Jeffrey D. Weinstock
I.Introduction
Pornography in Cyberspace
{1.02}
{1.03}
{1.04}
{1.05}
{1.06}
{1.07}
{2.01}
{2.02}
{2.03}
{2.04}
{2.05}
{2.06}
{2.07}
{2.08}
{3.01}
{3.02}
{3.03}
{3.04}
{3.05}
{3.06}
{3.07}
{3.08}
{3.09}
{3.10}
{3.11}
{3.12}
{3.13}
{3.14}
{3.15}
{3.16}
{3.17}
{3.18}
{3.19}
{3.20}
{3.21}
{4.01}
{4.02}
{4.03}
{4.04}
{4.05}
{4.06}
{4.07}
{4.08}
{4.09}
{4.10}
{4.11}
{4.13}
{4.14}
{4.15}
{4.16}
{4.17}
{4.18}
{4.19}
{4.20}
{4.21}
{5.01}
{5.02}
{5.03}
{5.04}
{5.05}
{5.06}
{5.07}
{5.08}
{5.09}
{5.10}
{5.11}
[1] America Online (AOL) is currently the world's largest online service provider and continues to grow at a pace quicker than any of its competitors. As of September, 1995 AOL passed the 3.5 million member mark with no sign of slowdown. In fact, AOL added 2 million members in the nine months preceding this count. Compuserve, a competitor of AOL,has 3.2 million members including its Japanese service. James Staten, AOL feels sharp growing pains;America Online, MACWEEK, Oct. 2, 1995 at 18. Back to the text
[2] Problems in cyberspace include such issues as; individual privacy, access, privacy without endangering the security of society, and regulation. Steven Levy, Stop Talking Dirty to Me, NEWSWEEK, Oct. 16, 1995, at 84.
Back to the text
[3] For a critique of the media's tendency to concentrate on sexual issues in cyberspace in an attempt to push the "three letter hot button," See, id.
Back to the text
[4] The term mainstream media is meant to distinguish popular media outlets such as television and newspapers from technology intensive publications, and is in no way meant to refer to political agendas.
Back to the text
[5] Service subscribers are easier to track down because they need to provide the service with personal information such as their name, address,phone number and credit card information before the subscriber may open an account. Similarly, users of these services may be less computer literate than other internet users for reasons which are beyond the scope of this paper.
Back to the text
[6] See, e.g., Cops Booting Up and Logging on; Officers Take Byte Out of Crime, THE TIMES-PICAYUNE,Dec. 10, 1995, at A25.
Back to the text
[7] AOL president Steve Case claims that AOL does not monitor any private communications and that the FBI is only notified of illegal activities when examples of such activity are brought to the attention of the company. Michael Meyer and Jennifer Tanaka, The Feds in Cyberspace,NEWSWEEK, Sept. 25,1995, at 62.
Back to the text
[8] Children, or other users, may be identified online in a few ways. First, they may tell another user their age via e-mail or in a chat room.
Second, they may have a user name which discloses their age or identity. Finally, some users fill out a user profile which includes their age and may be accessed by other users. Other users are able to search user profiles for a keyword related to age, sex, or any other category which the user may want to search.
Back to the text
[9] John C. Scheller,Note, PC Peep Show: Computers, Privacy, and Child Pornography,27 J. Marshall L.Rev. 989, (1994). The technique is to use child pornography to encourage children to engage in sexual activity. This is accomplished by showing child pornography to the children which serves to demonstrate to the child that engaging in "sexual activity is acceptable because the children in the pictures are engaged in it." Id. at 998.
Back to the text
[10] See,Feds Crack Porn Ring Operating on AOL, INTERNET WEEK, Sep. 25, 1995.
Back to the text
[11] See, e.g., Janet Leiser, Officer Goes Online to Catch Pedophiles, THE TAMPA TRIBUNE, Jan. 29, 1996 at 1.
Back to the text
[12] David L. Sobel from the Electronic Privacy Information Center speculates that police tactics may induce people to commit crimes which they would not have committed otherwise. Rajiv Chandrasekaran, Undercover on the Dark Side of Cyberspace; On-Line FBI Agents Troll for Those Who Prey on Children, but Cybercops;Tactics Chill Critics, THE WASHINGTON POST, Jan. 2, 1996, at D1.
