st rita catholic church march 21 2006 l.
Skip this Video
Loading SlideShow in 5 Seconds..
ST. RITA CATHOLIC CHURCH MARCH 21, 2006 PowerPoint Presentation
Download Presentation

Loading in 2 Seconds...

play fullscreen
1 / 78

ST. RITA CATHOLIC CHURCH MARCH 21, 2006 - PowerPoint PPT Presentation

  • Uploaded on

ST. RITA CATHOLIC CHURCH MARCH 21, 2006 INTERNET SAFETY RULES ‘N TOOLS ™ Prepared by Donna Rice Hughes (Presentation copyrighted) Overview Internet Dangers (vs. Benefits) Children’s Access to Pornography Cyber-Sex & Addiction

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about 'ST. RITA CATHOLIC CHURCH MARCH 21, 2006' - salena

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
st rita catholic church march 21 2006


RULES ‘N TOOLS™ Preparedby Donna Rice Hughes

(Presentation copyrighted)

  • Internet Dangers (vs. Benefits)
  • Children’s Access to Pornography
  • Cyber-Sex & Addiction
  • Pedophiles’ Access to Children
  • Preventative Solutions & Rules N’ Tools
  • Spiritual Solutions
spiritual battle
  • Our struggle is not against flesh and blood, but against rulers, powers, forces of darkness & spiritual forces of wickedness.Take up the full armor of God to resist in the evil day and having done everything to STAND FIRM. (Ephesians 6:1-19)
spiritual battle4
Spiritual Battle
  • “The thief does not come except to steal, kill and destroy, I have come that they may have life, and that they may have it more abundantly.”

Jesus, John 10:10

porneia symbolic of idolatry word study
PORNEIA(Symbolic of Idolatry, Word Study)
  • To commit any sexual sin
  • Root word for pornography, harlot, prostitute, fornicator, whoremonger
  • “Pornography” is the graphic depiction of sexual immorality
  • Idolatry - worship of body and body parts (Romans 1:21-2:1)
internet dangers a tool used for good or evil
Internet Dangers (A tool used for good or evil)

1. Free and easy access to inappropriate and illegal content with unrestricted Net access:

- Pornography (child porn, obscenity, harmful to minors)

- Violence

- Bomb-making

- Hate speech

2. Predators have easy and anonymous access to unsuspecting kids

the adult internet industry
The “Adult” Internet Industry
  • $12 billion dollars in annual revenue – larger than the combined annual revenues of ABC, NBC, and CBS(Family Safe Media, Jan. 2006)
  • By the end of 2004, 420 million pages of pornography owned by less than 50 companies(Summit on Pornography, 5/19/05).
deceptive tactics
Deceptive Tactics
  • 74% of adult commercial sites display free teaser pornography images on homepage, often banner ads
  • 25% prevented users from exiting site (Mousetrapping)
  • Only 3% required adult verification

(Child-proofing on the World wide Web: A Survey of Adult Webservers,2001, Jurimetrics. NRC Report 2002)

unintentional access
Unintentional Access
  • Misspelled Words
  • Innocent Searches (toys, boys, pets, etc.)
  • Stealth Sites- (whitehouse; watersports)
  • Brand Name Misuse (Disney, Nintendo, Barbie, Levis, etc.)
youth and internet pornography
Youth and Internet Pornography
  • Adult industry says traffic is 20-30% children(NRC Report 2002)
  • More than 11 million teens regularly view porn online ( The Washington Post, July 1, 2004).
  • 87% of college students have virtual sex using IM, webcam, and telephone (Canadian poll,, 2006)
easy and free access
Easy and Free Access
  • 9 in 10 kids ages 8-16 yrs have viewed pornography online, mostly unintentionally, and when using the Internet to do homework(UK:News Telegraph, NOP Research Group, 1/17/02)
  • In 26% of cases where youth accidentally stumbled into pornographic websites, the youth stated being exposed to another sex website when they were attempting to exit the initial website( “The Exposure of Youth to Unwanted Sexual Material on the Internet: A National Survey of Risk, Impact, and Prevention,” 2003).
online obscenity
Online Obscenity
  • vs.
    • Pornography depicting bodily functions
    • Live video
cyber sex compulsions crack cocaine
  • 71.9 million people visited adult sites in August 2005, reaching 42.7 % of the Internet audience (Media Metrix).
  • More than 32 million unique individuals visited a porn site in Sept. of 2003. Nearly 22.8 million of them were male (71 %), while 9.4 million adult site visitors were female (29 %)(Nielsen/Net Ratings, Sept 2003).
  • 41% of women said they had deliberately viewed or downloaded pornographic pictures and movies(Pornified: 2005).
  • 51% of pastors say cyberporn is a possible temptation. 37% say it is a current struggle(Christianity Today, Leadership Survey, December 2001).
  • * Affects attitudes, choices and behavior
  • * Demeans children, women, and men
  • * Counterfeit for love, intimacy, and commitment
  • * Drug of choice - anesthetizes pain
harms to youth kids online protecting your children in cyberspace donna rice hughes
Harms to Youth(Kids Online: Protecting Your Children In Cyberspace, Donna Rice Hughes)
  • Interferes with a child’s development and identity
  • Shapes attitudes and values
  • Promotes desensitization
  • Images never erased
  • May incite children to act out sexually against other children
harms cont
Harms (cont.)
  • Incidents of young children displaying sexually aggressive behavior has increased, exposure to online porn is a key factor (Australian study, 11/2003)
stages of addiction
Stages of Addiction

