Exposing Sex Offenders and Their Use of Internet Communications

Only available on StudyMode
  • Download(s) : 16
  • Published : May 7, 2012
Open Document
Text Preview
Exposing Sex Offenders and
Their Use of Internet Communications
Name:
Class:
Professor:
Date:

Table of Contents
MLA Cover Sheet …………………………………………………………………….……1
Abstract ….…………………………………………………………………………………3
What Is Cyber-stalking? …………………………………………………………………..4
Protecting Against Cyber-stalking ………………………………………………………..5
Profile of a Sex Offender …………………………………………………………………..5
Characteristics ………………………………………………………………………. 5
Age Range ……………………………………………………………………….…..6
Marital Status ……………………………………………………………………….. 6
Categories of Sex Offenders …………………………………………………………….....7
Collectors ……………………………………………………………………………7
Travelers …………………………………………………………………………….7
Chatters ……………………………………………………………………………...7
Manufacturers ……………………………………………………………………….8
Targeted Victims of Sex Offenders ……………………………………………………….8
Co-Workers …………………………………………………………………………8
Ex-Significant Others ……………………………………………………………….9
Children …………………………………………………………………………….. 10
Reducing the Chances of Becoming a Victim ………………………………………….... 10
State and Federal Laws and Statues ……………………………………………………... 11
Megan’s Law ……………………………………………………………………….. 11
Adam Walsh Child Protection and Safety Act ……………………………………... 12 Jacob Wetterling Crimes Against Children and Sexually Violent Offender
Registration Act …………………………………………………………………….. 12 Jessica’s Law……………………………………………………………………….... 13 Protection of Children from Sexual Predators Act ………………………………….. 13 Campus Sex Crimes Prevention Act ………………………………………………… 13 Prosecutorial Remedies and other Tools to end the Exploitation of ……………....... 13 Children Today (PROTECT) Act …………………………………………………… 13

Keeping the Internet Devoid of Predators (KIDS) Act ……………………………… 13 Sentencing the Offender …………………………………………………………………… 13
Offender’s Violation of Rights ……………………………………………………………..13
Work’s Cited Page ………………………………………………………………………….16

Abstract
This paper delves into information derived from a number of publications pertaining to internet sex offenders and the capabilities they are given with the use of internet communication. The fact remains that this is a continuously growing problem in America and that changes need to be made to decrease the number of occurrences. The psychological makeup of sex offenders is irregular and very inhumane. Their concern for the welfare and feelings of others they hurt are dull, and often times can be contributed to exposure to sexual abuse within their early childhood. Since this problem has become more formally addressed, there have been many strides taken by legislation and laws have been enforced protecting both the rights of those accused and those that are victimized. Sexual offenders are categorized into one of four groups based on intentions and approaching techniques. Often, predators are said to work in very peculiar and mysterious ways. Some of their primary targets may include: significant others, children and co-workers. There have always been existing laws regarding public identification of sex offenders in an effort to increase awareness and prevent others from victims. The story of Adam Walsh and his father who strived for the conviction of his son’s killer, is just one example found in this paper that provides evidence that there are some victories involved in fight against sex offender on the internet. Nonetheless, we must take all precautions to prevent ourselves, children and other family members from becoming primary targets. In this paper, we will discuss the overall picture of : cyber-stalking, categories of sex offenders, laws implemented pertaining to sex offenses, and everyday security measures to protect ourselves from becoming another internet predator statistic.

Exposing Sex Offenders and
Their Use of Internet Communications
While the internet is a great resource tool, providing a limitless vault of information for researchers, the information...
tracking img