Presentation is loading. Please wait.

Presentation is loading. Please wait.

Internet Safety for Monroe Families

Similar presentations


Presentation on theme: "Internet Safety for Monroe Families"— Presentation transcript:

1 Internet Safety for Monroe Families
Brought to you by the Monroe Police Department And the Monroe Board of Education

2 General Online Safety Do not reveal personal information online (ex. Name, address, postal address, phone number, photo, school, etc.). Only respond to s or instant messages from people you know. If an or instant message is received that makes you feel uncomfortable do not respond and show an adult. Do not meet people you have met online in person without permission from your parents. Never assume someone is who they say they are online or in chat rooms. Make sure your screen name doesn’t reveal too much about you. Do not give your password out to anyone except your parents.

3 Reputation Loss of reputation is a growing problem as teens put inappropriate information on social networking site such as MySpace and Facebook. Teens posting pictures of teens in sexually provocative poses or in the presence of alcohol or illegal drugs may seem cool at the time. This could come back to haunt them later, especially if discovered by school officials, potential employers, admission counselors or parents. Remember, your actions will always have consequences, whether good or bad. Kids need to understand the legal and academic consequences that can occur from illegal or unethical behavior. Not everything you see on the Internet is necessarily true.

4 Cyber-Bullying Cyber-Bulling is a serious problem. Children are harassed, bullied, embarrassed, defamed or pressured via the internet. (Ex. Using or other messages to threaten a child but can also include spreading rumors.) Cyber-Bullying can happen in chat rooms, websites, blogs, profiles or instant messaging. 9% of young Internet users said they were harassed online in the past year. 6% said someone was harassing them online. 3% said messages were posted or sent for people to see. 58% of harassed Internet users were girls. 42% of harassed Internet users were boys. Girls were more likely than boys to experience harassment. 72% of the harassment happened to teenagers ages One third of harassment cases included contact or attempts at contact by telephone, offline, mail or in person.

5 Online Predators Online predators use the Internet to masquerade as another child or trustworthy person. They try to gain children’s trust by paying attention to them and finding out what they like to do. Predators promise loyalty and friendship, encouraging kids to share intimate details about themselves. They tell lies in return to make it appear they are doing the same. Predators tell kids to keep the friendship a secret and even threaten them if they don’t. Predators slowly introduce sexual content, send pictures and ask the child to do the same in return. They will arrange to meet the child in person. 1 in 33 youth received an aggressive sexual solicitation in the past year (ex., A predator asked a young person to meet somewhere, call a young person, sent a young person correspondence through the U.S. Postal Service.) Predators can’t molest a child via the Internet. They must meet with them usually done with persuasion not force.

6 Online Predator Demonstration

7 Computer Forensics Monroe Police Department Capabilities Trained Staff
Computer Forensics Lab Supports other local police departments

8 Computer Forensics The following video is suggestive in nature.

9 Computer Forensics

10 Computer Forensics Anything you do on a computer leaves a digital footprint and chat logs even when deleted are still recoverable Speediness to report crime is crucial

11 Computer Forensics Email Tracing

12 Computer Forensics Email Tracing

13 Computer Forensics Email Tracing
This shows the IP Block being owned by Exodus Communications, and provides us with a point of contact. We can narrow this down further by running a trace route utility. This shows the connections between our system and the IP in question, as they are now.

14 Computer Forensics Email Tracing

15 Computer Forensics Email Tracing
This narrows down this the suspect site to and again provides us with a point of contact. Tracking the hacker back to this point is simple, if that is really where he is located.

16 Computer Forensics Data Recovery
A file is never “deleted” The File Allocation Table (FAT) or Master File Table (MFT) contains the file information and pointers. When a file is “deleted” the entry in the FAT or MFT is removed, file data is still available

17 Computer Forensics Directory File Name St Cluster Trees.jpg 3
File Allocation Table (Cluster) Row # Entry 2 0 3 4 4 5 5 7 6 0 7 EOF 8 0

18 Computer Forensics Myspace Case
Taylor Behl 17 VCU student Active Myspace user and Blogged in Livejournal as “tiabliaj” Disappeared Labor Day, Sept. 6, 2005 Police used Myspace friends list as suspect pool Met Benjamin Fawley, 38 through Myspace

19 Computer Forensics Benjamin Fawley Arrested for posting
nude photos of her on Myspace Studied Behl through Livejournal Led police to her Remains Aug. 9, 2006, convicted of murder- 30 years "What do you do when you have found out you did your best not to, but find you did hurt someone you care about? I didn't see until it was too late and now the problem is how do I fix this? I can't fix it, there is nothing I Can do or say. Anything I do say will only Make things worse. I am sorry.” - Ben Fawley

20 Computer Forensics

21 Questions for the group?
Panel Discussion Questions for the group?

22 Advice for Parents Listen to your children.
Even if your children don’t want to talk about negative experiences they’ve had online, don’t let that stop you from talking about the dangers. Don’t exaggerate but do warn them against giving personal information out online and against meeting anyone they have met online. Let them know the safest way to deal with unwanted solicitations is not to respond. Don’t think kids aren’t listening to you. A national survey of teens conducted by the Boys and Girls Club found more than 1 in 3 youths stated their relationship with a parent or guardian was most important to them. More than 45% of all respondents said their parents most significantly influence their decisions, rather than peers. Don’t focus on just predators. There are other risks ranging from Cyber-Bullying to net addiction. Don’t overreact if your child opens up. Listen carefully and appreciate the fact they are talking. Keep computers in a common area of the house so you can monitor the activity and usage. 92% of parents say they have established rules for Internet activity. 34% have not established rules 40% of children said they do not discuss Internet Safety with parents. Check out blocking, filtering and rating applications.

23 Important Information
11% ignored them Unfortunately, most kids who experienced these incidents didn’t report them to parents or authorities 5% referred them to Law Enforcement 12% reported to parents 2% reported it to teachers or school personnel 56% didn’t tell anyone 55% of children surveyed admitted to sharing personal information online 10% believe it is okay to post a picture 10% have met someone face to face after first meeting online 1 in 4 youth had an unwanted exposure in the past year to pictures of naked people or people having sex 1 in 7 was threatened or harassed over the past year 1 in 7 (13%) received unwanted sexual solicitations or approaches in the past year – not all of those solicitations came from adult predators 43% of children receiving solicitations were under 18 years old 14% were people the young victims knew in person prior to the solicitation Teens are at greater risk for sexual solicitations 90% of the sexual solicitations happened to youth who were 13 and older 66% of youth handled unwanted solicitations by removing themselves from the situation by blocking the solicitor or leaving the website or computer 16% told the person to stop, confronted or warned them 11% ignored them Only 17% of youth and 11% of parents could name a specific authority such as F.B.I., CyberTipline, or an Internet service provider where they could report an Internet crime University of New Hampshire Crimes Against Children research Center 2005 National Survey: 1500 Internet users between the ages of 10 and 17 surveyed

24 Questions?? Additional questions can be directed to Detective McFarland at: Information can be found online at:


Download ppt "Internet Safety for Monroe Families"

Similar presentations


Ads by Google