Presentation is loading. Please wait.

Presentation is loading. Please wait.

Protecting Your Family's Soul and Safety Online Ernest Staats Technology Director MS Information Assurance, CISSP, MCSE, CNA, CWNA, CCNA, Security+, I-

Similar presentations


Presentation on theme: "Protecting Your Family's Soul and Safety Online Ernest Staats Technology Director MS Information Assurance, CISSP, MCSE, CNA, CWNA, CCNA, Security+, I-"— Presentation transcript:

1 Protecting Your Family's Soul and Safety Online Ernest Staats Technology Director MS Information Assurance, CISSP, MCSE, CNA, CWNA, CCNA, Security+, I- Net+, Network+, Server+, A+ erstaats@gcasda.org Resources available @ http://www.es-es.net/2.htmlhttp://www.es-es.net/2.html Researched in part by Greg Brock

2 Outline Most Important Steps (establishing safe boundaries) Internet Addictions (Even “good” activities) Cyber Predators (How they work and how to protect your Family) Factors that increase Risk Online (Is your child unknowingly making him/herself a big target online?) Cyber Bullying (How it happens and what to do about it) Identity Theft (Child identity theft is a growing market) Securing Your Online Connections (Cyber Security practical tips to discovering what is going on and how to secure home computers) Social Networking (Unraveled and explained—the good and the bad) Personal Information Data Mining (How to) How Internet Filters Work (Including common ways children bypass the filter restrictions) Resources  Suggested Software

3 The Most Important Steps Set up a family agreement about computer use -- hours, accessing chat lines, revealing personal information/photographs, etc. Do not rely solely on software to block/filter content. Become familiar with chatting and search tools used by young people. Place the computer in a central location in the home, not in the kid’s room. Take the “don’t talk to strangers” message into the digital world. Define a standard for everyone's privacy.

4 The Most Important Steps Let your child know that reporting unwanted or suspicious solicitations will not lead to restrictions on computer use. Know that restricting communications to a specific list of friends may not guarantee safe communications. Be aware of restrictions at other computer locations – school, library, and friends’ homes. Look for the warning signs of offender manipulation – secretive behavior, histories being deleted, unexplained telephone charges, hang-up calls, unexpected mail (gifts), indications that the home is under surveillance. Know how to monitor Internet use in a variety of ways.

5 Internet Addiction According to the Kaiser study, 8-18 y/o get an average total media exposure of 8.5 hrs/day. 75% had Internet access; only 46% had household media rules. Internet has provided a social, interactive refuge during difficult times within the family. Addictive Internet use is NOT simply in reference to specific Internet content. Consider the time spent obtaining/exchanging information, chatting, Internet gaming/gambling, doing homework/work, researching, religious studies, etc.” (10)

6 tend to be young females  “Recent 2004-2005 research indicates that addicted Net-geners tend to be young females. Young females are also increasingly outgoing and emotionally uninhabited when accessing the Internet. Introverted males expressed an enhanced reliance upon the Internet to have their social & sexual needs met. Empirical data (2005) from a conservative, Christian college notes that 75% of males and 25% of females have intentionally accessed Internet pornography.” (10) Internet Addiction

7 “ Stanford University’s(2006) survey suggests that it’s not an isolated issue. Gambling and pornography sites are just one part of the problem. Other sites–chat rooms, shopping venues and special- interest Web sites–are also proving impulsively habit-forming.” “Internet becomes a problem when it isolates, substituting for a real social life.” Taiwan (2005) college-age online game players experienced increased social anxiety and depression. Addictive qualities: unique neurochemistry/neuropathology involving 3 particular brain chemistries stimulating the main types of known addictive pathways: arousal, satiation, and fantasy. Similar to cocaine addiction in many physiological ways. Monthly pornographic downloads (peer-peer P2P): 1.5 billion (35% of all downloads)”.” (10)

8 Cyber Predators Befriend Lure Make contact- that is their goal

9 Befriending Techniques Chat room, IM, networking sites, blogs Portrays same age, same likes, same dislikes Portrays age-typical awkwardness Begins to share some secrets Email Telephone (which can be faked) Webcamming (which can be faked) Verbal Chat on Internet (which can be faked)

10 Six Steps to Luring Based loosely on the “Missing Game” available online at www.livewwwires.comwww.livewwwires.com Just like you -- befriending Develops trust –sympathizes, while reinforcing feelings of alienation Establishes secrecy -- obtain incriminating evidence Erodes barriers -- the “honeymoon phase” Direct intimidation -- guilt and threats as coercion often into meeting them or giving more information Face-to-face meeting --The truth emerges.