Dr. Victor Cline, University of Utah:

  • Addiction - The need to keep coming back for more (drug of choice)
  • Escalation - The need for more explicit, rougher and more deviant images for same effect
  • Desensitization - Material once shocking or taboo is acceptable
  • Acting out - Tendency to sexually act-out behaviors depicted in pornography (public safety issue)
child pornography
Child Pornography
  • More than half of all illegal sites are hosted in the U.S. (National Criminal Intelligence Service, 8/21/03).
  • Approximately 20% of all Internet pornography involves children(National Center for Missing & Exploited Children, 2003).
  • More than 20,000 images of child porn posted on the Internet every week (National Society for the Prevention of Cruelty to Children, 10/8/03)
  • More babies and toddlers are appearing on the net, the abuse is getting worse (Combating Peadophile Information Networks, 3/03)
new trend teens and child porn use
New Trend – Teens and Child Porn Use
  • Young people aged 15 to 20 were the single biggest demographic group, accounting for one-quarter of all child porn users tracked and caught by investigators. One-third of the 185 criminals gave their occupations as students, of which 60 percent were studying at tertiary level(New Zealand’s Department of Internal Affairs. Internet Traders of Child Pornography: Profiling Research, October 2005).

(Based on a report involving 202 sexual offenders)

child porn and the predator
Child Porn and the Predator
  • 40% of arrested child pornography possessors had both sexually victimized children and were in possession of child pornography(NCMEC June 2005).
  • Of those arrested in the U.S. for the possession of child pornography between 2000 and 2001, 83% had images involving children between ages 6 and 12; 39% had images involving children between ages 3 and 5; and 19% had images of infants and toddlers under age 3(National Center for Missing & Exploited Children., 2005).
predators online
Predators Online
  • Pedophiles’ & Predators’ Anonymous Access to Youth
  • Easy Access to Child Pornography
  • Virtual Validation
  • Trade Secrets & Teaching Tools
  • Avoidance of Law Enforcement Detection
online victimization a report on the nation s youth
Online Victimization: A Report on the Nation’s Youth
  • 1 in 5 received sexual solicitation or approach in last year (Sample of 1,501 youth ages 10-17 who use Internet regularly)
  • 50,000 predators online at any given time. (Dateline, NBC, 2005)
juvenile perpetrators
Juvenile Perpetrators
  • Juveniles
    • 48% of overall solicitations
    • 48% of aggressive solicitations
  • Adult solicitors-
    • Most of the “adult” solicitors were ages 18-25
    • 24% of solicitations
    • 34% of aggressive solicitations
tool of today s pedophile chat im blogs
  • 89% of sexual solicitations were made in either Chat rooms or Instant Messages(Pew Study reported in JAMA, 2001)
  • “30% of teenage girls polled by the Girl Scout Research Institute said they had been sexually harassed in a chatroom. Only 7%, however, told their mothers or fathers about the harassment because they were worried that their parents would ban them from going online”(Girl Scout Research Institute, 2002).
youth ignorance factor
Youth Ignorance Factor
  • Children ages 7-17 who surf the net, if asked online:

- 29% would freely give out home address

- 14% would freely give email address ( 1/02).

  • 65% of all parents and 64% of all teens say that teens do things online that they wouldn’t want their parents to know about(Pew Internet & American Life Project, 12/12/05).
parent s ignorance factor
Parent’s Ignorance Factor
  • “86% of the girls polled said they could chat online without their parents’ knowledge, 57% could read their parents’ e-mail, and 54% could conduct a cyber relationship”(Girl Scout Research Institute, 2002).
  • Teenagers use chat lingo to communicate when Instant Messaging and parents don’t know the meanings of some of the most commonly used phrases. 57% don’t know LOL (laughing out loud), 68% don’t know BRB (be right back), and 92% don’t know A/S/L (age/sex/location) (NCMEC, 12/14/05).
using internet technology

Using Internet Technology…..

