<<

‘Online Child Exploitation’ Parent / Carer Information Workshop

Social Media / Gaming – Children, Young Adults & Adults What is the Risk, What is the Danger, What is the Harm?

Jonathan Taylor MSc Criminology & Criminal Psychology Child Protection & Internet Safety Consultant Online Safety is Predominantly about Behaviour But Technology can Assist

1. Get Involved – Use same Apps / / Games - Talk Physical 2. Adhere to Age Restrictions (Apps & Games, if & where possible. Physical 3. Check Contacts List & Friends & Opponents Physical 4. Be part of Closed Groups-Clash of Clans / WhatsApp / Fifa /Discord Physical 5. Cover Up Webcam when not Using (Webcam Compromise) Physical 6. Don’t use Streaming of Videos (eg ) Physical 7. Use Social Media Positively - Twitter / LinkedIn / Blogging Physical 8. Speak to Schools THIS IS TEAMWORK Physical 9. Use Family Sharing (Ipads / Iphone) – Family Link (Android) Settings Practical 10.Switch off Sync on Android Phones / Tablets Settings Practical 11.Use Location Settings when required Settings Practical 12.Switch Off Location Settings on Childs / Young Adults Phones Settings Practical 13.Test App games by switching off WiFi & Mobile Data Settings Practical 14.Restrict WiFi Access (Times) via Modem Settings Practical 15.Use filters to restrict access (Parental Controls & Software) Settings Practical

Understand the Risks to Restrict Escalation to Online Dangers by Preventing Inappropriate Behaviour The Power of Image Create, Connect and Share Respect What is Expected of ALL Schools / Colleges / Academies? Training / Workshops Controlled

i. Online Safety CPD Training for ALL Staff

ii. Whole year group presentations on Online Safety & Social Media / Gaming awareness

iii. Online Safety Policy

iv. AUP (acceptable use policies / agreements)

v. Filtering & Monitoring of Schools Internet Access Offered not Controlled

i. Parental Information Evenings Optional but Advised

i. OSO (Online Safety Officers)

ii. BYOD Days

iii. Social Media Questionnaire (ICT / PSHE) Bespoke Online Safety Workshops for Pupils What Do Children & Young Adults do Online ? What are the Dangers they can face ? Are they all Vulnerable ?

Poverty Neglect Affluent Neglect Special Needs Vulnerability can be ‘Amplified’ No Supervision Excessive Use Inappropriate Behaviour 3 ‘C’s’ Social Media & Digital Knowledge / Usage / Understanding

Digital Immigrant or Digital Visitor DIGITAL DIVIDE Digital Native or Digital Resident Remember : Visitors Always Learn from Residents or Parents / Adults Learn From YOU • Questions – Students / Parents / Teachers • 1. How Many students use an IPad / Iphone? Android Tablet / Mobile? • 2 How many have asked 'Siri' ‘Cortana’’ OK Google’ ‘Alexa’ a 'silly' question? • 3. How many use Whats App / We Chat / Line / Pokemon Go? • 4. How Many use / Instagram / Whats App / Roblox / Tik Tok / Fortnite ? • 5. How many have heard of Viber/ Tango / Team Speak? • 6. How Many use X-Box / Play Station - GTA / Assassin / Fifa 18 / Destiny / Call of Duty / Fortnite? • 7 How Many have heard of Talking Angela / Slender Man / Bloody Mary? • 8 Who has heard of Cat Fishing / Spoofing / Ratting / Vamping ? • 9 How many use –Who has the longest ‘Streak’ ? • 10 How many can install apps, how many know their parents Apple Id password? • 11 Who covers their Web Cam – if you do ‘Why’ ? • 12 How many play online games with 'headphones & microphones'? • 13 How many know 'You Tubers' if so who.? eg KSi/ Zoella / Logan Paul/ Side Men • 14. If you heard or saw something inappropriate on a site / app / game / or messaging service who would you tell.....? • 15 Are you aware of Google Data Retention (SYNC) via device usage • 16 Who switches Location Services (GPS) off and then on when they need it? • 17 Who uses Putlocker , , 123Movies or searches for Movies on Google? • 18 Are you aware of 'Cyber Vetting‘ (Uni’s Colleges / Work) Online Dangers; Inappropriate Content Online Privacy Inappropriate Selfies (Sexting) Online Grooming / Sextortion Online Bullying Radicalisation Digital Tattoo Issues Inappropriate Content Inappropriate Selfies or Sexy Selfies (Sexting) •Pornography •Sending or Posting Explicit Pictures •Violence •2.5% of teens have ‘sexted’ •Hate Speech •7% say they received a sext •Risky or illegal Behaviours Sexual Solicitation (Grooming) •Challenges •Any unwanted sexual request or any sexual request by an adult Sextortion (Disasters) Online privacy •Whats Ok – Pictures of Family & Friends (with Online Bullying permission) Casual Chat in Games •Mean Messages •Photoshoping pictures •Whats Not Ok - Certain Personal Information •Fake profiles •Rumours •Threats or Harassment Children’s lives are increasingly lived Online

