Title: Internet Exploitation
1Internet Exploitation Threats
Sgt. Robyn MacEachern
2Exploitation Threats
- Internet Whats out there?
- Predators
- Cyberbullying
- Desensitization
- Scams
3Teens and What are they up to?
- Communicating
- Instant Messaging/Chat/Email
- Web cams
- Trading of Digital information(music, pictures)
- Personal websites
- On-line music, videos, movies
- On-line games/PC/Nintendo/Xbox/Playstation
4Communities on the Internet
- Growing Up Digital The Rise of the Net
Generation - Don Tapscott - And it is through their use of the digital media
that N-Gen will develop and superimpose its
culture on the rest of society. Boomers stand
back. Already these kids are learning, playing,
communicating, working and creating communities
very differently than their parents. They are a
force for social transformation
5(No Transcript)
6User Input
- Youtube
- Second life
- Wikipedia
7Virtual Communities
8Where they are at.
9(No Transcript)
10Dont be Shy
- Lavalife
- Plentyoffish
- Doyoulookgood.com
- ratemyrack.com
- ratemybody.com
11Online Communities
- Facebook
- MSN
- Vampirefreaks
- Piczo
- Neopets
- Webkins
- Habbo
12Oblivious Parents?
- Research Studies
- Symantec 2007
- Only 49 of Canadians surveyed were aware of
their childrens online aliases - 41 of parents were not familiar with FACEBOOK
- 32 were unfamiliar with MySpace, 26 with
YouTube -
13Ipsos Reid Study - 2007
- Only 27 of Adults reported being totally skilled
internet users
14Sign of Whats Out There
- Neopets pick your character
- Young kids
15Neopets..
- Other examples, video game, bully
- Nature of media
16Trouble Spots
- Passwords
- Too much Information
- Internet is real
- Webcams
- Cyberbullying
17Passwords and other Digital Information
- Includes all information that can be seen or sent
electronically - Passwords
- Secret questions
- Opens door for cyberbullying ie knowledge is
power - Pillow and feathers (Madonnas Mr. Peabodys
Apples)
18Carelessly Sharing Digital Information
- Never post personal information/interests/photo
- This could happen to you.
- Be sure that you are dealing with someone that
you and your parents know and trust before giving
out any personal information about yourself
digitally (electronically)
19Social Networking
- Search ability
- Postings
- Personal websites/spaces
- Permanent archive
- Blog online rants
- Online diary
- Online thoughts
20- www.Myspace.com (175,000,000 July 2007)
- 6 degrees of separation
- Sample
- Dec 5. 136,411,933
- I don't agree that you can't "know" someone if
you never - meet face to face. If you spend time with them in
Instant - Messenger and on the telephone I feel like you
can know them just as well as a friend 'In Real
Life' in fact I have friends online who I have
never met because they live in other countries
that may know me better than friends I have right - here
- Laura, Brighton
- BBC News The MySpace Age
21Needle in a Big Haystack
- Incredible abilities to Search
- Define what is personal information
- Dont talk to strangers
22Search in Windows Live Spaces
23Search in Myspace
24Search for Profiles - Yahoo
25Canada 411
26It is Easy to be Someone Else
- Remember that people online may not be who they
seem. Because you can't see or even hear the
person it would be easy for someone to
misrepresent him- or herself. - Never arrange a face-to-face meeting without
telling your parent or guardian.
27(No Transcript)
281 866-658-9022
29Buddy Lists and Instant Messaging
- Consider adding only friends you know and trust
to your buddy list. - Chatrooms no security
30Buddy list status
Real time conversation
Profile of buddy
31MSN Save Conversations
32(No Transcript)
33The Internet is public????
- 74 of 10-14 year olds thought e-mails are
private communications Ipsos Reid/Microsoft
2007
34The Internet is not private
- Remember that nothing you write on the web is
completely private, including email so be
careful and think about what you type and who you
tell - Internet etiquette golden rule
35Webcams
- Why do you have one?
- Ability of other person to take screen shots
- Remote access related directly to the security
of you connected to the internet - Danger of bringing people into your home
- Can see information behind you
36Cyber bullying /Aggressive Behaviour
- Impact cant escape
- Variety of mediums to bully
- Unknown identity of bully
- Kids dont tell!
37Link to Toronto Star article
- They are the latest weapons in a bully's arsenal
- computers and the Internet. For most teenagers,
the Web is like a second home where they go to
talk and catch up with friends. But for some of
them, that home doesn't feel safe these days
because bullies have been coming to call. It's a
new and odious use of the Internet and, right
now, there's little anyone can do to stop it.
CBC News - http//csriu.org/cyberbullying/index.html
- http//en.wikipedia.org/wiki/Cyberbullying
38Kids Help Phone Posts
- Kids Help Phone
- MSN cyberbullying question
39Ways of bullying/harassing others online
- Send e-mails or instant messages containing
insults or threats directly to a person. - Spread hurtful comments about a person to other
through e-mail, instant messaging or postings on
web sites and blogs, polls - Steal passwords and send out threatening e-mails
or instant messages using an assumed identity. - Build web sites, often with password protection,
to target people - students or even teachers. - Increasingly, kids are being bullied by text
messages sent through their cell phones.
40Harassing websites
41Examples
- David Knight (link to pdf)
- Star Wars kid (link to pdf)
- Built-in digital cameras in cell phones have
added a new dimension to the problem. (Youtube)
42- No one is immune, including teachers!
43Dealing with Cyberbullying
- Preserve evidence this is crucial for
identifying the bully and making a case. - Attempt to enlist assistance from the service
provider. - If able to identify the bully, contact him or her
and/or parents. - Use available blocking technology (i.e., block
the user on IM, email and chat.) - In serious cases, seek assistance from the police
(i.e., threats of physical harm, unrelenting or
unable to stop.)
44The Law and the Internet
- Generally, if its a crime in the real world,
its a crime on the Internet - Unauthorized access
- Hacking
- Possession/distribution of passwords
- Mischief to Data
- Defamatory Libel
- Personation
- Threatening
- Criminal Harassment
- Child Pornography
- Hate Crimes
45Desensitization?
- www.Newgrounds.com
- Anarchists Notebook
- Peer to Peer file sharing
- Hate Crimes
46On-line suicide
47query
results
48Concerns? - Reporting?
- Parents must become involved
- Set standards of use (Online Contracts)
- Monitor Internet use (Open area)
- Use the net for help safety sites, netlingo
dictionaries - Internet Service providers Social Networking
sites (Terms of Use Agreements)
49Who Investigates?
- Report any crime to local police
- Investigated as any other crime
- May call in specialists to examine data
- OPP e-Crime Section
- Internet cache
- Email evidence
50(No Transcript)
51(No Transcript)
52On-line resources
- Local ISP websites
- Sympatico
- Isafe.org
- Bewebaware
- Netsmartz
- Microsoft
53Safe Surfing requires.
- Knowing internet info is public for all to see
- Protect your passwords
- Webcam risks
- Too much 411
- Beware of scams/strangers
- Talk to someone teachers/parents
54Contact Information
- Sgt. Robyn MacEachern
- (705) 329-6299
- Robyn.MacEachern_at_ontario.ca
55(No Transcript)