4182015
4182015
Welcome
106 posts
This page is going to be about topics such as Paedophiles if you are sensitive to the topic please do not continue going through this account,
Don't wanna be here? Send us removal request.
4182015 · 6 years ago
Text
If we stop vaccination, deadly diseases will return.
Even with better hygiene, sanitation and access to safe water, infections still spread. When people are not vaccinated, infectious diseases that have become uncommon can quickly come back to haunt us.
When people have questions about vaccines they should ask their health providers and check accurate websites for information. Vaccine Safety Net, a global network of vaccine safety websites certified by WHO, provides easy access to accurate and trustworthy information on vaccines. The network has 47 member websites in 12 languages, and reaches more than 173 million people every month with credible information on vaccine safety, helping to counter harmful misinformation.
3 notes · View notes
4182015 · 6 years ago
Text
Sextortion
•What is Sextortion?
Sextortion is a form of sexual exploitation that employs non-physical forms of coercion to extort money or sexual favors from the victim. Sextortion refers to the broad category of sexual exploitation in which abuse of power is the means of coercion, as well as to the category of sexual exploitation in which threatened release of sexual images or information is the means of coercion
Red Flags
Those involved in the sextortion of children will:
•Approach a child on social media after using it to learn about the child’s interests, friends, school, family, etc.
•Intentionally move their communications with the child from one online platform to another (e.g., moving from social media to private video chat or messaging apps)
Use tactics to coerce a child, including:
•Reciprocation (“I’ll show you, if you show me”)
•Initially offering something to the child, such as money or drugs, in exchange for sexually explicit photos/videos
•Pretending to work for a modeling agency to obtain sexual images of the child
•Developing a bond with the child by establishing a friendship/romantic relationship
•Secretly recording sexually explicit videos of the child during video chats
•Physically threatening to hurt or sexually assault the child or the child’s family members
•Using multiple online identities to contact a child
•Pretending to be younger and/or a member of the opposite sex
•Accessing the child’s online account without authorization and stealing sexual images or videos of the child
•Threatening to create sexual images or videos of the child using digital-editing tools
•Threatening to commit suicide if the child does not provide sexual images or videos
•Saving sexually explicit conversations with the child and threatening to post them online
Risk Factors
There are certain online behaviors that may increase the risk for a child to be a victim of online enticement or sextortion. Some of these behaviors include:
•Lying about his or her age to access platforms which would allow a child to communicate with older individuals
•Initiating contact with an individual online or offering to provide sexually explicit images to the individual in exchange for financial compensation, alcohol or drugs, gifts, etc.
•Sending sexually explicit photos or videos (known as “sexts”) of oneself to another individual
18 notes · View notes
4182015 · 6 years ago
Text
What's ok: not wanting Children
What's not ok: having no empathy for children, and thinking emotionally abusing them is okay
7 notes · View notes
4182015 · 6 years ago
Note
Hi, so I saw this up on that Demi individuals Instagram
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
Dude you’re the one that needs help. We get that you don’t understand or like ace individuals BUT THIS ISNT OK.
You cannot go out there and attack someone who doesn’t have the same opinion, seriously what gave you the idea that this was chill? Like you’re 24 years old, not 14.
So stop acting like it, and I’m actually same age as that page and I have more senes then to pull this And id also never blame a persons sexuality is due to the abuse they experienced. Or even assume it was the adult figures in their life (cause it can be literally anyone)
If it’s platonic then don’t call it a relationship?? Relationship usually implies you are dating or fucking
anon doesn’t know what asexual means looool -🐾
25 notes · View notes
4182015 · 6 years ago
Text
Why I haven’t been on this account as much.
Hello everyone, I haven’t been on this account that much, that’s due to my mental health being in a not so good place.
I’m currently dealing with a medication that has given be the feeling of depression (due to a high level of hormones in it) and senes I have a personal connection to what this account fights against. It makes those feeling essentially escalate. On a level that’s uncomfortable.
If I have periods where I’m offline that’s why. I hope you guys can understand. Also thank you for supporting this account it means a hell of a lot that you do.
5 notes · View notes
4182015 · 6 years ago
Text
I Am Anonymous When I Use a VPN? 10 Myths Debunked
Tumblr media
So, this individual was harassing a account probably thinks that they cannot be found because of the VPN they use well, I’m about to bust some myths so that individuals like this one. Can’t use the VPN excuse on you the next time you’re online.
•I can be anonymous on the Internet
Anonymity is defined as not being named or identified. You are not anonymous when you are online, even when using privacy tools like Tor, Bitcoin or a VPN. Every service has at least one piece of information that can be used to distinguish different users, whether it’s a set of IP addresses (VPN and Tor) or a wallet (Bitcoin). This information alone may not reveal any private details about the user, but it can be associated with other similar information to eventually identify an individual.
Several publications have correctly pointed out that neither Tor nor Bitcoin make you anonymous.
A VPN doesn’t make you anonymous either, but does greatly increase your privacy and security online. A VPN is similar to the curtains for the windows of your house. The curtains provide privacy for activities happening inside your house even though your house address is public.
Privacy is a more realistic goal, not anonymity. Privacy is inherently personal and has different definitions for different people, but privacy generally means the ability to exclude information about yourself. Privacy can also mean the right to express yourself:
“privacy is your right and ability to be yourself and express yourself without the fear that someone is looking over your shoulder and that you might be punished for being yourself, whatever that may be”.- Evan Greer, Fight for the Future, Panelist at Golden Frog’s
(“Take Back Your Internet Privacy Panel” at SXSW 2014)
•Anonymity and privacy are the same
Services that claim to make you anonymous attempt to eliminate any identifying data (which is not a realistic goal, as discussed above). However, services designed to protect privacy instead allow users to control access to their personal data, but do not eliminate all identifying data.
