Norwalk Police Department Community Services & Crime Prevention Unit Partnered with the National...

Post on 27-Mar-2015

217 views 1 download

Tags:

Transcript of Norwalk Police Department Community Services & Crime Prevention Unit Partnered with the National...

Norwalk Police Norwalk Police Department Department

Community Services Community Services & Crime Prevention & Crime Prevention

UnitUnitPartnered with thePartnered with the

National Center for Missing & National Center for Missing & Exploited Children and Federal Exploited Children and Federal

Bureau of InvestigationBureau of Investigation

Presented by Sergeant Andre Presented by Sergeant Andre VelezVelez

Norwalk, CT Police Norwalk, CT Police DepartmentDepartment

INTERNET INTERNET SAFETYSAFETY

Preventing Cyber-Bullying Preventing Cyber-Bullying and Cyber-Stalkingand Cyber-Stalking

Norwalk Police DepartmentSergeant Andre VelezCrime Prevention Unit

Presented By:

OutlineOutline How Children Get In Trouble How Children Get In Trouble

OnlineOnline CyberbullyingCyberbullying Computer IntrusionsComputer Intrusions Copyright InfringementCopyright Infringement ThreatsThreats

Online CommunitiesOnline Communities Myspace etc.Myspace etc.

How Children Get In How Children Get In Trouble OnlineTrouble Online

How can kids get in How can kids get in troubletrouble

Cyber BullyingCyber Bullying Online Harassment/StalkingOnline Harassment/Stalking

Computer IntrusionsComputer Intrusions (hacking)(hacking)

Copyright Infringement:Copyright Infringement: duplication/distribution of duplication/distribution of

commercial software, MP3s, etc.commercial software, MP3s, etc.

Threats against schools or Threats against schools or othersothers

(themselves)

What is Cyberbullying?

What is Cyberbulling?What is Cyberbulling?(cyberbullying, cyber-bullying, online bullying)(cyberbullying, cyber-bullying, online bullying)

Definition:Definition:Cyber bullying is willfulCyber bullying is willful and and repeated harmrepeated harm inflicted inflicted throughthrough the medium of the medium of electronic textelectronic text.. Like bullying, cyber bullying Like bullying, cyber bullying involves involves recurringrecurring harmharm and can be distinguished and can be distinguished from peer harassment as a subset of from peer harassment as a subset of aggressive behavior because aggressive behavior because bullying bullying represents a pattern of behavior represents a pattern of behavior committed over a period of timecommitted over a period of time. .

The The anonymityanonymity, , ease of ease of provocationprovocation, and almost , and almost infinite source of targetsinfinite source of targets

means the means the Internet is full of Internet is full of predatorspredators from pedophiles from pedophiles targeting childrentargeting children to serial to serial

bullies targetingbullies targeting

... anybody. ... anybody.

Cyber BullyingCyber BullyingCyber Bullies useCyber Bullies use electronic information and electronic information and

communicationcommunicationdevices such as:devices such as: E-MailE-Mail Instant Messaging (IM)Instant Messaging (IM) Text Messages Mobile Phones Pagers Online Gaming Defamatory websitesDefamatory websites to to bullybully or otherwise or otherwise harassharass an individual or an individual or

group through personal attacks or other means.group through personal attacks or other means.

37% of teens online have used IM 37% of teens online have used IM to write something that they to write something that they

would not have said in personwould not have said in person

Source: Childnet InternationalSource: Childnet International

ThreatsThreats

It is against the law to use the Internet to:It is against the law to use the Internet to: make threats to do harm to anyonemake threats to do harm to anyone Make threats to damage anyone’s propertyMake threats to damage anyone’s property Make threats to damage anyone’s schoolMake threats to damage anyone’s school

Illegal Computer Access Illegal Computer Access (Hacking)(Hacking)

It is against the law to:It is against the law to: Use the Internet to Use the Internet to

access someone else’s access someone else’s computer without their computer without their permission.permission.

Use someone else’s Use someone else’s Internet account without Internet account without their permission.their permission.

Use someone else’s Use someone else’s Internet password Internet password without their permission.without their permission.

Software PiracySoftware Piracy Public DomainPublic Domain: : no copyrightno copyright, can be copied and distributed , can be copied and distributed

freefreely.ly.

FreewareFreeware: : has copyrighthas copyright. Can be distributed without advance . Can be distributed without advance payment but donations may be requested if used.payment but donations may be requested if used.

SharewareShareware: : copyrightedcopyrighted. Can be distributed without advance . Can be distributed without advance payment but expectation of payment if used.payment but expectation of payment if used.

