This document discusses the challenges posed by increasing cybersex and pornography enabled by advancing technology. It notes growing areas of concern like online child exploitation, revenge porn, and normalization of violence. The landscape tends toward increasing harm, though prosecution faces challenges. Effects on society include changing views of relationships and gender. The church struggles to address this issue, as porn use is common yet shameful. Cybersex has become an elephant in the room that hinders hearing the gospel. More work is needed to help Christians struggling with porn.
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...Stevecd
Presentation on Safeguarding children online produced and presented by Stephen Carrick-Davies to the Diocese of Southwark. This training presentation was for a 3 hour session and looked at key issues of
Understadaning the reality
Understadngin the risks
Understanding our responsibilities.
OMSI Science Pub - Sex, Relationships, and TechnologyOMSI Science Pub
"Sex, Relationships, and Technology"
This Science Pub took place on Tuesday, March 30, 2010, at the Mission Theater in Portland, Oregon. It was presented by Dr L. Kris Gowen from Portland State University. You can check her blog here: http://healthysexedu.blogspot.com/
Spoiler alert! Dr. Taylor will giving this same talk at the Science Pub-Mission Theater in Portland on Tuesday, February 16, 2010.
Clarissa Windham-Bradstock, COO, Any Lab Test Now presentation.
Amazing things happen when an entire organization begin to use social media. What happens when it all goes wrong? Clarissa shares very candid information about this topic and how she and Any Lab Test Now franchise system dealt with the "cyber harassment".
Raising Children in a Digital Age for Foundation Business Degree @MMUBSBex Lewis
Looking at 'Raising Children in a Digital Age' as useful information for Foundation Business Students at MMU - helping them look at responsibilities, the culture they're engaging with - especially if creating content online to create a safer online environment
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...Stevecd
Presentation on Safeguarding children online produced and presented by Stephen Carrick-Davies to the Diocese of Southwark. This training presentation was for a 3 hour session and looked at key issues of
Understadaning the reality
Understadngin the risks
Understanding our responsibilities.
OMSI Science Pub - Sex, Relationships, and TechnologyOMSI Science Pub
"Sex, Relationships, and Technology"
This Science Pub took place on Tuesday, March 30, 2010, at the Mission Theater in Portland, Oregon. It was presented by Dr L. Kris Gowen from Portland State University. You can check her blog here: http://healthysexedu.blogspot.com/
Spoiler alert! Dr. Taylor will giving this same talk at the Science Pub-Mission Theater in Portland on Tuesday, February 16, 2010.
Clarissa Windham-Bradstock, COO, Any Lab Test Now presentation.
Amazing things happen when an entire organization begin to use social media. What happens when it all goes wrong? Clarissa shares very candid information about this topic and how she and Any Lab Test Now franchise system dealt with the "cyber harassment".
Raising Children in a Digital Age for Foundation Business Degree @MMUBSBex Lewis
Looking at 'Raising Children in a Digital Age' as useful information for Foundation Business Students at MMU - helping them look at responsibilities, the culture they're engaging with - especially if creating content online to create a safer online environment
Youth Communication and Privacy in the Social Media AgeNathan Wright
"Youth Communication and Privacy in the Social Media Age" presentation given at the American Library Association's youth privacy conference in Chicago on March 24, 2011.
A special issue on Dr David Alesna, Past President of the PDA Cebu Dental Chapter and how he has successfully driven the Green Apple Dental Clinic with his excellent business acumen.
Youth Communication and Privacy in the Social Media AgeNathan Wright
"Youth Communication and Privacy in the Social Media Age" presentation given at the American Library Association's youth privacy conference in Chicago on March 24, 2011.
A special issue on Dr David Alesna, Past President of the PDA Cebu Dental Chapter and how he has successfully driven the Green Apple Dental Clinic with his excellent business acumen.
Internet Safety for Families and ChildrenBarry Caplin
The Internet is a useful and important part of our daily lives. Many can't
remember how we handled even the most mundane tasks without online
assistance. How did we even survive when we were kids? :-) However, along
with the good, there is bad. Children and teens (but not their parents!) are
very well versed in using the Internet, including web pages, blogs,
uploading and downloading information, music and photos, etc. They are also
trusting. This presentation will give an overview of the Internet and the
inherent dangers. Learn the realities and dangers of ``virtual communities''
websites your kids frequent like Xanga.com, MySpace.com and FaceBook.com.
Learn about the persistence of information on the net and Google hacking.
