SlideShare una empresa de Scribd logo
1 de 46
Stampede Slides
1
DANGERS
OF SOCIAL MEDIA
LEVEL 10 TECHNOLOGY
ALEXANDER BERTA
VCIO
Alexander is a cyber security professional that provides cyber & information security, threat intelligence, penetration testing, digital
forensics and incident response for clients and businesses of all sizes. He is a certified digital forensics examiner where he has
assisted on investigations involving identification, analysis and presentation of data.
He spent his early years studying the methodologies of hacking collectives around the world and gained a rare insight into how
they operate. Alexander has been mentioned in books such as “Art of Intrusion” by Kevin Mitnick, “2600: The Hackers Quarterly” by
Emmanuel Goldstein and “Private Security Today” by Dr. Carter Smith. Alexander has devoted his life’s work to help thwart network
intrusion efforts and expose methodologies of various threat actors.
Hi Everyone, we are Level 10 Technology
D a n g e r s o f S o c i a l M e d i a
Welcome!
Dangers Of Social Media
Level 10 Technology
Why Are We Here
A Childs Footprint
Human Trafficking
Sextortion
Online Predators
How To Stay Protected
Q&A
Social Media
Stampede Slides
4
DANGERS OF
SOCIAL MEDIA
A CHILD’S
FOOTPRINT
LEVEL 10 TECHNOLOGY
8 Years & Younger
At 8 Years & Younger Your Child Maybe
Viewing Videos, Playing Some Games Or
Browsing Sites On Their Own
A Childs Footprint Online
Level 10 Technology
10 Years Old
Playing Online Games With Friends.
Most Games Are Rated Teen Or
Higher.
They Are Also Used As Recruitment
Tools By Online Predators & Nation
State Actors.
11 Years Old
Average Age Of A Young Cell
Phone Owner Is 11 Years Old.
They Have An Email Address,
Texting & More.
12 Years Old
Research Has Long Established That
Children Who Watch Movies Or
Listen To Music Glamorize Drinking,
Drugs Use Or Violence Are More
Likely To Engage In Those Behaviors
Themselves.13 Years Old
Children Are Now Allowed To Sign
Up To Social Media. Their Footprint
Begins To Grow.
Children Are Now Being Connected
To Anyone & EVERYONE
14 Years Old
Your child is now taking photos,
videos and posting them online.
Little do they know the images and
videos they are posting they can
never get back.
15 Years Old
Children are now desensitized
by various violent and sexual
acts.
Children are contacted by
people twice their age asking
for sexual contact.
Stampede Slides
8
DANGERS OF
SOCIAL MEDIA
SOCIAL
MEDIA
LEVEL 10 TECHNOLOGY
Allows communication over wireless
Communication is not logged like a normal text message
Communication is based off screen names or handles
Strangers can communicate directly with your child
Kik & WhatsAPP
In the past couple of weeks, police have linked the KiK
app to at least five serious crimes involving children in the
past two weeks, including the murder of 13-year-old
Nicole Madison Lovell -- allegedly by two 19-year-old
Virginia Tech students -- and an incident in Alabama
where a man attempted to check a 14-year-old girl out of
school. He was charged with statutory rape and attempted
kidnapping. (ABC 2016)
KIK ANNOUNCED THEY WILL BE SHUTTING DOWN
Over 1,000 Sexual Abuses Cases Reported In The USA & UK
ooVoo MobileooVoo is a high-quality video chat application. Think Facetime or Skype. It allows people to
connect with up to 12 friends at one time and video chat or have a voice call. You can download
it on an iPad, iTouch, iPhone, Android phone, etc.
Allows 12 people to talk in a group.
These people can use chat or video to
communicate.
Group Messenger
With over 100 million users, offenders
are taking a strong interest in this social
network.
Child Offenders
Law enforcement have notified
parents in the past not to allow their
children to use this social network
Law Enforcement
Allows communication over wireless
Allows pictures and short videos to be sent over wireless
Messages disappear after a few seconds
Strangers can send pictures and videos directly to your child
SnapChat
Snapchat can be compared to the Wild, Wild West of
the olden days. There are very few rules, no real
way to moderate what is going on, and any evidence
of inappropriate behavior is quickly wiped away. With
no paper trail, and no way to trace what is being sent
across the servers, parents can easily be taken off
guard, and young children who can not yet moderate
their own activity can easily be harmed by use of the
