Error Operations Should Be Used To Lure Pedophiles

Improved Essays
Q1.
Criminal bait such as internet entrapment for catching child molesters might raise questions on ethics, but it can save lives and lessen the harm of possible number of children and their families.

Sting operations should be used to lure pedophiles. From a utilitarian perspective, "a social policy is morally permissible if the consequences that result from it produce the greatest amount of good for the greatest number of persons affected by the policy."(p 53) In our case, maybe some of the people will get disturbed, by the fact that when they chat online they might be monitored, violating their privacy. On the other hand, when we focus on the result from doing these operations, we might save a lot of lives and happiness of some children. By Jeremy Bentham' theory, the "social utility" from the result of doing sting operations can be measured by happiness. When the operation puts a pedophile in jail, the families with children in the society will be more relief, therefore producing more happiness. Majority of the society have children, so we can safely say that the operation produce the greatest amount of good for the greatest number of
…show more content…
Error, Abuse, Privacy. Error is referring to the increase of rates of error when the criteria of acceptable match is expanded. Abuse is referring to the use of biometrics can be abused by authorizing more people to use it. At last, privacy violation is obvious, because it takes information from individuals without consent. For those who is in favor using biometrics, they argue that it provides better security overall. By comparing in favor and against biometrics, we can see who favor biometrics focuses on the overall safety of a society, and who is against biometrics favour individual rights and freedom. We can conclude who favor biometrics favors more toward collectivism, and who against biometrics favors more toward

Related Documents

  • Improved Essays

    There has been a debate over photo identification when it comes to voting in the United States. In You Decide, we go over two individual’s point of view, Hans von Spakovsky and Shelia Jackson Lee. Spakovsky believes it protects the integrity of elections, while Lee believes it suppresses voter turnout. Hans von Spakovsky immediately defines his argument on photo identification by bullet pointing his reasons for supporting photo IDs, for example, he says it prevents “voting under fictitious voter registrations” and “double voting by individuals registered in more than one state or locality.” (Rourke, pg. 96)…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    With the growing age of technology, it is becoming easier and easier for minors to fall victim to criminals attempting to exploit their vulnerability. The use of the internet has become a go to resource for child predators across the nation. In United States Federal Courts, the argument has been presented that the sentences in relation to §2G2.2 of the Federal Sentencing Guidelines Manual which outlines the trafficking in material involving the sexual exploitation of a minor (Federal Sentencing Guidelines Manual , 2011). The argument being is this section of the sentencing guidelines are congressionally directed rather than empirically being empirically based. When federal cases are tried, the length of imprisonment is determined by the United States Sentencing Commission sentencing table (Cite2).…

    • 1414 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    The publication of Amitai Etzioni’s essay, “Less Privacy Is Good for Us (and You)”, clearly dates itself in talking about the prospect of “using driver’s licenses to curb illegal immigration” (Etzioni), especially in lieu of recent…

    • 1280 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    The Bureau’s Innocence Lost National Initiative’s, Operation Cross Country, is a federal initiative carried out, in conjunction with, the National Center for Missing and Exploited children, to end the illegal trafficking of sexually exploited children. In its most recent undercover operation, 73 of the FBI’s local, state and federal child exploitation task forces including more than 500 law enforcement officers participated in a covert stings at hotels, casinos, truck stops and other locations known to be frequented by pimps and prostitutes in Atlanta, Denver, Knoxville, Alexandria, Jackson, Los Angels, Portland, Sacramento and Seattle. As a result of their efforts, 149 underage victims of prostitution were rescued and more that 150 pimps and other offenders were arrested. In an effort to assist the victims, the majority of whom were 15-17 year olds, there were 100 FBI victim specialists on-hand to provide them with crisis intervention, food, clothing, shelter and medical attention, if needed…

