News Ticker

  • Florida Foreclosure Rates Soar

    The number of homes entering foreclosure dropped in February, but a new up-turn may soon be on its way.

    read more

    Actos Bladder Cancer Helpline

    Actos has warnings for Bladder Cancer in type II Diabetics. When the U.S. Food and Drug Administration (FDA) approved Actos...

    read more

  • Class Action Medical Device Recalls

    Get the most updated list of medical device recalls and class actions suits. Know what the FDA has listed warnings about.

    read more

    New Breast Implant Complications

    Our female social workers are extremely concerned about the Breast Implant Claimants and effects of faulty implants on women.

    read more

  • Nursing Home Negligence Lawyers

    Jewish Lawyers Network Nursing Home Abuse helpline has been initiated by our MSW and founder.

    read more

    Georgia Workers Compensation Helpline

    Jewish Lawyers Usa has launched a Georgia Workers Compensation Helpline for the Workers of Georgia.

    read more

  • Hernia Mesh Lawyers: The Hernia Mesh Lawsuit Helpline has hernia mesh lawyers  for patients needing mesh removals or revision surgery due to a failed hernia mesh. Hernia Mesh Complication Lawsuits For...
  • Diagnostic Error Lawyers | Missed Diagnosis: Did Your Doctor Miss a Serious Medical Problem? Was There a Misdiagnosis By A Radiologist, Physician Or Hospital? Did You Lose A Loved One Due To A Medical Error? Misdiagnosis i...

Jewish lawyers USA Internet Safety -Tips

The Internet can be a really great tool, fun to surf in your spare time, and totally entertaining. But remember, some things are just too good to be true. Unfortunately, we live in a world where people sometimes take advantage of others, especially youth. It’s good to be prepared; this may happen to a friend or a sibling. Anything on the Internet, whether it’s chat rooms or web sites, that attracts you and your friends will also attract predators. Many predators, people searching for young adults and teens to rape, kidnap or harm, now use the Internet as their tool of choice. Instead of doing research, like you are doing for that English paper, a predator uses the Internet to find victims. Predators communicate through chat rooms and instant messaging seeking to develop relationships with young people. They seek the trust of young people. When a trust forms, they ask to meet somewhere to check out a movie, window shop or get something to eat. Typically, a predator does all this while posing as a young adult or teenager himself. Internet Safety

Who are the cyber predators?

Not who you think:
  • 99% are male
  • Above average intelligence
  • Above average incomes
  • Have a successful career
  • 91% non-Hispanic white
  • Have computer knowledge
  • Many have children of their own
  • Have no criminal history related to sex crimes
  • 86% are older than 25

HOW THEY LURE YOUNG PEOPLE:

Predators use the anonymity of the Internet to talk to young adults. They look for many clues to figure out what you like, who you are and sometimes, even where you live. Too often, it’s made easy because information has been volunteered by young people

USER NAMES / SCREEN NAMES:

While a user name or screen name seems like a pretty innocent thing, it can be a gold mine of information for a predator. When choosing a user name or screen name, many people choose something familiar and easy to remember. You might think about your favorite bands, pets, hobbies and sports as part of a user name or screen name. But by doing so, what information have you given a predator to use?

User name: Abercromshoper89

This tells the predator that you like to shop, Abercrombie and Fitch is a favorite of yours, and that you were born in 1989.

User name: prisonerofhermione15

This tells the predator that you are a Harry Potter fan, you especially like the character Hermione Granger, and you are likely 15. Armed with this information, a predator will talk to Abercromshoper89 about shopping and fashion while talking to prisonerofhermione15 about Harry Potter and magic. It may not seem important, but providing a predator with any information that helps him learn how to become a trusted friend is unnecessary and potentially dangerous

WHEN CHOOSING A USER NAME OR SCREEN NAME

Think of the game “MadLibs.”Try using one of the followingformulas to select a user name:
  • Adjective + noun – stuffed ninja
  • Size + animal – minielephant
  • Season + noun – summerteeth
  • RANDOM number + ice cream flavor – 45cookiedough
  • Actor’s name + action verb – Travoltadancing
  • Color + foreign food – pucebaklava
A user name or screen name with arandom selection of words such as“Soupshoe” is much better thana potentially descriptive identifiersuch as “Missy1981”. Make sure youruser identifier doesn’t relate toyou, your age, your school, yourlocation, or your interests, and have fun with it!

