Presentation is loading. Please wait.

Presentation is loading. Please wait.

MGH POLICE, SECURITY, & OUTSIDE SERVICES SPECIAL INVESTIGATIONS UNIT 55 FRUIT STREET, BOSTON, MA 02114 Matt Thomas, Senior Investigator, (617) 724-3838.

Similar presentations


Presentation on theme: "MGH POLICE, SECURITY, & OUTSIDE SERVICES SPECIAL INVESTIGATIONS UNIT 55 FRUIT STREET, BOSTON, MA 02114 Matt Thomas, Senior Investigator, (617) 724-3838."— Presentation transcript:

1 MGH POLICE, SECURITY, & OUTSIDE SERVICES SPECIAL INVESTIGATIONS UNIT 55 FRUIT STREET, BOSTON, MA Matt Thomas, Senior Investigator, (617) Hour Emergency Dispatch, (617) “ LEADERS in SERVICE and PROTECTION ” INTERNET SAFETY

2 The information provided during this seminar is intended to assist you and your child(ren) with safe practices when using various aspects of the Internet. There is no guarantee that you will not be vulnerable to cyber-crime. This presentation is designed as a basis for learning. “ LEADERS in SERVICE and PROTECTION ” Disclaimer

3 If you knew that, at this moment, someone was in your home or work … … breaking in … … committing sex crimes … … committing fraud or theft … … stealing your identity … … destroying your hard work … … defaming your character … Wouldn ’ t you try to stop them??? “ LEADERS in SERVICE and PROTECTION ” A Rhetorical Question…

4 You can connect to the Internet from almost anywhere Home Work School Library Coffee Shops Cyber Cafés Video Gaming Systems Wireless Devices “ LEADERS in SERVICE and PROTECTION ” Where Do We Connect?

5 Benefits: Having the world ’ s largest library and entertainment system at your fingertips Read stories, tour museums, visit other countries, shop and do research Potential Risks: Websites containing inappropriate material Websites that are demeaning, racist, sexist or violent Hard to determine the reliability of information Tips: Use parental controls and guides Choose search engines carefully Avoid websites you determine to be inappropriate Help kids find information online “ LEADERS in SERVICE and PROTECTION ” Browsing the Internet

6 “ LEADERS in SERVICE and PROTECTION ” Using Benefits: Communicate rapidly and cost-effectively with people all over the world Ability to transmit messages, documents and photos in a matter of seconds Potential Risks: Kids can set up private accounts without permission “ Spam ” Senders can disguise themselves as legitimate businesses for illicit purposes Tips: Know the risks yourselves and discuss them with your kids Research the effectiveness of “ spam ” filters Don ’ t open from people you don ’ t know Report inappropriate to your service provider

7 “ LEADERS in SERVICE and PROTECTION ” Instant Messaging Benefits: Conversations in “ real time ” Appealing to kids who use their own lingo to communicate “ Buddy Lists ” let people know if their friends are online Potential Risks: Method used in cyber bullying, harassing and intimidation Conversations can go from innocent to sexually explicit in seconds Tips: IM only people you know in real life Use privacy settings to only allow contact from persons you know Become familiar with blocking features Learn the online lingo used in conversation

8 “ LEADERS in SERVICE and PROTECTION ” Social Networking Benefits: Facebook, MySpace, Friendster and Xanga Stay in contact with friends, family and others with similar interests Exchange IMs, , comments photos, artwork, videos and music Potential Risks: Too much personal information can be posted in “ profiles ” People pretend to be someone they are not You can ’ t rescind postings once they are sent Employers are using these sites to look for employees ’ inappropriate postings Tips: Communicate and allow access to only those people you know Use appropriate screen names so as not to attract predators Do not give out personal information and “ think before you type ”

9 “ LEADERS in SERVICE and PROTECTION ” Texting Benefits: 24/7 communication Send text messages, images and videos Potential Risks: Communication without others ’ knowledge People use cell phones to take and distribute illicit photos of themselves People use cell phones to take and distribute illicit photos of others “ Sexting ” Tips: Create rules for cell phone use Review cell phone records for any unknown numbers and late night calls Know the implications of sending sexually explicit and provocative images Remove the Internet features

10 “ LEADERS in SERVICE and PROTECTION ” Posting Videos and Photographs Benefits: Electronics allow people to post videos, photographs and audio files online Stay in touch with long distance relatives or persons travelling abroad Potential Risks: Webcam sessions and photos can easily be captured, saved and distributed Posting sexually explicit material may have legal ramifications Tips: Know your kids are using this equipment If it would embarrass you, don ’ t post it Know your camera ’ s field of vision Don ’ t post identity revealing or sexually explicit photos Know that once it is posted, you lose control of it and can ’ t take it back

11 “ LEADERS in SERVICE and PROTECTION ” Online Gaming Benefits: Easy access through a home computer or Internet-enabled game console Challenge friends, family and others around the world Many games have text, chat and/or IM functions Another type of social networking Potential Risks: You don ’ t know who is on the other end of the game Inappropriate language, threats or harassment Tips: Keep the computer or gaming console in a public area in your home Set rules for your kids Check the ratings of the games you or your kids play Review parental controls that are available

12 “ LEADERS in SERVICE and PROTECTION ” Fraud Online Auctions General Merchandise Computer Equipment / Software Adult Services Prizes / Sweepstakes “ IF IT SOUNDS TO GOOD TO BE TRUE, IT PROBABLY IS ”

13 “ LEADERS in SERVICE and PROTECTION ” Cyber-Stalking/Harassment Quick Access to Information Anonymous Medium Ability to Change Identity Quickly Types: Obsessional: obsession with the potential victim Delusional: believes the victim wants them to stalk them Vengeful: unable to let go of a relationship of any sort Victim Characteristics: New to the Internet Females Children Emotionally unstable persons

14 “ LEADERS in SERVICE and PROTECTION ” Internet Child Abductions Online Predator Profile: Married with children not at home Successful career, upper management College graduate, post graduate degree Upper-middle class lifestyle Age range of 35 and older Phase # 1: Lurk in chat rooms Find a child that is vulnerable Talk with child Gain confidence of child Chip away at parental authority Groom the child to want to leave home

15 “ LEADERS in SERVICE and PROTECTION ” Internet Child Abductions Phase # 2: Identify with child Attempt to locate child through questioning Narrowing down geographic location Phase # 3: Abduction plan started Move his/her own location closer to child Physical observation of the child Abduction location determined Actual abduction

16 “ LEADERS in SERVICE and PROTECTION ” Reality Online Predator Username: “ Sunflower ” Profile: 12-Year Old Female Photos Sent Via Chat Meeting Request During Vacation

17 “ LEADERS in SERVICE and PROTECTION ” Resources National Center for Missing and Exploited Children (NCMEC): (more online safety tips) (general information) (for reporting child exploitation) Publications: “ Keeping Kids Safer on the Internet ” “ Blog Beware ” “ Your Kids Can Fill in the Blanks, Can You? ” “ Know the Rules… Internet Safety Quiz for Adults ”


Download ppt "MGH POLICE, SECURITY, & OUTSIDE SERVICES SPECIAL INVESTIGATIONS UNIT 55 FRUIT STREET, BOSTON, MA 02114 Matt Thomas, Senior Investigator, (617) 724-3838."

Similar presentations


Ads by Google