Protecting your Child's Soul and Safety Online

Document Sample
Protecting your Child's Soul and Safety Online Powered By Docstoc
					                    Protecting Your
                    Family's Soul and
                    Safety Online
                       Ernest Staats
                    Technology Director
MS Information Assurance, CISSP, MCSE, CNA, CWNA, CCNA, Security+, I-
                     Net+, Network+, Server+, A+
Resources available @
                                 Researched in part by Greg Brock
    Most Important Steps (establishing safe boundaries)
    Internet Addictions (Even ―good‖ activities)
    Cyber Predators (How they work and how to protect your
    Factors that increase Risk Online (Is your child
     unknowingly making him/herself a big target online?)
    Cyber Bullying (How it happens and what to do about it)
    Identity Theft (Child identity theft is a growing market)
    Securing Your Online Connections (Cyber Security
     practical tips to discovering what is going on and how to
     secure home computers)
    Social Networking (Unraveled and explained—the good
     and the bad)
    Personal Information Data Mining (How to)
    How Internet Filters Work (Including common ways
     children bypass the filter restrictions)
    Resources
         Suggested Software
The Most Important Steps
      Set up a family agreement about computer use --
       hours, accessing chat lines, revealing personal
       information/photographs, etc.
      Do not rely solely on software to block/filter content.
      Become familiar with chatting and search tools used
       by young people.
      Place the computer in a central location in the home,
       not in the kid‘s room.
      Take the ―don‘t talk to strangers‖ message into the
       digital world.
      Define a standard for everyone's privacy.
The Most Important Steps
    Let your child know that reporting unwanted or
     suspicious solicitations will not lead to restrictions on
     computer use.
    Know that restricting communications to a specific list of
     friends may not guarantee safe communications.
    Be aware of restrictions at other computer locations –
     school, library, and friends‘ homes.
    Look for the warning signs of offender manipulation –
     secretive behavior, histories being deleted, unexplained
     telephone charges, hang-up calls, unexpected mail
     (gifts), indications that the home is under surveillance.
    Know how to monitor Internet use in a variety of ways.
    Internet Addiction
   According to the Kaiser study, 8-18 y/o get an
    average total media exposure of 8.5 hrs/day.
    75% had Internet access; only 46% had
    household media rules.
   Internet has provided a social, interactive refuge
    during difficult times within the family.
   Addictive Internet use is NOT simply in reference
    to specific Internet content. Consider the time spent
    obtaining/exchanging information, chatting, Internet gaming/gambling,
    doing homework/work, researching, religious studies, etc.‖ (10)
       Internet Addiction
     ―Recent2004-2005 research indicates that addicted
      Net-geners tend to be young females.
   Young females are also increasingly outgoing
    and emotionally uninhabited when accessing
    the Internet.
   Introverted males expressed an enhanced
    reliance upon the Internet to have their social &
    sexual needs met.
   Empirical data (2005) from a conservative,
    Christian college notes that 75% of males and
    25% of females have intentionally accessed
    Internet pornography.‖ (10)
         Internet Addiction
   ―Stanford University‘s(2006) survey suggests that it‘s not an isolated
    issue. Gambling and pornography sites are just one part of the
    problem. Other sites–chat rooms, shopping venues and special-
    interest Web sites–are also proving impulsively habit-forming.‖
   ―Internet becomes a problem when it isolates,
    substituting for a real social life.‖
   Taiwan (2005) college-age online game players
    experienced increased social anxiety and depression.
   Addictive qualities: unique
    neurochemistry/neuropathology involving 3 particular
    brain chemistries stimulating the main types of known
    addictive pathways: arousal, satiation, and fantasy.
    Similar to cocaine addiction in many physiological
   Monthly pornographic downloads (peer-peer P2P): 1.5
    billion (35% of all downloads)‖ .‖     (10)
Cyber Predators

