90.exclusionary Rule - Cadajas y Cabias v. People
90.exclusionary Rule - Cadajas y Cabias v. People
CHRISTIAN CADAJAS y
CABIAS, petitioner, vs. PEOPLE OF THE PHILIPPINES, respond
ent.
DECISION
J.Y. LOPEZ, J :
p
III.
Whether the CA gravely erred in the interpretation of the unlawful and
punishable acts under Section 4(c)(2) of R.A. No.
10175 in relation to Sections 4(a), 3(b) and (c)(5) of R.A. No. 9775.
IV.
Whether the CA gravely erred in convicting
petitioner of violation of Section 4(c)(2) of R.A. No.
10175 in relation to Sections 4(a), 3(b) and (c)(5) of R.A. No.
9775 despite the failure of the prosecution to prove his guilt beyond
reasonable doubt.
Our Ruling
Upon a careful
review of the records of this case, the Court finds the petition to be without
merit.
On petitioner's right to privacy
One of the arguments raised by petitioner before
this Court concerns the admissibility of the evidence presented
by the prosecution, which was taken from his Facebook messenger account.
He claims that the photos presented in evidence
during the trial of the case were taken from his Facebook messenger account.
According to him, this amounted to a violation of his right to privacy, and
therefore, any evidence obtained in violation thereof amounts to a
fruit of the poisonous tree.
We disagree.
The right to privacy is defined as "the right to be free from unwarranted
exploitation of one's person or from intrusion into one's private
activities in such a way as to cause humiliation to a person's ordinary
sensibilities." It is the right of an individual "to be free from unwarranted
publicity, or to live without unwarranted interference
by the public in matters in which the public is not necessarily concerned."
Simply put, the right to privacy is "the right to be let alone." 29 In his Separate
Concurring Opinion, Associate Justice Marvic Mario Victor F. Leonen
expounded on the concept of privacy, as it has developed
throughout the digital age, thus:
Chief Justice Puno sparked judicial
interest in the right to privacy. In his speech that I cited in my separate
opinion in Versoza v. People, 30 he discussed the three
strands of privacy in American Jurisprudence, namely, locational or
situational privacy, informational privacy, and decisional privacy.
Locational privacy, also known as
situational privacy, pertains to privacy that is felt in a
physical space. It may be violated through an
act of trespass or through an unlawful search.
Meanwhile,
informational privacy refers to one's right to control
"the processing — i.e., acquisition, disclosure and use
— of personal information."
Decisional privacy, regarded as the most
controversial among the three,
refers to one's right "to make certain
kinds of fundamental choices with respect to their
personal and reproductive autonomy." 31
This speech has been influential in several of our
jurisprudence. 32 To this day, we are still refining our
concept of privacy, particularly the right to informational privacy. 33
As early as Morfe v. Mutuc, 34 we have
recognized the increasing
importance of the protection of the right to privacy in the digital age.
Such right is of particular importance given the nature of the internet
and our inescapable dependence on it despite the possible disruption
that it can bring. In my separate opinion in Disini v.
Secretary of Justice, 35 I explained:
The internet or cyberspace is a complex
phenomenon. It has pervasive effects and are, by now,
ubiquitous in many communities. Its possibilities for
reordering human relationships are limited only
by the state of its constantly evolving technologies
and the designs of various user interfaces. The internet
contains exciting potentials as well as pernicious
dangers. ETHIDa
While the above provision
highlights the importance of the right to privacy and its consequent effect
on the rules on admissibility of evidence, one must not lose sight of the fact
that the Bill of Rights was intended to protect private individuals against
government intrusions. Hence, its provisions are not applicable between and
amongst private individuals. As explained in People v. Marti: 39
That the Bill of Rights embodied in the Constitution is not
meant to be invoked against acts of private individuals finds
support in the deliberations of the Constitutional Commission.
True, the liberties guaranteed by the fundamental law of the land must
always be subject to protection. But protection against whom?
Commissioner Bernas in his sponsorship speech in the Bill of Rights
answers the query which he himself posed, as follows:
First, the general
reflections. The protection of fundamental
liberties in the essence of constitutional democracy.
