The PEOPLE of the State of Colorado, Petitioner, IN the INTEREST OF Respondent: R.D.
Case No. 17SC116
Supreme Court of Colorado
June 1, 2020
464 P.3d 717
Attorneys for Respondent: Megan A. Ring, Public Defender, James S. Hardy, Deputy Public Defender, Denver, Colorado
En Banc
JUSTICE MÁRQUEZ delivered the Opinion of the Court.
¶1 The
¶2 R.D., a juvenile, was adjudicated delinquent for harassment by communication under
¶3 In light of U.S. Supreme Court case law, we refine our earlier statements of the framework for distinguishing a true threat from constitutionally protected speech. In addition, we take the opportunity to provide guidance for applying that test to statements communicated online.
¶4 We hold that a true threat is a statement that, considered in context and under the totality of the circumstances, an intended or foreseeable recipient would reasonably perceive as a serious expression of intent to commit an act of unlawful violence.1 In determining whether a statement is a true threat, a reviewing court must examine the words used, but it must also consider the context in which the statement was made. Particularly where the alleged threat is communicated online, the contextual factors courts should consider include, but are not limited to (1) the statement‘s role in a broader exchange, if any, including surrounding events; (2) the medium or platform through which the statement was communicated, including any distinctive conventions or architectural
¶5 Because neither the juvenile court nor the court of appeals had the benefit of the framework we adopt today, we reverse the judgment of the court of appeals and remand with instructions to return the case to the juvenile court to reconsider the adjudication applying this refined test.
I. Facts and Procedural History
¶6 In December 2013, a shooting took place at Arapahoe High School that took the life of a female student and the male student shooter. A few days later, a student from Thomas Jefferson High School (“TJ“), a school in a neighboring district, posted on Twitter2 a photo of a banner convеying TJ‘s support for Arapahoe. A student from Littleton High School, which is in the same school district as Arapahoe, tweeted3 in response that kids from TJ did not care about the shooting because it happened outside their district. A.C., another TJ student and a friend of the original poster, soon got involved because he believed the Littleton student was disrespecting his friend. J.W., A.C.‘s friend and fellow TJ student, also got involved, and the group conversation eventually took on a “TJ versus Littleton” character. The Littleton student “mentioned”4 the handles, or usernames, of R.D. and another friend from his school, bringing them into the exchange.
¶7 As we discuss further below, the record provides an incomplete picture of the students’ back-and-forth. But it does reveal that R.D. posted the following messages:
• @[A.C.]5 you a bitch, ill come to Tgay and kill you nigga.6
• @[A.C.] I don‘t people who aren‘t worth my time. If I see your bitch ass outside of school you catching a bullet bitch.
• @[A.C.] nigga you don‘t even know me. Mf I don‘t even know were tf your lame bitch ass school is. You a bitch talking shit on here
• @[A.C.] all you fuck niggas will get your ass beat real shit.
• You fuck with the wrong person leave you ass in a body bag.
• @[J.W.] @[A.C.] don‘t give af bruh. Don‘t even knоw you niggas and you talking shit.
• @[A.C.] you think this shit a game, I‘m not playing. I don‘t fight fuck boys and I don‘t twitter beef.
R.D. also posted a photograph of a handgun resting beside approximately fifty cartridges, along with the message, “@[A.C.] this all I‘m saying[.] We don‘t want another incident like Arapahoe. My 9 never on vacation.”
¶8 After this, the record reveals that R.D. and A.C. tweeted as follows:7
• A.C.: @[R.D.] you ain‘t never shot no one so sit down and get off google images bruh
• R.D.: @[J.W.] @[A.C.] idgaf my @ name should have not been in this shit. You fucked with the wrong one.
• R.D.: @[A.C.] I don‘t even know where tf your school at. I‘m not even from Colorado. Trust me I‘m not afraid to shoot.
• R.D.: @[A.C.] fuck you and your gay ass school. Don‘t worry nigga, I‘ll see you little hoes tomorrow.
• A.C.: @[R.D.] shoot then pussy.
• A.C.: @[R.D.] you are all talk so go the fuck to bed come up to TJ and get slept.8 Fuck boy.
• R.D.: @[A.C.] haha alright hoe, we‘ll see whose a bitch tomorrow.
