Internet Safety An Oxymoron?. What do these mean? ROTFLMoS or POS or POL or 1 OMGPRW BTWPCM B/F or...

68
Internet Safety An Oxymoron?

Transcript of Internet Safety An Oxymoron?. What do these mean? ROTFLMoS or POS or POL or 1 OMGPRW BTWPCM B/F or...

Internet SafetyAn Oxymoron?

What do these mean?ROTFL MoS or POS or POL or 1

OMG PRW

BTW PCM

B/F or G/F WAN2TLK

G2G SSINF

H8 TPM

JK or :-) or WAYF or WUF?

KOTL or X ASL or A/S/L

STR8 YBS

MorF WMIRL

SUP? NMGOH WWW

How About These?

:-( (((H))) :-X

‘:-) (:-D :*)

:-! :-----) :^)

:-< >-) @>--;--

Are you familiar with these?• Candy Cigs & Dr Ads to No Smoking

& Cigarettes warning labels• Cyanide laced Tylenol–Safety seals• Litterbug Campaigns

– Give a hoot! Don’t pollute!Hootie the Owl

– Crying Native American commercial– Pitch it in!

• Fire – Bad!– Only you can prevent forest fires.

Smokey the Bear

The Shift

• Children play in the toy section of the supermarket & parents collect the children before leaving the store. OR Leave them at home and shop quickly.

• Parents & children shop in separate stores at mall.• Parents put children on a leash while shopping.• Parents give children cell phone, to know what their

children are doing at all times AND a computer to help with school work.

Online ThreatsWhat do parents do?

• Parent Control software

• Have computer in a ‘public’ area

• Figure children know what they’re doing

• Huh? They have no clue what is going on.– “I don’t understand technology.”

Oh please, I know what to do

• Teens have the perfect combination of OVERCONFIDENCE & INEXPERIENCE to get in trouble easily

• Teens may be ‘tech’ savvy but are not usually ‘relationship’ savvy.

Numbers-They are Against You!

• 1996-2003, the FBI reported a 2050% increase in online predator cases opened (from 113 to 2430).

2003-2007 showed a 2026% increase over that!

• 1 in 5 students have been ‘approached’ in a chatroom

• Over 50,000 pedophiles online at any given time.

• The average teen spends – 13 hours/week watching TV

– 16 hours/week ONLINE

Let your fingers do the walkingInstant Messenger, Chat rooms,

& social networking sites like MySpace, Facebook, Friendster, Xanga, online dating or

matchmaking sites, etc. are the White/Yellow Pages for online predators

Advice sites

They also love those sites like iVillage, magazine sites, and other sites males

and females frequent to gab about themselves, their problems,

relationships, how to dress,… how easy it is to befriend someone in

these environments!

Resume sites

Even job searching sites like Monster.com can be a shopping place

for online predators looking for the older end of the youth.

Yes, Kids LIE on the netexcept in their profiles because their friends read them

Predators know this so they compensate by:-subtracting 3 years to any age you give

(ex. actually 13 is online 16)-finding out where you really are by your IP

address – just agree to receive or send a file, talk person to person, chat over a connected phone/microphone

-searching your screen name-using their groups to share your info

Safe & Anonymous online is anything but

• On social networking sites, the URL listing contains their name or screen name they used when registering.

• This name can be searched and usually leads to other sites where information is not blocked.

• Even when a search leads to a blocked site, the cached information to be found there is NOT blocked.

Print this slide to Discuss• Nowhereville – I’m from such&such private school – I can show you around

the city – get out of Hicksville one day & we’ll have fun• Phone # = map of house• Pedophiles will take the time – search and search and wait – only surf for

kids – diff btwn 15 & 18 – don’t want 18• Danville Med Ctr – higher #s of peds – not ‘treated’ – just released• Search DramaChic – no AIM profile but has a MySpace account – there’s all

the info I need• ‘Talk’ to someone for 2 seconds – Hey U, Hi, put # string into search & trace

connection, MS-DOS Net Stat put in dynamic address, locate her, find schools in area – Google Earth – know area

• Make up summer camp story – hey I know a friend of yours from camp – want to see a pic of her drooling in sleep? Get IP address – got’em (not same person –oops G2G

• 30,000 kids cut class each day – on the chats

Pedophile symbols often in jewelry

Boy Love - Prefers boysGirl Love – Prefers girls

Child Love - Both All encompassing pedophilia

Searching for the next victim

• Your screen name is so cool that you use it everywhere for everything – BAD MOVE!

• You can’t change your screen name – everyone knows it by heart!

• You don’t check the advanced settings – the program has the protective defaults set

• Your friends have you listed in their info…

so a trail leads right to you - BFFBFF

Don’t talk to strangers!

Would you let a 40 year old man

into your bedroom at 2am?

You know, just to chat?

They WILL do the work…But you can just be naïve and give them

everything they need.

You may think you are hidden.Just because

you can’t see them, doesn’t mean

that they can’t see you.

But I didn’t tell them anything!

• Profile address fake – Boring Street, Nowhere, PA, 18201← + REAL STATE & ZIP

• CougarGal77 screen name

• Nothing to do here in this backwards town

• Saw ‘latest movie name’ with friends• G2G2 practice-game against teachers Thurs

Back

Back

The Predator has all of your information now…time to meet

Protecting AIM Some steps to take to help protect AIM

PART 1OLDER

VERSION OF AIM

Got to the Edit Preferences Area

Select an item on theLEFT and look at the settings for the item

Go to the Profile setup

Make sure this box is unchecked – click on next

Make sure this box is unchecked – click on next

This area should not contain any personal information – nor information about “friends”

PART 2AIM’S NEWER VERSION (6.0)

Gee-looks like MySpace

Click on Edit

Click on Settings

Select an item on theLEFT and look at the settings for the item

Monitor all Messages by clicking on IM Logging

Click on My Buddy Info

This area should not contain any personal information – nor information about “friends”

Click on My AIM page

This page should not contain any personal information – nor information about “friends”

MySpace

Notice Me!

