Kids usually use their real name, school, etc. Can establish a false identity/fake info No credit cards No age verification 2 nd  most hit site
PRIVATE
Private accounts can be broken into Accounts linked/searches Social engineering Pages aren’t censored Adult subjects Graphics Anyone can search and find info
Strangers Celebrities Cyber Bullies Gang activity Movies Restaurants Businesses
Cooperative with law enforcement Parents and teachers can contact myspace to take down pages Search for kids info Now requiring authentic email addresses
Background checks Criminal activities Employers use to weed out applicants Embarrassed when page is shown even among peers A LIFE RESUME
 
 
Meeting Online With Goal to Meet In-Person
Human Element Face-to-face Words 7%  Body language 90+% Tone/pitch 35+% Pitch-Tone-Amplitude-Syllable Duration all greater during deceptive communication Online 7% info available Easier to conceal informative for intuition Disconnect between virtual and physical
Human Element No vision-no intuition No “creep vibe” Easier to be sexually explicit Less shy online (would kids stand in the middle of the mall and say “Who wants to talk?”)
Predator ID Generally more intelligent Drs./Lawyers/College Professors/Engineers, etc. High degree of unsuccessful knock & talks Past victimization that perpetuates itself Need driven behavior (esp. dangerous) Passive/aggressive personality Master manipulators (using 7%)
Predator ID “Opportunist” Likely to re-offend (1-10/will say 4-5) Hanging around kids more than adults Sex offender databases
Predator Targets Latchkey Lonely Shy Depressed Youth groups
Predators In Their Own Words
Higher Risks Communicating with strangers To meet friends Sexually explicit Sexually curious Send explicit photos Web cam Special needs kids especially vulnerable Most luring occurs between 3-6 pm
Grooming Process Shared interests “ Fit in” with youth’s life Slow methodical process to build trust Will work to befriend even up to a year Convince family to trust Always interested in whatever is said Always claiming to understand and agree Breaks down barriers-new relationship/new barrier Excess attention Gifts
Grooming Process Accumulate useful info Soft info (I like…my favorite…) Achilles heel of victims-emotional info Desensitizes kids by sending porn cartoon to break down barriers or disgusting/violent images Leaves weird psychological imprints (even detectives need “critical stress debriefings” w/o realizing it when certain images are stamped into the mind) Goal is to meet in person
Other Dangers What today’s kids are exposed to is vastly different than what we were at their age P2P Chat rooms Thematic, regionalized, no age verification IMing Meebo (IM from anywhere across companies-no downloads)  Cell phones
P2P Can trade movies, pics, music, porn Share files with everyone
P2P No servers Nodes connected to nodes Bandwidth a must No company mandates Anonymity (Freenet) Encryption (Impedes law enforcement efforts) Bestiality Child porn and other (“will make you cry”) Defecation
 
Music Industry Wins Illegal Downloading Case Associated Press  Friday, October 5, 2007; Page D02  DULUTH, Minn., Oct. 4 -- The recording industry won a key fight Thursday against illegal music downloading when a federal jury found that a Minnesota woman shared copyrighted music online and levied $222,000 in damages against her.  The jury ordered  Jammie Thomas , 30, to pay the six record companies that sued her $9,250 for each of 24 songs they focused on in the case. They had alleged she shared 1,702 songs. Thomas and her attorney, Brian Toder, declined to comment as they left the courthouse. In the first such lawsuit to go to trial, the record companies accused Thomas of downloading the songs without permission and offering them online through  Kazaa, a file-sharing program . Thomas denied wrongdoing and testified that she didn't have a Kazaa account.
