We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byLauryn Dixson
Modified about 1 year ago
© 2009 Charles D. Knutson Internet Predators: Who's Watching Our Children Online? Dr. Charles D. Knutson Brigham Young University
© 2009 Charles D. Knutson Internet predators Actively seeking victims Addictive personalities Very patient Looking for easy targets Critical to be aware and to protect our children! 2
© 2009 Charles D. Knutson Instructional dilemma We all wish we didn't have to talk about this subject You feel dirty just talking about it But… The risk is huge Our children are so vulnerable 3
© 2009 Charles D. Knutson Instructional dilemma "And also it grieveth me that I must use so much boldness of speech … before your wives and your children, many of whose feelings are exceedingly tender and chaste and delicate before God, which thing is pleasing unto God." -- Jacob 2:7 4
© 2009 Charles D. Knutson Instructional dilemma "And it supposeth me that they have come up hither [to Education Week] to hear the pleasing word of God, yea, the word which healeth the wounded soul." -- Jacob 2:8 5
© 2009 Charles D. Knutson Instructional dilemma "Wherefore, it burdeneth my soul that I should be constrained … to admonish you …, to enlarge the wounds of those who are already wounded, instead of consoling and healing their wounds; and those who have not been wounded, instead of feasting upon the pleasing word of God have daggers placed to pierce their souls and wound their delicate minds." -- Jacob 2:9 6
© 2009 Charles D. Knutson Instructional dilemma "And now, I will speak unto you concerning those twenty-four plates, … that the mysteries and the works of darkness, and their secret works, or the secret works of those people who have been destroyed, may be made manifest unto this people…" -- Alma 37:21 7
© 2009 Charles D. Knutson Instructional dilemma "I command you that ye retain all their oaths, and their covenants, and their agreements in their secret combinations; yea, and all their signs and their wonders ye shall keep from this people, that they know them not, lest peradventure they should fall into darkness also and be destroyed." -- Alma 37:27 8
© 2009 Charles D. Knutson Instructional dilemma "Therefore ye shall keep these secret plans of their oaths and their covenants from this people, and only their wickedness and their murders and their abominations shall ye make known unto them; and ye shall teach them to abhor such wickedness and abominations and murders; and ye shall also teach them that these people were destroyed on account of their wickedness and abominations and their murders." -- Alma 37:29 9
© 2009 Charles D. Knutson Some statistics 48% of teens report that their parents or guardians know little or nothing about what they do online 10
© 2009 Charles D. Knutson Some statistics 61% of all teenagers in the United States have a profile on a social networking site MySpace, Friendster, Facebook, Xanga Half of those have posted pictures of themselves 11
© 2009 Charles D. Knutson Some statistics 71% of teens have received messages or from someone they didn't know Half of those replied to and chatted with someone 12
© 2009 Charles D. Knutson Some statistics 14% of teens have met in person with someone they met via chat on the Internet 13
© 2009 Charles D. Knutson Some statistics 1 in 5 children between 10 and 17 receive a sexual solicitation each year Only 25% of these children told a parent Less than 10% were reported to authorities 14
© 2009 Charles D. Knutson Some statistics 1 in 25 children between 10 and 17 have been asked to send a sexually explicit picture of themselves 1 in 1,500 complied 15
© 2009 Charles D. Knutson Predator behavior Almost all predators begin with an addiction to pornography Descend into more coarse material Violent pornography Child pornography Many predators begin as heterosexual pornography addicts and digress 16
© 2009 Charles D. Knutson Predator behavior Natural shift from pornography to desire for contact with children Moves from private fantasy into spaces where children are That's where we as parents need to be involved, understand, protect Knowledge is power 17
© 2009 Charles D. Knutson Predator behavior Will groom a victim over months Anonymity is generally a must "Amy" is my best friend, I can tell her all my deepest secrets But not always I knew he was 50 years old, but he was so understanding and there for me Increasingly, victims know the real age of the predator and willingly meet 18
© 2009 Charles D. Knutson Predator behavior Social engineers Masters at manipulation Skillful at extracting information over time Will try to hack kids' passwords from limited personal information Children are very uncreative with passwords 19
© 2009 Charles D. Knutson Predator behavior Look for easy targets Children with low self image Lonely, friendless Poor relationship with parents Emotionally isolated from immediate friends and family The kind of kids who spend a great deal of time online... 20
© 2009 Charles D. Knutson Predator behavior Seek jobs/service that place them in proximity to potential victims Cub scout, boy scout leader School teacher Team coach Priest School crossing guard 21
© 2009 Charles D. Knutson Newsgroups Yes, pedophiles have newsgroups Share information Share strategies Share pornographic material Form social networks 22
© 2009 Charles D. Knutson Newsgroups You can check the newsgroups that are subscribed on your computer Will tell you if someone in your house is looking at that material You can check the newsgroups that are available from your ISP Paid newsgroups are not public and do traffic in this material 23
© 2009 Charles D. Knutson Illicit social networking Share pornography Share requests Share victims Some rings involving thousands of people 24
© 2009 Charles D. Knutson How do they access kids? Anywhere online where children can meet strangers Ask yourself what the risk is of your child having a conversation of ANY type with ANYONE they don't already know That's your primary risk factor It's "stranger danger" but on a very different level 25
© 2009 Charles D. Knutson How do they access kids? Online games Even innocent ones Kids games, chess, you name it More on gaming in other presentation Chat rooms Any and all Including LDS sites Social Networking sites 26
© 2009 Charles D. Knutson How do they access kids? Case Study: MySpace "MySpace.com has found more than 29,000 registered sex offenders with profiles on the popular social networking Web site -- more than four times the number cited by the company two months ago." -- Associated Press, July 25,
© 2009 Charles D. Knutson How do they access kids? "I'm absolutely astonished and appalled because the number has grown so exponentially over so short of time with no explanation." -- Connecticut Attorney General Richard Blumenthal, who also had pressed the company earlier for sex offender data 28
© 2009 Charles D. Knutson Dr. K's explanation… Broadly speaking, two types of social networks on the Internet: 1) Online links for friends who already know each other in the real world FaceBook, LinkedIn 2) Complete strangers can meet other strangers on the Internet MySpace, chat rooms 29
© 2009 Charles D. Knutson Dr. K's explanation… If you were an Internet predator, which type of social network would you frequent?! 30
© 2009 Charles D. Knutson Social networking Just because it's not MySpace, doesn't mean children are safe! Over 300 social networking sites Hundreds of millions of members! A few tips: Look at the policies of the site Assess the attitude of the site Look at the featured profile pictures How does the site make you feel? 31
© 2009 Charles D. Knutson Direct interactions Once a relationship is established… Predator can convince a child to run a "game" or other software Downloads virus into machine, giving full access to the computer Including built-in camera and mic May be consensual or not 32
© 2009 Charles D. Knutson Direct interactions Non-consensual Snoopware Privacy is now gone wherever the computer is Consensual Victim may be persuaded to "perform" for the camera Potentially large network of viewers Potentially large amounts of money 33
© 2009 Charles D. Knutson Direct interactions Once a predator finds out where the victim lives Threats of direct meetings Consensual and non-consensual On-going threats to family Even after predator is out of prison 34
© 2009 Charles D. Knutson Adult dating services Predator searches online dating services for single women with children Children's names, ages, pictures on mom's profile Rendezvous with mom Access to the children 35
© 2009 Charles D. Knutson Standard safety measures Relationship and openness with your children! Lives full of meaningful real-world activities and relationships Limit time on computer And times of day Limit access to cell phones Supervised activities online 36
© 2009 Charles D. Knutson Other resources National Sex Offender Registry Shows registered sex offenders in any geographic area of the U.S. 37
© 2009 Charles D. Knutson Other resources National Center for Missing and Exploited Children Report any suspicious activity online 38
© 2009 Charles D. Knutson Safe Side video clip 39
© 2009 Charles D. Knutson Questions? Internet Safety Podcast Internet Safety Wiki wiki.internetsafetypodcast.com Dr. Charles Knutson 40
INTERNET SAFETY 9 TH GRADE HEALTH. THE FACTS 70% of internet users are men and 30% are women Every 10 seconds there is a cyber crime committed 80% of.
