A sexual predator enters an
online chat room and waits. He
waits for the right child to enter the chat . . . and the
right child always will. After a few moments a 13-year-old girl
enters and happily starts to chat about her school, her friends and
her interests. This is when the sexual predator reaches out --"I
love Usher, too!" The girl, excited to make a new friend, bites -
and the conversation begins. The predator may begin by masquerading
as another young girl, or a cute boy. Some predators tell their
victim how old they are; they act as a sympathetic ear. In the end,
his goal is the sexual exploitation of this child. This is a real
danger, with 24% of teen girls admitting they have met online
acquaintances in person.
[1] See "
Amy's Choice"
[2]
for a real life
account. According to the United State Department of Justice,
Office of Juvenile Justice and Delinquency Prevention, 1 in 5 (or
19%) of all young Internet users surveyed had received unwanted
sexual solicitation in the past year. This forum focuses on online
sexual predators of children.
[3]
The motives of an online sexual predator are often very different
from those of a cyberstalker. A cyberstalker typically seeks
revenge for a real or imagined wrong, often having a romantic or
sexual fixation on their victim. An online sexual predator is
actively seeking sexual relationships with children. Additionally,
approximately 1/3 of all cyberstalkers are female, while online
sexual predators are almost always male.
[4]
One reason children and teens are drawn to Internet communication
is because it provides a certain amount of anonymity. This is the
same reason sexual predators are increasingly using the Internet to
find their victims. A child never really knows who they are
communicating with on the Internet (unless they are a known friend
or family member), because of the way the Internet works a child
may believe they are communicating with someone "just like them"
but in reality they are sharing their secrets with an adult
pretending to be a child.
How
Does an On-line Sexual Predator Work?
Commonly, a sexual predator will contact a child in a chat room,
using an instant messaging program or through e-mail. Teens often
use these resources as online peer support and predators go to
these areas looking for vulnerable victims who are trying to deal
with their problems. Predators lavish time, attention and kindness
on their victims, something thee victims may feel they are not
getting from their parents.
They are up on the latest trends and music.
[5] A predator will engage a child in
conversation and gradually ease their inhibitions. Then they will
gradually introduce sexual content into conversations. Some
predators work faster than others, but those who are immediately
sexually explicit are often cyberstalkers. Sexual predators usually
work slower, trying to
gain the trust of their victim.
[6]
Young
adolescents are the most vulnerable victims. They are more likely
to take risks online without considering the consequences.
[7]
Most of the time, these children
incorrectly assume
that the Internet provides them anonymity. For a simplified
explanation of how easy it is to get a child's personal
information, see "
Tracking Theresa."
[8]
Also, with
children and teens becoming more interested in blogging, sexual
predators are often invited into the personal life of a
child.
[9]
What
are Internet Companies Doing to Help?
After some major negative publicity Yahoo received following a
Texas news station's expose' on older men and young teenaged girls
in a one of their chatrooms, Yahoo decided to rethink its chatroom
design. Since spring of 2005, Yahoo will not
allow anyone under eighteen to chat on their on line
site.
[10]
Interestingly
enough, this change
in policy was not due to a police sting operation, but instead was
based on a civil lawsuit filed on behalf of a molested twelve year
old and massive advertisement withdraws.
[11]
It
is important to remember while debating over how congress can or
should be more proactive in certain areas, sometimes the best way
to effectuate drastic changes is to call in the media.
This issue is gaining national attention through news programs such
as "
Dateline."
What
is an On-line Sexual Predator?
A cursory search of the term "
sexual predator" will quickly
locate many
recent cases where pedophiles and other adults have lured children
into meeting them off-line where they then molested them.
Thankfully, there are even more cases when such attempts to lure a
child have brought about the attention of law-enforcement groups.
Cyberpredators, just like their off-line counterparts, usually
aren't the predictable, somehow funny looking, scary monsters in
trench coats we imagine lurking in a dark alley. Many are the kind
of person you would be inviting to your home as a guest, and often
have. Offenders may be
ministers, doctors,
teachers, lawyers, welfare
workers,
journalists, Boy
Scout leaders,
softball coaches,
etc. They are almost always men.
They are often
articulate and well educated. They come in every shape, size, and
color imaginable. They are just as likely to be rich, middle class,
or out of work. The important and scary thing is that they have one
thing in common: they want your child.
Predators often don't see themselves as predators. They see
themselves as loving companions to the children they molest. To
them, this isn't a crime, it's a seduction. As such, these
offenders often carry on these relationships for extended periods
of time. Predators have been known to wait more than two years,
collecting data on a particular child, before striking.
Contrastingly, however, it is also not uncommon for meetings to be
set up in a matter of hours.
Before the Internet became
commonplace
in every American home, predators had to physically go to a
location where children where known to be in order to find victims.
Now, the offender can enter a chatroom and just sit back and
listen. He may pick out a particular child that appears vulnerable,
or he may approach every other on-liner that fits his profile (age
range and gender). The anonymity of the Internet has removed the
danger a pedophile used to face when cruising for his victims. An
offender can gain a great amount of personal knowledge about his
potential victims just by just eavesdropping in a chatroom. Kids
often share personal information about their lives in chatrooms or
on profiles. The predators use this information to gain your
child's trust and friendship. For this reason, there are numerous
on-line volunteer organizations encouraging parents to be more
involved and proactive in their child's Internet activities.
How
do the Sexual Predators get Children to Meet Them
Off-line?
They begin by striking up a
conversation with the child, trying to create a relationship of
trust and friendship. They often masquerade as another child or
teenager, typically of the opposite sex unless the child has
indicated homosexual interests. (The child may or may not know the
"seducer's" real age by the time they meet face-to-face.) If the
seduction is one that progresses over time, phone calls may start
at this point. Sometimes gifts are sent to the child as well, which
may include a Polaroid camera and film. After the barriers of
caution have been lowered, they may begin gradually introducing
sexual topics, often with the use of child pornography to give the
child the impression that other children are regularly involved in
sexual activities. Again, it is not atypical for an offender to
jump to sexually explicit talk only minutes after the first
introduction. These offenders are less likely to try and wine and
dine the child victim before asking for an in person meeting. Both
the slow and more aggressive predators will then begin to approach
the child's own sexuality and curiosity by asking questions about
their own experiences and willingness to try sexual acts.
Who's
at risk? Profile of a typical child victim of
Internet-related sexual molestation.
Most Internet victims are between the age of 12 and 15 and live in
the suburbs or rural areas. Often they are very sheltered and
naive, or, at the other extreme, they are willing to take very
serious risks. Typically, they have very few off-line friends and
pretty much stick to themselves. They are looking for love,
affection or acceptance and some are coaxed into a face-to-face
meeting with the sexual predator, many believing that the predator
is their own age. Boys are usually tricked into a meeting or are
willing to meet because of a curiosity about sexual acts and/or
homosexuality. On the other hand, girls are tricked into
face-to-face meetings due to their belief that they are in love
with and will marry the predator some day. Sexual predator web
awareness sites such as Web Aware, list several factors in
determining what type of child may be more at risk. An at risk
child may be one who spends an excessive amount of time (over 1 1/2
hours, not including homework) on the Internet every day; and
is involved in "high risk" activities on-line such as sharing
personal information on-line, sending photos of themselves to
strangers on-line and frequently visiting chatrooms. Children who
are more at risk on line tend to have less of a balanced home life
outside the Internet and tend to be more secretive about their
on-line activities. Tools that can be used to communicate with
victims are varied and sometimes unexpected to the parent who
allows their child access. Parents should watch to see if their
child has a personal web page, an instant messenger (IM) account, a
wireless device, and even a Sony Playstation 2 (because this gaming
station connects to the Internet). Parents also should stay
active in their child's life, know who their friends are, and if
they suddenly have new people calling for them or sending them
packages. Overall, protecting a child from on-line sexual predators
can be done with many of the same practical parenting tips that are
necessary in protecting children from other dangers in the real
world.
[12]
Return to top of Introduction.
Return to Table of Contents.
Federal
Law Governing Online Sexual Predators.
Congress'
Early Attempts End in Failure.
Beginning in 1996, Congress has passed several laws addressing
sexually explicit materials and sexual predators found on the
Internet. The Communications Decency Act (CDA)
[13]
passed in 1996. The CDA represented Congress’ first
attempt to regulate children’s access to sexually explicit
material
on the Internet by making it illegal to put
“indecent” content on
the Internet where kids could find it. However, the
CDA was
unanimously declared
unconstitutional in 1997 in Reno v. ACLU for “broad
suppression of speech addressed to adults”; the term
“indecent” was
found to be too vague.
[14] Next
came the Child
Online Protection Act (COPA).
[15]
As a modified
version of the CDA it required commercial websites to verify
proof of age before allowing a user access to sexually explicit
material considered obscene for minors. Like the CDA, COPA was
immediately challenged by the American Civil Liberties Union (ACLU)
and other civil liberty organizations, and, in 1999, a permanent
injunction was ordered against its enforcement.
[16]
On May 13, 2002, in ACLU v. Ashcroft, the Supreme
Court directed a lower court to re-examine its ruling
that COPA was unconstitutional.
[17]
On March
6, 2003, the court again found that COPA was
unconstitutional.
[18] On June 29,
2004 the
Supreme Court kept in place the 1999 lower-court ruling against the
enforcement of COPA, but ordered the lower court to consider
whether recent advancements in filtering technologies could protect
children more or less effectively than the criminal sanctions
specified in COPA.
