Health & Safety

January 31, 2014

FBI trains FH community on child cyber safety, security

Tags:
Maranda Flynn
Staff Writer

Agent in Charge David Bodily with the Sierra Vista FBI teaches the first of two Cyber Safety and Security Training sessions at Murr Community Center Tuesday that educate parents what to look for and how to prevent cyber vulnerabilities. Advances in technology allow children access to various sources of knowledge, but it also leaves them open to exploitation and harm from online sex offenders.

Fort Huachuca’s Community Health Promotion Council, in partnership with the FBI, presented two sessions of Cyber Safety & Security Training for adults, to provide expert advice on keeping themselves and their children safe on the Internet, at Murr Community Center on Tuesday.

Today’s technology has revamped the concept of communication, relying on texting, downloading, online gaming or blogging. It may be innocent fun for your children, but are they, or you, aware of the threats that are beyond the keyboard?

During the 90 minute training session, Agent in Charge David Bodily, Sierra Vista FBI, pointed out the signs to watch for, how to react to, and how to minimize the chances of potential online vulnerabilities for children.

Cyberbullying — defined as the verbal harassment that occurs during online activities and cell phone texting — has become a growing concern, according to Bodily.

As stated in the FBI’s Parent Guide to Internet Safety, “Children online are at the greatest risk during the evening hours. While offenders are online around the clock, most work during the day and spend their evenings online trying to locate and lure children or seeking pornography.”

“The Internet has become the new playground, but without a closing time, leaving children to their electronic devices 24/7,” Bodily said.

Along with cyberbullying, social networking has become a dangerous online concern. Sites such as Facebook and Twitter encourage people to build profiles including pictures, personal information, even journal-type entries. The problem is that these sites are appealing to child sexual predators too.

According to Bodily, one in three teens plan to meet someone they met online, in person. Social networking sites allow predators to “exploit” the posted information, “groom” the child, and persuade a face-to-face meeting with a stranger.

To keep children safe when using any online activities, Bodily recommends:

  • monitoring children’s Internet use, keep devices in open rooms and keep hand-held devices on the kitchen table at night
  • teach children not to disclose personal information online and why it is important
  • watch for risky behaviors such as an immediate withdrawal from electronics or from Family or friends
  • install and monitor age-appropriate privacy settings, parent controls and firewall software
  • encourage children to choose appropriate screen names and strong passwords
  • visit websites with your children and exchange ideas about what information may or may not be risky
  • teach children how people who want to harm children get close to them by using online information and gaining a child’s trust
  • check your children’s profiles and what they are posting online.

“Relate the Internet to a public bulletin board in a hallway,” Bodily said. “Make sure they have the right perception of what they are doing online. If it is on the Internet, it is not private.”

Don’t forget about cell phones, which often have the same fully functional Internet access as a computer. According to Bodily, 78 percent of teens 12 – 17 have cell phones.

In the end, Bodily explains that, as a parent, the best thing to do is maintain an open line of communication with your children regarding the cyber world. Allow them to feel comfortable speaking about anything that seems wrong or confusing, and to report it to a known adult.

For more information on how to protect you and your children from cyber crime, Bodily suggests visiting www.netsmartz.org or www.icactraining.org.




All of this week's top headlines to your email every Friday.


 
 

 
TRADOC

‘Start Strong:’ Every Army career starts with TRADOC

FORT EUSTIS, Va. — Through U.S. Army Recruiting Command, U.S. Army Center for Initial Military Training and U.S. Army Cadet Command, U.S. Army Training and Doctrine Command serves as the foundation for the “Start Strong” ...
 
 

Honoring Gold Star Mothers

As part of our commitment to never forget those Soldiers who gave all, the Army joins the Nation on Sunday in remembering the strength and sacrifice of its Gold Star Mothers. Since 1936, Congress has set aside the last Sunday in September to recognize the mothers of Service members who have died while defending our...
 
 

Remember Gold Star Mothers, Families

The term Gold Star Family is a modern reference that comes from the Service Flag. These flags/banners were first flown by Families during World War I. The flag included a blue star for every immediate Family member serving in the armed forces of the United States, during any period of war or hostilities in which...
 

 

New NCOER expected to more accurately assess Soldiers’ performance

WASHINGTON — On Aug. 1, the secretary of the Army approved the new Non-Commissioned Officer Evaluation Report. Implementation will be in September 2015. “The new NCOER will come out in five phases: inform, educate, train, roll-out and after-action review. Human Resources Command is beginning to build the NCOER into the Evaluation System now,” said Command...
 
 
Flooding1_20140918_S.Vasey

Water, water everywhere

Photos by Scott Vasey The remnants of Hurricane Odile brought significant rainfall to Fort Huachuca last week as shown in photos of Huachuca Creek Sept. 18. The storm made landfall as the strongest storm on record to hit Mexico...
 
 
_DSC9936

ISEC gains new senior enlisted leader

Timothy Toms Command Sgt. Maj. Ulysses Rayford, (center) U.S. Army Information Systems Engineering Command, accepts the sword of responsibility from Col. Patrick Kerr, ISEC commander (left), and Master Sgt. Christopher Paluzzi,...
 




0 Comments


Be the first to comment!


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>


Directory powered by Business Directory Plugin