Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged crime

Rss Feed Group items tagged

Anne Bubnic

Nonprofit Distributes File Sharing Propaganda to 50,000 U.S. Students - 0 views

  • But the story line here is a miscarriage of justice at best -- even erroneously describing file sharing as a city crime punishable by up to two years in prison.
  • The purpose is basically to educate kids -- middle school and high school-aged about how the justice system operates and about what really goes on in the courtroom as opposed to what you see on television," said Lorri Montgomery, the center's communications director.
  • The piracy story has two plots. One is of the file sharer's grandmother fighting eminent domain proceedings to keep her house while Megan the criminal file sharer deals with the charges against her
  • ...1 more annotation...
  • The story is simple: Megan learns to download music from a friend. About 2,000 downloads and three months later, a police officer from the fictitious City of Arbor knocks on her door and hands her a criminal summons to appear in court.
  •  
    "The Case of Internet Piracy" was developed by judges and professors to teach students about the law and the courtroom experience.
Anne Bubnic

Peer-to-peer Networks for Exchanging Child Pornography Busted - 0 views

  • All of the defendants are charged with possession of child pornography, and some are charged with additional offenses, such as production of child pornography and committing crimes while registered as sex offenders. Those charged include a law enforcement officer, attorneys and men with previous convictions related to the child pornography.
  • These cases are the result of a coordinated investigation in which law enforcement used sophisticated software to track down computers on which child pornography was being stored and made available to others via peer-to-peer networks. Peer-to-peer networks are an increasingly popular method for sharing files on the Internet. Using software programs such as Limewire, computer users can join networks that allow the sharing of files across the Internet, often for no charge.
  • Robert Schoch, special agent in charge for the ICE office of investigations in Los Angeles, stated: “Today, those involved in child exploitation - like everyone else - are using the remarkable reach of the Internet, and peer-to-peer technology is the latest frontier. But we have a message for child sex predators who think they can escape justice by hiding in Cyberspace. We will do everything in our power and use every tool at our disposal to keep our children safe - whether they are around the block or around the world.”
  •  
    Federal and local authorities arrested seven men for possession of child pornography today as part of an ongoing multi-agency investigation spearheaded by U.S. Immigration and Customs Enforcement (ICE) and the FBI that has resulted so far in the filing of charges against 55 defendants who allegedly used peer-to-peer networks to exchange sexually graphic images of children.
Anne Bubnic

The Road to Cybersafety - 0 views

  • Carrill is part of the Platte County Sheriff’s Office. He also leads the Western Missouri Cyber Crimes Task Force. One of his primary missions is to track down and arrest online predators who trade in child pornography.And all these cameras only make his job more challenging. About 40 percent of the nation’s minors have access to Webcams, Carrill explained, devices for uploading live video to the Internet. About 65 percent of all children have access to cell phone cameras.
  • erhaps the biggest issue is that fact that kids don’t understand that when a picture is posted online, it’s nearly impossible to remove.“Once that image is taken, it’s out there forever,” Shehan said. “The No. 1 issue that we’ve seen with Webcams is teenagers self-producing pornography.”
  • All we can tell them is, ‘I’m sorry,’” Carrill said. “The minute the camera clicks, you no longer own that image. It has the potential to harm that person years from now.”A Webcam placed in a child’s bedroom is another bad combination, according to Shehan and Carrill. Sexual predators search for kids who use Webcams in the privacy of their own rooms, then lure or blackmail the child into providing pictures of themselves.“We see cases time after time of children who take pictures, send them to a predator and get a pornographic collage back that the predator uses to blackmail the child into providing more images,” Shehan said.
  • ...3 more annotations...
  • . About 40 percent of the nation’s minors have access to Webcams, Carrill explained, devices for uploading live video to the Internet. About 65 percent of all children have access to cell phone cameras.Carrill’s team recently started a new operation to search image-trading Web sites for known child pornography in Missouri. The results were frightening, he said. More than 6,000 images were found in the state; about 700 of those pictures were downloaded in the Kansas City area.Between sexual predators who fish for images and immature decisions by kids with cameras, more children are either having their images posted online or being exposed to pornography, according to a 2006 report by the National Center for Missing and Exploited Children.
  • In the end, the best tool to defeat child pornography is parent education, according to both Shehan and Carrill. More than anything, kids need to know they can trust their parents.“It’s through that open line of communication between the parent and child that they can work through or prevent bad situations,” Carrill said.
  • All parents should follow a few basic rules when it comes to cyber safety, according to experts:- Keep computers in common areas of the home.- Monitor Internet use by children.- Enable privacy protection software.- Turn Webcams off or protect them with a password.- Track what images are being uploaded by children in the household.- Talk to children about what is appropriate.
  •  
    Webcams, cell phone cameras being put to troubling use, experts say. People are taking pictures, lots of them, and then uploading them as permanent displays in the Internet collection.
Anne Bubnic

