<<

Smartphone/ Safety www.safekidsamerica.org

Chad Williams Safe Kids America

Thompson Middle Presentation

Email [email protected] for presentation notes What They Say… What they say… What they say…

Learning Exercise Coffee Shop Scenario

Typical unsecured connection. This is what you think that you are logging into…

Man In The Middle Attack

The Man-In-The-Middle grabs and/or modifies that is sent/received. http://www.interlinknetworks.com/whitepapers/Link_Layer_Security.htm Coffee-Shop-Data-Collectors • Most public wireless connections are NOT secure • It’s easy to capture your data • Don’t log into that reveal your sensitive credentials (, bank account, etc.) • Use onboard software • Lock your screen before leaving your seat • Don’t store sensitive information on your • Use an encrypted VPN (Virtual ) VPN –

Protect your traffic by encrypting it. • http://myvpnreviews.com/ • http://en.wikipedia.org/wiki/Virtual_private_network • http://www.interlinknetworks.com/whitepapers/Link_Layer_Security.htm Ten Ways Your Knows Where You Are

1. GPS (45 seconds) 2. Assisted GPS (Speeds up the GPS locator process by using WiFi connections to transmit GPS data…15 seconds) 3. Synthetic GPS (Forecasts satellite positions…2 seconds) 4. Cell ID (Carriers figure out which cell a customer is using, and how far they are from the neighboring cells) 5. WiFi (see next slide) WiFi #1

RSSI (received signal strength indication), takes the signals your phone detects from nearby access points and refers to a of Wi-Fi networks. The database says where each uniquely identified access point is located. Using signal strength to determine distance, RSSI determines where you are (down to tens of meters) in relation to those known access points. WiFi #2

The other form of Wi-Fi location, wireless fingerprinting, uses profiles of given places that are based on the pattern of Wi-Fi signals found there. This technique is best for places that you or other cellphone users visit frequently. The fingerprint may be created and stored the first time you go there. 6. Inertial Sensors (Most now come with three inertial sensors: a compass (or magnetometer) to determine direction, an accelerometer to report how fast your phone is moving in what direction, and a gyroscope to sense turning motions. Together, these sensors can determine your location with other outside inputs)

7. Barometer…Some smartphones already have chips that can detect barometric pressure and are best used in combination with other tools, including GPS, Wi-Fi and short-range systems that register that you've gone past a particular spot. 8. Near Field (shopper loyalty company Shopkick is already using a short-range system to verify that have walked into a store. Instead of using a , Shopkick broadcasts ultrasonic tones just inside the doors of a shop. If the customer has the Shopkick app running when they walk through the door, the phone will pick up the tone through its microphone and the app will tell Shopkick that they've entered). 9. (Very precise location can be achieved in a specific area, such as inside a store, using beacons that send out signals via Bluetooth. The beacons, smaller than a cellphone, are placed every few meters and can communicate with any equipped with Bluetooth. The system can determine location to within 10 centimeters. With location sensing that specific, a store could tell when you were close to a specific product on a shelf and offer a . 10. Terrestrial …uses the same principle as GPS but are mounted on buildings and cell towers. Because they are stationary and provide a much stronger signal to receivers than satellites do from space, Locata's can pinpoint a user's location almost instantly to as close as 2 inches. Another company in this field, NextNav, is building a network using licensed spectrum that it says can cover 93 percent of the U.S. population.

