43
Online Safety Online Safety Somerset Independent Schools Somerset Independent Schools April 2012 April 2012 Version 7.0 – 8/2010 Version 7.0 – 8/2010 1

Online Safety Somerset Independent Schools April 2012

Embed Size (px)

DESCRIPTION

Online Safety Somerset Independent Schools April 2012. Version 7.0 – 8/2010. Predators will use information obtained from children to gain trust and friendship ( her mother’s death ). - PowerPoint PPT Presentation

Citation preview

Page 1: Online Safety Somerset Independent Schools April 2012

Online SafetyOnline SafetySomerset Independent SchoolsSomerset Independent Schools

April 2012 April 2012

Online SafetyOnline SafetySomerset Independent SchoolsSomerset Independent Schools

April 2012 April 2012

Version 7.0 – 8/2010Version 7.0 – 8/2010

11

Page 2: Online Safety Somerset Independent Schools April 2012

• Predators will use information obtained from Predators will use information obtained from children to gain trust and friendship (children to gain trust and friendship (her mother’s her mother’s

deathdeath).).

• Unless you know someone in person, you don’t Unless you know someone in person, you don’t really know who they are on the Internet really know who they are on the Internet

((predator portrayed himself as 18 yr oldpredator portrayed himself as 18 yr old). ).

• Anyone is vulnerable (Anyone is vulnerable (father was police officer, father was police officer, lived in small townlived in small town).).

•2•View Video: Julie

Page 3: Online Safety Somerset Independent Schools April 2012

Targeting Kids OnlineTargeting Kids Online

33

• View Video: Tracking TheresaView Video: Tracking Theresa(00:05:08)(00:05:08)

Page 4: Online Safety Somerset Independent Schools April 2012

The Technologies: How do they get The Technologies: How do they get there?there? • Desktop and laptop computers Desktop and laptop computers

located at home, friend’s located at home, friend’s homes, work, libraries, stores, homes, work, libraries, stores, schools, “Internet cafes”…schools, “Internet cafes”…wireless connections.wireless connections.

• PDA/BlackBerry.PDA/BlackBerry.

• Cell phones.Cell phones.

• Internet capable games (i.e., Internet capable games (i.e., Xbox, Playstation).Xbox, Playstation).

44

Page 5: Online Safety Somerset Independent Schools April 2012

Kids in the United StatesKids in the United States

• 94% of teens aged 12 – 17 use the Internet.94% of teens aged 12 – 17 use the Internet.

• 84% of online teens have a social networking 84% of online teens have a social networking profile. 46% have open access to their online profile. 46% have open access to their online profile information.profile information.

• 84% of teens have cell phones and more 84% of teens have cell phones and more than 88% are texting.than 88% are texting.

• 43% of teens have been victims of 43% of teens have been victims of cyberbullying.cyberbullying.

55

Page 6: Online Safety Somerset Independent Schools April 2012

• Online enticementOnline enticement

• SextingSexting

• Access by children to pornographyAccess by children to pornography

• Distribution of child pornographyDistribution of child pornography

• CyberbullyingCyberbullying

Risks Involving Teens Are RealRisks Involving Teens Are Real

66

Page 7: Online Safety Somerset Independent Schools April 2012

• 1 in 7 children (13%) received sexual solicitation 1 in 7 children (13%) received sexual solicitation or were approached within the last year.or were approached within the last year.

• 1 in 3 (34%) had an unwanted exposure to 1 in 3 (34%) had an unwanted exposure to pictures of naked people or people having sex.pictures of naked people or people having sex.

• 1 in 11 (9%) was threatened or harassed.1 in 11 (9%) was threatened or harassed.

• 1 in 25 (4%) received an “aggressive” sexual 1 in 25 (4%) received an “aggressive” sexual solicitation - A solicitor who: asked to meet them solicitation - A solicitor who: asked to meet them somewhere; called them on the telephone; or somewhere; called them on the telephone; or sent them regular mail, money or gifts.sent them regular mail, money or gifts.

Online Victimization of Youth: Online Victimization of Youth: Five Years Later (2006)Five Years Later (2006)

77

Page 8: Online Safety Somerset Independent Schools April 2012

• Through use of chat rooms, e-mail, instant Through use of chat rooms, e-mail, instant messaging, “blogs” and even on-line games, adult messaging, “blogs” and even on-line games, adult strangers can establish direct one-to-one access to strangers can establish direct one-to-one access to children. children.

– ““Distance” and children’s natural trust can lead Distance” and children’s natural trust can lead them to forget that these people are strangers … them to forget that these people are strangers … and many of them are very good at and many of them are very good at misrepresenting who they are. misrepresenting who they are.

