<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="https://libraryofdefense.ocdla.org/skins/common/feed.css?303"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://libraryofdefense.ocdla.org/index.php?action=history&amp;feed=atom&amp;title=Blog%3ACase_Reviews%2FOregon_Appellate_Court_09-28-11</id>
		<title>Blog:Case Reviews/Oregon Appellate Court 09-28-11 - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://libraryofdefense.ocdla.org/index.php?action=history&amp;feed=atom&amp;title=Blog%3ACase_Reviews%2FOregon_Appellate_Court_09-28-11"/>
		<link rel="alternate" type="text/html" href="https://libraryofdefense.ocdla.org/index.php?title=Blog:Case_Reviews/Oregon_Appellate_Court_09-28-11&amp;action=history"/>
		<updated>2026-04-06T13:15:30Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.19.24</generator>

	<entry>
		<id>https://libraryofdefense.ocdla.org/index.php?title=Blog:Case_Reviews/Oregon_Appellate_Court_09-28-11&amp;diff=8665&amp;oldid=prev</id>
		<title>Maintenance script: Importing text file</title>
		<link rel="alternate" type="text/html" href="https://libraryofdefense.ocdla.org/index.php?title=Blog:Case_Reviews/Oregon_Appellate_Court_09-28-11&amp;diff=8665&amp;oldid=prev"/>
				<updated>2012-12-21T02:00:20Z</updated>
		
		<summary type="html">&lt;p&gt;Importing text file&lt;/p&gt;
&lt;table class='diff diff-contentalign-left'&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
			&lt;tr valign='top'&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;← Older revision&lt;/td&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;Revision as of 02:00, December 21, 2012&lt;/td&gt;
			&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 23:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 23:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;===Identity Theft - Merger - Separate Victims===&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;===Identity Theft - Merger - Separate Victims===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Identity Thefts predicated on the possession of multiple IDs from multiple victims at a single time do not merge into a single crime. Each person whose identity is misappropriated is a victim because victims of identity theft include those who suffer a risk of loss from the exposure of their identification to misuse. See [[Blog:Main/ID_Theft,&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;_Court_Of_Appeals_And_Merger&lt;/del&gt;|Ryan's article]]&amp;#160; on this case.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Identity Thefts predicated on the possession of multiple IDs from multiple victims at a single time do not merge into a single crime. Each person whose identity is misappropriated is a victim because victims of identity theft include those who suffer a risk of loss from the exposure of their identification to misuse. See [[Blog:Main/ID_Theft,&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;_Court_of_Appeals_and_Merger&lt;/ins&gt;|Ryan's article]]&amp;#160; on this case.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;[http://www.publications.ojd.state.or.us/A139246.pdf ''State v. Mullen'']&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;[http://www.publications.ojd.state.or.us/A139246.pdf ''State v. Mullen'']&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;{{wl-publish: 2011-09-27 21:00:00 -0700 | abassos }}&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;{{wl-publish: 2011-09-27 21:00:00 -0700 | abassos }}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Maintenance script</name></author>	</entry>

	<entry>
		<id>https://libraryofdefense.ocdla.org/index.php?title=Blog:Case_Reviews/Oregon_Appellate_Court_09-28-11&amp;diff=8651&amp;oldid=prev</id>
		<title>Maintenance script: Importing text file</title>
		<link rel="alternate" type="text/html" href="https://libraryofdefense.ocdla.org/index.php?title=Blog:Case_Reviews/Oregon_Appellate_Court_09-28-11&amp;diff=8651&amp;oldid=prev"/>
				<updated>2012-12-21T01:56:56Z</updated>
		
		<summary type="html">&lt;p&gt;Importing text file&lt;/p&gt;
&lt;table class='diff diff-contentalign-left'&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
			&lt;tr valign='top'&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;← Older revision&lt;/td&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;Revision as of 01:56, December 21, 2012&lt;/td&gt;
			&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 23:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 23:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;===Identity Theft - Merger - Separate Victims===&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;===Identity Theft - Merger - Separate Victims===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Identity Thefts predicated on the possession of multiple IDs from multiple victims at a single time do not merge into a single crime. Each person whose identity is misappropriated is a victim because victims of identity theft include those who suffer a risk of loss from the exposure of their identification to misuse. See [/ID_Theft,&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;_Court_of_Appeals_and_Merger &lt;/del&gt;Ryan's article] on this case.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;Identity Thefts predicated on the possession of multiple IDs from multiple victims at a single time do not merge into a single crime. Each person whose identity is misappropriated is a victim because victims of identity theft include those who suffer a risk of loss from the exposure of their identification to misuse. See [&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;[Blog:Main&lt;/ins&gt;/ID_Theft,&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;_Court_Of_Appeals_And_Merger|&lt;/ins&gt;Ryan's article]&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;]&amp;#160; &lt;/ins&gt;on this case.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;[http://www.publications.ojd.state.or.us/A139246.pdf ''State v. Mullen'']&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;[http://www.publications.ojd.state.or.us/A139246.pdf ''State v. Mullen'']&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;{{wl-publish: 2011-09-27 21:00:00 -0700 | abassos }}&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;{{wl-publish: 2011-09-27 21:00:00 -0700 | abassos }}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Maintenance script</name></author>	</entry>

