+ All Categories
Home > Documents > INTERNET SAFETY BROUGHT TO YOU BY: SALEM COUNTY 2000 PARTNERS.

INTERNET SAFETY BROUGHT TO YOU BY: SALEM COUNTY 2000 PARTNERS.

Date post: 18-Dec-2015
Category:
Upload: elmer-thompson
View: 214 times
Download: 1 times
Share this document with a friend
Popular Tags:
29
INTERNET SAFETY BROUGHT TO YOU BY: SALEM COUNTY 2000 PARTNERS
Transcript

INTERNET SAFETY

BROUGHT TO YOU BY:SALEM COUNTY 2000

PARTNERS

PLEASE WATCH THIS VERY IMPORTANT MOVIE

Who’s Really on the Internet“Danny”

Let’s look at someone’s myspace profile – (the actual screen name is blacked out below)

He calls himself, “Danny”

http://www.myspace.com/AZDanny 

Danny’s Information and his Interests

Avatar

“About Me”

More Information

Personal Identifiers “Top

Friends”

•Let’s look at another web site… Let’s look at another web site…

•www.azsexoffender.org: the State of Arizona, : the State of Arizona, government - operated sex offender government - operated sex offender registration site.registration site.

Who’s Really on the InternetDanny aka Keith

Do you really know who you are talking to on the internet?

“Danny” from Myspace is actually Keith D. Wilkins who is a registered sex offender in the state of Arizona. He was charged and convicted for Luring a Minor for Sexual Exploitation. “Danny” also lied about his age on his Myspace page.

Enacted in 1996, Megan's Law is named after seven-year-old Megan Kanka of New Jersey who was raped and murdered by a known child molester living just across the street from her family.  Megan's Law authorizes local law enforcement to notify the public about high-risk and serious sex offenders who may live, work or frequent a particular area of a community.  The law has two components - sex offender registration and community notification. The law is intended to give the community access to information and take necessary precautions;  it is not intended to punish, harass or commit crimes against convicted sex offenders.

What is Megan’s Law?

The Following May Be Used Against You…

Everybody Knows Your NameEverybody Knows Your Name

ICQ

MSN

AIM

Yahoo!

Instant Messaging & Chat Rooms:

Hockey Chat

Tommy: "Hi, any NJ Devils fans out there?"

Curt: "Devils suck, Rangers Rule?"

JB: "Devils - 1995 Stanley Cup Champions!"

TZinVa: "Go Devils - Brodeur for President."

JB: "Tommy, you go to the games?"

Tommy: "I wish; I live too far away."

JB: "Where?"

Tommy: "Toms River"

TZinVA: "That's only 1.5 hours, why don't you drive there?"

JB: "Cool, that's near Seaside"

Tommy: "I'm only 11, I don't drive and my Dad hates hockey."

The Luring ProcessThe Luring Process

• Courting Process

• Fantasy Chat

• Exchange of Pictures

• Gifts

• Travel to Meet

• Using electronic communications to harass, threaten, antagonize, or intimidate another person.

• Posing as someone else for purposes of harassing them or others.

• Using a persons picture or a digitally enhanced image without their permission.

Cyber Bullying:

• E-mail• Websites• Web Logs or “Blogs” (Myspace)• Instant Message (IM)• Chat Rooms• Digital Cameras/Cell Phones (texting)• Video Games (Xbox Live, etc.)

Modes of Cyber Bullying:

• 13 year old from Vermont committed suicide

• After being bullied at school he turned to the Internet where he met other suicidal teens

• Parents helped to create new laws on bullying in Vermont

www.ryanpatrickhalligan.com

• Talk to someone

• Take it seriously

• Report to a person of authority

If You Are Being Cyber Bullied

IDENTIFY THEFT AND INTERNET FRAUD

• CREDIT CARDS - USE ONE CREDIT CARD FOR INTERNET PURCHASES

• WIRELESS SECURITY• EBAY SCAMS• http://www.njsp.org/

tech/identity.html• IC3.GOV• CHECK

OVERPAYMENT

• Steal identifying information on other people• Chat with members of hate groups or satanic cults and

be lulled into their illegal activities.• Join groups that steal or pirate copyrighted software.• Create bogus accounts to sell non-existent

merchandise.• Hack into corporate/government servers to steal or

destroy information.

UNSUPERVISED SURFERS CAN QUICKLY LEARN HOW TO

Sexting

The act of sending sexually explicit messages or photos electronically, primarily between cell phones.

Consequences – becomes public information

Jesse Logan• 18-year-old Jesse Logan sent nude

pictures of herself to a boyfriend.

• When they broke up, he sent them to other high school girls.

• The girls were harassing her, calling her terrible names.

• She was miserable and depressed, afraid even to go to school!

• Jesse went on TV to tell her story. Her purpose was simple: “I just want to make sure no one else will have to go through this again.”

• The interview was in May 2008. Two months later, Jesse Logan committed suicide. She was 18.

• I will talk to my parents/guardians about what I’m doing on-line and discuss the websites I’m visiting.

• I promise not to talk to people whom I do not know.

• I promise never to give any stranger my telephone number or address.

• I promise not to add anyone to my IM buddy list that I met in a chat room because I do not know if they are who they claim to be.

• I promise to immediately let my parents/guardians know if a stranger tries to contact me while on-line, whether by e-mail or an instant message.

PLEDGE TO BE A SAFE WEB SURFER

• For my own safety, I will give my parents/guardians my on-line passwords if asked for them.

• I will never agree to meet with anyone whom I become acquainted with on-line.

• I promise not to surf sites that are bad for me – including sex sites, hate sites, or sites that talk about violence or drugs.

• I agree to follow these rules because I care about what may happen to me, to my parents/guardians, and to others.

PLEDGE TO BE A SAFE WEB SURFER

THANK YOU

SALEM COUNTY 2000

INTERNET SAFETY INITIATIVE


Recommended