{"id":1313,"date":"2017-09-27T17:44:13","date_gmt":"2017-09-27T17:44:13","guid":{"rendered":"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/?post_type=chapter&#038;p=1313"},"modified":"2019-01-19T19:55:28","modified_gmt":"2019-01-19T19:55:28","slug":"11-2-extortion-robbery-and-receiving-stolen-property","status":"publish","type":"chapter","link":"https:\/\/courses.lumenlearning.com\/suny-sccc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/","title":{"raw":"11.2 Extortion, Robbery, and Receiving Stolen Property","rendered":"11.2 Extortion, Robbery, and Receiving Stolen Property"},"content":{"raw":"<div class=\"textbox\"><a class=\"irc_mil i3597\" href=\"https:\/\/www.google.com\/url?sa=i&amp;rct=j&amp;q=&amp;esrc=s&amp;source=images&amp;cd=&amp;ved=2ahUKEwjPmdHQzvrfAhUQjq0KHYqgCysQjRx6BAgBEAU&amp;url=https%3A%2F%2Frekordeast.co.za%2F70585%2Fvideo-shows-robbery-at-orchards-petrol-station%2Fvideo-robbery%2F&amp;psig=AOvVaw0V_NALF2d5--s1WuldJPMn&amp;ust=1548013675753594\" target=\"_blank\" rel=\"noopener\"><img class=\"irc_mi\" src=\"https:\/\/rekordeast.co.za\/wp-content\/uploads\/sites\/85\/2015\/11\/video-robbery.jpg\" alt=\"Image result for video of a robbery\" width=\"759\" height=\"460\" \/><\/a><\/div>\r\n<div><a href=\"https:\/\/youtu.be\/ny30O2sQAOk\">https:\/\/youtu.be\/ny30O2sQAOk<\/a><\/div>\r\n&nbsp;\r\n\r\n&nbsp;\r\n\r\nLearning Objectives\r\n<div id=\"storm_1.0-ch11_s02_n01\" class=\"bcc-box bcc-highlight\">\r\n<ol id=\"storm_1.0-ch11_s02_l01\" class=\"orderedlist\">\r\n \t<li>Define the criminal intent element required for extortion.<\/li>\r\n \t<li>Identify a potential defense to extortion.<\/li>\r\n \t<li>Define the attendant circumstances required for extortion.<\/li>\r\n \t<li>Define the harm element required for extortion.<\/li>\r\n \t<li>Analyze extortion grading.<\/li>\r\n \t<li>Identify the differences between robbery, larceny, and extortion.<\/li>\r\n \t<li>Analyze robbery grading.<\/li>\r\n \t<li>Define the criminal act element required for receiving stolen property.<\/li>\r\n \t<li>Define the criminal intent element required for receiving stolen property.<\/li>\r\n \t<li>Identify a failure of proof or affirmative defense to receiving stolen property in some jurisdictions.<\/li>\r\n \t<li>Define the attendant circumstances and harm element required for receiving stolen property.<\/li>\r\n \t<li>Analyze receiving stolen property grading.<\/li>\r\n<\/ol>\r\n<\/div>\r\n<div id=\"storm_1.0-ch11_s02_s01\" class=\"section\">\r\n<h2 class=\"title editable block\">Extortion<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s01_p01\" class=\"para editable block\">All states and the federal government criminalize <span class=\"margin_term\"><a class=\"glossterm\">extortion<\/a><\/span>, which is also called <strong class=\"emphasis bold\">blackmail<\/strong> (K.S.A. \u00a7 21-3428, 2011). As stated previously, the Model Penal Code criminalizes theft by extortion and grades it the same as all other nonforcible theft offenses (Model Penal Code \u00a7\u00a0223.4). Extortion is typically nonviolent, but the elements of extortion are very similar to <strong class=\"emphasis bold\">robbery<\/strong>, which is considered a forcible theft offense. Robbery is discussed shortly.<\/p>\r\n<p id=\"storm_1.0-ch11_s02_s01_p02\" class=\"para editable block\">Extortion has the elements of criminal act, criminal intent, attendant circumstances, causation, and harm, as is explored in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s02_s01\">Section 11.2.1 \"Extortion\"<\/a>.<\/p>\r\n\r\n<div id=\"storm_1.0-ch11_s02_s01_s01\" class=\"section\">\r\n<h2 class=\"title editable block\">Extortion Act<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s01_s01_p01\" class=\"para editable block\">The <strong class=\"emphasis bold\">criminal act<\/strong> element required for extortion is typically the theft of property accomplished by a <strong class=\"emphasis bold\">threat<\/strong> to cause <em class=\"emphasis\">future<\/em> harm to the victim, including the threat to inflict bodily injury, accuse anyone of committing a crime, or reveal a secret that would expose the victim to hatred, contempt, or ridicule (Ga. Code \u00a7 16-8-16, 2011). The Model Penal Code criminalizes theft by extortion when the defendant obtains property of another by threatening to inflict bodily injury on anyone, commit any criminal offense, accuse anyone of a criminal offense, expose any secret tending to subject any person to hatred, contempt, or ridicule or impair his credit and business repute, take or withhold action as an official, bring about a strike or boycott, testify with respect to another\u2019s legal claim, or inflict any other harm that would not benefit the actor (Model Penal Code \u00a7\u00a0223.4). Note that some of these acts could be <em class=\"emphasis\">legal<\/em>, as long as they are not performed with the unlawful intent to steal.<\/p>\r\n\r\n<div id=\"storm_1.0-ch11_s02_s01_s01_s01\" class=\"section\">\r\n<h2 class=\"title editable block\">Example of Extortion Act<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s01_s01_s01_p01\" class=\"para editable block\">Rodney tells Lindsey that he will report her illegal drug trafficking to local law enforcement if she does not pay him fifteen thousand dollars. Rodney has probably committed the criminal act element required for extortion in most jurisdictions. Note that Rodney\u2019s threat to expose Lindsey\u2019s illegal activities is actually <em class=\"emphasis\">desirable<\/em> behavior when performed with the intent to eliminate or reduce crime. However, under these circumstances, Rodney\u2019s act is most likely <em class=\"emphasis\">criminal<\/em> because it is supported by the intent to steal fifteen thousand dollars from Lindsey.<\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<div id=\"storm_1.0-ch11_s02_s01_s02\" class=\"section\">\r\n<h2 class=\"title editable block\">Extortion Intent<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s01_s02_p01\" class=\"para editable block\">The criminal intent element required for extortion is typically the <strong class=\"emphasis bold\">specific intent<\/strong> or <strong class=\"emphasis bold\">purposely<\/strong> to commit the criminal act and to unlawfully deprive the victim of property <em class=\"emphasis\">permanently<\/em> (Connecticut Criminal Jury Instructions \u00a7\u00a753a-119(5), 2011). This intent requirement is similar to the criminal intent element required for larceny and false pretenses theft, as discussed in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s01_s01_s02\">Section 11 \"Consolidated Theft Intent\"<\/a>. Some jurisdictions only require <strong class=\"emphasis bold\">general intent<\/strong> or <strong class=\"emphasis bold\">knowingly<\/strong> to perform the criminal act (Ariz. Rev. Stat. \u00a7 13-1804).<\/p>\r\n\r\n<div id=\"storm_1.0-ch11_s02_s01_s02_s01\" class=\"section\">\r\n<h2 class=\"title editable block\">Example of a Case Lacking Extortion Intent<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s01_s02_s01_p01\" class=\"para editable block\">Review the example with Rodney and Lindsey in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s02_s01_s01_s01\">Section 11 \"Example of Extortion Act\"<\/a>. Change the example and assume that Rodney asks Lindsey to loan him the fifteen thousand dollars so that he can make a balloon payment due on his mortgage. Lindsey refuses. Rodney thereafter threatens to expose Lindsey\u2019s drug trafficking if she doesn\u2019t loan him the money. In many jurisdictions, Rodney may not have the criminal intent element required for extortion. Although Rodney performed the criminal act of threatening to report Lindsey for a crime, he did so with the intent to <em class=\"emphasis\">borrow<\/em> money from Lindsey. Thus Rodney did not act with the specific intent or purposely to permanently deprive Lindsey of property, which could operate as a <strong class=\"emphasis bold\">failure of proof<\/strong> or <strong class=\"emphasis bold\">affirmative defense<\/strong> to extortion in many jurisdictions.<\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<div id=\"storm_1.0-ch11_s02_s01_s03\" class=\"section\">\r\n<h2 class=\"title editable block\">Extortion Attendant Circumstance<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s01_s03_p01\" class=\"para editable block\">Extortion is a form of theft, so it has the same <strong class=\"emphasis bold\">attendant circumstance<\/strong> required in consolidated theft statutes\u2014the property stolen belongs to <em class=\"emphasis\">another<\/em>. In many jurisdictions, it is an <strong class=\"emphasis bold\">affirmative defense<\/strong> to extortion that the property taken by threat to expose a secret or accuse anyone of a criminal offense is taken <em class=\"emphasis\">honestly<\/em>, as compensation for property, or restitution or indemnification for harm done by the secret or crime (Ga. Code \u00a7 16-8-16, 2011). The Model Penal Code provides an affirmative defense to extortion by threat of accusation of a criminal offense, exposure of a secret, or threat to take or withhold action as an official if the property obtained was \u201chonestly claimed as restitution or indemnification for harm done in the circumstances to which such accusation, exposure, lawsuit or other official action relates, or as compensation for property or lawful services\u201d (Model Penal Code \u00a7\u00a0223.4).<\/p>\r\n\r\n<div id=\"storm_1.0-ch11_s02_s01_s03_s01\" class=\"section\">\r\n<h2 class=\"title editable block\">Example of Extortion Affirmative Defense<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s01_s03_s01_p01\" class=\"para editable block\">Tara, a real estate broker, hires Trent to be a real estate sales agent in her small realty office. Tara decides she wants to get the property listing of a competitor by using Trent to obtain information. Tara tells Trent to pretend he is a buyer interested in the property. She asks him to make an appointment with the competitor, ask a lot of questions about the owner of the property, and thereafter bring Tara the information. Tara promises to pay Trent one thousand dollars for his time and effort. Trent spends several hours performing this task and thereafter demands his one thousand dollars payment. Tara tells Trent she is experiencing \u201ctough times\u201d and can\u2019t afford to pay him. Trent threatens to tell Tara\u2019s competitor what she is up to if she doesn\u2019t pay him the one thousand dollars. Trent has probably <em class=\"emphasis\">not<\/em> committed extortion in many jurisdictions. Although Trent threatened to expose Tara\u2019s secret if she didn\u2019t pay him one thousand dollars, Trent <em class=\"emphasis\">honestly<\/em> believed he was owed this money for a job he performed that was <em class=\"emphasis\">directly related<\/em> to the secret. Thus in many jurisdictions, Trent has an <strong class=\"emphasis bold\">affirmative defense<\/strong> that the money demanded was compensation for services and not the subject of unlawful theft by extortion.<\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<div id=\"storm_1.0-ch11_s02_s01_s04\" class=\"section\">\r\n<h2 class=\"title editable block\">Attendant Circumstance of Victim Consent<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s01_s04_p01\" class=\"para editable block\">Extortion also requires the <strong class=\"emphasis bold\">attendant circumstance<\/strong> of victim consent. With extortion, the victim consensually transfers the property based on <strong class=\"emphasis bold\">fear<\/strong> inspired by the defendant\u2019s threat (Oklahoma Uniform Jury Instructions No. CR 5-34, 2011).<\/p>\r\n\r\n<div id=\"storm_1.0-ch11_s02_s01_s04_s01\" class=\"section\">\r\n<h2 class=\"title editable block\">Example of Attendant Circumstance of Victim Consent for Extortion<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s01_s04_s01_p01\" class=\"para editable block\">Review the example with Rodney and Lindsey in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s02_s01_s01_s01\">Section 11 \"Example of Extortion Act\"<\/a>. Assume that Lindsey grudgingly gives Rodney the fifteen thousand dollars so that he will not report her drug trafficking. In this example, Lindsey is <em class=\"emphasis\">consensually<\/em> transferring the money to Rodney to prevent him from making good on his threat. Thus the attendant circumstance of victim <strong class=\"emphasis bold\">consent<\/strong> based on <strong class=\"emphasis bold\">fear<\/strong> is most likely present, and Rodney could be subject to prosecution for and conviction of extortion in most jurisdictions.<\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<div id=\"storm_1.0-ch11_s02_s01_s05\" class=\"section\">\r\n<h2 class=\"title editable block\">Extortion Causation<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s01_s05_p01\" class=\"para editable block\">The criminal act must be the <strong class=\"emphasis bold\">factual<\/strong> and <strong class=\"emphasis bold\">legal cause<\/strong> of extortion harm, which is defined in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s02_s01_s06\">Section 11 \"Extortion Harm\"<\/a>.<\/p>\r\n\r\n<\/div>\r\n<div id=\"storm_1.0-ch11_s02_s01_s06\" class=\"section\">\r\n<h2 class=\"title editable block\">Extortion Harm<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s01_s06_p01\" class=\"para editable block\">The defendant must <strong class=\"emphasis bold\">obtain<\/strong> property belonging to another for the completed crime of extortion in most jurisdictions (Oklahoma Uniform Jury Instructions No. CR 5-34, 2011). If the defendant commits the criminal act of threatening the victim with the appropriate criminal intent, but the victim does not actually transfer the property to the defendant, the defendant can only be charged with <em class=\"emphasis\">attempted<\/em> extortion (Oklahoma Uniform Jury Instructions No. CR 5-32, 2011).<\/p>\r\n\r\n<div id=\"storm_1.0-ch11_s02_s01_s06_s01\" class=\"section\">\r\n<h2 class=\"title editable block\">Example of a Case Lacking Extortion Harm<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s01_s06_s01_p01\" class=\"para editable block\">Review the example with Rodney and Lindsey in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s02_s01_s01_s01\">Section 11 \"Example of Extortion Act\"<\/a>. Assume that after Rodney threatens to report Lindsey\u2019s drug trafficking to local law enforcement, Lindsey calls local law enforcement, turns herself in for drug trafficking, and also reports Rodney for making the threat. In this case, because Rodney did not \u201cobtain\u201d property by threat, the crime of extortion is not complete, and <em class=\"emphasis\">attempted<\/em> extortion would be the appropriate charge in most jurisdictions.<\/p>\r\n\r\n<div id=\"storm_1.0-ch11_s02_s01_s06_s01_f01\" class=\"figure large editable block\" style=\"max-width: 600px;margin: auto\">\r\n<p class=\"title\"><span class=\"title-prefix\">Figure 11.4<\/span> Diagram of Defenses to Extortion<\/p>\r\n<a href=\"\/criminallaw\/wp-content\/uploads\/sites\/179\/2015\/11\/8b236ed6182366da662496af78af2c4d.jpg\"><img src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/2479\/2017\/09\/26210141\/8b236ed6182366da662496af78af2c4d.jpg\" alt=\"Diagram of Defenses to Extortion\" \/><\/a>\r\n\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div id=\"storm_1.0-ch11_s02_s01_s07\" class=\"section\">\r\n<h2 class=\"title editable block\">Extortion Grading<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s01_s07_p01\" class=\"para editable block\">Extortion is generally <strong class=\"emphasis bold\">graded<\/strong> as a felony in most jurisdictions (Or. Rev. Stat. \u00a7 164.075, 2011). As stated previously, the Model Penal Code grades extortion under its consolidated theft offense.