Privacy and security tips for newly-minted college students

Univerity of Califirona Berkeley (Flickr Creative Commons -- photographer unknown)

University of California Berkeley (Flickr Creative Commons)

This post first appeared on Forbes.com

by Larry Magid

Congratulations. After a long and sometimes stressful childhood you (or your teen) are ready for college. It’s a big step that involves a great deal of freedom and independence and an exciting time.

When I started college, the big “risks” were gaining weight (the “freshman 15″), drugs and alcohol and of course accidents. Those are still with us, but so are hackers, online privacy risks and the possibility of getting into trouble because of something posted about you on social media.

Don’t drink and post

Depending on where it's taken, a picture like this could get a student into trouble (Flicr Creative Commons Gregg O'Connel)

Depending on where it’s taken, a picture like this could get a student into trouble (Flickr Creative Commons Gregg O’Connell)

There are verified cases of students being disciplined and even expelled because of what’s posted about them online. For example, it’s hardly shocking to hear about students under 21 enjoying a forbidden adult beverage in their dorm room, but when those pictures wind up on social media, school officials sometimes feel as if they have no choice but to take disciplinary action. Even if (as many do) you think it’s OK for an 18-year-old to drink in a dorm room, don’t force officials to react by doing so in public. The same, of course, goes for drugs or anything else that violates the law or school policy.

Hemanshu Nigam, a former federal prosecutor and one-time head of MySpace security who now runs SSP Blue, a safety, security and privacy consulting firm for online businesses, suggests that students “treat your social media presence like its your resume for future employers while you still have all the fun college is meant to deliver.”

Privacy

Many college students have roommates or at least suite mates and while you don’t want to hide things from your roomies, you do want to make sure that they aren’t riffling through your files. Of course, common courtesy should be sufficient to avoid that, but putting a password on your computer, tablet and phone can help keep a curious roommate or visitor from acting on an impulse. As always, don’t share those passwords with anyone, including roommates. Also, be aware of what you’re posting and what’s on your laptop’s screen when in the library or other public spaces,

Security

Cybersecurity is important for us all, but especially when you’re on a public or semi-public network like campus networks. Again, use strong passwords but also make sure that you’re using appropriate firewall and security software. Check with your school IT department as to what it recommends and whether it offers free software and/or security assistance. This may have been fixed since then, but when my son was living in a dorm at UCLA, he was able to see some of the files of his fellow residents because they were sharing a network and not properly securing their computers.

Physical security

Be very careful to protect your equipment from theft and loss. Kensington makes a security cable that enables you to lock (most) laptops to a desk or table. Make sure that any tablets and phones have the “find my phone” feature turned on. Both Apple and Android equip their phones and tablets with software that enables you to locate the device remotely and cause it to ring or wipe the data, but for the service to work, the device has to be turned on and connected to the Internet via WiFi or a cellular network. SSP Blue’s Nigam suggests that students “scratch your name, email and phone on all your devices in places where the ‘thief’ may not look.” He said that it’s very common for devices to get stolen and then recovered and this helps campus and regular police know it really belongs to you, especially if a student decides to remote wipe a stolen device.

Campus data breaches

There is also the risk that the school’s network and servers will suffer a data breach that can affect your personal information. There is little you can do to protect yourself from an attack on a cloud-system you don’t control, but if it happens, be sure to carefully monitor your bank and credit card accounts, your social media accounts and your campus accounts. You should change all of your passwords and avoid using the same password for multiple sites. Here’s advice on how to create and manage strong, unique passwords that are easy for you to remember and hard for others to guess.

For additional advice, check out ConnectSafely’s Parents Guides (that apply to students, too) on cybersecurity, mobile phones, Instagram, Snapchat and cyberbullying.

Also see ConnectSafely’s

Tips for Strong, Secure Passwords

 

Posted in Child safety | Comments Off

LG’s new tracking watch for young children

LG+KizON+0220140709095559726

There are lots of apps that can allow a parent to track their child’s phone. Assuming the phone and kid are together and the phone is turned on and in range, you can also use those apps to track your kid.