From this screenClick on Help

Scroll down this screen

Click on

How do I remove my child’s profile

from MySpace.com

--Follow the directions--

Gone but not forgotten

You can remove or block things from your site

BUT whatever was already cached can still be brought up.

So the lesson - NEVER post things you might regret in the first place.

This also includes what you post about others too

You can get in serious and legal trouble for posting bad things

about other people.

CYBERBULLYING SAD ANGRY UPSET

DEPRESSED VIOLATED

HATED ANNOYED

HELPLESS EXPLOITED

STUPID PUT-DOWN

CYBERBULLYING

WILLFUL AND REPEATED HARM

INFLICTED THROUGH ELECTRONIC TEXT

A Cyberbully is often an adolescent who posts inappropriate or rude things about a specific person or

otherwise harasses that person on the Internet, in e-mails, through

IM's, or though other digital formats such as text messages on a

cell phone.

53 percent admit saying mean or hurtful things to someone online.42 percent have been bullied online.35 percent have been threatened online.20 percent have received mean or threatening e-mails58 percent have not told their parents or another adult about someone being mean or hurtful to them online.

More statistics

• 90% of middle school students have had their feelings hurt online.

• 75% have visited a Web site bashing another student.

• 40% have had their password(s) stolen and changed by a bully (who then locked them out of their own account or sent communications posing as them).

• Only 15% of parents polled knew what cyberbullying was.

Cyberbullying is a violation of the "terms of use" of most service providers.

File a complaint by providing the harmful messages and ask that the account be terminated and any harmful material be removed.

IT IS A CRIME!

HARASSMENTPost something in public

3rd Degree Misdemeanor – 1 year in jail $2,500 fine

STALKINGSeveral communications are sent directly to victim

1st Degree Misdemeanor – 5 Years in jail $10,000 fine

Other Consequences

• Get dropped from your ISP

• Trouble getting accepted into college

• Trouble getting a good job

Don't reply to messages from cyberbullies

Allow only messages from those on the buddy list

Do not erase or delete messages from cyberbullies – You don't have to read it, but keep it, it is your evidence.

Do not keep this to yourself!

Inform your parents or teacher

Inform your local police

Inform your Internet Service Provider (ISP) or cell phone/pager service provider

Today video

If you are the victim of a cyberbully who has set up a Web site that is defaming, or mocking you, contact the Internet Service Provider and inform them about what is happening, also inform the police.

INFORMATION THAT CAN BE GATHERED FROM A SIMPLE EMAIL OF “I HATE YOU”

Return-Path: <[email protected]>Received: from [218.242.20.53] by ns1.netizenship.org (NTMail 5.06.0016/LC0008.00.11c4cb1f) with ESMTP id eahnhaaa for [email protected]; Tue, 13 Mar 2007 10:58:30 -0700Received: from oc.xqna.org [158.148.129.96] by 207.228.118.41 id IGj585W6h0WK for <[email protected]>;Tue, 13 Mar 2007 23:58:15 +0600Message-ID: <[email protected]>From: "" <[email protected]>To: <[email protected]>Subject:: I Hate You!Date: Tue, 13 Mar 07 23:58:15 GMTX-Priority: 3X-MSMail-Priority: NormalX-Mailer: Microsoft Outlook, Build 10.0.2616MIME-Version: 1.0Content-Type: multipart/alternative;boundary="CB8ECC1D.E.F3ED22__.91"

If you are receiving harassing messages from cyber bullies through Web-based mail services like Hotmail, Yahoo Mail etc., it becomes very difficult to trace such accounts as [email protected]. You may have to delete your current e-mail account and start a new one. Tell only a select few people you trust about your new e-mail account when, and if you choose to re-establish one.

SILENCE, when others

are being hurt, is not acceptable!

Don’t Feed the Bully

• Stay calm– Don’t show fear

• Assess the likelihood of violence– Get away & report physical actions– Until something actually happens authority figures

have no evidence & a bully’s parents loudly protest that their child did anything bad

• Have a thick skin & sense of humor– If you don’t react, they get bored and move on

• Collect evidence– Record altercations, print offensive material, get time,

place, who said what, and who was involved.

Questions• How many days/wk R U in a chat room?• How long do U spend in a room each time?• What type of chat rooms do you visit most often?• Do U use IM?

– If yes: What’s your screen name?– Do U have a profile?

• If yes, what did U type?• Did U:

– Allow others to search for U by common interest?– Allow anyone to send U an IM?– Fill out the screen for name & address?

• Did anyone ever ask U for your real name, gender, age, school name, activities, etc.?

RULES• Stay away from any social networking sites • DO NOT TALK TO STRANGERS• NEVER

– Agree to meet anyone met online– Give out any personal information– ‘Talk’ to an unknown screen name– Call anyone met online (caller ID)– Give out information to a CALLER– Give your school’s name– Tell your location – state, town, street, etc.– ‘Allow People to Search for Me’ in IM– Give out your e-mail address– Put friends’ names in your profile– Talk P2P or send a file to a ‘screen name’ – esp. over fixed IP

Visit these sites• www.missingkids.com • www.netsmartz.org• www.Idthecreep.com• www.fbi.gov/innocent.htm• tcs.cybertipline.org• www.pameganslaw.state.pa.us• www.wiredsafety.org• www.ISafe.org• www.safekids.com• www.iKeepSafe.org• www.2SMRT4U.com