The Department of Justice prosecutes most large scale child porn cases. Darren Chaker uploads this in depth article about the intricate details prosecutors for the US Attorney to seek and obtain convictions and keep children safe.
This document summarizes a research paper about the effects of online piracy on the economy and society. It begins by providing background on how online piracy started and increased with advances in digital technology. It discusses how the file sharing program Napster significantly impacted the music industry when it launched in 1999. The researchers then conducted a survey of 50 people to understand online piracy behaviors and attitudes. The survey found that most people pirate music, movies, and software to save money, even though they acknowledge the negative economic effects. Common reasons for piracy included getting content for free. The researchers conclude that online piracy is an issue that requires more attention and policy solutions to address its costs.
Social Media Privacy Laws and Legal LiabilitiesTommy Hobin
The document summarizes potential legal liabilities and lessons learned regarding social media use. It discusses who may be liable for social media content, various regulatory and privacy considerations, and crafting policies for employees and websites. Employment issues and how social media use can raise concerns around discrimination, harassment, and privacy are also covered.
Rebooting digital identity: how the social web is transforming citizen behavi...Patrick McCormick
This document summarizes Patrick McCormick's presentation on how digital identity is being transformed by social media and citizen behaviors online. The presentation covered: 1) How Australians are increasingly spending more time online and on mobile devices, changing expectations. 2) The importance of trust but also verification in the digital world. 3) How identity information is currently fragmented across different silos. 4) Potential new directions for digital identity including user control, reputation, and trusted frameworks.
Presentation by Sara Meaney, co-owner of Comet Branding, a PR+Social Media agency, and Kelly Twigger, owner of ESI Attorneys on the legal implications of social media given at BizTech 2010 in Milwaukee, Wisconsin on April 30, 2010.
A presentation addressing the legal implications of social media.. These issues include privacy, copyright, trademark, and trade secrets issues for employers, employees and ISPs, as well as the SPAM Act and FTC rules. ALL RIGHTS RESERVED. Contact me at dsaper [at]saperlaw.com if you'd like to use the presentation or if you have any questions.
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Shawn Tuma
This legally focused MENGinar will educate you on the risks of using Social Media along with other digital businesses. It will provide ways to help highlight:
What is social media law?
What are the more common legal issues related to businesses using social media?
How social media law can impact businesses?
What can be done to minimize the risks of those potential legal problems related to using social media?
Do the potential issues raised by using social media mean that it is better for my company to not use social media?
Shawn Tuma is a partner at the law firm BrittonTuma, a full service boutique business law firm that helps clients with all civil matters, including a full range of transaction, litigation, technology, and general counseling services. Shawn’s own broad based experience centers on business, technology, civil litigation, intellectual property litigation, and a unique expertise with cutting-edge legal issues such as computer fraud, information security, and cyber and information law.
Shawn is a frequent speaker on digital business risk issues such as computer fraud, data security, and social media law.
Social Media Law: The Legal Do's and Don'ts of Social MediaShawn Tuma
This presentation provides an overview of social media law, that is, the legal issues involved in using social media. The presentation provides practical examples of how those issues come about in the business world and provides ways to minimize the risks associated with those issues, including the use of social media policies.
This document summarizes a research paper about the effects of online piracy on the economy and society. It begins by providing background on how online piracy started and increased with advances in digital technology. It discusses how the file sharing program Napster significantly impacted the music industry when it launched in 1999. The researchers then conducted a survey of 50 people to understand online piracy behaviors and attitudes. The survey found that most people pirate music, movies, and software to save money, even though they acknowledge the negative economic effects. Common reasons for piracy included getting content for free. The researchers conclude that online piracy is an issue that requires more attention and policy solutions to address its costs.
Social Media Privacy Laws and Legal LiabilitiesTommy Hobin
The document summarizes potential legal liabilities and lessons learned regarding social media use. It discusses who may be liable for social media content, various regulatory and privacy considerations, and crafting policies for employees and websites. Employment issues and how social media use can raise concerns around discrimination, harassment, and privacy are also covered.
Rebooting digital identity: how the social web is transforming citizen behavi...Patrick McCormick
This document summarizes Patrick McCormick's presentation on how digital identity is being transformed by social media and citizen behaviors online. The presentation covered: 1) How Australians are increasingly spending more time online and on mobile devices, changing expectations. 2) The importance of trust but also verification in the digital world. 3) How identity information is currently fragmented across different silos. 4) Potential new directions for digital identity including user control, reputation, and trusted frameworks.
Presentation by Sara Meaney, co-owner of Comet Branding, a PR+Social Media agency, and Kelly Twigger, owner of ESI Attorneys on the legal implications of social media given at BizTech 2010 in Milwaukee, Wisconsin on April 30, 2010.
A presentation addressing the legal implications of social media.. These issues include privacy, copyright, trademark, and trade secrets issues for employers, employees and ISPs, as well as the SPAM Act and FTC rules. ALL RIGHTS RESERVED. Contact me at dsaper [at]saperlaw.com if you'd like to use the presentation or if you have any questions.
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Shawn Tuma
This legally focused MENGinar will educate you on the risks of using Social Media along with other digital businesses. It will provide ways to help highlight:
What is social media law?
What are the more common legal issues related to businesses using social media?
How social media law can impact businesses?
What can be done to minimize the risks of those potential legal problems related to using social media?
Do the potential issues raised by using social media mean that it is better for my company to not use social media?
Shawn Tuma is a partner at the law firm BrittonTuma, a full service boutique business law firm that helps clients with all civil matters, including a full range of transaction, litigation, technology, and general counseling services. Shawn’s own broad based experience centers on business, technology, civil litigation, intellectual property litigation, and a unique expertise with cutting-edge legal issues such as computer fraud, information security, and cyber and information law.
Shawn is a frequent speaker on digital business risk issues such as computer fraud, data security, and social media law.
Social Media Law: The Legal Do's and Don'ts of Social MediaShawn Tuma
This presentation provides an overview of social media law, that is, the legal issues involved in using social media. The presentation provides practical examples of how those issues come about in the business world and provides ways to minimize the risks associated with those issues, including the use of social media policies.
How Social Media is Changing the Game in Claims HandlingHNI Risk Services
The document summarizes the status of social media cases in all 50 U.S. states and Washington D.C. It provides brief summaries of relevant cases and ethics opinions from each jurisdiction that relate to the discovery and admissibility of social media evidence. The document is intended to help lawyers and claims adjusters understand how social media is impacting the legal landscape in claims handling across different states.
Social government: a platform for online collaborationPatrick McCormick
1. The document discusses social government and online collaboration and citizen engagement. It talks about using online platforms and social media to engage citizens, listen to their needs, and deliver public services.
2. It emphasizes the need for government to adapt and evolve with new technologies and citizen expectations. This includes taking an open and collaborative approach and empowering citizens through participation and co-production.
3. Key aspects of social government discussed are listening to citizens online, delivering on their expectations, and using social media and online tools to provide services and share information transparently. The goal is to build public trust through open engagement and responsiveness to citizen needs.
Student Data and Its Discontents: How FUD undermined an education reform agendaPatrick McCormick
The document summarizes opposition to the New York Education Data Portal project, which aimed to collect and share student data. It faced criticism over privacy concerns, an uncertain business model, and doubts about improving learning. While proponents argued data could guide instruction, critics saw it as prioritizing corporate interests over teachers and increasing testing burdens. The project ultimately failed due to growing public distrust around how student data was being collected and used.
This document discusses privacy issues and data breaches involving personal information. It summarizes several incidents where large corporations and universities mishandled or lost private records of millions of individuals. It argues that companies prioritize profits over privacy, routinely sharing data without permission. It criticizes media for blaming hackers instead of these companies. The author believes more must be done to hold accountable those who compromise privacy and demand legislative reform to better protect individuals' information and privacy.
1) The document discusses proposed legislation SOPA and PIPA which aim to curb internet piracy by blocking access to websites accused of copyright infringement.
2) It provides context on the history of internet piracy legislation including the shutdown of Napster and legal cases between the RIAA and Verizon.
3) The key concerns with SOPA and PIPA are that they give the government too much power to censor the internet and threaten innovation by collateraly affecting sites like Google, YouTube, and Wikipedia in addition to targeting piracy.
Large companies have increasingly used deceptive tactics on the internet to target audiences and market products, crossing legal and ethical lines regarding privacy and integrity. Edelman created fake blogs for Walmart, Ruckus Network set up a false Facebook profile to collect student info, and Sony admitted making "flog" fake blogs, while AOL released user search data publicly. Similar privacy breaches occurred at Hershey, Mrs. Fields, Xanga, and Myspace. As companies dominate the web, they sometimes overlook laws, so stricter regulations are needed to protect internet users' well-being.
This document summarizes the breakup of AT&T and the establishment of equal access for long distance phone carriers in the United States. It explains that AT&T was broken up into 7 regional "Baby Bell" companies and AT&T was restricted to long distance service only. The 950 exchange was created to provide customers toll-free access to competing long distance companies' dial tones. Eventually, equal access was achieved where customers could choose their long distance carrier and that carrier's network would be used without dialing extra numbers. However, customers who did not choose a carrier would have one randomly assigned to their line. The document also briefly summarizes some news stories about issues arising from the breakup and competition between carriers.
Read-write government: engaging citizens with social mediaPatrick McCormick
The document discusses how governments can engage citizens through social media. It outlines how Australians are increasingly online and mobile, changing citizen expectations around participation. It advocates for a "read-write" approach where governments adopt more open and collaborative models to better engage the public. The document also provides examples of how governments can prototype initiatives, listen to citizens, and build trust on social media.
1. The document provides information on various legal issues related to technology and the internet, including intellectual property, social media policies, online reputation attacks, and identity theft.
2. It discusses legal services offered by Melfi & Associates, such as trademarks, copyrights, patents, and document drafting for things like vendor contracts and privacy policies.
3. The document also covers topics like web 2.0, defamation, the right of publicity, NLRB cases related to social media, remedies for stolen identity and cybersquatting, and personality theft.
This document provides information about a dental seminar hosted by GC Philippines and Prime Orthodontics Studies and Training (POST) holding a commencement ceremony.
The GC Philippines seminar was attended by 230 dental professionals and featured lectures on direct labial veneers, relining procedures, and dental pain management in children. GC's country manager also introduced new composite materials.
POST held its commencement ceremony for graduates of batches 35 and 37. A total of 35 dentists received certificates of completion after a year-long orthodontics training program. Outstanding students received awards for clinical excellence, academic excellence, and most distinguished graduate.
A police officer in Cincinnati, Ohio was arrested and charged with child pornography. Randolph Grote, 42, was indicted after an investigation by Homeland Security for posing as a teenage boy online to engage in inappropriate relationships with minor girls. If convicted, Grote faces state charges in Ohio and could be required to register as a sex offender for life. The article outlines the crime of child predation and explains the elements, applicable state statutes, hardware and software used, and evidence collection protocols. It also discusses prevention, deterrence, and information collection strategies to address this issue.
The document discusses regulation of sexual material on the internet. It notes that while internet pornography is easily accessible, there are concerns about children accidentally encountering such content. Studies show high percentages of children being accidentally or deliberately exposed to sexual images online. There is debate around balancing freedom of expression with protecting children, and countries have different laws regarding what sexual content is allowed or banned.
This document provides a comprehensive overview of pornography and its impact on society. It begins by defining pornography, child pornography, and related terms. It then examines the growth of the pornography industry, noting how advances in technology have allowed it to expand massively. The industry now focuses on increasingly extreme and violent content to drive profits. Child pornography is also discussed, highlighting how it is produced and consumed for different motivations than adult pornography. The document aims to cover key issues related to pornography's influence on various aspects of the criminal justice system.
This document summarizes internet safety tips for parents, including who is most at risk of online predators, techniques predators use, and how to protect children. It provides statistics on online child victimization and solicitation and profiles of arrested predators. It lists general safety tips and parental monitoring and restriction resources to educate children about interacting safely online.
The document discusses ethical issues related to using social media in litigation. It notes that "friending" opposing parties on social media who are represented by counsel is prohibited, but public information on their social media can be viewed. Subpoenas can be issued for social media information, but private messages are protected, and fishing expeditions are not allowed. Authentication of social media evidence can also be challenging. Monitoring jurors' social media use during trial is allowed but direct contact is prohibited. "Friending" judges on social media may be allowed or prohibited depending on the jurisdiction.