Back to the text
[13] Id. The FBI agent in charge of an online sting says that the "FBI does not keep statistics on such crimes."
Back to the text
[14] See,Leiser, Supra note 11, at 1, for an account of a Clearwater,Florida detective who entered a chat room on an online service to see for himself what type of activity went took place. The detective's online profile identified him as a police officer and the result was that everyone in the chat room signed off. The detective remedied the situation by changing his online profile to identify him as a13 year girl. He maintains this profile and currently spends about 10 hours weekly at the police station looking for adults "who use child pornography to seduce and molest children."
Back to the text
[15] Chandrasekaran, supranote 12.
Back to the text
[16] See, Meyer and Tanaka, supra note 7,calling Operation Innocent Images"the biggest sting ever" dealing with electronic pornography.
Back to the text
[17] Id. at 62.
Back to the text
[18] Peter H. Lewis, The F.B.I. sting operation on child pornography raises questions about encryption, N.Y. TIMES,Sept. 25, 1995, at D5. In spite of the large number of dwelling searched,the F.B.I. initially only made 15 arrests.
Back to the text
[19] Due to the late date on which the arrests occurred, there is no case authority available as of yet which addresses the issues that arise therein.
Back to the text
[20] A chat room is an area of the online service where users sharing a common interest or locality may converse with each other by typing messages and sending them to each other. It is unclear exactly which chat room Zemke was in on the day in question.
Back to the text
[21] Matt O'Conner, Guilty Plea in On-Line Porn Sting, CHICAGO TRIBUNE, Nov. 21, 1995, at N3.
Back to the text
[22] Id.
Back to the text
[23] Id.
Back to the text
[24] Id.
Back to the text
[25]Id.
Back to the text
[26]Id.Critics claim tactics used by online agents are overzealous, suggestive,and a waste of resources. The FBI possesses over $1 million worth of equipment for this online operation including computers, storage devices, and high speed modems. The FBI also plans to move the unit to a larger office space.
Furthermore, the FBI employs eight agents in its Landover office who spend most of their time investigating online pedophiles and child pornography. Possibly the most costly aspect of the whole operation is the tremendous amount of time spend decoding encrypted files seized from pornographers. It can take FBI technicians hundreds of hours to decode encrypted files from suspects computers. For more information regarding encryption see. e.g., Lewis supra note 18.
Back to the text
[27]Chandrasekaran, supra note 12.
Back to the text
[28]Id.
Back to the text
[29] Id.
Back to the text
[30] Id.
Back to the text
[31] Id.
Back to the text
[32] Id.
Back to the text
[33] It is unclear which party put forth the idea of meeting.
Back to the text
[34] The lawyer was found guilty in federal court of one count of crossing state lines for the purpose of engaging in sex with a minor. He has yet to be sentenced.Chandrasekaran, supra note 12.
Back to the text
[35] Id.
Back to the text
[36] Id.
Back to the text
[37] Id.
Back to the text
[38] Id.
Back to the text
[39] Id.
Back to the text
[40] Id.
Back to the text
[41] Id.
Back to the text
[42]Id.
Back to the text
[43]Id.
Back to the text
[44] Id.
Back to the text
[45] Paul Marcus, THE ENTRAPMENT DEFENSE, sec.1.01 (1989).
Back to the text
[46] Wayne R. LaFave and Jerold H. Israel, CRIMINAL PROCEDURE sec. 5.1(b) (2nd. ed. 1992).
Back to the text
[47] 287 U.S. 435 (1932).
Back to the text
[48] LaFave and Israel, supra note 46. Before Sorrrellsthere did exist a state defense of entrapment, but the standard became more clear after the Supreme Court's treatment in Sorrells.
Back to the text
[49] Sorrells,287 U.S.at 454 (Roberts, J., concurring).
Back to the text
[50] LaFave and Israel, supra note 46, sec.5.2. The subjective approach is also referred to as the federal approach or the Sherman-Sorrells doctrine.
