Free Essay

Extortion

In:

Submitted By kwoodside
Words 2354
Pages 10
Amanda Todd’s Extortion, Cyber Bullying and Suicide Analysis Report
Kayla Woodside
Student # 0657835
Mount Saint Vincent University
PBRL 3013
March 15, 2015

Contents
Abstract 3
Introduction and background 3
Literature Review 4
Conclusion 9
References 10

Abstract
This research project looks at culturally attractive situations or occurrences in today’s world that has or had a significant effect on the media resulting to a trend or, otherwise known as a setting of agenda. This paper in particular will look at Amanda Todd’s extortion and cyber bullying leading to the suicide of the 15-year-old girl.
With a serious of articles from four different news sources, this paper will look at the history of the girl, what happened in her life leading to the bullying and how the “sextortion” (Kelley, M., 2013) lead to multiple suicide attempts and inevitably death of Amanda Todd. The paper will identify triggers for the articles trending, framing of the storytelling and underlying message within the articles answering questions of importance, publicity, and extortion amongst extortion.

Introduction and Background
According to Amanda Todd’s mother, Carol Todd, Amanda was a happy, popular, and energetic 15-year-old girl who loved to sing and perform. Despite being very shy, Amanda shined on camera and grew to love the technology that aided in her decision to end her life.
In 2010 Amanda was in seventh grade, she browsed the Internet like any other teenager and visited blogging sites as well as chat rooms. She used the chat rooms to meet new people, receiving compliments on not only her voice while singing, but her looks aswell. It wasn’t too long before there were contacts asking for more of Todd. These seemingly nice, school-aged boys needed more and more of Todd to the point where she gave in and exposed her breasts in the chatrooms. That’s when the blackmail started.
Todd refused to expose herself anymore, so the predator told her he would send the topless image of Todd to her friends, family and school if she didn’t oblige with more “shows”. It wasn’t until the Christmas break of the same school year did the Todd family find out the photo was circulating the Internet by the police at 4 a.m.
With her school friends bullying her, calling her names and excluding her, Amanda grew depressed, filled with anxiety all hours of the day. Todd and her family moved to another town and started a new school. Although this was an escape, a fresh start, Todd couldn’t escape the cyber-madness her life had become. The extortionist followed and so did the bullying from everyone at school once they found out. Todd experimented with drugs, alcohol and sex.
With nothing else to lose Todd felt so alone in a world of torture, she tried to take her life many times before successfully doing so on October 10, 2012.

