Richard Drost To serve 14 years for child pornography

Fourteen years in prison is the penalty for a Great Falls man, in a child pornography case.

A federal judge recently sentenced 29-year-old Richard Drost.

Prosecutors say an investigation developed after Great Falls police received a tip, last December, that Drost had what appeared to be child pornography on a computer. Authorities seized and analyzed computers that he used.

Drost pleaded guilty to receipt and possession of child pornography.

Because there’s no parole in the federal system, it’s likely Drost will serve his full sentence except for a 15% reduction that may be granted for good behavior in prison.

Published in: on December 17, 2007 at 7:37 pm  Leave a Comment  

Sebastien Boucher Scumbag Hides his Password

A child pornography suspect cannot be forced to reveal his computer password in order for investigators to access what they believe is illegal content, a Vermont federal judge ruled recently.

Requiring Sebastien Boucher to divulge his Z drive password “forces him to produce evidence that could be used to incriminate him,” U.S. Magistrate Judge Jerome Niedermeier wrote in a Nov. 29 ruling.

Boucher was arrested in December 2006 when he and his father tried to cross the Canadian border into Vermont. Border officials inspected a laptop Boucher had in his backseat and allegedly found computer files with names that suggested their contents might be child pornography. Boucher told border officials that he sometimes inadvertently downloads child porn files, but deletes them when he realizes what they contain.

Further inspection of the computer – without the aid of a password – turned up numerous child-porn files and videos, according to border officials. Investigators subsequently shut down Boucher’s computer and arrested him. But when the Vermont Department of Corrections tried to access the files later that month, investigators found that the Z drive had been protected by encryption algorithms from Pretty Good Software and was totally inaccessible.

The only means to access the password was to use an automated program that continually guesses possible password combinations, but that could take years based on similar investigations, according to Niedermeier’s ruling.

The grand jury, therefore, subpoenaed Boucher and ordered him to provide the password for his computer files.

If Boucher reveals his password, however, he’s basically admitting that he knows how to access the Z drive, Niedermeier wrote.

“The procedure is equivalent to asking Boucher, ‘Do you know the password to the laptop?'” Niedermeier said. “If Boucher does know the password, he would be faced with the forbidden trilemma: incriminate himself, lie under oath or find himself in contempt of court.”

Niedermeier argued that revealing the password compels Boucher to reveal something in his mind. The government has offered to allow Boucher to unlock his computer without revealing the actual password, but “Boucher would still be implicity indicating that he knows the password and that he has access ot the files,” Niedermeier wrote. “The contents of Boucher’s mind would still be displayed, and therefore the testimonial nature does not change merely because no one else will discover the password.”

Niedermeier also dismissed the notion that the existence of child pornography on Boucher’s computer is a foregone conclusion.

“While the government has seen some of the files on drive Z, it has not viewed all or even most of them,” Niedermeier wrote.

If Boucher hands over his password, the government will likely uncover the files it has already seen, but also many it has not. The files the government has not seen could further incriminate Boucher, Niedermeier said.

Furthermore, “the password is not a physical thing,” Niedermeier wrote. “The foregone conclusion doctrine does not apply to the production of non-physical evidence.”

Published in: on December 17, 2007 at 7:35 pm  Leave a Comment  

Sebastien Boucher Scumbag Hides his Password

A child pornography suspect cannot be forced to reveal his computer password in order for investigators to access what they believe is illegal content, a Vermont federal judge ruled recently.

Requiring Sebastien Boucher to divulge his Z drive password “forces him to produce evidence that could be used to incriminate him,” U.S. Magistrate Judge Jerome Niedermeier wrote in a Nov. 29 ruling.

Boucher was arrested in December 2006 when he and his father tried to cross the Canadian border into Vermont. Border officials inspected a laptop Boucher had in his backseat and allegedly found computer files with names that suggested their contents might be child pornography. Boucher told border officials that he sometimes inadvertently downloads child porn files, but deletes them when he realizes what they contain.

Further inspection of the computer – without the aid of a password – turned up numerous child-porn files and videos, according to border officials. Investigators subsequently shut down Boucher’s computer and arrested him. But when the Vermont Department of Corrections tried to access the files later that month, investigators found that the Z drive had been protected by encryption algorithms from Pretty Good Software and was totally inaccessible.

