Exploitation
Internet Basics
Sextortion
Internet Safety
Random Trivia
100

A crime for anyone in a position of trust or authority over a young person, or someone who has a dependent or exploitative relationship with them, to engage in sexual behavior

Sexual Exploitation

100


A way to access the internet and view websites that are on the internet

Web Browser

100

Threats to expose a sexual image in order to make a person do something – also known as blackmail.

Sextortion

100

These should be at the strictest setting for every social media site you use.

Privacy Settings

100

The three current members of the SEY team

Julia, Jewel, and Saje

200

The tactics used by an exploiter to gain trust and to prepare a youth for exploitation.

Grooming

200

Tiny files of data used to track your online activities and information when you’re browsing a website

Cookies

200

Social media platforms traditionally associated with sextortion

Snapchat and Instagram

200

You should be aware of this when you are posting or sharing any content online

Digital Footprint
200

The parent company for SEY

PCRS

300

a grooming tactic where an exploiter excessively compliments and shows affection to a youth to gain their love and trust

Love Bombing

300

The information on  the internet you mean to share – social media posts, online forms, videos

Active Digital Footprint

300

The two most demanded things when being sextorted

Money and more images/videos/media

300

It's a good idea to clear these small pieces of data regularly to avoid them being used in devious ways

Cookies
300

This person was the most recent former SEY team lead before moving to a different role

Nidha

400

A person who takes screenshots of a youths images, videos, or live streams without consent

Exploiter

400

A dictionary of every website that exists on the internet.

Search Engine

400

The website where you can report any online sextortion

400

Be on the lookout for obvious signs of this malicious software meant to steal your information

Malware

400

The names of the two youth hubs the SEY team works out of

City Centre and Newton Youth Hub

500

When an exploiter targets, communicates, and attempts to connect with a youth in person for the purpose of sexual exploitation.

Luring

500
"a unique string of characters that identifies each computer using the Internet Protocol to communicate over a network"


IP Address

500

This girl was a victim of internation sextortion from Port Coquitlam.

Amanda Todd

500

Falsifying profiles are easy on the internet. Remember to not _____ everything you see online

Believe or trust

500

SEY does _________ once a week in community

Outreach

M
e
n
u