A Parent's Guide to Internet Safety written by the FBI

http://tinyurl.com/7optotk
A Parent's Guide to Internet Safety written by the FBI


original text from:
http://www.fbi.gov/stats-services/publications/parent-guide/parent-guide


Dear Parent:
Our children are our nation's most valuable asset. They represent the bright future of our country and hold our hopes for a better nation. Our children are also the most vulnerable members of society. Protecting our children against the fear of crime and from becoming victims of crime must be a national priority.
Unfortunately the same advances in computer and telecommunication technology that allow our children to reach out to new sources of knowledge and cultural experiences are also leaving them vulnerable to exploitation and harm by computer-sex offenders.
I hope that this pamphlet helps you to begin to understand the complexities of online child exploitation. For further information, please contact your local FBI office or theNational Center for Missing and Exploited Children at 1-800-843-5678.
Louis J. Freeh, Former Director
Federal Bureau of Investigation
On-line Caution - Browsers and Search EnginesIntroduction
While on-line computer exploration opens a world of possibilities for children, expanding their horizons and exposing them to different cultures and ways of life, they can be exposed to dangers as they hit the road exploring the information highway. There are individuals who attempt to sexually exploit children through the use of on-line services and the Internet. Some of these individuals gradually seduce their targets through the use of attention, affection, kindness, and even gifts. These individuals are often willing to devote considerable amounts of time, money, and energy in this process. They listen to and empathize with the problems of children. They will be aware of the latest music, hobbies, and interests of children. These individuals attempt to gradually lower children's inhibitions by slowly introducing sexual context and content into their conversations.
There are other individuals, however, who immediately engage in sexually explicit conversation with children. Some offenders primarily collect and trade child-pornographic images, while others seek face-to-face meetings with children via on-line contacts. It is important for parents to understand that children can be indirectly victimized through conversation, i.e. "chat," as well as the transfer of sexually explicit information and material. Computer-sex offenders may also be evaluating children they come in contact with on-line for future face-to-face contact and direct victimization. Parents and children should remember that a computer-sex offender can be any age or sex the person does not have to fit the caricature of a dirty, unkempt, older man wearing a raincoat to be someone who could harm a child.
Children, especially adolescents, are sometimes interested in and curious about sexuality and sexually explicit material. They may be moving away from the total control of parents and seeking to establish new relationships outside their family. Because they may be curious, children/adolescents sometimes use their on-line access to actively seek out such materials and individuals. Sex offenders targeting children will use and exploit these characteristics and needs. Some adolescent children may also be attracted to and lured by on-line offenders closer to their age who, although not technically child molesters, may be dangerous. Nevertheless, they have been seduced and manipulated by a clever offender and do not fully understand or recognize the potential danger of these contacts.
This guide was prepared from actual investigations involving child victims, as well as investigations where law enforcement officers posed as children. Further information on protecting your child on-line may be found in the National Center for Missing and Exploited Children's Child Safety on the Information Highway and Teen Safety on the Information Highway pamphlets.
What Are Signs That Your Child Might Be At Risk On-line?
Your child spends large amounts of time on-line, especially at night.
Most children that fall victim to computer-sex offenders spend large amounts of time on-line, particularly in chat rooms. They may go on-line after dinner and on the weekends. They may be latchkey kids whose parents have told them to stay at home after school. They go on-line to chat with friends, make new friends, pass time, and sometimes look for sexually explicit information. While much of the knowledge and experience gained may be valuable, parents should consider monitoring the amount of time spent on-line.
Children on-line are at the greatest risk during the evening hours. While offenders are on-line around the clock, most work during the day and spend their evenings on-line trying to locate and lure children or seeking pornography.
You find pornography on your child's computer.
Pornography is often used in the sexual victimization of children. Sex offenders often supply their potential victims with pornography as a means of opening sexual discussions and for seduction. Child pornography may be used to show the child victim that sex between children and adults is "normal." Parents should be conscious of the fact that a child may hide the pornographic files on diskettes from them. This may be especially true if the computer is used by other family members.
Your child receives phone calls from men you don't know or is making calls, sometimes long distance, to numbers you don't recognize.Drawing - Telephone
While talking to a child victim on-line is a thrill for a computer-sex offender, it can be very cumbersome. Most want to talk to the children on the telephone. They often engage in "phone sex" with the children and often seek to set up an actual meeting for real sex.