Protection against whom? Protection
against the state. The Bill of Rights
governs the relationship between the individual
and the state. Its concern is not the relation between
individuals, between a private individual and other
individuals. What the Bill of Rights does is to declare
some forbidden zones in the private sphere
inaccessible to any power holder. (Sponsorship
Speech of Commissioner Bernas,
Record of the Constitutional Commission, Vol. 1, p. 674;
July 17, 1986; Emphasis supplied) 40
While the case of Zulueta v. Court of Appeals 41 (Zulueta) may
appear to carve out an exception to the abovementioned rule by
recognizing the rule on inadmissibility of evidence between
spouses when one obtains evidence in violation of his/her
spouse's right to privacy, such a pronouncement is a mere obiter dictum that
cannot be considered as a binding precedent. This is because the petition
brought to the Court in Zulueta simply asked for the return of the documents
seized by the wife and thus, pertained to the ownership of the documents
therein. Moreover, documents were declared inadmissible
because of the injunction order issued by the trial court and not on
account of Art. III, Sec. 3 of the Constitution. At any
rate, violation of the right to privacy between individuals is properly governed
by the provisions of the Civil Code, the Data Privacy Act (DPA), 42 and other
pertinent laws, while its admissibility shall be governed by the rules on
relevance, materiality, authentication of documents, and the exclusionary
rules under the Rules on Evidence.
In this case, the photographs and conversations in the Facebook
Messenger account that were obtained and used as evidence against
petitioner, which he considers as fruit of the poisonous tree, were not obtained
through the efforts of the police officers or any agent of the State. Rather,
these were obtained by a private individual.
Indeed, the rule governing the admissibility of an evidence under
Article III of the Constitution must affect only those pieces of evidence
obtained by the State through its agents. It is these individuals who can flex
government muscles and use government resources for a possible abuse.
However, where private individuals are involved, for which their relationship is
governed by the New Civil Code, the admissibility of an evidence
cannot be determined by the provisions of the Bill of Rights.
Here, the pieces of evidence presented by the prosecution were
properly authenticated when AAA identified them in open court. As further
pointed out by Associate Justice Rodil V. Zalameda
during the deliberations of this case, the DPA allows the processing of data
and sensitive personal information where it
relates to the determination of criminal liability of a data subject, 43 such as
a violation of R.A. No. 10175 in relation to R.A. No. 9775 and when necessary
for the protection of lawful rights and
interests of persons in court proceedings, 44 as in this case where the commun
ications and photos sought to be excluded were
submitted in evidence to establish AAA's legal claims before the prosecutor's
office and the courts.
Be that as it may, the act of AAA cannot be said to have violated
petitioner's right to privacy. The test in ascertaining whether there is
a violation of the right to privacy has been explained in the case of Spouses
Hing v. Choachuy, Sr. 45 as follows: SDAaTC
In ascertaining whether there is
a violation of the right to privacy, courts use the "reasonable
expectation of privacy" test. This test determines whether a person has
a reasonable expectation of privacy and whether the expectation has
been violated. In Ople v. Torres, we enunciated that
"the reasonableness of a person's expectation of privacy depends on a
two-part test: (1) whether, by his conduct, the individual has exhibited
an expectation of privacy; and (2) this expectation is one that society
recognizes as reasonable." Customs, community norms, and practices
may, therefore, limit or extend an individual's "reasonable
expectation of privacy." Hence, the reasonableness of a person's
expectation of privacy must be determined on a case-to-case basis
since it depends on the factual circumstances surrounding the case. 46
Here, petitioner's expectation of privacy emanates from the fact that his
Facebook Messenger account is password protected, such that no one can
access the same except himself. Petitioner never asserted that his Facebook
Messenger account was hacked or the photos were taken from his account
through unauthorized means. Rather, the photos were obtained from his
account because AAA, to whom he gave his password, had access to it.
Considering that he voluntarily gave his password to AAA, he, in effect, has
authorized AAA to access the same. He did not even take steps to exclude
AAA from gaining access to his account. Having been given
authority to access his Facebook Messenger account, petitioner's reasonable
expectation of privacy, in so far as AAA is concerned, had been limited. Thus,
there is no violation of privacy to speak of.
While the messages and photos were taken from the Facebook
Messenger of petitioner because AAA was forced by BBB to do so, such does
not deviate from the fact that petitioner allowed another person to access his
account. When he gave his Facebook Messenger password to AAA, he made
its contents available to AAA, and the latter would then
have the latitude to show to other persons what she could access, whether
she be forced to do so or not. The availability of accessing these photos
limited the scope of his right to privacy, especially that these became
essential in pursuing AAA's claims to protect her rights.
