Presentation on theme: "Homeland Insecurity Inspect Your Gadgets Protecting Our Children In A Technologic World Your home is your castle. Has the mote been bridged?"— Presentation transcript:
Homeland Insecurity Inspect Your Gadgets Protecting Our Children In A Technologic World Your home is your castle. Has the mote been bridged?
My Journey / My Family
Cell Phone, Camera, Computer? = ++ New threats from an unlikely sources.
Harmless fun????? Kids havent changed! The technology has….
New Home with Rapunzel Tower Tower outfitted for girls 13-15 years of age. No modern conveniences Convenient food dumb waiter Convent nearby to assist in transition to modern life. When she is ready
The oldest child predator story….
has a present day twist!
The Wolf Has A New Disguise
The free access which many young people have…has poisoned the mind and corrupted the morals of many a promising youth. Reverend Enos Hitchcock, Memoirs of the Bloomsgrove Family, 1790
This new form of entertainment has gone far to blast maidenhood…Depraved adults with candies and pennies beguile children with the inevitable result Society for the Prevention of Cruelty to Children, 1909
Does it break up the home life and the old practice of visiting friends? Does it break up the home life and the old practice of visiting friends? The Knights of Columbus…1933
The New Generation Gap
Perhaps no period in history has witnessed such rapid improvements in adolescent conduct! From 1990 through 1999, teenage violence and other malaise plunged: homicide rates (down 62 percent) rape (down 27 percent), violent crime (down 22 percent), school violence (down 20 percent), property offenses (down 33 percent), births (down 17 percent), abortions (down 15 percent), sexually transmitted diseases (down 50 percent), violent deaths (down 20 percent), suicide (down 16 percent), and drunken driving fatalities (down 35 percent The Culture War Against Kids Mike Meles – alter.net
Additional crime facts at a glanceAdditional crime facts at a glance Violent crime rates declined since 1994, reaching the lowest level ever recorded in 2004. U.S. Department of Justice · Office of Justice Programs Bureau of Justice Statistics
Rape rates continue to decline. About seven in ten female rape or sexual assault victims stated the offender was an intimate, other relative, a friend or an acquaintance
Teen Drug Abuse Continues Its Three-Year Decline Cigarettes. Smoking among teenagers continues to decline from peak levels in the mid-1990s May 2005
What about our state? Among the Best in the Nation in Students Going on to College: Pennsylvania ranks 4th in the nation One of the Best Graduation Rates in the Country: Pennsylvania's public high school graduation rate is among the top 6 in the country Classroom Behavior Is Improving: The proportion of Pennsylvania educators saying they were very satisfied or satisfied with student behavior increased from 51% to 64% over the past four years. Widespread Internet Access: Almost all of the public schools in Pennsylvania (98%) have internet access. U.S. Department of Justice · Office of Justice Programs Bureau of Justice Statistics -2005 – Pennsylvania violence and crime in schools have showed a steady decrease in the last decade..
rare event. The murder of a child who is abducted by a stranger is a rare event. 100 such incidents in the United States each year There are estimated to be 100 such incidents in the United States each year, less than one half of one percent of the murders committed. one child abduction murder for every 10,000 reports There is approximately one child abduction murder for every 10,000 reports of a missing child.
David Finkelhor, a criminologist at the University of New Hampshire has studied internet-related crime He reports: There are new perils for kids, but no evidence that kids are on the whole more endangered today as a result of the Internet. Do we believe……?
2004 study by Wolak and Finkelhor, financed by the U.S. Department of Justice points out a number of fallacies It is assumed that most internet predators pretend to be peers. Actually only 5% do. It is assumed that things happen quickly for the unsuspecting victim. Actually most abusers correspond with their victims for a least a month and most have telephone conversations before meeting. It is assumed that sex is not mentioned by the abuser. Actually, most freely discuss sex and most victims freely agree to it. Only about 16% are coerced into sex.
Youth 12-17 are two to three times more likely than adults to be the victims of an assault, robbery, or rape, according to the National Crime Victimization Survey Nearly half of all rape victims are girls under the age of 18
Chances your kids could be in trouble…. 12 percent have had face-to-face meetings with people they have met online.Almost 40 percent of American high school students have posted personal information such as names, e-mail addresses, age and gender on the Web, according to iSafe student surveys, and 12 percent have had face-to-face meetings with people they have met online. In 2003, about 7% of public and private school students age 12-18 reported that they have been bullied at school within the past six months
MySpace.com has jumped from zero to more than 50 million users in just two years. Too much information could allow Internet predators to find you, stalk you. Don't put where you work-- what time you do something--- where you are going to be at a certain time.
