Parents Internet Safety Packet
Cyberbullying, Cyberstalking & Online Predator Prevention Information
iPredators are always preparing for children & teens around the country to return to school and look to the Internet and their Information and Communications Technology for their academic and social networking needs. The beginning of a new school year guarantees a significant increase in online usage, and most important to iPredators, patterned and predictable times of online usage. Now that children will be back to class and have schoolwork, their time spent online significantly increases along with patterned and predictable times they access the Internet. Online sexual predators, cyberbullies and cyberstalkers prepare themselves for what they hope will be another year of unsuspecting groups of vulnerable, discouraged and high risk taking children and teens. The “Parents Internet Safety Packet” is a useful resource year round and during times when your child is frequently involved with their computers and mobile devices.
In addition to online sexual predators, children and teens who are cyberbullies and cyberstalkers will fill cyberspace looking to taunt and harass their peers. For proactive parents who plan to practice & institute Internet safety, I have compiled my quick checklist & tips to help ensure all your bases are covered. The list provided is a quick injection of Internet safety awareness. I hope my Internet safety packet helps insulate your child from abuse and leads to a safe and enjoyable school year.
As Information and Communications Technology (ICT) becomes more widespread, cyber attack prevention, education and protection are areas requiring immediate attention. The Information Age has many benefits to humanity, but it is vital to identify and prevent the malevolent and nefarious elements that exist in cyberspace and Information and Communications Technology.
The typologies of iPredator include: Cyber Bullying, Cyber Harassment, Cyber Stalking, Cyber Crime, Online Sexual Predation and Cyber Terrorism. Within this construct, Cyber Harassment is the adult form of Cyber Bullying and used when the perpetrator is an adult. The definition and motivations of iPredator and Cyberstealth is as follows:
iPredator: A child, adult, group or nation who, directly or indirectly, engages in exploitation, victimization, stalking, theft or disparagement of others using Information and Communications Technology. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age, either gender and not bound by economic status, race or national heritage.
iPredator is a global term used to distinguish all online users who engage in criminal, deviant or abusive behaviors using ICT. Whether the offender is a cyber bully, cyber stalker, cyber criminal, online sexual predator, Internet troll or cyber terrorist, they fall within the scope of iPredator. There are three criteria used to define an iPredator including:
I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The intermittent to frequent usage of ICT to obtain, exchange and deliver harmful information. III. A general understanding of Cyberstealth to engage in criminal or deviant acts or to profile, identify, locate, stalk and engage a target.
When an offender profile includes these three characteristics, they meet the definition of iPredator. A fourth criterion, not included in the triad defining an iPredator, is what I have termed iPredator Victim Intuition (IVI) and reserved for seasoned iPredators. IVI is the aptitude to sense a target’s online vulnerabilities, weaknesses and technological limitations increasing their success with minimal ramifications. iPredators, through practice and learning, develop a sense and/or skill of being able to experience an intuition to know what online user will be a successful target.
In addition to having IVI, the iPredator practices Cyberstealth using multiple covert strategies. In fact, the third criteria used to define an iPredator include a general understanding of Cyberstealth used to profile, identify, locate, stalk and engage a target. Also lying upon a continuum of expertise, iPredators are assessed as being advanced in their Cyberstealth practices as opposed to a haphazard approach of targeting a victim without attempting to hide their identity.
Often times, cyber bullies, ex-partners, ex-employees, angry or self-righteous online users, Internet trolls, organized groups with political, religious and moralistic causes, child molesters, pedophiles and highly narcissistic online users do not attempt to hide their identities. Cyberstealth is a strategy reserved for iPredators who seek to hide their identities online.
Cyberstealth, a concept formulated along with iPredator, is a term used to define a method and/or strategies by which iPredators devise tactics to establish and sustain complete anonymity while they troll and stalk an online target. In addition to a stratagem, Cyberstealth is a reality of Information and Communications Technology, that humanity often fails to fathom leading some online users to become high probability targets. Cyberstealth is a learned behavior that becomes more advanced with practice, trial and error and experimentation.
