SlideShare a Scribd company logo
Keeping your ChildrenKeeping your Children
Safe OnlineSafe Online
A Presentation by Matt Smith.
President of Litchfield County
Computer, L.L.C.
Presentation AgendaPresentation Agenda
• What are the risks faced by our kids online?What are the risks faced by our kids online?
Is the Internet “Real?”Is the Internet “Real?”
Sexual PredatorsSexual Predators
Social Networking SitesSocial Networking Sites
Online CrimeOnline Crime
Some Warning SignsSome Warning Signs
If You See Warning SignsIf You See Warning Signs
Presentation AgendaPresentation Agenda
• How can you protect your kidsHow can you protect your kids
Some Simple StepsSome Simple Steps
Content Filtering SoftwareContent Filtering Software
Computer Monitoring SoftwareComputer Monitoring Software
Limit The Technology They Have Access ToLimit The Technology They Have Access To
Is the Internet “Real?”Is the Internet “Real?”
• I feel that there is a misconception among someI feel that there is a misconception among some
people that the Internet is not considered part ofpeople that the Internet is not considered part of
the real world.the real world.
• The Internet is as real as the world that we liveThe Internet is as real as the world that we live
in today. It’s a community of billions of people.in today. It’s a community of billions of people.
Like any community it has good neighborhoodsLike any community it has good neighborhoods
and bad neighborhoods. These badand bad neighborhoods. These bad
neighborhoods can contain many dangers.neighborhoods can contain many dangers.
Sexual PredatorsSexual Predators
• Sexual predators or pedophiles are one of theSexual predators or pedophiles are one of the
biggest dangers to young people on the Internetbiggest dangers to young people on the Internet
today.today.
• Some Statistics from the FBI:Some Statistics from the FBI:
One in four has encountered unwanted pornography.One in four has encountered unwanted pornography.
One in five has been sexually solicited.One in five has been sexually solicited.
One in 17 was threatened or harassed in the past year.One in 17 was threatened or harassed in the past year.
One in 33 received an aggressive sexual solicitation.One in 33 received an aggressive sexual solicitation.
Nearly 60 percent have received an e-mail or instantNearly 60 percent have received an e-mail or instant
message from a stranger, and half responded to themessage from a stranger, and half responded to the
stranger’s message.stranger’s message.
Sexual PredatorsSexual Predators
• The predator will make first contact with yourThe predator will make first contact with your
child though a chat room or social networkingchild though a chat room or social networking
site (such as MySpace or Facebook)site (such as MySpace or Facebook)
• Once contact is established the predator willOnce contact is established the predator will
attempt to “groom” your child, luring them (andattempt to “groom” your child, luring them (and
sometimes you) into a trusting relationship insometimes you) into a trusting relationship in
preparation for sexual activities to take place.preparation for sexual activities to take place.
This begins in a harmless fashion and progressesThis begins in a harmless fashion and progresses
into discussions of a sexual nature. Theinto discussions of a sexual nature. The
grooming process is deliberate and slow,grooming process is deliberate and slow,
sometimes taking months.sometimes taking months.
Sexual PredatorsSexual Predators
• Once the grooming process is complete the faceOnce the grooming process is complete the face
to face meeting will take place, where the victimto face meeting will take place, where the victim
will be sexually abused.will be sexually abused.
Social Networking SitesSocial Networking Sites
• These sites (such as MySpace or Facebook) areThese sites (such as MySpace or Facebook) are
quickly becoming the popular method forquickly becoming the popular method for
children to communicate with their friendschildren to communicate with their friends
online.online.
• You can have a personal page (called a profile)You can have a personal page (called a profile)
where you can talk about yourself, post pictureswhere you can talk about yourself, post pictures
and video etc.and video etc.
• You can find the profiles of your friends onYou can find the profiles of your friends on
these sites and have your profile link to theirs.these sites and have your profile link to theirs.
This allows your “friends” to see theThis allows your “friends” to see the
information on your profile.information on your profile.
Social Networking SitesSocial Networking Sites
• Social Networking Sites are a huge breedingSocial Networking Sites are a huge breeding
ground for sexual predators as the powerfulground for sexual predators as the powerful
search features of such sites make it easy forsearch features of such sites make it easy for
them to find and contact potential victims.them to find and contact potential victims.
• Although these sites have age limits for settingAlthough these sites have age limits for setting
up a profile there are no means of actuallyup a profile there are no means of actually
verifying the age of a specific user when theyverifying the age of a specific user when they
sign up.sign up.
• Many teenagers put far too much personalMany teenagers put far too much personal
information into their profiles.information into their profiles.
Social Networking SitesSocial Networking Sites
Social Networking SitesSocial Networking Sites
Social Networking SitesSocial Networking Sites
Social Networking SitesSocial Networking Sites
• After a string of criminal investigations inAfter a string of criminal investigations in
Connecticut involving social networking sitesConnecticut involving social networking sites
and sexual predators Attorney Generaland sexual predators Attorney General
Blumenthal asked in March of 2007 that a bill beBlumenthal asked in March of 2007 that a bill be
considered to require social networking sites toconsidered to require social networking sites to
get parental permission before posting theget parental permission before posting the
profile of a minor and requiring socialprofile of a minor and requiring social
networking sites to verify a person’s age usingnetworking sites to verify a person’s age using
independent information. Other states haveindependent information. Other states have
asked for similar measures. The bill did not passasked for similar measures. The bill did not pass
the State Legislature.the State Legislature.
Social Networking SitesSocial Networking Sites
• Facebook and MySpace are also a potentialFacebook and MySpace are also a potential
source of malware. Both sites allow you tosource of malware. Both sites allow you to
install programs, called applications, that areinstall programs, called applications, that are
made by other people to your profile. In mostmade by other people to your profile. In most
cases this third party software is not properlycases this third party software is not properly
tested and may contain malware. There havetested and may contain malware. There have
been cases where this malware has compromisedbeen cases where this malware has compromised
peoples privacy or required extensive cleanup topeoples privacy or required extensive cleanup to
correct.correct.
Social Networking SitesSocial Networking Sites
• To make matters even worse a new securityTo make matters even worse a new security
issue began to be reported last November, thatissue began to be reported last November, that
of “profile identity theft.” A Facebook orof “profile identity theft.” A Facebook or
MySpace profile is broken into and informationMySpace profile is broken into and information
is changed to indicate that the person needsis changed to indicate that the person needs
money. This will often cause the thief to receivemoney. This will often cause the thief to receive
money in a fraudulent manner. This type ofmoney in a fraudulent manner. This type of
theft is extremely difficult (if not impossible) totheft is extremely difficult (if not impossible) to
undo once it is done.undo once it is done.
Social Networking SitesSocial Networking Sites
• The information that you post in your profileThe information that you post in your profile
can come back to haunt you years later. Socialcan come back to haunt you years later. Social
