SlideShare a Scribd company logo
Internet Safety for KidsOnly For Adults Presentation
Introduction About MeTanmayDikshitHandwriting AnalysisNCSA CertifiedMaster BrainbenchCertifiedCERTY Certified ProfessionalASCL Certified Cyber Crime Investigator
Home Computer Protectionhttp://www.microsoft.com/protectWindows FirewallsAnti-virusSpyware DetectorsSpyware Search and DestroyWindows DefenderIE 7 with Identity Guard / FireFox is less hackable.Don’t install any P2P softwareProtect Wireless Network
Detailed Information on your computerOnline  : http://www.whatsmyip.org/more/External IPHostnameProxyInternal (LAN) IPAccept LanguageUser AgentScreen ResolutionWho is Lookup (on You)Offline : http://www.pxserver.com/WinAudit.htm
Telecom Directory In BSNL Indiahttp://www.bsnl.co.in/map.htm                                 Station                                 Registrar Tel No                                  Registrar Name                                 Registrar AddressTrace Indian Mobile Location & Operatorhttp://trace.bharatiyamobile.com/                                 Mobile Number                                 Location                                 Signaling                                  Operator
Super Researchwww.google.com- General Searchwww.technorati.com- Blogosphere Searchwww.justdial.com- India's No.1 local search engine
WarningViewer discretion advisedThis is a disturbing topicThis presentation was NOT designed to be Viewed by children
ContentsSample CasesCold Hard Facts about TechnophiliaCyber Child Sex Offender TerminologySix Steps to LuringCyber Child Sex Offender ProfilesMost At-RiskAdvice for ParentsResources
Kylie Taylor CaseDetectives said Kylie (14) arranged to meet Sadler through Internet chat rooms and phone calls after she left her foster home.Court documents said Kylie was found in a darkened room with video cameras and restraints where he whipped, sexually assaulted her and chained her to a bed when he left the residence.Stanley Scott Sadler, age 47, has been charged with one count of kidnapping in the first degree, three counts of rape of a child in the third degree, and one count of sexual exploitation of a minor.Kylie was located by her mother and an ad hoc group of volunteer pedophile trackers( www.perverted-justice.com )
Sex Solicitation Results in ArrestA 23-year-old Pueblo man is being held in Douglas County Jail after allegedly soliciting sex with children in an Internet chat room. Lenard James Brown was arrested March 4, according to a press release by the Pueblo County Sheriff's Office.In February, Brown allegedly posted a message in a chat room asking parents to arrange for him to meet privately with their children. The children ranged in age from 1 to 14. A person who saw the message notified authorities.
S.J. Man Surrenders in Child Sex CaseA former Redwood City middle school teacher turned himself in Tuesday at the Santa Clara County Jail after police seized his home computer and allegedly found child pornography. David Joseph Welsh, who most recently taught at the North Star Academy, was charged with a misdemeanor of possessing child pornography and is being held in lieu of $150,000 bail.
Man Delivers Live Rape VideoA local man who went on the Internet and offered live video of himself having sex with a 3-year-old girl is behind bars, police say. Paul A. Kraft has been charged with two counts of rape and one count of pandering sexually oriented material involving a minor.
Man Accused of Soliciting a ChildA 53-year-old accountant who bragged on the Web about molesting children all over the country, was charged Thursday with three counts of soliciting sex from a child using the Internet, authorities said. Roy Mason, of 2009 High view Fall Place, was arrested Thursday on an Indiana warrant at his home by the Florida Department of Law Enforcement with help from the Hillsborough County Sheriff's Office, said Mike Duffey, an FDLE computer crimes special agent. Authorities are examining the computer found in Mason’s home.
