Published on

Internet Safety for Children talk for parents. Contact Info @ benetsafe.org for free talks in NH

Published in: Technology
  • Be the first to comment


  2. 3. BeNetSafe.Org Founded in September 2002 10/2007 becomes a Non-Profit organization Reached out to 10000+ Students Spoke to thousands of Parents / Police / Educators Reached out to the state using the GSDLN What we know: <ul><li>The Internet is here to stay, so are social networking sites. </li></ul><ul><li>The Internet is full of good stuff </li></ul><ul><li>There are billions and billions of megabytes of research information and articles out there. </li></ul><ul><li>Social Networking sites have made it easier for lost friends to re-unite, and to meet new interesting people. </li></ul>
  3. 4. BeNetSafe.Org <ul><li>Our children need to be guided through the Internet as we would in the real world. </li></ul><ul><li>You do not have to be a computer expert to guide your child. </li></ul><ul><li>Make your child understand why you feel as you do, don’t make it a game of blocking and re-blocking, they are smarter than we are. </li></ul><ul><li>Give your child someone to turn to should they feel uncomfortable about something they have seen on the Internet. </li></ul><ul><li>Give your child someone to turn to should they feel uncomfortable about something they have seen on the Internet. </li></ul>
  4. 5. Online “Predators” and Their Victims Myths, Realities, and Implications for Prevention and Treatment February–March 2008 American Psychologist Janis Wolak, David Finkelhor, and Kimberly J. Mitchell, Crimes against Children Research Center and Family Research Laboratory, University of New Hampshire; Michele L. Ybarra, Internet Solutions for Kids, Inc., Santa Ana, California. The article outlined 9 risky on-line behaviors ● Posting personal information online, 56% of youth Internet users ● Interacting online with unknown people, 43% ● Having unknown people on a buddy list, 35% ● Using the Internet to make rude and nasty comments to others, 28% ● Sending personal information to unknown people met online, 26% ● Downloading images from file-sharing programs, 15% ● Visiting X-rated sites on purpose, 13% ● Using the Internet to embarrass or harass people youths are mad at, 9% ● Talking online to unknown people about sex, 5%
  5. 6. <ul><li>2/3 of people in the United States visit social-networking sites </li></ul><ul><li>90 percent of young people are online. </li></ul><ul><ul><li>Pop in to sites to check for messages </li></ul></ul><ul><ul><li>Check/Comment on the new postings </li></ul></ul><ul><ul><li>Always on generation </li></ul></ul>
  6. 7. Social Network Required Information <ul><li>Email Address </li></ul><ul><li>First Name </li></ul><ul><li>Last Name: </li></ul><ul><li>Password: </li></ul><ul><li>Postal Code: </li></ul><ul><li>Gender: </li></ul><ul><li>Date Of Birth: </li></ul><ul><li>Use a disposable address </li></ul><ul><li>Ok </li></ul><ul><li>Why? </li></ul><ul><li>Ok, this will not display </li></ul><ul><li>No </li></ul><ul><li>Yes </li></ul><ul><li>Never </li></ul>-------- subtract 3 days
  7. 8. OPTIONAL INFORMATION <ul><li>Upload Some Photos! </li></ul><ul><li>Headline: </li></ul><ul><li>About Me: </li></ul><ul><li>I'd Like to Meet: </li></ul><ul><li>Interests: </li></ul><ul><li>Music: </li></ul><ul><li>Movies: </li></ul><ul><li>Television: </li></ul><ul><li>Heroes: </li></ul><ul><li>Books: </li></ul><ul><li>Marital Status: </li></ul><ul><li>Sexual Orientation: </li></ul><ul><li>Hometown: </li></ul><ul><li>Religion: </li></ul><ul><li>Smoker: </li></ul><ul><li>Drinker: </li></ul><ul><li>Children: </li></ul><ul><li>Education: </li></ul><ul><li>School Name: </li></ul>
  8. 9. Other Information Favorite Color: Screen Name: Favorite Band: Favorite Movie: Favorite Show: Your Car: Your Hometown: Your Present Town: Your Crushes First Name: Your Grade: Your Style: What is Your Name? How old are you? Eye color? Shoe Size? Hair color? Height? Weight? Favorite: Food? Drink? Movie? Music Band? Animal? Sport? What is the link to your website, blog, or myspace? Place to live? Subject? Stuff...... Best thing that happened to you in the last few years? Do you want to get married? Kids? Best place to go on a date? What is your dream? What do you want to do when you grow up? Play an instrument? List 5 things (inc. brand) you are wearing right now Friends.... Friend you have known the longest? Best friend(s)? Friend that makes you laugh the most? Friend who you can talk to anything about? Friend with the best personality? Last friend to call you? Last friend to talk to you? Last friend you hung out with? Last friend you went to a movie with? Last friend to make you laugh? Most memorable experience with a friend? Anything you plan to do with friends when you get older? Any trips planned with friends? Ever traveled anywhere? What places do you want to visit? Where do you want to live when you're older? How happy are you with where you are in life? Why? What's your most embarrassing moment? Do you have any art or pictures on your walls? Describe it.
