SlideShare a Scribd company logo
Cyber Predators
Lindsay E
Comm 250: Communications &
Technology
“Cyber Predators”: Who are
they?
O Do not fit clinical profile of pedophiles since
primarily target adolescents, not children
O Indeed, 1 in 8 offenders arrested for actually
committed crimes against adolescents (Wolak et
al., 2013)
O Seek certain characteristics: seek admiration
from victims who may be sexually naïve; may
fear adult relationships; want to “feel young”; feel
empowered exerting power or control over naïve
youth (Wolak et al., 2013)
O May be primarily sexually attracted to adults but
target youth for reasons including empowerment,
impulse desires, curiosity, and anger
The “cyber predators”: Who are
they?
(Wolak et al., 2013)
The “cyber predators”: What
do they do?
O Spend as much as 6 hours/day searching for victims
(Myers, 2014)
O Have substantial amount of children in contacts on
social networking sites
O Keep “meticulous” notes on these victims or contacts
O Rapidly shift from “grooming” to upfront sexualized
conversations
O Abandon these traditional “time-consuming”
processes
O “Offenders reported that, if a child did not respond to
their online initiations, the offender would move on to
another child; there was no need to bother with the
process of grooming when immediately asking
children for sex or to meet them produced results”
(Myers, 2014).
O Use the social media to “fast-track” abuse process
“Cyber Victims”: Who are
they?
O 13-17 years old (Wolak et al., 2013)
O ¼ are 13 years old
O Characteristics and risky behaviors that
increase likelihood of victimization:
O Youth questioning their sexuality; youths with
histories of sexual/physical abuse, and other
troubled or confused youth; youths with poor
relationships with parents; youths who
frequent chat rooms, talk online to strangers
about sex or who already engage in risky
sexual behavior offline (Wolak et al., 2013)
The “cyber victims”: Who are
they?
(Wolak et al., 2013)
The “cyber victims”: What do
they do?
O Anonymity and Deception cause victims to not know who
they are interacting with
O 4/5 youth cannot tell difference between “chatting” with peer
or an adult online (Myers, 2014)
O Causes them to engage and respond to these predators
O 5 common behavioral mistakes (Tedeschi, 2009)
1. “Broadcasting personal info to entire internet”
2. “Sharing Passwords”
3. “Befriending strangers”
4. “Baring their souls” (revealing too much intimate
information via CMC)
5. “Forgetting their futures” (posting incriminating
posts/pictures which may lead to unwanted consequences
such as reducing employment chances or college
enrollment opportunities)
Modeling Predation Theory
O Olson et al. Luring Communication
Theoretical (LCT) Model
O 5 phases of predation
1. Gaining access
2. Deceptive trust development
3. Grooming
4. Isolation
5. Approach
Phase 1: Gaining Access
O Predator must be “motivated and able
to gain access to potential victims and
their families” (Olson et al., 2007)
O Exchanging of personal info between
predator and victim
O Gains this access through IM
forums, MySpace or Facebook, chat room
that contain minors
Phase 2: Deceptive Trust
Development
O “a perpetrator’s ability to cultivate relationships with
potential victims and possibly their families that are
intended to benefit the perpetrator’s own sexual
interest” (Olson et al., 2007)
O Exists throughout CMC relationship between victim
and predator
O 4 subcategories
1. Personal information- details about victim and
predator’s locations, names, ages, etc.
2. Relationship details- discuss how each begin or
maintain relationships with friends or family
3. Activities- victim and predators’ preferred hobbies or
social behaviors
4. Compliments- predator or victim complimenting the
other on his or her qualities
Phase 3: Grooming
O “the subtle communication strategies that sexual
abusers use to prepare their potential victims to
accept the sexual conduct” (Olson et al., 2007)
O Two subcategories
1. Communicative desensitization
O Predator uses vulgar sexual language and attempts
to initiate or encourage interest within the victim
about sex
2. Reframing
O “contact or sex play between victim and adults that
may be communicated in ways that would make it
beneficial to the victim later in life” (Olson et
al., 2007)
O Sex portrayed as positive and beneficial learning
experience
Phase 4: Isolation
O Physical isolation- attempt to spend time alone with
victim
O Ensures victim has no parental supervision or is in a
private place when chat online
O Mental isolation- attempt to increase emotional
support and dependency
O Predator may provide sympathy and support to
victim’s problems
O “The predator seeks to isolate the victim and then to
fill the social gaps in the victim’s life as a tool to
facilitate abuse and gain control of the victim”
(Edwards et al., 2010)
Phase 5: Approach
O “The initial physical contact or verbal lead-ins
that occur prior to the actual sexual act”
(Olson et al., 2007)
O “The final step when the predator requests to
meet the victim offline with the intent of
beginning a sexual relationship” (Edwards et
al., 2010).
O After gains trust, provides grooming, isolates
minor from current social offline contacts and
ensures victim’s dependency on the
predator, then approaches
Examples of LCT Model in
Predators’ Language Use
(Edwards et al., 2010)
Examples of CMC between
Predators and Victims
(www.perverted-justice.com)
Where does this CMC occur?
O Internet
O Cell phones
O Social media sites
O Some examples (Datar & Mislan, 2010) :
O Chat rooms
Preventative Measures
O “Perverted-Justice.com”- “the largest and best
anti-predator organization online”
O This website has convicted more than 584 sexual
predators since June 2004 (Perverted-
Justice.com)
O Place “pseudo-adolescents” in chat rooms and
create decoy profiles in attempt to identify
internet predators and convict or incarcerate
them
Cyber Predators via CMC

