SlideShare une entreprise Scribd logo
1  sur  42
Internet Safety for Kids (a presentation for adults) Who is Most at Risk to Online Predators Online Victimization Techniques How to Protect Your Kids  www.packet-level.com/kids   [email_address]
Warning ,[object Object],[object Object],[object Object]
The Statistics ,[object Object],[object Object]
Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Kylie Taylor Case ,[object Object],[object Object],[object Object],[object Object]
Sex Solicitation  Results in Arrest ,[object Object],[object Object]
S.J. Man Surrenders  in Child Sex Case ,[object Object]
Man Delivers  Live Rape Video ,[object Object]
Man Accused of  Soliciting a Child ,[object Object]
Predator “Shopped” at  myspace.com ,[object Object],[object Object]
The Perfect Victim ,[object Object],[object Object],[object Object],[object Object],[object Object]
Is Your Child’s Information Online? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Personal Web Pages (Millions of Visitors) 4.9 26.7 N/A 11.1 5.8 7.9 < 1 1.5
Technophilia ,[object Object],[object Object]
Cyber Child Sex Offender Terminology ,[object Object],[object Object],[object Object],[object Object]
Six Steps to Luring ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Groomers ,[object Object],[object Object],[object Object],[object Object]
Befriending Techniques ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chat Room Tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
“ 13” is our fictitious character online
 
 
Predator Profiles ,[object Object]
Physical Access is the Goal ,[object Object],[object Object],[object Object],John Evander Couey
US Child Protection Law ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
General Internet Safety Tips ,[object Object],[object Object],[object Object],[object Object]
Advice for Parents ,[object Object],[object Object],[object Object]
Advice for Parents ,[object Object],[object Object]
Advice for Parents ,[object Object],[object Object]
Advice for Parents ,[object Object],[object Object]
Monitoring and Restricting Internet Use ,[object Object],[object Object],[object Object],[object Object]
Parental Resources ,[object Object],[object Object],[object Object],[object Object]
www.NetSmartz.org ,[object Object],[object Object],[object Object],[object Object]
www.NetSmartz.org ,[object Object],[object Object],[object Object]
www.ncmec.org ,[object Object],[object Object],[object Object],[object Object],[object Object]
www.livewwwires.com  (Intl) www.webwisekids.org  (US only) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
www.iSafe.org ,[object Object],[object Object],[object Object],[object Object],[object Object]
www.ChildQuest.org   ,[object Object],[object Object],[object Object]
www.packet-level.com/kids ,[object Object],[object Object]
What To Do Now ,[object Object],[object Object]
What To Do Now ,[object Object],[object Object],[object Object],[object Object]
Thank  You ,[object Object]

Contenu connexe

Tendances

“TANK” Talks about Sex Offenders And how important it is to protect Our Kids ...
“TANK” Talks about Sex Offenders And how important it is to protect Our Kids ...“TANK” Talks about Sex Offenders And how important it is to protect Our Kids ...
“TANK” Talks about Sex Offenders And how important it is to protect Our Kids ...Tank TheDinosaur
 
Justine- pedophile laws
Justine- pedophile lawsJustine- pedophile laws
Justine- pedophile lawsJustine
 
Juvenile Case Law Update
Juvenile Case Law UpdateJuvenile Case Law Update
Juvenile Case Law Updateguesta13f3a
 
prt. 1...Online Pedophiles
prt. 1...Online Pedophilesprt. 1...Online Pedophiles
prt. 1...Online PedophilesJustine
 
How Social Media is Changing the Game in Claims Handling
How Social Media is Changing the Game in Claims HandlingHow Social Media is Changing the Game in Claims Handling
How Social Media is Changing the Game in Claims HandlingHNI Risk Services
 
Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internetryangregory55
 
E Safety Powerpoint TMWS
E Safety Powerpoint TMWSE Safety Powerpoint TMWS
E Safety Powerpoint TMWSjpoulston
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safetyrehmannb
 
Digital Sex: Pornography and the Pornification of Society
Digital Sex: Pornography and the Pornification of SocietyDigital Sex: Pornography and the Pornification of Society
Digital Sex: Pornography and the Pornification of SocietyColm Walsh
 
Child Porn Prosecution Darren-Chaker
Child Porn Prosecution Darren-ChakerChild Porn Prosecution Darren-Chaker
Child Porn Prosecution Darren-ChakerDarren Chaker
 
