Responsive Menu
Add more content here...
Select Page

SafetyPrepared – Safety for Kids Online

We are so grateful to the Cheezo Unit of our Jeffco Sheriff’s office for taking the time to share their expertise. Please take the time to watch this video and share! They have provided a wealth of knowledge and information regarding safety for kids online. If you have children or are a trusted adult of a child, you need this information!

https://www.jeffco.us/883/Cheezo

The Child Sex Offender Internet Investigations Unit, known as Cheezo, is at the forefront of the Sheriff’s Office’s commitment to ensure the safety of our children.

Predators use the internet as a gateway to victims because of the anonymity and the ability to lure children with minimal detection and apprehension. This same anonymity is capitalized upon by highly trained Cheezo investigators who portray themselves as teenagers online where adults seek victims for sexual purposes.

  • Since its inception in 2005, more than 920 arrests have been made in Jefferson County by Cheezo.
  • The Cheezo investigators have a combined 50 years’ experience in crimes against children.
  • Each year more than 150 Internet and cell phone safety presentations are given.
  • The Cheezo team have established themselves as leaders in the tracking predators and are sought for training to other law enforcement agencies nationwide.

 

One of the priorities of the Jefferson County Sheriff’s Office is the protection of our most vulnerable citizens, our children. While the allure of the internet and modern technology is here to stay, danger lurks in chat rooms and social media. Cheezo helps protect children by going undercover to investigate internet predators and by teaching them the safety tools they need to be safe with technology.  – Sheriff Jeff Shrader

Cheezo Resources

The Cheezo investigative team was the first in Colorado, and one of the first in the United States, to proactively seek out online predators. They divide their time between online investigations and presenting safety and educational programs to parents and children in the community.

Cheezo is proud of the technology safety programs presented to schools, parent groups and other organizations. Cheezo has presented more than 3,500 times to kids and adults. There is no charge for presentations or appearances.

Cheezo also offers presentations in Spanish. •

The Cheezo team goes undercover, following sex offenders into areas on the Internet frequented by kids. As of 2019, they have made more than 1,075 arrests.

If someone sends your child an inappropriate message or picture, contact your local law enforcement agency. Remember to save all messages and photographs for the law enforcement agency’s use. Even if a crime has not yet occurred, alarming communications should be reported to law enforcement.

It is illegal for an adult to engage in sexual talk with a child under the age of 15 and/or to talk about meeting a child for sexual purpose by email, text messaging, or online in chat rooms, social networking or game sites.

It is illegal for an adult to send naked pictures of themselves to a child under the age of 15 using cell phones or personal computers — email, text messaging, or online in chat rooms, social networking or game sites. • It is illegal for an adult to ask a child under the age of 18 for their naked pictures by email, text messaging or online in chat rooms, game or social networking sites.

CHEEZO Parent Handbook 2023

 

Tools for Parents – From Cheezo

Activities that may seem fairly harmless to your child can lure the many dangers of technology. There are some precautions your child can take, along with your help, that may help youth be safe with technology.

Set Limits

Different ages, maturity levels and special circumstances dictate what’s appropriate for each child. Banning youth from certain sites may motivate them to sneak time on them. The most important thing parents can do is stay involved with kids.

  • Limit device usage to a well-trafficked area in your home. Consider having your child check-in their devices at a certain time at night away from bedrooms.
  • Schedule times when a child can be on technology
  • Insist on access (including passwords) to social networks, email, gaming, and devices. Monitor periodically.
  • Watch for changes in your child’s relationships with adults. Adults who work with youth have professional boundaries; cultivating significant technological relationships with individual children is not appropriate.

Safeguard Accounts

It’s important for youth to know that anything they post can be saved. Viewers can screenshot or save and distribute photos or text. This means sexual images, photos depicting drug use, gang signs, threats or criminal behavior are all potentially permanent for their classmates, friends, enemies, parents and strangers.

  • The images, opinions and personal information shared can be used by others to manipulate, blackmail, or physically locate a person. Choose a neutral profile photo that doesn’t show faces. Consider an image of an object or landscape.
  • Never take nude or semi-nude photos of yourself or allow someone else to do so
  • Never give out names, addresses, phone numbers or school information
  • Select gender-neutral and age-appropriate screen names. You can inadvertently give out unwanted information with a screen name like “britt03” (Brittany, born in 2003). Screen names that suggest sex, violence or drugs, which might seem fun, can draw attention from the wrong people.
  • Lock down your privacy settings so that only approved friends can see photos, video and updates
  • Only accept friend requests from people you actually know, and trust and meet with face to face
  • If you are contacted, in any format, by someone you don’t know, do not respond. Use your settings to block that person from contacting you
  • Never agree to meet someone in person whom you met through technology. If you’re contacted by an adult you know, talk to your parents about the communication

Install Safety Software

Software is an effective way to filter dangerous content. This software usually comes with tools like time management, remote monitoring and reporting, and keystroke recognition. Check with your Internet Service Provider (ISP). Some ISP’s have filters you can purchase or they may provide filters for free. Visit a local electronics or computer store to examine and purchase a filtering software program or research and order a filtering software package. There are safety features available for cell phones as well, such as My Mobile Watch Dog.

Foster Open Communication

Open communication and trust is key. If your child comes to you about stumbling upon pornography or being approached by a stranger, they should be applauded. Many parents overreact out of fear and love. They tell their child they cannot go to that specific site or prohibit technology use altogether. That defeats all trust and closes the door to communication. After all, tech-savvy youth can easily delete incoming text messages and images. Parents must be vigilant.

  • You may control your child’s environment at home, but when they are away from home someone else might not share your same rules and concerns. Set guidelines as well as consequences.
  • Make sure you are clear with your youth about what you consider appropriate technology behavior. Just as certain clothing is probably off-limits and certain language is unacceptable in your house, let your children know what is and is not allowed with technology.
  • Make sure your kids understand that messages and pictures they send are not private or anonymous and could be shared with school administrators and potential employers. Also, ensure they understand the short-term and long-term consequences of their actions.
  • Teach your child that if they encounter pornography to quickly power off and get an adult. This can prevent a child from attempting to stop the situation by clicking more buttons and thereby spreading the attack. Talk with your child about the dangers of pornography. The addiction to pornography can become just as dangerous as an addiction to drugs.

 

Information for Parents – From Cheezo

Dangers of Technology

What do you do if you discover that your child may be talking to someone online that you suspect could be an adult?

If you suspect that your child is communicating with a predator through technology, consider the following steps: 

• Stop the communications immediately and take the technology being used away from the child until law enforcement is contacted.

• Do not contact the suspect or allow them to know parents are aware of communications.

• Note the location where the communications are taking place, such as Facebook, text messaging, apps, or gaming sites.

• Save, screen capture or print out the communications and/or pictures.

• Obtain your child’s password for signing onto their device.

• Obtain your child’s user name, email or screen name, along with the password for signing onto the site they are communicating.

• Note the user name, email or screen name of person communicating with your child.

• Do not delete the account, messages, or pictures.

Cheezo Technology Safety Book cover Opens in new window

Download or print this comprehensive safety guide for parents:

Cheezo Technology Safety Booklet

Child Predators

The anonymity of technology allows predators to alter their own personas. In one instance in Jefferson County, Cheezo posed as a young girl and received a series of messages from a supposed 17-year-old boy. His language and the topics he discussed were convincing. When he attempted to set up a meeting with the girl the investigators suspicions were confirmed; the “boy” was a 60-year-old convicted sex offender.

Threats

The Sheriff’s Office has investigated cases involving threats made through technology. In one case, a local boy posted photos of himself with his parents’ gun collection. Classmates reported that he had made threats. Investigators arrested the boy and charged him with unlawful possession of a handgun by a juvenile.

Sexting

There are criminal implications for adults or youth who possess sexual images or videos of young people. If you obtain the content from someone other than the original sender, or forward the content on to others, you could be charged with sexual exploitation of a child. This can result in jail time, and registration as a sex offender.

Identity Theft & Burglary

Sharing too much personal information, such as full name and date of birth, may allow a criminal to steal identities. Technology such as Google Street View, Facebook, Twitter, and Foursquare are being used by burglars to target homes and businesses.

Pornography

There is a massive amount of pornography available. Youth with access to porn may develop an unhealthy concept of sex. Extremes in sexual behavior depicted, or the sheer volume of images, can consume a youth until reality becomes a distant memory. Porn addiction, sexual aggression and violence toward women can develop from unrestricted access to porn.

 

Additional Links

Common Sense Media has a search function where you can look up apps, movies, books, etc. to see other parent review information before allowing your kids to use those apps (or movies or books). It also has resources for teaching internet safety – https://www.commonsensemedia.org/

https://protectyoungeyes.com/

https://internetsafety101.org/?gclid=EAIaIQobChMIq-_e0LyY6wIVxcDACh3GOAqDEAAYASAAEgLrOPD_BwE

 

NCMEC has great resources for training on talking with kids about safety –