Back to the text
[51]Scott C. Patton, The Government Made Me Do It": A Proposed Approach to Entrapment Under Jacobson v. United States, 79 Cornell L. Rev.995, 1000 (1994).
Back to the text
[52] Sherman v. U.S., 356 U.S. 369, 372 (1958).
Back to the text
[53]See, Sorrells,287 U.S. at 448, stating: "We are unable to conclude that it was the intention of the Congress in enacting this statute that its processes of detection and enforcement should be abused by the instigation by government officials of an act on the part of persons otherwise innocent in order to lure them to its commission and to punish them."
Back to the text
[54] 737 F.2d 625 (7th Cir. 1984).
Back to the text
[55]Navarro, 737 F.2d at 635.
Back to the text
[56] LaFave and Israel,supra note 46, sec.5.2.
Back to the text
[57]Marcus, supra note 45, sec.5.01.
Back to the text
[58] Id.
Back to the text
[59]Model Penal Code sec.2.13 (1985).
Back to the text
[60] Sherman v. U.S.,356 U.S. 369, 380 (1958).
Back to the text
[61] See, Patton, supranote 51, at 1005, listing; New jersey, Florida, Indiana, New Hampshire,and New Mexico.
Back to the text
[62] 356 U.S. 369, 78 S.Ct. 819 (1958).
Back to the text
[63] 356 U.S. at 373.
Back to the text
[64] 356 U.S. at 379, stating: "the prevailing theory of the Sorrells case ought not to be deemed the last word. In a matter of this kind the Court should not rest on the first attempt at an explanation for what sound instinct counsels."
Back to the text
[65] 411 U.S. 423 (1973)
Back to the text
[66] 411 U.S. at 425.
Back to the text
[67] 411 U.S. at 436.
Back to the text
[68] 411 U.S. at 436.
Back to the text
[69] 503 U.S. 540 (1992).
Back to the text
[70] 503 U.S. at 542. Jacobson was arrested for violating the Child Protection act of 1984, Pub. L. 98-292, 98 Stat. 204, which outlawed knowing receipt of visual depictions of minors engaging in sexually explicit conduct.
Back to the text
[71] 503 U.S. at 542.
Back to the text
[72] 503 U.S. at 553, stating that like "Sherman,where entrapment was found as a matter of law, 'the Government may not play on the weaknesses of an innocent party and beguile him into committing crimes which he otherwise would not have attempted."
Back to the text
[73] 503 U.S. at 543. These magazines were legal at the time because they did not depict any sexual activity.
Back to the text
[74] In its consideration of the predisposition requirement,the Supreme Court discounted the evidence relating to the magazines, reasoning that it expressed a predisposition to view sexually oriented pictures, but that "evidence that merely indicated a generic inclination to act within a broad range, not all of which is criminal, is of little probative value in establishing predisposition."
503 U.S. at 550.
Back to the text
[75] 503 U.S. at 543.
Back to the text
[76] 503 U.S. at 543.
Back to the text
[77]503 U.S. at 546. The two government agencies were the Customs Service and the Postal Service.
Back to the text
[78] 503 U.S. at 543. The campaign to explore Jacobson's propensity to break the new law lasted over 2 1/2 years.
Back to the text
[79] 503 U.S. at 544. In the survey mentioned above Jacobson indicated that he enjoyed preteen sex, but that he was opposed to pedophelia.
Back to the text
[80] 503 U.S. at 545.
Back to the text
[81] 503 U.S. at 545. In his second and final letter, Jacobson wrote: "As far as my likes are concerned, I like good looking young guys (in their late teens and early 20's) doing their thing together."
Back to the text
[82] 503 U.S.at 546.
Back to the text
[83] 503 U.S. at 546-547.
Back to the text
[84] 503 U.S. at 547.
Back to the text
[85] 503 U.S.at 554, stating; "we conclude that... the prosecution failed, as a matter of law, to adduce evidence to support the jury verdict that petitioner was predisposed independent of the Government's acts and beyond a reasonable doubt,to violate the law by receiving child pornography through the mails."
