400 likes | 514 Vues
Mobile devices: Physical & Spiritual Issues. Ernest Staats Technology Director MS Information Assurance, CISSP, CEH, CWNA, Security+, MCSE, CNA, I-Net+, Network+, Server+, A+ erstaats@gcasda.org. The Impact of Media. Resources available @ www.es-es.net/2.html.
E N D
Mobile devices:Physical & Spiritual Issues Ernest Staats Technology Director MS Information Assurance, CISSP, CEH, CWNA, Security+, MCSE, CNA, I-Net+, Network+, Server+, A+ erstaats@gcasda.org The Impact of Media Resources available @ www.es-es.net/2.html
Communicate Monitor Report COMMUNICATION
Anti-virus softwareFiltering programsMonitoring software Parental supervision Parental supervision
What’s your favorite thing to do online? Show me the funniest YouTube video. Let’s play your favorite online game.
Golden Rules to Teach Rules from “real” life apply: courtesy, kindness, modesty, dignity, respect for law and others, etc. Don’t talk/txt / MMS strangers Keep personal information private (No cell # on FB) Anything posted on the internet is not private and lasts forever (including photos, videos, etc.) Communicate if you encounter something uncomfortable
The Influence of Media (75%) have a handheld device that is online A breakdown of media consumption among types and age groups. Total media use time is lower than exposure due to a 30 percent average of "media multitasking.” Kaiser Family Foundation
The Influence of Media Teen Media Exposure Associated With Depression Symptoms in Young Adulthood http://www.health.am/psy/more/teen-media-exposure-associated-with-depression-symptoms/ Messages through media may reinforce aggression and other risky behaviors, interfere with identity development or inspire fear and anxiety Cheating becomes much easier www.chacha.comwww.kgbanswers.comkgbkgb Taken from "Association Between Media Use in Adolescence and Depression in Young Adulthood - A Longitudinal Study"
3 579 Friends See All
Friend Requests http://latimesblogs.latimes.com/technology/2011/05/teenager-arrested-for-ranking-female-classmates-looks-in-facebook-list.html
Sending or posting provocative images Sharing passwords with friends Embarrassing or harassing people Posting personal information Clicking on pop-ups Risky Online Behaviors • If it is on the Internet • IT IS NOT PRIVATE
Privacy Settings - My status, photos, and posts - Family and relationships - Photos and videos I’m tagged in - Birthday - Permission to comment on your posts - Contact information Share a tagged post with friends of the friend I tag Friends Only
Sexting • 22 % girls/18 % boys have electronically sent or posted nude or semi-nude images • 1/3 boys ¼ girls have had nude or semi-nude images shared with them • 40 percent report posting sexually suggestive messages • ½ receive sexually suggestive messages http://voices.washingtonpost.com/parenting/2008/12/sexting.html
GEO Tagging • August of 2010, Adam Savage, of “MythBusters,” took a photo of his vehicle using his smartphone. He then posted the photo to his Twitter account including the phrase “off to work” • Image contained metadata reveling the exact geographical location the photo • Savage revealed the exact location of his home, the vehicle he drives and the time he leaves for work Read the full story here: http://nyti.ms/917hRh
Location-Aware Lifestyle The following was published in Wired Magazine in 2009 • A woman in Golden Gate Park toke a photo with a phone. Because embedded geodata into photos uploaded to Flickr or Picasa, shots can be automatically placed on a map • Searched Flickr map, and score—a shot from today. • User’s photostream and determined it was the woman I had seen earlier • A cluster of images in one location revealed photos of an apartment interior—a bedroom, a kitchen, living room Read the full story here: http://bit.ly/bJqYmm
Turn off GPS function on phones • Disable the geotagging function • Most smartphones/Tablets & several cameras automatically display geographical information • It’s important that users make efforts to turn off geotagging • More Info http://es-es.net/2.html
Scrubbing Meta Data • Software • Jpg and PNG metadata striper http://www.steelbytes.com/?mid=30 • BatchPurifier LITE • http://www.digitalconfidence.com/downloads.html • Doc Scrubber • http://www.javacoolsoftware.com/dsdownload.html • Websites • http://regex.info/exif.cgi • http://trial.3bview.com/3BTrial/pages/clean.jsp
Geo Tagging and Metadata Hands on • Geo Tagg example from website • Meta data lets see the original pre edited photo • Can they get into your VM or fake the caller ID http://www.telespoof.com/freecall/agi • http://www.spoofcard.com/ • http://www.telespoof.com/freecall/agi • www.spoofcard.com • http://www.slydial.com/apps.php
Mobile Phones Parental Controls • Product Comparison 2010
Sign Up Email Address: Password: Save Reportto the website, school, bully’s parents, or law enforcement Block or ban the bully from contacting your child Set up a new account Save the messages for evidence
Protector™ by TASER • Cell-phone locking • Serious collision detection • Real-time GPS tracking • Unsafe driving alerts • Geo-fences are boundaries on a map that generate alerts when crossed. • any inbound call, text, or e-mail. Anything that comes into the child's phone would actually be routed to the parent's phone." • Read more: http://news.cnet.com/8301-19518_3-10433539-238.html#ixzz1Mn6tKT00
Phone Tracking mobilespytool.com Call Log Each incoming and outgoing number is logged along with duration and time stamp. SMS (Text Messages) Log Every text message is logged even if the phone's logs are deleted. Includes full text. GPS Locations Log GPS postions are uploaded every thirty minutes with a link to a map. Contacts Every contact on the phone is logged. New contacts added are also recorded. Tasks All personal tasks that are created are logged and viewable. Memos Every memo input into the phone is logged and viewable. Cell ID Locations ID information on all cell towers that the device enters into range of is recorded. E-Mail Log All inbound & outbound email activity from the primary email account is recorded. Calendar Events Every calendar event is logged. Date, time, and locations are recorded. URL (Website) Log All URL website addresses visited using the phone's browser are logged. Photo & Video Log All photos & videos taken by the phone are recorded & are viewable.
