SEXTING AND SEXTORTION: KEEPING KIDS SAFE
|
|
|
- Hugo Payne
- 9 years ago
- Views:
Transcription
1 Federal Partners in Bullying Prevention SEXTING AND SEXTORTION: KEEPING KIDS SAFE November 20, :00-3:00 p.m. ET
2 Moderator Sarah Sisaye, MPH Management and Program Analyst Office of Safe and Healthy Students Office of Elementary and Secondary Education US Department of Education
3 Webinar Learning Objectives During the course of this webinar participants will: Gain a clear understanding of what sexting and sextortion is and learn the dangers involved Learn about the laws related to sexting and sextortion Acquire tools on how to help youth identify and avoid online predators and how to set boundaries with peers who are pressuring them to sext
4 Presenter Lt. Eric Buehler Commander, ICAC Task Force Sacramento County Sheriff s Department
5 SEXTING Changing an Emerging Culture to Protect Our Children
6 What is Sexting? Webster's defines sexting as: sex ting noun \ˈsek-stiŋ\ the sending of sexually explicit messages or images by cell phone
7 A Growing Culture Becoming the norm in teen culture Recent study published by Pediatrics concluded it has grown substantially in the last three years Considered among the youth today as the new first base
8 The Facts A 2012 study published by Pediatrics concludes that: The mean average age of the group studied was years 27.6% have sent a sext 31.4% have asked for a sext 60.0% have been asked
9 Child Pornography Online 10% 24% 7% 3% 17% 3% 3% 14% 16% 3% Parent Other relative Neighbor/family friend Baby sitter/coach Guardian's partner Online enticement Unknown to child Self-produced Boyfriend Human tafficker Abuser data based upon victim information submitted to NCMEC by law enforcement as of Feb. 18, 2013
10 Damage Shared with others Posted to Social Media Shaming / Cyber bullying Isolation Anxiety Depression
11 Laws Self produced nude images of underage subjects are in fact Child Pornography (CP) Production of CP is a felony even when self produced Possession and/or distribution of a CP image is a felony even if the possessor is underage Different jurisdictions handle the cases in varying ways
12 Changing the Culture Parents Talk to your kids Teachers and Counselors Talk to your students Report and deal with suspected sharing of images immediately! Look to resources to help you raise awareness
13 Resources ICAC Task Force ( National Center for Missing and Exploited Children (NCMEC) ( Send This Instead app and webpage Netsmartz.org
14 Send this instead Videos
15 Additional Help
16 Upcoming Webinar Send this Instead Thursday, December 11, :00 3:15pm ET Presenter: Joe Versace Registration URL:
17 Thank You Lieutenant Eric Buehler
18 Presenter Supervisory Special Agent Jacob E. Baillie FBI s Violent Crimes Against Children Program Management Unit
19 Federal Bureau of Investigation Criminal Investigative Division Supervisory Special Agent Jacob E. Baillie
20 Unclassified//For Official Use Only What is Sextortion? Sextortion is a criminal act when someone demands something of value, typically images of a sexual nature, sexual favors, or money from a person (victim) by: Threatening to release or distribute material that the victim seeks to keep private (sexually explicit images, videos, , text messages) Threatening to financially harm friends or relatives of the victim using information they obtained from the victim s computer Withholding something the victim needs or wants unless they comply with the demands (someone in a position of power) Unclassified//For Official Use Only
21 How does Sextortion Happen? Sextortion can be perpetrated in many ways by those seeking to exploit vulnerable individuals sexually or for financial gain. It typically begins by obtaining sensitive material pertaining to their victims. Hacking or the use of malware to assume control of a victim s computer (may allow access to files, webcam, microphone) Theft of personal electronic devices that contain sensitive material Social engineering: leads the victim to believe the perpetrator can be trusted (boyfriend, girlfriend, modeling agency) resulting in the release of sensitive material to the perpetrator Identity theft Unclassified//For Official Use Only
22 Unclassified//For Official Use Only Relationship to Sexting & Bullying Sexting is the sending of sexually explicit images from one person to another using a mobile device such as a cell phone. Sexting is one way images come into the possession of one who would use them for sextortion. When sexually explicit images of a student are distributed to others, those images often become the basis of intense bullying in a school environment. Unclassified//For Official Use Only
23 Unclassified//For Official Use Only Examples of Sextortion In 2013, Christopher Patrick Gunn, 31, of Montgomery, AL was sentenced to 35 years in prison for producing child pornography through a massive online sextortion scheme. Over a period of more than two years, Gunn repeatedly used computers, chat rooms, and other social medial outlets to threaten HUNDREDS of young girls located throughout the United States and internationally. Unclassified//For Official Use Only
24 Examples of Sextortion In 2008, Jonathan Vance, 24, was sentenced to 18 years in federal prison. Vance admitted sending threatening e- mails on Facebook and MySpace in order to extort nude photos from more than 50 teenage girls in 3 states. Vance told the FBI that the intimidation and extortion made him feel empowered. Unclassified//For Official Use Only
