Premium Essay

Sexual Predator

In:

Submitted By vikings00
Words 1031
Pages 5
Sexual Predator
The state of Indiana passed a law known as Zachary’s law. Zachary Snider was a ten year old who lived in Cloverdale, Indiana. He was molested and then murdered by a next door neighbor who was previously convicted of child molesting. Sexually oriented offenses are for many the worst in our society, and they need to carry with them heavy punishments
A sexual offender is a person who has been found guilty on a charge relating to a sexual offence. A sexual predator is a person who engages in sexually exploitative behavior, including such actions as stalking, grooming, voyeurism, or sexual harassment. Many of them have been known to premeditate and use deceptive techniques to get what they want.
A sexual offense consists of many different kinds of acts that fall within the State of Indiana Code 11-8-8. Under the Indiana Code if convicted of any of the following offenses rape, child molesting, child exploitation, incest, sexual battery, sexually violent predators, sexual predators, an individual is seen as a sex offender, and in the state of Indiana these acts are listed as felonies. Chapter 4 of the Indiana Code (IC 35-42-4-3) defines child molestation as performing or submitting to sexual intercourse or deviant sexual behavior with a person 14 years of age or younger. Under Indiana Law Child Molesting is considered a Class A felony.
There also is no statute of limitations in Indiana for a Class a felony. This crime can be punishable for up to 20 years. “That means that any act of child molestation that involves a significantly older person, weapons or threats, serious injury, or drugging a child (without their knowledge) can always be prosecuted in Indiana” (Alexander, 2013, par.4). Sex offenders are known to repeat their offense after getting out of prison.

Sexual Predator
The community and Law Enforcement is one of the biggest ways

Similar Documents

Free Essay

Sexual Predators in Florida

...has sexual offenses codified into law and felony under the Sexual Predator Act. Some offenses under the Florida Sexual Predator Act may attract the death sentence, life in prison or fines. However, a judge may exercise discretion based on circumstances of a case when sentencing a sexual offender. However, some provisions of the Florida Sexual Predator Act are harsher than necessary. As discussed in this essay, very harsh sexual predator laws inhibit ability of sexual predators to reintegrate in the society. Thus, considerate sexual predator laws are highly encouraged. Sexual Predator Prosecution in Florida The state of Florida has statutes that define predatory conduct. Thus, the Florida Sexual Predators Act defines offenses and legal circumstances that can qualify an offender as a sexual predator. However, not all sexual offenses are designated as predatory under Florida law. What Types of Crimes are codified into Law, Misdemeanor or Felony? The criminal justice process must rely on elaborate laws that define unlawful conduct (Wright, 2013, p.4). Thus, the Florida Sexual Predators Act codifies several sexual offenses into law and felony. There are three main ways to determine if a sex offender is a predator. Generally, Florida law designates any repeat sexual offender as a predator. As per “one is enough” sexual predator offenses, a person who commits a qualifying sexual offense on or after October 1st, 1993 and gets convicted can be designated as a sexual predator by a...

Words: 1184 - Pages: 5

Premium Essay

Should Sex Offenders Be Committed By Sexual Predators?

...Sexual predators are people who have committed sex crime. In the United States, there are more than 400,000 registered sexual predators. There are many ways in which sexual offenders could be punished for their actions. For one, Law makers should pass on a law stating that sex offenders have to notify others by writing it on their social media accounts, that they have committed a sex crime. Secondly, sexual predators should be chemically casturated to help prevent urges. Lastly, if you are aware of a sexual predator in your community you should not be afraid to inform others because they might not be aware. Their statements should indicate the crime committed, if this is their first offense, if not how many, and the court’s decision upon the crime. Offenders must also state their physical characteristics and residential address. Indicating their...

Words: 456 - Pages: 2

Free Essay

Investigatory Project

...Margaret A. (1999). Sexual Offender Treatment Efficacy Revisited. Sexual Abuse: A Journal of Research and Treatment, 11 (2), 2, 101-116. Alexander Jr., Rudolph. (1993). The Civil Commitment of Sex Offenders in Light of Foucha v Louisiana. Criminal Justice and Behavior, 20 (4), 371-387. Annon, Jack S. (1996). Treatment Programs for Sex Offenders. American Journal of Forensic Psychology, 14 (2), 49-54. Cheit, Ross E. & Goldscmidt, Erica B. (1997). Symposium: The Treatment of Sex Offenders: Child Molesters in the Criminal Justice System: A Comprehensive Case-Flow Analysis of the Rhode Island Docket (1985-1993). New England Journal on Criminal and Civil Confinement, 23, 267. Colorado Department of Corrections. �State Sex Offender Treatment Programs: 50 � State Survey.� Online. August 2000. Available http://www.doc.state.co.us/admin_reg/PDFs/SO-report-send2.pdf Edwards, William & Hensley, Christopher. (2001). Restructuring Sex Offender Sentencing: A Therapeutic Jurisprudence Approach to the Criminal Justice Process. International Journal of Offender Therapy and Comparative Criminology, 45 (6), 646-662. Geer, Tracey M., Becker, Judith V., Gray, Steven R. & Krauss, Daniel. (2001). Predictors of Treatment Completion in a Correctional Sex Offender Treatment Program. International Journal of Offender Therapy and Comparative Criminology, 45 (3), 302-313. Hanson, R. K. (2002). Recidivism and Age Follow-Up Data From 4,673 Sexual Offenders. Journal...

