SlideShare a Scribd company logo
1 of 11
CYBERGROOMING AND
INTERNET DRUG TRADE ON
PLATFORMS FOR YOUTH AND
CHILDREN
Silesian Society for Solidarity z.s.
BASIC INFORMATION ABOUT
CYBERGROOMING
• Malicious behavior of users of Internet communication tools, thanks to which they can
establish a confidential relationship with people who later become victims of ulterior
motives
• The majority target group of cyber groomers, who in many cases show pedophile
tendencies, are children
• However, this is not always the case, cybergrooming can also be a form of cyberbullying
• After the groomer and the victim become close and friendly, the victim will often share
intimate information or secrets with the groomer, which will then serve as « leverage »
for the groomer.
• The perpetrators very often consume substances to cope with guilt or those that give
them courage, and disinhibit their behaviour
THE MOST FAMOUS CASES OF
CYBERGROOMING IN THE CZECH REPUBLIC
• One of the most famous cases of this phenomenon in the
Czech Republic is the case of Pavel Hovorka from 2009
• Pavel Hovorka abused 21 boys in this way with the help
of manipulation through social networks
• Czech law often does not recognize this term as such,
but it does recognize its subsequent criminal
manifestations, which can make sentencing a grommer
easier than in the case of an aggressor in long-term
cyberbullying. (e.g. a similar crime as in this case is
regulated in § 193b of the Criminal Code)
• However, these criminal manifestations tend to be more
far-reaching than in the case of cyberbullying.
CHARACTERISTICS OF VICTIMS
• The highest victimization rate is observed mainly in:
• Children aged 11 – 17 years
• Lonely and easily vulnerable people in difficult life situations
• People with a low level of critical thinking or overly trusting people
• Easily manipulated persons with little self-confidence
• People with various types of addictive behavior
• The victims often don’t stand a chance to defend themselves, the perpetrators apply
illegal substances to facilitate the rape
CHARACTERISTICS OF THE
PERPETRATORS
• In the vast majority of cases, the perpetrators are men, especially single or divorced
men
• The perpetrators themselves often do not feel comfortable communicating and
establishing relationships with other adults, they communicate far more often with
children, so in some cases, ulterior motives may arise only later
• Most offenders were diagnosed with a pathological interest in children (but not always
only of a sexual nature) only 10% of perpetrators suffer from pedophile deviance
• However, the paradox and little-known information is that the vast majority of people
with pedophilic preferences do not harm children and this is non-criminal pedophilia, in
the case of perpetrators it is mainly a combination with socially pathological behavior
• In some cases, the perpetrator with psychopathic tendencies does not objectively
show purely pedophilic preferences, but nevertheless the victim becomes a child,
mainly due to the fact that these victims are more easily manipulated
• According to a study by Peter Weiss, children are paradoxically abused by non-
pedophilic perpetrators in up to 90% of cases
• Unfortunately, 22% of pedophile respondents in Karel Žák's study think that
voluntary and consensual sexual contact cannot harm a child
• According to the cybergrooming.cz
portal, the latency of this
phenomenon is so high that only 10%
of victims report this behavior
• The platforms on which
cybergrooming is recorded most often
are different from those that lead the
cyberbullying charts.
• This mainly includes Snapchat,
TikTok, Skype, Instagram, but also
Discord or even communities on
some computer games that are
popular especially among younger
children, for example Roblox
VIDEOGAME DRUG
TRADE
• Many different videogames often
become a very popular platform to
sell illegal substances in an «
anonymous way », this is the case of
MMORPGs with many players as
well as the cases of games for
children
• Games which contain virtual
currency that can be converted to
real money are most often associated
with these illegal activities, mostly
EVE Online, some MMORPGs and
Second Life
SPECIFIC CASE - ROBLOX
• In addition to popular computer games among young people,
such as Minecraft or Fortnite, we also find Roblox. However,
unlike these named games, it offers greater freedom of own
virtual creation, which unfortunately also increases the risk
• In some cases, young children were approached by predators
who invited them to sexually oriented rooms. Another time, a
predator raped the player avatar of an Australian girl.
• In the UK in 2020, a predator threatened an 11-year-old boy
to harm his family unless he sent him a sex video
• Moderators are trying to censor this content and prevent
these cases, but this is still a difficult challenge, with which
nowadays not only parental control settings help, but also
artificial intelligence, automatic recognition of avatars and
inappropriate text, etc.
• For example, during the years 2020-2021, the
previously mentioned consultation center of the
E-Safety project of the Palacký University in
Olomouc recorded a number of cases in which
parents caught suspicious communication of
their child with an unknown Roblox user
• Among the Czech Roblox player community, for
example, a certain user XY provided money to
children in the form of the in-game currency
«Robux» in exchange for nude photos and
videos.
• In the Czech environment, a case was also
reported when another person, pretending to be
a «policewoman», wrote to a boy that she
wanted to have sex with him and that if he did
not obey, she would cause trouble for him and
his family
Drugs and Cybercrimes

