On-Line Threats and the Law: 

a Case Study of Threats in Higher Education

 

By Daniel G. Pinegar

Table of Contents:

                                                                                                                                                                                            Page

I.                     Introduction                                                                                                                                              1

II.                   The Dental School Case                                                                                                                         7

A.                  The Threats

B.                   The Sting

C.                   The Arrest

D.                  Post-Arrest

III.                 The Jake Baker Case                                                                                                                              16

A.                  The Baker Threats

B.                   The Federal Law

C.                   Federal Law as applied in the Baker case

IV.                 Conclusion                                                                                                                                              25

 

*              *              *              *              *

 

I.                     Introduction:

 

In the year 2000 admission cycle at college’s across the country, the number one essay topic was far and away the impact that school shootings like in Columbine, Colorado had on the individual.[1]  Maybe the individual was a student at such a school; maybe they knew a student who was; or maybe they just watched the news reports on television with the rest of the nation.  While incidents of carrying through on any act of violence are obviously pursued to the greatest extent of the law, threats of violence are not always pursued as aggressively, and yet today they are taken more seriously than ever before.  The question that remains is what happens when a threat of violence or illegal activity is taken into the on-line world and what is the impact that on-line threats are having on our educational institutions. This paper examines two such cases and their impact on a community through the eyes of journalists.

 

                1975:  “I am going to blow up the school.”  Said a mysterious man on the end of a telephone call to the local principal’s office secretary.  Class bell rings.  End of fourth period.  Homeroom time.  The secretary read off the normal announcements on the speakerphone. Then the next person came on to read off the next day’s lunch menu. No one ever listened.  But then the Assistant Principal said he had a special announcement and the teacher shushed us all.  “Due to a needed teacher day, school will let out at 2:00 PM for in-service.  If you need to call to arrange a ride home early please stop by the office.”  It was odd since in-service days were usually planned far in advance, but we didn’t care.  School was out! 

But then I heard from Jimmy, a another kid who worked in the principal’s office running errands and messages.  He said that a bomb threat was made and the school was being dismissed to have the local police search the school.  After that, the rumors flew around the school faster than Buzz Light-year – as it turned out, Ms. Paul’s Science class was supposed to take an exam in

sixth period.  The bomb threat prank worked.  Over time the school became used to the threats which gave birth to complacency, until one day when an explosion ripped through the school cafeteria.  3 dead, 24 injured.  School was never the same.   

               

 

Of course, the advent of various technologies and electronic communication have only expanded the scope of harassment and threats.  Indeed, electronic harassment, threats, and cyberstalking may well be “the crime of the 21st century.”[2] With an increasing 90 million people in the U.S. who log onto the Internet, the criminals of yesterday likewise will increasingly ride the wave into tomorrow. Nearly 30 percent of the complaints to the “Web Police” in 1998 involved harassing or threatening electronic mail (e-mail), a three-fold increase over the reports from 1997.[3]

What e-mail does, however, is that psychologically it provides the sender with the sense that “there will be no ‘real world’ consequences” and that anonymity is be virtually guaranteed.[4]  Indeed, “people park their inhibitions when they get online.”[5]  At the same time, although it may be harder to trace a sender or an e-mail, the mere medium used does not effect the result achieved from the harassing or threatening electronic communication.[6] Despite any Constitutional or First Amendment protections,[7] with just a simple click of a button,[8] an e-mail can become a surgical attack on an individual, class of persons, or location. The damage will already be done and increased anecdotal reporting by the media confirm this.

A student can leave a bomb threat about his school in an Internet chat room,[9] or, after traditional violence, a copy-cat can send an instant message implying continued violence.[10] A racist student can send death threats through e-mails.[11] While other students may write obscene rape fantasies and post them on bulletin boards,[12] threatening to act on them,[13]  or encouraging others to act on them.[14] Simply, any threat or harassment scenario can be duplicated or intensified in the electronic sphere.  Additionally, conventional stalking is also being transformed in the information age.  In one survey of college women[15] who reported they were stalked in an academic year, 24.7 percent were stalked electronically by e-mail.[16] As a result of the abuse of new electronic communications, in major cities like New York and Los Angeles, police and district attorneys have formed special technology stalking and threat assessment teams who estimate an even higher percentage of their caseloads involve “cyberstalking-type cases.”[17]

Of course, although beyond the scope of this paper, online threats or harassment are not limited to educational institutions or students.  An employee can harass his employer.[18] An estranged lover[19] or fan of a celebrity can virtually maul another with cyberstalking.[20] One’s family can be threatened.[21] Or a person can threaten harm to a building or roadway.[22]

Unfortunately, both the victim’s and law enforcement already face steep learning curves.  Victims suffer because the anonymity that the early information age and items like e-mail affords people[23] allows these suspect behaviors to only increase, causing greater alarm, fear, and manipulation.[24]  Likewise, because of a more wary social climate and the easily recorded nature of an electronic transmission, police and authorities will more frequently be urged by the victims to act in areas that require fine lines to be drawn between Constitutional freedoms and illegal activities in areas that many in the police community still do not treat as “credible threats” [25] or within their jurisdiction.[26] As a result, the concern with this “crime”[27] and the challenges it presents[28] will only continue to grow.[29]

Although there have been a few attempts at describing the issue of what occurs when threats and harassment move into electronic mediums of communication,[30] while providing rich sources and examples, none has adequately discussed various criminal statutes available to combat the problems of electronic harassment, threats and cyberstalking nor adequately segregated these legal problems. To aid in this discussion,  allegedly illegal actions, this paper will examine two cases where online threats in higher education have had a terrifying impact on college communities.

 

II.            The Dental School Case:[31]

 

                For a three-week period in March and April of 2000, the University of Iowa was terrorized by an anonymous e-mailer making a pattern of threats against minority students.  Although a single student was eventually arrested for the events, it took time and innovation since the e-mailer used no less than three fictious accounts and names. 

                A.            The Threats:

                On Tuesday, March 28, 2000 the first email was sent out.  The Dean of the College of Dentistry, David Johnsen, and three faculty members received the email.  The e-mail demanded that the school get rid of its minority students and threatened bomb violence, as possible forms of action if it did not within three days if nothing happened.[32]  “The e-mail said the dental school was a random place to start and that the group will try to rid all minorities – with blacks going first – from the UI.”[33]  The e-mail was sent from the e-mail address “minoirtyrid@excite.com” [sic].  The Excite.com address was registered to an Iowa City male. 

                On Thursday, March 30, 2000 the second email was sent from “minoritygetout@excite.com.”  This time eight College of Dentistry students, all minorities, received the email.  It continued threats of violence and threatened the use of gun violence against students, and that the students and their families should fear for their lives.  It also said that the person or people sending the e-mail would be responsible for any vandalism to the cars of the minority students and advised them to stay home from school.[34] 

“According to the Excite.com Webpage, neither of the two accounts were active as of Sunday afternoon.  The [alleged] groups sending the e-mail goes by four names – Minorityout, Minoritygetout, Minorityrid Committee and the Committee of Minority Flight – but Rhodes said she thought one person was probably responsible for the threats.  Rhodes said the e-mails were consistent in nature and did not appear to be the work of a national group because they were unorganized and poorly written.  Investigators determined that the first e-mail posed no ‘credible’ threats to the students, but the second seemed to be more directly aimed, Rhodes said.”[35] 

                On Tuesday, April 4, 2000, Kurt Holmes, an African-American Dental School student discovered outside of his apartment at 2425 Bartelt Road, Apt. #2B in Iowa City a package.  In the package was a quantity of noodles dyed red along with a note which read “Dead Black Man’s Brains.” 

                On Thursday, April 6, 2000, a coat caught fire in the Dental School.  The fire broke out just before 10 AM, when a coat apparently was ignited by a Bunsen burner, said Steve Parrott, the director of university relations.  The fire was put out by a dental student who used a fire extinguisher, and nobody was injury, Parrott said.  The Iowa City Fire Department responded to an alarm, but the fire had already been put out by the time firefighters got there, he said.”[36]  According to one fourth-year dental student, “a lab coat catching on fire in the dental lab is not uncommon – in fact, it happens at least once a year.  What’s unusual, she said, is that nobody was wearing the coat.”[37]  Authorities quickly discovered just how unusual the incident was when a third email later that day claimed responsibility for setting the coat ablaze.  It asked, “Are you going to take us seriously now?”[38] 

                After two weeks of this Tuesday-Thursday pattern of threats,[39] an impromptu rally was held on the University of Iowa campus, “Walk the Walk.”  Approximately 1,000 students marched beside President Mary Sue Coleman, Mayor Ernie Lehman made the 15-minute hike from the Pentacrest to the Dental School for a rally at approximately 11:45 A.M.  “The crowd held several signs that denounced racism and shouted chants such as, ‘Hey hey, ho ho, racism has got to go,’ and ‘if you talk the talk, walk the walk.’”[40]

                A fourth and final email was sent on Tuesday, April 18, 2000.  The e-mail originated from the address “BOMBSQUAD52244@yahoo.com” and was signed “mejones.”[41]  “At approximately 1:20 PM, an undisclosed number of students and administrators within the dental school, none of whom were minorities, received the message, said Ann Rhodes, the UI vice president for university relations.”[42]  This time the email was more explicit and included a bomb threat against the school.  The e-mail reportedly stated, “We want you to come out and protest, but everyday you should say goodbye to your family and loved ones.  Let the war begin.”  The threat was issued with a window of Wednesday, April 19, 2000 through Friday, April 21, 2000.[43]  “The account registered for the address on the Yahoo! Web site – bombsquad52244 – identifies the user only as male and was last updated on Tuesday.”[44] 

As a result of this e-mail, the Dental School closed its doors Tuesday evening and canceled classes for Wednesday while the building was searched for a possible bomb until 6:30 A.M. Thursday.  “This was the first building closing due to a bomb threat, said Steve Parrott, the UI director of university relations [and] this was the UI’s first closure of a building in more than 30 years, during the anti-Vietnam War demonstrations.”[45]  “Approximately 30 members of bomb squads from Johnson and Linn counties, Marion Township the state Fire Marshal’s Office and UI public safety conducted an ‘extreme and thorough’ investigation of every locker and office in the building.”[46]  All locks to the building were also changed, and administrators had to determine who got new keys.[47]  Reopening only the third-level entry door, with increased security precautions and two security guards, students were searched upon entering.  Officials opted not to use a metal detector.[48] 

 

                B.            The Sting:

                “The threats received a tremendous amount of publicity in the local media, and university officials were under added pressure to find the culprit.”  Charles D. Green, Director of Public Safety for the 28,000 student university, said “his officers used a combination of old-fashioned police investigative techniques and 21st century cyber sleuthing to nab Claiborne.”[49] 

                “Although cyber-crime is new, basic tracking techniques used to combat it haven’t changed since the Internet’s inception, said Doug Jones, a UI Associate professor of computer science.  The first step is to examine the message’s header in its entirety, he said.  The 15-20 lines of delivery information in the header is the most important because this is where the e-mail’s forwarding agents are identified, Jones said.”[50] 

                “Next, by examining the message’s path, investigators can identify the Internet service provider.  Authorities then determine information about the sender by working with the service provider, which is usually very cooperative, Jones said.  ‘They don’t want to be seen as a shelter for abusive use,’ he said.  Online e-mail services, such as Excite.com in the Claiborne case, are also involved in the process.  Once the companies have been altered, they help track the alleged Internet criminal when he or she logs on.”[51] 

                “Authorities were able to determine Claiborne’s identity by working with Excite.com to pinpoint the origin of the e-mails sent from the addresses ‘minoirtyrid@excite.com’ and ‘minoritygetout@excite.com.’  Once the e-mail activity was tracked back to the computers in the UI’s Pathology Learning Center Instructional Technology Center, [approximately three blocks from the Dental Sciences Building], authorities placed the site under surveillance.”[52]  “Claiborne was seen on videotape leaving the ITC, Rhodes said.  A member of the dental faculty identified Claiborne on the surveillance video Wednesday, she said.”[53] 

 

 

 

 

Map of Dental School & Pathology ITC

 

 

