Sex Offenders Research Paper

Words: 622
Pages: 3

While reviewing state codes researchers have found that, “94% (n = 47) of states currently have some type of legislation governing the use of electronic monitoring. Of the 47 states legislating policies for using electronic monitoring technologies, 27 states (54%) have specific policies for monitoring sex offenders, with 19 of these states requiring electronic monitoring for sex offenders” (Button, DeMichele and Payne, 2009, 9).
Megan’s federal law was passed by congress in 1996. In 1997 there was a rape and murder of a 7-year-old New Jersey resident named Megan Kanka. The law amends the Jacob Wetterling Crimes Against Children and Sexually Violent Registration Act of 1994. Whenever a sex offender is released into a certain community, the
…show more content…
The killer, John Couey received a construction job near Jessica’s school regardless of his presence on the sexual offender registry. The Jessica Lunsford Act passed in Florida mandated, “Lengthy periods of probation or parole supervision for sex offenders, and requires various forms of electronic monitoring” (Button, DeMichele and Payne, 2009, 6). In November of 2006, the state of California passed Jessica’s Law on Proposition 83, “Which required registered sex offenders on parole to be monitored for life by GPS ankle bracelets and live 2,000 feet away from schools and parks, among other requirements” (Omori & Turner, 2015, 874). This law increases penalties on violent and habitual offenses conducted by sexual offenders and child …show more content…
RF signals are sent and received through anklets or bracelets which transmits signals to a landline telephone. When the offender transcends the scope of the transmitter, the information can be monitored through the available telephone connection. There is not much information that is signaled the whereabouts of an offender’s day. GPS on the other hand, “Utilize 24 satellites orbiting the Earth to transmit the precise time and approximate position of the GPS receiver worn by an offender” (Button, DeMichele and Payne, 2009, 3). One must consider the major differences between monitoring technologies, “Active systems monitor continuously by transmitting data via a wireless network (such as cellular telephones) or landline telephone in the case of RF, whereas passive systems store data that is later downloaded and reviewed (usually) within 24 hr” (Button, DeMichele and Payne, 2009,