42
Keeping your Children Keeping your Children Safe Online Safe Online A Presentation by Matt Smith. President of Litchfield County Computer, L.L.C.

Keeping your Children Safe Online

Embed Size (px)

Citation preview

Page 1: Keeping your Children Safe Online

Keeping your Children Keeping your Children Safe OnlineSafe Online

A Presentation by Matt Smith. President of Litchfield County

Computer, L.L.C.

Page 2: Keeping your Children Safe Online

Presentation AgendaPresentation Agenda

• What are the risks faced by our kids online?What are the risks faced by our kids online?

Is the Internet “Real?”Is the Internet “Real?”

Sexual PredatorsSexual Predators

Social Networking SitesSocial Networking Sites

Online CrimeOnline Crime

Some Warning SignsSome Warning Signs

If You See Warning Signs If You See Warning Signs

Page 3: Keeping your Children Safe Online

Presentation AgendaPresentation Agenda

• How can you protect your kidsHow can you protect your kids

Some Simple StepsSome Simple Steps

Content Filtering SoftwareContent Filtering Software

Computer Monitoring SoftwareComputer Monitoring Software

Limit The Technology They Have Access To Limit The Technology They Have Access To

Page 4: Keeping your Children Safe Online

Is the Internet “Real?”Is the Internet “Real?”

• I feel that there is a misconception among some I feel that there is a misconception among some people that the Internet is not considered part of people that the Internet is not considered part of the real world.the real world.

• The Internet is as real as the world that we live The Internet is as real as the world that we live in today. It’s a community of billions of people. in today. It’s a community of billions of people. Like any community it has good neighborhoods Like any community it has good neighborhoods and bad neighborhoods. These bad and bad neighborhoods. These bad neighborhoods can contain many dangers. neighborhoods can contain many dangers.

Page 5: Keeping your Children Safe Online

Sexual PredatorsSexual Predators

• Sexual predators or pedophiles are one of the Sexual predators or pedophiles are one of the biggest dangers to young people on the Internet biggest dangers to young people on the Internet today.today.

• Some Statistics from the FBI:Some Statistics from the FBI: One in four has encountered unwanted pornography.One in four has encountered unwanted pornography.

One in five has been sexually solicited.One in five has been sexually solicited. One in 17 was threatened or harassed in the past year.One in 17 was threatened or harassed in the past year. One in 33 received an aggressive sexual solicitation.One in 33 received an aggressive sexual solicitation. Nearly 60 percent have received an e-mail or instantNearly 60 percent have received an e-mail or instant message from a stranger, and half responded to themessage from a stranger, and half responded to the stranger’s message.stranger’s message.

Page 6: Keeping your Children Safe Online

Sexual PredatorsSexual Predators

• The predator will make first contact with your The predator will make first contact with your child though a chat room or social networking child though a chat room or social networking site (such as MySpace or Facebook)site (such as MySpace or Facebook)

• Once contact is established the predator will Once contact is established the predator will attempt to “groom” your child, luring them (and attempt to “groom” your child, luring them (and sometimes you) into a trusting relationship in sometimes you) into a trusting relationship in preparation for sexual activities to take place. preparation for sexual activities to take place. This begins in a harmless fashion and progresses This begins in a harmless fashion and progresses into discussions of a sexual nature. The into discussions of a sexual nature. The grooming process is deliberate and slow, grooming process is deliberate and slow, sometimes taking months.sometimes taking months.

Page 7: Keeping your Children Safe Online

Sexual PredatorsSexual Predators

• Once the grooming process is complete the face Once the grooming process is complete the face to face meeting will take place, where the victim to face meeting will take place, where the victim will be sexually abused.will be sexually abused.

Page 8: Keeping your Children Safe Online

Social Networking SitesSocial Networking Sites

• These sites (such as MySpace or Facebook) are These sites (such as MySpace or Facebook) are quickly becoming the popular method for quickly becoming the popular method for children to communicate with their friends children to communicate with their friends online.online.

• You can have a personal page (called a profile) You can have a personal page (called a profile) where you can talk about yourself, post pictures where you can talk about yourself, post pictures and video etc.and video etc.

• You can find the profiles of your friends on You can find the profiles of your friends on these sites and have your profile link to theirs. these sites and have your profile link to theirs. This allows your “friends” to see the This allows your “friends” to see the information on your profile. information on your profile.

