SEXTING AND SEXTORTION: KEEPING KIDS SAFE

Size: px
Start display at page:

Download "SEXTING AND SEXTORTION: KEEPING KIDS SAFE"

Transcription

1 Federal Partners in Bullying Prevention SEXTING AND SEXTORTION: KEEPING KIDS SAFE November 20, :00-3:00 p.m. ET

2 Moderator Sarah Sisaye, MPH Management and Program Analyst Office of Safe and Healthy Students Office of Elementary and Secondary Education US Department of Education

3 Webinar Learning Objectives During the course of this webinar participants will: Gain a clear understanding of what sexting and sextortion is and learn the dangers involved Learn about the laws related to sexting and sextortion Acquire tools on how to help youth identify and avoid online predators and how to set boundaries with peers who are pressuring them to sext

4 Presenter Lt. Eric Buehler Commander, ICAC Task Force Sacramento County Sheriff s Department

5 SEXTING Changing an Emerging Culture to Protect Our Children

6 What is Sexting? Webster's defines sexting as: sex ting noun \ˈsek-stiŋ\ the sending of sexually explicit messages or images by cell phone

7 A Growing Culture Becoming the norm in teen culture Recent study published by Pediatrics concluded it has grown substantially in the last three years Considered among the youth today as the new first base

8 The Facts A 2012 study published by Pediatrics concludes that: The mean average age of the group studied was years 27.6% have sent a sext 31.4% have asked for a sext 60.0% have been asked

9 Child Pornography Online 10% 24% 7% 3% 17% 3% 3% 14% 16% 3% Parent Other relative Neighbor/family friend Baby sitter/coach Guardian's partner Online enticement Unknown to child Self-produced Boyfriend Human tafficker Abuser data based upon victim information submitted to NCMEC by law enforcement as of Feb. 18, 2013

10 Damage Shared with others Posted to Social Media Shaming / Cyber bullying Isolation Anxiety Depression

11 Laws Self produced nude images of underage subjects are in fact Child Pornography (CP) Production of CP is a felony even when self produced Possession and/or distribution of a CP image is a felony even if the possessor is underage Different jurisdictions handle the cases in varying ways

12 Changing the Culture Parents Talk to your kids Teachers and Counselors Talk to your students Report and deal with suspected sharing of images immediately! Look to resources to help you raise awareness

13 Resources ICAC Task Force ( National Center for Missing and Exploited Children (NCMEC) ( Send This Instead app and webpage Netsmartz.org

14 Send this instead Videos

15 Additional Help

16 Upcoming Webinar Send this Instead Thursday, December 11, :00 3:15pm ET Presenter: Joe Versace Registration URL:

17 Thank You Lieutenant Eric Buehler

18 Presenter Supervisory Special Agent Jacob E. Baillie FBI s Violent Crimes Against Children Program Management Unit

19 Federal Bureau of Investigation Criminal Investigative Division Supervisory Special Agent Jacob E. Baillie

20 Unclassified//For Official Use Only What is Sextortion? Sextortion is a criminal act when someone demands something of value, typically images of a sexual nature, sexual favors, or money from a person (victim) by: Threatening to release or distribute material that the victim seeks to keep private (sexually explicit images, videos, , text messages) Threatening to financially harm friends or relatives of the victim using information they obtained from the victim s computer Withholding something the victim needs or wants unless they comply with the demands (someone in a position of power) Unclassified//For Official Use Only

21 How does Sextortion Happen? Sextortion can be perpetrated in many ways by those seeking to exploit vulnerable individuals sexually or for financial gain. It typically begins by obtaining sensitive material pertaining to their victims. Hacking or the use of malware to assume control of a victim s computer (may allow access to files, webcam, microphone) Theft of personal electronic devices that contain sensitive material Social engineering: leads the victim to believe the perpetrator can be trusted (boyfriend, girlfriend, modeling agency) resulting in the release of sensitive material to the perpetrator Identity theft Unclassified//For Official Use Only

22 Unclassified//For Official Use Only Relationship to Sexting & Bullying Sexting is the sending of sexually explicit images from one person to another using a mobile device such as a cell phone. Sexting is one way images come into the possession of one who would use them for sextortion. When sexually explicit images of a student are distributed to others, those images often become the basis of intense bullying in a school environment. Unclassified//For Official Use Only

