The Ultimate Evil

A Child Abuse Awareness Blog

Stalking Children – There’s An App For That

How many parents have smart phones and other mobile devices which contain apps their children play? How many children have iPods, iPads, iPhones, or other such devices that allow game applications using wifi or any form of connection to social interactions?

Are children safe using those Free or .99 app downloads? They download onto the device with a sweet little icon of a silly bird or pretty princess or some cartoon character that is a must-have for a young fan.

What could possibly be harmful about a game on a mobile device?

You’ve taken all the necessary precautions. Your child isn’t allowed to have Yahoo! messenger, Facebook, or any other social chat application, and they aren’t allowed to use the phone function. Perhaps they have a smart phone that is not connected for phone use, but the Wi-Fi works just fine so they can play their cool little games.

Well, what a lot of parents don’t know is that many of these seemingly harmless game apps contain in-game chat features. Game app hosts, such as Game Center, are even now demanding users agree to a new policy that allows everyone you are connected to in your game apps under their provider be sent your personal information — i.e. real name and location used in your iTunes billing. Game apps are more intrusive than they once were, and children are becoming easier targets than ever.

In addition to game apps with chat, there are various chat apps that range from free to costing several dollars. The most dangerous for children are the ones that ensure secrecy, such as TigerText. Some of these apps even have a disguised icon and can be hidden on the device. This is why parents should always, always check their accounts associated with the device their child uses. These accounts will list all downloads, including free ones. Examine all apps before allowing your child to use them by reading the description as well as user reviews.

This is an example of TigerText from an Android website:

It’s quite frightening when you think this could be a conversation between an 11 year old girl and a 30 year old man. “Erin” could very well be that 30 year old man. It doesn’t take much to steal photos and names with personal details from sites like flikr, Photobucket, and Facebook.

I received a private comment a few days ago by a terrified mom. She discovered her daughter had been in communications with an identity thief who had convinced her to divulge all of the family’s personal information, such as siblings’ names, parents’ names, birthdays, locations, and other private matters. This all took place through the chat feature of a game her daughter played on an iPhone with its phone service disabled.

It was bad enough to discover this grown man’s interactions with her very young daughter.  After seeking help from law enforcement, the mother learned this man had stolen the identity of a dead military man.

Perhaps this man isn’t a sexual predator. Perhaps he wasn’t seeking to do her daughter or other children physical harm.  This man is none-the-less an identity thief, one who could be using the open honesty of children to gather information to steal and sell private information to other identity thieves.

This mom and any parent in this situation has a right and a reason to be scared and angry. What they should not feel is hopeless. Unfortunately, the man committed no crime against this family by merely speaking to the girl, so the mother cannot receive official help as of yet. However, she is anything but helpless and this situation, though frightening and grim, is anything but hopeless.

This was my public response to her unpublished comment, relevant paragraphs only, to pass on my personal advice within this article:

Dear Devastated Parent:

[…]I need to first tell you that I am not an employee of any branch of law enforcement, nor am I qualified to give out legal advice. I am a volunteer who has worked side by side with LE.

That being said, I AM a parent and a concerned citizen and have every right to advise you on those terms.

If you still have access to chat messages and anything at all passed between them, take screen shots of them all. Do you know how to do that? Press the Home button at the bottom of the flat screen and the power button at the same time while on the page you wish to “photograph”.

Anything that was passed between them via chat can sometimes be saved to a file. I’m not sure what game this was or if it has the feature to save chats. Check it out.

It doesn’t matter if anyone tells you that you cannot be helped under whatever circumstance they give. Gathering the information in one nice neat pile as soon as possible and as it happens when possible will help when action is finally able to be taken (if it is needed).

Make sure any law enforcement officer you speak with gives you a case #. If they don’t provide you with one, tell them you want a file started on this immediately and you want the case number. In my experience, if you ask, they must open a file for you and add to it anytime you call them with another bit of information. I don’t know if this is true in all states, but it has been in ones I have been a part of. This way, there is an official jacket in the event this person tries to contact your child or your family. It adds up and shows a pattern they cannot deny in court.

As for safety concerns, I completely understand your fear. Do you still have access to the account? Did you or your daughter send this person a final message?

This is what I would do: I would send the person a message and inform them that the police have been made aware of their activity. I would tell them the police have screen shots and copies of everything, and that there is a report on file. Tell the person you have saved everything and are prepared to turn over the device and access to your account for the police to find them should they continue to try and contact your child or anyone in your family. (And yes, the FBI can do this if it comes down to it, and the FBI CAN and WILL become involved if this is occurring across state lines. Even inside the same state if necessary.). Tell them in no uncertain terms that they are never to contact your child again. Then leave it at that. Remove them from any account she has. If they try to be re-added, send that into the police for the file, as well. It goes to show contact/stalking of a minor against the parent’s wishes. Make sure you save a copy or a screen shot of the message you send the person. Don’t let your child back into the app, but you monitor it, yourself, to see if they try to contact her again.

[…]

PS: Also, iTunes has a Terms of Service area. Read through it and see if this person violated anything. Contact iTunes and tell them of this person, too, and provide them the username associated with the game. I’m not sure what they can do, if anything, but again, you will have a report out there about this person. And iTunes will now have a report about this person in the event they do it again. Quite possibly, this person has been reported to iTunes already. This could be cause for iTunes to contact the FBI or some other agency that can stop this person. You can call the iTunes office, as well, and inquire about what you can do and what they can do to better protect kids from this person.

[…]

After leaving this comment, I went in search of various ways parents can better monitor their children’s activities on their mobile devices.  We cannot stop the predators from their attempts to reach our children in these ways, but we have all the power on our end to stop them from succeeding. Short of not giving a child such a device to begin with, there are other ways to monitor what they do and with whom they communicate.

