UTAH CRIMINAL DEFENSE ATTORNEY
FORMER PROSECUTOR & LAW PROFESSOR
Possession of CSAM Charges in Utah
What a Possession of CSAM Charge Can Mean in Real Life
A possession of CSAM charge in Utah is one of the most serious types of criminal allegations a person can face. These cases are often emotionally overwhelming from the start. They can involve search warrants, device seizures, aggressive questioning, and immediate concern about prison exposure, reputation, employment, family relationships, and the long term consequences of being tied to an accusation involving digital files.
In Utah, these allegations are commonly charged under the broader offense of sexual exploitation of a minor. Even when a person believes they did not intentionally save, organize, or distribute anything, investigators may still claim that images, videos, cached files, downloads, screenshots, or stored material on a phone, tablet, computer, cloud account, or external drive amount to criminal possession. That is one reason these cases require careful, early review.
People researching this issue are often doing so under extreme stress. Sometimes the person searching is the person under investigation. In other situations, it is a spouse, parent, sibling, or friend trying to understand what may happen next. That is true for people here in Utah and for families searching from outside the state who are trying to help someone facing a criminal investigation in northern Utah. Andrew McAdams is a former prosecutor and criminal defense attorney with more than twenty years of legal experience, and cases like this usually require immediate, disciplined attention to both the facts and the digital evidence.
How Utah Law Approaches Possession of CSAM Allegations
Utah prosecutors typically charge possession based allegations under Utah Code § 76-5b-201 (Sexual Exploitation of a Minor). In plain terms, that statute covers knowingly possessing, viewing, or accessing with the intent to view child sexual abuse material. The prosecution will usually focus on whether the state can prove knowledge, control, and intent, rather than simply whether files were found somewhere on a device.
That distinction matters. Digital evidence is rarely as simple as people assume. A file can be downloaded automatically, stored in a temporary folder, embedded in an app cache, synced from another device, saved through a browser process, or placed on a device by another person with access. In some cases, the real legal dispute is not whether a file existed, but whether the accused knowingly possessed it or even knew it was there.
These cases can also involve questions about how many files are alleged, whether the state claims there were separate acts of possession, whether multiple devices are involved, and whether investigators are attempting to expand the case into more serious allegations such as distribution, enticement, or aggravated offenses. What begins as a search of one device can quickly become a broader review of accounts, messages, cloud storage, internet history, peer to peer activity, and statements made during an interview.
Because of that, an effective defense usually begins with slowing the process down and separating accusation from proof. Investigators and prosecutors may describe the case in very certain terms early on, but the actual evidence often requires far more careful analysis than the initial narrative suggests.
How Possession of CSAM Cases Often Begin
These cases arise in a number of different ways. Sometimes law enforcement receives information from a technology company, internet service provider, social media platform, or cloud based service that reported suspected material. In other situations, a case begins after a domestic dispute, a breakup, a family conflict, or a separate police contact that leads to a device search.
Some investigations begin with peer to peer network monitoring. Others come from cyber tips, account flags, repair technicians, school related reports, probation searches, or information obtained during another investigation. A person may not even realize an investigation has begun until officers show up with a search warrant and seize phones, computers, hard drives, gaming systems, or removable media.
There are also cases where the real issue is device access. A shared laptop, a family desktop, a borrowed phone, a synced tablet, or a cloud account accessed by more than one person can create factual disputes that matter a great deal. In some homes, several people use the same network, passwords are shared, and older devices have been passed around for years. Those details can become central when the state tries to prove who actually controlled the material.
Another common feature in these cases is the interview. Investigators often try to question the accused before the defense has had a chance to review the warrant, understand the forensic process, or evaluate what law enforcement actually found. Those interviews can shape the case in major ways. People who are shocked, embarrassed, sleep deprived, or trying to explain something technical without preparation can make statements that prosecutors later treat as admissions.
Why Digital Evidence Must Be Examined Carefully
Possession cases often rise or fall on digital forensics. That does not mean the state’s version of the digital evidence is automatically correct. It means the defense has to understand exactly where the alleged material was found, how it got there, when it was accessed, whether it was actually opened, what user profile was involved, and whether the forensic conclusions are stronger in language than they are in science.