23 Unclassified//For Official Use Only Examples of Sextortion In 2013, Christopher Patrick Gunn, 31, of Montgomery, AL was sentenced to 35 years in prison for producing child pornography through a massive online sextortion scheme. Over a period of more than two years, Gunn repeatedly used computers, chat rooms, and other social medial outlets to threaten HUNDREDS of young girls located throughout the United States and internationally. Unclassified//For Official Use Only

24 Examples of Sextortion In 2008, Jonathan Vance, 24, was sentenced to 18 years in federal prison. Vance admitted sending threatening e- mails on Facebook and MySpace in order to extort nude photos from more than 50 teenage girls in 3 states. Vance told the FBI that the intimidation and extortion made him feel empowered. Unclassified//For Official Use Only

25 Unclassified//For Official Use Only Examples of Sextortion In 2010, Anthony Stancl, 19, was sentenced to 15 years in federal prison. Stancl posed as a two girls on Facebook to trick and deceive at least 31 of his male high school classmates into sending him nude cell phone photos and videos of themselves. Stancl then used those photos to extort at least 7 of his male high school classmates for sex. Unclassified//For Official Use Only

26 Unclassified//For Official Use Only Examples of Sextortion In November 2014, Lucas Michael Chansler, 31, of St Johns County, FL was sentenced to 105 years in prison for engaging in an extortion scheme to produce child pornography. Targeted 350 child victims in 26 different states throughout the United States, Canada, and the United Kingdom Approximately 106 child victims have been identified thus far Unclassified//For Official Use Only

27 Unclassified//For Official Use Only The Extent of the Problem Google Trends shows that searches on the term sextortion first appeared in 2010 with the prosecution of several cases. The National Center for Missing and Exploited Children (NCMEC) received its first report related to extortion in October In the subsequent eight months, NCMEC received 181 reports that could be classified as sextortion. There is consistently an international nexus to sextortion cases The FBI s Violent Crimes Against Children International Task Force consists of law enforcement officers from approximately 40 countries. Unclassified//For Official Use Only

28 Unclassified//For Official Use Only Who is at Risk? Sextortion affects both girls and boys across all demographics. Victims of extortion/sextortion withdraw from members of their family and can experience: Anxiety Psychological, physical, and emotional trauma Bullying Increased risk for suicide Increased rates of dropping out of school Unclassified//For Official Use Only

29 Unclassified//For Official Use Only Protection Against Sextortion For Parents & Educators: Supervise children s computer or mobile device use Keep computers and tablets in common rooms Devices like smartphones are trickier, as kids carry these with them wherever they go Disabling the camera within the phone s operating system Use parental control software Talk with your kids Keep an open line of communication with your kids Children should know they can come to you without fear of reprisal Express genuine interest in their online activities Remember, those exploited through these crimes are victims, no matter what they did or how they responded to the threat Unclassified//For Official Use Only

30 Protection Against Sextortion Layer security Use strong passwords Verify sender before opening unexpected attachments Update software promptly Use a firewall, anti-malware software, and possibly encryption Do not assume technology alone will protect you Report sextortion to the FBI It s still important to report all instances of sextortion to law enforcement In some cases the perpetrator may be a teenager, however, its not uncommon that the perpetrator is an adult masquerading as a teenager Law enforcement can help make a determination who the perpetrator is as well as take steps to help minimize further distribution of sensitive material A parent s report may result in the rescue of dozens or even hundreds of other children Unclassified//For Official Use Only

31 Unclassified//For Official Use Only Reporting Sextortion To report suspected sextortion crimes or to get help from law enforcement, please call your local FBI office or toll-free at: CALL-FBI ( ) Unclassified//For Official Use Only

REQUEST FOR COUNCIL ACTION CITY OF SAN DIEGO

REQUEST FOR COUNCIL ACTION CITY OF SAN DIEGO REQUEST FOR COUNCIL ACTION CITY OF SAN DIEGO CERTIFICATE NUMBER (FOR COMPTROLLER S USE ONLY) TO: CITY COUNCIL FROM (ORIGINATING DEPARTMENT): Police Department DATE: 5/26/2015 SUBJECT: Informational update

More information

Office of the Attorney General of Virginia. Sexting. Protecting Yourself on the Internet and Mobile Devices