[19]
Congress enacted
the Children's Internet Protection Act (CIPA) in 2000.
[20]
CIPA took effect in April 2001, requiring schools
and libraries receiving federal technology funds to install
pornography-blocking software on their computers. The American
Library Association filed suit alleging the requirement of
blocking software in libraries was unconstitutional on its face. On
May 31, 2002, the U.S. District Court for the Eastern District of
Pennsylvania agreed.
[
21] The U.S
government
appealed that decision, and on June 23, 2003, the Supreme Court
overturned the district court's ruling.
[22]
Federal laws have also been enacted to protect children from
predators who attempt to lure them into an off-line meeting for the
purpose of performing illegal sexual acts or coercing them to
provide sexually explicit photos of themselves. In April 2003,
Congress passed a law that provides wiretapping authority for seven
sexual offenses, including child pornography and the sexual
exploitation of children. Part of a broader child protection bill
entitled the Protect Act of 2003, which also mandates the Amber
Alert system for abducted children, this law expands federal law
enforcement agencies’ wiretapping abilities to catch
online
predators before they get their hands on innocent children.
[23]
Current
State of Federal Law.
There are five federal statutes that govern this area of law,
and one statute making its way through Congress.
The
Children's Online Privacy Protection Act of 1998 (COPPA) states
that a commercial website collecting personal information from
a child under 13 years old without the consent of a parent is
breaking federal law.
[24] The
Act requires
sites to provide parents with notice of their information gathering
practices, obtain verifiable parental consent, allow a parent to
choose whether information is shared with third parties and
provides parents with access to and the authority to change or
delete the private information their child provides.
The
Federal Trade Commission,
created by
Congress in 1914, enforces a variety of federal antitrust and
consumer-protection laws and is responsible for taking action
against practices that are unfair or deceptive. The FTC's authority
extends to the Internet, which, like other media, can be used to
deliver fraudulent content. Beginning April 21, 2000, the FTC
became responsible for enforcement of COPPA. This act
promises to put parents back in charge of their children's
information on-line. It gives them the tools to control who
collects personal information from their kids, how that information
is used, and whether it is shared with third parties. This Rule
implements one of the Commission's top goals -- protecting
children's privacy on-line. Key elements of the Rule requires sites
to provide parents notice of their information gathering practices,
obtain verifiable parental consent, allow a choice of whether
information gather is shared with third parties and provides
parents with access to their child's provided information and the
authority to change or delete it.
[25]
In order to
promote this new Rule, the FTC created websites geared to both
adults
[26]
and children
[27]
to
educate them of their rights.
Here is a
list of
frequently asked questions which explains the power and scope
of COPPA.
In theory, the idea of COPPA, combating sexual predators world
wide, is brilliant. Realistically, however, the enforcement of
international violations may prove to be a considerable challenge.
The jurisdictional hurdle may require that a criminal's home nation
have some type of reciprocal relationship with the United States.
Further, according to COPPA foreign run websites must comply with
COPPA if they are directed to children in the U.S. or knowingly
collect information from children within the United States. The
difficulty of proving these requirements also may result in
legitimate obstacles.
18
U.S.C. §
2422
(2005) prohibits anyone from using the mail to
persuade,
induce, entice, or
coerce any person under age 18 to engage in prostitution or any
unlawful sexual activity. It has been interpreted to also include
the Internet.[28]
When using undercover
agents as a tool in the fight against Internet predators, the
defense of entrapment will likely be brought up during the
prosecution of some of these cases. In order for such a defense to
be successful the defendant must first admit to the commission of
the crime and then meet a two-prong test that requires the
defendant to show both that 1) there was government inducement and
2) that the Defendant was not predisposed. A defendant is not
entitled to an entrapment jury instruction unless there is evidence
BOTH of lack of predisposition and of government inducement in the
criminal conduct.
[29] The
Supreme Court has
noted that the underlying purpose of the entrapment defense is to
protect an otherwise un-predisposed defendant from governmental
coercion.
[30]
Entrapment, therefore,
focuses on the degree of government involvement in the crime and
whether the defendant was predisposed to commit it.
[31][32] Stated another way,
entrapment raises the issue of whether the criminal intent
originated with the defendant or with government agents.
[33]
This obstacle of an entrapment defense is easily
avoided by instructing officers to never initiate contact with a
suspected predator. By allowing a predator to make his move on the
child/agent, the possibility of a defendant arguing government
inducement is greatly diminished. Additionally, once an arrest has
been made, specially trained agents may be able to search the
defendant's computer history and find evidence of other chats or
encounters the predator has had in the past to combat any defense
regarding the defendant's lack of predisposition to such
crimes.
In
U. S.
v.Criswell the 6th Circuit determined the sentence enhancement for
unduly influencing a minor to engage in sexual activity did
not apply
where the
"victim" was an undercover agent posing as a minor, in a case
in which the defendant was found guilty of using wire
communications to induce or coerce an individual under the age of
18 to engage in sexual activity and attempting to transport a minor
in interstate commerce with the intent to engage in sexual
activity, in violation of
18
U.S.C.
§ 2422
(2005) and
18
U.S.C. 2423 § (2003).
[34]
The lower court was not alone in its decision that sentence
enhancements under United States Sentencing Guidelines §
2A3.2(b)(2)(B) are applicable in attempted criminal sexual abuse
when undercover agents pose as a child on-line.
[35]
The 11th circuit has detailed how these
enhancements should apply to attempted crimes and demonstrates how
the sentencing guidelines have been specifically amended to
encompass the definition of a victim to include an undercover
agent - allowing such criminals to be subject to sentencing
enhancements.
[36]
The amendment to
the sentencing
guidelines in 2000, which included the broader definition of a
victim, appears to have been ignored by the Criswell court. One
reason the Court may have failed to apply the sentence guidelines,
may have been the prosecutor's inability to meet the requirement of
showing that the victim was unduly influenced by the predator.
While the guidelines have been amended to include undercover
agents, the elements of the crime still remain the same and the
government must still be able to prove both intent and completion
of the crime as charged.
[37]
Some argue
that the need to prove actual undue influence on a victim was
nullified when the amendment expanded the scope and definition of
victims to include undercover agents. In so much as the commentary
language of the sentence guidelines required a completed act of
sexual abuse on a victim before the sentence enhancements applied,
both that requirement as well as the actual undue influence element
must be deemed null and void. If an agent may be a victim according
to the standards, then a completed act of sexual abuse against that
victim is extremely unlikely to occur. To allow the expanded
definition, yet still demand the old elements would be
paramount to canceling the existence of the sentence
enhancements for this type of offender.
An additional portion of the sentencing guidelines apparently
overlooked by the Criswell Court is U.S.S.G. §
2A3.2(b)(3).
In addition to failing to follow the 2000 amendment of the
guidelines in applying sentence enhancements when the victim is in
fact an undercover agent under § 2A3.2(b)(2)(B), the court
also
completely failed to consider subsection 2A3.2(b)(3) of the same
guidelines. Subsection (b)(3) states, "If a computer or an
Internet-access device was used to (A) persuade, induce, entice, or
coerce the victim to engage in prohibited sexual conduct; or (B)
facilitate transportation or travel, by the victim or a
participant, to engage in prohibited sexual conduct, increase by 2
levels."
[38]
If including the
police officer in
the definition of a victim, it should have been possible for the
court to apply this enhancement, since the defendant did in
fact use his Internet access to encourage the victim to engage in
prohibited sexual contact. If intended to increase the punishment
for the criminal act of enticing a minor, the enhancements need to
be uniformly applied to all predators, both those who were
successful and unsuccessful in their enticement.
Courts have been similarly troubled when
interpreting 18
U.S.C. § 2423 (2003) which states
that it
is a violation of this law for any U.S. citizen to travel
abroad to engage in sexual acts with a child. This law applies even
if the sexual acts do not occur in the United States. It is also
illegal to transport a child within the United States for the
purposes of engaging in sexual acts with the child.[39]
The United States District Court for the
Western District of Missouri found that a person can not violate
18 U.S.C. § 2423 if the
"victim" is an
undercover officer. [40]
18 U.S.C. §
2425 (1998)
prohibits someone from using the Internet to send personal
information about a minor in order to entice, invite or persuade a
child to meet for sexual acts, or to help arrange a meeting for
someone to perform sexual acts with a child.[41]
The 11th Circuit, in U.S. v. Taylor, held that the defendant
violated this statute when he posted personal information of a
12-year-old girl on an Internet bulletin board, encouraging readers
to go to her home and engage in sexual acts with the
child. His posts indicated that the child was a willing victim
to pedophiles.[42] In conjunction
with this law,
18 U.S.C. § 1470 (1998) declares a violation of federal law to
knowingly send or attempt to send or transfer obscene material to a
child under age 16.[43]
The
Child's Safety Act of 2005 is currently making its way
through Congress. On September 14, 2005 it passed the House of
Representatives with bipartisan support, and is waiting for a vote
in the senate. It improves on Jacob's Law and Megan's Law. It
creates a national comprehensive sexual offender registry system
with improved information transfers between states when a sexual
offender moves from one state to another. The Act would also
increase penalties for sexual offenders who fail to
register.[44]
[45]
Return to
top of
Federal Laws.