This document provides information and advice about internet safety for kids. It discusses common techniques used by cyber child sex offenders to lure children, such as befriending them and gradually soliciting private information. It lists resources for monitoring kids' internet use and warns parents to be aware of personal details kids post online. The document stresses the importance of open communication between parents and kids about internet safety.
Metanomics: Federal Interest in Virtual Worlds and CybersecurityDoug Thompson
The document discusses a Metanomics podcast about government interest in virtual worlds and cybersecurity.
1) Paulette Robinson provides an update on the Federal Consortium for Virtual Worlds, which she started over a year ago. The Consortium has grown significantly, with over 1,000 members from government, industry and academia. It has held conferences attended by hundreds discussing government virtual world projects.
2) Sterling Wright discusses the proposed Cybersecurity Act of 2009, which would expand presidential powers over cyber infrastructure and increase government oversight of private networks. However, concerns have been raised over privacy, censorship and limiting innovation.
3) The podcast guests debate these issues, with Paulette and Rocky Young updating on government virtual world activities
Blogs, Privacy, and User-generated Contentguestc19ad7
1) Several blogs promoting Wal-Mart, a PR client of Edelman, were found to be authored by Edelman employees, not actual customers as presented.
2) Ruckus created a fictional persona to attract customers, deceiving readers about the author's authenticity.
3) Zipatoni used viral marketing techniques like blogs to generate buzz for the Sony PSP without disclosing their involvement.
This document discusses the social networking site MySpace. It provides background on how MySpace was founded by Tom Anderson and Chris DeWolfe after discovering an online karaoke site. It then discusses concerns about safety on MySpace, including reports of sexual predators contacting teens, and the need to educate students about protecting private information online. The document concludes by noting both the popularity and value of social networking for teens, but also the importance of teaching online safety.
Sex Trafficking Survivors Fighting Constant Revictimization.pdfHeatherTapani
This document summarizes a civil lawsuit filed by two Jane Doe plaintiffs against Pornhub and its parent company MindGeek. The plaintiffs allege that videos of their sexual abuse as minors were uploaded and distributed on Pornhub's platforms. They are suing under federal sex trafficking and child pornography laws. Pornhub moves to dismiss the case, arguing they are protected by section 230 of the Communications Decency Act. However, the court finds Pornhub is not immune and the plaintiffs have sufficiently argued their case should proceed based on the Trafficking Victims Protection Act. If successful, the case could set a precedent for other victims and require Pornhub to better moderate content to prevent distribution of child sexual abuse material.
The document discusses several key issues regarding internet law and regulation. It notes that while the internet may seem unregulated, there are some existing laws. However, regulating the internet is difficult due to its worldwide nature and anonymity. Several areas of internet law remain unclear, such as online defamation, the liability of internet service providers, and how to address cyberbullying while protecting free speech rights. Overall the passage examines both existing internet laws and legal issues that courts continue to evaluate.
How Social Media is Changing the Game in Claims HandlingHNI Risk Services
The document summarizes the status of social media cases in all 50 U.S. states and Washington D.C. It provides brief summaries of relevant cases and ethics opinions from each jurisdiction that relate to the discovery and admissibility of social media evidence. The document is intended to help lawyers and claims adjusters understand how social media is impacting the legal landscape in claims handling across different states.
Social government: a platform for online collaborationPatrick McCormick
1. The document discusses social government and online collaboration and citizen engagement. It talks about using online platforms and social media to engage citizens, listen to their needs, and deliver public services.
2. It emphasizes the need for government to adapt and evolve with new technologies and citizen expectations. This includes taking an open and collaborative approach and empowering citizens through participation and co-production.
3. Key aspects of social government discussed are listening to citizens online, delivering on their expectations, and using social media and online tools to provide services and share information transparently. The goal is to build public trust through open engagement and responsiveness to citizen needs.
Student Data and Its Discontents: How FUD undermined an education reform agendaPatrick McCormick
The document summarizes opposition to the New York Education Data Portal project, which aimed to collect and share student data. It faced criticism over privacy concerns, an uncertain business model, and doubts about improving learning. While proponents argued data could guide instruction, critics saw it as prioritizing corporate interests over teachers and increasing testing burdens. The project ultimately failed due to growing public distrust around how student data was being collected and used.
This document discusses privacy issues and data breaches involving personal information. It summarizes several incidents where large corporations and universities mishandled or lost private records of millions of individuals. It argues that companies prioritize profits over privacy, routinely sharing data without permission. It criticizes media for blaming hackers instead of these companies. The author believes more must be done to hold accountable those who compromise privacy and demand legislative reform to better protect individuals' information and privacy.
1) The document discusses proposed legislation SOPA and PIPA which aim to curb internet piracy by blocking access to websites accused of copyright infringement.
2) It provides context on the history of internet piracy legislation including the shutdown of Napster and legal cases between the RIAA and Verizon.
3) The key concerns with SOPA and PIPA are that they give the government too much power to censor the internet and threaten innovation by collateraly affecting sites like Google, YouTube, and Wikipedia in addition to targeting piracy.
Large companies have increasingly used deceptive tactics on the internet to target audiences and market products, crossing legal and ethical lines regarding privacy and integrity. Edelman created fake blogs for Walmart, Ruckus Network set up a false Facebook profile to collect student info, and Sony admitted making "flog" fake blogs, while AOL released user search data publicly. Similar privacy breaches occurred at Hershey, Mrs. Fields, Xanga, and Myspace. As companies dominate the web, they sometimes overlook laws, so stricter regulations are needed to protect internet users' well-being.
This document summarizes the breakup of AT&T and the establishment of equal access for long distance phone carriers in the United States. It explains that AT&T was broken up into 7 regional "Baby Bell" companies and AT&T was restricted to long distance service only. The 950 exchange was created to provide customers toll-free access to competing long distance companies' dial tones. Eventually, equal access was achieved where customers could choose their long distance carrier and that carrier's network would be used without dialing extra numbers. However, customers who did not choose a carrier would have one randomly assigned to their line. The document also briefly summarizes some news stories about issues arising from the breakup and competition between carriers.
Read-write government: engaging citizens with social mediaPatrick McCormick
The document discusses how governments can engage citizens through social media. It outlines how Australians are increasingly online and mobile, changing citizen expectations around participation. It advocates for a "read-write" approach where governments adopt more open and collaborative models to better engage the public. The document also provides examples of how governments can prototype initiatives, listen to citizens, and build trust on social media.
1. The document provides information on various legal issues related to technology and the internet, including intellectual property, social media policies, online reputation attacks, and identity theft.
2. It discusses legal services offered by Melfi & Associates, such as trademarks, copyrights, patents, and document drafting for things like vendor contracts and privacy policies.
3. The document also covers topics like web 2.0, defamation, the right of publicity, NLRB cases related to social media, remedies for stolen identity and cybersquatting, and personality theft.
This document provides information about a dental seminar hosted by GC Philippines and Prime Orthodontics Studies and Training (POST) holding a commencement ceremony.
The GC Philippines seminar was attended by 230 dental professionals and featured lectures on direct labial veneers, relining procedures, and dental pain management in children. GC's country manager also introduced new composite materials.
POST held its commencement ceremony for graduates of batches 35 and 37. A total of 35 dentists received certificates of completion after a year-long orthodontics training program. Outstanding students received awards for clinical excellence, academic excellence, and most distinguished graduate.
A police officer in Cincinnati, Ohio was arrested and charged with child pornography. Randolph Grote, 42, was indicted after an investigation by Homeland Security for posing as a teenage boy online to engage in inappropriate relationships with minor girls. If convicted, Grote faces state charges in Ohio and could be required to register as a sex offender for life. The article outlines the crime of child predation and explains the elements, applicable state statutes, hardware and software used, and evidence collection protocols. It also discusses prevention, deterrence, and information collection strategies to address this issue.
The document discusses regulation of sexual material on the internet. It notes that while internet pornography is easily accessible, there are concerns about children accidentally encountering such content. Studies show high percentages of children being accidentally or deliberately exposed to sexual images online. There is debate around balancing freedom of expression with protecting children, and countries have different laws regarding what sexual content is allowed or banned.
This document provides a comprehensive overview of pornography and its impact on society. It begins by defining pornography, child pornography, and related terms. It then examines the growth of the pornography industry, noting how advances in technology have allowed it to expand massively. The industry now focuses on increasingly extreme and violent content to drive profits. Child pornography is also discussed, highlighting how it is produced and consumed for different motivations than adult pornography. The document aims to cover key issues related to pornography's influence on various aspects of the criminal justice system.
This document summarizes internet safety tips for parents, including who is most at risk of online predators, techniques predators use, and how to protect children. It provides statistics on online child victimization and solicitation and profiles of arrested predators. It lists general safety tips and parental monitoring and restriction resources to educate children about interacting safely online.
The document discusses ethical issues related to using social media in litigation. It notes that "friending" opposing parties on social media who are represented by counsel is prohibited, but public information on their social media can be viewed. Subpoenas can be issued for social media information, but private messages are protected, and fishing expeditions are not allowed. Authentication of social media evidence can also be challenging. Monitoring jurors' social media use during trial is allowed but direct contact is prohibited. "Friending" judges on social media may be allowed or prohibited depending on the jurisdiction.
This document provides information and advice about internet safety for kids. It discusses common techniques used by cyber child sex offenders to lure children, such as befriending them and gradually soliciting private information. It lists resources for monitoring kids' internet use and warns parents to be aware of personal details kids post online. The document stresses the importance of open communication between parents and kids about internet safety.
Metanomics: Federal Interest in Virtual Worlds and CybersecurityDoug Thompson
The document discusses a Metanomics podcast about government interest in virtual worlds and cybersecurity.
1) Paulette Robinson provides an update on the Federal Consortium for Virtual Worlds, which she started over a year ago. The Consortium has grown significantly, with over 1,000 members from government, industry and academia. It has held conferences attended by hundreds discussing government virtual world projects.
2) Sterling Wright discusses the proposed Cybersecurity Act of 2009, which would expand presidential powers over cyber infrastructure and increase government oversight of private networks. However, concerns have been raised over privacy, censorship and limiting innovation.
3) The podcast guests debate these issues, with Paulette and Rocky Young updating on government virtual world activities
Blogs, Privacy, and User-generated Contentguestc19ad7
1) Several blogs promoting Wal-Mart, a PR client of Edelman, were found to be authored by Edelman employees, not actual customers as presented.
2) Ruckus created a fictional persona to attract customers, deceiving readers about the author's authenticity.
3) Zipatoni used viral marketing techniques like blogs to generate buzz for the Sony PSP without disclosing their involvement.
This document discusses the social networking site MySpace. It provides background on how MySpace was founded by Tom Anderson and Chris DeWolfe after discovering an online karaoke site. It then discusses concerns about safety on MySpace, including reports of sexual predators contacting teens, and the need to educate students about protecting private information online. The document concludes by noting both the popularity and value of social networking for teens, but also the importance of teaching online safety.
Sex Trafficking Survivors Fighting Constant Revictimization.pdfHeatherTapani
This document summarizes a civil lawsuit filed by two Jane Doe plaintiffs against Pornhub and its parent company MindGeek. The plaintiffs allege that videos of their sexual abuse as minors were uploaded and distributed on Pornhub's platforms. They are suing under federal sex trafficking and child pornography laws. Pornhub moves to dismiss the case, arguing they are protected by section 230 of the Communications Decency Act. However, the court finds Pornhub is not immune and the plaintiffs have sufficiently argued their case should proceed based on the Trafficking Victims Protection Act. If successful, the case could set a precedent for other victims and require Pornhub to better moderate content to prevent distribution of child sexual abuse material.
The document discusses several key issues regarding internet law and regulation. It notes that while the internet may seem unregulated, there are some existing laws. However, regulating the internet is difficult due to its worldwide nature and anonymity. Several areas of internet law remain unclear, such as online defamation, the liability of internet service providers, and how to address cyberbullying while protecting free speech rights. Overall the passage examines both existing internet laws and legal issues that courts continue to evaluate.
talk to people about legislation that seeks to block access to social networking technologies in libraries, classrooms, and in other places of learning.
