Professional Documents
Culture Documents
Chapter 5
Criminal Law and Cybercrimes
I. Key Terms
A crime is an offense against the public at large. As such, a crime threatens the peace,
safety, and well-being of the entire community. For this reason, crimes are punishable by
the official governing body of a nation or state. A felony is a crime punishable by death
or imprisonment in a federal or a state prison for a term exceeding one year. Some
felonies are also punishable by fines. A misdemeanor is a less serious crime that is
generally punishable by a prison sentence of not more than one year.
The two elements necessary to create criminal liability are (a) an act and (b) the requisite
state of mind. Generally speaking, a crime cannot be committed unless the criminal act
named in the statute is performed with the requisite state of mind. Many state criminal
codes include four possible states of mind: (a) purpose, (b) knowledge, (c) recklessness,
and (d) negligence. Establishing motive may help investigators pinpoint the guilty party,
but proving an evil motive is not necessary for a criminal conviction. Conversely, estab-
lishing the existence of a good motive will rarely absolve a defendant of criminal
liability.
5-3 Specific Crimes
Crimes against people include but are not limited to first-degree murder, second-degree
murder, manslaughter, battery, and assault. A more recent addition to this list involves
hate speech. Crimes against property include but are not limited to burglary; breaking and
entering; trespass; aggravated arson; arson; aggravated robbery; robbery; theft, fraud, and
related offenses. Crimes involving business include embezzlement, forgery, criminal
simulation, passing bad checks, and defrauding creditors. RICO offenses also involve
business crime. Crimes against justice include bribery, theft in office, and dereliction of
duty. Others, such as intimidation, are committed against a public official or public
servant. Still others, such as obstruction of justice, resisting arrest, perjury, and tampering
with evidence are committed against the justice system itself.
5-4 Cybercrimes
Because criminal liability relies on the two essential elements of act and requisite mental
state, a logical defense aims at eliminating one or both of those elements. Most defenses
attempt to do just that. The most common defenses are insanity, entrapment, justifiable
force, and mistake
IV. Outline
c. Congress has extended its power to include police power through the Commerce
Clause of the U.S. Constitution.
d.
C. Classes of Crimes
1. A felony is generally defined as a crime punishable by death or imprisonment in a
federal or a state prison for a term exceeding one year.
2. Some felonies are also punishable by fines.
3. A misdemeanor is a less serious crime generally punishable by a prison sentence of
not more than one year.
4. Some states have specific categories for the least serious offenses commonly called
petty offenses or minor misdemeanors.
II. Elements of a Crime (5-2)
A. A Criminal Act
1. Under American law, crime cannot be committed unless some overt act has occurred.
2. Courts strike down convictions based on laws that are ambiguous, vague, or overly
broad.
3. A failure to act may be considered criminal, but generally the failure to act must be
coupled with a legally imposed duty in order for criminal liability to attach.
4. Many states specifically exclude involuntary movement and behavior from the
general definition of a criminal act.
5. Involuntary behavior may not absolve a person from criminal liability if, for example,
a person was aware of a propensity for such behavior but took no steps to control it.
B. The Required State of Mind
1. A specified state of mind is usually required for a finding of criminal activity.
2. Many state criminal codes recognize purpose, recklessness, knowledge, and
negligence as states of mind supporting criminal activity.
3. Individuals act with purpose when they act with the intent to cause the result that does
in fact occur.
4. Individuals act with knowledge when they act with an awareness that a particular
result will probably occur.
5. People act recklessly when they disregard known risks of negative consequences.
6. People act with negligence when they fail to see the possible negative consequences
of their actions.
C. The Matter of Motive
1. Motive is the wrongdoer‘s reason for committing a crime.
2. Motive is not necessary for a criminal conviction.
D. The Matter of Corporate Liability
1. Corporate liability requires that the prosecutor prove that the defendant possessed a
particular mental state which can create a problem when corporations are involved.
2. The law has established that corporations are ―legal people.‖
3. An early theory on corporate criminal liability emerged from within the doctrine of
strict liability.
4. Courts began to hold corporations liable for criminal acts of employees under the
theory of respondeat superior.
5. The doctrine of respondeat superior has been extended to the point that even if a
worker is prohibited from violating the law, the corporation might still be declared
liable for the worker‘s crime.
6. Under the Model Penal Code, a corporation might be held criminally liable if the
corporate officers or directors authorize, approve, or recklessly tolerate the criminal
action of employees acting on the job when the crimes occur.