Internet users can use private web browsers, proxies, Tor, encrypted messaging clients, VPNs and other great tools to increase their privacy online. These privacy tools help defend against mass surveillance by governments or by private corporations “deputized” to collect information at the direction of the government (in the United States companies such as AT&T, Verizon, Time Warner, Comcast). But none of these tools, alone or in any combination, make you anonymous. Online privacy through secure communications is a realistic goal, but anonymity is a false promise.
Edward Snowden has encouraged Internet users to focus on increasing privacy to defeat “mass surveillance”
“basic steps will encrypt your hardware and … your network communications [making] you…far, far more hardened than the average user – it becomes very difficult for any sort of a mass surveillance. You will still be vulnerable to targeted surveillance. If there is a warrant against you, if the NSA is after you, they are still going to get you. (emphasis added) But mass surveillance that is untargeted and collect-it-all approach you will be much safer.”
A VPN called Golden Frog had one of its founders post to the Usenet, “You are not anonymous on the Net. You can run, but you can’t hide.”
•When my VPN provider advertises an “anonymous” service, that means they don’t log any identifying information about me.
Several VPN providers advertise an “anonymous service” on the marketing pages of their website, but have terms in the fine print of their privacy policy indicating they do log.
A VPN Provider in the UK that advertised an “anonymous service” on its website was outed for turning over customer information about a LulzSec Hacker to the authorities. As you will read below, limited VPN logging is not necessarily bad, as it helps the VPN provider troubleshoot customer issues, prevent abuse of its IP space and network and offer different VPN plans (such as multi-device or GB limited plans). But advertising one service and delivering another service is wrong.
Here are some examples of VPN providers’ marketing messages that appear to contradict the fine print on the Privacy Policy page:
•Hotspot Shield:
Website: “anonymous browsing” with “no logs of your online activity or personal information”
Privacy Policy: “when you use our Service, we may automatically record certain information by using different types of proprietary technology (such as cookies), which may include your IP address, unique device ID, or application information installed on your device…” It goes on to describe that details such as IP address and unique device identifiers are not considered personally-identifiable pieces of information by the service.
•Express VPN:
Website: “surf anonymously”
Privacy Policy: “In addition to the information you provide through our order-form, we may store the following pieces of data: IP address, times when connected to our service, and the total amount of data transferred per day. We store this to be able to deliver the best possible network experience to you. We keep this information secure and private. If we receive complaints regarding copyrighted materials such as music and movies being shared over our network, we may filter traffic to see which account is sending it, and then cancel that account.”
•Pure VPN:
Website: “PureVPN anonymous VPN service;” “makes you anonymous;” “anonymous web surfing”
Privacy Policy: “…we will never release any information about you or your account to anyone except law enforcement personnel with the proper documentation and paperwork.”
“Furthermore, in the course of using PureVPN services, you or someone else on your behalf may give out information about yourself or give access to your system. This information may include, but not limited to:
•Names and IP addresses
•Operating systems
•Operational logs”
•Zenmate:
Website: “surf anonymously;” “browse anonymously”
Privacy Policy: “In order to prevent attacks against ZenGuard your IP address will be saved temporarily on the server without being stored permanently or used for any other purposes.”
“When choosing an access point please note that only this server will process your IP address and request for the webpage you would like to access (the “Targeted Website”).”
“…on the server you selected, your site request and your IP address are received via an encrypted connection.”
•CyberGhost:
Website: “surf anonymously;” “top notch security and anonymity”
Privacy Policy: “CyberGhost keeps no logs which enable interference with your IP address, the moment or content of your data traffic.”
Note: The CyberGhost privacy policy has updated recently but previously stated they “may process and use personal data collected in the setup and delivery of service (connection data). This includes Customer identification and data regarding time and volume of use.” Despite this privacy policy, they still advertised an “anonymous” service. Unfortunately, their newly updated privacy policy is confusing. It appears they say they don’t log the content of your traffic, but what about connection data such as IP address? Due to their previous marketing messages contradicting their prior privacy policy, I have concerns about their current privacy policy.
•When my VPN provider’s privacy policy says they “don’t log,” that means I am anonymous
When a VPN provider simply says they perform “no logging” it does not guarantee online anonymity or privacy. Any systems or network engineer will confirm that some minimal logging is required to properly maintain and optimize systems or the network. In fact, any provider claiming “no logging” should cause you to immediately question what is happening with your private data. If a VPN provider kept absolutely no logs, they wouldn’t be able to:
•Offer plans with limits on GB usage or per user basis
•Limit VPN connections to 1, 3 or 5 on a per user basis
•Troubleshoot your connection or offer support for server-side problems
•Handle your DNS requests when using the VPN service. They might rely on a 3rd Party DNS provider that logs DNS requests
•Prevent abuse, such as spammers, port scanners and DDOS to protect their VPN service and their users
•Even if my VPN provider uses hosted or cloud-based VPN servers I can still be anonymous
Anyone that runs server infrastructure knows running infrastructure with ZERO logs is extremely difficult, if not impossible. Now imagine how hard it would be to eliminate logging if you DIDN’T run your own infrastructure and instead rented your VPN servers and network from 3rd parties! Aside from Golden Frog, virtually all VPN providers in the world do not run their own infrastructure. Instead, VPN providers “rent” their servers and network from a “landlord,” such as a hosting company or data center. When the VPN provider “rents” instead of “owns,” how can it guarantee that its “landlord” will respect the privacy of its VPN users?