application.
Allows communication over wireless
Encrypted chat and self-destructing SMS
Once a message is deleted it’s gone forever
Used by various crime organizations for recruiting
Wickr
Many times pre-teens and teens give away personal information that
should not be shared
All information begins as viewable by the public unless you change the
settings to private.
Make sure your child or teen is not revealing their location on their photos.
You can turn off geo-tagging in the settings under Location Services.
Instagram is another social platform; therefore, your teen can become friends with strangers posing as another
teen.
Instagram
Kids who enter an age during registration that's under 13 will be blocked from registering.
Teens 13 and older must enter a first and last name, e-mail, date of birth, gender and zip
code to register. Profiles on the site are very public, unless users opt to make them private;
and the site activities were designed to encourage meeting new people.
Why Is It Dangerous
The app is rated ages 17+ but Tinder's privacy policy allows
teens as young as 13 to register (the app connects with
Facebook — which is also technically for ages 13+ — to pull in
photos for users' Tinder profiles). Tinder helps people find
others in their geographic location and allows users to view
each others' photos and start instant messaging once both
people have "liked" one another. The geo-location features and
anonymous nature of the app put kids at risk for catfishing,
sexual harassment, stalking, and worse.
Why Is It Dangerous
13 Years Old To Sign Up
Users Can Create Short Videos 3 To 60 Seconds Long
Users Are Allowed To Connect With Any Other Use
Strangers can send pictures and videos directly to your child
TikTok
Thirteen is the minimum age, but there isn’t a real way to validate age so anyone can
download the app. Also, parents express concern that there is a lot of inappropriate
language in the videos so it’s not appropriate for young children. Lastly, by default, all
accounts are set to public so strangers can contact your children.
Why Is It Dangerous
Does Ad Tracking & Analytics On Users
Has EVERY Kind Of Content
Community Can Be Toxic To Other Users
YouTube
Inappropriate content has been sliced into both all-ages content and children’s content.
Also, comments on videos can be extremely inappropriate and hurtful. YouTube also
has a known pedophile problem which is major cause for concern.
YouTube is changing the way they are doing things after being fined by the FTC for over
$170 million for Ad Tracking and Selling Minors information.
Why Is It Dangerous
Tellonym is a regular occurrence to see cyber bullying, violent threats, and sexual
content. It also offers unmonitored access to the internet. The age restrictions are
inconsistent ranging from 12 to 16, but this app is inappropriate for anyone younger
than being in their late teens.
Why Is It Dangerous
Facebook pages or communities
repost images that are found of
children online
Child Exploitation
Facebook has been used to transport, sell,
and trade humans on the internet. These
chats are often done in the open using code
words and terms.
HumanSex Trafficking
Cyberbullying is bullying that takes place
using electronic technology. Examples
of cyberbullying include mean text
messages or emails, rumors sent by
email or posted on social networking
sites, and embarrassing pictures, videos,
websites, or fake profiles.
Cyber Bullying
Know what your child is on and who they
are talking to. Also monitor their usage on
social media. Do not allow your child to
connect with strangers or people that they
do not know.
Stay Protected
How To Stay Protected
1. Understand Your Privacy Settings
- Search Settings
- Photo Settings
- Applications and Websites
2. Don’t Friend People You Don’t Know
It should be obvious, but know the people
You are friends with. Criminals often use fake
Profiles to send spam, or worse, steal personal
Information or gain access to your computer.
3. Think Twice About Applications
Applications can often pull information
about your account including name,
address, phone contacts, email contacts
and more.
How To Stay Protected
4. Understand Your Geolocation
Facebook uses Geolocation services
That track and monitor your every
Move. This application is called
Facebook Places and can be turned on
Or off in Privacy Settings.
5. Don’t Overshare
