Criminal Law Mnemonics
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
One Hundred Fifteenth Congress of the United States of America
S. 2896 One Hundred Fifteenth Congress of the United States of America AT THE SECOND SESSION Begun and held at the City of Washington on Wednesday, the third day of January, two thousand and eighteen An Act To require disclosure by lobbyists of convictions for bribery, extortion, embezzlement, illegal kickbacks, tax evasion, fraud, conflicts of interest, making false statements, perjury, or money laundering. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SHORT TITLE. This Act may be cited as the ‘‘Justice Against Corruption on K Street Act of 2018’’ or the ‘‘JACK Act’’. SEC. 2. DISCLOSURE OF CORRUPT MALPRACTICE BY LOBBYISTS. (a) REGISTRATION.—Section 4(b) of the Lobbying Disclosure Act of 1995 (2 U.S.C. 1603(b)) is amended— (1) in paragraph (5), by striking ‘‘and’’ at the end; (2) in paragraph (6), by striking the period at the end and inserting ‘‘; and’’; and (3) by inserting after paragraph (6) the following: ‘‘(7) for any listed lobbyist who was convicted in a Federal or State court of an offense involving bribery, extortion, embezzlement, an illegal kickback, tax evasion, fraud, a conflict of interest, making a false statement, perjury, or money laun- dering, the date of the conviction and a description of the offense.’’. (b) QUARTERLY REPORTS.—Section 5(b) of the Lobbying Disclo- sure Act of 1995 (2 U.S.C. 1604(b)) is amended— (1) in paragraph (4), by striking ‘‘and’’ at the end; (2) in paragraph (5), by striking the period at the end and inserting ‘‘; and’’; and (3) by adding at the end the following: ‘‘(6) for any listed lobbyist who was convicted in a Federal or State court of an offense involving bribery, extortion, embezzlement, an illegal kickback, tax evasion, fraud, a conflict S. -
Charging Language
1. TABLE OF CONTENTS Abduction ................................................................................................73 By Relative.........................................................................................415-420 See Kidnapping Abuse, Animal ...............................................................................................358-362,365-368 Abuse, Child ................................................................................................74-77 Abuse, Vulnerable Adult ...............................................................................78,79 Accessory After The Fact ..............................................................................38 Adultery ................................................................................................357 Aircraft Explosive............................................................................................455 Alcohol AWOL Machine.................................................................................19,20 Retail/Retail Dealer ............................................................................14-18 Tax ................................................................................................20-21 Intoxicated – Endanger ......................................................................19 Disturbance .......................................................................................19 Drinking – Prohibited Places .............................................................17-20 Minors – Citation Only -
Fraud and Investigation Policy KEYWORDS: Fraud, Investigation, Fraudulent, Cheat, Cheating, Swindling, Embezzlement, Deceit
Fraud and Investigation Policy KEYWORDS: Fraud, investigation, fraudulent, cheat, cheating, swindling, embezzlement, deceit, deception, swindler. PURPOSE: Depending on the circumstances, investigations may be conducted by the Security, Corporate Compliance and/or Legal Department. These investigations provide a sound foundation for the protection of the innocent, the removal of wrong-doers from the ranks of St. Joseph's Healthcare System, appropriate judicial action when warranted and the basis for filing bond and insurance claims. SCOPE: All St. Joseph's Healthcare System Facilities. LEGAL/REGULATORY CITES: N/A DEFINITIONS: Wrongful or criminal deception intended to result in person gain. Policy The Corporate Compliance and Security Departments have been directed to make themselves available and receptive to receiving relevant information concerning any situation involving possible impropriety matters pertaining to the operations of St. Joseph’s Healthcare System. Employees are expected to contact members of the Corporate Compliance Department through the Compliance Hotline (973-754-2017) or e-mail ([email protected]) to report potential ethical or legal concerns, possible breaches of patient privacy and confidentiality or fraudulent activities. Procedure Upon being notified of a potentially fraudulent activity, the Corporate Compliance Department will notify, as appropriate, legal counsel, administrative personnel and Security. If the notification is through the Compliance Hotline reporting system, the date, nature and name of the informant (if known) will be logged in the Corporate Compliance Hotline Log. The following investigative procedures will be followed: 1. No investigative techniques verging on illegal activities will be used (e.g. recording, photography devices). 2. All interviews and interrogations will be conducted in such a manner as not to discredit persons being interviewed, and will be conducted by two persons charged with investigative responsibilities. -
