MEA-MFT Teachers Conference

Similar documents
Empowering young people to be safe on the Internet. Information for parents, teachers and community members

A U.S. Postal Inspector s Guide to Internet Safety for Children

Affirmative Action Presentation

Who's chatting to your kids?

The webcast will begin shortly. Please stand by.

Digital Citizenship Lesson Plan

Online Safety for Middle and High School

Parenting & Technology: The Internet, Texting & Social Networks

Social Networking Sites A Predator s Playground?

Safety Tips for Social Networking

National Cybersecurity Awareness Campaign Families Presentation

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

Lessons for Teens: Risky Internet and Social Networking

Guideline on Windows 7 Parental Controls

INTERNET SAFETY AND RESPONSIBILITY PERSONAL SAFETY & PREDATOR AWARENESS UNIT

Dear Educators, Parents and Caregivers

Internet Safety Fact Sheet Facts about Social Networking:

Cyber Safety For Parents

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

2010 Middle School Internet Safety Survey Results

Back Cover. Copyright 2006, 2009, and 2011 National Center for Missing & Exploited Children. All rights reserved.

Internet Safety Guidelines

Internet Safety Guide for Parents

Online grooming: What changes with the new legislation?

Online Reputation. Luke 29/09/2015. Never give out your personal information.

ONLINE PREDATORS & PREDATORS

Online Predators & Strangers

Current Internet Facts

What do you. you know about. Online Predators?

How To Protect Children From Abuse

Instant Messaging and Chat Rooms Play It Safe!

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito

Summer Safety Tips for Kids

Social, Security, and Privacy Implications of Computing

Guidelines for Preventing and Dealing with Bullying Issues

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction

i-safe America Internet Safety Tips for Parents

Internet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force

Sonia Livingstone, LSE

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability

Cyber Security. Keeping the internet safe for you and your family

a resource guide for parents and guardians INTERNET SAFETY North Carolina Department of Justice

Staying Safe Online. A Practical Guide for Parents and Children.

Keeping Safe Online. Program Support Notes. Junior - Senior Secondary. 24 mins. Health and Welfare. VEA Bringing Learning to Life

Cyber safety Parent Easy Guide 63

SOCIAL NETWORKING SITES

Nower Hill High School

Back Cover. Copyright 2006 and 2009 National Center for Missing & Exploited Children. All rights reserved.

E-Safety Issues and Online Safety

ONLINE SAFETY TEACHER S GUIDE:

A Parents Guide to Social Networking Websites

National Cybersecurity Awareness Campaign. Kids Presentation

PREDATOR IDENTIFICATION

esmart Online Safety Handbook for Students and Parents Bentleigh Secondary College P a g e 2

E-Safety and Acceptable Use Policy

Internet Safety/CIPA Lesson Plan

Cyber Safety Guide. From Time Warner Cable and CyberAngels. A complimentary guide to safe Internet use for parents

Internet Generation Gap: An Analysis of Student Assessments and Parent Surveys from an Active Learning Internet Safety Environment

A Time to Tell Troop Meeting Guide

E-Safety Issues and Online Safety. Parents Evening

TEEN ONLINE EXPOSURE: A SNAPSHOT OF DATA

Social Networking Sites like Facebook, MSN

YOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School mskallos@stthomasgr.org

Cyberbullying: What Parents Can Do to Protect Their Children

TECHNOLOGY USE POLICY FLORENCE ELEMENTARY

Chatroom and messaging safety Staying away from pornography Avoiding internet bullying. Keeping your child safe on the. internet

Understanding Consent to Sexual Activity. Public Legal Education and Information Service of New Brunswick

E-Safety Issues and Online Safety

Risky Online Relationships

HIGH SCHOOL FOR RECORDING ARTS

Cyberbullying. Welcome!

Outsmarting On-line Predators. Christina Kilbourne

Cyber-Safe Kids Cyber-Savvy Teens

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

Cyber Safety Handbook 2014

Boundaries: Protecting Children, Young People and Yourself from Technology Dangers

Social Media Guidelines Resource

NORTHEAST COMMUNITY SCHOOL DISTRICT CONSENT TO STUDENT USE OF THE DISTRICT S COMPUTERS, COMPUTER NETWORK SYSTEMS, AND INTERNET ACCESS

Results. Contact sexual crimes based on PSI and self-report after SOTP participation

Youth Protection Training

Online Safety How to Protect Yourself and Your Family

RICH TOWNSHIP HIGH SCHOOL Adopted: 7/10/00 DISTRICT 227 Olympia Fields, Illinois

Chatting online and child safety

Internet Safety Guide for Parents.

The Digital Divide: How the Online Behavior of Teens is Getting Past Parents

New computer technology presents

What Practices Can Protect School-Aged Minors from Online Sexual Predators in the United States?

