Presentation is loading. Please wait.

Presentation is loading. Please wait.

Social Networking Sites Trends Resources Challenges Dangers Preservation & Collection 2C3CONF07-EC.

Similar presentations


Presentation on theme: "Social Networking Sites Trends Resources Challenges Dangers Preservation & Collection 2C3CONF07-EC."— Presentation transcript:

1

2 Social Networking Sites Trends Resources Challenges Dangers Preservation & Collection 2C3CONF07-EC

3

4 4 Social Networking Site –Place where people create and share information with each other “Virtual communities” –An “online local hangout” where like minded people meet C3CONF07-EC

5 5 MySpaceFacebookHi5XangaLivejournalFriendsterYahoo 360 MSN Spaces TaggedPiczoYoutubeFlickrFrapprZogo.comMeebo Club Penguin 5C3CONF07-EC

6 6 Risk of being judged is diminished Greater opportunity to find “like minded” people Unlimited number of people in your community – Socialize with people throughout the world SNS is a place to be found! C3CONF07-EC

7 Users can post personal information -name, location, age, school, interests Friends Communication between users Blog or Journal Can create and upload content - photos, videos, music 7C3CONF07-EC

8 8 Although Blogs are [essentially] thoughts or comments added to a user’s page, it offers a lot more: Updated regularly (Time & Date Stamped) –How valid is this information Friends tend to share more information about you than you had intended on others knowing Great tool for acquiring information about a person –(by friend or foe) Provides for an endless link to other possible victims. C3CONF07-EC

9

10 Social Networking Sites (SNS) Distribution of Child Pornography – Self created images Defamatory Websites Use of Anonymizers Craigslist – Teenage Prostitution 10C3CONF07-EC

11 Pew Internet Survey, % of online teens keep a blog 38% of teens read the blogs of others Older girls lead the blogging activity Teen bloggers are tech-savvy & heavy internet users 11 C3CONF07-EC

12 12 1 As of Sept C3CONF07-EC

13 13 – In 2006, one (1) in seven (7) children received unwanted online requests: – Engage in sexual activities – Provide intimate sexual information. – “No decrease” in aggressive sexual solicitations (where the solicitor asked to meet the child in person, called the child on the phone, or sent the child mail, money, or other gifts offline-compared to a 2000 study) – In more than half of the cases, the child did not tell anyone. Online Victimization: Five Years Later, 2006 C3CONF07-EC

14 14C3CONF07-EC

15 15 1.Abuser data based upon victim information submitted to NCMEC by law enforcement, as of March 31, “Unknown to Child” includes un-established relationships, i.e. photographers, child sex tourism, runaways, etc. 3.“Online Enticement” includes either (1) victims who met a perpetrator online and transmitted self-produced images or (2) victims and offenders who met online and then met offline, producing images. 4.“Self-produced” includes those victims who have produced and distributed images of themselves C3CONF07-EC

16 16 Online Victimization: Five Years Later, 2006 Victim Age C3CONF07-EC

17

18 How does anonymous surfing work? A proxy server facilitates communication between a computer and a web site. Your computer communicates with an anonymous proxy server, and the anonymous proxy server speaks to the web site. Locally, it appears that your computer only communicated with the proxy server. 18 C3CONF07-EC

19 Proxy Servers Proxy server is a server that retrieves Web pages for you, providing only its own identity to the sites it visits. Requesting data comes first to the proxy, and through the requested proxy, the data is transmitted to you. 19C3CONF07-EC

20 Block incoming traffic from the site you wish to block. 20C3CONF07-EC

21

22 PrivacyExposure Graphic Images PredatorsProstitutionI.D. TheftCyberbullying Internet 22C3CONF07-EC

23 Electronic Bathroom Wall Fourteen year old girl reports the existence of a slanderous SNS In addition to graphic pornography, the child’s real name, cell phone number and location are prominently displayed 23C3CONF07-EC

24 24C3CONF07-EC

25 Exposure to Inappropriate Material Gangs Teen Violence 25C3CONF07-EC

26 Cyberbullying Craigslist – Prostitution Online gaming – XBOX/360 – PSP/3 – Wii – WOW (World of Warcraft) – Everquest Virtual Lives – Second life Mobile Technology – Mobile Messaging – Disposable Phones 26C3CONF07-EC

27

28 28 – Public information: Any information which is available for all to see Blog entries, images, user comments, friend lists, and public profile –Make an electronic copy of publicly available content Preserve/Save questionable material to a file C3CONF07-EC

29 Preservation & Collection –Screen Capture Cut, Copy, Paste Software –Preservation Letter Letter directed to company which you want to preserve info. –Web Site Archive Capture an entire website –Web Browser Use of other browsers reveal more information 29C3CONF07-EC

30 Internet Explorer Firefox 30 Firefox C3CONF07-EC

31 Print Screen – Located on keyboard – Captures image of what is currently displayed on screen – Placed in clipboard – When pressed, nothing seems to happen, but “ctl-V” will paste image 31C3CONF07-EC

32

33 Time of Retention vary between the ISPs 33 IP AddressPrivate MessagesDeletedUser Title MySpace90 DaysInbox=User Sent= 14 Days Trash=30 Days Profile= 10 Days IP Logs= up to 90 Days PM= unavailable Friend ID Xanga FaceBook30 DaysUser/Group ID CraigslistIf detected by staff or reported by users= Indefinitely beginning 2000 Must have “Post ID” and/or address Post ID Comcast180 DaysN/A IP Address C3CONF07-EC

34

35 Technology Familiarity Lack of understanding by those required to protect children Investigative Techniques & Strategies Same strategies employed: L.E. School Admin Vigilantes Predators Children Antiquated Laws Laws do not accurately fit the crime when dealing with computer/internet related offenses. 35C3CONF07-EC

36 36 Diminished expectation of privacy People tend to share more information online than in person Gain insight into motives Identify additional persons involved Viewing their “friends” and/or “buddy list” People who use the internet tend to use the same screen name Use of a similar screen name is common Check through various i.e. Xanga, FaceBook, Tagged,Yahoo, Gmail, etc. C3CONF07-EC

37

38 38 National Center for Missing and Exploited Children – 2 SMRT 4U™ – Don't Believe the Type – HDOP: Help Delete Online Predators – NetSmartz – NetSmartz 411 C3CONF07-EC

39 39 National Center for Missing and Exploited Children – 24 Hour hotline THE-LOST – CyberTipLine: Federal Law Enforcement Federal Bureau of Investigation Postal Inspectors Office Immigrations and Customs Enforcement Secret Service **Internet Crimes Against Children Task Force (ICAC)** C3CONF07-EC

40 40C3CONF07-EC

41 41C3CONF07-EC


Download ppt "Social Networking Sites Trends Resources Challenges Dangers Preservation & Collection 2C3CONF07-EC."

Similar presentations


Ads by Google