What's Reasonable?: Self-Defense and Mistake in Criminal and Tort
Do Not Delete 12/15/2010 10:20 PM WHAT’S REASONABLE?: SELF-DEFENSE AND MISTAKE IN CRIMINAL AND TORT LAW by Caroline Forell∗ In this Article, Professor Forell examines the criminal and tort mistake- as-to-self-defense doctrines. She uses the State v. Peairs criminal and Hattori v. Peairs tort mistaken self-defense cases to illustrate why application of the reasonable person standard to the same set of facts in two areas of law can lead to different outcomes. She also uses these cases to highlight how fundamentally different the perception of what is reasonable can be in different cultures. She then questions whether both criminal and tort law should continue to treat a reasonably mistaken belief that deadly force is necessary as justifiable self-defense. Based on the different purposes that tort and criminal law serve, Professor Forell explains why in self-defense cases criminal law should retain the reasonable mistake standard while tort law should move to a strict liability with comparative fault standard. I. INTRODUCTION ....................................................................... 1402 II. THE LAW OF SELF-DEFENSE ................................................... 1403 III. THE PEAIRS MISTAKE CASES .................................................. 1406 A. The Peairs Facts ..................................................................... 1408 B. The Criminal Case .................................................................. 1409 1. The Applicable Law ........................................................... 1409 -
Crime, Law Enforcement, and Punishment
Shirley Papers 48 Research Materials, Crime Series Inventory Box Folder Folder Title Research Materials Crime, Law Enforcement, and Punishment Capital Punishment 152 1 Newspaper clippings, 1951-1988 2 Newspaper clippings, 1891-1938 3 Newspaper clippings, 1990-1993 4 Newspaper clippings, 1994 5 Newspaper clippings, 1995 6 Newspaper clippings, 1996 7 Newspaper clippings, 1997 153 1 Newspaper clippings, 1998 2 Newspaper clippings, 1999 3 Newspaper clippings, 2000 4 Newspaper clippings, 2001-2002 Crime Cases Arizona 154 1 Cochise County 2 Coconino County 3 Gila County 4 Graham County 5-7 Maricopa County 8 Mohave County 9 Navajo County 10 Pima County 11 Pinal County 12 Santa Cruz County 13 Yavapai County 14 Yuma County Arkansas 155 1 Arkansas County 2 Ashley County 3 Baxter County 4 Benton County 5 Boone County 6 Calhoun County 7 Carroll County 8 Clark County 9 Clay County 10 Cleveland County 11 Columbia County 12 Conway County 13 Craighead County 14 Crawford County 15 Crittendon County 16 Cross County 17 Dallas County 18 Faulkner County 19 Franklin County Shirley Papers 49 Research Materials, Crime Series Inventory Box Folder Folder Title 20 Fulton County 21 Garland County 22 Grant County 23 Greene County 24 Hot Springs County 25 Howard County 26 Independence County 27 Izard County 28 Jackson County 29 Jefferson County 30 Johnson County 31 Lafayette County 32 Lincoln County 33 Little River County 34 Logan County 35 Lonoke County 36 Madison County 37 Marion County 156 1 Miller County 2 Mississippi County 3 Monroe County 4 Montgomery County -
The Larceny Act
LARCENY THE LARCENY ACT ARRANGEMENT OF SECTIONS 1. Short title. PART I. Inferprefafion 2. Interpretation. 3. Definitions. 4. Offensive weapons. PART 11. Indictable Ofences 5. Simple larceny. 6. Larceny of cattle. 7. Killing animals with intent to steal. S. Larceny, etc., of dogs. 9. Larceny of wills. 10. Larceny of documents of title to land, etc. 11. Taking, destroying, etc., documents for a fraudulent purpose. 12. Damaging fixtures with intent to steal. 13. Praedial larceny. 14. Larceny of goods in process of manufxture. 15. Abstracting electricity. 16. Larceny, etc., of ore from mines, etc. 17. Larceny of postal articles. 18. Larceny in dwelling-houses. 19. Larceny from the person. 20. Larceny from ships, docks, etc. 2 1. Larceny by tenants or lodgers. 22. Larceny and embezzlement by clerks or servants. 23. Stealing or embezzlement by officer of Post Office. 24. Conversion. 25. Conversion by trustee. [The inclusion of this page Is authorized by L.N. 180At20061 LARCENY Factors obtaining advances on the property of their principals. Frauds by director. etc. Fraudulently inducing persons to invest money. Falsification of accounts. Falsification of account books of a bank. etc. Clerks. etc.. making out false dividend warrants. Personating the owner of stock. Personation with intent to obtain land. etc. Falsely acknowledging bail. etc. False pretences. Obtaining credit by fraud. Robbery. Sacrilege. Burglary. House-breaking and committing felony. House-breaking with intent to commit felony. Being found by night armed or in possession of house-breaking implements. Extortion. [Repealed by Act 29 of 200.5.] [Repealed by Act 29 of 2005.1 [Repealed byAct 29 of 2OO5.] Receiving. -