<\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<div id=\"storm_1.0-ch11_s02_s02\" class=\"section\">\r\n<h2 class=\"title editable block\">Robbery<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s02_p01\" class=\"para editable block\"><span class=\"margin_term\"><a class=\"glossterm\">Robbery<\/a><\/span> was the first common-law theft crime. The criminalization of robbery was a natural progression from other common-law crimes against the person because robbery always involves force, violence, or threat and could pose a risk of injury or death to the robbery victim, defendant, or other innocent bystanders. Recall from <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/9-1-homicide\">Chapter 9 \"Criminal Homicide\"<\/a> that robbery is generally a serious felony that is included in most felony murder statutes as a predicate felony for <strong class=\"emphasis bold\">first-degree<\/strong> felony murder. When robbery does not result in death, it is typically graded more severely than theft under a consolidated theft statute. Robbery grading is discussed shortly.<\/p>\r\n<p id=\"storm_1.0-ch11_s02_s02_p02\" class=\"para editable block\">The elements of robbery are very similar to the elements of <strong class=\"emphasis bold\">larceny<\/strong> and <strong class=\"emphasis bold\">extortion<\/strong>. For the purpose of brevity, only the elements of robbery that are distinguishable from larceny and extortion are analyzed in depth. Robbery has the elements of criminal act, attendant circumstances, criminal intent, causation, and harm, as is explored in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s02\">Section 11.2 \"Extortion, Robbery, and Receiving Stolen Property\"<\/a>.<\/p>\r\n\r\n<div id=\"storm_1.0-ch11_s02_s02_s01\" class=\"section\">\r\n<h2 class=\"title editable block\">Robbery Act<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s02_s01_p01\" class=\"para editable block\">It is the criminal act element that primarily distinguishes robbery from larceny and extortion. The <strong class=\"emphasis bold\">criminal act<\/strong> element required for robbery is a taking of personal property by <strong class=\"emphasis bold\">force<\/strong> or <strong class=\"emphasis bold\">threat<\/strong> of force (Ind. Code \u00a7 35-42-5-1, 2011). Force is generally physical force. The force can be slight, but it must be more than what is required to gain control over and move the property (S.W. v. State, 2011). Many jurisdictions require force <em class=\"emphasis\">during<\/em> the taking, which includes the use of force to prevent the victim from reclaiming the property, or during escape (State v. Handburgh, 2011). The Model Penal Code requires force or threat \u201cin the course of committing a theft\u201d and defines this as occurring in \u201can attempt to commit theft or in flight after the attempt or commission\u201d (Model Penal Code \u00a7\u00a0222.1(1)). Threat for robbery is a threat to inflict <em class=\"emphasis\">imminent<\/em> force (Ala. Code \u00a7 13A-8-43, 2011).<\/p>\r\n<p id=\"storm_1.0-ch11_s02_s02_s01_p02\" class=\"para editable block\">While larceny and extortion also require a taking, the defendant typically accomplishes the larceny taking by stealth, or a false representation of fact. In extortion, the defendant accomplishes the taking by a threat of <em class=\"emphasis\">future<\/em> harm that may or may not involve <em class=\"emphasis\">force<\/em>.<\/p>\r\n\r\n<div id=\"storm_1.0-ch11_s02_s02_s01_s01\" class=\"section\">\r\n<h2 class=\"title editable block\">Example of Robbery Act<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s02_s01_s01_p01\" class=\"para editable block\">Review the example given in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s02_s01_s01_s01\">Section 11 \"Example of Extortion Act\"<\/a> with Rodney and Lindsey. In this example, Rodney threatened to expose Lindsey\u2019s drug trafficking if she didn\u2019t pay him fifteen thousand dollars. Change the example so that Rodney tells Lindsey he will kill her if she doesn\u2019t write him a check for fifteen thousand dollars. Rodney exemplifies his threat by pointing to a bulge in his front jacket pocket that appears to be a weapon. In this scenario, Rodney has most likely committed the criminal act element required for <strong class=\"emphasis bold\">robbery<\/strong>, <em class=\"emphasis\">not<\/em> <strong class=\"emphasis bold\">extortion<\/strong>. Rodney\u2019s threat is a threat of <em class=\"emphasis\">immediate force<\/em>. Compare this threat to Rodney\u2019s threat to expose Lindsey\u2019s drug trafficking, which is a threat of <em class=\"emphasis\">future<\/em> harm that relates to Lindsey\u2019s <em class=\"emphasis\">arrest<\/em> for a crime, rather than force.<\/p>\r\n\r\n<\/div>\r\n<div id=\"storm_1.0-ch11_s02_s02_s01_s02\" class=\"section\">\r\n<h2 class=\"title editable block\">Example of a Case Lacking Robbery Act<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s02_s01_s02_p01\" class=\"para editable block\">Peter, a jewelry thief, notices that Cheryl is wearing a diamond ring. Peter walks up to Cheryl and asks her if she wants him to read her palm. Cheryl shrugs her shoulders and says, \u201cSure! What have I got to lose?\u201d While Peter does an elaborate palm reading, he surreptitiously slips Cheryl\u2019s diamond ring off her finger and into his pocket. Peter has probably <em class=\"emphasis\">not<\/em> committed the criminal act element required for robbery in this case. Although Peter used a certain amount of physical force to remove Cheryl\u2019s ring, he did not use any force <em class=\"emphasis\">beyond<\/em> what was required to gain control over Cheryl\u2019s property and move it into his possession. Thus Peter has probably committed the criminal act element required for <strong class=\"emphasis bold\">larceny<\/strong> theft, <em class=\"emphasis\">not<\/em> <strong class=\"emphasis bold\">robbery<\/strong>, and is subject to less severe sentencing for this lower-level offense.<\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<div id=\"storm_1.0-ch11_s02_s02_s02\" class=\"section\">\r\n<h2 class=\"title editable block\">Robbery Attendant Circumstances<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s02_s02_p01\" class=\"para editable block\">Another difference between robbery and larceny or extortion is the <strong class=\"emphasis bold\">attendant circumstances<\/strong> requirement(s). Robbery requires the same attendant circumstance required for both larceny and extortion\u2014that the property taken belongs to another. It also has the same attendant circumstance as larceny\u2014that the defendant accomplish the taking against the victim\u2019s will and without consent. However, robbery has one additional attendant circumstance, which is that the property be taken <strong class=\"emphasis bold\">from the victim\u2019s person<\/strong> or <strong class=\"emphasis bold\">presence<\/strong> (Cal. Penal Code \u00a7 211). The property does not need to be in the actual physical possession of the victim, as long as it is under the victim\u2019s <em class=\"emphasis\">control<\/em> (Jones v. State, 2011). Thus if the victim could have prevented the taking if not for the force, violence, or threat posed by the defendant, this attendant circumstance is present (Jones v. State, 2011).<\/p>\r\n\r\n<div id=\"storm_1.0-ch11_s02_s02_s02_s01\" class=\"section\">\r\n<h2 class=\"title editable block\">Example of Robbery Attendant Circumstances<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s02_s02_s01_p01\" class=\"para editable block\">Review the example given in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s02_s02_s01_s01\">Section 11 \"Example of Robbery Act\"<\/a> with Rodney and Lindsey. In this example, Rodney tells Lindsey he will kill her if she doesn\u2019t write him a check for fifteen thousand dollars. Change this example so that Rodney knows Lindsey has recently withdrawn fifteen thousand dollars in cash from the bank. Rodney demands the cash, tells Lindsey he will kill her if she doesn\u2019t give it to him, and gestures toward a bulge in his front jacket pocket that appears to be a weapon. Lindsey tells Rodney, \u201cThe money is in my purse, but if you take it, you will be ruining my life!\u201d and points to her purse, which is on the kitchen table a few feet away. Rodney walks over to the table, opens Lindsey\u2019s purse, and removes a large envelope stuffed with bills. In this scenario, the attendant circumstances for robbery appear to be present. Rodney took the property of another without consent. Although the money was not on Lindsey\u2019s person, it was in her <strong class=\"emphasis bold\">presence<\/strong> and subject to her <strong class=\"emphasis bold\">control<\/strong>. If Rodney had not threatened Lindsey\u2019s life, she could have <em class=\"emphasis\">prevented<\/em> the taking. Thus Rodney has most likely committed robbery and is subject to prosecution for and conviction of this offense.<\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<div id=\"storm_1.0-ch11_s02_s02_s03\" class=\"section\">\r\n<h2 class=\"title editable block\">Robbery Intent<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s02_s03_p01\" class=\"para editable block\">The criminal intent element required for robbery is the same as the criminal intent element required for larceny and extortion in many jurisdictions. The defendant must have the <strong class=\"emphasis bold\">specific intent<\/strong> or <strong class=\"emphasis bold\">purposely<\/strong> to commit the criminal act and to deprive the victim of the property <em class=\"emphasis\">permanently<\/em> (Metheny v. State, 2011). Some jurisdictions do not require the intent to permanently deprive the victim of property and include <em class=\"emphasis\">temporary<\/em> takings in the robbery statute (Fla. Stat. Ann. \u00a7 812.13, 2011).<\/p>\r\n\r\n<div id=\"storm_1.0-ch11_s02_s02_s03_s01\" class=\"section\">\r\n<h2 class=\"title editable block\">Example of Robbery Intent<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s02_s03_s01_p01\" class=\"para editable block\">Review the example with Rodney and Lindsey in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s02_s01_s02_s01\">Section 11 \"Example of a Case Lacking Extortion Intent\"<\/a>. In this example, Rodney demands a loan from Lindsey in the amount of fifteen thousand dollars and threatens to expose her drug trafficking activities if she doesn\u2019t comply. Change this example so that Rodney tells Lindsey to loan him fifteen thousand dollars or he will kill her, gesturing at a bulge in his front jacket pocket that appears to be a weapon. In a jurisdiction that requires the criminal intent to <strong class=\"emphasis bold\">permanently<\/strong> deprive the victim of property for robbery, Rodney does not have the appropriate criminal intent. In a jurisdiction that allows for the intent to <strong class=\"emphasis bold\">temporarily<\/strong> deprive the victim of property for robbery, Rodney has the appropriate criminal intent and may be charged with and convicted of this offense.<\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<div id=\"storm_1.0-ch11_s02_s02_s04\" class=\"section\">\r\n<h2 class=\"title editable block\">Robbery Causation and Harm<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s02_s04_p01\" class=\"para editable block\">The criminal act supported by the criminal intent must be the <strong class=\"emphasis bold\">factual<\/strong> and <strong class=\"emphasis bold\">legal cause<\/strong> of the robbery <strong class=\"emphasis bold\">harm<\/strong>, which is the same as the harm requirement for larceny and extortion: the property must be transferred to the defendant (Oklahoma Uniform Jury Instructions No. CR 4-141, 2011). In some jurisdictions, <em class=\"emphasis\">no<\/em> transfer of property needs to take place, and the crime is complete when the defendant employs the force or threat with the appropriate criminal intent (Williams v. State, 2011).<\/p>\r\n\r\n<div id=\"storm_1.0-ch11_s02_s02_s04_s01\" class=\"section\">\r\n<h2 class=\"title editable block\">Example of Robbery Harm<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s02_s04_s01_p01\" class=\"para editable block\">Review the example with Rodney and Lindsey in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s02_s02_s02_s01\">Section 11 \"Example of Robbery Attendant Circumstances\"<\/a>. In this example, Rodney threatens to kill Lindsey if she does not give him fifteen thousand dollars out of her purse and gestures to a bulge in his front jacket pocket that appears to be a weapon. Change this example so that Lindsey leaps off of the couch and tackles Rodney after his threat. She reaches into his pocket and determines that Rodney\u2019s \u201cgun\u201d is a plastic water pistol. Rodney manages to get out from under Lindsey and escapes. If Rodney and Lindsey are in a jurisdiction that requires a transfer of property for the harm element of robbery, Rodney has probably only committed <em class=\"emphasis\">attempted<\/em> robbery because Rodney did not get the chance to take the money out of Lindsey\u2019s purse. If Rodney and Lindsey are in a jurisdiction that does <em class=\"emphasis\">not<\/em> require a transfer of property for the harm element of robbery, Rodney may be subject to prosecution for and conviction of this offense.<\/p>\r\n\r\n<div style=\"text-align: center\">\r\n<div id=\"storm_1.0-ch11_s02_s02_s04_s01_f01\" class=\"figure full editable block\">\r\n<p class=\"title\"><span class=\"title-prefix\">Figure 11.5<\/span> Diagram of Defenses to Robbery<\/p>\r\n<a href=\"\/criminallaw\/wp-content\/uploads\/sites\/179\/2015\/11\/e7586645a63111a9152860e6d752ea11.jpg\"><img src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/2479\/2017\/09\/26210147\/e7586645a63111a9152860e6d752ea11.jpg\" alt=\"Diagram of Defenses to Robbery\" \/><\/a>\r\n\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div id=\"storm_1.0-ch11_s02_s02_s05\" class=\"section\">\r\n<h2 class=\"title editable block\">Robbery Grading<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s02_s05_p01\" class=\"para editable block\">As stated previously, robbery is generally <strong class=\"emphasis bold\">graded<\/strong> as a serious felony that can serve as the predicate felony for first-degree felony murder (Cal. Penal Code \u00a7 189, 2011) and a strike in states that have three strikes statutes (Cal. Penal Code \u00a7 1192.7, 2011). Robbery grading is aggravated by the use of a weapon or when the defendant inflicts serious bodily injury (Tex. Penal Code \u00a7 29.03, 2011). The Model Penal Code grades robbery as a felony of the second degree, unless the actor attempts to kill anyone or purposely inflicts or attempts to inflict serious bodily injury, in which case it is graded as a felony of the first degree (Model Penal Code \u00a7\u00a0222.1(2)).