Presentation is loading. Please wait.

Presentation is loading. Please wait.

Homeland Insecurity Inspect Your Gadgets Protecting Our Children In A Technologic World Your home is your castle. Has the mote been bridged?

Similar presentations

Presentation on theme: "Homeland Insecurity Inspect Your Gadgets Protecting Our Children In A Technologic World Your home is your castle. Has the mote been bridged?"— Presentation transcript:


2 Homeland Insecurity Inspect Your Gadgets Protecting Our Children In A Technologic World Your home is your castle. Has the mote been bridged?

3 My Journey / My Family


5 IBM Cards



8 Cell Phone, Camera, Computer? = ++ New threats from an unlikely sources.


10 Harmless fun????? Kids havent changed! The technology has….

11 New Home with Rapunzel Tower Tower outfitted for girls years of age. No modern conveniences Convenient food dumb waiter Convent nearby to assist in transition to modern life. When she is ready

12 The oldest child predator story….

13 has a present day twist!

14 The Wolf Has A New Disguise

15 Media Hype???

16 The free access which many young people have…has poisoned the mind and corrupted the morals of many a promising youth. Reverend Enos Hitchcock, Memoirs of the Bloomsgrove Family, 1790

17 This new form of entertainment has gone far to blast maidenhood…Depraved adults with candies and pennies beguile children with the inevitable result Society for the Prevention of Cruelty to Children, 1909

18 Does it break up the home life and the old practice of visiting friends? Does it break up the home life and the old practice of visiting friends? The Knights of Columbus…1933

19 The New Generation Gap

20 Perhaps no period in history has witnessed such rapid improvements in adolescent conduct! From 1990 through 1999, teenage violence and other malaise plunged: homicide rates (down 62 percent) rape (down 27 percent), violent crime (down 22 percent), school violence (down 20 percent), property offenses (down 33 percent), births (down 17 percent), abortions (down 15 percent), sexually transmitted diseases (down 50 percent), violent deaths (down 20 percent), suicide (down 16 percent), and drunken driving fatalities (down 35 percent The Culture War Against Kids Mike Meles –

21 Additional crime facts at a glanceAdditional crime facts at a glance Violent crime rates declined since 1994, reaching the lowest level ever recorded in U.S. Department of Justice · Office of Justice Programs Bureau of Justice Statistics

22 Rape rates continue to decline. About seven in ten female rape or sexual assault victims stated the offender was an intimate, other relative, a friend or an acquaintance

23 Teen Drug Abuse Continues Its Three-Year Decline Cigarettes. Smoking among teenagers continues to decline from peak levels in the mid-1990s May 2005

24 What about our state? Among the Best in the Nation in Students Going on to College: Pennsylvania ranks 4th in the nation One of the Best Graduation Rates in the Country: Pennsylvania's public high school graduation rate is among the top 6 in the country Classroom Behavior Is Improving: The proportion of Pennsylvania educators saying they were very satisfied or satisfied with student behavior increased from 51% to 64% over the past four years. Widespread Internet Access: Almost all of the public schools in Pennsylvania (98%) have internet access. U.S. Department of Justice · Office of Justice Programs Bureau of Justice Statistics – Pennsylvania violence and crime in schools have showed a steady decrease in the last decade..


26 rare event. The murder of a child who is abducted by a stranger is a rare event. 100 such incidents in the United States each year There are estimated to be 100 such incidents in the United States each year, less than one half of one percent of the murders committed. one child abduction murder for every 10,000 reports There is approximately one child abduction murder for every 10,000 reports of a missing child.

27 David Finkelhor, a criminologist at the University of New Hampshire has studied internet-related crime He reports: There are new perils for kids, but no evidence that kids are on the whole more endangered today as a result of the Internet. Do we believe……?