10 INTERNET SAFETY STEPS
1. FBI Parent’s Guide: Visit the FBI’s website and thoroughly read their excellent overview called “A Parent’s Guide to Internet Safety.” Before moving on to the next step, make sure you have written down and have easy access to your local police department’s phone number. To download online, enter into Google or your favorite search engine the term “FBI Parents Guide.” On the first page will be the link to read or download. If you are reading my packet online, here is the direct link: http://www.fbi.gov/stats-services/publications/parent-guide/
2. Offline Distress Dictates Online Response (ODDOR): If you have already read my construct, iPredator, you will immediately recognize this concept. A child is particularly prone to engage in high-risk behaviors online if he/she is feeling discouraged, angry or distressed. Do not move on to the next step until you are confident your child is feeling encouraged, stable or being monitored by a professional or trusted loved one. Of the hundreds of articles and studies I have researched, a child’s psychological status highly correlates with their online behaviors. If there are ongoing conflicts at home, recent traumatic events or any other anxiety and/or distressing events in the home, it is very important to monitor your child’s online usage.
Just as important as your child’s home environment is your child’s school environment. Given you cannot be with your child when they are at school, it is important to maintain regular contacts with school officials regarding your child’s attitudes and behaviors on school grounds. Although academics in school are a priority, your child’s demeanor with teachers and fellow students speaks to their psychological and emotional welfare. Research has directly linked a child’s school and home environments to their online activities.
3. Personal Information Prevention Planning: The number one and most important issue to address with your child is the amount of personal information they share online. Getting your child to practice minimal release of their name, contact information, photographs and passwords to their social sites is highly desirable. If I were to make an approximation of the several hundred articles I have read on Internet safety and cyber security, 99% of them list restriction of sharing personal information online being vital to Internet safety. It cannot be emphasized enough, but children who disclose their contact information, personal information and images freely are at a much higher risk of being targeted by an iPredator. The goal as an Internet safety proactive parent is not to totally restrict or forbade your child from sharing personal information, but to educate them on being highly cautious and consistently aware when, why and what they disclose to others.
***Research has proven that the vast majority of taunting, abuse, cybercrime and sexual assault that children endure is most likely coming from their peers and/or known adults rather than unknown adult online sexual predators.***
4. Peers, Parents & the PTA: Given you cannot monitor your child’s online activities when they are not in your presence, its paramount to access those people who will be. Your child’s friends, their friend’s parents and their school are the three prime social targets you should be in regular contact with. The goal is to initiate and sustain open communication with your child’s friends and their parents regarding Internet safety expectations. Just because you have restricted your child from certain online activities does not mean your child’s friends are restricted or their parents have online house rules.
Using your capacity to be cordial and polite, maintain a consistent open dialogue with your child’s social circles. Regarding your child’s school environment, it is important to have an open dialogue with school officials and/or the PTA to ensure Internet safety and cyber security mechanisms are in place. Before the school year begins, contact school officials and investigate their Internet safety measures, educational emphasis on Internet security and procedures for cyberbullying, cyberstalking, sexting, mobile device usage during school hours and cybercrime related to adolescent life.
5. Know Your Child’s Social Networking Sites: Facebook, Twitter, MySpace, Tagged and MyYearbook are among the most popular social networking sites children and teens look to for their cyber identity, digital reputation and online social relationships. Thanks to the Internet and digital technology, many children and teens look to the digital universe for their developmental milestones and self-esteem. Unfortunately, iPredators also choose these sites as their most favored websites spending most of their free time trolling for unsuspecting, naive, discouraged or high-risk children. Given the 400-500 popular global social sites and growing, it is of the utmost importance to spend time with your child discussing digital citizenship and cautious online communications.
