Presentation is loading. Please wait.

Presentation is loading. Please wait.

“Homeland Insecurity” Inspect Your Gadgets

Similar presentations

Presentation on theme: "“Homeland Insecurity” Inspect Your Gadgets"— Presentation transcript:

1 “Homeland Insecurity” Inspect Your Gadgets
Protecting Our Children In A Technologic World “Your home is your castle. Has the mote been bridged?” My background… Teens use the Internet an average of 8.5 hours per week for chatting and ing, compared to 1.8 hours spent using it for school work. An estimated 18.8 million kids under 18-years-old have access to home computers. Should I just forbid my child from going online? There are dangers in every part of our society. By educating your children to these dangers and taking appropriate steps to protect them, they can benefit from the wealth of information now available online. Playboy’s web site, which offers free teaser shots of its Playmates, averages 5 million hits per day. In August, 1997, there were 92,000 sexually explicit sites on the Internet and an estimated 266 new porn sites every day. "Adult" entertainment is estimated to be the largest sector of sales on the Internet. The vast majority of Americans (94%) believe a ban on Internet pornography should be legal. UNICEF estimates that one million children are forced into prostitution or used to produce pornography each year. Many are handed over (or sold) by their families driven by the extremes of poverty....The Internet also has given dealers in child pornography a far bigger audience--and anonymity. We currently have no legal means to protect children from sexually explicit material on the Internet. The door has been flung open wide for pornographers and sexual predators. Pornography is the third largest sector of sales in cyberspace, with annual revenues of over $100 million. (Boston Sunday Globe, 12/1/96) -There are over 92,000 commercial porn sites on the Internet (Family Connect, 1/31/98) -The pornographic non-commercial Internet sites, public newsgroups (,) are all as accessible to an intrepid 10-year-old as to an adult. -Exposing children to pornography, either actively or passively, is a form of child sexual abuse. Story of janitor at computer store… Stories from my children…

2 My Journey / My Family


4 IBM Cards



7 Cell Phone, Camera, Computer?
= + + (Department for Education & Skills) What are the dangers for young people? At the moment 3 do not offer full internet connectivity as part of their service and they say they have no plans to do so: in other words, apart from s, they are only providing access to their own content and services. The other providers of new services say they will, sooner or later, provide full internet access so, potentially, all of the dangers of the fixed internet will be replicated via these mobile devices but, precisely because they are mobile, they will be much harder to regulate and supervise. Potential dangers can typically be grouped into several key areas: Exposure to inappropriate materials Children and young people may be exposed to material that is pornographic, hateful or violent in nature or encourages activities that are dangerous or illegal. Equally so, content may simply be age inappropriate, inaccurate or misleading. At the moment there appear to be no technical solutions to filter content and block unwanted contacts via mobiles although this issue has now been raised with all of the companies concerned so we can expect that situation to change, but it may not be for some time. The most likely way in which it will change, in the short run, is that 3G devices for children will only have access to a limited range of services or places. Physical danger There is a risk that whilst online, a child may make inappropriate ‘friends’, perhaps providing information or arranging a meeting that could risk his or her safety or the safety of family members or friends. This is perhaps the most worrying and extreme risk associated with fixed internet use. With the mobile internet, these risks can potentially be greater. As mobile phones are such personal and private devices it will be difficult for parents to supervise access and contacts in the same way as they would a PC in the home. Mobile phones are typically always on and hence a child is always contactable and always vulnerable. The rich content capabilities of 3G phones means that young people may be sent inappropriate images or videos, or be encouraged to send back images or videos of themselves using integrated cameras. The integration of cameras within mobile phones may also result in photos of children and young people being taken and circulated or posted on websites without their knowledge or permission. A new generation of services may also provide more opportunities for personal contact, for example by SMS (short message service) or MMS (multimedia message service) chat, online gaming or dating services. Additionally, location-based capabilities may mean that it is possible to pinpoint the exact location of children and young people. Whilst this may be welcomed by parents keen to know where their child is at all times, it is not difficult to see how misuse of the technology could arise. Online bullying Online bullying, for example by text message, or via websites is a growing concern associated with the fixed internet and mobile telephone use. Mobile internet may unfortunately offer a further way for bullies to torment their victims. Legal financial and commercial considerations With the fixed internet there are concerns that a child could do something that has legal or financial consequences such as giving out a parent’s credit card details or doing something that contravenes another person’s rights. Plagiarism and copyright are particular issues which are associated with internet, especially in relation to downloading music or games. Research also shows that children are not able to differentiate between what is advertising and what is not. Again, all of these issues could potentially increase with the mobile internet with easy access to chargeable content in the form of games, downloads, ring tones, logos and other services – all of which are particularly attractive to children and young people. The facility to pay for goods and services using mobile phones as an ‘electronic wallet’ is also set to increase. Spam by text message is already a growing problem, and the rich media capabilities of 3G devices will undoubtedly mean that advertisers become more sophisticated in their campaigns. New threats from an unlikely sources.


