Child Predators

Improved Essays
The advent of the Internet in the 1990s and the subsequent advances in communications technology has provided a new way for people to access millions of pages of information and a new, quick, and efficient means to communicate with each other. The use of this modern technology has changed the way society communicates, shares information, and how merchants market their products and how consumers purchase those products. However, these advances have also made it easier for people to commit crimes, particularly those against minor children, and have made it difficult for law enforcement and other criminal justice system agencies to investigate and prosecute these crimes. Criminals have become well-versed in a variety of methods used to commit …show more content…
Before the technological boom and widespread use of computing devices that brought the widespread access to the Internet, child predators generally relied on searching and finding their victims in locations where children typically gathered in public places, such as parks, playgrounds, and shopping malls (OVC, 2001). As the availability of the Internet increased, so did the viable options for predators to target children. These online services have become the preferred method for child predators to use because of the easy access they provide to their target population and the relative safety and anonymity offenders believe they have by committing their crimes behind a monitor and out of public view (Orthman & Hess, 2013). This virtual world, known as cyberspace, has become the new park, playground, and shopping mall for child predators. The list of online applications that predators use to gain access to their victims with is extensive. A few of the most popular ones are Facebook, Myspace, Twitter, Instagram Snapchat, and Vine and these social media applications are generally available for free on a variety of computer and smartphone platforms, many of which are accessible by children and …show more content…
Once a vulnerable victim is identified, the predator will typically target and establish rapport with a potential victim, then the predator will spend time cultivating a relationship with the victim to further gain their trust. Once they gain the child's trust, it becomes easier for the offender to convince them to engage in the exchange of pornography or engage in encounters of a sexual nature. Unfortunately for both the victim and the perpetrator, a false sense of security and secrecy exists when using these online

Related Documents

  • Superior Essays

    The internet is a rapidly expanding technology and is a global phenomenon utilizing a medium for sharing forms of digital communication. Underground classes of criminals leverage cyber technology in furtherance of their criminal goals while investigators attempt to parry by detecting and apprehending these criminals – this through a constant state of leveraging existing techniques or creating new ones. Developing investigative techniques requires experience and the ability to evolve – a reactive learning curve following behind the wake of a technocratic society. In United States v. Anthony V. Mangione, the defendant, Mangione, was sentenced to 70 months in prison after pleading guilty to one count of transportation of child pornography.…

    • 1462 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Abby Bailey Mrs. Duffy PAP English 9- 2nd Period 12 May 2017 Technology’s Strong Hold on Our Youth In the dystopian novel of Fahrenheit 451 by Ray Bradbury, Guy Montag - pain stricken- discloses the idea that “‘We need to be really bothered once in awhile.’”…

    • 1346 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Because of how easy it is to fake an identity online, there is immense potential for harm. Even though connecting with people is a must, you never know who you are connecting with. Child predators and paedophiles have the freedom online to fake their identities and lure people into harmful situations. The internet and how people use it make being safe online nearly impossible. People are able to pursue immoral ideas such as trapping children, luring unsuspecting people, and scamming millions of dollars.…

    • 1172 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    This research will focus on the theories of digital crime and how they cause criminals to commit their crimes. Choice theory is the notation that people always have some type of choice about how to behave, It is also based on the presumption that all behavior represents the single persistent strive to satisfy that person 's basic needs. Choice theory teaches that outside events that makes a person not do. It is the central aspect of its beliefs that are internally and not externally motivatives (William Glasser). Learning theory is a conceptual substructure describing how information is absorbed, processed, and retained during learning Even though Some people think theory has nothing to do with criminals who commits there illegal acts, because…

    • 1126 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Spyware On Children

    • 1290 Words
    • 6 Pages

    In the essay, “The Undercover Parent” by Harlen Coben disagrees and points out that kids will gamble online and chat to pedos. In his essay he writes, “But when it comes to chatting with pedophiles or watching beheadings or gambling away their entire life savings,” (Coben 1). While there is a minimum amount of truth to this argument I strongly disagree because kids aren’t going to be into gambling money they worked hard for they most likely will spend it on junk food, and with pedophile encounters, kids aren’t as naive as before and if a predator was on Snapchat it would be very hard due to the person needs to send live pictures instead of from a picture screenshotted from the internet then sent. Mostly all kids who use social media will know red flags when texting someone. Kids nowadays are very techie and most of the kids know how to turn off their location or falsify their location.…