a Dutch customer of a “no log” VPN Provider was tracked down by authorities by using VPN connection logs after using the “no log” VPN service to make a bomb threat. The VPN provider’s data center provider (“landlord”) apparently seized the VPN server at the direction of the authorities. The data center provider was also keeping network transfer logs of the VPN provider. The VPN Provider says they cancelled the contract with the data center but strangely didn’t address the other 100+ locations where they presumably rent VPN servers. Did they cancel contracts with those data centers too? Predictably, this same VPN Provider still prominently advertises an “anonymous VPN service” and claims it keeps “absolutely no logs.”
In the forum of a different VPN Provider, a discussion thread conveniently disappeared when a user questioned whether users can trust data centers to not log.
In 2016, another VPN provider, Perfect Privacy, had two of its servers seized by police in the Netherlands. In this instance the authorities went straight to the hosting provider to obtain the hardware, bypassing the VPN provider completely. This again illustrates the danger of using third parties. If a provider uses third-party hosting and isn’t even contacted when the servers are seized, how can they possibly ensure your data and information are kept safe?
Some questions to ask about VPN Providers who “rent” servers include:
•How can the “Server Renters/Cloud” protect their users from their hosting companies taking snapshots of their machines for backup purposes, DDOS purposes, or at the direction of law enforcement?
•How can “server renters” prevent a live migration of the hosted VPN server in which an entire image is taken of the computer, including operating system memory and hard drive, especially when live migrations can be invisible to the VPN Provider?
•What happens to the data when the hosted machine is no longer used by the VPN provider?
•If you don’t own the server, how can you be sure your landlord doesn’t have a key or backdoor into the hosted server?
•Even if my VPN provider doesn’t own and operate the network I can still be anonymous
Most VPN providers (except Golden Frog) don’t run their own network and instead let hosting providers run the network for them. “Running your own network” means you own and operate the router and switches. If your VPN provider does not run its own network, you are susceptible to their hosting company listening for traffic on both inbound and outbound connections. Listening to Internet traffic allows for a tremendous amount of correlation and identification of user activity.
For example, if you listen to two people talk in a restaurant you can learn enough from the conversation to identify who is talking even if you don’t know their identity when you start listening. If a VPN provider does not run its own routers, then it can’t control who is listening to its users. Even worse, a “no-logging” VPN provider admitted that it used a “packet sniffing” software to monitor traffic to prevent abuse.
•Any VPN logging is bad
By logging a minimal amount of data, VPN providers can vastly improve your experience when using a VPN. VPN providers should only retain the minimum amount of data to operate their business and delete that data as soon as they don’t need it.
Edward Snowden recently said at SXSW 2014:
“One of the things I would say to a large company is not that you can’t collect any data but that you should only collect the data and hold it for as long as necessary for the operation of the business.”
Minimal logging provides VPN users the following benefits:
•Improved speed and performance by allowing VPN providers to optimize network connections
•Improved reliability by allowing VPN providers to identify and fix low level service issues to prevent outages
•Troubleshooting of specific customer issues, including speed, connection and application issues
•Different levels of accounts to meet customer needs, such as connection limited accounts and byte limited accounts
•Protection against abuse from spammers, port scanners, DDOS, etc, so VPN providers can terminate customers who are abusing other Internet users.
•Privacy companies don’t collect or sell my data
I have seena disturbing trend of “so-called” privacy companies offering free services so they can snoop on users. Just because a company offers a privacy product or service does not mean they will keep your data private. This is especially true for companies that offer free services to users. When you use a privacy tool you are often are required to give access to more information than the tool can protect, so you need to trust the company. Marketing companies have rushed into the privacy space and are abusing that trust. Here are some examples:
•Onavo (by Facebook)
Facebook bought a VPN app called Onavo in 2013. Why would Facebook buy a VPN app? Because the VPN functionality gives the app visibility into the network connection for the entire phone. Consequently, information such as URLs and app usage is exposed, and Facebook can examine user activity for their own purposes. The price of free is just too high.
Privacy Policy: “When you use the Apps, you choose to route all of your mobile data traffic through, or to, Onavo’s servers. As a result, we receive information regarding you, your online activities, and your device or browser when you use the Services.”
•Hola
Hola is yet another offender masquerading as a privacy company. Hola offers “secure browsing” to its users, but was recently revealed to be selling the bandwidth of its free users without their knowledge, effectively turning them into a botnet.
Privacy Policy: “The Personal Information we collect and retain include your IP address, your name and email address in case you provide us with this information (for instance when you open an account or if you approach us through the “contact us” option), screen name, payment and billing information (if you purchase premium services) or other information we may ask from time to time as will be required for the Services provisioning.”
•VPN Defender (by App Annie)
App Annie is a mobile analytics firm that collects and sells app usage data to companies, such as venture capitalists, for competitive research. App Annie bought VPN Defender last year presumably, just like Facebook, so they could collect more app usage data. In the analytics industry, this practice is called “selling the insides.”
Privacy Policy: “Analyzing your use of mobile applications and data, which may include combining such information (including personally identifying information) with information we receive from Affiliates or third parties; Providing market analytics, business intelligence, and related services to Affiliates and third parties; Operating the Services, such as virtual private networks and device monitoring.”
