protecting your family s soul and safety online n.
Skip this Video
Loading SlideShow in 5 Seconds..
Protecting Your Family’s Soul and Safety Online PowerPoint Presentation
Download Presentation
Protecting Your Family’s Soul and Safety Online

Protecting Your Family’s Soul and Safety Online

312 Views Download Presentation
Download Presentation

Protecting Your Family’s Soul and Safety Online

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Protecting Your Family’s Soul and Safety Online Ernest Staats Technology Director MS Information Assurance, CISSP, MCSE, CNA, CWNA, CCNA, Security+, I-Net+, Network+, Server+, A+ Resources available @

  2. Outline Golden Rules Cyber Predators Factors That Increase Risk Online Cyber Bullying Identity Theft Securing Your Online Connections Social Networking What Is Posted About Your Family Online Common Chat Terms to Know Bypass Internet Filters Resources

  3. Golden Rules for Parents Keep Internet in public space as much as possible Spend “cybertime” with your child Teach Internet rules & consequences—parent your values online Limit time—keep kids busy beyond screens Talk to your child about what they are doing Stay involved

  4. Golden Rules to Teach Rules from “real” life apply: courtesy, kindness, modesty, dignity, respect for the law and for others, etc. Don’t talk to strangers Keep your private information private Never agree to meet an online friend without your parents There are no guarantees that what you say or post on the Internet is private

  5. Golden Rules to Teach Information (including photos, videos, etc.) posted on the Internet can last forever Tell your parents if you encounter something uncomfortable Don’t reply to unknown screen names on IM Never open e-mail from strangers or click on any attachments Find the “good” online – good friends, good Web sites, good games – and enjoy

  6. Cyber Predators Befriend Lure Make contact- that is their goal MySpace the worry. Easily tracked

  7. Cyber Predators Statistics “…A child goes missing every 40 seconds in the U.S, over 2,100 per day” (OJJDP) In 2005 662,196 children were reported lost, runaway, or kidnapped (ncmec) 2/3 of all missing children reports were for youths aged 15-17 (ncmec) 2/5 missing children ages 15-17 are abducted due to Internet activity (ICAC) Do the math--over 2 million teens age 15-17 are abducted due to Internet activity

  8. Befriending Techniques Chat room, IM, networking sites, blogs Portrays same age, same likes, same dislikes Portrays age-typical awkwardness Begins to share some secrets E-mail Telephone (which can be faked) Webcamming (which can be faked) Verbal chat on Internet (which can be faked) Are patient when developing a relationship

  9. Six Steps to Luring Based loosely on the “Missing Game” available online at Just like you – befriending offer attention and affection Develops trust –sympathizes, while reinforcing feelings of alienation Establishes secrecy -- obtain incriminating evidence

  10. Six Steps to Luring Erodes barriers -- the “honeymoon phase” Direct intimidation -- guilt and threats used as coercion to meet them or give more information Face-to-face meeting --the truth emerges

  11. Eluding Internet Predators Keep usernames and profiles generic and anonymous Discuss your child’s online screen name(s), profile(s), and activities. Many provide too much personal information. Ensure all screen names and profiles are non-specific, non-suggestive, and purposely vague. Avoid posting personal photos Pictures can be altered to embarrass or humiliate. They also provide personal information that can help an Internet predator pretend to know you, your children, and/or their friends. Always keep private information private With just three pieces of personal information, specialized Internet search engines can be used to locate someone anywhere. Internet conversations should never include any personal information.

  12. Eluding Internet Predators Keep the computer in an open area A responsible adult should always accompany minors while they access the Internet to provide support and direction should they be confronted with an aggressive solicitation or inappropriate materials. Respect children’s privacy Respect your child’s privacy, but make certain they personally know everyone on their e-mail “buddy” list. Work to generate parent-child trust that supports open and honest Internet use. Ripping out the computer once they tell you they came across porn will destroy the lines of communication. Be part of your child’s online experience It can be a fun journey to explore the wonders of the Internet as a family. As computer-savvy as kids and teens are today, they will certainly teach you a thing or two!