 Befriend
 Lure
 Make contact- that is their goal
Befriending Techniques
     Chat room, IM, networking sites, blogs
     Portrays same age, same likes, same dislikes
     Portrays age-typical awkwardness
     Begins to share some secrets
     Email
     Telephone (which can be faked)
     Webcamming (which can be faked)
     Verbal Chat on Internet (which can be faked)
Six Steps to Luring
   Based loosely on the “Missing Game”
    available online at
          Just like you -- befriending
          Develops trust –sympathizes, while reinforcing
                    feelings of alienation
          Establishes secrecy -- obtain incriminating
          Erodes barriers -- the “honeymoon phase”
          Direct intimidation -- guilt and threats as coercion
                                    often into meeting them or
                                    giving more information
          Face-to-face meeting --The truth emerges.
Eluding Internet Predators
   Keep usernames and profiles generic and anonymous
       Discuss your child‘s online screen name(s), profile(s), and
        activities. Many provide too much personal information. Ensure
        all screen names and profiles are non-specific, non-suggestive,
        and purposely vague.
   Avoid posting personal photos
       Pictures can be altered to embarrass or humiliate. They also
        provide personal information that can help an Internet predator to
        pretend to know you, your children, and/or their friends.
   Always keep private information private
       With just three pieces of personal information, specialized
        Internet search engines can be used to locate someone
        anywhere. Internet conversations should never include any
        personal information.
Eluding Internet Predators
   Keep the computer in an open area
       A responsible adult should always accompany minors while they
        access the Internet to provide support and direction should they
        be confronted with an aggressive solicitation or inappropriate
   Respect children’s privacy
       Respect your child‘s privacy, but make certain they peronally
        know everyone on their e-mail ―buddy‖ list. Work to generate
        parent-child trust that supports open and honest Internet use.
        Ripping out the computer once they tell you they came across
        porn will destroy the lines of communication
   Be part of your child’s online experience
       It can be a fun journey to explore the wonders of the Internet as
        a family. As computer-savvy as kids and teens are today they
        will certainly teach you a thing or two!
Indicators of High Risk
   More Technical knowledge than parents/spouse
   People who feel they are not listened too
   Do not feel like they are getting enough attention
   Do not communicate about who or what they are
    doing online
   Deleting Computer‘s Internet history
   Minimize screen or switch to another screen
    quickly when someone comes in the room
   Unexplained phone calls
   Unexplained absences
   Unexpected gifts
Risky Behavior
 Posting Photo‘s Online
 Meeting people online that you do not
  know in the real world
 Online accounts with suggestive names
 Talking about parties online
 Having blogs and other public online
  discussions (HR and college acceptance boards are now
    using these to screen people)

   Expressing heated/strong opinions
Understand Risk Factors
   30% of teenage girls polled by the Girl Scout
    Research Institute said they had been sexually
    harassed in a chat room.
   Only 7 %, however, told their mothers or fathers
    about the harassment, as they were worried that
    their parents would ban them from going online.
    (Girl Scout Research Institute 2002)
   47% of children have received e-mails with links
    to pornographic websites. (Symantec market
    research report, June 9,2003) WWKids
   Nearly one-third (31%) of 8- to 18-year-olds
    have a computer in their bedroom, and one in
    five (20%) have an Internet connection there.3
Understand Risk Factors cont.
   Online teens admit that they frequently communicate
    with people they have never met: 54% have Instant
    Messaged a stranger, 50% have emailed a stranger, and
    45% have participated in a chat room discussion with a
    stranger (Teen Research Unlimited, “Topline Findings
    from Omnibuss Research,” October 2005).

   28% of teens said they use code words on a daily basis
    to hide their online conversations from their parents –
    example: ―PIR‖ means ―parent in room”, P9, P911, or
    911(Teen Research Unlimited, “Topline Findings from
    Omnibuss Research,” October 2005.). WW Kids
Cyber Bullying

 Often has a stronger impact on teenagers
  as they have turned to the Internet
  because they need social affirmation
 Can be done by anyone speaking harshly
  to someone else online
 Can be more than a teenager can handle
Cyber Bullying Prevention
   Understand the importance of being kind and respectful to others

