Recall the case of Internet entrapment involving pedophiles that we described in Section 7.7.1. Which arguments can
Fantastic news! We've Found the answer you've been seeking!
Question:
Recall the case of Internet entrapment involving pedophiles that we described in Section 7.7.1. Which arguments can be made in favor of entrapment and "sting operations" on the Internet? From a utilitarian perspective, entrapment might seem like a good thing because it may achieve desirable consequences. Should sting operations be used to lure pedophiles? Justify your position by appealing to one or more of the ethical theories.
Transcribed Image Text:
7.7.1 Entrapment and Sting Operation to Catch Internet Pedophiles Police and federal agents have used "sting" operations and entrapment techniques to catch members of organized crime involved in drug dealing, gambling, pornography, and so forth. Consider a controversial case of entrapment involving cxbertechnology that was intended to lure and catch a pedophile who used the Internet to solicit sex with an under- aged person. c SCENARIO 7-3: Entrapment on the Internet Using an alias or pseudoname, detective James McLaughlin of Keene, New Hampshire posed as a young boy in "boy-love chat rooms" on the Internet. There he searched for adults attempting to solicit sex with underage boys, and gathered evidence from conversations recorded in the chat rooms. Philip Rankin, a British marine-insurance expert living in Norway, communicated with McLaughlin under the assumption that the police officer was a young boy. Rankin then agreed to travel to Keene to meet his online contact in person at a Dunkin' Donuts restaurant. Upon his arrival at the restaurant, Rankin was arrested by McLaughlin on the charge of using the Internet to solicit sex with an under-aged person.27 & Critics of Internet entrapment have questioned whether such practices for catching child molesters are ethically justifiable, even if they are legal. In the United States, numerous cases of child molestation have been investigated by the FBI where pedophiles have crossed over a state line to meet and molest children they met via an Internet forum such as a chat room. Sometimes police officers have entered chat rooms, posing as young girls to lure unsuspecting pedophiles. In 2003, a three-week sting operation was con- ducted in Spokane, Washington, where a policeman posing as a 13-year-old girl in an Internet chat room arrested a twenty-two-year-old man on charges of attempted (second- degree) rape of a child.28 Supporters of online entrapment operations argue that they can save many innocent lives and can significantly lessen the harm that might otherwise occur to some individuals. For example, one could speculate about the outcome of the Amy Boyer stalking incident (described in a scenario in Chapter 1) if an entrapment scheme, similar to the one used in Scenario 7-3, had been in place to catch cyberstalkers such as Liam Youens. Of course, a critical question from the point of view of many civil libertarians is whether the ends achieved by entrapment operations justify the means. Are such means morally acceptable? At the root of this question are some of the same issues involving civil liberties that we examined in Scenario 7-2 (involving the interception of physical mail entering and leaving a certain neighborhood), where we saw that the end achieved, catching criminals, was desirable, but the means used to accomplish this end were questionable. 7.7.1 Entrapment and Sting Operation to Catch Internet Pedophiles Police and federal agents have used "sting" operations and entrapment techniques to catch members of organized crime involved in drug dealing, gambling, pornography, and so forth. Consider a controversial case of entrapment involving cxbertechnology that was intended to lure and catch a pedophile who used the Internet to solicit sex with an under- aged person. c SCENARIO 7-3: Entrapment on the Internet Using an alias or pseudoname, detective James McLaughlin of Keene, New Hampshire posed as a young boy in "boy-love chat rooms" on the Internet. There he searched for adults attempting to solicit sex with underage boys, and gathered evidence from conversations recorded in the chat rooms. Philip Rankin, a British marine-insurance expert living in Norway, communicated with McLaughlin under the assumption that the police officer was a young boy. Rankin then agreed to travel to Keene to meet his online contact in person at a Dunkin' Donuts restaurant. Upon his arrival at the restaurant, Rankin was arrested by McLaughlin on the charge of using the Internet to solicit sex with an under-aged person.27 & Critics of Internet entrapment have questioned whether such practices for catching child molesters are ethically justifiable, even if they are legal. In the United States, numerous cases of child molestation have been investigated by the FBI where pedophiles have crossed over a state line to meet and molest children they met via an Internet forum such as a chat room. Sometimes police officers have entered chat rooms, posing as young girls to lure unsuspecting pedophiles. In 2003, a three-week sting operation was con- ducted in Spokane, Washington, where a policeman posing as a 13-year-old girl in an Internet chat room arrested a twenty-two-year-old man on charges of attempted (second- degree) rape of a child.28 Supporters of online entrapment operations argue that they can save many innocent lives and can significantly lessen the harm that might otherwise occur to some individuals. For example, one could speculate about the outcome of the Amy Boyer stalking incident (described in a scenario in Chapter 1) if an entrapment scheme, similar to the one used in Scenario 7-3, had been in place to catch cyberstalkers such as Liam Youens. Of course, a critical question from the point of view of many civil libertarians is whether the ends achieved by entrapment operations justify the means. Are such means morally acceptable? At the root of this question are some of the same issues involving civil liberties that we examined in Scenario 7-2 (involving the interception of physical mail entering and leaving a certain neighborhood), where we saw that the end achieved, catching criminals, was desirable, but the means used to accomplish this end were questionable.
