home

=Internet Safety Resources for GCHS Teachers=

This page will serve as a resource for meeting the requirements of Internet Safety training for students. Additions will be made and teachers are free to choose the ones that they feel are most relevant.

**NY Criminal Justice PowerPoint**
The following link will take you to a PowerPoint Presentation from the NY State Criminal Justice Department. About halfway down the page, you will find Internet Safety - Presentations and resources. Click on Middle and High School. Under that tab you will see the first screen of the presentation. Just under it is the PPT. Click on //Internet Safety - For Middle and High School//. Let the computer open it with PowerPoint and you will be ready to go. There are notes to go along with each slide, which I have included below. If you are more comfortable with a hard copy you can print this out. I will email you a Word document with the notes on it, also. There are links within the presentation to short videos with lots of discussion possibilities. You can use this one resource for several lessons.

[]
 * LInk to the PowerPoint Presentation:**

Notes for the PowerPoint Presentation (by slide #)
Slide 2 - **We will be discussing several topics during this presentation, including online**
 * relationships, the importance of keeping personal information private, protecting**
 * your reputation, cyber bullying, and safety tips.**

Slide 3 - **Have you ever developed an online relationship with someone? Do you have online**
 * friends that you have never met in real life? If you don’t know someone in real life,**
 * you really don’t know who they are. It doesn’t matter how long they have been on**
 * your friends list or buddy list. You can’t be sure that they are telling the truth or are**
 * who they say they are.**

Slide 4 -**Kacie Rene Woody was a typical 13-year-old girl. She was a good student, a**
 * member of the school band and liked going online. Kacie met 18 year old David**
 * Fagan in a Christian chat room for teens. She didn’t doubt his identity because the**
 * picture posted in David’s profile was of a brown hair, blue eye teenage boy. What**
 * Kacie didn’t know was that David Fagan didn’t really exist.**
 * (Click mouse) She was really talking to 47 year old David Fuller. He had used a**
 * photo of a nephew in his profile. Fuller was an Internet predator who had set his**
 * sights on Kacie. She made the fatal mistake of sharing personal information with**
 * him. Fuller tracked Kacie from his home in San Diego, California to the small town**
 * in Arkansas where she lived. He abducted and then killed her before committing**
 * suicide.**
 * This is a tragic story and we should all learn something from such a tragedy.**
 * (Click mouse)**
 * Predators will use information obtained from children to gain trust and**
 * friendship - When Kacie told Fuller about witnessing her mother’s death in a**
 * traffic accident, Fuller told Kacie that he had an aunt that lived in Arkansas who**
 * had also been in a traffic accident, was in a coma and expected to die soon. This**
 * is one way he established a bond of trust and friendship.**
 * Unless you know someone in person, you don’t really know who they are on**
 * the Internet. Fuller portrayed himself as 18 years old and Kacie believed him.**
 * Anyone is vulnerable - Kacie’s father was a police officer and she lived in small**
 * town, but once she logged onto the world wide web, she was no longer just a part**
 * of the small community she physically lived in.**

Slide 5 - **Kacie made the fatal mistake of giving out personal information. She told Fuller her**
 * phone number. Sometimes you can inadvertently give out information that helps**
 * someone track you online. The video “Tracking Theresa” demonstrates just how**
 * easy it is to track someone online.**
 * Play Video.**

Slide 6 - **Anyone who really cares about you would not want to isolate you from your family**
 * or friends, turn you against your parents, make you keep secrets, send**
 * inappropriate material or even threaten you.**

Slide 7 - **I know that teens are curious about sex, seek attention and affection and**
 * sometimes want to rebel against parents. Sexual predators know this too and will**
 * use this in order to exploit you and your friends. Online predators will say and**
 * promise anything in order to gain your trust and friendship. Amy developed an**
 * online relationship with someone and then ran away with him. Listen carefully, as**
 * Amy recalls the mistakes she made in believing the promises that Bill made to her.**
 * Watch video.**
 * Amy told us about the feelings that she was having, but didn’t know that her friends**
 * were having the same feelings. You need to recognize when you are having those**
 * types of feelings and talk to a friend or trusted adult that you know in real life - not**
 * an online stranger.**

