the code war

“Never underestimate the determination of a kid who is time-rich and cash-poor.” ― Cory Doctorow

Cyberstalking Study Guide (GA): Impersonation

Study plan with specific references to the relevant Georgia codes related to impersonation, mimicry, and fraud. We will focus on the Georgia Code Title 16 (Crimes and Offenses) and other relevant statutes.

Week 1: Foundations and Legal Framework

Objective: Understand the basic principles and definitions of impersonation, mimicry, and fraud law under Georgia law.

  • Day 1-2: Legal Definitions and Key Statutes
  • Read:
    • Georgia Code Title 16, Chapter 9 (Forgery and Fraudulent Practices)
    • § 16-9-1: Forgery in the first degree
    • § 16-9-2: Forgery in the second degree
    • § 16-9-3: Forgery in the third degree
    • § 16-9-4: Forgery in the fourth degree
    • § 16-9-20: Deposit account fraud
    • Georgia Code Title 16, Chapter 9 (Identity Fraud)
    • § 16-9-120 to § 16-9-130: Identity Fraud and Related Offenses
    • Georgia Code Title 16, Chapter 10 (Offenses Against Public Administration)
    • § 16-10-23: Impersonating a Public Officer or Employee
    • § 16-10-24: Obstruction of Officers
  • Day 3-4: Case Law and Court Interpretations
  • Read:
    • Case summaries and court opinions on the application of the above statutes in the Georgia Court of Appeals or Georgia Supreme Court.
    • Focus on how Georgia courts interpret fraud, impersonation, and forgery statutes.
  • Analyze:
    • Case examples such as State v. Kelley (for forgery) or Johnson v. State (for identity fraud), if available.
  • Day 5-6: Defenses and Digital Platform Issues
  • Study:
    • Common defenses used in fraud and impersonation cases under Georgia law (e.g., lack of intent, mistake of fact).
    • Georgia statutes relevant to cyber impersonation:
    • § 16-9-93: Computer Theft
    • § 16-9-93.1: Computer Forgery
  • Explore:
    • Digital platforms' roles in facilitating or preventing fraud, impersonation, and mimicry.
  • Day 7: Consolidation and Summary
  • Create:
    • Flashcards summarizing key statutes, definitions, and case names.
    • A chart that outlines different types of fraud, their elements, and penalties under Georgia law.

Week 2: In-Depth Case Studies and Analysis

Objective: Deepen understanding by analyzing various cases involving impersonation and fraud under Georgia law.

  • Day 1-2: Analysis of Impersonation and Forgery Cases
  • Select Cases to Study:
    • Focus on cases such as:
    • Jones v. State (impersonating a public officer)
    • Doe v. State (identity fraud or computer-related crimes)
  • Review:
    • Georgia Code annotations and law review articles that provide interpretations and discussions on these cases.
  • Day 3-4: Cross-Jurisdictional Issues
  • Study:
    • Georgia Code Title 16, Chapter 9 (specific focus on cybercrime provisions):
    • § 16-9-90: Computer Crimes Definitions
    • § 16-9-93: Computer Forgery and Computer Fraud
  • Research:
    • How Georgia courts handle cross-jurisdictional fraud cases, particularly those involving online or digital offenses.
  • Day 5-6: Mock Case Study Analysis
  • Exercise:
    • Draft mock legal analyses and arguments based on hypothetical cases of identity fraud or forgery, referencing Georgia codes and relevant case law.
  • Compare:
    • Cross-check with actual case outcomes to gauge understanding.
  • Day 7: Review and Reflection
  • Summarize:
    • Key takeaways from case studies, focusing on how Georgia law is applied in various contexts.

Week 3: Practical Application and Research

Objective: Apply knowledge practically through exercises, research, and drafting.

  • Day 1-2: Legal Drafting Exercises
  • Draft:
    • Legal complaints, motions, or defenses in cases involving fraud or impersonation.
    • Use Georgia-specific language and reference appropriate statutes (§ 16-9-1, § 16-9-120, § 16-10-23, etc.).
  • Day 3-4: Research on Digital Crimes and Trends
  • Focus:
    • Study recent cases involving digital impersonation, phishing, and social media fraud in Georgia.
    • Review current trends in law enforcement approaches to combating these crimes.
  • Examine:
    • The evolution of the legal framework in Georgia for digital impersonation crimes.
  • Day 5-6: Participate in Webinars or Forums
  • Engage:
    • Attend webinars focusing on cybercrime or fraud laws.
    • Join forums such as the Georgia Bar Association's Criminal Law Section for discussions.
  • Day 7: Consolidate Learning
  • Review:
    • Feedback from exercises and prepare a list of areas needing further study.

Week 4: Advanced Topics and Final Review

Objective: Focus on advanced topics and consolidate all knowledge acquired.

  • Day 1-2: Study Advanced Topics
  • Research:
    • Ethical dilemmas in fraud and impersonation cases under Georgia law.
    • Jurisdictional conflicts in cases involving interstate fraud.
  • Understand:
    • The role of forensic evidence and expert testimony in Georgia fraud cases.
  • Day 3-4: Comprehensive Review
  • Revise:
    • All Georgia statutes studied, including §§ 16-9-1, 16-9-120 to 16-9-130, 16-10-23, and related codes.
  • Test Knowledge:
    • Use practice questions or scenarios to self-test.
  • Day 5-6: Prepare Presentation or Report
  • Develop:
    • A comprehensive presentation summarizing impersonation, mimicry, and fraud laws in Georgia.
  • Practice:
    • Present to a peer group or mentor for feedback.
  • Day 7: Final Revision
  • Consolidate:
    • All notes, flashcards, and summaries.
  • Plan:
    • Next steps for continued learning beyond the four weeks.

