We explore the risks arising from the use and misuse of digital devices and electronic communication tools. We interview experts in the fields of cybersafety, cybersecurity, privacy, parenting, and technology and share the wisdom of these experts with you!
S10 E125 · Mon, April 21, 2025
This episode features a popular panel from the Inch360 event in Spokane, Washington. The panelists discuss what they've learned from various cybersecurity breaches. The panel includes experts from academic institutions and cybersecurity firms sharing insights on breach management, communication, and prevention tactics.
S10 E124 · Mon, April 14, 2025
In this episode, Steve Hobbs, the Washington Secretary of State discusses the importance of election security in Washington at the Inch360 event in Spokane. He outlines his background and experience in cybersecurity and military intelligence, before delving into the intricate processes and measures taken to ensure election security. This episode includes topics like: voter registration, accurate counting, the significance of paper ballots, combating misinformation and cyber threats, and protecting election workers.
S10 E123 · Mon, April 07, 2025
In this episode, Grant Erickson, CEO of Intellitech, leads a panel discussion on AI and cybersecurity at the Inch360 event in Spokane, Washington. The discussion features insights from industry experts Kevin Bostigan, John Shovick, and Garrett Oaken, exploring topics from AI's role in forensics and manufacturing to the challenges of generative AI and its future impacts on society and employment.
S10 E115 · Mon, March 31, 2025
This episode is a part of a special series of interviews conducted at the INCH360 Cybersecurity Conference in Spokane, Washington. Visit their website to learn more about INCH360 and their mission. On this episode, Jethro Jones interviews Peter Gregory , a keynote speaker from the conference. Peter discusses AI governance, highlighting the importance of setting clear objectives and the need for continuous oversight as organizations adopt AI technologies. He shares insights on the complexities of training AI systems correctly and the risks of removing human oversight. The conversation emphasizes the critical role of human involvement, especially in high-risk use cases, and offers practical advice for businesses looking to implement AI safely and effectively.
S10 E122 · Mon, March 31, 2025
This episode features Graham Moorhead, CEO of Pangean and adjunct professor at Gonzaga University, speaking live about the advancements and impact of AI, particularly in the context of cybersecurity. He explains the concepts of Type 1 and Type 2 AI, human modes of thought by Daniel Kahneman, and the challenges and potentials of AI in terms of safety, social engineering, and future developments.
S10 E121 · Mon, March 17, 2025
In this episode, host Jethro Jones is joined by Kenny Gluck. Kenny, a senior IT consultant at isOutsource, shares insights on IT consulting, common cybersecurity threats, and essential security practices for small and medium-sized businesses. The discussion also covers the importance of endpoint detection and response, email protection software, and DNS filtering. Bridging the gap from IT needs to solutions Same things that are happening to big companies are happening to small companies. Emails - Phishing, Smishing (SMS) Social engineering attacks. Scrapers - bots and farmers Free practices that you can do as a small and medium-sized business owner. To have good security, you do have to spend. As a business owner, you should be paranoid about it! Regular software updates Common sense privacy and browsing habits. Core basic cybersecurity tools regardless of company size. Endpoint Detection Response - EDR Email protection software - EPS DNS Filter - redirecting all web traffic to reputational rating of web sites Malicious links from compromised dropbox accounts VPN vs. DNS Filter. About Kenny Gluck Kenny Gluck is Senior IT Consultant at ISOutsource . has over a decade of experience in the technology industry. He’s held technical and operational leadership roles at several IT service providers, where he’s worked with clients in nearly every industry from financial services to manufacturing. He’s passionate about building long term relationships with his business partners and helping them leverage technology to solve complex business challenges. He is currently an IT consultant where he gets to do the things he loves most about technology, make it work for his partners in a way that they can sleep securely knowing they have all the right security and tools.
S10 E120 · Mon, March 10, 2025
In this episode, Chris Sadlowski speaks live at the Inch360 event in Spokane, Washington. Chris, with over 20 years of experience in the FBI, discusses the evolving landscape of cyber threats, common and emerging methods of cyberattack, and the significant risks posed by state-sponsored actors, criminal networks, and the personal impacts of cybercrime on individuals. He also touches on the importance of preparedness and effective communication in the cybersecurity realm, emphasizing the collective role in safeguarding against these threats.
S10 E114 · Mon, March 03, 2025
This episode is a part of a special series of interviews conducted at the INCH360 Cybersecurity Conference in Spokane, Washington. Visit their website to learn more about INCH360 and their mission. In this episode, Jethro Jones interviews Grant Erickson from Intellitech. They discuss the importance of integrating security with software development, common myths about cybersecurity, and practical advice on maintaining data security. Grant also highlights Intellitech's involvement in the community and their expertise in providing tailored software solutions.
S10 E119 · Mon, February 24, 2025
This episode features a panel discussion with the Eastern Washington University's CyberCup champions, held at the Inch 360 event in Spokane, Washington. The participants share their experiences, career aspirations, insights on cybersecurity, and how they utilize modern tools like ChatGPT in their learning process. The episode also includes a detailed explanation of the NCAE Cyber Games competition and a Q&A session addressing various cybersecurity topics.
S10 E113 · Mon, February 17, 2025
This episode is a part of a special series of interviews conducted at the INCH360 Cybersecurity Conference in Spokane, Washington. Visit their website to learn more about INCH360 and their mission. In this episode, Jethro Jones interviews Bryant Lee from Exbabylon . They discuss the importance of managed IT services, cybersecurity risks, and how Exbabylon helps organizations of all sizes mitigate these risks
S10 E118 · Mon, February 10, 2025
This episode, features a panel discussion from the Inch360 event in Spokane, Washington. The panelists discuss various trends in cybersecurity with a focus on social engineering. Key topics include the impact of human behavior on cybersecurity, the importance of continuous education and adaptation, the shift towards advanced phishing attacks, implementation of cybersecurity policies, and the emerging threats posed by technologies such as AI and deepfakes.
S10 E116 · Mon, February 03, 2025
This episode is a part of a special series of interviews conducted at the INCH360 Cybersecurity Conference in Spokane, Washington. Visit their website to learn more about INCH360 and their mission. In this episode, host Jethro Jones interviews Tracey Edou from Cascade School District . They discuss a cybersecurity breach in Tracey's school district and the lessons learned from the experience. The conversation covers steps taken to enhance security, including the use of wet signatures for direct deposit changes, the importance of staff education, and fostering a culture where it's safe to report suspicious activities. Jethro and Tracey also highlight the importance of clear communication between technical and non-technical staff and the value of proactive measures like tabletop exercises.
S10 E117 · Mon, January 27, 2025
This episode features a panel presentation by Peter Gregory from the Inch360 event in Spokane, Washington, focusing on AI governance. Peter shares insights on AI governance, detailing its importance, implementation strategies, and the risks associated with AI. He emphasizes the need for proper vetting, the role of corporate culture, and the importance of continuous review and adaptation in AI governance.
S10 E112 · Mon, January 20, 2025
This episode is a part of a special series of interviews conducted at the INCH360 Cybersecurity Conference in Spokane, Washington. Visit their website to learn more about INCH360 and their mission. In this episode, Jethro Jones interviews Hunter Weiffenbach from WatchGuard. They discuss the importance of WatchGuard's presence at the event, their focus on SMB market simplicity, the challenges of cybersecurity education, and resources available for students and IT professionals.
S10 E111 · Mon, January 06, 2025
This episode is a part of a special series of interviews conducted at the INCH360 Cybersecurity Conference in Spokane, Washington. Visit their website to learn more about INCH360 and their mission. In this episode, host Jethro Jones speaks with Stu Steiner from the Eastern Washington University Cybersecurity Program . They discuss the university's cyber team, their national championship win, and the importance of ethics in cybersecurity. The conversation also covers the structure of cyber competitions, training methods, and career outcomes for students involved in cybersecurity programs.
S10 E110 · Mon, December 23, 2024
This episode is a part of a special series of interviews conducted at the INCH360 Cybersecurity Conference in Spokane, Washington. Visit their website to learn more about INCH360 and their mission. In this episode, Jethro Jones interviews Briget Duncan from the Washington Alliance for Better Schools . They discuss the organization's role in enhancing STEM education through partnerships with industry leaders and the impact of their STEM for Good after-school programs on students in Spokane Public Schools.
S10 E109 · Mon, December 09, 2024
This episode is a part of a special series of interviews conducted at the INCH360 Cybersecurity Conference in Spokane, Washington. Visit their website to learn more about INCH360 and their mission. In this episode, Jethro Jones interviews Mark Neufville from Spokane Falls Community College. They discuss Mark's involvement with the conference, cyber security education for young people, and the importance of cyber awareness in the community.
S10 E108 · Mon, November 11, 2024
This episode is a part of a special series of interviews conducted at the INCH360 Cybersecurity Conference in Spokane, Washington. Visit their website to learn more about INCH360 and their mission. In this episode, Jethro Jones welcomes Joe Gellatly, founding partner of Medcurity . Joe discusses the importance of cybersecurity in healthcare, how Medcurity helps healthcare organizations manage and reduce data breaches, and the significance of proactive risk assessment and compliance under HIPAA. The conversation delves into the evolving nature of cybersecurity needs, practical steps for healthcare providers, and the balance between cost and security measures.
S10 E107 · Mon, October 28, 2024
This episode is a part of a special series of interviews conducted at the INCH360 Cybersecurity Conference in Spokane, Washington. Visit their website to learn more about INCH360 and their mission. In this episode, host Jethro Jones interviews Kevin McMahan, the Assistant Secretary of State for Washington. They discuss the Washington State elections process, measures in place to ensure election security, and the role of information security in state operations. 00:58 Role and Responsibilities 02:10 Ensuring Election Security 03:56 Logical and Accuracy Testing 01:17 Civic Engagement 07:35 Managing Information Security 10:28 Challenges and Solutions
S10 E106 · Tue, October 15, 2024
This episode is a part of a special series of interviews conducted at the INCH360 Cybersecurity Conference in Spokane, Washington. Visit their website to learn more about INCH360 and their mission. In this episode, Jethro Jones interviews Michaele Armstrong from the Evergreen Bioscience Innovation Cluster . They discuss Evergreen's mission, the importance of cybersecurity in the bioscience industry, and key efforts to bridge the gap between industry needs and solutions. 01:07 Introduction of Michelle and Overview of Evergreen Biosciences 03:27 Cybersecurity in Bioscience Industry 06:10 Growing Talent and Internship Opportunities
S4 E174 · Thu, June 20, 2024
Creating Phone Free Spaces with Yondr Vital in an education setting to experience what life is like without a phone How you develop character through whether you’re using a phone or not. How to help teachers not be phone police. Support throughout the whole process Common complaints about schools Resetting expectations about structures School taking a constructive approach to support student growth and development How to do a rollout. Classroom vs. School phone free spaces. Tier 1 support worked better, but needs more communication. Accompanied by a strong and clear policy and then following through. More and more students are open to the idea of being phone free. Kids are aware that being connected all the time may not be beneficial. Yes, you can teach, but they need to actually do. Clarity and community buy-in. Graham Dugoni is the founder and CEO of Yondr . Since starting the company in 2014, he has been a leading voice in the emerging conversation about the effects of phones on society and mental health. Graham coined the terms “phone-free spaces” and “phone-free schools.” He is the product designer of the Yondr pouch and the Home Tray . His mission-driven mindset keeps the company focused on meaningful ways to help educators, artists, and organizations worldwide create distraction-free environments where focus and creativity can flourish without technology. Graham is a former professional soccer player and a graduate of Duke University.
S4 E173 · Wed, April 03, 2024
What are Zero Trust, SSE, and SASE Zero Trust - everything behind it was trusted in the past, now we think everything is untrustworthy. Poor handling of data by vendors SASE - Secure Access Service Edge - a framework that combines network security functions with WAN capabilities to support the dynamic, secure access needs of organizations. It is particularly relevant in today's distributed and cloud-centric environments. SSE - Server Side Encryption. Anonymous vs. identified Responsibilities of bringing them up as digital citizens. Examining the strength of your identity program. Student Privacy - VPNs, MFA, Zero trust eliminates the doors they don’t need to see. ZTNA Zero Trust Network Access Raising a hacker child. The impact of AI on cybersecurity - AI is only as good as the data it is trained on. IT Admins have all the power. Delivering an agentless solution so people can get the work done without leaving a mark on the user device. Using copilots to help with security, safety, reporting, etc. About John Spiegel John Spiegel has 25 years of experience running global networks and managing infrastructure. He is an industry pioneer in software defined networking (SDN) and software defined WANs (SD-WAN). John has spoken on the topic network transformation at industry conferences such as Gartner, InterOp, VMWorld, Palo Alto Networks Ignite as well as executive roundtable discussions. He has also been a customer advisor to companies like VMware, Palo Alto Networks and Cisco Systems. Disruptive startups have also leveraged John’s knowledge to bring products to market resulting in successful exits. He hosts a podcast called ‘ The Edg e’ where he discusses the role of the CISO, Zero Trust and explores the emerging SASE landscape. When not helping companies on their journey to modernize and secure their networks, John can be found cycling on the backroads of Oregon.
S4 E172 · Mon, April 01, 2024
Dan Brown from the Cybersecurity and Infrastructure Security Agency provides an in-depth technical discussion on email cybersecurity, focusing on SPF, DKIM, and DMARC protocols. The presentation includes practical examples, configurations, tools for checking email security, and upcoming changes in email authentication requirements.
S4 E171 · Sat, February 24, 2024
In this episode of the Cybertraps podcast, host Jethro Jones discusses the crucial topic of working with managed service providers (MSPs) and outside cyber services. Featuring a session from the Inch 360 conference in Spokane, Washington, the conversation dives deep into the value of cybersecurity measures, the challenges businesses face, and the best practices for selecting and managing MSPs. Speakers include Nolan Garrett, John Hansman, Sahan Fernando, and Bryce Lemming, who share their insights and experiences from various aspects of the cybersecurity industry.
S4 E170 · Thu, February 22, 2024
In this special live edition of the Cybertraps podcast recorded at the Inch360 event in Spokane, Washington, Jethro Jones interviews John Hansman, the CEO of Truit. They discuss Truit's role as a managed service provider with a focus on cybersecurity, the challenges and advantages for businesses using MSPs, and the importance of proactive cybersecurity planning. Hansman also shares insights from the conference and offers advice on staying prepared for cyber threats.
S4 E169 · Mon, February 19, 2024
In this special edition of the Cybertrops podcast, recorded at the Inch360 event on Gonzaga University’s campus in Spokane, Washington, Jethro Jones interviews Bryan Yamanaka, CEO and founder of Arkangelos. They discuss Bryan's transition from Seattle to Spokane, his perspectives on the local tech community, and the services his company provides for startups and SMEs focusing on cybersecurity, compliance, and governance.
S4 E168 · Tue, February 06, 2024
In this episode of the Cybertraps podcast, host Jethro Jones leads an expert panel discussion on the aftermath of cyber breaches. Panelists share insights on preparation, incident response, and long-term strategies for recovery and prevention. The conversation includes first-hand accounts, practical tips, and the importance of training and communication to mitigate the impacts of cyber threats.
S4 E167 · Fri, January 26, 2024
In this episode of the Cybertraps podcast, host Jethro Jones interviews Dominic Booker at the Inch360 event. Dominic discusses his journey into the IT and cybersecurity fields, his motivations for attending the event, and the importance of both digital and physical security. The conversation provides insights into building community in tech, mentorship, and the significance of being aware of security from multiple aspects.
S4 E166 · Thu, January 25, 2024
This episode of Cybertraps features an insightful panel discussion from the Inch360 conference held in Spokane, Washington, focusing on the latest trends and challenges in cloud security and systems architecture. Topics include: Cloud security issues Integration Reactive to proactive Effective practices in an evolving landscape.
S4 E165 · Wed, January 24, 2024
In this special edition of the Cybertraps podcast, recorded live at the Inch360 event in Spokane, Washington, Jethro Jones interviews Shawn Hafen from Spokane Teachers Credit Union (STCU). They discuss Shawn's role in managing STCU's cybersecurity team, the importance of local cybersecurity events, strategies for small businesses to enhance cybersecurity, and recommended resources for staying informed in the cybersecurity field.
S4 E164 · Wed, January 10, 2024
In this special live edition of the Cybertraps podcast, Jethro Jones talks with Nick Mirizzi at the Inch360 event at Gonzaga University. The discussion covers Nick's background in high tech and cybersecurity, the evolution of cloud security, the importance of outsourcing cybersecurity for small to mid-sized businesses, and the growing talent gap in the cybersecurity field. They also delve into the ethical and practical challenges around data security and leaving organizations.
S4 E163 · Tue, January 09, 2024
In this episode of the Cybertraps podcast, host Jethro Jones sits down with Pia Hallenberg at the INCH360 event at Gonzaga University in Spokane, Washington. Pia discusses her transition from a 20-year career in journalism to becoming a cybersecurity writer, the challenges and rewards of the profession, and the significance of the dark web in today's global economy.
S4 E163 · Mon, January 08, 2024
In this episode of the Cybertraps podcast, host Jethro Jones introduces a session from the Inch 360 Conference in Spokane, Washington. Heather Stratford, founder and CEO of DRIP7, discusses the latest trends in security awareness training and the continuing importance of addressing cybersecurity as a people issue. With compelling statistics and engaging questions, Heather emphasizes the role of continuous training, gamification, and job-specific learning in mitigating cybersecurity risks.
S4 E162 · Thu, January 04, 2024
This episode of the Cybertraps Podcast is a special live event edition from the Inch 360 conference in Spokane, Washington. Host Jethro Jones interviews Peter Gregory from GCI, discussing GCI's support for community initiatives, Peter's role in cybersecurity, his insights from the conference, and essential tips for maintaining good cyber hygiene.
