A U.S. Postal Inspector s Guide to Internet Safety for Children
|
|
|
- Berniece Bishop
- 9 years ago
- Views:
Transcription
1 A U.S. Postal Inspector s Guide to Internet Safety for Children
2
3 A U.S. Postal Inspector s Guide to INTERNET SAFETY FOR CHILDREN The Internet is a global community that allows people to share information instantly and anonymously, anytime and anywhere. Despite its many advantages, the Internet is a potential source of danger to your children. Child sex offenders may use this medium to lure children into sexual activity or peddle illegal images of child pornography. Online Children at Risk Child sex offenders who once targeted children at playgrounds and parks can now reach children more easily by using the Internet to mask their identities. They can often overwhelm children with attention and gifts, devoting considerable time and money to groom a child for sexual exploitation. They will listen and empathize with children s problems, and learn about their music, hobbies, and interests in order to relate to them. As children s inhibitions are lowered, they begin to feel more comfortable with their online friend. Over time, sexual themes and materials are introduced into the relationship. Some sex offenders will approach children online and encourage them to produce and send pornographic images of themselves. These offenders may trade the images worldwide, victimizing the child for the rest of his or her life. Postal Inspectors Protect Children For more than a century, the U.S. Postal Inspection Service has investigated the sexual exploitation of children. It was the first federal law enforcement agency to aggressively identify, target, and arrest individuals who produced and trafficked in child pornography. Specially trained Postal Inspectors investigate crimes related to the sexual exploitation of children nationwide. Today, the majority of child exploitation cases investigated by Postal Inspectors about 95 percent involve both the U.S. Mail and the Internet. This person becomes their best friend. It s a specific pointby-point process where a predator tries to make friends, make trust, make it a secretive affair, and then basically turns victims against their families. Jeff Godlis, i-safe (nonprofit group for Internet safety education) director of communications The Postal Inspection Service partners with the National Center for Missing and Exploited Children (NCMEC) and the Department of Justice s (DOJ s) Child Exploitation and Obscenity Section to July 2008 Publication 312 1
4 A U.S. Postal Inspector s Guide to INTERNET SAFETY FOR CHILDREN investigate child sexual exploitation involving the U.S. Mail and the Internet. As a result, the Postal Inspection Service actively participates in Project Safe Childhood, a DOJ initiative that employs a multidisciplined approach to protecting children. The initiative uses resources from local, state, and federal law enforcement agencies; multiple venues of prosecution; and community outreach programs. One in seven children, ages 10 to 17, has been sexually solicited or approached via the Internet. Only about 12 percent told a parent about it. In 56 percent of the cases, [the children] did not tell anyone about it. Wolak, J., Mitchell, K., & Finkelhor, D., Online Victimization of Youth: Five Years Later, National Center for Missing and Exploited Children Reducing Online Risks As a parent, you can reduce the chances that a sex offender will reach your children by talking with them about their Internet activities, setting rules for their Internet use, and posting rules near their computers. U.S. Postal Inspectors recommend you follow these guidelines: Familiarize yourself with social networking, file-sharing, and online communication sites (e.g., instant messaging, text messaging, and chat rooms) used by your children. Place your children s computer in an area where you can supervise online activity. Find out what computers your children use away from home (e.g., at school, at a friend s home, or at the library), and make sure they re supervised at those locations as well. Ensure your children use child-friendly search engines, or use filters on other search engines. Know who communicates with your child online. Sit with your child at the computer and have him or her identify each person with whom he or she communicates, including those on buddy lists and accounts. Monitor chat room activities. Set up Internet accounts and primary screen names in your name, not your children s, and retain controlling passwords. Ensure that the screen names the children use won t identify them as children. Use filtering or monitoring software for all of your home computers. Good products list accepted sites and give children access only to pre-approved sites. 2 Publication 312 July 2008
