Feeds

Child porn victims seek multimillion-dollar payouts

One victim. One photo. $3.68 million

The Essential Guide to IT Transformation

'Possession alone sufficient'

The statute mandates restitution in any child exploitation conviction for the “full amount of the victim's losses” and specifically includes costs incurred by medical services, physical and occupational therapy, lost income and attorneys' fees. It also specifies “any other losses suffered by the victim as a proximate result of the offense.”

Marsh and other child victim advocates argue that the requirement to prove the convicted person proximately caused the damages, applies only to this last catchall item. The other losses need only be established by a preponderance of the evidence, which is almost always satisfied by a conviction that includes one or more images of the victim.

“The possession alone is sufficient to establish the causal link you need for restitution,” said Meg Garvin, executive director of Lewis & Clark College's National Crime Victim Law Institute. “In every possession case, there is additional harm being caused to the victim and therefore you meet all the tests and restitution becomes mandatory. All of the defendants who possessed the image of Vicki – all of them – owe her the full amount of restitution.”

But critics said an award can be granted only when prosecutors show the offense was the proximate, or direct, cause of a victim's losses. And some also question the wisdom of creating cash rewards for victims who emphasize just how badly the offenses continue to harm them.

“There's always a risk in the awarding of restitution that not only a victim is essentially incentivized to assert her harm is as great as possible,” said Douglas Berman, a professor specializing in federal sentencing law at Ohio State College of Law. “What really concerns me is we've created an environment in which she will benefit by asserting that she continues to suffer the harms of these crimes.”

Virtually all of the child porn offenders ordered to pay restitution had no contact with the victims and played no role in the production of the images, which were shot and originally published by someone else many years earlier. Despite their limited roles in in the victims' considerable pain and suffering – most of which, it would seem, was caused by the original abusers – the perps are required to shoulder equal responsibility. Critics have argued it's a slippery slope.

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.