25 Unclassified//For Official Use Only Examples of Sextortion In 2010, Anthony Stancl, 19, was sentenced to 15 years in federal prison. Stancl posed as a two girls on Facebook to trick and deceive at least 31 of his male high school classmates into sending him nude cell phone photos and videos of themselves. Stancl then used those photos to extort at least 7 of his male high school classmates for sex. Unclassified//For Official Use Only
26 Unclassified//For Official Use Only Examples of Sextortion In November 2014, Lucas Michael Chansler, 31, of St Johns County, FL was sentenced to 105 years in prison for engaging in an extortion scheme to produce child pornography. Targeted 350 child victims in 26 different states throughout the United States, Canada, and the United Kingdom Approximately 106 child victims have been identified thus far Unclassified//For Official Use Only
27 Unclassified//For Official Use Only The Extent of the Problem Google Trends shows that searches on the term sextortion first appeared in 2010 with the prosecution of several cases. The National Center for Missing and Exploited Children (NCMEC) received its first report related to extortion in October In the subsequent eight months, NCMEC received 181 reports that could be classified as sextortion. There is consistently an international nexus to sextortion cases The FBI s Violent Crimes Against Children International Task Force consists of law enforcement officers from approximately 40 countries. Unclassified//For Official Use Only
28 Unclassified//For Official Use Only Who is at Risk? Sextortion affects both girls and boys across all demographics. Victims of extortion/sextortion withdraw from members of their family and can experience: Anxiety Psychological, physical, and emotional trauma Bullying Increased risk for suicide Increased rates of dropping out of school Unclassified//For Official Use Only
29 Unclassified//For Official Use Only Protection Against Sextortion For Parents & Educators: Supervise children s computer or mobile device use Keep computers and tablets in common rooms Devices like smartphones are trickier, as kids carry these with them wherever they go Disabling the camera within the phone s operating system Use parental control software Talk with your kids Keep an open line of communication with your kids Children should know they can come to you without fear of reprisal Express genuine interest in their online activities Remember, those exploited through these crimes are victims, no matter what they did or how they responded to the threat Unclassified//For Official Use Only
30 Protection Against Sextortion Layer security Use strong passwords Verify sender before opening unexpected attachments Update software promptly Use a firewall, anti-malware software, and possibly encryption Do not assume technology alone will protect you Report sextortion to the FBI It s still important to report all instances of sextortion to law enforcement In some cases the perpetrator may be a teenager, however, its not uncommon that the perpetrator is an adult masquerading as a teenager Law enforcement can help make a determination who the perpetrator is as well as take steps to help minimize further distribution of sensitive material A parent s report may result in the rescue of dozens or even hundreds of other children Unclassified//For Official Use Only
31 Unclassified//For Official Use Only Reporting Sextortion To report suspected sextortion crimes or to get help from law enforcement, please call your local FBI office or toll-free at: CALL-FBI ( ) Unclassified//For Official Use Only
Office of the Attorney General of Virginia. Sexting. Protecting Yourself on the Internet and Mobile Devices
Office of the Attorney General of Virginia Sexting Protecting Yourself on the Internet and Mobile Devices Websites Often Used for Social Networking Monthly Visitors to Social Networking Sites 1. 750,000,000
Online Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain
Internet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force
Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force Crimes Against Children Unit SECTIONS CPU ICAC DFU WVMCC WV3C Crimes Against Children Unit WVSP Organizational Change December 1, 2009
effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor
Social Media and its effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Director, Begun Center for Violence Prevention Research & Education Mandel School of Applied Social Sciences
Affirmative Action Presentation
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary
Digital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )
Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.
think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney
think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities
How To Protect Children From Abuse
CREATING A NETWORK OF PREVENTION AND PROTECTION To report suspected abuse of a minor, call the Pennsylvania Child Abuse Hotline 1-800-932-0313 If you suspect child abuse by clergy, church officials, church
E-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
Social Media Guidelines Resource
Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding
PARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D. www.cyberbullyhelp.org [email protected]
PARENTING IN THE DIGITAL AGE Patti Agatston, Ph.D. www.cyberbullyhelp.org [email protected] Teens and Technology Use 78% have a cell phone 95% use the Internet 91% have an email address 74% access the
Cyber safety Parent Easy Guide 63
Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed
Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.
Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications
2014 Teen Internet Safety Survey. Conducted by The Futures Company
2014 Teen Internet Safety Survey Conducted by The Futures Company Contents Background, Objectives, Methodology Major Findings Important Trends Next Steps 2 Background + Objectives Cox s commitment to Online
Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction
Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual
15 Dangerous Apps Every Parent Should Know About
15 Dangerous Apps Every Parent Should Know About It s safe to say that the advent of the digital age and specifically the Internet, smartphones and social media have brought unique and daunting challenges
Model Safeguarding Policy and Procedure for Smaller Voluntary and Community Groups
Introduction Model Safeguarding Policy and Procedure for Smaller Voluntary and Community Groups This NAME OF ORGANISATION policy follows guidelines set out in Bath & North East Somerset (B&NES) Safeguarding
Teen Online & Wireless Safety Survey
Teen Online & Wireless Safety Survey Cyberbullying, Sexting, and Parental Controls Research Findings May 2009 Contact: Kim Thomas Cox Communications [email protected] 404-269-8057 Cox Communications
Protect yourself online
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour:
#300005 Name: Hour: VIDEO WORKSHEET Review Directions: After watching Digital Footprint: Watch Where You Step, answer the following questions. Your Digital Identity A Permanent Step 1. What is a digital
A Guide for Parents. of Elementary and Secondary School Students
A Guide for Parents of Elementary and Secondary School Students The effects of bullying go beyond the school yard. As a parent, here s what to watch for, what you can do, and where you can go to get help.
Appropriate Use of Social Media and Cell Phones. Karen Haase. [email protected] KSB School Law @KarenHaase
Appropriate Use of Social Media and Cell Phones Karen Haase [email protected] KSB School Law @KarenHaase Raise your hand if You have a cell phone You use text messaging You ve taken photos with a
Internet Safety Fact Sheet Facts about Social Networking:
Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting
Interdisciplinary Response to Youths Sexting
Interdisciplinary Response to Youths Sexting Recommendations from the Youth Online Safety Working Group (YOSWG) RESPONSE PLAN PREVENTION EDUCATION TEAM APPROACH Interdisciplinary Response to Youths Sexting
SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?
SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers
OPENING ACTIVITY BALL OF STRING FLING
NWAC Youth Violence Prevention Workshop Bullying OPENING ACTIVITY BALL OF STRING FLING Acknowledgements Recognizing and Responding to Violence against Women in Aboriginal Communities created in conjunction
Office of the Illinois Attorney General High-Tech Crime Bureau Internet Safety Specialist Melissa Hemzacek, LSW
Office of the Illinois Attorney General High-Tech Crime Bureau Internet Safety Specialist Melissa Hemzacek, LSW I know all my online friends. What I post online is private. I can delete what I post. Freedom
Teacher Guide TEEN SAFETY
The Vulnerable Teacher Guide TEEN SAFETY This companion to the online course provides questions and topics for classroom discussion and activities. 2012 ShieldTheVulnerable.org 1277 Treat Blvd #530 Walnut
FACT SHEET: PROJECT SAFE CHILDHOOD
FACT SHEET: PROJECT SAFE CHILDHOOD Project Safe Childhood Project Safe Childhood is a Department of Justice initiative launched in 2006 to combat the proliferation of technology-facilitated crimes involving
Cyberbullying: What Parents Can Do to Protect Their Children
Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,
SORNA Substantial Implementation Review State of Tennessee
September 2011 SORNA Substantial Implementation Review State of Tennessee The U.S. Department of Justice, Office of Justice Programs, Office of Sex Offender Sentencing, Monitoring, Apprehending, Registering,
Sextortion: Cybersecurity, teenagers, and remote sexual assault 1
May 2016 Sextortion: Cybersecurity, teenagers, and remote sexual assault 1 By Benjamin Wittes, Cody Poplin, Quinta Jurecic & Clara Spera INTRODUCTION It started with an email from an unknown sender with
To do Justice, as no one is above the Law nor beneath its protection.