E. The Matter of Punishment
1. One approach to sentencing involves protecting the public at large.
a. Consequences of crime send a message to potential offenders as well as the
offender.
b. Techniques include deterrence, education, and retribution.
2. Another approach to punishment involves sentencing tailored to fit the individual
offense or the individual offender.
a. Consequences created to fit a particular offense or to punish a specific offender
are designed to prevent further criminal activity by an individual offender.
b. Techniques include prevention, restraint, and rehabilitation.
3. The death penalty in criminal cases is subject to controls designed to limit its
imposition to cases in which the criminal defendant truly deserves death including
safeguards in the form of aggravating and mitigating circumstances.
4. The appellate court that reviews application of the death penalty is required to
evaluate the conduct of the sentencing judge for partiality, impropriety, or outside
pressure.
5. Normally, the governor of a state has the power to commune a death sentence.
III. Specific Crimes (5-3)
A. Crimes Against People
1. Any killing of one human by another may be labeled as a homicide.
a. Criminal homicide is either murder or manslaughter.
b. When unlawful killing is done with premeditations and deliberate intent, it is
labeled first-degree murder, aggravated murder, or premeditated murder.
c. Most states define first degree murder to include killing with premeditation and
killing while committing a major crime such as rape, robbery, or kidnapping; and
several other jurisdictions add other circumstances.
d. If conditions for first degree murder do not apply, the crime is known as second-
degree murder or murder.
e. In many jurisdictions the death penalty may be imposed for first-degree murder,
but not for second-degree murder.
f. Manslaughter is an unlawful killing of a person without the intent to kill and may
be classified as voluntary manslaughter when a person has lost the ability to
reason or involuntary manslaughter when the killing results from negligence.
2. Battery and assault are other crimes against people.
a. Historically, the term ―battery‖ described a crime causing physical harm to the
victim, and ―assault‖ included the threat of harm.
b. Historical distinctions are no longer applicable in many jurisdictions.
c. Some states have altered or added offenses in this category, and checking criminal
code in applicable jurisdictions is advisable.
3. Hate Speech
a. Statutes have attempted to criminalize hate speech involving the use of certain
symbols, writings, and speech intended to provoke outrage or fear on the basis of
race, religion, color, or gender.
b. Such statutes are constitutional only if they are not content specific.
B. Crimes Against Property
1. The crime of burglary has evolved since the Middle Ages definition of an unlawful
entry into a dwelling place at night.
a. Modern legislatures define burglary as including using force, deceit, or cunning to
trespass into an occupied structure with the intent to commit a crime.
b. A more serious form of burglary is aggravated burglary involving, for example,
the use of a deadly weapon.
c. A related offense to burglary is breaking and entering which involves illegally
gaining entry to unoccupied structures or trespassing on land with the intent to
commit theft or a felony.
d. Another related offense to burglary is trespass which involves knowingly entering
land without permission.
2. The crime of arson had been expanded by legislatures to include aggravated arson.
a. Aggravated arson includes using fire or explosives to create a substantial risk of
physical harm to an individual or to an occupied building and may include hiring
another person to do so.
b. A lesser offense is ordinary arson involving using fire or explosives to cause harm
or a substantial risk of harm to the property of another or to the offender‘s own
property and includes hiring another to do so.
3. Aggravated robbery and robbery are other forms of crimes against property.
a. Aggravated robbery involves attempting to commit or actually committing a theft
using a deadly weapon or dangerous ordnance, or doing the same by inflicting
physical harm on the victim.
b. In ordinary robbery, the offender does not use or show a weapon.
c. Ordinary robbery may also involve attempting to commit or committing a theft by
inflicting or attempting to inflict physical harm on a third party.
4. Many jurisdictions place theft, fraud, and related offenses together under a single
heading.
a. These offenses have in common the attempt to separate the rightful owner of
property from that property or to profit from that separation once it has taken
place.
b. Theft is often defined as knowingly raking or obtaining control over the property
of another without that individual‘s consent using deceit, threats, or coercion.
c. Fraud involves a deliberately engineered deception that the offender uses to
obtain property or services belonging to another.
C. Crimes Involving Business
1. Embezzlement is defined as wrongfully taking property or funds that have been
entrusted to the care of the offender.
2. Forgery involves the making or changing of a writing (without proper authorization)
with the intent to defraud.