9 Harmless fun????? The technology has…. Kids haven’t changed!
Who is most at risk? The Thornburgh Committee concluded it is 15-year-old girls who disclose too much personal information in chat rooms because they "just know" that they can somehow "tell" whether an Internet "friend," whom they have not yet met in person, is who he or she claims to be. An hour or two with our NCMEC experts could save these girls a lot of grief. Kids haven’t changed! The technology has….

10 New Home with Rapunzel Tower
“When she is ready” New Home with Rapunzel Tower Tower outfitted for girls years of age. No modern conveniences Convenient food dumb waiter Convent nearby to assist in transition to modern life.

11 The oldest child predator story….

12 has a present day twist!

13 The Wolf Has A New Disguise

14 Media Hype???

15 “The free access which many young people have…has poisoned the mind and corrupted the morals of many a promising youth.” Reverend Enos Hitchcock, Memoirs of the Bloomsgrove Family, 1790

16 Society for the Prevention of Cruelty to Children, 1909
“This new form of entertainment has gone far to blast maidenhood…Depraved adults with candies and pennies beguile children with the inevitable result” Society for the Prevention of Cruelty to Children, 1909

17 The Knights of Columbus…1933
“Does it break up the home life and the old practice of visiting friends?” The Knights of Columbus…1933

18 The New Generation Gap

19 The Culture War Against Kids Mike Meles –
Perhaps no period in history has witnessed such rapid improvements in adolescent conduct! From 1990 through 1999, teenage violence and other malaise plunged: homicide rates (down 62 percent) rape (down 27 percent), violent crime (down 22 percent), school violence (down 20 percent), property offenses (down 33 percent), births (down 17 percent), abortions (down 15 percent), sexually transmitted diseases (down 50 percent), violent deaths (down 20 percent), suicide (down 16 percent), and drunken driving fatalities (down 35 percent American youth do suffer real threats (as opposed to fictional booze marketing and R-rated movies). Fourteen million kids grow up in abject poverty, 2,000 die and half a million are treated in hospital emergency rooms from domestic violence every year, and 15 million have addicted parents

20 Additional crime facts at a glance
U.S. Department of Justice · Office of Justice Programs Bureau of Justice Statistics Additional crime facts at a glance Violent crime rates declined since 1994, reaching the lowest level ever recorded in 2004.

21 Rape rates continue to decline.
About seven in ten female rape or sexual assault victims stated the offender was an intimate, other relative, a friend or an acquaintance

22 Teen Drug Abuse Continues Its Three-Year Decline
May 2005 Teen Drug Abuse Continues Its Three-Year Decline Cigarettes. Smoking among teenagers continues to decline from peak levels in the mid-1990s

23 What about our state? Among the Best in the Nation in Students Going on to College: Pennsylvania ranks 4th in the nation One of the Best Graduation Rates in the Country: Pennsylvania's public high school graduation rate is among the top 6 in the country Classroom Behavior Is Improving: The proportion of Pennsylvania educators saying they were very satisfied or satisfied with student behavior increased from 51% to 64% over the past four years. Widespread Internet Access: Almost all of the public schools in Pennsylvania (98%) have internet access. U.S. Department of Justice · Office of Justice Programs Bureau of Justice Statistics – Pennsylvania violence and crime in schools have showed a steady decrease in the last decade. .


25 The murder of a child who is abducted by a stranger is a rare event.
There are estimated to be 100 such incidents in the United States each year, less than one half of one percent of the murders committed. There is approximately one child abduction murder for every 10,000 reports of a missing child.

26 Do we believe……? David Finkelhor, a criminologist at the University of New Hampshire has studied internet-related crime He reports: “There are new perils for kids, but no evidence that kids are on the whole more endangered today as a result of the Internet.”