What's the best way to preserve your privacy?
The experts agree: Be conservative with what
you share. Things like your home address, your
family members, and your birthday are all easy
pickings for identity thieves. It's harder to retract
information than to simply not share at all.
Stampede Slides
22
DANGERS OF
SOCIAL MEDIA
HUMAN
TRAFFICKING
LEVEL 10 TECHNOLOGY
The Facts
Level 10 Technology
.04%
Estimates suggest that,
internationally, only about .04%
survivors of human trafficking
cases are identified, meaning
that most cases of human
trafficking go undetected.
Avg. Age
12- 14
The average age a teen enters
the sex trade in the US is 12 to
14 years old. Many victims are
runaway girls who were sexually
abused as children.
How Many People?
It’s estimated that internationally there are between 20
million and 40 million people in modern slavery today.
Assessing the full scope of human trafficking is difficult
because so cases so often go undetected, something the
United Nations refers to as “the hidden figure of crime.”
$150 Billion
Industry
In 2018
In 2018, The National Human Trafficking Hotline received
more calls from California than any other state in the US,
followed by Texas and Florida, respectively. (To contact the
Human Trafficking Hotline: call 1-888-373-7888, text 233733,
or chat online.)
71%Women & Girls
29%Men & Boys
Globally, an estimated 71% of
enslaved people are women and
girls, while men and boys
account for 29%
$99 Billion
Commercial Sexual
Exploitation
Types of Trafficking
Level 10 Technology
- #1 Organized Crime
Organization
- #1 State California
Trafficked State
- #1 Knoxville, TN In
Prevention
- #1 USA Largest Consumer
In Trafficking
Data
Labor Trafficking
Globally, the
International Labour Organization
estimates that there are 20.1 million
people trapped in forced labor.
Sex Trafficking
The International Labour
Organization estimates that there are
40.3 million victims of
human trafficking globally.
Organ Trafficking
It is estimated that the illegal organ
trade conservatively generates
approximately $840 million to $1.7
billion annually
By The Numbers
YOU ARE HERE
Demographics
Level 10 Technology
Adult Minor Unknown
Demographic
Female Male Unknown
Gender
Latino
Asain
White
African, African-American, Black
Multi-Racial
Top 5
Race/
Ethnicity
Level 10 Technology
0
50
100
150
200
250
300
0-8 Yr 9-11 Yr 12-14 Yr 15-17 Yr 18-20 Yr 21-23 Yr 24-26 Yr 27-29 Yr 30-32 Yr 33-35 Yr 36-38 Yr 39-47 Yr 48+
Age At Time – Sex Or Labor Trafficking Began
Sex Labor
Average Age Of Exploitation
Sex – 12 Years Old
Labor – 14 Years Old
Average Age
S
u
r
v
i
v
o
r
s
Level 10 Technology WHERE WERE WE IN 2011
Level 10 Technology WHERE WERE WE IN 2018
Date 9-11-19
Level 10 Technology
Level 10 Technology
Child ID Program
Now there’s a free new tool from the FBI that can help. The Child ID app—the first mobile
application created by the FBI—provides a convenient place to electronically store photos and
vital information about your children so that it’s literally right at hand if you need it. You can show
the pictures and provide physical identifiers such as height and weight to security or police
officers on the spot. Using a special tab on the app, you can also quickly and easily e-mail the
information to authorities with a few clicks.
The app also includes tips on keeping children safe as well as specific guidance on what to do in
those first few crucial hours after a child goes missing.
Stampede Slides
35
DANGERS OF
SOCIAL MEDIA
SEX
TORTION
LEVEL 10 TECHNOLOGY
Stampede Slides
37
DANGERS OF
SOCIAL MEDIA
ONLINE
PREDATORS
LEVEL 10 TECHNOLOGY
www.companyname.com
© 2016 PowerPoint Multipurpose Theme. All Rights Reserved.
39
Stampede Slides
40
DANGERS OF
SOCIAL MEDIA
STAY
PROTECTED
LEVEL 10 TECHNOLOGY
Level 10 Technology
Stay Protected
https://www.netnanny.com/ https://www.qustodio.com https://www.ourpact.com/
https://www.webwatcher.com/ https://www.familytime.io/
THANK YOU FOR COMING
Level 10 Technology
1549 Wilma Rudolph Blvd
Clarksville, TN 37040
Address
Info@Level10Tech.com
931-645-2322
Level10Tech.com
Phone & Email
Facebook.com/Level10Tech
Social Media
Level 10 Technology
Contact Us
Aberta@Level10Tech.com
931-645-2322
Phone & Email
Contact Us
Level 10 Technology
Level 10 Technology
1549 Wilma Rudolph Blvd
Clarksville, TN 37040
Address
Thank You To The Following
Level 10 Technology
Dangers of Social Media by Alex Berta

