SlideShare a Scribd company logo
1 of 14
Online Pedophiles: Stay Internet Safe
What is a Pedophile? The diagnostic and statistical manual of mental disorders says a pedophile is:  The recurrent, intense presence of sexual urges and fantasies of at least six months' duration, involving sexual activity with prepubescent children.
What is an Online Pedophile? An adult Internet user who exploits vulnerable children or teens, usually for sexual or other abusive purposes. They may use internet sites such as myspace, facebook, or twitter, and they may also use an instant messaging program using screen names.
Is an online pedophile a sexual predator?  The term sexual predator is used pejoratively to describe a person seen as obtaining or trying to obtain sexual contact with another person in a metaphorically "predatory" manner. Comparable to how a predator hunts down its prey, so the sexual predator is thought to "hunt" for his or her sex partners. People who commit sex crimes, such as rape or child sexual abuse, are commonly referred to as sexual predators, particularly in tabloid media or as a power phrase by politicians.
The Answer? The answer is yes, however a predator hunts sexual partners of all ages, rather than just prepubescent children.  (Indiana Law Journal, 76(2).)
History  In the early 1980’s, through postings on bulletin board systems, pedophiles went online to swap illegal photos.  From there, these pedophiles could easily converse with others like themselves.  http://www.oprah.com/article/oprahdotcom/safety_kurt2
History: An Online Program Was Born     In 1995, the FBI created its Innocent Images National Initiative (IINI). Its goals: to break up networks of online pedophiles, to stop sexual predators from using the Internet to lure children from their families, and to rescue victims.
Continued    Today, 28 of the FBI's 56 field offices have undercover Innocent Images operations. More than 200 FBI Agents work these cases. Some pose as teenagers or pre-teens in chat rooms to identify “travelers” who seek to meet and abuse children. Others focus on dismantling major child exploitation enterprises.  
Continued    Since 1995, we’ve opened more than 10,000 total cases and helped secure nearly 3,000 convictions.  http://www.fbi.gov/page2/dec03/online120203.htm
A Similar Way to Catch an Online Pedophile http://www.youtube.com/watch?v=5UX2839kI_Y
Trends of an Online Pedophile 1. New, inexperienced children online-surf online with your children so they become familiar with the internet.  2. Lonely children- some children don’t have many friends and look online for people to befriend them.   3. Children who are having family problems- these children are looking for someone to listen to them.  4. Predators try to make children trust them, and make children think they are not strangers.  http://www.wiredsafety.org/cyberstalking_harassment/kids.html
Statistics 1. Forty percent of people charged with child pornography also sexually abuse children, police say. But finding the predators and identifying the victims are daunting tasks(Reuters, 2003). 2. One in five children who use computer chat rooms has been approached over the Internet by pedophiles. (Detective Chief Superintendent Keith Akerman, Telegraph.co.uk January 2002). 3. 13 million youth use Instant Messaging. (Pew Study reported in JAMA, 6/01).
Statistics Cont. 1 in 5 received sexual solicitation or approach in last year, and 1 in 33 received AGGRESSIVE sexual solicitation (asked to meet, called them via phone, sent mail, money or gifts). (Online Victimization, NCMEC, June 2000). 25% of youth who received sexual solicitation told a parent. (Online Victimization, NCMEC, June 2000). 44 percent of children polled have visited x-rated sites or sites with sexual content. Moreover, 43 percent of children said they do not have rules about Internet use in their homes. (Time/CNN Poll, 2000)
Statistics Cont.  7.  A study by the NOP Research Group found that of the four million children aged seven to 17 who surf the net, 29% percent would freely give out their home address and 14% would freely give out their e-mail address if asked. (Telegraph.co.uk January 2002) http://www.enough.org/inside.php?tag=stat%20archives#6

More Related Content

What's hot

Presentacion pornography
Presentacion pornographyPresentacion pornography
Presentacion pornographyhinpr18
 
Pornography and Censorship
Pornography and CensorshipPornography and Censorship
Pornography and CensorshipJemFlorece
 
3 ways cops are catching crooks
3 ways cops are catching crooks3 ways cops are catching crooks
3 ways cops are catching crookshunterfithen
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletLockley
 
Digital Youth and Sexual and Reproductive Health. Dra. Matilde Maddaleno
Digital Youth and Sexual and Reproductive Health. Dra. Matilde MaddalenoDigital Youth and Sexual and Reproductive Health. Dra. Matilde Maddaleno
Digital Youth and Sexual and Reproductive Health. Dra. Matilde Maddalenoderechoalassr
 
Criminal justice against child pornography
Criminal justice against child pornographyCriminal justice against child pornography
Criminal justice against child pornographyA Oneessays
 