27 It is assumed that things happen quickly for the unsuspecting victim.
2004 study by Wolak and Finkelhor, financed by the U.S. Department of Justice points out a number of fallacies It is assumed that things happen quickly for the unsuspecting victim. Actually most abusers correspond with their victims for a least a month and most have telephone conversations before meeting. It is assumed that most internet predators pretend to be peers. Actually only 5% do. It is assumed that sex is not mentioned by the abuser. Actually, most freely discuss sex and most victims freely agree to it. Only about 16% are coerced into sex.

28 Youth are two to three times more likely than adults to be the victims of an assault, robbery,  or rape, according to the National Crime Victimization Survey Nearly half of all rape victims are girls under the age of 18

29 Chances your kids could be in trouble….
Almost 40 percent of American high school students have posted personal information such as names, addresses, age and gender on the Web, according to iSafe student surveys, and 12 percent have had face-to-face meetings with people they have met online. In 2003, about 7% of public and private school students age reported that they have been bullied at school within the past six months



32 has jumped from zero to more than 50 million users in just two years.
Too much information could allow Internet predators to find you, stalk you. Don't put where you work-- what time you do something--- where you are going to be at a certain time.

33 @myspace An ad-saturated Gen-Y playground owned (and mined for marketing data) by as regrettable an intersection of business, media, and politics as exists: Rupert Murdoch's News Corp. Fast becoming an obligatory whistle-stop for pop-icon aspirants eager for MySpace's prime audience: 14- to 34-year-olds. Mr. Murdoch says the networking site will drive traffic to his Fox TV sites.

34 Just how big is it? MySpace, which was created in 2003 and has exploded to include some 60 million registered users, has become the dominant social networking site, eclipsing others like,, and

35 Music….Music…..Music "MySpace now draws so much traffic that it accounted for 10% of all advertisements viewed online in the month."  Businessweek What does all of this have to do with music?  One of the main drivers of the myspace growth explosion has been its focus on music combined with social networking services. 


37 Teen blogs are not about the technology
They are about feelings of belonging and being loved. They are about trying on different personalities. They are about someone who feels isolated connecting with others who share their interests or insecurities.

38 MySpace’s terms of service say that it’s open to people 14 or older
BUT……. there is no age verification process to prevent younger kids from setting up an account by lying about their date of birth.

39 News Flash ! - April 2006 myspace has new Safety Czar –
Nemu Nigum – hired away from Microsoft - former trial attorney with Dept. Of Justice Reacting to calls for legislation and congressional hearings. Cuts 250,00 profiles of kids under 14.

40 Private Information on the Internet is an……

41 My Space Legal jargon Links Use of Cookies uses cookies to store visitors' preferences and to record session information, for purposes including ensuring that visitors are not repeatedly offered the same advertisements and to customize newsletter, advertising, and Web page content based on browser type and user profile information. We do not link the information we store in cookies to any personally identifiable information you submit while on our site. You may be able to configure your browser to accept or reject all or some cookies, or notify you when a cookie is set -- each browser is different, so check the "Help" menu of your browser to learn how to change your cookie preferences -- however, you must enable cookies from in order to use most functions on the site Please note that MySpace allows 3rd party advertisers that are presenting advertisements on some of our pages to set and access their cookies on your computer. Advertisers' use of cookies is subject to their own privacy policies, not the MySpace Privacy Policy. Links contains links to sites. is not responsible for the privacy policies and/or practices on other sites. When linking to another site a user should read the privacy policy stated on that site. Our privacy policy only governs information collected on


43 What do teens think? Most teens say they know to be wary of strangers online, but do not share the angst about posting personal information. Growing up today means living with the fact that there are going to be pictures of you and other personal data on the Web for all to see.

44 Would Your Billboard Say:
Come see me naked I committed crimes I got away with I love to party and drink I hate black people (white people, Mexicans..) Pewnn State students posted

45 Who’s Looking (and doing background checks)
Employers Bankers Insurance Brokers College Admission Officers

46 You can’t control where it goes after you post it.
Question to ask yourself: 10 Years from now would you like this information to be viewed? You can’t control where it goes after you post it. Even if you no longer post or try to delete the site it can be retrieved!

