White-Collar Crime, Undercover Operations, and Privacy
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Potential Liability of Federal Law-Enforcement Agents Engaged in Undercover Child Pornography Investigations
NO TES THE POTENTIAL LIABILITY OF FEDERAL LAW-ENFORCEMENT AGENTS ENGAGED IN UNDERCOVER CHILD PORNOGRAPHY INVESTIGATIONS HOWARD ANGLIN* In the course of enforcing laws against child pornography,law enforcement agents often engage in undercover operations that involve mailing child pornography to suspected consumers. In this Note, Howard Anglin argues that Congress and the Supreme and circuit courts have clearly established that children portrayed in por- nography are harmed every time the pornographicimages are viewed. The current law enforcement practice of mailing child pornography therefore injures children each time it is carried out. Under the doctrine formulated in Bivens v. Six Un- known Named Agents of Federal Bureau of Narcotics, this injury is actionable by the children involved and may lead to monetary damage awards against the agents who choose to send pornography to criminal suspects. Thus, law enforcement agencies should alter their practices to avoid Bivens liability and adhere to Con- gressional admonitions not to injure the innocent in order to catch the guilty. INTRODUCTION "Governmental 'investigation' involving participation in activities that result in injury to the rights of its citizens is a course that courts should be extremely reluctant to sanction."1 -Judge Henry J. Friendly Sex crimes against children occupy a place of particular horror and fascination in the public imagination. 2 Appealing simultaneously to the most paternal and prurient human instincts, child pornography * This is not an ambitious Note, but I have enjoyed writing it as an exercise in legal analysis and investigation. Thanks are due to Professor Amy Adler for her counsel, to Adav Noti for his invaluable editorial work, and to Travis J. -
Undercover Law Enforcement Operatives' Perceptions of Post
Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 2020 Undercover Law Enforcement Operatives’ Perceptions of Post Critical Incident Mental Health Services David B. Spinella Walden University Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations Part of the Psychology Commons This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Walden University College of Social and Behavioral Sciences This is to certify that the doctoral dissertation by David B. Spinella has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. Jana Price-Sharps, Committee Chairperson, Psychology Faculty Dr. Jason Roach, Committee Member, Psychology Faculty Dr. Christopher Bass, University Reviewer, Psychology Faculty Chief Academic Officer and Provost Sue Subocz, Ph.D. Walden University 2020 Abstract Undercover Law Enforcement Operatives‘ Perceptions of Post Critical Incident Mental Health Services by David B. Spinella MBA, University of Phoenix, 2007 MA, Chapman University, 1990 BS, Southern Illinois University Carbondale, 1985 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Forensic Psychology Walden University August 2020 Abstract Undercover officers experience unique job-related stressors due to the covert nature and sometimes long duration of their tasks. Undercover officers adopt false identities that involve taking on a personality and lifestyle that the officer might find personally objectionable. -
Case 3:14-Cr-00085-JAM Document 112 Filed 11/17/14 Page 1 of 22
Case 3:14-cr-00085-JAM Document 112 Filed 11/17/14 Page 1 of 22 UNITED STATES DISTRICT COURT DISTRICT OF CONNECTICUT UNITED STATES OF AMERICA v. No. 3:14-cr-00085 (JAM) CARLOS COLON, et al. RULING ON DEFENDANTS’ JOINT MOTIONS FOR DISCOVERY (Doc. #36) AND TO DISMISS THE INDICTMENT (Doc. #37) This case involves seven criminal defendants who were set up by undercover law enforcement agents to rob a fictional drug ―stash house‖ in Connecticut. They fell victim to a ruse that federal law enforcement agents have deployed with remarkable success against countless suspects nationwide. All seven defendants—some of them armed—gathered one day last April at a parking lot somewhere in Stamford, expecting that they would momentarily proceed to a nearby stash house to rob and help themselves to 15 kilograms or more of lightly guarded cocaine. Instead, a flood of law enforcement agents swept in to arrest