SOCIAL NETWORKING SIMPLIFIED

1. I need to pee. 2. I peed! 3.Foursquare I’m peeing here. 4. Why am I peeing? 5.Youtube Watch this pee! 6.LinkedIn I’m good at peeing. New Social Networking Apps Name That App WhatsApp WhatsApp is a mobile app designed to let cell phone users send text messages without having to pay SMS fees to their carriers. The messages are sent via the Internet and therefor require the user to have a data plan on their phone, which is typical of these messaging apps. Messages can include video, audio and photos, not just text. Name That App SnapChat Snapchat differs from most mobile communication apps in that it specializes in sending messages with a particular feature--they disappear. (However, there are ways around this…see next slide for details). The once thought short-lived nature of Snapchat messages has made the app controversial yet popular with young people. The company is valued at $800m and users send 350m messages per day, up from 200m in June. Name That App Text Plus and TextFree The textPlus app TextFree apps offer unlimited texting on your iPod touch or phone by setting up your own “phone number” that you can give to your friends and family. Name That App Vine (Twitter for Videos) A that enables its users to create and post video clips. Video clips created with Vine have a maximum length of 6 seconds and can be shared or embedded on social networking services such as Twitter—which acquired the app in October 2012—and Facebook. Name That App GIFYO.com The most popular GIF sharing application on the internet. Allows for animated GIFs. When you get home, search for gifyo girls and go to the images…THAT is why knowing these apps ASAP is critical for parents. Name That App POOF Poof is an app that allows you to hide and unhide icons on your SpringBoard (your iPhone interface). The apps are still there, but cannot be seen unless you know how to access them. Poof requires the phone to be “JailBroken”, so if this may be a red flag app if you find it on your child’s phone. Name That App Tango Tango is a free app that, in addition to video calls, is also optimized for voice calls, texting, photo sharing, and playing . Name That App Talkatone Another mobile app offering free voice calling and text messaging over WiFi or //LTE data plans. The Talkatone says the Talkatone app allows people to "call and text any US or Canadian phone over WiFi or Data (3G/4G), without requiring cell minutes." What is ?

Internet safety or online safety is the security of people and their information when using the Internet. Internet safety means protecting your personal information while online. Details such as your address, full name, number, birth date and/or social security number can potentially be used by on-line criminals.

Adapted from: - : http://en.wikipedia.org/wiki/Internet_safety - eHow: http://www.ehow.com/about_6577504_definition-internet-safety. Personal Protection From…

• Internet Predators • Coffee-Shop-Data-Collectors • “Script-Kiddies” (what you might think of as “”) • Viruses / Trojans / Ad-Ware • Those who take advantage of children & teens – Use “Social ” to manipulate victim – Sexual Intentions – Murderous Intentions – Other Malicious Intent • Phishing Attempts (Masquerading as a trustworthy entity while attempting to acquire sensitive information) • Scam Artists – Email scams are meant to take your money – Scams on Craigslist that are using you to commit fraudulent activities

What would you share with your neighbors? At what age should my child start using ?

• According to Reports an estimated 7.5 million pre-teens –including 5 million under the age of 10 are on a social network site like Facebook Up to age 10 • It's never too early to foster open and positive communication with children. It's a good idea to talk with them about and to stay open to their questions and curiosity. • Always sit with your kids at this age when they're online. • Set clear rules for Internet use. • Insist that your children not share personal information such as their real name, address, phone number, or passwords with people they meet online.

• Source: http://www.microsoft.com/security/family-safety/childsafety-age.aspx Up to age 10

• Use family safety tools to create appropriate profiles for each family member and to help filter the Internet. • For more information, see Windows Live Family Safety, Windows 7 , or Windows Vista Parental Controls. • Help protect your children from offensive pop-up windows by using the pop-up blocker that's built in to . • All family members should act as role models for young children who are just starting to use the Internet. Source: http://www.microsoft.com/security/family-safety/childsafety-age.aspx

Ages 11 to 14 • It's a good idea to foster open and positive communication with your children. Talk with them about computers and stay open to their questions and curiosity. (i.e. chat rooms & online predators) • Set clear rules for Internet use. • Insist that your children not share personal information (i.e. real name, address, phone number, or passwords) with people they meet online. • Help your kids create online nicknames that give away no personal information. Source: http://www.microsoft.com/security/family-safety/childsafety-age.aspx

Ages 11 to 14

• Use family safety tools to help filter the Internet. • Keep Internet-connected computers in an open area where you can easily supervise your kids' activities. • Help protect your children from offensive pop-up windows by using the pop-up blocker that's built in to Internet Explorer. • Encourage your children to tell you if something or someone online makes them feel uncomfortable or threatened. Source: http://www.microsoft.com/security/family-safety/childsafety-age.aspx

Ages 15 to 18

• Create a list of Internet rules as a family. Establish guidelines for communicating with others online, including social networking. • Know which websites your teens visit, and whom they talk to. Insist they stay in public area. • Insist that they never agree to meet an online friend.

