{"id":16034,"date":"2021-04-09T00:00:36","date_gmt":"2021-04-08T23:00:36","guid":{"rendered":"https:\/\/dide.org\/sexting-sextortion-and-grooming-what-are-they-is-your-son-or-daughter-safe\/"},"modified":"2021-04-09T00:00:36","modified_gmt":"2021-04-08T23:00:36","slug":"sexting-sextortion-and-grooming-what-are-they-is-your-son-or-daughter-safe","status":"publish","type":"post","link":"https:\/\/www.dide.org\/en\/sexting-sextortion-and-grooming-what-are-they-is-your-son-or-daughter-safe\/","title":{"rendered":"Sexting, sextortion, and grooming. What are they? Is your son or daughter safe?"},"content":{"rendered":"<p><span style=\"color: #000000;\"><span style=\"font-weight: 400;\">According to data from the Aula TIC PYMES of the USC, 40% of adolescent girls in Europe between the ages of 14 and 15 see no problem in taking photos with sexual content. 1 in 6 minors would take them completely naked. This fact, in itself, is already worrying, but it is even more so if we take into account practices such as   <\/span><em><b>sexting<\/b><\/em><span style=\"font-weight: 400;\">, <\/span><b>sextortion<\/b><span style=\"font-weight: 400;\">, and <\/span><em><b>grooming<\/b><\/em><span style=\"font-weight: 400;\">. If half of these words sound foreign to you or you wouldn&#8217;t know how to fully explain what they are, keep reading. <\/span><\/span><\/p>\n<p><span style=\"color: #000000;\"><span style=\"font-weight: 400;\">At <\/span><a href=\"http:\/\/www.dide.app\"><strong>dide<\/strong><\/a><span style=\"font-weight: 400;\">  we believe that knowledge of these practices helps to identify and eradicate them. Therefore, we encourage parents to <a href=\"http:\/\/www.dide.app\"><strong>get to know their children better<\/strong><\/a> and the online world in which they are immersed, to ensure their safety not only in the physical environment. <\/span><\/span><\/p>\n<h2><span style=\"color: #000000;\">What is <em>sexting<\/em>?<\/span><\/h2>\n<p><span style=\"color: #000000;\"><span style=\"font-weight: 400;\">If we take into account that this English word derives from \u201csex\u201d which means sex and \u201ctexting\u201d which means sending, we will already have a slight idea about this practice. <\/span><b><i>Sexting<\/i><\/b><span style=\"font-weight: 400;\">  consists of sending messages, photographs or videos of a sexual nature over the Internet, with instant messaging and social networks being the most used channels. Although this practice is very common today, the main sexting practitioners <\/span> <span style=\"font-weight: 400;\">are adolescents between 12 and 16 years old, although it is also very widespread among adults, sometimes it constitutes a privacy problem. The main problem with  <\/span><b><i>sexting<\/i><\/b><span style=\"font-weight: 400;\">  is dissemination; when an image leaves a mobile phone, control of it is lost. It is impossible to know who, when, or where it has been seen. <\/span><\/span><\/p>\n<p><span style=\"color: #000000;\"><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-2441\" src=\"http:\/\/dide.org\/wp-content\/uploads\/2017\/05\/fototetas-300x151.png\" alt=\"\" width=\"600\" height=\"302\"><\/span><\/p>\n<h5 style=\"text-align: center;\"><span style=\"color: #000000;\">Statistics on Twitter for the hashtag &#8216;fototetas&#8217; as of 05\/11\/2017<\/span><\/h5>\n<h2><span style=\"color: #000000;\">What is <em>sextortion<\/em>?<\/span><\/h2>\n<p><span style=\"color: #000000;\"><span style=\"font-weight: 400;\">Although it can be very related, it is important not to confuse this term with <\/span><i><span style=\"font-weight: 400;\">sexting<\/span><\/i><span style=\"font-weight: 400;\">. <\/span><em><b>Sextortion<\/b><\/em><span style=\"font-weight: 400;\">  is sexual blackmail. The extortionist blackmails the victim with private content of the user, usually sexually explicit photos or videos. This content can be obtained by hacking technological devices, <em>sexting<\/em>, or   <\/span><b><i>grooming<\/i><\/b><span style=\"font-weight: 400;\">. In exchange for not disseminating said content, criminals demand something in return, from money, more content, payments, or favors of a sexual nature.<\/span><\/span><\/p>\n<p><span style=\"color: #000000;\"><img decoding=\"async\" class=\"aligncenter wp-image-2440\" src=\"http:\/\/dide.org\/wp-content\/uploads\/2017\/05\/sextorsion1-300x169.jpg\" alt=\"what is sextorsion\" width=\"600\" height=\"337\"><\/span><\/p>\n<h2><span style=\"color: #000000;\">What is <em>grooming?