Literature and Review
Martin Luther King Jr. once said, “In the end, we will remember not the words of our enemies, but the silence of our friends.” This has relevance to the findings of Todd’s case due to the correlation of the spiral of silence theory which states that people attempt not to violate social consensus for fear of being isolated and ostracized. People constantly monitor the environment to determine the distribution of opinions concerning controversial issues. Todd’s experiences with the external world bullying her are a direct example of spiral of silence. Fifteen to seventeen-year-old kids do not speak out against the crowd lightly and you can see the predominance within the teenage culture in everyday life and own experiences – everyone is growing into themselves but at the same time want to fit into what is deemed ‘popular’.
CBC1
The CBC’s The Fifth Estate, published Nov. 15, 2013, titled ‘The Sextortion of Amanda Todd’ tells Todd’s story in a broadcast television piece that shines a light on the extortion Todd suffered from online bullies as well as bullies in everyday life – there was no way out for the young, depressed girl. The framework depicts how predators can be alluring, attractive and seemingly innocent with the use of story framing, an explanation of the process of something or how something works historically with trend setting framing in it as well, the news as an ongoing trend. This feature article narrates the story in such ways to draw attention to Todd’s struggle and reality of her situation with the underlying message of awareness for Internet stalking with interest in the state.
The story was told through a broadcast television piece with it being the main story told for the night with the use of 8 different sources to make the story the most credible and opinionated as possible to add Logos to the story. The trigger is easy identifiable considering the story was very high profile and after the death of another young girl taking her life due to bullying, the outstanding problem is more evident than ever.
CBC2
Published Jan. 28, 2015 ‘Amanda Todd suspect Aydin Coban writes open letter proclaiming innocence’ tells the story of Todd’s alleged stalker claiming innocent one year after being imprisoned and nine charges laid. The public had great backlash towards the story on the side of Todd – the public asked ‘why claim innocent a year after?’ and concluded that he was a master manipulator.
The story frames the alleged predator claiming victim as nothing more than a victimizing predator who did on to 75 other girls as he allegedly did to Todd. This conjecture focuses on Coban around speculation of what may come after the open letter. With the use of two sources, the letter written by the alleged predator and the Royal Canadian Mounted Police (RCMP) the story successfully draws attention to the possible fight in court for freedom of Coban. This story had an underlying message in the form of a question, if someone already charged of nine offenses claims innocence after a year, where will this story go?
This smaller broadcast piece was more of a highlight of general news opposed to the feature stories of Todd’s awareness. The visuals used of the letter during the video cast a reality upon the letter.
CBC3
Published Dec. 5, 2014 ‘Stalking Amanda Todd: The man in the shadows’ gives life to the accused’s story identifying where he was from, what he was like and how the predator did made the same offences in three different countries, not all leading to death like Todd’s story. This framework of outlook fits into the history of the highly publicized case of Amanda Todd.
This feature story used many sources to tell Todd’s story to catch the readers up then used sources like Facebook security, Coban’s lawyer, the RCMP and the Norwegian family’s story of their daughter being extorted and blackmailed just like Todd.
With the underlying message of his guilt and another issue of awareness while online, the story uses photos of Todd during the broadcast to give a Pathos approach and add humility to the story of a sick man.
CBC4
Published April 11, 2013, ‘Amanda’s Mother Reaches out to Rehtaeh’s Mother’ looks at a story of a mother helping a mother deal with the loss of a sad young daughter taken back the victimizing students at her daughter’s school.
This reaction story is a result of another story like Todd’s where the use of the Internet extorting a photograph led to the depression and suicidal death of a girl much too young. With only one source being used – Carol Todd – the story creates a sense of community and awareness to the ongoing issue of cyber bully in today’s teenage culture.
With no visuals at all, the radio broadcast still creates that sense of underlying loss and need for awareness.
GM1
The Globe and Mail (GM) published an allude to the need of governments help for cyber bullying in ‘Cyber bullying bill C-13 moves on despite Supreme Court decision’. After the highly publicized deaths of Amanda Todd, Rehteah Parsons and Jamie Hubley the public’s need for awareness rose greatly which, gave the journalist a need for government answers. The framing of the story shines a light on the movement of a bill that took too long to create – this horse race framing highlights a need for responsibility in the government as well as having the underlying message out in the open to strictly identify the problem at hand. With the use of one photo – a suited man coming out of an office building – the story tells the tale of action and need for it.
The article could have added a non-government’s voice but it wasn’t needed to get the point of action needed out into the public.
TVS1
The Vancouver Sun (TVS), much like the CBC, felt a need for exposure of the accused. Published June 27, 2014, ‘Dutch man charged in Amanda Todd online blackmail case’ the story goes into detail like never before about Coban’s life and his arrest. With the framing tactic of personality profile and reality check, the article creates a profile of the accused as well as looks closely into the statements made and information given about the man.
With over eight sources ranging from the RCMP, prosecutors and lawyers dealing with the predator the story also highlights Todd with her mother’s words, and more from the family of the Netherlands teen who suffered much like Todd but with a better ending. With greater look at the legal system and Coban’s life working from cabin to cabin trying to find more young girls who hasn’t come into their own and lies victim to the praise and approval he has to offer, the story has a message of further awareness and the issues at hand from this man’s poor choices is a great issue with the number of cases of cyber bullying rising.
The story leads with the YouTube video Todd posted about her death. She told her story on small white peaches on paper with a black marker, showing the world that she isn’t the bad guy – she admits to her bad choice of exposing herself and falling into the hands of not only men taking advantage of her but young boys as well. Wit the video cascading a darkness of the article the need for awareness is shown strong.
NP1
The National Post (NP) published ‘Manitoba brothers jailed 16 month for ‘relentless’ cyber bullying attack on teen girl’ on Dec. 4, 2014. The story was written by the news wire Canadian Press as a general news story. Stories such as these, no matter how small have now had great impact on today’s society due to the highly publicized story of Todd and Parsons. The framing calls for more awareness within the communities and the fact that ‘sextortion’ is increasingly becoming an issue in a society of technologically advancing children. The outlook story tells a tale of current news that fits into the trend in history.
With use of sources like the judge in the Manitoba case and The Canadian Centre for Child Protection the call to action couldn’t be louder for the ongoing issue. This is another example where the need of an underlying message is laid out clear.
The story uses a short video in the middle of the story of Rehteah Parson’s mother speaking along side The Canadian Center for Child Protection in a conference for an anti-bullying curriculum and a photo of a man tying on a keyboard to highlight the ongoing issue of Internet predators.