In any case, it bears pointing out that petitioner failed to raise his
objection to the admissibility of the photos during the proceedings in the RTC.
Basic is the rule that in order to exclude
evidence, the objection to admissibility of evidence must be made
at the proper time, and the grounds therefore be specified.
Objection to evidence must be made at the time it is formally
offered. In case of documentary evidence, offer is made after
all the witnesses of the party making the offer have testified,
specifying the purpose for which the evidence is being offered. It is only at this
time, and not at any other, that objection to the documentary evidence
may be made. When a party failed to interpose a timely objection to evidence
at the time they were offered in evidence, such objection shall be considered
as waived. This is true even if by its nature the evidence is inadmissible and
would have surely been rejected if it had been challenged at the proper
time. 47
As a complimentary principle, it is well-settled that no question
will be entertained on appeal unless it has been raised in the proceedings
below. Points of law, theories, issues and arguments not
brought to the attention of the lower court, administrative agency or quasi-
judicial body, need not be considered by a reviewing court, as they
cannot be raised for the first time at that late stage. Basic
considerations of fairness and due process impel this rule. Any issue raised
for the first time on appeal is barred by estoppel. 48
By failing to timely raise his objection to the admissibility of the photos,
petitioner is deemed to have already waived the same. Thus, the photos
taken from his Facebook Messenger account are admissible in evidence.
On petitioner's liability
Petitioner was charged for violating Section 4 (c) (2) of R.A. No.
10175 49 in relation to Sections 4 (a) and 3 (b) and (c) (5) of R.A. No.
9775, 50 which reads as follows:
xxx xxx xxx
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this Act: x x x
(c) Content-related Offenses: x x x
(2) Child Pornography. — The unlawful or
prohibited acts defined and punishable
by Republic Act No. 9775 or the Anti-Child
Pornography Act of 2009, committed through a
computer system: Provided,
That the penalty to be imposed shall be (1) one
degree higher than that provided for in Republic
Act No. 9775. acEHCD
Dede lang
C: Ako din bi PSA (sic) mna (sic)
HahAt (sic) bi
K: Magpasa ka din hahaha
Lah (sic) bat lahat
xxx xxx xxx
C: Hahaha hnde (sic) aman (sic) bi
Lahat bi gusto ko
Uo nga nkKaumay (sic) bi nslibugan (sic) ako
K: Gagi ayoko nga yung pepe
xxx xxx xxx
C: Buka muh (sic) nga kunti (sic) bi kunti (sic) lang tutok muh (sic)
Hah (sic)
K: Ayoko na.
Haha Christian haha OK nay an
C: She (sic) nah (sic) gsto (sic) KO (sic) mkita (sic) bi 54
xxx xxx xxx
It is evident from the above-quoted conversation that petitioner induced
AAA to engage in the lascivious exhibition of her breasts and vagina through
Facebook Messenger. Notably, it was petitioner who was the one giving
specific orders to AAA. He even asked AAA to send to him nude photos of her
and for the latter to further spread her legs near the camera, so that petitioner
can see her vagina. In her testimony, AAA further explained that it was
because of the continuous prodding of petitioner, that forced her to send her
nude photos to the latter, thus:
Q: What about those pictures? Can you tell us about those pictures that
you are referring to?
A: Because he instructed me to send a picture to him of my breast and
vagina, so I send him pictures, Sir.
Q: Okay, you send pictures of your breast and you [sic] vagina. What did
you use in order to send him those pictures?
A: Cell phone, Sir.
Q: How did the accused convince you to do that?
A: He said magsend daw po ako ng picture.
Q: Was there a promise?
A: None, Sir.
Q: Just the accused merely telling you or commanding you to produce or
take pictures of your private parts?
A: Yes, Sir.
Q: Why did you allow yourself to do that?
A: Napilitan lang po akong magsend ng ganun.
xxx xxx xxx
Q: Paanong napilitan kung hindi ka pinuwersa or hindi ka tinakot? Paano
mo nasabing napilitan lang? Alam mong mali iyon at hindi naman
pinapayagan na ganun, bakit mo sinend parin kung hindi ka
naman niya pinilit o tinakot? Ano talaga ang nagtulak sayong
magsend ng ganun? Ano ba ang pumasok sa isip mo, pumasok
sa katawan mo nung ginawa mo iyon? Just be candid.
A: Hindi ko po alam.
Q: Hindi mo alam kasi?
