Presentation on theme: "Special Agent Betsy Bartko. How children use digital media Social networks Children as victims of online predators Cyberbullying Cases and laws/statutes."— Presentation transcript:
Special Agent Betsy Bartko
How children use digital media Social networks Children as victims of online predators Cyberbullying Cases and laws/statutes Resources available
Dont underestimate your children
75% of teens have cell phones Internet access Text messaging Smartphone apps
Enhances communication, social connection, and technical skills Provides a connection to others from diverse backgrounds Sharing of artistic and musical endeavors Growth of ideas from blogs, videos, gaming sites Can foster individual identity and unique social skills Access to online health information O'Keeffe, G. S., & Clarke-Pearson, K. (2011). Clinical Report: The Impact of Social Media on Children, Adolescents, and Families. American Academy of Pediatrics:
Cyberbullying Clique-forming Sexual experimentation Sexting Exposure to inappropriate content Internet addiction Sleep deprivation O'Keeffe, G. S., & Clarke-Pearson, K. (2011). Clinical Report: The Impact of Social Media on Children, Adolescents, and Families. American Academy of Pediatrics:
Facebook depression New phenomenon defined as depression that develops when preteens/teens spend a great deal of time on social sites, then begin to exhibit classic symptoms of depression O'Keeffe, G. S., & Clarke-Pearson, K. (2011). Clinical Report: The Impact of Social Media on Children, Adolescents, and Families. American Academy of Pediatrics:
1 in 7 youth online (ages 10 – 17) received a sexual solicitation or approach over the internet 1 in 3 youth were exposed to unwanted sexual material over the internet 1 in 11 youth were harassed over the internet 73% of children who have offline sexual encounters with offenders do so more than once 2006 NATIONAL CENTER FOR MISSING & EXPLOITED CHILDREN.
Anyone can be anyone online Only talk to real people you know Never post personal information Do not post photos of yourself Dont arrange to meet up with people face to face Think before you post or chat Tell an adult if something makes you scared or sad
Anyone can be anyone online Only talk to real people you know Never post personal information Do not post photos of yourself Dont arrange to meet up with people face to face Tell an adult if something makes you scared or sad
Curiosity: children are curious about sex. Predators exploit this – act as guides about sex Children crave attention Predators offer flattery to coerce them into sexual acts Rebellion A child who is victimized while disobeying parental rules may be reluctant to admit it Children respect adults Less likely to disobey an adult 2011 NATIONAL CENTER FOR MISSING & EXPLOITED CHILDREN.
Can be a long process a predator uses to gain a childs trust Lower a childs inhibitions by gradually introducing explicit images and child sex abuse images May lead to the childs willingness to meet the person with whom he or she is chatting Using his or her adult status to influence and control a childs behavior Betraying a childs trust by manipulating his or her emotions and insecurities Movie Resource: Trust
Convicted: guilty plea to a charge of using a computer to commit the crime of child sexual abusive commercial activity. He received a sentence of 16 months to 20 years in prison. He also had to register as a sex offender.
Becomes withdrawn from family and friends They become angry when they cant get to the internet Inappropriate material found on their devices Quickly turns of the monitor when an adult comes in the room The child receives mail, money or gifts from unknown people Unknown phone numbers on the phone bill 2011 NATIONAL CENTER FOR MISSING & EXPLOITED CHILDREN.
Cyberbullying is being cruel to others by sending or posting harmful material or engaging in other forms of social cruelty using the Internet or other digital technologies
About one-third of online teens (ages 12-17) have been cyberbullied. Girls are more likely to be targeted NATIONAL CENTER FOR MISSING & EXPLOITED CHILDREN.
Flaming and Trolling – sending or posting hostile messages intended to inflame the emotions of others Happy-Slapping – recording someone being harassed or bullied in a way that usually involves physical abuse, then posting the video online for public viewing Identity Theft/Impersonation – stealing someones password and/or hijacking their online accounts to send or post incriminating or humiliating pictures, videos, or information Photoshopping – doctoring digital images so that the main subject is placed in a compromising or embarrassing situation Physical Threats – sending messages that involve threats to a persons physical safety Rumor Spreading – spreading gossip through , text messaging, or social networking sites
Sending, receiving, or forwarding sexually explicit messages, photographs, or images via cell phone, computer, or other digital devices.
