Battling Child Exploitation Analysis

Improved Essays
Battling Child Exploitation with digital forensics is a well written article discussing the outrageous growth of child sex trafficking due to the growth of technology and the easy access to speedy communication around the world. The increase in this category of crimes is in a 1,000-percent increase since 2004. Along with that statistic, “The National Consumers League states 56 percent of children between the ages of eight and twelve have a cellphone, with the average age of receiving a first hone being 10-11.” Consequently, not even the growth of our technology fed world is the problem, but the age at which we are allowing technology consumption is as well a figure to be noted.
Predators today use the internet, phones, apps, etc. to commit
…show more content…
These tools that are new and slowly being introduced to the field can extract information from mobile devices as well as properly decodes critical app data. Some countries such as Brazil have suspended apps that don’t abide by child exploitation laws. Some more advanced tools allow for the creation of watch list that make up key words, phrases, file types, names, and other identifiers hat can be highlighted and brought to attention if triggered on the device. All these new features can really make a difference as long as they are in the right hands such as law enforcement and forensic technology …show more content…
It asks, “should congress place a greater emphasis on digital forensics within applicable grant programs?” I think the clear answer is yes. As you wake up each morning and the date on your calendar changes so does the world including technology, the economy, people’s views, etc. It’s the twenty-first century and within a matter of time it takes for you to blink the twenty-first century as well as what we know about the world will be long gone because people are learning, growing, and reshaping their views of the world each day and you must move with them. We can’t necessarily keep up with the growth of technology every day, but we can fund the need to educate people on the use of this equipment whether at undergraduate level or graduate as well as fund the law enforcement departments so that they can have the right equipment to perform their job accurately and with better results. With such a large growth of exploitation to our future generation I don’t feel we have any other option than to fund for a safe and better future for

Related Documents

  • Superior Essays

    The internet is a rapidly expanding technology and is a global phenomenon utilizing a medium for sharing forms of digital communication. Underground classes of criminals leverage cyber technology in furtherance of their criminal goals while investigators attempt to parry by detecting and apprehending these criminals – this through a constant state of leveraging existing techniques or creating new ones. Developing investigative techniques requires experience and the ability to evolve – a reactive learning curve following behind the wake of a technocratic society. In United States v. Anthony V. Mangione, the defendant, Mangione, was sentenced to 70 months in prison after pleading guilty to one count of transportation of child pornography.…

    • 1462 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    With the growing age of technology, it is becoming easier and easier for minors to fall victim to criminals attempting to exploit their vulnerability. The use of the internet has become a go to resource for child predators across the nation. In United States Federal Courts, the argument has been presented that the sentences in relation to §2G2.2 of the Federal Sentencing Guidelines Manual which outlines the trafficking in material involving the sexual exploitation of a minor (Federal Sentencing Guidelines Manual , 2011). The argument being is this section of the sentencing guidelines are congressionally directed rather than empirically being empirically based. When federal cases are tried, the length of imprisonment is determined by the United States Sentencing Commission sentencing table (Cite2).…

    • 1414 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Since 1998, internet crime involving the sexual exploitation has risen by more than 400%. Four. hundred. Percent! Not only that, but the there has also been a significant increase in downloading, possessing and distributing child pornography online. So much so, that it is now estimated to be a $20 billion industry worldwide.…

    • 810 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Child maltreatment has been a concern for years. It has always been a questions as in what to do for the child involved and how to handle the situation. Child maltreatment varies based on a court jurisdiction on what they feel is child maltreatment. Child maltreatment is and can be physical, sexual, or emotional abuse, in addition to neglect (NIJ 2011). Whereas neglect is specified as in a failure in the parent responsibility to provide for a child 's development when in a financial position to do so (NIJ 2011).…

    • 933 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Within the Department of social services there are many policies, codes, and laws that must be followed when working with clients. These policies ensure that there is reason for all things that social workers do and that the clients are safe. One important code that the child protective service workers within the agency use is Virginia Code 63.2-100 which gives that the definitions of abuse and neglect as well as the different types. This code is used often throughout the agency when there founded abuse of a child. This code begins by stating that said abuse must be done by the child’s parent or the person responsible for the child’s care.…

    • 753 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    The subsections focus on child sexual exploitation, computer forensics, cyber crimes, and information technology and…

    • 208 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Police officers have needed the information on electronic devices. They need this data for finding missing citizens and suspects. But have been stopped in their tracks countless times. They have been stopped by the owners and others that believe the 4th Amendment enables them to decline the seizing and search of their devices. They want officers to have a warrant.…