Cat 200 Assignment 8
Cat 200 Assignment 8Cat 200 Assignment 8
Cat 200 Assignment 8leahmichele13
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyPHSD
 
Internet predators:parents clueless?
Internet predators:parents clueless?Internet predators:parents clueless?
Internet predators:parents clueless?migueltachna
 

What's hot (18)

Presentacion pornography
Presentacion pornographyPresentacion pornography
Presentacion pornography
 
Sexting
SextingSexting
Sexting
 
Pornography and Censorship
Pornography and CensorshipPornography and Censorship
Pornography and Censorship
 
3 ways cops are catching crooks
3 ways cops are catching crooks3 ways cops are catching crooks
3 ways cops are catching crooks
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutlet
 
Pornography
PornographyPornography
Pornography
 
Teens and Mobile Phones: Exploring safety issues as mobile phones become the ...
Teens and Mobile Phones: Exploring safety issues as mobile phones become the ...Teens and Mobile Phones: Exploring safety issues as mobile phones become the ...
Teens and Mobile Phones: Exploring safety issues as mobile phones become the ...
 
Digital Youth and Sexual and Reproductive Health. Dra. Matilde Maddaleno
Digital Youth and Sexual and Reproductive Health. Dra. Matilde MaddalenoDigital Youth and Sexual and Reproductive Health. Dra. Matilde Maddaleno
Digital Youth and Sexual and Reproductive Health. Dra. Matilde Maddaleno
 
Criminal justice against child pornography
Criminal justice against child pornographyCriminal justice against child pornography
Criminal justice against child pornography
 
ISC Presentation
ISC PresentationISC Presentation
ISC Presentation
 
Censorship
CensorshipCensorship
Censorship
 
Cat 200 Assignment 8
Cat 200 Assignment 8Cat 200 Assignment 8
Cat 200 Assignment 8
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Pornography: A Term Paper
Pornography: A Term PaperPornography: A Term Paper
Pornography: A Term Paper
 
Internet predators:parents clueless?
Internet predators:parents clueless?Internet predators:parents clueless?
Internet predators:parents clueless?
 
Tinder Case Study
Tinder Case StudyTinder Case Study
Tinder Case Study
 
Digital Citizens
Digital CitizensDigital Citizens
Digital Citizens
 
cyberworld
cyberworld cyberworld
cyberworld
 

Similar to prt. 1...Online Pedophiles

Social Media Impact on Missing Child Organization
Social Media Impact on Missing Child OrganizationSocial Media Impact on Missing Child Organization
Social Media Impact on Missing Child OrganizationLexie Stephens
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimesNilendra Kumar
 
Sex Trafficking of Children Volume102
Sex Trafficking of Children Volume102Sex Trafficking of Children Volume102
Sex Trafficking of Children Volume102Tigrai Harris
 
aw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenaw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenJanet Weninger
 
Justine- pedophile laws
Justine- pedophile lawsJustine- pedophile laws
Justine- pedophile lawsJustine
 
Grant Proposal Excerpt Build Your Own NGO
Grant Proposal Excerpt Build Your Own NGOGrant Proposal Excerpt Build Your Own NGO
Grant Proposal Excerpt Build Your Own NGOEricka Rodas
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internetmalissa_1041
 
Pan Cheshire CSE Protocol
Pan Cheshire CSE ProtocolPan Cheshire CSE Protocol
Pan Cheshire CSE ProtocolBilly Elliott
 
04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshopforensicsnation
 
Pinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch WorkshopPinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch Workshopforensicsnation
 
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineMichael Heron
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and ChildrenBarry Caplin
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaAlexander Berta
 

Similar to prt. 1...Online Pedophiles (20)

Social Media Impact on Missing Child Organization
Social Media Impact on Missing Child OrganizationSocial Media Impact on Missing Child Organization
Social Media Impact on Missing Child Organization
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimes
 
Sex Trafficking of Children Volume102
Sex Trafficking of Children Volume102Sex Trafficking of Children Volume102
Sex Trafficking of Children Volume102
 
Modern Day Slavery
Modern Day SlaveryModern Day Slavery
Modern Day Slavery
 
aw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenaw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-children
 
Justine- pedophile laws
Justine- pedophile lawsJustine- pedophile laws
Justine- pedophile laws
 
Grant Proposal Excerpt Build Your Own NGO
Grant Proposal Excerpt Build Your Own NGOGrant Proposal Excerpt Build Your Own NGO
Grant Proposal Excerpt Build Your Own NGO
 
Preventive measures for the protection of children against sexual abuse
Preventive measures for the protection of children against sexual abusePreventive measures for the protection of children against sexual abuse
Preventive measures for the protection of children against sexual abuse
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
 
Pan Cheshire CSE Protocol
Pan Cheshire CSE ProtocolPan Cheshire CSE Protocol
Pan Cheshire CSE Protocol
 
04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop
 
Pinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch WorkshopPinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch Workshop
 
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
 
Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101
 
Teens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & CyberbullyingTeens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & Cyberbullying
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
 
Teens and Sexting
Teens and SextingTeens and Sexting
Teens and Sexting
 
PY622 Final Paper (correct)
PY622 Final Paper (correct)PY622 Final Paper (correct)
PY622 Final Paper (correct)
 

Recently uploaded

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

prt. 1...Online Pedophiles

  • 1. Online Pedophiles: Stay Internet Safe
  • 2. What is a Pedophile? The diagnostic and statistical manual of mental disorders says a pedophile is: The recurrent, intense presence of sexual urges and fantasies of at least six months' duration, involving sexual activity with prepubescent children.
  • 3. What is an Online Pedophile? An adult Internet user who exploits vulnerable children or teens, usually for sexual or other abusive purposes. They may use internet sites such as myspace, facebook, or twitter, and they may also use an instant messaging program using screen names.
  • 4. Is an online pedophile a sexual predator? The term sexual predator is used pejoratively to describe a person seen as obtaining or trying to obtain sexual contact with another person in a metaphorically "predatory" manner. Comparable to how a predator hunts down its prey, so the sexual predator is thought to "hunt" for his or her sex partners. People who commit sex crimes, such as rape or child sexual abuse, are commonly referred to as sexual predators, particularly in tabloid media or as a power phrase by politicians.
  • 5. The Answer? The answer is yes, however a predator hunts sexual partners of all ages, rather than just prepubescent children. (Indiana Law Journal, 76(2).)
  • 6. History In the early 1980’s, through postings on bulletin board systems, pedophiles went online to swap illegal photos. From there, these pedophiles could easily converse with others like themselves. http://www.oprah.com/article/oprahdotcom/safety_kurt2
  • 7. History: An Online Program Was Born In 1995, the FBI created its Innocent Images National Initiative (IINI). Its goals: to break up networks of online pedophiles, to stop sexual predators from using the Internet to lure children from their families, and to rescue victims.
  • 8. Continued Today, 28 of the FBI's 56 field offices have undercover Innocent Images operations. More than 200 FBI Agents work these cases. Some pose as teenagers or pre-teens in chat rooms to identify “travelers” who seek to meet and abuse children. Others focus on dismantling major child exploitation enterprises.  
  • 9. Continued Since 1995, we’ve opened more than 10,000 total cases and helped secure nearly 3,000 convictions. http://www.fbi.gov/page2/dec03/online120203.htm
  • 10. A Similar Way to Catch an Online Pedophile http://www.youtube.com/watch?v=5UX2839kI_Y
  • 11. Trends of an Online Pedophile 1. New, inexperienced children online-surf online with your children so they become familiar with the internet. 2. Lonely children- some children don’t have many friends and look online for people to befriend them.   3. Children who are having family problems- these children are looking for someone to listen to them. 4. Predators try to make children trust them, and make children think they are not strangers. http://www.wiredsafety.org/cyberstalking_harassment/kids.html
  • 12. Statistics 1. Forty percent of people charged with child pornography also sexually abuse children, police say. But finding the predators and identifying the victims are daunting tasks(Reuters, 2003). 2. One in five children who use computer chat rooms has been approached over the Internet by pedophiles. (Detective Chief Superintendent Keith Akerman, Telegraph.co.uk January 2002). 3. 13 million youth use Instant Messaging. (Pew Study reported in JAMA, 6/01).
  • 13. Statistics Cont. 1 in 5 received sexual solicitation or approach in last year, and 1 in 33 received AGGRESSIVE sexual solicitation (asked to meet, called them via phone, sent mail, money or gifts). (Online Victimization, NCMEC, June 2000). 25% of youth who received sexual solicitation told a parent. (Online Victimization, NCMEC, June 2000). 44 percent of children polled have visited x-rated sites or sites with sexual content. Moreover, 43 percent of children said they do not have rules about Internet use in their homes. (Time/CNN Poll, 2000)
  • 14. Statistics Cont. 7. A study by the NOP Research Group found that of the four million children aged seven to 17 who surf the net, 29% percent would freely give out their home address and 14% would freely give out their e-mail address if asked. (Telegraph.co.uk January 2002) http://www.enough.org/inside.php?tag=stat%20archives#6