Cell Phones Leaves house everyday Electronic leash/surveillance for kids Cameras Videos Autotexting (sex jokes, dating services, romance tips, etc.) RAPID and EASY transfers to MASS  Thumb drives New tech in other countries
Social Networks Behaviors are the danger Anytime pics Nothing private Pics and postings = DRAMA between friends Can’t say “don’t do it” Focus on kids and reach out when young  Teach safety part of it No shortage of threats, harassment, bullying-must still be dealt with
“Think Before You Post”
Think Before You Post Always assume Everyone can read post All posts out there forever (diary/pics) People reading posts can cause harm
What to Do Educate Don’t talk to strangers Don’t give personal info No pics unless comfortable with all relatives seeing or on front page of paper No web cam! Ever! No computer in bedroom
Connect Virtual to Physical
Proactive Too much privacy + too much technology = disaster Focus groups with girls Can’t get back photos once posted or sent Photos printed/forwarded all the time “Think Before You Post”-ANYONE can see and PRINT what is posted online Connect virtual with physical Skits as commercials
www.cybertipline.com
Stories Guy gets girl to do things while chatting-Records it and releases on P2P-Child porn within seconds and she thinks she’s chatting with 15 year old boy Principal has fake page created Superintendent accidentally forwarded “venting” email to a person she was venting about-then was in the newspapers
13 year old committed suicide  Bullied at school  Turned to Internet and met other suicidal teens Parents helped to create new laws on bullying in Vermont www.ryanpatrickhalligan.com
Cyber Bullying Examples Postings Internet polling (hot or not) Texting IMs Sending/posting pics Interactive games
Cyber Bullying Examples Exclusion Trickery Cyber stalking Cyber threats Emails Stealing/using someone else’s passwords for impersonating others Creating websites
Cyber Bullying Examples By proxy Someone else gets punished for something they didn’t do Warning or notify wars Usually reported by a 3 rd  party Hacking Signing people up Flaming
Effects Exponential powers of Internet Bystanders get involved Strangers join in (all with 7%) 1 out of 10 get reported Unaware of power of words Victims become cyber bullies FIGHTS IN SCHOOL
Cyber Bullying Videotaped beating on YouTube/Ch. 7 Suicides Damage is done regardless of punishment
Kids’ Justifications Didn’t think would get caught Angry/revenge Time Tech toys Just kidding To get a reaction Everyone does it By accident Free speech (to protect/not abuse)
What to do Ignore Don’t reply Print Save Tell adult Report to ISP/local authorities
IT’S 10:00 DO YOU KNOW WHERE YOUR COMPUTER IS? Parents are ultimately responsible Have username and password Resources Spector Pro Guardian Monitor Web Watcher Spy Recon I Am Big Brother Install video surveillance and let them know
Oh, by the way…

Internet Safety

  • 1.
  • 2.
    Kids usually usetheir real name, school, etc. Can establish a false identity/fake info No credit cards No age verification 2 nd most hit site
  • 3.
  • 4.
    Private accounts canbe broken into Accounts linked/searches Social engineering Pages aren’t censored Adult subjects Graphics Anyone can search and find info
  • 5.
    Strangers Celebrities CyberBullies Gang activity Movies Restaurants Businesses
  • 6.
    Cooperative with lawenforcement Parents and teachers can contact myspace to take down pages Search for kids info Now requiring authentic email addresses
  • 7.
    Background checks Criminalactivities Employers use to weed out applicants Embarrassed when page is shown even among peers A LIFE RESUME
  • 8.
  • 9.
  • 10.
    Meeting Online WithGoal to Meet In-Person
  • 11.
    Human Element Face-to-faceWords 7% Body language 90+% Tone/pitch 35+% Pitch-Tone-Amplitude-Syllable Duration all greater during deceptive communication Online 7% info available Easier to conceal informative for intuition Disconnect between virtual and physical
  • 12.
    Human Element Novision-no intuition No “creep vibe” Easier to be sexually explicit Less shy online (would kids stand in the middle of the mall and say “Who wants to talk?”)
  • 13.
    Predator ID Generallymore intelligent Drs./Lawyers/College Professors/Engineers, etc. High degree of unsuccessful knock & talks Past victimization that perpetuates itself Need driven behavior (esp. dangerous) Passive/aggressive personality Master manipulators (using 7%)
  • 14.
    Predator ID “Opportunist”Likely to re-offend (1-10/will say 4-5) Hanging around kids more than adults Sex offender databases
  • 15.
    Predator Targets LatchkeyLonely Shy Depressed Youth groups
  • 16.
  • 17.
    Higher Risks Communicatingwith strangers To meet friends Sexually explicit Sexually curious Send explicit photos Web cam Special needs kids especially vulnerable Most luring occurs between 3-6 pm
  • 18.
    Grooming Process Sharedinterests “ Fit in” with youth’s life Slow methodical process to build trust Will work to befriend even up to a year Convince family to trust Always interested in whatever is said Always claiming to understand and agree Breaks down barriers-new relationship/new barrier Excess attention Gifts
  • 19.
    Grooming Process Accumulateuseful info Soft info (I like…my favorite…) Achilles heel of victims-emotional info Desensitizes kids by sending porn cartoon to break down barriers or disgusting/violent images Leaves weird psychological imprints (even detectives need “critical stress debriefings” w/o realizing it when certain images are stamped into the mind) Goal is to meet in person
  • 20.