networking sites are indexed by search enginesnetworking sites are indexed by search engines
and your profile can get on a search engine.and your profile can get on a search engine.
Employers often check search engines and socialEmployers often check search engines and social
networking sites as part of post 9/11networking sites as part of post 9/11
background checking procedures. If they don’tbackground checking procedures. If they don’t
like what they see you may just find that joblike what they see you may just find that job
offer you were hoping for declined. Once youoffer you were hoping for declined. Once you
put information on the Internet it’s thereput information on the Internet it’s there
FOREVER!FOREVER!
Social Networking SitesSocial Networking Sites
• MySpace recently reported that it had found andMySpace recently reported that it had found and
removed from their site 90,000 profiles thatremoved from their site 90,000 profiles that
belonged to registered sex offenders. Thisbelonged to registered sex offenders. This
number is double MySpace’s previous estimate.number is double MySpace’s previous estimate.
• Some of these profiles were from offenders thatSome of these profiles were from offenders that
were barred from using the Internet.were barred from using the Internet.
• These profiles were discovered through a newThese profiles were discovered through a new
technology known as Sentinel SAFE, a databasetechnology known as Sentinel SAFE, a database
that allows MySpace to tie their profile data withthat allows MySpace to tie their profile data with
the sex offender registries.the sex offender registries.
Social Networking SitesSocial Networking Sites
• Facebook is currently not using Sentinel SAFE,Facebook is currently not using Sentinel SAFE,
and it’s believed that at least some of the sexand it’s believed that at least some of the sex
offenders that were removed from MySpace areoffenders that were removed from MySpace are
now on Facebook.now on Facebook.
• Sentinel SAFE is also not a foolproofSentinel SAFE is also not a foolproof
technology. It’s possible to create a profiletechnology. It’s possible to create a profile
using false information to fool the Sentinelusing false information to fool the Sentinel
SAFE scanner.SAFE scanner.
Social Networking SitesSocial Networking Sites
• Facebook has recently changed their Terms ofFacebook has recently changed their Terms of
Service. They now state that they can doService. They now state that they can do
whatever they want with any information onwhatever they want with any information on
your profile, forever. This includes selling it toyour profile, forever. This includes selling it to
commercial third parties and it still in effect evencommercial third parties and it still in effect even
if you delete your Facebook profile.if you delete your Facebook profile.
Online CrimeOnline Crime
• Increasingly, teenagers are actually gettingIncreasingly, teenagers are actually getting
involved in online crime themselves.involved in online crime themselves.
• People commit online crimes for three generalPeople commit online crimes for three general
reasons: for the money involved, out of anger,reasons: for the money involved, out of anger,
or for fun.or for fun.
• These crimes are very serious, especially in aThese crimes are very serious, especially in a
post 9/11 world. Depending on the exactpost 9/11 world. Depending on the exact
nature of the crime you can either be sent tonature of the crime you can either be sent to
juvenile detention or tried as an adult and bejuvenile detention or tried as an adult and be
sentenced to prison.sentenced to prison.
Online CrimeOnline Crime
• Many of these crimes are Federal offencesMany of these crimes are Federal offences
• Parents of minors convicted of a crime can beParents of minors convicted of a crime can be
(and often are) held liable for the actions of their(and often are) held liable for the actions of their
minor children.minor children.
• It should be noted that most of the kids thatIt should be noted that most of the kids that
become involved in online crime are not kidsbecome involved in online crime are not kids
that are troublemakers, but very smart students.that are troublemakers, but very smart students.
Online CrimeOnline Crime
• Types of online crime:Types of online crime:
Identity TheftIdentity Theft
Malicious computer hackingMalicious computer hacking
FraudFraud
CyberbullyingCyberbullying
Online CrimeOnline Crime
• Identity Theft is one of the newest crime wavesIdentity Theft is one of the newest crime waves
sweeping the country right now.sweeping the country right now.
• Teenagers often become involved in identityTeenagers often become involved in identity
theft rings because of the money involved.theft rings because of the money involved.
• The money involved in identity theft (and otherThe money involved in identity theft (and other
online crime) can be staggering. Credit cardonline crime) can be staggering. Credit card
numbers and other personal information getnumbers and other personal information get
sold online for $5 each. If you have 10,000sold online for $5 each. If you have 10,000
credit card numbers that’s $50,000. Some of thecredit card numbers that’s $50,000. Some of the
people involved in the TJX case were 17-19.people involved in the TJX case were 17-19.
Online CrimeOnline Crime
• There's an ongoing case in Wisconsin of an 18There's an ongoing case in Wisconsin of an 18
year old that assumed the identity of a girl onyear old that assumed the identity of a girl on
Facebook for purposes of blackmailing fellowFacebook for purposes of blackmailing fellow
students into performing sex acts on him. Hestudents into performing sex acts on him. He
has numerous charges against him. If he’shas numerous charges against him. If he’s
convicted on all counts he could get as much asconvicted on all counts he could get as much as
300 years in prison. He recently plea bargained300 years in prison. He recently plea bargained
and could be subject to a 50 year prisonand could be subject to a 50 year prison
sentence.sentence.
Online CrimeOnline Crime
• Malicious computer hacking is another commonMalicious computer hacking is another common
crime.crime.
• A case just closed in Massachusetts where a 17A case just closed in Massachusetts where a 17
year old known online as Dshocker was chargedyear old known online as Dshocker was charged
and pleaded guilty to several counts of computerand pleaded guilty to several counts of computer
attacks, including credit card fraud. The mostattacks, including credit card fraud. The most
serious of these involved what is known asserious of these involved what is known as
“swatting.” If he had been tried as an adult, he“swatting.” If he had been tried as an adult, he
could have faced 10 years in prison.could have faced 10 years in prison.
Online CrimeOnline Crime
• There have been several cases of teenagersThere have been several cases of teenagers
committing fraud by setting up EBay accountscommitting fraud by setting up EBay accounts
and auctioning fake items online.and auctioning fake items online.
• Cyberbulling is bullying people online. TheCyberbulling is bullying people online. The
consequences of cyberbullying can be veryconsequences of cyberbullying can be very
serious.serious.
• The Megan Meier Cyberbulling case has closedThe Megan Meier Cyberbulling case has closed
with 2 people being convicted of 3 misdemeanorwith 2 people being convicted of 3 misdemeanor
charges. However, the verdict is being appealed.charges. However, the verdict is being appealed.
Some Warning SignsSome Warning Signs
• Your child may be in contact with a sexual predator orYour child may be in contact with a sexual predator or
engaging in online crime if you see any of the followingengaging in online crime if you see any of the following
warning signs:warning signs:
Downloads photos of strangersDownloads photos of strangers
Downloads pornographic imagesDownloads pornographic images
Quickly turns off the computer or changes softwareQuickly turns off the computer or changes software
applications when someone enters the roomapplications when someone enters the room
Spends unsupervised time in chat roomsSpends unsupervised time in chat rooms
Waits until other family members are asleep or out ofWaits until other family members are asleep or out of
