Presentation on theme: "SALVATION ARMY EQUIP FOR SUCCESS SALVATION ARMY EQUIP FOR SUCCESS PROTECTING EQUIP FOR SUCCESS PATRONS FROM THE INTERNETS DARK SIDE March 20, 2004 Prepared."— Presentation transcript:
SALVATION ARMY EQUIP FOR SUCCESS SALVATION ARMY EQUIP FOR SUCCESS PROTECTING EQUIP FOR SUCCESS PATRONS FROM THE INTERNETS DARK SIDE March 20, 2004 Prepared by Donna Rice Hughes For the National Salvation Army eQuip For Success Initiative
Overview n Internet Dangers (vs. Benefits) n Access to Pornography n Cyber-Sex & Addiction n Pedophiles Access to Children n An Overview of Preventative Solutions n Spiritual Battle/Healing/Ministry
Spiritual Battle n The thief does not come except to steal, kill and destroy, I have come that they may have life, and that they may have it more abundantly. Jesus, John 10:10
INTERNET DANGERS (A tool used for good or evil) 1.Free and easy access to inappropriate and illegal content in homes, schools, libraries, businesses and churches: -Pornography (child porn, obscenity, harmful to minors) -Violence; Bombmaking -Gambling 2. Predators have easy and anonymous access to unsuspecting kids
The CyberSex Industry n Generates approximately $1 billion annually n Expected to grow to $5-7 billion over next 5 years, barring unforeseen change n Subscription sites exceed 100,000 in U.S. operated by about 1,000 U.S. based firms (NRC, 3-1) (NRC, 3-1) n 1.3 million pornographic websites (N2H2, 2003)
UNINTENTIONAL ACCESS Misspelled Words- (shareware vs. sharware) Innocent Searches- (toys, boys, pets, etc) Stealth Sites- (whitehouse ; watersports) Brand Name Misuse (Disney, Nintendo, Barbie, Levis, etc) Unsolicited - 30% of all spam is from pornographers Chat Rooms & Instant Messages
Deceptive Tactics n 74% of adult commercial sites display free teaser porn images on homepage, often porn banner ads n 25% prevented users from exiting site (Mousetrapping) n Only 3% required adult verification (Child-Proofing on the World Wide Web: A Survey of Adult Webservers, 2001, Jurimetrics. NRC Report 2002 ) (Child-Proofing on the World Wide Web: A Survey of Adult Webservers, 2001, Jurimetrics. NRC Report 2002 )
Youth and Internet Porn n Adult industry says traffic is 20-30% children (NRC Report 2002, 3.3) n 9 in 10 kids ages 8-16 yrs have viewed porn online, mostly unintentionally, and when using the Internet to do homework (UK: News Telegraph, NOP Research Group, 1/17/02)
ONLINE OBSCENITY n Girls.com vs. Gurls.com n Watersports –Porn depicting excretory functions –Live video n Boys –-Hijacks to Man Alert: Leading Gay Content Site
Child Pornography n Revenue estimates range from $200 million – $1 billion per year (Red Herring Magazine, 1/18/02) n Child porn could potentially financially rival illegal drug industry (Internet Crimes Against Children Task Force) n More than half of all child porn sites are hosted in the U.S. (National Criminal Intelligence Service, 8/21/03)
Child Pornography (cont.) n More than 20,000 images of child porn posted on the Internet every week (National Society for the Prevention of Cruelty to Children, 10/8/03) n More babies and toddlers are appearing on the net, the abuse is getting worse (Combating Peadophile Information Networks, 3/03) n Possession of child pornography is a federal crime
Stages of Sex Addiction (Dr. Victor Cline) Addiction- The need to keep coming back for more (drug of choice) 1.Escalation- The need for more explicit, rougher & more deviant images for same effect 2.Desensitization- Material once shocking or taboo is acceptable 3.Acting out- Tendency to sexually act-out behaviors depicted in porn History of the downward progression within the porn industry
The New Stealth Drug n Free, legal, stealth, available, anonymous, no physical evidence n Net porn and cybersex chat, with self- stimulation, cause brain and body to release drugs back into the nervous system. n Biochemical Imprinting n Images never erased (w/out healing of Jesus blood The Drug of the New Millennium, The Science of How Internet Pornography Radically Alters the Human Brain and Body- Mark Kastleman
CYBER-SEX COMPULSIONS CRACK COCAINE n MSNBC/Stanford/Duquesne Study, 2000 –60% of all web-site visits are sexual in nature –Sex is the # 1 searched word online –25 million Americans visit cyber-sex sites between 1-10 hours per week. Another 4.7 million in excess of 11 hours per week. –Men & Women Keep Cyber-Sex Habit Secret- 70%** (MSNBC/Stanford/Duquesne Study, Washington Times 1/26/00) (MSNBC/Stanford/Duquesne Study, Washington Times 1/26/00)
