{"id":2266,"date":"2022-04-06T00:32:25","date_gmt":"2022-04-06T00:32:25","guid":{"rendered":"https:\/\/helpusdefend.com\/?page_id=2266"},"modified":"2022-04-11T23:50:37","modified_gmt":"2022-04-11T23:50:37","slug":"podcast-episode-11-companion","status":"publish","type":"page","link":"https:\/\/helpusdefend.com\/?page_id=2266","title":{"rendered":"Podcast &#8211; Episode 11 Companion"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2266\" class=\"elementor elementor-2266\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-848e357 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"848e357\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4692a61\" data-id=\"4692a61\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4429960 elementor-widget elementor-widget-wp-widget-media_audio\" data-id=\"4429960\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-media_audio.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5>Listen to this page! Narrated by Lilani<\/h5><audio class=\"wp-audio-shortcode\" id=\"audio-2266-1\" preload=\"none\" style=\"width: 100%;\" controls=\"controls\"><source type=\"audio\/mpeg\" src=\"https:\/\/helpusdefend.com\/wp-content\/uploads\/2022\/04\/episode-11-audio-companion.mp3?_=1\" \/><source type=\"audio\/mpeg\" src=\"https:\/\/helpusdefend.com\/wp-content\/uploads\/2022\/04\/episode-11-audio-companion.mp3?_=1\" \/><a href=\"https:\/\/helpusdefend.com\/wp-content\/uploads\/2022\/04\/episode-11-audio-companion.mp3\">https:\/\/helpusdefend.com\/wp-content\/uploads\/2022\/04\/episode-11-audio-companion.mp3<\/a><\/audio>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e73455 elementor-widget elementor-widget-text-editor\" data-id=\"0e73455\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div>Written by Deanna D.<\/div>\n\n<div>Updated April 5, 2022<\/div>\n<div>&nbsp;<\/div>\n<div><b>Episode background:<\/b> An online babysitter service (the fictional Rent-a-Sitter) provides more than just a babysitter. An online predator ring may be responsible for several babysitters listed, being used as a way to get trusted access to children.<\/div>\n<div>&nbsp;<\/div>\n<p dir=\"ltr\" style=\"line-height: 2.4; margin-top: 0pt; margin-bottom: 0pt;\"><b><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: #0e101a; background-color: transparent; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Child Sex Abuse Material (CSAM)<\/span><\/b><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> &#8211; Offenders who create, distribute and watch CSAM act under the belief they will not get caught and that non-offending caregivers and parents of the victims will never know or see what is happening to their children. The victim may appear cooperative, if only for a split second. If this is the case, it often means the victim is tricked or coaxed into performing an incidental inappropriate act captured in photos or on video. CSAM often is created when the victim is unaware of the recording. For instance, a child is changing, and a babysitter cunningly captures the moment on video or in photos. Other times, a criminal takes over a device\u2019s camera with malware then works diligently behind the scenes to capture incidental sexual material. The victim is completely unaware, or they are too young and do not understand the situation.&nbsp;&nbsp;<\/span><\/p>\n<div><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">&nbsp;<\/span><\/div>\n<div><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">In communities around the globe, survivors of CSAM and extortion live with the debilitating fear that the photos and\/or videos memorializing their sexual incident shared on the Internet will remain online forever for anyone to see. Many of these children are once more victimized as their images are shared again and again, often well into adulthood, even decades later. They constantly worry someone who has seen their images will recognize them in public.&nbsp;<\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">If the photos or video are permanently online, the distribution of material is never-ending. The reality is that the platforms individuals use daily to connect and share information, including social media, online gaming, apps and email, are continuously being used to collect and spread CSAM. It can be found in any online realm on many devices.<\/span><\/div>\n<p dir=\"ltr\" style=\"line-height: 2.4; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">&nbsp;<\/span><\/p>\n<p><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">It may seem like a glimmer of hope to hear about technological tools like the Canadian Centre for Child Protection\u2019s <i>Project Arachnid<\/i>, which has been developed to assist in detecting and removing inappropriate material on websites around the world.&nbsp; Regrettably, these efforts have had little-to-no impact as CSAM and exploitation reports have only been on the rise in the last few years. Memorializing and distributing the incident through images and videos creates additional layers of victimization and trauma.<\/span><\/p>\n<p><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; margin-top: 0pt; margin-bottom: 0pt;\"><b><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: #0e101a; background-color: transparent; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Online Scams<\/span><\/b><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> &#8211; Cyber-criminals are on the prowl for ways to scam people 24 hours a day, 7 days a week. They never stop. There is a very diverse range of scams that are in existence. Many frauds use a mix of methods to occur, including the internet and offline tactics. For example, in-person meetings, phone calls, or communications that trick the respondent into downloading malware via pop-ups are popular. Another rudimentary&nbsp; scam is when a buyer never receives the product even after paying for it, usually on websites like Ebay where social credibility is used.&nbsp; An individual may also hire a stranger, their services are rendered but the services are subordinate, or the provider fails to deliver on their obligations. So, always be cautious and question any suspicious or too-good-to-be-true activity whenever online. Cyber-criminals may use fake profiles and pose as service providers or go to extreme lengths to write false reviews to seem more legitimate.