HERE

 
According to Sgt. Duane Papke of UI Public Safety, with the rise of internet crime authorities have been forced to go about investigations in a different way.  “It’s a completely new ball game. Its definitely something that we will be dealing with more on a daily basis in the future, so we need to be prepared.”[54]  

 

                C.            The Arrest:[55]

                Three weeks after the first email was received, the suspect was caught.  Police reports indicate that Tarsha Michelle Claiborne was arrested at her apartment, 2427 Bartelt Road, Apt. 2A, at 12:20 A.M. on Thursday, April 20, 2000.  Claiborne, who is a native of Baton Rouge, La., has a Bachelor of Science degree from Xavier University of Louisiana in 1998.  Apparently a talented piano and violin player, “U of I officials said there was no evidence that she was having trouble academically or had been under any undue stress since coming to Iowa City.”[56]  As a second year dental student, she is one just of 13 black students in the entire dental school.  She was charged with “six counts of third-degree harassment, criminal trespass elevated to hate-crime status and threats in violation of individual rights.”[57]  “While Claiborne has allegedly admitted to sending the e-mails, the investigation continue[d].”[58] 

Armed with a search warrant, “more than 40 items relevant as evidence in the criminal prosecution were recovered during the search of Claiborne’s car and apartment, including lists of the names of dental school victims and others, according to court documents.  Officials also confiscated issues of the Daily Iowan found in her car and apartment that covered the recent threats. One of the issues recovered, the Nov. 29, [1999] issue, includes an article about the low number of hate crimes in Iowa.”[59]  Police Sgt. Bill Campbell also said they “found ramen noodles, red dye, [and] paper matching the handwritten note” that said ‘Dead Black Man’s Brains’ which was left on the doorstep of a third-year minority dental student, whom Claiborne knew and who lived in an adjacent building.[60]  “Authorities also seized computer equipment and information related to the e-mail victims from the apartment, Campbell said.  There were no weapons or explosives found inside Claiborne’s apartment, he said.”[61]

Claiborne was initially only charged with two counts in connection with the threats.[62]  The first charge was specifically related to the last email which shut down the school because it contained a bomb threat.  It read:

Count I:  Threats – Violation of Individual Rights – “The said Tarsha Michelle Claiborne on or about the 18th day of April, A.D., 2000, in the County of Johnson, State of Iowa, did threaten to place, or attempt to place, any incendiary or explosive device or material, or any destructive substance or device in any place where it will endanger persons or property, committed against a person because of the person’s race, color, ancestry, national origin or because of the person's association with other persons of a certain race, color, ancestry or national origin, to-wit:  the Defendant sent a bomb threat by electronic mail to facility [sic], staff and students of the University of Iowa College of Dentistry which e-mail continued earlier e-mails, specifically targeting minority students as targets of hate and injury, in violation of Section(s) 712.8, 719.9 and 729A.2 of the Iowa Code.”

 

The second charge dealt with the physical action that Claiborne allegedly took by placing a package of noodles and the “Dead Black Man’s Brains” note outside the apartment of a fellow minority student.  It read:

Count II:  Trespass – Violation of Individual Rights – “The said Tarsha Michelle Claiborne on or about the 4th day of April, A.D., 2000, in the County of Johnson, State of Iowa, did enter upon property without the express permission of the owner, lessee or person in lawful possession, with the intent to commit a public offense, harass, or place thereon or therein anything animate or inanimate, or for the purpose, or with the effect of unduly interfering with, the lawful use of the property by others, committed against a person because of the person’s race, color, ancestry or national origin, to-wit: the Defendant went on the property at 2425 Bartelt Road in Iowa City, Iowa, and placed a quantity of noodles dyed red and a note stating “Dead Black Man’s Brains,” which address was occupied by an African-American male, in violation of Section(s) 716.(1) and/or 716.8(c) and 729A.2 of Iowa Code.”[63]

 

A third count was added for Claiborne’s allegedly setting a lab coat on fire in the Dental School.  It read:

Count III:  Reckless Use of Fire – “The said Tarsha Michelle Claiborne on or about the 18th day of April, A.D., 2000, in the County of Johnson, State of Iowa, did use fire or any incendiary material so as to recklessly endanger the property of [sic] safety of another, to-wit:  the Defendant did place a coat on or in immediately [sic] proximity to a Bunson [sic] burner in Room N208 of the University of Iowa College of Dentistry, in violation of Section(s) 712.5 of Iowa Code.” [64]

 

Claiborne was also charged later with Possession of a Schedule I Controlled Substance after police found a small amount of marijuana in her apartment when it was searched.[65] 

 

D.            Post-Arrest:

                                ·  Ann Rhodes Comment:

                “There is a saying in journalism circles that good reporters ‘Never Assume.’ … The University of Iowa was rocked when the suspect turned out to be Tarsha Claiborne. … But then the improbable became the incredible.  And the result has been that a bizarre hate crime case has been eclipsed by an example of more subtle bias.”[66] 

At a press conference held on April 20, 2000 to discuss the arrest, a reporter asked Ann Rhodes, Vice President of University Relations, if she was surprised the person arrested was a black female dental student.  Rhodes replied, “I figured it was going to  be a white guy between 25 and 55 because they’re the root of most evil.”  This comment quickly became a story in itself.  “Several hours after Rhodes’ comment, the Office of University Relations issued an official apology from Rhodes for the statement she called a ‘poor attempt at humor.’” 

                In response to the comment, “more than 300 negative phone calls and e-mails [were] logged with the school following Rhodes’ comments.”[67]  In addition to negative publicity,[68] the California-based European American Issues Forum President Louis Calabro filed a complaint with the Department of Education Office of Civil Rights against the UI for Rhodes’ comment on April 27, 2000.[69]  That complaint was dismissed on June 9, 2000.[70]  Nonetheless, Rhodes stepped down from her position effective July 1, 2000.[71] 

                Meanwhile, President Mary Sue Coleman had issued her own statement directed to the entire University of Iowa Community in an email on April 21, 2000.  In it she stated that:

Yesterday’s arrest in connection with threats against minority students in the College of Dentistry has brought a measure of relief, tinged with sadness and confusion.  One thing is clear:  we still have much work to do to rebuild trust and regain our sense of common purpose.  I want to assure all persons on campus that you are valued members or our community, both individually and collectively.  Each of you has earned your place here on the basis of your individual merits.  No person’s credibility, now or in the future, should be compromised by this unfortunate incident.  Instead, let us take it as a wake-up call that reminds us that we should judge each other as individuals, by the content of our character.  And now I hope we can move forward, in accordance with our core values, to ‘encounter each other in a spirit of cooperation, openness, and mutual respect, to form a richly diverse and intellectually stimulating community.’

 

(Emphasis added).  The same anger that was raised against Rhodes’ comment could have easily been asserted against President Coleman herself.  The question never answered is why the arrest is “tinged with sadness and confusion” if the race of the pre-arrest alleged perpetrator wasn’t a factor? 

                                · Psychiatric Assessment and Bail:

                A personal signature bond was set at $53,500 for Claiborne[72] and although defense attorneys asked the judge to reduce it, their motion was denied.[73]  With court approval, Claiborne was evaluated in the Johnson County Jail by Dr. E. Enekwechi of the University Counseling Service (UCS) on April 28, 2000.  Dr. Enekwechi diagnosed Claiborne with Major Depressive Disorder (severe) “causing disabling physical and psychological symptoms.”[74]  Claiborne was transferred to the University of Iowa Hospitals and Clinics (UIHC) for psychiatric evaluation on May 2, 2000.[75]  Claiborne finally posted bond on May 17, 2000 and was released from the UIHC to return to Baton Rouge, Louisiana to live with her mother, Lillie Addison Claiborne, pending trial.  The court ordered Claiborne “not to initiate personal contact in any form with the University of Iowa College of Dentistry or its faculty, staff and students.”[76]

                                · Not Guilty Plea:

                On June 15, 2000 defense attorneys for Claiborne filed a written plea of not guilty in lieu of a court appearance while Claiborne was staying in her hometown of Baton Rouge, Louisiana.[77] 

                                ·  Diminished Capacity defense: 

                Many people wondered what excuse the accused might have for making the various threats, but according to Andrea Herbster, a UI law student, “I would certainly not excuse her actions because of the stress of graduate school.  These actions go way beyond stress but may have exacerbated her feelings and made her more willing to act out her emotions.”[78]  Instead, Claiborne’s attorneys felt that the stress of her father’s death due to cancer a year earlier could be the source of a possible defense.[79] 

On July 10, 2000, Claiborne’s attorneys announced their defense.  “Claiborne’s attorneys were required to file a notice [under Iowa Rule of Criminal Procedure 10(11)(b)(1)] saying they would use the diminished-responsibility defense before her trials, but Leon Spies declined to comment on why the defense was chosen or how the attorneys will use it.”[80]  “Diminished responsibility differs from a claim of insanity in that it cannot be used as an entire criminal defense, Spies says.  It can affect only certain elements of the defense, he says.  Diminished responsibility can also result in a conviction of a crime or degree of crime less serious than originally charged.”[81]

                “Insanity defense claims the defendant was incapable of distinguishing right from wrong because of a mental illness of some kind, Spies said.  Claiborne’s defense of diminished-responsibility claims that she had a limited capacity to think about the nature of her actions, Spies said.”[82]  “He declined to comment on other defenses considered and Claiborne’s involvement in the decision-making process.”[83]

                “A diminished-responsibility defense is not unusual, but the opportunity to use it does not come up very often, Iowa City attorney Randy Larson said.  It can help convince the jury that the defendant was not completely aware of the nature of her or his actions, Larson said.  At the UIHC, Claiborne was diagnosed with depression.  Johnson County Attorney J. Patrick White declined to comment on how the new defense will affect the prosecution’s approach to the case.”[84]  However, as determined from the Judge’s canceling of the scheduled March 5, 2001 trial, a plea agreement was apparently agreed upon.[85] 

·  Drug Charges & Plea: 

                Upon searching Claiborne’s apartment police discovered an undisclosed amount of marijuana.  Claiborne returned to Iowa to face the separate drug charges stemming from her arrest and pleaded guilty in November, 2000 to possession of a schedule I controlled substance.  She faces a sentencing/plea hearing on May 3, 2001. 

 

E.             Sentencing:

                Currently Claiborne is set to enter a guilty plea on the remaining charges and be sentenced on May 3, 2001.  Claiborne could face up to 10 years in prison and a fine of $10,000 for Count I, a Class C felony;[86] up to 1 year in prison and a fine of $1,500 for Count II, a Serious Misdemeanor;[87] and up to 30 days in jail and a fine of $500 for Count III, which included 6 emails, a Simple Misdemeanor.[88] The Judge could order that her sentence, potentially totaling 11 years, 6 months and a fine of $14,500 be carried out consecutively (meaning 11 years, 6 months) or concurrently (meaning at most 10 years).  Parole may or may not be available. 

 


III.           The Jake Baker Case: [89]

While the Claiborne case presented an example of direct threats carried online and the application of one’ state’s laws to this problem, the only real issue was when would the perpetrator be caught and how much time would they serve.  However, the much more difficult case is the indirect threat carried online and its federal law counterparts as the Baker case illustrates.  Simply, the results are not always expected. 

 

A.                  The Baker Threats:

The Baker case began in 1995 when a student at the University of Michigan, Jake Baker, wrote several “fictional stories”[90]  and posted them on a Michigan University Usenet[91] electronic bulletin board.  Two people discovered one such story and reported its existence to the University of Michigan.  In one snuff[92] story entitled, “Doe,”[93]  Baker wrote in lurid detail about the sadistic abduction, bondage, mutilation, torture, sodomy, rape, and murder of a victim.[94] “For the denouement, they pour gasoline on her and then say good-bye with a lit match.”[95] The “fictional victim” whom the story was named was a female classmate. 