5 A U.S. Postal Inspector s Guide to INTERNET SAFETY FOR CHILDREN Ask your children to check with you before posting photos of themselves or their friends. Photos may contain information that reveals their home, school, or clubs and teams they belong to, and could even put them and their friends at risk. If someone unfamiliar contacts your child online, tell your child not to respond but encourage him or her to tell you about it. Your child needs to know he or she can talk to you without repercussion. Children may do or see things online that they shouldn t, but don t want to tell anyone because they re afraid of losing Internet privileges. Online Safety Tips Ensure your children understand these principles to stay safe on the Internet: Online communications are for real-life friends and family members period. Personal information such as an address, telephone number, school name, information about friends, or addresses should never be given to anyone online. Once your child posts something online, anyone can see it including people who can use the information to harm your child. Passwords are private. They re only for you and your children. Report Suspicious Activity Your early involvement and open communication can prevent your child from becoming a victim of a child sex offender. Report suspicious online activity when you have a gut feeling that something does not feel right to you or your child. Trust your intuition! If you suspect someone is attempting to sexually exploit your child over the Internet, do not delete any material. Do not shut down the computer, but turn off the monitor and report your concerns What s risky [for kids on the Internet] is giving out names, phone numbers, and pictures to strangers and talking online with them about sex. Janis Wolak, Crimes Against Children Research Center The best way for parents to confront the danger is to talk openly about sexual matters. As adults, we need to get over our discomfort with that. Janis Wolak, Crimes Against Children Research Center July 2008 Publication 312 3
6 A U.S. Postal Inspector s Guide to INTERNET SAFETY FOR CHILDREN immediately to your local law enforcement agency and NCMEC at What Are Your Children Saying Online? Do you know what language your children use online? Below are some examples of Internet acronyms. The acronyms change, and new ones are constantly introduced. Visit or do an online search for Internet acronyms for more examples and updates. POS = Parent Over Shoulder PIR = Parent In Room P911 = Parent Alert PAW = Parents Are Watching PAL = Parents Are Listening ASL= Age/Sex/Location MorF = Male or Female SorG = Straight or Gay LMIRL = Let s Meet In Real Life KPC = Keeping Parents Clueless TDTM = Talk Dirty To Me IWSN = I Want Sex Now NIFOC = Nude In Front of Computer GYPO = Get Your Pants Off ADR or Addy = Address WYCM = Will You Call Me? KFY = Kiss For You MOOS = Member of the Opposite Sex MOSS or MOTSS = Member of the Same Sex NALOPKT = Not a Lot of People Know That 4 Publication 312 July 2008
7 For more information about how to protect your child from online sex offenders, visit the Web site of the U.S. Postal Inspection Service at
8 Publication 312 July 2008 PSN
Who's chatting to your kids?
N A U S T R ALIA Contact details and further information Who's chatting to your kids? A m u s t r e a d f o r p a r e n t s w i t h i n t e r n e t a c c e s s Life threatening emergencies telephone 000
Internet Safety Guide for Parents
Internet Safety Guide for Parents How to Talk to Your Kids about Staying Safe Online Presented by Keith Dunn http://www.kdcop.com Page 1 Now I know each and every single one of you is extremely busy. Both
Cyber Safety Guide. From Time Warner Cable and CyberAngels. A complimentary guide to safe Internet use for parents
Cyber Safety Guide From Time Warner Cable and CyberAngels A complimentary guide to safe Internet use for parents Table of Contents A Note To Parents 3 Common Uses of the Internet 4 11 Surfing 4 Chat Rooms
Affirmative Action Presentation
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
Internet Safety Fact Sheet Facts about Social Networking:
Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting
Online Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
Online Safety How to Protect Yourself and Your Family
Online Safety How to Protect Yourself and Your Family Introduction Surfing the internet can be a very positive experience, it opens up a world of possibilities for everyone, expanding our horizons by exposing
National Cybersecurity Awareness Campaign. Kids Presentation
National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help
FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
Safety Tips for Social Networking
Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
a resource guide for parents and guardians INTERNET SAFETY North Carolina Department of Justice
ATTORNEY GENERAL ROY COOPER a resource guide for parents and guardians INTERNET SAFETY what you don't know can hurt your child North Carolina Department of Justice Computers and the Internet have revolutionized
Outsmarting On-line Predators. Christina Kilbourne
Outsmarting On-line Predators Christina Kilbourne Some Surprising Stats 26% believe their parents would be concerned if they knew what they were doing on-line over half have given out personal information
E-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
ONLINE PREDATORS & PREDATORS
the myths and realities of ONLINE PREDATORS & PREDATORS Center For Child Advocacy Sixth Annual National Conference Crimes Against Children: The Multiple Faces of Child Victimization Joseph Hanley B.A.
