Presentation on theme: "“Homeland Insecurity” Inspect Your Gadgets"— Presentation transcript:
1“Homeland Insecurity” Inspect Your Gadgets Protecting Our Children In A Technologic World“Your home is your castle. Has the mote been bridged?”My background…Teens use the Internet an average of 8.5 hours per week for chatting and ing, compared to 1.8 hours spent using it for school work.An estimated 18.8 million kids under 18-years-old have access to home computers.Should I just forbid my child from going online? There are dangers in every part of our society. By educating your children to these dangers and taking appropriate steps to protect them, they can benefit from the wealth of information now available online.Playboy’s web site, which offers free teaser shots of its Playmates, averages 5 million hits per day.In August, 1997, there were 92,000 sexually explicit sites on the Internet and an estimated 266 new porn sites every day. "Adult" entertainment is estimated to be the largest sector of sales on the Internet.The vast majority of Americans (94%) believe a ban on Internet pornography should be legal.UNICEF estimates that one million children are forced into prostitution or used to produce pornography each year. Many are handed over (or sold) by their families driven by the extremes of poverty....The Internet also has given dealers in child pornography a far bigger audience--and anonymity.We currently have no legal means to protect children from sexually explicit material on the Internet. The door has been flung open wide for pornographers and sexual predators.Pornography is the third largest sector of sales in cyberspace, with annual revenues of over $100 million. (Boston Sunday Globe, 12/1/96)-There are over 92,000 commercial porn sites on the Internet (Family Connect, 1/31/98)-The pornographic non-commercial Internet sites, public newsgroups (alt.sex.snuff.cannibalism,) are all as accessible to an intrepid 10-year-old as to an adult.-Exposing children to pornography, either actively or passively, is a form of child sexual abuse.Story of janitor at computer store…Stories from my children…
7Cell Phone, Camera, Computer? =++(Department for Education & Skills)What are the dangers for young people?At the moment 3 do not offer full internet connectivity as part of their service and they say they have no plans to do so: in other words, apart from s, they are only providing access to their own content and services. The other providers of new services say they will, sooner or later, provide full internet access so, potentially, all of the dangers of the fixed internet will be replicated via these mobile devices but, precisely because they are mobile, they will be much harder to regulate and supervise. Potential dangers can typically be grouped into several key areas:Exposure to inappropriate materials Children and young people may be exposed to material that is pornographic, hateful or violent in nature or encourages activities that are dangerous or illegal. Equally so, content may simply be age inappropriate, inaccurate or misleading. At the moment there appear to be no technical solutions to filter content and block unwanted contacts via mobiles although this issue has now been raised with all of the companies concerned so we can expect that situation to change, but it may not be for some time. The most likely way in which it will change, in the short run, is that 3G devices for children will only have access to a limited range of services or places.Physical danger There is a risk that whilst online, a child may make inappropriate ‘friends’, perhaps providing information or arranging a meeting that could risk his or her safety or the safety of family members or friends. This is perhaps the most worrying and extreme risk associated with fixed internet use. With the mobile internet, these risks can potentially be greater. As mobile phones are such personal and private devices it will be difficult for parents to supervise access and contacts in the same way as they would a PC in the home. Mobile phones are typically always on and hence a child is always contactable and always vulnerable.The rich content capabilities of 3G phones means that young people may be sent inappropriate images or videos, or be encouraged to send back images or videos of themselves using integrated cameras. The integration of cameras within mobile phones may also result in photos of children and young people being taken and circulated or posted on websites without their knowledge or permission. A new generation of services may also provide more opportunities for personal contact, for example by SMS (short message service) or MMS (multimedia message service) chat, online gaming or dating services.Additionally, location-based capabilities may mean that it is possible to pinpoint the exact location of children and young people. Whilst this may be welcomed by parents keen to know where their child is at all times, it is not difficult to see how misuse of the technology could arise.Online bullying Online bullying, for example by text message, or via websites is a growing concern associated with the fixed internet and mobile telephone use. Mobile internet may unfortunately offer a further way for bullies to torment their victims.Legal financial and commercial considerations With the fixed internet there are concerns that a child could do something that has legal or financial consequences such as giving out a parent’s credit card details or doing something that contravenes another person’s rights. Plagiarism and copyright are particular issues which are associated with internet, especially in relation to downloading music or games. Research also shows that children are not able to differentiate between what is advertising and what is not. Again, all of these issues could potentially increase with the mobile internet with easy access to chargeable content in the form of games, downloads, ring tones, logos and other services – all of which are particularly attractive to children and young people. The facility to pay for goods and services using mobile phones as an ‘electronic wallet’ is also set to increase. Spam by text message is already a growing problem, and the rich media capabilities of 3G devices will undoubtedly mean that advertisers become more sophisticated in their campaigns.New threats from an unlikely sources.
