
VOLUME 15| ISSUE 2 PARTNERS IN CRIME PREVENTION MARCH/APRIL 2011 INSIDE THIS ISSUE CYBER SECURITY —AN IMPORTANT PART OF MODERN LIFE CYBER SECURITY 1 The Internet is here and pretty much accept- Eventually, the predator may introduce – AN IMPORTANT PART OF MOD- ed by everyone for communicating with talking about sex to make them more ERN LIFE friends and business associates, for looking comfortable about sex. CYBER SECURITY 2 up information, for shopping, and for enter- – SOCIAL While we receive the benefits of the Internet tainment. NETWORKING we need to be aware of how we can protect CYBER SECURITY 2 Revealing Too Much. Often though, we re- ourselves from the dangers and we need to – USING SOCIAL veal too much about ourselves online. Chil- teach our children how to protect them- NETWORKING SAFELY dren can be most susceptible about reveal- selves from those dangers. ing too much about themselves and their CYBER SECURITY 3 The National Center for Missing and Exploit- families. They can share your home address, – CYBER ed Children (NCMEC) has a web site, BULLYING their phone numbers, private thoughts, and www.netsmartz.org, that provides hints and pictures. CYBER SECURITY 4 tips on how children can protect themselves – PREDATORS Revealing too much information about your- from the dangers of the Internet. It has edu- CYBER SECURITY A1 self can open the child and the family to: cational materials for parents, kids (grade – ABBREVIA- school through teens), law enforcement, and TIONS Scammers– Scammers can use a educators. child’s (and a parent’s) personal infor- mation, such as email addresses and NCMEC also sponsors a tip line for citizens phone numbers, to manipulate them to report crimes against children. If you think with spam, telemarketing, and email your child is a victim of cyberbullying or a scams. sexual predator go to: Cyberbullies– Cyberbullies use their www.CyberTipline.com target’s personal information and use it or call: against them. They can copy and change photos; share private emails or 1-800-THE-LOST (1-800-843-5678) instant messages; or taunt them with And then notify the Snohomish County Sher- emotional insecurities revealed in blogs iff’s Office. John Lovick, Sheriff or emails. The following link gives a brief overview of Snohomish County Sheriff’s Office Predators– Predators look for infor- cybersecurity: mation on child victims to groom and 3000 Rockefeller www.netsmartz.org/ manipulate them. A predator will try to M/S 606 StreamingPresentations/ Everett, WA 98201 create trust by the child by being sympa- 425-388-3393 InternetSafetyBasics http://sheriff. snoco.org thetic to their insecurities and conflicts. SNOHOMISH COUNTY PARTNERS IN CRIME PREVENTION | 2 CYBER CYBER SECURITY – SOCI AL NETWORKING SECURITY- Teens use social networking sites Blogs– These online journals or dia- USING SOCIAL (SNS) such as MySpace, Facebook, ries are becoming a common part of NETWORKING many SNS. SAFELY Bebo, and Twitter because they give them: Comment Walls– A popular feature of Check your child’s friend lists to see An easy way to share their lives most SNS that allows users to com- who has access to with their friends and family municate through comments left on his or her profile. Make sure your each others’ pages. child knows all The chance to try on different friends in person. identities and explore new inter- E-mail– Most SNS have an e-mail fea- ture through which users can com- Teach your child ests to set profiles to municate privately or with select private–but be A semi-private platform on which groups. aware that privacy settings do not to communicate outside of the Friends Lists– These contact lists are guarantee com- supervision of adults plete privacy. usually comprised of people a child knows offline, but also include friends Have your child With these benefits, however, also remove any inap- come some risks. Teens on SNS may of friends and others they have only propriate content share personal information which met online. and photos and leaves them vulnerable to people who delete any person- Instant Messaging- Some SNS, such al information. want to harm them. They may also as Facebook, have made chat fea- share inappropriate or illegal content Check the profiles tures available to users. of your child’s which endangers future academic or friends to see if employment opportunities. Under- there is revealing Pictures and Videos– Most SNS allow standing the various ways content can information or pho- users to post a profile picture. Many tos about your be shared can help trusted adults talk also allow users to post photos and child. to teens about ways to stay safer videos to an online ―album.