More Related Content

Similar to Drugs and Cybercrimes

Internet Safety
Internet SafetyInternet Safety
Internet Safety
PHSD
 
Sex violence in the family and human trafficking in America
Sex violence in the family and human trafficking in AmericaSex violence in the family and human trafficking in America
Sex violence in the family and human trafficking in America
Rose Kendall
 
Social networks
Social networksSocial networks
Social networks
drlizmike
 
Confronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and ExploitationConfronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and Exploitation
mckenln
 

Similar to Drugs and Cybercrimes (20)

Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Tink palmer
Tink palmerTink palmer
Tink palmer
 
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
 
Social media and inappropriate behaviour
Social media and inappropriate behaviourSocial media and inappropriate behaviour
Social media and inappropriate behaviour
 
prt. 1...Online Pedophiles
prt. 1...Online Pedophilesprt. 1...Online Pedophiles
prt. 1...Online Pedophiles
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
 
Media power point 3
Media power point 3Media power point 3
Media power point 3
 
Sex violence in the family and human trafficking in America
Sex violence in the family and human trafficking in AmericaSex violence in the family and human trafficking in America
Sex violence in the family and human trafficking in America
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
 
Social networks
Social networksSocial networks
Social networks
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet Safety
 
Internet predators:parents clueless?
Internet predators:parents clueless?Internet predators:parents clueless?
Internet predators:parents clueless?
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
ONLINE SEXUAL ABUSE AND EXPLOITATION OF CHILDREN.pptx
ONLINE SEXUAL ABUSE AND EXPLOITATION OF CHILDREN.pptxONLINE SEXUAL ABUSE AND EXPLOITATION OF CHILDREN.pptx
ONLINE SEXUAL ABUSE AND EXPLOITATION OF CHILDREN.pptx
 
Confronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and ExploitationConfronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and Exploitation
 

More from Pavel26766

More from Pavel26766 (20)

European Citizenship - Be Modern, Be Successful
European Citizenship - Be Modern, Be SuccessfulEuropean Citizenship - Be Modern, Be Successful
European Citizenship - Be Modern, Be Successful
 
Be Modern, Be Successful - 2 Years Social Media Plan
Be Modern, Be Successful - 2 Years Social Media Plan Be Modern, Be Successful - 2 Years Social Media Plan
Be Modern, Be Successful - 2 Years Social Media Plan
 
ESC Příběhová Brožurka CZ
ESC Příběhová Brožurka CZESC Příběhová Brožurka CZ
ESC Příběhová Brožurka CZ
 
ESC Information Booklet EN
ESC Information Booklet ENESC Information Booklet EN
ESC Information Booklet EN
 
ESC Informační Brožurka CZ
ESC Informační Brožurka CZESC Informační Brožurka CZ
ESC Informační Brožurka CZ
 
Art as a Way of Fighting Addiction
Art as a Way of Fighting AddictionArt as a Way of Fighting Addiction
Art as a Way of Fighting Addiction
 