5 Good Privacy Downloads • Ghostery is a browser extension that is available for Internet Explorer, Firefox, Chrome and Safari • Web Browsers Traces Eraser provides an easy way to clear your internet history, cookies, cached files and more. • Adblock Plus for Chrome a Chrome add-on that makes ads disappear and offers more than 40 filters • CyberGhost VPN 2011, all web traffic is routed through an anonymised web server – • iPhone Tracker is a simple Mac OS X application that maps the information that your iPhone is recording about your movements.
FlexiSpy • Top of the range spyphone • Mobile Call Tapping, listen to actual phone calls • Remote Listening (Room bugging) • Read all incoming and outgoing SMS • Read all Call logs • Know the location, Location tracking • SIM Change SMS Notification
Mobile Spy • Features • SMS Recording • Call details • Not voice recording • GPS Location • Log summaries • Works on practically all smart phones • Cost • $49.97 for 3 months • $69.97 for 6 months • $99.97 for 12 months
Options for iPhone • K9 Web Protection Browser • Free • Trusted company • Blue Coat Systems, Inc. • Rated 3.5 Stars on first release • Updates follow quickly • Safe Eyes Mobile • $20.00 • Trusted company • InternetSafety.com • Rated 3 stars • Rarely Updated
MobiStealth • Features • Works on multiple phones • The features vary by make of phone • SMS Logging • Call recording • GPS tracking • Web Browser logging • Pricing • 12 months- Up to $200 • 6 months- Up to $150 • 3 months- Up to $100 http://www.mobistealth.com/products.php
Protect Your Personal Info Avoid using discount cards to pay for anything that you want to keep private Don’t send messages on an unsecured Wi-Fi network Mask your identity when you search Use search tools that can disconnect your computer’s identifying machine number from the search http://www.scroogle.org/cgi-bin/scraper.htmVirual Machines Pick passwords carefully Chose different usernames Read more: http://webupon.com/web-talk/digital-exposure-you-may-not-be-as-safe-as-you-think-you-are/#ixzz1GisN2LZY
Google Yourself / Your Kids What personal information is your child placing on blogs and personal WebPages? http://www.pipl.com http://www.peekyou.com http://yoname.com www.google.comwww.myfamily.com www.zoominfo.com www.alltheweb.comwww.zabasearch.com
Data Mining with Google Google search strings site:myspace.com “SSN” site:myspace.com “birthday” site:myspace.com “Hate my parents” 31,100 hits site:facebook.com "phone number“ Place name in quotation marks (use variations) “First (Jon) Last” Legal First (Jonathan) Last” “First MI Last” Use groups.google.com and google.com/alerts to look for your child's name in newsgroups (address, phone number and other personal information) Go to my website for a Google search tutorial http://www.es-es.net/2.html
Good Resources www.netfamilynews.org Quality and current “nonprofit news service for “kid-tech news.” Based on the premise that informal, engaged parenting is essential to kids’ constructive use of technology and the Net.” www.pbs.org/parents/growingwithmedia Provides information on how media “can shape your child’s development and what you can do to create a media-literate household.” www.safekids.com Provides a “guide to making the Internet and Technology fun, safe, and productive.” www.besafeonline.org Advice and information about Internet safety for parents and teachers, plus opportunities to discuss problems and share solutions.