Michael L. Ramsey, District Attorney District Attorney Department Summary Mission Statement To do Justice, as no one is above the Law nor beneath its protection. Department Description and Key Issues The
Trends in Arrests for Child Pornography Possession: The Third National Juvenile Online Victimization Study (NJOV 3)
April 2012 Trends in Arrests for Child Pornography Possession: The Third National Juvenile Online Victimization Study (NJOV 3) Abstract Arrests for the possession of child pornography (CP) increased between
SEMINAR Sexting, adolescents and the criminal law
SEMINAR Sexting, adolescents and the criminal law Victoria Williams Author of the Law Reform Commission of Western Australia s discussion paper and final report on the Community Protection (Offender Reporting)
Filing a Form I-360 Self-Petition under the Violence Against Women Act
Filing a Form I-360 Self-Petition under the Violence Against Women Act Prepared by: Northwest Immigrant Rights Project http://www.nwirp.org 615 Second Avenue, Suite 400 Seattle, Washington 98104 (206)
Internet Safety/CIPA Lesson Plan
Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,
HAZING AND BULLYING (Harassment, Intimidation and Dating Violence)
HAZING AND BULLYING (Harassment, Intimidation and Dating Violence) The prohibition against hazing, dating violence, harassment, intimidation or bullying is publicized in student handbooks and in the publications
Counselors Guidelines for the Healthy Development of Youth in the Digital Age
Suggested APA style reference information can be found at http://www.counseling.org/library/ Article 40 Counselors Guidelines for the Healthy Development of Youth in the Digital Age Lakitta D. Johnson
How To Report Child Abuse
REPORTING CHILD ABUSE AND ELDER ABUSE Safe Church Practices Training for Presbyterian Ministers, Elders, Deacons, and adults who work with children and youth April 28, 2013 Adults Only No One Under 18
Georgia Performance Standards. Health Education
HIGH SCHOOL Students in high school demonstrate comprehensive health knowledge and skills. Their behaviors reflect a conceptual understanding of the issues associated with maintaining good personal health.
Teen Online Safety & Digital Reputation Survey
Teen Online Safety & Digital Reputation Survey Cox Communications Teen Online Safety & Digital Reputation Survey in Partnership with the National Center for Missing & Exploited Children (NCMEC) (Fielded
Cyberbullying. How common is cyberbullying?
Cyberbullying Bullying is aggressive behavior that is intentional and involves an imbalance of power or strength. Usually, it is repeated over time. Traditionally, bullying has involved actions such as:
Educator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty
Educator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty Nancy Willard, M.S., J.D., Director Center for Safe and Responsible Internet Use URL: http://cyberbully.org or http://csriu.org
GEORGIA SEX-OFFENDER REGISTRATION AND NOTIFICATION
GEORGIA SEX-OFFENDER REGISTRATION AND NOTIFICATION CONTACT INFORMATION Georgia Bureau of Investigation Georgia Crime Information Center 3121 Panthersville Road PO Box 370808 Decatur, GA 30037-0808 Telephone:
UTC READING Anti-Bullying Policy
UTC READING Anti-Bullying Policy Introduction Bullying may be defined as deliberately hurtful behaviour usually repeated over a period of time, where it is difficult for those bullied to defend themselves.
CyberbullyNOT Student Guide to Cyberbullying
CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.
Sexting in Schools: Handling Student Discipline in Light of Technology Changes
Sexting in Schools: Handling Student Discipline in Light of Technology Changes Stephanie E. Jones Hodges, Loizzi, Eisenhammer, Rodick & Kohn, LLP Belleville, Illinois Sara Boucek General Counsel Illinois
Outsmarting On-line Predators. Christina Kilbourne
Outsmarting On-line Predators Christina Kilbourne Some Surprising Stats 26% believe their parents would be concerned if they knew what they were doing on-line over half have given out personal information
DARKNESS to LIGHT S 5 STEPS TO PROTECTING OUR CHILDREN. A guide for responsible adults
DARKNESS to LIGHT S 5 STEPS TO PROTECTING OUR CHILDREN A guide for responsible adults DARKNESS TO LIGHT We are a national nonprofit organization that seeks to empower adults to prevent child sexual abuse.
South Carolina Internet Crimes Against Children Task Force. Deborah R.J. Shupe Assistant Attorney General Task Force Commander
South Carolina Internet Crimes Against Children Task Force Deborah R.J. Shupe Assistant Attorney General Task Force Commander The S.C. ICAC Task Force South Carolina was one of 10 original task forces
Safety Tips for Social Networking
Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and
Internet Safety Guidelines
Internet Safety Guidelines Clear, simple, easy-to-read house rules should be posted on or near the monitor. Create your own computer rules or search for an Internet safety pledge you like. The pledge can
FIRBANK GRAMMAR SCHOOL
FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...