    • 424 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In the article “Sexting Cyber children: Gender, Sexuality, and Childhood in Social Media and Law” Joe Rollins argues that the advancements in technology when used in harmful ways is drawing media attention and causing potential dangers to children and young adults. Rollins incorporates law, culture, and policy and how society needs to adapt in order to prevent the legal system of condemning young adults as criminals, in these cases he says “scholarly analysis of this new, technology mediated trend must take into account not only legal developments, but also the cultural changes in dominant conceptions of gender, sexuality, and childhood” (Rollins 58). This essay analyzes the sources Joe Rollins uses and the Page Real Estate of the court cases, how the cases relate to the audience of gender studies,…

    • 696 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Another reason why technology is so important to us on a daily level is because of our local government. Our local government needs to keep files and records on file for their local citizens and for other government matters. Local governments are able to fight cyber crime with technology the local police much like the NSA are able to track cyber crime further more as technology has increased its practicalities so have the cyber threats “we have seen more than a quarter of a million different ransomware variants over the past year, with as many as 60,000 new variants in a single day”…

    • 913 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Essay On Dna Evidence

    • 1449 Words
    • 6 Pages

    The implementation of DNA evidence can not only establish the facts of an offense and identify the offender; it may even lead to a conviction. In the law enforcement, DNA has been introduce as a revolutionary and efficient accurate tool to solve and crack modern and cold cases. When properly documented, collected, and stored, biological evidence can be analyzed to produce a reliable DNA profile years, even decades, after it is collected. Furthermore, DNA has brought justice to those who have been brutally victimized of rape and sexual abuse by atrocious conniving sex predators. Just as evidence collected from a crime that occurred yesterday can be analyzed for DNA, today evidence from an old rape kit, bloody shirt, or stained bedclothes may…

    • 1449 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    We might detest how technology can track our daily lives in ways that might be deemed as unethical to many of us. Yet, when it comes to the greater good technology does definitely aid. Looking back into history, the development of a variety of technological devices have improved our security. CCTV footage helps immensely with surveillance; it helps identify individuals, deter robbery and produce a safe environment for society. In addition, digital footprints while collected without our consent inevitably helps locate and single out individuals that have malicious intentions.…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    THE TRAFFICKING CHILDREN IN SOCIAL NETWORKS The child trafficking is the illegal commerce of humans with the purpose of labor, mental, reproductive slavery, sexual exploitation, forced labor, organ extraction or any modern form of slavery against the will and the welfare of the human. But, this is not a secret, every one of us has social networks, and we don't know anything about our friends and followers that we have. Traffickers have taken advantage of us and they know how to come near our kids. The Interior Ministry estimates that the most common trafficking victims in Colombia are: the city of Bogota, the department of Amazonas, Magdalena and Meta.…

    • 565 Words
    • 3 Pages
    Decent Essays
  • Superior Essays

    Acts that occur behind closed doors in our community can be shocking to many, but they occur every day and night in our own neighborhoods. Human trafficking is the manufacturing of children for the sex trade a form of modern day slavery where people profit from the control and exploitation of others. Commercial sexual exploitation and sex trafficking of minors are often-overlooked forms of child abuse a serious problems in the United States with long-term adverse consequences for children and society as a whole. Minors who are prostituted or sexually exploited in other ways should be treated as victims rather than arrested and prosecuted as criminals.…

    • 1739 Words
    • 7 Pages
    Superior Essays
  • Superior Essays

    Sex trafficking is the second largest criminal enterprise in the world, falling close behind illegal drugs and arms trafficking. In spite of currently being second, many believe is will soon be the largest, and is currently is a $7 to $10 billion industry (McClain & Garrity, 2010, p. 244).. This is due to this differences in contraband. Contraband in sex trafficking is the humans, more specifically in this situation, the children, which can be sold and resold to be used over and over again, and even being the most profitable (Jordan, Patel, & Rapp, 2013, p.356). This provides a much easier job for those running DMST because they have a reusable “product” unlike those involved in illicit drugs and arms…

    • 1316 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    As we have learned, there are many instances in which investigating authorities will collect information that not related to the case. “With the advent of computer forensic tools, it is also simple to search and locate specific data sets, such as emails, credit card numbers, passport numbers, telephone numbers, identity card numbers, photographs, videos etc.” (Law,…

    • 1554 Words
    • 7 Pages
    Great Essays