Child Pornography - Fenety Marketing Services
Transcription
Child Pornography - Fenety Marketing Services
TABLE OF contents 16th Annual Community Guide Child Pornography Awareness Royal Newfoundland Constabulary Association 3 5 6 7 9 11 79 81 85 87 93 95 97 99 101 103 105 107 109 Premier’s Message RNCA President’s Message Minister’s Message Chief of Police’s Message RNCA Executive Members Publisher’s Message Donations to the Community Family Fun Day Motorcycle Ride for Dad Seniors’ Christmas Party 2006 (St. John’s) Detective Sergeant Thomas Fraize Scholarship / RNC Cadets Tour de Rock / Lobby Day Annual RNCA Hockey Tournament Police Week Crime Stoppers Police Officer of the Year Award - 2006 RNC 20th Year Service Medals Arbitration Award NLPPOMA - Newfoundland and Labrador Police and Peace Officers’ Memorial Remembrance Day Parade Child Pornography Awareness Child Pornography....Behind Every Picture There’s Pain Child Pornography Canadian Background Criminal Code Child Pornography and Internet Luring – DNA Data Bank Reforms In the News… A Teen Makes Money With a Controversial Site Microsoft Technology Helps in Fight Against Child Pornography www.rnca.ca 21 23 35 Snapshot of Minors Online and How Predators 45 Reach Them Kids in the Know 55 Cybertip.ca 61 Chat Dictionary – decipher what your kids are saying 65 Why Internet Filter Software? 75 77 Resources 41 Advertiser’s Index 13 15 17 19 1 112 Message from the Premier On behalf of the Government of Newfoundland and Labrador, I applaud the men and women of Message from the Premier the Royal Newfoundland Constabulary Association for focusing the 16th Annual Community Message from the Premier issues pornography. and Labrador, I applaud the men and women of the Royal OnGuide behalfonof the surrounding Government child of Newfoundland Newfoundland Constabulary Association focusing the 16th Community Guide issues On behalf of the Government offor Newfoundland andAnnual Labrador, I applaud theon men andsurrounding women of child The Provincial Government is very much aware of the terrible consequences of child pornography th pornography. Annual Community the Royal Newfoundland Constabulary Association focusing the 16 on individuals, families and societies as a whole. To addressfor this very serious crime, government Guide on issues surrounding child pornography. hasProvincial made significant investments awareness education and policing deal with thison individuals, The Government is veryinmuch aware and of the terribleprograms consequences of childtopornography issue. and Wesocieties have increased our spending programs havecrime, provided resourceshas to hire families as a whole. To address this veryand serious government madeadditional significant investments The Provincial Government isGovernment very much isaware of thetoterrible consequences of child pornography social workers and police officers. committed providing significant resources to in awareness and education programs and policing to deal with this issue. We have increased our spending programs on individuals, families and societies as a whole. To address this very serious crime, government educate the public and prevent child pornography, thereby protecting the children and youth of our and have provided resources to hire additional social workers and police officers. Government is committed to has made significant investments in awareness and education programs and policing to deal with this province. providing significant resources to educate the public and prevent child pornography, thereby protecting the children issue. We have increased our spending programs and have provided resources to hire additional and youth of our province. We are committed providing a high level of public protection and have worked diligently over social workerstoand police officers. Government is committed to providing significant resources to the past three and a half years to provide our police forces with the human and operational resources the to public and prevent childofpornography, thereby protecting childrenover andthe youth ourand We areeducate committed providing a high level public protection and have workedthe diligently past of three required to this with province feel safe secure in their communities. Our the people of province. a half years to ensure providethe ourpeople police of forces the human and and operational resources required to ensure in secure Budgetin2007 ensure more police officers are on ourinstreets, thisadditional province investment feel safe and theirwill communities. Our additional investment Budgetequipped 2007 will ensure more with the necessary tools to combat crime, which included planning for another 30 cadets in theincluded 2006are are committed to providing a high of publictools protection andcrime, have which worked diligently over for police We officers on our streets, equipped with level the necessary to combat planning 2007. The RNC has used additional funding to develop and enhance the Computer Forensic Section three a half yearsThe to provide ourused police forces with the to human andand operational resources anotherthe 30past cadets in and the 2006-2007. RNC has additional funding develop enhance the Computer to assist with investigations serious crime. As well,crime. additional Community Services required to ensure thesurrounding people ofthis this province feel safe and secure inadditional their communities. Our Forensic Section to assist with investigations surrounding this serious As well, Community Services Officers helping to educate our children promote public awareness education forstreets, issues Officers areare helping to educate ourBudget children andand promote public awareness andand education issues surrounding child additional investment in 2007 will ensure more police officers are onforour equipped surrounding child pornography. pornography. with the necessary tools to combat crime, which included planning for another 30 cadets in the 2006- 2007. The RNC has usedwith additional funding develop and enhance the Computer Forensic Section look forward partnering theRNC, RNC, RCMPto and other stakeholders stakeholders throughout the WeWe look forward toto partnering with the RCMP and other throughout the province province to ensure that to assist with investigations surrounding this serious crime. As well, additional Community Services to ensure that parents confident children are safe and secure. parents are confident thatare their childrenthat are their safe and secure. Officers are helping to educate our children and promote public awareness and education for issues Congratulations this worthwhile publication, thank all members theenforcement law surrounding child pornography. Congratulations on on this worthwhile publication, and and thank you you to alltomembers of theoflaw community for enforcement community for your dedication and commitment to our province. your dedication and commitment to our province. We look forward to partnering with the RNC, RCMP and other stakeholders throughout the province Sincerely, Sincerely, to ensure that parents are confident that their children are safe and secure. Congratulations on this worthwhile publication, and thank you to all members of the law enforcement community for your dedication and commitment to our province. DANNY WILLIAMS, Q.C. Sincerely, DANNY WILLIAMS, Q.C. Premier of Newfoundland and Labrador Premier of Newfoundland and Labrador www.rnca.ca DANNY WILLIAMS, Q.C. 3 PRESIDENT’S m e s s a g e Children are the most vulnerable in our society and we must strive to protect them from the perils associated with the easy access that the internet has provided to predators who would capitalize on the opportunity to prey on our children. We hope that the information provided in this community publication will assist parents and guardians in assessing risks and confronting threats associated with child pornography. We hope that it might also warn potential offenders that there is a real risk of being apprehended for these heinous crimes and inform them that we are on guard against their opportunistic approaches. This effort would not be possible without the continued support that we receive from the business community and individual citizens who contribute to this effort each year as we strive to address the various issues that afflict our society. Our thanks are heartfelt and we encourage readers to support the many business and organizations that make this publication a reality. Thank you again for your support and we look forward to serving you, the public, as members of your Provincial Police Force. Sincerely, Cst. T.W. Buckle President RNCA www.rnca.ca 5 Message from the Chief of Police On behalf of the Women and Men of the Royal Newfoundland Constabulary, I wish to extend my congratulations to the Royal Newfoundland Constabulary Association on the publication of their 16th Annual Community Guide. Child pornography and other crimes committed against children have become serious concerns in all Canadian Communities. It is troubling to know that through the internet child predators can easily target large numbers of children at any time. The Royal Newfoundland Constabulary is committed to protecting our families from these predators through the services of our fully operational Computer Forensic Section that supports the efforts of our investigators. As well, our officers are availing of Cyber Crime Investigation Training and Internet Child Exploitation Training through the Canadian Police College. These training opportunities will enhance our abilities to protect our citizens. The RNC is also being proactive through our Community Services Officers who are continuing to educate our youth and ensure they have the tools and the knowledge to protect themselves. The distribution of this Guide will compliment the efforts of the RNC in the provision of our goal to educate and protect our youth. I would like to personally thank all officers of the RNC serving in the Northeast Avalon, the Corner Brook Division, and Labrador West Division, as they continue to serve their communities in a professional and dedicated manner. Sincerely, Joseph F. Browne Chief of Police Royal Newfoundland Constabulary www.rnca.ca 7 EXECUTIVE Warren Sullivan 2nd Vice President Kenny Jackson Ist Vice President Tim Buckle President Paul Davis Secretary Kerry Chaytor Executive Assistant Todd Barron Treasurer Colin Deacy Director, Platoon A Albert Gibbons Director, Support Services John Whelan Director, Labrador West Danny Doiron Director, Platoon B Tony Walshe Director, Platoon D Mike Kavanagh Director, Platoon C Sue Bill Director, CID John Goss Director, Corner Brook www.rnca.ca 9 PUBLISHER’S m e s s a g e The topic of this year’s publication has to be among the worst topics that we have ever focused on in the sixteen years of publishing the Royal Newfoundland Constabulary Association’s Annual Community Guide. We hope that this publication helps to enlighten those not familiar with this tragic subject by exposing the existence of a very real societal problem… Child Pornography. At one time, Child Pornographers traded hard copy photos and literature, but now, as a result of technology, they are taking advantage of easy Internet access into our very homes, making it easier for them to prey upon our children. The frequency of offences is also increasing as we constantly hear in the news of more and more predators being caught, and for everyone that is caught, unfortunately many are not. It is an alarming problem and one of the real dangers lurking on today’s Information Highway. However, as these sick predators do use the Internet to lure their prey, the Internet is also being used by dedicated law enforcement professionals to help identify offenders. Special Law enforcement task forces and Internet Safety Groups that are proactively working to end the sexual abuse of children are to be commended for their vigilance and for the courage and strength that is required of them to carry out their mandates. Please take the time to review the material that we’ve assembled in our 16th Annual Community Guide, however, be aware that the information contained herein is merely a fraction of the resources available on this tragic subject. We welcome your comments or suggestions concerning our publication, and wish to thank all the citizens and business community members of Newfoundland and Labrador who help make this annual publication possible. Education is awareness, and awareness is the first step to finding solutions. Respectfully, Mark T. Fenety President Fenety Marketing Services (Atlantic) Ltd. “Providing quality, professional marketing and fund raising services on behalf of high-profile, non-profit organizations.” Marketing Services (Atl.) Ltd. 1-800-561-4422 www.rnca.ca 11 Child Pornography… Look into the eyes of a child who has been sexually abused and you'll see pain - a pain that endures long after the bruises have healed. This pain is compounded by child molesters who create images of the sexual abuse and share them with other child molesters. They trade them in chat rooms and post them on thousands of Web sites. These people are making money from the pain of children. Help stop these dangerous criminals. If you see child pornography, report it. Please help make sure those responsible get the punishment they deserve. Just as the Internet has played an integral part in the resurgence of child pornography and child sexual exploitation, the Internet has also now become the leading-edge tool in its demise. It is a never-ending battle that is being fought by increasing numbers of law enforcement agencies, government agencies, and Internet support groups. Together, the battle can be won. The following section contains a minute sampling of information and resources available on the Internet, including tips to avoid your children from becoming victims of exploitation, some of the numerous organizations striving to eradicate the problem, and news stories. As part of a public service campaign to help raise public consciousness and stop the growth of child pornography online, wiredsafety.com grants permission of the use of this advertising campaign. WiredSafety hopes to have these ads appear on television, in major magazines, on radio, and numerous other places. These advertisements will not only inform the public of the existence of such atrocities, but also instruct people about what they can do to help cleanse the Internet of this filth. www.rnca.ca 13 Child Pornography Industry Canada industrie Canada The creation and distribution of child pornography, once a backroom industry, has been radically transformed by computer and digital technology. Hardware such as digital cameras, video cameras and Webcams combined with sophisticated software and an Internet connection increases exponentially the sheer volume of available product even while it creates instantaneous access to that product. In the borderless world that is the Internet, child pornography has become a truly global industry. Cheap admission to a vast, unregulated international marketplace represents a stunning benefit for purveyors of child pornography. First, since their work is illegal, it has been, by definition, clandestine. Second, the rate at which this technology can be adapted and improved effectively guarantees that the race to apprehend these criminals will be rigorous, intense and ongoing. International policing efforts over the past decade confirm that the worldwide volume of child pornography is extensive. Third, the Internet currently provides purveyors with a degree of anonymity. predators who regard the sexualized imagery of kids as instrumental to the satisfaction of their sexual appetites. The ready availability of online imagery promises to affirm and possibly increase these appetites. More directly, child pornography may also serve as a tool in the arsenal of sexual predators who are engaged in the business of "grooming" and "luring" child victims. Here, examples of child pornography may serve as proof to their prey that child sexuality is "normal." Predators are also known to solicit photos from children and youth. These photos may then become an irretrievable part of an international library of child pornography. As always, the responsibility rests with adults to educate children about these dangers and to be proactive about supervising the Internet activities of children and youth. http://strategis.ic.gc.ca Consumers of child pornography also enjoy anonymity as an online benefit. The Internet creates opportunities for consumers to seek and find not only a product, but also a supportive community. In numbers, there is not only safety but shared information. How does child pornography pose a risk to Canada's youth and children? Indirectly, the widespread presence of child pornography on the Internet confirms the existence of an organized and mobilized community of www.rnca.ca 15 Canadian Background Industry Canada industrie Canada In 2005, reforms to the Criminal Code of Canada further strengthened the prohibitions against the sexual exploitation of children including the child pornography provisions (broadened the definition, created a new offence against audio child pornography, narrowed