<\/p>\r\n\r\n<div id=\"storm_1.0-ch11_s02_s02_s05_t01\" class=\"table block\">\r\n<p class=\"title\"><span class=\"title-prefix\">Table 11.2<\/span> Comparing Larceny, Extortion, and Robbery<\/p>\r\n\r\n<table style=\"border-spacing: 0px\" cellpadding=\"0\">\r\n<thead>\r\n<tr>\r\n<th>Crime<\/th>\r\n<th>Criminal Act<\/th>\r\n<th>Criminal Intent<\/th>\r\n<th>Attendant Circumstance<\/th>\r\n<th>Harm<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tbody>\r\n<tr>\r\n<td>Larceny<\/td>\r\n<td>Taking by stealth or false representation of fact<\/td>\r\n<td>Specific or purposely to deprive the victim of property permanently*<\/td>\r\n<td>Victim\u2019s property, lack of victim consent<\/td>\r\n<td>Property transfer<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Extortion<\/td>\r\n<td>Taking by threat of future harm; not necessarily physical<\/td>\r\n<td>Specific or purposely to deprive the victim of property permanently*<\/td>\r\n<td>Victim\u2019s property; the victim consents based on fear<\/td>\r\n<td>Property transfer<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Robbery<\/td>\r\n<td>Taking by force or threat of imminent force<\/td>\r\n<td>Specific or purposely to deprive the victim of property permanently*<\/td>\r\n<td>Victim\u2019s property, lack of victim consent, property is taken from the victim\u2019s person or presence<\/td>\r\n<td>Property transfer**<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<tfoot>\r\n<tr>\r\n<th colspan=\"5\">*In some jurisdictions, the defendant can intend a temporary taking.<\/th>\r\n<\/tr>\r\n<tr>\r\n<th colspan=\"5\">**In some jurisdictions, the victim does not need to transfer the property to the defendant.<\/th>\r\n<\/tr>\r\n<\/tfoot>\r\n<\/table>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div id=\"storm_1.0-ch11_s02_s03\" class=\"section\">\r\n<h2 class=\"title editable block\">Receiving Stolen Property<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s03_p01\" class=\"para editable block\">All jurisdictions criminalize <span class=\"margin_term\"><a class=\"glossterm\">receiving stolen property<\/a><\/span>, to deter theft and to break up organized criminal enterprises that benefit from stealing and selling stolen goods. Receiving stolen property criminal statutes often are targeted at pawnbrokers or <span class=\"margin_term\"><a class=\"glossterm\">fences<\/a><\/span> who regularly buy and sell property that is the subject of one of the theft crimes discussed in the preceding sections. As stated, the Model Penal Code includes receiving stolen property in its consolidated theft offense (Model Penal Code \u00a7\u00a7\u00a0223.1, 223.6). Receiving stolen property has the elements of criminal act, criminal intent, attendant circumstances, causation, and harm, as is explored in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s02_s03\">Section 11.2.3 \"Receiving Stolen Property\"<\/a>.<\/p>\r\n\r\n<div id=\"storm_1.0-ch11_s02_s03_s01\" class=\"section\">\r\n<h2 class=\"title editable block\">Receiving Stolen Property Act<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s03_s01_p01\" class=\"para editable block\">The <strong class=\"emphasis bold\">criminal act<\/strong> element required for receiving stolen property in many jurisdictions is receiving, retaining, disposing of (Ala. Code \u00a7 13A-8-16, 2011), selling (Cal. Penal Code \u00a7 496, 2011), trafficking in (Fla. Stat. Ann. \u00a7 812.019, 2011), buying, or aiding in concealment (Mass. Gen. Laws ch. 266 \u00a7 60) of stolen personal property. The Model Penal Code defines the criminal act element as receiving, retaining, or disposing of stolen movable property (Model Penal Code \u00a7\u00a0223.6(1)). The criminal act does not generally require the defendant to be in actual <strong class=\"emphasis bold\">physical possession<\/strong> of the property, as long as the defendant retains <em class=\"emphasis\">control<\/em> over the item(s) (Ga. Code \u00a7 16-8-7, 2011). This would be a constructive possession. The Model Penal Code defines receiving as \u201cacquiring possession, control or title, or lending on the security of the property\u201d (Model Penal Code \u00a7\u00a0223.6(1)). Note that the criminal act element of receiving stolen property includes both <strong class=\"emphasis bold\">buying<\/strong> and <strong class=\"emphasis bold\">selling<\/strong>. Thus dealers that regularly purchase and then sell stolen items can be prosecuted for both of these acts under the same statute.<\/p>\r\n\r\n<div id=\"storm_1.0-ch11_s02_s03_s01_s01\" class=\"section\">\r\n<h2 class=\"title editable block\">Example of Receiving Stolen Property Act<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s03_s01_s01_p01\" class=\"para editable block\">Chanel, a fence who deals in stolen designer perfume, arranges a sale between one of her thieves, Burt, and a regular customer, Sandra. Chanel directs Burt to drop off a shipment of one crate of the stolen perfume at Chanel\u2019s storage facility and gives Burt the key. Chanel pays Burt five thousand dollars for the perfume delivery. Chanel thereafter accepts a payment of ten thousand dollars from Sandra and gives Sandra another key with instructions to pick up the perfume the next day after it has been delivered. Chanel could probably be charged with and convicted of receiving stolen property in most jurisdictions. Although Chanel did not ever acquire actual <em class=\"emphasis\">possession<\/em> of the stolen designer perfume, Chanel had <em class=\"emphasis\">control<\/em> over the property or constructive possession through her storage facility. Chanel\u2019s acts of <strong class=\"emphasis bold\">buying<\/strong> the perfume for five thousand dollars and then <strong class=\"emphasis bold\">selling<\/strong> it for ten thousand dollars both would be criminalized under <em class=\"emphasis\">one<\/em> statute in many jurisdictions. Thus Chanel could be prosecuted for <em class=\"emphasis\">both<\/em> acts as separate charges of receiving stolen property.<\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<div id=\"storm_1.0-ch11_s02_s03_s02\" class=\"section\">\r\n<h2 class=\"title editable block\">Receiving Stolen Property Intent<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s03_s02_p01\" class=\"para editable block\">The criminal intent element required for receiving stolen property has two parts. First, the defendant must have the intent to commit the criminal act, which could be <strong class=\"emphasis bold\">specific intent<\/strong> or <strong class=\"emphasis bold\">purposely<\/strong>, <strong class=\"emphasis bold\">general intent<\/strong> or <strong class=\"emphasis bold\">knowingly<\/strong>, <strong class=\"emphasis bold\">recklessly<\/strong>, or <strong class=\"emphasis bold\">negligently<\/strong> to either buy-receive or sell-dispose of stolen personal property, depending on the jurisdiction. This means that the defendant must have <strong class=\"emphasis bold\">actual knowledge<\/strong> that the property is stolen (Mass. Gen. Laws ch. 266 \u00a7 60, 2011), or the defendant must be aware or should be aware of a <strong class=\"emphasis bold\">risk<\/strong> that the property is stolen (Ala. Code \u00a7 13A-8-16(a), 2011). The Model Penal Code requires the defendant to purposely commit the act <em class=\"emphasis\">knowing<\/em> that the property is stolen or <em class=\"emphasis\">believing<\/em> that the property has <em class=\"emphasis\">probably<\/em> been stolen (Model Penal Code \u00a7\u00a0223.6(1)). The Model Penal Code also provides a <strong class=\"emphasis bold\">presumption<\/strong> of knowledge or belief when the defendant is a <strong class=\"emphasis bold\">dealer<\/strong>, which is defined as a \u201cperson in the business of buying or selling goods including a pawnbroker,\u201d and has been found in possession or control of property stolen from two or more persons on more than one occasion, or has received stolen property in another transaction within the year preceding the transaction charged, or acquires the property for consideration far below its reasonable value (Model Penal Code \u00a7\u00a0223.6(2)). Many state statutes have a similar provision (Ala. Code \u00a7 13A-8-16, 2011).<\/p>\r\n<p id=\"storm_1.0-ch11_s02_s03_s02_p02\" class=\"para editable block\">The second aspect of criminal intent for receiving stolen property is the defendant\u2019s <strong class=\"emphasis bold\">specific intent<\/strong> or <strong class=\"emphasis bold\">purposeful<\/strong> desire to deprive the victim of the property <em class=\"emphasis\">permanently<\/em>, which is required in some jurisdictions (Hawaii Criminal Jury Instructions No. 10.00, 10.20, 2011). This creates a <strong class=\"emphasis bold\">failure of proof<\/strong> or <strong class=\"emphasis bold\">affirmative defense<\/strong> that the defendant received and retained the stolen property with the intent to <em class=\"emphasis\">return<\/em> it to the true owner (Ga. Code \u00a7 16-8-7(a), 2011). The Model Penal Code also provides a defense if \u201cthe property is received, retained, or disposed of with purpose to restore it to the owner\u201d (Model Penal Code \u00a7\u00a0223.6(1)).<\/p>\r\n\r\n<div id=\"storm_1.0-ch11_s02_s03_s02_s01\" class=\"section\">\r\n<h2 class=\"title editable block\">Example of Receiving Stolen Property Intent<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s03_s02_s01_p01\" class=\"para editable block\">Chip\u2019s iPod breaks, so he decides to go to the local electronics store and buy a new one. As he is approaching the store, Heather saunters over from a nearby alley and asks him if he wants to buy a brand new iPod for ten dollars. Suspicious of the price, Chip asks Heather to see the iPod. She hands it to him, and he notices that the box looks like it has been tampered with and a price tag removed. He shrugs, takes ten dollars out of his wallet, and hands it to Heather in exchange for the iPod. In jurisdictions that require <strong class=\"emphasis bold\">actual knowledge<\/strong> that the property is stolen, Chip probably does not have the appropriate criminal intent for receiving stolen property because he did not know Heather and had no way of knowing if Heather was selling him stolen property. In jurisdictions that require <strong class=\"emphasis bold\">awareness of a risk<\/strong> that the property is stolen, Chip may have the appropriate criminal intent because he knew the price was too low and noticed that the box had been tampered with to remove evidence of an actual price or vendor.<\/p>\r\n<p id=\"storm_1.0-ch11_s02_s03_s02_s01_p02\" class=\"para editable block\">Change the example so that Chip is a pawnshop broker, and Heather brings the iPod into his shop to pawn for the price of ten dollars. In many jurisdictions, if Chip accepts the iPod to pawn, this creates a <strong class=\"emphasis bold\">presumption<\/strong> of receiving stolen property criminal intent. Chip is considered a dealer, and in many jurisdictions, dealers who acquire property for consideration that they <em class=\"emphasis\">know<\/em> is <em class=\"emphasis\">far below<\/em> the reasonable value are subject to this type of presumption.<\/p>\r\n<p id=\"storm_1.0-ch11_s02_s03_s02_s01_p03\" class=\"para editable block\">Change the example again so that Chip notices the following message written on the back of the iPod box: \u201cThis iPod is the property of Eugene Schumaker.\u201d Chip is Eugene Schumaker\u2019s friend, so he pays Heather the ten dollars to purchase the iPod so he can return it to Eugene. In many jurisdictions and under the Model Penal Code, Chip can use his intent to return the stolen property to its true owner as a <strong class=\"emphasis bold\">failure of proof<\/strong> or <strong class=\"emphasis bold\">affirmative defense<\/strong> to receiving stolen property.<\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<div id=\"storm_1.0-ch11_s02_s03_s03\" class=\"section\">\r\n<h2 class=\"title editable block\">Retaining Stolen Property<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s03_s03_p01\" class=\"para editable block\">If <strong class=\"emphasis bold\">retaining<\/strong> is the criminal act element described in the receiving stolen property statute, a defendant can still be convicted of receiving stolen property if he or she originally receives the property <em class=\"emphasis\">without<\/em> the appropriate criminal intent, but later keeps the property <em class=\"emphasis\">after<\/em> discovering it is stolen (Connecticut Criminal Jury Instructions \u00a7\u00a753a-119(8), 2011).<\/p>\r\n\r\n<div id=\"storm_1.0-ch11_s02_s03_s03_s01\" class=\"section\">\r\n<h2 class=\"title editable block\">Example of Retaining Stolen Property<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s03_s03_s01_p01\" class=\"para editable block\">Review the example with Chip and Heather in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s02_s03_s02_s01\">Section 11 \"Example of Receiving Stolen Property Intent\"<\/a>. Change this example so that Chip is not a dealer and is offered the iPod for one hundred dollars, which is fairly close to its actual value. Chip purchases the iPod from Heather and thereafter drives home. When he gets home, he begins to open the box and notices the message stating that the iPod is the property of Eugene Schumaker. Chip thinks about it for a minute, continues to open the box, and then retains the iPod for the next six months. If Chip is in a state that defines the criminal act element for receiving stolen property as <strong class=\"emphasis bold\">retains<\/strong>, then Chip most likely committed the criminal act with the appropriate criminal intent (knowledge that the property is stolen) and may be subject to prosecution for and conviction of this offense.<\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<div id=\"storm_1.0-ch11_s02_s03_s04\" class=\"section\">\r\n<h2 class=\"title editable block\">Receiving Stolen Property Attendant Circumstances<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s03_s04_p01\" class=\"para editable block\">The property must be <em class=\"emphasis\">stolen<\/em> for this crime, so the prosecution must prove the <strong class=\"emphasis bold\">attendant circumstances<\/strong> that the property belongs to another and lack of victim consent.<\/p>\r\n\r\n<\/div>\r\n<div id=\"storm_1.0-ch11_s02_s03_s05\" class=\"section\">\r\n<h2 class=\"title editable block\">Receiving Stolen Property Causation<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s03_s05_p01\" class=\"para editable block\">The criminal act must be the <strong class=\"emphasis bold\">factual<\/strong> and <strong class=\"emphasis bold\">legal cause<\/strong> of receiving stolen property harm, which is defined in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s02_s03_s06\">Section 11 \"Receiving Stolen Property Harm\"<\/a>.<\/p>\r\n\r\n<\/div>\r\n<div id=\"storm_1.0-ch11_s02_s03_s06\" class=\"section\">\r\n<h2 class=\"title editable block\">Receiving Stolen Property Harm<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s03_s06_p01\" class=\"para editable block\">The defendant must <strong class=\"emphasis bold\">buy<\/strong>, <strong class=\"emphasis bold\">receive<\/strong>, <strong class=\"emphasis bold\">retain<\/strong>, <strong class=\"emphasis bold\">sell<\/strong>, or <strong class=\"emphasis bold\">dispose of<\/strong> stolen property for the completed crime of receiving stolen property in most jurisdictions (Ala. Code \u00a7 13A-8-16, 2011). If the defendant does not actually gain or transfer control of the property, only <em class=\"emphasis\">attempted<\/em> receiving stolen property can be charged.