Your Ad Here

Monday, July 27, 2009

Cyberbullying - Let's Fight It Together

What's the Parents' Role in This?
Parents need to be the one trusted place kids can go when things go wrong online and offline. Yet they often are the one place kids avoid when things go wrong online. Why? Parents tend to overreact. Most children will avoid telling their parents about a cyberbullying incident fearing they will only make things worse. (Calling the other parents, the school, blaming the victim or taking away Internet privileges.)Unfortunately, they also sometimes under react, and rarely get it "just right." Parents need to be supportive of your child during this time. You may be tempted to give the "stick and stones may break your bones, but words will never hurt you" lecture, but words and cyberattacks can wound a child easily and have a lasting effect. These attacks follow them into your otherwise safe home and wherever they go online. And when up to 700 million accomplices can be recruited to help target or humiliate your child, the risk of emotional pain is very real, and very serious. Don't brush it off.


It is crucial that you are there to provide the necessary support and love. Make them feel secure. Children have committed suicide after having been cyberbullied, and in Japan one young girl killed another after a cyberbullying incident. Take it seriously. Parents also need to understand that a child is just as likely to be a cyberbully as a victim of cyberbullying and often go back and forth between the two roles during one incident. They may not even realize that they are seen as a cyberbully. Your actions have to escalate as the threat and hurt to your child does. But there are two things you must consider before anything else. Is your child at risk of physical harm or assault? And how are they handling the attacks emotionally?


If there is any indication that personal contact information has been posted online, or any threats are made to your child, you must run.....do not walk, to your local law enforcement agency. Take a print-out of all instances of cyberbullying to show them, but note that a print-out is not sufficient to prove a case of cyber-harassment or cyberbullying. You'll need electronic evidence and live data for that. It is crucial that all electronic evidence is preserved to allow the person to be traced and to take whatever action needs to be taken. The electronic evidence is at risk for being deleted by the Internet service providers unless you reach out and notify them that you need those records preserved.

Quick Guide for Parents About What to do if Your Child is Cyberbullied

Talk to your child


Caution them about responding "in kind." This is not a time for them to lash out or start a cyberwar themselves. See if they think they know the identity of the cyberbully or cyberbullies. See if this is related to an offline bullying situation, and deal with that quickly. And don't confuse the language most kids use online with cyberbullying. It may be shocking to us, but unless it is shocking to your child, it's not cyberbullying.


Ignore it


A one time, seemingly unthreatening act, like a prank or mild teasing should probably be ignored. (If it's a threat, you must report it.) At the same time, you may want to consider using some preventive measures:
  • Restrict the people who can send you communications - Consider restricting all incoming communications to pre-approved senders, such as those on your child's buddy list. (If the cyberbully is someone on their buddy list, though, this method won't help. In that case the cyberbully will have to be removed from the buddy list and/or blocked.)

  • Restrict others from being able to add your child to their buddy list - Cyberbullies track when your child is online by using buddy lists, and similar tracking programs. It will let them know when one of their "buddies" is online, when they are inactive and, in some cases, where they are. This is like adding a tracking device to your child's online ankle, allowing their cyberbullies to find them more easily and target them more effectively. This feature is usually found in the privacy settings or parental controls of a communications program.

Google your child

Make sure that the cyberbully isn't posting attacks online. When you get an early warning of a cyberbullying campaign, it is essential that you keep an eye on your child's screen name, nick names, full name, address, telephone and cell numbers and Web sites. You can also set up an "alert" on Google to notify you whenever anything about your child is posted online.

Block the sender

Someone who seems aggressive, or makes you uncomfortable and does not respond to verbal please or formal warnings should be blocked. This way, they will not be able to know when you are online or be able to contact you through instant messaging. Even if the communicates are not particularly aggressive or threatening, if they are annoying, block the sender. (Most ISPs and instant messaging programs have a blocking feature to allow you to prevent the sender from getting through.)

