Sextortion

As an internet and social media safety advocate, as well as a law enforcement professional, I am well aware of the dangers and consequences of sexting, which I share with students in ourInternet and Social Media Safety Presentation for schools.  One of the unintended consequences of posting or texting sexualized pictures…..they will not likely stay private

Read More…

The Internet Predator Part III

Social Engineering (Human Hacking): How The Predator Gains Information:   Social Engineering is how an Internet predator will use personal information that they data harvest on-line about you, to use to their advantage for criminal, personal, sexual, or financial benefit. Often this information is obtained from Chat Room dialogues, Social Networks, Blogs and search engines

Read More…

The Internet Predator Part II

The Grooming Process and Building Rapport   Many Internet predators, especially sexual predators, will engage in a grooming process.  The primary goal of the grooming process is to build rapport and make the potential target feel comfortable with him, in the hope that you will want to meet him face to face at some later

Read More…

The Internet Predator Part I

Who Are They ?   When we think “Internet Predator” most will imagine someone who is preying upon our youth, utilizing technology, for the purpose of sexual exploitation.  Most Internet experts agree however that there are in fact 4 categories of Internet Predators:   The Emotional/Psychological Predator: this is the internet dating predator who will

Read More…