• R.D.: @[A.C.] I‘m not about to fight you broke bitch. Let me catch you away from school you is a dead man. Goodnight hoe.
• A.C.: @[R.D.] 3950 S. Holly street. I‘ll see u tomorrow fuck boy
¶9 Based on these tweets, the People filed a petition in delinquency charging R.D. with harassment under
(1) A person commits harassment if, with intent to harass, annoy, or alarm another person, he or she ...
(e) [i]nitiates communication with a person, anonymously or otherwise, by ... text message, instant message, computer, computer network, or computer system in a manner intended to ... threaten bodily injury ....
¶10 At a hearing on the motion, the prosecutor argued that under Virginia v. Black, 538 U.S. 343 (2003), and Watts v. United States, 394 U.S. 705 (1969) (per curiam), the government may constitutionally regulate speech that constitutes a “true threat.” Speech constitutes a true threat, she contended, “when an individual is intending to threaten bodily harm.”
¶11 In arguing that R.D.‘s tweets fell into this category of unprotected speech, the prosecutor emphasized “the social context” of the statements, noting they were sent four days after the Arapahoe High School shooting. She stated that police officers contacted the students who had read the tweets, all of whom said they were afraid. She further observed that such fear made sense given that a student had so recently been shot. Finаlly, she posited that true threats such as R.D.‘s need to be regulated to “protect people‘s feeling of safety.”
¶12 The trial court denied R.D.‘s motion to dismiss. In a bench ruling, the court concluded that R.D.‘s “particular type of speech is not protected under the
A. Trial
¶13 At trial, A.C.‘s and J.W.‘s testimony revealed that the screenshots and printouts submitted in evidence of R.D.‘s tweets painted an incomplete picture of the conversation as it occurred on Twitter. The prosecution‘s
¶14 Aside from explaining to the adults in the room how Twitter works, A.C. and J.W. testified to their reactions to the exchange. A.C. testified that he construed R.D.‘s tweets directed at him as threats; that he did not think R.D. was kidding; and that he understood R.D.‘s post containing the picture of a handgun to convey a threat to his life. Yet on cross-examination, A.C. acknowledged that he responded to that post by tweeting that R.D. should “get off google images” because he thought the picture of the handgun was one R.D. had merely downloaded from the internet. He also admitted that he tweeted the address of his school.
¶15 J.W.‘s testimony was similarly inconsistent. When asked on direct about R.D.‘s “threat to kill,” J.W. testified that he did not take it “as a joke” but that he also did not “take it serious.” He said the message was “a little intimidating.” He also testified that students on “both sides” were throwing around insults and talking about physically fighting and that he “didn‘t really take anything as being very serious.”
¶16 In a bench ruling, the juvenile court adjudicated R.D. delinquent. The court acknowledged that the early part of the Twitter exchange did not establish an intent to alarm under the harassment statute “because [the students] were both engaging in that type of conversation.” The court analogized this early portion of the exchange to a schoolyard fight where everyone is trying to prove they are “bigger[,] better[,] and meaner” than their peers.
¶17 But the conversation crossed the line, the court found, when R.D. posted the picture of the handgun. Referring again to the schoolyard brawl analogy, the court likened that moment to R.D. lifting his shirt to show that he was armed. The court reasoned that a brawl and its attendant displays of bravado usually cause “no harm, no foul” if broken up. But when someone in such a face-to-face interaction says they have a gun, the dynamic becomes menacing. The court found that R.D.‘s message was similar to such a display, although it acknowledged that the tweet was “different” because the students were not face-to-face.
¶18 Turning to the statute, the court found beyond a reasonable doubt that R.D. “initiate[d] communication” over a computer network or computer system. It then considered whether R.D. “inten[ded] to threaten” anyone. The court observed that J.W. and A.C. testified that they didn‘t want to joke about guns, but that they didn‘t take R.D.‘s messages seriously, and pointed out that A.C. told R.D. to “get off google images” and volunteered to him his school‘s address. But the court concluded that the boys’ subjective reactions were irrelevant because the statute does not require that the recipient actually feel threatened or that actual bodily injury occur.
