Internet Resilience Presentations

 
 

 
Virtual Talks using Zoom
 
We are running our talks virtually through Zoom to avoid COVID-19 risks.
 
Many schools are favouring a 60 minute presentation arrangement and we have adjusted our content to suit and we have amended and condensed our content to fit this format. Running the talks in this way does have distinct advantages such as when we are running live software interfacing with the internet demonstrating issues like social media visibility, etc. The virtual talks are also cheaper for schools and ourselves since it removes travel and to that end we have decided to reduce the pricing accordingly. Please see our Calendar and Costs pages for details.
 

 
Internet Resilience - Presentations that have been 12 years in the making....
 


What began as Teen Safe in 2008 has now morphed into an internet safety information programme that incorporates instruction to young people in primary and secondary schools; teachers, counsellors and other support staff; people with special needs or interests; and carers and residents at residential care units throughout the country.
 
The programme now incorporates data from our extensive research activities of Irish bad actors online which have been ongoing since 2012; investigative experiences gained through corporate and information security activities; digital forensics that we have undertaken for schools where difficulties arise through misuse of computer equipment, and individual families struggling to understand unexpected difficulties that arise in young peoples lives. Indeed, we have illuminated difficulties that no one had any awareness of at all.
 
On occasion, we have helped those that need to make reports of wrongdoing against young people and in some cases made necessary reports on their behalf.
 
Since 2008, we have been visiting about 30 to 50 schools in a given September to June school year. Sometimes we address very small classes in very small schools, and sometimes individual year groups or all year groups in schools of 1,400+ students. That’s a lot of presentations to an awful lot of students.
 
When you book an Internet Resilience talk from ChildWatch.ie — that is the practical experience base that you are drawing from. We combine both presentation material (consisting of evidential elements that we have processed) and demonstration of commercially licensed software and techniques that give a very practical feel to our offering. When we discuss people’s vulnerability to online search, facial recognition, mobile phone hacking, stolen credentials, geo-location, graphing social media relationships etc, it’s the practical live demonstration of what we are presenting that generates the shock and awe and not some overtly sensational list of threats to safety laced with everlasting damnation.
 
In other words, those attending see the practical application of the vulnerabilities that we are discussing. Anyone parenting their own young people or has taught or cared for young people will tell you that you can say what you like, but the proof is in the experience and that is where Internet Resilience excels.
 
In creating the Teen Safe series and now its successor, Internet Resilience, we had one criteria in mind — it had to be something that WE would want to attend. We believe that we have created just that!!
 
ONE OTHER SMALL MATTER:
We are OPEN with our COSTS (which we have ALWAYS published online) and we protect those booking our presentations by maintaining PROFESSIONAL INDEMNITY INSURANCE for public speaking, writing, media, and IT professional services.
 

 
Internet Resilience - Primary School Classes 3 & 4 (60 mins duration incl Q&A) and Parents (90 mins duration)
 


 
Synopsis:
Our presentation to these young students is largely about concepts about digital space and the issues that they will find there. Many students of this age group do not have a smart phone of their own meaning that any attempts to show practical elements (phone screens, browsers, app’s for messaging etc) related to phone use are impractical and only serve to highlight those that do not have these phones, and those that have. This is unhelpful and so we focus upon high level concepts that make sense in everyday life.
 

Our parents presentation for this group is the actual preso that we have given to the students along with extra in-depth materials that we wouldn't be comfortable showing students of this age group.
 
BEING A DIGITAL NATIVE
-- Truth from an icon.... Be a great version of yourself instead of a second rate version of someone else
-- Whats wrong child?   Read my blog !
-- Digital Natives are digital interactive
-- Social Media - what is it?
-- Lets try something for some fun - Immigrants and Natives
-- Devices are designed to be simple to use for a reason
-- Multi tasking - how to do 27 hours of activity in a day
-- Our use of search
ALL BUILDS A PICTURE OF WHO YOU - WHAT YOU DO - AND WHEN YOU DO IT
 
SUPPORTING PARENTS MATERIAL
-- Comparing generations
-- So where are you in digital space?
-- Your 4th and 5th classes today
-- Your 6th class students today
 
Being SAFE when online
-- Convenience versus privacy
-- Phones are vulnerable
-- Careful with photos
-- Web Cams and Cameras
-- Careful with personal information
-- Keep your PASSWORDS secret
-- Always be polite and respectful. If you wouldn’t say it in real life, then don’t say it online.
-- Trying too hard to be liked
-- Don’t hide away with the phone
-- Remember you ARE visible
 
Some information about APP’S
-- You can download app’s
-- There are so many app’s
-- Age appropriate app’s
-- What’s the age for these app’s?
-- Why have age limits at all?
-- Terms and Conditions - they are important
 
SEARCHING SOCIAL MEDIA
-- Finding information online - let me show you....
-- It makes us very visible when we are online
-- Is your 'private' profile data really "private" ? - eh not so much !
 