3. Criminal simulation involves altering or falsifying, for example, art objects, antiques,
photographs with the intent to defraud.
4. Passing bad checks includes issuing or transferring a check or other negotiable
instrument with the intent to defraud knowing it will be dishonored.
5. The crime of defrauding creditors involves removing, hiding, or destroying, for
example, any person‘s property with the intent to defraud creditors; or hiding or
refusing to disclose information about the existence or location of a person‘s property
to a fiduciary appointed to administer that person‘s affairs or estate.
6. To prevent a criminal invasion of legitimate businesses, Congress passed the
Racketeer Influenced and Corrupt Organizations Act.
a. Conducting a legitimate business with the funds acquired from a pattern of
racketeering activities can give rise to criminal liability under the act.
b. Violation can give rise to criminal charges and also civil liability.
D. Crimes Against Justice
1. Crimes against justice involve offenses committed by or with the cooperation of a
public servant or a public official.
2. In most states, bribery involves offering, promising, or actually giving something of
value to a public official with the goal of influencing that official in the discharge of
his or her public duties.
3. It is also bribery when the public official solicits or accepts a thing of value in
exchange for that public official‘s influence in whatever capacity.
4. Many states have further expanded the crime of bribery to include witnesses who are
offered or given something of value in exchange for their testimony.
5. Most jurisdictions define theft in office to include any theft offense in the criminal
code that is committed by a public official or a party official involving the use of that
official‘s governmental or party power to obtain unlawful control over governmental
or party property or services.
6. In relation to law enforcement officers, dereliction of duty is any activity that
involves the officer‘s failure to carry out his or her lawful duties.
7. Public servants are charged with carrying out those duties that are specifically related
to the proper operation of their governmental office, and many dereliction of duty
statutes also expressly state that public servants have an affirmative duty to keep their
department or agency within the budget set for it by the state legislature.
8. While it has not passed and consideration has been postponed, The Stop Online
Piracy Act (SOPA)was designed to attack foreign cyber-pirates by, for example,
penalizing American websites carrying pirated works and servicing cyber-pirates with
payment processors and advertisements.
E. The Global Cyber-crisis
1. The U.S. government, U.S. corporations, and the U.S. military have become
increasingly aware of both the power and the vulnerability of the Internet.
2. One step to deal with dangers might be to split up data and send it along a series of
different routes so that, if one data stream is compromised, the others continue on
their way unimpeded; but this does not always work.
3. The federal government has responded to threats in a number of ways such as by
established a new cyber-command center, officially referred to as Cyber Command or
Cybercom, which is charged with the job of protecting the military‘s computer
command system.
4. On the home front, the federal government ahs taken steps to combat domestic
cybercrime by establishing the Internet Crime Complaint Center which handles
complaints involving cybercrimes such as hacking, trade secret infringement, identity
theft, cyber-extortion and Internet fraud.
5. The battle against cyber abuse can also be fought in the home.
V. Defenses to Criminal Liability (5-5)
A. The Insanity Defense
1. Competency to Stand Trial
a. Generally, defendants are considered competent to stand trial if they understand
the nature and the purpose of the charges against them, and if they are capable of
aiding their attorneys in their defense.
b. If defendants are found to be incompetent, they are usually given treatment to
improve their competency so that they can assist in their case.
2. Not Guilty by Reason of Insanity (NGRI)
a. Under the M‘Naughten Rule, a defendant can be found NGRI if the defendant
was suffering from a mental disease that was so serious that the defendant did not
know the nature of the act or did not know that the act was wrong at the time the
criminal act was committed.
b. Under the irresistible impulse test, a defendant can be found NGRI if the
defendant was stricken with a mental disease which prevented the defendant from
knowing right from wrong or compelled the defendant to commit the crime.
c. Under the American Law Institute test, a person is not responsible if ―as a result
of mental disease or defect he lacks substantial capacity either to appreciate the
criminality of his conduct or to conform his conduct to the requirements of law.‖
d. People found not guilty by reason of insanity are committed to institutions and
must undergo periodic psychiatric examinations.
B. Entrapment
1. If a law enforcement officer induces a law-abiding citizen to commit a crime,
entrapment may be used as a defense.
2. The person using the defense must show that the crime would not have been
committed had it not been for the inducement of the officer.