While a child may be hesitant to give out his/her home phone number, the computer-sex offenders will give out theirs. With Caller ID, they can readily find out the child's phone number. Some computer-sex offenders have even obtained toll-free 800 numbers, so that their potential victims can call them without their parents finding out. Others will tell the child to call collect. Both of these methods result in the computer-sex offender being able to find out the child's phone number.
Your child receives mail, gifts, or packages from someone you don't know.
As part of the seduction process, it is common for offenders to send letters, photographs, and all manner of gifts to their potential victims. Computer-sex offenders have even sent plane tickets in order for the child to travel across the country to meet them.
Your child turns the computer monitor off or quickly changes the screen on the monitor when you come into the room.
A child looking at pornographic images or having sexually explicit conversations does not want you to see it on the screen.
Your child becomes withdrawn from the family.
Computer-sex offenders will work very hard at driving a wedge between a child and their family or at exploiting their relationship. They will accentuate any minor problems at home that the child might have. Children may also become withdrawn after sexual victimization.
Your child is using an on-line account belonging to someone else.
Even if you don't subscribe to an on-line service or Internet service, your child may meet an offender while on-line at a friend's house or the library. Most computers come preloaded with on-line and/or Internet software. Computer-sex offenders will sometimes provide potential victims with a computer account for communications with them.
What Should You Do If You Suspect Your Child Is Communicating With A Sexual Predator Online?
  • Consider talking openly with your child about your suspicions. Tell them about the dangers of computer-sex offenders.
  • Review what is on your child's computer. If you don't know how, ask a friend, coworker, relative, or other knowledgeable person. Pornography or any kind of sexual communication can be a warning sign.
  • Use the Caller ID service to determine who is calling your child. Most telephone companies that offer Caller ID also offer a service that allows you to block your number from appearing on someone else's Caller ID. Telephone companies also offer an additional service feature that rejects incoming calls that you block. This rejection feature prevents computer-sex offenders or anyone else from calling your home anonymously.
  • Devices can be purchased that show telephone numbers that have been dialed from your home phone. Additionally, the last number called from your home phone can be retrieved provided that the telephone is equipped with a redial feature. You will also need a telephone pager to complete this retrieval.
  • This is done using a numeric-display pager and another phone that is on the same line as the first phone with the redial feature. Using the two phones and the pager, a call is placed from the second phone to the pager. When the paging terminal beeps for you to enter a telephone number, you press the redial button on the first (or suspect) phone. The last number called from that phone will then be displayed on the pager.
  • Monitor your child's access to all types of live electronic communications (i.e., chat rooms, instant messages, Internet Relay Chat, etc.), and monitor your child's e-mail. Computer-sex offenders almost always meet potential victims via chat rooms. After meeting a child on-line, they will continue to communicate electronically often via e-mail.
Should any of the following situations arise in your household, via the Internet or on-line service, you should immediately contact your local or state law enforcement agency, the FBI, and the National Center for Missing and Exploited Children:
  1. Your child or anyone in the household has received child pornography;
  2. Your child has been sexually solicited by someone who knows that your child is under 18 years of age;
  3. Your child has received sexually explicit images from someone that knows your child is under the age of 18.
If one of these scenarios occurs, keep the computer turned off in order to preserve any evidence for future law enforcement use. Unless directed to do so by the law enforcement agency, you should not attempt to copy any of the images and/or text found on the computer.
What Can You Do To Minimize The Chances Of An On-line Exploiter Victimizing Your Child?
  • Communicate, and talk to your child about sexual victimization and potential on-line danger.
  • Spend time with your children on-line. Have them teach you about their favorite on-line destinations.
  • Keep the computer in a common room in the house, not in your child's bedroom. It is much more difficult for a computer-sex offender to communicate with a child when the computer screen is visible to a parent or another member of the household.
  • Utilize parental controls provided by your service provider and/or blocking software. While electronic chat can be a great place for children to make new friends and discuss various topics of interest, it is also prowled by computer-sex offenders. Use of chat rooms, in particular, should be heavily monitored. While parents should utilize these mechanisms, they should not totally rely on them.
  • Always maintain access to your child's on-line account and randomly check his/her e-mail. Be aware that your child could be contacted through the U.S. Mail. Be up front with your child about your access and reasons why.
  • Teach your child the responsible use of the resources on-line. There is much more to the on-line experience than chat rooms.
  • Find out what computer safeguards are utilized by your child's school, the public library, and at the homes of your child's friends. These are all places, outside your normal supervision, where your child could encounter an on-line predator.
  • Understand, even if your child was a willing participant in any form of sexual exploitation, that he/she is not at fault and is the victim. The offender always bears the complete responsibility for his or her actions.
