Sunteți pe pagina 1din 17

PARENT'S VERSION 18+

PROJECT PLAYBOOK
WWW.PROJECTPLAYBOOK.CA
GUIDE TO STAYING SAFE ONLINE
WELCOME TO PROJECT PLAYBOOK!

Project Playbook was founded in 2017 by 2 concerned citizens with


specialized tech training and skills. Theresa Longo is a
professional digital content designer, Actress and public relations
teacher who has personally experienced sophisticated online
attempts to lure her into potentially dangerous situations. Matt
Richardson has elite training in online investigative intelligence,
using his skills in government and other special sectors. Matt also
teaches kids how to stay safe online. Together they created
Project Playbook to bring a fresh, positive perspective to keep
your family safe when using the internet!

As parents, you are the coaches! This booklet will equip


you with the plays to keep your children safe in the "game"
of the internet. Your Playbook the first step on the road to
a positive, safe, enjoyable online experience.

THE PLAYBOOK APPROACH


Reading the Playbook is your best
bet in familiarizing yourself with
the best plays in any online
situation.
USING YOUR PLAYBOOK

Make notes. Re-read Playbook


often. Digest information yourself
before guiding kids. Follow along
Project Playbook's Kid Version to
apply what you learn here.

This Playbook will help assess your child's readiness


for internet, including online games. Use the Playbook
as a great learning tool for kids. Complete some of the
activities in the Parent's and Kid's Playbook .

ALL ABOUT PLAYBOOK

Your Playbook is designed to be


user friendly and simple to use. To
get the most from your Playbook
simply follow up the steps
throughout the next pages.

TIPS, UP-TO-DATE INFORMATION AND EXPLANATORY


VIDEO ABOUT THE LATEST TECHNOLOGY

WWW.PROJECTPLAYBOOK.CA
PARENT'S VERSION

PROJECT PLAYBOOK
WWW.PROJECTPLAYBOOK.CA
YOUR GUIDE TO STAYING SAFE ONLINE!

INTRODUCTION

Read each section fully and prepare for the


conversation with your children.
Use the Assessment Tool to assess your child’s
readiness for social media, online gaming, messaging
apps and devices such as, computers, smart phones,
and tablets.

Our Philosophy is to empower people to create


responsible stewards of technology, people who to use
technology safely and with respect for one another. Our
hope that readers learn to have a happy and enjoyable
positive online experience. We know there are ever
expanding libraries of social media, messaging and online
games etc.

PROJECT PLAYBOOK REALIZES


TECHNOLOGY IS HERE TO STAY...

...the benefits far outweigh the negatives. It is unfair to prohibit


children from using technology because some people exploit the
internet in inappropriate ways. When used in a safe, respectful and
positive way technology helps us learn, have fun, stay connected
with family and friends and opens doors to exciting career and
educational opportunities.

IS YOUR CHILD READY FOR INTERNET USE?


READINESS ASSESSMENT

IS YOUR CHILD MINIMUM 13 YEARS OF AGE? IF NOT,


NO TO SOCIAL MEDIA. ONE COMPROMISE IS TO
ALLOW THEM TO HAVE JOINT ACCOUNTS WITH YOU

Start the Conversation and


Keep it Going
WWW.PROJECTPLAYBOOK.CA
PARENT'S VERSION

PROJECT PLAYBOOK
WWW.PROJECTPLAYBOOK.CA
YOUR GUIDE TO STAYING SAFE ONLINE
INTERNET READINESS
ASSESSMENT

Is your child responsible enough to be home alone for


at least a few hours?

Is your child able to confidently speak to a stranger


in public? Specifically: can your child civilly divert
the interest of, and break verbal contact with a
stranger who speaks to them in public? Can they
spot potentially dangerous situations and
behaviours?

CAN MY CHILD PASS THE HEALTHY IMAGE TEST?

NAME: 3 THINGS THEY DO VERY WELL


3 THINGS THAT MAKE THEM SPECIAL
3 TRUSTED ADULTS IN THEIR LIFE AND
CAN THEY EXPLAIN HOW …

As children navigate the digital world they will


experience many wonderful things, learn more about
the world around them, enjoy fun games and activities.

