Is My Child
By: Michael Ryan
Thankfully, the answer is:
Most children use the internet to socialize with friends and pursue budding interests. They manage to steer clear of the dangerous predators lurking in chat rooms and other forums who slyly manipulate their way into electronic networks of school-age friends to find and groom the next vulnerable child for future exploitation.
While most children are safe on the internet, as you read these words some are in danger.
Is your child one of these unfortunate few?
How would you know before it is too late?
If you want your loved ones to have a great smile that lasts a lifetime,
start them off right, flossing good and eating light.
Reading this FREE book will give you a head start.
|Given the risks, parents cannot feel secure with the mere probability their child will be safe. Even "good" or "smart" children are still just children and make, or can be induced to make, bad decisions with tragic consequences. Short of physically being present during your child's every encounter with the internet, there is no way for a parent to be 100% sure their child has not been contacted by a predator. Parents need to know the characteristics of typical victims, the warning signs a predator has entered your child's life, and steps they can take to protect their children. |
Characteristics of typical victims:
* Most but not all victims are between the age of 12 and 15 years old.
* Most victims have an instant message account (most kids do) but have not set up privacy or security settings to block strangers and, in fact, willingly engage in conversations with strangers.
* Most victims tend to live in suburban or rural towns.
* Most victims are very sheltered and na�ve, although a few are at the opposite extreme and willing to take very serious risks.
* Most victims tend to be loners with few offline friends. They are often looking for love and affection online. Many children contacted by predators believe they are communicating with someone around their own age, and not with an adult.
* Most victims tend to spend more than 90 minutes of non-homework time a day online, and are secretive about their internet activities. When you walk by, the screen often goes blank or windows are minimized.
* Most victims tend to have few activities outside of the internet.
Just because your child matches one or more of these characteristics does not mean they are being targeted by predators, nor is your child perfectly safe if they match none of these characteristics. In all circumstances, a parent should be ever vigilant and involved in their children's on-line activities.
Gum disease, gingivitis, or bleeding gums can cost a fortune if you let it go too long.
Learn how you can stop gum disease naturally.
|Warning signs your child is being contacted by a predator:|
* Phone calls. Are strange calls showing up on your phone bills? Don't assume you can pick out adults calling your children - a 35 year old can sound very much like a 15 year old if they want to.
* Gifts and packages arriving at your house. Many predators groom their victims by sending small gifts. Some predators have been known to send disposable cameras or web cameras for children to take pictures of themselves with.
* Secrecy. Teens are often secretive, and often it is a symptom of nothing more than their carving out an independent life for themselves. However, if your child is taking secrecy to an extreme, or has suddenly become more secretive than before, it is cause for concern.
* Trust your gut. If something doesn't feel right, it probably isn't. Predators are masters of manipulation. Unexplained and sudden changes in your child's mood or behavior may be a sign they are being manipulated in ways they are not comfortable with but are reluctant to talk about.
Leave A Legacy: Be Your Own Banker! Money you are already spending can make you rich, provide a stable income over your whole lifetime, and still leave millions of dollars for your heirs.
|Steps to protect your child:|
* Teach your child to not communicate online with people they have not physically met offline. This absolutely means friends of friends. Predators often infiltrate a network of child friends by finding the one weak link and using that person's trust to gain contact with others. Under no circumstances should a child meet in person someone they only know online - in most cases where a child is exploited, the child is conned or coerced into willingly meeting the predator offline
* Go through your child's list of internet buddies and have them tell you the real name of each person on the list.
* Review you child's home page or online profile. Make sure there is no personally identifiable information there, including photos, school name, or team names. Many predators keep detailed files on their targets and gather information over time from a variety of sources. Even seemingly innocuous information may prove harmful when combined with comments made weeks or months later. "I play catcher on my baseball team", "I went to a Red Sox game!", and "Big game against Bedford tomorrow - I hope we crush them!" can tell a predator their target probably lives in the Boston area and is playing baseball somewhere in Bedford the following afternoon. A quick Google search will show the public schools in Bedford and which ones have baseball games scheduled.
* If your child has been approached or harassed online, have them immediately delete their old account, pick a new username and start another. Do not let the harassment continue.
* Absolutely prohibit web-cams. Easy-to-use $20 Webcams instantly transmit high-quality continuous color video across the globe and are used by predators to exploit children.
* Most importantly, install keylogger or monitoring software on the computer used by your child( one vendor of such software is PCSentinel Software - www.pcsentinelsoftware.com ). There is no other way to be totally certain of what your child is doing online or who they are communicating with - and there is no other way of keeping 100% accurate records of what was said in the event your child is contacted by a predator. Even though it may feel like "spying" on your child, a parent has a responsibility to know with certainty who is in their child's life and keylogger software provides that certainty.
Michael Ryan owns and operates PCSentinel Software, developer of easy-to-use keylogger software like PCSentinel's Busted: Keylogger and Instant Message Monitor and PCSentinel's Red-Handed: Record Instant Messages!
Your Medical Care can be more affordable, and more accessible.
NOW is the time to share this information with every neighbor and form a neighborhood group that can help each other. Anarchy and riots could break out and law enforcement agencies may be operating sporadically if at all as we have witnessed in New Orleans.
How to Spot and STOP
Your Emergency Kit, and What Goes Into It:
We tend to expect things to go on as they always have. When we turn on the
faucet we expect water to gush out. When we turn on the lights we expect the room to
be illuminated. "That's the way it's always been." Unfortunately ----
Sometimes it seems like there is a lawyer in
every pot, but that is only until you actually need one. I think that's
because when you actually need a lawyer you are totally focused on the need to
find a GOOD one. A friend of mine has just created a web site to help you find the best
attorneys in each area. Attorney-2-Win was founded so that Americans
attorneys, car accident lawyers, medical malpractice attorneys or real
estate lawyers have an online resource to consider their choice of legal
What to do when your health insurance claim is denied.
De-Stress Yourself -- without stress.
Until now medical alert systems for seniors were only available for use in and around the home. Independent seniors had no quick & easy way to call for assistance once they left the home. Now you can reach help from almost anywhere.
Protecting your right to
privacy on the web
Click HERE to
discover everything on this site.
The Role of the Sexual Assault Nurse Examiner
Find Out More About Everything Worth Insuring in Your Life