internet crime prevention - education service center …...prevention • protect your child’s...

91
Internet Crime Prevention

Upload: others

Post on 12-May-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Internet Crime

Prevention

1.  Your  bookmarks  take  15  minutes  to  scroll  from  top  to  bo6om.  2.  You  realize  there  is  not  a  sound  in  the  house  and  you  have  no  idea  where  

your  children  are.  3.  You  check  your  mail.  It  says  "no  new  messages."  So  you  check  it  again.    4.   You  find  yourself  brainstorming  for  new  subjects  to  search.  5.   You  say  "LOL"  instead  of  laughing  at  a  funny  joke.  6.  You  refuse  to  go  to  a  vacaIon  spot  with  no  electricity  and  no  Wifi  Access.  7.  You  find  yourself  typing  "com"  aMer  every  period  when  using  a  word  

processor.com.    8.  Your  dog  has  its  own  webpage  9.  You  wake  up  at  3  a.m.  to  go  to  the  bathroom  and  stop  and  check  your  e-­‐

mail  on  the  way  back  to  bed.    10.  All  of  your  friends  have  an  @  in  their  names.  

Your Addicted to the Internet When ….  

Inte

rnet

Addic

tion

Withdrawal Symptoms Angry,  nervous,  fidgety,  unable  to  focus,  depression,  anxiety,  tremors,  lack  of  sleep,  sweats  and  headaches;  symptoms  most  commonly  associated  with  substance  abuse.      

Losing  Track  of  Ime  online   Having  trouble  compleIng  tasks  

Feeling  guilty  or  defensive  about  your  Internet  use  

Symptoms

IsolaIon  from  family  and  friends.  

Everything you do on the

internet leaves an imprint.

Digital Footprint

Photographs!

Comments!

Videos!

Mys

pace

!

Yout

ube!

Twitter!Signup!

Podcast!

Flicker!Groupon  

Facebook!Foursquare  

Tweet!

Blogster  

Blogs!

Music!Last.fm!

Pandora  

Digital

Foot

prin

ts

Video  Clip  

Digital

Foot

prin

ts

•  By  age  2,  81%  of  toddlers  have  some  kind  of  digital  footprint.  

•  One-­‐third  of  children  (33%)  have  images  posted  online  from  birth.  

•  Nearly  a  quarter  of  children  (23%)  have  their  prebirth  scans  posted  on  the  Internet.    

•  Seven  percent  of  wee  ones  have  email  addresses  created  for  them  by  their  parents.  

•  36%  of  adult  internet  users  and  47%  of  teens  report  uploading  photos  where  others  can  see  them  online.    

•  77%  of  online  teens  say  that  their  profile  is  currently  visible.    

•  11%  of  adult  internet  users  say  they  have  searched  online  for  informaIon  about  someone  they  are  thinking  about  hiring  or  working  with.  

•  47%  of  users  have  searched  for  informaIon  about  themselves  online.  

•  60%  of  internet  users  say  they  are  not  worried  about  how  much  informaIon  is  available  about  them  online.    

Information that can be found long

after being removed from the

original website

Digital Permanence

Video  Clip  

Digital Permanence

•  Cut and Paste Mentality •  Content moves around •  Content can be used in unintended ways •  Content gets changed without our permission

Digital Permanence

•  Cut and Paste Mentality •  Content moves around •  Content can be used in unintended ways •  Content gets changed without our permission

•  The Wayback Machine - •  http://www.archive.org/web/web.php

Information on the internet does not go away and it is recreated.

•  Cyberbullying

Predatory Activity

"Cyberbullying" is when you, are tormented, threatened,

harassed, humiliated, embarrassed or otherwise

targeted by another student, using the Internet,

and digital technologies.

Video  Clip  

4 Types of Cyberbullies •  The Vengeful Angel

•  Seldom see their selves as the bully •  See themselves as righting a wrong

•  Revenge of the Nerds •  Much like the playground bully •  They need an audience

•  The “Mean Girls” •  Not done alone – at least planned in a group •  Done for entertainment

•  “Inadvertent Cyberbully” •  Pretend to be tough online •  Respond without thinking

Cyberbullying •  Direct Attacks •  Instant Messaging/Text Messaging Harassment •  Sending Pictures through E-mail and Cell Phones •  Sending Porn and Other Junk E-Mail and IMs •  Stealing passwords •  Blogs •  Web Sites •  Internet Polling •  Interactive Gaming •  Sending Malicious Code •  Impersonation

Cyberbullying •  By Proxy

•  When a cyberbully gets someone else to do their dirty work

The most typical way of cyberbullying by proxy attack occurs when the cyberbully gets control of the victim's account and sends out hateful or rude messages to everyone on their buddy list pretending to be the victim.

