SlideShare a Scribd company logo
1 of 4
Empowering Society’s Youth
Abstract:
Empowering Society’s Youth aims to make the world a better place for our
children in New York. The increasing affordability and accessibility of the internet has
led to an unprecedented number of youth internet users. Therefore, our organization aims
to teach the importance of internet safety to at-risk youth and youth who have already
fallen victims to sex-trafficking and pornography. This will help them be effective
leaders in society. In addition, our staff will provide training to first responders to ensure
proper identification and response mechanisms.
Executive Summary:
The increasing affordability, accessibility, and anonymity of the internet have
made it a dangerous place for children. Youth tend to see the internet as a free space to
express their feelings and problems safe from judgment. This is especially true for
children who are not sociable and who have trouble making friends. As a result, there is a
risk that they will overshare personal information online which traffickers will use to
their advantage.
Traffickers prey on the vulnerabilities of youth to gain their trust and to exploit
them. Offenders chat with their victims on many trusted social media sites such as
Facebook, OoVoo, Twitter, and Skype. They then ask the youth to either pose in sexually
explicit positions or to engage in live web-cam sex also known as live-streaming child
abuse. Sometimes, the online relationship can move offline. It is important to know that
victims can be both boys and girls, domestic or foreign, and be as young as three.
Therefore, our staff strives to empower youth both at- risk and those who have fallen
victims to this crime. Furthermore, we offer training to first responders to ensure proper
identification and response to this crime.
Statement of Need:
In the U.S., 300,000 children are at-risk of becoming sexually exploited (Estes,
Richard J. and Neil Alan Weiner, “The Commercial Sexual Exploitation of Children in
the U.S., Canada and Mexico.” University of Pennsylvania, 2001). If we do not take
action now to prevent this crime from occurring, traffickers will continue to exploit
children for profit. They need to know that they will be held accountable and that society
is watching them.
Currently, there are two resolutions in Congress waiting to be passed. H.R. 2730
“Strengthening the Child Welfare Response to Human Trafficking” mandates
collaboration with state and local law enforcement and extending services for trafficking
victims to 21 years of age. In addition, it requires the Department of Health and Human
Services to provide recommendations to child welfare agencies and residential safe
havens on helping victims or at- risk youth. In turn, H.R. 2801 is the “E-SAFETI Task
Force Act” which seeks to establish a task force to study and make recommendations on
cyber traffickers. If passed, it will have twenty members from different departments
including DOS, Federal Communications Commission, FBI, ICE, Administration for
Children and Families, DOJ, DOL, and thirteen appointed by Secretary of State: internet
website company, non-profits, academic institutions, State AG, a victim of severe form
of sex trafficking, and representatives from public or private sectors. Until these laws are
passed, victims and at-risk youth will not be effectively protected. The only two
technologies in effect are the Cyber Tipline from the National Center for Missing and
Exploited Children and the smartphone applications created by Homeland Security
Initiatives Operation Predator to report suspicions either online or by phone 24/7.
Although there are a number of organizations focusing on child trafficking there
is not one that specifically focuses on cyber trafficking or internet facilitated trafficking.
THORN is an organization that uses technology innovation to fight the sexual
exploitation of children but not on empowering youth. It partners with government,
technology companies, and NGO’s to deter child predators. In addition, it conducts a
national survey of victims to determine the role technology played in their recruitment,
exploitation, and escape. Statistics of this survey indicate that 70% of domestic minor sex
trafficking victims were sold online, 75% of victims had access to a cell phone when
trafficked, and 71% had access to internet when trafficked. This data demonstrates an
urgent need to teach youth to adopt safe internet practices and become active members of
society. Another integral part of this project would be to train first service responders to
identify at-risk youth and victims; otherwise they will not be helped. THORN cites data
from NCMEC that it received 17 million images and videos in 2011. Moreover, in 2009,
police identified 22 million IP addresses used for pornography of which 10 million were
located in the U.S. Furthermore, 19% of identified offenders had images of victims
younger than three years old, 39% images younger than six years old, and 83% images
younger than twelve years old. The time to act is now; every child has the right to be free
from sexual exploitation.

