43
1

Internet Safety

Embed Size (px)

DESCRIPTION

Videos on www.sharonnagyjohnson.com “Governors safety initiative” Internet safety “train-the-trainer” training to give effective internet safety presentations to students and parents, as well as community groups. The Keynote created was using material provided by the NJ State Police and Ad Council’s public service advertisements, all of which is free to use

Citation preview

Page 1: Internet Safety

1

Page 2: Internet Safety

2

Kids usually use their real name, school, etc.

Can establish a false identity/fake info

No credit cards

No age verification

2nd most hit site

Page 3: Internet Safety

3

PRIVATE

Page 4: Internet Safety

4

Private accounts can be broken into

Accounts linked/searches

Social engineering Pages aren’t censored

Adult subjects

Graphics

Anyone can search and find info

Page 5: Internet Safety

5

StrangersCelebritiesCyber BulliesGang activityMoviesRestaurantsBusinesses

Page 6: Internet Safety

6

Cooperative with law enforcement

Parents and teachers can contact myspace to take down pages

Search for kids info

Now requiring authentic email addresses

Page 7: Internet Safety

7

Background checks

Criminal activities

Employers use to weed out applicants

Embarrassed when page is shown even among peers

A LIFE RESUME

Page 8: Internet Safety

8

Page 9: Internet Safety

9

Page 10: Internet Safety

10

Meeting OnlineWith Goal to Meet In-Person

Page 11: Internet Safety

11

Human Element

Face-to-face

Words 7%

Body language 90+%

Tone/pitch 35+%

Pitch-Tone-Amplitude-Syllable Duration all greater during deceptive communication

Online

7% info available

Easier to conceal informative for intuition

Disconnect between virtual and physical

Page 12: Internet Safety

12

Human Element

No vision-no intuition

No “creep vibe”

Easier to be sexually explicit

Less shy online (would kids stand in the middle of the mall and say “Who wants to talk?”)

Page 13: Internet Safety

13

Predator ID

Generally more intelligent

Drs./Lawyers/College Professors/Engineers, etc.

High degree of unsuccessful knock & talks

Past victimization that perpetuates itself

Need driven behavior (esp. dangerous)

Passive/aggressive personality

Master manipulators (using 7%)

Page 14: Internet Safety

14

Predator ID

“Opportunist”

Likely to re-offend (1-10/will say 4-5)

Hanging around kids more than adults

Sex offender databases

Page 15: Internet Safety

15

Predator Targets

Latchkey

Lonely

Shy

Depressed

Youth groups

Page 16: Internet Safety

16

PredatorsIn Their Own Words

Page 17: Internet Safety

17

Higher Risks

Communicating with strangersTo meet friendsSexually explicitSexually curiousSend explicit photosWeb camSpecial needs kids especially vulnerableMost luring occurs between 3-6 pm

Page 18: Internet Safety

18

Grooming Process

Shared interests“Fit in” with youth’s lifeSlow methodical process to build trust

Will work to befriend even up to a yearConvince family to trustAlways interested in whatever is saidAlways claiming to understand and agreeBreaks down barriers-new relationship/new barrierExcess attentionGifts

Page 19: Internet Safety

19

Grooming Process

Accumulate useful infoSoft info (I like…my favorite…)Achilles heel of victims-emotional info

Desensitizes kids by sending porn cartoon to break down barriers or disgusting/violent images

Leaves weird psychological imprints (even detectives need “critical stress debriefings” w/o realizing it when certain images are stamped into the mind)

Goal is to meet in person

Page 20: Internet Safety

20

Other Dangers

What today’s kids are exposed to is vastly different than what we were at their age

P2P

Chat rooms

Thematic, regionalized, no age verification

IMing

Meebo (IM from anywhere across companies-no downloads)

Cell phones

Page 21: Internet Safety

21

P2PCan trade movies, pics, music, porn

Share files with everyone

Page 22: Internet Safety

22

P2P

No servers

Nodes connected to nodes

Bandwidth a must

No company mandates

Anonymity (Freenet)

Encryption (Impedes law enforcement efforts)

Bestiality

Child porn and other (“will make you cry”)

Defecation

Page 23: Internet Safety

23

Page 24: Internet Safety

24

Music Industry Wins Illegal Downloading CaseAssociated Press Friday, October 5, 2007; Page D02 DULUTH, Minn., Oct. 4 -- The recording industry won a key fight Thursday against illegal music downloading when a federal jury found that a Minnesota woman shared copyrighted music online and levied $222,000 in damages against her. The jury ordered Jammie Thomas, 30, to pay the six record companies that sued her $9,250 for each of 24 songs they focused on in the case. They had alleged she shared 1,702 songs. Thomas and her attorney, Brian Toder, declined to comment as they left the courthouse. In the first such lawsuit to go to trial, the record companies accused Thomas of downloading the songs without permission and offering them online through

Kazaa, a file-sharing program. Thomas denied wrongdoing and testified that she didn't have a Kazaa account.

