Trouble Areas for Kids and Parents
INTRODUCTION TO SOCIAL
NETWORKS
Talk with your kids about what is
happening.
THESE ACTIVITIES NEED ADULT SUPERVISION
GOOD PARENTING STRATEGIES
#SAFETY RULES
Parents learn how to keep children safe on the Internet.
Find the tools that a parent needs to supervise and keep children and teenagers safe on the internet.
DON'T LET THIS HAPPEN TO YOUR KIDS
Simon Sinek on Millennials in the Workplace
Institutionalized sense of impatience
4 REASONS - failed parenting stratedgies, technology, impatience, environment then when
they
get a job in the real world they find out they are NOT SPECIAL, their MOM CAN'T GET THEM A PROMOTION, YOU
DON'T GET A MEDAL FOR COMING IN LAST, AND YOU JUST CAN'T HAVE IT CAUSE YOU WANT IT.
YOU HAVE AN ENTIRE GENERATION THAT GREW UP WITH LOWER SELF ESTEEM THEN PREVIOUS GENERATIONS. and they grew
up
with no resrictions on cell phones and social media which because interactions they are addicted because of
the dopamine release - same as smoking, drinking, drugging, etc. as they go through teenage years where they
need the approval of their peers for the dopamine rush. Dopamine is a neurotransmitter that helps control
the
brain's reward and pleasure centers. Dopamine also helps regulate movement and emotional responses.
“Facebook Is Dead To Us”: What Teens Think About
11 Of The Biggest Social Networks
Facebook: “It's dead to us. Facebook is something we all got in middle school because it was cool but
now
is seen as an awkward family dinner party we can't really leave.” But, he mentions, everyone is on it and
it's
“weird and annoying” if you're not. The social order of how modern day collegiate friendships are made
begins
with a friending on Facebook. Instagram is by far the most used social media outlet for my age group.
“Snapchat is quickly becoming the most used social media network.” He explains, the difference between
Snapchat and Instagram is in the etiquette. On Snapchat people will post photos and videos of their night as
it happens. The good, the bad and the fugly. On Instagram they post “the cutest one of the bunch.” He likes
that there are no comments and that posts disappear forever. There's “a lot less social pressure attached to
it” and what makes it so “addicting and liberating. It's the real you.” Because there's no searching past
photos/videos (and everything gets deleted after a view), kids can post drinking, smoking, or whatever
risqué
shit they get into without fear of a future employer finding it. "Tumblr is like a secret society that
everyone is in, but no one talks about." YikYak everyone is on it before class, during class, and after
class to find out what is going on around campus.
keep up with what is going on in the following areas:
GAMERS
Videogame parental controls guide to PlayStation 3, Nintendo Wii, Xbox 360, and the PlayStation Portable. The Nintendo and Microsoft controls are based on the Entertainment Software Rating Board's ratings Guide (e.g., "E," "T," and "M" for "Everyone," "Teen," and "Mature"). Sony's controls are not ESRB-based so you'll need to experiment to find the right restriction level. Also tells how to set controls on the Web browsers in the PS3, PSP, and Wii consoles. Xbox parental controls for its online service, Xbox Live.
MOBILE PHONES
Guide to Cell Phone Carrier Parental Controls
Fear on the Phone: When Children Get Threatening Texts: within the next year
or two nearly all mobile phones will have internet access. Parents should be aware of this and no longer
assume that internet safety applies only to the home computer.
Social-networking will drive the next-generation Cellphone market.
Verizon Wireless requires a data plan on most phones now - no parental control
available
We promised my daughter a new cell phone for her birthday. She picked the Envy 2. When we purchased the same
phone for her older brother, it came with a $10/mo data plan. But, we were able to cancel it immediately.
Turns out, as of Nov 19th 2009, the vast majority of Verizon phones MUST have a minimum of a $10/mo data
plan.
You cannot cancel.
The basic plan provides only 25MB. Additional MB's are $1.99. I asked the salesman (and later the 800
number) how I could control her data usage so as not to exceed the 25MB/mo and incur large charges
unexpectedly. I was told my only option was to buy her an unlimited plan for $30/mo. None of the
data
plans allow any parental control on how my daughter utilizes the Internet. Turns out the only
control option available costs $5/mo. This option will only allow me to set the time of day that she can use
the phone. In other words, I can turn off texting, calls (except emergency and a trusted list), and data.
But,
I can't control individual services nor do I have any parental control over the use of the
Internet.