@myspace An ad-saturated Gen-Y playground owned (and mined for marketing data) by as regrettable an intersection of business, media, and politics as exists: Rupert Murdoch's News Corp. Fast becoming an obligatory whistle-stop for pop-icon aspirants eager for MySpace's prime audience: 14- to 34- year-olds. Mr. Murdoch says the networking site will drive traffic to his Fox TV sites.
Just how big is it? MySpace, which was created in 2003 and has exploded to include some 60 million registered users, has become the dominant social networking site, eclipsing others like Friendster.com, Tribe.net, Xanga.com and Meetup.com Friendster.comTribe.netMeetup.com
Music….Music…..Music "MySpace now draws so much traffic that it accounted for 10% of all advertisements viewed online in the month." Businessweek What does all of this have to do with music? One of the main drivers of the myspace growth explosion has been its focus on music combined with social networking services.
Teen blogs are not about the technology They are about feelings of belonging and being loved. They are about trying on different personalities. They are about someone who feels isolated connecting with others who share their interests or insecurities.
MySpaces terms of service say that its open to people 14 or older there is no age verification process to prevent younger kids from setting up an account by lying about their date of birth. BUT…….
News Flash ! - April 2006 myspace has new Safety Czar – Nemu Nigum – hired away from Microsoft - former trial attorney with Dept. Of Justice Reacting to calls for legislation and congressional hearings. Cuts 250,00 profiles of kids under 14.
Private Information on the Internet is an…… Oxymoron
What do teens think? Most teens say they know to be wary of strangers online, but do not share the angst about posting personal information. Growing up today means living with the fact that there are going to be pictures of you and other personal data on the Web for all to see.
Would Your Billboard Say: Come see me naked I committed crimes I got away with I love to party and drink I hate black people (white people, Mexicans..)
Question to ask yourself: Question to ask yourself: 10 Years from now would you like this information to be viewed? You cant control where it goes after you post it. Even if you no longer post or try to delete the site it can be retrieved!
Cam-Girl Charged With Sexually Abusing Herself Several months ago police in Latrobe, PA charged a 15-year-old girl with possession of child pornography, sexual abuse of children, and dissemination of child pornography. The twist? The alleged victim is also the alleged perpetrator. The girl allegedly acted as both sexual predator and prey by sending images of herself in various states of undress to people that she met in chat rooms. possession of child pornography
And…. Sugar Daddies
Because the gift is sent directly to the store, the admirer doesnt see the teen address. This may often give a false sense of security and protection. i-Safe Times November 2004
While internet companies like AOL and Yahoo! have cracked down on internet predators in their chat rooms, the detectives say predators have just moved to other internet sites, like 'myspace.com.'
FBI estimate ¼ to ½ million predators on-line! First chat rooms – then blogs – now myspace and facebook You may be accountable by employers your school and the community for what you post on- line – teaching consequences.
Profile of the Typical Teen Lured Online Intelligent Intelligent Usually middle class or higher Usually middle class or higher Low self esteem Low self esteem Bored Bored Loner, quiet Loner, quiet Access to a computer Access to a computer Little/no history of running away Little/no history of running away
The Perfect Victim: 11-14 No or little parental involvement No definite bedtime Can be away from home without anyone knowing where he/she is Has exclusive use of the computer in a private area
Profile of an Internet predator is not what you may think! Stereotype myth is that they are homosexual and loners. Many predators are very sociable and often popular in the community. Are primarily (but not always) male, masculine, better-educated, more religious than average, in their thirties, and choose jobs allowing them greater access to children. Are usually family men, have no criminal record, and deny that they abuse children, even after caught, convicted, incarcerated, and court- ordered into a sex offender program.
2005 Kaiser Family Foundation Report 20% of kids can surf from their bedroom. 40% of homes have more than 1 computer. 53% of kids 8-18 said the family had no rules on TV viewing. Exposure to risqué TV programming, violent video games and salacious Internet sites have led to a Silent Epidemic – Sen. Hillary Rodham Clinton
Multitasking Kids 34% of kids from 5-19 years old had cell phones by the end of 2004. Mobisodes, Vclips, and Internet Access can bring adult content to a full color screen to your child. No laws that address indecency or violence on wireless phones
The New Multi-tasker
Just another window of reality!
