News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
GET RECOGNIZED.
Let an ISACA® certification
elevate your career.

Register today and save
World Wide Web
Gartner's #1 for endpoint backup
Average Rating:
Rate this article:  
High Court Will Hear Appeal Over Illegal Threats Online

High Court Will Hear Appeal Over Illegal Threats Online
By Sam Hananel

Share
Share on Facebook Share on Twitter Share on Linkedin Share on Google Plus

Free speech or illegal threats? The Supreme Court has agreed to consider whether people who post violent or threatening language on Facebook and other Internet forums must show intent to follow through on their threats in order to be prosecuted. When do threatening comments made on social media sites cross the line into criminal activity?
 



The Supreme Court will consider the free speech rights of people who use violent or threatening language on Facebook and other electronic media where the speaker's intent is not always clear.

The court on Monday agreed to take up the case of an eastern Pennsylvania man sentenced to nearly four years in federal prison for posting violent online rants against his estranged wife, law enforcement officials and former co-workers.

A federal appeals court rejected Anthony Elonis' claim that his comments were protected by the First Amendment. He says he never meant to carry out the threats. He claims he was depressed and made the online posts in the form of rap lyrics as a way of venting his frustration after his wife left him.

At his trial, the jury was instructed that Elonis could be found guilty if an objective person could consider his posts to be threatening. Attorneys for Elonis argue that the jury should have been told to apply a subjective standard and decide whether Elonis meant the messages to be understood as threats.

Elonis's lawyers say a subjective standard is appropriate given the impersonal nature of communication over the Internet, which can lead people to misinterpret messages. They argue that comments intended for a smaller audience can be viewed by others unfamiliar with the context and interpret the statements differently than was intended.

The Obama administration says requiring proof of a subjective threat would undermine the purpose of the federal law prohibiting threats.

The high court said it will consider whether conviction of threatening another person under federal law "requires proof of the defendant's subjective intent to threaten."

For more than 40 years, the Supreme Court has said that "true threats" to harm another person are not protected speech under the First Amendment. But the court has cautioned that laws prohibiting threats must not infringe on constitutionally protected speech. That includes "political hyperbole" or "unpleasantly sharp attacks" that fall shy of true threats.

The federal statute targeting threats of violence is likely to be used more often in the coming years "as our speech increasingly migrates from in-person and traditional handwritten communication to digital devices and the Internet," said Clay Calvert, a law professor at the University of Florida.

Calvert, one of several free speech advocates who submitted a legal brief urging the court to use a subjective standard, said people mistakenly seem to feel that they can get away with more incendiary speech on the Internet, in tweets and in texts.

Elonis' estranged wife testified at his trial the postings made her fear for her life. One post about his wife said, "There's one way to love you but a thousand ways to kill you. I'm not going to rest until your body is a mess, soaked in blood and dying from all the little cuts."

FBI agents visited Elonis at home after the amusement park that fired him contacted law enforcement officials about his posts. After the agents left, Elonis wrote: "Little agent lady stood so close, took all the strength I had not to turn the (woman) ghost. Pull my knife, flick my wrist and slit her throat."
 


© 2014 Associated Press under contract with NewsEdge. All rights reserved.
 

Tell Us What You Think
Comment:

Name:

Real Americans Take Actio:

Posted: 2014-06-17 @ 1:44pm PT
If You don't have something nice to say. Then keep it to yourself. Free Speech - you have the right to say it - we have the right to respond accordingly. But I'd like to point out this is not speech - this is publishing, posting, intended for others to see - intended to cause distress which is harm. THIS IS WRITTEN WORD!!! not "speech"



Get Powerful App Acceleration with Cisco. In a world where time is money, you need to accelerate the speed at which data moves through your data center. Cisco UCS Invicta delivers powerful, easy-to-manage application acceleration for data-intensive workloads. So you can make decisions faster and outpace the competition. Learn More.


 World Wide Web
1.   Twitter May Remove Pics of Deceased
2.   Google IPO Began Decade of Big Bets
3.   Assange Talks of Leaving Embassy
4.   Russian Hacker To Be Held Until Trial
5.   Online Sites vs. Retailing in India


advertisement
OkCupid Experiments with Daters
Unethical without user consent?
Average Rating:
Twitter May Remove Pics of Deceased
Balancing privacy and public interest.
Average Rating:
Online Retailers Ponder Actual Stores
'Click-and-mortar' shops popping up.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Researchers Find Malicious Android Apps Can Hack Gmail
A new study shows that a weakness in the Android mobile operating system can be used to steal sensitive, personal info from unwitting users. Gmail proved to be the easiest app to attack; Amazon, the hardest.
 
UPS Stores in 24 States Hit by Data Breach
Big Brown has been breached. UPS said that about 105,000 customer transactions at 51 of its UPS Store locations in 24 states could have been compromised between January and August.
 
Cost of Target Data Breach: $148 Million Plus Loss of Trust
The now infamous Target data breach is still costing the company -- and its shareholders -- plenty. In fact, the retailing giant forecast the December 2013 incident cost shareholders $148 million.
 

Enterprise Hardware Spotlight
Acer's New Desktop Box Rides the Chrome OS Wave
Filling out its Chrome OS line, Acer is following the introduction of a larger Chromebook line earlier this month with a new tiny $180 desktop Chromebox and also a smaller Chromebook.
 
Feds OK $2.3 Billion IBM-Lenovo x86 Server Deal
IBM and Lenovo are celebrating U.S. approval of their x86-based server deal, having cleared some major security hurdles. The deal makes Lenovo a major player for enterprise data centers.
 
Three New Lenovo PCs Aimed at Business Users
With businesses wanting computing solutions that do more for less money, Lenovo has unveiled three new desktop PCs that it says offer solid computing at a budget-minded price.
 

Mobile Technology Spotlight
Screen Shortage Briefly Puts Brakes on iPhone 6
RAM? Check. Antenna switch? Check. Screen? Oops. Parts suppliers for Apple have found themselves facing a shortage of screens for the new iPhone 6 as next month's release date for the new smartphone looms.
 
Bounty Offered to Coders for Oculus Rift Bugs
Coders who find bugs in software for the Oculus Rift VR immersive headset could receive a reward of at least $500 under Facebook's White Hat bounty program. Facebook acquired Oculus in March.
 
Google Glass Adds Voice Access to Phone Contacts
The latest update to Google Glass will let users access their top 20 phone contacts with voice commands alone. A user can then choose a phone call, Google hangouts, e-mail or text messaging.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.