Boundaries: Protecting Children, Young People and Yourself from Technology Dangers
|
|
|
- Angel Lloyd
- 10 years ago
- Views:
Transcription
1 Boundaries: Protecting Children, Young People and Yourself from Technology Dangers Presented by Robert Hugh Farley MS Farley International Consultant in Crimes against Children for the VIRTUS Program 10 South LaSalle Street Suite 1420 Chicago, IL USA Tel: Web page: Diocese of Trenton, New Jersey May 22, 2013
2 FBI WARNING Boundaries: Protecting Children, Young People and Yourself from Technology Dangers Diocese of Trenton Federal law and international agreements provide severe penalties for the unauthorized recording, reproduction, distribution or exhibition of copyrighted materials. Criminal copyright infringement is investigated by the FBI and may constitute a felony with a maximum penalty of up to five years in prison and/or a $250, fine. Copyright Farley international and Robert Hugh Farley MS All rights are reserved. Displayed for this sole Power Point presentation purposes only. Unauthorized recording or duplication is a violation of applicable laws. Download your copy of the seminar handout materials online at Commanding Officer (Retired) Child Exploitation Unit Chicago, IL USA Public Perception of Child Sexual Abuse Crimes Virtus Protecting Children The stranger Prevention Victim Education Awareness and 1
3 Child Sexual Abuse Crimes A Time to Protect God s Children A Plan to Protect God s Children Opportunity Desire Children are perfect victims Pedophilia The Offender Talking about the Child Molester Pedophile DSM IV-TR Paraphilias and 2
4 Paraphilia A paraphilia is a condition in which a person's sexual arousal and gratification depend on fantasizing about and engaging in sexual behavior that is atypical and extreme Defined by. Zoophilia Bestiality web-cam view FBI Profile for the Child Molester Situational Molester Not a true sexual preference for a child Preferential Molester True sexual preference for a child Special Agent Kenneth Lanning Quantico Behavioral Science Unit FBI Profile for the Child Molester (cont.) The purpose of this descriptive typology is not to gain insight or understanding about why child molesters have sex with children in order to help or treat them, but to recognize and evaluate how child molesters have sex with children in order to identify, arrest, and convict them Type of Collections: Traditional Pornography vs. Child Molester Collection and 3
5 Pornography Illustrations Traditional Pornography Collection Technology based Traditional Pornography What will cause sexual excitement? Molester Rationalization Talking about Child Sexual Abuse Child Exploitation History Blaming Outside Factors I m the victim The Internet made me do it That child pornography stuff is everywhere. Child pornography. Child Exploitation History Elements of the Child Molester Collection Child pornography Child abuse images pthc preteen hardcore Child erotica Child pornography Trophies Euphoric recall remembering how good it felt and 4
6 Child Erotica CHILD EROTICA David Hamilton, Jock Sturges, Sally Mann Defined - Any image, material or object relating to children that provides a sexual purpose for a given individual Child Pornography - Child Abuse Images - Defined Visual depiction of a minor (under 18 years of age) engaged in sexually explicit conduct or the lewd exhibition of the genitals Child Pornography Defenses Are they real children? Original vs. Airbrushed pre-digital photos Morphing Photo shopping Pseudo photos Trophies Remember the good old days before the Internet and 5
7 Prevention Solutions The Technology Facilitated Child Molester NEVER put a computer in a child s bedroom put it in the living room, family room. NEVER allow a child to be online in the afternoon (after school) without an adult in the house Don t post personal information or photos STAY OUT OF PRIVATE CHAT ROOMS Technology Facilitated Child Exploitation History Text dialogue Still images Moving images Real times images What Does the Term Technology Compliant Victim Mean??? Teens or tweens who cooperate and / or participate in their own victimization The victim has been manipulated by the molester The victim has been groomed and has developed intense and passionate feelings for the molester Even so, they are legally unable to give consent Webcam and Real Time Problems for the Technology Compliant Victim Technology Facilitated Child Exploitation History (cont.) Beyond Computers. Cell phones Text messaging SMS Photo or video phones Internet Access and 6
8 Sometimes with technology the boundary line can be crossed when adults communicate with young people What is a boundary? Communicating with Young People Develop an Acceptable Use of Technology Policy (AUTP) for your staff Professional Staff will only discuss appropriate subject matter with young people and always use correct grammar Transparent Staff will maintain openness and visibility (no private communication with young people) Communicating with Young People (cont.) Reviewable All direct communication with young people by staff should be a matter of record ( s rather than texting) Staff must keep personal technology use such as personal social network pages separate from young people Web Page Dangers for Young People myspace.com facebook.com xanga.com Avatars and Gaming sites yoname.com social networks Touring Cyberspace Traditional Web or Surface Web The Internet. Standard browsers (Explorer, Safari ) World Wide Web (www) Usenet Newsgroups Internet Relay Chat (IRC) You can also send and 7