&nbsp;<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Criminals also use phishing emails, intimidating texts and robocalls, unbelievable online offers, contests or pop-ups. This is not an exhaustive list as new ways to trick people are constantly being invented. Most of the time, their goal is to get you to click on malware-infected links or attachments and share your personal or financial information so they can steal your identity or rob you. Sometimes cyber-criminals are not necessarily interested in your personal or financial information, but in taking over your device, its camera or looking for other things of value on it. Even well known sites, Craigslist and Sittercity, have criminals on them creating profiles and convincing the community members to render their services to care for our most vulnerable populations: seniors and children.&nbsp;<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">&nbsp;<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; margin-top: 0pt; margin-bottom: 0pt;\"><b><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: #0e101a; background-color: transparent; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Exploitation<\/span><\/b><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> &#8211; To obtain something of value selfishly for one\u2019s own ends, CSAM, by using one\u2019s authority and power is exploitation. Criminals groom their victims by giving them attention and manipulation. Asking the victim to be nice, to behave, to be silent and to trust the offender is very common. The criminal lies, if needed. Eventually, the victim is coaxed into performing sexualized acts on camera allowing the offender to capture the material. Hence, the criminals are nicknamed \u201cCapers.\u201d Once one sexually explicit photo is captured the criminal potentially uses blackmail or extortion to threaten the parents\/guardians that the photos will not be sold or distributed to other pedophiles for a price. The criminal can threaten to post the material online but for a fee does not carry out that threat. If they get an explicit picture or video, it is a win in the eyes of the offender. They can take the CSAM then watch, save and distribute it for profit. The victim may never know the criminal has gathered this material because they are na\u00efve, and permission or notice isn\u2019t required.<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">&nbsp;Ignoring the child\u2019s report<\/span><\/p>\n<div><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">&nbsp;<\/span><\/div>\n<div><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Child protection workers are guided by research in the field, to believe children and not ignore anything a child says or does that may be out of the ordinary or strange. Human intuition is usually correct. Additionally, professionals say to consult with the victim about the actions to be taken in an age-appropriate manner and let them know they are not to blame. Despite being blameless, sometimes the child is ignored by confidants, or the children fail to disclose the abuse because of a fear of retribution from the offender, anticipated angry responses from their non-offending parent\/guardian or the fear of police taking the offender to jail. Many schools and organizations present educational programs to students about CSAM to encourage disclosure. Most commonly what can determine whether a child discloses the identity of a perpetrator is the relationship the two have and the skill the perpetrator has at manipulating their victim.&nbsp;<\/span><\/div>\n<div><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">&nbsp;<\/span><\/div>\n<div><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Most of the time, the confidant is mainly the non-offending mother of sexually abused children. The mothers&#8217; responses are typically three-fold. They believe the child\u2019s disclosure, demonstrate emotional support and show disapproval of the perpetrator. Sadly, few take action to remove or report the offender. The last step of reporting and removal is more likely to occur if the confidant no longer resides with the offender and the pair gets divorced. For a mother to take action she must have the courage to stand up to the perpetrator, who is typically her male partner. If her partner tends to be violent, the mother&#8217;s fear can impact her ability to be supportive of a child who discloses. Conversely, if her partner is not violent, a mother may hesitate to act because it may result in negative consequences: her partner becoming alienated, leaving the home, or being arrested.&nbsp;<\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"><br><\/span><\/div>\n<div><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">&nbsp;<\/span><\/div>\n<div><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Finally, a couple of important points to consider; Support is associated with the well-being of abused children. Those who received support from adults on whom they were dependent are assessed as less disturbed emotionally and behaviorally than those who did not have such support. Support can certainly help victims. Another interesting finding to note is that in forensic interviews between authorities and children, older children were more likely to generate labels themselves during questioning and most children generated at least one label. In 66% of the cases, interviewers ignored or replaced children&#8217;s labels. To the investigator\u2019s detriment when they did so, children reported significantly fewer details of an abusive episode. The study shows children were highly responsive to the interviewers&#8217; language style.&nbsp;&nbsp;<\/span><\/div>\n<p><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">&nbsp;<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; margin-top: 0pt; margin-bottom: 0pt;\"><u><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: #0e101a; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; vertical-align: baseline; white-space: pre-wrap;\">Advice for Parents and Caregivers<\/span><\/u><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; margin-top: 0pt; margin-bottom: 0pt;\"><b><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: #0e101a; background-color: transparent; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Communicate Openly<\/span> <\/b><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Appropriately discuss with children that bad people sometimes use mobile phone cameras to take photos and videos they should not take of kids. Sometimes <\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">bad<\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> photos can have detrimental consequences on their well-being. Parents and guardians need to build a comfort level with their children to discuss modern-day issues. Ideally, a child would go to their parents or guardians if they are uncomfortable with any interaction that involves photos or video.