SlideShare a Scribd company logo
Empowering Society’s Youth
Abstract:
Empowering Society’s Youth aims to make the world a better place for our
children in New York. The increasing affordability and accessibility of the internet has
led to an unprecedented number of youth internet users. Therefore, our organization aims
to teach the importance of internet safety to at-risk youth and youth who have already
fallen victims to sex-trafficking and pornography. This will help them be effective
leaders in society. In addition, our staff will provide training to first responders to ensure
proper identification and response mechanisms.
Executive Summary:
The increasing affordability, accessibility, and anonymity of the internet have
made it a dangerous place for children. Youth tend to see the internet as a free space to
express their feelings and problems safe from judgment. This is especially true for
children who are not sociable and who have trouble making friends. As a result, there is a
risk that they will overshare personal information online which traffickers will use to
their advantage.
Traffickers prey on the vulnerabilities of youth to gain their trust and to exploit
them. Offenders chat with their victims on many trusted social media sites such as
Facebook, OoVoo, Twitter, and Skype. They then ask the youth to either pose in sexually
explicit positions or to engage in live web-cam sex also known as live-streaming child
abuse. Sometimes, the online relationship can move offline. It is important to know that
victims can be both boys and girls, domestic or foreign, and be as young as three.
Therefore, our staff strives to empower youth both at- risk and those who have fallen
victims to this crime. Furthermore, we offer training to first responders to ensure proper
identification and response to this crime.
Statement of Need:
In the U.S., 300,000 children are at-risk of becoming sexually exploited (Estes,
Richard J. and Neil Alan Weiner, “The Commercial Sexual Exploitation of Children in
the U.S., Canada and Mexico.” University of Pennsylvania, 2001). If we do not take
action now to prevent this crime from occurring, traffickers will continue to exploit
children for profit. They need to know that they will be held accountable and that society
is watching them.
Currently, there are two resolutions in Congress waiting to be passed. H.R. 2730
“Strengthening the Child Welfare Response to Human Trafficking” mandates
collaboration with state and local law enforcement and extending services for trafficking
victims to 21 years of age. In addition, it requires the Department of Health and Human
Services to provide recommendations to child welfare agencies and residential safe
havens on helping victims or at- risk youth. In turn, H.R. 2801 is the “E-SAFETI Task
Force Act” which seeks to establish a task force to study and make recommendations on
cyber traffickers. If passed, it will have twenty members from different departments
including DOS, Federal Communications Commission, FBI, ICE, Administration for
Children and Families, DOJ, DOL, and thirteen appointed by Secretary of State: internet
website company, non-profits, academic institutions, State AG, a victim of severe form
of sex trafficking, and representatives from public or private sectors. Until these laws are
passed, victims and at-risk youth will not be effectively protected. The only two
technologies in effect are the Cyber Tipline from the National Center for Missing and
Exploited Children and the smartphone applications created by Homeland Security
Initiatives Operation Predator to report suspicions either online or by phone 24/7.
Although there are a number of organizations focusing on child trafficking there
is not one that specifically focuses on cyber trafficking or internet facilitated trafficking.
THORN is an organization that uses technology innovation to fight the sexual
exploitation of children but not on empowering youth. It partners with government,
technology companies, and NGO’s to deter child predators. In addition, it conducts a
national survey of victims to determine the role technology played in their recruitment,
exploitation, and escape. Statistics of this survey indicate that 70% of domestic minor sex
trafficking victims were sold online, 75% of victims had access to a cell phone when
trafficked, and 71% had access to internet when trafficked. This data demonstrates an
urgent need to teach youth to adopt safe internet practices and become active members of
society. Another integral part of this project would be to train first service responders to
identify at-risk youth and victims; otherwise they will not be helped. THORN cites data
from NCMEC that it received 17 million images and videos in 2011. Moreover, in 2009,
police identified 22 million IP addresses used for pornography of which 10 million were
located in the U.S. Furthermore, 19% of identified offenders had images of victims
younger than three years old, 39% images younger than six years old, and 83% images
younger than twelve years old. The time to act is now; every child has the right to be free
from sexual exploitation.

