Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cyber Safety: Keeping Your Kids Safe in a High Technology World Crime Prevention Bureau Thousand Oaks Police Department Sgt. Eric Hatlee

Similar presentations

Presentation on theme: "Cyber Safety: Keeping Your Kids Safe in a High Technology World Crime Prevention Bureau Thousand Oaks Police Department Sgt. Eric Hatlee"— Presentation transcript:

1 Cyber Safety: Keeping Your Kids Safe in a High Technology World Crime Prevention Bureau Thousand Oaks Police Department Sgt. Eric Hatlee

2 Tonights Agenda : Internet 101 Cyber-Bullying Social Media Internet Predators Parenting Tips

3 Becoming Computer Savvy – Internet 101 Blog – Short for weblog Browser – A program that allows you to search the world wide web (WWW) Chat room – Chat with others over the web messages and/or live video Blocking software – Computer programs that filter content from the internet base on specific criteria File sharing – Accessing files from one computer to another ISP – Internet Service Provider – a company that sells direct access to the internet HTTP- Hypertext Transfer Protocol if there is an S at the end this is a secure site. IP Address – Set of 4 numbers; uniquely identifies every computer IM – Instant Message URL- Uniform Resource Locater, basically an internet address Router – Access point to hook computers to the internet

4 101 – Continued A/S/L – age, sex, location POS – parent over shoulder 53x – sex GNOC – get naked on camera IBN – Im buck naked (L)MIRL- (lets) meet in real life OLL- online love TDTM – talk dirty to me F2F – face to face WYRN – whats your real name ILU or ILY or 143 – I love you GNBL4U – got nothing but love for you

5 101 – Continued 101 – Continued BRB -Be right back GNOC- Get naked on camera P911 -Parent Emergency PIR -Parent in room POS -Parent over shoulder W/E -Whatever GTG -Got to go DTG -Dont go there WTGP?- Want to go private?

6 Typical Emoticons ; ) Winking :*( Crying #-) Wiped-out-partied all night %*} Inebriated %\ Hangover 8-# Death :-d~ Smoker :->< Ready to kiss :/I No smoking

7 Cyber Bullying is bullying that takes place online using cell phones, computers and tablets through social media sites, text messages and websites. Cyber-Bullying, What is it?

8 Cyber-Bullying Over half of teens have been bullied online 70% of teens report seeing frequent bullying online 90% of teens who have seen social-media bullying say they have ignored it. Girls are twice as likely as boys to be victims About 1 in 5 teens have posted or sent sexually suggestive or nude pictures of themselves to others. This often leads to being harassed and teased

9 Cyber-Bullying

10 What should we do? Talk to your kids. Become computer savvy. Internet Controls Consequences Computer in common area Look for signs Save evidence and try to identify the bully. Take screen shots Notify the school and police department

11 Social Media

12 What is Social Media? Social Networking Sites are a group of Internet-based applications that allow the creation and exchange of user generated content. Purpose: allows users to establish friendships, romantic interests, or make business connections

13 Teens and Social Media 95% of teens regularly access the internet / social media* 3 out of 4 teens access the internet on mobile devices* Teens spend an average of 7 1/2 hours per day checking social media status, texting, browsing internet, watching videos, listening to music, etc. ^ Average age seems to be getting younger *, ^

14 Social Media Trends As more parents embrace Facebook theyre driving teens away to look for more secretive social media sites or apps

15 Why Do Kids like these Sites? Exposes them to the entire world Accesses people anywhere at anytime Create and showcase who they are Can keep tabs on their friends and on the latest hot topics and what is in Social Networking sites are THEIR OWN SPACE Gives a sense of empowerment in controlling their own world without their parents

16 Monitor you teens online activity Set up privacy settings prior to giving your teen a mobile device. (Its your phone…Its your rules) Use monitoring software (PhoneSheriff) Its ok to snoop / spy on your teens activity 67% of teens say they are confident they have successfully hidden their online activity from their parents* 34% of parents say they monitor teens activity* You now have to become Social Media savvy *