<\/p>\r\n\r\n<div style=\"text-align: center\">\r\n<div id=\"storm_1.0-ch11_s02_s03_s06_f01\" class=\"figure full editable block\">\r\n<p class=\"title\"><span class=\"title-prefix\">Figure 11.6<\/span> Diagram of Defenses to Receiving Stolen Property<\/p>\r\n<a href=\"\/criminallaw\/wp-content\/uploads\/sites\/179\/2015\/11\/99151cc6d5938e282a2d51a468ce74f7.jpg\"><img src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/2479\/2017\/09\/26210153\/99151cc6d5938e282a2d51a468ce74f7.jpg\" alt=\"Diagram of Defenses to Receiving Stolen Property\" \/><\/a>\r\n\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div id=\"storm_1.0-ch11_s02_s03_s07\" class=\"section\">\r\n<h2 class=\"title editable block\">Receiving Stolen Property Grading<\/h2>\r\n<p id=\"storm_1.0-ch11_s02_s03_s07_p01\" class=\"para editable block\">Receiving stolen property is <strong class=\"emphasis bold\">graded<\/strong> as a felony-misdemeanor (Cal. Penal Code \u00a7 496, 2011) or as a misdemeanor if the stolen property is of low value and a felony if the stolen property is of high value (Ga. Code \u00a7 16-8-12, 2011).<\/p>\r\n\r\n<div style=\"text-align: center\">\r\n<div id=\"storm_1.0-ch11_s02_s03_s07_f01\" class=\"figure full editable block\">\r\n<p class=\"title\"><span class=\"title-prefix\">Figure 11.7<\/span> Diagram of Crimes Involving Theft<\/p>\r\n<a href=\"\/criminallaw\/wp-content\/uploads\/sites\/179\/2015\/11\/3b7c08fa7d093a4af36f70a95fe1bf67.jpg\"><img src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/2479\/2017\/09\/26210201\/3b7c08fa7d093a4af36f70a95fe1bf67.jpg\" alt=\"Diagram of Crimes Involving Theft\" \/><\/a>\r\n\r\n<\/div>\r\n<\/div>\r\n<div id=\"storm_1.0-ch11_s02_s03_s07_n01\" class=\"bcc-box bcc-success\">\r\n<h3 class=\"title\">Key Takeaways<\/h3>\r\n<ul id=\"storm_1.0-ch11_s02_s03_s07_l01\" class=\"itemizedlist\">\r\n \t<li>The criminal act element required for extortion is typically a theft of property accomplished by a threat to cause future harm to the victim.<\/li>\r\n \t<li>The criminal intent element required for extortion is typically the specific intent or purposely to unlawfully deprive the victim of property permanently. However, in some jurisdictions, it is the general intent or knowingly to perform the criminal act.<\/li>\r\n \t<li>In many jurisdictions, it is an affirmative defense to extortion that the property taken by threat to expose a secret or accuse anyone of a criminal offense is taken honestly, as compensation for property, or as restitution or indemnification for harm done by the secret or crime.<\/li>\r\n \t<li>The attendant circumstances of extortion are that the property belongs to another and that the victim consents to transferring the property to the defendant based on fear inspired by the defendant\u2019s threat.<\/li>\r\n \t<li>The harm element required for extortion is that the defendant obtains the property of another.<\/li>\r\n \t<li>Extortion is graded as a felony in most jurisdictions.<\/li>\r\n \t<li>Robbery requires a taking accomplished by force or threat of imminent force. Extortion requires a taking by threat of future harm that is not necessarily force, and larceny generally requires a taking by stealth or a false representation of fact. Robbery also requires the attendant circumstance that the property be taken from the victim\u2019s person or presence and is generally graded more severely than larceny or extortion.<\/li>\r\n \t<li>Robbery is typically graded as a serious felony, which is a strike in jurisdictions that have three strikes statutes, and a predicate felony for first-degree felony murder.<\/li>\r\n \t<li>The criminal act element required for receiving stolen property is typically buying-receiving, retaining, and selling-disposing of stolen personal property.<\/li>\r\n \t<li>The defendant must have the intent to commit the criminal act of receiving stolen property, which could be specific intent or purposely, general intent or knowingly, recklessly, or negligently to either buy-receive or sell-dispose of stolen personal property, depending on the jurisdiction. If \u201cretain\u201d is the criminal act element specified in the receiving stolen property statute, a defendant who obtains property without knowledge that it is stolen commits the offense if he or she thereafter keeps property after discovering that it is stolen. The defendant must also have the specific intent or purposeful desire to deprive the victim of the property permanently in some jurisdictions.<\/li>\r\n \t<li>A failure of proof or affirmative defense to receiving stolen property in some jurisdictions is that the defendant received and retained the stolen property with the intent to return it to the true owner.<\/li>\r\n \t<li>The attendant circumstances for receiving stolen property are that the property belongs to another and lack of victim consent. The harm element of receiving stolen property is that the defendant buy-receive, retain, or sell-dispose of stolen personal property.<\/li>\r\n \t<li>Receiving stolen property is graded as a felony-misdemeanor or a misdemeanor if the stolen property is of low value and a felony if the stolen property is of high value.<\/li>\r\n<\/ul>\r\n<\/div>\r\n<div id=\"storm_1.0-ch11_s02_s03_s07_n02\" class=\"bcc-box bcc-info\">\r\n<h3 class=\"title\">Exercises<\/h3>\r\n<p id=\"storm_1.0-ch11_s02_s03_s07_p02\" class=\"para\">Answer the following questions. Check your answers using the answer key at the end of the chapter.<\/p>\r\n\r\n<ol id=\"storm_1.0-ch11_s02_s03_s07_l02\" class=\"orderedlist\">\r\n \t<li>Review the example given in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s01_s01_s07_s01\">Section 11 \"Example of a Case Lacking the Attendant Circumstance of Victim Reliance Required for False Pretenses\"<\/a> with Jeremy and Chuck. In this example, Chuck shows Jeremy a video he made of Jeremy reading a magazine instead of tuning up Chuck\u2019s taxi. Chuck thereafter threatens to show this video to the district attorney if Jeremy does not pay him two hundred dollars. Has Chuck committed a crime in this scenario? If your answer is yes, which crime?<\/li>\r\n \t<li>Read <em class=\"emphasis\">State v. Robertson<\/em>, 531 S. E. 2d 490 (2000). In <em class=\"emphasis\">Robertson<\/em>, the Court of Appeals of North Carolina reversed the defendant\u2019s conviction for robbery of the victim\u2019s purse. What was the basis of the court\u2019s reversal of conviction? The case is available at this link: <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=10266690205116389671&amp;q=robbery+%22purse+snatching%22&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=2000\" target=\"_blank\" rel=\"noopener\">http:\/\/scholar.google.com\/scholar_case?case=10266690205116389671&amp;q= robbery+%22purse+snatching%22&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=2000<\/a>.<\/li>\r\n \t<li>Read <em class=\"emphasis\">People v. Pratt<\/em>, 656 N.W.2d 866 (2002). In <em class=\"emphasis\">Pratt<\/em>, the defendant was convicted of receiving stolen property for taking and concealing his girlfriend\u2019s vehicle. The defendant appealed, claiming that there was no evidence to indicate that he intended to permanently deprive his girlfriend of the vehicle, and thus it was not \u201c<strong class=\"emphasis bold\">stolen<\/strong>.\u201d Did the Court of Appeals of Michigan uphold the defendant\u2019s conviction? Why or why not? The case is available at this link: <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=9260508991670862336&amp;q=actual+knowledge+%22receiving+stolen+property%22&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=2000\" target=\"_blank\" rel=\"noopener\">http:\/\/scholar.google.com\/scholar_case?case=9260508991670862336&amp;q= actual+knowledge+%22receiving+stolen+property%22&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=2000<\/a>.<\/li>\r\n<\/ol>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<h2>References<\/h2>\r\nAla. Code \u00a7\u00a013A-8-16, accessed March 12, 2011, <a class=\"link\" href=\"http:\/\/law.onecle.com\/alabama\/criminal-code\/13A-8-16.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/alabama\/criminal-code\/13A-8-16.html<\/a>.\r\n\r\nAla. Code \u00a7\u00a013A-8-43, accessed March 18, 2011, <a class=\"link\" href=\"http:\/\/law.onecle.com\/alabama\/criminal-code\/13A-8-43.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/alabama\/criminal-code\/13A-8-43.html<\/a>.\r\n\r\nAriz. Rev. Stat. \u00a7\u00a013-1804, <a class=\"link\" href=\"http:\/\/law.onecle.com\/arizona\/criminal-code\/13-1804.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/arizona\/criminal-code\/13-1804.html<\/a>.\r\n\r\nCal. Penal Code \u00a7\u00a0189, accessed March 19, 2011, <a class=\"link\" href=\"http:\/\/law.onecle.com\/california\/penal\/189.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/california\/penal\/189.html<\/a>.\r\n\r\nCal. Penal Code \u00a7\u00a0211, accessed March 19, 2011, <a class=\"link\" href=\"http:\/\/codes.lp.findlaw.com\/cacode\/PEN\/3\/1\/8\/4\/s211\" target=\"_blank\" rel=\"noopener\">http:\/\/codes.lp.findlaw.com\/cacode\/PEN\/3\/1\/8\/4\/s211<\/a>.\r\n\r\nCal. Penal Code \u00a7\u00a0496, accessed March 12, 2011, <a class=\"link\" href=\"http:\/\/law.onecle.com\/california\/penal\/496.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/california\/penal\/496.html<\/a>.\r\n\r\nCal. Penal Code \u00a7\u00a01192.7, accessed March 19, 2011, <a class=\"link\" href=\"http:\/\/law.onecle.com\/california\/penal\/1192.7.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/california\/penal\/1192.7.html<\/a>.\r\n\r\nConnecticut Criminal Jury Instructions \u00a7\u00a753a-119(5) and 53a-122(a) (1), accessed March 12, 2011, <a class=\"link\" href=\"http:\/\/www.jud.ct.gov\/ji\/criminal\/part9\/9.1-11.htm\" target=\"_blank\" rel=\"noopener\">http:\/\/www.jud.ct.gov\/ji\/criminal\/part9\/9.1-11.htm<\/a>.\r\n\r\nConnecticut Criminal Jury Instructions \u00a7\u00a753a-119(8) and 53a-122 through 53a-125b, accessed March 13, 2011, <a class=\"link\" href=\"http:\/\/www.jud.ct.gov\/ji\/criminal\/part9\/9.1-15.htm\" target=\"_blank\" rel=\"noopener\">http:\/\/www.jud.ct.gov\/ji\/criminal\/part9\/9.1-15.htm<\/a>.\r\n\r\nFla. Stat. Ann. \u00a7\u00a0812.019, accessed March 12, 2011, <a class=\"link\" href=\"http:\/\/law.onecle.com\/florida\/crimes\/812.019.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/florida\/crimes\/812.019.html<\/a>.\r\n\r\nFla. Stat. Ann. \u00a7\u00a0812.13, accessed March 19, 2011, <a class=\"link\" href=\"http:\/\/law.onecle.com\/florida\/crimes\/812.13.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/florida\/crimes\/812.13.html<\/a>.\r\n\r\nGa. Code \u00a7\u00a016-8-7, accessed March 12, 2011, <a class=\"link\" href=\"http:\/\/law.onecle.com\/georgia\/16\/16-8-7.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/georgia\/16\/16-8-7.html<\/a>.\r\n\r\nHawaii Criminal Jury Instructions No. 10.00, 10.20, accessed March 13, 2011, <a class=\"link\" href=\"http:\/\/www.courts.state.hi.us\/docs\/docs4\/crimjuryinstruct.pdf\" target=\"_blank\" rel=\"noopener\">http:\/\/www.courts.state.hi.us\/docs\/docs4\/crimjuryinstruct.pdf<\/a>.\r\n\r\n<em class=\"emphasis\">Jones v. State<\/em>, 652 So. 2d 346 (1995), accessed March 19, 2011, <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=11856873917512077763&amp;q=robbery+%22from+the+victim%27s+person%22&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=2000\" target=\"_blank\" rel=\"noopener\">http:\/\/scholar.google.com\/scholar_case?case=11856873917512077763&amp;q= robbery+%22from+the+victim%27s+person%22&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=2000<\/a>.\r\n\r\nK.S.A. \u00a7\u00a021-3428, accessed March 18, 2011, <a class=\"link\" href=\"http:\/\/kansasstatutes.lesterama.org\/Chapter_21\/Article_34\/21-3428.html\" target=\"_blank\" rel=\"noopener\">http:\/\/kansasstatutes.lesterama.org\/Chapter_21\/Article_34\/21-3428.html<\/a>.\r\n\r\nGa. Code \u00a7\u00a016-8-12, accessed March 13, 2011, <a class=\"link\" href=\"http:\/\/law.onecle.com\/georgia\/16\/16-8-12.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/georgia\/16\/16-8-12.html<\/a>.\r\n\r\nGa. Code \u00a7\u00a016-8-16, accessed March 11, 2011, <a class=\"link\" href=\"http:\/\/law.onecle.com\/georgia\/16\/16-8-16.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/georgia\/16\/16-8-16.html<\/a>.\r\n\r\nInd. Code \u00a7\u00a035-42-5-1, accessed March 18, 2011, <a class=\"link\" href=\"http:\/\/law.onecle.com\/indiana\/35\/35-42-5-1.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/indiana\/35\/35-42-5-1.html<\/a>.\r\n\r\nMass. Gen. Laws ch. 266 \u00a7\u00a060, <a class=\"link\" href=\"http:\/\/law.onecle.com\/massachusetts\/266\/60.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/massachusetts\/266\/60.html<\/a>.\r\n\r\n<em class=\"emphasis\">Metheny v. State<\/em>, 755 A.2d 1088 (2000), accessed March 19, 2011, <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=10315203348655203542&amp;q=robbery+%22deprive+permanently%22&amp;hl=en&amp;as_sdt=2,5\" target=\"_blank\" rel=\"noopener\">http:\/\/scholar.google.com\/scholar_case?case=10315203348655203542&amp;q= robbery+%22deprive+permanently%22&amp;hl=en&amp;as_sdt=2,5<\/a>.\r\n\r\nOklahoma Uniform Jury Instructions No. CR 4-141, accessed March 19, 2011, <a class=\"link\" href=\"http:\/\/www.okcca.net\/online\/oujis\/oujisrvr.jsp?o=248\" target=\"_blank\" rel=\"noopener\">http:\/\/www.okcca.net\/online\/oujis\/oujisrvr.jsp?o=248<\/a>.\r\n\r\nOklahoma Uniform Jury Instructions No. CR 5-34, accessed March 12, 2011, <a class=\"link\" href=\"http:\/\/www.okcca.net\/online\/oujis\/oujisrvr.jsp?oc=OUJI-CR%205-34\" target=\"_blank\" rel=\"noopener\">http:\/\/www.okcca.net\/online\/oujis\/oujisrvr.jsp?oc=OUJI-CR%205-34<\/a>.\r\n\r\nOr. Rev. Stat. \u00a7\u00a0164.075, accessed March 12, 2011, <a class=\"link\" href=\"http:\/\/law.onecle.com\/oregon\/164-offenses-against-property\/164.075.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/oregon\/164-offenses-against-property\/164.075.html<\/a>.\r\n\r\n<em class=\"emphasis\">S.W. v. State<\/em>, 513 So. 2d 1088 (1987), accessed March 18, 2011, <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=8956843531832075141&amp;q=robbery+%22slight+force%22&amp;hl=en&amp;as_sdt=2,5\" target=\"_blank\" rel=\"noopener\">http:\/\/scholar.google.com\/scholar_case?case=8956843531832075141&amp;q= robbery+%22slight+force%22&amp;hl=en&amp;as_sdt=2,5<\/a>.\r\n\r\n<em class=\"emphasis\">State v. Handburgh<\/em>, 830 P.2d 641 (1992), accessed March 18, 2011, <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=2186457002998894202&amp;q=State+v.+Handburgh&amp;hl=en&amp;as_sdt=2,5\" target=\"_blank\" rel=\"noopener\">http:\/\/scholar.google.com\/scholar_case?case=2186457002998894202&amp;q= State+v.+Handburgh&amp;hl=en&amp;as_sdt=2,5<\/a>.\r\n\r\nTex. Penal Code \u00a7\u00a029.03, accessed March 12, 2011, <a class=\"link\" href=\"http:\/\/law.onecle.com\/texas\/penal\/29.03.00.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/texas\/penal\/29.03.00.html<\/a>.\r\n\r\n<em class=\"emphasis\">Williams v. State<\/em>, 91 S.W. 3d 54 (2002), accessed March 19, 2011, <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=9518129765374420507&amp;q=robbery+%22transfer+of+property%22&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=2000\" target=\"_blank\" rel=\"noopener\">http:\/\/scholar.google.com\/scholar_case?case=9518129765374420507&amp;q= robbery+%22transfer+of+property%22&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=2000<\/a>.","rendered":"<div class=\"textbox\"><a class=\"irc_mil i3597\" href=\"https:\/\/www.google.com\/url?sa=i&amp;rct=j&amp;q=&amp;esrc=s&amp;source=images&amp;cd=&amp;ved=2ahUKEwjPmdHQzvrfAhUQjq0KHYqgCysQjRx6BAgBEAU&amp;url=https%3A%2F%2Frekordeast.co.za%2F70585%2Fvideo-shows-robbery-at-orchards-petrol-station%2Fvideo-robbery%2F&amp;psig=AOvVaw0V_NALF2d5--s1WuldJPMn&amp;ust=1548013675753594\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"irc_mi\" src=\"https:\/\/rekordeast.co.za\/wp-content\/uploads\/sites\/85\/2015\/11\/video-robbery.jpg\" alt=\"Image result for video of a robbery\" width=\"759\" height=\"460\" \/><\/a><\/div>\n<div><a href=\"https:\/\/youtu.be\/ny30O2sQAOk\">https:\/\/youtu.be\/ny30O2sQAOk<\/a><\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Learning Objectives<\/p>\n<div id=\"storm_1.0-ch11_s02_n01\" class=\"bcc-box bcc-highlight\">\n<ol id=\"storm_1.0-ch11_s02_l01\" class=\"orderedlist\">\n<li>Define the criminal intent element required for extortion.