    Other Dangers Whattoday’s kids are exposed to is vastly different than what we were at their age P2P Chat rooms Thematic, regionalized, no age verification IMing Meebo (IM from anywhere across companies-no downloads) Cell phones
  • 21.
    P2P Can trademovies, pics, music, porn Share files with everyone
  • 22.
    P2P No serversNodes connected to nodes Bandwidth a must No company mandates Anonymity (Freenet) Encryption (Impedes law enforcement efforts) Bestiality Child porn and other (“will make you cry”) Defecation
  • 23.
  • 24.
    Music Industry WinsIllegal Downloading Case Associated Press Friday, October 5, 2007; Page D02 DULUTH, Minn., Oct. 4 -- The recording industry won a key fight Thursday against illegal music downloading when a federal jury found that a Minnesota woman shared copyrighted music online and levied $222,000 in damages against her. The jury ordered Jammie Thomas , 30, to pay the six record companies that sued her $9,250 for each of 24 songs they focused on in the case. They had alleged she shared 1,702 songs. Thomas and her attorney, Brian Toder, declined to comment as they left the courthouse. In the first such lawsuit to go to trial, the record companies accused Thomas of downloading the songs without permission and offering them online through Kazaa, a file-sharing program . Thomas denied wrongdoing and testified that she didn't have a Kazaa account.
  • 25.
    Cell Phones Leaveshouse everyday Electronic leash/surveillance for kids Cameras Videos Autotexting (sex jokes, dating services, romance tips, etc.) RAPID and EASY transfers to MASS Thumb drives New tech in other countries
  • 26.
    Social Networks Behaviorsare the danger Anytime pics Nothing private Pics and postings = DRAMA between friends Can’t say “don’t do it” Focus on kids and reach out when young Teach safety part of it No shortage of threats, harassment, bullying-must still be dealt with
  • 27.
  • 28.
    Think Before YouPost Always assume Everyone can read post All posts out there forever (diary/pics) People reading posts can cause harm
  • 29.
    What to DoEducate Don’t talk to strangers Don’t give personal info No pics unless comfortable with all relatives seeing or on front page of paper No web cam! Ever! No computer in bedroom
  • 30.
  • 31.
    Proactive Too muchprivacy + too much technology = disaster Focus groups with girls Can’t get back photos once posted or sent Photos printed/forwarded all the time “Think Before You Post”-ANYONE can see and PRINT what is posted online Connect virtual with physical Skits as commercials
  • 32.
  • 33.
    Stories Guy getsgirl to do things while chatting-Records it and releases on P2P-Child porn within seconds and she thinks she’s chatting with 15 year old boy Principal has fake page created Superintendent accidentally forwarded “venting” email to a person she was venting about-then was in the newspapers
  • 34.
    13 year oldcommitted suicide Bullied at school Turned to Internet and met other suicidal teens Parents helped to create new laws on bullying in Vermont www.ryanpatrickhalligan.com
  • 35.
    Cyber Bullying ExamplesPostings Internet polling (hot or not) Texting IMs Sending/posting pics Interactive games
  • 36.
    Cyber Bullying ExamplesExclusion Trickery Cyber stalking Cyber threats Emails Stealing/using someone else’s passwords for impersonating others Creating websites
  • 37.
    Cyber Bullying ExamplesBy proxy Someone else gets punished for something they didn’t do Warning or notify wars Usually reported by a 3 rd party Hacking Signing people up Flaming
  • 38.
    Effects Exponential powersof Internet Bystanders get involved Strangers join in (all with 7%) 1 out of 10 get reported Unaware of power of words Victims become cyber bullies FIGHTS IN SCHOOL
  • 39.
    Cyber Bullying Videotapedbeating on YouTube/Ch. 7 Suicides Damage is done regardless of punishment
  • 40.
    Kids’ Justifications Didn’tthink would get caught Angry/revenge Time Tech toys Just kidding To get a reaction Everyone does it By accident Free speech (to protect/not abuse)
  • 41.
    What to doIgnore Don’t reply Print Save Tell adult Report to ISP/local authorities
  • 42.
    IT’S 10:00 DOYOU KNOW WHERE YOUR COMPUTER IS? Parents are ultimately responsible Have username and password Resources Spector Pro Guardian Monitor Web Watcher Spy Recon I Am Big Brother Install video surveillance and let them know
  • 43.
    Oh, by theway…