Video  Clip  

Cyberbullying Helpful Hints •  Never respond or retaliate •  Do not delete the messages or pictures

as they can be used as evidence •  Don’t feel shame. Discuss bullying with

someone you trust. •  Block the e-mail addresses and cell

phone numbers of people who are sending unwanted messages.

If you are not willing to say it to someone’s face do not say it online or in a text message.

Predatory Activity •  Cyberbullying •  Cyber-Bashing

"Cyber-Bashing" is when physical harm is inflicted on a student, captured on camera then uploaded to a

video hosting website.

•  Tell someone you trust about the bullying and the video.

•  Download the video so it can be used as evidence.

•  Go to the police with the evidence.

•  Have the video removed from the video sharing site.

Cyber-Bashing Helpful Hints

Predatory Activity •  Cyberbullying •  Cyber-Bashing •  Sexual Predators

•  Social Media Sites •  Facebook •  MySpace

•  Twitter •  Blogs

Video  Clip  

Predator Techniques

•  Affirm your feelings and choices. •  Flatter and compliment you excessively, sends gifts,

invests time and money. •  Drives a wedge between you and your parents and

friends •  Develops an online relationship that is romantic,

controlling, and upon which you become dependent •  Preys on your desire for romance, adventure, and sexual

information •  Exploits your natural sexual curiosities

The ultimate goal of the “groomer” is to arrange an in-person meeting to engage in sexual relations with you!

Grooming

Predator Techniques

Any specific personal or location information that lets a predator know about you.

Fishing

•  “I played in Friday night’s football game and we won 14 to 21.” •  “I live on a ranch in a small west Texas town.” •  “We have a new stadium with artificial turf. ” •  “Our school colors are black and white.”

Keep Personal information Private

Predator Techniques Mirroring

The skill of playing back emotionally what they see in you.

Most Follow the Same Process

 •  Meet in a CHAT ROOM, Social Networking site, Game site •  Ask to talk in a PRIVATE ROOM, BUDDY LIST, IM, or text

messaging. •  Talk nightly, conversation goes from general to personal •  Become mentor/counselor/confidant/friend •  E-MAIL is exchanged •  Photos are exchanged •  Letters and gifts are sent •  Plans are made to meet with the Predator (sometimes they

help with money or travel plans) •  They meet •  Predator does what they will with the victim

Video  Clip  

Predatory Activity •  Cyberbullying •  Cyber-Bashing •  Sexual Predators

•  Social Media Sites •  Facebook •  MySpace

•  Twitter •  Blogs

•  Identity Theft Predators

Internet Theft •  Phishing

Phishing Is an adversary tricking a

victim into doing something.

Lures come in the form of a spam e-mail or pop-up

warning – usually sent to multiple recipients

Phishing Example

Phishi

ng E

xam

ple

Tips to Avoid Phishing Legitimate companies will not use email to ask for account information, passwords, verification of security questions or other sensitive information.

Beware of all numbers before the site names. ie. http://1248395.www. legitimatecompany.com

Watch out for emails claiming to alert investors to a breach of security and asking you to submit personal information

Beware of keywords like “verify,” “account process” or “update” in the site name.

ie. http:// accountverify.net/legitimatecompany. com

Tips to Avoid Phishing Even if the email you receive has a “.com address” of a company you do business with, if it seems suspicious, you should call the company directly.

Beware of an unfamiliar or misspelled company name. ie. http://www.mybrokker.com

When in doubt about only suspicious unsolicited e-mails, just hit the delete key

Internet Theft •  Phishing •  Pharming

Pharming

A cyber criminal cracks a vulnerability in ISP’s DNS

server and hijacks the domain name of a commercial site.

   

Tips to Avoid Pharming Check the IP address window on your computer as you are being directed to a website.  If it looks unfamiliar, or contains a long URL string ending in a foreign country code, don't go to the site.

Don't give out personal information, such as account numbers, online unless you know who you are dealing with and you are in a secure site area (indicated by https:// ).

Check your credit card and bank statements carefully each month for unfamiliar or unexpected transactions.

Internet Theft •  Phishing •  Pharming

•  Spam & Spyware

Video  Clip  

Spam and Spyware  

Spam is unsolicited or junk email that clogs up your email inbox.

