Teen Safe Outline and Synopsis
We challenge students to expand their day to day consciousness into the virtual world because what we do online lasts many lifetimes whereas what we do in the physical world lasts for a moment.
Why are we addicted to app's?
What will happen to young people in the future since this generation interacts in a manner that did not exist with previous generations?
We are online lab rats and we need to be smart online lab rats. Images uploaded by students now will never fade, and will remain online long after our own lifetimes. Digital generations need to appreciate and accept the implications of that visibility longevity.
We describe web space and its basic construct. We talk about mobile app's and highlight differences between them and how they are targeted online.
Wifi is a basic component of any students life but often least understood. We discuss probes and demonstrate how phones connect to networks without the knowledge of the owner. We demonstrate these capabilities live and students are often shocked to find that the phones in their pockets are transacting online without their knowledge, and that we can view that transaction live before them.
We discuss the vulnerability of passwords and people's predictable bad habits. We demonstrate a live search through 3 billion hacked accounts showing all from usernames and passwords, to credit card details and more.
There is a huge array of tools and programming techniques available to find people online. OSINT (open source intelligence) is about discovering freely available data and it's analysis and compilation into usable information.
In reality it's about any means to find, hack, purchase or otherwise acquire data. That's it..... no fairy stories! Plain and simple. It's about data brokers - verifying CV's - rooting out online offenders - verifying information. It's about data.
We demonstrate live OSINT online tool arrays; search handwriting and images; show facial recognition; search social media and visualise data through commercial software like Maltego, SocialNet, SocialLinks, real-time monitoring and gauge sentiment.
A photo is taken on a digital device, so where does it go? Where is it stored or backed up to? Who receives the image - how - and what can they do with it?
Different types of cameras are commonly used for straight shots, but what about candid photography where the subject doesn't know that the photo is being recorded? We demonstrate motion sensitive, FLIR and IR cameras increasing used in entertainment venues to capture images without the knowledge of those featured.
We describe how images are traded; how subjects are identified; why image and identity trading are so popular online.
We show boys online distributing girls images and identifying them through name and location on bulletin boards; interacting with dangerous online elements that are a threat to young people anywhere;.
We show through case study images and data that it is possible to negatively affect the safety and privacy of family members and others through excessive online exposure to identity and geo-location techniques.
This is the raw power of Teen Safe at its very best. Real information, demonstration and explanation. This is where the world or the online teenager meets the investigative techniques of the online researcher.
We show case studies of image tracing; image geo-location techniques; realtime social media image upload monitoring; and then we integrate WiFi and social media geo-location combined into a stunning demonstration of online surveillance.
There are a myriad of threats to safety online though the three most prevalent in the world of the teenager are trolling, bullying and grooming. Trolling is a very bothersome nuisance; bullying is a major factor in the realm of emerging teenage life; and grooming/sextortion is in a league of its own.
The perpetrator behind the screen has no sense of the real suffering of the victim and uses the screen as a shield. We describe these three elements through case study and show the student that they can be dealt with. We particularly highlight the peril in taking online friends that are unknown in real life, and the element of natural trust that can betray us when online.
A student's online journey largely begins in primary school, and accelerates dramatically upon entering second level education, though by sixth year, the attitude to online exposure has changed towards the need to be more private.
We consider the image that has been projected up and until now. Then we take stock and think about the image that we want to project to employers, our friends, our family, and the generations in the future that will look at our lives online when we are old and infirm.
Then we build that image and behave as smart lab rats. We play the information game and use the knowledge gained in the presentation to understand what we need to do to build the digital footprint will benefit us for a lifetime and beyond.
There are many demonstrations including phone probe monitoring, phone traffic capture and visualisation, intercepting web site login requests and gathering credentials, finding hacked credentials online, tracing emails, social media data visualisation, exposing hidden friends lists, analysing posts for sentiment, web site spidering and analysis, etc etc etc. We seek to build a realistic picture of digital space so that students can appreciate that environment and make good decisions about how they use it. As much as we inform, we also inspire.
Teen Safe from Child Watch - a unique digital education for Irish students.
Sample: scene 1 - Where am I?
I am physically in this classroom.
If tomorrow I’m asked to recall where I was at this time today then I will recount that I was here, in this classroom, speaking with you.
So I am there! I am also on the internet. This is digital space.
A young person would not be allowed to access an adult magazine in a newsagent store, but likely has little restriction accessing material through the internet.
Much of what can be viewed online would not be published in an adult magazine.
That young person is not equipped to deal with the material that they will encounter online and this is often a basis for badly judged behaviour in the physical world that can lead to all manner of difficulties for everyone involved..
The image is going into digital space where she has no control of it and a huge audience may view it - so why lock the door?
Parents believe that their children know more than they do about the technology that they use - and for the most part, they do!
But only a little....... After visiting over 88,000 students in 8 years, we know that it is only a little.
It has thrown parenting into disarray - left law makers struggling to find a correct or feasible path to safeguard - and unlocked the parent/child hierarchy since now that child can get out from under the parental wing much earlier than before.
educate - educate - educate
real digital world education
Sample: consolidated WiFi & social media demo
The demo was made possible because the area had received a level of wifi mapping, and local students had been actively uploading social media content with location services enabled.
The combination of these circumstances integrated with our wifi hacking demo means that we were able to produce this sequence that we offer as a case study.
There are many demonstrations ranging from monitoring phone traffic, to social media data visualisation, exposing hidden friends lists, analysing posts for sentiment, tracing hacked accounts and exposing passwords, password profiling ......
Teen Safe from Child Watch - a unique digital education for Irish students.