¶19 Relying specifically on R.D.‘s post of the picture of the handgun, the court concluded beyond a reasonable doubt that R.D. “initiate[d] communication with a person by computer network, data network, or computer system in a manner intended ... to threaten bodily injury or property damage to [A.C.] and [J.W.], in violation of [section]
¶20 The court sentenced R.D. to write an essay demonstrating that he understood the challenges of online communication. R.D. submitted the essay to the court‘s satisfaction.
B. Appeal
¶21 R.D. appealed, arguing, as relevant here, that his adjudication should be vacated because application of
¶22 The court of appeals agreed with R.D. and reversed and remanded with directions to vacate the adjudication and dismiss the proceeding. People in Interest of R.D., 2016 COA 186, ¶¶ 1, 6, 468 P.3d 9.
¶23 The court began by acknowledging that the government may regulate certain unprotected categories of speech, such as true threats. Id. at ¶ 9. The court defined a “threat” as a “statement of purpose or intent to cause injury or harm to the person, property, or rights of another, by committing an unlawful act.” Id. at ¶ 10 (citing People v. McIntier, 134 P.3d 467, 472 (Colo. App. 2005)). But a “true threat” for purposes of the
¶24 To determine whether R.D.‘s statements constituted true threats, the court of appeals considered both the plain import of the words used and the context in which the statements were made, including (1) to whom the statements were communicated; (2) the manner in which the statements were communicated; and (3) the subjective reactions of those whom the statements concerned. Id. (citing People v. Stanley, 170 P.3d 782, 790 (Colo. App. 2007), and Watts, 394 U.S. at 708).
¶25 Applying that framework, the court concluded that R.D.‘s tweets were not true threats because they did not constitute “a serious expression of an intent to commit an act of unlawful violence to a particular individual or group of individuals.” Id. at ¶ 11 (quoting Black, 538 U.S. at 359). The court reasoned that although the language of R.D.‘s tweets was violent and explicit, the context in which the statements were made mitigated their tone in three ways. Id.
¶26 First, the court observed that R.D.‘s tweets made clear that he did not know A.C. personally and did not know where A.C.‘s school was located. Id. at ¶ 12. In addition, R.D. never referred to A.C. by name, instead addressing him only by his Twitter handle. Id.
¶27 Second, the court observed that while R.D. used “@” to direct many of his tweets to A.C., he did not send those messages privately to A.C. alone; instead, they were in public view on R.D.‘s profile page. Id. at ¶ 13.
¶28 Finally, the court observed that A.C.‘s reactions to R.D.‘s tweets showed that “he did not view the statements as true threats when they were received.” Id. at ¶ 15. In particular, the court found significant that when R.D. indicated he did not know where TJ was located, A.C. volunteered the address and tweeted, “I‘ll see you tomorrow fuck boy“; “you are all talk so go the fuck to bed come up to TJ and get slept“; and “shoot then pussy.” Id. at ¶ 14. The court also took note of A.C.‘s response to the photo of the handgun: “you ain‘t never shot no one so sit down and get off google images bruh.” Id. The court gleaned from these tweets that A.C. did not appear threatened and did not take precautionary measures to protect himself from R.D. Id.
¶29 Based on these contextual factors, the court concluded that R.D.‘s tweets did not constitute true threats. Id. at ¶ 16. Accordingly, it held that application of
II. Analysis
¶30 The government‘s power to regulate speech is constrained by the
(1) A persоn commits harassment if, with intent to harass, annoy, or alarm another person, he or she ...
(e) [i]nitiates communication with a person, anonymously or otherwise, by ... text message, instant message, computer, computer network, or computer system in a manner intended to ... threaten bodily injury ....
¶31 Because this provision regulates pure speech, we must review the constitutionality of its application to R.D.‘s tweets “with the commands of the
¶32 The narrow question before us is whether R.D.‘s tweets were “true threats.”16
¶33 To begin, we clarify that the protection of free speech does not vary by medium of expression and, accordingly, we set forth background
¶34 Having clarified the test for determining whether R.D.‘s online statements constitute true threats, we reverse the judgment of the court of appeals and remand with instructions to return the case to the juvenile court to reconsider the adjudication applying the framework we adopt today.
A. The True Threats Exception
¶35 “There are certain well-defined and narrowly limited classes of speech, the prevention and punishment of which have never been thought to raise any Constitutional problem.” Chaplinsky v. New Hampshire, 315 U.S. 568, 571–72 (1942). “[T]hese areas of speech can, consistently with the
1.
