Monday, July 5, 2010

Peer to Peer Busts Child Pornographer Cheetham gets cheated

 

Gary Cheetham who lives at 104 East Pratt Boulevard in Roselle, a subdivision in Chicago, Illinois, is in hot water.  He was arrested getting off an airliner at O’Hare international Airport after the FBI searched his house in May.  Within the house they found computers full of child pornography!

 

It all started when an under-cover FBI agent began communicating with Cheetham on the net and by peer to peer computer sharing.

 

garycheetham mug

The face of an alleged child pornographer

How did they catch this 54 year old man who has no problem praying on our nation’s youth?  Peer to peer file sharing was the main method!

 

Many child pornographers use the computer sharing method thinking they can thwart the laws.  Unfortunately for them, the FBI is watching and ‘they always get their man!’

 

The Innocent Images Task Force is a law enforcement project aimed at taking child pornographers off of the street.  They focus on:

 

  • Online organizations, enterprises, and communities that exploit children for profit or personal gain.

  • Major distributors of child pornography, such as those who appear to have transmitted a large volume of child pornography via an online computer on several occasions to several other people.

  • Producers of child pornography.

  • Individuals who travel, or indicate a willingness to travel, for the purpose of engaging in sexual activity with a minor.

  • Possessors of child pornography.

 

If you are a child pornographer and cannot control your impulses, as most cannot, then seek help!  Why spend the next 15 to 30 years in the cross bar motel?  You may be able to remain anonymous with a good therapist.  You could also turn yourself in and throw yourself on the mercy of the court.

 

If you don’t act then we will find you, we will arrest you, and we will send you for your first date with bend-em-over Bill!  When I say we, that means members of law enforcement, which I am not.  But they represent part of our society with a mission of protecting the little ones you harm!

 

If you are on the other side of the coin you might check the national center for missing and exploited children.  For more information on the prevention of child abusers check out this site!

 

The FBI wants information about Cheetham.  If you know of additional victims please contact them at the Chicago FBI office (312) 421-6700.

 

Cheetham has been charged but not convicted.  He has the fundamental right of being considered innocent until proven guilty, should that happen. 

 

Friday, June 11, 2010

Free Stop SB 1070 wrist bands – Democracia Ahora

 

Democracy Now!

 

Democracia Ahora!

 

“This is an organization whose mission is to increase the prominence and participation of Hispanics in every aspect of the political process.”

 

If we are to defeat hate filled laws like Arizona SB 1070, we must empower Hispanics, especially those who undocumented.  When a person cannot vote his influence over the electroal process is not over.  He can encourage someone who can vote to do so in his name.

Thursday, June 10, 2010

Missing 7 year old Have you seen him? Please take a look!

7 year old boy missing
Have you seen him?

Please take a look at these pictures of 7 year old Kyron Richard Horman.  Kyron had on a black T-shirt with the letters "CSI" in green.  He had a handprint graphic on his shirt, black cargo pants, white socks, and black Skechers sneakers with orange trim. He wears metal framed glasses.

horman_kr2
A child lost is a future lost!
Please take a minute to look
at his photos, perhaps you
will come across a child like
this!
horman_kr3

 

DESCRIPTION

Date of Birth:  September 9, 2002
Place of Birth:  Oregon
Sex:  Male
Hair:  Brown
Height:  3'8"
Eyes:  Blue
Weight:  50 pounds
Race:  White

horman_kr1


THE DETAILS

Kyron Richard Horman has been missing from Skyline Elementary School in Portland, Oregon, since June 4, 2010. He was last seen that morning after attending a science fair at the school.




Individuals with information concerning this case should take no action themselves, but instead immediately contact the local tip line at 503/261-2847, the nearest FBI Office or local law enforcement agency.

 

For any possible sighting outside the United States, contact the nearest United States Embassy or Consulate.


If you think you have seen this child any place please contact the FBI or law enforcement in your area.  Don’t take a chance and think it can’t be him, it could be!

If he has been picked up by a sexual predator he could be anywhere! 

~
~
~

Wednesday, April 14, 2010

Child predators beware, 500 months is a long time!

Terrance Lynn McGuire, 27, of Canyon, Texas, did one thing right:  He let the little girl he kidnapped go.  Perhaps his conscience was eating at him.

8-7%20breaking%20mcguiremug

Terrance Lynn McGuire

According to the FBI press release, Terrance stopped a little girl riding her bicycle on the street in Texhoma, Oklahoma on January 18th, 2007.  It was about 6:30 p.m. and he convinced the child into his car.  That is when the child victim began her horror story, something that will live with her for the rest of her life and certainly require special counseling.

 

Once in his car, Terrance had the child where he wanted her.  He reportedly threatened her, put a mask over her head, tied her up, taped her mouth shut and stuffed her into his truck.  Imagine her terror and she couldn’t even cry out.

 

What was this monster thinking as he took the widdle little girl for a ride? From Texhoma, Terrance drove his victim to Dumas, Texas, and then to his house in Canyon, Texas.  We don’t know what happened at the Terrance McGuire home.  One can only imagine. 

 

On January 19th, 2007, this ogre who preys on our nation’s youth, drove the child to Clovis New Mexico.  He stopped at a convenience store and finally freed her from the nightmare she had been facing.  She ran to the clerks in the store and the police were notified. 

 

Likely, Terrance figured he was getting away with his ugly acts by driving the girl so far.  It didn’t work.  A tip to Texas County Sheriff Rick Caddell gave law enforcement what they needed.  In June 2009, McGuire was identified as the perpetrator of the kidnapping.  There was no struggle when  McGuire was arrested on August 7, 2009, in Canyon, Texas.  The FBI along with the Canyon Police made the collar.

 

Justice was swift.  On September 15, 2009, McGuire pled guilty to one count of kidnapping and transporting the victim across state lines.  If he had his way with the helpless child he got away with it.  But he will have more than 41 years to think about what he did.  He will probably have less than that.  Many child molesters don’t make it long in the Penn.  They are not popular with the inmate population.

 

"You would think that in a little community like this that our daughter would be safe,"  Christopher Graham, the victim's father said after her disappearance.

