Top Banner
BENETSAFE .ORG SM
70
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 1. BE NET SAFE .ORG SM

2. 3. BeNetSafe.Org Founded in September 2002 9/2002 - 9/2007 The Un-Funded Organization Reached out to 7000+ Students Spoke to 600+ Parents / Police / Educators Reached out to the state using the GSDLN 10/2007 becomes a Non-Profit organization Continue to talk to students and adults Further develop partnershipsSupport State-Wide Student mentor Programs 4. BeNetSafe.Org

  • The Internet is here to stay, so are social networking sites.
  • The Internet is full of good stuff
  • There are billions and billions of megabytes of research information and articles out there.
  • Social Networking sites have made it easier for lost friends to re-unite, and to meet new interesting people.

5. BeNetSafe.Org

  • Our children need to be guided through the Internet as we would in the real world.
  • You do not have to be a computer expert to guide your child.
  • Make your child understand why you feel as you do, dont make it a game of blocking and re-blocking, they are smarter than we are.
  • Give your child someone to turn to should they feel uncomfortable about something they have seen on the Internet.
  • Give your child someone to turn to should they feel uncomfortable about something they have seen on the Internet.

6. Online Predators and Their Victims Myths, Realities, and Implications for Prevention and Treatment FebruaryMarch 2008American Psychologist Janis Wolak, David Finkelhor, and Kimberly J. Mitchell, Crimes against Children Research Center and Family Research Laboratory, University of New Hampshire;Michele L. Ybarra, Internet Solutions for Kids, Inc., Santa Ana, California. The article outlined 9 risky on-line behaviors Posting personal information online, 56% of youth Internet users Interacting online with unknown people, 43% Having unknown people on a buddy list, 35% Using the Internet to make rude and nasty comments to others, 28% Sending personal information to unknown people met online, 26% Downloading images from file-sharing programs, 15% Visiting X-rated sites on purpose, 13%Using the Internet to embarrass or harass people youths are mad at, 9% Talking online to unknown people about sex, 5% 7.

  • 2/3 of people in the United States visit social-networking sites
  • 90 percent of young people are online.
    • Pop in to sites to check for messages
    • Check/Comment on the new postings
    • Always on generation

8. Social Network Required Information

  • Email Address
  • First Name
  • Last Name:
  • Password:
  • Postal Code:
  • Gender:
  • Date Of Birth:
  • Use a disposable address
  • Ok
  • Why?
  • Ok, this will not display
  • No
  • Yes
  • Never

-------- subtract 3 days 9. OPTIONAL INFORMATION

  • Upload Some Photos!
  • Headline:
  • About Me:
  • I'd Like to Meet:
  • Interests:
  • Music:
  • Movies:
  • Television:
  • Heroes:
  • Books:
  • Marital Status:
  • Sexual Orientation:
  • Hometown:
  • Religion:
  • Smoker:
  • Drinker:
  • Children:
  • Education:
  • School Name:

10. Other Information Favorite Color:Screen Name:Favorite Band:Favorite Movie:Favorite Show:Your Car:Your Hometown:Your Present Town:Your Crushes First Name:Your Grade:Your Style:What is Your Name?How old are you?Eye color?Shoe Size?Hair color?Height?Weight?Favorite:Food?Drink?Movie?Music Band?Animal?Sport?What is the link to your website, blog, or myspace?Place to live?Subject?Stuff......Best thing that happened to you in the last few years?Do you want to get married?Kids?Best place to go on a date?What is your dream?What do you want to do when you grow up?Play an instrument?List 5 things (inc. brand) you are wearing right nowFriends....Friend you have known the longest?Best friend(s)?Friend that makes you laugh the most?Friend who you can talk to anything about?Friend with the best personality?Last friend to call you?Last friend to talk to you?Last friend you hung out with?Last friend you went to a movie with?Last friend to make you laugh?Most memorable experience with a friend?Anything you plan to do with friends when you get older?Any trips planned with friends?Ever traveled anywhere?What places do you want to visit?Where do you want to live when you're older?How happy are you with where you are in life? Why?What's your most embarrassing moment?Do you have any art or pictures on your walls? Describe it. 11. Social Networking Sites But I made my site PRIVATE!!! 12. Social Networking Sites Facebook signs up 100,000 new users every day. Including one 'Freddi Staur' (an anagram of 'ID Fraudster) a world leader in IT security and control 13. Social Networking Sites Research shows that 41 percent of users, more than two in five, will divulge personal information - such as email address, date of birth and phone number - to a complete stranger, or at least to Freddi Staur. 14. Social Networking Sites 43 percent of users contacted responded to Freddi. 41 percent of those approached leaked personal information. 15. Social Networking Sites 87 percent of respondents provided details abouttheir education or workplace. 84 percent of respondents listed their full date of birth. 78 percent of respondents listed their current address or location. 72 percent of respondents divulged one or more email address. 26 percent of respondents provided their instant messaging screen name.23 percent of respondents listed their current phone number. 16. Social Networking Sites In the majority of cases, Freddi was able to gain access to respondents photos of family and friends, information about likes and dislikes, hobbies, employer details and other personal facts. Many users also disclosed the names of their spouses/partners, several included their complete rsums, while one user evendivulged his mother's maiden name. 17. Social Networking Sites