Source: http://www.microsoft.com/security/family-safety/childsafety-age.aspx Ages 15 to 18 • Talk to your teenagers about online adult content and , and direct them to positive sites about health and sexuality. (i.e. Sexting) • Make sure your kids are not visiting sites with offensive content, or posting personal information. Be aware of the photos that teens post of themselves and their friends. • Teach your kids responsible, ethical, online behavior. They should not be using the Internet to spread gossip, bully, or threaten others. (i.e. Cyber Bullying )

Source: http://www.microsoft.com/security/family-safety/childsafety-age.aspx Source: www.safetyweb.com

Source: www.cooggno.com

Jailbreaking an Iphone

Jail breaking an Iphone Jailbreaking an Iphone Pop-Quiz Pop-Quiz Pop-Quiz Pop-Quiz Name That App Spring.Me Spring.me (formerly known by Formspring and its full URL formspring.me) is an interest-based social Q&A website, launched in November 2009, and created to allow users to relate their ideas and opinions on any topic. Users can ask questions anonymously or they can be visibly sent from another Formspring account, depending upon the asker's preference. Name That App Ask.fm It's meant to be a place where kids can ask tough questions and share their secrets, often anonymously. Started in 2010, it claims 65 million users and has been linked to a number of cyberbullying cases that resulted in suicide. The site was launched on June 16, 2010 as a competitor to Formspring (now Spring.me).

Name That App Kik Kik uses a smartphone's data plan or WiFi to transmit and receive messages, a feature that appeals to individuals looking to avoid text messaging rates set by phone service providers (and parents). Kik offers fast text messaging service and also allows users to share photos, sketches, voice messages, and other content. Kik Messenger uses a username instead of a phone number, allowing for more than other forms of text messaging. Cyberbullying Possible warning signs of children being bullied or bullying other children • Complaining that other children or a group of children do not like them. • Preoccupation with friendship concerns. • Poor self-esteem. Feeling they are not as good as others. • Not wanting to go to school or other activities. • Spending a great deal of time on the computer. • Being secretive about online activities. • Source: Internet Safety PowerPoint - A Parent's Guide to the Internet: http://criminaljustice.state.ny.us/missing/i_safety/mediafiles/isafety_parents6.ppt Cyberbullying Dealing with Cyberbullying • Preserve evidence – this is crucial for identifying the bully and making a case. • Attempt to enlist assistance from the service provider. • If able to identify the bully, contact him or her and/or parents. • Use available blocking (i.e., the user on IM, email and chat.) • In serious cases, seek assistance from the police (i.e., threats of physical harm, unrelenting or unable to stop.) • Source: Internet Safety PowerPoint - A Parent's Guide to the Internet: http://criminaljustice.state.ny.us/missing/i_safety/mediafiles/isafety_parents6.ppt Smartphone Safety…Final Lesson Youth Online Safety

• It is clear, then, that the definition of “youth online safety” has broadened and become more complex in the past 10 years, as have the role of the online user and the inter-connected devices today’s user takes advantage of when consuming, socializing, producing, and connecting. In addition to cyberbullying, inappropriate content, and predation, other risks have emerged, including “sexting” and the risks related to geolocation technology in online applications and on mobile phones.

• Source: OSTWG Article, "Youth Safety on a Living Internet“ Online Safety and Technology Working Group (OSTWG) Desired Outcomes • Physical Safety – freedom from physical harm • Psychological Safety – freedom from cruelty, , and exposure to potentially disturbing material • Reputational and Legal Safety – freedom from unwanted social, academic, professional, and legal consequences that could affect users for a lifetime • Identity, Property, and Community Safety – freedom from theft of identity & property Statistics • 75% of children and teens report sharing personal information about them and their families to complete strangers in chat rooms1 • 93% of American teens (ages 12-to-17) use the • 73% of American teens use social network sites2 • 75% of American teens own cell phones2 • 4% of American teens have sent sexually suggestive images or videos of themselves via cell phone, and 15% have received such images from someone they know2 • 43% of teens have been victims of cyberbullying3 Sources are referenced in Resources slide near the end of this presentation Avenues for Online Communication

• Avenues for online child communication: , chat rooms, irc, IM, Facebook, Facebook chat, MySpace, , email, , Twitter, Identica, Craigslist, forums, text messages, etc…. Protection Methods for Youth (& you!)

• Educate your child about the dangers that exist on the Internet • Studies show that: – Fear-based scare-tactics are not effective – Use the "norms" approach - suggest that [insert behavior here] is not a “norm” among youth's peers and that people who engage in such activity are abnormal and may need help

Protection Methods for Youth (& you!) • Educate you child about safe Internet practices • Use strong passwords (including numbers, special characters, and combination of upper/lower case) • Never give password to anyone • Don't communicate online with people you don't know • Enable & elevate privacy settings in Facebook • Disable Facebook Chat • Do not allow Skype calls from anyone who is not on your contact list • Teach kids about responsible communication Protection Methods for Youth (& you!) • Do not share specific information about yourself, such as family info, where you live, photos of yourself or your home, etc. • Use an alias for Web , not your real name / also use that is different from your actual photo • Don't say anything online to someone that you would not be willing to say directly to their face in person • Don't open email attachments unless you know for certain what it is • Be aware that actions have consequences - ex: nude photos, bad language, inappropriate conduct, etc. - could have legal impacts, embarrassment, or affect future job opportunities • Inform you (the parent or another authority figure) if the child has experienced anything online that makes him/her feel creepy or uncomfortable Protection Methods for Youth (& you!) • Use Internet Content Filters – Software that filters out unwanted websites, such as pornography – IP Addresses can be filtered using your or your • Place computer in living room or other "common" area within your home • Regulate length of time child spends on Internet as well as determine a window of time for usage • Request list of email and social networking sites being used and username/password for each account • Perform random checks on your teenager's cell phone to view text messages sent/received Passwords

• Strong Passwords: – Phrases, mixed case, special characters, and long: - 5db10mw! (Slow Down Buddy I’m On My Way!) - w@yD0wny0nd3r#% (Way Down Yonder #%)

Content Filtering • Commercial Software for Content Filtering: – Cyber Patrol: http://www.cyberpatrol.com – CyberSitter: http://www.cybersitter.com – InternetSafety: http://www.internetsafety.com/safe-eyes-parental-control-software. – ContentWatch: http://www.contentwatch.com – NetNanny: http://www.netnanny.com (powered by ContentWatch - also works on mobile devices) – Panda : http://www.pandasecurity.com/security-promotion/usa/panda-internet-security – PC TattleTale Parental Control: http://www.pctattletale.com – Aobo Porn Filter - Website Blocker: http://aobo.cc/aobo-porn-filter.html – Sentry Parental Controls: http://www.sentryparentalcontrols.com • Free Software for Content Filtering – OpenDNS - FamilyShield: http://www.opendns.com/familyshield – Parental Filter: http://www.softpedia.com/get/Security/Lockdown/Parental-Filter.shtml – K9 Web Protection: http://www1.k9webprotection.com – ProCon Latte: http://procon.mozdev.org (read interesting related article) • Content Filtering for – KidZui - a safe browser and online playground for kids 3-12 – FoxFilter Add-on for Firefox – Interesting article on using manual proxy configurations • Filtering Content with IE's Content Advisor Cyberbullying What is it?

• Cyber Bullying occurs when people send or post mean or threatening text or pictures on the Internet. Examples: • A kid could post stories about another kid online. They could show the website to all of their friends. When the victim goes back to school, he/she gets teased about something they don’t know about. • If a friend had your password, and you got into a fight, they could send mean to everyone in your address . When your friends or family open the email, they would think that it came from you! They could feel very hurt and upset.

