Transcript Document

Internet Safety
Your name
Agency
Roadmap


Changed times
Facts and figures
–
–
–

What to do
–


Chat rooms
Instant Messaging
Web logs (blogs)
Securing myspace:- recommendations
What to look for
Guidelines

The world was changed forever in the early
90’s with only three letters:
 AOL

Brought internet into homes
Internet: The Benefits

Instant Communications
–

Opportunities for learning
–
–

Immediacy – no waiting for book to be printed
Anything you want to know is on the ‘net
Business
–

Web sites, E-mail, Instant Messaging, Chat
On-line shopping, travel bargains, consumer comparisons
Entertainment
–
Movies, music, games
Internet: The Risks



Viruses
Unsolicited e-mail (“spam”, “phishing”)
Inappropriate material
–


Pornography, pedophiles, propaganda
Loss of privacy
Financial risks
Young People in a Wired World
Globally, in 1995, 2 million children accessed the Internet.
This number climbed to 4 million in 1996.
The number exceeded 28 million in 2000;
By 2002, 45 million children accessed the internet;
By 2005, number surpassed 77 million.
Young People in a Wired World

99% of youth have reported using the Internet

79% of children between the ages of 9 and 17
have Internet access at home
15% of all young Internet users have met in
person at least 1 individual whom they first met
on the Internet - of those only 6% were
accompanied by a parent or other adult

Young People in a Wired World



38% of young people say that their parents know
nothing or very little about their online activities
40% have been asked for personal information
by a stranger
1 in 2 youth have an email account that their
parents don’t know about.
Young People in Chat Rooms

58% of 11-12 year olds go into chat rooms
–

of those 37% visit private and adult-only chat
rooms
70% of 13-14 year olds go into chat rooms
–
of those 66% visit private and adult-only chat
rooms
Young People in an Explicit World

25% of youth have been sent porn on the
Internet by a stranger

1 in 7 children received sexual solicitation within
the last year;
–
–
–
asked to meet them somewhere;
called them on the telephone;
or sent them regular mail, money or gifts.
Young People in an Explicit World


1 in 3 (34%) were exposed to sexually
explicit material;
1 in 11 (9%) was the victim of cyber-bullying
or harrassment;
Meet Robert Carey




NOAA network
administrator
Arrested in 2005 after
warrant issued for his
arrest
30 years worth of child
pornography, 500,000
images alone
Lived behind the new
Bowie Town Center.
Get informed!


The National Sex Offender Registry
www.familywatchdog.us

Screenshot 2
Get informed!



The National Sex Offender Registry
www.familywatchdog.us
CHAT ROOMS
What are chat rooms?




Chat rooms are virtual rooms
Electronic “conversations”
People log into a chat room and see what
others are saying
Anonymous
Does your teenager chat?
“Teenagers are particularly at risk because they are more
likely to participate in on-line discussions regarding
companionship.”
National Center for Missing
And Exploited Children
Chat Room Concerns
“Chat is probably the most dangerous area on the
Internet because you don’t know who is in the chat
room with you.”
National Center for Missing
And Exploited Children
Instant Messaging

IM is a form of Internet communication
that combines the live nature of real time
chat with the personal contact of email.

A safer environment than chat rooms
since contact lists can be better
controlled.
Instant Messaging


If children aren't careful during the sign-up
process, they can reveal more than they
should.
Some IM programs offer users the option of
joining in chat with strangers.
Instant Messaging - Dangers


IM can encourage gossiping and bullying.
Children can receive pornography.
Pornography

Pornography which is legally restricted to adults can easily be
accessed by children online.
– A child who can’t browse through a sexually explicit magazine in
a store can easily view explicit images and video online.
–
Obscene materials which are illegal even for adults can easily be
accessed online.
Chatroom and IM guidelines



Limit time
Ask about screen names
Consider logging conversations
–



Not saved by default
Can block some individuals
Pop-up blocking software
Spyware detection software
Get informed!




The National Sex Offender Registry
www.familywatchdog.us
CHAT ROOMS
Web log sites
Blogs

A blog is basically a journal (log) that is available on
the web.
– updated daily
– Requires little or no technical background
Blogs
–
–
Postings on a blog are almost always arranged in
chronological order with the most recent additions
featured most prominently.
Blogs usually include profiles, text, photographs,
and links between “friends” and interests - and
may include video or audio files.
Blogs
10/2005 – MySpace has 52 million users. That
makes it the fourth most visited site on the
Internet, surpassing eBay, Google and AOL.
Blogging Tips for Teens

Never post your personal information, such
as cell phone number, address, or the name
of your school.
Blogging Tips for Teens


Never give out your password to anyone
other than your parent or guardian.
Only add people as friends to your site if you
know them in real life.
Blogging Tips for Teens