Office of the Attorney General of Virginia. Sexting. Protecting Yourself on the Internet and Mobile Devices Office of the Attorney General of Virginia Sexting Protecting Yourself on the Internet and Mobile Devices Websites Often Used for Social Networking Monthly Visitors to Social Networking Sites 1. 750,000,000

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying

More information

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain

More information

Internet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force

Internet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force Crimes Against Children Unit SECTIONS CPU ICAC DFU WVMCC WV3C Crimes Against Children Unit WVSP Organizational Change December 1, 2009

More information

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Social Media and its effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Director, Begun Center for Violence Prevention Research & Education Mandel School of Applied Social Sciences

More information

Affirmative Action Presentation

Affirmative Action Presentation Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,

More information

FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY. www.cheezo.org 303-271-6766

FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY. www.cheezo.org 303-271-6766 FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY www.cheezo.org 303-271-6766 A Message from District Attorney Peter Weir One of the priorities of the District Attorney s Office

More information

The webcast will begin shortly. Please stand by.

The webcast will begin shortly. Please stand by. The webcast will begin shortly. Please stand by. @Gaggle_K12 Making Student Safety A Priority @Gaggle_K12 Webcast Tips ü To switch from computer audio to your phone, locate the Audio Pane, select Use Telephone

More information

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for

More information

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 ) Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.

More information

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities

More information

How To Protect Children From Abuse

How To Protect Children From Abuse CREATING A NETWORK OF PREVENTION AND PROTECTION To report suspected abuse of a minor, call the Pennsylvania Child Abuse Hotline 1-800-932-0313 If you suspect child abuse by clergy, church officials, church

More information

E-Safety Issues and Online Safety. Parents Evening

E-Safety Issues and Online Safety. Parents Evening E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children

More information

Predators will use information obtained from children to gain trust and friendship

Predators will use information obtained from children to gain trust and friendship 1 We will be discussing several topics during this presentation, including online relationships, the importance of keeping personal information private, protecting your reputation, cyber bullying, and

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Social Media Guidelines Resource

Social Media Guidelines Resource Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding

More information

PARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com

PARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com PARENTING IN THE DIGITAL AGE Patti Agatston, Ph.D. www.cyberbullyhelp.org pagatston@gmail.com Teens and Technology Use 78% have a cell phone 95% use the Internet 91% have an email address 74% access the

More information

Cyber safety Parent Easy Guide 63

Cyber safety Parent Easy Guide 63 Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed

More information

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages. Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications

More information

Appropriate Use of Social Media and Cell Phones

Appropriate Use of Social Media and Cell Phones Appropriate Use of Social Media and Cell Phones Karen Haase Harding & Shultz (402) 434-3000 khaase@hslegalfirm.com H & S School Law @KarenHaase Raise your hand if You have a cell phone You use text messaging

More information

2014 Teen Internet Safety Survey. Conducted by The Futures Company

2014 Teen Internet Safety Survey. Conducted by The Futures Company 2014 Teen Internet Safety Survey Conducted by The Futures Company Contents Background, Objectives, Methodology Major Findings Important Trends Next Steps 2 Background + Objectives Cox s commitment to Online

More information

How To Avoid The Identity Theft Predators

How To Avoid The Identity Theft Predators Camp Watwuzithinkin How To Avoid The Identity Theft Predators Predator 0 An organism that lives by preying on other organisms Identity Thief 0 A person who makes a living by preying on other people Outsmart

More information

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual

More information

15 Dangerous Apps Every Parent Should Know About

15 Dangerous Apps Every Parent Should Know About 15 Dangerous Apps Every Parent Should Know About It s safe to say that the advent of the digital age and specifically the Internet, smartphones and social media have brought unique and daunting challenges

More information

Model Safeguarding Policy and Procedure for Smaller Voluntary and Community Groups

Model Safeguarding Policy and Procedure for Smaller Voluntary and Community Groups Introduction Model Safeguarding Policy and Procedure for Smaller Voluntary and Community Groups This NAME OF ORGANISATION policy follows guidelines set out in Bath & North East Somerset (B&NES) Safeguarding

More information

Teen Online & Wireless Safety Survey

Teen Online & Wireless Safety Survey Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications kimberly.thomas@cox.com 404-269-8057 Cox Communications

More information

Protect yourself online

Protect yourself online Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice

More information

Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour:

Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour: #300005 Name: Hour: VIDEO WORKSHEET Review Directions: After watching Digital Footprint: Watch Where You Step, answer the following questions. Your Digital Identity A Permanent Step 1. What is a digital

More information

A Guide for Parents. of Elementary and Secondary School Students

A Guide for Parents. of Elementary and Secondary School Students A Guide for Parents of Elementary and Secondary School Students The effects of bullying go beyond the school yard. As a parent, here s what to watch for, what you can do, and where you can go to get help.