Learn the differences between a wiki, blog, Instant Messaging, text
messaging, and chat. Learn the Internet slang, key warning signs, and tips
for Parents and Kids. This talk is for anyone who has a child, who knows a
child, or who ever was a child!
High Impact Seminars
www.mannrentoy.com
Email Mann Rentoy: info@mannrentoy.com
For more information on seminars for teachers, parents and students: www.mannrentoy.com
Digital Citizenship Symposium - Slide CompilationAlec Couros
Compilation of all slides (10 presentations) for the Digital Citizenship Symposium in Calgary Alberta, September 23-24, 2010 by Dean Shareski and Alec Couros.
Internet Pornography Addictionand Priestly FormationMediu.docxnormanibarber20063
Internet Pornography Addiction
and Priestly Formation:
Medium and Content Collide with
the Human Brain
Sr. Marysia Weber, R.S.IVI., D.O.
last two decades, mental health profes-
ls have reported a growing number of people whoep
er. therapy seeking to address their increasedÍ e s e n t / ^ . therapy seeking to address their increased
urge to view Internet pornography. Accurate statistics re-
garding the use of Internet pornography are difficult to
locate; however, available research demonstrates prolific
numbers of pornographic Internet sites. According to
available data, "sex" is the number one search topic on
the Internet, with at least 4.2 million reported porno-
graphic websites currently available, signaling a fourfold
increase since 2003. Daily, there are 68 million porno-
graphic search engine requests.' An estimated 40 million
adults in the U.S. regularly view Internet pornography,
10 percent of whom admit to having an addiction to
Internet pornography. While males constitute the ma-
jority of users, one in three women view pornography.^
Researchers now predict that millions of Americans are
addicted to Internet pornography. In fact, sources assert
that the number of users of Internet pornography has
skyrocketed, making Internet pornography the foremost
addiction in the world.^
Studies also indicate that boys aged 12 to 17 are
the largest consumers of Internet pornography. This
is because of hormonal changes during puberty that
enhance sexual arousal and curiosity and contribute to
interest in sexual exploration. Recent surveys report that
90 percent of teenage boys view online pornography
while doing homework.'* Additionally, young, sexually
An estimated 40 million
adults in the U.S. regularly
view Internet pornography,
10 percent of whom admit
to having an addiction to
Internet pornography.
inexperienced persons, especially males, find it easier to
engage in sexual behavior through Internet pornography
than to risk rejection in the context of a face-to-face en-
counter with a real person.
The expansive reach of Internet pornography has
also touched a very young demographic. Notably, the
average age of children who are first exposed to Internet
pornography is 11 years old.^ Exposure to Internet por-
nography in children four to five years old is also being
reported. In his pastoral letter. Bought at a Creat Price,
Bishop Paul Loverde writes:
The [pornography] industry preys on the most
vulnerable: the poor, the abused and marginal-
ized, and even children. This exploitation of the
weak is gravely sinful. Whether need, confusion,
or alienation leads men and women to become
pornographic objects, their choice to do so cer-
107
Seminary Journal Theme: Intercultural Competence
tainly cannot be seen as free. Those who pro-
duce and distribute pornography leave a wide
path of broken and devalued men and women
in their wake.
More and more of these victims are younger,
even children. When these, the most vulnerable
and innocent of.
sexting as a tool for victimisation.pdfavninarula1
Sexting, the act of sending sexually explicit messages, photos, or videos via electronic devices, can have serious negative consequences for individuals involved. Here are some potential dark sides of sexting:Several studies have identified a relationship between cyberbullying and sexting behaviors. Fahy et al.’s investigation emphasizes the high prevalence of cyberbullying and the potential of cyber-victimization as a risk factor for future depressive symptoms, social anxiety symptoms, and below average well-being among adolescents. Their results show that cyber-victims and cyberbully-victims were significantly more likely to report symptoms of depression and social anxiety.
Victimization through sexting can take many forms, including: Coercion, Exploitation, Revenge, Cyberbullying
This was a presentation to 9th graders to help them explore how to take control of their online persona. Examples reach back in time and project into the future when things like augmented reality amplify the information we put online.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
2. Motivation / Goals
• To shine light areas of life that are sometimes (extremely) dark and with bad consequences.
• To raise awareness of how we are allowing technology to shape us, to form us
• To make a “shout out” to culture , to “our youth” and to our “Churches” that being formed as
we are by technology is a big deal.
• To encourage discussions in-spite of and because of the “yuk” or “uncomfortable factor”
• To provide, research and evidence for the pressing nature of this discussion.
3. Agenda
1. CyberSex definition
2. CyberSex Landscape overview
3. CyberSex detailed look at some aspects
4. CyberSex & the Church
5. Summary/Conclusion
4. CyberSex
Wikipedia:
Cybersex, also called computer sex, Internet sex, netsex and,
colloquially, cyber or cybering, is a virtual sex encounter in which two or more people
connected remotely via computer network
Additionally:
Any computer technology, application or service that directly enables, influences or
affects human sexual activity and relationships.
5. CyberSex – Landscape
Virtual Reality/Augmented
Reality Porn
RPG
2nd life
WoW
Headsets/devices
High Speed Internet Porn
Anim(ated)
Revenge Porn
Child Sexual
Exploitation
Material
(CEM)
Recorded/stored
Online Sexual
Exploitation
of Children
(OSEC)
live stream
Sex trafficking
Deep fakes
AI Porn
AI
Generated Porn
DeepFake
Revenge Porn
Sex slavery
Austrac
BitCoin / BlockChain
Normalisation of
violence against
women
Dating Apps
Cheating
Apps
Sexting / Sextortion
Encryption
Social Media Platforms
AI
Sex Robots
Grooming
6. Dating Apps
Changed/ing how we meet
potentially who we meet :-
• Upgrading
• Increased “pace”
• Hook-ups
• “relies on behavioural
matching technology”
(but then provides photos ? )
• Money (our relationships
are big business)
• (claim) increasing use of AI
7. Dating apps use 2017 (USA data)
https://www.barna.com/research/trends-redefining-romance-today/
8. Cheating Sites / Apps
https://www.thetalko.com/12-cheating-apps-you-dont-
want-to-find-on-his-phone
Examples.
• Nosy Trap
• hide images, c.f. password catch, takes photo
of anyone checking your phone
• Private Photo (appears as a calculator ,but hides
images)
• Fox Private Message: messages destruct or destruct
with a shake of the phone
• Dead Tone : replies with a dead tone to listed
numbers, used for ensuring ex affairs can’t contact
your phone.
• Tinder,Ashley Maddision etc
10. … Fully 62 percent of teens and young
adults say they have received a nude
image—generally from a boyfriend or
girlfriend. Forty percent have sent a
nude image—again, usually to a
boyfriend or girlfriend.
Sexting
…Porn 2.0 is a new step in pornography because it is
personal. And it is a particularly dangerous step because it
invites us to not only sexualize our relationships—which
we’ve already been doing for a plenty long time—it also
invites us to disembody and therefore detach from our
relationships.To, in short, objectify them.
11. https://www.abc.net.au/news/2020-06-03/spike-reports-esafety-commissioner-coronavirus-shutdown/12314442
"This is a combination of what you might call sexting
gone wrong, people relying on more digital intimacy
tools to share affection, love, sexual gratification, rather
than meeting physically in person during lockdown,” –
eSaftey commisioner
"But we've also seen a huge sextortion
scam that has surged.
"It comes in the form of an email that
scares people into paying cryptocurrency
payments with the threat they've hacked
into their computer because they have a
password compromised in an earlier data
breach."
The Federal Government is planning to
introduce a new Online Safety Act to
Parliament later this year and says it will also
include a new Adult Cyber Abuse scheme.
Sextortion
14. Porn pervasiveness
• 42B visits
• 1.36M hrs of new content
• Australia is about 9th in consumer list
• Teen is and has long been one of the most searched for
categories
• (claim) 3% increase in females using to 32% (How?)
• 76% of traffic from phones/mobile devices
Globally, porn is a $97 billion industry,
according to Kassia Wosick, assistant
professor of sociology at New Mexico State
University. At present, between $10 and $12
billion of that comes from the United States.
https://www.nbcnews.com/business/business-news/things-are-looking-
americas-porn-industry-n289431
OZ GDP 2019 = $A 1450
17. Porn Harms – viewers
They believe there's an expectation
on them that they should be doing
this sort of stuff.
These aren't girls who have been plucked off the street and raped, Ms
McLean said, nor cornered at parties by drunken boys.
These acts are happening in bedrooms across the country where the
portability of the internet has enabled kids — and adults like Steve —
to load a porn video on their phone, show it to their partner and say,
"Here, do this".
Driven to violence
• > 90% & 60% girls have seen online porn.
• 88% of the most popular porn includes physical aggression.
• Porn producers overseas made a conscious effort to make their content more violent.
• things that were seen as pushing the boundaries in the late 1990s have become very much normal and
mainstream.
• Many more injuries to girls
18. Porn categories – sad examples
Why does porn get a free pass?
…. And last month, the world’s largest porn site released the most
watched porn categories of 2018, and racially stereotypical content
topped the charts. But there was not the same kind of outrage or
boycotting for this porn site, or any other porn site that hosts
dramatization videos of “African slaves” (trigger warning: link leads
to explicit tweet) being abused by powerful caucasian individuals,
packaged as sexual entertainment.
https://fightthenewdrug.org/porn-industry-
thrives-on-promoting-racism/
19. Porn Harms – providers
• Many times rape gets uploaded as porn to be consumed
for pleasure (lets think about that )
• eSaftey officer : It means Australia's regulations don't
curtail violent or "objectionable" porn being watched
locally, they simply stop it being hosted here.
https://fightthenewdrug.org/porn-industry-fought-to-stop-
keeping-records-of-performers-ages/
https://pubmed.ncbi.nlm.nih.gov/30355053/. ---
These videos portray aggression and
degradation as both consensual- i.e., men
dominating willing women-and sensual-
i.e., producing pleasure for both men and
• There are multiple links between
porn and sex trafficking / slavery
• Drugs, depression are common
• Suicide ?
20. Revenge porn :
• distribution of sexually explicit images or
video of individuals without their permission
• To extract get revenge / harm
• Sextortion i.e. blackmail
• mostly illegal but not always and not
effectively ….
Revenge Porn
Dark web : revenge porn seems rife
21. Porn in the digital age: 10 trends
1. There is Moral Ambiguity Toward Porn, Particularly Among Younger Americans
2. Varied opinions about what constitutes porn
3. 1 in 3 Americans seeks out porn at least once a month
4. Age gender and faith practice are the 3 biggest factors in porn use (practicing Christians less likely)
5. Young adults use more porn – less likely to say it is bad for society
6. Teens and young adults rank “not recycling” as more immoral than viewing porn
7. Most porn users say it doesn’t bother them to use porn
8. Very few adults (1 in 5) feel a sense of guilt when using porn (29% of practicing Christians do vrs 12% on
non practicing Christians)
9. Most porn users are ok with the amount of porn they use – but practicing Christians are divided
10. Few adults are trying to stop using porn
Porn – Barna findings (2016)
https://www.barna.com/research/porn-in-the-digital-age-new-research-reveals-10-trends/
23. Johansson has been superimposed into dozens of graphic sex
scenes over the past year that have circulated across the Web:
One video, falsely described as real “leaked” footage, has been
watched on a major porn site more than 1.5 million times. She
said she worries it may already be too late for women and children
to protect themselves against the “virtually lawless (online) abyss."
https://www.washingtonpost.com/technology/2018/12/30/f
ake-porn-videos-are-being-weaponized-harass-humiliate-
women-everybody-is-potential-target/
Deep Fakes/Deep Fakes Revenge Porn
https://youtu.be/AmUC4m6w1wo
24. Deep Fakes – very easy , common
Upload
5 mins later same photo
minus clothes
Deepfake algorithms are
open-source, easily
accessible to anyone with
basic programming skills
and a reliable Internet
connection.
25. • “Deepfakes are a powerful and dangerous new technology that can be weaponized to sow
misinformation and discord among an already hyper-partisan electorate,” Berman said in a
statement. “Deepfakes distort the truth, making it extremely challenging to distinguish real events
and actions from fiction and fantasy.”
• But the new deepfakes law will face a number of roadblocks, said Jane Kirtley, a professor of media
ethics and law at Hubbard School of Journalism and Mass Communication, as political speech
enjoys more protections in print and online than in broadcast. Because of free speech protections,
it may be easier to challenge deepfake videos through copyright claims than through the new laws,
she said.
• https://www.theguardian.com/us-news/2019/oct/07/california-makes-deepfake-videos-illegal-but-
law-may-be-hard-to-enforce
Deep Fakes + the law
26. AI Generated Porn (not deepfake)
It appears that this effort was not yet commercially viable but as AI research
advances that may change.
33. May 25th 2020
OSEC
Definitions
OSEC = Online Sexual Exploitation of Children (live)
CEM = Child Exploitation Material (recorded)
OSEC Trafficker : uses the internet to sexually abuse or
exploit a child through offering CSEM and/or offering
a child for the purpose of hands on exploitation (for
money)
OSEC Customer : the person who pays for the CEM or
for the child to be abused on camera (often the
customer will direct the abuse real-time)
CyberTipLine Report : reports received by the
National Center for Missing and Exploited Children
35. OSEC – demand and supply
Supply
Developing
Country/
Countries
Demand = Rich West
rich exploiting the poor
Other supply countries are already
starting to emerge / follow
36. OSEC / CEM detection
Detect images (stored)
Project Arachnid (Canadian)
• web crawler to inspect links/images/video
• 100K images per month highlighted for
human inspection (and growing)
Detect live-stream
(potentially not stored)
Detect payments
37. OSEC – prosecution
• Plea deals
• VIDI : to limit re-victimisation (during court process)
• Specialised training
38. OSEC / CEM – devastation
Re-victimization: it can be impossible to remove
content from internet
Shattered lives : damage is profound
Shattered families (victims and perpetrators)
Such a huge need to care for shattered kids
https://ijm.org.au/blog/reconciliation
-after-cybersex-trafficking/
42. Encryption
Hampers and even prevents detection of CEM and OSEC
Hampers collection of evidence for CEM and OSEC
There is a BIG discussion here (for another day)
43. Austrac
AUSTRAC overview
AUSTRAC is the Australian Government
agency responsible for detecting, deterring
and disrupting criminal abuse of the
financial system to protect the community
from serious and organised crime.
Financial oversight & detecting/reporting
financial payments for OSEC / CEM is key
44. CyberSex Landscape – tends to increasing harm
Child Sexual
Exploitation
Material
(CEM)
Recorded/stored
Online Sexual
Exploitation
of Children
(OSEC)
live stream
Sex trafficking
Sex slavery
Normalisation of
violence against
women
Sexting / Sextortion
High Speed Internet Porn
Anim(ated)
Revenge Porn
Deep fakes
AI Porn
AI
Generated Porn
DeepFake
Revenge Porn
Dating Apps
Cheating
Apps
VR/AR Porn
RPG
2nd life
WoW
Headsets/devices
AI
Sex Robots
Grooming
BitCoin / Blockchain
Encryption
Social Media Platforms
Financial Tech
Dual Use Technologies
Harm
Austrac
45. Summary – We are being changed
“There is some indication that porn has a liberalizing effect:
heterosexual male users are more likely than their peers to
approve of same-sex marriage. On the other hand, they’re less
likely to support affirmative action for women”
https://time.com/4277523/girls-sex-women-porn/
“Porn has terrible effects on what young
women believe they are supposed to
look like, particularly during sex,” said
Leslie Bell, a psychotherapist and author
of Hard to Get.
46. Challenges for the Church
• Porn and CyberSex are hard to talk about for the church
• Porn industry and media successfully paint porn as “normal and freeing”
• The pervasiveness and biological pull of porn mean many many Christians
struggle with porn and therefore also feel a great deal of shame.
• So if you have a porn problem : is it easier to give up going to church or to
stop using porn ?
• How actively are Churches helping folks engage in the struggle
• Sexting with Christian kids is extremely common (growing)
Orthodox priest : most of the confessions I hear these days are for
sins not possible 20 years ago
In the Church
Teen Boys
Teen Girls
Married
Single
Pastors
Elders
Leadership team
CyberSex is often the elephant in the room making the Gospel hard to hear.
47. Consider
More content is generated => more participants needed
As technology enables
and even drives porn use
(clicks/views/searches)
the …
More Money is generated
More Increasingly graphic / hard-core content is needed to satisfy
More child porn is created, more children harmed , victimized
and re-victimised
More relationships are affected
More “teen” category content is searched”
More our girls require surgical repair after imitating porn participants
More our girls want surgery to imitate the porn participants
More people are objectified
More violent content (including rape) is produced
All of which
adds demand
48. Conclusion
• If you care about women and girls
• If you care about mental health
• If you care about child exploitation
• If you care about sex trafficking
• If you care about social justice
• If you are a Church trying to reach young people with
“the good news of the Gospel”
• Increasingly folks in your church ”struggle with porn”
You very likely need to get
(more) educated and pay
more attention to how the
CyberSex landscape is
affecting us all
The Gospel of Jesus Christ has unique resources to address all challenges of the CyberSex landscape !
49. Call to action on OSEC/CEM
• Check out http://ijm.org & help fight OSEC (e.g. ask/help your church to
participate in freedom Sunday
• Get involved in efforts such as
https://endsexualexploitation.org/articles/international-coalition-calls-on-
major-card-companies-to-cease-work-with-porn-industry/
• Talk to adolescents about their “porn challenge”
• Learn how to educate/prepare your young kids (8 yrs)
• Check out https://www.covenanteyes.com for help with your own porn
struggle and “do engage” in the struggle.
• Check out http://ftnd.org
Matt Fradd 10 Myths about pornography
https://www.youtube.com/watch?v=xhkRbsmCv1s