internet crime prevention - education service center …...prevention • protect your child’s...
TRANSCRIPT
1. Your bookmarks take 15 minutes to scroll from top to bo6om. 2. You realize there is not a sound in the house and you have no idea where
your children are. 3. You check your mail. It says "no new messages." So you check it again. 4. You find yourself brainstorming for new subjects to search. 5. You say "LOL" instead of laughing at a funny joke. 6. You refuse to go to a vacaIon spot with no electricity and no Wifi Access. 7. You find yourself typing "com" aMer every period when using a word
processor.com. 8. Your dog has its own webpage 9. You wake up at 3 a.m. to go to the bathroom and stop and check your e-‐
mail on the way back to bed. 10. All of your friends have an @ in their names.
Your Addicted to the Internet When ….
Inte
rnet
Addic
tion
Withdrawal Symptoms Angry, nervous, fidgety, unable to focus, depression, anxiety, tremors, lack of sleep, sweats and headaches; symptoms most commonly associated with substance abuse.
Losing Track of Ime online Having trouble compleIng tasks
Feeling guilty or defensive about your Internet use
Symptoms
IsolaIon from family and friends.
Photographs!
Comments!
Videos!
Mys
pace
!
Yout
ube!
Twitter!Signup!
Podcast!
Flicker!Groupon
Facebook!Foursquare
Tweet!
Blogster
Blogs!
Music!Last.fm!
Pandora
Digital
Foot
prin
ts
• By age 2, 81% of toddlers have some kind of digital footprint.
• One-‐third of children (33%) have images posted online from birth.
• Nearly a quarter of children (23%) have their prebirth scans posted on the Internet.
• Seven percent of wee ones have email addresses created for them by their parents.
• 36% of adult internet users and 47% of teens report uploading photos where others can see them online.
• 77% of online teens say that their profile is currently visible.
• 11% of adult internet users say they have searched online for informaIon about someone they are thinking about hiring or working with.
• 47% of users have searched for informaIon about themselves online.
• 60% of internet users say they are not worried about how much informaIon is available about them online.
Digital Permanence
• Cut and Paste Mentality • Content moves around • Content can be used in unintended ways • Content gets changed without our permission
Digital Permanence
• Cut and Paste Mentality • Content moves around • Content can be used in unintended ways • Content gets changed without our permission
• The Wayback Machine - • http://www.archive.org/web/web.php
Information on the internet does not go away and it is recreated.
"Cyberbullying" is when you, are tormented, threatened,
harassed, humiliated, embarrassed or otherwise
targeted by another student, using the Internet,
and digital technologies.
4 Types of Cyberbullies • The Vengeful Angel
• Seldom see their selves as the bully • See themselves as righting a wrong
• Revenge of the Nerds • Much like the playground bully • They need an audience
• The “Mean Girls” • Not done alone – at least planned in a group • Done for entertainment
• “Inadvertent Cyberbully” • Pretend to be tough online • Respond without thinking
Cyberbullying • Direct Attacks • Instant Messaging/Text Messaging Harassment • Sending Pictures through E-mail and Cell Phones • Sending Porn and Other Junk E-Mail and IMs • Stealing passwords • Blogs • Web Sites • Internet Polling • Interactive Gaming • Sending Malicious Code • Impersonation
Cyberbullying • By Proxy
• When a cyberbully gets someone else to do their dirty work
The most typical way of cyberbullying by proxy attack occurs when the cyberbully gets control of the victim's account and sends out hateful or rude messages to everyone on their buddy list pretending to be the victim.
Cyberbullying Helpful Hints • Never respond or retaliate • Do not delete the messages or pictures
as they can be used as evidence • Don’t feel shame. Discuss bullying with
someone you trust. • Block the e-mail addresses and cell
phone numbers of people who are sending unwanted messages.
If you are not willing to say it to someone’s face do not say it online or in a text message.
"Cyber-Bashing" is when physical harm is inflicted on a student, captured on camera then uploaded to a
video hosting website.
• Tell someone you trust about the bullying and the video.
• Download the video so it can be used as evidence.
• Go to the police with the evidence.
• Have the video removed from the video sharing site.
Cyber-Bashing Helpful Hints
Predatory Activity • Cyberbullying • Cyber-Bashing • Sexual Predators
• Social Media Sites • Facebook • MySpace
• Twitter • Blogs
Predator Techniques
• Affirm your feelings and choices. • Flatter and compliment you excessively, sends gifts,
invests time and money. • Drives a wedge between you and your parents and
friends • Develops an online relationship that is romantic,
controlling, and upon which you become dependent • Preys on your desire for romance, adventure, and sexual
information • Exploits your natural sexual curiosities
The ultimate goal of the “groomer” is to arrange an in-person meeting to engage in sexual relations with you!
Grooming
Predator Techniques
Any specific personal or location information that lets a predator know about you.
Fishing
• “I played in Friday night’s football game and we won 14 to 21.” • “I live on a ranch in a small west Texas town.” • “We have a new stadium with artificial turf. ” • “Our school colors are black and white.”
