Presentation Content

Presentation mood and orientation
It was recently remarked by a senior career teacher and administrator that is was very interesting to see the same presentation screens delivered in a direct 'no punches pulled' manner to senior students while morphing into a fairy tale for juniors.

In another school where advanced content was presented to adult students it was observed that students were brought right to the door of understanding the world of online pornography, both legal and illegal but never brought through that door.

The goal with any audience irrespective of age or maturity is to deliver our content so that they understand and appreciate the information offered without feeling that they are being assaulted by it. That is a skill acquired through almost ten years to practice with students, staff and parents and the making of television documentaries delivered during evening prime time hours. We are extremely careful to correctly appreciate all members of our audience and adjust our delivery accordingly.

Content Note
Following are key elements of our presentation that would be recognisable to people attending with these restrictions: ADVANCED content is for senior secondary students (5th / 6th years) - HIGHLY ADVANCED content is for an all-adult audience and usually only upon special request.

Speaker Note
Child Watch speakers are Garda vetted and retain Professional Indemnity Insurance.

Part One: Digital Footprint

> A digital footprint is any data, from whatever source, that relates to an individual or organisation.
> There is no such thing as real privacy online
> The internet is a really bad place to learn from your mistakes
> The journey from younger to older - popularity to privacy
> Personal responsibility - parents cannot fix everything
> Digital devices and app's are addictive since they were designed that way.
> "I Agree" - just what are you agreeing to on signup?
> Physical world security and comfort applied to the virtual world leads to errors of judgement
> Case Study: Data is not important - until it is!
> OSINT - the power of online research
> Sentiment - a social media profiling example
> Privacy examples - the Zuckerberg's
> Case Study: its the stuff you forget about, or don't know about that catches you online!

Part Two: Infrastructure

> Surface web, deep web, clear net, dark net
> Networks and WiFi
> Wifi, SSID's and visibility
> Issues with Free WiFi
> Connecting to rogue networks
> Web sites - structure - visibility - security issues
> Passwords - analysis - hacked accounts - making good passwords - 2 Factor Authentication

Part Three: Images

> Digital images never fade
> Exif Data - what it is - removing before uploading
> Image analysis - expose photoshopping - extracting obscure data
> Purpose of the image and implications for the user if inappropriate
> Sexting - dangers of sexualising oneself - legal issues
> Who is capturing the image - selfies and candids
> Web cam - use with 'anonymous' chat - malware and ....
> Image backups and copies to external storage
> Cameras: lenses, IR, FLIR - use in entertainment venues
> Image uploads - young people sexualising themselves
> Image uploads - social media glamour accounts
> Snapchat and IM image distribution
> ADVANCED: redistribution of personal images
> ADVANCED: risks of online identification
> Reverse image searching through Google
> Case Study: Collateral Damage - image on a beach
> Case Study: Collateral Damage - candid image and identification method

Part Four: Online Harassment

> Key Factors - digital disconnect, the anonymity effect, digital dust
> Key Factors - risks at a glance
> Trolling - deception, disruption, aggression
> Bullying - what it is and actions to take
> CASE STUDY: cyber bullying case work
> Bullying - fear, isolation, loneliness, paranoia
> ADVANCED: Predators and Pseudo profiles - DJPete0606
> ADVANCED: Predators exchanging Snapchat data
> ADVANCED: Predators mingling in glamour accounts
> ADVANCED: Predators in chat with a fictitious young person
> Predatory Fake Profiles - Jimmy
> ADVANCED: Jimmy social media profiles
> Predatory Fake Profiles - Todd
> ADVANCED: Todd social media profiles and links
> Predatory Fake Profiles - John
> ADVANCED: John social media profiles and links
> Grooming - targeting a teenager
> ADVANCED: sextortion case study
> ADVANCED: revenge pornography

Part Five: Shades of Grey

> ADVANCED: the grey area of pornography - non nude imagery
> ADVANCED: Offenders - a synopsis of selected offenders and a paedophile ring example
> HIGHLY ADVANCED: Online crimes against children - synopsis and block pages
> HIGHLY ADVANCED: Trafficking and prostitution of children - synopsis

Part Six: Reputation Engineering

> How do you want to appear online?
> Assess the image you are projecting right now
> How to develop your desired online profile
> Using search engine alerts
> Consistent effort