Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

102008 A


Published on

Published in: Technology
  • Be the first to comment

102008 A

  2. 2. SM
  3. 3. BeNetSafe.Org <ul><li>About BeNetSafe.Org </li></ul><ul><li>Internet Fraud </li></ul><ul><ul><li>Identity Theft </li></ul></ul><ul><li>Social Network Sites </li></ul><ul><li>Cyber Predators </li></ul><ul><li>Cyber Bullying </li></ul><ul><li>Resources </li></ul><ul><li>Free Software </li></ul><ul><li>Where do we go from here? </li></ul>
  4. 4. BeNetSafe.Org Founded in September 2002 9/2002 - 9/2007 The Un-Funded Organization Reached out to 7000+ Students Spoke to 600+ Parents / Police / Educators Reached out to the state using the GSDLN 10/2007 becomes a Non-Profit organization Continue to talk to students and adults Further develop partnerships Support State-Wide Student mentor Programs
  5. 5. BeNetSafe.Org <ul><li>What is different after 10/2007 </li></ul><ul><li>Rely on paid advertising instead of press releases </li></ul><ul><li>Continue to present to any group free and expand the State-Wide Mentor Program </li></ul><ul><li>Spend some time fundraising </li></ul><ul><li>Develop partnerships with more organizations </li></ul><ul><li>Assist partners with funding </li></ul><ul><li>Build to a full time organization by the end of 2009 </li></ul>
  6. 6. Internet Fraud Subject: Nigerian Astronaut Wants To Come Home Dr. Bakare Tunde Astronautics Project Manager National Space Research and Development Agency (NASRDA) Plot 555 Misau Street PMB 437 Garki, Abuja, FCT NIGERIA Dear Mr. Sir, REQUEST FOR ASSISTANCE-STRICTLY CONFIDENTIAL I am Dr. Bakare Tunde, the cousin of Nigerian Astronaut, Air Force Major Abacha Tunde. He was the first African in space when he made a secret flight to the Salyut 6 space station in 1979. He was on a later Soviet spaceflight, Soyuz T- 16Z to the secret Soviet military space station Salyut 8T in 1989. He was stranded there in 1990 when the Soviet Union was dissolved. His other Soviet crew members returned to earth on the Soyuz T-16Z, but his place was taken up by return cargo. There have been occasional Progrez supply flights to keep him going since that time. He is in good humor, but wants to come home. In the 14-years since he has been on the station, he has accumulated flight pay and interest amounting to almost $ 15,000,000 American Dollars. This is held in a trust at the Lagos National Savings and Trust Association. If we can obtain access to this money, we can place a down payment All for only $3,000
  7. 7. Internet Fraud There are no lost relatives that need you to help them get thousands of dollars into a US Bank. No one is going to send you money you won, but ask you to send them transfer fees. No one will ask you to deposit a check for them because the check is not good in their country, ask you to send them 90%, and keep 10% for your trouble.
  8. 8. Internet Fraud E-Mail <ul><li>RE:something you never sent </li></ul><ul><li>If it is a Reply to an e-mail you sent, then you should </li></ul><ul><li>remember the subject. If you don’t you didn’t send it, </li></ul><ul><li>delete it. </li></ul><ul><li>Get ready for Fall with a free gift card… </li></ul><ul><li>Nothing is free… </li></ul><ul><li>Stock to Watch </li></ul><ul><li>No one is going to mistakenly send you a stock tip . </li></ul><ul><li>We value your opinion </li></ul><ul><li>No one cares what you think. </li></ul><ul><li>Shipment notification [77FD87] </li></ul><ul><li>Your loan Application is has been approved </li></ul><ul><li>Final attempt to send you your gift card </li></ul>
  9. 9. Social Networking Sites <ul><li>2/3 of people in the United States visit social-networking sites </li></ul><ul><li>90 percent of young people are online. </li></ul><ul><ul><li>Pop in to sites to check for messages </li></ul></ul><ul><ul><li>Check/Comment on the new postings </li></ul></ul><ul><ul><li>Always on generation </li></ul></ul>
  10. 10. Social Network Required Information <ul><li>Email Address </li></ul><ul><li>First Name </li></ul><ul><li>Last Name: </li></ul><ul><li>Password: </li></ul><ul><li>Postal Code: </li></ul><ul><li>Gender: </li></ul><ul><li>Date Of Birth: </li></ul><ul><li>Use a disposable address </li></ul><ul><li>Ok </li></ul><ul><li>Why? </li></ul><ul><li>Ok, this will not display </li></ul><ul><li>No </li></ul><ul><li>Yes </li></ul><ul><li>Never </li></ul>-------- subtract 3 days