9Harmless fun????? The technology has…. Kids haven’t changed! Who is most at risk? The Thornburgh Committee concluded it is 15-year-old girls who disclose too much personal information in chat rooms because they "just know" that they can somehow "tell" whether an Internet "friend," whom they have not yet met in person, is who he or she claims to be. An hour or two with our NCMEC experts could save these girls a lot of grief.Kids haven’t changed!The technology has….
10New Home with Rapunzel Tower “When she is ready”New Home with Rapunzel TowerTower outfitted for girls years of age.No modern conveniencesConvenient food dumb waiterConvent nearby to assist in transition to modern life.
15“The free access which many young people have…has poisoned the mind and corrupted the morals of many a promising youth.”Reverend Enos Hitchcock, Memoirs of the Bloomsgrove Family, 1790
16Society for the Prevention of Cruelty to Children, 1909 “This new form of entertainment has gone far to blast maidenhood…Depraved adults with candies and pennies beguile children with the inevitable result”Society for the Prevention of Cruelty to Children, 1909
17The Knights of Columbus…1933 “Does it break up the home life and the old practice of visiting friends?”The Knights of Columbus…1933
19The Culture War Against Kids Mike Meles – alter.net Perhaps no period in history has witnessed such rapid improvements in adolescent conduct!From 1990 through 1999, teenage violence and other malaise plunged:homicide rates (down 62 percent)rape (down 27 percent),violent crime (down 22 percent),school violence (down 20 percent),property offenses (down 33 percent),births (down 17 percent),abortions (down 15 percent),sexually transmitted diseases (down 50 percent),violent deaths (down 20 percent),suicide (down 16 percent),and drunken driving fatalities (down 35 percentAmerican youth do suffer real threats (as opposed to fictional booze marketing and R-rated movies). Fourteen million kids grow up in abject poverty, 2,000 die and half a million are treated in hospital emergency rooms from domestic violence every year, and 15 million have addicted parents
20Additional crime facts at a glance U.S. Department of Justice · Office of Justice Programs Bureau of Justice StatisticsAdditional crime facts at a glanceViolent crime rates declined since 1994, reaching the lowest level ever recorded in 2004.
21Rape rates continue to decline. About seven in ten female rape or sexual assault victims stated the offender was an intimate, other relative, a friend or an acquaintance
22Teen Drug Abuse Continues Its Three-Year Decline May 2005Teen Drug Abuse Continues Its Three-Year DeclineCigarettes. Smoking among teenagers continues to decline from peak levels in the mid-1990s
23What about our state?Among the Best in the Nation in Students Going on to College: Pennsylvania ranks 4th in the nationOne of the Best Graduation Rates in the Country: Pennsylvania's public high school graduation rate is among the top 6 in the countryClassroom Behavior Is Improving: The proportion of Pennsylvania educators saying they were very satisfied or satisfied with student behavior increased from 51% to 64% over the past four years.Widespread Internet Access: Almost all of the public schools in Pennsylvania (98%) have internet access.U.S. Department of Justice · Office of Justice Programs Bureau of Justice Statistics – Pennsylvania violence and crime in schools have showed a steady decrease in the last decade..
25The murder of a child who is abducted by a stranger is a rare event. There are estimated to be 100 such incidents in the United States each year, less than one half of one percent of the murders committed.There is approximately one child abduction murder for every 10,000 reports of a missing child.