  9. 10. Social Networking Sites But I made my site PRIVATE!!!
  10. 11. Social Networking Sites Facebook signs up 100,000 new users every day. Including one 'Freddi Staur' (an anagram of 'ID Fraudster’) The big test of 2007! a world leader in IT security and control
  11. 12. Social Networking Sites Research shows that 41 percent of users, more than two in five, will divulge personal information - such as email address, date of birth and phone number - to a complete stranger, or at least to Freddi Staur.
  12. 13. Social Networking Sites 43 percent of users contacted responded to Freddi. 41 percent of those approached leaked personal information.
  13. 14. Social Networking Sites 87 percent of respondents provided details about their education or workplace. 84 percent of respondents listed their full date of birth. 78 percent of respondents listed their current address or location. 72 percent of respondents divulged one or more email address. 26 percent of respondents provided their instant messaging screen name. 23 percent of respondents listed their current phone number.
  14. 15. Social Networking Sites In the majority of cases, Freddi was able to gain access to respondents’ photos of family and friends, information about likes and dislikes, hobbies, employer details and other personal facts. Many users also disclosed the names of their spouses/partners, several included their complete résumés, while one user even divulged his mother's maiden name.
  15. 16. Social Networking Sites <ul><li>Who visits social networking sites </li></ul><ul><ul><li>Law Enforcement (Campus Police) </li></ul></ul><ul><ul><li>Colleges </li></ul></ul><ul><ul><ul><li>Administration </li></ul></ul></ul><ul><ul><ul><li>Professors </li></ul></ul></ul><ul><ul><li>Potential Employers </li></ul></ul><ul><ul><li>Sex Offenders </li></ul></ul><ul><ul><li>Lots and lots of Crooks! </li></ul></ul>
  16. 17. Social Networking Sites UPDATE 2009 Sophos created two female Australian Facebook users, Daisy Feletin (21, single) and Dinette Stonily (56, married). Each sent a friend request to 100 randomly-selected contacts in their age group, and waited two weeks to see who would respond.
  17. 18. Social Networking Sites UPDATE 2009 Daisy Dinette Freddie Friends accepting 46% 41% 43% Full/Partial d.o.b 98% 92% 84% Email address 100% 88% 72% College or workplace 74% 22% 87% Phone number 7% 23% 23% IM screen name 13% 18% 26%
  18. 19. Social Networking Sites <ul><li>One last thing to consider: </li></ul><ul><li>Posting by Proxy </li></ul><ul><li>Student John Doe may not have a page on a social networking site or you may monitor John’s page, but what about his friends? </li></ul><ul><ul><li>Do they post things about (or for) John? </li></ul></ul><ul><ul><li>Does John use someone else’s site to post his information? </li></ul></ul>
  19. 20. Cyber Predators <ul><ul><li>The Center for Missing and Exploited Children reported 2,660 incidents of adults using the Internet to entice children into meeting in 2005. </li></ul></ul><ul><ul><li>One in every five children who go online is solicited, </li></ul></ul><ul><ul><li>The Justice Department estimates that at any given time 50,000 predators are online trolling for youth. </li></ul></ul>
  20. 21. Stage One Predator Appears Familiar <ul><li>Non-threatening, friendly, comforting, and familiar </li></ul><ul><li>Systematically pretends to have common interests </li></ul><ul><li>Disguises true identity and motive </li></ul><ul><li>Collects information from profiles and chat rooms </li></ul>
  21. 22. Stage Two Develops Trust <ul><li>Supports the child's point-of-view </li></ul><ul><li>Systematically exploits social friction </li></ul><ul><li>Acts like the only person that truly understands the child </li></ul><ul><li>Becomes the best buddy </li></ul>
  22. 23. Stage Three Establishes Secrecy <ul><li>Exchanges e-mail addresses an phone numbers </li></ul><ul><li>Keeps parents in the dark </li></ul><ul><li>Child uses a secret e-mail address </li></ul><ul><li>Introduces adult oriented material and language </li></ul>
  23. 24. The Last Stage The Face to Face Meeting <ul><li>Not all instances require all 3 of the first 3 stages </li></ul><ul><li>Most aggressive solicitations are made by people under 30 </li></ul><ul><li>Instances of females making aggressive solicitations are on the rise </li></ul><ul><li>The victim may meet the predator willingly or may be threatened </li></ul>
  24. 25. Anthony R. Stancl Circuit Court Commissioner Laura Florian Lau “most horrific allegations she has reviewed in all her years on the bench.” Posing as a female on Facebook makes contact asking for explicit photos Blackmailed some of the boys under the threat that the pictures would be released to the rest of the high school. Threatens harm to family members According to criminal complaints filed:
  25. 26. Anthony R. Stancl According to reports 300 naked photos and movie clips of New Berlin boys and another 600 professionally made pornographic movies of children were found on the computer. &quot;The defendant is facing 293 years if convicted on these 12 counts. . . . This crime allegedly involved many, many, many victims.” Laura Florian Lau
  26. 27. The Last Stage The Face to Face Meeting
  27. 29. Mobile Devices The Internet no longer stops at your front door!
  28. 30. Mobile Devices <ul><li>A “Cell Phone” </li></ul><ul><li>Could send voice Messages to any other cell phone or land line. </li></ul>
  29. 31. Mobile Devices <ul><li>A “Cell Phone” </li></ul><ul><li>Today’s smart phones can do so much more. </li></ul>
  30. 32. Mobile Devices                                                               Samsung debuted the Galaxy Tab on Thursday , a portable
  31. 33. Mobile Devices Saved about 10 messages and the last 10 phone calls Saves almost all received text messages, calls (in, out, and missed) “Google” searches, web browsing and even voice mails. Some phones even attach latitude and longitude to photos taken.
  32. 34. Mobile Devices Sexting Bullying A girl in Ohio was charged for sending nude photos of herself to classmates. If convicted she could have to register as a sex offender for 20 years. Another concern now with cell phones. Some teens are bullying through repeated and hostile text messages.
  33. 35. Mobile Devices
  34. 36. Mobile Devices <ul><li>Cyber Bullying </li></ul><ul><ul><li>Sending someone mean or threatening instant messages, or text messages </li></ul></ul><ul><ul><li>Excluding someone from an instant messenger buddy list or blocking their email for no reason </li></ul></ul><ul><ul><li>Tricking someone into revealing personal or embarrassing information and sending it to others </li></ul></ul><ul><ul><li>Breaking into someone's instant message account to send cruel or untrue messages while posing as that person </li></ul></ul>
  35. 37. Mobile Devices
  36. 38. Mobile Devices A 2009 Harris online poll shows that one in five teens admits to having sent naked pictures of themselves or others over a cell phone. But even that number may be low. Hope Witsell took her life because she was being bullied and called a slut after she sexted her boyfriend with a topless picture of herself. Sexting Cyber Bullying
  37. 39. She sent nude pictures of herself to a boyfriend. When they broke up, he sent them to other high school girls. The girls were harassing her, calling her a slut and a whore. She was miserable and depressed, afraid even to go to school. Mobile Devices February 15, 1990 – July 3, 2008 Jessie Logan
  38. 40. Cyber Bullying <ul><li>Research tells us that our children: </li></ul><ul><ul><li>Have a high comfort level with technology </li></ul></ul><ul><ul><li>Have a constant flow of information </li></ul></ul><ul><ul><li>Tolerant of multitasking </li></ul></ul><ul><ul><li>No sense of security </li></ul></ul><ul><ul><li>More than 80% of kids would rather give up a relationship than the Internet. </li></ul></ul>Source: The Massachusetts Aggression Reduction Center
  39. 41. Cyber Bullying <ul><li>Parents </li></ul><ul><li>Good kids do not do bad stuff </li></ul><ul><li>Mobile Phone </li></ul><ul><li>My kid does not lie </li></ul><ul><li>I monitor my kids </li></ul>Kids One has nothing to do with the other Mobile computer Lying is not a big deal They are not monitored (parents just think we are) Source: The Massachusetts Aggression Reduction Center
  40. 42. Cyber Bullying <ul><li>The “old” advice about bullying no longer works: </li></ul><ul><li> – just ignore it </li></ul><ul><li> – stand up to a bully and they’ll leave you </li></ul><ul><li>alone </li></ul><ul><li>  Bullying often happens by the most popular kids in large groups, making it hard to ignore </li></ul>Source: The Massachusetts Aggression Reduction Center
  41. 43. Cyber Bullying So what should we tell kids who are victims of bullying? •     It’s not your fault, and you haven’t done anything wrong.  •     Let’s separate.  (Mediation is the wrong approach, bullies are not motivated to help change happen.) •    Talk to us!  Find a safe adult to talk to about what’s happening . Source: The Massachusetts Aggression Reduction Center