28 2004 study by Wolak and Finkelhor, financed by the U.S. Department of Justice points out a number of fallacies It is assumed that most internet predators pretend to be peers. Actually only 5% do. It is assumed that things happen quickly for the unsuspecting victim. Actually most abusers correspond with their victims for a least a month and most have telephone conversations before meeting. It is assumed that sex is not mentioned by the abuser. Actually, most freely discuss sex and most victims freely agree to it. Only about 16% are coerced into sex.

29 Youth are two to three times more likely than adults to be the victims of an assault, robbery, or rape, according to the National Crime Victimization Survey Nearly half of all rape victims are girls under the age of 18

30 Chances your kids could be in trouble…. 12 percent have had face-to-face meetings with people they have met online.Almost 40 percent of American high school students have posted personal information such as names, addresses, age and gender on the Web, according to iSafe student surveys, and 12 percent have had face-to-face meetings with people they have met online. In 2003, about 7% of public and private school students age reported that they have been bullied at school within the past six months



33 has jumped from zero to more than 50 million users in just two years. Too much information could allow Internet predators to find you, stalk you. Don't put where you work-- what time you do something--- where you are going to be at a certain time.

34 @myspace An ad-saturated Gen-Y playground owned (and mined for marketing data) by as regrettable an intersection of business, media, and politics as exists: Rupert Murdoch's News Corp. Fast becoming an obligatory whistle-stop for pop-icon aspirants eager for MySpace's prime audience: 14- to 34- year-olds. Mr. Murdoch says the networking site will drive traffic to his Fox TV sites.

35 Just how big is it? MySpace, which was created in 2003 and has exploded to include some 60 million registered users, has become the dominant social networking site, eclipsing others like,, and

36 Music….Music…..Music "MySpace now draws so much traffic that it accounted for 10% of all advertisements viewed online in the month." Businessweek What does all of this have to do with music? One of the main drivers of the myspace growth explosion has been its focus on music combined with social networking services.


38 Teen blogs are not about the technology They are about feelings of belonging and being loved. They are about trying on different personalities. They are about someone who feels isolated connecting with others who share their interests or insecurities.

39 MySpaces terms of service say that its open to people 14 or older there is no age verification process to prevent younger kids from setting up an account by lying about their date of birth. BUT…….

40 News Flash ! - April 2006 myspace has new Safety Czar – Nemu Nigum – hired away from Microsoft - former trial attorney with Dept. Of Justice Reacting to calls for legislation and congressional hearings. Cuts 250,00 profiles of kids under 14.

41 Private Information on the Internet is an…… Oxymoron

42 My Space Legal jargon Use of Cookies uses cookies to store visitors' preferences and to record session information, for purposes including ensuring that visitors are not repeatedly offered the same advertisements and to customize newsletter, advertising, and Web page content based on browser type and user profile information. We do not link the information we store in cookies to any personally identifiable information you submit while on our site. You may be able to configure your browser to accept or reject all or some cookies, or notify you when a cookie is set -- each browser is different, so check the "Help" menu of your browser to learn how to change your cookie preferences -- however, you must enable cookies from in order to use most functions on the site Please note that MySpace allows 3rd party advertisers that are presenting advertisements on some of our pages to set and access their cookies on your computer. Advertisers' use of cookies is subject to their own privacy policies, not the MySpace Privacy Policy.Links contains links to sites. is not responsible for the privacy policies and/or practices on other sites. When linking to another site a user should read the privacy policy stated on that site. Our privacy policy only governs information collected on


44 What do teens think? Most teens say they know to be wary of strangers online, but do not share the angst about posting personal information. Growing up today means living with the fact that there are going to be pictures of you and other personal data on the Web for all to see.

45 Would Your Billboard Say: Come see me naked I committed crimes I got away with I love to party and drink I hate black people (white people, Mexicans..)

46 Whos Looking (and doing background checks) EmployersBankers Insurance Brokers College Admission Officers

47 Question to ask yourself: Question to ask yourself: 10 Years from now would you like this information to be viewed? You cant control where it goes after you post it. Even if you no longer post or try to delete the site it can be retrieved!