Parenting the Online Child. Your Child Is on the Internet The Internet is a wonderful research tool. Reliance on the Internet in schools has grown rapidly.
Internet Safety for Young People Presented by: Ashwin Seegolam & Shailaja Oolun NCB.
North American Division Office of Education Larry Blackmer, Vice President Larry Blackmer, Vice President Presents -
+ Internet Safety – Overview and Discussion. + The Internet is a Great Tool The Internet is a great tool and can make your life easier and more fun: It.
Homeland Insecurity Inspect Your Gadgets Protecting Our Children In A Technologic World Your home is your castle. Has the mote been bridged?
Cyber Safety: Keeping Your Kids Safe in a High Technology World Crime Prevention Bureau Thousand Oaks Police Department Sgt. Eric Hatlee
Digital Communication includes… Cell phones, computers, and any other devices with access to the Internet on which you can Text Send photos Watch videos.
Protecting Your Familys Soul and Safety Online Ernest Staats Technology Director MS Information Assurance, CISSP, MCSE, CNA, CWNA, CCNA, Security+, I-Net+,
INFORMATION AND RESOURCES Internet Safety. Internet Safety: The Issues Despite the educational and social benefits of information and communication technologies,
Welcome to: Surfing Online Safely Brought to you by the MNPS Community Career Center.
Predator Identification Internet Safety Awareness For presentation at Mayfield Intermediate.
Personal Safety Unit - Level 6. Today you will be learning about personal safety when online. This unit consists of four mini lessons. The PPT covers.
Norwalk Police Department Community Services & Crime Prevention Unit Partnered with the National Center for Missing & Exploited Children and Federal Bureau.
Student Internet Use Tutorial and Agreement Modesto City Schools August 2011.
Integrating Digital Citizenship in a Web 2.0 World – Poster Session Dr. Mike Ribble Author of Digital Citizenship in Schools and Raising a Digital Child.
SOCIAL NETWORKING The Good, The Bad, and The Ugly.
The people Look for some people. Write it down. By the water So there you are. Who will make it? You and I A long time What will they do?
A Parents Guide to Online Kids 101. Your Kids Online 21 million teens - 87% of youth ages are online. 89% send or read s 84% search the Web.
LOCAL COORDINATOR TRAINING A GUIDE TO COMPLIANT PLACEMENTS FROM START TO FINISH WITH STS FOUNDATION Revised 4/5/2013.
Internet Safety in Schools Grades 3,4 &5 Created by: Kim Smith.
The. of and a to in is you that it he for.
Online Predation By: Kristie Nakamura, Liz Campos, Katreina Gamil, & Lawrence Leung Caleb sucks!
GPHS. Netsmartz.org National Center for Missing & Exploited Children Commonsensemedia.org Galena Park ISD Internet Safety Moodle Page.
Child Sexual Exploitation Presentation by Sue Sainsbury Barnardo’s Children’s Service Manager.
Dolch Words the of and to a in that is was.
Lifelong Learning Service Monday 30 th or Tuesday 31 st March :30pm Safe use of the Internet.
Bonnygate Primary School E-Safety Workshop. Safer Internet Day Survey 2013 Primary age children are highly engaged with digital technology: 86% of 7-11s.
E-Safety Evening Tuesday 17 th November 2009 © Cambridgeshire County Council.
E-Safety Talk for SS Peter and Paul Catholic Primary School.
© 2016 SlidePlayer.com Inc. All rights reserved.