<\/li>\n<li>Identify a potential defense to extortion.<\/li>\n<li>Define the attendant circumstances required for extortion.<\/li>\n<li>Define the harm element required for extortion.<\/li>\n<li>Analyze extortion grading.<\/li>\n<li>Identify the differences between robbery, larceny, and extortion.<\/li>\n<li>Analyze robbery grading.<\/li>\n<li>Define the criminal act element required for receiving stolen property.<\/li>\n<li>Define the criminal intent element required for receiving stolen property.<\/li>\n<li>Identify a failure of proof or affirmative defense to receiving stolen property in some jurisdictions.<\/li>\n<li>Define the attendant circumstances and harm element required for receiving stolen property.<\/li>\n<li>Analyze receiving stolen property grading.<\/li>\n<\/ol>\n<\/div>\n<div id=\"storm_1.0-ch11_s02_s01\" class=\"section\">\n<h2 class=\"title editable block\">Extortion<\/h2>\n<p id=\"storm_1.0-ch11_s02_s01_p01\" class=\"para editable block\">All states and the federal government criminalize <span class=\"margin_term\"><a class=\"glossterm\">extortion<\/a><\/span>, which is also called <strong class=\"emphasis bold\">blackmail<\/strong> (K.S.A. \u00a7 21-3428, 2011). As stated previously, the Model Penal Code criminalizes theft by extortion and grades it the same as all other nonforcible theft offenses (Model Penal Code \u00a7\u00a0223.4). Extortion is typically nonviolent, but the elements of extortion are very similar to <strong class=\"emphasis bold\">robbery<\/strong>, which is considered a forcible theft offense. Robbery is discussed shortly.<\/p>\n<p id=\"storm_1.0-ch11_s02_s01_p02\" class=\"para editable block\">Extortion has the elements of criminal act, criminal intent, attendant circumstances, causation, and harm, as is explored in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s02_s01\">Section 11.2.1 &#8220;Extortion&#8221;<\/a>.<\/p>\n<div id=\"storm_1.0-ch11_s02_s01_s01\" class=\"section\">\n<h2 class=\"title editable block\">Extortion Act<\/h2>\n<p id=\"storm_1.0-ch11_s02_s01_s01_p01\" class=\"para editable block\">The <strong class=\"emphasis bold\">criminal act<\/strong> element required for extortion is typically the theft of property accomplished by a <strong class=\"emphasis bold\">threat<\/strong> to cause <em class=\"emphasis\">future<\/em> harm to the victim, including the threat to inflict bodily injury, accuse anyone of committing a crime, or reveal a secret that would expose the victim to hatred, contempt, or ridicule (Ga. Code \u00a7 16-8-16, 2011). The Model Penal Code criminalizes theft by extortion when the defendant obtains property of another by threatening to inflict bodily injury on anyone, commit any criminal offense, accuse anyone of a criminal offense, expose any secret tending to subject any person to hatred, contempt, or ridicule or impair his credit and business repute, take or withhold action as an official, bring about a strike or boycott, testify with respect to another\u2019s legal claim, or inflict any other harm that would not benefit the actor (Model Penal Code \u00a7\u00a0223.4). Note that some of these acts could be <em class=\"emphasis\">legal<\/em>, as long as they are not performed with the unlawful intent to steal.<\/p>\n<div id=\"storm_1.0-ch11_s02_s01_s01_s01\" class=\"section\">\n<h2 class=\"title editable block\">Example of Extortion Act<\/h2>\n<p id=\"storm_1.0-ch11_s02_s01_s01_s01_p01\" class=\"para editable block\">Rodney tells Lindsey that he will report her illegal drug trafficking to local law enforcement if she does not pay him fifteen thousand dollars. Rodney has probably committed the criminal act element required for extortion in most jurisdictions. Note that Rodney\u2019s threat to expose Lindsey\u2019s illegal activities is actually <em class=\"emphasis\">desirable<\/em> behavior when performed with the intent to eliminate or reduce crime. However, under these circumstances, Rodney\u2019s act is most likely <em class=\"emphasis\">criminal<\/em> because it is supported by the intent to steal fifteen thousand dollars from Lindsey.<\/p>\n<\/div>\n<\/div>\n<div id=\"storm_1.0-ch11_s02_s01_s02\" class=\"section\">\n<h2 class=\"title editable block\">Extortion Intent<\/h2>\n<p id=\"storm_1.0-ch11_s02_s01_s02_p01\" class=\"para editable block\">The criminal intent element required for extortion is typically the <strong class=\"emphasis bold\">specific intent<\/strong> or <strong class=\"emphasis bold\">purposely<\/strong> to commit the criminal act and to unlawfully deprive the victim of property <em class=\"emphasis\">permanently<\/em> (Connecticut Criminal Jury Instructions \u00a7\u00a753a-119(5), 2011). This intent requirement is similar to the criminal intent element required for larceny and false pretenses theft, as discussed in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s01_s01_s02\">Section 11 &#8220;Consolidated Theft Intent&#8221;<\/a>. Some jurisdictions only require <strong class=\"emphasis bold\">general intent<\/strong> or <strong class=\"emphasis bold\">knowingly<\/strong> to perform the criminal act (Ariz. Rev. Stat. \u00a7 13-1804).<\/p>\n<div id=\"storm_1.0-ch11_s02_s01_s02_s01\" class=\"section\">\n<h2 class=\"title editable block\">Example of a Case Lacking Extortion Intent<\/h2>\n<p id=\"storm_1.0-ch11_s02_s01_s02_s01_p01\" class=\"para editable block\">Review the example with Rodney and Lindsey in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s02_s01_s01_s01\">Section 11 &#8220;Example of Extortion Act&#8221;<\/a>. Change the example and assume that Rodney asks Lindsey to loan him the fifteen thousand dollars so that he can make a balloon payment due on his mortgage. Lindsey refuses. Rodney thereafter threatens to expose Lindsey\u2019s drug trafficking if she doesn\u2019t loan him the money. In many jurisdictions, Rodney may not have the criminal intent element required for extortion. Although Rodney performed the criminal act of threatening to report Lindsey for a crime, he did so with the intent to <em class=\"emphasis\">borrow<\/em> money from Lindsey. Thus Rodney did not act with the specific intent or purposely to permanently deprive Lindsey of property, which could operate as a <strong class=\"emphasis bold\">failure of proof<\/strong> or <strong class=\"emphasis bold\">affirmative defense<\/strong> to extortion in many jurisdictions.<\/p>\n<\/div>\n<\/div>\n<div id=\"storm_1.0-ch11_s02_s01_s03\" class=\"section\">\n<h2 class=\"title editable block\">Extortion Attendant Circumstance<\/h2>\n<p id=\"storm_1.0-ch11_s02_s01_s03_p01\" class=\"para editable block\">Extortion is a form of theft, so it has the same <strong class=\"emphasis bold\">attendant circumstance<\/strong> required in consolidated theft statutes\u2014the property stolen belongs to <em class=\"emphasis\">another<\/em>. In many jurisdictions, it is an <strong class=\"emphasis bold\">affirmative defense<\/strong> to extortion that the property taken by threat to expose a secret or accuse anyone of a criminal offense is taken <em class=\"emphasis\">honestly<\/em>, as compensation for property, or restitution or indemnification for harm done by the secret or crime (Ga. Code \u00a7 16-8-16, 2011). The Model Penal Code provides an affirmative defense to extortion by threat of accusation of a criminal offense, exposure of a secret, or threat to take or withhold action as an official if the property obtained was \u201chonestly claimed as restitution or indemnification for harm done in the circumstances to which such accusation, exposure, lawsuit or other official action relates, or as compensation for property or lawful services\u201d (Model Penal Code \u00a7\u00a0223.4).<\/p>\n<div id=\"storm_1.0-ch11_s02_s01_s03_s01\" class=\"section\">\n<h2 class=\"title editable block\">Example of Extortion Affirmative Defense<\/h2>\n<p id=\"storm_1.0-ch11_s02_s01_s03_s01_p01\" class=\"para editable block\">Tara, a real estate broker, hires Trent to be a real estate sales agent in her small realty office. Tara decides she wants to get the property listing of a competitor by using Trent to obtain information. Tara tells Trent to pretend he is a buyer interested in the property. She asks him to make an appointment with the competitor, ask a lot of questions about the owner of the property, and thereafter bring Tara the information. Tara promises to pay Trent one thousand dollars for his time and effort. Trent spends several hours performing this task and thereafter demands his one thousand dollars payment. Tara tells Trent she is experiencing \u201ctough times\u201d and can\u2019t afford to pay him. Trent threatens to tell Tara\u2019s competitor what she is up to if she doesn\u2019t pay him the one thousand dollars. Trent has probably <em class=\"emphasis\">not<\/em> committed extortion in many jurisdictions. Although Trent threatened to expose Tara\u2019s secret if she didn\u2019t pay him one thousand dollars, Trent <em class=\"emphasis\">honestly<\/em> believed he was owed this money for a job he performed that was <em class=\"emphasis\">directly related<\/em> to the secret. Thus in many jurisdictions, Trent has an <strong class=\"emphasis bold\">affirmative defense<\/strong> that the money demanded was compensation for services and not the subject of unlawful theft by extortion.<\/p>\n<\/div>\n<\/div>\n<div id=\"storm_1.0-ch11_s02_s01_s04\" class=\"section\">\n<h2 class=\"title editable block\">Attendant Circumstance of Victim Consent<\/h2>\n<p id=\"storm_1.0-ch11_s02_s01_s04_p01\" class=\"para editable block\">Extortion also requires the <strong class=\"emphasis bold\">attendant circumstance<\/strong> of victim consent. With extortion, the victim consensually transfers the property based on <strong class=\"emphasis bold\">fear<\/strong> inspired by the defendant\u2019s threat (Oklahoma Uniform Jury Instructions No. CR 5-34, 2011).<\/p>\n<div id=\"storm_1.0-ch11_s02_s01_s04_s01\" class=\"section\">\n<h2 class=\"title editable block\">Example of Attendant Circumstance of Victim Consent for Extortion<\/h2>\n<p id=\"storm_1.0-ch11_s02_s01_s04_s01_p01\" class=\"para editable block\">Review the example with Rodney and Lindsey in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s02_s01_s01_s01\">Section 11 &#8220;Example of Extortion Act&#8221;<\/a>. Assume that Lindsey grudgingly gives Rodney the fifteen thousand dollars so that he will not report her drug trafficking. In this example, Lindsey is <em class=\"emphasis\">consensually<\/em> transferring the money to Rodney to prevent him from making good on his threat. Thus the attendant circumstance of victim <strong class=\"emphasis bold\">consent<\/strong> based on <strong class=\"emphasis bold\">fear<\/strong> is most likely present, and Rodney could be subject to prosecution for and conviction of extortion in most jurisdictions.<\/p>\n<\/div>\n<\/div>\n<div id=\"storm_1.0-ch11_s02_s01_s05\" class=\"section\">\n<h2 class=\"title editable block\">Extortion Causation<\/h2>\n<p id=\"storm_1.0-ch11_s02_s01_s05_p01\" class=\"para editable block\">The criminal act must be the <strong class=\"emphasis bold\">factual<\/strong> and <strong class=\"emphasis bold\">legal cause<\/strong> of extortion harm, which is defined in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s02_s01_s06\">Section 11 &#8220;Extortion Harm&#8221;<\/a>.<\/p>\n<\/div>\n<div id=\"storm_1.0-ch11_s02_s01_s06\" class=\"section\">\n<h2 class=\"title editable block\">Extortion Harm<\/h2>\n<p id=\"storm_1.0-ch11_s02_s01_s06_p01\" class=\"para editable block\">The defendant must <strong class=\"emphasis bold\">obtain<\/strong> property belonging to another for the completed crime of extortion in most jurisdictions (Oklahoma Uniform Jury Instructions No. CR 5-34, 2011). If the defendant commits the criminal act of threatening the victim with the appropriate criminal intent, but the victim does not actually transfer the property to the defendant, the defendant can only be charged with <em class=\"emphasis\">attempted<\/em> extortion (Oklahoma Uniform Jury Instructions No. CR 5-32, 2011).<\/p>\n<div id=\"storm_1.0-ch11_s02_s01_s06_s01\" class=\"section\">\n<h2 class=\"title editable block\">Example of a Case Lacking Extortion Harm<\/h2>\n<p id=\"storm_1.0-ch11_s02_s01_s06_s01_p01\" class=\"para editable block\">Review the example with Rodney and Lindsey in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s02_s01_s01_s01\">Section 11 &#8220;Example of Extortion Act&#8221;<\/a>. Assume that after Rodney threatens to report Lindsey\u2019s drug trafficking to local law enforcement, Lindsey calls local law enforcement, turns herself in for drug trafficking, and also reports Rodney for making the threat. In this case, because Rodney did not \u201cobtain\u201d property by threat, the crime of extortion is not complete, and <em class=\"emphasis\">attempted<\/em> extortion would be the appropriate charge in most jurisdictions.<\/p>\n<div id=\"storm_1.0-ch11_s02_s01_s06_s01_f01\" class=\"figure large editable block\" style=\"max-width: 600px;margin: auto\">\n<p class=\"title\"><span class=\"title-prefix\">Figure 11.4<\/span> Diagram of Defenses to Extortion<\/p>\n<p><a href=\"\/criminallaw\/wp-content\/uploads\/sites\/179\/2015\/11\/8b236ed6182366da662496af78af2c4d.jpg\"><img decoding=\"async\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/2479\/2017\/09\/26210141\/8b236ed6182366da662496af78af2c4d.jpg\" alt=\"Diagram of Defenses to Extortion\" \/><\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"storm_1.0-ch11_s02_s01_s07\" class=\"section\">\n<h2 class=\"title editable block\">Extortion Grading<\/h2>\n<p id=\"storm_1.0-ch11_s02_s01_s07_p01\" class=\"para editable block\">Extortion is generally <strong class=\"emphasis bold\">graded<\/strong> as a felony in most jurisdictions (Or. Rev. Stat. \u00a7 164.075, 2011). As stated previously, the Model Penal Code grades extortion under its consolidated theft offense.<\/p>\n<\/div>\n<\/div>\n<div id=\"storm_1.0-ch11_s02_s02\" class=\"section\">\n<h2 class=\"title editable block\">Robbery<\/h2>\n<p id=\"storm_1.0-ch11_s02_s02_p01\" class=\"para editable block\"><span class=\"margin_term\"><a class=\"glossterm\">Robbery<\/a><\/span> was the first common-law theft crime. The criminalization of robbery was a natural progression from other common-law crimes against the person because robbery always involves force, violence, or threat and could pose a risk of injury or death to the robbery victim, defendant, or other innocent bystanders. Recall from <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/9-1-homicide\">Chapter 9 &#8220;Criminal Homicide&#8221;<\/a> that robbery is generally a serious felony that is included in most felony murder statutes as a predicate felony for <strong class=\"emphasis bold\">first-degree<\/strong> felony murder. When robbery does not result in death, it is typically graded more severely than theft under a consolidated theft statute. Robbery grading is discussed shortly.