In conclusion, these examples of the highly publicized events of cyber bully, real life bullying and extortion of young girls has had a significant reaction and effect on mainstream media due to the trend in which tragedy effected and resulted from spiral of silence. Agenda setting rand strong within theses stories because of the call to action Todd’s parents created with later help from the Parson’s tragedy. Although the call to action and awareness is strong, one has to wonder if the exact thing that calls for awareness is extorting the story of an extorted young girl.

References
Kelley, M. (2013, April 10). The Sextortion of Amanda Todd - the fifth estate - CBC News. Retrieved March 16, 2015, from http://www.cbc.ca/fifth/episodes/2013-2014/the-sextortion-of-amanda-todd
News, C. (2015, January 29). Amanda Todd suspect Aydin Coban writes OPEN letter proclaiming innocence. Retrieved March 16, 2015, from http://www.cbc.ca/news/canada/amanda-todd-suspect-aydin-coban-writes-open-letter-proclaiming-innocence-1.2935055
Stalking Amanda: The Man in the Shadows. (2014, December 5). Retrieved March 16, 2015, from http://www.cbc.ca/player/Shows/Shows/the fifth estate/Season 40/ID/2627013385/
Amanda Todd's Mother reaches out to Rehteah's Mother. (2013, April 11). Retrieved March 16, 2015, from http://www.cbc.ca/player/News/Canada/NS/Rehtaeh Parsons/ID/2375621678/
Wingrove, J. (2014, October 1). Cyberbullying bill C-13 moves on despite Supreme Court decision. Retrieved March 16, 2015, from http://www.theglobeandmail.com/news/politics/cyberbullying-bill-c-13-moves-on-despite-supreme-court-decision/article20885941/
Culbert, L., & Hager, M. (2014, June 27). Dutch man charged in Amanda Todd ONLINEblackmail case. Retrieved March 16, 2015, from http://www.vancouversun.com/life/Dutch charged Amanda Todd ONLINE blackmail case/9749151/story.html
Manitoba brothers jailed 16 months for 'relentless' cyberbullying attack on teen girl. (2014, December 4). Retrieved March 16, 2015, from http://news.nationalpost.com/2014/12/04/manitoba-brothers-jailed-for-relentless-cyberbullying-attack-on-teen-girl/
Hallahan, K. (n.d.). Seven Models Of Framing: Implications For Public Relations. Journal of Public Relations Research, 205-242.
Weick, K. (n.d.). Agenda Setting in Organizational Behavior: A Theory-Focused Approach.Journal of Management Inquiry, 171-182.
Noelle-Neumann, E. (1974), The Spiral of Silence A Theory of Public Opinion. Journal of Communication, 24: 43–51. doi: 10.1111/j.1460-2466.1974.tb00367.x
Martin luther king jr quotes in the end. (n.d.). Retrieved March 16, 2015, from http://iqirugajun.comze.com/martin-luther-king-jr-quotes-in-the-end.php

Similar Documents

Free Essay

Graveyard Shift

...Graveyard shift Essay “An eye for an eye and a tooth for a tooth” Many people who have lost their beloved ones are willing to do anything just to take their revenge. A few people would take it to another level by killing people who have some similarities with the killer. Some people would take the revenge just for the pride sake. While others are doing it because of the love for the ones they have lost. This is what we are introduce to in Graveyard shift by James M. Reasoner. In this story, we are dealing with cold-blooded killer who apparently works in a convenience store. Our main character has been traveling the country and whenever he stays in a town he always get a job in a convenience store. Convenience store always needs help and our main character has plenty of experience. So getting a job is not a problem for him. The all-night shifts is always assigned to our main character witch he is cool it gives him the days free so he can do anything he wants to. He has traveled around the country, and this convenience store is not the first one he has been working in and will not be the last one either. Our main character has lost his wife so he is a lonely widow. His wife was shot in a little store and due to bleeding; she died (P 81 L 1 - 4). Now our main character is taking his wife’s revenge by killing robbers. Revenge is also the main theme in this story. When the robber enters the store second time, our main character gets very scared because this time the robber don’t...