  13. Revealing Too Much • Personal information that can lead a predator to your doorstep Name Age Birthday Phone Number Schedule School Location Photos and videos should never be posted online if they show • Backgrounds that reveal identifying information • Sexually provocative poses • Too much skin

  14. Indicators of High Risk More technical knowledge than parents Teens who feel they are not listened to Do not feel like they are getting enough attention Do not communicate about who or what they are doing online Deleting computer’s Internet history Minimize screen or switch to another screen quickly when someone comes in the room Unexplained phone calls Unexplained absences Unexpected gifts

  15. Risky Behavior Posting photos online Meeting people online that you do not know in the real world Online accounts with suggestive names Talking about parties online Having blogs and other public online discussions (HR and college acceptance boards are now using these to screen people) Expressing heated/strong opinions

  16. Understand Risk Factors 30% of teenage girls polled by the Girl Scout Research Institute said they had been sexually harassed in a chat room Only 7 %, however, told their mothers or fathers about the harassment, as they were worried that their parents would ban them from going online (Girl Scout Research Institute 2002) 47% of children have received e-mails with links to pornographic websites (Symantec market research report, June 2005)

  17. Understand Risk Factors, cont. 69% of teens regularly receive personal messages online from people they don't know and most of them don't tell a trusted adult about it (Teen Research Unlimited. "Cox Communications Teen Internet safety Survey Wave II," March 2007 28% of teens said they use code words on a daily basis to hide their online conversations from their parents – example: “PIR” means “parent in room”, P9, P911, or 911(Teen Research Unlimited, “Topline Findings from Omnibuss Research,” October 2005.). WW Kids 79% of sexual solicitation incidents happened to youth while they were using their home computer Wolak, J., Mitchell, K., & Finkelhor, D. (2006). Online victimization of youth Only 5% of youth who received a sexual solicitation and 2% of youth who encountered unwanted sexual material online indicated that they have told Wolak, J., Mitchell, K., & Finkelhor, D. (2006). Online victimization of youth

  18. Things to Think About What personal information is your child placing on blogs and personal WebPages?

  19. Cyber Bullying Often has a stronger impact on teenagers as they have turned to the Internet because they need social affirmation Can be done by anyone speaking harshly to someone else online Often follows online chatting while angry

  20. Cyber Bullying the Numbers Nearly one in four teens in a relationship (24%) communicated with their partner via cellphone or texting HOURLY between midnight and 5:00am (Teen Research Unlimited, "Tech Abuse in Teen Relationships," January 2007). One in five teens in a relationship (22%) have been asked to engage in sex by cellphone or the Internet when they do not want to (Teen Research Unlimited, "Tech Abuse in Teen Relationships," January 2007). 43% of youth report that they have experienced some form of cyberbullying in the last year. The incidence of cyberbullying is most prevalent among 15- and 16-year-olds, particularly among girls (Harris Interactive, "Teens and Cyberbullying." Research conducted for the National Crime Prevention Council, February 2007).

  21. Identity Theft Any request for information that comes in e-mail is to be suspect. Call your bank or credit card company first, and do not click on the link. Do not use the phone number sent in the e-mail. Any phone request for more info is also suspect. So question them first and hang up. Then call the institution to make sure they were calling (be careful of any information given out). Check the website before you do business with them. Make sure the SSL connection is good.

  22. Identity Theft Protection Monitor you and your child’s credit report regularly Obtain your credit report at least once a year by phoning either Equifax, Experian, or Trans Union, and look carefully for any unusual or fraudulent activity. Their contact information is on the Internet. Check for FREE at Child ID theft is a large and growing market. CNN September 14, 2006 Beware of all requests for your personal information online Criminals copy logos perfectly to trick you. Legitimate companies never send unsolicited requests for personal information. Never give out personal information unless you initiate the correspondence. Shred documents before putting them in the trash Bank statements, credit card offers, utility bills, and documents with Social Security or account numbers can be retrieved from your trash by ID thieves, so make a habit of tearing them up before tossing them.

  23. Identity Theft Protection Install a locking mailbox or use the post office Criminals often obtain the information they need by intercepting mail in unlocked street mailboxes. Only send and receive bills, checks, or other personal correspondence from a secure location. Limit the amount of personal information you carry in your purse or wallet Protect your information online by using a firewall, virus protection, and secure Internet browser Place a fraud alert on your credit If you have lost your wallet, purse, Social Security card, or passport, or suspect you are a potential victim of ID theft, contact each of the three credit bureaus (Equifax, Experian, and Trans Union) for assistance.

  24. Securing Your Online Connections 1. Protect your personal information -- Don’t reply to or click on links in any email asking for your personal information 2. Know who you’re dealing with -- When shopping online, look for a seller’s physical address and a working telephone number. Before downloading free software, read the fine print —some downloads come with spyware 3. Use anti-virus software and a firewall, and check for updates daily 4. Be sure to set up your operating system, applications and Web browser software properly, and update them regularly (configure windows/Linux/MAC’s to run automatic updates)

  25. Securing Your Online Connections 5. Protect your passwords. Keep your passwords in a secure place, and don’t share them on the Internet, over e-mail, or on the phone (use long passwords) (put one on your administrator account) 6. Back up and consider encryptingimportant files. If you have important files stored on your computer, copy them onto a removable disc and store it in a safe place. 7. Remember, being online is the same as being in the worst high crime neighborhood,so be street smart when online. 8. Secure your wireless connections; see more info at 9. Turn off unnecessary services 10. Turn off file and print sharing if you do not need them

  26. Securing your Online connections Install and keep up-to-date anti-virus, anti-spyware, and firewall Microsoft Malicious Software Removal Tool CCleaner (Free) Anti-Spyware – A-Squared (free) AVG Free Use Commercial Web Filtering Software Free - Net Nanny (2007 best) Check internet cache @winspy (free) Spector Pro to track everything done on a PC

  27. Check Files on Computer Look at the online handout on how to check computer history files to find what has been surfed. Also check the settings and documents in My documents to see what is on their account. Undelete files with Restoration or PC Inspector File recovery to find out what your child has deleted. Look for files in the recycle bin and ones that have been deleted.

  28. File-sharing • Download and share media with P2P Music Movies Videos Photos • It’s illegal to share copyrighted materials without permission • It’s easy to unknowingly download or distribute viruses and illegal material

  29. File-Sharing Programs

  30. What is Social Networking?

  31. Social Networking Sites • Enhance communication skills • Improve writing skills • Spark creativity • Help teens develop a personal identity and express themselves • Keep in touch with friends and family

  32. Networking Sites MySpace has twice the number of views Google gets a day, for a total of almost 13 million a day. To put that in perspective, that’s 4,475 views a second.5 MySpace gets 150,000 new users a day, the vast majority of whom (90%) are people claiming to be between 14-24 years old.5 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies 71% use it on a weekly basis (Grunwald Associates, "Creating & Connecting - Research and Guidelines on Online Social and Educational Networking," July 2007)

  33. Safer Social Networking • Make our own profile and add your children as friends • Learn the site’s safety features • Have children use privacy settings • Examine their list of friends and browse their friends’ pages

  34. Real-Life Consequences • Profiles and blogs are not only viewed by your friends, but also by • Parents and relatives • Teachers and principals • Colleges and universities • Employers • ONLINE PREDATORES-- when a predator starts grooming a child, he looks for vulnerability, and with a diary or blog right there, he's already gotten past the first stage.”13 If is on the Internet. IT IS NOT PRIVATE

  35. MySpace Tracking BeNetSafe™ 12 Features Include: Automated technology tracks your children's activities online. Red flags activities that may be dangerous. Compatible with popular teen sites such as MySpace and Xanga. Nothing to download. Simply sign in online! 24/7 monitoring to chaperone your children when you can't. Works with any computer or operating system.