the defence and increased the penalties) as well as increased the penalties for other child sexual exploitation offences. Additional reforms which also came into effect in 2005 created new offences to prohibit the trafficking of persons, including the trafficking of children for the purpose of sexual exploitation. In September 2005, Canada ratified the Optional Protocol to the Convention on the Rights of the Child on the Sale of Children, Child Prostitution and Child Pornography. Canada ratified the Convention on the Rights of the Child (“CRC”) on December 13, 1991 and in so doing, underscored its commitment to children, including its commitment to protect them from all forms of harm, such as child sexual exploitation. Two years later, in 1993, the Criminal Code of Canada was amended to include specific provisions against child pornography. Further reforms to the Criminal Code of Canada in 1997 made it possible to prosecute Canadian citizens or permanent residents in Canada for engaging in prohibited sexual conduct with children outside of Canada (child sex tourism) and strengthened the prohibitions and penalties for the prostitution of children. Finally in January 2006, additional criminal law reforms came into effect to facilitate the receipt of testimony by child victims and witnesses as well as other vulnerable victims and witnesses in criminal proceedings. In 1996 and again in 2001, Canada joined the international community in supporting the Declaration and Agenda for Action at the First and Second World Congress Against the Commercial Sexual Exploitation of Children which calls on all countries to take appropriate measures to prevent the commercial sexual exploitation of children. Responsibility for the criminal law and justice system is divided between the federal and provincial/territorial governments: the federal government is responsible for the criminal law which applies across the country and the provinces/territories are responsible for the administration of the justice system in their jurisdiction. Canada’s Criminal Code of Canada provides a comprehensive set of prohibitions to protect children from sexual exploitation including prohibitions against: In 2002, the Criminal Code of Canada was further strengthened to better protect children from sexual exploitation. In particular, the child pornography provisions were amended to ensure their application to these offences committed through the use of the Internet: new offences were created to criminalize accessing, transmitting and making available child pornography and to prohibit the use of a computer system to communicate with a child for the purpose of facilitating the commission of sexual offences (Internet luring). These amendments also gave the courts the power to shut down child pornography sites. • All sexual activity with young persons; • Using the internet to communicate with a child for the purpose of facilitating the commission of a sexual offence; • Possessing, making, distributing, transmitting, making available and accessing child pornography including through the use of the internet; • child sex tourism; and • Prostitution of anyone under the age of 18 years. In 2004, A Canada Fit for Children, Canada’s National Plan of Action for children was released. A Canada Fit for Children was developed with consultation from all levels of government, different sectors of society and children. It summarizes Canada’s commitment to children and identifies meaningful ways that Canadians can improve the lives of children in Canada and around the globe. It provides strategies to address the sexual exploitation of children including child pornography, child prostitution and child sex tourism. www.rnca.ca For more information on Canada’s laws in this area, please visit: http://laws.justice.gc.ca/en/ C-46/266995.html http://www.cyberwise.ca 17 Criminal Code Industry Canada industrie Canada The Criminal Code of Canada contains numerous criminal offences relating to all forms of child sexual exploitation. What is child pornography? The Criminal Code pornography” as: broadly defines For all other child pornography offences, the maxmimum penalty, on indictment, is ten years imprisonment and the minimum penalty is one year imprisonment. On summary conviction, the maximum penalty is eighteen months imprisonment and the minimum penalty is ninety days imprisonment. “child These offences also apply to the distribution of child pornography over the Internet, including via e-mail, and by posting material on websites. • Any visual representation that shows a person who is or is depicted as being under 18 years of age and is engaged in or depicted as engaged in, explicit sexual activity; • Any visual representation whose dominant characteristic is the depiction, for a sexual purpose, of a sexual organ or the anal region of a person under 18 years; • Written material, visual representation or audio recording that advocates or counsels unlawful sexual activity with a person under 18 years; or • Written material or audio recording that has, as its predominant characteristic, the description of prohibited sexual activity with persons under 18 years where that description is provided for a sexual purpose. Luring Canadian law also criminalizes luring a child over the Internet. It is an offence to use a computer system, such as the Internet, to communicate with a young person for the purpose of facilitating the commission of a sexual or abduction offence against that young person. This offence carries a maximum penalty of five years imprisonment, on indictment and six months imprisonment on summary conviction. Child Sex Tourism Child sex tourism is the practice of individuals who travel to foreign countries to engage in sexual activity with children. Canadian citizens or permanent residents who engage in prohibited sexual activity with children while abroad can be prosecuted in Canada for these offences. The Criminal Code makes it an offence to: • possess any child pornography; • access any child pornography; • make, print, publish or possess for the purpose of publication any child pornography; • transmit, make available, distribute, sell, import or possess for the purpose of transmitting, making available, distributing, selling or importing any child pornography. Child Prostitution The Criminal Code prohibits prostitution involving persons under the age of eighteen years of age. It is an offence for a person to live on the avails of the prostitution of a person under the age of eighteen. This offence is punishable by a maximum penalty of fourteen years imprisonment and by a minimum penalty of two years imprisonment. The minimum penalty is increased to five years imprisonment where the young person has been compelled to engage in prostitution through the use of or threats of violence, coercion or intimidation. Recent reforms to the Criminal Code enhanced the penalties for those convicted of child sexual exploitation offences, including child pornography. Individuals who have been convicted of a child pornography offence will be sentenced to a mandatory minimum period of imprisonment and are no longer able to receive a conditional sentence (i.e., house arrest). The Criminal Code also prohibits a person from communicating or obtaining for consideration the sexual services of a person under the age of eighteen years. This offence carries a maximum penalty of five years imprisonment and a minimum penalty of six months imprisonment. The maximum penalty for possessing or accessing child pornography on indictment is five years imprisonment with a mandatory minimum penalty of 45 days imprisonment; the maximum penalty on summary conviction is eighteen months imprisonment with a mandatory minimum of fourteen days imprisonment. www.rnca.ca http://www.cyberwise.ca 19 Old news, but good news... Department of Justice Canada CHILD PORNOGRAPHY AND INTERNET LURING TARGET OF DNA DATA BANK REFORMS Under the new legislation, this list would be expanded to include: • criminal harassment; • offences related to organized crime; • uttering death threats; and • intimidation. OTTAWA, October 15, 2004 – Legislation authorizing judges to order DNA samples from people convicted of child pornography, Internet luring and other serious criminal offences was introduced in the House of Commons today. Retroactive provisions would allow for DNA samples to be taken from convicted offenders who committed specific offences, such as gross indecency and indecent assault, before the National DNA Data Bank legislation took effect in June 2000. "This legislation would make it possible for more DNA samples to be collected from more convicted offenders," said Minister of Justice and Attorney General of Canada, Irwin Cotler. "The amendments strengthen a powerful crime-fighting tool; reinforce our commitment to protect children and vulnerable persons in our society; and ensure that those who harm them are brought to justice." The new legislative reforms carefully balance the public interest in the early detection, arrest and conviction of offenders, which can be facilitated by the use of DNA information, with the need to protect the privacy of individuals. "The National DNA Data Bank has proven itself to be an extremely valuable investigative tool," said the Deputy Prime Minister and Minister of Public Safety and Emergency Preparedness, Anne McLellan. "The proposed reforms introduced today would surely enhance the Data Bank's value for police and, as a result, the Canadian public." While the Government anticipates undertaking a legislatively-mandated review of the National DNA Data Bank in 2005, the proposed amendments respond to priority issues that have been raised by provincial ministers responsible for criminal justice and law enforcement and builds on the Government's public consultations. The National DNA Data Bank, located within the RCMP's National Police Services, has provided crucial investigative leads and helped to solve criminal cases across the country and around the world, many involving serious offences such as homicide, sexual assault and armed robbery. It has been instrumental in focusing investigations, eliminating suspects and protecting the innocent. The proposed amendments would add 28 Criminal Code offences for which a National DNA Data Bank order can be made. The most serious crimes, such as sexual offences, murder and manslaughter, are primary designated offences. Under the proposed legislation, the list of primary designated offences would be expanded to include: To learn more about the National DNA Data Bank, visit http://www.nddb-bndg.org/. To access an online version of the proposed legislation, visit http://www.parl.gc.ca/. • Internet luring; • child pornography; • sexual exploitation of a person with a disability; and • offences related to prostitution involving persons under 18. http://canada.justice.gc.ca Relatively less serious crimes, such as arson and assault, are considered to be secondary designated offences. www.rnca.ca 21 In the news... As you can see from these few recent news items, the problem of Child Pornography is Canada-wide. She said the number of arrests goes up as more investigators are added, but the proliferation of child pornography on the Internet is spreading at a lightning pace. Moncton couple arrested for production and distribution of child pornography Moncton, N.B. Date published: 2006-11-24 http://news.gc.ca Internet Child Exploitation Section, "J" Division RCMP "It's a $2.6-billion industry with 20,000 new child porn websites every month," said Martin. A national child sex abuse tipline on the Internet saw a rapid spike in the number of online child sexual exploitation cases reported during its first year. During the early morning of Wednesday, November 22, 2006 the RCMP Internet Child Exploitation (ICE) Section with the assistance of the Codiac Regional RCMP executed a search warrant in a Moncton home. By the end of January 2006, 5,771 child exploitation reports were made to Manitoba-based Cybertip.ca -- a 430 per cent increase from 2004. ICE members arrested a 42-year-old man and 39-yearold woman, both from Moncton, for production, distribution, and possession of child pornography. Several items including computer equipment relating to child pornography were also seized. "Cybertip is kind of the Neighbourhood Watch of the Internet," said Lianna McDonald, executive director of Child Find Manitoba. News reports of people arrested for possession of child pornography have become a daily occurrence. A 14-year-old girl was removed from the residence and is presently in the care of Child and Family Services. On Wednesday, U.S. and international authorities, completing an investigation that began in Canada, charged 27 people in an online child pornography sting. The two adults were released with strict conditions and will appear in court at a later date. ____________________________________________ Throughout Canada, arrests and charges for child porn possession and distribution have been on the rise. Police warn online child porn growing more violent By Kevin Bissett, Canadian Press Published: Wednesday, March 15, 2006 http: www.canada.com/vancouversun/news/story © Canadian Press 2006 Late Wednesday, Halifax police announced they were laying child porn charges against two Halifax-area men. Waclaw Otomanski, 54, was charged with possession, manufacturing and distribution, and Joseph Hanna, 37, of Dartmouth, N.S., was also arrested and charged with possession. FREDERICTON -- Child pornography on the Internet is becoming more aggressive and violent, police in New Brunswick warned Wednesday as revelations emerged of a worldwide network that trades the illegal images. RCMP Insp. Michelle Martin said the pictures are no longer of nude children on the beach, but now include violent images of children being assaulted. "They are infants, they are not even walking and they are still in diapers," she said in a presentation to a public forum in Fredericton. The charges come in the wake of child porn charges being laid against a high-profile swim coach in Dartmouth. Last month, police in Newfoundland and Labrador arrested two men following an extensive investigation into a porn and prostitution ring that allegedly involved 40 young girls. "And adults are having sexual intercourse with them. There are pictures with animals." Some of the defendants are arguing the police have become overzealous. Martin, who heads a five-member Internet child exploitation unit based in Fredericton, said while such behaviour has been around for a long time, the Internet has made it more accessible. www.rnca.ca (cont’d...) 23 (...cont’d) probable grounds to support the charges. At this point the investigation has not revealed any victims in the community of Valleyview or in the Valleyview District area. Valleyview RCMP are continuing with their investigation.Current Status: Garry Wayne TODD, age 53 of the Valleyview area has been arrested and remanded into custody for appearance in Valleyview Provincial Court on April 5, 2007. A Fredericton man sentenced in January to six months in jail for possession of child pornography claimed laws against child pornography are a form of government censorship. Gordon Thomas Hickey Jr., 56, told a probation officer that child porn is a victimless crime and that he stands by the adage of 'no harm, no foul.'" Minister Day comments on dismantling of international child porn ring Office of the Honourable Stockwell Day Minister of Public Safety Date published: 2007-02-08 http://news.gc.ca A credit card used to purchase child porn online was traced back to Hickey, as part of an investigation that began in Dallas, Texas. A partnership with the RCMP is helping small police forces to become part of the global effort to fight child pornography. Today, the Honourable Stockwell Day released the following statement in response to news that Austrian authorities have announced they have uncovered a large international Internet child pornography ring. "We can use their facilities and their technical capabilities, and it makes it easier for us to prosecute these cases," said Const. Eric Demers of the Rothesay Regional Police Force in New Brunswick. “The sexual exploitation of children is a vile and abhorrent act, for which Canadians have zero tolerance. I can assure Canadians that our security forces will make every effort to ensure that our children are protected. I would like to take this opportunity to commend the Austrian authorities for striking a blow against child pornography. While it is yet to be confirmed if any offences have been committed in Canada, proper authorities are working to gather more information. The National Child Exploitation Coordination Centre – a part of the RCMP’s National Police Services - will play a key role in helping to identify the appropriate jurisdiction to pursue investigations, if they are warranted. Insp. Martin said parents must get more involved in the lives of their children. She said about 79 per cent of Canadian youth have access to the Internet at home, and over 50 per cent of them have an email account that their parents are not aware of. "Fifty-three per cent of these kids have received pornographic material through the internet, and 