"Warn" the sender

If the cyberbully uses another screen name to avoid the block , otherwise manages to get through or around the block or communicates through others, "warn" them, or "notify" the ISP. (This is usually a button on the IM application.) This creates a record of the incident for later review, and if the person is warned enough, they can lose their ISP or instant messenger account. (Unfortunately, many cyberbullies use "warning wars" or "notify wars" to harass their victims, by making it appear the victim is really the cyberbully. This is a method of cyberbullying by proxy, getting the ISP to be an unwitting accomplice of the cyberbullying.)

Report to ISP

Most cyberbullying and harassment incidents violate the ISP's terms of service. These are typically called a "TOS violation" (for a "terms of service" violation, and can have serious consequences for the account holder. Many ISPs will close a cyberbully's account (which will also close their parents' household account in most cases.) You should report this to the sender's ISP, not yours. If your child's account has been hacked or their password compromised, or if someone is posing as your child, you should make a formal report to your ISP as well. You can call them or send an e-mail to their security department. But before changing your password, you should scan your computer for any hacking programs or spyware, such as a Trojan horse. If one is on your computer, the cyberbully may be able to access the new password. Most good anti-virus programs can find and remove a hacking program. All spyware applications can. We recommend SpyBot Search and Destroy (a freeware) or Ad-Aware (by Lavasoft, they have a free "lite" program).

Report to School

Most cases of cyberbullying occur off school grounds and outside of school hours. In the United States , often the school has no legal authority to take action relating to an off-premises and off-hours activity, even if it has an impact on the welfare of their students. The laws are tricky, and vary jurisdiction by jurisdiction. So while you should notify the school (especially if your child suspects whom is behind the attacks), they may not be able to take disciplinary action. They can keep any eye on the situation in school, however. And since many cyberbullying incidents are combined with offline bullying incidents, your child may be safer because of the report.
Also, while the school may have limited authority over disciplining the cyberbully, they can call the parents in and try and mediate the situation. They can also institute an educational and awareness program to help stop further cyberbullying by students, and to help educate parents about the problem.

Report to Police

Someone who threatens you physically, who is posting details about your or your child's offline contact information or instigating a cyberbullying by proxy campaign should be reported to the police. (Although you should err on the side of caution and report anything that worries you.) Using a monitoring program, such as Spectorsoft, can facilitate the investigation and any eventual prosecution by collecting and preserving electronic evidence. Print-outs, while helpful in explaining the situation, are generally not admissible evidence.) If you feel like your child, you or someone you know is in danger, contact the police immediately and cut off contact with this person or user, staying offline if need be until you are otherwise instructed. Do not install any programs, or remove any programs or take other remedial action on your computer or communication device during this process. It may adversely affect the investigation and any eventual prosecution.

Take Legal Action

Many cases of cyberbullying (like their adult cyber-harassment equivalent) are not criminal. They may come close to violating the law, but may not cross the line. Most of the time, the threat of closing their ISP or instant messaging account is enough to make things stop. But sometimes, either because the parents want to make an example of the cyberbully or because it isn't stopping, lawyers need to be brought in. It may also be the only way you can find out whom is behind the attacks.

Think carefully before you decide to take this kind of action. Even if you win in the end, it may take you two or three years to get there and cost you tens of thousands of dollars. You may be angry enough to start it, but make sure that you have something more than anger to sustain the long months and years of litigation.

Sunday, July 26, 2009

Why Do Kids Cyberbully Each Other?

Who knows why kids do anything? When it comes to cyberbullying, they are often motivated by anger, revenge or frustration. Sometimes they do it for entertainment or because they are bored and have too much time on their hands and too many tech toys available to them. Many do it for laughs or to get a reaction. Some do it by accident, and either send a message to the wrong recipient or didn't think before they did something. The Power-hungry do it to torment others and for their ego. Revenge of the Nerd may start out defending themselves from traditional bullying only to find that they enjoy being the tough guy or gal. Mean girls do it to help bolster or remind people of their own social standing. And some think they are righting wrong and standing up for others.

