Electronic Child Exploitation in Georgia

Computer or Electronic Pornography.2

O.C.G.A. Section 16-12-100.2 criminalizes the use of a computer or electronic device to exploit a child by transmitting, distributing, or possessing sexually explicit images of minors, or by using electronic communications to solicit or entice a minor or a person believed to be a minor to engage in sexual conduct. The statute encompasses both direct exploitation through the creation or distribution of child sexual abuse material (CSAM) and indirect exploitation through online solicitation and grooming behaviors. Georgia’s statute operates alongside federal prohibitions under 18 U.S.C. Sections 2251 through 2260, and the dual sovereignty doctrine permits both state and federal prosecution for the same conduct.

Consider this scenario: You receive explicit images of a minor through a group chat that you did not request. Simply possessing those images on your device, even if you did not seek them out, can result in serious criminal charges in Georgia.

Possession vs. Distribution Under Georgia Law

Georgia law distinguishes between possession and distribution of child sexual abuse material, with distribution carrying significantly higher penalties. Possession under O.C.G.A. Section 16-12-100.2(c) is a felony carrying five to twenty years imprisonment for a first offense and ten to thirty years for subsequent offenses. Distribution under O.C.G.A. Section 16-12-100.2(b) carries ten to thirty years. Each image may be charged as a separate count under Georgia law, and the court may impose consecutive sentences, creating the potential for aggregate sentences that effectively constitute life imprisonment even for a first offense. An effective defense requires challenge whether each image constitutes a separate transaction or whether multiple images obtained in a single download should be treated as a single offense for sentencing purposes.

Online Solicitation

O.C.G.A. Section 16-12-100.2(d) addresses the use of electronic communications to solicit, entice, or persuade a minor to engage in sexual conduct. The offense is complete upon the communication itself; the defendant need not physically meet the minor or engage in any contact beyond the electronic communication. ThThis statute covers communications directed at persons believed to be minors, which allows prosecution based on undercover law enforcement operations where an officer poses as a minor online. The defendant’s subjective belief that the recipient was a minor is sufficient for conviction, regardless of the actual age of the person on the other end of the communication.

Entrapment Defense in Sting Operations

Many electronic exploitation cases arise from proactive law enforcement operations in which officers pose as minors on social media platforms, chat rooms, and dating applications. Building a strong defense record means your attorney scrutinize the sting operation for entrapment issues under O.C.G.A. Section 16-3-25. Georgia’s entrapment defense requires showing that the government induced the defendant to commit the offense and that the defendant was not predisposed to commit it. ThGeorgia’s mere provision of an opportunity to commit the offense does not constitute entrapment, but persistent solicitation by the undercover officer, escalation of sexual content by the officer, and initiation of contact by the officer rather than the defendant may support the defense.

The key move for your attorney is to obtain all communications between the undercover officer and the defendant to evaluate who initiated the contact, who escalated the sexual content, and whether the defendant expressed reluctance that was overcome by the officer’s encouragement.

Digital Evidence and Forensic Challenges

Electronic exploitation cases rely heavily on digital evidence including computer hard drives, smartphones, cloud storage accounts, internet browsing history, chat logs, IP address logs, and file metadata. Your attorney’s priority is to retain a qualified digital forensics expert to independently examine the evidence. Critical issues include whether the defendant was the actual user who accessed, downloaded, or transmitted the material; whether the defendant knowingly possessed the material or whether it appeared through malware, peer-to-peer software misconfiguration, pop-ups, or inadvertent downloads; whether the images depict actual minors as opposed to adults or computer-generated images; and whether the metadata and timestamps are consistent with the prosecution’s theory. Attribution of digital activity to a specific individual, rather than merely to a device or IP address, is a central challenge in these prosecutions.

Fourth Amendment and Search Warrant Issues

Digital evidence is typically obtained through search warrants for electronic devices and through preservation orders and subpoenas directed at internet service providers, social media platforms, and cloud storage providers. Your attorney’s practical approach is to challenge the sufficiency of the warrant affidavit under the probable cause standard of Illinois v. Gates, 462 U.S. 213 (1983), the scope of the warrant, and whether officers exceeded the warrant’s scope during the forensic examination. The particularity requirement of the Fourth Amendment requires warrants to specifically describe the items to be seized, and overly broad warrants authorizing seizure of all electronic devices and data may violate this requirement. The U.S. Supreme Court’s decision in Riley v. California, 573 U.S. 373 (2014), requiring warrants for cell phone searches, reinforces the heightened privacy interest in digital devices.

Federal Prosecution Exposure and Sentencing

Federal prosecution under 18 U.S.C. Sections 2251 through 2260 carries severe mandatory minimums: production of CSAM carries a fifteen-year mandatory minimum, distribution carries a five-year mandatory minimum, and receipt carries a five-year mandatory minimum. These federal mandatory minimums are generally higher than Georgia state penalties. Your defense team must evaluate federal exposure whenever the case involves interstate electronic communications and coordinate with federal practitioners when both state and federal investigations are active. Convictions at either level trigger sex offender registration under O.C.G.A. Section 42-1-12 and federal SORNA requirements, along with lengthy periods of supervised release with conditions including electronic monitoring, internet restrictions, and polygraph testing.

Leave a Reply

Your email address will not be published. Required fields are marked *