Unfortunately, they can also


be exposed to a dark
underbelly filled with risks
that include; sexual predation,
cyberbullying, sexting, and
sextortion.

Project Playbook teaches parents and kids how to


expertly and properly manage their online presence!

WWW.PROJECTPLAYBOOK.CA
PARENT'S VERSION

PROJECT PLAYBOOK
WWW.PROJECTPLAYBOOK.CA
YOUR GUIDE TO STAYING SAFE ONLINE!

KNOW THE PLAYING FIELD!

LEARN THE TERMS!

LEARN ABOUT THE LATEST


POPULAR APPS, GAMES,
CHATROOMS AND ONLINE
TRENDS. Read the Project Playbook
Blog www.projectplaybook.ca/blog

Project Playbook Co-Founder Theresa shared with Matt


her own cautionary tale of nearly being lured into a
human trafficking ring. In her case individuals used a
series of sophisticated techniques for months to establish
trust in an attempt to lower her guard. Internet
predators have different interests and motives behind
their behaviour, however one common factor is that they
most definitely have their own “Plays”. (Page 9 & 10)

WHAT IS AN APP?

Think of an app as a mini computer


program, or a computer application!
especially one that is downloaded
by a user to a mobile device.
GAMING

Gaming is when you play video or


computer games. These games can
usually be played online with other
players.

Social media refers to information sharing sites like


Facebook, Twitter, MySpace, Imgur and Instagram.
Social media sites require a profile. Social media sites
can be completely falsified and it is easy to make fake
profiles or hide behind user-names.

CHATROOMS AND MESSAGE BLOGS

A chatroom is an area on the Internet or other computer


network where users can communicate, typically limiting
communication to a particular topic. Message blogs like
allow users to all talk about specific topics (threads).

HOW DOES INFORMATION SPREAD ON THE INTERNET?

Information is spread through websites and apps. Social


media helps news spread globally at a rapid pace with far-
reaching consequences.

WWW.PROJECTPLAYBOOK.CA
PARENT'S VERSION

PROJECT PLAYBOOK
SAFETY PLAY:
Tips for a Good
Screen Name

A 'screen name' is a name you choose to use on the


internet. You need a screen name to be able to use
online games and apps.

CHOOSE THE BEST NAME


SCREEN-NAME 101
FOR OPTIMAL SAFETY YOUR
CHILD'S ONLINE NAME SHOULD
NOT GIVE ANY CLUES ABOUT
YOUR NAME, AGE, LOCATION OR
GENDER.

SAFETY PLAY: HAVE YOUR CHILD


THINK OF EXAMPLES OF SAFE
SCREEN NAMES TO CAN USE.

A SCREEN NAME CAN ALSO BE


KNOWN AS A USER NAME.

WHAT DO PREDATORS LOOK LIKE ONLINE?

Predators can look and pretend to be absolutely anyone.


The most skilled predators will come across as
completely normal, nice, flattering and funny. They may
use a photo of a person who is not them. Predators can
use any existing photo, piece of video or information
already existing on the internet and make it their own.

POST WITH CAUTION! DOUBLE CHECK POSTS.

If you put something up, you can take it down;


However people can see things in their timeline once you
have posted them.
Anything posted can be copied and shared by others. Even if
it was posted on your screen for one second and deleted, it
can still show up in someone's timeline if they just happen
to catch your up-to-the-minute update.

HEALTHY RELATIONSHIPS INVOLVE LOVE, RESPECT, TRUST

WWW.PROJECTPLAYBOOK.CA
PARENT'S VERSION 18+

PROJECT PLAYBOOK
WWW.PROJECTPLAYBOOK.CA
YOUR GUIDE TO STAYING SAFE ONLINE!

Inner and Outer Circle

WHO CAN KIDS TRUST?

Members of your inner circle are mom and dad,


brothers and sisters, close friends and other trusted
adults. Anybody outside of that we need to talk to kids
to establish who is considered safe. Parents have to
approve who kids deem is in the inner circle. It is the
best way to keep kids safe.

