Premium Essay

Sex Offender Policy Paper

Submitted By
Words 748
Pages 3
I am Nicholas Bowen and a current junior at Hood College, in Frederick, MD. I will graduate in May 2019 with a Bachelor’s in Psychology, with a minor in Social Work. I was tasked with doing a policy analysis of title one the Adam Walsh act. The reason I chose this policy was because children are so innocent and need to be protected from horrendous crimes such as, sexual assault. While looking this policy, it was clear where it was lacking. I am writing you in hopes that you will take some of my constructive criticism to help improve this policy or create a new policy that will be able to protect the public from violent sex offender.
Sex crimes are an awful and affect a lot of Americans each year. The concept of having a database of all sex …show more content…
First the tier system does not account for individuals who take plea deals. For example, an offender could be in the process of being charge with a violent (tier III) offense, they could plea and take a lesser charge. This could cause them to be registered as a lower tier then the crime they committed. This would provide false information to the public and possibly prove to be dangerous. Also, a tier of someone’s sex offense alone does not prove how likely they are to commit another offense. A lot of external factors affect the chances of another offense such as child hood trauma and mental state. The Tier system could be improved by taking into account the offenders prior convictions when deciding what tier they will be labeled, if an individual has a history of violent crimes along with their offense than, I feel the tier III rating would be a better repsentation of a dangerous offender. I feel that if a plea deal is taken by an offender for a lesser crime than the registry should keep the original charge listed along with what they plead. This would allow for more accurate information for the public and would allow them better understand how dangerous the offenders are around

Similar Documents

Premium Essay

Criminal Justice

... The Correctional Client | | CRMJ 220-01MWF 10:00-10:50am | | | Alicia Marie | 2/27/2013 | | Abstract In this research paper I will talk about chapter 6. In chapter 6 of my correction process book it talks about the Criminal Client. In this research paper you will understand how the criminal justice system operates as a large selection process to determine who ends up in the corrections system. You will also describe some of the main similarities among and differences between the general population and people who end up under correctional authority. I will identify different types of offenders in the corrections system and the kinds of problems they pose for corrections. I will describe the classification process for people under correctional authority and know why it is important. And lastly you will understand the important problems and limitations in classifying people under correctional authority. The conclusion of the research paper will note how all of these things compare to reality today. Keywords: situational offender, career criminal, sex offender, drug abuser, alcohol abuser, mentally ill offender, deinstitutionalization, mentally handicapped offender, long term prisoner, and classification systems. Chapter 6 starts off telling me about a man name Michael G. Santos’s. He is a long term offender who was sentence to 45 years in federal prison because of cocaine trafficking when he was 24 years old. While he was incarcerated, he has obtained...

Words: 1849 - Pages: 8

Premium Essay

Independent Study Paper

...The Criminal Justice System: Offenders, Crimes, and Correction/Detention Cost Nateshia R. Bush Dr. Mary Parker Independent Study April 16, 2013 Introduction The criminal justice system today in America has many different sides, which come together to keep the overall peace of society. The criminal justice system deals with the different offenders, classifications for crime, and types of punishment for such crimes. The system is responsible for maintaining the constitutional rights and overall freedom of citizens, which some take for granted daily. It is a fact that crime exist for different purposes; however, it is more important to know laws are required to make certain societies function in a peaceful manner. When criminals break the law, other individuals are paid to make sure justice is served within the community. Paying these public servants comes at a cost to the community through tax dollars. Police officers, Judges, Lawyers, Court Clerks, Bailiffs, Correctional officers, Wardens, and more have jobs due to the existence of crime and these people work together to provide safety within our communities as well as retribution and treatment for different offenders and their individual needs. Crimes exist on a regular basis within our communities, which employs significant cost on the general public to cover the cost of maintaining inmates in correctional and local detention facilities. Crime has a broad range in occurrence, which ranges from simple traffic...