More Related Content

What's hot

SENATOR Mike Crapo (Cyber Bullying Law)
SENATOR Mike Crapo (Cyber Bullying Law)SENATOR Mike Crapo (Cyber Bullying Law)
SENATOR Mike Crapo (Cyber Bullying Law)VogelDenise
 
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder ApproachChild Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder ApproachNzeih Chukwuemeka
 
A Criminological Exploration of Cyber Prostitution within the South African C...
A Criminological Exploration of Cyber Prostitution within the South African C...A Criminological Exploration of Cyber Prostitution within the South African C...
A Criminological Exploration of Cyber Prostitution within the South African C...AJHSSR Journal
 
Police Corruption In Mexico2
Police Corruption In Mexico2Police Corruption In Mexico2
Police Corruption In Mexico2Afaf
 
Police Corruption In Mexico
Police Corruption In MexicoPolice Corruption In Mexico
Police Corruption In MexicoAfaf
 
Systems of Justice over the Internet.
Systems of Justice over the Internet.Systems of Justice over the Internet.
Systems of Justice over the Internet.Paolo Cirio
 
Violence Against Women Act (VAWA)
Violence Against Women Act (VAWA)Violence Against Women Act (VAWA)
Violence Against Women Act (VAWA)Swift Kick
 
Organized Crime: an Introduction and Nepalese Experience
Organized Crime: an Introduction and Nepalese ExperienceOrganized Crime: an Introduction and Nepalese Experience
Organized Crime: an Introduction and Nepalese ExperienceChandra Shekhar Khadka
 
A critical assessment of public administration and civil disobedience in deve...
A critical assessment of public administration and civil disobedience in deve...A critical assessment of public administration and civil disobedience in deve...
A critical assessment of public administration and civil disobedience in deve...Alexander Decker
 
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown LawThe Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown LawMatt Johnson
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationdh24gold
 
Situation of children in Madhya Pradesh on Key Indicators
Situation of children in Madhya Pradesh on Key IndicatorsSituation of children in Madhya Pradesh on Key Indicators
Situation of children in Madhya Pradesh on Key IndicatorsAnil Gulati
 

What's hot (20)

SENATOR Mike Crapo (Cyber Bullying Law)
SENATOR Mike Crapo (Cyber Bullying Law)SENATOR Mike Crapo (Cyber Bullying Law)
SENATOR Mike Crapo (Cyber Bullying Law)
 
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder ApproachChild Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
 
T5
T5T5
T5
 
Sara
SaraSara
Sara
 
A Criminological Exploration of Cyber Prostitution within the South African C...
A Criminological Exploration of Cyber Prostitution within the South African C...A Criminological Exploration of Cyber Prostitution within the South African C...
A Criminological Exploration of Cyber Prostitution within the South African C...
 
Desk of pres
Desk of presDesk of pres
Desk of pres
 
Police Corruption In Mexico2
Police Corruption In Mexico2Police Corruption In Mexico2
Police Corruption In Mexico2
 
Police Corruption In Mexico
Police Corruption In MexicoPolice Corruption In Mexico
Police Corruption In Mexico
 
Systems of Justice over the Internet.
Systems of Justice over the Internet.Systems of Justice over the Internet.
Systems of Justice over the Internet.
 
Organised crime
Organised crimeOrganised crime
Organised crime
 
Violence Against Women Act (VAWA)
Violence Against Women Act (VAWA)Violence Against Women Act (VAWA)
Violence Against Women Act (VAWA)
 
Organized Crime: an Introduction and Nepalese Experience
Organized Crime: an Introduction and Nepalese ExperienceOrganized Crime: an Introduction and Nepalese Experience
Organized Crime: an Introduction and Nepalese Experience
 
A critical assessment of public administration and civil disobedience in deve...
A critical assessment of public administration and civil disobedience in deve...A critical assessment of public administration and civil disobedience in deve...
A critical assessment of public administration and civil disobedience in deve...
 