them. Each of the defendants now stands charged with conspiracies to engage in robbery, drug trafficking, and related weapons offenses. For their plans to rob a house and cocaine that never existed, each of the defendants likely faces at least 15 years of mandatory minimum imprisonment if convicted on these charges. Defendants jointly move to dismiss the indictment on the ground that the stash-house sting operation that was launched against them amounted to outrageous government conduct in violation of their constitutional rights under the Due Process Clause. Relatedly, defendants contend that they were targeted on account of their race in violation of the Equal Protection 1 Case 3:14-cr-00085-JAM Document 112 Filed 11/17/14 Page 2 of 22 Clause, and they seek discovery to support their claim of selective enforcement and prosecution. -
Drug Trafficking
If you have issues viewing or accessing this file contact us at NCJRS.gov. NATIONAL DRUG ENFORCEMENT POLICY BOARD Federal Drug Enforcement Progress Report 1984 - 1985 March 1986 PREFACE This report is submitted to Congress pursuant to the National Narcotics Act of 1984. As Chairman of the National Drug Enforcement Policy Board, the Attorney General is required to submit biannual reports to Congress. On July 9, 1985, the Policy Board forwarded its first report, which described the Board's law enforcement policies and strategies. Beginning with this second report, the Board must give to Congress "a full and complete report reflecting accomplishments ...." Even though the Policy Board was not created until the middle of fiscal year 1985, this report describes accomplishments in drug enforcement during fiscal years 1984 and 1985. Although this report focuses primarily on law enforcement efforts to reduce the supply of drugs in the United States, the Policy Board recognizes the importance of efforts to reduce the demand for drugs. A major section of this report describes the Organized Crime Drug Enforcement Task Force (OCDETF) Program. Annual reports of the OCDETF Program were prepared for calendar years 1983 and 1984. The Policy Board has decided to consolidate reporting on 1985 OCDETF accomplishments within this report. i TABLE OF CONTENTS Preface ..................................................... i List of Tables and Figures .................................. iii Introduction ................................................. I I , The Drug Problem in 1985 .......................... 6 II. Investigation & Prosecution ....................... 12 A. Combined Federal Effort ....................... 13 B. Organized Crime Drug Enforcement Task Force Program ............................ 43 III. Interdiction ...................................... 120 IV. International Drug Control ........................ 146 V. Domestic Cannabis Eradication ..................... 174 VI. -
Entrapment and Terrorism Dru Stevenson
Boston College Law Review Volume 49 Article 3 Issue 1 Number 1 1-1-2008 Entrapment and Terrorism Dru Stevenson Follow this and additional works at: http://lawdigitalcommons.bc.edu/bclr Part of the National Security Law Commons Recommended Citation Dru Stevenson, Entrapment and Terrorism, 49 B.C.L. Rev. 125 (2008), http://lawdigitalcommons.bc.edu/bclr/vol49/iss1/3 This Article is brought to you for free and open access by the Law Journals at Digital Commons @ Boston College Law School. It has been accepted for inclusion in Boston College Law Review by an authorized editor of Digital Commons @ Boston College Law School. For more information, please contact [email protected]. ENTRAPMENT AND TERRORISM DRU STEVENSON * Abstract: Antiterrorism is a national priority and undercover sting opera- dons are a main antiterrorism tool. As our legal system's primary device for regulating undercover stings, the scope and vigor of the entrapment defense will impact the effectiveness of antiterrorism stings. The federal courts follOw the subjective test of entrapment, focusing on whether the • defendant was predisposed to commit the crime, or if rather the govern- ment induced the defendant to breach a legal norm. This Article argues that given the difficulty of preventing terrorist acts and the civil liberties implications of intrusive surveillance—the alternative to stings—there should be a rebuttable presumption that anyone who provides material support to terrorism was predisposed to do so. This Article argues that terrorism is such a heinous crime that it is unlikely the government could induce someone to support such criminals unless the person was one of the few predisposed to do so. -
The Law As King and the King As Law: Is a President Immune from Criminal Prosecution Before Impeachment? Eric M
Maurice A. Deane School of Law at Hofstra University Scholarly Commons at Hofstra Law Hofstra Law Faculty Scholarship 1992 The Law as King and the King as Law: Is a President Immune from Criminal Prosecution Before Impeachment? Eric M. Freedman Maurice A. Deane School of Law at Hofstra University Follow this and additional works at: https://scholarlycommons.law.hofstra.edu/faculty_scholarship Recommended Citation Eric M. Freedman, The Law as King and the King as Law: Is a President Immune from Criminal Prosecution Before Impeachment?, 20 Hastings Const. L.Q. 7 (1992) Available at: https://scholarlycommons.law.hofstra.edu/faculty_scholarship/449 This Article is brought to you for free and open access by Scholarly Commons at Hofstra Law. It has been accepted for inclusion in Hofstra Law Faculty Scholarship by an authorized administrator of Scholarly Commons at Hofstra Law. For more information, please contact [email protected]. The Law as King and the King as Law: Is a President Immune from Criminal Prosecution Before Impeachment? By ERIC M. FREEDMAN* Table of Contents Introduction ................................................... 8 I. The Original Intents ................................. 15 II. The Historical Practice ............................... 22 A. The Federal Executive Branch ......................... 22 B. The Federal Judicial and Legislative Branches .......... 24 1. The Federal Judicial Branch ....................... 25 2. The Federal Legislative Branch ..................... 30 C. Federal Prosecution of State and Local Officials ......... 33 D. State-Level Practice ................................... 37 III. Theoretical Considerations ........................... 39 A. The Dual Nature of the Impeachment Clause .......... 41 B. The Rule of Law ...................................... 46 1. Civil Immunity .................................... 46 * Assistant Professor of Law, Hofstra University School of Law. J.D. 1979, B.A. -
Domestic Terrorism: Overview of Federal Criminal Law and Constitutional Issues
Domestic Terrorism: Overview of Federal Criminal Law and Constitutional Issues July 2, 2021 Congressional Research Service https://crsreports.congress.gov R46829 SUMMARY R46829 Domestic Terrorism: Overview of Federal July 2, 2021 Criminal Law and Constitutional Issues Peter G. Berris Federal statute defines domestic terrorism to include dangerous criminal acts intended to Legislative Attorney intimidate or coerce a civilian population or to influence or affect government policy or conduct within the jurisdiction of the United States. Despite the federal statutory definition, no federal Michael A. Foster criminal provision expressly prohibits “domestic terrorism.” Nevertheless, numerous federal Legislative Attorney statutes offer prosecutors options in charging violent and destructive conduct consistent with the statutory definition of domestic terrorism. Some of these statutes can be characterized as expressly focused on terrorism, listing criminal offenses to include, among others, providing Jonathan M. Gaffney material support or resources to terrorists and engaging in terrorism transcending domestic Legislative Attorney boundaries. Other generally applicable federal criminal laws may also be relevant to domestic terrorism prosecutions. For example, depending on the defendant’s motive, target, or means, various federal criminal statutes protecting certain property or persons, prohibiting violence motivated by particular biases, or criminalizing possession or use of specific weapons may apply. Depending on the circumstances, prosecutors may also rely on accomplice liability or inchoate offenses such as attempt, conspiracy, or solicitation to charge conduct consistent with the definition of domestic terrorism. Beyond applicable offenses, domestic terrorism may be relevant in federal sentencing, either through specific statutes that authorize additional penalties in the domestic terrorism context or through the United States Sentencing Guidelines, which include an upward adjustment for offenses connected to terrorism. -
Beyond 1984: Undercover in America–Serpico to Abscam Robert Blecker New York Law School, [email protected]
digitalcommons.nyls.edu Faculty Scholarship Articles & Chapters 1984 Beyond 1984: Undercover in America–Serpico to Abscam Robert Blecker New York Law School, [email protected] Follow this and additional works at: http://digitalcommons.nyls.edu/fac_articles_chapters Part of the Criminal Law Commons Recommended Citation 28 N.Y.L. Sch. L. Rev. 823 (1983-1984) This Article is brought to you for free and open access by the Faculty Scholarship at DigitalCommons@NYLS. It has been accepted for inclusion in Articles & Chapters by an authorized administrator of DigitalCommons@NYLS. BEYOND 1984: UNDERCOVER IN AMERICA- SERPICO TO ABSCAM ROBERT I. BLECKER PART ONE PROLOGUE ................................................. 824 SERPICO To ARCHER ........................................ 840 The Archer Trial-United States v. Sherman: Subjective versus Objective Entrapment-Judge Friendly and Federal Jurisdiction-United States v. Russell-Archer reversed-A Second Try-The New York State Archer Case-Hampton v. United States: The Government on Both Sides-Archer's Conviction Affirmed: The Technique Vindicated. ABsc m ................................................... 872 The Undercover Background-Guccione and Williams-The Coaching Incident-Meyers' Payoff-Kelly-Schwartz and Jannotti. TRIALS AND HEARINGS ...................................... 899 United States v. Jannotti: Due Process-Congressional Hearings-The Archer Stain-United States v. Meyers-United States v. Williams-A Linguistic Probe of Abscam-Jannotti on Appeal: Entrapment and Due Process-United -
Entrapment in Cyberspace Jennifer Gregg
Hastings Communications and Entertainment Law Journal Volume 19 | Number 1 Article 6 1-1-1996 Caught in the Web: Entrapment in Cyberspace Jennifer Gregg Follow this and additional works at: https://repository.uchastings.edu/ hastings_comm_ent_law_journal Part of the Communications Law Commons, Entertainment, Arts, and Sports Law Commons, and the Intellectual Property Law Commons Recommended Citation Jennifer Gregg, Caught in the Web: Entrapment in Cyberspace, 19 Hastings Comm. & Ent. L.J. 157 (1996). Available at: https://repository.uchastings.edu/hastings_comm_ent_law_journal/vol19/iss1/6 This Note is brought to you for free and open access by the Law Journals at UC Hastings Scholarship Repository. It has been accepted for inclusion in Hastings Communications and Entertainment Law Journal by an authorized editor of UC Hastings Scholarship Repository. For more information, please contact [email protected]. Caught in the Web: Entrapment in Cyberspace by JENNIFER GREGG* Table of Contents I. Online Child Pornography and the Current Response of Law Enforcem ent ................................................................ 161 II. Overview of Cyberspace ...................................................... 166 A. Levels of Interaction: Terms and Definitions ............ 166 1. Electronic M ail ........................................................ 167 2. Bulletin Board Systems (BBSs) ............... 167 3. FTP & the World Wide Web ................................ 169 B. Unique Attributes of Cyberspace ................ 169 III. -
Reassessing the Citizens Protection Act: a Good Thing It Passed, and a Good Thing It Failed
Georgetown University Law Center Scholarship @ GEORGETOWN LAW 2013 Reassessing the Citizens Protection Act: A Good Thing It Passed, and a Good Thing It Failed Rima Sirota [email protected] This paper can be downloaded free of charge from: https://scholarship.law.georgetown.edu/facpub/1611 43 Sw. L. Rev. 51 This open-access article is brought to you by the Georgetown Law Library. Posted with permission of the author. Follow this and additional works at: https://scholarship.law.georgetown.edu/facpub Part of the Criminal Procedure Commons, Legal Ethics and Professional Responsibility Commons, and the Legal Profession Commons 2.SIROTA.ARTICLE.MACRO (DO NOT DELETE) 2/28/2014 4:28 PM REASSESSING THE CITIZENS PROTECTION ACT: A GOOD THING IT PASSED, AND A GOOD THING IT FAILED Rima Sirota* INTRODUCTION Critics have lambasted the Citizens Protection Act of 1998 (the CPA)1 from all ideological perspectives.2 The criticism began at the earliest stages of the legislative debate and continues through the present. With the advantage of fifteen years hindsight, this article demonstrates that the CPA succeeded where it should have and failed where it should have. The CPA has left us—even if inadvertently—with a remarkably coherent and consistent approach to regulating a federal prosecutor’s ability to effectively * Professor of Legal Research and Writing, Georgetown University Law Center; previously Attorney Advisor, U.S. Dept. of Justice Professional Responsibility Advisory Office. I extend my thanks to Julie Ross, Jeffrey Shulman, Kristen Tiscione, Julie O’Sullivan, Patricia Weiss, and Anita Gay for their comments and encouragement and to Sarah Scott for her excellent research assistance. -