Current Internet Facts
Current Internet Facts Facts about Online Predators and Strangers online: Twenty-eight percent of tweens (ages 8 to 12) have been contacted over the Internet by someone they don t know (COX Tween Internet
FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY
FAYETTEVILLE (AR) PUBLIC SCHOOLS COMPUTER/NETWORK USE POLICY The Fayetteville Board of Education recognizes the need to effectively use digital technology to further enhance the educational goals of the
Internet Safety/CIPA Lesson Plan
Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National
National Cybersecurity Awareness Campaign Families Presentation
National Cybersecurity Awareness Campaign Families Presentation About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security
Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.
Learn. Act. Share. Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit. The trafficker takes away the basic human
DARKNESS to LIGHT S 5 STEPS TO PROTECTING OUR CHILDREN. A guide for responsible adults
DARKNESS to LIGHT S 5 STEPS TO PROTECTING OUR CHILDREN A guide for responsible adults DARKNESS TO LIGHT We are a national nonprofit organization that seeks to empower adults to prevent child sexual abuse.
Guideline on Windows 7 Parental Controls
CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius
YOUNG PEOPLE, MUSIC & THE INTERNET
YOUNG PEOPLE, MUSIC & THE INTERNET a guide for parents about P2P, file-sharing and downloading What is P2P? As a parent, you ve probably already heard your children talk about file-sharing, downloading
Online grooming: What changes with the new legislation?
Online grooming: What changes with the new legislation? The use of new technologies has considerably increased in recent years, particularly among young people. In Belgium, 96% of children between 12 to
It s Not Right! Neighbours, Friends and Families for Older Adults. What You Can Do to Keep Yourself Safe From Abuse
It s Not Right! Neighbours, Friends and Families for Older Adults What You Can Do to Keep Yourself Safe From Abuse Everyone has the right to be safe and free from abuse. No one should experience abuse.
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau
Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain
Social Networking Sites A Predator s Playground?
Social Networking Sites A Predator s Playground? Posting too much information on social networking sites may be dangerous. A new craze is spreading among teens across the nation and it s growing with every
Internet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force
Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force Crimes Against Children Unit SECTIONS CPU ICAC DFU WVMCC WV3C Crimes Against Children Unit WVSP Organizational Change December 1, 2009
FACT SHEET: PROJECT SAFE CHILDHOOD
FACT SHEET: PROJECT SAFE CHILDHOOD Project Safe Childhood Project Safe Childhood is a Department of Justice initiative launched in 2006 to combat the proliferation of technology-facilitated crimes involving
Results. Contact sexual crimes based on PSI and self-report after SOTP participation
Self-Reported Contact Sexual Offenses by Participants in the Federal Bureau of Prisons Sex Offender Treatment Program: Implications for Internet Sex Offenders Andres E. Hernandez, Psy.D. Director, Sex
The rules you have to follow when you are on Licence
The rules you have to follow when you are on Licence Information taken from: PI 20/2012 & PSI 40/2012 Licences and Licence Conditions Annex A Developed and illustrated by www.changepeople.co.uk 1 Anyone
Chatroom and messaging safety Staying away from pornography Avoiding internet bullying. Keeping your child safe on the. internet
Chatroom and messaging safety Staying away from pornography Avoiding internet bullying Keeping your child safe on the internet AT A GLANCE Using the internet and messaging safely Not everyone who uses
Internet Safety Guidelines
Internet Safety Guidelines Clear, simple, easy-to-read house rules should be posted on or near the monitor. Create your own computer rules or search for an Internet safety pledge you like. The pledge can
How To Protect Children From Abuse
CREATING A NETWORK OF PREVENTION AND PROTECTION To report suspected abuse of a minor, call the Pennsylvania Child Abuse Hotline 1-800-932-0313 If you suspect child abuse by clergy, church officials, church
SOCIAL NETWORKING SITES
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction
Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual
E-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013
By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary
SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?
SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers
Child Abuse RECOGNIZE REPORT IT, PREVENT IT! Public Legal Education and Information Service of New Brunswick
Child Abuse RECOGNIZE IT, REPORT IT, PREVENT IT! Public Legal Education and Information Service of New Brunswick Child Abuse RECOGNIZE IT, REPORT IT, PREVENT IT! Public Legal Education and Information
USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used?