1. Watts v. United States
¶36 The true threats doctrine originated in 1969 with Watts v. United States. In that case, which arose during the Vietnam War, the eighteen-year-old defendant was convicted under a federal
¶37 The Supreme Court held that the statute under which Watts was convicted was “[c]ertainly ... constitutional on its face,” given the government‘s overwhelming interest in protecting the safety of the President and allowing him to perform his duties without interference from threats of physical violence. Id. But the Court also explained that because the statute “ma[de] criminal a form of pure speech,” it had to be “interpreted with the commands of the
2. Virginia v. Black
¶38 Thirty-four years later, in Virginia v. Black, the Supreme Court reaffirmed that the
¶39 At issue in Black was the constitutionality of a Virginia
3. The Post-Black Debate
¶40 Though Watts and Black made clear that the
¶41 A majority of jurisdictions have interpreted Black’s definition of a true threat—a statement where the speaker “means to communicate a serious expression of an intent to commit an act of unlawful violence“—to require only that the speaker intended to make the statement. Under this reading, “means to” modifies only the word “communicate.” See, e.g., United States v. Clemens, 738 F.3d 1, 10 (1st Cir. 2013) (requiring the speaker to intend to make the communication, but not the threat). Courts adopting this view judge whether a statement constitutes a true threat using an objective standard, asking how a reasonable person would interpret the words.17 Proponents of an objective standard have reasoned that a speaker‘s lack of intent to threaten does nothing to reduce the harms identified in Black that justify the exception of true threats from
¶42 On the other hand, some courts have interpreted Black to require the speaker to have the subjective intent to threaten. Under this reading, “means to” modifies the entire phrase, “communicate a serious expression of an intent to commit an act of unlawful violence.”18 Proponents of a subjective intent requirement have tended to posit that a purely objective listener test would chill protected speech. See Rogers v. United States, 422 U.S. 35, 47–48, 95 S.Ct. 2091, 45 L.Ed.2d 1 (1975) (Marshall, J., concurring) (arguing that “charging the defendant with responsibility for the effect of his statements on his listeners ... would have substantial costs in discouraging the ‘uninhibited, robust, and wide-open’ debate that the
4. Elonis v. United States
¶43 The U.S. Supreme Court seemed positioned to settle this debate in Elonis v. United States, 575 U.S. 723, 135 S. Ct. 2001, 192 L.Ed.2d 1 (2015), where the Court had its first opportunity to apply the true threats doctrine to statements communicated over social media, specifically, posts the petitioner made on Facebook. There, the petitioner was convicted under a federal
¶44 Ultimately, the Court resolved the case on statutory grounds and did not consider any
¶45 A definitive framework for discerning a true threat has been similarly elusive in Colorado, though our appellate courts have tended to embrace some form of an objective test. For example, in People v. Baer, 973 P.2d 1225 (Colo. 1999), this court appeared in passing to endorse a reasonable speaker test, parenthetically describing a true threat as “one which a reasonable person would foresee would be interpretеd by the recipient as a serious threat to inflict death or bodily injury.” Id. at 1231. And in an earlier, widely cited special concurrence in People v. Janousek, 871 P.2d 1189 (Colo. 1994), then-Justice Mullarkey described the “critical inquiry” under true threats jurisprudence as more of a reasonable listener test: “whether those who hear or read the threat reasonably consider that an actual threat has been made.” Id. at 1198 (Mullarkey, J., specially concurring); see also R.D., ¶ 10 (reciting Janousek concurrence formulation); Stanley, 170 P.3d at 787 (same); McIntier, 134 P.3d at 472 (same). More recently, the court of appeals division in Stanley specifically rejected the contention that Black required more than an objective test. See 170 P.3d at 786–89.
B. Distinguishing True Threats from Protected Speech in the Age of Social Media
¶46 This court has not had occasion to revisit the framework for assessing whether a statement is a true threat since the U.S. Supreme Court issued its 2003 decision in Black. And as this case demonstrates, the ways in which technology has transformed our everyday communication complicates the
¶47 First, it is foundational that the ” ‘basic principle[ ] of freedom of speech, ... like the
¶48 Words communicated online and without the interpretive aid of body language are easily misconstrued. Indeed, our reliance on nonverbal cues was implicit in Chaplinsky, where the U.S. Supreme Court first articulated the “fighting words” doctrine. There, the Court recognized that “[t]he English language has a number of words and expressions which by general consent are ‘fighting words’ when said without a disarming smile.” 315 U.S. at 573, 62 S.Ct. 766 (emphasis added) (quoting State v. Chaplinsky, 91 N.H. 310, 18 A.2d 754, 762 (1941)). Modern replacements for such cues, like emojis and gifs, often lack standard meaning and can be difficult to interpret. Complicating things further, emojis may look different depending on the sender‘s or recipient‘s operating system. For one example, an emoji that resembles a toy squirt gun in a message sent on one platform may appear as a revolver on a recipient device. Cf. Lidsky & Norbut, supra, at 1908 (explaining that the gun emoji in the article‘s title “looks like a space pistol on some platforms and like a revolver on others“).
¶49 The chance of meaning being lost in translation is heightened by the potential for online speech to be read far outside its original context. These days, one needs no more than a whim and a smartphone to broadcast to a massive audience. A message posted in Denver can reach New York, Tokyo, or Munich in an instant. Indeed, the term “viral” is apt for the rapidity with which an online statement can spread. A recipient might retransmit a message to audiences not foreseeable to the original speaker. A message might be recirculated after an intervening event that alters its impact. And online speech transmitted in the heat of the moment—which, if uttered verbally, would not linger beyond the speaker‘s apology—might be archived and subjected to scrutiny years after the fact.
¶50 The risk of mistaking protected speech for a true threat is high. But so are the stakes of leaving true threats unregulated. With the click of а button or tap of a screen, a threat made online can inflict fear on a wide audience. See, e.g., Julie Turkewitz & Jack Healy, ‘Infatuated’ with Columbine: Threats and Fear, 20 Years After a Massacre, N.Y. Times (Apr. 17, 2019), https://www.nytimes.com/2019/04/17/us/columbine-shooting-sol-pais.html (reporting that “millions of parents, students, and educators across Colorado” awoke on Columbine‘s 20th anniversary to news of an individual‘s alarming social media posts and threats to friends
¶51 Given this changed landscape, we are convinced that the various objective tests previously articulated by this court and the court of appeals are insufficient to distinguish “what is a [true] threat ... from what is constitutionally protected speech.” Watts, 394 U.S. at 707, 89 S.Ct. 1399. Judging a statement from the vantage point of a “reasonable speaker” or “reasonable listener,” in our view, inadequately accounts for potentially vast differences in speakers’, listeners’, and disinterested fact-finders’ frames of reference. We therefore hold that a true threat is a statement that, considered in context and under the totality of the circumstances, an intended or foreseeable recipient would reasonably perceive as a serious expression of intent to commit an act of unlawful violence.21 We believe that this refinement of the objective standard strikes a better balance between giving breathing room to free expression and protecting against the harms that true threats inflict.
¶52 In determining whether a statement is a true threat, a reviewing court must examine the words used, but it must also consider the context in which the statement was made. Particularly where the alleged threat is communicated online, the contextual factors courts should consider include, but are not limited to (1) the statement‘s role in a broader exchange, if any, including surrounding events; (2) the medium or platform through which the statement was communicated, including any distinctive conventions or architectural features; (3) the manner in which the statement was conveyed (e.g., anonymously or not, privately or publicly); (4) the relationship between the speaker and recipient(s); and (5) the subjective reaction of the statement‘s intended or foreseeable recipient(s).