More information

Appropriate Use of Social Media and Cell Phones. Karen Haase. karen@ksbschoollaw.com KSB School Law @KarenHaase

Appropriate Use of Social Media and Cell Phones. Karen Haase. karen@ksbschoollaw.com KSB School Law @KarenHaase Appropriate Use of Social Media and Cell Phones Karen Haase karen@ksbschoollaw.com KSB School Law @KarenHaase Raise your hand if You have a cell phone You use text messaging You ve taken photos with a

More information

Lessons for Teens: Risky Internet and Social Networking

Lessons for Teens: Risky Internet and Social Networking Lesson Plan # 4 Online/Electronic Lure Presenter Overview: Most teens regularly and safely interact online with people they don t know via social networking, media and gaming sites. Although news organizations

More information

Living Online: Using Technology Wisely Lesson. Guide

Living Online: Using Technology Wisely Lesson. Guide Living Online: Using Technology Wisely Lesson Guide Target Audience Adolescents 11-14 Time Entire program 1 hour, depending on discussion Program Objectives Ways to portray a positive image online How

More information

Threat Assessment of Child Sexual Exploitation and Abuse

Threat Assessment of Child Sexual Exploitation and Abuse Centre Plan 2012-13 Threat Assessment of Child Sexual Exploitation and Abuse June 2012 Child Exploitation and and Online Protection Centre Child Exploitation and Online Protection Centre CEOP copyright

More information

Internet Safety Fact Sheet Facts about Social Networking:

Internet Safety Fact Sheet Facts about Social Networking: Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting

More information

Interdisciplinary Response to Youths Sexting

Interdisciplinary Response to Youths Sexting Interdisciplinary Response to Youths Sexting Recommendations from the Youth Online Safety Working Group (YOSWG) RESPONSE PLAN PREVENTION EDUCATION TEAM APPROACH Interdisciplinary Response to Youths Sexting

More information

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone? SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers

More information

OPENING ACTIVITY BALL OF STRING FLING

OPENING ACTIVITY BALL OF STRING FLING NWAC Youth Violence Prevention Workshop Bullying OPENING ACTIVITY BALL OF STRING FLING Acknowledgements Recognizing and Responding to Violence against Women in Aboriginal Communities created in conjunction

More information

Office of the Illinois Attorney General High-Tech Crime Bureau Internet Safety Specialist Melissa Hemzacek, LSW

Office of the Illinois Attorney General High-Tech Crime Bureau Internet Safety Specialist Melissa Hemzacek, LSW Office of the Illinois Attorney General High-Tech Crime Bureau Internet Safety Specialist Melissa Hemzacek, LSW I know all my online friends. What I post online is private. I can delete what I post. Freedom

More information

Teacher Guide TEEN SAFETY

Teacher Guide TEEN SAFETY The Vulnerable Teacher Guide TEEN SAFETY This companion to the online course provides questions and topics for classroom discussion and activities. 2012 ShieldTheVulnerable.org 1277 Treat Blvd #530 Walnut

More information

FACT SHEET: PROJECT SAFE CHILDHOOD

FACT SHEET: PROJECT SAFE CHILDHOOD FACT SHEET: PROJECT SAFE CHILDHOOD Project Safe Childhood Project Safe Childhood is a Department of Justice initiative launched in 2006 to combat the proliferation of technology-facilitated crimes involving

More information

Cyberbullying: What Parents Can Do to Protect Their Children

Cyberbullying: What Parents Can Do to Protect Their Children Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,

More information

SORNA Substantial Implementation Review State of Tennessee

SORNA Substantial Implementation Review State of Tennessee September 2011 SORNA Substantial Implementation Review State of Tennessee The U.S. Department of Justice, Office of Justice Programs, Office of Sex Offender Sentencing, Monitoring, Apprehending, Registering,

More information

Sextortion: Cybersecurity, teenagers, and remote sexual assault 1

Sextortion: Cybersecurity, teenagers, and remote sexual assault 1 May 2016 Sextortion: Cybersecurity, teenagers, and remote sexual assault 1 By Benjamin Wittes, Cody Poplin, Quinta Jurecic & Clara Spera INTRODUCTION It started with an email from an unknown sender with

More information

To do Justice, as no one is above the Law nor beneath its protection.

