Crime of Extortion and Potential Defense Essay

Exclusively available on IvyPanda Available only on IvyPanda

The crime of extortion requires a criminal act element and a criminal intent element. The criminal act element characteristically implies obtaining property of another by using a threat to cause harm to the victim (Nikolić et al., 2017). The threat may be related to the victim’s health (to cause bodily injury), to property (to cause some damage on the victim’s property), to the victim’s reputation (to reveal some personal information). An example is a criminal demanding a victim to pay them twenty thousand dollars, or they will spread the victim’s private photos. However, some acts including threat, may not be considered the crime of extortion if they are not accompanied with the intent to thieve.

We will write a custom essay on your topic a custom Essay on Crime of Extortion and Potential Defense
808 writers online

Usually, the criminal intent element required for extortion is the purpose of obtaining money or property that one is not legally owning. Such specific intent should exist at the time of the threat to establish extortion. Conscious aim to commit the criminal act and making the threat is sufficient. It implies that the actual stealing of money or property is not required to commit the offense of extortion. Considering the previous example, if a person asks another to loan twenty thousand dollars and after getting refusal threats to spread photos – the criminal intent element required for extortion is lacking.

A possible defense to extortion could be evidence that the money or property belonging to another person and taken with the use of threat are taken fairly, for example, as compensation. Thus, if an employee does not get the money earned and threatens the employer to cause harm in order to receive a salary, technically, it is not considered an offense of extortion. To protect oneself from being a victim of such crimes, “educational programs that address related aspects, such as cyberviolence risks, personal data protection, preservation of digital evidence, appropriate reactions to cyber threats, and incident reporting” may be helpful (Vasiu & Vasiu, 2020, p. 24). Such strategies are highlighted since, nowadays, extortion has become a widespread crime in cyberspace due to the availability of mass digital technologies.

References

Nikolić, G., Bošković, A., & Trajković, T. (2017). The importance of secret surveillance of communications in detection and proving the criminal offense of extortion. Facta Universitatis, Series: Law and Politics, 15(3), 265-276. Web.

Vasiu, I., & Vasiu, L. (2020). Cyber Extortion and Threats: Analysis of the United States Case Law. Masaryk University Journal of Law and Technology, 14(1), 3-28. Web.

Print
Need an custom research paper on Crime of Extortion and Potential Defense written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2022, December 19). Crime of Extortion and Potential Defense. https://ivypanda.com/essays/crime-of-extortion-and-potential-defense/

Work Cited

"Crime of Extortion and Potential Defense." IvyPanda, 19 Dec. 2022, ivypanda.com/essays/crime-of-extortion-and-potential-defense/.

References

IvyPanda. (2022) 'Crime of Extortion and Potential Defense'. 19 December.

References

IvyPanda. 2022. "Crime of Extortion and Potential Defense." December 19, 2022. https://ivypanda.com/essays/crime-of-extortion-and-potential-defense/.

1. IvyPanda. "Crime of Extortion and Potential Defense." December 19, 2022. https://ivypanda.com/essays/crime-of-extortion-and-potential-defense/.


Bibliography


IvyPanda. "Crime of Extortion and Potential Defense." December 19, 2022. https://ivypanda.com/essays/crime-of-extortion-and-potential-defense/.

Powered by CiteTotal, the best referencing tool
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1