Slide 8 **- Beware when someone says…**
 * “Let’s go private” – predators want you to leave the public chatroom and create a**
 * private chat or move to instant-messaging or phone texting. This is a preferred**
 * communication method of predators.**
 * “Where’s your computer in the house” – predators ask this to see if parents might**
 * be around.**
 * “I know someone who can get you a modeling job” – predators think flattery will get**
 * them everywhere.**
 * “Who’s your favorite band?” – questions like these tell the groomer more about you**
 * so they know what gifts to offer – e.g. concert tickets.**

Slide 9 **- “You seem sad. Tell me what’s bothering you.” – pretending to be sympathetic is a**
 * common trick.**
 * “You are the love of my life.” – this is what Amy fell for before traveling out of state**
 * to meet someone who’d groomed her.**
 * “What’s your phone number?” - asking for personal info of any kind - usually**
 * happens at a later stage, after the target’s feeling comfortable with the groomer -**
 * but all online kids know not to give out personal info online, RIGHT?!**
 * “If you don’t …do what I ask, I'll tell your parents OR share your photos in a photo**
 * blog/webcam directory/file-sharing network” - intimidation is used as the groomer**
 * learns more and more about the target. We will talk more about this subject in a little**
 * while.**

Slide 10 - **Most people think that girls are the only victims of predators, but it happens to boys**
 * too. This next true story, Survivor Diaries, is about two boy who were victimized by**
 * people they met online.**
 * Play Video**

Slide 11 - **What happened to Ryan and Noah was terrible, but that wasn’t the end of their**
 * story. They told someone about their abuse. It is important that you do the same.**
 * If someone makes you uncomfortable online, you and your trusted adult can report**
 * the situation to the New York State Internet Crimes Against Children Task Force.**
 * You can report:**
 * •Anyone who sends you revealing photos or videos.**
 * •Anyone talking to you about sex.**
 * •Anyone who asks to meet you offline.**
 * It is important to report, even if you aren’t bothered by it. You can help protect**
 * someone else, maybe even someone close to you. Reporting means you are**
 * standing up for yourself and making sure no one else becomes a victim.**

Slide 12 - **If someone wants to meet with you in real life, don’t be flattered, be suspicious. Any**
 * person worth having as a friend would be concerned about their own safety too.**

Slide 13 - **14 year old Kara Borden met 18 year old David Ludwig on MySpace. The**
 * two established an online relationship that led to Kara sneaking out of her**
 * house during the night to meet him. When Kara’s parents caught her**
 * sneaking back in the house, they insisted that Kara end the relationship.**
 * They also insisted on meeting Ludwig to tell him this. When Ludwig showed**
 * up at the house, he shot and killed both parents as Kara looked on. While**
 * these instances are rare, it is important to recognize that they can happen**
 * and that online contacts are not necessarily “friends” in fact, they may be**
 * dangerous.**

Slide 14 - **SAT scores are no longer the only consideration for getting into a good college.**
 * Before sending out acceptance letters, some college admission officers are**
 * checking out perspective student’s Facebookand other social networking sites**
 * pages. Police officers are looking for crime online and some employers are even**
 * firing people because of photos posted in profiles and other online activity.**

Slide 15 - **Remember that there is no such thing as a private conversation online. It doesn’t**
 * matter if you are communicating with a friend on Facebook, Twitter or Skype;**
 * anyone can copy and paste your conversation and images.**

Slide 16 - **Never give out personal information in any public areas.**

Slide 17 - **Many teens have found themselves in a dangerous situation after sharing personal**
 * information online with strangers.**
 * Keep settings on private – friends only, including your profile, IM, and your online**
 * calendar or Facebook events.**

Slide 18 - **To make your Facebook viewable to friends only, do the following:**
 * 1. Click on Account.**
 * 2. Click on Privacy Settings.**
 * 3. Choose Friends Only.**
 * 4. Click on Apply These Settings.**

Slide 19 - **Check with your friends first before posting information about them. Always protect**
 * you privacy and theirs.**
 * Check to see what your friends are posting about you. If anything makes you**
 * uncomfortable, ask them to remove it.**

Slide 20 - **Many people believe they can be anonymous on message boards, but there are**
 * plenty of creepy losers out there who have the skills and time to figure out who you**
 * are, and then harass and make your life very difficult. Be cautious of what and**
 * where you are posting on message boards. Also, beware of the many scams**
 * published on messages boards. Unfortunately, there are many messages and ads**
 * that try to take advantage of people.**