To do Justice, as no one is above the Law nor beneath its protection. Michael L. Ramsey, District Attorney District Attorney Department Summary Mission Statement To do Justice, as no one is above the Law nor beneath its protection. Department Description and Key Issues The

More information

Cyber Security. Keeping the internet safe for you and your family

Cyber Security. Keeping the internet safe for you and your family Cyber Security { Keeping the internet safe for you and your family The Five Things you MUST do Learn the lay of the land Protect your identity Become a sceptic Be aware of stranger danger Be a good cyber

More information

Trends in Arrests for Child Pornography Possession: The Third National Juvenile Online Victimization Study (NJOV 3)

Trends in Arrests for Child Pornography Possession: The Third National Juvenile Online Victimization Study (NJOV 3) April 2012 Trends in Arrests for Child Pornography Possession: The Third National Juvenile Online Victimization Study (NJOV 3) Abstract Arrests for the possession of child pornography (CP) increased between

More information

Cyberbullying, Sexting & Predators Oh My!

Cyberbullying, Sexting & Predators Oh My! Cyberbullying, Sexting & Predators Oh My! Addressing Youth Risk in the Digital Age in a Positive and Restorative Manner Nancy Willard Center for Safe and Responsible Internet Use Cyber Savvy Cyber Savvy

More information

Verizon and Online Safety: Protecting Children in the 21 st Century

Verizon and Online Safety: Protecting Children in the 21 st Century Verizon and Online Safety: Protecting Children in the 21 st Century APEC-OECD Joint Symposium on Promoting Safer Internet Environment for Children Leslie Martinkovics Director, Verizon International Public

More information

Cyberbullying. Welcome!

Cyberbullying. Welcome! Cyberbullying Welcome! In this tutorial, we will introduce information about cyberbullying including what it is, how it happens, technology issues related to it, and what can you do about it. We will also

More information

SEMINAR Sexting, adolescents and the criminal law

SEMINAR Sexting, adolescents and the criminal law SEMINAR Sexting, adolescents and the criminal law Victoria Williams Author of the Law Reform Commission of Western Australia s discussion paper and final report on the Community Protection (Offender Reporting)

More information

Filing a Form I-360 Self-Petition under the Violence Against Women Act

Filing a Form I-360 Self-Petition under the Violence Against Women Act Filing a Form I-360 Self-Petition under the Violence Against Women Act Prepared by: Northwest Immigrant Rights Project http://www.nwirp.org 615 Second Avenue, Suite 400 Seattle, Washington 98104 (206)

More information

Internet Safety/CIPA Lesson Plan

Internet Safety/CIPA Lesson Plan Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,

More information

HAZING AND BULLYING (Harassment, Intimidation and Dating Violence)

HAZING AND BULLYING (Harassment, Intimidation and Dating Violence) HAZING AND BULLYING (Harassment, Intimidation and Dating Violence) The prohibition against hazing, dating violence, harassment, intimidation or bullying is publicized in student handbooks and in the publications

More information

Counselors Guidelines for the Healthy Development of Youth in the Digital Age

Counselors Guidelines for the Healthy Development of Youth in the Digital Age Suggested APA style reference information can be found at http://www.counseling.org/library/ Article 40 Counselors Guidelines for the Healthy Development of Youth in the Digital Age Lakitta D. Johnson

More information

COMPUTERS & INTERNET SAFETY. Saint Francis Academy April 26, 2012

COMPUTERS & INTERNET SAFETY. Saint Francis Academy April 26, 2012 COMPUTERS & INTERNET SAFETY Saint Francis Academy April 26, 2012 HELLO! Mr. Michael Hoehl Pronounced Mr. Hale AGENDA Let s talk about the Internet! Challenges Trivia Safety Awareness Call to Action CHALLENGE

More information

How To Report Child Abuse

How To Report Child Abuse REPORTING CHILD ABUSE AND ELDER ABUSE Safe Church Practices Training for Presbyterian Ministers, Elders, Deacons, and adults who work with children and youth April 28, 2013 Adults Only No One Under 18

More information

Georgia Performance Standards. Health Education

Georgia Performance Standards. Health Education HIGH SCHOOL Students in high school demonstrate comprehensive health knowledge and skills. Their behaviors reflect a conceptual understanding of the issues associated with maintaining good personal health.

