SlideShare une entreprise Scribd logo
1  sur  42
Internet Safety for Kids Only For  Adults Presentation
Introduction About Me TanmayDikshit Handwriting Analysis NCSA Certified Master BrainbenchCertified CERTY Certified Professional ASCL Certified Cyber Crime Investigator
Home Computer Protection http://www.microsoft.com/protect Windows Firewalls Anti-virus Spyware Detectors Spyware Search and Destroy Windows Defender IE 7 with Identity Guard / FireFox is less hackable. Don’t install any P2P software Protect Wireless Network
Detailed Information on your computer Online  : http://www.whatsmyip.org/more/ External IP Hostname Proxy Internal (LAN) IP Accept Language User Agent Screen Resolution Who is Lookup (on You) Offline : http://www.pxserver.com/WinAudit.htm
Telecom Directory In BSNL India http://www.bsnl.co.in/map.htm                                  Station                                  Registrar Tel No                                   Registrar Name                                  Registrar Address Trace Indian Mobile Location & Operator http://trace.bharatiyamobile.com/                                  Mobile Number                                  Location                                  Signaling                                   Operator
Super Research www.google.com- General Search www.technorati.com- Blogosphere Search www.justdial.com- India's No.1 local search engine
Warning Viewer discretion advised This is a disturbing topic This presentation was NOT designed to be Viewed by children
Contents Sample Cases Cold Hard Facts about Technophilia Cyber Child Sex Offender Terminology Six Steps to Luring Cyber Child Sex Offender Profiles Most At-Risk Advice for Parents Resources
Kylie Taylor Case Detectives said Kylie (14) arranged to meet Sadler through Internet chat rooms and phone calls after she left her foster home. Court documents said Kylie was found in a darkened room with video cameras and restraints where he whipped, sexually assaulted her and chained her to a bed when he left the residence. Stanley Scott Sadler, age 47, has been charged with one count of kidnapping in the first degree, three counts of rape of a child in the third degree, and one count of sexual exploitation of a minor. Kylie was located by her mother and an ad hoc group of volunteer pedophile trackers ( www.perverted-justice.com )
Sex Solicitation Results in Arrest A 23-year-old Pueblo man is being held in Douglas County Jail after allegedly soliciting sex with children in an Internet chat room. Lenard James Brown was arrested March 4, according to a press release by the Pueblo County Sheriff's Office. In February, Brown allegedly posted a message in a chat room asking parents to arrange for him to meet privately with their children. The children ranged in age from 1 to 14. A person who saw the message notified authorities.
S.J. Man Surrenders in Child Sex Case A former Redwood City middle school teacher turned himself in Tuesday at the Santa Clara County Jail after police seized his home computer and allegedly found child pornography. David Joseph Welsh, who most recently taught at the North Star Academy, was charged with a misdemeanor of possessing child pornography and is being held in lieu of $150,000 bail.
Man Delivers Live Rape Video A local man who went on the Internet and offered live video of himself having sex with a 3-year-old girl is behind bars, police say. Paul A. Kraft has been charged with two counts of rape and one count of pandering sexually oriented material involving a minor.
Man Accused of Soliciting a Child A 53-year-old accountant who bragged on the Web about molesting children all over the country, was charged Thursday with three counts of soliciting sex from a child using the Internet, authorities said. Roy Mason, of 2009 High view Fall Place, was arrested Thursday on an Indiana warrant at his home by the Florida Department of Law Enforcement with help from the Hillsborough County Sheriff's Office, said Mike Duffey, an FDLE computer crimes special agent. Authorities are examining the computer found in Mason’s home.
Predator “Shopped” at myspace.com William Warren Greico, 42, first approached the girl after he saw her posting on myspace.com in August. Billing himself as a man named "Tyler,“ the Seminole High School English teacher sent his picture to the girl and a message asking if she'd like to be friends. Detectives arranged a sting after Greico suggested that he and the girl meet at an undisclosed location
Fake Orkut profile of schoolgirl posted February 06, 2007 20:07 IST Orkut seems to have become the new favourite with online mischief makers as yet another case of misuse of the social networking website has come to light with a schoolgirl complaining that her fake profile has been posted on it. The father of the girl, has approached the Cyber Cell of Delhi Police's Economic Offences Wing after the family began receiving vulgar calls. The girl is a student of a South Delhi school. The web page describes the teenager as a "sex teacher" and has obscene photographs and contact details such as her home address and telephone numbers, police said. This is the second incident that has come to light about Orkut misuse in Delhi in less than three weeks. Earlier in February, an air-hostess had moved a court here alleging that someone has opened an account in her name on Orkut wherein she is being described as a "sex struck woman".  The teenager's family had received the first call almost a month ago where the caller wanted to speak to the girl. Similar calls poured in later, the police said, adding all the callers referred to Orkut. The family had a harrowing time when two strangers knocked at their door a fortnight ago and told them the girl had invited them for sex through Internet, they added. Police said a case has been registered and investigations were on. http://www.rediff.com/news/2007/feb/06orkut.htm
The Perfect Victim Ideal age: 11-14 No or little parental involvement No definite bedtime Can be away from home without anyone knowing where he/she is Has exclusive use of the computer in a private area
Is Your Child’s Information Online? With these three sources available, Names, Addresses, Phone numbers and Dates of Birth are available on almost ANYONE! www.google.com www.myfamily.com www.zoominfo.com www.alltheweb.com www.zabasearch.com www.Eliyon.com www.orkut.com www.facebook.com http://namesdatabase.com
Normal Name search on www.google.com
Parents don’t let parents let their kids join Facebook, Orkut, MySpace under 18 Arents need to look / Learn about myspace and facebook. Kids don’t think before they post. Once the information is submitted, it’s very hard to take it off. Kids promoting an image that won’t do them any favors. Kids blog too much information. Kids site isn’t set to Private Video Demo http://www.msnbc.msn.com/id/11064451/
Dangers of Chat rooms Prepare your kids just like the real world Anyone can be anyone on Cyberspace Children wastes a lot of time chatting instead of doing homework Participants in chat rooms will sometimes attempt to entice children into talking about sex in one form or another. Children can also be in danger of under developing their social skills
Technophilia Term defined by Detective James McLaughlin, Keene County Police Department “Persons using the computer to engage in sexual deviance”
Cyber Child Sex Offender Terminology Travelers	 those who manipulate or coerce kids to meet them in person for sexual purposes Collectors	 those involved in collecting child Pornography Manufacturers	 those who create child pornography on any type of medium (all manufacturers are collectors) Chatters	 those presenting themselves as trustworthy individuals in chat sessions
Six Steps to Luring Based loosely on the MISSING Game available online at www.livewwwires.com Just Like You - Befriending Making the offer Incriminating evidence Contact – the “honeymoon phase” Guilt and threats as coercion The truth emerges
Groomers Most Internet luring instances begin with the process of ‘grooming’ – forming a trusting bond with the child. There are several types of groomers including: Romantic groomers Aggressive groomers Monetary/status groomers
Befriending Techniques Chat room discussions Portrays same age, same likes, same dislikes Portrays age-typical awkwardness Begins to share some secrets Telephone - predators will want to talk on the phone. Just to make sure it’s a child talking Email - Predator may want the child’s email so they can email them offline, and send them stuff, Fantasy statements Webcamming Verbal Chat on Internet (Microphone) / Skype
Chat Room Tools MSN Messenger ICQ (“I seek you”) AOL Instant Messenger Yahoo! Messenger & Yahoo Chat mIRC (many Internet Relay Chat) Google Talk