47 Cam-Girl Charged With Sexually Abusing Herself
Several months ago police in Latrobe, PA charged a 15-year-old girl with possession of child pornography, sexual abuse of children, and dissemination of child pornography. The twist? The alleged victim is also the alleged perpetrator. The girl allegedly acted as both sexual predator and prey by sending images of herself in various states of undress to people that she met in chat rooms.

48 Camgirls

49 And…. Sugar Daddies


51 “Because the “gift” is sent directly to the store, the admirer doesn’t see the teen address. This may often give a false sense of security and protection.” i-Safe Times November 2004

52 While internet companies like AOL and Yahoo
While internet companies like AOL and Yahoo! have cracked down on internet predators in their chat rooms, the detectives say predators have just moved to other internet sites, like ''

53 FBI estimate ¼ to ½ million predators on-line!
First chat rooms – then blogs – now myspace and facebook You may be accountable by employers your school and the community for what you post on-line – teaching consequences.

54 Profile of the Typical Teen Lured Online
Intelligent Usually middle class or higher Low self esteem Bored Loner, quiet Access to a computer Little/no history of running away

55 The Perfect Victim: 11-14 No or little parental involvement
No definite bedtime Can be away from home without anyone knowing where he/she is Has exclusive use of the computer in a private area This list was compiled from a document entitled, “Characteristics of a Fictitious Child Victim: Turning a Sex Offender’s Dreams Into His Worst Nightmare” by James F. McLaughlin. [Note: I do reference Detective McLaughlin’s materials throughout this presentation. He has some solid data that goes much further than simply stating that predators may be lurking in chat rooms.]

56 Profile of an Internet predator is not what you may think!
Stereotype myth is that they are homosexual and loners. Many predators are very sociable and often popular in the community. Are primarily (but not always) male, masculine, better-educated, more religious than average, in their thirties, and choose jobs allowing them greater access to children. Are usually family men, have no criminal record, and deny that they abuse children, even after caught, convicted, incarcerated, and court-ordered into a sex offender program.

57 2005 Kaiser Family Foundation Report
20% of kids can surf from their bedroom. 40% of homes have more than 1 computer. 53% of kids 8-18 said the family had no rules on TV viewing. Exposure to risqué TV programming, violent video games and salacious Internet sites have led to a “Silent Epidemic” – Sen. Hillary Rodham Clinton

58 Multitasking Kids 34% of kids from 5-19 years old had cell phones by the end of 2004. Mobisodes, Vclips, and Internet Access can bring adult content to a full color screen to your child. No laws that address indecency or violence on wireless phones

59 The New Multi-tasker

60 Just another window of reality!

61 Most children know more about the Internet than their parents!
20% of parents don’t monitor their children on the Internet at all. Only 52% moderately supervise their children. 62% of teens report that their parents know little or nothing about their web activities. 71% of parents stop monitoring after the child turns 14, not knowing that 72% of Internet related missing children are 15 years of age or older! Internet pornography is easily accessible by children, intentionally and unintentionally (example: using the word search "toys" and receiving links to "Adult Sex Toys" and "Horny Housewives and Their Boy Toys.")

62 Obstacles to Safety Most parents do not talk to their children about Internet Safety for 3 reasons: Lack of Knowledge Denial Discomfort So while our children are being bombarded with all kinds of things online, parents are facing their own challenges……. Parents and teachers are often unaware that many predators are shifting their activities to the Internet. Many parents believe that a predator could never lure their children into a sexual encounter. They believe that predators can only reach children who are particularly vulnerable. Parents say they are uncomfortable talking to their children about sexual predators. Let’s face it….it’s already a challenge for a parent to have a conversation about sex with their child…..add to that the medium of computers and the internet….and you have what can be perceived as an impossible conversation. All of these things contribute to what we now know as the “DIGITAL DIVIDE”……

63 Instant Messaging Vocabulary
Can you read these acronyms? BRB 26Y4U F2F IOH IRL G2G IDK POS Too sexy for you Face to face Parent Over Shoulder

64 How hard is it for a predator to target a child?
Using internet technology… Prepared by Washington State Attorney General Christine O. Gregoire (used by permission)

65 Luring starts with target identification and selection
The predator is intrigued by Amanda...

66 Most online or Internet service providers provide user directories or Member Profiles to assist their members to identify others with similar interests.