Freedom of expression on the internet enables widespread sharing of information but also enables illegal and unethical activities if used improperly. Key issues around freedom of expression online include controlling access to information, especially for children; anonymity which allows anonymous speech but is also used for illegal acts; defamation which restricts untrue statements that harm others; and pornography which some view as protected speech while others see it as harmful if accessible to children. Responsible use of new communication technologies requires consideration of these complex issues around ethics, law, and society.
Age Verification / “Doing the Right Thing”IDology, Inc
http://www.idology.com/about-idology/about-idology/ | The most important thing to know about us is to understand what we do. IDology, Inc provides real-time technology solutions that verify an individual’s identity and age for anyone conducting business online or in a customer-not-present environment. What makes us different is that we do this in a way that builds more confidence with your customers – byprotecting sensitive data and promoting consumer privacy.
This document discusses efforts to curb sex trafficking on the classified advertising website Backpage.com. It provides statistics on human trafficking cases in the US and notes that the majority involve sex trafficking. It discusses legal protections for websites under Section 230 of the Communications Decency Act and various attempts to sue Backpage that were dismissed based on these protections. However, some cases argued Backpage actively designed its site and policies to facilitate trafficking. Revelations in 2017 suggested Backpage contractors actively created ads, contradicting claims of neutrality. A congresswoman called for a criminal investigation of Backpage under sex trafficking laws.
Grant Proposal Excerpt Build Your Own NGOEricka Rodas
This document discusses the need to empower youth and protect them from sex trafficking and exploitation online. It notes that 300,000 children in the US are at risk of sexual exploitation. The organization aims to teach internet safety to at-risk youth and victims of sex trafficking to help prevent further abuse and allow them to become leaders. It also wants to train first responders to properly identify and respond to these crimes. Two bills in Congress could help if passed, but until then the risks to youth remain.
The document discusses various topics related to computer-mediated communication and online dating, including common online dating scams, the effectiveness of online dating algorithms, and privacy and security risks of sharing personal information online. It warns that sharing too much information can expose users to identity theft and that many online dating sites have not proven their matching systems lead to long-term relationships.
The document summarizes the debate around proposed legislation called the Stop Enabling Sex Traffickers Act of 2017 (SESTA). SESTA aims to amend Section 230 of the Communications Decency Act to allow for prosecution of websites that knowingly or with reckless disregard facilitate sex trafficking. Supporters argue it will help stop sex trafficking online, while critics argue it could increase censorship, liability risks, and unintended consequences that may actually hinder anti-trafficking efforts. The debate highlights complex trade-offs around internet regulation, free expression, and combating illegal activities online.
Crj 101 as we enter the last week of the course/tutorialoutletLockley
FOR MORE CLASSES VISIT
tutorialoutletdotcom
As we enter the last week of the course and we look back upon the many different forms of
white collar crime, we know that many types of white collar crime are committed through the
use of pen, paper, computers, etc. instead of guns and knives. Many white collar crimes
involve financial gain, but is the use of a computer to engage in cybersex with children a white
The document discusses the history of obscenity laws from ancient times to modern day and how definitions of obscenity and indecency have evolved. It outlines key court cases that have shaped obscenity law, including establishing the Miller test to determine if content is obscene. The document also discusses students' opinions on censorship and responsibility regarding obscene content online.
The document discusses the history of obscenity laws from ancient times to modern day and how definitions of obscenity and indecency have evolved. It outlines key court cases that have shaped obscenity law, including establishing the Miller test to determine if content is obscene. The document also discusses challenges in regulating obscene content online and enforcing laws, as well as student and legal expert opinions on related issues like censorship.
This document discusses the challenges posed by increasing cybersex and pornography enabled by advancing technology. It notes growing areas of concern like online child exploitation, revenge porn, and normalization of violence. The landscape tends toward increasing harm, though prosecution faces challenges. Effects on society include changing views of relationships and gender. The church struggles to address this issue, as porn use is common yet shameful. Cybersex has become an elephant in the room that hinders hearing the gospel. More work is needed to help Christians struggling with porn.
Online Piracy Essay
Digital Piracy Essay
Media Piracy Essay
Piracy Essay
Piracy
The Golden Age of Piracy Essay example
Piracy Essay
Software Piracy Essay
Software Piracy And Its Effects Essay
Piracy Case Study Piracy
This document discusses the risks posed by offender computer use and strategies for managing those risks. It notes that criminals increasingly use technology and the internet to facilitate criminal plans and activities. To address this, many states have passed laws restricting computer and internet use for offenders, especially sex offenders. The document recommends a comprehensive approach to computer management for offenders that includes: 1) accurate knowledge of offender's computer access, 2) monitoring offender computer use through searches and/or monitoring software, 3) online investigations by officers, 4) using complementary technologies like GPS monitoring, and 5) continued home visits and interviews. It argues that with proper training, probation and parole officers are capable of developing the expertise needed to effectively manage cyber-risk posed by offenders.
The Brazilian Senate has passed amendments to the Minors Protection Law that criminalize child pornography on the Internet. The amendments expand the existing law by making it illegal to produce, distribute, or publish sexual images of minors through any medium, including digital photography and the Internet. Those convicted face 2-6 years in prison and fines, or 3-8 years if the offenses were committed for profit. The law also broadens who can be prosecuted for these crimes against children.
Similar to Child Porn Prosecution Darren-Chaker (17)
Federal court, excluding police report, Darren Chaker, provides law on keeping a police report away from the jury in a criminal case, which is important since are usually hearsay and unreliable.
Letter brief, Darren Chaker, concerning prior restraint, First Amendment, by Reporters Committee, in pending court case, in front of court of appeal in California.
Dance Moms star, bby Lee Miller, indicted for bankruptcy fraud. Provided by Darren-Chaker, http://darrenchaker.us/ Bankruptcy fraud has been on the rise by the elite.
This document is an amicus brief filed in support of Darren Chaker in an appeal of conditions imposed on his supervised release. It argues that several conditions are overly broad and violate the First Amendment by restricting protected speech, including criticism of public officials. Specifically, it argues that conditions prohibiting "defamatory" or "disparaging" speech are vague and chill speech, and that a condition against anonymous emails violates the right to anonymous political speech. It also argues the district court failed to apply the proper standard for proving defamation of a public official.
- Congressman James Sensenbrenner, author of the Patriot Act, filed an amicus brief in support of plaintiffs challenging the NSA's mass telephone metadata collection program.
- He argues that Congress intended to authorize collection of documents and records only upon a showing of relevance to an authorized investigation, not a blanket collection of all telephone call records.
- Sensenbrenner also asserts that Congress did not intend to authorize indiscriminate collection of data on every telephone call to or from the US, which violates the privacy of millions of innocent Americans.
Darren Chaker, https://plus.google.com/+DarrenChaker/ provides this lawsuit seeking an injunction against NSA spying due to constitutional limitations. Of course, the brief is authored by some of the leading attorneys in the industry. It cites cutting edge constitutional law from multiple courts and Supreme Court decisions dating back decades. Very useful law is cited and can referenced to where an expectation of privacy and electronic communications are encountered.
Fourth Amendment privacy, Darren Chaker, uploads this brief concerning GPS tracking, expectation of privacy, and relevant law cited by Electronic Frontier Foundation. The legal challenges continue to be decided in the courts about the new technology that is readily available. Constitutional law and specifically the Fourth Amendment relate to GPS technology are defined here and the brief is a great primer on such. Not only police, but private people and companies also use such technology to monitor employees, cargo, loved ones, and children.
Darren Chaker provides this ACLU handout to promote police accountability and increase awareness of the public's rights. Your right to videotape and photograph police in public are significant rights. If you witness police misconduct, photograph it, make a complaint, and post it online! See http://darrenchaker.us/ for additional information concerning Fifth Amendment and Encryption.
Arbitration law update, Darren-Chaker, written by leading law firm, citing case law, statute and other legal resources about recent arbitration developments.
Unclean hands doctrine, Darren-Chaker, provides this legal article with a focus on perjury by plaintiffs. Great resource and provides several appellate cases.
Provided by Darren Chaker, this is an excellent publication concerning obtaining police records. Booking photographs to police report for all 50 states.
San Diego - federal indictment for human trafficking alleging pimping by a street gang, that spanned nationwide. Underage girls and adults females were branded, beat, and used as sex slaves to turn a profit for a street gang that will not be on the street anytime soon.
Darren Chaker, confidential informant guide for law enforcement, attorneys, in California, but also cites numerous federal and Supreme Court cases. Privilege is examined, how to keep confidential informants, and numerous court opinions.
Darren Chaker provides the search warrant for Crystal Palace, which was a major federal investigation into methamphetamine trafficking in San Diego. The search warrant provides details and connects the dots in support of issuance of the warrant.
Bankruptcy Spendthrift Trust darren chakerDarren Chaker
Nevada article, provided by Darren Chaker, concerning asset protection and bankruptcy. The Nevada Spendthrift Trust divests legal and equitable interest in former assets to protect them from creditors and is excluded from bankruptcy. 541(c)(2).
Restraining order preventing police enforcing California Penal Code sections
290.014(b) and 290.015(a)(4)-(6) that would require sex offenders to disclose all user names for social media accounts. Darren Chaker obtained the order and provides it for your use.
Evidence Code 1101b allows conduct of uncharged acts to be admitted as evidence. This article provides case law and how California Court of Appeal decisions address what requirements must be met to allow the admission of uncharged conduct to be admitted. Courtesy of Darren Chaker
What should have been filed under seal, was filed unsealed. Darren Chaker notes the great detail the agent used while drafting the affidavit for the smart phone. Search warrants are common for smart phones like the iPhone and Android phones often due to the storage capacity and ability to do everything on a home computer can be done on a smart phone. The upside is the availability of counter-forensic technology to keep what you want private, private. Encrypted phone conversations, to encrypting files, and wiping slack space are all important to those who want to keep sensitive information from prying eyes and is commonly used for high net worth individuals to corporate executives.
Restraining order against sex offender provided by Darren Chaker. Policing sex offenders is important, but if the scope of defining who is a sex offender expands, the police/parole budget does not. As explained on www.darrenchaker.org, sex offenses cannot be typically expunged, in Nevada, even if arrested for a sex offense is later dismissed, it cannot be sealed, however California allows for record sealing if lack of probable cause exists under PC851.8.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐄𝐏𝐏 𝐂𝐮𝐫𝐫𝐢𝐜𝐮𝐥𝐮𝐦 𝐢𝐧 𝐭𝐡𝐞 𝐏𝐡𝐢𝐥𝐢𝐩𝐩𝐢𝐧𝐞𝐬:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐍𝐚𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐒𝐜𝐨𝐩𝐞 𝐨𝐟 𝐚𝐧 𝐄𝐧𝐭𝐫𝐞𝐩𝐫𝐞𝐧𝐞𝐮𝐫:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Child Porn Prosecution Darren-Chaker
1. Child Protection,
Exploitation, and
Obscenity
March 2004
Volume 52
Number 2
In This Issue
United States
Department of Justice
Executive Office for
United States Attorneys
Office of Legal Education
Washington, DC
Prosecuting W eb-based O bscenity Cases . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
20535 By Benjamin Vernia and David Szuchman
Guy A. Lewis
Director The Aftermath of Free Speech: A New Definition of Child Pornography . . 8
Contributors’ opinions and By Brian Slocum and W endy Waldron
statements should not be
considered an endorsement by
EOUSA for any policy, program,
Sex Trafficking of Minors: International Crisis, Federal Response . . . . . 12
or service. By Sara L. Gottovi
The United States Attorneys’
Bulletin is published pursuant to Establishing the Interstate Nexus in Child Porno graphy Cases . . . . . . . . 18
28 CFR § 0.22(b).
By Paul Alm anza
The United States Attorneys’
Bulletin is published bi-monthly
by the Executive Office for United Ma king a Child Exploitation Case w ith Com puter Forensics . . . . . . . . . . 24
States Attorneys, Office of Legal By James Fottrell and M ichelle M organ-Kelly
Education, 1620 Pendleton Street,
Columbia, South Carolina 29201.