• ““There was one guy who kept telling me I was beautiful, There was one guy who kept telling me I was beautiful, sexy and hot, and that he wanted to meet me. Even sexy and hot, and that he wanted to meet me. Even though I kept saying no, he kept giving me his pager though I kept saying no, he kept giving me his pager number and telling me to call him” (Age 14)number and telling me to call him” (Age 14)

Online EnticementOnline Enticement

88

Page 9: Online Safety Somerset Independent Schools April 2012

Missing Child Alerts Resulting Missing Child Alerts Resulting From Online Enticement via From Online Enticement via

MySpace.MySpace.

99

Page 10: Online Safety Somerset Independent Schools April 2012

Who areWho arethese people?these people?

1010

People you would never suspect…..

Page 11: Online Safety Somerset Independent Schools April 2012

Where are teens going online?Where are teens going online?

1111

• View Video: Future Consequences View Video: Future Consequences (0:30)(0:30)

Page 12: Online Safety Somerset Independent Schools April 2012

Chat roomsChat rooms• Chat rooms are places on the Internet where Chat rooms are places on the Internet where

you can have live, real-time conversations with you can have live, real-time conversations with many people at the same time.many people at the same time.

• Everyone in the chat room can see what Everyone in the chat room can see what everyone else writes, but you can still be as everyone else writes, but you can still be as anonymous as you want.anonymous as you want.

1212

Page 13: Online Safety Somerset Independent Schools April 2012

• While chat rooms can be dynamic meeting While chat rooms can be dynamic meeting places for people with similar interests:places for people with similar interests:

– Teenagers can be easily misled to do things Teenagers can be easily misled to do things that they ordinarily would not do.that they ordinarily would not do.

– It is easy for a teen to reveal It is easy for a teen to reveal more, sometimes much more, more, sometimes much more, than they should.than they should.

– They are cruising grounds for They are cruising grounds for predators.predators.

• If a person unknown to you was speaking to you in your front If a person unknown to you was speaking to you in your front yard, what would you do? If were communicating with the same yard, what would you do? If were communicating with the same stranger online, what would you do?stranger online, what would you do?

1313

Page 14: Online Safety Somerset Independent Schools April 2012

Instant Messaging (IM).Instant Messaging (IM).

• IM is a form of Internet communication that IM is a form of Internet communication that combines the live nature of real time chat with combines the live nature of real time chat with the personal contact of email. Benefits include:the personal contact of email. Benefits include:

– A safer environment than chat rooms since A safer environment than chat rooms since contact lists can be contact lists can be better controlled.better controlled.

1414

Page 15: Online Safety Somerset Independent Schools April 2012

• IM software allows users to create a detailed IM software allows users to create a detailed personal profile including: name, email address, personal profile including: name, email address, age, home address, phone number, school and age, home address, phone number, school and hobbies.hobbies.

– If you aren't careful during the sign-up process, you If you aren't careful during the sign-up process, you can reveal more than you should.can reveal more than you should.

– Easily accessible profiles can allow anyone to Easily accessible profiles can allow anyone to contact them.contact them.

−Some IM programs offer users the option of joining Some IM programs offer users the option of joining in chat with strangers.in chat with strangers.

−The reach of IM can encourage gossiping and The reach of IM can encourage gossiping and bullying.bullying.

−You can receive pornographic "spam" through IM. You can receive pornographic "spam" through IM. 1515

Page 16: Online Safety Somerset Independent Schools April 2012

Social Networking SitesSocial Networking Sites

1616

• ““Kids are becoming stars of their own online television reality Kids are becoming stars of their own online television reality shows” in front of an audience of millions of Internet users.shows” in front of an audience of millions of Internet users.

• View Video “Dateline - View Video “Dateline - MySpace"MySpace"

Page 17: Online Safety Somerset Independent Schools April 2012

• A blog is basically a journal that is available on the A blog is basically a journal that is available on the web - the term is a shortened form of web log.web - the term is a shortened form of web log.

– Blogs are typically updated daily using software that Blogs are typically updated daily using software that allows people with little or no allows people with little or no technical background to technical background to maintain the blog. maintain the blog.

– Postings on a blog are almost always arranged in Postings on a blog are almost always arranged in chronological order with the most recent additions chronological order with the most recent additions featured most prominently.featured most prominently.

– Blogs usually include profiles, texts, photographs, and Blogs usually include profiles, texts, photographs, and links between “friends” and interests - and may include links between “friends” and interests - and may include video or audio files.video or audio files.

1717

Page 18: Online Safety Somerset Independent Schools April 2012

•18

Page 19: Online Safety Somerset Independent Schools April 2012

Message BoardsMessage Boards

1919

Page 20: Online Safety Somerset Independent Schools April 2012

Video NetworkingVideo Networking

YouYou TubeTube

2020

Page 21: Online Safety Somerset Independent Schools April 2012

Video NetworkingVideo Networking • Registration is almost always free.Registration is almost always free.