&nbsp;<\/span><\/p>\n<p><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; margin-top: 0pt; margin-bottom: 0pt;\"><b><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: #0e101a; background-color: transparent; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Show support<\/span><\/b><\/p>\n<p><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Be reassuring and compassionate, thus, believe the child\u2019s disclosure, demonstrate emotional support, show disapproval of the perpetrator and take action to remove or report the offender. Remember research indicates support helps a child\u2019s well-being.&nbsp;<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; margin-top: 0pt; margin-bottom: 0pt;\"><b><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: #0e101a; background-color: transparent; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Avoid Oversharing and Maintain privacy<\/span><\/b><\/p>\n<p><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Children need to be careful and be instructed not to give out any identifying information such as an address or a phone number to strangers. Bad people may spend time grooming and building a relationship with a child. Then, as the relationship grows, they may exploit the child by capturing sexualized images of them in any manner they can. The young person is never to fulfil any inappropriate request.<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; margin-top: 0pt; margin-bottom: 0pt;\"><b><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: #0e101a; background-color: transparent; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Contact References<\/span><\/b><\/p>\n<p><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">If using a service booked online, reach out and (personally) talk to past clients of service providers. Be critical of online reviews and ratings. Remember that a scammer\u2019s job is to fool you in believing online lies, which can be easy or extremely elaborate.&nbsp;<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; margin-top: 0pt; margin-bottom: 0pt;\"><b><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: #0e101a; background-color: transparent; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Reach out to NCMEC or CCCP to help get images\/media removed<\/span><\/b><\/p>\n<p><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Both <a href=\"https:\/\/www.missingkids.org\" target=\"_blank\" rel=\"noopener\">NCMEC<\/a> (National Center for Missing and Exploited Children) and <a href=\"https:\/\/www.protectchildren.ca\" target=\"_blank\" rel=\"noopener\">CCCP<\/a> (Canadian Centre for Child Protection) run programs where they may act as a broker for requesting images be taken taken down. They run Cybertip in <a href=\"https:\/\/www.cybertip.ca\/en\/\" target=\"_blank\" rel=\"noopener\">Canada<\/a> and the <a href=\"https:\/\/report.cybertip.org\/\" target=\"_blank\" rel=\"noopener\">US<\/a>. These are clearinghouses for CSAM and other online harm reports regarding children. <\/span><\/p>\n<p><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; margin-top: 0pt; margin-bottom: 0pt;\"><b><u><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: #0e101a; background-color: transparent; font-style: normal; font-variant: normal; vertical-align: baseline; white-space: pre-wrap;\">Tips<\/span><\/u><\/b><\/p>\n<p><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Parents need to transform their digital literacy into digital fluency. Digital literacy is an understanding of how to use the tools and digital fluency is the ability to create something new with those tools<\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">.&nbsp;<\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Parents need the initiative to stay up to date or risk being blindsided. Mothers and fathers need to understand and oversee the internet and any emerging technology and not the children.&nbsp;<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; margin-top: 0pt; margin-bottom: 0pt;\"><u><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; vertical-align: baseline; white-space: pre-wrap;\">Parents should:<\/span><\/u><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; text-indent: 36pt; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Install and use parental control hardware and software correctly;<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; text-indent: 36pt; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Ensure security software in home computers and other technology gadgets are up to date;<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; text-indent: 36pt; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Ensure all privacy settings in devices used by children are set to the highest level;<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; text-indent: 36pt; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Find out what their kids are doing online;<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; text-indent: 36pt; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Get to know who their children are relating to online;<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; text-indent: 36pt; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Get to know and play online games with children;<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; text-indent: 36pt; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Learn about the new apps children have discovered; and,<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; text-indent: 36pt; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Teach children how to block suspicious users.