Internet Sting Operations and Attempt Liability

Total Page:16

File Type:pdf, Size:1020Kb

Internet Sting Operations and Attempt Liability Pace University DigitalCommons@Pace Pace Law Faculty Publications School of Law 1-1-2004 New Technology, Old Defenses: Internet Sting Operations and Attempt Liability Audrey Rogers Elisabeth Haub School of Law at Pace University Follow this and additional works at: https://digitalcommons.pace.edu/lawfaculty Part of the Criminal Law Commons Recommended Citation Audrey Rogers, New Technology, Old Defenses: Internet Sting Operations and Attempt Liability, 38 U. Rich. L. Rev. 477 (2004), http://digitalcommons.pace.edu/lawfaculty/317/. This Article is brought to you for free and open access by the School of Law at DigitalCommons@Pace. It has been accepted for inclusion in Pace Law Faculty Publications by an authorized administrator of DigitalCommons@Pace. For more information, please contact [email protected]. NEW TECHNOLOGY, OLD DEFENSES: INTERNET STING OPERATIONS AND ATTEMPT LIABILITY Audrey Rogers * Internet sting operations to catch adults preying on children have grown as exponentially as the public's use of the Internet. These operations typically involve an adult law enforcement offi- cer posing as a child for Internet contact with a would-be defen- dant.' Defendants caught in a sting are charged with attempt be- cause by use of the sting operation, law enforcement has * Associate Professor of Law, Pace Law School. B.S., 1977, State University of New York at Albany; J.D., 1980, St. John's University School of Law. Many thanks to Mavis Ronayne and Jill Grinham for their invaluable research assistance. Thanks also to my col- leagues at Pace Law School for their suggestions and comments. 1. The Federal Bureau of Investigation ("FBIn) started the Innocent Images National Initiative in 1995 to stop child sex exploitation through the Internet. Operating in FBI of- fices throughout the country, the probes have resulted in the conviction of over 3,000 indi- viduals. Press Release, Federal Bureau of Investigation, Operation Candyman (Mar. 18, 2002) available at http://www.fbi.gov/pressre~ressrel02/cmO31802.htm(last visited Nov. 22, 2003). A number of states have also commenced Internet sting operations. For exam- ple, in New York, the Westchester County District Attorney's High Technology Crimes Bureau currently operates a pedophile Internet sting operation. D.T. Max, Mouse Trapped, N.Y. MAG., Feb. 25,2002, at 23.This operation, which began in July 1999, uses investigators from the District Attorney's office who log on to the Internet and pose as mi- nors. See id. at 26. The investigators log on to online chat rooms and wait for contact from possible pedophiles. Id. When a suspect does make contact, the investigator will then at- tempt to remove any possible defenses that the suspect might raise at trial, such as not having the requisite knowledge that the person he was communicating with was a minor; claiming that it was merely an Internet fantasy, and finally asserting that it was not he, the suspect, who the investigator was communicating with. Id. at 26, 78. See infra notes 149-51 and accompanying text. Once the suspect has attempted to set up a meeting with the "minor," the investigators then obtain a subpoena for the suspect's Internet Senice Provider ("ISP") to obtain the subscriber's identification information. J. M. Hirsch, Cyber- Cop Searches for Pedophiles, SEATTLETIMES, Sept. 6, 1998, at A20. A meeting is then set up with the suspect and when he arrives at the meeting place, he is arrested. See J. Allan Cobb, Evidentiary Issues Concerning Online "Stingn Operations: A Hypothetical-Based Analysis Regarding Authentication, Identification, and Admissibility of Online Conuersa- tions-A Novel Test for the Application of Old Rules to New Crimes, 39 BRANDEISL.J. 785 (2001); Michael W. Sheetz, Comment, CyberPredators: Police Internet Investigations Under Florida Statute 847.0135,54 U. MIAMIL. REV. 405 (2000). Heinonline -- 38 U. Rich. L. Rev. 477 2003-2004 478 UNnTERSITY OF RICHMOND LAW REVIEW [Vol. 38:477 prevented the commission of the underlying offense against a child.2 These cases provide a contemporary opportunity to revisit some classic attempt liability issues. Some defendants have re- vived use of a defense of impossibility as they claim that it is le- gally impossible for them to be guilty of attempt to commit a crime against a child since no child was in~olved.~Other defen- dants assert that they were indifferent to the age of the victim and therefore cannot be said to have the intent necessary for at- tempt liability. Still other defendants claim they never believed they were dealing with a minor. These latter defenses raise the issue of the appropriate mens rea for attempt liability. Whether intent is essential for all the crime's elements or whether some mens rea less than intent is acceptable for a crime's attendant circumstances, such as the age or existence of the victim, are is- sues that had been relegated to narrow, abstract scholarly atten- ti~n.