Detailed Table of Contents (PDF Download)

Total Page:16

File Type:pdf, Size:1020Kb

Detailed Table of Contents (PDF Download) Contents Table of Problem Cases xxxi Preface xxxv Acknowledgments xxxvii BACKGROUND MATERIALS Overview of the Criminal Justice Process: The Steps in the Process xlv Overview of Proving Crimes lxvi Model Penal Code Section 1.12 lxvi Notes lxvi PART I. INTRODUCTORY MATERIALS 1 Section 1. The Nature and Structure of Criminal Law 3 Overview of the Nature of Criminal Law 3 Hypothetical: Fear, Pain, and Bubble Gum (#1) 4 Model Penal Code Sections 5 Notes 5 Overview of the Sources of Criminal Law 9 Notes 9 Overview of the Operational Structure of Criminal Law 12 Hypothetical: Fear of the Daggers (#2) 13 Notes 14 Overview of the Functions of Criminal Law Doctrine 20 Notes 20 Hypothetical: Your Basement Burglar (#3) 21 Section 2. The Legality Principle 31 The Case of Ray Brent Marsh (#4) 32 The Law 38 Code of Georgia Annotated (2002) 38 Cases 39 Model Penal Code Sections 40 Overview of the Legality Principle 40 Notes 40 xi xii Contents Overview of Statutory Interpretation 46 Notes 46 Problems 51 The Human Puppet Master (#5) 51 Is a Fetus a Human Being? (#6) 52 Gangsters Can’t Stop (#7) 53 Marsh Continued . (#8) 53 Discussion Issue and Materials 54 Issue: Should the Criminal Law Recognize an Exception to the Legality Principle When the Crime Is Serious? 54 Report to the President from Justice Robert H. Jackson, Chief of Counsel for the United States in the Prosecution of Axis War Criminals 54 Gerry J. Simpson, Didactic and Dissident Histories in War Crimes Trials 56 Discussion Issue and Materials 59 Issue: Should Criminal Statutes Be Interpreted Using a “Rule of Lenity,” Under Which Ambiguities Are Resolved in Favor of the Defendant? 59 Dan M. Kahan, Lenity and Federal Common Law Crimes 59 Zachary Price, The Rule of Lenity as a Rule of Structure 61 Lawrence M. Solan, Law, Language, and Lenity 63 Section 3. Theories of Punishment 65 The Case of Sara Jane Olson (#9) 66 The Law 71 Deering’s California Penal Code Annotated (1975) 71 Model Penal Code Section 74 Overview of Theories of Punishment: Identifying, Evaluating, and Adopting Principles 74 Hypothetical: Daughters’ Mustard (#10) 74 Notes 75 Problems 88 Sara Jane Olson — Revisited (#11) 88 Stopping Desertions in a Time of War (#12) 88 Air Conditioning Fraud as Strike Three (#13) 89 Discussion Issue and Materials 90 Issue: Which Principle or Combination of Principles Should the Criminal Law Use in Determining How Much Liability and Punishment Should Be Distributed to Whom? 90 Michael T. Cahill, Punishment Pluralism 90 Contents xiii Model Penal Code Section 1.02(2)(a) Commentary (Proposed Amendments) 92 Paul H. Robinson, The A.L.I.’s Proposed Distributive Principle of “Limiting Retributivism”: Does It Mean in Practice Anything Other than Pure Desert? 94 PART II. OFFENSE REQUIREMENTS 99 Section 4. Culpability Requirements 101 The Case of Thomas Fungwe (#14) 102 The Law 104 Michigan Statutes Annotated (1999) 104 Michigan Cases 107 Model Penal Code Sections 108 Overview of Culpability Requirements 108 Hypothetical: Babies and Ditches (#15) 108 Notes 109 Problems 126 Too Young, Too Immature (#16) 126 A Vegan Death (#17) 127 Cut! (#18) 127 The Weight of Authority (#19) 128 Rough Play (#20) 129 Discussion Issue and Materials 129 Issue: What Is the Minimum Culpability, if Any, that Should Be Required for Criminal Liability? 129 Glanville Williams, Reasons for Punishing Negligence 130 Model Penal Code Section 2.02 Commentary 131 Samuel H. Pillsbury, Crimes of Indifference 132 Larry Alexander & Kimberly Kessler Ferzan with Stephen Morse, Negligence 132 Laurie L. Levenson, Good Faith Defenses: Reshaping Strict Liability Crimes 134 Section 5. Culpability and Mistake 139 The Case of Thomas Laseter (#21) 139 The Law 143 Alaska Statutes (1982) 143 Model Penal Code Section 150 Overview of Mistake Defenses 150 Notes 150 Problems 157 xiv Contents Stomach, Kidney, Whatever (#22) 157 Life- Saving Necrophilia (#23) 157 Discussion Issue and Materials 158 Issue: Should the Reasonableness of Beliefs (Including Mistaken Beliefs) Be Judged by an Objective or an Individualized Standard? 