Predator “Shopped” at myspace.comWilliam Warren Greico, 42, first approached the girl after he saw her posting on myspace.com in August. Billing himself as a man named "Tyler,“ the Seminole High School English teacher sent his picture to the girl and a message asking if she'd like to be friends. Detectives arranged a sting after Greico suggested that he and the girl meet at an undisclosed location
Fake Orkut profile of schoolgirl postedFebruary 06, 2007 20:07 ISTOrkut seems to have become the new favourite with online mischief makers as yet another case of misuse of the social networking website has come to light with a schoolgirl complaining that her fake profile has been posted on it. The father of the girl, has approached the Cyber Cell of Delhi Police's Economic Offences Wing after the family began receiving vulgar calls. The girl is a student of a South Delhi school.The web page describes the teenager as a "sex teacher" and has obscene photographs and contact details such as her home address and telephone numbers, police said.This is the second incident that has come to light about Orkut misuse in Delhi in less than three weeks. Earlier in February, an air-hostess had moved a court here alleging that someone has opened an account in her name on Orkut wherein she is being described as a "sex struck woman". The teenager's family had received the first call almost a month ago where the caller wanted to speak to the girl. Similar calls poured in later, the police said, adding all the callers referred to Orkut.The family had a harrowing time when two strangers knocked at their door a fortnight ago and told them the girl had invited them for sex through Internet, they added. Police said a case has been registered and investigations were on.http://www.rediff.com/news/2007/feb/06orkut.htm
The Perfect VictimIdeal age: 11-14No or little parental involvementNo definite bedtimeCan be away from home without anyone knowing where he/she isHas exclusive use of the computer in a private area
Is Your Child’s Information Online?With these three sources available, Names, Addresses,Phone numbers and Dates of Birth are available on almost ANYONE!www.google.comwww.myfamily.comwww.zoominfo.comwww.alltheweb.comwww.zabasearch.comwww.Eliyon.comwww.orkut.comwww.facebook.comhttp://namesdatabase.com
Normal Name search on www.google.com
Parents don’t let parents let theirkids join Facebook, Orkut, MySpace under 18Arents need to look / Learn about myspace and facebook.Kids don’t think before they post. Once the information is submitted, it’s very hard to take it off.Kids promoting an image that won’t do them any favors.Kids blog too much information.Kids site isn’t set to PrivateVideo Demohttp://www.msnbc.msn.com/id/11064451/
Dangers of Chat roomsPrepare your kids just like the real worldAnyone can be anyone on CyberspaceChildren wastes a lot of time chatting instead of doing homeworkParticipants in chat rooms will sometimes attempt to entice children into talking about sex in one form or another.Children can also be in danger of under developing their social skills
TechnophiliaTerm defined by Detective James McLaughlin, Keene County Police Department“Persons using the computer to engage insexual deviance”
Cyber Child Sex Offender TerminologyTravelers	 those who manipulate or coerce kids to meet them in person for sexual purposesCollectors	 those involved in collecting child PornographyManufacturers	 those who create child pornography on any type of medium (all manufacturers are collectors)Chatters	 those presenting themselves as trustworthy individuals in chat sessions
Six Steps to LuringBased loosely on the MISSING Game available online at www.livewwwires.comJust Like You - BefriendingMaking the offerIncriminating evidenceContact – the “honeymoon phase”Guilt and threats as coercionThe truth emerges
GroomersMost Internet luring instances begin with the process of ‘grooming’ – forming a trusting bond with the child. There are several types of groomers including:Romantic groomersAggressive groomersMonetary/status groomers
Befriending TechniquesChat room discussionsPortrays same age, same likes, same dislikesPortrays age-typical awkwardnessBegins to share some secretsTelephone - predators will want to talk on the phone. Just to make sure it’s a child talkingEmail - Predator may want the child’s email so they can email them offline, and send them stuff, Fantasy statementsWebcammingVerbal Chat on Internet (Microphone) / Skype
Chat Room ToolsMSN MessengerICQ (“I seek you”)AOL Instant MessengerYahoo! Messenger & Yahoo ChatmIRC (many Internet Relay Chat)Google Talk
Internet Safety For Kids By Tanmay
Internet Safety For Kids By Tanmay
Physical Access is the GoalJohn Evander Couey was a registered sex offender that was living just 150 yards away from Jessica Lunsford’s home.Please check the database of sex offenders in your area. Megan’s Law was signed into federal law on May 17, 1996.Access the Megan’s Law database from www.ncmec.orgwww.fbi.gov/hq/cid/cac/states.htmhttp://www.mshp.dps.mo.gov/CJ38/search.jsp
“To Catch a Predator Series”http://www.msnbc.msn.com/id/10912603/
US Child Protection LawUnited States CodeTITLE 18 - CRIMES AND CRIMINAL PROCEDUREPART I - CRIMESCHAPTER 110 - SEXUAL EXPLOITATION AND OTHER ABUSE OF CHILDRENSection 2251   Sexual Exploitation Of Children		     Section 2251A  Selling Or Buying Of Children		     Section 2252  Certain Activities Relating To Material Involving The Sexual Exploitation Of Minors		     Section 2252A  Certain Activities Relating To Material Constituting Or Containing Child Pornography		     Section 2253  Criminal Forfeiture		     Section 2254  Civil Forfeiture	     	     Section 2255  Civil Remedy For Personal Injuries	      	     Section 2256  Definitions For Chapter	          	     Section 2257  Record Keeping Requirements	     	     Section 2258  Failure To Report Child Abuse		     Section 2259  Mandatory Restitution		     Section 2260  Production Of Sexually Explicit Depictions Of A Minor For Importation Into The United States
Pornography In IndiaSection 67 of IT ActPublishing of information which is obscene in electronic form.Publishing, transmitting, causing to be published Porn in the electronic formStrict Punishment5 years jail (SI or RI) + 1 lakh fine10 years jail (SI or RI) + 2 lakh finehttp://www.vakilno1.com/bareacts/informationtechnologyact/s67.htm
General Internet Safety TipsPlace the computer in a central location in the home, not in the kid’s room.Learn who your kids are chatting with online (take the “don’t talk to strangers” message into the digital world).Define your personal standard regarding your child’s privacy.Become familiar with chatting and search tools used by your kids.