•Web Proxy Services
Most proxies don’t encrypt your Internet connection, and to operate they have visibility to each and every URL you visit. A recent blog post that analyzed the security of free proxy services determined that only 21% of the over 400 services examined weren’t “shady,” and over 25% of proxies modified the web code to inject ads. Many companies who offer services to help you be “anonymous” online actually collect a great deal of personal and identifying information on their users information which they could sell.
• All VPN software is the same
As a study pointed out, some VPN products can suffer from IPv6 leakage and DNS vulnerabilities, causing many users to think twice about relying on a VPN to protect them online. However, not all VPNs are created equal. When it comes to the IPv6 leak, only VPNs that run through IPv6 are in danger, and those that use 3rd-party clients are most at risk. As for the DNS vulnerabilities, most VPN providers don’t offer their own DNS servers like Golden Frog does. When DNS requests are sent over 3rd-party networks to 3rd-party DNS servers, users are more vulnerable to monitoring, logging or manipulation.
•Tor is a better alternative than a VPN
Tor is frequently cited as an alternative to using a VPN. However, as several publications have correctly pointed out, Tor doesn’t make you anonymous. Even Tor admits that it can’t solve all anonymity problems and cautions users to proceed accordingly. Tor is difficult for the average Internet user to setup, and users often complain that Tor is slow. One publication even said “If you still trust Tor to keep you safe, you’re out of your damn mind.”
•http://motherboard.vice.com/blog/tor-is-less-anonymous-than-you-think
•https://www.torproject.org/about/overview.html.en#stayinganonymous
I hope this helps you all understand Vpns a bit better.
To any child predators that actually use a VPN and think that they are anonymous you are not, VPNs do not make you anonymous they only make your connection private.
16 notes · View notes
4182015 · 6 years ago
Text
Teacher admits to performing oral sex on 15-yr-old female student and sending her explicit messages
TW: sexual abuse
Lauren Coyle-Mitchell, who is 36, can no longer seek public employment, and will have to register as a sex offender, then give up her teaching license.
Tumblr media
A former elementary school teacher from New Jersey who allegedly performed oral sex on a 15-year-old female student and sent her explicit text messages more than three years ago has now admitted to her crimes.
In the presence of her firefighter husband in court on Wednesday, Lauren Coyle-Mitchell, 36, pleaded guilty to charges including aggravated sexual assault and endangering the welfare of a child, Daily Mail reports.
According to prosecutors, Coyle-Mitchell performed oral sex on the eighth-grader at her home in Lyndhurst while she was teaching second grade at the Dr. Lena Edwards Academic Charter School in Jersey City back in 2015.
Coyle-Mitchell will be sentenced to five years in state prison followed by parole supervision for the rest of her life, per the terms of her plea agreement. According to NorthJersey.com, she will no longer seek public employment, will have to register as a sex offender, and give up her teaching license.
The teacher reportedly exchanged explicit conversations with the victim via text and email before she performed oral sex on her at least once between October 1, 2014, and June 15, 2015, according to her indictment.
During a class trip to Washington DC in June 2015, school staff observed what they considered inappropriate behavior between Coyle-Mitchell and the female student, leading to the former's arrest.
A month later, the married teacher allegedly violated her bail conditions and contacted the victim, resulting in her second arrest on contempt of court charges. According to prosecutors, Coyle-Mitchell called the girl twice from a restricted number and sent a one-word text message with her "pet name" as endearingly used by the teacher.
Mitchell had allegedly researched how to restrict her number while making a phone call and downloaded an application that would enable her to do so, investigators later discovered.
However, the girl did not respond to either of the missed calls or the text message.
At the time, the defense attorney argued that his client was merely a mentor to the eighth-grader and claimed she was suffering from a post-traumatic stress disorder and an anxiety disorder. While attempting to contact the girl after her arrest, he said Mitchell had a "moment of poor judgment." According to NJ.com, the State Board of Examiners suspended her teaching certificates last May.
Coyle-Mitchell’s sentencing hearing is scheduled for August 2.
3 notes · View notes
4182015 · 6 years ago
Text
Tumblr media Tumblr media
You have got to be shitting me.
33 notes · View notes
4182015 · 6 years ago
Text
Tumblr media Tumblr media Tumblr media
Regardless of what this individual is saying, transgender women are women. And you can identify as such.
Also, I don't have time for transphobic individuals on this page. So this will be the only time I state this
4 notes · View notes
4182015 · 6 years ago
Text
FAQ part 2
How is grooming children different on the internet?
In many circumstances, grooming online is faster and anonymous and results in children trusting an online ‘friend’ more quickly than someone they had just met 'face to face’. Those intent on sexually harming children can easily access information about them and they are able to hide their true identity, age and gender. People who groom children may not be restricted by time or accessibility to a child as they would in the 'real world’.
Who monitors sex offenders in the community?
By law, the police service, the prison service and the probation service have to work together, sharing information to manage known offenders. They are supported by various other agencies, including Local Safeguarding Children Boards and the NHS, who are also required to provide information about these offenders.
How does this operate?
•Identify who may pose a risk of harm
•Share relevant information about them
•Assess the nature and extent of that risk
•Manage that risk effectively, protecting victims and reducing further harm
As part of managing the individual’s risk, it may be considered necessary for information about offenders to be disclosed directly to others by the Police in order to prevent harm, these may include new partners, landlords or school Head Teachers. Information is not disclosed to the public unless they are in a position to better monitor and manage the offender or unless they are potentially at risk.