S4 E161 · Tue, January 02, 2024
In this special edition of the Cybertraps podcast, Jethro Jones interviews Matt Porter, the founder and Chief Solutions Officer at AmorFati Labs, live at the Inch360 event in Spokane, Washington. Matt shares his background as a former intelligence officer and discusses his transition to starting AmorFati Labs, a deep tech studio focused on holistic medicine. The conversation explores the intersection of deep technology and healthcare, quantum computing in medicine, the challenges of medical education, and the importance of cybersecurity in vulnerable communities.
S4 E160 · Tue, December 26, 2023
This special edition of the Cybertraps podcast features an engaging conversation with Naci Seyhanli, IT Security Analyst at the Spokane Regional Health District. Hosted by Jethro Jones, the episode dives into the unique challenges and approaches to cybersecurity within a public health institution, the importance of staff education, and the value of maintaining good cyber hygiene practices. Naci shares insights from his career journey, the focus areas in his current role, and his aspirations from attending the Inch360 event.
S4 E159 · Wed, November 01, 2023
Graig Erenstoft, known as Officer E, is the digital safety expert for Connected Class . He has been presenting to parents and students for over 24 years and is currently a police lieutenant in Florida. In this episode, Officer E and host Ross Romano talk about: Defining digital safety for kids and its critical importance in the connected world The “Take Three for Digital Safety” video series for parents Common questions parents have about digital safety Facilitating parent-child conversations The fast-shifting digital landscape Mental health challenges from social media Tips to foster good, safe habits On Thursday, November 9 from 7-8 p.m. Eastern, Officer E will present a free webinar for parents and educators. If you’d like to attend, RSVP below: Take Three for Digital Safety: Tips for Keeping Your Child Safe RSVP Here or at https://connectedclass.com About our guest Officer E serves as the digital safety expert for Connected Class. He hosts the series “Take Three for Digital Safety” which provides valuable resources and tips to help parents navigate the challenges presented by the latest technology and social media trends. He has been presenting to parents and students for over 24 years and is currently a police lieutenant in Florida. Prior to his law enforcement career, Officer E worked as a youth director for 12 years before making the leap into law enforcement. As a law enforcement officer, he has served as a School Resource Officer, Field Training Officer, and among other duties, as a leader in the youth Police Athletic League. He enjoys engaging with students and parents to provide them with tools and resources to make good choices and stay safe. Officer E uses his training and experience as a police officer, husband, and father of two boys to relate to the challenges parents face each day in an ever-changing world on optics such as bullying, drugs and alcohol, and technology and social media. About today’s host Ross Romano is a co-founder of the Be Podcast Network and CEO of September Strategies LLC. He hosts The Authority Podcast, on which he interviews leading authors from the education world and beyond to draw out their invaluable insights on leadership, culture-building, transformation, and student & educator success. Listen here: https://authoritypodcast.net Ross is a leadership development and performance coach for professionals in a range of industries and consults with organizations and high-performing leaders in the K-12 education industry t
S4 E158 · Thu, August 17, 2023
Tod Johnston, a Senior Education Content Manager at Sphero, discusses how his company uses robots to teach cybersecurity concepts to middle school students. Their robotic balls help students visualize abstract cybersecurity topics like man-in-the-middle attacks. Tod explains how they developed lessons in collaboration with cybersecurity experts to give students an initial understanding of cyber threats and how to act responsibly online. Tod hopes to expand these lessons to younger students in the future. The discussion also touches on the challenges of educating both students and adults about cybersecurity given that technology is evolving rapidly and privacy policies are often difficult to understand. Sphero - Blueprint - basics of engineering Educators need to think about cybersecurity from a student’s perspective, rather than a technology perspective. We should be inviting students to learn about their privacy policies to help them make better choices. Sphero programmable balls are good for teaching programmable, algorithmic skills, but it’s always difficult to teach cybersecurity. An example of a man in the middle attack Can’t damage other people’s property Student in Miami-Dade who hacked the school district. Dr. Pauline Mosley collaborated on Sphero’s curriculum The hope for the future of designing software and hardware and what they should look like. - How GDPR has ruined the web About Tod Johnston Tod Johnston is a Senior Education Content Manager at Sphero, leveraging over 10 years of experience in classroom settings. With a focus on classroom technology, math education, STEM, and the environment, Tod applies practical teaching expertise to positively impact technology integration in schools. He also has experience as a Learning Experience Designer – designing curriculum, presenting at conferences, and researching educational technology and math education trends. He is dedicated to transforming education through innovative approaches.
S4 E157 · Tue, August 08, 2023
In Cybertraps 157, the APLUS Framework for adopting AI in schools is discussed. The framework emphasizes Accessibility, Privacy and Ethics, Learner-centered approach, Usability, and Sustainability. The irony of principals wanting AI to assist them while trying to prevent students from doing the same is highlighted. Examples of AI policies, including a plagiarism policy, are mentioned. The importance of viewing AI as an ecosystem rather than just a tool is emphasized. A blog post is referenced, stating that 73% of something is discussed. APLUS Framework for adopting AI A - Accessibility P - Privacy and Ethics L - Learner-centered U - Usability S - Sustainability The irony of principals asking for AI to do their jobs while simultaneously trying to find ways to prevent students from doing the same. Example 1: (I only have it in Email form) Plagiarism Policy Example 2: much better Peninsula school district: https://docs.google.com/document/d/1zM7qJbgPc01JG5d63XSLuJnRILaKdj2vvSGFqjWrrkw/edit AI is an ecosystem, not a tool. 73% of what blog post: https://world.hey.com/jason/73-of-what–80e24c13
S4 E156 · Mon, August 07, 2023
In Cybertraps 156, the podcast discusses the potential dangers of AI-fitted teddy bears. These toys have the ability to read children personalized bedtime stories using private information they have overheard. The episode highlights a news item that warns about the privacy concerns associated with these “scary” gadgets. Harry Harrison – “I Always Do What Teddy Says” – https://www.deviantart.com/aegiandyad/art/I-Always-Do-What-Teddy-Says–259013944 Jethro’s Copy from the book: https://www.dropbox.com/s/brrf8hkt3zbm2l8/I%20always%20do%20what%20Teddy%20Says.pdf?dl=0 Amazon link: https://amzn.to/44JeusZ News Item: “Beware of the AI-fitted teddy bears: ‘Scary’ gadgets could read children personalised bedtime stories using private details they have overheard, leading toymaker claims” – https://www.dailymail.co.uk/sciencetech/article–12233551/ChatGPT-style-teddy-bears-read-bedtime-stories-toymaker-claims.html (scroll down for story)
S4 E155 · Thu, July 20, 2023
In this episode, Jethro and Fred discuss chatbots and artificial intelligence. The episode covers the history of chatbots, including the Turing Test and the development of Large Language Models (LLMs) such as ChatGPT, Bing, and Jasper. The potential uses and issues with chatbots are explored, including incomplete or misinformation, theft of intellectual property, inappropriate uses, and threats to various types of jobs. The episode also touches on the impact of chatbots on education and the potential for weaponization of disinformation, cybersecurity, and more emotion-targeted advertising. Beginning of Cybertraps Podcast Episode Index Writebettr.com - test out AI with your poorly written emails AILeader.info - learn about AI and how to use it to save time with 3 minute masterclasses. Today’s Topic: Bot’s Up, Doc? Keynote delivered at last minute for Alaska Society for Technology in Education Artificial Life and Artificial Intelligence Why chatbots are NOT “artificial intelligence” – yet “The Father of Chat” The Turing Test Alan Turing OBE FRS [1912–1954] – British mathematician and computer scientist Leader in development of computer and algorithmic theory At Bletchley Park, helped design a machine to crack the Enigma code 1950 – Turing devises The Turing Test: Can a computer produce answers indistinguishable from a human? The Imitation Game 1954 – Turing commits suicide Large Language Models (LLMs) ChatGPT (esp. 4) Bing Jasper embedded AI Photoshop Google Workspace incredibly rapid change Current ChatGPT Issues Incomplete Data or Misinformation Theft of Intellectual Property Inappropriate Uses Response to MSU Shooting Threat to a Various Types of Jobs Mid-to Lower-Level Tech Media / PR Professionals Customer Service Paralegals / Attorneys? Religious Leaders? Monetization A Quick Object Lesson Censorship Is a Biz-Kill China Was a Tech Leader in 2010s WeChat AliPay Beijing (CCP) Got Nervous Party Officials Took Corporate Seats Goal Was to Limit Social Influence Chinese Tech Companies Slashed Investment in Pure Research ChatGPT and Education A Flawed Resource for Students Incomplete Information Misinformation Kids Will Use Technology to Cheat Not the First Time … Several Schools Have Had Cheating Scandals NYC Blocked, then Unblocked, Access to ChatGPT Responses and Solutions Tools for Identify
S3 E154 · Tue, May 09, 2023
In this episode, Fred Lane interviews Amos Guiora, a law professor at the University of Utah. The bulk of the interview centers on Professor Guiora’s recently published book, " Armies of Enablers: Survivor Stories of Complicity and Betrayal in Sexual Assaults" . In his book, Professor Guiora attempts to answer a difficult question: “What do sexual assault survivors expect of the enabler-bystander? In this powerful book, Amos N. Guiora shares the stories of survivors to expose how individual and institutional enablers allow predators to perpetrate their crimes through silence and other failures to act. He then proposes legal, cultural, and social measures aimed at the enabler from the survivor’s perspective.” In addition to his work at the University of Utah law school, Professor Guiora has been active in S.E.S.A.M.E., the organization led by Terri Miller that is working the so-called “passing of the trash.” Frederick Lane is an author, attorney, educational consultant, and lecturer based in Brooklyn, NY. He is the co-founder of The Center for Cyberethics and is a nationally-recognized expert in the areas of cybersafety, digital misconduct, personal privacy, and other topics at the intersection of law, technology, and society. Lane has appeared on “The Daily Show with Jon Stewart,” CNN, NBC, ABC, CBS, the BBC, and MSNBC. He has written ten books, including most recently Cybertraps for Educators 2.0 (2020), Raising Cyberethical Kids (2020), and Cybertraps for Expecting Moms & Dads (2017). He is currently working on his newest book, _The Rise of the Digital Mob_ (Beacon Press 2022). All of his books are available on Amazon.com or through his Web sites, FrederickLane.com and Cybertraps.com . With Jethro Jones ( The Transformative Principal ), Lane co-hosts “ The Cybertraps Podcast .” He is also the publisher of “The Cybertraps Newsletter” ( newsletter.cybertraps.com ).
S3 E153 · Sun, April 02, 2023
Update from Ghana - #2023–03–13_1100 Meeting with the Cybercrime Unit of the Ghana Police Service - #2023–03–14_1200 Visit to 5/6 classroom at Primus Hybrid School - #2023–03–19_1400 Pan-Africa webinar for parents - How can parents and carers monitor their children’s online activity without infringing on their privacy? - What are the long-term effects of excessive technology use on children’s mental and physical health? - How can parents and carers stay informed about new technology trends and potential risks? - What should parents and carers do if they suspect their child is being cyberbullied or harassed online? - How can parents and carers effectively communicate with their children about technology use without creating conflict or tension? - How can parents and carers address their own technology use and set a good example for their children? - What is the role of peer pressure and social media in shaping children’s online behavior, and how can parents and carers help children navigate these pressures? - How can technology be used to enhance learning and development for children, and what are some best practices for incorporating technology into education? - How can parents and carers help children build healthy relationships with their devices and encourage offline activities and hobbies? - What is the role of technology companies and platforms in promoting safe and responsible technology use, and how can parents and carers hold them accountable? - The Growing Problem of Deepfakes - News Item: New York students create a deepfake video of middle school principal saying racist things “https://www.washingtonpost.com/nation/2023/03/14/racist-deepfakes-carmel-tiktok/” - Details - Target of the malicious attack was George Fischer Middle School - In late January or early February, multiple videos were released on Tiktok, with a male voice laid over videos of Principal John Piscitella - The voiceovers contained racist statements and threats of violence - TikTok quickly took the videos down but not before they were seen by multiple students - Carmel Central School District sent out a letter on February 13, 2023, alerting parents to the videos and saying “that three high-schoolers had “used artificial intelligence to impersonate the staff” and made them appear to make “inappropriate comments” in videos.” - The school did not describe the videos, nor did it specifically mention the racist comments or threats of violence - Simultaneous, local police closed their investigation after determining that no crime had been committed - The District defended its response to angry parents, saying that “they were trying to balance disclosing sensitive information without generating panic” - But parents accused the District of minimizing the videos - The videos raise many issues, most controversial: - Racism - Student Privacy - The Use and Abuse of Technology (particularly AI) - Threats of Gun Violence - Disciplinary action was take
S3 E152 · Fri, March 17, 2023
Fred is in Africa until April 1. Sign up for updates from Fred Interview with Awo . US State Department sponsored trip through Fullbright Specialist Program SchoolAI Fred’s Presentation about ChatGPT at ASTE . Jethro’s chat with Damon Hargraves RE: ChatGPT on Transformative Principal Rise of low level betting in rural areas. Ho, Ghana - Tech forum and fair for women. Statistic - In Africa, adoption of Smartphones is about 30% in high school and 10% in middle school.
S1 E151 · Wed, January 18, 2023
TONY BRASUNAS, independent journalist and author of the forthcoming RED, WHITE & BLIND : The Truth About Censorship in America and the Rise of Independent Media , which aims to explore media distortion and disinformation in the U.S. as well as the upswell of independent media that has risen up to combat it. Corporate media vs independent media “ How 5 Companies Control All US Media ” New trends: corporate media trying to maintain control Factcheckers as part of corporate media Astroturf independent media (not actually independent) Tremendous bias from corporate media Innocent bias, Systemic bias, Nefarious bias. Operation Mockingbird - Journalists being fed info or were agents, or were public figures Impact of the internet on corporate and independent media. The New Enlightenment No intermediaries Disinformation - building up false perspectives Censorship - hiding information Origin of COVID Weapons of Mass Destruction Ambassador’s daughter in Congress pretending to be a nurse. Are there bad and nefarious people in corporate media or are many people just being hoodwinked. The role of big corporations and perverse incentives. The Narrative Corporate media has the “power to deliver that narrative” Corporate media sees their biggest threat as corporate media Journalist - we’re all journalists. Balanced media diet - 40 sources to give you an idea of what is really going on. Tony’s Media Pyramid Watch for confirmation bias. The media narratives are the water that we swim in. How to share media effectively. Use the internet to share ideas you think are good. Science is not a set of answers, it’s a way to question. Censorship is anathema to science and democracy.
S1 E150 · Tue, January 17, 2023
This interview is from a recent conference that Fred and I attended called Professional Practices Institute . We had the chance to talk with some great people from around the country. I hope you enjoy this episode. Fitting that for our 150th episode, we would have Dr. Glenn Lipson join us on the program again. - Forming a bucket brigade instead of a single bucket - Help others know their role. - Connecting across the country. - Intervening early prevents people falling down a slippery slope - Recognize the path of many interventions. - Find a champion - Anything worthwhile you’re doing should be comfortable sharing. - Guilty, Angry, Loneliness, Embarrassment. GALE forces - Empowering youth voices - Lonliness and isolation leads to perversion when people can’t find ways to self-soothe.
S1 E149 · Wed, January 11, 2023
This interview is from a recent conference that Fred and I attended called Professional Practices Institute . We had the chance to talk with some great people from around the country. I hope you enjoy this episode. Felicia Villalobos - Hawaiian Language permit - technology issues.
S1 E148 · Sat, January 07, 2023
This interview is from a recent conference that Fred and I attended called Professional Practices Institute . We had the chance to talk with some great people from around the country. I hope you enjoy this episode. 148 Brytton Sorgenfrei & Justin Darling - 2 people for the whole state - Teaching administrators to start taking snapshots - How to investigate social media.
S1 E145 · Mon, January 02, 2023
This interview is from a recent conference that Fred and I attended called Professional Practices Institute . We had the chance to talk with some great people from around the country. I hope you enjoy this episode. meet 6 times a year, over 100 cases each year. Different in what they can take action for. Teachers growing up with social media, using it for everything. Boundaries Virtual life vs real life
S1 E147 · Fri, December 23, 2022
This interview is from a recent conference that Fred and I attended called Professional Practices Institute . We had the chance to talk with some great people from around the country. I hope you enjoy this episode. Terri Miller: President of SESAME - Dirty Secrets Pittsburg Post Gazette - NV criminalizing sexual acts with students over the age of consent - SESAME Act designed to prevent passing the trash - Dr. Billie-Jo Grant - board member at SESAME - ESSA bill prohibits separation agreements and confidentiality
S1 E146 · Fri, December 16, 2022
This interview is from a recent conference that Fred and I attended called Professional Practices Institute . We had the chance to talk with some great people from around the country. I hope you enjoy this episode. Investigative Reporter for Business Insider - Twitter Investigating grooming of high school students by teachers Grooming the community, then grooming the family, then grooming the victim.
S1 E144 · Tue, November 29, 2022
This interview is from a recent conference that Fred and I attended called Professional Practices Institute . We had the chance to talk with some great people from around the country. I hope you enjoy this episode. Jamie Boyd, Southern Arkansas University - Online K–6 coursework that leads to licensure targeted at paraprofessionals - Only university where enrollment has gone up. - Valued as professionals - How to solve the problem: - Pay - Focus in great teaching and providing autonomy
S1 E143 · Sat, November 26, 2022
This interview is a recap from the conference that Fred and I attended called Professional Practices Institute . We had the chance to talk with some great people from around the country. I hope you enjoy this episode. In this episode Fred talks with Quinton “Q” Dale fro Massachusetts.