Source: http://library.thinkquest.org/06aug/01158/home.html Cyberbullying Dealing with Cyberbullying Some worth looking at: • http://wiki.ucalgary.ca/page/Cyberbullying • http://www.stopcyberbullying.org • http://www.wiredsafety.org/ • http://www.wiredsafety.org/fbprivacy/index.htm “Sexting” • A recent study by the Pew Internet & American Life Project “found that 4% of cell- owning teens ages 12-17 say they have sent sexually suggestive nude or nearly nude images or videos of themselves to someone else via text messaging.” Fifteen percent of young respondents “say they have received such images of someone they know via text message.” • Source: OSTWG Article, "Youth Safety on a Living Internet" “Sexting” - Consequences

• Photos sent to boy/girlfriend could potentially be distributed over school, especially after a breakup • One could suffer legal consequences after distributing nude photos of an underage minor – criminal charges – listed as registered sex offender • Criminal charges could result in... – permanent expulsion from school – loss of job opportunities (due to lack of and/or sex- offender job regulations & limitations) – can't reside near school areas Example: http://www.themonitor.com/articles/palmview-38189-school-charge.html Viruses / Trojans / Ad-Ware • Internet Explorer uses Active-X controls for easy software installation – not safe • Use Web Browser Alternatives: Firefox, , • Use Virus Software: Symantec, McAffee, ClamWin, etc • Regular Windows Updates (weekly) • Don’t open email attachments unless you know for certain what they are References from Slide #75

1. The Safe Surfin' Foundation 2. OSTWG Article, "Youth Safety on a Living Internet" 3. Internet Safety PowerPoint - A Parent's Guide to the Internet: http://criminaljustice.state.ny.us/missing/i_safety/mediafiles/isafety_par ents6.ppt Resources, Articles, Videos, & More Information About Internet Safety

• Internet Safety – Keeping it Real: http://library.thinkquest.org/06aug/01158/home.html • Dateline NBC Online Safety Kit: http://www.msnbc.msn.com/id/15162866/ • The Online Safety and Technology Working Group (OSTWG): http://www.ntia.doc.gov/advisory/onlinesafety • OSTWG Article, "Youth Safety on a Living Internet: http://www.ntia.doc.gov/reports/2010/OSTWG_Final_Report_060410.pdf • Some guidelines for protection: http://www.ehow.com/how_4542712_protect-children-online-sexual-predators.html • Division of Criminal Justice Services - Internet Safety Presentations & Resources: http://criminaljustice.state.ny.us/missing/i_safety/videos_presentations.htm • Internet Safety PowerPoint - A Parent's Guide to the Internet: http://criminaljustice.state.ny.us/missing/i_safety/mediafiles/isafety_parents6.ppt • The Safe Surfin' Foundation: http://www.safesurfincentral.org • eHow.com - How to Protect Children From Online Sexual Predators: http://www.ehow.com/how_4542712_protect-children-online- sexual-predators.html • Teaching Teenagers About The Danger of Internet Predators: http://parenting.families.com/blog/teaching-children-about-the-danger- of-internet-predators • Video: Tracking Teresa: http://www.netsmartz.org/stories/teresa.htm • Video: CBS - Finding Internet Predators - The Alicia Kozakiewicz Story: http://www.cbsnews.com/video/watch/?id=3379194n • Dateline NBC - To Catch A Predator: http://www.msnbc.msn.com/id/10912603 • Net Smartz: http://www.netsmartz.org/index.aspx • Net Smartz Teens: http://www.NSTeens.org • Kideos: http://www.kideos.com • Online Safety and Technology Working Group: http://www.ntia.doc.gov/advisory/onlinesafety • Additional resources: http://www.ncjrs.gov/internetsafety/children.html Stay Informed!

Are you feeling a little overwhelmed by the new and ever-changing world of technology? As a parent and/or educator, it is critical to be on the cutting edge of social media, because our teens and pre-teens live there! Schedule a parent/educator workshop to catch up. We also offer teen workshops that teach not only the potential dangers of social media platforms, but the potential benefits as well. There is A LOT to know…its time to get started!

www.safekidsamerica.org

Like and Follow us @safekidsamerica