More information

Teen Online Safety & Digital Reputation Survey

Teen Online Safety & Digital Reputation Survey Teen Online Safety & Digital Reputation Survey Cox Communications Teen Online Safety & Digital Reputation Survey in Partnership with the National Center for Missing & Exploited Children (NCMEC) (Fielded

More information

Subcommittee on Oversight and Investigations Committee on Energy and Commerce United States House of Representatives June 27, 2006

Subcommittee on Oversight and Investigations Committee on Energy and Commerce United States House of Representatives June 27, 2006 Subcommittee on Oversight and Investigations Committee on Energy and Commerce United States House of Representatives June 27, 2006 Making the Internet Safe for Kids: The Role of ISPs and Social Networking

More information

Keeping Safe Online. Program Support Notes. Junior - Senior Secondary. 24 mins. Health and Welfare. VEA Bringing Learning to Life

Keeping Safe Online. Program Support Notes. Junior - Senior Secondary. 24 mins. Health and Welfare. VEA Bringing Learning to Life VEA Bringing Learning to Life Program Support Notes Junior - Senior Secondary Keeping Safe Online 24 mins Program Support Notes by Belinda Kime, App Sci (Home Ec)/Ed (Sec) Produced by VEA Pty Ltd Commissioning

More information

Cyberbullying. How common is cyberbullying?

Cyberbullying. How common is cyberbullying? Cyberbullying Bullying is aggressive behavior that is intentional and involves an imbalance of power or strength. Usually, it is repeated over time. Traditionally, bullying has involved actions such as:

More information

Empowering young people to be safe on the Internet. Information for parents, teachers and community members

Empowering young people to be safe on the Internet. Information for parents, teachers and community members Empowering young people to be safe on the Internet Information for parents, teachers and community members Empowering parents, teachers, & community members!! IBM is providing the following information

More information

Educator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty

Educator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty Educator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty Nancy Willard, M.S., J.D., Director Center for Safe and Responsible Internet Use URL: http://cyberbully.org or http://csriu.org

More information

GEORGIA SEX-OFFENDER REGISTRATION AND NOTIFICATION

GEORGIA SEX-OFFENDER REGISTRATION AND NOTIFICATION GEORGIA SEX-OFFENDER REGISTRATION AND NOTIFICATION CONTACT INFORMATION Georgia Bureau of Investigation Georgia Crime Information Center 3121 Panthersville Road PO Box 370808 Decatur, GA 30037-0808 Telephone:

More information

UTC READING Anti-Bullying Policy

UTC READING Anti-Bullying Policy UTC READING Anti-Bullying Policy Introduction Bullying may be defined as deliberately hurtful behaviour usually repeated over a period of time, where it is difficult for those bullied to defend themselves.

More information

CyberbullyNOT Student Guide to Cyberbullying

CyberbullyNOT Student Guide to Cyberbullying CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.

More information

RISKS OF ELECTRONIC COMMUNICATION 2

RISKS OF ELECTRONIC COMMUNICATION 2 Palacký University Olomouc FACULTY OF EDUCATION Centre for the Prevention of risky virtual communication Czech Republic RISKS OF ELECTRONIC COMMUNICATION 2 SURVEY RESEARCH REPORT CONDUCTED WITHIN A PROJECT

More information

Sexting in Schools: Handling Student Discipline in Light of Technology Changes

Sexting in Schools: Handling Student Discipline in Light of Technology Changes Sexting in Schools: Handling Student Discipline in Light of Technology Changes Stephanie E. Jones Hodges, Loizzi, Eisenhammer, Rodick & Kohn, LLP Belleville, Illinois Sara Boucek General Counsel Illinois

More information

Outsmarting On-line Predators. Christina Kilbourne

Outsmarting On-line Predators. Christina Kilbourne Outsmarting On-line Predators Christina Kilbourne Some Surprising Stats 26% believe their parents would be concerned if they knew what they were doing on-line over half have given out personal information

More information

DARKNESS to LIGHT S 5 STEPS TO PROTECTING OUR CHILDREN. A guide for responsible adults

DARKNESS to LIGHT S 5 STEPS TO PROTECTING OUR CHILDREN. A guide for responsible adults DARKNESS to LIGHT S 5 STEPS TO PROTECTING OUR CHILDREN A guide for responsible adults DARKNESS TO LIGHT We are a national nonprofit organization that seeks to empower adults to prevent child sexual abuse.