Given that Verizon has now made data plans mandatory for the majority of their phones, more and more
children
are going to have unfettered Internet access in their hands (unsupervised). While I trust my children, I
still
worry they will unknowingly run up the data costs or find the more colorful corners of the Internet.
AT&T has a set of parental controls called Smart Limits for Wireless that does allow you to set
caps on the amount of data a device can consume, and they allow you to impose parental controls. However,
neither of these features seems to work with the iPhone! I suspect, but havent tested, that they would fail
equally on Windows Mobile or Android devices. WM and iPhone devices both allow you to disable the browser,
but
apart from that your parental filtering/control options are pretty limited.
BLOGS
- WHAT ARE KIDS DOING WITH BLOGS?
Websites like the ones below are where children can sign up for their own free blog and say anything and everything and adults can very easily prey on them - blog with them - nothing is supervised. - How to Handle the Cyberbully
- Blogs Used to Bully Kids
ALERT see real world Blog Discussion that took place on a social networking site below.
A public forum is far too free a medium for those who are not fully aware of the consequences of their actions. Kids really don't understand that ANYBODY could be reading their blogs.
Examples of:
Alaska Govenor Paylin's daughter Bristal Paylin, and boyfriend Levi Johnson myspace pages.
2008 Video of Govenor Paylin's husband in bed filmed by Bristol when she was much younger that WAS placed on Youtube now taken down.
A LONG TIME AGO
"Way long ago when only university professors were on the internet, and in the late 80's
and
early 90's (when I first got on the net) before it became
commercial, the internet was a perfectly safe neighborhood. Now with everyone in the world online
Kids do not understand that the net isn't as safe as the bedroom they live in, and they
don't realize that just because the child didn't tell all your / their private information to anyone
all at one time, that someone can't compile it and figure out everything, putting your
privacy at risk. KIDS DON'T GET IT.
You must educate these kids about the dangers; even the "savvy' types really have no idea
what information they are giving out. You should scare them with the consequences. Teach them that
the real world they live in known as the meat space intersects cyber space and they have given away their
own privacy which they should guard in this world. Blow their little minds - LOOK at what they put out
there then they will understand what they think of as their "private" stuff - isn't
private.
Someone wrote about an example on xanga.com http://www.xanga.com/metros:
[ . . . "I was looking at one in NC (where I used to live) and I was able to find the blog of a 13 year
old girl. I saw a picture of her, got her first and last name, the school she attends, her e-mail her AIM
and
from the blogs a basic description of what she does everyday. I know that she had a track meet at the local
high school last Saturday. Thankfully I am not a predator and I am not planning to find this girl. But
what
if I was? From her last name I could easily look in the yellow pages for her address and phone number - how
hard is that. I know where she's going to be, I even have a picture. "]
Go and check on USA, then your state, then type in the name of a school. http://www.xanga.com/metros/ or click on the
"blogrings" choice above the search box type in the name of my child's school (only the word
*schoolnamehere*).
To Remove the Information:
1. You must have the password
2. Navigation Menu choose something to take down the site, and delete each post and pictures."
CHAT ROOMS
The FBI has a unit that deals with missing and exploited children. Contact the nearest FBI
office, they might send an Agent to Speaker to your students on the topic of internet safety. They also ask
eighth graders to come in and teach teen slang, etc. to the agents who worked teen chat
rooms.
A "real-time" discussion in which a user converses with one or more
persons, with messages posted on a designated page for all to see. The conversation scrolls upward on the
screen only while the conversation is taking place. Access can be completely open to the public (with a
perfunctory on-line registration process) or via invitation only.
INSTANT MESSAGING
A chat-like technology provided by an on-line service permitting private, simultaneous text conversations between two users. Originally developed by AOL, the service is free to the general public; Yahoo and other competitors have produced similar software.
INTERNET RELAY CHAT (IRC)
Real-time text conversations similar to that found in chat rooms. Free, but requires knowledge of the recipient's IRC address. Hacker activity is happening here and historically located here.
NEWSGROUPS (Usenet)
A system of more than 29,000 public (and an unknown number of private) special interest discussion groups to which users can post messages or attach files (text, graphics, sound). A user has to be invited into a private newsgroup (and given the specific address) in order to participate.
NEED TO KNOW PRIVACY PROTECTION
COPPA is about privacy protection for kids
COPPA, the Children's Online Privacy Protection Act. The act specifically limits children's
entering
certain kinds of data (name, address, etc.) such as that required for registration for a site or to receive
information. Each web site operator is required to obtain
verifiable parental consent before using the web site to collect information from any kid under age 13.