   Don‘t open/read messages from cyber bullies
        Your child can‘t be intimidated by messages from cyber bullies they
         never open. Teach your child to curb his or her curiosity to read and
         respond to a message they suspect or know a cyber bully has sent.
   Encourage your child to tell an adult
        For some children, their reaction to being bullied is not only fright, but
         also confusion about how to react appropriately. Coach your child to tell
         a trusted adult if they are ever being bullied.
   Report cyber bullying
        Internet Service Providers (ISPs) can often block a cyber bully, and
         schools have specific procedures and rules to handle bullying. Save the
         bully‘s message and screen name, then contact and report it.
Cyber Bullying Prevention
   No chatting while angry
       Sending angry, hostile, or taunting messages attracts cyber
        bullies. Make certain your child is not using e-mail messages or
        chat rooms to vent their own anger in a way that hurts others.
   If you are threatened with harm, tell the police
       Even if you don‘t know how to identify the individual who has
        made the threat, law enforcement often has access to the
        information and may be able to track down and arrest them
        before they do more harm.
   Be part of your child‘s online experience
       It can be a fun journey to explore the wonders of the Internet as
        a family. As computer-savvy as kids and teens are today, they
        may even teach you a thing or two!
Identity Theft
   Any request for information that comes in email
    is to be suspect. Call your bank or credit card
    company first, and do not click on the link. Do
    not use the phone number sent in the email.
   Any phone request for more info is also suspect.
    So question them first and hang up. Then call
    the institution to make sure they were calling (be
    careful of any information given out).
   Check the website before you do business with
    them. Make sure the SSL connection is good.
Identity Theft Protection
   Monitor your and your child’s credit report regularly
      Obtain your credit report at least once a year by phoning either
       Equifax, Experian, or Trans Union, and look carefully for any
       unusual or fraudulent activity. Their contact information is on the
       Internet. Check for FREE at
      Child ID theft is a large and growing market. CNN September
       14, 2006
   Beware of all requests for your personal information online
      Criminals copy logos perfectly to trick you. Legitimate companies
       never send unsolicited requests for personal information. Never
       give out personal information unless you initiate the
   Shred documents before putting them in the trash
      Bank statements, credit card offers, utility bills, and documents
       with Social Security or account numbers can be retrieved by ID
       thieves from your trash, so make a habit of tearing them up
       before tossing them.
Identity Theft Protection
   Install a locking mailbox or use the post office
       Criminals often obtain the information they need by intercepting
        mail in unlocked street mailboxes. Only send and receive bills,
        checks, or other personal correspondence from a secure
   Limit the amount of personal information you carry
    in your purse or wallet
   Protect your information online by using a firewall,
    virus protection, and secure Internet browser .
   Place a fraud alert on your credit
       If you have lost your wallet, purse, Social Security card, or
        passport, or suspect you are a potential victim of ID theft, contact
        each of the three credit bureaus (Equifax, Experian, and Trans
        Union) for assistance.
Securing your Online connections
   1. Protect your personal information-- Don‘t reply to or
    click on links in any email asking for your personal
   2. Know who you‘re dealing with -- When shopping
    online, look for a seller’s physical address and a
    working telephone number. Before downloading free
    software, read the fine print —some downloads come
    with spyware.
   3. Use anti-virus software and a firewall, and check
    for updates daily.
   4. Be sure to set up your operating system, applications
    and Web browser software properly, and update them
    regularly (configure windows/Linux/MAC‘s to run
    automatic updates).
Securing your Online connections
   5. Protect your passwords. Keep your passwords in a
    secure place, and don‘t share them on the Internet, over
    email, or on the phone. (use long passwords) (put one
    on your administrator account)
   6. Back up and consider encrypting important files. If
    you have important files stored on your computer, copy
    them onto a removable disc, and store it in a safe place.
   7. Remember being online is the same as being in the
    worst high crime neighborhood so be street smart
    when online.
   8. Secure your wireless connections; see more info at
   9. Turn off unnecessary services
   10. Turn off file and print sharing if you do not need them
Bypassing Filters
  Go to AltaVista’s BabbleFish site.
     Key in the URL of a porn site and ask Babblefish to
      translate it into English (even though the site is already
      in English).
  Changing their browser’s proxy
     Using an anonymizer: Use Google to find CGI proxies
      which are harder to control than common php proxies;, and too many others.
  Use software to find and destroy filtering software
   on local PC’s.
  Turn off filtering software on local PC.
  Conducting picture searches at Google, AltaVista,
   or other search engines including UK version of
   the search engine
   All resources and more at my website (Bottom of Page)
        Chat Abbreviation -PDF-
        Cleaning Your Windows Computer -PDF-
        Free Software for Home Users -PDF-
        How to Check Your Computers History -PDF-
        I-Educator -PDF-
        Internet Safety for Kids -PDF-
        Internet terms -PDF-
        Internet Safety Plan -PDF-
        Internet Safety Tips for Parents -PDF-
        Secure Mac step by Step -PDF-
        Tracking People around town -PDF-
   Internet Safety for Kids link list
      is very graphic
      has excellent resources for parents.
   Blocking/Filtering-
     WebWatcher    is a web site monitor, a chat
      recorder, an invisible key logger, and an
      automated screenshot capture tool. It also
      has the rare ability of both effective blocking
      and monitoring. No Peer to Peer blocking
      (web accessible)
     Specter Soft: check from email
Resources MySpace Tracking
 BeNetSafe™ 12 Features Include:
    Automated   technology tracks your children's
    activities online.
    Red flags activities that may be dangerous.
    Compatible with popular teen sites such as
    MySpace and Xanga.
    Nothing to download. Simply sign in online!
    24/7 monitoring to chaperone your children
    when you can't. Works with any computer or
    operating system. 12
 is a service that allows you to monitor login
    activity, track profile changes, and keep a running history of up to 5 profiles. Are you a parent who banned your child from
    myspace only to see that they keep logging on, or are keeping
    multiple accounts?
   Free Account Sign Up Now
      Monitor 1 profile
      Profile is crawled twice daily
      View up to 25 of a profile's friends

   Pro Account Sign Up Now
      Monitor up to 5 profiles
      Profile is crawled every 6 hours
      View up to 100 of a profile's friends                            12

   They offer: Anonymous Monitoring of your child‘s MySpace Profile.
   The kids will have no idea someone is watching and reporting on
    their profile.
   Receive periodic reports rating critical areas of potential dangers.
   In the report, the parent will be informed of the concerns found on
    the profile (ie. sex, drugs, smoking, drinking, inappropriate pictures,
    too much information, possible pedophile contact, etc.)
   Immediate email alerts to parents if a pedophile is in contact with
    your child.
   Know what your child is doing on MySpace, without being a snoop.
   We use a method of Positive Peer Pressure to push your kids to be
    safer! We contact them with our own personal MySpace profiles.
    That way, it‘s coming from a peer and not an adult or company.
Safe Spacers Sample Report
 Hello Mrs. Smith,
                                                             Overall: 3
 We have observed your child's MySpace profile from          1 = Perfectly Safe
      01/01/2006 to 02/01/2006. Below is a list of ratings   2 = Normal MySpace User
      and comments based on their profile.
                                                             3 = Has some issues
                                                             4 = Needs Talking To
                                                             5 = Not Safe at All
 Personal Info: 3
 1 = Perfectly Fine
                                                             Smoke: No
 2 = Problem
                                                             Drink: Yes
 3 = Way too much info
                                                             Drugs: Possible
 Possible Sex: 3
 1 = No problem
 2 = Potential Danger
                                                             Lauren seems like a nice girl. Most of her friends however are between the ages of 18 and 22 and
 3 = Suspected Problems
                                                             are male. She claims not to drink, but in a blog she did post that if given the choice, she would
 4 = Clear Danger
                                                             chose hard liquor over beer. The majority of her friends boast about drinking (a lot of them are
 5 = Authorities Need Contacted
 Picture Dangers: 3
                                                             One major concern is the amount of information Lauren posts on her profile. We counted 3
 1 = Perfectly Fine
                                                             separate self quizzed totally over 342 facts about her. She has way too much information about
 2 = A little concern, but fine
                                                             herself on her profile.
 3 = There is a problem
 4 = Pictures of drugs and alcohol
                                                             Another concern is her pictures on her profile. She has an image of her looking seductive in a
 5 = Sexually Explicit
                                                             towel and another in a bikini.