‖ Report inappropri- while using SNS. ate or criminal be- havior to the ap- Status Updates- Users post these propriate authority. Some Social Networking Basic Fea- short sentences to let the people on Most sites have a tures- reporting mecha- their friends list know their actions, nism for non- feelings, and thoughts. criminal behavior. Following are some features that your Criminal behavior child might find on a typical social net- should be reported working site. With a SNS instead of through law- enforcement agen- opening multiple applications, a user cies and the can rely on one place to serve all their CyberTipline® at www.cybertipline.c communications needs. om. SNOHOMISH COUNTY PARTNERS IN CRIME PREVENTION | 3 HELP PROTECT CYBER SECURITY– CYBERBULLYING CHILDREN FROM BULLYING Cyberbullying has been receiving more through e-mail, text messaging, or publicity in the last few years. According to social networking sites. Tell your child www.netsmartz.org: not to respond to Here are some signs your child may rude e-mails, messages, and Cyberbullying is just what it sounds like - be a victim of cyberbullying: comments. bullying through Internet applications and Avoids the computer, cell phone, Save the evi- technologies such as instant messaging and other technological devices dence, such as (IM), social networking sites, and cell or appears stressed when receiv- email and text phones. It can start easily—with a rumor, a ing an e-mail, instant message, or messages, and text take screenshots photo, or a forwarded message—and just of comments and as easily spiral out of control. An embar- Withdraws from family and images. Also, rassing video posted to a social networking friends or acts reluctant to attend take note of the school and social events date and time site by someone in Kansas tonight may be when the harass- watched by someone in Japan tomorrow. Avoids conversations about com- ment occurs. Cyberbullying victims may be targeted any- puter use Contact your where, at any time. Internet service Exhibits signs of low self-esteem provider (ISP) or including depression and/or fear Common forms of cyberbullying include: cell phone pro- vider. Ask the Has declining grades website adminis- Flaming and Trolling – sending or posting Has poor eating or sleeping habits trator or ISP to hostile messages intended to ―inflame‖ remove any Web the emotions of others. For more information about cyberbul- page created to lying read: hurt your child. Happy-Slapping – recording someone be- If harassment is ing harassed or bullied in a way that usual- Hinduja, S., Patchin J. Bullying Be- via e-mail, so- yond the Schoolyard: Preventing and cial networking ly involves physical abuse, then posting the sites, IM, and video online for public viewing. Responding to Cyberbullying. Thou- chat rooms, sand Oaks: Corwin Press, 2009. instruct your Identity Theft/Impersonation – stealing child to “block” someone’s password and/or hijacking For more information take a look at bullies or delete this: your child’s cur- their online accounts to send or post in- rent account and criminating or humiliating pictures, videos, www.netsmartz.org/cyberbullying open a new one. or information. If harrassment is via text and Photoshopping – doctoring digital images phone messag- es, change the so that the main subject is placed in a phone number compromising or embarrassing situation. Report Cyberbullying to and instruct your child to only Physical Threats – sending messages that www.cybertipline.com share the new involve threats to a person’s physical safe- and the Snohomish number with trustworthy peo- ty. County Sheriff’s Office ple. Rumor Spreading – spreading gossip SNOHOMISH COUNTY PARTNERS IN CRIME PREVENTION | 4 CRIME PREVENTION CYBER SECURITY– PREDATORS COORDINATORS The Internet did not create child predators, parent or guardian, but there are warning OFFICE OF COMMUNITY but it does increase the opportunities preda- signs that can help identify a child who has PARTNERSHIPS neighborhoodwatch@ tors have to meet victims while minimizing faced a situation of online victimization. If a snoco.org detection. Predators can communicate with child discloses to you that they have been children anonymously through a variety of exploited, reassure him or her that talking NORTH PRECINCT ways including instant messaging, social to an adult is the right action to take and Deputy Daniel Johnson networking sites, chat rooms, message divert any blame away from the victim. 425-388-5231 [email protected] boards, and even cell phones. Warning Signs of Grooming or Exploitation Grooming in your Child SOUTH PRECINCT Deputy Will Ter-Veen Predators take advantage of a child’s natu- Spends an excessive amount of time 425-388-5277 ral vulnerabilities, such as their desire to on the computer [email protected] appear adult or their need for attention. Becomes angry when he or she cannot ―Grooming‖ is the process through which get on the computer predators play on these vulnerabilities by offering children gifts and attention. Withdraws from family and friends Grooming can be a long process that a pa- Minimizes the screen or turns off the tient and tenacious predator has planned monitor when you come into the room and perfected to gain a child’s trust.
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages6 Page
-
File Size-