<\/p>\n<p id=\"storm_1.0-ch11_s02_s02_p02\" class=\"para editable block\">The elements of robbery are very similar to the elements of <strong class=\"emphasis bold\">larceny<\/strong> and <strong class=\"emphasis bold\">extortion<\/strong>. For the purpose of brevity, only the elements of robbery that are distinguishable from larceny and extortion are analyzed in depth. Robbery has the elements of criminal act, attendant circumstances, criminal intent, causation, and harm, as is explored in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s02\">Section 11.2 &#8220;Extortion, Robbery, and Receiving Stolen Property&#8221;<\/a>.<\/p>\n<div id=\"storm_1.0-ch11_s02_s02_s01\" class=\"section\">\n<h2 class=\"title editable block\">Robbery Act<\/h2>\n<p id=\"storm_1.0-ch11_s02_s02_s01_p01\" class=\"para editable block\">It is the criminal act element that primarily distinguishes robbery from larceny and extortion. The <strong class=\"emphasis bold\">criminal act<\/strong> element required for robbery is a taking of personal property by <strong class=\"emphasis bold\">force<\/strong> or <strong class=\"emphasis bold\">threat<\/strong> of force (Ind. Code \u00a7 35-42-5-1, 2011). Force is generally physical force. The force can be slight, but it must be more than what is required to gain control over and move the property (S.W. v. State, 2011). Many jurisdictions require force <em class=\"emphasis\">during<\/em> the taking, which includes the use of force to prevent the victim from reclaiming the property, or during escape (State v. Handburgh, 2011). The Model Penal Code requires force or threat \u201cin the course of committing a theft\u201d and defines this as occurring in \u201can attempt to commit theft or in flight after the attempt or commission\u201d (Model Penal Code \u00a7\u00a0222.1(1)). Threat for robbery is a threat to inflict <em class=\"emphasis\">imminent<\/em> force (Ala. Code \u00a7 13A-8-43, 2011).<\/p>\n<p id=\"storm_1.0-ch11_s02_s02_s01_p02\" class=\"para editable block\">While larceny and extortion also require a taking, the defendant typically accomplishes the larceny taking by stealth, or a false representation of fact. In extortion, the defendant accomplishes the taking by a threat of <em class=\"emphasis\">future<\/em> harm that may or may not involve <em class=\"emphasis\">force<\/em>.<\/p>\n<div id=\"storm_1.0-ch11_s02_s02_s01_s01\" class=\"section\">\n<h2 class=\"title editable block\">Example of Robbery Act<\/h2>\n<p id=\"storm_1.0-ch11_s02_s02_s01_s01_p01\" class=\"para editable block\">Review the example given in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s02_s01_s01_s01\">Section 11 &#8220;Example of Extortion Act&#8221;<\/a> with Rodney and Lindsey. In this example, Rodney threatened to expose Lindsey\u2019s drug trafficking if she didn\u2019t pay him fifteen thousand dollars. Change the example so that Rodney tells Lindsey he will kill her if she doesn\u2019t write him a check for fifteen thousand dollars. Rodney exemplifies his threat by pointing to a bulge in his front jacket pocket that appears to be a weapon. In this scenario, Rodney has most likely committed the criminal act element required for <strong class=\"emphasis bold\">robbery<\/strong>, <em class=\"emphasis\">not<\/em> <strong class=\"emphasis bold\">extortion<\/strong>. Rodney\u2019s threat is a threat of <em class=\"emphasis\">immediate force<\/em>. Compare this threat to Rodney\u2019s threat to expose Lindsey\u2019s drug trafficking, which is a threat of <em class=\"emphasis\">future<\/em> harm that relates to Lindsey\u2019s <em class=\"emphasis\">arrest<\/em> for a crime, rather than force.<\/p>\n<\/div>\n<div id=\"storm_1.0-ch11_s02_s02_s01_s02\" class=\"section\">\n<h2 class=\"title editable block\">Example of a Case Lacking Robbery Act<\/h2>\n<p id=\"storm_1.0-ch11_s02_s02_s01_s02_p01\" class=\"para editable block\">Peter, a jewelry thief, notices that Cheryl is wearing a diamond ring. Peter walks up to Cheryl and asks her if she wants him to read her palm. Cheryl shrugs her shoulders and says, \u201cSure! What have I got to lose?\u201d While Peter does an elaborate palm reading, he surreptitiously slips Cheryl\u2019s diamond ring off her finger and into his pocket. Peter has probably <em class=\"emphasis\">not<\/em> committed the criminal act element required for robbery in this case. Although Peter used a certain amount of physical force to remove Cheryl\u2019s ring, he did not use any force <em class=\"emphasis\">beyond<\/em> what was required to gain control over Cheryl\u2019s property and move it into his possession. Thus Peter has probably committed the criminal act element required for <strong class=\"emphasis bold\">larceny<\/strong> theft, <em class=\"emphasis\">not<\/em> <strong class=\"emphasis bold\">robbery<\/strong>, and is subject to less severe sentencing for this lower-level offense.<\/p>\n<\/div>\n<\/div>\n<div id=\"storm_1.0-ch11_s02_s02_s02\" class=\"section\">\n<h2 class=\"title editable block\">Robbery Attendant Circumstances<\/h2>\n<p id=\"storm_1.0-ch11_s02_s02_s02_p01\" class=\"para editable block\">Another difference between robbery and larceny or extortion is the <strong class=\"emphasis bold\">attendant circumstances<\/strong> requirement(s). Robbery requires the same attendant circumstance required for both larceny and extortion\u2014that the property taken belongs to another. It also has the same attendant circumstance as larceny\u2014that the defendant accomplish the taking against the victim\u2019s will and without consent. However, robbery has one additional attendant circumstance, which is that the property be taken <strong class=\"emphasis bold\">from the victim\u2019s person<\/strong> or <strong class=\"emphasis bold\">presence<\/strong> (Cal. Penal Code \u00a7 211). The property does not need to be in the actual physical possession of the victim, as long as it is under the victim\u2019s <em class=\"emphasis\">control<\/em> (Jones v. State, 2011). Thus if the victim could have prevented the taking if not for the force, violence, or threat posed by the defendant, this attendant circumstance is present (Jones v. State, 2011).<\/p>\n<div id=\"storm_1.0-ch11_s02_s02_s02_s01\" class=\"section\">\n<h2 class=\"title editable block\">Example of Robbery Attendant Circumstances<\/h2>\n<p id=\"storm_1.0-ch11_s02_s02_s02_s01_p01\" class=\"para editable block\">Review the example given in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s02_s02_s01_s01\">Section 11 &#8220;Example of Robbery Act&#8221;<\/a> with Rodney and Lindsey. In this example, Rodney tells Lindsey he will kill her if she doesn\u2019t write him a check for fifteen thousand dollars. Change this example so that Rodney knows Lindsey has recently withdrawn fifteen thousand dollars in cash from the bank. Rodney demands the cash, tells Lindsey he will kill her if she doesn\u2019t give it to him, and gestures toward a bulge in his front jacket pocket that appears to be a weapon. Lindsey tells Rodney, \u201cThe money is in my purse, but if you take it, you will be ruining my life!\u201d and points to her purse, which is on the kitchen table a few feet away. Rodney walks over to the table, opens Lindsey\u2019s purse, and removes a large envelope stuffed with bills. In this scenario, the attendant circumstances for robbery appear to be present. Rodney took the property of another without consent. Although the money was not on Lindsey\u2019s person, it was in her <strong class=\"emphasis bold\">presence<\/strong> and subject to her <strong class=\"emphasis bold\">control<\/strong>. If Rodney had not threatened Lindsey\u2019s life, she could have <em class=\"emphasis\">prevented<\/em> the taking. Thus Rodney has most likely committed robbery and is subject to prosecution for and conviction of this offense.<\/p>\n<\/div>\n<\/div>\n<div id=\"storm_1.0-ch11_s02_s02_s03\" class=\"section\">\n<h2 class=\"title editable block\">Robbery Intent<\/h2>\n<p id=\"storm_1.0-ch11_s02_s02_s03_p01\" class=\"para editable block\">The criminal intent element required for robbery is the same as the criminal intent element required for larceny and extortion in many jurisdictions. The defendant must have the <strong class=\"emphasis bold\">specific intent<\/strong> or <strong class=\"emphasis bold\">purposely<\/strong> to commit the criminal act and to deprive the victim of the property <em class=\"emphasis\">permanently<\/em> (Metheny v. State, 2011). Some jurisdictions do not require the intent to permanently deprive the victim of property and include <em class=\"emphasis\">temporary<\/em> takings in the robbery statute (Fla. Stat. Ann. \u00a7 812.13, 2011).<\/p>\n<div id=\"storm_1.0-ch11_s02_s02_s03_s01\" class=\"section\">\n<h2 class=\"title editable block\">Example of Robbery Intent<\/h2>\n<p id=\"storm_1.0-ch11_s02_s02_s03_s01_p01\" class=\"para editable block\">Review the example with Rodney and Lindsey in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s02_s01_s02_s01\">Section 11 &#8220;Example of a Case Lacking Extortion Intent&#8221;<\/a>. In this example, Rodney demands a loan from Lindsey in the amount of fifteen thousand dollars and threatens to expose her drug trafficking activities if she doesn\u2019t comply. Change this example so that Rodney tells Lindsey to loan him fifteen thousand dollars or he will kill her, gesturing at a bulge in his front jacket pocket that appears to be a weapon. In a jurisdiction that requires the criminal intent to <strong class=\"emphasis bold\">permanently<\/strong> deprive the victim of property for robbery, Rodney does not have the appropriate criminal intent. In a jurisdiction that allows for the intent to <strong class=\"emphasis bold\">temporarily<\/strong> deprive the victim of property for robbery, Rodney has the appropriate criminal intent and may be charged with and convicted of this offense.<\/p>\n<\/div>\n<\/div>\n<div id=\"storm_1.0-ch11_s02_s02_s04\" class=\"section\">\n<h2 class=\"title editable block\">Robbery Causation and Harm<\/h2>\n<p id=\"storm_1.0-ch11_s02_s02_s04_p01\" class=\"para editable block\">The criminal act supported by the criminal intent must be the <strong class=\"emphasis bold\">factual<\/strong> and <strong class=\"emphasis bold\">legal cause<\/strong> of the robbery <strong class=\"emphasis bold\">harm<\/strong>, which is the same as the harm requirement for larceny and extortion: the property must be transferred to the defendant (Oklahoma Uniform Jury Instructions No. CR 4-141, 2011). In some jurisdictions, <em class=\"emphasis\">no<\/em> transfer of property needs to take place, and the crime is complete when the defendant employs the force or threat with the appropriate criminal intent (Williams v. State, 2011).<\/p>\n<div id=\"storm_1.0-ch11_s02_s02_s04_s01\" class=\"section\">\n<h2 class=\"title editable block\">Example of Robbery Harm<\/h2>\n<p id=\"storm_1.0-ch11_s02_s02_s04_s01_p01\" class=\"para editable block\">Review the example with Rodney and Lindsey in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s02_s02_s02_s01\">Section 11 &#8220;Example of Robbery Attendant Circumstances&#8221;<\/a>. In this example, Rodney threatens to kill Lindsey if she does not give him fifteen thousand dollars out of her purse and gestures to a bulge in his front jacket pocket that appears to be a weapon. Change this example so that Lindsey leaps off of the couch and tackles Rodney after his threat. She reaches into his pocket and determines that Rodney\u2019s \u201cgun\u201d is a plastic water pistol. Rodney manages to get out from under Lindsey and escapes. If Rodney and Lindsey are in a jurisdiction that requires a transfer of property for the harm element of robbery, Rodney has probably only committed <em class=\"emphasis\">attempted<\/em> robbery because Rodney did not get the chance to take the money out of Lindsey\u2019s purse. If Rodney and Lindsey are in a jurisdiction that does <em class=\"emphasis\">not<\/em> require a transfer of property for the harm element of robbery, Rodney may be subject to prosecution for and conviction of this offense.<\/p>\n<div style=\"text-align: center\">\n<div id=\"storm_1.0-ch11_s02_s02_s04_s01_f01\" class=\"figure full editable block\">\n<p class=\"title\"><span class=\"title-prefix\">Figure 11.5<\/span> Diagram of Defenses to Robbery<\/p>\n<p><a href=\"\/criminallaw\/wp-content\/uploads\/sites\/179\/2015\/11\/e7586645a63111a9152860e6d752ea11.jpg\"><img decoding=\"async\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/2479\/2017\/09\/26210147\/e7586645a63111a9152860e6d752ea11.jpg\" alt=\"Diagram of Defenses to Robbery\" \/><\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"storm_1.0-ch11_s02_s02_s05\" class=\"section\">\n<h2 class=\"title editable block\">Robbery Grading<\/h2>\n<p id=\"storm_1.0-ch11_s02_s02_s05_p01\" class=\"para editable block\">As stated previously, robbery is generally <strong class=\"emphasis bold\">graded<\/strong> as a serious felony that can serve as the predicate felony for first-degree felony murder (Cal. Penal Code \u00a7 189, 2011) and a strike in states that have three strikes statutes (Cal. Penal Code \u00a7 1192.7, 2011). Robbery grading is aggravated by the use of a weapon or when the defendant inflicts serious bodily injury (Tex. Penal Code \u00a7 29.03, 2011). The Model Penal Code grades robbery as a felony of the second degree, unless the actor attempts to kill anyone or purposely inflicts or attempts to inflict serious bodily injury, in which case it is graded as a felony of the first degree (Model Penal Code \u00a7\u00a0222.1(2)).<\/p>\n<div id=\"storm_1.0-ch11_s02_s02_s05_t01\" class=\"table block\">\n<p class=\"title\"><span class=\"title-prefix\">Table 11.2<\/span> Comparing Larceny, Extortion, and Robbery<\/p>\n<table style=\"border-spacing: 0px\" cellpadding=\"0\">\n<thead>\n<tr>\n<th>Crime<\/th>\n<th>Criminal Act<\/th>\n<th>Criminal Intent<\/th>\n<th>Attendant Circumstance<\/th>\n<th>Harm<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Larceny<\/td>\n<td>Taking by stealth or false representation of fact<\/td>\n<td>Specific or purposely to deprive the victim of property permanently*<\/td>\n<td>Victim\u2019s property, lack of victim consent<\/td>\n<td>Property transfer<\/td>\n<\/tr>\n<tr>\n<td>Extortion<\/td>\n<td>Taking by threat of future harm; not necessarily physical<\/td>\n<td>Specific or purposely to deprive the victim of property permanently*<\/td>\n<td>Victim\u2019s property; the victim consents based on fear<\/td>\n<td>Property transfer<\/td>\n<\/tr>\n<tr>\n<td>Robbery<\/td>\n<td>Taking by force or threat of imminent force<\/td>\n<td>Specific or purposely to deprive the victim of property permanently*<\/td>\n<td>Victim\u2019s property, lack of victim consent, property is taken from the victim\u2019s person or presence<\/td>\n<td>Property transfer**<\/td>\n<\/tr>\n<\/tbody>\n<tfoot>\n<tr>\n<th colspan=\"5\">*In some jurisdictions, the defendant can intend a temporary taking.<\/th>\n<\/tr>\n<tr>\n<th colspan=\"5\">**In some jurisdictions, the victim does not need to transfer the property to the defendant.<\/th>\n<\/tr>\n<\/tfoot>\n<\/table>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"storm_1.0-ch11_s02_s03\" class=\"section\">\n<h2 class=\"title editable block\">Receiving Stolen Property<\/h2>\n<p id=\"storm_1.0-ch11_s02_s03_p01\" class=\"para editable block\">All jurisdictions criminalize <span class=\"margin_term\"><a class=\"glossterm\">receiving stolen property<\/a><\/span>, to deter theft and to break up organized criminal enterprises that benefit from stealing and selling stolen goods. Receiving stolen property criminal statutes often are targeted at pawnbrokers or <span class=\"margin_term\"><a class=\"glossterm\">fences<\/a><\/span> who regularly buy and sell property that is the subject of one of the theft crimes discussed in the preceding sections. As stated, the Model Penal Code includes receiving stolen property in its consolidated theft offense (Model Penal Code \u00a7\u00a7\u00a0223.1, 223.6). Receiving stolen property has the elements of criminal act, criminal intent, attendant circumstances, causation, and harm, as is explored in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s02_s03\">Section 11.2.3 &#8220;Receiving Stolen Property&#8221;<\/a>.