Presentation is loading. Please wait.

Presentation is loading. Please wait.

Norwalk Police Department Community Services & Crime Prevention Unit Partnered with the National Center for Missing & Exploited Children and Federal Bureau.

Similar presentations


Presentation on theme: "Norwalk Police Department Community Services & Crime Prevention Unit Partnered with the National Center for Missing & Exploited Children and Federal Bureau."— Presentation transcript:

1

2 Norwalk Police Department Community Services & Crime Prevention Unit Partnered with the National Center for Missing & Exploited Children and Federal Bureau of Investigation Presented by Sergeant Andre Velez Norwalk, CT Police Department

3 INTERNET SAFETY Preventing Cyber-Bullying and Cyber- Stalking Norwalk Police Department Sergeant Andre Velez Crime Prevention Unit Presented By:

4 Outline How Children Get In Trouble Online How Children Get In Trouble Online Cyberbullying Cyberbullying Computer Intrusions Computer Intrusions Copyright Infringement Copyright Infringement Threats Threats Online Communities Online Communities Myspace etc. Myspace etc.

5 How Children Get In Trouble Online

6 How can kids get in trouble Cyber Bullying Cyber Bullying Online Harassment/Stalking Online Harassment/Stalking Computer Intrusions (hacking) Computer Intrusions (hacking) Copyright Infringement: Copyright Infringement: duplication/distribution of commercial software, MP3s, etc. duplication/distribution of commercial software, MP3s, etc. Threats against schools or others Threats against schools or others (themselves)

7 What is Cyberbullying?

8 What is Cyberbulling? (cyberbullying, cyber-bullying, online bullying) Definition: Definition: Cyber bullying is willful and repeated harm inflicted through the medium of electronic text. Cyber bullying is willful and repeated harm inflicted through the medium of electronic text. Like bullying, cyber bullying involves recurring harm and can be distinguished from peer harassment as a subset of aggressive behavior because bullying represents a pattern of behavior committed over a period of time. Like bullying, cyber bullying involves recurring harm and can be distinguished from peer harassment as a subset of aggressive behavior because bullying represents a pattern of behavior committed over a period of time.

9 The anonymity, ease of provocation, and almost infinite source of targets means the Internet is full of predators from pedophiles targeting children to serial bullies targeting... anybody.

10 Cyber Bullying Cyber Bullies use electronic information and communication devices such as: E-Mail E-Mail Instant Messaging (IM) Instant Messaging (IM) Text Messages Mobile Phones Pagers Online Gaming Defamatory websites Defamatory websites to bully or otherwise harass an individual or group through personal attacks or other means. to bully or otherwise harass an individual or group through personal attacks or other means.

11 37% of teens online have used IM to write something that they would not have said in person Source: Childnet International

12 Threats It is against the law to use the Internet to: It is against the law to use the Internet to: make threats to do harm to anyone make threats to do harm to anyone Make threats to damage anyones property Make threats to damage anyones property Make threats to damage anyones school Make threats to damage anyones school

13 Illegal Computer Access (Hacking) It is against the law to: Use the Internet to access someone elses computer without their permission. Use someone elses Internet account without their permission. Use someone elses Internet password without their permission.

14 Software Piracy Public Domain: no copyright, can be copied and distributed Public Domain: no copyright, can be copied and distributed freely. freely. Freeware: has copyright. Can be distributed without advance Freeware: has copyright. Can be distributed without advance payment but donations may be requested if used. payment but donations may be requested if used. Shareware: copyrighted. Can be distributed without advance Shareware: copyrighted. Can be distributed without advance payment but expectation of payment if used. payment but expectation of payment if used. Licensed software: copyrighted. Expectation of payment prior to Licensed software: copyrighted. Expectation of payment prior to use. use. License Restrictions: per machine. Home/office License Restrictions: per machine. Home/office Criminal and civil law violations. Bottom line? If the software costs money, and you are using it in violation of the user agreement, its stolen...

15 Chat Rooms & Instant Messaging

16 Chat Rooms People in chat-rooms can talk anonymously and say anything they choose. Fact v. Fiction People in chat-rooms can talk anonymously and say anything they choose. Fact v. Fiction Some sites require its users to provide info such as name, address, e-mail, likes/dislikes and info on family & friends as the cost of participation. (Keep personal safety and responsibility in mind) Some sites require its users to provide info such as name, address, e-mail, likes/dislikes and info on family & friends as the cost of participation. (Keep personal safety and responsibility in mind) Areas where people can meet on-line to exchange ideas, information and be educational. Areas where people can meet on-line to exchange ideas, information and be educational.

17 Instant Messaging Instant Messaging (IM) Instant Messaging (IM) A real time conversation where the 2 people communicating are seeing their responses immediately. A real time conversation where the 2 people communicating are seeing their responses immediately. Commonly referred to as Commonly referred to as IM IM Chatting Chatting

18 Consider this when Instant Messaging Choose an non identifiable, non gender specific screen name Choose an non identifiable, non gender specific screen name Never give out any personal information. Never give out any personal information. real name, telephone or cell phone number, mailing address, passwords, real name, telephone or cell phone number, mailing address, passwords, Never accept files or downloads from people you don't know or from people you do know, if you werent expecting them. Never accept files or downloads from people you don't know or from people you do know, if you werent expecting them. Never arrange to meet someone offline that you only know through IM conversations. Never arrange to meet someone offline that you only know through IM conversations. Know how to save copies of your IM conversations. Know how to save copies of your IM conversations.

19 Information You DO NOT want to tell Strangers Full Name Full Name Nicknames Nicknames DOB DOB Hair color Hair color Eye color Eye color Personality Personality Siblings & Their Ages Siblings & Their Ages Location Location School School Future School Future School Best/Close Friends Best/Close Friends Online Best Bud Online Best Bud Pets & Their Names Pets & Their Names Stupidest Thing You Ever Did Fav color Fav Food Least Fav Food Funniest person(s) you know (or wish you knew) Fav Vacation Spot, Fav. Thing To Do In The Summer Fav Thing To Do In The Fall Fav Thing To Do In The Winter

20 Information You DO NOT want to tell Strangers Job Job Things you like to do Things you like to do Things you collect Things you collect Best Advice Best Advice Words or Phrases You Overuse Words or Phrases You Overuse Dream Car Dream Car Coolest Experience In Life Coolest Experience In Life Little-Known Talent You Possessed Special Skills or Talents Special Awards You Have Won Traits You Look For Most In a Guy/Girl You Want To Be Future Goals Religion (if any) Church (if any) Groups/Singers you enjoy Non- Sport Game You Enjoy Non-Sport Game Which You Excel

21 Online Communities Homepages/Webpages

22 Thinking about a Home Page? Before you create a personal page on the internet... Before you create a personal page on the internet... What are you going to include? What are you going to include? Consider all the facts before deciding to put a picture of you, your family, your friends, or any other person or thing that might be used to identify you on the Web. Consider all the facts before deciding to put a picture of you, your family, your friends, or any other person or thing that might be used to identify you on the Web. Does everyone who creates a personal page on the Internet get stalked, harassed or worse? Does everyone who creates a personal page on the Internet get stalked, harassed or worse? ***of course NOT*** ***of course NOT*** Be aware that… *Anything you put on the internet can be easily be saved forever by Strangers whom you did not intend to have. *What you post can be used to easily identify you and/or those you care about.

23 Popular Online Communities My Space A free social networking website that uses the Internet for online communication through an interactive network of photos, blogs, user profiles, groups, and an internal email system. Face Book A facebook is a book that is made up of photographs of individuals along with their names. Facebooks are often published at the start of the academic year by the administrations of colleges and universities, with the intention of helping students, faculty, and staff to get to know each other better. Xanga Xanga A free web-based journal-hosting community of online journal-hosting, based in NYC Intended for people who are at least 13 years old.

24 If only she knew where her pics would end up... MyTeenEx.com is a free site that allows browsers to view thousands of user-submitted amateur pictures. MyTeenEx.comamateur pictures

25 My Space.com Not what you think…

26 My space.com- My space.com- very popular place on the Internet where people network, send messages to one another, post pictures of themselves and others, and make cyber- friends. very popular place on the Internet where people network, send messages to one another, post pictures of themselves and others, and make cyber- friends. A few users of Myspace have been involved in incidents recently involving luring or enticement of minors. Myspace has also been used for cyber bullying, cyber stalking and harassment. A few users of Myspace have been involved in incidents recently involving luring or enticement of minors. Myspace has also been used for cyber bullying, cyber stalking and harassment.

27 Lets look at someones my space profile – (the actual screen name is blocked out below) He calls himself, Danny http://www.myspace.com/phuckuuphuckingphuck http://www.myspace.com/phuckuuphuckingphuck

28 Heres Dannys profile…he likes poetry, plants, flowers and watching movies by the fire.

29 Danny loves his country and is here for dating, serious relationships, friends and networking. So far he has 14 friends listed

30 Danny has posted some pics of his tatoos. Says here that he is looking for a girlfriend!

31 Lets look at another web site………………………… how about … www.azsexoffender.org State of Arizona, government-operated sex offender registration site.

32 Hey! Theres Danny. Surprise! His myspace page never mentioned that he is a level 3, high-risk sex offender.

33 Did You Know? Employers and Colleges are now checking the internet to include Myspace.com, for profiles and web pages of applicants Employers and Colleges are now checking the internet to include Myspace.com, for profiles and web pages of applicants Also these employers and colleges can and will deny employment or admission based on information you place on the internet if they believe your character comes into question. Also these employers and colleges can and will deny employment or admission based on information you place on the internet if they believe your character comes into question. Bottom Line watch what you place on the internet for everyone to see. Bottom Line watch what you place on the internet for everyone to see.

34 Dangers of the Internet

35 Some Risks of Getting Online Distribution of Pornography Distribution of Pornography Sexual Predators Sexual Predators Misinformation and Hidden Messages Misinformation and Hidden Messages Loss of Privacy Loss of Privacy Cyber bullying/Harassment/Stalking Cyber bullying/Harassment/Stalking Development of Childhood Behavior Disorder Development of Childhood Behavior Disorder

36 Resources Who can I call for help?

37 National Center for Missing and Exploited Children 24 Hour hotline 1-800-THE-LOST 24 Hour hotline 1-800-THE-LOST CyberTipLine: www.missingkids.com CyberTipLine: www.missingkids.comwww.missingkids.com Norwalk Police Department www.norwalkpd.com www.norwalkpd.com 203-854-3000 or your local Police Local CSP State Police Barrack FBI New Haven 600 State Street New Haven, Connecticut 06511-6505 newhaven.fbi.gov (203) 777-6311 newhaven.fbi.gov ***Always dial 9-1-1 in case of an emergency

38 Sgt. Andre Velez Norwalk Police Department Community Services Division Crime Prevention Unit Tel # 203-854-3197 Email: avelez@norwalkct.orgavelez@norwalkct.org Thank You!


Download ppt "Norwalk Police Department Community Services & Crime Prevention Unit Partnered with the National Center for Missing & Exploited Children and Federal Bureau."

Similar presentations


Ads by Google