Sex Trafficking from 2010 to 2015 - a Spike That Was Directly Correlated to the Increased Use of the Internet
Total Page:16
File Type:pdf, Size:1020Kb
PROJECTPROTECTOURCHILDREN.COM THERE WAS AN 846%846% 846% INCREASE IN REPORTS OF SUSPECTED CHILD SEX TRAFFICKING FROM 2010 TO 2015 - A SPIKE THAT WAS DIRECTLY CORRELATED TO THE INCREASED USE OF THE INTERNET. NATIONAL CENTER FOR MISSING & EXPLOITED CHILDREN T A BLE OF CONTENTS 040404 101010 171717 2828 313131 04 Talking to Your Children 15 Sextortion 09 Teen & Tween Statistics 17-27 Social Media & Apps 10 Sex Trafficking Review 12 Online Grooming 28 Family Online Safety 13 Red Flags Agreement 14 Child Sexual Abuse 30 Glossary Material 31 Additional Resources No internet filter or privacy setting can replace a conversation with your kids T TOGETHER TALK to your establish boundaries and kids and teens expectations for using technology A ASK Having honest, non-judgmental them what they already know and conversations with your kids and answer questions they may have teens about technology, the internet, and social media is your L LISTEN to their thoughts and concerns and first and most important line of use this time to empower and defense! engage with them Parental controls and security K KEEP THE software are NOT a substitute for CONVERSATION GOING open communication. This is not a one-time talk. As they grow and mature and technology changes, continue to have these conversations. P A G E 4 PROJECTPROTECTOURCHILDREN.COM 0-5 YEARS OLD CONVERSATIONS Actively monitor content your child has access to YouTube Kids does not have foolproof filters. It's important to preview what your child is watching and turn off the autoplay feature. As your child gets older, emphasize the importance of asking permission before using a device, playing on an app or game, or watching a video Limit technology use to open family areas (living room, dining room, etc.)* Set time limits and boundaries on screen time with clear consequences (refer to our sample Family Agreements)* 6-10 YEARS OLD Update your Family Online Safety Agreement accordingly Discuss the difference between personal/private and public information Limit online access and communication to people they know in person, especially with gaming DON'T Go Phish! - Talk to your child about NOT clicking on unknown links or downloads (refer to glossary) Emphasize the importance of being kind online Teach them to tell a trusted adult if they see or read something that makes them feel*: Age Unsafe / scared Uncomfortable ranges Unsure are 11-13 YEARS OLD suggestions Update your Family Online Safety Agreement accordingly Teach your child how to deescalate from frustrating situations * (especially with gaming) We encourage you to continue this throughout age ranges Help your child understand digital drama and cyberbullying only and how to avoid and report it . Talk about their digital footprint and the impact it has on Take their futures into Describe the importance of chatting safely online Show your child how to report and block inappropriate, account harmful, and hurtful content online Teach your child about fake news and how to identify, cite, and use reliable resources the child ' 14-17 YEARS OLD s maturity Update your Family Online Safety Agreement accordingly Monitor and discuss the relationship between mental health and addiction to social media and online use and Discuss the realities and dangers of online disinhibition (refer to glossary) abilities Share with your teen about online predators and how traffickers use technology, social media, and gaming to . groom potential victims Discuss the content and concerns of new apps and technology they want to use P A G E 5 P PRIVACY SETTINGS PLAY Safely and parental controls should be on Online gaming is meant to be fun, but parents and gamers L LIMIT need to be aware of predators the information you share and never and potential threats. give out personal info Chatting via games is one way A AVOID TROLLS: traffickers and predators build report, mute, and block relationships and groom potential victims. Y YOUNGER GAMERS should only play with people they Be safe when you PLAY! know in person P A G E 6 PROJECTPROTECTOURCHILDREN.COM TYPES OF APPS / ONLINE TECHNOLOGY 01 Social 02 Chat & Meet 03 Blogging or Networking Up Apps Microblogging Ex: Facebook, LinkedIn Ex: WhatsApp, Tellonym, Ex: Twitter, Reddit, Tumblr HouseParty, Whisper, Bumble, PURPOSE: connect with Meetup PURPOSE: create short posts people through photos, and find and share photos, images, videos, and comments PURPOSE: message, call, or videos, and other content video chat with others CONCERNS: ability to CONCERNS: ability to livestream, publicly comment, CONCERNS: ability to private livestream, publicly comment, private message, call, video message, call, video chat, and chat chat, and