Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cyber Safety: “Keeping Your Kids Safe in a High Technology World”

Similar presentations


Presentation on theme: "Cyber Safety: “Keeping Your Kids Safe in a High Technology World”"— Presentation transcript:

1 Cyber Safety: “Keeping Your Kids Safe in a High Technology World”
Crime Prevention Bureau Thousand Oaks Police Department Sgt. Eric Hatlee 1

2 Tonight’s Agenda: “Internet 101” Cyber-Bullying Social Media
Internet Predators Parenting Tips 2

3 Becoming Computer Savvy – Internet 101
Blog – Short for weblog Browser – A program that allows you to search the world wide web (WWW) Chat room – Chat with others over the web messages and/or live video Blocking software – Computer programs that filter content from the internet base on specific criteria File sharing – Accessing files from one computer to another ISP – Internet Service Provider – a company that sells direct access to the internet HTTP- Hypertext Transfer Protocol if there is an “S” at the end this is a secure site. IP Address – Set of 4 numbers; uniquely identifies every computer IM – Instant Message URL- Uniform Resource Locater, basically an internet address Router – Access point to hook computers to the internet 3

4 101 – Continued www.noslang.com A/S/L – age, sex, location
POS – parent over shoulder 53x – sex GNOC – get naked on camera IBN – I’m buck naked (L)MIRL- (let’s) meet in real life OLL- online love TDTM – talk dirty to me F2F – face to face WYRN – what’s your real name ILU or ILY or 143 – I love you GNBL4U – got nothing but love for you 4

5 101 – Continued BRB-Be right back GNOC-Get naked on camera
P911-Parent Emergency PIR-Parent in room POS-Parent over shoulder W/E-Whatever GTG-Got to go DTG-Don’t go there WTGP?-Want to go private?

6 Typical Emoticons ; ) Winking :*( Crying #-) Wiped-out-partied all night %*} Inebriated %\ Hangover 8-# Death :-d~ Smoker :->< Ready to kiss :/I No smoking Original emoticons are slowly fazing out since the advent of animated emoticons

7 Cyber-Bullying, What is it?
Cyber Bullying is bullying that takes place online using cell phones, computers and tablets through social media sites, text messages and websites. 7

8 Cyber-Bullying Over half of teens have been bullied online
70% of teens report seeing frequent bullying online 90% of teens who have seen social-media bullying say they have ignored it. Girls are twice as likely as boys to be victims About 1 in 5 teens have posted or sent sexually suggestive or nude pictures of themselves to others. This often leads to being harassed and teased 8

9 Cyber-Bullying Police in Florida arrested two girls, 14 and 12, in connection with the death of Rebecca Sedwick, who jumped from the top of an abandoned concrete plant. They were charged with felony aggravated stalking…Charges later dropped. September, 2013 9

10 What should we do? Threats can be a crime! Talk to your kids.
Become computer savvy. Internet Controls Consequences Computer in common area Look for signs Save evidence and try to identify the bully. Take screen shots Notify the school and police department Because our kids were born with computers in their hands they are a lot smarter then us, we need to at least attempt to get to their level of “computer Savvy! Ask them how they would feel if someone called them obese, stupid, or a loser It makes them good and you’ll learn more about how much they really know on the computer. Victim signs; nightmares, school avoidance, sudden disinterest in computer. Threats can be a crime! 10

11 Social Media Latest figures estimate that there are almost 400 different social media sites / apps

12 What is Social Media? Social Networking Sites are a group of Internet-based applications that allow the creation and exchange of user generated content. Purpose: allows users to establish friendships, romantic interests, or make business connections

13 Teens and Social Media 95% of teens regularly access the internet / social media* 3 out of 4 teens access the internet on mobile devices* Teens spend an average of 7 1/2 hours per day checking social media status, texting, browsing internet, watching videos, listening to music, etc.^ Average age seems to be getting younger *Commonsensemedia.org, ^WashingtonPost.com A recent NY Times article is titled IF YOUR KIDS ARE AWAKE, THEY’RE PROBABLY ONLINE. 13

14 Social Media Trends As more parents embrace Facebook they’re driving teens away to look for more secretive social media sites or apps Instagram – Text / Photo / Video posting Kik – Instant messaging app Ask.fm - Anonymously post any type of question or comment to others. (cyber bullying) Snapchat – Photo sharing app. Photos self-delete after predetermined time. Many teens send nude pictures of themselves thinking they will automatically delete. Teens quickly figured out a screen shot will save the photo prior to it deleting. Vine – video sharing app Twitter – Text / Photo / Video posting Pheed – Text / Photo / Video sharing 14

