[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[off-topic] LEA announcement about children & computers (long)
Cpunx: For your amusment - nicked from the local Telco web site. I
especially enjoy the link between role playing games, satanism and
computing.
-----------------------------------------------------------------------
CHILDREN AND COMPUTERS:
THE HIDDEN DANGER
Dear Parent:
With the never ending development of computer technology and as an
increasing number of people become computer literate, it is much more
likely that our children may be victimized or exploited in a computer
environment. If your child has a home computer (or access to someone
else�s
computer), especially those equipped with a modem, then please take the
time to review this guide and become familiar with the behavioural warning
signs. It will only take a few minutes and may prevent devastating
problems
in the future. Keep in mind, however, that no matter how �aware� you are
of
these warning signs, the most important safeguard is to monitor the
contacts that your children are making in this unrestricted environment
and
regulate their computer related activities. In addition, do not allow your
children to isolate themselves from family or friends by engaging in
solitary computer activities for hours on end. A computer should never
become a substitute for social interaction.
1984 Government Study
Today�s children are being weaned on video games and quickly move to
computers. Society has high hopes for this technically literate
generation,
but the proliferation of microcomputers and computer literacy also means
that more and more assets will be stored on computer systems and the
community of potential computer criminals will increase astronomically.
Tips for Safe Computing
PARENTS
Please advise your children to observe the following safety rules whenever
they are �on-line�. Remind them that no matter how safe and/or friendly
the
BBS seems (and this includes the major services as well as the Internet),
there is always a potential for danger.
They Should:
�Never give out any personal information about themselves - particularly
full names, addresses, phone numbers, financial information, etc. to
anyone
they meet on line.
�Avoid responding to anyone who leaves them obnoxious,
sexual or menacing E-mail. They should not become involved in public
�Flame� sessions as they have no idea who they are dealing with and what
access an individual may have to their account information.
�Report all electronic harassment and/or abuse to their parents. As
parents, you should notify the SYSTEM OPERATOR (SYSOP) of the problem. If
the SYSTEM OPERATOR does not give you satisfaction in stopping this abuse,
the police should be notified.
�Never set up face to face meetings alone with anyone they have
met on the BBS. They should always take someone with them and always meet
in a public place.
�Never have someone come to their house until they get to know them and
until they are satisfied that they have given accurate personal
information about the individual.
�Safeguard all credit card and telephone card numbers. They should pay for
BBS services by money order whenever practical.
PARENTS:
Notify the police of all attempts by adults to set up meetings with your
children. This is by far the most dangerous situation for children and
should be prosecuted when appropriate.
�The modern thief can steal more with a computer than with a gun, and
tomorrow�s terrorist may be able to do more damage with a keyboard than
with a bomb�.
National Research Council
Washington, D.C.
Some Child Behavioural Warning Signs:
Computer Addiction
�Withdraws from friends, family etc. May lose interest in social
activities.
�Use of new (unusual) vocabulary, heavy with computer terms,
satanic phrase or sexual reference (or sudden interest in related posters,
music, etc.) Look for related doodling or writing. �Use of words such as:
hacking, phreaking or any words with �ph� replacing �f�.
�Lack of interest in self and appearance or indications of lack of sleep,
(which might indicate late night modem-play).
Other Potential Danger Signs
�Computer and modem running late at night (even when unattended).
�Storing of computer files ending in: GIF, JPG, MPG, AVI, MOV, BMP, TIF,
PCX, DL, GL or unusual CD�s; these are video or graphic image files and
parents should know what they illustrate.
�Names on communications programs which seem satanic or pornographic.
�Obsession with fantasy adventure games, (Dungeons and Dragons, Trade
Wars, Sexcapade, etc).
�Use of computer to scan or run telephone numbers or credit card numbers,
(look for �sequential dialling� programs).
What you can do to Protect your Children
Talk to your children about their use of the computer
Know What They are Doing
�If possible, keep the computer in a �common� area of your home, such as a
family room or den.
�You decide if your child has a legitimate need for a modem.
�If a modem is being used, control the activity by monitoring times
used and numbers dialled.
Closely Monitor your Long Distance Bill
�If the computer is left running unattended, check the screen.
�If it is showing a series of four digit numbers, the computer is trying
to identify calling card �PIN� numbers.
�If it is showing a series of sixteen digit numbers, the computer is
trying to validate credit card numbers.
�If you are not computer literate, make sure you at least learn the basics
about computers, take a course or have your child teach you.
Courtesy of:
Chief Alfred O. Olsen
Warwick Township Police Department
Lititz, Pennsylvania, USA