Most children know more about the Internet than their parents! 20% of parents dont monitor their children on the Internet at all. Only 52% moderately supervise their children. 62% of teens report that their parents know little or nothing about their web activities. 71% of parents stop monitoring after the child turns 14, not knowing that 72% of Internet related missing children are 15 years of age or older!
Obstacles to Safety Most parents do not talk to their children about Internet Safety for 3 reasons: Lack of Knowledge Denial Discomfort
Instant Messaging Vocabulary BRB26Y4U F2FIOH IRLG2G IDKPOS Can you read these acronyms? Too sexy for you Face to face Parent Over Shoulder
How hard is it for a predator to target a child? Using internet technology… Prepared by Washington State Attorney General Christine O. Gregoire (used by permission)
Luring starts with target identification and selection The predator is intrigued by Amanda...
Most online or Internet service providers provide user directories or Member Profiles to assist their members to identify others with similar interests.
The predator continues the search for information about Amanda by checking her Member Profile.
He types in her chatroom name...
Using the locate command, he can track and follow Amanda wherever she goes in Cyberspace.
He can also email or instant message her by using the email command.
is most likely a female child Is interested in seashells, rollerblading and English class has a little brother has a valid email address After 2 minutes, the predator knows that Amanda:
Using Deja News or AltaVista, the predator can check for more information on Amanda by searching chatroom or newsgroup postings Using the Power Search option he continues searching for specific information on Amanda
Using Amandas email address, he can search for any of her chatroom postings.
Amandas chatroom postings tell the predator when and where the messages were posted, and the text of each message.
Contained within Amandas posted messages are pertinent details of her life, including her phone number!
Her first name is Amanda She is a young girl who likes beanie babies, rollerblading, and English class She has a baby brother She has a Mom or sister named Sue She lives on the East Coast She or her mom get home every day at 5:30 Her home telephone number Within 12 minutes he knows:
What can the predator find out about Amanda from her telephone number?
The online phone directory reveals that Amandas phone number belongs to the Welch family. This means that the predator now knows Amandas last name. Good news. Most of these services will allow you to change or eliminate your personal data from the directories.
Using Amandas last name, the predator can now find her address.
Here she is!
One click and he can see where she lives.
A map of the U.S. reveals her city and state…
Driving directions make it so easy to find her house.
His target is a female child Her full name is Amanda Welch Her email address is Amanda01@aol.com She likes seashells, rollerblading and English class She has a baby brother She collects or trades beanie babies The full names of her mother, father, and brother Her home telephone number is 410 745-8454 Shes probably home by 5:30 weekdays or Mom arrives home from work then She lives at 618 Hammerstone Drive in Laurel, Maryland The specific directions to her home Within 45 minutes he knows:
Two Approaches: Education or Intervention
The Story of Ned Ludd
Whats a parent to do Parents should create an account at myspace and sign on. It's free and only takes a minute. It may be hard to find your child's profile, but here's a tip: search for your child's school, and look for those students listed. If you find your child's name, or one of their friend's, check the "friends' list.'' Clicking on a comment posted there takes you to that kid's personal myspace site. Think that's too sneaky? Understandable. There is an easier way. Bob Ravasio, the father of a teen in the Larkspur district, says he simply told his daughter he'd like to see her profile.
OR… try Anywho.com Reverse number lookup Too much information could allow Internet predators to find you, stalk you. Don't put where you work-- what time you do something--- where you are going to be at a certain time.
Free Online Music Leaves Sad Song of Identity Theft Peer to Peer Dangers. Gnutellla, LimeWire, Mp3Rocket Malicious hackers are sharing files laced with hidden codes. You unleash a command that sends the hacker information you think is protected. – keylogger. Instead of only getting files in your shared folder the hacker can get into your banking folder, your bill folder, and other private documents in your computer.
Porn Industry At 12 Billion a Year! Microsoft 36 billion Porn revenue is larger than all combined revenues of all professional football, baseball and basketball franchises.. US porn revenue exceeds the combined revenues of ABC, CBS, and NBC – 6.2 Billion. 2001 Kaiser Family Foundation study 2001 Kaiser Family Foundation study found that 70% of teens (ages 15- 17) had "accidentally come across" pornography while on the Internet. Of these teens, 55% said "being exposed to pornography would have a serious impact on kids under 18." found that 70% of teens (ages 15- 17) had "accidentally come across" pornography while on the Internet. Of these teens, 55% said "being exposed to pornography would have a serious impact on kids under 18."