More Related Content

PDF
County Lines Fact sheet - A quick guide to what you need to know
PPTX
Criminal justice against child pornography
PPTX
Cyberspace
PDF
Cyberbullying
PPTX
Cyberbullying and the law
DOCX
Youth Justice Reform
PDF
Delincuencia Cibernética- Inglés
DOCX
County Lines Fact sheet - A quick guide to what you need to know
Criminal justice against child pornography
Cyberspace
Cyberbullying
Cyberbullying and the law
Youth Justice Reform
Delincuencia Cibernética- Inglés

What's hot (20)

PDF
SENATOR Mike Crapo (Cyber Bullying Law)
POTX
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
DOCX
PPTX
Sara
PDF
A Criminological Exploration of Cyber Prostitution within the South African C...
DOCX
Desk of pres
PPT
Police Corruption In Mexico2
PPT
Police Corruption In Mexico
PDF
Systems of Justice over the Internet.
PPTX
Organised crime
PDF
Violence Against Women Act (VAWA)
PDF
Organized Crime: an Introduction and Nepalese Experience
PDF
A critical assessment of public administration and civil disobedience in deve...
PDF
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
PPTX
Cyber bullying presentation
PPTX
Situation of children in Madhya Pradesh on Key Indicators
PPT
Blogging & Law
PPTX
Organize Crime Groups
DOCX
Criminal Justice 132 Term Paper
PPT
SENATOR Mike Crapo (Cyber Bullying Law)
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
Sara
A Criminological Exploration of Cyber Prostitution within the South African C...
Desk of pres
Police Corruption In Mexico2
Police Corruption In Mexico
Systems of Justice over the Internet.
Organised crime
Violence Against Women Act (VAWA)
Organized Crime: an Introduction and Nepalese Experience
A critical assessment of public administration and civil disobedience in deve...
The Perpetual Line-Up - Center on Privacy and Technology at Georgetown Law
Cyber bullying presentation
Situation of children in Madhya Pradesh on Key Indicators
Blogging & Law
Organize Crime Groups
Criminal Justice 132 Term Paper
Ad

Viewers also liked (13)

PDF
Monitoring and Evaluation Proposal for the Jordanian Ministry of Social Devel...
PDF
SOUTH SUDAN WOMEN EMPOWERMENT REPORT
PPSX
NGO Proposal: Fighting NCDs in Africa Through Fitness
PPT
Preparing a project proposal
PDF
Practical Guide to Programme/Project Proposal Writing
PPT
Sample of a Community Development project proposal writing
PPTX
Project proposal intro
DOCX
Slideshare Project Proposal
DOCX
Project proposal format
PDF
Sample Project Proposal Design Document
DOC
Proposal format
PPT
Writing Successful Project Proposal
PPTX
10 Project Proposal Writing
Monitoring and Evaluation Proposal for the Jordanian Ministry of Social Devel...
SOUTH SUDAN WOMEN EMPOWERMENT REPORT
NGO Proposal: Fighting NCDs in Africa Through Fitness
Preparing a project proposal
Practical Guide to Programme/Project Proposal Writing
Sample of a Community Development project proposal writing
Project proposal intro
Slideshare Project Proposal
Project proposal format
Sample Project Proposal Design Document
Proposal format
Writing Successful Project Proposal
10 Project Proposal Writing
Ad

Similar to Grant Proposal Excerpt Build Your Own NGO (20)

DOCX
INTS2310_PUNZO_EC
PPTX
Keeping Children Safe Online
PDF
Introduction to Online Sexual Exploitation Curriculum
PDF
Teen Internet Safety
PDF
C20 - CHILD PROTECTION ONLINE
PPTX
ahmadsofiang20stcfinal-220308055846 (1).pptx
DOCX
Punzo_3300_L8-RP
PPT
Justine- pedophile laws
PDF
Combating Child Trafficking A User’s Handbook
PDF
Analyzing the influence of Information and communication Technology on the sc...
PDF
Analyzing the influence of information and communication technology on the sc...
PDF
IACP COPS Combating Child Sex Trafficking A Guide for LE Leaders- FINAL
PDF
Children Online Protection
PDF
Protecting and Empowering our Next Generation... Globally
PDF
Enhancing Parental Roles in Protecting Children from Online Sexual Exploitati...
PPT
Internet Safety
PDF
Disrupting harm — Project brief
PDF
Human Trafficking and Social Networking
PPTX
Ecpat: Ict and human trafficking-trace
PPTX
Social Work Conference Lecture presentation 0417
INTS2310_PUNZO_EC
Keeping Children Safe Online
Introduction to Online Sexual Exploitation Curriculum
Teen Internet Safety
C20 - CHILD PROTECTION ONLINE
ahmadsofiang20stcfinal-220308055846 (1).pptx
Punzo_3300_L8-RP
Justine- pedophile laws
Combating Child Trafficking A User’s Handbook
Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of information and communication technology on the sc...
IACP COPS Combating Child Sex Trafficking A Guide for LE Leaders- FINAL
Children Online Protection
Protecting and Empowering our Next Generation... Globally
Enhancing Parental Roles in Protecting Children from Online Sexual Exploitati...
Internet Safety
Disrupting harm — Project brief
Human Trafficking and Social Networking
Ecpat: Ict and human trafficking-trace
Social Work Conference Lecture presentation 0417