Advice for Parents       Detective James McLaughlin,Child Sexual Abuse and Exploitation, Keene Police DepartmentKnow who is most “at risk.”Set up an agreement with your child about computer use (hours, access to chat lines, revealing personal information/photographs)Don’t rely solely on software to block/filter content.Let your child know that reporting unwanted or suspicious solicitations won’t lead to restrictions on computer use.Know that restricting communications to a specific list of friends may not guarantee safe communications.Be aware of restrictions at other computer locations – school, library, friends’ homes.Look for the warning signs of offender manipulation – secretive behavior, histories being deleted, unexplained telephone charges, hang-up calls, unexpected mail, indications that the home is under surveillance.Know how to monitor Internet use in a variety of ways.
Monitoring and Restricting Internet UseInternet Explorer’s Content AdvisorContent Protect, NetNanny, CYBERsitter, CyberPatrol, Cyber Sentinel, FilterPak, Cyber Snoop, etc.Single PasswordCache and history
Parental ResourcesOften focusing on a particular age group with the following typical grade groupings:K-3 Children (age 6-9)4-8 Kids (age 10-14)9-12 Youth (age 15-18)
Help in Indiahttp://www.indiansmissing.com
www.NetSmartz.orgwww.ncmec.orgCyberTipline – www.cybertipline.comwww.livewwwires.comwww.iSafe.orgwww.ChildQuest.orgwww.packet-level.com/kids
What To Do NowDownload and review the presentation material available online atEducate your kids on this issueEmail  ilovetanmay@gmail.com  If you have additional resourcesRegister for and take the online course“Advanced Internet Research and Intelligence” at www.htcia.org – use the techniques to perform reconnaissance on your child
What To Do NowTalking openly with your children about Internet luring and the need to avoid sharing personal information online may help keep them safe online.We hope you use this information and the materials provided to educate others at school meetings, church gatherings, community center meetings, etc.We are interested in your feedback and resource information.Contact us directly at ilovetanmay@gmail.com
Thank YouEmail ID : ilovetanmay@gmail.comCall :+91 9763 716 444
Thanks ToLaura Chappell, RohasNagpal, Microsoft

More Related Content

PPT
Internet Safety
PPTX
Your Internet Safety
DOC
Crj 101 as we enter the last week of the course/tutorialoutlet
PPT
Legalissues
PDF
How Social Media is Changing the Game in Claims Handling
PPTX
September 2014 cyber safety presentation
PPTX
Online Child Enticement
PPTX
Internet safety presentation 2013
Internet Safety
Your Internet Safety
Crj 101 as we enter the last week of the course/tutorialoutlet
Legalissues
How Social Media is Changing the Game in Claims Handling
September 2014 cyber safety presentation
Online Child Enticement
Internet safety presentation 2013

What's hot (20)

PPTX
A Tale of One City
PPTX
Internet safety presentation 2012
PPT
PPTX
Internet Safety for Parents presentation 2017
PPT
How big is your digital footprint fall 2012
PPT
Cohoes Jan 13 Cyberbullying
PPTX
Dangers of Social Media by Alex Berta
PPTX
Internet Safety 2008 Parent Univ
PPT
PDF
PPT
Internet Safety
DOCX
Gloria flores
DOCX
Jonathan cullishpuma
PDF
For kids, Snapchat and Instagram alternative to Facebook
PPTX
Internet safety presentation 2014
PPT
Benefits Of On Line Social Networks (Tin180.com)
DOCX
Jessica guevara
PPT
internet safety 2013
PPTX
Presentation on the optimal usage of facebook
PPT
Becybersmart
A Tale of One City
Internet safety presentation 2012
Internet Safety for Parents presentation 2017
How big is your digital footprint fall 2012
