Tuesday, May 1, 2007

Child Predators Are Everywhere

Child predators are not caught only in small rural towns on the Dateline series “To Catch a Predator”; they are also caught here in Rhode Island. It may be scary to think that these people are so close, but it’s true. 39-year-old Timothy J. Sheldon was an assistant principle at Bishop Hendricken High School in Warwick, R.I. In November of 2004 he solicited a person in a chat room who he believed was a 14-year-old boy, but was really a member of Perverted Justice.

Perverted Justice was setup in 2002 as a watchdog agency that works with law enforcement agencies. Its volunteers carry out sting operations by posing as minors waiting for older men to approach them in chat rooms. As of May 1st, their operations have led to 179 convictions. Perverted Justice posted the conversation on their Web site and notified the Warwick Police Department, where he lived, and Rhode Island State Police. Based on the transcript alone, they had enough evidence to track him down. Sheldon moved to Massachusetts in an attempt to escape authorities, but was caught in December of 2004 and handed over to Rhode Island authorities. The hard drive from the computer that he used to chat has yet to be found.

On February 9th of 2005, he was the first person to be charged with 2 counts of Indecent Solicitation of a Child (§11-37-8.8), which became an RI State law in August of 2004. He plead no contest to one count and under the terms of a plea agreement, the State dismissed the other count of indecent solicitation. He was sentenced to 5 years probation, forced to surrender his R.I. teaching certificate, and is not allowed to use the Internet. He cannot be employed in a job in which he has contact with children under the age of 18, and had to complete sex offender counseling and treatment.

Click here to visit the Perverted Justice Web site

Wednesday, April 25, 2007

Wireless AMBER Alerts


AMBER Alerts are sent out when a child has been abducted and it is believed that their life is in grave danger. Statistics show that when abducted, a child’s greatest enemy is time. According to a study by the United States Department of Justice, 74% of the children who were kidnapped and later found murdered were killed within the first 3 hours of being taken.
Time is of the essence, so sign up for Wireless AMBER Alerts on your cell phone, pager or PDA. The alert is sent via text message, and most major carriers provide the service free of charge. You will receive alerts as soon as they are released to the public and that pertain only to your geographic area.
Click here and sign up today.

Thursday, March 22, 2007

Amber Frangos

Amber Frangos is the author of "The Butterfly Net" and "No Child is Safe: from Internet Crime, A Guide for Parents", two very interesting and informative books regarding children on the Internet. She has spent years educating children and adults about the dangers of the Internet. Her books have tips to help keep your children safe online, as well as describing how predators use the Internet to gain access to children and their personal information.
To purchase her books or for more information please visit:

Monday, March 19, 2007

What is Social Networking?

Social Networking
(also known as online communities)
These sites allow users to generate and maintain relationships online with other members of the network. The idea is to post journals and pictures of oneself, communicate with others, and find others with similar interests. The communities are great for self-expression, helpful and informative information, new experiences, and more. Social networking has become increasingly popular recently among teens and young adults.
Caution!
- Objectionable material can be found on social networking sites, such as explicit language, racist/violent text and images, and sexual content.
- It is important to maintain your privacy by not advertising any personal information or pictures. One never knows who will venture to their site with the hopes of gaining personal information about a particular person.
- Online predators can lie about their age and location for the purpose of developing a relationship with a minor.
Popular Social Networks
MySpace, Xanda, LiveJournal, myYearbook, BlackPlanet, MiGente, AsianAvenue, Bolt, Hi5, Facebook, and Friendster.

What is Peer-to-Peer?

Peer-to-Peer
(also known as P2P)
P2P systems allow the exchange of files from person to person without having to go through a Web site. There are many legal and ethical issues surrounding P2P systems due to unauthorized sharing of copyrighted materials. These systems allow people to share music, videos, photographs, text documents, and software. The idea behind P2P file-sharing systems is that users who download files should allow others to upload files from them.
Caution!
- Some of the files that are available for download might contain disturbing and inappropriate material.
- P2P software is notorious for including spyware and adware. Spyware is software that automatically downloads itself onto a computer to collect personal information without the user's informed consent. Adware is software that automatically displays advertisements on a computer after it installs itself.