                                                             Luckily, it doesn't seem that she has friended any potential pedophiles. She is, however, a very
 Pedophile Dangers: 3
                                                             easy target.
 1 = No problem
 2 = Potential Danger
 3 = Suspected Problems
                                                             We recommend sending your child a SafeSpacers message via MySpace. It is a safety message
 4 = Clear Danger
                                                             from one peer to another. We will let your child know that they are being unsafe while using their
 5 = Authorities Need Contacted
                                                             profile. We will not let them know you, the parent, are involved. We then recommend continuing
                                                             our service to make sure your child stays safe and doesn‘t become a potential target for
Extreme Measures
   Carbon:
     Open   the lines of communication
   Hardware:
     USB Trackers-
     Phone Trackers-
Extreme Measures
   Software:
     Spector  Pro is used for monitoring and recording
      every detail of PC and Internet activity – in your home
      or in your office.
     Selected as the Editors‘ Choice by the experts at PC
      Magazine, Spector Pro records every detail of what
      they do on the computer – their chats, instant
      messages, emails, the web sites they visit, what they
      search for, what they do on MySpace, the pictures
      they post and look at, the keystrokes they type, the
      programs they run.
     It‘s advanced surveillance screen snapshot features,
      you get to see not only WHAT they do, but the
      EXACT order in which they do it, step by step
Check Files on Computer
 Look at online handout on how to check
  computer history files to find what has
  been surfed. Also check the settings and
  documents in My Documents to see what
  is on their account.
 Undelete files with Restoration to find out
  what your child has deleted. Look for files
  in the recycle bin and ones that have been
Software Recommendations
   Firewall – Sunbelt Kerio http://www.sunbelt- (Better than
    Microsoft‘s Firewall)
   Anti-Spyware Windows boot issues-- Windows
    Defender from Microsoft or Spybot Search and
   Internet Filter – K9-(free) or Watcher Filter; No
    P2P blocking
   Antivirus software AVG (Free) does a good job
   Laptop Security– Come to My Wireless Session on Thursday
   Encryption software – True crypt for lots of
    options, or Dekart for simplistic use.
Software Recommendations
   Disk defragmenter– Auslogics Disk Defrag or
    Power Defragmenter GUI
    System Cleaner – CCleaner (Free) Gets rid of
    old Internet application, temporary files, and
    registry files that are junk.
   File recovery– PC Inspector File recovery or File
    Scavenger ($50) Even after reformat and
    reinstall of Windows, files were still recovered.
   Anti-Spyware – A-Squared (free) Good at
    detecting new forms of spyware (heuristic scan).
Software Recommendations
   Root Kit finder – Blacklight (Free)-- Excellent
    root kit finder and cleaner
   Manage Windows installs better – nLite (free)--
    install Windows with all service packs and
    options and CD key on the fly
   Spam filter (Free)-- works in the background and
    does a good job of filtering out spam and
    tagging it as such then you decided what it does
    with spam
   Backup software – SyncBack (free or $25.00 for
    all the options)-- Excellent backup software for a
    great price. Lots of options in the paid version,
    including FTP and encryption 256 AES
Important Statistics
              Top 10 things youth do on the internet
 1. Send or read       92%        6. Get news             68%
 2. Surf the Web for   84%        7. Play or download a 66%
 fun                              game

 3. Visit an           83%        8. Research a           66%
 entertainment site               product or service
                                  before buying it
 4. Send an instant    74%        9. Listen to music      59%
 message                          online

 5. Look for info on   69%        10. Visit a chat room   55%
Assistance, Not Condemnation
 “Something is radically wrong when the local church
 rejects a person accepted by Jesus…Any church that
 will not accept that it consists of sinful men and
 women, implicitly rejects the gospel of grace. It neither
 deserves God’s mercy or men’s trust…
         And though it is true that the church must
 dissociate itself from sin, it can never have any excuse
 for keeping sinners at a distance.
         If a church remains self righteously aloof from
 failures, irreligious and immoral people, it cannot enter
 justified into God’s kingdom”.

 Brennan Manning, The Ragamuffin Gospel (10)
1.       Tapscott, The N’ Generation, 1998: 1-2.

2.       World Youth Report 2005

3.       The Henry J. Kaiser Family Foundation Study, 3/05
4.       Kaiser Family Foundation

5.       Numsum Myspace Stats

6.       Media Central ―The Buzz‖

8.       The National Youth Agency

9.       The Search Agency
10. InternetAddiction by Wendi Kannenberg
11. Internet Safety for Kids
12. US News and World Report – Special Report- September 18,2006
13. 'Predator's Playground‗?
14. Decoding MySpace 

Shared By: