in Interest of R.D

Opinions of the Colorado Supreme Court are available to the public and can be accessed through the Judicial Branch’s homepage at http://www.courts.state.co.us. Opinions are also posted on the Colorado Bar Association’s homepage at http://www.cobar.org. ADVANCE SHEET HEADNOTE June 1, 2020 2020 CO 44 No. 17SC116, People in Interest of R.D.—First Amendment—True Threats— Social Media. The supreme court reviews whether the court of appeals erred in determining that threatening messages the juvenile defendant posted on Twitter were protected speech under the First Amendment. In so doing, the court refines its earlier statements of the general framework for distinguishing a true threat from constitutionally protected speech and offers specific guidance for applying that test to statements communicated online. The court holds that a true threat is a statement that, considered in context and under the totality of the circumstances, an intended or foreseeable recipient would reasonably perceive as a serious expression of intent to commit an act of unlawful violence. In determining whether a statement is a true threat, a reviewing court must examine the words used, but it must also consider the context in which the statement was made. Particularly where the alleged threat is communicated online, the contextual factors courts should consider include, but are not limited to (1) the statement’s role in a broader exchange, if any, including surrounding events; (2) the medium or platform through which the statement was communicated, including any distinctive conventions or architectural features; (3) the manner in which the statement was conveyed (e.g., anonymously or not, privately or publicly); (4) the relationship between the speaker and recipient(s); and (5) the subjective reaction of the statement’s intended or foreseeable recipient(s). The court reverses the judgment of the court of appeals and remands with instructions to return the case to the juvenile court to reconsider the adjudication under the refined framework. The Supreme Court of the State of Colorado 2 East 14th Avenue • Denver, Colorado 80203 2020 CO 44 Supreme Court Case No. 17SC116 Certiorari to the Colorado Court of Appeals Court of Appeals Case No. 14CA1800 Petitioner: The People of the State of Colorado, In the Interest of Respondent: R.D. Judgment Reversed en banc June 1, 2020 Attorneys for Petitioner: Philip J. Weiser, Attorney General Joseph G. Michaels, Assistant Attorney General Denver, Colorado Attorneys for Respondent: Megan A. Ring, Public Defender James S. Hardy, Deputy Public Defender Denver, Colorado JUSTICE MÁRQUEZ delivered the Opinion of the Court. ¶1 The First Amendment’s protection of speech is robust, but not absolute: it does not, for example, safeguard the utterance of a “true threat.” The task of identifying a true threat has been complicated by the advent of social media. At the same time, the proliferation of online expression has amplified the potential for threatening words to cause harm. This case, which stems from a late-night argument on Twitter among several high school students, requires us to confront this changed communication landscape and to refine the applicable framework for distinguishing a true threat from constitutionally protected speech where that communication occurs in the cyber arena. ¶2 R.D., a juvenile, was adjudicated delinquent for harassment by communication under section 18-9-111(1)(e), C.R.S. (2013), based on tweets he directed at another student during a heated exchange that took place in the wake of a local school shooting. The narrow question before us is whether R.D.’s statements were “true threats.” If so, then application of the statute to his conduct did not violate his First Amendment right to free speech. ¶3 In light of U.S. Supreme Court case law, we refine our earlier statements of the framework for distinguishing a true threat from constitutionally protected speech. In addition, we take the opportunity to provide guidance for applying that test to statements communicated online. 2 ¶4 We hold that a true threat is a statement that, considered in context and under the totality of the circumstances, an intended or foreseeable recipient would reasonably perceive as a serious expression of intent to commit an act of unlawful violence.1 In determining whether a statement is a true threat, a reviewing court must examine the words used, but it must also consider the context in which the statement was made. Particularly where the alleged threat is communicated online, the contextual factors courts should consider include, but are not limited to (1) the statement’s role in a broader exchange, if any, including surrounding events; (2) the medium or platform through which the statement was communicated, including any distinctive conventions or architectural features; (3) the manner in which the statement was conveyed (e.g., anonymously or not, privately or publicly); (4) the relationship between the speaker and recipient(s); and (5) the subjective reaction of the statement’s intended or foreseeable recipient(s). 1 We need not resolve today whether the test for true threats under the First Amendment also requires consideration of the speaker’s subjective intent to threaten the victim(s). But even assuming it does, the statutory provision at issue required the State to prove beyond a reasonable doubt that the communication here was made “in a manner intended to . . . threaten bodily injury.” § 18-9-111(1)(e). 3 ¶5 Because neither the juvenile court nor the court of appeals had the benefit of the framework we adopt today, we reverse the judgment of the court of appeals and remand with instructions to return the case to the juvenile court to reconsider the adjudication applying this refined test. 4 I. Facts and Procedural History ¶6 In December 2013, a shooting took place at Arapahoe High School that took the life of a female student and the male student shooter. A few days later, a student from Thomas Jefferson High School (“TJ”), a school in a neighboring district, posted on Twitter2 a photo of a banner conveying TJ’s support for Arapahoe. A student from Littleton High School, which is in the same school district as Arapahoe, tweeted3 in response that kids from TJ did not care about the shooting because it happened outside their district. A.C., another TJ student and a friend of the original poster, soon got involved because he believed the Littleton student was disrespecting his friend. J.W., A.C.’s friend and fellow TJ student, also got involved, and the group conversation eventually took on a “TJ versus Littleton” character. The Littleton student “mentioned”4 the handles, or 2Twitter is a “real-time information network that lets people share and discuss what is happening at a particular moment in time through the use of ‘tweets.’” Dimas-Martinez v. State, 385 S.W.3d 238, 243 n.3 (Ark. 2011). 3 A tweet is a message posted to Twitter that might contain text or other media. A tweet appears on the sender’s profile page and may appear on the feed, or timeline, of anyone following the sender. About Different Types of Tweets, Twitter, https://help.twitter.com/en/using-twitter/types-of-tweets [https://perma.cc/ 8ZBR-H79E]. The word “tweet” is also used as a verb to describe the act of posting a message on Twitter. See, e.g., How to Tweet, Twitter, https://help.twitter.com/ en/using-twitter/how-to-tweet [https://perma.cc/9CQ6-3BYE]. 4A “mention” is a tweet that contains another account’s Twitter username, or “handle,” preceded by the “@” symbol. When a user’s handle is mentioned, the 5 usernames, of R.D. and another friend from his school, bringing them into the exchange. ¶7 As we discuss further below, the record provides an incomplete picture of the students’ back-and-forth. But it does reveal that R.D. posted the following messages: • @[A.C.]5 you a bitch, ill come to Tgay and kill you nigga.6 • @[A.C.] I don’t people who aren’t worth my time. If I see your bitch ass outside of school you catching a bullet bitch. • @[A.C.] nigga you don’t even know me. Mf I don’t even know were tf your lame bitch ass school is. You a bitch talking shit on here • @[A.C.] all you fuck niggas will get your ass beat real shit. • You fuck with the wrong person leave you ass in a body bag. • @[J.W.] @[A.C.] don’t give af bruh. Don’t even know you niggas and you talking shit. • @[A.C.] you think this shit a game, I’m not playing. I don’t fight fuck boys and I don’t twitter beef. user receives notification of the tweet, but the tweet does not appear on the user’s public profile. 5 For purposes of this opinion, we have replaced the students’ Twitter handles with their initials. 6 We reluctantly reproduce this racial slur and other pejorative terms from the record to give an uncensored account of the facts. 6 R.D. also posted a photograph of a handgun resting beside approximately fifty cartridges, along with the message, “@[A.C.] this all I’m saying[.] We don’t want another incident like Arapahoe. My 9 never on vacation.” ¶8 After this, the record reveals that R.D. and A.C. tweeted as follows:7 • A.C.: @[R.D.] you ain’t never shot no one so sit down and get off google images bruh • R.D.: @[J.W.] @[A.C.] idgaf my @ name should have not been in this shit. You fucked with the wrong one. • R.D.: @[A.C.] I don’t even know where tf your school at. I’m not even from Colorado. Trust me I’m not afraid to shoot. • R.D.: @[A.C.] fuck you and your gay ass school. Don’t worry nigga, I’ll see you little hoes tomorrow. • A.C.: @[R.D.] shoot then pussy. • A.C.: @[R.D.] you are all talk so go the fuck to bed come up to TJ and get slept.8 Fuck boy. • R.D.: @[A.C.] haha alright hoe, we’ll see whose a bitch tomorrow. • R.D.: @[A.C.] I’m not about to fight you broke bitch. Let me catch you away from school you is a dead man. Goodnight hoe. • A.C.: @[R.D.] 3950 S. Holly street. I’ll see u tomorrow fuck boy 7 These messages are set out in the order in which R.D. either tweeted or “retweeted”—i.e., shared—them. It is therefore possible that messages authored by A.C. and retweeted by R.D. were originally posted by A.C. in a somewhat different order than represented here. 8 A.C. later testified that “get slept” usually means to fight or get knocked out. 7 ¶9 Based on these tweets, the People filed a petition in delinquency charging R.D. with harassment under section 18-9-111(1)(e), C.R.S. (2013). As relevant here, that provision prohibits harassment through certain forms of digital communication: (1) A person commits harassment if, with intent to harass, annoy, or alarm another person, he or she . . . (e) [i]nitiates communication with a person, anonymously or otherwise, by . . . text message, instant message, computer, computer network, or computer system in a manner intended to . . . threaten bodily injury . . . . § 18-9-111(1)(e). R.D. moved to dismiss the charge, contending that his statements were protected by the First Amendment to the U.S. Constitution and article II, section 10 of the Colorado Constitution.9 ¶10 At a hearing on the motion, the prosecutor argued that under Virginia v. Black, 538 U.S. 343 (2003), and Watts v. United States, 394 U.S. 705 (1969) (per curiam), the government may constitutionally regulate speech that constitutes a “true threat.” Speech constitutes a true threat, she contended, “when an individual is intending to threaten bodily harm.” 9In this initial motion to dismiss, R.D. contended that his statements could not be constitutionally regulated because (1) they were made in a public forum and (2) they could not be considered “fighting words.” Because R.D.’s constitutional claim in this case now focuses on whether R.D.’s tweets constituted “true threats,” we restrict our description of the facts and procedural history to this claim. 8 ¶11 In arguing that R.D.’s tweets fell into this category of unprotected speech, the prosecutor emphasized “the social context” of the statements, noting they were sent four days after the Arapahoe High School shooting. She stated that police officers contacted the students who had read the tweets, all of whom said they were afraid. She further observed that such fear made sense given that a student had so recently been shot. Finally, she posited that true threats such as R.D.’s need to be regulated to “protect people’s feeling of safety.” ¶12 The trial court denied R.D.’s motion to dismiss. In a bench ruling, the court concluded that R.D.’s “particular type of speech is not protected under the First Amendment.” The court noted it had “consider[ed] the argument of counsel and the factors the [c]ourt is to consider,” but did not identify what those factors were. Based on its conclusion that R.D.’s tweets were not protected speech, the court also found that section 18-9-111(1)(e) is not unconstitutional as applied to R.D.10 A. Trial ¶13 At trial, A.C.’s and J.W.’s testimony revealed that the screenshots and printouts submitted in evidence of R.D.’s tweets painted an incomplete picture of the conversation as it occurred on Twitter. The prosecution’s exhibits consisted of 10R.D. later filed a supplement to his motion to dismiss alleging for the first time that section 18-9-111(e) is facially overbroad. The juvenile court never ruled on this supplementary motion. 9 screenshots of some of the messages R.D. authored, but captured almost none of the other students’ comments. The defense supplemented this one-sided view of the conversation by introducing a print-out of R.D.’s Twitter profile, which documented both R.D.’s own tweets and messages by others in the conversation that R.D. retweeted.11 ¶14 Aside from explaining to the adults in the room how Twitter works, A.C. and J.W. testified to their reactions to the exchange. A.C. testified that he construed R.D.’s tweets directed at him as threats; that he did not think R.D. was kidding; and that he understood R.D.’s post containing the picture of a handgun to convey a threat to his life. Yet on cross-examination, A.C. acknowledged that he responded to that post by tweeting that R.D. should “get off google images” because he thought the picture of the handgun was one R.D. had merely downloaded from the internet. He also admitted that he tweeted the address of his school. 11 Even this document, however, did not include tweets or private messages by other users that may have been part of the conversation, but that R.D. did not share on his public feed. Indeed, many of R.D.’s tweets in the print-out displayed a link to “view conversation,” which, if clicked in electronic form, would have revealed other replies in the same exchange. But whatever those other messages said, they are not part of the record. 