9 Internet Relay Chat IRC Channels mirc shareware software DALnet Undernet EFnet A chatroom is a channel Technology Molester Seduction Techniques The adult molester, while often pretending to be somewhat younger. Bogus profile Pretends to care about children Language Asks for personal information Requests photos Talks about family/friends Telephone contact Wants to meet Technology Molester Real Victims Tommy Case Illustration MAKING A COMPLAINT NCMEC Thank you! Farley International Robert Hugh Farley MS Consultant in Crimes against Children for VIRTUS 10 So. LaSalle Street, Suite 1420 Chicago, IL USA (001) [email protected] Web Page and 8
Office of the Attorney General of Virginia. Sexting. Protecting Yourself on the Internet and Mobile Devices
Office of the Attorney General of Virginia Sexting Protecting Yourself on the Internet and Mobile Devices Websites Often Used for Social Networking Monthly Visitors to Social Networking Sites 1. 750,000,000
Affirmative Action Presentation
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
Results. Contact sexual crimes based on PSI and self-report after SOTP participation
Self-Reported Contact Sexual Offenses by Participants in the Federal Bureau of Prisons Sex Offender Treatment Program: Implications for Internet Sex Offenders Andres E. Hernandez, Psy.D. Director, Sex
Trends in Arrests for Child Pornography Possession: The Third National Juvenile Online Victimization Study (NJOV 3)
April 2012 Trends in Arrests for Child Pornography Possession: The Third National Juvenile Online Victimization Study (NJOV 3) Abstract Arrests for the possession of child pornography (CP) increased between
How To Protect Children From Abuse
CREATING A NETWORK OF PREVENTION AND PROTECTION To report suspected abuse of a minor, call the Pennsylvania Child Abuse Hotline 1-800-932-0313 If you suspect child abuse by clergy, church officials, church
Child Exploitation Expanded Course Outline and Hourly Distribution For Two-Day, 16 Hour Course
1 Child Exploitation Expanded Course Outline and Hourly Distribution For Two-Day, 16 Hour Course Learners: Approximately 35 In-Service Police Officers from various California Law Enforcement agencies Length
Internet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force
Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force Crimes Against Children Unit SECTIONS CPU ICAC DFU WVMCC WV3C Crimes Against Children Unit WVSP Organizational Change December 1, 2009
APPENDIX A GLOSSARY OF RELEVANT TERMINOLOGY
APPENDIX A GLOSSARY OF RELEVANT TERMINOLOGY Abel Assessment Adam Walsh Act Anonymizer BitCoin (see Digital Currency) Bulletin Board System (BBS) Chat/Chatting Developed by Gene Abel, M.D., the Abel Assessment
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
Online Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
STUDENTS 5118.5. Children s Internet Protection Act, Pub. Law 106-554, codified at 47 USC 254(h) Conn. Gen. Stat. 53a-182b; 53a-183; 53a-250
STUDENTS 5118.5 Student Use of Computer Systems and Internet Safety Computers, computer networks, Internet Access, and e-mail are effective and important technological resources in today s educational
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
Social Networking Sites A Predator s Playground?
Social Networking Sites A Predator s Playground? Posting too much information on social networking sites may be dangerous. A new craze is spreading among teens across the nation and it s growing with every
Online Safety How to Protect Yourself and Your Family
Online Safety How to Protect Yourself and Your Family Introduction Surfing the internet can be a very positive experience, it opens up a world of possibilities for everyone, expanding our horizons by exposing
Current Internet Facts
Current Internet Facts Facts about Online Predators and Strangers online: Twenty-eight percent of tweens (ages 8 to 12) have been contacted over the Internet by someone they don t know (COX Tween Internet
Outsmarting On-line Predators. Christina Kilbourne
Outsmarting On-line Predators Christina Kilbourne Some Surprising Stats 26% believe their parents would be concerned if they knew what they were doing on-line over half have given out personal information
Chatroom and messaging safety Staying away from pornography Avoiding internet bullying. Keeping your child safe on the. internet
Chatroom and messaging safety Staying away from pornography Avoiding internet bullying Keeping your child safe on the internet AT A GLANCE Using the internet and messaging safely Not everyone who uses
SOUTH CAROLINA STATE OBSCENITY & LIBRARY/SCHOOL FILTERING STATUTES
