04.pinpoint protect child watch workshop


Published on

Published in: News & Politics
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

04.pinpoint protect child watch workshop

  1. 1. iForensics Prevention Workshops
  2. 2. Child Predation Statistics"The serial killer has the same personalitycharacteristics as the sex offender against children“ -Dr.Mace Knapp, Nevada State Prison Psychologist.There are 400,000 registered sex offenders in the UnitedStates, and an estimated 80 to 100,000 of them aremissing. Theyre supposed to be registered, but wedont know where they are and we dont know wheretheyre living.The most serious and chronic offenders often showsigns of antisocial behavior as early as the preschoolyears.It is estimated that between 1% and 5% of ourpopulation molest children .Nearly all the offenders in sexual assaults reported to lawenforcement were male (96%).
  3. 3. Overall, 23% of sexual assault offenders were under the 18and 77% were adults.40% of the offenders of victims under age 6 werethemselves juveniles. A similar proportion (39%) of offendersof victims ages 6 through 11 were also juveniles. For olderjuvenile victims, the proportion of juvenile offenders droppedto 27%.Adults were the offender in 60% of the sexual assaults ofyouth under age 12. Rarely were the offenders of youngvictims strangers. Strangers were the offender in just 3% ofsexual assaults against victims under age 6 and 5% of thesexual assault of victimizations of youth ages 6 through 11.1 in 5 violent offenders serving time in a state prisonreported having victimized a child.2/3 of all prisoners convicted of rape or sexual assault hadcommitted their crime against a child.
  4. 4. Acquaintance perpetrators are the most common abusers,constituting approximately 70-90% of all reported perpetrators.89% of child sexual assault cases involve persons known to thechild, such as a caretaker or family acquaintance.29% of child sexual abuse offenders are relatives, 60% areacquaintances, and only 11% are strangers.For the vast majority of child victimizers in State prison, the victimwas someone they knew before the crime. 1/3 had committed theircrime against their own child, about 1/2 had a relationship with thevictim as a friend, acquaintance, or relative other than offspring,about 1 in 7 reported the victim to have been a stranger to them.3/4 of the violent victimizations of children took place in either thevictims home or the offenders home.About 60% of the male survivors sampled report at least one oftheir perpetrators to be female.
  5. 5. Many clinical settings currently are witnessing a dramaticincrease in the number of adolescent offenders who havecommitted sexually aggressive acts against other children.While nearly 70% of those serving time for violent crimesagainst children were white, whites accounted for 40% of thoseimprisoned for violent crimes against adults.Inmates who victimized children were less likely than otherinmates to have a prior criminal record-nearly 1/3 of childvictimizers had never been arrested prior to the current offense,compared to less than 20% of those who victimized adults.50% of reported child molestations involve the use of physicalforce and child molesters produce as much visible physicalinjury as rapists-39% of victims.More than 1/2 of all convicted sex offenders are sent back toprison within a year. Within 2 years, 77.9% are back.
  6. 6. Recidivism rates range from 18-45%. Themore violent the crime the more likelihood ofrepeating.Like rape, child molestation is one of the mostunderreported crimes: only 1-10% are everdisclosed.The behavior is highly repetitive, to the point ofcompulsion, rather than resulting from a lack ofjudgment.Bottom Line – WATCH YOUR CHILDREN.LOOK FOR SIGNS OF WITHDRAWAL ANDCAREFULLY DO A PERSONAL INVENTORYOF WHO THEY COME IN CONTACT WITHON A DAILY BASIS.
  7. 7. Cyber-Bullying StatisticsThe American Academy of Pediatrics calls cyberbullying the―most common online risk for all teens.‖Cyberbullying is deliberately using digital media tocommunicate false, embarrassing, or hostile informationabout or to another person.Types of Bullying OnlineThere are many types of cyberbullying:Gossip: Posting or sending cruel gossip to damage aperson’s reputation and relationships with friends, family, andacquaintances.Exclusion: Deliberately excluding someone from an onlinegroup.
  8. 8. Impersonation: Breaking into someone’s e-mail or other onlineaccount and sending messages that will cause embarrassmentor damage to the person’s reputation and affect his or herrelationship with others.Harassment: Repeatedly posting or sending offensive, rude,and insulting messages.Cyberstalking: Posting or sending unwanted or intimidatingmessages, which may include threats.Flaming: Online fights where scornful and offensive messagesare posted on websites, forums, or blogs.Outing and Trickery: Tricking someone into revealing secretsor embarrassing information, which is then shared online.Cyberthreats: Remarks on the Internet threatening or implyingviolent behavior, displaying suicidal tendencies.