158 H.L.A. Hart, Punishment and Responsibility 158 Model Penal Code Section 2.02 Commentary 159 George P. Fletcher, The Theory of Criminal Negligence: A Comparative Analysis 159 PART III. GRADING LIABILITY: THE EXAMPLE OF HOMICIDE 163 Section 6. Homicide: Doctrines of Aggravation 165 The Case of Sabine Davidson (#24) 165 The Law 170 Kansas Statutes Annotated (1997) 170 The Kansas Sentencing Commission Desk Reference Manual (1997) 174 Model Penal Code Sections 179 Overview of Homicide Aggravations 179 Notes on Reckless Murder 179 Hypothetical: Visiting a Witness (#25) 182 Notes on Felony Murder 183 Problems 191 An Exxon Kidnap Gone Bad (#26) 191 Fleeing as Murder (#27) 192 A Robbers’ Dispute (#28) 192 Killing Your Co- Felon Through a Gun Battle with Police (#29) 193 Discussion Issue and Materials 193 Issue: Should the Criminal Law Recognize a Felony Murder Rule? 193 Model Penal Code Section 210.2 Commentary, Felony Murder 194 Guyora Binder, The Culpability of Felony Murder 195 Section 7. Death Penalty 197 The Case of William King (#30) 197 The Law 203 Texas Penal Code (1998) 203 Contents xv Texas Code of Criminal Procedure (1998) 208 Model Penal Code Section 210 Overview of the Death Penalty 210 Notes 210 Problems 213 Drunk Driving as Capital Murder (#31) 213 Child Rape and the Death Penalty (#32) 213 The Original Nuclear Proliferation (#33) 214 Discussion Issue and Materials 215 Issue: Should Capital Punishment Be Allowed? 215 Hugo A. Bedau, Arguments For and Against Capital Punishment 215 Daniel S. Nagin & John V. Pepper (eds.), Deterrence and the Death Penalty 218 Richard C. Dieter, The Future of the Death Penalty in the United States 219 Ernest van den Haag, Punishing Criminals 221 Robert Weisberg, Deregulating Death 221 Section 8. Homicide: Doctrines of Mitigation 223 The Case of John Gounagias (#34) 223 The Law 225 Annotated Codes and Statutes of Washington (1914) 225 Michigan Case 227 Model Penal Code Sections 228 Overview of Homicide Mitigations 228 Notes 228 Problems 234 The Vigilante Mother (#35) 234 A Mercy Killing as His Last Act (#36) 235 Escaping the Aliens (#37) 235 Discussion Issues and Materials 236 Issue: Should One Have the Right to End One’s Own Life? If So, Should Others Be Able to Help if Necessary? 236 Model Penal Code Section 210.5 Commentary 236 Neil M. Gorsuch, The Right to Assisted Suicide and Euthanasia 238 Robert M. Hardaway et al., The Right to Die and the Ninth Amendment: Compassion and Dying After Glucksberg and Vacco 240 xvi Contents Section 9. Causation 245 The Case of Joe Paul Govan (#38) 245 The Law 248 Arizona Revised Statutes (1980) 248 Model Penal Code Sections 255 Overview of Causation 255 Hypothetical: Manny the Master (#39) 255 Notes 256 Problems 260 Two Killers, One Killing (#40) 260 Pulling Out His Own Tubes (#41) 261 A Patriotic Suicide (#42) 261 A Jump to Escape, and Drown (#43) 262 Homicide Review Problem 263 Can You Be Your Own Intervening Actor? (#44) 263 Discussion Issue and Materials 264 Issue: Should Resulting Harm Be Relevant to Criminal Liability? Should a Completed Offense Be Punished More than an Unsuccessful Attempt? 264 Michael S. Moore, The Independent Moral Significance of Wrongdoing 264 George P. Fletcher, A Crime of Self- Defense: Bernhard Goetz and the Law on Trial 267 Paul H. Robinson, The Role of Harm and Evil in Criminal Law: A Study in Legislative Deception? 