- Social Media Safety
- Personal Safety & Security Awareness for Men & Women in the Workplace
- Social Worker Safety
- Travel Safety & Security Awareness
- REALTORS® and REO Brokers
- Lone Worker Safety Training
- Home Safety Training
- Student Safety:Women in Middle School, High School & College
- Workplace Violence Prevention & Security Consulting
- Student Safety.School Assembly Workshops
- Contact Us
Archive for category Online Safety
Child Grooming. Recognizing this behavior for what it is!!
Guest blog entry courtesy of Kim Estes. Kim is a child safety expert and the founder of Savvy Parents Safe Kids. Kim believes that every child deserves a safe childhood and that adults have the power to keep children safe.
The past week has been a firestorm surrounding the Penn State Child Sexual Abuse scandal. We have by now figured out what when wrong. We know horrible mistakes were made. We know horrific crimes were committed.
Walking in on a child being raped is obviously Child Sexual Abuse in progress. However, it didn’t start “just like that”. Sandusky had a process that he followed to gain access to that child. So how exactly do predators get to the point where they have complete access to a child and complete immunity within a community?
The answer is simple. It is called grooming.
We hear about grooming of children, but before that can happen, a predator must groom the adults. Grooming adults clears the way to victimizing children. If we want to stop children from becoming victims, we need to be able to identify when adults are being tricked and groomed and what the predators grooming steps are.
Steps and Signs of Child Grooming:
Identifies opportunities, organizations and communities with children
Builds trust through friendships and/or leadership (with the adults and children)
Begins to identify potential victims
Gains access to children
Begins testing boundaries (with children and adults)
Provides presents, praise and privileges (to both the adults and the children)
Uses threats (towards children and sometimes adults) to keep their crimes secret
Adults are responsible for keeping the children in our lives safe. If you observe what you believe is child grooming in progress it is your duty to intervene. Talk to a supervisor, talk to your partner, talk to the police, talk to a specialist in Child Sexual Abuse prevention. Limit that person’s access to children immediately. Predators like to fly under the radar. If you start making noise and asking questions you will make it harder for them to be stealth in committing their crimes against children.
Visit Kim’s website at www.savvyparentssafekids.com
Think back to the documentary on television where the lioness is hunting. She stalks a herd of deer as they approach a water hole. She waits in the same place because she knows that the deer, being highly predictable, will come by at the same time every day. They must do so to drink.
As she moves in, she stays well hidden and singles out her target; usually the very young or very old, the sick member of the herd or the animal least aware of its surroundings! They are easy or “soft targets”. The inattentive animal doesn’t look up from grazing and hardly scans its surroundings. This is the animal that is also not listening and clearly does not know what is going on behind it. The lioness is much attuned to the body language of the inattentive. So are human predators!
If she is not hunting under her preferred cover of darkness, she will try to have the sun behind her so the herd is blinded making her even more difficult to see. She moves in as close as she can and then launchers her attack from behind, her victim’s blind spot. If possible she will run her prey toward a terrain feature such as a steep embankment to be sure she channels it in the direction of her choosing. By the time her victim realizes what is going on its too late and the attack is complete.
If her intended prey starts to pay more attention to its surroundings and moves back into the middle of the herd where it will find safety in numbers, the lioness will wait, pass over what has now become a “hard target” and look again for an easy mark. This is called the victim selection process and is not unlike the process human predators go through. Victims are chosen, the process is not random and the attack plan well thought out.
Human predators operate in much the same way. Their ideal target too exhibits the three elements that make them “a victim looking for a place to happen”; lack of awareness of surroundings, predictability of schedule, and placing themselves alone in an isolated environment.
Some Tips and Safety Strategies to Consider now that it is Getting Darker Earlier
- If you run with one or two buddies, you are safer and have made those isolated areas less of a threat. This is even more important in early morning and evening low light hours.
- If you walk or run on different trails on different days at slightly different times with you buddy team you have exponentially hardened your target profile. Remember, predictability is one of your enemies.
- Hearing is your parallel primary protective special sense. It’s on par with vision, so leave the head phones at home. People who have had close calls often tell us they heard someone coming up behind them before they saw them, giving them time to react.
- If you must run alone, choose busier well light streets and run FACING traffic, making it difficult for a vehicle to pull along side. Also let someone know your route and the time you expect to return.
- Always know where your “safe havens” are located. This could be a busy coffee shop or retail area, a well light parking lot or even a knowing at which homes along the route people are home.
- Always bring your cell phone with you and be sure to keep track of any areas where there is weak or no signal. Place it in a small Ziploc bag if you are worried about moisture.
- If you carry pepper spray, carry it in your hand with a wrap band. It will only be of help to you if you can bring it to bear and discharge in an instant. Buy fogger sprayers NOT stream dispensers!
- One of the best “things” you can bring on a run or walk is a dog. Regardless of size, they are good early warning systems and are just another layer of complications for a would be assailant.
- If it’s cold wear earmuffs, NOT a hoodie which robs you of peripheral vision. Hoodies can also be grabbed and used as a “handle” by which to control you.
- Remember that the most important area to be aware of is the blind spot behind you. The place ambush or blitz attacks are launched from.
