380 likes | 500 Views
On-Line Protection. April 27, 2006 SEM Conference. On-Line Protection. Computer users in the USA In excess of 100 Million. More importantly, 45 Million children and teens have access to the INTERNET.
E N D
On-Line Protection April 27, 2006 SEM Conference
On-Line Protection • Computer users in the USA • In excess of 100 Million. • More importantly, 45 Million children and teens have access to the INTERNET. • Experts estimate that there are in excess of 77 Million children and teens with access to the INTERNET.
The Internet • A global electronic communication network which allows individuals to communicate worldwide with others via the use of a computer • The Internet is not governed by any entity, with no limits or checks on the kind of information maintained by and accessible to its users • The Internet is the gateway to unmonitored communication among Child Predators
The Internet BOOGEYMAN
STATS • Stats (OJJDP): • 2001, 1,501 youth between 10-17 who used the Internet regularly, participated in a government study on Internet crime. • 1 in 5 received unwanted sexual solicitation • 5% received a distressing sexual solicitation • 3% received an aggressive solicitation for off line contact • 25% reported exposure to unwanted sexual material
STATS • Stats (Cyberangels): • 75% of children share personal information about themselves willingly over the Internet • Only 25% of children tell a parent about an encounter with a predator • Online predators will contact 77% of youths by the age of 15, and 22% of children between the ages of 10-13.
Roper Survey • 71% of parents with children under the age of 14 give no supervision while the child SURFS the Internet!!!!!!!!!!!!!!!!!!!!!!!
87% of university students polled have virtual sex mainly using Instant Messenger, webcam, and telephone “CampusKiss and Tell” University and College Sex Survey. Released on February 14, 2006. CampusKiss.com. February 17, 2006 By the end of 2004, there were 420 million pages of pornography, and it is believed that the majority of these websites are owned by less than 50 companies. The Internet pornography industry generates $12 billion dollars in annual revenue – larger than the combined annual revenues of ABC, NBC, and CBS (Family Safe Media, January 10, 2006, The largest group of viewers of Internet porn is children between ages 12 and 17 (Family Safe Media, December 15, 2005, According to comScore Media Metrix, Internet users viewed over 15 billion pages of adult content in August 2005. According to comScore Media Metrix, Internet users spent an average of 14.6 minutes per day viewing adult content online.
The cybersex industry generates approximately $1 billion annually and is expected to grow to $5-7 billion over the next 5 years, barring unforeseen change (National Research Council Report, 2002). The total porn industry - estimates from $4 billion to $10 billion (National Research Council Report, 2002). The two largest individual buyers of bandwidth are U.S. firms in the adult online industry (National Research Council Report, 3-1, 2002). 40,000 expired domain names were porn-napped (National Research Council). Commercial pornography sites: 74 percent display free teaser porn images on the homepage, often porn banner ads. 66 percent did not include a warning of adult content. 11 percent included such a warning but did not have sexually explicit content on the homepage. 25 percent prevented users from exiting the site (mousetrapping).
On-Line Protection • The Risks of Unsupervised SURFING: • Exposure to inappropriate material that is Sexual, Hateful, or Violent in nature, or encourages activities that are dangerous or illegal • Physical and Mental molestation by on-line predators who gain the child's confidence and trust
PREDATOR • Characteristics of an On-Line Predator: • Liar: ( Self explanatory ) • Deceiver: His self situation is presented as other than what it is. • Betrayer: He is likely to break trust. • Insecure: He is worried that others will be faithless. • Inconsistent: He will say one thing while doing another. • Lacking Honor: Usually while protesting that he has honor. • Lack of Respect: He will tend to denigrate others. • Transient: He is unlikely to have many long term friends.
PREDATOR • Manipulator: He calculates and contrives for his own benefit to the detriment of his partner. • Secretive: He will tend to cloak himself and his activities. • Charming: If he could not steal your breath away, he would not be a successful hunter. • Selective: He will pick victims carefully, looking for weaknesses and filling those voids completely. • Chameleon: He will appear to fit any need perfectly and adapt to fill any desire. • Lacking in Self Control: Although at times, he may have extraordinary self control and discipline.
PREDATOR • Language used • Checks profiles (biographical history) • Asks for personal information • Requests pictures • Talks about life/family/friends • Downloads everything • Telephone contact • Personal meeting/molest
PREDATOR • Law enforcement officials estimate that as many as 50,000 sexual predators are online at any given moment (Dateline, January 2006). • Internet pedophiles are increasingly adopting counter-intelligence techniques to protect themselves from being traced (National Criminal Intelligence Service, 8/21/03). • One in five children who use computer chatrooms has been approached over the Internet by pedophiles. • 89% of sexual solicitations were made in either chat rooms or Instant Messages. (Pew Study reported in JAMA, 2001). • 13 million youth use Instant Messaging. (Pew Study reported in JAMA, 6/01). • 1 in 4 kids participate in Real Time Chat. (FamilyPC Survey, 2000).
