START A PETITION 25,136,189 members: the world's largest community for good
START A PETITION
x
 


It's called men against rape, but rape is rape, so take it from there folks. Dosn't matter big or small rape is a crime against us all humanity. İcrazydougie
Members: 47  Code of Conduct
Visibility: open
Membership: open
Group Email: MAR@groups.care2.com


Group Billboard

24 Hour Crisis Line (316) 660-7500 24 Hour Suicide Prevention Services
Group Communication  

  Discussion  (Create New Topic) Posts Last Post
Angels That Care 16 7 years ago
Discuss: PLEASE Sign this IMPORTANT PETITON for CH... 7 8 years ago
ANGELS THAT CARE PSOTINGS ONLY PLEASE 24 8 years ago
PLEASE SIGN THIS PETITON FOR A RAPED BABY 10 8 years ago
missing 10 5 years ago
Would you help this child? 8 7 years ago
KIDS HELP PHONE LINE 3 9 years ago
Signs of Ause 7 8 years ago
HOLLY'S LAW BILL C-20 CHILD PORNOGRAPHY/INTERNET 4 8 years ago
DNA DATABASE/ DEBRA CULBERSON TESTIMONY 5 3 years ago
Lavender Power for DOMESTIC HARMONY 3 8 years ago
Why does it take death to pass a Law? 2 8 years ago
JOHN WALSH NEEDS YOUR HELP WITHIN THE NEXT 48 HOUR... 13 8 years ago
More Discussions  »
Member Sharebook
( Use tag: *group:MAR* )
 
Blog: How Pedophiles Operate On The Intrenet  
Blog: How Pedophiles work  



How Pedophiles stock their victims 5:47 PM
The average pedophile will victimize between 50-150 children before he comes to the attention of law enforcement. A large and growing number of predators have gravitated towards the Internet, reasoning that browsing the personal profiles children themselves post on instant message services and anonymously lurking in chat rooms is less risky and more effective than hanging around playgrounds and schoolyards. The number of predators using the Internet to groom children for future exploitation rises every month.

How do Internet predators select their victims? Here are some important factors:

* Almost by definition, Internet predators favor children who have regular (and private) access to a computer. Most victims live in suburban or rural areas while relatively few live in inner cities.
* Internet predators gravitate towards children who are online for lengthy periods of time each day, and usually at the same time of day. Predators seek children whose schedules mesh with their own, children who are online most days during a consistent time frame. Think about it… predators have little chance to groom a child for future exploitation if that child is rarely online or is online at various times of the day. Children who do not have a lot of activities outside of school tend to be online longer and at the same times of day compared to those children who have lots of activities. These children are more often targeted by Internet predators.
* Internet predators prefer children who have instant message accounts. Although some predators use email, many prefer communicating with their victims through instant messages. Predators know that while emails are saved automatically and have to be manually deleted, instant messages tend to evaporate into the ether once the instant message window is closed. Parents can keep a permanent record of instant message conversations by installing instant message monitoring software on their children’s computers. PC Sentinel Software ( www.pcsentinelsoftware.com ) is one vendor of such software.
* Internet predators search out children who will speak to them. Again this seems self-evident, but predators are forced to pass over children who refuse to communicate with strangers they have not met offline. Teach your children never to communicate online with someone they have not met offline.
* Internet predators search out children who are vulnerable and lonely, sheltered and naive. Predators seek to develop a relationship with their targets, often posing as children or teenagers themselves, and then use that relationship to initiate sexual discussion and activity or lure the child into an offline meeting.
* Internet predators are all the more emboldened if they find out a child is from a single parent family, having trouble at school or with the law, or has been experimenting with drugs, alcohol or sexual activity.
* Internet predators search out children who post personal profiles on the Internet, especially those that provide name, age, photos, gender, physical description, telephone number, address, etc.
* Internet predators favor targets who own webcams or digital cameras. Predators often coerce children into using these devices to send images of themselves to the predator. If a child does not own a camera, predators sometimes send one to their targets for the purpose of photographing themselves.
* To be successful, Internet predators require children who will not terminate the relationship at the first suggestion of sexual activity. Even if a vulnerable child with few friends is uncomfortable with sexual talk, they will sometimes put up with the unpleasantness of the conversation for fear of losing their new “friend”.
* Internet predators seem to favor victims between the ages of 12-15. These are the ages where children are discovering their own sexuality and independence, and also the ages where they are most likely to be conned into meeting with a stranger without telling their parents. Younger and older children are also solicited, but as a whole tend to be harder targets.

Posted: Nov 20, 2006 6:03pm | (0) | (0) |  
Tags:
Blog: LIGHT A CANDLE FOR SOMEONE THIS WEEKEND FOLKS  

Posted: Mar 3, 2006 5:01pm | (0) | (0) |  
Tags:
more »
Advertisement
NEWEST MEMBERS
MY NEWEST GROUP CONNECTIONS
No friend members
MEMBERS NEAR YOU
All members in
Advertisement

Our sponsors help keep this site free!

Advertisement

Our sponsors help keep this site free!