CYBER-SEX & CHRISTIANS n 51% of pastors say cyber-porn is a possible temptation. 37% say it is a current struggle (Christianity Today, Leadership Survey, 12/2001) n 1 out of every 6 women, including Christians, struggles with an addiction to porn/ 80%+ women take addiction offline (Todays Christian Woman, Fall 2003) None are immune- If you think you cant fall into sexual sin, then youre godlier than David, stronger than Samson, and wiser than Solomon. (Pastor Bill Perkins)
HARMS * Affects attitudes, choices and behavior *Demeans children, women and men *Counterfeit for love, intimacy & commitment *Drug of choice- anesthesizes pain *Tool of Satan to defile and hinder the plan and purpose of God for human sexuality
Harms to Children (Kids Online: Protecting Your Children In Cyberspace, Donna Rice Hughes) n Interferes with a childs development and identity n Shapes attitudes and values n Promotes desensitization n Typical age of first exposure- 5 yrs old! (Protecting Your Child In an X-Rated World, LaRue/York Tyndale, 2002)
Kids Acting Out 1/3 of indecent assaults are by adolescents- Internet Paedophilia Training Awareness UK Incidents of young children displaying sexually aggressive behavior has increased, exposure to online porn is a key factor (Australian study, 11/2003)
Acting Out 11/ year-old Josh had been looking at graphic violent pornography on the Internet for 20 minutes immediately before stabbing 8- year-old Maddie Clifton to death. 2/04- 8-year-old girl raped, choked. Attempted murder by 23 yr. old man at Philly public library after viewing Internet porn
PREDATORS ONLINE Pedophiles & Predators Anonymous Access to Children Easy Access to Child Pornography Virtual Validation Virtual Molestation Trade Secrets & Teaching Tools Avoidance of Law Enforcement Detection
Online Victimization: A Report on the Nations Youth n 1 in 5 received sexual solicitation or approach in last year n 25% of youth who received sexual solicitation told a parent n (Sample of 1,501 youth ages 1-17 who use Internet regularly)
TOOL OF TODAYS PEDOPHILE 89% of sexual solicitations were made in either Chat rooms or Instant Messages (Pew Study reported in JAMA, 2001) 1 in 5 children who use Chat rooms have been approached by pedophile online (Telegraph.co.uk. 1/02) n Recommendation- IM and Chat Rooms should be disallowed by eQuip labs
Youth Ignorance Factor n Children ages 7-17 who surf the net, if asked online, would: –29% would freely give out home address –14% freely give address (Telegraph.co.uk. 1/02)
Child Sexual Exploitation n 2 in 5 abductions ages Due to Internet n Online sexual solicitation growing at rate of 1000% per month (San Diego Police Department)
PORNOGRAPHY- Tool used by Pedophiles n to arouse the child, n to lower the childs inhibitions, n to demonstrate to their victims what they want them to do, n to communicate that a particular sexual activity is okay.
Using Internet Technology….. How hard is it for a predator to target a child?
Luring starts with target identification and selection I am intrigued by Amanda...
Most online or Internet service providers provide user directories to assist their members identify others with similar interests. In our nefarious but capable hands...
we continue the search for Amanda by checking her Member Profile.
We type in her chatroom name...
Using the locate command, I can follow Amanda wherever she goes in Cyberspace.
I can also or instant message her by using the command.
After 2 minutes we have determined that Amanda: n is most likely a female child n likes seashells, rollerblading and English class n has a little brother that most likely answers to Billy, Junior or J.R. and n her valid address
Using Deja News or AltaVista we can check for more information by searching newsgroup postings Using the Power Search option we continue the inquiry
Using Amandas address, I search for any of her newsgroup postings.
I now know how many messages Amanda has posted; when and where the messages were posted, and the text of each message.
Newsgroups are electronic bulletin boards
Within 12 minutes I know: n Amanda is her first name n she is a young girl who likes beanie babies, rollerblading, and English class n has a baby brother named Billy Jr. n Has a Mom or sister named Sue n A good idea when shes at home n She lives on the East Coast n Her home telephone number
There are many online services that allow for searches using as little as one variable. What can I find out about her from the telephone number?
I bet this Amandas last name... Good news. Most of these services will allow you to change or eliminate your personal data from the directories.
What can I find out using Amandas last name?
With each additional piece of information, I can perform additional searches. I bet I can find out where she lives... using her last name.
I found her.
One click, Im there.
I wonder where she goes to school?