The only means to access the password was to use an automated program that continually guesses possible password combinations, but that could take years based on similar investigations, according to Niedermeier’s ruling.

The grand jury, therefore, subpoenaed Boucher and ordered him to provide the password for his computer files.

If Boucher reveals his password, however, he’s basically admitting that he knows how to access the Z drive, Niedermeier wrote.

“The procedure is equivalent to asking Boucher, ‘Do you know the password to the laptop?'” Niedermeier said. “If Boucher does know the password, he would be faced with the forbidden trilemma: incriminate himself, lie under oath or find himself in contempt of court.”

Niedermeier argued that revealing the password compels Boucher to reveal something in his mind. The government has offered to allow Boucher to unlock his computer without revealing the actual password, but “Boucher would still be implicity indicating that he knows the password and that he has access ot the files,” Niedermeier wrote. “The contents of Boucher’s mind would still be displayed, and therefore the testimonial nature does not change merely because no one else will discover the password.”

Niedermeier also dismissed the notion that the existence of child pornography on Boucher’s computer is a foregone conclusion.

“While the government has seen some of the files on drive Z, it has not viewed all or even most of them,” Niedermeier wrote.

If Boucher hands over his password, the government will likely uncover the files it has already seen, but also many it has not. The files the government has not seen could further incriminate Boucher, Niedermeier said.

Furthermore, “the password is not a physical thing,” Niedermeier wrote. “The foregone conclusion doctrine does not apply to the production of non-physical evidence.”

Published in: on December 17, 2007 at 7:35 pm  Leave a Comment  

Sebastien Boucher Scumbag Hides his Password

A child pornography suspect cannot be forced to reveal his computer password in order for investigators to access what they believe is illegal content, a Vermont federal judge ruled recently.

Requiring Sebastien Boucher to divulge his Z drive password “forces him to produce evidence that could be used to incriminate him,” U.S. Magistrate Judge Jerome Niedermeier wrote in a Nov. 29 ruling.

Boucher was arrested in December 2006 when he and his father tried to cross the Canadian border into Vermont. Border officials inspected a laptop Boucher had in his backseat and allegedly found computer files with names that suggested their contents might be child pornography. Boucher told border officials that he sometimes inadvertently downloads child porn files, but deletes them when he realizes what they contain.

Further inspection of the computer – without the aid of a password – turned up numerous child-porn files and videos, according to border officials. Investigators subsequently shut down Boucher’s computer and arrested him. But when the Vermont Department of Corrections tried to access the files later that month, investigators found that the Z drive had been protected by encryption algorithms from Pretty Good Software and was totally inaccessible.

The only means to access the password was to use an automated program that continually guesses possible password combinations, but that could take years based on similar investigations, according to Niedermeier’s ruling.

The grand jury, therefore, subpoenaed Boucher and ordered him to provide the password for his computer files.

If Boucher reveals his password, however, he’s basically admitting that he knows how to access the Z drive, Niedermeier wrote.

“The procedure is equivalent to asking Boucher, ‘Do you know the password to the laptop?'” Niedermeier said. “If Boucher does know the password, he would be faced with the forbidden trilemma: incriminate himself, lie under oath or find himself in contempt of court.”

Niedermeier argued that revealing the password compels Boucher to reveal something in his mind. The government has offered to allow Boucher to unlock his computer without revealing the actual password, but “Boucher would still be implicity indicating that he knows the password and that he has access ot the files,” Niedermeier wrote. “The contents of Boucher’s mind would still be displayed, and therefore the testimonial nature does not change merely because no one else will discover the password.”

Niedermeier also dismissed the notion that the existence of child pornography on Boucher’s computer is a foregone conclusion.

“While the government has seen some of the files on drive Z, it has not viewed all or even most of them,” Niedermeier wrote.

If Boucher hands over his password, the government will likely uncover the files it has already seen, but also many it has not. The files the government has not seen could further incriminate Boucher, Niedermeier said.

Furthermore, “the password is not a physical thing,” Niedermeier wrote. “The foregone conclusion doctrine does not apply to the production of non-physical evidence.”