<\/em><\/span><\/h2>\n<p><span style=\"color: #000000;\"><span style=\"font-weight: 400;\"><b><i>Grooming<\/i><\/b><\/span><span style=\"font-weight: 400;\">  is understood as the series of actions and strategies carried out by an adult to gain the trust of a minor, through the Internet, with the aim of obtaining favors of a sexual nature. It is, therefore, sexual harassment of minors online. The person who performs these actions is called a \u2018  <\/span><i><span style=\"font-weight: 400;\">groomer<\/span><\/i><span style=\"font-weight: 400;\">\u2019.<\/span> <\/span><\/p>\n<p><span style=\"color: #000000;\"><span style=\"font-weight: 400;\">Their most common tactic is to pose as minors in order to contact their targets, gain their trust and, in this way, get them to send them sexually explicit content that compromises them. Once they get the files, they blackmail and extort the victim to get abuse in real life. When this happens, the \u2018  <\/span><i><span style=\"font-weight: 400;\">groomer<\/span><\/i><span style=\"font-weight: 400;\">\u2019 becomes a pedophile.<\/span><\/span><\/p>\n<p><span style=\"color: #000000;\"><img decoding=\"async\" class=\"aligncenter wp-image-2443 size-full\" src=\"http:\/\/dide.org\/wp-content\/uploads\/2017\/05\/grooming.jpg\" alt=\"\" width=\"600\" height=\"401\"><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400; color: #000000;\">Having explained these terms, you should know that the Spanish Penal Code in section 2 of article 183 defines these practices as a crime:<\/span><\/p>\n<blockquote><p><span style=\"color: #000000;\"><span style=\"font-weight: 400;\">\u201cAnyone who, through the Internet, telephone or any other information and communication technology, contacts a minor under sixteen years of age and performs acts aimed at deceiving him\/her into providing pornographic material or showing<\/span><span style=\"font-weight: 400;\"> pornographic images<\/span><span style=\"font-weight: 400;\"> in which a minor is represented or appears, shall be punished with a prison sentence of six months to two years.\u201d<\/span><\/span><\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400; color: #000000;\">Advice for parents on <em>sexting<\/em>, <em>sextortion<\/em> and <em>grooming<\/em><\/span><\/h2>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #000000;\">Talk to your son\/daughter about the wide dissemination that files can have on the Internet.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #000000;\">Make them understand that having permission to take or receive a photo of someone for private use does not mean they have permission to disseminate it. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #000000;\">Explain that even if they send the files to a friend or partner privately, third parties can get hold of them for harmful purposes.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #000000;\">Make your son\/daughter aware of the methods that criminals use to access private files.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #000000;\">Scan the computer for malicious software and remove it.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #000000;\">If you think your son\/daughter may be suffering blackmail, use dialogue and understanding. It is a serious issue that must be addressed. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #000000;\">If your son\/daughter suffers sextortion or <em>grooming<\/em>, save all the evidence of the blackmail and report it.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #000000;\">Place the computer in a common place or one that you can easily access to take a look. Give them privacy but have the ability to know what they are doing. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #000000;\">Restrict the use of the webcam and cover it when not in use. <em>Malware<\/em> can access it. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #000000;\">Make sure they use a nickname on the network.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; color: #000000;\">Get to know their friends, and if possible, their phone contacts.<\/span><\/li>\n<li><span style=\"color: #000000;\">Know their needs, their mood, their learning difficulties&#8230; to offer them family and professional help (the <strong><a style=\"color: #000000;\" href=\"http:\/\/www.dide.app\">dide family digital questionnaire<\/a><\/strong> makes observation easier for you).<\/span><\/li>\n<\/ul>\n<h2>Seek help from specialist professionals<\/h2>\n<p><span style=\"color: #000000;\"><span style=\"font-weight: 400;\">However, in order to intervene appropriately, parents must establish adequate communication based on trust to become aware that their child is being <strong>a victim of cyberbullying<\/strong> and therefore, seek the corresponding help from <strong><a style=\"color: #000000;\" href=\"http:\/\/lomber.es\/servicios\/intervencion\/\">specialist professionals<\/a><\/strong> (lawyers and psychologists) in prevention and intervention in the phenomenon, who will provide advice and management of the conflict. <\/span><\/span><\/p>\n<p><span style=\"color: #000000;\"><span style=\"font-weight: 400;\">The specialists at <\/span><strong><a style=\"color: #000000;\" href=\"http:\/\/lomber.es\/\">LOMBER Cyberbullying<\/a>,<\/strong> through dide technology, facilitate the recognition of indicators that may lead to a possible situation of bullying or cyberbullying (for example, problematic behaviors, school and\/or family maladjustment, low mood&#8230;), or if, on the contrary, they are facing a potential minor aggressor.<\/span><\/p>\n<p>You may be interested in: <a href=\"http:\/\/lomber.es\/violencia-a-traves-de-las-nuevas-tecnologia-difusion-de-videos-y-su-impacto\/\">Violence through new technologies. Dissemination of videos and their impact &nbsp;<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/dide.org\/dide-evaluacion-orientadora-del-perfil-del-alumno-necesidades-educativas\/\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8753 size-full\" title=\"dide edelvives, addiction to new technologies, video game abuse, \" src=\"http:\/\/dide.org\/wp-content\/uploads\/2020\/09\/GIF-2-970x250-Dide-05.gif\" alt=\"\" width=\"970\" height=\"250\"><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #000000;\">If you are a teacher, educational counselor, or Education student, this Online Course (e-learning) is for you. Start today and set your own pace. <\/span><\/p>\n<p><a href=\"https:\/\/www.dideformacion.com\/curso-completo\/Gestion-de-la-Atencion-a-la-Diversidad-e-Inclusion-en-el-Aula_Particular\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-9111 size-full\" title=\"online course, attention to diversity, inclusion, teacher training, faculty\" src=\"http:\/\/dide.org\/wp-content\/uploads\/2021\/11\/curso-dide-diversidad-tuiter.png\" alt=\"\" width=\"6912\" height=\"3456\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to data from the Aula TIC PYMES of the USC, 40% of adolescent girls in Europe between the ages of 14 and 15 see no problem in taking photos with sexual content. 1 in 6 minors would take them completely naked. This fact, in itself, is already worrying, but it is even more so [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":12218,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[713,711],"tags":[789,793,817,816,794,815,818,819],"class_list":["post-16034","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education-cabinets","category-family-education","tag-cyberbullying","tag-cyberbullying-2","tag-grooming","tag-harassment","tag-new-technologies","tag-prevention","tag-sexting","tag-sextortion"],"_links":{"self":[{"href":"https:\/\/www.dide.org\/en\/wp-json\/wp\/v2\/posts\/16034","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dide.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dide.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dide.org\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dide.org\/en\/wp-json\/wp\/v2\/comments?post=16034"}],"version-history":[{"count":0,"href":"https:\/\/www.dide.org\/en\/wp-json\/wp\/v2\/posts\/16034\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dide.org\/en\/wp-json\/wp\/v2\/media\/12218"}],"wp:attachment":[{"href":"https:\/\/www.dide.org\/en\/wp-json\/wp\/v2\/media?parent=16034"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dide.org\/en\/wp-json\/wp\/v2\/categories?post=16034"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dide.org\/en\/wp-json\/wp\/v2\/tags?post=16034"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}