12 – 15 year olds using a Tablet 8 – 11 year olds using a Tablet

80% 74%

1% 2%

2010 2016 2010 2016 Children’s lives are increasingly lived Online

12 – 15 year olds who own a 8 – 11 year olds who own a smartphone smartphone

32% 79%

12% 35%

2010 2016 2010 2016 Equal Protection Online as Offline ? Websites – Social Media – Games Consoles – Apps No age Some Ages PEGI Some Age

“ANYONE CAN TALK TO YOU AND THEY CAN ASK FOR PERSONAL DETAILS LIKE WHERE YOU LIVE AND YOUR AGE. THEY CAN ASK YOU TO DO THINGS YOU DONT WANT TO DO” 12 YEAR OLD Equal Protection Online as Offline ?

Currently the law doesn’t give Children the same protection online as offline

We Wouldnt Let Our Children...... But Online

Walk Into Sex Shops Takes Just a Few Clicks Can you have an Instagram Facebook / Twitter / Snapchat / Pinterest / Roblox / Tik Tok / Bigo Live / Yubo / Fortnite Account ? If you are not 16 or 13 or 12 - yet? No - but • If you use Instagram/ Games / Apps / Snapchat / Tik Tok etc & you lied about your age – even just by using !!!!!! •If your parents set it up for you, then it is their job to be part of you ‘Online Life’ at all times when you are using your device. So •Talk & Show your Parents / Carers •DON’T TALK TO ONLINE STRANGERS How do you connect with your friends and family online?

Fortnite : Battle Royale Age 12+ Fortnite is a very popular game that was released in 2017. There are 2 different versions of the game; Fortnite: Save the World and Fortnite: Battle Royale. – Fortnite Battle Royale is the very popular version & is designed to keep players coming ‘hence excessive use’. It allows text & voice chatting which allows for random play & inappropriate language. Online Behaviour of Children & Young Adults? Connecting / Interacting with Others Gaming & Messaging Empowerment / CHOICES / Teamwork Risks In Everything Online – However- Only Dangerous as a Result of Inapproriate Content / Contact / Conduct

I. Social Media / Access & Usage

II. Apps Direct Messaging (Open & Anonymous)

III. Inappropriate Selfies

IV. Online Bullying / Trolling / Revenge

V. Online Reputation / Digital Tattoo

Must Understand Online Behaviour to Understand Risk & Prevent Escalation MUST DEFINE ACCURATELY TO EDUCATE EFFECTIVELY Risks can lead to Dangers can lead to Harm Harm - Exploitation including: Physical Exploitation Sexual Exploitation Emotional Exploitation Radicalisation / Extremism Reputation Damage Bullying Identity theft / Illegal behaviour Exposure to inappropriate content Obsessive use of ICT Copyright infringements What adults worry about • Predators (Gaming & Social Media) (Meeting People Met Online)

• Viewing inappropriate content ( – Darknet etc )

• Posting/sending inappropriate content ( Inappropriate Selfies etc)

• Online Bullying / & harassment ( Closed Groups – Discord etc )

• Copyright Theft ( Streaming Films – Putlocker / 123 Movies etc )

• Online addiction / tiredness ( Gaming – Fortnite GTA etc )

• Online Conduct that may be, illegal or inappropriate behaviour

• Online Reputation & Identity Theft & Digital Tattoo Your Digital Anxiety / Emotional Life in Likes

Open Conversations Dialogue Participation Understanding Navigate the Emotional Rollercoaster Together

Never More Important

Chasing Likes Being Anxious about Appearance

Chasing Validation Disconnecting seen as Socially Damaging

75% of 10 -12 yrs olds have Accounts Social Media - Risk – Danger - Harm

Risk Downloading and use of Apps or websites Windows – IOS - Android

Illegal or Inappropriate Online behaviour Danger Content – Contact - Conduct

Emotional Sexual Physical Online Exploitation Harm Online Reputation Damage Illegal Behaviour

If you can describe risk & explain risk you are in a better position to protect and control it’ Minimising Risk can Reduce the Escalation to Danger which in turn drastically Reduces possible Harm Risks – Danger - Harm Operating Systems / Servers / Data Retention What Info Apple, Facebook, and Google Keep – What can be Seen? Facebook/Instagram/WhatsApp Google (OK Google) Facebook allowed to share, store info how it likes Facebook allowed to share, store info how it likes Location On – Google Tracks Name – Birthplace – City of Residence – Phone – Email – History On – Google Tracks hourly-daily-monthly activity- Current Employment – Relationship - Anniversary – top clicks / queries/sites Previous Relationships – Aliases- Screen names- Address Age, gender, predicts your interests. - Tracks devices you Book – Family members – Religious Views + Much More use & when last active – Tracks how many emails sent (Like Button is Tracked ) FB Apps know who you are If you click ‘OKAY’ or otherwise useand the how manyApplication contacts/ documents or acceyou have-pt Tracks all talking with etc payment, you permit GSR to edit, copy, disseminate,talk accounts publish, transfer, append, or mergeApple with (Siri) other databases, sell Licence (by whateverApple means allowed to share,and store on info whatever how it likes terms) and Name – Address – Email – Credit Card Details – Employment archive– Real your time location contribution – Habits – Use Cookies and for Advert dataising – Tracks Safari pages – SiRi – is recorded sent to Apple and transcribed to process request Contacts – Songs LOCATION LOCATION https://free.echosec.net/ https://www.google.co.uk/maps/timeline?authuser=0&pb=!1m9!2m8!1m3!1i1990!2i0!3i1!2m3!1i2090!2i0!3i1!2m2!6b1!7b1!3m10!1m9!2m8!1m3!1i2015!2i5!3i2!2m3!1i 2015!2i8!3i30!5m0!6b1 Privacy Settings Set – But GPS on when Tweets Posted Privacy Settings Set – But GPS on when Tweets Posted Risks can lead to Dangers can lead to Harm Harm - Exploitation including: Physical Exploitation Sexual Exploitation Emotional Exploitation Radicalisation / Extremism Reputation Damage Bullying Identity theft / Illegal behaviour Exposure to inappropriate content Obsessive use of ICT Copyright infringements Online Behaviour - Gaming? Online Gaming

i. Playing games against friends and strangers.

ii. Chatting to friends and strangers using microphone headsets.

iii. Exchanging contact details.

iv. Playing games unsuitable for their age?

v. Tiredness v Addiction Tiredness Creates Mistakes

Grand Theft Auto – Inappropriate Content & Contact Visual & Audio Online Behaviour – Gaming – Addiction/Disorder?