    • 1290 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Children can access almost anything with these advanced objects, and in today’s society that is a scary thing. Within minutes a teenager can access pornograpgic images on their phone from anywhere they want, including school. The amount of violence and inappropriate content that is on social media is increasing every year and is desensitizing the general public through sources such as, but are not limited to, movies, social media, and video games. Through these sources killing and sexual activity is a common day phenomenon that lots of adults and kids experience.…

    • 914 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In the article “Sexting Cyber children: Gender, Sexuality, and Childhood in Social Media and Law” Joe Rollins argues that the advancements in technology when used in harmful ways is drawing media attention and causing potential dangers to children and young adults. Rollins incorporates law, culture, and policy and how society needs to adapt in order to prevent the legal system of condemning young adults as criminals, in these cases he says “scholarly analysis of this new, technology mediated trend must take into account not only legal developments, but also the cultural changes in dominant conceptions of gender, sexuality, and childhood” (Rollins 58). This essay analyzes the sources Joe Rollins uses and the Page Real Estate of the court cases, how the cases relate to the audience of gender studies,…

    • 696 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The working group was tasked with preparing a report identifying which laws were sufficient in investigating and prosecuting crimes conducted via the Internet. Moreover, emphasis was placed on the sale of weapons, illegal narcotics, pharmaceuticals, prescription drugs, fraud, and child pornography. Additionally, the working group was to investigate which new technologies, capabilities, and legal authorities were required to investigate and prosecute those individuals and groups that commit crimes using the Internet. Furthermore, the working group was to identify new and existing tools that could be used to educate, empower parents, teachers, to include public and private sector users to prevent or minimize risk posed by unlawful use of the Internet.…

    • 664 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Thousand Oaks: Sage Publications, pp.466 - 471. In the book, J. Miller discusses the idea of criminology in the twenty-first century, since the arrival of computers in the 1970’s and with the further introduction of the web in the early 1990’s there was increased use of these technologies by criminals as a means of committing cybercrimes awhile masking their identity’s.…

    • 400 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Modern slavery Human and sex trafficking is the second largest crime in the world behind the selling of illegal drugs; with anywhere from 14,500 to 17,500 people being trafficked in the United States, and 600,000 to 800,000 all over the world (11 facts). Many of the victims being kids ranging in ages from 12 to 14. One of the ways that people are tricked into becoming a trafficking victim are through “friends” that they meet online and want to meet up. Seeing how popular social media sites are in today 's society shutting them down is not an option. A solution to help better protect people while online is to teach society what the do’s and dont’s while on any social media as well as what could be a threat.…

    • 974 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    This cataclysm could have been prevented if the officials had kept a closer eye on the activity on the internet. Many teens and children use social media as a way to meet new people and expand their social circle. This makes it easier for sexual predators, mostly which are older men and women, to find their next victim. The most common first encounter between victim and sex offender is through an online chat room at 76% (Raising Awareness).…

    • 1000 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    To combat the issue of juvenile sex offenders from a social control perspective, there must be a focus on prevention instead of rehabilitation or punishment. From a family perspective, there is a major focus on economics. Of all the working single mothers in the United States, eighty-seven percent make minimum wage, meaning they are most likely working full time to support their families. This leaves more time for children of single parents to be unsupervised. This supervision is crucial to combatting juvenile sex offenses when referring back to the fact that the majority of offenses occur at either the victim’s or perpetrator’s home.…

    • 832 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Who's The Predator

    • 364 Words
    • 2 Pages

    The sexual predators in the article were able to find young girls they thought they could take advantage of by using the internet…

    • 364 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The Internet, sites such as Facebook, chat sites, and adult sites are an easy way for a predator to talk to children. The predator may see a group of teens hanging out at…

    • 729 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The chances of seeing a child under the age of 13 with a smartphone are becoming higher everyday, children as young as 8 even have smartphones! The dangers of the internet are very apparent and children are easily succumbing to these risks. Social media is around for communication amongst those who know how to do it correctly. Today, more than half of children under the age of 13 use social media apps. While parents are allowing their children to use social media without supervision, they should not be permitted to.…

    • 1548 Words
    • 7 Pages
    Improved Essays