Grant Proposal Excerpt Build Your Own NGO

  • 1. Empowering Society’s Youth Abstract: Empowering Society’s Youth aims to make the world a better place for our children in New York. The increasing affordability and accessibility of the internet has led to an unprecedented number of youth internet users. Therefore, our organization aims to teach the importance of internet safety to at-risk youth and youth who have already fallen victims to sex-trafficking and pornography. This will help them be effective leaders in society. In addition, our staff will provide training to first responders to ensure proper identification and response mechanisms. Executive Summary: The increasing affordability, accessibility, and anonymity of the internet have made it a dangerous place for children. Youth tend to see the internet as a free space to express their feelings and problems safe from judgment. This is especially true for children who are not sociable and who have trouble making friends. As a result, there is a risk that they will overshare personal information online which traffickers will use to their advantage. Traffickers prey on the vulnerabilities of youth to gain their trust and to exploit them. Offenders chat with their victims on many trusted social media sites such as Facebook, OoVoo, Twitter, and Skype. They then ask the youth to either pose in sexually explicit positions or to engage in live web-cam sex also known as live-streaming child
  • 2. abuse. Sometimes, the online relationship can move offline. It is important to know that victims can be both boys and girls, domestic or foreign, and be as young as three. Therefore, our staff strives to empower youth both at- risk and those who have fallen victims to this crime. Furthermore, we offer training to first responders to ensure proper identification and response to this crime. Statement of Need: In the U.S., 300,000 children are at-risk of becoming sexually exploited (Estes, Richard J. and Neil Alan Weiner, “The Commercial Sexual Exploitation of Children in the U.S., Canada and Mexico.” University of Pennsylvania, 2001). If we do not take action now to prevent this crime from occurring, traffickers will continue to exploit children for profit. They need to know that they will be held accountable and that society is watching them. Currently, there are two resolutions in Congress waiting to be passed. H.R. 2730 “Strengthening the Child Welfare Response to Human Trafficking” mandates collaboration with state and local law enforcement and extending services for trafficking victims to 21 years of age. In addition, it requires the Department of Health and Human Services to provide recommendations to child welfare agencies and residential safe havens on helping victims or at- risk youth. In turn, H.R. 2801 is the “E-SAFETI Task Force Act” which seeks to establish a task force to study and make recommendations on cyber traffickers. If passed, it will have twenty members from different departments including DOS, Federal Communications Commission, FBI, ICE, Administration for Children and Families, DOJ, DOL, and thirteen appointed by Secretary of State: internet
  • 3. website company, non-profits, academic institutions, State AG, a victim of severe form of sex trafficking, and representatives from public or private sectors. Until these laws are passed, victims and at-risk youth will not be effectively protected. The only two technologies in effect are the Cyber Tipline from the National Center for Missing and Exploited Children and the smartphone applications created by Homeland Security Initiatives Operation Predator to report suspicions either online or by phone 24/7. Although there are a number of organizations focusing on child trafficking there is not one that specifically focuses on cyber trafficking or internet facilitated trafficking. THORN is an organization that uses technology innovation to fight the sexual exploitation of children but not on empowering youth. It partners with government, technology companies, and NGO’s to deter child predators. In addition, it conducts a national survey of victims to determine the role technology played in their recruitment, exploitation, and escape. Statistics of this survey indicate that 70% of domestic minor sex trafficking victims were sold online, 75% of victims had access to a cell phone when trafficked, and 71% had access to internet when trafficked. This data demonstrates an urgent need to teach youth to adopt safe internet practices and become active members of society. Another integral part of this project would be to train first service responders to identify at-risk youth and victims; otherwise they will not be helped. THORN cites data from NCMEC that it received 17 million images and videos in 2011. Moreover, in 2009, police identified 22 million IP addresses used for pornography of which 10 million were located in the U.S. Furthermore, 19% of identified offenders had images of victims younger than three years old, 39% images younger than six years old, and 83% images
  • 4. younger than twelve years old. The time to act is now; every child has the right to be free from sexual exploitation.