To be diagnosed with gaming disorder, the individual must: (1) Experience significant impairment in personal, family, social, educational, occupational or other important areas of functioning (2) Have experienced this impairment for at least 12 months

WHO advises gamers to be mindful of how much time they spend playing, especially if it is to the exclusion of other daily activities. They should also be alert to changes in their physical or psychological health and social functioning which could be attributed to gaming. Online Games (inc Apps) Case Study Lewis Deynes Sociopathic Predator

Deynes met Breck Breckwhile playingBednar video games online Team Speak Case Study - Luke Harlow & Stephen Beadman Stephen Beadman Luke Harlow

October Harlo w meets Kayleigh on FB and uses FB & WhatsApp To Sexually Groom Kayleigh

November Kayleigh is dropped off to meet Harlow having agreed to stay with him

15 yr old Saturday Harlow invites neighbour Beadman to Kayleigh Haywood join him and both Rape Kayleigh

Sunday Kayleigh escapes and is chased by Beadman who attacks and kills her Risks Through Technology? - Identification IPhones/ Androids / Tablets - Intentional & Unintentional Victims Using GPS – Location Services (Google Services Accessing the internet by 3G/4G technology. (Filtering Monitoring ) Taking & Posting photos and videos. ( I Cloud / G Cloud ) Using . ( We Chat, Whatsapp, YikYak Sharing personal information. (Microphone /WebCam) Be aware of in-app purchases (Apps (Random Play ) Facial Recognition / Photo DNA Anonymity (Sites Apps VPN) Tinder v We Chat (GPS) Pokemon Go (GPS) Find my Phone (GPS) SnapMaps (GPS)

How Can Webcam’s be Compromised –

Viruses – But How (Pop Ups, Messaging, Streaming)

Being Tricked or Convinced into doing inappropriate things on webcam. Harm from Deliberate Inappropriate Use Speaking to Strangers (Intentional Victims )

Harm from Unknown Webcam Access Viruses Gaining Access (Unintentional Victims )

Victims - can happen to boys and girls. Truth or Myth

Web Cam Compromise Viruses What are you doing online? Webcam Compromise as result of Viruses Intentional & Unintentional Victims

i. Talking to people on webcams using IM, Facebook or Google+.

ii. This could be friends or strangers.

iii. Using Chat Roulette / Omegle / Badoo (Live Streaming)

iv. Skype / We Chat / WhatsApp / Facetime

v. Viruses / Ratty Inappropriate Conduct?

i. Bullying someone using Mobiles/ Messaging / Gaming . ii. It is a big problem having moved from Messaging to Apps (DM’s). (WhatsApp / OoVoo /) etc iii. It can start off as a joke and spiral out of control. iv. It can be very hurtful & upsetting & IS WRONG v. Adults and young people think that because its online it makes them Anonymous and wont be Found . vi. It almost always involves ‘The Camera’ vii. Mostly through Apps & Closed Groups (Discord -Street Chat) viii. Revenge What is Being Kind? Showing Respect? Discrimination Feeling Jealous Treating Someone Differently Bullying on Purpose?

Bullying by Accident? 75% of Communication is Visual Misunderstood Bullying without knowing Joke back firing ……. Online Bullying If someone is mean or sends nasty messages online, block them. Online Bullying is very real, unfair and very upsetting… it is no different to usual bullying. SO TELL A TRUSTED ADULT Servers ! Clans ! Discord ! Fifa ! We Chat! Whats App ! Team Speak ! Gaming ! Closed Groups Closed Groups What Kids Should Do

• Don't respond Don't retaliate • Talk to a trusted adult Save the evidence • Block the bully • Be civil • Don't be a bully • Be a friend, not a bystander ‘Find A Voice’ Celebrating difference, success, ability & giving people a voice

Show Respect not Jealousy & Don’t Bully & Find a Voice What Should Adults Do?