11 Eluding Internet Predators Keep usernames and profiles generic and anonymous  Discuss your child’s online screen name(s), profile(s), and activities. Many provide too much personal information. Ensure all screen names and profiles are non-specific, non-suggestive, and purposely vague. Avoid posting personal photos  Pictures can be altered to embarrass or humiliate. They also provide personal information that can help an Internet predator to pretend to know you, your children, and/or their friends. Always keep private information private  With just three pieces of personal information, specialized Internet search engines can be used to locate someone anywhere. Internet conversations should never include any personal information.

12 Eluding Internet Predators Keep the computer in an open area  A responsible adult should always accompany minors while they access the Internet to provide support and direction should they be confronted with an aggressive solicitation or inappropriate materials. Respect children’s privacy  Respect your child’s privacy, but make certain they peronally know everyone on their e-mail “buddy” list. Work to generate parent-child trust that supports open and honest Internet use. Ripping out the computer once they tell you they came across porn will destroy the lines of communication Be part of your child’s online experience  It can be a fun journey to explore the wonders of the Internet as a family. As computer-savvy as kids and teens are today they will certainly teach you a thing or two!

13 Indicators of High Risk More Technical knowledge than parents/spouse People who feel they are not listened too Do not feel like they are getting enough attention Do not communicate about who or what they are doing online Deleting Computer’s Internet history Minimize screen or switch to another screen quickly when someone comes in the room Unexplained phone calls Unexplained absences Unexpected gifts

14 Risky Behavior Posting Photo’s Online Meeting people online that you do not know in the real world Online accounts with suggestive names Talking about parties online Having blogs and other public online discussions (HR and college acceptance boards are now using these to screen people) Expressing heated/strong opinions

15 Understand Risk Factors 30% of teenage girls polled by the Girl Scout Research Institute said they had been sexually harassed in a chat room. Only 7 %, however, told their mothers or fathers about the harassment, as they were worried that their parents would ban them from going online. (Girl Scout Research Institute 2002) 47% of children have received e-mails with links to pornographic websites. (Symantec market research report, June 9,2003) WWKids Nearly one-third (31%) of 8- to 18-year-olds have a computer in their bedroom, and one in five (20%) have an Internet connection there. 3

16 Understand Risk Factors cont. Online teens admit that they frequently communicate with people they have never met: 54% have Instant Messaged a stranger, 50% have emailed a stranger, and 45% have participated in a chat room discussion with a stranger (Teen Research Unlimited, “Topline Findings from Omnibuss Research,” October 2005). 28% of teens said they use code words on a daily basis to hide their online conversations from their parents – example: “PIR” means “parent in room”, P9, P911, or 911(Teen Research Unlimited, “Topline Findings from Omnibuss Research,” October 2005.). WW Kids

17 Cyber Bullying Often has a stronger impact on teenagers as they have turned to the Internet because they need social affirmation Can be done by anyone speaking harshly to someone else online Can be more than a teenager can handle

18 Cyber Bullying Prevention Understand the importance of being kind and respectful to others online Don’t open/read messages from cyber bullies  Your child can’t be intimidated by messages from cyber bullies they never open. Teach your child to curb his or her curiosity to read and respond to a message they suspect or know a cyber bully has sent. Encourage your child to tell an adult  For some children, their reaction to being bullied is not only fright, but also confusion about how to react appropriately. Coach your child to tell a trusted adult if they are ever being bullied. Report cyber bullying  Internet Service Providers (ISPs) can often block a cyber bully, and schools have specific procedures and rules to handle bullying. Save the bully’s message and screen name, then contact and report it.

