Internet Safety for D41 Families

Download Report

Transcript Internet Safety for D41 Families

Internet Safety for D41 Families
What do you need to know?
Presented by
David Zolnier, Director of Technology, Glen Ellyn School District 41
Carol Barsotti, Instructional Technology Specialist, Glen Ellyn School District 41
Jim Monson, Detective, Glen Ellyn Police Department
FACT:
Advanced computer skills are
NOT
required to be Internet safe.
“Knowledge Is Power”
Sir Francis Bacon, 1597
Access to the Internet
 FACT: Between 2000 and 2002,
children increased their access to the Internet,
regardless of income or age,
with the greatest growth happening in the home.
70
60
50
%
40
2000
2002
30
20
10
0
All
Home
School
Library
Source: i-SAFE Student/Parent Assessments 2003-’04
Why the Internet Is So Popular
 FACT: 83% of parents express satisfaction with their
child’s Internet use because of its educational value and
propensity to encourage exploration.
The Internet allows users to:






Gather Up-To-The-Moment News
Send Mail Instantly
Find Entertainment
Purchase Goods & Services
Research Any Topic
Adventure & Explore
Keep Your Kids Safe!
To keep kids safe, parents need to understand
and teach these topics at home:
 Online Security
 Personal Safety
 Value of Personal Information
 Predator Identification & the Grooming Process
Parent & Student Perspectives Differ
 FACT: 14% of students polled stated that their parents
have no idea where they go or what they do on the
Internet.
Parents
vs.
Students
• 92% stated that they had
established rules for their child’s
Internet use.
• Only 65% stated that they have
established rules for their Internet
use.
• 90% feel they have a good idea of
what their child does while online.
• Only 66% said they share what
they do on the Internet with their
parents.
• 54% feel limited in monitoring &
sheltering their child from
inappropriate material on the Internet.
• 53% stated that they would
prefer to be alone when surfing the
Internet.
Source: i-SAFE Student/Parent Assessments 2003-’04
Targets
 FACT: 66% of online sexual solicitation targets girls.
 FACT: On the Internet, boys are as likely as girls to be
targeted for threats or efforts to humiliate them.
Average Ages Targeted For Online Sexual
Solicitation
50%
40%
30%
Students
20%
10%
0%
10yrs 11yrs 12yrs 13yrs 14yrs 15yrs 16yrs 17yrs
Source: Crimes Against Children Research Center – Online Victimization: A Report on the Nation’s Youth
What We Know About Youth and the Internet
 FACT: Youth are
sophisticated users of
technology – often more
clever and experienced than
adults.
 FACT: Youth can get
unrestricted Internet access.
 FACT: Only 25% of youth
who received a sexual
solicitation told a parent or
responsible adult.
The Predator Grooming Process
1st Stage: Appears Familiar
 Predator is non-threatening, friendly, comforting, and familiar.
 Predator disguises their true identity and motive for the
relationship.
 Predator systematically pretends to have common interests with the
victim.
 Predator uses information gathered from profile and chat room
conversations
Music
& Movies
Cars
& Hobbies
Sports
& Celebrities
2nd Stage: Develops Trust
Predator always supports child’s point-of-view regarding
conflicts.
 Predator systematically exploits family, school and/or social
friction.
 Predator fosters the illusion that they are the only person who
understands child.
 Predator & child communication regularly in public chat rooms –
become “buddies.”

3rd Stage: Establishes Secrecy
Child places predator’s e-mail address on their e-mail lists.
Predator acquires child’s personal Internet addresses and phone
numbers.
 Child is convinced that their parents won’t understand their
“special” relationship.
 Predator and child use secret e-mail accounts to communicate
stronger messages.