 

“The protection of our children is, and will remain, a top priority of the United States Attorney's Office and the Department of Justice as a whole," said U.S. Attorney Sanford C. Coats. "These tragic and complicated cases require the cooperative effort of federal, state and local law enforcement. That was certainly true with this case.”

 

judge vicki miles-lagrange

Judge Vicky Miles-LaGrange

 

Chief United States District Judge Vicki Miles-LaGrange  pronounced the sentence.  McGuire will have five years of supervised release if he gets out of prison before he goes to boot hill.  He will, of course, have to register as a sex offender.  There is also a  $7,335.70 sum due the State of Oklahoma for victim assistance.  

 

The Terrance Lynn McGuire case stands for three propositions: If you go after our children we will track you down and we will find you;  We will punish you to the fullest extent of the law; if you kill our children we will put you on death row, leaving you in a desperate solitude which is worse than death itself.  McGuire did one thing right.

Wednesday, March 24, 2010

Trucker indicted for abduction, planed to marry 11 year old Amber alert pays off!

Amber alert saves child,

11 year old girl goes home
Indictment for Texas trucker for abduction with intent to rape

After awhile, the stories about child abductions start to have a familiar ring. One ring tone we hear over and over is about the cat who picks up an under age child and takes her across state lines with the intention of sexual gratification. This case rings true to the theme, except the under-aged youth being transported across state lines was an 11 year old, not the traditional 14 or 15 year old.   If allegations are true, Elmer Zelaya-Robles from Dallas Texas, will be bending over for a brute in the big house for a long time.  Child molestors don't do well when caged with violent criminals.
A frantic call came over the switchboard at 2:30 p.m. on February 13th, 2010. The father of an 11 year old Karina Manzana-Garcia, who lives in the 400 block of 69th Place in Seat Pleasant, Maryland, called to report that his daughter was missing, indicated Cpl. Larry Johnson, a Prince George's police spokesman.

"Signs along the interstate system were activated"

An amber alert was issued reporting the child missing and providing information to media for public distribution. The report allowed regular television and radio programming to be interrupted for the announcement. Signs along the interstate system were activated. Of course, law enforcement nation-wide was notified.

One possibility was the child left with Elmer Zelaya-Robles, a family acquaintance who parked his 18 wheeler near the family home. It had been there the night before. Police were advised to be on the look-out for an orange tractor trailer.

We don’t know if a passing motorist noticed the truck and called. However, around 10:00 p.m. that night a Tennessee State Trooper found the driver of an 18 wheeler with an orange cab pulling into Love’s Truck Stop, in Jackson, Mississippi. The driver was identified as Elmer Zelaya-Robles. As the officer was in the process of questioning the driver the Amber Alert came over his radio. Elmer Fudd got the silver bracelets. Lost inside the truck’s sleeper was an 11 year Karina Manzana-Garcia.

"According to reports, he had convinced
her the two should be married"

According to reports, Elmer had wooed little karina. He had convinced her the two should be married. They had some long talks about what Elmer wanted in a wife-someone to take care of him even if she had to take care of children at the same time.  

While the child’s life was saved, karina’s innocence had already been robbed, alleged by reports in the Washington Examiner. The 11 year old tike told child services Elmer had done the dirty with her three times. Two boxes of condoms were reportedly found within the sleeper. Condoms usually come in boxes of threes and boxes of 12's.  These were probably the three to a box assortment which explains why threre would be two boxes.  

Zelaya-Robles faces a mandatory minimum sentence of 10 years in prison if convicted. Additional charges may be pending.

Every man has the right to be presumed innocent unless and until judged guilty in a court of law.  The charges by the Grand Jury don't match the charges alleged by some of the reports.  The reports I used for this blog were all over the map regarding various details of this abduction.  Some said the child was returned un-harmed, while other said she was violated.  For example, a report in Websleuths.com indicated the Karina's middle name was Elizabeth, based upon a Washington Post article. 

If found guilty then Zelaya has a tough time in front of him, as he should.  If he is innocent of the crime let's hope that is determined quickly, as well.

My message to men who keep singing the same tune:  If you mess with our children we will catch you and you will pay a high price!  Think about what you are doing before you make a mistake of a life time. If you are having trouble, get help now!  They won't do much for you if you wait and end up in prision, except mark your grave.

The indictment was announced by United States Attorney for the District of Maryland Rod J. Rosenstein, Special Agent in Charge Richard A. McFeely of the Federal Bureau of Investigation; and Chief Roberto L. Hylton of the Prince George’s County Police Department.

"This case demonstrates the heroic ability of law enforcement to make the difference"

“Nationwide law enforcement coordination, modern technology and a shared commitment to pursue criminals who prey on children contributed to the quick arrest of Mr. Zelaya and the recovery of the child,” said U.S. Attorney Rod J. Rosenstein. “Local, state and federal law enforcement quickly coordinated their efforts and within hours after issuing an AMBER alert, the missing girl was found in Tennessee. This case demonstrates both the terrible danger that sexual predators pose to children and the heroic ability of law enforcement to make a difference.”

This case was brought as part of Project Safe Childhood, led by United States Attorneys’ Offices and the Criminal Division's Child Exploitation and Obscenity Section (CEOS).  Details about Maryland’s program are available at http://www.usdoj.gov/usao/md/Safe-Childhood/index.html.

The United States Attorney Rod J. Rosenstein thanked the Tennessee Highway Patrol for their assistance in the investigation and commended Assistant U.S. Attorney Stacy Dawson Belf, who is prosecuting the case.

Dave Gibson from the conservative Denver rag, the Examiner, tries to turn this into an illegal alien problem starting with his title "Amber Alert saves 11-year-old girl abducted by Salvadoran national"  As it turns out Elmer Zelaya-Robles was allegedly heading for his homeland, El Salvador, when he got stopped. However, he was not an illegal alien.  He is here under full documentation.  Any monster can abduct a little child.  Putting it onto the backs of Latinos or undocumented persons is inane.

Not everyone can take advantage of the Amber Alert, a tragedy in this country.  Those who live in Sheriff "Little Joe" Arpaio's Maricopa County, in Arizona, would have to think twice about calling for an Amber Alert should one of their children be abducted.  That is, if mother, father or the child were undocumented.  Based upon the raids "Little Joe" ordered this weekend, the immigrant community has been terrorized and can't approach local law enforcement for help.  Imagine, losing your daughter and being so afraid of law enforcement you can't ask for a simple Amber Alert!