Never meet in person with anyone you first
“met” on a social networking site.
Think twice before posting your photos.
Blogging Tips for Teens


Never respond to harassing or rude
comments posted on your profile.
Check the blog privacy settings:
–
–
Set it so that people can only be added as your
friend if you approve it.
Set it so that people can only view your profile if
you have approved them as a friend.
Securing a Blog Account




MySpace
Xanga
Facebook
Etc etc etc……..
Securing a Blog Account

MySpace:
–
–

More prominent
Recently greatly improved security controls
Goal is a safe secure environment for kids to
communicate
–
Here’s how you do it!
Securing a Blog Account

Step 1: Log into the MySpace account.
Securing a Blog Account

Step 2: Click on Account Settings

Step 3: Check both
boxes
–
–

Do not send Notification
emails
Do not send newsletters
Consider changing
timezone
–
Why tell folks you’re in
EST?
Securing a Blog Account
Securing a Blog Account
Securing a Blog Account

Step 4: Configure IM Privacy Settings
Securing a Blog Account


Step 5: Select Profile settings
Uncheck the first box, check the remaining
three.
–
Reduce the chances of running malicious code
Securing a Blog Account

Step 6: Clean up the profile
Securing a Blog Account



Get creative
Fictitious names and information
No references to schools, activities, or
OTHER FRIENDS!!
Securing a Blog Account


Save all settings
DONE!!
Securing a Blog Account

All too easy for kids to innocently give away
too much information about themselves or
their surroundings
Web browsing

Unintentional
–
–
Even “innocent” website addresses can lead
directly to pornography.
www.teens.com
Web browsing

“Keyword Searches”
–
–
Children using search engines to locate
legitimate information can receive links to
pornographic sites.
“Disneycartoons”
Cyber-bullying

There are several ways that children threaten and/or harass
others online:
– Send e-mails or instant messages containing insults or threats
directly to a person.
– Steal passwords and send out threatening e-mails or instant
messages using an assumed identity.
Cyber-bullying

Spread hurtful comments about a person to others
through e-mail, instant messaging or postings on web
sites and blogs.
Cyber-bullying



Build web sites, often with password protection, to
target people - students or even teachers.
Bullied by text messages sent through their cell
phones.
Built-in digital cameras in cell phones have added a
new dimension to the problem.
Cyber-bullying
•Dave Knight
•Web site making fun of him
with terrible accusations up
for months
•Had to leave school, finish
at home
•8th grade.

No one is “immune,” including teachers!
Dealing with Cyberbullying

Preserve evidence
–
–
–

Emails
Chats
Connection logs
Notify your service provider.
Dealing with Cyberbullying



If able to identify the bully, contact him or her
and/or parents.
Use available blocking technology (i.e., block
the user on IM, email and chat.)
In serious cases, seek assistance from the
police (i.e., threats of physical harm,
unrelenting or unable to stop.)
Safety in the Home
“The best way to assure that your children are
having positive on-line experiences is to
stay in touch with what they are doing.”
National Center for
Missing And
Exploited Children
Advice for Parents






Learn!
Centralize computer
Monitor usage
Install filtering software
Establish ground rules
Protect their identity
Ground Rules



Never give out personal information about
themselves
Inform you immediately if anyone asks them
for personal information
Never meet with someone from chat rooms,
Im or blogging that you don’t know
Ground Rules


Keep ALL accounts in your name.
Know your child’s password(s) and screen
name(s).
Take Action



Contact your legislators and request stronger
laws against Internet crime.
Report all inappropriate non-criminal
behavior to the site through their reporting
procedures.
Report criminal behavior to the appropriate
law-enforcement agency.
Blogs, IM, Chatrooms, Email: What is
reasonable?



Under 8 - Supervised email to only approved
senders.
8-10 – Can add supervised IM or chat to preapproved senders. No blogs!
10-12 - Give them more privacy. Block all but preapproved senders. Still no blogs!
Blogs, IM, Chatrooms, Email: What is
reasonable?


13-15 - Begin to show trust where appropriate.
Check and account for everyone, in real life, on their
buddy lists. No friends of friends!
16 and over - Parental involvement becomes
difficult at best.
Finally: Warning signs



Significantly increases on-line time.
Receives unusual phone calls, email, mail or
packages from someone you don't know.
Quickly exits IM, chat, email, websites and
other activities when you are near.
Finally: Warning signs




Increases use of new slang words,
inappropriate sexual knowledge
Begins using new screen names, an online
account belonging to someone else, etc.
Child or teen withdraws from normal
activities
Is reluctant to discuss activities or your
concerns.
What about my privacy?






2 laws concerning privacy in communications
ECPA
PPA
Provision made for SYS ADMIN to view
activity as part of his duties.
WHO IS YOURS?
“Expect no privacy!”
The “Good” Really Does Outweigh The
“Bad!”
Thanks very much!