PEOPLE THAT WE DON'T KNOW
-- Don’t TALK To
-- Don’t MEET Up With
-- It's too easy to accept strangers as friends
-- Sometimes we can have problems with people that we DO KNOW !
-- Accepting stuff like messages and email can be a problem
-- Examples of interacting with people that we do not know
 
Being SMART when you are online
-- If you are upset or worried - make sure to TELL someone
-- Talk to your parents if you feel uncomfortable with what you see on the Internet.
-- You can also talk to a teacher or another trusted adult like an aunt or uncle.
-- Talk to an adult BEFORE you do anything that you FEEL might be wrong
-- -- If someone makes you nervous by threatening you
-- -- If someone says they have something embarrassing about you
-- -- If someone demands photos from you and threatens you
-- -- If someone pressures you to switch on your web cam
-- -- If someone asks for your name, address or phone number
 
BULLYING
-- Don’t be a bully !!
-- If someone is bullying you or a friend then tell an adult - no one is allowed to bully someone else
-- Sometimes bullying can be accidental or unintended
-- You can block people from calling, messaging, or posting to you online
-- You can take screen shots to stuff that is upsetting you and talk to an adult
 
SUPPORTING PARENTS MATERIAL
-- Don’t be slow to report bullying
-- Keep any evidence and don’t make the mistake of deleting it
-- Do not respond or get angry - it adds fuel to the fire
-- Blackmail can take many forms - from simple child's play to outright illegal and dangerous
-- CASE STUDY - Sextortion
-- CASE STUDY - Online criminals
-- CASE STUDY - Haunted by your past
-- If you believe that someone has done something illegal against your children then visit the Gardai
 
Parents - GUARDING CHILDRENS ONLINE SAFETY
-- Things a child should NOT to do:
-- Things a child should to do (with your help):
-- Safe Searching
-- Antivirus / Antimalware
-- Where you can lear about your safety ....
-- Parental Controls ....
-- App’s issues for children ....
-- Children's issues on social media ....
-- How prepared are YOU for your child having a phone ....
-- Not all smartphones are the same.....
-- WiFi & Bluetooth services - routes into a phone ....
-- Location services
-- CASE STUDY - identity exposure
 


Internet Resilience - Primary School Classes 5 & 6 and Parents (70 mins duration incl Q&A) and Parents (90 mins duration)

 

 
Synopsis:
This presentation incorporates much of the Class 3-4 material but adds to it with the point of view that as an increasing percentage of these students likely do have access to digital devices, and likely own a smartphone, there is a need to more forward with them through adding more detail to their role as digital citizens, looking more closely at the technology that they will use, and having them understand good safety practices.

 
The parents presentation material incorporates the lessens presented to their children, but also has a far more robust look at the difficulties that young people can encounter online, the real dangers that can present there, and the nature of those that would harm them online, and in the real world.
 
The presentation for both student and parent are powerful and motivating. Once a student is online and has largely unfettered access to online materials, then there is a need to protect them through education. We highlight many of the issues that they may encounter in the classroom, but lay bare the more advanced and concerning issues to their parents where we have the opportunity to present to them.
 
It is then up to the informed parent to decide what is appropriate for them to impart to their children which would largely depend on what the individual child is doing online
 
When Online - You are not alone !
-- People make lots of mistakes on the internet but most of them do not cause any lasting harm
-- Your digital footprint is always an issue
 
Digital Citizens
-- Advice from an icon ...
-- Digital Natives and Immigrants
-- Digital Footprints
-- -- Social media has a price
-- -- And we agree to it
-- -- Data Brokers are very dangerous to us
-- -- Search Engines - WATCHING US - KEEP A RECORD OF WHAT WE DO - ADVERTISING STUFF TO US
-- -- All builds a picture of who we are and what we do
-- -- Searching social media - see how it is done.....
 
