Internet predator tracker v4


Published on

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Internet predator tracker v4

  1. 1. Internet predator tracker<br />
  2. 2. Copyright<br />All material in this presentation is Copyright 2011 by Joseph Seanor and IPT LLC.<br />Any reproduction in physical or electronic format is not allowed without the written permission of Joseph Seanor.<br />If you wish to use this information in a presentation of your own, or in other materials, please contact me at:<br />
  3. 3. Mission<br />Internet Predator Tracker is dedicated to providing tools, training, and consulting to the public and law enforcement to assist in the protection of our children on the Internet.<br />
  4. 4. What does IPT do?<br />Internet Predator Tracker, or IPT, has dedicated their work to providing software that allows investigators and law enforcement to collect evidence in a secure manner about online predators and pedophiles.<br />We also provide software to the public in order to allow them to report suspected predators and pedophiles.<br />
  5. 5. What does IPT do?<br />IPT provides training in the form of classes, both online and in-person, on how to use these tools, collecting evidence, tracking on the internet and more.<br />The goal is to provide the tools and training for FREE to the public and law enforcement.<br />
  6. 6. Who is IPT?<br />Internet Predator Tracker was founded by Joe Seanor, who leads the organization and development.<br />Max Fortuna acts as Project Manager for the effort.<br />Daisy Saenz, Assistant Director and investigator.<br />We also have investigators around the country who donate their time to helping out.<br />
  7. 7. Joe Seanor <br />10 years Central Intelligence Agency, CIC/CNC<br />Department of Justice Telecom Security Staff<br />Private Investigator for 14 years<br />7 years America Online’s Senior Investigator for Computer Crime<br />Learning Tree Instructor on: IDS, Firewalls, Windows Security.<br />Author of 15 books on computers, cybercrime and more<br />Founder of the PI Mall<br />Developer of Security-Bot<br />Developer of Internet Predator Tracker software<br />CBS radio national correspondent<br />2 patents pending<br />CISSP, CEH, CET, NSA IAM<br />Developer of Internet Predator Tracker<br />
  8. 8. What can I do?<br />YOU are the most important part of this work.<br />Without YOU involved, there is very little that can be done.<br />The latest set of tools we have released allows anyone to be able to report suspected predators and pedophiles.<br />So YOU really are our best source of information!<br />
  9. 9. Wait..isn’t this Police work?<br />We work closely with local and federal law enforcement and district attorney’s.<br />The information that is collected with the tools that I have developed is only information.<br />Once we get a report, we contact our local police and DA.<br />We then let law enforcement take over the case.<br />
  10. 10. Law Enforcement<br />So, yes, it is the job of Law Enforcement to investigate, capture and prosecute these predators and pedophiles.<br />But, the only way they can know is by someone, maybe you, reporting the suspected predator or pedophile.<br />So, YOU are the most important part of this work!<br />
  11. 11. IPT Website<br />The main website for IPT is at: <br /><br />We also have numerous sites on web2.0 websites and social networks.<br />
  12. 12. IPT Software<br />The first software developed by Joe Seanor was Internet Predator Tracker.<br />This is a complete solution for investigators and law enforcement to conduct online undercover investigations against online predators and pedophiles.<br />The evidence is collected into a database that is secure and encrypted in order to protect the evidence.<br />
  13. 13. IPT Software<br />The original IPT software is only available to law enforcement.<br />And selected, hand picked, hand trained investigators.<br />
  14. 14. IPT Public Software<br />I am PROUD to announce that IPT has published the ONLY tools for the public to use in order to report suspected online predators and pedophiles.<br />And all of the software is FREE!!<br />You can download the software from the IPT website, and multiple locations on the web.<br />
  15. 15. IPT Public Software<br />We are the ONLY source of predator and pedophile reporting for:<br />Internet Explorer<br />Firefox<br />Google Chrome<br />Safari<br />Opera<br />Outlook<br />Thunderbird<br />ALL FREE!!!<br />
  16. 16. IPT Public Software<br />Well, when I designed the software, I wanted all of the versions to work the same, so if you learned one, you could use any of them.<br />Also, I made it as easy to use as possible, so everyone would use it.<br />Each extension for the browsers follow this same process for collecting evidence.<br />
