Showing posts with label unconsitutional. Show all posts
Showing posts with label unconsitutional. Show all posts

Tuesday, May 7, 2013

Defendant argues WI child porn law unconstitutional; if you're texted CP and open it, are you guilty of possessing CP?

Could someone texting you child porn, a text you unwittingly open, get you charged with a felony? Also, is it fair to charge adult males with child porn possession but not the underage females that texted the images to them, if they both technically possess child pornography? The case below raises both issues.

In State v. Perino, No.'s 2012-CF-0217, 2012-CM-0116 (Wis. Cir. Ct. filed Jan. 18 & Feb. 23, 2012) the defendant is charged with two counts of possessing child pornography (2012-CF-0217 - link has case history) and two counts of sex with a minor over age 16 (2012-CM-0116). In March of 2013, the defendant filed three motions to dismiss based on the following: (1) that the charged statute (Wis. Stats. § 948.12, see infra) is unconstitutionally vague and overbroad, as applied; (2) that the images are not "lewd" as required by the statute; and, (3) that the prosecutor is selectively prosecuting the case.

Copies of the Wisconsin Circuit Court documents:

1. Defendant's Motions
2. Prosecutor's Responses

The defendant was later indicted in federal court, as well, where he was "charged . . . with one count of producing child pornography and [the indictment] refers to two victims A and B. Four other counts appear to refer to the same former student in the state charges, and a sixth count seeks forfeiture of Perino's computers and cellphone." (Vielmetti, infra). You can find the indictment, here: E.D. Wisconsin Perino Indictment

State of Wisconsin Case

Wis. Stat. § 948.12 states:
948.12  Possession of child pornography.
(1m) Whoever possesses, or accesses in any way with the intent to view, any undeveloped film, photographic negative, photograph, motion picture, videotape, or other recording of a child engaged in sexually explicit conduct under all of the following circumstances may be penalized under sub. (3):
     (a) The person knows that he or she possesses or has accessed the material.
     (b) The person knows, or reasonably should know, that the material that is possessed or accessed contains depictions of sexually explicit conduct.
     (c) The person knows or reasonably should know that the child depicted in the material who is engaged in sexually explicit conduct has not attained the age of 18 years.
Bruce Vielmetti has a good synopsis of the case in his Journal-Sentinel article - Lawyer wants girl charged for nude photos she sent to teacher:
The attorney for a former Hales Corners teacher facing charges he had sex with a female student has asked a judge to charge the girl with distributing child pornography - for sending nude photos of herself to the teacher.
...
Craig Perino was charged in Racine County in January 2012 with two counts of sex with child 16 or older, both misdemeanors. According to the complaint, he and the girl had encounters last year at his home in Waterford that involved drinking and intercourse.
A month later, prosecutors added two counts of possession of child pornography, both felony offenses, after nude photos of the girl were found on Perino's phone and computer. He has pleaded not guilty to all the charges.

Perino's attorney, John Birdsall, has moved to dismiss the child pornography charges on several grounds. He argues the statute is unconstitutionally vague and overbroad because it makes anyone who might open and view an unsolicited texted or emailed image of child pornography subject to criminal prosecution. 
Birdsall also argues that the texted photos, while nude, are not "lewd" under the statute. 
Finally, Birdsall asks that the charges be dismissed because they represent selective prosecution. His motion notes that the girl was 17 when she reported her sexual encounters with Perino and is 18 now. If the prosecutors believe the images amount to child pornography, the girl should be charged as an adult with producing, distributing and possessing them, the motion states.

Refusing to charge the girl, Birdsall argues, amounts to an admission by prosecutors that the images are not in fact lewd under the Wisconsin statute and therefore don't support the child porn charges against Perino.

In his responses to Birdsall's motions, Assistant District Attorney Robert Repischak argued that the issues were raised too late, that the question of whether the photos are lewd is one a jury should decide, and that Perino's constitutional challenge relies on hypothetical situations that differ from his own. 
"The defendant seemingly forgets" that he told an investigator he had stored images on his employer's computer and deleted them once he learned of the investigation and that he "clearly . . . was not an unwitting recipient of the images at issue," Repischak said in his written response to the motions.


Tuesday, May 22, 2012

Federal court holds that 15-month delay in reviewing electronic evidence was an unlawful seizure

In what I would call a very significant case, a New York federal court has held that failure to examine a defendant's imaged hard drive within 15-months after it was obtained was an unlawful seizure in violation of the Fourth Amendment. In United States v. Metter, 2011 U.S. Dist. LEXIS 155130 (E.D.N.Y. 2012) the government imaged over 60 hard drives as part of a criminal investigation into securities fraud, yet held on to the images and failed to actually do anything with them for over 15 months. The defendant argued that "the government's significant delay in conducting off-site searches of the imaged evidence merits blanket suppression of all seized and imaged evidence as routine delays of this duration would eviscerate the Fourth Amendment's privacy protections." While treading very cautiously, the court ultimately held that such delay, especially due to the amount of irrelevant, yet highly personal information that could be on a computer hard drive, was an unreasonable seizure.

