NJ Possession of Child Pornography Lawyer
Welcome to Spodek Law Group. If you're reading this, you're probably terrified. Maybe investigators showed up at your door. Maybe you received a target letter. Or maybe someone told you that you're under investigation and you have no idea what to do next. This is one of the most serious charges in New Jersey, and the consequences extend far beyond prison. We need to talk about what's actually happening here, because most of what you've read online misses the point entirely.
Everyone thinks these cases are about what's on your computer. What images were found, how many files existed, what the forensic analysis uncovered. Thats not wrong, but it's incomplete. The real fight happens somewhere else entirely. The law requires that you "knowingly" possessed the material - and proving what someone knew, versus what was merely present on their device, is where these cases are won or lost.
Your browser creates evidence you never asked for. Cache files, temporary internet files, images that load automatically on websites you scrolled past. A file you didn't know existed can technically constitute "possession" under New Jersey law. And that's the problem most defendants don't understand until they're sitting across from a prosecutor who's acting like everything is obvious.
What NJ Law Actually Says About Possession
New Jersey classifies these offenses under N.J.S.A. 2C:24-4, which is called "endangering the welfare of children." The statute says a person commits a crime of the third degree if they "knowingly" possess, view, or have under their control any item depicting sexual exploitation or abuse of a child. Heres the thing - that word "knowingly" is doing a lot of work.
The prosecution has to prove you knew the material was there. They have to prove you knew what it depicted. And they have to prove you exercised control over it. That sounds straightforward until you realize how computers actualy work. Files end up on hard drives through malware, through shared network access, through someone else using your computer. The question isnt just "was it there?" The question is "did you put it there, and did you know it was there?"
OK so think about this. You live with roommates. One of them uses your laptop while youre at work. Months later, investigators show up with a warrant. They find files you've never seen, in folders you didnt know existed. Under the law, those files were in your "possession." But did you knowingly possess them? Thats what a trial would be about. That's where a defense attorney earns their fee.
How These Cases Start
Most people have no idea how they ended up in this situation. By the time they knock on your door, theyve been watching for months. The investigation is basicly done before you even know it started. Internet Crimes Against Children task forces work with federal agencies. They monitor peer-to-peer networks. They track IP addresses. They build cases over weeks or months before making a single arrest.
Teachers, accountants, engineers. Think about that for a second. The prosecution doesnt go after shadows. They go after people with traceable lives. People with stable addresses, steady jobs, bank accounts that can be seized. If your wondering why the news seems full of professionals getting arrested for these charges - thats why. Its not that professionals commit these offenses more. Its that theyre easier to find and prosecute.
The investigation window can last anywhere from six months to over a year. During that time, every piece of evidence is being gathered, organized, and prepared for trial. They're not rushing. Theyre building. And most defendants spend that entire period completely unaware that anything is happening. By the time you find out, they already have everything they need. Your job is to figure out what they missed - and what they got wrong.
The Image Count Threshold Nobody Talks About
Heres something that changes everthing. In New Jersey, the number of images directly affects how the case is charged and what penalties youre facing. Ninety-nine images might mean probation. One hundred means prison is presumed. Nobody explains where that line is until youve crossed it.
Under the statute, if you possess 100 or more items, there is a presumption of incarceration. The court is required to impose a prison sentence unless the judge finds that imprisonment would be a "serious injustice" based on your character and circumstances. Under 100 items, theres more flexibility. First-time offenders with clean records have gotten diversionary programs, probation, treatement-focused outcomes.
This isn't about minimizing whats happening. Every single image represents real harm to a real child. But when your facing sentancing, the difference between 99 and 100 files can be the difference between rebuilding your life and spending years in state prison. A good defense attorney will challenge the forensic count. They'll argue about duplicates, about corrupted files, about items that dont meet the legal definition. Every number matters.
Defenses That Actually Work
Let that sink in for a moment. The moment you explain yourself to investigators, youve usualy destroyed your best defense without knowing you had one. People want to cooperate. They want to clear there name. They think if they just explain what happened, it will all go away. It dosen't work that way. Not even close.
Defenses in these cases fall into a few categories. First, theres the knowledge defense - you didn't know the material was on your device. Second, theres the identity defense - someone else accessed your computer or network. Third, theres the chain of custody defense - the prosecution cant prove the evidence wasn't tampered with. Fourth, theres entrapment - you were induced by law enforcement to commit an offense you wouldnt have otherwise commited.
Entrapment sounds like a defense. In practice the bar is so high that almost no one clears it. You have to prove that law enforcement induced you to commit the crime - not just that they provided an opportunity, but that they actually pushed you into doing somthing you wouldnt have done on your own. Courts are extremly skeptical of entrapment claims in these cases.
The knowledge defense is usally where cases are won. Think about it this way - cache files that you never accessed, deleted files that were on the drive before you owned it, files downloaded by malware without your knowledge. A roommate, a family member, a coworker who had access to your machine. If you can create reasonable doubt about wheather you knew the material was there, you can beat the charge. The burden is on the prosecution to prove you knew. Thats not a small burden.