Más contenido relacionado

La actualidad más candente

Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentationgrp4.ed451
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016KanelandSvihlik
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And KidsSandra Fathi
 
Danger Of The Internet
Danger Of The InternetDanger Of The Internet
Danger Of The Internetmerlyna
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
Parent's e safety presentation 2011
Parent's e safety presentation 2011Parent's e safety presentation 2011
Parent's e safety presentation 2011DHE2008
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks SlideshareOllie Bray
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kidskwazy
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and postervictoriahoo
 
Abhishek cyber bullying
Abhishek   cyber bullyingAbhishek   cyber bullying
Abhishek cyber bullyingparulata
 
Cybersafety
CybersafetyCybersafety
Cybersafetyf3tm3
 
McKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullyingMcKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullyingmckinleychas
 
Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpumajcullishpum
 
Snap What? Apps/Websites that Parents Need to Know About! (Marshall, MN Mom'...
Snap What? Apps/Websites that Parents Need to Know About!  (Marshall, MN Mom'...Snap What? Apps/Websites that Parents Need to Know About!  (Marshall, MN Mom'...
Snap What? Apps/Websites that Parents Need to Know About! (Marshall, MN Mom'...Kara Damm
 

La actualidad más candente (20)

Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentation
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
Danger Of The Internet
Danger Of The InternetDanger Of The Internet
Danger Of The Internet
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
Parent's e safety presentation 2011
Parent's e safety presentation 2011Parent's e safety presentation 2011
Parent's e safety presentation 2011
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Dangers on the Internet
Dangers on the InternetDangers on the Internet
Dangers on the Internet
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kids
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
 
Abhishek cyber bullying
Abhishek   cyber bullyingAbhishek   cyber bullying
Abhishek cyber bullying
 
Cybersafety
CybersafetyCybersafety
Cybersafety
 
McKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullyingMcKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullying
 
Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpuma
 
Snap What? Apps/Websites that Parents Need to Know About! (Marshall, MN Mom'...
Snap What? Apps/Websites that Parents Need to Know About!  (Marshall, MN Mom'...Snap What? Apps/Websites that Parents Need to Know About!  (Marshall, MN Mom'...
Snap What? Apps/Websites that Parents Need to Know About! (Marshall, MN Mom'...
 

Similar a Dangers of Social Media by Alex Berta

Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxRahuljain40418
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying21rahul1999
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
aw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenaw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenJanet Weninger
 
Cyber Crime Awareness and Prevension.pdf
Cyber Crime Awareness and Prevension.pdfCyber Crime Awareness and Prevension.pdf
Cyber Crime Awareness and Prevension.pdfnisarmca
 
Safer internet day mo i cpc 2 feb 2014sb
Safer internet day  mo i cpc 2 feb 2014sbSafer internet day  mo i cpc 2 feb 2014sb
Safer internet day mo i cpc 2 feb 2014sbSafeChildUAE1
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet SafetySage Lewis
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eveSimonBalle
 
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineMichael Heron
 
social_media_safety.pptx
social_media_safety.pptxsocial_media_safety.pptx
social_media_safety.pptxBJPSURATDATA
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxronak56
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and schoolGrant Ward
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)Can R. PAHALI
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019KanelandSvihlik
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2bigmike18
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 

Similar a Dangers of Social Media by Alex Berta (20)

Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Facebook
FacebookFacebook
Facebook
 
aw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-childrenaw-trust-how-to-talk-to-your-children
aw-trust-how-to-talk-to-your-children
 
Cyber Crime Awareness and Prevension.pdf
Cyber Crime Awareness and Prevension.pdfCyber Crime Awareness and Prevension.pdf
Cyber Crime Awareness and Prevension.pdf
 