S1 E142 · Fri, November 25, 2022
This interview is from a recent conference that Fred and I attended called Professional Practices Institute . We had the chance to talk with some great people from around the country. I hope you enjoy this episode. Arizona School Risk Retention Insurance Trust - You can Never be Safe Enough. - Rise in the tools, use, manipulation - Secrecy and ability to keep up. - Easier to hide it now. - Handled with deliberate indifference - Someone could have stepped in. - Groomers start by grooming the community, then grooming the family, then grooming the individual.
S1 E141 · Thu, November 24, 2022
This interview is from a recent conference that Fred and I attended called Professional Practices Institute . We had the chance to talk with some great people from around the country. I hope you enjoy this episode.
S1 E140 · Tue, October 18, 2022
- Will your costume cost you your job? - Halloween will be celebrated on Monday, October 31, 2022. - Jethro’s Best Halloween Costume - Prediction: By mid-November, at least one teacher will have been fired for an inappropriate costume - Great article on the history of Halloween at History.com - Celebration dates back roughly 2,000 years, when the Celts lit bonfires and wore costumes to ward off ghosts. They called the celebration Samhain (pronounced “sow-in”) - “To commemorate the event, Druids built huge sacred bonfires, where the people gathered to burn crops and animals as sacrifices to the Celtic deities. During the celebration, the Celts wore costumes, typically consisting of animal heads and skins, and attempted to tell each other’s fortunes.” - “In the late 1800s, there was a move in America to mold Halloween into a holiday more about community and neighborly get-togethers than about ghosts, pranks and witchcraft.” - “Parents were encouraged by newspapers and community leaders to take anything “frightening” or “grotesque” out of Halloween celebrations. Because of these efforts, Halloween lost most of its superstitious and religious overtones by the beginning of the twentieth century.” - “Between 1920 and 1950, the centuries-old practice of trick-or-treating was also revived. Trick-or-treating was a relatively inexpensive way for an entire community to share the Halloween celebration. In theory, families could also prevent tricks being played on them by providing the neighborhood children with small treats.” - “Thus, a new American tradition was born, and it has continued to grow. Today, Americans spend an estimated $6 billion annually on Halloween, making it the country’s second largest commercial holiday after Christmas.” - “One quarter of all the candy sold annually in the U.S. is purchased for Halloween.” - Halloween Is Increasingly Popular Among Adults – Fascinating article in The Conversation - Between 2005 and 2018, the number of adults celebrating Halloween rose from 50% to more than 70% - Halloween is particularly popular among younger adults (18–34), who spend 2x older adults on costumes - “Halloween celebrations have changed, too: less trick-or-treating and more parties and bar hopping. Today, alcohol is as important as candy to the Halloween economy.” - But why? “If Halloween has become more popular among adults, it’s because traditional markers of adulthood have become less clear and less attainable.” - “Halloween, with its emphasis on identity, horror and transgression, can tell us about who we want to be and what we fear becoming.” - “For example, urban legends about razor blades in apples in the 1970s reflected cultural anxieties about loss of community and fear of strangers.” - Fred – “Operation Goblin” - “More recently, debates about skimpy costumes tap into broader concerns about young girls growing up too quickly.” - “Traditional markers of adul
S1 E138 · Tue, October 18, 2022
News Item: Molly Russell, a 14-year-old girl living in London, committed suicide in November 2017. Earlier today (Sept. 30, 2022), a senior coroner ruled that her death was the result of depression and “the negative effects of online content.” Inquest A two-week inquest into the cause of Russell’s death focused on her use of Instagram and Pinterest Process was very slow due to lengthy response time by tech giants Evidence showed that she viewed a variety of graphic content in the months before her death “Molly viewed more than 16,000 pieces of content on Instagram in the final six months of her life, of which 2,100 were related to suicide, self-harm and depression. The inquest also heard how she had compiled a digital pinboard on Pinterest with 469 images related to similar subjects.” “Algorithms, which curate a user’s online experience, recommended 34 Instagram accounts to Molly that were either “sad or depressive related”, while Pinterest sent a message to Molly’s email address recommending “10 depression pins you might like”.” The coroner found that some of the sites she viewed were “not safe” because they allowed her to view content inappropriate for a 14-year-old Ian Russell, Molly’s father, said “his daughter had reached out for help on Twitter to personalities with thousands or even millions of followers, who would not even necessarily notice a tweet from someone like Molly.” “One message, sent to US actress Lili Reinhart, which was read to the court, said: ”I can’t take it any more. I need to reach out to someone, I just can’t take it." “It is likely that the above material viewed by Molly, already suffering with a depressive illness and vulnerable due to her age, affected her in a negative way and contributed to her death in a more than minimal way,” the coroner said. “Elizabeth Lagone, the head of health and wellbeing policy at Meta, the owner of Instagram and Facebook, admitted Molly had viewed posts that violated its content policies and Lagone apologised.” “A senior Pinterest executive also apologised for the platform showing inappropriate content and acknowledged that the platform was not safe at the time Molly was on it.” An Enormous Problem Research in the UK showed 45% of children aged 8–17 have seen harmful content, including self-harm and suicide, pornography, sexualised and violent imagery, anonymous trolling, and content featuring images of diet restriction. According to the report, "[C]hildren rarely sought out this content. “It is promoted and offered up to them by highly complex recommendation algorithms, which are designed to capture and retain their attention. When harmful content is reported to platforms, children tell me that little is done in response.”
S1 E139 · Tue, October 18, 2022
This is a preview of Fred’s general session presentation at PPI on October 19 in Boise, ID Carrie Goldberg’s Thread about her lawsuit against Amazon The full title of the presentation is “The Cybertraps of Emerging Technologies: “Deep Fakes,” Augmented and Virtual Reality, the Metaverse, and Whatever AI Has In Store for Us” Outline Introduction The March of the Eduverse: A Brief Overview What Is Reality, Really? “Augmented” Reality “Virtual” Reality The Metaverse: The Avatar’s Playground Artificial Intelligence “Deep Fakes” : Old Concept, Terrifying Potential Fred’s live DALL-E 2 rendering Risk Factors for Educators Insufficiently Understood Technology Further Shared Space with Students Student Technological Edge Challenges of Supervision Potential Cybertraps Personal Distraction Inappropriate Content Professional Inappropriate Friendships Favoritism / Virtual Gift-Giving Invasions of sTUDENT Privacy Cyberharassment and Cyberbullying Virtual Assault Resources - #2022–09–27 This Artificial Intelligence App Wants To Make You A Better Teacher “https://www.forbes.com/sites/emmawhitford/2022/09/27/this-artificial-intelligence-app-wants-to-make-you-a-better-teacher/” - #2022–09–23 Opinion: The metaverse could be transformative, but it’s a legal and ethical minefield “https://www.cnn.com/2022/09/23/opinions/metaverse-transformative-ethics-thomason-spc-intl/index.html” - #2022–09–12 Metaverse Beckons A New Avatar Of Education But Are We Ready? “https://www.outlookindia.com/business/metaverse-beckons-a-new-avatar-of-education-but-are-we-ready–news–222843” - #2022–09–06 How artificial intelligence can be a force for good in schools “https://www.tes.com/magazine/teaching-learning/general/how-ai-artificial-intelligence-good-schools” - #2022–06–01 The Metaverse Is Already Here, and K–12 Schools Are Using It for Education “https://edtechmagazine.com/k12/article/2022/06/metaverse-already-here-and-k–12-schools-are-using-it-education” - #2022–05–11 The Metaverse: 5 Things Educators Should Know “https://www.techlearning.com/news/the-metaverse–5-things-educators-should-know” - #2022–04–25 What Is the Metaverse, Exactly? “https://www.wired.com/story/what-is-the-metaverse/” - #2022–02–15 Why you can’t have legs in virtual reality (yet) “https://www.cnn.com/2022/02/15/tech/vr-no-legs-explainer/index.html” - #2021–11–29 Teaching in the ‘Metaverse’? Roblox Looks to Make It a Reality “https://www.edweek.org/teaching-learning/teaching-in-the-metaverse-roblox-looks-to-make-it-a-reality/2021/11”
S1 E137 · Tue, September 27, 2022
News Item: A recent New York Times article reports that an increasing number of parents are buying Apple watches for elementary school kids Smartwatches for children are a booming sector of the tech market Hundreds of different models with a range of features Some smartwatches are tied to particular cellular companies, others are “unlocked” A 2020 survey showed that 31% of American teens owned a smartwatch, compared to 21% of adults Features and Selling Points of Smartwatches Limited apps / less distraction than phones Voice calls and basic texting (with cellular connectivity – typically part of family plan) Importance of Communication with Child for Schedule Changes, Emergencies Location tracking by parents Geofencing for alerts Can help delay requests for smartphone Some watches come with apps to help with time management and to encourage physical activity Apple introduced “Family Setup,” which gives parents the ability to supervise a range of data on the phone and limit notifications Smartwatch Issues to Consider Cost Durability/Fragility of Device Maturity / Development of Child Plan time to educate child on using device Will child wear it every day? Battery / Power management Brand Capture Safety and Etiquette Teach children to avoid distracted walking Don’t be distracted by watch when interacting with other people Understand risks of strange messages or calls Privacy Is the child’s information on the watch protected? Does the watch company comply with COPPA? Does the CHILD understand that his or her location is being tracked? Transparency is important. If smartwatch has a camera, child needs to understand privacy boundaries for themselves and others How Are Schools Reacting? Generally positive Fewer restrictions than smartphones Less distraction Recommended Brands Verizon GizmoWatch2 (~ $100) TickTalk4 (~ $190) Xplora X5 Play (~ $200) Apple SE (~ $300) Resources - #2022–09–01 How tech can help keep your kids safe at school - #2022–09–01 An Apple Watch for Your 5-Year-Old? More Parents Say Yes. - #2022–08–31 <a href="https://www.forbes.com/sites/forbes
S1 E136 · Tue, September 20, 2022
News Item – Students at Davisville Middle School in North Kingstown, RI set up a Discord subchannel to document inappropriate behavior by a teacher North Kingstown School District is a hot mess In April 2022, a series of lawsuits were filed against the District, high school administrators, and former boys’ basketball coach Aaron Thomas. The suit alleges that Thomas ordered boys to strip naked and then used calipers on their thighs to allegedly measure body fat percentage Complaints were made about Thomas’s behavior in 2017 and 2018, but the suit alleges that nothing was done Players felt coerced to cooperate because they were competing for spots on the team and playing time Defendants named in the lawsuit include: School committee members North Kingston finance director Former district superintendent Philip Auger Former HS principal and assistant superintendent Denise Mancieri Former teacher/coach Aaron Thomas A second lawsuit alleges that the District was slow to take action against a different coach who stalked a young student for weeks Parents complained repeatedly to school officials but received little cooperation Eventually, the teacher was removed from the district but went on to work in two other districts and is still licensed in Rhode Island Retired judge Susan McGuirl conducted an independent review of the District’s response to the Thomas complaints and concluded that the District and several of its employees had failed to take appropriate action When a school fails, they lost the trust of the community that they serve. Schools must recognize their failures and making the necessary changes to prevent something like this from happening again. That trust must be rebuilt, and that will take time, To rebuild this trust, they must be candid and transparent with the community they serve regarding the changes they are making and any future situations they may encounter. Following the report, administrators Auger and Mancieri resigned. In addition, the U.S. Attorney for the state of Rhode Island opened an investigation In July, six statements were filed with the U.S. Attorney regarding inappropriate behavior by two former North Kingstown coaches. They were accused of finding excuses to watch middle school girls in dance classes, inappropriate comments, encouraging sexualized dancing in class, and overly intimate spotting and assisting during gymnastics and exercise classes In his statement, a current Davis Middle School male student alluded to a “log regarding the comments and conduct that bothered us.” The Boston Globe obtained a copy of the log and reported on it in early September 2022 Several sixth grade boys were uncomfortable with ho
S1 E135 · Tue, September 13, 2022
News Item – On August 29, 2022, the California Senate unanimously passed the Age-Appropriate Design Act. It previously received unanimous approval in the State Assembly It is currently awaiting Gov. Gavin Newsom’s signature People expect him to sign it but it could anger tech companies, who might then be less inclined to support a Newsom run for president in 2028 Earlier this summer, the legislature rejected a proposed bill called the Social Media Platform Duty to Children Act It “would have allowed the state attorney general and local prosecutors to sue social media companies for knowingly incorporating features into their products that addicted children.” The California law firm Akin Gump Strauss Hauer & Feld LLP (see resources) has an excellent summary article regarding the Age-Appropriate Design Act The California Age-Appropriate Design Code Act is modeled after the United Kingdom’s Age Appropriate Design Code, which went into effect in September 2021 If signed, it will be the first piece of U.S. legislation "that imposes a number of novel restrictions and data protection obligations on businesses providing services to users under the age of 18, including: requirements to conduct a data protection impact assessment before any new services are offered, configure all default privacy settings to a high level of privacy (unless there are compelling reasons to suggest it is otherwise in the best interests of children), and provide an obvious signal to the child when they are being monitored or tracked by their parent, guardian or another consumer." The bill prohibits businesses from: profiling a child by default unless certain criteria are satisfied using the personal information of any child in a way that is materially detrimental to their well-being and using dark patterns to lead or encourage children to provide personal information beyond what is reasonably expected. Motivations Legislative and parental concern over impact of online services and products on children’s wellbeing The desire to create safer online spaces for children “The Act emphasizes that the best interests of the child should be taken into consideration by all businesses that develop and provide online services, products or features (“Services”) that children are likely to access and, in the event of a conflict between the businesses’ commercial interests and the best interests of children, the privacy and well-being of children must be prioritized.” Key features of the Act: It’s very broad in its application. Applies to online products and services “(i) specifically directed at children and (ii) that are “likely to be accessed” by c
S1 E134 · Tue, August 30, 2022
In this episode we talk with Scott Rabinowitz about the ethical implications of advertising to GenZ.
S1 E133 · Tue, August 23, 2022
News Item – The Boston Globe Publishes an Editorial Urging Schools to Prohibit Student Phone Use at School “https://www.bostonglobe.com/2022/08/22/opinion/sorry-kids-no-more-phones-school/” Overarching Questions / Issues This is a global issue 2022/2023 freshman are the iGen – born after introduction of iPhone in 2007 (!) Is this part of a move to de-emphasize screens in education generally? Will strict private schools scare away tech-savvy students? Justifications Distraction / Loss of Focus On average, kids unlock their phones 50 times each day Impact on Grades Many educators report improved performance when access to devices is restricted Post-Pandemic Need for Non-Phone Socialization Kids who engage more face-to-face are generally happier Less spontaneity and real-world creativity Teaching self-control should be part of school’s social-emotional curriculum “I think great ideas come from boredom.” – John Kalapos, Buxton history teacher and tech committee chair Methods Complete on-campus bans – no smartphones at all Partial bans – students allowed to use phones between classes and at lunch Lockbags / Pouches In some schools, teachers and administrators have a tool for unlocking containers Other schools have unlocking magnets at each exit; kids tap the bag on the magnet as they leave Partnership with Yondr [ https://www.overyondr.com/ ] Originally founded in 2014 to limit use of phones in music venues Cabinets (“Cellphone Hotels”) / Lockers / Hanging Shoe Organizers Some schools permit “dumb” phones and the use of laptops to access the internet One private school is promoting the Light Phone [ https://www.thelightphone.com/ ] Teachers encouraged to model good behavior by observing school bans Objections and Concerns Parents want to be able to contact their children In 2015, NYC Mayor Bill de Blasio abandoned a policy against phones in schools Kids are NOT enthusiastic Protests and fire alarms pulled at Torrington High School in Feb. 2022 Kids ignore school policies (as many as 2/3 disregard bans, according to a national survey) Efforts to police bans may also be damaging to learning and student mental health For some students, a phone may be their only technology Concerns over security of devices during the day Some teachers and school board members want to have schools incorporate phones (and especially social media) into curricula
S1 E132 · Tue, August 02, 2022
- News Item -- On June 24, 2022, the U.S. Supreme Court handed down its decision in Dobbs v. Jackson Women's Health Organization. - The Court expressly overruled Roe v. Wade (1973) and Planned Parenthood v. Casey (1992) - Each state is now able to adopt its own laws regarding the practice of abortion - Overview - An important reminder: Roe was a privacy case - The Court was trying to balance three separate constitutional principles - A woman's right to privacy - The State's interest in protecting the health of a pregnant person - The State's interest in protecting the life of a viable fetus - Roe was an extension of two earlier privacy cases: Griswold v. Connecticut (1965), which established a federal "right to privacy" with respect to a married woman's ability to obtain contraceptives from her doctor, and Eisenstadt v. Baird (1972), which extended that same right to unmarried women. - How Might Cybertraps Arise? - Suspicious Circumstances - It is often difficult to tell the different between a spontaneous miscarriage and a self-medicated abortion - Approximately 30% of all pregnancies end in a spontaneous miscarriage - Criminal Investigations - Abortion is now banned in six states - Alabama - Arkansas - Mississippi - Missouri - Oklahoma - South Dakota - It is a crime to perform abortions and in most states, to "aid and abet" someone having an abortion - The Health Insurance Portability and Accountability Act (HIPAA) does not prevent a doctor or medical organization reporting personal health data if they think a crime has been committed - Family Educational Rights & Privacy Act (FERPA) is very similar in this regard. - If someone reports that an abortion has occurred, local law enforcement or a local prosecutor could initiate a criminal investigation - Law enforcement can: - subpoena data from online account - conduct forensic exams of digital equipment - Civil litigation - A handful of states, led by Texas, have created systems that deputize enforcement to private citizens - Under that scheme, an individual located anywhere in the country can file a lawsuit alleging that another person performed an illegal abortion or aided and abetted a person in obtaining one - If the lawsuit is successful (by "a preponderance of the evidence"), the defendant can be ordered to pay a minimum of $10,000 as well as costs and attorneys fees - All of the usual civil litigation rules apply, including discovery of relevant evidence (apps, browser history, social media, cell phone records, etc.) - Risks for Educators - Social media posts that are contrary to state law - Reque
S1 E131 · Tue, July 26, 2022
Dr. Axton Betz-Hamilton was a victim of identity theft and wrote a book about the experience called “ The Less People Know About Us: A Mystery of Betrayal, Family Secrets, and Stolen Identity. ” Dr. Betz-Hamilton is now a professor at South Dakota State University specializing in identity theft. Isolated and moved around because of identity theft of her parents Axton was over half a million dollars in debt. Only found out the identity of the thief after her mom died. Parents can freeze credit reports Parents should check all three credit reports for each child. Experian Transunion Equifax If you’ve been a victim of Identity theft: File a police report Freeze your credit Get a counselor.