Periodical postage paid at
Washington, D.C. Postmaster:
Rescuing Victims of Ch ild Porn ograp hy Throu gh Im age Analysis . . . . . . 30
Send address changes to Editor, By D am on K ing, Michelle Collins, and Jennifer Lee
United States Attorneys’ Bulletin,
Office of Legal Education, 1620
Pendleton Street, Columbia, South Effective Use of the M edical Expert in Child Porn ograph y Cases . . . . . . 33
Carolina 29201.
By Dr. Sharon W. Cooper and Damon King
Managing Editor
Jim Donovan
Technical Editor
Nancy Bowman
Intern
Courtney Kane
Internet Address
www.usdoj.gov/usao/
reading_room/foiamanuals.
html
Send article submissions to
Managing Editor, United States
Atto rneys’ Bulletin,
National Advocacy Center,
Office of Legal Educat ion,
1620 Pendleton Street,
Columbia, SC 29201.
2. Prosecuting Web-based Obscenity
Cases
Benjamin Vernia Internet is used to commit the offense.
Trial Attorney Additionally, existing obscenity laws, once
Child Exploitation and Obscenity Section developed to address brick-and-mortar retailers,
Criminal Division apply equally well to retailers in cyberspace. The
recen t addition of new legal tools by Congress to
specifically target Internet-based offenders
David Szuchman complement those existing laws nicely.
Trial Attorney
Child Exploitation and Obscenity Section II. Overview of the bu siness
Criminal Division Pornographic Web sites can be classified
generally by their content and manner of
I. Introduction conducting business. In terms of content, Web
The pornography industry has capitalized on sites may offer explicit heterosexual or
the growth and popularity of the Internet, and homosexual conduct, or may specialize in a fetish
particularly the World W ide Web, as have few which appeals to a small segment of the
other businesses. Although estimates of the population. These include "scat" (depicting the
volume of Internet pornography are often use of feces or urine in sexual con duct), bestiality,
unreliable, a study from one reputable source sadomasochism, necrophilia, and real or simulated
estimates that "adult" online pornography rape. Alth ough child pornography, as that term is
generates approximately $1 billion per year in defin ed in 18 U.S .C. C hapter 110, is subject to
reven ues, an amount which is expected to grow to obscenity laws as well, this article addresses on ly
between $5 and $7 billion by 2007. Y OUTH , "adult" pornographic W eb sites. There is,
P ORNOGRAPHY , AND THE INTERNET , 72 Computer how ever, much overlap in the prosecution of child
Science and Telecommunications Board, National and adult pornograph y cases.
Research C ouncil (Thornbugh and Lin, eds. Fetish-cen tered Web sites are often small
2002). One of the factors contributing to the enterprises, run by one or two individuals (the
explosion of pornography on the Internet is the "webm asters"). Typically, the webm asters of these
relative anonymity that the Internet affords to sites deal in third or fourth-hand pirated copies of
producers and consumers alike. Equally appealing material originally collected for their personal use.
to distributors is the ease and low cost of mass Alth ough some non-fetish W eb sites, particularly
distribution afforded by the Internet. online video catalog sites, are also "mom-and-
Opposing these forces are concerned parents, pop" operations, they are m ore often part of a
with little or no computer savvy, who lack the larger enterprise that includes production
tools to supervise their children's use of the operations and parallel retail distribution of their
Internet and exposure to pornography and products. These latter organizations are more
obscenity. Often, these same parents are unwilling likely to share the features of a legitimate
recipients of "porn spam" themselves. Indeed, business, such as operation from a location
offensive m aterial that was once largely separate from the webmaster's residence, and the
unavailable to average citizens and children is use of a corporate bank account.
now largely unavoidable. Finding obscene Web sites also differ widely in the m anner in
material on the Internet is as easy as a click of the which they conduct business. A Web site may be
mouse, and even persons seeking to avoid the little more than an online catalog, providing users
material find themselves confronted w ith it. It is with a convenient mechanism for ordering
this situation that h as led to the Attorney G eneral's magazines or videos which the retailer then mails
call for obscenity enforcement. The Internet's or ships to the customer. Conversely, a W eb site
porous borders call for federal prosecution. may offer only online content, pictures, videos, or
While the Internet poses m any ch allenges to "chat," and charge by the item or through a
obscenity prosecutions, the challenges faced by subscription fee. Some Web sites offer only
prosecutors in this area are not very different from advertising space to other pornographic W eb sites.
the challenges faced in other areas where the Organized as a ranking service of the "best" or
M A R C H 2004 U N IT E D S T AT E S A T TO R N E YS ' B UL LET IN 1
3. most frequently visited Web sites, they perm it it illegal to use a misleading domain name to
advertisers to display sexually explicit "banner deceive a minor into viewing m aterial that is
ads" that occupy a small portion of the web page. harmful. (The Child Obscenity and Exploitation
Section (CEOS ) has issued guidance for
Marketin g and sales practices of pornograph ic Un ited States A ttorneys' Offices describing this
Web sites also differ widely. Many magazines and law and its application, which is available on
video producers have established Web sites as an US AB ook).
adjunct to, and sales vehicle for, their hard copy
products. Other Web sites attract business through Forfeiture for obscenity cases is covered
the use of "spam" (unsolicited bulk e-mail), or under 18 U .S.C . § 1467. Criminal forfeiture is
they may trick cu stomers, including children, into authorized under this section, but civil forfeiture is
visiting their sites through the use of common not. The following is subject to forfeiture under
misspellings of otherw ise inn ocuous dom ain § 1467: (1) any obscene material produced,
nam es. Frequ ently, W eb sites place terms likely to transported, mailed, shipped, or received; (2) any
be entered into search engines (such as real or personal prop erty constituting or traceable
Google.com) in "metatags," codes stored in the to gross profits or other proceeds; and (3) any real
web page but invisible to the user. These terms or personal property that facilitates the offense.
cause the search engines, which periodically index Facilitating property is subject to forfeiture if the
Web sites, to falsely identify the pornographic court, in its discretion, determines the property
Web site as one responsive to the user's innocuous should be forfeited, taking into consideration the
search request. nature, scope, and proportionality of the use of the
property in the offense. Id.
III. Laws app licable to W eb sites
It is critical to consider using seizure warrants
Most of the provisions of 18 U.S.C. Chapter and orders to seize bank accounts and funds
71, created in response to the brick-and-mortar associated with the illegal enterprise. As in any
obscenity trade, are fully applicable to web-based "white collar" investigation, money that is
obscenity cases. Those laws include 18 U.S.C. potentially forfeitable should be seized at the time
§§ 1461 (mailing obscene matter), 1462 of indictment or arrest to avoid potential disposal
(importation or transportation of obscene m atters), of proceeds of the crime by the target of the
1465 (transportation of obscene matters for sale or investigation. In addition, if p roperty was used to
distribution), and 1466 (engaging in the business facilitate the crime, it should be seized for
of selling or transferring obscene m atter). forfeiture pending conviction so that the target
Numerous prosecutions have been brought does not dispose of it. Furthermore, plea
against persons distributing obscenity through agreements should address forfeiture where
computers. In United States v. Thomas, 74 F.3d possible, including forfeiture of the domain name
701 (6th Cir. 1996), a case involving a itself and related ownership interests in and
commercial computer "bulletin board," the Sixth related to the Web site, as well as forfeiture of any
Circuit specifically rejected the defendants' and all property and equipment used to facilitate
arguments that 18 U.S .C. § 1465 did not apply to the offenses.
intangible objects such as compu ter image files, IV. Investigating web-based cases
and that C ongress had not intended to regulate
computer transmissions. Subsequent to this A. T argets
decision, Congress amended 18 U.S.C. §§ 1462 Obscene W eb sites are referred for
and 1465 specifically to prohibit the use of an prosecution from a variety of sources. These
"interactive computer service" to distribute include, among others, citizen complaints
obscenity. registered with private groups such as
Congress' frustration with Web sites with ObscenityCrimes.org and the National Center for
nam es calculated to m islead Internet users to Missing and Exploited Children, or those sent
pornographic Web sites (such as whitehouse.com) directly to U.S. Attorneys' Offices. Leads are also
led to the passage of 18 U.S.C. § 2252B in the developed by law enforcement and the Criminal
PR OT EC T A ct. This provision, enacted on A pril Division's Child Exploitation and Ob scenity
30, 2003, creates two related crimes for the Section, and particularly its High Tech
misleading use of a domain name (a W eb site's Investigative U nit.
"address" that a user enters into a Web browser). It is crucial, early in the investigation, for a
The first criminalizes the knowing use of a law enforcement agent to visit the W eb site in
misleading domain name to deceive any person question and preserve its publicly-accessible
into viewing obscene material. The second makes content using a tool such as Teleport Pro or
2 U N IT E D S T AT E S A T TO R N E YS ' B UL LET IN M A R C H 2004
4. Adobe Acrobat. Both programs can create a copy those typically availab le at homes and small
of the Web site's Hypertext Markup Language businesses.
(HTML) and graphic files, in essence duplicating As with W eb sites, ISPs provide Internet
the W eb site on a law enforcement computer's file connectivity in many different ways. The two
system. This work should be performed on an primary Web site "hosting" models are server
undercover computer with proper backstopping leasing and collocation. In server leasing, the ISP
(including the use of an untraceable Internet owns the server (a computer with specialized
Protocol, or IP address), and should be carefully software for receiving and transmitting web
documented. pages) and leases it, or a portion of the space
Identifying the webmaster is the first, and available on it, to the webmaster operating the
often , insurmountable h urdle. The Web site's Web site. The webmaster typically never even
public registration information is the first source sees the server but administers the site from a
to check, because it is free and does not risk remote location by logging into the machine over
notifying the webmaster of law enforcement the Internet with a password supplied by the ISP.
interest. Typically, a W eb site acquires a domain A collocated server is also remotely administered,
name or address, such as "usdoj.gov," through but the machine is usually provided by the
private companies, known as registrars, which webmaster to the ISP which places the server in
have been delegated the authority to register its facility and connects it to power and
unique names for a fee. The information provided communication lines.
by the webmaster to the registrar can be retrieved Although many ISPs provide web hosting
using an Internet "whois" query available on a services to W eb sites regardless of subject m atter,
variety of Web sites, including hexillion.com and others specialize in hosting pornography. By
samspade.org. visiting the ISP's own W eb site, an investigator
Many pornographic webmasters provide may develop a sense for whether the ISP is a
genuine information to the domain name large, diverse company, or a specialist. Large
registrars. More devious webmasters, how ever, firms are likely to have significant experience in,
can easily provide false information, because the and stand ard proced ures for, respon ding to
only verification most registrars undertake is of subpoenas and search warrants, and their size and
the credit card used to pay for the service. The diversity makes it unlikely that they would inform
practice of providing false or fictitious registration the webmaster if they are contacted by law
information is likely to increase in frequency as enforcement. "Adult" hosting companies, on the
more webmasters are prosecuted for obscenity. If other hand, should be approached with suspicion,
the registrar's information on the webmaster is and it should be assumed that even informal
false or fictitious, additional investigation may be inquiries, as well as compulsory process, will
necessary to make an identification. Despite a result in the subject's becoming aware of the
bogus registration, a webmaster may be located by investigation.
tracing the webmaster's payment method, Title 18 U.S.C. § 2703(f) provides a means by
typically a check, credit card, or wire transfer, to which ISPs can be instructed to preserve the
either the registrar or the Internet service provider contents of web servers for a period of ninety
(ISP) for the hosting services. Conversely, an days, pending the issuance of a search warrant. As
identification may result from tracing the with other contacts, however, care should be taken
webmaster's method of receiving payment for in determining whether the ISP receiving this
goods or services. For example, checks or credit request is likely to notify the subject of the
card accounts used to buy videotapes, DV Ds, or investigation.
subscription access to a Web site, can be
examined for information leading to the recipient The information provided in these steps is
of the funds. also significant in determining the appropriate
venue for prosecuting the webmaster and for
When the agent performs the "whois" query to opposing a possible motion to transfer. (Venue
identify the webmaster, he or she should also issues are discussed in more detail below.) The
perform a "traceroute" query (using the publicly- location of the webmaster and the Web site's
available resources provided above) to identify the server are two important venues to be considered.