Cohoes Jan 13 Cyberbullying
Dangers of Social Media by Alex Berta
Internet Safety 2008 Parent Univ
Internet Safety
Gloria flores
Jonathan cullishpuma
For kids, Snapchat and Instagram alternative to Facebook
Internet safety presentation 2014
Benefits Of On Line Social Networks (Tin180.com)
Jessica guevara
internet safety 2013
Presentation on the optimal usage of facebook
Becybersmart
Ad

Viewers also liked (20)

PPT
Using Computer Technology to Protect Individuals and Families
PPTX
cyber security & hacking
PPTX
Hacking & cyber Security
KEY
Cybersafety Presentation for Connecting Waters Charter School
PPT
Smart parking 2020 vision
PDF
Learn more a bout movie maker
PDF
Internet kids security for parents and teachers
PPTX
Crazy kids powerpoint presentation
PPTX
Journey powerpoint
PPT
Safetyfor kidspp (1) (1) (1)
PPTX
College Mentors for Kids PowerPoint Presentation
PPS
Dangers Of Internet - Parents Beware
PPT
Invisible Preadators: Hidden Dangers of the Internet
PPT
Food Illness Investigation Web Quest
PPTX
Safe Kids Upstate Internship Powerpoint
PPT
Powerpoint Presentation Teenagers Clothesjudithlaia
PPTX
KIDS ISLAND- A PLAY SCHOOL
PDF
Presentation skills designed for autistic kids teacher
PPT
History of time - PowerPoint presentations for kids
PDF
Road Safety / Highway Safety Tips for Parents and Teachers, How to prevent Ro...
Using Computer Technology to Protect Individuals and Families
cyber security & hacking
Hacking & cyber Security
Cybersafety Presentation for Connecting Waters Charter School
Smart parking 2020 vision
Learn more a bout movie maker
Internet kids security for parents and teachers
Crazy kids powerpoint presentation
Journey powerpoint
Safetyfor kidspp (1) (1) (1)
College Mentors for Kids PowerPoint Presentation
Dangers Of Internet - Parents Beware
Invisible Preadators: Hidden Dangers of the Internet
Food Illness Investigation Web Quest
Safe Kids Upstate Internship Powerpoint
Powerpoint Presentation Teenagers Clothesjudithlaia
KIDS ISLAND- A PLAY SCHOOL
Presentation skills designed for autistic kids teacher
History of time - PowerPoint presentations for kids
Road Safety / Highway Safety Tips for Parents and Teachers, How to prevent Ro...
Ad

Similar to Internet Safety For Kids By Tanmay (20)

PPT
PPT
Youth Internet Safety
PPTX
Protecting our families on the internet
PDF
File000098
PPTX
KidSafe - Parental Training Presentation
PPTX
prt. 1...Online Pedophiles
PPT
Bullying presentation
PPTX
Internet predators:parents clueless?
PPT
Kyle Cyber Bullying
PPT
Kyle Cyber Bullying
PPT
Internetsafety
PPT
Internetsafety
PPTX
Children-safety-online-Presentation.pptx
PPTX
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
PPS
PPT
Internet Safety Meeting New
PPT
Smart And Safe In Cyberspace: Social Networking 101
PPTX
Shasta COE cyberbullying2010
PPTX
Parenting in digital world
PPT
Information Literacy Presentation
Youth Internet Safety
Protecting our families on the internet
File000098
KidSafe - Parental Training Presentation
prt. 1...Online Pedophiles
Bullying presentation
Internet predators:parents clueless?
Kyle Cyber Bullying
Kyle Cyber Bullying
Internetsafety
Internetsafety
Children-safety-online-Presentation.pptx
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
Internet Safety Meeting New
Smart And Safe In Cyberspace: Social Networking 101
Shasta COE cyberbullying2010
Parenting in digital world
Information Literacy Presentation

Recently uploaded (20)

PDF
Chapter 2 Digital Image Fundamentals.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Transforming Manufacturing operations through Intelligent Integrations
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Cloud computing and distributed systems.
