Mobile devices physical spiritual issues
1 / 39

Mobile devices: Physical & Spiritual Issues - PowerPoint PPT Presentation

  • Uploaded on

Mobile devices: Physical & Spiritual Issues. Ernest Staats Technology Director MS Information Assurance, CISSP, CEH, CWNA, Security+, MCSE, CNA, I-Net+, Network+, Server+, A+ [email protected] The Impact of Media. Resources available @

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about ' Mobile devices: Physical & Spiritual Issues' - wilson

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Mobile devices physical spiritual issues
Mobile devices:Physical & Spiritual Issues

Ernest Staats

Technology Director

MS Information Assurance, CISSP, CEH, CWNA, Security+, MCSE, CNA, I-Net+, Network+, Server+, A+ [email protected]

The Impact of Media

Resources available @

Anti-virus softwareFiltering programsMonitoring software

Parental supervision

Parental supervision

What’s your favorite thing to do online?

Show me the funniest YouTube video.

Let’s play your favorite online game.

Golden rules to teach
Golden Rules to Teach

Rules from “real” life apply: courtesy, kindness, modesty, dignity, respect for law and others, etc.

Don’t talk/txt / MMS strangers

Keep personal information private (No cell # on FB)

Anything posted on the internet is not private and lasts forever (including photos, videos, etc.)

Communicate if you encounter something uncomfortable

The influence of media
The Influence of Media

(75%) have a handheld device that is online

A breakdown of media consumption among types and age groups. Total media use time is lower than exposure due to a 30 percent average of "media multitasking.” Kaiser Family Foundation

The influence of media1
The Influence of Media

Teen Media Exposure Associated With Depression Symptoms in Young Adulthood

Messages through media may reinforce aggression and other risky behaviors, interfere with identity development or inspire fear and anxiety

Cheating becomes much easier www.chacha.comwww.kgbanswers.comkgbkgb

Taken from "Association Between Media Use in Adolescence and Depression in Young Adulthood - A Longitudinal Study"


579 Friends

See All

Friend Requests

Sending or posting provocative images

Sharing passwords with friends

Embarrassing or harassing people

Posting personal information

Clicking on pop-ups

Risky Online Behaviors

  • If it is on the Internet


Privacy Settings

- My status, photos, and posts

- Family and relationships

- Photos and videos I’m tagged in

- Birthday

- Permission to comment on your posts

- Contact information

Share a tagged post with friends of the friend I tag

Friends Only


  • 22 % girls/18 % boys have electronically sent or posted nude or semi-nude images

  • 1/3 boys ¼ girls have had nude or semi-nude images shared with them

  • 40 percent report posting sexually suggestive messages

  • ½ receive sexually suggestive messages

Geo tagging
GEO Tagging

  • August of 2010, Adam Savage, of “MythBusters,” took a photo of his vehicle using his smartphone. He then posted the photo to his Twitter account including the phrase “off to work”

  • Image contained metadata reveling the exact geographical location the photo

  • Savage revealed the exact location of his home, the vehicle he drives and the time he leaves for work

Read the full story here:

Location aware lifestyle
Location-Aware Lifestyle

The following was published in

Wired Magazine in 2009

  • A woman in Golden Gate Park toke a photo with a phone. Because embedded geodata into photos uploaded to Flickr or Picasa, shots can be automatically placed on a map

  • Searched Flickr map, and score—a shot from today.

  • User’s photostream and determined it was the woman I had seen earlier

  • A cluster of images in one location revealed photos of an apartment interior—a bedroom, a kitchen, living room

Read the full story here:

Turn off gps function on phones
Turn off GPS function on phones

  • Disable the geotagging function

  • Most smartphones/Tablets & several cameras automatically display geographical information