the home before going onlinethe home before going online
Receives unusual phone calls or gifts or letters in theReceives unusual phone calls or gifts or letters in the
mailmail
Some Warning SignsSome Warning Signs
• Your child may be in contact with a sexual predator orYour child may be in contact with a sexual predator or
engaging in online crime if you see any of the followingengaging in online crime if you see any of the following
warning signs:warning signs:
Is very secretive about online activities and the peopleIs very secretive about online activities and the people
he or she talks tohe or she talks to
Visits Web sites dealing with death, destruction, orVisits Web sites dealing with death, destruction, or
other morbid topicsother morbid topics
Uses online accounts that you do not recognize or usesUses online accounts that you do not recognize or uses
multiple e-mail addressesmultiple e-mail addresses
Spends countless hours on the computer and his orSpends countless hours on the computer and his or
her school grades have droppedher school grades have dropped
You find illegally obtained software on your computerYou find illegally obtained software on your computer
If You See Warning SignsIf You See Warning Signs
• Talk with your child and try to find out what isTalk with your child and try to find out what is
going on.going on.
• Contact your local police for assistance.Contact your local police for assistance.
• Above all, DON’T touch the computer. InAbove all, DON’T touch the computer. In
doing so you may inadvertently destroy evidencedoing so you may inadvertently destroy evidence
needed to prosecute an offender.needed to prosecute an offender.
Some Simple StepsSome Simple Steps
• Keep the computer in a public place in yourKeep the computer in a public place in your
home.home.
• Talk about the dangers of the Internet, and setTalk about the dangers of the Internet, and set
some rules that your child needs to follow.some rules that your child needs to follow.
• Examine your Internet browser history.Examine your Internet browser history.
• Consider using Content filtering and ComputerConsider using Content filtering and Computer
monitoring software.monitoring software.
• Limit the amount of time spent on theLimit the amount of time spent on the
computer.computer.
Some Simple StepsSome Simple Steps
• Make sure your kids know to never divulgeMake sure your kids know to never divulge
personal information over the Internetpersonal information over the Internet
• You should have your kids e-mail username andYou should have your kids e-mail username and
password. Don’t let them have more than onepassword. Don’t let them have more than one
email account.email account.
• Make sure that your kinds know to let you knowMake sure that your kinds know to let you know
right away if they run into a problem online.right away if they run into a problem online.
• Spend time online with your kids.Spend time online with your kids.
Internet Browser HistoryInternet Browser History
Internet Browser History – TheInternet Browser History – The
INDEX.DAT FilesINDEX.DAT Files
• Windows also keeps hidden history files calledWindows also keeps hidden history files called
index.dat.index.dat.
• Most computers have several index.dat filesMost computers have several index.dat files
• These files are not human readable and require aThese files are not human readable and require a
special viewer.special viewer.
Content Filtering SoftwareContent Filtering Software
• Content filtering software allows you to filterContent filtering software allows you to filter
that content that your child can access on thethat content that your child can access on the
Internet.Internet.
• Some examples of this software are NetnannySome examples of this software are Netnanny
and CYBERPatrol.and CYBERPatrol.
• Websites, Emails and Instant messages can beWebsites, Emails and Instant messages can be
filtered with this type of software.filtered with this type of software.
Computer Monitoring SoftwareComputer Monitoring Software
• Another option that is available to parents isAnother option that is available to parents is
computer monitoring software, such as Spectorcomputer monitoring software, such as Spector
Pro (Pro (http://www.spector.comhttp://www.spector.com))
• Monitoring software records everything that isMonitoring software records everything that is
done on the computer and presents it to you.done on the computer and presents it to you.
• Although some parents may have ethicalAlthough some parents may have ethical
concerns with using this type of software. I feelconcerns with using this type of software. I feel
that it is a necessary step in today’s world.that it is a necessary step in today’s world.
Limit The Technology They HaveLimit The Technology They Have
Access ToAccess To
• What this means is if your child does notWhat this means is if your child does not
actually have a need to use something (such as aactually have a need to use something (such as a
cell phone with a camera in it) don’t let themcell phone with a camera in it) don’t let them
have one.have one.
• There’s an ongoing case of a 15 year old girl outThere’s an ongoing case of a 15 year old girl out
in Ohio that has been arrested for sending nudein Ohio that has been arrested for sending nude
pictures of herself that she took with the camerapictures of herself that she took with the camera
in her cell phone to other students.in her cell phone to other students.
Limit The Technology They HaveLimit The Technology They Have
Access ToAccess To
• ““Sexting” is the act of using a cell phone cameraSexting” is the act of using a cell phone camera
to take pornographic pictures of yourself andto take pornographic pictures of yourself and
spread them around to your friends.spread them around to your friends.
• This is a very dangerous practice and isThis is a very dangerous practice and is
considered manufacturing and distribution ofconsidered manufacturing and distribution of
child pornography.child pornography.
• Penalties for this offence are extreme.Penalties for this offence are extreme.
Limit The Technology They HaveLimit The Technology They Have
Access ToAccess To
• Charges are also being considered against someCharges are also being considered against some
of the students that received the photos.of the students that received the photos.
• If the girl is convicted, she faces the possibilityIf the girl is convicted, she faces the possibility
of having to register as a sex offender for 20of having to register as a sex offender for 20
years.years.
• The Ohio case is the result of “sexting”The Ohio case is the result of “sexting”
• Webcams can also be a very dangerous piece ofWebcams can also be a very dangerous piece of
technology.technology.
Limit The Technology They HaveLimit The Technology They Have
Access ToAccess To
• A then 13 year old California boy named JustinA then 13 year old California boy named Justin
Barry began posing on his webcam for peopleBarry began posing on his webcam for people
that turned out to be sexual predators.that turned out to be sexual predators.
• He progressed into operating a porn site with hisHe progressed into operating a porn site with his
own photos that made him several hundredown photos that made him several hundred
thousand dollars.thousand dollars.
• He was sexually abused several times.He was sexually abused several times.
• Later he became a witness for the FBI and wasLater he became a witness for the FBI and was
given immunity.given immunity.
Limit The Technology They HaveLimit The Technology They Have
Access ToAccess To
• With the information that he turned over to theWith the information that he turned over to the
FBI he was not only able to bring down manyFBI he was not only able to bring down many
sexual predators but also web hosting companiessexual predators but also web hosting companies
and credit card processors. He saved the lives ofand credit card processors. He saved the lives of
hundreds, perhaps thousands of children thoughhundreds, perhaps thousands of children though
his actions.his actions.
Limit The Technology They HaveLimit The Technology They Have
Access ToAccess To
• If you get certain types of malware on yourIf you get certain types of malware on your
computer your webcam can be used to spy oncomputer your webcam can be used to spy on
you without your knowledge.you without your knowledge.
Any Questions

