Crime of Extortion and Potential Defense Essay

Exclusively available on Available only on IvyPanda®
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

The crime of extortion requires a criminal act element and a criminal intent element. The criminal act element characteristically implies obtaining property of another by using a threat to cause harm to the victim (Nikolić et al., 2017). The threat may be related to the victim’s health (to cause bodily injury), to property (to cause some damage on the victim’s property), to the victim’s reputation (to reveal some personal information). An example is a criminal demanding a victim to pay them twenty thousand dollars, or they will spread the victim’s private photos. However, some acts including threat, may not be considered the crime of extortion if they are not accompanied with the intent to thieve.

Usually, the criminal intent element required for extortion is the purpose of obtaining money or property that one is not legally owning. Such specific intent should exist at the time of the threat to establish extortion. Conscious aim to commit the criminal act and making the threat is sufficient. It implies that the actual stealing of money or property is not required to commit the offense of extortion. Considering the previous example, if a person asks another to loan twenty thousand dollars and after getting refusal threats to spread photos – the criminal intent element required for extortion is lacking.

A possible defense to extortion could be evidence that the money or property belonging to another person and taken with the use of threat are taken fairly, for example, as compensation. Thus, if an employee does not get the money earned and threatens the employer to cause harm in order to receive a salary, technically, it is not considered an offense of extortion. To protect oneself from being a victim of such crimes, “educational programs that address related aspects, such as cyberviolence risks, personal data protection, preservation of digital evidence, appropriate reactions to cyber threats, and incident reporting” may be helpful (Vasiu & Vasiu, 2020, p. 24). Such strategies are highlighted since, nowadays, extortion has become a widespread crime in cyberspace due to the availability of mass digital technologies.

References

Nikolić, G., Bošković, A., & Trajković, T. (2017). The importance of secret surveillance of communications in detection and proving the criminal offense of extortion. Facta Universitatis, Series: Law and Politics, 15(3), 265-276. Web.

Vasiu, I., & Vasiu, L. (2020). Cyber Extortion and Threats: Analysis of the United States Case Law. Masaryk University Journal of Law and Technology, 14(1), 3-28. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, December 19). Crime of Extortion and Potential Defense. https://ivypanda.com/essays/crime-of-extortion-and-potential-defense/

Work Cited

"Crime of Extortion and Potential Defense." IvyPanda, 19 Dec. 2022, ivypanda.com/essays/crime-of-extortion-and-potential-defense/.

References

IvyPanda. (2022) 'Crime of Extortion and Potential Defense'. 19 December.

References

IvyPanda. 2022. "Crime of Extortion and Potential Defense." December 19, 2022. https://ivypanda.com/essays/crime-of-extortion-and-potential-defense/.

1. IvyPanda. "Crime of Extortion and Potential Defense." December 19, 2022. https://ivypanda.com/essays/crime-of-extortion-and-potential-defense/.


Bibliography


IvyPanda. "Crime of Extortion and Potential Defense." December 19, 2022. https://ivypanda.com/essays/crime-of-extortion-and-potential-defense/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
1 / 1