SlideShare a Scribd company logo
C H A P T E R
                                     05
 Criminal Law and Procedure



Wherever Law ends,
Tyranny begins.

John Locke




                                          5-1
Learning Objectives

• Describe the nature and elements of
  a crime, including evidence required
• Understand Constitutional limitations,
  defenses, and protections within
  criminal law
• Explain criminal procedure
• Discuss corporate crime, including
  RICO and computer-based crimes
                                           5-2
Nature of Crimes
• Crimes are public wrongs, classified
  from most serious to least serious as:
  – Felony
  – Misdemeanor
  – Infraction

• Purpose of criminal
  sanctions: incapacitation,
  deterrence, rehabilitation,

                                           5-3
Elements
• To convict a defendant of a crime, the
  government must
  – Demonstrate that alleged acts violated a
    criminal statute
  – Prove beyond a reasonable doubt that the
    defendant committed the acts
  – Prove the defendant had the capacity of
    criminal intent
• Courts narrowly interpret criminal statutes

                                                5-4
Constitutional Protections
• Bill of Rights: first ten
  amendments to the
  U.S. Constitution
   – Literally binds only the
     federal government,
     but applied to states
     through the due
     process clause of the
     Fourteenth Amendment


                                  5-5
Constitutional Limitations
• Government may not enact an ex
  post facto (after the fact) law
  – Thus a person cannot be charged with
    a crime for an act that was not a crime
    when the act was committed
                 •   Child worker in North Carolina
                     cotton mill, 1908. This type of
                     child labor was not prohibited
                     until 1938, with the enactment
                     of the Fair Labor Standards Act.

                                                        5-6
Constitutional Limitations
• First Amendment allows government to
  regulate indecent speech and does
  not protect obscene expression
  – To determine if expression is obscene,
    courts apply the three-part Miller test
     • Example: Supreme Court applied the
       Miller test to strike down most of the
       Congressional efforts to criminalize
       obscenity on the Internet


                                                5-7
Constitutional Limitations
• Constitutionally-protected behavior
  cannot be deemed criminal
  – Example: Griswold v. Connecticut
• Statutes must define prohibited
  behavior precisely enough to allow law
  enforcement officers and the public to
  understand which behavior is illegal
  – A statute may not be vague


                                           5-8
Skilling v. United States

• Facts:
  – Jeffrey Skilling, former president and chief
    operating officer of Enron, was found
    guilty of 19 counts of fraud, including
    conspiracy to commit honest-services
    wire fraud
  – Appellate court affirmed the conviction
    and Skilling appealed to the U.S. Supreme
    Court arguing that honest-services statute
    was unconstitutionally vague
                                                   5-9
Skilling v. United States

• Issue before the U.S. Supreme Court:
  – Did jury improperly convict Skilling of conspiracy
    to commit “honest-services” wire fraud?
• Statutory Interpretation:
  – Congress enacted § 1346 to reinstate honest-
    services law that McNally decision altered
  – Text of § 1346 targets corruption in which
    offender profits by causing third party, instead
    of the betrayed party, to suffer deprivation of
    money or property

                                                       5-10
Skilling v. United States

• Case Law:
  – Court reviewed case law, concluding that
    §1346 criminalizes only bribery and kickback
    schemes of honest-services law, thus it is not
    unconstitutionally vague
• Held:
  – Skilling did not engage in bribery and
    kickback schemes, so did not commit honest-
    services fraud; conviction flawed and case
    remanded for further proceedings

                                                     5-11
Proof and Intent
• Defendants are presumed innocent until
  proven guilty beyond a reasonable doubt
• Most serious crimes require proof of the
  defendant’s mens rea, or criminal intent
  – Defendant must have had capacity to
    form criminal intent
  – Three types of incapacity recognized:
    intoxication, infancy, and insanity


                                             5-12
Arthur Andersen v. U.S.
• Facts:
  – Arthur Andersen audited Enron’s accounting
    practices
  – In response to government investigation of
    Enron, Andersen began to destroy records
    related to Enron – allegedly according to the
    firm’s document retention policy – despite
    objections by some employees
  – Records destruction continued until Andersen
    was served with subpoenas for records


                                                    5-13
Arthur Andersen v. U.S.
• Facts (cont.):
  – Andersen found guilty of “knowingly…and
    corruptly” persuading employees to destroy
    documents that would be needed in an
    official proceeding (i.e., witness tampering)
• Issue before the Supreme Court:
  – Whether Arthur Andersen’s conviction must be
    reversed because the jury instructions
    misinterpreted the elements of the offense


                                                    5-14
Arthur Andersen v. U.S.
• Statutory interpretation:
  – Text establishes the mens rea – knowingly –
    and then a list of acts
• Discussion of trial court’s jury
  instructions:
  – Instructions lowered the level of culpability
    required to impose criminal liability and
    expanded the list of acts
     • Practical meaning: trial court judge made it
       too easy to convict Andersen

                                                      5-15
Arthur Andersen v. U.S.
• Held:
  – Jury instructions were flawed
  – Case remanded for further proceedings




                                        5-16
Criminal Procedure
• Arrest and booking of defendant
• Arrest report filed with prosecutor
• If defendant charged, complaint filed

•   Initial appearance of
    defendant before
    judicial officer
•   Preliminary (probable
    cause) hearing

                                          5-17
Criminal Procedure
• If probable cause exists, formal charge –
  information or indictment – filed with court
• Arraignment of defendant in which
  defendant enters a plea
   – Guilty, not guilty, nolo contendere (no contest)
• Defendant who pleads not guilty and faces
  incarceration for more than six months may
  choose a jury trial
   – Bench trial (judge only) also available


                                                        5-18
Constitutional Protections
• Fourth Amendment protects persons
  against unreasonable and arbitrary
  searches and seizures
  – Interpreted by Supreme Court to protect
    a reasonable expectation of privacy
  – General rule: warrantless searches are
    unreasonable (unconstitutional)
  – See United States v. Hall


                                              5-19
United States v. SDI Future Health, Inc
                   .
• Facts:
  – Internal Revenue Service (IRS) investigators
    concluded that SDI and corporate officers
    had engaged in Medicare and tax fraud
  – IRS applied for and executed a search
    warrant for SDI business premises
  – Evidence obtained in the search provided
    basis for indictments of SDI, Kaplan and Brunk
  – Defendants filed motion to suppress evidence
    arguing warrant was vague and overbroad
  – Trial court granted motion to suppress

                                                     5-20
United States v.
        SDI Future Health, Inc.
• Issue on appeal:
  – Government appealed to Ninth Circuit
    appellate court, which focused on whether
    corporate executives may challenge a
    police search of company premises not
    reserved for the executives’ exclusive use
• Legal Analysis:
  – Court applied Katz test: whether executives
    had a reasonable expectation of privacy in
    the area searched

                                                  5-21
United States v.
         SDI Future Health, Inc.
• Holding:
  – Individual challenging a
    search of workplace
    areas beyond his/her
    own office must show
    personal connection to
    the places searched and
    materials seized in order
    to establish standing
  – Reversed and remanded


                                   5-22
What is a Search?
• Many Fourth Amendment cases carve
  out exceptions to the general rule,
  establishing activities that do not
  constitute a search:
  – Visual observation of things or activities in
    public view
  – Narcotics detection dogs used in a public
    place to investigate luggage or cars
  – Enhanced aerial photography of a facility


                                                    5-23
What is a Search?
• But the Supreme Court
  in Kyllo v. United States,
  held a device not in
  public use to examine
  what would otherwise
  be hidden is a search,
  thus presumptively           Thermal image
  unreasonable without            of hand

  a warrant
                                               5-24
Warrantless Searches
• Supreme Court has held that constitutional
  warrantless searches include:
  – Area within an arrestee’s immediate control
  – Premises police enter in hot pursuit of an
    armed suspect
  – Stop-and-frisk searches for weapons
  – Inventory searches of property (e.g., briefcase,
    automobile) in an arrestee’s possession
  – Consensual searches
  – Exigent circumstances (Kentucky v. King)
                                                   5-25
The Exclusionary Rule
• Prevents the use of
  evidence seized in an
  illegal search in a
  subsequent trial of the
  defendant
  – Supreme Court has
    narrowed operation of
    the rule
  – See Hudson v. Michigan