TYPES OF TECHNOLOGY Peer to Peer Networking Networks in which computers are equal partners using common file sharing programs that allow users to connect directly to each other s computer hard drive to
Today s teens use technology more than ever. Most have
Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social
Chapter 3. Online Bullying
Chapter 3 Online Bullying Children and teens often face online cruelty (as well as cruelty in the real world). For younger kids, instant messaging and texting can become platforms for teasing and meanness.
Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself
The support you should get if you are a victim of crime
The support you should get if you are a victim of crime This is an EasyRead booklet showing you what to do. About this booklet The Ministry of Justice wrote this information. This is an EasyRead guide
POLICY SUPPORT OPERATIONS 5042 ACCEPTABLE USE POLICY FOR NETWORK AND INTERNET ACCESS
I. Overview Network and Internet access is available to students, teachers and staff in the Oneida City School District. The District s goal in providing such services is to promote educational excellence
Technology Acceptable Use Policy
Technology Acceptable Use Policy Introduction San Gabriel Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop
Facts for Teens: Youth Violence
P.O. Box 6003 Rockville, MD 20849-6003 [email protected] www.safeyouth.org Facts for Teens: Youth Violence Introduction Many teenagers are concerned about youth violence, and with good reason. Each
Trends in Arrests for Child Pornography Possession: The Third National Juvenile Online Victimization Study (NJOV 3)
April 2012 Trends in Arrests for Child Pornography Possession: The Third National Juvenile Online Victimization Study (NJOV 3) Abstract Arrests for the possession of child pornography (CP) increased between
Understanding Consent to Sexual Activity. Public Legal Education and Information Service of New Brunswick
Understanding Consent to Sexual Activity Public Legal Education and Information Service of New Brunswick NO means NO Understanding Consent to Sexual Activity This pamphlet provides information on what
PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES
R 2361/Page 1 of 12 R 2361 ACCEPTABLE USE OF COMPUTER NETWORKS/COMPUTERS AND RESOURCES The school district provides computer equipment, computer services, and Internet access to its pupils and staff for
(Internet) for students, staff and, if requested, members of the Board of Education. All computer
4510 Computer Network (Cf. 4520) 4510 The Board authorizes the Superintendent to develop services linking computers within and between buildings in the District, and to provide access to the international
Cyber safety Parent Easy Guide 63
Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed
Introduction to Domestic Violence
Introduction to Domestic Violence Contents Defining domestic violence Prevalence Examples of power and control Why victims stay How you can help WHAT IS DOMESTIC VIOLENCE? Defining Domestic Violence Domestic
15 Dangerous Apps Every Parent Should Know About
15 Dangerous Apps Every Parent Should Know About It s safe to say that the advent of the digital age and specifically the Internet, smartphones and social media have brought unique and daunting challenges
C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:
Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online
Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.
Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications
THE PROTECTION OF CHILDREN FROM SEXUAL EXPLOITATION IN TOURISM:
CAPACITY BUILDING SEMINAR ON: THE PROTECTION OF CHILDREN FROM SEXUAL EXPLOITATION IN TOURISM: Holiday Hotel Sihanoukville, Kingdom of Cambodia April 22 & 23, 2010 Organized by: With Funding Support From:
Online Victimization of Youth: Five Years Later
Online Victimization of Youth: Five Years Later Online Victimization of Youth: Five Years Later 2006 JANIS WOLAK, KIMBERLY MITCHELL, AND DAVID FINKELHOR OF THE CRIMES AGAINST CHILDREN RESEARCH CENTER
Haddon Township School District Acceptable Use of Information and Communication Technology for Students
Haddon Township School District Acceptable Use of Information and Communication Technology for Students Please read the following carefully before signing the Acceptable Use Policy for Students Agreement.
YOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School [email protected]
CYBER SAFETY, CYBER ETHICS, CYBER SECURITY How to teach the kids about these concepts (a primer from staysafeonline.org program that is available free from the website) YOUR PRESENTERS Maryly Skallos Technology
The Digital Divide: How the Online Behavior of Teens is Getting Past Parents
June 2012 The Digital Divide: How the Online Behavior of Teens is Getting Past Parents Parent Disconnect Despite the obvious disconnect between teens online behaviors and parents knowledge of them, parents
BOARD OF EDUCATION Cherry Hill, New Jersey
BOARD OF EDUCATION Cherry Hill, New Jersey POLICY 6142.12 ACCEPTABLE USE OF TECHNOLOGY Introduction The Board of Education encourages the use of technology in the classroom as an educational tool and to