S1 E130 · Tue, June 14, 2022
The Saga of Ashley Payne (2011) After her first year of teaching, Payne went on a trip to Europe. When she returned, she created a Facebook album with several hundred vacation photos. A handful showed her enjoying a drink or two. The photo album was marked “private,” but could still be viewed by her Facebook “friends” (which did not include any students) She also mentioned on Facebook that she was heading out to play a game called “Crazy Bitch Bingo” at a local club One her vacation photos and the club post were printed out and sent anonymously to Payne’s principal On February 6, 2011, I appeared on CBS News “Sunday Morning with Charles Osgood” to discuss internet privacy; Ashley Payne was also interviewed. “https://search.alexanderstreet.com/preview/work/bibliographic_entity%7Cvideo_work%7C3165557” The Questions Can educators post photos of themselves on vacation on social media? Yes, but … Teachers are generally (and sometimes legally, as in Canada) held to a higher standard of conduct online Persistent double standard – female teachers more closely scrutinized and more harshly judged “Personal time” is often not “private” Challenging Definitions “racy photos” “scantily clad” “indecent” “risque” Legal Issues First Amendment Decency / Obscenity District / School Policies What are the potential risks? Aggressive searches by curious students Loss of privacy (i.e., control over what is shared) Oversharing by friends or family Posts by second employers (modeling agencies, fishing charters) Unflattering posts by a friend or a complete stranger Public criticism / parental trolling Harassment Adverse job actions Theft What can teachers do to protect themselves? Clean up social media channels before applying for jobs Review privacy settings Reflect on the true meaning of “friendship” Create a “Custom List” of Facebook or Instagram friends Share albums directly with trusted friends in Google Photos or Apple iCloud Selfie-searches Third-party scrubbers (but beware of scams) Hashtag Advocacy Russian teachers protested the firing of a Siberian teacher after she shared a photo of herself in a bikini, getting ready for “cold swimming” Legal counsel for adverse labor actions Resources - #2022–04–19 What the Tech: Facebook vacation photos “https://www.texomashomepage.com/what-the-tech/what-the-tech-facebook-vacation-photos/” - #2021–03–09 L.A. Teachers Union Facebook Group Warns Educators Not to Post Vacations Online Due to Bad Optics “h
S1 E129 · Tue, June 07, 2022
Show notes - The Uvalde School Shooting -- A Trove of Social Media Content - Gunman posted ominous photos of rifles and other messages on Instagram - He privately messaged a young woman that he planned to attack an elementary school - He used Yubo to threaten school shootings and show off a rifle - Context - Social media is one element of a complex problem - Uvalde already used security tech, including: - Raptor Technologies, for monitoring visitors - Social Sentinel, for identifying social media threats - Challenges posed by new, less-easily monitored online channels - Increased use of end-to-end encryption even on more well-established sites, like WhatsApp, Apple Messenger, Signal, etc. Facebook wants to make E2E encryption the default for Instagram and Facebook Messenger as well. Law enforcement is opposed. - FaceTime - Yubo - Snapchat - Instagram direct messaging - Discord - Twitch - "They are fundamentally designed to keep communications private, presenting different challenges than Facebook, YouTube and Twitter, where violent screeds and videos have been algorithmically amplified to millions of viewers." - "The way that generation uses social media more generally could render years of work to spot and identify public signs of upcoming violence obsolete, social media experts warn." - Responses - Culture of cybersafety - Department of Justice School Violence Prevention Program may provide funding [https://www.justice.gov/opa/pr/department-justice-invests-more-87-million-grants-address-school-violence](https://www.justice.gov/opa/pr/department-justice-invests-more-87-million-grants-address-school-violence) - Increased interest in social media surveillance products - No solid evidence that they work - May have built-in racial biases in algorithms - Helps to create a culture of surveillance - Conditions children that surveillance is the norm - Creates conditions (cameras, metal detectors, full-time police presence) that can make school feel like a prison - Surveillance technology more commonly used to punish minor infractions - Use of AI and algorithm-driven products - Facial recognition - Gun detection systems (scans of security camera footage) - Pandemic has driven surveillance in effort to keep kids masked and socially-distanced - Researchers argue that surveillance measures lower student performance - Resources - Dr. Glenn Lipson - #2022-06-02 The problem with schools turning to surveillance after mass shootings [https://www.vox.com/recode/23150863/school-surveillance-mass-shooting-texas-uvalde](https://www.vox.com/recode/23150863/school-surveillance-mass-shooting-texas-uva
S1 E128 · Tue, May 31, 2022
Show notes whenyouwonder.org 1–4–3 day in PA - 143rd day in the year. Get their book “When You Wonder, You’re Learning” Origin story - Gregg and philanthropy Grable Foundation Translating learning from the learning sciences sound like script writers in Fred Rogers. Remake learning network - Learning landscape. Rogers took the tech of his day and asked how can I make this good Fred Rogers wanted to use the technology of his day to minister to kids. Eric Erickson - identity development How can people do things like what Fred was doing in his time? How do I make what is attractive to kids good and constructive? So many people who can and should carry the work of Fred forward. We’ve got to lift those examples up. Go to church, go to a concert, go to a sporting event, go to school The agony of creation. Everything Fred was doing clearly had a purpose. Fred bridged theory and practice in a powerful way. Curiosity, collaboration, creativity Parables of Peanuts Whole child plus learning sciences equals = The Fred Method
S1 E127 · Wed, May 25, 2022
Show notes Dr. Charol Shakeshaft is a professor at Virginia Commonwealth University who studies educator sex abuse towards students prevalence and prevention. Subscribe to the Cybertraps Newsletter How much abuse of kids is happening and has it gotten better? Why has there been so much scandal around the catholic church and so little around The power of grooming students, colleagues, parents, etc. Uninterrupted and unobserved time with students. Much still occurs in the school fact to face. We don’t know how much this is happening, nor do we know whether it is increasing or decreasing. UAWW data surprisingly showed that students had been touched inappropriately by adults, when the study was looking for peer interactions. 10% of kids People don’t want to fund research in this area. Why the discrepancy between the catholic church and schools doing this. Predominant genders involved Districts are very closed when these things happen and don’t allow much to be said. Organizational decisions that get made about Structural issue rather than an individual issue. Challenges of a school system: not judging a colleague, closed rooms, nobody Did you see the signs? Why didn’t you say anything? The culture is such that they don’t feel safe saying something. SESAME Organization 133 superintendents - Too much passing the trash. We took care of the problem so “our” kids would be safe. By not saying anything, we are giving people permission to expand a predicliction Schools don’t just allow this to happen, schools help people find this in themselves. “It must be OK” if adults aren’t calling it out. Pay attention to how a student reports. Kids don’t say it straight up. Think of addictions, and what sets people up for doing that addiction. Start out being lonely and then it leads to another thing. Prevention - look at the organization - Policies (do they follow them?), training (not just mandatory reporting), hiring practices (not calling references), Presidium training
S1 E126 · Tue, May 17, 2022
Show notes News Item Screen Time Went Up During the Pandemic “The latest report from Common Sense Media confirms what many of us know intuitively: Entertainment media use grew faster in the last two years than it did in the four years before the pandemic. While many of us didn’t think it was possible to cram more entertainment screen time into our waking hours, we somehow managed to do so in 2021.” Overview What Is Screen Time? We’ve Been Worried about It Since the Introduction of TV Computers Accelerated the Issue (1980s and 1990s) Gaming Devices, Cellphones, and Smartphones Put It All on Steroids And Then There Was a Pandemic … What Impact Has All of This Had on Your Screen Time? Latest Studies Common Sense Media Report Tweens spend an average of 5.5 hours on entertainment media Teens spend over 8 hours Social media users are getting younger: 40% of children between 8 and 12 are on social media platforms Some significant variations based on gender, race, and family income Lower-income tweens spend as much as 3 hours more each day on entertainment media Smartphone Usage in 2021 37% of 11-year-olds use a smartphone 91% of 14-year-olds You can get a Pinwheel phone for your child to help with screentime management Screen Time Recommendations by The American Academy of Pediatrics Infants/toddlers, ages 0–2 years: No screen time exposure for infants and toddlers. The only exception being connecting with loved ones on a screen. Children ages 2–5 years: Up to one hour per day of high-quality screen time. Do not use technology as a babysitter In 2016, researchers found that babies (0–2 years) spend 42 minutes per day on screens, and children (3–4 years) spend two hours 40 minutes per day on screens. Most parents teach their child how to use a touchscreen by age two. Screen time usage per day was too high before the pandemic. It is even higher, now. Positive Benefits of Non-Screen Play Physical development Brain development Language development Tactile learning Critical-thinking skills Development of imagination Cooperation and conflict resolution Consequences Physical Posture and Bone Development Eyesight Hearing Psychological Disconnection Body image Bullying Anger and Hostility Radicalization Suicidal ideation</l
S1 E125 · Tue, May 10, 2022
Show notes News Item: - On December 28, 2021, Illuminate Education was hacked. The intrusion, which lasted until January 8, 2022, compromised the private data of nearly one million students in New York State (and maybe more) - The breach affected at least 24 school districts and 18 charter schools, along with one Board of Cooperative Educational Services (BOCES) - The company initially described the hack as an “attempted security incident” but then shut down both Skedula and PupilPath for more than a week to address the issue - Possibly the largest school data breach in U.S. history - What Is Illuminate Education? - A California-based edtech company (founded in 2009) that runs a variety of school information platforms, including Skedula (aka IO Classroom), PupilPath, and eduCLIMBER - From its website: - Our solution brings together holistic data and collaborative instructional tools, and puts them in the hands of educators. - As a result, they can visualize each student’s progress, determine the right instructional or intervention strategy, and take the best next action, moment-by-moment. - More than 17 million students and 5,200 districts and schools across all 50 states rely on Illuminate every day to move the student performance needle. - It does not have a NY state- or city-wide contract but it is an approved vendor, which means that it was “rigorously reviewed” by the IT Department for the state Department of Education - Schools use the platforms for a variety of purposes: - tracking grades and attendance - communicating with parents - contact tracing for COVID–19 - The company has earned about $5 million per year from NY schools - What Data Was Compromised? - A database containing a variety of personally identifying information, including: - names - birthdays - ethnicities - home languages - student ID numbers of current and former public school students going back to the 2016–17 school year - identities of special ed students - class and teacher schedules - identities of those receiving free lunch - Post-Incident Responses - Illuminate waited two months to formally notify the city - Avoid bad publicity and/or litigation - Negotiating with hackers - Avoid compromising investigation - Illuminate claimed that all student data is encrypted but the breach revealed that was not true - New York state law requires that student information be encrypted both “at rest or in motion” - The hack is still being investigated by the Dept. of Education, the New York Police Department, the FBI, and NYS Attorney General Leticia James - A school district in Connecticut also reported a breach, as did at least two in Colorado - New York State Education Department drafted a template for a letter/web page for parents - Notification of “unauthorized release of such data” - Notification of number of years of data affected (blank in template) - A promise that more information will be provided - What Are the Risks? - Profound impact on the ability of schools to functi
S1 E124 · Wed, May 04, 2022
Show Notes Starting Place Companies are constantly releasing new tools for tracking the physical movements of children. Should parents use them? Child monitoring apps and devices are rapidly becoming a multi-billion market By #2012, more than 20 million people were already using Life360 – just five years after the iPhone was released - #2019 UK study – 40% of parents/guardians had deployed real-time GPS tracking and 15% checked locations “constantly” A Relatively New Phenomenon Technology and consumer interest began growing in early 2010s Two main models Location-sharing – provides real-time updates of a device’s location Geofencing – provides alerts only when a device leaves or enters a specific area Specialized features are emerging Speed monitoring and crash detection for teen drivers Remote activation of device microphones “Stealth mode” – parents can install monitoring without any knowledge of child Motivations for Tracking Keeping track of devices or belongings Make sure kids are where they are supposed to be Keep a digital eye on children with health issues Stranger danger Risk overblown by sensationalist headlines? Violence Natural disasters Greater freedom for children? Relevant Technologies GPS (sometimes + WiFi) Backpacks Phones Gabb Wireless https://gabbwireless.com/ Pinwheel https://www.pinwheel.com/ Trackers Jiobit Watches Xplora X5 Play Bluetooth – limited utility in moving vehicles AirTags Tile Apps Circle Home Plus FamiGuard Family360 Find My Friends (Apple, 2011) Find My Kids (2016) iSharing Life360 (GPS) (2008) My Family Potential for Abuse Cybertraps for Spouses, Partners, and Lovers Fundamental Questions Is this legal? Yes. Parents have the right to supervise their children. As the owners of electronic devices, parents also have the right to install or remove software and establish rules for the use of the device. Does it work? Sonia Livingstone, a professor in the department of media and communications at the London School of Economics and Political Science, believes there is in fact “zero evidence that any of these apps keep children safer”. "I’ve never seen any and I look at all the evidence,” she says. Are both parents in agreement? When does parental supervisio
S1 E123 · Thu, April 28, 2022
New Item: British Journalist Yinka Bokinni led production of a documentary, “Inside the Metaverse: Are You Safe?”, which is airing on UK Channel 4 later today https://www.channel4.com/programmes/inside-the-metaverse-are-you-safe-dispatches She posed as both a 22-year-old woman and a 13-year-old girl The interactions horrified her What Is the Metaverse? Portmanteau of “meta” (“after” or “beyond”) and “universe” – so, “beyond the universe” A vague and complex term for an online space, typically including virtual reality OR a virtual world (like Fortnite, Roblox, Minecraft, World of Warcraft, etc.) No clear-cut definition, no established rules Few people fully appreciate how fast this will all happen Heavy reliance on user-generated content (particularly in chat rooms), which is protected by Section 230 Headsets, glasses, contact lenses? Most companies anticipate some sort of digital economy within those spaces Some plans to incorporate physical sensations, like smell, touch, and sound Who Can Access the “Metaverse”? Users of Oculus Quest (now called “Meta Quest”), a popular VR headset Apps are downloaded from the Oculus Quest Store that enable Oculus Quest users to interact with each in virtual space Apps can be used with multiple VR devices, not just Meta Quest Meta spokesperson: “We prohibit anyone under 13 from creating Quest accounts and design some experiences only for people 18 and over.” ’We have a suite of VR parental supervision tools to help parents and carers who choose to allow teens 13 and over to use the headset to monitor their use, limit the time they spend using it and ensure they take breaks." Some Emerging Risks More Difficult for Parents to Monitor What Children Are Doing Distraction / Addiction Economics Fraud Overspending on upgrades Loss of Privacy Physical Harms Motion sickness from immersive reality Discomfort / pain from wearing headsets too long Desensitization to harmful behavior Psychological Harms Racism / Misogyny / Hate Speech Crime Probably analyzed on the basis of harmful speech, not physical crimes Sexual Harassment and Assault User can’t “feel” unwanted physical contact but is aware that other user is making those motions in their physical space Safety Measures Better Age Verification Young children can get access to various examples of the metaverse Better Enforcement of Age-Limited Content Easy for young children to get access t
S1 E122 · Wed, April 20, 2022
News Item: Colorado Supreme Court Strikes Down Electronic Harassment Ban Three Speech-Related Crimes: Cyberbullying Using electronic communication tools to bully someone Cyber- or Electronic Harassment Online harassment (suggests a pattern of behavior more extensive than cyberbullying) Cyberstalking Harassment using electronic communications that creates fear of physical harm or injury Thanks to social media, these behaviors are increasingly a global problem Growing concern about rise in electronic dating violence among adolescents Electronic harassment includes messaging, calling and sending other items to illicit compliance via intimidation and fear tactics; electronic coercion is pressuring a partner to share sexual or illicit messages, pictures or videos; and electronic monitoring is the viewing, listening or reading of messages, images or videos of one’s partner. “We found that at age 12, youth are at risk of engaging in all three forms of electronic dating violence that we studied, and that between 9th and 10th grade—when youth are 15 to 16 years old—the risk of all three domains increases substantially. But we see that risk becomes somewhat constant or perhaps even declines after age 16,” said Elyse Thulin, a doctoral candidate at U-M’s School of Public Health, noting that more research is needed to understand the undercurrents of this decline. Connected homes and the Internet of Things is increasing the potential for this type of behavior These types of behavior can cause or contribute to serious harm for victims, up to and including suicide Children can be perpetrators as well as victims Responses and Solutions Statutory Most states have amended their relevant statutes to include the use of electronic communications to commit these crimes Some states have adopted statutes specifically prohibiting cyberbullying, cyberharassment, and cyberstalking In some states, these behaviors can be either a misdemeanor or a felony With respect to speech, such statutes are a restriction of First Amendment freedoms and as such, are subject to strict scrutiny by the courts In some instances, courts have struck down language in these statutes on the grounds that the phrases or terms used are “unconstitutionally vague and overbroad” Colorado: Supreme Court struck down phrase “intended to harass” Texas: Appellate court struck down a ban on online speech “intended to and reasonably likely to annoy” Corporate Terms of Service Site Behaviors Mute/Block Limiting Responses Unmentioning Litigation Lawsuits seeking damages for intentional infliction of emotion distress, invasi
S1 E121 · Wed, April 13, 2022