Return to Table of Contents.
State
Laws Governing On-line Sexual Predators.
As exemplified in the table below, virtually every state has
enacted a law making it illegal to entice a child over the Internet
for sexual purposes. Some states rely exclusively on a
general enticement statute. These statutes do not specifically
state that the activity is illegal if it occurs using the Internet,
but they make any activity or conduct that would entice a child for
sexual purposes illegal.[46] Only
three states do
not have a general enticement statute or an on-line enticement
statute.[47]
Many of the statutes
that do exist
have been enacted within the last few years and there is not a
wealth of case law interpreting them. In fact, many states do not
have a reported opinion interpreting these statutes.[48]
Of those statutes that have been interpreted, courts
seem to agree that these statutes do not violate the free speech
provisions of the First Amendment to the United States Constitution
(or any State Constitution), the fact that the "victim" is an
undercover officer does not prevent conviction, and defendants
convicted must register with the state sexual offender
registry.[49]
See the
following table for
the statutes and cases.
Click State
Name for State
Constitution.
| State Name |
Statute
Citation |
Case
Citation |
Case
Summary |
| Alabama |
Ala.Code § 13A-6-110 (2002).
You will need to navigate through the table of contents, there is
no direct link. |
. |
There has been no reported opinion interpreting Ala.Code § 13A-6-110
(2002). |
| Alaska |
2005 Alaska Sess. Laws 11.41.452
This bill was signed by the Governor August 30, 2005.
It will become effective November 28, 2005. The
bill
was previously Senate Bill 140. |
. |
Alaska's on-line sexual predator's bill will
not
become effective until November 28, 2005. All previous cases
were adjudicated in the federal system. |
| Arizona |
Ariz. Rev. Stat. § 13-3554 (2005). |
State
v. Hazlett, 73
P.3d 1258 (Ariz. Ct. App. 2003). |
In a case where the court examined several statutes
regarding
the exploitation of children, the court did not find Ariz. Rev. Stat. § 13-3554 (2005)
void as
amended. |
| Arkansas |
Ark.Code Ann. § 5-27-603 (2005).
(You will have to navigate the table of contents. This website is
difficult to navigate, and often does not work properly. Make sure
to go to Title 5, Subtitle 3, Chapter 27, Subchapter 6 to find
section 603). |
State
v. Brooks, ---
S.W.3d ----, 2005 WL 256478 (Ark. 2005). |
Trial court improperly transfered case from
jurisdiction where
defendant lived, and made Internet contact with victim, to place
where "victim" (who was an undercover officer) lived. This case has
not yet been reported, but will be. The citation has not been
provided yet. |
| California |
Cal. Penal Code § 288.2
(2005). |
People
v.
Hsu, 99
Cal. Rptr. 2d 184 (Cal. Ct. App. 2000) |
Cal. Penal Code § 288.2
(2005) making it a crime to use the
Internet to
distribute obscene material to a minor for the purposes of
enticement or sexual gratification was not void for vagueness, did
not violate the Commerce Clause of the US Constitution, was not
"overbroad" so as to violate the 1st Amendment of the US Constitution,
and was a
"content based" restriction on speech, and therefore permissible
under the 1st Amendment of the US Constitution. |
| Colorado |
Colo.
Rev. Stat. §
13-21-1002.
(Computer dissemination
of indecent
materials to a child); Colo. Rev. Stat. § 18-3-305 (2005)
(general statute on
enticement of a child) (you will
need to navigate through the table of contents, there is no direct
link to free access to these statutes or to the
Constitution.) edTitle("§ 18-3-305. Enticement of
a child",
"http://statcont.westlaw.com") |
. |
There are no
reported opinions
interpreting Colo.
Rev. Stat. §
13-21-1002.
All reported
opinions regarding Colo. Rev. Stat. § 18-3-305
(2005)have
not involved use
of the Internet. Colorado routinly uses the federal statute to
prosecute those cases. |
| Connecticut |
Conn .Gen. Stat. § 53a-90a
(2005).
(You will need to navigate the table of contents.) |
. |
There are no published opinions interpreting Conn .Gen. Stat. §
53a-90a(2005). One unpublished
opinion State v. Signore is avaliable from Westlaw at 2001 WL 1682396 and LexisNexis
at 2001
Conn. Super. LEXIS 3569. |
| Delaware |
Del. Code Ann. tit. 11 §
1112A
(2005). |
. |
Del. Code Ann. tit. 11 §
1112A (2005) has
not been interpreted in a published opinion. An unpublished
Superior court opinion did indicate that Del. Code Ann. tit. 11 §
1112A included
Internet solicitation. (In
re
Porter, 2005 WL 2813931). |
| District of Columbia |
D.C. Code Ann. § 22-3010
(2005). |
In
re Doe, 855 A.2d 1100
(D.C. 2004). |
Defendant was convicted in the federal system of 18 U.S.C. 2423(b) (2003).
Defendant argued he
had not committed a "reportable offense" and should not have to
report as a sexual offender. Court noted that if he had been
prosecuted in D.C. he would have been charged
under D.C. Code Ann. § 22-3010
(among others)
because he enticed two minors over the Internet to have sexual
relations with him. Defendant was ordered to register as a sexual
offender. |
| Florida |
Fla.
Stat. ch. 847.0135 (2005). |
Karwoski
v.
State, 867 So. 2d 486 (Fla. Dist. Ct. App. 2004).
(Note: you must log into LexisOne to view this case.
Registration is
free.) |
Statute was not overbroad, and did
not violate
free speech provisions of State or Federal Consistutions. That the
victim is an
undercover police officer does not preclude conviction. |
| Georgia |
O.C.G.A. § 16-6-5
(2005). (general
enticement of a child
statute); Computer
Pornography and Child Exploitation
Prevention Act of
1999,O.C.G.A.
16-12-100.2. |
Spivey v. State, 619 S.E. 2d 346
(2005). (Note: you must log into LexisOne
to view
this case. Registration is free.) |
Defendant's
conviction for
criminal attempt to entice a child for indecent purposes fell
within the definition of "criminal offense against a victim who is
a minor" under sex offender registration act, subjecting
defendant to registration requirements. The fact that no child
victim was involved in the police Internet sting operation did not
preclude application of sex offender registration requirements
under registration statute. |
| Hawaii |
Haw. Rev. Stat. § 707-756
(2005)
(Electronic enticement of a child in the first
degree); Haw. Rev. Stat. § 707-757
(Electronic
enticement of a child in the second degree). |
. |
There are no reported opinions interpreting Haw. Rev. Stat. § 707-756
(2005)
or Haw. Rev. Stat. § 707-757. |
Idaho
|
Idaho Code § 18-1509A (2005). |
State
v. Glass, 87 P.3d
302 (Idaho Ct. App. 2003). |
This case does not deal specifically with a prosecution
under Idaho Code § 18-1509A,
rather a prosecution
under Idaho
Code §§ 18-306 and 18-1508 (2003). The
facts,
however, lend themselves to
a prosection under § 18-1509A where the
defendant contacted a
14-year old "victim" using the Internet to entice the "victim" to
meet with him for a sexual encounter. That the "victim" was an
undercover officer did not affect the prosection. |
| Illinois |
720 Ill. Comp. Stat. § 5/11-6
(2005). |
People
v.
Arndt,
814
N.E.2d 980 (Ill.
App. Ct. 2004). |
Defendant was not allowed to use defense of
"entrapment" when
being prosecuted under 720 Ill. Comp. Stat. § 5/11-6
(2005). That
the "victim" was
an undercover officer did not affect the prosection, a person can
not be prosecuted under the statute unless they believe they
are
communicating with a minor. The statute was not overbroad, and did
not violate
the First Amendment of the United States
Constitution. |
| Indiana |
Indiana Code § 35-42-4-6
(2005). |
LaRose
v. State, 820
N.E.2d (Ind. Ct. App. 2005). |
Indiana
Code §
35-42-4-6 was narrowly
drawn, survived strict
scrutiny and did not violate the First Amendment of the United States
Constitution. |
| Iowa |
There is no
Iowa statute
specifically dealing with on-line enticement of a child, nor is
there a general enticement statute for sexual contact with a
child. |
In the Interest of B.S.L., No.
05-1098, slip
op. (Iowa Ct. App. Sept. 14, 2005). |
In this affirmation of termination of parental rights
of a
father, the court took into consideration the relationship the
father had with a 16-year-old girl. The father met the girl on the
Internet, moved her to Iowa and began a live-in sexual relationship
with her. |
| Kansas |
There is no
Kansas statute
specifically dealing with on-line enticement of a child, nor is
there a general enticement statute for sexual contact with a child.
A person can, however, be charged with "Attempted Indecent
Liberties with a Child" under Kan. Stat. Ann. §§
21-3202(2) and 21-3503(a)
(2005). (Note: you will have to navigate through menue, there
is no direct link to the statutes.) |
State
v. Jones,21 P.3d
569 (Kan. 2001). |
That "victim" was actually an undercover officer did
not
preclude prosecution. Entrapment is not avaliable as a defense when
police merely afford defendant the opportunity to commit the
offense he planned to commit. |
| Kentucky |
Ky.