~With the advent of Internet sting operations, a fresh ex- amination of the issues is warranted. Part I1 of this article addresses the general principles of at- tempt liability, including a description of the doctrines of factual and legal impossibility and the rationale behind the historical treatment of these defenses. Part I11 describes recent Internet at- tempt cases, and Part IV analyzes issues raised by such cases. This article suggests that the new Internet cases provide further rationale for rejecting a distinction between factual and legal im- possibility that would allow the latter to be a defense. This article also discusses issues surrounding the appropriate mens rea for attempt, and its applicability to Internet cases, where the defen- dants claim ignorance or indifference as to the age of the target of his advances. It suggests that attempt liability is appropriate only where there is proof the defendant believed that he was deal- ing with a child. 2. See, e.g., United States v. Root, 296 F.3d 1222, 1223 (11th Cir. 2002) (charging de- fendant with attempting to persuade and entice a minor to engage in criminal sexual ac- tivity); United States v. Crow, 164 F.3d 229,232 (5th Cir. 1999) (charging defendant with attempted exploitation of a minor); Hatch v. Superior Court, 94 Cal. Rptr. 2d 453, 458 (Cal. Ct. App. 2000) (charging defendant with transmitting harmful matter over the Internet to a child in an attempt to seduce the child). 3. See infra text accompanying notes 99-131. 4. See infra text accompanying notes 211-17. Heinonline -- 38 U. Rich. L. Rev. 478 2003-2004 INTERNET STING OPERATIONS A. The Rationale ofAttempt Liability The crime of attempt exists to punish those who have tried, but failed, to commit a substantive ~ffense.~"[Tlhe main rationale be- hind the [crime of attempt]" is preventative: to stop individuals who are bent on committing a crime by allowing early police in- terventi~n.~Attempt provides a basis of punishment for actors who, by mere fortuity, have not completed a crime, but who are indistinguishable in blameworthiness from those who succeed.' Yet, failure, which is intrinsic to attempt liability, creates the oft- noted apprehension of improper p~nishment.~Without the harm- 5. See generally GEORGEP. FLETCHER,RETHINKING CRIMINAL LAW § 3.3 (1978); WAYNE R. WAVE, CRIMINALLAW 3 6.2 (3d ed. 2000). 6. WAVE, supra note 5, 5 6.2(b), at 538. Other means are available to allow early police intervention. See also State v. Young, 271 A.2d 569,576-81 (N.J. 1970) (upholding a law prohibiting entry into a school building "with the intent of disrupting classes or of oth- erwise interfering with the peace and good order of the placen); LAFAVE, supra note 5, 5 6.2(a), at 537-38. For example, possessory crimes, such as unlawful possession of burglary tools, can allow early intervention. See, e.g., N.Y. PENAL LAW 5 140.35 (Consol. 2000). Similarly, other anticipatory offenses, such as stalking offenses, achieve the same goal. See, e.g., CAL. PENALCODE 646.9 (West 1999 & Supp. 2003). These other means of early intervention are outside the scope of this article. 7. MODEL PENAL CODE art. 5, introductory cmt. (Official Draft and Revised Com- ments 1985); see also LAFAVE,supra note 5,s 6.2(b), at 539. LaFave points out that in cer- tain situations, the person who fails to complete the substantive crime "may present a greater continuing danger" to the public than the person who is successful and therefore must be held liable. WAVE,supra note 5, 6.2(b), at 539. Notwithstanding the rationale behind punishing attempts, typically, jurisdictions hold that blameworthiness differs be- tween a crime of attempt and a completed crime, and therefore a lower penalty is affixed for an attempt crime than for that of a completed crime. See, e.g., N.Y. PENALLAW 5 110.05 (Consol. 1998) (utilizing punishment classification offenses-the sentence for the crime of attempt is one classification below that of the completed crime); CAL. PENAL CODE 664 (West 1999) (stating that the crime of attempt is punished by a sentence of one-half of the maximum sentence authorized for the completed crime). The Model Penal Code departs from this view and provides that the penalty for the crime of attempt may be the same as that of the completed crime. Exceptions are made for capital and first degree felony crimes. In those cases, they are graded as a felony in the second degree. MODEL PENAL CODE 5.05 cmt. 2. 8. Some commentators fear that to allow the government to punish for failures might lead to overreaching on the part of the government. Paul H. Robinson, A Theory of Justifi- cation: Societal Harm as a Prerequisite for Criminal Liability, 23 UCLA L.
