The National Strategy for Child Exploitation Prevention and Interdiction
The National Strategy for Child Exploitation Prevention and Interdiction The National Strategy for Child Exploitation Prevention and Interdiction
Program/Product NameProducerFor KidsForParentsForSchoolsForOthersWeb SiteProtectKids.comEnough IsEnough9 9 www.protectkids.comresponsiblenetize Center for Safe 9 9 Tech www.responsiblenetizn.org and Responsible nology en.orgInternet Useplanningorganiza-tionsInternet Safetyand Safe Surfingfor KidsProtectYourKids.info9 www.safesurfing.itgo.comInternet Safety Illinois State 9 9 www.internet-Awareness Library, aDivision of theOffice of theSecretary ofState, usingfederal LSTAfundingsafety.org/scripts/content.cgi?template=default&args=guides,introductionInternet Safety Center for Innov 9 9 9 Libraria www.k12science.org/ifor Teachers and ation in ns nternetsafety.Students Engineering andScienceEducation,Stevens Instituteof TechnologyhtmlKidscomjr.Internet SafetyGameCircle 1 Network 9 9 www.kidscomjr.com/games/safety/safety.htmlNetforce 9 www.geocities.com/net_enforceNetSafeKidsNationalAcademy ofSciences9 www.nap.edu/netsafekids/res_helpful.html127
Program/Product NameProducerFor KidsForParentsForSchoolsForOthersWeb SiteOnlineGuardiansOnlineGuardians.org9 www.onlineguardians.org/parents.htmP2P PATROL:Peer-to-PeerParents andTeens React OnLinePBSKids.org GetYour WebLicensePlanetCRuSH/ProjectCRuSHPlay It CyberSafeSafe SurfingTips for TeensDistributedComputingIndustryAssociation(DCIA)PublicBroadcastingService (PBS)TOUCHCommunityServicesBusinessSoftwareAllianceNemoursFoundation9 Distribut-edcomputingcompanieswww.p2ppatrol.com9 www.pbskids.org/license9 www.planetcrush.org9 9 9 www.playitcybersafe.com9 www.kidshealth.org/teen/safety/safebasics/internet_safety.htmlSafeKids.comSafeTeens.comstaysafeonline.infoWebMonkey forKidsNetFamilyNews.orgNational CyberSecurityAlliance,a public-privatepartnershipLycos, Inc./Carnegie MellonUniversity9 9 www.safekids.com9 9 Smallbusinesseswww.staysafeonline.info9 9 webmonkey.wired.com/webmonkey/kids/planning/safety.html128
- Page 83 and 84: State Agency FY 2008 Jan.-June 2009
- Page 85 and 86: 8. Number and type of ICAC Task For
- Page 87 and 88: ICAC Undercover Chat 4 Regional 9.2
- Page 89 and 90: has developed highly successful ini
- Page 91 and 92: field offices, both domestic and fo
- Page 93 and 94: 2. Department of Defense’s Effort
- Page 95 and 96: of a mail circular. Since the progr
- Page 97 and 98: • The Street Outreach Program fun
- Page 99 and 100: the Defense Computer Forensic Labor
- Page 101 and 102: • Distributes photographs and des
- Page 103 and 104: iii. Enough Is EnoughEnough Is Enou
- Page 105 and 106: 1. Overarching Efforts to Coordinat
- Page 107 and 108: combine resources and expertise on
- Page 109 and 110: United States has submitted annual
- Page 111 and 112: CEOS has worked with foreign law en
- Page 113 and 114: . Department of Homeland Security
- Page 115 and 116: Finally, G/TIP has worked extensive
- Page 117 and 118: F. Review of Internet Safety Progra
- Page 119 and 120: the accessibility, cost, and effect
- Page 121 and 122: activity by predators searching for
- Page 123 and 124: 3. Federal Trade Commission and Dep
- Page 125 and 126: Funder: • U.S. Department of Agri
- Page 127 and 128: Delivery: • Online games; printab
- Page 129 and 130: TABLE 1: FEDERALLY FUNDED INTERNET
- Page 131 and 132: Program/Product NameandContactInfor
- Page 133: TABLE 2: SAMPLE OF PRIVATE NONPROFI
- Page 137 and 138: TABLE 1: PARTICIPANT EVALUATIONS OF
- Page 139 and 140: FY 2011. The primary forensics resp
- Page 141 and 142: The DEU is the principal group resp
- Page 143 and 144: CD/DVDs. The CFS has the capability
- Page 145 and 146: First, the Department will continue
- Page 147 and 148: and the Innocence Lost task forces,
- Page 149 and 150: deconflict cases, and share informa
- Page 151 and 152: with the ICACs to help increase the
- Page 153 and 154: from Landslide’s business premise
- Page 155 and 156: victimized children worldwide, incl
- Page 157 and 158: association, was arrested after the
- Page 159 and 160: is transnational in scope; cooperat
- Page 161 and 162: Over the course of their communicat
- Page 163 and 164: An ICE investigation resulted in th
- Page 165 and 166: U.S. v. RichardsonICE PRESS RELEASE
- Page 167 and 168: APPENDIX C THREAT ASSESSMENT: ACADE
- Page 169 and 170: Selected Quotes from Appendix C of
- Page 171 and 172: * * * “Sheldon and Howitt (2007)
- Page 173 and 174: McCarthy, J. and Gaunt, N. (2004).
- Page 175 and 176: high-profile jobs. Some seemed isol
- Page 177 and 178: Trends 2008, http://www.iwf.org.uk/
- Page 179 and 180: Source: National Center for Missing
- Page 181 and 182: Federal Bureau of Investigation (FB
- Page 183 and 184: scientific survey process, but rath
Program/Product NameProducerFor KidsForParentsForSchoolsForOthersWeb SiteProtectKids.comEnough IsEnough9 9 www.protectkids.comresponsiblenetize Center <strong>for</strong> Safe 9 9 Tech www.responsiblenetizn.org <strong>and</strong> Responsible nology en.orgInternet Useplanningorganiza-tionsInternet Safety<strong>and</strong> Safe Surfing<strong>for</strong> KidsProtectYourKids.info9 www.safesurfing.itgo.comInternet Safety Illinois State 9 9 www.internet-Awareness Library, aDivision of theOffice of theSecretary ofState, usingfederal LSTAfundingsafety.org/scripts/content.cgi?template=default&args=guides,introductionInternet Safety Center <strong>for</strong> Innov 9 9 9 Libraria www.k12science.org/i<strong>for</strong> Teachers <strong>and</strong> ation in ns nternetsafety.Students Engineering <strong>and</strong>ScienceEducation,Stevens Instituteof TechnologyhtmlKidscomjr.Internet SafetyGameCircle 1 Network 9 9 www.kidscomjr.com/games/safety/safety.htmlNet<strong>for</strong>ce 9 www.geocities.com/net_en<strong>for</strong>ceNetSafeKids<strong>National</strong>Academy ofSciences9 www.nap.edu/netsafekids/res_helpful.html127