Former U.S. Representative Anthony Weiner - NY
Megan Meier Dardenne Prairie, Missouri Committed suicide October 15, 2006 MySpace and AOL Messenger Bullies: Lori Drew, Ashley Grills, et al. Megan and her friend had a falling out Megans former friends mother (Drew) faked an account Josh Evans Used the account to befriend Megan Last message to Megan, The world would be a better place without you Drew indicted/convicted under Computer Fraud and Abuse Act Convictions overturned – based upon MySpaces terms of usage
Jamey Rodemeyer Amherst, New York Committed suicide September 18, 2011 Formspring, YouTube, Twitter… An openly gay student endured over a year of bullying Jamey posted a video on the YouTube site It gets better telling his story I wouldnt care if you died. No one would. So just do it It would make everyone WAY more happier! Before he died, he tweeted Lady bye mother monster, thank you for all you have done, paws up forever After his death, his sister was verbally attacked better off dead NO charges were filed
Jamey Rodemeyer Amherst, New York The statute of limitations had expired. Evidence was lacking that a reported offense was actually committed, or information was received second- or third-hand and the actual perpetrator could not be identified. Neither Jamey nor his friends reported the bullying incidents to school administrators or his parents. The incidents were reported to police after Jamey died. Forensic analysis of Jamey's computer showed no pattern of "an ongoing course of conduct" of online abuse by the classmates reputed to have been harassing him. There is no prosecutable crime to which hate crime laws could be applied. Also, the motives behind the gay slurs used by kids to antagonize and harass Jamey were not clear- cut
Hope Witsell Ruskin, Florida Committed suicide September 12, 2009 Sexting Spring 2009, she took a picture of her breasts with her cell phone and sent it to her boyfriend It was forwarded to students in six schools almost immediately Parents were notified Hope became a target of cyberbullying: people called her slut, skank, whore Bullies posted about her on MySpace pages Shields Middle School Burn Book" and started a "Hope Hater Page"
Phoebe Prince South Hadley, Mass. Committed suicide January 14, 2010 Moved to the U.S. in the fall of 2009 Cyber-bullied by 9 teens Was accused of taking away another girls boyfriend Repeatedly threatened to beat her up, called her b*tch, Irish slut, whore Defendants posted derogatory Facebook comments after Phoebes death Aggressive DA charges with Violations of Civil Rights, Bodily Injury and Statutory Rape (2) defendants plead, (3) juveniles likely to plead, (1) facing rape charge
Tyler Clementi Rutgers University 18 year-old jumped from the GW bridge on September 22, 2010 His roommate, Dharun Ravi and friend Molly Wei placed a hidden web cam in their room They live-streamed the video of Clementi and another man during a sexual encounter Wei plead out and Ravi is facing invasion of privacy (sex crimes), bias intimidation (hate crimes), witness tampering, and evidence tampering
Your parents could be sued Your parents could pay thousands of dollars in legal defense Guilt, remorse Sexting – under 18? Distribution of Child Pornography – a state and federal offense requiring registration as a sex offender More and more prosecutors are becoming comfortable with the laws – more juveniles are getting charged
Cell phone forensics can find text messages, s, websites, photos Cell phone toll records Computer forensics Subpoenas or search warrants can be sent to ISPs, Social Networking sites for access to your pages and history Cyberbullying leaves a digital trail that is not hard to trace Dont not do it because you can get caught, but because its wrong to do
Alaska House Bill 482 (2006): Sec Harassment, intimidation, and bullying policy. (a) By July 1, 2007, each school district shall adopt a policy that prohibits the harassment, intimidation, or bullying of any student. The policy must also include provisions for an appropriate punishment schedule up to and including expulsion and reporting of criminal activity to local law enforcement authorities : Passed the Legislature, to be transmitted to the Governor for signature. Various statutes: Does not have a Cyberbullying statute, but ALASKA STAT. § which is an anti-harassment statute defines harassment as including by electronic means which threatens the physical well-being of another person.
Tell your child not to respond to rude s, messages, and comments. Save the evidence, such as and text messages, and take screenshots of comments and images. Also, take note of the date and time when the harassment occurs. Contact your Internet service provider (ISP) or cell phone provider. Ask the website administrator or ISP to remove any Web page created to hurt your child. If harassment is via , social networking sites, IM, and chat rooms, instruct your child to block bullies or delete your childs current account and open a new one. If harassment is via text and phone messages, change the phone number and instruct your child to only share the new number with trustworthy people. Also, check out phone features that may allow the number to be blocked. Get your childs school involved. Learn the schools policy on Cyberbullying and urge administrators to take a stance against all forms of bullying. Make a report to and if you feel something illegal has occurred, inform law enforcement NATIONAL CENTER FOR MISSING & EXPLOITED CHILDREN.
missingkids.com or ncmec.org: The National Center for Missing and Exploited Children Netsmartz.org i-safe.org: protecting the online experiences of youth everywhere wiredsafety.org: cyberbullying, cyberstalking, cyber abuse cybertipline.com: report any crimes against children