Computer / Internet Based Child Pornography Crimes

Total Page:16

File Type:pdf, Size:1020Kb

Computer / Internet Based Child Pornography Crimes COMPUTER CRIMES & COMPUTER / INTERNET BASED CHILD PORNOGRAPHY CRIMES By: G. PATRICK BLACK Federal Public Defender Eastern District of Texas 110 N. College, Suite 1122 Tyler, Texas 75702 (903) 531-9233 KENNETH R. HAWK, II Assistant Federal Public Defender Eastern District of Texas 110 N. College, Suite 1122 Tyler, Texas 75702 (903) 531-9233 “The Internet has truly become the devil’s playground.” – U.S. District Court Judge Frederic N. Smallkin Eastern District Bench Bar Conference October 24-26, 2012 Plano, Texas i Table of Contents I. INTRODUCTION. 1 II. THE DEFENSE FOCUS: ON THE COMPUTER. 2 III. UNAUTHORIZED COMPUTER ACCESS (INTRUDERS/HACKERS), 18 U.S.C. § 1030. 3 A. 18 U.S.C. § 1030. 3 B. NEW SENTENCING GUIDELINES FOR § 1030. 5 C. HACKERS DEFENSE: THE TROJAN HORSE. 6 D. SPYWARE PROGRAMS. 6 IV. ILLEGAL CAPTURE, TRAFFICKING, AND POSSESSION OF COMPUTER ACCESS DEVICES AND PASSWORDS, 18 U.S.C. § 1029 & 18 U.S.C. § 1030 . 7 V. IDENTITY THEFT, 18 U.S.C. § 1028. 9 VI. CYBERSTALKING. 11 A. WHAT IS CYBERSTALKING?.. 11 B. FEDERAL CYBERSTALKING LAWS.. 11 VII. INTERNET FRAUD . 13 A. INTRODUCTION. 13 B. ONLINE DRUG SALES, HEALTH CARE, AND HEALTH PRODUCT FRAUD. 14 C. INTERNET AUCTION FRAUD. 14 D. INTERNET GAMBLING PAYMENTS PROHIBITION ACT.. 15 E. INTERNET INVESTMENT SCAMS. 17 F. NEW ANTI SPAM LEGISLATION.. 18 VIII. INTELLECTUAL PROPERTY CRIMES. 18 IX. THE PRIVACY PROTECTION ACT OF 1980, 42 U.S.C. § 2000AA. 20 Computer and Internet Crimes ii X. PORNOGRAPHY & THE INTERNET. 22 A. LAW ENFORCEMENT OPERATIONS 1. Historical Perspective.. 22 2. Noteworthy Operations. 22 3. First Conviction Under Section 2251A of the Protect Act Since the Enhanced Penalties Became Effective. 23 4. Internet Providers to create database to combat child porn. 24 B. COMPUTER BULLETIN BOARDS, DEFINITIONS AND GRAPHICS TECHNOLOGY 1. Computer Bulletin Boards and Electronic Mail. 24 2. Child Pornography Definition.. 25 “Virtual Child Pornography”. 25 “Pseudo Child Pornography”.. 25 C. THE RELEVANT STATUTES 1. The Most Recent Formulation: The 2003 PROTECT Act. 26 2. Protection of Children From Sexual Predators Act of 1998. 26 3. The Previous Version: 18 U.S.C. § 2252A. 27 4. The Earlier Version: 18 U.S.C. § 2252. 27 5. Other Related Statutes.. 27 6. Definitions, Elements, Jury Instructions, and Duplicative Charging. 27 Visual Depictions.. 27 Mens Rea and Knowledge. 28 Matters and Materials. 28 Interstate Commerce. 29 Production. 31 Lasciviousness. 31 Transmissions.. 32 Miscellaneous. 32 1. Crime of Violence.. 32 2. Extraterritorial Application.. 32 3. Evidence Stipulation. 31 Jury Instructions.. 33 Duplicative Charging. 33 D. CONSTITUTIONAL ISSUES AND CASE LAW 1. Constitutional Challenges. 33 2. Communications Decency Act (the “CDA”) and Child Online Protection Act (COPA). 34 3. Child Pornography Prevention Act of 1996 (the “CPPA”). 