owner of the Web site's IP address. Most Identifying the physical location of the server,
pornographic Web sites are operated using the however, may require contacting the ISP. Many
facilities of an ISP and are housed at an ISP, in ISPs operate server facilities in several cities or
order to obtain communication speeds faster than states, and the traceroute information will identify
the company, but not the location, where the
M A R C H 2004 U N IT E D S T AT E S A T TO R N E YS ' B UL LET IN 3
5. server is operating. Notably, Web sites selling Despite the challenges of searching the Web
obscene materials are frequently located in foreign site's servers, they are potentially quite useful in
countries. If both the Web site and the webmaster investigating and prosecuting online obscenity.
are overseas, the case is unlikely to merit further First, the server is likely to provide additional
investigation. evidence of both the content alleged to be obscene
and the webm aster's use of the Internet to
B. Evidence gathering distribute it. In addition, File Transfer Protocol
With the Web site's content captured, and the (FTP) logs maintained by the web server can
registration and ISP of the Web site identified, provide useful information regarding the
investigators can proceed to place undercover webmaster's remote administration of the Web
purchases through the Web site and preserve the site, and the webmaster's transmission of
evidence. A software program su ch as Camtasia obscenity between the business location and the
can preserve the ordering process so that a ju ry server. However, the evidentiary opportunities
can view the images seen by the agent as they presented by the web server and the other
listen to the agent's description of the ordering computers cannot be exploited without obtaining
process. the assistance of computer forensic technicians
familiar with duplicating and investigating Web
The undercover purchases can then be used to sites.
gain insight into the subject's banking practices
and finances. Can celled checks or money orders Prosecutions will often require the
will provide the subject's bank and account governm ent to obtain search w arrants in
number, and undercover cred it card statements jurisdictions other than w here the prosecution is
can provide sim ilar information on the ultim ate venued. In these instances, the question will arise
recipient of the funds. Grand jury subpoenas as to which community standard the reviewing
directed at the subject's financial institutions will magistrate should apply in evaluating probable
provide access to the subject's account records. cause. The magistrate may inquire whether he or
she should apply the community standards of the
The full range of investigative techniques jurisdiction where the business is located and
employed in other criminal cases is also useful in where the search warrant will be executed or of
Web site obscenity investigations. These include the community where the case will be prosecuted.
mail covers, surveillance of businesses and
residences, and interviews of witnesses such as This issue was addressed in United States v.
former employees. Althou gh W eb site cases begin Levinson, 991 F.2d 508 (9th Cir. 1993). The
in cyberspace, they mu st, in the end, result in real- district court held that the commu nity standards of
world investigations of individuals and the the district in w hich the alleged obscene materials
businesses they operate. are located, which in this case was Los Angeles,
generally govern a probable cause determination.
C. Searches However, where the government expresses an
The final investigative step typically intent to prosecute in a different jurisdiction, the
employed in a Web site obscenity case is to search community standard s of that district should
the business, residence, and computers of the control. Because the governm ent intended to
webmasters. As in any case, the investigative prosecute in Las Vegas, the district court found
agent prepares an affidavit describing the that probable cause did not exist because the
investigation to date and the locations to be governm ent had not proven the community
searched. When either a computer server, or standard s of that district. The N inth Circuit
personal computers at the enterprise's physical reversed, holding that the district court could have
location (used for bookkeeping, e-mail, and applied the community standards of Los Angeles
remotely managing the Web site) are searched, the because the government could have prosecuted
affidavit should describe the nature of the search the case there. See also Multi-media Distributing
and assert that pre-publication materials, if any are Co. v. United States, 836 F. Supp 606 (N.D. Ind.
found, will be protected under the Privacy 1993) (district court where alleged obscene
Protection Act, 42 U.S.C. § 2000aa. This Act materials were located could make probable cause
forbids a government officer or employee, in determination based on that commun ity's
connection with the investigation of a criminal standards).
offense, from searching for or seizing any work V. Grand jury practice
product or documentary m aterials reasonably
believed to be intended for dissemination to the Most W eb site indictments are presented
public, a newspaper, book, broadcast, or other using a single agent who describes the results of
form of public communication. the investigation. Although the grand jury may
4 U N IT E D S T AT E S A T TO R N E YS ' B UL LET IN M A R C H 2004
6. issue a valid ind ictment based solely on an agent's California, where the defendants formed the
description of the material alleged to be obscene, conspiracy and performed the overt acts in
see, e.g., U nited States v. M anarite, 448 F.2d 583 furtherance of that conspiracy, instead of the
(2d Cir. 1971), the grand jury must be provided Northern D istrict of Iow a wh ere the materials
the opportunity to view the material if it wishes were distributed. The Eighth Circuit stated that the
and to do so in its entirety to meet the test for same principles of venue under 18 U.S.C. § 3237
obscenity in Miller v. California, 413 U.S. 15 apply to a charge of conspiracy, and "it is w ell
(197 3). settled that the offense of conspiracy may be tried
not only in the district where the agreement was
By presenting at least a portion of the made, but also in the district where an overt act
material, the prosecuting attorney will have the was committed." Id. at 1041-42.
opportunity to observe the grand jurors' reactions,
and thereby gain some insight into the community Defendants may also file motions to dismiss
standard s that the petit jury will likely employ in the indictment, arguing that the government
evaluating the material. In practice, booklets of allegedly manufactured jurisdiction or venue. The
photographs or short clips of videos may be defense will argue that the government lured the
prep ared which can be shown to the grand jury in defendant into a pro-government district and that
the context of the agent's description of the the defendant was merely an operator of a Web
purchases. In cases in which the Web site content site located in a distant jurisdiction. The
itself is alleged to be obscene, the captured government can counter that the defendant created
version of the Web site can be provided on a the interstate nexus by sending the material in
computer to demonstrate the contents to the grand interstate comm erce, or used a facility of interstate
jury. commerce or interactive computer service for the
purpose of distribution, and thus accepted the
VI. Pretrial motions possibility of prosecution in the district to which
When defendants are charged in the the material was sent. Several analogous cases
jurisdiction to which materials were sent or support the view that in Web site cases, the
downloaded, they may file motions to change government may charge a defendant in the district
venue to where they reside or where their business from which the materials originated or where the
is located. These arguments have been tried and materials were received. See, e.g., United States v.
rejected in several cases. In United States v. Bagnell, 679 F.2d 826 (11th Cir. 1982) (interstate
Espinoza, 641 F.2d 153 (4th C ir. 1981), a case shipment of obscenity); Reed E nterprises v. Clark,
involving the shipment of child pornography 278 F. Su pp. 372 (D.D.C. 1967) (mailing of
under 18 U .S.C . § 1465, the Fourth Circuit obscenity); see also United States v. Thomas, 74
rejected the defendant's claim that he had a F.3d 701 (6th C ir. 1996) (Internet bulletin board
constitutional right to be tried in the jurisdiction with restricted mem bership).
of his residence. Similarly, in United States v. VII. Trial issues
Slepicoff, 524 F.2d 1244 (5th Cir. 1975), in a
prosecution for mailing obscene materials under A. C om munity standards and the internet
18 U.S.C. § 1461, it was held that the multivenue Many of the prosecutions for violations of
provisions contained in 18 U.S.C. § 3237 allow obscenity statutes will involve crimes committed
for enforcement in selected districts. In view of via the Internet. Wh ile the Miller test established a
the contemporary community standards three-part test for obscenity which incorporates
requirement of the Miller test, the Slepicoff court "the average person applying contemporary adult
found that it was logical to try a defendant in a community standards," this test was devised
jurisdiction to which obscene materials had been before the advent of the Internet. Miller v.
mailed. Id. Furthermore, a defendant's choice to California, 413 U.S. 15, 24 (1973). Therefore, the
do business throughout the nation limited his right question as to what the community standard is on
to be tried in the locality where he lives and bases the Internet has not yet been answered. Is the
his operations. Id. standard that of the community in the jurisdiction
The principles of broad venue under 18 where the case is brough t? Shou ld the com munity
U.S.C . § 3237 have even been held to apply in standard be that of the district where the material
obscenity conspiracy prosecutions. United States is produced, distributed , or sold? Or should there
v. Cohen, 583 F.2d 1030 (8th Cir. 1978). In the be a national community standard because the
Cohen decision, the Eighth Circuit rejected the Internet is available in each and every jurisdiction
defendants' claims that the governm ent sh ould in the country?
have been required to introduce evidence of the
community standards of the Central District of
M A R C H 2004 U N IT E D S T AT E S A T TO R N E YS ' B UL LET IN 5
7. Although the Supreme Court has yet to weigh at 590-91 (Breyer, J., concurring) (stating that
in on the forum shopping issue in the context of legislative history of Child Online Protection Act
Internet obscenity, its recent analysis regarding made clear that Congress intended a national
the constitutionality of applying local community standard). This point has not been lost on at least
standards to material distributed on the Internet one lower court considering the overbreadth of
suggests at least some agreement with the notion other Internet-related statutes. See Nitke v.
that the commu nity standards of the district of Ash croft, 253 F. Supp. 2d 587, 603-05 (S.D.N.Y.
receipt should be applied. In Ashcroft v. American 2003) (in discussing appropriate comm unity
Civil Liberties Union, 535 U.S. 564 (2002), a standard for Internet, court distinguished Hamling
plurality held that the Child Online Protection and Sable, stating that "because the Internet
Act's (COPA 's) reliance on community standards content providers cannot con trol the geograph ic
to determine what was "harmful to minors" over distribution of their materials, Internet obscenity
the Internet did not, by itself, render COPA statutes restrict protected speech"). Id. at 604.
unconstitutionally overbroad. The plurality stated: This emerging view that distributors on the
If a publisher chooses to send its material into Internet are helpless to control the vast extent of
a particular commun ity, this C ourt's distribution could precipitate an unfavorable
jurisprud ence teaches that it is the pub lisher's judicial attitude toward the government's selection
responsibility to abide by that com mun ity's of venue in ju dicially conservative districts. W hile
standards. The publisher's burden does not a national community standard has not yet been
change simp ly because it decid es to distribute created, it appears from the opinions discussed
its material to every community in the Nation. above that it is at least being considered by some
members of the judiciary. Following this type of
Id. at 583. In reaching this conclusion, the reasoning, a lower court could try to impose a
plurality relied on Ham ling v. United States, 418 national standard, which could greatly impact any
U.S. 87 (1974), in which the Court upheld the obscenity prosecution. For example, that national
application of varying community standard s to standard could be that of a restrictive commu nity,
obscenity in an obscenity mail distribution case, a permissive community, or something in
and Sable Communications v. FCC, 492 U.S. 115 between. This concern will be mitigated where the
(1989), in which it held that the application of distributor exercises increased control over
local community standards to "dial-a-porn" distribution, such as by m ailing into a district. In
telephon e com munications was constitutional. any event, the appropriate community standard is
Ash croft, 535 U.S. at 580-81. Ash croft's language an issue that requires thought and preparation in
also im plies that the Court would view venue in advance of trial.
any district a necessary consequence of choosing
to distribute obscenity over a far-reaching medium B. Scienter
like the Internet. When prosecuting obscenity cases, many
All of this is not to suggest that the broad defendants will claim lack of knowledge that the
distribution aspect of the Internet has not caused material they were distributing was obscene.
apprehension am ong some courts, with regard to However, a defendant does not need to know that
both venue and the appropriate comm unity the m aterial is obscene to sustain a guilty verdict.
standards to be applied. Recent rumblings in the For example, under 18 U.S.C. § 1461, the
Supreme Court and elsewhere suggest that the knowledge requirement has been deemed satisfied
breadth of the Internet's reach is elevating if the defendant "knew the character and nature of
concerns about broad venue and the concomitant the materials," so that the government does not
applicability of varying comm unity standards. have to prove that the defendant knew that the
Despite the plurality's holding in Ash croft, the materials were legally obscene. Ham ling v.
concurring opinions suggest that Hamling and United States, 418 U.S. 87, 123 (1974 ). Rather,
Sable might not be applicable to the Internet proving scienter only requires a showing of
because it is a broader medium with necessarily "general kn owledge that the m aterial is sexually
unlimited distribution, unlike the mail or the oriented." United States v. Linestsky, 533 F.2d
telephone. Id. at 587 (O'Connor, J. concurring) 192, 204 (5th Cir. 1976). One court has held that
("adoption of a national standard is necessary in books, magazines, and other films seized from the
my view for any reasonable regulation of Internet defend ant can be used to prove the defendant's
obscenity"); Id. at 594-97 (Kennedy, J. knowledge of the nature of the films that are the
concurring, joined b y Souter and Ginsburg, JJ.) subject of the prosecution. Un ited States v. Hurt,
(recognizing the burden on Internet speech based 795 F.2d 765 (9th C ir. 1986).
on the varying national community standard s); Id.