26Do we believe……?David Finkelhor, a criminologist at the University of New Hampshire has studied internet-related crime He reports:“There are new perils for kids, but no evidence that kids are on the whole more endangered today as a result of the Internet.”
27It is assumed that things happen quickly for the unsuspecting victim. 2004 study by Wolak and Finkelhor, financed by the U.S. Department of Justice points out a number of fallaciesIt is assumed that things happen quickly for the unsuspecting victim.Actually most abusers correspond with their victims for a least a month and most have telephone conversations before meeting.It is assumed that most internet predatorspretend to be peers.Actually only 5% do.It is assumed that sex is not mentionedby the abuser.Actually, most freely discuss sex and most victims freely agree to it.Only about 16% are coerced into sex.
28Youth are two to three times more likely than adults to be the victims of an assault, robbery, or rape, according to the National Crime Victimization SurveyNearly half of all rape victims are girls under the age of 18
29Chances your kids could be in trouble…. Almost 40 percent of American high school students have posted personal information such as names, addresses, age and gender on the Web, according to iSafe student surveys, and 12 percent have had face-to-face meetings with people they have met online.In 2003, about 7% of public and private school students age reported that they have been bullied at school within the past six months
32MySpace.com has jumped from zero to more than 50 million users in just two years. Too much information could allow Internet predators to find you, stalk you.Don't put where you work-- what time you do something--- where you are going to be at a certain time.
33@myspaceAn ad-saturated Gen-Y playground owned (and mined for marketing data) by as regrettable an intersection of business, media, and politics as exists: Rupert Murdoch's News Corp.Fast becoming an obligatory whistle-stop for pop-icon aspirants eager for MySpace's prime audience: 14- to 34-year-olds.Mr. Murdoch says the networking site will drive traffic to his Fox TV sites.
34Just how big is it?MySpace, which was created in 2003 and has exploded to include some 60 million registered users, has become the dominant social networking site, eclipsing others like Friendster.com, Tribe.net, Xanga.com and Meetup.com
35Music….Music…..Music"MySpace now draws so much traffic that it accounted for 10% of all advertisements viewed online in the month." BusinessweekWhat does all of this have to do with music? One of the main drivers of the myspace growth explosion has been its focus on music combined with social networking services.
37Teen blogs are not about the technology They are about feelings of belonging and being loved.They are about trying on different personalities.They are about someone who feels isolated connecting with others who share their interests or insecurities.
38MySpace’s terms of service say that it’s open to people 14 or older BUT…….there is no age verification process to prevent younger kids from setting up an account by lying about their date of birth.
39News Flash ! - April 2006 myspace has new Safety Czar – Nemu Nigum – hired away from Microsoft - former trial attorney with Dept. Of JusticeReacting to calls for legislation and congressional hearings.Cuts 250,00 profiles of kids under 14.
40Private Information on the Internet is an…… Oxymoron
43What do teens think?Most teens say they know to be wary of strangers online, but do not share the angst about posting personal information.Growing up today means living with the fact that there are going to be pictures of you and other personal data on the Web for all to see.
44Would Your Billboard Say: Come see me nakedI committed crimes I got away withI love to party and drinkI hate black people (white people, Mexicans..)Pewnn State students posted
46You can’t control where it goes after you post it. Question to ask yourself: 10 Years from now would you like this information to be viewed?You can’t control where it goes after you post it.Even if you no longer post or try to delete the site it can be retrieved!
47Cam-Girl Charged With Sexually Abusing Herself Several months ago police in Latrobe, PA charged a 15-year-old girl with possession of child pornography, sexual abuse of children, and dissemination of child pornography. The twist? The alleged victim is also the alleged perpetrator. The girl allegedly acted as both sexual predator and prey by sending images of herself in various states of undress to people that she met in chat rooms.
51“Because the “gift” is sent directly to the store, the admirer doesn’t see the teen address. This may often give a false sense of security and protection.” i-Safe Times November 2004
52While internet companies like AOL and Yahoo While internet companies like AOL and Yahoo! have cracked down on internet predators in their chat rooms, the detectives say predators have just moved to other internet sites, like 'myspace.com.'