Words: 557 - Pages: 3

Free Essay

Price Gauging

...A. Briefly assess the law from a deontological perspective (intentions, principles, non-consequential). To assess the law from deontological perspective, we would have to define first what deontological means: Deontological ethics or deontology (from Greek deon, "obligation, duty"; and -logia) is an approach to ethics that judges the morality of an action based on the action's adherence to a rule or rules. Deontologists look at rules and duties. In the wake of natural disaster, essentials -- such as food, ice generators, lanterns, lumber, etc. -- may be in short supply. By Florida law, charging exorbitant or excessive prices for these and other necessities following a disaster is not only unethical, it's illegal. Assessing the law from a deontological perspective we would have to say that the Florida law is trying to pursue “the moral thing to do” in this kind of situations where people are desperate to obtain these items that in a state of emergency become basic needs for survival. Stating the deontological ethics there would not be bad consequences from the act of prohibit price gouging in the market neither the consumers because we would be following the rules of helping one to each others. Morally people should not take advantage of difficult times to increase prices that would harm the consumer and his ability to obtain the products that would help him/her survive. B. Assume that you manage a retail business in a low to medium income area of Miami...

Words: 1005 - Pages: 5

Free Essay

Penal Code

...If a person he who alleged had ask money, in exchange of the threat of publishing damaging information. This act was in violation of Article 356 of Republic Act. No. 3815 (Revised Penal Code of the Philippines), which states: "Threatening to publish and offer to present such publication for a compensation - The penalty of arresto mayor or a fine from 200 to 2,000 pesos, or both, shall be imposed upon any person who threatens another to publish a libel concerning him or the parents, spouse, child, or other members of the family of the latter or upon anyone who shall offer to prevent the publication of such libel for a compensation or money consideration." Example, the case of Vhong Navarro against Cedric Lee and Denice Cornejo is one of the examples of the said article. The respondents conspired in beating up and threatening Navarro and it was done for the purpose of extorting money from him. Navarro claimed that the group demanded P2 million from him as compensation for Cornejo. According to Dennis Manalo, Navarro’s lawyer, “Actor Vhong Navarro has been receiving threatening text messages since the mauling incident that involved businessman Cedric Lee and model Deniece Millet Cornejo”. Manalo added that an unknown man also visited Navarro’s residence and asked to open the gate after the actor appeared on television about the mauling incident. Cornejo and Lee agreed on their actions to attain their goal of restraining the liberty of Navarro as they threatened to kill him...

Words: 318 - Pages: 2

Premium Essay

Caselets: Bribery and Extortion in International

...Bribery and Extortion in International Business Case 1. Case 1 (payment to general’s Swiss bank account): Would you make the payment to the general’s Swiss bank account? Why or why not? You should discuss the relevant laws in your answer. I would not make the 2 million dollar payment to the Swiss bank account of the general in charge of the ministry. First, this payment would be in direct violation of U.S. law, the foreign corrupt practices act (FCPA). This law forbids any payment by a company, its employees, or its agents directly or indirectly to a foreign government official or a foreign political party. Providing this payment is a bribe, this practice can lead to large fines and prison time and personally I don’t look good an orange jump suit. Secondly, this is an unethical practice and could damage the reputation of the company. It can also lead to a dysfunctional, inefficient and deleterious company culture within its own walls. From a pure risk based perspective, the risk out ways the reward significantly. The US company should find a “creative” legal approach to setting itself apart and securing this contract. 2. Case 2 (Speaker of the House): Would you hire the Speaker? Why or why not? You should discuss the relevant laws in your answer. I would hire the local law firm with the Harvard trained nationals of this African county. Taking the advice of the other American companies would cause you to violate the FCPA since the House, in that country will need...