Rev. Stat. Ann. § 510.155 (Banks-Baldwin
2005). |
. |
Ky. Rev. Stat. Ann. §
510.155 has only been
effective since June 20, 2005. As of November 15, 2005 there were
no reported opinions interpreting the statute. Previously there was
no statute dealing with on-line enticement of a child. |
| Louisiana |
La. Rev. State. Ann. § 14:81.3
(2005). |
. |
La. Rev. State. Ann. § 14:81.3
was passed June
29, 2005. As of November 15, 2005 there were no reported
opinions interpreting the statute. |
| Maine |
Me. Rev. Stat. Ann. tit. 17-A § 259. |
. |
There has been no reported opinion
interpreting Me. Rev. Stat. Ann. tit. 17-A § 259. |
| Maryland |
Md. Code Ann. Crim. Law §§
3-324; 11-207 (2004). § 3-324 is the solicitation of a
minor statute.§ 11-207 is the child pornography
statute, which
also encompasses solicitation of a child. |
Moore
v. State,882 A.2d
256 (Md. 2005). |
Provision of Md. Code Ann. Crim. Law
§
11-207 prohibiting a person from using a computer to
knowingly transmit or receive a minor's personal information for
the purpose of engaging in sexual conduct of or with a minor does
not cover computer contact with an adult "victim" posing as a
fictitious minor. In a concurring opinion, Judge Battaglia noted
that Md. Code Ann. Crim. Law § 3-324
would cover
contact with "adult" vicrim such as an undercover police
officer. |
| Massachusetts |
There is no specific statute dealing
with on-line enticement of a child,
however, Mass. Gen. Laws ch. 272 § 2 (2005),
makes it a crime
to entice a crime to entice
or take away a
person from the house of his parent or
guardian or elsewhere, for the purpose of prostitution or for the
purpose of unlawful sexual intercourse. |
Matter
of
Romm, 15 Mass. Att'y Discipline Rep. 505 (1999). |
Attorney suspended indefinitly from the practice of law
when
attorney pleaded nolo contendre to charges stemming from using
Internet to solicit sex from and to send obscene photographs to
undercover deputy sheriff posing as minor. |
| Michigan |
Mich. Comp. Laws. § 750.145d
(2005). |
People
v. Meyers,649
N.W.2d 123 (Mich. Ct. App. 2002). |
Defendant pled guilty to soliciting a child to commit
oral sex,
in violation of Mich. Comp. Laws. § 750.145d (2005).
That the
person Defendant actually solicited was an undercover officer did
not matter. Violation of this law requires Defendant to register as
a sex offender. |
| Minnesota |
Minn. Stat. § 609.352 (2005). |
State
v. Coonrod,652
N.W.2d 715 (Minn. Ct. App. 2002). |
The fact that the "victim" was a fictitous person
created in a
sting operation did not preclude prosecution under Minn. Stat. § 609.352 (2005). |
| Mississippi |
Miss. Code Ann. § 97-5-27 (2005).
(You will
have to navigate the table of contents to get to the statute, there
is no direct link.) |
. |
There has been no reported opinion interpreting Miss. Code Ann. § 97-5-27 (2005). |
| Missouri |
Mo. Rev. Stat. § 566.151 (2005). |
State
v. Bullock,153
S.W.3d 882, (Mo. Ct. App. 2005). |
This case affirms a conviction not based on Mo. Rev. Stat. § 566.151 (2005),
but on §§ 564.011 and 573.023. The facts, however, would
have called
for a conviction under 566.151 had it been avaliable at
that time. The
fact that the "victim" was an undercover officer did not preclude
prosection. |
| Montana |
Mont. Code Ann. § 45-5-625(1)(c)
(2005). |
. |
There is no reported opinion on this issue. |
| Nebraska |
Neb. Stat. § 28-320.02 (2005). |
. |
There is no published opinion interpreting Neb. Stat. § 28-320.02 (2005). |
| Nevada |
Nev. Rev. Stat. § 201.560
(2004). |
.. |
There is no published opinion interpreting Nev. Rev. Stat. § 201.560 (2004). |
| New Hampshire |
N.H. Rev. Stat. Ann. § 649-B:3
(2005) and N.H. Rev. Stat. Ann. § 649-B:4
(2005). (Note:
The New Hampshire State
Government on-line Information Center and the New Hampshire General
Court have not updated their on-line statute information since
12-09-2004. To make sure the statute linked is correct,
please consult the paper copy of New Hampshire Revised Statutes
Annotated, Wetlaw, LexisNexis
or a
similar research system. |
State
v. MacMillan, 872
A.2d 1031 (N.H. 2005). |
The
court found
the undercover detective's testimony of the contents of
Internet chat admissible. If the proper procedure has not been
followed to allow the wire tap recordings into evidence, the
officer must testify from his or her personal recollection of the
conversation. |
| New Jersey |
N.J. Stat. § 2C:13-6 (2004).
NJ legislature website
with access to statutes was unavaliable as of November 15, 2005.
Link is to version of statute marked up with amendments from
2004 when the law was last amended. |
In
re R.B., 870 A.2d 732
(N.J. Super. Ct. App. Div., 2005). |
Defendant who violated N.J. Stat. § 2C:13-6 (2004)
did have to register as a
sex offender. The
elements necessary to prove child luring are: (1) the accused
attempted to lure or entice a child into a motor vehicle,
structure, or isolated area; (2) the child is under the age of 18;
and (3) the accused had a purpose to commit a criminal offense with
or against that child. The act of child luring is complete
with the attempt
to lure or entice a child with a criminal purpose. |
| New Mexico |
2005 New Mexico Laws Ch. 295 (S.B. 415)
(2005).
This session law will replace NM ST
§ 30-37-3.2. (Note: you will need to
navigate the table of contents for the statute and the State
Constitution.) |
. |
New Mexico enacted the applicable statute in 2005. The
previous
statute was held unconstitutional. No new case law was avaliable as
of publication of this research guide. |
New York*
|
NY Penal Law § 235.22 (McKinney
2003).
|
People
v. Foley, 731
N.E.2d 123 (N.Y.
2000). |
NY Penal Law § 235.22 (McKinney
2003) did
not violate free speech provisions of the Federal Constitution, it was not
overbroad, nor
was it vauge. Statute did not violate the Commerce Clause of the Federal Constitution.
It
did not matter that the "minor" was actually an undercover police
officer. Each case should be looked at on a case-by-case
basis. |
| North Carolina |
N.C. Gen. Stat. §. 14-202.3 (2005). |
State
v. Quinn, 603
S.E.2d 886 (N.C. Ct. App. 2004). |
Defendant was charged and convicted of statutory rape,
and not
charged under N.C. Gen. Stat. §. 14-202.3
(1996), however the
facts of the case indicate defendant could have been charged
under N.C. Gen. Stat. §. 14-202.3. |
| North Dakota |
ND Cent. Code § 12.1-20-05.1
(2005). |
State v. Backlund, 672 N.W.2d 431
(N.D. 2003). |
Defendant
who used
his computer in MN was subject to prosecution in ND.
ND Cent. Code § 12.1-20-05.1
(2005) does
not violate Commerce Clause, nor the free
speech provisions
of the State and Federal Constitutions.
Statutory sexual
offender registration and notification provisions did not violate
double jeapardy provisions of State and Federal
Consitutions. |
| Ohio |
Ohio Code § 2907.07 (2005).
(You will have to
navigate through the table of contents, there is no direct link to
this statute.) |
State
v. Tarbay, 810
N.E.2d 979 (Ohio Ct. App. 2004). |
Ohio Code § 2907.07 (2005)
did not violate the
free speech provisions of the Federal Constitution, it was
narrowly tailored
to acheive a compelling interest. Evidence that defendant drove to
arranged
meeting place, on day he agreet to meet victim for purpose of a
sexual encounter that had been set up on the Internet was
sufficient to convict defendant. |
| Oklahoma |
Okla. Stat. tit. 21, § 1040.13a
(2005). |
. |
There have been no reported opinions interpreting Okla. Stat. tit. 21, § 1040.13a
(2005). |
| Oregon |
There is no
Oregon statute
specifically dealing with on-line enticement of a child, nor is
there a general enticement statute for sexual contact with a
child. |
. |
There is no reported opinion on this issue. |
| Pennsylvania |
18 Pa. Cons. Stat. Ann. § 6318
(2005). Note:
The complete Pennsylvania statutes are not avaliable on the
Internet. The above link is to an unnofficial source for PA
statutes. Please check Westlaw or LexisNexis.
You will need
to scroll past the table of contents to read the statute. |
Commonwealth.
v. Moran,
823 A.2d 923 (Pa. Super. Ct. 2003). |
Court
held that
sentence of 108 - 540 months incarciration with five years'
probation consecutive to the prison sentence [where: Count
2 (statutory
sexual assault, 18 Pa. Cons. Stat. Ann. §3122.1)
is
to run consecutive to Count
1 (involuntary deviate sexual intercourse, 18
Pa. Cons. Stat.
Ann. § 3123(a)(7)), Count 5 (sexual abuse
of children, 18 Pa. Cons.
Stat. Ann. § 6312(b)) is to run
consecutive to Count 2 (statutory sexual
assault, 18 Pa. Cons. Stat. Ann. § 3122.1), and Count 9 (possession of
child
pornography, 18 Pa. Cons. Stat. Ann. § 6312(d)) is to run
consecutive to
Count 5 (sexual
abuse of children, 18 Pa. Cons. Stat. Ann.