Words: 498 - Pages: 2

Premium Essay

Lionfish Research Paper

...Throughout the oceans, there are many animals that prove to be superior to most, but none as powerful as the lionfish. SInce it's in oceans it's not supposed to be in, the lionfish (a.k.a zebrafish) has become a fierce predator to many smaller species. This is because of it's extensive survivability tactics, reproductive cycle, and the regions that it is located The lionfish (also known as Pterois volitans and Pterois miles depending on the type of fish) is one of the most threatening species on earth, eating almost anything around it if it fits in their stomach. The classifications for him goes as follows: Kingdom: Animalia Phylum: Chordata Subphylum: Vertebrata Class: Actinopterygii Order: Scorpaeniformes Family: Scorpaenidae Genus: Species:...

Words: 560 - Pages: 3

Free Essay

Cyber Crime- Online Predators

...Running Head: Cyber Crime- Online Predators 1 Cyber Crime A Study of Online Predators Amber Ellis Ivy Tech Community College CRIM 101 David De La Cruz December 4, 2012 Running Head: Cyber Crime- Online Predators 2 I have chosen to my term paper on Cyber Crime. I chose this topic because I myself have been a victim of this malicious crime in the past. With knowledge I can warn others. Cybercrime can only be described as illegal activity committed on the Internet. I thought it would be good for me to make myself aware of all the research behind this topic so that I will not be a victim again. Cybercrime is a very serious offense and a lot of people do not even realize they have been a victim of it. Cybercrime is no laughing matter. Criminal activities in cyberspace are on the rise. (National Research Council, (NRC), 1991) Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spams, and software piracy and so on, which invade our privacy and offend our senses. The internet, along with its advantages, has also exposed us to security risks that come with connecting to a large network. Cybercrimes can basically be divided into three categories: Cybercrimes against persons, cybercrimes against...

Words: 2467 - Pages: 10

Free Essay

History of Digital Crimes and Digital Terrorism and Their Common Current Forms

...History of Digital Crimes and Digital Terrorism and Their Common Current Forms Stephanie Fisk Strayer Universality CIS 170 Professor CIANCIOTTA Dec. 12th, 2013 Introduction Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Net crime refers to criminal exploitation of the internet. Dr. Debarati Halder and Dr. K. Jaishankar (2011) defines cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as internet chat rooms, emails, notice boards, groups, and mobile phone. Such crimes may threaten a nation’s security and financial health. Problems surrounding these types of crimes have become high profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Activity crossing international borders and involving the interests of at least one nation state is sometimes referred to as cyber warfare. The international legal system is attempting...

Words: 2411 - Pages: 10

Premium Essay

Challenges Fighting Cybercrime

...T. Robinson Challenges Fighting Cybercrime CIS 170 Strayer University Dr. Wesley Phillips Putting together hundreds of individual computer networks has created a virtual space on which much of the world's business and communication now depends. Email, peer-to-peer data sharing, and wireless networks are examples of the technology that enables almost unlimited access to information. This access comes with significant risk. Criminals, terrorists, and foreign industrial competitors share this access to information as well. In the industrial age, we protected ourselves with high walls and deadly weapons. However, in the digital age, the availability and rapid development of cyber weapons requires layers of defenses and improved awareness of adversarial capabilities and intentions. There are a number of challenges that law enforcement has to deal with cyber-crime, one of the greatest challenge facing law enforcement agencies in investigating exploitation, cyber stalking, and obscenity is the power of anonymity. Anonymity gives the Perpetrator a sure advantage in that, without the target knowing, he could either around the corner, in another state, or even next door. The cyber stalker could be a former friend or lover, a total stranger met in a chat room, or someone playing a joke on an unsuspecting victim. (Pettinari, 2002). The anonymous use of public access points, for example Internet cafés, is a very serious issue, considering that a crime committed using those infrastructures...