At the outset, the court noted that the defendant's argument raised "an interesting issue of first impression in this Circuit that may impact electronic discovery in future criminal investigations and cases: How long may the government retain seized and imaged electronic evidence before conducting a review of that evidence to determine whether any of it falls outside the scope of a search warrant?" (This is indeed an interesting question. Think, for example, of evidence collected from a murder scene. The officers may take pictures, blood swipes, fingerprints, etc., but they cannot bag up the entire site or completely capture it for future use. That is the case with imaging a defendant's hard drive, though - essentially the evidence (relevant or irrelevant) lasts forever; it can be revisited ad nauseum, and consequently raises a plethora of Fourth Amendment concerns. Ultimately, and because of this evidentiary effect, this ends up as a case where the court was forced to treat electronic evidence different from physical evidence because of the fundamental difference in nature and kind between the two.)

The court went on to note that courts have long recognized that searches (typically of papers) will inevitably involve reviewing documents that are outside of the scope of the search because it is impossible to conduct a search otherwise; pragmatically, there are "tactical difficulties" in cabining a search when you don't know what you will find, or where "it" will be found, per se.  This recognition has been extended to computers, but:
Computers and electronic information present a more complex situation, given the extraordinary number of documents a computer can contain and store and the owner's ability to password protect and/or encrypt files, documents, and electronic communications. As a result, the principle of permitting law enforcement some flexibility or latitude in reviewing paper documents just described, has been extended to computerized or electronic evidence. Courts have applied the principles recognized in Andresen "in analyzing the method used by the police in searching computers and have afforded them leeway in searching computers for incriminating evidence within the scope of materials specified in the warrant."
Thus, courts look to the heart of the Fourth Amendment for the lawfulness of the search - was it "reasonable?"

The court recognized that the warrants issued in this case (there were multiple, spanning both homes and offices), were facially valid, sufficiently particular, and clearly defined the scope of each search. Additionally, the police acted reasonably in executing the searches, and promptly returned the hard drives back to the owners after they were imaged. Thus, the crux of the case does not involve a failure of the warrants themselves, or the procedure in which they were executed on-scene, but the process involved afterwards.


The court pointed out that delays of several months have been found to be reasonable - there may be law enforcement delays, an ongoing investigation, etc., but that there was a lack of precedent on the ceiling of this temporal question - when did a delay become presumptively unreasonable. While not actually answering that question, or establishing a black-letter rule, the court stated that:
The parties have not provided the Court with any authority, nor has the Court found any, indicating that the government may seize and image electronic data and then retain that data with no plans whatsoever to begin review of that data to determine whether any irrelevant, personal information was improperly seized. The government's blatant disregard for its responsibility in this case is unacceptable and unreasonable.
The court dismissed the government's argument that because they returned the original hard drives they were not really violating any privacy. I find this argument to be almost laughable - why does having a copy of a personal document lessen its embarrassing or incriminating nature? The court found this a "distinction without a difference."

Notably, the defendant's counsel had also notified the court that the government was willing to provide copies of these hard drives to attorneys of other defendant's involved in the fraudulent scheme, upon request. While this might have been helpful in a discovery sense, the failure to triage these hard drives for irrelevant information was damning. Ultimately, the court stated:
The government's retention of all imaged electronic documents, including personal emails, without any review whatsoever to determine not only their relevance to this case, but also to determine whether any recognized legal privileges attached to them, is unreasonable and disturbing. Moreover, the government repeatedly asserted its intent to release indiscriminately the imaged evidence to every defendant, prior to conducting any review to determine if it contained evidence outside the scope of the warrants. The Court agrees with Defendant that the release to the co-defendants of any and all seized electronic data without a predetermination of its privilege, nature or relevance to the charged criminal conduct only compounds the assault on his privacy concerns. It underscores the government's utter disregard for and relinquishment of its duty to insure that its warrants are executed properly.
After holding the government's actions in contravention of the Fourth Amendment, the court wrestled with the remedy. Did such process "deserve" complete suppression of all evidence - a remedy quite harsh to a case built around such evidence. The court ultimately decided complete suppression was warranted:
The Court has not reached this conclusion lightly. However, the Court cannot, in the interest of justice and fairness, permit the government to ignore its obligations. Otherwise, the Fourth Amendment would lose all force and meaning in the digital era and citizens will have no recourse as to the unlawful seizure of information that falls outside the scope of a search warrant and its subsequent dissemination. 
The impact of this case is wide-reaching for law enforcement - essentially they must do something with seized evidence in a reasonable amount of time. This raises a series of questions:
  1. What must law enforcement do to prevent suppression if the amount of time grows - merely do a keyword search, or fully triage and redact irrelevant evidence?
  2. We know 15 months is too long, but what about 10, 12 or 8 months? Another line drawing problem is born.
  3. How does this decision affect law enforcement timetables for existing and future investigations, and what if any impact will it have as more cases involve electronic evidence and case loads and backups increase?
  4. What will the impact of this decision be on general electronic discovery as it relates to passing unredacted/reduced electronic evidence to co-defendants, since such discovery implicates privacy concerns due to the nature of hard drives and the "intermixing" of relevant and irrelevant evidence?