4th Stage: Erodes Barriers



Predator lures child into having adult-oriented conversations.
Child begins believing they are prepared for adult experiences.
Predator exploits child’s natural curiosity to erode personal
ethical barriers.
 Child’s protective inhibitions are desensitized by obscene
photos and language.
5th Stage: Direct Intimidation


Child can be blackmailed with forbidden materials they received.
Predator may resort to threats of violence or of public
humiliation.
 Child may feel powerless to ask an adult or authority for safety
and support.
 Predator leverages child’s increased emotional distance from
parents to intimidate.
Final Stage: Face-To-Face Meeting
 FACT: Not all predators use a grooming process to
achieve their goal.
 FACT: Juveniles make 48% of aggressive solicitations.
 FACT: Females make 25% of aggressive solicitations.
Where Grooming Can Start
FACT: 66% of all solicitations happen in Internet chat rooms.
FACT: 24% are received through Instant Messages.
FACT: 77% of the victims are 14-17 years old.
Typical Internet Chat Room
Source: U.S. Department of Justice OJJDP Fact Sheet, March 2001
“I go into a chat room”
50
45
40
35
30
% 25
20
15
10
5
0
Girls
Boys
3rd
4th
5th
6th
7th
8th Frosh Soph JuniorSenior
Source: i-SAFE Student/Parent Assessments 2003-’04
Registering for a Chat Room