15 Why Do Kids like these Sites?
Exposes them to the entire world Accesses people anywhere at anytime Create and showcase who they are Can keep tabs on their friends and on the latest hot topics and what is “in” Social Networking sites are THEIR OWN SPACE Gives a sense of empowerment in controlling their own world without their parents

16 Monitor you teen’s online activity
Set up privacy settings prior to giving your teen a mobile device. (It’s your phone…It’s your rules) Use monitoring software (PhoneSheriff) It’s ok to snoop / spy on your teens activity 67% of teens say they are confident they have successfully hidden their online activity from their parents* 34% of parents say they monitor teens activity* You now have to become Social Media savvy *facebook-parental-controls-review.toptenreviews.com

17 What did my teenager just say ??
“I got a toro! I’m gonna swoop my dank tank. HMU, let’s chief.” Toro (Toro glass) = Brand of blown glass pipe / bong Swoop = To pick up Dank Tank = Jar containing weed or term for HQ weed HMU = Hit Me Up Chief = To smoke weed Urban Dictionary…USE IT!! Know what your kids are saying and typing to one another. A Toro pipe or bong can easily cost hundreds of dollars. Question where they are getting the money… 17

18 GOOGLE your child… Use advanced search To find photos 18

19 Security Implications
Since these sites rely on connections and communications, you are encouraged to provide information about yourself. People are usually not cautious because: The Internet provides a sense of anonymity The lack of physical interaction provides a false sense of security People tailor information for friends to read and forget others may see the information People offer insights to impress potential friends and associates and give out more information than is prudent

20 Protect Yourself Using SIPPS
Strangers-Be wary of strangers. The Internet makes it easy for people to misrepresent themselves and their motives Internet-It is a public resource. Only post information that you are comfortable with anyone seeing and knowing about you—especially in your profile and in your blogs Personal Information-Do not post information that will make you vulnerable (address, age, routines, schedules, etc.) This also includes information your connections may post about you Privacy Policies-Some sites share information such as addresses or user preferences Skepticism-Do not believe everything you read. Misleading and false information is always posted, including a user’s own identities. Take precautions and verify information

21 Safe Blogging Tips Be anonymous as possible - Avoid posting any information that can enable a stranger to locate you Protect your info - Use the service’s privacy controls Avoid in-person meetings - It is never risk-free. If you do decide on a meeting, always meet in a public place and take your friends Check comments regularly - Do not respond to mean, offensive, or embarrassing comments. Delete them and block those people from posting further comments Be honest about your age - Membership rules are there to protect you

22 Safe Blogging Tips Think about how different sites work -some allow a defined community while others allow anyone to view postings Have control over info you post -restrict your page to a select group of people Screen names -make sure your screen name does not say too much about you Photos -consider not posting one. Photos can be altered or broadcasted through other mediums Information posted -post only info that you feel comfortable with others seeing. It may came back to haunt you in the future for jobs, school applications, law enforcement, etc. Once sent, always out -you can never take back information once it is posted

23 Safe Blogging Tips Be wary of new online friends -ask your friends if they know any new person and do your own research via search engines Flirting -Unacceptable to flirt with strangers. You never know who they really are, who you are communicating with, or the motives of the other person Always trust your instincts - if your inner person is giving you warning/danger signs that something is wrong—LISTEN TO YOUR INSTINCTS

24 24

25

26 How to save evidence to take to the police.
Go to page, hit shift key and print screen key at the same time. 26

27 Evidence saving continued
Open up Microsoft paint. 27

28 28

29 File will then paste onto screen
Click on “Edit” Click on “Paste” File will then paste onto screen 29

30

31 Internet Predators 31

32 “Hi, You sound real cute!! How old are you and what do you like doing after school?”
32

33 “I am 14 and a bit of a fitness fanatic, I often go power lifting after school. Do you want to meet?” 33

34 Insight into Predators
Only 18% of youth use chat rooms, however, majority of crimes initiated in chat rooms 82% of online sex crimes against minors used the victim’s social networking site to find likes and dislikes 65% of the offenders used victim’s social networking site to gain home and school information Majority of victims between % were girls Solicitations occur in Chatrooms (37%), I/Ms (40%), other including gaming devices (21%) Internetsafety101.org 34

35 What you do reflects on you…forever
Teen brains are still developing and they can’t control all of their impulse behaviors Not thinking about implications of pictures What about future employers? College applications? Police investigations? Schools? A recent study by ExucuNet, 83% used web searching as a part of the job applicant-screening process. 43% eliminated applicants 35