share your location share your location, and search for nearby users 04 Photo 05 Video / 06 Gaming / Sharing Livestream Virtual Worlds Ex: Instagram, Snapchat, Ex: YouTube, Facebook Live, Ex: imvu, Discord Pinterest, VSCO Periscope, Vimeo, Bigo Live PURPOSE: play games, create PURPOSE: find and share PURPOSE: find and share virtual worlds, communicate photos, videos, and live videos videos, including live videos with other gamers CONCERNS: ability to CONCERNS: ability to CONCERNS: ability to voice livestream, publicly comment, livestream, publicly comment, and text message and search private message, and share and search for nearby users for nearby users your location PROJECTPROTECTOURCHILDREN.COM P A G E 7 WHEN TALKING TO YOUR WHEN YOUR CHILD SEES CHILD: SOMETHING INAPPROPRIATE OR HARMFUL, TEACH THEM TO: Screenshot Stay Calm Block Actively Listen Report on the App Report to Law Enforcement Avoid Judgment or Cyber Tipline 1-800-THE-LOST (1-800-843-5678) WHATCAN I DO? Stay Involved Delete the content SET BOUNDARIES & USE PARENTAL ENFORCE CONSEQUENCES EDUCATE YOURSELF CONTROLS Discuss expectations as a Do your research Set content and time family Try out the apps, games, limits Restrict where and when and sites yourself Check privacy settings devices can be used Remove tech privileges when Monitor screen time rules are broken FRIEND & FOLLOW EXPLORE, SHARE, & BE A GOOD DIGITAL DON'T STALK CELEBRATE ROLE MODEL Follow kids on social media Explore together Curb your own bad Respect their space and Join in on dances, habits freedom challenges, etc... Know when to unplug Don't flood their accounts Be kind online with comments Learn and have fun Adapted from Family Online Safety Institute P A G E 8 PROJECTPROTECTOURCHILDREN.COM TEEN & TWEEN STATISTICS SCREEN TIME, IN HOURS, FOR TWEENS AND TEENS 8% 4% 15% 15.2% NONE 29.3% 2 H OU R S OR LE S S 26% 2 - 4 HOURS 4 - 8 26% TEENS 18.2% HOURS TWEENS MOR E TH A N 8 H OU R S 25% 33.3% On average, 8- to 12-year-olds in this country use just under five hours’ worth of entertainment screen media per day (4:44), and teens use an average of just under seven and a half hours’ worth (7:22)—not including time spent using screens for school or homework. By age 11, a majority (53%) of kids have their own smartphone By 12 more than two-thirds (69%) do Under 13 years old 28% MEDIAN AGE OF FIRST USE: 13 - 14 years old 43% 14 15-18 years old 30% PERCENT WHO YEARS OLD STARTED USING SOCIAL MEDIA AT... 0 10 20 30 40 50 The Common Sense Census: Media Use by Tweens and Teens in 2019 PROJECTPROTECTOURCHILDREN.COM P A G E 9 SEX TRAFFICKING Sex trafficking is the inducing, recruiting, harboring, transporting, providing, or obtaining a person for the purposes of a commercial sex act using FORCE, FRAUD, OR COERCION*. *If a victim is under the age of 18, they do not need to prove force, fraud, or coercion. 55 % OF DOMESTIC MINOR VICTIMS OF SEX TRAFFICKING REPORTED THAT THEY FIRST MET THEIR TRAFFICKER VIA TEXT, WEBSITE, OR SOCIAL MEDIA APP. MOST OF THE DOMESTIC MINOR SEX TRAFFICKING VICTIMS SURVEYED WERE ATTENDING SCHOOL WHILE BEING TRAFFICKED. THORN 2018 Survivor Insights The Role of Technology in Domestic Minor Sex Trafficking E m a i l u s a t EDUCATE @ PROJECTPROTECTOURCHILDREN . COM f o r m o r e information a n d t o f i n d o u t h o w y o u c a n p r o t e c t y o u r c h i l d . P A G E 1 0 PROJECTPROTECTOURCHILDREN.COM COMMERCIALLY SEXUALLY EXPLOITED CHILDREN / YOUTH OF CSEC / CSEY VICTIMS WERE EXPLOITED FOR 2 OR MORE YEARS BEFORE BEING IDENTIFIED OF CSEC / CSEY VICTIMS DON'T SEE THEMSELVES AS BEING EXPLOITED OF CSEC / CSEY VICTIMS WERE 14 OR YOUNGR WHEN THEIR EXPLOITATION STARTED PROTECT CURRICULUM P A G E 1 1 ONLINE GROOMING Friend Request Getting Likes Parental Controls Predators begin by finding a Predators thrive on a victim's The predator gauges the risk target and building a need for love and affirmation. involved and the level of threat relationship with them using They fill those needs, as well as and danger that the victim's the platform they frequent the any other perceived needs - caregivers pose. They most (this means it can money, desire for fame, a determine how closely they happen on any app, gaming family, etc. are monitored online and in system, etc.) real life. They assess whether their actions will be reported or believed. Social Network 53X LMIRL Predators know that involved (slang for sex) (slang for Let's Meet in Real Life) caregivers and a support system of friends and adults is Throughout the grooming Eventually, the predator may a threat. They do everything process, predators begin to make physical contact with they can to isolate their desensitize their victims to them. At this point, they have victims. They often define their sexual language, images, gained control over their relationship as special and videos, and content.