Cases Of Overdose Among Young People In Lithuania
Cases Of Overdose Among Young People In LithuaniaCases Of Overdose Among Young People In Lithuania
Cases Of Overdose Among Young People In Lithuania
 
Illegal Narcotics Black Sea Trade in Romania
Illegal Narcotics Black Sea Trade in RomaniaIllegal Narcotics Black Sea Trade in Romania
Illegal Narcotics Black Sea Trade in Romania
 
Camorra, 'Ndrangheta and Illegal Drug trade in Italy
Camorra, 'Ndrangheta and Illegal Drug trade in ItalyCamorra, 'Ndrangheta and Illegal Drug trade in Italy
Camorra, 'Ndrangheta and Illegal Drug trade in Italy
 
Use and History of Illegal Substances
Use and History of Illegal SubstancesUse and History of Illegal Substances
Use and History of Illegal Substances
 
Coursera - Erasmus+
Coursera - Erasmus+Coursera - Erasmus+
Coursera - Erasmus+
 
Skillshare - Erasmus+
Skillshare - Erasmus+Skillshare - Erasmus+
Skillshare - Erasmus+
 
Youtube - Erasmus+
Youtube - Erasmus+Youtube - Erasmus+
Youtube - Erasmus+
 
Udacity - Erasmus+
Udacity - Erasmus+Udacity - Erasmus+
Udacity - Erasmus+
 
Financial Literacy and Youth Unemployment in Romania.pdf
Financial Literacy and Youth Unemployment in Romania.pdfFinancial Literacy and Youth Unemployment in Romania.pdf
Financial Literacy and Youth Unemployment in Romania.pdf
 
Financial Literacy and Youth Unemployment in Serbia.pdf
Financial Literacy and Youth Unemployment in Serbia.pdfFinancial Literacy and Youth Unemployment in Serbia.pdf
Financial Literacy and Youth Unemployment in Serbia.pdf
 
Financial Literacy and Youth Unemployment in Poland.pdf
Financial Literacy and Youth Unemployment in Poland.pdfFinancial Literacy and Youth Unemployment in Poland.pdf
Financial Literacy and Youth Unemployment in Poland.pdf
 
SR-EN Priručnik za mlade nezaposlene ljude u Srbiji
SR-EN Priručnik za mlade nezaposlene ljude u SrbijiSR-EN Priručnik za mlade nezaposlene ljude u Srbiji
SR-EN Priručnik za mlade nezaposlene ljude u Srbiji
 
RO Un Manual Pentru Tinerii Neangajati 2022
RO Un Manual Pentru Tinerii Neangajati 2022RO Un Manual Pentru Tinerii Neangajati 2022
RO Un Manual Pentru Tinerii Neangajati 2022
 
EN A Manual for Young Unemployed in Romania 2022
EN A Manual for Young Unemployed in Romania 2022EN A Manual for Young Unemployed in Romania 2022
EN A Manual for Young Unemployed in Romania 2022
 

Recently uploaded

Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
httgc7rh9c
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MysoreMuleSoftMeetup
 

Recently uploaded (20)

COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptxMichaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 