Because their motives differ, the solutions and responses to each type of cyberbullying incident has to differ too. Unfortunately, there is no "one size fits all" when cyberbullying is concerned. Experts who understand schoolyard bullying often misunderstand cyberbullying, thinking it is just another method of bullying. But the motives and the nature of cybercommunications, as well as the demographic and profile of a cyberbully differ from their offline counterpart.

Cyberbullying by Proxy

Cyberbullying by proxy is when a cyberbully gets someone else to do their dirty work. Most of the time they are unwitting accomplices and don't know that they are being used by the cyberbully. Cyberbullying by proxy is the most dangerous kind of cyberbullying because it often gets adults involve in the harassment and people who don't know they are dealing with a kid or someone they know.

"Warning" or "Notify Wars" are an example of cyberbullying by proxy. Kids click on the warning or notify buttons on their IM screen or e-mail or chat screens, and alert the ISP or service provider that the victim has done something that violates their rules.If the victim receives enough warnings or notifications, they can lose their account. The service providers are aware of this abuse, and often check and see if the warning were justified. But all the cyberbully has to do is make the victim angry enough to say something rude or hateful back. Then, BINGO! they warn them, making it look like the victim had started it. In this case, the ISP or service provider is the innocent accomplice of the cyberbully.

Sometimes the victim's own parents are too. If the cyberbully can make it look like the victim is doing something wrong, and the parents are notified, the parents will punish the victim.

Cyberbullying by proxy sometimes starts with the cyberbully posing as the victim. They may have hacked into their account or stolen their password. They may have set up a new account pretending to be the victim. But however they do it, they are pretending to be the victim and trying to create problems for the victim with the help of others.

The most typical way a cyberbullying by proxy attack occurs is when the cyberbully gets control of the victim's account and sends out hateful or rude messages to everyone on their buddy list pretending to be the victim. They may also change the victim's password so they can't get into their own account. The victim's friends get angry with the victim, thinking they had sent the messages without knowing they have been used by the cyberbully. But it's not always this minor. Sometimes the cyberbully tries to get more people involved.

For example...Mary wants to get Jennifer back for not inviting her to her party. She goes online and, posing as Jennifer, posts "I hate Brittany, she is so stupid, ugly and fat!" on buddyprofile.com. Mary may tell Brittany and her friends that she read the post on buddyprofile.com and blames Jennifer for being mean. Brittany and her friends now start attacking Jennifer, and may report her to buddyprofile.com or her school. They are doing Mary's dirty work for her. Mary looks like the "good guy" and Jennifer may be punished by her parents, lose her account with buddyprofile.com and get into trouble at school. And Brittany and her friends may start to cyberbully Jennifer too.

Sometimes it is much more serious than that. When cyberbullies want to get others to do their dirty work quickly, they often post information about, or pose as, their victim in hate group chat rooms and on their discussion boards. Cyberbullies have even posted this information in child molester chat rooms and discussion boards, advertising their victim for sex. They then sit back and wait for the members of that hate group or child molester group to attack or contact the victim online and, sometimes, offline.

For this to work, the cyberbully needs to post offline or online contact information about the victim. Real information, not the account they used to impersonate the victim (if they are posing as the victim to provoke an attack). For example...Jack is angry that Blake was chosen as captain of the junior varsity basketball team. Blake is black. Jack finds a white supremist group online and posts in their chat room that Blake said nasty things about whites and their group in particular. He then posts Blake's cell phone number and screen name. People from the group start calling and IMing Blake with threats and hateful messages. Jack has no idea how much danger he has placed Blake in, and Blake doesn't know why he in under attack. In cases of cyberbullying by proxy, when hate or child molester groups are involved, they victim is in danger of physical harm and law enforcement must be contacted immediately.