But now there’s a wearable device from LG just for that purpose. The KizON wristband, which was just released in South Korea and will be available in the U.S. and Europe later this year, comes in blue, pink and green and enables parents to track their kids from a smartphone or tablet. It’s also a phone without a dial, that the parents can use to call the kid or the kid can use to call a parent by pressing a button.

“Children as well as the elderly are ideal customers for wearable technologies,” said Dr. Jong-seok Park, president and CEO of LG Electronics Mobile Communications Company. He added that “Wearables allow us to stay connected without the worry of losing a device or the inconvenience of having to carry a large item in a pocket.”

The device’s battery is rated for 36 hours and parents will get an alert on their phone if the battery falls below 25%.

 

Posted in Child safety | Comments Off

The ‘real world’ is a lot more dangerous than cyberspace

by Larry Magid

This post first appeared on Forbes.com

The media is full of horror stories about online dangers, but — in all but a few categories — offline risk dwarfs its online equivalent.

Stranger danger vs. trusted adults

Let’s start with children. Every parent worries about their kids being harmed by strangers, but – whether offline or on — children are at far more risk from trusted adults than people they don’t know.

According to the U.S. Department of Justice’s Facts, Myths and Statistics page, “in as many as 93% of child sexual abuse cases, the child knows the person that commits the abuse” and as many as 47% of the perpetrators are family or extended family members. And there are numerous cases of abuse by teachers, clergy, police officers, pediatricians and others kids trust. Based on actual risk statistics, instead of keeping kids offline, maybe we should keep them away from school, clinics, houses of worship and even their own homes.

We also worry about cyberbullying, but research from the Centers for Disease Control and other studies puts both the rate of cyberbullying below physical bullying. And, where cyberbullying does occur, it typically is an adjunct to bullying at school or other places where children gather. If you are concerned about cyberbullying, check out this parents’ guide I helped write.

Even sexting, which sometimes gets kids into legal trouble, has been blown out of proportion. As a general rule, I think it’s a bad idea to send out naked pictures of yourself — even to an intimate partner, but lots of people do and most of the time the pictures stay where they are intended and aren’t shared. But as problematic as it might be, it’s arguably a form of “safe sex” that — unlike real sex — can’t possibly cause a sexually transmitted disease or an unwanted pregnancy.

Physical safety

Like most parents, I worried about my kids’ physical safety, but I was a lot more worried about car and even bike accidents than about online dangers.  Hundreds of thousands of children and teens are injured annually in car accidents.

And don’t forget school sports. Every year children are injured playing baseball, football, soccer and other sports. Yet most families encourage school sporting programs because of all the benefits. Social networking, texting and smartphone use also benefits and even though they are associated with some risk, the harms associated with these technologies are a lot lower than what can happen on an athletic field.   According to Safe Kids Worldwide (not affiliated with my site, SafeKids.com), one in three children who plays a team sport is injured seriously enough to miss practice or games.

I’ve been a print and online journalist since the 1980′s but the most dangerous job I’ve ever had in the publishing industry was when I delivered newspapers by bicycle as a kid.

Although we were of course concerned about our kids’ online contacts, my wife and I were a lot more concerned about the friends they knew from school. Most, of course, were great, but I can think of a couple of who were pretty bad influences on our kids who, fortunately, had the discipline, resilience and self-respect to resist those negative influences. And there were also those non-friends, including the girls who bullied my daughter in middle school and the boys that bullied me in school, long before there even was an Internet.

And lest you think things have gotten worse since kids started going online, check out The Internet, Youth Safety and the Problem of “Juvenoia” by Crimes Against Children Research Center director David Finkelhor who points out that since the early 90′s, the rates of sexual assault, unwanted pregnancy and even bullying, crimes committed by teens and teen suicide has gone down, not up.

Risk for adults

Adults face risks both online and off. For example, there are risks associated with shopping online, but there are also risks when you shop offline. Your wallet could be stolen, you could leave the credit card at the store, the clerk could clone your card or you could have a car accident on your way to or from the store.

Adults who date online also take risks, but so do those who meet their partners in bars and other locations.