§ 6312(b)).]
was proper, and the
trial court's modification of the sentence was proper where the
modification was only to clarify the trial judge's original intent
in sentencing. [Note: statutes are not
linked
because the complete Pennsylvania statutes are not avaliable for
free on the Internet in any official or reliable form. |
| Rhode Island |
There is no
Rhode Island statute
specifically dealing with on-line enticement of a child, nor is
there a general enticement statute for sexual contact with a
child. |
. |
There is no reported opinion on this issue. |
| South Carolina |
S.C.
Code Ann. § 16-15-342
(2005). |
.. |
There are no reported opinions interpreting S.C.
Code Ann. § 16-15-342 (2005). |
| South Dakota |
S.D.
Codified Laws §§ 22-22-24.4 (2005);
22-22-24.5 (2005). |
.. |
There has been no reported decision interpreting
S.D. Codified Laws §§ 22-22-24.4 (2005)
or 22-22-24.5 (2005). |
| Tennessee |
Tenn. Code Ann. § 39-13-528 (2005).
(You will
have to navigate through the table of contents, there is no direct
link to the statute.) |
Fuller
v. State, No.
E2004-02276-CCA-R3-PC 2005, slip op.(Tenn. Ct. App.
2005).
This case was decided November 4, 2005. It will be reported, but a
citation had not been assigned as of November 15, 2005. |
This is an ineffective assistance of council case
stemming from
a 1997 conviction for statutory rape. Although defendant was
not charged under Tenn. Code Ann. § 39-13-528
under the facts of
the case he could have been. This case has been included in this
research guide because it provides insight into the mental
condition of an on-line sexual predator. |
| Texas |
Tex.
Penal Code Ann. § 33.021 (Vernon 2005). |
. |
This bill was effective June 18, 2005. As of November
15, 2005
no reported opinion has interpreted this statute. |
| Utah |
Utah Code Ann. § 76-4-401 (2005). |
State
v. Ansari, 100
P.3d 231 (Utah Ct. App. 2004). |
Utah Code Ann. § 76-4-401did
not have
inconsistent terms, and was upheld against defendants
Constitutional arguments. Clause 1 of statute does not require
state to
affirmatively prove absense of attempt, conspiracy and
solicitation. |
| Vermont |
Vt. Stat. tit. 13 § 2828 (2004). |
. |
There has been no reported opinion interpreting Vt. Stat. tit. 13 § 2828 (2004). |
| Virginia |
Va.
Code Ann. §
18.2-374.3 (2005). |
Brooker
v.
Commonwealth,587 S.E.2d 732 (Va. Ct. App. 2003). |
Evidence was sufficient that defendant violated Va.
Code Ann. §
18.2-374.3 (2005). when on multiple occasions he
used
the Internet to send pictures of his genitles to a person he
believed to be a minor, after asking the person he believed to be a
minor if they wanted him to remove his pants. That the "minor" was
an undercover officer did not matter. |
| Washington |
Wash. Rev. Code §
9.68A.090
(2005). |
. |
There is no published opinion interpreting this
statute.
There are several unpublished opinions not included in this
research guide because they are prohibited from being used as
primary authority. |
| West Virginia |
W.V. Code § 61-3C-14b (2005). |
. |
There has been no reported opinion interpreting W.V. Code § 61-3C-14b (2005). |
| Wisconsin |
Wis. Stat. § 948.075 (2005). |
In
re Disciplinary
Proceedings Against Engl, 698 N.W.2d 821 (Wis.
2005) |
In this case, the Supreme Court of Wisconsin held that
an
attorney's violation of Wis.
Stat. § 948.075 warranted a public
reprimand. |
| Wyoming |
Wyo. State. Ann. § 6-4-303
(b)(ii) (2005).
(Note: you will need to scroll down to the statute.) |
Adams
v. State, 117 P.3d
1210 (Wyo. 2005). |
Presence
of a
minor victim is not required for violation of conviction for
violation of Wyo. State. Ann. § 6-4-303
(b)(ii);
it was
not a violation of the best evidence rule to admit printout of
Internet communications beween defendant and
victim.
|
* NY has
temporarily
disabled access to the State Constitution on-line. Click to return
to table.
Sex
Offender Registries.
Jacob Wetterling Crimes Against Children and Sexually Violent
Offenders Act requires all states to create a sexual offender
registration program or forfeit 10% of their federal funds for
state and local law enforcement.[50]
All fifty
states have complied with this law. In 1996, Megan's Law amended
section (e) of this law to require states to notify the community
when a sexual offender moves to the area. The law does not mandate
how states are to notify communities, but does recommend that
states create websites with sexual offender information. There
was a great deal of debate as to whether these state laws would be
retroactive, meaning that those who had already been sentenced
would be required to register. In 2003 the Untied States Supreme
Court determined that Jacob's Law (and Megan's Law contained
therein) were not punitive, and therefore its retroactive
application did not violate the ex post facto clause.[51]
Additionally, defendant's who have been convicted of
violating federal or state on-line sexual predator laws are
required to register, just as if they had committed another sexual
offense.[52]
After both Jacob's Law and Megan's Law passed, every
state created a sexual offender registry. There is also a
National
Sexual
Offender Registry. Many of these registries focus primarily
on
sexual predators. These registries can provide a parent or a child
who is communicating with someone on-line that ability to check if
that person is a registered sex offender. The registries also allow
citizens to determine if there is a registered sexual offender
living in their neighborhood. Virtually every site includes a
disclaimer or a terms of use notice informing the user that the
information contained in the site is not to be used for harassment
of the individuals listed in the registry. Those using the
registries should note that the people contained therein are not
wanted for any crime unless otherwise indicated. Click on a state
to go to that state's sexual offender registry. From a registry, click
the back button to return
to the research guide.
Georgia
Law.
Because this paper is
written for a
class at
Georgia
State University College of Law, it seemed
appropriate to take some time to speak specifically to Georgia
Law.
There are several Georgia statutes directed at sexual predator
behavior, whether it occurs on-line, in person, or in a combination
of the two. In
O.C.G.A.
§ 16-6-5 Enticing a Child for Indecent
Purposes, (a) [a] person commits the offense of enticing a
child for indecent purposes when he or she solicits, entices, or
takes any child under the age of 16 years to any place whatsoever
for the purpose of child molestation or indecent acts.
[53]
The statute further details that (b) [a] person
convicted of the offense of enticing a child for indecent purposes
shall be punished by imprisonment for not less than one nor more
than 20 years. Upon a first conviction of the offense of enticing a
child for indecent purposes, the judge may probate the sentence;
and such probation may be upon the special condition that the
defendant undergo a mandatory period of counseling administered by
a licensed psychiatrist or a licensed psychologist. However, if the
judge finds that such probation should not be imposed, he shall
sentence the defendant to imprisonment. Upon a second or third
conviction of such offense, the defendant shall be punished by
imprisonment for not less than five years. For a fourth or
subsequent conviction of the offense of enticing a child for
indecent purposes, the defendant shall be punished by imprisonment
for 20 years. Adjudication of guilt or imposition of sentence for a
conviction of a third, fourth, or subsequent offense of enticing a
child for indecent purposes, including a plea of nolo contendere,
shall not be suspended, probated, deferred, or withheld.
[54]
In
Spivey v.
State, the defendant was convicted
in the Superior Court of Houston County of criminal attempt to
commit child molestation, criminal attempt to entice a child for
indecent purposes, and computer pornography and child exploitation,
for which the trial court ordered him to register as sex offender.
The defendant appealed on the grounds that his convictions did not
subject him to the sex offender registration requirements. Spivey
was arrested as part of a police Internet "sting" operation, in
which an adult male police officer posed as a 14-year-old girl
looking for pen pals on the Internet. Spivey responded to the
posting, and the two began corresponding and chatting on-line.
Spivey sent explicit sexual messages to the fictitious minor, and
eventually arranged a meeting at a skating rink frequented
primarily by children. After confirming that Spivey sent the
messages, the police arrested him at the skating rink when he
arrived for the meeting. The court held that the defendant's
convictions for criminal attempt to commit child molestation and
criminal attempt to entice a child for indecent purposes fell
within the definition of "criminal offense against a victim who is
a minor" under the sex offender registration act, thus subjecting
the defendant to registration requirements, and that the statute
was devoid of any limitation to completed offenses against victims
who are minors, but instead included any convictions for criminal
offenses against a victim who is a minor. The fact that no child
victim was involved in the police Internet sting operation
resulting in defendant's conviction for criminal attempt to commit
child molestation and criminal attempt to entice a child for
indecent purposes did not preclude the application of sex offender
the registration requirements under registration statute, since the
statute's broad language explicitly included any criminal offense
consisting of criminal sexual conduct toward a minor, solicitation
of a minor, or any conduct constituting sexual offense against a
minor, and imposition of such limitation would have been contrary
to the legislative intent of statute, which was to protect the
community by notifying it of individuals who may have posed a
threat. Defendant's conviction under the computer pornography and
child exploitation act also subjected him to registration
requirements under the sex offender registration statute. The act
created felony liability for those using on-line Internet service
in the commission of unlawful sexual offenses against children,
which fell within definition of a "criminal offense against a
victim who is a minor," under the sex offender registration
statute.
[55]
The defendant in
Pierce
v. State was convicted after a jury trial
in the Superior Court of Houston County of contributing to the
delinquency of a minor and enticing a child for indecent purposes.