19 Cyber Bullying Prevention No chatting while angry  Sending angry, hostile, or taunting messages attracts cyber bullies. Make certain your child is not using e-mail messages or chat rooms to vent their own anger in a way that hurts others. If you are threatened with harm, tell the police  Even if you don’t know how to identify the individual who has made the threat, law enforcement often has access to the information and may be able to track down and arrest them before they do more harm. Be part of your child’s online experience  It can be a fun journey to explore the wonders of the Internet as a family. As computer-savvy as kids and teens are today, they may even teach you a thing or two!

20 Identity Theft Any request for information that comes in email is to be suspect. Call your bank or credit card company first, and do not click on the link. Do not use the phone number sent in the email. Any phone request for more info is also suspect. So question them first and hang up. Then call the institution to make sure they were calling (be careful of any information given out). Check the website before you do business with them. Make sure the SSL connection is good.

21 Identity Theft Protection Monitor your and your child’s credit report regularly  Obtain your credit report at least once a year by phoning either Equifax, Experian, or Trans Union, and look carefully for any unusual or fraudulent activity. Their contact information is on the Internet. Check for FREE at www.annualcreditreport.com/ www.annualcreditreport.com/  Child ID theft is a large and growing market. CNN September 14, 2006 Beware of all requests for your personal information online  Criminals copy logos perfectly to trick you. Legitimate companies never send unsolicited requests for personal information. Never give out personal information unless you initiate the correspondence. Shred documents before putting them in the trash  Bank statements, credit card offers, utility bills, and documents with Social Security or account numbers can be retrieved by ID thieves from your trash, so make a habit of tearing them up before tossing them.

22 Identity Theft Protection Install a locking mailbox or use the post office  Criminals often obtain the information they need by intercepting mail in unlocked street mailboxes. Only send and receive bills, checks, or other personal correspondence from a secure location. Limit the amount of personal information you carry in your purse or wallet Protect your information online by using a firewall, virus protection, and secure Internet browser. Place a fraud alert on your credit  If you have lost your wallet, purse, Social Security card, or passport, or suspect you are a potential victim of ID theft, contact each of the three credit bureaus (Equifax, Experian, and Trans Union) for assistance.

23 Securing your Online connections 1. Protect your personal information-- Don’t reply to or click on links in any email asking for your personal information. 2. Know who you’re dealing with -- When shopping online, look for a seller’s physical address and a working telephone number. Before downloading free software, read the fine print —some downloads come with spyware. 3. Use anti-virus software and a firewall, and check for updates daily. 4. Be sure to set up your operating system, applications and Web browser software properly, and update them regularly (configure windows/Linux/MAC’s to run automatic updates).

24 Securing your Online connections 5. Protect your passwords. Keep your passwords in a secure place, and don’t share them on the Internet, over email, or on the phone. (use long passwords) (put one on your administrator account) 6. Back up and consider encrypting important files. If you have important files stored on your computer, copy them onto a removable disc, and store it in a safe place. 7. Remember being online is the same as being in the worst high crime neighborhood so be street smart when online. 8. Secure your wireless connections; see more info at www.es-es.net www.es-es.net 9. Turn off unnecessary services 10. Turn off file and print sharing if you do not need them

25 Check Files on Computer Look at the online handout on how to check computer history files to find what has been surfed. Also check the settings and documents in My documents to see what is on their account.online handout Undelete files with Restoration or PC Inspector File recovery to find out what your child has deleted. Look for files in the recycle bin and ones that have been deleted.RestorationPC Inspector File recovery

26 Networking Sites Myspace has twice the number of views Google gets a day, for a total of almost 13 million a day. To put that in perspective, that’s 4,475 views a second. 5 Myspace gets 150,000 new users a day, the vast majority of whom (90%) are people claiming to be between 14-24 years old. 5

