INTERNET SAFETY BROUGHT TO YOU BY: SALEM COUNTY 2000 PARTNERS LEARNING OBJECTIVES • THE DANGERS OF THE INTERNET • WAYS TO PROTECT FAMILY MEMBERS FROM THOSE DANGERS • IDENTIFY WARNING SIGNS OF ANY POTENTIAL DANGERS ON THE INTERNET • WAYS TO CHECK INTERNET USAGE INAPPROPRIATE MATERIAL IT CAN BE FOUND ANYWHERE• INTERNET SITES • POPUPS • SPAM EMAIL • CELL PHONES • MySpace.com DRUGS PLEASE WATCH THIS VERY IMPORTANT MOVIE Who’s Really on the Internet “Danny” Let’s look at someone’s myspace profile – (the actual screen name is blacked out below) He calls himself, “Danny” http://www.myspace.com/AZDanny Avatar Danny’s Information and his Interests “About Me” More Information Personal Identifiers “Top Friends” Who’s Really on the Internet Danny aka Keith •Let’s look at another web site… •www.azsexoffender.org: the State of Arizona, government - operated sex offender registration site. Do you really know who you are talking to on the internet? “Danny” from Myspace is actually Keith D. Wilkins who is a registered sex offender in the state of Arizona. He was charged and convicted for Luring a Minor for Sexual Exploitation. “Danny” also lied about his age on his Myspace page. What is Megan’s Law? Enacted in 1996, Megan's Law is named after seven-year-old Megan Kanka of New Jersey who was raped and murdered by a known child molester living just across the street from her family. Megan's Law authorizes local law enforcement to notify the public about high-risk and serious sex offenders who may live, work or frequent a particular area of a community. The law has two components - sex offender registration and community notification. The law is intended to give the community access to information and take necessary precautions; it is not intended to punish, harass or commit crimes against convicted sex offenders. The Following May Be Used Against You… Everybody Knows Your Name Instant Messaging & Chat Rooms: AIM ICQ MSN Yahoo! JUST HOW SAFE ARE THEY? Protecting Your Student • Set Limits • Review Profile • Monitor Cell Use • Know students’ screen name and password • Know students’ online friends. • Warn your students to be wary of anyone he or she meets in a chat room INSTANT MESSENGER Understanding Shorthand • • • • • • • • LOL F2T H8 LV PAW WAN2 WYGOWM 26Y4U Understanding Shorthand • • • • • • • • LOL F2T H8 LV PAW WAN2 WYGOWM 26Y4U Laugh Out Loud Free To Talk Hate Love Parents Are Watching Want To Will You Go Out With Me Too Sexy For You H o c k e y C h a t T o m m y : " H i , a n y N J D e v i l s f a n s o u t t h e r e ? " C u r t : " D e v i l s s u c k , R a n g e r s R u l e ? " J B : " D e v i l s 1 9 9 5 S t a n l e y C u p C h a m p i o n s ! " T Z i n V a : " G o D e v i l s B r o d e u r f o r P r e s i d e n t . " J B : " T o m m y , y o u g o t o t h e g a m e s ? " T o m m y : " I w i s h ; I l i v e t o o f a r a w a y . " J B : " W h e r e ? " T o m m y : " T o m s R i v e r " T Z i n V A : " T h a t ' s o n l y 1 . 5 h o u r s , w h y d o n ' t y o u d r i v e t h e r e ? " J B : " C o o l , t h a t ' s n e a r S e a s i d e " T o m m y : " I ' m o n l y 1 1 , I d o n ' t d r i v e a n d m y D a d h a t e s h o c k e y . " The Luring Process • • • • • Courting Process Fantasy Chat Exchange of Pictures Gifts Travel to Meet Cyber Bullying: • Using electronic communications to harass, threaten, antagonize, or intimidate another person. • Posing as someone else for purposes of harassing them or others. • Using a persons picture or a digitally enhanced image without their permission. Modes of Cyber Bullying: • • • • • • • E-mail Websites Web Logs or “Blogs” (Myspace) Instant Message (IM) Chat Rooms Digital Cameras/Cell Phones (texting) Video Games (Xbox Live, etc.) Signs of Bullying • • • • • • • • Loss of appetite Poor sleep Avoid doing things they usually enjoy Moodiness and withdrawal Avoid certain situations, like taking the bus Decrease in grades Loss of friends Need for extra money or supplies www.ryanpatrickhalligan.com • 13 year old from Vermont committed suicide • After being bullied at school he turned to the Internet where he met other suicidal teens • Parents helped to create new laws on bullying in Vermont If a Child Is Being Cyber Bullied • • • • • • • Listen Believe Be supportive Be patient Provide information for getting help Focus on offering comfort and support Praise the child for being brave enough to talk about it • Take it seriously • Call your local police department IDENTIFY THEFT AND INTERNET FRAUD • CREDIT CARDS - USE ONE CREDIT CARD FOR INTERNET PURCHASES • WIRELESS SECURITY • EBAY SCAMS • http://www.njsp.org/tech/ identity.html • IC3.GOV • CHECK OVERPAYMENT UNSUPERVISED SURFERS CAN QUICKLY LEARN HOW TO • Steal identifying information on other people • Chat with members of hate groups or satanic cults and be lulled into their illegal activities. • Join groups that steal or pirate copyrighted software. • Create bogus accounts to sell non-existent merchandise. • Hack into corporate/government servers to steal or destroy information. Sexting The act of sending sexually explicit messages or photos electronically, primarily between cell phones. Consequences – becomes public information Jesse Logan • 18-year-old Jesse Logan sent nude pictures of herself to a boyfriend. • When they broke up, he sent them to other high school girls. • The girls were harassing her, calling her terrible names. • She was miserable and depressed, afraid even to go to school! • Jesse went on TV to tell her story. Her purpose was simple: “I just want to make sure no one else will have to go through this again.” • The interview was in May 2008. Two months later, Jesse Logan committed suicide. She was 18. WARNING SIGNS • • • • Unwanted e-mail Always in a room with a computer On computer at late hours Spending the night over a friend’s house where computer and internet usage is unmonitored • Children’s friend using your computer with their account WARNING SIGNS • Quickly turns off the computer or changes software applications when someone enters the room • Receives unusual phone calls/gifts/letters • Very secretive about on-line activities • You find credit card numbers on the computer that are not yours • Visits web sites dealing with death, destruction, or other morbid topics EDUCATION/ PREVENTION • Learn and share the dangers • Talk the language • Be the administrator of their home or classroom computers • Do not give out personal information LOCATION OF THE COMPUTER • PLACE THE COMPUTER IN A VISIBLE AREA • AVOID ISOLATED AREAS • PARENTAL INVOLVEMENT IS NECESSARY Protect Yourself S ystem updates Anti-virus software F irewall E valuate Take Control of Your Computer • Become the Administrator • Reveal Hidden Files • Know Your Cookies • Know Your Documents • Browsing History Become the Administrator 1. Click on the Start menu button and select Control Panel. 2. When the Control Panel screen appears, open User Accounts. 3. This will take you to the following screen: 4. Click the name of the account you want to change. 5. Click Change the account type. Become the Administrator 6. The following screen will appear: 7. Select Computer administrator or Limited, depending on the type of account you want, and then click Change Account Type. 8. Most children should have a Limited account only. Reveal Hidden Files 1. Click on the Start menu button, then click the list item called Control Panel. 2. When the Control Panel screen opens, choose the file called Appearance and Themes. 3. When that window opens, choose the file called Folder Options. 4. You will get a dialog box like the one below: Reveal Hidden Files Reveal Hidden Files 5. Choose the tab marked View and then select the folder called Hidden files and folders. 6. Click on the radio button Show hidden files and folders. 7. Next, click on the button Apply. Please Note: The folder and button may not be immediately visible. You may need to use the scroll bar on the side of the dialogue box to move the list down to the right folder and button. Know Your Cookies 1. Click on the Start menu button; then select the list item called Search. 2. When the search box opens, click on All files and folders at the left of the screen. 3. Type in the phrase cookies, and click search. Know Your Cookies 4. This will take you to this screen: Each folder shown on the right records the cookies of the Websites visited by each user of the computer. Looking at the names of the cookies can tell you where a child is going on the Internet. Periodically, clear your history or cookies after checking to see what has been stored. Know Your Documents Click on the Start menu button and then go to the list item called My Recent Documents. When you highlight the list, a drop down menu of recent items appears (see below). Highlight an item, and it will open. Know Your Documents If My Recent Documents does not show up in the Start menu, you can easily add it by following these steps: 1. With your mouse, right click on the bottom task bar and select Properties. 2. Select the Start Menu tab. 3. Click on Customize. 4. Select the Advanced tab. 5. Check the box that says List my most recently opened documents. 6. Click OK. Know Your Browsing History • Go to Internet Explorer • Click on Favorites • Open History Tab Educate and Talk with Your Students Resources… INTERNET SAFETY HOTLINE (856) 935-8119 THANK YOU SALEM COUNTY 2000 INTERNET SAFETY INITIATIVE