Regardless of our age, there are privacy risks when going online or using smartphones and I would agree that online tracking, phone geolocation features and the hundreds of thousands of mobile apps do present some privacy concerns that we don’t have in the physical world.  Still, there are plenty of reasons to worry about privacy in non-cyber settings, including school, workplaces, hospitals and even grocery stores that track what we buy. Failing to shred sensitive paper records remains a risk as does talking about private matters in public.

The bottom line is that we need to be concerned about all risks whether online or off, but we should thinking that technology related risks are any more pernicious or serious than ones we’ve been taking for centuries.

And, whether the risk comes from online or offline activities, we also need to remember that life can never be risk free. Everything we do has risks and the trick is to try to balance those risks while still enjoying life.

 

Posted in Child safety | Comments Off

Why I don’t want to hear about any new parental control products

It’s hard to get through a week without hearing about a new product designed to protect children online or on mobile devices. Some of these products block content, others give parents some control over who their kids can communicate with but most offer some sort of monitoring, giving parents a glimpse into what their kids are doing on their mobile and other connected devices. Increasingly, these products are being marketed as a way of detecting and preventing bullying.

It’s not uncommon for these products to be developed or at least inspired by parents who have had an experience with their kid being bullied or exposed to inappropriate material. The parent may have been outraged by the incident with a sincere desire to help other parents avoid the same issues.

My advice to anyone thinking about creating such a product is to first take stock of the many other products and services in this already saturated field and second take note that even those products — collectively — have relatively low penetration rates.

I also urge any would-be parental control entrepreneurs to consider that one product can’t possibly serve all families. Controls that block inappropriate content usually work well for young children but not for older ones. Products to monitor Internet or mobile use may be necessary for some kids, but not for most. Studies have shown that kids who get into some type of trouble online are usually risk-takers in other aspects of their lives as well. And if you think a monitoring program will stop cyberbullying, consider that the majority of bullying takes place in-person and not online, and even when it is online (or mobile) it is often a reflection of what’s going on at school or wherever kids gather in the physical world. For more on bullying, see A Parents’ Guide to Cyberbullying.

And, before you think you’re going to earn a lot of money from your product, be aware that there are a number of excellent free parental control tools from Microsoft, Symantec and other companies.

I’m not aware of any accurate up-to-date data on the parental control marketplace but everyone I’ve spoken with in the know admits that it’s pretty small. A 2011 study done by Hart Research for the Family Online Safety Institute (FOSI) found that just over half the parents (53 percent) said they have used controls to limit or monitor their child’s online behavior with products ranging from PC filtering programs that limit what sites a child can visit to services that monitor children’s activities on mobile devices. But “have used” is not the same as using. I’m one of many parents who used controls for a short period of time and then stopped after realizing that having occasional conversations with my kids was a more effective, and lasting, way to influence their behavior. 

Even though the survey found that 47 percent of parents haven’t used these tools, 87 percent of them were aware that such tools are available, and 93% had a set rule to limit or monitor their children’s Internet usage. Parents know these products exist and most have other ways to help their kids stay safer online.

That same study found that 60% of parents who are not using controls say that controls aren’t necessary because they have household rules that their kids follow.

And even for parents who do feel a need to use parental-control software or service, it’s important to remember that they are never a substitute for common sense, engaged parenting and — most important — teaching kids to be respectful of others, self-protective and resilient. Eventually your kids will grow up and one of the purposes of childhood is to learn to protect yourself long after mommy and daddy and whatever tools they employ are off the job.

Screen Shot 2014-07-03 at 7.53.37 AM

FOSI survey summary. Click here or on image for full-size infographic

Links

Digital citizenship & media literacy beat tracking laws & monitoring

Evolution of online safety: Lessons learned over 20 years

The Internet, Youth Safety and the Problem of ‘Juvenoia’,” by David Finkelhor PhD

Posted in Child safety | Comments Off

PTA panel tackles digital citizenship (slideshow)

I was honored to be on a panel at the National PTA Conference in Austin, Texas focusing on digital citizenship (scroll down for a description and list of fellow panelists).

Panelists explored both the meaning of digital citizenship and strategies for educating students and parents on how to navigate 21st century technology productively and safely. While cognizant of challenges, each speaker emphasized the incredible value of technology at school and at home, stressing the importance of access while reflecting on how parents and kids can put thought into how they present themselves in a digital environment.