• Identity verification is not always required Identity verification is not always required to become a member – you can access to become a member – you can access inappropriate material.inappropriate material.

• Graphic and explicit videosGraphic and explicit videos

• Cyberbullying, Internet predators.Cyberbullying, Internet predators.

2121

Page 22: Online Safety Somerset Independent Schools April 2012

Text

Twitter

2222

Page 23: Online Safety Somerset Independent Schools April 2012

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force 2323

Page 24: Online Safety Somerset Independent Schools April 2012

2424

Page 25: Online Safety Somerset Independent Schools April 2012

““Sextortion”Sextortion”Don’t let it happen to Don’t let it happen to

you!you!

2525

Page 26: Online Safety Somerset Independent Schools April 2012

• Pornography which is legally restricted Pornography which is legally restricted to adults can easily be accessed by to adults can easily be accessed by children online. Unfortunately,children online. Unfortunately,

– A child who can’t browse through a sexually A child who can’t browse through a sexually explicit magazine in a store can easily view explicit magazine in a store can easily view explicit images and video online. explicit images and video online.

– Obscene materials which are illegal can easily be Obscene materials which are illegal can easily be accessed online.accessed online.

Access by Children & Teens Access by Children & Teens

2626

Page 27: Online Safety Somerset Independent Schools April 2012

www.fun.cowww.fun.comm

www.teens.comwww.teens.com

Even “innocent” website addresses can Even “innocent” website addresses can lead directly to inappropriate content.lead directly to inappropriate content.

• UnintentionUnintentionalal

• ““It is like a car crash. You want to It is like a car crash. You want to look away but can’t.” (Age 14)look away but can’t.” (Age 14)

2727

Page 28: Online Safety Somerset Independent Schools April 2012

URL’s (Uniform Resource Locators) URL’s (Uniform Resource Locators) …The incorrect one can take you to …The incorrect one can take you to a sexually explicit site. Howa sexually explicit site. How??

• AssumptionsAssumptions

– You’re “certain” that You’re “certain” that you know the URLyou know the URL

• MistakenMistaken

– Use of “.com” versus Use of “.com” versus “.org” etc…“.org” etc…

• Spelling errorsSpelling errors

– Transposing charactersTransposing characters

www.nsync.comwww.nsync.com

www.nsync.orwww.nsync.orgg

2828

Page 29: Online Safety Somerset Independent Schools April 2012

• Unsolicited “push” pornography and Unsolicited “push” pornography and e-mail links are very prevalent and e-mail links are very prevalent and are sent to everyone – including are sent to everyone – including children and teens.children and teens.

2929

Page 30: Online Safety Somerset Independent Schools April 2012

• ““Keyword Searches”Keyword Searches”– Anyone using search engines to locate Anyone using search engines to locate

legitimate information can receive links to legitimate information can receive links to pornographic sites. pornographic sites.

3030

Page 31: Online Safety Somerset Independent Schools April 2012

““Cyberbullying” - Any Device, Cyberbullying” - Any Device, Anytime…Anytime…

3131

•Watch Video: Talent Show

Page 32: Online Safety Somerset Independent Schools April 2012

• There are several ways that teens There are several ways that teens threaten and/or harass others online. threaten and/or harass others online. They may:They may:

– Send e-mails or instant messages containing Send e-mails or instant messages containing insults or threats directly to a person. insults or threats directly to a person.

– Spread hurtful comments about a person to Spread hurtful comments about a person to others through e-mail, instant messaging or others through e-mail, instant messaging or postings on web sites and blogs.postings on web sites and blogs.

– Steal passwords and send out threatening e-Steal passwords and send out threatening e-mails or instant messages using an assumed mails or instant messages using an assumed identity.identity.

3232

Page 33: Online Safety Somerset Independent Schools April 2012

– Build web sites, often with password protection, Build web sites, often with password protection, to target people - students or even teachers. to target people - students or even teachers.

– Text via cell phones. Text via cell phones.

– Use built-in digital cameras in cell phones.Use built-in digital cameras in cell phones.

““A kid from school sent me a message on the Internet saying, A kid from school sent me a message on the Internet saying, ‘Hey Dave, look at this website’” says David. “I went there ‘Hey Dave, look at this website’” says David. “I went there and sure enough, there’s my photo on this website saying and sure enough, there’s my photo on this website saying ‘Welcome to the website that makes fun of Dave Knight’ and ‘Welcome to the website that makes fun of Dave Knight’ and just pages of hateful comments directed at me and everyone just pages of hateful comments directed at me and everyone in my family.”in my family.”

3333

Page 34: Online Safety Somerset Independent Schools April 2012

Consequences of Cyberbullying!Consequences of Cyberbullying!

From hurt feelings to…From hurt feelings to…suicide.suicide.

