Internet Exploitation - PowerPoint PPT Presentation

1 / 50
About This Presentation
Title:

Internet Exploitation

Description:

Instant Messaging/Chat/Email. Web cams. Trading of Digital ... Pillow and feathers (Madonna's Mr. Peabody's Apples) Carelessly Sharing Digital Information ... – PowerPoint PPT presentation

Number of Views:234
Avg rating:3.0/5.0
Slides: 51
Provided by: mace9
Category:

less

Transcript and Presenter's Notes

Title: Internet Exploitation


1
Internet Exploitation Threats
Sgt. Robyn MacEachern
2
Exploitation Threats
  • Internet Whats out there?
  • Predators
  • Cyberbullying
  • Desensitization
  • Scams

3
Teens and What are they up to?
  • Communicating
  • Instant Messaging/Chat/Email
  • Web cams
  • Trading of Digital information(music, pictures)
  • Personal websites
  • On-line music, videos, movies
  • On-line games/PC/Nintendo/Xbox/Playstation

4
Communities on the Internet
  • Growing Up Digital The Rise of the Net
    Generation - Don Tapscott
  • And it is through their use of the digital media
    that N-Gen will develop and superimpose its
    culture on the rest of society. Boomers stand
    back. Already these kids are learning, playing,
    communicating, working and creating communities
    very differently than their parents. They are a
    force for social transformation

5
(No Transcript)
6
User Input
  • Youtube
  • Second life
  • Wikipedia

7
Virtual Communities
8
Where they are at.
9
(No Transcript)
10
Dont be Shy
  • Lavalife
  • Plentyoffish
  • Doyoulookgood.com
  • ratemyrack.com
  • ratemybody.com

11
Online Communities
  • Facebook
  • MSN
  • Vampirefreaks
  • Piczo
  • Neopets
  • Webkins
  • Habbo

12
Oblivious Parents?
  • Research Studies
  • Symantec 2007
  • Only 49 of Canadians surveyed were aware of
    their childrens online aliases
  • 41 of parents were not familiar with FACEBOOK
  • 32 were unfamiliar with MySpace, 26 with
    YouTube

13
Ipsos Reid Study - 2007
  • Only 27 of Adults reported being totally skilled
    internet users

14
Sign of Whats Out There
  • Neopets pick your character
  • Young kids

15
Neopets..
  • Other examples, video game, bully
  • Nature of media

16
Trouble Spots
  • Passwords
  • Too much Information
  • Internet is real
  • Webcams
  • Cyberbullying

17
Passwords and other Digital Information
  • Includes all information that can be seen or sent
    electronically
  • Passwords
  • Secret questions
  • Opens door for cyberbullying ie knowledge is
    power
  • Pillow and feathers (Madonnas Mr. Peabodys
    Apples)

18
Carelessly Sharing Digital Information
  • Never post personal information/interests/photo
  • This could happen to you.
  • Be sure that you are dealing with someone that
    you and your parents know and trust before giving
    out any personal information about yourself
    digitally (electronically)

19
Social Networking
  • Search ability
  • Postings
  • Personal websites/spaces
  • Permanent archive
  • Blog online rants
  • Online diary
  • Online thoughts

20
  • www.Myspace.com (175,000,000 July 2007)
  • 6 degrees of separation
  • Sample
  • Dec 5. 136,411,933
  • I don't agree that you can't "know" someone if
    you never
  • meet face to face. If you spend time with them in
    Instant
  • Messenger and on the telephone I feel like you
    can know them just as well as a friend 'In Real
    Life' in fact I have friends online who I have
    never met because they live in other countries
    that may know me better than friends I have right
  • here
  • Laura, Brighton
  • BBC News The MySpace Age

21
Needle in a Big Haystack
  • Incredible abilities to Search
  • Define what is personal information
  • Dont talk to strangers

22
Search in Windows Live Spaces
23
Search in Myspace
24
Search for Profiles - Yahoo
25
Canada 411
26
It is Easy to be Someone Else
  • Remember that people online may not be who they
    seem. Because you can't see or even hear the
    person it would be easy for someone to
    misrepresent him- or herself.
  • Never arrange a face-to-face meeting without
    telling your parent or guardian.

27
(No Transcript)
28
1 866-658-9022
29
Buddy Lists and Instant Messaging
  • Consider adding only friends you know and trust
    to your buddy list.
  • Chatrooms no security

30
Buddy list status
Real time conversation
Profile of buddy
31
MSN Save Conversations
32
(No Transcript)
33
The Internet is public????
  • 74 of 10-14 year olds thought e-mails are
    private communications Ipsos Reid/Microsoft
    2007

34
The Internet is not private
  • Remember that nothing you write on the web is
    completely private, including email so be
    careful and think about what you type and who you
    tell
  • Internet etiquette golden rule

35
Webcams
  • Why do you have one?
  • Ability of other person to take screen shots
  • Remote access related directly to the security
    of you connected to the internet
  • Danger of bringing people into your home
  • Can see information behind you

36
Cyber bullying /Aggressive Behaviour
  • Impact cant escape
  • Variety of mediums to bully
  • Unknown identity of bully
  • Kids dont tell!

37
Link to Toronto Star article
  • They are the latest weapons in a bully's arsenal
    - computers and the Internet. For most teenagers,
    the Web is like a second home where they go to
    talk and catch up with friends. But for some of
    them, that home doesn't feel safe these days
    because bullies have been coming to call. It's a
    new and odious use of the Internet and, right
    now, there's little anyone can do to stop it.
    CBC News
  • http//csriu.org/cyberbullying/index.html
  • http//en.wikipedia.org/wiki/Cyberbullying

38
Kids Help Phone Posts
  • Kids Help Phone
  • MSN cyberbullying question

39
Ways of bullying/harassing others online
  • Send e-mails or instant messages containing
    insults or threats directly to a person.
  • Spread hurtful comments about a person to other
    through e-mail, instant messaging or postings on
    web sites and blogs, polls
  • Steal passwords and send out threatening e-mails
    or instant messages using an assumed identity.
  • Build web sites, often with password protection,
    to target people - students or even teachers.
  • Increasingly, kids are being bullied by text
    messages sent through their cell phones.

40
Harassing websites
41
Examples
  • David Knight (link to pdf)
  • Star Wars kid (link to pdf)
  • Built-in digital cameras in cell phones have
    added a new dimension to the problem. (Youtube)

42
  • No one is immune, including teachers!

43
Dealing with Cyberbullying
  • Preserve evidence this is crucial for
    identifying the bully and making a case.
  • Attempt to enlist assistance from the service
    provider.
  • If able to identify the bully, contact him or her
    and/or parents.
  • Use available blocking technology (i.e., block
    the user on IM, email and chat.)
  • In serious cases, seek assistance from the police
    (i.e., threats of physical harm, unrelenting or
    unable to stop.)

44
The Law and the Internet
  • Generally, if its a crime in the real world,
    its a crime on the Internet
  • Unauthorized access
  • Hacking
  • Possession/distribution of passwords
  • Mischief to Data
  • Defamatory Libel
  • Personation
  • Threatening
  • Criminal Harassment
  • Child Pornography
  • Hate Crimes

45
Desensitization?
  • www.Newgrounds.com
  • Anarchists Notebook
  • Peer to Peer file sharing
  • Hate Crimes

46
On-line suicide
47
query
results
48
Concerns? - Reporting?
  • Parents must become involved
  • Set standards of use (Online Contracts)
  • Monitor Internet use (Open area)
  • Use the net for help safety sites, netlingo
    dictionaries
  • Internet Service providers Social Networking
    sites (Terms of Use Agreements)

49
Who Investigates?
  • Report any crime to local police
  • Investigated as any other crime
  • May call in specialists to examine data
  • OPP e-Crime Section
  • Internet cache
  • Email evidence

50
(No Transcript)
51
(No Transcript)
52
On-line resources
  • Local ISP websites
  • Sympatico
  • Isafe.org
  • Bewebaware
  • Netsmartz
  • Microsoft

53
Safe Surfing requires.
  • Knowing internet info is public for all to see
  • Protect your passwords
  • Webcam risks
  • Too much 411
  • Beware of scams/strangers
  • Talk to someone teachers/parents

54
Contact Information
  • Sgt. Robyn MacEachern
  • (705) 329-6299
  • Robyn.MacEachern_at_ontario.ca

55
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com