Registered sexual offenders are required to notify the police of their name, address and other personal details. The length of time an offender is required to register with police, can be any period between 12 months and life, depending on the age of the offender, the age of the victim and the nature of the offence and the sentence they receive.
Is viewing sexual images of children child abuse?
To view child abuse images is to participate in the abuse of a child. Those who do so may also be abusing children they know. Making, downloading or viewing sexual images of children on the Internet is a crime. People who look at this material need help to prevent their behaviour from becoming even more serious.
Does treatment of abusers work?
Yes, however abhorrent their behaviour, and few are the predatory violent offenders portrayed in the media. Adults who abuse children are responsible for their behaviour and can choose to stop. Experts agree that with successful completion of specialised treatment, people who sexually abuse children can learn how to control their actions and become part of the solution of keeping children safe.
Child sexual abuse is a crime and must be dealt with first through the child protection and criminal justice systems. But, to prevent further abuse, it’s in my best interest as a society to provide the best treatment available to every abuser who wants to change. It’s also in our best interests to build a system that really supports offenders in their recovery so that they have the chance to contribute positively to society. When people who abuse children are firmly supported and held accountable for their actions, they are more likely to live productive, abuse-free lives.
What happens if I report my case?
If a child is in immediate danger call 999.
Every case is different so it is difficult to say what might happen if you report your suspicions to the authorities. There are various courses of action you can take including contacting the police or Children’s Social Services. These agencies have joint working arrangements for responding to suspected child abuse. Someone will talk to you about your concerns and may ask for details so the situation can be investigated further. Police and social work teams are very experienced in this work and will deal sensitively with the child and family.
If you want to talk about your concerns and possible courses of actions, the Stop it Now! helpline is available for confidential advice and information. The Helpline operates from 9am-9pm Monday-Thursday and from 9am-5pm on Friday. Stop it Now! can also provide help through its secure messaging service, with a response in within 5-7 working days. Please do call their helpline if you have any concerns.
Where can I get further help or advice?
If you are worried about someone’s behaviour towards a child, you can:
•Contact your local police
•Contact your local Social Services
•Contact the Stop it Now! Helpline (0808 1000 900)
•Contact the NSPCC Helpline (0808 800 5000)
•Report online to the Child Exploitation and Online Protection (CEOP) Centre
24 notes · View notes
4182015 · 6 years ago
Text
FAQ part one
What is child sexual abuse?
Child sexual abuse includes touching and non-touching activity. Some examples of touching activity include:
•touching a child’s genitals or private parts for sexual pleasure
•making a child touch someone else’s genitals, play sexual games or have sex putting objects or body parts (like fingers, tongue or penis) inside the vagina, in the mouth or in the anus of a child for sexual pleasure
Some examples of non-touching activity include:
•showing pornography to a child
•deliberately exposing an adult’s genitals to a child
•photographing a child in sexual poses
•encouraging a child to watch or hear sexual acts
•inappropriately watching a child undress or use the bathroom
As well as the activities described above, there is also the serious and growing problem of people making and downloading sexual images of children on the Internet (also known as child pornography).
To view child abuse images is to participate in the abuse of a child. Those who do so may also be abusing children they know. People who look at this material need help to prevent their behaviour from becoming even more serious.
What’s the impact of abuse to the child?
The impact of sexual abuse varies from child to child. For many, the damage is enormous, with the impact still being felt into adulthood, affecting all aspects of their life.
What help is therefor victims?
• MOSAC (Mothers of Sexually Abused Children) is a voluntary organization supporting all non-abusing parents and carers whose children have been sexually abused. They provide advocacy, advice and information, befriending, counselling, play therapy and support groups following alleged child sexual abuse. Visit www.mosac.org.uk for more information or call their national helpline on 0800 980 1958.
• NAPAC is the National Association for People Abused in Childhood. It is a registered charity providing support and information for people abused in childhood. Visit www.napac.org.uk/.
• SURVIVORS UK provides information, support and counselling for men who have been raped or sexually abused. Thousands of men contact them each year. Visit www.survivorsuk.org/ or call their national helpline on 0845 1221201. Helpline hours: 7pm-9.30pm Monday and Tuesday and 12pm-2.30pm on Thursdays
These organisations are able to assist those looking for help, support or information.
How widespread is child sexual abuse?
Child sexual abuse is largely a hidden crime, so it is difficult to accurately estimate the number of people who are sexually abused at some time during their childhood. It is estimated that one in six children experience sexual abuse before the age of 16.- Child Maltreatment in the UK, NSPCC 2000
What’s the biggest myth around child sexual abuse?
Very often the TV, radio and newspaper cover stories about children who are abused, abducted and even murdered, usually by strangers but it is important to know that these are not typical crimes. Sexual abusers are more likely to be people we know, and could well be people we care about; after all more than 8 out of 10 children who are sexually abused know their abuser. They are family members or friends, neighbours or babysitters many hold responsible positions in society. Some will seek out employment which brings them into contact with children, some will hold positions of trust which can help to convince other adults that they are beyond reproach, making it hard for adults to raise their concerns.
Why do people commit child sexual abuse?
It is not easy to understand how seemingly ordinary people can do such things to children. Some people who sexually abuse children recognize that it is wrong and are deeply unhappy about what they are doing.
