Premium Essay

Case Brief Stanford V. Kentucky

In: Other Topics

Submitted By shannbanan6491
Words 379
Pages 2
I. Style of the case: Stanford v. Kentucky 492 U.S. 361, 109 S. Ct. 2969, 106 L. Ed. 2d 306 (1989).

II. Statement of Facts: Kevin Stanford committed the murder of Barbel Poore in Jefferson County, Kentucky on January 7, 1981, when he was approximately 17 years and 4 months of age. Stanford and his accomplice repeatedly raped and sodomized Poore during and after their commission of a robbery at a gas station, where Stanford shot her pointblank in the face and then the back of her head. A Kentucky juvenile court conducted hearings to determine whether he should be transferred for trial as an adult under Ky. Rev. Stat Ann. § 208.170. That statute provided that juvenile court jurisdiction could be waived and an offender tried as an adult if he was either charged with a Class A felony or capital crime, or was over 16 years of age and charged with a felony. The juvenile court found certification for trial as an adult to be in the best interest of petitioner and the community. Stanford was convicted of murder, first-degree sodomy, first-degree robbery and receiving stolen property, and was sentenced to death.

III. Procedural History: This case was first tried in a Kentucky juvenile court and Stanford was convicted of murder, first-degree sodomy, first-degree robbery and receiving stolen property, and was sentenced to death. The Kentucky Supreme Court affirmed the death sentence.

IV. Issues in the case: These two consolidated cases require us to decide whether the imposition of capital punishment on an individual for a crime committed at 16 or 17 years of age constitutes cruel and unusual punishment under the Eighth Amendment.

V. Holdings: This case was first tried in a Kentucky juvenile court and Stanford was convicted of murder, first-degree sodomy, first-degree robbery and receiving stolen property, and was sentenced to death. The Kentucky Supreme Court…...

Similar Documents

Premium Essay

Case Brief

...Aubrey Grudowski Criminal Law Case Brief STANFORD v. KENTUCKY, 492 U.S. 361 (1989) 492 U.S. 361 STANFORD v. KENTUCKY 
CERTIORARI TO THE SUPREME COURT OF KENTUCKY JUSTICE SCALIA FACTS Petitioner in No. 87-5765 was about seventeen years and four months of age when he committed murder in Kentucky. After a juvenile court and several hearings he went to trial as an adult in a category for those who have committed Class A felonies or those under age sixteen who have been charged with a felony. This Petitioner was sentenced to death due to the fact he commit murder in the first degree. The death sentence was agreed upon, his contention rejected, and the mitigating circumstances considering his age, meaning he had a constitutional right to the juvenile justice system. PROCEDURAL HISTORY A societal consensus was gathered that a far smaller number of those convicted under 18 have been sentenced to death than over 18. When the Bill of Rights were written, punishments were considered cruel and unusual, therefore the 8th amendment was added to the constitution, Ford v. Wainwright. Or evolving to make society more decent to prove the maturity, Trop v. Dulles. Petitioners have not mentioned that their punishments would have been considered cruel in the 18th century. With the common-law tradition, at least 281 offenders under 18, and 126 under 17, have been executed in this country. Also, with the cases 488 U.S. 887 (1988) and 487 U.S. 1233 (1988), certiorari was......

Words: 365 - Pages: 2

Premium Essay

Cj/354 Worksheet

...Case Review Worksheet CJ/354 Week Two Worksheet Part I: Case Review Review the cases below by going to the “Detailed Contents” section of the Contemporary Criminal Law textbook. After reviewing the case, select the defense that was represented in the case from the following list: necessity | self-defense | defense of others | defense of home and property | resisting unlawful arrest | consent | duress | intoxication | mistake | age or infancy defense | entrapment | syndrome-based defenses | insanity defense | | | 1. Case 1: State v. Dejarlais State v. Dejarlais section in Ch. 8 of Contemporary Criminal Law Defense used: Consent 2. Case 2: Lopez v. State Lopez v. State section in Ch. 9 of Contemporary Criminal Law Defense used: Insanity Defense 3. Case 3: People v. Ceballos People v. Ceballos section in Ch. 8 of Contemporary Criminal Law Defense used: Defense of Home and Property, Necessity 4. Case 3: Brazil v. State Brazill v. State section in Ch. 9 of Contemporary Criminal Law Defense used: Age or Infancy Defense Part II: Short Answer Answer, in a minimum of 50 words, each of the following questions: 1. What is the adversarial system? The adversarial system, also known as adversary system. Many also refer to it as the legal system. They develop and present any arguments, gather, and submit any evidence they may have, as well as questioning any witnesses. Both parties are represented by......