Cyberbullying - Direct Attacks

1. Instant Messaging/Text Messaging Harassment
2. Stealing Passwords
3. Blogs
4. Web Sites
5. Sending Pictures through E-mail and Cell Phones
6. Internet Polling
7. Interactive Gaming
8. Sending Malicious Code
9. Sending Porn and Other Junk E-Mail and IMs
10. Impersonation

1. Instant Messaging/Text Messaging Harassment
a) Kids may send hateful or threatening messages to other kids, without realizing that while not said in real life, unkind or threatening messages are hurtful and very serious.

b) Warning wars - Many Internet Service Providers offer a way of "telling on" a user who is saying inappropriate things. Kids often engage in "warning wars" which can lead to kicking someone offline for a period of time. While this should be a security tool, kids sometimes use the Warn button as a game or prank.

c) A kid/teen may create a screenname that is very similar to another kid's name. The name may have an additional "i" or one less "e". They may use this name to say inappropriate things to other users while posing as the other person.

d) Text wars or text attacks are when kids gang up on the victim, sending thousands of text-messages to the victims cell phone or other mobile device. The victim is then faced with a huge cell phone bill and angry parents.

e) Kids send death threats using IM and text-messaging as well as photos/videos (see below)

2. Stealing passwords
a) A kid may steal another child's password and begin to chat with other people, pretending to be the other kid. He/she may say mean things that offend and anger this person's friends or even strangers. Meanwhile, they won't know it is not really that person they are talking to.

b) A kid may also use another kid's password to change his/her profile to include sexual, racist, and inappropriate things that may attract unwanted attention or offend people.

c) A kid often steals the password and locks the victim out of their own account.

d) Once the password is stolen, hackers may use it to hack into the victim's computer.

3. Blogs
Blogs are online journals. They are a fun way for kids and teens to messages for all of their friends to see. However, kids sometimes use these blogs to damage other kids' reputations or invade their privacy. For example, in one case, a boy posted a bunch of blogs about his breakup with his ex-girlfriend, explaining how she destroyed his life, calling her degrading names. Their mutual friends read about this and criticized her. She was embarrassed and hurt all because another kid posted mean, private, and false information about her. Sometimes kids set up a blog or profile page pretending to be their victim and saying things designed to humiliate them.

4. Web sites
a) Children used to tease each other in the playground; now they do it on Web sites. Kids sometimes create Web sites that may insult or endanger another child. They create pages specifically designed to insult another kid or group of people.

b) Kids also post other kids' personal information and pictures, which put those people at a greater risk of being contacted or found.

5. Sending Pictures through E-mail and Cell Phones
a) There have been cases of teens sending mass e-mails to other users, that include nude or degrading pictures of other teens. Once an e-mail like this is sent, it is passed around to hundreds of other people within hours; there is no way of controlling where it goes.

b) Many of the newer cell phones allow kids to send pictures to each other. The kids receive the pictures directly on their phones, and may send it to everyone in their address books. After viewing the picture at a Web site, some kids have actually posted these often pornographic pictures on Kazaa and other programs for anyone to download.

c) Kids often take a picture of someone in a locker room, bathroom or dressing room and post it online or send it to others on cell phones.

6. Internet Polling
Who's Hot? Who's Not? Who is the biggest slut in the sixth grade? These types of questions run rampant on the Internet polls, all created by yours truly - kids and teens. Such questions are often very offensive to others and are yet another way that kids can "bully" other kids online.

7. Interactive Gaming
Many kids today are playing interactive games on gaming devices such as X-Box Live and Sony Play Station 2 Network. These gaming devices allow your child to communicate by chat and live Internet phone with anyone they find themselves matched with in a game online. Sometimes the kids verbally abuse the other kids, using threats and lewd language. Sometimes they take it further, by locking them out of games, passing false rumors about them or hacking into their accounts.

8. Sending Malicious Code
Many kids will send viruses, spyware and hacking programs to their victims. They do this to either destroy their computers or spy on their victim. Trojan Horse programs allow the cyberbully to control their victim's computer remote control, and can be used to erase the hard drive of the victim.