Page 25: Internet Safety

25

Cell Phones

Leaves house everyday

Electronic leash/surveillance for kids

Cameras

Videos

Autotexting (sex jokes, dating services, romance tips, etc.)

RAPID and EASY transfers to MASS

Thumb drives

New tech in other countries

Page 26: Internet Safety

26

Social Networks

Behaviors are the danger

Anytime pics

Nothing private

Pics and postings = DRAMA between friends

Can’t say “don’t do it”

Focus on kids and reach out when young

Teach safety part of it

No shortage of threats, harassment, bullying-must still be dealt with

Page 27: Internet Safety

27

“Think Before You Post”

Page 28: Internet Safety

28

Think Before You Post

Always assume

Everyone can read post

All posts out there forever (diary/pics)

People reading posts can cause harm

Page 29: Internet Safety

29

What to Do

Educate

Don’t talk to strangers

Don’t give personal info

No pics unless comfortable with all relatives seeing or on front page of paper

No web cam! Ever!

No computer in bedroom

Page 30: Internet Safety

30

Connect Virtual to Physical

Page 31: Internet Safety

31

ProactiveToo much privacy + too much technology = disasterFocus groups with girlsCan’t get back photos once posted or sent

Photos printed/forwarded all the time“Think Before You Post”-ANYONE can see and PRINT what is posted onlineConnect virtual with physicalSkits as commercials

Page 32: Internet Safety

32

www.cybertipline.com

Page 33: Internet Safety

33

Stories

Guy gets girl to do things while chatting-Records it and releases on P2P-Child porn within seconds and she thinks she’s chatting with 15 year old boy

Principal has fake page created

Superintendent accidentally forwarded “venting” email to a person she was venting about-then was in the newspapers

Page 34: Internet Safety

34

13 year old committed suicide

Bullied at school

Turned to Internet and met other suicidal teens

Parents helped to create new laws on bullying in Vermont

www.ryanpatrickhalligan.com

Page 36: Internet Safety

36

Cyber Bullying Examples

Exclusion

Trickery

Cyber stalking

Cyber threats

Emails

Stealing/using someone else’s passwords for impersonating others

Creating websites

Page 37: Internet Safety

37

Cyber Bullying Examples

By proxy

Someone else gets punished for something they didn’t do

Warning or notify wars

Usually reported by a 3rd party

Hacking

Signing people up

Flaming

Page 38: Internet Safety

38

Effects

Exponential powers of InternetBystanders get involvedStrangers join in (all with 7%)1 out of 10 get reportedUnaware of power of wordsVictims become cyber bullies

FIGHTS IN SCHOOL

Page 39: Internet Safety

39

Cyber Bullying

Videotaped beating on YouTube/Ch. 7

Suicides

Damage is done regardless of punishment

Page 40: Internet Safety

40

Kids’ Justifications

Didn’t think would get caughtAngry/revengeTimeTech toysJust kiddingTo get a reactionEveryone does itBy accidentFree speech (to protect/not abuse)

Page 41: Internet Safety

41

What to do

Ignore

Don’t reply

Print

Save

Tell adult

Report to ISP/local authorities

Page 42: Internet Safety

4242

IT’S 10:00 DO YOU KNOW IT’S 10:00 DO YOU KNOW WHERE YOUR COMPUTER IS?WHERE YOUR COMPUTER IS?

Parents are ultimately responsibleParents are ultimately responsibleHave username and passwordHave username and passwordResourcesResources Spector ProSpector Pro Guardian MonitorGuardian Monitor Web WatcherWeb Watcher Spy ReconSpy Recon I Am Big BrotherI Am Big Brother

Install video surveillance and let Install video surveillance and let them knowthem know

Page 43: Internet Safety

43

Oh, by the way…