Cyber Predators Who are cyber predators? Cyber predators are people who use the Internet for the sole purpose of finding victims to inflict harm. Cyber predators can be any age and either sex. Cyber predators use a technique called grooming to allure their victims. Grooming is a very purposeful, methodic and patient process cloaked in kindness and empathy. Ofir’s story •Very techsavvy •Frequent chat room visitor •Came from a close family Ofir’s story Ofir was 16-year-old who met a 20-yearold girl online. They developed an online friendship. The relationship moved from chat rooms to e-mail, IM, and talking regularly on the telephone. His cyberfriend even sent him her photo in an email. Sensing an opportunity to develop a genuine friendship, Ofir decided to go to the movies with his new “cyber friend” so that they could get to know each other offline. The young woman met him as planned. What Ofir didn’t know is that he had been set up. He was ambushed, shot and killed– a victim of a hate crime. Ofir’s case shows that… Boys are as likely as girls to be targeted by predators. Predators don’t care about the sex of their victim. They are just looking for victims. Predators take advantage of the natural curiosity of children. http://www.tubechop.com/watch/65332 http://www.youtube.com/watch?v=scggT_Yt5wE&NR=1 The Grooming process S.I.T.S. SIMILAR INTERESTS TRUST SECRECY The grooming process: Stage one Non-threatening, friendly, comforting, familiar Systematically pretends to have common interests Disguises true identify and motive Collects information about the child from profile and chat room conversations The Grooming Process: Step two Supports child’s point of view regarding conflicts Systematically exploits family, school , and/or social friction Acts like the only person who understands the child Becomes a chat and IM “buddy” The Grooming Process: Step three: Establishes secrecy Exchange of e-mail, addresses and phone numbers Parents are kept in the dark Adult-oriented materials and language use Child encourage to get secret account or to delete chat information because “no one” will understand their relationship The Grooming Process: Step four Erodes barriers Frequent adult-oriented conversations Adult “experiences” encouraged(may request suggestive pictures of child) Natural curiosity of child exploited Personal inhibitions desensitized The Grooming Process: Step five Direct intimidation Child’s emotional distance from parents increasing Can be blackmailed easily Threats of violence or public humiliation Child feels increasingly powerless Final stage: Face to face meeting Not all predators use the entire grooming process Juveniles make 48% of aggressive solicitations Females make 25% of aggressive solicitations Often times victims meet the predator willingly Where grooming starts: Grooming Instant messages 83% Solicitations in chat rooms 17% Who visits chat rooms? According to a 2003-2004 survey by I-Safe of over 18,000 students: Who posts photos online? According to a 2003-2004 survey by I-Safe of over 18,000 students: So what are the signs that parents should look for? A child that no longer communicates to their parents what they are doing online Minimizing of screens when parent is in room Unexplained phone calls and absences A child who feels his/her online friends understand him/her better than anyone else Tips for parents Keep the computer in a common area(not in the child’s room) Know your child’s passwords Establish an AUP(Acceptable Use Policy) for what is acceptable online behavior Know all of the people on your child’s contact information(friends list) Identifying information must be kept private Insist that all solicitations must be reported to an adult If your child comes to you with a solicitations, do not blame the child for this. Kids often don’t tell their parents what they are doing online because they are afraid that they will have certain privileges taken away. They have to know when they make reports that it is the appropriate thing to do and that it is the PREDATOR who was wrong.
© Copyright 2024