CWAG Africa Alliance Partnership

Slides:



Advertisements
Similar presentations
Internet Safety 9th Grade Health.
Advertisements

Cybersafety Elimbah State School Cybersafety and cyberbullying: A guide for parents and caregivers, May 2012., Dept of Education, Training and Employment.
Journal Explain in your own words what abuse is.
What is trafficking? Is it slavery? Human trafficking involves the movement of people through violence, deception or coercion for the purpose of forced.
Internet Safety for Students
It is every person’s human right to a life free of violence Business P F PO Box 555, Drummoyne NSW 2047 ABN Counselling.
Sexual Assault.
Sex Crime Prevention 1 Vermont Criminal Information Center Sex Crime Prevention.
Somerset County Prosecutor's Office 40 North Bridge Street Somerville, NJ (908) / Emerging Threats of Social Media.
Pornography and the Internet Amanda Gillespie Donna Jones EDCI 564.
Westport Middle School Presentation 2015
Raising Bullying Awareness AUHSD - Savanna High School.
DUSDStudent Bullying Presentation Grades What is Bullying? No student or group of students shall, through physical, written, verbal, or other means,
By: Sophia Dermouche & Maheen Khalid
SEX OFFENDERS AND VICTIMIZATION IN OUR COMMUNITY Awareness, Support and Prevention San Diego County Sex Offender Management Council
Peter Johnson NetSmartz411 Project Manager National Center for Missing & Exploited Children.
Question  What was the internet attended for?  What is the internet known as?  Ans. Information super high way.
Introduction Video Slide Content Links What is School Bullying? What to know about Cyberbulling Social Networking & the Effects of Cyberbullying FaceBook.
Digital Citizenship Texting vs. Sexting Cyberbullying.
Exploitation. Appropriate, mature behavior and comments. True/False/IDK Pg. 48 You can answer to the left side of the question…the lines don’t match up.
Sexting Criminal Teen Trend
 NYS Internet Crimes Against Children Task Force Online Safety for Middle and High School Version 5.0 – 8/
Community Policing. Developed in Response ● To the changes that put police in cars and removed them from neighborhoods ● To understanding that modern.
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
Computers, Cell Phones & the Internet JOSE CANO AND SAMIE GIDDENS.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
The Safe Side Stranger and Internet Safety. Objectives n Provide non-threatening tools n Promote awareness n Develop an attitude change n Provide you.
Old Firehouse Teen Center.  Over two thirds of women with disabilities have been sexually or physically abused as children.  The more caregivers a girl.
Chief Chip! Helping our children & young adults to stay safe online.
CYBER BULLYING CODY KLARMAN. TYPES OF CYBER BULLYING Sending mean messages or threats to a person's account or cell phone Spreading rumors online.
ThinkB4uClick A Smart Guide to Internet Safety. Dumb Ideas Stay off the Internet Don’t have a Facebook page Never use Twitter Don’t Never post.
Internet has advanced a lot throughout the years. It has changed the way people communicate, work, find knowledge and much more. Work has became easier.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
Computer-Based Technology in the Classroom EDX 1201X National University October 20,2012.
E-SAFETY Sharon Dixon & Louise Allen Essential Safeguarding.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Learning with Purpose Sex Offender Policy and Practice in the United States Andrew J. Harris University of Massachusetts Lowell.
Sexting in Schools – How do we need to respond. Images or videos generated by children under the age of 18, or of children under the age of 18 that are.
PROTECT YOURSELF Cyberbullying. Why do you think people cyberbully? How does your school deal with cyberbullying? Have you ever sent a mean message because.
Child Sexual Abuse- What Parents Need to Know
DOMESTIC VIOLENCE.  Violence or physical abuse ________________________________ ____________________ usually violence by men against women.  When a.
Community Activism Overview of Domestic Minor Sex Trafficking.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
Danielle Hildebrant  Acceptable Use Policies ◦ document stating the use and limits of the network or internet  Cyberbullying ◦ Bullying that takes.
NO LONGER THE NORM A Legal Information Training Project on Sexting and Cyberbullying.
Cyberbullying.
Creating your online identity
CYBER BULLYING.
Bullying.
GOSSIP and CYBERBULLYING
Chelsea, Kimi, Stephanie, Eh-den
Interpersonal Cybercrime and Revenge Porn
Pics, Flicks, and Sexting
Tips and Information for Parents
Appropriate Use of Technology
BULLYING AND MORE Presented by Dana Rahman Assistant District Attorney
Information Security Footprint.
Digital Citizenship & Social Media.
In 2017, 4327 reports were received from the Finnish public
The KINDNESS KART will be happening soon in the gym!
Bullying.
Suicide 101. Suicide 101 The Case of J.S. At the time of initial evaluation, J.S. was 12 years old. J.S. is Native American. Living with his legal.
GOSSIP and CYBERBULLYING
Life High school waxahachie
Health Outline Unit 3: Violence, Safety and Risk Taking Behaviour
Safeguarding Reflection- Sexting
Child Sexual Exploitation - 7 Minute Briefing
Who are we? We provide a service for anyone affected by bullying who is still of school age. We give advice to children, young people, parents/carers.
Relationship and Abuse
Presentation transcript:

CWAG Africa Alliance Partnership www.cwagweb.org/aap

Ending “Sextortion” in the Digital Age A Call to Action: Legislative and Advocacy Solutions Penny Venetis Rutgers Law School, Legal Momentum

Sextortion A new word but a very old concept. Widespread form of corruption where sex, not money, is the currency of the bribe. Perpetrator asks for sex or sexual imagery instead of cash.