6. Smartphones & Cellphones Need More Smarts: A smartphone is a wireless phone with voice, messaging, scheduling, e-mail and Internet capabilities. Research and marketing trend experts’ project sales of smartphones will exceed personal computers by the end of 2012. In 2012, 500 million smartphones are projected to be sold. Despite the benefits of mobile digital technology, children and teens are becoming dependent on their mobile phones more than ever before. Recent studies have suggested children who are depressed, anxious and/or discouraged spend more time interacting with their mobile devices and less time being typical children.
It is vital you monitor the amount of time your child spends on their mobile phone and contact your phone carrier about additional security features that they may offer. If a cellphone or smartphone is in your child’s future, be sure to have the store you purchase the phone from install or set up all the necessary safety and filtering devices and software.
7. Weekly Digital Dinner: The term may sound absurd, but making it a habit to discuss the family’s digital habits at least once weekly during dinner is both proactive and helpful. In today’s dual economy and single parent households, dinnertime is one of the few weekly events that are consistent, predictable and social. As just mentioned, it is the family’s digital habits and interactions discussed and not the child’s weekly interrogation. By all family members discussing their Internet activities, children will feel more comfortable to disclose information relevant to Internet safety and their online activities.
During these weekly discussions, always make sure to discuss the importance of being highly cautious of sharing personal information online. It is also highly recommended to discuss positive, beneficial aspects and stories about online usage to make the weekly discussions fair and balanced. Prior to every weekly digital dinner discussion, it is highly recommended to announce to all involved that any information shared regarding online activities will not cause punishment, retribution or embarrassment. This weekly announcement may be redundant, but it reaffirms to your children that they will not be punished for their mistakes or irresponsible behaviors.
8. House Rules Include Online Rules: Just as children have curfews, responsibilities and chores, they also should have online rules & regulations. Based on my conclusory findings, there are no universal online rules that can be applied to children of all ages. The three that I feel are relevant to children of all ages and at all times are; cautious disclosure of sharing personal information online, never meeting someone they have met online without supervision and never sharing their passwords to anyone other than their parents. Other than this triad, parents should establish house online rules based on their child’s age, developmental maturity, knowledge and persistence of Internet safety.
In addition to the trifecta of obvious rules I mention, research has led me to conclude that nighttime online usage and time patterns should be considered when negotiating or designing online rules. Research on iPredators have concluded that they prefer to troll for their victims during evening hours and at time intervals when the child or children they are targeting typically log on to the Internet. The iPredator learns online log on habits and sets their online schedule to match the child they are targeting.
9. Emphasize the Child’s Developmental Achilles Heel: Part of being an effective parent is being a creative parent. All children, starting anywhere from 7-10 years of age, develop what is commonly called self-awareness. Once self-awareness begins, the child begins to worry how their peers perceive them. As they continue physical & psychological maturation, this fixation on self-image, popularity and peer acceptance becomes their primary driving forces until they have finished college. Knowing your child will be experiencing these highly dramatic & emotionally charged events, you can use them to your advantage regarding their online activities. Instead of telling your child “NO,” educate them on how images and information we share online can last for years.
Just as rumors of friends spread, online rumors and embarrassing images can go “viral.” Directly connecting your child’s developmental fears to their online behaviors of disclosing information is an effective and natural Internet safety technique. When done in a kind, respectful way, this method for teaching your child to be cautious of sharing personal information can be highly effective.
10. Complete Parental Control? No Such Thing: With the trends of today’s online community and technological advancements, insulating your child from iPredators and keeping them safe online has ever been more challenging. Ranging from home computers to mobile digital technology, children have access and exposed to multiple forms of online activities and devices. Even if you use content blockers, filters, trackers or parental control software, children have ways to get around these if their heart and minds are set on engaging in high-risk online activities. If, like me, you are not a digital technology expert, it is best to rely on the professionals.
