jump to navigation

Sex Offense and Child Porn Charges May 9, 2012

Posted by jefhenninger in News.
Tags:
add a comment

Jeffrey Joe Page, 48-plead guilty to 90 counts of soliciting and possessing child pornography. Some of the images in the child pornography where of children from the ages of 1 to 3 years old.

Read More Here:

Hoboken Attorney

Man Charged With Child Pornography Distribution May 9, 2012

Posted by jefhenninger in News.
Tags: ,
add a comment

Jonathan Paul Hagg, 22-Has been charged with eight counts of possession of child pornography. Each charge has a maximum penalty of five years and $5,000 dollars in fines. The detective in charge found child pornography files and was able to show that the files had been shared with other computers.

Read More Here:

Belmar Attorney

Man Charged With Five Counts Of Child Pornography May 9, 2012

Posted by jefhenninger in News.
Tags:
add a comment

Prison, Probation and Child Pornography

Kenneth Pratt plead guilty to five counts of child pornography videos on his computer. He faces 180 days in prison, five years of probation and must register as a sex offender.

Read More Here:

Asbury Park Attorney

Coach Charged With Producing Child Porn May 9, 2012

Posted by jefhenninger in News.
Tags: ,
add a comment

Wilkes-Barre, PA-Joseph J. Ostrowski a Holy Redeemer High School varsity football coach was charged with allegedly baiting a minor into sexual conduct to produce and distribute child porn.

Read More Here:

Atlantic City Defense Lawyers

Child Porn Charges Thrown Out May 9, 2012

Posted by jefhenninger in News.
Tags: ,
add a comment

Tacoma, WA-Steven Powell charges of child pornography are dropped, yet he still faces fourteen counts of voyeurism. Jury selection started on Monday.

Read More Here:

Warren County Divorce Attorney

Retired NJ teacher allegedly viewed child porn at Plainsboro library May 11, 2010

Posted by jefhenninger in News.
Tags:
add a comment

Donald G. Mettler, of Plainsboro, has been charged with two counts of endangering the welfare of a child.   He is a Boy Scout troop administrator and retired Edison school teacher.  An investigation by Plainsboro police detective Eric Potts and Karleen A. Duca of the Middlesex County Prosecutor’s Office began when Plainsboro police received a call on Friday, May 7, reporting that someone was viewing child pornography on a computer at the Plainsboro Township Public Library.  He was arrested shortly after the police arrived at the library.

Story is here.

Man Indicted for Possessing, Distributing More Than 350 Images of Child Pornography March 13, 2010

Posted by jefhenninger in News.
Tags:
1 comment so far

A federal indictment charging Yem Nguyen, of Eagan, Minnesota with possessing and distributing more than 350 images of child pornography has been unsealed. The indictment, filed under seal in U.S. District Court in Minnesota on March 9, 2010, was unsealed today after Nguyen’s initial appearance in federal court. The Government alleges that on June 23, 2006, Nguyen knowingly distributed a visual depiction of a minor engaged in sexually explicit conduct. In addition, Nguyen is charged with knowingly possessing similar images and videos on his computer on July 3, 2007.

Defenses to receiving child pornography must take into account all facts February 14, 2010

Posted by jefhenninger in Articles.
Tags: ,
add a comment

Because I see so many pleas to receiving/distribution of child pornography, I think lawyers just assume that receiving/distribution of child pornography goes hand in hand with possession. Of course, this is not the case. Sometimes a lawyer needs to concede possession and fight the receiving/distribution charge. Unfortunately, this is not always done with great results. Lawyers cannot just rely on an expert to tell them if the receiving/distribution charge is valid and what the defenses should be. They need to know the law and the facts for themselves so both can be weaved into trial the trial theme via cross examination, openings, closings, etc. Most importantly however, they must also address all of the facts.  

When possession is conceded, the defense will be that the receiving of the child pornography was accidental. In U.S. v. Miller (2008), the Third Circuit set forth an excellent review of the legal and factual analysis involved in determining if the knowing element exists. Unfortunately for Mr. Miller, it seems like his defense did not include a complete analysis of all of the facts. In Miller, the Court said:

The evidence required to establish the intent-element of § 2252A(a)(2) may be greater than that required to establish the intent-element of § 2252A(a)(5)(B) because, while a person who

knowingly receives” child pornography will necessarily “knowingly possess” child pornography, the obverse is not the case. Cf. United States v. Myers, 355 F.3d 1040, 1042 (7th Cir. 2004) (upholding sentencing calculation for defendant who received videos and computer-generated image files

depicting minors engaged in sexually explicit conduct, in violation of § 2252). In Myers, the court observed that “a person who seeks out only adult pornography, but without his knowledge is sent a mix of adult and child pornography,” could not be found guilty of knowingly receiving child pornography.

Id. “That same person, however, could be in violation of the possession provision of § 2252(a)(4)(B) if he or she decides to retain that material, thereby knowingly possessing it.” Id. It follows that the quantum of evidence required to prove knowing receipt of a downloaded file may, in some situations, be greater than that minimally required to prove knowing possession of the file.

More difficult is the question whether Miller received the images knowingly. Other courts, confronting this question, have deemed at least four factors relevant to this inquiry: (1) whether images were found on the defendant’s computer, see United States v. Irving, 452 F.3d 110, 122 (2d Cir. 2006); (2) the

number of images of child pornography that were found, see id. (finding defendant’s possession of 76 images relevant); (3) whether the content of the images “was evident from their file names,” United States v. Payne, 341 F.3d 393, 403 (5th Cir. 2003) (finding “number of images in [defendant’s] possession, taken together with the suggestive titles of the photographs” established knowing receipt); and (4) defendant’s knowledge of and ability to access the storage area for the images, see Romm, 455 F.3d at 997-1001 (addressing defendant’s ability to access cache files in hidden subdirectory); cf. Kuchinski, 469 F.3d at 861-63 (same).

We summarize the evidence bearing on these four factors:

(1) The government adduced no direct, forensic evidence that the images were downloaded onto Miller’s computer. Agent Kyle testified that it was his “educated guess” that Miller downloaded the images onto the zip disk via the Internet, perhaps by trading them in a chat room or by searching for them on a website. However, Agent Kyle went on to testify, the government had no proof from Miller’s hard drive that supported this hypothesis. Agent Price, on cross-examination, acknowledged that, despite the FBI’s use of forensic software designed to recover deleted material from hard drives, the FBI had discovered no evidence that Miller’s computer had been used to upload or download child pornography.

Agent Price further testified that there was no evidence that Miller ever used search engines to locate child pornography websites, or that such websites had ever been visited from Miller’s computer (the

FBI’s investigation did reveal, however, that two websites containing adult pornography had been visited from the computer). Agent Price also acknowledged that there was no evidence that Miller ever participated in email exchanges or online chat rooms that pertained to child pornography. Finally,

Price acknowledged that there was no evidence that Miller used a “wiping” or “eliminator” program to clear his hard drive of evidence that files had been downloaded. A. 296-97.

(2) The second factor, the number of images of child pornography found, likewise does not weigh in the government’s favor in light of the overwhelming number of adult images that were found. The government presented evidence pertaining to only twenty of the 1200-1400 images found on the zip disk, and the District Court subsequently determined, in the process of sentencing Miller, that only eleven of these images constituted child pornography. Miller contended that he was unaware of the existence of these images and, significantly, Miller volunteered the password of the zip disk to Agent Kyle, cautioning him that the disk contained pornography. Miller also presented evidence that 586 of the images were copied onto the disk at periodic intervals over a seven-hour period, suggesting that they were not individually viewed when they were being copied. Agent Price’s rebuttal to this suggestion was that Miller may have first downloaded the images onto his hard drive, or that of another computer, before copying them onto the disk. This possibility puts sharp light, however, on the facts that no forensic evidence of child pornography was found on Miller’s hard drive, and that there was no evidence adduced that another computer may have been used to download the images.

(3) Nor does the third factor, whether the content of the images “was evident from their file names,” weigh in the government’s favor. Several of the images were embedded with the names of websites that possibly advertised child pornography, but — according to Agent Kyle’s and Smith’s testimony — this does not suggest that the images were obtained from those websites. Moreover, these website names would not be seen unless a person opened and viewed the files. While there is strong evidence that Miller eventually came to view some of the images of child pornography that were on the disk, and thus to knowingly possess the images, this evidence does not lend much support to the inference that Miller knowingly downloaded the images.

(4) Turning to the fourth factor, whether the defendant had knowledge of and an ability to access the storage space for the images, it is clear that Miller had access to the images on the zip disk. Indeed, Miller admitted to storing image files, including adult pornography, on the disk. In this respect, the facts of this case are more akin to the facts of Romm, 455 F.3d at 997-1001, where the court found that the defendant’s knowledge that he could access cache files supported the inference that he knowingly possessed the files, than to the facts of Kuchinski, 469 F.3d 853, 861-63, where the court rejected this inference because the defendant was unaware of, “and concomitantly lack[ed] access to and control over the existence of the files.” In contrast to the facts before us, however, the defendant in Romm had stored images of child pornography on the hard drive of his computer, albeit in a subdirectory that was difficult for a typical computer user to access. The Romm court acknowledged that “[n]o doubt, images could be saved to the cache when a defendant accidentally views the images, as through the occurrence of a ‘pop-up,’ for instance.” 455 F.3d at 1000. However, the court concluded that this “[wa]s not the case” in Romm’s circumstance: “By his own admission . . . , Romm repeatedly sought out child pornography over the internet. When he found images he “liked,” he would “view them, save them to his computer, look at them for about five minutes [ ] and then delete them.” Id. By contrast, Miller has consistently denied that he knowingly viewed or had any interest in viewing child pornography.

 –So, you would think that Miller was out of the woods right? Not quite. I really hate to blame his attorney but I have to. His lawyer did not account for all of the facts of the case and did not appear to have really gone though the hard drive to address all of the issues. The Court went on to say that:

 “Beyond the facts relevant to these four factors, however, the evidence presents a fifth factor that may support the jury’s determination: the number of occasions that the images were copied onto the zip disk. Smith testified that the images copied onto the zip disk on October 13, 2002, were likely transferred automatically. However, images of child pornography were also copied onto the disk on subsequent dates. Specifically, according to their dates created, the eleven images that the District Court determined to actually be child pornography were copied to the zip disk on October 13, October 29, December 17, and December 20, 2002. A reasonable juror might have concluded, from this evidence, that Miller copied the images on more than one occasion.”

 –Admittedly, I don’t have all of the facts in front of me but what is Miller’s witness doing testifying to one thing when the facts show another? It seems like Miller’s lawyer did not address this issue in anyway. A lawyer must first identify all of the bad facts and then determine which are facts beyond change. If the defense cannot attack the dates then the defense must incorporate the different dates on the drive. If it doesn’t, than it is sure to fail. 

Bergen County Prosecutor’s Office arrests man for Internet luring December 29, 2009

Posted by jefhenninger in News.
Tags: , ,
1 comment so far

Having dealt with the Bergen County Prosecutor’s Office on these cases, I can say that these guys are really good at what they do.  They are constantly arresting people across New Jersey who have not learned anything from the “to Catch a Predator” series on NBC.  While they are great to deal with, the judges up there are tough on these cases.  Thus, it takes an attorney with experience with these cases to get a great result.

In this case, David Raymond N. Cegla of Bedminster has been charged with attempted sexual assault, endangering the welfare of a minor by engaging in sexually explicit dialogue and of endangering the welfare of a minor by distributing child pornography and by possession of child pornography.  He faces up to  20 years if convicted on all charges.  The BCPO reports that he is employed as  an information technology manager at JP Morgan Chase in the Whippany.  So, he has the money for a good attorney.  Hopefully for his sake, he gets one.

Story is here.

Cohen gets to see his child pornography again September 18, 2009

Posted by tsclaw2209 in News.
Tags: ,
add a comment

In a victory for defense attorneys in New Jersey, the New Jersey Supreme Court denied cert with regard to the App Div’s decision that was rather ground breaking.  In State v. Neil Cohen, the App Div finally said that defense counsel can view, in the privacy of their offices, the child pornography at issue in the case. 

I’m sorry, but I don’t buy the argument from the State.  The State’s job is to make the defense’s job as difficult as possible.  Justice be damned.  That is all it is about.  I doubt any defense attorneys really need to see this child porn any more than it is necessary.  However, there is a need to view this in a professional manner away from the prying eyes of the State so that you can defend your client.  Thankfully, it is finally permitted.  Maybe some of these cases will actually go to trial. 

Story is here.