Recommended publications
  • Criminal Hiv Transmission Statutes and Covert Online Investigations: a Due Process Analysis
    CRIMINAL HIV TRANSMISSION STATUTES AND COVERT ONLINE INVESTIGATIONS: A DUE PROCESS ANALYSIS Joseph Payne* TABLE OF CONTENTS Introduction .................................. ............... 326 I. History of the Disease-Social, Medical, and Legal Developments ............................................. 328 A. Historical Background of the Disease and Legislative Responses ..................................... ........ 328 1. Political Background of Criminal HIV Transmission Statutes ..................................... ........ 329 2. Current National Landscape of Criminal HIV Transmission Statutes............................. ............... 330 B. Social Consequences of Criminal HIV Transmission Statutes 331 C. Medical Developments Since Criminal HIV Transmission Statutes Were Enacted.................................334 1. Antiretroviral Therapy, Post-exposure Prophylaxis, and Pre- exposure Prophylaxis ............................ ..... 334 2. Continued Risks Associated with Inadequate or Non-existent Treatment ............................................... 336 D. Legal Developments Since Criminal HIV Transmission Statutes Were Enacted ............................. 338 II. Criminal HIV Transmission Statutes in the Age of Online Dating and Undercover Policing.................................. 340 A. Online Dating and Communication ................ ..... 340 B. Policing in the Digital Age...................... ........ 342 * J.D. candidate, class of 2018, Columbia Law School; B.S., B.A. (Hons) 2014, American University. The author would
    [Show full text]
  • Internet Sting Operations and Attempt Liability Audrey Rogers Pace Law School
    University of Richmond Law Review Volume 38 | Issue 2 Article 4 1-2004 New Technology, Old Defenses: Internet Sting Operations and Attempt Liability Audrey Rogers Pace Law School Follow this and additional works at: https://scholarship.richmond.edu/lawreview Part of the Computer Law Commons, Criminal Law Commons, Criminal Procedure Commons, Evidence Commons, and the Internet Law Commons Recommended Citation Audrey Rogers, New Technology, Old Defenses: Internet Sting Operations and Attempt Liability, 38 U. Rich. L. Rev. 477 (2004). Available at: https://scholarship.richmond.edu/lawreview/vol38/iss2/4 This Article is brought to you for free and open access by the Law School Journals at UR Scholarship Repository. It has been accepted for inclusion in University of Richmond Law Review by an authorized editor of UR Scholarship Repository. For more information, please contact [email protected]. NEW TECHNOLOGY, OLD DEFENSES: INTERNET STING OPERATIONS AND ATTEMPT LIABILITY Audrey Rogers * I. INTRODUCTION Internet sting operations to catch adults preying on children have grown as exponentially as the public's use of the Internet. These operations typically involve an adult law enforcement offi- cer posing as a child for Internet contact with a would-be defen- dant.1 Defendants caught in a sting are charged with attempt be- cause by use of the sting operation, law enforcement has * Associate Professor of Law, Pace Law School. B.S., 1977, State University of New York at Albany; J.D., 1980, St. John's University School of Law. Many thanks to Mavis Ronayne and Jill Grinham for their invaluable research assistance. Thanks also to my col- leagues at Pace Law School for their suggestions and comments.
    [Show full text]
  • New Jersey's Adult Internet Luring Statute
    NEW JERSEY’S ADULT INTERNET LURING STATUTE: AN APPROPRIATE NEXT STEP? 1 JOHN W. LOMAS, JR. ABSTRACT New Jersey recently enacted legislation prohibiting the use of the Internet to lure or entice someone to a location with the purpose of committing a crime with or against that person or some other person. Most states have similar laws pertaining to pedophiles, but this is the first adult Internet luring statute. State measures to regulate the Internet, even in the context of criminal justice, will likely face constitutional challenge since the Internet has become such a critical vehicle for both protected speech and interstate commerce. Furthermore, while the use of the Internet in the commission of crimes against other persons is a new phenomenon, it is unclear whether new laws are the best solution, or whether other responses such as equipping police and investigators with more resources and training to properly enforce existing law would be more effective. This iBrief analyzes the issues New Jersey will face with its statute and the issues other states should be aware of when considering similar legislation. INTRODUCTION ¶1 Public service announcements on the radio, crime drama television shows, stories from the local news – the Internet predator threat to children has been thoroughly publicized through these and many other types of media.2 Responding to this threat, many states have enacted laws prohibiting the use of the Internet to communicate with children in a sexual manner.3 Many of these laws prohibit luring or enticing children via the 1 J.D. Candidate, 2006, Duke University School of Law; M.P.P.