15 to 20 per cent have gone and met someone in person that they have met on the Internet.'' I would like to commend the National Child Exploitation Coordination Centre and the entire law enforcement community for all that they do to prevent the abduction, endangerment and sexual exploitation of children.” She said parents, schools and communities need to do a better job of monitoring Internet use by children, to ensure they are not being lured by adults. Martin said it doesn't matter how small your community is: "if there's a telephone line, there's access to the internet." Ex-teacher won’t face sex charges By MONICA GRAHAM, Chronical Herald-NS, http://moncton101.spaces.live.com Possession of Child Pornography Charge Laid, Valleyview, Alberta RCMP Alberta - News Releases Updated: 2007-03-23 http://www.rcmp-grc.gc.ca STELLARTON — The former Stellarton high school teacher at the centre of a police investigation won’t face sex or child pornography charges because the boys featured in homemade videos were over 14, the age of consent in Canada. An investigation initiated on March 21, 2007 and conducted by RCMP in the Valleyview District has resulted in a 53 yr old male resident being charged with one count each of Possession of Child Pornography and Bestiality. After receiving a complaint during the early morning hours of March 21, 2007 a police investigation and subsequent search of a residence in the Valleyview District provided investigators with reasonable and www.rnca.ca The 66-year-old man will likely face charges of providing liquor to people under the age of 19 as well as drug and tobacco charges, Stellarton police said Tuesday. (cont’d...) 25 After discussing the case with the Crown, police decided not to lay child pornography charges. Timothy Kozun, 25, was arrested in June 2002 after police in Germany monitored a child porn chat room and found advertisements for pictures that were traced back to a Winnipeg file server. (...cont’d) Police did not identify the suspect arrested at a MacKay Street house on Feb. 16, but sources said Carl Skidmore was the resident taken into custody. Police in Winnipeg seized three computer systems from Kozun's family home. A forensic analysis of the computers uncovered more than 3,500 images of child pornography. Mr. Skidmore was jailed in 1997 on two counts of sexually assaulting boys and was convicted after his release for violating a probation order to stay away from anyone under the age of 18. Since his arrest, Kozun has undergone therapy with three doctors, who all reported he has shown genuine remorse for his crimes and poses little risk to re-offend. In 2001, he was convicted of possessing stolen property related to a theft gang made up of young men and boys. While Mr. Skidmore was in custody overnight Feb. 16, his home was ransacked and robbed. Police arrested nine people for the burglary. "Such demonstrable rehabilitation, whether post-sentence or pre-sentence, must be encouraged and recognized," said Judge Fred Sandhu. " ... the lengthy court process to date in combination with the considerable publicity this matter has attracted and the sheer length of the psychological rehabilitation has had an individual deterrent effect." Four months of undercover investigation and tips that local youngsters were being videotaped performing sexual acts led police to obtain a search warrant for the man’s house. They seized sexually explicit videotapes and some marijuana during the raid. A recent report by Dr. Ivan Rutner described Kozun as bright, but emotionally immature. Rutner suggested Kozun's crime "had little to do with a real interest in pornography," but was an act of rebellion and a challenge to his technical skills. Officers viewed the tapes, only to discover that the boys they could identify were between the ages of 14 and 18, old enough to consent to sexual acts under Canadian law. "It would have been more consistent with his personality to be demonstrating in favour of animal rights or against Wal-Mart," he wrote. Police said they interviewed the videotaped boys that they could identify. Some of the boys are also alleged to be involved in "other matters eventually to come before the court," an officer said. At an earlier sentencing hearing, court heard Kozun amassed the bulk of the collection in two weeks after advertising on a chat room called "Pre-teen 101." Kozun offered traders one picture for every two they gave. Police will lay charges of marijuana trafficking, conspiracy to traffic in marijuana and illegal possession of marijuana. The pictures in Kozun's collection included images depicting the rape and torture of children as young as five. Many images offered for trade were still pictures from films, encouraging traders to collect the entire set "much like baseball cards," said Crown attorney Mick Makar, who had asked for jail time. Police will also lay Liquor Control Act and Tobacco Act charges. The suspect will appear in New Glasgow provincial court March 26. Ottawa hopes to pass a bill raising the age of consent relating to sexual activity to 16 from 14. The bill is now before a federal committee. Trucker porn charges, Ottawa Sun, By JON WILLING, http://moncton101.spaces.live.com Kid-porn trader spared jail time By DEAN PRITCHARD, SUN MEDIA, http://moncton101.spaces.live.com Police have charged a 26-year-old Texas man after border guards in Lansdowne discovered typewritten stories involving a juvenile. A Winnipeg man who traded violent and degrading images of child pornography with perverts from around the globe earned himself an 18-month conditional sentence yesterday after a judge ruled he has turned himself around with intensive therapy. www.rnca.ca According to the Canada Border Services Agency, border guards found (cont’d...) 27 (...cont’d) the stories in a truck during a routine inspection at the Thousand Islands bridge this week. Jonathan Jay Paul of Sulphur Springs, Tex., is charged with possession of child porn. Paul is expected to appear in a Brockville court today. In a similar but separate incident Thursday, border guards at the same crossing found alleged child porn literature during another inspection of a commercial vehicle. OPP plan to do a forensic audit of the laptop found in the truck. Thomas Victor Pirnie, 58, of Glens Falls, New York, is charged with possession of child porn. He is also charged under the Customs Act with failing to report goods, possession of prohibited material and smuggling. Pirnie remains in custody. Halifax man will be sentenced in May on child porn charge Chronicle Herald http://moncton101.spaces.live.com A 41-year-old Halifax man caught last year with child pornography will be sentenced in the spring. John Francis MacDonald pleaded guilty in Nova Scotia Supreme Court on Thursday to one count of possession of child pornography. The heavy-set man, dressed in khakis and a blue-collared shirt, appeared nervous as he stood beside his lawyer, Peter Mancini. His voice cracked as he entered the plea before Justice Arthur Pickup. Halifax Regional Police received a tip about Mr. MacDonald on April 25/06 from an undercover officer with the Virginia Beach Police Department in the United States. The officer was posing as an underage girl on the Internet when Mr. MacDonald suggested they hook up. As a result, police in Halifax got a warrant to search Mr. MacDonald’s apartment at 542 Herring Cove Rd. They seized a number of images from Mr. MacDonald’s computer on Sept. 7. Now that there’s a guilty plea, Crown attorney Craig Botterill says the focus is the May 23 sentencing. "Under the new regulations, he will have to go to jail; it will just be a matter of how long," Mr. Botterill said. www.rnca.ca 29 Child porn warrant thrown out http://moncton101.spaces.live.com A P.E.I. judge has thrown out a warrant used by the RCMP to search the home of man accused of possessing child pornography. The decision means any evidence gathered during the search of Elmer Graham's residence can't be used during his trial. An earlier court ruling also prevents the Crown from using Graham's credit card information. Hacker helps put judge in prison for child porn Canadian whiz acted as 'vigilante' to find dozens of predators Randy Boswell and Gary Dimmock, The Ottawa Citizen, February 23, 2007, http://moncton101.spaces.live.com Nearly a decade after he began his career as a teenage "vigilante hacker," a Canadian computer whiz says it was "definitely satisfying" to learn this week that his most high-profile target -- a disgraced California judge -- has finally been sentenced in a landmark child- pornography case that sparked widespread legal debate over the actions of "Citizen Tipster" Bradley Willman. Ronald Kline, 66, a former Superior Court judge from Irvine, California, offered a "life time of apologies" before collapsing in a Los Angeles courtroom on Tuesday after learning he faces 27 months in federal prison for possessing more than 100 illicit images of children -- files exposed to police by Mr. Willman through a "Trojan Horse" computer virus he used to identify dozens of child-porn predators across North America. Now 26, the Langley, B.C., resident says he's still proud of "doing my own thing to help people out. It was a lot better than ignoring what was going on." But he acknowledged a bittersweet reaction to the end of a case that also ended his crusade to ferret out some of North America's worst child-porn offenders. "In some ways," Mr. Willman said in an interview yesterday, his pursuit of Mr. Kline "was a lot more trouble than it was worth" because it put him out of business as a citizen crime-fighter. "It's good that it's finally come to a resolution after all these years," he said. "It's definitely satisfying that he got caught. I just kind of wish it had gone in a different way. I was told by police that what I did was illegal and that if I continued, they would have to charge me. So there was no option." (cont’d...) Investigators and anti-porn advocates have praised Mr. Willman. But his vigilante exploits led a U.S. district court in 2003 to toss out the charges against Mr. Kline, ruling that the B.C. teenager was essentially acting as an agent of police and gathering evidence illegally. I could see who they were chatting with and read what they were saying as they typed. I judged these people by reading their incoming and outgoing e-mails. I was more interested in actual abusers or producers. That was my priority -- not the people that were just downloading images." After reading Mr. Kline's electronic diary, he concluded that it showed an apparent plot to sexually exploit young boys at a private health club. U.S. detectives have credited Mr. Willman with cracking the case. (...cont’d) Then, in 2004, a U.S. federal appeals court overturned that ruling and upheld the charges against Mr. Kline. "No law enforcement agency involved in the case knew or could possibly have known that Willman was illegally searching computers, let alone acquiesced in the practice," the appeal judges ruled. "The diary he retrieved gave us the probability that we needed to get the search warrant," California Det. Ronald Carr said early on in the case. Mr. Kline, who had been forced to withdraw from a re-election bid, later entered a guilty plea on child-porno-graphy charges. The search warrant unearthed more than 100 images of young children engaged in sex acts. Mr. Kline's journal entries from 2000 and 2001 detailed the judge's sexual urges and the times and places where he met young boys. At the judge's sentencing hearing, prosecutor Gregory Staples urged a 33-month term, arguing that "to sentence the defendant to anything other than a long term in prison would signal that our justice system treats its own with favour," the Orange County Register reported. "Of all people in society who must be held strictly accountable for their crimes, it is members of the justice system themselves." The judge, a Little League umpire at the time, had contact with several boys at ball games, in a mall and at a private health club, where he befriended vulnerable boys with the hopes of exploiting them. "You can't just charge in like you did with (a boy)," said one entry dated June 6, 2000. "How do I encourage him without pursuing him too hard?" Mr. Staples charged that Mr. Kline had "sullied the state judiciary." The next day, the judge wrote to himself: "I gave a lot of thought today about this business of approaching these kids too fast ... He doesn't strike me as a lonely boy... You have to make them come to you or it just doesn't work." Mr. Willman's central role in the Kline case has kept legal experts debating his actions ever since. In 2005, University of British Columbia business professor Hasan Cavusoglu told Maclean's that the Langley youth's hacking to expose suspected pedophiles could invite "other prosecutors to attempt to use evidence obtained by illegal means in other trials." When the 27-month sentence was announced, Mr. Kline -- who has a heart condition -- slumped to the courtroom floor, but later recovered. Dubbed "Citizen Tipster" by authorities, Mr. Willman's identity was initially kept secret, even in police affidavits. Then, in June 2002, the Citizen unmasked the mystery hacker, identifying him as a then-19-year-old loner who hunted online predators from a basement room in his parents' suburban Vancouver home. Mr. Willman, whose online handle was "Omni-Potent," used a Trojan Horse program disguised as a lurid image to gain control of any computer that downloaded it. He eventually penetrated about 3,000 personal computers around the world. But the University of Toronto's Richard Owens, executive director of the Centre for Innovation Law and Policy, said at the time: "We may need to set certain limits, but for the moment it's unrestricted and the risks, in this case, are balanced by the benefits of prosecuting a potential child predator." Mr. Willman said at the time he had no friends at school and spent nearly all of his free time at the computer, chewing sour candies as he hunted for pedophiles. Today, Mr. Willman says he lives with his parents and works independently repairing and maintaining computers; his hacking prowess proved no ticket to high-tech riches. He catalogued each target's file by degree of risk, and focused on suspected child-porn producers and molesters. "I don't have any big, fancy job." "I would stay up late at night to see what I could drag out of their computers, which turned out to be more than I expected," Mr. Willman told the Citizen in 2002. "I could read all of their e-mails without them knowing ... www.rnca.ca (cont’d...) 31 (...cont’d) Gillespie said he called the news conference to alert homes and businesses to the potential for cracking into their insecure networks. Nowakoski was allegedly using such improperly protected wireless networks to download child porn. P.E.I. Child porn charges earn man six months in jail http://moncton101.spaces.live.com David Brian Best, 45, of Kensington, P.E.I., has been sentenced to more than six months in jail on child porn-related charges that included taking pictures of teenage boys. War Driving Locating insecure networks is known as "War Driving." It's the practise of driving around in a vehicle with a Wi-Fi enabled laptop scanning for vulnerable signals, usually in an effort to steal Internet bandwidth. For many computer enthusiasts, "War Driving" is a sport done without malice. The tools: • A laptop with a good wireless card and an antenna • Cheap software to help identify networks in offices and homes • An on-screen utility displays wireless network access points, and the signal strength of the network detected Further steps can be taken to gain access to those networks. Most War Drivers are motivated simply by the thrill of the chase. However, what they argue is a relatively harmless electronic scavenger hunt for "free" Internet access, Toronto police call telecommunications theft. "I don't think that the public realizes that these signals can be transmitted 500 feet or more, depending on the size of the network," Gillespie said. Best pleaded guilty to two counts of making child pornography, two counts of transmitting it, and one count of having it in his possession. Police warn of Wi-Fi theft by porn downloaders Updated Sun. Nov. 23 2003 12:05 CTV.ca News Staff © 2007 All Rights Reserved. Toronto police have charged a man with theft of telecommunications in a bizarre case that involves downloading child pornography from a laptop in a moving car and using other people's computer networks to obtain the images. Det. Sgt. Paul Gillespie of the Sex Crimes Child Exploitation Section described at a news conference "a relatively interesting set of events," that seem to mark a new era in criminal behaviour and police investigative techniques. "It is so bad, that there are individual Web sites that show people how to steal wireless web signals, with maps. And people have actually gone to the trouble of spray painting red Xs in front of houses, in case you can't read the map." The case began two weeks ago Wednesday, at 5 a.m., when Sgt. Don Woods of 11 Division noticed a vehicle driving the wrong way down a one-way street in a residential neighbourhood. When Woods stopped the car, he noticed