MobiStealth – Parental Control and Monitoring Software    The information for this says it is for Android, but I found that it can be purchased for most mobile phones. There are several separate features that can be purchased, as well, which include but are not restricted to tracking text messages and phone calls, location of the device, web and picture history, and reverse look-up for unfamiliar numbers that have called the device.

Mobile-Spy Software for Smartphones    This does the same as above but seems to be compatible with more devices.

Spy Phone Apps   This is a website that lists several other choices in mobile monitoring technology.

(I do want to mention that it appears there are other reasons someone may want to install such software into a mobile device, some possibly nefarious. I was somewhat shocked at the capabilities of these items, and it compels me to post this warning to all readers that although these can be useful tools in protecting children and keeping ones personal property safe, they can, also, be used to spy on innocent adults and even victims of domestic violence. I am quite sure stalkers can put this to good use, as well, especially boyfriends and girlfriends in teen dating abuse situations.)

In the event you feel this is invading a child’s personal space and in some way showing them you don’t trust them, and this somehow bothers you, you need to remember they are children. There should never be an issue of invasion of privacy when ensuring your child’s safety. The relationship between a parent and a child is one of protector and protected, defender and defended. We are parents first before anything else, and friend only after our parental duties are met. If you have a problem distinguishing this, you should visit your local police department and view the hundreds of files of juvenile cases, both victim and perpetrator, stemming from parental neglect. And make no mistake. Refusing to do everything you can to protect your child from the very real dangers we know are in this world is neglect.

We cannot protect our children from everything, but we don’t have to make it easy for predators, either. These people go for easy targets first and tend to pass up those with attentive and safety-conscious parents and care-givers. Don’t let your child be an easy target by leaving the window wide open. You wouldn’t walk up to a stranger and hand them the keys to your house. Don’t hand a predator the key to your child.

(Among others, I am tagging this article under Grooming Techniques because game chat is a popular new way of grooming children.)

May 16, 2011 Posted by | Dangerous Trends, Grooming Techniques, Internet Safety, Sexting, What Makes a child a Target | Leave a comment

Learning The Hard Way About Internet Predators

(This post is part of a 2-Part special post on internet safety. Part 2 is below.)

So, you have it all figured out, right? You have all the blockers on your computer, have had talk after talk, after talk with your child about the dangers on the internet, maybe have even shown your son or daughter news clippings or television shows exposing the truth about the online predator on the other end of chat.

Have you ever seen those expose specials where the undercover reporter poses as a guy who lost his dog and gets little kids to follow him for their parents to witness via hidden camera? Or when they leave a very real looking toy gun in a room with a group of kids and hidden cameras to show parents just how willing their child is to pick up an unattended firearm and accidentally kill their sibling/neighbor/best friend?

Believing your children are safe from online predators when not under your watchful eye just because you gave them rules has the same result.

I was sent a story this week by a very internet danger-savy mom who had such a terrifying experience with her then-14 year old and an online predator who wasn’t as distant as the daughter believed. She has permitted me to post her daughter’s story to help other parents and kids be aware of just how real the online dangers are.

Just because you think they are miles away and couldn’t harm you in person, it doesn’t make it true. It only shows just how little you or your child knows about technology and how determined predators are to get to their intended victim.

My daughter thought I was just awful because I limited her time on the internet and secured it with parental controls. As well, I monitored all the places she visited and she thought I was just horrible. According to her, “I was the ONLY parent that did this”. I strongly believe in monitoring our children, on the internet, in order to protect them from predators at all costs. Here is why. This is a true and very scary story. You just never know who is really behind a key board and what their intentions are. The internet is a Predators playground with access to so many vulnerable children. They know children are trusting…that’s the saddest part of it all.

I have a very beautiful daughter. At the time, she was 14-years old and boy crazy! Her name is “Kristy”. She went home with a friend of hers after school one day. I knew her parents and the friend and all of them were very good people. We all wanted to see our kids protected.

On this particular day, the parents weren’t due home until about 30-minutes after the girls got there. They decided to hop on the internet and talk with their latest “cute boy”. He was very handsome and 14-years old. He told the girls how pretty they were and over a few days, got them to send him pictures, and personal information, including the town they lived in and the school they attended. They were smart enough not to give out their home address or phone numbers. They thought….they really did think they were being “careful”.

About 25 minutes into them chatting with this cute 14-year old boy, there was a knock on the door. Being the trusting gals they were, they opened the door, only to find a 30-year old man standing there. I will call him “Clark” . “Clark” proceeded to invite himself in, past the girls, even though they told him “no”. He had told them he was the one that had been chatting with them online for the last 25 minutes. They thought he was behind the PC at his house. He was indeed, behind the wheel of his car, chatting over his phone on the internet. Little known to the 2 girls, he was on their way to their house, in his car, and not at all behind his desk at home. He was not 14-years old, and he was not a handsome boy. He was a predator that had set out to harm these two girls. He had taken what personal information they thought was just harmless chatting and tracked them down to the address where they were. This still makes my hair stand on end…

As he pushed his way past the girls into the house, they started screaming. Thankfully, it took 5 minutes of flustering, before the man began to come after the girls, fully intending to do harm. Their parents were THANKFULLY just pulling into the driveway and heard the girls screaming and ran into the house. Also, thankfully, they rescued the girls and had the man apprehended by the police after he fled the scene.

It turned out, that this man was a convicted child molester, and the girls were his next 2 victims. There is no telling what may have happened to them, if there parents were just 15 minutes late getting home that night from work. Thankfully, he was put behind bars and the girls were INCREDIBLY lucky. He had all the cool talk and teenage lingo down pat. He knew just how to lure the girls in and make it seem like harmless chatting. He was a professional at doing this and did it well.