Sunday, March 18, 2007

What is Instant Messaging?

Instant Messaging
(also known as IM or IMing)
Instant messaging allows a sender to type a message and then instantly send that message to a recipient on another computer. Anyone who is signed on to the instant messaging program and has an Internet connection can exchange messages in real time, and multiple messages can be sent to several people at once. Recent advances in technology allow text messaging with cell phones.
Caution!
- Like chatrooms, you should never give out any personal information unless you are 100% sure of who you are communicating with.
- Some instant messaging services allow video chatting in real time, which requires a camera or a video device on your computer that is used in corporation with typing.
- Some services encourage you to enter information about yourself into a "profile" with personal information, such as your age, sex, location, interests, etc. While it is not recommended to enter such information, it is even worse to post your name and address. These profiles can usually be seen by anyone.
- Be careful about what you say, because there is no way to "take back" something once you have entered it.
Instant Messaging Services
AIM, MSN, Yahoo!, ICQ, Google Talk, Trillian, iChat, Adium, Miranda, Odigo, Instan-T, and many more.

What are Chatrooms?

Chatrooms
Chatrooms can be one of the most dangerous places on the Internet. (Never say anything in a chatroom that you would not say in public, because you do not know why is there. )
Chatrooms allow one to engage in conversations with people all over the world. They can be used to find friends and to communicate with people who share similar interests. Everyone in the chatroom can see everything that you type, and vice-versa. If the chatroom has a monitor, they cannot prevent you from going to a private chat area or typing information that could put you in danger.
Caution!
- Chatrooms are sometimes used by people to exploit others, can be used by child molesters to find victims, and may be used to bully or harass others.
- Meeting someone in a chatroom is one thing, but meeting them face-to-face is another thing. It may be tempting to meet someone in person, but always remember that people are not always who they seem to be.
- Even if a chatroom is designated for teens, there is a good chance that there are much older people in that chatroom too.
- To avoid harassment, choose a gender-neutral name for use in chatrooms so that no one will know your real name.

Tuesday, March 13, 2007

What is The Web?

The Web
(also known as the Internet, the Net, the World Wide Web)
The Web consists of millions of Web sites in hundreds of languages that are filled with information on almost every topic imaginable. Some Web sites allow you to read newspapers, shop, research, and play games.
Caution!
- Although there are plenty of safe Web sites on the Internet, there are more than enough sites that contain "adult" images and material. Some of these Web sites can be found quite easily by accidentally clicking on a link or typing in a Web address incorrectly.
- There are many scams online today, so it is important to look at the Web site carefully. Just because a site looks safe does not necessarily mean that it is safe. Entering personal information could mean giving up your privacy, as your name and information could end up being sold without your knowledge.
- Downloading from Web sites can lead to unwanted advertising on your computer, individuals tracking what your are doing online, planting viruses that make your computer more venerable to hackers, and more. Never download anything unless you are certain it is from a trustworthy source.