PPTX
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Sensors and Actuators in IoT Systems using pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
HCSP-Presales-Campus Network Planning and Design V1.0 Training Material-Witho...
PDF
cuic standard and advanced reporting.pdf
PPTX
MYSQL Presentation for SQL database connectivity
Chapter 2 Digital Image Fundamentals.pdf
Big Data Technologies - Introduction.pptx
NewMind AI Weekly Chronicles - August'25 Week I
NewMind AI Monthly Chronicles - July 2025
Transforming Manufacturing operations through Intelligent Integrations
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Cloud computing and distributed systems.
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Chapter 3 Spatial Domain Image Processing.pdf
Modernizing your data center with Dell and AMD
Sensors and Actuators in IoT Systems using pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Diabetes mellitus diagnosis method based random forest with bat algorithm
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Empathic Computing: Creating Shared Understanding
Spectral efficient network and resource selection model in 5G networks
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
HCSP-Presales-Campus Network Planning and Design V1.0 Training Material-Witho...
cuic standard and advanced reporting.pdf
MYSQL Presentation for SQL database connectivity

Internet Safety For Kids By Tanmay

  • 1. Internet Safety for KidsOnly For Adults Presentation
  • 2. Introduction About MeTanmayDikshitHandwriting AnalysisNCSA CertifiedMaster BrainbenchCertifiedCERTY Certified ProfessionalASCL Certified Cyber Crime Investigator
  • 3. Home Computer Protectionhttp://www.microsoft.com/protectWindows FirewallsAnti-virusSpyware DetectorsSpyware Search and DestroyWindows DefenderIE 7 with Identity Guard / FireFox is less hackable.Don’t install any P2P softwareProtect Wireless Network
  • 4. Detailed Information on your computerOnline : http://www.whatsmyip.org/more/External IPHostnameProxyInternal (LAN) IPAccept LanguageUser AgentScreen ResolutionWho is Lookup (on You)Offline : http://www.pxserver.com/WinAudit.htm
  • 5. Telecom Directory In BSNL Indiahttp://www.bsnl.co.in/map.htm Station Registrar Tel No Registrar Name Registrar AddressTrace Indian Mobile Location & Operatorhttp://trace.bharatiyamobile.com/ Mobile Number Location Signaling Operator
  • 6. Super Researchwww.google.com- General Searchwww.technorati.com- Blogosphere Searchwww.justdial.com- India's No.1 local search engine
  • 7. WarningViewer discretion advisedThis is a disturbing topicThis presentation was NOT designed to be Viewed by children
  • 8. ContentsSample CasesCold Hard Facts about TechnophiliaCyber Child Sex Offender TerminologySix Steps to LuringCyber Child Sex Offender ProfilesMost At-RiskAdvice for ParentsResources
  • 9. Kylie Taylor CaseDetectives said Kylie (14) arranged to meet Sadler through Internet chat rooms and phone calls after she left her foster home.Court documents said Kylie was found in a darkened room with video cameras and restraints where he whipped, sexually assaulted her and chained her to a bed when he left the residence.Stanley Scott Sadler, age 47, has been charged with one count of kidnapping in the first degree, three counts of rape of a child in the third degree, and one count of sexual exploitation of a minor.Kylie was located by her mother and an ad hoc group of volunteer pedophile trackers( www.perverted-justice.com )
  • 10. Sex Solicitation Results in ArrestA 23-year-old Pueblo man is being held in Douglas County Jail after allegedly soliciting sex with children in an Internet chat room. Lenard James Brown was arrested March 4, according to a press release by the Pueblo County Sheriff's Office.In February, Brown allegedly posted a message in a chat room asking parents to arrange for him to meet privately with their children. The children ranged in age from 1 to 14. A person who saw the message notified authorities.
  • 11. S.J. Man Surrenders in Child Sex CaseA former Redwood City middle school teacher turned himself in Tuesday at the Santa Clara County Jail after police seized his home computer and allegedly found child pornography. David Joseph Welsh, who most recently taught at the North Star Academy, was charged with a misdemeanor of possessing child pornography and is being held in lieu of $150,000 bail.
  • 12. Man Delivers Live Rape VideoA local man who went on the Internet and offered live video of himself having sex with a 3-year-old girl is behind bars, police say. Paul A. Kraft has been charged with two counts of rape and one count of pandering sexually oriented material involving a minor.