Unconventional Investigative Techniques in White Collar Cases: Wiretaps, Search Warrants, and Sting Operations
Unconventional Investigative Techniques in White Collar Cases: Wiretaps, Search Warrants, and Sting Operations. Robert H. Hotz, Jr. and Harry Sandick1 I. Introduction The federal government has resorted to unconventional investigative techniques previously reserved for combating narcotics traffickers and organized crime figures in several recent high profile white collar cases. For example, last year, the United States Attorney for the Southern District of New York spoke out publicly in favor of the increased use of wiretaps by the federal government in insider trading investigations. Describing “inside information” as a “financial steroid,” he said “every legitimate tool” at law enforcement’s disposal was needed to combat it, including wiretaps.2 In a speech to the Practising Law Institute, the Assistant Attorney General of the Criminal Division said that the Department of Justice (“DOJ”) had hired more attorneys to review and approve wiretap applications.3 In addition, in November 2010, FBI agents executed coordinated search warrants at a number of hedge funds in connection with an insider trading investigation into the use of so-called “expert network[s].”4 Further, in January 2010, 22 individuals were charged with violations of the Foreign Corrupt Practice Act (“FCPA”) in 1 The authors gratefully thank Dan Fisher of Akin Gump Strauss Hauer & Feld LLP and Frank Cavanagh of Patterson Belknap Webb & Tyler LLP for their significant contributions to the preparation of this paper. 2 Mark DeCambre, Taped Crusader, NEW YORK POST, Oct. 22, 2010, http://www.nypost.com/p/news/business/taped_crusader_IjhonU7UjaE5vH7C8koS2M. (“In some respects, inside information is a form of financial steroid. It is unfair; it is offensive; it is unlawful; and it puts a black mark on the entire enterprise,” the 42-year-old lawman noted). -
The Depth of Corruption in Illinois: Anti-Corruption Report Number 2 May 13, 2009
The Depth of Corruption in Illinois: Anti-Corruption Report Number 2 May 13, 2009 Authored By: Thomas J. Gradel Dick Simpson And Andris Zimelis With Kirsten Byers David Michelberger Chris Olson Nirav Sanghani University of Illinois at Chicago Department of Political Science 2 Public corruption in Illinois has a long history dating from the first scandal involving Chicago aldermen and Cook County commissioners in the 1860s. At that time they participated in a crooked contract to paint city hall. Today, nearly a century and a half later, crooked contracts still cost the taxpayers millions of dollars a year and crooked politicians still go to jail. As we continue our study of public corruption, we have discovered that our original findings underestimated the level of corruption in recent years. We now know that more than 1500 individuals have been convicted of myriad forms of public corruption since 1970. Based upon the testimony before the Illinois Reform Commission and our own research, we now believe that the cost of corruption, or “corruption tax,” for the Chicago and Illinois taxpayer is at least $500 million a year. This is based upon testimony before the commission that about 5% of state government contracts are given out to political cronies and campaign contributors and on our own tallies of the costs of the major scandals over the last four decades. In our last report we provided a detailed analysis of the 30 aldermen and former aldermen convicted of public corruption since 1970. In this report we describe some of the major scandals of the last four decades, a timeline of more than 375 convicted individuals at all levels of government, and a further analysis of some of the costs of corruption which have caused us to revise our estimate of the corruption tax.