48 Cam-Girl Charged With Sexually Abusing Herself Several months ago police in Latrobe, PA charged a 15-year-old girl with possession of child pornography, sexual abuse of children, and dissemination of child pornography. The twist? The alleged victim is also the alleged perpetrator. The girl allegedly acted as both sexual predator and prey by sending images of herself in various states of undress to people that she met in chat rooms. possession of child pornography

49 Camgirls

50 And…. Sugar Daddies


52 Because the gift is sent directly to the store, the admirer doesnt see the teen address. This may often give a false sense of security and protection. i-Safe Times November 2004

53 While internet companies like AOL and Yahoo! have cracked down on internet predators in their chat rooms, the detectives say predators have just moved to other internet sites, like ''

54 FBI estimate ¼ to ½ million predators on-line! First chat rooms – then blogs – now myspace and facebook You may be accountable by employers your school and the community for what you post on- line – teaching consequences.

55 Profile of the Typical Teen Lured Online Intelligent Intelligent Usually middle class or higher Usually middle class or higher Low self esteem Low self esteem Bored Bored Loner, quiet Loner, quiet Access to a computer Access to a computer Little/no history of running away Little/no history of running away

56 The Perfect Victim: No or little parental involvement No definite bedtime Can be away from home without anyone knowing where he/she is Has exclusive use of the computer in a private area

57 Profile of an Internet predator is not what you may think! Stereotype myth is that they are homosexual and loners. Many predators are very sociable and often popular in the community. Are primarily (but not always) male, masculine, better-educated, more religious than average, in their thirties, and choose jobs allowing them greater access to children. Are usually family men, have no criminal record, and deny that they abuse children, even after caught, convicted, incarcerated, and court- ordered into a sex offender program.

58 2005 Kaiser Family Foundation Report 20% of kids can surf from their bedroom. 40% of homes have more than 1 computer. 53% of kids 8-18 said the family had no rules on TV viewing. Exposure to risqué TV programming, violent video games and salacious Internet sites have led to a Silent Epidemic – Sen. Hillary Rodham Clinton

59 Multitasking Kids 34% of kids from 5-19 years old had cell phones by the end of Mobisodes, Vclips, and Internet Access can bring adult content to a full color screen to your child. No laws that address indecency or violence on wireless phones

60 The New Multi-tasker

61 Just another window of reality!

62 Most children know more about the Internet than their parents! 20% of parents dont monitor their children on the Internet at all. Only 52% moderately supervise their children. 62% of teens report that their parents know little or nothing about their web activities. 71% of parents stop monitoring after the child turns 14, not knowing that 72% of Internet related missing children are 15 years of age or older!

63 Obstacles to Safety Most parents do not talk to their children about Internet Safety for 3 reasons: Lack of Knowledge Denial Discomfort

64 Instant Messaging Vocabulary BRB26Y4U F2FIOH IRLG2G IDKPOS Can you read these acronyms? Too sexy for you Face to face Parent Over Shoulder

65 How hard is it for a predator to target a child? Using internet technology… Prepared by Washington State Attorney General Christine O. Gregoire (used by permission)

66 Luring starts with target identification and selection The predator is intrigued by Amanda...

67 Most online or Internet service providers provide user directories or Member Profiles to assist their members to identify others with similar interests.

68 The predator continues the search for information about Amanda by checking her Member Profile.

69 He types in her chatroom name...

70 Using the locate command, he can track and follow Amanda wherever she goes in Cyberspace.

71 He can also or instant message her by using the command.

72 is most likely a female child Is interested in seashells, rollerblading and English class has a little brother has a valid address After 2 minutes, the predator knows that Amanda:

73 Using Deja News or AltaVista, the predator can check for more information on Amanda by searching chatroom or newsgroup postings Using the Power Search option he continues searching for specific information on Amanda