While others believe their behaviour is OK and that what they do shows their love for children. Some, but not all, have been abused themselves; others come from violent or unhappy family backgrounds.
Knowing why people sexually abuse children does not excuse their behaviour, but it may help us understand what is happening. If abusers face the reality of what they are doing and come forward, or if someone reports them, effective treatment programmes are available. These help people understand and control their behaviour, reducing risk to children and building a safer society. Knowing about the possibility of treatment for abusers helps children and families too.
How do they sexually abuse children?
• By getting close to children:
People who want to abuse children often build a relationship with the child and the caring adults who want to protect them. Many are good at making ‘friends’ with children and those who are close to them. Some may befriend parents who are facing difficulties, sometimes on their own. They may offer to baby-sit or offer support with childcare and other responsibilities. Some seek trusted positions in the community which put them in contact with children, such as childcare, schools, children’s groups and sports teams. Some find places such as arcades, playgrounds, parks, swimming baths and around schools where they can get to know children.
• By silencing children:
People who sexually abuse children may offer them gifts or treats, and sometimes combine these with threats about what will happen if the child says 'no’ or tells someone. They may make the child afraid of being hurt physically, but more usually the threat is about what may happen if they tell, for example, the family breaking up or father going to prison. In order to keep the abuse secret the abuser will often play on the child’s fear, embarrassment or guilt about what is happening, perhaps convincing them that no one will believe them. Sometimes the abuser will make the child believe that he or she enjoyed it and wanted it to happen. There may be other reasons why a child stays silent and doesn’t tell. Very young or disabled children may lack the words or means of communication to let people know what is going on.
Who sexually abuses a child?
There is a growing understanding that sexual abusers are likely to be people we know, and could well be people we care about; after all more than 8 out of 10 children who are sexually abused know their abuser. They are family members or friends, neighbours or babysitters many hold responsible positions in society. Some people who abuse children have adult sexual relationships and are not solely, or even mainly, sexually interested in children. Abusers come from all classes, ethnic and religious backgrounds and may be homosexual or heterosexual. Most abusers are men, but some are women. You cannot pick out an abuser in a crowd.
Why don’t children speak up?
Three quarters of children who are abused do not tell anyone about it and many keep their secret all their lives. In 2000 a study was conducted by the NSPCC and below are some of the reasons why children were unable to tell:
“it was nobody else’s business”
“didn’t think it was serious or wrong”
“didn’t want parents to find out”
“didn’t want friends to find out”
“didn’t want the authorities to find out”
“was frightened”
“didn’t think would be believed”
“had been threatened by abuser”
Child Maltreatment in the UK, NSPCC 2000
What should I do if a child is or has been abused?
It is very disturbing to suspect someone we know of sexually abusing a child, especially if the person is a friend or a member of the family. It is so much easier to dismiss such thoughts and put them down to imagination. But it is better to talk over the situation with someone than to discover later that we were right to be worried. And remember, we are not alone.
Thousands of people every year discover that someone in their family or circle of friends has abused a child. Children who are abused and their families need professional help to recover from their experience. Action can lead to abuse being prevented, and children who are being abused receiving protection and help to recover. It can also lead to the abuser getting effective treatment to stop abusing and becoming a safer member of our community. If the abuser is someone close to us, we need to get support for ourselves too.
Can a child sexually abuse another child?
We are becoming increasingly aware of the risk of sexual abuse that some adults present to our children and there is growing understanding that this risk lies mostly within families and communities. But very few people realise that other children can sometimes present a risk.
A third of those who have sexually abused a child are themselves under the age of 18.
Many children are abused by other children or young people, often older than themselves. Unless the problem is recognised and help provided, a young person who abuses other children may continue abusing as an adult.
This is an especially difficult issue to deal with, partly because it is hard for us to think of children doing such things, but also because it is not always easy to tell the difference between normal sexual exploration and abusive behaviour. Children, particularly in the younger age groups, may engage in such behaviour with no knowledge that it is wrong or abusive. For this reason, it may be more accurate to talk about sexually harmful behaviour rather than abuse.
Why do some children do this?
The reasons why children sexually harm others are complicated and not always obvious. Some of them have been emotionally, sexually or physically abused themselves, while others may have witnessed physical or emotional violence at home. For some children it may be a passing phase, but the harm they cause to other children can be serious and some will go on to abuse children into adulthood if they do not receive help. For this reason it is vital to seek advice and help as soon as possible.
Why don’t we see Abuse?
Many people have experienced someone close to them abusing a child. When something is so difficult to think about, it is only human to find ways of denying it to ourselves. One of the common thoughts that parents in this situation have is; 'My child would have told me if they were being abused and they haven’t so it can’t be happening’.
Other things people have said to themselves to deny what is happening include:
• “He was the perfect father; he was involved with the children, he played with them and when our daughter was ill he looked after her so well.”
• “I thought they were just fooling around. He couldn’t be abusing anyone at 14.”
• “My brother would never do that to a child. He has a wife and children.”
• “My friend has had a longstanding relationship with a woman. So how can he be interested in boys?”
• “She was their mother: how could she be abusing them?”
• “He told me about his past right from the start. He wouldn’t have done that if he hadn’t changed and I’d know if he’d done it again.”
Warning signs of child sexual abuse
Children often show us rather than tell us that something is upsetting them. There may be many reasons for changes in their behaviour, but if we notice a combination of worrying signs it may be time to call for help or advice.
What to watch out for in children:
•Acting out in an inappropriate sexual way with toys or objects.