Lynn Clark, the Superintendent of the Chicopee Public Schools, is arrested for lying to the FBI over harassing texts See our interview with Quentin Dale about investigations. - Relevant Facts - Chicopee is a town of about 55,000, just north of Springfield, Mass. in the western part of the state - The Chicopee Public School District serves about 7800 students in pre-K to 12th grade, in 14 different schools - Clark, 51, was appointed superintendent in 2019 with an effective start date of February 2020. She began working in the district as a substitute teacher and eventually served as the principal of three schools and then assistant superintendent - Her first year as superintendent was considered to “outstanding” - During the city’s search for a new police chief, one candidate (a member of the Chicopee Police Dept.) began receiving a series of harassing texts - The messages threatened “to damage his reputation” if he did not withdraw from the application pool (and in fact, the officer did withdraw) - Some messages, the victim said, contained information that he had only shared with one person: Clark - Chicopee Mayor John L. Vieau reported the threatening texts to the FBI in early December - Clark was questioned by the FBI and initially denied sending the texts - She also claimed to have received similar threats - She subsequently admitted that she sent them and said “that the officer ‘had achieved many accomplishments based on [her] work’ and she wanted to see him ‘knocked down a peg.’” - By an 8–3 vote, the Chicopee School Committee voted to put Clark on paid leave - Issues - The Importance of Restraint and Self-Control - Big question regarding the relationship / connection between Clark and the police officer - “The FBI said that in January, Clark told investigators she feared the investigation was harming her professional reputation and ‘tearing the city apart.’” - How Clark Got Burned – The Difficulty of Truly Remaining Anonymous Online - Clark allegedly used a “burner app” to send approximately 100 threatening text messages - She told the FBI that she “she had also used similar burner apps to contact students’ parents who were ‘unresponsive’ to calls from numbers associated with the Chicopee Public Schools. - What Are ”Burner Apps“? - A ”burner app“ allows you to purchase one or more anonymous phone numbers. The company operating the burner app receives the call or text and routes it to your actual phone number, which the person on the other end does not know. When the user no longer needs the alternative phone number, he or she can ”burn“ it by discontinuing payment. Calls or texts to that number will no longer be forwarded. - Promotional explanation for the Burner app: - Use Burner for everyday situations. Create a disposable phone number for dating, salespeople, deliveries, shopping online or selling items on Craigslist. You can use it as a longterm second phone number for your business or side projects. Integrations with Dropbox, Google Dr
S1 E120 · Mon, April 04, 2022
White House Proclamation Goals Condemn and combat child abuse – physical, emotional, sexual, and online sexual exploitation Heighten awareness of risk factors Highlight importance of supporting families Child abuse occurs at all socioeconomic and educational levels, and in all religious, ethnic, and cultural backgrounds Key tool for fighting child abuse is prevention Child Abuse Statists – Centers for Disease Control and Prevention At least 1 in 7 children have experienced abuse or neglect in the past year In 2019, there were 73 million children in U.S. In 2019, 1,840 children died from abuse and/or neglect Long-term economic burden of child abuse and neglect is enormous 2015 estimate – $428 billion, comparable to economic costs of strokes and Type 2 diabetes Risk factors Risk Factors for Individual Perpetrators Caregivers with drug or alcohol issues Caregivers with mental health issues, including depression Caregivers who don’t understand children’s needs or development Caregivers who were abused or neglected as children Caregivers who are young or single parents or parents with many children Caregivers with low education or income Caregivers experiencing high levels of parenting stress and economic stress Caregivers who use spanking and other forms of corporal punishment for discipline Caregivers in the home who are not a biological parent Caregivers with attitudes accepting of or justifying violence or aggression Risk Factors for Families Families that have family members in jail or prison Families that are isolated from and not connected to other people (extended family, friends, neighbors) Family violence, including relationship violence Families with high conflict and negative communication styles Risk Factors in Communities Communities with high rates of violence and crime Communities with high rates of poverty and limited educational and economic opportunities Communities with high unemployment rates Communities with easy access to drugs and alcohol Communities where neighbors don’t know or look out for each other and there is low community involvement among residents Communities with few community activities for young people Communities with unstable housing and where residents move frequently Communities where families frequently experience food insecurity Role of Technology Number of children using a mobile device has more than doubled in last few years Parents have legitimate concerns about online safety “Sad fishing” – Predators search “for kids wh
S1 E119 · Tue, March 29, 2022
Ransomware is a growing problem for organizations, including schools What is it? How does it happen? Why does it happen? $$$ – $7bn in 2021 Who’s doing it? We are all on the front lines now Problems for Schools Down time for school personnel, distraction from mission Inability to access data; closure of schools Loss of data, identity theft, invasions of privacy Reputational damage Financial loss Technical and legal fees Ransomware payment How Can Schools Protect Themselves Have air-gapped backups Conduct routine cybersecurity audits and threat analysis Training and education for all members of the school community The greater the access, the more training is needed Particular focus on phishing (leading attack vector) and other intrusion methods Competent and thorough IT department Patch, patch, patch Limit ability to install new programs without thorough testing Collaboration with law enforcement Take advantage of increased funds for cybersecurity Bipartisan Infrastructure Law American Rescue Plan Act Increased interest in cybersecurity offers great opportunities for education and job training How Much Should Schools Share with the Public? Organizations often face a temptation to not report cybersecurity breaches Have a thorough response plan in place; review and update on a regular basis Consult with law enforcement to avoid interfering with investigation Communicate quickly and thoroughly with parents if (when) a cyberattack occurs Increased transparency helps define the scope of the problem and risk factors for others Resources - #2022–03–28 Funding Is Flowing for Cybersecurity Efforts in Every Government Jurisdiction https://www.cpomagazine.com/cyber-security/funding-is-flowing-for-cybersecurity-efforts-in-every-government-jurisdiction/ - #2022–03–27 LI schools hit with 29 ransomware attacks, hacks, other cyber incidents in past 3 years https://www.newsday.com/long-island/education/ransomware-cyberattack-virus-school-computer-networks-p5wjjhed - #2022–03–24 Officials are still in the dark on ransomware https://www.washingtonpost.com/politics/2022/03/24/officials-are-still-dark-ransomware/ - #2022–03–24 Why school districts need to be more transparent on cyber <a href="https://sta
S1 E118 · Mon, March 21, 2022
https://www.cybertraps.com/additional-resources Increased Use of Technology A Global Issue Explosion in the Use of Technology for Remote Learning General Increase in Screen Time Algorithmic Rabbit Holes Scope of the Problem 90% of Kids Are Regular Social Media Users Impact of Pandemic on Mental Well-Being of Children in General -- Almost Certainly Bad Some Disagreement as to Role of Technology and Social Media Particular Challenges for Girls Rise in Loneliness and Suicide Attempts Issues and Concerns Access to Inappropriate Materials on Poorly Set-Up School Devices (or Personal Devices) Impact on Student Privacy What Are the Search Terms Used by the School to Flag Messages or Searches? Emerging Technologies: Virtual Reality, Artificial Intelligence Responses Reasonable Limits on Screen Time for Children Possible legislation by U.S. Congress and EU to force tech companies to do a better job protecting children Increased surveillance of children by schools? Better training of school employees to recognize symptoms and warning signs More effective education regarding mental health; destigmatiz
S1 E117 · Mon, March 14, 2022
Show notes Https://jethrojones.com/how2be About the book Over 500 episodes of Transformative Principal 9 key dispositions and skills ![[how2be 1.jpg]] Self-care The fallacious idea that you should take care of yourself so you have enough in the tank to take care of others is one of the worst lies in education. Take care of yourself because YOU matter. Support for them, Support for you Support doesn’t always mean what you think it does. We’ll talk about how to have difficult conversations, how to understand your staff better, and how to help them be the best they can. In order to support others, you have to have support yourself. This program is a good start! Delegation We usually speak of strengths and delegation in terms of tasks. We need to start thinking in terms of people. Vision At the end of the calendar year, but in the middle of the school year, we address the vision. Is your school achieving your vision, or is it taking the path of least resistance? Observations Observations are not for evaluation! The evaluation is a nice way to summarize your observations. Observations are for measuring how well your vision is implemented. Communication Communication is not just about you speaking to others. It’s a two-way street, fraught with potholes, car accidents, and detours. Relationships Relationships can make or break a school. You’ll learn how to build good, strong, healthy relationships and how to maintain them, even through difficult conversations. You can’t force anyone to do anything, you can only invite. Hiring It’s never too early to talk about hiring. The earlier you have a plan, the better. Culture Culture is the foundation of everything in a school, but there is so much to it, it can be overwhelming. We’ll talk about how to make it work with small steps that make a difference. Why Jethro took so long to write the book Launch Party
S1 E116 · Thu, March 10, 2022
Al Kingsley is CEO of NetSupport and also serves as the Chair of two Multi Academy Trusts and a local School Governors’ Leadership Group in the UK. Al is a sought-after speaker and popular podcaster (NetSupport Radio). His book My Secret #EdTech Diary is not only a walk through his 30 year history in education, but also expresses a new way of thinking about technology in education. How technology use has changed. It’s about the usage of the technology. Redefining what our measures of impact are! No two schools are the same. Reflective practice. How do we know it is being used effectively? Be realistic in how we are interacting. Tech is part of what we already do! How do you decide which tools to use when? Pedagogical expertise to decide when to use tools Trust the people that are in the position to help the kids. Empower teachers to make choices, but peer assess of colleagues and what they are using. The role of students regarding ed tech. Student voice is critical in evaluating ed tech. Competence is not the same thing as wisdom. Digital Citizenship routine, connectivity with a familiar face, were vital during the emergency remote teaching Learner to learner engagement is important. Skills rather than knowledge are what unlocks the future. We need to get kids to the right place to learn. No matter how much technology grows, it requires humans to be focused. It’s not about the technology, it’s about the behavior. How to utilize technology. Pause and make sure all stakeholders understand why, how, and what you’re using. Always expect to invest at the same amount in professional development as you do in the tool itself. Less is more. Do you have any advice for these education leaders to do their best with the technology investment they’ve made in their schools? Is that advice different in 2022 than it was in 2019? What are the one or two changes in technology use (or even new tech tools) that would make a real difference in mental health and self-actualization of students? What security aspects should schools look out for when buying/reviewing technology?
S1 E115 · Mon, March 07, 2022
Motivations School safety Student safety Political / religious orthodoxy Legal Issues First Amendment rights Federal / State Legislation 2019 – Restoring, Enhancing, Securing, and Promoting Our Nation’s Safety Efforts (RESPONSE) Act Includes a provision called “Children’s Internet Protection” amendment that encourages districts to invest in programs that detect “online activities of minors who are at risk of committing self-harm or extreme violence against others.” Under the bill, almost all federally funded schools would be required to install software of this kind. Targets Teachers Students Parents Types of Monitoring Publicly-Available Content Private Accounts Messaging Tools Hacking / Unauthorized Intrusion Risks Invasion of privacy / overreach Chilling of speech Abuse of power against teachers, students, and/or parents Tools Human Resources / School Investigators Software / Artificial Intelligence Third Party Investigators Parents Resources - #2022–03–03 Mother at center of Rochester Community Schools social media scandal speaks out “https://www.clickondetroit.com/news/local/2022/03/04/mother-at-center-of-social-media-scandal-against-rochester-community-schools-speaks-out/” - #2022–02–25 Linewize Webinar Stresses Need for K–12 Safety Monitoring “https://www.govtech.com/education/k–12/linewize-webinar-stresses-need-for-k–12-safety-monitoring” - #2022–02–24 Lee County school district accused of spying on social media “https://www.winknews.com/2022/02/24/lee-county-school-district-accused-of-spying-on-social-media/” - #2021–12–17 Utah officials urge social media monitoring after school threats “https://kutv.com/news/local/officials-urge-social-media-monitoring-after-school-threats” - #2021–12–16 Schools ask parents to help monitor student’s social media amid vague threats “https://kutv.com/news/local/schools-ask-parents-to-help-monitor-students-social-media-amid-shooting-threats” - #2021–11–02 Berkeley County school leaders encourage parents to learn apps, monitor social media to keep children safe “https://www.counton2.com/news/local-news/berkeley-county-news/berkeley-county-school-leaders-encourage-parents-to-learn-apps-monitor-social-media-to-keep-children-safe/” - #2019–11–07 A Newly introduced Federal Bill prompts Texas schools to begin to monitor students social media “https://www.newschannel10.com/2019/11/07/river-road-isd-begins-utilize-software-monitor-students-social-media/” - #2019–11–01 New Bill Would Require Schools to Monitor Soci
S1 E114 · Tue, March 01, 2022
The TikTok Video about how to drive a captured Russian Tank: [https://twitter.com/JoshuaPotash/status/1498332884121399307](https://twitter.com/JoshuaPotash/status/1498332884121399307) - Our question today: Can Congress eliminate some of the worst content online without breaking the Internet? - [Eliminating Abusive and Rampant Neglect of Interactive Technologies Act of 2022 or the EARN IT Act of 2022](https://www.congress.gov/bill/117th-congress/senate-bill/3538) - First introduced in 2019 and has garnered bipartisan support - Legislation is designed to reduce or eliminate "child sexual abuse material" (CSAM). - Main provisions: - Establishes the National Commission on Online Child Sexual Exploitation Prevention. The commission must develop best practices for interactive computer services providers (e.g., Facebook and Twitter) to prevent, reduce, and respond to the online sexual exploitation of children. - Limits the liability protections of interactive computer service providers with respect to claims alleging violations of child sexual exploitation laws. - Replaces various statutory references to "child pornography" and "material that contains child pornography" with "child sexual abuse material." - Makes changes to the reporting requirements for electronic communication service providers and remote computing service providers (providers) who report apparent instances of crimes involving the sexual exploitation of children to the National Center for Missing and Exploited Children. - Among the changes, the bill requires providers to report facts and circumstances sufficient to identify and locate each minor and each involved individual. - The bill also increases the amount of time that providers must preserve the contents of a report. - Potentially significant amendment of Section 230 of the Communications Decency Act - Section 230 originally adopted to shield online service providers from legal liability for statements made by users - Provision is directly responsible for huge growth in services that rely upon user-created content (Facebook, Twitter, Instagram, etc.) - EARN IT Act would remove Section 230 protection for online services that do not adhere to state laws regarding the identification and removal of CSAM material - Legislation was approved unanimously by the Senate Judiciary Committee but may face a tougher vote in the full Senate - Concerns - Impact on personal privacy - Commission could conclude that a service that uses end-to-end encryption is not following best practices because E2EE makes it harder to detect the movement of CSAM - Patchwork of state standards could impose significant burdens on smaller services and companies - Online service providers may feel forced to examine user content before transmission - EARN IT Act could effectively turn online service providers into law enforcement agents, raising significant Fourth Amendment search and seizure issues - Risk of overreaction by tech companies and the deletion of a mu
S1 E113 · Thu, February 24, 2022
Get resources from Fred’s Presentations at ASTE ASTE is back in action! Educational technologists coming out of the classroom. crowdsourcing in edu is moving forward regardless of where you are. How can we share what we’re doing with each other without feeling overwhelmed and alone. Personalized learning is crowd-sourced learning stunned at the level of interaction from our people. Best takeaway from this conference: extending more into the student-led. Really focusing on individual kids. We haven’t had the connection, so it needs to be the center. Breaking the walls down. The culture and community in Alaska. What can we do to extend the learning beyond the four-day conference. Focusing on going forward - rollover. What was yesterday cannot possibly be tomorrow Don’t just fix something, find out why it broke. Alaska Society for Technology in Education 2022 Annual Conference “https://www.aste.org/” “Where Technology and Education Converge” – “Promoting access to technology, connectivity to information resources, and technology integration for all” Theme for 2022 Conference: “Crowdsourced” “https://web.cvent.com/event/cdc41d91–1f61–46e0–8756–7789f8ef8ee0/regProcessStep1” Conference Partners Alaska Department of Education and Early Development (DEED) Alaska Librarians Association Alaska Council for the Social Studies Computer Science Teachers of Alaska Wide range of tech company sponsors iDidaContest ASTE recognizes the best photos, movies, documentaries, podcasts, music, books, apps and things through its annual digital media contest. This year, ASTE is partnering with the Alaska Council for Social Studies to offer several Social Studies themed categories. Presentations by Frederick Lane (10th Anniversary!) - #2022–02–19 – “Don’t TikTok Back to Me” - The widespread use of mobile devices and social media by students poses profound challenges for educators. At the most basic level, there are issues of distraction and student honesty. But other more serious concerns have emerged. Virtually every student carries a powerful tool for recording the world around them and publishing nearly instantly to a global audience. Moreover, the extensive use of remote instruction has given students endless opportunities to record their instructors. Some students have taken such footage to make moc
S1 E112 · Mon, February 07, 2022
Dr. Bryant Paul Associate Professor in the Media School at Indiana University, focusing on speech regarding sex and sexuality. Pornography vs obscenity Obscenity definition is constantly changing. Pornography is not necessarily obscenity. One-handed economist quote by Harry Truman Variable obscenity. Why we should ban all books in school. Resources - #2022–01–24 Greg Abbott’s Parental Bill of Rights puts targets on Texas teachers’ backs “https://www.msnbc.com/the-reidout/reidout-blog/greg-abbott-parental-bill-rights-texas-rcna13286” - #2021–11–09 Texas officials to target obscene content in school libraries at governor’s request “https://www.statesman.com/story/news/2021/11/09/texas-officials-target-obscene-content-school-libraries/6343346001/” - #2021–11–02 Texas governor decries school library books with ‘pornographic or obscene material’ “https://www.kut.org/education/2021–11–02/texas-governor-decries-school-library-books-with-pornographic-or-obscene-material” - [n.d.] A GUIDE TO TEXAS OBSCENITY LAWS “https://wilderfirm.com/guide-to-texas-obscenity-laws/”
S1 E111 · Thu, February 03, 2022
Jeff Wright is the founder of LimitlessLife Media . He wants to empower others to be limitless. - What is an NFT? - What is a Blockchain? - Ethereum & Smart Contracts - Digital Assets can now be sold for money. - Intelligent NFTs - use Artificial Intelligence. Allows for interaction with NFTs instead. - NFT is about flexing. - Hopefully it will be in alignment with our core values. - How will it apply to our day-to-day lives? - Look for mentors not influencers. Look for collaborators. - 1.7 Million views on web3 metaverse chat youtube video in just a few months. - It’s about getting attention. - What about not being able to forget our mistakes and bad decisions? - NFTs and Education from EdSurge - There’s going to be huge downsides at some point. We don’t have the answers - Smart contracts and getting royalties off of the use of NFTs. - Microsoft Teams Mixed Reality - Reality isn’t what it used to be. NFT pins down the reality of something.