A: Naaano lang po ako sa sinabi niya, sa message po niya sakin na puro
please magsend kana sige na puro ganun po.
Q: Sa pagkukumbinsi niya? Panay ang please?
A: Hindi po niya ako tinigilan nun e.
Q: Hindi siya tumitigil?
A: Hindi po. 55 HESIcT
MR. DESCALLAR.
With or without the intent to publish.
MS. GIRONELLA.
For the possessor.
MR. DESCALLAR.
Yes. Oo. Kasi in the House version, letter (f) . . .
MR. MARALIT.
Ihiwalay na lang natin.
COMMITTEE SECRETARY GUEVARRA.
Letter (f).
MR. DESCALAR.
x x x In the house version, "to knowingly possess, download,
purchase, blah blah x x x "so, it's mere possession, separate x x x
distinct from producing, distributing, selling or profiting from child
pornography.
MS. GIRONELLA.
So, Sir, I think, what we can do . . .
MR. MARALIT.
Yeah, mere possession.
MS. GIRONELLA.
x x x it would be x x x so, let's adopt x x x the proposal is to adopt
section (d) of the Senate version with the following amendments:
"To possess or knowingly access, download, purchase x x x or
purchase with reasonable knowledge, any form of child
pornography with or without the intent to publish, sell, distribute
and broadcast";
MR. DESCALLAR.
I think we delete "or without." So, it
will be "with the intent to publish" and you provide another
provision for possession as, like for example in letter
(f) of the House version which is mere possession. Letter
(d) of the house is for possession, downloading, or distribution."
So, separate x x x ano siya, separate siya, 'yang intent to publish
or to distribute.
MS. GIRONELLA.
Sir, can you please word the provision you're proposing.
COMMITTEE SECRETARY GUEVARRA.
Okay. May we recognize Atty. Del Prado first.
MR. DEL PRADO.
Na-discuss din po naming ito doon sa x x x first, we support x x x
including the word "knowingly" before "possess." Iyong
discussions po ditto, halimbawa po may nagpadala sa inyo ng e-
mail with an attachment of child pornography na kung hindi natsi-
check ng e-mail, it's been there for several months, hindi pa rin po
'yun dapat "knowing possession." So, pero kapag binuksan mo
'yan na x x x na-access mon a, alam mo na and then you keep it,
so 'yun po 'yung sinasabi na "knowing possession."
And then doon naman po sa point of "with intent to sell,
distribute," ang concern po ng law enforcement agents you are x
x x we are adding another x x x the burden again of proving this
intent kasi 'yung sinasabi nila we can x x x some jurisdictions,
some countries do provide for the x x x parang sa drugs po iyong
how many kilobytes. Pero sinasabi rin po naming, mahirap din
pong mag term kasi po pagka ano 'yung personal and ano 'yung
with intent to distribute. So, we really x x x it's either you possess
and we punish that or you distribute and we punish that. Kasi
kung hindi naman natin ma-prove 'yung kanyang distribution, then
mayroon pa tayong fallback doon sa possession. So, ganoon na
lang x x x 'yun po ang irerekomenda natin para hindi po additional
burden 'yung to establish the intent. ICHDca
MR. MARALIT.
Iyong suggestion ng colleague naming is, sabi niya, no
proof of intent is necessary if we will provide here that there would
rise a presumption of intent to sell, distribute, in case there are a
number of copies, puwede natin i-craft na lang siguro maya-
maya. Ngayon na, we will x x x
MR. DESCALLAR.
I move to adopt the House version, letter (d) and letter (f) with
some amendments removing or deleting the term "for personal
use" in letter (f).
COMMITTEE SECRETARY GUEVARRA.
Of course, with modifications siguro.
MR. MARALIT.
Yeah, we will craft the provisions. Can we suspend the session. 57
It can be gleaned from the lengthy
discussion of the members of the Technical Working Group
that the authors of this statute intended to penalize even the mere
possession, for personal use or enjoyment, of child pornography. The law, as
enacted, considers possession with intent to sell, distribute, or
publish 58 to be distinct and separate from mere possession. 59 If proven, a
stiffer penalty would be imposed on those who were found to have
intended to distribute or profit from child pornography. Thus, the foregoing
shows the intention of the legislature to include as much violation for acts
committed that would further
spread the proliferation of pornography in the country, including possession
thereof. Necessarily, as those who merely possess child pornographic
materials are also punished by law, then R.A. No. 9775 could
not be said to have limited its application only to those who are
engaged in the business of child pornography.