More Related Content

What's hot

You Don't Build Homes
You Don't Build HomesYou Don't Build Homes
You Don't Build Homes
Tara Hunt
 
Cyber sex preo-rf-v5
Cyber sex preo-rf-v5Cyber sex preo-rf-v5
Cyber sex preo-rf-v5
Tom Daly
 
Walworth academy e-safety (staff)
Walworth academy   e-safety (staff)Walworth academy   e-safety (staff)
Walworth academy e-safety (staff)esolate
 
Blogging Ethics
Blogging EthicsBlogging Ethics
Blogging Ethics
nswaby
 
Community Presentation on MySpace and Social Networking
Community Presentation on MySpace and Social NetworkingCommunity Presentation on MySpace and Social Networking
Community Presentation on MySpace and Social Networking
Shotzy Paugh
 
Digital footprints final
Digital footprints finalDigital footprints final
Digital footprints finalseanclimbs
 
Facebook: What do we really know?
Facebook:   What do we really know?Facebook:   What do we really know?
Facebook: What do we really know?mtrussosabbers
 
FBI Cybercrime Presentation
FBI Cybercrime PresentationFBI Cybercrime Presentation
FBI Cybercrime Presentation
Stanislaus County Office of Education
 
Facebook's '10 Year Challenge' Is Just a Harmless Meme - Right?
Facebook's '10 Year Challenge' Is Just a Harmless Meme - Right?Facebook's '10 Year Challenge' Is Just a Harmless Meme - Right?
Facebook's '10 Year Challenge' Is Just a Harmless Meme - Right?
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
Whuffie Can Buy Me Love
Whuffie Can Buy Me LoveWhuffie Can Buy Me Love
Whuffie Can Buy Me Love
Tara Hunt
 
Internet safety for parents
Internet safety for parentsInternet safety for parents
Internet safety for parentsKaren Brooks
 
How to Catch Someone Who Is Cheating Online
How to Catch Someone Who Is Cheating OnlineHow to Catch Someone Who Is Cheating Online
How to Catch Someone Who Is Cheating Online
Paul Bossky
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsCreepSquash
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
LightedCandle
 
Kid Safety On The Internet
Kid Safety On The InternetKid Safety On The Internet
Kid Safety On The InternetJennifer Chilek
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
OCTF Industry Engagement
 
Will Social Media For Work
Will Social Media For WorkWill Social Media For Work
Will Social Media For Work
Chase Reeves
 
Digitalfootprints 10 08
Digitalfootprints 10 08Digitalfootprints 10 08
Digitalfootprints 10 08elizkeren
 

What's hot (20)

You Don't Build Homes
You Don't Build HomesYou Don't Build Homes
You Don't Build Homes
 
Cyber sex preo-rf-v5
Cyber sex preo-rf-v5Cyber sex preo-rf-v5
Cyber sex preo-rf-v5
 
Walworth academy e-safety (staff)
Walworth academy   e-safety (staff)Walworth academy   e-safety (staff)
Walworth academy e-safety (staff)
 
Blogging Ethics
Blogging EthicsBlogging Ethics
Blogging Ethics
 
Community Presentation on MySpace and Social Networking
Community Presentation on MySpace and Social NetworkingCommunity Presentation on MySpace and Social Networking
Community Presentation on MySpace and Social Networking
 
Digital footprints final
Digital footprints finalDigital footprints final
Digital footprints final
 
Facebook: What do we really know?
Facebook:   What do we really know?Facebook:   What do we really know?
Facebook: What do we really know?
 
FBI Cybercrime Presentation
FBI Cybercrime PresentationFBI Cybercrime Presentation
FBI Cybercrime Presentation
 
Facebook's '10 Year Challenge' Is Just a Harmless Meme - Right?
Facebook's '10 Year Challenge' Is Just a Harmless Meme - Right?Facebook's '10 Year Challenge' Is Just a Harmless Meme - Right?
Facebook's '10 Year Challenge' Is Just a Harmless Meme - Right?
 
Whuffie Can Buy Me Love
Whuffie Can Buy Me LoveWhuffie Can Buy Me Love
Whuffie Can Buy Me Love
 
Web pp
Web ppWeb pp
Web pp
 
Internet safety for parents
Internet safety for parentsInternet safety for parents
Internet safety for parents
 
How to Catch Someone Who Is Cheating Online
How to Catch Someone Who Is Cheating OnlineHow to Catch Someone Who Is Cheating Online
How to Catch Someone Who Is Cheating Online
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Kid Safety On The Internet
Kid Safety On The InternetKid Safety On The Internet
Kid Safety On The Internet
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Will Social Media For Work
Will Social Media For WorkWill Social Media For Work
Will Social Media For Work
 
Digitalfootprints 10 08
Digitalfootprints 10 08Digitalfootprints 10 08
Digitalfootprints 10 08
 
Web pp
Web ppWeb pp
Web pp
 

Viewers also liked

CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
Yogesh Prajapati
 
День открытых дверей Магистерской программы "Психоанализ и бизнес-консультиро...
День открытых дверей Магистерской программы "Психоанализ и бизнес-консультиро...День открытых дверей Магистерской программы "Психоанализ и бизнес-консультиро...
День открытых дверей Магистерской программы "Психоанализ и бизнес-консультиро...
Психоанализ и бизнес-консультиривание ВШЭ
 
What is an online predator
What is an online predatorWhat is an online predator
What is an online predatorKlein ISD
 
Effects of social media (product)
Effects of social media (product)Effects of social media (product)
Effects of social media (product)
viannyregalado
 
Journalism pitch-and-planning
Journalism pitch-and-planningJournalism pitch-and-planning
Journalism pitch-and-planning
EazyE99
 
Jan 7, 2013: Global Product Management Talk on Iterative Product Development
Jan 7, 2013: Global Product Management Talk on Iterative Product DevelopmentJan 7, 2013: Global Product Management Talk on Iterative Product Development
Jan 7, 2013: Global Product Management Talk on Iterative Product Development
Startup Product Academy, LLC
 
Building Market Authority with Jim Holland transcript
Building Market Authority with Jim Holland transcriptBuilding Market Authority with Jim Holland transcript
Building Market Authority with Jim Holland transcript
Startup Product Academy, LLC
 
Net Neutrality: July 15, 2014: 2 Documents
Net Neutrality: July 15, 2014: 2 DocumentsNet Neutrality: July 15, 2014: 2 Documents
Net Neutrality: July 15, 2014: 2 Documents
Startup Product Academy, LLC
 
What Is Biztegrity?
What Is Biztegrity?What Is Biztegrity?
What Is Biztegrity?
Startup Product Academy, LLC
 
Alliance Human Leveling Guide 1 12
Alliance Human Leveling Guide 1 12Alliance Human Leveling Guide 1 12
Alliance Human Leveling Guide 1 12UCLA
 
Oct 24: Building Innovative Products w/Jason Hardy-Smith, VP, BrightIdea
Oct 24: Building Innovative Products w/Jason Hardy-Smith, VP, BrightIdeaOct 24: Building Innovative Products w/Jason Hardy-Smith, VP, BrightIdea
Oct 24: Building Innovative Products w/Jason Hardy-Smith, VP, BrightIdea
Startup Product Academy, LLC
 
54513700 doklad-kniznii-rinok2011
54513700 doklad-kniznii-rinok201154513700 doklad-kniznii-rinok2011
54513700 doklad-kniznii-rinok2011
PDA Ekniga
 
Dicas de SEO para otimizar sua loja virtual
Dicas de SEO para otimizar sua loja virtualDicas de SEO para otimizar sua loja virtual
Dicas de SEO para otimizar sua loja virtual
Heric Tilly
 
MavenClickz Online Marketing Approach in China Chinese Launguage
MavenClickz Online Marketing Approach in China Chinese LaunguageMavenClickz Online Marketing Approach in China Chinese Launguage
MavenClickz Online Marketing Approach in China Chinese Launguage
MavenClickZ Media Pvt Ltd.
 