Alleged past sexually explicit conversations that the teenaged
female victim had with other people on Internet were irrelevant,
and evidence of conversations was inadmissible, where, even if the
victim had sexual conversations with others, such evidence would
not have supported an inference that the defendant could have
reasonably believed that she consented to his crimes of enticing
her for indecent purposes and contributing to her
delinquency.
[56]
O.C.G.A. §
16-12-100 outlines the crime of Sexual
Exploitation
of Children. The code section provides that it is unlawful to
produce or assist a person in producing child pornography, for a
parent to permit someone to engage in sexually explicit conduct
with their child in order to produce child pornography, to engage
in sexually explicit conduct for the purpose of performance, for a
parent or guardian to permit someone to engage in sexually
explicit conduct for the purpose of performance, to create,
reproduce, publish, promote, sell, give, exhibit, distribute or
possess with the intent to distribute child pornography, to
advertise child pornography, to bring child pornography into the
state of Georgia, to control child pornography. It provides for the
forfeiture of property used in or gained from the production of the
material. Violation of this statute is a felony which carries 5
year minimum, 20 year maximum sentence, and a $100,000 maximum
fine. If the person is an immediate family member, there will be no
fine. The law mandates that if a person works in a photo lab and
has reasonable cause to believe that something is child
pornography, they must report it to the Georgia Bureau of
Investigation. A photo lab technician must report all suspected
child abuse to the proper authorities.
[57]
Many
argue that making these technicians mandated reporters places
the general public at risk to be turned in the Department of
Children and Family Services for capturing special and private
moments of their children. The best example of a home snapshot that
had so many worried about the enforcement of this law, is a young
toddler in a bath. What parent hasn't snapped a shot of their baby
in a tub filled with bubbles, or as they run away down the hall
from you, so happy to finally be free of their diaper. Would
innocent photos meant to capture a child's youth require a parent's
name to be turned over to an investigating agency? Most major
retail photo finishers do have a policy that deals with this issue.
Walmart.com reserves the right to disclose any content posted by
you or any other customers as necessary to satisfy any law,
regulation or governmental request, or to edit, refuse to post or
to remove any content, in whole or in part, that in Walmart.com's
judgment are unsuitable or in violations of their Photo Center
Terms of Use
[58]
or the Site Terms
of
Use.
[59]
Most other photo labs
have similar
policies.
[60]
However, this, just
like most
individual judgment calls are only as effective as the person
working at the lab's counter. The technician's ability to make
decisions as to what photos to turn over and which ones to ignore
will be based on the level of training and importance this issue is
deemed by their employer. They are immune from any civil or
criminal liability that might otherwise be incurred for developing
the film. Failing to report is a misdemeanor.
[61]
In one case the Court of
Appeals of Georgia found the digital
code of images that produced pictures when interpreted by software
amounted to a "visual medium," within the meaning of a statute
making it unlawful to distribute any "visual medium" which depicts
a minor engaged in any sexually explicit conduct, and thus, the
defendant reasonably should have known that he could be prosecuted
for sexual exploitation of children by the electronic transmission
of "computer processed and generated images depicting a lewd
exhibition of the genitals and pubic areas of minors," as set forth
in the indictment. Electronic transmission constitutes a method of
distribution as contemplated by the statute making it unlawful to
"distribute" any visual medium which depicts a minor engaged in any
sexually explicit conduct.
[62]
O.C.G.A. §
16-12-100.1 makes it a felony to electronically
furnish
obscene material to minors. This code section describes how
one commits the crime of electronically furnishing obscene
materials to a minor. Violation is a misdemeanor of a high and
aggravated nature.
[63]
The
Computer Pornography and Child Exploitation Prevention Act of
1999 prohibits use of the computer, Internet or on-line
service for the purposes of child pornography, enticing a child or
a person believed to be a child to commit any illegal sexual act,
and making obscene Internet contact with a child. A person commits
the offense of computer pornography if such person intentionally or
willfully: (A) [c]ompiles, enters into, or transmits by means of
computer; (B) [m]akes, prints, publishes, or reproduces by other
computerized means; (C) [c]auses or allows to be entered into or
transmitted by means of computer; or (D) [b]uys, sells, receives,
exchanges, or disseminates any notice, statement, or advertisement,
or any child's name, telephone number, place of residence, physical
characteristics, or other descriptive or identifying information
for the purpose of offering or soliciting sexual conduct of or with
an identifiable child or the visual depiction of such
conduct.
[64]
A person commits the
offense of
obscene Internet contact with a child if he or she has contact with
someone he or she knows to be a child or with someone he or she
believes to be a child via a computer on-line service or Internet
service, including but not limited to a local bulletin board
service, Internet chatroom, e-mail, or on-line messaging service,
and the contact involves any matter containing explicit verbal
descriptions or narrative accounts of sexually explicit nudity,
sexual conduct, sexual excitement, or sadomasochistic abuse that is
intended to arouse or satisfy the sexual desire of either the child
or the person, provided that no conviction shall be had for a
violation of this subsection on the unsupported testimony of a
child.
[65]
The statute also prohibits the intentional or willful
use of a computer on-line service or Internet service,
including but not limited to a local bulletin board service,
Internet chatroom, e-mail, or on- line messaging service to seduce,
solicit, lure, or entice, or attempt to seduce, solicit, lure, or
entice a child or another person believed by such person to be a
child to commit any illegal act described O.C.G.A.in Code Section
16-6-2
[66],
Code Section 16-6-4
[67], Code Section 16-6-5
[68],
or Code
Section 16-6-8
[69]. In subsection
(g), in an
attempt to circumvent the argument that conviction under this
statute is not proper if the "victim" is not a minor, the code
specifically states that "the sole fact that an undercover
operative or law enforcement officer was involved in the detection
and investigation of an offense under this Code section shall not
constitute a defense to prosecution under this Code
section".
[70]
O.C.G.A. §
16-12-100.3 incorporates definitions from
O.C.G.A.
§ 16-12-100.1
[71] and
O.C.G.A. §
16-12-100.2.
[72]
The staute
outlaws obscene
telephone contact with a child, which it defines as a
person under age 14. A person 17 years of age or over commits the
offense of obscene telephone contact with a child if that person
has telephone contact with an individual whom that person knows or
should have known is a child, and that contact involves any aural
matter containing explicit verbal descriptions or narrative
accounts of sexually explicit nudity, sexual conduct, sexual
excitement, or sadomasochistic abuse which is intended to arouse or
satisfy the sexual desire of either the child or the person,
provided that no conviction shall be had for this offense on the
unsupported testimony of the victim. Violation is a misdemeanor of
a high and aggravated nature. For the first conviction, if the
defendant is under 21, they are guilty of a misdemeanor (or the
judge may grant probation with special conditions). A second or
subsequent conviction is a felony -- minimum 1 year incarceration,
maximum 5 years incarceration.
[73]
Return to
top of
State Laws.
Return to State Laws and
Cases
Table.
Return to Sexual
Offender
Registries.
Return to Sexual
Offender
Registries Map.
Return to Georgia Law.
Return to Table of Contents.
What
is the appropriate punishment?
Through the years, courts have imposed severe restrictions on
the individual liberties of convicted sexual offenders by way of
probation conditions. These conditions have included mandatory
lifetime counseling, as well as time and subject restrictions on an
offenders use of the Internet. Courts in Georgia routinely subject
these defendants to "Addendum B" sex offender conditions that
prohibit the defendant from working, volunteering, or having any
direct association with any organization directed at children, such
as boy scouts, any educational facility, neighborhood parks, little
league teams, etc. Additionally these offenders are prohibited from
initiating any contact with children under the age of 16 for any
purpose. The history of these decisions has shown that court order
restricting a predator's access to children, whether mandated by
state statute or not, are constitutionally valid.
Return to Table of Contents.
Community
Action and Resources.
States, counties, and cities, both large and small, are beginning
to take the fight against sexual on-line predators into their own
hands. They are fighting with information. Nationally, the
National Center for Missing and Exploited Children created a Cyber
Tipline. This allows a child or anyone who believes that a child
has been targeted by an on-line sexual predator to report the
situation.
[74]
The United States
Department of
Justice has created the National Sex Offender Public Registry.
While this registry is not just for those offenders who have been
convicted as an on-line sexual predator, it would allow a child or
a parent to search for the name of an "on-line friend" to determine
whether that person has been convicted of a sex crime.
[75]
On the state and local government level,
many governments have also started providing more information
to citizens about sexual predators. Delaware County, Ohio set up
the Delaware County Sheriff's Office Computer Crimes Division in
2005. They posted an announcement of their first arrest in July
2005, and they promise to keep the public updated on
arrests.
[76]
Other jurisdictions,
such as the
Austin, Texas Police Department, have created similar
divisions.
[77]
Multnomah County,
Oregon created a
Department of Community Justice Predatory Sex Offender
webpage.
[78]
This has led to the
arrest of at
least one individual.
[79]
Officials in New Jersey
have noticed an increase in on-line sexual exploitation of
children. Lawmakers there have drafted legislation making the
investigation of an on-line sexual predator easier.
[80]
The private sector has joined in the fight as well. Some private
organizations, such as Sexualpredators.com have set up similar
databases to inform the public of sexual offenders in their area.
Sexualpredators.com promises to set up a sexual predator alert
center in the future and posts pictures of wanted sexual offenders
on their homepage.
