Wacky Internet Predator Wednesday #225

More reasons why you should be using PC Pandora computer monitoring software to know who your kids are talking to online… and who is trying to talk to them!

In Tuscaloosa, Alabama, two men met a 14-year-old girl online and then raped her. Horrible.

January 9, 2013
Authorities stress online safety after rape arrests
By Kelvin Reynolds, MGN Online

TUSCALOOSA, AL (WBRC) - Tuscaloosa authorities are warning all social media users to be safe online after two men were arrested for raping a 14-year-old girl they met online.

Mike Chaisson with the Tuscaloosa Police Department says that the young victim met her alleged abusers on a social networking site through her smart phone. It's only when her mother followed a recommended social media safety tip – checking her child's phone – did she realize what had happened.

"Basically she decided to check her child's phone and that's something I recommend. I have a child myself and I check their media devices regularly," Chaisson said. CONTINUE READING›

Two men in Connecticut have been arrested for luring REAL underage girls online. Police were able to stop on before he met his victim, but not the other…

Protecting kids from online predators

January 11, 2013
Protecting kids from online predators
By Bob Wilson, WTNH

AVON, Conn. -- Two men have been arrested in two days after talking to underage girls online. Police were able to stop one of the men before he actually met the young girl, but how can you protect your child from online predators?

It has happened twice in the past 24 hours in Avon. First it was Joseph Stinnett. Police say they arrested him after he had a sexually explicit, unlawful chat with a 15-year-old girl. Police say they stopped him before he could carry out his plan to drive to Avon and meet the girl for sex.

Just one day later, a second, unrelated case. Police arrested Israel Gomez after meeting the girl online. Police say they met and had a sexual relationship. He has been charged with sex assault in the second degree and risk of injury to a minor. CONTINUE READING›

This article is about sex predators online, in general, in Arkansas… and the Benton County’s new Cyber Crime Unit. Very cool…

January 11, 2013
Sex Predators on the Rise in Benton County
By Christine Whitten, KFSM 5 News

Kelley Cradduck, the new Benton County Sheriff, said the number of online predators is on the rise and that child molesters are using chat rooms and social media sites to gain access to kids.

The sheriff’s office is now stepping up efforts to keep children safe from online predators.

“We see a real need to create this Cyber Crime Unit,” Cradduck said. “What we have is an overwhelming amount of information that we know child pornographers are sharing these files and going back and forth and doing these illegal activities online yet we didn’t have the man power that was assigned to it to take care of it.”

As for how many internet predators are out there, Cradduck said it’s a lot; but he is confident their Cyber Crime Unit will put a significant dent in that number. CONTINUE READING›

This final story highlights the work of Immigrations and Customs Enforcement (ICE) and their “Operation Sunflower” which targeted online predators.

January 12, 2013
Child sex abuse: 'Operation Sunflower' highlights new efforts to catch predators
Mark Guarino, The Christian Science Monitor (posted on AlaskaDispatch.com)

The same day this week that Immigration and Customs Enforcement (ICE) announced the arrests of 245 people accused of exploiting and abusing children, a tip alerted authorities to arrest one more suspect: a woman in Los Angeles whom law enforcement had identified in photos posted online that allegedly show her sexually molesting a girl thought to be 13 years old. The photos date back to 2001 and were discovered by ICE field agents in Chicago in 2007.

Such is the complex effort that goes into pursuing online sexual predators who rely on computer technology to produce and distribute images of their abuse and are becoming more adept at hiding their identities. CONTINUE READING›

Leave a Reply

You must be logged in to post a comment.