Editor: Former Governor Dick Thornburgh One of the most thorough reports on protecting children from Internet pornography. John Schwartz, The New York Times
Tricks Pornographers Play Deception Entrapment Dangerous Downloads File Sharing
Childrens Internet Porn Statistics- 2003* AGE 11 Average age of first Internet exposure to pornography Ages 12-17 Largest consumer of Internet pornography 80% 15-17 year olds having multiple hard-core exposures 90% 8-16 year olds having viewed porn online (most while doing homework)
A Pretty Decent Analogy Filtering software is like The Club steering wheel lock. The Club wont prevent someone from stealing your car... but it will slow them down a bit.
New Technology Meets Old Fashion Methods
Pornography's Effects on Adults and Children by VICTOR B. CLINE, Ph.D. In an in-house study conducted by the Los Angeles Police Department's Administrative Vice division, in 60 percent of the child molestation cases referred to them over a 10-year period, adult or child pornography was used to lower the inhibitions of the children molested or to excite or sexually arouse the perpetrator of the abuse. In another study of 43 pedophiles, child pornography was found used in every one of the cases investigated. The officers reported the abusers repeatedly saying the same thing: "I used this stuff to stimulate the child, to break down his inhibitions."
MORE THAN THREE OUT OF FOUR ADULTS SUPPORT THE U.S. JUSTICE DEPARTMENT'S CRACKDOWN ON ILLEGAL OBSCENITY NEW YORK (November 15, 2005) - More than three out of four (77%) adult Americans support the Justice Department's effort to enforce federal obscenity laws, according to results of a survey conducted by Harris Interactive for Morality in Media.
The Fourth Screen Cinema Computer Television
No Controls For the cell-phone industry, porn is a way of attracting new clients and collecting fees for keeping them online longer. Industry analysts have said the relationship with the porn industry is hidden behind different and sometimes interlocking companies so the industry can claim it has no responsibility for what people are doing with the equipment and the technology. The FCC fact sheet notes that while blocking technology that parents can use is available for televisions and home computers, it is not for cell phones.
ID Theft of Kids ½ million kids have had their identity stolen! Of the more than 255,000 identity theft complaints filed with the U.S. Federal Trade Commission last year, 5 percent involved people under the age of 18. That's up from 3 percent in 2003 and the age category that grew the most in the two-year period. College students and young adults age 18 to 29 make up 29 percent of those filing complaints.
The number of victims of identity theft by hackers using the popular online game "Lineage" may reach as many as 1.22 million people.
TINSTAAFL!! TINSTAAFL!! (There is no such thing as a free lunch!) Teaching Consumer Skills To Children
Two Approaches: Education -- Intervention
QUESTION: HOW DO YOU EDUCATE KIDS WHO THINK THEY ALREADY KNOW ALL THERE IS TO KNOW ABOUT INTERNET SAFETY? ANSWER: CHALLENGE THEM TO OUTWIT AN INTERNET PREDATOR.
Web Wise Kids Approach Divergence from the lecture format: Web Wise Kids offers a Fun and Educational CD ROM computer detective game called Missing. Ongoing support and education: Web Wise Kids offers parents, teachers, youth leaders, and law enforcement the use of a prepared Internet safety program.
The Missing Computer Game The Centerpiece of Our Program Missing focuses on children ages from 11 to 14 The Games Scenario Based on the true story of a 14-year-old boy The goal is to find this boy before he vanishes.
EACH PART OF THE GAME IS A LESSON 1. JUST FRIENDS – illustrates how predators initiate a friendship with vulnerable children. 2.BAITING THE HOOK – examines how a predator encourages a child to think about leaving home.
3.CAUGHT IN THE NET – illustrates the difficult position of a child who is caught between his family and his new friend. 4.LIVING IN PARADISE – illustrates how the predator treats a child during the brief period after they have met in person.
5.CLOSING THE TRAP – explores the shadowy world of child pornography and abuse. 6.THE BETRAYAL – explores how a predator may react when the authorities are closing in on him.
An Internet Safety Plan Encourages kids to come up with their own guidelines for online behavior Encourages kids to discuss openly in classroom and with parents Creative assignments help them internalize what theyve learned Seek agreement with others whenever possible
MISSING GAME LEADS TO CAPTURE OF 3 ONLINE PREDATORS Community Partners have helped reach over 1.5 million children!
