Internet safety for children

Children & Computers - The Hidden Dangers

"Today's children are being weaned off video games and quickly moved to computers. Society has high hopes for this technically literate generation, but the proliferation of microcomputers and computer literacy also means that more and more assets will be stored on computer systems and the community of potential computer criminals will increase astronomically." Dr. Willis Ware, Rand Corporation, Santa Monica, CA.

With the ever increasing development of computer technology and the increasing number of people who are computer literate, it is much more likely that our children will be victimized or exploited in a computer environment.

The "Information Super Highway", which is made up of commercial on-line services such as Prodigy, America Online, CompuServe, and the Internet allow millions of people around the world to communicate anonymously in a virtually uncontrolled electronic world. If your child has a home computer, uses a computer at school, or access to a friend's computer (particularly if they have connected the computer to a phone line via a modem), please take the time to review this guide.

Just as we tell our children not to talk to strangers and watch and direct where they go and whom they meet in the "real world", we need to be aware of the dangers in the electronic world and exercise these same cautions. Parents have unknowingly allowed their children to invite criminals into their homes via the computer. This has resulted in the child becoming involved in criminal activities and all too often victimized by persons who would never have been allowed in the home by the parents.

Tips for Safe Computing

  • Advise your children to observe the following safety rules whenever they are on-line. Remind them that no matter how safe or friendly an on-line service seems (and this includes the major on-line services), there is always a potential for danger.
     
  • Never give out any personal information about themselves - particularly real names, addresses, phone numbers, financial information, etc., to anyone that they meet on-line.
     
  • (The above is not meant to preclude giving your name, phone, address, and credit card number to on-line services that often require them to open an account. You may also find you can order services and products via on-line services and we are not discouraging this. Making purchases on-line with a credit card is probably just as safe as it is in person at a store. What we are concerned about is giving personal and credit information out to people you meet in chat rooms or e-mail. It is the same as using a telephone. When you call a business and order products by phone, you know who you are calling and can feel reasonably secure in giving them your credit card number. When they originate the call, you have no way of knowing if you are talking to a legitimate business or a crook.)
     
  • Do not fill in the "Member Profile" section available when using on-line services where you fill in your name, address, age, school, sex, interests, etc. This allows any on-line user access to personal information. If you want to put anything in here, use your handle (screen name) and interests. Skip the address and other personal information.
     
  • Be aware of undesirable chat rooms and bulletin boards. Use the "parental discretion" options where necessary to block these areas.
     
  • Don't respond to anyone who leaves you obnoxious, sexual, or menacing e-mail. You should not become involved in public "flame" sessions ("flame" means a war of words.) You have no idea who you are dealing with and what access an individual may have to your personal or on-line account information. Many services provide a "kill" file where they can automatically block messages from these persons.
     
  • Report all electronic harassment and/or abuse. As parents, you should notify the ISP (Internet Service Provider) or BBS (Bulletin Board System) SYSOP (system operator) of the problem. If the SYSOP does not give you satisfaction in stopping this abuse, notify the police.
     
  • Never set up face-to-face meetings with anyone you have met on-line. If anyone you meet on-line wants to meet you - tell your parents.

Warning Signs of Possible Computer Crime Problems

(Note: These are warning signs only and are meant as warnings of possible problems, not evidence of a problem.)

  • Computer addiction. Withdraws from friends, family, "lives on the computer," and may lose interest in social activities.
     
  • Use of a new unusual vocabulary, heavy with computer terms, satanic phrases, sexual reference or sudden interest in related hard rock or satanic oriented posters, music, etc. Look for related doodling or writing using of words such as: Hacking, Phreaking, or any words with "ph" replacing 'f."
     
  • Lack of interest in self and appearance, grooming and hygiene, or indications of lack of sleep, sudden drop in school grades, and unauthorized absences from classes.
     
  • The computer and modem are running late at night, even when unattended.
     
  • Computer files ending in GIF, JPG, BMP, TIF, PCX, DL, GL, FLI, MPG, AVI, MOV. These are picture or graphic files and parents should know what they illustrate. Image files may be pictures of a sexual nature and can be of very high quality, moving pictures, and even include sound.
     
  • Names on communication programs that seem satanic, pornographic, rude, or vulgar in nature.
     
  • An obsession with fantasy adventure games such as Dungeons and Dragons and Trade Wars.
     
  • Use of the computer to scan or run telephone or credit card numbers.

What You Can Do to Protect Your Children

  • Learn about computers. Take a course at your local city college or tech school so you will have at least an understanding about what your children are doing.
     
  • Talk to your kids about their use of the computer and the dangers on-line. You are already talking about school, sex, drugs, strangers, gangs, and violence. Computers can involve all these problems and they can happen in your home without your knowledge.
     
  • Be involved with your kids in using the computer. This is a great opportunity to spend time with your child. It also gives you the opportunity to see what they like to do. If they like games, try playing the games with them. If they do their homework, read the paper while they work. If they use a modem to call on-line systems, ask questions about what your child is doing and what they are looking for.
     
  • Keep the computer in a "common" area of your home. Don't use the computer as a baby-sitter. Keep the computer in a family room or den. This allows you to monitor on-line activity. In the majority of cases investigated where children were involved in computer crimes, or were the victim of abuse by people met on-line, the computer was found in the child's room. Often the child could lock the door prohibiting others in the household from observing their activity.
     
  • Control all modem activity. Monitor the times and the numbers dialed.
     
  • Closely monitor your long distance telephone bill for unexplained calls. With on-line services and bulletin boards all over the world, it is easy to start calling long distance for special systems.
     
  • Check the screen of an unattended computer. If the computer is showing a series of changing numbers, the computer may be running a hacking program trying to identify calling card "pin" numbers, long distance access numbers, or be attempting to validate credit card numbers.
     
  • Make sure that access to the Internet at your children's school is monitored by adults.
     
  • Know your children's friends and their parents. If your child's friend has Internet access at home, talk to the parents about the rules they have established. Find out if the children are monitored while they are on-line.
     
  • Make sure that your child's school has an Acceptable Use Policy (AUP.) This policy should include a list of acceptable and unacceptable activities or resources, information on "netiquette" (etiquette on the Internet), consequences for violations, and a place for you and your child to sign. Your family can design its own AUP for the home computer.

Special Note: Don't make the mistake of thinking that the activities mentioned above are too "high tech" for your own child. Most parents are unaware of how much their children really know when it comes to the computer.