Rutgers Student Killed Himself

September 30, 2010 at 5:33 pm | Posted in Uncategorized | Leave a comment

I blogged earlier about the RU student who killed himseld by jumping off of the GW bridge.  He did it because his room mate secretly turned on the web cam in their room and the victim was caught on caerma kissing another man.

Come on dude…..please tell me that you didn’t suspect he was homosexual and turned on the webcam to catch him?  Please tell me that you didn’t mean to do it and that you were being just an average college kid pulling an average practical joke that went horribly wrong.  No you are most definitely going to go to jail.

Advertisements

Anti Keystroke Logging

September 30, 2010 at 3:45 pm | Posted in Uncategorized | Leave a comment

Really????  My take on this is that if you need a program like this then you are pretty much doing something wrong!!!

Anti Keylogger Keystroke

Interference

Protect your private information from keylogger software

  Keystroke Logging

The practice of tracking (or logging) the keystrokes on a keyboard accounts for 78% of all online data loss. (Norton Global Threat Report 2009).

Facebook places: bigger than Big Brother | Reportage

September 30, 2010 at 3:42 pm | Posted in Uncategorized | Leave a comment

Facebook Places..IS it really that big of a deal right now?  I am two sided on the topic. 

I have arrested dozens of sexual predators.  My feeling is that very few get obsessed enough on 1 girl to take the time to physically track them down.  Yes I know that they are out there but I feel that about 75% of the sexually deviant men are using the internet to creep on photos and gratify themselves over the computer.  In those rare cases when predators are going to want to reach out and meet a victim they will find out where that victim is with or without Facebook places. 

Here is a brief description:  Using The application’s geo-spatial capabilities -of allowing people to see the locations you have checked into- would also challenge privacy issues relating to Location Privacy, particularly when involving a minor with a Facebook account. Location privacy is the ability of an individual to move in a public space with the hope that under normal circumstances their location will not be systematically and privately recorded for later use.

via Facebook places: bigger than Big Brother | Reportage.

Tools ‹ Kdcop’s Weblog — WordPress

September 30, 2010 at 3:31 pm | Posted in Uncategorized | Leave a comment

The Attorney General’s Officer sent an agent in to talk to 11th and 12th graders about sexual predators.  How well do you think that went over?

He said there are strangers using the Internet who are predators, or classmates and other acquaintances that use chat rooms and social networking sites like Facebook and Twitter to bully others.

“You have the right to enjoy life, and legally and morally, no one has the right to take that away from you,” said Thomas.

Before the program, Thomas said, teens “end up meeting predators online – individuals pretending to be children who are actually adults, who remove photos from another child’s site and take on that identity, which is a way for them to lure a child away.”

Tools ‹ Kdcop’s Weblog — WordPress.

Outside Our Bubble – The Daily Northwestern

September 30, 2010 at 3:25 pm | Posted in bullying, child, child abuse, children, Cyberbullying, internet, internet safety | Leave a comment

Students from 1st grade through adults have no idea about the impact that bullying will have on someone.  Come on,  we are in a society where guys are supposed to be more emotional and not so stubborn, everyone still thinks that we have thick skin.  Check out the story below and let me know what you think.

The New York Times reported that on Sept. 19, Clementi’s roommate, Dharun Ravi, thought it would be a good idea to secretly film Clementi when he had a guest in the dorm room, then tweet, “Roommate asked for the room till midnight. I went into molly’s room and turned on my webcam. I saw him making out with a dude. Yay.” Ravi later invited others to tune in via iChat. Two days later Clementi’s all too real Facebook status was ““Jumping off the gw bridge sorry,” the Newark Star-Ledger reported.

via Outside Our Bubble – The Daily Northwestern.

Park City Utah

September 30, 2010 at 3:18 pm | Posted in Uncategorized | Leave a comment

I am so glad that schools are becoming pro-active when it come to cyber safety and how it effects the school system. I noticed that they are bringing in a local detective to talk to the kids but come on….You HAVE to HAVE KDCOP come out and do a few shows.

Summit County schools teach Internet safety
Administrators respond to increased student access to technology
Douglas Greenwood, Park Record
Posted: 09/29/2010 11:36:43 AM MDT

Click photo to enlargeStudents at Ecker Hill Middle School line the hallways with their computers before classes begin…«1» Student access to technology increases continually in schools and as that technology becomes more prevalent, issues of safety linger ever-present in the minds of administrators. Every parent and student should know what schools in the area do to make sure no one is abusing the opportunity to use this technology.