Sextortion Children, teens and women are disproportionately impacted by cyber-sextortion. Predators exploit digitally-savvy children and teenagers, often by pretending to be peers on social networking sites. Using false identities, offenders manipulate children and teenagers to produce and give them sexually explicit information and images. Predators then use these images to demand sex or more sexual images.

Most Sextortion Today is Cyber-sextortion Cyber-sextortion is easy to commit: need only a computer to reach hundreds of victims. FBI calls cyber-sextortion fastest growing threat to kids and teens.

Sextortion Law enforcement recognizes that sextortion incidents are increasing exponentially. Law enforcement and media frequently use the term. Yet, most federal and state laws do not specifically identify sextortion as a crime, or provide adequate solutions to ensure justice for victims. This leaves children, teens and women most vulnerable to online sex abuse.

Sextortion Many perpetrators have abused multiple, even hundreds, of victims. Lucas Michael Chansler abused 350 victims. Richard Finkbiner victimized between 20 and 153 young women and children. Jared James Abrahams hacked the computers of 150 victims. Ruslan Mirvis (34 year old Brooklyn male) allegedly sextorted at least 14 girls, ages 12 to 14, while pretending to be a 16-year-old boy.

Sextortion: Victims are Powerless When they have not complied, perpetrators have released sexual images to the victims’ friends, family members, congregations, teachers, co- workers, and the world at large, via the Internet.

Sextortion Causes Irreparable Harm The impact of all forms of sextortion on victims’ lives is immeasurable: long-lasting psychological impact and irreversible reputational harm. Many victims are traumatized because they will never know when and where sexual images of them will turn up, or who has viewed them. It is impossible for victims to ensure images have been removed from the Internet, or the places they were downloaded. Victims feel shame and embarrassment and often do not know where or how to obtain help.

Sextortion Is Sex Abuse That Causes Irreparable Harm Victims of sexual extortion experience the same irreparable harm as other sexual assault and rape victims. PTSD – Flashbacks Anxiety Depression Nightmares Shame Difficulty Concentrating Self-blame Lack of Control Numbness Isolation Vulnerability Fear Sadness Embarrassment

Sextortion Is Sex Abuse That Causes Irreparable Harm National Center for Missing and Exploited Children (NCMEC): 18% of child cyber-sextortion victims expressed negative psychological consequences: hopelessness, fear, anxiety and depression. In 5% of all cyber-sextortion reports, child victims engaged in self-harm, or expressed suicidal thoughts or actions.

Sextortion Even though everyone who owns a computer is vulnerable to sextortion, our laws do not expressly prohibit it. Because the law does not adequately address sextortion, it is imperative to take immediate action to remedy this fast-growing form of sexual abuse.

Sextortion: Public Awareness Needed We can fight sextortion through public education by: Educating the public, especially children and teens, about the danger and prevalence of sextortion, especially cyber-sextortion. Ensuring that schools incorporate sextortion awareness in their Internet safety curricula. Public Service Announcements. Funding Needed (federal, state, and local for educational programs).

Examples of Educational Tools Sextortion Examples of Educational Tools

Examples of Social Media Campaign Tools Sextortion Examples of Social Media Campaign Tools

Sextortion: Example Twitter Campaigns #ThisisSextortion #SextortionisSexAbuse When ordinary citizens obtain sexual images of an individual and then threaten them with release of the images #ThisisSextortion #SextortionisSexAbuse All it takes is sending ONE nude photo, for someone to exert their power over you. Don’t get caught. #ThisisSextortion #SextortionisSexAbuse #Sextortion Don’t be tricked by online predators who want your nude pix #Sextortion #defineasacrime Sextortion is online sex abuse that needs to be made illegal #defineasacrime #coverup Put a #coverup on webcams. Don’t become a sextortion victim.

Combatting Sextortion: Law Reform Needed Amending existing extortion, cybercrime, sex offense and domestic violence statutes to expressly criminalize sextortion. Codifying these updated offenses consistent with other sex offenses to allow for enhanced sentencing; and Amending sex offender registration and notification laws to allow for increased monitoring of sextortion offenders.

Addressing and Combating Sextortion Legal Momentum and Orrick have worked with legislators to enact legislation in four states: Utah, Arkansas, Texas, and Alabama. Legal Momentum and Orrick are working with federal legislators to enact legislation on the federal level. Not difficult to achieve 50 state criminalization of sextortion. Need for international cooperation: Internet allows perpetrators to sextort victims from anywhere in the world.

Bi-Partisan Issue Nobody is against protecting kids from online predators!

International Issue Treaties Provide Authority for Amending Domestic and International Laws to Address Sextortion: CEDAW Convention on the Rights of the Child ICCPR

Let’s Work Together to End Sextortion Let’s issue “A Call to Action” throughout the world to “End Sextortion in the Digital Age!”

CWAG Africa Alliance Partnership www.cwagweb.org/aap