Words: 648 - Pages: 3

Free Essay

Human Dignity

...The Use of Human Dignity in Death Penalty Cases: An International perspective An examination of cases from several jurisdictions that address the legality of the death penalty reveals various uses of the notion of human dignity. In 1972, in Furman v. Georgia, the United States Supreme Court declared all existing death penalty statutes at the time unconstitutional as a violation of the Eighth Amendment prohibiting "cruel and unusual punishment". There was no majority opinion, and each of the five majority members wrote a separate opinion. While three of them based their decision on the arbitrary and discriminatory application of the death penalty in the U.S., Justices Brennan and Marshall based their opinions on the per-se unconstitutionality of capital punishment. Justice Brennan argued that although human dignity is not explicitly guaranteed by the United States Constitution, it is the fundamental concept underlying the Eighth Amendment. In his opinion: "The State, even as it punishes, must treat its members with respect for their intrinsic worth as human beings. A punishment is "cruel and unusual, therefore, "if it does not comport with human dignity". He declared that the severity of capital punishment is degrading to the dignity of a man, and since even the vilest criminals share an inherent dignity, the punishment is unconstitutional. Though in Brennan words human dignity functions as a justification for the Eight Amendment, they seem to illustrate the psychological......

Words: 2734 - Pages: 11

Premium Essay

Businesesea a S Ddf Sdf Dsf a Df S

...Supreme Court of the United States David Leon RILEY, Petitioner v. CALIFORNIA. United States, Petitioner v. Brima Wurie. Nos. 13–132, 13–212. Argued April 29, 2014. Decided June 25, 2014. Background: In two cases consolidated for appeal, first defendant was convicted by a jury in the Superior Court, San Diego County, Laura W. Halgren, J., of various crimes related to drive-by shooting, and he appealed based on his challenge to evidence found during police officers' warrantless search of data stored on his cell phone. The California Court of Appeal, 2013 WL 475242,[->0] affirmed. Second defendant was charged with drug- and weapon-related crimes, and the United States District Court for the District of Massachusetts, Stearns, J., 612 F.Supp.2d 104,[->1] denied his motion to suppress evidence found during warrantless search of data stored on his cell phone, and defendant appealed. The United States Court of Appeals for the First Circuit, Stahl, Circuit Judge, 728 F.3d 1,[->2] reversed. Certiorari was granted. Holdings: The Supreme Court, Chief Justice Roberts[->3], held that: (1) interest in protecting officers' safety did not justify dispensing with warrant requirement for searches of cell phone data, and (2) interest in preventing destruction of evidence did not justify dispensing with warrant requirement for searches of cell phone data. Judgment of California Court of Appeal reversed and remanded, and judgment of First Circuit affirmed. Justice......

Words: 24946 - Pages: 100

Premium Essay

English Profeciency

...English Language Proficiency Assessment in the Nation: CURRENT STATUS AND FUTURE PRACTICE Edited by Jamal Abedi U N I V E R S I T Y O F C A L I F O R N I A , D AV I S • S C H O O L O F E D U C A T I O N Copyright © 2007 The Regents of the University of California The work reported herein was supported in part by the National Research and Development Centers, PR/Award Number R305A050004, as administered by the U.S. Department of Education’s Institute of Education Sciences (IES). The findings and opinions expressed in this report are those of the author(s) and do not necessarily reflect the positions or policies of the Institute of Education Sciences, or the U.S. Department of Education. T his study required the participation of all fifty states, their assessment directors, particularly those involved with the NCLB Title III assessments. Their cooperation and patience is much appreciated, and their dedication to educating young people is greatly admired. We cannot thank the states enough for their collaboration with this project. Many people generously contributed to the development of this report. We are especially indebted to the chapter authors for their invaluable contributions and for their patience throughout this process. Sue Rigney from the U.S. Department of Education contributed greatly to the quality of this work by providing excellent comments and suggestions. We are so grateful for her support, advice and contribution to this report. Kathleen Leos of the U.S...