  36. 12 is a service that allows you to monitor login activity, track profile changes, and keep a running history of up to 5 profiles. Are you a parent who banned your child from myspace only to see that they keep logging on, or are keeping multiple accounts? Free Account Sign-Up Now Monitor 1 profile Profile is crawled twice daily View up to 25 of a profile's friends Pro Account Sign-Up Now Monitor up to 5 profiles Profile is crawled every 6 hours View up to 100 of a profile's friends

  37. 12 They offer anonymous monitoring of your child’s MySpace profile The kids will have no idea someone is watching and reporting on their profile Receive periodic reports rating critical areas of potential dangers In the report, the parent will be informed of the concerns found on the profile (i.e. sex, drugs, smoking, drinking, inappropriate pictures, too much information, possible pedophile contact, etc.) Immediate e-mail alerts to parents if a pedophile is in contact with your child Know what your child is doing on MySpace without being a snoop We use a method of positive peer pressure to push your kids to be safer! We contact them with our own personal MySpace profiles. That way, it’s coming from a peer and not an adult or company.

  38. Data Mining with Google Google search string “SSN” “birthday” “Hate my parents” 31,100 hits "phone number“ Place name in quotation marks (use variations) “First (Jon) Last” Legal First (Jonathan) Last” “First MI Last” Use and to look for your child's name in newsgroups (address, phone number and other personal information) Go to my website for a Google search tutorial

  39. Common Chat Terms POS --Parents are looking over my shoulder POTS -- Parents over the shoulder (my parents are watching; I can't really talk) P911-- My parents are in the room. P= Parents, and 911= emergency; in other words, either drop the subject or watch the language WTGP-- Want to go private? (move to a private chat room) a/s/l or asl - - Age/Sex/Location -- (used to ask a chatter their personal information) GGOH --Gotta get outta here OLL --Online love GTR --Got to run TNT--'Til next time LMIRL-- Let's meet in real life

  40. Bypassing Filters Go to AltaVista’s BabbleFish site Key in the URL of a porn site and ask BabbleFish to translate it into English (even though the site is already in English). Changing their browser’s proxy Using an anonymizer: Use Google to find CGI proxies which are harder to control than common php proxies;, and too many others Use software to find and destroy filtering software on local PC’s Turn off filtering software on local PC Conducting picture searches at Google, AltaVista, or other search engines including UK version of the search engine THE TRUTH IS THAT FILTERING SOFTWARE KIND OF WORKS AND KIND OF DOESN’T

  41. To get around your blocking software:1. First, try a circumvention site like 2. If that doesn't work, you can join our e-mail list where we mail out new circumventor sites every 3 or 4 days. 3. If you have a computer with an uncensored Internet connection, you can follow these easy steps to set up your own circumventor site. 4. If you're trying to get around blocking software that's installed on the local computer and not on the network, use these instructions to boot from the Ubuntu Live CD. Bypassing Filters PeaceFire

  42. Carbon: Open the lines of communication Hardware: USB Trackers- Phone Trackers- Extreme Measures

  43. Extreme Measures Software: Spector Pro is used for monitoring and recording every detail of PC and Internet activity – in your home or in your office Selected as the Editors’ Choice by the experts at PC Magazine, Spector Pro records every detail of what they do on the computer – their chats, instant messages, e-mails, the web sites they visit, what they search for, what they do on MySpace, the pictures they post and look at, the keystrokes they type, the programs they run It’s advanced surveillance screen snapshot features, you get to see not only WHAT they do, but the EXACT order in which they do it, step by step

  44. Resources All resources and more at my website (bottom of page) Chat Abbreviation -PDF-Download Cleaning Your Windows Computer -PDF-Download Free Software for Home Users -PDF-Download How to Check Your Computers History -PDF-Download  I-Educator -PDF-Download Internet Safety for Kids -PDF-Download Internet terms -PDF-Download Internet Safety Plan -PDF-Download Internet Safety Tips for Parents -PDF-Download Secure Mac step by Step -PDF-Download Tracking People around town -PDF-Download Internet Safety for Kids link list is very graphic has excellent resources for parents