<\/p>\n<div id=\"storm_1.0-ch11_s02_s03_s01\" class=\"section\">\n<h2 class=\"title editable block\">Receiving Stolen Property Act<\/h2>\n<p id=\"storm_1.0-ch11_s02_s03_s01_p01\" class=\"para editable block\">The <strong class=\"emphasis bold\">criminal act<\/strong> element required for receiving stolen property in many jurisdictions is receiving, retaining, disposing of (Ala. Code \u00a7 13A-8-16, 2011), selling (Cal. Penal Code \u00a7 496, 2011), trafficking in (Fla. Stat. Ann. \u00a7 812.019, 2011), buying, or aiding in concealment (Mass. Gen. Laws ch. 266 \u00a7 60) of stolen personal property. The Model Penal Code defines the criminal act element as receiving, retaining, or disposing of stolen movable property (Model Penal Code \u00a7\u00a0223.6(1)). The criminal act does not generally require the defendant to be in actual <strong class=\"emphasis bold\">physical possession<\/strong> of the property, as long as the defendant retains <em class=\"emphasis\">control<\/em> over the item(s) (Ga. Code \u00a7 16-8-7, 2011). This would be a constructive possession. The Model Penal Code defines receiving as \u201cacquiring possession, control or title, or lending on the security of the property\u201d (Model Penal Code \u00a7\u00a0223.6(1)). Note that the criminal act element of receiving stolen property includes both <strong class=\"emphasis bold\">buying<\/strong> and <strong class=\"emphasis bold\">selling<\/strong>. Thus dealers that regularly purchase and then sell stolen items can be prosecuted for both of these acts under the same statute.<\/p>\n<div id=\"storm_1.0-ch11_s02_s03_s01_s01\" class=\"section\">\n<h2 class=\"title editable block\">Example of Receiving Stolen Property Act<\/h2>\n<p id=\"storm_1.0-ch11_s02_s03_s01_s01_p01\" class=\"para editable block\">Chanel, a fence who deals in stolen designer perfume, arranges a sale between one of her thieves, Burt, and a regular customer, Sandra. Chanel directs Burt to drop off a shipment of one crate of the stolen perfume at Chanel\u2019s storage facility and gives Burt the key. Chanel pays Burt five thousand dollars for the perfume delivery. Chanel thereafter accepts a payment of ten thousand dollars from Sandra and gives Sandra another key with instructions to pick up the perfume the next day after it has been delivered. Chanel could probably be charged with and convicted of receiving stolen property in most jurisdictions. Although Chanel did not ever acquire actual <em class=\"emphasis\">possession<\/em> of the stolen designer perfume, Chanel had <em class=\"emphasis\">control<\/em> over the property or constructive possession through her storage facility. Chanel\u2019s acts of <strong class=\"emphasis bold\">buying<\/strong> the perfume for five thousand dollars and then <strong class=\"emphasis bold\">selling<\/strong> it for ten thousand dollars both would be criminalized under <em class=\"emphasis\">one<\/em> statute in many jurisdictions. Thus Chanel could be prosecuted for <em class=\"emphasis\">both<\/em> acts as separate charges of receiving stolen property.<\/p>\n<\/div>\n<\/div>\n<div id=\"storm_1.0-ch11_s02_s03_s02\" class=\"section\">\n<h2 class=\"title editable block\">Receiving Stolen Property Intent<\/h2>\n<p id=\"storm_1.0-ch11_s02_s03_s02_p01\" class=\"para editable block\">The criminal intent element required for receiving stolen property has two parts. First, the defendant must have the intent to commit the criminal act, which could be <strong class=\"emphasis bold\">specific intent<\/strong> or <strong class=\"emphasis bold\">purposely<\/strong>, <strong class=\"emphasis bold\">general intent<\/strong> or <strong class=\"emphasis bold\">knowingly<\/strong>, <strong class=\"emphasis bold\">recklessly<\/strong>, or <strong class=\"emphasis bold\">negligently<\/strong> to either buy-receive or sell-dispose of stolen personal property, depending on the jurisdiction. This means that the defendant must have <strong class=\"emphasis bold\">actual knowledge<\/strong> that the property is stolen (Mass. Gen. Laws ch. 266 \u00a7 60, 2011), or the defendant must be aware or should be aware of a <strong class=\"emphasis bold\">risk<\/strong> that the property is stolen (Ala. Code \u00a7 13A-8-16(a), 2011). The Model Penal Code requires the defendant to purposely commit the act <em class=\"emphasis\">knowing<\/em> that the property is stolen or <em class=\"emphasis\">believing<\/em> that the property has <em class=\"emphasis\">probably<\/em> been stolen (Model Penal Code \u00a7\u00a0223.6(1)). The Model Penal Code also provides a <strong class=\"emphasis bold\">presumption<\/strong> of knowledge or belief when the defendant is a <strong class=\"emphasis bold\">dealer<\/strong>, which is defined as a \u201cperson in the business of buying or selling goods including a pawnbroker,\u201d and has been found in possession or control of property stolen from two or more persons on more than one occasion, or has received stolen property in another transaction within the year preceding the transaction charged, or acquires the property for consideration far below its reasonable value (Model Penal Code \u00a7\u00a0223.6(2)). Many state statutes have a similar provision (Ala. Code \u00a7 13A-8-16, 2011).<\/p>\n<p id=\"storm_1.0-ch11_s02_s03_s02_p02\" class=\"para editable block\">The second aspect of criminal intent for receiving stolen property is the defendant\u2019s <strong class=\"emphasis bold\">specific intent<\/strong> or <strong class=\"emphasis bold\">purposeful<\/strong> desire to deprive the victim of the property <em class=\"emphasis\">permanently<\/em>, which is required in some jurisdictions (Hawaii Criminal Jury Instructions No. 10.00, 10.20, 2011). This creates a <strong class=\"emphasis bold\">failure of proof<\/strong> or <strong class=\"emphasis bold\">affirmative defense<\/strong> that the defendant received and retained the stolen property with the intent to <em class=\"emphasis\">return<\/em> it to the true owner (Ga. Code \u00a7 16-8-7(a), 2011). The Model Penal Code also provides a defense if \u201cthe property is received, retained, or disposed of with purpose to restore it to the owner\u201d (Model Penal Code \u00a7\u00a0223.6(1)).<\/p>\n<div id=\"storm_1.0-ch11_s02_s03_s02_s01\" class=\"section\">\n<h2 class=\"title editable block\">Example of Receiving Stolen Property Intent<\/h2>\n<p id=\"storm_1.0-ch11_s02_s03_s02_s01_p01\" class=\"para editable block\">Chip\u2019s iPod breaks, so he decides to go to the local electronics store and buy a new one. As he is approaching the store, Heather saunters over from a nearby alley and asks him if he wants to buy a brand new iPod for ten dollars. Suspicious of the price, Chip asks Heather to see the iPod. She hands it to him, and he notices that the box looks like it has been tampered with and a price tag removed. He shrugs, takes ten dollars out of his wallet, and hands it to Heather in exchange for the iPod. In jurisdictions that require <strong class=\"emphasis bold\">actual knowledge<\/strong> that the property is stolen, Chip probably does not have the appropriate criminal intent for receiving stolen property because he did not know Heather and had no way of knowing if Heather was selling him stolen property. In jurisdictions that require <strong class=\"emphasis bold\">awareness of a risk<\/strong> that the property is stolen, Chip may have the appropriate criminal intent because he knew the price was too low and noticed that the box had been tampered with to remove evidence of an actual price or vendor.<\/p>\n<p id=\"storm_1.0-ch11_s02_s03_s02_s01_p02\" class=\"para editable block\">Change the example so that Chip is a pawnshop broker, and Heather brings the iPod into his shop to pawn for the price of ten dollars. In many jurisdictions, if Chip accepts the iPod to pawn, this creates a <strong class=\"emphasis bold\">presumption<\/strong> of receiving stolen property criminal intent. Chip is considered a dealer, and in many jurisdictions, dealers who acquire property for consideration that they <em class=\"emphasis\">know<\/em> is <em class=\"emphasis\">far below<\/em> the reasonable value are subject to this type of presumption.<\/p>\n<p id=\"storm_1.0-ch11_s02_s03_s02_s01_p03\" class=\"para editable block\">Change the example again so that Chip notices the following message written on the back of the iPod box: \u201cThis iPod is the property of Eugene Schumaker.\u201d Chip is Eugene Schumaker\u2019s friend, so he pays Heather the ten dollars to purchase the iPod so he can return it to Eugene. In many jurisdictions and under the Model Penal Code, Chip can use his intent to return the stolen property to its true owner as a <strong class=\"emphasis bold\">failure of proof<\/strong> or <strong class=\"emphasis bold\">affirmative defense<\/strong> to receiving stolen property.<\/p>\n<\/div>\n<\/div>\n<div id=\"storm_1.0-ch11_s02_s03_s03\" class=\"section\">\n<h2 class=\"title editable block\">Retaining Stolen Property<\/h2>\n<p id=\"storm_1.0-ch11_s02_s03_s03_p01\" class=\"para editable block\">If <strong class=\"emphasis bold\">retaining<\/strong> is the criminal act element described in the receiving stolen property statute, a defendant can still be convicted of receiving stolen property if he or she originally receives the property <em class=\"emphasis\">without<\/em> the appropriate criminal intent, but later keeps the property <em class=\"emphasis\">after<\/em> discovering it is stolen (Connecticut Criminal Jury Instructions \u00a7\u00a753a-119(8), 2011).<\/p>\n<div id=\"storm_1.0-ch11_s02_s03_s03_s01\" class=\"section\">\n<h2 class=\"title editable block\">Example of Retaining Stolen Property<\/h2>\n<p id=\"storm_1.0-ch11_s02_s03_s03_s01_p01\" class=\"para editable block\">Review the example with Chip and Heather in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s02_s03_s02_s01\">Section 11 &#8220;Example of Receiving Stolen Property Intent&#8221;<\/a>. Change this example so that Chip is not a dealer and is offered the iPod for one hundred dollars, which is fairly close to its actual value. Chip purchases the iPod from Heather and thereafter drives home. When he gets home, he begins to open the box and notices the message stating that the iPod is the property of Eugene Schumaker. Chip thinks about it for a minute, continues to open the box, and then retains the iPod for the next six months. If Chip is in a state that defines the criminal act element for receiving stolen property as <strong class=\"emphasis bold\">retains<\/strong>, then Chip most likely committed the criminal act with the appropriate criminal intent (knowledge that the property is stolen) and may be subject to prosecution for and conviction of this offense.<\/p>\n<\/div>\n<\/div>\n<div id=\"storm_1.0-ch11_s02_s03_s04\" class=\"section\">\n<h2 class=\"title editable block\">Receiving Stolen Property Attendant Circumstances<\/h2>\n<p id=\"storm_1.0-ch11_s02_s03_s04_p01\" class=\"para editable block\">The property must be <em class=\"emphasis\">stolen<\/em> for this crime, so the prosecution must prove the <strong class=\"emphasis bold\">attendant circumstances<\/strong> that the property belongs to another and lack of victim consent.<\/p>\n<\/div>\n<div id=\"storm_1.0-ch11_s02_s03_s05\" class=\"section\">\n<h2 class=\"title editable block\">Receiving Stolen Property Causation<\/h2>\n<p id=\"storm_1.0-ch11_s02_s03_s05_p01\" class=\"para editable block\">The criminal act must be the <strong class=\"emphasis bold\">factual<\/strong> and <strong class=\"emphasis bold\">legal cause<\/strong> of receiving stolen property harm, which is defined in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s02_s03_s06\">Section 11 &#8220;Receiving Stolen Property Harm&#8221;<\/a>.<\/p>\n<\/div>\n<div id=\"storm_1.0-ch11_s02_s03_s06\" class=\"section\">\n<h2 class=\"title editable block\">Receiving Stolen Property Harm<\/h2>\n<p id=\"storm_1.0-ch11_s02_s03_s06_p01\" class=\"para editable block\">The defendant must <strong class=\"emphasis bold\">buy<\/strong>, <strong class=\"emphasis bold\">receive<\/strong>, <strong class=\"emphasis bold\">retain<\/strong>, <strong class=\"emphasis bold\">sell<\/strong>, or <strong class=\"emphasis bold\">dispose of<\/strong> stolen property for the completed crime of receiving stolen property in most jurisdictions (Ala. Code \u00a7 13A-8-16, 2011). If the defendant does not actually gain or transfer control of the property, only <em class=\"emphasis\">attempted<\/em> receiving stolen property can be charged.<\/p>\n<div style=\"text-align: center\">\n<div id=\"storm_1.0-ch11_s02_s03_s06_f01\" class=\"figure full editable block\">\n<p class=\"title\"><span class=\"title-prefix\">Figure 11.6<\/span> Diagram of Defenses to Receiving Stolen Property<\/p>\n<p><a href=\"\/criminallaw\/wp-content\/uploads\/sites\/179\/2015\/11\/99151cc6d5938e282a2d51a468ce74f7.jpg\"><img decoding=\"async\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/2479\/2017\/09\/26210153\/99151cc6d5938e282a2d51a468ce74f7.jpg\" alt=\"Diagram of Defenses to Receiving Stolen Property\" \/><\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"storm_1.0-ch11_s02_s03_s07\" class=\"section\">\n<h2 class=\"title editable block\">Receiving Stolen Property Grading<\/h2>\n<p id=\"storm_1.0-ch11_s02_s03_s07_p01\" class=\"para editable block\">Receiving stolen property is <strong class=\"emphasis bold\">graded<\/strong> as a felony-misdemeanor (Cal. Penal Code \u00a7 496, 2011) or as a misdemeanor if the stolen property is of low value and a felony if the stolen property is of high value (Ga. Code \u00a7 16-8-12, 2011).<\/p>\n<div style=\"text-align: center\">\n<div id=\"storm_1.0-ch11_s02_s03_s07_f01\" class=\"figure full editable block\">\n<p class=\"title\"><span class=\"title-prefix\">Figure 11.7<\/span> Diagram of Crimes Involving Theft<\/p>\n<p><a href=\"\/criminallaw\/wp-content\/uploads\/sites\/179\/2015\/11\/3b7c08fa7d093a4af36f70a95fe1bf67.jpg\"><img decoding=\"async\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/2479\/2017\/09\/26210201\/3b7c08fa7d093a4af36f70a95fe1bf67.jpg\" alt=\"Diagram of Crimes Involving Theft\" \/><\/a><\/p>\n<\/div>\n<\/div>\n<div id=\"storm_1.0-ch11_s02_s03_s07_n01\" class=\"bcc-box bcc-success\">\n<h3 class=\"title\">Key Takeaways<\/h3>\n<ul id=\"storm_1.0-ch11_s02_s03_s07_l01\" class=\"itemizedlist\">\n<li>The criminal act element required for extortion is typically a theft of property accomplished by a threat to cause future harm to the victim.<\/li>\n<li>The criminal intent element required for extortion is typically the specific intent or purposely to unlawfully deprive the victim of property permanently. However, in some jurisdictions, it is the general intent or knowingly to perform the criminal act.<\/li>\n<li>In many jurisdictions, it is an affirmative defense to extortion that the property taken by threat to expose a secret or accuse anyone of a criminal offense is taken honestly, as compensation for property, or as restitution or indemnification for harm done by the secret or crime.<\/li>\n<li>The attendant circumstances of extortion are that the property belongs to another and that the victim consents to transferring the property to the defendant based on fear inspired by the defendant\u2019s threat.