Words: 115272 - Pages: 462

Free Essay

Story of Success

...thrive, we s h o u l d s p e n d m o r e time l o o k i n g around them — at s u c h things as their family, their birthplace, or even their birth d a t e . T h e story o f s u c c e s s is m o r e c o m p l e x — a n d a lot m o r e interesting — than it initially a p p e a r s . Outliers e x p l a i n s w h a t the B e a t l e s a n d Bill G a t e s have in c o m m o n , the e x t r a o r d i n a r y s u c c e s s o f A s i a n s at m a t h , the h i d d e n a d v a n t a g e s o f star athletes, why all t o p N e w York lawyers have the s a m e r é s u m é , a n d the r e a s o n y o u ' v e never h e a r d o f the w o r l d ' s s m a r t e s t m a n — all in terms o f g e n ­ eration, family, c u l t u r e , a n d c l a s s . It matters w h a t year y o u were b o r n if y o u want to b e a S i l i c o n Valley billionaire, G l a d w e l l a r g u e s , a n d it matters w h e r e y o u w e r e b o r n if y o u want to b e a s u c ­ cessful p i l o t . T h e lives o f outliers — those p e o p l e w h o s e a c h i e v e m e n t s fall o u t s i d e n o r m a l e x p e r i ­ e n c e — follow a p e c u l i a r a n d u n e x p e c t e d l o g i c , a n d in m a k i n g that l o g i c p l a i n G l a d w e l l p r e s e n t s a fascinating a n d provocative b l u e p r i n t for m a k i n g the m o s t o f h u m a n potential. (continued on back flap) In The Tipping Point M a l c o l m G l a d w e l l c h a n g e d the w a y we u n d e r s t a n d the w o r l d . In......

Words: 86962 - Pages: 348

Premium Essay

Microsoft Antitrust

...The Microsoft Antitrust Case* by Nicholas Economides** Revised April 2, 2001 Abstract This paper analyzes the law and economics of United States v. Microsoft, a landmark case of antitrust intervention in network industries. The United States Department of Justice and 19 States sued Microsoft alleging (i) that it monopolized the market for operating systems of personal computers and took anti-competitive actions to illegally maintain its monopoly; (ii) that it attempted to monopolize the market for Internet browsers because such browsers would create competition for operating systems; (iii) that it bundled its browser (Internet Explorer) with Windows; and that it engaged in a number of other anti-competitive exclusionary arrangements with computer manufacturers, Internet service providers, and content providers attempting to thwart the distribution of Netscape’s browser. The District Court Judge found in most points for the plaintiffs and ordered the breakup of Microsoft into two companies, one with all the operating systems software, and one with all other products of the company. The District Court also imposed a number of severe restrictions on the business conduct of Microsoft. We analyze the economic issues related to liability. We also analyze the applicability and effectiveness of the remedies imposed by the District Court and contrast them with other potential remedies. * Forthcoming in Journal of Industry, Competition and Trade: From Theory to Policy (August 2001)...

Words: 17051 - Pages: 69

Premium Essay

Cognitive, Conscious, Energetic and Behavioral Impact of Violent Video Gaming Experiences

...involving vulgar antics, including “bathroom” humor Drug Reference - Reference to and/or images of illegal drugs Fantasy Violence - Violent actions of a fantasy nature, involving human or non-human characters in situations easily distinguishable from real life Intense Violence - Graphic and realistic-looking depictions of physical conflict. May involve extreme and/or realistic blood, gore, weapons and depictions of human injury and death Language - Mild to moderate use of profanity Lyrics - Mild references to profanity, sexuality, violence, alcohol or drug use in music Mature Humor - Depictions or dialogue involving "adult" humor, including sexual references Nudity - Graphic or prolonged depictions of nudity Partial Nudity - Brief and/or mild depictions of nudity Real Gambling - Player can gamble, including betting or wagering real cash or currency Sexual Content - Non-explicit depictions of sexual behavior, possibly including partial nudity Sexual Themes - References to sex or sexuality Sexual Violence - Depictions of rape or other violent sexual acts Simulated Gambling - Player can gamble without betting or wagering real cash or currency Strong Language - Explicit and/or frequent use of profanity Strong Lyrics - Explicit and/or frequent references to profanity, sex, violence, alcohol or drug use in music Strong Sexual Content - Explicit and/or frequent depictions of sexual behavior, possibly including nudity Suggestive Themes - Mild......