Activities with Kids


NAME INNER AND OUTER CIRCLE
SAFETY PLAY: HAVE YOUR CHILD
THINK OF EXAMPLES OF PEOPLE
IN THEIR INNER AND OUTER
CIRCLE. TEST CHILDREN TO
MAKE SURE THEY KNOW THAT
ANYONE THEY MEET ONLINE IS IN
THEIR OUTER CIRCLE.
STRANGERS ARE IN OUR OUTER
CIRCLE ALSO.
WHO ELSE CAN KIDS TRUST IN
SOCIETY?

ADULT WHAT DO PREDATORS


SUPERVISION LOOKACCESSIBLE
ON INTERNET LIKE ONLINE?
DEVICES

Children should be closely monitored while using devices


capable of accessing internet. For young children under 12
it is best to access the internet alongside your child.
Engage in healthy activities on the internet like a virtual
field trip around the world. Set parental controls.

HOW TO SET PARENTAL CONTROLS

Many internet browsers offer levels of protection from


displaying unwanted content in search results. You can
enable parental controls on browsers. For young children
under 12 it is recommended you download an entirely kid-
friendly browser. Always keep parental controls enabled
for young teens as well to limit their ability to see
inappropriate material and/or violence online.

HOW TO TALK TO KIDS WITHOUT SCARING THEM?

Make connections between positive uses of internet but


offer gentle reminders that people online are strangers.

WWW.PROJECTPLAYBOOK.CA
PARENT'S VERSION

PROJECT PLAYBOOK
WWW.PROJECTPLAYBOOK.CA
YOUR GUIDE TO STAYING SAFE ONLINE!

ONLINE ACTIVITIES TO DO WITH KIDS

Examples: Case Studies. Mapping, Conservation


projects. Scientific research. Allow kids to understand
they can build a career using the internet. Talk about
serious things with balance. Give kids credit where
credit is due!

Positive Use Ideas! Great Ways


to Use Internet
LEARN A NEW SPORT!
Find websites to look at together.
Learn a new instrument or song.
Make your own fun broadcast
together.

SAFETY PLAY: CHECK


PROJECTPLAYBOOK.CA/BLOG FOR
KID-SAFE SEARCH ENGINES TO USE.

WHAT DO PREDATORS LOOK LIKE ONLINE?

Children and teens need to be taught to never, ever reveal


personal details about themselves that make them appear
vulnerable. Vulnerability is an appealing target for predators.
Your child's feelings are important and need to be discussed, just
not online! Ask them to keep these feelings to members of their
“Inner Circle” which includes; family, close friends, and trusted
adults (that parents approve).

MONITOR YOUR CHILDS


INTERNET USE CLOSELY
WWW.PROJECTPLAYBOOK.CA
PARENT'S VERSION

PROJECT PLAYBOOK
WWW.PROJECTPLAYBOOK.CA
YOUR GUIDE TO STAYING SAFE ONLINE!

ONLINE LANGUAGE
Professionals, athletes, government officials and public relations
firms teach these important rules about 'online language'.
This is one of the best 'plays' you can use to stay safe online!

Anything you or your child posts online should


follow this important "Play": USE ONLINE
LANGUAGE!
SAFETY PLAY: Post only POSITIVE, HAPPY and
PROFESSIONAL updates!
Ask yourself if this post is SAFE and positive before
you post. Teach kids to ask themselves the same
question. The best play is to post no complaints!

Teach Kids This Safety Play !


COMMUNICATE OFTEN!
If your child is having a tough time
with anything, talk to them.
Encourage them to talk to people
they can trust in their inner circle.
Avoid posting about problems
online! Predators pick up on
vulnerability on the internet.

Strangers online can be "tricky people".


WHAT DO PREDATORS LOOK LIKE ONLINE?
'Tricky people' is a term that kids
understand without scaring them too much.
Kids should understand if anyone tries to
say mean things or ask them personal
questions they should: STOP, BLOCK AND
GO TALK TO THEIR INNER CIRCLE.

Everyone kids meet online is a stranger. Tricky people


can have screen names or photos that look like a nice
person. A tricky person is UNSAFE. They want to
extort, lure, troll, bully and be mean online. Tricky
people can be sinister too, like human traffickers or
child predators.