27 Social-Networking Sites Risks The Good “"A shy kid who has a terribly hard time expressing himself one-on-one may be much more comfortable conversing online.” Likewise, teens facing difficult issues… can get support online from others in the same situation.” 14

28 Social-Networking Sites Risks The BAD “These networking sites are a perfect predator's playground. Predators can troll through (SNS) and look for pretty faces that they like and get all the information they want. The police we work with tell us that when a predator starts grooming a child, he looks for vulnerability, and with a diary or blog right there, he's already gotten past the first stage.” 13

29 Data mining training course Online Know what is on the Net about you and your family. Go to: www.htcia.org Archived Webcasts. Registration is free. Sites to check for private information: www.google.com www.anybirthday.com www.myfamily.com www.zoominfo.com www.alltheweb.com www.zabasearch.comily

30 Data Mining With Google Google search String  Site:myspace.com “SSN”  Site:myspace.com “birthday”  Site:myspace.com “I want to be raped”  Site:myspace.com “Hate my parents”  Site:myspace.com "phone number"

31 Software Filtering  Software analysis; Keyword searches (usually) cannot interpret graphics. Software analysis alone may not catch a “donkey sex” picture page if that page doesn’t contain prohibited words. Keyword searches cannot use contextual information. A page on the Mars Explorer blocked because it contains “sex.”  Human analysis; and/or The lists of filtered sites will always be incomplete. “Bad” sites may not be blocked simply because they haven’t been added to the stop list yet. Stop lists are vulnerable to the personal biases of the people compiling the list. “Good” sites may be blocked simply because of that site’s “politics” (like the Vatican and Quaker Web sites, both of which have been blocked in the past.)  Site labeling Internet Content Rating Association (ICRA). Site labels are determined by the site’s owners. Owners can lie about their content or even refuse to rate their site. If a site isn’t rated, it probably won’t be blocked by ICRA.

32 Bypassing Filters  Go to AltaVista’s BabbleFish site. Key in the URL of a porn site and ask Babblefish to translate it into English (even though the site is already in English).  Changing their browser’s proxy Using an anonymizer: Use Google to find CGI proxies which are harder to control than common php proxies; highschoolproxy.com, and too many others.  Use software to find and destroy filtering software on local PC’s.  Turn off filtering software on local PC.  Conducting picture searches at Google, AltaVista, or other search engines including UK version of the search engine  THE TRUTH IS THAT FILTERING SOFTWARE KIND OF WORKS AND KIND OF DOESN’T.

33 Resources All resources and more at my website (Bottom of Page) http://www.es-es.net/2.html  Chat Abbreviation -PDF- Download Download  Cleaning Your Windows Computer -PDF- Download Download  Free Software for Home Users -PDF- Download Download  How to Check Your Computers History -PDF- Download Download  I-Educator -PDF- Download Download  Internet Safety for Kids -PDF- Download Download  Internet terms -PDF- Download Download  Internet Safety Plan -PDF- Download Download  Internet Safety Tips for Parents -PDF- Download Download  Secure Mac step by Step -PDF- Download Download  Tracking People around town -PDF- Download Download Internet Safety for Kids link list  www.packet-level.com/Kids is very graphic www.packet-level.com/Kids  www.webwisekids.com has excellent resources for parents. www.webwisekids.com

34 Resources Blocking/Filtering-  WebWatcher is a web site monitor, a chat recorder, an invisible key logger, and an automated screenshot capture tool. It also has the rare ability of both effective blocking and monitoring. No Peer to Peer blocking (web accessible)  Specter Soft: check from email

35 Resources MySpace Tracking BeNetSafe™ 12 Features Include:  Automated technology tracks your children's activities online.  Red flags activities that may be dangerous. Compatible with popular teen sites such as MySpace and Xanga.  Nothing to download. Simply sign in online!  24/7 monitoring to chaperone your children when you can't. Works with any computer or operating system.