I thank God often that the two of them were unharmed physically. It did leave emotional scars on them both that they still are overcoming. But? Today, my daughter has a daughter. And, I can tell you, she has her internet fully locked down and her daughter highly monitored. It took this very close call for my daughter to understand why I did what I did. I am thankful, it was a close call and not an event that could have scarred her for life, or worse, taken her from me.

If you have children, please continue protecting them. YOU are the ONLY thing in between them and the thousands of sick predators out there. No matter how mean she may think you are, YOU are doing the right thing Mom. Keep on doing it! Share it with other parents and encourage them to also monitor their childs internet time. The world is just way too full of sick adults that prey on our children and the internet is a prime playground for it.

Did you know this? Type in your phone number onto google. Chances are….? It gives the address straight to your house, which can then be traced on MapQuest for directions. Way too scary! The internet makes it too easy for our children to become unsuspecting victims.

*names have been changed


Two very important points were made in this post: 1. Children have access to the internet in more ways than just home, and 2. The multiple ways predators have of gaining personal information from even the most innocent of circumstances.

INTERNET ACCESS

A. Friend’s House/School

Just how much internet monitoring does your child’s friend’s parents do in their home? Just because you are a danger-conscious parent doesn’t mean others are.

There are, sadly, quite a number of parents who think such monitoring is an invasion of their child’s privacy. They treat their sons and daughters like tax paying citizens rather than dependents who need parents, not friends, to guide them in life and keep them safe from harm.  There are many kids who are allowed to shut their bedroom door and browse the net freely at all hours. Their parents even knock on the door and when told to go away, “obey” rather than check out the situation.

Time and time again, the FBI’s internet crimes and innocent images task force and law enforcement’s local efforts, including McGruff the Crime Dog visits, warn parents about the dangers of allowing a child to have unencumbered access to the internet in his or her own room. And time and time again, they are ignored. This is where victims come from.

The next time your child says they are going to their friend’s house, why not go with them and check out the environment into which you are sending them?  They are your responsibility, and you chose that duty when you chose to bring them into this world. Children are curious creatures. It is how we learn about ourselves and life. It is up to us to protect them from the snakes and bears along the path.

Also, this time of year is a good time to point out the computer labs at schools. Do not think for a moment that just because the computer is in school, your child is safe!

I have been in elementary and grade schools where the internet system in the computer labs were completely locked down unless a teacher was there to monitor, and then only certain websites could be accessed.  Unfortunately, I have been in elementary and grade schools where the computer labs were always accessible to students of all ages without the supervision of teachers and with complete access to the internet.

After being permitted to investigate the activity of students online in these more liberal-use environments, I found multiple adult websites in the hard drive’s history, accounts of young students for dangerous sites for pedophile and violent activity like Chan and New Ground, Facebook/MySpace/etc.. profiles of students that their parents didn’t know they had — complete with photos of themselves, the school, their siblings, and other students and names of all…

Therefore, not only was this an issue for the students with such accounts, this also affected other students whose parents believed their children were safe because they didn’t use the internet so carelessly. Children should be taught to never post images of themselves or others, that it isn’t their right to share information about other kids with anyone else.

When you walk through a school to determine where to send your child, ask about the internet service and the restrictions.  If there are no safeguards, explain to the principal/director why your child will not be a student there.

Once enrolled in a school where you feel safe, and even if your child has been a student the previous year, visit during the day to be sure such security measures are, in fact, in place.

Never let anyone tell you that you need an appointment to see your child. I am aware that some schools do not permit parents or guardians on premises during class time because they say it can be a disruption for their child; however, you’re their parent and barring any court ruling — i.e. divorce visitations — no one can keep you from seeing to their safety. If a school has such rules in place that you have to make an appointment and cannot visit the classroom without prior permission, seek education elsewhere. There is no good reason a school would have to keep a parent or other legal guardian from stopping by unannounced to look in on their child. Even if the principal or other employee needs to escort you to the classroom, which is understandable and should be respected, you should still be allowed to pop in to visit.

In my experience volunteering in both public and private schools, the only reason this was a mandatory rule was to keep parents unaware of unorthodox discipline routines and to hide a severe lacking in teaching skills going on in the classrooms.  Never pick a school that seems they have something to hide, especially when it includes keeping you from seeing your own child.

Another thing you’ll want to consider are cellphones that allow internet access. Your child may not have one but their friends or friends of friends may.

There is no 100% guarantee your child will never get online without your knowledge or consent, but you should do what you can with the access out there. Educating them is a valuable weapon for them to use to protect themselves.  Visiting sites like the FBI’s kid-friendly internet danger page, McGruff material on internet safety –which includes how to deal with cyber bullies and what to do when their friend is in trouble on the net — and speaking openly with them about predators goes a long way. Also, teaching a child about their self-worth goes a long way in preventing dangerous trends like sexting and giving their heart over to a stranger.

B. Giving Away Information, Even Without Realizing It

Have you ever participated in one of those social networking site “tagging” games?  You know, the ones that say, “Name your favorite desert…. How old were you when you had your first kiss? … Where do you live?…”  Did you know it is suspected that they were created by either sexual predators or identity thieves?  I’m not sure if there is any way to know exactly where they started, but we do know who has used them and for what: Identity theft, cyber stalking, and especially grooming by sexual predators — not just of children but of adults, as well.  Part 2 of this special Internet Predator post is below.  Please, take a moment to read through it and understand just why such “games” are perfect tools to access your children, and why someone like “Clark” is able to drive right up to the front door of their target.

The best way to avoid revealing personal information is to simply ignore such requests.

