Developments and Trends in Sex Offender Management

1305 words (5 pages) Essay in Criminology

18/05/20 Criminology Reference this

Disclaimer: This work has been submitted by a student. This is not an example of the work produced by our Essay Writing Service. You can view samples of our professional work here.

Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of UK Essays.

In step with the law, a sex offender is a person who has been convicted of a sex-related crime, or of attempting to devote a sex-related crime. Additionally, known as a “sex abuser,” or “sexual perpetrator,” an individual convicted of a sex crime is, in most instances, required to register with the state’s sex offender registry, which screens and places limitations on their activities (Team, 2015).

Get Help With Your Essay

If you need assistance with writing your essay, our professional essay writing service is here to help!

Find out more

Any illegal act that includes unlawful, compelled, or coerced sexual behavior towards every other individual is considered a sex crime. At the same time as this definition takes many forms, crimes which are recognized to categories a culprit as a sex culprit encompass: sexual attack, rape, statutory rape, sexual abuse of a minor, corruption of a minor, incest, child pornography, prostitution (in a few instances), sex trafficking, transporting someone throughout jurisdictions with the rationale of conducting sexual activities, sodomy or bestiality (in a few jurisdictions), and genital mutilation (Team, 2015).

The improvement and refinement of specialized criminal supervision for sexual offenders has in massive element came about during the last 25 years. Specialized supervision frequently involves particularly educated probation and parole officers who manage a caseload of sexual offenders using sex-offender-unique supervision strategies that encompass unique situations of supervision, multidisciplinary collaboration with a treatment issuer and, if appropriate and permissible, using GPS monitoring and polygraph testing. Based to a 2008 survey of state officers, most states use some form of specialized supervision to control risk and offer services to sexual offenders inside the community; further, many states use sex-perpetrator-specific probation or parole caseloads (Daly, 2008).

The significance of multidisciplinary collaboration with supervision officials become also supported in a survey of treatment companies from forty-five states and the District of Columbia (N = a hundred ninety), in which 90 percent said their rapport with probation officers changed into splendid or precise, 24.2 percent stated probation officers attended weekly group periods and 87.4 percentage stated verbal exchange with probation officers was essential (McGrath, 2002).

Utilizing polygraph evaluation with sexual offenders is a somewhat more controversial management strategy than the others characterized up to this point. Three different kinds of polygraphs are used with sexual offenders: a specific-incident exam that makes a specialty of the sexual offense conviction or different unique offenses or behaviors, a sexual-history examination that explores the culprit’s history of sexual offending behavior and a renovation exam that evaluations the wrongdoer’s compliance with supervision and remedy situations. Research indicates that polygraph testing increases culprit disclosure throughout a couple of offending or conduct categories, inclusive of historical and modern offending and high-risk behavior. The empirical proof also shows that polygraph testing can help reduce sexual recidivism while used in conjunction with specialized supervision and treatment inside the containment technique. Polygraphs ought to be used as one component of an overall sex offender management strategy (Levenson, 2009).

Some other current trend in sex offender management and supervision has been using GPS to display sex offenders. GPS is an updated, greater technologically superior form of the electronic tracking techniques used with criminal offenders in the past. Those earlier versions of digital tracking have been a whole lot more passive in nature, and they usually involved the usage of a radio transmitter tool (worn by offenders) that alerted a home-based receiver and a remote monitoring station whenever the offender leaves their home. In a significant technological enhance, GPS gives real-time monitoring of and location facts for the culprit, and it also can notify authorities if a culprit enters a prohibited region, which includes an offender exclusion quarter or victim house. Monitoring by using GPS may be both active (viewing a culprit’s movement among places in actual time) or passive (statistics are stored and reviewed later, and notification is handiest achieved electronically based totally on limit parameters violated). Study findings indicated that criminal offenders placed on each passive digital tracking devices and GPS had substantially decrease degrees of revocation for a new criminal offense or for absconding than did offenders subject to home confinement without such tracking (Padgett, 2006).

Find out how UKEssays.com can help you!

Our academic experts are ready and waiting to assist with any writing project you may have. From simple essay plans, through to full dissertations, you can guarantee we have a service perfectly matched to your needs.

View our services

Tracking and normal inspection of computers used by probationers and parolees is an incredibly new practice and the first software program tools used for this motive had been brought much less than 10 years in the past. The courts have upheld selective monitoring of probationers’ laptop and net access based totally on “reasonableness” and the authorities’ “special need” to sell public protection, and during the last decade software tools have been introduced which can be designed especially for probation and parole corporations to monitor offenders’ computer and internet use. Agencies are integrating these tools into their sex perpetrator ongoing inspections of the way a perpetrator’s laptop is being used and, in a few cases, restriction how it may be used. According to Dr. Jim Tanner, a noted expert in sex offender supervision and forensics and computer management, a thorough forensic examination by law enforcement can take days while examinations carried out by means of supervising agencies the usage of laptop management gear can take best 10 to 45 mins relying on the sort of pc management software equipment used by the agency (Tanner, 2002)

Governor Scott signs Sex Offender Bill (HB 1301) into Law. This bill enhances registration necessities for sexual offenders and sexual predators. It shortens the time that a registrant is needed to check in a house (even transient) from five days to three days and it imposes a 6-month obligatory minimum network control sentence with GPS tracking for any technical registration violation. Gov. Rick Scott then goes on to say, “Today I am proud to sign this legislation for all the children who have been terribly affected, I hope these measures and the awareness that we are bringing today will make a difference for generations to come.” The bill signing coincides with the first day of both National Sexual Assault Awareness Month and National Child Abuse Prevention Month. The bill lets in for higher tracking of sex offenders/sexually violent predators via requiring them to offer increased records to law enforcement, which includes internet usernames, tag numbers for all vehicles and passports (FAC, 2018)

The purpose of sex offender control is to promote public protection by reducing the danger of recidivism amongst sexual offenders. Significant advancements had been made within the discipline of sex offender management in current years. These consist of a clearer know-how of the adults and juveniles who commit those offenses, of the interventions and strategies that have been tested through research to be effective and that appear to have exceptional potential in lowering risk, and of methods and tactics for engaging partners and equipping and assisting group of workers to manipulate these instances.

Cite This Work

To export a reference to this article please select a referencing style below:

Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.

Related Services

View all

DMCA / Removal Request

If you are the original writer of this essay and no longer wish to have the essay published on the UK Essays website then please:

Related Lectures

Study for free with our range of university lectures!