Upload
sharon7111
View
461
Download
0
Tags:
Embed Size (px)
DESCRIPTION
Videos on www.sharonnagyjohnson.com “Governors safety initiative” Internet safety “train-the-trainer” training to give effective internet safety presentations to students and parents, as well as community groups. The Keynote created was using material provided by the NJ State Police and Ad Council’s public service advertisements, all of which is free to use
Citation preview
1
2
Kids usually use their real name, school, etc.
Can establish a false identity/fake info
No credit cards
No age verification
2nd most hit site
3
PRIVATE
4
Private accounts can be broken into
Accounts linked/searches
Social engineering Pages aren’t censored
Adult subjects
Graphics
Anyone can search and find info
5
StrangersCelebritiesCyber BulliesGang activityMoviesRestaurantsBusinesses
6
Cooperative with law enforcement
Parents and teachers can contact myspace to take down pages
Search for kids info
Now requiring authentic email addresses
7
Background checks
Criminal activities
Employers use to weed out applicants
Embarrassed when page is shown even among peers
A LIFE RESUME
8
9
10
Meeting OnlineWith Goal to Meet In-Person
11
Human Element
Face-to-face
Words 7%
Body language 90+%
Tone/pitch 35+%
Pitch-Tone-Amplitude-Syllable Duration all greater during deceptive communication
Online
7% info available
Easier to conceal informative for intuition
Disconnect between virtual and physical
12
Human Element
No vision-no intuition
No “creep vibe”
Easier to be sexually explicit
Less shy online (would kids stand in the middle of the mall and say “Who wants to talk?”)
13
Predator ID
Generally more intelligent
Drs./Lawyers/College Professors/Engineers, etc.
High degree of unsuccessful knock & talks
Past victimization that perpetuates itself
Need driven behavior (esp. dangerous)
Passive/aggressive personality
Master manipulators (using 7%)
14
Predator ID
“Opportunist”
Likely to re-offend (1-10/will say 4-5)
Hanging around kids more than adults
Sex offender databases
15
Predator Targets
Latchkey
Lonely
Shy
Depressed
Youth groups
16
PredatorsIn Their Own Words
17
Higher Risks
Communicating with strangersTo meet friendsSexually explicitSexually curiousSend explicit photosWeb camSpecial needs kids especially vulnerableMost luring occurs between 3-6 pm
18
Grooming Process
Shared interests“Fit in” with youth’s lifeSlow methodical process to build trust
Will work to befriend even up to a yearConvince family to trustAlways interested in whatever is saidAlways claiming to understand and agreeBreaks down barriers-new relationship/new barrierExcess attentionGifts
19
Grooming Process
Accumulate useful infoSoft info (I like…my favorite…)Achilles heel of victims-emotional info
Desensitizes kids by sending porn cartoon to break down barriers or disgusting/violent images
Leaves weird psychological imprints (even detectives need “critical stress debriefings” w/o realizing it when certain images are stamped into the mind)
Goal is to meet in person
20
Other Dangers
What today’s kids are exposed to is vastly different than what we were at their age
P2P
Chat rooms
Thematic, regionalized, no age verification
IMing
Meebo (IM from anywhere across companies-no downloads)
Cell phones
21
P2PCan trade movies, pics, music, porn
Share files with everyone
22
P2P
No servers
Nodes connected to nodes
Bandwidth a must
No company mandates
Anonymity (Freenet)
Encryption (Impedes law enforcement efforts)
Bestiality
Child porn and other (“will make you cry”)
Defecation
23
24
Music Industry Wins Illegal Downloading CaseAssociated Press Friday, October 5, 2007; Page D02 DULUTH, Minn., Oct. 4 -- The recording industry won a key fight Thursday against illegal music downloading when a federal jury found that a Minnesota woman shared copyrighted music online and levied $222,000 in damages against her. The jury ordered Jammie Thomas, 30, to pay the six record companies that sued her $9,250 for each of 24 songs they focused on in the case. They had alleged she shared 1,702 songs. Thomas and her attorney, Brian Toder, declined to comment as they left the courthouse. In the first such lawsuit to go to trial, the record companies accused Thomas of downloading the songs without permission and offering them online through
Kazaa, a file-sharing program. Thomas denied wrongdoing and testified that she didn't have a Kazaa account.
25
Cell Phones
Leaves house everyday
Electronic leash/surveillance for kids
Cameras
Videos
Autotexting (sex jokes, dating services, romance tips, etc.)
RAPID and EASY transfers to MASS
Thumb drives
New tech in other countries
26
Social Networks
Behaviors are the danger
Anytime pics
Nothing private
Pics and postings = DRAMA between friends
Can’t say “don’t do it”
Focus on kids and reach out when young
Teach safety part of it
No shortage of threats, harassment, bullying-must still be dealt with
27
“Think Before You Post”
28
Think Before You Post
Always assume
Everyone can read post
All posts out there forever (diary/pics)
People reading posts can cause harm
29
What to Do
Educate
Don’t talk to strangers
Don’t give personal info
No pics unless comfortable with all relatives seeing or on front page of paper
No web cam! Ever!
No computer in bedroom
30
Connect Virtual to Physical
31
ProactiveToo much privacy + too much technology = disasterFocus groups with girlsCan’t get back photos once posted or sent
Photos printed/forwarded all the time“Think Before You Post”-ANYONE can see and PRINT what is posted onlineConnect virtual with physicalSkits as commercials
32
www.cybertipline.com
33
Stories
Guy gets girl to do things while chatting-Records it and releases on P2P-Child porn within seconds and she thinks she’s chatting with 15 year old boy
Principal has fake page created
Superintendent accidentally forwarded “venting” email to a person she was venting about-then was in the newspapers
34
13 year old committed suicide
Bullied at school
Turned to Internet and met other suicidal teens
Parents helped to create new laws on bullying in Vermont
www.ryanpatrickhalligan.com
35
Cyber Bullying Examples
Postings
Internet polling (hot or not)
Texting
IMs
Sending/posting pics
Interactive games
36
Cyber Bullying Examples
Exclusion
Trickery
Cyber stalking
Cyber threats
Emails
Stealing/using someone else’s passwords for impersonating others
Creating websites
37
Cyber Bullying Examples
By proxy
Someone else gets punished for something they didn’t do
Warning or notify wars
Usually reported by a 3rd party
Hacking
Signing people up
Flaming
38
Effects
Exponential powers of InternetBystanders get involvedStrangers join in (all with 7%)1 out of 10 get reportedUnaware of power of wordsVictims become cyber bullies
FIGHTS IN SCHOOL
39
Cyber Bullying
Videotaped beating on YouTube/Ch. 7
Suicides
Damage is done regardless of punishment
40
Kids’ Justifications
Didn’t think would get caughtAngry/revengeTimeTech toysJust kiddingTo get a reactionEveryone does itBy accidentFree speech (to protect/not abuse)
41
What to do
Ignore
Don’t reply
Save
Tell adult
Report to ISP/local authorities
4242
IT’S 10:00 DO YOU KNOW IT’S 10:00 DO YOU KNOW WHERE YOUR COMPUTER IS?WHERE YOUR COMPUTER IS?
Parents are ultimately responsibleParents are ultimately responsibleHave username and passwordHave username and passwordResourcesResources Spector ProSpector Pro Guardian MonitorGuardian Monitor Web WatcherWeb Watcher Spy ReconSpy Recon I Am Big BrotherI Am Big Brother
Install video surveillance and let Install video surveillance and let them knowthem know
43
Oh, by the way…