269 PART IV. INCHOATE LIABILITY 273 Section 10. Attempt Liability 275 The Case of Robert Jackson (#45) 275 The Law 278 United States Code (1976) 278 Federal Case 280 Model Penal Code Sections 280 Overview of Attempt Liability 280 Hypothetical: A Plan to Kill (#46) 280 Notes 281 Problems 293 Second Thoughts on a Holiday Breakout (#47) 293 No Risk, No Foul? (#48) 294 Killing with AIDS (#49) 294 Contents xvii Discussion Issue and Materials 295 Issue: What Degree of Culpability as to a Result Element Should Be Required for Attempt Liability? 295 Model Penal Code, Section 5.01 Commentary 295 Michael T. Cahill, Attempt, Reckless Homicide, and the Design of Criminal Law 296 Paul H. Robinson, Structure and Function in Criminal Law 298 Section 11. Impossibility 301 The Case of John Henry Ivy (#50) 301 The Law 304 Mississippi Code Annotated (1988) 304 Mississippi Case 306 Model Penal Code Sections 307 Overview of Impossibility 307 Hypothetical: The Smuggler’s Deceit (#51) 307 Notes 308 Problems 313 Lethal Spitting (#52) 313 An Impossible Rape (#53) 314 In re “The Nose . .” (#54) 315 Discussion Issue and Materials 315 Issue: If, Under the Circumstances, There Is Little or No Objective Likelihood of an Attempt Being Successful, Should the Attempt Nonetheless Constitute a Crime? In Other Words, Should a Potential for Actual Commission Be Required, or Is a Subjective Belief in the Potential for Commission Enough? 315 George P. Fletcher, A Crime of Self- Defense: Bernhard Goetz and the Law on Trial 316 Model Penal Code Section 5.01 Commentary, Impossibility — Policy Considerations 316 Lawrence Crocker, Justice in Criminal Liability: Decriminalizing Harmless Attempts 317 Section 12. Conspiracy 323 The Case of Sheik Omar Abdel Rahman (#55) 323 The Law 328 United States Code, Title 18 (1993) 328 Federal Cases 337 Model Penal Code Sections 338 xviii Contents Overview of Conspiracy 338 Notes 338 Problems 348 Arranging a Birthday Party Fight, or a Killing? (#56) 348 Truck Driver or Drug Smuggler? (#57) 349 Cannibal Cop or Harmless Fantasizer? (#58) 350 No Risk, No Foul? — Revisited (#59) 351 Discussion Issue and Materials 351 Issue: In Addition to Using Conspiracy as an Inchoate Offense, Should the Law Also Recognize It as a Substantive Offense in Order to Aggravate Punishment for Group Criminality? 351 Developments in the Law: Criminal Conspiracy 351 Model Penal Code Section 5.03 Commentary, Criminal Conspiracy — Introduction 352 Cass R.
Recommended publications
  • Sexual Aggression and the Civil Response, Annual Review of Civil
    ANNUAL REVIEW OF CIVIL LITIGATION 2018 THE HONOURABLE MR.JUSTICE TODD L. ARCHIBALD SUPERIOR COURT OF JUSTICE (ONTARIO) # 2018 Thomson Reuters Canada NOTICE AND DISCLAIMER: All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher (Thomson Reuters Canada, a division of Thomson Reuters Canada Limited). Thomson Reuters Canada and all persons involved in the preparation and sale of this publication disclaim any warranty as to accuracy or currency of the publication. This publication is provided on the understanding and basis that none of Thomson Reuters Canada, the author/s or other persons involved in the creation of this publication shall be responsible for the accuracy or currency of the contents, or for the results of any action taken on the basis of the information contained in this publication, or for any errors or omissions contained herein. No one involved in this publication is attempting herein to render legal, accounting or other professional advice. If legal advice or other expert assistance is required, the services of a competent professional should be sought. The analysis contained herein should in no way be construed as being either official or unofficial policy of any governmental body. A cataloguing record for this publication is available from Library and Archives Canada. ISBN 978-0-7798-8457-5 Scan the QR code to the right with your smartphone to send your comments regarding our products and services. Free QR Code Readers are available from your mobile device app store.