53FBI estimate ¼ to ½ million predators on-line! First chat rooms – then blogs – now myspace and facebookYou may be accountable by employers your school and the community for what you post on-line – teaching consequences.
54Profile of the Typical Teen Lured Online IntelligentUsually middle class or higherLow self esteemBoredLoner, quietAccess to a computerLittle/no history of running away
55The Perfect Victim: 11-14 No or little parental involvement No definite bedtimeCan be away from home without anyone knowing where he/she isHas exclusive use of the computer in a private areaThis list was compiled from a document entitled, “Characteristics of a Fictitious Child Victim: Turning a Sex Offender’s Dreams Into His Worst Nightmare” by James F. McLaughlin.[Note: I do reference Detective McLaughlin’s materials throughout this presentation. He has some solid data that goes much further than simply stating that predators may be lurking in chat rooms.]
56Profile of an Internet predator is not what you may think! Stereotype myth is that they are homosexual and loners.Many predators are very sociable and often popular in the community.Are primarily (but not always) male, masculine, better-educated, more religious than average, in their thirties, and choose jobs allowing them greater access to children.Are usually family men, have no criminal record, and deny that they abuse children, even after caught, convicted, incarcerated, and court-ordered into a sex offender program.
572005 Kaiser Family Foundation Report 20% of kids can surf from their bedroom.40% of homes have more than 1 computer.53% of kids 8-18 said the family had no rules on TV viewing.Exposure to risqué TV programming, violent video games and salacious Internet sites have led to a “Silent Epidemic” – Sen. Hillary Rodham Clinton
58Multitasking Kids34% of kids from 5-19 years old had cell phones by the end of 2004.Mobisodes, Vclips, and Internet Access can bring adult content to a full color screen to your child.No laws that address indecency or violence on wireless phones
61Most children know more about the Internet than their parents! 20% of parents don’t monitor their children on the Internet at all.Only 52% moderately supervise their children.62% of teens report that their parents know little or nothing about their web activities.71% of parents stop monitoring after the child turns 14, not knowing that 72% of Internet related missing children are 15 years of age or older!Internet pornography is easily accessible by children, intentionally and unintentionally (example: using the word search "toys" and receiving links to "Adult Sex Toys" and "Horny Housewives and Their Boy Toys.")
62Obstacles to SafetyMost parents do not talk to their children about Internet Safety for 3 reasons:Lack of KnowledgeDenialDiscomfortSo while our children are being bombarded with all kinds of things online, parents are facing their own challenges…….Parents and teachers are often unaware that many predators are shifting their activities to the Internet.Many parents believe that a predator could never lure their children into a sexual encounter. They believe that predators can only reach children who are particularly vulnerable.Parents say they are uncomfortable talking to their children about sexual predators. Let’s face it….it’s already a challenge for a parent to have a conversation about sex with their child…..add to that the medium of computers and the internet….and you have what can be perceived as an impossible conversation.All of these things contribute to what we now know as the “DIGITAL DIVIDE”……
63Instant Messaging Vocabulary Can you read these acronyms?BRB 26Y4UF2F IOHIRL G2GIDK POSToo sexy for youFace to faceParent Over Shoulder
64How hard is it for a predator to target a child? Using internet technology…Prepared by Washington State Attorney General Christine O. Gregoire (used by permission)
65Luring starts with target identification and selection The predator is intrigued by Amanda...
66Most online or Internet service providers provide user directories or Member Profiles to assist their members to identify others with similar interests.
67The predator continues the search for information about Amanda by checking her Member Profile.
69Using the locate command, he can track and follow Amanda wherever she goes in Cyberspace.
70He can also email or instant message her by using the email command.
71After 2 minutes, the predator knows that Amanda: is most likely a female childIs interested in seashells, rollerblading and English classhas a little brotherhas a valid address
72Using Deja News or AltaVista, the predator can check for more information on Amanda by searching chatroom or newsgroup postingsUsing the Power Search option he continues searching for specific information on Amanda
73Using Amanda’s email address, he can search for any of her chatroom postings.
74Amanda’s chatroom postings tell the predator when and where the messages were posted, and the text of each message.
75Contained within Amanda’s posted messages are pertinent details of her life, including her phone number!
