Internet Safety for Monroe Families

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

Internet Online Safety How to have FUN and Stay in Control.
Cybersafety Elimbah State School Cybersafety and cyberbullying: A guide for parents and caregivers, May 2012., Dept of Education, Training and Employment.
 NYS Internet Crimes Against Children Task Force E-Safety Mr Trofimczuk E-Safety 1.
Forms of Cyberbullying
What is Cyber-Bullying? Cyber-Bullying is the use of technology to harass, threaten, embarrass or target another person. Social Networks Instant.
INTERNET SAFETY.
INTERNET SAFETY FOR STUDENTS
INTERNET SAFETY and Social Networking
A Guide to Internet Safety High School
Cyber bullying and internet safety Parents meeting: staying safe online.
CYBERSAFETY Acting Sergeant Kate Brown Christchurch Police Youth Education.
Internet Safety and Awareness Cyberbullies and Predators Enfield High School Computer Network.
Victoria ISD Common Sense Media Grade 10: Appropriate Online Behavior.
What you don’t know CAN hurt you!
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
Cyber and Internet Safety El Rodeo School September 11, 2013.
e-safety and cyber bullying
Cyber bullying Lara Climer and Michele Fesenbek. Interesting Tidbits  Over 87% of teens age use the internet  95% of parents do not understand.
CYBERBULLYING INFORMATION AND PREVENTION August 2009.
An Internet Safety Presentation for Middle School Adopted from netsmartz with video from netsmartz.org, center for missing & exploited children, and Saturday.
 Grades 5-8 – 56 out of 66 – 85%  Grades 9-12 – 79 out of 85 – 93%  Grades 5-12 – 135 out of 151 – 89%  100% of the Juniors and Seniors use a social.
E SAFETY. SOME FACTS A Talk Talk survey of 500 children aged 6-15 in Feb 2010 found: 5% had communicated with a stranger via webcam. 2% have actually.
CYBER BULLYING Cody O’Brien. Goals for Today’s Presentation Introduce Cyber bulling Identify forms of cyber bulling Steps to prevent it What to do if.
INTERNET SAFETY FOR STUDENTS
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
ONLINE PREDATORS: HOW SAFE ARE WE? A PHOTO PRESENTATION BY: MICHELLE OCASIO & BRIANNA PEREZ.
CyberSafety A Lesson in CYBERWORLD Culture, Customs, Culture, Customs, Language, and Safety.
ASSEMBLY Ms C Henley UNCRC - Article 3
What is Social Networking? Social networking sites provide teens and young adults with a virtual environment where they share stories, pictures, videos,
Peter Johnson NetSmartz411 Project Manager National Center for Missing & Exploited Children.
Kara LaRose, School Counselor Willow Dale Elementary School
Internet Safety Guide for Teens Don’t give out personal information about yourself, your family situation, your school, your telephone number, or your.
Question  What was the internet attended for?  What is the internet known as?  Ans. Information super high way.
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
Internet Safety How to keep your children safe as they use the web.
E.H.M.S. Parent/Guardian Workshop Internet Safety (In conjunction with E.H.M.S. Open House) When: Wednesday, September 19 th 8:00-8:30 pm Where: E.H.M.S.
Teens, Online Stranger Contact and Cyberbullying What the research is telling us… Amanda Lenhart Internet Safety Task Force April 30, 2008 Washington,
Welcome… Parent Awareness Session. Media Story 21 year old media student from Surrey who…… –Arranged to meet a 14-year-old at a railway station –Had.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
 NYS Internet Crimes Against Children Task Force Online Safety for Middle and High School Version 5.0 – 8/
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
Do pictures always give truthful information? Can publishing it be hurtful??
Cyber Bullying Texting/Instant Messaging Lesson One Social Development 1 8th Grade.
Internet Safety Kristi Enriquez. 34% of youth Internet users saw sexual material that they did not want to see According to a study conducted by the National.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
Internet Safety KNOW HOW TO STAY SAFE ONLINE. You should never give out certain information over the internet.  Examples include:  Your last name 
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Predator Identification Internet Safety Awareness.
Grades 3-5. Question #1  A) address and phone number  B) names of your friends  C) your school name and town you live in  D) All of the above Personal.
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
Internet Safety How To Keep Your Children Safe As They Use The Web.
Online Safety Parent Workshop Helping to keep your children safe online.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
T HINK ! Before You Post A lesson on Internet Safety Source:
ONLINE PREDATORS: HOW SAFE ARE WE? A PHOTO PRESENTATION BY: MICHELLE OCASIO & BRIANNA PEREZ.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Freshman Seminar. Find kids through social networking, blogs, chatrooms, instant messaging, , discussion boards, and other websites. Try to seduce.
70% were female; 30% were male 86% of offenders were people youth first “met” online 37% of incidents happened in chatrooms 40% in instant messages.
“Doing the Right thing online” Online Safety. Socializing Communicating Creating Playing Exploring Learning.
Internet Safety. Online Concerns: Contact Content Conduct.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
NO! NO! You can not get the questions until the end of the Power Point!
Cyber and Internet Safety (Parents’ Night)
Protecting Your Privacy Online
Predator Identification
Rules To Help You Navigate the Internet Safely
Online Safety Assembly.
Presentation transcript:

Internet Safety for Monroe Families Brought to you by the Monroe Police Department And the Monroe Board of Education

General Online Safety Do not reveal personal information online (ex. Name, email address, postal address, phone number, photo, school, etc.). Only respond to emails or instant messages from people you know. If an email or instant message is received that makes you feel uncomfortable do not respond and show an adult. Do not meet people you have met online in person without permission from your parents. Never assume someone is who they say they are online or in chat rooms. Make sure your screen name doesn’t reveal too much about you. Do not give your password out to anyone except your parents.

Reputation Loss of reputation is a growing problem as teens put inappropriate information on social networking site such as MySpace and Facebook. Teens posting pictures of teens in sexually provocative poses or in the presence of alcohol or illegal drugs may seem cool at the time. This could come back to haunt them later, especially if discovered by school officials, potential employers, admission counselors or parents. Remember, your actions will always have consequences, whether good or bad. Kids need to understand the legal and academic consequences that can occur from illegal or unethical behavior. Not everything you see on the Internet is necessarily true.

Cyber-Bullying Cyber-Bulling is a serious problem. Children are harassed, bullied, embarrassed, defamed or pressured via the internet. (Ex. Using email or other messages to threaten a child but can also include spreading rumors.) Cyber-Bullying can happen in chat rooms, websites, blogs, profiles or instant messaging. 9% of young Internet users said they were harassed online in the past year. 6% said someone was harassing them online. 3% said messages were posted or sent for people to see. 58% of harassed Internet users were girls. 42% of harassed Internet users were boys. Girls were more likely than boys to experience harassment. 72% of the harassment happened to teenagers ages 14-17. One third of harassment cases included contact or attempts at contact by telephone, offline, mail or in person.

Online Predators Online predators use the Internet to masquerade as another child or trustworthy person. They try to gain children’s trust by paying attention to them and finding out what they like to do. Predators promise loyalty and friendship, encouraging kids to share intimate details about themselves. They tell lies in return to make it appear they are doing the same. Predators tell kids to keep the friendship a secret and even threaten them if they don’t. Predators slowly introduce sexual content, send pictures and ask the child to do the same in return. They will arrange to meet the child in person. 1 in 33 youth received an aggressive sexual solicitation in the past year (ex., A predator asked a young person to meet somewhere, call a young person, sent a young person correspondence through the U.S. Postal Service.) Predators can’t molest a child via the Internet. They must meet with them usually done with persuasion not force.

Online Predator Demonstration

Computer Forensics Monroe Police Department Capabilities Trained Staff Computer Forensics Lab Supports other local police departments

Computer Forensics The following video is suggestive in nature.