10 ¶15 J.W.’s testimony was similarly inconsistent. When asked on direct about R.D.’s “threat to kill,” J.W. testified that he did not take it “as a joke” but that he also did not “take it serious.” He said the message was “a little intimidating.” He also testified that students on “both sides” were throwing around insults and talking about physically fighting and that he “didn’t really take anything as being very serious.” ¶16 In a bench ruling, the juvenile court adjudicated R.D. delinquent. The court acknowledged that the early part of the Twitter exchange did not establish an intent to alarm under the harassment statute “because [the students] were both engaging in that type of conversation.” The court analogized this early portion of the exchange to a schoolyard fight where everyone is trying to prove they are “bigger[,] better[,] and meaner” than their peers. ¶17 But the conversation crossed the line, the court found, when R.D. posted the picture of the handgun. Referring again to the schoolyard brawl analogy, the court likened that moment to R.D. lifting his shirt to show that he was armed. The court reasoned that a brawl and its attendant displays of bravado usually cause “no harm, no foul” if broken up. But when someone in such a face-to-face interaction says they have a gun, the dynamic becomes menacing. The court found that R.D.’s message was similar to such a display, although it acknowledged that the tweet was “different” because the students were not face-to-face. 11 ¶18 Turning to the statute, the court found beyond a reasonable doubt that R.D. “initiate[d] communication” over a computer network or computer system. It then considered whether R.D. “inten[ded] to threaten” anyone. The court observed that J.W. and A.C. testified that they didn’t want to joke about guns, but that they didn’t take R.D.’s messages seriously, and pointed out that A.C. told R.D. to “get off google images” and volunteered to him his school’s address. But the court concluded that the boys’ subjective reactions were irrelevant because the statute does not require that the recipient actually feel threatened or that actual bodily injury occur. ¶19 Relying specifically on R.D.’s post of the picture of the handgun, the court concluded beyond a reasonable doubt that R.D. “initiate[d] communication with a person by computer network, data network, or computer system in a manner intended . . . to threaten bodily injury or property damage to [A.C.] and [J.W.], in violation of [section] 18-9-111(1)(e).” In its ruling, the court made no mention of the First Amendment and did not opine on the statute’s alleged unconstitutionality, either facially or as applied to R.D.’s tweets. ¶20 The court sentenced R.D. to write an essay demonstrating that he understood the challenges of online communication. R.D. submitted the essay to the court’s satisfaction. 12 B. Appeal ¶21 R.D. appealed, arguing, as relevant here, that his adjudication should be vacated because application of section 18-9-111(1)(e) to his speech on Twitter violated his First Amendment right to free speech.12 The People responded that R.D.’s tweets were true threats and therefore unprotected speech. ¶22 The court of appeals agreed with R.D. and reversed and remanded with directions to vacate the adjudication and dismiss the proceeding. People in Interest of R.D., 2016 COA 186, ¶¶ 1, 6, __ P.3d __. ¶23 The court began by acknowledging that the government may regulate certain unprotected categories of speech, such as true threats. Id. at ¶ 9. The court defined a “threat” as a “statement of purpose or intent to cause injury or harm to the person, property, or rights of another, by committing an unlawful act.” Id. at ¶ 10 (citing People v. McIntier, 134 P.3d 467, 472 (Colo. App. 2005)). But a “true threat” for purposes of the First Amendment, the court explained, “is not merely talk or jest.” Id. It is evaluated “in the context in which [it was] spoken or written,” 12 R.D. also challenged the sufficiency of the evidence that he “initiate[d]” communication under 18-9-111(1)(e) and argued that statements he made to his school’s resource officer and vice principal should have been suppressed. Neither of these bases for appeal is before us today. 13 and “by whether those who hear or read the threat reasonably consider that an actual threat has been made.” Id. (quoting McIntier, 134 P.3d at 472). ¶24 To determine whether R.D.’s statements constituted true threats, the court of appeals considered both the plain import of the words used and the context in which the statements were made, including (1) to whom the statements were communicated; (2) the manner in which the statements were communicated; and (3) the subjective reactions of those whom the statements concerned. Id. (citing People v. Stanley, 170 P.3d 782, 790 (Colo. App. 2007), and Watts, 394 U.S. at 708). ¶25 Applying that framework, the court concluded that R.D.’s tweets were not true threats because they did not constitute “a serious expression of an intent to commit an act of unlawful violence to a particular individual or group of individuals.” Id. at ¶ 11 (quoting Black, 538 U.S. at 359). The court reasoned that although the language of R.D.’s tweets was violent and explicit, the context in which the statements were made mitigated their tone in three ways. Id. ¶26 First, the court observed that R.D.’s tweets made clear that he did not know A.C. personally and did not know where A.C.’s school was located. Id. at ¶ 12. In addition, R.D. never referred to A.C. by name, instead addressing him only by his Twitter handle. Id. 14 ¶27 Second, the court observed that while R.D. used “@” to direct many of his tweets to A.C., he did not send those messages privately to A.C. alone; instead, they were in public view on R.D.’s profile page. Id. at ¶ 13. ¶28 Finally, the court observed that A.C.’s reactions to R.D.’s tweets showed that “he did not view the statements as true threats when they were received.” Id. at ¶ 15. In particular, the court found significant that when R.D. indicated he did not know where TJ was located, A.C. volunteered the address and tweeted, “I’ll see you tomorrow fuck boy”; “you are all talk so go the fuck to bed come up to TJ and get slept”; and “shoot then pussy.” Id. at ¶ 14. The court also took note of A.C.’s response to the photo of the handgun: “you ain’t never shot no one so sit down and get off google images bruh.” Id. The court gleaned from these tweets that A.C. did not appear threatened and did not take precautionary measures to protect himself from R.D. Id. ¶29 Based on these contextual factors, the court concluded that R.D.’s tweets did not constitute true threats. Id. at ¶ 16. Accordingly, it held that application of section 18-9-111(1)(e) to R.D.’s conduct violated his First Amendment rights. Id. at ¶ 21. We granted the People’s petition for a writ of certiorari to review whether the court of appeals erred in determining that R.D.’s online statements are 15 protected by the First Amendment.13 In so doing, we must address the applicable legal standard, which, as the parties’ briefs acknowledge, has been the subject of some debate. II. Analysis ¶30 The government’s power to regulate speech is constrained by the First Amendment, which provides that “Congress shall make no law . . . abridging the freedom of speech.” U.S. Const. amend. I; see Gitlow v. New York, 268 U.S. 652, 666 (1925) (incorporating First Amendment against the states).14 In this case, R.D. was adjudicated delinquent for conduct that, if committed by an adult, would violate section 18-9-111(1)(e). At the time, that provision stated as follows: (1) A person commits harassment if, with intent to harass, annoy, or alarm another person, he or she . . . (e) [i]nitiates communication with a person, anonymously or otherwise, by . . . text message, instant message, computer, 13 We granted the People’s petition for a writ of certiorari to review the following issue: Whether the court of appeals erred in determining that the defendant’s comments, made on Twitter, were protected by the First Amendment. 14As previously noted, R.D. also raised a claim under Colorado’s counterpart to the First Amendment. See Colo. Const. art. II, § 10. But because he does not argue that a different analysis applies under the state constitution, we discuss only his First Amendment claim. 16 computer network, or computer system in a manner intended to . . . threaten bodily injury . . . . § 18-9-111(1)(e).15 ¶31 Because this provision regulates pure speech, we must review the constitutionality of its application to R.D.’s tweets “with the commands of the First Amendment clearly in mind.” Watts, 394 U.S. at 707. 15 The provision was amended effective July 1, 2015, and now reads as follows: (1) A person commits harassment if, with intent to harass, annoy, or alarm another person, he or she . . . (e) Directly or indirectly initiates communication with a person or directs language toward another person, anonymously or otherwise, by telephone, telephone network, data network, text message, instant message, computer, computer network, computer system, or other interactive electronic medium in a manner intended to harass or threaten bodily injury or property damage, or makes any comment, request, suggestion, or proposal by telephone, computer, computer network, computer system, or other interactive electronic medium that is obscene . . . . § 18-9-111(1)(e), C.R.S. (2019). The Act amending subsection (1)(e) also added a new subsection (8), which provides that “[section 18-9-111] is not intended to infringe upon any right guaranteed to any person by the first amendment to the United States constitution or to prevent the constitutionally protected expression of any religious, political, or philosophical views.” § 18-9-111(8). Because R.D.’s charged conduct predated these alterations to the statutory language, we do not consider them in our analysis. 17 ¶32 The narrow question before us is whether R.D.’s tweets were “true threats.”16 ¶33 To begin, we clarify that the protection of free speech does not vary by medium of expression and, accordingly, we set forth background First Amendment principles and true threats jurisprudence to guide our analysis. Next, we acknowledge that the advent of social media has complicated the constitutional inquiry. To respond to today’s changed communication landscape, we both refine our earlier statements of the general framework for distinguishing a true threat from constitutionally protected speech and offer specific guidance for applying that test to statements communicated online. ¶34 Having clarified the test for determining whether R.D.’s online statements constitute true threats, we reverse the judgment of the court of appeals and remand with instructions to return the case to the juvenile court to reconsider the adjudication applying the framework we adopt today. 16 Although the parties’ briefs also discuss whether section 18-9-111(1)(e) is facially overbroad, we decline to address this issue, which neither the juvenile court nor the court of appeals addressed or ruled upon, and which, in any event, is beyond the scope of the question on which we granted certiorari review. In other words, we assume for purposes of this opinion that section 18-9-111(1)(e) proscribes only conduct that constitutes a true threat, at least insofar as it criminalizes what R.D. is charged with here. Accordingly, we limit our analysis to whether R.D.’s tweets constituted true threats. 18 A. The True Threats Exception ¶35 “There are certain well-defined and narrowly limited classes of speech, the prevention and punishment of which have never been thought to raise any Constitutional problem.” Chaplinsky v. New Hampshire, 315 U.S. 568, 571–72 (1942). “[T]hese areas of speech can, consistently with the First Amendment, be regulated because of their constitutionally proscribable content.” R.A.V. v. City of St. Paul, 505 U.S. 377, 383 (1992). One such category of unprotected speech is a “true threat.” 1. Watts v. United States ¶36 The true threats doctrine originated in 1969 with Watts v. United States. In that case, which arose during the Vietnam War, the eighteen-year-old defendant was convicted under a federal statute forbidding any person from “knowingly and willfully” making “any threat to take the life of or to inflict bodily harm upon the President of the United States.” 394 U.S. at 705. Watts had attended a public anti-war rally on the grounds of the Washington Monument in Washington, D.C., where he joined a scheduled discussion group of young people who were mostly in their teens and early twenties. Id. at 705–06. Watts told the group that he had been drafted but would not report for his physical, and an Army Counter Intelligence Corps investigator who was present overheard Watts state, “If they ever make me carry a rifle the first man I want to get in my sights is L.B.J.” Id. at 19 706. Watts and others in the crowd reacted to this statement with laughter. Id. at 707. ¶37 The Supreme Court held that the statute under which Watts was convicted was “[c]ertainly . . . constitutional on its face,” given the government’s overwhelming interest in protecting the safety of the President and allowing him to perform his duties without interference from threats of physical violence. Id. But the Court also explained that because the statute “ma[de] criminal a form of pure speech,” it had to be “interpreted with the commands of the First Amendment clearly in mind.” Id. In particular, “a threat must be distinguished from . . . constitutionally protected speech.” Id. The Court concluded that Watts’s statement, “[t]aken in context,” including its “expressly conditional nature . . . and the reaction of the listeners,” was mere political hyperbole that could not be interpreted as a “true ‘threat’” under the statute. Id. at 708. 2. Virginia v. Black ¶38 Thirty-four years later, in Virginia v. Black, the Supreme Court reaffirmed that the First Amendment permits states to ban “true threats,” which it defined to “encompass those statements where the speaker means to communicate a serious expression of an intent to commit an act of unlawful violence to a particular individual or group of individuals.” 538 U.S. at 359. The Court also clarified that “[t]he speaker need not actually intend to carry out the threat,” because the true 20 threats exception exists to “protect[] individuals from the fear of violence,” “from the disruption that fear engenders,” and from “the possibility that the threatened violence will occur.” Id. at 359–60 (quoting R.A.V., 505 U.S. at 388). ¶39 At issue in Black was the constitutionality of a Virginia statute banning cross burning done with intent to intimidate a person or group of persons. Id. at 347. One provision of the statute treated cross burning as prima facie evidence of intent to intimidate. Id. at 347–48. The Court explained that “[i]ntimidation in the constitutionally proscribable sense of the word is a type of true threat, where a speaker directs a threat to a person or group of persons with the intent of placing the victim in fear of bodily harm or death.” Id. at 360. The Court held that the statute did “not run afoul of the First Amendment insofar as it ban[ned] cross burning with intent to intimidate,” id. at 361, but a plurality concluded that the provision treating cross burning as prima facie evidence of such intent was overbroad, reasoning that cross burning is sometimes protected expression, see id. at 364–67 (plurality opinion). 3. The Post-Black Debate ¶40 Though Watts and Black made clear that the First Amendment does not protect a “true threat,” the decisions resulted in a split of authority over how to discern whether a particular statement amounts to one. 21 ¶41 A majority of jurisdictions have interpreted Black’s definition of a true threat—a statement where the speaker “means to communicate a serious expression of an intent to commit an act of unlawful violence”—to require only that the speaker intended to make the statement. Under this reading, “means to” modifies only the word “communicate.” See, e.g., United States v. Clemens, 738 F.3d 1, 10 (1st Cir. 2013) (requiring the speaker to intend to make the communication, but not the threat). Courts adopting this view judge whether a statement constitutes a true threat using an objective standard, asking how a reasonable person would interpret the words.17 Proponents of an objective standard have reasoned that a speaker’s lack of intent to threaten does nothing to reduce the harms identified in Black that justify the exception of true threats from First 17The objective test has several variations, with some courts asking whether the statement is one a reasonable speaker would foresee would be interpreted as a serious expression of intention to inflict bodily harm, see, e.g., State v. Trey M., 383 P.3d 474, 478 (Wash. 2016), some asking how a reasonable listener would construe the speech in context, see, e.g., United States v. White, 670 F.3d 498, 507 (4th Cir. 2012), and some considering both perspectives, see, e.g., Haughwout v. Tordenti, 211 A.3d 1, 9 (Conn. 2019) (requiring that “a reasonable person would foresee that the statement would be interpreted by those to whom the maker communicates the statement as a serious expression of intent to harm or assault” and that “a reasonable listener, familiar with the entire factual context of the defendant’s statements, would be highly likely to interpret them as communicating a genuine threat of violence rather than protected expression, however offensive or repugnant” (quoting State v. Krijger, 97 A.3d 946, 957, 963 (Conn. 2014))). 22 Amendment protection. Black, 538 U.S. at 359; see also, e.g., United States v. Jeffries, 692 F.3d 473, 480 (6th Cir. 2012) (“Much like their cousins libel, obscenity, and fighting words, true threats ‘by their very utterance inflict injury’ on the recipient.” (quoting Chaplinsky, 315 U.S. at 572)). ¶42 On the other hand, some courts have interpreted Black to require the speaker to have the subjective intent to threaten. Under this reading, “means to” modifies the entire phrase, “communicate a serious expression of an intent to commit an act of unlawful violence.”18 Proponents of a subjective intent requirement have tended to posit that a purely objective listener test would chill protected speech. See Rogers v. United States, 422 U.S. 35, 47–48 (1975) (Marshall, J., concurring) (arguing that “charging the defendant with responsibility for the effect of his statements on his listeners . . . would have substantial costs in discouraging the ‘uninhibited, robust, and wide-open’ debate that the First Amendment is intended 18 See, e.g., United States v. Heineman, 767 F.3d 970, 978 (10th Cir. 2014); United States v. Cassel, 408 F.3d 622, 631–33 (9th Cir. 2005); State v. Boettger, 450 P.3d 805, 813–15 (Kan. 2019); see also Perez v. Florida, 137 S. Ct. 853, 855 (2017) (Sotomayor, J., concurring in denial of petition for writ of certiorari) (“Together, Watts and Black make clear that to sustain a threat conviction without encroaching upon the First Amendment, States must prove more than the mere utterance of threatening words—some level of intent is required. . . . These two cases strongly suggest that it is not enough that a reasonable person might have understood the words as a threat—a jury must find that the speaker actually intended to convey a threat.”). 23 to protect” (quoting N.Y. Times Co. v. Sullivan, 376 U.S. 254, 270 (1964))); United States v. White, 670 F.3d 498, 525 (4th Cir. 2012) (Floyd, J., concurring in part and dissenting in part) (“Under a purely objective test, speakers whose ideas or views occupy the fringes of our society have more to fear, for their violent and extreme rhetoric, even if intended simply to convey an idea or express displeasure, is more likely to strike a reasonable person as threatening.”).19 4. Elonis v. United States ¶43 The U.S. Supreme Court seemed positioned to settle this debate in Elonis v. United States, 135 S. Ct. 2001 (2015), where the Court had its first opportunity to apply the true threats doctrine to statements communicated over social media, specifically, posts the petitioner made on Facebook. There, the petitioner was convicted under a federal statute that makes it a crime to transmit in interstate commerce “any communication containing any threat . . . to injure the person of another.” Id. at 2004 (quoting 18 U.S.C. § 875(c) (2018)). The statute makes no reference to a required mental state. Id. at 2008. The jury was instructed that to convict Elonis, it had to find that he intentionally communicated a statement that 19Some have also reasoned that it would be unfair to penalize a speaker for the unintended consequences of their communication. See Leslie Kendrick, Free Speech and Guilty Minds, 114 Colum. L. Rev. 1255, 1282 (2014). 24 a reasonable person would foresee would be regarded by the listener as a threat.20 Id. at 2004, 2007. The question before the Court was “whether the statute also requires that the defendant be aware of the threatening nature of the communication, and—if not—whether the First Amendment requires such a showing.” Id. at 2004. ¶44 Ultimately, the Court resolved the case on statutory grounds and did not consider any First Amendment issues. It concluded that reading in only a “reasonable person” standard where a federal criminal statute is silent on the required mental state would be inconsistent with the principle that “wrongdoing must be conscious to be criminal.” Id. at 2012 (quoting Morissette v. United States, 342 U.S. 246, 252 (1952)). The Court held that a defendant’s purpose or knowledge would satisfy this requirement but did not address whether recklessness would also be sufficient. Id. Justices Alito and Thomas each wrote separately, criticizing the majority’s failure to resolve the split in the circuit courts regarding the requisite 20 Specifically, the jury was instructed that [a] statement is a true threat when a defendant intentionally makes a statement in a context or under such circumstances wherein a reasonable person would foresee that the statement would be interpreted by those to whom the maker communicates the statement as a serious expression of an intention to inflict bodily injury or take the life of an individual. Elonis, 135 S. Ct. at 2007. 25 level of intent. See id. at 2014 (Alito, J., concurring in part and dissenting in part) (“Did the jury need to find that Elonis had the purpose of conveying a true threat? Was it enough if he knew that his words conveyed such a threat? Would recklessness suffice? The Court declines to say. Attorneys and judges are left to guess.”); see id. at 2018 (Thomas, J., dissenting) (“[The majority’s] failure to decide throws everyone from appellate judges to everyday Facebook users into a state of uncertainty.”). Thus, after Elonis, the proper test for true threats remains an unsolved doctrinal puzzle. ¶45 A definitive framework for discerning a true threat has been similarly elusive in Colorado, though our appellate courts have tended to embrace some form of an objective test. For example, in People v. Baer, 973 P.2d 1225 (Colo. 1999), this court appeared in passing to endorse a reasonable speaker test, parenthetically describing a true threat as “one which a reasonable person would foresee would be interpreted by the recipient as a serious threat to inflict death or bodily injury.” Id. at 1231. And in an earlier, widely cited special concurrence in People v. Janousek, 871 P.2d 1189 (Colo. 1994), then-Justice Mullarkey described the “critical inquiry” under true threats jurisprudence as more of a reasonable listener test: “whether those who hear or read the threat reasonably consider that an actual threat has been made.” Id. at 1198 (Mullarkey, J., specially concurring); see also R.D., ¶ 10 (reciting Janousek concurrence formulation); Stanley, 170 P.3d at 787 (same); 26 McIntier, 134 P.3d at 472 (same). More recently, the court of appeals division in Stanley specifically rejected the contention that Black required more than an objective test. See 170 P.3d at 786–89. B. Distinguishing True Threats from Protected Speech in the Age of Social Media ¶46 This court has not had occasion to revisit the framework for assessing whether a statement is a true threat since the U.S. Supreme Court issued its 2003 decision in Black. And as this case demonstrates, the ways in which technology has transformed our everyday communication complicates the constitutional inquiry. We take this opportunity to refine our test for discerning whether a statement is a true threat, taking into account this altered communication landscape. ¶47 First, it is foundational that the “‘basic principle[] of freedom of speech, . . . like the First Amendment’s command, do[es] not vary’ when a new and different medium for communication appears.” Brown v. Entm’t Merchs. Ass’n, 564 U.S. 786, 790 (2011) (quoting Joseph Burstyn, Inc. v. Wilson, 343 U.S. 495, 503 (1952)). That said, “[e]very medium of expression presents special First Amendment problems which must be examined in the light of the circumstances which are interwoven with the speech in issue.” People v. Weeks, 591 P.2d 91, 95 (Colo. 1979) (citing Joseph Burstyn, Inc., 343 U.S. at 502–03, and Kovacs v. Cooper, 336 U.S. 77, 97 (1949) (Jackson, J., concurring)). In this case, we are alert to the 27 competing concerns that “[s]ocial media make hateful and threatening speech more common but also magnify the potential for a speaker’s innocent words to be misunderstood.” Lyrissa Barnett Lidsky & Linda Riedemann Norbut, #I U: Considering the Context of Online Threats, 106 Calif. L. Rev. 1885, 1885 (2018). ¶48 Words communicated online and without the interpretive aid of body language are easily misconstrued. Indeed, our reliance on nonverbal cues was implicit in Chaplinksy, where the U.S. Supreme Court first articulated the “fighting words” doctrine. There, the Court recognized that “[t]he English language has a number of words and expressions which by general consent are ‘fighting words’ when said without a disarming smile.” 315 U.S. at 573 (emphasis added) (quoting State v. Chaplinsky, 18 A.2d 754, 762 (N.H. 1941)). Modern replacements for such cues, like emojis and gifs, often lack standard meaning and can be difficult to interpret. Complicating things further, emojis may look different depending on the sender’s or recipient’s operating system. For one example, an emoji that resembles a toy squirt gun in a message sent on one platform may appear as a revolver on a recipient device. Cf. Lidsky & Norbut, supra, at 1908 (explaining that the gun emoji in the article’s title “looks like a space pistol on some platforms and like a revolver on others”). ¶49 The chance of meaning being lost in translation is heightened by the potential for online speech to be read far outside its original context. These days, 28 one needs no more than a whim and a smartphone to broadcast to a massive audience. A message posted in Denver can reach New York, Tokyo, or Munich in an instant. Indeed, the term “viral” is apt for the rapidity with which an online statement can spread. A recipient might retransmit a message to audiences not foreseeable to the original speaker. A message might be recirculated after an intervening event that alters its impact. And online speech transmitted in the heat of the moment—which, if uttered verbally, would not linger beyond the speaker’s apology—might be archived and subjected to scrutiny years after the fact. ¶50 The risk of mistaking protected speech for a true threat is high. But so are the stakes of leaving true threats unregulated. With the click of a button or tap of a screen, a threat made online can inflict fear on a wide audience. See, e.g., Julie Turkewitz & Jack Healy, ‘Infatuated’ with Columbine: Threats and Fear, 20 Years After a Massacre, N.Y. Times (Apr. 17, 2019), https://www.nytimes.com/2019/04/17/us/columbine-shooting-sol-pais.html (reporting that “millions of parents, students, and educators across Colorado” awoke on Columbine’s 20th anniversary to news of an individual’s alarming social media posts and threats to friends and family, and that hundreds of schools across the state closed in response). Indeed, a single online post can trigger the diversion of significant law enforcement resources. See, e.g., United States v. Bradbury, 848 F.3d 799, 802 (7th Cir. 2017) (observing that defendant’s Facebook post 29 precipitated an extensive police investigation). Or such a threat may be directed to a known and vulnerable victim in the privacy of their home. See Elonis, 135 S. Ct. at 2017 (Alito, J., concurring in part and dissenting in part) (“Threats of violence and intimidation are among the most favored weapons of domestic abusers, and the rise of social media has only made those tactics more commonplace.”). Online communication—in particular, the ability to communicate anonymously—enables unusually disinhibited communication, magnifying the danger and potentially destructive impact of threatening language on victims. See Reno v. ACLU, 521 U.S. 844, 889 (1997) (O’Connor, J., concurring) (“[C]yberspace allows speakers and listeners to mask their identities.”). In short, technological innovation has provided apparent license and a ready platform to those wishing to provoke terror. ¶51 Given this changed landscape, we are convinced that the various objective tests previously articulated by this court and the court of appeals are insufficient to distinguish “what is a [true] threat . . . from what is constitutionally protected speech.” Watts, 394 U.S. at 707. Judging a statement from the vantage point of a “reasonable speaker” or “reasonable listener,” in our view, inadequately accounts for potentially vast differences in speakers’, listeners’, and disinterested fact-finders’ frames of reference. We therefore hold that a true threat is a statement that, considered in context and under the totality of the circumstances, an intended 30 or foreseeable recipient would reasonably perceive as a serious expression of intent to commit an act of unlawful violence.21 We believe that this refinement of the objective standard strikes a better balance between giving breathing room to free expression and protecting against the harms that true threats inflict. ¶52 In determining whether a statement is a true threat, a reviewing court must examine the words used, but it must also consider the context in which the statement was made. Particularly where the alleged threat is communicated online, the contextual factors courts should consider include, but are not limited to (1) the statement’s role in a broader exchange, if any, including surrounding events; (2) the medium or platform through which the statement was communicated, including any distinctive conventions or architectural features; (3) the manner in which the statement was conveyed (e.g., anonymously or not, privately or publicly); (4) the relationship between the speaker and recipient(s); and (5) the subjective reaction of the statement’s intended or foreseeable recipient(s). 