  17. 17. IPT Public Software<br />Once you click the Report button:<br />An HTML copy of the site is made.<br />No images are saved or uploaded.<br />A MD5 checksum is created (this protects the evidence.)<br />The file is uploaded to the IPT secure server<br />An email is opened that contains the information about the file that was uploaded and your email address.<br />You just click send!<br />
  18. 18. Internet Explorer<br />Due to the way that IE deals with extensions, the Pedophile Reporter extension uses an installation program.<br />Once you download the program, just double click on the setup program to begin the installation.<br />
  19. 19. Internet Explorer<br />Now you will see<br />
  20. 20. Internet Explorer<br />Continue the install, and be sure to accept the license agreement. When you get to the installation folder, please do not change that location.<br />
  21. 21. Internet Explorer<br />The installation will continue like any normal windows install program. And at the end you will see:<br />
  22. 22. Internet Explorer<br />Now that you have installed the Pedophile reporter, you will find it located on your Internet Explorer menu bar<br />
  23. 23. Firefox<br />
  24. 24. Firefox<br />
  25. 25. Firefox<br />You can go in and configure the options for the extension by clicking on Tools and then Add-ons.<br />Once you do, just click on the Options button under the name of the extension.<br />
  26. 26. Firefox options<br />
  27. 27. Google Chrome<br />
  28. 28. Google Chrome<br />Make sure to start Google Chrome and then just go to:<br />In order to install the Pedophile reporter extension for Google Chrome, just google “Google Chrome report pedophile”<br />The first link will be for the Chrome Web Store, click on that link and you will end up at the Chrome Web store for Report Pedophile.<br />
  29. 29. Google Chrome<br />
  30. 30. Google Chrome<br />Now, all you have to do is click on Install.<br />Chrome will not install the extension for you.<br />Once it is completed, the options window will open up so you can choose the email program you use and the email address where you want a copy of the email sent.<br />Then just click save/close on the options window.<br />
  31. 31. Google Chrome<br />
  32. 32. Safari<br />Safari is the browser from Apple, and runs on both the Macintosh and PC.<br />In order to install the extension using the Safari browser, just go to:<br /><br />Click on the tab called Software<br />Choose Safari extension<br />Then click either the English or Spanish version of the software.<br />
  33. 33. Safari<br />Once you click on the download link, you will see the following window.<br />Just click on Open<br />
  34. 34. Safari<br />You will then be prompted with the following window, choose Install.<br />
  35. 35. Safari<br />The extension will be installed, and you will see Safari, now look like this:<br />
  36. 36. Safari<br />Once it is completed, the options window will open up so you can choose the email program you use and the email address where you want a copy of the email sent.<br />Then just click save/close on the options window.<br />
  37. 37. Email Reporting<br />To use the Outlook and Thunderbird plug-ins, just right click on the suspected email in your inbox and the program will collect the header information and email.<br />You just click send and it arrives at our IPT servers.<br />So, lets see how to install it.<br />
  38. 38. Thunderbird <br />In order to install the Pedophile reporter for Thunderbird, just google “thunderbird extensions pedophile reporter”<br />The first choice will take you to the Mozilla Thunderbird page.<br />All you have to do is click on the Download Now button.<br />
  39. 39. Thunderbird<br />
  40. 40. Thunderbird<br />Now you will see the file save window.<br />Click and save the file to your Desktop.<br />
  41. 41. Thunderbird<br />Now, with the extension installed, you will want to startup Thunderbird.<br />Once started, just click on Tools<br />Choose Add-on’s<br />Click on the Install button and choose the pedophile reporter file you just downloaded to your desktop.<br />
  42. 42. Thunderbird<br />
  43. 43. Thunderbird<br />Once you click on Install and double-click on the file that you saved to your desktop.<br />You will then see the following window <br />
  44. 44. Thunderbird<br />Once you click Install, the extension will be installed.<br />You will then need to click on the Restart Thunderbird, and the extension will now be active.<br />In order to use the extension, just right click on the suspected email in the Inbox, and choose Pedophile Alerter.<br />