Spam Mail Purpose •  Reduces the effectiveness of

legitimate advertising •  Raises costs for everyone who

uses the Internet •  Exposes children to

inappropriate material •  Consumes Internet resources •  Wastes people's time

Avoiding SPAM Mail •  Only supply your email address to a company if it is

absolutely necessary. •  Do not enter contests. •  Use multiple email accounts to protect yourself. •  Do not unsubscribe from spam. •  Look for opt-out policies when you purchase

something or agree to a service. •  Privacy policy statements should accompany any

service or product purchased. •  Don’t give out other people’s email addresses. •  Don’t forward chain letters. •  Spammers can obtain address by patrolling forums,

white pages sites, chat rooms, and bulletin boards.

Spam and Spyware    

Spyware is software which gathers information about you and transmits

it to an unauthorized third party.

Spyware Types •  Adware -designed to display advertising banners through

pop-up windows or toolbars. •  Backdoor Santas – used to collect information about surfing

or shopping habits. •  Trojan Horses – the programs are bundled with other

applications and installed secretly. •  Malware – used to disrupt a computer, often rendering the

system unusable.  

Avoiding Spyware •  Promptly install all Windows updates.

•  Keep a firewall running at all times.

•  Do not open attachments or click links in emails from strangers.

•  Only download software from a trusted source.

•  Avoid using file-sharing programs.

•  Don’t click pop-up ads.

•  Surf with other browsers.

Internet Theft •  Phishing   •  Pharming  •  Spam  &  Spyware   •  Child  IdenIty  

Child Identity Theft •  A Growing Problem

•  10 percent of all ID theft victims in the United States are children •  Of 4,311 cases

•  303 were children under 5 •  826 were children 6 to 10 •  1,212 were children 11 to 14 •  1,849 were children 15 to 18

•  76% of the cases involved malicious fraud

 Child ID has been used to purchase homes, automobiles, open credit card accounts, secure employment and obtain driver licenses.

 

Video  Clip  

Warning Signs •  Pre-approved credit card offers arrive

in the mail in the name of a child •  Bank statements, checks or bills are

sent in the name of a child  •  Social Security Administration account

statement in child’s name •  Debt collectors call or send letters

about accounts not opened by the child.

•  New account is denied because of a bad check record

 

Prevention •  Protect your child’s privacy

•  Check out sites your kids visit •  Take a look at the privacy policy •  Be selective with your permission •  Teach them

•  Protect your child's Social Security number.

•  Check credit report on children once a year. •  www.equifax.com    •  www.transunion.com  •  www.experian.com  

•  Additional Tips •  Know what site your kids go to •  Know how your kids get online

 

Internet Theft •  Phishing   •  Pharming  •  Spam  &  Spyware   •  Child  IdenIty  

•  Social  Media    

Social Media Site Safety

•  Use the Privacy Settings

Social Media Site Safety

•  Use the Privacy Settings •  Language used online •  Photos

Social Media Site Safety

•  Use the Privacy Settings •  Language used online •  Photos •  Choose friends wisely •  Strangers •  Limit personal information •  Read privacy policies •  Public resource •  Future Thinking

Predatory Activity •  Cyberbullying •  Cyber-Bashing •  Sexual Predators

•  Social Media Sites •  Facebook •  MySpace

•  Twitter •  Blogs

•  Identity Theft Predators •  Cellphone Predators

Cellphone Safety •  Cellphones are Personal

•  Never loan your phone to anyone •  Lock your phone when not in use •  Treat your cellphone like your password

•  Text Messaging •  Never respond to text messages from

someone you don’t know •  Remember when you send a text message you

are also sending •  Phone Number •  Time the message was sent •  Date the message was sent

•  Talk to the cellphone provider about blocking text messages that are a problem.

•  Taking Pictures •  All pictures are geotagged

Cellphone Safety •  Cellphones are Personal

•  Never loan you phone to anyone •  Lock your phone when not in use •  Treat your cellphone like your password

•  Text Messaging •  Never respond to text messages from

someone you don’t know •  Remember when you send a text message you

are also sending •  Phone Number •  Time the message was sent •  Date the message was sent

•  Talk to the cellphone provider about blocking text messages that are a problem.

•  Taking Pictures •  All pictures are geotagged •  Turn off geotagging on your phone •  Website Examples

Predatory Activity •  Cyberbullying •  Cyber-Bashing •  Sexual Predators

•  Social Media Sites •  Facebook •  MySpace

•  Twitter •  Blogs

•  Identity Theft Predators •  Cellphone Predators •  Sexting

Sexting The sending, receiving,

or forwarding of sexually suggestive nude or nearly nude photos or sexually

suggestive messages through text message

or email.  