Physical Access is the Goal John Evander Couey was a registered sex offender that was living just 150 yards away from Jessica Lunsford’s home. Please check the database of sex offenders in your area. Megan’s Law was signed into federal law on May 17, 1996. Access the Megan’s Law database from www.ncmec.orgwww.fbi.gov/hq/cid/cac/states.htm http://www.mshp.dps.mo.gov/CJ38/search.jsp
“To Catch a Predator Series” http://www.msnbc.msn.com/id/10912603/
US Child Protection Law United States Code TITLE 18 - CRIMES AND CRIMINAL PROCEDURE PART I - CRIMES CHAPTER 110 - SEXUAL EXPLOITATION AND OTHER ABUSE OF CHILDREN Section 2251   Sexual Exploitation Of Children 		     Section 2251A  Selling Or Buying Of Children 		     Section 2252  Certain Activities Relating To Material Involving The Sexual Exploitation Of Minors 		     Section 2252A  Certain Activities Relating To Material Constituting Or Containing Child Pornography 		     Section 2253  Criminal Forfeiture 		     Section 2254  Civil Forfeiture 	     	     Section 2255  Civil Remedy For Personal Injuries 	      	     Section 2256  Definitions For Chapter 	          	     Section 2257  Record Keeping Requirements 	     	     Section 2258  Failure To Report Child Abuse 		     Section 2259  Mandatory Restitution 		     Section 2260  Production Of Sexually Explicit Depictions Of A Minor For Importation Into The United States
Pornography In India Section 67 of IT Act Publishing of information which is obscene in electronic form. Publishing, transmitting, causing to be published Porn in the electronic form Strict Punishment 5 years jail (SI or RI) + 1 lakh fine 10 years jail (SI or RI) + 2 lakh fine http://www.vakilno1.com/bareacts/informationtechnologyact/s67.htm
General Internet Safety Tips Place the computer in a central location in the home, not in the kid’s room. Learn who your kids are chatting with online (take the “don’t talk to strangers” message into the digital world). Define your personal standard regarding your child’s privacy. Become familiar with chatting and search tools used by your kids.
Advice for Parents        Detective James McLaughlin, Child Sexual Abuse and Exploitation, Keene Police Department Know who is most “at risk.” Set up an agreement with your child about computer use (hours, access to chat lines, revealing personal information/photographs) Don’t rely solely on software to block/filter content. Let your child know that reporting unwanted or suspicious solicitations won’t lead to restrictions on computer use. Know that restricting communications to a specific list of friends may not guarantee safe communications. Be aware of restrictions at other computer locations – school, library, friends’ homes. Look for the warning signs of offender manipulation – secretive behavior, histories being deleted, unexplained telephone charges, hang-up calls, unexpected mail, indications that the home is under surveillance. Know how to monitor Internet use in a variety of ways.
Monitoring and Restricting Internet Use Internet Explorer’s Content Advisor Content Protect, NetNanny, CYBERsitter, CyberPatrol, Cyber Sentinel, FilterPak, Cyber Snoop, etc. Single Password Cache and history
Parental Resources Often focusing on a particular age group with the following typical grade groupings: K-3 Children (age 6-9) 4-8 Kids (age 10-14) 9-12 Youth (age 15-18)
Help in India http://www.indiansmissing.com
www.NetSmartz.org www.ncmec.org CyberTipline – www.cybertipline.com www.livewwwires.com www.iSafe.org www.ChildQuest.org www.packet-level.com/kids
What To Do Now Download and review the presentation material available online at Educate your kids on this issue Email  ilovetanmay@gmail.com  If you have additional resources Register for and take the online course “Advanced Internet Research and Intelligence” at www.htcia.org – use the techniques to perform reconnaissance on your child
What To Do Now Talking openly with your children about Internet luring and the need to avoid sharing personal information online may help keep them safe online. We hope you use this information and the materials provided to educate others at school meetings, church gatherings, community center meetings, etc. We are interested in your feedback and resource information. Contact us directly at ilovetanmay@gmail.com
Thank You Email ID : ilovetanmay@gmail.com Call :+91 9763 716 444
Thanks To Laura Chappell, RohasNagpal, Microsoft