Page 9: Keeping your Children Safe Online

Social Networking SitesSocial Networking Sites

• Social Networking Sites are a huge breeding Social Networking Sites are a huge breeding ground for sexual predators as the powerful ground for sexual predators as the powerful search features of such sites make it easy for search features of such sites make it easy for them to find and contact potential victims.them to find and contact potential victims.

• Although these sites have age limits for setting Although these sites have age limits for setting up a profile there are no means of actually up a profile there are no means of actually verifying the age of a specific user when they verifying the age of a specific user when they sign up.sign up.

• Many teenagers put far too much personal Many teenagers put far too much personal information into their profiles.information into their profiles.

Page 10: Keeping your Children Safe Online

Social Networking SitesSocial Networking Sites

Page 11: Keeping your Children Safe Online

Social Networking SitesSocial Networking Sites

Page 12: Keeping your Children Safe Online

Social Networking SitesSocial Networking Sites

Page 13: Keeping your Children Safe Online

Social Networking SitesSocial Networking Sites

• After a string of criminal investigations in After a string of criminal investigations in Connecticut involving social networking sites Connecticut involving social networking sites and sexual predators Attorney General and sexual predators Attorney General Blumenthal asked in March of 2007 that a bill be Blumenthal asked in March of 2007 that a bill be considered to require social networking sites to considered to require social networking sites to get parental permission before posting the get parental permission before posting the profile of a minor and requiring social profile of a minor and requiring social networking sites to verify a person’s age using networking sites to verify a person’s age using independent information. Other states have independent information. Other states have asked for similar measures. The bill did not pass asked for similar measures. The bill did not pass the State Legislature.the State Legislature.

Page 14: Keeping your Children Safe Online

Social Networking SitesSocial Networking Sites

• Facebook and MySpace are also a potential Facebook and MySpace are also a potential source of malware. Both sites allow you to source of malware. Both sites allow you to install programs, called applications, that are install programs, called applications, that are made by other people to your profile. In most made by other people to your profile. In most cases this third party software is not properly cases this third party software is not properly tested and may contain malware. There have tested and may contain malware. There have been cases where this malware has compromised been cases where this malware has compromised peoples privacy or required extensive cleanup to peoples privacy or required extensive cleanup to correct.correct.

Page 15: Keeping your Children Safe Online

Social Networking SitesSocial Networking Sites

• To make matters even worse a new security To make matters even worse a new security issue began to be reported last November, that issue began to be reported last November, that of “profile identity theft.” A Facebook or of “profile identity theft.” A Facebook or MySpace profile is broken into and information MySpace profile is broken into and information is changed to indicate that the person needs is changed to indicate that the person needs money. This will often cause the thief to receive money. This will often cause the thief to receive money in a fraudulent manner. This type of money in a fraudulent manner. This type of theft is extremely difficult (if not impossible) to theft is extremely difficult (if not impossible) to undo once it is done.undo once it is done.

Page 16: Keeping your Children Safe Online

Social Networking SitesSocial Networking Sites

• The information that you post in your profile The information that you post in your profile can come back to haunt you years later. Social can come back to haunt you years later. Social networking sites are indexed by search engines networking sites are indexed by search engines and your profile can get on a search engine. and your profile can get on a search engine. Employers often check search engines and social Employers often check search engines and social networking sites as part of post 9/11 networking sites as part of post 9/11 background checking procedures. If they don’t background checking procedures. If they don’t like what they see you may just find that job like what they see you may just find that job offer you were hoping for declined. Once you offer you were hoping for declined. Once you put information on the Internet it’s there put information on the Internet it’s there FOREVER!FOREVER!

Page 17: Keeping your Children Safe Online

Social Networking SitesSocial Networking Sites

• MySpace recently reported that it had found and MySpace recently reported that it had found and removed from their site 90,000 profiles that removed from their site 90,000 profiles that belonged to registered sex offenders. This belonged to registered sex offenders. This number is double MySpace’s previous estimate.number is double MySpace’s previous estimate.

• Some of these profiles were from offenders that Some of these profiles were from offenders that were barred from using the Internet.were barred from using the Internet.

• These profiles were discovered through a new These profiles were discovered through a new technology known as Sentinel SAFE, a database technology known as Sentinel SAFE, a database that allows MySpace to tie their profile data with that allows MySpace to tie their profile data with the sex offender registries.the sex offender registries.