  45. 45. Thunderbird<br />
  46. 46. Email Report<br />
  47. 47. Email Report<br />Now, you will see the email that contains the headers and body from the suspected email.<br />You will also have the option to choose either “suspected predator” or “suspected pedophile”<br />All you have to do now is click Send, and the report, containing the headers and body from the suspected email will be sent to the IPT server.<br />
  48. 48. Outlook<br />As the largest email program on the market, it was only natural that we develop a add-on for Outlook.<br />However, Outlook is not as easy to add things to like Thunderbird is.<br />In order to have the extension added to Outlook, you will run an install program.<br />
  49. 49. Outlook<br />Once you download the file, just double-click on the pedophile alerter setup program.<br />
  50. 50. Outlook<br />Once started, you will walk through a standard windows installation program.<br />
  51. 51. Outlook<br />After you accept the installation agreement, you will be presented with the folder location.<br />Please do not change the location of the files.<br />Once the files are installed you will see <br />
  52. 52. Outlook<br />Once you click close, you will be presented with the following screen.<br />Just fill out the information, this is where the copy of the email will be sent.<br />
  53. 53. Outlook<br />In order to use the plug-in, you just need to right-click on the suspected email, and choose Pedophile Alert.<br />
  54. 54. Outlook<br />Now, you will get the choice of the subject<br />
  55. 55. Outlook<br />
  56. 56. Outlook<br />You will then see the email that is to be sent. <br />The email contains al of the information about the suspected email that is needed to track the sender down.<br />All you have to do is click Send, and the email and information will be delivered to the IPT server.<br />
  57. 57. Android Pedophile Reporter!<br />YES!!!!<br />I’ve done it again!<br />I now have a version of the Pedophile Reporter for your Android phone!<br />Starting next week, you will be able to download the Android App from the Android Marketplace for FREE!!<br />
  58. 58. Android Pedophile Reporter!<br />K9PR is the name of the Android App<br />It is a copy of the K-9 email program, but it has been modified to allow you to report any emails from predators or pedophiles.<br />It works just like any normal email program on the Android phone, but it allows you to report emails to our servers.<br />
  59. 59. Android Pedophile Reporter!<br />When you receive an email from a suspected predator or suspected pedophile, just choose Options<br />Then choose More<br />Then choose Pedophile Reporter<br />
  60. 60. Android Pedophile Reporter!<br />When you choose the option of Pedophile Reporter, the program will pull all of the original email headers and place them into a new email<br />This new email will be addressed to our servers, and all you have to do is click Send.<br />
  61. 61. iPhone Pedophile Reporter<br />I am currently in development of the iPhone version.<br />When it is ready, I will send an email out to the beta testers group.<br />
  62. 62. What happens with a report?<br />Once a report is sent in, an email alert is sent directly to me so that I can check the report.<br />The email will have the data I need in order to find out what type of report this is.<br />The email contains the MD5 so that I can verify the integrity of the file to ensure nothing has happened.<br />Next is an example email<br />
  63. 63. What happens with a report?<br />[1295120896] || 79b8b34e50d71b418a6d1a869f34f50b <br />
  64. 64. What happens with a report?<br />You can see from the email that it contains the website name<br />It contains the FTP file name, and location that it was uploaded to the server<br />It also contains a MD5 signature.<br />
  65. 65. MD5?<br />MD5 is a cryptographic checksum that is made of a file.<br />The MD5 is designed to protect the file from change.<br />If the file is ever modified in any way, the checksum will never match.<br />This is how we protect the data for law enforcement.<br />
  66. 66. What happens with a report?<br />As you can see, I get a copy of the website name, so I can verify that it is a real website.<br />This is done by running whois records on the site, and “alive” check on the web to ensure it is active. <br />AT NO TIME DO I OR ANYONE INVESTIGATING THIS REPORT EVER ACCESSES THE SITE.<br />I then run a special script I have that does a full analysis of the website from a investigative standpoint.<br />