After authorities discovered that the author of Doe and the victim were both University students, they  visited Baker’s dormitory room.  Amazingly waiving his rights, Baker consented to a search of his room, computer and e-mail accounts.  Baker was then arrested and charged with violating and conspiring to violate 18 U.S.C. § 875(c).[96]  Although initial charges alleged criminal activity because of the stories, these charges were replaced with charges based entirely on an “e-mail relationship which would span nearly two months and include over 40 exchanges”[97] between Baker and a party named in the e-mails, Arthur Gonda.[98] Thus, although academic analysis can include these stories, the legal analysis of the case does not.[99]

Of course, before answering whether Jake's speech was protected by the First Amendment,[100] it is necessary to know the content of what he actually wrote in the e-mails.  Central to the charges by prosecutors were e-mails that were alleged to communicate “an intent to threaten another in interstate commerce.”[101]

[Baker]:  “I highly agree with the type of women you like to hurt.  You seem to have the same tastes I have.  When you come down, this’ll be fun!  Also, I’ve been thinking, I want to do it to a really young girl first.  !3 [sic] or 14.  There [sic] innocence makes them so much more fun—and they’ll be easier to control.”  ...

 

[Gonda]:  “I would love to do a 13 or 14 year old.  I think you are right ... not only their innocence but their young bodies would really be fun to hurt. ... [O]nce they are tieed [sic] up and struggling we could do anything we want to them...to any girl.”[102]

 

In another series, the two discussed a method to kidnap a girl because Baker’s dormitory room was located across from the girl’s bathroom;[103] in yet another Gonda relayed information about the type of girl he'd like to “do” from the Teale-Homolke serial killings in Canada.[104]

 

B.                  The Federal Law:

So, were Baker’s electronic communications protected speech or were they the exact type of electronic threat that will be the crime of the 21st century?[105]  What the Baker case highlights is that the prosecutor must overcome a variety of hurdles to meet the burden placed on them – the statutory actus reus, mens rea, and the constitutional requirement of a true threat – and the courts have at times been unclear as to what satisfies much of that burden. 

Today, the standard test to prosecute under 875(c) requires three elements as laid out by the court in United States v. DeAndino:[106]  “(1) a transmission in interstate commerce; (2) a communication containing a threat; and (3) the threat must be a threat to injure the person of another.”[107] Although this section is contained in Chapter 41 – Extortion and Threats, and one of Baker’s e-mails alluded to abduction, an intent to kidnap or extort is not necessary to prosecute interstate threats. [108] While at one time the law was applied almost exclusively to instances of extortion stemming from its enactment in 1932, [109] the scope of 875(c) has been broadened by the courts to apply to many people who merely make threats via modes of interstate commerce, as in the Baker case.  Nevertheless, the simplicity of the statute is deceptive.  And perhaps most importantly, the Baker case presents a stark contrast of how easy it is for courts to distinguish direct threats from indirect threats by whom the threat was directed, despite any common sense understanding that either were unambiguous threats.

·  The Actus Reus:

To meet the first prong of 875(c), the actus reus, one need only send the communicated intent vis-à-vis “interstate commerce.”[110]  Recently, United States v. Kammersell[111] found that e-mail and electronic communications can be regulated under the interstate commerce clause and that an alleged threatening e-mail sent via the internet satisfied the actus reus requirement of 875(c).[112] 

·  The “Threat:”

Second, although the statutory requirement and Constitutional requirement for 875(c) have not always been distinguished, however, in light of both the majority and dissenting analyses in Alkhabez, it is clear that the scope of the statutory term “threat” is limited only to that defined by the Constitution. 

Thus, so long as there is a credible threat from an objective standard – determined by the jury – there is a statutory “threat.”  In other words, if two circles represented the breadth of the “threat” doctrine, one for the statute and another for the constitution, the two circles will necessarily be concentric – the statute’s scope of what constitutes a threat being restricted by definition to that which can be prosecuted as a threat under the Constitution.[113]  As a result, the analytical focus should rest on whether the mens rea of 875(c) and constitutional safeguards are met.  As applied, authorities in the Claiborne case clearly determined that although the first e-mail was not a sufficient “credible threat,” and perhaps could be interpreted to be merely a political statement, after the second email was sent directly to minorities indicating violence the “credible” or “true threat” standard was met.

· The Constitutional Element of 875(c) – the True Threat Doctrine: [114]                                  

Of course one must already have in mind the basic First Amendment structure that prohibits Congress from making any law that, “abridges the freedom of speech.”[115] Although, the First Amendment prevents the government from proscribing speech,[116] freedom of speech has never been interpreted “to give absolute protection to every individual to speak whenever or wherever he pleases, or to use any form of address in any circumstances that he chooses.”[117] In our case, it is clear that the Constitution prohibits speech when it is threatening and creates a fear of violence.[118]   However, the scope of this prohibition is what is at issue here.

The underlying question is of course when does protected ‘pure speech’ become unprotected and criminally punishable. In United States v. Watts,[119] the Supreme Court established the “standard” to distinguish between these two types of speech, stating that, “what is a threat must be distinguished from what is constitutionally protected speech.”[120]  The standard that developed is the “true threat” doctrine. 

The facts of Watts centered around a speech that followed a political rally in opposition to the Vietnam draft near the Washington monument in D.C.  An Army Counter Intelligence Corps officer observing Watts heard him make statements to a group after the rally.  Allegedly he said, “I have got to report for my physical this Monday coming.  I am not going.  If they ever make me carry a rifle the first man I want to get in my sights is L.B.J. They are not going to make me kill my black brothers.”[121]  In response to Watts’ statements, the “crowd laughed.”[122]  Nevertheless, Watts was arrested and charged under Section 871(a) – threatening the president.[123]  In a six-three per curiam decision the United States Supreme Court reversed Watts’ initial conviction because the “threat” was too tenuous in nature and hence not a “true ‘threat.’”[124]  Additionally, Justice Fortas and Harlan both dissented in Watts because the Court made this decision without a hearing.[125]   

Arguably, however, if a court would apply this “doctrine” as developed to general stalking or harassment statutes, it is not unreasonable to conclude that nearly all but the most explicit or direct threats and forms of harassment would be constitutionally legally protected speech – contrary to the historical codification of threat and harassment laws.[126] 

However, there are several reasons why the non-“true threat” statements should not be interpreted as a “doctrine” outside of the unique factual situation presented in Watts.[127] Likewise, I argue that the use of this “doctrine” by the Baker court and in related “threat” cases interpreting Watts has become an exercise in overbreadth.  Simply, too many courts are protecting too much Constitutionally punishable speech in the name of protecting an individual’s First Amendment rights. 

First, the factual dissimilarity in Watts, prefaced with the political atmosphere of the 1960s and the draft/Vietnam conflict, simply should not apply to electronic communications between private parties in non-political speech. This is because Watts, as the dissent notes, is “perhaps a trivial case because of its peculiar facts,” and also quite distinct from more modern instances of prosecuted threats and harassment. [128] 

There are no less than six factors that the Watts Court examined to distinguish constitutionally protected speech from unprotected speech.  In my opinion, the factors are the test of the ‘true threat doctrine.’  They include whether the statement or speech (1) is considered a “political hyperbole;” (2) said against the background of a “profound national commitment to the principle that debate on public issues should be uninhibited;” (3) concerns “government [or] public officials;” (4) made in a particular “context” of speech in question; (5) “conditional” or imperative; and (6) the “reaction of the [objective hearers].”[129]  Furthermore, there is no indication that this is an “and” test, requiring all six factors.[130] 

When the Watts’ 6-part test for a “true threat” is applied in the Baker case,[131] Baker would not be protected by at least four of the rationales that protected Watts.  This suggests that when the facts of Watts are dissected Baker’s statements were actually unprotected speech and true threats.  Cases that deny a true threat existed without examining these factors fail to realize the factual context of Watts and the broader application of the “true threat” doctrine.  Thus, courts should consider factors “such as the type of statement made, the place where it was made, how it was made, and to whom it was made” whenever citing to or relying on Watts.[132]

Some courts have even gone so far as to agree with the stricter “unequivocal” standard enunciated in United States v. Kelner.[133] In Lovell v. Poway Unified School District[134] the Ninth Circuit found a student’s statement of violence in school was a true threat using Kelner.  Here the student said, “If you don’t give me this schedule change, I’m going to shoot you.” The lower court found this statement was protected by the First Amendment.[135]  In reversing, however, the Ninth Circuit said that considered in the context, “of the violence prevalent in schools today, school officials are justified in taking very seriously student threats against faculty or other students.”[136] Thus, this statement fell under the Kelner standard as being, “unequivocal and specific enough to convey a true threat of physical violence.”[137]  Nevertheless, just because the Ninth Circuit used Kelner which interpreted the true threat doctrine from Watts does that this mean either Kelner or Lovell got it right!  In fact, using the 6-part Watts test in defining a true threat undoubtedly would have been sufficient to convict this student.  This suggests that Kelner proves too much. 

Finally, a second reason why the true threat doctrine and its true scope is suspect is because of the perplexing absence of the Courts use of this doctrine in similar threatening or fighting words cases – which could equally be analyzed in light of whether a “true threat” existed.[138]  Indeed, just as there are cases like Baker on one end of the non-threat spectrum, there are other cases that suggest the standard is much broader.[139]  Thus, without a clearer enunciation of the reasoning that the Watts Court used, the “true threat doctrine” should not be applied to protect nonpolitical and personal electronic forms of harassment or threats (a.k.a. unprotected speech). 

· The Mens Rea: 

Third, the mens rea of 875(c) appears to be a general intent crime, although there is a split in the circuits on this point.  Here, the statutory language of 875(c) does not contain any reference to a specific intent to threaten, and the majority of circuits that have addressed the issue,[140] including the First,[141] Second,[142] Third,[143] Fourth,[144] Fifth,[145] Sixth, [146]  and Tenth Circuits[147] have forcefully agreed and determined that 875(c) is a general intent crime.  Generally, “when a statute does not contain any reference to intent, general intent is implied.”[148]  This means that the intent element only applies to sending the communication, not the nature of the communication and the threat element.[149]

The Whiffen Court said that the court in United States v. Fulmer [150]  “set forth a clear rule that a statement constitutes a threat if the speaker reasonably should have foreseen that it would be understood as a threat by those whom it was directed.”[151] This objective standard solves the problems worried by the minority circuits,[152] discussed below, even though it does import a “subjective, hearer-based qualification into the objective, speaker-based standard.”[153]  In other words, if a reasonable recipient would perceive the communication’s content as being a threat, then the mens rea of 875(c) is satisfied.[154]  Nonetheless, even the Fulmer Court concluded that “whether a given statement constitutes a threat is an issue of fact for the trial jury.”[155]  Thus, one can easily see how the answer to the question of who receives whatever is perceived by others to be threatening may perhaps be determinative of the federal intent element of Section 875(c).  Whereas the racist threatening emails in Claiborne were sent to minorities, in Baker the emails were in fact sent to the equivalent to a co-conspirator. 

 

C.            Federal Law as applied in the Baker case:

The relevant text of Section 875(c) states that, “Whoever transmits in interstate or foreign commerce any communication containing any threat to kidnap any person or any threat to injure the person of another, shall be fined under this title or imprisoned not more than five years, or both.”[156]  (Emphasis added).  It was then that the statute meant to protect and punish communicated threats was applied for the first time to electronic (Internet) communications in interstate commerce.[157] 

After Baker was taken to court, the U.S. District Court for the Eastern District of Michigan dismissed the indictment.[158]   On appeal and with the efforts of the ACLU,[159] the Sixth Circuit affirmed.[160]  Despite numerous social or political reasons why people wanted Baker to be punished for his electronic speech, the Sixth Circuit held that the series of e-mails containing his personal interest in causing violence to another person was not a “communication containing a threat”[161] because the intended recipient of the e-mail would not personally be threatened. 

