33
Austin Police Department Child Abuse / Child Exploitation Child Abuse / Child Exploitation The Stalker on Your Buddy List A Quick Guide to Internet Safety A Quick Guide to Internet Safety for You and the Children in Your Life Life 1

The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

Austin Police DepartmentChild Abuse / Child ExploitationChild Abuse / Child Exploitation

The Stalker on Your Buddy List

A Quick Guide to Internet Safety A Quick Guide to Internet Safety for You and the Children in Your

LifeLife

1

Page 2: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

Objectives for this Objectives for this Session

The class will learn consequences of their involvement on the Internet.The class will learn different types

f th t t d thof threats encountered on the Internet.Th l ill l f tThe class will learn safety precautions for using the Internet.

2

Page 3: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

Wh t i th I t t?What is the Internet?Do you understand what the Internet is?

A worldwide system of computers sharing informationinformationThere is no single computer or group in charge

What does this mean?What does this mean?Communication is shared with anyoneInformation storage and distribution is

il bl t ll tiavailable to all partiesEntertainment draws users from all overInternational Commerce

3

Page 4: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

Ch tChatChat is hardly ever a private conversation

Chat rooms: AOL, Yahoo! Groups, MSN Chat, Talk City, IMVUCh IChat programs or Instant Messengers, “IM”: AIM, YIM, mIRC ICQ MySpace IMmIRC, ICQ, MySpace IMAlmost all of them encourage contact with multiple subjects

4

p j

Page 5: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

ChatDo you know with whom you are chatting?

Anonymity is one of the aspects of the Internet that make it popularWith some chat rooms and IM’sWith some chat rooms and IM’s you have to log in with a credit card or other personal information, but typically you can make up your informationKeep in mind that many chatKeep in mind that many chat “profiles” require the user to fill a “profile page” where just as much personal information can be

5

personal information can be leaked.

Page 6: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

ChatChat Example:bi ik 21 hbigmike21: heydonniepWNz: yobigmike21: wots updonniepWNz: nada, wut u^2bigmike21: asl?donniepWNz: 14/m/txbigmike21: kewl, wut u do for fun?donniepWNz: WoWbigmike21: sweet, wut server?

In less than 60 seconds you can be solicited for personal info and not even realize it.

6

Page 7: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

Blogginggg gMySpace is not the only blog

b it t thwebsite out there:MySpace, Xanga, Yahoo!, AOL, LiveJournals FacebookLiveJournals, FacebookYahoo! profiles, Gamespot, Netflix

Who can read it?For most blog sites, anyone on the InternetE if t bl tEven if you set your blog to private, access can be gained through someone another user’s

7

gpage or a hacked password

Page 8: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

Bl iBloggingSo what’s the problem?

Users are sharing way too much information about themselves, their home, and swapping pictures without fully controlling whowithout fully controlling who accesses this informationTurns the Internet into a virtualTurns the Internet into a virtual shopping mart for stalkers

8

Page 9: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

Sample Blog Page

9

Page 10: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

Sample Blog Page

10

Page 11: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

P2PP2P or “person-to-person” file transfer

f i d i t filprograms for music and picture files on your computer: Kazaa, Napster, Bearshare, Limewire, Morpheus, , pWhy is this a problem?

Despite civil liability for copyrights, P2P programs utilize an “open port” to give your computer access to the other users, which can be dangerousother users, which can be dangerous if not monitored by the proper firewall or router.Fil f P2P t k f tl

11

Files on free P2P networks frequently contain viruses.

Page 12: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

GGamesGames are safe, right?

Almost every kind of PC game and console game today has some sort of “multiplayer” function where they play the game with other playersplay the game with other playersXBox and Playstation use voice chat, much like a telephone partychat, much like a telephone party lineMassively Multiplayer Online

12

Roleplaying Games (MMORPG)

Page 13: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

GGamesSo what’s the problem?