  67. 67. What happens with a report?<br />Once that is complete, I burn a copy of the file that was uploaded, along with the MD5 hash and a copy of the output of my script.<br />This is then place in an envelope along with a standard letter and instructions for verifying the MD5.<br />This package is mailed to the identified LE or IPT investigator.<br />A duplicate package is mailed to Innocent Images task force in DC.<br />
  68. 68. The IPT Disc <br />I have finished developing and testing a new disc that will be available for download from the website.<br />You will also, hopefully find it in some retail stores as well $5 a disc.<br />This disc has all of the tools for the browsers and the email clients. It also has training and links back to the main site.<br />
  69. 69. The IPT Disc<br />
  70. 70. So, why do this?<br />One out of five kids using online chat-lines are approached by pedophiles<br />Nine out of ten kids aged 9 to 16 have viewed pornography on the Internet<br />25% of kids subjected to sexual solicitation tell their parents<br />All these names may lead you straight to pornographic websites if you make an Internet search on them – Disney, Action Man, Barbie, Pokemon, ESPN, Alice, My Little Pony<br />100,000 sites existed in 2001 on the Internet about child pornography<br />100 billion are spent every year on pornographic sites with pay access on the Internet<br />
  71. 71. And….<br />The stories just go on and on.<br />As you can tell, with the growth of the internet these predators and pedophiles have found a new playground and it is the Internet.<br />These are a very small sample of the number of reported cases of predators and pedophiles.<br />The majority of these issues go UNREPORTED.<br />
  72. 72. As a parent<br />Know what your children are doing online.<br />Teach kids not to give out any identifying information.<br />Report any suspicious activity to police.<br />Never let your child meet anyone from online without parental supervision.<br />Keep user names and profiles generic and anonymous.<br />Avoid posting personal photos online.<br />
  73. 73. As a parent<br />Always keep private information private.<br />Place the family computer in an open area.<br />Remind children that online “friends” are still strangers.<br />You must still show respect children’s privacy<br />Become a part of your child’s online experience.<br />Be aware of phone calls or mail deliveries from unfamiliar persons.<br />
  74. 74. Predator vs. Pedophile<br />Lets look at a checklist of characteristics of these two types of people.<br />These are lists I have put together from FBI documents.<br />If you would like to read the full report, please email me and I’ll send it to you.<br />
  75. 75. The Predator<br />
  76. 76. The Predator<br />He abuses then backs off. <br />He has to win, and it is very important to him that he is always right.<br />He Hates and Loves Women at the Same Time.<br />Endless Cycle of Love/Hate with his Mother <br />This person was probably abused by his mother and then coddled. <br />10/1/2011<br />Copyright 2011 Joseph Seanor and PI Mall LLC<br />76<br />
  77. 77. The Predator <br />He transposes these feelings to other women. <br />He tries to create the same type of environment with other women. <br />This time he IS in CONTROL. <br />He may have a wife. <br />If so, he is a model husband. <br />He needs one relationship with a female that is solid and wholesome; that is why he looks elsewhere for women to abuse.<br />10/1/2011<br />Copyright 2011 Joseph Seanor and PI Mall LLC<br />77<br />
  78. 78. The Predator<br />MOST IMPORTANT<br />Remember, he is most likely very shy and timid or reserved in the real world and has low self esteem until he gets on the Internet.<br />Then he is the MASTER of his domain.<br />10/1/2011<br />Copyright 2011 Joseph Seanor and PI Mall LLC<br />78<br />
  79. 79. The Pedophile<br />
  80. 80. Pedophile Characteristics<br />Sexual Abuse in Background<br />Limited Social Contact as Teenagers <br /> Frequent and Unexpected Moves (locations)<br />Prior Arrests <br /> Multiple Victims <br />Older Than 25, Single, Never Married <br />Lives Alone or With Parents <br />10/1/2011<br />Copyright 2011 Joseph Seanor and PI Mall LLC<br />80<br />
  81. 81. Limited Dating Relationships If Not Married<br /> If Married, “Special” Relationship With Spouse <br />Associates and Circle of Friends are Young <br />Refers to Children as “Clean,” “Pure,” “Innocent,” “Impish,” or Objects <br />Skilled at Identifying Vulnerable Victims <br />Has Access to Children <br />Seduces With Attention, Affection, and Gifts <br />10/1/2011<br />Copyright 2011 Joseph Seanor and PI Mall LLC<br />81<br />Pedophile Characteristics<br />
