We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byLauryn Dixson
Modified over 3 years ago
© 2009 Charles D. Knutson Internet Predators: Who's Watching Our Children Online? Dr. Charles D. Knutson Brigham Young University www.charlesknutson.net
© 2009 Charles D. Knutson Internet predators Actively seeking victims Addictive personalities Very patient Looking for easy targets Critical to be aware and to protect our children! 2
© 2009 Charles D. Knutson Instructional dilemma We all wish we didn't have to talk about this subject You feel dirty just talking about it But… The risk is huge Our children are so vulnerable 3
© 2009 Charles D. Knutson Instructional dilemma "And also it grieveth me that I must use so much boldness of speech … before your wives and your children, many of whose feelings are exceedingly tender and chaste and delicate before God, which thing is pleasing unto God." -- Jacob 2:7 4
© 2009 Charles D. Knutson Instructional dilemma "And it supposeth me that they have come up hither [to Education Week] to hear the pleasing word of God, yea, the word which healeth the wounded soul." -- Jacob 2:8 5
© 2009 Charles D. Knutson Instructional dilemma "Wherefore, it burdeneth my soul that I should be constrained … to admonish you …, to enlarge the wounds of those who are already wounded, instead of consoling and healing their wounds; and those who have not been wounded, instead of feasting upon the pleasing word of God have daggers placed to pierce their souls and wound their delicate minds." -- Jacob 2:9 6
© 2009 Charles D. Knutson Instructional dilemma "And now, I will speak unto you concerning those twenty-four plates, … that the mysteries and the works of darkness, and their secret works, or the secret works of those people who have been destroyed, may be made manifest unto this people…" -- Alma 37:21 7
© 2009 Charles D. Knutson Instructional dilemma "I command you that ye retain all their oaths, and their covenants, and their agreements in their secret combinations; yea, and all their signs and their wonders ye shall keep from this people, that they know them not, lest peradventure they should fall into darkness also and be destroyed." -- Alma 37:27 8
© 2009 Charles D. Knutson Instructional dilemma "Therefore ye shall keep these secret plans of their oaths and their covenants from this people, and only their wickedness and their murders and their abominations shall ye make known unto them; and ye shall teach them to abhor such wickedness and abominations and murders; and ye shall also teach them that these people were destroyed on account of their wickedness and abominations and their murders." -- Alma 37:29 9
© 2009 Charles D. Knutson Some statistics 48% of teens report that their parents or guardians know little or nothing about what they do online 10
© 2009 Charles D. Knutson Some statistics 61% of all teenagers in the United States have a profile on a social networking site MySpace, Friendster, Facebook, Xanga Half of those have posted pictures of themselves 11
© 2009 Charles D. Knutson Some statistics 71% of teens have received messages or email from someone they didn't know Half of those replied to and chatted with someone 12
© 2009 Charles D. Knutson Some statistics 14% of teens have met in person with someone they met via chat on the Internet 13
© 2009 Charles D. Knutson Some statistics 1 in 5 children between 10 and 17 receive a sexual solicitation each year Only 25% of these children told a parent Less than 10% were reported to authorities 14
© 2009 Charles D. Knutson Some statistics 1 in 25 children between 10 and 17 have been asked to send a sexually explicit picture of themselves 1 in 1,500 complied 15
© 2009 Charles D. Knutson Predator behavior Almost all predators begin with an addiction to pornography Descend into more coarse material Violent pornography Child pornography Many predators begin as heterosexual pornography addicts and digress 16
© 2009 Charles D. Knutson Predator behavior Natural shift from pornography to desire for contact with children Moves from private fantasy into spaces where children are That's where we as parents need to be involved, understand, protect Knowledge is power 17
© 2009 Charles D. Knutson Predator behavior Will groom a victim over months Anonymity is generally a must "Amy" is my best friend, I can tell her all my deepest secrets But not always I knew he was 50 years old, but he was so understanding and there for me Increasingly, victims know the real age of the predator and willingly meet 18
© 2009 Charles D. Knutson Predator behavior Social engineers Masters at manipulation Skillful at extracting information over time Will try to hack kids' passwords from limited personal information Children are very uncreative with passwords 19
© 2009 Charles D. Knutson Predator behavior Look for easy targets Children with low self image Lonely, friendless Poor relationship with parents Emotionally isolated from immediate friends and family The kind of kids who spend a great deal of time online... 20
© 2009 Charles D. Knutson Predator behavior Seek jobs/service that place them in proximity to potential victims Cub scout, boy scout leader School teacher Team coach Priest School crossing guard 21
© 2009 Charles D. Knutson Newsgroups Yes, pedophiles have newsgroups Share information Share strategies Share pornographic material Form social networks 22
© 2009 Charles D. Knutson Newsgroups You can check the newsgroups that are subscribed on your computer Will tell you if someone in your house is looking at that material You can check the newsgroups that are available from your ISP Paid newsgroups are not public and do traffic in this material 23