<\/span><\/p>\n<p><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; margin-top: 0pt; margin-bottom: 0pt;\"><u><span style=\"font-size: 11pt; font-family: Calibri, sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; vertical-align: baseline; white-space: pre-wrap;\">Also &#8211; set up basic rules:<\/span><\/u><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; margin-left: 36pt; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">-Parents must approve all technology gadgets, and apps their children are using&nbsp;<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; text-indent: 36pt; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">-Screen-time should not exceed 2 hours daily<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; text-indent: 36pt; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">-Elementary-aged kids should access the internet in the company of parents<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; text-indent: 36pt; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">-Kids should not hide and use technology in the bedroom and other places<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; text-indent: 36pt; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">-Parents can ban tech if abuse of technology occurs<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 2.4; text-indent: 36pt; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #0e101a; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">-Children must know why excess indulgence on the internet may expose them to online threats<\/span><\/p>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a5ccb6 elementor-widget elementor-widget-video\" data-id=\"6a5ccb6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=uXj7hRMc7pk&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5525d77 elementor-widget elementor-widget-text-editor\" data-id=\"5525d77\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"ltr\" style=\"line-height: 2.4; background-color: #ffffff; margin-top: 0pt; margin-bottom: 0pt; padding: 14pt 0pt 0pt 0pt;\">\u00a0<\/p><p dir=\"ltr\" style=\"line-height: 2.4; margin-top: 0pt; margin-bottom: 0pt;\">\u00a0<\/p><p dir=\"ltr\" style=\"line-height: 2.4; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: underline; -webkit-text-decoration-skip: none; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;\">References<\/span><\/p><p dir=\"ltr\" style=\"line-height: 2.4; text-indent: -14.2pt; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 0pt 14.2pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #000000; background-color: #ffffff; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Amuno, A. (17 February 2020). 4 parenting tips to help protect children against online sexual predators. Alpha &amp; Technology. https:\/\/parentingalpha.com\/4-parenting-tips-to-help-protect-children-against-online-sexual-predators\/<\/span><\/p><p dir=\"ltr\" style=\"line-height: 2.4; text-indent: -14.2pt; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 0pt 14.2pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #000000; background-color: #ffffff; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Brubacher, S. P., Malloy, L. C., Lamb, M. E., &amp; Roberts, K. P. (2013). How do interviewers and children discuss individual occurrences of alleged repeated abuse in forensic interviews? <\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #000000; background-color: #ffffff; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Applied cognitive psychology<\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #000000; background-color: #ffffff; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">,\u00a0<\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #000000; background-color: #ffffff; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">27<\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #000000; background-color: #ffffff; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">(4), 443-450.<\/span><\/p><p dir=\"ltr\" style=\"line-height: 2.4; text-indent: -14.2pt; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 0pt 14.2pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #222222; background-color: #ffffff; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Button, M., Nicholls, C. M., Kerr, J., &amp; Owen, R. (2014). Online frauds: Learning from victims why they fall for these scams.\u00a0<\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #222222; background-color: #ffffff; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Australian &amp; New Zealand journal of criminology<\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #222222; background-color: #ffffff; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">,\u00a0<\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #222222; background-color: #ffffff; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">47<\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #222222; background-color: #ffffff; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">(3), 391-408.<\/span><\/p><p dir=\"ltr\" style=\"line-height: 2.4; text-indent: -14.2pt; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 0pt 14.2pt;\"><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">National Center for Missing and Exploited Children. (n.d.). Child Sexual Abuse Material (CSAM): Overview. <\/span><span style=\"font-size: 11pt; font-family: Calibri,sans-serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">https:\/\/www.missingkids.org\/theissues\/csam<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Written by Deanna D. Updated April 5, 2022 &nbsp; Episode background: An online babysitter service (the fictional Rent-a-Sitter) provides more than just a babysitter. An online<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"wp_social_preview_title":"","wp_social_preview_description":"","wp_social_preview_image":0,"footnotes":""},"class_list":["post-2266","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/helpusdefend.com\/index.php?rest_route=\/wp\/v2\/pages\/2266","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/helpusdefend.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/helpusdefend.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/helpusdefend.com\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/helpusdefend.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2266"}],"version-history":[{"count":14,"href":"https:\/\/helpusdefend.com\/index.php?rest_route=\/wp\/v2\/pages\/2266\/revisions"}],"predecessor-version":[{"id":2352,"href":"https:\/\/helpusdefend.com\/index.php?rest_route=\/wp\/v2\/pages\/2266\/revisions\/2352"}],"wp:attachment":[{"href":"https:\/\/helpusdefend.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}