Words: 3779 - Pages: 16

Premium Essay


...literature in construction engineering and management as well as two of the leading academic journals in the discipline, particularly a bibliometric study of the contents of the ASCE Journal of Management in Engineering (JME), as a case study of the CEM refereed journals. The JME’s contents were investigated from its onset in 1985 until 2002. The results of the analysis show that 70% of the published papers focused on four main subjects: management and organization of the firm, project management, industry structure and environment, and management of personnel. Considerable changes occurred within the subjects with the emergence of new topics and the decline of others over the eighteen years of publication. The study also analyzed the use of keywords, research methods, and identified authors, and the concentration of knowledge. The JME is mainly concerned with the managerial aspects of engineering, while ASCE Journal of Construction Engineering and Management (JCEM) focuses more on construction and technical issues. Additional studies of the JCEM’s contents should be conducted for a complete mapping of the discipline in the USA. ii Acknowledgements “All praise is due to Allah, the Lord of the Worlds. The Beneficent, the Merciful.” (Qur’an Ch1, v 2-3) I would like to express my gratitude and appreciation to Professor Roberto Pietroforte, my major advisor and great mentor for providing me with the advice and guidance to steer this study in the correct direction. I......

Words: 24458 - Pages: 98

Free Essay


... To my beloved grandchildren Jamil Allette-Jackson Lourdes Bronté Jackson Quinn Sterling Julius Jackson who constantly inspire me to excel in all my endeavors —Acy L. Jackson To my parents Jean and Roger Tucker whose love and support sustain me in everything that I do —C. Kathleen Geckeis This page intentionally left blank. For more information about this title, click here. Contents Acknowledgments 1 2 3 4 5 6 7 vii Getting Started 1 Identifying Competencies and Skills Preparing Your Curriculum Vitae 5 19 Correspondence for the Application Process and the Job Search 63 Sample Curricula Vitae 85 The Electronic Curriculum Vitae International Curricula Vitae 147 159 v Copyright 2003 by The McGraw-Hill Companies, Inc. Click Here for Terms of Use. vi Contents A Final Word 167 Appendix A: Action Verbs 169 Appendix B: Selected United States and Canadian Professional, Learned, and Scientific Societies 171 Appendix C: Suggested Reading 180 Acknowledgments We wish to express our deepest appreciation to our esteemed colleagues and friends, who advised and encouraged us as we prepared this edition of How to Prepare Your Curriculum Vitae. With gratitude, we thank Gerry Bazer, Dean of Arts and Sciences at Owens Community College, Toledo, Ohio, for his support and encouragement throughout this project. We are also appreciative of Deborah Wingert, Research Librarian at Terra......

Words: 31831 - Pages: 128

Premium Essay

Maritime Power of Chaina

...Historically, the tribute system of the Middle Kingdom is not only rooted in the politico-economic power structure, but also founded on the cultural influence of Confucianism. For the multi-state structure of ancient China, the tribute system can be seen as a system of thought and institutions regulating Imperial China’s international The ‘internal efforts’ means to increase economic capability, to increase military strength, to develop clever strategies, and the ‘external efforts’ means to strength and enlarge one’s own alliance or weaken and shrink an opposing one. Refer to Waltz, Theory of International Relations, pp. 118-19. 42 Ibid., p. 121. 43 John Wilson Lewis and Xue Litai, Imaged Enemies: China Prepare For Uncertain War (Stanford: Stanford University Press, 2006), p. 24-25. 41 23 relations, which emerged in the heartland of the Chinese civilisation and never expanded beyond the realm—tian xia under Confucianism.44 Even though Imperial China was to become the history of modern China, the memory of Confucianism is still affecting Beijing’s worldview and its own theory of international relations. For instance, from Deng Xiaoping’s discourse of ‘Peace and Development are the Two Outstanding Issues in the World Today,’ 45 Jiang Zemin’s claim of ‘Mutual Trust, Mutual Benefit, Equality and Coordination among Nations’46 and Hu Jintao’s idea of a ‘Harmonious World,’47 the conclusion can be drawn that their thoughts are rooted in the Confucian concept of cosmic......

Words: 115996 - Pages: 464

Premium Essay

Role of Information Technology and has evolved its own questions (Aspray, 1994). The history of information science (Hahn & Buckland, 1998) has been written almost entirely within the information science discipline. Likewise library history (Wigland & Davis, 1994), media history, and history of the book are all well developed fields written in different academic niches and progressing in almost complete isolation from the history of computer technology. Fortunately the difficulties and rewards of “information history” as a category to bridge some of these divides have already been considered expertly in a recent ARIST chapter (Black, 2006), as has the rapidly developing literature on the history of information science (Burke, 2007). These helpfully constrain my brief to the history of information technology. But even this is a problematic and potentially sprawling category. Treating information technology and computing as interchangeable concepts generally makes me a little uneasy, so let me explain my decision to do so here. Looking at its two constituent words would suggest that “information technology” should include everything from ancient clay tablets through scrolls and books to communication systems of all kinds, newspapers, street signs, libraries, encyclopedias, and any artifact used for educational purposes. And indeed one sometimes sees such expansive definitions in textbooks of library and information science. I pass no judgment on the inherent merit of such a definition in observing......