67 The predator continues the search for information about Amanda by checking her Member Profile.

68 He types in her chatroom name...

69 Using the locate command, he can track and follow Amanda wherever she goes in Cyberspace.

70 He can also email or instant message her by using the email command.

71 After 2 minutes, the predator knows that Amanda:
is most likely a female child Is interested in seashells, rollerblading and English class has a little brother has a valid address

72 Using Deja News or AltaVista, the predator can check for more information on Amanda by searching chatroom or newsgroup postings Using the Power Search option he continues searching for specific information on Amanda

73 Using Amanda’s email address, he can search for any of her chatroom postings.

74 Amanda’s chatroom postings tell the predator when and where the messages were posted, and the text of each message.

75 Contained within Amanda’s posted messages are pertinent details of her life, including her phone number!

76 Within 12 minutes he knows:
Her first name is Amanda She is a young girl who likes beanie babies, rollerblading, and English class She has a baby brother She has a Mom or sister named Sue She lives on the East Coast She or her mom get home every day at 5:30 Her home telephone number

77 What can the predator find out about Amanda from her telephone number?

78 The online phone directory reveals that Amanda’s phone number belongs to the Welch family. This means that the predator now knows Amanda’s last name. Good news. Most of these services will allow you to change or eliminate your personal data from the directories.

79 Using Amanda’s last name, the predator can now find her address.

80 Here she is!

81 One click and he can see where she lives.

82 A map of the U.S. reveals her city and state…

83 Driving directions make it so easy to find her house.

84 Within 45 minutes he knows:
His target is a female child Her full name is Amanda Welch Her address is She likes seashells, rollerblading and English class She has a baby brother She collects or trades beanie babies The full names of her mother, father, and brother Her home telephone number is She’s probably home by 5:30 weekdays or Mom arrives home from work then She lives at 618 Hammerstone Drive in Laurel, Maryland The specific directions to her home


86 Source:

87 Two Approaches: Education or Intervention

88 The Story of Ned Ludd In one sense it could be said that Luddism began on the night of 4th November 1811, in the little village of Bulwell, some four miles north of Nottingham, when a small band of men gathered in the darkness, counted off in military style, hoisted their hammers and axes and pistols, and marched to the home of a `master weaver' named Hollingsworth. They posted a guard, suddenly forced their way inside through shutters and doors, and proceeded to destroy a half-dozen weaving machines of a kind they found threatening to their trade .

89 What’s a parent to do Parents should create an account at myspace and sign on. It's free and only takes a minute. It may be hard to find your child's profile, but here's a tip: search for your child's school, and look for those students listed. If you find your child's name, or one of their friend's, check the "friends' list.'' Clicking on a comment posted there takes you to that kid's personal myspace site. Think that's too sneaky? Understandable. There is an easier way. Bob Ravasio, the father of a teen in the Larkspur district, says he simply told his daughter he'd like to see her profile.

90 OR… try Reverse number lookup
Too much information could allow Internet predators to find you, stalk you. Don't put where you work-- what time you do something--- where you are going to be at a certain time.

91 Free Online Music Leaves Sad Song of Identity Theft Peer to Peer Dangers.
Gnutellla, LimeWire, Mp3Rocket Malicious hackers are sharing files laced with hidden codes. You unleash a command that sends the hacker information you think is protected. – keylogger. Instead of only getting files in your shared folder the hacker can get into your banking folder, your bill folder, and other private documents in your computer.


93 2001 Kaiser Family Foundation study
Porn Industry At 12 Billion a Year! Microsoft 36 billion Porn revenue is larger than all combined revenues of all professional football, baseball and basketball franchises.. US porn revenue exceeds the combined revenues of ABC, CBS, and NBC – 6.2 Billion. 2001 Kaiser Family Foundation study found that 70% of teens (ages 15-17) had "accidentally come across" pornography while on the Internet. Of these teens, 55% said "being exposed to pornography would have a serious impact on kids under 18."