  • Instruct your children: 
      • to never arrange a face-to-face meeting with someone they met on- line;
      • to never upload (post) pictures of themselves onto the Internet or on-line service to people they do not personally know;
      • to never give out identifying information such as their name, home address, school name, or telephone number;
      • to never download pictures from an unknown source, as there is a good chance there could be sexually explicit images;
      • to never respond to messages or bulletin board postings that are suggestive, obscene, belligerent, or harassing;
      • that whatever they are told on-line may or may not be true.
Frequently Asked Questions:
My child has received an e-mail advertising for a pornographic website, what should I do?
Generally, advertising for an adult, pornographic website that is sent to an e-mail address does not violate federal law or the current laws of most states. In some states it may be a violation of law if the sender knows the recipient is under the age of 18. Such advertising can be reported to your service provider and, if known, the service provider of the originator. It can also be reported to your state and federal legislators, so they can be made aware of the extent of the problem.
Is any service safer than the others?
Sex offenders have contacted children via most of the major on-line services and the Internet. The most important factors in keeping your child safe on-line are the utilization of appropriate blocking software and/or parental controls, along with open, honest discussions with your child, monitoring his/her on-line activity, and following the tips in this pamphlet.
Should I just forbid my child from going on-line?
There are dangers in every part of our society. By educating your children to these dangers and taking appropriate steps to protect them, they can benefit from the wealth of information now available on-line.
Helpful Definitions:
Internet - An immense, global network that connects computers via telephone lines and/or fiber networks to storehouses of electronic information. With only a computer, a modem, a telephone line and a service provider, people from all over the world can communicate and share information with little more than a few keystrokes.
Bulletin Board Systems (BBSs) - Electronic networks of computers that are connected by a central computer setup and operated by a system administrator or operator and are distinguishable from the Internet by their "dial-up" accessibility. BBS users link their individual computers to the central BBS computer by a modem which allows them to post messages, read messages left by others, trade information, or hold direct conversations. Access to a BBS can, and often is, privileged and limited to those users who have access privileges granted by the systems operator.
Commercial On-line Service (COS) - Examples of COSs are America Online, Prodigy, CompuServe and Microsoft Network, which provide access to their service for a fee. COSs generally offer limited access to the Internet as part of their total service package.
Internet Service Provider (ISP) - Examples of ISPs are Erols, Concentric and Netcom. These services offer direct, full access to the Internet at a flat, monthly rate and often provide electronic-mail service for their customers. ISPs often provide space on their servers for their customers to maintain World Wide Web (WWW) sites. Not all ISPs are commercial enterprises. Educational, governmental and nonprofit organizations also provide Internet access to their members.
Public Chat Rooms - Created, maintained, listed and monitored by the COS and other public domain systems such as Internet Relay Chat. A number of customers can be in the public chat rooms at any given time, which are monitored for illegal activity and even appropriate language by systems operators (SYSOP). Some public chat rooms are monitored more frequently than others, depending on the COS and the type of chat room. Violators can be reported to the administrators of the system (at America On-line they are referred to as terms of service [TOS]) which can revoke user privileges. The public chat rooms usually cover a broad range of topics such as entertainment, sports, game rooms, children only, etc.
Electronic Mail (E-Mail) - A function of BBSs, COSs and ISPs which provides for the transmission of messages and files between computers over a communications network similar to mailing a letter via the postal service. E-mail is stored on a server, where it will remain until the addressee retrieves it. Anonymity can be maintained by the sender by predetermining what the receiver will see as the "from" address. Another way to conceal one's identity is to use an "anonymous remailer," which is a service that allows the user to send an e-mail message repackaged under the remailer's own header, stripping off the originator's name completely.
Chat - Real-time text conversation between users in a chat room with no expectation of privacy. All chat conversation is accessible by all individuals in the chat room while the conversation is taking place.
Instant Messages - Private, real-time text conversation between two users in a chat room.
Internet Relay Chat (IRC) - Real-time text conversation similar to public and/or private chat rooms on COS.
Usenet (Newsgroups) - Like a giant, cork bulletin board where users post messages and information. Each posting is like an open letter and is capable of having attachments, such as graphic image files (GIFs). Anyone accessing the newsgroup can read the postings, take copies of posted items, or post responses. Each newsgroup can hold thousands of postings. Currently, there are over 29,000 public newsgroups and that number is growing daily. Newsgroups are both public and/or private. There is no listing of private newsgroups. A user of private newsgroups has to be invited into the newsgroup and be provided with the newsgroup's address.