• Listen & take child seriously • Make sure child is and feels safe • Don’t overreact • Encourage child not to retaliate • Gather facts & save the evidence • Get the child to help solve the problem • Teach self-esteem & resilience • Bring in school officials if there is a “nexus” with school • Encourage child to reach out to friends • Encourage Courage : “Be a friend, not a bystander”

o o

photograph photograph that one takes oneselfof with a digital

A A camera or a smartphone,front-facing tablet or webcam, especially for postingon a social-networkingor phot website. sharing Where Where are commonly they used? What are the risks?

InappropriateExplicit Images Selfie (Self Generated Images)

i. Sending rude / explicit photos via email, social media, Apps and mobiles. ii. Sending videos or acting inappropriately on webcam iii. Once they have been taken / sent they can be put online / shared / searched for by anybody. iv. It is against the law if you have a explicit photo of someone under the age of 18 even if they are not 18 themselves. It does not matter if they are a boyfriend or girlfriend. v. CRB/DBS/ Police National Database

Inappropriate Selfie or Inappropriate Image

IPhone – Android ????? Why do young adults take/send ‘inappropriate selfies’?

Teen “romance” – expression of shared Intimacy with partner Flirting / Prank / Joke Explicit Showing off (party behaviour) Inappropriate Impulsive risk-taking Peer pressure Role Models Revenge Bullying or intimidation Blackmail ‘Coz they Can’ Sexting (Sexy Selfie) Research

I. Analysis responses from 30 UK schools, years 7-9, 1,150 students (boys & girls) in total.

I. Asked questions regarding attitudes toward and behaviours around sexting, taking & receiving images.

I. Questioned as to what they believe would be construed as Inappropriate Forces in England & Wales recorded 6238 underage ‘sexting’ offences in 2016-17 17 a day

Children as young as 10 Eastenders : Bex Fowler (15) to take Risky sexy photo for Shakil Kazemi (16)?

Pics Requested & Taken All Voluntarily & No Coersion Only seen by each other Friends know that Images Sent

Who Commits an Offence ?– if any

What should/chould happen to them ?

What Happens when parents find out ? Self Generated Images Sexting – Sexy Selfie – Inappropriate Selfie Risks - Legal & Non Legal

• Creating, distributing or possessing an indecent image of a child – against the law (LEGAL) • UK Police position – first time offenders should not face prosecution (LEGAL) • Emotional and psychological damage (NON-LEGAL) • Reputational damage (NON-LEGAL) • Online manipulation/extortion (NON-LEGAL) • Outcome 21 (NON-LEGAL / LEGAL) The Legal Consequences Outcome 21

1. Every ‘crime’ recorded on police systems has to be assigned an outcome from a predefined list of outcome codes. 2. January 2016 the Home Office launched a new outcome code (Outcome 21) to help formalise the discretion available to the police when handling crimes such as youth produced sexual imagery.

Outcome 21 states: Further investigation, resulting from the crime report, which could provide evidence sufficient to support formal action being taken against the suspect is not in the public interest. This is a police decision.

This means that even though a young person has broken the law and the police could provide evidence that they have done so, the police can record that they chose not to take further action as it was not in the public interest.

DBS certificates It is not possible to categorically say that an incident of youth produced sexual imagery recorded on police systems with Outcome 21 would never be disclosed on a DBS certificate. Therefore a 16 year old who is investigated But not charged or cautioned will have the investigation Shown on a DBS Disclosure until they are 27

Inappropriate Content / Sites?

i. Ask FM ii. Blue Whale Game iii. 13 Reasons Why iv. Fraping / Identity Theft / CatFishing always an issue v. It can be very malicious . vi. Prey on the Vulnerable

Sometimes you See what you want to See Make Good Choices Inappropriate Content / Sites / Online Challenges?

