CHAPTER 17 Criminal Law INTRODUCTION This chapter examines what a crime is, what the basics of criminal procedure are, and the major constitutional issues involving criminal procedure. The chapter also introduces other federal criminal statutes involving such areas as white-collar crime, computer crime, and environmental laws. 2 DEFINITION OF A CRIME Crime is an offense against the general public at large. The Criminal Act – actus rea The State of Mind – mens rea – Strict liability statues are generally disfavored. – Mens Rea: negligence, recklessness and intention. 3 CRIMINAL VS. CIVIL LIABILITY Not mutually exclusive; criminal law protects society as a whole by punishing the criminal, while civil law monetarily compensates the victim. Negligence Per Se – violation of a criminal statue that causes civil injury. Burden of Proof – Civil Trial – preponderance – Criminal Trial – beyond a reasonable doubt 4 SOURCES OF CRIMINAL LAW Types of Crimes – felony is a crime punishable by over one year in prison and/or a fine, or death; a misdemeanor is punishable by one year or less in jail and/or a fine. Ex Post Facto Clause – a person can be convicted of a crime only if the person’s actions constituted a crime at the time they occurred. The Model Penal Code – a set of criminal law statues that were proposed by the National Conference of Commission of Uniform State Laws for adoption by the U.S.. 5 THE FEDERAL SENTENCING GUIDELINES It gives judges less discretion. Federal Sentencing Guidelines for Individuals – parole abolished in 1984. Federal Sentencing Guidelines for Organizations – added in 1991. – Punishment under the guidelines. – Misgivings about the guidelines. – Guidelines should be updated for cyber crimes and cyber terrorism. – Letting employees take the rap. 6 CRIMINAL PROCEDURE Arrest – put in police custody. Preliminary hearing to demonstrate probable cause. Arraignment – the accused is asked to state his or her response to the charges: guilty, not guilty, or nolo contendere. Plea Bargaining – a reduced charge and sentence for a guilty plea. – Use Immunity – cannot use testimony against the witness in any way. – Transactional Immunity – no criminal charges on any matter discussed in the witness’s testimony. – Consent Decree – court order based on an agreement by the defendant corporation to take steps to remedy the problem that led to the criminal charges. • Trial 7 FOURTH AMENDMENT PROTECTIONS The Arrest Warrant Requirement – probable cause required for arrest or for a seizure. Searches and Seizures and Reasonable Expectations of Privacy – police need a warrant because of very strong privacy expectations in the home. – Warrantless searches – most police searches are of this type because the search is either not unreasonable under the circumstance, or – Search falls within the six established exceptions to the search warrant requirement. – Distinction between visual and tactile search [Bond v. U.S. (2000)]. 8 FOURTH AMENDMENT PROTECTIONS Suspicionless and Adminstrative Searches and Seizures. – Thermal Imaging scanners [U.S. v. Kyllo (2000)]. – Cordless, Cellular Phones and Email. Obtaining a search warrant – three requirements: probable cause basis, supported by oath or affirmation, and especially detailed as to what is to be searched and seized. 9 THE EXCLUSIONARY RULE The fruit of the poisonous tree, excludes evidence seized in violation of the Fourth or Fifth Amendments. Exceptions: “Good faith” “Inevitable discovery” 10 FIFTH AMENDMENT PROTECTIONS Self-Incrimination – applies to criminal cases. – Business records and papers and the Collective Entity Doctrine. – Foreign prosecutions Double jeopardy – cannot be tried to a verdict twice for the same crime. – Civil and criminal prosecutions by the government. Due Process and voluntary confessions. 11 SELF-INCRIMINATION Case 17.2 Synopsis. United States v. Hubbell (US, 2000). During an independent counsel investigation of possible violations of federal law by former president Bill Clinton, his wife Hillary, and their Arkansas law partners in connection with the Whitewater Development Corporation, Webster Hubbell entered into a plea bargain. Hubbell pled guilty to charges of mail fraud and tax evasion, and promised to provide full information relating to the Whitewater investigation. The independent counsel later served Hubbell with a subpoena for eleven categories of Whitewater documents. Hubbell attempted to invoke the Fifth Amendment privilege against selfincrimination, but was required to provide documents and records with the assurance that he would be granted immunity “to the extent allowed by law.” CONTINUED 12 SELF-INCRIMINATION Case 17.2 Synopsis. (Cont’d) The contents of the documents provided the basis for a second grand jury prosecution of Hubbell in which he was indicted on ten counts of tax-related crimes and mail and wire fraud. Hubbell challenged the indictment on the grounds that it was based on the documents produced by Hubbell under a claim of immunity, in violation of his privilege against self-incrimination. ISSUE: Does the Fifth Amendment privilege against self-incrimination protect a witness from having to testify about the existence and sources of potentially incriminating information? HELD: YES. Indictment was dismissed. 13 SIXTH AMENDMENT PROTECTIONS Assistance of Counsel – a right in most criminal prosecutions. Jury Trial – allowed in most criminal trials. Other Procedural Rights – speedy trial, right to confront and to cross-examine witnesses. 14 NON-CONSTITUTIONAL PROTECTIONS Prosecutors must provide the defendant with all the information requested. Attorney-Client Privilege – protects the relationship that has been established. 15 LIABILITY FOR CRIMINAL ACTIONS Individual Liability – criminal act against, or for, a corporation. Vicarious Liability – managers liable for employee’s acts. – Responsible Corporate Officer Doctrine [U.S. v. Park (1975)]. – Impossibility defense to strict liability. Corporate Liability – vicariously liable if employees’ acts are within the scope of their duty. 16 WHITE-COLLAR CRIME A violation by a corporation or one of its managers. Types – Larceny – Embezzlement – Fraud – Bribes Crime by a Corporation – such as consumer fraud, securities fraud, tax evasion. Pollution, price fixing, misappropriation of trade secrets, and violations of copyrights, patents, and trademarks. 17 RACKETEER INFLUENCED AND CORRUPT ORGANIZATIONS ACT RICO prohibits: – Investing in any enterprise of income derived from racketeering – Acquisition of an Interest in an enterprise through a pattern of racketeering activity. – Participation in an enterprise through a pattern of racketeering activity involving at least two related predicate acts, in a ten year period. – Conspiracy to engage in any of these activities. 18 RICO RICO Requirements – broadly defined. Use of RICO – partially effective against insider trading. Penalties under RICO: – Criminal: fines and imprisonment up to 20 years. – Civil: individuals can recover treble damages and attorney’s fees. 19 THE WIRE AND MAIL FRAUD ACTS AND THE FALSE STATEMENTS AND CLAIMS ACTS Wire and Mail Fraud: – Scheme intended to defraud or obtain money/property by fraudulent means. – Use of mail or interstate phone lines in furtherance of the scheme. False Statements Act (1994) False Claims Act – used against defense contractors and health care fraud. 20 COMPUTER CRIME Computer Fraud – use of computer to steal company or government money. – Computer Fraud and Abuse Act (CFAA). – Computer Piracy – theft or misuse of software. – Computer Viruses View From Cyberspace: Fighting CyberCrime 21 COMPUTER FRAUD AND ABUSE ACT (CFAA) Case 17.3 Synopsis. Shurgard Storage v. Safeguard Self Storage, (W.D.Wash. 2000). Shurgard sued a competitor, Safeguard, for allegedly embarking on a “systematic” scheme to hire away key employees for the purpose of obtaining trade secrets. Shurgard claimed Leland, its employee, used Shurgard’s computers to access various trade secrets and proprietary information belonging to Shurgard, and to send e-mails containing the information to Safeguard. The emails were sent to Safeguard while Leland was employed at Shurgard. at the time he sent the e-mails. CONTINUED 22 COMPUTER FRAUD AND ABUSE ACT (CFAA) Case 17.3 Synopsis. (Cont’d). Shurgard alleged misappropriation of trade secrets, conversion, unfair competition, tortious interference with a business expectancy, and violations of the Computer Fraud and Abuse Act. Safeguard moved to dismiss the CFAA claims. ISSUE: Does the CFAA apply to an employee’s use of his employer’s computer to email misappropriated trade secrets to a competitor? HELD: Motion to Dismiss was DENIED. . . . [T]he CFAA was intended to control interstate computer crime, and since the advent of the Internet, almost all computer use has become interstate in nature. 23 CRIMES INVOLVING INTELLECTUAL PROPERTY The Copyright Act – criminalizes the willful infringement of copyrights for commercial gain. No Electronic Theft Act – permits federal prosecution of willful copyright infringement, even if the infringer has not acted for his or her commercial advantage or private financial gain, if the infringer reproduced or distributed one or more copies of a copyrighted work with a retail value in excess of $1000. Economic Espionage Act of 1996 – theft of trade secrets a federal crime. 24 TAX AND ANTITRUST LAWS The Sherman Act – Penalties – Prosecution Securities Law Violations – Federal Securities Laws • 1933 Act • 1934 Act Blue Sky Laws 25 BLUE SKY LAWS Case 17.4 Synopsis. Mueller v. Sullivan (1998). Mueller controlled Farm Loan Services, an auction house for the sale of securities. He was charged with violating Wisconsin’s version of the Uniform Securities Act, which provides that the willful omission of material facts in connection with the purchase of sale of securities is a crime. The trial judge instructed the jury that Mueller could be convicted under the act if the prosecution proved that he knew that the investors were not being told relevant information that was objectively material. Mueller and Stopple were subsequently convicted. CONTINUED 26 BLUE SKY LAWS Case 17.4 Synopsis. (Cont’d) Mueller challenged his conviction, claiming that the Due Process Clause of the Fourteenth Amendment required a more stringent showing of mental state, specifically, the intent to deceive, required in cases under Section 10(b) of the Securities Exchange Act of 1934 (1934 Act), on which many sections of the Uniform Securities Act were modeled. ISSUE: Does the Due Process Clause permit conviction for violation of state securities laws when the defendants knew what they were doing, but did not know that it was illegal? HELD: YES. 27 OTHER FEDERAL CRIMINAL REGULATORY LAWS The Environmental Laws – The Clean Water Act – The Resource Conservation and Recovery Act The Occupational Safety and Health Act – OSHA Requirements – safe work environment – Penalties under OSHA – civil and criminal – State Law Prosecutions of Workplace Safety Hazards The Foreign Corrupt Practices Act 28 REVIEW 1. Discuss the positive and negative aspects of the Federal Sentencing Guidelines. 2. Explain why a search warrant is not needed for a cellular telephone conversation. Should a warrant be required for thermal imaging? For email? 3. Does the FBI’s “Carnivore” software that monitors our email violate our right to privacy? 4. What creative sentencing and punishment should be imposed for computer crimes and cyberterrorists? 29