In light of the court’s interpretation of the statute and the constitutional requirements of the true threat doctrine,[162] a second question to be asked is normative: should the First Amendment protect individuals who want to write electronic communication and send or post it freely.[163] 

In the superseding indictment, the Grand Jury returned five counts that this series of e-mails[164] contained both the required actus reus (sending a communication via interstate commerce) and mens rea (the general intent to communicate that threat) sufficient to satisfy Section 875(c).[165] In a thorough opinion the lower court affirmed that this was a general intent crime[166] but nonetheless found that, “intent must be proved by, ‘objectively looking at the defendant's behavior in the totality of the circumstances.’”[167] The court then concluded that it must interpret the e-mails “in the light of foreseeable recipients of the communication”[168] – Gonda – and also that the “class” of person(s) threatened must be sufficiently particular and create an “imminent” danger to satisfy constitutional inquiry.[169]  In coming to the conclusion as a matter of law in dismissing the indictment, the lower court found that, “Baker’s e-mail message[s] cannot reasonably be read as satisfying [these] standard[s].”[170] 

In a two-one split, the Appellate Court affirmed reviewing de novo[171] that the indictment failed as a matter of law to plead the second element of Section 875(c) outlined in the prior case, United States v. DeAndino.[172]  The Alkhabez Court stated, that the “electronic mail messages between defendant and another, expressing sexual interest in violence against women and girls, did not constitute ‘communications containing a threat’”[173] under the statute, and thusly, declined to address any First Amendment issues raised.[174]  The court then held, that in order to satisfy the second element from DeAndino to constitute a “threat” under the statute:

[a] communication must be such that a reasonable person (1) would take the statement as a serious expression of an intention to inflict bodily injury (the mens rea), and (2) would perceive such expression as being communicated to effect some change or achieve some goal through intimidation (the actus reus).[175] 

 

The dissent, however, argued that this “materially alter[ed] the plain language and purpose of that section.”[176] It stated that the court had enhanced the burden of proof placed on the government in its prosecutions under the statute,[177] and “judicially legislat[ed] an exogenous element into Section 875(c).”[178] In adopting the definition of “threat” from Black’s Law Dictionary,[179] the dissent asserted that a “whenever a rational jury could find that an objective recipient of the communication would, under similar circumstances, reasonably tend to believe the speaker’s menacing words”[180] it satisfies the required elements of 875(c).[181] After addressing 875(c), the dissent turned to the Constitutional question.  In contrasting United States v. Watts, the dissent argued that the lower court wrongfully dismissed the indictment on First Amendment grounds because so long as the threat against private individuals is “credible” it is devoid of constitutional protection.[182]

 

IV.           Conclusion:

In the mean time, statutes like 875(c) and local State Code provisions must be interpreted broadly in allowing a prosecution to go forth after presenting a general mens rea to threaten or harass another. 

Perhaps one day policy makers and courts will finally agree that speech should not be protected even if it poses no imminent danger or risk of substantial bodily injury when it would nevertheless cause a reasonable person to fear just such an action. Although the practical remedies for electronic harassment appear to be the same as those in real life – women can ask the harasser to stop, avoid places that resulted in past harassment, report violations to system administrators or the police, or ignore the harasser – they are not remedies.[183]  Although these “solutions” may seem simple, and the mechanisms of electronic harassment and electronic threats can take many forms, just like conventional harassment or threats the harassment or threats often result to attacks in person.[184] 

Simply, the legal and political systems need to continue to interpret and write statutes, such as how the Fulmer court indicated, and determine what is a threatening communication and what is a threatening harassing communication from a more objective hearer-oriented perspective.  Indeed, in defining a “threat” according to a contemporary community standard as opposed to the legalese of a “true threat” may produce the most ‘just’ results.  Until clarity is provided in this factually disturbing and politically charged area of the law, we must all understand that the computer and its attachments are more than just tools of the information age.  They can also be used as secret weapons of fear, harassment and terror. 

 



[1] The Associated Press reported on 11-9-2000 that an enormous number of essays on college applications in 2000 dealt with the shootings at Columbine High School in Colorado. “Nearly half the essays at some schools, admissions officers say that before Columbine, students tended to write about their favorite teacher or someone who had been influential in their life. Now, they are writing about gun control and school safety and fear.” ABC News, World News Tonight, November 6, 2000. See also Dave Curtin, “Columbine a big topic for college applicants,” The Denver Post. November 5, 2000 at B-01 (discussing in more detail).

[NOTE:  Citations use conventions from the 16th Edition of the Bluebook (1999).]

[2] Valerie Alvord, Cyberstalkers must beware of the e-law, USA Today, 22A, Nov. 8, 1999.

[3] See Brooke A. Masters, Cracking Down on E-Mail Harassment, Washington Post, Nov. 1, 1998 (describing a variety of e-harassment and e-threats); Anne Bevilacqua, Electronic Harassment, Computers and the Law Final Paper, May 2, 1997, <“http://wings.buffalo.edu/Complaw/CompLawPapers/bevilacq.htm”>(visited Mar. 1, 2001)(describing a variety of electronic harassment forms, from non-corporate and racial to congressional, sexual and corporate electronic harassment).

[4] McGraw, Sexual Harassment in Cyberspace, infra, note 30, at 496.

[5] Parry Aftab, Protecting Your Children in Cyberspace (publication forthcoming in January 2000); see also <http://www.cyberangels.org> (visited Mar. 1, 2001)(running web site for victims of cyber crime).

[6] See id., at 502 (“Victims of sexual harassment have reported insomnia, depression, nervousness, headaches, backaches, nausea, loss of appetite, weight change, and fatigue.  Further, a harassed employee will no perform as well, resulting in economic damage in terms of reduced promotion and motivation for advancement.”).

[7] See U.S. Const. Amendment I (1791)(“Congress shall make no law … abridging the freedom of speech, or of the press.”).  Depending on the nature of the transmission, either of these clauses may apply as a defense to criminal charges.  The former for more private communications such as instant messages and e-mail, and the latter to more public electronic postings on bulletin boards, Usenet boards, or merely in a webpage.

[8] See Marie D’Amico, The Law-abiding netizen-Cyberstalking via the Net, NetGuide, Feb. 1, 1997, at 32 (cited in Bevilacqua, Electronic Harassment, supra note 3)(“The Internet has become another weapon in the stalkers arsenal because it enable user to find personal information about anyone with a few simple keystrokes”).

[9] See Cory Reiss and Stacey Hirsh, 1 sentenced, 1 suspended in school threat cases, Morning Star, June 3, 1999 at 1A (describing how a teenager who posted a site on the Internet to blow up New Hanover High School pleaded guilty with statements like, “the end is near,” “Violent J will rule the day,” “I am back.  Who cares?  You should,” and other direct statements of time, date and place of a bomb by the “Hanover Hit Men” and via e-mail in the wake of the school shootings at Columbine High School in Littleton, Colorado).

[10] See Michael Weiss, Other Indictments, Atlanta Journal and Constitution, June 15, 1999, at 3 (indicating a Parkview High School student who made a bomb threat via e-mail one week after the Colorado Columbine school shooting was arrested); AP, Threat Suspect Charged, Calgary Sun, Dec. 18, 1999, at 25 (describing how 18 year-old sent an instant message on American On-Line (AOL) to a Columbine High School student indicating that he would “finish” what had been started and that he did not want the recipients “blood on [his] hands”); Opinion, No idle threats Authorities must take all seriously, Tulsa World, Dec. 21, 1999, at 16 (describing as a copycat case how Michael I. Campbell made threats via the Internet to a student at Columbine High School); Peter G. Chronis and Kevin Simpson, Floridian arrested in ‘Net threat Columbine closure spurred by ‘boredom,’ Denver Post, Dec. 18, 1999, at A01 (indicating same and that Columbine has been the suspect of numerous threats since its’ massacre and one person was sentenced to one-year in jail because of his threats).  Because of the nature of juvenile justice, although initial reports are often public information when they concern the safety of others, the ultimate disposition is sealed unless they are tried as adults. 

[11] See Michael Gennaco, Hate on the Internet, Congressional Testimony by Federal Document Clearing House, Sept. 14, 1999 (stating that 62 Asian students at University of California-Irvine received e-mails indicating that if they did not leave the campus “he would make it his personal career to hunt down and kill each of them”); Reuters, Anti-Semitic Acts Rose in ’98 ADL Says, Los Angeles Times, Mar. 25, 1999, at A4 (indicating that “e-mail threats and messages of hate transmitted over the Web have increased dramatically in recent years” according to the Anti-Defamation League).

[12] See Philip Elmer-DeWitt, Snuff porn on the Net, Time, Feb. 20, 1995, at 69 (describing the “Jake Baker case” [hereinafter the Baker case] where a University of Michigan college student wrote several rape “fantasy stories” and posted them on Usenet bulletin boards about men (written in the first person) who kidnap young girls, sodomize, mutilate, and rape the girls before they are left to die). 

[13] For instance, the Sause case in 1995 demonstrated how the new medium of communication was abused in the same way that past mediums of communication were used by stalkers. See Sally Greenberg, Threats, Harassment, and Hate On-Line: Recent Developments, 6 B.U. Pub. Int. L.J. 673, 682-83 (1997)(describing how 19-year old William Sause was charged with “aggravated harassment” for terrorizing a family by sending threatening e-mail that promised to “hunt them down, rape their 12-year old girl, [infect her with the HIV virus after school,] and kill them”)(citing College Student Charged with Internet Harassment, Atlanta J. & Constitution, Nov. 17, 1995, at B07). 

[14] In two separate yet similar cases, the Woodside Literary Agency case and the Mr. Bungle case, a woman was targeted and cyberstalking by those encouraging others to act on their thoughts.  See, e.g., Woodside Literary Agency case, Abuse of Usenet, <”http://members.tripod.com/~cyberstalked”> (visited Mar. 1, 2001)(containing dozens of links to articles related to the Jayne Hitchcock or Woodside Literary Agency case); Cassandra Burrell, Complaint Starts Nightmare Women asks House to Legislate against Cyberstalking, Sun-Sentinel, Ft. Lauderdale, Sept. 30, 1999 (1999 WL 20286534)(describing the “Mr. Bungle” case where a former security guard Gary S. Dellapenta assumed his victim’s identity on a webpage, stating that “she” wanted to have her home broken into and raped, after giving the woman’s name, address and telephone number); Associated Press, California Presses ‘Cyberstalking’ Case, APB news, “http://www.apbnews/com/newscenter/breakingnews/1999/01/22/stalk0122_01.html”> (visited Mar. 1, 2001); Cassandra Burrell, Anti-Cyberstalking Laws Mulled, AP Online, Sept. 30, 1999 (1999 WL 28123210); Sunny Sea Gold, San Diego State U.: Gore speaks out against cyberstalking on San Diego State U. visit, U-Wire, Sept. 20, 1999.

[15] While this may be stereotypical and females are also accused of harassment and threats, overwhelmingly it is the male who crosses the line.  See DOJ Cyberstalking Report, infra note 16 (stating that “with ordinary stalking that women are far more likely than men to be stalked”). Thus, the pronouns “him,” “his” and “he” shall represent throughout this Note the accused perpetrator and declarant while the pronouns “her” and “she” shall represent either the target or subject of the arrest.

[16] See Alvord, Cyberstalkers must beware of the e-law, USA Today, at 22A (“In one telephone survey of 4,446 randomly selected college women, researchers at the University of Cincinnati found that in 696 incidents of stalking between the fall of 1996 and the spring of 1997, 24.7% involved stalking by e-mail, says associate professor Bonnie Fisher, main author of study.”)(citing .S. Justice Department Report, Cyberstalking: A New Challenge for Law Enforcement and Industry, September 1999 (hereinafter “DOJ Cyberstalking Report”). 

[17] DOJ Cyberstalking Report, supra note 16 (finding that in Los Angeles an estimated 20 percent of their caseload from the District Attorney’s Stalking and Threat Assessment Team involve cyberstalking-type cases while New York City’s Computer Investigation and Technology Unit estimate nearly 40 percent involve electronic means – virtually all of which have occurred in the last three to four years).

[18] See Masters, Cracking Down on E-Mail Harassment, Washington Post, Nov. 1, 1998 (describing how an official with the Defense Information Systems Agency was harassed by third party mailing whom a former employee had signed him up for).

[19] See Louise Knott, Online stalkers corralled, Detroit News, Dec. 12, 1999 (indicating how one Novi, Michigan woman was terrorized by a former boyfriend over the Internet and through e-mail that resulted in Michigan passing specific legislation that makes it a felony to “harass, threaten or stalk someone through the Internet” as well as other recently publicized electronic threat cases); Associated Press, E-mail stalker sentencing likely will influence future cases, Detroit News, Mar. 23, 1996 (describing the Archambeau case of an estranged lover of a video dating service resulted in a cease or desist order after sending the woman dozens of unwanted e-mails); Greenberg, Threats, Harassment, and Hate On-Line, supra note 13, at 682-83 (1997)(describing how the Archambeau case led to the first online stalking prosecution in Michigan); Mary Spicuzza, Caught in the Web, “http://www.metroactive.com/cruz/cyberstalkers~9945.html”> (visited Mar. 1, 2001)(detailing several other examples of how estranged persons retailed electronically with their victim). 