Sex violence in the family and human trafficking in America
Sex violence in the family and human trafficking in AmericaSex violence in the family and human trafficking in America
Sex violence in the family and human trafficking in AmericaRose Kendall
 
6 Clips - William M Fierman
6 Clips - William M Fierman6 Clips - William M Fierman
6 Clips - William M FiermanWilliam Fierman
 
When Teenage Boys Have Been Sexually Abused - A Guide for Teenagers
When Teenage Boys Have Been Sexually Abused - A Guide for TeenagersWhen Teenage Boys Have Been Sexually Abused - A Guide for Teenagers
When Teenage Boys Have Been Sexually Abused - A Guide for TeenagersFemaleMolesters
 
Edu.law.assign1.wk3
Edu.law.assign1.wk3Edu.law.assign1.wk3
Edu.law.assign1.wk3NikiaGlass
 
Cyber Bullying and Sexting
Cyber Bullying and SextingCyber Bullying and Sexting
Cyber Bullying and Sextingmathman314
 

Tendances (20)

“TANK” Talks about Sex Offenders And how important it is to protect Our Kids ...
“TANK” Talks about Sex Offenders And how important it is to protect Our Kids ...“TANK” Talks about Sex Offenders And how important it is to protect Our Kids ...
“TANK” Talks about Sex Offenders And how important it is to protect Our Kids ...
 
Justine- pedophile laws
Justine- pedophile lawsJustine- pedophile laws
Justine- pedophile laws
 
Juvenile Case Law Update
Juvenile Case Law UpdateJuvenile Case Law Update
Juvenile Case Law Update
 
prt. 1...Online Pedophiles
prt. 1...Online Pedophilesprt. 1...Online Pedophiles
prt. 1...Online Pedophiles
 
How Social Media is Changing the Game in Claims Handling
How Social Media is Changing the Game in Claims HandlingHow Social Media is Changing the Game in Claims Handling
How Social Media is Changing the Game in Claims Handling
 
Online pornography
Online pornographyOnline pornography
Online pornography
 
Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internet
 
Pornography
PornographyPornography
Pornography
 
E Safety Powerpoint TMWS
E Safety Powerpoint TMWSE Safety Powerpoint TMWS
E Safety Powerpoint TMWS
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safety
 
Digital Sex: Pornography and the Pornification of Society
Digital Sex: Pornography and the Pornification of SocietyDigital Sex: Pornography and the Pornification of Society
Digital Sex: Pornography and the Pornification of Society
 
Child Porn Prosecution Darren-Chaker
Child Porn Prosecution Darren-ChakerChild Porn Prosecution Darren-Chaker
Child Porn Prosecution Darren-Chaker
 
Pornography presentation
Pornography presentationPornography presentation
Pornography presentation
 
Presentation1
Presentation1Presentation1
Presentation1
 
Sex violence in the family and human trafficking in America
Sex violence in the family and human trafficking in AmericaSex violence in the family and human trafficking in America
Sex violence in the family and human trafficking in America
 
6 Clips - William M Fierman
6 Clips - William M Fierman6 Clips - William M Fierman
6 Clips - William M Fierman
 
When Teenage Boys Have Been Sexually Abused - A Guide for Teenagers
When Teenage Boys Have Been Sexually Abused - A Guide for TeenagersWhen Teenage Boys Have Been Sexually Abused - A Guide for Teenagers
When Teenage Boys Have Been Sexually Abused - A Guide for Teenagers
 
Cyberbullying report by boys over flower
Cyberbullying report by boys over flowerCyberbullying report by boys over flower
Cyberbullying report by boys over flower
 
Edu.law.assign1.wk3
Edu.law.assign1.wk3Edu.law.assign1.wk3
Edu.law.assign1.wk3
 
Cyber Bullying and Sexting
Cyber Bullying and SextingCyber Bullying and Sexting
Cyber Bullying and Sexting
 

En vedette

En vedette (8)

Carol Cone - The Power of Storytelling
Carol Cone - The Power of StorytellingCarol Cone - The Power of Storytelling
Carol Cone - The Power of Storytelling
 
Introducción a los sistemas de información
Introducción a los sistemas de informaciónIntroducción a los sistemas de información
Introducción a los sistemas de información
 