C. Justifiable Force
1. Self-Defense
a. In order to rely on the defense of self-defense, the defendant must first have a
bona fide belief that his or her life was in danger or that severe bodily harm was a
danger.
b. Words by themselves, in most states, are insufficient to prove the requisite belief.
c. When self-defense is used in a criminal case, the defendant must show that he or
she did not start the altercation
d. The person claiming self-defense must not have used more force than necessary.
e. In some states, the person claiming self-defense must retreat if possible.
f. A person does not have a duty to retreat if the attack occurs in his or her own
home, and, in many states, this exception has been extended to a person‘s vehicle.
2. Defense of Others
a. If a person uses force to rescue another person who is the victim of an apparent
attack, most states allow a defense known as the defense of others.
b. The rescuer must have had good reason to believe that the victim was in danger of
severe bodily injury or death.
3. Stand-Your-Ground Laws
a. Some states have statutory provisions and some have common law traditions
allowing for the stand-your-ground defense.
b. A stand-your-ground statute extends self-defense by eliminating any requirement
to retreat, even outside one‘s home or vehicle.
4. Battered Spouse Syndrome
a. Protective orders bar an abusing spouse from maintaining any contact with the
victim, but sometimes the orders do not work.
b. The set of circumstances that leads a woman to believe that using force against a
spouse is called battered spouse syndrome.
c. Battered spouse syndrome is considered a form of self-defense in some courts.
D. Mistake
1. Mistake is a defense to charges of criminal liability as long as the mistake destroys
one of the elements necessary to the crime at issue.
2. Mistake must be based on a reasonable belief.
3. Arguing lack of knowledge that particular conduct was proscribed by law is not a
defense.
4. Mistake must destroy the criminal nature of the act in the mind of the accused.
V. Background Information
A. Cross-Cultural Notes
1. Under some conditions, Australia allows a good behavior bond. It is discussed at the
following site from the Legal Services Commission of South Australia:
http://www.lsc.sa.gov.au/dsh/ch10s11.php
2. An interesting article titled ―How Saudi Arabia‘s Harsh Legal Punishments Compare
to the Islamic State‘s,‖ is available from The Washington Post at
https://www.washingtonpost.com/news/worldviews/wp/2015/01/21/how-saudi-
arabias-harsh-legal-punishments-compare-to-the-islamic-states/.
3. The Foreign Corrupt Practices Act prohibits bribery of foreign government officials
to assist in obtaining or retaining business. There are some exceptions, but these are
confusing. The United States Department of Justice discusses the act at
http://www.justice.gov/criminal-fraud/foreign-corrupt-practices-act.
5. Bribery is part of nearly every culture and there is a word for it in most languages.
The following is a list of some of the words for bribery in other countries: Egypt—
baksheesh, France—pot au vin, Honduras—pajada, Indonesia—uong sogok, Iran—
roshveh, Mexico—mordida, Nigeria—dash, Peru—coima.
6. A British judge was about to sentence a man found guilty of forgery. When the man
asked to say a few words, the judge gave permission and the prisoner said, ―It is
absurd that I am guilty of forgery, my lord. I cannot even sign my own name.‖ The
judge replied, ―That may well be, but you are not charged with signing your own
name.‖
B. Historical Notes
1. There have been a number of controversial cases in the United States involving the
insanity defense. One of the first examples to spur national debate was in the trial of
John W. Hinckley, Jr., who had tried to assassinate President Ronald Reagan in
1981.
C. State Variations
1. Differing state standards in regard to the insanity defense are available at the
FindLaw website at http://criminal.findlaw.com/criminal-procedure/the-insanity-
defense-among-the-states.html.
D. Quotations
1. Laws too gentle are seldom obeyed; too severe, seldom executed.
2. It may be true that the law cannot make a man love me, but it can keep him from
lynching me, and I think that‘s pretty important.
VI. Terms
1. The term outlaw dates back to Anglo-Saxon times when it was used to refer to criminals
who were stripped of their privileges of citizenship and deprived of all protection by the
law. An outlaw‘s property was given to the king and no matter what injury the outlaw
might suffer, he or she had no legal redress. Mobs often made a sport of catching and
killing outlaws, so an outlaw usually fled from civilization, often into desolate forests to
join other outlaws. Some bands of outlaws became professional robbers to survive.
Because of the violence and crime credited to outlaws, the term has come to stand for any
criminal not yet detained by authorities.
