Logo

did you know?

an online safety guide for parents

Parents are not talking with their children enough about their digital activity.

46

Minutes

Throughout a child’s entire life, parents spend on average only 46 minutes talking about online safety to their children.

(Online Safety Report by Kaspersky, 2019)

How many hours do you think children and teens

spend on average watching or using screens each day?

Ages 8-12

clock 1

Teens

clock 1

Children ages 8-12 in the United States spend 4-6 hours a day on average watching or using screens, and teens spend up to 9 hours.

American Academy of Child and Adolescent Psychiatry, 2020

All of this time online and lack of education leaves them exposed.

1 in 9 children receive online sexual solicitation and are approached online.

Foundation United

1 in 7 minors are asked for nudes by a stranger online daily or weekly.

Thorn

In 2021 alone, 29,309,106 reports were made of apparent child sexual abuse material (CSAM) and 84,991,735 child sexual abuse files were reviewed by NCMEC.

National Center for Missing and Exploited Children

Roughly 1 in 5 parents of a child younger than 12 say their child has their own smartphone.

Pew Research Center

Two thirds of parents in the U.S. say parenting is harder today than it was 20 years ago, with many citing technology — like social media or smartphones — as a reason.

Pew Research Center

What is online grooming?

Whatever issues a child may be experiencing, the offender will pretend to be going through the same thing or share specific knowledge about that issue. It may be body image issues, parents divorcing, recent death of a loved one or friend, or bullying.

quotes
They look for victims that need someone or are going through a difficult time. They pretend to be their friend and understand what they are going through. But, the predator’s goal is to establish trust in order to manipulate and gain control over their victims.”
- O.U.R. Undercover Operator, former Internet Crimes Against Children (ICAC) Investigator

Grooming (noun) /’gro͞omiNG/

is the process where an offender builds a relationship, trust and emotional connection with a child or teen so they can manipulate, exploit and abuse them.

- nspcc.org.uk

Preventing grooming can’t be done through a single conversation, by telling kids “don’t”, or by just restricting access to technology.


Remember, grooming can look a lot like making a good friend—it might not be clear it’s happening for a long period of time, especially from a child’s perspective.

Discipline
Selfie

It’s important to know that a predator’s objective may be to meet your child face-to-face in order to exploit them.


However, some predators keep the relationship only online. They use different tactics to convince the child to engage in a sexual act, whether that be sharing sexual images or engaging in sexual activity on a video call.

Child sex predators can be someone familiar or a complete stranger. They may be male or female. They often disguise their identity and age behind fake online profiles.


They target any age, gender, and social or cultural background.

People
Pressure

It may be difficult for children to understand that there are people using disguises online. An older man may pretend to be someone their age or someone that goes to a nearby school.


Even if a child knows they are communicating with an adult, the age gap may instill fear into the child to comply with the predator’s requests. Some predators start by enticing a child to share personal information, and then later use it against the child to coerce them into sexual activity.

Grooming is a process that can take place over the course of just a few hours, or several years.


A groomer will create profiles on apps and games that children use in order to gain their trust and build a friendship. Conversation often starts through comments, direct messages or chatrooms.

People
Pressure

If initial contact begins on a public comment or forum, a predator will likely to try to contact the child in a direct message next.


Part of the grooming process is isolating the child or teen in a private online space, and then slowly working to manipulate or force them into engaging in a sexual act.

Online Grooming Red Flags

UNKNOWN ADULTS COMMENTING ON TEEN SOCIAL MEDIA POSTS

LEARN MORE

HAVING LITTLE TO NO SOCIAL MEDIA PHOTOS OR FOLLOWERS

LEARN MORE

ADULTS ACTING AS A MENTOR OR COACH

LEARN MORE

PRETENDING TO BE AN AUTHORITY FIGURE OR CELEBRITY

LEARN MORE

GIVING ATTENTION AND SHOWING UNDERSTANDING

LEARN MORE

REQUESTING SECRECY OR SWITCHING CONVERSATION TO ANOTHER APP

LEARN MORE

OFFERING GIFTS OR EXTRAVAGANT TRIPS

LEARN MORE

PEER RECRUITING

Predators will use peers or minors close to their target’s age and or gender to act as an assistant to the predator, to bring others into ‘the life’.


They seem nice, popular, rich, helpful. They will introduce children to individuals who exhibit some of these same characteristics.

LEARN MORE

OFFERING A JOB THAT SEEMS TOO GOOD TO BE TRUE

LEARN MORE

Signs of Online Abuse

There are numerous warning signs that can be an indicator of online sexual exploitation or trafficking. It is important to look at the totality of the circumstances, as a single indicator on its own may not be enough to warrant concern. As always, it is best to err on the side of caution when trying to determine if an individual is in danger. There are physical warning signs, verbal warning signs, emotional warning signs, and behavioral warning signs. Some are easier to spot than others, and some are indicative of more imminent danger than others, but all are equally important to be aware of.

How To Identify a Fake Account

1. Friends Check

clock 1
Social media was designed for social interaction. Make sure the profile has a normal number of friends or followers. Profiles with under 100 friends are highly suspicious, especially if the account allegedly belongs to a teen.

2. Photo Check

no photo
no photo 2
fake profile
Profiles without a profile photo are almost always spam or fake accounts. Profiles with no photos or only a few posted photos of themselves in social situations should raise your alarm.

3. Status Check

clock 1

Source: Financial Times

Profiles with minimal status updates or comments should be looked at as suspicious accounts. Again, the purpose of social media is to be social. Having a private account is common. But accounts with whom you are “friends” with should show social interaction beyond just that profile and your profile, or your child’s profile. If there is only isolated interaction, then it is likely that account was created solely for interaction with you or your child.

4. Surname Check

friends
If an account’s “friends” list is visible, check for other “friends” with the same last name of the account holder (if known). If the account holder does not have connections with other people using the same last name, it may be a fake account.

5. Birthday Check

Many social media networks allow you to search posts for a specific profile. For instance, Facebook has a “search” function which is visible from most profiles once you navigate to their main page and click on “search profile”. One of the most common social interactions is birthdays. Simply typing in “Happy Birthday” or “HBD” should bring up all posts and/or comments related to birthdays. (This search capability can be disabled by users.)

6. Reverse Image Check

tim 1
tim 2tim 3
If a profile has only a few photos or you feel as though the account may be suspicious or fake, a quick reverse image search of some of the photos may be useful. This can be done by downloading or saving the published photos. Once saved, navigate to www.google.com/imghp. This is Google’s Image Search.
Drag the photo into the google search bar or click the “browse” button and navigate to the saved photo. Within seconds, google will return results if that photo is found elsewhere on the internet. If the photo is visible on other accounts using a different name or appears to be from a commercial website, the profile is most likely a fake account.

7. Username Check

Profile names and account usernames can be different. For instance, Facebook allows users to create a “vanity URL” for their page if they desire. If a vanity URL is created the profile page might display the name “John Smith” but the account's official username may be “johnny.davis.0001”. This can easily be identified by checking the URL or web address of the profile page visible in your internet browser (www.Facebook.com/johnny.davis.0001).
This is similar for other social media networks. Users can display a name on their profile, but their actual account username may differ. Once an account's unique username is identified, a quick Google search of that username may lead you to other social media accounts or to comments/complaints related to suspicious activity. When searching usernames on Google be sure to place the username within quotes (“username.123” or “@username.123”) depending on the social media network. Discrepancies with usernames often indicate a fake account.
Here is an example of a Facebook account pretending to be a real person, by using someone else’s photo and name.

Chapter 6:

Online Privacy + Relationships