THEIR TECHNIQUES:

Identifying a cyber predator is difficult because they sound like anyone else. Chatting online can be really fun and can be a quick way to make new friends, but it might not be the safest way. Predators have many techniques that they use to convince you that they are just like you, can relate to your problems, and would like to become your real friend instead of your online buddy. Giving you special stuff: Sometimes there are things that you may or may not want to see, like Playboy pinups or other sexually explicit material. Sometimes curiosity gets the best of us, but safety is always the most important thing to remember. When an online buddy sends you sexually explicit material, whether you want it or not, it is smart to stop speaking to that buddy. Predators use this technique to scare or befriend you. Almost all of the time this material is unwanted, but if you continue to speak to this person, they will push you to do more things than just look at inappropriate material. Ending the conversation with this person will tell that predator that you are not interested in what they have to offer as an online buddy any longer. Pretending: As stated in the previous sections, predators will often disguise themselves as teenagers and young adults. Sometimes they will let you know that they are adults, but most often they will befriend you online as a peer. These people can be very convincing and, without realizing what you have done, you may befriend a predator. There really is no way to know who is your same age and who is an adult, but being safe means ending communication with any online buddy if they begin to harass you. Remember, never give out too much personal information (not even an email address) and if anything mean or inappropriate happens, don’t be afraid to tell your parents. Threats: If an online buddy begins to threaten you because you refuse to meet him or speak to him anymore, the best thing to do is tell your parents. Predators exploit any weaknesses they can find. A predator’s objective is to make you do what he wants whether or not you want to do it. Getting advice from your parents will help you make the right decision and will make sure you stay safe. that picture… he said he wants to meet… User name tracking: Searching chat rooms or reading your blogs (online journals) are easy ways for a predator to learn how to talk to you and earn your trust. By following you through chat rooms, a predator can gather information about you and make you feel comfortable enough to talk to them about anything, even revealing secrets. Beware of someone who knows everything about conversations you have been having or are quick to say “the same thing happened to me.”

Photographs:

Putting photographs online is becoming more and more popular, especially with chat rooms, blogs, and online social networks like “myspace.com.” Unfortunately, there are a number of reasons why photographs are a problem: • Combining a photograph with personal information can make it extremely easy for a predator to find his way to your school or doorstep. • Photographs can be manipulated — your face put onto another person’s body in a sexually explicit photograph — and posted for anyone, including your parents, to see. • It is important to understand that a predator wants a picture of his prey. He will ask for a photo. He may ask for you to pose partially or completely undressed. If you send a predator a picture of yourself that you would not want your parents or friends to see, the predator can use that photograph to blackmail you into sending more. A predator is trying to control the person he is preying on. This is not a relationship about love; it is about control. • Pictures may be fun, but make sure that you post pictures only in places where people you know can view them. Be very careful when putting your photo online.

Email:

Sometimes you meet people who you really like online and you want to talk to them more than just in chat rooms. Giving out your email address or instant messaging screen name can be a good way to keep your conversation private. But be careful when you give out your email address. Often times your email has a profile that can be easily accessed by a predator. Emails are personal and are sometimes unsafe to give to online buddies. Limit the people who have your email address to friends and family, try not to give it to people you meet in chat rooms and set your chat profile to not display your email address.
  • 1 in 7 young people has received unwanted sexual solicitations online
  • 1 in 4 young people has been exposed to sexually explicit pictures online without seeking or expecting them
  • 1 in 17 young people has been threatened or harassed online
  • 1 in 33 young people has received an aggressive solicitation to meet somewhereting with strangers in a chat room
It’s easy to lie online because a person’s identity can be easily disguised, so you never know who you are talking to. 1. Giving out information to people online is just as dangerous as giving the same information to a stranger you meet on the street, maybe even more dangerous. 2. Using a webcam For a predator, a webcam is the next best thing to an in-person meeting. By allowing people to view your webcam, you are essentially opening the shades to your home or your bedroom and allowing a complete stranger to watch you through that window. Predators will use what they see to take advantage of you. They may record the video you send and post it for the world to see or simply wait and use it against you later. 3. Accepting webcam views fromrs By accepting an invitation to view live webcams from strangers, you could be exposed to unwanted nudity and sexually explicit video which could be disturbing. Remember, that 16 year old that is inviting you to see him is more likely to be around 50, overweight and hairy. 4. Arranging a face-to-facee Since it is not possible to know who you are really talking to online, you may be unpleasantly surprised when you discover that person’s true identity. Predators arrange meetings with youth for the purposes of hurting, molesting, raping, kidnapping,or worse. 5. Downloading pictures from an unknown source Downloading a picture may bring hidden viruses, which may destroy your computer, or place “cookies” that allow the sender to track where you go on the Internet, as well as key stroke trackers that may be used to steal your identity. 6. Filling out online profiles Filling out profiles will allow predators to see personal information about you, such as your real name, phone number, address, school name, etc., and will allow the predator to “find” you in real life. 7. Posting pictures of yourself on the Internet In addition to allowing anyone to get a look at you, digital photo manipulation can put your face on another body, in any graphic situation. When such a photo is in the possession of a predator, it can have devastating consequences. The predator might threaten to send the picture to your parents or spread it all over the Internet unless you do as he says. king sites Because these popular online features are virtual diaries, they give online predators a more intimate look into your thoughts and feelings. By reading postings on a blog, a predator can get a greater insight into your vulnerabilities, likes and dislikes and can “tailor” his message to you. It may take a predator some time to learn about you, but the more information you place on blogs, podcasts and social networking sites, the easier you will make it for the predator. The next time you think you have met your online soulmate, consider that it is more likely that you have encountered a cyber predator. 8. Responding to postings that are belligerent or harassing These messages are often posted by the author simply to get a reaction. If you do respond, you may open yourself to harassment.
  • Anyone can lie on the Internet
  • Limit giving out information about yourself to trusted friends or family
  • Child pornography – do not print it or send it, but save it.
  • Sexually explicit pictures or streaming video – save the information.
  • Sexual solicitation – save the communication by copying and pasting into a text file.
  • Don’t stay in an uncomfortable or dangerous situation online. You might hesitate to tell your parents because they may not approve of how you got into the situation. But you should realize that a bad situation could get worse if you ignore it. Talk to a parent or a trusted adult.
  • Share these guidelines with your friends
  • Don’t stay in an uncomfortable or dangerous situation online. You might hesitate to tell your parents because they may not approve of how you got into the situation. But you should realize that a bad situation could get worse if you ignore it. Talk to a parent or a trusted adult.
  • Share these guidelines with your friends
  • Merchant Funding Debt Relief Lawyers: Did You Accept A Merchant Funding Agreement? Are You Unable to Pay The Terms? Merchant Business Cash Advance Lawyers Can Help   A merchant cash advances have become  popular but, in many instances can end up to be a regretful for...
  • Cancer Misdiagnosis Lawyers: Cancer is a serious disease and if it not caught early and treatment started it can be fatal. Cancer Not Diagnosed On Time? Speak To A Missed Cancer Diagnosis Lawyer Did Your Doctor Fail to Diagnose Cancer? Our  misdiagnosis or failure ...
  • What Is A Mass Tort?: We get calls on a daily basis from people interested in filing a personal injury lawsuit, medical malpractice lawsuit, class action or other claim relating to a dangerous drug or device that has caused them an injury. Many of these come und...
  • Florida Medical Malpractice Lawyers: Florida Medical Malpractice Lawsuits Filed Medical malpractice claims in Florida include lawsuits against hospitals, doctors and nursing homes  for:  misdiagnosis, failure to treat,surgical errors and  childbirth errors can result in huge ...

We Can Help You Find A Lawyer in Your City