24/7 call for a free consultation 212-300-5196

AS SEEN ON

EXPERIENCEDTop Rated

YOU MAY HAVE SEEN TODD SPODEK ON THE NETFLIX SHOW
INVENTING ANNA

When you’re facing a federal issue, you need an attorney whose going to be available 24/7 to help you get the results and outcome you need. The value of working with the Spodek Law Group is that we treat each and every client like a member of our family.

Client Testimonials

5

THE BEST LAWYER ANYONE COULD ASK FOR.

The BEST LAWYER ANYONE COULD ASK FOR!!! Todd changed our lives! He’s not JUST a lawyer representing us for a case. Todd and his office have become Family. When we entered his office in August of 2022, we entered with such anxiety, uncertainty, and so much stress. Honestly we were very lost. My husband and I felt alone. How could a lawyer who didn’t know us, know our family, know our background represents us, When this could change our lives for the next 5-7years that my husband was facing in Federal jail. By the time our free consultation was over with Todd, we left his office at ease. All our questions were answered and we had a sense of relief.

schedule a consultation

Blog

My Teenager Used the Computer – FBI Seized Everything

December 14, 2025

My Teenager Used the Computer – FBI Seized Everything

The FBI is at your door with a search warrant. They’re talking about child pornography traced to your IP address. You didn’t do this. You’ve never looked at anything like that in your life. But as agents seize every computer, phone, and tablet in your home, a terrible thought occurs: your teenager has been using that computer. Could your child have done something? And if they did, why are YOU the one being investigated?

Welcome to Spodek Law Group. Our goal is to help you understand what happens when illegal activity is traced to a family computer – the attribution questions, the legal exposure for different family members, and the brutal reality that everyone in the household has there digital life examined regardless of who’s actualy responsible. Todd Spodek has represented parents in exactly this situation – watching there entire family’s privacy destroyed while trying to determine who faces legal consequences and for what.

Think about what just happened. The FBI traced an IP address to your home. That IP address is shared by every device on your network. Every family member. Every guest who’s ever connected to your WiFi. The warrant lets agents take everything. Your work laptop. Your spouse’s tablet. Your teenager’s gaming computer. Your young child’s school device. All of it goes to a forensic lab where analysts will examine every file, every search, every message. The investigation that started with one IP address ends with your entire family under a microscope.

Heres the Paradox Nobody Explains

Heres the uncomfortable truth about family computer investigations. When federal agents seize devices from a household, theyre not making assumptions about who’s guilty. Theyre collecting evidence. The question of WHO actualy downloaded or accessed illegal material is a question for later – after months of forensic analysis.

But during those months of analysis, your life is in ruins. Your name is associated with the investigation. Your neighbors saw FBI vehicles outside. Your employer may have been notified. And every family member – guilty or innocent – loses access to there devices, there files, there digital lives.

The paradox gets worse when teenagers are involved. Your teenager might be both victim and offender in the eyes of the law. If they were sexting with a peer – sending or receiving nude images of another minor – they may have created or possessed child pornography even if both participants were willing. The law dosent care that they were teenagers doing what teenagers do. It sees creation and possession of illegal material.

At Spodek Law Group, we help families navigate these impossible situations. Todd Spodek understands that the legal questions are complicated by family dynamics, parental responsibility, and the need to protect your child while also protecting yourself.

How Attribution Works in Shared Computer Cases

Heres the system revelation that determines wheather charges can stick. The government must prove KNOWING possession beyond reasonable doubt. Not just that files existed on a computer in your home. Not just that your IP address was logged. They must prove that YOU specifically – the person theyre charging – knew the material was there and had control over it.

For shared computers, this creates attribution problems. Defense attorneys call it “attribution evidence” – the forensic proof that ties illegal activity to a specific user. The key questions:

  • What user account was logged in when files were downloaded?
  • What was the timestamp of the activity?
  • Who was home at that time?
  • What other evidence connects a specific person to the activity?

If four people live in your household and all use the family computer, the government must prove which person was responsible. “Someone at this address” isnt good enough for conviction. “Someone in this family” isnt good enough. They need to prove it was a specific individual beyond reasonable doubt.

This is where forensic analysis becomes critical. Login records, browser history, email accounts accessed, metadata embedded in files – all of this can either connect or disconnect a specific person from the illegal activity. If the files were downloaded at 2pm on a Tuesday and you were at work, that fact matters. If they were accessed from your teenager’s user account, that matters too.

The Sexting Paradox That Destroys Families

Heres the uncomfortable truth about teenager cases that makes this situation even more complex. Your teenager might be both victim and perpetrator simultaneously. If they were engaged in consensual sexting with another teenager – exchanging nude images with a boyfriend or girlfriend – they may have created, possessed, and distributed child pornography even though both participants were willing minors.

The law dosent recognize teenage consent for these images. A 16-year-old who sends a nude selfie to a 16-year-old boyfriend has created child pornography. The boyfriend who recieves it possesses child pornography. If either of them forwards it to anyone, thats distribution. Two teenagers doing what teenagers do becomes a federal crime that can result in sex offender registration.