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown LawThe Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Situation of children in Madhya Pradesh on Key Indicators
Situation of children in Madhya Pradesh on Key IndicatorsSituation of children in Madhya Pradesh on Key Indicators
Situation of children in Madhya Pradesh on Key Indicators
 
Blogging & Law
Blogging & LawBlogging & Law
Blogging & Law
 
Organize Crime Groups
Organize Crime GroupsOrganize Crime Groups
Organize Crime Groups
 
Criminal Justice 132 Term Paper
Criminal Justice 132 Term PaperCriminal Justice 132 Term Paper
Criminal Justice 132 Term Paper
 
Organized Crime
Organized CrimeOrganized Crime
Organized Crime
 

Viewers also liked

Monitoring and Evaluation Proposal for the Jordanian Ministry of Social Devel...
Monitoring and Evaluation Proposal for the Jordanian Ministry of Social Devel...Monitoring and Evaluation Proposal for the Jordanian Ministry of Social Devel...
Monitoring and Evaluation Proposal for the Jordanian Ministry of Social Devel...Janae Bushman
 
SOUTH SUDAN WOMEN EMPOWERMENT REPORT
SOUTH SUDAN WOMEN EMPOWERMENT REPORTSOUTH SUDAN WOMEN EMPOWERMENT REPORT
SOUTH SUDAN WOMEN EMPOWERMENT REPORTFRANCIS BUKENYA
 
NGO Proposal: Fighting NCDs in Africa Through Fitness
NGO Proposal: Fighting NCDs in Africa Through FitnessNGO Proposal: Fighting NCDs in Africa Through Fitness
NGO Proposal: Fighting NCDs in Africa Through FitnessTripple Twin Logistics Ltd
 
Practical Guide to Programme/Project Proposal Writing
Practical Guide to Programme/Project Proposal WritingPractical Guide to Programme/Project Proposal Writing
Practical Guide to Programme/Project Proposal WritingChi Karol
 
Sample of a Community Development project proposal writing
Sample of a Community Development project proposal writingSample of a Community Development project proposal writing
Sample of a Community Development project proposal writingMariki Belingtone
 
Slideshare Project Proposal
Slideshare Project ProposalSlideshare Project Proposal
Slideshare Project ProposalJeane Paguio
 
Project proposal format
Project proposal formatProject proposal format
Project proposal formatRashmi Yadav
 
Sample Project Proposal Design Document
Sample Project Proposal Design DocumentSample Project Proposal Design Document
Sample Project Proposal Design DocumentArturo Pelayo
 
Proposal format
Proposal formatProposal format
Proposal formatMr SMAK
 
Writing Successful Project Proposal
Writing Successful Project ProposalWriting Successful Project Proposal
Writing Successful Project ProposalGhulam Qadir
 
10 Project Proposal Writing
10 Project Proposal Writing10 Project Proposal Writing
10 Project Proposal WritingTony
 

Viewers also liked (13)

Monitoring and Evaluation Proposal for the Jordanian Ministry of Social Devel...
Monitoring and Evaluation Proposal for the Jordanian Ministry of Social Devel...Monitoring and Evaluation Proposal for the Jordanian Ministry of Social Devel...
Monitoring and Evaluation Proposal for the Jordanian Ministry of Social Devel...
 
SOUTH SUDAN WOMEN EMPOWERMENT REPORT
SOUTH SUDAN WOMEN EMPOWERMENT REPORTSOUTH SUDAN WOMEN EMPOWERMENT REPORT
SOUTH SUDAN WOMEN EMPOWERMENT REPORT
 
NGO Proposal: Fighting NCDs in Africa Through Fitness
NGO Proposal: Fighting NCDs in Africa Through FitnessNGO Proposal: Fighting NCDs in Africa Through Fitness
NGO Proposal: Fighting NCDs in Africa Through Fitness
 
Preparing a project proposal
Preparing a project proposalPreparing a project proposal
Preparing a project proposal
 
Practical Guide to Programme/Project Proposal Writing
Practical Guide to Programme/Project Proposal WritingPractical Guide to Programme/Project Proposal Writing
Practical Guide to Programme/Project Proposal Writing
 
Sample of a Community Development project proposal writing
Sample of a Community Development project proposal writingSample of a Community Development project proposal writing
Sample of a Community Development project proposal writing
 
Project proposal intro
Project proposal introProject proposal intro
Project proposal intro
 
Slideshare Project Proposal
Slideshare Project ProposalSlideshare Project Proposal
Slideshare Project Proposal
 
Project proposal format
Project proposal formatProject proposal format
Project proposal format
 
Sample Project Proposal Design Document
Sample Project Proposal Design DocumentSample Project Proposal Design Document
Sample Project Proposal Design Document
 
Proposal format
Proposal formatProposal format
Proposal format
 
Writing Successful Project Proposal
Writing Successful Project ProposalWriting Successful Project Proposal
Writing Successful Project Proposal
 
10 Project Proposal Writing
10 Project Proposal Writing10 Project Proposal Writing
10 Project Proposal Writing
 

Similar to Grant Proposal Excerpt Build Your Own NGO

social and environmental issues.pptx
social and environmental issues.pptxsocial and environmental issues.pptx
social and environmental issues.pptxRoelTabuyo2
 
prt. 1...Online Pedophiles
prt. 1...Online Pedophilesprt. 1...Online Pedophiles
prt. 1...Online PedophilesJustine
 
Digital r rsjb2011
Digital r rsjb2011Digital r rsjb2011
Digital r rsjb2011SJBelcher
 
Internet Crime And Moral Responsibility
Internet Crime And Moral ResponsibilityInternet Crime And Moral Responsibility
Internet Crime And Moral ResponsibilityTracy Clark
 
Spotlight Handout Non-LE 2
Spotlight Handout Non-LE 2Spotlight Handout Non-LE 2
Spotlight Handout Non-LE 2Maia
 
Health q 2 l-3
Health q 2 l-3Health q 2 l-3
Health q 2 l-3melody_23
 
Child Sexual Exploitation of Children, CSEC Advocacy Project
Child Sexual Exploitation of Children, CSEC Advocacy ProjectChild Sexual Exploitation of Children, CSEC Advocacy Project
Child Sexual Exploitation of Children, CSEC Advocacy ProjectAlexandra Rupp
 
ahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptxahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptxchiragcdbc92
 
Cebu Factsheet 2016
Cebu Factsheet 2016Cebu Factsheet 2016
Cebu Factsheet 2016John Tanagho
 
4 forum responses 2 300 words 2 250 words w.docx
4 forum responses 2 300 words 2 250 words w.docx4 forum responses 2 300 words 2 250 words w.docx
4 forum responses 2 300 words 2 250 words w.docxwrite12
 
Cybercrime is a Phenomenon that Threatens Community Peace
Cybercrime is a Phenomenon that Threatens Community PeaceCybercrime is a Phenomenon that Threatens Community Peace
Cybercrime is a Phenomenon that Threatens Community PeaceMubarak Al Hadadi
 

Similar to Grant Proposal Excerpt Build Your Own NGO (13)

social and environmental issues.pptx
social and environmental issues.pptxsocial and environmental issues.pptx
social and environmental issues.pptx
 
prt. 1...Online Pedophiles
prt. 1...Online Pedophilesprt. 1...Online Pedophiles
prt. 1...Online Pedophiles
 
Researchpaper (2)
Researchpaper (2)Researchpaper (2)
Researchpaper (2)
 
Disrupting harm — Project brief
Disrupting harm — Project briefDisrupting harm — Project brief
Disrupting harm — Project brief
 
Digital r rsjb2011
Digital r rsjb2011Digital r rsjb2011
Digital r rsjb2011
 
Internet Crime And Moral Responsibility
Internet Crime And Moral ResponsibilityInternet Crime And Moral Responsibility
Internet Crime And Moral Responsibility
 
Spotlight Handout Non-LE 2
Spotlight Handout Non-LE 2Spotlight Handout Non-LE 2
Spotlight Handout Non-LE 2
 
Health q 2 l-3
Health q 2 l-3Health q 2 l-3
Health q 2 l-3
 
Child Sexual Exploitation of Children, CSEC Advocacy Project
Child Sexual Exploitation of Children, CSEC Advocacy ProjectChild Sexual Exploitation of Children, CSEC Advocacy Project
Child Sexual Exploitation of Children, CSEC Advocacy Project
 
ahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptxahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptx
 
Cebu Factsheet 2016
Cebu Factsheet 2016Cebu Factsheet 2016
Cebu Factsheet 2016
 
4 forum responses 2 300 words 2 250 words w.docx
4 forum responses 2 300 words 2 250 words w.docx4 forum responses 2 300 words 2 250 words w.docx
4 forum responses 2 300 words 2 250 words w.docx
 