Words: 4262 - Pages: 18

Premium Essay

Is Tracking Sex Offenders Effective?

...monitoring released sex offenders have been a problem for many years. This research paper will give insight into the different approaches to tracking and monitoring sex offenders in the community from the local and national sex offender registry to GPS tracking. It also shows the perception of safety in a small scale community. Many laws are set into place to manage sex offenders after they are released from prison, but what is the effectiveness of programs set in place for the safety of victims and the community? Keywords: sex offenders, monitoring, tracking, registry, residency restrictions, safety   Table of Contents Table of Contents Introduction 4 United States Sex Offender Laws 4 Sex Offender Registration and Public Notification Laws 4 Megan's Law 4 Sex Offender Registration and Notification Act (SORNA) 5 Other Laws 5 Criticism of Registration and Notification Laws 6 Management of Sex Offender Laws 7 Sex Offenders Registration Requirements 7 Sex Offenders Castration 8 GPS Monitoring 8 Residency Restrictions 9 Effects of Registration and Notification 9 Perceptions of Effectiveness 10 Improvement Suggestions 11 Local Survey of Effectiveness 11 Findings of The Medical University of South Carolina 13 Conclusion 13 References 14   Is Tracking Sex Offenders Effective? Monitoring prosecuted sex offenders has been an...

Words: 3729 - Pages: 15

Premium Essay

Sex Crime Laws

...Introduction There are certain crimes today, which invoke a strong personal reaction. What is your first mental image and what emotion do you first notice when you hear the term, “sex offender?” Do you picture a scary looking male stranger? Is your first emotion, anger or maybe fear? Now, what is your initial reaction when someone says that the post-sentencing laws for these offenders may be doing more harm then good in regard to current legislation passed after high profile cases. Are sexual crimes all equally heinous, justifying opinions that the offender did the crime so they should accept the consequences? I believe that these laws were created with the best of intentions. Yet, these laws are now creating alternate paths to dangerous alternatives and roadblocks to the goals they seek to achieve. Legistation On October 22, 1989, an 11-year-old boy named Jacob Wetterling was abducted from a small town in Minnesota (Hawkins, 2009). Jacob and his two friends rode their bikes into town to a convenience store to rent movies (Hawkins, 2009). On the way back home, a gunman stepped out of the woods, and told Jacob’s two friends to run into the woods and not look back (Yoder, 2011). Jacob, who stayed behind, has never been seen since (Yoder, 2011). A massive manhunt ensued with law enforcement from all over, however their exhausting efforts never led them to finding Jacob or his abductor. This case captured headlines all over the United States and in 1994 it prompted legislation...

Words: 1864 - Pages: 8

Free Essay

Composition 1 Research

...and findings), that describe the minds of criminals and the procedures of the police sting operations, especially in the Pensacola area of Escambia County in Florida, USA — dubbed Operation Blue Shepherd, this research work expatiates the effects, consequences and possible aftereffects of this operations when these operations’ tactics cross the line to publicly and unjustly tag unintended victims of their online traps, sex offenders. This paper is also aimed at highlighting the different effects of verdicts of punishment on a culprit and on an innocent victim of poor investigations. This work proffers a solution in the form of suggestions to the cases of genuinely debatable arrests of entrapped individuals with obviously legal intentions as in the case of Army veteran Edwin Gennette. Operation Sting should not pressure their temptation tactics on unintended innocent victims, with the use of legal baits, in order to get them to err. Keywords: pressured temptation tactics, minds of criminals Intercepting, apprehending and revealing the identities of sex offenders to the general public is most welcomed when absolute fairness is thrown into the operation by recognizing in all sincerity, an individual’s initial and sole intent as he or she walks into the online traps set by the police on dating sites and not tempting an ‘un-premeditating’ online ‘legal fun seeker’ with the good fruit so he can be caught...