How hard is it for a predator to target a child?


Most online or Internet service providers provide user directories to assist their members identify others with similar interests. In our nefarious but capable hands...

after 2 minutes we have determined that amanda is
After 2 minutes we have determined that Amanda is:
  • most likely a female child
  • likes seashells, rollerblading and English class
  • has a little brother that most likely answers to Billy, Junior or J.R. and
  • her valid email address

Using Deja News or AltaVista we can check for more information by searching newsgroup postings

Using the Power Search option we continue the inquiry


I now know how many messages Amanda has posted; when and where the messages were posted, and the text of each message.

within 12 minutes i know
Amanda is her first name

She is a young girl who likes beanie babies, rollerblading, and English class

Has a baby brother named Billy Jr.

Has a Mom or sister named Sue

A good idea when she’s at home

She lives on the East Coast

Her home telephone number

Within 12 minutes I know:

There are many online services that allow for searches using as little as one variable.

What can I find out about her from the telephone number?


I bet this Amanda’s last name...

Good news. Most of these services will allow you to change or eliminate your personal data from the directories.


using her last name.

I bet I can find out where she lives...

With each additional piece of information, I can perform additional searches.


Voila. I can even get closer.

But how do I get there from Chicago?


Within 45 minutes I learned:

  • target is a female child
  • whose full name is Amanda Welch
  • the email address is
  • she likes seashells, rollerblading and English class
  • has a baby brother named Billy
  • collects or trades beanie babies
  • full names of her mother, father, and brother
  • her home telephone number is 410-745-8454
  • she’s probably home by 5:30 weekdays
  • or Mom arrives home from work then
  • She lives at 618 Hammerstone Drive in Laurel, Maryland
  • specific directions to her home
  • what public schools are nearest to the her home
myspace com facebook com xenga com,
  • A blog – short for web log
  • 42 million members
  • Dishonesty
  • Inadvertent exposure
  • Threats and fear
  • Confessional
  • Innocence destroyed
  • Age 14 and up
myspace cases
MySpace Cases
  • 14-year-old Judy Cajuste found strangled and naked in Newark, NJ garbage bin. (Jan 2006)
  • 16-year-old girl was attacked by a 37-year-old man who read her profile on and tracked her down at her after-school job (Jan 2006)
  • 17-year-old college freshman was murdered by man who found her info. at (Sept 2005)
  • 33-year-old Hughson, CA firefighter was arrested for having sex with a 16-year-old boy he met on (March 2005)
prevention three prong solution
Prevention:Three-Prong Solution
  • Shared responsibility between the
  • 1. Public (Parents, Schools, Libraries)
  • 2. Technology Industry
      • 3. Legal Community - Law Enforcement & Public Policy
      • 4. Faith-based Initiative
  • Each provides an essential layer of protection
public prong
Public Prong