The technology that we use
-- Convenience versus privacy
-- Phones are vulnerable
-- -- Things YOU should NOT to do:
-- -- Things that YOU should do:
-- -- Hacking a phone
-- Browsers
-- App's
-- -- SUPPORTING PARENTS MATERIAL
-- Gaming
-- -- SUPPORTING PARENTS MATERIAL
-- Messaging
-- -- SUPPORTING PARENTS MATERIAL
-- Email
-- Viruses & Malware
-- Careful with photos
-- Web Cam's and Cameras
-- Careful with personal information
-- If you won't say it in real life, then don't put it online
-- Safe searching - switching it on
-- Looking through the eye of forensics
 
Strict Safety Practices
-- No to strangers
-- Interacting with people that you don't know
-- Sometimes we can problems with people that WE DO know
-- Talking to parents when you need help
-- Bullying and other harassment
-- Blackmail - go for help immediately - even if you think it's just fun
-- -- SUPPORTING PARENTS MATERIAL
 
SUPPORTING PARENTS MATERIAL
-- So where are you in digital space?
-- Your class students and what they outlined is their online activity today
 
Parents - GUARDING CHILDRENS ONLINE SAFETY
-- Safe Searching
-- Antivirus / Antimalware
-- Where you can lear about your safety ....
-- Parental Controls ....
-- App’s issues for children ....
-- Children's issues on social media ....
-- How prepared are YOU for your child having a phone ....
-- Not all smartphones are the same.....
-- WiFi & Bluetooth services - routes into a phone ....
-- Location services
-- CASE STUDY - identity exposure
 
Advanced Material for Parents
-- Appearances matter online
-- Buying into trends
-- Body image
-- Trends in fashion and entertainment
-- Trying too hard to be noticed
-- Misuse of parents social media to copy their children's images
-- Offender obsession - following teens social media links and publishing their photos online
-- Tributes - a very nasty abuse of innocent images
-- Candids - photographing people without their consent or knowledge
-- Offenders - forget the stereotypes - the truth points to much younger people
 


Internet Resilience - Secondary School 1st Years --- 80 Minutes Duration

 

 
Synopsis:
This presentation is a hybrid of the Primary Class 5-6 and the Second Level presentation for 2nd and 3rd years. It reflects that these students are just out of primary school and are being exposed to the digital habits and app's being used by the older students. This accelerates their digital knowledge and often leaves them exposed as they try to do too much - walking before they can crawl so to speak. This presentation bridges that divide for them and links the messages that they learned in primary with the information that they now need in secondary.

 
When Online - You are not alone !
-- -- A map of internet populations
-- -- People make lots of mistakes on the internet but most of them do not cause any lasting harm
-- Your digital footprint is always an issue
 
Digital Citizens
-- Advice from an icon ...
-- Digital Natives and Immigrants
 
Digital Opportunities and Threats
-- no limits to opportunities
-- building software and app's
-- people make a life using Google, LinkedIn and other software
-- Ireland is a brilliant digital hub
-- digital is changing many aspects of life very rapidly
-- driverless technology, robotics, artificial intelligence
-- in the long run, digital will offer far more than it takes away
 
Digital Footprints
-- -- Social media has a price
-- -- And we agree to it
-- -- Data Brokers are very dangerous to us
-- -- Search Engines - WATCHING US - KEEP A RECORD OF WHAT WE DO - ADVERTISING STUFF TO US
-- -- All builds a picture of who we are and what we do
-- -- Searching social media - see how it is done….
-- — Integrating data threads to create the jigsaw
-- — When ‘private' isn’t really ‘private'
 
The technology that we use
-- Convenience versus privacy
-- Phones are vulnerable
-- -- Things YOU should NOT to do:
-- -- Things that YOU should do:
-- -- Hacking a phone
-- — Phone forensics
-- Browsers
-- App's
-- -- SUPPORTING PARENTS MATERIAL
-- Gaming
-- -- SUPPORTING PARENTS MATERIAL
-- Messaging
-- -- SUPPORTING PARENTS MATERIAL
-- Email
-- Viruses & Malware
-- Careful with personal information
-- If you won't say it in real life, then don't put it online
-- Safe searching - switching it on
-- Looking through the eye of forensics
 
Posting Images
-- Exif data
-- image forensics
-- the purpose of the image and implications for the subject
-- sexting
-- web cam's - using, strangers, covering when not using
-- are your images secure and do you know where they are copied to
-- reverse image searching
-- image tracing - victim and family identity exposure
-- image tracing - Snapchat identity exposure
 
Strict Safety Practices
-- No to strangers
-- Interacting with people that you don't know
-- Sometimes we can problems with people that WE DO know
-- Talking to parents when you need help
-- Bullying and other harassment
-- Blackmail - go for help immediately - even if you think it's just fun
-- -- SUPPORTING PARENTS MATERIAL
 