  11. 11. OPTIONAL INFORMATION <ul><li>Upload Some Photos! </li></ul><ul><li>Headline: </li></ul><ul><li>About Me: </li></ul><ul><li>I'd Like to Meet: </li></ul><ul><li>Interests: </li></ul><ul><li>Music: </li></ul><ul><li>Movies: </li></ul><ul><li>Television: </li></ul><ul><li>Heroes: </li></ul><ul><li>Books: </li></ul><ul><li>Marital Status: </li></ul><ul><li>Sexual Orientation: </li></ul><ul><li>Hometown: </li></ul><ul><li>Religion: </li></ul><ul><li>Smoker: </li></ul><ul><li>Drinker: </li></ul><ul><li>Children: </li></ul><ul><li>Education: </li></ul><ul><li>School Name: </li></ul>
  12. 12. Other Information Favorite Color: Screen Name: Favorite Band: Favorite Movie: Favorite Show: Your Car: Your Hometown: Your Present Town: Your Crushes First Name: Your Grade: Your Style: What is Your Name? How old are you? Eye color? Shoe Size? Hair color? Height? Weight? Favorite: Food? Drink? Movie? Music Band? Animal? Sport? What is the link to your website, blog, or myspace? Place to live? Subject? Stuff...... Best thing that happened to you in the last few years? Do you want to get married? Kids? Best place to go on a date? What is your dream? What do you want to do when you grow up? Play an instrument? List 5 things (inc. brand) you are wearing right now Friends.... Friend you have known the longest? Best friend(s)? Friend that makes you laugh the most? Friend who you can talk to anything about? Friend with the best personality? Last friend to call you? Last friend to talk to you? Last friend you hung out with? Last friend you went to a movie with? Last friend to make you laugh? Most memorable experience with a friend? Anything you plan to do with friends when you get older? Any trips planned with friends? Ever traveled anywhere? What places do you want to visit? Where do you want to live when you're older? How happy are you with where you are in life? Why? What's your most embarrassing moment? Do you have any art or pictures on your walls? Describe it.
  13. 13. Social Networking Sites But I made my site PRIVATE!!!
  14. 14. Social Networking Sites Facebook signs up 100,000 new users every day. Including one 'Freddi Staur' (an anagram of 'ID Fraudster’) a world leader in IT security and control
  15. 15. Social Networking Sites Research shows that 41 percent of users, more than two in five, will divulge personal information - such as email address, date of birth and phone number - to a complete stranger, or at least to Freddi Staur.
  16. 16. Social Networking Sites 43 percent of users contacted responded to Freddi. 41 percent of those approached leaked personal information.
  17. 17. Social Networking Sites 87 percent of respondents provided details about their education or workplace. 84 percent of respondents listed their full date of birth. 78 percent of respondents listed their current address or location. 72 percent of respondents divulged one or more email address. 26 percent of respondents provided their instant messaging screen name. 23 percent of respondents listed their current phone number.
  18. 18. Social Networking Sites In the majority of cases, Freddi was able to gain access to respondents’ photos of family and friends, information about likes and dislikes, hobbies, employer details and other personal facts. Many users also disclosed the names of their spouses/partners, several included their complete résumés, while one user even divulged his mother's maiden name.
  19. 19. Social Networking Sites Can you spell ID Theft? File a Police Report The Federal Trade Commission Toll-free 1-877-ID-THEFT (438-4338); TDD: 202-326-2502 Postal Inspection Service The Social Security Administration The Internal Revenue Service And of course the 3 three major credit bureaus
  20. 20. Social Networking Sites Who visits social networking sites Age: 12-17 9.6 Age: 18-24 11.3 Age: 25-34 14.5 Age: 35-54 38.5 Age: 55+ 18.0 Source: comScore
  21. 21. Social Networking Sites <ul><li>Who visits social networking sites </li></ul><ul><ul><li>Law Enforcement (Campus Police) </li></ul></ul><ul><ul><li>Colleges </li></ul></ul><ul><ul><ul><li>Administration </li></ul></ul></ul><ul><ul><ul><li>Professors </li></ul></ul></ul><ul><ul><li>Potential Employers </li></ul></ul><ul><ul><li>Sex Offenders </li></ul></ul><ul><ul><li>Lots and lots of Crooks! </li></ul></ul>
  22. 22. Social Networking Sites Posting in cyberspace is forever. What ever you post today can come back to haunt you years from now. An ‘Live Search’ search for &quot;Freddi Staur” returned more than 5000 results.