One day perhaps the leaders of this country will put a stop to abusive police tactics by rogue law enforcement.  Until then, all we can do is trust ethical law enforcement agencies like the State Patrol in Tennessee who rescued 11 year old Karina, as well as the FBI and law enforcement all over the country who work so hard to get it right.  

Sunday, March 7, 2010

LMSD fights back! Pennsylvania laptop web cam is a violation of Blake Robbins 4th Amendment rights

Pennsylvania school spies on students using laptop web cam    Actions of  Lower Merion School District a complete bastardization of Blake Robbins 4th Amendment Rights Under the US Constitution

It is tragic when the monster you are protecting your children from is their own school.  This is a case which turns you stomach if any case ever could.  We expect cameras in just about any place public we go.  Traffic intersections, photo radar, court houses and government installations, and yes, I have even seen them in public bathroom, discretely placed of course.

CCTV picture is from freefoto dot com

The Lower Merion School District pulled a fast one on the student body by installing spy cam software in the Apple laptops they handed out to the student body. They can activate the software at any time and take snap shots of what ever is in front of the computer without the computer user's knowing about it.  The FBI is investingating the Pennsylvania computer lap top scandal.

Constitutional law

The Fourth Amendment to the US Constitution says:  'The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.'


There are many problems with the actions of the LMSD using spy cameras in computer laptops.  The school board splintered the notion of the expectation of privacy and right of each citizen against unreasonable searches and seizures.

Spying on students

Not even the police have the authority to arbitrarily plant listening, video or photographic devices in people's homes without their knowledge unless they have a warrant.  It is clear with the LMSD no warrants were ever sought, therefore, as a constitutional matter, their activities violated the law.

"All drug traffickers are terrorist and subject to the almost non-existent court over-sight of law enforcement activity"

There are exceptions to the no warrant requirement.  The Patriot Act expands government authority wildly.  The Act allows warrantless searches if the party is believed to be engaged in the act of Terrorism, including domestic terrorismThe definition of 'involved in the act of terrorism" has a reckless and overly broad interpretation.  For example, the powers that be have determined at some time in the past terrorist organizations traffic in drugs in order to fund their activities.  The Act includes:

"(4) any narcotics trafficking entity designated pursuant to Executive Order 12978 (October 21, 1995) or the Foreign Narcotics Kingpin Designation Act (Public Law 106-120)"

Therefore, all drug traffickers are terrorist and subject to the almost non-existent court over-sight of law enforcement activity.  You can read the Patriot Act in it's full glory here.  It is technical in nature as are most laws but a great challenge for a student heading to law school!
 
There are few situations in which an ordinary citizen will not fall under the act.  One of them is eating Mike and Ikes candy. 
 
While the school board might make an argument they suspected a student of narcotics trafficking, searching for a lost notebook won't cut the mustard.  If they subsequently find a person involved in narcotics traffiicking, the original search was illegal, hence under the Fruit of the Poisonous Tree Doctrine in Constitutional law.  The law says in so many words,
 
"fruit of the poisonous tree" doctrine is an offspring of the Exclusionary Rule. The exclusionary rule mandates that evidence obtained from an unreasonable search,  must be excluded from trial. Under the fruit of the poisonous tree doctrine, evidence is also excluded from trial if it was gained through evidence uncovered in an unreasonable search.  The fruit of the poisonous tree doctrine was established primarily to deter law enforcement from violating rights against unreasonable searches and seizures."
 
Note, the law may not prohibit the collection of data through unreasonable searches.  It precludes use of the information in the prosecution of the case.  Therefore, when Vice Principal Lyn Matsko confronted 15 year old Blake Robbins for what she thought was illegal narcotics use she broke the law in the prosecution portion of the 'Fruit of the Poisonous Tree' Doctine.  There mere collection of the evidence is subject to question.
 
The biggest problem with the Pennsylvania computer spy cam case is the violation of the reasonable expectation of privacy.  According to the itlaw wickja:
 
"To establish a reasonable expectation of privacy a person must establish two things:
 
1.  That the individual had a subjective expectation of privacy;
 
2. That subjective expectation of privacy is one that society is prepared to recognize as reasonable.
 
If either element is missing, no protected interest is established (according to Katz v. the United States)."
 
The privacy of one's own home is a place in which "society is 'prepared to recognize as legitimate'".  As a result, it didn't matter what Blake was doing, masturbating, making love, in the bathroom or only dining on Mike and Ikes candy.  The expectation of privacy is paramount in one's own home.
 
If the government, in this case the Lower Merion School District, had informed students of the ability to spy on them using a computer lap top, there might be grounds to consider such spying. Take a look at United States v. Jerome T. Heckenkamp which is explained on Proskauer.
 
"The only ones who win in court are the attorneys"
 
The problem with law is a decision of a court may turn on the slightest detail and precedent then set.  There are no guaranteed winners in Blake's law suit, which is Blake J. Robbins v. LMSD.  While it looks like Blake has the upper hand, the case could turn on a dime and the school district come out with less of a shinner.  They already have a black eye.
 
It is for this reason, and for the benefit of the students at Herriton Senior High school near Philadelphia, Pennsylvania that I suggest these people put on the conflict resolution hats and settle this matter.  Most people who win big in court say the experience was not worth it.  There is an old saying, the only ones who win in court are the attorneys!  Trust me, even they suffer an untold toll. 
 
Blake is a long ways away from winning his suit.  The LMSD has a lot of legal bills to pay and likely will lose.  Meanwhile, everyone in the community suffers, including the current and next senior classes of Herriton Senior High School.   That is my opinion.  Take it as you wish!

10 signs Your child is with a computer sex predator.prostitute, sexual offender, internet tracking


A message from the FBI
By Louis J. Freeh
Plus
Tips to keep your child safe!

The FBI writes a note to all parents:

Dear Parent:

Our children are our Nation's most valuable asset. They represent the bright future of our country and hold our hopes for a better Nation. Our children are also the most vulnerable members of society. Protecting our children against the fear of crime and from becoming victims of crime must be a national priority.