The panel was sponsored by Lifelock, which is helping support the PTA’s efforts in this area. ConnectSafely.org is working with the PTA on digital citizenship, Safer Internet Day and the One Good Thing campaign. 

Here’s my KCBS radio segment about the panel.

Below is my PowerPoint that covers the evolution of online safety, some thoughts on risk and protection, my definition of digital citizenship (which includes rights) and a bit about ConnectSafely.org and the work we’re doing.

PTA’s description of session

When students do homework on their tablet or computer or network with friends, how do we ensure they are creating a thumbprint of their digital self that will positively affect their present and future? How do we establish screen time limits? How do we make sure that positive social media etiquette is as natural as looking both ways before crossing the street?

A panel of leading experts including National PTA, a leading online safety organization, and educators will lead a discussion about the best ways to engage with our kids to establish safe practical ways that students, parents and teachers can encourage simple and effective online habits that will carry through to adulthood.

Attendees will also learn ways to engage student leaders in bringing awareness to this issue, especially during celebrations like Digital Citizenship Week in October and Safer Internet Day in February.

Speakers:

  • Mary Pat King, Director of Programs & Partnerships, National PTA
  • Catherine Teitelbaum, Digital Safety Expert and Consultant for LifeLock
  • Larry Magid, Co-director, ConnectSafely.org
  • Rebecca Levey, Co-founder, KidsVuz.com

Posted in Child safety | Comments Off

Aspen task force would take learning ‘back to the future’

This post first appeared in the San Jose Mercury News

The Aspen Institute Task Force on Learning and the Internet released an outstanding report whose title, “Learner at the Center of a Networked World,” suggests a radical rethinking of how we approach education.

Screen Shot 2014-06-20 at 12.38.54 PMThe report was the product of about 20 leaders with expertise in technology, public policy, education, safety and privacy including my co-director at ConnectSafely.org, Anne Collier. Jeb Bush and Rosario Dawson served as honorary co-chairs.

I’ll get to the report in a moment, but as I read it, I couldn’t help to reflect back to my own experiences from a few decades ago, beginning when I was an undergraduate at UC Berkeley.

In 1967 I had the privilege of being one of the student coordinators of Berkeley’s Center for Participant Education, a student-initiated course program that was born out of Berkeley’s Free Speech Movement. CPE, like other “free universities” and “alternative schools” that popped up around the world in the ’60s and ’70s, promoted student-centered learning by giving students the power to initiate and help direct their own learning, using resources from local faculty, the community and subject matter experts, including some without traditional academic credentials. By getting faculty sponsors, we were able to offer academic credit for non-traditional learning.

There was no Internet back then, but we did have museums, libraries and access to people from the community such as artists, musicians, bakers, bankers, park rangers, social activists, and people with and without all sorts of advanced degrees and impressive credentials, including some who were internationally recognized as leaders in their fields. And — even without the Internet — there were plenty of other resources, including newsletters, films, records, and of course, books and periodicals. We didn’t have blogs, but we did have mimeograph machines and megaphones. But, mostly, we had an attitude that students were the center of their own learning and that any student had the right to help fashion a learning environment, based on his or her own needs and learning style.

Screen Shot 2014-06-20 at 1.18.55 PM

A.S. Neill’s Summerhill was written in 1960 and helped inspire the movement for educational reform

In 1969, I moved to Washington, D.C., to run the Center for Educational Reform, a Ford Foundation project of the now-defunct National Student Association, that helped bring this concept to universities and secondary schools around the country. Another nonprofit, New Schools Exchange, published a newsletter that supported hundreds of student-centered “free schools,” where even young children were able to help shape their own learning environment.

Fast forward to 2014. Technology has unleashed incredible resources for individualized learning, but — somewhere between 1970 and today — educational reform got hijacked and redirected by well-meaning policymakers whose strategy seems to be more aimed at preparing students to take standardized tests and less toward student and parent empowerment and the ability for young people to articulate and achieve their own dreams, goals and aspirations.