Words: 796 - Pages: 4

Free Essay

Loss of Top Predators Is Humankind’s Most Pervasive Influence on Nature

...Loss of Top Predators is Humankind’s Most Pervasive Influence on Nature Thesis: For thousands of years, nature and humans have coexisted in equilibrium. As human population increases and expands, it cases severe effects in every ecosystem. Evidence of human growth and urbanization can be seen through the impacts on virtually every ecosystem in planet earth, marine and terrestrial. Effects of, such as species decline, endangerment and extinction of enormous proportions. In most cases, driving some species to the edge of extinction. Possibly no species are more affected than the world’s large top predators. These animals are extremely important to the overall health and function of an ecosystem, but conservation and restoration of them and their habitat is a remote thought on humans. The absence of predators in certain areas has led to an explosion of their natural prey, which leads to a damaging impact on their habitat. Ecosystems need to be healthy in order to maintain the health of all living things within and around them, including humans. It seems logical then to restore the natural balance by reintroducing the animal’s natural predator, conserving the population, and protecting the wild environment. Humans can no longer wait to address this growing environmental and ethical issue, and by establishing clear goals they can ensure the future of these species and ecosystems along with the continuing growth and success of their own. DOT: Sharks influence on the structure and...

Words: 2568 - Pages: 11

Premium Essay

Dog Property

...DOG PROPERTY. Diala Henry (Leader of the pack). Dog, man….and nothing in between. SIMPLE CARE TIPS Vol 1. How do you listen to your dog? Do you call all sounds your dog makes a bark? How do you rapport with your dog? Can you tell how happy or sad your dog really is? Do you see your dog as just an animal or as a company? Amazing!!! ..... you can actually listen and relate with your dog. You can be a very close friend to your dog and make a great company. You can be very happy with your and share awesome moments together. How smart is your Dog? How smart would you rate your dog to other animals? The famous saying…… “man’s best friend", compliments a dog for obeying commands, carrying out tasks, go out for a walk, protecting and guarding the house etc…. GUESS WHAT?!!! Dogs are not in the top 10 list of smartest/intelligent animals, as the "CHIMPANZEE" stands as 1st position and“RAT” stands at 10th position. So why do these top 10 animals don’t stand the chance to live with man as best companion or as a tool to enhance living standards? There are other smart animals apart from the top 10 listed animals but the outstanding quality that makes the dog stand out is the inborn loyalty in a dog trait. DOGS ARE LOYAL TO THE DEATH! Other animals lack loyalty and therefore knowledge cannot be impacted easily in them since they live free and do not see you as...

Words: 259 - Pages: 2

Free Essay

Luis

...PART III GRAPH THEORY 224 13 Food Webs Author: College. Robert A. McGuigan, Department of Mathematics, Westfield State Prerequisites: The prerequisites for this chapter are basic concepts of graph theory. See Sections 9.1 and 9.2 of Discrete Mathematics and Its Applications. Introduction A food web is a directed graph modeling the predator-prey relationship in an ecological community. We will use this directed graph to study the question of the minimum number of parameters needed to describe ecological competition. For this purpose we will consider how graphs can be represented as intersection graphs of families of sets. We will also investigate the axiomatic description of measures of status in food webs. Competition In an ecological system, the various species of plants and animals occupy niches defined by the availability of resources. The resources might be defined in terms of factors such as temperature, moisture, degree of acidity, amounts of nutrients, 225 226 Applications of Discrete Mathematics and so on. These factors are subject to constraints such as temperature lying in a certain range, pH lying within certain limits, etc. The combination of all these constraints for a species then defines a region in n-dimensional Euclidean space, where n is the number of factors. We can call this region the ecological niche of the species in question. For example, suppose we restrict ourselves to three factors, such as temperature...

Words: 4994 - Pages: 20

Free Essay

Ecology

...Part 1: The Producers Go to http://www.learner.org/courses/envsci/interactives/ecology/food_web.php Challenge Try to get two plants to happily co–exist. In any given ecosystem, most organisms will carve out a niche for themselves where they can obtain all of the necessities to survive. Often, different species within the ecosystem will compete for the resources that a niche provides. However, certain species live well together—symbiotically, parasitically, or by staying out of each other's way. For example, lichen and moss, often the primary colonizers of a new ecosystem, tend to live fairly harmoniously in each other's vicinity. Let's see what happens in this model. Step 1 Imagine the ecosystem is newly forming—the previous ecosystem has been destroyed by fire or flood—and the first colonizers of the successive ecosystem are, of course, producers. Given the two fictitious species of plants in the simulator, predict what will happen in this young system and record your prediction in the Data Table. Then run the simulator to 100 time steps and record the population numbers for both plants. Answer the following: 1. What assumptions does this model make about co-dominance as well as the general terrain of the ecosystem? 2. Do you find one producer to be dominant? Why might one producer be dominant over another? Step 2 Now you'll introduce an herbivore into the environment. In theory, an herbivore native to the ecosystem should feed primarily on the dominant species...

Words: 807 - Pages: 4

Free Essay

Assignment on Cyber Crime

...Title Content page no Introduction…………………………………………………….……………………………….1 What is cybercrime? ..........................................................................................................1 Types of cybercrime……………………………………………………………………………..2 Reasons of cybercrime……………………………………………………………..……………2-3 Offences of cybercrime under ICT Act-2006……………………………………………………3 Penalties of cybercrime under ICT Act-2006 ……………………………………………………4 Cyber Tribunal …………………………………………………………………………………...5 Cyber appellate Tribunal ………………………………………………………………………….5 Recent condition of cyber law in Bangladesh……………………………………………………..6 Recommendations……………………..………………………………………………………….6 Conclusion ………………………..………………………………………………………………7 Bibliography …………….………………………………………………………………………..8 Introduction Information and communications technology (ICT) is often used as an extended synonym for information technology (IT), but is a more specific term that stresses the role of unified communications and the integration of telecommunications (telephone lines and wireless signals), computers as well as necessary enterprise software, middleware, storage, and audio-visual systems, which enable users to access, store, transmit, and manipulate information. The phrase ICT had been used by academic researchers since the 1980s, but it became popular after it was used in a report to the UK government by Dennis Stevenson in 1997 and in the revised National Curriculum...

Words: 6414 - Pages: 26

Premium Essay

Why I Believe In Dogs

...These are some reasons on why I believe in dogs. Dogs make great friends and you can I believe in dogs always trust them. They are forgiving and will always love you. I believe we should treat dogs with same amount of respect that they give us. Dogs are trustworthy and loyal to there owners. Dogs have been known as mans best friend for a long time. Dogs are strong animals and will defend you in any situation. They can be trained to defend, and do amazing things. Sometimes when you feel all hope is lost you will have a dog by your side. To help you through any crisis. Dogs will never leave you and have unlimited love they make the best defenders amid guard animals....

Words: 312 - Pages: 2

Free Essay

Cyber Crime

...Title: Student: Professor: Course Title: Date: Topic: Information Law Cyber crime involves criminal activities conducted using the internet and both the computer together with the individual behind it are victims. The Australian Institute of Criminology (2011) finds cyber crime to include fraud, hacking, money laundering and theft, cyber stalking, cyber bullying, child sexual exploitation, child grooming and identity theft. The crimes mostly go unreported making it hard to quantify (Australian Institute of Criminology, 2011). However, the most common cyber crime incidents remain malware code and virus attacks that corrupt software. The Australian Cyber crime Act which was assented in 2001 and commenced on 2 April 2002 added new offences streamlined to check on those kinds of cyber crime that impair the security, integrity and reliability of computer data and electronic communications. They are; a) Unauthorized access, modification or impairment with intent to commit a serious offence, b) Unauthorized modification of data where the person is reckless as to whether the modification will impair data, c) Unauthorized impairment of electronic communications. There is a maximum penalty for these offences. Investigation powers relating to search and seizure of electronically stored data have been increased (Find Law Australia, 2012). Culprits of cybercrime can ignore the realms of Australian jurisdiction and launch an attack from anywhere in the world or even design attacks that seem...

Words: 1001 - Pages: 5

Free Essay

Cyber Crime

...What is Cyber Crime? The has been a remarkable increase in the use of technology in the past decades whether it is computers, mobile phones, iPods, iPads or computer games in both the personal and business sector. There has been significant change in all aspects of society, and new opportunities had risen in every field whether it is entertainment, business, sports, education, health, banking, telephones, air traffic control, electric power, and the stock exchange. The improvements in these industries are huge and now depend on information technology for their operation. This rapid increase and change in technology advance has confirmed that the twenty first century was the new information age. This extraordinary growth, as well as the increase in the capacity and accessibility of computers has brought about innovative changes within crime. Crime refers to breaking or violating the law or the command of an act which is forbidden by law. Countries across the world have different strategies practices when dealing with crime and this is contingent on the extent and nature of crime. According to Wikipidia.com the new type of crime known as cybercrime or computer crimes involves the use of network and a computer as either a tool or a targeted victim. Moreover, Joseph A E, (2006) explains cybercrime as crime committed on the internet using a computer as either a tool or a targeted victim. The computer is considered a target when the crime is intended directly to the computer. Cybercrime...

Words: 701 - Pages: 3