  23. 23. Cyber Predators <ul><ul><li>The Center for Missing and Exploited Children reported 2,660 incidents of adults using the Internet to entice children into meeting in 2005. </li></ul></ul><ul><ul><li>One in every five children who go online is solicited, </li></ul></ul><ul><ul><li>The Justice Department estimates that at any given time 50,000 predators are online trolling for youth. </li></ul></ul>
  24. 25. Personal Safety Profile Information ID:Fairfieldchick Name:Ashley Branch Nickname:Soccer Queen Age:16 Gender:Female Occupation:Student at Fairfield High
  25. 27. Stage One Predator Appears Familiar <ul><li>Non-threatening, friendly, comforting, and familiar </li></ul><ul><li>Systematically pretends to have common interests </li></ul><ul><li>Disguises true identity and motive </li></ul><ul><li>Collects information from profiles and chat rooms </li></ul>
  26. 28. Stage Two Develops Trust <ul><li>Supports the child's point-of-view </li></ul><ul><li>Systematically exploits social friction </li></ul><ul><li>Acts like the only person that truly understands the child </li></ul><ul><li>Becomes the best buddy </li></ul>
  27. 29. Stage Three Establishes Secrecy <ul><li>Exchanges e-mail addresses an phone numbers </li></ul><ul><li>Keeps parents in the dark </li></ul><ul><li>Child uses a secret e-mail address </li></ul><ul><li>Introduces adult oriented material and language </li></ul>
  28. 30. The Last Stage The Face to Face Meeting <ul><li>Not all instances require all 3 of the first 3 stages </li></ul><ul><li>Most aggressive solicitations are made by people under 30 </li></ul><ul><li>Instances of females making aggressive solicitations are on the rise </li></ul><ul><li>The victim may meet the predator willingly or may be threatened </li></ul>
  29. 31. The Last Stage The Face to Face Meeting
  30. 32. 35 percent of kids have been threatened online 42 percent of kids have been bullied online. 53 percent of kids admit to bullying others online. 58 percent have not told their parents or an adult. Cyber Bullies The Internet is the new bathroom wall
  31. 35. [email_address]
  32. 37. Teen charged with using MySpace to intimidate ACGC teacher, students (Gretchen Schlosser) West Central Tribune Published Saturday, November 17, 2007 OLIVIA — Charges have been filed against a 17-year-old Olivia teen who allegedly hacked into another teenager’s MySpace. com account and used it to threaten students and a teacher at Atwater-Cosmos-Grove City High School. Meeker County Sheriff’s deputies were called to the high school on Oct. 10 to investigate the threats.
  33. 39. When grown-ups turn cyberbullies Megan Meier's parents say she committed suicide after being hoaxed by a couple who lived down the street and posed online as a 'cute boy.' When the 'boy' apparently 'turned' on Megan, saying he heard she was 'cruel' to her friends, she hung herself. Local police say there is no law that applies to a situation like this. &quot;It is absolutely vile,“ her mother said. ABC News
  34. 40. Resources for Parents
  35. 41. <ul><li>Community Outreach </li></ul><ul><ul><li>Videos </li></ul></ul><ul><ul><li>Scripted presentations </li></ul></ul><ul><li>Mentor Program </li></ul><ul><ul><li>Students Teaching Kids </li></ul></ul><ul><ul><ul><li>Lesson plans </li></ul></ul></ul><ul><li>Full Pre-Approved School Curriculum </li></ul><ul><li>K Thru 8 </li></ul><ul><ul><li>45 minute classes for classrooms with and without computers </li></ul></ul><ul><li>High School </li></ul><ul><ul><li>Video oriented classroom instruction. </li></ul></ul>
  36. 42. On-/Offline Activities Safety Pledges Internet Safety News Amy's Choice Julie's Journey Tracking Teresa Teens PSA: &quot;Promises&quot;
  37. 43. WebWiseKids <ul><li>Parents/Kids Training Days </li></ul><ul><ul><li>Videos </li></ul></ul><ul><ul><li>Internet Safety pledges </li></ul></ul><ul><li>LiveWWWires - Missing </li></ul><ul><li>Wired With Wisdom </li></ul><ul><li>Mirror Image </li></ul>
  38. 52. I will keep computers attached to the Internet in public areas in the home. I will set limits on when and how the Internet can be used. I will keep virus, ad-ware, phishing and firewalls up to date and working. Internet Safety Pledge
  39. 53. <ul><li>I will not open e-mails from people I do not know. </li></ul><ul><li>I will not follow e-mail links or open suspicious attachments. </li></ul><ul><li>I will use credit cards safely on the Internet using only secure, well known websites. </li></ul><ul><li>Ask yourself, can I contact this </li></ul><ul><li>company without using the Internet? </li></ul>Internet Safety Pledge