34 A. Historical Perspective. 35 B. Ashcroft v. Free Speech Coalition.. 35 E. PRETRIAL DETENTION. 36 F. PRETRIAL HEARINGS, DISCOVERY, AND GOVERNMENT DISCOVERY VIOLATIONS.. 37 G. SEARCH AND SEIZURE. 39 Computer and Internet Crimes iii H. EVIDENCE: MEDICAL EXPERTS (TANNER STAGING); AGE OF CHILD; REAL CHILD. 43 I. ENTRAPMENT, IMPOSSIBILITY, AND OTHER DEFENSES 1. Affirmative Defenses. 45 Number of Depictions. 45 Subject was an Adult. 45 Good Faith Effort to Destroy or Report. 45 2. Entrapment. 46 3. Impossibility Defense. 47 4. The “Knowingly” Requirement of § 2252. 47 5. Sufficiency of the Evidence. 48 J. SENTENCING GUIDELINES. 48 1. A Judge’s Struggle. 48 2. The “Feeney Amendment” and Departures.. 49 3. 5K2.0 Departures. 49 4. Book/Fanfan Decided: A New Era in Federal Sentencing .. 50 5. U.S.S.G. § 2G2.2. 52 6. Computer Enhancement. .54 7. Prepubescent Minor or Minor Children Under Age 12.. 55 8. Distribution Enhancement.. 55 9. Sadistic or Masochistic Portrayal Enhancement. 55 10. Pattern of Sexual Exploitation. 56 11. Minor Role Adjustment. ..
Recommended publications
  • Two Defendants Plead Guilty in Internet Music Piracy Crackdown
    ________________________________________________________________________ FOR IMMEDIATE RELEASE CRM FRIDAY, APRIL 20, 2007 (202) 514-2008 WWW.USDOJ.GOV TDD (202) 514-1888 TWO DEFENDANTS PLEAD GUILTY IN INTERNET MUSIC PIRACY CRACKDOWN WASHINGTON – Two defendants pleaded guilty to conspiracy to unlawfully reproduce and distribute copyrighted music over the Internet, Assistant Attorney General Alice S. Fisher of the Criminal Division and U.S. Attorney Chuck Rosenberg of the Eastern District of Virginia announced today. Arthur Gomez, 25, of La Habra, Calif., pleaded guilty before U.S. District Judge Leonie M. Brinkema. His sentencing has been scheduled for July 13, 2007 at 9:00 a.m. Sergey Ribiakost, 21, of Bardonia, N.Y., pleaded guilty on April 17, 2007, before U.S. District Judge James C. Cacheris. His sentencing is scheduled for July 10, 2007, at 1:00 p.m. Both defendants pleaded guilty to one count of conspiracy to commit copyright infringement and face up to five years in prison, a fine of $250,000, and three years of supervised release. Gomez and Ribiakost were leading members in the illegal software, game, movie and music trade online, commonly referred to as the warez scene. The defendants were active members of the pre-release music group Apocalypse Crew (APC), one of a handful of organized online criminal groups that acted as “first-providers” of much of the pirated music available on the Internet. As a pre-release music group, APC sought to acquire digital copies of songs and albums before their commercial release in the United States. The supply of such pre-release music was often provided by music industry insiders, such as radio DJs, employees of music magazine publishers, or workers at compact disc manufacturing plants, who frequently receive advance copies of songs prior to their commercial release.