36 MySpaceWatch.com 12 MyspaceWatch.com is a service that allows you to monitor login activity, track profile changes, and keep a running history of up to 5 myspace.com profiles. Are you a parent who banned your child from myspace only to see that they keep logging on, or are keeping multiple accounts? Free Account Sign Up Now  Monitor 1 profile  Profile is crawled twice daily  View up to 25 of a profile's friends Pro Account Sign Up Now  Monitor up to 5 profiles  Profile is crawled every 6 hours  View up to 100 of a profile's friends

37 SafeSpacers.com 12 They offer: Anonymous Monitoring of your child’s MySpace Profile. The kids will have no idea someone is watching and reporting on their profile. Receive periodic reports rating critical areas of potential dangers. In the report, the parent will be informed of the concerns found on the profile (ie. sex, drugs, smoking, drinking, inappropriate pictures, too much information, possible pedophile contact, etc.) Immediate email alerts to parents if a pedophile is in contact with your child. Know what your child is doing on MySpace, without being a snoop. We use a method of Positive Peer Pressure to push your kids to be safer! We contact them with our own personal MySpace profiles. That way, it’s coming from a peer and not an adult or company.

38 Safe Spacers Sample Report Hello Mrs. Smith, We have observed your child's MySpace profile from 01/01/2006 to 02/01/2006. Below is a list of ratings and comments based on their profile. LEVELS: Personal Info: 3 1 = Perfectly Fine 2 = Problem 3 = Way too much info Possible Sex: 3 1 = No problem 2 = Potential Danger 3 = Suspected Problems 4 = Clear Danger 5 = Authorities Need Contacted Picture Dangers: 3 1 = Perfectly Fine 2 = A little concern, but fine 3 = There is a problem 4 = Pictures of drugs and alcohol 5 = Sexually Explicit Pedophile Dangers: 3 1 = No problem 2 = Potential Danger 3 = Suspected Problems 4 = Clear Danger 5 = Authorities Need Contacted Overall: 3 1 = Perfectly Safe 2 = Normal MySpace User 3 = Has some issues 4 = Needs Talking To 5 = Not Safe at All Smoke: No Drink: Yes Drugs: Possible Notes: Lauren seems like a nice girl. Most of her friends however are between the ages of 18 and 22 and are male. She claims not to drink, but in a blog she did post that if given the choice, she would chose hard liquor over beer. The majority of her friends boast about drinking (a lot of them are underage). One major concern is the amount of information Lauren posts on her profile. We counted 3 separate self quizzed totally over 342 facts about her. She has way too much information about herself on her profile. Another concern is her pictures on her profile. She has an image of her looking seductive in a towel and another in a bikini. Luckily, it doesn't seem that she has friended any potential pedophiles. She is, however, a very easy target. We recommend sending your child a SafeSpacers message via MySpace. It is a safety message from one peer to another. We will let your child know that they are being unsafe while using their profile. We will not let them know you, the parent, are involved. We then recommend continuing our service to make sure your child stays safe and doesn’t become a potential target for pedophiles.

39 Carbon:  Open the lines of communication Hardware:  USB Trackers-  Phone Trackers- Extreme Measures

40 Software:  Spector Pro is used for monitoring and recording every detail of PC and Internet activity – in your home or in your office.  Selected as the Editors’ Choice by the experts at PC Magazine, Spector Pro records every detail of what they do on the computer – their chats, instant messages, emails, the web sites they visit, what they search for, what they do on MySpace, the pictures they post and look at, the keystrokes they type, the programs they run.  It’s advanced surveillance screen snapshot features, you get to see not only WHAT they do, but the EXACT order in which they do it, step by step

41 Check Files on Computer Look at online handout on how to check computer history files to find what has been surfed. Also check the settings and documents in My Documents to see what is on their account.online handout Undelete files with Restoration to find out what your child has deleted. Look for files in the recycle bin and ones that have been deleted.Restoration http://www.es-es.net/2.html