the driver, a man, was naked from the waist down. In the car was a laptop computer and on its screen was an image of a 10-year-old girl in a sex act with an adult male. War Driving is relatively easy to thwart. Almost all software used in business and home wireless networks employs encryption that can block unauthorized access. It just has to be configured properly. Gillespie's child exploitation unit was called in to investigate. Police discovered the laptop computer used a Wi-Fi (wireless fidelity) card that allows wireless access to the Internet. Tips Just as Canadians were early adopters in Internet use and broadband access, they are also world leaders in Wi-Fi use. But there are a number of weaknesses in the Wi-Fi system. Here are some tips to help keep users secure: • Make sure that you turn on the Wired Equivalent Privacy (WEP) algorithm, which is part of the 802.11 standard common to most LAN (local area networks) • Always assume that someone is going to try to break into your system, no matter what security you have installed ... check your download and temp files • Change your passwords on a frequent basis • Turn off your network when it is not in use • Use the Internet to keep updated on new flaws that are being discovered in wireless security Police suspected that the man in the car was downloading pornography from the Internet, by cracking into a computer in a nearby home. Det. Sgt. Frank Goldschmidt, of the Ontario Provincial Police's Project P, picked up the investigation because the suspect's home was in Delhi, Ont., outside of Toronto. A warrant was obtained, a search was executed, and a large amount of material was seized and taken to Toronto Police for further investigation.Walter Nowakoski, 36, has been charged with possession of child pornography (two counts), accessing child pornography, distributing child pornography, theft of telecommunications, and making child pornography.Nowakoski is in custody and will appear for a bail hearing on Monday morning. www.rnca.ca 33 A Teen Makes Money With A Controversial Site MMIII, CBS BROADCASTING INC. ALL RIGHTS RESERVED. JAN. 8, 2003 Renee's mother Barbara claims she is mystified by Renee's virtual success, saying she has “no idea” why the site is so popular. “I hope it's her writing skills,” she says. But Renee thinks differently: “They're hoping to see goodies. A lot of people think that my being 16 and on the Internet is horrible. But they fail to realize that I'm not getting nude.” 48 Hours promised to keep Renee's last name secret, and won't reveal where she lives. She and her mother say anonymity is what keeps customers where they want them: on the other side of the Web cam. Renee says she makes $2,000 a month from her Web site. (CBS) “I've had people who are around 54 go to my Web site. And it's kinda scary at first. It's like, ‘Why are these people here?’ I'm not anybody special. I'm just a little kid,” Renee says. Like most 16-year-olds, Renee's world is in her bedroom. She hangs out there with her friends, and spends hours on her computer. But Renee isn't just sending e-mails or surfing the web aimlessly. She's running a highly profitable Internet business from here, one she says has earned her as much as $2,000 a month. Her mother says that older guys will look at her daughter no matter what. “They look at her in the grocery store. So I mean they're gonna look at her no matter where she's at,” Barbara says. But what's she's doing in her bedroom would make a lot of mothers blush. Renee is a “Cam Girl”-- just one of hundreds of young girls who compete for attention on the Web by putting webcam photos and videos of themselves online. Then, there is the money. In addition to the member fees, Renee also gets paid for directly linking her Web site to other Web sites, including one that is pornographic. That link paid her $600 to $800 a month. Her site gets thousands of visitors every day. But it isn't free: For four days it's $5.95; for a month it's $15.95; for six months it's $59.95. “I was uncomfortable with it. But she made some pretty good money with it,” says Barbara. There also a "wish list," where Renee asks for--and receives--gifts from admirers. The list has included such items as a Sony Playstation, a digital camera, and kitchen accessories. The gift givers usually remain totally anonymous. What do you get for your money? There’s chat, information about how she does her hair and where she shops, and Renee’s daily journal. Renee has also posted more than 500 photos on the site. Some of them are sweet, some are strange, many are provocative. There is no nudity, however. www.rnca.ca (cont’d...) 35 (...cont’d) But the county sheriff disagreed about some of Ashley's and other girls' pictures, and said the site was illegal. After a few hours of shooting, Renee and her mother refused to co-operate further with 48 Hours, saying they didn’t like the questions about who visits the site and how much money Renee makes. Although Ashley argued that the web site trueteenbabes.com that she appeared on was not pornographic, the Arapahoe County Sheriff's Office disagreed. But if you think what Renee does is shocking, you haven't seen the half of it. A year ago, Ashley Rose, then 14, and her friend Amber, then 17, were among more than 50 underage girls on a website called trueteenbabes.com. For $20 a month, members gained access to thousands of pictures. Last April they shut down the site and charged its owner and photographer, James Grady, with 880 counts of violating a specific Colorado statute against the Sexual Exploitation of Children. Grady is now in jail awaiting trial. “I was always interested in modeling,” says Amber. “But I just figured maybe as a way to get my face out there and start pursuing my modeling dreams.” Mike Miller and Andy Contiguglia, Grady’s attorneys, say Colorado authorities have gone too far. More provocative material is out there, they say, much of it commercially available in books and magazines, and isn’t being prosecuted in Colorado. Plus, they argue, all the models had parental consent. The pictures were “glamour shots,” she says. At its peak, the site had thousands of paying members and brought in an estimated $60,000 a month. Ashley Rose and Amber were cashing in, too. For Web cam chats, they made $20 an hour. For photo shoots, they made $65 an hour. Sheriff Grayson Robinson is emphatic: “The young ladies involved were less than 18 years of age. They were put in a position to display their bodies. They wore rather flimsy, see-through material. Yet the body part was still exposed." And like every parent who had a daughter on the site, Ashley’s mother Robin signed a consent form giving Ashley permission to become a "True Teen Babe." Robin, Ashley's mother, defends her participation in the site by saying she was only trying to help her daughter become a professional model. “I thought it was silly myself,” Robin says of the site. “I mean, several times I would say 'What are people paying?' I think the members were really lonely, it seems like it was their chance to talk to a model, to talk to a beautiful girl. It was very innocent.” But the Ford Modeling Agency in New York City, which represents nearly 300 teenage and child models, says they don’t surf the Web looking for models. Robin now regrets allowing her daughter to model for the site. And Ashley has since hired a professional manager, who landed her a part in an independent film. But then "48 Hours" showed Robin pictures that were taken for the web site of Ashley wearing lingerie, and a thong. Robin was troubled by the photos. “I haven't seen a lot of these,” she says. But the business of underage internet modeling continues, with sites that feature very young, pre-teen girls in provocative poses and clothing. Ashley admits that in those photos she is close to being nude, “but I'm not naked. And to be naked, that's porn, pornography. So I didn't do that,” says Ashley. www.rnca.ca (cont’d...) 37 (...cont’d) 48 Hours joined one of the pre-teen sites, CindyModel.com, to see what members receive. For $14.95 a month, members gain access to hundreds of photos of an 11-year-old child. Members can also buy CDs packed with even more photos, and even a DVD with video of Cindy. “A lot of the people who buy these, I’d say, are 40-year-old men,” Newbury says. He says that many members are middle-aged men and he admits that some of them are looking at the pictures sexually. Dr. Fred Berlin, a psychiatrist at Johns Hopkins University Hospital who treats patients with sexual disorders, says that an older man who belongs to the site is likely to have “something very different or abnormal about his sexual make-up.” To prevent her fans from finding her, Cindy's last name and location are kept secret. But her photographer's name and contact information are available through the Web site. “Our objective with Cindy of course is to have her be a commercial actress, possibly have her own television show,” says Newbury, who runs Cindy's site. Why would an adult pay $15 every month to belong to this site? “I think adults who are doing this have some sort of infatuation with this youngster," says Berlin. "And I think in some cases they may have romantic fantasies. In some cases sexualized fantasies.” Newbury first put photos of Cindy on the Internet last April. At first, people could look for free, and on the first day, the site had 50 members. So Newbury decided to turn it into a pay site. There are now 400 paying members. Tracy says that older men will look at Cindy in real life, so why not online. “I would never exploit my daughter. I am promoting her natural beauty,” Tracy says. “If things stayed just the way they are right now, I would probably make about $50,000 a year,” he says. And Cindy makes as much as $450 a week. Her father, Gary, a plumber, says that's more than he makes some weeks. Berlin says that there is a chance a determined member could find Cindy’s real address. Newbury worries about that too. But he says he keeps her identity secret. He admits, though, that he himself is more easily found. Members do have some contact with Cindy during bi-weekly "video chats", and some members apparently try to get even closer by sending Cindy gifts. Newbury says he wants to make Cindy a star. Her mother Tracy dreams of that too. “She’s having a blast. We all are,” says Tracy, who is in marketing. Newbury spends more than 10 hours a day tending to his new business. He promotes Cindy aggressively and apparently it’s working. An online fan club devoted to her has over 4,000 members. There is some legislation being introduced nationally that would ban child modeling Web sites in an effort to protect the child models. But for now, these Web sites are legal, and prospering. Some members even send in outfits for Cindy to model. That service costs $150. One man sent in a schoolgirl outfit for Cindy to model on line. Newbury says other people have sent in items he considers inappropriate, like thongs, which Cindy will not model. “There may be a large number of people out there who are privately attracted to children, who don’t act on it. And as a society we’re going to have to figure out how we want to deal with it,” says Berlin. Tracy says she doesn’t know much about who the members of her daughter's web site are. “Curt handles all that,” she says. www.rnca.ca 39 Microsoft technology helps in fight against child pornography LAW ENFORCEMENT OFFICIALS AROUND THE WORLD TRACK DOWN ONLINE PREDATORS WITH THE CHILD EXPLOITATION TRACKING SYSTEM (CETS) In 2003, Toronto police detective Paul Gillespie thought there must be a better way to catch criminals who trafficked in child pornography. The Internet was giving child pornographers new ways to find and exploit children, and Gillespie could see that law enforcement officials were far behind the technology curve. evidence, and build cases against suspected child pornographers. Even during beta testing, CETS proved its value by helping police investigate a man accused of sexually assaulting a four-year-old girl. CETS also figured prominently in the March 2006 arrest of 27 people in four countries who operated a private chat room to groom vulnerable children. "With the Internet, the bad guys had figured out a better way to hide their tracks while committing crime at new levels," said Gillespie, who has since retired from the police force. "Law enforcement hadn't learned how to use the Internet to gain the upper hand." CETS produces impressive results Since 2004, Toronto police officers have used CETS in their investigations, resulting in 64 arrests and the identification of 43 victims worldwide. "CETS really helps identify the non-obvious connections that can lead to a child pornographer and that humans could never identify on their own," said Gillespie, who now works as a consultant on Internet child safety for Microsoft and other corporate and government entities. Determined to do what he could to stop the growth of child porn, Gillespie sent letters and e-mail messages to corporations and government agencies. One landed on the desk of Bill Gates, the chairman of Microsoft Corporation. Gates passed along the note to Microsoft Canada and asked for its assistance in developing a tool to help fight child pornography. Microsoft Canada software engineers worked with Gillespie, the Toronto Police Service Sex Crimes Unit, and other law enforcement agencies to understand how child pornographers were taking advantage of the openness and anonymity of the Internet. With that information in hand, the engineers then created a tool to help law enforcement officers apprehend pornographers. CETS has grown from a Canadian law enforcement tool to one that is now global in scale. In April 2006, the Child Exploitation and Online Protection Centre (CEOP), which works across the United Kingdom, made CETS part of its enforcement arsenal. The results were immediate. By October 2006, CETS was credited with helping police in the United Kingdom arrest 37 suspects and rescue five children. "In the past, police officers simply didn't understand the Internet — it was a labyrinth to them," Jim Gamble, chief executive officer of CEOP, told the British Broadcasting The result: the Child Exploitation Tracking System (CETS), built on Microsoft technology, was unveiled in April 2005. CETS helped law enforcement agencies follow hundreds of suspects at a time and eliminate duplicated work, making it much easier for them to follow up on leads, collect www.rnca.ca (cont’d...) 41 (...cont’d) Microsoft continues its role with the development and deployment of CETS. When representatives of a country express interest in adopting CETS, Microsoft helps law enforcement officials assess how it might work within the country. Among other things, this task involves determining which police agencies will be covered by CETS, how database searches should be designed, and what sort of computing resources are needed. Microsoft also covers a portion of the cost of the initial CETS assessment, with the balance being paid by the hosting government or non-governmental organizations. If a country decides to adopt CETS, Microsoft supplies the software, documentation, and training to make it a useful tool. Corporation (BBC). "But now we are upstream of [online pedophiles] and awaiting their next move." Since then, the international momentum of CETS has increased tremendously. Law enforcement officials in Indonesia, Italy, and Brazil put the tool to work in 2006. And 13 other countries, among them Spain and Chile, are assessing the effectiveness of CETS and may deploy it soon. According to Gillespie, the input that law enforcement officers worldwide were able to contribute during development is responsible in part for the widespread acceptance of CETS. Using the technology tools Microsoft has provided, police officers charged with fighting child abuse have been able to agree widely on how to structure the CETS database and develop the way information can be shared between jurisdictions. That's helped tremendously with "buy-in" from law enforcement. "Officers from around the world have been able to claim ownership of the solution," said Gillespie. "They were challenged to discuss what their own systems could and could not do, and the result was that CETS was built by investigators, for investigators." As of late 2006, Microsoft had contributed more than $7 million (U.S.D.) to the deployment of CETS. It also continues to support the development of the CETS tool itself, and in June 2007 it will release CETS 2.0 (the current version is 1.3). Microsoft Canada played a key role in developing the first version of CETS for Gillespie and the Toronto Police Service, and it still takes much of the technical lead in improving CETS. CETS helps energize public officials To Gillespie, the broad adoption of CETS is a result of the way it helps solve a problem that is global, both in its scope and in the way combating child abuse strikes a common chord. "When talking children and child abuse, it's something everyone can relate to," he said. "It really brings out the energy of everyone involved in the CETS initiative." Gillespie added that the success of CETS in Canada and the United Kingdom has given law enforcement officers confidence