Expert Answer:
Answer rating: 100% (QA)
Web stings that arrange at follow down Internet customers require incredibly prepared administrators in the Internets procedural angles and Internet s... View the full answer
Related Book For
Strategic Compensation A Human Resource Management Approach
ISBN: 978-0133802023
8th edition
Authors: Joseph J. Martocchio
Posted Date:
Students also viewed these accounting questions
-
What arguments can be made in favor of using compressed work week schedules for companies that pursue lowest-cost strategies? What are the arguments against using compressed work week schedules in...
-
It may seem contradictory that lyophilization can be used to preserve foods yet also be used to keep cultures of microbes viable. Explain how these applications can be reconciled.
-
It may seem odd, but biologists can tell how old a lobster is by measuring the concentration of pigment in the lobsters eye. The authors of the paper Neurolipofuscin Is a Measure of Age in Panulirus...
-
1-Is it a good business strategy to have a day care center, Harley Davidson Motorcycle Dealership Sales and repair, Namaste Yoga studio, bookstore, temporary worker (day laborer) center, state prison...
-
The Company Lalo Company, headquartered in Vaduz, is a company listed in Amsterdam, Paris and Zurich. It is the third largest small home appliance manufacturer in Europe. The company was founded in...
-
Determine the force in each member of the Gambrel roof truss shown. State whether each member is in tension or compression. e kaps 2kps 2 kips 3.6 ft I kip I kip B. -121--12n--12 ft--12 ft-
-
Steven Sanchez worked as a warehouse employee for Gruma Corporation. In December 2016, Sanchez was presented an arbitration agreement during a meeting with George Tate, the human resources manager...
-
Using the data in Problem 4-13, test to see if there is a statistically significant relationship between the grade on the first test and the final average at the 0.05 level of significance. Use the...
-
1. We define the product of operators by composition. That is, AB|4) = A(B|4)). Show that, for the two-level atom, the evolution operator satisfies U(t) U(ts)U(s).
-
Adrienne is a single mother with a 6-year-old daughter who lived with her during the entire year. Adrienne paid $3,900 in child care expenses so that she would be able to work. Of this amount, $500...
-
Risks to the Outlook (Speech, Sydney - 15 August 2019) Guy Debelle (Deputy Governor) Keynote Address at the 14th Annual Risk Australia Conference Does Enterprise risk management enhance operating...
-
The Imprime-Expert company offers printing services for cosmetic products, intended for different companies across the country. The production accounting department must evaluate the various...
-
Consider a pension plan invested in risky assets to meet future pension obligations. Define a hypothetical insurance policy ("put option") which pays off the amount necessary to meet the future...
-
A taxpayer with some rental properties comes into a nontaxable major windfall and decides to do some long-needed work on these properties. He spends $100,000 on significant renovations to each...
-
Right now, the country has some interesting and conflicting Macroeconomic problems. First, we have low EMPLOYMENT. Many folks don't' want to work at the going wages in many kinds of jobs because of...
-
What are the journals that will be used in this cycle?
-
The centripetal acceleration, a, of an object travelling in a circular path with a velocity, v, is given as a ==, where r is the radius of the circular path. If an object is moving in a circular path...
-
For liquid water the isothermal compressibility is given by; where r and b are functions of temperature only. If 1 kg of water is compressed isothermally and reversibly from I to 500 bar at 60(C. how...
-
1. Should Docutrend use the same pay policy for all of its open positions? 2. What pay policy would you recommend? Why?
-
1. What additional information about the CEOs pay package should Don identify to potentially share with the employees? 2. How can Don explain the pay disparity to the employees to ease their concerns...
-
Are employees more likely to favor defined contribution plans over defined benefit plans? How about employers? Explain your answer.
-
Provide an overview of the behavioral finance perspectives of risk.
-
Define the heuristic biases of representativeness, anchoring, and mental accounting.
-
List and explain some fundamental issues of behavioral finance.
Study smarter with the SolutionInn App