Contenu connexe

Tendances

Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012KanelandSvihlik
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017KanelandSvihlik
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012kschermerhorn
 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullyingkschermerhorn
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaAlexander Berta
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetysharon7111
 
Gloria flores
Gloria floresGloria flores
Gloria floresyaya700
 
Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpumajcullishpum
 
For kids, Snapchat and Instagram alternative to Facebook
For kids, Snapchat and Instagram alternative to FacebookFor kids, Snapchat and Instagram alternative to Facebook
For kids, Snapchat and Instagram alternative to Facebookmcintoshgxzfzxazew
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014KanelandSvihlik
 
Benefits Of On Line Social Networks (Tin180.com)
Benefits Of On Line Social Networks (Tin180.com)Benefits Of On Line Social Networks (Tin180.com)
Benefits Of On Line Social Networks (Tin180.com)Tin180 VietNam
 
Jessica guevara
Jessica guevaraJessica guevara
Jessica guevarajessica97
 
internet safety 2013
internet safety 2013internet safety 2013
internet safety 2013Brian Downey
 
Presentation on the optimal usage of facebook
Presentation on the optimal usage of facebookPresentation on the optimal usage of facebook
Presentation on the optimal usage of facebookShweta Agarwal
 
Becybersmart
BecybersmartBecybersmart
BecybersmartVelma
 

Tendances (20)

A Tale of One City
A Tale of One CityA Tale of One City
A Tale of One City
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012
 
Myspace
MyspaceMyspace
Myspace
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012
 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullying
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
022010
022010022010
022010
 
Test
TestTest
Test
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Gloria flores
Gloria floresGloria flores
Gloria flores
 
Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpuma
 
For kids, Snapchat and Instagram alternative to Facebook
For kids, Snapchat and Instagram alternative to FacebookFor kids, Snapchat and Instagram alternative to Facebook
For kids, Snapchat and Instagram alternative to Facebook
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
 
Benefits Of On Line Social Networks (Tin180.com)
Benefits Of On Line Social Networks (Tin180.com)Benefits Of On Line Social Networks (Tin180.com)
Benefits Of On Line Social Networks (Tin180.com)
 
Jessica guevara
Jessica guevaraJessica guevara
Jessica guevara
 
internet safety 2013
internet safety 2013internet safety 2013
internet safety 2013
 
Presentation on the optimal usage of facebook
Presentation on the optimal usage of facebookPresentation on the optimal usage of facebook
Presentation on the optimal usage of facebook
 
Becybersmart
BecybersmartBecybersmart
Becybersmart
 

En vedette

Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesLightedCandle
 
cyber security & hacking
cyber security & hackingcyber security & hacking
cyber security & hackingvishal waghmare
 
Hacking & cyber Security
Hacking & cyber SecurityHacking & cyber Security
Hacking & cyber Securityvishal waghmare
 
Smart parking 2020 vision
Smart parking 2020 vision Smart parking 2020 vision
Smart parking 2020 vision vishal waghmare
 
Learn more a bout movie maker
Learn more a bout movie maker   Learn more a bout movie maker
Learn more a bout movie maker u090865
 
Internet kids security for parents and teachers
Internet kids security for parents and teachersInternet kids security for parents and teachers
Internet kids security for parents and teachersMarco Marcellini
 
Crazy kids powerpoint presentation
Crazy kids powerpoint presentationCrazy kids powerpoint presentation
Crazy kids powerpoint presentationThornleighMoodle
 
Journey powerpoint
Journey powerpointJourney powerpoint
Journey powerpointerincasada
 
Safetyfor kidspp (1) (1) (1)
Safetyfor kidspp (1) (1) (1)Safetyfor kidspp (1) (1) (1)
Safetyfor kidspp (1) (1) (1)Sahil
 
College Mentors for Kids PowerPoint Presentation
College Mentors for Kids PowerPoint PresentationCollege Mentors for Kids PowerPoint Presentation
College Mentors for Kids PowerPoint PresentationKatelyn Genenbacher
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internetmalissa_1041
 
Food Illness Investigation Web Quest
Food Illness Investigation Web QuestFood Illness Investigation Web Quest
Food Illness Investigation Web QuestKtoth
 
Safe Kids Upstate Internship Powerpoint
Safe Kids Upstate Internship PowerpointSafe Kids Upstate Internship Powerpoint
Safe Kids Upstate Internship PowerpointSarah Parks
 
Powerpoint Presentation Teenagers Clothesjudithlaia
Powerpoint Presentation Teenagers ClothesjudithlaiaPowerpoint Presentation Teenagers Clothesjudithlaia
Powerpoint Presentation Teenagers ClothesjudithlaiaLidia Canet
 
KIDS ISLAND- A PLAY SCHOOL
KIDS ISLAND- A PLAY SCHOOLKIDS ISLAND- A PLAY SCHOOL
KIDS ISLAND- A PLAY SCHOOLNIKITA CHAURASIA
 
Presentation skills designed for autistic kids teacher
Presentation skills designed for autistic kids   teacherPresentation skills designed for autistic kids   teacher
Presentation skills designed for autistic kids teachergihan aboueleish
 
History of time - PowerPoint presentations for kids
History of time - PowerPoint presentations for kidsHistory of time - PowerPoint presentations for kids
History of time - PowerPoint presentations for kidsGeeta Singh
 
Road Safety / Highway Safety Tips for Parents and Teachers, How to prevent Ro...
Road Safety / Highway Safety Tips for Parents and Teachers, How to prevent Ro...Road Safety / Highway Safety Tips for Parents and Teachers, How to prevent Ro...
Road Safety / Highway Safety Tips for Parents and Teachers, How to prevent Ro...Road Safety
 

En vedette (20)

Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
cyber security & hacking
cyber security & hackingcyber security & hacking
cyber security & hacking
 
Hacking & cyber Security
Hacking & cyber SecurityHacking & cyber Security
Hacking & cyber Security
 
Cybersafety Presentation for Connecting Waters Charter School
Cybersafety Presentation for Connecting Waters Charter SchoolCybersafety Presentation for Connecting Waters Charter School
Cybersafety Presentation for Connecting Waters Charter School
 
Smart parking 2020 vision
Smart parking 2020 vision Smart parking 2020 vision
Smart parking 2020 vision
 
Learn more a bout movie maker
Learn more a bout movie maker   Learn more a bout movie maker
Learn more a bout movie maker
 
Internet kids security for parents and teachers
Internet kids security for parents and teachersInternet kids security for parents and teachers
Internet kids security for parents and teachers
 
Crazy kids powerpoint presentation
Crazy kids powerpoint presentationCrazy kids powerpoint presentation
Crazy kids powerpoint presentation
 
Journey powerpoint
Journey powerpointJourney powerpoint
Journey powerpoint
 
Safetyfor kidspp (1) (1) (1)
Safetyfor kidspp (1) (1) (1)Safetyfor kidspp (1) (1) (1)
Safetyfor kidspp (1) (1) (1)
 
College Mentors for Kids PowerPoint Presentation
College Mentors for Kids PowerPoint PresentationCollege Mentors for Kids PowerPoint Presentation
College Mentors for Kids PowerPoint Presentation
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
 
Food Illness Investigation Web Quest
Food Illness Investigation Web QuestFood Illness Investigation Web Quest
Food Illness Investigation Web Quest
 
Safe Kids Upstate Internship Powerpoint
Safe Kids Upstate Internship PowerpointSafe Kids Upstate Internship Powerpoint
Safe Kids Upstate Internship Powerpoint
 
Powerpoint Presentation Teenagers Clothesjudithlaia
Powerpoint Presentation Teenagers ClothesjudithlaiaPowerpoint Presentation Teenagers Clothesjudithlaia
Powerpoint Presentation Teenagers Clothesjudithlaia
 
KIDS ISLAND- A PLAY SCHOOL
KIDS ISLAND- A PLAY SCHOOLKIDS ISLAND- A PLAY SCHOOL
KIDS ISLAND- A PLAY SCHOOL
 
Presentation skills designed for autistic kids teacher
Presentation skills designed for autistic kids   teacherPresentation skills designed for autistic kids   teacher
Presentation skills designed for autistic kids teacher
 
History of time - PowerPoint presentations for kids
History of time - PowerPoint presentations for kidsHistory of time - PowerPoint presentations for kids
History of time - PowerPoint presentations for kids
 
Road Safety / Highway Safety Tips for Parents and Teachers, How to prevent Ro...
Road Safety / Highway Safety Tips for Parents and Teachers, How to prevent Ro...Road Safety / Highway Safety Tips for Parents and Teachers, How to prevent Ro...
Road Safety / Highway Safety Tips for Parents and Teachers, How to prevent Ro...
 

Similaire à Internet Safety For Kids By Tanmay

Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet SafetyEric Cedo
 
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internetVictor Font
 
prt. 1...Online Pedophiles
prt. 1...Online Pedophilesprt. 1...Online Pedophiles
prt. 1...Online PedophilesJustine
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentationjpl17
 
Internet predators:parents clueless?
Internet predators:parents clueless?Internet predators:parents clueless?
Internet predators:parents clueless?migueltachna
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullyinghoskei
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullyinghoskei
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxRahuljain40418
 
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineMichael Heron
 
Internet Safety Meeting New
Internet Safety Meeting NewInternet Safety Meeting New
Internet Safety Meeting NewRandy Rodgers
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010adewolfe
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital worldDan Bowen
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentationegregory
 

Similaire à Internet Safety For Kids By Tanmay (20)

102009
102009102009
102009
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internet
 
File000098
File000098File000098
File000098
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
prt. 1...Online Pedophiles
prt. 1...Online Pedophilesprt. 1...Online Pedophiles
prt. 1...Online Pedophiles
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentation
 
Internet predators:parents clueless?
Internet predators:parents clueless?Internet predators:parents clueless?
Internet predators:parents clueless?
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullying
 
Kyle Cyber Bullying
Kyle Cyber BullyingKyle Cyber Bullying
Kyle Cyber Bullying
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
 
102010a
102010a102010a
102010a
 
Internet Safety Meeting New
Internet Safety Meeting NewInternet Safety Meeting New
Internet Safety Meeting New
 
Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101Smart And Safe In Cyberspace: Social Networking 101
Smart And Safe In Cyberspace: Social Networking 101
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital world
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 

Dernier

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Dernier (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Internet Safety For Kids By Tanmay

  • 1. Internet Safety for Kids Only For Adults Presentation
  • 2. Introduction About Me TanmayDikshit Handwriting Analysis NCSA Certified Master BrainbenchCertified CERTY Certified Professional ASCL Certified Cyber Crime Investigator
  • 3. Home Computer Protection http://www.microsoft.com/protect Windows Firewalls Anti-virus Spyware Detectors Spyware Search and Destroy Windows Defender IE 7 with Identity Guard / FireFox is less hackable. Don’t install any P2P software Protect Wireless Network
  • 4. Detailed Information on your computer Online : http://www.whatsmyip.org/more/ External IP Hostname Proxy Internal (LAN) IP Accept Language User Agent Screen Resolution Who is Lookup (on You) Offline : http://www.pxserver.com/WinAudit.htm
  • 5. Telecom Directory In BSNL India http://www.bsnl.co.in/map.htm Station Registrar Tel No Registrar Name Registrar Address Trace Indian Mobile Location & Operator http://trace.bharatiyamobile.com/ Mobile Number Location Signaling Operator
  • 6. Super Research www.google.com- General Search www.technorati.com- Blogosphere Search www.justdial.com- India's No.1 local search engine
  • 7. Warning Viewer discretion advised This is a disturbing topic This presentation was NOT designed to be Viewed by children
  • 8. Contents Sample Cases Cold Hard Facts about Technophilia Cyber Child Sex Offender Terminology Six Steps to Luring Cyber Child Sex Offender Profiles Most At-Risk Advice for Parents Resources
  • 9. Kylie Taylor Case Detectives said Kylie (14) arranged to meet Sadler through Internet chat rooms and phone calls after she left her foster home. Court documents said Kylie was found in a darkened room with video cameras and restraints where he whipped, sexually assaulted her and chained her to a bed when he left the residence. Stanley Scott Sadler, age 47, has been charged with one count of kidnapping in the first degree, three counts of rape of a child in the third degree, and one count of sexual exploitation of a minor. Kylie was located by her mother and an ad hoc group of volunteer pedophile trackers ( www.perverted-justice.com )
  • 10. Sex Solicitation Results in Arrest A 23-year-old Pueblo man is being held in Douglas County Jail after allegedly soliciting sex with children in an Internet chat room. Lenard James Brown was arrested March 4, according to a press release by the Pueblo County Sheriff's Office. In February, Brown allegedly posted a message in a chat room asking parents to arrange for him to meet privately with their children. The children ranged in age from 1 to 14. A person who saw the message notified authorities.
  • 11. S.J. Man Surrenders in Child Sex Case A former Redwood City middle school teacher turned himself in Tuesday at the Santa Clara County Jail after police seized his home computer and allegedly found child pornography. David Joseph Welsh, who most recently taught at the North Star Academy, was charged with a misdemeanor of possessing child pornography and is being held in lieu of $150,000 bail.
  • 12. Man Delivers Live Rape Video A local man who went on the Internet and offered live video of himself having sex with a 3-year-old girl is behind bars, police say. Paul A. Kraft has been charged with two counts of rape and one count of pandering sexually oriented material involving a minor.
  • 13. Man Accused of Soliciting a Child A 53-year-old accountant who bragged on the Web about molesting children all over the country, was charged Thursday with three counts of soliciting sex from a child using the Internet, authorities said. Roy Mason, of 2009 High view Fall Place, was arrested Thursday on an Indiana warrant at his home by the Florida Department of Law Enforcement with help from the Hillsborough County Sheriff's Office, said Mike Duffey, an FDLE computer crimes special agent. Authorities are examining the computer found in Mason’s home.
  • 14. Predator “Shopped” at myspace.com William Warren Greico, 42, first approached the girl after he saw her posting on myspace.com in August. Billing himself as a man named "Tyler,“ the Seminole High School English teacher sent his picture to the girl and a message asking if she'd like to be friends. Detectives arranged a sting after Greico suggested that he and the girl meet at an undisclosed location
  • 15. Fake Orkut profile of schoolgirl posted February 06, 2007 20:07 IST Orkut seems to have become the new favourite with online mischief makers as yet another case of misuse of the social networking website has come to light with a schoolgirl complaining that her fake profile has been posted on it. The father of the girl, has approached the Cyber Cell of Delhi Police's Economic Offences Wing after the family began receiving vulgar calls. The girl is a student of a South Delhi school. The web page describes the teenager as a "sex teacher" and has obscene photographs and contact details such as her home address and telephone numbers, police said. This is the second incident that has come to light about Orkut misuse in Delhi in less than three weeks. Earlier in February, an air-hostess had moved a court here alleging that someone has opened an account in her name on Orkut wherein she is being described as a "sex struck woman". The teenager's family had received the first call almost a month ago where the caller wanted to speak to the girl. Similar calls poured in later, the police said, adding all the callers referred to Orkut. The family had a harrowing time when two strangers knocked at their door a fortnight ago and told them the girl had invited them for sex through Internet, they added. Police said a case has been registered and investigations were on. http://www.rediff.com/news/2007/feb/06orkut.htm
  • 16. The Perfect Victim Ideal age: 11-14 No or little parental involvement No definite bedtime Can be away from home without anyone knowing where he/she is Has exclusive use of the computer in a private area
  • 17. Is Your Child’s Information Online? With these three sources available, Names, Addresses, Phone numbers and Dates of Birth are available on almost ANYONE! www.google.com www.myfamily.com www.zoominfo.com www.alltheweb.com www.zabasearch.com www.Eliyon.com www.orkut.com www.facebook.com http://namesdatabase.com
  • 18. Normal Name search on www.google.com
  • 19. Parents don’t let parents let their kids join Facebook, Orkut, MySpace under 18 Arents need to look / Learn about myspace and facebook. Kids don’t think before they post. Once the information is submitted, it’s very hard to take it off. Kids promoting an image that won’t do them any favors. Kids blog too much information. Kids site isn’t set to Private Video Demo http://www.msnbc.msn.com/id/11064451/
  • 20. Dangers of Chat rooms Prepare your kids just like the real world Anyone can be anyone on Cyberspace Children wastes a lot of time chatting instead of doing homework Participants in chat rooms will sometimes attempt to entice children into talking about sex in one form or another. Children can also be in danger of under developing their social skills
  • 21. Technophilia Term defined by Detective James McLaughlin, Keene County Police Department “Persons using the computer to engage in sexual deviance”
  • 22. Cyber Child Sex Offender Terminology Travelers those who manipulate or coerce kids to meet them in person for sexual purposes Collectors those involved in collecting child Pornography Manufacturers those who create child pornography on any type of medium (all manufacturers are collectors) Chatters those presenting themselves as trustworthy individuals in chat sessions
  • 23. Six Steps to Luring Based loosely on the MISSING Game available online at www.livewwwires.com Just Like You - Befriending Making the offer Incriminating evidence Contact – the “honeymoon phase” Guilt and threats as coercion The truth emerges
  • 24. Groomers Most Internet luring instances begin with the process of ‘grooming’ – forming a trusting bond with the child. There are several types of groomers including: Romantic groomers Aggressive groomers Monetary/status groomers
  • 25. Befriending Techniques Chat room discussions Portrays same age, same likes, same dislikes Portrays age-typical awkwardness Begins to share some secrets Telephone - predators will want to talk on the phone. Just to make sure it’s a child talking Email - Predator may want the child’s email so they can email them offline, and send them stuff, Fantasy statements Webcamming Verbal Chat on Internet (Microphone) / Skype
