Internet Safety - Educational Opportunity Centers, Inc.

Download Report

Transcript Internet Safety - Educational Opportunity Centers, Inc.

Internet
Safety
An Oxymoron?
What do these mean?
ROTFL
OMG
BTW
B/F or G/F
G2G
H8
JK or :-) or 
KOTL or X
STR8
MorF
SUP? NMGOH
MoS or POS or POL or 1
PRW
PCM
WAN2TLK
SSINF
TPM
WAYF or WUF?
ASL or A/S/L
YBS
WMIRL
WWW
How About These?
:-(
(((H)))
:-X
‘:-)
(:-D
:*)
:-!
:-----)
:^)
:-<
>-)
@>--;--
Are you familiar with these?
• Candy Cigs & Dr Ads to No Smoking
& Cigarettes warning labels
• Cyanide laced Tylenol–Safety seals
• Litterbug Campaigns
– Give a hoot! Don’t pollute!
Hootie the Owl
– Crying Native American commercial
– Pitch it in!
• Fire – Bad!
– Only you can prevent forest fires.
Smokey the Bear
The Shift
• Children play in the toy section of the supermarket &
parents collect the children before leaving the store.
OR Leave them at home and shop quickly.
• Parents & children shop in separate stores at mall.
• Parents put children on a leash while shopping.
• Parents give children cell phone, to know what their
children are doing at all times AND a computer to help
with school work.
Online Threats
What do parents do?
•
•
•
•
Parent Control software
Have computer in a ‘public’ area
Figure children know what they’re doing
Huh? They have no clue what is going on.
– “I don’t understand technology.”
Oh please, I know what to do
• Teens have the perfect combination of
OVERCONFIDENCE & INEXPERIENCE
to get in trouble easily
• Teens may be ‘tech’ savvy but are not
usually ‘relationship’ savvy.
Numbers-They are Against You!
• 1996-2003, the FBI reported a 2050% increase
in online predator cases opened (from 113 to 2430).
2003-2007 showed a 2026% increase over that!
• 1 in 5 students have been ‘approached’ in a chatroom
• Over 50,000 pedophiles online at any given time.
• The average teen spends
– 13 hours/week watching TV
– 16 hours/week ONLINE
Let your fingers do the walking
Instant Messenger, Chat rooms,
& social networking sites like MySpace,
Facebook, Friendster, Xanga, online dating or
matchmaking sites, etc. are the
White/Yellow Pages for online predators
Advice sites
They also love those sites like iVillage,
magazine sites, and other sites males
and females frequent to gab about
themselves, their problems,
relationships, how to dress,…
how easy it is to befriend someone in
these environments!
Resume sites
Even job searching sites like
Monster.com can be a shopping place
for online predators looking for the
older end of the youth.
Yes, Kids LIE on the net
except in their profiles because their friends read them
Predators know this so they compensate by:
-subtracting 3 years to any age you give
(ex. actually 13 is online 16)
-finding out where you really are by your IP
address – just agree to receive or send a
file, talk person to person, chat over a
connected phone/microphone
-searching your screen name
-using their groups to share your info
Safe & Anonymous online is anything but
• On social networking sites, the URL listing
contains their name or screen name they
used when registering.
• This name can be searched and usually
leads to other sites where information is
not blocked.
• Even when a search leads to a blocked
site, the cached information to be found
there is NOT blocked.