Unfortunately the same advances in computer and telecommunication technology that allow our children to reach out to new sources of knowledge and cultural experiences are also leaving them vulnerable to exploitation and harm by computer-sex offenders.
I hope that this pamphlet helps you to begin to understand the complexities of on-line child exploitation. For further information, please contact your local FBI office or the National Center for Missing and Exploited Children at 1-800-843-5678.

Louis J. Freeh, Former Director

Signs your child may be at risk on line

Highlights

1.  Your child spends a lot of time on the net, especially at night.  Most children who fall prey to computer-sex-offenders spend a large amount of time on the net.  Parents are advised to monitor such use.

2.  Children on-line are at the greatest risk during the evening hours.  Most offenders work so they, too, are on line during evening hours. 

3.  You find pornography on your child's computer.  Sex offenders often supply their potential victims with pornography as a means of opening sexual discussions and for seduction.
Child pornography may be used to show the child sex between children and adults is "normal."

4.  Look for thumb drives and other internet storage media which is guarded by your child.  It may be an indication he is harboring pornographic images he does not want the rest of the family to see. 

5.  Be alert if your young one is getting telephone calls by older men whom you do not know.  Your child may be making phone calls long distance from the family home to numbers you don't recognize.  It is best to review your phone bill.  

6.  A sexual predator will use the computer to make initial contact.  Ultimately, he will likely want to speak to his new victim in person.  During those calls he may engage in phone sex.  After that comes a meeting.  

7.  The process of exchanging phone calls frequently begins with the sex offender giving the child his telephone number.  As soon as the child calls back the offender has your child's numbers.

8.  Sex offenders will go to great lengths to hide their activity.  Some have obtained a 1-800 number so the youth can call without an adult becoming aware.

9.  Be alert for mail and gifts from an unknown person.  The on-line predator may be trying to win your child's heart as he manipulates himself into your child's life. 

10.  Your child turns the computer off or quickly closes a window so you can't see what he or she was looking at, good tip your child is hiding something.

11.  A child that is in the process of victimization will often withdraw from the family and friends who can protect him.  Watch for withdrawal signs.  

12.  A sex offender may try to divide the family.  They will use any problem they can find to win the child over and to turn the child against his family.  If your child becomes hesitant to speak with you about his daily activities, or include you in his personal life, he may be subject to manipulation by a person with evil ends. 

13.  Watch for on-line accounts that belong to someone else.  This may be a gift by a sexual predator or a means of gaining trust.  

14.  Predators will sometimes provide an on-line account for their victims.  Once again, they are manipulating the child in their 'little secret' and keeping the communications from parental supervision. 

The FBI Pamphlet

Introduction 

While on-line computer exploration opens a world of possibilities for children, expanding their horizons and exposing them to different cultures and ways of life, they can be exposed to dangers as they hit the road exploring the information highway. There are individuals who attempt to sexually exploit children through the use of on-line services and the Internet. Some of these individuals gradually seduce their targets through the use of attention, affection, kindness, and even gifts. These individuals are often willing to devote considerable amounts of time, money, and energy in this process. They listen to and empathize with the problems of children. They will be aware of the latest music, hobbies, and interests of children. These individuals attempt to gradually lower children's inhibitions by slowly introducing sexual context and content into their conversations.

"Computer-sex offender can be any age or any sex the person does not have to fit the caricature of a dirty, unkempt, older man"

There are other individuals, however, who immediately engage in sexually explicit conversation with children. Some offenders primarily collect and trade child-pornographic images, while others seek face-to-face meetings with children via on-line contacts. It is important for parents to understand that children can be indirectly victimized through conversation, i.e. "chat," as well as the transfer of sexually explicit information and material. Computer-sex offenders may also be evaluating children they come in contact with on-line for future face-to-face contact and direct victimization. Parents and children should remember that a computer-sex offender can be any age or sex the person does not have to fit the caricature of a dirty, unkempt, older man wearing a raincoat to be someone who could harm a child.

Children, especially adolescents, are sometimes interested in and curious about sexuality and sexually explicit material. They may be moving away from the total control of parents and seeking to establish new relationships outside their family. Because they may be curious, children/adolescents sometimes use their on-line access to actively seek out such materials and individuals. Sex offenders targeting children will use and exploit these characteristics and needs. Some adolescent children may also be attracted to and lured by on-line offenders closer to their age who, although not technically child molesters, may be dangerous. Nevertheless, they have been seduced and manipulated by a clever offender and do not fully understand or recognize the potential danger of these contacts.

This guide was prepared from actual investigations involving child victims, as well as investigations where law enforcement officers posed as children. Further information on protecting your child on-line may be found in the National Center for Missing and Exploited Children's Child Safety on the Information Highway and Teen Safety on the Information Highway pamphlets.

What Are Signs That Your Child Might Be At Risk On-line?

Your child spends large amounts of time on-line, especially at night.

Most children that fall victim to computer-sex offenders spend large amounts of time on-line, particularly in chat rooms. They may go on-line after dinner and on the weekends. They may be latchkey kids whose parents have told them to stay at home after school. They go on-line to chat with friends, make new friends, pass time, and sometimes look for sexually explicit information. While much of the knowledge and experience gained may be valuable, parents should consider monitoring the amount of time spent on-line.

Children on-line are at the greatest risk during the evening hours. While offenders are on-line around the clock, most work during the day and spend their evenings on-line trying to locate and lure children or seeking pornography.

You find pornography on your child's computer.

Pornography is often used in the sexual victimization of children. Sex offenders often supply their potential victims with pornography as a means of opening sexual discussions and for seduction. Child pornography may be used to show the child victim that sex between children and adults is "normal." Parents should be conscious of the fact that a child may hide the pornographic files on diskettes from them. This may be especially true if the computer is used by other family members.

Your child receives phone calls from men you don't know or is making calls, sometimes long distance, to numbers you don't recognize.

While talking to a child victim on-line is a thrill for a computer-sex offender, it can be very cumbersome. Most want to talk to the children on the telephone. They often engage in "phone sex" with the children and often seek to set up an actual meeting for real sex.