Ser historia
Ser historiaSer historia
Ser historia
 
Diálogos, número 47
Diálogos, número 47Diálogos, número 47
Diálogos, número 47
 
inteligencias múltiples
inteligencias múltiples inteligencias múltiples
inteligencias múltiples
 
Metodos numericos
Metodos numericosMetodos numericos
Metodos numericos
 
Etica y moral
Etica y moralEtica y moral
Etica y moral
 
César tello scm en empresas de confecciones
César tello   scm en empresas de confeccionesCésar tello   scm en empresas de confecciones
César tello scm en empresas de confecciones
 

Similaire à Internet Safety

Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internetmalissa_1041
 
Internet predators:parents clueless?
Internet predators:parents clueless?Internet predators:parents clueless?
Internet predators:parents clueless?migueltachna
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet SafetyEric Cedo
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentationjpl17
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletLockley
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineMichael Heron
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimesNilendra Kumar
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet SafetyJVGAJJAR
 
Internet Safety Meeting New
Internet Safety Meeting NewInternet Safety Meeting New
Internet Safety Meeting NewRandy Rodgers
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationjpl17
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingkpwillia
 
2012 06 Sexting and Cyberbullying
2012 06 Sexting and Cyberbullying2012 06 Sexting and Cyberbullying
2012 06 Sexting and CyberbullyingRaleigh ISSA
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Erickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson Martinez
 

Similaire à Internet Safety (20)

Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
 
Internet predators:parents clueless?
Internet predators:parents clueless?Internet predators:parents clueless?
Internet predators:parents clueless?
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentation
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutlet
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
102009
102009102009
102009
 
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimes
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet Safety
 
Internet Safety Meeting New
Internet Safety Meeting NewInternet Safety Meeting New
Internet Safety Meeting New
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
2012 06 Sexting and Cyberbullying
2012 06 Sexting and Cyberbullying2012 06 Sexting and Cyberbullying
2012 06 Sexting and Cyberbullying
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Erickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshareErickson martinez cyber bullying and internet addiction slideshare
Erickson martinez cyber bullying and internet addiction slideshare
 
cyberworld
cyberworld cyberworld
cyberworld
 

Dernier

Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoSABC News
 
Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfauroraaudrey4826
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victoryanjanibaddipudi1
 
Opportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationOpportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationReyMonsales
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkbhavenpr
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdfGerald Furnkranz
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerOmarCabrera39
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkbhavenpr
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012ankitnayak356677
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeAbdulGhani778830
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsnaxymaxyy
 
IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest2
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.NaveedKhaskheli1
 

Dernier (13)

Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election Manifesto
 
Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdf
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
 
Opportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationOpportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and information
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert Oppenheimer
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpk
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for Justice
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the rounds
 
IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global News
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.
 

Internet Safety

  • 1. Internet Safety for Kids (a presentation for adults) Who is Most at Risk to Online Predators Online Victimization Techniques How to Protect Your Kids www.packet-level.com/kids [email_address]
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Personal Web Pages (Millions of Visitors) 4.9 26.7 N/A 11.1 5.8 7.9 < 1 1.5
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. “ 13” is our fictitious character online
  • 21.  
  • 22.  
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.

