Tuesday 31 May 2011

Karma Police

Extreme Pornography: Law and Evidence

How do you know you haven’t got extreme pornography on your computer?
Does someone else have access to your system? Could they have downloaded pornography without your knowledge? Would you know if a friend sent you a “joke” email containing pornography; which you didn’t open, but your computer cached? Have you ever followed a link to a site that didn’t give you any warning that it contained pornography?
These are just a few of the possibilities that police investigating extreme pornography offences have either denied or ignored.

Section 63 CJIA 2008
Briefly, Section 63 of the Criminal Justice and Immigration Act 2008 created the new offence of possessing extreme pornographic images. It could be argued that this legislation was introduced to extend Obscene Publication Act offences (which require publication or distribution) to the simple possession of such images.
Thus the consumers rather than the producers of pornography are criminalised, facing up to three years in prison and registration on the sex offenders register. Certain types of consensual adult-on-adult pornography are caught under the Act, including images that portray acts that are legal to perform in real life.
Below is a case study of a prosecution under Section 63 the CJIA 2008. I represented the defendant after he was interviewed by the police. He has given his express consent for this blog: so that others might be aware of the dangers of s63 of the CJIA 2008.
It should clearly demonstrate that police do not necessarily understand this law, IT evidence or indeed pornography itself.

The defendant was originally arrested regarding an unrelated financial allegation, which was unfounded and eventually dropped. In investigating the original allegation, the police seized two laptops after searching the defendant’s home address. They performed a “speculative search” of the laptops and discovered a single thumbnail sized image which they classified as extreme pornography.

The defendant returned to the police station on bail. He was notified that the financial matter would be subject to no further action. He was then arrested and cautioned on suspicion of possessing an extreme pornographic image. He waived his right to legal advice, and was interviewed without the benefit of a solicitor advising and representing his interests.
He assumed that as the more serious sounding financial accusation had been dropped that surely a single pornographic image he didn’t remember downloading could easily be explained away.

Whilst preparing the defendant’s case, I read the police ROTI (unabridged written transcript of interview); listened to the tape recording of the interview in full; transcribed it verbatim; then compared the tape recording against my transcript and the police’s transcript.
From this it was clear that the police had made three critical errors in interview.
They pertained to: law; computers (IT forensics); and evidence (pornography).

THE LAW – When interviewing the defendant, the officers summarised a small section of the extreme pornography offence s63 of the CJIA 2008. Incorrectly. Without explaining it. They then demonstrated that they did not understand the law at all, as they asserted that the image in question had been graded under the COPINE scale. This is a rating system used to categorise the severity of indecent images of children. It has nothing to do with extreme pornographic images.
Yet with two police officers asserting this was correct and no solicitor present to disagree or advise on the correct legal position, how was the defendant to know that?

COMPUTERS – IT FORENSICS – Material can be sent to a user’s computer via the internet without the owner’s knowledge, consent or request in a number of ways. These include pop-ups, the contents of an otherwise legitimate download from news-groups, spam emails, unopened messages, pictures posted in legitimate chatrooms or forums, avatars (users’ visual icons), corrupted files which cannot be opened by the user, web-crawlers and malicious software scripts, such as trojan horses, to name a just a few.
The defendant stated that he hadn’t specifically downloaded the image in question, that he had no memory of seeing it and that it might have appeared, unrequested, via pop-up or another way, without his knowledge. However the police interviewing the defendant denied these possibilities; and said that if an image was on his computer he must have downloaded it.
The defendant then argued that other people had access to his computers and he wouldn’t know everything they had looked at or downloaded. The interviewing officer accused him of fabricating friends who might have used his computer in order to blame someone else. Despite the fact that a properly conducted IT forensic examination might have established a provable evidence trail.
For example, if another user logs into their personal email account on a friend’s computer, then an image is downloaded, then they log into their personal Facebook page, all within a few minutes; a Magistrate or jury might be entitled to draw the inference that that user downloaded that image and not the owner.
The police also failed to exhibit the image in question in interview and described it instead, which deprived the defendant of his right to comment on it. What they failed to mention was that the image was thumbnail sized (very small). In certain computer operating systems and webpages, images can be created in a “cache” on the computer without the user necessarily knowing or realising.
The interview also avoided the possibility that the image in question could have been deleted in a timely fashion by the defendant upon realising what it was, which is a specified defence under s65 (2) (c) (ii); but instead remained stored on the computer (unknown to the user), waiting to be overwritten, only to be found upon later examination.

EVIDENCE – PORNOGRAPHY - The defendant had a significant amount of normal sized non-extreme pornographic images, of many different types, styles and genres, on his computer. Despite this, police examination only discovered a single small image which they classified as extreme pornography. Some defendants have thousands of supposedly extreme images on their computers. This defendant had a single thumbnail sized image
This could be seen as emblematic of police failure to understand pornography: which is after all their evidence against a defendant. Hence they failed to appreciate the reasonable inference that a single small extreme image amongst thousands of other legal pornographic images indicated that it was unlikely that the defendant had requested or downloaded it.
Ultimately, in interview, the police attempted to persuade an unrepresented defendant to admit that if he had an extreme pornographic on his computer he must have downloaded it of his own volition.
This is incorrect in law, fact and evidence

At the defendant’s Early First Hearing at the Magistrate’s Court I requested an IT expert’s report to establish whether it could be proved that the image had been transmitted to the defendant’s computer without his knowledge; or whether another user had accessed it without the defendant’s knowledge.
Upon receiving a request for the digital evidence from my IT expert, the Prosecution had to admit that the image in question had been lost. Given the absence of any evidence, they decided to drop the prosecution.

Many police officers do not understand the law, evidence and IT issues regarding s63 of the CJIA 2008. Not only does this have serious implications for defendants who have already pleaded guilty to extreme pornography offences; but it also applies to other sexual and computer based offences.
So, do you really know what’s on your computer? Do you know how it got there?
Will the police if they arrest you?