Internet Safety  Technical Aids for Parents Detective Joseph J. Sorrentino Fairfax County Police Department Criminal Inves...
Why we do what we do.
First step let’s talk with our kids. <ul><li>Talk with your child about.  </li></ul><ul><li>Chatting (IM) (PC & Cell)  </l...
Who are they talking with. <ul><li>Hi asl what do u like to do? </li></ul><ul><li>14 m fx I like sports and power lifting ...
“ Trust but verify”  Former President,  Ronald Reagan <ul><li>Administrative control – Who set up your PC?  </li></ul><ul>...
Out of Sight  Access out of your control <ul><li>School-  </li></ul><ul><ul><li>May or may not have filtering </li></ul></...
Hardware Tool available to you. <ul><li>Key logger Hardware </li></ul>- a tiny circuit board that is connected in between ...
Key Logger <ul><li>Advantages:   </li></ul><ul><ul><li>Simple to use </li></ul></ul><ul><ul><li>Comes in various storage s...
Key Logger: <ul><li>Disadvantages:  </li></ul><ul><ul><li>Can only capture key strokes of the PC to which it’s attached.  ...
Filter Software <ul><li>Internet filter software gives you the ability to control content displayed, block websites and se...
Filtered Search Engines <ul><li>Filtered search engines will prevent most adult content sites from appearing in the search...
Filtered Search Engines <ul><li>Advantages:    </li></ul><ul><ul><li>Filtered searches are server-side filters, which mean...
Filtering Software <ul><li>Many companies have developed filtering software to block harmful websites from your computer. ...
Filtering Software <ul><li>Advantages:    </li></ul><ul><ul><li>Client-side filters usually offer greater flexibility for ...
Some Filter Programs  http://internet-filter-review.toptenreviews.com/
Filtering Software <ul><li>Advantages: </li></ul><ul><ul><li>Works with all browsers   </li></ul></ul><ul><ul><ul><li>Inte...
Site   http://namechk.com/
Site   http://www.yoname.com/
Understanding the lingo  <ul><li>Google  is your friend…. </li></ul><ul><li>Create a Account in a  Social Networking Web S...
In Closing <ul><li>Technology can only help in combination with good parenting skills and communication with our children....
Q u e s t i o n s ????
Upcoming SlideShare
Loading in …5
×

Internet Safety Tips from Fairfax County Police

5,533 views

Published on

Fairfax County Police offer these Internet safety tips for parents in helping to understand the evolving world of online communications.

Published in: News & Politics
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
5,533
On SlideShare
0
From Embeds
0
Number of Embeds
1,856
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • Young people are increasingly using new technologies - cell phone text messaging, chat rooms, online games, instant messaging and the Internet - as part of their regular socializing activities. An astonishing 99% of Canadian teens have access to the Internet and 70% of youth online use instant messaging to chat with friends. ( The Canadian Interactive Report: Understanding Canada and the Internet, Ipsos Reid Canada, 2004) These new opportunities to connect come with new risks of being harassed or bullied or exposed to sexual predators online. In 2003, some 25 % of girls reported having contact with a stranger online that made them feel unsafe. Cyber-bullying in the form of intimidation in chat rooms, threats and harassment through instant messages, or hateful web sites, (for example, sites that let viewers vote for the ugliest kid in school), present new challenges to keep teens safe online.
  • Internet Safety Tips from Fairfax County Police