© 2009 Charles D. Knutson Illicit social networking Share pornography Share requests Share victims Some rings involving thousands of people 24
© 2009 Charles D. Knutson How do they access kids? Anywhere online where children can meet strangers Ask yourself what the risk is of your child having a conversation of ANY type with ANYONE they don't already know That's your primary risk factor It's "stranger danger" but on a very different level 25
© 2009 Charles D. Knutson How do they access kids? Online games Even innocent ones Kids games, chess, you name it More on gaming in other presentation Chat rooms Any and all Including LDS sites Social Networking sites 26
© 2009 Charles D. Knutson How do they access kids? Case Study: MySpace "MySpace.com has found more than 29,000 registered sex offenders with profiles on the popular social networking Web site -- more than four times the number cited by the company two months ago." -- Associated Press, July 25, 2007 27
© 2009 Charles D. Knutson How do they access kids? "I'm absolutely astonished and appalled because the number has grown so exponentially over so short of time with no explanation." -- Connecticut Attorney General Richard Blumenthal, who also had pressed the company earlier for sex offender data 28
© 2009 Charles D. Knutson Dr. K's explanation… Broadly speaking, two types of social networks on the Internet: 1) Online links for friends who already know each other in the real world FaceBook, LinkedIn 2) Complete strangers can meet other strangers on the Internet MySpace, chat rooms 29
© 2009 Charles D. Knutson Dr. K's explanation… If you were an Internet predator, which type of social network would you frequent?! 30
© 2009 Charles D. Knutson Social networking Just because it's not MySpace, doesn't mean children are safe! Over 300 social networking sites Hundreds of millions of members! A few tips: Look at the policies of the site Assess the attitude of the site Look at the featured profile pictures How does the site make you feel? 31
© 2009 Charles D. Knutson Direct interactions Once a relationship is established… Predator can convince a child to run a "game" or other software Downloads virus into machine, giving full access to the computer Including built-in camera and mic May be consensual or not 32
© 2009 Charles D. Knutson Direct interactions Non-consensual Snoopware Privacy is now gone wherever the computer is Consensual Victim may be persuaded to "perform" for the camera Potentially large network of viewers Potentially large amounts of money 33
© 2009 Charles D. Knutson Direct interactions Once a predator finds out where the victim lives Threats of direct meetings Consensual and non-consensual On-going threats to family Even after predator is out of prison 34
© 2009 Charles D. Knutson Adult dating services Predator searches online dating services for single women with children Children's names, ages, pictures on mom's profile Rendezvous with mom Access to the children 35
© 2009 Charles D. Knutson Standard safety measures Relationship and openness with your children! Lives full of meaningful real-world activities and relationships Limit time on computer And times of day Limit access to cell phones Supervised activities online 36
© 2009 Charles D. Knutson Other resources National Sex Offender Registry www.familywatchdog.us Shows registered sex offenders in any geographic area of the U.S. 37
© 2009 Charles D. Knutson Other resources National Center for Missing and Exploited Children www.missingkids.com www.cybertipline.com Report any suspicious activity online 38
© 2009 Charles D. Knutson Safe Side video clip 39
© 2009 Charles D. Knutson Questions? Internet Safety Podcast www.internetsafetypodcast.com Internet Safety Wiki wiki.internetsafetypodcast.com Dr. Charles Knutson firstname.lastname@example.org 40
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Internet Safety and Cyber Bullying All info came from
Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
Thank you for your cooperation. We will begin shortly.
MySpace and Online Safety Brian Boies. Agenda What is MySpace? Dangers and Realities Safety Tips.
Keeping Your Child Safe on the Internet
Protecting children online How can you protect your child online? Are you aware of the dangers? Do you know what you can put in place to protect.
Internet Online Safety How to have FUN and Stay in Control.
KEEPING OUR YOUNG PEOPLE SAFE ONLINE. Nine Young Lives Lost
A Guide to Internet Safety High School
Be Safe in MySpace How to Have Fun and Be Safe in MySpace.
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
How to keep your kids safe online
1 “Technology and Social Networking”. 2 Objectives 1.Describe technology that youth are using for social networking. 2.Recognize benefits and dangers.
An Internet Safety Presentation for Middle School Adopted from netsmartz with video from netsmartz.org, center for missing & exploited children, and Saturday.
Grades 5-8 – 56 out of 66 – 85% Grades 9-12 – 79 out of 85 – 93% Grades 5-12 – 135 out of 151 – 89% 100% of the Juniors and Seniors use a social.
ONLINE PREDATORS: HOW SAFE ARE WE? A PHOTO PRESENTATION BY: MICHELLE OCASIO & BRIANNA PEREZ.
GROUP 3: APRIL, DELICIA, LISA, SHEILAH. Your child spends large amounts of time on-line, especially at night. You find pornography on your child's.
Mueller Elementary Keeping your child safe online--- Things parents should know Created by Gold Hill Elementary Tega Cay, SC Adapted with permission by.
Social Networking: The Differences Around The World By: Haley Thacker, Emily Gray Powell, Wright Queen, Holden Chapman, and Rob Willis.
© 2018 SlidePlayer.com Inc. All rights reserved.