Back to the text
[86]503 U.S. at 549.
Back to the text
[87] 503 U.S. at 551.
Back to the text
[88] 503 U.S. at 550.
Back to the text
[89] 503 U.S. at 551.
Back to the text
[90] 503 U.S.at 552. This view was analyzed in United States v. Gendron, 18 F.3d 955, 962 (1st Cir. 1994), where the court suggested that the Government's efforts to persuade Jacobson that he was exercising his First Amendment rights by ordering child pornography was "different from the ordinary or typical circumstances of a private inducement." But see, United States v.Hollingsworth, 27 F.3d 1196 (7th Cir. 1994), for the contrary view.
Back to the text
[91] If Jacobson "promptly availed himself of this criminal opportunity," to receive child pornography"it is unlikely that his entrapment defense would have warranted a jury instruction." 503 U.S. at 550.
Back to the text
[92] The majority stated that "the evidence that petitioner was ready and willing to commit the offense came only after the Government had devoted 2 1/2 years to convincing him that he had or should have the right to engage in the very behavior proscribed by law. 503 U.S.at 553.
Back to the text
[93] 503 U.S. at 553-554.
Back to the text
[94] See, e.g., U.S. v. Burt,76 F.3d 1064 (9th Cir. 1996); U.S. v. Lamarr, 75 F.3d 964 (4th Cir. 1996); U.S. v. King, 75 F.3d 1217 (7th Cir. 1996); U.S.v. Cisneros, 77 F.3d 490 (9th Cir. 1996); U.S. v.King, 73 F.3d 1564 (11th Cir. 1996); U.S. v. Tang, 76 F.3d 390 (9th Cir. 1996); U.S. v. Anderson, 76 F.3d 685 (6th Cir. 1996);Cousin v. Office of Thrift Supervision, 73 F.3d 1242 (2nd Cir. 1996); U.S. v. Miller,71 F.3d 813 (11th Cir. 1996); U.S. v. La Rizza, 72 F.3d 775,(9th Cir. 1995); U.S. v. McClelland, 72 F.3d 717, (9th Cir. 1995);U.S. v. Garcia, 76 F.3d 389 (9th Cir. 1995); U.S. v. Walls,70 F.3d 1323, (D.C.Cir., 1995); U.S. v. McKinley, 70 F.3d 1307, (D.C.Cir., 1995); U.S. v. Alzate, 70 F.3d 199 (1st Cir.1995); U.S. v. Jensen,69 F.3d 906, (8th Cir. 1995); U.S. v. Jackson, 72 F.3d 1370,(9th Cir. 1995).
Back to the text
[95] LaFave and Israel, supraa note 46.
Back to the text
[96] See, Lewis supra note 18.
Back to the text
[97] It is unclear which chat room Zemke was inhabiting. There were some chat rooms on AOL which were geared primarily to exchanging pornographic pictures. If the room which Zemke was in was such a room, that is another strike against his claim that he was not predisposed to commit this crime.
Back to the text
[98] The dissent does point out that Mr. Jacobson was only offered two opportunities to buy child pornography and he accepted both opportunities.
This fact does not obviate the amount of time and effort the Government needed to spend in order to get Mr. Jacobson to place the orders. 503 U.S.at 554.
Back to the text
[99] See, supra note 22.
Back to the text
[100] 503 U.S. at 550, See,also, supra note 91.
Back to the text
[101] 737 F.2d at 635.
Back to the text
[102] 503 U.S.at 550.
Back to the text
[103] See,Jacobson, 503 U.S. at 548, quoting Sorrells 287 U.S. at 441 stating; "It is well settled that the fact that officers or employees of the Government merely afford opportunities or facilities for the commission of the offense does not defeat the prosecution."
Back to the text
[104] Chandrasekaran,supra note 12.
Back to the text
[105] The dissenters were; O'Conner,Rehnquist; Kennedy, and Scalia.
Back to the text
[106] Chandrasekaran, supra note 12.
Back to the text
[107] Id.
Back to the text
Return to Jeff WeinstockÕs Home Page.