Sunday, March 4, 2007

Parent/Guardian Involvement with Online Safety

Here are some of the findings about the parents and guardians of the youth surveyed and their involvement with online safety from Online Victimization of Youth: Five Years Later (2006)
  • 88% of parents and guardians said they had talked to their children about giving out personal information online
  • 86% of parents and guardians said they had talked to their children about the dangers of chatting online with people they do not know in person
  • 77% of parents and guardians said they had talked to their children about responding to offensive, nasty, or mean messages
  • 76% of parents and guardians said they had talked to their children about talking online about very personal things such as sex
  • 76% of parents and guardians said they had talked to their children about dealing with X-rated pop-up ads or spam E-mail
  • 51% of youth said their parents or guardians had spoken with them in their past year about seeing X-rated pictures on the Internet
  • 47% of youth said their parents or guardians had spoken with them in the past year about people on the Internet who want to talk to them about sex
  • 53% of youth said their parents or guardians had spoken with them in the past year about people on the Internet who might threaten, harass, or bother them
  • 47% of families used software to block pop-up ads
  • 47% of families used software to block spam
  • 47% of families used software to filter sexually explicit images or Web sites
  • 35% of families used software that monitored youths' online activities
  • 31% of families used software that blocked or controlled use of chatrooms
  • 30% of families used software that blocked personal information from being posted or E-mailed
  • 22% of families used software that included a browser or search engine just for kids
  • 11% of families used software that limited the amount of time youth could spend online
  • 35% of parents and guardians had heard of places to report unwanted Internet experiences
  • 12% of youth told parents or guardians about unwanted sexual solicitations
  • 27% of youth told parents or guardians about exposures to sexual material
  • 31% of youth told parents or guardians about a harassment

Online Victimization of Youth

The report Online Victimization of Youth: Five Years Later (2006) was produced in cooperation with the U.S. Department of Justice's Office of Juvenile Justice and Delinquency Prevention and University of New Hampshire's Crimes Against Children Research Center. This national survey of 1,500 youth aged 10 to 17 documented their use of the Internet and experiences while online including unwanted exposure to sexual solicitation, sexual material, and harassment.

The report can be downloaded here: Online Victimization of Youth: Five Years Later (2006)

Here are just a few of the interesting findings:
  • 70% of the girls and 30% of the boys who were surveyed were targeted for sexual solicitations and approaches
  • 81% who were targeted for sexual solicitations and approaches were ages 14 or older
  • 73% of the perpetrators of sexual solicitations and approaches were male
  • 79% of solicitation incidents happened on home computers
  • Of the youth who were solicited, 86% met solicitors online, while 14% were people the youth knew in person before the solicitation
  • In aggressive solicitations incidents, 75% of solicitors asked to meet youth in person
  • In 56% of the cases, youth did not tell anyone about solicitations
  • 54% of the boys and 46% of the girls had unwanted exposure to sexual material
  • 83% of unwanted exposure to sexual material incidents happened while youth were surfing the Web
  • 86% of youth saw images of naked people, and more than half saw more explicit pictures
  • 79% of unwanted exposure to sexual material happened at home
  • 34% of youth had posted their real names, telephone numbers, home addresses, or the names of their schools online where anyone could see
  • 21% of youth in exposure incidents said they knew a site was X-rated before entering
  • 28% of youth said they had "made rude or nasty comments to someone on the Internet"

Monday, February 12, 2007

The National Center for Missing & Exploited Children

The National Center for Missing & Exploited Children (NCMEC) is a non-profit agency that was established in 1984. NCMEC works closely with the government and law enforcement agencies across the United States. Not only do they help find missing children, they also provide assistance to children and the families of children who have been sexually exploited, abused, or abducted. NCMEC also focuses on educating the public and promoting awareness regarding those issues. Their CyberTipline is a widely-successful tool that the public may use to report Internet related crimes against children.
Click here for further information about NCMEC

Saturday, February 10, 2007

Child Online Protection Laws

The Children's Online Privacy Protection Act (COPPA) is enforced by the U.S. Federal Trade Commission. It prohibits U.S.-based Web sites from collecting any personal information from children under 13 years of age without parental consent. The act states that parental consent must be given prior to collection or use a child's personal information. The Web site operator is required to provide a privacy policy regarding their Web site, along with what the information collected will be used for and who will have access to the information.
The Children's Internet Protection Act (CIPA) is an attempt to limit children's exposure to obscene material online. The act requires that schools and libraries that accept federal funding must track the use of the Internet by children. Software must be installed on every computer to block or filter any harmful materials.
The Child Online Protection Act (COPA) required commercial Web sites to verify proof of age before giving users access to sexually explicit material considered obscene for minors. In 1999, a permanent injunction was ordered against its enforcement.
The Child Pornography Protection Act (CPPA) states that the possession or posting of digital/electronic visual representations of minors engaged in sexual activity is illegal. The law is currently under consideration by the Supreme Court.