S1 E110 · Mon, January 31, 2022
News Items New Jersey toddler Ayaansh Kumar bought nearly $2,000 in Walmart furniture, unbeknownst to his parents https://www.washingtonpost.com/nation/2022/01/25/new-jersey-toddler-walmart-cart-online-shopping/ Mother Madhu Kumar shopped for furniture and other household goods but did not actually purchase them Her son Ayaansh (22-months) was playing on her phone and somehow would up in the Walmart app, where he executed the purchases His parents tried to cancel the undelivered orders but were unable to do so They’ve arranged to return the items (most of them) to Walmart for refunds Parents will install passcodes and prevent the automatic loading of payment info How It Happens This is a problem that has been around since the rise of the world wide web (and probably even before that) A kid with access to a parent credit card could use it online to make purchases, since there are no reliable tools for checking identity online More recently, credit cards are stored by online merchants or in apps, making it much easier for unauthorized purchases to occur So-called “bait apps” aggressively encourage children to make in-app purchases to enhance their playing experience Problem has spread to smart speakers (Alexa, Legal Issues Parents are legally liable for the purchases made by their children when children use their parents’ credit cards Credit card companies that promise zero liability for unauthorized purchases may offer refunds but others will only do so if the card is lost or stolen Refunds may be available However, some service providers or game companies may refuse to issue refunds if payment is made through a third-party (the Apple Store, for instance) Refunds may also be denied if you have made your child an authorized user If the online service provider is guilty of fraud or inducements aimed at children, the Federal Trade Commission may order refunds In 2014, the FTC settled a class action lawsuit with Google, Apple, and Amazon, in which all three companies paid millions in refunds. Recovery / Restitution Try to cancel pending orders Request refunds from the merchant Dispute the charges with your credit card Contact the Federal Trade Commission Set up a GoFundMe? Prevention Supervision and Education Browser Filters Parental Control Accounts Apple’s Ask to Buy and Family Sharing sends a request to the card holder each time a child tries to make a purchase or download. You can eliminate in-app purchases entirely by turning on Screen Time on their devices.<
S1 E108 · Mon, January 24, 2022
Activism - Activities that students engage in that are in the scope of the first amendment. - News Item - #2022–01–11 A CNY gay teen shares his ‘biggest challenge’; school’s response sets off a storm “https://www.syracuse.com/schools/2022/01/a-cny-gay-teen-shares-his-biggest-challenge-schools-response-sets-off-a-storm.html” - #2022–01–10 Crisis in the Classroom: Gay high school senior censored by school publication “https://cnycentral.com/news/local/crisis-in-the-classroom-gay-tully-high-school-senior-censored-by-school-publication” - Gay student named Tyler Johnson chosen for a senior spotlight profile in school newspaper - One question was to identify his biggest challenge - “So, I said that my biggest challenge was essentially growing up gay and having to navigate through bullying and navigate through life itself, and like, all the negative experiences I’ve had from that,” said Tyler. - High school principal asked him to change his answer or it would not be printed - Johnson said the interaction with the principal illustrated his point - Johnson made a TikTok video describing the incident, which has been viewed by thousands of people - https://www.tiktok.com/@_tylerrayjohnson_/video/7050249865988771119 - Shortly afterwards, the district’s superintendent overruled the principal, saying that Johnson’s original answer would be published. He also promised several initiatives to better support LGBTQ+ students. - The American President Final Speech - Question: How have smartphones and social media changed the power dynamic in schools? - Anecdote - Fred’s underground high school newspaper - Positives - Activism - Education - Accountability - Negatives - Distraction - False Allegations - Hate Speech / Threats - Radicalization - Legal Concerns - 1st Amendment - Privacy - Resources - #2022–01–14 Students, seeing lax coronavirus protocols, walk out and call in sick to protest in-person classes “https://www.washingtonpost.com/education/2022/01/14/students-walkout-covid-safety/” - #2021–12–27 ‘My perspective matters’: Students say activism helped them find their voice “https://www.wbur.org/news/2021/12/27/boston-quincy-student-activism-power-change” - #2020–11–05 Student Voice: How young people use social media to engage civically “https://www.pbs.org/newshour/extra/student-voices/student-voice-how-young-people-use-social-media-to-engage-civically/” - #2021–06–07 While Students Use Social Media to Speak to Power, Schools Tutor Them in Slavish Sycophancy “https://thewire.in/education/students-social-media-modi-cancel-board-exams-schools-sycophancy” - #2021–05–13 ‘Make them listen’: Baltimore-area students use social media to campaign for change “https://www.baltimoresun.com/education/bs-prem-md-students-social-media-activism–20210506–20210513-vuisz4a6bjg63evswcbl7lqk5a-story.html” - #2020–07–06 Can students use social media to make positive change? “https://www.pbs.org/newshour/extra/daily
S1 E109 · Thu, January 20, 2022
Dr. Glenn Lipson, a diplomate in forensic psychology, has spent three decades preventing different forms of violence. He works with the district attorneys, schools, and civil cases where there were claims of abuse by such individuals as the clergy and teachers. As an expert witness, speaker, and advisor, he has testified in court martials, regulatory hearings and submitted briefs through counsel to the United States Supreme Court. Dr. Lipson founded MRC (Making Right Choices) and the NASDTEC Academy, offering online courses that address interpersonal violence and prevention. As a public speaker, he has presented for the US State Department and US Army. He has received the Doug Bates Award from NASDTEC for his international contribution to making schools safer. Glenn’s previous podcast episode Background on the shooting in Michigan Hindsight bias - we can look back and see all the ways they handled it incorrectly. Procedures that have been in place. Have particular training involved. Handbook of threat assessment Jim Cawood RAGE-V What role does that game play in the formation of someone’s identity? Coolidge effect- highly stimulating encourages us to continue to engage in that behavior. GVRO - Gun Violence Restraining Orders People are trained within their area of expertise. Trauma-informed schools not punitive but facilitative reactions to kids NTAC secret service Ways to do things that. No child is safe if every student is not safe. The weapons effect Polyvagel theory CASEL Minister of Loneliness in UK The Trevor Project If you’re not connecting with someone in person, you’re going to connect more with people online.
S1 E107 · Thu, January 13, 2022
Dr. Glenn Lipson, a diplomate in forensic psychology, has spent three decades preventing different forms of violence. He works with the district attorneys, schools, and civil cases where there were claims of abuse by such individuals as the clergy and teachers. As an expert witness, speaker, and advisor, he has testified in court martials, regulatory hearings and submitted briefs through counsel to the United States Supreme Court. Dr. Lipson founded MRC (Making Right Choices) and the NASDTEC Academy, offering online courses that address interpersonal violence and prevention. As a public speaker, he has presented for the US State Department and US Army. He has received the Doug Bates Award from NASDTEC for his international contribution to making schools safer. Glenn's previous podcast episode Background on the shooting in Michigan Hindsight bias - we can look back and see all the ways they handled it incorrectly. Procedures that have been in place. Have particular training involved. Handbook of threat assessment Jim Cawood RAGE-V What role does that game play in the formation of someone's identity? Coolidge effect- highly stimulating encourages us to continue to engage in that behavior. GVRO - Gun Violence Restraining Orders People are trained within their area of expertise. Trauma-informed schools not punitive but facilitative reactions to kids NTAC secret service Ways to do things that. No child is safe if every student is not safe. The weapons effect Polyvagel theory CASEL Minister of Loneliness in UK The Trevor Project If you're not connecting with someone in person, you're going to connect more with people online.
S1 E106 · Mon, January 10, 2022
Show Notes News Item: Florida representative from Naples, FL files HB 1055, which would require schools to consider and vote on a plan to install cameras at the front of every classroom Any installed system would have the ability to record audio and video throughout the classroom, except any area in which children might change clothing. Schools would be required to maintain video archives for at least three months, after which the video could be destroyed unless a request to review was made, or other legal proceeding. Schools would required to blur the faces of any children not part of an "incident" under investigation. Video may not be used to evaluate teachers No provision for funding Motivations for Camera Proposals Student Safety Teacher Safety Parental Surveillance of Teaching Methods and Curricula Teacher Evaluations Potential Downsides Financial and Logistical Installation of Surveillance Systems Can Be Expensive Video Storage Requirements Can Be Large Legal New duty of care for schools Was video system properly installed? Was video properly archived? If system was not running, why not? Possible evidence in myriad proceedings Further temptation for obstruction of justice and spoliation Privacy Once Data Has Been Collected, It Is Very Difficult to Limit Its Use and Misuse We Should Always Be Reluctant to Collect Data in the First Place Will video be used to evaluate which students are friends or dislike each other? Will cameras be powerful enough to read papers, notes, passwords being entered into devices, etc. Risk of voyeuristic misuse Mission Creep Use of video to evaluate teachers Will Students Be Graded on Attentiveness? Anti-cheating tool? Broader social issues Trust in teachers and the educational system Over-empowering small but highly vocal groups within the community Furthering the culture of surveillance Training children to accept surveillance as a constant fact of life (corporatist approach) Has Dystopia Already Arrived? Extensive surveillance already in schools (but typically not in classrooms) Classrooms are already filled with potential "surveillance" cameras Remote instruction has emboldened some parents Resources Florida HB 1055 https://www.flsenate.gov/Session/Bill/2022/1055/BillText/Filed/PDF #2021-12-30
S10 E105 · Thu, January 06, 2022
Paul Shaw received his doctorate from University of South Carolina. He has served as a teacher, coach, assistant principal, principal, Dean of Men at St. Leo College, assistant superintendent, and superintendent. In 2000, he Was recognized as State Superintendent of the Year in South Carolina and State Superintendent of the Year in Georgia in 2010. Served on the Executive Board for the American Association of School Administrators, teach part-time for Piedmont University, and currently serve as Director of Educator Ethics for the Georgia Professional Standards Commission. Paul is married to Cindy and we have a son (Brian), daughter (Ashley) and 4 grandchildren-Madison, Rogers, Keegan, and Shaw. 1/2 a percent of teachers are reported for teacher misconduct Just a few educators that put a black eye on Atlanta public schools and teachers Better monitoring now than before. Difference between model code of ethics and a code of conduct. Georgia code of ethics is a list of “thou shalt not’s” The experience of COVID–19 has helped us be prepared. Worked with a lot of HR people in the state to help make better guidelines. Teachers should be professional at all times. Ethical behavior is doing what’s right even when nobody is looking. Teach the kids, protect the kids, conduct ourselves appropriately. If in doubt, at least talk it over with someone. Teachers are quick to go to social media. You could lose your effectiveness in the classroom because of your political view, and so you need to be careful when they’re known as a teacher rather than something else.
S1 E104 · Mon, January 03, 2022
The Problem https://twitter.com/kalane99/status/1471847077810515972 In the wake of virtually every school shooting, dozens (if not hundreds) of copycat threats are made to schools around the country. Thanks to prevalence of mobile devices, threats are being made by students in virtually all grade levels Such threats can initially be anonymous, although law enforcement has resources that can often reveal the initial poster Threat can originate from anywhere in the world A significant problem is ease with which such threats are reshared School districts face problem that they cannot be wrong once about seriousness of threat The intent of the poster (“just a joke”) or the poster’s inability to carry out the threat are NOT defenses Vectors for Threats Phone / Voicemail Email Social Media Facebook Instagram Snapchat WhatsApp TikTok Etc. Why Is This Happening? Makers of copycat threats seek notoriety and enjoy the chaos they cause Correlation between size of tragedy and number of copycat threats Parents have a responsibility to supervise their children and warn about the potential consequences of making threats of violence Effects Disruption of routine School cancellations Mental health Issues How Can We Reduce This Behavior? Culture of cybersafety Teachable Moments Students Parents School Community Cooperation between schools and law enforcement Increased police presence? What Are Social Media Platforms Doing? https://twitter.com/TikTokComms/status/1471572096111239175 Algorithms and Human Inspection of Possible TOS violations Automation to take down content that violates guidelines Safety teams that coordinate with law enforcement Can social media respond quickly enough? Consequences for Children Who Make Threats School sanctions Counseling Criminal proceedings Fines Jail Time Resources - #2021–12–18 At least a dozen students are ARRESTED nationwide following ‘school shooting TikTok challenge’ after copycat Ethan Crumbley massacre threats “https://www.dailymail.co.uk/news/article–10324583/A-dozen-students-ARRESTED-nationwide-following-Michigan-copycat-school-shooting-TikTok-challenge.html” - #2021–12–17 Copycat threats after Oxford school shooting leave juveniles facing drastic
S1 E103 · Thu, December 16, 2021
Sini Ninkovic, who is today better known as “The Untethered Guy”, is a Berkeley MBA, and Silicon Valley professional turned digital wellness guru. After a lifelong struggle with digital dependency, Sini quit his job at Apple to live in a van and untether from tech. Along the way he learned that the key to inner harmony wasn’t found in removing tech, but in redefining his relationship with it. The tools he discovered for himself were so transformative that sharing them with the world has become his personal mission. After releasing his book Untethered , Sini started traveling globally as a speaker and digital wellness educator. In his engaging talks he teaches our tech dilemma and shares a long term future where we overcome distraction and truly embrace our devices without becoming tethered to them. How Sini arrived in Austria as a refugee. As an adult while still playing games roommates said there was something wrong. At 24, finally realized that he was addicted to technology. Games are no better now than they were, but they are better at sucking you in. Working at Apple - but not knowing what he’s doing afterwards. Silent meditation retreat. Redefining your relationship with technology. Inner voice told me what to do: 1. learn language. 2. write a book 3. combine those two. Huge financial loss How to have a healthy relationship with technology Mindset upgrade - what if the smartphone is our first relationship with a piece of technology? What would it be to be a 10! We are all seeking an emotional connection. Reduce the effects of algorithms. Mindset upgrades Smartphone is the average of our 5–10 most used apps. Drained of willpower by the end of the day. Use peers to help you do better. Tristan Harris - The Social Dilemna
S1 E102 · Mon, December 13, 2021
Some recent examples of school board cybertraps AZ – Google Drive with “dossiers” on parents Great example of a classic cybertrap – unintended disclosure of Google Drive URL CA – Board president arrested for possession of child pornography MA – Hostile text messages NJ – Anti-Muslim Facebook posts TX – Alleged “doxxing” of parents VT – Sharing of sexist and racist memes WA – Transphobic comments by board member CA – School board mocks parents during COVID, entire board resigned Issues Raised Relationship with Constituents Most boards have policies requiring board members to treat the public with dignity and respect. Relationship with Educators and Staff Criticism of specific individuals is highly inappropriate, given board’s role in disciplinary proceedings First Amendment Issues Board members have greater protection than school employees because of political process At the same time, the social media comments of public officials are subject to greater scrutiny Tension between supporting legally-adopted district policies and free speech Public Records Obligations Board members should maintain a clear boundary between personal and board resources (i.e., devices, accounts, etc.) Regardless of what platform or service is used, public officials have a duty to preserve communications regarding official business Understanding How Technology Works Privacy Settings Retweets and re-sharing inevitably will be seen as endorsements Discipline of Board Members Can a board remove one of its members? Generally, no. However, board may take other actions, including: Censure Removal from positions of leadership Even criminal arrest and conviction is not grounds for removal from office However, access restrictions can be put in place Misuse of School Resources Misconduct involving the use of school resources may raise legal issues for the district and possible criminal consequences for board member Cybertraps of Family Members Generally not a legal concern for board members May pose political liability Resources - #2021–12–08 Protesters demand Salem-Keizer board member Danielle Bethell resign after Facebook post “https://www.statesmanjournal.com/story/news/education/2021/12/08/salem-keizer-lus-protesters-call-resignation-danielle-bethell-school-board-county-commission/6426974001/” - #2021–12–06 Parents demand Hispanic Fort Worth school board member be fired after she ‘doxxed’ white parents who sued o
S1 E101 · Fri, December 10, 2021
Not only is Dr. Joaquina Kankam an expert in youth protection compliance and risk management, but her practical experience has made her a leader in understanding the needs of youth serving organizations. In addition to being an educator (K–12 & Higher Education), Joaquina has presented at several national association conferences and participated as a panelist in several discussions regarding youth. She is the founder of the School of Solutions . First week of University - preparing for youth coming to campus. All I saw were a bunch of liabilities. Why cybersafety is so important right now. Encouraging our employees on social media and interact with people. Issues of accountability and transparency Policies on any form of communication outside of educational programming. Checks and balances in place It’s important to involve our human element. Parents should still be involved, as well. Parents don’t abdicate responsibility to watch over child communication. How to have proactive conversations. Address school boards, becuase they have the power Lifelong skills in dealing with online activity.