Video  Clip  

Sexting Acronyms Banana  = Penis CD9 or Code 9  = Parents are around

FOL  = Fond of Leather IMEZRU  = I Am Easy, Are You? GNOC  = Get Naked On Cam IWSN  = I Want Sex Now GYPO  = Get Your Pants Off Kitty  = Vagina

LMIRL  = Let's Meet In Real Life PAL  = Parents Are Listening WYCM  = Will You Call Me? PAW  = Parents Are Watching MOS  = Mom Over Shoulder PIR  = Parent In Room

P911  = Parent Alert RU/18  = Are You Over 18? RUH  = Are You Horny? TDTM  =Talk Dirty To Me

KFY or K4Y  = Kiss For You KPC  = Keeping Parents Clueless

What to Look For •  Sudden reluctance to socialize

with friends •  Disinterest or avoidance of

school •  Dropping out of sports or other

recreational activities •  Extreme sleeping behavior

(either more or less) •  Abnormal nail biting or hair

pulling •  Abnormal changes in mood and/

or behavior

Consequences •  Person could be charged with producing or distributing

child pornography. •  If they keep them on the phone or computer they could

be charged with possession. •  Emotional damage that comes from having intimate

photos of themselves sent to others. •  Depression •  Shame •  Suicide

•  Reputation damage that comes from having intimate photo of themselves sent to others. •  Targets for bullies •  Rumors and harassment •  Social Isolation

Video  Clip  

Protecting •  Talk through the consequences of ‘sexting’, both posing

for images and storing or sending them •  Ensure your child understands that once an image is sent,

it can't be retrieved. Not only will it be available for others to see now, but also in years to come.

•  Encourage open discussion with your child about who they're talking to online and what sites they visit.

•  Make an effort to become familiar with and understand the new technology your child is using.

•  Encourage your child to talk to an adult about any problems or concerns they may have. Reassure them that this won't necessarily mean they'll be made to stop using the technology involved.

Internet Safety Rules •  E-­‐mail  Safety  

E-Mail Safety Techniques  

•  Five  E-­‐Mail  Accounts  •  Personal  E-­‐mail  Account  •  Business  E-­‐mail  Account  (Banking,  Insurance,  and  etc.)  •  Junk  E-­‐mail  Account  •  Work  E-­‐mail  Account  •  Friend  E-­‐mail  Account  

•  Create  a  strong  password  •  When  in  doubt  use  disposable  email  

account  •  h6p://10minutemail.com  •  h6p://mailinator.com  

Internet Safety Rules •  E-­‐mail  Safety  •  Passwords  

Password Safety •  Create a strong password

•  Make it lengthy •  Combine letters, numbers, and symbols

•  Password strategies to avoid •  Avoid sequences or repeating characters. (ie. 123456789) •  Do not use a password based on personal information •  Avoid dictionary words in any language •  Use more than one password •  Avoid storing you passwords online

•  Creating Memorable Passwords •  Start with a four letter base password

•  asdf •  Throw in a two digital number

•  73 •  The last 3 letter are the website of place name

•  Amazon – amz •  Password would be – asdf73amz

Internet Safety Rules •  E-­‐mail  Safety  •  Passwords  •  Personal  Internet  Safety  

Personal Internet Safety

•  Look for opt-out policy on websites

•  Google yourself and your children on a regular basis to see what information is out there.

•  Never post phone number on any website  

•  Update Your Computer's Security Features •  Virus Scanner •  Firewall •  Keep System Updated

•  Knowledge is power

•  Change your online habits •  Avoid unsecured WiFi •  Access secure website at home •  Don’t save credit info on shopping sites •  Install as little software as possible

Internet Safety Review •  Keep your personal information private

•  Full Name •  Address (even the city you live in) •  Phone number (even cell phones) •  Name of school •  Friends’ names •  Age •  Photos •  Credit Card number or information.

•  Never meet face-to-face with someone you meet online •  People are not always who they say they are •  1 in 8 females on the internet are really males

•  Never respond to messages that are mean, inappropriate, or make you feel uncomfortable •  If someone is angry, hostile, rude, or makes you feel

uncomfortable, don’t respond and report it

Internet Safety Review •  Information on the internet does

not go away and it is recreated. •  Do not delete any information that

can be used later as evidence. •  Do not be afraid to ask for help

from someone that you trust. •  If you are not willing to say it to

someone’s face do not say it online or in a text message

•  Be mindful of what you put on the internet because it will have lasting effects on your reputation.