Published in: on December 17, 2007 at 7:35 pm  Leave a Comment  


Lewis M. Ingalls, 40, formerly of Rochester, pleaded guilty today to receiving child pornography that he downloaded from the Internet.

Ingalls made the plea today before U.S. District Judge Charles J. Siragusa, admitting that he possessed more than 600 sexually explicit images of children on his computer and computer discs.

When he is sentenced March 17, Ingalls faces a mandatory minimum of 15 years and a maximum 40 years in prison, according to U.S. Attorney Terrance P. Flynn.

Ingalls is listed as a high-risk sex offender because he was convicted of attempted first-degree sexual abuse in 1994 for sexually assaulting a girl in Allegany County. He was sentenced to 1 1/3 to four years in prison and was released in 1998.

Published in: on December 17, 2007 at 6:40 pm  Leave a Comment  


Lewis M. Ingalls, 40, formerly of Rochester, pleaded guilty today to receiving child pornography that he downloaded from the Internet.

Ingalls made the plea today before U.S. District Judge Charles J. Siragusa, admitting that he possessed more than 600 sexually explicit images of children on his computer and computer discs.

When he is sentenced March 17, Ingalls faces a mandatory minimum of 15 years and a maximum 40 years in prison, according to U.S. Attorney Terrance P. Flynn.

Ingalls is listed as a high-risk sex offender because he was convicted of attempted first-degree sexual abuse in 1994 for sexually assaulting a girl in Allegany County. He was sentenced to 1 1/3 to four years in prison and was released in 1998.

Published in: on December 17, 2007 at 6:40 pm  Leave a Comment  

WANTED: Steven Andrew Hayes

In 1997, Steven Andrew Hayes was sentenced to five years confinement at a correctional facility on a charge of sodomy against an 8-year-old relative. But now, cops in Lewisville, Texas, wish he would’ve stayed locked up longer.

Sometime between Jan. 13 and Jan. 15, 2005, cops say Hayes couldn’t control his sick instincts and gave a 12-year-old girl a powerful drug, and cops say he sexually assaulted her. But the courageous little victim came forward at the end of the month and told cops what she remembered; in September 2005, a Grand Jury in Denton County, Texas indicted Hayes for Aggravated Sexual Assault of a Child. But after Hayes found out about it, he fled.

Cops in Texas have exhausted every lead to find Hayes and fear that another kid may get hurt. That’s why they want to make the public aware of a few things to be on the look out, in case they come close to Hayes.

Police say Hayes is a very religious person, who boasts about his religious upbringing and education and likes to speak of the Lord. He is also very friendly and likable, which cops believe helps him gain his victims’ trust.

Cops are not sure where Hays may be hiding, but say he may have connections in Arizona, Kansas, Missouri, Pennsylvania or Texas. They also believe Hayes may be seeking medical treatment, since he has an old back injury and complains of carpal tunnel in both wrists.

Hayes’ last job was as an independent constructor. Cops say he would travel to disaster areas across the United States and approach property owners. Once he established a relationship with potential clients, he would assess the damages to their properties, give them estimates and get their personal information — information he would later release to other construction businesses. If these businesses were awarded the bid, Hayes would receive money from them.

So if Hayes runs out of money, he may seek jobs in the construction industry, especially roofing. And because of his friendly personality, he may also be working in sales.

Published in: on December 17, 2007 at 6:30 pm  Leave a Comment  

WANTED: Steven Andrew Hayes

In 1997, Steven Andrew Hayes was sentenced to five years confinement at a correctional facility on a charge of sodomy against an 8-year-old relative. But now, cops in Lewisville, Texas, wish he would’ve stayed locked up longer.

Sometime between Jan. 13 and Jan. 15, 2005, cops say Hayes couldn’t control his sick instincts and gave a 12-year-old girl a powerful drug, and cops say he sexually assaulted her. But the courageous little victim came forward at the end of the month and told cops what she remembered; in September 2005, a Grand Jury in Denton County, Texas indicted Hayes for Aggravated Sexual Assault of a Child. But after Hayes found out about it, he fled.

Cops in Texas have exhausted every lead to find Hayes and fear that another kid may get hurt. That’s why they want to make the public aware of a few things to be on the look out, in case they come close to Hayes.

Police say Hayes is a very religious person, who boasts about his religious upbringing and education and likes to speak of the Lord. He is also very friendly and likable, which cops believe helps him gain his victims’ trust.