74 Using Amandas address, he can search for any of her chatroom postings.

75 Amandas chatroom postings tell the predator when and where the messages were posted, and the text of each message.

76 Contained within Amandas posted messages are pertinent details of her life, including her phone number!

77 Her first name is Amanda She is a young girl who likes beanie babies, rollerblading, and English class She has a baby brother She has a Mom or sister named Sue She lives on the East Coast She or her mom get home every day at 5:30 Her home telephone number Within 12 minutes he knows:

78 What can the predator find out about Amanda from her telephone number?

79 The online phone directory reveals that Amandas phone number belongs to the Welch family. This means that the predator now knows Amandas last name. Good news. Most of these services will allow you to change or eliminate your personal data from the directories.

80 Using Amandas last name, the predator can now find her address.

81 Here she is!

82 One click and he can see where she lives.

83 A map of the U.S. reveals her city and state…

84 Driving directions make it so easy to find her house.

85 His target is a female child Her full name is Amanda Welch Her address is She likes seashells, rollerblading and English class She has a baby brother She collects or trades beanie babies The full names of her mother, father, and brother Her home telephone number is Shes probably home by 5:30 weekdays or Mom arrives home from work then She lives at 618 Hammerstone Drive in Laurel, Maryland The specific directions to her home Within 45 minutes he knows:



88 Two Approaches: Education or Intervention

89 The Story of Ned Ludd

90 Whats a parent to do Parents should create an account at myspace and sign on. It's free and only takes a minute. It may be hard to find your child's profile, but here's a tip: search for your child's school, and look for those students listed. If you find your child's name, or one of their friend's, check the "friends' list.'' Clicking on a comment posted there takes you to that kid's personal myspace site. Think that's too sneaky? Understandable. There is an easier way. Bob Ravasio, the father of a teen in the Larkspur district, says he simply told his daughter he'd like to see her profile.

91 OR… try Reverse number lookup Too much information could allow Internet predators to find you, stalk you. Don't put where you work-- what time you do something--- where you are going to be at a certain time.

92 Free Online Music Leaves Sad Song of Identity Theft Peer to Peer Dangers. Gnutellla, LimeWire, Mp3Rocket Malicious hackers are sharing files laced with hidden codes. You unleash a command that sends the hacker information you think is protected. – keylogger. Instead of only getting files in your shared folder the hacker can get into your banking folder, your bill folder, and other private documents in your computer.


94 Porn Industry At 12 Billion a Year! Microsoft 36 billion Porn revenue is larger than all combined revenues of all professional football, baseball and basketball franchises.. US porn revenue exceeds the combined revenues of ABC, CBS, and NBC – 6.2 Billion Kaiser Family Foundation study 2001 Kaiser Family Foundation study found that 70% of teens (ages ) had "accidentally come across" pornography while on the Internet. Of these teens, 55% said "being exposed to pornography would have a serious impact on kids under 18." found that 70% of teens (ages ) had "accidentally come across" pornography while on the Internet. Of these teens, 55% said "being exposed to pornography would have a serious impact on kids under 18."

95 Editor: Former Governor Dick Thornburgh One of the most thorough reports on protecting children from Internet pornography. John Schwartz, The New York Times

96 Tricks Pornographers Play Deception Entrapment Dangerous Downloads File Sharing

97 Childrens Internet Porn Statistics- 2003* AGE 11 Average age of first Internet exposure to pornography Ages Largest consumer of Internet pornography 80% year olds having multiple hard-core exposures 90% 8-16 year olds having viewed porn online (most while doing homework)

98 A Pretty Decent Analogy Filtering software is like The Club steering wheel lock. The Club wont prevent someone from stealing your car... but it will slow them down a bit.

99 New Technology Meets Old Fashion Methods

100 Pornography's Effects on Adults and Children by VICTOR B. CLINE, Ph.D. In an in-house study conducted by the Los Angeles Police Department's Administrative Vice division, in 60 percent of the child molestation cases referred to them over a 10-year period, adult or child pornography was used to lower the inhibitions of the children molested or to excite or sexually arouse the perpetrator of the abuse. In another study of 43 pedophiles, child pornography was found used in every one of the cases investigated. The officers reported the abusers repeatedly saying the same thing: "I used this stuff to stimulate the child, to break down his inhibitions."