AIPMM Webcast: Growing High Performing Product Management Teams
AIPMM Webcast: Growing High Performing Product Management TeamsAIPMM Webcast: Growing High Performing Product Management Teams
AIPMM Webcast: Growing High Performing Product Management Teams
Startup Product Academy, LLC
 
What is the Semantic Web?
What is the Semantic Web?What is the Semantic Web?
What is the Semantic Web?
Startup Product Academy, LLC
 
6/18/12 The Value of Fanatical Support™ w/ Rob LaGesse @Kr8tr Chief Disruptio...
6/18/12 The Value of Fanatical Support™ w/ Rob LaGesse @Kr8tr Chief Disruptio...6/18/12 The Value of Fanatical Support™ w/ Rob LaGesse @Kr8tr Chief Disruptio...
6/18/12 The Value of Fanatical Support™ w/ Rob LaGesse @Kr8tr Chief Disruptio...
Startup Product Academy, LLC
 

Viewers also liked (20)

CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
 
Cherokee int safety
Cherokee int safetyCherokee int safety
Cherokee int safety
 
День открытых дверей Магистерской программы "Психоанализ и бизнес-консультиро...
День открытых дверей Магистерской программы "Психоанализ и бизнес-консультиро...День открытых дверей Магистерской программы "Психоанализ и бизнес-консультиро...
День открытых дверей Магистерской программы "Психоанализ и бизнес-консультиро...
 
What is an online predator
What is an online predatorWhat is an online predator
What is an online predator
 
Effects of social media (product)
Effects of social media (product)Effects of social media (product)
Effects of social media (product)
 
Journalism pitch-and-planning
Journalism pitch-and-planningJournalism pitch-and-planning
Journalism pitch-and-planning
 
Jan 7, 2013: Global Product Management Talk on Iterative Product Development
Jan 7, 2013: Global Product Management Talk on Iterative Product DevelopmentJan 7, 2013: Global Product Management Talk on Iterative Product Development
Jan 7, 2013: Global Product Management Talk on Iterative Product Development
 
Email Etiquette
Email  EtiquetteEmail  Etiquette
Email Etiquette
 
Building Market Authority with Jim Holland transcript
Building Market Authority with Jim Holland transcriptBuilding Market Authority with Jim Holland transcript
Building Market Authority with Jim Holland transcript
 
Net Neutrality: July 15, 2014: 2 Documents
Net Neutrality: July 15, 2014: 2 DocumentsNet Neutrality: July 15, 2014: 2 Documents
Net Neutrality: July 15, 2014: 2 Documents
 
What Is Biztegrity?
What Is Biztegrity?What Is Biztegrity?
What Is Biztegrity?
 
Alliance Human Leveling Guide 1 12
Alliance Human Leveling Guide 1 12Alliance Human Leveling Guide 1 12
Alliance Human Leveling Guide 1 12
 
Oct 24: Building Innovative Products w/Jason Hardy-Smith, VP, BrightIdea
Oct 24: Building Innovative Products w/Jason Hardy-Smith, VP, BrightIdeaOct 24: Building Innovative Products w/Jason Hardy-Smith, VP, BrightIdea
Oct 24: Building Innovative Products w/Jason Hardy-Smith, VP, BrightIdea
 
54513700 doklad-kniznii-rinok2011
54513700 doklad-kniznii-rinok201154513700 doklad-kniznii-rinok2011
54513700 doklad-kniznii-rinok2011
 
Dicas de SEO para otimizar sua loja virtual
Dicas de SEO para otimizar sua loja virtualDicas de SEO para otimizar sua loja virtual
Dicas de SEO para otimizar sua loja virtual
 
MavenClickz Online Marketing Approach in China Chinese Launguage
MavenClickz Online Marketing Approach in China Chinese LaunguageMavenClickz Online Marketing Approach in China Chinese Launguage
MavenClickz Online Marketing Approach in China Chinese Launguage
 
AIPMM Webcast: Growing High Performing Product Management Teams
AIPMM Webcast: Growing High Performing Product Management TeamsAIPMM Webcast: Growing High Performing Product Management Teams
AIPMM Webcast: Growing High Performing Product Management Teams
 
Business Writing
Business WritingBusiness Writing
Business Writing
 
What is the Semantic Web?
What is the Semantic Web?What is the Semantic Web?
What is the Semantic Web?
 
6/18/12 The Value of Fanatical Support™ w/ Rob LaGesse @Kr8tr Chief Disruptio...
6/18/12 The Value of Fanatical Support™ w/ Rob LaGesse @Kr8tr Chief Disruptio...6/18/12 The Value of Fanatical Support™ w/ Rob LaGesse @Kr8tr Chief Disruptio...
6/18/12 The Value of Fanatical Support™ w/ Rob LaGesse @Kr8tr Chief Disruptio...
 

Similar to Keeping your Children Safe Online

Social Media or Social Destruction?
Social Media or Social Destruction?Social Media or Social Destruction?
Social Media or Social Destruction?kswaterman
 
My Online Image
My Online ImageMy Online Image
My Online Imagealuthe
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
Barry Caplin
 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullying
kschermerhorn
 
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
larrylieb
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
Karan Veer Singh
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
Larry Magid
 
Digital footprints& datamining
Digital footprints& dataminingDigital footprints& datamining
Digital footprints& datamining
Paige Jaeger
 
Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlineLane Sutton
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutlet
Lockley
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
springvillegi
 
Overview Am I In Porn? | Fighting Image-Based Sexual Abuse including “revenge...
Overview Am I In Porn? | Fighting Image-Based Sexual Abuse including “revenge...Overview Am I In Porn? | Fighting Image-Based Sexual Abuse including “revenge...
Overview Am I In Porn? | Fighting Image-Based Sexual Abuse including “revenge...
Am I In Porn?
 
Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101
National Crime Prevention Council
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
Pat Sine
 
102009
102009102009
ADP01 - Why It's Important
ADP01 - Why It's ImportantADP01 - Why It's Important
ADP01 - Why It's Important
Chad Landman
 

Similar to Keeping your Children Safe Online (20)

Facebook
FacebookFacebook
Facebook
 
Social Media or Social Destruction?
Social Media or Social Destruction?Social Media or Social Destruction?
Social Media or Social Destruction?
 