Prior to purchasing security software or hardware, contact a trusted source. In every community, someone either your friends or a colleague knows is a digital technology expert. Given the market is flooded with hundreds of products, services and methods, contact your local expert source and rely on their recommendations. Secondly, contact your phone and Internet service provider for what they recommend to protect your child.
I have provided you with a short, but thorough and effective Internet safety tips checklist to help reduce the chances your child becomes a target of online predators, cyberbullies and/or cyberstalkers. The Internet, digital technology and mobile devices will continue to influence all children as their peers, advertising and cultural trends place pressure upon them to have the latest smartphones and access to the most popular social networking sites.
If it has not happened already, I guarantee your child will approach you on numerous occasions pleading for the newest mobile device and/or wanting to join the growing number of social sites that will be in fashion in the future. The key to being a proactive parent is making the effort to learn about iPredators and Internet safety. The most important Internet safety advice to protect your child can be summed up in one statement as follows: An iPredator will always move on to other victims when a parent takes the time to be proactive, prepared and protective.
ONLINE PREDATOR PREVENTION CHECKLIST (OPPC)
The Online Predator Prevention Checklist (OPPC) is a 100-item data collection & educational tool available to take online or purchase for regular monitoring of your child’s online activities and as an educational tool. The OPPC was created by New York State licensed psychologist, Dr. Michael Nuccitelli, and designed to educate and collect data on a child, adolescent or young adult’s vulnerability and risk potential of being targeted, sexually solicited and/or victimized by online sexual predators.
The OPPC investigates areas developmentally relevant to a child and young adult, ages 11-21, which can increase their levels of vulnerability. These areas include sexuality, intimate partnerships, curiosity and motivation for peer group acceptance. In addition to being a data collection tool, the OPPC can also be used as an adjunct to allow teachers, educators and pediatric professionals to interview, collect data and engage in a dialogue with children in their ICT practices. The OPPC combines common factors causing children to be sexually solicited, harassed and targeted by online sexual predators.
The factors most problematic for children include inappropriate personal information disclosure, high-risk ICT behaviors and minimal iPredator awareness. As part of my Internet safety packet for parents, below are 20 statements taken from the OPPC to be used as a quick checklist with your child. They are as follows:
1. The child does not post or share sexual information online with peers or adults.
2. The child does not have unknown people on his/her “buddy” or “friends” list.
3. The child does not engage in viewing or downloading pornography online sent to them by online contacts.
4. As an Internet safety savvy parent, you know children who interact with online strangers and engage in other risky online behaviors are significantly more likely to receive aggressive sexual solicitations.
5. As an Internet safety savvy parent, you know teen females constitute a higher proportion of iPredator victims than teen males, but teen males who identify as gay or questioning their sexual orientations are at a much higher rate of online victimization.
7. As an Internet safety savvy parent, you know sexual solicitations are defined as requests to engage in sexual activities or sexual talk, or to give personal sexual information.
8. As an Internet safety savvy parent, you know to discourage your child from posting images, videos or other personal information on social networking sites is dangerous.
9. As an Internet safety savvy parent, you know the similarities and differences of the Child Molester & Pedophile and their online involvement patterns.
10. As an Internet safety savvy parent, you know the act of violence is rare in Internet initiated sex crimes.
11. As an Internet safety savvy parent, you know iPredators seek to develop relationships with their victims before they introduce sexual topics.
12. As an Internet safety savvy parent, you know iPredators use child pornography to groom and seduce children.
13. As an Internet safety savvy parent, you know to discourage your child from interacting with unknown adults online and refrain from sending photographs or webcam screen shots for any reason.
14. As an Internet safety savvy parent, you know a sexual relationship between an adult and underage adolescent is criminal, against the law and dangerous.
15. As an Internet safety savvy parent, you are proactive in helping your child feel accepted and loved reducing their chances of being targeted by iPredators.