¶53 Courts should start, of course, with the words themselves, along with any accompanying symbols, images, and other similar cues to the words’ meaning. Cf. United States v. Edwards, No. 2:17-CR-170, 2018 WL 456320, at *2 (S.D. Ohio Jan. 17, 2018) (in witness retaliation case, analyzing Facebook post that called confidential informant a snitch and included laughing faces and a skull emoji). This inquiry should include whether the threat contains accurate
¶54 Importantly, “what a defendant actually said is just the beginning of a threats analysis.” Haughwout v. Tordenti, 332 Conn. 559, 211 A.3d 1, 11 (2019). For example, a veiled statement may carry a true threat. See, e.g., Jeffries, 692 F.3d at 482 (“[O]ne cannot duck [a threаts prosecution] merely by delivering the threat in verse or by dressing it up with political (and protected) attacks on the legal system.“); Planned Parenthood of Columbia/Willamette, Inc. v. Am. Coal. of Life Activists
¶55 Particularly when evaluating online communication, courts should consider whether the statement was part of a larger exchange, including surrounding events. If so, the court should take note of the overall tone of that conversation, as well as the origin of the allegedly threatening language—for example, whether it was spontaneous or responsive to some other communication. It should also consider how surrounding events may impact the statement‘s tenor. United States v. Voneida, 337 F. App‘x 246, 248 (3d Cir. 2009) (concluding that recency of Virginia Tech shooting supported finding that student‘s posts to his MySpace page, including that “[s]omeday [he would] make the Virginia Tech incident look like a trip to an amusement park,” were true threats). But see Watts, 394 U.S. at 711, 89 S.Ct. 1399 (Douglas, J., concurring) (noting danger of policing alleged threats “under circumstances when intolerance for free speech [is] much greater than it normally might be” (quoting Note, Threatening the President: Protected Dissenter or Political Assassin, 78 Geo. L. J. 553, 570 (1969))).
¶56 Relatedly, the court should consider the medium or рlatform used to communicate the alleged threat. First, the choice of medium itself may be revealing. See, e.g., United States v. Bagdasarian, 652 F.3d 1113, 1120–21 (9th Cir. 2011) (reasoning that posting violent messages about the President on financial message board blunts the perception that the statements are true threats). And evidence regarding prevailing norms in a particular genre or even internet subforum may also help recast violent language in a less threatening light. See, e.g., Bell v. Itawamba Cty. Sch. Bd., 774 F.3d 280, 301 (5th Cir. 2014) (noting that “hyperbolic and violent language is a commonly used narrative device in rap, which functions to convey emotion and meaning—not to make real threats of violence“). In the context of social media, the court should also consider
¶57 The manner in which the statement was conveyed may also provide insight. For example, “a speaker‘s anonymity could influence a listener‘s perception of danger.” Bagdasarian, 652 F.3d at 1120–21 (but concluding there was no reasоn in that case to think the speaker‘s anonymity made it more, rather than less, likely that a violent post regarding the President was a serious threat). The directness of the message may also be revealing. See, e.g., Elonis, 135 S. Ct. at 2016 (Alito, J., concurring in part and dissenting in part) (” ‘Taken in context,’ lyrics in songs that are performed for an audience or sold in recorded form are unlikely to be interpreted as a real threat to a real person,” whereas “[s]tatements on social media that are pointedly directed at their victims ... are much more likely to be taken seriously.“); A.J.B., 929 N.W.2d at 865 (Chutich, J., concurring in part and dissenting in part) (reasoning that accused‘s having posted a “tweet storm of 40 posts, all of which specifically tagged [the target‘s] Twitter handle,” supported a finding of malicious intent).
¶58 Courts should also consider the speaker‘s familiarity with the recipients or targets of the threat and the nature of the relevant parties’ personal history. For example, in Elonis, the defendant‘s alleged threats included lyrics posted to Facebook that threatened violence against his wife soon after she left him and took with her thеir two children. 135 S. Ct. at 2004. Relatedly, courts should consider whether a threat‘s intended recipient or target is particularly vulnerable, whether because of personal characteristics or the parties’ relationship. See, e.g., A.J.B., 929 N.W.2d at 844 (considering “an unrelenting torrent of cruel tweets at ... an individual diagnosed with autism and Attention Deficit Hyperactivity Disorder” encouraging the target to commit suicide).
¶59 Finally, the subjective reaction of a statement‘s target or foreseeable recipients will be an important clue as to whether the message is a true threat. See, e.g., Watts, 394 U.S. at 708, 89 S.Ct. 1399 (reasoning that in part because of listeners’ laughing response, defendant‘s statement could not be interpreted as true threat). This inquiry need not be limited to the recipient‘s immediate reaction. See, e.g., D.J.M. v. Hannibal Pub. Sch. Dist. No. 60, 647 F.3d 754, 758, 764 (8th Cir. 2011) (teenage recipient of threats via instant message initially responded “lol“—shorthand for “laughing out loud“—but was concerned enough to tell trusted adult); Haughwout, 211 A.3d at 14 (observing that some students initially “elected to treat [the remarks at issue] as made in jest,” but that “some of those same students nevertheless were sufficiently perturbed to contact the university police“).