that it is an effective weapon in the fight against pornography. However, vigilance is still needed. The abuse and exploitation of children on the Internet continues to generate shocking statistics worldwide. According to data gathered by the nongovernmental organization Anesvad, more than four million Internet sites contain sexual material involving children worldwide, and 500 new sites are created each day. It is estimated that more than half of those sites—around 2.4 million—are fee-based services that generate worldwide revenue of some $1.3 (U.S.D.) billion per month. www.rnca.ca "CETS has grown beyond my wildest dreams," Gillespie added. "It has realized its potential in that children have been rescued and offenders put in jail. That's very gratifying." http://www.microsoft.com 43 SNAPSHOT OF MINORS ONLINE AND HOW PREDATORS REACH THEM by Parry Aftab copyright 2007, all rights reserved It is estimated that approximately 70% of the minors in Canada access the Internet either from home, schools, community centers and libraries or from some newer Internet-capable devices. This is up more than ten-fold since 1996. Now our children are using cell phones with Internet and text-capability, interactive gaming devices (such as X-Box Live 360 and Sony Playstation Network) with voice over Internet and live chat features, handheld devices with Bluetooth and other Wi-Fi remotecommunication technology (such as PSP gaming devices and mobile phones) and social networking profiles (such as MySpace, Facebook, Piczo, Bebo and others) where they can advertise their favorite things, where they live and pictures of themselves and their friends to anyone who wants to see them. time. We will focus on the much smaller segments of preteens and teens who are being victimized through no fault of their own - those who are targeted at random. All others need to change their online behaviors. And that's where we need to devote all our attention. For this to happen, you need to understand the truth. For years we have told parents and minors not to share too much personal information online. "You can be tracked down in real life," we told them. But, notwithstanding anything to the contrary reported in the media and by some local law enforcement officers, to my knowledge, to date, no preteen or teen has been sexually-exploited by someone who tracked them down from information they posted online. In each and every case, to my knowledge, to teens and preteens have gone willingly to meet their molester or otherwise agreed to meet them in real life. They may have thought they were meeting someone other than the 46 year old who is posing as a teen, but they knew they didn't know this person in real life. They are willingly agreeing to meet strangers offline - in shocking numbers. Ten years ago, when I first wrote my safety tips telling parents to put the computer in a central location, that made sense. It was a central point, where parents could get involved and supervise their children's interactive communications and surfing activities. Now, where they take their communication technologies with them in their pockets, backpacks, and purses, it is not longer as relevant as it once was. Now, instead of expecting parents to watch everything their children are doing online from the comfort of their livingrooms, or kitchen counter, we have to do more. Now, we have to teach our children to use the "filter between their ears" and exercise good judgment and care when using any interactive device. While teaching parents how to supervise their children online was a challenge (I have written the leading books, worldwide, for parents on Internet safety), teaching children to "ThinkB4uClick" is much harder. What does this mean? It means we can do something about this. It means we can educate teens and preteens about the realities of meeting people in real life they only know in cyberspace. It means we can create solutions. It means that this is, at least for the time being, 100% preventable. It means that what we do today will have an immediate impact on the safety of our youth. It means we have to join together and work on things that are effective and abandon those that are not. Luckily, while our young people are sharing much more information online than ever before, to my knowledge, predators aren't using it to hunt down our children offline. They are like vampires. They need to be invited in. Sadly, our teens and preteens are too often doing just that. They are inviting them to offline meetings, phone calls and videochats. But, as an expert in cyberrisk management, I can tell you that this is good news. Because we have a single point of risk - our children, preteens and teens. If we stop their risky and unsafe behaviors, and teach them when to reach out for help and how, we can manage this risk. We can keep our children safe. The saddest thing is that our children are mainly at risk because of their own actions. Some are intentional. Others are inadvertent. They may willingly engage in communications with people they don't know in real life "RL," agree to meet them offline or send them sexuallyprovocative images or perform sex acts on webcams they share with people they encounter online. They cyberbully each other by advertising their victims for sexual services, posting real or manufactured sexually explicit images of them online or by passing online rumors able their sexual preferences or activities. Preteens and Teens at Risk: Most of the high risk preteens and teens fall into three categories: those who are naive and looking for love and affection (typically the "loners" and "shy" preteens and teens), those who already engage in other high Putting Their Heads into the Lion's Mouth While educators and child psychologists understand this, most parents will be shocked at the suggestion that their preteens and teens are in control of their safety online and putting themselves at risk, often intentionally. But unless we accept this, and direct our attentions at solutions aimed at this reality, we are all wasting our www.rnca.ca (cont’d...) 45 (...cont’d) risks activities, such as drug and alcohol abuse, driving too fast or doing risky things for the thrill of it (often the student leaders, athletes, cheerleaders and very competitive teens, the risks takers and thrill seekers looking to let off steam or impress their peers) and those who don't realize that what they do online is real, the ones who are looking to appear older, cooler, more fun and more popular (most of the teens and especially preteens fall into this category at least once). Sadly, most of our preteens and teens fit one of these categories. Sadder still is the fact that in recent years we have learned that most preteens and teens are potential victims. Naive, loners and socially-shy preteens and teens: Some believe that they are communicating with a cute 14 year old boy, who they later discover isn't cute, isn't fourteen and isn't a boy. Most of the reported cases fall into this category, and until the death of Christina Long in the US five years ago this May (She was the first confirmed death by a cyber-predator in the US), experts all believed that all victims fell into this category. Our kids are being conned, and easy to spot online. Predators can seek them out, and find their vulnerabilities. They are groomed with care, and often fall in love with their molesters. Sadly, when the molestation finally occurs, not only are their bodies broken, their hearts and trust are too. They need to understand how the predators work online. Too often they tell me that they can "tell" how old someone is online. They can't. No one can. Many predators spend years cultivating the right tone and language to look like a fellow teen online. These preteens and teens are sitting ducks. While they may have learned not to fall for the "help me find my puppy" ploy offline, they need to learn how that same ploy (appeal for assistance) works online. They need to know how to spot the risks and the predators, when online everyone can look like a cute 14-year-old boy. They need to learn that romance shouldn't occur only in cyberspace, and that parents can get involved to help them meet their soul-mate, assuming they really are. So, if they aren't, and turn out to be a 46 year old child molester, they can come home safely and help put that molester behind bars where they deserve. Risk-takers, Thrill-seeking preteens and teens: Some preteens and teens (mainly teens) are looking for the thrills and challenge of engaging in a relationship (or at least prolonged communication) with an adult. They "play games" with the adult, and are intentionally extra sexually-provocative. They think they are smart enough to do this without getting hurt. They see this as a game, without realizing the consequences of their actions. And crossing the sexual line isn't as frightening online as it would be in real life. The problem is that the consequences are not as apparent, the realities not as immediate. They take risks. And they think they can handle them. (They don't often understand the consequences, though.) They often willingly engage in www.rnca.ca 47 sexual communications with men they know are adults. That's part of the thrill. They are also often willing to engage in sexual activities with the adult, but don't realize what that can mean when things go very wrong. We rarely hear about these kinds of victims, because they never report it when things go wrong. They feel as though they "asked for it," or are to blame. When we hear of these cases, it's because they are killed or kidnapped. (Christina Long was in this category. She was the first confirmed murder victim of an Internet sexual predator in the U.S. and died four years ago this May.) Friends are the answer here. If we can get friends to help watch out for each other, it is less likely that they will meet adults in real life, or if they do, got alone. Also, finding cool campaigns such as our "Don't Be Stupid" help. So do real life stories from victims themselves about how they got caught and advice from the trenches. Kateisplace.org has sections specifically directed at this type of victim. Not really a drunken slut, just playing one on MySpace: We've all been reading about this new trend in the news (often with me as the expert). Good, respectful, otherwise well-mannered preteens and teens acting out in cyberspace. In profiles, blogs, on social networking sites (such as MySpace) and their away messages on IM, on their websites and interactive gaming bios, they act out. They pose in their bras, or worse. They simulate sexual activities (and in some cases post images of actual sexual activities). They pretend to be someone or something other than what they really are. And this alter-ego may be a sexually promiscuous teen "up for anything." They don't think it is cool to tell others they were home coloring with their five year old niece last weekend. Instead they claim to have snuck out after everyone was asleep to get drunk at a wild party. To them it isn't real. They lie. They pose. They do thing online they would never dream of doing in RL. They aren't really drunken sluts - they are just playing one on MySpace to get attention. The Anatomy of a Cyberpredator: There have been many cases recently where pedophiles and other adults have lured children into offline meetings and molested them. Luckily, there are even more cases when such attempts to lure a child have brought about the attention of law-enforcement groups. Cyberpredators, just like their offline counterparts, usually aren’t the scary, hairy monsters in trench coats we imagine standing on a dark street corner. Many are the kind of person you would be inviting to your home as a guest, and often have. They are pediatricians, teachers, lawyers, clergy, vice cops, welfare workers, journalists, Boy Scout leaders, baseball coaches, scientists, etc. They are almost always (cont’d...) (...cont’d) men. (Sometimes women are accomplices, but rarely are women the molesters.) They are often articulate and well-educated. They come in all shapes, sizes, and colors, and they can be very rich or out of work. But they have one thing in common: they want your child. Most of us are sickened at the thought of an adult having sexual relations with a child, but to be able to protect our children, we must get into the mind of the predator. First of all, predators often don’t see themselves as predators. They see themselves as loving partners with the children they molest. To them this isn’t rape, it’s a seduction. And, as with any seduction, it’s a slow and painstaking process. (Predators have been known to wait more than two years, collecting data on a particular child, before striking.) That’s what makes them hard to detect. They don’t appear to your child to be dangerous. An FBI agent who shared a panel with me recently said it best: “Before the Internet, these people had to get physically close to your children. They had to lurk near schoolyards, or playgrounds. Kids would see them. Adults would see them. It was a dangerous situation to be in for them, because everyone would notice an adult male lurking around children. They often had to take jobs and volunteer positions that allowed them to work with children in a position of trust in order to reach their victims. Now, however, the personal risks the pedophiles had to expose themselves to in order to be around children are gone. Now they can be ‘one of the kids’ and hang out with your kids online without exposing themselves. As long as they don’t say or do something in the public room that makes them stand out, they can stay there forever, taking notes.” And, many of them do. They have been known to create large databases on children. They track the children’s likes and dislikes. They track information such as whose parents are divorced, who doesn’t like their father’s new girlfriend or their mother’s boyfriend, or who likes computer games or a particular rock group. Kids often share personal information about their lives in chatrooms or on profiles. This is one reason why they shouldn’t. The more the predator knows about your child, the more easily they can “groom” them or appear to be their soulmate. Some cyberpredators (known as “travelers” to law enforcement) seek out the good kids, the smart ones, the ones who are not street-smart and are from sheltered suburban or rural families. Many of our children match that profile perfectly. Others, however, target (or are targeted by) popular, super achiever, risk preferring teens. It took the death of a young teen from the US, Christina Long, before we realized that many of the incidents involved teens who did not fit the loner profile. What we learned was that these kids never report any attacks or exploitation. The only time we hear of these cases is when the teen is kidnapped or killed. www.rnca.ca 49 So who is a typical victim of an Internet sexual predator? Anyone between 11-1/2 and 16. All are vulnerable. It Doesn’t Take Torture for Them to Spill Their Guts Here’s a mock chatroom discussion that my law-enforcement friends and I agree is pretty realistic. Imagine a predatorial pedophile sitting and taking notes on this child, and using this information to lure them later. Would your child fall for this? Most, unfortunately, would. This one is more typical of a boy victim and predator communication than a girl victim communication. Child: I hate my mom! I know it’s her fault that my parents are getting divorced. Predator: I know. My parents are getting divorced, too. Child: We never have any money anymore, either. Every time I need something, she says the same thing: “We can’t afford it.” When my parents were together, I could buy things. Now I can’t. Predator: Me too. I hate that! Child: I waited for six months for the new computer game to come out. My mom promised to buy it for me when it came out. She promised! Now it’s out. Can I buy it? Nope. “We don’t have enough money!” I hate my mom! Predator: Oh! I’m so sorry! I got it! I have this really kewl uncle who buys me things all the time. He’s really rich. Child: You’re sooooo lucky. I wish I had a rich and kewl uncle. Predator: Hey! I got an idea! I’ll ask my uncle if he’ll buy you one too....I told you he’s really kewl. I bet he’d say yes. Child: Really!? Thanks!! Predator: BRB [cybertalk for “be right back”]... I’ll go and call him. ___ Predator: Guess what? He said okay. He’s gonna buy you the game! Child: Wow, really? Thanks. I can’t believe it!!! Predator: Where do you live? Child: I live in Nova Scotia. What about you? Predator: I live in New Brunswick. So does my uncle. Nova Scotia isn’t far. Child: Great! Predator: Is there a mall near you? We can meet there. Child: Okay. I live near the Maritime Mall. Predator: I’ve heard of that. No prob. What about Saturday? Child: Kewl. (cont’d...) (...cont’d) Predator: We can go to McDonald’s too if you want. We’ll meet you there at noon. Child: Okay. Where? Predator: In front of the computer game store. Oh! My uncle’s name is George. He’s really kewl. Child: Great... thanks, I really appreciate it. You’re so lucky to have a rich and kewl uncle. Saturday arrives, and the child goes to the mall and meets an adult outside the computer game