Protect Your Kids from Internet Predators Part 2

Protect Your Kids from Internet Predators Part 2

A couple weeks ago, author John Girolamo spoke with us about dangers from online predators. Today, we have the second segment of that interview.

Check out this episode!

Cynthia: We’ve been talking about human trafficking two weeks ago, and we are coming back to finish the topic. We were talking about some of the things the predators do and some of the grooming that goes on. John tell us how parents can be pro-active.

John: Sure. I think the first thing that any parent is going to want to know is what applications are on their kids’ phones. Go into your iPhone or Android and figure out what’s been downloaded. Set up some parental control software programs such as bark and canopy. Those are very popular, and they’ll help you manage that. However, you’ve got to check those things. And you need to check them often. Also, a lot of these programs have a secret or hidden folders. For example, Snapchat is a very popular program, and it has a secret folder called ‘for my eyes only,’ so if you’re not aware of that as a parent you have no idea what’s in there. You may be checking their Snapchat story think it’s appropriate and probably it is, but who knows what’s in this folder. Who knows what picture somebody has sent your kid. It really takes a lot of diligence, and not only just checking things but having those conversations with the kid explaining what your values are. What’s OK. What’s not OK, What are the time limits. I always recommend the child give you his or her phone when they go to bed. Don’t let it take them into their room. It’s a great way for a kid to waste time and not get good sleeping patterns. Who knows what they’re doing? You may have a parental control software set at 10:00 PM so they cannot have Internet access. Well, if they’ve set that time zone to Hawaii time, and you’re in New York City, well it’s not 10:00 PM. They can get around those things and so you’re going to want to be aware some of those ways that teens circumvent things. There’s just no way around it, you must be diligent, and you have to check often. If you do it once at 13, you’re going to have to do it many times throughout their young adult life. When you’re coming up with some interesting information.

Cynthia: You’re talking about a phone which your child is taking it to school with them. How can you monitor a phone?

John: You’re talking about something that’s going to be with the kid, and that means that they may not be using the family computer, which is going to be a little bit harder to control. Then there may be other programs besides just playing social media.

Cynthia:  You’re talking about a bunch of programs like Snapchat. What are some of the other ones important to watch?

John: Programs like TikTok, Snapchat, and Instagram are probably the most popular in that say 12- to 20-year-old age group. Just about every kid has that now. The problem with a lot of these programs is you have no idea what all these other people are doing. A lot of these kids like to have lots of followers, so they’ll get a friend request, and they’ll just say sure, why not. I saw an interview of a teenager who said that that she would rate Snapchat and TikTok as R. She was quoted as saying “gross nudity pics just show up on my phone.” Parents think if you use privacy settings, that it’s going to keep their child safe. I can guarantee you that stuff is going to show up on their phone that they have no intention, and it will be inappropriate. That’s the problem with some of these programs and if you do any kind of search on a program like Tik Tok, you can link right to porn sites right away. The tech companies are going to tell you they have safety measures etcetera. I’m here to tell you it doesn’t work because people put up and take down profiles in a matter of minutes. If someone like Tik Tock or Snapchat throws off somebody, they’ll just go and create a brand new profile for that app. These things can happen really fast. You need to be checking that. Honestly, it’s not just girls, it’s boys as well. One example that’s very common is a girl will make a friend request to a teenage boy. This will be a very attractive college age person, usually a fake profile. They will make a connection online, and the next thing you know this woman has sent your teenage boy an explicit picture probably from a porn site. Then she’ll pressure him into sending his own picture. I’ve sent it to you now, you show me. When he does that, he will be immediately extorted for money. I’ve talked to police officers about this. All of this happens within 24 hours, and so it can be very quick, and that’s a tactic that these predators use all the time. Of course, once the pictures are out there on the Internet, it really doesn’t go away. This person on the other side will threaten to send it to this person’s other friends and family members etcetera. They’re counting on that teenager’s shame, and they’re trying to extort money from them.

Cynthia: Oh, my goodness. Teach your kids not to befriend just anyone. Instead, be suspicious of anybody unless they know that person already and have talked to them in person.

John: Yeah, that’s really the recommendation. I mean obviously, there can be issues with people you know. There’s cyber bullying. Things happen in the middle school and high school level between classmates, but at least there it’s somebody you know in their peer group. Not some adult predator that maybe after them.

Cynthia: This is more complicated than I expected. If people can create a profile and then get out of it and get another profile really quickly, it’s going to be hard to catch them.