21In the absence of additional guidance from the U.S. Supreme Court, we decline today to say that a speaker’s subjective intent to threaten is necessary for a statement to constitute a true threat for First Amendment purposes. But even assuming that the First Amendment requires proof of such subjective intent, the statute here required the government to show beyond a reasonable doubt that R.D. “initiate[d] communication . . . in a manner intended to . . . threaten bodily injury.” § 18-9-111(1)(e). 31 ¶53 Courts should start, of course, with the words themselves, along with any accompanying symbols, images, and other similar cues to the words’ meaning. Cf. United States v. Edwards, No. 2:17-CR-170, 2018 WL 456320, at *2 (S.D. Ohio Jan. 17, 2018) (in witness retaliation case, analyzing Facebook post that called confidential informant a snitch and included laughing faces and a skull emoji). This inquiry should include whether the threat contains accurate details tending to heighten its credibility. See, e.g., Elonis, 135 S. Ct. at 2005–06 (noting the accuracy of the details in defendant’s Facebook post conveying a threat against his wife, including a diagram of her house and directions to “fire a mortar launcher . . . from the cornfield behind it because of easy access to a getaway road” and “a clear line of sight through the sun room”). It should also examine whether the speaker said or did anything to undermine the credibility of the threat. See, e.g., Watts, 394 U.S. at 707–08 (noting that petitioner’s threat to kill the President was made conditional upon induction into the Armed Forces, an event petitioner vowed would never occur). ¶54 Importantly, “what a defendant actually said is just the beginning of a threats analysis.” Haughwout v. Tordenti, 211 A.3d 1, 11 (Conn. 2019). For example, a veiled statement may carry a true threat. See, e.g., Jeffries, 692 F.3d at 482 (“[O]ne cannot duck [a threats prosecution] merely by delivering the threat in verse or by dressing it up with political (and protected) attacks on the legal system.”); Planned 32 Parenthood of Columbia/Willamette, Inc. v. Am. Coal. of Life Activists, 290 F.3d 1058, 1062–63 (9th Cir. 2002) (en banc) (concluding that, viewed in context, “Wanted”-style posters listing the names of doctors who had performed abortions could be true threats); cf. Elonis, 135 S. Ct. at 2015 (Alito, J., concurring in part and dissenting in part) (“To hold otherwise would grant a license to anyone who is clever enough to dress up a real threat in the guise of rap lyrics, a parody, or something similar.”). On the other hand, words that are threatening on their face may actually be just creative expression, jest, or hyperbole. See, e.g., Jeffries, 692 F.3d at 482 (“[A] song, a poem, a comedy routine or a music video is the kind of context that may undermine the notion that the threat was real.”); Burge v. Colton Sch. Dist. 53, 100 F. Supp. 3d 1057, 1060, 1069 (D. Or. 2015) (concluding eighth grader’s comment on Facebook that a teacher at school “need[ed] to be shot” was reasonably understood to be merely a critique of the teacher’s skills); State v. Boettger, 450 P.3d 805, 818 (Kan. 2019) (imagining a police protester standing near police officers and quoting the lyrics of N.W.A.’s “Fuck tha Police,” (Straight Outta Compton (Ruthless/Priority 1989)), “[t]ak[e] out a cop or two”). In short, words matter. But so does context. ¶55 Particularly when evaluating online communication, courts should consider whether the statement was part of a larger exchange, including surrounding events. If so, the court should take note of the overall tone of that conversation, as 33 well as the origin of the allegedly threatening language—for example, whether it was spontaneous or responsive to some other communication. It should also consider how surrounding events may impact the statement’s tenor. United States v. Voneida, 337 F. App’x 246, 248 (3d Cir. 2009) (concluding that recency of Virginia Tech shooting supported finding that student’s posts to his MySpace page, including that “[s]omeday [he would] make the Virginia Tech incident look like a trip to an amusement park,” were true threats). But see Watts, 394 U.S. at 711 (Douglas, J., concurring) (noting danger of policing alleged threats “under circumstances when intolerance for free speech [is] much greater than it normally might be” (quoting Note, Threatening the President: Protected Dissenter or Political Assassin, Geo. L. J. 553, 570 (1969))). ¶56 Relatedly, the court should consider the medium or platform used to communicate the alleged threat. First, the choice of medium itself may be revealing. See, e.g., United States v. Bagdasarian, 652 F.3d 1113, 1120–21 (9th Cir. 2011) (reasoning that posting violent messages about the President on financial message board blunts the perception that the statements are true threats). And evidence regarding prevailing norms in a particular genre or even internet subforum may also help recast violent language in a less threatening light. See, e.g., Bell v. Itawamba Cty. Sch. Bd., 774 F.3d 280, 301 (5th Cir. 2014) (noting that “hyperbolic and violent language is a commonly used narrative device in rap, 34 which functions to convey emotion and meaning—not to make real threats of violence”). In the context of social media, the court should also consider the platform’s distinctive architectural features, cf. Unsworth v. Musk, No. 2:18-CV-08048-SVW-JC, 2019 WL 4543110, at *6–7 (C.D. Cal. May 10, 2019) (in defamation case, reasoning that Twitter’s 280-character limit rendered dubious the notion that short-hand supports an inference that text in question was opinion rather than fact), and conventions, see, e.g., Matter of Welfare of A.J.B., 929 N.W.2d 840, 844 (Minn. 2019) (distinguishing direct messages from mentions on Twitter). ¶57 The manner in which the statement was conveyed may also provide insight. For example, “a speaker’s anonymity could influence a listener’s perception of danger.” Bagdasarian, 652 F.3d at 1120–21 (but concluding there was no reason in that case to think the speaker’s anonymity made it more, rather than less, likely that a violent post regarding the President was a serious threat). The directness of the message may also be revealing. See, e.g., Elonis, 135 S. Ct. at 2016 (Alito, J., concurring in part and dissenting in part) (“‘Taken in context,’ lyrics in songs that are performed for an audience or sold in recorded form are unlikely to be interpreted as a real threat to a real person,” whereas “[s]tatements on social media that are pointedly directed at their victims . . . are much more likely to be taken seriously.”); A.J.B., 929 N.W.2d at 865 (Chutich, J., concurring in part and dissenting in part) (reasoning that accused’s having posted a “tweet storm of 40 35 posts, all of which specifically tagged [the target’s] Twitter handle,” supported a finding of malicious intent). ¶58 Courts should also consider the speaker’s familiarity with the recipients or targets of the threat and the nature of the relevant parties’ personal history. For example, in Elonis, the defendant’s alleged threats included lyrics posted to Facebook that threatened violence against his wife soon after she left him and took with her their two children. 135 S. Ct. at 2004. Relatedly, courts should consider whether a threat’s intended recipient or target is particularly vulnerable, whether because of personal characteristics or the parties’ relationship. See, e.g., A.J.B., 929 N.W.2d at 844 (considering “an unrelenting torrent of cruel tweets at . . . an individual diagnosed with autism and Attention Deficit Hyperactivity Disorder” encouraging the target to commit suicide). ¶59 Finally, the subjective reaction of a statement’s target or foreseeable recipients will be an important clue as to whether the message is a true threat. See, e.g., Watts, 394 U.S. at 708 (reasoning that in part because of listeners’ laughing response, defendant’s statement could not be interpreted as true threat). This inquiry need not be limited to the recipient’s immediate reaction. See, e.g., D.J.M. v. Hannibal Pub. Sch. Dist. No. 60, 647 F.3d 754, 758, 764 (8th Cir. 2011) (teenage recipient of threats via instant message initially responded “lol”—shorthand for “laughing out loud”—but was concerned enough to tell trusted adult); Haughwout, 36 211 A.3d at 14 (observing that some students initially “elected to treat [the remarks at issue] as made in jest,” but that “some of those same students nevertheless were sufficiently perturbed to contact the university police”). ¶60 That said, courts should be wary of placing significant weight on the subjective reaction of a statement’s unintended recipients. To do so risks punishing a speaker for the content of a message that has been decoupled from its context. This is of heightened concern given the vast temporal, geographic, and cultural distance current technology permits speech to travel. We are mindful that someone who stumbles upon a message he perceives as threatening may experience sincere fear and anxiety. But to construe the true threats exception to protect every passive internet user from the risk of such harms gives the doctrine too wide a scope. ¶61 Moreover, a listener’s subjective reaction, without more, should not be dispositive of whether a statement is a true threat. We acknowledge that the true threats exception serves to protect individuals from “the fear of violence,” and “from the disruption that fear engenders.” R.A.V., 505 U.S. at 388. But whether a particular reader or listener will react with fear to particular words is far too unpredictable a metric for First Amendment protection. Such a rule would not give sufficient “breathing space” to the freedom of speech. Cf. Chaplinsky, 315 U.S. 37 at 573 (“The word ‘offensive’ is not to be defined in terms of what a particular addressee thinks.” (quoting Chaplinsky, 18 A.2d at 762)). ¶62 The factors discussed here are not meant to constitute an exhaustive list. Depending on the facts and circumstances, other considerations may be relevant to the overarching goal of examining a statement in all its context to discern whether it is a true threat or protected expression. Relatedly, the fact-finder has discretion to weigh each factor in the balance, and to decide whether a particular factor cuts for or against finding a true threat. Finally, in considering each factor, courts may find it helpful to admit expert testimony to help illuminate coded meanings, explain community norms and conventions, or bridge other contextual gaps. III. Application A. Standard of Review ¶63 Whether a particular statement constitutes a true threat is an issue of fact to be determined by the fact finder in the first instance. People v. Chase, 2013 COA 27, ¶ 70, 411 P.3d 740, 754; State v. Johnston, 127 P.3d 707, 712 (Wash. 2006). But in First Amendment speech cases, an appellate court must make an independent examination of the record to assure itself that the judgment does not impermissibly intrude on the field of free expression. Chase, ¶ 70, 411 P.3d at 754. Thus, whether 38 a statement constitutes a true threat is a matter subject to independent review. Johnston, 127 P.3d at 712. B. R.D.’s As-Applied Challenge ¶64 It is unclear from the record what standard the trial court applied in concluding that R.D.’s “particular type of speech is not protected under the First Amendment.” The court heard argument from counsel but took no evidence on that question. Moreover, the trial transcript reveals that the court did not reconsider R.D.’s constitutional argument at the close of the prosecution’s case or in the final ruling adjudicating R.D. delinquent. And in judging R.D.’s tweets against the elements of section 18-9-111(1)(e), the trial court actively disregarded testimony suggesting that A.C. and J.W. did not take R.D.’s messages seriously, considering their reaction irrelevant under the statute. As stated above, their reaction was a relevant factor to consider under the First Amendment. ¶65 Because we have clarified the test to be used when evaluating whether a statement constitutes a true threat, the trial court is in the best position to review the record, to take further evidence in its discretion, and to reach a conclusion on the matter. IV. Conclusion ¶66 We hold that a true threat is a statement that, considered in context and under the totality of the circumstances, an intended or foreseeable recipient would 39 reasonably perceive as a serious expression of intent to commit an act of unlawful violence. In determining whether a statement is a true threat, a reviewing court must examine the words used, but it must also consider the context in which the statement was made. Particularly where the alleged threat is communicated online, the contextual factors courts should consider include, but are not limited to (1) the statement’s role in a broader exchange, if any, including surrounding events; (2) the medium or platform through which the statement was communicated, including any distinctive conventions or architectural features; (3) the manner in which the statement was conveyed (e.g., anonymously or not, privately or publicly); (4) the relationship between the speaker and recipient(s); and (5) the subjective reaction of the statement’s intended or foreseeable recipient(s). ¶67 We agree with the parties that in this case, the government must also prove that R.D. had the subjective intent to threaten. We need not decide today whether the First Amendment requires that showing in every threats prosecution. ¶68 Because neither the juvenile court nor the court of appeals had the benefit of the framework we adopt today, we reverse the judgment of the court of appeals and remand with instructions to return the case to the juvenile court to reconsider the adjudication applying this refined test. 40 41