9. Sending Porn and Other Junk E-Mail and IMs
Often cyberbullies will sign their victims up for e-mailing and IM marketing lists, lots of them, especially to porn sites. When the victim receives thousands of e-mails from pornographers their parents usually get involved, either blaming them (assuming they have been visiting porn sites) or making them change their e-mail or IM address.

10. Impersonation
Posing as the victim, the cyberbully can do considerable damage . They may post a provocative message in a hate group's chatroom posing as the victim, inviting an attack against the victim, often giving the name, address and telephone number of the victim to make the hate group's job easier. They often also send a message to someone posing as the victim, saying hateful or threatening things while masquerading as the victim. They may also alter a message really from the victim, making it appear that they have said nasty things or shared secrets with others.

How Cyberbullying Works?

There are two kinds of cyberbullying, direct attacks (messages sent to your kids directly) and cyberbullying by proxy (using others to help cyberbully the victim, either with or without the accomplice's knowledge). Because cyberbullying by proxy often gets adults involved in the harassment, it is much more dangerous.

Saturday, July 25, 2009

Internet Safety Video

Share this video with your kids, please.

NetSmartzKids: Be Safer Online

Be Safer Online




UYN: The NetSmartz Chat Abbreviation

NetSmartzKids: Know the Rules

Your kids will love this video.

Monday, July 20, 2009

Internet Acronyms Parents Need to Know

Parents,

You'll need to know this........from the good people at netlingo.com

http://www.netlingo.com/top50/acronyms-for-parents.php
http://www.netlingo.com/top50/top50parents.php
http://www.netlingo.com/top50/popular-text-terms.php



Another Very Sad Case of Cyberbullying - Megan Meier

In May, 2008, Lori Drew was charged in the US District Court with one count of conspiracy and three counts of computer crime. The indictment alleges that Drew created a MySpace account pretending to be a 16 year old boy named Josh Evans and sent messages to 13 year old Megan Meier, an acquaintance of Drew's daughter. When the messages started in September, 2006, they were friendly and expressed romantic interest in Meier, but by the next month "Evans" sent Meir a final message saying "The world would be a better place without you." Shortly thereafter, a distraught Megan hung herself.

If convicted, Drew could serve up to 20 years in prison.

Obviously, more work needs to be done to stem the growing plague of cyberbullying that has become the bully's medium of choice in the 21st century, and serves to remind us all that with freedom comes responsibility, and an obligation to look out for those under our care. The Internet offers a wealth of knowledge, resources, games, and entertainment that can (and should) be enjoyed by everyone. However, with the freedom that comes from an unlimited, unregulated communications network also comes the need to be diligent and aware of the dangers that lurk therein.

A Sad Case of Cyberbullying - Ghyslain Raza

In May 2003, four classmates of Ghyslain Raza found a private video where Ghyslain was pretending to be a Star Wars Jedi Knight. His classmates thought it would be funny to upload the video to the Internet. Within a few short weeks, it had been viewed millions of times by visitors from around the globe. As of August, 2006, Ghyslain is now the most downloaded male on the Internet (the most downloaded femle is Paris Hilton).

Ghyslain's classmates thought this was funny, and countless spin-offs have found their way to the Internet. The reality for Ghyslain is quite different. Ghyslain was so humiliated and embarrassed by the event he dropped out of high school and finished the year at a faculty specializing in child psychiatry.

Sunday, July 19, 2009

A Great Video for Sharing with Your Children

Internet Kids Outsmart Parents

"Only On The Web": Kids can hide their computer activity with the same technology parents use to protect them. Internet expert Greg Smith explains the dangers for children and how to keep them safe.