17 What did my teenager just say ?? I got a toro! Im gonna swoop my dank tank. HMU, lets chief. Toro (Toro glass) = Brand of blown glass pipe / bong Swoop = To pick up Dank Tank = Jar containing weed or term for HQ weed HMU = Hit Me Up Chief = To smoke weed

18 Use advanced search GOOGLE your child… To find photos

19 Security Implications Since these sites rely on connections and communications, you are encouraged to provide information about yourself. People are usually not cautious because: The Internet provides a sense of anonymity The lack of physical interaction provides a false sense of security People tailor information for friends to read and forget others may see the information People offer insights to impress potential friends and associates and give out more information than is prudent

20 Protect Yourself Using SIPPS Strangers -Be wary of strangers. The Internet makes it easy for people to misrepresent themselves and their motives Internet -It is a public resource. Only post information that you are comfortable with anyone seeing and knowing about you especially in your profile and in your blogs Personal Information -Do not post information that will make you vulnerable (address, age, routines, schedules, etc.) This also includes information your connections may post about you Privacy Policies -Some sites share information such as addresses or user preferences Skepticism -Do not believe everything you read. Misleading and false information is always posted, including a users own identities. Take precautions and verify information

21 Safe Blogging Tips Be anonymous as possible - Avoid posting any information that can enable a stranger to locate you Protect your info - Use the services privacy controls Avoid in-person meetings - It is never risk-free. If you do decide on a meeting, always meet in a public place and take your friends Check comments regularly - Do not respond to mean, offensive, or embarrassing comments. Delete them and block those people from posting further comments Be honest about your age - Membership rules are there to protect you

22 Safe Blogging Tips Think about how different sites work -some allow a defined community while others allow anyone to view postings Have control over info you post -restrict your page to a select group of people Screen names -make sure your screen name does not say too much about you Photos -consider not posting one. Photos can be altered or broadcasted through other mediums Information posted -post only info that you feel comfortable with others seeing. It may came back to haunt you in the future for jobs, school applications, law enforcement, etc. Once sent, always out -you can never take back information once it is posted

23 Safe Blogging Tips Be wary of new online friends -ask your friends if they know any new person and do your own research via search engines Flirting -Unacceptable to flirt with strangers. You never know who they really are, who you are communicating with, or the motives of the other person Always trust your instincts - if your inner person is giving you warning/danger signs that something is wrong LISTEN TO YOUR INSTINCTS



26 How to save evidence to take to the police. Go to page, hit shift key and print screen key at the same time.

27 Evidence saving continued Open up Microsoft paint.


29 Click on Edit Click on Paste File will then paste onto screen


31 Internet Predators

32 Hi, You sound real cute!! How old are you and what do you like doing after school?

33 I am 14 and a bit of a fitness fanatic, I often go power lifting after school. Do you want to meet?

34 Insight into Predators Only 18% of youth use chat rooms, however, majority of crimes initiated in chat rooms 82% of online sex crimes against minors used the victims social networking site to find likes and dislikes 65% of the offenders used victims social networking site to gain home and school information Majority of victims between % were girls Solicitations occur in Chatrooms (37%), I/Ms (40%), other including gaming devices (21%)

35 What you do reflects on you…forever Teen brains are still developing and they cant control all of their impulse behaviors Not thinking about implications of pictures What about future employers? College applications? Police investigations? Schools? A recent study by ExucuNet, 83% used web searching as a part of the job applicant-screening process. 43% eliminated applicants

36 Check History HISTORY ICON



39 Tools to Use: Filtering and blocking software Time monitoring Software Key Logging /Key Stroking Software Net Nanny Web Watcher McAfee Safe Watcher Profil Parental watcher 2 PC Pandora Family Protector Spytech SpyAgent eBlaster Spector Pro Phone Sheriff (Mobil devices)