  • It’s important that users make efforts to turn off geotagging

  • More Info

Scrubbing meta data
Scrubbing Meta Data

  • Software

    • Jpg and PNG metadata striper

    • BatchPurifier LITE


    • Doc Scrubber


  • Websites



Geo tagging and metadata hands on
Geo Tagging and Metadata Hands on

  • Geo Tagg example from website

  • Meta data lets see the original pre edited photo

  • Can they get into your VM or fake the caller ID





Mobile phones parental controls
Mobile Phones Parental Controls

  • Product Comparison 2010

Sign Up

Email Address:



Reportto the website, school, bully’s parents, or law enforcement

Block or ban

the bully from


your child

Set up a

new account

Save the

messages for evidence

Protector by taser
Protector™ by TASER

  • Cell-phone locking

  • Serious collision detection

  • Real-time GPS tracking

  • Unsafe driving alerts

  • Geo-fences are boundaries on a map that generate alerts when crossed.

  • any inbound call, text, or e-mail. Anything that comes into the child's phone would actually be routed to the parent's phone."

  • Read more:

Phone tracking mobilespytool com
Phone Tracking

Call Log

Each incoming and outgoing number is logged along with duration and time stamp.

SMS (Text Messages) Log

Every text message is logged even if the phone's logs are deleted. Includes full text.

GPS Locations Log

GPS postions are uploaded every thirty minutes with a link to a map.


Every contact on the phone is logged. New contacts added are also recorded.


All personal tasks that are created are logged and viewable.


Every memo input into the phone is logged and viewable.

Cell ID Locations

ID information on all cell towers that the device enters into range of is recorded.

E-Mail Log

All inbound & outbound email activity from the primary email account is recorded.

Calendar Events

Every calendar event is logged. Date, time, and locations are recorded.

URL (Website) Log

All URL website addresses visited using the phone's browser are logged.

Photo & Video Log

All photos & videos taken by the phone are recorded & are viewable.

5 good privacy downloads
5 Good Privacy Downloads

  • Ghostery is a browser extension that is available for Internet Explorer, Firefox, Chrome and Safari

  • Web Browsers Traces Eraser provides an easy way to clear your internet history, cookies, cached files and more.

  • Adblock Plus for Chrome a Chrome add-on that makes ads disappear and offers more than 40 filters

  • CyberGhost VPN 2011, all web traffic is routed through an anonymised web server –

  • iPhone Tracker is a simple Mac OS X application that maps the information that your iPhone is recording about your movements.


  • Top of the range spyphone

  • Mobile Call Tapping, listen to actual phone calls

  • Remote Listening (Room bugging)

  • Read all incoming and outgoing SMS

  • Read all Call logs

  • Know the location, Location tracking

  • SIM Change SMS Notification

Mobile spy
Mobile Spy

  • Features

    • SMS Recording

    • Call details

      • Not voice recording

    • GPS Location

    • Log summaries

    • Works on practically all smart phones

  • Cost

    • $49.97 for 3 months

    • $69.97 for 6 months

    • $99.97 for 12 months

Options for iphone
Options for iPhone

  • K9 Web Protection Browser

    • Free

    • Trusted company

      • Blue Coat Systems, Inc.

    • Rated 3.5 Stars on first release

      • Updates follow quickly

  • Safe Eyes Mobile

    • $20.00

    • Trusted company


    • Rated 3 stars

    • Rarely Updated


  • Features

    • Works on multiple phones

    • The features vary by make of phone

      • SMS Logging

      • Call recording

      • GPS tracking

      • Web Browser logging

  • Pricing

    • 12 months- Up to $200

    • 6 months- Up to $150

    • 3 months- Up to $100

Protect your personal info
Protect Your Personal Info

Avoid using discount cards to pay for anything that you want to keep private

Don’t send messages on an unsecured Wi-Fi network

Mask your identity when you search

Use search tools that can disconnect your computer’s identifying machine number from the search Machines

Pick passwords carefully

Chose different usernames

Read more:

Google yourself your kids
Google Yourself / Your Kids

What personal information is your child placing on blogs and personal WebPages?

Data mining with google
Data Mining with Google

Google search strings “SSN” “birthday” “Hate my parents” 31,100 hits "phone number“

Place name in quotation marks (use variations)

“First (Jon) Last”

Legal First (Jonathan) Last”

“First MI Last”

Use and to look for

your child's name in newsgroups (address, phone number and other personal information)

Go to my website for a Google search tutorial

Good resources
Good Resources

Quality and current “nonprofit news service for “kid-tech news.” Based on the premise that informal, engaged parenting is essential to kids’ constructive use of technology and the Net.”

Provides information on how media “can shape your child’s development and what you can do to create a media-literate household.”

Provides a “guide to making the Internet and Technology fun, safe, and productive.”

Advice and information about Internet safety for parents and teachers, plus opportunities to discuss problems and share solutions.

Good resources1
Good Resources

GetNetWise is a public service created by Internet industry corporations and public interest groups with the goal of having “Internet users be only one click away from the resources they need to make informed decisions about their and their family's use of the Internet.”

Created by the National Center for Missing & Exploited Children and Boys & Girls Clubs of America, “the NetSmartz Workshop is an interactive, educational safety resource to teach kids and teens how to stay safer on the Internet.” is an Internet domain where “affiliated sites are regularly screened and monitored” so that “parents and children can trust the sites to provide educational and appropriate online fun.”

Good resources2
Good Resources

Provides family-friendly reviews of media (TV, film, music, Web sites, games, and books) and parent tips on “healthy media diets” for families.

Run by the author of Net-mom's Internet Kids & Family Yellow Pages, a family-friendly directory to 3,500 of the best children's resources the Internet has to offer, this site highlights good sites for kids and provides safety tips for parents

Common chat terms
Common Chat Terms

POS --Parents are looking over my shoulder

POTS -- Parents over the shoulder (my parents are watching; I can't really talk)

P911-- My parents are in the room. P = Parents, and 911 = emergency; in other words, either drop the subject or watch the language

WTGP-- Want to go private? (move to a private chat room)

a/s/l or asl - - Age/Sex/Location -- (used to ask a chatter their personal information)

GGOH --Gotta get outta here

OLL --Online love

GTR --Got to run

TNT--'Til next time

LMIRL-- Let's meet in real life

Software recommendation sites
Software Recommendation Sites

The Safe Side – Stranger Safety Video

Darkness to Light – 7 Steps to Protecting Our Children

Cyberbully Resources

Google Alerts

National Center for Missing and Exploited Children

Son, Call Me Big Brother

Download your fav apps all at once

Family Watchdog – National Sex Offender Search

Software recommendation sites1
Software Recommendation Sites

Search for your local FBI field office

A Parent's Guide to Internet Safety

Kidz Privacy

CyberTip Line, National Center for Missing and Exploited Children

Safe Surfing with your Family, Safe Surfing Checklist

Safeguards, Computer safety tips for your home and child

Tips for Parents to Protect Children from Internet Predators, Guidelines for Parents

Kids Rules for Online Safety

Rules in Cyberspace


Chat Slang



All resources and more at my website (bottom of page)

Chat Abbreviation -PDF-Download

Cleaning Your Windows Computer -PDF-Download

Free Software for Home Users -PDF-Download

How to Check Your Computers History -PDF-Download 

I-Educator -PDF-Download

Internet Safety for Kids -PDF-Download

Internet terms -PDF-Download

Internet Safety Plan -PDF-Download

Internet Safety Tips for Parents -PDF-Download

Secure Mac step by Step -PDF-Download

Tracking People around town -PDF-Download

Internet Safety for Kids link list is very graphic has excellent resources for parents


Tapscott, The N’ Generation, 1998: 1-2.

World Youth Report 2005

The Henry J. Kaiser Family Foundation Study, 3/05

Kaiser Family Foundation

Numsum Myspace Stats

Media Central “The Buzz”

The National Youth Agency

The Search Agency

10. Internet Addiction by Wendi Kannenberg

11. Internet Safety for Kids

12. US News and World Report – Special Report- September 18,2006

13. 'Predator's Playground‘?

14. Decoding MySpace