76Within 12 minutes he knows: Her first name is AmandaShe is a young girl who likes beanie babies, rollerblading, and English classShe has a baby brotherShe has a Mom or sister named SueShe lives on the East CoastShe or her mom get home every day at 5:30Her home telephone number
77What can the predator find out about Amanda from her telephone number?
78The online phone directory reveals that Amanda’s phone number belongs to the Welch family. This means that the predator now knows Amanda’s last name.Good news. Most of these services will allow you to change or eliminate your personal data from the directories.
79Using Amanda’s last name, the predator can now find her address.
83Driving directions make it so easy to find her house.
84Within 45 minutes he knows: His target is a female childHer full name is Amanda WelchHer address isShe likes seashells, rollerblading and English classShe has a baby brotherShe collects or trades beanie babiesThe full names of her mother, father, and brotherHer home telephone number isShe’s probably home by 5:30 weekdays or Mom arrives home from work thenShe lives at 618 Hammerstone Drive in Laurel, MarylandThe specific directions to her home
88The Story of Ned LuddIn one sense it could be said that Luddism began on the night of 4th November 1811, in the little village of Bulwell, some four miles north of Nottingham, when a small band of men gathered in the darkness, counted off in military style, hoisted their hammers and axes and pistols, and marched to the home of a `master weaver' named Hollingsworth. They posted a guard, suddenly forced their way inside through shutters and doors, and proceeded to destroy a half-dozen weaving machines of a kind they found threatening to their trade .
89What’s a parent to doParents should create an account at myspace and sign on. It's free and only takes a minute. It may be hard to find your child's profile, but here's a tip: search for your child's school, and look for those students listed. If you find your child's name, or one of their friend's, check the "friends' list.'' Clicking on a comment posted there takes you to that kid's personal myspace site.Think that's too sneaky? Understandable. There is an easier way. Bob Ravasio, the father of a teen in the Larkspur district, says he simply told his daughter he'd like to see her profile.
90OR… try Anywho.com Reverse number lookup Too much information could allow Internet predators to find you, stalk you.Don't put where you work-- what time you do something--- where you are going to be at a certain time.
91Free Online Music Leaves Sad Song of Identity Theft Peer to Peer Dangers. Gnutellla, LimeWire, Mp3RocketMalicious hackers are sharing files laced with hidden codes.You unleash a command that sends the hacker information you think is protected. – keylogger.Instead of only getting files in your shared folder the hacker can get into your banking folder, your bill folder, and other private documents in your computer.
932001 Kaiser Family Foundation study Porn Industry At12 Billion a Year!Microsoft 36 billionPorn revenue is larger than all combined revenues of all professional football, baseball and basketball franchises..US porn revenue exceeds the combined revenues of ABC, CBS, and NBC – 6.2 Billion.2001 Kaiser Family Foundation studyfound that 70% of teens (ages 15-17) had "accidentally come across" pornography while on the Internet. Of these teens, 55% said "being exposed to pornography would have a serious impact on kids under 18."
94Editor: Former Governor Dick Thornburgh “One of the most thorough reports on protecting children from Internet pornography.” John Schwartz, The New York Times
95Tricks Pornographers Play DeceptionEntrapmentDangerous DownloadsFile SharingDeception – Porn Napping – stealing expired sites – Ernst & Young, AOL, even the US Dep't of EducationCyber Squatting – legitamite topics “whitehouse.com” whithouse.goc.Doorway scams – common non-porn them then link to porn sites.Misspelling – extra “l” in google would get you to an Asian porn site.Advertising – pop uip add with fake system errorsa, message alret boxes, false forms – you click ok and you are at porn site.EntrapmentLooping – never ending loop of porn pages – close a new one opens.Mousetrapping- will alter the black button or close feature – you cant get out – lost control of your browser.Start Up Alteration – start up directory send you to porn site – you will need help removing .Cookies.Dangerous DownloadsDialers –Live Action – webcamsMailSpoofing – false sense of security – from someone you knowPeer-to-Peer Bulletin Board – easier to hide for pornographers
96Children’s Internet Porn Statistics- 2003* AGE 11Average age of first Internet exposure to pornographyAges 12-17Largest consumer of Internet pornography80%15-17 year olds having multiple hard-core exposures90%8-16 year olds having viewed porn online (most while doing homework)
97A Pretty Decent Analogy Filtering software is like “The Club” steering wheel lock.The Club won’t prevent someone from stealing your car ... but it will slow them down a bit.