    [Show full text]
  • 79385 AMA Conference Cover:Mppcover2
    79385_AMA_conference Cover:MPPCover2 4/17/08 4:53 PM Page 1 2008 MARKETING and 2008 PUBLIC POLICY Conference Proceedings MARKETING VOLUME 18 and EDITORS PUBLIC POLICY John Kozup Charles R. Taylor Ronald Paul Hill Conference Proceedings May 29–May 31, 2008 Loews Hotel Philadelphia, Pennsylvania VOLUME 18 Life, Liberty, and the Pursuit of Sound Policy: Research at the Birthplace of Our Democracy Marketing and Public Policy Conference Proceedings 2008 “Life, Liberty, and the Pursuit of Sound Policy: Research at the Birthplace of Our Democracy” May 29–31, 2008 Loews Hotel Philadelphia, Pennsylvannia Editors: John Kozup Charles R. Taylor Ronald Paul Hill Volume 18 311 South Wacker Drive, Suite 58 • Chicago, Illinois 60606 PROGRAM COMMITTEE Natalie Adkins, Creighton University Gregory T. Gundlach, University of North Florida Kathryn Aikin, Food and Drug Administration Jane Hoek, Massey University Alan Andreasen, Georgetown University Jeanne Hogarth, Federal Reserve Board J. Craig Andrews, Marquette University Pauline Ippolito, Federal Trade Commission Lauren Block, Baruch College/CUNY Alan Levy, Food and Drug Administration Paul N. Bloom, Duke University Ingrid M. Martin, California State Univ. Long Beach Scot Burton, University of Arkansas Rob Mayer, University of Utah Jack Calfee, American Enterprise Institute Michael Mazis, American University Les Carlson, Clemson University Julie Ozanne, Virginia Polytechnic Institute Mary Culnan, Bentley College Janis K. Pappalardo, Federal Trade Commission Pam Scholder Ellen, Georgia State University Connie Pechman, University of California, Irvine Gary Ford, American University Ross Petty, Babson College Copyright © 2008, American Marketing Association Printed in the United States of America Composition by Marie Steinhoff, Southeast Missouri State University Cover design by Jeanne Nemcek ISBN: 0-87757-332-8 All rights reserved.
    [Show full text]
  • Oil Wells Seized in ICE Money Laundering Case
    Oil Wells Seized In ICE Money Laundering Case n ICE investigation into a drug Amoney laundering scheme resulted 3 Red Flag Indicators in the January 25 seizure of an Arizona • Frequent or unusual use of trust funds in oil company and 43 oil wells in business transactions or financial activity. northwest Pennsylvania. • Financial transactions to countries known to be tax havens. A number of the company’s trusts and • Frequent use of nominee business owners acting bank accounts in Europe were also seized as representatives in transactions. as a result of the investigation, which stemmed from the 1981 drug smuggling The seized company, Shaboom Oil Inc., conviction of Paul Hindelang. headquartered in Phoenix, Arizona, owned numerous operating wells and Safeguarding America Through “Like no other case in recent memory, this held the mineral rights to approximately Financial And Trade Investigations investigation demonstrates our perseverance in tracking down the ill-gotten gains of 1,100 acres of land in the Allegheny Volume II: No. 1 • February 2005 international crime lords,” said Jesus Torres, National Forest in northwest Pennsylvania. ICE’s Special Agent-in-Charge for Miami. In addition, ICE seized all ownership Inside this Issue shares of Shaboom Investments Inc., In the 1970s, Hindelang headed one of the a holding company based in Panama Cornerstone Investigations Updates: country’s biggest marijuana smuggling that owns the oil company. Selected Recent Cases . 2 enterprises, operating out of Florida. He Industry Alert: Stopping The Flow pled guilty to importing roughly 250 tons The oil company and associated assets seized Of Counterfeit Drugs . 3 of marijuana into the United States and in January were valued at $6.5 million— conspiring to import an additional bringing the total seized from Hindelang’s ICE Agents Honored For illicit investments to more than $70 mil- Intellectual Property Protection .
