Norwalk Police Department Community Services & Crime Prevention Unit Partnered with the National...
-
Upload
julia-morse -
Category
Documents
-
view
217 -
download
1
Transcript of Norwalk Police Department Community Services & Crime Prevention Unit Partnered with the National...
Norwalk Police Norwalk Police Department Department
Community Services Community Services & Crime Prevention & Crime Prevention
UnitUnitPartnered with thePartnered with the
National Center for Missing & National Center for Missing & Exploited Children and Federal Exploited Children and Federal
Bureau of InvestigationBureau of Investigation
Presented by Sergeant Andre Presented by Sergeant Andre VelezVelez
Norwalk, CT Police Norwalk, CT Police DepartmentDepartment
INTERNET INTERNET SAFETYSAFETY
Preventing Cyber-Bullying Preventing Cyber-Bullying and Cyber-Stalkingand Cyber-Stalking
Norwalk Police DepartmentSergeant Andre VelezCrime Prevention Unit
Presented By:
OutlineOutline How Children Get In Trouble How Children Get In Trouble
OnlineOnline CyberbullyingCyberbullying Computer IntrusionsComputer Intrusions Copyright InfringementCopyright Infringement ThreatsThreats
Online CommunitiesOnline Communities Myspace etc.Myspace etc.
How Children Get In How Children Get In Trouble OnlineTrouble Online
How can kids get in How can kids get in troubletrouble
Cyber BullyingCyber Bullying Online Harassment/StalkingOnline Harassment/Stalking
Computer IntrusionsComputer Intrusions (hacking)(hacking)
Copyright Infringement:Copyright Infringement: duplication/distribution of duplication/distribution of
commercial software, MP3s, etc.commercial software, MP3s, etc.
Threats against schools or Threats against schools or othersothers
(themselves)
What is Cyberbullying?
What is Cyberbulling?What is Cyberbulling?(cyberbullying, cyber-bullying, online bullying)(cyberbullying, cyber-bullying, online bullying)
Definition:Definition:Cyber bullying is willfulCyber bullying is willful and and repeated harmrepeated harm inflicted inflicted throughthrough the medium of the medium of electronic textelectronic text.. Like bullying, cyber bullying Like bullying, cyber bullying involves involves recurringrecurring harmharm and can be distinguished and can be distinguished from peer harassment as a subset of from peer harassment as a subset of aggressive behavior because aggressive behavior because bullying bullying represents a pattern of behavior represents a pattern of behavior committed over a period of timecommitted over a period of time. .
The The anonymityanonymity, , ease of ease of provocationprovocation, and almost , and almost infinite source of targetsinfinite source of targets
means the means the Internet is full of Internet is full of predatorspredators from pedophiles from pedophiles targeting childrentargeting children to serial to serial
bullies targetingbullies targeting
... anybody. ... anybody.
Cyber BullyingCyber BullyingCyber Bullies useCyber Bullies use electronic information and electronic information and
communicationcommunicationdevices such as:devices such as: E-MailE-Mail Instant Messaging (IM)Instant Messaging (IM) Text Messages Mobile Phones Pagers Online Gaming Defamatory websitesDefamatory websites to to bullybully or otherwise or otherwise harassharass an individual or an individual or
group through personal attacks or other means.group through personal attacks or other means.
37% of teens online have used IM 37% of teens online have used IM to write something that they to write something that they
would not have said in personwould not have said in person
Source: Childnet InternationalSource: Childnet International
ThreatsThreats
It is against the law to use the Internet to:It is against the law to use the Internet to: make threats to do harm to anyonemake threats to do harm to anyone Make threats to damage anyone’s propertyMake threats to damage anyone’s property Make threats to damage anyone’s schoolMake threats to damage anyone’s school
Illegal Computer Access Illegal Computer Access (Hacking)(Hacking)
It is against the law to:It is against the law to: Use the Internet to Use the Internet to
access someone else’s access someone else’s computer without their computer without their permission.permission.
Use someone else’s Use someone else’s Internet account without Internet account without their permission.their permission.
Use someone else’s Use someone else’s Internet password Internet password without their permission.without their permission.
Software PiracySoftware Piracy Public DomainPublic Domain: : no copyrightno copyright, can be copied and distributed , can be copied and distributed
freefreely.ly.
FreewareFreeware: : has copyrighthas copyright. Can be distributed without advance . Can be distributed without advance payment but donations may be requested if used.payment but donations may be requested if used.
SharewareShareware: : copyrightedcopyrighted. Can be distributed without advance . Can be distributed without advance payment but expectation of payment if used.payment but expectation of payment if used.