    [Show full text]
  • Aardweg,Gerard J
    TERMINOLOGIA PSICOLOGIA - BRASIL AARDWEG,GERARD J. M. VAN DEN ABANDONO DA PSICOTERAPIA USE Desistencia do tratamento ABANDONO DA TERAPIA USE Desistencia do tratamento ABANDONO DO TRATAMENTO USE Desistencia do tratamento ABELHAS BT Insetos Esp.: ABEJAS Ing.: BEES ABLACAO USE Lesoes ABLACAO CEREBRAL USE Lesoes cerebrais ABORDAGEM DE TRATAMENTO INTERDISCIPLINAR SN Combinacao de duas ou mais disciplinas na prevencao, diagnostico, tratamento ou reabilitacao de disturbios fisicos ou mentais. UF Abordagem de tratamento multidisciplinar BT Tratamento RT Pesquisa interdisciplinar RT Psicologia da saude RT Terapia multimodal Esp.: ABORDAJE DE TRATAMIENTO MULTIDISCIPLINARIO Ing.: INTERDISCIPLINARY TREATMENT APPROACH ABORDAGEM DE TRATAMENTO MULTIDISCIPLINAR USE Abordagem de tratamento interdisciplinar ABORDAGEM DE TRATAMENTO MULTIMODAL USE Terapia multimodal ABORDAGEM DE TRATAMENTO MULTIMODAL SN Uso de diferentes tecnicas terapeuticas baseadas nos principios teoricos extraidos de uma especialidade ou de uma disciplina medica ou psicologica. Compare com ABORDAGEM DE TRATAMENTO INTERDISCIPLINAR. USE Terapia multimodal ABORTO UF Aborto espontaneo UF Aborto induzido UF Aborto provocado BT Cirurgia RT Controle da natalidade RT Planejamento familiar Esp.: ABORTO Ing.: ABORTION ABORTO ESPONTANEO USE Aborto ABORTO INDUZIDO USE Aborto ABORTO PROVOCADO USE Aborto ABRAHAM, KARL, 1877-1925 ABRAHAM, NICOLAS, 1919-1975 ABREVIATURAS E SIGLAS Esp.: ABREVIATURAS Y ACRONIMOS Ing.: ABBREVIATIONS. ACRONYMS ABREVIATURAS E SIGLAS - DICIONARIOS Esp.: ABREVIATURAS Y ACRONIMOS - DICCIONARIOS Ing.: ABBREVIATIONS. ACRONYMS - DICIONARIES ABRIGOS Esp.: ABRIGOS Ing.: SHELTERS ABSTRACAO SN Processo que consiste em selecionar ou isolar um determinado aspecto conceitual a partir de um todo concreto. BT Pensamento NT Imagem RT Pensamento divergente Esp.: ABSTRACCION Ing.: ABSTRACTION ABUSO DA CRIANCA SN Abuso de criancas ou adolescentes em ambiente familiar, institucional ou qualquer outro ambiente.