Good Resources www.getnetwise.org GetNetWise is a public service created by Internet industry corporations and public interest groups with the goal of having “Internet users be only one click away from the resources they need to make informed decisions about their and their family's use of the Internet.” www.netsmartz.org Created by the National Center for Missing & Exploited Children and Boys & Girls Clubs of America, “the NetSmartz Workshop is an interactive, educational safety resource to teach kids and teens how to stay safer on the Internet.” www.kids.us Kids.us is an Internet domain where “affiliated sites are regularly screened and monitored” so that “parents and children can trust the sites to provide educational and appropriate online fun.”
Good Resources www.commonsensemedia.org Provides family-friendly reviews of media (TV, film, music, Web sites, games, and books) and parent tips on “healthy media diets” for families. www.netmom.org Run by the author of Net-mom's Internet Kids & Family Yellow Pages, a family-friendly directory to 3,500 of the best children's resources the Internet has to offer, this site highlights good sites for kids and provides safety tips for parents
Common Chat Terms POS --Parents are looking over my shoulder POTS -- Parents over the shoulder (my parents are watching; I can't really talk) P911-- My parents are in the room. P = Parents, and 911 = emergency; in other words, either drop the subject or watch the language WTGP-- Want to go private? (move to a private chat room) a/s/l or asl - - Age/Sex/Location -- (used to ask a chatter their personal information) GGOH --Gotta get outta here OLL --Online love GTR --Got to run TNT--'Til next time LMIRL-- Let's meet in real life
Software Recommendation Sites The Safe Side – Stranger Safety Video http://www.thesafeside.com/ Darkness to Light – 7 Steps to Protecting Our Children http://www.darkness2light.org/ Cyberbully Resources http://www.teenangels.org/ http://www.stopcyberbullying.org/index2.html Google Alerts http://www.google.com/alerts National Center for Missing and Exploited Children http://www.ncmec.org/ Son, Call Me Big Brother http://wired.com/wired/archive/14.07/start.html?pg=8 Download your fav apps all at once http://ninite.com/ Family Watchdog – National Sex Offender Search http://www.familywatchdog.us
Software Recommendation Sites Search for your local FBI field office http://www.fbi.gov/contact/fo/fo.htm A Parent's Guide to Internet Safety http://www.fbi.gov/publications/pguide/pguidee.htm Kidz Privacy http://www.ftc.gov/bcp/conline/edcams/kidzprivacy/adults.htm CyberTip Line, National Center for Missing and Exploited Children http://www.missingkids.com/cybertip/ Safe Surfing with your Family, Safe Surfing Checklist http://www.yahooligans.com/parents/checklist.html Safeguards, Computer safety tips for your home and child http://www.enough.org/safeguards.htm Tips for Parents to Protect Children from Internet Predators, Guidelines for Parents http://www.safekids.com/parent_guidelines.htm Kids Rules for Online Safety http://www.safekids.com/myrules.htm Rules in Cyberspace http://www.cybercrime.gov/rules/kidinternet.htm Cyberbullying http://cyberbully.org/ Chat Slang http://www.web-friend.com/help/lingo/chatslang.html NetLingo http://www.netlingo.com/
Resources All resources and more at my website (bottom of page) http://www.es-es.net/2.html Chat Abbreviation -PDF-Download Cleaning Your Windows Computer -PDF-Download Free Software for Home Users -PDF-Download How to Check Your Computers History -PDF-Download I-Educator -PDF-Download Internet Safety for Kids -PDF-Download Internet terms -PDF-Download Internet Safety Plan -PDF-Download Internet Safety Tips for Parents -PDF-Download Secure Mac step by Step -PDF-Download Tracking People around town -PDF-Download Internet Safety for Kids link list www.packet-level.com/Kids is very graphic www.webwisekids.com has excellent resources for parents
Bibliography Tapscott, The N’ Generation, 1998: 1-2. http://www.amazon.com/gp/product/0071347984/103-7584413-9423004?v=glance&n=283155 World Youth Report 2005 http://www.un.org/esa/socdev/unyin/wyr05.htm The Henry J. Kaiser Family Foundation Study, 3/05 Kaiser Family Foundation http://www.kff.org/ Numsum Myspace Stats www.numsum.com Media Central “The Buzz” http://www.pewinternet.org/pdfs/PIP_Teens_Report.pdf The National Youth Agency www.nya.org.uk The Search Agency http://www.thesearchagency.com/ResourceLibrary/search_engine_stat.aspx?sCatId=2 10. Internet Addiction by Wendi Kannenberg http://gien.adventist.org/forum2006/presentations/kannenberg-online-addictions.pdf 11. Internet Safety for Kids www.packet-level.com/kids 12. US News and World Report – Special Report- September 18,2006 www.usnes.com 13. 'Predator's Playground‘? http://www.msnbc.msn.com/id/11065951/site/newsweek/ 14. Decoding MySpacehttp://www.usnews.com/usnews/news/articles/060910/18myspace_5.htm