Sie sind auf Seite 1von 30

Part 1 - Young Minds Internet Security

Awareness Course

Presented by:

The Threats
Do you feel overwhelmed?…yet?

2 Keeping Our Children Safe on the Internet


How do you keep children safe on the Internet?

ƒ You must understand the dangers


found on the Internet
ƒ Communicate with your children
about these dangers
ƒ Set expectations for Internet use
and conduct
ƒ Trust but verify…

FACT: You do not have to know


more about computers than your
children to keep them safe.

3 Keeping Our Children Safe on the Internet


Old dogs can learn new tricks…

4 Keeping Our Children Safe on the Internet


Overview
ƒ Inappropriate material
ƒ Social networks
ƒ Online predators

5 Keeping Our Children Safe on the Internet


Inappropriate material

6 Keeping Our Children Safe on the Internet


The downside of the Internet
ƒ Instant access to
inappropriate material
ƒ Pornography
ƒ Drugs
ƒ Gambling
ƒ Illegal activities
ƒ Pirated software / music /
movies
ƒ The Internet is the ultimate STATISTIC: 2006 study by the
National Center for Missing and
source for answers Exploited Children…34% of teens
were exposed to unwanted sexual
ƒ Just Google it! material online (up from 25% in
2001)
7 Keeping Our Children Safe on the Internet
Pornography Statistics
ƒ The average age of first Internet exposure
to pornography is 11.
ƒ By the time children reach 8-16 year old,
90% have viewed pornography
ƒ most while doing homework
ƒ 4.2 million pornographic web sites (12% of total
web sites)
ƒ 100,000 web sites offering child pornography
ƒ The Internet pornography industry generates
$4.9 - $12 billion dollars in annual revenue.
2006 - http://internet-filter-review.toptenreviews.com/internet-pornography-statistics.html
8 Keeping Our Children Safe on the Internet
Social networks

9 Keeping Our Children Safe on the Internet


Meeting people online is fun and easy

ƒ MySpace
ƒ Facebook
ƒ Orkut
ƒ Flickr
ƒ YouTube
ƒ Runescape

ƒ Most social networking


sites allow you to search
profiles to meet people with
similar interests
Unfortunately, online
predators are also searching
profiles to meet our kids…
10 Keeping Our Children Safe on the Internet
MySpace

11 Keeping Our Children Safe on the Internet


Online profiles / registration forms

ƒ Registration process requests


personal information to create
your “profile.”

ƒ Predators use these profiles


to both identify and lure victims.

STATISTIC: April 2007 study


by the Pew Internet Project
reveals 46% use false info Low-tech Tip #1:
to obscure true age, sex, or Use your birthday when
location registering your kids for online
profiles

12 Keeping Our Children Safe on the Internet


Flickr

13 Keeping Our Children Safe on the Internet


Runescape

14 Keeping Our Children Safe on the Internet


Online predators

15 Keeping Our Children Safe on the Internet


What’s the threat?

ƒ In the physical world,


you worry about the
threats that are in close
proximity to you

ƒ In cyberspace,
thousands of bad people
all over the world are
only milliseconds away

16 Keeping Our Children Safe on the Internet


But my kids are careful…right?
What parents say What kids say
ƒ 94 percent feel they have a ƒ Only 55 percent said they
good idea of what their children share what they do on the
do while on the Internet. Internet with their parents.
ƒ 93 percent stated that they had ƒ Only 64 percent stated that
established rules for the their parents have
children’s Internet use. established rules for their
Internet use.
ƒ 44 percent feel limited to ƒ 52 percent stated that they
monitoring & sheltering their would prefer to be alone
children from inappropriate when surfing the Internet.
material on the Internet.

29 percent of students polled stated that their parents have


no idea where they go or what they do on the Internet.
Source: IBM: Empowering young people to be safe on the Internet, 2004
17 Keeping Our Children Safe on the Internet
The grooming process: 1st stage

Appears familiar
ƒ Predator disguises true identity and motive
for the relationship.
ƒ Predator pretends to have common
interests with the victim (movies, cars, etc).
ƒ Predator’s goal is to be non-threatening,
friendly, comforting and familiar.
ƒ Predator uses information gathered from
profile and chat room conversations.