  • 26. Chat Room Tools MSN Messenger ICQ (“I seek you”) AOL Instant Messenger Yahoo! Messenger & Yahoo Chat mIRC (many Internet Relay Chat) Google Talk
  • 27.
  • 28.
  • 29. Physical Access is the Goal John Evander Couey was a registered sex offender that was living just 150 yards away from Jessica Lunsford’s home. Please check the database of sex offenders in your area. Megan’s Law was signed into federal law on May 17, 1996. Access the Megan’s Law database from www.ncmec.orgwww.fbi.gov/hq/cid/cac/states.htm http://www.mshp.dps.mo.gov/CJ38/search.jsp
  • 30. “To Catch a Predator Series” http://www.msnbc.msn.com/id/10912603/
  • 31. US Child Protection Law United States Code TITLE 18 - CRIMES AND CRIMINAL PROCEDURE PART I - CRIMES CHAPTER 110 - SEXUAL EXPLOITATION AND OTHER ABUSE OF CHILDREN Section 2251 Sexual Exploitation Of Children Section 2251A Selling Or Buying Of Children Section 2252 Certain Activities Relating To Material Involving The Sexual Exploitation Of Minors Section 2252A Certain Activities Relating To Material Constituting Or Containing Child Pornography Section 2253 Criminal Forfeiture Section 2254 Civil Forfeiture Section 2255 Civil Remedy For Personal Injuries Section 2256 Definitions For Chapter Section 2257 Record Keeping Requirements Section 2258 Failure To Report Child Abuse Section 2259 Mandatory Restitution Section 2260 Production Of Sexually Explicit Depictions Of A Minor For Importation Into The United States
  • 32. Pornography In India Section 67 of IT Act Publishing of information which is obscene in electronic form. Publishing, transmitting, causing to be published Porn in the electronic form Strict Punishment 5 years jail (SI or RI) + 1 lakh fine 10 years jail (SI or RI) + 2 lakh fine http://www.vakilno1.com/bareacts/informationtechnologyact/s67.htm
  • 33. General Internet Safety Tips Place the computer in a central location in the home, not in the kid’s room. Learn who your kids are chatting with online (take the “don’t talk to strangers” message into the digital world). Define your personal standard regarding your child’s privacy. Become familiar with chatting and search tools used by your kids.
  • 34. Advice for Parents Detective James McLaughlin, Child Sexual Abuse and Exploitation, Keene Police Department Know who is most “at risk.” Set up an agreement with your child about computer use (hours, access to chat lines, revealing personal information/photographs) Don’t rely solely on software to block/filter content. Let your child know that reporting unwanted or suspicious solicitations won’t lead to restrictions on computer use. Know that restricting communications to a specific list of friends may not guarantee safe communications. Be aware of restrictions at other computer locations – school, library, friends’ homes. Look for the warning signs of offender manipulation – secretive behavior, histories being deleted, unexplained telephone charges, hang-up calls, unexpected mail, indications that the home is under surveillance. Know how to monitor Internet use in a variety of ways.
  • 35. Monitoring and Restricting Internet Use Internet Explorer’s Content Advisor Content Protect, NetNanny, CYBERsitter, CyberPatrol, Cyber Sentinel, FilterPak, Cyber Snoop, etc. Single Password Cache and history
  • 36. Parental Resources Often focusing on a particular age group with the following typical grade groupings: K-3 Children (age 6-9) 4-8 Kids (age 10-14) 9-12 Youth (age 15-18)
  • 37. Help in India http://www.indiansmissing.com
  • 38. www.NetSmartz.org www.ncmec.org CyberTipline – www.cybertipline.com www.livewwwires.com www.iSafe.org www.ChildQuest.org www.packet-level.com/kids
  • 39. What To Do Now Download and review the presentation material available online at Educate your kids on this issue Email ilovetanmay@gmail.com If you have additional resources Register for and take the online course “Advanced Internet Research and Intelligence” at www.htcia.org – use the techniques to perform reconnaissance on your child
  • 40. What To Do Now Talking openly with your children about Internet luring and the need to avoid sharing personal information online may help keep them safe online. We hope you use this information and the materials provided to educate others at school meetings, church gatherings, community center meetings, etc. We are interested in your feedback and resource information. Contact us directly at ilovetanmay@gmail.com
  • 41. Thank You Email ID : ilovetanmay@gmail.com Call :+91 9763 716 444
  • 42. Thanks To Laura Chappell, RohasNagpal, Microsoft