  9. 9. Cyber-Bullying Facts32% of online teens say they have been targets of a range ofannoying or potentially menacing online activities. 15% of teensoverall say someone has forwarded or posted a private message they’vewritten, 13% say someone has spread a rumor about them online, 13%say someone has sent them a threatening or aggressive message, and6% say someone has posted embarrassing pictures of them online.38% of online girls report being bullied, compared with 26% of onlineboys. In particular, 41% of older girls (15-17) report being bullied—morethan any other age or gender group.39% of social network users have been cyberbullied in some way,compared with 22% of online teens who do not use social networks.15% of teens on social networks have experienced someone beingmean or cruel to them on a social network site. There are nostatistically significant differences by age, gender, race, socioeconomicstatus, or any other demographic characteristic.
  10. 10. 20% of teens (12-17) say “people are mostly unkind” on onlinesocial networks. Younger teenage girls (12-13) are considerably morelikely to say this. One in three (33%) younger teen girls who use socialmedia say that people their age are ―mostly unkind‖ to one another onsocial network sites.13% of teens who use social media (12-17) say they have had anexperience on a social network that made them feel nervous aboutgoing to school the next day. This is more common among youngerteens (20%) than older teens (11%).88% of social media-using teens say they have seen someone bemean or cruel to another person on a social network site. 12% of thesesay they witness this kind of behavior ―frequently.‖When teens see others being mean or cruel on social networks,frequently 55% see other people just ignoring what is going on,27% see others defending the victim, 20% see others telling theoffender to stop, and 19% see others join in on the harassment.
  11. 11. 36% of teens who have witnessed others being cruel on socialnetworks have looked to someone for advice about what to do.67% of all teens say bullying and harassment happens more offlinethan online.1 in 6 parents know their child has been bullied over social media.In over half of these cases, their child was a repeat victim. Over half ofparents whose children have social media accounts are concernedabout cyberbullying and more than three-quarters of parents havediscussed the issue of online bullying with their children.11% of middle school students were victims of cyberbullying in thepast two months. Girls are more likely than boys to be victims orbully/victims.“Hyper-networking” teens (those who spend more than three hoursper school day on online social networks) are 110% more likely to be avictim of cyberbullying, compared to those who don’t spend as muchtime on social networks.
  12. 12. Effects of Cyber-BullyingWhile bullying through physical intimidation has long been a problem amongteenagers, cyberbullying by using computers and smart phones to send rumorsor post cruel messages has become more prevalent in recent years.Even though there might not be physical injuries, cyberbullying leaves deepemotional scars on the victim.Warning signs of being cyberbullied can include:•appearing sad, moody, or anxious•avoiding school•withdrawing from social activities•experiencing a drop in grades•appearing upset after using the computer•appearing upset after viewing a text message
  13. 13. In extreme cases, physical bullying and online bullying candrive a child or teen to deep depression and even suicide(sometimes called ―bullycide‖). Since 1983, over 150 childrenhave taken their own lives due, in part, to the extremepressure of being bullied.When it comes to suicides related to cyberbullying, somenames have made national headlines in recent years.Ryan Halligan (2003) may be the earliest known case ofsuicide provoked by Internet taunts, but unfortunately manyothers have followed:Jeffrey Johnston (2005), Kristina Calco (2006), RachaelNeblett (2006), Megan Meier (2006), Jesse Logan (2008),Alexa Berman (2008), Michael Joseph Berry (2008), IainSteele (2009), Hope Wittsell (2009), Tyler Clementi (2010),Ashley Rogers (2010), Alexis Skye Pilkington (2010), PhoebePrince (2010), and Amanda Cummings (2011).
  14. 14. The Most Horrible Fact of AllChild Predation dates backcenturies and is not going awayunless WE make it go away!Cyber-Bullying will continue ifallowed to continue and actionmust be taken to stop it!