S1 E100 · Mon, December 06, 2021
Show Notes Item – November closed with the news of a terrible tragedy in Michigan, as 15-year-old Ethan Crumbley used a Sig Sauer 9mm handgun to kill four of his schoolmates This incident is remarkable for the role that social media and digital evidence should have played in its prevention, and the importance both will play in the subsequent investigation and trial of not only Crumbley but his parents as well. Litigation is also likely against the school district and various school officials Questionable Parenting Black Friday present for dad or kid? Stoking (or allowing unchecked) fetishism Warning Signs Instagram Posts Lots of Instagram images attributed to Ethan Crumbley (some probably spurious) Generally agreed that 4 days before shooting, he posted a photo of a gun on Instagram with the caption “Just got my new beauty today SIG SAUER 9mm. Ask any questions I will answer.” Rumors Circulating Among Students (Some Stayed Home) Some number of students told their parents that they did not want to be in school because “something was going down.” This will require more investigation. How did they know? Where did they see the information or threats? What did they hear? Who posted it? In-School Searches for Ammunition Crumbley told the teacher that he and his family like to visit shooting ranges and that was why he was looking at ammunition. The parents confirmed that shooting is a hobby. Threatening drawing Crumbley told his teacher and counselors that he made the drawing for a video game he was designing. Terrible Miscalculations Earlier Warnings On two separate occasions in early November, the school sent out warnings regarding threats of violence. Not clear if one or both were related in any way to Crumbley but people were on edge. School-Parent Conference The school met with all of the Crumbleys following the discovery of the teen’s drawing. Parents refused to take Ethan home. Failure to Search Despite having clear reasonable cause, the school did not search Ethan’s backpack or locker. Failure to Separate or Isolate A good argument can be made that there was sufficient evidence to isolate or suspend Ethan until a proper psych evaluation could be conducted Digital Documentation of Tragedy Surveillance Videos Investigators have been able to document Ethan’s actions using school video surveillance footage. Witness Videos and Text Messages Increasingly, students in these situations are documenting what takes place using their mobile device
S1 E99 · Thu, December 02, 2021
Clarence Tan (Co-Founder) is the Chief Executive Officer and a Co-Founder of Boddle Learning — a gaming platform for education. Clarence Tan graduated from the University of Missouri Kansas City with a Bachelor’s in Business Administration. He started his entrepreneurial journey into educational games during his junior year at the university when he started a game development company in Colombia, South America in 2011. Clarence is a veteran in the games industry with over 10+ years of game design experience. He has designed engaging interactive experiences for schools, government institutions, and large corporations. He is also a speaker on classroom gamification at educational conferences such as KCPT(PBS), LearnFest (formerly iPadpalooza), and ISTE. Developing games in Colombia Game-based learning vs. gamification Games are the best medium to reach kids. Clear goal, know steps to get there. Strong feedback loop. Kinds of games that work well. Rewards Hogwarts competition Gaming drives certain behaviors. Leaderboard works poorly for kids on bottom half. Use of random draws for raffle tickets. Actionable Gamification What actions will cause kids to be more motivated? The process can always be painful. Gamification lets you as the user know and track your progress. My performance increased because I could see the improvement. Why gamification is better and more scalable. Dragonbox Obviously, we got kicked out of all the schools for that!
S1 E98 · Mon, November 29, 2021
Show Notes The Problem The K–12 Cybersecurity Resource Center, tracked 408 cybersecurity incidents that hit K–12 institutions over the past year, an 18 percent increase from 2019 and an average of two cyberattacks per school day aimed at the nation’s education system. The most widespread cyber incidents were ransomware attacks, in which a hacker infiltrates a network and hold it for ransom, along with data breaches of student and staff personal data that included everything from bullying reports to Social Security numbers. Class invasions were also a significant trend, with these incidents involving a malicious actor gaining access to an online video conferencing system and disrupting it, often with inappropriate images or words. This trend was seen particularly at the beginning of the pandemic, and was used to interrupt classes on video conferencing platform Zoom in so many situations that the term “Zoombombing” was coined. News Items Passage of $1 Billion Department of Homeland Security cybersecurity grant program While the grants will technically be administered by the Federal Emergency Management Agency, which has long been DHS’s main grant-making unit, the Infrastructure Investment and Jobs Act calls on CISA to serve in an advisory capacity — work that Wales said has already started. The infrastructure law requires each state to develop a comprehensive cybersecurity plan to qualify for the grants, and about 80% of the total funds will eventually make their way to local jurisdictions. Wales told Clarke that leaves CISA with several questions to answer before the money begins flowing, which is expected in 2022. Goal is development of “common baseline” – That’s likely to include some cybersecurity steps that are commonly described as fundamental — multi-factor authentication, limiting the number of privileged user accounts on a government network, patching vulnerabilities as soon as they’re identified and running regular risk assessments. But those are sometimes unaffordable for the small, local governments that stand to benefit from the new grant program. Signature of K–12 Cybersecurity Act requires the Cybersecurity and Infrastructure Security Agency (CISA) to create cybersecurity recommendations and tools for schools to use to defend themselves against hackers after conducting a study on the cybersecurity risks facing K–12 institutions. What Should Schools Be Doing Now? Educate themselves about the grant process and information needed Educate teachers, students, and parents about the importance of cybersecurity Cultivate a culture of cybersecurity For K–12 IT Departments Check CISA Web site regularly Review lists of potential threats [from Ikon Business Group] Advanced Persistent Threat Attack [APT]: a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period. Brute-force Cracking: a trial and error method used by application programs to decode encrypted data such as passwords or
S1 E97 · Thu, November 25, 2021
Richard Shell is a global thought leader and senior faculty member at one of the world’s leading business schools, the Wharton School at the University of Pennsylvania. He serves as Chair of Wharton’s Legal Studies and Business Ethics Department, the largest department of its kind in the world. His forthcoming book, The Conscience Code: Lead with Your Values. Advance Your Career. addresses an increasingly urgent problem in today’s workplace: standing up for core values such as honesty, fairness, personal dignity, and justice when the pressure is on to look the other way. You’re not a bad person if you do a bad thing. Misconstrued or perverse incentives Deadlines, compensation, etc. are rewards for achieving a goal Doing it, and covering up from it. Rationalizations - People anchor their pride in their role and in moral identity We do a lot to avoid admitting making a mistake. No Child Left Behind forced people to cut corners. Change incentives or strengthen people to resist them? Incentives are creating a toxic culture If you label it as something wrong, you’ll stand to the side of it. You have to think of yourself as a person of conscience first? What would a person of conscience do? Violate your values or you quit. Your values are what you’re willing to pay for them. When people get to impasse, they get more creative. How to stand and fight instead of quitting. The five pressures: peer, authority pressure, incentives, role, systemic PAIRS. Easier to implement a conscience When people are arguing over their interests they are different than arguing over their beliefs. Incentives don’t work when talking about beliefs. George Washington story 3 sources for values: family, spiritual, education Competing aspects of conscience Move from person of conscience to process
S1 E96 · Mon, November 22, 2021
New substack: subscribe here. https://cybertraps.substack.com - Show Notes - Social media and digital communication threats are a rising problem - Every threat has to be taken seriously - Incredibly disruptive - Warning notices to parents – upsetting - Lockdowns - School closures / switch to remote learning - Myriad vectors - Email - Text messages - Social media apps - Snapchat - TikTok - Instagram - WhatsApp - Facebook - What Can Schools Do to Address the Problem? - Short-Term - Incident response plan - Assessment of severity of threat (err on side of caution) - Notification to the school community - Cooperation with law enforcement to identify source - Every incident is a teachable moment - Spiderman – “With great power comes great responsibility” - Long-Term - Role of parents - Cybersecurity measures - Monitoring of social media - Balancing resources and student privacy - Creating a culture of awareness among students and staff - Reluctance to get involved? - Concern about being a “snitch” - Relationship with law enforcement, including FBI - Investigations - Selfie-incrimination - Mistaken belief in anonymity - Digital investigations - Computer forensics - Penalties are serious - Resources - #2021–11–12 Photos from Oregon students’ social media pages taken, uploaded on site with ‘highly inappropriate content,’ district says “https://www.channel3000.com/photos-from-oregon-students-social-media-pages-taken-uploaded-on-site-with-highly-inappropriate-content-district-says/” - #2021–11–12 Ossining High School switches to full remote learning following social media threat “https://bronx.news12.com/ossining-high-school-switches-to-full-remote-learning-following-social-media-threat” - #2021–11–11 Hopewell superintendent addresses next steps after guns found in schools, social media threat “https://www.nbc12.com/2021/11/11/hopewell-superintendent-addresses-next-steps-after-guns-found-schools-social-media-threat/” - #2021–11–11 Maine East High School student facing charges for alleged threats, ‘hateful’ comments on social media “https://www.chicagotribune.com/suburbs/park-ridge/ct-prh-social-media-threats-tl–1118–20211111–7wwpot6yofc3hkpobh7mdytvcu-story.html” - #2021–11–10 Helena schools, police prepared as social media threats target schools across the country “https://www.ktvh.com/news/helena-schools-police-prepared-as-social-media-threats-target-schools-across-the-country” - #2021–11–10 1 person arrested after social media threat made against Braden River High School “https://www.mysuncoast.com/2021/11/10/1-person-arrested-after-social-media-threat-made-against-braden-river-high-school/” - #2021–11–03 Parents Panic over unfounded social media rumor of planned Florence school shooting “https://wpde.com/news/local/parents-panic-over-unfounded-social-media-rumor-of-planned-florence-school-shooting” - #2021–11–01 Sheriff: No threat to schools from vague social media post “https://www.ksby.com/news/local-news/sheriff-no-threat-to-schools-from-v
S1 E95 · Thu, November 18, 2021
Small community of states with a small focus. Clearinghouse benefits No automatic suspension in Connecticut Oklahoma How teachers are responding to technology generationally. Teachers rely on technology more. Teachers are always a role model. Coaches and boundaries Still lots of learning that needs to be done.
S1 E94 · Mon, November 15, 2021
In this episode, we are sharing Fred’s presentation at PPI in Oklahoma City.
S1 E93 · Thu, November 11, 2021
General Counsel for State Department of Education Authority to prosecute licensed personnel. Educational professional has to bring complaints against others. Teachers are connecting more and more online. Sometimes teachers are just four years older than the students they could be teaching. How to help those adults that don’t know what’s going on. Why not equip schools with tools to manage what’s happening? We’re getting better at investigating and knowing about issues. I wish there had been training on this? How to reduce harm? Increase training. Licensing requirement to have training. Ethics training, assessment, and continuing education.
S1 E92 · Mon, November 08, 2021
Show Notes The power of experience for adults in teaching - The holidays are rushing towards us - Welcome to the Debby Downer holiday gift review! - It may be a challenging shopping season - Still significant post-pandemic supply chain issues - What are the hot tech toys for 2021? - Fire HD 10 Kids Pro tablet - The latest and greatest kid-centric Amazon Fire gives kids more freedom to explore via a digital store where kids can request apps (pending parental approval). They can also make video and voice calls and play all their favorite age-appropriate games. - Google Stadia - Stadia is a blast. Let’s start there. Once you’re set up, having the ability to play anywhere you want, is pretty great. The games are fun, well-rendered, hook you quickly, and we had really good experiences in terms of resolution on our TV and frankly our Chrome browser too. The entire set up for Google Stadia is $99 — and that includes one month free access to games, with pricing $9.99 a month after that. This is a fun option for families (especially parents) particularly as a budget entertainment option at home — and a great treat for the holidays. - Nintendo Switch - Nearly every child (and many adults!) have the Nintendo Switch on their holiday list. This on-the-go-slash-household device is great for keeping kids entertained with family-friendly games and also makes for a fun family game night. It’s also one of the tech gifts you’ll want to keep for yourself. - Osmo Math Wizard & the Magical Workshop - Osmo Math Wizard & the Magical Workshop makes learning fun and interactive, providing a smart way to use screen time. While Osmo offers a range of programming for all ages, this one in particular caters to those six to eight, teaching addition and subtraction via hands-on play. In order to use it, an Osmo Base for iPad or Fire Tablet and an iPad or Fire Tablet are required. - Play.date - Handheld game console with a crank designed by a software company called Panic - What are factors that parents should consider? - Should you opt out of the shopping splurge altogether? - Used or refurbished? - Experiences instead of things? Family outings or trips? - Subscription boxes? - Remarkably few safety guides at this time of year - Take the time research any toys that you are considering purchasing - What types of connectivity does the toy have? - What can your child do online with the toy? - Who can they communicate with - What data might be or is collected from your child? - Check out our earlier podcast, Everything You Ever Wanted to Know about the Child Online Privacy Protection Act (COPPA) “https://www.cybertraps.com/2021/09/21/everything-you-ever-wanted-to-know-about-childrens-online-privacy-protection-act-coppa-cybertraps–78/” - Is your child ready for a more advanced tech toy or gadget? - Pay attention to age ratings - Err on the side of waiting - How much screen time has your child had over the past year+? Is more a good idea? - Have you discussed rules regarding the
S1 E91 · Thu, November 04, 2021
Live from PPI in Oklahoma City we are talking to Craig King and Taylor Pipkin from South Carolina, Palmetto State Teachers Association. How my mom taught me about ethics the role of social media in indiscretion. The difference between being a teacher association representative vs investigators Investigators are not out to get people, they’re not bad people. Green construction paper non-instructional routine Teachers need to be trained on decision making Assess the risk All about having those conversations. Responding to the specific way things are presented.
S1 E90 · Mon, November 01, 2021
Raising Cyberethical Kids: Audio Course and Ebook - News Item: In June 2021, UK Education Secretary Gavin Williamson suggested banning mobile phones in schools - He argued that a ban would help students “remain calm” and overcome the effects of the pandemic - Some schools expressed opposition, saying individual schools and districts should establish their own policies without government mandate - Williamson seen as strong opponent of mobile phones in school, pointing to cyberbullying, sexting, and abuse of girls. - Officials acknowledged that an in-school ban would do little to prevent harm occurring outside of school - [Note: Williamson subsequently lost his position during a cabinet re-shuffle in September 2021] - Several countries have limits on in-school mobile use, including: - Afghanistan - Australia - China - France - Reframe the Discussion? - Educators should not view these devices as mere “phones” or communication tools - Instead, they should be recognized as powerful pocket computers and integrated into education accordingly - “A plan, not a ban” - Input from students and parents - Negative Effects of Phones - Full extent of potential problems still being analyzed - 2013 study - students not using cellphones: - wrote an average of 62 percent more in their notes - wrote more detailed notes - recalled more detailed information - scored one-and-a-half letter-grades higher on assessments - students with digital devices: - engage in more off-task behavior - have more concentration and focus issues - have a higher incidence of physical and mental health issues. - 2015 study - banning mobile phones led to an increase in test scores by an average of 6.4% - “This is equivalent to adding five days to the school year or an additional hour a week.” - Greater benefits (2x) for low-performing students - Similar results from studies in Spain and Norway - Excessive use can lead to multiple harms, including: - anxiety and depression - neglecting other activities - conflict with peers or parents - poor sleep habits (sleep deprivation and sleep texting) - increased exposure to cyberbullying - poor decision making - physical harms, including posture, repetitive stress syndrome, vision, etc. - learning disabilities - FOMO or cyberchondria(?) - emotional dysregulation - decline in conversation skills - Positive Uses of Smartphones - keep track of homework - setting up other reminders - looking up facts and formulas - taking photos, videos, or audio of lessons or confusing topics - note-taking - accessing education apps - Impact on the classroom environment and school community - mobile devices change dynamic between educator and student - can be used to record and report educator misconduct - can also be used to harass or embarrass educators - Are mobile devices (and other digital tools) changing the way students learn? - Suggestions on mitigating negative impacts of mobile device
S1 E89 · Thu, October 28, 2021
Catherine Slagle is the director of Office of the Superintendent of Public Instruction (OSPI) Office of Professional Practice in the state of Washington. Worked in prisons and then in professional practices of State Superintendent office. Didn’t have anything in code of conduct relating to social media. Finding out culture of the school. Letter of concern vs. Letter of reprimand. District reluctance to report teachers to state. Superintendent Teachers need specific training around ethics in teacher preparation programs. Be friendly to a certain point, but not their friends. Talk with people who aren’t doing something right.
