SlideShare a Scribd company logo
ChildExploitation
By: Alice and Polina
What is child exploitation?
Child Exploitation is a type of sexual
abuse where children are exploited for
money, power or status. Children under
the age of 18 may be tricked into
believing that they're in a loving,
consensual relationship with someone
that could be several years older than
them. They may be invited to parties,
given drugs, cigarettes and alcohol as a
result of them performing or receiving
sexual activities as well as being exposed
to large risks on the internet…...
…..Child exploitation is a hidden crime.
Young people often trust their abuser and
don't understand that they're being abused.
They may depend on their abuser and are
often too scared to tell anyone what is
happening. It can involve violent, humiliating
and degrading sexual assaults. Young
people are persuaded or forced into
exchanging sexual activity for money, drugs,
gifts, affection or status. Child sexual
exploitation doesn't always involve physical
and can happen online.
Over 2,400 children were victims of
sexual exploitation in gangs and groups
from August 2010 to October 2011
Over 230
children
were
trafficked for
sexual
exploitation
last year
1 in 5
indecent
images of
children
shared
Online were
taken by the
At least
70,000
online
images of
child abuse
were shared
in the UK in
2012
Around 50,000
people in the UK
downloaded or shared
online images of child
abuse in 2012
The most
common
reasons for
children to be
trafficked are
sexual
exploitatio
n and
criminal
exploitatio
Child exploitation online
•When sexual exploitation happens online, young
people may be persuaded, or forced, to:
•Send or post images of themselves
•Take part in sexual activities via a web cam or
smart phone
•Have sexual conversations by text or online.
•Abusers may threaten to send images, video or
copies of conversations to the young person's
friends and family unless they take part in other
sexual activity.
People who sexually exploit children are
often described as highly manipulative
individuals. They exert power over young
people through physical violence, emotional
blackmail or financial pressure, for example
holding them in debt. To maintain control or
to distance children and young people from
those who may be able to protect them,
such as family and friends, abusers create
or exploit weaknesses.
How can you
stay safe?
Trust yourself to know
when something is
wrong. If someone
makes you feel unsafe,
pressured or frightened, follow
your instincts and seek help
Don’t trust people you
don’t know, even if they
seem friendly – and
make sure you know
who you are talking to online.
Never give away personal
details or agree to meet
someone who you have only
talked to online.
Don’t be tricked into
doing things that are
unsafe, even if they
seem like fun. What
might look exciting at
first could be more dangerous
than you realize.
Follow us on twitter @exploitation999
Sign our paper petition

More Related Content

What's hot

Discrimination against girl child
Discrimination against girl childDiscrimination against girl child
Discrimination against girl childNishithaManogna
 
Child sexual abuse by ms. ruby dumpit
Child sexual abuse by ms. ruby dumpitChild sexual abuse by ms. ruby dumpit
Child sexual abuse by ms. ruby dumpit
Judith Albano
 
Violence against women
Violence against womenViolence against women
Violence against women
Athira Athira
 
Rape law lectures
 Rape law lectures Rape law lectures
Rape law lectures
JoyCee8
 
Gender-based Violence by Patricia Sarenas
Gender-based Violence by Patricia SarenasGender-based Violence by Patricia Sarenas
Gender-based Violence by Patricia Sarenas
Mindanao Youth for Peace
 
Prevention of child sexual abuse
Prevention of child sexual abusePrevention of child sexual abuse
Prevention of child sexual abuse
Pratima Nayak ,Kendriya Vidyalaya Sangathan
 
Sexual Exploitation
Sexual ExploitationSexual Exploitation
Sexual Exploitation
kalyviatrieste
 
Domestic violence
Domestic violence Domestic violence
Domestic violence
keithmurzello
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
pscl
 
Child Sexual Abuse
Child Sexual Abuse Child Sexual Abuse
Child Sexual Abuse
Falanni Firyal Fawwaz
 
A presentation on child pornography
A presentation on child pornographyA presentation on child pornography
A presentation on child pornography
SAMBIT SWAIN
 
Child sexual abuse
Child sexual abuseChild sexual abuse
Child sexual abuse
Snehal Deb
 
Child protection presentation
Child protection presentationChild protection presentation
Child protection presentation
mareika
 
Child Abuse
Child AbuseChild Abuse
Child Abuse
Nouf Alhammadi
 
Republic act 7877
Republic act 7877Republic act 7877
Republic act 7877
Audrey DelSan
 