<\/li>\n<li>The harm element required for extortion is that the defendant obtains the property of another.<\/li>\n<li>Extortion is graded as a felony in most jurisdictions.<\/li>\n<li>Robbery requires a taking accomplished by force or threat of imminent force. Extortion requires a taking by threat of future harm that is not necessarily force, and larceny generally requires a taking by stealth or a false representation of fact. Robbery also requires the attendant circumstance that the property be taken from the victim\u2019s person or presence and is generally graded more severely than larceny or extortion.<\/li>\n<li>Robbery is typically graded as a serious felony, which is a strike in jurisdictions that have three strikes statutes, and a predicate felony for first-degree felony murder.<\/li>\n<li>The criminal act element required for receiving stolen property is typically buying-receiving, retaining, and selling-disposing of stolen personal property.<\/li>\n<li>The defendant must have the intent to commit the criminal act of receiving stolen property, which could be specific intent or purposely, general intent or knowingly, recklessly, or negligently to either buy-receive or sell-dispose of stolen personal property, depending on the jurisdiction. If \u201cretain\u201d is the criminal act element specified in the receiving stolen property statute, a defendant who obtains property without knowledge that it is stolen commits the offense if he or she thereafter keeps property after discovering that it is stolen. The defendant must also have the specific intent or purposeful desire to deprive the victim of the property permanently in some jurisdictions.<\/li>\n<li>A failure of proof or affirmative defense to receiving stolen property in some jurisdictions is that the defendant received and retained the stolen property with the intent to return it to the true owner.<\/li>\n<li>The attendant circumstances for receiving stolen property are that the property belongs to another and lack of victim consent. The harm element of receiving stolen property is that the defendant buy-receive, retain, or sell-dispose of stolen personal property.<\/li>\n<li>Receiving stolen property is graded as a felony-misdemeanor or a misdemeanor if the stolen property is of low value and a felony if the stolen property is of high value.<\/li>\n<\/ul>\n<\/div>\n<div id=\"storm_1.0-ch11_s02_s03_s07_n02\" class=\"bcc-box bcc-info\">\n<h3 class=\"title\">Exercises<\/h3>\n<p id=\"storm_1.0-ch11_s02_s03_s07_p02\" class=\"para\">Answer the following questions. Check your answers using the answer key at the end of the chapter.<\/p>\n<ol id=\"storm_1.0-ch11_s02_s03_s07_l02\" class=\"orderedlist\">\n<li>Review the example given in <a class=\"xref\" href=\"https:\/\/courses.lumenlearning.com\/suny-fmcc-criminallaw\/chapter\/11-2-extortion-robbery-and-receiving-stolen-property\/#storm_1.0-ch11_s01_s01_s07_s01\">Section 11 &#8220;Example of a Case Lacking the Attendant Circumstance of Victim Reliance Required for False Pretenses&#8221;<\/a> with Jeremy and Chuck. In this example, Chuck shows Jeremy a video he made of Jeremy reading a magazine instead of tuning up Chuck\u2019s taxi. Chuck thereafter threatens to show this video to the district attorney if Jeremy does not pay him two hundred dollars. Has Chuck committed a crime in this scenario? If your answer is yes, which crime?<\/li>\n<li>Read <em class=\"emphasis\">State v. Robertson<\/em>, 531 S. E. 2d 490 (2000). In <em class=\"emphasis\">Robertson<\/em>, the Court of Appeals of North Carolina reversed the defendant\u2019s conviction for robbery of the victim\u2019s purse. What was the basis of the court\u2019s reversal of conviction? The case is available at this link: <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=10266690205116389671&amp;q=robbery+%22purse+snatching%22&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=2000\" target=\"_blank\" rel=\"noopener\">http:\/\/scholar.google.com\/scholar_case?case=10266690205116389671&amp;q= robbery+%22purse+snatching%22&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=2000<\/a>.<\/li>\n<li>Read <em class=\"emphasis\">People v. Pratt<\/em>, 656 N.W.2d 866 (2002). In <em class=\"emphasis\">Pratt<\/em>, the defendant was convicted of receiving stolen property for taking and concealing his girlfriend\u2019s vehicle. The defendant appealed, claiming that there was no evidence to indicate that he intended to permanently deprive his girlfriend of the vehicle, and thus it was not \u201c<strong class=\"emphasis bold\">stolen<\/strong>.\u201d Did the Court of Appeals of Michigan uphold the defendant\u2019s conviction? Why or why not? The case is available at this link: <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=9260508991670862336&amp;q=actual+knowledge+%22receiving+stolen+property%22&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=2000\" target=\"_blank\" rel=\"noopener\">http:\/\/scholar.google.com\/scholar_case?case=9260508991670862336&amp;q= actual+knowledge+%22receiving+stolen+property%22&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=2000<\/a>.<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<\/div>\n<h2>References<\/h2>\n<p>Ala. Code \u00a7\u00a013A-8-16, accessed March 12, 2011, <a class=\"link\" href=\"http:\/\/law.onecle.com\/alabama\/criminal-code\/13A-8-16.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/alabama\/criminal-code\/13A-8-16.html<\/a>.<\/p>\n<p>Ala. Code \u00a7\u00a013A-8-43, accessed March 18, 2011, <a class=\"link\" href=\"http:\/\/law.onecle.com\/alabama\/criminal-code\/13A-8-43.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/alabama\/criminal-code\/13A-8-43.html<\/a>.<\/p>\n<p>Ariz. Rev. Stat. \u00a7\u00a013-1804, <a class=\"link\" href=\"http:\/\/law.onecle.com\/arizona\/criminal-code\/13-1804.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/arizona\/criminal-code\/13-1804.html<\/a>.<\/p>\n<p>Cal. Penal Code \u00a7\u00a0189, accessed March 19, 2011, <a class=\"link\" href=\"http:\/\/law.onecle.com\/california\/penal\/189.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/california\/penal\/189.html<\/a>.<\/p>\n<p>Cal. Penal Code \u00a7\u00a0211, accessed March 19, 2011, <a class=\"link\" href=\"http:\/\/codes.lp.findlaw.com\/cacode\/PEN\/3\/1\/8\/4\/s211\" target=\"_blank\" rel=\"noopener\">http:\/\/codes.lp.findlaw.com\/cacode\/PEN\/3\/1\/8\/4\/s211<\/a>.<\/p>\n<p>Cal. Penal Code \u00a7\u00a0496, accessed March 12, 2011, <a class=\"link\" href=\"http:\/\/law.onecle.com\/california\/penal\/496.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/california\/penal\/496.html<\/a>.<\/p>\n<p>Cal. Penal Code \u00a7\u00a01192.7, accessed March 19, 2011, <a class=\"link\" href=\"http:\/\/law.onecle.com\/california\/penal\/1192.7.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/california\/penal\/1192.7.html<\/a>.<\/p>\n<p>Connecticut Criminal Jury Instructions \u00a7\u00a753a-119(5) and 53a-122(a) (1), accessed March 12, 2011, <a class=\"link\" href=\"http:\/\/www.jud.ct.gov\/ji\/criminal\/part9\/9.1-11.htm\" target=\"_blank\" rel=\"noopener\">http:\/\/www.jud.ct.gov\/ji\/criminal\/part9\/9.1-11.htm<\/a>.<\/p>\n<p>Connecticut Criminal Jury Instructions \u00a7\u00a753a-119(8) and 53a-122 through 53a-125b, accessed March 13, 2011, <a class=\"link\" href=\"http:\/\/www.jud.ct.gov\/ji\/criminal\/part9\/9.1-15.htm\" target=\"_blank\" rel=\"noopener\">http:\/\/www.jud.ct.gov\/ji\/criminal\/part9\/9.1-15.htm<\/a>.<\/p>\n<p>Fla. Stat. Ann. \u00a7\u00a0812.019, accessed March 12, 2011, <a class=\"link\" href=\"http:\/\/law.onecle.com\/florida\/crimes\/812.019.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/florida\/crimes\/812.019.html<\/a>.<\/p>\n<p>Fla. Stat. Ann. \u00a7\u00a0812.13, accessed March 19, 2011, <a class=\"link\" href=\"http:\/\/law.onecle.com\/florida\/crimes\/812.13.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/florida\/crimes\/812.13.html<\/a>.<\/p>\n<p>Ga. Code \u00a7\u00a016-8-7, accessed March 12, 2011, <a class=\"link\" href=\"http:\/\/law.onecle.com\/georgia\/16\/16-8-7.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/georgia\/16\/16-8-7.html<\/a>.<\/p>\n<p>Hawaii Criminal Jury Instructions No. 10.00, 10.20, accessed March 13, 2011, <a class=\"link\" href=\"http:\/\/www.courts.state.hi.us\/docs\/docs4\/crimjuryinstruct.pdf\" target=\"_blank\" rel=\"noopener\">http:\/\/www.courts.state.hi.us\/docs\/docs4\/crimjuryinstruct.pdf<\/a>.<\/p>\n<p><em class=\"emphasis\">Jones v. State<\/em>, 652 So. 2d 346 (1995), accessed March 19, 2011, <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=11856873917512077763&amp;q=robbery+%22from+the+victim%27s+person%22&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=2000\" target=\"_blank\" rel=\"noopener\">http:\/\/scholar.google.com\/scholar_case?case=11856873917512077763&amp;q= robbery+%22from+the+victim%27s+person%22&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=2000<\/a>.<\/p>\n<p>K.S.A. \u00a7\u00a021-3428, accessed March 18, 2011, <a class=\"link\" href=\"http:\/\/kansasstatutes.lesterama.org\/Chapter_21\/Article_34\/21-3428.html\" target=\"_blank\" rel=\"noopener\">http:\/\/kansasstatutes.lesterama.org\/Chapter_21\/Article_34\/21-3428.html<\/a>.<\/p>\n<p>Ga. Code \u00a7\u00a016-8-12, accessed March 13, 2011, <a class=\"link\" href=\"http:\/\/law.onecle.com\/georgia\/16\/16-8-12.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/georgia\/16\/16-8-12.html<\/a>.<\/p>\n<p>Ga. Code \u00a7\u00a016-8-16, accessed March 11, 2011, <a class=\"link\" href=\"http:\/\/law.onecle.com\/georgia\/16\/16-8-16.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/georgia\/16\/16-8-16.html<\/a>.<\/p>\n<p>Ind. Code \u00a7\u00a035-42-5-1, accessed March 18, 2011, <a class=\"link\" href=\"http:\/\/law.onecle.com\/indiana\/35\/35-42-5-1.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/indiana\/35\/35-42-5-1.html<\/a>.<\/p>\n<p>Mass. Gen. Laws ch. 266 \u00a7\u00a060, <a class=\"link\" href=\"http:\/\/law.onecle.com\/massachusetts\/266\/60.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/massachusetts\/266\/60.html<\/a>.<\/p>\n<p><em class=\"emphasis\">Metheny v. State<\/em>, 755 A.2d 1088 (2000), accessed March 19, 2011, <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=10315203348655203542&amp;q=robbery+%22deprive+permanently%22&amp;hl=en&amp;as_sdt=2,5\" target=\"_blank\" rel=\"noopener\">http:\/\/scholar.google.com\/scholar_case?case=10315203348655203542&amp;q= robbery+%22deprive+permanently%22&amp;hl=en&amp;as_sdt=2,5<\/a>.<\/p>\n<p>Oklahoma Uniform Jury Instructions No. CR 4-141, accessed March 19, 2011, <a class=\"link\" href=\"http:\/\/www.okcca.net\/online\/oujis\/oujisrvr.jsp?o=248\" target=\"_blank\" rel=\"noopener\">http:\/\/www.okcca.net\/online\/oujis\/oujisrvr.jsp?o=248<\/a>.<\/p>\n<p>Oklahoma Uniform Jury Instructions No. CR 5-34, accessed March 12, 2011, <a class=\"link\" href=\"http:\/\/www.okcca.net\/online\/oujis\/oujisrvr.jsp?oc=OUJI-CR%205-34\" target=\"_blank\" rel=\"noopener\">http:\/\/www.okcca.net\/online\/oujis\/oujisrvr.jsp?oc=OUJI-CR%205-34<\/a>.<\/p>\n<p>Or. Rev. Stat. \u00a7\u00a0164.075, accessed March 12, 2011, <a class=\"link\" href=\"http:\/\/law.onecle.com\/oregon\/164-offenses-against-property\/164.075.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/oregon\/164-offenses-against-property\/164.075.html<\/a>.<\/p>\n<p><em class=\"emphasis\">S.W. v. State<\/em>, 513 So. 2d 1088 (1987), accessed March 18, 2011, <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=8956843531832075141&amp;q=robbery+%22slight+force%22&amp;hl=en&amp;as_sdt=2,5\" target=\"_blank\" rel=\"noopener\">http:\/\/scholar.google.com\/scholar_case?case=8956843531832075141&amp;q= robbery+%22slight+force%22&amp;hl=en&amp;as_sdt=2,5<\/a>.<\/p>\n<p><em class=\"emphasis\">State v. Handburgh<\/em>, 830 P.2d 641 (1992), accessed March 18, 2011, <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=2186457002998894202&amp;q=State+v.+Handburgh&amp;hl=en&amp;as_sdt=2,5\" target=\"_blank\" rel=\"noopener\">http:\/\/scholar.google.com\/scholar_case?case=2186457002998894202&amp;q= State+v.+Handburgh&amp;hl=en&amp;as_sdt=2,5<\/a>.<\/p>\n<p>Tex. Penal Code \u00a7\u00a029.03, accessed March 12, 2011, <a class=\"link\" href=\"http:\/\/law.onecle.com\/texas\/penal\/29.03.00.html\" target=\"_blank\" rel=\"noopener\">http:\/\/law.onecle.com\/texas\/penal\/29.03.00.html<\/a>.<\/p>\n<p><em class=\"emphasis\">Williams v. State<\/em>, 91 S.W. 3d 54 (2002), accessed March 19, 2011, <a class=\"link\" href=\"http:\/\/scholar.google.com\/scholar_case?case=9518129765374420507&amp;q=robbery+%22transfer+of+property%22&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=2000\" target=\"_blank\" rel=\"noopener\">http:\/\/scholar.google.com\/scholar_case?case=9518129765374420507&amp;q= robbery+%22transfer+of+property%22&amp;hl=en&amp;as_sdt=2,5&amp;as_ylo=2000<\/a>.<\/p>\n\n\t\t\t <section class=\"citations-section\" role=\"contentinfo\">\n\t\t\t <h3>Candela Citations<\/h3>\n\t\t\t\t\t <div>\n\t\t\t\t\t\t <div id=\"citation-list-1313\">\n\t\t\t\t\t\t\t <div class=\"licensing\"><div class=\"license-attribution-dropdown-subheading\">CC licensed content, Shared previously<\/div><ul class=\"citation-list\"><li>Criminal Law. <strong>Provided by<\/strong>: University of Minnesota Libraries Publishing . <strong>Located at<\/strong>: <a target=\"_blank\" href=\"http:\/\/open.lib.umn.edu\/criminallaw\/\">http:\/\/open.lib.umn.edu\/criminallaw\/<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/\">CC BY-NC-SA: Attribution-NonCommercial-ShareAlike<\/a><\/em><\/li><\/ul><\/div>\n\t\t\t\t\t\t <\/div>\n\t\t\t\t\t <\/div>\n\t\t\t <\/section>","protected":false},"author":23485,"menu_order":2,"template":"","meta":{"_candela_citation":"[{\"type\":\"cc\",\"description\":\"Criminal Law\",\"author\":\"\",\"organization\":\"University of Minnesota Libraries Publishing \",\"url\":\"http:\/\/open.lib.umn.edu\/criminallaw\/\",\"project\":\"\",\"license\":\"cc-by-nc-sa\",\"license_terms\":\"\"}]","CANDELA_OUTCOMES_GUID":"","pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-1313","chapter","type-chapter","status-publish","hentry"],"part":1305,"_links":{"self":[{"href":"https:\/\/courses.lumenlearning.com\/suny-sccc-criminallaw\/wp-json\/pressbooks\/v2\/chapters\/1313","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/courses.lumenlearning.com\/suny-sccc-criminallaw\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/courses.lumenlearning.com\/suny-sccc-criminallaw\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/suny-sccc-criminallaw\/wp-json\/wp\/v2\/users\/23485"}],"version-history":[{"count":5,"href":"https:\/\/courses.lumenlearning.com\/suny-sccc-criminallaw\/wp-json\/pressbooks\/v2\/chapters\/1313\/revisions"}],"predecessor-version":[{"id":1684,"href":"https:\/\/courses.lumenlearning.com\/suny-sccc-criminallaw\/wp-json\/pressbooks\/v2\/chapters\/1313\/revisions\/1684"}],"part":[{"href":"https:\/\/courses.lumenlearning.com\/suny-sccc-criminallaw\/wp-json\/pressbooks\/v2\/parts\/1305"}],"metadata":[{"href":"https:\/\/courses.lumenlearning.com\/suny-sccc-criminallaw\/wp-json\/pressbooks\/v2\/chapters\/1313\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/courses.lumenlearning.com\/suny-sccc-criminallaw\/wp-json\/wp\/v2\/media?parent=1313"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/suny-sccc-criminallaw\/wp-json\/pressbooks\/v2\/chapter-type?post=1313"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/suny-sccc-criminallaw\/wp-json\/wp\/v2\/contributor?post=1313"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/suny-sccc-criminallaw\/wp-json\/wp\/v2\/license?post=1313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}