Very informative video. Greg encourages deploying stealth technology to monitor children's online activities. I agree although it is painful to do it. Was hesitant to use stealth technology initially but after a very long thought, I realize that ensuring my children's safety is very important to me. And if that means that I have to do something sneaky to protect them, I will do it. Their life and future are paramount as far as I am concerned and I will do anything to keep them protected from harm.

If you are interested to know, I am using PC Tattletale and find it very useful. For your convenience, I have attached PC Tattletale's banner on the right column of my blog. Check it out...not really expensive but a very powerful tool.

In the meantime, enjoy the video by clicking the link below.
http://atlantis2.cbsnews.com/video/watch/?id=3524413n

Cheers!

Internet Safety - Lesson for Very Young Children

I chance upon a great video on you tube. Lessons on internet safety for very young children. Click the following link to view it.

http://www.youtube.com/watch?v=MuaJcjxBK3U

Parents Frequently Asked Questions

My child has received an e-mail advertising for a pornographic website, what should I do? (This applies to the U.S. but is generally relevant to many countries around the globe)
Generally, advertising for an adult, pornographic website that is sent to an e-mail address does not violate federal law or the current laws of most states. In some states it may be a violation of law if the sender knows the recipient is under the age of 18. Such advertising can be reported to your service provider and, if known, the service provider of the originator. It can also be reported to your state and federal legislators, so they can be made aware of the extent of the problem.

Is any service safer than the others?
Sex offenders have contacted children via most of the major on-line services and the Internet. The most important factors in keeping your child safe on-line are the utilization of appropriate blocking software and/or parental controls, along with open, honest discussions with your child, monitoring his/her on-line activity.

Should I just forbid my child from going on-line?
There are dangers in every part of our society. By educating your children to these dangers and taking appropriate steps to protect them, they can benefit from the wealth of information now available on-line.

What Can You Do To Minimize The Chances Of An On-line Exploiter Victimizing Your Child?


  1. Communicate, and talk to your child about sexual victimization and potential on-line danger.

  2. Spend time with your children on-line. Have them teach you about their favorite on-line destinations.

  3. Keep the computer in a common room in the house, not in your child's bedroom. It is much more difficult for a computer-sex offender to communicate with a child when the computer screen is visible to a parent or another member of the household.

  4. Utilize parental controls provided by your service provider and/or blocking software.
    While electronic chat can be a great place for children to make new friends and discuss various topics of interest, it is also prowled by computer-sex offenders. Use of chat rooms, in particular, should be heavily monitored. While parents should utilize these mechanisms, they should not totally rely on them.

  5. Always maintain access to your child's on-line account and randomly check his/her e-mail.
    Teach your child the responsible use of the resources on-line. There is much more to the on-line experience than chat rooms.

  6. Find out what computer safeguards are utilized by your child's school, the public library, and at the homes of your child's friends. These are all places, outside your normal supervision, where your child could encounter an on-line predator.

  7. Understand, even if your child was a willing participant in any form of sexual exploitation, that he/she is not at fault and is the victim. The offender always bears the complete responsibility for his or her actions.

Instruct your children:



  • to never arrange a face-to-face meeting with someone they met on- line;

  • to never upload (post) pictures of themselves onto the Internet or on-line service to people they do not personally know;

  • to never give out identifying information such as their name, home address, school name, or telephone number;

  • to never download pictures from an unknown source, as there is a good chance there could be sexually explicit images;

  • to never respond to messages or bulletin board postings that are suggestive, obscene, belligerent, or harassing;

  • that whatever they are told on-line may or may not be true.

What Should You Do If You Suspect Your Child Is Communicating With A Sexual Predator On-line?

