Raphael Cohen-Almagor 18.04.20141. Lecture Plan Five sections: Katies story Definitions Child-pornography and online sex offenders Possible remedies 18.04.20142.

Slides:



Advertisements
Similar presentations
1/13/20141 What is SimNet? LEARNING & ASSESSMENT MODULES FOR… Office 2010 | Windows Vista & IE7,8,9 | Windows XP, Vista & 7 | Computer Concepts In a simulated.
Advertisements

Monday, January 13, Instructor Development Lesson 9.
Children's Rights and Child Protection: Whats that got to do with the Internet? Vernon Jones Save the Children Denmark.
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.

How to protect yourself, your computer, and others on the internet
6/8/20141 Market Structures Chapter 7 Section 1 – Competition & Market Structures In this section, you will learn that market structures include perfect.
Submission Writing Master Class Gerard Byrne B Comm FCPA FAIM Townsville, 17 April 2010 Thursday, June 12,
UUCS Congregational Meeting December 5, /25/20141.
8/25/20141 Road Map to Success Business Plan Preparation Workshop.
08/01/ Final Conference The SONETOR platform- Functionalities and services Catherine Christodoulopoulou CTI.
10/22/20141 GDP and Economic Growth Chapter /22/20142 Outline Gross Domestic Product Gross Domestic Product Economic Growth Economic Growth.
MySpace and Online Safety Brian Boies. Agenda  What is MySpace?  Dangers and Realities  Safety Tips.
Wolfpack Advocacy Hour January 10, 2012 Grade 10.
KEEPING OUR YOUNG PEOPLE SAFE ONLINE. Nine Young Lives Lost
The Grooming Process. Trafod Sexual Abuse and Trauma Centre.
Breaking Trust On The Internet
INTERNET SAFETY.
How to keep your kids safe online
Children online: Risks they might face Awareness raising session – Secondary.
REVENGE PORN ROUNDTABLE 5 TH SEPTEMBER WHAT IS REVENGE PORN?  Revenge porn is when a partner or ex-partner shares images of sexual nature without.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Emily Snyder, William Darras, Stephanie Berger.  40Y 40Y.
CYBERSAFE – PARENTING ONLINE. CYBERBULLYING DEFINITION: intended, deliberate, repeated, virtual hostile behaviour with the usage of ICT FORMS: Denigration.
 Grades 5-8 – 56 out of 66 – 85%  Grades 9-12 – 79 out of 85 – 93%  Grades 5-12 – 135 out of 151 – 89%  100% of the Juniors and Seniors use a social.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
ONLINE PREDATORS: HOW SAFE ARE WE? A PHOTO PRESENTATION BY: MICHELLE OCASIO & BRIANNA PEREZ.
GROUP 3: APRIL, DELICIA, LISA, SHEILAH.  Your child spends large amounts of time on-line, especially at night.  You find pornography on your child's.
Internet Safety Christopher M. Sattele PLS: SP10 ENGOL P. Hutton.
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
What Every Parent Needs to Know! Internet Safety Information for Parents Purpose: Provide practical information parents can use at home Present safety.
Introduction Social Implications & EthicsSocial Implications & Ethics Since the introduction of the Internet, many policies have been introduced as a way.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
SEX OFFENDERS AND VICTIMIZATION IN OUR COMMUNITY Awareness, Support and Prevention San Diego County Sex Offender Management Council
Ashley Counce. What is Cyber Bullying?  Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. By definition,
Internet Safety How to keep your children safe as they use the web.
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
Social Media Safety Manchester Township Middle School Guidance Department
“A Global Movement to Protect Children” The International Centre for Missing & Exploited Children (ICMEC) is the leading global service agency working.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Bethany Webber. Facebook Facebook is a free worldwide social network service which started in February 2004 Founded by Mark Zuckerberg and his college.
E-safety is all about keeping children safe online.
Chief Chip! Helping our children & young adults to stay safe online.
Internet Safety How To Keep Your Children Safe As They Use The Web.
Digital Citizenship Eagle Ridge’s School Policy. Expectations for Students  Students are invited to use their personal devices as directed by their teacher.
PGHS Advocacy Digital Citizenship Lesson 2
Internet Safety Wendy Varner. Internet Safety –The goal is to educate students on how to avoid dangerous, inappropriate, or unlawful online behavior.
Computer crimes.
The internet is an amazing resource. We can connect, communicate and be creative in a number of different ways, on a range of devices. However, the internet.
CYBERBULLYING Cyberbullying is when someone bullies others over the internet or on a mobile phone by sending abusive s or texts directly or by posting.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
ONLINE PREDATORS: HOW SAFE ARE WE? A PHOTO PRESENTATION BY: MICHELLE OCASIO & BRIANNA PEREZ.
Anna Buchanan & Alix Gilmore. 6:43.
E-safety Parent Workshop Helping to keep your children safe online.
Sexting in Schools – How do we need to respond. Images or videos generated by children under the age of 18, or of children under the age of 18 that are.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
St. Anne’s Baslow Online Safety Before we start… O Throughout this meeting I hope to provide information that you will find useful in keep your.
There are approximately 500million tweets sent every day
Emily Snyder, William Darras, Stephanie Berger
Tips and Information for Parents
Unit-III Violent Crime and Digital Evidence
● SmartLaw Sexting and the Law.
Sexting and the Law.
Whilst you are sat down have a think about what are your concerns around keeping your family safe on the internet?
Presentation transcript:

Raphael Cohen-Almagor

Lecture Plan Five sections: Katies story Definitions Child-pornography and online sex offenders Possible remedies

Katies story Social Responsibility Moral panic

Definitions Child pornography depicts children in sexual context. By definition, children cannot consent to sex. It is abusive and coercive. Every depiction of sexual intercourse with real children is considered to be molestation, a criminal act

Definitions Online child sex offenders are people who watch, download, produce, store and transmit images of children in a sexual context. Online child sex offenders utilise the Internet for this purpose. The term paedophilia is a clinical term and is used to refer to a psychosexual disorder involving a sexual preference for children

Online Behavior: Where Parents and Teens Agree 81% of parents and 79% of teens agree that kids are not as careful as they should be about the information they give out online 62% of parents and 62% of teens agree that kids do things online that they wouldnt want their parents to know about Overall, most parents believe that the internet is a good thing for their children

Child Pornography Pornographers are always among the first to recognize and exploit the potential of each new wave of communication technology, from the printing press and early photography to film and video, and now the Internet Most states prohibit by their criminal law the production, promotion, sale, exhibition, or distribution of photographs or videos of children engaged in any sexual activity

Child Pornography The Internet features of accessibility, privacy and low cost serve to encourage some offences. Child pornography is often used by offenders to groom children by normalizing sexual activity with children and breaking down inhibitions, or to blackmail a child into desired behaviour by threatening to expose their use of pornography. The saturation of the internet with such material may serve to normalize this behaviour and probably makes it easier to objectify children as sexual artifacts. Pornography is also thought to reinforce a persons sexual attraction to children

Child Pornography Social-networking sites have been shown to attract sexual predators looking to take advantage of naïve young people. Launched in 2004, MySpace has swiftly become one of the biggest hits in the history of the Internet. Crimes as serious as murder and rape have been linked to teens using the site. There is a strong link between those who collect images and those who molest children. The following chart shows who are the offenders:

10

The Offenders 77% of the offenders were known to the child. These were his/her parents, their partners, relatives, babysitters and neighbours. 12% were offenders who enticed children via the Internet. 5% (others) were unknown to the children. 6% invited/initiated/self-inflicted the offence

Identity Child pornographers conceal their true identity by means of proxies, false flag addresses, the use of which means that the host site will not be able to identify a visitors true IP. They (the careful ones) will never use their own credit card to pay for photos or videos. Some users succeed in hacking into a pay server, stealing another persons credit card, but this route is only for the truly ingenious

How Child Pornographers Work? A person has a collection of several thousand child porn images He likes to share them First, he obtains a proxy that conceals his name and location and acquires a new account under a false name from an anonymous provider, likely in a third world nation: both are easy to do. With these bogus credentials, he opens an account that permits him to set up a home page on an innocent and aboveboard public server such as angelfire.com

How Child Pornographers Work? Unknown to the provider, the person loads how many photos he wants The site is of no use to anyone as yet, in that nobody is likely to stumble across it by accident Our generous child-pornographer used to announce the posting of the series on the Maestro board or one of its counterparts, where the message is read and acknowledged gratefully by other loli fans Duly alerted, consumers then flock to the site advertised, which may be based in any of twenty countries, and then download the pictures. The images will exist at that site only for a few hours before they are removed and the site ceases to exist

How Child Pornographers Work? In the past, the best way to discover child- pornographers activity was by discerning a site that suddenly attracted thousands of hits within a few hours Sometimes money changes hands and videos are sold, but many sites that demand payment for access are bogus, and anyone gullible enough to pay will, if he is lucky, just lose the price of admission; if he is less fortunate, he will have earned a visit from the police

How Child Pornographers Work? In 2009, Swiss police uncovered an Internet child pornography network spanning 78 countries and involving at least 2,000 IP internet addresses. An inquiry was launched after a tip-off from Interpol about a Swiss website being used as a forum for illegal child pornography films. The site was officially devoted to hip hop music but was used to access videos of child pornography via secret codes

How Child Pornographers Work? The authorities had been monitoring the website for some time. Dozens of arrests and several convictions have been made as a result of the investigation, which began in May The site's designer was apparently not aware what it was being used for and was cleared of any involvement in the ring

Collections The vast majority of people who post or distribute pictures do so out of non-economic motives The sense for completion or perfection is particularly marked in child porn collecting. Hobbyists seek unbroken series of the various photo shoots such as KG or Tiny Americans, and they pride themselves on their achievement in seeking out and amassing items

Rings Sex offenders operate in clandestine methods to hide their illegal activities. They operate via closed chatrooms and hidden websites, sometimes hijacked for their purposes, sometimes established for a brief period of time. They operate in rings that cross continents. Always under fear that the ring might be compromised

Encryption The careful child-pornographers use encryption when they exchange images Without the key, it is very difficult to decode the image Encryption is the best friend of all people involved in illegal activities: Child-pornographers, terrorists and criminals

Remedies Education Parental Supervision Physical-Geographical Control (at home, in libraries) Filters Denying Legitimacy ISPs Liability

Remedies Need for more youth education International cooperation between governments as well as between governments and Internet Service Providers

Remedies Business Ban International Cooperation: Working Group on Internet Governance Legislation and Precedents Monitoring Websites Removing Criminal Websites CleaNet

Remedies Introducing a different rationale: Instead of free highway, social responsibility

The Threats of the Internet Global solution for global problem Filters Business ban Individual/ ISPs State Whos Responsible?

Thank you