¶60 That said, courts should be wary of placing significant weight on the subjective reaction of a statement‘s unintended recipients. To do so risks punishing a speaker for the content of a message that has been decoupled from its context. This is of heightened concern given the vast temporal, geographic, and cultural distance current technology permits speech to travel. We are mindful that someone who stumbles upon a message he perceives as threatening may experience sincere fear and anxiety. But to construe the true threats exception to protect every passive internet user from the risk of such harms gives the doctrine too wide a scope.
¶61 Moreover, a listener‘s subjective reaction, without more, should not be dispositive of whether a statement is a true threat. We acknowledge that the true threats exception serves to protect individuals from “the fear of violence,” and “from the disruption that fear engenders.” R.A.V., 505 U.S. at 388, 112 S.Ct. 2538. But whether a particular reader or listener will react with fear to particular words is far too unрredictable a metric for
¶62 The factors discussed here are not meant to constitute an exhaustive list. Depending on the facts and circumstances, other considerations may be relevant to the overarching goal of examining a statement in all its context to discern whether it is a true threat or protected expression. Relatedly, the fact-finder has discretion to weigh each factor in the balance, and to decide whether a particular factor cuts for or against finding a true threat. Finally, in considering each factor, courts may find it helpful to admit expert testimony to help illuminate coded meanings, explain community norms and conventions, or bridge other contextual gaps.
III. Application
A. Standard of Review
¶63 Whether a particular statement constitutes a true threat is an issue of fact to be determined by the fact finder in the first instance. People v. Chase, 2013 COA 27, ¶ 70, 411 P.3d 740, 754; State v. Johnston, 156 Wash.2d 355, 127 P.3d 707, 712 (2006). But in
B. R.D.‘s As-Applied Challenge
¶64 It is unclear from the record what standard the trial court applied in concluding that R.D.‘s “particular type of speech is not protected under the
¶65 Because we have clarified the test to be used when evaluating whether a statement constitutes a true threat, the trial court is in the best position to review the record, to take furthеr evidence in its discretion, and to reach a conclusion on the matter.
IV. Conclusion
¶66 We hold that a true threat is a statement that, considered in context and under the totality of the circumstances, an intended or foreseeable recipient would reasonably perceive as a serious expression of intent to commit an act of unlawful violence. In determining whether a statement is a true threat, a reviewing court must examine the words used, but it must also consider the context in which the statement was made. Particularly where the alleged threat is communicated online, the contextual factors courts should consider include, but are not limited to (1) the statement‘s role in a broader exchange, if any, including surrounding events; (2) the medium or platform through which the statement was communicated, including any distinctive conventions or architectural features; (3) the manner in which the statement was conveyed (e.g., anonymously or not, privately or publicly); (4) the relationship between the speaker and recipient(s); and (5) the subjective reaction of the statement‘s intended or foreseeаble recipient(s).
¶67 We agree with the parties that in this case, the government must also prove that R.D. had the subjective intent to threaten. We need not decide today whether the
¶68 Because neither the juvenile court nor the court of appeals had the benefit of the framework we adopt today, we reverse the
Notes
Whether the court of appeals erred in determining that the defendant‘s comments, made on Twitter, were protected by the
First Amendment .
(1) A person commits harassment if, with intent to harass, annoy, or alarm another person, he or she ...
(e) Directly or indirectly initiates communication with a person or directs language toward another person, anonymously or otherwise, by telephone, telephone network, data network, text messаge, instant message, computer, computer network, computer system, or other interactive electronic medium in a manner intended to harass or threaten bodily injury or property damage, or makes any comment, request, suggestion, or proposal by telephone, computer, computer network, computer system, or other interactive electronic medium that is obscene ....
[a] statement is a true threat when a defendant intentionally makes a statement in a context or under such circumstances wherein a reasonable person would foresee that the statement would be interpreted by those to whom the maker communicates the statement as a serious expression of an intention to inflict bodily injury or take the life of an individual.