  • 13. Man Accused of Soliciting a ChildA 53-year-old accountant who bragged on the Web about molesting children all over the country, was charged Thursday with three counts of soliciting sex from a child using the Internet, authorities said. Roy Mason, of 2009 High view Fall Place, was arrested Thursday on an Indiana warrant at his home by the Florida Department of Law Enforcement with help from the Hillsborough County Sheriff's Office, said Mike Duffey, an FDLE computer crimes special agent. Authorities are examining the computer found in Mason’s home.
  • 14. Predator “Shopped” at myspace.comWilliam Warren Greico, 42, first approached the girl after he saw her posting on myspace.com in August. Billing himself as a man named "Tyler,“ the Seminole High School English teacher sent his picture to the girl and a message asking if she'd like to be friends. Detectives arranged a sting after Greico suggested that he and the girl meet at an undisclosed location
  • 15. Fake Orkut profile of schoolgirl postedFebruary 06, 2007 20:07 ISTOrkut seems to have become the new favourite with online mischief makers as yet another case of misuse of the social networking website has come to light with a schoolgirl complaining that her fake profile has been posted on it. The father of the girl, has approached the Cyber Cell of Delhi Police's Economic Offences Wing after the family began receiving vulgar calls. The girl is a student of a South Delhi school.The web page describes the teenager as a "sex teacher" and has obscene photographs and contact details such as her home address and telephone numbers, police said.This is the second incident that has come to light about Orkut misuse in Delhi in less than three weeks. Earlier in February, an air-hostess had moved a court here alleging that someone has opened an account in her name on Orkut wherein she is being described as a "sex struck woman". The teenager's family had received the first call almost a month ago where the caller wanted to speak to the girl. Similar calls poured in later, the police said, adding all the callers referred to Orkut.The family had a harrowing time when two strangers knocked at their door a fortnight ago and told them the girl had invited them for sex through Internet, they added. Police said a case has been registered and investigations were on.http://www.rediff.com/news/2007/feb/06orkut.htm
  • 16. The Perfect VictimIdeal age: 11-14No or little parental involvementNo definite bedtimeCan be away from home without anyone knowing where he/she isHas exclusive use of the computer in a private area
  • 17. Is Your Child’s Information Online?With these three sources available, Names, Addresses,Phone numbers and Dates of Birth are available on almost ANYONE!www.google.comwww.myfamily.comwww.zoominfo.comwww.alltheweb.comwww.zabasearch.comwww.Eliyon.comwww.orkut.comwww.facebook.comhttp://namesdatabase.com
  • 18. Normal Name search on www.google.com
  • 19. Parents don’t let parents let theirkids join Facebook, Orkut, MySpace under 18Arents need to look / Learn about myspace and facebook.Kids don’t think before they post. Once the information is submitted, it’s very hard to take it off.Kids promoting an image that won’t do them any favors.Kids blog too much information.Kids site isn’t set to PrivateVideo Demohttp://www.msnbc.msn.com/id/11064451/
  • 20. Dangers of Chat roomsPrepare your kids just like the real worldAnyone can be anyone on CyberspaceChildren wastes a lot of time chatting instead of doing homeworkParticipants in chat rooms will sometimes attempt to entice children into talking about sex in one form or another.Children can also be in danger of under developing their social skills
  • 21. TechnophiliaTerm defined by Detective James McLaughlin, Keene County Police Department“Persons using the computer to engage insexual deviance”
  • 22. Cyber Child Sex Offender TerminologyTravelers those who manipulate or coerce kids to meet them in person for sexual purposesCollectors those involved in collecting child PornographyManufacturers those who create child pornography on any type of medium (all manufacturers are collectors)Chatters those presenting themselves as trustworthy individuals in chat sessions
  • 23. Six Steps to LuringBased loosely on the MISSING Game available online at www.livewwwires.comJust Like You - BefriendingMaking the offerIncriminating evidenceContact – the “honeymoon phase”Guilt and threats as coercionThe truth emerges
  • 24. GroomersMost Internet luring instances begin with the process of ‘grooming’ – forming a trusting bond with the child. There are several types of groomers including:Romantic groomersAggressive groomersMonetary/status groomers