  40. 54. I will not post or give out personal information on the Internet. (Like last names, phone numbers, social security numbers, addresses) I will not share passwords and I will explain to others why this is a bad idea. Internet Safety Pledge
  41. 55. If children in my care present me with what they feel is inappropriate material they have been exposed to on the Internet I will think before I act. Remember it is not the children's fault, Report Incidents to authorities . I will never privately meet anyone in person that I know only from the Internet Internet Safety Pledge
  42. 56. When getting items for free on the internet, I will remember the adage &quot;if it sounds too good to be true it probably is&quot;. I will not reply to e-mails and IMs that are defamatory in nature and I will not send such messages. (Don’t feed the Trolls!) Internet Safety Pledge
  43. 57. I will reach out to others about using the Internet. I will let them know that bad things can happen on the Internet just as bad things happen in the real world. When I want to know what a child in my care is doing on the Internet I will ask them! I will participate in their online experience. Internet Safety Pledge
  44. 58. <ul><li>IM – Chat – Blogging Code Of Conduct </li></ul><ul><li>1) I will take responsibility for my own words and for the comments I post. </li></ul><ul><li>2) I won't say anything online that I wouldn't say in person. </li></ul><ul><li>3) I will connect privately before I respond publicly. </li></ul><ul><li>4. When I believe someone is unfairly attacking another, I will take action. </li></ul><ul><li>5) I will ignore the trolls. </li></ul><ul><li>(Adapted from Tim O’Reilly’s &quot;Blog Code Of Conduct&quot; with permission.) </li></ul>
  45. 60. Protect yourself with Free Stuff!!
  46. 64. New Operating Systems Vista
  47. 65. New Operating Systems
  48. 66. New Operating Systems
  49. 68. The Future In New Hampshire <ul><li>You </li></ul><ul><li>BeNetSafe.Org’s continuing outreach </li></ul><ul><li>BeNetSafe.Org’s State Wide Student Mentor Project </li></ul><ul><li>New Hampshire Cyber Crime Initiative </li></ul><ul><ul><li>NH Schools Outreach with NetSmartz/i-Safe </li></ul></ul><ul><li>NH Attorney General </li></ul><ul><ul><li>WWW.ConnectWithYourKids.Org </li></ul></ul>
  50. 69. Student Mentor Program <ul><li>Goal: Deliver age appropriate information on an on-going basis utilizing trained student mentors </li></ul><ul><li>Benefits: </li></ul><ul><ul><li>Develop student leadership and presentation skills </li></ul></ul><ul><ul><li>Timely and on-going Internet Safety Awareness education </li></ul></ul><ul><ul><li>Help keep our children safe on the Internet </li></ul></ul><ul><ul><li>“ Go To” peer resource for student body </li></ul></ul><ul><li>Program: </li></ul><ul><ul><li>Professional Training Program presented by Peter LaMonica to be a “Certified Student Mentor” </li></ul></ul><ul><ul><li>Adult Advisor involvement at school level for support and guidance </li></ul></ul><ul><ul><li>Age/grade appropriate content delivery – No Fear Factor! </li></ul></ul><ul><ul><li>Upper classmates to visit lower classes and present/share content and stories </li></ul></ul>
  51. 70. The Future In New Hampshire <ul><li>BeNetSafe.Org SM Events </li></ul><ul><ul><li>BeNetSafe teams up for more events with the Granite State Distance Learning Network </li></ul></ul><ul><ul><li>Parent Meetings </li></ul></ul><ul><ul><li>Events.BeNetSafe.Org </li></ul></ul><ul><li>Take control - </li></ul><ul><ul><li>Reach Out and talk about Internet Safety! </li></ul></ul><ul><ul><li>If you can’t ask BeNetSafe.Org for help. </li></ul></ul>Help Fund BeNetSafe.Org Help Fund BeNetSafe.Org
  52. 71. Since February 2000 <ul><li>Unwanted exposure to sexual material </li></ul><ul><li>Receiving unwanted sexual solicitations </li></ul><ul><li>Saw sexual explicit material online </li></ul><ul><li>Effective use of blocking and Filtering software </li></ul><ul><li>Online Harassment </li></ul><ul><li>Aggressive online solicitations </li></ul><ul><li>Communication with online strangers </li></ul><ul><li>Distressed by online exposure </li></ul><ul><li>Harassment from acquaintances online </li></ul><ul><li>Sent or asked to send explicit Photos or video </li></ul>
  53. 72. How do you contact us? Currently the best way is by e-mail. Send any and all questions and requests to Info@BeNetSafe.Org Events are listed at BeNetSafe.Org SM
  54. 73. BE NET SAFE .ORG SM