Protecting our families on the internet


Published on

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • “Be sober, be vigilant; because your adversary the devil, as a roaring lion, walketh about, seeking whom he may devour:”—(1 Peter 5:8)Scott Ritter was arrested in November 2009 over communications with a police decoy he met on an Internet chat site. Police claim that he showed himself in lewd behaviors via a web camera after the officer said she was a 15-year-old girl. Charges included "unlawful contact with a minor, criminal use of a communications facility, corruption of minors, indecent exposure, possessing instruments of crime, criminal attempt and criminal solicitation." Ritter faces up to seven years in prison.Not the first time he was arrested. Ritter was arrested in April 2001and again in June 2001 in connection with police stings in which officers posed as under-aged girls to arrange meetings of a sexual nature. The first incident did not lead to any charges. He was charged with a misdemeanor crime of "attempted endangerment of the welfare of a child" after the second, but charges were dropped and the record was sealed on condition that he avoid further trouble for a period of time.Shortly after Ritter’s news, I was waiting for Sue and Tori after a Sunday evening service. While waiting, I chatted with the mom of one of the teens in the youth group. I’m not sure how we got onto the subject, but she expressed her frustration over not knowing enough about technology to adequately protect her children on the internet.Over the next few days, I couldn’t stop thinking about her comments and went to prayer asking God what could I do about it. God has blessed me with a 25-year career in information technology. At least one of the hats I’ve worn over during my career is that of an information security officer for one of Pfizer’s divisions. The heads of the corporate information security council were retired FBI agents. I learned a lot at Pfizer about protecting people’s safety from electronic threats and have applied some of the principles I’ve learned in our own home. As I continued in prayer, the idea for this class came through loud and clear. I sent Pastors Vradenburgh and D’Angelo an email explaining what was on my heart and what I could do to address the problem of internet safety. I heard back from Pastor V. within an hour with his blessing to move forward. That was just a little over a month ago. I never expected Pastor to schedule this so quickly, but I think it punctuates how important he believes this topic is. I want to share my heart for a moment (timing, upcoming revival, Aiken prayers)
  • Susan Herring, Professor of Information Science, Adjunct Professor of Linguistics, School of Library and Information Science, Indiana University, Computer Mediated Discourse
  • Protecting our families on the internet

    1. 1. Friendship Baptist Church<br />Protecting Our Families on the Internet“Be sober, be vigilant; because your adversary the devil, as a roaring lion, walketh about, seeking whom he may devour:”—(1 Peter 5:8)<br />
    2. 2. Agenda<br />Introduction<br />Family Internet Covenant<br />10 Clues To Detect Broken Family Rules<br />Law Enforcement Resources<br />Parental Control Tools<br />Home Network Security<br />Cell Phone Controls<br />Resources for Parents<br />2<br />
    3. 3. Introduction<br />Recent Headlines: Former United Nations Weapons Inspector Scott Ritter<br />National Center for Missing & Exploited Children (NCMEC)<br />Congress authorized CyberTipline, launched March 1998, operated in partnership with:<br />Federal Bureau of Investigation (FBI)<br />Department of Homeland Security’s Immigration and Customs Enforcement (ICE)<br />U.S. Postal Inspection Service (USPIS)<br />Internet Crimes Against Children Task Forces (ICACs)<br />U.S. Secret Service (USSS)<br />U.S. Department of Justice’s Child Exploitation and Obscenity Section (CEOS)<br />Other international, state, and local law enforcement<br />3<br />
    4. 4. CyberTipline Statistics<br />As of October 2009:<br />4<br />
    5. 5. Studies Show…<br />90% of kids between 8-16 have accidentally stumbled onto a pornographic website, usually while doing their homework<br />79% of unwanted pornography exposure occurs at home<br />64% of teens say they do things online that they don't want their parents to know about<br />5<br />
    6. 6. What is Cyberbullying?<br />The National Crime Prevention Council defines cyber-bullying as: “when the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person”<br />, an expert organization dedicated to internet safety, security and privacy, defines cyberbullying as: “a situation when a child, tween or teen is repeatedly ‘tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted’ by another child or teenager using text messaging, email, instant messaging or any other type of digital technology.”<br />6<br />
    7. 7. Cyber-bullying Statistics<br />2004 survey of 1,500 students between grades 4-8 reported:<br />42% of kids were bullied while online. 1 in 4 had it happen more than once <br />35% of kids were threatened online. 1 in 5 repeatedly <br />21% of kids have received mean or threatening e-mails or other messages. <br />58% of kids admit someone has said mean or hurtful things to them online. More than 4 out of 10 say it has happened more than once. <br />58% have not told their parents or an adult about something mean or hurtful that happened to them online. <br />A 2006 survey by Harris Interactive reported:<br />43% of U.S. teens experienced some form of cyberbullying in the past year. <br />Similarly, a Canadian study found:<br />23% of middle-schoolers surveyed had been bullied by e-mail <br />35% in chat rooms <br />41% by text messages on their cell phones <br />41% did not know the identity of the perpetrators. <br />7<br />
