1/52
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Sextortion
Threatening to share someone's sexual images unless they send money, more images, or sexual favors.
Online Solicitation
When someone asks a minor to engage in sexual activity online.
Online Enticement
Using the internet to persuade or lure a minor into sexual activity.
Contact Victimization
When online abuse leads to in-person sexual abuse.
Online Sexual Victimization
Any sexual abuse or exploitation of a minor that involves the internet.
History (Online Sexual Victimization)
Increased with internet growth in the 1990s-2000s, especially with social media and smartphones.
Statistics
A significant percentage of youth report unwanted sexual exposure or solicitation online.
Vulnerable Populations
Youth who are lonely, LGBTQ+, have family conflict, prior abuse history, or high internet use.
Grooming
A process where an offender builds trust with a child to sexually exploit them.
Share Interests / Establish Rapport
Offender pretends to like the same hobbies to build connection.
Establish Trust
Offender becomes someone the child feels safe talking to.
Share Secrets
Encourages secrecy to isolate the child from others.
Break Down Barriers
Gradually introduces sexual topics or content.
Threats / Exploitation
Uses blackmail, guilt, or fear to control the victim.
Face-to-Face Meeting
Attempts to meet the child in person.
Youth Internet Safety Survey (YISS) - Where it was conducted
United States (national youth survey).
Youth Internet Safety Survey (YISS) - What it looked at
Online sexual solicitation, harassment, and unwanted exposure to sexual material.
Youth Internet Safety Survey (YISS) - Terminology
Defined terms like aggressive solicitation and unwanted exposure.
Aggressive Sexual Solicitation
Solicitation involving threats, attempts at contact, or repeated pressure.
Unwanted Exposure to Sexual Material
Accidentally or unwillingly seeing sexual images online.
Harassment
Repeated online behavior meant to upset, scare, or harm someone.
Distressing Incident
An online sexual experience that causes fear, shame, or emotional harm.
Child Sexual Abuse Imagery (CSAI) / Child Sexual Abuse Material (CSAM)
Images or videos showing the sexual abuse of a minor.
Applicable State/Federal Laws
Federal law (e.g., 18 U.S.C. § 2251-2252) criminalizes possession, production, and distribution.
Offender/Victim Patterns
Offenders often know the child; victims can be any gender, commonly minors under 18.
Possession / Distribution / Manufacture
Illegal to have, share, or create sexual images of minors.
Certain Uses of Computer Services Prohibited
Using the internet to exploit minors sexually is a federal crime.
Street Crimes
Traditional crimes committed in public spaces (robbery, assault).
White Collar Crimes
Non-violent crimes committed for financial gain, often by professionals.
White Collar Offenders
Typically educated individuals in positions of trust or authority.
Phishing
Fraudulent emails/messages pretending to be legitimate to steal information.
Spear Phishing
Targeted phishing aimed at a specific person or organization.
Embezzlement
Stealing money entrusted to you by an employer or organization.
Components of Embezzlement
Trust relationship, lawful access, intentional theft.
Embezzlement: Siphoning
Skimming small amounts of money over time.
Embezzlement: Salami
Taking tiny fractions of transactions repeatedly.
Ponzi Scheme
Fraud where returns to old investors are paid using money from new investors.
Transactional Fraud
Fraud involving unauthorized or deceptive financial transactions.
Overpayment Fraud
Scammer sends too much money and asks victim to refund the difference.
Advanced Fee Scam
Victim pays upfront fee for a promised reward that never comes.
419 Scam
Advance-fee scam originating from Nigeria (named after Nigerian law section 419).
Scambaiters
People who intentionally engage scammers to waste their time.
Romance Scams
Scammers fake romantic relationships to steal money.
"Pig Butchering"
Long-term scam where victim is "fattened up" with fake investment gains before large financial theft.
Identity Theft
Stealing someone's personal information to commit fraud.
Insider Trading
Illegally trading stocks using confidential company information.
Counterfeiting
Making fake currency or goods to deceive others.
Money Laundering
Hiding illegal money by making it appear legitimate.
Smurfing
Breaking large illegal transactions into smaller ones to avoid detection.
Delivery Methods
Ways malware spreads to devices.
Phishing (Malware context)
Malicious links or attachments sent through fake emails.
Spear Phishing (Malware context)
Targeted malicious messages designed for a specific victim.
Remote Desktop
Hackers gain control of a computer from a distance to install malware or steal data.