40 Parenting = Values and Standards Safe internet behavior starts in the real world, with focus on imparting values and standards Help them understand their actions can cause harm to people, even if they cant see them. Help them to learn ethical decision making. Challenge unhealthy values and standards

41 Staying Safe Online: A Young Person's Contract 1. I will ALWAYS tell a parent or another adult immediately, if something is confusing or seems scary or threatening. 2. I will NEVER give out my full name, real address, telephone number, school name or location, schedule, password, or other identifying information when I'm online. I will check with an adult for any exceptions. 3. I will NEVER have a face-to-face meeting with someone I've met online. In rare cases, my parents may decide it's OK, but if I do decide to meet a cyber-pal, I will make sure we meet in a public place and that a parent or guardian is with me. 4. I will NEVER respond online to any messages that use bad words or words that are scary, threatening, or just feel weird. If I get that kind of message, I'll print it out and tell an adult immediately. The adult can then contact the online service or appropriate agency. If I'm uncomfortable in a live chat room, I will use the "ignore" button. 5. I will NEVER go into a new online area that is going to cost additional money without first asking permission from my parent or teacher. 6. I will NEVER send a picture over the Internet or via regular mail to anyone without my parent's permission. 7. I WILL NOT give out a credit card number online without a parent present. Young Person_________________ Date______ Parent/Guardian_______________ Date______ PARENT / CHILD CONTRACT

42 Red Flags, Warning Signs Internet addiction Secretive behavior Empty history file after internet use Emotionally upset appearance during or after internet use Disturbed relationships with parents, family, and friends. Receipt of packages Subtle comments (Cyber-Safe Kids, Cyber-Savvy Teens, Nancy Willard)

43 Red Flags - Responses Subtle comment – ask them, What do you think you should do? Investigate further Calm down before talking. Initiate your discussion carefully Respond to evidence of unsafe or irresponsible use of Internet with effective discipline If you find your child is involved with an online stranger, DO NOT confront, they could erase evidence, runaway with person or alert stranger, CALL POLICE (Cyber-Safe Kids, Cyber-Savvy Teens, Nancy Willard p55)

44 Know the rules, the laws Know the rules, the laws. School Rules Terms of Use Agreements Criminal Law Threats of violence to people or property Extortion or Coercion Obscene or harassing phone calls or text messages Harassment or Stalking Gang related activity Child Pornography Sexual Exploitation Sale of an illegal substance or item Computer security violations

45 Know the rules, the laws Know the rules, the laws. Civil Law Standards Defamation Invasion of privacy Intentional infliction of emotional distress Copyright infringement

46 C.O.P.P. A. Childrens Online Privacy Protection Act 1998 States that any website trying to get ANY personal information from a child under the age of 13 MUST have parental permission. Your consent isnt necessary if the website is collecting your childs address simply to respond to a one time request for information. You may revoke consent at anytime.

47 Computer Safety Tips Use password strategies -Create alphanumeric passwords that are hard to crack and create different passwords for each account. Change passwords periodically and never give out your passwords to anyone including your friends Install a firewall -Absolutely necessary if you share-file programs, helps prevent hackers and the theft of information on your computer, Never open suspected attachments -Regardless of how intriguing they are or curious you aredelete them

48 Computer Safety Tips Be a cyber citizen -use the Internet to share knowledge and make lives better. Keep safe, use good manners and respect the laws Do not open from unknown sources -delete them especially ones with exe extensions Back-up -use external media Security -Evaluate security setting at least twice a year and use security patches, Use security patches and check for virus updates

49 Computer Safety Tips Anti-virus software - get regular updates. Viruses are always changing Sharing access to your computer - DONT! Disconnect -When not using the Internet, shut down or cut off the Internet connection

50 Resources / Links

Download ppt "Cyber Safety: Keeping Your Kids Safe in a High Technology World Crime Prevention Bureau Thousand Oaks Police Department Sgt. Eric Hatlee"

Similar presentations

Ads by Google