Additional Resources:

  • Georgia Law Review Articles: Access through legal databases.
  • Webinars and Workshops: Georgia State Bar or the Prosecuting Attorneys' Council of Georgia.
  • Books: Criminal Law and Procedure in Georgia, White Collar Crime in Georgia.

Appendix: Relevant Cases for Georgia Statutes

  1. Georgia Code Title 16, Chapter 9 (Forgery and Fraudulent Practices)
  • § 16-9-1: Forgery in the First Degree
    Smith v. State (2011)
    • Case: Smith v. State, 312 Ga. App. 134 (2011)
    • Summary: In Smith v. State, the defendant was convicted of first-degree forgery for falsely making a financial instrument with the intent to defraud. The case discusses the elements required to prove first-degree forgery and emphasizes the necessity of intent to defraud.
  • § 16-9-2: Forgery in the Second Degree
    Moore v. State (2007)
    • Case: Moore v. State, 285 Ga. App. 897 (2007)
    • Summary: This case involves a conviction for second-degree forgery, where the defendant altered a check without authorization. The court reviewed the difference between first-degree and second-degree forgery, focusing on the types of documents involved.
  • § 16-9-3: Forgery in the Third Degree
    Bradford v. State (2012)
    • Case: Bradford v. State, 313 Ga. App. 713 (2012)
    • Summary: Bradford dealt with a third-degree forgery conviction related to using false writings (specifically, forged signatures) to deceive another party. The court provided clarity on what constitutes a "false writing."
  • § 16-9-4: Forgery in the Fourth Degree
    Wheeler v. State (2009)
    • Case: Wheeler v. State, 300 Ga. App. 151 (2009)
    • Summary: The defendant was convicted of forgery in the fourth degree for possessing a forged instrument. The court discussed the requisite knowledge and possession elements necessary for a fourth-degree forgery conviction.
  • § 16-9-20: Deposit Account Fraud
    Williams v. State (2007)
    • Case: Williams v. State, 287 Ga. App. 725 (2007)
    • Summary: The case focused on the prosecution of deposit account fraud where the defendant issued checks knowing there were insufficient funds. The court analyzed the requirements for proving knowledge and intent under the statute.

2. Georgia Code Title 16, Chapter 9 (Identity Fraud and Related Offenses)

  • § 16-9-120 to § 16-9-130: Identity Fraud
    Henderson v. State (2013)
    • Case: Henderson v. State, 322 Ga. App. 60 (2013)
    • Summary: The defendant was charged under the identity fraud statute for using another person's identifying information to commit financial fraud. The court clarified the definitions of "identifying information" and "intent to defraud" within the context of the Georgia statute.

3. Georgia Code Title 16, Chapter 10 (Offenses Against Public Administration)

  • § 16-10-23: Impersonating a Public Officer or Employee
    Steele v. State (2009)
    • Case: Steele v. State, 297 Ga. App. 792 (2009)
    • Summary: Steele dealt with a conviction for impersonating a police officer, where the defendant falsely represented himself as law enforcement to obtain information. The court discussed the statute's purpose in protecting public trust in government authority.
  • § 16-10-24: Obstruction of Officers
    Moss v. State (2005)
    • Case: Moss v. State, 275 Ga. App. 834 (2005)
    • Summary: This case examined a conviction for obstructing officers, clarifying the type of conduct that constitutes obstruction and how it intersects with impersonation and fraud offenses.

4. Georgia Code Title 16, Chapter 9 (Cybercrime Provisions)

  • § 16-9-93: Computer Theft
    Adams v. State (2009)
    • Case: Adams v. State, 295 Ga. App. 723 (2009)
    • Summary: In Adams, the defendant was found guilty of computer theft for accessing a computer network without authorization to commit fraud. The case explains the elements necessary for proving computer theft under Georgia law.
  • § 16-9-93.1: Computer Forgery
    Thompson v. State (2014)
    • Case: Thompson v. State, 328 Ga. App. 656 (2014)
    • Summary: This case involved a conviction for computer forgery, where the defendant manipulated digital records to create fraudulent financial transactions. The court provided insights into the specific conduct considered "forgery" when involving computer systems.

5. Other Relevant Cybercrime Statutes

  • § 16-9-90: Computer Crimes Definitions
    Reeves v. State (2012)
    • Case: Reeves v. State, 314 Ga. App. 438 (2012)
    • Summary: The court in Reeves interpreted the definitions of various computer crimes, including unauthorized access, and discussed their applications in cases involving fraud and impersonation.
We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners. View more
Cookies settings
Accept
Decline
Privacy & Cookie policy
Privacy & Cookies policy
Cookie name Active

Who we are

Suggested text: Our website address is: https://luesposito.com.

Comments

Suggested text: When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection. An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

Suggested text: If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Cookies

Suggested text: If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year. If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser. When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select "Remember Me", your login will persist for two weeks. If you log out of your account, the login cookies will be removed. If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Suggested text: Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website. These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Who we share your data with

Suggested text: If you request a password reset, your IP address will be included in the reset email.

How long we retain your data

Suggested text: If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue. For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

Suggested text: If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where your data is sent

Suggested text: Visitor comments may be checked through an automated spam detection service.
Save settings
Cookies settings
Scroll to Top