94 Editor: Former Governor Dick Thornburgh
“One of the most thorough reports on protecting children from Internet pornography.” John Schwartz, The New York Times

95 Tricks Pornographers Play
Deception Entrapment Dangerous Downloads File Sharing Deception – Porn Napping – stealing expired sites – Ernst & Young, AOL, even the US Dep't of Education Cyber Squatting – legitamite topics “” whithouse.goc. Doorway scams – common non-porn them then link to porn sites. Misspelling – extra “l” in google would get you to an Asian porn site. Advertising – pop uip add with fake system errorsa, message alret boxes, false forms – you click ok and you are at porn site. Entrapment Looping – never ending loop of porn pages – close a new one opens. Mousetrapping- will alter the black button or close feature – you cant get out – lost control of your browser. Start Up Alteration – start up directory send you to porn site – you will need help removing .Cookies. Dangerous Downloads Dialers – Live Action – webcams Mail Spoofing – false sense of security – from someone you know Peer-to-Peer Bulletin Board – easier to hide for pornographers

96 Children’s Internet Porn Statistics- 2003*
AGE 11 Average age of first Internet exposure to pornography Ages 12-17 Largest consumer of Internet pornography 80% 15-17 year olds having multiple hard-core exposures 90% 8-16 year olds having viewed porn online (most while doing homework)

97 A Pretty Decent Analogy
Filtering software is like “The Club” steering wheel lock. The Club won’t prevent someone from stealing your car ... but it will slow them down a bit.

98 New Technology Meets Old Fashion Methods

99 Pornography's Effects on Adults and Children by VICTOR B. CLINE, Ph.D.
In an in-house study conducted by the Los Angeles Police Department's Administrative Vice division, in 60 percent of the child molestation cases referred to them over a 10-year period, adult or child pornography was used to lower the inhibitions of the children molested or to excite or sexually arouse the perpetrator of the abuse. In another study of 43 pedophiles, child pornography was found used in every one of the cases investigated. The officers reported the abusers repeatedly saying the same thing: "I used this stuff to stimulate the child, to break down his inhibitions."

MORE THAN THREE OUT OF FOUR ADULTS SUPPORT THE U.S. JUSTICE DEPARTMENT'S CRACKDOWN ON ILLEGAL OBSCENITY NEW YORK (November 15, 2005) - More than three out of four (77%) adult Americans support the Justice Department's effort to enforce federal obscenity laws, according to results of a survey conducted by Harris Interactive for Morality in Media.

101 Cinema Computer Television The Fourth Screen Your Cell Phone

102 Podcasting

103 No Controls For the cell-phone industry, porn is a way of attracting new clients and collecting fees for keeping them online longer. Industry analysts have said the relationship with the porn industry is hidden behind different and sometimes interlocking companies so the industry can claim it has no responsibility for what people are doing with the equipment and the technology. The FCC fact sheet notes that while blocking technology that parents can use is available for televisions and home computers, it is not for cell phones.

104 ID Theft of Kids ½ million kids have had their identity stolen!
Of the more than 255,000 identity theft complaints filed with the U.S. Federal Trade Commission last year, 5 percent involved people under the age of 18. That's up from 3 percent in 2003 and the age category that grew the most in the two-year period. College students and young adults age 18 to 29 make up 29 percent of those filing complaints.

105 The number of victims of identity theft by hackers using the popular online game "Lineage" may reach as many as 1.22 million people.

106 (There is no such thing as a free lunch!)
TINSTAAFL!! (There is no such thing as a free lunch!) If its span its scam is a safe approach to online merchants offering things to good to be true. Teaching Consumer Skills To Children

107 Two Approaches: Education -- Intervention




111 Intermission


113 Web Wise Kid’s Approach
Divergence from the lecture format: Web Wise Kids offers a Fun and Educational CD ROM computer detective game called Missing. Ongoing support and education: Web Wise Kids offers parents, teachers, youth leaders, and law enforcement the use of a prepared Internet safety program. We have to reach children in their own medium. Computers and games!

114 Missing Describe the Missing School Kit – 2 parts – a video & workbook format for adults and the a detective game & notebook for kids

115 The Missing Computer Game The Centerpiece of Our Program
Missing focuses on children ages from 11 to 14 The Game’s Scenario Based on the true story of a year-old boy The goal is to find this boy before he vanishes. There are two main parts to the Missing game. Usually, we come into the classroom to give the first program, and then return the following week for the second part. As a sidebar, however, the game is flexible and can be presented in a number of different ways….since each CD is divided into 3 sections, any combination of sections can be used for implementation….1 per day, 2 per day, and so on…… In this example, we start with the entire first portion of the game (CD Rom 1). The kids are invited by the RCMP and a worried father to join in a fact-finding mission, to gather clues and to search for his boy – before he crosses an international border. And just as they become close to finding Zack, the main character, he slips through their fingers. We then give the students about a week to consider and discuss what happened in the first part of the game. We return and facilitate the 2nd part of the game (CD Rom 2), in which the role-playing detectives must scour the city of San Diego to find Zack before he disappears forever. At that point, the young detectives either find Zack, or they don’t….and the ending can be happy or difficult….but either way, it is EFFECTIVE. The bottom line is that the kids are invested in the results…..and they have internalized a great deal about internet safety along the way.