Computer Forensics

Computer Forensics Anything you do on a computer leaves a digital footprint E-mail and chat logs even when deleted are still recoverable Speediness to report crime is crucial

Computer Forensics Email Tracing

Computer Forensics Email Tracing

Computer Forensics Email Tracing This shows the IP Block being owned by Exodus Communications, and provides us with a point of contact. We can narrow this down further by running a trace route utility. This shows the connections between our system and the IP in question, as they are now.

Computer Forensics Email Tracing

Computer Forensics Email Tracing This narrows down this the suspect site to www.prontomail.com, and again provides us with a point of contact. Tracking the hacker back to this point is simple, if that is really where he is located.

Computer Forensics Data Recovery A file is never “deleted” The File Allocation Table (FAT) or Master File Table (MFT) contains the file information and pointers. When a file is “deleted” the entry in the FAT or MFT is removed, file data is still available

Computer Forensics Directory File Name St Cluster Trees.jpg 3 File Allocation Table (Cluster) Row # Entry 2 0 3 4 4 5 5 7 6 0 7 EOF 8 0

Computer Forensics Myspace Case Taylor Behl 17 VCU student Active Myspace user and Blogged in Livejournal as “tiabliaj” Disappeared Labor Day, Sept. 6, 2005 Police used Myspace friends list as suspect pool Met Benjamin Fawley, 38 through Myspace

Computer Forensics Benjamin Fawley Arrested for posting nude photos of her on Myspace Studied Behl through Livejournal Led police to her Remains Aug. 9, 2006, convicted of murder- 30 years "What do you do when you have found out you did your best not to, but find you did hurt someone you care about? I didn't see until it was too late and now the problem is how do I fix this? I can't fix it, there is nothing I Can do or say. Anything I do say will only Make things worse. I am sorry.” - Ben Fawley

Computer Forensics

Questions for the group? Panel Discussion Questions for the group?

Advice for Parents Listen to your children. Even if your children don’t want to talk about negative experiences they’ve had online, don’t let that stop you from talking about the dangers. Don’t exaggerate but do warn them against giving personal information out online and against meeting anyone they have met online. Let them know the safest way to deal with unwanted solicitations is not to respond. Don’t think kids aren’t listening to you. A national survey of teens conducted by the Boys and Girls Club found more than 1 in 3 youths stated their relationship with a parent or guardian was most important to them. More than 45% of all respondents said their parents most significantly influence their decisions, rather than peers. Don’t focus on just predators. There are other risks ranging from Cyber-Bullying to net addiction. Don’t overreact if your child opens up. Listen carefully and appreciate the fact they are talking. Keep computers in a common area of the house so you can monitor the activity and usage. 92% of parents say they have established rules for Internet activity. 34% have not established rules 40% of children said they do not discuss Internet Safety with parents. Check out blocking, filtering and rating applications.

Important Information 11% ignored them Unfortunately, most kids who experienced these incidents didn’t report them to parents or authorities 5% referred them to Law Enforcement 12% reported to parents 2% reported it to teachers or school personnel 56% didn’t tell anyone 55% of children surveyed admitted to sharing personal information online 10% believe it is okay to post a picture 10% have met someone face to face after first meeting online 1 in 4 youth had an unwanted exposure in the past year to pictures of naked people or people having sex 1 in 7 was threatened or harassed over the past year 1 in 7 (13%) received unwanted sexual solicitations or approaches in the past year – not all of those solicitations came from adult predators 43% of children receiving solicitations were under 18 years old 14% were people the young victims knew in person prior to the solicitation Teens are at greater risk for sexual solicitations 90% of the sexual solicitations happened to youth who were 13 and older 66% of youth handled unwanted solicitations by removing themselves from the situation by blocking the solicitor or leaving the website or computer 16% told the person to stop, confronted or warned them 11% ignored them Only 17% of youth and 11% of parents could name a specific authority such as F.B.I., CyberTipline, or an Internet service provider where they could report an Internet crime University of New Hampshire Crimes Against Children research Center 2005 National Survey: 1500 Internet users between the ages of 10 and 17 surveyed

Questions?? Additional questions can be directed to Detective McFarland at: kmcfarland@monroepolicedept.com Information can be found online at: http://support.monroeps.org/InternetSafety