    [Show full text]
  • Auction 110 Procedures Public Notice
    PUBLIC NOTICE Federal Communications Commission 45 L Street, NE News Media Information: 202-418-0500 Internet: www.fcc.gov Washington, DC 20554 TTY: 888-835-5322 DA 21-655 Released: June 9, 2021 AUCTION OF FLEXIBLE-USE SERVICE LICENSES IN THE 3.45–3.55 GHz BAND FOR NEXT-GENERATION WIRELESS SERVICES NOTICE AND FILING REQUIREMENTS, MINIMUM OPENING BIDS, UPFRONT PAYMENTS, AND OTHER PROCEDURES FOR AUCTION 110 BIDDING IN AUCTION 110 SCHEDULED TO BEGIN OCTOBER 5, 2021 AU Docket No. 21-62 TABLE OF CONTENTS Heading Paragraph # I. GENERAL INFORMATION .................................................................................................................1 A. Introduction.......................................................................................................................................1 B. Background and Relevant Authority ................................................................................................3 C. Description of Licenses to Be Offered in Auction 110.....................................................................7 D. Auction Specifics ............................................................................................................................10 1. Auction Title and Start Date.....................................................................................................10 2. Auction Dates and Deadlines ...................................................................................................13 3. Requirements for Participation.................................................................................................14
    [Show full text]
  • IFCC 2002 Internet Fraud Report January 1, 2002—December 31, 2002
    IFCC 2002 Internet Fraud Report January 1, 2002—December 31, 2002 Prepared by the National White Collar Crime Center and the Federal Bureau of Investigation 2003. The National White Collar Crime Center. All rights reserved. Contents Executive Summary............................................................................................................................ 3 Overview ............................................................................................................................................ 4 General IFCC Filing Information ....................................................................................................... 4 Complaint Characteristics................................................................................................................... 5 Perpetrator Characteristics.................................................................................................................. 7 Complainant Characteristics............................................................................................................... 9 Complainant-Perpetrator Dynamics ................................................................................................... 11 Additional Information About IFCC Complaints..........................................................................… 12 Result of IFCC Referrals ...............................................................................................................… 13 Conclusion.....................................................................................................................................…
    [Show full text]
  • The Political Aesthetics of Global Protest : the Arab Spring and Beyond, P
    eCommons@AKU Individual Volumes ISMC Series 2014 The olitP ical Aesthetics of Global Protest : the Arab Spring and Beyond Pnina Werbner Editor Martin Webb Editor Kathryn Spellman-Poots Editor Follow this and additional works at: https://ecommons.aku.edu/uk_ismc_series_volumes Part of the African History Commons, Asian History Commons, Islamic World and Near East History Commons, and the Political History Commons Recommended Citation Werbner, P. , Webb, M. , Spellman-Poots, K. (Eds.). (2014). The Political Aesthetics of Global Protest : the Arab Spring and Beyond, p. 448. Available at: https://ecommons.aku.edu/uk_ismc_series_volumes/3 The Political Aesthetics of Global Protest The Arab Spring and Beyond Edited by Pnina Werbner, Martin Webb and Kathryn Spellman-Poots in association with THE AGA KHAN UNIVERSITY (International) in the United Kingdom Institute for the Study of Muslim Civilisations The opinions expressed in this volume are those of the authors and do not necessarily reflect those of the Aga Khan University, Institute for the Study of Muslim Civilisations. © editorial matter and organisation Pnina Werbner, Martin Webb and Kathryn Spellman-Poots, 2014 © the chapters, their several authors, 2014 First published in hardback in 2014 by Edinburgh University Press Ltd The Tun – Holyrood Road 12 (2f) Jackson’s Entry Edinburgh eh8 8pj www.euppublishing.com Typeset in Goudy Oldstyle by Koinonia, Manchester and printed and bound in Spain by Novoprint A CIP record for this book is available from the British Library ISBN 978 0 7486 9334 4 (hardback) ISBN 978 0 7486 9335 1 (paperback) ISBN 978 0 7486 9350 4 (webready PDF) ISBN 978 0 7486 9351 1 (epub) The right of the contributors to be identified as authors of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988 and the Copyright and Related Rights Regulations 2003 (SI No.
    [Show full text]
  • Auction Design for Wind Rights Lawrence M
    Auction Design for Wind Rights Lawrence M. Ausubel and Peter Cramton* Power Auctions LLC and Market Design Inc. 9 August 2011 Abstract The best sites for offshore wind farms on the US Outer Continental Shelf are scarce. To make the best use of this scarce resource, it is necessary to implement a fair and efficient mechanism to assign wind rights to companies that are most likely to develop offshore wind energy projects. Coastal states, particularly along the eastern seaboard, are taking aggressive actions to spur the growth of an offshore wind sector in their states to help meet their renewable portfolio targets while nurturing the supporting on‐shore infrastructure. This paper discusses the design of auctions for wind rights in which price is the sole factor of competition. A second paper, Ausubel and Cramton (2011), extends the analysis to auctions in which multiple factors are used in bid evaluation. This may be especially useful in settings where states (and potential bidders) have already taken actions to foster offshore wind development. *This research was funded by the Bureau of Ocean Energy Management, Regulation and Enforcement (BOEMRE) under contract with Power Auctions LLC. We have benefited from the contributions of Phil Ashcroft, Kathy Jacobson, and Karen Wrege of Power Auctions, and Pat Sujarittanonta of Cramton Associates. We thank BOEMRE staff, especially Greg Adams and Marshall Rose, for helpful comments. The views expressed are our own. Larry Ausubel is Professor of Economics at the University of Maryland and Chairman of Power Auctions LLC. Peter Cramton is Professor of Economics at the University of Maryland and Chairman of Market Design Inc.