6 U N IT E D S T AT E S A T TO R N E YS ' B UL LET IN M A R C H 2004
8. In addition, in a prosecution for conspiracy to Therefore, USSG §2G3.1 (Mailing or
violate 18 U.S .C. § § 1461 and 1462, it was held Transporting Obscene Matter) is utilized for
that scienter was established where, among other violations of this statute.
things, the record contained evidence that the Based on USSG § 3D1 .1(a), Procedure for
defendants attempted to conceal their personal Determining Offense Level on M ultiple Counts,
involvement in the scheme by evasive tactics, when a defendant has been convicted of more than
including the use of fictitious corporate names, one count, the court shall group the counts
changes of address filed by persons using aliases, resulting in conviction into distinct Groups of
and the use of various locations as mail drops for Closely Related Counts by applying the rules
return mail consisting of orders and payments specified in USSG § 3D1.2. Based on USSG
from cu stomers. United States v. Cohen, 583 F.2d § 3D1 .2(a), offenses are grouped when coun ts
1030 (8th C ir. 1978). In another conspiracy case, involve the same victim and the same act or
the court held that know ledge that materials were transaction. In addition, USSG § 3D1.2(b)
sexually explicit was the only scienter provides that offenses are grouped when coun ts
requirement under 18 U.S.C. § 1462, and involve the same victim and two or more acts or
therefore, the defendants could be convicted of transactions connected by a common criminal
conspiring to violate the statute even if they did objective or constituting part of a common plan or
not know that the videos in question would be scheme. Fin ally, although not sp ecifically
distributed to a comm unity in which they would enumerated, USSG § 3D 1.2(d) also provides for
be deemed obscene. United States v. Investment the possibility of grouping. Therefore, based on
Enterprises, Inc., 10 F .3d 263 (5th Cir. 1994). the foregoing sections, it is likely that these
VIII. Sentencing offenses will group based on the fact that the same
victim, i.e., society, is harmed by commission of
Offenses committed under 18 U.S.C. §§ 1461, these offenses which are based on a common
1462, and 1 465 fall under the purview of scheme or plan. The offenses are of the same type,
United States Sentencing Guideline (USSG) and therefore, all counts likely will group
§ 2G 3.1, M ailing or Transporting O bscene Matter. together, forming one group. Pursuant to USSG §
The base offense level is 10 for this violation and 3D1.4, there would be no increase in the offense
includes enhancements based on the content of the level.
material (sadistic and m asochistic conduct),
whether or not a computer was involved in the IX. Conclusion
commission of the crime, and whether the Although web-based obscenity prosecutions
distribution was for pecuniary gain. If the present unique challenges, they are a vital
distribution was for pecun iary gain, then the loss compon ent of an overall federal strategy to
table located in USSG § 2B 1.1 is utilized, address an increasingly degradative pornography
corresponding to the retail value of the material. industry. In addition, effective enforcement of
The enhancement increases the offense level b y a obscenity law on the Internet is critical to
minimum of 5, and may increase it more, based reclaiming this important medium as an arena
on the total loss value. which, while permitting the expression of First
There will also be cases where the general Am endment-protected sp eech, is reasonably safe
conspiracy statute is charged pursuant to 18 for children and adults to explore.˜
U.S.C. § 371, most often in the context of a ABOUT THE AUTHORS
conspiracy to use the mails for the mailing of
obscene matters and to use an interactive ‘Benjamin V ernia is a Trial Attorney in the
computer service for the purpose of the sale and Child Exploitation and Ob scenity Section. P rior to
distribution of obscene matters, in violation of 18 joining C EO S in 2002, he w as a Trial Attorney in
U.S.C. §§ 1461 and 14 65. This crime carries a the Fraud Section of the Civil Division for eight
maximum sentence of five years and no specific years.
guideline covers this offense. Therefore,
prosecutors are directed to USSG § 2X1.1, ‘David Szuchman joined the Child Exploitation
Attempt, Solicitation, or Conspiracy Not Covered & Obscenity Section as a Trial Attorney in 2002.
by a Specific Offense Guideline. This section Mr. Szuchm an was previously employed as a
states that the base level to be used is the base Legislative Attorney for the N ew York City
offense level from the guideline for the Council and also served for four years as an
substantive offense, plus any adjustments from Assistant District Attorney for the Manhattan
such guideline for any intended offense conduct District Attorney's Office in New York. a
that can be established with reasonable certainty.
M A R C H 2004 U N IT E D S T AT E S A T TO R N E YS ' B UL LET IN 7
9. The Aftermath of Free Speech: A New
Definition for Child Pornography
Brian Slocum provision that covers highly-realistic computer-
Trial Attorney generated images, it is difficult to meet the burden
Child Exploitation and Obscenity Section of proof when images are of real, but unidentified,
Criminal Division children. This problem has the potential to grow
increasingly worse as trials devolve into confusing
battles between experts arguing over the method
Wendy Waldron of generating im ages that look like, and prob ably
Trial Attorney are, real children. Even in cases involving
Child Exploitation and Obscenity Section identified victims of ch ild pornography, it is very
Criminal Division difficult for prosecutors to arrange for one of the
few law enforcement witnesses who have met the
I. Introduction child to be available for any given child
In 2002, a U nited States Supreme Court pornography trial.
decision struck a serious blow to federal child II. The need for a "Free Speech fix"
pornography prosecutions. In Ashcroft v. Free
Speech Coalition, 535 U.S. 234 (2002), the Congress sought to remedy these concerns
Supreme Court found two of the four then- with the enactment of the Prosecutorial Remedies
existing definitions of child pornography to be and Other Tools to end the Exploitation of
unconstitutional. The first of these was 18 U.S.C. Children T oday A ct of 2003 (P RO TECT Act),
§ 2256(8 )(B), which defined "child pornography" Pub. L. No. 108-066, 117 Stat. 650, on April 30,
to include visual depictions that "appear[] to be" 2003. The PRO TEC T Act greatly enhances
of minors engaging in sexually explicit conduct. federal child pornography law by, among other
This definition, often referred to as the "virtual things, replacing with a new provision the prior
child pornography" definition, included com puter- definition of "child pornography" in 18 U.S.C.
generated images or images of adults who § 2256(8)(B) that was struck by the Free Speech
appeared to be minors. The C ourt foun d this court. Title V, Subsection A of the PROTEC T Act
provision to be unconstitutionally overbroad. In directly responded to the Free Speech decision by
creating a new provision in § 2256(8)(B) that
particular, the Court concluded that the definition
defines child pornography to include computer-
extended beyond the traditional reach of obscenity
as described in Miller v. California, 413 U.S. 15 based depictions that are indistinguishable from
(1973), that the Court's decision in New Y ork v. those involving real children. The PROTECT Act
Ferber, 458 U.S. 747 (1982) could not be also expands the affirmative defense applicable to
extended to support a complete ban on virtual cases brou ght under § 2256(8)(B) in respon se to
child pornograph y, and that the government's the Supreme Court's criticism of the prior law.
argum ents in favor of the prohibition were The PROTEC T Act child pornography
insufficient under the First Amendment. Ashcroft, provisions more narrowly focus federal child
at 246-52, 256. The aftermath of this portion of pornography law on the government's core
the Court's decision is the focus of this article. interest: preserving its ability to enforce laws
By invalidating these important features of the proscribing child pornography produced using
Child Pornography Prevention Act of 1996, real children. To further this interest, the
codified at 18 U.S.C. §§ 225 1-22 60 , the Court's PR OT EC T A ct makes fundam ental changes with
decision left the government in an unsatisfactory respect to the "virtual" child pornography ban in
position that warranted a prompt legislative § 2256(8)(B), and the corresponding affirmative
response. As a result of the Free Speech decision, defense in 18 U.S.C. § 2252A(c). Thus, the
defendants frequ ently contend that there is PR OT EC T A ct includes in the definition of child
"reasonable dou bt" as to whether charged images, pornography images that, to an ordinary observer,
particularly digital images on a com puter, w ere could pass for the real thing. At the same time, the
produced with an actual child, or as a result of PROTE CT Act provision gives a defendant the
some other process. Occasionally, there are ability to escape conviction under the child
experts who are willing to testify to the same pornography statutes if he can establish that the
effect on the defend ants' behalf. Withou t a image was not produced using a real child.
8 U N IT E D S T AT E S A T TO R N E YS ' B UL LET IN M A R C H 2004
10. The changes brought about by the PROTECT image[s]," and "computer-generated image[s]."
Act are inten ded to add ress the Sup reme Court's This limitation implicitly acknowledges the power
concerns that legitimate expression might of computer imaging technology both to alter
improperly fall within the scope of the child actual child pornography and to generate
pornography laws. T he provision is therefore simulated child pornography. Because the use of
narrowly tailored in four ways to advance the computers and digital technology to traffic images
government's compelling interest, without casting of child pornography implicates the core of the
a broad net over protected speech. First, the government's practical concern about
proscription of virtual images is limited to digital, enforceability, "drawings, cartoons, sculptures, or
computer or computer-generated images. Second, paintings," which cannot pass for the real thing,
the images must genuinely look like they depict are specifically excluded from the scope of
real children. Third, the sexual content must be § 2256(8 )(B).
particularly explicit. Fourth, the defendant can Along w ith narrow ing the definition of child
escape conviction through an affirmative defense pornography, the PROTEC T Act limits the scope
by establishing that the images were produced of sexual conduct depicted that is actionable for
without the use of a real child. As set forth in virtual child pornography under § 2256(8)(B ).
more detail below, the new provision provides an (Note that this new definition does not affect
important response to the Sup reme Court's prosecutions u nder either § 2256 (8)(A) or (C)).
concerns in Ashcroft v. Free Speech Coalition. Thus, a new provision, § 2256(2)(B), contains a
III. The details of the new child pornography defin ition of sexually ex plicit cond uct sp ecific to
provisions § 2256(8 )(B):
The centerpiece of the PROTECT Act's (B) For purposes of subsection 8(B) of this
response to the Free Speech decision was to section, 'sexually explicit conduct' means–
amend § 22 56(8)(B) to read as follows: (i) graphic sexual intercourse, including
such visual depiction is a digital image, genital-genital, oral-genital, anal-genital, or
computer image, or computer-generated oral-anal, whether between persons of the
image that is, or is indistinguishable from, same or opposite sex, or lascivious simulated
that of a minor engaging in sexually sexual intercou rse, where the genitals, breast,
explicit conduct; or pubic area of any person is exhibited;
18 U .S.C. § 2256(8 )(B) (2003 ). (ii) graphic or lascivious simulated;
Among other changes, the new definition (I) bestiality;
substitutes the phrase "indistinguishable from [] (II) masturbation; or
that" of a minor for the "appears to be" phrase
struck down by the Court in Free Speech. A new (III) sadistic or masochistic abuse; or
provision, § 2256(11), explains the meaning of (iii) graphic or simulated lascivious exhibition
"indistinguishable" as follows: of the genitals or pubic area of any person;
the term "indistinguishable," used with respect 18 U .S.C. § 2256(2 )(B) (2003 ).
to a depiction, m eans virtually
indistinguishable, in that the depiction is such This provision, in turn, relies upon a new
that an ordinary person viewing the depiction definition in 18 U.S.C. § 22 56(10), which defines
would conclude that the depiction is of an "graphic":
actual minor engaged in sexually ex plicit 'graphic', when used w ith respect to a
conduct. This definition does not apply to depiction of sexually explicit conduct, means
drawings, cartoons, sculptures or paintings that a viewer can observe any part of the
depicting minors or adults. genital area of any depicted person or animal
18 U .S.C. § 2256(1 1) (2003). during any part of the time that the sexually
explicit conduct is being depicted[.]
