Upload
others
View
3
Download
0
Embed Size (px)
Citation preview
Austin Police DepartmentChild Abuse / Child ExploitationChild Abuse / Child Exploitation
The Stalker on Your Buddy List
A Quick Guide to Internet Safety A Quick Guide to Internet Safety for You and the Children in Your
LifeLife
1
Objectives for this Objectives for this Session
The class will learn consequences of their involvement on the Internet.The class will learn different types
f th t t d thof threats encountered on the Internet.Th l ill l f tThe class will learn safety precautions for using the Internet.
2
Wh t i th I t t?What is the Internet?Do you understand what the Internet is?
A worldwide system of computers sharing informationinformationThere is no single computer or group in charge
What does this mean?What does this mean?Communication is shared with anyoneInformation storage and distribution is
il bl t ll tiavailable to all partiesEntertainment draws users from all overInternational Commerce
3
Ch tChatChat is hardly ever a private conversation
Chat rooms: AOL, Yahoo! Groups, MSN Chat, Talk City, IMVUCh IChat programs or Instant Messengers, “IM”: AIM, YIM, mIRC ICQ MySpace IMmIRC, ICQ, MySpace IMAlmost all of them encourage contact with multiple subjects
4
p j
ChatDo you know with whom you are chatting?
Anonymity is one of the aspects of the Internet that make it popularWith some chat rooms and IM’sWith some chat rooms and IM’s you have to log in with a credit card or other personal information, but typically you can make up your informationKeep in mind that many chatKeep in mind that many chat “profiles” require the user to fill a “profile page” where just as much personal information can be
5
personal information can be leaked.
ChatChat Example:bi ik 21 hbigmike21: heydonniepWNz: yobigmike21: wots updonniepWNz: nada, wut u^2bigmike21: asl?donniepWNz: 14/m/txbigmike21: kewl, wut u do for fun?donniepWNz: WoWbigmike21: sweet, wut server?
In less than 60 seconds you can be solicited for personal info and not even realize it.
6
Blogginggg gMySpace is not the only blog
b it t thwebsite out there:MySpace, Xanga, Yahoo!, AOL, LiveJournals FacebookLiveJournals, FacebookYahoo! profiles, Gamespot, Netflix
Who can read it?For most blog sites, anyone on the InternetE if t bl tEven if you set your blog to private, access can be gained through someone another user’s
7
gpage or a hacked password
Bl iBloggingSo what’s the problem?
Users are sharing way too much information about themselves, their home, and swapping pictures without fully controlling whowithout fully controlling who accesses this informationTurns the Internet into a virtualTurns the Internet into a virtual shopping mart for stalkers
8
Sample Blog Page
9
Sample Blog Page
10
P2PP2P or “person-to-person” file transfer
f i d i t filprograms for music and picture files on your computer: Kazaa, Napster, Bearshare, Limewire, Morpheus, , pWhy is this a problem?
Despite civil liability for copyrights, P2P programs utilize an “open port” to give your computer access to the other users, which can be dangerousother users, which can be dangerous if not monitored by the proper firewall or router.Fil f P2P t k f tl
11
Files on free P2P networks frequently contain viruses.
GGamesGames are safe, right?
Almost every kind of PC game and console game today has some sort of “multiplayer” function where they play the game with other playersplay the game with other playersXBox and Playstation use voice chat, much like a telephone partychat, much like a telephone party lineMassively Multiplayer Online
12
Roleplaying Games (MMORPG)
GGamesSo what’s the problem?
It’s one more point of contact just like chat rooms and blogging. Interpersonal chat is a part of almost any multiplayer gamealmost any multiplayer game.MMORPG’s promote a sense of online community, propagating theonline community, propagating the interpersonal connections of players in settings that can b i ti t d l
13
become very intimate and lower inhibitions
Sample Game Screenshot
Blizzard Entertainment®Blizzard Entertainment is a trademark or registered trademark of Blizzard Entertainment, Inc. in the U.S. and/or other countries. All rights reserved.
14
Th t th I t tThreats on the InternetFirst and foremost, you can be anyone on the Internet
Even with programs where a user has a credit card to set up the program their information can beprogram, their information can be withheld from other usersThe Internet is globalThe Internet is global, encompassing everyone from housewives to children to
15
convicted sex offenders who can all claim to be someone else
Th t th I t tThreats on the InternetInformation moves at the speed of light
A digital photograph posted on a blog can be sent around the world in no time including webcams andin no time, including webcams and camera cell phone picturesInformation shared can beInformation shared can be published on a global scale, including personal numbers and
16
passwords
Th t th I t tThreats on the InternetMuch information is traceable with the right tools
A full name or parents’ names can reveal quite a bit with the right search enginesearch engineIP addresses can show your Internet service and generalInternet service and general locationMost of your residential
17
yinformation can be located via utility and appraisal websites
Th t th I t tThreats on the InternetChild Pornography
Legal adult porn is everywhere due to l k f hi th I t ta lack of censorship on the Internet
Porn can be sent easily whether you like it or notlike it or notChild pornography is harder to find, but is being perpetuated these days b d d hild iby under aged children swapping nude pictures of themselves as well as file sharing communities. You can
18
gbe held responsible for receiving it.
