Paper Details  
 
   

Has Bibliography
10 Pages
2463 Words

 
   
   
    Filter Topics  
 
     
   
 

Computers and crime

upport groups on the Internet, child abuse is getting out of control. The misuse and abuse of the Internet by pedophiles has been receiving a modest amount lately and our law enforcement agencies are trying to combat this problem. Some of the methods that these law enforcement agencies are employing are as follows: logging on to the chat groups and follow what is going on, reading the newsgroups which support pedophiles to find out what is being delivered, supported, or messages that have been posted, to find out if there are any illegal activities being made. Some of these law enforcement agencies are employing the use of these chat groups to lure pedophiles into a false sense of security, to come and meet them "saying that they are about the same age". Pedophiles on the Internet are a very dangerous combination. They not only try and meet their next victim, but they also send pornography to other children and pedophiles. Even when they are caught, normally they just receive probation. That in itself does not help the situation. The probation officers are not that well up to date concerning the Internet, and computers with pedophiles. While on probation, who is there to monitor the actions of these pedophiles, as they go right back to doing the same thing as before? While on probation, these pedophiles go right back on the Internet, and start their stalking again. Some of these newsgroups that cater to the pedophile, have almost 150 to 200 postings to its bulletin board each month. There is no one to watch and monitor these newsgroups, as this is a costly expense to both the probation office and the law enforcement agencies. According to Sauls ((1993), when law enforcement agencies obtain an search warrant, they must be careful adhere to the established fourth amendment principles. When officials prepare warrants, they must also beware of the Privacy Act of 1980. Those that they are considering searching and seizures for ...

< Prev Page 4 of 10 Next >

    More on Computers and crime...

    Loading...
 
Copyright © 1999 - 2025 CollegeTermPapers.com. All Rights Reserved. DMCA