Screen name and profile are created during registration.
Very often, photos are even included.
Personal information (age, interests, etc.) aid predators to groom victims.
Predators use screen names and profiles to both identify and lure victims.
Age: 11
CubsRule11
Address: Chicago, IL
Hobbies: Playing Baseball
Name: Judy
JudyInMo94
Age: 12 (born in 1994)
Address: Missouri
Name: Harold Baxter
SkateDude13
Age: 47
Address: Chicago, IL
Works as an insurance salesman
“I have met a new person from the Internet
face-to-face”
20
18
16
14
12
% 10
8
6
4
2
0
Girls
Boys
5th
6th
7th
8th
Frosh Soph Junior Senior
Source: i-SAFE Student/Parent Assessments 2003-’04
“I have posted my photo on the Internet”
60
50
40
%
Girls
Boys
30
20
10
0
3rd
4th
5th
6th
7th
8th
Frosh Soph Junior Senior
Source: i-SAFE Student/Parent Assessments 2003-’04
Instant Messaging
IM allows private, silent communication anytime
• Instant messages – “IMs” - can be sent and
received almost anywhere anytime using a
computer or cell phone.
• IM addresses are located and used by
strangers if posted on the Internet.
• IMs are more difficult to trace and
retrieve allowing two people to
communicate privately/secretly.
Examples of “Chat Language”
LOL
Laugh Out Loud
TMI
Too Much Information
BWL
Bursting With Laughter
DIKU
Do I Know You?
CTN
Can’t Talk Now
P911
Parents in Room, watch your language
PAL
Parents Are Listening
F2F
Face To Face
ASLP
Age, Sex, Location, Picture?
Instant Messaging Tips To Use at Home
 Have fun being part of your child’s online experience.
 Respect your child’s privacy but make certain they
know personally everyone on their “buddy” list.
No Strangers Allowed!
 Keep the computer where everyone sees the screen.
No Hidden Screens!
 Keep personal information private.
No Personal Info!
 Report strangers who solicit meetings with any child.
 Teach your child how to recognize & avoid predators.
 Delete unsolicited email attachments.
No viruses, worms or trojans!
For Your Kids: “I promise I will…”
 Always tell my parents if something or somebody makes me feel
uncomfortable, fearful or threatened
 Never give out personal information such as my real name, address,
phone number, school name, schedule or other identifying information
over the Internet.
 Never respond to a message that uses profanity or inappropriate
language.
 Never send photos of myself, my friends, or my family to anyone I do not
personally know.
 Ask my parents before I do anything online that costs money.
 Gently tell anyone who I see engaging in unsafe Internet practices that
what they are doing is dangerous.
 Help my parents figure out how to do even the simplest of computer tasks
without laughing at them or acting totally superior because my parents
trust me enough to abide by these rules and I appreciate that very much!
Please Be Aware!
Some
specific
examples…
MySpace.com
 MSNBC defines it as “… a social
networking site — sort of a cyber
combination of a yearbook,
personal diary and social club.
With more than 50 million members,
its one of the fastest growing
Web sites in the country.“
 Shannon Sullivan, teenager:
“Everyone has a MySpace and everyone wants a My Space.”
 Free, easy to join, and easy to message its members, kids chat about
everything from school, to sports, to fundraisers for Katrina victims. It
all seems like innocent fun, and it can be… But there are hidden
dangers.
 Shannon Sullivan, teenager:
“I honestly thought it was just my friends looking at it.”
MySpace.com
Remember Harold
(SkateDude13)?
 Review your child’s MySpace.com profile with them
 Minimum age requirement is 14!
 Review the MySpace.com safety tips:
http://collect.myspace.com/misc/safetytips.html?z=1
(Link is at the bottom of the main MySpace.com page)
Blogging Websites
 A blog is a journal that is available on the web.
 It is short for “weblog.”
 The activity of updating a blog is "blogging" and
someone who keeps a blog is a "blogger."
 Blogs are typically updated daily using software that
allows people with little or no technical background to
update and maintain the blog.
Blogging Tips
 Be as anonymous as possible.
Avoid postings that could enable a stranger to locate you. That includes your last name,
the name of your school, sports teams, the towns you live in, and where you hang out.
 Protect your info.
Check to see if your service has a "friends" list that allows you to control who can visit
your profile or blog. If so, allow only people you know and trust.
 Avoid in-person meetings.
Don't get together with someone you "meet" through a blog unless you are certain of their
actual identity. Although it's still not risk-free, if you do meet the person, arrange the
meeting in a public place and bring some friends along.
 Photos: Think before posting.
What's uploaded to the Net can be downloaded by anyone and passed around or posted
online pretty much forever. Avoid posting photos that allow people to identify you.
 Check comments regularly.
If you allow them on your profile or blog, check them often. Don't respond to mean or
embarrassing comments. Delete them and, if possible, block offensive people from
commenting further.
 Be honest about your age.
Membership rules are there to protect people. If you are too young to sign up, do not
attempt to lie about your age. Talk with your parents about alternative sites that may be
appropriate for you.
AOL Users
Use the AOL Parental Controls
Tips from AOL.com
 Monitor online activity with AOL® Guardian
 Opt for AOL® Guardian "report cards" that show your kids' Web
surfing, e-mail and IM activity.
 Monitor how long your kids are online. Set controls by day, time
of day or session length.
 Help your kids' communicate with friends by creating a list of
approved e-mail addresses.
 Manage Parental Controls remotely via AOL.com. You don't have
to be there to monitor your kids' activity and Internet safety.
 Limit access to other software, too
So…?
Are you noticing a pattern?
Protect Your Information!
Final Tips for Parents…
Install Antivirus Software.
Virus: a software program capable of reproducing itself
and usually capable of causing great harm to files or
other programs on the same computer
www.mcafee.com
www.nod32.com
www.norton.com
Final Tips for Parents…
Use a Firewall on your Computer.
Firewall: A firewall is a software program or piece of
hardware that protects the resources of one
network from users from other networks or
the outside world.
To enable the Windows XP firewall:
Click Start
Control Panel
Security Center
Firewall
Final Tips for Parents…
Beware of “phishing” tactics.
Phishing: the act of tricking someone into giving up
confidential information or tricking them into doing
something that they normally wouldn’t do or
shouldn’t do.
For example: sending an e-mail to a user falsely claiming to
be an established legitimate enterprise in an attempt
to scam the user into surrendering private
information that will be used for identity theft.
Final Tips for Parents…
Beware of “phishing” tactics.
NEVER
click on a link inside an email asking you
to login or provide any personal information!
Legitimate companies don’t ask
for this information via email.
Final Tips for Parents…
Final Tips for Parents…
Beware of “phishing” tactics.
Targets include:
ebay
Paypal
Chase
Citibank
Bank of America
Amazon.com
Final Tips for Parents…
Watch what you download!
Only download files from trusted sources.
Beware of files with extensions such as:
.bat
.js
.chm
.msi
.com
.reg
.exe
.scr
.inf
.vbs
Final Tips for Parents…
Keep credit card information “offline”
 Many web sites that you make purchases with
online will ask you to “save” your credit card
information with them to expedite future purchases.
Final Tips for Parents…
Consider installing an Internet Filter
Final Tips for Parents…
Do your research!
www.isafe.org
www.staysafe.org
www.netsmartz.org
www.safeteens.com
www.cyberangels.org
www.fbi.gov/publications/pguide/pguidee.htm
www.microsoft.com/athome/security/children/
Final Tips for Parents…
Enjoy the opportunity to learn and
explore online with your children!
Special Thanks!
www.isafe.org
5963 La Place Ct, Suite 309
Carlsbad, CA 92008