Kids usually use their real name, school, etc. Can establish a false identity/fake info No credit cards No age verification 2 nd  most hit site
PRIVATE
Private accounts can be broken into Accounts linked/searches Social engineering Pages aren’t censored Adult subjects Graphics Anyone can search and find info
Strangers Celebrities Cyber Bullies Gang activity Movies Restaurants Businesses
Cooperative with law enforcement Parents and teachers can contact myspace to take down pages Search for kids info Now requiring authentic email addresses
Background checks Criminal activities Employers use to weed out applicants Embarrassed when page is shown even among peers A LIFE RESUME
 
 
Meeting Online With Goal to Meet In-Person
Human Element Face-to-face Words 7%  Body language 90+% Tone/pitch 35+% Pitch-Tone-Amplitude-Syllable Duration all greater during deceptive communication Online 7% info available Easier to conceal informative for intuition Disconnect between virtual and physical
Human Element No vision-no intuition No “creep vibe” Easier to be sexually explicit Less shy online (would kids stand in the middle of the mall and say “Who wants to talk?”)
Predator ID Generally more intelligent Drs./Lawyers/College Professors/Engineers, etc. High degree of unsuccessful knock & talks Past victimization that perpetuates itself Need driven behavior (esp. dangerous) Passive/aggressive personality Master manipulators (using 7%)
Predator ID “Opportunist” Likely to re-offend (1-10/will say 4-5) Hanging around kids more than adults Sex offender databases
Predator Targets Latchkey Lonely Shy Depressed Youth groups
Predators In Their Own Words
Higher Risks Communicating with strangers To meet friends Sexually explicit Sexually curious Send explicit photos Web cam Special needs kids especially vulnerable Most luring occurs between 3-6 pm
Grooming Process Shared interests “ Fit in” with youth’s life Slow methodical process to build trust Will work to befriend even up to a year Convince family to trust Always interested in whatever is said Always claiming to understand and agree Breaks down barriers-new relationship/new barrier Excess attention Gifts
Grooming Process Accumulate useful info Soft info (I like…my favorite…) Achilles heel of victims-emotional info Desensitizes kids by sending porn cartoon to break down barriers or disgusting/violent images Leaves weird psychological imprints (even detectives need “critical stress debriefings” w/o realizing it when certain images are stamped into the mind) Goal is to meet in person
Other Dangers What today’s kids are exposed to is vastly different than what we were at their age P2P Chat rooms Thematic, regionalized, no age verification IMing Meebo (IM from anywhere across companies-no downloads)  Cell phones
P2P Can trade movies, pics, music, porn Share files with everyone
P2P No servers Nodes connected to nodes Bandwidth a must No company mandates Anonymity (Freenet) Encryption (Impedes law enforcement efforts) Bestiality Child porn and other (“will make you cry”) Defecation
 
