SCRIPT FOR OUTREACH “Disconnected” and Cyber Predators Introduction Hello! How is everyone doing today? My name is _________________ and I am here with some friends of mine from the American Bar Association Young Lawyers Division. We are here today to talk with you about some important issues related to using the internet and social media. You might not believe it, but it was not so long ago that we didn’t have iPhones, iPads, tablets, xBox 360 – however did we get by without all those devices?! With all of this new technology, there has been an explosion of internet use by young people. Let me show you what I mean. I’m going to ask a couple of questions: How many of you have your own cell phones or smart phone? Now how many of you have an iPad or other tablet that has internet access? How many of you have access to a laptop or PC? Ok, so most/all of you have access to a device that connects you to the internet. Now how many of you are on Facebook? What about twitter? How many of you have an Instagram account? What about Snapchat? Do any of you use some other social media that I have not mentioned? Like what? I’m going to let you in on a little secret--we are not surprised by your answers to those questions. According to a study that came out earlier this year (or, early 2015): o Almost 75% of teens (ages 13-17) have a smart phone.1 o 92% of teens report going online daily, 24% say they go online almost constantly. o 71% use Facebook, 52% use Instagram, 41% use Snapchat, and 33% use Twitter.2 You know what? It’s a great thing that you are using internet and social media. Research shows that the internet and social media are a great way to make friends, to communicate with your friends, and connect with your family. We want you to remember that, because although we are going to be talking about some scary things that can happen when you use the internet, and ways that you can get into trouble, we want you to know that we are not trying to discourage you from using the internet and social media in a safe and appropriate way. Having said that, there are some issues that you need to be aware of when you use the internet and social media. [if you found real-world examples from in or near your community, incorporate those stories here]. That’s why we are here today. We are going to talk about some bad people out there called internet predators, or cyber predators, who use information you post 1 Lenhart A. (2015). Teens, Social Media, and Technology Overview 2015. Pew Research Center. Underwood, M., et al. (2015). #Being Thirteen: Social Media and the Hidden World of Young Adolescents’ Peer Culture. 2 1 on the internet and social media to try and harm you. So we want to talk to you about ways to use the internet safely to protect yourselves from these bad people. [If you were able to contact the teachers in advance and learn the names of some or all of the students, and visited their social media sites, during this portion you can demonstrate to them how easy it is to gain access to personal information about the kids and their families. A scripted sample might look like this: “Is Jessica _____ in class today? Could you raise your hand, Jessica? How’s life over at 123 Oak Street? How are your brothers Joe and Steve doing? I ask you these questions because I want you to know how easy it is for someone you don’t know to obtain information about you and your family. Pretty scary, huh? Feel free to use other similar examples as warranted or necessary] [If there is time—e.g., a presentation of 45 minutes to an hour—you can state the following:] In addition, we are going to talk about some of the consequences that can happen when you use the internet in an unsafe or inappropriate way. We are also going to talk about some rights that are available to you if you do get into trouble, or are accused of getting into trouble. The first thing we are going to do is show a short film called, “Disconnected,” and then afterwards we will talk about some of the things you learn in the movie. Pay attention, because during our discussion we are going to be handing out prizes for good answers! Discussion Regarding Disconnected Q: So what did you think of the video? What was going on in the video? Allow the kids to give you their impressions. Potential follow-up questions: Do you think what happened in that video is realistic? Why/why not? Q: Who knows what a cyber-predator is? A Cyber predator uses the Internet to hunt for victims to take advantage of ANY way, including sexually, emotionally, psychologically or financially. Cyber predators know how to manipulate people, and especially teenagers and one of the things that they are really good at is creating trust and friendship where none should exist – we will talk more about that later. Q: Do you think cyber-predators target people that are your age? Why or why not? There are many reasons. First, being your age is not always easy. You are not a kid anymore, and you have lots more responsibility than you used to, but at the same time you aren’t adult and you probably wish you had more freedom – it’s tough! 2 I would be willing to bet that there are at least a couple of you in here that think your parents should give you more freedom, am I right? Predators may target people your age because you are going through tough times, not getting along with your parents, being bullied, or generally just bored and wanting something new to do. Another reason is that you guys are more active online and with technology than anyone else. Your generation is one of the first to grow up with smart phones and with social media. When I was growing up we didn’t have twitter, or snapchat, or even digital pictures. We literally had to drop film from our cameras off to be developed. I got my first cell phone when I was __________ and it was as big as a basketball. Today it is super easy to communicate with friends near and far. It also just as easy for strangers to initiate communications with you. Not all strangers are dangerous – of course. But some are and you should always make every effort to protect yourself and your friends and families. Q: Has anyone ever heard the term “grooming”? Does anyone know what it is? • "Grooming" is a tactic used by predators to influence and control young people. The predators groom victims in order to get what they want. • They do different things, like pretending to be your friend, flattering you, or making promises, or even giving you gifts, to make you think that you