store. He identifies himself as “Uncle George” and explains that his nephew is already at the McDonald’s waiting for them. The child is uncomfortable, but the uncle walks into the store and buys the $100 game. He comes out and hands it to the child, who is immediately neutralized and delighted. Stranger-danger warnings are not applicable. This isn’t a stranger - he’s “Uncle George,” and if any proof was needed, the computer game is it. He gets into Uncle George’s car without hesitation to meet his friend at McDonald’s. The rest is reported on the 6 o’clock news. It’s disgusting. It makes us sick to our stomachs, but it happens. Not very often, but often enough that you need to be forewarned. (Several thousand cyberpredator cases are opened each year by law enforcement agents in the United States alone. And there have been several high profile cases right here in New Brunswick.) But no matter how often it happens, even once is too often. Knowing how they operate and the tricks of the trade will help us teach our child how to avoid being victimized. Each case differs, but the predators tend to use the same general tactics. Aside from the “bait and switch” scam discussed above, they often attempt to seduce a child. They want the child to “want” them. The Script - How They Operate Online They begin by striking up a conversation with the child, trying to create a relationship of trust and friendship. They often masquerade as another child or teenager, typically of the opposite sex, unless the child has indicated homosexual interests. (The child may or may not know the “seducer’s” real age by the time they meet face-to-face.) Phone calls usually start at this point. Sometimes gifts are sent to the child as well, which may include a Polaroid camera and film. Once they have broken down barriers of caution, they begin introducing sexual topics gradually, often with the use of child pornography to give the child the impression that other children are regularly involved in sexual activities. Then they begin to approach the child’s own sexuality and curiosity, by asking questions and giving them “assignments,” like wearing special underwear, sending sexually suggestive photos of themselves to the pedophile, or performing certain sexual acts. These assignments eventually broaden to the exchange of sexually explicit photographs (using the Polaroid, cell phone camera or digital camera) or videos of the child. www.rnca.ca 51 Finally, the pedophile attempts to arrange a face-to-face meeting. (He may also have divulged his true age or an age closer to his actual age at this point.) Why It Works All the lectures we have given our children from the time they are very young about not talking to strangers aren’t applicable online, where everyone is a stranger. A large part of the fun online is talking to people you’ve never met. In addition, our children’s stranger-danger defenses are not triggered when other kids are involved. The warnings apply only to adult strangers, not to other children. If any of us walked up to a child in a playground and tried to strike up a conversation, they would ignore us and probably run away. But if an unknown eleven-yearold came up to another eleven-year-old in the same playground, they’d be playing in ten seconds flat! That’s how the pedophiles get in under our kids’ strangerdanger radar - they pretend to be other kids. And children often believe what they read and hear. They “know” things about the predator because they believe what he told them. They also believe what they read about him in his “staged” profile, which supports what he told them. So it’s not just true, it’s confirmed. There are many stages at which the pedophile can be thwarted by an observant parent. In addition, children with healthy friendships and a strong, open, and trusting relationship with their parents are less likely to fall victim to pedophiles online. Pedophiles typically prey on a child’s loneliness. They feed the child’s complaints about her home life - creating an "us-versus-them" atmosphere. “Your mom is so mean to you! I don’t know why she won’t let you _____.” (Fill in the blank with whatever we try and limit: makeup, malls, concerts, etc.) This atmosphere does two things: It creates a distance between the child and her parents, at the same time bringing the child into a special secret alliance with the pedophile. (You should know that boys are almost as often the victims of Internet sexual exploitation as girls are, but they report it less frequently.) I have followed many cases over the last few years. In my role as WiredSafety executive director, I’ve also been responsible for reporting several of these to law enforcement and for helping many families through the pain of prosecution. Sometimes we just help the families survive what the molestation has done to them. (The child isn’t the only victim - entire families are torn apart in the aftermath of a molestation.) Parents feel guilty for not having protected their child, siblings don’t know how to treat their fellow sibling - the pain can continue for a lifetime, and even more. And, in addition to being hurt physically, the young victim's heart is broken by the betrayal of trust. (cont’d...) (...cont’d) Anatomy of a Real and Early Case One case I reviewed many years ago involved a New Jersey teenager and an Ohio adult predator. It was one of the earliest reported cases of cyber-predatorial conduct, discovered in 1996. Luckily, the liaison was discovered before the girl met the man face-to-face. But it had gone on for a year and a half before being discovered by the girl’s mother. As you read the details, think about what could have been done to discover the situation earlier and how you can use these precautions to protect your children. Paul Brown, Jr., an Ohio resident, was forty-six years old. He was also unemployed, weighed over four hundred pounds, and lived in a basement. He had accounts with several ISPs. Mary (a hypothetical name for the young girl involved) was twelve when her mother, a schoolteacher, bought her a computer, reportedly because Mary was having problems making friends. When she got online, Mary posted a message on an online service, in the spring of 1995, looking for a pen pal. In her message she described herself as a teenage girl. Paul Brown, Jr,. responded to the message, using his real name (something they often do, surprisingly) but identifying himself as a fifteen-year-old boy. Brown and Mary maintained an e-mail and telephone relationship for several months. As the relationship became more involved, they began writing letters, and Mary sent Brown a photograph. He told her that he was living at home with his mother and was hoping to find a girlfriend. In early August, Brown asked Mary for a “favor.” “If I sent you a roll of film, could you get one of your friends to take pictures of you in different outfits and maybe hairstyles? Makeup if you use any, and different poses. Some sexy, if possible. Please. Baby for me. Thanx. You’re the best. Love Ya.” Mary complied. For the next eight months, they continued to converse and correspond, and Mary sent additional photos. Brown encouraged her with juvenile antics, such as using stickers in his letters to her saying things like “Getting better all the time!” In May 1996, Brown sent Mary a special love note. “Saying I love you... seems to be an understatement. At the age of 14 you have captured my heart and made it sing... I love everything about you….” Shortly thereafter, Brown confessed to being in his twenties. He also suggested that Mary videotape herself in sexually provocative poses. She did. After Brown had reviewed her videotape, he returned it to her with instructions to redo the tape and include views of her genitalia and breasts. He later admitted to being divorced and in his thirties. He reportedly also sent her small gifts from time to time. A few months later, in response to Brown’s promise to pass copies of the tape to four members of a rock band Mary admired, she sent additional videotapes to Brown. (Brown told Mary that he knew the band members very well.) Each tape sent to Brown was designated for a different member of the band and contained sexually explicit conduct. Brown apparently had also sent her his www.rnca.ca 53 size 48 underwear. When her mother discovered the underwear, the authorities were notified. Tracing Brown through phone records, special agents of the FBI in Cleveland seized the videotapes and photos of Mary and of more than ten other teenage girls from across the country. Mary was fourteen when this was all discovered. Brown pled guilty to enticing a minor to produce sexually explicit photos and videos and was sentenced to a little less than five years in prison (the maximum penalty for a first offense). In a written statement to Brown following all of this, Mary said, “I trusted you. I thought you were my friend.” There are several things that stand out in this case. One, interstate phone calls were made by Mary. Parents should always be reviewing long-distance bills for suspicious calls. Two, Mary was lonely. These kinds of children are often the most vulnerable; a parent should be involved in their online friendships, and monitor their online lives. And, three, as hard as it is to know what our kids are doing when we’re not around, especially if we are a single parent, a year and a half is a long time for a relationship to be going on undiscovered. We should spend time learning who our children’s friends are, online and off. Knowing a child is lonely and has problems making friends is the first sign that the child may fall prey to a pedophile or cyber- predator. Predators can spot lonely children. They can also spot kids who are new online and may not yet know all the rules. Broken homes and homes where the child feels leftout are often the place where a predator can easily find an online victim. Most teens, when surveyed, admit to having been propositioned online. But what may be obvious to a cyberstreetsmart kid may not be so obvious to a child not yet familiar with cyberspace. Pedophiles befriend these kids and patiently build trust and a relationship— looking toward the day when they can meet face-to-face. Encourage children to make online friends, but learning about their online friends is an important way to avoid these secret relationships. Education is important in avoiding this danger, too. (Had Mary been forewarned about how pedophiles operate online, she may have been more attentive to how old Brown sounded on the phone, and been more aware of his classic tactics.) So is control over incoming and outgoing information when younger children are involved, using technology blockers, monitors, and filters. These kinds of situations can be avoided if we plan ahead, educate and communicate with our children, and keep our eyes open. Teaching our teens and preteens that that cute 14-yearold boy may not be cute...may not be 14...and may not be a boy can help too. Check out our new print public service announcements at WiredSafety.org. Feel free to use them and make as many copies as you'd like. Kids in the Know The New Face of Safety Education www.kidsintheknow.ca "Don’t talk to Strangers" has forever been the slogan of personal safety education. However we now know that this can cause more harm than actually equip children with a safety strategy to help protect themselves from harm. Direct instruction on how to listen to their instincts when they are warned of danger is also imperative. This pertains to root safety strategy: Trust Your Instincts. This should be combined with their instruction on how to respond safely in situations and to communicate a message of "I mean business." Stranger" is an abstract concept and difficult for children to understand. As "stranger" has often been associated with "bad," "mean," or "ugly" children become confused when someone they don’t know speaks to them nicely, looks "friendly," or introduces himself/herself in a position of authority. Most children are uncomfortable being impolite to adults. In most cases this is appropriate. However, they must be taught that if their safety is at risk or if they are feeling uncomfortable, it is okay to respond without concern for the feelings of the individual. This also heightens awareness about the messages adults communicate to children and their expectations of how to interact with adults. Many parents expect their children to express actions of affection toward particular adults even when their child is uncomfortable doing so. Adults need to keep the lines of communication open and actively listen to children. This "stranger" approach to safety becomes confusing to children as adults interact and speak to "strangers" everyday. Actually, research indicates that children are much more likely to be abducted or sexually exploited by someone they know or with whom they have come into contact. Therefore, the "stranger" theory will not usually protect children from victimization. How to Prevent Sexual Exploitation Know where your children are at all times. Be familiar with their friends and daily activities. Be sensitive to changes in your children's behavior; they are a signal that you should sit down and talk to your children about what caused the changes. There are situations in which children will need to approach a "stranger" for help. So moreimportantly, they must learn how to make safe choices about the type of individual they should approach in an emergency situation. A more effective safety strategy is teach children to make sure that their parents know where they are going before they go anywhere with anyone. To reinforce this and other key safety concepts, the Kids in the Know educational curriculum introduces 7 Root Safety Strategies throughout the program. This one – 'If you're asked to go and your parents don't know, shout NO!' is repeated consistently in the curriculum and replaces the 'Don't talk to strangers' concept. Be alert to a teenager or adult who is paying an unusual amount of attention to your children or giving them inappropriate or expensive gifts. Teach your children to trust their own feelings and assure them that they have the right to say NO to what they sense is wrong. Listen carefully to your children's fears and be supportive in all your discussions with them. Teach your children that no one should approach them or touch them in a way that makes them feel uncomfortable. If someone does, they should tell the parents immediately. Children must learn how to be assertive and to remove themselves from any situation with anyone who makes them feel uncomfortable, scared or hurt. This pertains to root safety strategy: Shout NO! - Run-Tell Someone. (cont’d...) www.rnca.ca 55 (...cont’d) Signs of Child Sexual Exploitation Parents should be alert to the below noted indicators of sexual and physical abuse and exploitation. Show PHYSICAL AFFECTION, and express your LOVE and CONFIDENCE with words and gestures. Keep OPEN THE LINES OF COMMUNICATION with the child. In the future it will be vitally important that the child believe that you are sympathetic, understanding, supportive, and optimistic so that he or she will feel comfortable in making additional disclosures and in discussing feelings. - Changes in behaviour, extreme mood swings, withdrawal, fearfulness, and excessive crying. - Changes in bed-wetting, nightmares, fear of going to bed, or other sleep disturbances. - Acting out inappropriate sexual activity or showing an unusual interest in sexual matters. - A sudden acting out of feelings or aggressive or rebellious behavior. - Regression to infantile behavior; clinging. - School problems, behavior problems. - Changes in toilet-training habits. - A fear of certain places, people, or activities; an excessive fear of going to a certain place. - Bruises, rashes, cuts, limping, multiple or poorly explained injuries. - Pain, itching, bleeding, fluid, or rawness in the private areas. YOU MUST ALERT the child protection, youth services, child abuse, or other appropriate social services organizations. The police, sheriff's office, or other law enforcement agency MUST ALSO BE NOTIFIED. If you think the child has been physically injured, SEEK OUT APPROPRIATE MEDICAL ATTENTION. Remember often we do not realize that a child who has been sexually exploited is also physically injured. DO NOT GUESS. Let the professionals make an independent judgment about treatment. You should note that some of these behaviors may have other explanations, but it is important to assist your child no matter what the cause of these symptoms or behaviors. Consider the need for COUNSELLING or THERAPY for the child. To ignore the incident, to "sweep it under the rug," to act as if it did not happen is not going to help the child deal with the exploitation. In deciding what counsellors to use, look for someone who is experienced in cases of sexual victimization. Ask about the number of children they have counseled. Adapted from Just in Case...Parental guidelines in case you are considering daycare. Adapted with permission of the National Center for Missing and Exploited Children (NCMEC). Copyright (c) 1989 NCMEC. All rights reserved. If a Child Discloses Exploitation REMEMBER THAT CHILDREN