    [Show full text]
  • Counterfeiting and Theft of Tangible Intellectual Property: Challenges and Solutions
    S. HRG. 108–771 COUNTERFEITING AND THEFT OF TANGIBLE INTELLECTUAL PROPERTY: CHALLENGES AND SOLUTIONS HEARING BEFORE THE COMMITTEE ON THE JUDICIARY UNITED STATES SENATE ONE HUNDRED EIGHTH CONGRESS SECOND SESSION MARCH 23, 2004 Serial No. J–108–62 Printed for the use of the Committee on the Judiciary ( U.S. GOVERNMENT PRINTING OFFICE 98–207 PDF WASHINGTON : 2005 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2250 Mail: Stop SSOP, Washington, DC 20402–0001 VerDate 0ct 09 2002 08:21 Feb 07, 2005 Jkt 098207 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 S:\GPO\HEARINGS\98207.TXT SJUD4 PsN: CMORC COMMITTEE ON THE JUDICIARY ORRIN G. HATCH, Utah, Chairman CHARLES E. GRASSLEY, Iowa PATRICK J. LEAHY, Vermont ARLEN SPECTER, Pennsylvania EDWARD M. KENNEDY, Massachusetts JON KYL, Arizona JOSEPH R. BIDEN, JR., Delaware MIKE DEWINE, Ohio HERBERT KOHL, Wisconsin JEFF SESSIONS, Alabama DIANNE FEINSTEIN, California LINDSEY O. GRAHAM, South Carolina RUSSELL D. FEINGOLD, Wisconsin LARRY E. CRAIG, Idaho CHARLES E. SCHUMER, New York SAXBY CHAMBLISS, Georgia RICHARD J. DURBIN, Illinois JOHN CORNYN, Texas JOHN EDWARDS, North Carolina BRUCE ARTIM, Chief Counsel and Staff Director BRUCE A. COHEN, Democratic Chief Counsel and Staff Director (II) VerDate 0ct 09 2002 08:21 Feb 07, 2005 Jkt 098207 PO 00000 Frm 00002 Fmt 5904 Sfmt 5904 S:\GPO\HEARINGS\98207.TXT SJUD4 PsN: CMORC C O N T E N T S STATEMENTS OF COMMITTEE MEMBERS Page Biden, Hon. Joseph R., Jr., a U.S.