  82. 82. Skilled at Manipulating Children<br />Shows Sexually Explicit Material to Children <br /> Youth-Oriented Decorations in House or Room<br />Photographing of Children clothed or unclothed<br />10/1/2011<br />Copyright 2011 Joseph Seanor and PI Mall LLC<br />82<br />Pedophile Characteristics<br />
  83. 83. Internet <br />
  84. 84. Internet sources to look at<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />84<br />Websites<br />News Groups<br />IRC <br />File Servers, P2P systems, Bit Torrent<br />BBS’s (yes they are still around!!)<br />
  85. 85. Keywords to look for<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />85<br />When you are looking for Pedophiles, there are certain terms to look for or you may “hear”<br />Boy love or blogo<br />Ehebophila <br />Hebephilia<br />Girl love or glogo<br />Infantophilia<br />Lolita <br />Clogo<br />
  86. 86. Pedophile terms<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />86<br />12chan = used as a place where all the material that is illegal to post on 4chan is traded. <br />4chan = group that trades objectionable pictures and material.<br />AF = Adult Friend<br />ANTI = Anti-Pedophile or Pedophile Hunter<br />AoA = Age of Attraction <br />AoC = Age of Consent<br />ATBOYS = Attracted to Boys <br />
  87. 87. Pedophile terms<br />MAA = Minor-Attracted Adult<br />MBC = MetaBoyChat<br />MHAMIC = Male Homosexual Attraction to Minors Information Center<br />NEPI = refers to Nepiophilia aka Infantophilia is the sexual attraction towards babies and toddlers (aged 0-4/5 years).<br />NN = Non Nude Model Sites/Photos where underage girls as young as two pose scantily clad in adult lingerie or in overtly sexy poses<br />P.A.C.E. = Pedophiles Against Child Exploitation<br />PAN = Pedophile Alert Network<br />PCE = International Pedophile and Child Emancipation<br />PT = Pre-Teen<br />
  88. 88. Pedophile terms<br />RL = Real Life<br />RPG = Role playing games<br />RSO = Registered Sex Offender<br />SHOTA/SHOTACON = Drawings or Cartoons (Animated) Child Pornography featuring boys<br />SO = Sex Offender<br />SOR = Sex Offender Registry<br />SQR = Sure Quality Radio<br />SYF = Sexy or Special Young Friend<br />TBL = Teenage Boy Lover<br />TGL = Teenage Girl Lover<br />Toddlercon = Animated or Cartoon Child Porn featuring sex with toddlers<br />
  89. 89. Symbols to look for<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />89<br />
  90. 90. Online Pedophile Groups<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />90<br />The biggest group online is in the area of “Man Boy Love”<br />Their website community is called “Free Spirits”<br />Other areas you can find them are:<br />Personal websites<br />IRC Channels<br />Web forums<br />Websites that support the pedophile ideals<br />
  91. 91. Pedophile Groups<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />91<br />CSC = Childhood Sensuality Circle <br />HNC = Howard Nichols Society<br />NAMBLA = North American Man/Boy Love Association<br />P.A.L. = Pedophile Alliance League<br />PAL = Pedophile Action for Liberation<br />PAN = Pedophiliacs Anonymous <br />PIE = Pedophile Information Exchange<br />SOhopeful = SOhopeful International, Inc. <br />TLCCG = The Lewis Carroll Collectors Guild<br />TRGS = The Rene Guyon Society<br />
  92. 92. Websites<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />92<br />North American Man-Boy Love Association<br />MARTIJN<br /><br /><br /><br /><br />BLISS or BoyBliss<br />
  93. 93. Child Images<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />93<br />If someone that provides you images of a child that are obscene in nature, you need to contact the FBI Innocent Images Task force.<br />They are focused on:<br />Online organizations, enterprises, and communities that exploit children for profit or personal gain.<br />Major distributors of child pornography, such as those who appear to have transmitted a large volume of child pornography via an online computer on several occasions to several other people.<br />Producers of child pornography.<br />Individuals who travel, or indicate a willingness to travel, for the purpose of engaging in sexual activity with a minor.<br />Possessors of child pornography.<br />
  94. 94. Going online<br />There are two ways to report a suspected predator or pedophile with the software.<br />If you come across a suspected site, you simply use the software to report the site.<br />If you get an email from a suspected predator or pedophile, you just right click on the email and choose pedophile reporter and submit the email.<br />