  • Consider talking openly with your child about your suspicions. Tell them about the dangers of computer-sex offenders.
  • Review what is on your child's computer. If you don't know how, ask a friend, coworker, relative, or other knowledgeable person. Pornography or any kind of sexual communication can be a warning sign.
  • Use the Caller ID service to determine who is calling your child. Most telephone companies in many countries that offer Caller ID also offer a service that allows you to block your number from appearing on someone else's Caller ID. Telephone companies also offer an additional service feature that rejects incoming calls that you block. This rejection feature prevents computer-sex offenders or anyone else from calling your home anonymously.
  • Monitor your child's access to all types of live electronic communications (i.e., chat rooms, instant messages, Internet Relay Chat, etc.), and monitor your child's e-mail. Computer-sex offenders almost always meet potential victims via chat rooms. After meeting a child on-line, they will continue to communicate electronically often via e-mail.

Should any of the following situations arise in your household, via the Internet or on-line service, you should immediately contact your local Police:

  • Your child or anyone in the household has received child pornography;
  • Your child has been sexually solicited by someone who knows that your child is under 18 years of age;
  • Your child has received sexually explicit images from someone that knows your child is under the age of 18.
  • If one of these scenarios occurs, keep the computer turned off in order to preserve any evidence for future law enforcement use. Unless directed to do so by the law enforcement agency, you should not attempt to copy any of the images and/or text found on the computer.

What Are Signs That Your Child Might Be At Risk On-line? Part 3

Your child turns the computer monitor off or quickly changes the screen on the monitor when you come into the room.
A child looking at pornographic images or having sexually explicit conversations does not want you to see it on the screen.

Your child becomes withdrawn from the family.
Computer-sex offenders will work very hard at driving a wedge between a child and their family or at exploiting their relationship. They will accentuate any minor problems at home that the child might have. Children may also become withdrawn after sexual victimization.

Your child is using an on-line account belonging to someone else.
Even if you don't subscribe to an on-line service or Internet service, your child may meet an offender while on-line at a friend's house or the library. Most computers come preloaded with on-line and/or Internet software. Computer-sex offenders will sometimes provide potential victims with a computer account for communications with them.

What Are Signs That Your Child Might Be At Risk On-line? Part 2

Your child receives phone calls from men you don't know or is making calls, sometimes long distance, to numbers you don't recognize.
While talking to a child victim on-line is a thrill for a computer-sex offender, it can be very cumbersome. Most want to talk to the children on the telephone. They often engage in "phone sex" with the children and often seek to set up an actual meeting for real sex. While a child may be hesitant to give out his/her home phone number, the computer-sex offenders will give out theirs. With Caller ID, they can readily find out the child's phone number. Some computer-sex offenders have even obtained toll-free 800 numbers, so that their potential victims can call them without their parents finding out. Others will tell the child to call collect. Both of these methods result in the computer-sex offender being able to find out the child's phone number.

Your child receives mail, gifts, or packages from someone you don't know.
As part of the seduction process, it is common for offenders to send letters, photographs, and all manner of gifts to their potential victims. Computer-sex offenders have even sent plane tickets in order for the child to travel across the country to meet them.

What Are Signs That Your Child Might Be At Risk On-line? Part 1

Your child spends large amounts of time on-line, especially at night.
Most children that fall victim to computer-sex offenders spend large amounts of time on-line, particularly in chat rooms. They may go on-line after dinner and on the weekends. They may be latchkey kids whose parents have told them to stay at home after school. They go on-line to chat with friends, make new friends, pass time, and sometimes look for sexually explicit information. While much of the knowledge and experience gained may be valuable, parents should consider monitoring the amount of time spent on-line.
Children on-line are at the greatest risk during the evening hours. While offenders are on-line around the clock, most work during the day and spend their evenings on-line trying to locate and lure children or seeking pornography.

You find pornography on your child's computer.
Pornography is often used in the sexual victimization of children. Sex offenders often supply their potential victims with pornography as a means of opening sexual discussions and for seduction. Child pornography may be used to show the child victim that sex between children and adults is "normal." Parents should be conscious of the fact that a child may hide the pornographic files on diskettes from them. This may be especially true if the computer is used by other family members.

Vroooom......This Blog!!!!!

Bookmark and Share
Google Groups
Subscribe to Protecting Children in Cyberspace
Email:
Visit this group