Safer internet day mo i cpc 2 feb 2014sb
Safer internet day  mo i cpc 2 feb 2014sbSafer internet day  mo i cpc 2 feb 2014sb
Safer internet day mo i cpc 2 feb 2014sb
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet Safety
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
 
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia OnlineETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
ETHICS07 - The Legal and Ethical Issues of Grooming and Paedophilia Online
 
social_media_safety.pptx
social_media_safety.pptxsocial_media_safety.pptx
social_media_safety.pptx
 
Lotrecchiano grace
Lotrecchiano graceLotrecchiano grace
Lotrecchiano grace
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and school
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 

Último

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 

Último (20)

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 

Dangers of Social Media by Alex Berta

  • 1. Stampede Slides 1 DANGERS OF SOCIAL MEDIA LEVEL 10 TECHNOLOGY
  • 2. ALEXANDER BERTA VCIO Alexander is a cyber security professional that provides cyber & information security, threat intelligence, penetration testing, digital forensics and incident response for clients and businesses of all sizes. He is a certified digital forensics examiner where he has assisted on investigations involving identification, analysis and presentation of data. He spent his early years studying the methodologies of hacking collectives around the world and gained a rare insight into how they operate. Alexander has been mentioned in books such as “Art of Intrusion” by Kevin Mitnick, “2600: The Hackers Quarterly” by Emmanuel Goldstein and “Private Security Today” by Dr. Carter Smith. Alexander has devoted his life’s work to help thwart network intrusion efforts and expose methodologies of various threat actors. Hi Everyone, we are Level 10 Technology D a n g e r s o f S o c i a l M e d i a Welcome!
  • 3. Dangers Of Social Media Level 10 Technology Why Are We Here A Childs Footprint Human Trafficking Sextortion Online Predators How To Stay Protected Q&A Social Media
  • 4. Stampede Slides 4 DANGERS OF SOCIAL MEDIA A CHILD’S FOOTPRINT LEVEL 10 TECHNOLOGY
  • 5. 8 Years & Younger At 8 Years & Younger Your Child Maybe Viewing Videos, Playing Some Games Or Browsing Sites On Their Own A Childs Footprint Online Level 10 Technology
  • 6. 10 Years Old Playing Online Games With Friends. Most Games Are Rated Teen Or Higher. They Are Also Used As Recruitment Tools By Online Predators & Nation State Actors. 11 Years Old Average Age Of A Young Cell Phone Owner Is 11 Years Old. They Have An Email Address, Texting & More. 12 Years Old Research Has Long Established That Children Who Watch Movies Or Listen To Music Glamorize Drinking, Drugs Use Or Violence Are More Likely To Engage In Those Behaviors Themselves.13 Years Old Children Are Now Allowed To Sign Up To Social Media. Their Footprint Begins To Grow. Children Are Now Being Connected To Anyone & EVERYONE
  • 7. 14 Years Old Your child is now taking photos, videos and posting them online. Little do they know the images and videos they are posting they can never get back. 15 Years Old Children are now desensitized by various violent and sexual acts. Children are contacted by people twice their age asking for sexual contact.
  • 8. Stampede Slides 8 DANGERS OF SOCIAL MEDIA SOCIAL MEDIA LEVEL 10 TECHNOLOGY
  • 9. Allows communication over wireless Communication is not logged like a normal text message Communication is based off screen names or handles Strangers can communicate directly with your child Kik & WhatsAPP In the past couple of weeks, police have linked the KiK app to at least five serious crimes involving children in the past two weeks, including the murder of 13-year-old Nicole Madison Lovell -- allegedly by two 19-year-old Virginia Tech students -- and an incident in Alabama where a man attempted to check a 14-year-old girl out of school. He was charged with statutory rape and attempted kidnapping. (ABC 2016) KIK ANNOUNCED THEY WILL BE SHUTTING DOWN Over 1,000 Sexual Abuses Cases Reported In The USA & UK
  • 10. ooVoo MobileooVoo is a high-quality video chat application. Think Facetime or Skype. It allows people to connect with up to 12 friends at one time and video chat or have a voice call. You can download it on an iPad, iTouch, iPhone, Android phone, etc. Allows 12 people to talk in a group. These people can use chat or video to communicate. Group Messenger With over 100 million users, offenders are taking a strong interest in this social network. Child Offenders Law enforcement have notified parents in the past not to allow their children to use this social network Law Enforcement
