Former South Plainfield, N.J., Police Captain Michael Grennier Sentenced to 20 Years in Prison for Sexually Exploiting a Minor

Fat pervert ex-cop, Mike Grennier
Michael Grennier, pervert, of So Plainfield, Middlesex County, NJ One of NJ’s finest who was lookin’ out for you!

TRENTON, N.J. – A former South Plainfield police captain was sentenced today to 20 years in prison for exploiting a minor girl by enticing her to live-stream sexually explicit acts via the Internet in exchange for payment, U.S. Attorney Paul J. Fishman announced.

Michael Grennier, 52, of South Plainfield, New Jersey, previously pleaded guilty before U.S. District Judge Freda L. Wolfson to an information charging him with one count of production of child pornography. Grennier was charged by complaint on Feb. 19, 2013, and has been in custody since that date. Judge Wolfson imposed the sentence today in Trenton federal court.

According to documents filed in this case and statements made in court:

On Feb. 14, 2013, Grennier enticed a girl to perform sexually explicit acts and stream images of herself over the Internet while he watched remotely from his home computer. During the webcam session, Grennier exchanged text messages with the minor in which he directed her actions. Grennier admitted during his guilty plea proceeding that he promised to buy his victim clothing in exchange for her performance.

At the time of his arrest, Grennier was working for a private computer forensics firm. Prior to his retirement, he was a computer forensics specialist for the South Plainfield Police Department.

In addition to the prison term, Judge Wolfson sentenced Grennier to serve lifetime supervised release. Restitution will be determined at a later date. Grennier will also be required to register as a sex offender… via USDOJ: US Attorney’s Office – District of New Jersey.

And before that, a Feb. 2014 Star-Ledger article stated: Continue reading

Judge: Order to Decrypt Laptop Does Not Violate Fifth Amendment | PCMag.com

A Colorado judge this week ordered a woman to decrypt her laptop so that law enforcement officials could use the information against her in a pending fraud case.

“I find and conclude that the Fifth Amendment is not implicated by requiring production of the unencrypted contents of the Toshiba Satellite M305 laptop computer,” Judge Robert Blackburn wrote in his decision. […]  In the course of the investigation, the FBI executed search warrants on Fricosu’s home and seized her Toshiba Satellite M305 laptop, among other devices. Upon inspection, however, they discovered that the device was encrypted, barring the agents access to its contents.

Fricosu has refused to provide the password to her computer, asserting her privilege against self-incrimination under the Fifth Amendment.

In reaching his decision, Judge Blackburn referenced the case of Sebastien Boucher, who was arrested in December 2006 when he and his father tried to cross the Canadian border into Vermont. Border officials found child porn on his computer and confiscated the device, but when they tried to access it later, it was password-protected. By December 2007, a Vermont federal judge ruled that Boucher could not be forced to reveal his computer password and incriminate himself.

On appeal, however, a grand jury required Boucher to produce a decrypted version of his hard drive, not the password. With this workaround, constitutional rights are not violated, the jury found, because the contents of the device “are a foregone conclusion…”

via Judge: Order to Decrypt Laptop Does Not Violate Fifth Amendment | News & Opinion | PCMag.com.