Feeds

Miss America calls for mandatory internet safety classes

Tells Congress she looked at dirty photos

The Power of One Infographic

The current Miss America has asked Congress to take further steps in protecting children from internet predators.

Lauren Nelson, who received her country's highest honor for looking classy in a swimsuit, told the Senate Commerce Committee that internet safety classes should be mandatory for school children.

"We don't allow our children to ride their bikes without first teaching them about proper safety, and we shouldn't let them use the computer and access the internet without taking the same precautions," Nelson said.

Since winning the Miss America beauty pageant, Nelson, age 20, has used the platform to discourage those wishing to objectify youngsters in a sexual fashion. She told Congress the subject personally touched her life seven years ago when somebody sent her dirty pictures over the internet.

When she was 13 years old, she and a friend were approached by a stranger on an internet chat room. The mystery chatter somehow compelled Nelson — who would go on to get a master's degree in musical theater — to divulge her name, age, gender and home address, as well as that of her friend's.

A few days later, the stranger sent her dirty photos.

"We were shocked and disgusted. We then told our parents, who immediately addressed this incident and reported it to the proper authorities, and luckily we were able to avoid a potentially dangerous situation. Not all children are as lucky as my friends and I were."

After winning the prestigious pageant crown, Nelson joined a sting operation conducted by America's Most Wanted. She posed as a 14-year-old girl inside internet chat rooms and waited to be propositioned. Nelson managed to lure eleven alleged would-be pedophiles to show up in person. They were all arrested.

Nelson told congress that new classes need to be established to teach the dos and don'ts of social networking sites and chat rooms. She also said children need to take additional lessons on how to be "responsible cyber citizens" - and not cyber-bullies.

No word yet on whether parents can simply teach their kids some common safety sense without the United States Congress getting involved. More as this develops. ®

Maximizing your infrastructure through virtualization

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Sit back down, Julian Assange™, you're not going anywhere just yet
Swedish court refuses to withdraw arrest warrant
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
LightSquared backer sues FCC over spectrum shindy
Why, we might as well have been buying AIR
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.