- Carrying a small personal alarm is preferred by some as is a small very high intensity flashlight that can temporarily blind an assailant and illuminate those dark areas that offer great hiding places. These items can be easily clipped onto your waistband which is where your cell phone should be too.
Social Media and your Personal Safety
- Do not plan runs or announce rendezvous points to your exercise buddies via any social media or networking platform
- If you want to post about a pleasant exercise outing, do so after the fact and keep the details, especially the route and location very vague.
The Danger of Complacency
At this very moment and as you read this would be criminals or predators are not your primary enemy. Complacency is. Do not fall into a false sense of security telling yourself “We live in a good area” or “Nothing bad ever happens here”. Anything can happen anywhere. Don’t take chances. Implement your strategy and engage it with discipline. Be smart. Be safe and stay healthy!!
Reuters recently cited findings from a study by Legal & General, a multinational financial services company headquartered in London, United Kingdom. The company was looking into the impact social media has on risk with regard to property and content. The report was called the “Digital Criminal”
Legal & General polled 2,092 people:
- 38%- posted where and when they were going on their next vacation
- 33%- posted where and when they would be on the upcoming weekend
Of 100 “friend requests” sent out during the study
- 13 percent were accepted on Facebook – without any checks.
- 92 percent on Twitter — without any checks.
Obviously Legal & General’s concern is revolves around risk to property and theft as people share way too much information online to include photos of the interior of their homes and valuables.
(More on the Reuters article written by Belinda Goldsmith)
Employees and Family Personal Safety
It goes without saying that broadcasting where we will be or where we presently are at in real time, gives another set of criminals, those that would want to do harm to you, a family member or one of your employees, easy targeting opportunities.
Despite good access control and security which makes your place of work much safer, social media is offering alternate non-worksite targeting venues and opportunities as employees broadcast where they will be and at what times.
A perpetrator might be a disgruntled worker or the batterer of one of your staff. The incidences of opportunistic targeting, which can lead to stalking, also increase with careless use of social networks.
Social Media Security and Safety Tips: Common Sense but Not Commonly Adhered To
- Spend a moment vetting “friend” requests. The fact that you have “mutual friends” with someone you know well means nothing given the information revealed in the above study.
- Never let people know where you are or will be; only where you were of have been! This includes posting photos upon return from an outing or vacation.
- Try and be vague about where you have been and what time you were there. This makes it more difficult for someone to build a predictive profile on your habits and patterns.
- Be cognizant of which photos you are included in and ask friends not to “tag” you.
- Never tag your children in any photos.
- Turn off the GPS feature on your Smart Phone before you use its camera. If not, the coordinates of where the photo was taken will remain embedded in the image code.
- Think like a criminal. The layout of your home and valuables that appear in the background of any photo are useful pieces of information.
- Be sure to disable the GPS feature on individual apps as well. If not, your location will be broadcast with each post or Tweet once again leaving a convenient trail as to your patterns and habits.
- Ask yourself who benefits when you “Check in” via a location based app? We have polled audiences during our trainings. 95% of them say they really don’t care where you are and what you are doing. The only people that care as much as you are the criminal element mining social networking platforms for easy targets.
- Is the “Out of Office” reply really necessary? It is often the data point that alerts prying eyes to start tracking you online, since they know you are not at work.
Social media safety and security are a growing concern. As more people engage in social media the amount of information being shared in relatively open forums continues to grow.
Best practice is to post information and photos after an event rather than letting people know where you will be or where you are right now. It is also a good idea to be cautious about “checking in” when using locations based services. Geo location is a growing concern amongst social media safety experts.
If you exercise the discipline of only posting after an event, keep this tip in mind; if you frequent the restaurant or establishment mentioned in your post, you are still leaving a criminal with enough information to start building a predictive profile on you.
What do I mean by this? Simply put, our predictability is one of our primary vulnerabilities. It provides criminals a good map of when and where we will be. This information helps them streamline their planning and victim selection process whether it may be a burglary or a violent crime on a person.
Humans are creatures of habit. We tend to walk and drive the same routes and stick to schedules that become quite obvious to those who might be observing. This is why those charged with protecting dignitaries and high profile people continuously change the routes, vehicles and departure times while transporting their clients.
Even if you are careful, but mention several times over the course of a few weeks that you are home from a specific location; a restaurant you frequent, your gym, your child’s school or a more regular after work activity, you have supplied enough information for someone to predict when you will be back at one of those locations. This information greatly enhances the targeting opportunity.
So keep in mind, even if posting after an event, keep the specifics and location vague. Predictably is our Achilles Heel. Again keep the specifics and location very vague!!
You might think that only friends and family in your social media network are privy to anything you share. You also might think that your friends have vetted the friends they share their platforms with. Think again!
A Reuters article on a British company, Legal & General published some statistics from a study they did several years ago.
Their study revealed that only 13% of Facebook users vetted a friend request and a staggering 92% accepted new follows on Twitter without doing any checks!!
They also found that 38% of people on Twitter and Facebook would post about an upcoming vacation.
Social Media Safety Training Available onsite or in webinar format / One hour duration
Back to School Safety Tips — Social Media, Device Security, Malware by Christopher Burgess (For the Huffington Post )
Password- Creation and Usage – Online Safety & Security by Christopher Burgess