3434

View Video: View Video: Ryan Halligan's Father Speaks With Ryan Halligan's Father Speaks With TeensTeens

Page 35: Online Safety Somerset Independent Schools April 2012

•Possible warning signs your friends are being bullied or bullying others:– Complaining that another person or group of Complaining that another person or group of

people do not like them.people do not like them.

– Being preoccupied with friendship concerns.Being preoccupied with friendship concerns.

– Expressing poor self-esteem. Feeling they are Expressing poor self-esteem. Feeling they are not as good as others.not as good as others.

– Refusing to go to school or other activities.Refusing to go to school or other activities.

– Spending a great deal of time on the Spending a great deal of time on the computer.computer.

– Being secretive about online activities.Being secretive about online activities.3535

Page 36: Online Safety Somerset Independent Schools April 2012

• Lacking interest and involvement with other peers.Lacking interest and involvement with other peers.

• Acting like their group (clique) is superior.Acting like their group (clique) is superior.

• Bragging that they use the Internet to play Bragging that they use the Internet to play practical jokes or steal their peers’ passwords as a practical jokes or steal their peers’ passwords as a joke.joke.

• Continuing to make fun of others.Continuing to make fun of others.

• Getting into trouble at school or in the community Getting into trouble at school or in the community for inappropriate computer use.for inappropriate computer use.

Adapted from Powertolearn.com

3636

Page 37: Online Safety Somerset Independent Schools April 2012

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

• Responding to CyberbullyingResponding to Cyberbullying– Preserve evidence – this is crucial for identifying Preserve evidence – this is crucial for identifying

the bully and making a case. the bully and making a case.

– Attempt to enlist assistance from the service Attempt to enlist assistance from the service provider.provider.

– Report the bully to your administrators, Report the bully to your administrators, counselor, parents, or another trusted adult.counselor, parents, or another trusted adult.

– Use available blocking technology (i.e., block Use available blocking technology (i.e., block the user on IM, email and chat.)the user on IM, email and chat.)

– Seek assistance from the police for serious Seek assistance from the police for serious threats(i.e., threats of physical harm, threats(i.e., threats of physical harm, unrelenting or unable to stop.)unrelenting or unable to stop.)

3737

Page 38: Online Safety Somerset Independent Schools April 2012

REMEMBER…REMEMBER…

1.1. Ensure that you do not divulge detailed Ensure that you do not divulge detailed personal information when completing personal information when completing “profiles” and minimize dissemination.“profiles” and minimize dissemination.

2.2. Ensure that screen names do not Ensure that screen names do not provide information about your provide information about your identity (e.g., Sarahsweet16.)identity (e.g., Sarahsweet16.)

3838

Page 39: Online Safety Somerset Independent Schools April 2012

3.3. Periodically review Internet Periodically review Internet bookmarks, history files, temporary bookmarks, history files, temporary Internet files and keyword searches. Internet files and keyword searches.

3939

Page 40: Online Safety Somerset Independent Schools April 2012

Always Keep In Mind …Always Keep In Mind … The “Good” Really Does Outweigh The The “Good” Really Does Outweigh The

“Bad!”“Bad!”

4040

Page 41: Online Safety Somerset Independent Schools April 2012

2010 - NYS Internet Crimes Against Children Task Force2010 - NYS Internet Crimes Against Children Task Force

– RecognizeRecognize techniques used by online techniques used by online predators to deceive their victims.predators to deceive their victims.

– RefuseRefuse requests for personal information. requests for personal information.

– RespondRespond assertively if you are ever in an assertively if you are ever in an uncomfortable situation while online. Exit the uncomfortable situation while online. Exit the program, log off or turn off the computer… program, log off or turn off the computer…

– ReportReport, to a parent or other trusted adult, , to a parent or other trusted adult, any suspicious or dangerous contact that any suspicious or dangerous contact that makes you uncomfortable.makes you uncomfortable.

Remember the Remember the 4 R’s4 R’s … …

4141

Page 42: Online Safety Somerset Independent Schools April 2012

Kentucky Cyber Crime Kentucky Cyber Crime StatisticsStatistics

• Kentucky Attorney General arrested 29 suspects in three cybersafety stings

• 50,000 sex offenders removed from MySpace in one year

• 1 in 7 youths ages 10 to 17 report receiving unwanted sexual solicitations online

• 30% of those solicitations involve attempts to make contact offline

• Only 25% of solicitations are reported to adults or law enforcement

• Identity theft is the fastest growing crime in America

• Last year, 8.5 million Americans were victims of identity theft

• Identity theft cost consumers $45 billion last year

• Average loss per consumer was $3,200

4242

Page 43: Online Safety Somerset Independent Schools April 2012

Report a Cyber Crime

• If you would like to contact the Cyber Crimes Unit about an investigation, call 866-524-3672 or email [email protected]. Information may be shared anonymously.

4343