People Taking Up Challenges Post on Instagram &/or You Tube etc i. Ask FM

ii. And Now ‘The‘The‘The TideDeodorant Condom Pod‘Cyber Challenge’ Challenge’ Snorting Banging’ Challenge’

iii. Prey on the Vulnerable What is the Tide Pod Challenge? The Tide Pod Challenge is where students attempt to consume a plastic laundry detergent pod .At first the challenge started as a joke but now poison control centres are warning parents about this dangerous activity.The risks of this viral dare include: choking on the liquid by inhaling it, vomiting, change in blood pressure/heart rate, having seizures, or losing consciousness Ingredients in the detergent can burn the mouth,Being digestive Accepted system, by Social and Media stomach. When students partakeCyber in the Banging challenge,Children is thethey withcreation uploadNo Self of videos videosEsteem, on of Facebook, themselves eating laundryAreYouTube dependent detergent and Twitteron capsules Likes by onrival andSocial gang post Media members, them to toFeel socialusing Validat it media toed for ‘validation’ Theyendorse Have a ‘gangs’ ‘Scoreboard’ and where relating they to come what fromthey doand an tod film threatenIt’s a game each but other. they The can’t practice separate is calledFantasy "cyber from bangin Realityg We Need to Educate Your Digital Footprint / Tattoo / Reputation Post in Haste – Repent at Leisure

Online Reputation Digital Footprint Digital Tattoo

Whatever the Name –

what you Post View Say Take Today can/will Impact on your life later Your Digital Tattoo What Has Been the Risk Risk – Danger - Harm There are a number of key risks to using new technologies, including: Physical Exploitation Sexual Exploitation Emotional Exploitation Reputation Damage Radicalisation Online Bullying Identity theft Illegal behaviour Exposure to inappropriate content Obsessive use of ICT Copyright infringements Your Digital Tattoo What makes a good digital tattoo? Your Digital Tattoo Are you visible online?

So Do you have a digital tattoo?

 Do you have a Facebook profile? (Instagram / WhatsApp)

 Do you have a Twitter profile?

 Do you have a LinkedIn profile?

 Do you have a profile on any social media channel?

 Have you ever been mentioned on any social media channel, website or blog?

 Have you ever been tagged in any image online?

 Do you have a Google profile?

 Who uses Gmail?

 Have you ever Googled yourself? 69% of Employers have rejected a candidate based on something they saw on Social Media .

Posted inappropriate comments or photos

Posted content about them drinking or using drugs

Posted negative remarks about others

Showed poor communication skills

Made racial or discriminatory comments

Lied about qualifications

Shared confidential information about employers or colleagues But there’s good news! Data shows employers also hired candidates based on something they saw on Social Media.

39% found the applicants profile provided a positive impression of their personality and fit within the organization

36% found the applicant’s profile supported candidates professional qualifications

36% determined the candidate was creative based on posts, blogs or websites

33% found the candidate showed solid communication skills

34% were impressed by the good comments/references posted by others

24% were impressed that the candidate posted about awards and accolades received.

33% felt the candidate was well-rounded based on his/her posts

Your Digital Tattoo It’s About Having a Good Digital Tattoo That You Control A Digital Tattoo is better than none at all One of the best ways to bury embarrassing search results is to create good ones. OWN YOUR POST Recruiters and Admission Officers are Looking

It’s time to come to terms with the fact that recruiters and your peers are researching you on social media. Since they’re checking out your online presence anyway, you might as well enhance your public image.

Social media is a powerful tool that connects you with professionals, school alumni, recruiters and potential employers. ‘His Google Profile is In Tatters’ Your Digital Tattoo The Risks - Case Studies • Sporting Sanctions and Disciplinary Action •Kevin Pieterson “man of the world cup dropped from the T20 side. It’s a f**k up”

“can somebody tell me how Nick Knight has worked his way into the commentary box. •Azeem Rafiq

“a useless wa*ker” • Ryan Babel •Breach of FA Rule E3 (1) When Social Media Damages your Personal Brand Case Study : Naomi Broady Your Digital Tattoo Naomi Broady 28

Turned Pro 2006 Placed on LTA Programme with Funding 2007 Posted Picture she posted a photo of herself on a social media posing provocatively in a minidress next to a condom machine in a toilet.

