What is a Cyber Predator? Someone who uses the internet to take advantage of another in any way: Sexually Financially Emotionally Psychologically
Forms: Accd. To “Cyber Stalking and Internet Harassment: What the Law Can Do” by Judge David Harvey Sending unwanted, abusive, obscene messages e-mails Spamming (sending junk e-mails) Live chat sessions, message boards, newsgroups Indirect Way: Harasser may impersonate the victim and send abusive e-mails in the victim’s name. The victim will then receive the hate mails.
Why the internet? “Cyber Stalking and Internet Harassment: What the Law Can Do” by Judge David Harvey Anonymity Creating an “online persona” with little relationship to one’s own personality Pseudonymity Forging an e-mail header to create a digital persona Impersonation Making an e-mail appear as if it was sent from a different account Re-mailer technology: Mixmaster
Mixmaster uses public key cryptography granting unprecedented anonymity A user may chain several re-mailers together and send communications safe the trail created would be so complex that it would be impossible to follow Ease of Dissemination Readily available audience One-dimensional nature of online communication Face to face: listener can balance the content of the message with facial expression, body language, intonation, volume Online: Vulnerable to misinterpretation Cheap Without leaving the house Technology of database Becomes easier to search for a victim by typing a name, address, etc. on search engines Why the internet?
Cyber Predators Predators Characteristics: Close to 100% are male 91% are white and non-Hispanic 91% hold a full-time job.
What does this say about cyber predation? Do not stereotype Gives a new meaning to “Don’t talk to strangers.” even though they look trustworthy
Catching a Cyber Predator Counterattack against cyber-predators The Sting of Online Predators Microsoft Collaborates With Global Police
Do not disclose contact details to strangers (text, internet, etc.) Online shopping, read the reviews Detecting predators (Philippine context)
Disturbing Statistics 100,000 Web sites offering child pornography. 79% of teens aren’t careful when giving out information 64% teens do things online without parents knowledge.
$3 billion Child pornography revenue annually. 1 in 5 Children are sexually solicited online only 25% of those told a parent 89% Sexual solicitations occurred in chat rooms Instant Messaging
Death of Megan Meier (Missouri) ; 13 years old http://doc.noticias24.com/0805/meganm.jpg “she was a bad person and the world would be better without her” (Josh’s last message to Megan)
Patrick Sicat Transferred from Lasalle to UP Diliman Blog: complains about UP “disgusting chairs…nerdy students” The Oblation: “…the statue that upholds a bold representation of what it means to be a jackass” Got bullied by UP Students “Hindi mo pa nae-encounter ang term na HIT? Pwes, alamin mo before other UP students introduce this word to you the hard way” (“Have you been a victim of cyber-harassment?” by Annelle Tayao, PDI)
According to “Real-Word Dangers in an Online Reality: A Qualitative Study Examining Online Relationships and Cyber Abuse” by Mishna, McLucki, Saini Cyber Harassment/Predation can happen Between strangers And real-life acquaintances
Where predators are found Chat Rooms Instant Messenger Myspace Facebook Xanga
Software You can find software that will Limit the time your child spends online Block inappropriate web pages Monitor Instant Messenger chats Restrict game-play Block file sharing programs Keep your kids from sending personal information online
Protective Settings Set up content advisor on internet explorer List of approved and block sites or Content Advisor Safe Surf http://www.safesurf.com/iesetup/
Protective Tools Kid-safe search engines – Hazoo – Yahooligans – KidsClick Internet Filters All in one parental control software Banning Myspace from schools Kinds of Software – Mach 7 the Remote Spy Keylogger
Put a password on the computer. Teach your child about internet safety. Warn your child not to join any mailing lists Encourage your child not to visit strange sites. Reputation Defender Company which offers services such as “Search and Destroy” and “My Child”
Books The Smart Mom’s Guide to Online Safety Learn how to keep your children safe Learn the warning signs Discover what happens on social networking sites, blogs and other online channels.
Learn why nothing is permanently deleted from the Internet Discover online dangers at your public library. Learn why photo and video sharing sites can impact your child’s life
Laws against Cyber Predation Senate Bill Number 818 Modifies various provisions relating to stalking and harassment. June 30, 2008 In Missouri, signed by Governer Matt Blunt removing the requirement in the legislation requiring that such harassing communication be written or made over the telephone. harassment from computers, text messages and other electronic devices may also be considered illegal http://www.senate.mo.gov/08info/BTS_Web/Bill.aspx?SessionType=r&BillID=147
..in the Philippines Resolution number 915 By Senator Manny Villar “URGING THE SENATE COMMITTEES ON SCIENCE AND TECHNOLOGY, PUBLIC INFORMATION AND MASS MEDIA AND OTHER APPROPRIATE COMMITTEES TO CONDUCT AN INQUIRY, IN AID OF LEGISLATION, ON THE OCCURRENCE OF CYBER STALKING CASES AND THE MODUS OPERANDI ADOPTE TO PERPETUATE CRIMES IN THE INTERNET WITH THE END IN OF FORMULATING A POLICY THAT WILL CURB CYBER STALKING AND PROTECTONLINE USERS IN THE COUNTRY” Incident Cited Jehzeel Laurete (Blog: Jehzlau’s Concepts) the stalker created another e-mail with an address very similar to the genuine email address of Laurente and used the fake e-mail to ask money from other internet users and annoy and pester others by retorting bad words on comments and web pages, pretending to be the real Laurente