Feeds

US teen cuffed for sending nude phone pics

...of herself

Seven Steps to Software Security

A 15-year-old Ohio girl was arrested on felony child pornography charges for allegedly sending nude cell phone pictures of herself to classmates. Authorities are considering charging some of the students who received the photos as well.

The unnamed student from Licking Valley High School in Newark, Ohio was arrested Friday after school officials discovered the materials and notified police. She spent the weekend in juvenile detention and entered a plea of "deny" on Monday, according to The NewarkAdvocate.com.

Charges include illegal use of a minor in nudity-oriented material and possession of criminal tools. If convicted, the girl could be forced to register as a sexual offender for 20 years, but because of her age, the judge hearing the case has some flexibility in the matter, an official told the Advocate.

The pictures came to light after a Licking County prosecutor began visiting high schools to educate students on the consequences of transmitting nude photos by cell phone. According to one student interviewed by 10TV News, the teens were warned they could serve 20 years if convicted.

A student later notified an adult of the nude cell phone pictures, and the adult in turn contacted school officials. School officials had pulled the girl aside and warned her about the behavior immediately after the presentation, according to a separate article by the Advocate.

This isn't the first case in which zealous American prosecutors have used child pornography statutes to protect vulnerable juveniles from themselves. In 2004, a 16-year-old girl and her 17-year-old boyfriend took pictures of themselves while naked and engaged in unspecified "sexual behavior." They didn't show the pictures to anyone, but they did send them to the boy's email address.

Eventually each was charged with producing, directing, or promoting a photograph featuring the sexual conduct of a child. The boy was also charged with an extra count of possession of child pornography. As CNET News reported here, the girl's conviction was upheld last year on appeal.

Licking County prosecutors say they have received some 20 cases involving questionable cell phone pictures. They say investigators are trying to determine how many juveniles received nude photos of the girl and have left open the possibility that others will be charged in the incident.

The girl, who is a foster child, remains under house arrest. She is not allowed to have access to a cell phone or the internet except for school purposes and then only with adult supervision. ®

Mobile application security vulnerability report

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.