    8. 8. Case Study: Megan Meier<br />Missouri 13-year old Megan Meier committed suicide at home in October 2006 after receiving cruel messages, including one stating the world would be better off without her<br />She thought she was chatting with a 16-year-old boy named Josh Evans. Josh didn't exist.<br />A federal grand jury indicted Lori Drew, a 47-year old woman, on four counts of violating the Computer Fraud and Abuse Act for her alleged role in perpetrating a hoax on MySpace<br />The jury found Drew guilty of one count to a reduced misdemeanor charge. A federal judge overturned the jury’s conviction and acquitted her on his technical interpretation of the law<br />Drew lived four houses away from Megan and started talking to her via the Internet to find out what Megan was saying about her daughter, who was a former friend<br />8<br />
    9. 9. A Very Disturbing Trend…<br />The National Campaign to Prevent Teen and Unplanned Pregnancy surveyed 653 teens and 627 young adults—between September 25, 2008 and October 3, 2008<br />20% of teens and 33% of young adults send/post unclothed or scantily clad pictures/videos of themselves, mostly girls sending to boys<br />39% of teens and 59% of young adults send or post sexually suggestive messages<br />Most teens and young adults send suggestive content to boyfriends/girlfriends, others are sending to those they want to hook up with or only know online<br />A 2009 UK survey of 2,094 teens (11–18) found 38% received obscene or disturbing sexual images via text or email<br />Practice of sending via cell phone is called “Sexting” a portmanteau of “sex” and “texting”<br />9<br />
    10. 10. Legal Consequences…<br />In many countries and states, teens are charged as child pornographers or sex offenders:<br />Australia (2007): 32 teenagers prosecuted for sexting<br />Greensburg, Pennsylvania (January 2009): six teenagers charged with child pornography; 3 girls who sent the photos charged as accomplices in producing child pornography<br />Indiana’s two options: 1.) do nothing; 2.) charge child with felony and require the minor to register as a sex offender for 10 years; conviction follows them for the rest of their lives.<br />Fort Wayne, Indiana: teenage boy indicted on felony obscenity charges after sending pictures of himself to girls in his class<br />Two Ohio teenagers charged with contributing to the delinquency of minors after sending photos to other teenagers<br />Orlando, Fla: Phillip Alpert, 18, convicted as a sex offender after sending photos of his 16-year old girlfriend to dozens of her friends and family after an argument. They dated for 2 ½ years<br />10<br />
    11. 11. The Ultimate Consequence<br />Jessie Logan, a Cincinnati 18-year old committed suicide after pictures she sexted to her boyfriend were maliciously forwarded to hundreds of students in her high school after their break-up.<br />In an interview by WLTW a local Cincinnati news station, Cynthia Logan, Jessie’s mom said this about her daughter’s last words in a phone call,<br />“And she said ‘I love you madre.’ And I said ‘I love you baby and I’ll see you soon.’”<br />11<br />
    12. 12. Think it can’t happen to Christians?<br />Don’t think for one second it can’t happen in a Christian home, school or youth group<br />Pastor and former missionary<br />Schools banning cell phone use/possession<br />February 2010 Study: 1 in 4 millennials have no religion, of those who do 1 in 3 claim a strong faith (Pew Forum on Religion & Public)<br />Parents reach their kids when they:<br />Teach and model truth<br />Build relationships<br />Are authentic<br />Ask for forgiveness when they're wrong<br />“Rules without relationship lead to rebellion.”—Josh McDowell<br />12<br />
    13. 13. Dads…<br />Today’s youth readily exchange their privacy for social acceptance. (facebook, MySpace, etc.)<br />The responsibility is on us as…<br />Protectors<br />Providers<br />Nurturers<br />Correctors<br />Spiritual leaders in the home<br />“But if any provide not for his own, and specially for those of his own house, he hath denied the faith, and is worse than an infidel.”—(1 Timothy 5:8)<br />13<br />
    14. 14. Today’s Home Network <br />14<br />
    15. 15. Family Internet Covenant<br />Sets ground rules in your home to govern the use of the internet<br />Pray about it with your children<br />Fosters an open dialog<br />Strengthens your relationship with your kids<br />Matures your kids sense of responsibility and gains their buy-in<br />Demonstrates your love for them because you want to guard their hearts<br />15<br />
    16. 16. Start with “The Game Plan”<br />Start with “The Game Plan” document from<br />Collaborate with you kids and modify it to address your particular needs<br />May want to include curfews and penalties<br />Parents and children sign it when complete<br />Post it in a prominent area as a continual reminder of the covenant<br />Remember, this is a “Family” covenant. Parents need to comply as well <br />16<br />
