U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Controlling Computer Access to Pornography: Special Conditions for Sex Offenders

NCJ Number
156486
Journal
Federal Probation Volume: 59 Issue: 2 Dated: (June 1995) Pages: 43-48
Author(s)
L Davis; M D McShane; F P Williams III
Date Published
1995
Length
6 pages
Annotation
This article examines ways to find and manage child molesters who misuse computers to further their criminal activities.
Abstract
Sex offenders are one of the most controlled populations in the criminal justice system. Public demand often results in laws and agency mandates which require a higher level of supervision for this population. Persons of special interest to the criminal justice system are pedophiles (who fantasize about sexual activity with children) and child molesters (who actually commit the acts in some form). The authors discuss ways pedophiles use computer bulletin boards, programs such as Teen Talk, and other sources of electronic information to contact and, in some cases, set up meetings with, children and adolescents. Pedophiles and child molesters have access to the same computer networks as the rest of the population, networks that can provide erotic materials as well as potential contact with child victims. Careful investigation and classification techniques will help establish valid criteria for limiting computer access without unnecessarily infringing on clients' legitimate technological needs. The key to finding and managing child molesters who misuse computers is adequate training and awareness by criminal justice agencies. Many sex offenders will be placed on intensive supervision. Probation officers must be knowledgeable about computer misuse, access to potential areas of misuse, and computer-linked materials that may place a probationer in noncompliance with terms of probation. Through accurate documentation and the ability of law enforcement agencies to recognize the offender who uses a computer to further criminal activities, appropriate measures can be taken to prevent future abuse. Cases, references

Downloads

No download available

Availability