Words: 595 - Pages: 3

Premium Essay

Subcategories Of Manipulation And Corruption

...Financial crimes have various subcategories in Manipulation and Corruption. I have chosen to discuss the subcategories extortion and bribery. Extortion is a subcategory regarding to manipulation. Bribery is a subcategory regarding corruption. Extortion and bribery have similarities and differences. Many offenders and victims are associated with both subcategories. Offenders commit these crimes for a reason. Extortion and Bribery are committed in different ways. The subcategories can cause harm to the society. (Findlaw.com) states that extortion is the crime of taking money or property by threating the victim. The threats can include family, friends, intimidation, humiliation, or even false claim of a right. Extorting anyone is dangerous. It...

Words: 629 - Pages: 3

Premium Essay

Exposing

...usually happens? How can accounting fraud being done? What causes accountants to commit this action? When can companies detect accounting fraud? Keywords: Fraud, Detect, Prevention, Accounting, Fraudulent, Mind, Psychology, Crime Introduction Worries about fraud have been of down to earth noteworthiness for whatever length of time that composed records have been kept, and for sure may be a noteworthy purpose behind the advancement of composing and record keeping. A great part of the extortion writing begins with a recitation of scandalous bookkeeping and corporate outrages and cheats, and these regularly energize open intrigue and concern. Worry with misrepresentation and cubicle wrongdoing influences open trust in organizations as differing as securities exchanges, examiners, financiers, corporate administrators and government. Different corporate, social and political outrages, extortion and debasement in government and the deceitful practices in legislative issues, money related foundations, companies, NGOs and religious establishments affect the authenticity of such organizations. It likewise affects how financial, political and social life is...

Words: 3580 - Pages: 15

Premium Essay

Trends in Cybercrime-"Sextortion" in Teens and Children

...Trends in Cybercrime-“Sextortion” in Teens and Children Curtis M. Styles CJA/570 April 23, 2012 Ray Gagne Trends in Cybercrime-"Sextortion" in Teens and Children Electronic methods of committing crimes in society today, is generally a new phenomenon. Modern crimes directed against the operation of computer technology itself, presents new crimes that are as new as contemporary technology. The Internet has opened a variety of new rooms for cybercriminals to commit cyber-based terrorist attempts, computer intrusions, and major cyberfrauds. Cyberextortion is an outsider threat designed to obtain money, products, or favorable considerations from an organization or individuals by using illegal means of persuasion related to computer intrusion (Cybercrime Investigation & Intelligence, 2012). This paper addresses the relatively new form of sexual exploitation called “sextortion” that has emerged on the cybersex crime scene recently, and its affect upon teenagers and children. In addition, the paper addresses the dangers of scams associated with “sextortion”, its criminal profile, law enforcement initiatives to combat “sextortion”, and the penalties for committing these types of crimes. “Sextortion” is a method of sexual exploitation in which individuals are extorted with nude images of themselves shared online over the Internet. Texting has become the modern day method of communication among teens and children, and in the case of “sextortion” these images are displayed...

Words: 2163 - Pages: 9

Free Essay

Sathyam Computers

...issue that is raising both in its recurrence and seriousness. Exploration confirmation has demonstrated that these developing number of fakes have made undermined the trustworthiness of monetary reports, added to generous financial misfortunes, and disintegrated speculators' certainty with respect to the handiness and dependability of money related articulations. The expanding rate of these sort of law violations need to get hardened punishments, excellent disciplines, and powerful requirement of law with the right soul. An endeavor is made to inspect and investigate inside and out the Satyam Computer's "inventive bookkeeping" embarrassment, which conveyed to spotlight the significance of "morals and corporate administration" (CG). The extortion submitted by the authors of Satyam in 2009, is a demonstration of the way that "the art of behavior is influenced in huge by human eagerness, aspiration, and crave influence, cash, acclaim and wonderfulness". Dissimilar to Enron, which sank because of "organization" issue, Satyam was conveyed to its knee because of "burrowing" impact. The Satyam embarrassment highlights the significance of securities laws and CG in "developing" markets. Without a doubt, Satyam misrepresentation "prodded the administration of India to fix the CG standards to anticipate repeat of comparative cheats in future". Therefore, major monetary reporting fakes need to be considered for "lessons-educated" and "methodologies to-take after" to lessen the occurrences...

