Using the Internet to distribute child pornography. Using the Internet to download or otherwise view child pornography. Using the Internet to contact minors for sex. Sending obscene material to someone under the age of 16.
The person’s name and address. The person’s online screen name, if they use social networking (Twitter, Facebook, Myspace) to meet minors. Why you think the person is committing an online sex crime.
You qualify as an ESP if you provide remote computing services or electronic communication services across state lines or internationally in foreign commerce. You should have already registered your business with the National Center for Missing and Exploited Children (NCMEC). If your company has not, then you should contact NCMEC at espteam@ncmec. org and provide your company’s name, phone number, and email address.
Otherwise, you should keep the computer turned off. Doing so will help preserve evidence for law enforcement.
You should think about giving your name, even if you are allowed to report anonymously. By giving your name, you could provide critical testimony against the predator should the state bring a prosecution.
You can send tips by calling the hotline at 1-866-DHS-2ICE. This hotline is available around the clock. [5] X Research source
Information about the identity of anyone who may have violated the law. The geographic location of the individual or the website involved, which may include a verified billing address or the web address. The day and time the customer uploaded, transmitted, or received the apparent child pornography, or when and how you discovered it. You should include a time and date stamp on this information. Any images of apparent child pornography. The complete communication containing the image of apparent child pornography, including attached digital files.
Your child spends large amounts of time online at night. Because most predators work during the day, they usually contact children at night. Although most teens spend a lot of time online, your child may be vulnerable if they spend an unusual amount of time online at night. Also pay attention to whether your child is withdrawing from family or friends. This could be a sign that they are in contact with a predator. Your child is secretive about his or her online activities. For example, your child might turn the computer screen off when you enter the room or not want to tell you what they are doing online, or your child does tell you but acts agitated, pauses a lot, or shows other signs that they’re making stuff up. Your child receives phone calls from unknown numbers. This could be a sign that your child has connected with a predator online and the predator is now trying to talk over the phone. Your child is downloading pornography over the Internet. Predators often connect with children by sending them pornography as a way to begin talking about sex. Your child uses an online account that belongs to a different person.
Also tell your children never to give out identifying information online, such as where they live or their telephone number. [8] X Research source Explain to your children that any pictures they post could contain identifying information. For example, a predator can identify where your child lives by looking at the background of pictures they post and finding recognizable landmarks or businesses.
You should realize that this kind of filtering software is often easy to bypass. For this reason, you should also install Internet Monitoring Technology so that you can check what websites your child visits.
Web Watcher. You can install this on a computer or phone, where it remains undetected. All activity is collected and then sent to an account you can access from any computer. [10] X Research source Teen Safe. With this technology, you can view texts, call logs of incoming and outgoing calls, and view Instagram. There is a free trial period.
Of course, as an adult, you may like some privacy when you go online yourself. In this situation, you could use a laptop for your own web surfing but only let your children use the family computer in plain view.