Print this slide to Discuss
• Nowhereville – I’m from such&such private school – I can show you around
the city – get out of Hicksville one day & we’ll have fun
• Phone # = map of house
• Pedophiles will take the time – search and search and wait – only surf for
kids – diff btwn 15 & 18 – don’t want 18
• Danville Med Ctr – higher #s of peds – not ‘treated’ – just released
• Search DramaChic – no AIM profile but has a MySpace account – there’s all
the info I need
• ‘Talk’ to someone for 2 seconds – Hey U, Hi, put # string into search & trace
connection, MS-DOS Net Stat put in dynamic address, locate her, find
schools in area – Google Earth – know area
• Make up summer camp story – hey I know a friend of yours from camp –
want to see a pic of her drooling in sleep? Get IP address – got’em (not
same person –oops G2G
• 30,000 kids cut class each day – on the chats
Pedophile symbols often in jewelry
Boy Love - Prefers boys
Child Love - Both
Girl Love – Prefers girls
All encompassing pedophilia
Searching for the next victim
• Your screen name is so cool that you use
it everywhere for everything – BAD MOVE!
• You can’t change your screen name –
everyone knows it by heart!
• You don’t check the advanced settings –
the program has the protective defaults set
• Your friends have you listed in their info…
so a trail leads right to you - BFF
Don’t talk to strangers!
Would you let a 40 year old man
into your bedroom at 2am?
You know, just to chat?
You may think you are hidden.
Just because
you can’t see them,
doesn’t mean
that they can’t see you.
They WILL do the work…
But you can just be
naïve and give them
everything they need.
But I didn’t tell them anything!
• Profile address fake – Boring Street, Nowhere,
PA, 18201← + REAL STATE & ZIP
• CougarGal77 screen name
• Nothing to do here in this backwards town
• Saw ‘latest movie name’ with friends
• G2G2 practice-game against teachers Thurs
Back
Back
The Predator has all of your
information now…time to meet
Protecting AIM
Some steps to take to help protect AIM
PART 1
OLDER
VERSION OF
AIM
Got to the Edit
Preferences Area
Select an item on the
LEFT and look at the settings
for the item
Go to the Profile setup
Make sure this box
is unchecked – click
on next
Make sure this box
is unchecked – click
on next
This area should not contain
any personal information – nor
information about “friends”
PART 2
AIM’S NEWER
VERSION (6.0)
Gee-looks like MySpace
Click on Edit
Click on Settings
Select an item on the
LEFT and look at the settings
for the item
Monitor all Messages by clicking on IM Logging
Click on
My Buddy Info
This area should not contain
any personal information – nor
information about “friends”
Click on
My AIM page
This page should not contain
any personal information – nor
information about “friends”
MySpace
Notice Me!
From this screen
Click on Help
Scroll down
this screen
Click on
How do I remove
my child’s profile
from MySpace.com
--Follow the directions--
Gone but not forgotten
You can remove or block things from
your site
BUT whatever was already cached
can still be brought up.
So the lesson - NEVER post things
you might regret in the first place.
This also includes what you
post about others too
You can get in serious and legal
trouble for posting bad things
about other people.
CYBERBULLYING
SAD
ANGRY
DEPRESSED
HATED
UPSET
VIOLATED
ANNOYED
HELPLESS
STUPID
EXPLOITED
PUT-DOWN
CYBERBULLYING
WILLFUL AND
REPEATED HARM
INFLICTED THROUGH
ELECTRONIC TEXT
A Cyberbully is often an adolescent
who posts inappropriate or rude
things about a specific person or
otherwise harasses that person on
the Internet, in e-mails, through
IM's, or though other digital formats
such as text messages on a
cell phone.
53 percent admit saying mean or
hurtful things to someone online.
42 percent have been bullied online.
35 percent have been threatened
online.
20 percent have received mean or
threatening e-mails
58 percent have not told their
parents or another adult about
someone being mean or hurtful to
them online.
More statistics
• 90% of middle school students have had their
feelings hurt online.
• 75% have visited a Web site bashing another
student.
• 40% have had their password(s) stolen and
changed by a bully
(who then locked them out of their own account or sent
communications posing as them).
• Only 15% of parents polled knew what
cyberbullying was.
Cyberbullying is a violation of the
"terms of use" of most service
providers.
File a complaint by providing the
harmful messages and ask that the
account be terminated and any
harmful material be removed.
IT IS A CRIME!