Slide 21 - **Imagine that you’ve been invited to a party. When you arrive, you realize it is a huge**
 * party with hundreds of people, but when you enter the room, the lights are off, the**
 * room is very dark, you can’t see the people and their voices are distorted, so you**
 * can’t even tell who is male or female. Would you walk around that party handing**
 * people your picture, or telling them your address or phone number?**
 * Remember that any picture you upload to the Web can be downloaded by anyone**
 * and be copied or posted online forever.**

Slide 22 - **It is important to be careful about the types of text messages, pictures and videos**
 * you send over your cell phone. The consequences of sending sexually explicit**
 * messages or images can be staggering. Many kids can end up being the target of**
 * bullying, harassment and some can even face criminal charges.**
 * Sexting is the sending of sexual messages, pictures, or videos through cell phones.**
 * Sometimes sexting is considered child pornography, which is a crime. Even**
 * teenagers can be registered as sex offenders for sexting.**
 * Play Video.**

Slide 23 - **Listen to this true story: A 14-year-old girl took a nude picture on her cell phone and**
 * sent it to a few friends as a joke. Those friends sent it to a few of their friends, and**
 * then a few of theirs, until as many as 200 people had seen it. Not only was she**
 * humiliated, she was arrested for creating child pornography. You might think that**
 * you can do anything with your body on your phone, but do you want to take that**
 * chance?**
 * Even if you are not the one taking the picture, you could still be arrested for**
 * forwarding it to your friends, like six boys were in Massachusetts.**
 * Play Video.**

Slide 24 - **Emily was a student at Eisenhower High School in New Berlin, Wisconsin, a suburb**
 * of Milwaukee. Like many girls her age, she had lots of friends on Facebook and**
 * was especially popular with the boys. Unfortunately, Emily didn’t really exist and**
 * was the creation of this boy, (click mouse) 18 year old Anthony Stancl. Stancl had**
 * an elaborate scheme where he convinced other boys at Eisenhower High School to**
 * send sexually explicit photos of themselves. The boys believed they were sharing**
 * the pictures with Emily. In the end, 39 boys were victimized.**

Slide 25 - **Blackmailers using compromising photos attempt to force children and teens to take**
 * more explicit photos, perform on webcams, or to actually meet them for**
 * inappropriate contact. There have even been cases where hackers have accessed**
 * computers through peer-to-peer file sharing sites and using malicious software,**
 * obtained photos stored on the computer and other information such as credit cards,**
 * websites and accounts. Some have even taken over the computer, activating the**
 * webcam without the owners knowledge.**
 * If you ever make the mistake of sending an inappropriate picture of yourself or if**
 * someone obtains the image and tries to blackmail you, you must tell your parents**
 * or the police. Giving into the extortion demands will only get worse. Seek help from**
 * a trusted adult.**

Slide 26 - **Don’t respond. If someone bullies you, remember that your reaction is usually**
 * exactly what the bully wants. It gives him or her power over you. Who wants to**
 * empower a bully?.**
 * Don’t retaliate. Getting back at the bully turns you into one and reinforces the**
 * bully’s behavior. Help avoid a whole cycle of aggression.**
 * Save the evidence. The only good news about digital bullying is that the harassing**
 * messages can usually be captured, saved, and shown to someone who can help.**
 * You need to do this even if it’s minor stuff, in case things escalate.**
 * Talk to a trusted adult. You deserve backup. It’s always good to involve a parent**
 * but – if you can’t – a school counselor usually knows how to help. Sometimes both**
 * are needed. If you’re really nervous about saying something, see if there’s a way to**
 * report the incident anonymously at school.**

Slide 27 -
 * __Block the bully.__ If the harassment’s coming in the form of instant messages, texts,**
 * or profile comments, do yourself a favor: Use preferences or privacy tools to block**
 * the person. If it’s in chat, leave the “room.”**
 * __Be civil.__ Even if you don’t like someone, it’s a good idea to be decent and not sink**
 * to the other person’s level. Also, research shows that gossiping about and trash**
 * talking others increases your risk of being bullied. Treat people the way you want to**
 * be treated.**
 * __Don’t be a bully.__ How would you feel if someone harassed you? You know the old**
 * saying about walking a mile in someone’s shoes; even a few seconds of thinking**
 * about how another person might feel can put a big damper on aggression. That’s**
 * needed in this world. It’s easy to be misunderstood in an email, IM or text. When**
 * you are joking about something, add a smiley face or JK to ensure the recipient**
 * knows that you are joking.**
 * __Be a friend, not a bystander.__ Watching or forwarding mean messages empowers**
 * bullies and hurts victims even more. If you can, tell bullies to stop or let them know**
 * harassment makes people look stupid and mean. It’s time to let bullies know their**
 * behavior is unacceptable – cruel abuse of fellow human beings. If you can’t stop the**
 * bully, at least try to help the victim and report the behavior.**