WALKER V. GEORGIA
Cite as: 555 U. S. ____ (2008) 1 THOMAS, J., concurring SUPREME COURT OF THE UNITED STATES ARTEMUS RICK WALKER v. GEORGIA ON PETITION FOR WRIT OF CERTIORARI TO THE SUPREME COURT OF GEORGIA No. 08–5385. Decided October 20, 2008 JUSTICE THOMAS, concurring in the denial of the peti- tion of certiorari. Petitioner brutally murdered Lynwood Ray Gresham, and was sentenced to death for his crime. JUSTICE STEVENS objects to the proportionality review undertaken by the Georgia Supreme Court on direct review of peti- tioner’s capital sentence. The Georgia Supreme Court, however, afforded petitioner’s sentence precisely the same proportionality review endorsed by this Court in McCleskey v. Kemp, 481 U. S. 279 (1987); Pulley v. Harris, 465 U. S. 37 (1984); Zant v. Stephens, 462 U. S. 862 (1983); and Gregg v. Georgia, 428 U. S. 153 (1976), and described in Pulley as a “safeguard against arbitrary or capricious sentencing” additional to that which is constitu- tionally required, Pulley, supra, at 45. Because the Geor- gia Supreme Court made no error in applying its statuto- rily required proportionality review in this case, I concur in the denial of certiorari. In May 1999, petitioner recruited Gary Lee Griffin to help him “rob and kill a rich white man” and “take the money, take the jewels.” Pet. for Cert. 5 (internal quota- tion marks omitted); 282 Ga. 774, 774–775, 653 S. E. 2d 439, 443, (2007). Petitioner and Griffin packed two bicy- cles in a borrowed car, dressed in black, and took a knife and stun gun to Gresham’s house. -
Competing Theories of Blackmail: an Empirical Research Critique of Criminal Law Theory
Competing Theories of Blackmail: An Empirical Research Critique of Criminal Law Theory Paul H. Robinson,* Michael T. Cahill** & Daniel M. Bartels*** The crime of blackmail has risen to national media attention because of the David Letterman case, but this wonderfully curious offense has long been the favorite of clever criminal law theorists. It criminalizes the threat to do something that would not be criminal if one did it. There exists a rich liter- ature on the issue, with many prominent legal scholars offering their accounts. Each theorist has his own explanation as to why the blackmail offense exists. Most theories seek to justify the position that blackmail is a moral wrong and claim to offer an account that reflects widely shared moral intuitions. But the theories make widely varying assertions about what those shared intuitions are, while also lacking any evidence to support the assertions. This Article summarizes the results of an empirical study designed to test the competing theories of blackmail to see which best accords with pre- vailing sentiment. Using a variety of scenarios designed to isolate and test the various criteria different theorists have put forth as “the” key to blackmail, this study reveals which (if any) of the various theories of blackmail proposed to date truly reflects laypeople’s moral judgment. Blackmail is not only a common subject of scholarly theorizing but also a common object of criminal prohibition. Every American jurisdiction criminalizes blackmail, although there is considerable variation in its formulation. The Article reviews the American statutes and describes the three general approaches these provisions reflect. -
The Unnecessary Crime of Conspiracy
California Law Review VOL. 61 SEPTEMBER 1973 No. 5 The Unnecessary Crime of Conspiracy Phillip E. Johnson* The literature on the subject of criminal conspiracy reflects a sort of rough consensus. Conspiracy, it is generally said, is a necessary doctrine in some respects, but also one that is overbroad and invites abuse. Conspiracy has been thought to be necessary for one or both of two reasons. First, it is said that a separate offense of conspiracy is useful to supplement the generally restrictive law of attempts. Plot- ters who are arrested before they can carry out their dangerous schemes may be convicted of conspiracy even though they did not go far enough towards completion of their criminal plan to be guilty of attempt.' Second, conspiracy is said to be a vital legal weapon in the prosecu- tion of "organized crime," however defined.' As Mr. Justice Jackson put it, "the basic conspiracy principle has some place in modem crimi- nal law, because to unite, back of a criniinal purpose, the strength, op- Professor of Law, University of California, Berkeley. A.B., Harvard Uni- versity, 1961; J.D., University of Chicago, 1965. 1. The most cogent statement of this point is in Note, 14 U. OF TORONTO FACULTY OF LAW REv. 56, 61-62 (1956): "Since we are fettered by an unrealistic law of criminal attempts, overbalanced in favour of external acts, awaiting the lit match or the cocked and aimed pistol, the law of criminal conspiracy has been em- ployed to fill the gap." See also MODEL PENAL CODE § 5.03, Comment at 96-97 (Tent. -