More Related Content

What's hot

Kevin Cullen Cyber Bullying
Kevin Cullen Cyber BullyingKevin Cullen Cyber Bullying
Kevin Cullen Cyber Bullying
Kevin
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
ckeeling
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Zarmeen Durrani
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying
3610Instructor
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullying
hoskei
 
Cyber bullying vs traditional bullying
Cyber bullying vs traditional bullyingCyber bullying vs traditional bullying
Cyber bullying vs traditional bullying
Aliasgher Ahmedabadwala
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
Rishabh Kataria
 
Presentation -- CYBERBULLYING
Presentation  -- CYBERBULLYINGPresentation  -- CYBERBULLYING
Presentation -- CYBERBULLYING
Rene Ge
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
Apostolos Syropoulos
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigable
Khy Amigable
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Marisol Herrera
 
Cbp
CbpCbp
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
Trevschic
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
sepulvedamd
 
Revenge Porn and blackmiling
Revenge Porn and blackmilingRevenge Porn and blackmiling
Revenge Porn and blackmiling
ssuseraa5b90
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Jemerie Dale Villarin
 
Computer Based Sexual Harassment
Computer Based Sexual HarassmentComputer Based Sexual Harassment
Computer Based Sexual Harassment
Sejal Mehta
 
Bully
BullyBully
Bully
malah53560
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Doha qaradeh
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
SuphaphonP
 

What's hot (20)

Kevin Cullen Cyber Bullying
Kevin Cullen Cyber BullyingKevin Cullen Cyber Bullying
Kevin Cullen Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullying
 
Cyber bullying vs traditional bullying
Cyber bullying vs traditional bullyingCyber bullying vs traditional bullying
Cyber bullying vs traditional bullying
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Presentation -- CYBERBULLYING
Presentation  -- CYBERBULLYINGPresentation  -- CYBERBULLYING
Presentation -- CYBERBULLYING
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigable
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cbp
CbpCbp
Cbp
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
Revenge Porn and blackmiling
Revenge Porn and blackmilingRevenge Porn and blackmiling
Revenge Porn and blackmiling
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Computer Based Sexual Harassment
Computer Based Sexual HarassmentComputer Based Sexual Harassment
Computer Based Sexual Harassment
 
Bully
BullyBully
Bully
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 

Similar to Cyber Predators via CMC

Youth sexting: challenging victim blaming and abstinence, and exploring the r...
Youth sexting: challenging victim blaming and abstinence, and exploring the r...Youth sexting: challenging victim blaming and abstinence, and exploring the r...
Youth sexting: challenging victim blaming and abstinence, and exploring the r...
Emily Setty
 
sexting as a tool for victimisation.pdf
sexting as a tool for victimisation.pdfsexting as a tool for victimisation.pdf
sexting as a tool for victimisation.pdf
avninarula1
 
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptx
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptxDIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptx
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptx
afhkdfs
 
Adult Attachment Analysis
Adult Attachment AnalysisAdult Attachment Analysis
Adult Attachment Analysis
Rachel Davis
 
The Revelation of the Father - Week 11
The Revelation of the Father - Week 11The Revelation of the Father - Week 11
The Revelation of the Father - Week 11
PDEI
 
Week 5
Week 5Week 5
Week 5
Ray Brannon
 
Criminal Behavior Conditioning
Criminal Behavior ConditioningCriminal Behavior Conditioning
Criminal Behavior Conditioning
Jessica Myers
 
No One Noticed, No One Heard
No One Noticed, No One HeardNo One Noticed, No One Heard
No One Noticed, No One Heard
BASPCAN
 
The Effects Of Bullying Essay
The Effects Of Bullying EssayThe Effects Of Bullying Essay
The Effects Of Bullying Essay
Buy School Papers Online Cape Coral
 
The impact of bullying in adolescents on school
The impact of bullying in adolescents on schoolThe impact of bullying in adolescents on school
The impact of bullying in adolescents on school
Denni Domingo
 
Effects Of Bullying Essay
Effects Of Bullying EssayEffects Of Bullying Essay
Effects Of Bullying Essay
College Paper Writing Service Reviews
 
Research Presentation.pptx
Research Presentation.pptxResearch Presentation.pptx
Research Presentation.pptx
ColleenKayeAludia
 
Perception of Cyberbullying in Young Adults
Perception of Cyberbullying in Young Adults Perception of Cyberbullying in Young Adults
Perception of Cyberbullying in Young Adults
AbhramikaChoudhuri
 
1. Using a Microsoft Word document, please post one federal and on.docx
1. Using a Microsoft Word document, please post one federal and on.docx1. Using a Microsoft Word document, please post one federal and on.docx
1. Using a Microsoft Word document, please post one federal and on.docx
croysierkathey
 
Cyberbullying, #digitalmobbing 06042016 - Mona O´Moore
Cyberbullying, #digitalmobbing 06042016 - Mona O´MooreCyberbullying, #digitalmobbing 06042016 - Mona O´Moore
Cyberbullying, #digitalmobbing 06042016 - Mona O´Moore
Senter for IKT i utdanningen, redaksjon
 
What is sexting
What is sexting What is sexting
What is sexting
ValentinaRojas70
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
Larry Magid
 
ORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docx
ORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docxORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docx
ORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docx
honey690131
 
ORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docx
ORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docxORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docx
ORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docx
jacksnathalie
 

Similar to Cyber Predators via CMC (19)

Youth sexting: challenging victim blaming and abstinence, and exploring the r...
Youth sexting: challenging victim blaming and abstinence, and exploring the r...Youth sexting: challenging victim blaming and abstinence, and exploring the r...
Youth sexting: challenging victim blaming and abstinence, and exploring the r...
 
sexting as a tool for victimisation.pdf
sexting as a tool for victimisation.pdfsexting as a tool for victimisation.pdf
sexting as a tool for victimisation.pdf
 
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptx
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptxDIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptx
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptx
 
Adult Attachment Analysis
Adult Attachment AnalysisAdult Attachment Analysis
Adult Attachment Analysis
 
The Revelation of the Father - Week 11
The Revelation of the Father - Week 11The Revelation of the Father - Week 11
The Revelation of the Father - Week 11
 
Week 5
Week 5Week 5
Week 5
 
Criminal Behavior Conditioning
Criminal Behavior ConditioningCriminal Behavior Conditioning
Criminal Behavior Conditioning
 
No One Noticed, No One Heard
No One Noticed, No One HeardNo One Noticed, No One Heard
No One Noticed, No One Heard
 
The Effects Of Bullying Essay
The Effects Of Bullying EssayThe Effects Of Bullying Essay
The Effects Of Bullying Essay
 
The impact of bullying in adolescents on school
The impact of bullying in adolescents on schoolThe impact of bullying in adolescents on school
The impact of bullying in adolescents on school
 
Effects Of Bullying Essay
Effects Of Bullying EssayEffects Of Bullying Essay
Effects Of Bullying Essay
 
Research Presentation.pptx
Research Presentation.pptxResearch Presentation.pptx
Research Presentation.pptx
 
Perception of Cyberbullying in Young Adults
Perception of Cyberbullying in Young Adults Perception of Cyberbullying in Young Adults
Perception of Cyberbullying in Young Adults
 
1. Using a Microsoft Word document, please post one federal and on.docx
1. Using a Microsoft Word document, please post one federal and on.docx1. Using a Microsoft Word document, please post one federal and on.docx
1. Using a Microsoft Word document, please post one federal and on.docx
 
Cyberbullying, #digitalmobbing 06042016 - Mona O´Moore
Cyberbullying, #digitalmobbing 06042016 - Mona O´MooreCyberbullying, #digitalmobbing 06042016 - Mona O´Moore
Cyberbullying, #digitalmobbing 06042016 - Mona O´Moore
 
What is sexting
What is sexting What is sexting
What is sexting
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
ORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docx
ORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docxORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docx
ORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docx
 
ORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docx
ORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docxORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docx
ORIGINAL ARTICLEMeanings of Bodily and Sexual Expression i.docx
 

Recently uploaded

Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
GNAMBIKARAO
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
Infosec train
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 

Recently uploaded (11)

Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 

Cyber Predators via CMC

  • 1. Cyber Predators Lindsay E Comm 250: Communications & Technology
  • 2. “Cyber Predators”: Who are they? O Do not fit clinical profile of pedophiles since primarily target adolescents, not children O Indeed, 1 in 8 offenders arrested for actually committed crimes against adolescents (Wolak et al., 2013) O Seek certain characteristics: seek admiration from victims who may be sexually naïve; may fear adult relationships; want to “feel young”; feel empowered exerting power or control over naïve youth (Wolak et al., 2013) O May be primarily sexually attracted to adults but target youth for reasons including empowerment, impulse desires, curiosity, and anger
  • 3. The “cyber predators”: Who are they? (Wolak et al., 2013)
  • 4. The “cyber predators”: What do they do? O Spend as much as 6 hours/day searching for victims (Myers, 2014) O Have substantial amount of children in contacts on social networking sites O Keep “meticulous” notes on these victims or contacts O Rapidly shift from “grooming” to upfront sexualized conversations O Abandon these traditional “time-consuming” processes O “Offenders reported that, if a child did not respond to their online initiations, the offender would move on to another child; there was no need to bother with the process of grooming when immediately asking children for sex or to meet them produced results” (Myers, 2014). O Use the social media to “fast-track” abuse process
  • 5. “Cyber Victims”: Who are they? O 13-17 years old (Wolak et al., 2013) O ¼ are 13 years old O Characteristics and risky behaviors that increase likelihood of victimization: O Youth questioning their sexuality; youths with histories of sexual/physical abuse, and other troubled or confused youth; youths with poor relationships with parents; youths who frequent chat rooms, talk online to strangers about sex or who already engage in risky sexual behavior offline (Wolak et al., 2013)
  • 6. The “cyber victims”: Who are they? (Wolak et al., 2013)
  • 7. The “cyber victims”: What do they do? O Anonymity and Deception cause victims to not know who they are interacting with O 4/5 youth cannot tell difference between “chatting” with peer or an adult online (Myers, 2014) O Causes them to engage and respond to these predators O 5 common behavioral mistakes (Tedeschi, 2009) 1. “Broadcasting personal info to entire internet” 2. “Sharing Passwords” 3. “Befriending strangers” 4. “Baring their souls” (revealing too much intimate information via CMC) 5. “Forgetting their futures” (posting incriminating posts/pictures which may lead to unwanted consequences such as reducing employment chances or college enrollment opportunities)
  • 8. Modeling Predation Theory O Olson et al. Luring Communication Theoretical (LCT) Model O 5 phases of predation 1. Gaining access 2. Deceptive trust development 3. Grooming 4. Isolation 5. Approach
  • 9. Phase 1: Gaining Access O Predator must be “motivated and able to gain access to potential victims and their families” (Olson et al., 2007) O Exchanging of personal info between predator and victim O Gains this access through IM forums, MySpace or Facebook, chat room that contain minors
  • 10. Phase 2: Deceptive Trust Development O “a perpetrator’s ability to cultivate relationships with potential victims and possibly their families that are intended to benefit the perpetrator’s own sexual interest” (Olson et al., 2007) O Exists throughout CMC relationship between victim and predator O 4 subcategories 1. Personal information- details about victim and predator’s locations, names, ages, etc. 2. Relationship details- discuss how each begin or maintain relationships with friends or family 3. Activities- victim and predators’ preferred hobbies or social behaviors 4. Compliments- predator or victim complimenting the other on his or her qualities
  • 11. Phase 3: Grooming O “the subtle communication strategies that sexual abusers use to prepare their potential victims to accept the sexual conduct” (Olson et al., 2007) O Two subcategories 1. Communicative desensitization O Predator uses vulgar sexual language and attempts to initiate or encourage interest within the victim about sex 2. Reframing O “contact or sex play between victim and adults that may be communicated in ways that would make it beneficial to the victim later in life” (Olson et al., 2007) O Sex portrayed as positive and beneficial learning experience
  • 12. Phase 4: Isolation O Physical isolation- attempt to spend time alone with victim O Ensures victim has no parental supervision or is in a private place when chat online O Mental isolation- attempt to increase emotional support and dependency O Predator may provide sympathy and support to victim’s problems O “The predator seeks to isolate the victim and then to fill the social gaps in the victim’s life as a tool to facilitate abuse and gain control of the victim” (Edwards et al., 2010)
  • 13. Phase 5: Approach O “The initial physical contact or verbal lead-ins that occur prior to the actual sexual act” (Olson et al., 2007) O “The final step when the predator requests to meet the victim offline with the intent of beginning a sexual relationship” (Edwards et al., 2010). O After gains trust, provides grooming, isolates minor from current social offline contacts and ensures victim’s dependency on the predator, then approaches
  • 14. Examples of LCT Model in Predators’ Language Use (Edwards et al., 2010)
  • 15. Examples of CMC between Predators and Victims (www.perverted-justice.com)
  • 16. Where does this CMC occur? O Internet O Cell phones O Social media sites O Some examples (Datar & Mislan, 2010) : O Chat rooms
  • 17. Preventative Measures O “Perverted-Justice.com”- “the largest and best anti-predator organization online” O This website has convicted more than 584 sexual predators since June 2004 (Perverted- Justice.com) O Place “pseudo-adolescents” in chat rooms and create decoy profiles in attempt to identify internet predators and convict or incarcerate them