  • 25. Befriending TechniquesChat room discussionsPortrays same age, same likes, same dislikesPortrays age-typical awkwardnessBegins to share some secretsTelephone - predators will want to talk on the phone. Just to make sure it’s a child talkingEmail - Predator may want the child’s email so they can email them offline, and send them stuff, Fantasy statementsWebcammingVerbal Chat on Internet (Microphone) / Skype
  • 26. Chat Room ToolsMSN MessengerICQ (“I seek you”)AOL Instant MessengerYahoo! Messenger & Yahoo ChatmIRC (many Internet Relay Chat)Google Talk
  • 29. Physical Access is the GoalJohn Evander Couey was a registered sex offender that was living just 150 yards away from Jessica Lunsford’s home.Please check the database of sex offenders in your area. Megan’s Law was signed into federal law on May 17, 1996.Access the Megan’s Law database from www.ncmec.orgwww.fbi.gov/hq/cid/cac/states.htmhttp://www.mshp.dps.mo.gov/CJ38/search.jsp
  • 30. “To Catch a Predator Series”http://www.msnbc.msn.com/id/10912603/
  • 31. US Child Protection LawUnited States CodeTITLE 18 - CRIMES AND CRIMINAL PROCEDUREPART I - CRIMESCHAPTER 110 - SEXUAL EXPLOITATION AND OTHER ABUSE OF CHILDRENSection 2251 Sexual Exploitation Of Children Section 2251A Selling Or Buying Of Children Section 2252 Certain Activities Relating To Material Involving The Sexual Exploitation Of Minors Section 2252A Certain Activities Relating To Material Constituting Or Containing Child Pornography Section 2253 Criminal Forfeiture Section 2254 Civil Forfeiture Section 2255 Civil Remedy For Personal Injuries Section 2256 Definitions For Chapter Section 2257 Record Keeping Requirements Section 2258 Failure To Report Child Abuse Section 2259 Mandatory Restitution Section 2260 Production Of Sexually Explicit Depictions Of A Minor For Importation Into The United States
  • 32. Pornography In IndiaSection 67 of IT ActPublishing of information which is obscene in electronic form.Publishing, transmitting, causing to be published Porn in the electronic formStrict Punishment5 years jail (SI or RI) + 1 lakh fine10 years jail (SI or RI) + 2 lakh finehttp://www.vakilno1.com/bareacts/informationtechnologyact/s67.htm
  • 33. General Internet Safety TipsPlace the computer in a central location in the home, not in the kid’s room.Learn who your kids are chatting with online (take the “don’t talk to strangers” message into the digital world).Define your personal standard regarding your child’s privacy.Become familiar with chatting and search tools used by your kids.
  • 34. Advice for Parents Detective James McLaughlin,Child Sexual Abuse and Exploitation, Keene Police DepartmentKnow who is most “at risk.”Set up an agreement with your child about computer use (hours, access to chat lines, revealing personal information/photographs)Don’t rely solely on software to block/filter content.Let your child know that reporting unwanted or suspicious solicitations won’t lead to restrictions on computer use.Know that restricting communications to a specific list of friends may not guarantee safe communications.Be aware of restrictions at other computer locations – school, library, friends’ homes.Look for the warning signs of offender manipulation – secretive behavior, histories being deleted, unexplained telephone charges, hang-up calls, unexpected mail, indications that the home is under surveillance.Know how to monitor Internet use in a variety of ways.
  • 35. Monitoring and Restricting Internet UseInternet Explorer’s Content AdvisorContent Protect, NetNanny, CYBERsitter, CyberPatrol, Cyber Sentinel, FilterPak, Cyber Snoop, etc.Single PasswordCache and history
  • 36. Parental ResourcesOften focusing on a particular age group with the following typical grade groupings:K-3 Children (age 6-9)4-8 Kids (age 10-14)9-12 Youth (age 15-18)
  • 39. What To Do NowDownload and review the presentation material available online atEducate your kids on this issueEmail [email protected] If you have additional resourcesRegister for and take the online course“Advanced Internet Research and Intelligence” at www.htcia.org – use the techniques to perform reconnaissance on your child
  • 40. What To Do NowTalking openly with your children about Internet luring and the need to avoid sharing personal information online may help keep them safe online.We hope you use this information and the materials provided to educate others at school meetings, church gatherings, community center meetings, etc.We are interested in your feedback and resource information.Contact us directly at [email protected]
  • 41. Thank YouEmail ID : [email protected] :+91 9763 716 444
  • 42. Thanks ToLaura Chappell, RohasNagpal, Microsoft