Feeds

US teen cuffed for sending nude phone pics

...of herself

The Power of One eBook: Top reasons to choose HP BladeSystem

A 15-year-old Ohio girl was arrested on felony child pornography charges for allegedly sending nude cell phone pictures of herself to classmates. Authorities are considering charging some of the students who received the photos as well.

The unnamed student from Licking Valley High School in Newark, Ohio was arrested Friday after school officials discovered the materials and notified police. She spent the weekend in juvenile detention and entered a plea of "deny" on Monday, according to The NewarkAdvocate.com.

Charges include illegal use of a minor in nudity-oriented material and possession of criminal tools. If convicted, the girl could be forced to register as a sexual offender for 20 years, but because of her age, the judge hearing the case has some flexibility in the matter, an official told the Advocate.

The pictures came to light after a Licking County prosecutor began visiting high schools to educate students on the consequences of transmitting nude photos by cell phone. According to one student interviewed by 10TV News, the teens were warned they could serve 20 years if convicted.

A student later notified an adult of the nude cell phone pictures, and the adult in turn contacted school officials. School officials had pulled the girl aside and warned her about the behavior immediately after the presentation, according to a separate article by the Advocate.

This isn't the first case in which zealous American prosecutors have used child pornography statutes to protect vulnerable juveniles from themselves. In 2004, a 16-year-old girl and her 17-year-old boyfriend took pictures of themselves while naked and engaged in unspecified "sexual behavior." They didn't show the pictures to anyone, but they did send them to the boy's email address.

Eventually each was charged with producing, directing, or promoting a photograph featuring the sexual conduct of a child. The boy was also charged with an extra count of possession of child pornography. As CNET News reported here, the girl's conviction was upheld last year on appeal.

Licking County prosecutors say they have received some 20 cases involving questionable cell phone pictures. They say investigators are trying to determine how many juveniles received nude photos of the girl and have left open the possibility that others will be charged in the incident.

The girl, who is a foster child, remains under house arrest. She is not allowed to have access to a cell phone or the internet except for school purposes and then only with adult supervision. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.