	<entry>
		<id>https://libraryofdefense.ocdla.org/index.php?title=Blog:Case_Reviews/Oregon_Appellate_Court_09-28-11&amp;diff=7769&amp;oldid=prev</id>
		<title>Maintenance script: Importing text file</title>
		<link rel="alternate" type="text/html" href="https://libraryofdefense.ocdla.org/index.php?title=Blog:Case_Reviews/Oregon_Appellate_Court_09-28-11&amp;diff=7769&amp;oldid=prev"/>
				<updated>2012-12-21T00:21:16Z</updated>
		
		<summary type="html">&lt;p&gt;Importing text file&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;''Read the full article for details about the following new cases:''&lt;br /&gt;
* Hearsay - Forfeiture by Wrongdoing&lt;br /&gt;
* Expert Testimony - Cross&lt;br /&gt;
* Relevance - The Reid Technique&lt;br /&gt;
* Identity Theft - Merger - Separate Victims&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Hearsay - Forfeiture by Wrongdoing===&lt;br /&gt;
&lt;br /&gt;
Hearsay statements are admissible against a defendant who, through wrongful conduct, intends to cause, and does cause, a witness to be unavailable. OEC 804(3)(g). Causing unavailability does not need to be the sole, or even the primary purpose of the defendant. It would be illogical to allow a defendant to gain back the confrontation rights he lost for an evil motive because he has an additional and even greater evil motive. Moreover, because the forfeiture by wrongdoing exception is firmly rooted, it does not require particularized guarantees of trustworthiness. Here, parts of a murder victim's notes about defendant were admissible because defendant shot the victim as police were arriving and part of his intent was to prevent her from going to court.&lt;br /&gt;
[http://www.publications.ojd.state.or.us/A139011.pdf ''State v. Supanchick'']&lt;br /&gt;
&lt;br /&gt;
===Expert Testimony - Cross===&lt;br /&gt;
&lt;br /&gt;
The party cross-examining an expert may bring out facts which the expert reviewed to form his or her opinion, even if those facts would not otherwise be admissible and were not reviewed on direct. Here, defendant's PTSD expert in a murder case was allowed to be cross-examined with emails in which defendant was consistently demeaning toward the victim, his wife. The emails were part of the materials on which the doctor relied in forming his opinion and they were relevant to the defendant's overall state of mind.&lt;br /&gt;
[http://www.publications.ojd.state.or.us/A139011.pdf ''State v. Supanchick'']&lt;br /&gt;
&lt;br /&gt;
===Relevance - The Reid Technique===&lt;br /&gt;
&lt;br /&gt;
Testimony regarding the Reid Technique of police interrogation isn't relevant unless the defense establishes what the Reid Technique is and why it matters. Here, the officer who did the interrogation testified he didn't use Reid, the expert testified he didn't use the full Reid Technique and no evidence established what the Reid Technique was. The only important aspect of this part of the opinion is to note that the court did '''not''' rule that testimony regarding the Reid Technique is generally inadmissible. It was inadmissible under the particular circumstances of this case.&lt;br /&gt;
[http://www.publications.ojd.state.or.us/A139011.pdf ''State v. Supanchick'']&lt;br /&gt;
&lt;br /&gt;
===Identity Theft - Merger - Separate Victims===&lt;br /&gt;
&lt;br /&gt;
Identity Thefts predicated on the possession of multiple IDs from multiple victims at a single time do not merge into a single crime. Each person whose identity is misappropriated is a victim because victims of identity theft include those who suffer a risk of loss from the exposure of their identification to misuse. See [/ID_Theft,_Court_of_Appeals_and_Merger Ryan's article] on this case.&lt;br /&gt;
[http://www.publications.ojd.state.or.us/A139246.pdf ''State v. Mullen'']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{wl-publish: 2011-09-27 21:00:00 -0700 | abassos }}&lt;/div&gt;</summary>
		<author><name>Maintenance script</name></author>	</entry>

	</feed>