Page 18: Keeping your Children Safe Online

Social Networking SitesSocial Networking Sites

• Facebook is currently not using Sentinel SAFE, Facebook is currently not using Sentinel SAFE, and it’s believed that at least some of the sex and it’s believed that at least some of the sex offenders that were removed from MySpace are offenders that were removed from MySpace are now on Facebook.now on Facebook.

• Sentinel SAFE is also not a foolproof Sentinel SAFE is also not a foolproof technology. It’s possible to create a profile technology. It’s possible to create a profile using false information to fool the Sentinel using false information to fool the Sentinel SAFE scanner.SAFE scanner.

Page 19: Keeping your Children Safe Online

Social Networking SitesSocial Networking Sites

• Facebook has recently changed their Terms of Facebook has recently changed their Terms of Service. They now state that they can do Service. They now state that they can do whatever they want with any information on whatever they want with any information on your profile, forever. This includes selling it to your profile, forever. This includes selling it to commercial third parties and it still in effect even commercial third parties and it still in effect even if you delete your Facebook profile.if you delete your Facebook profile.

Page 20: Keeping your Children Safe Online

Online CrimeOnline Crime

• Increasingly, teenagers are actually getting Increasingly, teenagers are actually getting involved in online crime themselves.involved in online crime themselves.

• People commit online crimes for three general People commit online crimes for three general reasons: for the money involved, out of anger, reasons: for the money involved, out of anger, or for fun.or for fun.

• These crimes are very serious, especially in a These crimes are very serious, especially in a post 9/11 world. Depending on the exact post 9/11 world. Depending on the exact nature of the crime you can either be sent to nature of the crime you can either be sent to juvenile detention or tried as an adult and be juvenile detention or tried as an adult and be sentenced to prison.sentenced to prison.

Page 21: Keeping your Children Safe Online

Online CrimeOnline Crime

• Many of these crimes are Federal offencesMany of these crimes are Federal offences• Parents of minors convicted of a crime can be Parents of minors convicted of a crime can be

(and often are) held liable for the actions of their (and often are) held liable for the actions of their minor children.minor children.

• It should be noted that most of the kids that It should be noted that most of the kids that become involved in online crime are not kids become involved in online crime are not kids that are troublemakers, but very smart students. that are troublemakers, but very smart students.

Page 22: Keeping your Children Safe Online

Online CrimeOnline Crime

• Types of online crime:Types of online crime:

Identity TheftIdentity Theft

Malicious computer hackingMalicious computer hacking

FraudFraud

CyberbullyingCyberbullying

Page 23: Keeping your Children Safe Online

Online CrimeOnline Crime

• Identity Theft is one of the newest crime waves Identity Theft is one of the newest crime waves sweeping the country right now.sweeping the country right now.

• Teenagers often become involved in identity Teenagers often become involved in identity theft rings because of the money involved.theft rings because of the money involved.

• The money involved in identity theft (and other The money involved in identity theft (and other online crime) can be staggering. Credit card online crime) can be staggering. Credit card numbers and other personal information get numbers and other personal information get sold online for $5 each. If you have 10,000 sold online for $5 each. If you have 10,000 credit card numbers that’s $50,000. Some of the credit card numbers that’s $50,000. Some of the people involved in the TJX case were 17-19.people involved in the TJX case were 17-19.

Page 24: Keeping your Children Safe Online

Online CrimeOnline Crime

• There's an ongoing case in Wisconsin of an 18 There's an ongoing case in Wisconsin of an 18 year old that assumed the identity of a girl on year old that assumed the identity of a girl on Facebook for purposes of blackmailing fellow Facebook for purposes of blackmailing fellow students into performing sex acts on him. He students into performing sex acts on him. He has numerous charges against him. If he’s has numerous charges against him. If he’s convicted on all counts he could get as much as convicted on all counts he could get as much as 300 years in prison. He recently plea bargained 300 years in prison. He recently plea bargained and could be subject to a 50 year prison and could be subject to a 50 year prison sentence. sentence.

Page 25: Keeping your Children Safe Online

Online CrimeOnline Crime

• Malicious computer hacking is another common Malicious computer hacking is another common crime.crime.

• A case just closed in Massachusetts where a 17 A case just closed in Massachusetts where a 17 year old known online as Dshocker was charged year old known online as Dshocker was charged and pleaded guilty to several counts of computer and pleaded guilty to several counts of computer attacks, including credit card fraud. The most attacks, including credit card fraud. The most serious of these involved what is known as serious of these involved what is known as “swatting.” If he had been tried as an adult, he “swatting.” If he had been tried as an adult, he could have faced 10 years in prison.could have faced 10 years in prison.