  • 11. Allows communication over wireless Allows pictures and short videos to be sent over wireless Messages disappear after a few seconds Strangers can send pictures and videos directly to your child SnapChat Snapchat can be compared to the Wild, Wild West of the olden days. There are very few rules, no real way to moderate what is going on, and any evidence of inappropriate behavior is quickly wiped away. With no paper trail, and no way to trace what is being sent across the servers, parents can easily be taken off guard, and young children who can not yet moderate their own activity can easily be harmed by use of the application.
  • 12. Allows communication over wireless Encrypted chat and self-destructing SMS Once a message is deleted it’s gone forever Used by various crime organizations for recruiting Wickr
  • 13. Many times pre-teens and teens give away personal information that should not be shared All information begins as viewable by the public unless you change the settings to private. Make sure your child or teen is not revealing their location on their photos. You can turn off geo-tagging in the settings under Location Services. Instagram is another social platform; therefore, your teen can become friends with strangers posing as another teen. Instagram
  • 14. Kids who enter an age during registration that's under 13 will be blocked from registering. Teens 13 and older must enter a first and last name, e-mail, date of birth, gender and zip code to register. Profiles on the site are very public, unless users opt to make them private; and the site activities were designed to encourage meeting new people. Why Is It Dangerous
  • 15. The app is rated ages 17+ but Tinder's privacy policy allows teens as young as 13 to register (the app connects with Facebook — which is also technically for ages 13+ — to pull in photos for users' Tinder profiles). Tinder helps people find others in their geographic location and allows users to view each others' photos and start instant messaging once both people have "liked" one another. The geo-location features and anonymous nature of the app put kids at risk for catfishing, sexual harassment, stalking, and worse. Why Is It Dangerous
  • 16. 13 Years Old To Sign Up Users Can Create Short Videos 3 To 60 Seconds Long Users Are Allowed To Connect With Any Other Use Strangers can send pictures and videos directly to your child TikTok Thirteen is the minimum age, but there isn’t a real way to validate age so anyone can download the app. Also, parents express concern that there is a lot of inappropriate language in the videos so it’s not appropriate for young children. Lastly, by default, all accounts are set to public so strangers can contact your children. Why Is It Dangerous
  • 17. Does Ad Tracking & Analytics On Users Has EVERY Kind Of Content Community Can Be Toxic To Other Users YouTube Inappropriate content has been sliced into both all-ages content and children’s content. Also, comments on videos can be extremely inappropriate and hurtful. YouTube also has a known pedophile problem which is major cause for concern. YouTube is changing the way they are doing things after being fined by the FTC for over $170 million for Ad Tracking and Selling Minors information. Why Is It Dangerous
  • 18. Tellonym is a regular occurrence to see cyber bullying, violent threats, and sexual content. It also offers unmonitored access to the internet. The age restrictions are inconsistent ranging from 12 to 16, but this app is inappropriate for anyone younger than being in their late teens. Why Is It Dangerous
  • 19. Facebook pages or communities repost images that are found of children online Child Exploitation Facebook has been used to transport, sell, and trade humans on the internet. These chats are often done in the open using code words and terms. HumanSex Trafficking Cyberbullying is bullying that takes place using electronic technology. Examples of cyberbullying include mean text messages or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles. Cyber Bullying Know what your child is on and who they are talking to. Also monitor their usage on social media. Do not allow your child to connect with strangers or people that they do not know. Stay Protected
  • 20. How To Stay Protected 1. Understand Your Privacy Settings - Search Settings - Photo Settings - Applications and Websites 2. Don’t Friend People You Don’t Know It should be obvious, but know the people You are friends with. Criminals often use fake Profiles to send spam, or worse, steal personal Information or gain access to your computer. 3. Think Twice About Applications Applications can often pull information about your account including name, address, phone contacts, email contacts and more.