Eight Ways to Handle Cyberbullies - 0 views

  • 1. Identify and blockFirst, ask your child not to respond or retaliate, no matter how tempting it may be to fight back. If you can identify who's cyberbullying your child, block any further communications.
  • 2. Set boundariesYou, not your kids, should also contact the bully (or bullies) and demand the offending behavior stop
  • 3. File a complaint Most cyberbullying behavior -- harassment, threats, invasion of privacy, stalking -- are violations of a web site or Internet service provider's "terms of service."
  • ...5 more annotations...
  • 4. Contact the schoolIf you know the bully attends the same school as your child, teachers and administrators might be able to help.
  • 5. Send a certified letterIf you've done all you can and the bullying hasn't stopped, send the child's parents a certified "cease and desist" letter.
  • 6. Call an attorneyIn the worst case scenario, a lawyer can help you consider filing a civil suit against bullies and/or their parents for defamation, harassment or other causes.
  • 7. Contact the local policeIf there's any evidence that the cyberbully's tactics include criminal actions, such as hate crimes, physical threats or talk of brandishing weapons at school, contact your local police immediately.
  • . Talk with your kids about what's acceptableAnne Collier, editor of NetFamilyNews web site, an email newsletter about online safety for kids, says to truly stop cyberbullying, however, you have to first know what's happening when your kids are online.
  •  
    Nancy Willard and Anne Collier offer eight ways to deal with cyberbullies in this article.
    1. Identify and block.
    2. Set boundaries.
    3. File a complaint.
    4. Contact the school
    5. Send the parents a certfied "cease and desist" letter.
    6. Call an attorney.
    7. Contact the local police.
    8. Talk with your kids about what's acceptable.

Anne Bubnic

Teen Hacker Could Get 38-Year Sentence for Fixing Grades - 0 views

  • Omar Khan, 18, a student at Tesoro High School in Rancho Santa Margarita, now faces 34 felony counts of altering a public record, 11 felony counts of stealing and secreting a public record, seven felony counts of computer access and fraud, six felony counts of burglary, four felony counts of identity theft, three felony counts of altering a book of records, two felony counts of receiving stolen property, one felony count of conspiracy and one felony count of attempted altering of a public record.
  •  
    They may be just kids, but two Orange County, Calif., teens are accused of committing a whole bunch of grown-up crimes. The allegations include hacking into school computers to change grades and planting spyware on a district computer. One of them faces 69 felony charges, which could land him in prison for up to 38 years if he's convicted.
Judy Echeandia

Help for Victims of Identity Theft - 0 views

  •  
    The Office for Victims of Crime (OVC) website offers identity theft and identity fraud information, services, and recovery aids, and includes links to Government Resources, National Organizations and Credit-Monitoring Organizations.
Cheryl Lykowski

McGruff.org -- Got a Bully? McGruff Can Help - 0 views

  •  
    McGruff.org's Milstein Child Safety Center is the online site for McGruff the Crime Dog. He has been a fixture for over 20 years, teaching children how to be safe and healthy. His trenchcoat is instantly recognizable, as is his straightforward way of talking to children.
Anne Bubnic

Student accused of hacking into computers, sending threatening messages - 1 views

  •  
    A Lehigh Acres teen is accused of hacking into a Lee County school's computer system and sending threatening messages to parents. The student is facing charges of two counts of an offense against intellectual property/modify without authority computer support document, each a third degree felony, and three counts of an offense against computer users/computer crime/interrupt or impair a governmental operation or public communication, each a second degree felony.
Anne Bubnic

BrainCe!!s [Interactive Game] - 1 views

  •  
    Produced in Canada, this new interactive program targets middle school students. Designed for school usage, it explores the social and ethical challenges of the cell phone era. In some locations, it is used as part of the DARE program. The story is set in the fictitious BRAINCELLS HIGH, which is in turmoil. After students begin carrying cell phones, a group of older boys start to steal phones from the younger students. Eddie is the leader of the gang and he forces a younger computer geek named Oliver to hack into the school computer and "adjust" his grades. The venture creates an uneasy bond between the two teenagers. Oliver uses his cell phone to commit the crime for Eddie and Eddie eases Oliver into the inner circle of teens at the high school. Finally, Oliver has to make a decision. Will he go to the police? The story is told through quizzes, animations, activities and games.
Anne Bubnic

A kinder, gentler response to adolescent "sexting" - 0 views

  • My question is why we keep putting so much of this discussion in the context of crime and victimization?" asked Anne Collier of ConnectSafely.org. "The vast majority of the behavior we're talking about is adolescent behavior and risk taking. It's not criminal behavior."
  • For years we've been telling parents to put the computer in the living room, keep and eye on what your children are doing, go and hit the history button and review where they've been," Balkam explained. "Well all that advice holds true but it gets completely upended by mobile phones, PDAs, and anything that can walk around."
  • A recent survey indicates that as of last year, 71 percent of teens 12 to 17 own a mobile phone (that's up from 45% in 2004). Eighty-seven percent of 17-year-olds and over half of children 12-13 years of age have one.
  •  
    They came from pretty much every sector-nonprofits, government, wireless executives, and think tanks-to a day-long conference in Washington D.C. on how to respond to the panic du jour over kids, mobile phones, and sex
JOSEPH SAVIRIMUTHU

Texas Lawmakers Crack Down On Fake Profiles - 0 views

  • In a move aimed at cracking down on cyerbullying, Texas lawmakers passed a new bill that makes it a crime to impersonate people online. The new "online harassment" statute makes it a felony to create phony profiles on social networking sites with the intent to "harm, defraud, intimidate, or threaten" others. The statute defines commercial social networking sites broadly, saying they include any sites that allow people to register to communicate with others or create Web pages or profiles. (Email programs and message boards are excluded from the definition.)
  •  
    A new "online harrassment" statute makes it a felony to create phony profiles on social networking sites with intent to "harm, defraud, intimidate or threaten" others.
« First ‹ Previous 41 - 52 of 52
Showing 20 items per page