                               5-26
USA PATRIOT Act
• Within six weeks after the attack on the
  United States on Sept. 11, 2001,
  Congress enacted a statute that
  amended more than a dozen statutes
  and broadly expanded government’s
  ability to conduct searches of property
  and library records, monitor Internet
  activities, and track electronic
  communications
                                             5-27
The Fifth Amendment
• The Fifth Amendment provides a privilege
  or protection against compelled
  testimonial self-incrimination
  – Practical meaning: a person may remain
    silent if making a statement would assist the
    government in prosecuting the person
  – Miranda warnings safeguard the right
  – Also prohibits prosecutorial comments at trial
    about the defendant’s failure to testify


                                                     5-28
Scope of Fifth Amendment
• Self-incrimination privilege applies to
  – Testimonial admissions, so police may compel
    a defendant to provide non-testimonial
    evidence (fingerprints, body fluids, hair)
  – Applies only to humans (not corporations)
  – Applies only if a defendant could be charged
    with a crime (not merely a civil lawsuit)
• Double jeopardy clause protects
  defendants from multiple criminal
  prosecutions for the same offense
                                                   5-29
Berghuis v. Thompkins

• Facts:
  – Thompkins was arrested as a shooting suspect
  – Police gave him Miranda warnings
  – For almost 3 hours, police interrogated him
    and Thompkins was generally silent, never
    stating that he wished to remain silent or
    requesting an attorney
  – At trial, Thompkins moved to suppress the few
    statements he made, arguing that he invoked
    his Fifth Amendment right to remain silent

                                                5-30
Berghuis v. Thompkins
• Appeal of habeas corpus petition:
  – Issue: Whether Thompkins’ generally
    unresponsive conduct during questioning
    constituted an unequivocal message to
    police officers that he did not wish to
    waive his Fifth Amendment rights?
• Supreme Court Ruling:
  – An accused who wants to invoke right to
    remain silent must do so unambiguously,
    and record shows that Thompkins waived
    his right to remain silent
                                              5-31
Sixth Amendment
• Applies to criminal cases
  by guarantees of a
  – Speedy trial
  – Impartial jury
  – Right to confront and
    cross-examine
    witnesses
  – Right to effective
    assistance of counsel

                              5-32
Test Your Knowledge
• True=A, False = B
  – To convict a defendant of a crime, the
    government must prove beyond a
    reasonable doubt that the defendant
    committed the acts
  – Obscenity is fully protected speech by the
    First Amendment to the Constitution
  – Only felonies require proof of the defendant’s
    mens rea, or criminal intent
  – A defendant may choose one of three pleas:
     guilty, not guilty, and nolo contendere

                                                     5-33
Test Your Knowledge
• True=A, False = B
  – The Bill of Rights is the first dozen
    amendments to the Constitution
  – The Fourth Amendment provides a
    privilege from self-incrimination and
    double jeopardy
  – The Fifth Amendment protects persons
    against unreasonable and arbitrary
    searches and seizures

                                            5-34
Test Your Knowledge
• Multiple Choice
  – Sixth Amendment to the Constitution
    guarantees
     a) Speedy trial
     b) Right to confront and cross-examine
        witnesses
     c) Right to effective assistance of counsel
     d) Impartial jury
     e) All of the above

                                                   5-35
Test Your Knowledge
• Multiple Choice
  – Which of the following would not be a
    constitutional search?
     a) Taking bag of shredded documents from
        a dumpster
     b) Aerial surveillance of a manufacturing
        plant
     c) Thermal imaging device to detect heat
        in a home
     d) A stop-and-frisk search for weapons

                                                 5-36
White Collar Crimes
• Under modern rule, a company may be
  liable for criminal offenses committed
  by employees who acted within the
  scope of their employment and for the
  benefit of the corporation
                      Numerous policy
                     debates about how
                        to deal with
                      corporate crime

                                         5-37
Ethics in Action
• Does an employee have an ethical duty
  to his or her employer?
• When an employee learns of apparently
  illegal conduct by his or her employer,
  does the employee have an ethical duty
  to become a whistleblower?
• What practical consequences might an
  employee face if he or she blows the
  whistle on illegal corporate activity?

                                            5-38
White Collar Crimes

• Regulatory offenses
  – Example: violating the Clean Water Act
• Fraudulent acts
  – Examples: false claims, fraudulent
    concealment, wire fraud
• Sarbanes-Oxley Act violations
  – Example: Knowingly altering documents or
    business records with the intent to impede a
    government investigation


                                                   5-39
White Collar Crimes
• Bribery and Illegal Gratuities
  – Example: violating Foreign Corrupt Practices
    Act
• Racketeer Influenced and Corrupt
  Organizations Act (RICO) violations
  – Example of criminal RICO: using income
    derived from a “pattern of racketeering
    activity”
  – Example of civil RICO: See
    Boyle v. United States
                                                   5-40
Computer Crime
• In general, existing criminal statutes apply to
  criminal activity via computers
• Computer Fraud and Abuse Act imposes
  criminal and civil liability on a person who
  “knowingly, and with intent to defraud,
  accesses a protected computer without
  authorization . . . [and] obtains anything of
  value.”



                                                    5-41
Test Your Knowledge
• True=A, False = B
  – An employee’s sole duty is to his or her
    employer
  – RICO violations are only criminal in
    nature
  – An employee may access a company’s
    computer to obtain personal information
    about his or her supervisor and use the
    information to persuade the supervisor to
    give the employee a raise

                                                5-42
Thought Questions
• Are constitutional protections for criminal
  matters overly broad or too narrow?
• What do you think about the corporate
  crime cases in the text?




                                                5-43

More Related Content

What's hot

Arrest process
Arrest processArrest process
Arrest processmworth
 
CIVIL PROCEDURE - A POWER POINT PRESENTATION- BY A W A SALAM
CIVIL PROCEDURE - A POWER POINT PRESENTATION- BY A W A SALAMCIVIL PROCEDURE - A POWER POINT PRESENTATION- BY A W A SALAM
CIVIL PROCEDURE - A POWER POINT PRESENTATION- BY A W A SALAM
awasalam
 
offence of Abetment under indian peal code
offence of Abetment under indian peal code offence of Abetment under indian peal code
offence of Abetment under indian peal code
gagan deep
 
Police (FIR)
Police (FIR)Police (FIR)
Police (FIR)
madhikhel
 
Relevancy of evidence under section 14, 15, 16 of Evidence Act 1950 (2017-2018)
Relevancy of evidence under section 14, 15, 16  of Evidence Act 1950 (2017-2018)Relevancy of evidence under section 14, 15, 16  of Evidence Act 1950 (2017-2018)
Relevancy of evidence under section 14, 15, 16 of Evidence Act 1950 (2017-2018)
Intan Muhammad
 
Intro-to-Crim-2021-2022.pdf
Intro-to-Crim-2021-2022.pdfIntro-to-Crim-2021-2022.pdf
Intro-to-Crim-2021-2022.pdf
SarahJaneBeredo
 
Qanun-e-Shahadat Order: Analysis of Basic Principles
Qanun-e-Shahadat Order: Analysis of Basic PrinciplesQanun-e-Shahadat Order: Analysis of Basic Principles
Qanun-e-Shahadat Order: Analysis of Basic Principles
Shahbaz Cheema
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRALRahul Gurnani
 
Arrest and questioning of accused in India, U.K. and U.S.A. | Comparitive Cri...
Arrest and questioning of accused in India, U.K. and U.S.A. | Comparitive Cri...Arrest and questioning of accused in India, U.K. and U.S.A. | Comparitive Cri...
Arrest and questioning of accused in India, U.K. and U.S.A. | Comparitive Cri...
NishkaPrajapati
 
Offences towards body, Indian Penal Code 1860
Offences towards body, Indian Penal Code 1860Offences towards body, Indian Penal Code 1860
Offences towards body, Indian Penal Code 1860
Nuggehalli Udaya Simha
 
Theories of Crime Causation.pptx
Theories of Crime Causation.pptxTheories of Crime Causation.pptx
Theories of Crime Causation.pptx
LeaSantiago2
 
ABOUT A SALE DEED
ABOUT A SALE DEEDABOUT A SALE DEED
ABOUT A SALE DEED
property Advocates
 
Robbery
RobberyRobbery
Definition and classification of offences
Definition and classification of offencesDefinition and classification of offences
Definition and classification of offences
Insyirah Mohamad Noh
 
Lec 5 Topology of crime / Types of Crime by Imran A. Sajid
Lec 5  Topology of crime / Types of Crime by Imran A. SajidLec 5  Topology of crime / Types of Crime by Imran A. Sajid
Lec 5 Topology of crime / Types of Crime by Imran A. Sajid
Dr. Imran A. Sajid
 
Decriminalization of section 309 indian penal code,
Decriminalization of section 309 indian penal code,Decriminalization of section 309 indian penal code,
Decriminalization of section 309 indian penal code,
Abhishek sinsinwar
 
Arrest: Shaaban & Ors v Chong Fook Kam & Anor
Arrest: Shaaban & Ors v Chong Fook Kam & Anor Arrest: Shaaban & Ors v Chong Fook Kam & Anor
Arrest: Shaaban & Ors v Chong Fook Kam & Anor
Latifah Rabbaaniah
 
7) theory of law
7) theory of law7) theory of law
7) theory of law
Nur Athirah
 

What's hot (20)

Arrest process
Arrest processArrest process
Arrest process
 
CIVIL PROCEDURE - A POWER POINT PRESENTATION- BY A W A SALAM
CIVIL PROCEDURE - A POWER POINT PRESENTATION- BY A W A SALAMCIVIL PROCEDURE - A POWER POINT PRESENTATION- BY A W A SALAM
CIVIL PROCEDURE - A POWER POINT PRESENTATION- BY A W A SALAM
 
offence of Abetment under indian peal code
offence of Abetment under indian peal code offence of Abetment under indian peal code
offence of Abetment under indian peal code
 
Police (FIR)
Police (FIR)Police (FIR)
Police (FIR)
 
Relevancy of evidence under section 14, 15, 16 of Evidence Act 1950 (2017-2018)
Relevancy of evidence under section 14, 15, 16  of Evidence Act 1950 (2017-2018)Relevancy of evidence under section 14, 15, 16  of Evidence Act 1950 (2017-2018)
Relevancy of evidence under section 14, 15, 16 of Evidence Act 1950 (2017-2018)
 
Intro-to-Crim-2021-2022.pdf
Intro-to-Crim-2021-2022.pdfIntro-to-Crim-2021-2022.pdf
Intro-to-Crim-2021-2022.pdf
 
Qanun-e-Shahadat Order: Analysis of Basic Principles
Qanun-e-Shahadat Order: Analysis of Basic PrinciplesQanun-e-Shahadat Order: Analysis of Basic Principles
Qanun-e-Shahadat Order: Analysis of Basic Principles
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRAL
 
Arrest and questioning of accused in India, U.K. and U.S.A. | Comparitive Cri...
Arrest and questioning of accused in India, U.K. and U.S.A. | Comparitive Cri...Arrest and questioning of accused in India, U.K. and U.S.A. | Comparitive Cri...
Arrest and questioning of accused in India, U.K. and U.S.A. | Comparitive Cri...
 
Offences towards body, Indian Penal Code 1860
Offences towards body, Indian Penal Code 1860Offences towards body, Indian Penal Code 1860
Offences towards body, Indian Penal Code 1860
 
Medical Evidence
Medical EvidenceMedical Evidence
Medical Evidence
 
Theories of Crime Causation.pptx
Theories of Crime Causation.pptxTheories of Crime Causation.pptx
Theories of Crime Causation.pptx
 
ABOUT A SALE DEED
ABOUT A SALE DEEDABOUT A SALE DEED
ABOUT A SALE DEED
 
Plea bargaining
Plea bargainingPlea bargaining
Plea bargaining
 
Robbery
RobberyRobbery
Robbery
 
Definition and classification of offences
Definition and classification of offencesDefinition and classification of offences
Definition and classification of offences
 
Lec 5 Topology of crime / Types of Crime by Imran A. Sajid
Lec 5  Topology of crime / Types of Crime by Imran A. SajidLec 5  Topology of crime / Types of Crime by Imran A. Sajid
Lec 5 Topology of crime / Types of Crime by Imran A. Sajid
 
Decriminalization of section 309 indian penal code,
Decriminalization of section 309 indian penal code,Decriminalization of section 309 indian penal code,
Decriminalization of section 309 indian penal code,
 
Arrest: Shaaban & Ors v Chong Fook Kam & Anor
Arrest: Shaaban & Ors v Chong Fook Kam & Anor Arrest: Shaaban & Ors v Chong Fook Kam & Anor
Arrest: Shaaban & Ors v Chong Fook Kam & Anor
 
7) theory of law
7) theory of law7) theory of law
7) theory of law
 

Similar to Chapter 5 - Crimes and Torts

Chapter 5 – Crimes
Chapter 5 – CrimesChapter 5 – Crimes
Chapter 5 – Crimes
UAF_BA330
 
IRS Summons Power
IRS Summons PowerIRS Summons Power
ADMJ2 - Intro to ADMJ - Chapter 5
ADMJ2 - Intro to ADMJ - Chapter 5ADMJ2 - Intro to ADMJ - Chapter 5
ADMJ2 - Intro to ADMJ - Chapter 5
Monterey Peninsula College
 
Constitutional Issues - Chapter 7
Constitutional Issues - Chapter 7Constitutional Issues - Chapter 7
Constitutional Issues - Chapter 7
mpalaro
 
Criminal Investigations and Evidence Gathering after DPP v. JC
Criminal Investigations and Evidence Gathering after DPP v. JCCriminal Investigations and Evidence Gathering after DPP v. JC
Criminal Investigations and Evidence Gathering after DPP v. JC
OrlaNolanMcDowellPurcell
 
Constitutional law unit 3
Constitutional law unit 3Constitutional law unit 3
Constitutional law unit 3Mike Wilkie
 
Constitutional law unit 3
Constitutional law unit 3Constitutional law unit 3
Constitutional law unit 3Mike Wilkie
 
140509075 olmstead-v-us-1928 o
140509075 olmstead-v-us-1928 o140509075 olmstead-v-us-1928 o
140509075 olmstead-v-us-1928 oDana Cuadrado
 
Chapter 7: The Courts
Chapter 7: The CourtsChapter 7: The Courts
Chapter 7: The Courts
trishsicat
 
Criminal &civil law
Criminal &civil lawCriminal &civil law
Criminal &civil lawDuyen Cao
 
Paralegal Power Break: The law of criminal procedure
Paralegal Power Break:  The law of criminal procedureParalegal Power Break:  The law of criminal procedure
Paralegal Power Break: The law of criminal procedure
Paralegal Rainmakers
 
Chapter 6.investigations and information planning
Chapter 6.investigations and information planningChapter 6.investigations and information planning
Chapter 6.investigations and information planning
APSU
 
Constitutional Issues - Chapter 9
Constitutional Issues - Chapter 9Constitutional Issues - Chapter 9
Constitutional Issues - Chapter 9
mpalaro
 
Chapter 1 - The Nature of Law
Chapter 1 - The Nature of LawChapter 1 - The Nature of Law
Chapter 1 - The Nature of LawUAF_BA330
 
The Bullet Proof Checklist for Attacking a Fourth Amendment Search & Seizure ...
The Bullet Proof Checklist for Attacking a Fourth Amendment Search & Seizure ...The Bullet Proof Checklist for Attacking a Fourth Amendment Search & Seizure ...
The Bullet Proof Checklist for Attacking a Fourth Amendment Search & Seizure ...
Michael DeBlis III, Esq., LLM
 
Illegally obtained evidence
Illegally obtained evidenceIllegally obtained evidence
Illegally obtained evidence
NurulHayyu1
 
Civil Law Procedures.pptx
Civil Law Procedures.pptxCivil Law Procedures.pptx
Civil Law Procedures.pptx
jashanpreetsingh295906
 
Lesson 31
Lesson 31Lesson 31
Lesson 31wemo14
 

Similar to Chapter 5 - Crimes and Torts (20)

Chapter 5 – Crimes
Chapter 5 – CrimesChapter 5 – Crimes
Chapter 5 – Crimes
 
IRS Summons Power
IRS Summons PowerIRS Summons Power
IRS Summons Power
 
ADMJ2 - Intro to ADMJ - Chapter 5
ADMJ2 - Intro to ADMJ - Chapter 5ADMJ2 - Intro to ADMJ - Chapter 5
ADMJ2 - Intro to ADMJ - Chapter 5
 
Constitutional Issues - Chapter 7
Constitutional Issues - Chapter 7Constitutional Issues - Chapter 7
Constitutional Issues - Chapter 7
 
Criminal Investigations and Evidence Gathering after DPP v. JC
Criminal Investigations and Evidence Gathering after DPP v. JCCriminal Investigations and Evidence Gathering after DPP v. JC
Criminal Investigations and Evidence Gathering after DPP v. JC
 
Constitutional law unit 3
Constitutional law unit 3Constitutional law unit 3
Constitutional law unit 3
 
Constitutional law unit 3
Constitutional law unit 3Constitutional law unit 3
Constitutional law unit 3
 
140509075 olmstead-v-us-1928 o
140509075 olmstead-v-us-1928 o140509075 olmstead-v-us-1928 o
140509075 olmstead-v-us-1928 o
 
Chapter 7: The Courts
Chapter 7: The CourtsChapter 7: The Courts
Chapter 7: The Courts
 
Criminal &civil law
Criminal &civil lawCriminal &civil law
Criminal &civil law
 
Paralegal Power Break: The law of criminal procedure
Paralegal Power Break:  The law of criminal procedureParalegal Power Break:  The law of criminal procedure
Paralegal Power Break: The law of criminal procedure
 
Chapter 6.investigations and information planning
Chapter 6.investigations and information planningChapter 6.investigations and information planning
Chapter 6.investigations and information planning
 
Constitutional Issues - Chapter 9
Constitutional Issues - Chapter 9Constitutional Issues - Chapter 9
Constitutional Issues - Chapter 9
 
Chapter3
Chapter3Chapter3
Chapter3
 
Chapter 1 - The Nature of Law
Chapter 1 - The Nature of LawChapter 1 - The Nature of Law
Chapter 1 - The Nature of Law
 
The Bullet Proof Checklist for Attacking a Fourth Amendment Search & Seizure ...
The Bullet Proof Checklist for Attacking a Fourth Amendment Search & Seizure ...The Bullet Proof Checklist for Attacking a Fourth Amendment Search & Seizure ...
The Bullet Proof Checklist for Attacking a Fourth Amendment Search & Seizure ...
 
Illegally obtained evidence
Illegally obtained evidenceIllegally obtained evidence
Illegally obtained evidence
 
Ch 5
Ch 5Ch 5
Ch 5
 
Civil Law Procedures.pptx
Civil Law Procedures.pptxCivil Law Procedures.pptx
Civil Law Procedures.pptx
 
Lesson 31
Lesson 31Lesson 31
Lesson 31
 

More from UAF_BA330

Chapter 52 – Environmental Regulation
Chapter 52 – Environmental RegulationChapter 52 – Environmental Regulation
Chapter 52 – Environmental RegulationUAF_BA330
 
Chapter 51 – Employment Law
Chapter 51 – Employment LawChapter 51 – Employment Law
Chapter 51 – Employment LawUAF_BA330
 
Chapter 48 – The Federal Trade Commission Act and Consumer Protection Laws
Chapter 48 – The Federal Trade Commission Act and Consumer Protection LawsChapter 48 – The Federal Trade Commission Act and Consumer Protection Laws
Chapter 48 – The Federal Trade Commission Act and Consumer Protection LawsUAF_BA330
 
Chapter 43 – Management of Corporations
Chapter 43 – Management of CorporationsChapter 43 – Management of Corporations
Chapter 43 – Management of CorporationsUAF_BA330
 
Chapter 42 – Organization and Financial Structure of Corporations
Chapter 42 – Organization and Financial Structure of CorporationsChapter 42 – Organization and Financial Structure of Corporations
Chapter 42 – Organization and Financial Structure of CorporationsUAF_BA330
 
Chapter 41 – History and Nature of Corporations
Chapter 41 – History and Nature of CorporationsChapter 41 – History and Nature of Corporations
Chapter 41 – History and Nature of CorporationsUAF_BA330
 
Chapter 40 – Limited Liability Companies, Limited Partnerships, and Limited L...
Chapter 40 – Limited Liability Companies, Limited Partnerships, and Limited L...Chapter 40 – Limited Liability Companies, Limited Partnerships, and Limited L...
Chapter 40 – Limited Liability Companies, Limited Partnerships, and Limited L...UAF_BA330
 
Chapter 39 – Partners’ Dissociation and Partnerships’ Dissolution and Winding Up
Chapter 39 – Partners’ Dissociation and Partnerships’ Dissolution and Winding UpChapter 39 – Partners’ Dissociation and Partnerships’ Dissolution and Winding Up
Chapter 39 – Partners’ Dissociation and Partnerships’ Dissolution and Winding UpUAF_BA330
 
Chapter 38 – Operation of Partnerships and Related Forms
Chapter 38 – Operation of Partnerships and Related FormsChapter 38 – Operation of Partnerships and Related Forms
Chapter 38 – Operation of Partnerships and Related FormsUAF_BA330
 
Chapter 37 – Introduction to Forms of Business and Formation of Partnerships
Chapter 37 – Introduction to Forms of Business and Formation of PartnershipsChapter 37 – Introduction to Forms of Business and Formation of Partnerships
Chapter 37 – Introduction to Forms of Business and Formation of PartnershipsUAF_BA330
 
Chapter 36 – Third-Party Relations of the Principal and the Agent
Chapter 36 – Third-Party Relations of the Principal and the AgentChapter 36 – Third-Party Relations of the Principal and the Agent
Chapter 36 – Third-Party Relations of the Principal and the AgentUAF_BA330
 
Chapter 35 – The Agency Relationship
Chapter 35 – The Agency RelationshipChapter 35 – The Agency Relationship
Chapter 35 – The Agency RelationshipUAF_BA330
 
Chapter 34 – Checks and Electronic Transfers
Chapter 34 – Checks and Electronic TransfersChapter 34 – Checks and Electronic Transfers
Chapter 34 – Checks and Electronic TransfersUAF_BA330
 
Chapter 33 – Liability of Parties
Chapter 33 – Liability of PartiesChapter 33 – Liability of Parties
Chapter 33 – Liability of PartiesUAF_BA330
 
Chapter 32 – Negotiation and Holder in Due Course
Chapter 32 – Negotiation and Holder in Due CourseChapter 32 – Negotiation and Holder in Due Course
Chapter 32 – Negotiation and Holder in Due CourseUAF_BA330
 