REQUEST FOR COUNCIL ACTION CITY OF SAN DIEGO

Iowa-Grant School District Acceptable Use and Internet Safety Policy For Students, Staff and Guests

9. MEDIA AND INTERNET

Mercy School. Internet Safety Policy

Helping to keep your children safe online

E-safety: Protecting your child online. Information for parents

National Statistics. Domestic Violence/Sexual Assault Fact Sheet: Oklahoma Department of Mental Health and Substance Abuse Services

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )

Office of the Attorney General of Virginia. Sexting. Protecting Yourself on the Internet and Mobile Devices

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

Today s teens use technology more than ever. Most have

BANK VIEW HIGH SCHOOL

Transcription:

MEA-MFT Teachers Conference Online Safety: Cyber Predators - Presented by Desireé Caskey You can be anyone you want to be on the Internet

Topics for Today What our students are saying - Internet Landscape Pornography and its role Cyber Predators -Profile -Tools -Grooming Process -What can we do

Sobering Stats Six out of 10 kids online have gotten an e-mail or instant message from a perfect stranger... and more than half have written back. One in 33 kids has been aggressively solicited to meet their "cyber friend" in person. One in four kids, ages 10-17, has been exposed to unwanted sexual material online. (Federal Bureau of Investigations)

Internet Landscape 81% of students spend at least 1 hr / week online 11.5% spend more than 8 hrs / week 89% of students are familiar with chat rooms 38% enter chat rooms at least once a week This generation of school children have never known a world without the Internet.

Consider this 31% of students use the computer most often for online communication (E-mail, Chatting, IM). 30% say it s easier to talk with people on the Internet than in person. 15% have received mean or threatening messages while online.

Everyone is Talking Online Of 3 rd and 4 th graders surveyed 60% go on the Internet alone. 46% use E-mail. 26% use Instant Messaging (IM). 18% go into chatrooms. 14.5% have made a new friend by using the Internet.

Our Children are Vulnerable to Exploitation I have given out personal information on-line (signing onto a website, playing games, etc.). Percent 50.0% 40.0% 30.0% 20.0% 10.0% 0.0% 36.7% 28.4% 18.2% 21.9% 42.7% 38.7% 41.3% 44.0% 5 6 7 8 9 10 11 12 Grade

Consider this i-safe student data reveals that 40% have visited an inappropriate place on the Internet; almost 18% more than once. 90% of 8 to16 year-olds have viewed pornography online. Most access occurs unintentionally while doing homework. London School of Economic, January 2002 Video

Every Child is At Risk Online Meeting Face to Face (by grade) 40.0% 35.0% 30.0% Percent 25.0% 20.0% 15.0% 10.0% 5.0% 0.0% 5 6 7 8 9 10 11 12 Grade Asked to meet Willing to meet Have met

How we reveal too much Screen Name Online Profile Chat Room Iming Blogging Gaming Social Networks Too revealing Way too much information Learns the lingo Makes it intimate Online diaries Profiles & Chat Friend of a friend of a friend

How we reveal too much

Cyber Predators

Cyber Predator Profile 25-65 years old Doctors Well educated Religious Leaders Married with children Parents No socio-economic tag Counselors Steady employment Congressman Varied computer expertise Teachers Male Coaches

Four types of offenders Travelers - Those who manipulate or coerce kids to meet them in person for sexual purposes. Travelers focus on physical contact - that is their ultimate goal. These predators may arrange to meet the child victim at a shopping mall, school, soccer field, theater, private home (while the parents are out) or other location. Collectors - Those involved in collecting child pornography. Collectors may amass huge collections of child pornography. Although they may actively trade images with other collectors, these predators are typically not involved in the creation. Manufacturers - Those who create child pornography on any type of medium (all manufacturers are collectors). Manufacturers create child pornography using a variety of media (digital pictures, printed pictures, video, etc.). They may actively solicit children through bribery, coercion or force. Chatters - Those presenting themselves as trustworthy individuals in chat sessions. Chatters may be seen as harmless individuals who may not collect child pornography or seek physical contact with the victim. They are not harmless - they can expose the child to sexually inappropriate communications and graphic images depicting sexual images. Chatters may develop into collectors or travelers.

The Tools of a Cyber Predator Chat Rooms Blogs Iming Email Phone Social Networks

The Grooming Process The grooming process is similar to adult courting and can take a short time or a very long time. A cyber predator is patient. Shared Interests Build Trust Secrecy Break Down Barriers - Diminish inhibitions Threaten with exposure or harm ALWAYS working towards a face-to-face meeting Take it from an expert

Online Safety - What can we do? Know about chat rooms and social networks Know about IMing and blogging Learn the sites and sounds of the Internet Listen to your kids/students Know online acronyms Follow these tips from the NCMEC