    1. 1. Internet Safety Technical Aids for Parents Detective Joseph J. Sorrentino Fairfax County Police Department Criminal Investigations Bureau Major Crimes Division / Child Exploitation Unit Member of Internet Crimes Against Children NOVA-DC Task Force & The FBI’s Cyber Crimes Task Force . ChildSafeNet, Inc .
    2. 2. Why we do what we do.
    3. 3. First step let’s talk with our kids. <ul><li>Talk with your child about. </li></ul><ul><li>Chatting (IM) (PC & Cell) </li></ul><ul><li>Internet use, sites visited </li></ul><ul><li>E-mail </li></ul><ul><li>Unsolicited contacts, Cyber Bullying , and Identity Theft </li></ul>
    4. 4. Who are they talking with. <ul><li>Hi asl what do u like to do? </li></ul><ul><li>14 m fx I like sports and power lifting at school. </li></ul><ul><li>U asl </li></ul><ul><li>13 f fx Nothing just chatting on line </li></ul><ul><li>Maybe we can meet sometime  </li></ul><ul><li>That would be nice. </li></ul><ul><li>( I wonder what he looks like ?) </li></ul>What he could really look like!!!!
    5. 5. “ Trust but verify” Former President, Ronald Reagan <ul><li>Administrative control – Who set up your PC? </li></ul><ul><li>Set up separate Non–Administrative account for your child </li></ul><ul><li>Learn about the digital devices your teen uses </li></ul><ul><ul><li>Visit their Web pages or blogs and know who is in their cell phone contact list </li></ul></ul><ul><li>Location of PC in the home and the times if use. </li></ul><ul><li>Set limits on which Web sites, chat rooms, games, or blogs they can and cannot visit, and discuss consequences for breaking these rules </li></ul><ul><li>Add Monitoring software or hardware </li></ul><ul><ul><li>“ Trust but Verify” </li></ul></ul>
    6. 6. Out of Sight Access out of your control <ul><li>School- </li></ul><ul><ul><li>May or may not have filtering </li></ul></ul><ul><li>Library </li></ul><ul><ul><li>May or may not have filtering </li></ul></ul><ul><li>Friends </li></ul><ul><li>Cyber café </li></ul><ul><li>WiFi HotSpots </li></ul><ul><ul><li>(Panera, Starbucks, and others, & Soon Local Cities.) </li></ul></ul><ul><li>Cell Phone </li></ul><ul><ul><li>Web and Text Messaging access. </li></ul></ul>
    7. 7. Hardware Tool available to you. <ul><li>Key logger Hardware </li></ul>- a tiny circuit board that is connected in between the computer and the keyboard -Comes in a variety of memory sizes
    8. 8. Key Logger <ul><li>Advantages: </li></ul><ul><ul><li>Simple to use </li></ul></ul><ul><ul><li>Comes in various storage sizes </li></ul></ul><ul><ul><ul><li>32k, up to 2Mb </li></ul></ul></ul><ul><ul><li>No extra software needed </li></ul></ul><ul><ul><ul><li>Recovered Data access via any word processing software (Word pad, Word, WordPerfect) </li></ul></ul></ul><ul><ul><li>Undetectable by spy ware or antivirus software </li></ul></ul>
    9. 9. Key Logger: <ul><li>Disadvantages: </li></ul><ul><ul><li>Can only capture key strokes of the PC to which it’s attached. </li></ul></ul><ul><ul><ul><li>Only sees one side of a conversation </li></ul></ul></ul><ul><ul><li>Can easily be removed if discovered </li></ul></ul><ul><ul><li>Is not a Filtering device </li></ul></ul><ul><ul><li>Can not be utilized with a laptop </li></ul></ul><ul><ul><ul><li>Key logger software needed </li></ul></ul></ul>
    10. 10. Filter Software <ul><li>Internet filter software gives you the ability to control content displayed, block websites and set up passwords. Powerful services like email filtering, popup blocking and chat room monitoring are just some of the tools available with today's Internet filter software </li></ul><ul><li>  Internet Service Providers (ISPs) </li></ul><ul><li>Filtered Search Engines </li></ul><ul><li>Local Filter Software on PC </li></ul>
    11. 11. Filtered Search Engines <ul><li>Filtered search engines will prevent most adult content sites from appearing in the search result list, although it is not a fool-proof technology. Some general search engines (such as google.com , www.yahooligans.com , search.netnanny.com , www.ajkids.com ) provide parental controls under its “Advanced Search” or “Preferences” options. These options essentially use a server-side filter to block adult content sites. Other search engines are designed specifically for children in both design and content. These usually provide search results only for sites from a pre-approved list of child-friendly sites. </li></ul>
    12. 12. Filtered Search Engines <ul><li>Advantages:   </li></ul><ul><ul><li>Filtered searches are server-side filters, which means that there is no software to buy or upgrade. And most search engine services are free. </li></ul></ul><ul><li>Disadvantages:  </li></ul><ul><ul><li>The filter options available for a search engine will only work for that specific search engine. </li></ul></ul><ul><ul><li>A child could simply go to a website that doesn’t have parental controls and conduct their searches there. </li></ul></ul><ul><ul><li>The filter only applies to actual searches. It is in no way a part of the browser, so adult sites will not be blocked if the URL is directly typed into the browser’s address toolbar. </li></ul></ul>
    13. 13. Filtering Software <ul><li>Many companies have developed filtering software to block harmful websites from your computer. But not all packages are the same. Some scan for specific words or terms, others refer to a database of banned sites, while others allow only those sites previously approved by the parent. Other individual features include chat room and forum blocking, activity logs, time limits and customizable filtering. Some also expand their language filter to your e-mail service. Some software is available for a flat fee, while others charge a monthly service fee. </li></ul>
    14. 14. Filtering Software <ul><li>Advantages:  </li></ul><ul><ul><li>Client-side filters usually offer greater flexibility for parents in both features and levels of protection. </li></ul></ul><ul><ul><li>Some programs can also operate in &quot;stealth mode&quot; so they remain undetected from the user. </li></ul></ul><ul><ul><li>Some programs also include monitoring features which record what your children do online. </li></ul></ul><ul><li>Disadvantages:   </li></ul><ul><ul><li>Many parents have found the maintenance of the software a hassle </li></ul></ul><ul><ul><ul><li>(Many of the newer versions of filtering software offer automatic updates of unacceptable sites from the company's database.) </li></ul></ul></ul><ul><ul><li>Even the most effective filters are not fool-proof. Unacceptable sites will still occasionally slip through. </li></ul></ul><ul><ul><li>If your child is very technologically advanced, they may learn ways to bypass the software. There are even websites providing free downloads that can render the filtering software useless. </li></ul></ul>
    15. 15. Some Filter Programs http://internet-filter-review.toptenreviews.com/
    16. 16. Filtering Software <ul><li>Advantages: </li></ul><ul><ul><li>Works with all browsers </li></ul></ul><ul><ul><ul><li>Internet Explorer, Firefox, Netscape </li></ul></ul></ul><ul><ul><li>Easy to activate and setup </li></ul></ul><ul><ul><li>In some cases ability to control bases on profile that is set up. </li></ul></ul><ul><li>Disadvantages: </li></ul><ul><ul><li>Cost as much as $80.00 for software </li></ul></ul><ul><ul><li>Can be set too restrictive </li></ul></ul><ul><ul><ul><li>Blocking access to desired sites </li></ul></ul></ul>
    17. 17. Site http://namechk.com/
    18. 18. Site http://www.yoname.com/
    19. 19. Understanding the lingo <ul><li>Google is your friend…. </li></ul><ul><li>Create a Account in a Social Networking Web Site (MySpace, Facebook, Tribe, Friendstar, & well over 100 + others) </li></ul><ul><li>Wikipedia is another good friend….. </li></ul><ul><li>Acronym lists available on the Web ( ASL, PIR, POS ) </li></ul>
    20. 20. In Closing <ul><li>Technology can only help in combination with good parenting skills and communication with our children. </li></ul><ul><li>No one item is a total solution to protecting our children. </li></ul>
    21. 21. Q u e s t i o n s ????

    ×