John: It’s very difficult for law enforcement because of the way that these profiles are so easy to put up and take down, and a lot of these predators have multiple profiles. There are really no controls in place to stop somebody from doing that. Organizations like Stay estimates their 750,000 predators online at any time. It’s almost a guarantee that some predator will approach your kid online at some point. If they are online from 12 to 18, that’s six years, and at some point some predators are going to try to contact them.

Cynthia: Do you advocate not giving your address, or not giving information at all online.

John: Yeah, absolutely. You definitely don’t want to give their address in your profile. I also recommend, especially for the younger ones, not use a real picture of yourself. Put a picture of a pet, or a sport, or whatever that you might be interested in as your profile picture. Have the privacy settings not only on the phone, but on the application itself. Because if you take a picture, that picture is typically embedded with GPS coordinates, so if somebody looks at that picture, they’re going to know exactly where you are. Check the privacy settings on both the overall phone and the application.

Cynthia:  Your phone gives information about the location. I had forgotten that.

John: Yeah, that’s pretty much embedded in smartphones. There are things called GPS spoofer programs which will trick the phone into saying where that child is. So, it’s typically you’ll see that in sort of the later teenager. They say they’re going over to their best friend’s house. They plug in the address, but really they’re at some party or something like that. That ties back into knowing when applications are downloaded on the phone, and you as the parent, should be the only one approving.

Cynthia: You also need to be able to understand the phones because I’m discovering I don’t even understand my phone, and I’m an adult.

John: There are things called dumb phones. There are a couple different products out there, and what they’ll do is they will have phone and some texting information. You give that phone to your kid. “I’m done with practice come pick me up etcetera,” but it doesn’t have Internet access. It doesn’t take or receive any kind of photos. That can limit some of the things going on. Let’s face it the kids are always one step ahead of the parents on technology. Kids are always looking to circumvent some kind of parental control, and the Internet is helping them. I give presentations about this subject, and I tell the parents get out your phone, go on to YouTube and type in what to do if you have strict parents. There’s thousands of videos put up by teenagers explaining to other teenagers how to circumvent their parents.

Cynthia: That’s scary.

John: Yeah, it’s frightening actually.

Cynthia:  I’m kind of glad my kids are grown.

John: I understand. In the old days if you wanted to be sneaky, you had to either be creative or ask your friends.  Now you just ask Siri or Alexa or YouTube.

Cynthia: If I have a problem on my computer, all I have to do is go to YouTube, and ask a question. I can find 10 answers. Is that how kids find information?

John: Imagine if they’re looking up how to get around parental control software or something like that. There’s information out there for kids to try to follow, and there’s all kinds of things that they can do. They can start the phone in safe mode and download apps that look like other apps. It’s a fake program. I mean there’s a calculator program out there that does real math, but it advertises itself as hiding your secrets in different folders. But yet it’s a real calculator program, so a parent thinks, “Oh, they’re doing their math homework.” Maybe, maybe not.

Cynthia: That gets into the whole issue of openness and honesty. Anytime something is secret that’s a little bit suspicious. I think we need to be teaching our kids character and openness so that they’re open with what they’re doing. Evil is going to hurt them. That’s a conversation you might want to have with your kids too.

John: absolutely.

Cynthia: I’m not a young woman, but at least once a week somebody comes on and says “Oh you’re so pretty. Can we have a conversation? Will you be my friend?” I’m thinking, yeah right. I’m an adult and they do it to me, so I know they must do it to young people.

John: Yeah, absolutely. They’re out there, and every parent wants to keep their kids safe. You’ve got to be involved you got to be diligent. You must have those conversations. You must explain values, explain the danger, and put some parameters on them. Kids are always going to try to push the envelope, and they may not even be looking for some problem. But there are cases out there where somebody was on a group chat, and there’s this thing called revenge where somebody will send a picture of themselves. They break up, and now they’ve sent that picture to 20 people on a group chat. That’s happened at the middle school level between different students and that’s happened more than once. Since it’s unfortunately a common occurrence. Your kid might not even ask for any pictures, but now suddenly, they’ve got it. If it’s middle school or early high school, it’s child porn that’s now on your kid’s phone. That’s a problem. Now they can manipulate pictures even if they took a picture of you, they can manipulate that, and it wouldn’t even be you. But they could send it out as if it was. There are all kinds of possibilities. They may try to use that to extort somebody. You might say “Hey, that’s not really me. I never did this,” but if they go and send it on your friend list, 1000 different people That’s a scary blackmail tactic.

Cynthia: And your reputation is ruined.