While a child may be hesitant to give out his/her home phone number, the computer-sex offenders will give out theirs. With Caller ID, they can readily find out the child's phone number. Some computer-sex offenders have even obtained toll-free 800 numbers, so that their potential victims can call them without their parents finding out. Others will tell the child to call collect. Both of these methods result in the computer-sex offender being able to find out the child's phone number.

Your child receives mail, gifts, or packages from someone you don't know.

As part of the seduction process, it is common for offenders to send letters, photographs, and all manner of gifts to their potential victims. Computer-sex offenders have even sent plane tickets in order for the child to travel across the country to meet them.

Your child turns the computer monitor off or quickly changes the screen on the monitor when you come into the room.

A child looking at pornographic images or having sexually explicit conversations does not want you to see it on the screen.

Your child becomes withdrawn from the family.

Computer-sex offenders will work very hard at driving a wedge between a child and their family or at exploiting their relationship. They will accentuate any minor problems at home that the child might have. Children may also become withdrawn after sexual victimization.

Your child is using an on-line account belonging to someone else.

en if you don't subscribe to an on-line service or Internet service, your child may meet an offender while on-line at a friend's house or the library. Most computers come preloaded with on-line and/or Internet software. Computer-sex offenders will sometimes provide potential victims with a computer account for communications with them.

What Should You Do If You Suspect Your Child Is Communicating With A Sexual Predator On-line?

Consider talking openly with your child about your suspicions. Tell them about the dangers of computer-sex offenders.

Review what is on your child's computer. If you don't know how, ask a friend, coworker, relative, or other knowledgeable person. Pornography or any kind of sexual communication can be a warning sign.

Use the Caller ID service to determine who is calling your child. Most telephone companies that offer Caller ID also offer a service that allows you to block your number from appearing on someone else's Caller ID. Telephone companies also offer an additional service feature that rejects incoming calls that you block. This rejection feature prevents computer-sex offenders or anyone else from calling your home anonymously.

Devices can be purchased that show telephone numbers that have been dialed from your home phone. Additionally, the last number called from your home phone can be retrieved provided that the telephone is equipped with a redial feature. You will also need a telephone pager to complete this retrieval.

This is done using a numeric-display pager and another phone that is on the same line as the first phone with the redial feature. Using the two phones and the pager, a call is placed from the second phone to the pager. When the paging terminal beeps for you to enter a telephone number, you press the redial button on the first (or suspect) phone. The last number called from that phone will then be displayed on the pager.

Monitor your child's access to all types of live electronic communications (i.e., chat rooms, instant messages, Internet Relay Chat, etc.), and monitor your child's e-mail. Computer-sex offenders almost always meet potential victims via chat rooms. After meeting a child on-line, they will continue to communicate electronically often via e-mail.

Should any of the following situations arise in your household, via the Internet or on-line service, you should immediately contact your local or state law enforcement agency, the FBI, and the National Center for Missing and Exploited Children:

Your child or anyone in the household has received child pornography;

Your child has been sexually solicited by someone who knows that your child is under 18 years of age;

Your child has received sexually explicit images from someone that knows your child is under the age of 18.

If one of these scenarios occurs, keep the computer turned off in order to preserve any evidence for future law enforcement use. Unless directed to do so by the law enforcement agency, you should not attempt to copy any of the images and/or text found on the computer.

 What Can You Do To Minimize The Chances Of An On-line Exploiter Victimizing Your Child?

Communicate, and talk to your child about sexual victimization and potential on-line danger.

Spend time with your children on-line. Have them teach you about their favorite on-line destinations.

Keep the computer in a common room in the house, not in your child's bedroom. It is much more difficult for a computer-sex offender to communicate with a child when the computer screen is visible to a parent or another member of the household.

"Utilize parental controls..."

Utilize parental controls provided by your service provider and/or blocking software. While electronic chat can be a great place for children to make new friends and discuss various topics of interest, it is also prowled by computer-sex offenders. Use of chat rooms, in particular, should be heavily monitored. While parents should utilize these mechanisms, they should not totally rely on them.

Always maintain access to your child's on-line account and randomly check his/her e-mail. Be aware that your child could be contacted through the U.S. Mail. Be up front with your child about your access and reasons why.

Teach your child the responsible use of the resources on-line. There is much more to the on-line experience than chat rooms.

Find out what computer safeguards are utilized by your child's school, the public library, and at the homes of your child's friends. These are all places, outside your normal supervision, where your child could encounter an on-line predator.

Understand, even if your child was a willing participant in any form of sexual exploitation, that he/she is not at fault and is the victim. The offender always bears the complete responsibility for his or her actions.

instruct your children:

to never arrange a face-to-face meeting with someone they met on- line;

to never upload (post) pictures of themselves onto the Internet or on-line service to people they do not personally know;

to never give out identifying information such as their name, home address, school name, or telephone number;

to never download pictures from an unknown source, as there is a good chance there could be sexually explicit images;

to never respond to messages or bulletin board postings that are suggestive, obscene, belligerent, or harassing;

that whatever they are told on-line may or may not be true.

Frequently Asked Questions: 

My child has received an e-mail advertising for a pornographic website, what should I do?

Generally, advertising for an adult, pornographic website that is sent to an e-mail address does not violate federal law or the current laws of most states. In some states it may be a violation of law if the sender knows the recipient is under the age of 18. Such advertising can be reported to your service provider and, if known, the service provider of the originator. It can also be reported to your state and federal legislators, so they can be made aware of the extent of the problem.

Is any service safer than the others?

Sex offenders have contacted children via most of the major on-line services and the Internet. The most important factors in keeping your child safe on-line are the utilization of appropriate blocking software and/or parental controls, along with open, honest discussions with your child, monitoring his/her on-line activity, and following the tips in this pamphlet.

Should I just forbid my child from going on-line?

There are dangers in every part of our society. By educating your children to these dangers and taking appropriate steps to protect them, they can benefit from the wealth of information now available on-line.

Helpful Definitions:

Internet - An immense, global network that connects computers via telephone lines and/or fiber networks to storehouses of electronic information. With only a computer, a modem, a telephone line and a service provider, people from all over the world can communicate and share information with little more than a few keystrokes.