Slide 28 - **If you have a blog where other people can make comments, check them often. Use**
 * the option to approve comments before they are posted to your page.**
 * Do not respond to offensive messages. Delete them and block that person from**
 * making addition comments.**

Slide 29 - **Do not say anything online that you wouldn’t say offline. Once you post something**
 * online, you can’t take it back.**

Slide 30 - **Play video.**

Slide 31 - **Don’t use passwords that are easy for someone to guess, such as birth date or**
 * nickname. Use strong passwords with a combination of letters, numbers and**
 * symbols.**
 * You should share your password with your parents, but no one else, not even your**
 * best friend.**
 * Let’s watch a video that tells the true story of a girl who was the victim of**
 * cyberbullying after she shared her password with her best friend.**
 * Play video.**

Slide 32 - **Talk to a trusted adult if anything makes you feel scared, uncomfortable or**
 * confused.**
 * Do not respond to messages that are rude or offensive. Responding to this type of**
 * message may encourage the sender. If it continues, block the user on IM, email,**
 * chat or social networking sites.**
 * Save message that could be used by law enforcement as evidence, especially if**
 * someone physically threatens you.**

Slide 33 - **Don’t post personal information.**
 * Copyright laws are for real and you must be careful when downloading and sharing**
 * music. Recently more than 18,000 file-sharers were sued by the recording industry**
 * association. Settlement costs can be as much as $3,000. A letter to one Ohio**
 * University student told her that she distributed 787 audio files, putting her total**
 * minimum potential liability at more than $590,000."**
 * Don’t forward emails to “everyone” in your address book. If you receive a chain**
 * letter in an email, remember that chain letters are tricks and usually contain a virus**
 * or worm. Nothing bad will happen if you just delete the chain letter.**
 * Use strong passwords and keep them confidential.**

Slide 34 - **Any crook or criminal can set up a website. Before downloading anything, be sure it**
 * is a trusted site.**
 * Recently, people have received emails requesting them to click on a link to**
 * MySpace. Once they go to the link, they enter their username and password. But**
 * the site isn’t really MySpace, it is a mirror site and the criminal now has that**
 * person’s password.**
 * Never link to a website in an email sent from someone you don’t know.**

Slide 35 - **Ask yourself some questions before running away.**

Slide 36 - **If you ever think you are in a situation so bad that you want to runaway, remember**
 * that you have options.**
 * Talk to someone you trust, call the National Runaway Switchboard or the Covenant**
 * House 9 line.**

Slide 37 - **Remember the 4 R’s.**
 * Recognize techniques used by online predators to deceive**
 * their victims.**
 * Refuse requests for personal information.**
 * Respond assertively if you are ever in an uncomfortable**
 * situation while online. Exit the program, log off or turn off the**
 * computer…**
 * Report to a parent or other trusted adult any suspicious or**
 * dangerous contact that makes you uncomfortable.**

NetSmartz
Netsmartz is a great site with videos for all grade levels, as well as activity cards and games. The following link will take you to the home page. [|**http://www.netsmartz.org/index.aspx**]


 * To go straight to the download page:**
 * []**

= =

**Videos that are blocked at school, but can be viewed at home, sent to Zamzar, and accessed from school.**
[|http://www.youtube.com/watch?v=WBdONRZOrdw&feature=player_embedded#!] [] [] []


 * Under construction******
 * The following PowerPoints were done by Marlene Boney, a Technology Trainer for Knox County schools. I removed some slides that were only applicable to parents. If you want to see the entire presentations, go to this link: internetsafety.instech.knoxschools.org**

CyberBullying:
If you click on the link in the presentation, Stopping a CyberBully 101, it will take you to an online article with additional links.

Lesson [] Worksheets [] ** Your Online Image ** Lesson [] Worksheets [] ** Managing Passwords ** Lesson [] Worksheets [] ** Safeguarding Your Students ** Lesson [] Worksheets []
 * Online Identity Theft **

[]