2. The word capital derives from Latin, meaning head. Capital crimes in British law were
usually crimes for which the criminal had his or her head chopped off. The first recorded
use of the word capital appeared in a 1493 document: ―To have capytal sentence & be
beheaded.‖ The term capital punishment was used about a century later in a declaration
that commoners sentenced to death would be hanged, and nobles sentenced to death
would have their heads chopped off.
3. Homicide, suicide, and infanticide all employ the suffix -cide, from the Latin verb
caedere, meaning ―to cut, strike, or kill.‖
4. Most large buildings during the Middle Ages were fortified with moats and iron bars to
protect inhabitants from thieves. The word burglar comes from the Latin burgus, meaning
fortified place, and latro, meaning thief.
5. Help students learn the meaning of the word premeditate by dividing it into its prefix and
root: Pre- means ―to precede‖ and ―meditate‖ is another word for ―thinking.‖
1. Fain had fallen asleep in the public room of a hotel. When a porter tried to wake him and
send him to his room, Fain refused. The porter continued to try to awaken Fain, who then
stood up and drew a gun, and fired it three times at the porter, injuring him. In Fain v.
Commonwealth, 78 KY 183 (Ky. 1879), an appellate court remanded the case when
presented with evidence that the defendant was a sleepwalker and capable of appearing to
be awake when he was actually asleep and unaware of his actions.
2. The American Bar Association has a section devoted to criminal justice. Information on
the section can be found at http://www.americanbar.org/groups/criminal_justice.html.
3. Information on indigent defense is available through searching the Web site of the
American Bar Association at http://www.americanbar.org/aba.html.
4. The Federal Bureau of Prisons has a web site at http://www.bop.gov/. Searches can be
done for inmates and facilities. At http://www.bop.gov/locations/list.jsp information
regarding specific institutions can be obtained. Another interesting page involving
services provided to female inmates is at
http://www.bop.gov/inmates/custody_and_care/female_offenders.jsp.
7. Corrections Corporation of America is a privately run prison system. It has a web site at
http://www.cca.com/. An interesting issue for discussion is whether a privately run
prison system is better and more economical than a system operated by government
employees.
8. Additional information regarding the Commerce Clause can be found on the Web site
Legal Information Institute of the Cornell University Law School at
http://www.law.cornell.edu/wex/Commerce_Clause.
10. Information regarding electronic crimes task forces of the U.S. Secret Service can be
found at http://www.secretservice.gov/ectf.shtml.
11. The National Center for Victims of Crime has extensive information regarding electronic
stalking at https://www.victimsofcrime.org/our-programs/stalking-resource-center.
12. Ask students for examples of when they have been confronted with electronic phishing.
The Federal Trade Commission has an article on ―How Not to Get Hooked by a
‗Phishing‖ Scam‖ at http://www.ftc.gov/bcp/edu/pubs/consumer/alerts/alt127.shtm. The
agency also has information on identity theft, along with a video, at
http://www.ftc.gov/bcp/edu/microsites/idtheft/. The U.S. Department of Justice provides
information on identity theft at
http://www.justice.gov/criminal/fraud/websites/idtheft.html. An identity theft quiz is
available at http://www.justice.gov/criminal/fraud/websites/idquiz.html.
13. Extensive information regarding efforts to prevent cyber crime is available from the
Federal Bureau of Investigation at http://www.fbi.gov/about-us/investigate/cyber.
14. For a better understanding of legal terminology, refer students to Legal Terminology, 4th
edition by Gordon W. Brown (Upper Saddle River, NJ: Prentice Hall, 2004).
15. Assign a research paper on crimes involving families. Each student should choose a
specific topic, such as battering, child abuse, kidnapping, spouse rape, or elder abuse.
Students should investigate the psychological profile of typical abusers and theories
about what motivates such crimes and how they can be prevented. Have students also
examine the legal recourse that family members have in situations of abuse.
16. Help students understand the concept of self-defense by holding a mock trial. Think of a
scenario or ask a group of students to create one whereby self-defense could be argued in
a court of law. Write the scenario on a sheet of paper and hand out copies to the entire
class. Ask for volunteers to play the various roles, including witnesses, judge, bailiff,
prosecutor, defense attorney, defendant, and jury. When the trial is finished, ask students
to write a report summarizing the events of the trial.
17. The Death Penalty Information Center has a significant amount of information available
regarding the death penalty along with information by state at
http://www.deathpenaltyinfo.org/states-and-without-death-penalty.