[20] See Jessica Laughren, Cyberstalking Awareness and Education, <“http://wwwacs.ucalgary.ca/~dabrent/380/webproj/jessica.html”> (visited Mar. 1, 2001)(describing how actress Rebecca Schaeffer was electronically stalked by Robert John Bardo before he shot and killed her when she rejected his admiration at her home.  This incident is what led California to be the first state to pass anti-stalking laws.); Jennifer L. Bradfield, Anti-Stalking Laws: Do They Adequately Protect Stalking Victims?, 21 Harv. Women’s L. J. 229, 243-44 (1998)(describing the characteristics of stalkers and how the Schaeffer murder led to the California anti-stalking law); Rebecca K. Lee, Romantic and Electronic Stalking in a College Context, 4 Wm. & Mary J. Women & L. 373, 402-404 (1998)(describing how Canadian singer/songwriter and founder of the Lilth Fair Tour Sarah McLaughlin was a stalking victim herself taking the erotomanic viewpoint of her stalker in “Possession” on her Fumbling Towards Ecstasy record).

[21] See Colleen O’Connor and Laurie Wilson, Women Battle Online Stalking, Dallas Morning News, Oct. 12, 1996, at 1A (describing cases where an online stalker threatened to rape a woman as well as her five-year-old daughter and how online and merely electronic stalking or threats have often turned into “real” physical stalking and actions on those threats). 

[22] See Associated Press, N.J. Man charged with making tunnel bomb threat on Internet, Houston Chronicle, Dec. 24, 1999, at 5 (stating that despite the lack of corroborating evidence of his intent, the mere message in an Internet chat room to leave a bomb-laden van in a N.J. Hudson river tunnel that connects N.J. from N.Y. resulted in charges); Alice McQuillan, 2 N.J. Men Charged In Bomb Threats, N.Y. Daily News, Dec. 24, 1999, at 2 (same). 

[23] See Joshua Quittner, Unmasked on the net, Time, Mar. 6, 1995 (describing a variety of mechanisms, servers, and remailers provide the sender of an e-mail a relative comfort level of security because of the anonymity that the net affords, including the first widely used server “anon.penet.fi”). 

[24] See Michael Gennaco, Hate on the Internet, Congressional Testimony by Federal Document Clearing House, Sept. 14, 1999, at 3 (describing that the nature of Internet threats is different than conventional means because of the simultaneous transmission of the message, indicating to the recipient that the sender is thinking the actual message; and unlike a telephone message, cannot gauge the severity of or tones in the speakers voice, leaving only the strict minimalist interpretation of the words as well as all of the subjective and objective connotations the recipient gives them); Masters, supra note 3 (“The mechanics of the Internet – mailing services and free e-mail accounts that make it possible to send vast numbers of anonymous messages with one keystroke – make it a fertile field for those seeking to frighten or intimidate, analysts said.  A single user can send the same file to hundreds of people in far less time that it would take to telephone or write them.”).

[25] See Spicuzza, supra note 19 (indicating that of the few who do report cyberstalking and harassment, officials routinely claim they are “empty threats.”  “There’s this belief that if the person hasn’t been physically present, there isn't a credible threat.  Like you’re not in danger until somebody shows up and bangs your door down…But by the time it reaches that threshold, it’s usually too late.  Meanwhile he’s totally invading [your] life [and you] don’t feel safe.” [hereinafter the “credible threat” problem]); Bradfield, Anti-Stalking Laws:  Do They Adequately Protect Stalking Victims?, supra note 20, at 249(suggesting that the requirement of a “credible threat” is at the very heart of why stalkers often go unprosecuted, and if and when they are, it is “too little, too late”).

[26] See Masters, supra note 3 (stating that “usually, state and local law enforcement will … throw their hands up in the air unless you can show them off-line harassment”); DOJ Cyberstalking Report, supra note 16 (“Unfortunately, some victims have advised them to come back if the cyberstalkers confront or threaten them offline.”); Andrews Publications, Ct Judge Says He Has No Jurisdiction over Officers In Internet Harassment Action: Marczeski v. Price, 14 No. 8 Andrews Corp. Off. & Directors Liab. Litig. Rep. 17 (Feb. 22, 1999)(stating that a federal judge dismissed for lack of personal jurisdiction a harassment case through the use of the Internet, instead requiring “individual contacts”).

[27] See Sanford H. Kadish & Stephen J. Schulhofer, Criminal Law and its Processes 608-610 (1999)(noting various stalking statutes since the initial California approach in the first stalking statute, Cal. Penal Code § 649.9 (Supp. 1994), including the Model Penal Code approach in § 250.4); see also Matthew J. Gilligan, Note, Stalking the Stalker: Developing New Laws to Thwart Those Who Terrorize Others, 27 Ga. L. Rev. 285 (1992)(same).  This paper is broader in scope than mere stalking.  But see Masters, supra note 3 (indicating the sentiment of many others fearful of trampling on civil liberties that, “You can be crude you can be rude, you can be nasty. … It’s not a federal crime to be a jerk.”).

[28] Cf. Spicuzza, supra note 19.  One common challenge to any “threat assessment” is that to be actionable it usually must be a “credible threat,” as the California State law requires despite the fact that unlike conventional stalking, cyberstalking or harassment or threats can promote even greater fear and terror over a longer period, because the declarant may be across the street or across the country, and the cheapness of the medium may allow 50 separate messages in a matter of moments what would otherwise take days to compose and send.  Id.; DOJ Cyberstalking Report, supra note 16, at n.1 (discussing the credible threat problem and suggesting that the better approach codified in the federal interstate stalking statute, 18 U.S.C. § 2261A, “is to prohibit conduct that places a person in reasonable fear of death or bodily injury”).  The DOJ Cyberstalking Report also suggests that challenges like anonymity, and lack of training are but one area to focus on.  However, federal law also limits the ability of law enforcement to track stalkers in cyberspace.  For instance, the Cable Communications Policy Act of 1984 (CCPA), 47 U.S.C. § 551(c) and (h), prohibits disclosure of cable subscriber records to law enforcement without a court order and advance notice to the subscriber, whereas under 18 U.S.C. § 2703 maintains the privacy concerns of the CCPA but allows access to records of e-mail subscribers.  Thus, when cable access providers begin offering services of Internet Service Providers (ISP), a legal challenge is created.  Id.

[29] DOJ Cyberstalking Report, supra note 16; see also John P. Ludington, Validity and Construction of “Terroristic Threat” Statutes, 15 A.L.R. 533 (1986 & Supp. 1998)(indicating in depth terroristic threat statute requirements). See Findlaw: Cyberspace Law Center, “Cyberstalking and E-mail Threats,” <http://www.cyber.findlaw.com/criminal/cyberstalk.html> (visited Feb. 12, 2001)(containing links and articles generally on cyberstalking, e-harassment, and e-threats from both a legal and non-legal perspective).

[30] See, e.g., Gene Barton, Taking a Byte Out of Crime: E-Mail Harassment and the Inefficacy of Existing Law, 70 Wash. L. Rev 465 (1995); Greenberg, Threats, Harassment, and Hate On-Line, supra note 13, at 673 (1997); David K. McGraw, Sexual Harassment in Cyberspace: the Problem of Unwelcome E-Mail, 21 Rutgers Computer & Tech. L.J. 491 (1995)(discussing foundations of electronic harassment).  For purposes of this paper only oral or written statements or assertions shall be examined.  Thus, the act of harassing or threatening by physical or other actions is not included except to the degree that it supportively adds credence to an electronic version of the same.

[31] This section relies heavily on my research into the actual court case file.  See State of Iowa v. Tarsha Michelle Claiborne, Johnson County District Court, No. FECRO55082. Amended Trial Information.  3-6-2001 (original Trial Information filed 6-2-2000)(hereinafter “Claiborne Case file”).  The attorney for the State was Johnson County Attorney J. Patrick White.  The attorneys for the Defendant were originally public defender Richard Klausner, who was replaced by Leon Spies of Iowa City, and Alfredo Parrish of Des Moines.  The Judges involved in the Sixth Judicial District Court of Iowa were Sylvia A. Lewis initially and later L. Vern Robinson. 

[32] Ryan Foley, “U. Iowa officials on lookout for more racist e-mails,” The Daily Iowan, April 3, 2000.

[33] Id.

[34] Id.

[35] Id.

[36] Ryan Foley, “Group claims it set U. Iowa dental lab on fire,” The Daily Iowan, April 17, 2000. 

[37] Id.  This comment was in reference to early news reports that the coat was a “lab coat.”  County Attorney J. Patrick White “said the coat set on fire was not a lab coat, despite earlier reports.  ‘It was just somebody’s coat,’ he said.”  Kellie Doyle, “Claiborne faces 10th charge,” The Daily Iowan, March 7, 2001.

[38] Id.; The Advocate (Baton Rouge, LA), “BR dental student charged in hate crime,” June 5, 2000, at 4-B;S. 

[39] See Ryan Foley, “U. Iowa dental school a bit wary – threats expected Tuesday,” The Daily Iowan, April 11, 2000 (discussing the possible Tuesday-Thursday pattern).

[40] Ryan Foley, “1,000 ‘Walk the Walk’ against racism at U. Iowa,” The Daily Iowan, April 12, 2000.  The rally was organized by Jacqueline Comito, along with anthropology students and student leaders. 

[41] Gil Levy & Zack Kucharski, “Threat locks down U. Iowa dental school, The Daily Iowan, April 19, 2000.

[42] Gil Levy & Zack Kucharski, “Threat locks down U. Iowa dental school, The Daily Iowan, April 19, 2000.

[43] Id.

[44] Michael Chapman, “Wary, U. Iowa dental school reopens after bomb threat,” The Daily Iowan, April 20, 2000. 

[45] Id. 

[46] Id.

[47] Gil Levy & Zack Kucharski, “Threat locks down U. Iowa dental school, The Daily Iowan, April 19, 2000.

[48] Michael Chapman, “Wary, U. Iowa dental school reopens after bomb threat,” The Daily Iowan, April 20, 2000. 

[49] Scott W. Wright.  “Campus Cops Try To Fill Role As Cyber Superheroes; computer crime.”  Black Issues in Higher Education, August 17, 2000, at 64.

[50] Kirsten Veng-Pedersen, “Cyber-crime forces U. Iowa police to get wired,” The Daily Iowan, July 26, 2000.

[51] Id.

[52] Id.

[53] Sky Eilers and Zack Kucharski, “U. Iowa dental student jailed for threats,” The Daily Iowan, April 24, 2000.

[54] Id.

[55] See generally AP, “Dental student charged with racist e-mail threats,” Telegraph-Herald (Dubuque, IA), April 21, 2000, at 1. 

[56] Colleen Krantz, “Mom pleads for U of I suspect,” The Des Moines Register, April 22, 2000, at 1. 

[57] Chao Xiong, “No motive known for series of racist threats at U. Iowa dental school,” The Daily Iowan, April 24, 2000. 

[58] Glen Leyden, “Some community members reach out to help arrested U. Iowa dental student,” The Daily Iowan, April 26, 2000; New York Times, News Brief, April 21, 2000 (“According to court records, the second-year dental student confessed when faced with allegations.”).  Perhaps an unnoticed fact of the case is that early on, after the very first e-mail was received, while most dental students did not want to talk with media, Claiborne frequently made herself available to both print media including the Daily Iowan and television crews from KCRG.

[59] Id.

[60] See Sky Eilers and Zack Kucharski, “U. Iowa dental student jailed for threats,” The Daily Iowan, April 24, 2000; Chao Xiong, “No motive known for series of racist threats at U. Iowa dental school,” The Daily Iowan, April 24, 2000.

[61] Sky Eilers and Zack Kucharski, “U. Iowa dental student jailed for threats,” The Daily Iowan, April 24, 2000.