SC Code Ann 16-15-305 Disseminating, procuring or promoting obscenity unlawful; definitions; penalties; obscene material designated contraband (A) It is unlawful for any person knowingly to disseminate
DIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
RIVERVIEW SCHOOL DISTRICT
No. 815 SECTION: OPERATIONS RIVERVIEW SCHOOL DISTRICT TITLE: ADOPTED: June 18, 2012 ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK RESOURCES REVISED: 815. ACCEPTABLE USE OF INTERNET, COMPUTERS AND NETWORK
Oregon Sex Offender Assessment Scale Jackson County, Oregon. Sex Offender Assessment Attachment 1. Negative Scale (Increases Risk)
Oregon Sex Offender Assessment Scale Jackson County, Oregon Sex Offender Assessment Attachment 1 OFFENDER SID Negative Scale (Increases Risk) 1. History of sexual crimes...-10 2. *History of sex offense
North Clackamas School District 12
North Clackamas School District 12 Code: IIBGA-AR Revised/Reviewed: 3/06/08; 6/21/12 Orig. Code(s): SP IIBGA Guidelines for the Use of the District s Electronic Communication System Definitions 1. Technology
Caution: This chapter will focus on insight into the behavioral
chapter 5 Cyber Pedophiles: A Behavioral Perspective Kenneth V. Lanning Caution: This chapter will focus on insight into the behavioral patterns of offenders in sexual exploitation of children cases involving
How To Use The Blog Safely And Responsibly
BLOG PROTOCOL DRI maintains this site (the "Site") for your personal entertainment, information, education, and communication. Please feel free to browse the Site. You may not download material displayed
Child Molesters: A Behavioral Analysis
Child Molesters: A Behavioral Analysis For Law Enforcement Officers Investigating Cases of Child Sexual Exploitation In cooperation with the Federal Bureau of Investigation Child Molesters: A Behavioral
Internet Safety Guide for Parents
Internet Safety Guide for Parents How to Talk to Your Kids about Staying Safe Online Presented by Keith Dunn http://www.kdcop.com Page 1 Now I know each and every single one of you is extremely busy. Both
Long-term Impact Evaluation of Specialized Sex Offender Probation Programs In Lake, DuPage and Winnebago Counties
Long-term Impact Evaluation of Specialized Sex Offender Probation Programs In Lake, DuPage and Winnebago Counties Prepared for the The Illinois Criminal Justice Information Authority By: Loretta J. Stalans,
Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests
Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests The Iowa-Grant School District has invested significantly in technology that offers vast, diverse, and
SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?
SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers
Child Pornography Offender Characteristics and Risk to Reoffend. Michael C. Seto, Ph.D., C.Psych. Royal Ottawa Health Care Group
Seto 1 Child Pornography Offender Characteristics and Risk to Reoffend Michael C. Seto, Ph.D., C.Psych. Royal Ottawa Health Care Group Prepared for the United States Sentencing Commission Draft dated February
Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
South Carolina Internet Crimes Against Children Task Force. Deborah R.J. Shupe Assistant Attorney General Task Force Commander
South Carolina Internet Crimes Against Children Task Force Deborah R.J. Shupe Assistant Attorney General Task Force Commander The S.C. ICAC Task Force South Carolina was one of 10 original task forces
GEORGIA SEX-OFFENDER REGISTRATION AND NOTIFICATION
GEORGIA SEX-OFFENDER REGISTRATION AND NOTIFICATION CONTACT INFORMATION Georgia Bureau of Investigation Georgia Crime Information Center 3121 Panthersville Road PO Box 370808 Decatur, GA 30037-0808 Telephone:
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY
AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY The following policy shall apply to all students, faculty, and staff of Avon Old Farms School unless otherwise specified. The computing
Internet Safety Fact Sheet Facts about Social Networking:
Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting
The Internet and Network Technologies
The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
Safety Tips for Social Networking
Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and
Consequences of Convictions for Sex Crimes
Consequences of Convictions for Sex Crimes Sex Offender Registration Act, Sex Offender Commitment Act, Lifetime Supervision for Sex Offenders SORA 29 Chapter 40 1 Sex Offender Registration Act (SORA):
Sex Offenders in Maryland and the Impact of the Federal Sex Offender Registration and Notification Act
Sex Offenders in Maryland and the Impact of the Federal Sex Offender Registration and Notification Act Department of Legislative Services 2010 Sex Offenders in Maryland and the Impact of the Federal Sex
Who's chatting to your kids?
N A U S T R ALIA Contact details and further information Who's chatting to your kids? A m u s t r e a d f o r p a r e n t s w i t h i n t e r n e t a c c e s s Life threatening emergencies telephone 000
Online grooming: What changes with the new legislation?
Online grooming: What changes with the new legislation? The use of new technologies has considerably increased in recent years, particularly among young people. In Belgium, 96% of children between 12 to
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain
Virginia Code Sections: Sexual Offenses
VIRGINIANS ALIGNED AGAINST SEXUAL ASSAULT VAASA Legal Fact Sheet: Virginia Code Sections: Sexual Offenses Includes Virginia Code sections relating to sexual offenses, and sexual assault-related issues:
COMPUTER, NETWORK AND INTERNET USE POLICY
4526 COMPUTER, NETWORK AND INTERNET USE POLICY The Westhampton Beach Board of Education affirms the district's commitment to preparing students for the future. Students need to be technologically literate
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003
SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003 On December 16, 2003, President Bush signed into law the CAN-SPAM Act of 2003. CAN-SPAM stands for "Controlling the Assault of Non-Solicited Pornography
Internet Safety Guidelines
Internet Safety Guidelines Clear, simple, easy-to-read house rules should be posted on or near the monitor. Create your own computer rules or search for an Internet safety pledge you like. The pledge can
IN THE UNITED STATES DISTRICT COURT DISTRICT OF OREGON. the District of Oregon, through Stacie Beckerman, Assistant United States Attorney,
S. AMANDA MARSHALL, OSB #95347 United States Attorney District of Oregon STACIE F. BECKERMAN, OSB #06239 Assistant United States Attorney [email protected] 1000 S.W. Third Ave., Suite 600 Portland,
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary
Adam Walsh Child Protection and Safety Act. Or SORNA Sex Offender Registration and Notification Act By Chris Phillis Maricopa Public Defender
Adam Walsh Child Protection and Safety Act Or SORNA Sex Offender Registration and Notification Act By Chris Phillis Maricopa Public Defender Signed into law by George W. Bush on July 27, 2006 Creates a
E-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney
think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities
Juvenile Sex Offender
Understanding the Criminal Consequences of Underage Sexual Activities Community-Based Juvenile Sex Offender Treatment Program (JSOTP) We hope this general overview will alleviate your concerns. Feel free
Prepared by Daniel C. Préfontaine, Q.C., Director and Chief Executive Officer
We are happy to share this information with you and encourage you to use this document for your research purposes. Please ensure that all credits are acknowledged when using all or any information within
RHODE ISLAND SEX-OFFENDER REGISTRATION AND NOTIFICATION
RHODE ISLAND SEX-OFFENDER REGISTRATION AND NOTIFICATION CONTACT INFORMATION Rhode Island State Police Bureau of Criminal Investigation 150 South Main Street Providence, RI 02903-2907 Telephone: 401-421-5268
Social Media Guidelines Resource
Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding
Youth Protection Training
B O Y S C O U T S O F A M E R I C A Youth Protection Training For Volunteer Leaders and Parents Facilitator s Guide The Boy Scouts of America deeply appreciates your leadership in facilitating this session
LCC xdsl Usage Policy
LCC xdsl Usage Policy 1. Introduction For the Internet to operate in a manner that satisfies the majority of its users, all users need to observe some rules and etiquette governing their use of it. These
Electronic Communications System
Estacada School District #108 Policy Code: IIBGA-AR Adopted: 2/13/02 Revised/Readopted: 8/16/06 Orig. Code(s): IIBGA-AR Electronic Communications System Definitions 1. Technology protection measure, as
CT Communications Internet Handbook
CT Communications Internet Handbook CT Communications Network Acceptable Use Policy Introduction: Protection of our Customers and our resources, the ability to provide quality service to our Customers,
THE CIVIL RIGHTS RESTORATION PROCESS
THE CIVIL RIGHTS RESTORATION PROCESS INTRODUCTION If you have been convicted of a felony, you have lost your civil rights, which includes the right to vote, serve on a jury, hold public office, and obtain
TEEN ONLINE EXPOSURE: A SNAPSHOT OF DATA
TEEN ONLINE EXPOSURE: A SNAPSHOT OF DATA October, 2008 www.theantidrug.com TEEN VIEWING OF DRUG AND ALCOHOL-RELATED VIDEOS ONLINE Recent data from a special study conducted by Nielsen Online, on behalf
Red Cloud Community Schools Acceptable Use and Internet Safety Policy
Red Cloud Community Schools Acceptable Use and Internet Safety Policy The Red Cloud Community School system maintains quality technology systems (hardware, software, and services) for the purposes of enhancing
R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES
R 2361/page 1 of 8 R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
SORNA Substantial Implementation Review State of Delaware
SORNA Substantial Implementation Review State of Delaware The U.S. Department of Justice, Office of Justice Program, Office of Sex Offender Sentencing, Monitoring, Apprehending, Registering, and Tracking
Select Florida Mandatory Minimum Laws
Select Florida Laws IMPORTANT NOTE: This is not necessarily a complete list. Laws frequently change, and these sentences may no longer be accurate or up to date. Talk with a lawyer in your state if you
MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS
MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated
