Mobile devices physical spiritual issues
This presentation is the property of its rightful owner.
Sponsored Links
1 / 39

Mobile devices: Physical & Spiritual Issues PowerPoint PPT Presentation


  • 56 Views
  • Uploaded on
  • Presentation posted in: General

Mobile devices: Physical & Spiritual Issues. Ernest Staats Technology Director MS Information Assurance, CISSP, CEH, CWNA, Security+, MCSE, CNA, I-Net+, Network+, Server+, A+ [email protected] The Impact of Media. Resources available @ www.es-es.net/2.html.

Download Presentation

Mobile devices: Physical & Spiritual Issues

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Mobile devices physical spiritual issues

Mobile devices:Physical & Spiritual Issues

Ernest Staats

Technology Director

MS Information Assurance, CISSP, CEH, CWNA, Security+, MCSE, CNA, I-Net+, Network+, Server+, A+ [email protected]

The Impact of Media

Resources available @

www.es-es.net/2.html


Mobile devices physical spiritual issues

Communicate Monitor Report

COMMUNICATION


Mobile devices physical spiritual issues

Anti-virus softwareFiltering programsMonitoring software

Parental supervision

Parental supervision


Mobile devices physical spiritual issues

Establish rules for your child’s online life


Mobile devices physical spiritual issues

What’s your favorite thing to do online?

Show me the funniest YouTube video.

Let’s play your favorite online game.


Golden rules to teach

Golden Rules to Teach

Rules from “real” life apply: courtesy, kindness, modesty, dignity, respect for law and others, etc.

Don’t talk/txt / MMS strangers

Keep personal information private (No cell # on FB)

Anything posted on the internet is not private and lasts forever (including photos, videos, etc.)

Communicate if you encounter something uncomfortable


The influence of media

The Influence of Media

(75%) have a handheld device that is online

A breakdown of media consumption among types and age groups. Total media use time is lower than exposure due to a 30 percent average of "media multitasking.” Kaiser Family Foundation


The influence of media1

The Influence of Media

Teen Media Exposure Associated With Depression Symptoms in Young Adulthood http://www.health.am/psy/more/teen-media-exposure-associated-with-depression-symptoms/

Messages through media may reinforce aggression and other risky behaviors, interfere with identity development or inspire fear and anxiety

Cheating becomes much easier www.chacha.comwww.kgbanswers.comkgbkgb

Taken from "Association Between Media Use in Adolescence and Depression in Young Adulthood - A Longitudinal Study"


Mobile devices physical spiritual issues

3

579 Friends

See All


Mobile devices physical spiritual issues

Friend Requests

http://latimesblogs.latimes.com/technology/2011/05/teenager-arrested-for-ranking-female-classmates-looks-in-facebook-list.html


Mobile devices physical spiritual issues

Sending or posting provocative images

Sharing passwords with friends

Embarrassing or harassing people

Posting personal information

Clicking on pop-ups

Risky Online Behaviors

  • If it is on the Internet

  • IT IS NOT PRIVATE


Mobile devices physical spiritual issues

Privacy Settings

- My status, photos, and posts

- Family and relationships

- Photos and videos I’m tagged in

- Birthday

- Permission to comment on your posts

- Contact information

Share a tagged post with friends of the friend I tag

Friends Only


Mobile devices physical spiritual issues

Mobile Technologies


Sexting

Sexting

  • 22 % girls/18 % boys have electronically sent or posted nude or semi-nude images

  • 1/3 boys ¼ girls have had nude or semi-nude images shared with them

  • 40 percent report posting sexually suggestive messages

  • ½ receive sexually suggestive messages

http://voices.washingtonpost.com/parenting/2008/12/sexting.html


Geo tagging

GEO Tagging

  • August of 2010, Adam Savage, of “MythBusters,” took a photo of his vehicle using his smartphone. He then posted the photo to his Twitter account including the phrase “off to work”

  • Image contained metadata reveling the exact geographical location the photo

  • Savage revealed the exact location of his home, the vehicle he drives and the time he leaves for work

Read the full story here: http://nyti.ms/917hRh


Location aware lifestyle

Location-Aware Lifestyle

The following was published in

Wired Magazine in 2009

  • A woman in Golden Gate Park toke a photo with a phone. Because embedded geodata into photos uploaded to Flickr or Picasa, shots can be automatically placed on a map

  • Searched Flickr map, and score—a shot from today.

  • User’s photostream and determined it was the woman I had seen earlier

  • A cluster of images in one location revealed photos of an apartment interior—a bedroom, a kitchen, living room

Read the full story here:

http://bit.ly/bJqYmm


Turn off gps function on phones

Turn off GPS function on phones

  • Disable the geotagging function

  • Most smartphones/Tablets & several cameras automatically display geographical information

  • It’s important that users make efforts to turn off geotagging

  • More Info http://es-es.net/2.html


Scrubbing meta data

Scrubbing Meta Data

  • Software

    • Jpg and PNG metadata striper http://www.steelbytes.com/?mid=30

    • BatchPurifier LITE

      • http://www.digitalconfidence.com/downloads.html

    • Doc Scrubber

    • http://www.javacoolsoftware.com/dsdownload.html

  • Websites

    • http://regex.info/exif.cgi

    • http://trial.3bview.com/3BTrial/pages/clean.jsp


Geo tagging and metadata hands on

Geo Tagging and Metadata Hands on

  • Geo Tagg example from website

  • Meta data lets see the original pre edited photo

  • Can they get into your VM or fake the caller ID http://www.telespoof.com/freecall/agi

  • http://www.spoofcard.com/

  • http://www.telespoof.com/freecall/agi

  • www.spoofcard.com

  • http://www.slydial.com/apps.php


Mobile phones parental controls

Mobile Phones Parental Controls

  • Product Comparison 2010


Mobile devices physical spiritual issues

Sign Up

Email Address:

Password:

Save

Reportto the website, school, bully’s parents, or law enforcement

Block or ban

the bully from

contacting

your child

Set up a

new account

Save the

messages for evidence


Protector by taser

Protector™ by TASER

  • Cell-phone locking

  • Serious collision detection

  • Real-time GPS tracking

  • Unsafe driving alerts

  • Geo-fences are boundaries on a map that generate alerts when crossed.

  • any inbound call, text, or e-mail. Anything that comes into the child's phone would actually be routed to the parent's phone."

  • Read more: http://news.cnet.com/8301-19518_3-10433539-238.html#ixzz1Mn6tKT00


Phone tracking mobilespytool com

Phone Tracking mobilespytool.com

Call Log

Each incoming and outgoing number is logged along with duration and time stamp.

SMS (Text Messages) Log

Every text message is logged even if the phone's logs are deleted. Includes full text.

GPS Locations Log

GPS postions are uploaded every thirty minutes with a link to a map.

Contacts

Every contact on the phone is logged. New contacts added are also recorded.

Tasks

All personal tasks that are created are logged and viewable.

Memos

Every memo input into the phone is logged and viewable.

Cell ID Locations

ID information on all cell towers that the device enters into range of is recorded.

E-Mail Log

All inbound & outbound email activity from the primary email account is recorded.

Calendar Events

Every calendar event is logged. Date, time, and locations are recorded.

URL (Website) Log

All URL website addresses visited using the phone's browser are logged.

Photo & Video Log

All photos & videos taken by the phone are recorded & are viewable.


5 good privacy downloads

5 Good Privacy Downloads

  • Ghostery is a browser extension that is available for Internet Explorer, Firefox, Chrome and Safari

  • Web Browsers Traces Eraser provides an easy way to clear your internet history, cookies, cached files and more.

  • Adblock Plus for Chrome a Chrome add-on that makes ads disappear and offers more than 40 filters

  • CyberGhost VPN 2011, all web traffic is routed through an anonymised web server –

  • iPhone Tracker is a simple Mac OS X application that maps the information that your iPhone is recording about your movements.


Flexispy

FlexiSpy

  • Top of the range spyphone

  • Mobile Call Tapping, listen to actual phone calls

  • Remote Listening (Room bugging)

  • Read all incoming and outgoing SMS

  • Read all Call logs

  • Know the location, Location tracking

  • SIM Change SMS Notification


Mobile spy

Mobile Spy

  • Features

    • SMS Recording

    • Call details

      • Not voice recording

    • GPS Location

    • Log summaries

    • Works on practically all smart phones

  • Cost

    • $49.97 for 3 months

    • $69.97 for 6 months

    • $99.97 for 12 months


Options for iphone

Options for iPhone

  • K9 Web Protection Browser

    • Free

    • Trusted company

      • Blue Coat Systems, Inc.

    • Rated 3.5 Stars on first release

      • Updates follow quickly

  • Safe Eyes Mobile

    • $20.00

    • Trusted company

      • InternetSafety.com

    • Rated 3 stars

    • Rarely Updated


Mobistealth

MobiStealth

  • Features

    • Works on multiple phones

    • The features vary by make of phone

      • SMS Logging

      • Call recording

      • GPS tracking

      • Web Browser logging

  • Pricing

    • 12 months- Up to $200

    • 6 months- Up to $150

    • 3 months- Up to $100

http://www.mobistealth.com/products.php


Protect your personal info

Protect Your Personal Info

Avoid using discount cards to pay for anything that you want to keep private

Don’t send messages on an unsecured Wi-Fi network

Mask your identity when you search

Use search tools that can disconnect your computer’s identifying machine number from the search  http://www.scroogle.org/cgi-bin/scraper.htmVirual Machines

Pick passwords carefully

Chose different usernames

Read more: http://webupon.com/web-talk/digital-exposure-you-may-not-be-as-safe-as-you-think-you-are/#ixzz1GisN2LZY


Google yourself your kids

Google Yourself / Your Kids

What personal information is your child placing on blogs and personal WebPages?

http://www.pipl.com

http://www.peekyou.com

http://yoname.com

www.google.comwww.myfamily.com

www.zoominfo.com

www.alltheweb.comwww.zabasearch.com


Data mining with google

Data Mining with Google

Google search strings

site:myspace.com “SSN”

site:myspace.com “birthday”

site:myspace.com “Hate my parents” 31,100 hits

site:facebook.com "phone number“

Place name in quotation marks (use variations)

“First (Jon) Last”

Legal First (Jonathan) Last”

“First MI Last”

Use groups.google.com and google.com/alerts to look for

your child's name in newsgroups (address, phone number and other personal information)

Go to my website for a Google search tutorial

http://www.es-es.net/2.html


Good resources

Good Resources

www.netfamilynews.org

Quality and current “nonprofit news service for “kid-tech news.” Based on the premise that informal, engaged parenting is essential to kids’ constructive use of technology and the Net.”

www.pbs.org/parents/growingwithmedia

Provides information on how media “can shape your child’s development and what you can do to create a media-literate household.”

www.safekids.com

Provides a “guide to making the Internet and Technology fun, safe, and productive.”

www.besafeonline.org

Advice and information about Internet safety for parents and teachers, plus opportunities to discuss problems and share solutions.


Good resources1

Good Resources

www.getnetwise.org

GetNetWise is a public service created by Internet industry corporations and public interest groups with the goal of having “Internet users be only one click away from the resources they need to make informed decisions about their and their family's use of the Internet.”

www.netsmartz.org

Created by the National Center for Missing & Exploited Children and Boys & Girls Clubs of America, “the NetSmartz Workshop is an interactive, educational safety resource to teach kids and teens how to stay safer on the Internet.”

www.kids.us

Kids.us is an Internet domain where “affiliated sites are regularly screened and monitored” so that “parents and children can trust the sites to provide educational and appropriate online fun.”


Good resources2

Good Resources

www.commonsensemedia.org

Provides family-friendly reviews of media (TV, film, music, Web sites, games, and books) and parent tips on “healthy media diets” for families.

www.netmom.org

Run by the author of Net-mom's Internet Kids & Family Yellow Pages, a family-friendly directory to 3,500 of the best children's resources the Internet has to offer, this site highlights good sites for kids and provides safety tips for parents


Common chat terms

Common Chat Terms

POS --Parents are looking over my shoulder

POTS -- Parents over the shoulder (my parents are watching; I can't really talk)

P911-- My parents are in the room. P = Parents, and 911 = emergency; in other words, either drop the subject or watch the language

WTGP-- Want to go private? (move to a private chat room)

a/s/l or asl - - Age/Sex/Location -- (used to ask a chatter their personal information)

GGOH --Gotta get outta here

OLL --Online love

GTR --Got to run

TNT--'Til next time

LMIRL-- Let's meet in real life


Software recommendation sites

Software Recommendation Sites

The Safe Side – Stranger Safety Video

http://www.thesafeside.com/

Darkness to Light – 7 Steps to Protecting Our Children

http://www.darkness2light.org/

Cyberbully Resources

http://www.teenangels.org/

http://www.stopcyberbullying.org/index2.html

Google Alerts

http://www.google.com/alerts

National Center for Missing and Exploited Children

http://www.ncmec.org/

Son, Call Me Big Brother

http://wired.com/wired/archive/14.07/start.html?pg=8

Download your fav apps all at once

http://ninite.com/

Family Watchdog – National Sex Offender Search

http://www.familywatchdog.us


Software recommendation sites1

Software Recommendation Sites

Search for your local FBI field office

http://www.fbi.gov/contact/fo/fo.htm

A Parent's Guide to Internet Safety

http://www.fbi.gov/publications/pguide/pguidee.htm

Kidz Privacy

http://www.ftc.gov/bcp/conline/edcams/kidzprivacy/adults.htm

CyberTip Line, National Center for Missing and Exploited Children

http://www.missingkids.com/cybertip/

Safe Surfing with your Family, Safe Surfing Checklist

http://www.yahooligans.com/parents/checklist.html

Safeguards, Computer safety tips for your home and child

http://www.enough.org/safeguards.htm

Tips for Parents to Protect Children from Internet Predators, Guidelines for Parents

http://www.safekids.com/parent_guidelines.htm

Kids Rules for Online Safety

http://www.safekids.com/myrules.htm

Rules in Cyberspace

http://www.cybercrime.gov/rules/kidinternet.htm

Cyberbullying

http://cyberbully.org/

Chat Slang

http://www.web-friend.com/help/lingo/chatslang.html

NetLingo

http://www.netlingo.com/


Resources

Resources

All resources and more at my website (bottom of page)

http://www.es-es.net/2.html

Chat Abbreviation -PDF-Download

Cleaning Your Windows Computer -PDF-Download

Free Software for Home Users -PDF-Download

How to Check Your Computers History -PDF-Download 

I-Educator -PDF-Download

Internet Safety for Kids -PDF-Download

Internet terms -PDF-Download

Internet Safety Plan -PDF-Download

Internet Safety Tips for Parents -PDF-Download

Secure Mac step by Step -PDF-Download

Tracking People around town -PDF-Download

Internet Safety for Kids link list

www.packet-level.com/Kids is very graphic

www.webwisekids.com has excellent resources for parents


Bibliography

Bibliography

Tapscott, The N’ Generation, 1998: 1-2.

http://www.amazon.com/gp/product/0071347984/103-7584413-9423004?v=glance&n=283155

World Youth Report 2005

http://www.un.org/esa/socdev/unyin/wyr05.htm

The Henry J. Kaiser Family Foundation Study, 3/05

Kaiser Family Foundation

http://www.kff.org/

Numsum Myspace Stats

www.numsum.com

Media Central “The Buzz”

http://www.pewinternet.org/pdfs/PIP_Teens_Report.pdf

The National Youth Agency

www.nya.org.uk

The Search Agency

http://www.thesearchagency.com/ResourceLibrary/search_engine_stat.aspx?sCatId=2

10. Internet Addiction by Wendi Kannenberg http://gien.adventist.org/forum2006/presentations/kannenberg-online-addictions.pdf

11. Internet Safety for Kids

www.packet-level.com/kids

12. US News and World Report – Special Report- September 18,2006

www.usnes.com

13. 'Predator's Playground‘?

http://www.msnbc.msn.com/id/11065951/site/newsweek/

14. Decoding MySpacehttp://www.usnews.com/usnews/news/articles/060910/18myspace_5.htm


  • Login