Keep Personal information Private
Most Follow the Same Process
• Meet in a CHAT ROOM, Social Networking site, Game site • Ask to talk in a PRIVATE ROOM, BUDDY LIST, IM, or text
messaging. • Talk nightly, conversation goes from general to personal • Become mentor/counselor/confidant/friend • E-MAIL is exchanged • Photos are exchanged • Letters and gifts are sent • Plans are made to meet with the Predator (sometimes they
help with money or travel plans) • They meet • Predator does what they will with the victim
Predatory Activity • Cyberbullying • Cyber-Bashing • Sexual Predators
• Social Media Sites • Facebook • MySpace
• Twitter • Blogs
• Identity Theft Predators
Phishing Is an adversary tricking a
victim into doing something.
Lures come in the form of a spam e-mail or pop-up
warning – usually sent to multiple recipients
Tips to Avoid Phishing Legitimate companies will not use email to ask for account information, passwords, verification of security questions or other sensitive information.
Beware of all numbers before the site names. ie. http://1248395.www. legitimatecompany.com
Watch out for emails claiming to alert investors to a breach of security and asking you to submit personal information
Beware of keywords like “verify,” “account process” or “update” in the site name.
ie. http:// accountverify.net/legitimatecompany. com
Tips to Avoid Phishing Even if the email you receive has a “.com address” of a company you do business with, if it seems suspicious, you should call the company directly.
Beware of an unfamiliar or misspelled company name. ie. http://www.mybrokker.com
When in doubt about only suspicious unsolicited e-mails, just hit the delete key
Pharming
A cyber criminal cracks a vulnerability in ISP’s DNS
server and hijacks the domain name of a commercial site.
Tips to Avoid Pharming Check the IP address window on your computer as you are being directed to a website. If it looks unfamiliar, or contains a long URL string ending in a foreign country code, don't go to the site.
Don't give out personal information, such as account numbers, online unless you know who you are dealing with and you are in a secure site area (indicated by https:// ).
Check your credit card and bank statements carefully each month for unfamiliar or unexpected transactions.
Spam and Spyware
Spam is unsolicited or junk email that clogs up your email inbox.
Spam Mail Purpose • Reduces the effectiveness of
legitimate advertising • Raises costs for everyone who
uses the Internet • Exposes children to
inappropriate material • Consumes Internet resources • Wastes people's time
Avoiding SPAM Mail • Only supply your email address to a company if it is
absolutely necessary. • Do not enter contests. • Use multiple email accounts to protect yourself. • Do not unsubscribe from spam. • Look for opt-out policies when you purchase
something or agree to a service. • Privacy policy statements should accompany any
service or product purchased. • Don’t give out other people’s email addresses. • Don’t forward chain letters. • Spammers can obtain address by patrolling forums,
white pages sites, chat rooms, and bulletin boards.
Spam and Spyware
Spyware is software which gathers information about you and transmits
it to an unauthorized third party.
Spyware Types • Adware -designed to display advertising banners through
pop-up windows or toolbars. • Backdoor Santas – used to collect information about surfing
or shopping habits. • Trojan Horses – the programs are bundled with other
applications and installed secretly. • Malware – used to disrupt a computer, often rendering the
system unusable.
Avoiding Spyware • Promptly install all Windows updates.
• Keep a firewall running at all times.
• Do not open attachments or click links in emails from strangers.
• Only download software from a trusted source.
• Avoid using file-sharing programs.
• Don’t click pop-up ads.
• Surf with other browsers.
Child Identity Theft • A Growing Problem
• 10 percent of all ID theft victims in the United States are children • Of 4,311 cases
• 303 were children under 5 • 826 were children 6 to 10 • 1,212 were children 11 to 14 • 1,849 were children 15 to 18
• 76% of the cases involved malicious fraud
Child ID has been used to purchase homes, automobiles, open credit card accounts, secure employment and obtain driver licenses.
Warning Signs • Pre-approved credit card offers arrive
in the mail in the name of a child • Bank statements, checks or bills are
sent in the name of a child • Social Security Administration account
statement in child’s name • Debt collectors call or send letters
about accounts not opened by the child.
• New account is denied because of a bad check record
Prevention • Protect your child’s privacy
• Check out sites your kids visit • Take a look at the privacy policy • Be selective with your permission • Teach them
• Protect your child's Social Security number.
• Check credit report on children once a year. • www.equifax.com • www.transunion.com • www.experian.com
• Additional Tips • Know what site your kids go to • Know how your kids get online
Social Media Site Safety
• Use the Privacy Settings • Language used online • Photos • Choose friends wisely • Strangers • Limit personal information • Read privacy policies • Public resource • Future Thinking
Predatory Activity • Cyberbullying • Cyber-Bashing • Sexual Predators
• Social Media Sites • Facebook • MySpace
• Twitter • Blogs
• Identity Theft Predators • Cellphone Predators
Cellphone Safety • Cellphones are Personal
• Never loan your phone to anyone • Lock your phone when not in use • Treat your cellphone like your password
• Text Messaging • Never respond to text messages from
someone you don’t know • Remember when you send a text message you
are also sending • Phone Number • Time the message was sent • Date the message was sent
• Talk to the cellphone provider about blocking text messages that are a problem.