Federal Bureau of Investigation
Cyber Division
Innocent Images National Initiative
11700 Beltsville Drive
Calverton, MD 20705


Contact your local FBI office for further information
original text from:


FEMALE BULLYING: A look at the fastest growing social disease both online and in person

Women bullying women
FEMALE BULLYING












A look at the fastest growing social disease both online and in person 
  • By Rachel Giese
  •  
  • August 16, 2010

  • The scene was like something from The Hills. Dana Lacey, a 26-year-old writer, was at a Toronto bar with a group of friends, including her roommate—who happens to be a guy—and his new girlfriend. At one point, Lacey noticed the girlfriend and her friend were staring at her, giggling and playing with their phones. Later, Lacey found out the two women had been texting each other and making fun of how she was dressed. This wasn’t the first time the girlfriend had been snarky with Lacey. “When they first started going out, I had invited her to dinner to make her feel welcome,” Lacey says. “But my best attempts couldn’t charm her. 

    Eventually, the girlfriend’s behaviour—which was triggered, Lacey thinks, by jealousy—got so bad that it ruined Lacey’s friendship with her roommate. He chose the girlfriend over her and Lacey decided she was too old to deal with that kind of toxic environment. 

    Unfortunately, while most women believe they would never be the cause of loading such emotional stress on a friend or acquaintance, nothing could be further from the truth. In fact, many of us never really outgrow being a bully, says Cheryl Dellasega, a women’s studies professor at Pennsylvania State University and author of the book Mean Girls Grown Up. “The [aggressive] behaviour just gets a little more polished and subtle [as we get older].” You know the transformation: The cool girl in chemistry class who didn’t invite you to her post-graduation party becomes the office diva who “forgets” to forward you an important email at work. The fair-weather friend who flirted with your first crush turns into the frenemy who won’t keep her manicured mitts off your fiancé. 

    “Bullying isn’t uniquely female,” says Irene Levine, author of Best Friends Forever: Surviving A Breakup With Your Best Friend and professor of psychiatry at the New York University School of Medicine. “But there are always women who need to build themselves up by knocking others down. They may exclude, gossip, or do other things to demean one individual—particularly someone who seems vulnerable. Making someone feel alone, rejected and treating her as an outcast can be as vicious as a physical assault.” 

    What makes these encounters with a female bully so confusing and wounding is the very nature of women’s relationships. While men tend to bond by activities—grabbing a beer after a game of hockey, for example—women look for emotional intimacy from their female friends. We talk, we share, we open our hearts. And so the quickest way to hurt each other is by what experts call “relational aggression.” The female bully doesn’t use her fists; instead, she denies other women a social connection by mocking or shunning them. “For women and girls, relationships are a source of solace and power,” says Rachel Simmons, an expert on female aggression and the author of The Curse of the Good Girl: Raising Authentic Girls with Courage and Confidence. “Female friendships are one of the greatest comforts and the greatest weapons. The heart of female psychological violence is to destroy other people’s relationships.” 

    Meanwhile, technology such as smartphones, Twitter and Facebook has added a whole new supply of smart bombs to the female bully’s arsenal. Social media plugs right into women’s anxiety about direct conflict, says Simmons. “A tweet or a text allows us to communicate without having to look each other in the eyes. And with so much emotion bottled up, you can let it rip and say things you wouldn’t dare if you were dealing with a person face-to-face.” No wonder women are such social media fans, outtweeting and out-friending men by 10 percent, shows a recent online study. 