can trust them. • Sometimes they may lie about their age or who they are, but that’s not always the case. • Once they have your trust, it becomes easier for them to convince you to meet them in person, or send them naked pictures, or give them information, such as a password, or credit card information, that they then use to hurt you and your family. Q: Did you see the predator grooming Peter in the video? How? • Gave him a phone • Lied about his age, pretended that his parents also got on his case – empathized, tried to make him feel like he was the only one that understood Peter • ? Q: Now, let’s say you are communicating with someone you’ve met online and they say ______________. If the person is a predator, why do you think they would say that? Online Tactic Intent 3 Online Tactic Intent “Let’s go private.” Engage in private conversation through a separate chat room, instant messaging, or phone texting “Where’s your computer in the house?” Determine if parents or caregivers are in close proximity “Who’s your favorite band? Designer? Film? Gear?” Discover what types of gifts to offer - e.g. concert tickets, clothing, CDs “I know someone who can get you a modeling job.” Flattery “I know a way you can earn money fast.” Appeal to a young person’s natural interest in earning spending money “You seem sad. Tell me what’s bothering you.” Show sympathy to encourage child to confi de in groomer and potentially pull them away from family support “What’s your phone number?” Establish off-line contact - usually happens at a later stage, after the target feels comfortable with the groomer “If you don’t... [do what I ask], I’ll... [tell your parents OR share your photos in a photo blog / Webcam directory / fi lesharing network].” Intimidation and manipulation - used as the groomer learns more and more about the target “You are the love of my life.” Manipulation - becoming appealing to someone by making him or her feel special and building companionship Q: In the beginning of the film, was there anything about Peter’s behavior that may have seemed strange to his friend? • • • Seemed to be hiding his phone Didn’t want to hang out with his friend or play soccer Sounded like it had been a while since he had hung out with his friend Q: What are some other warning signs that someone might give? • Receiving gifts, such as money, bus tickets, cell phones, webcams 4 • Frequently calling or texting unknown numbers or someone that you don’t know • Ditching his or her friends family and friends • Getting upset when not online • Hiding his/her phone/computer screen from you Q: If you were Peter’s friend and you were worried about him, what would you have done? • First and foremost – if you think someone is in danger ________ • You can also tell a trusted adult • _________________ • Regardless what you do, do SOMETHING, it could save your friend’s life! • In the workbooks we’ve given you there is a list of numbers and groups that you can contact. Q: In the film, the predator is an older man. Who else might be an internet predator? • Generally men age 26 or older. 99% if of predators are male. • Generally not pedophiles. They typically target teens, not young children. • Rarely lie about being an adult. Only 5% pretend to be teens. • Predators target vulnerable teens and exploit their natural desires for attention and affections. While these statistics are interesting – they are just that – statistics. The truth is that ANYONE can be a predator!!! It can be someone who is a leader in the community. Someone who is married and has a family. Someone who is rich. Unfortunately, they are not always easy to spot, which is why you have to always be smart! Q: Do you think Peter should have known that the person with whom he was talking to was not who she said she was? Why? 5 • The point to get across here to the kids is that they should always be aware of the possibility that someone is a predator but, at the same time, there may not be blatant warning signs. • That’s why it is so important to err on the side of caution, don’t share personal information, don’t post things that give away where you live, or go to school. Q: What forms of technology did Peter use to communicate with the predator in the film? Did anyone catch how the predator figured out where Peter lives? • Laptop/IM-ing; texting; possibly social media • Picture Peter sent him had street address info in background. Q: Can you think of other ways a cyber predator might try to talk to you? • 82% of online sex crimes against minors, the offender used the victim’s social networking site to gain information about the victim’s likes and dislikes. (47 Journal of Adolescent Health (2010). • 65% of online sex offenders used the victim’s social networking site to gain home and school information about the victim. (47 Journal of Adolescent Health (2010). • Geotagging • It’s really, really important that you always remember that even when you think your posts or conversations are private, they may not be. • Better safe than sorry, especially when you are putting things out into cyberspace that could give away your address, your age, your phone number, your school – all of these things can be used by a predator to get more information about you and potentially find you in real life. • Remember that anyone who tries to get you to do something that makes you uncomfortable is not someone that you can trust! Q: How do you stay safe online? What are some of the ways that you can stay safe online? • • Don’t overshare Don’t post pics that give away where you live or go to school 6 • • • • Don’t put information like your birthday, or hometown, online. Make your settings private Never give out passwords Change passwords regularly So that is all of the questions we have—you guys did a great job! It’s clear you paid attention to the film, and are taking this topic seriously. Before we go, we want to draw your attention to the workbook that we passed out. You will notice that it contains lots of information—and not just about internet predators. In the middle section, we have put together a Guide that we hope you will take a look at. The Guide talks about all of the different ways that you might find yourself in trouble for using the internet in an unsafe and inappropriate way, as well as your rights if you find yourself in trouble. We encourage you to read it closely, and hope that it will help you make good decisions when you are using the internet. Thanks for having us! 7
© Copyright 2026 Paperzz