Would you walk into a prison yard full of rapists, serial killers, and kidnappers and give them each a handout with your full name, birthday, school or work information, telephone number, hometown, siblings names, pet names, interests, hobbies, etc…? And would you allow your child to do such a thing?  What is the difference when you don’t know who is really asking the questions, or who else may have access to the answers you give?

Do this: Type “pretty girl” or “cute boy” in your search engine and narrow it down for just “Images”.  You can copy any one of those into your computer, make a fake account on a social networking site, and use that photo to say it is you. Better still is if you find an entire album full of that user’s photos. This is how predators pretend to be who they are not.

Online predators steal the identities of careless people across the net posting their personal photos on photo sharing sites. Many times, the owners of the photos even have descriptions underneath that make it easy for the predator to tell a good story to back up their alias. They get your trust this way, by showing you they trust you enough to share all of this, and soon have you telling them all about your life, including how to track you down — even at the grocery store.

Look how many people post their daily activities in there status messages, Twitter, etc… Imagine someone you’ve trusted with all your other information trying to find the perfect time and place to grab you, or your child.

Never forget that grooming parents is what predators do when their target is closely monitored. You may think you are protecting your child by not revealing their information, and you may think the person you are speaking with is only after getting to know you. In reality, they may be going through you to get access to your child. This is what they do when you post your child’s photo as your avatar/profile photo.

It’s like window shopping. They see a pretty child as the profile photo of a parent who is, obviously, not wise to the dangers, and they know this person can be easily fooled into giving them all they need: access to family photos at the very least, information about their children found in blogs and comments and even the profile information section, family outings where the predator can watch from a distance, and private conversations about issues at home the predator can use to earn trust and an emotional bond to mom/dad.

Simply put, no one on the internet should ever be trusted with your personal information, and your child should be made aware of this and understand the dangers.

October 7, 2010 Posted by | Dangerous Trends, Grooming Techniques, Internet Safety, What Makes a child a Target | 1 Comment

Internet Predators And The Games They Play

(This post is part of a 2-Part special post on internet safety. Part 1 is above.)

“You’ve been tagged!”

We’ve all seen them. Maybe even received an invitation to participate. I am posting this article to expose them for what they are: Questionnaires for Sexual Predators. No matter who composed the games, online predators are reading kids’ answers and making note of them to find the right victims to harass, stalk, and someday assault.

Kids think they are having fun, sharing about themselves with people their own age just looking for a creative outlet and a place to find a cool friend. The truth of the matter is that this “friend” may actually be a sexual predator.

He has composed the best list of questions to find out the age of his intended target, the name, where they live, and how best to convince them he can be trusted through similar interests.

He has already made a lot of kids believe he is their age by using their language and posting images he stole from another kid’s photo hosting site, or maybe images of his child or niece, nephew, next door neighbor.

Now, he has a whole friends list full of children who believe he is also a child. He posts his “Tagging game” with what his friends believe to be honest answers. Then, he tags his friends. He will first tag the ones he is really interested in, but not too many. He knows the others will follow suit and play the game, or eventually get tagged with his game, themselves. All he has to do is sit back, wait and let his first few victims do the stalking for him.

Once he has what he needs, he will not just use this information for himself. He will pass on this information to other sexual predators so they can find these children, as well.

See, sexual predators don’t work alone. They have a network. They have “rings” of hundreds online and out in the walking world.

There are those members who will scout out the best places to find vulnerable children to take and molest, and pass on the lists of these places to pedophiles in the area.

There are members who visit playgrounds, parks, and school functions and take photographs of children to pass along to other pedophiles and sexual predators.

I have even seen a network where the man acts as a finder. He will take the images, post them on his site, and other pedophiles will tell him who they are interested in. He will either pass along or sell the information to them – like where the image was taken, if the child had any brothers or sisters, if the parents are observant or did they leave their child unattended, and in many cases, the photographer has the home address to give or sell the predator.

Tagging games make all of this much simpler. No work needed for a scout. All he has to do is pretend to be a child playing a game.

I have seen an alarming number of children give out all of their personal information to not only the person who tagged them, but also the entire internet to see. These kids don’t seem to have ever been taught not to give the entire world their full name, address, telephone number, parents’ names, so on and so forth. If someone online asks for this information, they are up to no good. Count on it!

Below are actual games I copied several months ago from a few different sites.  Mind you, not every question is sinister but are meant to make the game seem innocent.

TAG GAME 1:

1. Whats your full name?
2. Whats your age?
3. Height and weight, if known.
4. What is your species?
5. Do you believe in love?
6. Who do you love?
7. Name your best buddies.
8. At what date you were born?
9. Favorite Movies.
10. Do you consider yourself a sexy or cute person?
11. How would you describe yourself?(in a physical and psychological matter?)
12. Who do you hate?
13. What do you hate?
14. Do you think fashion is important in your life?
15. Where do you live?
16. What are your hobbies?
17. Tell us some secret that you have.
18. Favorite Foods.
19. Random Question. Do you think Spam tastes like human flesh?
20. Why did you take this quiz?