It also bears emphasis that petitioner obtained the child pornographic
materials by inducing AAA to send him photos of the latter's private parts. He
did not come into possession of these photos because it was sent by another
person. Rather, he came into possession of AAA's photos
because of inducing AAA to exhibit her private parts to him.
As the inducement to send photos of AAA's private parts was committed
with the use of a mobile phone through Facebook Messenger, petitioner's act
also falls within the purview of Section 4 (c) (2) of R.A. No. 10175, which
penalizes child pornography through the use of a computer system. A mobile
phone is considered as a computer system under Section 3 (g) 60 of R.A. No.
10175.
On another matter, petitioner's heavy reliance on the sweetheart theory
is misplaced. Invoking this defense would depend
on the circumstances of each case. Jurisprudence explained that the said
theory applies in felonies that were committed against or
without the consent of the victim. This theory operates on the premise
that the violation committed was consensual. Hence, the party invoking this
theory bears the burden of proving that said party and the victim were lovers
and that the latter consented to the commission of the act. 61
In the recent case of Bangayan v. People, 62 the sweetheart theory was
given serious consideration because the accused and the alleged victim were
able to show that the alleged rape incident that happened between them was
consensual, and a product of love. As noted
by the court in that case, the accused and the alleged victim had two children
and had lived together even after the filing of the rape charges.
As compared with the instant case, there was
insufficiency of evidence to prove the application of the sweetheart theory.
Lovers, when they are passionate with their feelings, engage in physical
contact, as manifestations of their love towards one another. As they express
their feelings towards one another, they express themselves and not just lust
over the photos of private parts of their partners. While there
may be instances of expressions of love in a virtual space, the same would
usually be predicated by endearing words and not just advances of lust,
as in this case.
Here, AAA was led to believe that she was in a relationship with
petitioner. It was undisputed that it was AAA who relentlessly
pursued the petitioner. Still, it can be gleaned from the facts that petitioner,
who must be basking in her attention, took advantage of her innocence and
vulnerability. The fact that AAA had three previous boyfriends should not
even be taken against her for it is the rule under Section 54 (a)
(1), Rule 130 of the Revised Rules of Court that "the character of the offended
party may be proved if it tends to establish in any degree the probability or
improbability of the offense charged." It has been held in rape case, that this
argument may be raised only to show that there was consent in a rape case.
This does not apply when the woman's consent is immaterial such
as in statutory rape or rape with violence or intimidation. 63 It must be added
that consent would also be immaterial if the victim was persuaded, coerced or
induced to do a particular act, as in this case. In his Separate Concurring
Opinion, Justice Leonen made reference to his Dissenting
Opinion in Bangayan v. People, 64 ultimately concluding that the sweetheart
defense should not be allowed in cases involving child pornography, thus: cSaATC
Unless and until these minors are given proper guidance and/or taught
about sex and its consequences, and until it be shown that their actions arise
from their feelings of love towards their partner, they
cannot be considered to be truly capable of giving an educated and rational
consent to engage in any form of sexual activity.
Thus, to minimize the risk of harm to minors from the detrimental
consequences of their attempts at adult sexual behavior, the State, as parens
patriae, is under the obligation to intervene and protect them from sexual
predators like petitioner in this case. 68 This must be so if We
are to be true to the constitutionally enshrined State
policy to promote the physical, moral, spiritual, intellectual and social well-
being of the youth. 69 This is also in harmony with the declared
policy of the State in R.A. No. 9775, which provides:
x x x The State recognizes the vital role of the youth in nation building
and shall promote and protect their physical, moral, spiritual,
intellectual, emotional, psychological and social well-being. Towards
this end, the State shall:
(a) Guarantee the fundamental rights of every child from
all forms of neglect, cruelty and other conditions
prejudicial to his/her development;
(b) Protect every child from all forms of exploitation and
abuse including, but not limited to:
(1) the use of a child in pornographic
performances and materials; and
(2) the inducement or coercion of a
child to engage or be involved in pornography
through whatever means; x x x 70
Article 3 (1) of the United Nations Convention on the Rights of a
Child of which the Philippines is a signatory is similarly emphatic that in all
actions concerning children, whether undertaken by public or private social
welfare institutions, courts of law, administrative authorities or legislative
bodies, it is the best interests of the child that shall be the primary
consideration.