Licensed softwareLicensed software: : copyrightedcopyrighted. Expectation of payment prior . Expectation of payment prior to to use.use.

License RestrictionsLicense Restrictions: per machine. Home/office: per machine. Home/officeCriminal and civil law violations.Criminal and civil law violations.

Bottom line?Bottom line? If the software If the software costs money, and you are costs money, and you are using it in violation of the user using it in violation of the user agreement, it’s stolen...agreement, it’s stolen...

Chat RoomsChat Rooms

& &

Instant MessagingInstant Messaging

Chat RoomsChat Rooms

People in chat-rooms can talk “anonymously” and say People in chat-rooms can talk “anonymously” and say anything they choose. Fact v. Fictionanything they choose. Fact v. Fiction

Some sites require it’s users to provide info such as name, Some sites require it’s users to provide info such as name, address, e-mail, likes/dislikes and info on family & friends address, e-mail, likes/dislikes and info on family & friends as the cost of participation. (Keep personal safety and as the cost of participation. (Keep personal safety and responsibility in mind)responsibility in mind)

Areas where people can “meet” on-line to exchange Areas where people can “meet” on-line to exchange ideas, information and be educational.ideas, information and be educational.

Instant MessagingInstant Messaging

Instant Messaging (IM)Instant Messaging (IM) A real time conversation where the 2 people A real time conversation where the 2 people

communicating are seeing their responses communicating are seeing their responses immediately.immediately.

Commonly referred to as Commonly referred to as IMIM ChattingChatting

Consider this when Instant Consider this when Instant MessagingMessaging

Choose an non identifiable, non gender Choose an non identifiable, non gender specific screen name specific screen name

Never give out any personal information.Never give out any personal information. real name, telephone or cell phone number, real name, telephone or cell phone number,

mailing address, passwords, mailing address, passwords, Never accept files or downloads from Never accept files or downloads from

people you don't know or from people you people you don't know or from people you do know, if you weren‘t expecting them.do know, if you weren‘t expecting them.

Never arrange to meet someone offlineNever arrange to meet someone offline that you only know through IM that you only know through IM conversations. conversations.

Know how to save copies of your IM Know how to save copies of your IM conversations. conversations.

Information You Information You DO NOTDO NOT want want to tell Strangersto tell Strangers

Full NameFull Name NicknamesNicknames DOBDOB Hair colorHair color Eye color Eye color Personality Personality Siblings & Their Ages Siblings & Their Ages LocationLocation SchoolSchool Future School Future School Best/Close Friends Best/Close Friends Online Best BudOnline Best Bud Pets & Their NamesPets & Their Names

Stupidest Thing You Stupidest Thing You Ever DidEver Did

Fav colorFav color Fav FoodFav Food Least Fav FoodLeast Fav Food Funniest person(s) you Funniest person(s) you

know (or wish you knew)know (or wish you knew) Fav Vacation Spot, Fav Vacation Spot, Fav. Thing To Do In The Fav. Thing To Do In The

Summer Summer Fav Thing To Do In The Fav Thing To Do In The

Fall Fall Fav Thing To Do In The Fav Thing To Do In The

WinterWinter

Information You Information You DO NOTDO NOT want want to tell Strangersto tell Strangers

JobJob Things you like to Things you like to

do do Things you collectThings you collect Best AdviceBest Advice Words or Phrases Words or Phrases

You OveruseYou Overuse Dream Car Dream Car Coolest Experience Coolest Experience

In LifeIn Life

Little-Known Talent You Little-Known Talent You PossessedPossessed

Special Skills or TalentsSpecial Skills or Talents Special Awards You Have Special Awards You Have

WonWon Traits You Look For Most Traits You Look For Most

In aIn aGuy/GirlGuy/Girl

You Want To BeYou Want To Be Future GoalsFuture Goals Religion (if any)Religion (if any) Church (if any)Church (if any) Groups/Singers you enjoyGroups/Singers you enjoy Non- Sport Game You Non- Sport Game You

EnjoyEnjoy Non-Sport Game Which Non-Sport Game Which

You ExcelYou Excel

Online Online CommunitiesCommunities

Homepages/WebpagesHomepages/Webpages

Thinking about a Home Thinking about a Home Page?Page?

Before you create a personal page on the Before you create a personal page on the internet...internet... What are you going to include?What are you going to include? Consider all the facts before deciding to put a picture of Consider all the facts before deciding to put a picture of

you, your family, your friends, or any other person or you, your family, your friends, or any other person or thing that might be used to identify you on the Web.thing that might be used to identify you on the Web.