SELDOM LIE ABOUT ACTS OF SEXUAL EXPLOITATION. It is important that the child feel that you BELIEVE what he or she has told you. Report any online child sexual exploitation to CYBERTIP.ca's 24-hour toll-free telephone line to report ANY information on sexually exploited children: 1-866-658-9022. This number is available throughout Canada. SUPPORT THE CHILD AND THE DECISION TO TELL THE STORY. It is normal for children to fear telling others - especially parents. Often children DO NOT disclose about incident(s) of sexual exploitation. It is up to attentive adults to recognize the SIGNS OF SEXUAL EXPLOITATION. Make it CLEAR that telling you what happened was the RIGHT THING TO DO and that you will PROTECT him or her from FUTURE HARM. Excerpted from Just in case...Parental guidelines in case your child might someday be the victim of sexual abuse or exploitation. Adapted with RESPECT the CHILD'S PRIVACY. Accompany the child to a PRIVATE PLACE where he or she can relate the story. Be careful NOT to discuss the incident in front of people who do not need to know what happened. www.rnca.ca (cont’d...) 57 (...cont’d) permission of the National Center for Missing and Exploited Children (NCMEC). Copyright (c) 1985 NCMEC. All rights reserved. Sex Offender Profiles A Child Molester is an individual who sexually molests children. For these purposes, child sex offenders are divided into the two categories of Preferential and Opportunistic or Situational Child Molesters. Preferential Child Molester Preferential Child Molesters have a definite sexual preference for children. Their sexual fantasies and erotic imagery focus on children. They have sex with children not because of some situational stress or insecurity but because they are sexually attracted to and prefer children. If this individual does not act on his urges, then he is not a child molester. A preferential child molester is a pedophile. Opportunistic or Situational Child Molester Situational Child Molesters do not have a true sexual preference for children, but engage in sex with children for varied and complex reasons. This type of molester may engage in sex with a child, ranging from a once-in-a-lifetime act to a long-term pattern of behavior. The more long-term the behavior is, the more difficult it is to distinguish from a preferential molester. Members of lower socioeconomic groups tend to be over-represented among situational child molesters. An opportunistic child molester is not classified as a pedophile. Adolescent Offenders An area of increasing attention is that of adolescent offenders. This type of offender can fit the characteristics of the preferential or situational child molester. Adolescent (or younger) offenders should always be viewed as past or current victims of sexual abuse. This may include psychological sexual abuse, inappropriate exposure to sexually explicit materials, and/or the repeated or inappropriate witnessing of adult sexual activity. Question: How does the abuse occur? Answer: Abuse occurs in a wide range of situations and settings. For long-term abusers, often, the child molester will "court" the child with attention, www.rnca.ca 59 affection, and gifts. Just as one adult courts another during a dating process, the pedophile seduces children over a period of time by gradually lowering their sexual inhibitions. Sometimes the molester will tickle, wrestle, or hug the child in the presence of others first, adding legitimacy to the activity that will occur later in private. Often a child feels guilty or ashamed of the abuse. Children may feel that a short amount of uncomfortable feeling is worth the amount of attention and affection and perceived care they receive from the molester. Excerpted from Child Molesters: A Behavioral Analysis by Kenneth V. Lanning. Adapted with permission of the National Center for Missing and Exploited Children (NCMEC). Copyright (c) 1992 NCMEC. All rights reserved. Strategies of Sex Offenders Child Predators use a number of techniques to lure children from their homes, schools, or elsewhere. There are, however, a number of common themes that can be watched for. These include the following: Grooming Pedophiles often 'groom' their child victims prior to and during victimization. This involves three general steps - targeting, non-sexual touching, and sexual touching. Targeting Stage Many preferential child molesters have a "6th sense" as to who can be more easily victimized They often target neglected, needy children, often from troubled homes. Parents can be 'groomed' as well. Non-Sexual Touching Stage Often begins with "accidental" touching Introduction to pornography Introduction of alcohol or drugs Sexual Touching Stage Sexually assaultive behaviour, ranging from sexual touching to anal/vaginal intercourse. Excerpted from Child Molesters: A Behavioral Analysis by Kenneth V. Lanning. CYBERTIP.CA WHAT IS CYBERTIP.CA? toll free number (1-866-658-9022), or faxing (1-204-948-2177) the report information. Cybertip.ca analysts are available 24 hours a day, 7 days per week to accept calls from those who require direct assistance. In order to prevent the potential transmission of child pornography to Cybertip.ca (which is unlawful in Canada), email reports are not accepted. Cybertip.ca is Canada's National Tipline for reporting the online sexual exploitation of children. It is a centralized web portal for receiving and addressing reports from the public regarding child pornography, luring, child sex tourism, and children who are exploited through prostitution. Cybertip.ca also provides the public with information, referrals and other resources to help Canadians keep their children safe while on the Internet. Cybertip.ca content analysts review, prioritize and analyze every report they receive. After the report has been reviewed, the content analysts verify the report by collecting supporting information using various Internet tools and techniques. If the web site or other subject matter in question is assessed to contain potentially illegal material, a report is referred to the appropriate law enforcement agency. Cybertip.ca also gathers critical statistics and information for use by law enforcement and in public policy development. Child Find Manitoba's Cybertip.ca operates as one of the organization's core services. Although the majority of Cybertip.ca's reports are provided online, the public is also able to contact the tipline by phone or fax. CYBERTIP.CA'S MANDATE As Canada's National tipline, Cybertip.ca's mandate is to protect children from online sexual exploitation by: If the subject matter of the report falls outside of Cybertip.ca's mandate or is assessed to be legal, although perhaps offensive in nature, Cybertip.ca provides Internet safety information to the complainant on subjects such as Internet filters, email spam solutions, victim referrals, common lures used by child predators, or other resources that can assist the complainant in addressing their concerns. By utilizing its web portal and email facilities, Cybertip.ca can disseminate Internet safety information and other resources in an extremely cost effective manner that is both highly visible and accessible. • receiving and analyzing tips from the public about potentially illegal material and activities regarding the online sexual exploitation of children, and referring leads to the appropriate law enforcement agency; and • providing the public with information and other resources, as well as support and referral services to help Canadians keep themselves and their families' safe while on the Internet. Since launching Cybertip.ca in September 2002, the tipline has forwarded reports to law enforcement that have resulted in 27 arrests and the removal of as many as 2100 websites. Cybertip.ca operates as a clearinghouse or "front door" to the Canadian public for reporting offences related to the online sexual exploitation of children. In this role, Cybertip.ca is the first point of contact with the Canadian public and not only serves to avert the exploitation of children but also bridges the gap between those who want to report online victimization and law enforcement agencies who need the information to conduct an investigation. HOW DOES IT WORK? If a person comes across child pornography online, or if they believe someone is attempting to lure a child for sexual purposes or commit some other sexual offence against a child, they submit a report to Cybertip.ca by visiting www.cybertip.ca and filling out an online reporting form, calling a www.rnca.ca Cybertip.ca relies on complaints (cont’d...) 61 (...cont’d) twenty-one month old daughter so that he could masturbate to the images. Information was obtained on the individual's IP address, and a possible identity of the suspect was made. Cybertip.ca forwarded the report to the Winnipeg Police Service Child Abuse Unit, who subsequently arrested a twenty-three year old male and charged him with possession of child pornography. submitted by the Canadian public and does not proactively seek out illegal online material. Additionally, Cybertip.ca does not store or maintain a database of child pornography images and does not contact or otherwise engage alleged offenders in any way. Success Stories 1 A mother in Ontario contacted Cybertip.ca through the toll-free number after she learned that her fourteen year old daughter had been conversing with a thirty-five year old male on the Internet. The mother found evidence on her child's computer that the male suspect had been sending her child pornography images. A Cybertip.ca analyst conducted various searches, added value, and verified the information provided. The report was then referred to Kingston Police Services. Upon further investigation, it was discovered that the child had been conversing online with other adult males and had been sexually assaulted by a male out of Pennsylvania. This male was arrested and charged with four different counts relating to this case. Additionally, other female victims were identified and law enforcement expect that he will be incarcerated in the US for up to thirty years, preventing further victimization of young girls. 4 In July 2004, Cybertip.ca received an online report from an employer in Toronto who had tracked one of his employee's computer usage and sites visited. He discovered that the individual was visiting illegal websites to download images of child pornography. Cybertip.ca verified the information prior to forwarding it to the Toronto Police Service's Child Pornography Unit. After an extensive investigation, the Unit uncovered two additional computers at the suspect's home, both containing stored child abuse images. A thirty-three year old male was arrested in August and charged with accessing and possessing child pornography. 5 A concerned friend from California contacted Cybertip.ca about a young boy who was being molested by his father and his father's friends. The individual reported that the boy was forced to get naked while the adult males took photographs and videos of him and another boy. He was also made to look at pornography on the computer. The boy was threatened that if he ever told anyone, they would hurt his mommy. After a brief review, Cybertip.ca immediately forwarded the information to the National Child Exploitation Coordination Centre. 2 In August 2004, Cybertip.ca received 3 reports from different sources indicating that there may be a Canadian website hosting child pornography images. Cybertip.ca analysts examined the contents of the website, "Lost Youth," and determined that there were images being posted on this site that would be considered to be illegal child pornography images. Searches determined that the website was being hosted by a company from Chateauguay, Quebec. The file was forwarded to the SQ Cyber-surveillance Unit, and as a result of this intervention, the site has been shut down. http://www.cybertip.ca 3 Cybertip.ca was provided with an online report from a concerned moderator of an MSN Trivia chatroom. The reporting person had been informed that an individual from Manitoba had been chatting with an adult female member and requested to see pictures of the female's www.rnca.ca 63 Industry Canada Chat Dictionary industrie Canada Online chatting, where two people communicate by typing at the computer, is a normal part of everyday life for kids nowadays. If you don't know the lingo, however, you might be baffled by the cryptic acronyms you see on-screen. This dictionary will help you decipher what your kids are saying in chat rooms and other online services like instant messaging (MSN, etc.). 123 *poof* 12345 20 2, 2b, 2u 4 404 you ^5 enter a wrong URL) High 5 abt adn afaics afaik afk afn aka asap asl? or a/s/l? atm atw About Any day now As far as I can See As far as I know Away from keyboard That's all for now Also known as As soon as possible Age, sex, location? At the moment At the weekend A B b b/c, bc b/l b4 b4n, bbfn, bfn bas bbb bbiab bbl bbn bbs bcnu bd b-day beg bf bff bffae bibo bion bka bl bl bmgwl bnscd bout brb btdt btw bwl byca bz www.rnca.ca C Has left the chat Talk about school Location To, to be, to you For I have no clue (what you get when c cg c&g cico cid cm cmiiw cmm cnp comp conv cp cr crbt csg ctp cu cuial cul, cul8r, cyl, Cyl8r cuttl cuz cya cym See Chuckle and grin Coffee in, coffee out Crying in disgrace Call me Correct me if I'm wrong Change(d) my mind Continued (in my) next post Computer Conversation Chat post(a chat message) Chat room Crying real big tears Chuckle snicker grin Cutie pie See you See you in another life See you later Crawling under the table laughing Because See ya Change your mind d/l da dat dial diff dint diz dltbbb dom dont dos dtrt dunno duz duznt dwb dwpkotl Download, downloading or downloaded The That Dialogue Different Didn't This Don't let the bed bugs bite Dirty old man Don't Dozing off soon Do the right thing Don't know Does Doesn't Don't write back Deep wet passionate kiss on the lips e1 eg egbok e-mail or e-mail emsg enuff er1, every1, evry1 es Everyone Evil grin Everything going to be O.K. Electronic mail E-mail message Enough Everyone Enough said D Be Because Buddy list Before Bye for now Big a** smile Bye bye baby Be back in a bit Be back later Bye bye now Be back soon Be seeing you Big deal Birthday Big evil grin Boyfriend Best friends forever Best friends forever and ever Beer in, beer out Believe it or not Best known as Buddy list Belly laugh Busting my gut with laughter But now something completely different About Be right back Been there, done that By the way Bursting with laughter Before you came along Busy E (cont’d...) 65 evry ez Every Easy f2f faq fc focl fomc fomclol foz ftbomh fu fubar fwiw fx fya fyeo fyi Face to Face Frequently asked question Fingers crossed Falls off chair laughing Fell off my chair Fell off my chair laughing out loud From Autralia (aka OZ) From the bottom of my heart Follow up Fowled up beyond recognition For what it's worth Effects For your amusement For your eyes only For your information g g2g g2gp gaga gal gb gf gfak gfn gg gg, g/g ggp giaug, guayg gimme gj gjp gl gm gmab gmbo gmta gn go2 goin gonna gosta gotcha gr gr8 gtaw gtg, g2g gtsy Grin Got to go Got to go pee Adoration Get a life God bless Girlfriend Go fly a kite Gone for now Good game Gotta go Gotta go pee Give it all you got Give me Good job Good job partner Good luck Good morning Give me a break Giggling my butt off Great minds think alike Good night Go to Going Going to Got to Got you Gotta run Great Go take a walk Got to go, gotta go Glad to see you h&k h/o h8 habu hafta hagn hagu Hug and kiss Hold on Hate Have a better 'un Have to Have a good night Have a good 'un (...cont’d) F G H www.rnca.ca hand hb help hey hf hfs! hhis hhoj hhok hhos hi hig hmwrk hos ht htgelb hub hud hw Have a nice day Hurry back Help me Hello Have fun Holy f_ckin sh_t!! Hanging head in shame Hi!Hi! Only joking Hi!Hi! Only kidding Hi!Hi! Only serious Laughter How's it going Homework Husband over shoulder Hi there Have to go eat lunch, bye Head up butt How you doing? Homework iae ianal ibyp ic idk idu iirc igp igtg ill ilu, ily im imco imho imnsho imo ims inet info ino iono iow ipn irc irl isn itigbs itz iwalu iyss In any event I am not a lawyer but... I beg your pardon I see I don't know I don't understand If I remember correctly I gotta pee I got to go I'll I love you Instant messenger In my considered opinion In my humble opinion In my not so humble opinion In my opinion I'm sorry Internet Information I know I don't know In other words I'm posting naked Internet chat relay In real life Is an I think I'm gonna be sick Its or it's I will always love you If you say so I J j/a Just asking Joking j/k j/p Just playing Just wondering j/w j2luk, j2lun, j2lyn, jtluk, jtlun, jtlyk, jtlyn Just to let you know (cont’d...) 67 (...cont’d) j4g jam jas jc jfyi jj jk jlt jm jmo Just for grins Just a minute Just a second Just chillin' Just for your information Just joking Just kidding Just like that Just messing Just my opinion k, kk kiss KIT ko koc, kotc kotl kwim Okay, alright Keep it simple, stupid Keep in touch Knock out Kiss on the cheek Kiss on the lips Know what I mean l lol l2s l8 l8r lasa ldr lemme leta lhm lho lhu lm lma lmao lmirl lmk lns lotza lshih lshmbb