This paradox traps families in impossible situations. Your child is simultaneusly the victim whose exploitation the law claims to prevent AND the offender who faces prosecution. The same image makes them both. Prosecutors have discretion about wheather to charge, but the technical violation exists regardless of intent or consent.

At Spodek Law Group, we’ve seen families devastated by sexting investigations that started as teenage romance. Todd Spodek understands that these cases require sensitivity about the difference between predatory behavior and teenage decision-making – even when the law technicaly treats them the same.

The Federal Juvenile Delinquency Act Factor

Heres the hidden connection that affects how teenager cases are handled. The Federal Juvenile Delinquency Act generally requires that minors be prosecuted in state courts rather then federal courts. This means if your teenager is the one responsible for the activity, they typically face state prosecution – not federal.

But heres the irony that traps families. The DEVICES stay in federal hands regardless. The FBI keeps your computers, tablets, and phones for forensic analysis even if the actual offender is going to be prosecuted at the state level. Your devices – the ones you need for work, for life – are gone for months while federal agents examine everything.

And theres more. While the teenager may face state proceedings, the investigation into adult family members continues federally. The agents who seized your devices are still looking for evidence that an adult knew about or facilitated the activity. Did you know your teenager was accessing illegal material? Did you fail to supervise? Did you provide the computer or internet access that enabled the crime?

These questions keep the federal investigation alive even when the primary offender is a minor heading to state court. Your teenager’s mistake becomes a federal inquiry into your parenting, your knowledge, and your potential criminal liability.

What the FBI Actually Examines

Heres the consequence cascade that begins when devices are seized. Federal forensic analysts dont just look for child pornography. They look at EVERYTHING. And “everything” means exactly that.

What forensic analysis typically includes:

  • All files, including deleted files that can be recovered
  • Complete browser history across all users
  • All email accounts and messages
  • All text messages and chat logs
  • Social media accounts and communications
  • Financial records and account access
  • Location data and timestamps
  • Metadata showing when files were created, modified, accessed

This examination affects every family member, not just the suspected offender. Your spouse’s private emails. Your teenager’s social media. Your young child’s school communications. Everything on every device is fair game for review.

And the examination finds things. Maybe not child pornography from other family members. But maybe tax issues. Maybe communications that embarass. Maybe evidence of marital problems. Maybe your teenager’s drug conversations with friends. The FBI may not be looking for these things, but they see them. And what they see could lead to referrals for other investigations.

At Spodek Law Group, we prepare clients for this total invasion of privacy. Todd Spodek explains that even innocent family members will have there lives examined. Understanding whats coming helps families cope with the process.

When Your Teenager Confesses

Heres the inversion that surprises families. You might think your teenager confessing would end your nightmare. Your child admits they downloaded the material. Case closed, right? Not exactly.

Your teenager’s confession might help them – juvenile courts value acceptance of responsibility. But it dosent automaticaly help you. The devices are already seized. The forensic examination has already started. The investigators are still looking at whether any adult in the household knew, facilitated, or participated.

The confession also dosent get your devices back faster. The forensic timeline is the forensic timeline. Analysis takes 6-18 months regardless of who confesses. Your work laptop, your spouse’s tablet, your family photos stored on devices – all of it remains in federal custody while the examination proceeds.

And depending on what the examination finds, your teenager’s confession might actualy complicate things. If the forensic analysis shows adult involvement – even tangentially – the investigation expands rather then closes.

Protecting Yourself Without Destroying Your Child

Heres the impossible calculation every parent faces in this situation. Your defense might require showing the illegal activity came from your teenager’s account, your teenager’s user profile, your teenager’s usage times. Protecting yourself may mean pointing at your own child.

This creates devastating family dynamics. Your teenager already feels terrible about the situation. Now your defense strategy requires proving they were the one responsible. The parent-child relationship strains under the weight of competing legal interests.

At Spodek Law Group, we navigate these situations with sensitivity. The goal isnt to destroy your family while protecting yourself. The goal is to find the truth – and the truth may be that you genuinely had no knowledge of what your teenager was doing. That dosent make you a bad parent. That makes you a parent whose child made decisions without your knowledge.

Todd Spodek helps families understand that attribution evidence isnt about blame. Its about accuracy. If your teenager was responsible, the forensic evidence will show that. Your defense isnt “my child is a criminal” – its “I was not involved in this activity, and the evidence proves it.”

Cases Where Attribution Evidence Mattered

Heres the specific evidence that shared computer defenses actualy work. A ProPublica investigation found more then a dozen cases since 2011 that were dismissed due to attribution challenges – either becuase of problems with the software’s findings or the refusal by the government to share analysis programs with defense attorneys.

The pattern repeats across these cases. Multiple users on a shared computer. Forensic evidence that couldnt definitively connect a specific person to the illegal activity. Timestamps that created reasonable doubt about who was using the device. Defense experts who challenged the governments attribution claims.

In one case, a father faced charges after child pornography was found on the family computer. Forensic examination revealed the activity occured during hours when only his teenager had access to the device. The father’s work records showed he was consistently at the office during download times. The attribution evidence cleared him completly – though not before his reputation was destroyed by the investigation itself.

The lesson from these cases: shared computer creates genuine reasonable doubt, but proving it requires forensic expertise. Simply claiming someone else used the computer isnt enough. You need forensic evidence that demonstrates the activity pattern – timestamps, user accounts, browsing history – matches someone else’s usage, not yours.

At Spodek Law Group, we connect families with forensic experts who specialize in attribution analysis. Todd Spodek understands that winning these cases requires technical evidence, not just legal arguments. The forensic reality determines wheather attribution can be proven – and wheather you face charges or walk free.

The Timeline You’re Facing

Heres the specific numbers that define your nightmare. From device seizure to forensic completion typically takes 6-18 months. During that time:

  • You have no access to seized devices
  • Work computers are gone – you may need to explain to employer
  • Family photos, documents, memories – all inaccessible
  • The investigation continues without updates
  • You live in limbo waiting to learn if charges are coming

For parents, this timeline is excruciating. You’re trying to parent a teenager through a crisis while your own legal situation remains unresolved. You’re trying to maintain family normalcy while every device is gone. You’re trying to work without your computer. You’re trying to function while neighbors whisper about the FBI raid.

If charges are filed, add another 12-24 months for the federal court process. If your teenager faces state proceedings, add that timeline too. From the moment of the raid to full resolution could be 2-4 years.

What Defense Attorneys Look For In Your Case

Heres the system revelation about building a defense when teenager involvement is suspected. The key isnt proving your teenager did it – thats there problem, not yours. The key is proving YOU specificaly were not involved, did not know, and did not facilitate.

Attribution evidence that helps your defense:

  • User account data showing activity on teenager’s profile, not yours
  • Timestamps showing activity when you were at work or otherwise documented elsewhere
  • Browser history patterns that dont match your usage
  • Email accounts accessed that arnt yours
  • File organization patterns inconsistent with your computer habits
  • Search history that reflects teenager interests, not adult interests

Heres the hidden connection most families miss. Your alibi might be your work schedule. If illegal downloads happened between 3pm and 6pm on weekdays – when your teenager was home from school but you were still at work – that timeline matters enormously. Work records, badge swipes, email timestamps from your office account – all of this can show you physicaly werent using the computer during the relevant activity.

The forensic examination cuts both ways. It might show evidence against your teenager. It might also show evidence that clears you completly. Understanding what the examination looks for helps you gather supporting evidence while you wait for results.

At Spodek Law Group, we work with forensic experts who know exactly what to look for in these cases. Todd Spodek coordinates defense strategy across multiple family members – ensuring your defense dosent inadvertently hurt your teenager’s case while protecting your own interests.

What To Do Right Now

If FBI has seized your family’s devices and you suspect your teenager may have been involved, heres exactly what you should do:

Do NOT talk to investigators without an attorney. Anything you say can be used against you. Your instinct to explain, to help, to clarify – suppress it until you have legal counsel.

Get seperate attorneys for parent and child. Your interests may conflict. Your teenager needs a lawyer focused on there defense. You need a lawyer focused on yours. The same attorney cannot effectively represent both.

Document what you remember. Who used which devices? What were typical usage patterns? When was your teenager typically on the computer? This information helps forensic analysis later.

Dont assume the worst – or the best. Maybe your teenager did something terrible. Maybe they accessed legal adult content that got flagged incorrectly. Maybe someone else entirely used your network. Wait for forensic evidence before drawing conclusions.

Call Spodek Law Group at 212-300-5196. The consultation is free and completly confidential. Todd Spodek can evaluate your specific situation, explain what the investigation likely involves, and help you understand your exposure versus your teenager’s exposure.

The family computer that was supposed to help with homework is now evidence in a federal investigation. Every family member’s digital life is being examined. Your teenager may have made a terrible mistake – or may be completely innocent of what agents suspect. Either way, you need representation that understands both the legal complexity and the family dynamics involved.

The FBI dosent care about your family relationships. They care about evidence. Your job is to ensure that evidence is evaluated accurately – that guilty parties face appropriate consequences and innocent family members arnt destroyed by proximity to an investigation. That requires experienced federal defense counsel who understands attribution, forensics, and the intersection of federal and state juvenile proceedings.

Your teenager used your computer. Now the FBI has everything. The question is what happens next – and the answer depends heavily on the defense strategy you implement right now.

The family that sticks together through this process – with seperate attorneys protecting each members interests – has the best chance of emerging with relationships intact. The family that turns on itself, blaming and accusing, destroys itself before any verdict is reached. Your teenager made a mistake. How you respond to that mistake determines wheather your family survives it.

Lawyers You Can Trust

Todd Spodek

Founding Partner

view profile

RALPH P. FRANCO, JR

Associate

view profile

JEREMY FEIGENBAUM

Associate Attorney

view profile

ELIZABETH GARVEY

Associate

view profile

CLAIRE BANKS

Associate

view profile

RAJESH BARUA

Of-Counsel

view profile

CHAD LEWIN

Of-Counsel

view profile

Criminal Defense Lawyers Trusted By the Media

schedule a consultation
Schedule Your Consultation Now