YOUTH • Half of teens ages 13-18 often communicate through the Internet with someone they have not met in person. • One-third of youth ages 8-18 have talked about meeting someone they have only met through the Internet. • Almost one in eight youth ages 8-18 discovered that someone they were communicating with online was an adult pretending to be much younger. • Nine out of 10 children aged between eight and 16 have viewed pornography on the Internet. In most cases, the sex sites were accessed unintentionally when a child, often in the process of doing homework, used a seemingly innocent sounding word to search for information or pictures.
The Internet Experience • Where to go? • MYSPACE.COM • YAHOO.COM • LIVEJOURNAL.COM • PHOTOBUCKET.COM • AOL.COM • XANGA.COM GOOGLE “Teen Chat”
The Internet Experience • The MYSPACE and LIVEJOURNAL are an online style diary or BLOG that allows the user to post any information they may desire. • AOL and YAHOO are live chat rooms with immediate interaction between users. • PHOTOBUCKET is an area to post images of a user and is somewhat similar to MYSPACE.
DEMO • YAHOO • MYSPACE • PHOTOBUCKET • LIVEJOURNAL
WHAT TO DO? • WHAT TO DO ABOUT THIS PROBLEM
WHAT TO DO? • Parental Involvement: • RULE #1: Have some knowledge about computers • Get to know the Internet and the services your children use. Have your children show you around the areas they visit. • RULE #2: Supervise all activity on the computer: • Pay attention to the sites your child is viewing and the actions of your child when you enter the computer area. Children under the age of 14 should not be left unsupervised on the Internet. Parent should maintain all accounts and no passwords allowed other than approved by parent.
WHAT TO DO? • RULE #3: The computer should be in an open accessible area of your home. • NEVER allow a child to have a computer on the Internet in a private room.
NET SPEAK • WORDS to know: • POS Parent over shoulder • P911 My parents are coming, watch your language • TA/SA Teacher / Sibling Alert • :OX Shhh! It’s a secret • CTN Can't talk now
On-Line Protection • “The best way to assure your children are having positive online experiences is to stay in touch with what they are doing.” • “While children need a certain amount of privacy, they also need parental involvement.” • safekids.com
SAFTEY • Make it a family rule: • No identifying information in a screen name • Never give out identifying information • Never allow a child to make a face-to-face meeting with another computer user • Never respond to messages or bulletin board items that are suggestive, obscene, threatening, or make you feel uncomfortable • Report all unwanted contact immediately to a parent or adult
SCREEN NAMES • The name used by a person to identify their presence in a chat room or location on the Internet • XXXteen13XXX, Caligirl12, Oaktown14 • SanRamongirl, teenprincess, almost14, • Flirt12345, bigbutt14, 10thgradesucks
On-Line Protection • Develop and discuss rules about Internet use and make a contract. • Contracts available at NCMEC.ORG, SAFEKIDS.COM, and others
SOFTWARE • Software solutions: • There are many commercially available programs available to monitor and track on-lie activity with your children.
SOFTWARE • SPECTOR • CYBERSITTER • CYBERPATROL • NETNANNY AOL USERS, use AOL GAURDIAN
SOFTWARE • These programs can be set to accomplish several different tasks. These programs monitor and track activity on the computer that include Email, Internet usages, chat rooms, and others. These programs keep an accurate log and can Email you directly at you work or pager • THESE PROGRAMS ARE NO SUBSTITUTE FOR ACTIVE PARENTAL INVOVLEMENT
SURVEILLANCE • It is very hard to violate the trust of your child, it is even hard to have your child violated by a predator. • No one is happy being watched, but it is a necessary evil in an environment that is out of control. You would not buy a gun then leave in on the table for the kids to play with, why leave a device with just as destruction open to our children
SURVEILLANCE • 15 y/o female spent a great deal of time on Internet, mother became worried and installed SPECTOR, daughter was in LA for sports camp, mother found next week she was to meet a 50 y/o male in Tahoe area. • 15 y/o female Alameda County, Met 45 y/o coach from LA area, had sexual relationship, mother became suspicious and checked computer, chat logs and pictures found.
What to do about a Predator • If a predator has contacted or attempted contact with you child: • Don’t delete information • Don’t attempt to contact predator • Do contact local Police Immediately • Do talk about the incident with your child and others if possible, share the experience to help others
What to do about a Predator • Contact is not against the law • Sexual solicitation or trying to meet the child is against the law • Remember: The predator targets by the victims age, sex and location. The predator will try and remain anonymous. • Travelers.
What to do about a Predator • The absolute best protection is stop the threat before it happens. If you have prior knowledge, you have the ability to prevent your child from the harm of an on-line predator.
Other Issues • Wireless Networks • Identity Theft • Home Safety