Licensed softwareLicensed software: : copyrightedcopyrighted. Expectation of payment prior . Expectation of payment prior to to use.use.
License RestrictionsLicense Restrictions: per machine. Home/office: per machine. Home/officeCriminal and civil law violations.Criminal and civil law violations.
Bottom line?Bottom line? If the software If the software costs money, and you are costs money, and you are using it in violation of the user using it in violation of the user agreement, it’s stolen...agreement, it’s stolen...
Chat RoomsChat Rooms
& &
Instant MessagingInstant Messaging
Chat RoomsChat Rooms
People in chat-rooms can talk “anonymously” and say People in chat-rooms can talk “anonymously” and say anything they choose. Fact v. Fictionanything they choose. Fact v. Fiction
Some sites require it’s users to provide info such as name, Some sites require it’s users to provide info such as name, address, e-mail, likes/dislikes and info on family & friends address, e-mail, likes/dislikes and info on family & friends as the cost of participation. (Keep personal safety and as the cost of participation. (Keep personal safety and responsibility in mind)responsibility in mind)
Areas where people can “meet” on-line to exchange Areas where people can “meet” on-line to exchange ideas, information and be educational.ideas, information and be educational.
Instant MessagingInstant Messaging
Instant Messaging (IM)Instant Messaging (IM) A real time conversation where the 2 people A real time conversation where the 2 people
communicating are seeing their responses communicating are seeing their responses immediately.immediately.
Commonly referred to as Commonly referred to as IMIM ChattingChatting
Consider this when Instant Consider this when Instant MessagingMessaging
Choose an non identifiable, non gender Choose an non identifiable, non gender specific screen name specific screen name
Never give out any personal information.Never give out any personal information. real name, telephone or cell phone number, real name, telephone or cell phone number,
mailing address, passwords, mailing address, passwords, Never accept files or downloads from Never accept files or downloads from
people you don't know or from people you people you don't know or from people you do know, if you weren‘t expecting them.do know, if you weren‘t expecting them.
Never arrange to meet someone offlineNever arrange to meet someone offline that you only know through IM that you only know through IM conversations. conversations.
Know how to save copies of your IM Know how to save copies of your IM conversations. conversations.
Information You Information You DO NOTDO NOT want want to tell Strangersto tell Strangers
Full NameFull Name NicknamesNicknames DOBDOB Hair colorHair color Eye color Eye color Personality Personality Siblings & Their Ages Siblings & Their Ages LocationLocation SchoolSchool Future School Future School Best/Close Friends Best/Close Friends Online Best BudOnline Best Bud Pets & Their NamesPets & Their Names
Stupidest Thing You Stupidest Thing You Ever DidEver Did
Fav colorFav color Fav FoodFav Food Least Fav FoodLeast Fav Food Funniest person(s) you Funniest person(s) you
know (or wish you knew)know (or wish you knew) Fav Vacation Spot, Fav Vacation Spot, Fav. Thing To Do In The Fav. Thing To Do In The
Summer Summer Fav Thing To Do In The Fav Thing To Do In The
Fall Fall Fav Thing To Do In The Fav Thing To Do In The
WinterWinter
Information You Information You DO NOTDO NOT want want to tell Strangersto tell Strangers
JobJob Things you like to Things you like to
do do Things you collectThings you collect Best AdviceBest Advice Words or Phrases Words or Phrases
You OveruseYou Overuse Dream Car Dream Car Coolest Experience Coolest Experience
In LifeIn Life
Little-Known Talent You Little-Known Talent You PossessedPossessed
Special Skills or TalentsSpecial Skills or Talents Special Awards You Have Special Awards You Have
WonWon Traits You Look For Most Traits You Look For Most
In aIn aGuy/GirlGuy/Girl
You Want To BeYou Want To Be Future GoalsFuture Goals Religion (if any)Religion (if any) Church (if any)Church (if any) Groups/Singers you enjoyGroups/Singers you enjoy Non- Sport Game You Non- Sport Game You
EnjoyEnjoy Non-Sport Game Which Non-Sport Game Which
You ExcelYou Excel
Online Online CommunitiesCommunities
Homepages/WebpagesHomepages/Webpages
Thinking about a Home Thinking about a Home Page?Page?
Before you create a personal page on the Before you create a personal page on the internet...internet... What are you going to include?What are you going to include? Consider all the facts before deciding to put a picture of Consider all the facts before deciding to put a picture of
you, your family, your friends, or any other person or you, your family, your friends, or any other person or thing that might be used to identify you on the Web.thing that might be used to identify you on the Web.
Does everyone who creates a personal page on the Does everyone who creates a personal page on the Internet get stalked, harassed or worse?Internet get stalked, harassed or worse?
***of course NOT******of course NOT***
Be aware that…Be aware that…*Anything you put on the internet can be easily be saved *Anything you put on the internet can be easily be saved
forever byforever by
Strangers whom you did not intend to have.Strangers whom you did not intend to have.
*What you post can be used to easily identify you and/or those *What you post can be used to easily identify you and/or those you careyou care
about.about.
Popular Online Popular Online CommunitiesCommunities My Space
A free social networking website that uses the Internet for online communication through an interactive network of photos, blogs, user profiles, groups, and an internal email system.
Face Book A facebook is a book that is made up of photographs of
individuals along with their names. Facebooks are often published at the start of the academic year by the administrations of colleges and universities, with the intention of helping students, faculty, and staff to get to know each other better.
XangaXanga A free web-based journal-hosting community of online
journal-hosting, based in NYC Intended for people who are at least 13 years old.
If only she knew where her picswould end up...MyTeenEx.com is a free site that allows browsers to view thousands of user-submitted amateur pictures.
My Space.comMy Space.com
Not what you think…Not what you think…
My space.com-My space.com- very popular place on the Internet very popular place on the Internet
where people network, send messages to where people network, send messages to one another, post pictures of themselves one another, post pictures of themselves and others, and make cyber-friends.and others, and make cyber-friends.
A few users of Myspace have been A few users of Myspace have been involved in incidents recently involving involved in incidents recently involving luring or enticement of minors. Myspace luring or enticement of minors. Myspace has also been used for cyber bullying, has also been used for cyber bullying, cyber stalking and harassment.cyber stalking and harassment.
Let’s look at someone’s my space Let’s look at someone’s my space profile –profile –
(the actual screen name is blocked (the actual screen name is blocked out below)out below)
He calls himself, “Danny”He calls himself, “Danny”
http://www.myspace.com/http://www.myspace.com/phuckuuphuckingphuckphuckuuphuckingphuck
Here’s Dannys profile…he likes poetry, plants, flowers and
watching movies by the fire.
Danny loves his country and is here for dating,
serious relationships,
friends and networking. So far he has 14 friends
listed
Danny has posted some pics of his tatoo’s.
Says here that he is looking for a girlfriend!
Let’s look at another Let’s look at another web web site…………………………site…………………………
how abouthow about……www.azsexoffender.orgwww.azsexoffender.orgState of Arizona,State of Arizona,government-operated sex offender government-operated sex offender registration site.registration site.
Hey! There’s Danny. Surprise! His myspace page never
mentioned that he is a level 3, high-risk sex offender.
Did You Know?Did You Know? Employers and Colleges are now Employers and Colleges are now
checking the internet to include checking the internet to include Myspace.com, for profiles and web Myspace.com, for profiles and web pages of applicantspages of applicants
Also these employers and colleges can Also these employers and colleges can and will deny employment or admission and will deny employment or admission based on information you place on the based on information you place on the internet if they believe your character internet if they believe your character comes into question.comes into question.
Bottom Line watch what you place on Bottom Line watch what you place on the internet for everyone to see.the internet for everyone to see.
Dangers of the InternetDangers of the Internet
Some Risks of Getting Some Risks of Getting OnlineOnline
Distribution of Pornography Distribution of Pornography Sexual Predators Sexual Predators Misinformation and Hidden Misinformation and Hidden
Messages Messages Loss of Privacy Loss of Privacy Cyber bullying/Harassment/Stalking Cyber bullying/Harassment/Stalking Development of Childhood Behavior Development of Childhood Behavior
Disorder Disorder
ResourcesResourcesWho can I call for help?Who can I call for help?
National Center for Missing and Exploited ChildrenNational Center for Missing and Exploited Children 24 Hour hotline 24 Hour hotline 1-800-THE-LOST1-800-THE-LOST CyberTipLine: CyberTipLine: www.missingkids.com Norwalk Police Department
www.norwalkpd.com 203-854-3000 or your local PoliceLocal CSP State Police BarrackLocal CSP State Police Barrack
FBI New Haven600 State StreetNew Haven, Connecticut 06511-6505newhaven.fbi.gov(203) 777-6311
***Always dial 9-1-1 in case of an emergency
Sgt. Andre VelezNorwalk Police DepartmentCommunity Services DivisionCrime Prevention UnitTel # 203-854-3197Email: [email protected]
Thank You!