Ignorance and Mistake in Criminal Law
Indiana Law Journal Volume 33 Issue 1 Article 1 Fall 1957 Ignorance and Mistake in Criminal Law Jerome Hall Indiana University School of Law Follow this and additional works at: https://www.repository.law.indiana.edu/ilj Part of the Criminal Law Commons Recommended Citation Hall, Jerome (1957) "Ignorance and Mistake in Criminal Law," Indiana Law Journal: Vol. 33 : Iss. 1 , Article 1. Available at: https://www.repository.law.indiana.edu/ilj/vol33/iss1/1 This Article is brought to you for free and open access by the Law School Journals at Digital Repository @ Maurer Law. It has been accepted for inclusion in Indiana Law Journal by an authorized editor of Digital Repository @ Maurer Law. For more information, please contact [email protected]. INDIANA LAW JOURNAL Volume 33 FALL 1957 Number I To perpetuate the memory of Professor Frank E. Horack, Jr., a scholarship and acquisition fund which will bear his name has been established by Indiana University. Readers of the Journal who desire to contribute to the fund are invited to send their gifts to either the Dean of the School of Law, or the I. U. Foundation, at Bloomington, Indiana. Checks may be made payable to the Foundation, and should indicate that they are to apply toward the FRANK E. HORACK, JR., MEMORIAL FUND. IGNORANCE AND MISTAKE IN CRIMINAL LAW JEROME HALLtI At the threshold of inquiry into the criminal liability of persons who commit harms under the influence of ignorance or mistake, one con- fronts an insistent perennial question-why should such persons be sub- jected to any criminal liability? Ignorantiafacti excwsat accords with the implied challenge. -
Ptsd Is a Limited Defense in Federal Court
LINCOLN MEMORIAL UNIVERSITY LAW REVIEW __________________________________ VOLUME 8 SPRING 2021 ISSUE 2 _____________________________________ PTSD IS A LIMITED DEFENSE IN FEDERAL COURT: DEFENDANTS WITH PTSD GENERALLY FAIL IN ASSERTING THE AFFIRMATIVE INSANITY DEFENSE, AND THE DIMINISHED CAPACITY FAILURE OF PROOF DEFENSE IS ONLY APPLICABLE IN LIMITED INSTANCES Alexandria Patterson Tipton* *Juris Doctor Candidate, May 2021, Lincoln Memorial University Duncan School of Law PTSD IS A LIMITED DEFENSE IN FEDERAL COURT 83 I. INTRODUCTION Throughout American history there has been a lack of understanding mental illness within the criminal justice system. However, largely beginning in the twentieth century, mental health, in general, and the role it plays in the criminal justice system, evolved drastically. Specifically, the first official diagnosis of Post-Traumatic Stress Disorder (“PTSD”) was during the Vietnam War.1 In the years since then, the effects of PTSD have become more widely understood. Although PTSD is now better understood, the issue of how PTSD affects a defendant’s criminal liability is still unclear. Particularly, it has not been precisely answered what role PTSD plays in a federal criminal defense. Generally, there are two defensive avenues that a defendant can take when asserting a mental disease or defect as a defense against a crime in federal court: (1) the affirmative insanity defense,2 and (2) the failure of proof diminished capacity defense.3 Moreover, there is growing conflict as to whether PTSD is covered by the insanity defense, the diminished capacity defense, or whether PTSD is appropriately covered at all. The concept of the insanity defense is commonly known by the general public, though it is not always accurately understood. -
Group Status and Criminal Defenses: Logical Relationship Or Marriage of Convenience
Missouri Law Review Volume 71 Issue 3 Summer 2006 Article 1 Summer 2006 Group Status and Criminal Defenses: Logical Relationship or Marriage of Convenience Eugene R. Melhizer Follow this and additional works at: https://scholarship.law.missouri.edu/mlr Part of the Law Commons Recommended Citation Eugene R. Melhizer, Group Status and Criminal Defenses: Logical Relationship or Marriage of Convenience, 71 MO. L. REV. (2006) Available at: https://scholarship.law.missouri.edu/mlr/vol71/iss3/1 This Article is brought to you for free and open access by the Law Journals at University of Missouri School of Law Scholarship Repository. It has been accepted for inclusion in Missouri Law Review by an authorized editor of University of Missouri School of Law Scholarship Repository. For more information, please contact [email protected]. Melhizer: Melhizer: Group Status and Criminal Defenses MISSOURI LAW REVIEW VOLUME 71 SUMMER 2006 NUMBER 3 Group Status and Criminal Defenses: Logical Relationship or Marriage of Convenience? Eugene R. Milhizer* TABLE OF CONTENTS INTRODUCTION ................................................................................................. 548 I. AN OVERVIEW OF GROUP STATUS AND THE CRIMINAL LAW ........................ 550 II. TRADITIONAL JUSTIFICATION AND EXCUSE DEFENSES ................................ 559 A . Categories of Defenses ......................................................................... 561 B. JustificationD efenses ........................................................................... 563