argues that the modern crime of blackmail is the result of an “historical accident” stemming from the historical classification of blackmail as a property offense instead of a reputation-protecting offense. The Article argues that when enacted, the prohibition on informational blackmail was meant to protect the interest of reputation as a supplement to the law of criminal libel.
    [Show full text]