Chapter 31 – Negotiable Instruments
Chapter 31 – Negotiable InstrumentsChapter 31 – Negotiable Instruments
Chapter 31 – Negotiable InstrumentsUAF_BA330
 
Chapter 30 – Bankruptcy
Chapter 30 – BankruptcyChapter 30 – Bankruptcy
Chapter 30 – BankruptcyUAF_BA330
 
Chapter 28 – Introduction to Credit and Secured Transactions
Chapter 28 – Introduction to Credit and Secured TransactionsChapter 28 – Introduction to Credit and Secured Transactions
Chapter 28 – Introduction to Credit and Secured TransactionsUAF_BA330
 
Chapter 27 – Insurance Law
Chapter 27 – Insurance LawChapter 27 – Insurance Law
Chapter 27 – Insurance LawUAF_BA330
 
Chapter 24 – Real Property
Chapter 24 – Real PropertyChapter 24 – Real Property
Chapter 24 – Real PropertyUAF_BA330
 

More from UAF_BA330 (20)

Chapter 52 – Environmental Regulation
Chapter 52 – Environmental RegulationChapter 52 – Environmental Regulation
Chapter 52 – Environmental Regulation
 
Chapter 51 – Employment Law
Chapter 51 – Employment LawChapter 51 – Employment Law
Chapter 51 – Employment Law
 
Chapter 48 – The Federal Trade Commission Act and Consumer Protection Laws
Chapter 48 – The Federal Trade Commission Act and Consumer Protection LawsChapter 48 – The Federal Trade Commission Act and Consumer Protection Laws
Chapter 48 – The Federal Trade Commission Act and Consumer Protection Laws
 
Chapter 43 – Management of Corporations
Chapter 43 – Management of CorporationsChapter 43 – Management of Corporations
Chapter 43 – Management of Corporations
 
Chapter 42 – Organization and Financial Structure of Corporations
Chapter 42 – Organization and Financial Structure of CorporationsChapter 42 – Organization and Financial Structure of Corporations
Chapter 42 – Organization and Financial Structure of Corporations
 
Chapter 41 – History and Nature of Corporations
Chapter 41 – History and Nature of CorporationsChapter 41 – History and Nature of Corporations
Chapter 41 – History and Nature of Corporations
 
Chapter 40 – Limited Liability Companies, Limited Partnerships, and Limited L...
Chapter 40 – Limited Liability Companies, Limited Partnerships, and Limited L...Chapter 40 – Limited Liability Companies, Limited Partnerships, and Limited L...
Chapter 40 – Limited Liability Companies, Limited Partnerships, and Limited L...
 
Chapter 39 – Partners’ Dissociation and Partnerships’ Dissolution and Winding Up
Chapter 39 – Partners’ Dissociation and Partnerships’ Dissolution and Winding UpChapter 39 – Partners’ Dissociation and Partnerships’ Dissolution and Winding Up
Chapter 39 – Partners’ Dissociation and Partnerships’ Dissolution and Winding Up
 
Chapter 38 – Operation of Partnerships and Related Forms
Chapter 38 – Operation of Partnerships and Related FormsChapter 38 – Operation of Partnerships and Related Forms
Chapter 38 – Operation of Partnerships and Related Forms
 
Chapter 37 – Introduction to Forms of Business and Formation of Partnerships
Chapter 37 – Introduction to Forms of Business and Formation of PartnershipsChapter 37 – Introduction to Forms of Business and Formation of Partnerships
Chapter 37 – Introduction to Forms of Business and Formation of Partnerships
 
Chapter 36 – Third-Party Relations of the Principal and the Agent
Chapter 36 – Third-Party Relations of the Principal and the AgentChapter 36 – Third-Party Relations of the Principal and the Agent
Chapter 36 – Third-Party Relations of the Principal and the Agent
 
Chapter 35 – The Agency Relationship
Chapter 35 – The Agency RelationshipChapter 35 – The Agency Relationship
Chapter 35 – The Agency Relationship
 
Chapter 34 – Checks and Electronic Transfers
Chapter 34 – Checks and Electronic TransfersChapter 34 – Checks and Electronic Transfers
Chapter 34 – Checks and Electronic Transfers
 
Chapter 33 – Liability of Parties
Chapter 33 – Liability of PartiesChapter 33 – Liability of Parties
Chapter 33 – Liability of Parties
 
Chapter 32 – Negotiation and Holder in Due Course
Chapter 32 – Negotiation and Holder in Due CourseChapter 32 – Negotiation and Holder in Due Course
Chapter 32 – Negotiation and Holder in Due Course
 
Chapter 31 – Negotiable Instruments
Chapter 31 – Negotiable InstrumentsChapter 31 – Negotiable Instruments
Chapter 31 – Negotiable Instruments
 
Chapter 30 – Bankruptcy
Chapter 30 – BankruptcyChapter 30 – Bankruptcy
Chapter 30 – Bankruptcy
 
Chapter 28 – Introduction to Credit and Secured Transactions
Chapter 28 – Introduction to Credit and Secured TransactionsChapter 28 – Introduction to Credit and Secured Transactions
Chapter 28 – Introduction to Credit and Secured Transactions
 
Chapter 27 – Insurance Law
Chapter 27 – Insurance LawChapter 27 – Insurance Law
Chapter 27 – Insurance Law
 
Chapter 24 – Real Property
Chapter 24 – Real PropertyChapter 24 – Real Property
Chapter 24 – Real Property
 

Recently uploaded

Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 

Recently uploaded (20)

Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 

Chapter 5 - Crimes and Torts

  • 1. C H A P T E R 05 Criminal Law and Procedure Wherever Law ends, Tyranny begins. John Locke 5-1
  • 2. Learning Objectives • Describe the nature and elements of a crime, including evidence required • Understand Constitutional limitations, defenses, and protections within criminal law • Explain criminal procedure • Discuss corporate crime, including RICO and computer-based crimes 5-2
  • 3. Nature of Crimes • Crimes are public wrongs, classified from most serious to least serious as: – Felony – Misdemeanor – Infraction • Purpose of criminal sanctions: incapacitation, deterrence, rehabilitation, 5-3
  • 4. Elements • To convict a defendant of a crime, the government must – Demonstrate that alleged acts violated a criminal statute – Prove beyond a reasonable doubt that the defendant committed the acts – Prove the defendant had the capacity of criminal intent • Courts narrowly interpret criminal statutes 5-4
  • 5. Constitutional Protections • Bill of Rights: first ten amendments to the U.S. Constitution – Literally binds only the federal government, but applied to states through the due process clause of the Fourteenth Amendment 5-5
  • 6. Constitutional Limitations • Government may not enact an ex post facto (after the fact) law – Thus a person cannot be charged with a crime for an act that was not a crime when the act was committed • Child worker in North Carolina cotton mill, 1908. This type of child labor was not prohibited until 1938, with the enactment of the Fair Labor Standards Act. 5-6
  • 7. Constitutional Limitations • First Amendment allows government to regulate indecent speech and does not protect obscene expression – To determine if expression is obscene, courts apply the three-part Miller test • Example: Supreme Court applied the Miller test to strike down most of the Congressional efforts to criminalize obscenity on the Internet 5-7
  • 8. Constitutional Limitations • Constitutionally-protected behavior cannot be deemed criminal – Example: Griswold v. Connecticut • Statutes must define prohibited behavior precisely enough to allow law enforcement officers and the public to understand which behavior is illegal – A statute may not be vague 5-8
  • 9. Skilling v. United States • Facts: – Jeffrey Skilling, former president and chief operating officer of Enron, was found guilty of 19 counts of fraud, including conspiracy to commit honest-services wire fraud – Appellate court affirmed the conviction and Skilling appealed to the U.S. Supreme Court arguing that honest-services statute was unconstitutionally vague 5-9
  • 10. Skilling v. United States • Issue before the U.S. Supreme Court: – Did jury improperly convict Skilling of conspiracy to commit “honest-services” wire fraud? • Statutory Interpretation: – Congress enacted § 1346 to reinstate honest- services law that McNally decision altered – Text of § 1346 targets corruption in which offender profits by causing third party, instead of the betrayed party, to suffer deprivation of money or property 5-10
  • 11. Skilling v. United States • Case Law: – Court reviewed case law, concluding that §1346 criminalizes only bribery and kickback schemes of honest-services law, thus it is not unconstitutionally vague • Held: – Skilling did not engage in bribery and kickback schemes, so did not commit honest- services fraud; conviction flawed and case remanded for further proceedings 5-11
  • 12. Proof and Intent • Defendants are presumed innocent until proven guilty beyond a reasonable doubt • Most serious crimes require proof of the defendant’s mens rea, or criminal intent – Defendant must have had capacity to form criminal intent – Three types of incapacity recognized: intoxication, infancy, and insanity 5-12
  • 13. Arthur Andersen v. U.S. • Facts: – Arthur Andersen audited Enron’s accounting practices – In response to government investigation of Enron, Andersen began to destroy records related to Enron – allegedly according to the firm’s document retention policy – despite objections by some employees – Records destruction continued until Andersen was served with subpoenas for records 5-13
  • 14. Arthur Andersen v. U.S. • Facts (cont.): – Andersen found guilty of “knowingly…and corruptly” persuading employees to destroy documents that would be needed in an official proceeding (i.e., witness tampering) • Issue before the Supreme Court: – Whether Arthur Andersen’s conviction must be reversed because the jury instructions misinterpreted the elements of the offense 5-14
  • 15. Arthur Andersen v. U.S. • Statutory interpretation: – Text establishes the mens rea – knowingly – and then a list of acts • Discussion of trial court’s jury instructions: – Instructions lowered the level of culpability required to impose criminal liability and expanded the list of acts • Practical meaning: trial court judge made it too easy to convict Andersen 5-15
  • 16. Arthur Andersen v. U.S. • Held: – Jury instructions were flawed – Case remanded for further proceedings 5-16
  • 17. Criminal Procedure • Arrest and booking of defendant • Arrest report filed with prosecutor • If defendant charged, complaint filed • Initial appearance of defendant before judicial officer • Preliminary (probable cause) hearing 5-17
  • 18. Criminal Procedure • If probable cause exists, formal charge – information or indictment – filed with court • Arraignment of defendant in which defendant enters a plea – Guilty, not guilty, nolo contendere (no contest) • Defendant who pleads not guilty and faces incarceration for more than six months may choose a jury trial – Bench trial (judge only) also available 5-18
  • 19. Constitutional Protections • Fourth Amendment protects persons against unreasonable and arbitrary searches and seizures – Interpreted by Supreme Court to protect a reasonable expectation of privacy – General rule: warrantless searches are unreasonable (unconstitutional) – See United States v. Hall 5-19
  • 20. United States v. SDI Future Health, Inc . • Facts: – Internal Revenue Service (IRS) investigators concluded that SDI and corporate officers had engaged in Medicare and tax fraud – IRS applied for and executed a search warrant for SDI business premises – Evidence obtained in the search provided basis for indictments of SDI, Kaplan and Brunk – Defendants filed motion to suppress evidence arguing warrant was vague and overbroad – Trial court granted motion to suppress 5-20
  • 21. United States v. SDI Future Health, Inc. • Issue on appeal: – Government appealed to Ninth Circuit appellate court, which focused on whether corporate executives may challenge a police search of company premises not reserved for the executives’ exclusive use • Legal Analysis: – Court applied Katz test: whether executives had a reasonable expectation of privacy in the area searched 5-21
  • 22. United States v. SDI Future Health, Inc. • Holding: – Individual challenging a search of workplace areas beyond his/her own office must show personal connection to the places searched and materials seized in order to establish standing – Reversed and remanded 5-22
  • 23. What is a Search? • Many Fourth Amendment cases carve out exceptions to the general rule, establishing activities that do not constitute a search: – Visual observation of things or activities in public view – Narcotics detection dogs used in a public place to investigate luggage or cars – Enhanced aerial photography of a facility 5-23
  • 24. What is a Search? • But the Supreme Court in Kyllo v. United States, held a device not in public use to examine what would otherwise be hidden is a search, thus presumptively Thermal image unreasonable without of hand a warrant 5-24
  • 25. Warrantless Searches • Supreme Court has held that constitutional warrantless searches include: – Area within an arrestee’s immediate control – Premises police enter in hot pursuit of an armed suspect – Stop-and-frisk searches for weapons – Inventory searches of property (e.g., briefcase, automobile) in an arrestee’s possession – Consensual searches – Exigent circumstances (Kentucky v. King) 5-25
  • 26. The Exclusionary Rule • Prevents the use of evidence seized in an illegal search in a subsequent trial of the defendant – Supreme Court has narrowed operation of the rule – See Hudson v. Michigan 5-26
  • 27. USA PATRIOT Act • Within six weeks after the attack on the United States on Sept. 11, 2001, Congress enacted a statute that amended more than a dozen statutes and broadly expanded government’s ability to conduct searches of property and library records, monitor Internet activities, and track electronic communications 5-27
  • 28. The Fifth Amendment • The Fifth Amendment provides a privilege or protection against compelled testimonial self-incrimination – Practical meaning: a person may remain silent if making a statement would assist the government in prosecuting the person – Miranda warnings safeguard the right – Also prohibits prosecutorial comments at trial about the defendant’s failure to testify 5-28
  • 29. Scope of Fifth Amendment • Self-incrimination privilege applies to – Testimonial admissions, so police may compel a defendant to provide non-testimonial evidence (fingerprints, body fluids, hair) – Applies only to humans (not corporations) – Applies only if a defendant could be charged with a crime (not merely a civil lawsuit) • Double jeopardy clause protects defendants from multiple criminal prosecutions for the same offense 5-29
  • 30. Berghuis v. Thompkins • Facts: – Thompkins was arrested as a shooting suspect – Police gave him Miranda warnings – For almost 3 hours, police interrogated him and Thompkins was generally silent, never stating that he wished to remain silent or requesting an attorney – At trial, Thompkins moved to suppress the few statements he made, arguing that he invoked his Fifth Amendment right to remain silent 5-30
  • 31. Berghuis v. Thompkins • Appeal of habeas corpus petition: – Issue: Whether Thompkins’ generally unresponsive conduct during questioning constituted an unequivocal message to police officers that he did not wish to waive his Fifth Amendment rights? • Supreme Court Ruling: – An accused who wants to invoke right to remain silent must do so unambiguously, and record shows that Thompkins waived his right to remain silent 5-31
  • 32. Sixth Amendment • Applies to criminal cases by guarantees of a – Speedy trial – Impartial jury – Right to confront and cross-examine witnesses – Right to effective assistance of counsel 5-32
  • 33. Test Your Knowledge • True=A, False = B – To convict a defendant of a crime, the government must prove beyond a reasonable doubt that the defendant committed the acts – Obscenity is fully protected speech by the First Amendment to the Constitution – Only felonies require proof of the defendant’s mens rea, or criminal intent – A defendant may choose one of three pleas: guilty, not guilty, and nolo contendere 5-33
  • 34. Test Your Knowledge • True=A, False = B – The Bill of Rights is the first dozen amendments to the Constitution – The Fourth Amendment provides a privilege from self-incrimination and double jeopardy – The Fifth Amendment protects persons against unreasonable and arbitrary searches and seizures 5-34
  • 35. Test Your Knowledge • Multiple Choice – Sixth Amendment to the Constitution guarantees a) Speedy trial b) Right to confront and cross-examine witnesses c) Right to effective assistance of counsel d) Impartial jury e) All of the above 5-35
  • 36. Test Your Knowledge • Multiple Choice – Which of the following would not be a constitutional search? a) Taking bag of shredded documents from a dumpster b) Aerial surveillance of a manufacturing plant c) Thermal imaging device to detect heat in a home d) A stop-and-frisk search for weapons 5-36
  • 37. White Collar Crimes • Under modern rule, a company may be liable for criminal offenses committed by employees who acted within the scope of their employment and for the benefit of the corporation Numerous policy debates about how to deal with corporate crime 5-37
  • 38. Ethics in Action • Does an employee have an ethical duty to his or her employer? • When an employee learns of apparently illegal conduct by his or her employer, does the employee have an ethical duty to become a whistleblower? • What practical consequences might an employee face if he or she blows the whistle on illegal corporate activity? 5-38
  • 39. White Collar Crimes • Regulatory offenses – Example: violating the Clean Water Act • Fraudulent acts – Examples: false claims, fraudulent concealment, wire fraud • Sarbanes-Oxley Act violations – Example: Knowingly altering documents or business records with the intent to impede a government investigation 5-39
  • 40. White Collar Crimes • Bribery and Illegal Gratuities – Example: violating Foreign Corrupt Practices Act • Racketeer Influenced and Corrupt Organizations Act (RICO) violations – Example of criminal RICO: using income derived from a “pattern of racketeering activity” – Example of civil RICO: See Boyle v. United States 5-40
  • 41. Computer Crime • In general, existing criminal statutes apply to criminal activity via computers • Computer Fraud and Abuse Act imposes criminal and civil liability on a person who “knowingly, and with intent to defraud, accesses a protected computer without authorization . . . [and] obtains anything of value.” 5-41
  • 42. Test Your Knowledge • True=A, False = B – An employee’s sole duty is to his or her employer – RICO violations are only criminal in nature – An employee may access a company’s computer to obtain personal information about his or her supervisor and use the information to persuade the supervisor to give the employee a raise 5-42
  • 43. Thought Questions • Are constitutional protections for criminal matters overly broad or too narrow? • What do you think about the corporate crime cases in the text? 5-43