    Consider, too, the sharkfest that is celebrity gossip culture, from tabloid magazines to TV shows and harsh blogs. The target audience for this—and the targets of its mean-spiritedness—is predominantly women. Sure, male stars get their share of ridicule, but mainly it’s the Kardashians and their love lives, Heidi Montag and her plastic surgeries, or the ongoing Chernobyl-like meltdown of Lindsay Lohan. That this is happening at precisely the same time that women have more opportunities, power and freedom than ever before is no coincidence, says Simmons. “Young women are a lot more open now about expressing their appetites for sex, food and fun,” Simmons says. “The reason there is so much anxiety and ambivalence toward them is because they violate conventional rules of feminity.” There’s not that much difference between trashing Miley Cyrus for a risqué stage performance, she says, and shaming a girl in your dorm, office or circle of friends for being promiscuous. 

    So, after all these years of feminist triumphs, is sisterhood dead? Have we achieved success at school, at work, in academics, politics and sports, only to become our own worst enemies? Not so, says Dellasega. Women have had to be tough to get ahead, she says, and in some cases, particularly in the traditional male workplace, they’ve mistaken aggressiveness for assertiveness. 

    “Female Bullying” has been edited for FLARE.com; the complete story, “Bullied.” appears in the September issue of FLARE magazine.

    Websites about Bullying

    Bullying Canada

    Child Abuse Cast a Shadow the Length of a Lifetime Herbert Ward

    Abuse 4.gif




    What Is Abuse?

    Relationship Abuse
    I was just speaking to some one on Twitter about some abuse that she had gone through. Our conversation made me want to post something about different types of abuse--if you are in any type of abusive relationship, please seek help.

    Article from Edmonton Police Services 

    Abuse is an attempt to control the behaviour of another person. It is a misuse of power which uses the bonds of intimacy, trust and dependency to make the victim vulnerable. 

    Physical 
    abuse includes pushing, shoving, slapping, kicking, punching, hitting, spitting, pinching, pulling hair, choking, throwing things, hitting victims with an object, and using or threatening to use a weapon.
    Sexual abuse is forced unwanted sex, demanding the partner wear more (or less) provocative clothing; forced sex in any form; insisting the partner act out fantasies, and denial of the partner’s sexuality.
    Verbal abuse is a form of abusive behaviour involving the use of language (criticizing, name-calling, put downs threatening, blaming). It differs from profanity in that it can occur without the use of expletives. Verbal abuse is a pattern of behaviour that can seriously interfere with one’s positive emotional development and over time, can lead to significant detriment to one’s self-esteem, emotional well-being and physical state. Verbal abuse, although not visibly apparent, is damaging nonetheless.
    Financial abuse occurs when you are not allowed to have money or any control over money. This could include running up large debts in your name or selling your possessions without permission. Your partner may keep you accountable for any money spent, approving or disapproving of your spending. It could also mean you are not allowed to have a job so you are dependent on your partner for money and survival.
    Isolation occurs when you are isolated from your family, friends, and community as a way for your partner to stay in control. Your partner may be extremely jealous of any contacts you have, forbid you to have contact with anyone, or monitor your phone calls, mail or daily activities. Sometimes your partner may use intimidation or threats to control you. You may have to be accountable for your time away or have to make excuses for leaving the home. You may have to communicate secretly when your partner is absent.
    Emotional/psychological abuse can cause anxiety and depression and cause you to withdraw from everyone or everything around you. Examples of this type of abuse include insulting your family or friends, ridiculing your beliefs, race or religion, using constant put downs, threatening suicide if you leave, keeping you prisoner in your home, threatening to take the children if you leave and threatening to have you deported.

    Don't Give Up and Don't Stop Fighting

    This brings up a great point---even faced with an attacker, don't give up and don't stop fighting. You have the right to fight and survive. You have the right to thrive in life and no one has the right to take that away from you or your family. You are an important part of a "community". Community is; your family (being a mother, daughter, aunt, sister, grandmother...etc.), 
    your work/job (employee, employer), your friends, your neighbors, your community (where you live and how you effect others around you in the different roles you have)...etc
















    Images: http://tinyurl.com/6nwdrre and 
    http://robert-craven.blogspot.ca/2010/01/poor-dennis-story.html