Monday-Friday8:00 a.m. -5:30 p.m.
Hearing Impaired/ TTY 303-271-5517
Children of all ages have discovered the wonders of connectivity. Online they can chat with like-minded people. They can play games against real people all over the world. With a cell phone, they can text friends or swap photos. On social networking sites, they can post a profile, music, photos, and messages. They can even get help with homework.
These are some of the joys of the Internet. However, there are also serious risks to consider. Today kids are often more computer-savvy than their parents. But while they may be skilled online, they are often in the dark about online safety.
This page provides guidance for adolescents, teens and their parents about the dangers of connectivity, and how to keep from being victimized.
Online child predators can interact with children through a variety of channels: computers, video games, handheld gaming devices and mobile phones. These tools make millions of people accessible at your child’s fingertips ... and vice-versa. Paradoxically, young people asserting their individuality online remain very vulnerable to predation. Their innocence, natural curiosity, desire for attention, ingrained trust in adults, and/or desire to rebel against their parents can lead them into the path of someone who could harm them.
Posting personal information can be dangerous in itself. But engaging in conversation online with people you don't already know can create new dangers. The anonymity of online communications allows would-be predators to alter their own personas. Teens who believe they are talking to other young people may be disappointed, at best, to find that their "friends" are actually middle-aged men.
In 2007, Jeffco District Attorney's Office investigators posing online as a teenage girl received a series of messages from a "17-year-old boy" who said he attended a high school in Jefferson County. His language and the topics he discussed were convincing. When he set up a meeting with the "girl," investigators confirmed their suspicions: the "boy" was a 60-year-old convicted sex offender.
Activities that may seem fairly harmless to your child can lure the attention of predators. Here are some precautions your child can take — with your help — that may help him or her steer clear of predators.
The profile information and content you generate is critical. The images, opinions and personal information you share can be used by others to manipulate you, blackmail you, or literally locate you. Use a neutral profile photo that doesn’t show your face; consider a photo of an object or landscape. Never take nude or semi-nude photos of yourself or allow someone else to do so. Remember, anything you say or post can live forever online if re-posted by someone else.
Select gender-neutral and age-appropriate screen names. You can inadvertently give out a lot about yourself with a screen name like “britt98” (Brittany, born in 1998?). Screen names that suggest sex, violence or drugs, which might seem fun or funny, can draw attention from the wrong people.
On Facebook and other social sites, lock down your privacy settings so that only your approved friends can see your photos, video and updates. Leaving privacy open is like inviting strangers to tag along with you everywhere you go.
While it may be tempting to build the largest friend list possible, to appear more connected or popular, you should only accept friend requests from people you actually know, and trust
If you are contacted, in any format, by someone you don’t know, do not respond. Use your settings to block that person from contacting you. Never agree to meet someone in person whom you met online. If you’re contacted by an adult you know, talk to your parents about the communication.
It's important for teens to realize that anything they post online, while editable, can be saved while it's live. Any user can save, keep or distribute photos or text. This means that sexual photos, photos depicting drug use, gang signs, threats against others or criminal behavior are all potentially permanent collector's items for their classmates, friends, enemies, parents and total strangers.
Every child is different. Different ages, maturity levels and special circumstances will dictate what’s appropriate for each child. The most important thing parents can do is stay involved with kids’ online activities and help them understand the dangers. Sooner or later they’ll be on their own, and will need that foundation of online common-sense. Until then …
The Sheriff's Office has investigated cases involving threats made online. In one case, a local teenage boy posted photos of himself with his parents' gun collection. Classmates reported that he had made threats about his school. Investigators who viewed the Web page arrested the teen and charged him with unlawful possession of a handgun by a juvenile. Police take these threats seriously.
There are criminal implications for people (adults or juveniles) who possess sexual images or videos of young people. If you obtain the content from someone other than the original sender, or forward the content on to others, you could be charged with sexual exploitation of a child. This can result in jail time, and/or registration as a sex offender.
Nationwide, teens have faced charges, both for sending explicit photos and for possessing them. Although criminal charges are rare, they should be a consideration for anyone about to hit “send.”
Sharing too much personal information online, such as full name and birthdate, may also allow a criminal to steal a user's identity. He could represent himself as you or apply for credit using your name.
There is a massive amount of free pornography online. Teens, especially teenage boys, with access to porn sites may develop an unhealthy concept of sex. Extremes in sexual behavior depicted online, or the sheer volume of the imagery, can consume a teen until reality becomes a distant memory. Porn addiction, sexual aggression and violence toward women can develop from unrestricted access to porn.
Online sites such as Google Street View, Facebook, Twitter, and Foursquare are being used by burglars to target our homes and businesses.
Visit the District Attorney's Internet Investigations website for more on child internet safety. Also, download a list of common texting/instant messaging abbreviations and acronyms . Information on this page was adapted from NetSmartz.org and FBI.gov.
Administration & Courts Facility 100 Jefferson County Parkway Golden, Colorado 80419 (303) 279-6511
© 2013-2014 Jefferson County, CO.