Words: 3054 - Pages: 13

Free Essay

Computers as Targets

...system with intent of damaging, deleting or altering computer data. Computer crimes also include the activities such as electronic frauds, misuse of devices, identity theft and data as well as system interference. Computer crimes may not necessarily involve damage to physical property. They rather include the manipulation of confidential data and critical information. Computer crimes involve activities of software theft, wherein the privacy of the users is hampered. These criminal activities involve the breach of human and information privacy, as also the theft and illegal alteration of system critical information ("Types of Computer Crimes"). The three crimes that I thought contained to this case where cyber extortion, Phreaking, and identity theft. Cyber extortion is a form of online crime in which a website, e-mail server, or computer system is subjected to repeated denial of service or other attacks by malicious hackers, who demand money in return for promising to stop the attacks. For example is when Cynthia was instructed to pay four payments of $999.99 through PayPal, but when she cooperated with PayPal, her identity was obtained ("IT Law Wiki"). This is when identity theft came in the case. Identity theft is someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain. I also believe that this case has some to do with Phreaking. This is the manipulation of telecommunications carrier to...

Words: 401 - Pages: 2

Free Essay

Organized Crime Group Analysis

...had committed many crimes including Gambling, Drug Dealing, Extortion, Murder, and Union corruption. The article also talked about early mafias, and original gangsters that made themselves most wanted criminals from under the names of their mafias. It addresses many criminal names like “Martin Angelina”, “John Gotti”, and “Joe Merlino”. But that’s beside the point; this article focuses on the Genovese Family, from Newark, New Jersey and their control over the International Longshoremen’s Association (ILA). They compare this mafia’s legacy to the 1954 film classic “On the Waterfront”; they also tell us that individuals state that the Genovese Organization has been in the “nearly three-decades-long extortion of post workers”. The mobs point man was Steven “Beach” Depiro, he was 55 and a very reputed solider. The Mob members had to kick back their Christmas bonuses just for the organization to work. Even Union Leaders were charged in the 53 count indictment, the indictment also listed the salaries of 7 of the ILA members, their salaries ranged from $230,512 to $532,719. Many things have changed over time since Marlon Brando’s Terry Malloy went and stood up against of the corrupt union bosses in “On the Waterfront”. The U.S. attorney Paul Fishman feels as though union workers should feel safe working in their workplace without having to feel like they’re going to get a shakedown, or extortion. Shakedowns and extortions were a part of the indictments, but to sum it all up mafias...

Words: 839 - Pages: 4

Free Essay

Harry Nuts Squirel

...The Under Tree Crime Life of the Top Squirrel Harry “Nuts” Chrissy Taylor ITT Technical Institute Research Ideas The crime life of SwM Facts/other info * They are tougher than a regular SwM Advantages * They are feared * Make tons of nuts/acorns by running walnut casinos and through acorn extortion * Keeps the gangs under control exp: chipmunk street gang under control out of fear * Having some of the rat patrol in their Back cheeks Disadvantages * Always the chance of being road kill * Risk of going to the nuthouse * Their wife and kids could be squirrel bait At anytime * Going nuts due to that they are constantly Under nutvalance Outline Introduction * General topic: crime life of a SwM * Limited topic: SwM as a Nutpin * Thesis: The SwM known as the Nutpin Body paragraphs * Advantages * Disadvantages Conclusion: Trying to get out of the crime life The Under Tree Crime Life of the Top Squirrel…Harry “Nuts” Since the enormous increase in population within the Squirrels with Moustaches (SwM) community, there has come a group of tougher SwMs. These now tougher Squirrels with Moustaches are known as the Grey Moustache family. They have come here from Elm Wood Treeville. They live the life of a crime family and there is one top SwM known as the Nut Pin is also known as “The Boss”. His name is Harry “Nuts” Squirrel. There is a constant threat of Harry “Nuts” becoming road kill, being sent...