SAFETY PLAY:
STOP, BLOCK, TALK!
WWW.PROJECTPLAYBOOK.CA
PARENT'S VERSION

PROJECT PLAYBOOK
WWW.PROJECTPLAYBOOK.CA
YOUR GUIDE TO STAYING SAFE ONLINE!

BE ALERT! BE AWARE

PROJECT PLAYBOOK INVESTIGATIVE RESEARCH

Playbook visited popular chatrooms and played the newest


online games. We tried a variety of screen names, some of
which followed the rules and some that did not. When
using safe screen names we successfully avoided attracting
the wrong kind of attention. When using unsafe screen
names we were approached by a number of tricky people.

Grooming & Fishing Tactics Explained:


Predators and human traffickers (tricky people) use lures
and tricks while preying on vulnerability.

Investigative results exposed disturbing messages and


material. We had threats to share intimate images and
expose ourselves on a live “cam”. Tricky people used a
variety of lures such as offering modeling jobs if we
sent pictures and went on a live cam, or asked our
sexual preferences and experiences under the guise of
it being to help with school projects. Others used more
subtle tactics, “fishing” for seemingly innocent
information that could be used to reveal identity and
location. Case studies citing our encounters with “real”
tricky people are available at projectplaybook.ca

Fishing is when tricky people try to find out


information about you or your child. They may
ask about favorite sports teams or the weather.
Teach kids not to respond to any types of
personal questions (fishing).

Activity: Identify good post ideas & 'not great' posts.


Compose a Good Post with kids!
Activity: Test your child to be sure they know not to
answer "fishing" questions. Test children to ensure
they understand people can find out more about them
through simple questions.

KNOW THE RISKS AND


THREATS
WWW.PROJECTPLAYBOOK.CA
PARENT'S VERSION

PROJECT PLAYBOOK
WWW.PROJECTPLAYBOOK.CA
YOUR GUIDE TO STAYING SAFE ONLINE!

ONLINE PREDATION
Tricky people operate in many ways. While some are
straight-forward in their intentions using vulgar or
sexual language, sharing pornographic materials etc.,
others will be far more subtle and patient in their
approach.

RED FLAGS
A predator's goal is to trick people into believing
they care about them. They do this by using using a
series of “lures” and expert grooming
techniques. Here are some “red flags” and
behaviours that could indicate a potentially
dangerous person or situation.

RED FLAG: if someone approaches you online that


you do not know in-person and is too interested or
nice or asks too many questions. They may seem
“too nice” and the questions may seem very
innocent.
Tricky people have a playbook too, but when you
know their plays, it is easy to counter with your own
arsenal of plays that work every time.
"STOP contact, BLOCK the bully & TALK to someone".
Plays tricky people use include: Grooming and
Fishing, Luring Tactics and Threats

Common Lures Used By Tricky People...


-Job Offers
-Seeking Help or Assistance
-Flattery
-Bribery
-Gifts

LACK OF INTERNET SUPERVISION IS


AN OPPORTUNITY FOR TRICKY
PEOPLE TO ACT ON THEIR PLAYS.
WWW.PROJECTPLAYBOOK.CA
PARENT'S VERSION

PROJECT PLAYBOOK
WWW.PROJECTPLAYBOOK.CA
YOUR GUIDE TO STAYING SAFE ONLINE!

RED FLAG: if someone you met online begins


gradually making more frequent contact with you.
OR if someone you met online begins asking more
and more questions (even ones that are no big deal)
they are “Fishing”.
Grooming, Fishing, and Mirroring are behaviours used by
bad guys to trick us. These behaviours are a dead give
away that something is wrong.

Grooming: The Process


Phase 1: Friendship Forming
The first few chats appear normal, polite and casual.
“Good luck in the game tomorrow” or simply “Talk soon”.

Phase 2: Flattery Phase


Predator asks for a picture or measurements, tells the
young person how handsome or pretty and mature they
are. "Wow, you must be the fastest person on the team,
look at how much taller you are than the rest of your
teammates” or "You look pretty in that new dress”. They
only say things they feel the victim wants to hear,
manipulating victims into thinking that they understand
and care about them more than the true loving and
caring people in their life. Predators do not care about
children’s well being. They will always side with your
child, even when the child is wrong or made a poor
decision.