Bulletin Board Systems (BBSs) - Electronic networks of computers that are connected by a central computer setup and operated by a system administrator or operator and are distinguishable from the Internet by their "dial-up" accessibility. BBS users link their individual computers to the central BBS computer by a modem which allows them to post messages, read messages left by others, trade information, or hold direct conversations. Access to a BBS can, and often is, privileged and limited to those users who have access privileges granted by the systems operator.

line Service (COS) - Examples of COSs are America Online, Prodigy, CompuServe and Microsoft Network, which provide access to their service for a fee. COSs generally offer limited access to the Internet as part of their total service package.\

Internet Service Provider (ISP) - Examples of ISPs are Erols, Concentric and Netcom. These services offer direct, full access to the Internet at a flat, monthly rate and often provide electronic-mail service for their customers. ISPs often provide space on their servers for their customers to maintain World Wide Web (WWW) sites. Not all ISPs are commercial enterprises. Educational, governmental and nonprofit organizations also provide Internet access to their members.

Public Chat Rooms - Created, maintained, listed and monitored by the COS and other public domain systems such as Internet Relay Chat. A number of customers can be in the public chat rooms at any given time, which are monitored for illegal activity and even appropriate language by systems operators (SYSOP). Some public chat rooms are monitored more frequently than others, depending on the COS and the type of chat room. Violators can be reported to the administrators of the system (at America On-line they are referred to as terms of service [TOS]) which can revoke user privileges. The public chat rooms usually cover a broad range of topics such as entertainment, sports, game rooms, children only, etc.
Electronic Mail (E-Mail) - A function of BBSs, COSs and ISPs which provides for the transmission of messages and files between computers over a communications network similar to mailing a letter via the postal service. E-mail is stored on a server, where it will remain until the addressee retrieves it. Anonymity can be maintained by the sender by predetermining what the receiver will see as the "from" address. Another way to conceal one's identity is to use an "anonymous remailer," which is a service that allows the user to send an e-mail message repackaged under the remailer's own header, stripping off the originator's name completely.

Chat - Real-time text conversation between users in a chat room with no expectation of privacy. All chat conversation is accessible by all individuals in the chat room while the conversation is taking place.
Instant Messages - Private, real-time text conversation between two users in a chat room.
Internet Relay Chat (IRC) - Real-time text conversation similar to public and/or private chat rooms on COS.
Usenet (Newsgroups) - Like a giant, cork bulletin board where users post messages and information. Each posting is like an open letter and is capable of having attachments, such as graphic image files (GIFs). Anyone accessing the newsgroup can read the postings, take copies of posted items, or post responses. Each newsgroup can hold thousands of postings. Currently, there are over 29,000 public newsgroups and that number is growing daily. Newsgroups are both public and/or private. There is no listing of private newsgroups. A user of private newsgroups has to be invited into the newsgroup and be provided with the newsgroup's address
.
Download PDF version 

Federal Bureau of Investigationer Division
Innocent Images National Initiative
11700 Beltsville Drive
Calverton, MD 20705
Contact your local FBI office for further
Sexual expoitation of a child leads to life long issues in relationships and trust in other people.  If we can brek the chain of children who are being violated turning into new violators we may be able to get a bit ahead!

Friday, February 19, 2010

Aurora Colorado Restaurant offers food to those in need and work for those who don't

Same Cafe offers organic food
to those who can't pay
and a chance to serve the community
for those who have more than enough!

Is your child in need of a decent meal?  Do you and your family eat fattening foods because they are cheap?  Would you like to serve the community and those in need?

If you answered yes to any of these questions the Same Cafe, 2023 E. Colfax Ave, Denver, Co may be the place for you!  Why?

"If you don't have the bucks don't let it stop you!"

If you are down on your luck the Same Cafe will prepare a delicious meal for a price.  How much?  You decide!  You can leave whatever you think the meal is worth.   You can even leave a little extra, if you want to give something back. 

But if you don't have the bucks, don't let it stop you!  The Same Cafe does not discriminate based upon your economic status...or any other status, for that matter.  If you and your child's bellies are empty, make a bee line for the Same Cafe!  If you can't pay much or even pay anything, the folks at the Same Cafe ask for a little bit of your time in exchange.  But if you are in real trouble and can't give anything back, don't sweat it.  Many of us have been there before.  Enjoy!

Having to admit you are in the bottom ranks of the economic ladder in front of someone while at the check out counter is a crushing experience.  There are people who will miss a meal rather than ask for help.  The SAME Cafe folks don't make a big deal out of the check at the cash register...because there isn't one!  Instead of a bill you get an envelope.  Fill up the envelope or leave it empty, your choice, and drop it into the convenient slot in a nearby box.

"Same stands for 'so anybody can eat!"

If you are in better circumstances, however, the Same Cafe is a great place to show your community spirit.  They welcome any donation, and they welcome you efforts, too! 

Same stands for "So all may eat".   Brad and Libby Birky formed SAME as a non-profit organization designed to cater to both sides of the community.   Part of the SAME concept makes dining a pleasure for those who might otherwise be eating in a soup kitchen.  It puts dignity back into dining, both for those who are desperate for a wholesome meal, and for those who want to do something for someone anonymously. 

Naturally, the Same Cafe concept is getting a lot of press.  Westword, a Denver free newspaper with it's hand on the pulse of the City, did a nice article on the establishment.  The 'One World Cafe' in Salt Lake City took two years to move into the black, according to the Desert Morning Press, but is now a model for those who want to serve the less fortunate.   The owners have formed a non-profit organization,  one world everyone eats

An on-line Time Magazine article gives us some insight on the owners of SAME:

'"Both Brad and Libby had been searching for a meaningful way to give back while making a living. Admitted volunteer junkies, they had been serving and eating with homeless shelter residents for the past eight years. "We loved the service aspect of giving to the community and attacking the issue of hunger," says Brad. "Plus we both love to cook."'

You can stay up to date with the same cafe blog.

"A child at risk is a terrible thing"

Whether or not the Same Cafe can make it during the most drastic economic times since the Great Depression is a matter of speculation.  If no one pays the establishment goes bust.  Even non-profits have bills.  The Same idea might be best described as a "hand-up, not a hand-out".  Part of their chances for success depend upon the generosity of the community.  The owners have staked a fair amount of money on their belief Denver gives back.  We hope they are right! 