[62] Although the “charge” actually only includes 3 “counts,” because of the inclusion of the statutes within each, there are actually more than three.  In total, there are 10 charges – six counts of third-degree harassment, criminal trespass with hate crime elevation, threats in violation of individual rights, reckless use of fire, and possession of a control I substance. 

[63] Claiborne Case file (emphasis deleted).

[64] Claiborne Case file (emphasis deleted). 

[65] See The Des Moines Register, “Dateline Iowa:  U of I student faces marijuana charge,” June 9, 2000, at Metro 5. 

[66] Shirley Ragsdale, “Bizarre hate crime begets a weirder debate over bias,” Gannett News Service, May 11, 2000, at ARC.

[67] Black Issues in Higher Education, “U. of Iowa Spokeswoman’s Comment Draws Fire; Brief Article,” May 25, 2000, at 12; see Disa Lubker, “Probe of U. Iowa official’s joke still pending,” The Daily Iowan, June 5, 2000; see also Chares L. Austin, “Letters to the Editor:  Threats at U of I bred more racism,” The Des Moines Register, April 29, 2000, at 10 (stating in response to Rhodes comment that “How we react to this will say a lot to minority students” that, “Being white is no more reason for being falsely accused than is being black” and that her comment “was made with no thought as to what the reaction would say to those white male students who were wrongfully profiled as the perpetrators of these events.”). 

[68] Although certainly each of the immediately supra and infra notes are “negative publicity,” perhaps the most scathing was an editorial by Aaron Woell, “White people not the root of all evil,” The Daily Iowan, April 26, 2000, in which he stated among other propositions that, “Making white society the scapegoat for one’s problems is the same as Hitler blaming the Jews for all that was wrong in Germany, and if racism exists in this country, it is flowing in the other direction.”  See also Mary Mroch, “U. Iowa vice president’s racial comment not quite ‘harmless,’The Daily Iowan, April 26, 2000. 

[69] See AP, “UI official’s comment criticized,” Telegraph-Herald (Dubuque, IA), April 29, 2000, at 13; Christoph Trappe, “U. Iowa official in more trouble over ‘white male’ comment,” The Daily Iowan, May 3, 2000. 

[70] See also Disa Lubker, “Gov’t dismisses white male complaint against U. Iowa,” The Daily Iowan, June 12, 2000 (discussing how no evidence of a hostile environment for white males was present at the UI).

[71] Sky Eilers, “U. Iowa spokesperson steps down two months after making white-male ‘joke,’The Daily Iowan, June 19, 2000. 

[72] Anna Conover, “U. Iowa dental student to remain in custody after racist e-mails,” Iowa State Daily, April 25, 2000 (discussing bond hearing). 

[73] AP, “Lawyer wants bond for suspect reduced,” Telegraph-Herald (Dubuque, IA), April 29, 2000, at 13. 

[74] Claiborne case file; Des Moines Register, “Dateline Iowa:  Responsibility is key in ex-student’s defense,” July 12, 2000, at Metro 5.

[75] Id.

[76] Claiborne case file.

[77] Disa Lubker, “Woman Accused of e-mailing threats to U. Iowa to enter not guilty plea,” The Daily Iowan, June 15, 2000. 

[78] Glen Leyden, “Some community members reach out to help arrested U. Iowa dental student,” The Daily Iowan, April 26, 2000.

[79] Des Moines Register, “Dateline Iowa: Trial is delayed for former student,” October 11, 2000, at Metro 4. (indicating that “Claiborne’s attorney’s have filed notices that they intend to use a diminished-responsibility defense, which asserts that she did not have the capacity to form a necessary criminal intent before acting”); Des Moines Register, “Dateline Iowa:  Responsibility is key in ex-student’s defense,” July 12, 2000, at Metro 5.

[80] Black Issues in Higher Education, “Iowa Dentistry Student To Plead Diminished Capacity.” August 3, 2000, at 11.

[81] Id.; see also The Des Moines Register, “Karen Duncan’s tragedy.”  July 16, 2000, at 14 (discussing how depression may be a factor in the Claiborne case, and how it may “help fill out some stories whose facts don’t otherwise add up,” suggesting because Claiborne was black it didn’t add up for her to send racist e-mail threats). 

[82] Disa Lubker, “Attorney:  U. Iowa dental student to use diminished-responsibility defense,” The Daily Iowan, July 12, 2000.

[83] Id.

[84] Id.

[85] See Kellie Doyle, “Claiborne faces 10th charge,” The Daily Iowan, March 7, 2001 (indicating that the inclusion of Count III – Reckless use of fire, was part of the plea bargain).

[86] §902.9(3)

[87] §903.1(1)(a)

[88] §903.1.(1)(a); see also UI Press Release, “Arrest is made in College of Dentistry e-mail case,” Vice-President of University Relations Ann Rhodes, 4-20-2000.

[89] United States v. Alkhabez, 104 F.3d 1492 (6th Cir. 1996)(commonly cited according to Alkhabez’ a.k.a. – Jake Baker used by the lower court); see generally Peter Swanson’s Jake Baker Information Page at the University of Michigan, <“http://krusty.eecs.umich.edu/people/pjswan/Baker/Jake-Baker.html”> (hereinafter the “Baker Homepage”)(containing extensive links on the evolution of the Baker case from his arrest to the decision at the Sixth Circuit, with media reports, timeline, legal documents, the Baker stories, and newsgroups); Heather Brooks-Szachta, U.S. v. Jake Baker:  the Role of Unique Features of Electronic Mail in a “True threat” Analysis, student paper, <“http://www.libraries.wayne.edu/%7Ejlitman/pbrooks.html”>(containing a narrative and analysis of the case and the court’s reasoning in declining to accept the government’s positions).

[90] The argument existed that these stories were merely genres of hard-core pornography and were untrue.  It is the author’s opinion that indeed, in the circumstances found, the stories were merely disguises for true intentions.  Henceforth, quotations will not be used around “fictional stories.”

[91] A Usenet bulletin board is only one form of electronic communication with contents publicly available on the Internet.  See Cyberspace, Communications, Inc. v. Engler, No. 99-CV-73150, 1999 WL 557725 (E.D.Mich 1999)(detailing the nature of the Internet, its history, e-mail, Usenet newsgroups, the World Wide Web as enunciated in ACLU v. Reno, 929 F.Supp. at 830-38 (E.D. Pa. 1996)).  Although Baker only posted on one bulletin board within the Usenet, the system itself is the conceptual equivalent to a social party where each group of people stand grouped by a particular topic with signs over their heads.  Technically, a Usenet is a “network-scale computer conferencing system that manages multiple public conversations, organized hierarchically into specific topics.  William S. Byassee, Jurisdiction of Cyberspace: Applying Real World Precedent to the Virtual Community, 30 Wake Forest L. Rev. 197, 201 n.16 (1995).  Strictly speaking, it is not a network but a bulletin board service, allowing postings of stories in various “newsgroups.”

[92] “Snuff” is not defined in any major dictionary, however, it is commonly used as a slang term for what can be called the most severe and violent pornography and obscenity.  See Joel Schumacher, Director, 8MM, Columbia Tristar Pictures, 1998 (depicting the inner workings of the snuff film industry and black market of pornography).  Although only the story Baker wrote, entitled “Doe,” led to the search and arrest, Baker had formerly written and posted several other violent “stories.”  In “Gone Fishin” the protagonist and a friend have fun raping and murdering the friend’s sister using a power drill, pliers, and a box of needles; in “Going for a Walk” Baker detailed a forceful abduction, rape and murder of another young girl who was jogging by him. See John Wallace & Mangan, Sex, Laws, And Cyberspace, at 64-65; Baker Homepage, supra note 89 (containing the entire narrative of all four of Baker’s stories).

[93] From the initial days the student’s name was not released to the public but was referenced in the initial affidavit  by an FBI agent accompanying to get a warrant for Baker’s arrest and the media as “Jane Doe.”  Baker Homepage, supra note 89. 

[94] Alkhabez, 104 F.3d at 1497 n.1 (6th Cir. 1996)(Krupansky, J., dissenting).  The Doe story and the series of e-mail communications between the two are reprinted in the Second Circuit case and are available online to attest to the brutality against women and what the ACLU believes should be protected speech.  In fact, the dissent even said that Doe, written in the first person about Baker’s classmate, is in fact “a relatively mild exemplar of the bestial genre of Baker’s fiction.”  Id. 

This graphic tale of torture, rape and murder features the narrator and a friend tying the victim by her hair to a ceiling fan.  She is then beaten with a wire brush and whisk, sexually tortured with a clamp (among other things), sodomized with a hot curling iron, forced to perform oral sex, mutilated with a knife, and raped.  The victim is eventually murdered when the perpetrators pour gasoline over her and light a match.  According to the government, Baker also gave out Doe’s address to a group of Internet users who asked for more details from Baker.

Brooks-Szachta, supra note 89; see also <http://www.nostatusquo.com/ACLU/Porn/Baker/doe.html> (reprinting “Doe”); Baker Homepage, supra note 89. 

[95] Wallace & Mangan, supra note 92, at 64.

[96] Initially the police charged Baker in connection with the story posted.  Realizing there would be a substantial obstacle with the First Amendment, that charge was rescinded and a second one focusing more on the dialogue contained in the e-mails was filed against Baker.  Following the announced arrest of Baker under section 875(c), like most liberal college campuses, the community and students appeared to rally behind Baker's right to publish anything online.  The Michigan Student [Government] Assembly (MSA) even passed a resolution abhorring the University's actions in expelling Baker. But at this time, the actual content of the stories and e-mails was secret.  See Baker Homepage, supra note 89 (indicated that after the Vice-President of the MSA read through part of one story it made her so sick she had to stop reading). 

[97] Brooks-Szachta, supra note 89.

[98] This is the actual communication that took place between Abraham Alkhabez (a.k.a. Jake Baker) and Arthur Gonda.  See United States v. Alkhabez, 104 F.3d 1492 (6th Cir. 1996)(detailing electronic communications between defendants).  While the case, statute and now exemplified story, have been discussed in themselves, the background of the case provides an excellent example of how threats and harassment through electronic communication pose a different problem from the “true threat” often thought required to bypass the First Amendment.  Id. 

[99] As will be shown, the prosecutor would have had a better chance to secure a conviction had he package the charges to include both the story and the e-mails.

[100] Of course, if it were protected by the First Amendment Section 875(c) would be unconstitutional.  In my opinion Baker’s speech was not protected by the First Amendment as United States v. Watts requires, nor under the statute. 

[101] One theory behind the initial charges was that although Baker had a right to think what he did, once it was communicated to another in writing, particularly one who shared his desire to act, it became criminal conspiracy.  See infra note 97 and accompanying text; Baker Homepage, supra note 89 (containing a copy of the initial FBI affidavit from Feb. 9, 1995 quoting Baker as saying, “Torture is foreplay, rape is romance, snuff is climax,” portions of the Doe story, and portions of one e-mail exchange).

[102] Alkhabez, 104 F.3d at 1499 (6th Cir. 1996)(citing to Count I of the indictment against Baker).

[103] See Baker Homepage, supra note 89 (containing a copy of the FBI affidavit from Feb. 9, 1995 quoting Baker in one e-mail message stating:

I just picked up Bllod (sic) Lust and have started to read it.  I’ll look for ‘Final Truth’ tomorrow (payday).  One of the things I’ve started doing is going back and re-reading earlier messages of yours.  Each time I do, they turn me on more and more.  I can’t wait to see you in person.  I’ve been trying to think of secluded spots, but my area knowledge of Ann Arbor is mostly limited to the campus.  I don’t want any blood in my room, though I have come upon an excellent method to abduct a bitch ---

                As I said before, my toom (sic) is right across from the girl’s bathroom.  Wiat (sic) until late at night, grab her when she goes to unlock the door.  Knock her unconscious and put her into one of those portable lockers (forgot the word for it), or even a duffle (sic) bag.  Then hurry out to the car and take her away . . . what do you think?

before including another response by Gonda that, “I am thinking more and more about ‘doing’ a girl.  I can picture it so well . . . and I can think of no better use for their flesh.  I HAVE to make a bitch suffer!”). 