My Online Image
My Online ImageMy Online Image
My Online Image
 
Finalproject
FinalprojectFinalproject
Finalproject
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullying
 
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Protecting Your Child
Protecting Your ChildProtecting Your Child
Protecting Your Child
 
Digital footprints& datamining
Digital footprints& dataminingDigital footprints& datamining
Digital footprints& datamining
 
Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself online
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutlet
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Overview Am I In Porn? | Fighting Image-Based Sexual Abuse including “revenge...
Overview Am I In Porn? | Fighting Image-Based Sexual Abuse including “revenge...Overview Am I In Porn? | Fighting Image-Based Sexual Abuse including “revenge...
Overview Am I In Porn? | Fighting Image-Based Sexual Abuse including “revenge...
 
Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
102009
102009102009
102009
 
ADP01 - Why It's Important
ADP01 - Why It's ImportantADP01 - Why It's Important
ADP01 - Why It's Important
 

Keeping your Children Safe Online

  • 1. Keeping your ChildrenKeeping your Children Safe OnlineSafe Online A Presentation by Matt Smith. President of Litchfield County Computer, L.L.C.
  • 2. Presentation AgendaPresentation Agenda • What are the risks faced by our kids online?What are the risks faced by our kids online? Is the Internet “Real?”Is the Internet “Real?” Sexual PredatorsSexual Predators Social Networking SitesSocial Networking Sites Online CrimeOnline Crime Some Warning SignsSome Warning Signs If You See Warning SignsIf You See Warning Signs
  • 3. Presentation AgendaPresentation Agenda • How can you protect your kidsHow can you protect your kids Some Simple StepsSome Simple Steps Content Filtering SoftwareContent Filtering Software Computer Monitoring SoftwareComputer Monitoring Software Limit The Technology They Have Access ToLimit The Technology They Have Access To
  • 4. Is the Internet “Real?”Is the Internet “Real?” • I feel that there is a misconception among someI feel that there is a misconception among some people that the Internet is not considered part ofpeople that the Internet is not considered part of the real world.the real world. • The Internet is as real as the world that we liveThe Internet is as real as the world that we live in today. It’s a community of billions of people.in today. It’s a community of billions of people. Like any community it has good neighborhoodsLike any community it has good neighborhoods and bad neighborhoods. These badand bad neighborhoods. These bad neighborhoods can contain many dangers.neighborhoods can contain many dangers.
  • 5. Sexual PredatorsSexual Predators • Sexual predators or pedophiles are one of theSexual predators or pedophiles are one of the biggest dangers to young people on the Internetbiggest dangers to young people on the Internet today.today. • Some Statistics from the FBI:Some Statistics from the FBI: One in four has encountered unwanted pornography.One in four has encountered unwanted pornography. One in five has been sexually solicited.One in five has been sexually solicited. One in 17 was threatened or harassed in the past year.One in 17 was threatened or harassed in the past year. One in 33 received an aggressive sexual solicitation.One in 33 received an aggressive sexual solicitation. Nearly 60 percent have received an e-mail or instantNearly 60 percent have received an e-mail or instant message from a stranger, and half responded to themessage from a stranger, and half responded to the stranger’s message.stranger’s message.
  • 6. Sexual PredatorsSexual Predators • The predator will make first contact with yourThe predator will make first contact with your child though a chat room or social networkingchild though a chat room or social networking site (such as MySpace or Facebook)site (such as MySpace or Facebook) • Once contact is established the predator willOnce contact is established the predator will attempt to “groom” your child, luring them (andattempt to “groom” your child, luring them (and sometimes you) into a trusting relationship insometimes you) into a trusting relationship in preparation for sexual activities to take place.preparation for sexual activities to take place. This begins in a harmless fashion and progressesThis begins in a harmless fashion and progresses into discussions of a sexual nature. Theinto discussions of a sexual nature. The grooming process is deliberate and slow,grooming process is deliberate and slow, sometimes taking months.sometimes taking months.
  • 7. Sexual PredatorsSexual Predators • Once the grooming process is complete the faceOnce the grooming process is complete the face to face meeting will take place, where the victimto face meeting will take place, where the victim will be sexually abused.will be sexually abused.
  • 8. Social Networking SitesSocial Networking Sites • These sites (such as MySpace or Facebook) areThese sites (such as MySpace or Facebook) are quickly becoming the popular method forquickly becoming the popular method for children to communicate with their friendschildren to communicate with their friends online.online. • You can have a personal page (called a profile)You can have a personal page (called a profile) where you can talk about yourself, post pictureswhere you can talk about yourself, post pictures and video etc.and video etc. • You can find the profiles of your friends onYou can find the profiles of your friends on these sites and have your profile link to theirs.these sites and have your profile link to theirs. This allows your “friends” to see theThis allows your “friends” to see the information on your profile.information on your profile.
  • 9. Social Networking SitesSocial Networking Sites • Social Networking Sites are a huge breedingSocial Networking Sites are a huge breeding ground for sexual predators as the powerfulground for sexual predators as the powerful search features of such sites make it easy forsearch features of such sites make it easy for them to find and contact potential victims.them to find and contact potential victims. • Although these sites have age limits for settingAlthough these sites have age limits for setting up a profile there are no means of actuallyup a profile there are no means of actually verifying the age of a specific user when theyverifying the age of a specific user when they sign up.sign up. • Many teenagers put far too much personalMany teenagers put far too much personal information into their profiles.information into their profiles.
  • 10. Social Networking SitesSocial Networking Sites
  • 11. Social Networking SitesSocial Networking Sites
  • 12. Social Networking SitesSocial Networking Sites
  • 13. Social Networking SitesSocial Networking Sites • After a string of criminal investigations inAfter a string of criminal investigations in Connecticut involving social networking sitesConnecticut involving social networking sites and sexual predators Attorney Generaland sexual predators Attorney General Blumenthal asked in March of 2007 that a bill beBlumenthal asked in March of 2007 that a bill be considered to require social networking sites toconsidered to require social networking sites to get parental permission before posting theget parental permission before posting the profile of a minor and requiring socialprofile of a minor and requiring social networking sites to verify a person’s age usingnetworking sites to verify a person’s age using independent information. Other states haveindependent information. Other states have asked for similar measures. The bill did not passasked for similar measures. The bill did not pass the State Legislature.the State Legislature.
  • 14. Social Networking SitesSocial Networking Sites • Facebook and MySpace are also a potentialFacebook and MySpace are also a potential source of malware. Both sites allow you tosource of malware. Both sites allow you to install programs, called applications, that areinstall programs, called applications, that are made by other people to your profile. In mostmade by other people to your profile. In most cases this third party software is not properlycases this third party software is not properly tested and may contain malware. There havetested and may contain malware. There have been cases where this malware has compromisedbeen cases where this malware has compromised peoples privacy or required extensive cleanup topeoples privacy or required extensive cleanup to correct.correct.