    [Show full text]
  • Sexual Offenders Contacting Children Online: an Examination of Transcripts of Sexual Grooming
    Journal of Sexual Aggression An international, interdisciplinary forum for research, theory and practice ISSN: 1355-2600 (Print) 1742-6545 (Online) Journal homepage: http://www.tandfonline.com/loi/tjsa20 Sexual offenders contacting children online: an examination of transcripts of sexual grooming Georgia M. Winters, Leah E. Kaylor & Elizabeth L. Jeglic To cite this article: Georgia M. Winters, Leah E. Kaylor & Elizabeth L. Jeglic (2017) Sexual offenders contacting children online: an examination of transcripts of sexual grooming, Journal of Sexual Aggression, 23:1, 62-76, DOI: 10.1080/13552600.2016.1271146 To link to this article: https://doi.org/10.1080/13552600.2016.1271146 Published online: 16 Jan 2017. Submit your article to this journal Article views: 1054 View Crossmark data Citing articles: 6 View citing articles Full Terms & Conditions of access and use can be found at http://www.tandfonline.com/action/journalInformation?journalCode=tjsa20 JOURNAL OF SEXUAL AGGRESSION, 2017 VOL. 23, NO. 1, 62–76 http://dx.doi.org/10.1080/13552600.2016.1271146 Sexual offenders contacting children online: an examination of transcripts of sexual grooming Georgia M. Wintersa,b, Leah E. Kaylorb,c and Elizabeth L. Jeglicb aThe Graduate Center, City University of New York, New York, NY, USA; bPsychology Department, John Jay College of Criminal Justice, New York, NY, USA; cDepartment of Psychology, Saint Louis University, Saint Louis, MO, USA ABSTRACT ARTICLE HISTORY The present study investigated transcripts of adults sexually grooming Received 25 January 2016 decoy victims on the Internet. One hundred transcripts were coded for Revised 3 December 2016 offender characteristics, victim characteristics, and dynamics of the Accepted 6 December 2016 conversation.
    [Show full text]
  • CHAPTER 4 CHAPTER 5 Internet Sex Offending and the Online Sting
    CHAPTER 45 Internet Sex Offending and the Online Sting Richard G. Wright One of the most diffi cult struggles in American society is maintaining a constant balance between individual privacy and public safety. In our democratic, diverse, pluralistic society, we have the freedom to think our own thoughts, practice our beliefs, and ponder about various possibilities. The problem arises when our thoughts and beliefs encourage behaviors that fl irt with criminality. In this clash, we turn to our policy makers to enact criminal laws that are supposed to refl ect a moral consensus. In the 21st century, much of American life has moved online. Parts of our fi nances, higher education, health information, and social circles have moved online. Naturally, for many people, part of their online persona includes their sexuality. From seeking information about safe sex, pregnancy, infertility, and healthy sexual practices, as well as fetishes and support groups, people use the Internet to explore (and in some cases extend) their sexuality. This can lead to a confl ict between one’s online sexual desires and one’s private sexual practices. This chapter analyzes numerous issues with Internet sex stings (ISS). ISS are tools used by the law enforcement to arrest adults who are interested in having sex with minors. Despite the seemingly simplistic intent of ISS (to arrest online predators before they assault a child), this practice is quite complex. There are those who use the Internet for deviant sexual purposes. Some of these men and women go online with the intent to solicit a minor for an in-person sexual assault (also known as contact offending).
    [Show full text]
  • Analysis of the Special Investigative Counsel Report and the Crimes of Gerald A
    Analysis of the Special Investigative Counsel Report and the Crimes of Gerald A. Sandusky & Education Guide to the Identification and Prevention of Child Sexual Victimization James T. Clemente February 2013 TABLE OF CONTENTS I. The SIC Mandate and Conclusions................................................................................. 6 II. How the SIC Got It Wrong .............................................................................................. 6 III. Behavioral Dynamics of Acquaintance Child Sex Offenders ....................................... 7 A. Preferential Child Sex Offenders............................................................................ 8 B. “Nice-Guy” Acquaintance Offenders..................................................................... 8 C. Grooming ................................................................................................................ 9 D. Compliant Victimization......................................................................................... 9 E. “Conspiracy of Silence” Surrounding Child Sexual Victimization...................... 10 F. How Offenders Use These Complicated Dynamics to Their Advantage ............. 11 G. The Case of Richard Taus..................................................................................... 14 IV. Analysis of the SIC Findings.......................................................................................... 15 A. Analysis of 1998 Incident ....................................................................................