In fairness to the lower court, of the five counts against Baker, counts II and III that contained this e-mail exchange did identify a class of would-be targets “with sufficient specificity,” unlike the other three charges, but nonetheless found that Baker’s conclusion, “what do you think?,” was merely a discussion of a crime, “not tantamount to declaring an intention to commit the crime” and not “unequivocal.” Baker, 890 F.Supp. 1375, 1388-1389.

                However, the indictment on 'Count I' neglected to indicate Gonda’s reply, which was:

I think that it is best to disconnect yourself as much as possible from the crime.  The police, would surely come around asking questions … leaving with a huge bag may look very suspicious to anyone who might see you.  Also, she might scream when you hit her, arousing the suspicion of the other people in the dorm … a dorm may be too populated for an abduction … also, it would be better to go for complete strangers.

Id. at 1495, n.5 (Krupansky, J., dissenting). Count V against Baker, following his transmission of at least one story to Gonda, and the statement that he was thinking of how they could torture “this very very petite and cute, south American girl in one of [Baker’s] classes,” also omitted Gonda’s response to Baker that:

Thanks for the stories, Jake … I am buying a car this week.  I am shopping around for it now, and I shaould [sic] have it on the road by this weekend hopefully.  I will definitely come and see you when I have the time .. I am going to read the stories and masturbate now.

Id. at 1501, n.7 (Krupansky, J., dissenting). Contrary to the majority’s decision at the appellate level, these e-mails strongly suggests that a conspiracy was occurring and that Baker represented even to the “rational” Gonda his threats.

[104] See id. (stating in response to Baker’s abduction e-mail, Gonda said that, “I am thinking more and more about ‘doing’ a girl.  I can picture it so well . . . and I can think of no better use for their flesh.  I HAVE to make a bitch suffer!”).  The Teale-Homolke serial killings became famous after a man and wife were arrested and convicted of brutally raping, torturing and then killing two young 14 and 15 year old girls, which latter led to the discovery of dozens of such victims.  See, e.g., Teale Tales Digest, <“http://www.cs.indiana.edu/canada/TealeTales.TXT”> (containing links and reprints of dozens of articles on the slayings); Anne Swardson, Unspeakable Crimes – This Story Can’t Be Told in Canada.  And So All of Canada Is Talking About It, Washington Post, Nov. 23, 1993 (containing the first detailed account of the slayings, a case that led to the State-wide ban on materials about it in Canada); Anita S. Brenner and B. Metson, Electric Word: Paul and Karla Hit the Net, Wired, 2.04 (1994); Russell Watson and Linda Kay, The Barbie-Ken Murders, Canada: Blacking out a horror story, Newsweek, Dec. 6, 1993, at 36.

[105] See Wallace & Mangan, supra note 92, at 71 ([Federal Magistrate at the district level]:

“Justice Carlson stated, ‘If we only had a story of rape and torture, we would have the issue of the First Amendment here, but there are at least two additional elements to the case.  Mr. Baker named an individual at the University of Michigan as a subject of his story and had discussion with another person about where and how the actual assault could be carried out.  This is more than just a story.’”);

see also id. at 63-81 “A Stalker in Cyberspace” (describing much of the often left out details of the background on the Baker case from the original report of the story by a Michigan alumni in Moscow to the Sixth Circuit decision). Posted on a “mich.edu” site, Michigan University could have followed the Canadian University of Waterloo’s example in shutting down the site as potentially obscene and hence illegal.

[106] 958 F.2d 146 (6th Cir. 1992).

[107] Id. at 148; see also United States v. Francis, 975 F. Supp. 288, 292 (S.D.N.Y. 1997)(citing DeAndino and stating the same three actus reus elements of 875(c)).

[108] See United States v. Pennell, 144 F.Supp. 317 (N.D. Cal. 1956)(stating that an intent to extort money or other thing of value is not necessary as there mere transmission of a communication in interstate commerce threatening to injure the person of another is a violation of 875(c)).

[109] Potter, Jake Baker Case, at 782-783 (describing legislative history and historical application of 875(c)). 

[110] Id. at 875(c).

[111] 7 F.Supp.2d 1196 (D. Utah 1998). 

[112] Id.  In Kammersell, a Utah defendant sent an instant message while on America Online (AOL) to a Utah recipient. Technically, the message traveled from the defendant’s location in Utah to AOL’s headquarters in Virginia and back again to its victim in Utah.

[113] This statutory discussion is nonetheless still absent any discussion of what is a ‘threat’ under the Constitution.   Indeed, courts have unfortunately and unnecessarily confused others when referring to the statutory threat requirement as a “true threat.”  See United States v. Whiffen, 121 F.3d 18 (1st Cir. 1997)(demonstrating this dual-circle principle); United States v. Sovie, 122 F.3d 122 (2d Cir. 1997)(discussing the same statutory requirement in terms of what is a “true threat”); United States v. Fulmer, 108 F.3d 1486, 1491-1493 (1st Cir. 1997)(discussing in one case both the statutory and constitutional requirements as “true threats”).

[114] See Robert K. Kelner, United States v. Jake Baker: Revisiting Threats and the First Amendment, 84 Va. L. Rev. 287 (1998)(describing an equally detailed analysis from a different viewpoint and conclusion of the First Amendment and true threat doctrine).

[115] Const. Amendment 1 (1791).

[116] R.A.V. v. City of St. Paul, 505 U.S. 377, 382 (1992).

[117] Cohen v. California, 403 U.S. 15, 19 (1971); see Chaplinsky v. New Hampshire, 315 U.S. 568, 571 (1942)(not all speech enjoys the protection of the first amendment).

[118] In R.A.V. v. City of St. Paul, 505 U.S. at 388, the Court acknowledged three “‘reasons why threats of violence are outside the First Amendment:’ (1) ‘protecting individuals from the fear of violence,’ (2) protecting them against the ‘disruption that [such] fear engenders,” and (3) protecting them “from the possibility that the threatened violence will occur.’” Robert K. Kelner, United States v. Jake Baker: Revisiting Threats and the First Amendment, 84 Va. L. Rev. 287 (1998)(describing the true threat doctrine and Watts in greater detail).

[119] 394 U.S. 705, 707 (1969). 

[120] Id. A statute that regulates the content of messages falls within this protected category unless it’s (1) obscenity, (2) fraudulent misrepresentation, (3) defamation, (4) advocacy of imminent lawless behavior or (5) fighting words.  As a result, the speech is subject to strict scrutiny and must therefore (1) serve a compelling government objective and (2) is necessary, to survive overbreadth and vagueness doctrines.  Watts reasons that to satisfy this scrutiny, political speech cannot be illegal unless it is a “true threat.”  Id.

[121] Id. at 706.

[122] Id. at 707.

[123] Watts, 394 U.S. at 705 (1969).

[124] Id. at 705, 708.

[125] Id. at 712.

[126] The constitutionality of most threat and harassment laws is well known.

From 1791 to the present our society has permitted restrictions upon the content of speech in a few limited areas, which are ‘of such slight social value as a step to truth that any benefit that may be derived from them is clearly outweighed by the social interest in order and morality.’ R.A.V. [v. United States], 505 U.S. at 383 (citing Chaplinsky, [315 U.S.] at 572). The government has a legitimate interest in reducing the climate of violence to which true threats of injury contribute. Kelner, 534 F.2d at 1026. True threats of physical injury, like ‘fighting words,’ are viewed as outside first amendment protection, in part because they do not contribute to the exchange of ideas. See R.A.V. [v. United States], 505 U.S. at 383; United States v. Carrier, 672 F,2d 300, 306 (2d Cir. 1982).

United States v. Francis, 975 F.Supp. at 293 (S.D.N.Y. 1997).

[127] It was also during the same term that the Court handed down the landmark decision of Brandenburg v. Ohio, 395 U.S. 444 (1969)(per curiam), expanding the First Amendment protection for advocacy of illegal activity under the Ohio criminal syndicalism statute of a Ku Klux Klan leader.

[128] 394 U.S. 505 (1969). Unfortunately just two years prior the Court reversed a case on other grounds that could have addressed the particular statute, 875(c), in Alderman v. United States, 394 U.S. 165 (1967).  To date, the Court has not addressed either 875(c) or the true threat doctrine.

[129] Watts, 394 U.S. at 708.  Indeed, when applied to modern threats and harassment at issue, even Justice White who wrote a separate dissent suggested when explaining Section 871 that where “direful intentions and desires” cause a “menace to the peace and safety of the country,” a defendant should be convicted under the statute.  At least under this reasoning, Justice White would likely support 875(c) as a general intent crime and a broader interpretation of what constitutes a “true threat.”  Id.

[130] See id.

[131] See Phillip Tortorich, E-Mail Stories Detailing Rape and Murder of Young Woman do Not Constitute a “True Threat,” 9 Loy. Consumer L. Rep. 227 (1997)(detailing the Baker case).  However, the title to the article is deftly misleading about the case and the inclusion of the Doe and other stories – which prosecutors dropped from their case.

[132] Potter, Jake Baker Case, supra note 109, at 792-793 (citing United States v. Carrier, 672 F.2d 300, 306 (2nd Cir. 1982)).

[133] 534 F.2d 1020 (2d Cir. 1976).  Kelner was convicted for statements he made during a television press conference in New York that the Jewish Defense Leagued planned to assassinate PLO Chairman Yasser Arafat during his stay in New York.  The court held that a true threat exists only if “on its face and in the circumstances in which it is made [the speech is] so unequivocal, unconditional, immediate and specific as to the person threatened, as to convey a gravity of purpose and imminent prospect of execution.”  Baker, 890 F.Supp. at 1384 (quoting Kelner, 534 F.2d, at 1027). This is nearly a complete reiteration of Brandenburg v. Ohio, 395 U.S. 444 (1969), as opposed to the definition of a threat cited in Watts. 

[134] 90 F.3d 367 (9th Cir. 1996).

[135] See id. at 372.  (finding that a student’s suit against her high school following her suspension violated her First Amendment rights because the statement did not constitute a true threat).  However, the appellate court also recognized that the district court did not rely entirely on the federal constitution.  Id. at 371 (stating that the district court used California law which gives to students the same rights while in school as while not in school, as opposed to federal constitutional law as required for a Section 1983 claim because there is a strong governmental interest in maintaining the safe environment in school and therefore would more easily constitute a true threat); see, e.g., Tinker v. Des Moines Indep. School Dist., 393 U.S. 503, 509 (1969)(holding that schools can punish student conduct that would “materially and substantially interfere with the requirements of appropriate discipline in the operation of the school” without violating the First Amendment); Hazelwood Sch. Dist. v. Kuhlmeier, 484 U.S. 260, 266 (1988)(“A school need not tolerate student speech that is inconsistent with its basic educational mission, even though the government could not censor similar speech outside the school.”); Bethel Sch. Dist. No. 403 v. Fraser, 478 U.S. 675, 682 (1986)(“The constitutional rights of students in public school are not automatically coextensive with the rights of adults in other settings.”).

 

[136] Lovell, 90 F.3d at 372.

[137] Id.

[138] It is perplexing because during the same time frame the Court addressed the fighting words doctrine several times.  Yet, the Supreme Court has not substantively addressed the “true threat” doctrine since Watts.  For this reason, it is arguable that the true threat standard was either a variation or tangent of the more prevalent fighting words doctrine, or is limited in its application to political speech, a category of speech that is independently protected by a heavy standard of scrutiny.  See R.A.V. v. City of St. Paul, 505 U.S. 377 (1992)(detailing the current state of free speech protections in the First Amendment); see also NAACP v. Claiborne Hardware, 458 U.S. 886, 927 (1982)(writing for the court Justice Stevens declined to rely on Watts and the true threat doctrine and instead opting for the “incitement” test of Brandenburg).  

[139] Cf. Planned Parenthood v. American Coalition of Life Activities, 23 F.Supp.2d 1182, 1184-85 (D. Or. 1998) (finding that a “deadly dozen” poster, advocating readers to execute abortionists, and the Nuremberg web page was a true threat to bodily harm or kill one or more of the plaintiffs).

[140] Several circuits have never addressed the mens rea of 875(c) directly, including the 7th, 8th, 10th, and 11th Circuits. See Annotation, Validity, Construction, and Application of 18 U.S.C.A. § 875(c), 34 A.L.R. Fed. 785 (1977 & Supp. 1998)(detailing 875(c)).

[141] See United States v. Whiffen, 121 F.3d 18, 21 (1st Cir. 1997)(holding that 875(c) is a general intent crime and explicitly rejecting Twine)(quoting United States v. Fulmer, 108 F.3d 1486, 1491 (1st Cir. 1997)).

[142] See United States v. Francis, 164 F.3d 120, 123 (2d Cir. 1999)(holding that the interstate transmission of threats is a general intent crime); United States v. Sovie, 122 F.3d 122, 125 (2d Cir. 1997)(detailing test for a “true threat” is one that is objective, namely, whether an ordinary, reasonable recipient who is familiar with context of threat would interpret it as threat of injury, and stating that “it is not necessary for the Government to prove that [the defendant] had a specific intent or present ability to carry out his threat, but only that he intended to communicate a threat of injury through means reasonably adapted to that purpose”).

 

[143] See United States v. Himelwright, 42 F.3d 777, 783 (3rd Cir. 1994)(holding that to establish violation of 875(c) “the government bears only the burden of proving that [the defendant] acted knowingly and willfully when he placed the threatening phone calls and that those calls were reasonably perceived as threatening bodily injury”)(reversing on evidentiary grounds).

[144] See United States v. Darby, 37 F.3d 1059, 1066 (4th Cir. 1994)(stating that contrary to Twine, the “better-reasoned” analysis leads to only a general intent requirement); but see United States v. Dutsch, 357 F.2d 331, 333 (4th Cir. 1966)(suggesting that a higher intent may have been once required because conviction under “875(c) requires a showing that a threat was intended” (quoting Seeber v. United States, 329 F.2d 572, 577 (9th Cir. 1964)).

[145] See United States v. Myers, 104 F.3d 76, 81 (5th Cir. 1997)(holding that the offense of transmitting threatening communications is a “general intent” crime in the absence of any mens rea requirement in the statute and adopting the position take then by the Third, Fourth and Sixth Circuits).

[146] See United States v. DeAndino, 958 F.2d 146, 150 (6th Cir. 1992)(stating that “875(c) does not require a specific intent in regard to the threat element of the offense, but only general intent” and that it is “not an express element of section 875(c) according to the plain words of the statute”); United States v. Alkhabez, 104 F.3d 1492, 1495 (6th Cir. 1997)(adopting a reasonable person and general intent standard); United States v. Cox, 957 F.2d 264, 266 (6th Cir. 1992)(stating that so long as the threat had a “reasonable tendency to create apprehension” in others, it was a general intent crime if he knowingly transmitted the threat).

[147] See United States v. Whiffen, 121 F.3d 18 (10th Cir. 1999)(adopting “with full force to 18 U.S.C. § 875” the reasons enunciated in Fulmer).

[148] United States v. Martinez, 49 F.3d 1398, 1401 (9th Cir. 1995).

[149] See Potter, Jake Baker Case, supra note 109, at 805 n.43.

[150] 108 F.3d 1486 (1st Cir. 1997)(reversing on non-875(c) grounds).

[151] Fulmer, 108 F.3d 1486, 1491-1492 (1st Cir. 1997)(emphasis added).  Thus, in the Baker case Baker should have reasonably understood that had the e-mail messages been, for instance, directed at resident’s of his dormitory under Count II that they would perceive it as a threat. 

[152] Thus, Fulmer helps solve the debate between Twine and the majority of the circuits.

This test takes into consideration the context in which the remark was made and avoids the risk that an otherwise innocuous statement might become a threat if directed at an unusually sensitive listener.  This approach also protects listeners from statements that are reasonably interpreted as threats, even if the speaker lacks the subjective, specific intent to threaten, or, as would be more common, the government is unable to prove such specific intent which, by its nature, is difficult to demonstrate.

Whiffen, 121 F.3d at 21.

[153] Harv. L. Rev. Ass’n, Criminal Law-First Amendment-First Circuit Defines Threat in Context of Federal Threat Statutes -- United States v. Fulmer, supra note __, at 1110 (1998)(describing Fulmer). Despite those who believe that “rarely will the two [reasonable speaker and reasonable hearer standards] differ,” when the threat is directed to a third-party or conspiring party, the subjective element may actually hinder the objectiveness of the standard. Id. at 1113. For instance, it may even produce absurd results to force a court to examine at the guilt stage only the defendant’s intent – i.e., a rational person may readily admit to sending an e-threat, and arguably it could be understood as a non-threat such as romantic. See United States v. Freeman, 176 F.3d 575 (1st Cir. 1999)(discussing the sentencing procedures following a guilty plea of 875(c) under U.S.S.G. § 2A6.1(b)(2)(1995) after making eight interstate prank phone calls to a hotline threatening the abuse of an alleged stepdaughter that he “might leave her to die” despite not having a stepdaughter); United States v. Sovie, 122 F.3d 122 (2d Cir. 1997)(discussing 875(c) and the sentencing levels).

[154] See Potter, Jake Baker Case, supra note 109, at 789; 34 A.L.R., supra note 140 (similarly adopting a definition of a threat under a general intent and objective classification).  Yet another way to phrase this objective standard for the jury is whether, according to contemporary community standards, a rational and reasonable recipient of that communication would consider it to be a “threat.” 

In response to a charge of violating 875(c) a defendant will likely raise several confrontational issues.  First, the accused may argue that he was too distant to actually carry out threatened action, but this is wholly inadequate. See United States v. Lincoln, 589 F.2d 379 (8th Cir. Mo.)(stating that under the sister Section 876 of Chapter 41, ability to carry out the threatening action is not an element in the offense).  Second, there will likely be challenges to the offense that it was not a constitutionally required true threat.  Third, the prosecutor may have practical problems in admitting electronic evidence.

[155] Fulmer, 108 F.3d 1486, 1492 (1st Cir. 1997)(citations omitted).

[156] 18 U.S.C. § 875(c). The fine can be up to $250,000.  Id.            

[157] Alkhabez, 104 F.3d at 1492 (6th Cir. 1996). 

[158] United States v. Baker, 890 F.Supp. 1375 (E.D.Mich. 1995)(J. Carlson)(holding that “statements in defendant’s private electronic mail, or e-mail, messages to unidentified recipient did not meet First Amendment “true threat” requirement” and the interplay of the “true threat” doctrine and the First Amendment); see F. Lawrence Street, Law of the Internet 454 (1997) (describing in a single paragraph the first-impression Baker case as not meeting the immediate threat required for a criminal conviction); see also Steven J. Heyman, Righting the Balance:  An Inquiry into the Foundations and Limits of Freedom of Expression, 78 B.U. L. Rev. 1275 (1998) (applying Professor Heyman’s theory of contemporary First Amendment disputes to the Baker case).

[159] The ACLU submitted an amicus curae brief in support of affirming the lower court’s dismissal.  Alkhabez, 104 F.3d at 1492 (6th Cir. 1996). 

[160] United States v. Alkhabez, 104 F.3d 1462 (6th Cir. 1996).

[161] Id.; see also Robert K. Kelner, United States v. Jake Baker: Revisiting Threats and the First Amendment, 84 Va. L. Rev. 287, 298 (1998)(describing the confusion as between the mens rea and the “true threat” inquiry).

[162] Id.

[163] Beyond the scope of this paper is the potential that the courts may view the specific electronic medium, whether e-mail or a public posting, differently, with the e-mail the equal to a private conversation protected by freedom of speech whereas the posting subject to the standards and legal history of freedom of press. 

[164] See Alkhabez, 104 F.3d 1492, 1495 (6th Cir. 1996)(Krupansky, J., dissenting)(stating that “Baker and Gonda subsequently exchanged at least 41 private computerized electronic mail (e-mail) communications between November 29, 1994 and January 25, 1995,” concurrent with posting the Doe and other stories).

[165] See id. at 1495 (Krupansky, J., dissenting)(listing in detail all five counts).  In a thorough and detailed description of the case, the dissent also includes several e-mails which did not make it into the indictment that lead to a more credible understanding that the e-mails were more than just two friends sharing fantasies. 

[166] Baker, 890 F.Supp. 1375, 1380.  Thusly, Baker and the Sixth Circuit sit in the majority’s interpretation that 875(c) is a general intent crime.  However, what the court then requires of a general intent is perhaps drawn out too much.

[167] Id. (citing U.S. v. DeAndino, 958 F.2d 146, 149 (6th Cir. 1992)).

[168] Id. at 1384.

[169] See id. at 1385 (discussing the communications between Gonda and Baker). 

In order to be constitutionally sanctionable, the statements Baker made must meet [United States v. Kelner’s] ‘unequivocal, unconditional, immediate, and specific’ standard.  As Justice Brandeis wrote: Fear of serious injury cannot alone justify suppression of free speech … To justify suppression of free speech there must be reasonable ground to fear that serious evil will result if free speech is practiced.  There must be reasonable ground to believe that the danger apprehended is imminent. 

Id. at 1387 (citing Whitney v. California, 274 U.S. 357, 376 (1927)(Brandeis, J., concurring)).  Understanding that the best mode for communicating a threat would have been the telephone in the 1920’s, without a deeper understanding of the psychology of e-mail and the Internet today, one may suspect whether any Justice might say the same today. 

[170] Id. at 1389.  However, hindsight debate and discussion suggests that the divisive nature of this case proves contrary to the reasonableness of Judge Cohn’s decision.  For instance, one line of dicta at the end suggests that just as others were biased against Baker, Judge Cohn may have demonstrated a dislike of University problems reaching the courts.  See id. at 1391 (stating that “The case would have been better handled as a disciplinary, as the University of Virginia proceeded in a similar situation, despite whatever difficulties inhere in such a course.” (citing Robin Blaber v. University of Victoria (March 14, 1995) Victoria 94-4823 (BCSC)(suggesting that the best course of action would merely have been to restrict the student’s access to University computer accounts)).  Indeed, just as the identity of Gonda is unknown and called into question, Judge Cohn himself could have been Gonda just as I could have been. See id. at 1386 (“Gonda’s identity is entirely unknown; ‘he’ could be a ten year old girl, an eighty year old man, or a committee in a retirement community playing the role of Gonda gathered around a computer.”).

[171] See Alkhabez, 104 F.3d 1492, 1494 (6th Cir. 1996)(“Because Congress’s intent is essentially a question of statutory interpretation, we review the district court’s decision de novo.”)(citations omitted). 

[172] Id. at 1493-1494 (citing for the three elements of 875(c), U.S. v. DeAndino, 958 F.2d 146, 148 (6th Cir. 1992)).

[173] Id. at 1492 (6th Cir. 1996).

[174] Id. at 1493.

[175] Alkhabez, 104 F.3d 1492, 1495 (6th Cir. 1996).

[176] Id. at 1497 (Krupansky, J., dissenting).

[177] Id. at 1502 (Krupansky, J., dissenting).

[178] Id. at 1497 (Krupansky, J., dissenting).

[179] Id.

[180] Id. at 1503 (Krupansky, J., dissenting).

[181] See Alkhabez, 104 F.3d 1492, 1504 n.10 (6th Cir. 1996)(Krupansky, J., dissenting)(stating that “there can be no doubt that a rational jury could find that some or all of the minacious communications charged in the superseding indictment against Baker constituted threats by the defendant to harm a female human being” before concluding that in each of the five counts a credible threat was made against an identifiable category of individuals); see also United States v. Carrier, 672 F.2d 300 (2d Cir. 1982)(discussing in the context of 871(a) and a threat to the President that it was error for the Judge to withhold from the jury’s consideration and decide as a matter of law that no rational person could determine the words spoken were a threat).

[182] See Alkhabez, 104 F.3d at 1505-1506, n.14 (6th Cir. 1996)(Krupansky, J., dissenting)(stating that applying the language from Kelner was too strict and “unjustifiably constrains, to a degree not demanded by the First Amendment, the authority of Congress to punish threats.”

[183] See Greenberg, Threats, Harassment, and Hate On-Line, supra note 13, at 676 (discussing remedies for on-line harassment). 

[184] See supra Section II (detailing the Claiborne case and how a disgruntled minority dental student at the University of Iowa College of Dentistry who sent racist threats sent via e-mail at first, and later culminated in a package being delivered to the recipient containing spaghetti dyed red and a note, “Dead black man’s brains").