A child at risk is a terrible thing.  Mothers running from abusive husbands, children who don't get enough to eat, families working at minimum wage and still not able to pay the rent, all of this in a country that has more than enough?  Sharing your good fortune with others is part of nurturing the foundation of the next generation.  It is a wonderful way to nurture yourself, as well. 
Spending time with those less fortunate than you is a good way to encourage those who have lost hope.  Children raised in poverty continue a tragic link that we must break if we are to continue as a world leader.  The Same Cafe is doing it's part.  

Wednesday, February 17, 2010

16 signs to a potentially violent student Early warning signs for teen violence

Early Warning Signs
for school violence

These are some early warning signs of a potentially violent student.  They are not inclusive.   If you have a child who is exhibiting these kinds of signs or know a student who is exhibiting these kinds of signs then it may be time to get help. 

These factors are generalized.  Most of us exhibited some of these signs when we were children.  However, a child who is showing multiple signs should be evaluated.  It is better to be safe than sorry.  One should leave conclusions about other people's children to professionals.  Any child who is making serious threats should be considered at immediate risk and assistence requested.

The warning signs are printed in a pulbication called Safeguarding our children, an action guide

  • Social withdrawal.
  • Excessive feelings of isolation or being alone.
  • Excessive feelings of rejection.
  • Being a victim of violence.
  • Feelings of being picked on and persecuted.
  • Low school interest and poor academic performance.
  • Expression of violence in writing and drawings.
  • Uncontrolled anger.
  • Patterns of impulsive and chronic hitting, intimidating, and bullying behaviors.
  • History of discipline problems.
  • History of violent and aggressive behavior.
  • Intolerance for differences and prejudicial attitudes.
  • Drug use and alcohol use.
  • Affiliation with gangs.
  • Inappropriate access to, possession of, and use of firearms.
  • Serious threats of violence (also an imminent warning sign).
There are a variety of publications on the topic of keeping our schools safe.   The warning signs are only a small part of the Safeguarding Our Children Guide by the Department of Justice.  The bulk of the guide is devoted to ways to keep our children safe, including safe schools, academics and discipline.

These are 16 warning signs of a potentially violent student.  As mentioned, the list is not exhaustive, nor is it conclusive. 

If you have a friend who is exhibiting multiple warning signs you may want to speak to one of your teachers about the behavior, or consult professional help.   These types of behaviors are generalizations that must be evaluated by a professional rather than judgments made by peers.  However, it is always better to be safe than sorry. 

Excerpts from Teen Dating Violence Adolescent Romantic Relationships

Teen Dating Violence: 
Do teens engage in date violence for the same reasons as adults?
This study will give you insight on how to handle a crisis with your teen!

Teen Dating Violence: A Closer Look at Adolescent Romantic Relationships


by Carrie Mulford, Ph.D., and Peggy C. Giordano, Ph.D.
Excerpts from NIJ Journal No. 261, October 2008

For 1 in 10 teens, abuse is a very real part of dating relationships.

Aproximately 10 percent of adolescents nationwide reported being the victim of physical violence at the hands of a romantic partner during the previous year.  Between two and three in 10 reported being verbally or psychologically abused in the previous year.  In South Carolina, for example, nearly 8 percent of adolescents reported being physically violent to a romantic partner. Interestingly, the rates of reported victimization versus perpetration in the state were similar for boys and girls.

Studies found that girls and boys perpetrate the same frequency of physical aggression in romantic relationships. This finding was at odds with what practitioners...said they encounter in their professional experience. Most of the practitioners in attendance said that they primarily see female victims.

So what is the reality?  The complex nature of this phenomenon is not fully understood. Those in the field have to rely on an adult framework to examine the problem of teen dating violence.

However, we (the authors) find that this adult framework does not take into account key differences between adolescent and adult romantic relationships. And so, to help further the discussion, we offer in this article a gender-based analysis of teen dating violence with a developmental perspective

Victims and Perpetrators: What the Research Says

In 2001-2005, Peggy Giordano and her colleagues at Bowling Green State University interviewed more than 1,300 seventh, ninth and 11th graders in Toledo, Ohio.  More than half of the girls in physically aggressive relationships said both they and their dating partner committed aggressive acts during the relationship. About a third of the girls said they were the sole perpetrators, and 13 percent reported that they were the sole victims. Almost half of the boys in physically aggressive relationships reported mutual aggression, nearly half reported they were the sole victim, and 6 percent reported that they were the sole perpetrator.

Editor's note:  Do you think the boys lied?

Who Perpetrates Teen Dating Violence?

Studies find there is mutual physical aggression by girls and boys in romantic relationships. However, when it comes to motivations for using violence and the consequences of being a victim of teen dating violence, the differences between the sexes are pronounced.  Girls also commonly report self-defense as a motivating factor, and boys commonly cite the need to exert control.  Boys are also more likely to react with laughter when their partner is physically aggressive. Girls experiencing teen dating violence are more likely than boys to suffer long-term negative behavioral and health consequences, including suicide attempts, depression, cigarette smoking and marijuana use.

Editor's note:  One would not think self defense would constitute violence, but violence is violence presumably...

Applying Adult Perspectives to Teen Dating Violence

Why do teenagers commit violence against each other in romantic relationships?  Practitioners and researchers in the field tend to apply an adult intimate partner violence framework when examining the problem of teen dating violence.

A split currently exists, however, among experts in the adult intimate partner violence arena.
  • Some experts hold that men and women are mutually combative and that this behavior should be seen as part of a larger pattern of family conflict.
  • Another group of experts holds that men generally perpetrate serious intimate partner violence against women. They contend that men in patriarchal societies use violence to exert and maintain power and control over women.
  • We believe, however, that applying either of these adult perspectives to adolescents is problematic. Although both views of adult intimate partner violence can help inform our understanding of teen dating violence, it is important to consider how adolescent romantic relationships differ from adult romantic relationships in several key areas.
How Teen Dating Violence Differs: Equal Power

One difference between adolescent and adult relationships is the absence of elements traditionally associated with greater male power in adult relationships.   Adolescent girls are not typically dependent on romantic partners for financial stability, and they are less likely to have children to provide for and protect.