Physical violence against women
Physical violence against womenPhysical violence against women
Physical violence against women
ckumpula
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Yumna Ali
 
RA 9208
RA 9208RA 9208
RA 9208
F Mad
 

What's hot (20)

Discrimination against girl child
Discrimination against girl childDiscrimination against girl child
Discrimination against girl child
 
Child abuse
Child abuseChild abuse
Child abuse
 
Child sexual abuse by ms. ruby dumpit
Child sexual abuse by ms. ruby dumpitChild sexual abuse by ms. ruby dumpit
Child sexual abuse by ms. ruby dumpit
 
Violence against women
Violence against womenViolence against women
Violence against women
 
Rape law lectures
 Rape law lectures Rape law lectures
Rape law lectures
 
Gender-based Violence by Patricia Sarenas
Gender-based Violence by Patricia SarenasGender-based Violence by Patricia Sarenas
Gender-based Violence by Patricia Sarenas
 
Prevention of child sexual abuse
Prevention of child sexual abusePrevention of child sexual abuse
Prevention of child sexual abuse
 
Sexual Exploitation
Sexual ExploitationSexual Exploitation
Sexual Exploitation
 
Domestic violence
Domestic violence Domestic violence
Domestic violence
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Child Sexual Abuse
Child Sexual Abuse Child Sexual Abuse
Child Sexual Abuse
 
A presentation on child pornography
A presentation on child pornographyA presentation on child pornography
A presentation on child pornography
 
Child sexual abuse
Child sexual abuseChild sexual abuse
Child sexual abuse
 
Child protection presentation
Child protection presentationChild protection presentation
Child protection presentation
 
Child Abuse
Child AbuseChild Abuse
Child Abuse
 
Republic act 7877
Republic act 7877Republic act 7877
Republic act 7877
 
Child and the law
Child and the lawChild and the law
Child and the law
 
Physical violence against women
Physical violence against womenPhysical violence against women
Physical violence against women
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
RA 9208
RA 9208RA 9208
RA 9208
 

Similar to Child exploitation

Child exploitation
Child exploitationChild exploitation
Child exploitation
polinapolinapolina
 
Juvenile sexual offender and their victims 2014
Juvenile sexual offender and their victims 2014Juvenile sexual offender and their victims 2014
Juvenile sexual offender and their victims 2014
Mdunnam
 
Juvenile sexual offender and their victims 2014
Juvenile sexual offender and their victims 2014Juvenile sexual offender and their victims 2014
Juvenile sexual offender and their victims 2014Mdunnam
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
NiravD3
 
CSE Presentation
CSE PresentationCSE Presentation
CSE Presentation
Joe Dowds
 
Prevent child sexual_abuse_2
Prevent child sexual_abuse_2Prevent child sexual_abuse_2
Prevent child sexual_abuse_2Yawar Khan
 
Prevent child sexual_abuse_2
Prevent child sexual_abuse_2Prevent child sexual_abuse_2
Prevent child sexual_abuse_2Yaw Khan
 
KNOWLEDGE OF SEX AND CHILD ABUSE IN KIDS
KNOWLEDGE OF SEX AND CHILD ABUSE IN KIDSKNOWLEDGE OF SEX AND CHILD ABUSE IN KIDS
KNOWLEDGE OF SEX AND CHILD ABUSE IN KIDS
uche997904
 
Digital abuse
Digital abuseDigital abuse
Digital abuse
Penda Sunkett
 
Social Work Conference Lecture presentation 0417
Social Work Conference Lecture presentation 0417Social Work Conference Lecture presentation 0417
Social Work Conference Lecture presentation 0417
Robin Currie
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimes
Nilendra Kumar
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
NaeemAbbas286098
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
purush203
 
Perils of social media
Perils of social mediaPerils of social media
Perils of social media
Inderjeet Singh
 
Abuse and Harassment
Abuse and HarassmentAbuse and Harassment
Abuse and Harassment
Rotary International
 

Similar to Child exploitation (20)

Child exploitation
Child exploitationChild exploitation
Child exploitation
 
Juvenile sexual offender and their victims 2014
Juvenile sexual offender and their victims 2014Juvenile sexual offender and their victims 2014
Juvenile sexual offender and their victims 2014
 