Notes de l'éditeur

  1. INSTRUCTOR/PRESENTER NOTES (updated 1/5/06) Read the Internet Safety for Kids book online and recommend it to your audience. Anyone can download it for free at www.packet-level.com/kids. I bring the book with me to show to the audience – physical props are key for an adult audience. Don’t forget to print handouts and surveys for your attendees. Both documents can be found online at www.packet-level.com/kids. If you do not want to deal with the expense or hassle of printing out long handouts, perhaps you want to hand out the “Internet Safety for Kids Link List” document. This presentation is designed as a one-hour session. Your delivery time may vary. Consider adding your contact email address to this slide if you want to answer email questions after the presentation.
  2. Ensure no children are present when beginning the presentation (if an adult has brought a child/children, consider providing the link information so they can take the course at another time when their children are not present.
  3. Additional statistics are available online at www.ncmec.org (National Center for Missing and Exploited Children). Just as a side note – the “1 in 5” statistic is from a June 2000 report Center for Missing and Exploited Children. The study surveyed over 1500 kids aged 10 to 17. At the increase rate of pedophilia, the statistic is most likely much higher. For example, we created a 13-year old fictitious child and entered a chat room – within 3 hours we had been solicited by 5 individuals and were provided with a link to view a live webcam of a man masturbating.
  4. Briefly list these items – no need to dwell now – especially if your presentation is only 1 hour.
  5. Read the materials online at www.perverted-justice.com – they set up sting operations with fictitious child accounts in chat rooms.
  6. Consider only briefly mentioning these case studies… you are setting the tone for the audience. Most shocking point: Brown allegedly posted a message in a chat room asking parents to arrange for him to meet privately with their children.
  7. Offenders often seek out jobs where they are in close proximity with children. You might note that possession of child pornography is often a precursor to “acting out” pedophile tendencies.
  8. This is by far the most disturbing case in this presentation. In fact, I removed the second paragraph because of the graphic nature. Typically I don’t spend much time on this one – other than to say that this one disgusts me. [Note: I think it is ok to show emotion when you present this course – this is a horrific case.]
  9. At this point, the audience really gets it – it is time to move on. “The list of cases just goes on and on…. We need to do something about this epidemic.” Let’s start with a look at who is most “at risk.”
  10. THIS IS AN IMPORTANT CASE TO BRING UP ! These “personal webpages” enable predators to shop for kids based on their interests and looks. Many kids are at risk because they put too much personal information on these personal web pages. This teenager, who attends high school in Tampa, told Greico she thought it was strange that he would want to be friends with her since he was so much older than she. She informed her mother about Greico&apos;s message who then informed authorities. Undercover investigators corresponded with Greico over the Internet for four months. In one recent exchange, Greico allegedly made explicit references to oral sex in a message he thought he was sending to the girl, she said.
  11. This list was compiled from a document entitled, “Characteristics of a Fictitious Child Victim: Turning a Sex Offender’s Dreams Into His Worst Nightmare” by James F. McLaughlin. [Note: I do reference Detective McLaughlin’s materials throughout this presentation. He has some solid data that goes much further than simply stating that predators may be lurking in chat rooms.]
  12. This course was presented by Cynthia Heatherington – an excellent presenter! Although the course is designed to research an older target, it provides valuable insight into the tasks you can use to detect your child’s information online.
  13. These personal web sites can be shopping grounds for predators. Kids release a tremendous amount of personal information such as their school information, hobbies, best friends’ names and nicknames, IM screen names, family pets, favorite teams and often quite a bit of sexual detail about themselves.
  14. Detective James McLaughlin worked with a Child Sex Exploitation team supported by an ICAC (Internet Crimes Against Children) grant. Download the documents at www.ci.keene.nh.us/police/task_force.htm. On that website you will also find the predator profile document.
  15. Chatters may never collect child pornography or plan on traveling – they can still expose kids to explicit sexual materials, however.
  16. Note: I highly recommend that you purchase the Missing Game (there is a family edition and a school edition which contains multiple copies of the DVD for more players). The target audience for the Missing Game is 11-14, the most at-risk group. I bring the Missing Game with me to presentations – the entire box and all contents. I unpack it in front of the room at this time and describe the contents and the basic point of the game. It is a nice break from working off slides. You might want to show it here or later, when you reference the website where they can order the game.
  17. Not all predators follow the same process or use the same methods. They often do begin with the befriending process however. This process includes “grooming” the child – forming a trusting bond with the child. - Romantic groomers may woo the child with adulation and romantic fantasies involving the child and predator. For example, this type of groomer may tell the child how they would shower them with flowers and gifts and take them to romantic settings. - Aggressive groomers may actively show impatience with the child and push the child to meet with them much sooner than the more patient romantic groomer. - Monetary/status groomers may play on a child’s need for emotional, physical and financial independence. There are many &amp;quot;types&amp;quot; of groomers. Not all groomers will use guilt and threats to gain power over the child and not all groomers have the same patience level and persistence.