Words: 821 - Pages: 4

Premium Essay

Essay On Cybercrime

...every day we hear from the news, newspaper and social media, there's a huge number of people who are victims cybercrime. Brenner (2010) in Cybercrime: Criminal Threats from Cyberspace book state, this type of crimes found in 21-century after the development and globalization because people used technology, but they don't have enough information and not aware about this issue. In addition, Cybercrime is the type of criminal crime which is punishable by law and it means that Using technology resources. Such as, the internet for committing serious crimes such as, deception, fraud, theft, copyright violations and extortion through online stalking, harassment, defamation, and invasion of privacy. Moreover, The cybercrime divided into three divisions, the first division is crimes...

Words: 1569 - Pages: 7

Free Essay

Theft

...Project on theft - Section 378 of IPC INTRODUCTION In common usage, theft is the taking of another person's property without that person's permission or consent with the intent to deprive the rightful owner of it. The word is also used as an informal shorthand term for some crimes against property, such as burglary, embezzlement, larceny, looting, robbery, shoplifting and fraud. In some jurisdictions, theft is considered to be synonymous with larceny; in others, theft has replaced larceny. For the offence of theft there is punishment of imprisonment of either description which may extend to 3 years, with fine, or both according to the Indian Penal Code. The offence of theft is even though cognizable [1] and non-bailable [2] it is compoundable[3]. So according to the criminal justice jurisprudence when the offence is compoundable then generally it cannot be term as serious category of an offence. Otherwise also the seriousness and gravity of an offence can be assessed by the fact and circumstances involve in any incidence of crime. Every citizen in a free country is having right to do fair, law based analysis of any judgment given by any courts in India without challenging the integrity of the person working as judge. According to SECTION 378 OF INDIAN PENAL CODE, Whoever, intending to take dishonestly any moveable property out of the possession of any person without that per­son’s consent, moves that property in order to such taking, is said to commit theft. ...

Words: 5244 - Pages: 21

Premium Essay

Personal Perception of Organized Crime Paper

...Organized crime, today, is huge in the United States. The media depicts organized crime by showing a family of the Italian decent controlling either the neighborhood or the city. Shows like the Sopranos, is a good example of a family base organized crime. This paper will discuss how I would describe or define organized crime, how does the perception compare to the definitions in the readings, and the characteristics that are associated with organized criminal behavior. When I think of organized crime, the definition that pops into my head is that it is a group a people, either one ethnic group or different races, that runs or controls the neighborhood or probably the city. They either sell drugs and other goods and they also kill anyone that mess with them or their family or a person that owes them money. The definition that the book describe or define organized crime is the dominated by (but is not exclusively) a single, monolithic criminal organization made up of criminals of Italian descent—the Mafia. (Lyman, 2007) In 2005, the NCIS describe organized crime as a group that contains at least three people; criminal activity the group engages in is ongoing and indefinite in duration; group is motivated by a desire for profit or power; and the group commits serious criminal offenses. (Lyman, 2007) There are two structures that can be look at when defining the organize crime of its activity and structures. The first thing is that organized crime is now going global. With technology...

Words: 1104 - Pages: 5

Premium Essay

Section 498a of the Ipc

...limb or health (whether mental or physical) of the woman; or (b) harassment of the woman where such harassment is with a view to coercing her or any person related to her to meet any unlawful demand for any property or valuable security or is on account of failure by her or any person related to her to meet such demand. GENERAL INFORMATION ABOUT SECTION 498A- 498A can only be invoked by wife/daughter-in-law or her relative. Most cases where Sec 498A is invoked turn out to be false (as repeatedly accepted by High Courts and Supreme Court in India) as they are mere blackmail attempts by the wife (or her close relatives) when faced with a strained marriage. In most cases 498a complaint is followed by the demand of huge amount of money (extortion) to settle the case out of the court. This section is non-bailable (you have to appear in court and get bail from the judge), non-compoundable (complaint can't be withdrawn) and cognizable (register and investigate the complaint, although in practice most of the time arrest happens before investigation). There have been countless instances where, without any investigation, the police have arrested elderly parents, unmarried sisters, pregnant sister-in-laws and even 3 year old children. In these...

Words: 1894 - Pages: 8