    • 412 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Computer technology progressed rapidly since the 1900’s. Computers are no longer scarcely around, many people have them and use them on a daily basis. They have also become an important source of evidence in criminal activities. Computers are very helpful for homicide investigators, because they can discover whether methods on how to murder were researched on the internet, if anything suspicious can be found in emails, or if threats were made towards the victim prior to the murder. Since children can easily get on the computer to use the internet, it gives sexual predators an opportunity to seek out child victims online.…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Why Privacy Matter Even If You Have “Nothing to Hide” In the article “Why Privacy Matter Even If You Have ‘Nothing to Hide,”’ Daniel J. Solove, talking about the government governed the information to analyze without the permission. Many people didn’t realize how many problems by let the government take their information to analyze. Solove does a great job to persuade the readers that we deserve more the privacy by using the appeal to authority and anecdote.…

    • 704 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Battling Child Exploitation with digital forensics is a well written article discussing the outrageous growth of child sex trafficking due to the growth of technology and the easy access to speedy communication around the world. The increase in this category of crimes is in a 1,000-percent increase since 2004. Along with that statistic, “The National Consumers League states 56 percent of children between the ages of eight and twelve have a cellphone, with the average age of receiving a first hone being 10-11.” Consequently, not even the growth of our technology fed world is the problem, but the age at which we are allowing technology consumption is as well a figure to be noted. Predators today use the internet, phones, apps, etc. to commit…

    • 839 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    America’s sex law “Should the names of sex offenders continue to be made public?” published by the Economist. This editorial from August 6, 2009, edition of the economist. At the beginning of the editorial the economist told a real life story which took place in New Jersey. Seven-year-old Megan Kanka was enticed into a pedophile neighbor home by offering to show her a puppy. The man raped, killed, and dumped her body in a nearby park.…

    • 1100 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Finally, the criminal justice should treat everyone equal despite their morality beliefs. Even though the crimes may look like they were committed for the greater good, it doesn 't stop from being a crime. Taking an innocent life will never be good. A good act should be helping people, not killing them. Killing people should never be counted as a “compassion” act, it should never have a lenient law.…

    • 906 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Who's The Predator

    • 364 Words
    • 2 Pages

    The tactics used in the video Did an FBI Sting Operation in Vegas Cross the Line? (CBS, 2014) and the article Who’s the Predator? (Rogers & Stone, n.d.) represent the future of catching criminals in two ways.…

    • 364 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    As a result of social networking and involuntarily giving out our personal data, we have mostly agreed and consented to our invasion of privacy. Throughout the essay,…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Pedophiles are a largely present danger to many children in society today. Many of the victims of child molestation and their parents had no idea they were a target. This problem is troubling, especially because most of these victims were targeted by someone they know. This uncertainty of knowing who will be victimized leads many, especially parents, to the question of who do pedophiles choose to attack and how do they gain the opportunity?…

    • 2021 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    “Possibly more than one million people are trafficked every year” (Curson 10). Human trafficking not only affects the victims, buy also the economy negatively through money laundering. There are also several ways to see if human trafficking is being committed. Many people do not know what human trafficking is and how to notice it, it not only affects the victims it affects people globally. To be able to spot it, you first have to know what it is.…

    • 705 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    A specific problem that faces that criminal justice system is child exploitation in the age of technology. Child exploitation is a crime that has existed for millennia, but since technology has developed, the crime has grown exponentially. Traditionally a predator would have to target a family member or someone in the community as their pool of targets was relatively limited. However, the advancement of technology has made it easier for predators to not only collect and share paraphernalia, but it has also created a new pool of potential victims. To begin with, the definition of child pornography must be understood so the extent of how technology can contribute to its production can be understood.…

    • 1553 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Are Parents Really Aware of What Internet Predators Are? As the internet and social media have made our lives easier, it has also become an easy way for child predators to get in touch with kids. Parents are aware that there are many predators on the internet, but are unaware of how cyber-predators look for kids ages from elementary school to high school. Predators can come in diverse forms and have different intentions than other predators.…

    • 1574 Words
    • 7 Pages
    Superior Essays