[81]
PCtattletale.com has
created a "National Alert Registry" that claims to create a
neighborhood predator report. By entering a zip code you are
provided with the number of registered sexual offenders in your
area. For a $10 fee, they will create a "complete report" with
photographs, appearance details, conviction information, offense
dates, offense details, street address, and name/aliases and you
will be alerted when a new sexual offender moves into your
area.
[82]
Perverted-Justice.com works with
local news organizations and sets up stings
[83]
-- often providing taped evidence to local police.
[84]
All if these organizations working together toward one common goal
have created a large amount of web based resource guides to
assist children and their parents in safely navigating the world
wide web. Several of these family sources are:
wiredsaftey.org
[85], WiredKids.org
[86],
NetSafekids
[87],
CyberLawEnforcement.org
[88], Kidz
Privacy
[89], National
Center for Missing and Exploited
Children -- Help Delete on-line Predators Campaign
[90],
ProtectKids.com
[91], the Center
for Sex Offender Management
[92],
and Web
Aware
[93].
Several of
these organizations
exist solely on the Internet and are mostly run by volunteers with
just one goal, to assist parents and children in becoming more
Internet savvy.
Return to Table of Contents.
Conclusion
With numerous advances in technology, coupled with the increased use of
computers and the Internet by children, the Internet can pose a threat
to children's safety. On-line sexual predators use Internet
communication technology to locate their victims, start
and facilitate on-line relationships and follow through with
sexually predatory acts. It is important for parents and children to
know how to safeguard their computer and Internet
network from such predators. They need to know
the signs and
warnings that they are communicating with an on-line sexual predator.
Likewise, it is equally
important for Internet companies, law makers, and the courts to work
together to provide legal safeguards and protections to children, while
simultaneously creating a deterrent and constitutionally valid
penalties for on-line sexual predators. Historically, it has
been
challenging for the legislature and the courts to enact and enforce
laws designed to protect children from on-line sexual predators without
violating an individual's constitutional rights and protections.
However, there are many state and federal laws that do
exist which
are aimed at prohibiting and deterring on-line sexual predators and
which are, to date, constitutionally
valid. Enforcement is
emerging as a major issue in the application of existing laws
prohibiting on-line predatory acts. This issue is ultimately
left
up to the courts to resolve and is one on which jurisdictions are
split. As a majority opinion emerges on what types of legislation and
methods of enforcement are valid and ones are not,
legislatures
must continue to draft better laws and law enforcement agencies must
continue to search for ways to enforce them. In the mean time, parents
and community organizations must be aware of the possible
threat on-line sexual predators pose and the many ways in
which
they can stop them. The Internet is a wonderful resource for
information and entertainment. It is easy for someone to feel
safe while enjoying the Internet from the safety of their
own home. However, it is important to realize that the
Internet
truly does give one access to the world and the world access to the
user. Users beware.
"Go
home and hug your children tonight, tell them you love them.
Because if you don't someone in there [pointing to computer]
will." FBI agent to
Parry
Aftab Executive Director of
WiredSafety.org
[1]
Parry Aftab,
Comments on the Effectiveness of
Internet
Protection Measures and Safety Policies, Children’s Internet
Protection Act (CIPA) -- The Seventeen Survey, (2000)
at http://www.ntia.doc.gov/ntiahome/ntiageneral/cipacomments/pre/aftab/surveysummary.htm.
[2]
Amy's Choice is a short film
produced by
www.netsmartz.org.
It is a
true story of one teenage girl who started a relationship with an
older man she met on-line. In the film Amy describes the events
that led her to run away with the man, his arrest and her discovery
of his criminal record. This film can be found at
http://www.netsmartz.org/resources/reallife.htm#realAmy.
[3]
United States Department
of Justice,
Office of Juvenile Justice and Delinquency Prevention Fact
Sheet
Highlights of the Youth Internet
Safety
Survey, (March 2001, #4)
at http://www.cybertipline.com/en_US/documents/Internetsafety_surv.pdf.
[4]
United States Department
of Justice
Center for Sex Offender Management,
Myths and Facts About Sex
Offenders,
(August 2000)
at http://www.csom.org/pubs/mythsfacts.html.
[5]
This link provides access
to a radio
public service announcement produced by the Ad Council. The audio
is the voice of an adult male describing his methods for enticing
young girls over the Internet. This disturbing look into the mind
of an on-line sexual predator ends with the idea that meeting the
girl in person is "when things get interesting." The public service
announcement can be found at
http://cdn.eyewonder.com/100125/400136/402713/sendtoafriend.html?videoname=HowtoSeduce30-.
[6]
This link provides access
to a short
public service announcement intended for television produced by the
Ad Council. It depicts an adult male describing his methods for
enticing young girls over the Internet. It splices between his
comments are those of a young female explaining why she likes to
talk to older men on the Internet, explaining that they understand
her in a way that boys her age do not. The audio of the adult male
is the same found in the public service announcement found in
endnote
5. This public service
announcement is
available at
http://cdn.eyewonder.com/100125/400136/400907/sendtoafriend.html?videoname=Exchange30-.
[7]
Statistics provided by the
Microsoft
Corporation at
http://www.microsoft.com/athome/security/children/kidpred.mspx#EPB.
[8]
"
Tracing
Theresa" is a short public service announcement produced
by
www.netsmartz.org.
The public service announcement
shows how easy it is to track a child to their home address from
one post in an Internet chatroom. While the intent of this film, as
well as others such as "Amy's Choice" and the public service
announcements produced by the Ad Council can be described as "scare
tactics" used to keep young people from using the Internet for
communication, they do provide some useful information and examples
for parents to discuss with children. This public service
announcement can be found at
http://www.netsmartz.org/resources/reallife.htm#realAmy.
[9]
Donna Harris,
Blogging
on-line Diaries Can
Open Teens Lives
to Predators, Cherokee Tribune, Oct. 21, 2005,
available at http://www.cherokeetribune.com/articles/2005/10/21/308/10198761.txt.
[10]
Office of New York State
Attorney
General Eliot Spitzer,
Agreement
Removes and Bars Predators' chatrooms -- Yahoo! Implements Sweeping
Reforms to Protect Children, Oct. 12, 2005,
available at http://www.oag.state.ny.us/press/2005/oct/oct12a_05.html.
[11]
Chatmag News,
Investigative
Report and Loss of
Advertisers,
Not Spitzer Agreement, Closes Yahoo! User chatrooms, Oct.
15, 2005,
available
at http://www.chatmag.com/news/101505_yahoo_chat.html.
[12]
Media Awareness Network,
Web Aware -- on-line
Predators,
(2004)
available
at http://www.bewebaware.ca/english/on-linePredators.aspx.
[13]
The Communications
Decency Act of 1996
(CDA),
47 U.S.C. § 223,
invalidated by
Reno v. ACLU, 521 U.S. 844 (1997).
[14]
Reno v. ACLU, 521 U.S. 844 (1997).
[15]
Child
on-line Protection
Act (COPA),
47 U.S.C. § 231,
invalidated by Ashcroft v.
ACLU,
542 U.S. 656 (2004).
[16]
Memorandum of Judge Reed for the Eastern
District
of Penssylvania, ACLU v. Reno, November 20, 1998 (No.
98-5591).
[17]
Ashcroft v. ACLU,
535 U.S. 564 (2002).
[18]
ACLU v. Ashcroft,
322 F.3d 240 (3rd Cir. 2003).
[19]
Ashcroft v. ACLU,
542 U.S. 656 (2004).
[20]
Children's
Internet Protection
Act of 2000 (CIPA),
§
1701, 114 Stat. 2763A-335, invalidated by
[21]
ACLU v. United States,
201 F.Supp.2d 401 (E.D. Pa. 2002) reversed by
United States v.
American Library Ass'n,
539 U.S. 194 (2003).
[22]
United States v.
American Library
Ass'n,
539 U.S. 194 (2003).
[23]
Prosecutorial remedies
and tools
Against the Exploitation of Children Today Act of 2003 (Protect Act
of 2003),
18 U.S.C. § 3742(e)(3)(B).
[24]
The
Children's on-line Privacy
Protection Act of 1998 (COPPA),
15
U.S.C. §§
6501-6506 (2005).
[25]
How to Comply With
Children's on-line
Privacy Protection Act, provided by the Federal Trade
Commission available
at http://www.coppa.org/comply.htm.
[26]
http://www.ftc.gov/bcp/con-line/edcams/kidzprivacy/adults.htm.
[27]
http://www.ftc.gov/bcp/con-line/edcams/kidzprivacy/kidz.htm.
[28] 18
U.S.C.
§ 2422
(2005).
[29]
U. S. v. Ortiz, 804 F.2d
1161 (10th
Cir. 1986). Due to the age of this case, it is not available
for free on-line. If you have access to one of the paid legal
research subscription services such as
Westlaw,
LexisNexis
or
LoisLaw,
you should be able to access it.
Additionally, you can always look in the bound reporter, which can
be found at most law libraries and some public libraries.
[30]
Lopez v. United States,
373 U.S. 427(1963).
[31]
United States v.
Russell,
411 U.S. 423 (1973).
[32]
United States v. Gurule,
522 F.2d 20
(10th Cir. 1975). Due to the age of this case, it is
not available for free on-line. If you have access to one of
the paid legal research subscription services such as
Westlaw,
LexisNexis
or
LoisLaw,
you should be able
to access it. Additionally, you can always look in the bound
reporter, which can be found at most law libraries and some public
libraries.