Th t th I t tThreats on the InternetPhishing
Tricking someone into giving away information on the Internet“A/S/L”, personality surveysMost of the time people give up info readily through their blog or chatchat
19
The Stalker on Your Buddy Li tList
Stalkers and “Predators” p t it allStalkers and “Predators” put it all together
Bad guys will use information fromBad guys will use information from your blog page or what you talk about in a chat room or online game to win your confidence“Grooming”: using information given to the suspect, to make them you feel like they understand you
20
understand you
The Stalker on Your Buddy The Stalker on Your Buddy List
Suspects will sometimes pose as someone harmless, like a teacher, student or even a child dependingstudent, or even a child, depending on the end goalReflecting: repeating information back g p gto the speaker to show that they are being heardTrust is gained and more informationTrust is gained, and more information is gathered, and eventually the victim is attacked in some way
21
Case in Point: The Kacie Case in Point: The Kacie Woody Story
December 3, 2002 13-year-old Kacie Woody was murdered by 47-year-old Dave Fuller in Conway ArkansasDave Fuller in Conway, Arkansas.Fuller posed as a 17-year-old San Diego boy that won Kacie’s love and trustyKacie and “Dave” chatted on the Internet and eventually talked on the telephone.D d i f ti th d t t lDave used information gathered to travel to Kacie’s home where he abducted her, tied her to four points in a van, then
22
p ,raped and killed her.
Ch Y Thi kiChange Your ThinkingThe Internet is not “evil”; it’s a public
place like any other where people meet and exchange information. The problem does not lie in one
chat program blog page or gamechat program, blog page, or game. The problem is you are a part of a
global community and anyglobal community, and any communication you participate in is
subject to the whole community.
23
Warning Signs for Warning Signs for Younger Victims
Signs that a child may be at risk from Internet usage:
E i f li iExcessive use of online services, especially late at nightMood swing, withdrawalMood swing, withdrawalGreater desire to spend time with people online than with “real life”
lpeopleUnexplained files downloaded – .jpg, gif bmp tif pcx mov avi wmv
24
.gif, .bmp, .tif, .pcx, .mov, .avi, .wmv,
.mpg
Warning Signs for Warning Signs for Younger Victims
Signs that a child may be at risk from Internet usage:
Th hild i i i h t thThe child minimizes what was on the screen as soon as you approach themPhone calls from people you don’t know, especially at odd hoursNew items like clothing and, especially, computer equipment like a webcam are in your child’s
25
like a webcam are in your child s possession without explanation
S h t d I d ?So what do I do?Control the information flow
Don’t give personal information h t fil blon your chat profile or blog
pages, including last name, address, school, or other private , , pinformationKeep logon names different from
lreal namesStrengthen passwords. Don’t use birthdates pet names etc
26
use birthdates, pet names, etc. Keep them random
S f t f ChildSafety for ChildrenEducate the children
Tell the child of the threats and dangersJust because you pulled the Internet from the house does not mean they can’t access it at school or a friend’s homeschool or a friend s home
27
S f t f ChildSafety for ChildrenAbove all: There is NO privacy in your house concerning a child
Know with whom the child is communicatingWhat files are they sending?What are they typing in their bl ? (I ’ i di hblog? (It’s not a private diary; the whole world can read it.)What games are they playing and
28
What games are they playing and with whom are they playing?
S f t f ChildSafety for ChildrenMove the computer to a place constantly monitored
No child needs a computer in their bedroomTurn the screen where you can see it
Secure webcams, digital cameras, and cell phones with camera functions
29
camera functions
S f t f ChildSafety for ChildrenControl / monitor Internet usage while you are gone
Change passwords so your child can’t log on without youRetail spy programs will log keystrokes and show what your child is watchingchild is watchingRemove the Internet cable when you are gone
30
you are goneLock the computer up
No Cyber Angels!y g
If you catch a child talking with a suspicious person online, or if you suspect you’ve found a stalker, do NOT try to conductfound a stalker, do NOT try to conduct
your own investigation. “Catching” suspects involves more than what you see on T V and you can severely harmsee on T.V. and you can severely harm any chance of a legitimate investigation.
Determine the level of relationship to the suspect, then make a report to the
police if necessary
31
police, if necessary.
Helpful WebsitesNational Center for Missing and Exploited Children
www.ncmec.org and www.missingkids.com are the same website www.netsmartz.org is their children's education website
Office of Attorney General of Texas Cyber Safetyy y ywww.oag.state.tx.us/criminal/cybersafety.shtml
US Governmenthttp://onguardonline gov/index htmlhttp://onguardonline.gov/index.htmlFTC: www.ftc.gov/infosecurity
Safe Kids Programwww.safekids.com A private site devoted to safety
National Cyber Security Alliancewww.staysafeonline.info Private non-profit agencyy p g y
Get Net Wisewww.getnetwise.org One of their major sponsors is Disney.
32
Yahoo's safety sitehttp://safely.yahoo.com Former “Yahooligans” safety site for kids and parents
Thank You for Your Interest in Your Child’s Safetyin Your Child s SafetyDet Joel K Pridgeon #3256Det. Joel K. Pridgeon, #3256Austin Police DepartmentChild Abuse / Child Exploitation512-974-6820 desk
Det. Trent Watts, #3360Austin Police DepartmentChild Abuse / Child Exploitation512-974-6808 desk512-974-6808 desk
512-974-6880 Child Abuse UnitStandard Office Ho rs 7am 5pm M F
33
Standard Office Hours 7am-5pm M-FCall 911 for an Emergency