Drugs and Cybercrimes

  • 1. CYBERGROOMING AND INTERNET DRUG TRADE ON PLATFORMS FOR YOUTH AND CHILDREN Silesian Society for Solidarity z.s.
  • 2. BASIC INFORMATION ABOUT CYBERGROOMING • Malicious behavior of users of Internet communication tools, thanks to which they can establish a confidential relationship with people who later become victims of ulterior motives • The majority target group of cyber groomers, who in many cases show pedophile tendencies, are children • However, this is not always the case, cybergrooming can also be a form of cyberbullying • After the groomer and the victim become close and friendly, the victim will often share intimate information or secrets with the groomer, which will then serve as « leverage » for the groomer. • The perpetrators very often consume substances to cope with guilt or those that give them courage, and disinhibit their behaviour
  • 3. THE MOST FAMOUS CASES OF CYBERGROOMING IN THE CZECH REPUBLIC • One of the most famous cases of this phenomenon in the Czech Republic is the case of Pavel Hovorka from 2009 • Pavel Hovorka abused 21 boys in this way with the help of manipulation through social networks • Czech law often does not recognize this term as such, but it does recognize its subsequent criminal manifestations, which can make sentencing a grommer easier than in the case of an aggressor in long-term cyberbullying. (e.g. a similar crime as in this case is regulated in § 193b of the Criminal Code) • However, these criminal manifestations tend to be more far-reaching than in the case of cyberbullying.
  • 4. CHARACTERISTICS OF VICTIMS • The highest victimization rate is observed mainly in: • Children aged 11 – 17 years • Lonely and easily vulnerable people in difficult life situations • People with a low level of critical thinking or overly trusting people • Easily manipulated persons with little self-confidence • People with various types of addictive behavior • The victims often don’t stand a chance to defend themselves, the perpetrators apply illegal substances to facilitate the rape
  • 5. CHARACTERISTICS OF THE PERPETRATORS • In the vast majority of cases, the perpetrators are men, especially single or divorced men • The perpetrators themselves often do not feel comfortable communicating and establishing relationships with other adults, they communicate far more often with children, so in some cases, ulterior motives may arise only later • Most offenders were diagnosed with a pathological interest in children (but not always only of a sexual nature) only 10% of perpetrators suffer from pedophile deviance • However, the paradox and little-known information is that the vast majority of people with pedophilic preferences do not harm children and this is non-criminal pedophilia, in the case of perpetrators it is mainly a combination with socially pathological behavior
  • 6. • In some cases, the perpetrator with psychopathic tendencies does not objectively show purely pedophilic preferences, but nevertheless the victim becomes a child, mainly due to the fact that these victims are more easily manipulated • According to a study by Peter Weiss, children are paradoxically abused by non- pedophilic perpetrators in up to 90% of cases • Unfortunately, 22% of pedophile respondents in Karel Žák's study think that voluntary and consensual sexual contact cannot harm a child
  • 7. • According to the cybergrooming.cz portal, the latency of this phenomenon is so high that only 10% of victims report this behavior • The platforms on which cybergrooming is recorded most often are different from those that lead the cyberbullying charts. • This mainly includes Snapchat, TikTok, Skype, Instagram, but also Discord or even communities on some computer games that are popular especially among younger children, for example Roblox
  • 8. VIDEOGAME DRUG TRADE • Many different videogames often become a very popular platform to sell illegal substances in an « anonymous way », this is the case of MMORPGs with many players as well as the cases of games for children • Games which contain virtual currency that can be converted to real money are most often associated with these illegal activities, mostly EVE Online, some MMORPGs and Second Life
  • 9. SPECIFIC CASE - ROBLOX • In addition to popular computer games among young people, such as Minecraft or Fortnite, we also find Roblox. However, unlike these named games, it offers greater freedom of own virtual creation, which unfortunately also increases the risk • In some cases, young children were approached by predators who invited them to sexually oriented rooms. Another time, a predator raped the player avatar of an Australian girl. • In the UK in 2020, a predator threatened an 11-year-old boy to harm his family unless he sent him a sex video • Moderators are trying to censor this content and prevent these cases, but this is still a difficult challenge, with which nowadays not only parental control settings help, but also artificial intelligence, automatic recognition of avatars and inappropriate text, etc.
  • 10. • For example, during the years 2020-2021, the previously mentioned consultation center of the E-Safety project of the Palacký University in Olomouc recorded a number of cases in which parents caught suspicious communication of their child with an unknown Roblox user • Among the Czech Roblox player community, for example, a certain user XY provided money to children in the form of the in-game currency «Robux» in exchange for nude photos and videos. • In the Czech environment, a case was also reported when another person, pretending to be a «policewoman», wrote to a boy that she wanted to have sex with him and that if he did not obey, she would cause trouble for him and his family