Editor's Notes

  1. See the Federal Sentencing Guidelines
  2. Example of narrow interpretation of statutes: U.S. v. Sun-Diamond Growers of California
  3. One recognized exception to the rule about ex post facto laws is the environmental statute entitled Comprehensive Environmental Response, Compensation, and Liability Act CERCLA). CERCLA provides for criminal penalties, including imprisonment, for conduct that occurred before the law was enacted.
  4. Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances. — The First Amendment to the U.S. Constitution Expression is obscene only if the government proves each element of the controlling obscenity test, which the Supreme Court established in Miller v. California (1973): (a) [That] the average person, applying contemporary community standards, would find that the work, taken as a whole, appeals to the prurient interest; (b) [that] the work depicts or describes, in a patently offensive way, [explicit] sexual conduct specifically defined by the applicable state law; and (c) [that] the work, taken as a whole, lacks serious literary, artistic, political, or scientific value. If any of the three elements is not proven, the work is not obscene; instead, it is entitled to First Amendment protection.
  5. The right of privacy held implicit in the Constitution caused the Supreme Court, in Griswold v. Connecticut (1965), to strike down state statutes that prohibited the use of contraceptive devices and the counseling or assisting of others in the use of such devices. The hyperlink is to the case information and opinion on the Oyez Project website. This decision provided the constitutional basis for the Court’s historic Roe v. Wade (1973) decision, which limited the states’ power to criminalize abortions.
  6. The hyperlink is to the U.S. Supreme Court’s opinion.
  7. In 1987, the U.S. Supreme Court ruled in McNally v. United States to cease development of the intangible-rights doctrine (and honest-services theory) because the particular scheme did not qualify as mail fraud. However, Congress quickly enacted § 1346 to reinstate as illegal a “scheme or artifice to deprive another of the intangible right of honest-services.”
  8. The hyperlink is to the case and opinion on the Oyez Project website.
  9. The hyperlink is to the Supreme Court opinion.
  10. The ruling in favor of Andersen did not prevent the collapse of the company. The company lost most of its clients after it was indicted and as of early 2006, there were approximately 100 civil suits still pending against the firm related to audits of Enron and other companies. The company began winding down its American operations after the indictment and from a high of 28,000 employees in the US and 85,000 worldwide, the firm as of early 2006 had only around 200 based primarily in Chicago. There is a website for Andersen alumni to connect, but the Andersen.com website is merely one page as of 2-20-06.
  11. Booking is an administrative procedure and includes fingerprinting, mugshots, etc. Bail may be available at this stage. After receiving the arrest report, the prosecutor decides whether to charge the defendant with the alleged offense. During an initial appearance, the magistrate or judge informs the accused of the charges and outlines the accused’s constitutional rights. If a misdemeanor in which the defendant pleads guilty, the sentence may be imposed without a later hearing. If the accused pleads not guilty to a misdemeanor charge, a trial is set for a later date. The magistrate sets the amount of bail for any crime when a later trial date has been set. In many states, the preliminary hearing is an additional protection for felony cases. In a preliminary hearing, the prosecutor must introduce enough evidence to show probable cause that the accused committed a felony. If convinced of probable cause, the magistrate binds over the defendant for trial.
  12. About ½ the states require a grand jury approve a decision to prosecute a person for a felony and issue an indictment. In the other states, felony defendants may be charged by either an indictment or an information (formal charged signed by prosecutor) at the prosecutor’s discretion. Misdemeanor cases are prosecuted by information in most states. About ½ the states require a grand jury approve a decision to prosecute a person for a felony and issue an indictment. In the other states, felony defendants may be charged by either an indictment or an information (formal charged signed by prosecutor) at the prosecutor’s discretion. Misdemeanor cases are prosecuted by information in most states. In an arraignment, the defendant is brought before a judge, informed of all charges, and asked to enter a plea (guilty, not guilty, or nolo contendere). Evidence of a guilty plea may be admissible in a later civil case against the defendant for the same conduct, but a nolo contendere plea is inadmissible in a later civil action.
  13. United States v. Hall : William T. Parks, a special agent of the U.S. Customs Service, was investigating allegations that Bet-Air, Inc. (a Miami-based seller of spare aviation parts and supplies) had supplied restricted military parts to Iran. Parks entered Bet-Air’s property and removed, from a garbage dumpster, a bag of shredded documents. The dumpster was located near the Bet-Air offices in a parking area reserved for the firm’s employees. To reach the dumpster, Parks had to travel 40 yards on a private paved road. No signs indicated that the road was private. In later judicial proceedings, Parks testified that at the time he traveled on the road, he did not know he was on Bet-Air’s property. When reconstructed, some of the previously shredded documents contained information seemingly relevant to the investigation. Parks used the shredded documents and the information they revealed as the basis for obtaining a warrant to search the Bel-Air premises. In executing the search warrant, Parks and other law enforcement officers seized numerous documents and Bet-Air records. A federal grand jury later indicted Bet-Air’s chairman, Terrence Hall, and other defendants on various counts related to the alleged supplying of restricted military parts to Iran. Contending that the Fourth Amendment had been violated, Hall filed a motion asking the court to suppress (i.e., exclude) all evidence derived from the warrantless search of the dumpster and all evidence seized during the search of the Bet-Air premises (the search pursuant to the warrant). The federal district court denied Hall’s motion. Following a jury trial, Hall was convicted on all counts and sentenced to prison. Hall appealed to the 11th Circuit Court of Appeals.
  14. The hyperlink is to the case opinion on the Findlaw.com website.
  15. Ask your students what they consider reasonable steps to restrict public access to garbage.
  16. The Court noted that an exception exists for a small business over which an individual exercises daily management and control over the entire operation. Note that in a cube farm (depicted), there may be little or no expectation of privacy.
  17. The hyperlink is to the case information and opinion on the Oyez Project website. The Kyllo ruling was limited to use of the thermal imaging device and the opinion departs from traditional Katz analysis. Justice Scalia has made it clear that he does not like the Katz “expectation of privacy” test because it tends to preserve an overly broad presumption that all warrantless searches are unconstitutional. Suspicious that marijuana was being grown in Danny Lee Kyllo’s home, federal agents used a thermal imaging device to scan his triplex to determine whether the amount of heat emanating from it was consistent with the amount emanated from high intensity lamps typically used for indoor marijuana growth. The scan showed that Kyllo’s roof and a side wall were relatively hot compared to the rest of his home and substantially warmer than the neighboring units. Based in part on the thermal imaging results, a federal magistrate judge issued a warrant to search Kyllo’s home, where the agents found marijuana growing. After Kyllo was indicted on a federal drug charge, he unsuccessfully moved to suppress the evidence seized from his home and then entered a conditional guilty plea. The Ninth Circuit Court of Appeals ultimately affirmed, upholding the warrant and holding that the evidence was admissible. Kyllo appealed, and the U.S. Supreme Court granted certiorari.
  18. In Kentucky v. King, 2011 U.S. LEXIS 3541 (U.S. Sup. Ct. 2011), the Supreme Court held that the exigent circumstances exception to the Fourth Amendment’s warrant requirement justifies police officers’ warrantless entry into and search of residential property if the officers, after knocking on the door and announcing their presence, become concerned that evidence may be destroyed.
  19. The hyperlink is to the case decision on the Oyez.org website. The Supreme Court in Hudson v. Michigan concluded: “In sum, the social costs of applying the exclusionary rule to knock-and-announce violations are considerable; the incentive to such violations is minimal to begin with, and the extant deterrences against them are substantial – incomparably greater than the factors deterring warrantless entries when [ Mapp v. Ohio ] was decided. Resort to the massive remedy of suppressing evidence of guilt is unjustified.”
  20. The hyperlink is to the Act. The PATRIOT Act is highly controversial. Some sections have already been declared unconstitutional and challenges to the constitutionality of the law continue. Included in the USA PATRIOT Act are measures allowing the federal government significantly expanded ability, in terrorism-related investigations, to conduct searches of property, monitor Internet activities, and track electronic communications. Most, though not all, actions of that nature require a warrant from a special court known as the Foreign Intelligence Surveillance Court. The statute contemplates, however, that such warrants may be issued upon less of a showing by the government than would ordinarily be required, and may be more sweeping than usual in terms of geographic application. Moreover, warrants issued by the special court for the search of property can be of the so-called “sneak and peek” variety, under which the FBI need not produce the warrant for the property owner or possessor to see and need not notify an absent property owner or possessor that the search took place (unlike the rules typically applicable to execution of “regular” warrants). The USA PATRIOT Act also calls for banks to report seemingly suspicious monetary deposits, and any deposits exceeding $10,000, not only to the Treasury Department (as required by prior law) but also to the Central Intelligence Agency and other federal intelligence agencies. In addition, the statute enables federal law enforcement authorities to seek a Surveillance Court warrant for the obtaining of individuals’ credit, medical, and student records, regardless of state or federal privacy laws that would otherwise have applied.
  21. “ No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a Grand Jury, except in cases arising in the land or naval forces, or in the Militia, when in actual service in time of War or public danger; nor shall any person be subject for the same offence to be twice put in jeopardy of life or limb; nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use, without just compensation.” — The Fifth Amendment to the U.S. Constitution The Miranda v. Arizona decision, to safeguard the Fifth Amendment right, requires police officers to warn a defendant that the defendant has “the right to remain silent.” In Dickerson v. United States (2000), the Supreme Court classified the Miranda warnings as a constitutional rule, which Congress could not legislatively overrule.
  22. Hyperlink is to the case decision on the Supreme Court website.
  23. Court: “In sum, a suspect who has received and understood the Miranda warnings, and has not invoked his Miranda rights, waives the right to remain silent by making an uncoerced statement to the police. Thompkins did not invoke his right to remain silent and stop the questioning. Understanding his rights in full, he waived his right to remain silent by making a voluntary statement to the police.”
  24. “ In all criminal prosecutions, the accused shall enjoy the right to a speedy and public trial, by an impartial jury of the State and district wherein the crime shall have been committed, which district shall have been previously ascertained by law, and to be informed of the nature and cause of the accusation; to be confronted with the witnesses against him; to have compulsory process for obtaining witnesses in his favor, and to have the Assistance of Counsel for his defence.” — The Sixth Amendment to the U.S. Constitution
  25. True False. To determine if expression is obscene, courts apply the three-part Miller test. False. Most serious crimes require proof of the defendant’s criminal intent, including misdemeanors. True
  26. False; the first ten amendments False. The Fifth Amendment provides the privilege from self-incrimination and double jeopardy. False. The Fourth Amendment protects against unreasonable search and seizure.
  27. The correct answer is (e), All of the above.
  28. The correct answer is (c), a thermal imaging device to detect heat within a home. See the U.S. v. Hall decision.
  29. Policy issues include how to penalize a corporation, are criminal fines enough to deter corporations from illegal conduct, should an individual employee be imprisoned for a corporate culture of misconduct, should a corporation be held liable for employees acting illegally, etc.
  30. Every employee has a fiduciary duty of loyalty to his or her employer. This duty will conflict with a duty to society if the employer engages in illegal conduct. Numerous whistleblower protection laws exist. Though an employee probably will be protected by a federal or state whistleblower protection statute, the practical consequences of blowing the whistle on illegal conduct is that the employee will be terminated or, at the very least, ostracized. However, Time magazine selected three whistleblowers as Persons of the Year in 2002: Sherron Watkins of Enron, Coleen Rowley of the FBI, and Cynthia Cooper of WorldCom. See the article available at http://www.time.com/time/personoftheyear/2002/
  31. The hyperlink is to the opinion on the Oyez Project website. The Racketeer Influenced and Corrupt Organizations Act (RICO) makes it “unlawful for any person employed by or associated with any enterprise engaged in, or the activities of which affect, interstate or foreign commerce, to conduct or participate, directly or indirectly, in the conduct of such enterprise’s affairs through a pattern of racketeering activity or collection of unlawful debt.” 18 U.S.C. § 1962(c). A federal grand jury indicted Edmund Boyle for a violation of RICO § 1962(c) and for conspiracy to commit that offense, in violation of RICO § 1962(d). In addition, the grand jury indicted Boyle for conspiracy to commit bank burglary and nine counts of bank burglary and attempted bank burglary. Boyle requested a jury instruction that the government was required to prove that the enterprise “had an ongoing organization, a core membership that functioned as a continuing unit, and an ascertainable structural hierarchy distinct from the charged predicate acts.” The court refused to give that instruction. Boyle was convicted on 11 of the 12 counts against him, including the RICO counts, and was sentenced to prison. He appealed to the U.S. Court of Appeals for the Second Circuit, which affi rmed his conviction. The U.S. Supreme Court then granted certiorari in order to resolve confl icts among the various courts of appeals concerning the meaning of “enterprise” for purposes of a RICO prosecution. Court: “We are asked in this case to decide whether an association-infact enterprise under RICO must have “an ascertainable structure beyond that inherent in the pattern of racketeering activity in which it engages” (quoting Boyle’s certiorari petition)….The crux of Boyle’s argument is that a RICO enterprise must have structural features in addition to those that we think can be fairly inferred from the language of the statute…. We see no basis in the language of RICO for the structural requirements that Boyle asks us to recognize…. The instructions the district court judge gave to the jury in this case were correct and adequate…. Judgment of Second Circuit Court of Appeals affirmed.”
  32. Example of violation of Computer Fraud & Abuse Act: accessing a competitor’s computer to obtain customer lists
  33. False, since the government will contend that a higher duty to society exists. False, since RICO applies to civil violations as well as criminal violations. False, since such an act would be in violation of the Computer Fraud and Abuse Act.
  34. Allows students to raise questions and discuss issues they may have heard in the news.