[33]
U. S. v. Ortiz, 804 F.2d
at 1165 (10th
Cir. 1986.) See note at endnote
[29]
for on-line
availability of this case.
[34]
U. S. v.Criswell,
401 F.3d 459 (6th
Cir. 2005).
[35]
United States Sentencing
Guidlines
Manual §
2A3.2(b)(2)(B) (2001).
[36] US
v.
Root,
296 F.3d 1222 (11th Cir. 2002).
[37] United
States v
Mitchell,
353 F.3d 552 (7th Cir. 2003).
[38]
United States Sentencing
Guidlines
Manual §
2A3.2(b)(3) (2001).
[39]
18 U.S.C. § 2423 (2003).
[40]U.S.
v. Hicks, No.
CRIM.050004201CRWDW,
slip op, 2005 WL 2090785, (W.D.Mo., Aug 29, 2005). This opinion is
currently not available for free on-line.
[41]
18 U.S.C. §
2425
(1998).
[42]
U.S.
v. Taylor, 338 F.3d
1280(11th Cir. 2003).
[43]
18
U.S.C. § 1470 (1998).
[44]
The Child's Safety Act of 2005, H.R. 3132, 109th Cong. (2005).
[45]
The legislative history
for this bill
is avaliable at
http://thomas.loc.gov/cgi-bin/bdquery/z?d109:HR03132:@@@S.
[46]
Kansas, Maryland and
Massachusetts.
[47]
Iowa, Oregon and Rhode
Island.
[48]
Alabama, Alaska,
Colorado, Connecticut,
Delaware, Hawaii, Kentucky, Louisiana, Maine, Mississippi, Montana,
Nebraska, Nevada, New Mexico, Oklahoma, South Carolina, South
Dakota, Texas, Vermont, Washington and West Virginia.
[49]
See People
v.
Hsu, 99 Cal. Rptr. 2d 184 (Cal. Ct. App.
2000); Karwoski
v.
State, 867 So. 2d 486 (Fla. Dist. Ct. App. 2004).
(Note: you must log into LexisOne to view this case.
Registration is
free.);
Spivey v. State, 619 S.E. 2d 346
(2005). (Note: you must log into LexisOne
to view
this case. Registration is free.); People v. Arndt, 814 N.E.2d 980 (Ill. App.
Ct.
2004); LaRose
v. State, 820
N.E.2d (Ind. Ct. App. 2005);
State
v. Jones, 21 P.3d
569 ( Kan. 2001); Moore v. State, 882 A.2d 256 (Md. 2005);
People v. Meyers,
649
N.W.2d 123 (Mich. Ct. App. 2002);
State
v. Coonrod, 652
N.W.2d 715 (Minn. Ct. App. 2002);
State
v. Bullock,153
S.W.3d 882(Mo. Ct. App. 2005);
People
v. Foley,
731
N.E.2d 123 (N.Y.
2000); State v. Backlund, 672 N.W.2d 431
(N.D. 2003); State
v. Tarbay, 810
N.E.2d 979 (Ohio Ct. App. 2004); and
Brooker
v.
Commonwealth,587 S.E.2d 732 (Va. Ct. App. 2003).
[50] Jacob Wetterling Crimes Against Children and
Sexually Violent Offenders Act, 42 U.S.C. §§
14071-14080 (2002).
[51]
Smith v. Doe,538 U.S. 84 (2003).
[52]
For a thorough
explanation on the
history, policy and problems with these law, see
Doe
v. Poritz,662 A.2d
367 (N.J. 1995).
[53]
O.C.G.A. § 16-6-5(a) (2005).
[54]
O.C.G.A. § 16-6-5(b) (2005).
[55]
Spivey v. State,
619 S.E. 2d 346 (2005).
(Note: you
must log into LexisOne to view
this case. Registration is free.)
[56]
Pierce v. State,
251 Ga.App. 600 (2001).
(Note: you
must log into LexisOne to view
this case. Registration is free.)
[57]
O.C.G.A. § 16-12-100 (2005).
[58]
WalMart Photo Center
Terms of Use
avaliable at
http://www.walmart.com/catalog/catalog.gsp?cat=181118&path=0%3A5426%3A181118.
[59]
Walmartstores.com Terms
of Use for the
Walmartstores.com website
available
at http://walmartstores.com/GlobalWMStoresWeb/navigate.do?catg=234.
[60]
See Greg's
Pharmacy
Photo Center Terms
of Use
available at
http://gregspharmacy.com/PremiumPhotoLab/tabid/58/ctl/Terms/Default.aspx.
[61]
O.C.G.A. § 16-12-100 (2005).
[62] State
v. Brown,
250 Ga.App. 376 (2001). (Note: you
must log into
LexisOne to view this case.
Registration is free.)
[63]
O.C.G.A. § 16-12-100.1 (2005).
[64] The
Computer
Pornography and Child
Exploitation Prevention Act of 1999,
O.C.G.A. § 16-12-100.2 (2005).
[65] The
Computer
Pornography and Child
Exploitation Prevention Act of 1999,
O.C.G.A. § 16-12-100.2(e)(1) (2005).
[66]
O.C.G.A. § 16-6-2 (2005).
[67] O.C.G.A. § 16-6-4 (2005).
[68] O.C.G.A. § 16-6-5 (2005).
[69] O.C.G.A. § 16-6-8 (2005).
[70]
The Computer Pornography
and Child
Exploitation Prevention Act of 1999,
O.C.G.A. § 16-12-100.2(g) (2005).
[71]
O.C.G.A. § 16-12-100.1 (2005).
[72]
The Computer Pornography
and Child
Exploitation Prevention Act of 1999,
O.C.G.A. § 16-12-100.2 (2005)
[73]
O.C.G.A. § 16-12-100.3 (2005).
[74]
The National Center for
Missing and Exploited Children, The Cyber Tipline
available at http://www.missingkids.com/cybertip/
[75]
United States Department
of Justice,
National Sex Offender Public Registry
available at http://www.nsopr.gov/.
[76]
News Release, Delaware
County Sheriff's
Office, Sheriff Al Myers, 05 Online[sic] Sexual Predator Arrest
(July 1, 2005)
available
at http://news.delawarecountysheriff.com/?page_id=16.
[77]
Alexis Canter,
ADP,
Groups Fight Web Predators
- Laws,
Anonymity Make it Difficult to Catch Offenders, The Daily
Texan, Feb. 17, 2005,
available
at http://www.dailytexanonline.com/media/paper410/news/2005/02/17/Focus/Apd-Groups.Fight.Web.Predators-867754.shtml?norewrite&sourcedomain=www.dailytexanonline.com
[78]
Multnomah County, Oregon
Department of
Community Justice Predatory Sex Offendot Notification
Webpage
available at
http://www2.co.multnomah.or.us/jsp/Public/EntryPoint?ch=7450736517021010VgnVCM1000003bc614acRCRD.
[79]
Jim Redden,
Sexual
Predator List Goes Online
- County
Posts Names, Addresses, Photos to Help Protect Public,
Portland Tribune, October 11, 2005,
available at http://www.portlandtribune.com/archview.cgi?id=32015.
[80]
Peter J. Barnes, Jr.,
Online
Sexual Predators - Don't
Let Them Get
Away, New Jersey Municipalities, June
2005,
available
at
http://www.njslom.org/magart0605_page18.html.
[81]
Sexualpredators.com
website
available at
http://www.sexualpredators.com/.
[82]
National Registry Alert
Predator Report
available at
http://www.pctattletale.com/sex-offender-database.html.
Note: as indicated in the section on sexual offender registries
this information is avaliable for free in most states. Please check
local sites and rules before paying for this type of information as
it may be avaliable for free.
[83]
Preverted-justice.com
website
available
at
http://www.perverted-justice.com/.
This website also
has links to transcripts from updates of the "
Dateline"
story.
[84]
I-Team 12 Cybersting -
Sting
Busts 23-year
old Vancouver Man (Fox 12 KPTV Oregon television
broadcast,
date unknown)
transcript
available at http://www.kptv.com/Global/story.asp?S=3589896&nav=menu156_2.
[85]
WiredSafety website
available
at http://www.wiredsafety.org/.
[86]
WiredKits website
available
at http://www.wiredkids.org/.
[87]
The National Academies
NetSafe kids
website
available at
http://www.nap.edu/netsafekids/pp_li_il.html.
[88]
CyberLawEnforcement.org
website
available at
http://www.wiredcops.org/.
[89]
Federal Trade
Commission's Kidz Privacy
website
available at
http://www.ftc.gov/kidzprivacy/.
[90]
The National
Center for Missing
and Exploited Children and the Ad Council's HDOP: Help Delete
Online Predators Campaign website
available
at http://www.missingkids.com/adcouncil/cpgn.html.
[91]
Donna Rice Hughes,
ProtectKids.com --
Sexual Predators Online
website
available at
http://www.protectkids.com/dangers/onlinepred.htm.
[92]
United States Department
of Justice
Center for Sex Offender Management website
available at http://www.csom.org/.
[93]
Be Web Aware's on-line
sexual predator
website
available at
http://www.bewebaware.ca/english/OnlinePredators.aspx.
Return to top of Endnotes.
Return to Table of Contents.