If the school posts student pictures on its web page, I could even get Amandas picture.
target is a female child whose full name is Amanda Welch the address is she likes seashells, rollerblading and English class has a baby brother named Billy collects or trades beanie babies full names of her mother, father, and brother her home telephone number is shes probably home by 5:30 weekdays or Mom arrives home from work then She lives at 618 Hammerstone Drive in Laurel, Maryland specific directions to her home what public schools are nearest to her home. Within 45 minutes I learned:
ENOUGH IS ENOUGH THREE- PRONG SOLUTION A shared responsibility between the 1.Public- Parents, Schools, Libraries, Churches SAFETY RULES & SOFTWARE TOOLS 2.Technology Industry 3.Legal Community- Law Enforcement & Public Policy Each provides an essential layer of protection
Safety Rules and Software Tools n One without the other is ineffective n Safety Rules For Children n Acceptable Use Policy for Internet Users –Outlines responsibilities and privileges –Code of Conduct Acknowledgment form –Address illegal activities such as copyright violations, drugs, gambling, child porn, sexual solicitation, viruses, hacking, online harassment
SAFETY RULES Sign an Internet Rules Contract Keep the computer in a public area and monitor Internet use Spend time online with your youth Know your youths online friends and activities Teach youth never to give out personal information such as their name, school, address, phone number or picture Do not allow youth to have an online profileDo not allow youth to have an online profile
SAFETY RULES (CONTINUED) Instruct youth never to plan a face-to-face meeting with someone that they have met online Disallow chatroomsDisallow chatrooms Only allow instant messaging with approved listOnly allow instant messaging with approved list Utilize protective software toolsUtilize protective software tools Report Cybercrime to CybertiplineReport Cybercrime to Cybertipline
Childrens Internet Protection Act n A good foundational model for eQuip for Success –Requires filtering of htm, obscenity and child pornography for minors –Requires filtering of obscenity and child pornography for adults –May also choose to disallow other types of content - Before CIPA, Public Libraries had 82 million Internet sessions- annual porn incident rate of between 400,000 and 2 million (Dangerous Access, 2000)
TECHNOLOGY TOOLS (Kids Online, Donna Rice Hughes) n Action: Suggest (Dotkids.com-us.kids) –Open –Closed n Action: Search n Action: Monitor/Accountability n Action: Inform (rating and labeling) n Action: Block/Filter –Desktop –Server-based (or hybrid of two)
Creating Your eQuip Digital Toolbox n Scenario 1- Simple Solution: One Stop Shopping- contract with an existing filter/monitoring service that has a full suite of safety tools n Scenario 2-Safe and Secure Solution- Closed, secure system n Scenario 3- Build Your Own; Layered approach Technology tools provide protection for eQuip Center and clients
LEGAL PRONG LEGAL PRONG GOVERNMENT & LAW ENFORCEMENT Aggressive enforcement of current laws (child porn, obscenity, child stalking laws) Federal, State, & Local cooperation Law enforcement training The public should not have to shoulder the burden of protecting against illegal content and criminal activity
Legislation in the Courts –Child Online Protection Act (COPA)- Adult verification required on porn sites-ACLU, ALA challenge-enjoined –Child Pornography Protection Act- Extend law to include computer-generated child porn. Supreme Ct struck down –Child Internet Protection Act (CIPA)- Requires Schools & Libraries to filter-ACLU & ALA challenge. Supreme Court upheld, June 2003 n New Laws and Rulemaking: Spam, Deceptive Marketing Tactics, Mousetrapping
Recovering Hearts Faith-based initiative n Equip Church to help those who are sexually broken through healing, deliverance and restoration n Confession, Repentance, Accountability If my people, who are called by my name, will humble themselves and pray and seek my face and turn from their wicked ways, then will I hear from heaven and will forgive their sin and will heal their land. 2 Chronicles 7:14
PORNEIA n To commit any sexual sin; sexual immorality n Root word for pornography, harlot, prostitute, fornicator, whoremonger n Porneia is symbolic of idolatry (Word Study) n Baal & Ashtoreth-male and female idol-gods of sexual orgy (phallicism-worship of the phallus) The Healing Presence, Leanne Payne
THE GOOD NEWS n Preach gospel to poor n Heal the broken-hearted n Preach deliverance to the captives n Recovery of sight to the blind n Set at liberty them that are bruised --Jesus, Luke 4:18
Come Into the Light of Gods Unconditional Love n Let he who is without sin cast the first stone. Jesus n Allow those who are sexually broken to come into the light w/out fear of judgment, shame or public disgrace
SPIRITUAL BATTLE n Our struggle is not against flesh and blood, but against rulers, powers, forces of darkness & spiritual forces of wickedness.Take up the full armor of God to resist in the evil day and having done everything to STAND FIRM. (Ephesians 6:1-19)
Role of the Salvation Army Internet Safety- Public Awareness Internet Safety- Public Awareness –Educate & train children, parents & adults utilizing eQuip services Spiritual Leadership/Ministry –Victims assistance/counseling (Monitoring tools will reveal those attempting to access cyberporn- Ministry opportunity) –Healing and wholeness to sexually-broken –Intercession/spiritual warfare –Opportunity to share Gods plan for sexual intimacy
ENOUGH IS ENOUGH RESOURCES n (Enough Is Enough) n n Abbreviated version of Kids Online n Resources for parents, educators, govt officials n Reporting cybercrime-CyberTipLine n Kids Online: Protecting Your Children in Cyberspace n Sex Addiction Resource List
New Battleground for Salvation Army ONWARD CHRISTIAN SOLDIERS