•Nightmares, sleeping problems.
•Becoming withdrawn or very clingy.
•Personality changes, seeming insecure.
•Regressing to younger behaviours, e.g. bedwetting.
•Unaccountable fear of particular places or people.
•Outburst of anger.
•Changes in eating habits.
•Physical signs, such as, unexplained soreness or bruises around genitals, sexually-transmitted diseases.
•Becoming secretive.
Waring Signs that an adult is using their relationship with a child for sexual reasons
Signs that an adult is using their relationship with a child for sexual reasons may not be obvious. We may feel uncomfortable about the way they play with the child, or seem always to be favouring them and creating reasons for them to be alone. There may be cause for concern about the behaviour of an adult or young person if they:
•Refuse to allow a child sufficient privacy or to make their own decisions on personal matters.
•Insist on physical affection such as kissing, hugging or wrestling even when the child clearly does not want it.
•Are overly interested in the sexual development of a child or teenager.
•Insist on time alone with a child with no interruptions.
•Spend most of their spare time with children and have little interest in spending time with people their own age.
•Regularly offer to babysit children for free or take children on overnight outings alone.
•Buy children expensive gifts or give them money for no apparent reason.
•Frequently walk in on children/teenagers in the bathroom.
•Treat a particular child as a favourite, making them feel 'special’ compared with others in the family.
•Pick on a particular child.
How are children groomed?
Grooming is a word used to describe how people who want to sexually harm children and young people get close to them, and often their families, and gain their trust. They do this in all kinds of places in the home or local neighbourhood, the child’s school, youth and sports club, the local church and the workplace.
Grooming may also occur online by people forming relationships with children and pretending to be their friend. They do this by finding out information about their potential victim and trying to establish the likelihood of the child telling. They try to find out as much as they can about the child’s family and social networks and, if they think it is 'safe enough’, will then try to isolate their victim and may use flattery and promises of gifts, or threats and intimidation in order to achieve some control.
It is easy for 'groomers’ to find child victims online. They generally use chat rooms which are focussed around young people’s interests. They often pretend to be younger and may even change their gender. Many give a false physical description of themselves which may bear no resemblance to their real appearance - some send pictures of other people, pretending that it is them. Groomers may also seek out potential victims by looking through personal websites such as social networking sites.
Can an adult be groomed?
Child sex offenders will often seek out adults and groom them in order to get access to their children. By “bonding” with adults in this way the sex offender can create a relationship either built on trust or dependency and gain access to the children through it.
How do children get exploited online?
When communicating via the internet, young people tend to become less wary and talk about things far more openly than they might when communicating face to face. Both male and female adults and some young people may use the internet to harm children. Some do this by looking at, taking and/or distributing photographs and video images on the internet of children naked, in sexual poses and/or being sexually abused.
6 notes · View notes
4182015 · 6 years ago
Text
Exactly, that’s why I hate DDLG relationships that involves a minor. Because one THATS A CHILD. Two ITS NOT MENT FOR THAT. And it makes everyone who’s in that look like potential predators.
Pulse, I’ve heard of minors being groomed into ddlg relationships, Which generally makes me want to be sick.
Maps definitely should not be using ddlg because they Actually have a attraction to minors. They can use it as a excuse to get Cp or harm a child.
What is the difference between age regression and ddlg
What is age regression?
Age regression in therapy is a technique in a psycho-therapeutic process that facilitates access to childhood memories, thoughts and feelings. Age regression includes hypnotherapy, a process where patients move their focus to memories of an earlier stage of life in order to explore these memories or to get in touch with some difficult-to-access aspects of their personality.
What is ddlg?
Daddy Dom / Little Girl. DDLG, or dd/lg, is a relationship in which one person is the caregiver or “daddy” and the other is childlike. It is NOT a relationship between an actual father and daughter or any minor. This is a type of BDSM relationship that may or may not involve sex, but often involves play with child-like things, such as stuffed animals, bed-time stories, and spankings. The lg part of the relationship is often called the “little.”
What’s the difference?
Age regression is simply meant to be a therapy technique. And majority of the the time NON-SEXUAL.
While DD/LG can be considered a kink and can actually be sexual. DD/LG isn’t supposed to have anything to do with minors. If you see a ddlg situation with an adult and minor. Please report that to someone.
68 notes · View notes
4182015 · 6 years ago
Text
Age play is basically a form of role playing in which an individual acts or treats another as if they were a different age, it can be done sexually or non-sexually, but Age play is generally supposed to be role playing between adults, and involves consent from all parties
This can also be a kink as well. But I’m not 100% sure given it’s role playing.
Generally speaking there is a difference between the the three, but calling Ddlg a kink like it is. Isn’t ment to be used as an excuse for MAPS to use.
Given they would be completely correct if they said that but even though it’s a kink those individuals shouldn’t be doing ddlg. Especially if they are of high risk of harming a child.
Also I never said I was against DDLG. This post was juts ment to expian the two.
What is the difference between age regression and ddlg
What is age regression?
Age regression in therapy is a technique in a psycho-therapeutic process that facilitates access to childhood memories, thoughts and feelings. Age regression includes hypnotherapy, a process where patients move their focus to memories of an earlier stage of life in order to explore these memories or to get in touch with some difficult-to-access aspects of their personality.
What is ddlg?