It is interesting to note that adults who perpetrate violence against family members often see themselves as powerless in their relationships. This dynamic has yet to be adequately explored among teen dating partners.

Lack of Relationship Experience

A second key factor that distinguishes violence in adult relationships from violence in adolescent relationships is the lack of experience teens have in negotiating romantic relationships. Inexperience in communicating and relating to a romantic partner may lead to the use of poor coping strategies, including verbal and physical aggression.  A teen who has difficulty expressing himself or herself may turn to aggressive behaviors (sometimes in play) to show affection, frustration or jealousy.

As adolescents develop into young adults, they become more realistic and less idealistic about romantic relationships. They have a greater capacity for closeness and intimacy.  Holding idealistic beliefs about romantic relationships can lead to disillusionment and ineffective coping mechanisms when conflict emerges.  It also seems reasonable to expect that physical aggression may be more common when adolescents have not fully developed their capacity for intimacy, including their ability to communicate.

The Influence of Peers

We would be remiss to try to understand teen behavior and not consider the profound influence of friends. Peers exert more influence on each other during their adolescent years than at any other time.

Not only are friends more influential in adolescence than in adulthood, but they are also more likely to be "on the scene" and a key element in a couple's social life. In fact, roughly half of adolescent dating violence occurs when a third party is present.  Relationship dynamics often play out in a very public way because teens spend a large portion of their time in school and in groups. For various reasons, a boyfriend or girlfriend may act very differently when in the presence of peers, a behavior viewed by adolescents as characteristic of an unhealthy relationship. For example, boys in one focus group study said that if a girl hit them in front of their friends, they would need to hit her back to "save face.

Conflict over how much time is spent with each other versus with friends, jealousies stemming from too much time spent with a friend of the opposite sex, and new romantic possibilities are all part of the social fabric of adolescence. Although "normal" from a developmental perspective, navigating such issues can cause conflict and, for some adolescents, lead to aggressive responses and problematic coping strategies, such as stalking, psychological or verbal abuse, and efforts to gain control.

Editors note:  It looks like a adults act like they are kids!

Where Do We Go From Here?

Adult relationships differ substantially from adolescent dating in their power dynamics, social skill development and peer influence. These factors are critical to understanding physical violence and psychological abuse in early romantic relationships and may help explain the similar perpetration rates among boys and girls suggested by current statistics.

All of this points to important implications for teen dating violence prevention and intervention strategies. Because girls engage in high levels of physical aggression and psychological abuse and most abusive relationships are characterized by mutual aggression, prevention efforts must be directed toward both males and females, and interventions for victims should include services and programming for boys and girls. Interventions must also distinguish between severe forms of violence that produce injury and fear and other more common abuse.

And finally, research on the extent to which teens involved in abusive relationships become involved in adult abusive relationships — whether as victims or perpetrators — is sorely needed.

NIJ Journal No. 261, October 2008

NCJ 224089
About the Authors

Carrie Mulford is a social science analyst at the National Institute of Justice. She has worked extensively with research on juvenile justice, teen dating violence, child abuse, elder mistreatment, enforcement of victims' rights laws, hate crime and situational crime prevention. Since 2006, she has been the coordinator of the Federal Interagency Workgroup on Teen Dating Violence, whose members contributed to this article.

Peggy Giordano is the Distinguished Research Professor of Sociology at Bowling Green State University. Her research centers on social relationship experiences during the adolescent period, focusing particularly on studies of the nature, meaning and impact of friendships and romantic relationships.

The long form of this article is much more technical in nature.  In general, the authors ask questions that might give us pause, is teen date violence based upon the same factors as adult violence.  If we can understand why children become violent or verbally abusive we will have a better chance of helping them, and perhaps preventing their growth into abusive parents!  One thing that remains un-answered, how much does the behavior of the parent affect the behavior of the teen?  Do they learn modeling from an abusive parent?  What do you think?  Feel free to leave your points of view!

Tuesday, February 16, 2010

Do you know Earnest B. Gonzales of Las Cruces? Accused of sex with a minor

Earnest Gonzales of Las Cruces, New Mexico
Charged with
criminal sexual penetration of a minor

Alledged pedophile arrested and released on bond,
 Police investigating

Earnest B. Gonzales made a big mistake Valentines day. He allegedly went to the house of his paramour and got caught. The only problem is, to Earnest Gonzales, lovers comes in young packages.

According to charges filed by the Las Cruces police, Gonzales, 35, was saying good by to a 14 year old girl February 14th in the 5800 block of Stern Drive. Mom and dad were out of the house at the time. Gonzalez apparently stayed a little late and he was spotted by the girl's parents as he left the child's house, according to allegations.

Apparently, after questioning, the truth, according to Hoyle and someone else, started coming out. It is not clear who talked, Earnest B. Gonzales or the child, or whether it all a matter of speculation. No matter who spilled the beans, the girl allegedly had been having sex with Ernesto since she was 12 years old!

The Las Cruces Sun-News reported after picking the story up from a police department press release. According to the report, Ernie was arrested and charged with one fourth-degree felony count of criminal sexual penetration of a minor. Gonzales was transported to the Dona Ana County Detention Center with bond set at $5,000.

The investigation is on-going. That is a nice way of saying, if you have information on this sick relationship you should come forward. Those who remain silent for fear they are mistaken or to say they are not a "rat" are protecting and encouraging the theft of something precious: The childhood of a young girl has been robbed if allegations are true, and justice must be done.

If you know anything about a relationship between a little girl who lives in the 5800 block of Stern Drive and Earnest B. Gonzales, it is time for the truth to come out. In some of these cases the truth can set a man free. If the truth leads to proof of charges of criminal sexual penetration of a minor, then the quicker Gonzales can be isolated from those he might harm, the better.

All persons have the right to be presumed innocent unless and until they are proven guilty in a court of law. Sexual penetration of a minor is a serious charges and Gonzales has only been accused. For everyone's sake, let's hope the entire affair is a big mistake.  Pic not of suspect, courtesy of Google Images.