There
are privacy implications for those schools who are considering using free computers/portals that are
supported
by advertising because they would then be marketing direct to kids (and their families)...
They have already discovered that even if a service requires them to be over 13 to register in order to
comply
with the Act (as the "freebies" like GO and hotmail are currently doing) all they have to do is
enter a different birth year. There is no enforcement or verification process that can *prove* their actual
age.
http://www.ftc.gov/bcp/conline/pubs/buspubs/coppa.htm
- According to a new study from the Annenberg Public Policy Center at the University of Pennsylvania,
almost
two thirds of the young people surveyed said they would share the names of their favourite stores if they
were given a free gift. Over half said they would give out the names of their parents' favourite
stores.
More than a third would tell what type of cars the family owns, what they do at the weekend, how much their allowance amounts to each week and whether or not their parents discuss politics.
Teenagers (13-17 year olds) are more likely to give out information than 10-12 year olds are and boys are more likely to than girls are.
About 3 in 4 parents worry about their children giving out personal information online. 96 percent of parents and 79 percent of 10-17 year olds agreed that teenagers should get parental permission before sharing information on the Internet. - How to Comply With The Children's Online Privacy Protection Rule 1999
- 22 Jul 2008 COPA Decision Third Circuit
Court of Appeals Strikes Down the Children's Online Protection Act : Here is something interesting
-
district court findings of fact
The Commission on Online Child Protection. Congress created a commission also called COPA.
COPA was about preventing indecent content on the Net.
The court issued a unanimous opinion in ACLU v. Mukasey affirming the District Court and holding that the Child Online Protection Act is unconstitutional. The court held that COPA is vague and overbroad, and that it does not constitute the least restrictive means of protecting children. In reaching these conclusions, the court also confirmed that COPA does not apply to websites outside the U.S. COPA is the successor statute to the Communications Decency Act, which attempted to extend indecency rules to the Internet.
- The American Library Association Office for Information Technology Policy has created a web site to explain the federal Children's On-line Privacy Protection Act in detail.
- Key People -
- Issues: Privacy Rights for Children
- Privacy Rights for Adults
student Email
There should be no establishment of student accounts on systems unless there is a clear educational purpose, no advertising is directed at students, and parents have been fully informed and have approved such accounts.
- There should be no collection, analysis, or sale of individual or aggregated student use data for market research purposes.
- How many school districts have policies related to teacher responsibilities when establishing accounts for students on 3rd party sites?
- The Michigan Children's Protection Registry is a secure database of protected e-mail addresses. It allows Michigan's parents and schools to register e-mail addresses that children may access.
- Try epals.com It is
web-based so students can access it from anywhere.
- Suggest setting it up with fictitious last names to help appease nervous parents about their kids getting on the net.
- You can set it for various levels of filtering.
- You can preview all documents before they are received or sent.
- There are no annoying ads attached.
- Each account has a draft folder. You can use this as a web based storage area for each student. If they have a report they are working on in school, they can "compose" a letter to themself, attach their report and then save it as a draft. It doesn't have to go through an adult and then they can access it at home.
FILTERING SOFTWARE: PRIVACY / FILTERS
- Art Wolinsky talks about K12 Filtering Software for schools
- Issues about SECURITY
- Sites
Blocked by Internet Filtering Programs
Edelman Expert Report for Multnomah County Public Library et al., vs. United States of America, et al. Alist of some 6000+ web sites that, by and large, fail to meet the category definitions of popular Internet filtering programs yet are blocked by at least one such program. - Filters don't work - learn how to go around this
The National Academies' report entitled "Youth, P----ography and the Internet" was released on May 2, 2002. The report examines approaches to protecting children and teens from Internet pornography, threats from sexual predators operating on-line, and other inappropriate material on the Internet. It discusses social and educational strategies, technological tools, and policy options for how to teach children to make safe and appropriate decisions about what they see and experience on the Internet. Chaired by former Attorney General Dick Thornburgh, it's the most comprehensive study yet on the topic.
Online Sex Crimes against Juveniles: Myth and Reality Hearing before the U.S. Senate July 24,
2007
Committee on Commerce, Science, and Transportation
Washington, DC Testimony of Dr. David Finkelhor david.finkelhor@unh.edu
Director Crimes against Children Research
Center
University of New Hampshire
Durham, New Hampshire 603 862-2761
TEEN HACKERS
ETHICS
The difference between a hacker and a cracker is malicious, destructive intent.
Espionage / Counterespionage at home *in
context*
Countersurveillance being done by kids like changing the text and background on a monitor to blue and black
"making it harder to read the screen from across the room"; setting IM preferences to
"invisible" so parents can't tell they're online; turning GPS-enabled phones off; making
MySpace profiles (and searchable personal info) partially fictitious [1]; learning to check blogs and to IM them to come down to dinner. One mother thinks
"communicating over a screen has helped her and her son step out of their customary roles" and see
each other as people.
EthicalHacker.com http://www.ethicalhacker.net/content/view/182/1/ explains that there is free downloadable software on the Net that allows malicious hackers to steal users' passwords. Kids are just not educated enough on good security practices, or show a lack of common sense with this stuff.Parents, make sure your kids practice good computer security - choose hard-to-guess passwords, don't share them with friends, change them fairly often, and choose different ones for different sites and services.
How to Devise Passwords
It is absurdly easy to get hacked. Hackers regularly exploit tools like John the Ripper, a free
password-cracking program that use lists of commonly used passwords from breached sites and can test
millions
of passwords per second. Mr. Paul Grossman at WhiteHat Security, runs Cryptography Research, a security firm
that specializes in keeping systems hacker-resistant.
- FORGET THE DICTIONARY If your password can be found in a dictionary, you might as well not have one.
- NEVER USE THE SAME PASSWORD TWICE
- COME UP WITH A PASSPHRASE The longer your password, the longer it will take to crack. A password should ideally be 14 characters or more in length if you want to make it uncrackable by an attacker in less than 24 hours. Because longer passwords tend to be harder to remember, consider a passphrase, such as a favorite movie quote, song lyric, or poem, and string together only the first one or two letters of each word in the sentence.
- JUST JAM ON YOUR KEYBOARD For sensitive accounts, Mr. Grossman says that instead of a passphrase, he will randomly jam on his keyboard, intermittently hitting the Shift and Alt keys, and copy the result into a text file which he stores on an encrypted, password-protected USB drive. “That way, if someone puts a gun to my head and demands to know my password, I can honestly say I don't know it.”
- STORE YOUR PASSWORDS SECURELY Do not store your passwords in your in-box or on your desktop. Mr. Grossman stores his password file on an encrypted USB drive for which he has a long, complex password that he has memorized. He copies and pastes those passwords into accounts so that, in the event an attacker installs keystroke logging software on his computer, they cannot record the keystrokes to his password. Mr. Kocher takes a more old-fashioned approach: He keeps password hints, not the actual passwords, on a scrap of paper in his wallet. “I try to keep my most sensitive information off the Internet completely,” Mr. Kocher said.
- A PASSWORD MANAGER? MAYBE Password-protection software lets you store all your usernames and passwords in one place. Some programs will even create strong passwords for you and automatically log you in to sites as long as you provide one master password. LastPass, SplashData and AgileBits offer password management software for Windows, Macs and mobile devices. But consider yourself warned: Mr. Kocher said he did not use the software because even with encryption, it still lived on the computer itself. “If someone steals my computer, I've lost my passwords.”
- IGNORE SECURITY QUESTIONS There is a limited set of answers to questions like “What is your favorite color?” A better approach would be to enter a password hint that has nothing to do with the question itself. For example, if the security question asks for the name of the hospital in which you were born, your answer might be: “Your favorite song lyric.”
- USE DIFFERENT BROWSERS Mr. Grossman makes a point of using different Web browsers for different activities. “Pick one browser for 'promiscuous' browsing: online forums, news sites, blogs — anything you don't consider important,” he said. “When you're online banking or checking e-mail, fire up a secondary Web browser, then shut it down.” That way, if your browser catches an infection when you accidentally stumble on an X-rated site, your bank account is not necessarily compromised. Chrome was the least susceptible to attacks.
- SHARE CAUTIOUSLY “You are your e-mail address and your password,” Mr. Kocher emphasized. Whenever possible, he will not register for online accounts using his real e-mail address. Instead he will use “throwaway” e-mail addresses, like those offered by 10minutemail.com. Users register and confirm an online account, which self-destructs 10 minutes later. Mr. Grossman said he often warned people to treat anything they typed or shared online as public record.
- “At some point, you will get hacked — it's only a matter of time,” warned Mr. Grossman. “If that's unacceptable to you, don't put it online.” ~ NYT
Bot Net - Hackers are taking advantage of programs that secretly install themselves on thousands or even millions of personal computers, band these computers together into an unwitting army of zombies, and use the collective power of the dragooned network to commit Internet crimes. All of which is possible only because insecure systems are made available to unwitting users. The only way to fix this problem is for vendors to fix their software, and they won't do it until it's in their financial best interests to do so." i.e., there needs to be financial liability involved, like in the credit card business.
Like a typical teen-ager, Cole Bartiromo played baseball and listened to rap music. He was also a whiz when
it came to the Internet, but that got him in trouble with the U.S. Securities and Exchange Commission.
Law enforcement officials say the Orange County high school student is like a growing number of his peers
--
teens who use the Internet to pull off everything from securities fraud to identity theft. ``We have seen
a
rise in the crimes, with an increasing degree of sophistication by a younger demographic,'' said
FBI
agent Frank Harrill of the Los Angeles cybercrime squad. Last month, the Securities and Exchange
Commission
filed a civil complaint against Bartiromo, 17, alleging he raised more than $1 million by selling what he
described as ``risk-free'' investments in which he pooled investors' funds to bet on sporting
events. The boys, ages 14 to 16, obtained the credit card numbers by allegedly tricking people into
transmitting their account information over the Internet. In 2000, 16-year-old Jonathan Lebed of Cedar
Grove, N.J., faced only civil action for manipulating stocks in what federal authorities called a ``pump
and
dump'' scheme. ``The federal government is just not set up to deal with'' prosecuting
children, said Howard Friedman, who heads the Cybersecurity Law Institute at the University of Toledo in
Ohio. In addition to repaying the money, Bartiromo also was expected to file an accounting of his actions,
outlining how he set up the investment program and how much money came in, SEC officials
said.
2/14/02 http://www.nytimes.com/aponline/Technology/AP-Cyberscam-Teens.html
Lebed's case is well known; what is less well known: the SEC allowed him to keep $500,000 of his
ill-gotten profits.
A Massachusetts 17 year old teenager pleaded guilty to
cracking
The youngest member of the same cracking ring known as the
"DefonicTeam Screen Name Club" or "DFNCTSC" group federal investigators say was
responsible for a series of electronic break-ins at data giant LexisNexis.
The 17-year-old boy sentenced to 11 months' detention at a juvenile facility and as an adult, will
undergo two years of supervised release in which he will be barred from possessing or using any
computer,
cell phone or other electronic equipment capable of accessing the Internet.
The teen also pleaded guilty to making bomb threats at two high schools and for breaking into a
telephone
company's computer system to set up free wireless-phone accounts for friends.
Teen participated in an attack on data-collection firm LexisNexis Group that exposed personal records of
more than 300,000 consumers. Prosecutors said victims of the teen's actions have suffered about $1
million in damages.
Teen sent an expletive-laced e-mail to a high school in Florida threatening to blow it up. The school
was
closed for two days while a bomb squad, a canine team, the fire department and and other emergency
officials examined the building.
Teen cracked into the internal computer systems of "a major internet service provider" by
tricking an employee into opening a virus-infected
file he sent as an e-mail
attachment. The virus -- known as a "Trojan
horse" program -- allowed the juvenile to use the employee's computer remotely to access other
computers on the ISP's internal
network and gain access to portions of the company's operational
information.
Teen cracked into the network of Dulles, Va.-based America Online.
Teen cracked into the telephone records system of T-Mobile International using a security flaw in the
company's Web site that allowed him to reset the password of anyone using a Sidekick.
Teen had a friend "set up accounts at LexisNexis, a company which stores identity information
concerning millions of individuals which reported in March that crackers had gained access to the
personal
records of more than 310,000 Americans.
Teen sent hundreds of e-mails with an explicit image and message to open an attached file to view
additional pornographic images of children. A police officer in Florida was among those who opened the
e-mail attachment, which harbored a virus-like program that allowed the crackers to record anything a
victim typed on his or her computer keyboard the computer was now infected with the keystroke-capturing
program.
Teen created a series of sub-accounts using the police department's name and billing information.
Over
the period of several days, the group looked up thousands of names in the database.
Teen called "a major telephone service provider threatened to cripple its Web site with a
"distributed denial of service" attack, "initiated a denial of service attack that
succeeded in shutting down a significant portion of the telephone service provider's web
operations.