SUPPORTING PARENTS MATERIAL
-- So where are you in digital space?
-- Your class students and what they outlined is their online activity today
 
Parents - GUARDING CHILDRENS ONLINE SAFETY
-- Safe Searching
-- Antivirus / Antimalware
-- Where you can lear about your safety ....
-- Parental Controls ....
-- App’s issues for children ....
-- Children's issues on social media ....
-- How prepared are YOU for your child having a phone ....
-- Not all smartphones are the same.....
-- WiFi & Bluetooth services - routes into a phone ....
-- Location services
-- CASE STUDY - identity exposure
 
Advanced Material for Parents
-- Appearances matter online
-- Buying into trends
-- Body image
-- Trends in fashion and entertainment
-- Trying too hard to be noticed
-- Misuse of parents social media to copy their children's images
-- Offender obsession - following teens social media links and publishing their photos online
-- Tributes - a very nasty abuse of innocent images
-- Candids - photographing people without their consent or knowledge
-- Offenders - forget the stereotypes - the truth points to much younger people
 


Internet Resilience - Secondary School 2nd & 3rd Years --- 80 Minutes Duration

 

 
Synopsis:
This presentation is a mix of screen and live demonstration of online data being exposed through commercially licensed software. This brings a very real feel to the for what is being presented and reinforces the need for those attending to be careful in what they share through text and images, and the exposure that can occur when settings such as geo-location are enabled for certain app's

 
Digital Opportunities and Threats
-- no limits to opportunities
-- building software and app's
-- people make a life using Google, LinkedIn and other software
-- Ireland is a brilliant digital hub
-- digital is changing many aspects of life very rapidly
-- driverless technology, robotics, artificial intelligence
-- in the long run, digital will offer far more than it takes away
 
Digital Footprints
-- privacy and convenience
-- psychology and creation of digital devices and app's
-- addiction issues
-- so many app's - freedoms and their risks
-- social media and where it has brought us - the good and the bad
-- terms and conditions
-- data analysis firms - data brokers - a look at Acxiom
 
Searching Social Media
-- OSINT and its tools
-- digitising photos, handwriting, Sentiment AI, SM search tools
-- facial recognition - the technology and its implications
-- searching Google and Yandex - broad search and facial recognition search
-- data isn't important until it is - using Maltego, data from carding forums, hacked passwords
-- combining software with multiple data sources to trace and track
-- layering in location services to the narrative
-- when 'private' isn't really 'private'
-- real world and virtual world are not the same
 
Infrastructure
-- Web sites and architecture - what you are connecting to...
-- mapping a web site in Maltego
-- don't trust sites - a look through a security analysis solution
-- authentication, password creation, 2 factor authentication
-- email, headers, tracing
-- WiFi and Bluetooth - gateways into devices
-- device exposure through forensics
 
Posting Images
-- Exif data
-- image forensics
-- the purpose of the image and implications for the subject
-- sexting
-- web cam's - using, strangers, covering when not using
-- are your images secure and do you know where they are copied to
-- reverse image searching
-- image tracing - victim and family identity exposure
-- image tracing - Snapchat identity exposure
 
Online harassment
-- false profiles used against young people - 3 case examples
-- blackmail - 2 case studies involving sextortion and revenge porn attacks
-- trolls
-- online bullying
-- young people being groomed
 
Common Risks
-- role of digital disconnect
-- the anonymity effect
-- digital dust
-- at a glance (spam to phishing, scams to individual targeting)
-- encountering ISP Block Pages
 


Internet Resilience - Secondary School 4th & 5th Years --- 80 Minutes Duration

 


 
Synopsis:
While largely similar in structure to the Junior Cycle presentation, the tone of this presentation is reflective of the older audience. Also, there is an additional section outlining how to create your own future through persistent commentary, postings, tweets and blog posts that articulate one's interests and hobbies. This practice is hugely beneficial when undertaken over the longer term and maintained consistently over time.
 