    [Show full text]
  • Perspectives
    California Coalition on Sexual Offending (CCOSO) Quarterly Newsletter Perspectives Winter 2014 / 2015 What is Internet Sex Offenders—Horse of a Different Color CCOSO? Elaine Brady, Ph.D., MFT, CAS, CSAT-S CCOSO is a recognized leader in providing expertise, The Internet has spawned a growing have acted upon if it had not been for the training, education, phenomenon of “virtual” and “pseudo” Internet, resulting in what came to be and legislative pedophiles that do not match the known as the “fantasy guidance in traditional or “classic” pedophile profile defense” (Yamagami, 2000). These cases treatment, (e.g., they had no prior history of appear to suggest that successful forensic management and psychiatric issues, criminal behavior or evaluation of Internet Sex Offenders research related to sexual interest in minors). Alarmingly, (ISO’s) may hinge on one’s ability to sexual offending. the FBI reported a 2,000% increase in the understand the addictive qualities of the CCOSO and its number of cases involving sex crimes Internet and on one’s ability to explain chapters strengthen against children as a result of online how that addictive process inexorably local and statewide contact (e.g. Internet Sex Offenders - draws some individuals into illicit agencies and ISOs) between the years 1996 to 2007 behavior. professionals to (Department of Commerce and Justice, enhance community 2012), years corresponding to the rapid Young (2000, 2004) first introduced the safety. “penetration” of computers and the term virtual pedophiles and offered a Internet into American households (U.S. model for differential diagnosis between Census Bureau, 2014). this group and classic pedophiles.
    [Show full text]
  • Conspiracy and the Fantasy Defense: the Strange Case of the Cannibal Cop
    EK IN PRINTER FINAL (DO NOT DELETE) 1/26/2015 8:11 PM Notes CONSPIRACY AND THE FANTASY DEFENSE: THE STRANGE CASE OF THE CANNIBAL COP KAITLIN EK† ABSTRACT In the notorious “Cannibal Cop” case, New York police officer Gilberto Valle was accused of conspiring to kidnap, kill, and eat various women of his acquaintance. Valle claimed a “fantasy defense,” arguing that his expression represented not conspiracy agreement, but fantasy role-play. His conviction and subsequent acquittal raised questions about the freedom of speech, thoughtcrime, and the nature of conspiracy law. Because the essence of conspiracy is agreement, it falls into the category of crimes in which pure speech is the actus reus of the offense. This Note argues that as a result, conspiracy cases in which the fantasy defense is implicated pose special due-process and First Amendment dangers, and concludes that these dangers can be mitigated by a strengthened overt-act requirement. INTRODUCTION “Gil Valle’s fantasy is about seeing women executed. The fantasies that he is engaging in are about seeing women sexually assaulted, executed and left for dead. That’s not a fantasy that is OK.” – Randall W. Jackson, Assistant United States Attorney, in closing argument.1 The headlines sound like something out of a schlocky slasher flick: “‘Cannibal’ Cop Plotted to Eat 100 Women: Feds,”2 “NYPD Copyright © 2015 Kaitlin Ek. † Duke University School of Law, J.D. expected 2015; University of Nebraska, B.A. 2011. Many thanks to Professor Lisa Griffin for her invaluable advice and support. Thanks also to the staff of the Duke Law Journal for their thoughtful comments and editing.
    [Show full text]
  • Internet Pornography and Child Exploitation
    Internet Pornography and Child Exploitation In This Issue November Introduction.................................................... 1 2006 By Drew Oosterbaan Volume 54 Number 7 Federal Jurisdiction in Child Pornography Cases. .................... 3 By Alexandra Gelber United States Department of Justice Establishing Federal Jurisdiction in Child Prostitution and Sex Tourism Executive Office for United States Attorneys Cases.......................................................... 8 Washington, DC 20530 By Wendy Waldron and Alexandra Gelber Michael A. Battle Director Ensuring Convictions Through Successful Search Warrants........... 1 9 Contributors' opinions and By Sherri A. Stephan statements should not be considered an endorsement by How Computer Forensics can Dramatically Improve a Case........... 2 4 EOUSA for any policy, program, or service. By Steven J. Grocki and Lam D. Nguyen The United States Attorneys' Bulletin is published pursuant to Obtaining Foreign Evidence in Child Sex Tourism Cases.............. 3 0 28 CFR § 0.22(b). By Wendy Waldron and Michael I. Yoon The United States Attorneys' Bulletin is published bimonthly by the Executive Office for United Providing Victim-Centered Services to Prostituted Youth.............. 3 7 States Attorneys, Office of Legal By Myesha K. Braden Education, 1620 Pendleton Street, Columbia, South Carolina 29201. Helping Child Victims and Witnesses Present Effective Testimony...... 4 2 Managing Editor By Kayla Bakshi and Darcy Katzin Jim Donovan Program Manager Prosecuting Obscene Representations of the Sexual Abuse of Children.. 4 9 Nancy Bowman By Sara E. Flannery and Damon A. King Law Clerk Kevin Hardy Internet Address www.usdoj.gov/usao/ reading_room/foiamanuals. html Send article submissions and address changes to Program Manager, United States Attorneys' Bulletin, National Advocacy Center, Office of Legal Education, 1620 Pendleton Street, Columbia, SC 29201.