Juvenile sexual offender and their victims 2014
Juvenile sexual offender and their victims 2014Juvenile sexual offender and their victims 2014
Juvenile sexual offender and their victims 2014
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
POWERPOINTnewpresentation
POWERPOINTnewpresentationPOWERPOINTnewpresentation
POWERPOINTnewpresentation
 
CSE Presentation
CSE PresentationCSE Presentation
CSE Presentation
 
Prevent child sexual_abuse_2
Prevent child sexual_abuse_2Prevent child sexual_abuse_2
Prevent child sexual_abuse_2
 
Prevent child sexual_abuse_2
Prevent child sexual_abuse_2Prevent child sexual_abuse_2
Prevent child sexual_abuse_2
 
KNOWLEDGE OF SEX AND CHILD ABUSE IN KIDS
KNOWLEDGE OF SEX AND CHILD ABUSE IN KIDSKNOWLEDGE OF SEX AND CHILD ABUSE IN KIDS
KNOWLEDGE OF SEX AND CHILD ABUSE IN KIDS
 
Digital abuse
Digital abuseDigital abuse
Digital abuse
 
Sexual abuse awareness
Sexual abuse awarenessSexual abuse awareness
Sexual abuse awareness
 
Social Work Conference Lecture presentation 0417
Social Work Conference Lecture presentation 0417Social Work Conference Lecture presentation 0417
Social Work Conference Lecture presentation 0417
 
Emotional abuse
Emotional abuseEmotional abuse
Emotional abuse
 
Human Trafficking Policy-2
Human Trafficking Policy-2Human Trafficking Policy-2
Human Trafficking Policy-2
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimes
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 
cyberworld
cyberworld cyberworld
cyberworld
 
Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
Abuse and Harassment
Abuse and HarassmentAbuse and Harassment
Abuse and Harassment
 

Recently uploaded

Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
amekonnen
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
eCommerce Institute
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AwangAniqkmals
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Dutch Power
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
gharris9
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
kkirkland2
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Dutch Power
 

Recently uploaded (20)

Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
 

Child exploitation

  • 2. What is child exploitation? Child Exploitation is a type of sexual abuse where children are exploited for money, power or status. Children under the age of 18 may be tricked into believing that they're in a loving, consensual relationship with someone that could be several years older than them. They may be invited to parties, given drugs, cigarettes and alcohol as a result of them performing or receiving sexual activities as well as being exposed to large risks on the internet…...
  • 3. …..Child exploitation is a hidden crime. Young people often trust their abuser and don't understand that they're being abused. They may depend on their abuser and are often too scared to tell anyone what is happening. It can involve violent, humiliating and degrading sexual assaults. Young people are persuaded or forced into exchanging sexual activity for money, drugs, gifts, affection or status. Child sexual exploitation doesn't always involve physical and can happen online.
  • 4. Over 2,400 children were victims of sexual exploitation in gangs and groups from August 2010 to October 2011
  • 6. 1 in 5 indecent images of children shared Online were taken by the
  • 7. At least 70,000 online images of child abuse were shared in the UK in 2012
  • 8. Around 50,000 people in the UK downloaded or shared online images of child abuse in 2012
  • 9. The most common reasons for children to be trafficked are sexual exploitatio n and criminal exploitatio
  • 10. Child exploitation online •When sexual exploitation happens online, young people may be persuaded, or forced, to: •Send or post images of themselves •Take part in sexual activities via a web cam or smart phone •Have sexual conversations by text or online. •Abusers may threaten to send images, video or copies of conversations to the young person's friends and family unless they take part in other sexual activity.
  • 11. People who sexually exploit children are often described as highly manipulative individuals. They exert power over young people through physical violence, emotional blackmail or financial pressure, for example holding them in debt. To maintain control or to distance children and young people from those who may be able to protect them, such as family and friends, abusers create or exploit weaknesses.
  • 13. Trust yourself to know when something is wrong. If someone makes you feel unsafe, pressured or frightened, follow your instincts and seek help
  • 14. Don’t trust people you don’t know, even if they seem friendly – and make sure you know who you are talking to online. Never give away personal details or agree to meet someone who you have only talked to online.
  • 15. Don’t be tricked into doing things that are unsafe, even if they seem like fun. What might look exciting at first could be more dangerous than you realize.
  • 16. Follow us on twitter @exploitation999 Sign our paper petition