Phase 3: Relationship Forming


Predators' questions become personal. They may ask if
they have a boyfriend or girlfriend or ask if the victim is
getting along with family and friends. At this phase the
predator can subtly and gradually introduce sexual
topics, share pornographic materials, ask for intimate
photos or cam sessions, and normalize sexual behaviour.

Phase 4: Meeting
They will suggest to meet up and may offer to buy them
clothing, smart phones etc. or or even to take them to a
place or event that they are interested in.

PROJECT PLAYBOOK
WWW.PROJECTPLAYBOOK.CA
PARENT'S VERSION

PROJECT PLAYBOOK
WWW.PROJECTPLAYBOOK.CA
YOUR GUIDE TO STAYING SAFE ONLINE!

"FISHING" FOR INFORMATION

People value being “listened to”. Listening = Caring. E.g.


family, friends and caring adults in their lives genuinely care
about them and love them. There is never a reason for
people who do not know your child to contact them online.

FISHING TACTICS

Seemingly innocent and unrelated information can direct


a predator to a very narrow search area in a very short
amount of time. Once they have limited amounts of info,
all they need in order to identify a child’s location is
access to a search engine and social media profiles. For
example:

"Going to the Golden Hawks game today."


"It snowed today at my school.“
“It’s loud when the train goes by my school!”

With these three pieces of info a predator can search


for the Golden Hawks team to identify towns with
teams of that name, check weather maps for where it
snowed on that day, and search schools that are
“Nearby” train tracks. .

Common Predator "Plays"

The bad guy searches details about the area, including the
child’s name in those towns, in attempt to narrow the
location or use it to draw more info from young people.
When the bad guy’s area is small enough, simple non-
specific details are enough for a bad guy to find a person.

PROJECT PLAYBOOK
WWW.PROJECTPLAYBOOK.CA
PARENT'S VERSION

PROJECT PLAYBOOK
WWW.PROJECTPLAYBOOK.CA
YOUR GUIDE TO STAYING SAFE ONLINE!

Information posted online or shared with predators is


used to trick children into thinking they have things in
common, or that they care or understand. They do this
to trick them into believing they are in a healthy
relationship when they are not. Predators are very
manipulative and highly skilled in “mirroring” a
person’s emotions. Mirroring means they pretend to
feel the same and understand how the person feels
when they do not.

This creates an illusion of friendship designed to break


down the barriers of "stranger danger." For example, if
a young person is lonely, the bad guy mirrors that
emotion by telling them that he understands how it
feels to be lonely and that he would like to be his/her
friend. They even copy the persons language.

SEXTORTION is a non-physical form of sexual assault.


Predators will use threats to manipulate victims into sending
intimate videos or photos. Once they have intimate material
they will threaten to share it unless the victim complies with
the threats or meets in person.

Cyber Stalking
Tricky people work online to learn
details about a person including
location of their school, work or
home or personal interests. From
there, the stalking may take a
physical form, exposing the victim
to additional violence.

PROJECT PLAYBOOK
WWW.PROJECTPLAYBOOK.CA
PARENT'S VERSION

PROJECT PLAYBOOK
WWW.PROJECTPLAYBOOK.CA
YOUR GUIDE TO STAYING SAFE ONLINE!

Online predators lure, groom


and/or extort the victim into
sending intimate images with
the intent to lure young people
into a physical encounter. They
may attempt to gain intimate
details or images.

CYBER BULLYING

Cyber bullying involves the use of online technology including


social media, messaging apps and online games to intimidate,
embarrass or harass others. Cyber bullies use trickery. They can
easily create multiple accounts on social media, giving the
impression that a large number of people have sided with the
bully, when it is simply not true.

Examples of Cyberbullying
-Sending mean messages
-Posting embarrassing photos or messages intended to be
private.
-Impersonating the victim online (fake facebook)
-Victim can be tricked into sharing personal information - which is
then shared publically to embarass them.

Human Trafficking
Human Traffickers use many of the same tactics used
by cyber bullies and online predators. The difference is
their motive is not sexual, it is mainly driven by profit.

How do Human Traffickers Work?


-They are skilled at using Online Technology (Info posted on
Facebook) to lure young people.
-They use online technology to identify and recruit victims
-The internet is often used to sell sexual services.

