Feeds

New York students threatened in online ‘hit list’

Site creator protected by First Amendment

  • alert
  • submit to reddit

Boost IT visibility and business value

New York parents are demanding a teen to be thrown out of school after he threatened to pick off fellow students via an online "hit list".

The 13-year-old boy named 36 students on his site that he planned to "attack when it gets warmer", Newsday.com reported.

One reason given on the site for hating his classmates was if they were a "goody-goody".

After initially getting a two-day suspension for the action, has was later ordered to stay away from the John F Kennedy Middle School until a police investigation and disciplinary hearing were completed.
But it is unlikely that the teen will face criminal charges. Because he did not send the threats personally (such as via email), but posted them in public, he is covered under the First Amendment's freedom of speech rights.

Parents, called to a meeting at the school yesterday, are demanding that the boy to be expelled.

Police said the boy, an honours student, and his family had been "extremely cooperative" with detectives. They said they didn't think he had access to any weapons and decided not to confiscate his computer.

"It seems like he is an honour student, a very good student who seems to have made a big mistake," said Nassau Det Capt Carolyn Laibach, the commanding officer of the Juvenile Aid Bureau. The police are recommending counselling for the boy.

Parents of the kids involved said they were upset by the site, which has since been removed, but said the school was doing everything it could.

"I'm feeling much more comfortable now that I know it's out in the open, and maybe this kid will get the help he needs," said one.

It was a different story on local TV last night - parents told reporters for the WB11 station they were worried about their children's safety, with students outside the school saying were scared of a repeat of the Columbine shootings. ®

Related Link

Police Probe 'Hit List'

Related Stories

Net blamed for new Columbine High School threats
George Dubya blames Net for Columbine massacre
US senate moves to ban bomb info on Web
Looney in botched fake massacre threat

Build a business case: developing custom apps

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Nadella: Apps must run on ALL WINDOWS – PCs, slabs and mobes
Phone egg, meet desktop chicken - your mother
White? Male? You work in tech? Let us guess ... Twitter? We KNEW it!
Grim diversity numbers dumped alongside Facebook earnings
Microsoft: We're making ONE TRUE WINDOWS to rule us all
Enterprise, Windows still power firm's shaky money-maker
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.