Grose Parent Presentation

Trooper First Class Rachel Grose
Internet Crimes Against Children Task Force
•
•
•
•
•
THINK OF HOW MUCH TIME YOUR KIDS SPEND ON
THE INTERNET.
DO YOU KNOW WHO THEY ARE TALKING TO? DO
THEY KNOW WHO THEY ARE TALKING TO?
DO YOU KNOW ALL THEIR ONLINE ACCOUNTS?
SOCIAL MEDIA? E-MAIL? CHATTING?
HOW MUCH INFORMATION DO THEY HAVE ON
THEIR PROFILES? AGE? ADDRESS? PHONE? CURRENT
CITY?
IS THERE A REASON THEY ARE IN MIDDLE SCHOOL
AND THEY HAVE 1500 FRIENDS? DO THEY KNOW 1500
PEOPLE?
• In 2015, the NCMEC CyberTip Line received 4.4
million reports on images of child abuse, online
enticement, child sex trafficking, and child
molestation.
• NCMEC CVIPs Program has received more than 158
million images and videos and law enforcement has
identified more than 10,500 child victims.
 SO AGAIN, HOW MUCH DO YOU KNOW ABOUT
WHAT YOUR CHILD DOES ON THE INTERNET?
 The Children's Online Privacy Protection Act and Rule
apply to individually identifiable information about a
child that is collected online, such as full name, home
address, email address, telephone number or any other
information that would allow someone to identify or
contact the child. The Act and Rule also cover other
types of information -- for example, hobbies, interests
and information collected through cookies or other
types of tracking mechanisms -- when they are tied to
individually identifiable information.
 Sexting is the act of sending sexually explicit messages

•
•
•
•
•
and/or photographs, primarily between mobile phones.
The term was first popularized in early 21st century, and is a
portmanteau of sex and texting, where the latter is meant
in the wide sense of sending a text possibly with images.
Ways to “sext”:
Cell phones (Smart phones, iPod touches, etc)
Computers (Instant Messaging)
Tablets (iPads/ Androids)
E-Readers (Kindle)
XBox
 Monitoring your child’s phone and text messaging as well as
•
•
•
•
•
•
social media sights may have parental controls in their security
settings to assist parents in watching what their child posts.
Smartphones now have applications that can conceal pictures
and even delete messages that have been sent within a matter of
seconds.
Know your child’s passwords.
Social Media websites such as Facebook, Twitter, Instagram.
Watching chat websites that teens use nowadays to chat with
random people around the world. (Kik, MeetMe, etc.)
Get to know the state law
Establish rules on using the Internet (etc. passwords, time
limits, parental controls)












CHAPTER 61. CRIMES AND THEIR PUNISHMENT.
ARTICLE 8C. FILMING OF SEXUALLY EXPLICIT CONDUCT OF MINORS.
§61-8C-3b. Prohibiting juveniles from manufacturing, possessing and distributing nude or
partially nude images of minors; creating exemptions; declaring a violation to be an act of
juvenile delinquency; and providing for the punishment thereof.
(a) Any minor who intentionally possesses, creates, produces, distributes, presents, transmits,
posts, exchanges, or otherwise disseminates a visual portrayal of another minor posing in an
inappropriate sexual manner or who distributes, presents, transmits, posts, exchanges or otherwise
disseminates a visual portrayal of himself or herself posing in an inappropriate sexual manner shall be
guilty of an act of delinquency and upon adjudication disposition may be made by the circuit court
pursuant to the provisions of article five, chapter forty-nine of this code.
(b) As used in this section:
(1) “Posing in an inappropriate sexual manner” means exhibition of a bare female breast, female or
male genitalia, pubic or rectal areas of a minor for purposes of sexual titillation.
(2) “Visual portrayal” means:
(A) A photograph;
(B) A motion picture;
(C) A digital image;
(D) A digital video recording; or
(E) Any other mechanical or electronic recording process
or device that can preserve, for later viewing, a visual image
of a person that includes, but is not limited to, computers,
cellphones, personal digital assistance and other digital
storage or transmitting devices;

(c) It shall be an affirmative defense to an alleged
violation of this section that a minor charged with
possession of the prohibited visual depiction did neither
solicit its receipt nor distribute, transmit or present it to
another person by any means.

(d) Notwithstanding the provisions of article twelve,
chapter fifteen of this code, an adjudication of delinquency
under the provisions of this section shall not subject the
minor to the requirements of said article and chapter.