John: You’ll spend all your time trying to defend yourself, and that’s where cyber bullying comes in. That’s going to lead to teen depression, low self-esteem. That’s when you’re going to want to look for those behavioral changes in your kid. It could mean all kinds of stuff, but it could mean this type of situation too. If they suddenly become angry, defiant, or on the other side become withdrawn and never leave the room. They don’t want to talk. Something’s going on. It may not be computer related, but something’s going on. The parent needs to find out the source of that issue because it’s probably not going to resolve itself.

Cynthia: It’s important for us to have good relationships with them when they’re that age so that they will talk to us. That’s a tough time for them anyway, but it’s important to have good relationships. Is there anything else you can add before we close?

John: Yeah. I think the one thing that every parent needs to know is that teen sexting is on the rise where middle school and high school kids are sending pictures of themselves. That is a rising problem, and it’s not just stranger predator, but it’s also people that you know. There’s stats out there that say that by the time someone graduates high school 90% of the students have sent or received some kind of picture. So, it’s going to hit your child in some fashion. You need to have that conversation. Explain your values, why that’s inappropriate, for a variety of reasons. Explain it from a biblical perspective. I think that will go a long way and we haven’t even talked about pornography for guys because that’s another entire issue.

Cynthia: If kids get into porn, they can get addicted.

John:  It is addictive. Unfortunately, the stats are showing the average age is now about nine or ten years old, which is super young. That really works that person’s view of sexuality of marriage and relationships. That really feeds into the into the predator situation. That feeds into sexting. If someone’s viewing these types of explicit pictures on a regular basis, it can become addictive. They tend to be more violent, more degrading to women. That normalizes things for that viewer and so if they’ve started seeing this at 10 years old. At 15 it doesn’t seem odd that they’re asking their girlfriend for pictures. That’s a big problem when it’s normalized.

Cynthia: That distorts that sense of what a relationship should look like.

John: It certainly isn’t a Christ centered view of how human sexuality should look like. The girl or the body becomes objectified to get pleasure.

Cynthia: It has nothing to do with the relationship between two people which is much deeper than just the sex.

John: Absolutely. It’s more focused on just the physical body, pleasure in the moment, that type of thing. There’s nothing there about love, marriage, commitment etcetera, which is what parents should be instilling in their children. The big tech companies are not looking out for you.

Thank you, John, for informing us about this problem. You can find John at His book is called It’s Not About the Predator.

Protect Your Kids from Internet Predators Part 1

Protect Your Kids from Internet Predators Part 1

Technology has made our lives easier but has also brought serious risks. Today predators attempt to get to your children and entice them into hurtful relationships. How can we protect our children? Parents need to be informed.

John DiGirolamo has researched internet safety and has published several books.  He gave information from his book, It is Not About the Predator.

Check out this episode!

Cynthia: Technology has made much of our work easier. When I grew up, we didn’t have microwaves and cell phones. We had to put things in the oven and to be able to imagine putting a plate in the microwave or a paper plate in microwave is amazing. But today we also have the Internet and as far as our children are concerned that creates a lot of danger. We want to make sure that our kids are safe because the world is a very different place than when we grew up. Today I have John Gerolamo he is a man who has written on safety on the Internet and human trafficking. I had the mistaken impression for years the human trafficking happened elsewhere or that it happened on the border. But it happens right in your house because you have an internet. So, John is going to tell us a little bit about what these people are doing. Welcome, John.

John: Hey, thanks for having me on the show. I really appreciate it.

Cynthia: Tell us about what is happening out there on the Internet.

John:  Sure. So, you know the I think the first thing to kind of level with the audience to help them understand is that today’s kid and teen is different from any other generations. They’ve grown up with technology since day one, and they view having many friends and followers as a goal.  I view that as a problem because I guarantee that if your high schooler has 1000 friends which is not that uncommon, they’ll have somebody in there that’s not really your friend. It’s a predator. It’s somebody that they don’t know, but today’s team looks at online relationships in a similar way to kind of face-to-face real relationships, and that’s kind of different than other generations. And so, they’re a little bit more trusting of people that they’ve met online, and these predators are out there looking for trouble. You know your kid may not be looking for trouble, but I guarantee trouble is looking for them.

Cynthia: So, what do these predators look like, and what do they do?