Source: IBM: Empowering young people to be safe on the Internet


18 Keeping Our Children Safe on the Internet
The grooming process: 2nd stage

Develops trust
ƒ Predator systematically exploits natural
parent/child friction.
ƒ Predator always supports child’s point of
view regarding family conflicts.
ƒ Predator fosters the illusion that they are
the only person who understands the child.
ƒ Predator & victim communicate regularly in
public chat rooms – become ‘buddies.’

Source: IBM: Empowering young people to be safe on the Internet


19 Keeping Our Children Safe on the Internet
The grooming process: 3rd stage

Establishes secrecy
ƒ Victim places the predator on their private
e-mail list so that they can ‘chat’ any time.
ƒ Predator acquires the victim’s personal
Internet addresses and phone number.
ƒ Youth victim is convinced that parents
won’t understand the ‘special’ relationship.
ƒ Secret IM & e-mail accounts now allow a
predator to communicate stronger
messages.

Source: IBM: Empowering young people to be safe on the Internet


20 Keeping Our Children Safe on the Internet
The grooming process: 4th stage

Erodes barriers
ƒ The predator lures the child into adult-
oriented conversations.
ƒ The child’s curiosity is exploited by the
predator to erode personal barriers.
ƒ Obscene photos are sent to desensitize
the child’s protective inhibitions.
ƒ The child-victim begins believing they are
prepared for adult experiences.

Source: IBM: Empowering young people to be safe on the Internet


21 Keeping Our Children Safe on the Internet
The grooming process: 5th stage

Direct intimidation
ƒ The predator uses the child’s psychological
distance from their parents to intimidate.
ƒ Having received forbidden materials, the
victim can be blackmailed.
ƒ The predator can resort to outright threats of
violence or humiliation.
ƒ Victims can feel powerless to ask an adult or
authority for safety and support.

Source: IBM: Empowering young people to be safe on the Internet


22 Keeping Our Children Safe on the Internet
The grooming process: Final stage
Face-to-face meeting
ƒ FACT: One-third of youth ages 8-18 have
talked about meeting someone they have
only met through the Internet.

ƒ FACT: Almost one in eight youth ages 8-


18 discovered that someone they were
communicating with online was an adult
pretending to be much younger.

Internet Safety: Realistic Strategies & Messages for Kids


Taking More and More Risks Online, Polly Klaas
Foundation, 2005.

Source: IBM: Empowering young people to be safe on the Internet


23 Keeping Our Children Safe on the Internet
True Story

2007 STAT:
32% of online
41-year old teens have been
predator posed approached by a
as college student. complete
stranger (43% for
social networks)

Source: IBM: Empowering young people to be safe on the Internet


24 Keeping Our Children Safe on the Internet
How do predators meet their prey?
ƒ Chat rooms = 2/3
ƒ Instant messages = 24%

ƒ 77% of the
victims were
14-17 years old.

Source: U.S. Department of Justice OJJDP Fact Sheet, March 2001

25 Keeping Our Children Safe on the Internet


Chat rooms vs. instant messages vs. txt msgs
Chat room:

Instant message:

Text message:

26 Keeping Our Children Safe on the Internet


Internet communication risks

R
I
S
K

Chat room Instant message Email Text message

27 Keeping Our Children Safe on the Internet


Coded messages? Common abbreviations
ASLP Age, sex, location,
ƒ Common abbreviations used in picture?
text messages, IMs, or chat TMI Too much
rooms are not known to most information
parents BRB Be right back
F2F Face to face
ƒ Used primarily for brevity and
WYP What's Your
speed…also used to hide the Problem?
meaning of a chat in plain sight
POS Parents Over
ƒ Most are easily Google’d to Shoulder
reveal standard meaning W8AM Wait a minute
P911 Parent alert

Source: http://www.cox.com/TakeCharge/includes/docs/results.pdf
28 Keeping Our Children Safe on the Internet
The newest threat…
ƒ “As cell phones become multimedia
players with bigger screens and Web-
browsing capability, the pornography
industry increasingly is targeting its
content at the mobile devices.”

ƒ The market for adult content for mobile


devices is expected to generate $14.5-
billion (U.S.) in revenue between 2006
and 2011, according to Juniper.

ƒ Mobile porn is not only about images


& movies, it’s also chat rooms and
“dating” services—same capabilities
as a PC
Source: Wall Street Journal, 5/25/2006, Firms Target Cell phone Porn
29 Keeping Our Children Safe on the Internet
Questions?

30 Keeping Our Children Safe on the Internet

Das könnte Ihnen auch gefallen