Digital Opportunities and Threats
-- no limits to opportunities
-- building software and app's
-- people make a life using Google, LinkedIn and other software
-- Ireland is a brilliant digital hub
-- digital is changing many aspects of life very rapidly
-- driverless technology, robotics, artificial intelligence
-- in the long run, digital will offer far more than it takes away
 
Digital Footprints
-- privacy and convenience
-- psychology and creation of digital devices and app's
-- addiction issues
-- so many app's - freedoms and their risks
-- social media and where it has brought us - the good and the bad
-- terms and conditions
-- data analysis firms - data brokers - a look at Acxiom
 
Searching Social Media
-- OSINT and its tools
-- digitising photos, handwriting, Sentiment AI, SM search tools
-- facial recognition - the technology and its implications
-- searching Google and Yandex - broad search and facial recognition search
-- data isn't important until it is - using Maltego, data from carding forums, hacked passwords
-- combining software with multiple data sources to trace and track
-- layering in location services to the narrative
-- when 'private' isn't really 'private'
-- real world and virtual world are not the same
 
Infrastructure
-- Web sites and architecture - what you are connecting to...
-- mapping a web site in Maltego
-- don't trust sites - a look through a security analysis solution
-- authentication, password creation, 2 factor authentication
-- email, headers, tracing
-- WiFi and Bluetooth - gateways into devices
-- device exposure through forensics
 
Posting Images
-- Exif data
-- image forensics
-- the purpose of the image and implications for the subject
-- sexting
-- web cam's - using, strangers, covering when not using
-- are your images secure and do you know where they are copied to
-- reverse image searching
-- image tracing - victim and family identity exposure
-- image tracing - Snapchat identity exposure
 
Online harassment
-- false profiles used against young people - 3 case examples
-- blackmail - 2 case studies involving sextortion and revenge porn attacks
-- trolls
-- online bullying
-- young people being groomed
 
Common Risks
-- role of digital disconnect
-- the anonymity effect
-- digital dust
-- at a glance (spam to phishing, scams to individual targeting)
-- encountering ISP Block Pages
 
Paint Your Own Future
— being a smart lab rat
— the image that you project now
— the image that you want to project going forward
— setup and check your alerts
— a note from the FT - don’t discard the profile that you want to project


Ambivalence - Secondary School 6th Years (80 Minutes Duration - but optimal 120 mins if possible)

 

 
Synopsis:
 
Ambivalence is similar in terms of the issues addressed in Internet Resilience. However the approach is designed for senior 6th class students, and is the basis of an advanced presentation given to child protection professionals. There are topics covered in it that are not addressed in our other student presentations because this material is for the most senior students only. It shows information that is designed for adults - the professionals and parents of the future. We do consult with schools staff and a decision is made as to which presentation is most appropriate for their senior group - the Internet Resilience or Ambivalence presentations. We proceed upon their guidance.
 

Digital! addresses common privacy issues that affect people online such as the power of search and the implications for placing images and text online. It looks the recent failings of social media to adequately protect the interests of its users and poses questions about the wisdom of placing our digital content through digital devices onto the internet.
 
Appearances looks at trends and influences generated by fashion and media and entertainment icons past and present. It offers insights into the thinking of icons past that are now mothers of teenagers and their views about how they appear. When young people buy into these trends they can often experiment online which may or may not have implications for them in the future.
 
Ambivalence is core to the presentation and looks at the types of errors that young people and parents make online. It addresses pornography and how young people can find their images featuring in it. It shows instances of people self-destructing as teenagers and finding consequences when they are in their thirties. It addresses the ambivalence that people can have for each other online and the devastation that it can wreak.
 
Down the Rabbit Hole features examples of bad actors at work taking and uploading photos without your knowledge; misuse of family photos; patterns of chasing down young people with an obsession; faking and tributing social media images; communities of bad actors working together; and issues that arise within schools as a result of these activities.
 
Defending Yourself Online is just that – key points that we all should understand to make our online communications safer and not be caught out by underestimating what it takes to be both safe and private in digital space.
 
Build your own space is about projecting yourself and using the power of internet search, blogging, opinion writing etc on mediums like LinkedIn and Twitter to ensure that you are your own brand and use it to project yourself wisely.
 


Teaching / Support Staff

 

 
This includes: 
-- Primary Teachers  
-- Secondary Teachers  
-- School’s Counsellors  
-- Schools Principals and Deputies  
 
How to book: 
-- Primary and secondary school staff/teachers normally include a one hour presentation as part of a full day visit to a school.

-- Schools counsellors have attended organised events facilitated through Griffith College facilities in Cork and Dublin.

-- We have made presentations to individual NAPD regions and at annual conference on two occasions.
 


Bespoke Presentations

 

 
These are created for:
 
-- Tusla Residents & Carers
-- Special Needs People & Carers/Parents
-- Special Interest Groups
 
We make individual arrangements with organisations seeking bespoke presentations. Each of the groups with whom we have worked have very special content in mind depending on those attending and the challenges that they may face.