For example, a forensic report may refer to downloads, thumbnails, cache storage, browser artifacts, deleted material, or access logs. Those categories are not interchangeable. A thumbnail is not the same thing as an intentionally saved file. A cached image is not always proof of knowing possession. A file name alone may not prove actual knowledge of content. Material found in unallocated space may raise different issues than material stored in an active folder. Cloud syncing and automatic backup functions can create additional layers of complexity.
Time stamps also matter. So do operating system updates, remote access possibilities, app based behavior, and whether the device was examined with validated methods. In some cases, the real defense work begins after the state produces the forensic image, extraction report, warrant materials, and chain of custody documentation.
This is also where disciplined criminal defense matters. A lawyer handling a possession of CSAM case should not simply react to the charge label. The lawyer needs to understand how the search was conducted, how the evidence was preserved, what the forensic report actually says, and what it does not say.
Possible Defense Approaches in a Possession of CSAM Case
Every case is different, and no responsible attorney should promise a particular outcome at the outset. Still, there are recurring defense themes in these cases.
One issue is knowledge. The state generally must prove that the accused knowingly possessed, viewed, or accessed the material with the required intent. If the evidence shows the files may have been automatically stored, misidentified, transferred without awareness, or connected to someone else’s activity, that can matter significantly.
Another issue is control. Prosecutors often want the court or jury to assume that if a file was on a device, the device owner is criminally responsible. That assumption is not always justified. Shared devices, shared networks, remote access, multiple users, and account syncing can all complicate the state’s theory.
A third issue is the search itself. Search warrants in digital cases can be broad, technical, and vulnerable to challenge if they were based on weak affidavits, stale information, overbroad requests, or improper execution. A careful review may identify suppression issues tied to the warrant, seizure, or forensic examination.
Statements are another major area. If law enforcement questioned the accused without proper safeguards, used coercive methods, or created ambiguity in the interview, that may open the door to motions practice or at least a more favorable interpretation of what was said.
There are also cases where the charge level, file count, or narrative overstates what the evidence supports. Sometimes early intervention can affect how the case is screened, filed, negotiated, or defended. Sometimes the key task is preventing a possession allegation from being expanded into something worse without adequate proof.
Why Early Legal Guidance Can Make a Major Difference
Timing matters in these cases. Once devices are seized, the state begins building a narrative immediately. Investigators may sort files, label content, interpret user behavior, and prepare reports long before the defense has a full opportunity to respond. Early legal guidance can help preserve rights, limit avoidable damage, and position the case for a more effective defense.
That early work may include stopping further questioning, obtaining and reviewing search warrant materials, identifying potential forensic issues, preserving account information, documenting who had access to the device, and preparing for bail, screening, or filing decisions. In some situations, strategic early communication can also prevent the case from being made worse by panic driven decisions.
These are not cases where people benefit from guessing, explaining things casually to investigators, or assuming they can sort it out later. Andrew McAdams is a former prosecutor and criminal defense attorney with more than twenty years of legal experience, and early case handling often shapes the entire direction of a serious felony matter. In a case involving digital evidence and allegations this severe, the first steps can matter as much as anything that happens later in court.
Northern Utah Representation for Possession of CSAM Cases
McAdams Law PLLC represents clients facing serious criminal investigations throughout northern Utah, including possession of CSAM allegations involving search warrants, device seizures, and felony screening decisions. The practice regularly handles cases across the region in both justice courts and district courts, including matters that begin locally but involve families searching from outside Utah. Salt Lake, Davis, Weber, Utah, Summit, Box Elder, Cache, and Tooele counties are all part of that northern Utah focus.
Salt Lake and Summit Counties
Representation in Salt Lake and Summit counties often involves cases investigated by city police, county agencies, internet crimes units, or statewide task forces, with court proceedings centered in busy and high volume criminal calendars. This includes Salt Lake City, West Valley City, Sandy, Murray, South Jordan, Draper, Millcreek, Holladay, Park City, and surrounding communities in Salt Lake and Summit counties.