36 Check History HISTORY ICON 36

37

38 FAMILY VALUES Communicate Educate
38

39 Tools to Use: Filtering and blocking software Time monitoring Software
Key Logging /Key Stroking Software Net Nanny Web Watcher McAfee Safe Watcher Profil Parental watcher 2 PC Pandora Family Protector Spytech SpyAgent eBlaster Spector Pro Phone Sheriff (Mobil devices) 2014 Top 10 internet monitoring software 39

40 Parenting = Values and Standards
Safe internet behavior starts in the real world, with focus on imparting values and standards Help them understand their actions can cause harm to people, even if they can’t see them. Help them to learn ethical decision making. Challenge unhealthy values and standards 40

41 PARENT / CHILD CONTRACT
Staying Safe Online: A Young Person's Contract 1. I will ALWAYS tell a parent or another adult immediately, if something is confusing or seems scary or threatening. 2. I will NEVER give out my full name, real address, telephone number, school name or location, schedule, password, or other identifying information when I'm online. I will check with an adult for any exceptions. 3. I will NEVER have a face-to-face meeting with someone I've met online. In rare cases, my parents may decide it's OK, but if I do decide to meet a cyber-pal, I will make sure we meet in a public place and that a parent or guardian is with me. 4. I will NEVER respond online to any messages that use bad words or words that are scary, threatening, or just feel weird. If I get that kind of message, I'll print it out and tell an adult immediately. The adult can then contact the online service or appropriate agency. If I'm uncomfortable in a live chat room, I will use the "ignore" button. 5. I will NEVER go into a new online area that is going to cost additional money without first asking permission from my parent or teacher. 6. I will NEVER send a picture over the Internet or via regular mail to anyone without my parent's permission. 7. I WILL NOT give out a credit card number online without a parent present. Young Person_________________ Date______ Parent/Guardian_______________ Date______ 41

42 Red Flags, Warning Signs
Internet addiction Secretive behavior Empty history file after internet use Emotionally upset appearance during or after internet use Disturbed relationships with parents, family, and friends. Receipt of packages Subtle comments (Cyber-Safe Kids, Cyber-Savvy Teens, Nancy Willard) 42

43 Red Flags - Responses Subtle comment – ask them , “What do you think you should do?” Investigate further Calm down before talking. Initiate your discussion carefully Respond to evidence of unsafe or irresponsible use of Internet with effective discipline If you find your child is involved with an online stranger, DO NOT confront, they could erase evidence, runaway with person or alert stranger, CALL POLICE (Cyber-Safe Kids, Cyber-Savvy Teens, Nancy Willard p55) 43

44 Know the rules, the laws. School Rules Terms of Use Agreements
Criminal Law Threats of violence to people or property Extortion or Coercion Obscene or harassing phone calls or text messages Harassment or Stalking Gang related activity Child Pornography Sexual Exploitation Sale of an illegal substance or item Computer security violations 44

45 Know the rules, the laws. Civil Law Standards Defamation
Invasion of privacy Intentional infliction of emotional distress Copyright infringement 45

46 C.O.P.P. A. Children’s Online Privacy Protection Act 1998
States that any website trying to get ANY personal information from a child under the age of 13 MUST have parental permission. Your consent isn’t necessary if the website is collecting your child’s address simply to respond to a one time request for information. You may revoke consent at anytime. 46

47 Computer Safety Tips Use password strategies -Create alphanumeric passwords that are hard to crack and create different passwords for each account. Change passwords periodically and never give out your passwords to anyone—including your friends Install a firewall -Absolutely necessary if you share-file programs, helps prevent hackers and the theft of information on your computer, Never open suspected attachments -Regardless of how intriguing they are or curious you are—delete them

48 Computer Safety Tips Be a cyber citizen -use the Internet to share knowledge and make lives better. Keep safe, use good manners and respect the laws Do not open from unknown sources -delete them especially ones with ‘exe’ extensions Back-up -use external media Security -Evaluate security setting at least twice a year and use security patches, Use security patches and check for virus updates

49 Computer Safety Tips Anti-virus software - get regular updates. Viruses are always changing Sharing access to your computer - DON’T! Disconnect -When not using the Internet, shut down or cut off the Internet connection

50 Resources / Links www.netsmartz.net www.isafe.org
50


Download ppt "Cyber Safety: “Keeping Your Kids Safe in a High Technology World”"

Similar presentations


Ads by Google