John: As far as what they look like you really can’t tell what a predator looks like just from visuals or physical descriptions. Now what they’ll do is, they will set up many times a fake profile of somebody of similar age of similar interests. So, for example, if your teenager is really into soccer, they’re going to set up fake profiles like that, and if you look at stats from say you know the National Center of missing and exploited children, they point out that predators are looking for three things they want to extort money out of that teenager. They want to get explicit pictures, or they want meet for some kind of encounter. And so that’s what they’re after. Sometimes they’re very quick about what they’re wanting and then other times they’re going to groom that person over a longer period. They’re going to typically send out hundreds of friend requests seeing who’s going to respond to them, and the teenager that does respond is the one that they’re going to zoom in on.

Cynthia: So, you talked about grooming, and I’ve heard a lot about that. Can you describe the grooming process?

John: Sure, so the first thing they’re really going to want to do is they’re going to try to gain some type of trust with that person. A lot of times a teenager will go online because they’re bored or they’re lonely, and as soon as the predator finds out what’s going on in that person’s life that’s when they’re going to lie to them. They’re going to say, especially if they have a fake profile, that they have similar interests. They’re going to want to befriend that person and affirm whatever they’re doing, whatever they’re thinking. They’re also going to try to isolate that person from their friends and family. They’re going to say that you know the predator is the only one who really cares about them and really understands them. A lot of times that’s going to lure that teen away from their real family and their real friends, and those are some of the tactics that they use to initially get that trust and get them really manipulated.

Cynthia: So this would start with perhaps a friend request or maybe another friend would recommend this person? How does that work?

John: Yeah, it’s typically a friend a friend request, so for example, I interviewed an undercover police officer who went online with a fake profile of a 13-year-old girl. He had people sending this 13-year-old a friend request literally within the first hour, and within that same day, he had people asking this 13 year old out for a date. As the profile owner he would reply and say what do you mean by a date you know I’m only 13, I don’t know how to drive I must ride my bike where we’re going. They quickly can get into wanting to meet with them, and you know this officer met this person out of motel and probably arrested him. On that guys computer they found that he had just sent out hundreds of random friend requests, and about 90% had accepted that friend request without question because again a lot of these kids and teens they want to have a large number of friends and followers. That’s how you kind of value your popularity of how many likes did you get in your Snapchat story or something like that. So, the teens are vulnerable to that.

Cynthia: So they are going to immediately ask for a visit somewhere I mean that’s pretty bold?

John:  Right it is, and it and again, they are sending this out to hundreds of people. It just depends on who is responding to them and if they find a response, they’re going to try to figure out who this person is, and they’re going to give them lots of compliments. They’re going to say you’re so pretty you’re so talented only I understand. They’re really trying to kind of feed that person’s ego, and it’s always been difficult growing up. It’s always been difficult being a teenager, but in today’s world the kids really look for that online affirmation. The predators know that, and they’re going to focus on that.

Cynthia: Does the predator already know where that person lives because they might be too far away to have a personal meeting?

John:  Yeah, so a lot of times when people set up a profile, they will say what school they go to. So somebody could easily do a Google search. I’ve seen reports where the predators will drive hours across state lines just to meet up with somebody who’s agreed to meet up. So that long distance isn’t necessarily a deterrent, but yeah clearly, they’re going to look for somebody who’s local and a lot of people will do that. Many times, a predator will say something like, “Let me send you a gift,” and they send that person an Amazon pack.

Cynthia:  And then they give them an address.

John: If you send a package, you know that person’s address. So yeah so they’ll do little tricks like that.

Cynthia:  Wow, that’s scary. Should we be teaching our kids to be skeptical of people that give them compliments online?

John: Absolutely. And typically, what will happen is a predator will look for somebody in a very popular application, say Snapchat or TikTok, or some kind of game, and once they do that, they’re going to want to go into a private chat room. Or go onto a messaging service. That’s where they get that one-on-one online connection through these chat rooms, and as a parent what you must, well there’s lots of things you should be doing. But one of the things that you should be doing is talking to your kid about some of these predator tactics and to say if you don’t really know that person if you haven’t met that person you know live and really know who they are, then you really shouldn’t be talking to them online, because it’s so easy to slip up give out information. What school do you go to? What’s your address? Things like that.

Cynthia: OK, well we’ll talk more about the next interview about that. This is really good information. I appreciate your time. His book is It’s Not About the Predator. His website is here. I reach out to moms and talk about all kinds of topics that they need. I get right to the core of the issue. That’s why this is Heart of the Matter. I’m offering God’s timeless wisdom.

Get every new blog/podcast post delivered to your inbox
Join our list of followers
Powered By

What USA First Lady is your personality most like? Take our quiz!