Awards Missing is the proud recipient of: Computerworld Smithsonian / Computerworld Award Canadian High Technology Information Highway Award
How Do You Know If It Is Safe? Funny feeling – Conscience - Instinct - Intuition
Develop Your Own Internal Internet Filter Fraud is based on trust Love affairs are based on trust Friendship is based on trust You can only be a victim if you participate in this fantasy of trust!
Coming Soon! Mirror Image Air Dogs
CHILD LURES PREVENTION www.childlures.org. Child Lures Community Plan for Prevention of Sexual Abuse, Abduction, Internet Crime, Substance Use/Abuse and School Violence
Child Lures Prevention: The Sole Safe Environment Program featured at The White House Conference on Missing, Exploited & Runaway Children October, 2002
Long before Ken Wooden was known as a child safety expert, he was heralded as a champion for children. During his years as investigative reporter for network television, Ken's work consistently revolved around issues affecting children, particularly sexual exploitation. A published author with a background in education, he devised a plan to interview convicted sex offenders and abductors. During hundreds of such interviews, Ken uncovered the diverse and imaginative strategies used by sexual predators to lure victims. These "lures," coupled with Ken's proven prevention techniques, are the foundation of all Child Lures prevention materials. Ken was appointed NBC News/Today Shows child personal safety consultant in February, 2004. He is a familiar face on the national news, and Oprah Winfrey has touted her program featuring Ken Wooden and Child Lures as her most important ever. Child Lures Prevention was the sole prevention program featured at the October, 2002 White House Conference on Missing, Exploited and Runaway Children. Ken Wooden has testified before the US Congress on twelve separate occasions. Ken Wooden Author of Child Lures Prevention
Child Lures School Program Kit Includes: Presenters Video, Student Video, Presenters Guide with scripted lesson plans for Elementary & Middle/High School students. Teaches children how to recognize inappropriate behavior and what to do if it occurs. A positive, non-explicit and non-threatening program for schools. Scientifically evaluated & proven to be effective.
Detailed explanation of the 16 Lures commonly used by child molesters & abductors Prevention strategies for each of the 16 lures Tips for Keeping Your Child Safe Explaining the Concept of Law to Children Explaining the Stranger/Danger Myth Internet Safety, including Family Internet Safety Pact The Lure of Hate & Violence - bullying, sexual harassment, racism & school violence What To Do If Sexual Abuse Occurs: If Your Child Discloses Sexual Abuse What To Do If Your Child is Missing: Child Lures Prevention Early Response System Share it with your local police department! Child Lures Parent Guide
The 17 Child Lures 1. Affection 2. Assistance 3. Pet 4. Authority 5. Bribery 6. Ego/Fame 7. Emergency 8. Fun & Games 9. Hero 10. Job 11. Name Recognition 12. Playmate 13. Threats/Weapons 14. Pornography 15. Computer Online 16. Drugs 17. Hate & Violence
Crimes against Children Research Center, University of New Hampshire www.unh.edu/ccrc Janis Wolak Kimberly Mitchell David Finkelhor, Director The following slides are the recommendations of the University of New Hampshire Study
Revise stereotypes used in publicity and training! Because Internet-initiated offenders Are rarely violent or aggressive Do not rely primarily on deception Do not target prepubescent victims –Are not pedophiles Often operate locally Rarely abduct Are not strangers to victims Exploit the willingness of young adolescent to contemplate sexual relationships with adults
Current prevention focus We tell adolescents: Dont go to meetings with strangers Dont give out personal information Beware of deception Tell an adult if someone makes you uncomfortable
What is missing? For teenagers: Why having sexual relationships with older men is a bad idea For adults: Why having sex with teenagers is a bad idea For parents Why to have this conversation with your kids
Teens should know This is a crime for adults; theyll go to jail The sense of being understood and appreciated may be a manipulation Caring and responsible adults do not proposition kids Victims feel betrayed If you pose for sexual pictures, they may come back to haunt you Dont be a sucker
To promote this message, we have to be willing to discuss how minors contribute to the offenses !
Dumb Things To do With Your Computer!
Revising stereotypes has implications for training. Counteract police and prosecutor prejudices about statutory/compliant victims Psychology of statutory victims Psychology of gay youth Techniques for working with less cooperative teen victims Vertical prosecution, advocates, peer support
Tell a trusted adult! Your life may depend on it!