1. JUST FRIENDS – illustrates how predators initiate a friendship with vulnerable children. 2. BAITING THE HOOK – examines how a predator encourages a child to think about leaving home.

117 3. CAUGHT IN THE NET – illustrates
3. CAUGHT IN THE NET – illustrates the difficult position of a child who is caught between his family and his new “friend.” 4. LIVING IN PARADISE – illustrates how the predator treats a child during the brief period after they have met in person.

118 5. CLOSING THE TRAP – explores. the shadowy world of child
5. CLOSING THE TRAP – explores the shadowy world of child pornography and abuse. 6. THE BETRAYAL – explores how a predator may react when the authorities are closing in on him.

119 At this point, players realize that they are too late and see that Zack has crossed the border with Fantasma, the suspect.

120 Towards the end of CD-Rom 2, Zack’s dad becomes very frightened, and concerned for Zack’s safety. This gives students an opportunity to empathize with the parental perspective, which is powerful.

121 The lead detective for the US urges players to search diligently for clues on how Fantasma will try to escape…..letting them know that there is limited time……

122 In this example, the players have found Zack and he is being returned home to his relieved father.

123 An Internet Safety Plan
Encourages kids to come up with their own guidelines for online behavior Encourages kids to discuss openly in classroom and with parents Creative assignments help them internalize what they’ve learned Seek agreement with others whenever possible Optional: Pass out Wendy’s 7 Smart Rules for Internet Safety or refer to it being in the packet – only as a basis for discussion – there is also an Internet Safety Plan component within the “Missing” game. What is important is getting the kids actively involved in creating their own safety plan, getting that plan committed to writing so that what they’ve internalized is verbalized….and then to get them to find agreement with their parents in whatever way they can.

Community Partners have helped reach over 1.5 million children! “MISSING GAME LEADS TO CAPTURE OF 3 ONLINE PREDATORS” Various about teenager in SF recognizing tactics of predator….. Through playing the “Missing” game, she recognized the tactics of a predator who was currently seducing her online. In essence, playing the game gave her the ability to articulate her situation and communicate it to her family… the advances of the predator could be intercepted. The “Missing” game helps children have a voice……and we feel that it helps them articulate their feelings about online activity…..

125 Awards Missing is the proud recipient of: Computerworld
Smithsonian / Computerworld Award Canadian High Technology Information Highway Award

126 How Do You Know If It Is Safe?
Funny feeling – Conscience - Instinct - Intuition

127 Develop Your Own “Internal Internet Filter”
Fraud is based on trust Love affairs are based on trust Friendship is based on trust You can only be a victim if you participate in this fantasy of trust!

128 Coming Soon! Mirror Image Air Dogs

Child Lures Community Plan for Prevention of Sexual Abuse, Abduction, Internet Crime, Substance Use/Abuse and School Violence .

130 Child Lures Prevention: The Sole Safe Environment Program featured at The White House Conference on Missing, Exploited & Runaway Children October, 2002

131 Author of Child Lures Prevention
Ken Wooden Author of Child Lures Prevention Long before Ken Wooden was known as a child safety expert, he was heralded as a champion for children. During his years as investigative reporter for network television, Ken's work consistently revolved around issues affecting children, particularly sexual exploitation. A published author with a background in education, he devised a plan to interview convicted sex offenders and abductors. During hundreds of such interviews, Ken uncovered the diverse and imaginative strategies used by sexual predators to lure victims. These "lures," coupled with Ken's proven prevention techniques, are the foundation of all Child Lures prevention materials. Ken was appointed NBC News/Today Show’s child personal safety consultant in February, He is a familiar face on the national news, and Oprah Winfrey has touted her program featuring Ken Wooden and Child Lures as her most important ever. Child Lures Prevention was the sole prevention program featured at the October, 2002 White House Conference on Missing, Exploited and Runaway Children. Ken Wooden has testified before the US Congress on twelve separate occasions.                                                                                                                                               

132 Child Lures School Program Kit
Includes: Presenter’s Video, Student Video, Presenter’s Guide with scripted lesson plans for Elementary & Middle/High School students. Teaches children how to recognize inappropriate behavior and what to do if it occurs. A positive, non-explicit and non-threatening program for schools. Scientifically evaluated & proven to be effective.