Davis and Weber Counties
Cases in Davis and Weber counties often require quick action when warrants are served, devices are seized, or investigators attempt early interviews before the defense can assess the evidence. McAdams Law PLLC represents clients in Bountiful, North Salt Lake, Farmington, Layton, Clearfield, Ogden, Roy, South Ogden, Riverdale, and nearby communities in Davis and Weber counties.
Utah County
Utah County cases can move quickly from investigation to formal filing, especially where digital evidence is being reviewed by specialized units or prosecutors trained in internet related offenses. The practice serves clients in Provo, Orem, Lehi, American Fork, Pleasant Grove, Spanish Fork, Saratoga Springs, and other communities throughout Utah County.
Box Elder and Cache Counties
In Box Elder and Cache counties, families are often dealing with a combination of local law enforcement involvement and broader digital evidence issues that may reach beyond a single city or device. McAdams Law PLLC represents clients in Logan, North Logan, Smithfield, Brigham City, Tremonton, Perry, and surrounding communities in Box Elder and Cache counties.
Tooele County
Tooele County cases can involve local investigations with serious long term consequences, especially when a search of one device leads to a broader review of accounts, messages, and stored data. The practice serves clients in Tooele, Grantsville, Stansbury Park, Wendover, and nearby communities throughout Tooele County.
Frequently Asked Questions
What is possession of CSAM charged as in Utah?
In Utah, possession based allegations are commonly charged under Utah Code § 76-5b-201, the sexual exploitation of a minor statute. The exact filing details can depend on the alleged conduct, the number of files, and whether the state claims there was viewing, access, or something more serious than possession.
Can I be charged if I did not intentionally download anything?
Possibly, but the lack of intentional downloading may still be a very important defense issue. In digital cases, the state still has to prove knowledge and intent, and automatic downloads, cached files, syncing, or shared device access can all matter.
What if more than one person used the device?
That can be highly relevant. Shared computers, shared passwords, family devices, and multiple user accounts may create real doubt about who accessed or controlled particular material. Those facts should be investigated early and carefully documented.
Will the police take all of my electronics?
They often seize multiple devices during a search, not just the device they believe is directly connected to the investigation. Phones, laptops, desktops, hard drives, tablets, and storage media may all be taken while law enforcement reviews the evidence.
Should I talk to investigators if they say they just want my side of the story?
In most situations, it is dangerous to do so without counsel. These interviews are often designed to lock in statements before the defense has seen the warrant, reviewed the digital evidence, or understood what investigators are claiming they found.
Can cached images or deleted files still lead to charges?
Yes, they can lead to charges, but that does not end the analysis. The defense still needs to examine where the material was found, how it was stored, whether it was actually accessed, and whether the state can truly prove knowing possession or intentional viewing.
Does a possession of CSAM case always involve prison exposure?
These cases are treated extremely seriously and can carry major felony consequences, including potential prison exposure and other life changing penalties. The exact risk depends on the charge, criminal history, alleged file count, and how the evidence develops.
Can a search warrant be challenged in a digital evidence case?
Yes. Search warrants, affidavits, and forensic searches can sometimes be challenged if they are overbroad, based on weak information, stale, or improperly executed. A careful review of the warrant materials is often a critical early step.
What should family members do if they are searching for help for a loved one?
They should gather basic information, avoid discussing facts casually with law enforcement, and help the person get legal counsel quickly. Families are often the first people trying to make sense of what happened, especially when they are searching from another state for someone in Utah.
Next Steps
If you are reading about possession of CSAM charges, there is a good chance you are already dealing with fear, uncertainty, and a lot of unanswered questions. You do not need to have every fact sorted out before reaching out. In many cases, people contact a lawyer while they are still trying to understand what was seized, what law enforcement is alleging, or whether formal charges have even been filed.
A calm, informed review of the case can help you understand where things stand and what should happen next. That may mean looking at the warrant, discussing whether an interview has occurred, identifying digital evidence issues, or simply helping you avoid mistakes in the early stage of the case.
Speak With McAdams Law PLLC
If you or someone you care about is facing a possession of CSAM investigation or charge in Utah, contact McAdams Law PLLC to discuss the situation confidentially. Serious digital evidence cases require prompt attention, careful analysis, and a defense strategy built around the actual facts rather than assumptions.
Call (801) 449-1247 or click here to schedule a confidential consultation.