Page 26: Keeping your Children Safe Online

Online CrimeOnline Crime

• There have been several cases of teenagers There have been several cases of teenagers committing fraud by setting up EBay accounts committing fraud by setting up EBay accounts and auctioning fake items online.and auctioning fake items online.

• Cyberbulling is bullying people online. The Cyberbulling is bullying people online. The consequences of cyberbullying can be very consequences of cyberbullying can be very serious.serious.

• The Megan Meier Cyberbulling case has closed The Megan Meier Cyberbulling case has closed with 2 people being convicted of 3 misdemeanor with 2 people being convicted of 3 misdemeanor charges. However, the verdict is being appealed.charges. However, the verdict is being appealed.

Page 27: Keeping your Children Safe Online

Some Warning SignsSome Warning Signs

• Your child may be in contact with a sexual predator or Your child may be in contact with a sexual predator or engaging in online crime if you see any of the following engaging in online crime if you see any of the following warning signs:warning signs:

Downloads photos of strangers Downloads photos of strangers Downloads pornographic images Downloads pornographic images Quickly turns off the computer or changes software Quickly turns off the computer or changes software

applications when someone enters the room applications when someone enters the room Spends unsupervised time in chat rooms Spends unsupervised time in chat rooms Waits until other family members are asleep or out of Waits until other family members are asleep or out of

the home before going online the home before going online Receives unusual phone calls or gifts or letters in the Receives unusual phone calls or gifts or letters in the

mail mail

Page 28: Keeping your Children Safe Online

Some Warning SignsSome Warning Signs

• Your child may be in contact with a sexual predator or Your child may be in contact with a sexual predator or engaging in online crime if you see any of the following engaging in online crime if you see any of the following warning signs:warning signs:

Is very secretive about online activities and the people Is very secretive about online activities and the people he or she talks to he or she talks to

Visits Web sites dealing with death, destruction, or Visits Web sites dealing with death, destruction, or other morbid topics other morbid topics

Uses online accounts that you do not recognize or uses Uses online accounts that you do not recognize or uses multiple e-mail addresses multiple e-mail addresses

Spends countless hours on the computer and his or Spends countless hours on the computer and his or her school grades have dropped her school grades have dropped

You find illegally obtained software on your computerYou find illegally obtained software on your computer

Page 29: Keeping your Children Safe Online

If You See Warning SignsIf You See Warning Signs

• Talk with your child and try to find out what is Talk with your child and try to find out what is going on.going on.

• Contact your local police for assistance.Contact your local police for assistance.• Above all, DON’T touch the computer. In Above all, DON’T touch the computer. In

doing so you may inadvertently destroy evidence doing so you may inadvertently destroy evidence needed to prosecute an offender.needed to prosecute an offender.

Page 30: Keeping your Children Safe Online

Some Simple StepsSome Simple Steps

• Keep the computer in a public place in your Keep the computer in a public place in your home.home.

• Talk about the dangers of the Internet, and set Talk about the dangers of the Internet, and set some rules that your child needs to follow.some rules that your child needs to follow.

• Examine your Internet browser history.Examine your Internet browser history.• Consider using Content filtering and Computer Consider using Content filtering and Computer

monitoring software.monitoring software.• Limit the amount of time spent on the Limit the amount of time spent on the

computer.computer.

Page 31: Keeping your Children Safe Online

Some Simple StepsSome Simple Steps

• Make sure your kids know to never divulge Make sure your kids know to never divulge personal information over the Internetpersonal information over the Internet

• You should have your kids e-mail username and You should have your kids e-mail username and password. Don’t let them have more than one password. Don’t let them have more than one email account.email account.

• Make sure that your kinds know to let you know Make sure that your kinds know to let you know right away if they run into a problem online.right away if they run into a problem online.

• Spend time online with your kids.Spend time online with your kids.

Page 32: Keeping your Children Safe Online

Internet Browser HistoryInternet Browser History

Page 33: Keeping your Children Safe Online

Internet Browser History – The Internet Browser History – The INDEX.DAT FilesINDEX.DAT Files

• Windows also keeps hidden history files called Windows also keeps hidden history files called index.dat.index.dat.