Family Contract for Online Safety

It is important that parents communicate with their children to help them understand the risks of the Internet. Developing a family contract can be very helpful to remind children what the household rules are for using the Internet. Parents should also read over each rule with the child to make sure that they understand what they are signing. If children do not abide by the rules of the contract, penalty may be along the lines of not being able to use the computer for a week. The following is a link with family contracts that parents can use or modify as they see fit. Family Contracts

Thursday, February 8, 2007

Sexual Crimes Against Children

Many parents today see many stories about sexual crimes against children. Any requests towards children under the age of consent (varies in different states) from an adult to engage in sexual activities, sexual talk, giving out personal sexual information is sexual solicitation. These solicitations may involve the perpetrator requesting offline contact with child through the mail, on the telephone, or in person. Another type of sexual oriented crimes against children is unwanted exposure to sexual material. If a child is on the Internet, there are many ways for them to view obscene material. Just opening email, links, accidentally clicking something or even pop up advertisements, whether the children are seeking the material or not is a crime. This includes being exposed to pictures of naked people or people engaging in sexual activity. It is important to monitor the use of the Internet by children. These sexual crimes are a perfect example of why adults must enforce and adhere to strict household or classroom rules regarding the use of the Internet.

Why Children are Targeted

Internet crimes present hazards to all children, all over the world. Children in particular are targeted because they are naïve and can be convinced to do things that they do not necessarily know are wrong. There are many different types of Internet crimes that commonly target children. One of the obvious crimes that may parents fear is exposure to inappropriate material, may it be sexual, hateful, violent in nature, or encourages activities that are dangerous or illegal. Children can seek out such material, but it is more likely that they will encounter it through email, pop up advertisements, and chat rooms. Viruses, hackers, and spy ware are also ways that can potentially jeopardize not only the child’s privacy and safety, but the family’s privacy and safety as well. Hackers can gain remote access to the family computer, allowing them free range to view all personal files and documents. There is also the legal and financial aspect of Internet crimes. Children can often be conned into providing someone with a credit-card number or doing something that they do not realize is actually illegal. It is important for parents to never save their own personal passwords on their family computer, nor save any credit-card information. Accessing this private information is easier than one might assume.

Victimization

Cyber crimes are unique and certainly not victimless. There are many illegal activities occurring on the Internet, and many people do not know that they are the victim. Software today can digitally transform innocent pictures or images of children into pornographic material and then distributed without one knowing. This victimization can last many years without someone realizing that they are the victim. Unfortunately, if people do eventually realize that they are victims of Internet crimes, many do not disclose their victimization to the proper authorities. It is of the utmost importance to notify law enforcement immediately to stop the crime from progressing.

Location is Everything

The most important thing to take into consideration when you have a child who uses the Internet is the physical location of the computer. Many parents overlook where the child’s computer or the family computer is located. The absolute worst place to allow children to access the Internet is in their bedroom. If the computer is out of sight, parents are unable to supervise what the child is doing and where the child is going online. Children accessing the Internet located on computers in an open area are less likely to look at inappropriate images, communicate with unknown people, post personal pictures, and give out personal information. Knowing that someone may be looking over their shoulder keeps them from doing things that they know are wrong. Children accessing the Internet from the comfort of their bedroom have the privacy to go to whatever Web sites they choose and communicate with whomever they choose without having to worry about anyone seeing what they are doing. If a computer is located in a child’s bedroom, it is important that they do not have access to the Internet. Keep in mind that many children today are so technologically savvy that they are able to tap into wireless networks with ease!