    [Show full text]
  • Preventing and Fighting the Rise of Online Sextortion and Gender Based Digital Violence
    European Crime Prevention Award (ECPA) Annex I – new version 2014 Please complete the template in English in compliance with the ECPA criteria contained in the RoP (Par.2 §3). General information 1. Please specify your country. Spain 2. Is this your country’s ECPA entry or an additional project? It is Spain’s ECPA entry 3. What is the title of the project? Preventing and fighting the rise of online Sextortion and Gender Based Digital Violence 4. Who is responsible for the project? Contact details. Jorge Flores, Founder and Director of PantallasAmigas. E-mail: [email protected] mobile:+34 605 72 81 21 5. Start date of the project (dd/mm/yyyy)? Is the project still running (Yes/No)? If not, please provide the end date of the project. 07/05/2009. The project is still running and is comprised of several of the following elements: awareness campaigns, interactive games, booklets and guides for teachers and educators, intervention protocols for victims, blogs and complaint forms. 6. Where can we find more information about the project? Please provide links to the project’s website or online reports or publications (preferably in English). A chapter for Harvard and UNICEF’s Digitally Connected ebook was written to explain the work on this ongoing project. The chapter is titled “Sexting: Teens, Sex, Smartphones and the Rise of Sextortion and Gender Based Digital Violence” and is available in the following link: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2585686 The full project is at the moment available only in Spanish
    [Show full text]
  • Digital Blackmail As an Emerging Tactic 2016
    September 9 DIGITAL BLACKMAIL AS AN EMERGING TACTIC 2016 Digital Blackmail (DB) represents a severe and growing threat to individuals, small businesses, corporations, and government Examining entities. The rapid increase in the use of DB such as Strategies ransomware; the proliferation of variants and growth in their ease of use and acquisition by cybercriminals; weak defenses; Public and and the anonymous nature of the money trail will only increase Private Entities the scale of future attacks. Private sector, non-governmental organization (NGO), and government cybersecurity experts Can Pursue to were brought together by the Office of the Director of National Contain Such Intelligence and the Department of Homeland Security to determine emerging tactics and countermeasures associated Attacks with the threat of DB. In this paper, DB is defined as illicitly acquiring or denying access to sensitive data for the purpose of affecting victims’ behaviors. Threats may be made of lost revenue, the release of intellectual property or sensitive personnel/client information, the destruction of critical data, or reputational damage. For clarity, this paper maps DB activities to traditional blackmail behaviors and explores methods and tools, exploits, protection measures, whether to pay or not pay the ransom, and law enforcement (LE) and government points of contact for incident response. The paper also examines the future of the DB threat. Digital Blackmail as an Emerging Tactic Team Members Name Organization Caitlin Bataillon FBI Lynn Choi-Brewer
    [Show full text]
  • Sentencing Guidelines Offense Table (Updated 11/2/20)
    Appendix A Sentencing Guidelines Offense Table (Updated 11/2/20) Appendix A contains a table of guidelines offenses including their CJIS code, statutory source, seriousness category, and penalties. If an offense is not listed in Appendix A and the offense has a maximum penalty of one year or less, the offense should be identified as a category VII offense. If an offense is not listed in Appendix A and the maximum penalty is greater than one year, the individual completing the worksheet should use the seriousness category for the closest analogous offense and the sentencing judge and the parties should be notified. If there are any questions about how to categorize or score an offense, please call the Maryland State Commission on Criminal Sentencing Policy staff at (301) 403-4165. November 2020 121 INDEX OF OFFENSES Abuse & Other Offensive Conduct ......................... 1 Kidnapping & Related Crimes .............................. 33 Accessory After the Fact ......................................... 2 Labor Trafficking ................................................... 33 Alcoholic Beverages ................................................ 2 Lotteries ................................................................. 33 Animals, Crimes Against ......................................... 3 Machine Guns ........................................................ 34 Arson & Burning ...................................................... 3 Malicious Destruction & Related Crimes ............. 34 Assault & Other Bodily Woundings .......................
    [Show full text]
  • Handbook for the Judiciary on Effective Criminal Justice
    Handbook for the Judiciary on Effective Criminal Justice Responses to Gender-based Violence against Women and Girls Cover photo: ©iStock.com/Berezko UNITED NATIONS OFFICE ON DRUGS AND CRIME Vienna Handbook for the Judiciary on Effective Criminal Justice Responses to Gender-based Violence against Women and Girls UNITED NATIONS Vienna, 2019 © United Nations Office on Drugs and Crime, 2019. All rights reserved. The designations employed and the presentation of material in this publication do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimitations of its frontiers or boundaries. Mention of firm names and com- mercial products does not imply the endorsement of the United Nations. Publishing production: English, Publishing and Library Section, United Nations Office at Vienna. Acknowledgements The Handbook for the Judiciary on Effective Criminal Justice Responses to Gender-based Violence against Women and Girls has been prepared for the United Nations Office on Drugs and Crime (UNODC) by Eileen Skinnider, Associate, International Centre for Criminal Law Reform and Criminal Justice Policy. A first draft of the handbook was reviewed and discussed during an expert meeting held in Vienna from 26 to 30 November 2018. UNODC wishes to acknowledge the valuable suggestions and contri- butions of the following experts who participated in that meeting: Ms. Khatia Ardazishvili, Ms. Linda Michele Bradford-Morgan, Ms. Aditi Choudhary, Ms. Teresa Doherty, Ms. Ivana Hrdličková, Ms. Vivian Lopez Nuñez, Ms. Sarra Ines Mechria, Ms. Suntariya Muanpawong, Ms.
    [Show full text]
  • Revenge Porn and Tort Remedies for Public Figures
    William & Mary Journal of Race, Gender, and Social Justice Volume 24 (2017-2018) Issue 1 William & Mary Journal of Women and the Law: 2017 Special Issue: Enhancing Article 9 Women's Effect on Law Enforcement in the Age of Police and Protest November 2017 When Fame Takes Away the Right to Privacy in One's Body: Revenge Porn and Tort Remedies for Public Figures Caroline Drinnon Follow this and additional works at: https://scholarship.law.wm.edu/wmjowl Part of the Law and Gender Commons, Privacy Law Commons, and the Torts Commons Repository Citation Caroline Drinnon, When Fame Takes Away the Right to Privacy in One's Body: Revenge Porn and Tort Remedies for Public Figures, 24 Wm. & Mary J. Women & L. 209 (2017), https://scholarship.law.wm.edu/wmjowl/vol24/iss1/9 Copyright c 2017 by the authors. This article is brought to you by the William & Mary Law School Scholarship Repository. https://scholarship.law.wm.edu/wmjowl WHEN FAME TAKES AWAY THE RIGHT TO PRIVACY IN ONE’S BODY: REVENGE PORN AND TORT REMEDIES FOR PUBLIC FIGURES INTRODUCTION I. A COMMON PHENOMENON—EXAMPLES OF INVASION OF PRIVACY OF PUBLIC FIGURES A. Harms Suffered by Victims of the Distribution of Nonconsensual Pornography B. Legal Remedies Imposed in the “Celebgate” Hacking and Leak Incident II. CIVIL REMEDIES FOR NON–PUBLIC FIGURE VICTIMS OF REVENGE PORN A. Intentional Infliction of Emotional Distress B. Invasion of Privacy Based on Public Disclosure of Private Facts III. HISTORY OF DENYING PRIVACY REMEDIES FOR PUBLIC FIGURES A. What Is a “Public Figure”? B. Distinction Between Public and Private Figures in Privacy-Related Causes of Actions C.
    [Show full text]
  • Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children
    Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children on the Technologies of New Information Study on the Effects Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children UNITED NATIONS OFFICE ON DRUGS AND CRIME Vienna Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children UNITED NATIONS New York, 2015 © United Nations, May 2015. All rights reserved, worldwide. This report has not been formally edited and remains subject to editorial changes. The contents of this report do not necessarily reflect the views or policies of UNODC or contributory organizations and neither do they imply any endorsement. The designations employed and the presentation of material in this publication do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries. Information on uniform resource locators and links to Internet sites contained in the present publication are provided for the convenience of the reader and are correct at the time of issue. The United Nations takes no responsibility for the continued accuracy of that information or for the content of any external website. Publishing production: English, Publishing and Library Section, United Nations Office at Vienna. Acknowledgements This report was prepared pursuant to ECOSOC resolution 2011/33 on Prevention, protection and international cooperation against the use of new information technologies to abuse and/or exploit children by Conference Support Section, Organized Crime Branch, Division for Treaty Affairs, UNODC, under the supervision of John Sandage (former Director, Division for Treaty Affairs), Sara Greenblatt and Loide Lungameni (former and current Chief, Organized Crime Branch, respectively), and Gillian Murray (former Chief, Conference Support Section).
    [Show full text]
  • Revenge Pornº: an Evaluation of the Elements That Make an Effective Nonconsensual Pornography Statute
    DECONSTRUCTING THE STATUTORY LANDSCAPE OF ªREVENGE PORNº: AN EVALUATION OF THE ELEMENTS THAT MAKE AN EFFECTIVE NONCONSENSUAL PORNOGRAPHY STATUTE Jonathan S. Sales and Jessica A. Magaldi* INTRODUCTION Changes in social mores and technology have yielded the phenomenon of sext- ing, which includes the capturing and forwarding of intimate images through the Internet.1 Research reveals that nearly ®fty percent of adults in the United States have sent or received intimate digital content. 2 At the same time, the con¯uence of these changes has spawned new violations of privacy and predatory actions when these images are made available on the Internet without the subject's consent.3 The re-distribution or dissemination of these intimate images without the consent of the subject and without a legitimate purpose (such as a law enforcement investigation) is referred to as nonconsensual pornography (ªNCPº). 4 NCP has caused victims to suffer substantial harm.5 In some cases, NCP inci- dents have precipitated a victim's suicide.6 Prior generations might have concluded that a person who allowed such images to be captured and placed in the possession of another person assumed the risk of re-distribution; in essence, a negligence, recklessness, or constructive consent argument. In contrast, in the twenty-®rst cen- tury, capturing or sharing of intimate images is often regarded as an acceptable * Jonathan S. Sales, J.D., Northeastern University School of Law, Lecturer, Bentley University; Jessica A. Magaldi, J.D., New York University School of Law, Associate Professor, Pace University. The authors gratefully acknowledge the research support of Clifton M. Chow, Ph.D., Research Consultant at Bentley University; Peng Zhang and Piotr Kolodzie, Graduate Assistants at Bentley University; and Primrose Zvinavashe, LL.B, LL.M, Graduate Assistant at Pace University.
    [Show full text]
  • Sexual Exploitation Crimes Against Children
    Sexual Exploitation Crimes Against Children In This Issue September 2011 Volume 59 Number 5 Introduction to the Sexual Exploitation Crimes Against Children Issue of the USA Bulletin . .1 United States Department of Justice By Paul R. Almanza Executive Office for United States Attorneys Washington, DC Meeting the Government’s Discovery Obligations in Child Exploitation 20530 Cases . 3 H. Marshall Jarrett Director By Jeffrey Zeeman Contributors' opinions and statements should not be considered an endorsement by Getting Your Evidence into Evidence in a Digital World . 14 EOUSA for any policy, program, or service. By Damon King and Meredith Owen The United States Attorneys' Bulletin is published pursuant to 28 Understanding Probable Cause and Overcoming Staleness Issues in Child CFR § 0.22(b). Pornography Cases . 27 The United States Attorneys' Bulletin is published bimonthly by By Chantel Febus, Jason Claude, and Kimberly Singer the Executive Office for United States Attorneys, Office of Legal Education, 1620 Pendleton Street, Columbia, South Carolina 29201. SORNA: A Primer . 42 By Bonnie Kane Managing Editor Jim Donovan Social Networking Sites: Breeding Grounds for “Sextortion” Prosecutions Law Clerk Carmel Matin . .54 Internet Address By Darcy Katzin, Mi Yung Park, and Keith Becker www.usdoj.gov/usao/ reading_room/foiamanuals. html Emerging Issues in the Extraterritorial Sexual Exploitation of Children . 59 Send article submissions and By Anitha S. Ibrahim, Ed McAndrew, and Wendy Waldron address changes to Managing Editor, United States Attorneys' Bulletin, National Advocacy Center, Units of Prosecution in Child Pornography Cases and Rebutting the Office of Legal Education, 1620 Pendleton Street, Argument that Possession of Child Pornography is a Lesser Included Columbia, SC 29201.
    [Show full text]
  • Fighting Cybercrime After United States V. Jones David Gray
    Journal of Criminal Law and Criminology Volume 103 | Issue 3 Article 4 Summer 2013 Fighting Cybercrime After United States v. Jones David Gray Danielle Keats Citron Liz Clark Rinehart Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons Recommended Citation David Gray, Danielle Keats Citron, and Liz Clark Rinehart, Fighting Cybercrime After United States v. Jones, 103 J. Crim. L. & Criminology 745 (2013). https://scholarlycommons.law.northwestern.edu/jclc/vol103/iss3/4 This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/13/10303-0745 THE JOURNAL OF CRIMINAL LAW & CRIMINOLOGY Vol. 103, No. 3 Copyright © 2013 by David Gray, Danielle Keats Citron & Liz Clark Rinehart Printed in U.S.A. FIGHTING CYBERCRIME AFTER UNITED STATES V. JONES DAVID GRAY,* DANIELLE KEATS CITRON** & LIZ CLARK RINEHART*** In a landmark nondecision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus on the technologies that make collecting and aggregating large quantities of information possible.
    [Show full text]
  • Online Sexual Exploitation of Children in the Philippines 1
    The sexual exploitation of children is, sadly, not a new phenomenon. It has existed for many centuries, has victimized children of any age from all countries, and has been committed by offenders of all backgrounds from around the world. What has changed however, are the ways in which these offences occur and the mechanisms that facilitate these types of abuse. In the last fifteen years there has been a significant increase in the use of technologies internationally. Across much of the globe, it is hard to find a person without at least one mechanism that allows them to access the Internet at the mere touch of a button. However, as history will teach us, with every new invention there will be misuse - this has never been more evident than with online technologies and the Internet. Technological advancements have changed the ways through which children are sexually exploited – online child sexual exploitation continues to grow exponentially with hotlines around the world reporting a consistent and continual increase in number of cases every year. Efforts internationally are responding to these increases. We are seeing police agencies utilizing technology to help them further investigations and more and more industry partners are exploring how they can be part of the solution. Additionally, non-government agencies continue to seek out new opportunities to enhance their support to victims in their communities through supporting criminal justice and social service system development, survivor care, and community-based support mechanisms. Never before has it been more important to work together to protect children. But in order to do just that, it is imperative that we know more about these crimes against children.
    [Show full text]
  • Human Trafficking November 2017 in This Issue Volume 65 Number 6
    Human Trafficking November 2017 In This Issue Volume 65 Number 6 Introduction .............................................................................................................. 1 United States Department of Justice By Rod Rosenstein, Deputy Attorney General of the United States Executive Office for United States Attorneys Washington, DC 20530 Human Trafficking: The Fundamentals ................................................................. 3 By Hilary Axam and Jennifer Toritto Leonardo Monty Wilkinson Director The Civil Rights Division’s Human Trafficking Prosecution Unit Contributors’ opinions and statements (HTPU) and the Criminal Division’s Child Exploitation and Obscenity should not be considered an endorsement by EOUSA for any Section (CEOS): An Overview ............................................................................... 17 policy, program, or service. By Hilary Axam and Steven J. Grocki The United States Attorneys’ Bulletin is published pursuant to Proactive Case Identification Strategies and the Challenges of Initiating 28 C.F.R. § 0.22(b). Labor Trafficking Cases ........................................................................................ 25 The United States Attorneys’ Bulletin By Nirav K. Desai and Sean Tepfer is published by the Executive Office for United States Attorneys, Domestic Child Sex Trafficking and Children Missing from Care .................... 33 Office of Legal Education, 1620 Pendleton Street, By Staca Shehan and Angela Aufmuth Columbia, South Carolina 29201 The Survivor-Centered,
    [Show full text]