Does everyone who creates a personal page on the Does everyone who creates a personal page on the Internet get stalked, harassed or worse?Internet get stalked, harassed or worse?

***of course NOT******of course NOT***

Be aware that…Be aware that…*Anything you put on the internet can be easily be saved *Anything you put on the internet can be easily be saved

forever byforever by

Strangers whom you did not intend to have.Strangers whom you did not intend to have.

*What you post can be used to easily identify you and/or those *What you post can be used to easily identify you and/or those you careyou care

about.about.

Popular Online Popular Online CommunitiesCommunities My Space

A free social networking website that uses the Internet for online communication through an interactive network of photos, blogs, user profiles, groups, and an internal email system.

Face Book A facebook is a book that is made up of photographs of

individuals along with their names. Facebooks are often published at the start of the academic year by the administrations of colleges and universities, with the intention of helping students, faculty, and staff to get to know each other better.

XangaXanga A free web-based journal-hosting community of online

journal-hosting, based in NYC Intended for people who are at least 13 years old.

If only she knew where her picswould end up...MyTeenEx.com is a free site that allows browsers to view thousands of user-submitted amateur pictures.

My Space.comMy Space.com

Not what you think…Not what you think…

My space.com-My space.com- very popular place on the Internet very popular place on the Internet

where people network, send messages to where people network, send messages to one another, post pictures of themselves one another, post pictures of themselves and others, and make cyber-friends.and others, and make cyber-friends.

A few users of Myspace have been A few users of Myspace have been involved in incidents recently involving involved in incidents recently involving luring or enticement of minors. Myspace luring or enticement of minors. Myspace has also been used for cyber bullying, has also been used for cyber bullying, cyber stalking and harassment.cyber stalking and harassment.

Let’s look at someone’s my space Let’s look at someone’s my space profile –profile –

(the actual screen name is blocked (the actual screen name is blocked out below)out below)

He calls himself, “Danny”He calls himself, “Danny”

http://www.myspace.com/http://www.myspace.com/phuckuuphuckingphuckphuckuuphuckingphuck   

Here’s Dannys profile…he likes poetry, plants, flowers and

watching movies by the fire.

Danny loves his country and is here for dating,

serious relationships,

friends and networking. So far he has 14 friends

listed

Danny has posted some pics of his tatoo’s.

Says here that he is looking for a girlfriend!

Let’s look at another Let’s look at another web web site…………………………site…………………………

how abouthow about……www.azsexoffender.orgwww.azsexoffender.orgState of Arizona,State of Arizona,government-operated sex offender government-operated sex offender registration site.registration site.

Hey! There’s Danny. Surprise! His myspace page never

mentioned that he is a level 3, high-risk sex offender.

Did You Know?Did You Know? Employers and Colleges are now Employers and Colleges are now

checking the internet to include checking the internet to include Myspace.com, for profiles and web Myspace.com, for profiles and web pages of applicantspages of applicants

Also these employers and colleges can Also these employers and colleges can and will deny employment or admission and will deny employment or admission based on information you place on the based on information you place on the internet if they believe your character internet if they believe your character comes into question.comes into question.

Bottom Line watch what you place on Bottom Line watch what you place on the internet for everyone to see.the internet for everyone to see.

Dangers of the InternetDangers of the Internet

Some Risks of Getting Some Risks of Getting OnlineOnline

Distribution of Pornography Distribution of Pornography Sexual Predators Sexual Predators Misinformation and Hidden Misinformation and Hidden

Messages Messages Loss of Privacy Loss of Privacy Cyber bullying/Harassment/Stalking Cyber bullying/Harassment/Stalking Development of Childhood Behavior Development of Childhood Behavior

Disorder Disorder

ResourcesResourcesWho can I call for help?Who can I call for help?

National Center for Missing and Exploited ChildrenNational Center for Missing and Exploited Children 24 Hour hotline 24 Hour hotline 1-800-THE-LOST1-800-THE-LOST CyberTipLine: CyberTipLine: www.missingkids.com Norwalk Police Department

www.norwalkpd.com 203-854-3000 or your local PoliceLocal CSP State Police BarrackLocal CSP State Police Barrack

FBI New Haven600 State StreetNew Haven, Connecticut 06511-6505newhaven.fbi.gov(203) 777-6311

***Always dial 9-1-1 in case of an emergency

Sgt. Andre VelezNorwalk Police DepartmentCommunity Services DivisionCrime Prevention UnitTel # 203-854-3197Email: avelez@norwalkct.org

Thank You!