99Pornography's Effects on Adults and Children by VICTOR B. CLINE, Ph.D. In an in-house study conducted by the Los Angeles Police Department's Administrative Vice division, in 60 percent of the child molestation cases referred to them over a 10-year period, adult or child pornography was used to lower the inhibitions of the children molested or to excite or sexually arouse the perpetrator of the abuse.In another study of 43 pedophiles, child pornography was found used in every one of the cases investigated. The officers reported the abusers repeatedly saying the same thing: "I used this stuff to stimulate the child, to break down his inhibitions."
100MORE THAN THREE OUT OF FOUR ADULTS SUPPORT THE U. S MORE THAN THREE OUT OF FOUR ADULTS SUPPORT THE U.S. JUSTICE DEPARTMENT'S CRACKDOWN ON ILLEGAL OBSCENITYNEW YORK (November 15, 2005) - More than three out of four (77%) adult Americans support the Justice Department's effort to enforce federal obscenity laws, according to results of a survey conducted by Harris Interactive for Morality in Media.
103No ControlsFor the cell-phone industry, porn is a way of attracting new clients and collecting fees for keeping them online longer. Industry analysts have said the relationship with the porn industry is hidden behind different and sometimes interlocking companies so the industry can claim it has no responsibility for what people are doing with the equipment and the technology.The FCC fact sheet notes that while blocking technology that parents can use is available for televisions and home computers, it is not for cell phones.
104ID Theft of Kids ½ million kids have had their identity stolen! Of the more than 255,000 identity theft complaints filed with the U.S. Federal Trade Commission last year, 5 percent involved people under the age of 18. That's up from 3 percent in 2003 and the age category that grew the most in the two-year period.College students and young adults age 18 to 29 make up 29 percent of those filing complaints.
105The number of victims of identity theft by hackers using the popular online game "Lineage" may reach as many as 1.22 million people.
106(There is no such thing as a free lunch!) TINSTAAFL!!(There is no such thing as a free lunch!)If its span its scam is a safe approach to online merchants offering things to good to be true.Teaching Consumer Skills To Children
112QUESTION:HOW DO YOU EDUCATE KIDS WHO THINK THEY ALREADY KNOW ALL THERE IS TO KNOW ABOUT INTERNET SAFETY?ANSWER:CHALLENGE THEM TO OUTWIT AN INTERNET PREDATOR.
113Web Wise Kid’s Approach Divergence from the lecture format:Web Wise Kids offers a Fun and Educational CD ROM computer detective game called Missing.Ongoing support and education:Web Wise Kids offers parents, teachers, youth leaders, and law enforcement the use of a prepared Internet safety program.We have to reach children in their own medium. Computers and games!
114MissingDescribe the Missing School Kit – 2 parts – a video & workbook format for adults and the a detective game & notebook for kids
115The Missing Computer Game The Centerpiece of Our Program Missing focuses on children ages from 11 to 14 The Game’s ScenarioBased on the true story of a year-old boyThe goal is to find this boy before he vanishes.There are two main parts to the Missing game. Usually, we come into the classroom to give the first program, and then return the following week for the second part. As a sidebar, however, the game is flexible and can be presented in a number of different ways….since each CD is divided into 3 sections, any combination of sections can be used for implementation….1 per day, 2 per day, and so on……In this example, we start with the entire first portion of the game (CD Rom 1). The kids are invited by the RCMP and a worried father to join in a fact-finding mission, to gather clues and to search for his boy – before he crosses an international border. And just as they become close to finding Zack, the main character, he slips through their fingers.We then give the students about a week to consider and discuss what happened in the first part of the game. We return and facilitate the 2nd part of the game (CD Rom 2), in which the role-playing detectives must scour the city of San Diego to find Zack before he disappears forever.At that point, the young detectives either find Zack, or they don’t….and the ending can be happy or difficult….but either way, it is EFFECTIVE. The bottom line is that the kids are invested in the results…..and they have internalized a great deal about internet safety along the way.