  15. 15. Child AbductionChild abduction or Child theft is the unauthorized removal of a minor (a childunder the age of legal adulthood) from the custody of the childs natural parentsor legally appointed guardians.The term child abduction confounds two legal and social categories which differby their perpetrating contexts: abduction by members of the childs family orabduction by strangers:Parental child abduction: a family relatives (usually parents) unauthorizedcustody of a child without parental agreement and contrary to family law ruling,which largely removes the child from care, access and contact of the other parentand family side. Occurring around parental separation or divorce, such parental orfamilial child abduction may include parental alienation, a form of child abuseseeking to disconnect a child from targeted parent and denigrated side of family.
  16. 16. Abduction or kidnapping by strangers (from outside the family, natural orlegal guardians) who steal a child for criminal purposes which may include: •Extortion, to elicit a ransom from the guardians for the childs return •illegal adoption, a stranger steals a child with the intent to rear the child as their own •Human trafficking, a stranger steals a child with the intent to exploit the child themselves or by trade in a list of possible abuses including slavery, forced labor, sexual abuse, or even illegal organ trading and murderAbductions by strangersThe stereotypical version of child abduction by a stranger is the classic form of"kidnapping," exemplified by the Lindbergh kidnapping, in which the child isdetained, transported some distance, held for ransom or with intent to keep thechild permanently. These instances are, however, rare.
  17. 17. Parents…do you know?Do you know where your kids are?Do you know who their friends are?Do you know where they hang out?Are you aware of their activities?Do you talk with their teachers and schooladministrators?Do you ever sit down and just talk to them?Do you observe them for any changes inbehavior, appearance, or change in routine?Do you monitor their computer usage, cell phoneusage?Do you set boundaries and rules in their lives?Do you do any activities with your kids?Who are their mentors? Who do they look up to?
  18. 18. Protection Products $199.95 + $14.95/month monitoring PinpointProtect offers the latest tracking unit that is specifically designed with personal tracking and safety in mind. The Spark Nano 3.0 is the most intuitive, cost-effective, and customizable real-time tracker on the market today. Small enough to fit in the palm of your hand, the Nano is perfect for tracking people, vehicles, or assets. View your targets location 24/7 and get live alerts directly from your computer or smartphone. http://www.brickhousesecurity.com/gpscartrackingdeviceforrent.html$199 + $9.99/month monitoringDesigned specifically to be worn by kids; it is waterproof. It isalso tamper-proof and virtually impossible to remove because itrequires special release tool (included). It has a built-in tamper-sensor that sends an alert to your cell phone or PC if GPSlocator is removed. You can even send a text message ―WhereR U" to the GPS locator to receive location updates right on yoursmartphone. The unit keeps tracking your child when GPSsignal is lost via cell-tower triangulation. It is now available in twocolors; pink or black.
  19. 19. $199.95 includes 1-year of serviceThe goal of the Tagg system isn’t just to find alost dog - it’s to not lose him in the first place.The lightweight dog GPS device attaches tomost collars and lets you locate and trackyour dog using a computer or smartphone.The simple set-up procedure allows you tocreate your very own Tagg zone, the areawhere your dog spends most of his time. If heisn’t where he’s supposed to be, you’ll know. http://www.spectorsoft.com/products/eBlast er_Windows/index.asp
  20. 20. FREE Secure Chat https://crypto.cat/
  21. 21. ForensicsNation Protection CatalogWe have taken the guess work out ofidentifying good quality products and the bestprices by publishing our own catalog for yourconvenience.All of the products contained in our catalogare used by ForensicsNation everyday.Download your FREE catalog and beginprotecting yourself and your loved onesToday.Go here for your FREE download:http://www.filefactory.com/f/04629606960c0da3/
  22. 22. Our Gift to You…Never in the course of history has the title ofthis book become so real, ―You Can Run ButYou Cannot Hide!‖With today’s technology, investigators of alltypes can now track your whereabouts in away that simple astounds you.Learn all about cyber-forensics and theresources that we use to conduct all of ourinvestigationsGo here for your FREE download:http://www.filefactory.com/f/04629606960c0da3/
  23. 23. Privacy is a right!Your right to privacy is being eroded daily.But this particular right can have direconsequences for those that choose toignore it.Remaining private and staying off the gridprotects you and your loved ones from allsorts of cyber-crime. And the name of thisgame is PROTECTION!Most of the resources offered in this book arefree so study this information carefully.Go here for your FREE download:http://www.filefactory.com/f/04629606960c0da3/
  24. 24. Corporate Mailing Address:546 South Main StreetLock Box 304Cedar City, Utah 84720435-249-5600435-867-1988 Faxsupport@neternatives.comhttp://ForensicsNation.com