42 Software Recommendations Firewall – Sunbelt Kerio http://www.sunbelt- software.com/Kerio.cfm (Better than Microsoft’s Firewall) http://www.sunbelt- software.com/Kerio.cfm Anti-Spyware Windows boot issues-- Windows Defender from Microsoft or Spybot Search and Destroy Internet Filter – K9-(free) or Watcher Filter; No P2P blocking Antivirus software AVG (Free) does a good job Laptop Security– Come to My Wireless Session on Thursday Encryption software – True crypt for lots of options, or Dekart for simplistic use. http://www.dekart.com/ http://www.dekart.com/

43 Software Recommendations Disk defragmenter– Auslogics Disk Defrag or Power Defragmenter GUIAuslogics Disk Defrag Power Defragmenter GUI System Cleaner – CCleaner (Free) Gets rid of old Internet application, temporary files, and registry files that are junk. File recovery– PC Inspector File recovery or File Scavenger ($50) Even after reformat and reinstall of Windows, files were still recovered.PC Inspector File recovery Anti-Spyware – A-Squared (free) Good at detecting new forms of spyware (heuristic scan).

44 Software Recommendations Root Kit finder – Blacklight (Free)-- Excellent root kit finder and cleaner Manage Windows installs better – nLite (free)-- install Windows with all service packs and options and CD key on the fly Spam filter (Free)-- works in the background and does a good job of filtering out spam and tagging it as such then you decided what it does with spam Backup software – SyncBack (free or $25.00 for all the options)-- Excellent backup software for a great price. Lots of options in the paid version, including FTP and encryption 256 AESSyncBack

45 Important Statistics 1. Send or read email 92% 6. Get news 68% 2. Surf the Web for fun 84% 7. Play or download a game 66% 3. Visit an entertainment site 83% 8. Research a product or service before buying it 66% 4. Send an instant message 74% 9. Listen to music online 59% 5. Look for info on hobbies 69% 10. Visit a chat room 55% Top 10 things youth do on the internet 7

46 “Something is radically wrong when the local church rejects a person accepted by Jesus…Any church that will not accept that it consists of sinful men and women, implicitly rejects the gospel of grace. It neither deserves God’s mercy or men’s trust… And though it is true that the church must dissociate itself from sin, it can never have any excuse for keeping sinners at a distance. If a church remains self righteously aloof from failures, irreligious and immoral people, it cannot enter justified into God’s kingdom”. Brennan Manning, The Ragamuffin Gospel (10) Assistance, Not Condemnation

47 Bibliography 1. Tapscott, The N’ Generation, 1998: 1-2. http://www.amazon.com/gp/product/0071347984/103-7584413-9423004?v=glance&n=283155 2. World Youth Report 2005 http://www.un.org/esa/socdev/unyin/wyr05.htm 3. The Henry J. Kaiser Family Foundation Study, 3/05 4. Kaiser Family Foundation http://www.kff.org/ 5. Numsum Myspace Stats www.numsum.com 6. Media Central “The Buzz” 7. http://www.pewinternet.org/pdfs/PIP_Teens_Report.pdf http://www.pewinternet.org/pdfs/PIP_Teens_Report.pdf 8. The National Youth Agency www.nya.org.uk 9. The Search Agency http://www.thesearchagency.com/ResourceLibrary/search_engine_stat.aspx?sCatId=2 10. Internet Addiction by Wendi Kannenberg http://gien.adventist.org/forum2006/presentations/kannenberg-online-addictions.pdf http://gien.adventist.org/forum2006/presentations/kannenberg-online-addictions.pdf 11. Internet Safety for Kids www.packet-level.com/kids 12. US News and World Report – Special Report- September 18,2006 www.usnes.com 13. 'Predator's Playground‘?‘ http://www.msnbc.msn.com/id/11065951/site/newsweek/ 14. Decoding MySpace http://www.usnews.com/usnews/news/articles/060910/18myspace_5.htm http://www.usnews.com/usnews/news/articles/060910/18myspace_5.htm


Download ppt "Protecting Your Family's Soul and Safety Online Ernest Staats Technology Director MS Information Assurance, CISSP, MCSE, CNA, CWNA, CCNA, Security+, I-"

Similar presentations


Ads by Google