Cybercrime is a Phenomenon that Threatens Community Peace
Cybercrime is a Phenomenon that Threatens Community PeaceCybercrime is a Phenomenon that Threatens Community Peace
Cybercrime is a Phenomenon that Threatens Community Peace
 

Grant Proposal Excerpt Build Your Own NGO

  • 1. Empowering Society’s Youth Abstract: Empowering Society’s Youth aims to make the world a better place for our children in New York. The increasing affordability and accessibility of the internet has led to an unprecedented number of youth internet users. Therefore, our organization aims to teach the importance of internet safety to at-risk youth and youth who have already fallen victims to sex-trafficking and pornography. This will help them be effective leaders in society. In addition, our staff will provide training to first responders to ensure proper identification and response mechanisms. Executive Summary: The increasing affordability, accessibility, and anonymity of the internet have made it a dangerous place for children. Youth tend to see the internet as a free space to express their feelings and problems safe from judgment. This is especially true for children who are not sociable and who have trouble making friends. As a result, there is a risk that they will overshare personal information online which traffickers will use to their advantage. Traffickers prey on the vulnerabilities of youth to gain their trust and to exploit them. Offenders chat with their victims on many trusted social media sites such as Facebook, OoVoo, Twitter, and Skype. They then ask the youth to either pose in sexually explicit positions or to engage in live web-cam sex also known as live-streaming child
  • 2. abuse. Sometimes, the online relationship can move offline. It is important to know that victims can be both boys and girls, domestic or foreign, and be as young as three. Therefore, our staff strives to empower youth both at- risk and those who have fallen victims to this crime. Furthermore, we offer training to first responders to ensure proper identification and response to this crime. Statement of Need: In the U.S., 300,000 children are at-risk of becoming sexually exploited (Estes, Richard J. and Neil Alan Weiner, “The Commercial Sexual Exploitation of Children in the U.S., Canada and Mexico.” University of Pennsylvania, 2001). If we do not take action now to prevent this crime from occurring, traffickers will continue to exploit children for profit. They need to know that they will be held accountable and that society is watching them. Currently, there are two resolutions in Congress waiting to be passed. H.R. 2730 “Strengthening the Child Welfare Response to Human Trafficking” mandates collaboration with state and local law enforcement and extending services for trafficking victims to 21 years of age. In addition, it requires the Department of Health and Human Services to provide recommendations to child welfare agencies and residential safe havens on helping victims or at- risk youth. In turn, H.R. 2801 is the “E-SAFETI Task Force Act” which seeks to establish a task force to study and make recommendations on cyber traffickers. If passed, it will have twenty members from different departments including DOS, Federal Communications Commission, FBI, ICE, Administration for Children and Families, DOJ, DOL, and thirteen appointed by Secretary of State: internet
  • 3. website company, non-profits, academic institutions, State AG, a victim of severe form of sex trafficking, and representatives from public or private sectors. Until these laws are passed, victims and at-risk youth will not be effectively protected. The only two technologies in effect are the Cyber Tipline from the National Center for Missing and Exploited Children and the smartphone applications created by Homeland Security Initiatives Operation Predator to report suspicions either online or by phone 24/7. Although there are a number of organizations focusing on child trafficking there is not one that specifically focuses on cyber trafficking or internet facilitated trafficking. THORN is an organization that uses technology innovation to fight the sexual exploitation of children but not on empowering youth. It partners with government, technology companies, and NGO’s to deter child predators. In addition, it conducts a national survey of victims to determine the role technology played in their recruitment, exploitation, and escape. Statistics of this survey indicate that 70% of domestic minor sex trafficking victims were sold online, 75% of victims had access to a cell phone when trafficked, and 71% had access to internet when trafficked. This data demonstrates an urgent need to teach youth to adopt safe internet practices and become active members of society. Another integral part of this project would be to train first service responders to identify at-risk youth and victims; otherwise they will not be helped. THORN cites data from NCMEC that it received 17 million images and videos in 2011. Moreover, in 2009, police identified 22 million IP addresses used for pornography of which 10 million were located in the U.S. Furthermore, 19% of identified offenders had images of victims younger than three years old, 39% images younger than six years old, and 83% images
  • 4. younger than twelve years old. The time to act is now; every child has the right to be free from sexual exploitation.