TEEN ONLINE EXPOSURE: A SNAPSHOT OF DATA
TEEN ONLINE EXPOSURE: A SNAPSHOT OF DATA October, 2008 www.theantidrug.com TEEN VIEWING OF DRUG AND ALCOHOL-RELATED VIDEOS ONLINE Recent data from a special study conducted by Nielsen Online, on behalf
A Time to Tell Troop Meeting Guide
A Time to Tell Troop Meeting Guide Using This Guide The video A Time to Tell shows several strategies child molesters use to attempt sexual molestation. In addition, one scenario introduces bullying as
Campus and Workplace Violence Prevention
Campus and Workplace Violence 1 Prevention SECTION I Policy SUNYIT is committed to providing a safe learning and work environment for the college community. The College will respond promptly to threats,
SORNA Substantial Implementation Review State of Delaware
SORNA Substantial Implementation Review State of Delaware The U.S. Department of Justice, Office of Justice Program, Office of Sex Offender Sentencing, Monitoring, Apprehending, Registering, and Tracking
This report provides the executive summary for Indicators of School Crime and Safety: 2014.
1 Liability Report Number: LB-10-66 Release Date: August 6, 2015 Section Title: General Information Abstract School violence not only has a direct impact on students, but also on educators, parents, and
Online grooming: What changes with the new legislation?
Online grooming: What changes with the new legislation? The use of new technologies has considerably increased in recent years, particularly among young people. In Belgium, 96% of children between 12 to
ONLINE PREDATORS & PREDATORS
the myths and realities of ONLINE PREDATORS & PREDATORS Center For Child Advocacy Sixth Annual National Conference Crimes Against Children: The Multiple Faces of Child Victimization Joseph Hanley B.A.
A PARENT S GUIDE TO TEEN DATING VIOLENCE 10 QUESTIONS TO START THE CONVERSATION
A PARENT S GUIDE TO TEEN DATING VIOLENCE 10 QUESTIONS TO START THE CONVERSATION DEAR PARENT OR GUARDIAN: Could violence be a part of your teen s social life or dating relationships? The answer may surprise
Staying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
RHODE ISLAND SEX-OFFENDER REGISTRATION AND NOTIFICATION
RHODE ISLAND SEX-OFFENDER REGISTRATION AND NOTIFICATION CONTACT INFORMATION Rhode Island State Police Bureau of Criminal Investigation 150 South Main Street Providence, RI 02903-2907 Telephone: 401-421-5268
CHILD SEXUAL EXPLOITATION LISA RUTTER DEVON YOUTH SERVICE (CHAIR MACSE)
CHILD SEXUAL EXPLOITATION LISA RUTTER DEVON YOUTH SERVICE (CHAIR MACSE) PUBLIC : MEDIA : SOCIAL NORMS CSE is child abuse and is a crime The victims are children however they present themselves Definition
Results. Contact sexual crimes based on PSI and self-report after SOTP participation
Self-Reported Contact Sexual Offenses by Participants in the Federal Bureau of Prisons Sex Offender Treatment Program: Implications for Internet Sex Offenders Andres E. Hernandez, Psy.D. Director, Sex
Current Internet Facts
Current Internet Facts Facts about Online Predators and Strangers online: Twenty-eight percent of tweens (ages 8 to 12) have been contacted over the Internet by someone they don t know (COX Tween Internet
Education Committee inquiry into PSHE and SRE in schools. Written evidence submitted by Childnet International
Education Committee inquiry into PSHE and SRE in schools Written evidence submitted by Childnet International Executive Summary 1. As a children s internet safety charity we have been pleased to see the
Today s teens use technology more than ever. Most have
Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social
IN THE UNITED STATES DISTRICT COURT DISTRICT OF OREGON. the District of Oregon, through Stacie Beckerman, Assistant United States Attorney,
S. AMANDA MARSHALL, OSB #95347 United States Attorney District of Oregon STACIE F. BECKERMAN, OSB #06239 Assistant United States Attorney [email protected] 1000 S.W. Third Ave., Suite 600 Portland,
State law and the Sheriff s Office domestic violence. Victims of domestic violence suf-
VOLUME 14 ISSUE 5 PARTNERS IN CRIME PREVENTION SEPTEMBER/OCTOBER 2010 INSIDE THIS ISSUE VIO- LENCE THE SHERIFF S OFFICE CARES VIO- LENCE MANDA- TORY ARREST & PRIMARY AGRESSOR VIOLENCE WHO INVESTIGATES