16. As an Internet safety savvy parent, you are proactive in focusing on developmental concerns relevant to your child, including independence, sexuality and romance.
17. As an Internet safety savvy parent, you are proactive in focusing on sexual feelings, urges and curiosity that are paramount to a child.
18. As an Internet safety savvy parent, you educate your child if developmentally appropriate, about the dynamics of child molesters, pedophiles, their online tactics and other non-forcible sex crimes.
19. As an Internet safety savvy parent, you educate your child if developmentally appropriate, that it is normal to have strong sexual feelings, but wrong for adults to exploit those feelings in children and teens.
20. As an Internet safety savvy parent, you educate your child, if developmentally appropriate, about the criminal nature of many aggressive sexual solicitations offline and online.
(CLICK IMAGE TO VISIT SITE)
FACTORS IPREDATORS INVESTIGATE TO TARGET A CHILD
Internet safety & cyber security is vital to all online users and below is a list of factors sought by iPredators searching for their next child target. Just as classic criminals can “case” a home or choose the most vulnerable child to abduct, the iPredator is able to do the same using information they compile from a variety of online sources and contacts.
iPredator is a global term used to distinguish all online users who engage in criminal, deviant or abusive behaviors using Information and Communications Technology. Whether the offender is a cyberbully, cyberstalker, cyber criminal, online sexual predator, Internet troll or cyber terrorist, they fall within the scope of iPredator.
Cyberstealth: Cyberstealth, a concept formulated along with iPredator, is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology (ICT), if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Given the Internet inherently affords everyone’s anonymity, Cyberstealth used by iPredators range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind parents and all online users the primary intent fueling iPredators. This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.
Therefore, as the Internet naturally offers all ICT users’ anonymity if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable. Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition (IVI.)
By using Cyberstealth, an iPredator’s IVI is their aptitude to sense a child’s online vulnerabilities, weaknesses and technological limitations increasing their success with minimal ramifications. The methods iPredators use in their Cyberstealth strategies to hone in on and choose a child target are as follows:
1. The amount of personal information your child discloses online.
2. The frequency your child discloses their contact information online.
3. The content of the information your child discloses online.
4. The lack of Internet safety measures your child institutes online.
5. Your child’s willingness to discuss sensitive issues online. These issues include sexual topics, financial information, their physical location, parental or adult monitoring of their online activities, experiences of distress at home, work, school and interpersonal or intrapersonal issues.
6. The amount of time your child spends online.
7. The type of information your child discloses on their social networking profiles (i.e. Facebook, MySpace, MyYearbook, LinkedIn.)
8. Your child’s offline demeanor communicated online leading the iPredator to conclude your child will be an easy target.
9. The non-response or lack of assertive confrontation by your child or you to respond to negative information by posted by your child or sent to your child.
10. Your child’s probability of not having social system support, legal/law enforcement support or knowledge of intervention strategies if cyber attacked that are communicated online.
11. The quantity and themes of images and/or videos your child shares online.
12. The pattern of “likes” and “dislikes” your child discloses on their social networking site profiles.
13. The frequency your child changes their profile images and information on their social networking profiles.
14. The images and/or videos showing your child’s economic status, the layout of their residence or their material objects they or you own.
15. The images, videos and posts related to your child’s choice of material objects available for public consumption.
16. The images, videos and posts related to your child’s lifestyle available for public consumption.
17. The images, videos and posts related to your child’s needs and desires available for public consumption.
18. The images, videos and posts suggesting your child is suffering from psychological and/or psychosocial dysfunction.
19. Your child’s behavioral patterns regarding their mobile devices and how often they access and use mobile device applications.
20. Your child’s behavioral patterns and interactions when engaged in interactive gaming.
Although there are other factors an iPredator uses in their repertoire to locate and target a victim, the eighteen factors listed are recommended to evaluate by all online users to reduce their chances of becoming an iPredator target.