Daddy Dom / Little Girl. DDLG, or dd/lg, is a relationship in which one person is the caregiver or “daddy” and the other is childlike. It is NOT a relationship between an actual father and daughter or any minor. This is a type of BDSM relationship that may or may not involve sex, but often involves play with child-like things, such as stuffed animals, bed-time stories, and spankings. The lg part of the relationship is often called the “little.”
What’s the difference?
Age regression is simply meant to be a therapy technique. And majority of the the time NON-SEXUAL.
While DD/LG can be considered a kink and can actually be sexual. DD/LG isn’t supposed to have anything to do with minors. If you see a ddlg situation with an adult and minor. Please report that to someone.
68 notes · View notes
4182015 · 6 years ago
Text
Tumblr media
Generic
Lessons learnt from this summer by @minijournals
Tips and guides
Selfcare guide
Self care by @kimanoir
Self care tips for students by @theorganisedstudent
12 steps for self care
Self-care to do list
Some little self care things by @irinastudies
Self-care guide by @thetrevorproject
101 self care ideas by @microstvdy
Self care by @littleredstudies
Finals self care by @rubypolar
Instruction manual by @hufflepuffwannabe
Some self care tips by @lovefulls
Self care by @lazyhermione
15 self care ideas by @kaleylearns
Little self care things by @flowerais
Self-care by @mlstudies
Self care by @likelyhealthy
A very brief guide to selfcare by @ejlandsman
My favourite selfcare tips by @rubynerdy
26 selfcare activities by @sheisrecovering
Little habits/things to do more of by @heyrosiebee
Sleep
Guide to sleep by @educatier
Balancing sleep & education by @brbimstudying
Perfect night sleep
How to go to bed early and actually fall asleep
Water
How to drink more water ft printables
Hydration masterpost
Breaks
Take a break
Types of study breaks by @samsstudygram
Tips for getting better rest
Treat yourself
Simple ways to treat yourself by @anitastudy
Guide to treating yourself by @pennyfynotes
25 No/Low cost self care acts by @gaygirlhustle
Feel good
How to feel better by @bbangstudies
Feel good by @librarystudies
7 ways to feel better by @p-antarei
If you are having a bad day by @theblacksiren
Destress
Easy ways to destress by @parisgellerstudy
Stress relievers by @noteology
How to deal with stress by @studywithclover
Apps to help you destress by @gracelearns
Tips to manage stress by @fairy-studies-blr
Burnout
How to deal with study burnout by @eintsein
Avoid education burnout by @neuroticmedblr
Mental health
Saving your grades from a crisis by @smartstudy
Chronic illness + studying by @studysenior
Coping with mental health by @overstudies
Studying with depression by @rannedomblr
Anxiety
Anxiety distraction games by @peachou
Anxiety masterpost by @dotgrids
Relaxing doesn’t help anxiety by @merrybitchmas91
Meditation and focus
Study sounds
Others
What to do with notebooks by @tbhstudying
Podcasts for students by @studyquill
Period masterpost
Dealing with eye strain by @studylikeaslytherin
Listen by @studyblr
50 things you can do without looking at a screen
How to live a better life by @wilstudies
Fitness & health for student by @abby-studies-art
Friendly reminders taken from @cwote
Your mental health is more important than your grades
You are good enough, smart enough, pretty enough, and strong enough
Don’t just be good to others, be good to yourself too
Embrace all that is you
You will be okay
Just breathe. It will be okay.
Be proud of yourself for how hard you’re trying.
Be nice to yourself
Don’t beat yourself up. You are doing the best you can.
Be gentle with yourself, you’re doing the best you can.
Better things are coming.
Loving yourself is the greatest revolution.
Remind yourself, you deserve to be happy
Respect yourself. Don’t let others tell you who you are.
Learn to say no to people and things that make you unhappy.
Enjoy your own company.
Forgive yourself.
Never apologise for how you feel
Give yourself some credit. You’ve come pretty far.
Mental health is just as important as physical health.
Surround yourself with good vibes
Stop worrying about people who aren’t worried about you.
If you find you are surrounded by toxic people… Cut. Them. Out.
Trust yourself. You’re smarter than you think.
16K notes · View notes
4182015 · 6 years ago
Text
What is the difference between age regression and ddlg
What is age regression?
Age regression in therapy is a technique in a psycho-therapeutic process that facilitates access to childhood memories, thoughts and feelings. Age regression includes hypnotherapy, a process where patients move their focus to memories of an earlier stage of life in order to explore these memories or to get in touch with some difficult-to-access aspects of their personality.
What is ddlg?
Daddy Dom / Little Girl. DDLG, or dd/lg, is a relationship in which one person is the caregiver or "daddy" and the other is childlike. It is NOT a relationship between an actual father and daughter or any minor. This is a type of BDSM relationship that may or may not involve sex, but often involves play with child-like things, such as stuffed animals, bed-time stories, and spankings. The lg part of the relationship is often called the "little."
What’s the difference?
Age regression is simply meant to be a therapy technique. And majority of the the time NON-SEXUAL.
While DD/LG can be considered a kink and can actually be sexual. DD/LG isn't supposed to have anything to do with minors. If you see a ddlg situation with an adult and minor. Please report that to someone.
68 notes · View notes
4182015 · 6 years ago
Text
Tumblr media Tumblr media Tumblr media Tumblr media
Disclaimer: only report people who you may think are dangerous, like people who post child pornography. Help this world to be a better place.
I strongly suggest that you do not to report the individual if they are not doing anything illegal.
4 notes · View notes
4182015 · 6 years ago
Text
wheres all the support for the emotional abuse victims
190K notes · View notes