Words: 27274 - Pages: 110

Premium Essay

Is3920 Lab 9

...for many years, it is viewed now primarily as a product of the information age. A particular crime of identity theft may include one or all of these stages: Stage 1: Acquisition of the identity through theft, computer hacking, fraud, trickery, force, re-directing or intercepting mail, or even by legal means (e.g., purchase information on the Internet). Stage 2: Use of the identity for financial gain (the most common motivation) or to avoid arrest or otherwise hide one’s identity from law enforcement or other authorities (such as bill collectors). Crimes in this stage may include account takeover, opening of new accounts, extensive use of debit or credit cards, sale of the identity information on the street or CRS-2 3 Ibid., p. v. 4 Ibid., p. 14. 5 Francois Paget. Identity Theft, McAfee Avert Labs, January 2007, at []. This report discusses recent high-profile examples of identity theft and how several countries define this type of fraud and its scope; examines both the criminals and their techniques to better understand how identity theft has evolved in recent years; and focuses on the victims and consequences of identity theft. 6 Ibid., p. 3. black market, acquisition (“breeding”) of additional identity related documents such as driver’s licenses, passports, visas, health cards, etc.), filing tax returns for large refunds, insurance fraud, stealing rental cars, and many more. Stage...

Words: 18803 - Pages: 76

Free Essay

Made to Stick

...effective and best-loved professors in the country: the calculus teacher who was also a stand-up comic; the biology teacher who was named national Teacher of the Year; the economics teacher who was also a chaplain and a playwright. Essentially, Dan enjoyed a crash course in what makes great teachers great. And he found that, while INTRODUCTION 11 each teacher had a unique style, collectively their instructional methodologies were almost identical. Chip, as a professor at Stanford University, had spent about ten years asking why bad ideas sometimes won out in the social marketplace of ideas. How could a false idea displace a true one? And what made some ideas more viral than others? As an entry point into these topics, he dove into the realm of “naturally sticky” ideas such as urban legends and conspiracy theories. Over the years, he’s become uncomfortably familiar with some of the most repulsive and absurd tales in the annals of ideas. He’s heard them all. Here’s a very small sampler: • The Kentucky Fried Rat. Really, any tale that involves rats and fast food is on fertile ground. • Coca-Cola rots your bones. This fear is big in Japan, but so far the country hasn’t experienced an epidemic of gelatinous teenagers. • If you flash your brights at a car whose headlights are off, you will be shot by a gang member. • The Great Wall of China is the only man-made object that is visible from space. (The Wall is really long but not very wide. Think about it: If the Wall were......

Words: 91454 - Pages: 366

Free Essay


...C O D E C ODE v e r s i o n 2 . 0 L A W R E N C E L E S S I G A Member of the Perseus Books Group New York Copyright © 2006 by Lawrence Lessig CC Attribution-ShareAlike Published by Basic Books A Member of the Perseus Books Group Printed in the United States of America. For information, address Basic Books, 387 Park Avenue South, New York, NY 10016–8810. Books published by Basic Books are available at special discounts for bulk purchases in the United States by corporations, institutions, and other organizations. For more information, please contact the Special Markets Department at the Perseus Books Group, 11 Cambridge Center, Cambridge MA 02142, or call (617) 252-5298, (800) 255-1514 or e-mail CIP catalog record for this book is available from the Library of Congress. ISBN-10: 0–465–03914–6 ISBN-13: 978–0–465–03914–2 06 07 08 09 / 10 9 8 7 6 5 4 3 2 1 Code version 1.0 FOR CHARLIE NESSON, WHOSE EVERY IDEA SEEMS CRAZY FOR ABOUT A YEAR. Code version 2.0 TO WIKIPEDIA, THE ONE SURPRISE THAT TEACHES MORE THAN EVERYTHING HERE. C O N T E N T S Preface to the Second Edition Preface to the First Edition Chapter 1. Code Is Law Chapter 2. Four Puzzles from Cyberspace PART I: “REGULABILITY” ix xiii 1 9 Chapter 3. Is-Ism: Is the Way It Is the Way It Must Be? Chapter 4. Architectures of Control Chapter 5. Regulating Code PART II: REGULATION BY CODE 31 38 61 Chapter 6. Cyberspaces Chapter 7. What Things......

Words: 190498 - Pages: 762