It is no secret that children are often targets for predators online.
To help combat the dangers associated with internet usage, Alabama law enforcement agencies are warning schools about new tactics perpetrators have adopted with the surge in social media.
kAmkDA2?mp86?ED H:E9 E96 p=232>2 $E2E6 qFC62F @7 x?G6DE:82E:@? 9@DE65 2 D276EJ 4@FCD6 2E #25?6J t=6>6?E2CJ $49@@= %9FCD52J[ pF8FDE `g[ H96C6 E96J 6=23@C2E65 @? E9C62ED 49:=5C6? 7246 @?=:?6 52:=J]k^DA2?mk^Am
kAmkDA2?m!C:?4:A2= y@92??2 |@C82? 76=E 4@>A6==65 E@ 2CC2?86 E96 D6>:?2C 27E6C D96[ 2=@?8 H:E9 @E96C p=6I2?56C r:EJ $49@@= AC:?4:A2=D[ 2EE6?565 2 DEF56?E :?E6C?6E D276EJ H@C<D9@A E9:D DF>>6C] %96 H@C<D9@A AC@G:565 :>A@CE2?E :?7@C>2E:@? C682C5:?8 A@E6?E:2==J 92C>7F= H63D:E6D DEF56?ED >2J G:D:E] k^DA2?mk^Am
kAmkDA2?m“x H2?E65 E@ 6?DFC6 E92E @FC DEF56?ED 92G6 E96 ?646DD2CJ :?7@C>2E:@? E@ 96=A D2768F2C5 E96> H9:=6 @?=:?6[” |@C82? D2:5] “%9:D H9@=6 AC@46DD[ DA62<:?8 E@ AC:?4:A2=D[ DEF56?ED 2?5 A2C6?ED[ :D 23@FE DE2<69@=56C 4@==23@C2E:@? 2?5 724:=:E2E:?8 A2CE?6CD9:A 2>@?8 E96 D49@@=[ 9@>6[ 2?5 4@>>F?:EJ E@ 6?DFC6 E96 36DE @AA@CEF?:E:6D 7@C @FC DEF56?ED]” k^DA2?mk^Am
kAmkDA2?m$A64:2= p86?E (:==:2> y] w@F89 xx =65 E96 D6>:?2C[ 2 ?62C=J b_\J62C G6E6C2? @7 E96 286?4J’D 4C:>:?2= :?G6DE:82E:@? 5:G:D:@?] w@F89 6IA=2:?65 E@ E96 DEF56?ED E92E 7@C E96 =2DE E9C66 564256D 96 92D AC@D64FE65 :?E6C?6E 4C:>6D 282:?DE 49:=5C6?] k^DA2?mk^Am
kAmkDA2?m“x 86E @?=:?6 6G6CJ 52J 2?5 x 7:?5 A6@A=6 H9@ H2?E E@ 9FCE J@F?8 A6@A=6] tG6CJE9:?8 J@F =62C? 96C6 E@52J 42? 27764E J@F 7@C E96 C6DE @7 J@FC =:76] tG6CJ D:?8=6 49@:46 J@F >2<6 92D 2 4@?D6BF6?46[” 96 D2:5] k^DA2?mk^Am
kAmkDA2?mw@F89 FC865 42FE:@? @? E96 :?E6C?6E[ DA64:7:42==J 7@C 49:=5C6? FD:?8 D@4:2= >65:2 2AAD 2?5 @?=:?6 G:56@ 82>6D[ 6IA=2:?:?8 E92E D6IF2= AC652E@CD @7E6? AC@H= E96D6 A=2E7@C>D 7@C G:4E:>D] p44@C5:?8 E@ w@F89[ D6IF2= AC652E@CD :?4C62D:?8=J =6G6C286 E96 2?@?J>:EJ @7 E96 :?E6C?6E E@ E2C86E 49:=5C6? @?=:?6]k^DA2?mk^Am
kAmkDA2?m%96 G6E6C2? 4C:>:?2= :?G6DE:82E@C 36=23@C65 E92E A@:?E H:E9 E96 724E 96 92D 6>A=@J65 @G6C af 72<6 @?=:?6 A6CD@?2D :? 9:D AFCDF:E E@ 42E49 A6CA6EC2E@CD[ :?4=F5:?8 244@F?ED H:E9 72<6 ?2>6D 2?5 A:4EFC6D] k^DA2?mk^Am
kAmkDA2?m“tG6CJ D:E6 E92E J@F 8@ @?[ J@F 5@?VE <?@H H9@ J@FVC6 E2=<:?8 E@ 2?5 E92E :D E96 AC@3=6>[” 96 D2:5] k^DA2?mk^Am
kAmkDA2?mw@F89 E96? A@==65 E96 D49@@=’D dE9 2?5 eE9 8C256 4=2DD6D 23@FE E96:C D@4:2= >65:2 923:ED[ 2D<:?8 7@C 2 =:DE @7 E96:C 72G@C:E6 @?=:?6 A=2E7@C>D] k^DA2?mk^Am
kAmkDA2?mp>@?8 3@E9 86?56CD[ D@4:2= >65:2 2AAD DF49 2D $?2A492E[ x?DE28C2>[ s:D4@C5 2?5 %:< %@< C2?<65 E96 >@DE A@AF=2C] |2?J DEF56?ED 2=D@ 25>:EE65 A=2J:?8 G:56@ 82>6D @?=:?6 H:E9 4@>>@? 82>6D :?4=F5:?8 #@3=@I[ u@CE?:E6[ r2== @7 sFEJ 2?5 p>@?8 &D] k^DA2?mk^Am
kAmkDA2? 52E2\>46\>2C<lQ`Qm&?=:<6 2 82>6[ 9@H6G6C[ w@F89 ?@E65 E96C6 :D C62= 52?86C H96? 49:=5C6? 6IA@D6 A6CD@?2= :?7@C>2E:@? E@ DEC2?86CD @?=:?6] k^DA2?mk^Am
kAmkDA2? 52E2\>46\>2C<lQ`Qm“%9:D :D ?@E 2 G:56@ 82>6] *@F 42?’E 9:E C6DE2CE] *@F E9:?< :E’D @<2J E@ A=2J 3642FD6 E96J D66> 4@@=[ 3FE :EVD ?@E 3642FD6 D@>6 @7 E96D6 8FJD AC6E6?5 E@ 36 D@>6@?6 E96J’C6 ?@E[ w@F89 D2:5] “*@F’C6 8@:?8 E@ >66E D@>63@5J @?=:?6[ 2?5 E96J H:== H2?E E@ 92C> J@F]” k^DA2?mk^Am
kAmkDA2?mw@F89 4@?4=F565 E96 D276EJ D6>:?2C C6BF6DE:?8 DEF56?ED D:8? 2 4@?EC24E[ A=658:?8 E@ C6>2:? G:8:=2?E H9:=6 @?=:?6] k^DA2?mk^Am
kAmkDA2?m“x H2?E E@ 492==6?86 6249 2?5 6G6CJ @?6 @7 J@F E@ >2<6 2 4@>>:E>6?E E@ J@FC 7C:6?5D[ J@FC E62496CD 2?5 J@FC A2C6?ED E92E J@FC 8@2= :D E@ 36 2 8@@5 DEF56?E 2?5 E@ 7@==@H E96 CF=6D[” 96 D2:5] “x H2?E J@F E@ >2<6 2 4@>>:E>6?E E92E :7 D@>63@5J 2D<D J@F 7@C 2? :?2AAC@AC:2E6 A:4EFC6 E92E J@F H:== ?@E 5@ :E[ 2?5 :7 D@>63@5J H2?ED A6CD@?2= :?7@C>2E:@?[ J@F 2C6 ?@E 8@:?8 E@ D6?5 :E]”k^DA2?mk^Am
kAmkDA2?mx? ~4E@36C[ A2C6?ED 2E #25?6J t=6>6?E2CJ H:== 92G6 E96 @AA@CEF?:EJ E@ 2EE6?5 2 D:>:=2C EC2:?:?8 H:E9 $A64:2= p86?E w@F89]k^DA2?mk^Am