TAG GAME 2:

1. YOUR REAL NAME:
2. YOUR GANGSTA NAME: (first 3 letters of real name plus izzle.)
3. YOUR DETECTIVE NAME: (fav color and fav animal)
4. YOUR SOAP OPERA NAME: (middle name, and current street)
5. YOUR STAR WARS NAME: (the first 3 letters of your last name, first 2 letters of your first name, first 3 letters of mom’s maiden name)
6. YOUR SUPERHERO NAME: (2nd favorite color, favorite drink).
7. YOUR IRAQI NAME: (2nd letter of your first name, 3rd letter of your last name, any letter of your middle name, 2nd letter of your moms maiden name, 3rd letter of you dads middle name, 1st letter of a siblings first name, last letter of your moms middle name)
8. YOUR WITNESS PROTECTION NAME: (mothers middle name and fathers name.)
9. YOUR GOTH NAME: (black, and the name of one your pets)

TAGGING GAME 3:

1) Full name:
2) Male/Female:
3) Were you named after anyone?
4) Does your name mean anything?
5) Nickname(s):
6) What do you think you look like… name wise:
7) Date of birth:
8 ) Place of birth and current location:
9) Nationality:
10) Astrological sign:
11) Chinese astrology sign:
12) Religion:
13) What’s your favorite smell?
14) Political Position:
15) What do you prefer to drink in the morning:
16) Hair + eye color:
17) Do you look like anyone famous:
18) What do you look like?
19) Any unusual talents?:
20) Righty, lefty, or ambidextrous?:
21) Gay, straight, bi, or other?:
22) What do you do for a living?:
23) What do you do for fun?:
24) What are your favourite art materials to work with?:
25) What kind of materials would you like to work with?:
26) Have you met your grandparents?:
27) Boyfriend/Girlfriend:
28) Crush:
29) What celebrity would you date if you could?:
30) Current worries?:
31) Favourite online guy/girl(s):
32) Favourite place to be?:
33) Least favorite place to be?:
34) Do you burn or tan?:
35) Ever break a bone?:
36) What is your favourite cereal?:
37) Person you cry with:

Do you have…
38) Any sisters:
39) Any brothers:
40) Any pets:
41) An illness:
42) A pager:
43) A personal phone line:
44) A cell phone:
45) A visible birthmark:
46) A pool or hot tub:
47) A car:

Describe your…
48) Personality:
49) Driving:
50) Your clothing style:
51) Room:
52) What’s missing:
53) School:
54) Bed:
55) Relationship with your parent(s):
56) Do you believe in yourself?:
57) Do you believe in love at first sight?:
58) Consider yourself a good listener?:
59) Have a future dream that you would like to share?:
60) Get along with your parents?:
61) Save your e-mail conversations?:
62) Pray?:
63) Believe in reincarnation?:
64) Brush your teeth twice a day?:
65) Like to talk on the phone?:
66) Like to eat?:
67) Like to exercise?:
68) Like to watch sports?:
69) Sing in the car?:
70) What is a dream that you have all the time?:
71) Dream in colour?:
72) Do you have nightmares?:
73) Sleep with a stuffed animal?:
74) What’s right next to you?:
75) What’s on your favourite mug?:
76) What’s on your mouse pad?:
77) Your favourite flavour of gum:
78) Your brand of deodorant:
79) Your dream honeymoon spot:
80) Your dream husband/wife:
81) What’s hiding in your closet?:
82) Under your bed:
83) The name of one of your closest/best friends:
84) Your bad time of the day:
85) Your worst fear(s):
86) What’s the weather like:
87) Your favourite time of year?:
88) Your favourite holiday?:
89) A material weakness?:
90) The weirdest food or drink that you like:
91) At the top of your “to-do list”?:
92) The hardest thing about growing up:
93) A pet peeve?:
94) Your scariest moment:
95) Your attitude about love?:
96) The funniest or most desperate thing you’ve done to get the attention of the opposite sex?:
97) The worst feeling in the world:
98) The best feeling in the world:
99) Who sent this to you?:
100) 3 people you tag:

TAGGING GAME 4:

Name:
D.O.B.:
Location:
Religion:
Occupation:

APPEARANCE
Hair:
Eyes:
Height:

STYLE
Clothing:
Music:
Make-up:
Body art:

RIGHT NOW
Wearing:
Listening to:
Thinking of:

LAST THING YOU…
Bought:
Ate and drank:
Read:
Watched on TV:

EITHER/OR
Club or houseparty:
Tea or coffee:
Achiever or slacker:
Beer or cider:
Drinks or shots:
Cats or dogs:
Single or taken:
Pen or pencil:
Gloves or mittens:
Food or candy:
Cassette or cd:
Coke or Pepsi:

WHO DO YOU WANT TO…
Kill:
Hear from:
Get really wasted with:
Look like:
Be like:
Avoid:

LAST PERSON YOU… AND WHEN?
Touched:
Talked to:
Hugged:
Instant messaged:
Kissed:

WHERE DO YOU…
Eat:
Dance:
Cry:
Wish you were:

HAVE YOU EVER…
Dated one of your best friends:
Loved somebody so much it makes you cry:
Broken the law:
Ran away from home:
Broken a bone:
Cheated on a test:
Skinny dipped:
Played truth or dare:
Flashed someone:
Mooned someone:
Kissed someone you didn’t know:
Been on a talk/game show: nope
Been in a fight:
Ridden in a fire truck:
Been on a plane:
Come close to dying:
Cheated on your boy/girlfriend:
Gave someone a piggy back/shoulder ride:
Eaten a worm/mud pie:
Swam in the ocean:
Had a nightmare/dream that made you wake up:

WHAT IS…
The most embarrassing CD in your collection:
Your bedroom like?:
Your favorite thing for breakfast:
Your favorite thing for lunch:
Your favorite thing for dinner:
Your favorite Restaurant:

ARE YOU…
A Vegetarian:
A Good Student:
Good At Sports:
Good At Wakeboarding/Snowboarding:
A Good Singer:
A good Actor/Actress:
A deep sleeper:
A Good Dancer:
Shy:
Outgoing:
A good stoyteller:

TAGGING GAME 5:

1. Name:
2. Nickname:
3. Birthday:
4. Place of Birth:
5. Zodiac Sign:
6. Male or Female:
7. Education:
8. Schools you went to:
9. Occupation:
10. Residence:
11. Screen Names:

___Your Appearance___
12. Hair Colour:
13. Hair Length:
14. Eye colour:
15. Best Feature:
16. height:
17. Braces?:
18. Glasses?:
19. Piercing:
20. Tattoos:
21. Righty or Lefty:

___Your ‘Firsts’___
22. First best friend:
23. First Award:
24. First Sport You Joined: :
25. First Pet:
26. First Real Vacation:
27. First Concert:
28. First Love:

___ Favorites___
29. Movie:
30. TV Show:
31. Colour:
32. Rapper:
33. Band:
34. Song Right Now:
35. Friend:
36. Candy:
37. Sport to Play:
38. Restaurant:
39. Favorite brand to wear:
40. Store:
41. School Subject:
42. Animal:
43. Book:
44. Magazine:
45. Shoes:
46. alcoholic beverage:
47b. drug:
48b. article of clothing:
49b. website:
50b. video game:

___Currently___
46. Feeling: :
47. Single or Taken?:
49. Eating:
50. Drinking:
51. Typing:
52. Online?:
53. Listening To:
54. Thinking About:
55. Wanting To:
56. Watching:
57. Wearing:

__________Future__________
58. Want Kids? :
59. Want to be Married:
60. Careers in Mind:
61. Where do you want to live?:
62. Car:

__Which is Better With The Opposite Sex___
63. Hair colour:
64. Hair length:
65. Eye colour:
66. Measurements:
67. Cute or Sexy:
68. Lips or Eyes:
69. Hugs or Kisses:
70. Short or Tall:
71. Easygoing or serious:
72. Romantic or Spontaneous:
74. Sensitive or Loud:
75. Hook-up or Relationship:
77. Trouble Maker or Hesitant One:

___Have you ever______
78. Kissed a Stranger:
79. Had Alcohol:
80. Smoked:
81. Ran Away From Home:
82. Broken a bone:
85. Broken Someones Heart:
86. Broken Up With Someone:
87. Cried When Someone Died:
88. Cried At School:

___Do You Believe In___
89. God:
90. Miracles:
91. Love At First sight:
93. Aliens:
94. Soul Mates:
95. Heaven:
96. Hell:
98. Kissing on The First Date:
99. Horoscopes:

___Answer Truthfully___
100. Is there someone you want but you know you can’t have?

TAGGING GAME 6:

ANSWER TRUTHFULLY…

1. Sun or moon?:
2. Winter or Fall?:
3. Left or right?:
4. Sunny or rainy?:
6. Where do you live?: <——- (Right in the middle of innocent questions, so you’d answer without thought)
8. Do you want to get married?:
9. Do you twirl your spaghetti or cut it?:
10. Do You Cook?:
11. Current mood?:

TAGGING GAME 7:

(Note: This one is horribly wrong and serves several purposes for a predator:  1. Answers these questions: Is the target a prior victim?, Does the target have a problem with underage sex?, Is the target willing to lie to parents?, Can the target be easily coerced?; 2. Desensitizes or seeks to see how desensitized the target is to sex talk and violent sex, 3. Gets the target to talk about sex.  There were a lot of morbid questions on this one. I won’t post all of them as I will not advertise this filth. Here are the parts that suggest rape or child abuse:

It begins like this:

“Just read the ‘offense’ and if you’ve done it, you owe that fine.
Keep going until you’ve read each ‘offense’ and added up your total fine.
Title your response ‘My Bar Tab is$……..’
You don’t have to confess your answers, just the amount of your fine.”
…….
……

Had sex with someone under 21 and you are over 27 — $25
Been raped — $500
Have raped — $200
Had sex with some one under 16 — $300
Had someone come climb in your bedroom window for sex so your parents would not find out — $100
Slapped someone across the face while fucking them– $100
Fucked someone while they were crying– $300 ……”

By asking about breaking any laws or disobeying parents as most tagging games do, the predator is trying to find out of the child is someone willing to do things that won’t make their parents happy, willing to lie and protect bad people.

Of course, inquiring as to secret e-mails tells the predator if the child is good at keeping secrets and if the child likes sneaking around, has a devious personality that will make people not believe them should they ask for help, and has the ability to hide online activity from parents.

Tagging games can be fun. I’ve participated in them, myself. You cannot be ignorant, however, to the dangers on the internet.

Here are some general common sense rules to keep in mind when filling out anything or chatting with anyone online:

KIDS:

1. Never give out personal information on the Internet. Don’t share your real name, where you live, where you go to school or anything about your family. Not your birthday, place of birth, mother’s or father’s names, or pet’s name. In case of identity theft concerns, these are all security questions card companies ask to keep accounts safe from identity thieves. Such people will, also, prey on children. Not for sex but to get information the adults wouldn’t give that enables an identity thief access to financial accounts.

2. The person who claims he is a 13 year old from Cuba or Hawaii may very well be a 43 year old sex offender 10 miles from your house. You do not know who that other person is, and just because they say it, it doesn’t make it the truth.

3. Don’t agree to meet anyone you’ve talked to on line. Tell your parents if an on–line friend wants to get together. Suggesting to the friend that your parents join you will also help you find out if the person is real. If they make excuses why they can’t meet your parents, they have something to hide. Tell your parents right away and contact the police. You aren’t the only intended victim and you will save a lot more kids by speaking up.

4. If you fill out a personal profile that others can read online, don’t write anything that says too much about you. Even if it’s an online site set to private.

5. Don’t write back to flames (people who use bad language or want to get into an argument on line). Cyber bullies love this interaction and will continue to find ways to hurt you, even physically, especially if they get you to reveal a lot of personal information about yourself as you try to boast about your accomplishments to feel superior to the bully. It is nothing more than a mind game to get to you, and it’s a waste of your time as well as a possible danger.

6. Log off immediately if you see or read something that personally upsets you. Tell your parents or a teacher if something like that happens. You have every right to leave a chat or ignore any communication that tries to talk you into doing something you don’t like or in any way makes you feel uncomfortable. If someone gets angry with you for leaving the communication or blocking them, report them! A real friend would not do such a thing and you owe them nothing after they disrespected you.

7. Protect your password. No one should ever ask you for it for any reason.

8. Don’t tell your secrets to someone you just met and don’t know outside of the internet. Secrets can be used against you to know how far this person can go to hurt you. Secrets can also be used to blackmail you later from telling about something they say or do to you. If you need someone to talk to, make sure whatever you say is something you would feel comfortable for your parents to know if ever this person threatens to tell.

9. Never send pictures over the Internet.  You don’t know who will see them or what will be done with them, and there is no way of getting them back.

10. Let your parents know where you go online so they can make sure it isn’t a site set up to get information or hack your computer for your location. Only people with bad intentions have things to hide online.

PARENTS

1. Keep the computer in a family room, kitchen or another area where you can monitor its use. Having an internet hook up in your child’s room is neglectful and dangerous.

2. Limit your child’s time on line, just like you do their television viewing. They need a balance of activities in their lives, and the more they rely on the computer and internet as their entertainment, the more comfortable they will feel talking to strangers about anything.

3. Take time to teach your children how to use the computer and internet responsibly.

4. Discuss the rules with your children. Post them near the computer as a reminder.

5. Ask about your child’s online friends so you know with whom they are communicating. Let your child know that you care about their safety and are watching to be sure they remember your guidelines.

6. Most Internet providers offer parental controls with their service. Use them to keep children away from undesirable sites. Report anything that gets by parental controls and let your Internet service provider know what you expect in terms of keeping kids safe.

7. Learn all you can about blocking and filtering software offered by computer stores. Many can be purchased or downloaded for FREE.

8. Check out the World Wide Web for organizations that represent children’s rights. Do a search using keywords, such as “Internet safety for kids,” and your browser will take you there. Many have newsletters you can download to keep you updated on the latest Internet information.

9. Don’t use the tired old excuse that kids can get internet access anywhere, so there’s nothing you can do. Safety begins at home! If you teach your child what he or she needs to know in life, be open and honest about the dangers out there, help them understand what they can do to stay safe, then you have given them a fighting chance when they aren’t in your presence.

10. Additionally, Morality/Dignity/Self-respect begins at home. If you don’t want your child taking sexually explicit photos of themselves with that camphone you irresponsibly gave them, or webcam you allowed them to use when they close their door to get online, then make sure they know they are not a piece of meat.

Make sure your children know they don’t deserve to be treated like a sexual object for anyone because they are better than that. Let them know that it isn’t just something you don’t like or agree with. Let them know it’s also that you know they deserve to be treated better.

A lot of kids online don’t get praise or acceptance at home. Then they meet someone on the internet via chat, social networking site, or game sites willing to give it to them…as long as they get naked for them or tell them anything they want to know.

October 7, 2010 Posted by | Dangerous Trends, Grooming Techniques, Internet Safety, Other Safety issues, What Makes a child a Target | 2 Comments

Pedo Bear Warning By Law Enforcement!

He’s been featured in cartoon images on sites like deviantART in approved child rape scenarios. He’s been spray painted in parks in lewd fashion to mock the dangers children face from watchful pedophiles.  His popularity has seeped so deeply into the hearts and minds of young teen girls, they have been seen on YouTube laughing about being 3 year olds being raped by their toys they name after him — popularity cleverly obtained through skillful persuasion by pedophiles pretending to be other teens on sites like Chan.  His puppet masters have even been so good at getting pedophile’s access to children and access to ignorant teens, the terrorists have even used him to gather young jihadists.

After at least three years of being a viable threat, the San Diego police department, followed now by the other states, is finally recognizing Pedo Bear as a very real threat of sexual predators of children. I guess better late than never, although, tell that to the children and families who have fallen victim to the antics of his handlers during this time.

I have posted about him before and I was part of a task force that watched vigilantly and turned in to the FBI individuals on deviantART for their explicit use of PedoBear in images and stories about child rape. Images and stories deviantART admins said were protected under free speech, although the friends of those posting these images and these stories were minors being subjected to pedophile paraphernalia and befriended by individuals on the site who blogged frequently that “sex with a child is a beautiful thing.”  Groups set up to petition the banning of PedoBear were removed by Admin, though the child rape scenarios were allowed to stay. This is when the FBI intervened and set up a monitoring task force still in place today.  Makes me wonder why the local police departments have dragged their feet on this very real concern, but nevertheless, they are finally seeing the threat for what it is and taking action.

Thank you Guru, International Events Coordinator for B.A.C.A.: Bikers Against Child Abuse, and co-founder of  BACA Nation, for sending me this information!

Tulsa Police Department Child Exploitation Unit
A Public Safety Information Bulletin

A Seemingly Innocent Menace: An Introduction to “PEDO BEAR”

What’s a Pedo Bear?
First, some definitions:
Pedophile – one affected with pedophilia
Pedophilia – sexual perversion in which children are the preferred sexual object (thanks Merriam-Webster)
Internet Meme – a image, catchphrase or concept that spreads rapidly from person to person via the internet, largely through internet-based email, blogs, forums, imageboards, social networking sites and instant messaging
In recent years, PedoBear, Pedo being a shortened version of Pedophile, started as an “Internet meme”. PedoBear originated in Japan as a cartoon meme, known for his lecherous nature towards prepubescent children. Multiple Internet postings and photos are available of PedoBear.

The Internet postings and photographs, some photo-shopped and some not, refer to children in a sexually provocative manner. His cute face and non-threatening appearance negate the truth of his sinister, much darker side.
In fact, one of the things that make PedoBear popular is the controversy surrounding his licentious love of little girls. PedoBear is and should be associated with the Internet and pedophiles/sexually-preferential offenders who reportedly use him to communicate their interests in young children to each other.
At the San Diego Comic Con 2010 in July of this year, law enforcement discovered an individual dressed in a PedoBear costume, handing out candy and being photographed in contact with attendees, including multiple children. Once identified, the young man and his costume were excluded from the family-friendly event.

Following this introduction to PedoBear, it was found that his attendance was documented in photographs, which were readily available on the internet. And his presence is not restricted to this particular event.

This use of an otherwise family-friendly event for malignant means became obvious, when looking at the pictures and realizing their context. Disguised as innocence, this underground community that would make victims of our children, teasingly reaches out into the light of day. Law enforcement’s concern is what their ultimate intentions could be.


Since the Comic Con, law enforcement in San Diego, with this new knowledge of PedoBear’s existence, has come across PedoBear’s image in situations during which they were contacting those that exploit and/or abuse children.

The intention of this bulletin is to make the community aware of Pedo Bear’s image both on the Internet and in reality, and alert citizens that his presence may be an indicator of the presence of individuals who have a predilection to sexually inappropriate, or even, assaultive behavior.

While not an absolute, the image of PedoBear should be a sign that you should use caution with whatever situation you are in or the individuals involved.
Be aware of your community events and the elements who might be lurking at them.
It should be noted that PedoBear’s presence was neither condoned nor promoted by the Comic Con organization or staff, nor the San Diego Convention Center. Both have been supportive with law enforcement efforts with regards to this information.

For concerns in your particular community, please contact your local law enforcement agency.

September 17, 2010 Posted by | B.A.C.A., Dangerous Trends, Grooming Techniques, Internet Safety, Pedophiles Exposed, Pedophilia Symbols | 2 Comments

Pedophiles Exposed At Nudist Colonies (Shocker!)

I recently received a comment I refused to approve sharing a link to a site specializing in candid, uncensored photos of teens and children at nudist colonies and nude beaches. It reads as follows:

” ..

Mibetesee
newdonist@gmail.com
newdonist@gmail.com
96.254.164.163

2010/07/09 at 4:14 am

Hey everyone, I this website for nudism [link removed by editor]. It is a new website to look at all kinds of uncensored teenagers, kids that live their life in a nudist community. Can anyone tell me if it’s a good site too go to or if its just another scam. I thought it was solid because none of the torrent sites carry anything like this….”

This same site and others like it have come to my attention many times, and I report it to LE each and every time. It is another example of sexual predators being everywhere and another lesson on the necessity of safeguarding our children. Sites like these offering photos of nudist colony residents and nude beaches are NOT authorized to sell or share these photos, unless the particular nudist colony is one that should be raided by the FBI. There is no other purpose to sharing nudist colony photos to non-nudist colony society than for sinister reasons, especially images of children.

These sites feature non-nudist colony images, as well, many of which appear to have been stolen or snapped in secret.  For instance, on such sites I have seen photos of children in very skimpy swimwear – dry and wet, images of little girls beneath the cleaning showers at public pools, images of what others would believe are innocent bath time photos, images of children playing in front yards in sprinklers, etc…

Most parents have such photos and see nothing more than the joy on their beloved child’s face of playing in water and soap suds.  Family memories become sexual predator fantasy when those photos are developed at a public photo lab or posted online in photo sharing sites and on social networking sites.

Never believe “private” settings make a difference. They don’t. There is always a way around those and online predators know all of them.

Furthermore, unless your entire friends list on your social networking page consists of people you know in real life and would trust alone with your child, and unless your page is set to the privacy of only being viewed by these people, you are offering your child up to pedophiles in your midst.

Where do you think all the photos come from that are found in convicted sex offender’s computers if not for ignorant parents behaving so haphazardly with their child’s safety?

THINK: Would you want someone posting images of your naked body all over the net to complete strangers? Why do it to your child?!

The reason the poster of the comment is inquiring as to this site’s validity is because he/she wants to know if the site is a sting operation or if it is the real deal. The reason this person posted a comment here on my site is because pedophiles, particularly overseas, frequently confuse my site with one in their network.  This person tried to post this comment on one of my Alice Day posts, believing it was a post celebrating Alice Day.  Idiots run rampant and thankfully, more so in the pedophile community.

More on the crime of child pornography and how you can be prepared and protect your children: http://www.fbi.gov/innocent.htm

If you come across such sites offering images of nude children, teens, or anyone that appears unauthorized (nude children and teens are ALWAYS unauthorized and illegal!), please report that site using the following links:

FBI Tips form

FBI’s NCMEC reporting site

About The Program
Overview
History
Protecting Your Children
Parent’s Guide to Internet Safety
National Sex Offender Registry
Report Child Exploitation and Pornography:
Use our Cyber Tip Line or call 1-800-843-5678
Or contact FBI Crime Against Children coordinators
in our Local Field Offices
The Netsmartz Workshop Child Safety Website
“Don’t Believe the Type” Teen Safety Website
FBI Miami’s “Safe Online Surfing Internet Challenge”
Keep Safe on Social Networking Sites
Initiatives and News
The Innocent Images International Task Force
Endangered Child Alert Program
NAMGLA Takedown
Innocent Images Turns Ten & Goes International
“Travelers Advisory”
More

August 4, 2010 Posted by | Child Pornography, Dangerous Trends, Internet Safety, Other Safety issues, Pedophiles Exposed, What Makes a child a Target | 14 Comments