  18. Lurking in a chat room isn’t going to give you the “in your face” feel that IM (Instant Messaging) does. If you sit in a chat room for a few moments, however (at chat.yahoo.com, for example), someone will IM you to open a private conversation.
  19. The Tracking Theresa presentation depicts a chat session with a predator researching the child on the side while the chat is taking place. Very interesting presentation.
  20. Here’s a typical reaction we received to our 13-year old fictitious child in the Yahoo chat rooms. We always stated up front that our character was 13 – this guy was very insistent on getting a photo.
  21. We were constantly bombarded with IM sessions asking for “asl” – age, sex, location. This character moved right into the personal questions… and eventually toyed with the idea of coming from the Phillipines for a “visit”. He was more interested in 8 and 10 year old girls however, and felt 13 might be a bit too old.
  22. This guy (nicknames have been changed) adopted an obsessive chat-stalking behavior with our 13-year old character. He professed his love, offered her anything she wanted and stated (see last line)… “I will die for u”. When his affections were not returned, he became irate and threatening – not uncommon.
  23. This document often shocks parents who don’t picture a predator as someone working or parenting children. I keep a printed copy of the entire document with me at the front of the room in a blue folder in case someone wants to peruse the list after the presentation.
  24. Unfortunately, the online registered sex offender database is typically far from accurate - 25% off in fact. In one neighborhood in California, however, over 50% of the offenders listed were unaccounted for because they had not checked in recently.
  25. If you are presenting this course outside the United States, consider replacing this slide with local information.
  26. This is a general, common sense list that some parents may have already heard. In a moment, you will introduce Advice for Parents defined by Detective McLaughlin who has worked hundreds of child sex exploitation cases.
  27. The most at-risk age is from 11 to 14. Refer back to the slide entitled, “The Perfect Victim.” There are online “pledge sheets” at www.netsmartz.org.
  28. Computer-savvy kids can find sites that disclose methods for getting around filtering restrictions.
  29. You want your child to take their Internet safety awareness with them and apply it in all locations, not just at home.
  30. Detective McLaughlin has done a good job writing up the warning signs. Some monitoring solutions are listed on the next slide.
  31. FYI, you can open Internet Explorer Help and type in “Children” -- it takes you directly to the instructions for the IE Content Advisor. Make sure attendees know that there are web sites dedicated to getting around these filtering tools ( www.zensur.freerk.com is one example).
  32. We found a range of course materials online – the majority seemed geared toward the younger audience (lots of cartoon characters). iSafe has numerous courses available for certified iSafe instructors – consider looking into their courses at www.isafe.org.
  33. Suggestion: Download the I-360 presentation set online from www.netsmartz.org/education/ut. Amy’s Choice (teen who was lured) Tracking Teresa (tracing back from a chat session) Angela’s Experience (online bullying) Keisha’s Crime (strange online bullying) Damon’s Game (online racism) Online Shopping (online scams; credit card fraud) Downloads (copyright infringement) Research &amp; Citing Sources (plagiarism) Online Gambling (online gambling laws) Internet Use Tips (hints to avoid being a financial victim) The i360 program makes you open and view the files in a specific order. Once you have completed going through all the materials you can visit them again in any order as long as you use the same login name.
  34. I recommend tracking Teresa for non-technical AND technical adults. It is a good example of how kids are traced back from their online comments. If you have downloaded the i360 program from www.netsmartz.org/education/ut consider playing just a piece of one of these presentations for the audience – this requires audio in the room.
  35. At www.ncmec.org, check out the “Types of Child Sexual Exploitation” section that provides information on the following: Possession, manufacture, and distribution of child pornography Online enticement of children for sexual acts Child prostitution Child sex tourism Child sexual molestation (not in the family) Unsolicited obscene material sent to a child Misleading domain names The CyberTipline is available in the US only. In Europe, reference www.inhope.org.
  36. Based on a true story, the Missing Game offers kids ages 11-14 a chance to watch as a child, Zack, strikes up a conversation with an online predator. Players learn the six steps to luring and use their investigative skills to help locate Zack’s whereabouts when he goes missing. I bring the Missing Game box with me to show when I do presentations. It offers a nice break from the lecture-to-slides style of presentation.
  37. iSafe offers training courses throughout the United States. Learn more about their curriculum online at www.isafe.org.
  38. We have personally met with the Child Quest group in California and were VERY impressed with their organization. They teach the MISSING game at various schools and are tied in with law enforcement to help recover missing children. We highly recommend ordering “Milk Cartons: The Way Back Home” video that shows how children can be lured by predators in the physical world.
  39. This is where we keep the Powerpoint slides, notes, links and resources. Please email us at kids@packet-level.com if you have comments, questions, suggestions, etc.
  40. These course summary slides are “action items” for your audience.
  41. These course summary slides are “action items” for your audience.
  42. Please provide survey forms for the audience to fill out. Instructions for submitting them to us are contained on the Train-the-Leader audio course online. If questions, please email kids@packet-level.com. Thank you for your assistance in educating adults on Internet safety for kids!