 Cyberbullying is the use of technology to harass, threaten,
embarrass, or target another person. By definition, it occurs among
young people.
 Some examples of ways kids bully online are
•
•
•
•
•
•
Sending someone mean or threatening emails, instant messages, or text
messages
Excluding someone from an instant messenger buddy list or blocking their
email for no reason
Tricking someone into revealing personal or embarrassing information and
sending it to others
Breaking into someone's email or instant message account to send cruel or
untrue messages while posing as that person
Creating websites to make fun of another person such as a classmate or
teacher
Using websites to rate peers as prettiest, ugliest, etc.
•
•
•
•
•
•
•
Nearly 43% of kids have been bullied online. 1 in 4 has had
it happen more than once.
70% of students report seeing frequent bullying online.
Over 80% of teens use a cell phone regularly, making it the
most common medium for cyber bullying.
81% of young people think bullying online is easier to get
away with than bullying in person.
Only 1 in 10 victims will inform a parent or trusted adult of
their abuse.
Bullying victims are 2 to 9 times more likely to consider
committing suicide.
About 75% of students admit they have visited a website
bashing another student.
 §61-3C-14a. Obscene, anonymous, harassing and
threatening communications by computer, cell
phones and electronic communication devices;
penalty.
(a) It is unlawful for any person, with the intent to harass or abuse another
person, to use a computer, mobile phone, personal digital assistant or other
electronic communication device to:

(1) Make contact with another without disclosing his or her identity with the
intent to harass or abuse;

(2) Make contact with a person after being requested by the person to desist
from contacting them;



(3) Threaten to commit a crime against any person or property; or
(4) Cause obscene material to be delivered or transmitted to a specific
person after being requested to desist from sending such material.

(3) "obscene material" means material that:

(A) An average person, applying contemporary adult community standards,
would find, taken as a whole, appeals to the prurient interest, is intended to
appeal to the prurient interest, or is pandered to a prurient interest;

(B) An average person, applying contemporary adult community standards,
would find, depicts or describes, in a patently offensive way, sexually explicit
conduct consisting of an ultimate sexual act, normal or perverted, actual or
simulated, an excretory function, masturbation, lewd exhibition of the
genitals, or sadomasochistic sexual abuse; and

(C) A reasonable person would find, taken as a whole, lacks literary, artistic,
political or scientific value.

(c) It is unlawful for any person to knowingly permit a computer, mobile
phone or personal digital assistant or other electronic communication device
under his or her control to be used for any purpose prohibited by this section.

 (d) Any offense committed under this section may be
determined to have occurred at the place at which the
contact originated or the place at which the contact was
received or intended to be received.

(e) Any person who violates a provision of this section is
guilty of a misdemeanor and, upon conviction thereof,
shall be fined not more than $500 or confined in jail not
more than six months, or both fined and confined. For a
second or subsequent offense, the person is guilty of a
misdemeanor and, upon conviction thereof, shall be fined
not more than $1,000 or confined in jail for not more than
one year, or both fined and confined.
 IF CHILDREN POSSIBLY HAVE SOMETHING OF
CONCERN ON THEIR PHONES, THE SCHOOL CAN
TAKE ACTION.
 SCHOOLS CAN TAKE ACTION UNTIL IT TURNS
CRIMINAL. ONCE A CRIMINAL ACTION TAKES PLACE,
THEY NOTIFY LAW ENFORCEMENT.
 A CHILD’S PHONE WILL BE TAKEN BY
ADMINISTRATION. IF LAW ENFORCEMENT IS
NOTIFIED, THE PHONE IS THEN PLACED IN THE
CUSTODY OF THE LAW ENFORCEMENT OFFICIAL AND
IF EVIDENCE OF A CRIME IS FOUND, THE PHONE
WILL NOT BE RETURNED. (THIS ALSO APPLIES TO
COMPUTERS)
• IF FURTHER EVIDENCE OF A CRIME IS FOUND,
LAW ENFORCEMENT COULD SEIZE ALL
ACCESSIBLE DEVICES IN THE HOUSEHOLD IF
DEEMED NECESSARY.
• JUVENILE PETITIONS WILL BE FILED AND THE
CHILD WILL BE PUT THROUGH JUVENILE COURT.
• IF CONVICTED, THE CHILD WILL FACE JUVENILE
DETENTION, PROBATION, COMMUNITY SERVICE,
AND COULD EVEN BE PROHIBITED FROM
OWNING A PHONE WITH TEXTING CAPACITY.
 TFC. RACHEL GROSE
 WEST VIRGINIA STATE POLICE
 PHONE: 304-528-5555
 EMAIL: [email protected]