  42. 44. Cyber Bullying <ul><li>  So what should we tell kids who are victims of bullying? </li></ul><ul><li>•   Don’t require a bully to apologize.  An apology from a bully may be seen as a threat. </li></ul><ul><li>•     Don’t retaliate.  Bullies want you to retaliate, so they can report you to adults. </li></ul><ul><li>•     If bullying happens online, report it.  Social networking sites have “report” links. </li></ul>Source: The Massachusetts Aggression Reduction Center
  43. 45. Cyber Bullying <ul><li>So what should we tell kids who are victims of bullying? </li></ul><ul><li>•   To help resolve this situation, we need details.  So walk me through a typical day and show me exactly, step by step, what happens. </li></ul><ul><li>•     Let’s spend a lot of time with our friends and family.  Being with people who care about you can help how you feel. </li></ul>Source: The Massachusetts Aggression Reduction Center
  44. 46. Cyber Bullying <ul><li>Was bullying a significant problem at your high school? </li></ul><ul><ul><li>Often – 32% Sometimes – 43% </li></ul></ul><ul><li>Do you think students in your school avoided coming to school because they were bullied? </li></ul><ul><ul><li>Often – 8% Sometimes – 43% </li></ul></ul>Source: The Massachusetts Aggression Reduction Center
  45. 47. Cyber Bullying <ul><li>Were you ever harassed, bullied, stalked, or threatened via [Instant Messaging, Social Networking sites, text messaging, or “other electronic means”]? </li></ul><ul><ul><li>Never – 40% Yes, while in high school - 60% </li></ul></ul><ul><ul><li> Yes, after high school – 15% </li></ul></ul>
  46. 48. Cyber Bullying <ul><li>Have you ever known anyone who has left school because bullying was very severe at their school? </li></ul><ul><ul><li>Yes – 39% </li></ul></ul><ul><li>Have you ever known anyone who has had to involve police because bullying was so severe? </li></ul><ul><ul><li>Yes – 28% </li></ul></ul>Source: The Massachusetts Aggression Reduction Center
  47. 49. Cyber Bullying <ul><li>Reasons given for cyber bullying: </li></ul><ul><li>35% A joke </li></ul><ul><li>65% Because they were angry or wanted revenge. </li></ul><ul><li><5% Peer Pressure </li></ul>19% of male students say they have bullied online and 54% of female students say they have bullied online Source: The Massachusetts Aggression Reduction Center
  48. 50. Cyber Bullying <ul><li>As sophisticated as they are about the technical use of information technology… </li></ul><ul><li>Very few users (young or old) seem to realize the permanence of the internet. </li></ul><ul><ul><ul><li>Having grown up with the concept of deletion, it is hard to imagine that absolutely anything and everything put online might be visible forever. </li></ul></ul></ul>Source: The Massachusetts Aggression Reduction Center
  49. 51. Cyber Bullying <ul><li>As sophisticated as they are about the technical use of information technology… </li></ul><ul><li>Even when they themselves have experienced an online attack, many adolescents and young adults seem to persist in the belief that what’s online doesn’t count and thus doesn’t hurt. </li></ul>Source: The Massachusetts Aggression Reduction Center
  50. 52. Teen charged with using MySpace to intimidate ACGC teacher, students (Gretchen Schlosser) West Central Tribune Published Saturday, November 17, 2007 OLIVIA — Charges have been filed against a 17-year-old Olivia teen who allegedly hacked into another teenager’s MySpace. com account and used it to threaten students and a teacher at Atwater-Cosmos-Grove City High School. Meeker County Sheriff’s deputies were called to the high school on Oct. 10 to investigate the threats.
  51. 53. When grown-ups turn cyberbullies Megan Meier's parents say she committed suicide after being hoaxed by a couple who lived down the street and posed online as a 'cute boy.' When the 'boy' apparently 'turned' on Megan, saying he heard she was 'cruel' to her friends, she hung herself. Local police say there is no law that applies to a situation like this. &quot;It is absolutely vile,“ her mother said. ABC News
  52. 54. When grown-ups turn cyberbullies Megan Meier's parents say she committed suicide after being hoaxed by a couple who lived down the street and posed online as a 'cute boy.' When the 'boy' apparently 'turned' on Megan, saying he heard she was 'cruel' to her friends, she hung herself. Local police say there is no law that applies to a situation like this. &quot;It is absolutely vile,“ her mother said. ABC News
  53. 55. Resources for Parents
  54. 56. <ul><li>Community Outreach </li></ul><ul><ul><li>Videos </li></ul></ul><ul><ul><li>Scripted presentations </li></ul></ul><ul><li>Mentor Program </li></ul><ul><ul><li>Students Teaching Kids </li></ul></ul><ul><ul><ul><li>Lesson plans </li></ul></ul></ul><ul><li>Full Pre-Approved School Curriculum </li></ul><ul><li>K Thru 8 </li></ul><ul><ul><li>45 minute classes for classrooms with and without computers </li></ul></ul><ul><li>High School </li></ul><ul><ul><li>Video oriented classroom instruction. </li></ul></ul>
  55. 57. On-/Offline Activities Safety Pledges Internet Safety News www.NetSmartzKids.org Amy's Choice Julie's Journey Tracking Teresa Teens PSA: &quot;Promises&quot;
  56. 58. WebWiseKids <ul><li>Parents/Kids Training Days </li></ul><ul><ul><li>Videos </li></ul></ul><ul><ul><li>Internet Safety pledges </li></ul></ul><ul><li>LiveWWWires - Missing </li></ul><ul><li>Wired With Wisdom </li></ul><ul><li>Mirror Image </li></ul>
  57. 69. Protect yourself with Free Stuff!!
  58. 73. Operating Systems Windows 7
  59. 74. Windows Live
  60. 76. The Future In New Hampshire <ul><li>You </li></ul><ul><li>BeNetSafe.Org’s continuing outreach </li></ul><ul><li>BeNetSafe.Org’s State Wide Student Mentor Project </li></ul><ul><li>Internet Crimes Against Children Task Force </li></ul><ul><ul><li>NH Schools Outreach with NetSmartz/i-Safe </li></ul></ul><ul><li>NH Attorney General </li></ul><ul><ul><li>WWW.ConnectWithYourKids.Org </li></ul></ul>
  61. 77. Student Mentor Program <ul><li>Goal: Deliver age appropriate information on an on-going basis utilizing trained student mentors </li></ul><ul><li>Benefits: </li></ul><ul><ul><li>Develop student leadership and presentation skills </li></ul></ul><ul><ul><li>Timely and on-going Internet Safety Awareness education </li></ul></ul><ul><ul><li>Help keep our children safe on the Internet </li></ul></ul><ul><ul><li>“ Go To” peer resource for student body </li></ul></ul><ul><li>Program: </li></ul><ul><ul><li>Professional Training Program presented by Peter LaMonica to be a “Certified Student Mentor” </li></ul></ul><ul><ul><li>Adult Advisor involvement at school level for support and guidance </li></ul></ul><ul><ul><li>Age/grade appropriate content delivery – No Fear Factor! </li></ul></ul><ul><ul><li>Upper classmates to visit lower classes and present/share content and stories </li></ul></ul>
  62. 78. The Future In New Hampshire <ul><li>BeNetSafe.Org SM Events </li></ul><ul><ul><li>BeNetSafe teams up for more events with the Granite State Distance Learning Network </li></ul></ul><ul><ul><li>Parent Meetings </li></ul></ul><ul><ul><li>Events.BeNetSafe.Org </li></ul></ul><ul><li>Take control - </li></ul><ul><ul><li>Reach Out and talk about Internet Safety! </li></ul></ul><ul><ul><li>If you can’t ask BeNetSafe.Org for help. </li></ul></ul>Help Fund BeNetSafe.Org Help Fund BeNetSafe.Org
  63. 79. Get us a penny!
  64. 80. Since February 2000 <ul><li>Unwanted exposure to sexual material </li></ul><ul><li>Receiving unwanted sexual solicitations </li></ul><ul><li>Saw sexual explicit material online </li></ul><ul><li>Effective use of blocking and Filtering software </li></ul><ul><li>Online Harassment </li></ul><ul><li>Aggressive online solicitations </li></ul><ul><li>Communication with online strangers </li></ul><ul><li>Distressed by online exposure </li></ul><ul><li>Harassment from acquaintances online </li></ul><ul><li>Sent or asked to send explicit Photos or video </li></ul>
  65. 81. How do you contact us? Currently the best way is by e-mail. Send any and all questions and requests to Info@BeNetSafe.Org Events are listed at www.BeNetSafe.org. BeNetSafe.Org SM
  66. 82. BE NET SAFE .ORG SM