More information

South Carolina Internet Crimes Against Children Task Force. Deborah R.J. Shupe Assistant Attorney General Task Force Commander

South Carolina Internet Crimes Against Children Task Force. Deborah R.J. Shupe Assistant Attorney General Task Force Commander South Carolina Internet Crimes Against Children Task Force Deborah R.J. Shupe Assistant Attorney General Task Force Commander The S.C. ICAC Task Force South Carolina was one of 10 original task forces

More information

Safety Tips for Social Networking

Safety Tips for Social Networking Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and

More information

www.xxxchurch.com Online Predators & Strangers

www.xxxchurch.com Online Predators & Strangers www.xxxchurch.com Online Predators & Strangers When children go online, they have direct access to their friends and family members, but they also may come into contact with complete strangers. Through

More information

UNSUPERVISED AND ONLINE

UNSUPERVISED AND ONLINE UNSUPERVISED AND ONLINE Effective Identification of Negative Online Behavior and Strategies for Creating a Family Prevention Plan Follow us on: Contact us at: notmykid.org info@notmykid.org 602.652.0163

More information

Internet Safety Guidelines

Internet Safety Guidelines Internet Safety Guidelines Clear, simple, easy-to-read house rules should be posted on or near the monitor. Create your own computer rules or search for an Internet safety pledge you like. The pledge can

More information

FIRBANK GRAMMAR SCHOOL

FIRBANK GRAMMAR SCHOOL FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...

More information

TEEN ONLINE EXPOSURE: A SNAPSHOT OF DATA

TEEN ONLINE EXPOSURE: A SNAPSHOT OF DATA TEEN ONLINE EXPOSURE: A SNAPSHOT OF DATA October, 2008 www.theantidrug.com TEEN VIEWING OF DRUG AND ALCOHOL-RELATED VIDEOS ONLINE Recent data from a special study conducted by Nielsen Online, on behalf

More information

A Time to Tell Troop Meeting Guide

A Time to Tell Troop Meeting Guide A Time to Tell Troop Meeting Guide Using This Guide The video A Time to Tell shows several strategies child molesters use to attempt sexual molestation. In addition, one scenario introduces bullying as

More information

Campus and Workplace Violence Prevention

Campus and Workplace Violence Prevention Campus and Workplace Violence 1 Prevention SECTION I Policy SUNYIT is committed to providing a safe learning and work environment for the college community. The College will respond promptly to threats,

More information

SORNA Substantial Implementation Review State of Delaware

SORNA Substantial Implementation Review State of Delaware SORNA Substantial Implementation Review State of Delaware The U.S. Department of Justice, Office of Justice Program, Office of Sex Offender Sentencing, Monitoring, Apprehending, Registering, and Tracking

More information

This report provides the executive summary for Indicators of School Crime and Safety: 2014.

This report provides the executive summary for Indicators of School Crime and Safety: 2014. 1 Liability Report Number: LB-10-66 Release Date: August 6, 2015 Section Title: General Information Abstract School violence not only has a direct impact on students, but also on educators, parents, and

More information

Online grooming: What changes with the new legislation?

Online grooming: What changes with the new legislation? Online grooming: What changes with the new legislation? The use of new technologies has considerably increased in recent years, particularly among young people. In Belgium, 96% of children between 12 to

More information

ONLINE PREDATORS & PREDATORS

ONLINE PREDATORS & PREDATORS the myths and realities of ONLINE PREDATORS & PREDATORS Center For Child Advocacy Sixth Annual National Conference Crimes Against Children: The Multiple Faces of Child Victimization Joseph Hanley B.A.