HARASSMENT
Post something in public
3rd Degree Misdemeanor – 1 year in jail $2,500 fine
STALKING
Several communications are sent directly to victim
1st Degree Misdemeanor – 5 Years in jail $10,000 fine
Other Consequences
• Get dropped from your ISP
• Trouble getting accepted into college
• Trouble getting a good job
Do not keep this to yourself!
Inform your parents or teacher
Inform your local police
Inform your Internet Service Provider (ISP)
or cell phone/pager service provider
Don't reply to messages from cyberbullies
Allow only messages from those on the buddy list
Do not erase or delete messages from cyberbullies –
You don't have to read it, but keep it, it is your evidence.
Today video
If you are the victim of a
cyberbully who has set up a
Web site that is defaming, or
mocking you, contact the
Internet Service Provider and
inform them about what is
happening, also inform the
police.
INFORMATION THAT CAN BE GATHERED
FROM A SIMPLE EMAIL OF “I HATE YOU”
Return-Path: <[email protected]>
Received: from [218.242.20.53] by ns1.netizenship.org
(NTMail 5.06.0016/LC0008.00.11c4cb1f) with
ESMTP id eahnhaaa for [email protected]; Tue, 13 Mar 2007 10:58:30 0700
Received: from oc.xqna.org [158.148.129.96] by 207.228.118.41
id IGj585W6h0WK for <[email protected]>;
Tue, 13 Mar 2007 23:58:15 +0600
Message-ID: <[email protected]>
From: "" <[email protected]>
To: <[email protected]>
Subject:: I Hate You!
Date: Tue, 13 Mar 07 23:58:15 GMT
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.2616
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary="CB8ECC1D.E.F3ED22__.91"
If you are receiving harassing
messages from cyber bullies through
Web-based mail services like Hotmail,
Yahoo Mail etc., it becomes very
difficult to trace such accounts
as [email protected].
You may have to delete your current
e-mail account and start a new one.
Tell only a select few people you trust
about your new e-mail account when,
and if you choose to re-establish one.
SILENCE,
when others
are being hurt,
is not acceptable!
Don’t Feed the Bully
• Stay calm
– Don’t show fear
• Assess the likelihood of violence
– Get away & report physical actions
– Until something actually happens authority figures
have no evidence & a bully’s parents loudly protest
that their child did anything bad
• Have a thick skin & sense of humor
– If you don’t react, they get bored and move on
• Collect evidence
– Record altercations, print offensive material, get time,
place, who said what, and who was involved.
Questions
•
•
•
•
How many days/wk R U in a chat room?
How long do U spend in a room each time?
What type of chat rooms do you visit most often?
Do U use IM?
– If yes: What’s your screen name?
– Do U have a profile?
• If yes, what did U type?
• Did U:
– Allow others to search for U by common interest?
– Allow anyone to send U an IM?
– Fill out the screen for name & address?
• Did anyone ever ask U for your real name, gender,
age, school name, activities, etc.?
RULES
• Stay away from any social networking sites
• DO NOT TALK TO STRANGERS
• NEVER
–
–
–
–
–
–
–
–
–
–
–
Agree to meet anyone met online
Give out any personal information
‘Talk’ to an unknown screen name
Call anyone met online (caller ID)
Give out information to a CALLER
Give your school’s name
Tell your location – state, town, street, etc.
‘Allow People to Search for Me’ in IM
Give out your e-mail address
Put friends’ names in your profile
Talk P2P or send a file to a ‘screen name’ – esp. over fixed IP
Visit these sites
•
•
•
•
•
•
•
•
•
•
•
www.missingkids.com
www.netsmartz.org
www.Idthecreep.com
www.fbi.gov/innocent.htm
tcs.cybertipline.org
www.pameganslaw.state.pa.us
www.wiredsafety.org
www.ISafe.org
www.safekids.com
www.iKeepSafe.org
www.2SMRT4U.com