So, imagine my delight that a group of 21st century experts assembled by the Aspen Institute took us back to the future with recommendations for a “new culture of learning” where “learners must move from the passive absorption of content to a new sense of agency that enables them to find a path that makes sense for their individual interests and learning styles.” These are great ideas, reminiscent of what pundits like John Holt, Ivan Illich, Herb Kohl and Jonathan Kozol wrote back in the ’60s.

What is different of course is that with modern technology there are no more excuses for education to remain in the dark ages. As the Aspen report ably documents, the proliferation of broadband and mobile devices is already “helping students chart their own unique pathways of learning subjects as well as adjusting the pace of their learning.”

I fully support the task force’s recommendations, which include redesigning “learning environments to empower learners to learn any time, any place, and at any pace, both in school and beyond,” as well as building “an infrastructure that will connect all students in all of the places they learn.” The task force also called for open standards and “protocols that simplify and promote interoperability of learning resources” and — my favorite recommendation — that schools adopt “policies to incorporate digital, media and social-emotional literacies as basic skills for living and learning in the digital age.”

I also applaud the Aspen task force for taking on laws like the Children’s Online Privacy Protection Act, which, though intended to empower parents to protect their children’s privacy, has the effect of preventing children under 13 from participating in popular social media services along with what the report called the “unintended consequence of encouraging children to make use of sites that do not attempt to enforce COPPA’s restrictions and that may be less conscientious about protecting young users.”

The task force also calls for “deeper research on the efficacy” and possible negative side effects of privacy and safety laws such as the Family Educational Rights and Privacy Act (FERPA), the Children’s Internet Protection Act (CIPA) and various state laws.

I’m not anti-regulation and I certainly agree that government has a role to play in protecting the privacy of both children and adults, but I agree with the task force that we need to examine the unintended consequences of even the most well-meaning legislation.

Links

Learner at the Center of a Networked World splash page. Full report (PDF)

A task force report & a student bill of rights: Task Force member and ConnectSafely co-director Anne Collier’s commentary about the report and the work of modern-day student activists

Make personalized learning a realty says ed tech task force: Observations and commentary by Family Online Safety Institute (FOSI) CEO Stephen Balkam

 

 

Posted in Child safety | Comments Off

Parents have a lot to learn about mobile safety, privacy and security: from their kids

After spending a lot of time writing and editing our new free booklet, A Parents’ Guide to Mobile Phones, my ConnectSafely.org colleagues and I came to the realization that parents do have a lot to learn — from their own kids.

Sure, our guide has all sorts of tips and suggestions, but our most important point is that parents should talk with their kids about their mobile use.  Note I said “with,” not “to.” An open, two-way conversation with your kids about their mobile use is a lot more effective than a lecture. Besides, you might discover they know more about safety, privacy and security than you think. Maybe more than you do.

ConnectSafely produced the guide in partnership with CTIA, with support from AT&T, Sprint, T-Mobile and Verizon Wireless.

Studies from Pew Research Center and as well as ethnographic research from danah boyd and others have found that kids are far from clueless when it comes to privacy and safety issues. That’s not to say that your kids don’t have anything to learn — we all do — but that you shouldn’t assume that they’re using their technology in a reckless fashion, even if you’ve seen some press reports making that claim.

Advice for parents

As far as our guide is concerned, we advise parents on things that matter including the best age to get a child their first cell phone, how to make sure your child’s privacy is protected and how you can help assure your child uses apps that are safe and appropriate. We also talk about how to use the phone’s settings to maxiumize privacy and security and advise parents to be sure their kids are using a pass code of some type to make sure that others can’t use their phone. In addition to protecting their data, keeping others from accessing their phone reduces the risk of someone using it to harass or bully others and get your kid into trouble.

Location

The guide warns parents about the possible misuse of geolocation — the feature that allows apps to pinpoint the phone’s (and therefore the user’s) location. While these features can enhance safety and give parents the ability to track their kids, they can also be misused. As we say in the guide, “With the exception of E911, it’s possible to turn off geolocation, either for the entire phone or just for specific apps.”  Parents and kids “can review the apps on their phones to see which apps share location. If you’re uncomfortable with any of them, you can try to turn off the app’s location feature or just delete the app.”