  • 21. How To Stay Protected 4. Understand Your Geolocation Facebook uses Geolocation services That track and monitor your every Move. This application is called Facebook Places and can be turned on Or off in Privacy Settings. 5. Don’t Overshare What's the best way to preserve your privacy? The experts agree: Be conservative with what you share. Things like your home address, your family members, and your birthday are all easy pickings for identity thieves. It's harder to retract information than to simply not share at all.
  • 22. Stampede Slides 22 DANGERS OF SOCIAL MEDIA HUMAN TRAFFICKING LEVEL 10 TECHNOLOGY
  • 23. The Facts Level 10 Technology .04% Estimates suggest that, internationally, only about .04% survivors of human trafficking cases are identified, meaning that most cases of human trafficking go undetected. Avg. Age 12- 14 The average age a teen enters the sex trade in the US is 12 to 14 years old. Many victims are runaway girls who were sexually abused as children. How Many People? It’s estimated that internationally there are between 20 million and 40 million people in modern slavery today. Assessing the full scope of human trafficking is difficult because so cases so often go undetected, something the United Nations refers to as “the hidden figure of crime.” $150 Billion Industry In 2018 In 2018, The National Human Trafficking Hotline received more calls from California than any other state in the US, followed by Texas and Florida, respectively. (To contact the Human Trafficking Hotline: call 1-888-373-7888, text 233733, or chat online.) 71%Women & Girls 29%Men & Boys Globally, an estimated 71% of enslaved people are women and girls, while men and boys account for 29% $99 Billion Commercial Sexual Exploitation
  • 24. Types of Trafficking Level 10 Technology - #1 Organized Crime Organization - #1 State California Trafficked State - #1 Knoxville, TN In Prevention - #1 USA Largest Consumer In Trafficking Data Labor Trafficking Globally, the International Labour Organization estimates that there are 20.1 million people trapped in forced labor. Sex Trafficking The International Labour Organization estimates that there are 40.3 million victims of human trafficking globally. Organ Trafficking It is estimated that the illegal organ trade conservatively generates approximately $840 million to $1.7 billion annually
  • 25.
  • 28. Demographics Level 10 Technology Adult Minor Unknown Demographic Female Male Unknown Gender Latino Asain White African, African-American, Black Multi-Racial Top 5 Race/ Ethnicity
  • 29. Level 10 Technology 0 50 100 150 200 250 300 0-8 Yr 9-11 Yr 12-14 Yr 15-17 Yr 18-20 Yr 21-23 Yr 24-26 Yr 27-29 Yr 30-32 Yr 33-35 Yr 36-38 Yr 39-47 Yr 48+ Age At Time – Sex Or Labor Trafficking Began Sex Labor Average Age Of Exploitation Sex – 12 Years Old Labor – 14 Years Old Average Age S u r v i v o r s
  • 30. Level 10 Technology WHERE WERE WE IN 2011
  • 31. Level 10 Technology WHERE WERE WE IN 2018
  • 32. Date 9-11-19 Level 10 Technology
  • 33.
  • 34. Level 10 Technology Child ID Program Now there’s a free new tool from the FBI that can help. The Child ID app—the first mobile application created by the FBI—provides a convenient place to electronically store photos and vital information about your children so that it’s literally right at hand if you need it. You can show the pictures and provide physical identifiers such as height and weight to security or police officers on the spot. Using a special tab on the app, you can also quickly and easily e-mail the information to authorities with a few clicks. The app also includes tips on keeping children safe as well as specific guidance on what to do in those first few crucial hours after a child goes missing.
  • 35. Stampede Slides 35 DANGERS OF SOCIAL MEDIA SEX TORTION LEVEL 10 TECHNOLOGY
  • 36.
  • 37. Stampede Slides 37 DANGERS OF SOCIAL MEDIA ONLINE PREDATORS LEVEL 10 TECHNOLOGY
  • 38.
  • 39. www.companyname.com © 2016 PowerPoint Multipurpose Theme. All Rights Reserved. 39
  • 40. Stampede Slides 40 DANGERS OF SOCIAL MEDIA STAY PROTECTED LEVEL 10 TECHNOLOGY
  • 41. Level 10 Technology Stay Protected https://www.netnanny.com/ https://www.qustodio.com https://www.ourpact.com/ https://www.webwatcher.com/ https://www.familytime.io/
  • 42. THANK YOU FOR COMING
  • 43. Level 10 Technology 1549 Wilma Rudolph Blvd Clarksville, TN 37040 Address Info@Level10Tech.com 931-645-2322 Level10Tech.com Phone & Email Facebook.com/Level10Tech Social Media Level 10 Technology Contact Us
  • 44. Aberta@Level10Tech.com 931-645-2322 Phone & Email Contact Us Level 10 Technology Level 10 Technology 1549 Wilma Rudolph Blvd Clarksville, TN 37040 Address
  • 45. Thank You To The Following Level 10 Technology

Notas del editor

  1. 350 million users. Banned in various countries around the world. Explicit sexual content, unintended location-sharing, and exposure to explicit information about drugs and alcohol. Schools have also blocked access to these apps and are cracking down on messenger apps. Children are getting smart and using VPN programs on phones and laptops to get around these issues.
  2. ooVoo provides its own problems. This app allows up to 12 people to talk in a group. They can use video or text to communicate. With over 100 million users we are starting to see offenders taking a strong interest in this social platform Law enforcement agencies have posted warnings across the globe to parents to tell them to keep their children off this social network.
  3. SnapChat is a message picture service that allows people to send pictures to friends for a short time and then they are remove from their mobile devices. It's a myth that Snapchats go away forever.  App developers have made programs like SnapperBrute that allow someone to recover all your photos from SnapChat. Like other social media companies SnapChat stores all videos and pictures forever.
  4. Wickr is a beast it uses point to point encryption for communication and is often used by people who want to talk “offline”. These messages can not be traced, recovered or tracked. Wickr is used by various crime organizations including ISIS to recruit people.
  5.  1. Get involved. If your children are using Instagram, then you should be using Instagram as well. By default, anyone can hover over your child’s profile and view info unless you change the settings.  2. You need to sign up for an account and start using the platform. You will realize that photos can be shared on Flickr, Facebook, and Twitter.  3. You also need to make sure your child adds your name to their friend’s list. (Yes, they will tell you that no one else has their parent’s on their friend’s list. It just isn’t fair! Do you believe that?) 4. Porn is very easy to find 5. Posts are often shared, copies and reposted
  6. MeetMe is a website used by adults. It has millions of people using this site from all walks of life. There are groups that go from Gaming to Adult Content. This site is not OK for children to use. Other sites that are like this site are OKCupid, Plenty of Fish (POF), and every other dating website that’s online. Reports so there are an alarming rate of children signing up for these sites
  7. There is no reason your child should be on this app or site. Terms of service says you have to be 13 years old to sign up, but Tinder is used for random encounters with strangers and online dating.
  8. Lets talk about staying protected Understand your privacy settings. All social media sites have some kind of privacy setting on them but most people don’t use them. Change your search settings Change your photo settings Restrict Applications and Websites (Apps on websites) Don’t friend people you don’t know. Criminals will often use fake profiles to gain trust, send spam, or worse and steal your personal information. A child’s identity sells for 2x more then a regular identify online. Think twice about applications Some websites will ask you to sign in on Facebook, Google, Twitter or other mediums. When someone does this, they are allowing that site or app to potentially gain access to their accounts. Popular apps that do this are things like Farmville, Mafia Wars, Candy Crush and Pet Rescue Saga. Facebook allows you to remove these apps on your main profile page or edit settings for them. Twitter and Google are a bit harder to remove these settings.
  9. Understand Geolocation - Never check-in at home. You don't want people easily knowing when you’re not home, so leave this location off your list. Besides, you don't want most strangers to know where you live in the first place. - Never check-in at a friend’s or family member’s home. Updating your status with “Hanging out at Mike's” might seem like casual fun, but you’re essentially compromising their privacy as if you’d checked in at home. Don’t link to Twitter or phone number. Unlike Facebook, which requires you to be a friend with someone for them to see your updates, Twitter feeds are usually public (although you can set your feed to private as well). Don’t Overshare - Be careful with the information that you share. Remember that there are eyes watching everything you post online.
  10. Human Trafficking
  11. Human Trafficking