The National Strategy for Child Exploitation Prevention and Interdiction
The National Strategy for Child Exploitation Prevention and Interdiction The National Strategy for Child Exploitation Prevention and Interdiction
Program/Product NameandContactInformationI Keep Safe—FauxPas, the Techno Catwww.ikeepsafe.orgFor KidsFor ParentsFor Schools andTeachersFor OthersSafety in OnlineRelationshipsAvoiding Pornographyand Other OffensiveMaterialsCopyright, Plagiarism,and IntellectualProperty TheftCyberethics/InternetCitizenship9 9 9 9 9CyberbullyingIdentity Theft andPrivacy ConcernsHacking and MaliciousProgrammingInternet “Addiction”Youth,Pornography, andthe Internetbooks.nap.edu/html/youth_internetResearchers,practitioners,interestedadults9 9Crimes AgainstChildren ResearchCenter JuvenileOnlineVictimization Studywww.unh.edu/ccrc/NJOV_info_page.htmResearchers,practitioners,interestedadults9 9 9 9 9 9125
TABLE 2: SAMPLE OF PRIVATE NONPROFIT, COMMERCIAL, AND STATE AND LOCALRESOURCES FOCUSED ON INTERNET SAFETY 95Program/Product NameProducerFor KidsForParentsForSchoolsForOthersWeb SiteChatdangerCopyright KidsCyberAngelsChildnetInternationalCopyrightSociety of theU.S.A.GuardianAngels, Inc.9 www.chatdanger.com9 9 9 www.copyrightkids.org9 9 9 www.cyberangels.orgCyberNetiquetteComixDisney Online 9 9 disney.go.com/cybersafetyCyberSafety CyberSafety.us 9 9 www.cybersafety.us/step1.htmlCyberSmart!CurriculumGetNetWiseOnline SafetyGuideGoCyberCampCyberSmart!®EducationCompany9 9 www.cybersmart.orgGetNetWise 9 9 kids.getnetwise.org/safetyguideUniversity ofMinnesota,University ofNebraska—Lincoln, NorthCarolina StateUniversity, ZopeCorporation,Ohio StateUniversity, NewMexico StateUniversity9 4-H www.gocybercamp.org95 NOTE: Inclusion of a program on this table does not constitute an endorsement. No attempt has been made toevaluate the content or effectiveness of any program. The sources of the information provided are the referencedWeb sites. This list is representative but not exhaustive.126
- Page 81 and 82: State Agency FY 2008# of Cases Refe
- Page 83 and 84: State Agency FY 2008 Jan.-June 2009
- Page 85 and 86: 8. Number and type of ICAC Task For
- Page 87 and 88: ICAC Undercover Chat 4 Regional 9.2
- Page 89 and 90: has developed highly successful ini
- Page 91 and 92: field offices, both domestic and fo
- Page 93 and 94: 2. Department of Defense’s Effort
- Page 95 and 96: of a mail circular. Since the progr
- Page 97 and 98: • The Street Outreach Program fun
- Page 99 and 100: the Defense Computer Forensic Labor
- Page 101 and 102: • Distributes photographs and des
- Page 103 and 104: iii. Enough Is EnoughEnough Is Enou
- Page 105 and 106: 1. Overarching Efforts to Coordinat
- Page 107 and 108: combine resources and expertise on
- Page 109 and 110: United States has submitted annual
- Page 111 and 112: CEOS has worked with foreign law en
- Page 113 and 114: . Department of Homeland Security
- Page 115 and 116: Finally, G/TIP has worked extensive
- Page 117 and 118: F. Review of Internet Safety Progra
- Page 119 and 120: the accessibility, cost, and effect
- Page 121 and 122: activity by predators searching for
- Page 123 and 124: 3. Federal Trade Commission and Dep
- Page 125 and 126: Funder: • U.S. Department of Agri
- Page 127 and 128: Delivery: • Online games; printab
- Page 129 and 130: TABLE 1: FEDERALLY FUNDED INTERNET
- Page 131: Program/Product NameandContactInfor
- Page 135 and 136: Program/Product NameProducerFor Kid
- Page 137 and 138: TABLE 1: PARTICIPANT EVALUATIONS OF
- Page 139 and 140: FY 2011. The primary forensics resp
- Page 141 and 142: The DEU is the principal group resp
- Page 143 and 144: CD/DVDs. The CFS has the capability
- Page 145 and 146: First, the Department will continue
- Page 147 and 148: and the Innocence Lost task forces,
- Page 149 and 150: deconflict cases, and share informa
- Page 151 and 152: with the ICACs to help increase the
- Page 153 and 154: from Landslide’s business premise
- Page 155 and 156: victimized children worldwide, incl
- Page 157 and 158: association, was arrested after the
- Page 159 and 160: is transnational in scope; cooperat
- Page 161 and 162: Over the course of their communicat
- Page 163 and 164: An ICE investigation resulted in th
- Page 165 and 166: U.S. v. RichardsonICE PRESS RELEASE
- Page 167 and 168: APPENDIX C THREAT ASSESSMENT: ACADE
- Page 169 and 170: Selected Quotes from Appendix C of
- Page 171 and 172: * * * “Sheldon and Howitt (2007)
- Page 173 and 174: McCarthy, J. and Gaunt, N. (2004).
- Page 175 and 176: high-profile jobs. Some seemed isol
- Page 177 and 178: Trends 2008, http://www.iwf.org.uk/
- Page 179 and 180: Source: National Center for Missing
- Page 181 and 182: Federal Bureau of Investigation (FB
Program/Product Name<strong>and</strong>ContactIn<strong>for</strong>mationI Keep Safe—FauxPas, the Techno Catwww.ikeepsafe.orgFor KidsFor ParentsFor Schools <strong>and</strong>TeachersFor OthersSafety in OnlineRelationshipsAvoiding Pornography<strong>and</strong> Other OffensiveMaterialsCopyright, Plagiarism,<strong>and</strong> IntellectualProperty <strong>The</strong>ftCyberethics/InternetCitizenship9 9 9 9 9CyberbullyingIdentity <strong>The</strong>ft <strong>and</strong>Privacy ConcernsHacking <strong>and</strong> MaliciousProgrammingInternet “Addiction”Youth,Pornography, <strong>and</strong>the Internetbooks.nap.edu/html/youth_internetResearchers,practitioners,interestedadults9 9Crimes Against<strong>Child</strong>ren ResearchCenter JuvenileOnlineVictimization Studywww.unh.edu/ccrc/NJOV_info_page.htmResearchers,practitioners,interestedadults9 9 9 9 9 9125