  • 15. Social Networking SitesSocial Networking Sites • To make matters even worse a new securityTo make matters even worse a new security issue began to be reported last November, thatissue began to be reported last November, that of “profile identity theft.” A Facebook orof “profile identity theft.” A Facebook or MySpace profile is broken into and informationMySpace profile is broken into and information is changed to indicate that the person needsis changed to indicate that the person needs money. This will often cause the thief to receivemoney. This will often cause the thief to receive money in a fraudulent manner. This type ofmoney in a fraudulent manner. This type of theft is extremely difficult (if not impossible) totheft is extremely difficult (if not impossible) to undo once it is done.undo once it is done.
  • 16. Social Networking SitesSocial Networking Sites • The information that you post in your profileThe information that you post in your profile can come back to haunt you years later. Socialcan come back to haunt you years later. Social networking sites are indexed by search enginesnetworking sites are indexed by search engines and your profile can get on a search engine.and your profile can get on a search engine. Employers often check search engines and socialEmployers often check search engines and social networking sites as part of post 9/11networking sites as part of post 9/11 background checking procedures. If they don’tbackground checking procedures. If they don’t like what they see you may just find that joblike what they see you may just find that job offer you were hoping for declined. Once youoffer you were hoping for declined. Once you put information on the Internet it’s thereput information on the Internet it’s there FOREVER!FOREVER!
  • 17. Social Networking SitesSocial Networking Sites • MySpace recently reported that it had found andMySpace recently reported that it had found and removed from their site 90,000 profiles thatremoved from their site 90,000 profiles that belonged to registered sex offenders. Thisbelonged to registered sex offenders. This number is double MySpace’s previous estimate.number is double MySpace’s previous estimate. • Some of these profiles were from offenders thatSome of these profiles were from offenders that were barred from using the Internet.were barred from using the Internet. • These profiles were discovered through a newThese profiles were discovered through a new technology known as Sentinel SAFE, a databasetechnology known as Sentinel SAFE, a database that allows MySpace to tie their profile data withthat allows MySpace to tie their profile data with the sex offender registries.the sex offender registries.
  • 18. Social Networking SitesSocial Networking Sites • Facebook is currently not using Sentinel SAFE,Facebook is currently not using Sentinel SAFE, and it’s believed that at least some of the sexand it’s believed that at least some of the sex offenders that were removed from MySpace areoffenders that were removed from MySpace are now on Facebook.now on Facebook. • Sentinel SAFE is also not a foolproofSentinel SAFE is also not a foolproof technology. It’s possible to create a profiletechnology. It’s possible to create a profile using false information to fool the Sentinelusing false information to fool the Sentinel SAFE scanner.SAFE scanner.
  • 19. Social Networking SitesSocial Networking Sites • Facebook has recently changed their Terms ofFacebook has recently changed their Terms of Service. They now state that they can doService. They now state that they can do whatever they want with any information onwhatever they want with any information on your profile, forever. This includes selling it toyour profile, forever. This includes selling it to commercial third parties and it still in effect evencommercial third parties and it still in effect even if you delete your Facebook profile.if you delete your Facebook profile.
  • 20. Online CrimeOnline Crime • Increasingly, teenagers are actually gettingIncreasingly, teenagers are actually getting involved in online crime themselves.involved in online crime themselves. • People commit online crimes for three generalPeople commit online crimes for three general reasons: for the money involved, out of anger,reasons: for the money involved, out of anger, or for fun.or for fun. • These crimes are very serious, especially in aThese crimes are very serious, especially in a post 9/11 world. Depending on the exactpost 9/11 world. Depending on the exact nature of the crime you can either be sent tonature of the crime you can either be sent to juvenile detention or tried as an adult and bejuvenile detention or tried as an adult and be sentenced to prison.sentenced to prison.
  • 21. Online CrimeOnline Crime • Many of these crimes are Federal offencesMany of these crimes are Federal offences • Parents of minors convicted of a crime can beParents of minors convicted of a crime can be (and often are) held liable for the actions of their(and often are) held liable for the actions of their minor children.minor children. • It should be noted that most of the kids thatIt should be noted that most of the kids that become involved in online crime are not kidsbecome involved in online crime are not kids that are troublemakers, but very smart students.that are troublemakers, but very smart students.
  • 22. Online CrimeOnline Crime • Types of online crime:Types of online crime: Identity TheftIdentity Theft Malicious computer hackingMalicious computer hacking FraudFraud CyberbullyingCyberbullying
  • 23. Online CrimeOnline Crime • Identity Theft is one of the newest crime wavesIdentity Theft is one of the newest crime waves sweeping the country right now.sweeping the country right now. • Teenagers often become involved in identityTeenagers often become involved in identity theft rings because of the money involved.theft rings because of the money involved. • The money involved in identity theft (and otherThe money involved in identity theft (and other online crime) can be staggering. Credit cardonline crime) can be staggering. Credit card numbers and other personal information getnumbers and other personal information get sold online for $5 each. If you have 10,000sold online for $5 each. If you have 10,000 credit card numbers that’s $50,000. Some of thecredit card numbers that’s $50,000. Some of the people involved in the TJX case were 17-19.people involved in the TJX case were 17-19.
  • 24. Online CrimeOnline Crime • There's an ongoing case in Wisconsin of an 18There's an ongoing case in Wisconsin of an 18 year old that assumed the identity of a girl onyear old that assumed the identity of a girl on Facebook for purposes of blackmailing fellowFacebook for purposes of blackmailing fellow students into performing sex acts on him. Hestudents into performing sex acts on him. He has numerous charges against him. If he’shas numerous charges against him. If he’s convicted on all counts he could get as much asconvicted on all counts he could get as much as 300 years in prison. He recently plea bargained300 years in prison. He recently plea bargained and could be subject to a 50 year prisonand could be subject to a 50 year prison sentence.sentence.
  • 25. Online CrimeOnline Crime • Malicious computer hacking is another commonMalicious computer hacking is another common crime.crime. • A case just closed in Massachusetts where a 17A case just closed in Massachusetts where a 17 year old known online as Dshocker was chargedyear old known online as Dshocker was charged and pleaded guilty to several counts of computerand pleaded guilty to several counts of computer attacks, including credit card fraud. The mostattacks, including credit card fraud. The most serious of these involved what is known asserious of these involved what is known as “swatting.” If he had been tried as an adult, he“swatting.” If he had been tried as an adult, he could have faced 10 years in prison.could have faced 10 years in prison.
  • 26. Online CrimeOnline Crime • There have been several cases of teenagersThere have been several cases of teenagers committing fraud by setting up EBay accountscommitting fraud by setting up EBay accounts and auctioning fake items online.and auctioning fake items online. • Cyberbulling is bullying people online. TheCyberbulling is bullying people online. The consequences of cyberbullying can be veryconsequences of cyberbullying can be very serious.serious. • The Megan Meier Cyberbulling case has closedThe Megan Meier Cyberbulling case has closed with 2 people being convicted of 3 misdemeanorwith 2 people being convicted of 3 misdemeanor charges. However, the verdict is being appealed.charges. However, the verdict is being appealed.