Cops are not sure where Hays may be hiding, but say he may have connections in Arizona, Kansas, Missouri, Pennsylvania or Texas. They also believe Hayes may be seeking medical treatment, since he has an old back injury and complains of carpal tunnel in both wrists.

Hayes’ last job was as an independent constructor. Cops say he would travel to disaster areas across the United States and approach property owners. Once he established a relationship with potential clients, he would assess the damages to their properties, give them estimates and get their personal information — information he would later release to other construction businesses. If these businesses were awarded the bid, Hayes would receive money from them.

So if Hayes runs out of money, he may seek jobs in the construction industry, especially roofing. And because of his friendly personality, he may also be working in sales.

Published in: on December 17, 2007 at 6:30 pm  Leave a Comment  

Jeffrey C Clark Repeat Sex Offender

A Covington man charged with child molestation on Thursday was convicted of a sex crime in Vermilion County, Ill., in 1993.

Jeffrey C. Clark, 44, was arrested Thursday and charged with two counts of Class A felony and two counts of Class C felony child molesting. If convicted on all charges, Clark could face a prison sentence of up to 116 years.

Online court records for Vermilion County show Clark went to court on charges of felony counts of second degree criminal sexual assault, criminal sexual assault against a person 13-17 years old, criminal sexual abuse against a person 13-16 years old and misdemeanor first degree criminal sexual assault on Jan. 15, 1993.

He was found guilty on the misdemeanor charge and the felonies were dropped. A representative from the Vermilion County Circuit Clerk’s office said Clark’s charges stemmed from a 1991 incident. He was not sentenced to any jail time and was released from probation in 1995, the spokesperson said.

Court records indicate that Clark was interviewed by authorities about the alleged molestation on Oct. 26, 2006. In that interview, Clark denied all the allegations. He accused his wife, who had initiated divorce proceedings, of telling the victim to level accusations against him. Clark said in the interview that the alleged victim had “truthfulness and honesty issues,” and that she “was a liar.”

Clark told authorities his wife was trying to make him look bad in an attempt to gain sole custody of the couple’s children.

According to court records, Clark’s wife filed for a legal separation on May 8, 2006. Three days later, she filed for a temporary restraining order against Clark. A petition for dissolution of the Clark marriage was filed on June 16, 2006, and Clark’s wife filed a verified petition for a restraining order on Aug. 3, 2006.

An investigation into the alleged molestation began on Oct. 19. 2006, court records said, when a child protection case worker with the Fountain County Office of the Indiana Department of Child Services contacted Indiana State Police. Court records said the alleged victim’s mother contacted authorities with her suspicions that the molestation had taken place.

The alleged victim told authorities Clark molested her various times from the ages of 7 to 9, court documents said. The incidents are alleged to have happened at Clark’s home between July 30, 2002 and April 29, 2006.

An affidavit of probable cause in the case was filed on Dec. 11. Clark posted $75,000 bond and was released from jail shortly after his arrest. His initial hearing is set for 9 a.m. on Jan. 29 in Fountain Circuit Court.

Clark is the president of Covington Foods. He owns County Markets in Crawfordsville and Danville, as well as IGA grocery stores in Covington and Attica.

Published in: on December 17, 2007 at 5:08 pm  Comments (2)  

John Newton Hewitt – School Teacher in Melbourne

Australian Federal Police today arrested a Victorian school teacher and charged him with two child pornography offences.

In a case unrelated to the weekend arrests in Victorian and NSW, John Newton Hewitt, 49, appeared briefly in a Melbourne court late this afternoon.

Prosecutor Krista Breckweg asked that investigators be granted a further six weeks to compile the brief of evidence because of the “considerable” amount of computer material that needed to be analysed.

Hewitt was ordered to report to police weekly, surrender his passport, not leave Australia and appear again in April.

He is charged with using a carriage service to access child pornography material on January 30 this year.

He is also charged with possessing child pornography material on December 17 this year.

Deputy chief magistrate Jelena Popovic allowed a defence application that Hewitt’s reporting to police be suspended for two weeks from December 25 to allow him to travel interstate.

Published in: on December 17, 2007 at 3:53 pm  Leave a Comment