133 Child Lures Parent Guide
Detailed explanation of the 16 Lures commonly used by child molesters & abductors Prevention strategies for each of the 16 lures Tips for Keeping Your Child Safe Explaining the Concept of Law to Children Explaining the Stranger/Danger Myth Internet Safety, including Family Internet Safety Pact The Lure of Hate & Violence - bullying, sexual harassment, racism & school violence What To Do If Sexual Abuse Occurs: If Your Child Discloses Sexual Abuse What To Do If Your Child is Missing: “Child Lures Prevention Early Response System” Share it with your local police department!                                      

134 The 17 Child Lures 1. Affection 2. Assistance 3. Pet 4. Authority
5. Bribery 6. Ego/Fame 7. Emergency 8. Fun & Games 9. Hero 10. Job 11. Name Recognition 12. Playmate 13. Threats/Weapons 14. Pornography 15. Computer Online 16. Drugs 17. Hate & Violence





139 The following slides are the recommendations of the University of New Hampshire Study
Crimes against Children Research Center, University of New Hampshire Janis Wolak Kimberly Mitchell David Finkelhor, Director

140 Revise stereotypes used in publicity and training!
Because Internet-initiated offenders Are rarely violent or aggressive Do not rely primarily on deception Do not target prepubescent victims Are not pedophiles Often operate locally Rarely abduct Are not strangers to victims Exploit the willingness of young adolescent to contemplate sexual relationships with adults We need to recognize the diversity of offenders.

141 Current prevention focus
We tell adolescents: Don’t go to meetings with strangers Don’t give out personal information Beware of deception Tell an adult if someone makes you uncomfortable These approaches may work for younger children, but younger children are not the targets of Internet-initiated crimes. We need to expand prevention messages aimed at children and teens. And we need to talk to them directly about sex and the Internet. Many of these youth are not “uncomfortable” about sex. They’re extremely interested.

142 What is missing? For teenagers:
Why having sexual relationships with older men is a bad idea For adults: Why having sex with teenagers is a bad idea For parents Why to have this conversation with your kids We may need different messages for boys. In the U.S., boys who are gay or questioning can feel very isolated. They may feel that older men understand what they are going through.

143 Teens should know This is a crime for adults; they’ll go to jail
The sense of being understood and appreciated may be a manipulation Caring and responsible adults do not proposition kids Victims feel betrayed If you pose for sexual pictures, they may come back to haunt you Don’t be a sucker These are some of the prevention messages we think should be aimed at teens.

144 To promote this message, we have to be willing to discuss how minors contribute to the offenses !

145 Dumb Things To do With Your Computer!


147 Revising stereotypes has implications for training.
Counteract police and prosecutor prejudices about statutory/compliant victims Psychology of statutory victims Psychology of gay youth Techniques for working with less cooperative teen victims Vertical prosecution, advocates, peer support

148 Your life may depend on it!
Tell a trusted adult! Deception – Porn Napping – stealing expired sites – Ernst & Young, AOL, even the US Dep't of Education Cyber Squatting – legitamite topics “” whithouse.goc. Doorway scams – common non-porn them then link to porn sites. Misspelling – extra “l” in google would get you to an Asian porn site. Advertising – pop uip add with fake system errorsa, message alret boxes, false forms – you click ok and you are at porn site. Entrapment Looping – never ending loop of porn pages – close a new one opens. Mousetrapping- will alter the black button or close feature – you cant get out – lost control of your browser. Start Up Alteration – start up directory send you to porn site – you will need help removing .Cookies. Dangerous Downloads Dialers – Live Action – webcams Mail Spoofing – false sense of security – from someone you know Peer-to-Peer Bulletin Board – easier to hide for pornographers Your life may depend on it!

Download ppt "“Homeland Insecurity” Inspect Your Gadgets"

Similar presentations

Ads by Google