PROJECT PLAYBOOK
WWW.PROJECTPLAYBOOK.CA
PARENT'S VERSION

PROJECT PLAYBOOK
WWW.PROJECTPLAYBOOK.CA
YOUR GUIDE TO STAYING SAFE ONLINE!

Exposure to Inappropriate Material

Inappropriate material can be sexual or violent or


sexually violent. Children need to be told that if they
encounter anything online that is scary or gross, that
they need to stop viewing it, and talk! There are a
variety of safe search settings within regular search
engines for young children and for older teens as well
as unique safe-search engines.

REMEMBER: STOP, TALK AND BLOCK!

A combination of safe search options combined with


parental supervision is the best defence against seeing
unwanted, inappropriate material.

Visit ProjectPlaybook.ca to learn more about the


topics covered in this book and stay up to date.

For potentially dangerous situations, contact your local


law enforcement.
A great resources for learning about internet
safety, staying knowledgeable about technology and
getting help is: cybertip.ca

Assessing Readiness
Is my child ready to use the internet?

This is a subjective decision that only a parent can truly


make. Factors include naivety (is my child too trusting?)
vulnerability, (is my child sad or lonely?) or impulsiveness
(Does my child make smart choices?) We recommend
asking your child questions to help you as a parent assess
their state of readiness.

PROJECT PLAYBOOK
WWW.PROJECTPLAYBOOK.CA
PARENT'S VERSION

PROJECT PLAYBOOK
WWW.PROJECTPLAYBOOK.CA
YOUR GUIDE TO STAYING SAFE ONLINE!

A Tricky Situation
One of the founders of Project Playbook received an
invitation from a woman posing as a designer to collaborate
with her brand. Clothing was provided in exchange for
promotion. Communication was mostly done by social
media, first contact made through Twitter. Red flags were
present: flattery, mirroring and cycling through each
grooming tactic. The predation started with unusual
flattery and gifting of the clothes in exchange for
promotion.

After months of communication, including emails,


messaging apps and even a phone call, the arrangement
evolved. The designer suddenly presented a big time movie
offer in Atlanta for a lot of money. The grooming
culminated into a plane ticket being purchased by the
perpetrators for the victim with the promise of the movie
role, booked with no audition.

Due diligence uncovered false filming locations, no official


film credentials and no credible director/producer website.
An ultimatum was given: perpetrators provide license and
car plate of the driver who would be picking up the 'actress'
at the airport or the actress wouldn't fly there. The
predators blocked the victim when ID information was
requested. The FBI and Internet Crimes were made aware of
the situation.

Grooming in the above situation


occurred in phases and involved
multiple predators, including a woman.
Contact was maintained through
email, social media and phone.

It can be extremely difficult to accept and uncover tricks


being used by predators, especially when predators use
intensive grooming tactics. Ask questions until you are
completely satisfied that the situation is safe.
Remember to keep your social insurance number, credit
information and banking details private. Teach children to
be aware of tricky people. Follow the 'online language'
principles and never disclose private info!

PROJECT PLAYBOOK
WWW.PROJECTPLAYBOOK.CA
PARENT'S VERSION

PROJECT PLAYBOOK
WWW.PROJECTPLAYBOOK.CA
YOUR GUIDE TO STAYING SAFE ONLINE!

Online life is different from real life


Anyone can be, or say, or make up anything
online! Know this!

PEOPLE CAN MAKE MORE THAN ONE


PROFILE ONLINE!
THIS IS VERY EASY TO DO!

SAFETY TIP
KEEP YOUR PLAYBOOK CLOSE AT ALL
TIMES! Check the Playbook Blog often.
This is your guide to be safe online!

Teammates Matt and Theresa created


Project Playbook in 2017 to help kids
and parents stay safe online at all
times!

Thanks for reading PLAYBOOK!


Email Project Playbook:
INFO@PROJECTPLAYBOOK.CA
TWITTER @ProjectPIaybook
Facebook.com/ProjectPlaybook

PROJECT PLAYBOOK
WWW.PROJECTPLAYBOOK.CA/BLOG

S-ar putea să vă placă și