116EACH PART OF THE GAME IS A LESSON 1. JUST FRIENDS – illustrates how predators initiate a friendship with vulnerable children.2. BAITING THE HOOK – examines how a predator encourages a child to think about leaving home.
1173. CAUGHT IN THE NET – illustrates 3. CAUGHT IN THE NET – illustrates the difficult position of a child who is caught between his family and his new “friend.”4. LIVING IN PARADISE – illustrates how the predator treats a child during the brief period after they have met in person.
1185. CLOSING THE TRAP – explores. the shadowy world of child 5. CLOSING THE TRAP – explores the shadowy world of child pornography and abuse.6. THE BETRAYAL – explores how a predator may react when the authorities are closing in on him.
119At this point, players realize that they are too late and see that Zack has crossed the border with Fantasma, the suspect.
120Towards the end of CD-Rom 2, Zack’s dad becomes very frightened, and concerned for Zack’s safety. This gives students an opportunity to empathize with the parental perspective, which is powerful.
121The lead detective for the US urges players to search diligently for clues on how Fantasma will try to escape…..letting them know that there is limited time……
122In this example, the players have found Zack and he is being returned home to his relieved father.
123An Internet Safety Plan Encourages kids to come up with their own guidelines for online behaviorEncourages kids to discuss openly in classroom and with parentsCreative assignments help them internalize what they’ve learnedSeek agreement with others whenever possibleOptional: Pass out Wendy’s 7 Smart Rules for Internet Safety or refer to it being in the packet – only as a basis for discussion – there is also an Internet Safety Plan component within the “Missing” game.What is important is getting the kids actively involved in creating their own safety plan, getting that plan committed to writing so that what they’ve internalized is verbalized….and then to get them to find agreement with their parents in whatever way they can.
124“MISSING GAME LEADS TO CAPTURE OF 3 ONLINE PREDATORS” Community Partners have helped reach over 1.5 million children!“MISSING GAME LEADS TO CAPTURE OF 3 ONLINE PREDATORS”Various about teenager in SF recognizing tactics of predator…..Through playing the “Missing” game, she recognized the tactics of a predator who was currently seducing her online. In essence, playing the game gave her the ability to articulate her situation and communicate it to her family…..so the advances of the predator could be intercepted.The “Missing” game helps children have a voice……and we feel that it helps them articulate their feelings about online activity…..
125Awards Missing is the proud recipient of: Computerworld Smithsonian / Computerworld AwardCanadian High Technology Information Highway Award
126How Do You Know If It Is Safe? Funny feeling – Conscience - Instinct - Intuition
127Develop Your Own “Internal Internet Filter” Fraud is based on trustLove affairs are based on trustFriendship is based on trustYou can only be a victim if you participate in this fantasy of trust!
129CHILD LURES PREVENTION Child Lures Community Planfor Prevention of Sexual Abuse, Abduction, Internet Crime, Substance Use/Abuse and School Violence.
130Child Lures Prevention: The Sole Safe Environment Program featured at The White House Conference on Missing, Exploited & Runaway ChildrenOctober, 2002
131Author of Child Lures Prevention Ken WoodenAuthor of Child Lures PreventionLong before Ken Wooden was known as a child safety expert, he was heralded as a champion for children. During his years as investigative reporter for network television, Ken's work consistently revolved around issues affecting children, particularly sexual exploitation.A published author with a background in education, he devised a plan to interview convicted sex offenders and abductors. During hundreds of such interviews, Ken uncovered the diverse and imaginative strategies used by sexual predators to lure victims. These "lures," coupled with Ken's proven prevention techniques, are the foundation of all Child Lures prevention materials.Ken was appointed NBC News/Today Show’s child personal safety consultant in February, He is a familiar face on the national news, and Oprah Winfrey has touted her program featuring Ken Wooden and Child Lures as her most important ever.Child Lures Prevention was the sole prevention program featured at the October, 2002 White House Conference on Missing, Exploited and Runaway Children. Ken Wooden has testified before the US Congress on twelve separate occasions.