The definition thus clarifies that only the most
convincing depictions of ch ild pornography, Notably, the new provision requires a
which are indistinguishable from those depicting simu lated image to be lascivious to constitute
real children, are proscribed. child pornography under § 2256(8)(B). Thus,
child porn ography that sim ulates sexually ex plicit
Further narrowing the scope of the virtual conduct (as opposed to depicting actual sexually
child pornography definition, § 2256(8)(B) is now explicit conduct) must be lascivious, as well as
explicitly limited to "digital image[s]," "computer meet the other requirement of the definition. The
M A R C H 2004 U N IT E D S T AT E S A T TO R N E YS ' B UL LET IN 9
11. combined effect of these changes is to narrow the challenge. Prudence dictates that, until the
definition of sexually explicit conduct in cases challenges are finally resolved by the Supreme
involving virtual child pornography under Court, prosecutors should carefully evaluate and
§ 2256(8)(B). In such cases, sexually exp licit scrutinize their use of the new provisions, and
conduct must be graph ic or, if simulated, also include "safe harbor" or back-up charges in their
lascivious. indictm ents to the extent such charges are
available.
The PROTEC T Act also significantly amends
the affirmative defen se in 18 U.S.C. § 2252A(c). Several aspects of the images should be
Previously, the affirmative defense was available considered before a charging decision is made.
in cases involving transportation, distribution, The images should be of good quality, ap pear to
receipt, and reproduction of child pornography if show real children , and depict sexually ex plicit
the defendant could prove that the alleged child conduct, if possible. In addition, given the
pornograph y was prod uced using an actual adult, Supreme Court's emphasis on the potential literary
and was not pandered in such a manner as to and artistic merit of materials exploring teenage
convey the impression that it was child sexuality, images of prepubescent children shou ld
pornography. In Free Speech, the Court criticized be given preference over those of older children.
the affirmative defense on the grounds that it In all cases, prosecutors and law enforcement
incompletely protected defendants' First should continue their efforts to identify children
Am endment rights. Specifically, the Court depicted in the images. The identification of
observed that the affirmative defense was not known victims is essential in determining which
available to a defendant who could prove that real victims of child pornography have not yet been
children were not involved in the production of identified and protected from further harm.
the images, but who had pandered the material as Prosecutions under § 2256(8)(B) will also be in a
child pornography. 535 U.S. at 256. The Court stronger position against any constitutional
was also concerned that the defense did not extend challenge if some of the charged images depict
to possession offen ses. Id. known victims. In cases brought under the old
The new affirmative defense eliminates both child pornography statutes, the identification of
of the problems identified by the Court. First, the known victims is useful even if it is not feasible to
affirmative defense now includes possession introduce evidence regarding the child's identity at
offenses. Second, while prior law only granted an trial. The identification of known victims can
affirmative defense for productions involving often lead to plea agreements or to stipulations
youthful-looking adults, and only allowed the that charged images depict actual minors engaged
defense if the defendant did not pander the in sexu ally explicit conduct.
material as child pornography, a defendant can Prosecutors considering charging under the
now prevail simply by showing that no children pre-existing child pornography provisions, rather
were used in the production of the materials. In than the new § 2256(8)(B), should keep in mind
other words, a defendant can now prevail by that the identification of known victims is by no
establishing that the images do not depict actual means the only way to meet the governm ent's
children. The defendant must, however, provide burden of proving that charged images depict real
notice to the govern ment of an intention to assert children engaging in sexually ex plicit cond uct.
the affirmative defense no later than ten days Indeed, there is support for the position that
before trial. simply entering the images into evidence can meet
IV. Application of the new provisions and the government's burden.
alternative charges The three circuits that have addressed the
Since the enactment of the PRO TE CT Act, issue in light of the Free Speech decision have
prosecutors have several options to consider in concluded that the jury can make its decision by
child pornography cases. The Department of simply viewing the images themselves. See
Justice (Department) expects that the "virtual United States v. Kimler, 335 F.3d 1132, 1142
porn" provision of the PROTEC T Act will face (10th Cir. 2003) (holding that juries are capable of
constitutional challenges. Because it is possible distinguishing between "real and virtual images"
that those challenges will ultimately be heard by and that neither expert testimony nor evidence of
the Supreme Cou rt, Assistant United States victim identity is required by the Free Speech
Attorneys (AUSA s) considering charges under the decision); United States v. Deaton, 328 F.3d 454,
new child pornography definition in § 2256(8)(B) 455 (8th Cir. 2003) (per curiam) (holding that
should be m indful that their cases are just as likely images alone were sufficient to prove that
as any other to serve as the vehicle for a production of charged images involved u se of a
10 U N IT E D S T AT E S A T TO R N E YS ' B UL LET IN M A R C H 2004
12. real minor); Un ited States v. Hall, 312 F.3d 1250, Finally, care should be taken to develop a
1260 (11th Cir. 2002) (holding that desp ite strong record when accepting pleas to ch ild
unconstitutional jury instruction, examination of pornography charges. First, to the extent the
charged images showed that no reasonable jury record supports it and the defendant agrees, the
could have found that images depicted virtual plea colloquy should unequivocally reflect that the
children as opposed to actual children). defendant is pleading to child pornography
Prosecutors in child pornography cases may also involving real minors. If the government has
want to support their proof that images depict real evidence suggesting that one or more of the
children by presen ting the testimony of a charged images depicts an identified minor, the
physician that characteristics such as the fact that such evidence exists should be part of the
proportions, body fat distribution, and skin tone of colloquy.
the children depicted are consistent with those of V. Conclusion
real children. See United States v. Bender, 290
F.3d 1279 (11th Cir. 2002). The situation before the enactment of the
PROTE CT Act was unacceptable, as many
In cases that proceed under the new 18 U.S.C. meritorious cases involving child pornography
§ 2256(8)(B), charging some images under one of were not being brought, or were creating an
the obscenity provisions, 18 U .S.C . §§ 1460-70, is unnecessarily heavy drain on law enforcement and
also an effective way to ensure that convictions prosecutorial resources. T he Su preme Court's
will stand in the event that § 2256(8)(B) is struck decision in Free Speech made enforcement of the
dow n as u nconstitutional. The new obscenity child pornography laws substantially more
statute enacted as part of the PROT EC T A ct, difficult and threatened to reinvigorate this
§ 1466A , is one of the possible backup charges. pern icious traffic and harm more children . While
This statute is directed to the obscene visual the D epartment was disapp ointed with the Court's
represen tation of the sexual abuse of children. See decision, any legislation must necessarily respect
18 U.S.C. § 1466A (2003). When p ossession, as it and endeavor, in good faith, to resolve the
opp osed to receipt or distribution, of the im ages is constitutional deficiencies in the prior law that
all that can be shown, the new § 1466A(b) is the were identified by the Court. The Department
only available federal obscenity provision because believes that the PROT EC T A ct has succeeded in
it is the only one that includes possession within doing so.˜
its prohibitions. When receipt or distribution can
be shown, however, obscenity provisions other ABOUT THE AUTHORS
than § 1466A can be used. In addition, while
§ 1466A(a)(1) is likely to be a safe charge, ‘Brian Slocum is a Trial Attorney in the Child
§ 1466A (a)(2) should be used with caution as a Exploitation and Obscenity Section (CEOS). Prior
backup charge due to the likelihood that it will be to joining CEOS in 20 02, Mr. Slocum was hired
challenged. through the Honors Program as an attorney in the
Civil Division in 2000.
‘Wendy W aldron joined the Child Exploitation
and Obscenity Section throu gh the Honors
Program as a Trial Attorney in 2001. Ms. Waldron
spent six months on detail in the United States
Attorney's Office for the District of Columbia,
specializing in child sexual and physical abuse
cases.a
M A R C H 2004 U N IT E D S T AT E S A T TO R N E YS ' B UL LET IN 11
13. Sex Trafficking of Minors:
International Crisis, Federal Response
Sara L. Gottovi The human trafficking business is a lucrative
Trial Attorney one, generating approximately $7-10 billion
Child Exploitation Obscenity Section annually for traffickers. Id. at 9. Trafficking is a
Criminal Division particularly alluring crime because many nations
punish trafficking victims more harshly than the
For most A mericans, the word "slavery" traffickers, thus allowing a high level of income to
invokes thoughts of shameful practices abolished be gen erated with a low level of risk. Kara C. R yf,
long ago. Unfortunately, however, modern day Note, The First Modern Anti-Slavery Law: The
slavery not only exists, but is a thriving industry Trafficking Victims Protection Act of 2000, 34
in countries throughout the world. U.S. C ASE W. R ES . J. INT 'L L. 45, 48 (2002). Because
Department of State, Trafficking in Persons "there is less overhead cost than in the drug and
Report, 2003, available at arms smuggling industries, and humans are a
http://www.state.gov/g/tip/rls/tiprpt/2003 reusable commodity that can be sold and
[hereinafter TIP Report]. The business of human resold. . . . large and well-established organized
trafficking is a problem of global proportions, crime rings" including the Russian Mafia, have
with potentially devastating consequences not become involved in the market of human
only for the individu al victims, but for entire trafficking. Id. at 50.
nations as well. Id. at 10-11. This article examines Although United States citizens are not
the United States' approach to the crime of human immune from the crime of trafficking, residents of
trafficking, with a focus on sex trafficking of nations plagued by poverty, war, or other political
children . unrest, are particularly vulnerable. Th ese
I. Introduction conditions fuel the residents' desire to migrate. Tal
Reviv, Interna tional Trafficking in Persons: A
Although there is no worldwide consensus on Focus on Women and Children—The Current
the appropriate definition for "trafficking in Situation and the Recent International Legal
persons," Francis T. Miko & G race Park, Response, 9 C ARDOZO W OMEN 'S L.J. 659, 661
Trafficking in Women and Children: The U.S. and (2003). In some cases, victims are sold by their
International Respon se, at 2 (Updated July 10, families. Kara C. R yf, Note, supra at 49. In
200 3), at others, tantalizing promises of lucrative
http://ww w.usembassy.it/pdf/other/RL305 45.pdf, employm ent or marriage into an afflu ent family
United States legislation defines "severe forms of may be used to lure victims. TIP R eport, supra, at
trafficking in persons" as: 7. It is also a com mon scenario for traffickers to
sex trafficking in which a commercial sex act use threats, force, violen ce, or even kidnapping, to
is induced by force, fraud, or coercion , or in procure victims. Id. at 6-7.
which the person induced to perform such an International traffickers generally transport
act has not attained 18 years of age; or victims to foreign and unfamiliar countries to
the recruitment, harboring, transportation, increase their vulnerability and susceptibility to
provision, or obtaining of a person for labor manipulation. Id. at 6. A fter reaching their
or services, through the use of force, fraud or intended destination, traffickers may strip the
coercion for the purpose of subjection to victim of all identification and other documents
involuntary servitude, peonage, debt bondage, needed for travel. Id. Traffickers may also charge
or slavery. grossly inflated fees for their "immigration
services," which can result in a lifetime of debt
TIP R eport, supra at 12. bondage. Miko supra, at 4.
Using that definition, the United States Victims of trafficking are then used to provide
Departm ent of State estimates that approximately cheap labor for a variety of industries. Some of
800,000-900,000 people are trafficked annually. the most common sites of "employment" include,
Id. at 7. App roximately 18,000-20,000 of those but are not limited to: houses of prostitution or
victims are trafficked into the United States. Id. other forms of sexual exploitation, farms,
residences (victims forced into domestic
12 U N IT E D S T AT E S A T TO R N E YS ' B UL LET IN M A R C H 2004
14. servitude), sweatshops, the military (victims prostitution as a way to support themselves
utilized as ch ild soldiers or in other military financially or to get the things they want or need.
positions), and the streets (victims forced to beg Id. at 3.
or steal). TIP Report, supra, at 9, 26, 38, 45, 59, Oth er young people are recruited into
97. In the Un ited States, ap proximately one-half prostitution through forced abduction, pressure
of all trafficking victim s are forced into from parents, or through deceptive agreements
prostitution and the sex industry. Miko, supra, at between parents and traffickers. M iko, supra, at 7.
7. On ce these ch ildren become involved in
All genders, races, and ages are subject to prostitution, they are often forced to travel far
human trafficking. The majority of trafficking from their homes and, as a result, are isolated
victims, however, are women "under the age of from their friends an d family. Id. Few children in
25, many in [their] mid to late teens." Id. at 4 this situation are able to develop new relationships
(noting that "[t]he fear of infection with HIV and with peers or adults other than the person who is
AID S am ong customers has driven traffickers to victimizing them. Id. The lifestyle of such
recruit younger women and girls, some as young children revolves around violence, forced drug
as seven, erroneously perceived by customers to use, and constant threats. Id.
be too young to have been infected."). Id. Am ong children and teens living on the streets
Internationally, the majority of trafficking victims in the United States, involvement in commercial
are believed to come from South an d Southeast sex activity is a problem of epidemic proportions.
Asia, while the former Soviet Union "may be the Ap proximately 55 % of street girls engage in
largest new source of trafficking for prostitution formal prostitution. Estes Report at 7. O f the girls
and the sex industry." Id. at 2. After being engaged in formal prostitution, about 75% worked
trafficked, "most of the victims are sent to Asia, for a pimp. Id. Pimp-controlled commercial sexual
the M iddle East, Western Europe, and N orth exploitation of children is linked to escort and
Am erica. They usually end up in large cities, massage services, private dancing, drinking and
vacation and tourist areas, or near military bases, photographic clubs, major sporting and
where demand is highest." Id. Victims who come recreational events, major cultural events,
to the United States "most often end up in the conventions, and tourist destinations. Id. About
larger cities of N ew York, Florida, North one-fifth of these ch ildren become entangled in
Carolina, California, and Hawaii . . . [although] nationally organized crime networks and are
the problem is also migrating to smaller cities and trafficked nationally. Id. at 8. They are transported
suburbs." Id. at 7. around the United States by a variety of means,
In addition to addressing the influx of including cars, buses, vans, trucks or planes, Id.,
international victims of sex trafficking, the and are often provided coun terfeit identification to
United States has its own homegrown problem of use in the event of arrest. Id. The average age at
interstate sex trafficking of minors. Although which girls first becom e victim s of prostitution is
comprehensive research to document the number twelve to fourteen. Id. at 92. It is not only the girls
of children engaged in prostitution in the on the streets that are affected; for boys and
United States is lacking, it is estimated that about transgender youth, the average age of entry into
293,000 American youth are currently at risk of prostitution is eleven to thirteen. Id.
becoming victims of commercial sexual II. Recent U.S initiatives to curb sex trafficking
exploitation. Richard J. Estes & Neil Alan of m inors
Weiner, Comm ercial Sexual Exploitation of
Children in the U.S, Canada and Mexico, The Un ited States has declared its firm
U NIVERSITY OF P EN NS YL VA NIA , E XECUTIVE commitment to combat the scourge of trafficking
S UMMARY at 11-12 (2001) (available at in persons and to protect the "victims w ho fall
http://caster.ssw.upenn.edu/~restes/CSEC.htm) prey to traffickers." T IP Report, supra, at 169.
[hereinafter Estes Report]; see also Mia Numerous policy directives and statutory
Spangenberg, Prostituted Youth in New York City: enactments, both international and domestic in
An O verview (available at scope, have resulted from this comm itment to
http://www.ecpatusa.org/child_prosti_us.asp). The eradicate human trafficking. Miko & P ark, supra
majority of American victims of commercial at 8-19. These initiatives are designed to target
sexual exploitation tend to be runaway or thrown various aspects of the trafficking epidemic and
away youth who live on the streets. Estes Report, rely on a cooperative approach by, among others,
at 11-12. These ch ildren come from homes where the Departments of Justice, Labor, State,
they have been abused, or from families that have Homeland Security, and the Federal Bureau of
abandoned them, and often become involved in Investigation. Id. at 8-10.
M A R C H 2004 U N IT E D S T AT E S A T TO R N E YS ' B UL LET IN 13
15. "The U.S. government-wide anti-trafficking mandated in the TVPA, for international victims
strategy is one of (1) prevention, (2) protection of trafficking in the United States who cooperate
and support for victims, and (3) prosecution of with law enforcement officials. In addition to
traffickers." Id. at 8. Numerous initiatives have providing the non-immigrant "T" visa for those
emerged from this strategy. A W orkers' individuals recently victimized by traffickers, the
Exploitation T ask Force w as created to investigate Attorney G eneral made clear that individu als in
and prosecute human trafficking and exploitation "T" status would have an opportunity to seek
cases. Id. at 9. Internationally, "[t]he Department permanent residency after three years in "T"
of State funded the creation of a database on U.S. status, and that their spouses and children living in
and international legislation on trafficking." Id. the United States could apply for non-immigrant
An Interagency Council on Women w as created to visa status.
increase awareness of the problem and to develop In early 2003, the FBI announced O peration
strategies for solutions. The United States urged Innocence Lost, a nationwide initiative focusing
other countries to take strong action to address the on child victims of interstate sex trafficking in the
problem of human trafficking, including passage United States. The FBI initiative first identified
of necessary legislation and cooperation with non- several urban areas that are known to be hubs for
governm ental organizations (NGO s) dedicated to interstate sex trafficking of minors. Federal and
eradicating trafficking. Id. state prosecutors and investigators, along with
As a result of this initiative, the U.S. Congress FBI special agents from these geographic areas,
passed the Victims of Trafficking and Violence have been targeted for special training at the
Protection Act in 2000. Pub. L. 106-386, 114 Stat. National Center for Missing and Exploited
1466 (Oct. 28, 2002) [hereinafter TVPA]. Among Children on issues related to identifying,
its key provisions, the TVPA directs the investigating, and prosecuting cases involving
Department of State to submit an annual report child victims of prostitution. S tarting in 2004, this
identifying coun tries that do and do not com ply training program will be expanded to include
with minimum standards for the elimination of individu als from areas not initially targeted in
trafficking. The report must also provide, on a Operation Innocence Lost. In addition, as part of
country-by-country basis, a description of the Operation Innocence Lost, the FBI has committed
nature and extent of severe form s of trafficking in additional investigative resources to work cases of
persons in each country, and an assessment of the child prostitution in the targeted field offices.
efforts by governments to combat trafficking. See Overall, Operation Innocence Lost is committed
22 U .S.C. § 2151n (f). Another important aspect of to a task force approach, joining local, state, and
the T VP A w as the authorization to grant up to federal resources to solve these horrific crimes
5,000 non-immigrant visas per year to victims of against children.
severe forms of trafficking who are in the III. Federal statutory tools for prosecutors
United States, who have been in the United States com bating sex trafficking of m inors
for at least three years, who agree to assist in a
trafficking investigation and/or prosecution, and The federal prosecutor's tool kit in cases of
who wou ld face a significant possibility of sex trafficking of minors con tains four primary
retribution or other harm if they were removed statutes: 18 U.S.C. § 1591 and 18 U.S.C. §§ 2421-
from the Un ited States. See 8 U.S.C. §§ 1101, 2423. Most are familiar only with 18 U.S.C.
1184; 22 U.S.C. § 7105. The TVPA also amended §§ 2421–2423, which have their origins in the
the federal criminal sex trafficking provisions, Mann Act of 1910. Prosecutors are less familiar
discussed in detail below in Section III, to with 18 U.S.C. § 1591, which was amended by
enhance prosecutors' abilities to bring sex the TV PA in 2000, and on ly since that time has
traffickers to justice. See 18 U .S.C. § 1591. become a truly effective tool to address cases of
child sex trafficking.
The strong anti-traffickin g initiative begun in
the last adm inistration has carried through w ith Title 18, United States Code, Section 1591, as
equal force to the current administration. Miko, amended in 2000 by the TVPA, provides:
supra, at 10. In March 2001, the Department of (a) W hoever knowingly –
Justice (D epartment) annou nced that the effort to
combat trafficking would be a top priority for the (1) in or affecting interstate commerce,
administration and that U.S. law enforcement recruits, entices, harbors, transports, provides,
agencies would coop erate closely to upgrade their or obtains by any means a person; or
efforts to combat trafficking. Id. at 9. On January (2) benefits financially or by receiving
24, 2002, the Attorney General announced the anything of value, from participation in a
implementation of the special "T" visa program,
14 U N IT E D S T AT E S A T TO R N E YS ' B UL LET IN M A R C H 2004
16. venture which has engaged in an act described given or received. 18 U .S.C. § 1591(c)(1).
in violation of paragraph (1), knowing that "Coercion" is defined as:
force, fraud or coercion . . . will be used to 1) actual threats of harm ;
cause the person to engage in a commercial
sex act, or that the person has not attained the 2) any scheme intended to cause the victim to
age of 18 years and will be caused to engage believe harm would result; or
in a commercial sex act, shall be punished as 3) threats of legal repercussions against the
provided in subsection (b). victim.
(b) The punishment for an offense under 18 U.S.C. § 1591(c)(2). Statutory penalties for
subsection (a) is – violating § 1591 are quite severe. In instances
(1) if the offense was effected by force, where no force, fraud, or coercion is used , and in
fraud or coercion or if the person transported which the victim is between fourteen and eighteen
had not attained the age of 14 years at the years of age, the statutory maxim um penalty is
time of such offense, by fine under this title or forty years imprisonment. If the victim has not
imprisonment for any term or years or for life, attained the age of fourteen, or in instances when
or both; or force, fraud, or coercion can be proved, the
statutory maximum penalty is any term of years or
(2) if the offense was not so effected, and life imprisonment. It is important to note that 18
the person transported had attained the age of U.S.C. § 1591 includes an attempt provision.
14 years but had not attained the age of 18
years at the time of such offense, by a fine A prosecutor with a case of international or
und er this title or imprisonment for not more interstate sex trafficking of minors may also
than 40 years, or both. charge violations of 18 U.S.C. §§ 2421-2423.
Each of the statutes requires that the government
In summ ary, the statute makes it illegal to show actual travel in interstate commerce, or a
recruit, entice, obtain, provide, m ove, or harbor a specific use of the channels of interstate
person, or to benefit from such activities, knowing com merce for illegal sexual activity.
that the person will be caused to engage in
commercial sex acts where the person is under Although these statutes have been refined
eighteen or where force, fraud, or coercion exists. over the years, they have their origins in the 1910
As written, this statute can be applied to both the Mann Act. In this case, age has some advantages
pimp, who recruits or provides the minor, and to as there is extensive case law interpreting the
the customer who obtains the m inor for sex. This Mann Act and working out any Constitutional
statute does not require that either the defendant kinks. See, for example, Hoke v. United States,
or the victim actually travel. The federal 227 U .S. 308 (1913) (holding Mann Act
jurisdictional hook in the statute uses the language constitutional under com merce power); Camin etti
"in or affecting interstate commerce." T his v. United States, 242 U.S. 470 (1917) (holding
provision makes the jurisdictional reach of this that Congress' authority under the Commerce
statute broader than the older Mann Act derived Clause to keep the channels of interstate
statutes described below, which require actual commerce free from imm oral or injurious uses is
travel. Although there is no case law interpreting unq uestioned).
the appropriate reach of the jurisdictional hook in Passage of the PROTEC T Act has made
the specific context of 18 U.S.C. § 1591, significant changes designed to enhance the
analogous provisions are included in 18 U.S.C. effectiveness of 18 U.S.C. §§ 2422 and 2423.
§ 922(g) (criminalizing, inter alia, possession of a Title 18, Section 2421 of the United States Code
firearm "in or affecting interstate commerce"); 18 provides:
U.S.C. § 84 4(i) (criminalizing use of fire or
explosives to damage or destroy any building, Whoever knowingly transports any
vehicle or other property used in, or affecting, individual in interstate or foreign commerce,
interstate or foreign commerce); and 18 U.S.C. or in any Territory or Possession of the
§ 1951(a) (The Hobb s Act) (crim inalizing acts United States, with the intent that such
which "in any way or degree obstruct[], delay[] or individual engage in prostitution, or in any
affect[] commerce…"). These statutes have a sexual activity for which any person can be
significant volume of case law interpreting the charged with a criminal offense, or attempts to
jurisdictional language. do so, shall be fined under this title or
imprisoned not more than 10 years, or both.
The statute defines "Commercial Sex Act" as
any sexual act for which something of value is
M A R C H 2004 U N IT E D S T AT E S A T TO R N E YS ' B UL LET IN 15