Article 1 of Presidential Decree No. 603, otherwise known as,
"The Child and Youth Welfare Code" is likewise clear and unequivocal that
every effort should be exerted by the State to promote the welfare of children
and enhance their opportunities for a useful and happy life.
This Court, however, concurs with petitioner's argument, and as pointed
out by Associate Justice Alfredo Benjamin S. Caguioa in his Dissenting
Opinion, 71 that a violation of Section 4 (c) (2) of R.A. No.
10175, in relation to Sections 4 (a), 3 (b) and (c) (5) of R.A. No. 9775 falls
under the class of offenses known as mala in se, where criminal intent
must be proven by proof beyond reasonable doubt. The difference
between the concept of mala in se and malum prohibitum were succinctly
explained as follows:
Criminal law has long divided crimes into acts
wrong in themselves called acts mala in se; and acts which would
not be wrong but for the fact that positive law forbids them, called
acts mala prohibita. This distinction is important with
reference to the intent with which a wrongful act is
done. The rule on the subject is that in acts mala in se, the intent
governs; but in acts mala prohibita, the only inquiry is,
has the law been violated? When an act is
illegal, the intent of the offender is immaterial. When the doing of an
act is prohibited by law, it is considered injurious to public welfare,
and the doing of the prohibited act is the crime itself.
A common misconception is that all mala in se crimes are
found in the Revised Penal Code (RPC), while all mala
prohibita crimes are provided by special penal laws. In reality,
however, there may be mala in se crimes under special laws, such as
plunder under R.A. No. 7080, as amended.
Similarly, there may be mala prohibita crimes
defined in the RPC, such as technical malversation. ISHCcT
Under the 1987 Constitution, the right to privacy is expressly recognized under
Article III, Sec. 3 thereof, which reads:
While the above provision highlights the importance of the right to privacy
and its consequent effect on the rules on admissibility of evidence, one must not
lose sight of the fact that the Bill of Rights was intended to protect private
individuals against government intrusions. Hence, its provisions are not
applicable between and amongst private individuals. As explained in People v.
Marti:
That the Bill of Rights embodied in the Constitution is not meant to be
invoked against acts of private individuals finds support in the deliberations of
the Constitutional Commission. True, the liberties guaranteed by the
fundamental law of the land must always be subject to protection. But
protection against whom? Commissioner Bernas in his sponsorship speech in the
Bill of Rights answers the query which he himself posed, as follows:
While the messages and photos were taken from the Facebook Messenger
of petitioner because AAA was forced by BBB to do so, such does not deviate
from the fact that petitioner allowed another person to access his account. When
he gave his Facebook Messenger password to AAA, he made its contents
available to AAA, and the latter would then have the latitude to show to other
persons what she could access, whether she be forced to do so or not. The
availability of accessing these photos limited the scope of his right to privacy,
especially that these became essential in pursuing AAA's claims to protect her
rights.
In any case, it bears pointing out that petitioner failed to raise his
objection to the admissibility of the photos during the proceedings in the RTC.
Basic is the rule that in order to exclude evidence, the objection to admissibility
of evidence must be made at the proper time, and the grounds therefore be
specified. Objection to evidence must be made at the time it is formally offered.
In case of documentary evidence, offer is made after all the witnesses of the
party making the offer have testified, specifying the purpose for which the
evidence is being offered. It is only at this time, and not at any other, that
objection to the documentary evidence may be made. When a party failed to
interpose a timely objection to evidence at the time they were offered in
evidence, such objection shall be considered as waived. This is true even if by its
nature the evidence is inadmissible and would have surely been rejected if it had
been challenged at the proper time.
It seems that the above merely expands the scope of the Anti-Child
Pornography Act of 2009 (ACPA) to cover identical activities in cyberspace. In
theory, nothing prevents the government from invoking the ACPA when
prosecuting persons who commit child pornography using a computer system.
Actually, ACPA's definition of child pornography already embraces the use of
"electronic, mechanical, digital, optical, magnetic or any other means." Notably,
no one has questioned this ACPA provision.
Of course, the law makes the penalty higher by one degree when the
crime is committed in cyberspace. But no one can complain since the intensity
or duration of penalty is a legislative prerogative and there is rational basis for
such higher penalty. The potential for uncontrolled proliferation of a particular
piece of child pornography when uploaded in the cyberspace is incalculable.