Computer / Internet Based Child Pornography Crimes
Total Page:16
File Type:pdf, Size:1020Kb
COMPUTER CRIMES & COMPUTER / INTERNET BASED CHILD PORNOGRAPHY CRIMES By: G. PATRICK BLACK Federal Public Defender Eastern District of Texas 110 N. College, Suite 1122 Tyler, Texas 75702 (903) 531-9233 KENNETH R. HAWK, II Assistant Federal Public Defender Eastern District of Texas 110 N. College, Suite 1122 Tyler, Texas 75702 (903) 531-9233 “The Internet has truly become the devil’s playground.” – U.S. District Court Judge Frederic N. Smallkin Eastern District Bench Bar Conference October 24-26, 2012 Plano, Texas i Table of Contents I. INTRODUCTION. 1 II. THE DEFENSE FOCUS: ON THE COMPUTER. 2 III. UNAUTHORIZED COMPUTER ACCESS (INTRUDERS/HACKERS), 18 U.S.C. § 1030. 3 A. 18 U.S.C. § 1030. 3 B. NEW SENTENCING GUIDELINES FOR § 1030. 5 C. HACKERS DEFENSE: THE TROJAN HORSE. 6 D. SPYWARE PROGRAMS. 6 IV. ILLEGAL CAPTURE, TRAFFICKING, AND POSSESSION OF COMPUTER ACCESS DEVICES AND PASSWORDS, 18 U.S.C. § 1029 & 18 U.S.C. § 1030 . 7 V. IDENTITY THEFT, 18 U.S.C. § 1028. 9 VI. CYBERSTALKING. 11 A. WHAT IS CYBERSTALKING?.. 11 B. FEDERAL CYBERSTALKING LAWS.. 11 VII. INTERNET FRAUD . 13 A. INTRODUCTION. 13 B. ONLINE DRUG SALES, HEALTH CARE, AND HEALTH PRODUCT FRAUD. 14 C. INTERNET AUCTION FRAUD. 14 D. INTERNET GAMBLING PAYMENTS PROHIBITION ACT.. 15 E. INTERNET INVESTMENT SCAMS. 17 F. NEW ANTI SPAM LEGISLATION.. 18 VIII. INTELLECTUAL PROPERTY CRIMES. 18 IX. THE PRIVACY PROTECTION ACT OF 1980, 42 U.S.C. § 2000AA. 20 Computer and Internet Crimes ii X. PORNOGRAPHY & THE INTERNET. 22 A. LAW ENFORCEMENT OPERATIONS 1. Historical Perspective.. 22 2. Noteworthy Operations. 22 3. First Conviction Under Section 2251A of the Protect Act Since the Enhanced Penalties Became Effective. 23 4. Internet Providers to create database to combat child porn. 24 B. COMPUTER BULLETIN BOARDS, DEFINITIONS AND GRAPHICS TECHNOLOGY 1. Computer Bulletin Boards and Electronic Mail. 24 2. Child Pornography Definition.. 25 “Virtual Child Pornography”. 25 “Pseudo Child Pornography”.. 25 C. THE RELEVANT STATUTES 1. The Most Recent Formulation: The 2003 PROTECT Act. 26 2. Protection of Children From Sexual Predators Act of 1998. 26 3. The Previous Version: 18 U.S.C. § 2252A. 27 4. The Earlier Version: 18 U.S.C. § 2252. 27 5. Other Related Statutes.. 27 6. Definitions, Elements, Jury Instructions, and Duplicative Charging. 27 Visual Depictions.. 27 Mens Rea and Knowledge. 28 Matters and Materials. 28 Interstate Commerce. 29 Production. 31 Lasciviousness. 31 Transmissions.. 32 Miscellaneous. 32 1. Crime of Violence.. 32 2. Extraterritorial Application.. 32 3. Evidence Stipulation. 31 Jury Instructions.. 33 Duplicative Charging. 33 D. CONSTITUTIONAL ISSUES AND CASE LAW 1. Constitutional Challenges. 33 2. Communications Decency Act (the “CDA”) and Child Online Protection Act (COPA). 34 3. Child Pornography Prevention Act of 1996 (the “CPPA”). 34 A. Historical Perspective. 35 B. Ashcroft v. Free Speech Coalition.. 35 E. PRETRIAL DETENTION. 36 F. PRETRIAL HEARINGS, DISCOVERY, AND GOVERNMENT DISCOVERY VIOLATIONS.. 37 G. SEARCH AND SEIZURE. 39 Computer and Internet Crimes iii H. EVIDENCE: MEDICAL EXPERTS (TANNER STAGING); AGE OF CHILD; REAL CHILD. 43 I. ENTRAPMENT, IMPOSSIBILITY, AND OTHER DEFENSES 1. Affirmative Defenses. 45 Number of Depictions. 45 Subject was an Adult. 45 Good Faith Effort to Destroy or Report. 45 2. Entrapment. 46 3. Impossibility Defense. 47 4. The “Knowingly” Requirement of § 2252. 47 5. Sufficiency of the Evidence. 48 J. SENTENCING GUIDELINES. 48 1. A Judge’s Struggle. 48 2. The “Feeney Amendment” and Departures.. 49 3. 5K2.0 Departures. 49 4. Book/Fanfan Decided: A New Era in Federal Sentencing .. 50 5. U.S.S.G. § 2G2.2. 52 6. Computer Enhancement. .54 7. Prepubescent Minor or Minor Children Under Age 12.. 55 8. Distribution Enhancement.. 55 9. Sadistic or Masochistic Portrayal Enhancement. 55 10. Pattern of Sexual Exploitation. 56 11. Minor Role Adjustment. ..