Researchers with http://www.internetsafety.com released a brief questionnaire outlining five questions a parent should ask the school his or her child attends. Questions deal with access to technology, cyber-bullying, interactions between teachers and students on social networking sites, cell phone use and filters in school.

Student Access

Throughout the county, schools typically have three or four labs, each with about 30 computers. Students can only access them when accompanied by their teachers. Teachers and other administrators monitor computer activity closely to ensure no student misuses the equipment.

Filters

The three Summit County districts filter all computer-accessible content. But, according to South Summit Superintendent Barry Walker, “The biggest protection you have is an alert teacher.”

Blocked sites include social networking, video streaming and those with vulgar or suggestive content. There are ways to gain access to inappropriate content despite the network filter in schools, however.

“No filters are perfect,” said Mike Kisow of the Park City School District. “We do not want

——————————————————————————–

Advertisement

——————————————————————————–
it to be a substitute.” Parents and teachers need to work together to maintain a safe environment for students, he added.
Cell phones

Schools have all but put a blanket ban on cell phones within the walls of the school. While some schools allow students to use them at lunchtime and before or after classes, other administrators will confiscate them if they see them at all.

Cell phones are deeply connected to all other topics in the Internet safety questionnaire because of their many functions and capabilities. They now have all the functionality of a computer, according to South Summit Middle School teacher Rob Davis.

Cyber-bullying

Cyber-bullying goes hand-in-hand with cell phone use in South Summit Schools, according to Superintendent Walker. When cell phones were banned, administrators noticed a significant decrease in cyber-bullying in the high school, he said.

The elementary counselor visits each classroom and teaches students about all aspects of bullying and it is addressed specifically in a middle school assembly at the beginning of each year.

Most policies in the Park City district are school-specific and address bullying at schools. Administrators said they clearly identify cyber-bullying as part of that. If a student feels threatened while at school by something that happens in class or at home on Facebook, school authorities will intervene, said Andy Coleman of Treasure Mountain Middle School.

Social networking

South Summit schools do not have a policy banning social networking between teachers and students. However, teachers are warned about potential dangers and encouraged not to network personally, Walker said.

The Park City school board is working toward creating a policy that addresses student-teacher interactions online, according to Patrick Ogden of the Park City School District.

High access

Because students at Ecker Hill have their own laptops, Internet safety classes are slightly more in-depth than at other schools. Teachers regularly review cyber-bullying and guidelines for personal information during portions of required classes to ensure every student participates.

Community outreach

Knowing how much access and how teachers use technology in the classroom allows parents to be more involved with their children’s safe education. Ecker Hill will be offering three community Internet safety classes throughout the year.

The first of these classes is scheduled for Wednesday Oct. 6 from 6 p.m. to 7:30 p.m. at Ecker Hill Middle School. Since children at the middle school have regular classes during school, the first meeting is designed for parents only, said Detective Kacey Keisel. “We do ask parents not to bring their children to this parent night,” she said. “It discusses some serious things.”

The class will discuss what can happen in a worst-case scenario because of careless Internet use. Detective Keisel will show portions of documentaries featuring first-hand accounts from both victims and Internet predators. The seminar is open to all who want to participate.

Cyber Safety Begins with Parents

September 30, 2010 at 3:12 pm | Posted in Uncategorized | Leave a comment
Tags: , , , , , , , , ,

I found this article on Google and I think it is just amazing. It is one of the few articles about how to keep your kids safe that gives you actual toold that you can use. Take a look and then tell me what you think.

Three key messages were reinforced for a room full of parents attending a cyber-bullying awareness program Wednesday night:

Children need parents to be their parents, not their friends.
Don’t believe “my kids would never …”
It’s the parents’ responsibility to monitor their children’s cellphone and Internet use.
Naperville Police Det. Richard Wistocki, of the Computer Crimes Unit, presided over a three-hour presentation in the Naperville City Council chambers. About 80 parents attended the program, and several mothers gave testimonials of how their children were negatively impacted by cyber-bullying and cyber-predators.

The event, which was sponsored by the Exchange Club, was the 11th Annual Keeping Kids Safe program. This edition was titled Keeping Our Children Safe Online.

“We want you to know when kids are out there thinking private things, talking about private things, it doesn’t always stay private,” Wistocki said. “When you give access to an awesome device (cellphone) like this, it’s like giving them the keys to the car. … We are giving them technology without any constraints.”

Many children are savvy and understand about online predators, Wistocki said, yet they still send information out to the world through file-sharing services, video, live chat and texts — and some of that information might be used later to hurt them.

A chilling example of how children can hide information from parents was detailed.

Bonnie Waltmire’s daughter Hilary seemed to be a happy girl. She had just turned 16. Mother and daughter had a close relationship. Waltmire thought she knew everything about her daughter. But on Oct. 23, 2007, Waltmire’s life would change forever.

Recalling the events of that day, Waltmire said she thought to herself how beautiful her Hilary looked as she was walking home from the bus after school. She kissed her daughter on the forehead and told her she’d be home in about an hour. When she returned, she found that her daughter had hanged herself.

A group of girls allegedly used Hilary’s boyfriend’s phone to send a text her, one that said he no longer wanted to date her. After Bonnie Waltmire examined her daughter’s MySpace page and other sites, she realized how troubled her daughter had been.

“We found all kinds of examples of bullying, of her being harassed and of her being depressed,” she said.

Waltmire said she and her daughter ate dinner together every night, yet she had no idea that her daughter was living a much different life than the one she thought she knew.

Parents often don’t want to violate a child’s privacy, but Wistocki said that if a parent has bought a phone for a child or provides a computer for a child to use, it’s the parent’s responsibility to check them.

Moms will often say, “I don’t want to violate her privacy,” Wistocki said. “Kids don’t have privacy.”

Wistocki “guaranteed” that within 30 days of attending Wednesday’s program, at least one parent would be calling him seeking assistance. The last time he gave a presentation, he said, it took only 48 hours.

He said parents must check computers and review all the images and videos to see if any inappropriate files show up.

Many children will use file-sharing sites to download music, and those sites are prone to picking up computer viruses or “malware,” Wistocki said. Also, many file-sharing sites have videos that are pornographic in nature and attract predators, which can lead to children either viewing the content or being preyed upon.

Many children use file-hosting sites such as Photobucket to upload photos or videos to sites such as Facebook. Those photos and videos can be stolen and used by others to create fake profiles and e-mail accounts.

And, when using services such as Skype, the other person involved in the chat can be recording it without a child’s knowledge. A friend today on Skype can be an enemy in six months, using the content to harass and harm a child.

Parents should assert to their child that they need to be aware of what the child is doing on the Internet. They should start talking with a child about it early on, and should monitor the child’s online and texting behavior, Wistocki said.

The key is to be tactful when talking with a child, he said. Go about trying to learn what kind of sites they are using in a casual way, maybe asking how to get a song that couldn’t be found on iTunes. Then when the child says, “Oh, I can get it from a file-sharing site,” the parent can take action to remove or block the site — and explain why.

While the hope is that children will make the right decisions, many do things they shouldn’t do. Because of that possibility, parents need to reassure a child that if they are duped by someone older or someone who is not who they say they are, the child needs to tell the parent or someone in authority. Because, as Wistocki said, “A predator may have up to 250 victims in their lifetime.”

One of the mothers attending Wednesday’s program shared the story of what happened to her daughter after she became friendly with a boy on Facebook. The daughter thought she had a Facebook friend named Jesse, who claimed to be 16. After something about the relationship struck the mother as odd, she did some digging and called police. Wistocki determined Jesse was a 45-year-old man recently released from prison, where he’d been doing time for raping a 13-year-old and shooting her father.

“Kids don’t know understand what they are doing,” he said. “Parents need to realize they are not invading their child’s privacy.”

At the beginning of the program, Wistocki noted that in a city of 140,000 people, only about 80 parents were in attendance. He said that was likely because of the belief that “my child would never …”

Sandy Blomker, a Naperville mother of three, acknowledged that parents have a lot of challenges when it comes to these issues. Even though she uses computers at work, she said she was unaware of many of the sites Wistocki talked about.

“I think it is really frightening, what kids are up against,” Blomker said.

Some tips for monitoring a child’s phone or online activity:
On a PC, to check for photos or video:

Go to Start.

Click Search.

Choose Pictures, music, video.

Next choose pictures and video.

Search.

On Windows 7 or a Mac to search for photos or videos:

Click on Finder.

In upper right is the search box.

Type in any of the following:

jpeg

jpg

avi

mpeg

mpg

Computer and cellphone monitoring tools:

SpectorSoft.com

Mymobilewatchdog.com

To check for any social network content using a person’s name:

http://www.pipl.com

Do you monitor your child’s cellphone and Internet use?

Tell us in the comments.

Facebook may be Enabling Man/Boy Love Relationships

September 29, 2010 at 7:42 pm | Posted in bullying, child, child abuse, children, Cyberbullying, internet, internet safety, Uncategorized | 2 Comments
Tags: , , , , , , , , , , ,

I am sure that Facebook doesn’t have enough manpower to police their site like they really should. I am sure that if someone from the Facebook HQ saw these type of sites, they would have taken them down immediatley.

The Internet is the number one destination for pedophiles because they believe that technology grants these criminals anonymity.” That’s a quote from Thomas Harrington, the FBI’s Executive Assistant Director for Criminal, Cyber, Response, and Services Branch on August 2, 2010. And given the latest news from FOX, Mr. Harrington’s statement couldn’t be more dead-on.

Bear with me, but according to the Fox article posted today, the world’s largest pro-pedophilia advocacy group, NAMBLA (The North American Man/Boy Love Association), has been using Facebook to connect with its members throughout the world. Granted, the groups/pages have recently been removed from Facebook due to the media attention, but it doesn’t diminish the fact that FoxNews.com found hundreds of links to NAMBLA’s website, and 87 NAMBLA groups (fake and real) on Facebook.

Some Facebook pages showed children as young as 4 and 5, according to FoxNews’ research. One page “features a photo of a man being kissed on the cheek by a small child. Its description reads: ‘We are the North American Man/Boy Love Association. Our sole purpose is to push forward the concept that a consenting man (18+) and a consenting minor (-18) can have a sexual and loving relationship legally.'”

Hemanshu Nigam, co-chairman of President Obama’s Online Safety Technology Working Group and a member of the board of the National Center for Missing and Exploited Children said, “‘This is just the downright filthiest of society setting up on Facebook in a public way, and the question is, ‘Why is Facebook allowing this?'”. A valid question for anyone wondering why NAMBLA has existed as long as it has on Facebook (remember: 87 groups and 100s of links).

In response to an email from FoxNews.com, a spokesman from Facebook said “Facebook is highly self-regulating, and users can and do report content that they find questionable or offensive. Our team of investigations professionals reviews these reports, removes content that violates our policies, and escalates to law enforcement as necessary.” Moderation and regulation aside, what about the groups on Facebook that have been protesting against NAMBLA? Have their voices gone unheard, or are they simply being ignored? Another valid question, especially considering Facebook’s email response to FoxNews.

Sadly, the NAMBLA movement doesn’t end there. The FoxNews article also points out that NAMBLA supporters around the world use a blog called “boy chat”to provide advice to one another on how to solicit their victims on sites like Facebook. “Users provide tips on using the site to assist others in having real-life conversations with children; share tips for evading the eye of law enforcement while trolling Facebook for victims; post changes in privacy policy of social media sites; and even suggest specific individuals to target.”

Most people would find this news shocking, and they’d probably wonder exactly how a group like this can even exist in the first place-I know I did. According to FoxNews, NAMBLA members are protected by their First Amendment rights. As a form of free speech, advocates are able to freely express their feelings that boy/man relationships are “natural”, and the only reason these relationships are currently frowned upon in society is because of malicious consent laws which aim to “harm” young people. Michelle Collins of the National Center for Missing and Exploited Children said, “Thinking or advocating for adult-child sex is protected by the First Amendment, but committing acts of adult-child sex is illegal. The challenge for law enforcement is identifying when something goes from free speech to a crime being committed”.

Laws aside, the fact is that Facebook allowed this to happen. They can say that they don’t condone groups/members like NAMBLA on Facebook as much as they want, but when it takes national media attention to get rid of the problem, it’s kind of hard to believe that Facebook actually cares about the safety of their young members.

I think James Marsh, an attorney for victims of child sexual exploitation, summed it up perfectly when he said, “Facebook has a moral and public duty to monitor and stop this activity on their site. Hiding behind legal technicalities is not enough to be a good corporate citizen in the digital age,” Marsh said. “Facebook needs to put children ahead of profits and do what Congress and the American people expect — protect our kids from criminals like NAMBLA.”

Parents, don’t breathe a sigh of relief that you no longer have to worry because the NAMBLA group has been taken down. A few clicks away, your son or daughter may stumble upon the group dedicated to: “smoking crack and having unprotected sex with strangers”.

Blog at WordPress.com.
Entries and comments feeds.