U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Rethinking Computer Management of Sex Offenders Under Community Supervision

NCJ Number
197264
Journal
Journal of Offender Monitoring Volume: 15 Issue: 2 Dated: Summer/Fall 2002 Pages: 11-14,29,30
Author(s)
Jim Tanner Ph.D.
Date Published
2002
Length
6 pages
Annotation
This article presents the problems inherent in monitoring the computer usage of sexual offenders and proposes a new approach to the management of sex offenders’ computer and Internet use.
Abstract
The author begins this article by outlining the obstacles present when attempting to control and monitor the computer and Internet use of convicted sexual offenders. Controlling computer use is important because there are an estimated 18 to 25 million pages containing sexual content on the Internet. Additionally, there are millions of children who frequent the Internet who are potential victims of sexual predators. The author explains that traditional methods of computer forensics have become ineffective in controlling daily computer use. The author proposes that the management of sex offenders’ computer and Internet use be modeled after an approach developed for the 20th Judicial District in Colorado. This approach is based on five steps: (1) understand the reasons for computer management, (2) establish clear conditions for computer usage, (3) conduct an intake early in the supervision period, (4) install monitoring software on the computers of offenders, and (5) monitor the computer frequently. The author cautions that in any case in which a supervising officer suspects the offender has committed a new crime, evidence should be searched for and gathered by forensic specialists using the traditional methods. The proposal contained in this article is suggested only for monitoring and management of computer usage, not for the collection of evidence. The goal of the new approach is to reinforce treatment prohibitions against access to sexually explicit materials and to reduce community risk by increasing the offenders’ perception of containment. The article goes on to outline how the monitoring program should be implemented. Suggestions include such tactics as examining the computers of offenders early in the intake process and monitoring the computers for both images and text that are sexually related. Next, after the computers have been cleaned of inappropriate materials, monitoring software should be installed for the purposes of tracking Internet usage. In conclusion, the author explains that the traditional forensic methods for monitoring computer and Internet usage are no longer effective when faced with such a high degree of computer use. Thus, employing new techniques that involve setting clear limits and employing the use of monitoring software is the most appropriate means of containing the inappropriate computer use of sexual offenders.

Downloads

No download available

Availability