101 MORE THAN THREE OUT OF FOUR ADULTS SUPPORT THE U.S. JUSTICE DEPARTMENT'S CRACKDOWN ON ILLEGAL OBSCENITY NEW YORK (November 15, 2005) - More than three out of four (77%) adult Americans support the Justice Department's effort to enforce federal obscenity laws, according to results of a survey conducted by Harris Interactive for Morality in Media.

102 The Fourth Screen Cinema Computer Television

103 Podcasting

104 No Controls For the cell-phone industry, porn is a way of attracting new clients and collecting fees for keeping them online longer. Industry analysts have said the relationship with the porn industry is hidden behind different and sometimes interlocking companies so the industry can claim it has no responsibility for what people are doing with the equipment and the technology. The FCC fact sheet notes that while blocking technology that parents can use is available for televisions and home computers, it is not for cell phones.

105 ID Theft of Kids ½ million kids have had their identity stolen! Of the more than 255,000 identity theft complaints filed with the U.S. Federal Trade Commission last year, 5 percent involved people under the age of 18. That's up from 3 percent in 2003 and the age category that grew the most in the two-year period. College students and young adults age 18 to 29 make up 29 percent of those filing complaints.

106 The number of victims of identity theft by hackers using the popular online game "Lineage" may reach as many as 1.22 million people.

107 TINSTAAFL!! TINSTAAFL!! (There is no such thing as a free lunch!) Teaching Consumer Skills To Children

108 Two Approaches: Education -- Intervention




112 Intermission


114 Web Wise Kids Approach Divergence from the lecture format: Web Wise Kids offers a Fun and Educational CD ROM computer detective game called Missing. Ongoing support and education: Web Wise Kids offers parents, teachers, youth leaders, and law enforcement the use of a prepared Internet safety program.

115 Missing

116 The Missing Computer Game The Centerpiece of Our Program Missing focuses on children ages from 11 to 14 The Games Scenario Based on the true story of a 14-year-old boy The goal is to find this boy before he vanishes.

117 EACH PART OF THE GAME IS A LESSON 1. JUST FRIENDS – illustrates how predators initiate a friendship with vulnerable children. 2.BAITING THE HOOK – examines how a predator encourages a child to think about leaving home.

118 3.CAUGHT IN THE NET – illustrates the difficult position of a child who is caught between his family and his new friend. 4.LIVING IN PARADISE – illustrates how the predator treats a child during the brief period after they have met in person.

119 5.CLOSING THE TRAP – explores the shadowy world of child pornography and abuse. 6.THE BETRAYAL – explores how a predator may react when the authorities are closing in on him.





124 An Internet Safety Plan Encourages kids to come up with their own guidelines for online behavior Encourages kids to discuss openly in classroom and with parents Creative assignments help them internalize what theyve learned Seek agreement with others whenever possible

125 MISSING GAME LEADS TO CAPTURE OF 3 ONLINE PREDATORS Community Partners have helped reach over 1.5 million children!

126 Awards Missing is the proud recipient of: Computerworld Smithsonian / Computerworld Award Canadian High Technology Information Highway Award

127 How Do You Know If It Is Safe? Funny feeling – Conscience - Instinct - Intuition

128 Develop Your Own Internal Internet Filter Fraud is based on trust Love affairs are based on trust Friendship is based on trust You can only be a victim if you participate in this fantasy of trust!

129 Coming Soon! Mirror Image Air Dogs

130 CHILD LURES PREVENTION Child Lures Community Plan for Prevention of Sexual Abuse, Abduction, Internet Crime, Substance Use/Abuse and School Violence

131 Child Lures Prevention: The Sole Safe Environment Program featured at The White House Conference on Missing, Exploited & Runaway Children October, 2002

132 Long before Ken Wooden was known as a child safety expert, he was heralded as a champion for children. During his years as investigative reporter for network television, Ken's work consistently revolved around issues affecting children, particularly sexual exploitation. A published author with a background in education, he devised a plan to interview convicted sex offenders and abductors. During hundreds of such interviews, Ken uncovered the diverse and imaginative strategies used by sexual predators to lure victims. These "lures," coupled with Ken's proven prevention techniques, are the foundation of all Child Lures prevention materials. Ken was appointed NBC News/Today Shows child personal safety consultant in February, He is a familiar face on the national news, and Oprah Winfrey has touted her program featuring Ken Wooden and Child Lures as her most important ever. Child Lures Prevention was the sole prevention program featured at the October, 2002 White House Conference on Missing, Exploited and Runaway Children. Ken Wooden has testified before the US Congress on twelve separate occasions. Ken Wooden Author of Child Lures Prevention

133 Child Lures School Program Kit Includes: Presenters Video, Student Video, Presenters Guide with scripted lesson plans for Elementary & Middle/High School students. Teaches children how to recognize inappropriate behavior and what to do if it occurs. A positive, non-explicit and non-threatening program for schools. Scientifically evaluated & proven to be effective.

134 Detailed explanation of the 16 Lures commonly used by child molesters & abductors Prevention strategies for each of the 16 lures Tips for Keeping Your Child Safe Explaining the Concept of Law to Children Explaining the Stranger/Danger Myth Internet Safety, including Family Internet Safety Pact The Lure of Hate & Violence - bullying, sexual harassment, racism & school violence What To Do If Sexual Abuse Occurs: If Your Child Discloses Sexual Abuse What To Do If Your Child is Missing: Child Lures Prevention Early Response System Share it with your local police department! Child Lures Parent Guide

135 The 17 Child Lures 1. Affection 2. Assistance 3. Pet 4. Authority 5. Bribery 6. Ego/Fame 7. Emergency 8. Fun & Games 9. Hero 10. Job 11. Name Recognition 12. Playmate 13. Threats/Weapons 14. Pornography 15. Computer Online 16. Drugs 17. Hate & Violence





140 Crimes against Children Research Center, University of New Hampshire Janis Wolak Kimberly Mitchell David Finkelhor, Director The following slides are the recommendations of the University of New Hampshire Study

141 Revise stereotypes used in publicity and training! Because Internet-initiated offenders Are rarely violent or aggressive Do not rely primarily on deception Do not target prepubescent victims –Are not pedophiles Often operate locally Rarely abduct Are not strangers to victims Exploit the willingness of young adolescent to contemplate sexual relationships with adults

142 Current prevention focus We tell adolescents: Dont go to meetings with strangers Dont give out personal information Beware of deception Tell an adult if someone makes you uncomfortable

143 What is missing? For teenagers: Why having sexual relationships with older men is a bad idea For adults: Why having sex with teenagers is a bad idea For parents Why to have this conversation with your kids

144 Teens should know This is a crime for adults; theyll go to jail The sense of being understood and appreciated may be a manipulation Caring and responsible adults do not proposition kids Victims feel betrayed If you pose for sexual pictures, they may come back to haunt you Dont be a sucker

145 To promote this message, we have to be willing to discuss how minors contribute to the offenses !

146 Dumb Things To do With Your Computer!


148 Revising stereotypes has implications for training. Counteract police and prosecutor prejudices about statutory/compliant victims Psychology of statutory victims Psychology of gay youth Techniques for working with less cooperative teen victims Vertical prosecution, advocates, peer support

149 Tell a trusted adult! Your life may depend on it!

Download ppt "Homeland Insecurity Inspect Your Gadgets Protecting Our Children In A Technologic World Your home is your castle. Has the mote been bridged?"

Similar presentations

Ads by Google