It’s one more point of contact just like chat rooms and blogging. Interpersonal chat is a part of almost any multiplayer gamealmost any multiplayer game.MMORPG’s promote a sense of online community, propagating theonline community, propagating the interpersonal connections of players in settings that can b i ti t d l

13

become very intimate and lower inhibitions

Page 14: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

Sample Game Screenshot

Blizzard Entertainment®Blizzard Entertainment is a trademark or registered trademark of Blizzard Entertainment, Inc. in the U.S. and/or other countries. All rights reserved.

14

Page 15: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

Th t th I t tThreats on the InternetFirst and foremost, you can be anyone on the Internet

Even with programs where a user has a credit card to set up the program their information can beprogram, their information can be withheld from other usersThe Internet is globalThe Internet is global, encompassing everyone from housewives to children to

15

convicted sex offenders who can all claim to be someone else

Page 16: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

Th t th I t tThreats on the InternetInformation moves at the speed of light

A digital photograph posted on a blog can be sent around the world in no time including webcams andin no time, including webcams and camera cell phone picturesInformation shared can beInformation shared can be published on a global scale, including personal numbers and

16

passwords

Page 17: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

Th t th I t tThreats on the InternetMuch information is traceable with the right tools

A full name or parents’ names can reveal quite a bit with the right search enginesearch engineIP addresses can show your Internet service and generalInternet service and general locationMost of your residential

17

yinformation can be located via utility and appraisal websites

Page 18: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

Th t th I t tThreats on the InternetChild Pornography

Legal adult porn is everywhere due to l k f hi th I t ta lack of censorship on the Internet

Porn can be sent easily whether you like it or notlike it or notChild pornography is harder to find, but is being perpetuated these days b d d hild iby under aged children swapping nude pictures of themselves as well as file sharing communities. You can

18

gbe held responsible for receiving it.

Page 19: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

Th t th I t tThreats on the InternetPhishing

Tricking someone into giving away information on the Internet“A/S/L”, personality surveysMost of the time people give up info readily through their blog or chatchat

19

Page 20: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

The Stalker on Your Buddy Li tList

Stalkers and “Predators” p t it allStalkers and “Predators” put it all together

Bad guys will use information fromBad guys will use information from your blog page or what you talk about in a chat room or online game to win your confidence“Grooming”: using information given to the suspect, to make them you feel like they understand you

20

understand you

Page 21: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

The Stalker on Your Buddy The Stalker on Your Buddy List

Suspects will sometimes pose as someone harmless, like a teacher, student or even a child dependingstudent, or even a child, depending on the end goalReflecting: repeating information back g p gto the speaker to show that they are being heardTrust is gained and more informationTrust is gained, and more information is gathered, and eventually the victim is attacked in some way

21

Page 22: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

Case in Point: The Kacie Case in Point: The Kacie Woody Story

December 3, 2002 13-year-old Kacie Woody was murdered by 47-year-old Dave Fuller in Conway ArkansasDave Fuller in Conway, Arkansas.Fuller posed as a 17-year-old San Diego boy that won Kacie’s love and trustyKacie and “Dave” chatted on the Internet and eventually talked on the telephone.D d i f ti th d t t lDave used information gathered to travel to Kacie’s home where he abducted her, tied her to four points in a van, then

22

p ,raped and killed her.

Page 23: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

Ch Y Thi kiChange Your ThinkingThe Internet is not “evil”; it’s a public

place like any other where people meet and exchange information. The problem does not lie in one

chat program blog page or gamechat program, blog page, or game. The problem is you are a part of a

global community and anyglobal community, and any communication you participate in is

subject to the whole community.

23

Page 24: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

Warning Signs for Warning Signs for Younger Victims

Signs that a child may be at risk from Internet usage:

E i f li iExcessive use of online services, especially late at nightMood swing, withdrawalMood swing, withdrawalGreater desire to spend time with people online than with “real life”

lpeopleUnexplained files downloaded – .jpg, gif bmp tif pcx mov avi wmv

24

.gif, .bmp, .tif, .pcx, .mov, .avi, .wmv,

.mpg

Page 25: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

Warning Signs for Warning Signs for Younger Victims

Signs that a child may be at risk from Internet usage:

Th hild i i i h t thThe child minimizes what was on the screen as soon as you approach themPhone calls from people you don’t know, especially at odd hoursNew items like clothing and, especially, computer equipment like a webcam are in your child’s

25

like a webcam are in your child s possession without explanation

Page 26: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

S h t d I d ?So what do I do?Control the information flow

Don’t give personal information h t fil blon your chat profile or blog

pages, including last name, address, school, or other private , , pinformationKeep logon names different from

lreal namesStrengthen passwords. Don’t use birthdates pet names etc

26

use birthdates, pet names, etc. Keep them random

Page 27: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

S f t f ChildSafety for ChildrenEducate the children

Tell the child of the threats and dangersJust because you pulled the Internet from the house does not mean they can’t access it at school or a friend’s homeschool or a friend s home

27

Page 28: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

S f t f ChildSafety for ChildrenAbove all: There is NO privacy in your house concerning a child

Know with whom the child is communicatingWhat files are they sending?What are they typing in their bl ? (I ’ i di hblog? (It’s not a private diary; the whole world can read it.)What games are they playing and

28

What games are they playing and with whom are they playing?

Page 29: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

S f t f ChildSafety for ChildrenMove the computer to a place constantly monitored

No child needs a computer in their bedroomTurn the screen where you can see it

Secure webcams, digital cameras, and cell phones with camera functions

29

camera functions

Page 30: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

S f t f ChildSafety for ChildrenControl / monitor Internet usage while you are gone

Change passwords so your child can’t log on without youRetail spy programs will log keystrokes and show what your child is watchingchild is watchingRemove the Internet cable when you are gone

30

you are goneLock the computer up

Page 31: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

No Cyber Angels!y g

If you catch a child talking with a suspicious person online, or if you suspect you’ve found a stalker, do NOT try to conductfound a stalker, do NOT try to conduct

your own investigation. “Catching” suspects involves more than what you see on T V and you can severely harmsee on T.V. and you can severely harm any chance of a legitimate investigation.

Determine the level of relationship to the suspect, then make a report to the

police if necessary

31

police, if necessary.

Page 32: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

Helpful WebsitesNational Center for Missing and Exploited Children

www.ncmec.org and www.missingkids.com are the same website www.netsmartz.org is their children's education website

Office of Attorney General of Texas Cyber Safetyy y ywww.oag.state.tx.us/criminal/cybersafety.shtml

US Governmenthttp://onguardonline gov/index htmlhttp://onguardonline.gov/index.htmlFTC: www.ftc.gov/infosecurity

Safe Kids Programwww.safekids.com A private site devoted to safety

National Cyber Security Alliancewww.staysafeonline.info Private non-profit agencyy p g y

Get Net Wisewww.getnetwise.org One of their major sponsors is Disney.

32

Yahoo's safety sitehttp://safely.yahoo.com Former “Yahooligans” safety site for kids and parents

Page 33: The Stalker on Your Buddy List - Texas State Universitygato-docs.its.txstate.edu/vpit-security/training... · for You and the Children in Your Life 1. Objectives for this Session

Thank You for Your Interest in Your Child’s Safetyin Your Child s SafetyDet Joel K Pridgeon #3256Det. Joel K. Pridgeon, #3256Austin Police DepartmentChild Abuse / Child Exploitation512-974-6820 desk

Det. Trent Watts, #3360Austin Police DepartmentChild Abuse / Child Exploitation512-974-6808 desk512-974-6808 desk

512-974-6880 Child Abuse UnitStandard Office Ho rs 7am 5pm M F

33

Standard Office Hours 7am-5pm M-FCall 911 for an Emergency