  95. 95. Going online<br />Remember, these tools that I have developed are for REPORTING ONLY.<br />If you come across any suspected pedophile or predator websites, you need to click the report button.<br />This will collect a copy of the webpage you are on, MD5 the data, and upload it to the IPT server.<br />After you send the email in, the site will be reviewed and an investigator will contact you if you wish.<br />
  96. 96. Going online<br />Without proper training, you can be placing yourself at risk if you decide to track down predators and pedophile.<br />Without proper training, you could corrupt evidence against a predator or pedophile and they could go free.<br />The best thing you can do is just report the websites or emails that you come across.<br />And always, always report anything suspicious to your local law enforcement.<br />
  97. 97. Going online<br />If you are online, using an Anonymous program to protect your location is vital.<br />There are many out on the web, but I recommend: Surf Anonymously Online.<br />You can buy this at:<br /><br />
  98. 98. Facebook<br />How do you report Pedophiles and Predators on Facebook?<br />Easy, first make sure you have the Pedophile Report installed on your copy of Firefox.<br />When you go to the page of the pedophile or predator on Facebook, just click the Report Icon in Firefox!<br />That will send a copy of the offenders Facebook page and information for us to act on it.<br />
  99. 99. MySpace<br />How do you report Pedophiles and Predators on MySpace?<br />Easy, first make sure you have the Pedophile Report installed on your copy of Firefox.<br />When you go to the profile of the pedophile or predator on MySpace, just click the Report Icon in Firefox!<br />That will send a copy of the offenders MySpace profile and information for us to act on it.<br />
  100. 100. Any other Social Network?<br />How do you report Pedophiles and Predators on any other Social Network?<br />Easy, first make sure you have the Pedophile Report installed on your copy of Firefox.<br />When you go to the page of the pedophile or predator on that social network, just click the Report Icon in Firefox!<br />That will send a copy of the offenders page and information for us to act on it.<br />
  101. 101. Why Firefox? <br />You can use any browser, I just used Firefox in that example.<br />Remember, I have tools for: <br />Internet Explorer<br />Firefox<br />Safari<br />Google Chrome<br />Opera<br />
  102. 102. How you can help<br />You can help us out by installing the software and reporting any potential websites or emails.<br />I also ask you to spread the word about the free software. The more people using the software, the more reports and the safer we can make the Internet safer.<br />If you have any ideas, please contact me at:<br />
  103. 103. Are you a victim?<br />If you are a victim of a predator or pedophile, please contact me directly.<br />If you are aware of a suspected predator or pedophile, please contact me directly.<br />If you know of a victim, have them contact me or visit the IPT website and click on Report.<br />
  104. 104. Joining IPT<br />If you would like to volunteer your time and help out with investigations, please contact me directly.<br />I am always looking for people to help out with reports.<br />This is pro-bono work.<br />But someone has to make a stand, right?<br />
  105. 105. Current Software<br />Pedophile Reporter—Internet Explorer<br />Pedophile Reporter—Firefox<br />Pedophile Reporter—Google Chrome<br />Pedophile Reporter—Safari<br />Pedophile Reporter—Outlook<br />Pedophile Reporter—Thunderbird<br />Pedophile Reporter –Android Phones/Tablet<br />Internet Crime Reporter--Firefox<br />
  106. 106. Wrap up<br />What does 2011 hold for IPT?<br />Non-Profit status!<br />IPT software 2011<br />IPT IM program for the public<br />Secure software for Investigators and LE<br />Writers for the IPT website (do you want to be one?)<br />Monitoring system and online access to special tools.<br />
  107. 107. Wrap up<br />Internet Predator Tracker was created to help make a difference online.<br />We need everyone to help out, to spread the word, and to make a difference.<br />If you can help out in anyway, please let me know.<br />
  108. 108. Wrap up<br />Please be safe online.<br />Please keep your children safe online<br />Educate your children about online safety<br />Report any suspicious websites or emails.<br />
  109. 109. Contact information<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />109<br /><br />Email:<br /><br /><br />Phone: 404-202-1799<br />
  110. 110. Thank you so much!<br />110<br />Copyright 2011 PI Mall LLC and Joseph Seanor all rights reserved<br />