• Most computers have several index.dat filesMost computers have several index.dat files• These files are not human readable and require a These files are not human readable and require a

special viewer.special viewer.

Page 34: Keeping your Children Safe Online

Content Filtering SoftwareContent Filtering Software

• Content filtering software allows you to filter Content filtering software allows you to filter that content that your child can access on the that content that your child can access on the Internet.Internet.

• Some examples of this software are Netnanny Some examples of this software are Netnanny and CYBERPatrol.and CYBERPatrol.

• Websites, Emails and Instant messages can be Websites, Emails and Instant messages can be filtered with this type of software.filtered with this type of software.

Page 35: Keeping your Children Safe Online

Computer Monitoring SoftwareComputer Monitoring Software

• Another option that is available to parents is Another option that is available to parents is computer monitoring software, such as Spector computer monitoring software, such as Spector Pro (Pro (http://www.spector.comhttp://www.spector.com))

• Monitoring software records everything that is Monitoring software records everything that is done on the computer and presents it to you.done on the computer and presents it to you.

• Although some parents may have ethical Although some parents may have ethical concerns with using this type of software. I feel concerns with using this type of software. I feel that it is a necessary step in today’s world.that it is a necessary step in today’s world.

Page 36: Keeping your Children Safe Online

Limit The Technology They Have Limit The Technology They Have Access ToAccess To

• What this means is if your child does not What this means is if your child does not actually have a need to use something (such as a actually have a need to use something (such as a cell phone with a camera in it) don’t let them cell phone with a camera in it) don’t let them have one.have one.

• There’s an ongoing case of a 15 year old girl out There’s an ongoing case of a 15 year old girl out in Ohio that has been arrested for sending nude in Ohio that has been arrested for sending nude pictures of herself that she took with the camera pictures of herself that she took with the camera in her cell phone to other students.in her cell phone to other students.

Page 37: Keeping your Children Safe Online

Limit The Technology They Have Limit The Technology They Have Access ToAccess To

• ““Sexting” is the act of using a cell phone camera Sexting” is the act of using a cell phone camera to take pornographic pictures of yourself and to take pornographic pictures of yourself and spread them around to your friends.spread them around to your friends.

• This is a very dangerous practice and is This is a very dangerous practice and is considered manufacturing and distribution of considered manufacturing and distribution of child pornography.child pornography.

• Penalties for this offence are extreme.Penalties for this offence are extreme.

Page 38: Keeping your Children Safe Online

Limit The Technology They Have Limit The Technology They Have Access ToAccess To

• Charges are also being considered against some Charges are also being considered against some of the students that received the photos.of the students that received the photos.

• If the girl is convicted, she faces the possibility If the girl is convicted, she faces the possibility of having to register as a sex offender for 20 of having to register as a sex offender for 20 years.years.

• The Ohio case is the result of “sexting”The Ohio case is the result of “sexting”• Webcams can also be a very dangerous piece of Webcams can also be a very dangerous piece of

technology.technology.

Page 39: Keeping your Children Safe Online

Limit The Technology They Have Limit The Technology They Have Access ToAccess To

• A then 13 year old California boy named Justin A then 13 year old California boy named Justin Barry began posing on his webcam for people Barry began posing on his webcam for people that turned out to be sexual predators.that turned out to be sexual predators.

• He progressed into operating a porn site with his He progressed into operating a porn site with his own photos that made him several hundred own photos that made him several hundred thousand dollars.thousand dollars.

• He was sexually abused several times.He was sexually abused several times.• Later he became a witness for the FBI and was Later he became a witness for the FBI and was

given immunity.given immunity.

Page 40: Keeping your Children Safe Online

Limit The Technology They Have Limit The Technology They Have Access ToAccess To

• With the information that he turned over to the With the information that he turned over to the FBI he was not only able to bring down many FBI he was not only able to bring down many sexual predators but also web hosting companies sexual predators but also web hosting companies and credit card processors. He saved the lives of and credit card processors. He saved the lives of hundreds, perhaps thousands of children though hundreds, perhaps thousands of children though his actions. his actions.

Page 41: Keeping your Children Safe Online

Limit The Technology They Have Limit The Technology They Have Access ToAccess To

• If you get certain types of malware on your If you get certain types of malware on your computer your webcam can be used to spy on computer your webcam can be used to spy on you without your knowledge. you without your knowledge.

Page 42: Keeping your Children Safe Online

Any Questions