  • Who visits social networking sites
    • Law Enforcement(Campus Police)
    • Colleges
      • Administration
      • Professors
    • Potential Employers
    • Sex Offenders
    • Lots and lots of Crooks!

18. Social Networking Sites Posting in cyberspace is forever. What ever you post today can come back to haunt you years from now. An Live Search search for "Freddi Staur returned more than 5000 results. 19. Social Networking Sites

  • One last thing to consider:
  • Posting by Proxy
  • Student John Doe may not have a page on a social networking site or you may monitor Johns page, but what about his friends?
    • Do they post things about (or for) John?
    • Does John use someone elses site to post his information?

20. Cyber Predators

    • The Center for Missing and Exploited Children reported 2,660 incidents of adults using the Internet to entice children into meeting in 2005.
    • One in every five children who go online is solicited,
    • The Justice Department estimates that at any given time 50,000 predators are online trolling for youth.

21. Stage One Predator Appears Familiar

  • Non-threatening, friendly, comforting, and familiar
  • Systematically pretends to have common interests
  • Disguises true identity and motive
  • Collects information from profiles and chat rooms

22. Stage Two Develops Trust

  • Supports the child's point-of-view
  • Systematically exploits social friction
  • Acts like the only person that truly understands the child
  • Becomes the best buddy

23. Stage Three Establishes Secrecy

  • Exchanges e-mail addresses an phone numbers
  • Keeps parents in the dark
  • Child uses a secret e-mail address
  • Introduces adult oriented material and language

24. The Last Stage The Face to Face Meeting

  • Not all instances require all 3 of the first 3 stages
  • Most aggressive solicitations are made by people under 30
  • Instances of females making aggressive solicitations are on the rise
  • The victim may meet the predator willingly or may be threatened

25. Anthony R. Stancl Circuit Court Commissioner Laura Florian Laumost horrific allegations she has reviewed in all her years on the bench.Posing as a female on Facebook makes contact asking for explicit photos Blackmailed some of the boys under the threat that the pictures would be released to the rest of the high school. Threatens harm to family membersAccording to criminal complaints filed: 26. Anthony R. Stancl According to reports 300 naked photos and movie clips of New Berlin boys and another 600 professionally made pornographic movies of children were found on the computer. "The defendant is facing 293 years if convicted on these 12 counts. ... This crime allegedly involved many, many, many victims.Laura Florian Lau 27. The Last Stage The Face to Face Meeting 28. 35 percent of kids have been threatened online 42 percent of kids have been bullied online. 53 percent of kids admit to bullying others online. 58 percent have not told their parents or an adult. Cyber Bullies The Internet is the new bathroom wall 29. Teen charged with using MySpace to intimidate ACGC teacher, students (Gretchen Schlosser) West Central Tribune Published Saturday, November 17, 2007 OLIVIA Charges have been filed against a 17-year-old Olivia teen who allegedly hacked into another teenagers MySpace. com account and used it to threaten students and a teacher at Atwater-Cosmos-Grove City High School. Meeker County Sheriffs deputies were called to the high school on Oct. 10 to investigate the threats. 30. Mobile Phones 31. Mobile Phones The Internet no longer stops at your front door! 32. Mobile Devices Sexting Bullying A girl in Ohio was charged for sending nude photos of herself to classmates.If convicted she could have to register as a sex offender for 20 years. Another concern now with cell phones. Some teens are bullying through repeated and hostile text messages. 33. Mobile Phones

  • Cyber Bullying
    • Sending someone mean or threatening instant messages, or text messages
    • Excluding someone from an instant messenger buddy list or blocking their email for no reason
    • Tricking someone into revealing personal or embarrassing information and sending it to others
    • Breaking into someone's instant message account to send cruel or untrue messages while posing as that person

34. Mobile Phones 35. Mobile Phones 36. Mobile Phones 37. Mobile Phones

  • A Cell Phone
  • Could send voice Messages to any other cell phone or land line.

38. Mobile Phones

  • A Cell Phone
  • Todays smart phones can do so much more.

39. Mobile Phones Web Browsing Camera Messaging (IM) 40. Mobile Phones Saved about 10 messages and the last 10 phone callsSaves almost all received text messages, calls (in, out, and missed) Google searches, web browsing and even voice mails. Some phones even attach latitude and longitude to photos taken. 41. 42. When grown-ups turn cyberbullies Megan Meier's parents say she committed suicide after being hoaxed by a couple who lived down the street and posed online as a 'cute boy.' When the 'boy' apparently 'turned' on Megan, saying he heard she was 'cruel' to her friends, she hung herself. Local police say there is no law that applies to a situation like this. "It is absolutely vile, her mother said. ABC News 43. When grown-ups turn cyberbullies Megan Meier's parents say she committed suicide after being hoaxed by a couple who lived down the street and posed online as a 'cute boy.' When the 'boy' apparently 'turned' on Megan, saying he heard she was 'cruel' to her friends, she hung herself. Local police say there is no law that applies to a situation like this. "It is absolutely vile, her mother said. ABC News 44. Resources for Parents 45.

  • Community Outreach
    • Videos
    • Scripted presentations
  • Mentor Program
    • Students Teaching Kids
      • Lesson plans
  • Full Pre-Approved School Curriculum
  • K Thru 8
    • 45 minute classes for classrooms with and without computers
  • High School
    • Video oriented classroom instruction.

46. On-/Offline ActivitiesSafety PledgesInternet Safety News www.NetSmartzKids.org Amy's ChoiceJulie's JourneyTracking TeresaTeens PSA: "Promises" 47. WebWiseKids

  • Parents/Kids Training Days
    • Videos
    • Internet Safety pledges
  • LiveWWWires - Missing
  • Wired With Wisdom
  • Mirror Image

48. 49. 50. 51. 52. 53. 54. 55. 56. 57. Protect yourself with Free Stuff!! 58. 59. 60. 61. New Operating Systems Vista 62. New Operating Systems 63. New Operating Systems 64. 65. The Future In New Hampshire

  • You
  • BeNetSafe.Orgs continuing outreach
  • BeNetSafe.Orgs State Wide Student Mentor Project
  • New Hampshire Cyber Crime Initiative
    • NH Schools Outreach with NetSmartz/i-Safe
  • NH Attorney General
    • WWW.ConnectWithYourKids.Org

66. Student Mentor Program

  • Goal:Deliver age appropriate information on an on-going basis utilizing trained student mentors
  • Benefits:
    • Develop student leadership and presentation skills
    • Timely and on-going Internet Safety Awareness education
    • Help keep our children safe on the Internet
    • Go To peer resource for student body
  • Program:
    • Professional Training Program presented by Peter LaMonica to be a Certified Student Mentor
    • Adult Advisor involvement at school level for support and guidance
    • Age/grade appropriate content delivery No Fear Factor!
    • Upper classmates to visit lower classes and present/share content and stories

67. The Future In New Hampshire

  • BeNetSafe.Org SMEvents
    • BeNetSafe teams up for more events with the Granite State Distance Learning Network
    • Parent Meetings
    • Events.BeNetSafe.Org
  • Take control -
    • Reach Out and talk about Internet Safety!
    • If you cant ask BeNetSafe.Org for help.

Help Fund BeNetSafe.Org Help Fund BeNetSafe.Org 68. Since February 2000

  • Unwanted exposure to sexual material
  • Receiving unwanted sexual solicitations
  • Saw sexual explicit material online
  • Effective use of blocking and Filtering software
  • Online Harassment
  • Aggressive online solicitations
  • Communication with online strangers
  • Distressed by online exposure
  • Harassment from acquaintances online
  • Sent or asked to send explicit Photos or video

69. How do you contact us? Currently the best way is by e-mail.Send any and all questions and requests to [email protected] Events are listed at www.BeNetSafe.org.BeNetSafe.Org SM 70. BE NET SAFE .ORG SM