  • 27. Some Warning SignsSome Warning Signs • Your child may be in contact with a sexual predator orYour child may be in contact with a sexual predator or engaging in online crime if you see any of the followingengaging in online crime if you see any of the following warning signs:warning signs: Downloads photos of strangersDownloads photos of strangers Downloads pornographic imagesDownloads pornographic images Quickly turns off the computer or changes softwareQuickly turns off the computer or changes software applications when someone enters the roomapplications when someone enters the room Spends unsupervised time in chat roomsSpends unsupervised time in chat rooms Waits until other family members are asleep or out ofWaits until other family members are asleep or out of the home before going onlinethe home before going online Receives unusual phone calls or gifts or letters in theReceives unusual phone calls or gifts or letters in the mailmail
  • 28. Some Warning SignsSome Warning Signs • Your child may be in contact with a sexual predator orYour child may be in contact with a sexual predator or engaging in online crime if you see any of the followingengaging in online crime if you see any of the following warning signs:warning signs: Is very secretive about online activities and the peopleIs very secretive about online activities and the people he or she talks tohe or she talks to Visits Web sites dealing with death, destruction, orVisits Web sites dealing with death, destruction, or other morbid topicsother morbid topics Uses online accounts that you do not recognize or usesUses online accounts that you do not recognize or uses multiple e-mail addressesmultiple e-mail addresses Spends countless hours on the computer and his orSpends countless hours on the computer and his or her school grades have droppedher school grades have dropped You find illegally obtained software on your computerYou find illegally obtained software on your computer
  • 29. If You See Warning SignsIf You See Warning Signs • Talk with your child and try to find out what isTalk with your child and try to find out what is going on.going on. • Contact your local police for assistance.Contact your local police for assistance. • Above all, DON’T touch the computer. InAbove all, DON’T touch the computer. In doing so you may inadvertently destroy evidencedoing so you may inadvertently destroy evidence needed to prosecute an offender.needed to prosecute an offender.
  • 30. Some Simple StepsSome Simple Steps • Keep the computer in a public place in yourKeep the computer in a public place in your home.home. • Talk about the dangers of the Internet, and setTalk about the dangers of the Internet, and set some rules that your child needs to follow.some rules that your child needs to follow. • Examine your Internet browser history.Examine your Internet browser history. • Consider using Content filtering and ComputerConsider using Content filtering and Computer monitoring software.monitoring software. • Limit the amount of time spent on theLimit the amount of time spent on the computer.computer.
  • 31. Some Simple StepsSome Simple Steps • Make sure your kids know to never divulgeMake sure your kids know to never divulge personal information over the Internetpersonal information over the Internet • You should have your kids e-mail username andYou should have your kids e-mail username and password. Don’t let them have more than onepassword. Don’t let them have more than one email account.email account. • Make sure that your kinds know to let you knowMake sure that your kinds know to let you know right away if they run into a problem online.right away if they run into a problem online. • Spend time online with your kids.Spend time online with your kids.
  • 33. Internet Browser History – TheInternet Browser History – The INDEX.DAT FilesINDEX.DAT Files • Windows also keeps hidden history files calledWindows also keeps hidden history files called index.dat.index.dat. • Most computers have several index.dat filesMost computers have several index.dat files • These files are not human readable and require aThese files are not human readable and require a special viewer.special viewer.
  • 34. Content Filtering SoftwareContent Filtering Software • Content filtering software allows you to filterContent filtering software allows you to filter that content that your child can access on thethat content that your child can access on the Internet.Internet. • Some examples of this software are NetnannySome examples of this software are Netnanny and CYBERPatrol.and CYBERPatrol. • Websites, Emails and Instant messages can beWebsites, Emails and Instant messages can be filtered with this type of software.filtered with this type of software.
  • 35. Computer Monitoring SoftwareComputer Monitoring Software • Another option that is available to parents isAnother option that is available to parents is computer monitoring software, such as Spectorcomputer monitoring software, such as Spector Pro (Pro (http://www.spector.comhttp://www.spector.com)) • Monitoring software records everything that isMonitoring software records everything that is done on the computer and presents it to you.done on the computer and presents it to you. • Although some parents may have ethicalAlthough some parents may have ethical concerns with using this type of software. I feelconcerns with using this type of software. I feel that it is a necessary step in today’s world.that it is a necessary step in today’s world.
  • 36. Limit The Technology They HaveLimit The Technology They Have Access ToAccess To • What this means is if your child does notWhat this means is if your child does not actually have a need to use something (such as aactually have a need to use something (such as a cell phone with a camera in it) don’t let themcell phone with a camera in it) don’t let them have one.have one. • There’s an ongoing case of a 15 year old girl outThere’s an ongoing case of a 15 year old girl out in Ohio that has been arrested for sending nudein Ohio that has been arrested for sending nude pictures of herself that she took with the camerapictures of herself that she took with the camera in her cell phone to other students.in her cell phone to other students.
  • 37. Limit The Technology They HaveLimit The Technology They Have Access ToAccess To • ““Sexting” is the act of using a cell phone cameraSexting” is the act of using a cell phone camera to take pornographic pictures of yourself andto take pornographic pictures of yourself and spread them around to your friends.spread them around to your friends. • This is a very dangerous practice and isThis is a very dangerous practice and is considered manufacturing and distribution ofconsidered manufacturing and distribution of child pornography.child pornography. • Penalties for this offence are extreme.Penalties for this offence are extreme.
  • 38. Limit The Technology They HaveLimit The Technology They Have Access ToAccess To • Charges are also being considered against someCharges are also being considered against some of the students that received the photos.of the students that received the photos. • If the girl is convicted, she faces the possibilityIf the girl is convicted, she faces the possibility of having to register as a sex offender for 20of having to register as a sex offender for 20 years.years. • The Ohio case is the result of “sexting”The Ohio case is the result of “sexting” • Webcams can also be a very dangerous piece ofWebcams can also be a very dangerous piece of technology.technology.
  • 39. Limit The Technology They HaveLimit The Technology They Have Access ToAccess To • A then 13 year old California boy named JustinA then 13 year old California boy named Justin Barry began posing on his webcam for peopleBarry began posing on his webcam for people that turned out to be sexual predators.that turned out to be sexual predators. • He progressed into operating a porn site with hisHe progressed into operating a porn site with his own photos that made him several hundredown photos that made him several hundred thousand dollars.thousand dollars. • He was sexually abused several times.He was sexually abused several times. • Later he became a witness for the FBI and wasLater he became a witness for the FBI and was given immunity.given immunity.
  • 40. Limit The Technology They HaveLimit The Technology They Have Access ToAccess To • With the information that he turned over to theWith the information that he turned over to the FBI he was not only able to bring down manyFBI he was not only able to bring down many sexual predators but also web hosting companiessexual predators but also web hosting companies and credit card processors. He saved the lives ofand credit card processors. He saved the lives of hundreds, perhaps thousands of children thoughhundreds, perhaps thousands of children though his actions.his actions.
  • 41. Limit The Technology They HaveLimit The Technology They Have Access ToAccess To • If you get certain types of malware on yourIf you get certain types of malware on your computer your webcam can be used to spy oncomputer your webcam can be used to spy on you without your knowledge.you without your knowledge.