• Taking Pictures • All pictures are geotagged
Cellphone Safety • Cellphones are Personal
• Never loan you phone to anyone • Lock your phone when not in use • Treat your cellphone like your password
• Text Messaging • Never respond to text messages from
someone you don’t know • Remember when you send a text message you
are also sending • Phone Number • Time the message was sent • Date the message was sent
• Talk to the cellphone provider about blocking text messages that are a problem.
• Taking Pictures • All pictures are geotagged • Turn off geotagging on your phone • Website Examples
Predatory Activity • Cyberbullying • Cyber-Bashing • Sexual Predators
• Social Media Sites • Facebook • MySpace
• Twitter • Blogs
• Identity Theft Predators • Cellphone Predators • Sexting
Sexting The sending, receiving,
or forwarding of sexually suggestive nude or nearly nude photos or sexually
suggestive messages through text message
or email.
Sexting Acronyms Banana = Penis CD9 or Code 9 = Parents are around
FOL = Fond of Leather IMEZRU = I Am Easy, Are You? GNOC = Get Naked On Cam IWSN = I Want Sex Now GYPO = Get Your Pants Off Kitty = Vagina
LMIRL = Let's Meet In Real Life PAL = Parents Are Listening WYCM = Will You Call Me? PAW = Parents Are Watching MOS = Mom Over Shoulder PIR = Parent In Room
P911 = Parent Alert RU/18 = Are You Over 18? RUH = Are You Horny? TDTM =Talk Dirty To Me
KFY or K4Y = Kiss For You KPC = Keeping Parents Clueless
What to Look For • Sudden reluctance to socialize
with friends • Disinterest or avoidance of
school • Dropping out of sports or other
recreational activities • Extreme sleeping behavior
(either more or less) • Abnormal nail biting or hair
pulling • Abnormal changes in mood and/
or behavior
Consequences • Person could be charged with producing or distributing
child pornography. • If they keep them on the phone or computer they could
be charged with possession. • Emotional damage that comes from having intimate
photos of themselves sent to others. • Depression • Shame • Suicide
• Reputation damage that comes from having intimate photo of themselves sent to others. • Targets for bullies • Rumors and harassment • Social Isolation
Protecting • Talk through the consequences of ‘sexting’, both posing
for images and storing or sending them • Ensure your child understands that once an image is sent,
it can't be retrieved. Not only will it be available for others to see now, but also in years to come.
• Encourage open discussion with your child about who they're talking to online and what sites they visit.
• Make an effort to become familiar with and understand the new technology your child is using.
• Encourage your child to talk to an adult about any problems or concerns they may have. Reassure them that this won't necessarily mean they'll be made to stop using the technology involved.
E-Mail Safety Techniques
• Five E-‐Mail Accounts • Personal E-‐mail Account • Business E-‐mail Account (Banking, Insurance, and etc.) • Junk E-‐mail Account • Work E-‐mail Account • Friend E-‐mail Account
• Create a strong password • When in doubt use disposable email
account • h6p://10minutemail.com • h6p://mailinator.com
Password Safety • Create a strong password
• Make it lengthy • Combine letters, numbers, and symbols
• Password strategies to avoid • Avoid sequences or repeating characters. (ie. 123456789) • Do not use a password based on personal information • Avoid dictionary words in any language • Use more than one password • Avoid storing you passwords online
• Creating Memorable Passwords • Start with a four letter base password
• asdf • Throw in a two digital number
• 73 • The last 3 letter are the website of place name
• Amazon – amz • Password would be – asdf73amz
Personal Internet Safety
• Look for opt-out policy on websites
• Google yourself and your children on a regular basis to see what information is out there.
• Never post phone number on any website
• Update Your Computer's Security Features • Virus Scanner • Firewall • Keep System Updated
• Knowledge is power
• Change your online habits • Avoid unsecured WiFi • Access secure website at home • Don’t save credit info on shopping sites • Install as little software as possible
Internet Safety Review • Keep your personal information private
• Full Name • Address (even the city you live in) • Phone number (even cell phones) • Name of school • Friends’ names • Age • Photos • Credit Card number or information.
• Never meet face-to-face with someone you meet online • People are not always who they say they are • 1 in 8 females on the internet are really males
• Never respond to messages that are mean, inappropriate, or make you feel uncomfortable • If someone is angry, hostile, rude, or makes you feel
uncomfortable, don’t respond and report it
Internet Safety Review • Information on the internet does
not go away and it is recreated. • Do not delete any information that
can be used later as evidence. • Do not be afraid to ask for help
from someone that you trust. • If you are not willing to say it to
someone’s face do not say it online or in a text message
• Be mindful of what you put on the internet because it will have lasting effects on your reputation.