Tools

There are parental control tools from carriers, phone makers and app developers that parents can use to monitor or even limit what they’re kids can do on their phones and while such tools can be helpful in some cases, they’re not for every kid. If you do use monitoring or filtering tools, talk with your kids about why you’re using them and consider weaning them away from those tools as they show that they are responsible mobile users. Kids don’t stay kids forever and our goal as parents is to teach them the critical thinking skills that will last a lifetime in whatever situations they encounter. As my ConnectSafely co-director Anne Collier pointed out, “safety, privacy and security depend less and less on external safeguards (such as parental control tools, which can give parents a false sense of security) and more and more on the “filtering software” in their heads and hearts.

A Parents Guide to Mobile Phones is available in both English and Spanish.

 

Posted in Child safety | Comments Off

Aspen Institute Task Force takes on education in the Internet age

The report: Learner at the Center of a Networked World

A task force report & a student bill of rights: Task Force member and ConnectSafely co-director’s commentary about the report and the work of modern-day student activists

Make personalized learning a realty says ed tech task force: Observations and commentary by Family Online Safety Institute (FOSI) CEO Stephen Balkam

Posted in Child safety | Comments Off

Google complies with “right to be forgotten” but is it the “right” ruling?

The European Union Court of Justice ruling about the “right to be forgotten” is more wrong than right. Of course I sympathize  with the individual who pressed the claim — a Spanish citizen who was upset that Google was linking to a notice  in a newspaper about his repossessed home from 1998. But even though the newspaper article may have been old and by now irrelevant, it was still factual and Google’s only crime was pointing to a web page without making any value judgement — something Google has proudly done since the day it was founded.

Why it’s a bad decision

I have several problems with the court’s order. For one thing, it puts Google into the position of having to make editorial decisions about the content it points to, which kind of defeats the purpose of a search engine. I’m all for curated content, but that’s not what Google does. It simply scours the web to unearth content and makes that content available via search. If Google has to start making decisions about whether to include content that someone might want forgotten, what other editorial decisions might it make about content? Do we really want Google effectively censoring the web by failing to surface legal content?

Another problem I have with the right to be forgotten is that history is history, regardless of how unhappy someone might be to have it revealed. If something happened — even if it is outdated or irrelevant — it still happened and stories about it are part of the historical record. It’s the electronic equivalent of shredding old newspapers because you don’t like what’s printed in them.

It also creates a false sense of security because the court ruling doesn’t require that the information be taken down — just removed from search results. In other words, it’s still there and there may be other ways for people to find it.

Google’s Search removal request form

Google has created a web page where you can request that they “remove results for queries that include their name where those results are ‘inadequate, irrelevant or no longer relevant, or excessive in relation to the purposes for which they were processed.’”

On that page, the company said that it “will assess each individual request and attempt to balance the privacy rights of the individual with the public’s right to know and distribute information.” Factors will include whether the results include outdated information about you, as well as whether there’s a “public interest in the information—for example, information about financial scams, professional malpractice, criminal convictions, or public conduct of government officials.”

Europe only

The form is for Europeans only. The person has to select their country from a dropdown menu of 32 countries and must provide some form of identity verification and check a box certifying that the “information in this notification is accurate and that I am the person affected by the web pages identified, or I am authorized by that person to submit this request.”

People are required to provide the URL they want removed along with an explanation.

No appeal

Google has no choice but to abide by the court’s decision and, because it is the highest court in Europe, there is no appeal.

For more, see Anne Collier’s post, Remember: The ‘right to be forgotten’ is shared

Posted in Child safety | Comments Off

Missing Children’s Day — let’s bring them all home

Screen Shot 2014-05-25 at 10.13.26 AMSince it was founded 30 years ago, the National Center for Missing and Exploited Children (NCMEC) has helped reunite thousands of missing kids with their families.

I have had the privilege of serving on NCMEC’s board for nearly two decades and, since that time, we have seen a dramatic increase in the recovery rate thanks to NCMEC’s dedicated staff along with alert members of the public who report sightings of missing kids. From 1984 through December 2012, NCMEC has assisted law enforcement with more than 195,300 missing-child cases resulting in the recovery of more than 183,100 children, according to the organization. The  recovery rate for missing children has grown from 62% in 1990 to 97% today.