Music Industry Wins Illegal Downloading Case Associated Press  Friday, October 5, 2007; Page D02  DULUTH, Minn., Oct. 4 -- The recording industry won a key fight Thursday against illegal music downloading when a federal jury found that a Minnesota woman shared copyrighted music online and levied $222,000 in damages against her.  The jury ordered  Jammie Thomas , 30, to pay the six record companies that sued her $9,250 for each of 24 songs they focused on in the case. They had alleged she shared 1,702 songs. Thomas and her attorney, Brian Toder, declined to comment as they left the courthouse. In the first such lawsuit to go to trial, the record companies accused Thomas of downloading the songs without permission and offering them online through  Kazaa, a file-sharing program . Thomas denied wrongdoing and testified that she didn't have a Kazaa account.
Cell Phones Leaves house everyday Electronic leash/surveillance for kids Cameras Videos Autotexting (sex jokes, dating services, romance tips, etc.) RAPID and EASY transfers to MASS  Thumb drives New tech in other countries
Social Networks Behaviors are the danger Anytime pics Nothing private Pics and postings = DRAMA between friends Can’t say “don’t do it” Focus on kids and reach out when young  Teach safety part of it No shortage of threats, harassment, bullying-must still be dealt with
“Think Before You Post”
Think Before You Post Always assume Everyone can read post All posts out there forever (diary/pics) People reading posts can cause harm
What to Do Educate Don’t talk to strangers Don’t give personal info No pics unless comfortable with all relatives seeing or on front page of paper No web cam! Ever! No computer in bedroom
Connect Virtual to Physical
Proactive Too much privacy + too much technology = disaster Focus groups with girls Can’t get back photos once posted or sent Photos printed/forwarded all the time “Think Before You Post”-ANYONE can see and PRINT what is posted online Connect virtual with physical Skits as commercials
www.cybertipline.com
Stories Guy gets girl to do things while chatting-Records it and releases on P2P-Child porn within seconds and she thinks she’s chatting with 15 year old boy Principal has fake page created Superintendent accidentally forwarded “venting” email to a person she was venting about-then was in the newspapers
13 year old committed suicide  Bullied at school  Turned to Internet and met other suicidal teens Parents helped to create new laws on bullying in Vermont www.ryanpatrickhalligan.com
Cyber Bullying Examples Postings Internet polling (hot or not) Texting IMs Sending/posting pics Interactive games
Cyber Bullying Examples Exclusion Trickery Cyber stalking Cyber threats Emails Stealing/using someone else’s passwords for impersonating others Creating websites
Cyber Bullying Examples By proxy Someone else gets punished for something they didn’t do Warning or notify wars Usually reported by a 3 rd  party Hacking Signing people up Flaming
Effects Exponential powers of Internet Bystanders get involved Strangers join in (all with 7%) 1 out of 10 get reported Unaware of power of words Victims become cyber bullies FIGHTS IN SCHOOL
Cyber Bullying Videotaped beating on YouTube/Ch. 7 Suicides Damage is done regardless of punishment
Kids’ Justifications Didn’t think would get caught Angry/revenge Time Tech toys Just kidding To get a reaction Everyone does it By accident Free speech (to protect/not abuse)
What to do Ignore Don’t reply Print Save Tell adult Report to ISP/local authorities
IT’S 10:00 DO YOU KNOW WHERE YOUR COMPUTER IS? Parents are ultimately responsible Have username and password Resources Spector Pro Guardian Monitor Web Watcher Spy Recon I Am Big Brother Install video surveillance and let them know
Oh, by the way…

More Related Content

PPT
Students I Safety
PPT
Internet safety and cyber bulling final
PDF
Digital Citizenship
PPTX
Digital abuse
POTX
Cyberbullying assignment
PPT
Cyberbullying for Teachers
PPTX
Digital citizenship for Students
PPTX
Ppt cyberbullying
Students I Safety
Internet safety and cyber bulling final
Digital Citizenship
Digital abuse
Cyberbullying assignment
Cyberbullying for Teachers
Digital citizenship for Students
Ppt cyberbullying

What's hot (20)

PPTX
Cyber Bullying Questionnaire Results
PPTX
Cyber bullying
PDF
PPTX
Digital Dating Abuse
PPTX
Cyberbullying
PPT
Internetsafetyandcyberbullingfinal april31
PPTX
Cyberbullying
PPT
Cyber Bullying
PPTX
Cyber bullying presentation intro
PPT
Cyberbullying
PPTX
Cyber Bullying
PPTX
Internet safety presentation 2016
PPTX
Cyberbullying
PPTX
Cyberbullying
PPTX
Stop Cyberbullying
PPT
Cyber bullying
PPTX
Cyber bullying
PPTX
Pr cyberbullying campaign powerpoint
POTX
Cyber bullying presentation
PPTX
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyber Bullying Questionnaire Results
Cyber bullying
Digital Dating Abuse
Cyberbullying
Internetsafetyandcyberbullingfinal april31
Cyberbullying
Cyber Bullying
Cyber bullying presentation intro
Cyberbullying
Cyber Bullying
Internet safety presentation 2016
Cyberbullying
Cyberbullying
Stop Cyberbullying
Cyber bullying
Cyber bullying
Pr cyberbullying campaign powerpoint
Cyber bullying presentation
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Ad

Viewers also liked (9)

PPT
Teens Presentation
PPT
15 2 Eleni Pm Lesson 5b
PPT
Tweens Presentation
PPT
Dog-eat-dog 02 - Flash or Not
PPTX
Welcome to New Hamsphire
PPT
15 2 Eleni Pm Lesson 5b
PPTX
Promoting local food movement presentation
PPS
Exercise at Work
PPT
Dog-eat-dog 04 - Marketing Viral
Teens Presentation
15 2 Eleni Pm Lesson 5b
Tweens Presentation
Dog-eat-dog 02 - Flash or Not
Welcome to New Hamsphire
15 2 Eleni Pm Lesson 5b
Promoting local food movement presentation
Exercise at Work
Dog-eat-dog 04 - Marketing Viral
Ad

Similar to Internet Safety (20)

PPT
Youth Internet Safety
PDF
Internet Safety - Judi Calhoun
PPS
PPT
Social media details.ppt
PPT
PPT
Internet Safety for Families and Children
PPT
PPT
Internet Safety
PPT
Internet Safety
PPT
Cyberbullying class symposium
PPTX
Internet safety presentation 2015
PPT
Erickson martinez cyber bullying and internet addiction slideshare
PPTX
Online Safety 3.0 - Presentation for Parents and Teachers
PPT
Internet Safety Presentation
PPT
Internet Safety
PPT
Social Networking and Internet Safety
PPTX
Responsibility and accountability
PPT
Information Literacy Presentation
PPT
Keeping your child safe online
PPT
Internet Safety
Youth Internet Safety
Internet Safety - Judi Calhoun
Social media details.ppt
Internet Safety for Families and Children
Internet Safety
Internet Safety
Cyberbullying class symposium
Internet safety presentation 2015
Erickson martinez cyber bullying and internet addiction slideshare
Online Safety 3.0 - Presentation for Parents and Teachers
Internet Safety Presentation
Internet Safety
Social Networking and Internet Safety
Responsibility and accountability
Information Literacy Presentation
Keeping your child safe online
Internet Safety

Recently uploaded (20)

PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
International_Financial_Reporting_Standa.pdf
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PPTX
Computer Architecture Input Output Memory.pptx
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PPTX
20th Century Theater, Methods, History.pptx
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
Empowerment Technology for Senior High School Guide
PDF
My India Quiz Book_20210205121199924.pdf
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
PDF
Hazard Identification & Risk Assessment .pdf
Practical Manual AGRO-233 Principles and Practices of Natural Farming
International_Financial_Reporting_Standa.pdf
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Computer Architecture Input Output Memory.pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
FORM 1 BIOLOGY MIND MAPS and their schemes
20th Century Theater, Methods, History.pptx
Cambridge-Practice-Tests-for-IELTS-12.docx
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Paper A Mock Exam 9_ Attempt review.pdf.
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
LDMMIA Reiki Yoga Finals Review Spring Summer
Share_Module_2_Power_conflict_and_negotiation.pptx
Chinmaya Tiranga quiz Grand Finale.pdf
Empowerment Technology for Senior High School Guide
My India Quiz Book_20210205121199924.pdf
Uderstanding digital marketing and marketing stratergie for engaging the digi...
Hazard Identification & Risk Assessment .pdf

Internet Safety

  • 1.  
  • 2. Kids usually use their real name, school, etc. Can establish a false identity/fake info No credit cards No age verification 2 nd most hit site
  • 4. Private accounts can be broken into Accounts linked/searches Social engineering Pages aren’t censored Adult subjects Graphics Anyone can search and find info
  • 5. Strangers Celebrities Cyber Bullies Gang activity Movies Restaurants Businesses
  • 6. Cooperative with law enforcement Parents and teachers can contact myspace to take down pages Search for kids info Now requiring authentic email addresses
  • 7. Background checks Criminal activities Employers use to weed out applicants Embarrassed when page is shown even among peers A LIFE RESUME
  • 8.  
  • 9.  
  • 10. Meeting Online With Goal to Meet In-Person
  • 11. Human Element Face-to-face Words 7% Body language 90+% Tone/pitch 35+% Pitch-Tone-Amplitude-Syllable Duration all greater during deceptive communication Online 7% info available Easier to conceal informative for intuition Disconnect between virtual and physical
  • 12. Human Element No vision-no intuition No “creep vibe” Easier to be sexually explicit Less shy online (would kids stand in the middle of the mall and say “Who wants to talk?”)
  • 13. Predator ID Generally more intelligent Drs./Lawyers/College Professors/Engineers, etc. High degree of unsuccessful knock & talks Past victimization that perpetuates itself Need driven behavior (esp. dangerous) Passive/aggressive personality Master manipulators (using 7%)
  • 14. Predator ID “Opportunist” Likely to re-offend (1-10/will say 4-5) Hanging around kids more than adults Sex offender databases
  • 15. Predator Targets Latchkey Lonely Shy Depressed Youth groups
  • 16. Predators In Their Own Words
  • 17. Higher Risks Communicating with strangers To meet friends Sexually explicit Sexually curious Send explicit photos Web cam Special needs kids especially vulnerable Most luring occurs between 3-6 pm
  • 18. Grooming Process Shared interests “ Fit in” with youth’s life Slow methodical process to build trust Will work to befriend even up to a year Convince family to trust Always interested in whatever is said Always claiming to understand and agree Breaks down barriers-new relationship/new barrier Excess attention Gifts
  • 19. Grooming Process Accumulate useful info Soft info (I like…my favorite…) Achilles heel of victims-emotional info Desensitizes kids by sending porn cartoon to break down barriers or disgusting/violent images Leaves weird psychological imprints (even detectives need “critical stress debriefings” w/o realizing it when certain images are stamped into the mind) Goal is to meet in person
  • 20. Other Dangers What today’s kids are exposed to is vastly different than what we were at their age P2P Chat rooms Thematic, regionalized, no age verification IMing Meebo (IM from anywhere across companies-no downloads) Cell phones
  • 21. P2P Can trade movies, pics, music, porn Share files with everyone
  • 22. P2P No servers Nodes connected to nodes Bandwidth a must No company mandates Anonymity (Freenet) Encryption (Impedes law enforcement efforts) Bestiality Child porn and other (“will make you cry”) Defecation
  • 23.  
  • 24. Music Industry Wins Illegal Downloading Case Associated Press Friday, October 5, 2007; Page D02 DULUTH, Minn., Oct. 4 -- The recording industry won a key fight Thursday against illegal music downloading when a federal jury found that a Minnesota woman shared copyrighted music online and levied $222,000 in damages against her. The jury ordered Jammie Thomas , 30, to pay the six record companies that sued her $9,250 for each of 24 songs they focused on in the case. They had alleged she shared 1,702 songs. Thomas and her attorney, Brian Toder, declined to comment as they left the courthouse. In the first such lawsuit to go to trial, the record companies accused Thomas of downloading the songs without permission and offering them online through Kazaa, a file-sharing program . Thomas denied wrongdoing and testified that she didn't have a Kazaa account.
  • 25. Cell Phones Leaves house everyday Electronic leash/surveillance for kids Cameras Videos Autotexting (sex jokes, dating services, romance tips, etc.) RAPID and EASY transfers to MASS Thumb drives New tech in other countries
  • 26. Social Networks Behaviors are the danger Anytime pics Nothing private Pics and postings = DRAMA between friends Can’t say “don’t do it” Focus on kids and reach out when young Teach safety part of it No shortage of threats, harassment, bullying-must still be dealt with
  • 28. Think Before You Post Always assume Everyone can read post All posts out there forever (diary/pics) People reading posts can cause harm
  • 29. What to Do Educate Don’t talk to strangers Don’t give personal info No pics unless comfortable with all relatives seeing or on front page of paper No web cam! Ever! No computer in bedroom
  • 30. Connect Virtual to Physical
  • 31. Proactive Too much privacy + too much technology = disaster Focus groups with girls Can’t get back photos once posted or sent Photos printed/forwarded all the time “Think Before You Post”-ANYONE can see and PRINT what is posted online Connect virtual with physical Skits as commercials
  • 33. Stories Guy gets girl to do things while chatting-Records it and releases on P2P-Child porn within seconds and she thinks she’s chatting with 15 year old boy Principal has fake page created Superintendent accidentally forwarded “venting” email to a person she was venting about-then was in the newspapers
  • 34. 13 year old committed suicide Bullied at school Turned to Internet and met other suicidal teens Parents helped to create new laws on bullying in Vermont www.ryanpatrickhalligan.com
  • 35. Cyber Bullying Examples Postings Internet polling (hot or not) Texting IMs Sending/posting pics Interactive games
  • 36. Cyber Bullying Examples Exclusion Trickery Cyber stalking Cyber threats Emails Stealing/using someone else’s passwords for impersonating others Creating websites
  • 37. Cyber Bullying Examples By proxy Someone else gets punished for something they didn’t do Warning or notify wars Usually reported by a 3 rd party Hacking Signing people up Flaming
  • 38. Effects Exponential powers of Internet Bystanders get involved Strangers join in (all with 7%) 1 out of 10 get reported Unaware of power of words Victims become cyber bullies FIGHTS IN SCHOOL
  • 39. Cyber Bullying Videotaped beating on YouTube/Ch. 7 Suicides Damage is done regardless of punishment
  • 40. Kids’ Justifications Didn’t think would get caught Angry/revenge Time Tech toys Just kidding To get a reaction Everyone does it By accident Free speech (to protect/not abuse)
  • 41. What to do Ignore Don’t reply Print Save Tell adult Report to ISP/local authorities
  • 42. IT’S 10:00 DO YOU KNOW WHERE YOUR COMPUTER IS? Parents are ultimately responsible Have username and password Resources Spector Pro Guardian Monitor Web Watcher Spy Recon I Am Big Brother Install video surveillance and let them know
  • 43. Oh, by the way…