    [Show full text]
  • Advance Sheets Court of Appeals
    263 N.C. App.—No. 1 Pages 1-413 263 N.C. App.—No. 1 ADVANCE SHEETS OF CASES ARGUED AND DETERMINED IN THE COURT OF APPEALS OF Pages 1-413 NORTH CAROLINA JUNE 30, 2020 MAILING ADDRESS: The Judicial Department P. O. Box 2170, Raleigh, N. C. 27602-2170 COMMERCIAL PRINTING COMPANY PRINTERS TO THE SUPREME COURT AND THE COURT OF APPEALS THE COURT OF APPEALS OF NORTH CAROLINA Chief Judge LINDA M. McGEE Judges WANDA G. BRYANT PHIL BERGER, JR. DONNA S. STROUD HUNTER MURPHY CHRIS DILLON JOHN S. ARROWOOD RICHARD D. DIETZ ALLEGRA K. COLLINS JOHN M. TYSON TOBIAS S. HAMPSON LUCY INMAN REUBEN F. YOUNG VALERIE J. ZACHARY CHRISTOPHER BROOK Former Chief Judges GERALD ARNOLD SIDNEY S. EAGLES, JR. JOHN C. MARTIN Former Judges WILLIAM E. GRAHAM, JR. PATRICIA TIMMONS-GOODSON J. PHIL CARLTON ROBIN E. HUDSON BURLEY B. MITCHELL. JR. ERIC L. LEVINSON WILLIS P. WHICHARD JAMES A. WYNN, JR. CHARLES L. BECTON BARBARA A. JACKSON ALLYSON K. DUNCAN CHERI BEASLEY SARAH PARKER CRESSIE H. THIGPEN, JR. ELIZABETH G. McCRODDEN ROBERT C. HUNTER ROBERT F. ORR LISA C. BELL JACK COZORT SAMUEL J. ERVIN, IV MARK D. MARTIN SANFORD L. STEELMAN, JR. JOHN B. LEWIS, JR. MARTHA GEER CLARENCE E. HORTON, JR. LINDA STEPHENS JOSEPH R. JOHN, SR. J. DOUGLAS McCULLOUGH ROBERT H. EDMUNDS, JR. WENDY M. ENOCHS JAMES C. FULLER ANN MARIE CALABRIA K. EDWARD GREENE RICHARD A. ELMORE RALPH A. WALKER MARK A. DAVIS ALBERT S. THOMAS, JR. ROBERT N. HUNTER, JR. LORETTA COPELAND BIGGS ALAN Z. THORNBURG Clerk DANIEL M. HORNE, JR.
    [Show full text]
  • Child Molesters: a Behavioral Analysis for Professionals Investigating the Sexual Exploitation of Children
    Child Molesters: A Behavioral Analysis For Professionals Investigating the Sexual Exploitation of Children In cooperation with the Child Molesters: A Behavioral Analysis For Professionals Investigating the Sexual Exploitation of Children Fifth Edition 2010 Kenneth V. Lanning Former Supervisory Special Agent Federal Bureau of Investigation (FBI) Copyright © 2010 National Center for Missing & Exploited Children®. All rights reserved. This manual is provided for informational purposes only and does not constitute legal advice or professional opinion on specific facts. Information provided in this manual may not remain current or accurate, so recipients should use this manual only as a starting point for their own independent research and analysis. If legal advice or other expert assistance is required, the services of a competent professional should be sought. This project was supported by Grant No. 2010-MC-CX-K001 awarded by the Office of Juvenile Justice and Delinquency Prevention, Office of Justice Programs, U.S. Department of Justice. Points of view or opinions in this document are those of the author and do not necessarily represent the official position or policies of the U.S. Department of Justice. National Center for Missing & Exploited Children®, 1-800-THE-LOST®, Child Victim Identification Program®, and CyberTipline® are registered trademarks of the National Center for Missing & Exploited Children. Dedication This publication is dedicated to child victims of sexual exploitation and the organization that allowed me to devote most of my 30-year career as a Special Agent to fighting “crimes against children.” To the Federal Bureau of Investigation I also dedicate this publication to my wife and children, without whose support for all these years I could not have maintained my objectivity and balance.
    [Show full text]