The Internet safety tips for parents provided in this packet are vital to learn and should be applied at all times during your child’s year. Even though the back to school timeline is particularly important for practicing Internet safety and cyber security, protecting your child from iPredators is a year round endeavor. Think of the Internet, cyberspace and all the digital devices your child uses daily as both a beneficial tool for learning and an instrument requiring a cautious approach.
Never forget the Internet is a mere child celebrating its 20th birthday in 2011. From a communications standpoint, compared to all other forms of communicating, Information and Communications Technology and the Internet are infants taking their first steps.
It is not necessary to be as technologically advanced as your child is as it is to be aware that iPredators lurk in cyberspace. Awareness of information technology, the Internet, Internet culture and how your child’s developmental and psychological states affect their interactions online begins with an inquisitive approach.
Whether you think you are positive what your child does and does not do online has no relationship to what iPredators have in mind. Asking your child questions, offering your child advice, educating your child and regularly engaging in discussions with your friends, loved one and peers all build an Internet safety strategy few iPredators can penetrate.
The Information Age is here to stay for decades to come and your children are enveloped by electronic devices. Since this is the reality of our society, it is both vital and mandatory to spend a little time learning what it means to be a child growing in an information technology environment.
“The important thing is not to stop questioning. Curiosity has its own reason for existing.” Albert Einstein (1879-1955)
In order to effectively educate, evaluate, investigate or advise any Information and Communications Technology (ICT) user on Internet safety, whether they are a child, adult, group or business, it is paramount to grasp the basic concepts and terms vital to all ICT users. The importance of ICT and the Internet to humanity is different to everyone and as unique as a fingerprint.
For some, ICT and the Internet are nothing more than tools of convenience for conducting mundane tasks. For others, their social, scholastic, business and/or financial affairs disclosed online are crucial to their life functioning, self-esteem, self-worth, success and perceptual world. In an abstract way, ICT and the Internet are extensions of the human mind, but made available to all who engage in benevolent & malevolent activities.
iPredator Inc. was founded in September 2011 to provide educational and advisory products & services to consumers and organizations on Cyber Bullying, Cyber Harassment, Cyber Stalking, Cyber Crime, Internet Defamation, Cyber Terrorism, Online Sexual Predators and the new field they are developing termed, Information and Communications Technology (ICT) Psychology. Created by a NYS licensed psychologist and certified forensic consultant, Dr. Michael Nuccitelli, their goal is to reduce victimization, theft and disparagement from online assailants.
In addition to assisting citizens, iPredator Inc.’s mission is to initiate a national educational & awareness campaign with the help of private, state, and federal agencies. Dr. Nuccitelli can be reached at DrNucc@iPredatorInc.com. iPredator Inc.’s criminal psychology & forensics blog can be viewed at www.DarkPsychology.co and their website, www.iPredator.co, offers site visitors an enormous database on Cyber Criminal Psychology, Internet Safety and iPredators. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit their social sites planned to be their major information and announcement vehicles.
- Facebook: The iPredator
- Google +: The iPredator
- Linked In: iPredator
- Twitter: TheiPredator
- YouTube: iPredator Team
For online users seeking Internet and cyber attack protection, feel free to read about iPredator Inc.’s innovative advisory based membership service called, iPredator Protected. With the growth and expansion of social media, Dr. Nuccitelli and iPredator Inc. offers a unique assessment service called the iPredator Facebook Safety Analysis
In addition to offering advice, education and investigation, Dr. Nuccitelli has designed 13 internet safety & cyber attack risk prevention checklists (IISC-ABR) that are abridged and inexpensive to purchase. The full version internet safety tools, 26 checklists and inventories (IISC & IPI Collection) can be purchased and include the full scoring keys, internet safety factors and scoring categories. All of Dr. Nuccitelli’s checklists and inventories were designed for assessment, education and prevention education (IISC & IPI Collection Overview.)
by Michael Nuccitelli, Psy.D.