Words: 1416 - Pages: 6

Premium Essay

Public Safety

... May 28, 2012 Laws concerning public safety and the privacy of individuals contradict one another. A question arises from the situation in regard to whether public safety or individual privacy receives a higher priority based on situations that are individualistic. Although the Fourth Amendment provides protection for the citizens of the United States, there is room for occurrences of crime although the amendment reduces law enforcement’s efforts at crime reduction methods and access to evidence. During the last decade, the Supreme Court made rulings in regard to public safety, privacy, and sex offenders. This paper will debate and analyze two Supreme Court cases; People v. Cintron, and Connecticut Department of Public Safety v. Doe. This paper will also summarize the Supreme Court decisions along with the implications these cases have in regard to social police in the area of public safety. Changes to the approaches taken by law enforcement personnel in regard to individual rights and public safety have taken place because of rulings by the United States Supreme Court. Agencies have additional authority over the protection and application of civil rights, which in some instances bring into question if there is a violation of an individual’s Fourth Amendment rights. In the past, the shattering of privacy rights and changes made by recent Supreme Court rulings and law makers intrigue privacy...

Words: 1871 - Pages: 8

Premium Essay

Local Issues

...Local Issue Local Issue The contents of this paper are to provide an example of a local issue in that is impacting the correctional system. The local issue that this paper will examine is the prison realignment changes that are impacting Solano County. The first portion of this paper will provide a brief background of the local issue. The rest of the paper will address how this local issue is impacting the correctional system. Background In early 2011, Governor Jerry Brown signed the California realignment policy also known as AB 109 and 117, which is a solution to reduce overcrowding, costs, and recidivism in the prison system (Eberling, 2013). AB 109 and 117 focuses on keeping lower-level offenders and parole violators from being sent to the 33 prisons here in California. These policies were focused on reducing the number of lower-level prison inmates by 137 percent (Eberling, 2013). The prison have been over populated for far too long and the cost of cycling lower-level inmates through the prisons instead of probation or local jails is costly. In late 2012, voters approved proposition 30 which created a constitutional amendment that protected the funding for the realignment policy and ensures counties are given the funding to implement programs to assist with recidivism, safety programs, and other programs to assist low-level inmates with successful reentry into the community. Although this bill was signed by Governor Brown in the beginning of 2011 it was implemented...

Words: 911 - Pages: 4

Free Essay

Employee Privacy Report

...Employee Privacy Report your name COM/285 March 28, 2011 University of Phoenix CERTIFICATE OF ORIGINALITY: I certify that the attached paper is my original work. I affirm that I have not submitted any portion of this paper for any previous course, and neither has anyone else. I confirm that I have cited all sources from which I used language, ideas, and information, whether quoted verbatim or paraphrased. Any assistance I received while producing this paper has been acknowledged in the Reference section. I have obtained written permission from the copyright holder for any trademarked material, logos, images from the Internet, or other sources. I further agree that my name typed on the line below is intended to have, and shall have, the same validity as my hand written signature. Students’ signature (name(s) typed here is equivalent to a signature): Your Name Here Employee Privacy Report The Texas Department of Criminal Justice (TDCJ) is a not-for-profit organization comprised of nine non-salaried members who are appointed by the Governor of Texas for staggered six year terms known as the Texas Board of Criminal Justice. The board is charged with governing the TDCJ, implementing policies which guide operations. There are different divisions of TDCJ and amongst those divisions is the Correctional Institutions Division of which I am employed and am tasked with the confinement and supervision of convicted felons...

Words: 1081 - Pages: 5

Premium Essay

Kerr

...legal decrees with different geneses. Some of the laws therein were passed by the American parliamentary body while others came to be as a result of the establishment by elected representatives in the different American states. In addition to these two sources of laws and constitutional interpretation, there are others that are also applied by judges. These include the natural law, the implications of alternate interpretations, as well as the text and structure of the American Constitution. As will be indicated in this paper, the manner by which the US Constitution is interpreted has undergone transformation over the years. This is a normal occurrence since public policies are always being altered, modified, changed or completely abandoned for fresh ones perceived to be more practical. The system, whereby the lawyers can interpret the various laws in a manner that will serve to help them win cases, has oftentimes been referred to as a ‘necessary evil.’ This paper will investigate this system with the objective of revealing the challenges and/or benefits of such a framework. It will also focus on any necessary transformations that need to be conducted on the...

Words: 1473 - Pages: 6

Premium Essay

Categories of Computer Crime

...Categories of Computer Crime Shanice A Gilliard Prof. Carl Brown CIS 170 January 27, 2014 There are four types of computer crimes. The purpose of this paper is to explain each type and provide an example. During the course of this paper, I will also decide which type of crime in my opinion represents the greatest overall threat and give ways the government along with law enforcement agencies can attempt to counteract these crimes. Types of Crimes The four types of computer crime are as follows: (1) the computer as a target, (2) the computer as an instrument of the crime, (3) the computer as incidental to crime, and (4) crimes associated with prevalence of computers. As technology changes every day, you can always expect many more new offenders, offenses, and victims to appear simply based on the quality of knowledge someone possesses and also by the quality of the technology they are able to access. The better the quality the more extensive the damage will be. Being able to distinguish between these different categories is another thing that may seem difficult. Examples of Crimes The first type of computer crime is using the computer as a target. This is defined as a basic denial towards the owner of the system or by altering the data on the network itself. Altering the data or denying access to the system or network can be harmful to as business because it can prevent them from offering products or services to clients or it can also prevent the client access to their...

Words: 1015 - Pages: 5

Free Essay

Sex Offender Registries and Community Notification Laws

...Sex Offender Registries and Community Notification Laws: An Ethical Dilemma by Amy Thorson NW 62-OM OM 4803 - Organizational Ethics John Brown University June 2009 Situation Definition Introduction of the Facts Sex offenders in American society are often seen as repulsive, violent individuals that deserve to be feared and punished to the fullest extent of the law. Their crimes are deemed the worst kind of violation of another human being. In fact, “the vehemence of the hatred for sex offenders is unmatched by attitudes to any other offenders” (Logan, 1999). Many state and federal laws have been passed in an effort to protect the public from these predatory sex offenders. The laws are aimed specifically at registering sex offenders, documenting sex crimes, and disseminating this information to the general public. The Jacob Wetterling Crimes Against Children and Sexually Violent Offender Registration Act of 1994 requires that all states create registries for individuals convicted of sex crimes against children or any other sexually violent offense (Scholle, 2000). In 1996, President Bill Clinton signed Megan’s Law, which allows each state the discretion to establish criteria for registry disclosure, “but compels them to make private and personal information on registered sex offenders available to the public” (Klaas, 2008). Because many states depend on the federal government for funding of law enforcement programs, non-compliance with these requirements...

Words: 4613 - Pages: 19

Premium Essay

Paper 1

... Unit 2 In this paper I’m going to describe how society’s response to crime impacts public policy, sentencing, practices, and correctional operations. Also an overview of the evolution of society’s views on crime and punishment. Along with need for crime and punishment. Fallowed up by the shift in sentencing laws and impact (prisons, Get Tough On Crime, present day). Fallowed up an emphasis on punishment or rehabilitation currently. To start off First, what are some of society’s responses to crime? Some of responses are getting their voices heard through protesting, social networking threats, riots, boycotting, and even an act of terrorism. The society’s views on crime and punishment has evolved over a great period of time. (Siegel, 2014) In earlier years the law was based on religious beliefs and conservative ways of punishment, which consisted of the electric chair and hangings. This has changed over the years due to society and has took a more liberal views on the laws and claiming punishment. These views can be seen such as the accused proclaiming self-defense, proclaiming insanity, and the acceptance of advanced technology and science as a reference of evidence. So how does the public’s view on response to crime impacts public policy? The society’s outlook matters and it helps generate and design restrictions within the community and support public policy. (Siegel 2013) This is seen when society keeps complaining about...

Words: 678 - Pages: 3

Premium Essay

Criminological Relationships Between Theory and Policy

...Criminological Relationships between Theory and Policy American Intercontinental University Julie Hurden Abstract This paper will discuss three policies within the criminological field and the theories that might have influenced them. The three policies and two theories that will be discussed in this paper are the death penalty, three strikes laws and expunging of records, the classical school of criminology and the labeling theory. This paper will discuss rulings by the Supreme Court concerning the “Three Strikes and You’re Out” laws and the death penalty policies. It will review the Eighth Amendment and the Fourteenth Amendment of the Constitution of the United States. Criminological Relationships between Theory and Policy Three Strikes and You’re out Law (TSAYO) The Three Strikes Laws are basically laws that order increased sentences for repeat criminals, this increased sentence is given after three felony crimes have been committed by an offender. Most state and federal laws in the United States require harsher punishment for repeat offenders but they are not as severe as the “Three Strikes and You’re Out” (TSAYO) laws. TSAYO was passed into law to help protect society from persons that are dangerous and have exhibited a pattern of criminal behavior, to break it down this law simply takes repeat offenders out of the game by putting them in prison and hopefully deter others from committing...

Words: 2012 - Pages: 9

Free Essay

Pedophile

...* * Child Molestation and Homosexuality Ann Landers used to proclaim that the statement “Homosexuals are more inclined to molest children sexually than heterosexuals” is false.1 The American Psychological Association sponsored a work asserting: “Recognized researchers in the field on child abuse,… almost unanimously concur that homosexual people are actually less likely to approach children sexually.”2 Why is it, then, that we read about sex between boys and men in every newspaper? Does it merely reflect sensationalist journalism? We know that heterosexual molestation also occurs. But since there are so many more heterosexuals than homosexuals, which kind of child molestation — homosexual or heterosexual — is proportionately more common? The Scientific Evidence Three kinds of scientific evidence point to the proportion of homosexual molestation: 1) survey reports of molestation in the general population, 2) surveys of those caught and convicted of molestation, and 3) what homosexuals themselves have reported. These three lines of evidence suggest that the 1%-to-3% of adults who practice homosexuality3account for between a fifth and a third of all child molestation. Reports of Molestation by the General Population In 1983, a probability survey of the sexual experiences of 4,340 adults in five U.S. cities found that about 3% of men and 7% of women reported sexual involvement with a man before the age of 13 (i.e., 30% was homosexual).4 In 1983-84, a random survey...

Words: 23815 - Pages: 96

Free Essay

Evidence Based Paper

...Evidence Based Paper Jennifer Rabago University of Central Florida Introduction This paper includes an annotated bibliography whether there is a link between child sexual abuse and later sexual exploitation and reviews the literature on prevention strategies and effective interventions in child sexual abuse services. It shows that children are sexually exploited in other ways through the Internet. It focuses on Barnardo's response to the problem of sexual exploitation and sets it in both a historical and a contemporary context. It provides factors that influence police conceptualizations of girls involved in prostitution in six U.S. cities and if the children are sexual exploitation victims or delinquents. It explains that sexually exploited children are vulnerable to this type of abuse. It explains that sexual exploitation of children (CSEC) as one of the most destructive forms of child abuse. It explains the international sexual trafficking of women and children. It includes data on the amount of women and children that are being trafficked and experiencing sexual exploitation. It includes a dissertation that includes an empirical study and a quantitative study. This study is the first of its kind to describe a sample of commercially, sexually exploited children in foster care. Empirical Peer Reviewed Articles Barnitz, Laura. (2001). Effectively responding to the commercial sexual exploitation of children: A comprehensive approach to prevention...

Words: 3767 - Pages: 16