132Child Lures School Program Kit Includes: Presenter’s Video, Student Video, Presenter’s Guide with scripted lesson plans for Elementary & Middle/High School students.Teaches children how to recognize inappropriate behavior and what to do if it occurs.A positive, non-explicit and non-threatening program for schools.Scientifically evaluated & proven to be effective.
133Child Lures Parent Guide Detailed explanation of the 16 Lures commonly used by child molesters & abductorsPrevention strategies for each of the 16 luresTips for Keeping Your Child SafeExplaining the Concept of Law to ChildrenExplaining the Stranger/Danger MythInternet Safety, including Family Internet Safety PactThe Lure of Hate & Violence - bullying, sexual harassment, racism & school violenceWhat To Do If Sexual Abuse Occurs:If Your Child Discloses Sexual AbuseWhat To Do If Your Child is Missing:“Child Lures Prevention Early Response System” Share it with your local police department!
134The 17 Child Lures 1. Affection 2. Assistance 3. Pet 4. Authority 5. Bribery6. Ego/Fame7. Emergency8. Fun & Games9. Hero10. Job11. Name Recognition12. Playmate13. Threats/Weapons14. Pornography15. Computer Online16. Drugs17. Hate & Violence
139The following slides are the recommendations of the University of New Hampshire Study Crimes against Children Research Center, University of New Hampshire Janis Wolak Kimberly Mitchell David Finkelhor, Director
140Revise stereotypes used in publicity and training! Because Internet-initiated offendersAre rarely violent or aggressiveDo not rely primarily on deceptionDo not target prepubescent victimsAre not pedophilesOften operate locallyRarely abductAre not strangers to victimsExploit the willingness of young adolescent to contemplate sexual relationships with adultsWe need to recognize the diversity of offenders.
141Current prevention focus We tell adolescents:Don’t go to meetings with strangersDon’t give out personal informationBeware of deceptionTell an adult if someone makes you uncomfortableThese approaches may work for younger children, but younger children are not the targets of Internet-initiated crimes. We need to expand prevention messages aimed at children and teens. And we need to talk to them directly about sex and the Internet. Many of these youth are not “uncomfortable” about sex. They’re extremely interested.
142What is missing? For teenagers: Why having sexual relationships with older men is a bad ideaFor adults:Why having sex with teenagers is a bad ideaFor parentsWhy to have this conversation with your kidsWe may need different messages for boys. In the U.S., boys who are gay or questioning can feel very isolated. They may feel that older men understand what they are going through.
143Teens should know This is a crime for adults; they’ll go to jail The sense of being understood and appreciated may be a manipulationCaring and responsible adults do not proposition kidsVictims feel betrayedIf you pose for sexual pictures, they may come back to haunt youDon’t be a suckerThese are some of the prevention messages we think should be aimed at teens.
144To promote this message, we have to be willing to discuss how minors contribute to the offenses !
147Revising stereotypes has implications for training. Counteract police and prosecutor prejudices about statutory/compliant victimsPsychology of statutory victimsPsychology of gay youthTechniques for working with less cooperative teen victimsVertical prosecution, advocates, peer support
148Your life may depend on it! Tell a trusted adult!Deception – Porn Napping – stealing expired sites – Ernst & Young, AOL, even the US Dep't of EducationCyber Squatting – legitamite topics “whitehouse.com” whithouse.goc.Doorway scams – common non-porn them then link to porn sites.Misspelling – extra “l” in google would get you to an Asian porn site.Advertising – pop uip add with fake system errorsa, message alret boxes, false forms – you click ok and you are at porn site.EntrapmentLooping – never ending loop of porn pages – close a new one opens.Mousetrapping- will alter the black button or close feature – you cant get out – lost control of your browser.Start Up Alteration – start up directory send you to porn site – you will need help removing .Cookies.Dangerous DownloadsDialers –Live Action – webcamsMailSpoofing – false sense of security – from someone you knowPeer-to-Peer Bulletin Board – easier to hide for pornographersYour life may depend on it!