Screen Shot 2014-05-25 at 10.54.32 AMI became involved with NCMEC in 1993 during the search for Polly Klass, a 12-year-old girl who was abducted from her Northern California home, about 80 miles north of where I live. During the search I helped post Polly’s picture online. When Time magazine wrote about the effort, I was overwhelmed by requests from parents of other missing kids, which led me to contact NCMEC’s then CEO Ernie Allen who quickly realized the potential for using online tools to help find children. Even though we couldn’t save Polly, online tools such as MissingKids.com are now used routinely to help in the recovery of missing children.

Public-Private partnership

NCMEC is a non-profit organization, not a government agency, though it was authorized by Congress to serve as the national clearinghouse for information about missing and exploited children. Congress has also designated NCMEC to run the national, toll-free, 24-hour missing children’s hotline; and operate the CyberTipline for online reporting of the sexual victimization of children and inappropriate sexual content.

NCMEC is a unique public-private partnership which receives funding from both the Federal government and numerous private donors ranging from large companies individual donors from all walks of life — including young children who conduct fund-raisers or donate their pennies to help other kids.

Key facts

As you can see from the key facts below, only a tiny percentage of missing children cases involve “stereotypical’ abductions but even children who are abducted by members of their own family can be in extreme danger and deserve to be protected and returned to their lawful parent or guardian.

And it’s not just missing children. NCMEC helps prevent and prosecute cases of child exploitation, including sexual exploitation of children as young as infants. The organization also works to rescue underage victims of prostitution, helping them recover from the trauma of what is often forced or coerced and extremely traumatic exploitation by adults who profit through human trafficking.

NetSmartz workshop's "Clicky" teaches young children about Internet safety and digital citizenship

NetSmartz Workshop’s “Clicky” teaches young children about Internet safety and digital citizenship

NCMEC also operates the NetSmartz Workshop, which provides high-production value materials to help educate young people about how to stay safe on and offline.

Here are some “key facts” from NCMEC’s website.

The most recent, comprehensive national study for the number of missing children estimated in 1999: [1]

  • Approximately 800,000 children younger than 18 were reported missing.
  • More than 200,000 children were abducted by family members.
  • More than 58,000 children were abducted by nonfamily members.
  • An estimated 115 children were the victims of “stereotypical” kidnapping. These “stereotypical” kidnappings involved someone the child did not know or was an acquaintance. The child was held overnight, transported 50 miles or more, killed, ransomed or held with the intent to keep the child permanently.
  • To find the number of children missing from a specific state or territory contact the state’s Missing Child Clearinghouses.
  • The first three hours are the most critical when trying to locate a missing child. The murder of an abducted child is rare, and an estimated 100 cases in which an abducted child is murdered occur in the U.S. each year. A 2006 study indicated that 76.2 percent of abducted children who are killed are dead within three hours of the abduction. [2]
  • The National Center for Missing & Exploited Children® has assisted law enforcement in the recovery of more than 193,705 missing children since it was founded in 1984. Our recovery rate for missing children has grown from 62 percent in 1990 to 97 percent today.
  • The AMBER Alert program was created in 1996 and is operated by the U.S. Department of Justice. As of April 2, 2014, 688 childrenhave been successfully recovered as a result of the program. [3]
  • As of Dec. 2013, NCMEC’s toll free, 24 hour call center has received more than 3,899,964 calls since it was created in 1984. Information about missing or exploited children can be reported to the call center by calling 1-800-THE-LOST (1-800-843-5678).
[1] Finkelhor D., Hammer H., Schultz D., Sedlak A. National Estimates of Missing Children: An Overview, U.S. Department of Justice, 2002.
[2] Brown K., Keppel R., McKenna R., Skeen M., Weis J. Case Management for Missing Children Homicides: Report II, National Center for Missing & Exploited Children and U.S. Department of Justice, 2006.
[3]AMBER Alert, U.S. Department of Justice.

 

Posted in Child safety | Comments Off