    17. 17. Suggested Rules 1-5<br />We will never give out personal information such as our last name, address or phone number. We will not give out the name of our school, our city, our siblings, our sports team or our parent’s workplace. <br />We all agree to not give our passwords to anyone outside of our family. I will not change the settings for my computer or my password without my parent’s permission. <br />We all agree to limit our online time so that it doesn’t interfere with other activities. <br />I will never meet an online friend in person. If anyone ever asks to meet with me off line, I will notify my parents immediately. <br />I will tell my mom or dad right away if I come across something that makes me feel uncomfortable.<br />17<br />
    18. 18. Suggested Rules 6-10<br />I will not remain on or click on a page that says, “For Over 18 Years Only.” <br />I will only download pictures and files with my parent’s permission. <br />I will not send pictures of my family or myself to anyone online without my parent’s permission. <br />I will be safe everywhere and will follow the same Internet safety rules at my friends’ houses, at school and at the library that I do while I’m at home. <br />I understand that nothing is private on the Internet. I agree that my mom or dad can read my mail or check the sites that I have been visiting—because they want to make sure that I am safe.<br />18<br />
    19. 19. 10 Clues To Detect Broken Rules (1)<br />You or your child receives unusual amounts of unsolicited email or pop-ups. <br />Your child tries to block the computer screen or quickly closes the window in which he is typing. <br />Your child spends an unusual amount of time online, especially in the evenings. <br />Your child changes her password and/or will not share it with you. <br />Your child uses an online account other than her own. <br />19<br />
    20. 20. 10 Clues To Detect Broken Rules (2)<br />Your child withdraws from family or friends. <br />You discover photos of strangers on your child’s computer. <br />Your child receives phone calls from strangers. <br />Your child receives mail, gifts, or packages from someone you don’t know. <br />You discover inappropriate images or files on your child’s computer<br />20<br />
    21. 21. Parental Control Tools<br />What are “Parental Controls”?<br />Tools that allow parents to choose appropriate content for their children. Parental control software has been developed for everything from TV to the internet and cell phones. (Remember the V-chip?)<br /> ran an informative article called “Child-Proof Your Computer.” Top three “big-kid” parental control systems:<br />NetNanny 6.0<br />OnlineFamily.Norton<br />Safe Eyes 5.0<br />21<br />
    22. 22. Safe Eyes (<br />22<br />
    23. 23. Endorsed by Dave Ramsey<br />23<br />
    24. 24. Listen to what Dave has to say…<br />24<br />The Dave Ramsey video can be found here:<br /><br />
    25. 25. What Safe Eyes Does<br />Content controls: Select the types of website that are appropriate<br />Blocks unwanted email<br />Program controls: Control Instant Messengers, File Sharing, and other harmful programs<br />Time controls: Control the amount of time spent online, and the times when the internet is available.<br />Usage logging: Create and review logs of websites visited, programs used on the Internet, and Instant Messaging Chats<br />Usage alerts—Be notified instantly via email, text message, or phone call when someone visits inappropriate websites<br />25<br />
    26. 26. More Features<br />Works with PC or Mac<br />iPod version also available<br />Cost: $49.95/yr – install on up to three machines<br />26<br />
    27. 27. Alerts<br />27<br />
    28. 28. Activity with Banned Hits<br />28<br />
    29. 29. Activity with Banned Hits<br />29<br />
    30. 30. Activity with No Banned Hits<br />30<br />
    31. 31. Program Activity<br />31<br />
    32. 32. Website Posts<br />32<br />
    33. 33. Home Network Security<br />If you have a home network, you can create security policies to restrict internet access or impose time limits<br />Computers are restricted by IP or MAC address<br />Performing a firmware upgrade may erase security policies<br />Read your manual or visit your vendor’s website for instructions<br />33<br />
    34. 34. Cell Phone Controls<br />All major wireless carriers offer parental controls for their children’s phones<br />Phone must be compatible<br />Additional charges may apply<br />34<br />
    35. 35. Resources for Parents<br />CyberTipline: or 1-800-843-5678 <br />NCMEC:<br />National Campaign Survey:<br />Safe Eyes:<br />NetNanny:<br />OnlineFamily.Norton:<br />35<br />
    36. 36. What If It’s Not My Kid?<br />What would you do if you find out that one of your kid’s friends makes a post that doesn’t live up to your family’s standards?<br />Avoid immediate knee jerk reactions<br />Nothing we do can prevent immature attempts at humor, bad judgment or completely innocent mistakes<br />Turn it into an opportunity to disciple your weaker brother/sister<br />“Brethren, if a man be overtaken in a fault, ye which are spiritual, restore such an one in the spirit of meekness; considering thyself, lest thou also be tempted.” (Galatians 6:1, KJV)<br />If all else fails, and the behavior becomes pervasive, talk to the other parents and follow Mathew 18<br />36<br />
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.