lshmbh ltns lts luv luv ya, ly luwamh ly4e lylab lylas Laugh Laughing out loud Laughing to self Late Later (Goodbye) Loser Long-distance relationship Let me Later Lord help me Laughing head off Lord help us Love me Leave me alone Laughing my ass off Lets meet in real life Let me know Laughing non stop Lots of Laughing so hard it hurts Laughing so hard my belly is bouncing Laughing so hard my belly hurts Long time no see Laughing to self Love Love you Love you with all my heart Love you forever Love you like a brother Love you like a sister K L M m/b m8 mbn me2 meanna mel mia min msg mtf mtg mwa myob mys www.rnca.ca N n n/m n2m n2n nadt nc, n/c ndbwy ne ne1 nehow nemore nething neway nhot nick nifoc nm nmjc no1 nom np nrn nstlc ntmu nuffin, nutn nv nvm nvng nw nw In or and (depending on context) Not much Not too much Nice to know Not a darn thing No comment Nice doing business with you Any Anyone Anyhow Anymore Anything Anyway Never heard of that Nickname Naked in front of computer Never mind Nothing much just chillin' No one No offense meant No problem / nosy parents No reply necessary Needs some tender loving care Nice to meet you Nothing Envy Never mind Nothing ventured, nothing gained Network No way oic, ois ol om omg oob oom otoh otp ottomh outta Oh, I see Old lady (wife, girlfriend) Old man (significant other) Oh my gosh Out of body Out of mind On the other hand On the phone Off the top of my head Out of O P paw pds pfm pic pliz, pls, plz plmk pm pmfji pml pmp poahf pos pov ppl ppr prob probly, prolly puter My bad Mate Must be nice Me too Mean to E-mail Missing in action Minute Messages More to follow Meeting A kiss (the sound "mwa") Mind your own business Miss you so (cont’d...) 69 Parents are watching Please don't shoot Please forgive me Picture Please Please let me know Private message Pardon me for jumping in Pissing myself laughing Peed my pants Put on a happy face Parent over shoulder Point of view People Paper Problem Probably Computer (...cont’d) Q qsl qso qt ques Reply Conversation Cutie Question r rbay rem rl rm rme rnt rofl rsn rtfaq rt Are Right back at you Remember Real life Room Rolling my eyes Aren't Rolling on floor laughing Really soon now Read the FAQ list Real time S S^, S'UP sb sds sec sete shid sk8ing smh smhof scnr sn so some1 somy? sorta sot sotmg spoz spoz2 spoz2b sry ss str8 stw su suakm sul sup? swag swak swl syah syak sys syt Smile What's up? Smiles back Sweet dreams Second Smiling ear to ear Slaps head in disgust Skating Shaking my head Set my heart on fire Sorry, could not resist Screen name Significant other Someone Sick of me yet? Sort of Short of time Short of time must go Suppose Supposed to Supposed to be Sorry So sorry Straight Scared to watch Shut up Shut up and kiss me See you later What's up? or Wassup? (a greeting) Scientific wild a** guess Sealed with a kiss Screaming with laughter Sending you a hug Sending you a kiss See you soon Sweet young thing ta tafn taw Thanks again That's all for now Take a walk R S T www.rnca.ca tc tcoy tdy thx, tnx, tx tia tilii tlc tnt toy tp tt4n ttme tttyt ttyl turt twb4u ty tyt tyvm Take care Take care of yourself Today (anglais) = aujourd'hui Thanks Thanks in advance Tell it like it is Tender loving care Till next time Thinking of you Toilet paper Ta ta for now Talk to me Ta ta to you too Talk to you later Take your time That was before you Thank you Take your time (common reply to brb) Thank you very much u u'd ul, u/l ull uno up ur urs urself urw You You'd Upload or Uploading You'll You know Youpie (means "yeah") Your or you're Yours Yourself You are welcome vn Very nice w.e, w/e w/ w/o w8 wadup wag wanna wayd wb wbs wcul wdp wdym wdyw we, w-end weg wkf wnwu wos wru wtg wtgp? Whatever With Without Wait What's up? Wild a** guess Want to What are you doing Welcome back Write back soon Will catch you later Well done partner What do you mean What do you want Week-end Wicked evil grin Well known fact What's new with you Wife over shoulder Who are you Way to go Want to go private? (go to a private room) U V W (cont’d...) 71 (...cont’d) wth, wth? wtrdoin wts? wuf ? wuz What/Who the heck (or H**, or sub an 'F' for the 'H') What are you doing What's that sh_t? Where are you from? Was xxx Hugs and kisses (X's are kisses and O's are hugs) Kisses y ybs yg yl ym yt? yw Why You'll be sorry Young gentleman Young lady Young man You there? You're welcome zzzz Sleeping, tired :-) :-))) :-D ;-) :'-) :-" :-* :-x |-) |-l :-( :-| ::-/ :'-( :-o :-O :-P :-# :-& :-... :-)~ :-~ :-' :-s :-\ %-6 .-) ,-) x-( (-: :*) %-) |-o :-9 Happy, smiling Laughing a lot Has a big smile Is winking Crying of joy Whistling Sending a kiss Cannot say a word Sleepy Asleep Sad, angry Ambivalent, indifferent Not happy Is sceptic, euh.... Crying Surprised Even more surprised Grimace Not wanting to talk Is sick Heart broken Raptured To be cold Spitting-out is chewing gum Done or said something wrong Did not appreciate at all Be unconscious, going crazy To have an eye on... Having only one eye and winking Dying right now Is left handed Being drunk Staying too long in front of pc Yawning/snoring Licking the lips X xoxo Y Z Smileys www.rnca.ca @-}--- or ---<-<--<--@ A flower for you [ ], ( ) Hugging, holding someone tight in your arms ex: [Catherine] :-)x or :-)* Kiss :-)~~(-: Kissing deeply <3 Love, heart <3< Hate {} Kissing someone very hard ex: {{{{Catherine}}}} <> Make love B-) Wearing glasses B:-) Having glasses on the head :^) Having a big nose (:-) Bald =:-) Hair all over :-(=) Has big teeth d:-) Wearing a hat P-) Wearing an eye band &:-) Curly hair :-{) :-7<> :-)>/////> [:-) [:] 8:-) {:-) or /:-) *:-) C:-) o:-) >:-( (::()::) :-{ } :( ) :-> ;-> :-6 (( )):** :-)*(-: :-@ ^ :-& ?¬? °oO Has a mustache Smoking the pipe Wearing a tie Listening to a walkman Being a robot Be a girl Wearing a beret Bozo the clown Having a big IQ Angelic Angry Band-aid Blowing a kiss Can't stop talking Devilish Devilish wink Exhausted, wiped out Hugs and kisses Kiss Screaming Thumbs up Tongue tied Laughing to death Thinking http://strategis.ic.gc.ca 73 Internet Filter Reviews Why Internet Filter Software? to its fullest capacity. • Effective at filtering – Top Internet filter software offers a good balance between filtering objectionable material and not filtering too much content. Another important aspect is the ability to customize the filter's sensitivity for each family member. The Internet is one of the greatest inventions of all time. As our families become increasingly intertwined with it, the more active role we must take to protect our loved ones from Internet pornography. Although nothing can take the place of a well-informed parent that takes an active part in their children's online activities, Internet filter software adds a strong, additional layer of defense-giving parents an added measure of control and further peace of mind. • Filtering algorithm – The best filter programs use a combination of filtering techniques, including URL filtering, keyword filtering and dynamic filtering. Internet filter software gives you the ability to control content displayed, block websites and set up passwords. Powerful services like email filtering, popup blocking and chat room monitoring are just some of the tools available with today's Internet filter software-each designed to protect against and counteract the tactics of aggressive online porn companies. • Activity reporting – The most useful Internet filter software offer reports on what each family member has been doing on the computer, which includes websites visited, chat room activities and so on. Excellent • Client-Server based Good– Good filtering programs offer a flexible platformFairwhich allows users to decide Poor whether their optimal filtering solution is client (home Rank computer) based, server (Proxy or ISP) based or a Overall Rating combination of both. Ratings Very Good With so many Internet filter software choices available, researching and choosing the Internet filter that's right for your family can be complex and time-consuming-that's where we can help. 4 Ease of Use filtering – Effective Internet • Foreign language Ease of Setup Filtering filter programs offer theEffectiveness capacity to filter keywords in multiple languages. One of the tricks that many teenagers have discovered to bypass Internet filters is to type in the foreign language equivalent of certain keywords. Feature Set Within this site, you'll find articles about Internet pornography, recent news stories, side-by-side comparisons and comprehensive reviews on Internet filter software that will help you make a fast, informed decision. At TopTenREVIEWS - We do the research so you don't have to. • Port filtering and blocking – Filtering programs should block or filter all major Internet protocols, including web access, chat rooms, email, peer-to-peer networks, bulletin boards and popup windows What to look for in Internet Filter Software Even though the perfect Internet Filter does not exist in today's marketplace, there are a number of great solutions depending on your family's needs. Below are the criteria TopTenREVIEWS used to evaluate Internet filter software: With Internet filter software and proper supervision, parents can keep their families safe and sound from the ever-present problem of online pornography. http://internet-filter-review.toptenreviews.com • Ease of Use – The most important attribute an Internet filter program can offer is an easy-to-use design, making it possible for people with all levels of computer experience to easily install and use the filter Excellent Very Good Good Fair Poor Rank 4 5 6 7 8 9 10 Overall Rating Ratings Excellent Feature Set Very Good Ease of Use Ease of Setup Good Fair Filtering Effectiveness Poor Rank www.rnca.ca Overall Rating 75 Ratings Feature Set Ease of Use Ease of Setup Filtering Effectiveness 4 5 Resources To find out more about Child Pornography and Internet Safety, please visit: Media Awareness Network http://www.media-awareness.ca Wired Safety http://www.wiredsafety.org Internet 101 http://www.internet101.ca Child Find Canada http://www.childfind.ca Cybertip!ca http://www.cybertip.ca CyberSmart http://www.cybersmart.org Canada’s Safety Council http://www.safety-council.org Cyberangels http://www.cyberangels.org Child & Family Canada http://www.cfc-efc.ca Get Netwise http://www.getnetwise.org Public Safety http://safecanada.ca Microsoft Stay Safe Online http://www.staysafeonline.com Web Aware http://www.bewebaware.ca SafeKids.com http://safekids.com Kids Help Phone http://www.kidshelphone.ca WebWise Kids http://www.webwisekids.org Centres of Excellence for Children’s Well-Being http://www.cecw-cepb.ca NetSafekids http://www.nap.edu/netsafekids/ Child Safety Research & Innovation Center http://csric.org CyberWise.ca http://www.cyberwise.ca The RNCA does not control these sites and is not responsible for the legality or content of these sites. www.rnca.ca 77 Donations to the Community Cst. Tim Buckle and Cst. Paul Davis present donation for scholarships to the William Moss Memorial Softball Tournament Recipients. (photo courtesy of Georgina Short) Throughout the year the RNCA donated to various local charities in the community. In 2006 some of these charities included: • Children’s Wish Foundation • MS Society of Newfoundland • Child Find Newfoundland & Labrador • The Salvation Army • Single Parent Association of Newfoundland • Kidney Foundation • RNC Veteran’s Association • Atlantic Women in Law Enforcement • Royal Canadian Legion • Law Enforcement Torch Run (Special Olympics) • Senior’s Resource Centre • NL Crime Stoppers • DARE Program • Ride for Sight • Canadian Cystic Fibrosis www.rnca.ca 79 Fa m il y RNCA members and their families enjoy a day of barbequing and outdoor fun at their Annual Family Fun Day held next to the RNC Headquarters. n u F www.rnca.ca ! y a D 81 Fa m il y n u F www.rnca.ca ! y a D 83 Motorcycle Ride for Dad The RNCA was a proud supporter of the first Motorcycle Ride for Dad event to be held in Newfoundland and Labrador. The goal of Motorcycle Ride for Dad is to raise funds for Prostate Cancer research and education. All pledges raised by riders and supporters were donated to the Dr. H. Bliss Murphy Cancer Care Foundation. For more information about MRDF, please visit their website at www.motorcycleridefordad.org. www.rnca.ca 85 Seniors’ 2006 S t. John’s Christmas Party RNC members enjoy some Christmas time fun with local seniors. Many thanks to Siochana and The Concert Crowd for providing great music and entertainment. A special thank you to all those who helped organize the event. Without you this event would not be the great success that it is. (photos courtesy of Georgina Short) www.rnca.ca 87 Seniors’ 2006 S t. John’s (...cont’d) Christmas Party www.rnca.ca 89 Seniors’ 2006 S t. John’s (...cont’d) Christmas Party www.rnca.ca 91 Detective Sergeant Thomas Fraize Scholarship 2nd Vice President Warren Sullivan and Ms. Lara Fraize, granddaughter of the late Detective Sergeant Fraize, present the annual Detective Sergeant Thomas Fraize Scholarship to Jenna Hawkins and Ryan Small. This scholarship is awarded by the RNCA to dependents of past or present members of the RNCA who are also eligible for Grade 12 graduation. Both Jenna and Ryan plan to attend Memorial University. Jenna is the daughter of Sgt. Bernard Hawkins and Ryan is the son of Sgt. Junior Small. New RNC Cadets In the fall of 2004 Memorial University introduced a new diploma program in police studies at its St. John's campus. The program replaces the university's BA in police studies. The MUN program will allow the Royal Newfoundland Constabulary to train here in Newfoundland and Labrador. Previously, RNC cadets were trained at Holland College in Prince Edward Island. The RNCA would like to congratulate the second class of cadets to graduate in September 2006 with a Diploma in Police Studies from Memorial University of Newfoundland. (photos courtesy of Doug (Bud)Gaulton) www.rnca.ca 93 Tour de Rock Members of the RNC arrive at RNC Headquarters after biking across Newfoundland from Port aux Basques to raise awareness and donations for Mothers Against Drunk Drivers (MADD). Treasurer Todd Barron presents a donation to MADD Committee Members. Lobby Day l-r: K. Jackson, T. Barron, P. Davis, W. Sullivan, T. Buckle www.rnca.ca 95 Annual RNCA Hockey Tournament The Annual RNCA Hockey Tournament held in May 2007 hosted teams from Prince Edward Island, New Brunswick and Ontario. Proceeds raised were donated towards the purchase of new uniforms for the Holy Trinity Tigers High School Boy’s Hockey Team. (Photos courtesy of Doug (Bud) Gaulton) www.rnca.ca 97 Police Week RNC Members visit local schools and senior citizens homes throughout the community during Police Week. (photos courtesy of Georgina Short) www.rnca.ca 99 Crime Stoppers Police Officers of the Year Award ~ 2006 Cst. Ken Dean, RNC Police Officer of the Year, Cst. Peter King, RCMP Police Officer of the Year RNC Finalists The 2006 recipient of the Newfoundland and Labrador Crime Stoppers Police Officer of the Year is Cst. Ken Dean of Corner Brook District of the Royal Newfoundland Constabulary. Other finalists for the RNC were Cst. Kevin Foley and Sgt. Marlene Jesso, both of St. John’s District. At a public luncheon, sponsored by the VOCM Cares Foundation and Provincial Airlines, Bev Vey, Chairperson of NL Crime Stoppers, announces the 2006 Police Officers of the Year. Honourable Tom Rideout and Deputy Chief Brown were also in attendance. (Photos courtesy of Georgina Short) Please call Crime Stoppers at any time at 1-800-222-TIPS (8477). Remember, your call is anonymous. www.rnca.ca 101 RNC 20th Year Service Medals In recognition of twenty years of exemplary service, members of the RNC are presented with a service medal that is worn on their dress uniform for special events and functions. (photos courtesy of Doug (Bud) Gaulton) www.rnca.ca 103 Arbitration Award RNCA wins arbitration award granting salary comparability for its members. Announcement of the award took place at the Comfort Inn Airport on May 31st, 2007. Negotiating team members from left to right are Secretary Paul Davis, Treasurer Todd Barron, 2nd Vice President Warren Sullivan, Executive Assistant Kerry Chaytor, President Tim Buckle, 1st Vice President Kenny Jackson, Director Sean Ennis and Past President Robert St. Croix. Approximately two hundred members were present for the announcement including the Executive members of the RNC Veteran's Association (bottom right photo). www.rnca.ca 105 NLPPOMA The Newfoundland and Labrador Police and Peace Officers’ Memorial is dedicated to the memory of those police and peace officers who lost their lives in the performance of their duties, while protecting the lives and property of the people and the natural resources of the Province of Newfoundland and Labrador. The last Sunday in September of every year has been officially proclaimed as Newfoundland and Labrador Police and Peace Officers’ Memorial Day. For more information about NLPPOMA please visit their website at www.policeandpeaceofficers.ca (photos courtesy of Georgina Short) www.rnca.ca 107 Remembrance Day Parade Members of the RNC participated in the Remembrance Day Parade. (photos courtesy of Georgina Short) www.rnca.ca 109