LTA promptly stripped her of her funding, throwing future of her career in jeopardy. Naomi Broady & Neal Skupski I wasn’t drunk and I wasn’t doing drugs Wimbledon Mixed Doubles Quarter Final 2014 either. I was trying to live, for a few nights at least, as a normal 17-year-old. It was blown out of all proportion.

I still Weto this were day given don’t no understand press training what and we no did support wrong Phil Neville – Apologises for Sexist Tweets 24 th Jan 2018 Your Digital Tattoo Having to Apologise Ben Bradley Couldn’t ‘Unsay’ the remarks

Philip Laing

Paris Brown Online Safety is Predominantly about Behaviour But Technology can Assist 1. Get Involved – Use same Apps / Social Media / Games Physical 2. Adhere to Age Restrictions ...... if & where possible...... Physical 3. Check Contacts & Friends & Opponents Physical 4. Be part of Closed Groups (Clash of Clans / WhatsApp / Fifa etc Physical 5. Cover Up Webcam when not Using Physical 6. Don’t use File Sharing Streaming of Videos (eg Putlocker) Physical 7. Use Social Media Positively - Twitter / LinkedIn / Blogging Physical 8. Speak to Schools THIS IS TEAMWORK Physical 9. Use Family Sharing (Ipads / Iphone) Tech 10.Switch off Sync on Android Phones Tech 11.Use Location Settings when required Tech 12.Switch Off Location Settings on Childs / Young Adults Phones Tech 13.Test App games by switching off WiFi & Mobile Data Tech 14.Restrict WiFi Access (Times) via Modem Tech 15.Use filters to restrict access (Parental Controls & Software) Tech Understand the Risks to Restrict Escalation to Online Dangers by Preventing Inappropriate Behaviour Remember Make the Right Choice

Online Safety begins with You The Pledge Don’t Share Personal Information (Your Secrets)  I will talk to someone if I am feeling down after going online

 I will connect with respect (and report people who do not) Be Kind Online – As You Would Be In School  I will share positive messages Selfies / Pictures – The Impact – Ask Permission  I will think critically when I go online Don’t Ignore Age Restrictions  I will have a healthy balance with technology Speak to Parents & Teachers ‘Understanding & Minimising Risk can Reduce the Escalation to Danger which in turn drastically Reduces the possibility of Exploitation’

Thank you! Jonathan Taylor MSc

E-mail: [email protected] Web Site : www.besafe-online.co.uk

@Besafe_Online Current UK Legislation

Sec 8 and 10 of the Sexual Offences Act 2003 makes it an offence to cause or incite a child under 13 or 16 respectively to engage in sexual activity. These offences carries a Maximum 14 year sentence

Section 67 of the Serious Crime Act 2015 creates a new offenceSection of sexual 127 of the communication Communications with Act a2003 childmakes which it an wil offencel help to ensure send a message by means of a public electronic communications network (including that young people arethe fully internet) protected if its content by isthe grossly law and offensive, allow indecent the authorities, obscene or to menacing. intervene earlier to prevent more serious offending against children.

TheThe newPublication offence of sexualcriminalises material to a child person or children aged may 18 depending years or over who communicates with on the content and circumstances amount to an offence under the aObscenechild under Publications 16 (who Act the1959 adult. This offence does carries not reasonably a maximum 5 believeyear prison to be 16 or over), if the communicationsentence. There is no sexual automatic or ifsex it isoffender intended regist toration elicit as fromit can be the child a communication which is committed by the sending of non sexual material sexual.

SectionThe 67 offence of the applies Serious only Crime where the Act defendant 2015 creates can be shown a new to offence have acted of sexualfor communication withthe a child purpose which of obtaining will help sexual ensure gratification. that young people are fully protected by the law and allow the authorities to intervene earlier to prevent more serious offending against children The offence is subject to a 2 year Maximum Prison Sentence