More information

A PARENT S GUIDE TO TEEN DATING VIOLENCE 10 QUESTIONS TO START THE CONVERSATION

A PARENT S GUIDE TO TEEN DATING VIOLENCE 10 QUESTIONS TO START THE CONVERSATION A PARENT S GUIDE TO TEEN DATING VIOLENCE 10 QUESTIONS TO START THE CONVERSATION DEAR PARENT OR GUARDIAN: Could violence be a part of your teen s social life or dating relationships? The answer may surprise

More information

Staying Safe Online. A Practical Guide for Parents and Children.

Staying Safe Online. A Practical Guide for Parents and Children. Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively

More information

RHODE ISLAND SEX-OFFENDER REGISTRATION AND NOTIFICATION

RHODE ISLAND SEX-OFFENDER REGISTRATION AND NOTIFICATION RHODE ISLAND SEX-OFFENDER REGISTRATION AND NOTIFICATION CONTACT INFORMATION Rhode Island State Police Bureau of Criminal Investigation 150 South Main Street Providence, RI 02903-2907 Telephone: 401-421-5268

More information

CHILD SEXUAL EXPLOITATION LISA RUTTER DEVON YOUTH SERVICE (CHAIR MACSE)

CHILD SEXUAL EXPLOITATION LISA RUTTER DEVON YOUTH SERVICE (CHAIR MACSE) CHILD SEXUAL EXPLOITATION LISA RUTTER DEVON YOUTH SERVICE (CHAIR MACSE) PUBLIC : MEDIA : SOCIAL NORMS CSE is child abuse and is a crime The victims are children however they present themselves Definition

More information

Victim/Witness Security and Protection

Victim/Witness Security and Protection REFERENCE GUIDE ON PROTECTING THE RIGHTS OF CHILD VICTIMS OF TRAFFICKING IN EUROPE Chapter 13 Victim/Witness Security and Protection 13.1 General principles Child victims who agree to testify should be

More information

Techno-Panic & 21st Century Education:

Techno-Panic & 21st Century Education: Techno-Panic & 21st Century Education: Make Sure Internet Safety Messaging Does Not Undermine Education for the Future Nancy Willard, M.S., J.D. Center for Safe and Responsible Internet Use Trying to prepare

More information

Results. Contact sexual crimes based on PSI and self-report after SOTP participation

Results. Contact sexual crimes based on PSI and self-report after SOTP participation Self-Reported Contact Sexual Offenses by Participants in the Federal Bureau of Prisons Sex Offender Treatment Program: Implications for Internet Sex Offenders Andres E. Hernandez, Psy.D. Director, Sex

More information

Current Internet Facts

Current Internet Facts Current Internet Facts Facts about Online Predators and Strangers online: Twenty-eight percent of tweens (ages 8 to 12) have been contacted over the Internet by someone they don t know (COX Tween Internet

More information

Education Committee inquiry into PSHE and SRE in schools. Written evidence submitted by Childnet International

Education Committee inquiry into PSHE and SRE in schools. Written evidence submitted by Childnet International Education Committee inquiry into PSHE and SRE in schools Written evidence submitted by Childnet International Executive Summary 1. As a children s internet safety charity we have been pleased to see the

More information

Today s teens use technology more than ever. Most have

Today s teens use technology more than ever. Most have Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social

More information

IN THE UNITED STATES DISTRICT COURT DISTRICT OF OREGON. the District of Oregon, through Stacie Beckerman, Assistant United States Attorney,

IN THE UNITED STATES DISTRICT COURT DISTRICT OF OREGON. the District of Oregon, through Stacie Beckerman, Assistant United States Attorney, S. AMANDA MARSHALL, OSB #95347 United States Attorney District of Oregon STACIE F. BECKERMAN, OSB #06239 Assistant United States Attorney Stacie.Beckerman@usdoj.gov 1000 S.W. Third Ave., Suite 600 Portland,

More information

State law and the Sheriff s Office domestic violence. Victims of domestic violence suf-

State law and the Sheriff s Office domestic violence. Victims of domestic violence suf- VOLUME 14 ISSUE 5 PARTNERS IN CRIME PREVENTION SEPTEMBER/OCTOBER 2010 INSIDE THIS ISSUE VIO- LENCE THE SHERIFF S OFFICE CARES VIO- LENCE MANDA- TORY ARREST & PRIMARY AGRESSOR VIOLENCE WHO INVESTIGATES

More information