Role of Parents, Teachers, and Librarians

- Awareness, education and empowerment

-Rules N’ Tools

Both are essential, one without the other is ineffective

technology tools
Technology Tools
  • Desktop solutions
    • Filtering (set filtering levels)
    • Monitoring- software and/or checking cache
  • Server-based filtering
  • “Go lists/Suggest lists” (Internet Kids & Family Yellow Pages)
  • White lists - Pre-approved sites –The Children’s Internet
  • Safe Search Engines
  • Filtering solutions are not 100% effective
legal prong government and law enforcement
Legal Prong Government and Law Enforcement
  • Aggressive enforcement of current laws (child pornography, obscenity, child stalking laws)
  • The public should not have to shoulder the burden of protecting against illegal content and criminal activity
legislation in the courts
Legislation in the Courts
    • Child Online Protection Act (COPA) - Adult verification required - ACLU, ALA challenge-enjoined.
    • Child Pornography Protection Act - Extend law to include computer-generated child porn. Supreme Ct struck down.
    • Child Internet Protection Act (CIPA) - Requires schools & libraries to filter - ACLU & ALA challenge (March 2003).
  • New Laws and Rulemaking: Spam, Deceptive Marketing Tactics, Mousetrapping
rules n tools
Rules ‘N Tools
  • Go over Rules N” Tools handout
  • Rules N’ Tools – Parents Pledge
  • Rules N’ Tools – Parent Buddy Check
  • Youth Internet Safety Contract
ages 4 7
Ages 4-7
  • If child is introduced to Internet, be present at all times
  • You and your child should have the same e-mail address
  • Use a restricted white list
ages 8 11 age of likely child sex abuse victims
Ages 8-11 (age of likely child sex abuse victims)
  • Most restrictive Internet filter (no chat)
  • Get to know your child’s online activities and friends
  • Teach them not to interact with people they do not know offline
  • Discuss anonymous behavior
  • Discuss how they feel if you discover they’ve been sexually exploited
  • Keep lines of communication open
  • No chatrooms, no IMs
ages 12 14
Ages 12-14
  • Set filters accordingly (categories- sex, nudity, violence, drugs, etc)
  • Limit time online
  • Approve buddy list and explain
  • Disallow chatrooms and explain
  • No online profiles
  • No blogging sites
ages 15 18
Ages 15-18
  • Stay on top of your teens online activities
  • Continue filtering
  • Do periodic spot checks/possible monitoring if you suspect dangers
  • Discuss healthy sexuality vs. porn messages
  • Learn about your child’s friends’ online activities
  • Prepare them for college where they will have no Internet guidelines
  • I recommend that you limit IM and block chat
  • Carefully monitor blogging sites
open and honest communication
Open and Honest Communication
  • Have you ever seen pictures on the Internet that make you uncomfortable?
  • Has anyone online ever said to you that made you feel uncomfortable?
  • Have you been contacted by someone you don’t know in person?
  • Has anyone asked you for personal information?
  • Has anyone asked to meet you in person?
a guide to parents how to surf myspace
A guide to parents: How to surf MySpace
  • The best resolution is simply for a youth not to establish a personal blog
  • MySpace private – allows members to control others’ access to their profiles
  • Let teens read of the dangers of MySpace and similar websites for themselves since teens can be skeptical of parental advice

Here's some advice for new browsers.

  • Become a member
  • Once logged on, click on the link "search." MySpace gives members several options for searching.
  • To find your child, search using his or her e-mail address.
a guide to parents how to surf myspace continued
A guide to parents: How to surf MySpace (continued)

5. If that fails, search using the "Classmate Finder" option. Type in school's name and state, and then click on the school name. MySpace then allows you to "refine your school search." Options include searching for current students or alumni. Make sure, when adjusting the "between ages" criteria, to have generous search criteria. Many high school students inflate their age, saying they are 21 when they are actually 16 (or younger).

6.Scroll down, and you'll see thumbnail pictures of MySpace profiles. Click on the picture, and you'll be taken to the teen's MySpace.

myspace com cont (cont.)

7.Not every teen links to his high school. But if you get onto the MySpace of one student, chances are they've linked to other students at the school. You can find these by clicking on the link "View all friends."

8. Once on a person's MySpace, an interesting place to look at is the "view more pics" link, which is right under the photo on the left side of the screen. This is where members post photos, and other members comment on them.

warning signs
Warning Signs
  • Hiding disks
  • Too much time online or online late at night
  • Picture files taking up a lot of storage space on computer
  • Unusually sexually curious or active sexually for their age
  • Unusual charges on your credit card
  • Computer screen quickly changes when parent walks in room
  • Youth becomes very secretive or defensive
recommendations if your child has been sexually exploited
Recommendations if your child has been sexually-exploited
  • Believe your child
  • Commend your child for telling you
  • Convey your support for your child
  • If your child feels guilty or at fault, try to alleviate self blame
  • Temper your own reaction - try to be calm and reassuring
  • EIE Resource List (
  • Report suspected illegal activity to local police and to cybertipline


  • Locate specialized agency or professional to help your child and family
  • If your child has been physically abused, locate physician with experience in evaluation
recovering hearts faith based initiative
“Recovering Hearts”Faith-based initiative
  • Equip Church to help those who are sexually broken through healing, deliverance and restoration
  • Confession, Repentance, Accountability

“If my people, who are called by my name, will humble themselves and pray and seek my face and turn from their wicked ways, then will I hear from heaven and will forgive their sin and will heal their land.” 2 Chronicles 7:14

come into the light of god s unconditional love
Come Into the Light of God’s Unconditional Love
  • “Let he who is without sin cast the first stone.” Jesus
  • Allow those who are sexually broken to come into the light w/out fear of judgment, shame or public disgrace
  • Victory is in the shed blood of Jesus
the good news
  • Preach gospel to poor
  • Heal the broken-hearted
  • Preach deliverance to the captives
  • Recovery of sight to the blind
  • Set at liberty them that are bruised

--Jesus, Luke 4:18

  • (Enough Is Enough is a national non-profit whose mission is to make the Internet safer for children and families)
  • Sexual Brokeness Resource List
  • Kids Online: Protecting Your Children in Cyberspace
follow up
  • EIE follow-up
  • Complete Survey