Feeds

Child porn victims seek multimillion-dollar payouts

One victim. One photo. $3.68 million

Internet Security Threat Report 2014

What about porn mags and movies?

“Presumably, anyone watching porn movies with an underaged character or in possession of a magazine with such a picture could be similarly faced with restitution demands,” George Washington University law professor Jonathan Turley has blogged. “Prosecutors could threaten targets with financial ruin under such theories – forcing guilty pleas to other offenses.”

Some of the most outspoken critics remain the judges charged with ruling on the restitution requests. One of the more recent rejections came in August when a federal judge in North Dakota refused Vicky's restitution request against convicted child pornography possessor Louis Solsbury. The judge went on to call the new tactic “an evidentiary nightmare” because for victims such as Amy and Vicky there are literally hundreds of thousands of individuals who have contributed to their considerable losses.

“The court is unable to determine, with any reasonable certainty, what losses are attributable to the egregious acts of sexual abuse committed by Vicky's father, what losses are attributable to the countless others who have received, distributed, or possessed the images, or what losses were caused by this particular defendant's conduct in possessing the pornographic images in North Dakota,” US District Judge Daniel L. Hovland wrote.

“Without more specific evidence, any award of restitution would be an arbitrary calculation based on speculation and guess work, at best. The decision to award restitution in these types of cases should be, and needs to be, based on some semblance of reason, common sense, and fairness rather than speculation.”

The ruling is now under review by the US Eighth Circuit Court of Appeals. Including rulings in the Solsbury and Paroline cases, there are at least four decisions under appeal, prompting predictions that it's only a matter of time until the US Supreme Court takes up the issue.

But some, including Ohio State University's Berman and at least one jurist, say courts aren't the best venue for settling the issue.

“The undersigned believes that the controversial subject of restitution awards in child pornography cases is one best left for congress to resolve,” Hovland wrote. “These troublesome cases cry out for an appropriate restitution remedy but one best determined by congress – not by a variety of conflicting and inconsistent awards and decisions as have evolved over the past year.” ®

Beginner's guide to SSL certificates

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.