    [Show full text]
  • Encyclopedia of Cybercrime
    ENCYCLOPEDIA OF CYBERCRIME Edited by Samuel C. McQuade, III GREENWOOD PRESS Westport, Connecticut • London Library of Congress Cataloging-in-Publication Data Encyclopedia of cybercrime / edited by Samuel C. McQuade, III. p. cm. Includes bibliographical references and index. ISBN 978-0-313-33974-5 (alk. paper) 1. Computer crimes—Encyclopedias. 2. Internet fraud—Encyclopedias. 3. Computer security— Encyclopedias. 4. Internet fraud—Prevention—Encyclopedias. 5. Computer crimes—United States— Encyclopedias. 6. Internet fraud—United States—Encyclopedias. 7. Computer security—United States —Encyclopedias. 8. Internet fraud—United States—Prevention—Encyclopedias. I. McQuade, Samuel C. HV6773.E53 2009 364.16´803—dc22 2008028523 British Library Cataloguing in Publication Data is available. Copyright © 2009 by Samuel C. McQuade, III All rights reserved. No portion of this book may be reproduced, by any process or technique, without the express written consent of the publisher. Library of Congress Catalog Card Number: 2008028523 ISBN: 978-0-313-33974-5 First published in 2009 Greenwood Press, 88 Post Road West, Westport, CT 06881 An imprint of Greenwood Publishing Group, Inc. www.greenwood.com Printed in the United States of America The paper used in this book complies with the Permanent Paper Standard issued by the National Information Standards Organization (Z39.48-1984). 10987654321 CONTENTS List of Entries vii Preface ix Acknowledgments xi Introduction xiii Chronology of Selected Cybercrime-Related Events xv The Encyclopedia 1 Resource Guide 195
    [Show full text]
  • State of Regtech in APAC by Enterprise Ireland
    1 The State of Regtech in APAC - Evaluation of the Landscape & Market Opportunity for Regtech Companies The State of Regtech in APAC Evaluation of the Landscape & Market Opportunity for Regtech Companies 2021 2 The State of Regtech in APAC - Evaluation of the Landscape & Market Opportunity for Regtech Companies Disclaimer All Rights Reserved. This white paper has been commissioned by Enterprise Ireland to identify and analyse key trends in the Asia-Pacific regtech market. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the owner/publisher, Enterprise Ireland. The information and analysis presented in this report is based on a variety of sources including publications, journals and analysis of data that is part of proprietary research from Kapronasia as well as publicly available sources of information, such as government websites, academic and trade journals, and online media. The facts of this report are believed to be correct at the time of publication but cannot be guaranteed. Please note that the findings, conclusions and recommendations that Enterprise Ireland delivers will be based on information gathered in good faith from both primary and secondary sources, whose accuracy we are not always in a position to guarantee. As such Enterprise Ireland can accept no liability whatever for actions taken based on any information that may subsequently prove to be incorrect. 3 The
    [Show full text]
  • Auction Rules for New Gtlds (Preliminary)
    AUCTION RULES FOR NEW GTLDS (PRELIMINARY) PREPARED FOR ICANN BY POWER AUCTIONS LLC Issued on 31 October 2013 Auction Rules for New gTLDs Table of Contents Definitions and Interpretation ........................................................................................................ 1 Participation in the Auction ............................................................................................................ 1 Auction Process .............................................................................................................................. 2 Auction Information and Scheduling .............................................................................................. 2 Auction Bank Account and Deposits ............................................................................................... 3 Bidding Limits ................................................................................................................................. 3 Participation in an Auction ............................................................................................................. 4 Bidding ............................................................................................................................................ 4 Validity of Bids ................................................................................................................................ 5 Processing of Bids after a Round ...................................................................................................
    [Show full text]
  • Trust and Experience in Online Auctions
    Marquette University e-Publications@Marquette Management Faculty Research and Publications Management, Department of 2018 Trust and Experience in Online Auctions Terence T. Ow Brian I. Spaid Charles A. Wood Sulin Ba Follow this and additional works at: https://epublications.marquette.edu/mgmt_fac Part of the Business Commons Marquette University e-Publications@Marquette Management Faculty Research and Publications/College of Business Administration This paper is NOT THE PUBLISHED VERSION; but the author’s final, peer-reviewed manuscript. The published version may be accessed by following the link in the citation below. Journal of Organizational Computing and Electronic Commerce, Vol. 28, No. 4 (2018) : 294-314. DOI. This article is © Taylor & Francis and permission has been granted for this version to appear in e- Publications@Marquette. Taylor & Francis does not grant permission for this article to be further copied/distributed or hosted elsewhere without the express permission from Taylor & Francis. Trust and Experience in Online Auctions Terence T. Ow Department of Management, College of Business Administration, Marquette University, Milwaukee, WI Brian I. Spaid Department of Marketing, College of Business Administration, Marquette University, Milwaukee, WI Charles A. Wood: ShiftSecure, Philadelphia, PA Sulin Ba Department of Operations and Information Management, School of Business, University of Connecticut, Storrs, CT Abstract: This paper aims to shed light on the complexities and difficulties in predicting the effects of trust and the experience of online auction participants on bid levels in online auctions. To provide some insights into learning by bidders, a field study was conducted first to examine auction and bidder characteristics from eBay auctions of rare coins.
    [Show full text]