S1 E88 · Mon, October 25, 2021
Show Notes Two articles on Cybertraps.com Halloween Costumes Result in the Suspension of 14 Idaho Educators https://www.cybertraps.com/2018/11/04/halloween-costumes-result-in-the-suspension-of–14-idaho-educators/ What Do Pokémon Balls, Pumpkins, and Death Stars Have in Common? Just Google “Baby Bump Costumes”! https://www.cybertraps.com/2016/10/18/what-do-pokemon-balls-pumpkins-and-death-stars-have-in-common-just-google-baby-bump-costumes/ When did Halloween become such a big deal? Blame the 1980s First Amendment – Is dressing up a form of speech? Yes, but same analysis as other types of speech Educators Are Role Models The Role of Social Media All it takes is one photo How well do you know your friends Potentially Problematic Costumes Political commentary Overly sexualized Cultural appropriation Mocking specific groups or an individual Making fun of a tragedy Considerations for Administrators Halloween celebrations and costume parades can put pressure on disadvantaged families Costumes can create division in the school community Impact on the repu Students may feel marginalized or attacked Resources - #2021–10–19 Native American Chief, Anne Frank, And 15 Other Costumes You Should Absolutely Steer Clear Of On Halloween https://www.buzzfeed.com/simrinsingh/problematic-halloween-costumes - #2021–05–29 London principal removed from position after backlash over wearing student’s dreadlocks https://globalnews.ca/news/7905066/london-ont-principal-removed-wearing-dreadlocks/ - #2020–10–31 Two Syracuse school employees put on leave for racist Halloween costumes https://cnycentral.com/news/local/two-syracuse-school-employees-put-on-leave-for-racist-halloween-costumes - #2020–10–30 Political costume nixed at Okay Elementary https://www.muskogeephoenix.com/news/schools/political-costume-nixed-at-okay-elementary/article_f55fe23e–8e76–5822-a2db-d79d49825e0c.html - #2019–11–07 Milpitas blackface teacher admits he made ‘horrible m
S1 E87 · Thu, October 21, 2021
Not only is Dr. Joaquina Kankam an expert in youth protection compliance and risk management, but her practical experience has made her a leader in understanding the needs of youth serving organizations. In addition to being an educator (K–12 & Higher Education), Joaquina has presented at several national association conferences and participated as a panelist in several discussions regarding youth. The Importance of Senior Leadership’s Involvement in Youth Protection Decision-Making. CAPTA (Child Abuse Prevention and Treatment Act, 1974) Children youth-service organizations. Background checks and mandatory reporting training Sexual abuse or other harm? Audit systems to ensure organizations are helpful in preventing harm to kids. We do only what we know how to do. Our procedures are good enough, we’ve talked with the attorneys and they approved them. Protecting image of university Loudon County, VA school board member resigns We don’t differentiate in adult professional development Start with a good understanding of what the law is. How to teach schools to do this work correctly. It’s too much to put on my plate. how to be a transformative principal? If sometihng bothers you, don’t let it go. Fix it!
S1 E86 · Tue, October 19, 2021
Updates Travel to the 24th Annual Professional Practices Institute in Oklahoma City, OK My first flight trip in a year+(!) PPI is a program of the National Association of State Directors of Teacher Education and Certification (NASDTEC) NASDTEC has operated since 1928 as “a professional membership organization representing state departments of education and professional standards boards/commissions that are responsible for the preparation, licensure, and discipline of K–12 educational personnel.” It has members from all 50 states, DC, the Dept. of Defense Education Activity, Guam, and the province of Ontario Vision: “NASDTEC believes that all students should have educators who are held to high standards.” Mission: “NASDTEC is dedicated to providing leadership and support to those responsible for the preparation, certification/licensure, employment, ethical and professional practice, and continuing professional development of educators.” TikTok! … It’s 10 p.m.–Do You Know What Apps Students Are Using? PPI General Session 2 (2:45 - 3:45 pm) Introduction (including Center for Cyberethics) U.S. Supreme Court Snapchat decision Apps popular with teens GroupMe Direct and group messages Photos, videos, and calendar links Kik Messenger Text messages, etc. Allows communication with strangers WhatsApp Text, audio, videos, and photos Instagram Photos and videos (public or private) Instagram Direct TikTok Short-form videos Tumblr Microblog – scrapbook of text, photos, videos, and audio. Houseparty Live video and group video chat Screenshots can be taken Live.me Live video streaming that can be watched by anyone YouNow Live video streaming Snapchat Time-limited pictures and videos Whisper “Anonymous” confession app Monkey Modern version of Chatroulette – uses Snapchat to connect users for 10 second chats with strangers MeetMe: Chat and Meet New People Omegle Anonymous chat with strangers Yubo “Tinder for Teens” – if two users "match, they can chat via Snapchat and Instagram Amino Interested-based groups for chatting via text, voice, or video. Among Us In-game chat feature Bitlife Quiz app Discord Voice and text chatting tool Holla Live video chat Lipsi Anonymous feedback on Instagram posts <
S1 E85 · Thu, October 14, 2021
As current VP at Drip7, a microlearning platform for Cybersecurity education, Tara Anderson has been instrumental in increasing the revenue of some of the largest and most prestigious corporations in the world while mitigating cyber and compliance risk. Passionate about risk management, cyber security, behavior design, and education; Snapshots of her contributions can be found on IBMTV ‘World Edition’; Cyber Talk with Rex Lee and Merle Garrison; KUTV Channel 4 (Utah), KSL News Radio, and more. Please add questions that we would ask here, and you can add anything that you would like to add as well. Positioning: school IT systems collect and manage sensitive data about students, about their parents, guardians, and families, about educators and other school staff, and about school district operations. In some cases, these IT systems are locally hosted on school district premises or in shared hosting arrangements with other local government entities; increasingly, they are hosted by an ecosystem of vendors ‘in the cloud’ on systems accessible by any internet-connected device. While there are myriad benefits to the adoption and use of IT systems by school districts—and to the collection and sharing of education-related data with trusted partners—it is important we acknowledge that any adoption of technology also introduces cybersecurity risk. 145 data breach incidents involving public schools (representing 36 percent of all incidents disclosed during 2020). Why have cyber threats to schools escalated? What types of information/data are cyber criminals after? Not making learning punitive Within the context of the school, does gamification raise the potential for cyberbullying? Don’t want learning to be punitive. If I felt judged or looked at, things were harder. How microlearning helps us learn. Varying the way it is delivered. Awake, bathroom, coffee, dog, attention span is decreasing. Brain starts forgetting critical things because of what we are stuffing in it. App headway With all the information out there in this digital age, there seems to be many training opportunities that come along with it; What are the challenges? “You will lose it if you don’t use it.” But since our brains can only hold a limited amount of information (1,000 - 2.5 million gigabytes), how do we keep every bit of information that we want to remember? How many different learning types have been identified? How can we meet the training needs of these students? As cybersecurity isn’t the most exciting topic; How can we make learning more fun and interesting? There’s a lot of buzz around microlearning in education. Why is this form of training delivery becoming so popular? As security awarene
S1 E84 · Tue, October 12, 2021
Today we take a look at the issue of surveillance of students in and by schools - Three areas of surveillance - In school - Physical and network surveillance - Online - Surveillance of social media activity - At home - Surveillance through school-issued equipment - What information is being collected and what is being done with it? - Center for Democracy and Technology study: - 86% of teachers reported that schools provided equipment to students, twice the pre-pandemic rate - 80% of teachers and 77% of students said that the schools used surveillance software - The more the devices were used, the more surveillance occurred - Disparate economic impact - Economically disadvantaged students more likely to need school provided equipment and thus be subject to more constant and intrusive surveillance - Varying degrees of transparency - Justifications - Are students paying attention? - Some systems allow teachers to view all the tabs opened by students - Are students accessing inappropriate content, either during class or outside of it? - Are students misbehaving (cyberbullying, etc.)? - Are students showing signs of mental illness or self-harm (depress, suicidal ideation, etc.)? - The pandemic has had a measurable impact on the mental health of children - Protection of school equipment - The Technology - Different installation protocols - Standalone software - Browser extensions - Raises specter of monitoring of private devices if browser is set to sync extensions - Real-time monitoring of web activity, emails, etc. by AI or human moderators - A growing number of software platforms - Bark - Gnosis IQ - Gaggle - GoGuardian - Lightspeed - Securly Classroom - Real-time access of web cams - Online classes - Private time - Educators Misconduct - Lurking or snooping on social media accounts - Web cam voyeurism - Implications - Training students to view surveillance by employers and governments as “normal” - Legal Issues - Invasion of Privacy and Intentional Infliction of Emotional Distress - Federal and state wiretapping laws - Child Online Privacy Protection Act - Family Educational Rights and Privacy Act - Resources - #2021–10–11 US schools gave kids laptops during the pandemic. Then they spied on them https://www.theguardian.com/commentisfree/2021/oct/11/us-students-digital-surveillance-schools - #2021–10–07 Borrowed a School Laptop? Mind Your Open Tabs https://www.wired.com/story/borrowed-school-laptop-mind-open-tabs/ - #2021–10–04 Democratic Lawmakers Demand Student Surveillance Companies Outline Business Practices, Warn the Security Tools May Compound ‘Risk of Harm for Students’ <a href="https://www.the74million.org/article/democratic-lawmakers-demand-student-surveillance-companies-outline-business-practices-warn-the-security-tools-may-compound-risk-of-harm-
S1 E83 · Thu, October 07, 2021
Dimitri Nemirovsky holds BBA and MBA degrees from Baruch College and earned his JD from Brooklyn Law School. Prior to co-founding Atakama , Dimitri spent 15 years practicing regulatory and enforcement law, most recently at Bingham McCutchen where he represented large financial institutions in high-stakes matters. Dimitri began his career at Merrill Lynch where he focused on the various Federal and state e-discovery regulations that developed during the early 2000’s. Dimitri has been enamored by computer science since an early age, having taken his first coding class in 8th grade. Throughout his professional career he has always focused on technology, including during the early dotcom era and more recently with bitcoin and blockchain. It was his infatuation with the distributed nature of blockchain technology that led to the founding of Atakama. Decentralized encryption solution Cybersecurity vs. information security. Cybersecurity protecting the castle Information security protects the crown jewels within the castle. How is Atakama different from other cybersecurity solutions? Individual consumers vs. enterprise solutions We as individuals should not be apathetic as it relates to security. Thousands of in-points now that everyone is remote. What makes it hard for us to be security conscious. The more secure you make something, the less productive it is. Value that people put on the information. Trust! It’s incumbent on the individual to be aware. Be judicious about who we trust and what we trust. Quantum Computing threats
S1 E82 · Mon, October 04, 2021
The question of the day: What role can or should video games play in the classroom? A massive, massive economic sector 2020 – Approximately $66 billion dollars for the U.S. industry as a whole; worldwide, $177 billion According to the Entertainment Software Association (ESA): Average age of video game player is 31 90% of gamers are over 18 Largest segment is 18–34 year olds (38 percent) 76% of people under the age of 18 play video games 74% of parents play with their children at least weekly Impact of video games on learning The jury is still out; there are competing studies that show varying effects, both positive and negative Chief question is whether gaming interferes with performance of necessary school tasks Positives may include: collaboration and teamwork social skills planning language skills preparation for remote learning Negatives may include distraction sleep deprivation risk of bullying and abuse grooming Can video games be a positive force in the classroom? Gamification of learning Games as a form of engagement Trophies, badges, and rewards Leveling up Risks for Educators Games overwhelm the content Inappropriate conversations Inappropriate interactions within the games Giving consoles or games to student could be perceived as grooming Popular video games Roblox Fortnite Minecraft Resources - #2021–08–07 Could video gaming hold the key to better learning? https://www.usatoday.com/story/life/2021/08/07/how-some-teachers-gaming-education-system/5454842001/ - #2021–05–28 How teachers can use video games to motivate students https://theconversation.com/how-teachers-can-use-video-games-to-motivate-students–161624 - #2021–04–05 Former Teacher At Church Farm School Gets 15–30 Years For Abuse (PA) https://patch.com/pennsylvania/westchester/former-teacher-church-farm-school-gets–15–30-years-abuse - #2021–02–22 Struck off: Catholic primary school teacher, 27, banned after talking about her sexuality while playing FORTNITE with two young pupils on PlayStation (England) https://www.dailymail.co.uk/news/article–9286621/Catholic-school-teacher-banned
S1 E81 · Thu, September 30, 2021
Marcus Marena is a felony investigator in the public defender’s office in Chittenden County, Vermont. Why Marcus loves working for public defenders. You may deserve to be in jail, but how did we get here? Felony and other investigations. Digital investigations Technology is always there. Law enforcement extractions and phone dumps. Marcus advises to always make the police get a warrant. Is technology making younger people commit more crimes? If you don’t want people to read your messages, don’t put them in writing.
S1 E80 · Mon, September 27, 2021
First Question: How old is your little app user? Do they really need a smartphone or tablet? “Raising Cyberethical Kids” Book: https://link.cybertraps.com/RCK_PB Audio Course: https://gum.co/rckaudio Issues to Consider When Planning Child App Use Age Maturity Life Balance Necessity (School Work, Family Communication, etc.) In-App Purchases / Costs Privacy Issues (COPPA) Deception and Danger (Inappropriate MessagingHidden Albums What Needs to Be Managed? Screen Time Can Be Tough During a Global Pandemic Downloading and Installation of Apps Communication with Unknown Individuals Not Necessarily a Threat But Worth Monitoring Taking and Posting of Inappropriate Photos Access to Inappropriate Content / Goods / Services Algorithms Are Not Your Child’s Friend TikTok Is Emerging as a Particularly Powerful Source of Risky Challenges Location How to Manage Your Child’s Online Experience Educate Yourself Manuals and Company Information Web Searches Communicate with Your Child Encourage Kids to Be Educators within the Family Use Built-in Parental Controls Cellular Companies Device Manufacturers Software Providers Operating Systems Specific Programs or Apps Game Manufacturers Consider a Third-Party Solution Regularly Review and Recalibrate Settings Set a Good Example Be Realistic No Tool Is Perfect Your Child May Be Highly Motivated to Circumvent Resources for Review ADDitude: Mo Devices Mo Problems: ADDitude’s Top 10 Parental Control Apps https://www.additudemag.com/screen-time-parental-control-apps/ Common Sense Media: Parents’ Ultimate Guide to Parental Controls https://www.commonsensemedia.org/blog/parents-ultimate-guide-to-parental-controls PC Magazine: The Best Parental Control Software for 2021 https://www.pcmag.com/picks/the-best-parental-control-software PC Magazine: Apple vs. Google vs. Microsoft: Who Has the Best Free Parental Controls? https://www.pcmag.com/picks/apple-vs-google-vs-microsoft-who-has-the-best-free-parental-controls Safewise: The Best Par
S1 E79 · Thu, September 23, 2021
In this episode we talk about supply chain issues and how technology impacts that sector. Rosemary Coates is the Founder and Executive Director of the Reshoring Institute She is also the President of Blue Silk Consulting, a supply-chain management consulting firm. She is also the Founder and Executive Director of the Reshoring Institute, a 501c3 nonprofit and non-partisan organization focused on expanding U.S. manufacturing. She has been a management consultant for 25+ years, helping over 80 global supply chain clients worldwide. She is an Amazon.com best-selling author with five Supply Chain Management books, including The Reshoring Guidebook, 42 Rules for Sourcing and Manufacturing in China, and the Legal Blacksmith – How to Avoid and Defend Supply Chain Disputes. She also works as an Expert Witness on legal cases involving global supply chains. Rosemary serves on the Board of Directors at the University of San Diego Supply Chain Management Institute and teaches Global Supply Chain Strategy at UC Berkeley. She earned an MBA from the University of San Diego and a bachelor’s degree in business logistics from Arizona State University.
S1 E78 · Tue, September 21, 2021
In this episode, we discuss the Children’s Online Privacy Protection Act (COPPA). It’s not nearly as boring as it sounds! - A project Fred’s been working on for drip7 - Heather Stratford, Episode 61 - What is COPPA? - Children’s Online Privacy Protection Act (COPPA) in 1998 - COPPA required the Federal Trade Commission to issue and enforce regulations concerning children’s online privacy. The Commission’s original COPPA Rule became effective on April 21, 2000 - The FTC has an excellent and detailed FAQ: https://www.ftc.gov/tips-advice/business-center/guidance/complying-coppa-frequently-asked-questions–0 - What is it designed to do? - The primary goal of COPPA is to place parents in control over what information is collected from their young children online. - The Rule was designed to protect children under age 13, while accounting for the dynamic nature of the Internet. - The Rule applies to operators of commercial websites and online services (including mobile apps and IoT devices, such as smart toys) directed to children under 13 that collect, use, or disclose personal information from children, or on whose behalf such information is collected or maintained (such as when personal information is collected by an ad network to serve targeted advertising). - It applies not only to U.S. operators but to foreign ones as well - Does COPPA help to limit child access to inappropriate content? - No. COPPA is not designed to prevent child access to any content online. Its only purpose is to regulate the collection of information from children under the age of 13. - What “personal information” is protected under COPPA? - First and last name; - A home or other physical address including street name and name of a city or town; - Online contact information; - A screen or user name that functions as online contact information; - A telephone number; - A Social Security number; - A persistent identifier that can be used to recognize a user over time and across different websites or online services; - A photograph, video, or audio file, where such file contains a child’s image or voice; - Geolocation information sufficient to identify street name and name of a city or town; or - Information concerning the child or the parents of that child that the operator collects online from the child and combines with an identifier described above. - What rights do parents have under COPPA? - If a company, web site, or service is covered by COPPA, it must adhere to the following requirements: - Post a clear and comprehensive online privacy policy describing their information practices for personal information collected online from children; - Provide direct notice to parents and obtain verifiable parental consent, with limited exceptions, be
S1 E77 · Thu, September 16, 2021
Dr. Ora D. Tanner is the Assistant Director of the Office of Undergraduate Research at the University of South Florida (USF). She previously worked as a nuclear physicist, science educator, and more recently as a graduate researcher on NSF-funded grant projects related to digital game-based learning and assessment. Ora earned her B.S. and M.S. in physics from Dillard University of New Orleans and USF, respectively, and expects to complete her doctorate in Instructional Technology and Educational Measurement in 2019. In her “free” time she studies the latest emerging technologies and explores how they can be used to empower both K-12 students and teachers in science education.
S1 E76 · Tue, September 14, 2021
Show Notes The Cybertraps Podcast is a production of The Center for Cyberethics, an independent, non-partisan educational institute dedicated to the study and promotion of cyberethics as a positive social force through research, curricula development, publishing and media, professional training, and public advocacy. Build the Non-Profit One Pillar at a Time First Pillar: Cyberethics in the School Community Draws on experience of Jethro as principal and educational consultant, and Fred as lecturer/author of Cybertraps for Educators 2.0, etc. Future Pillars of Cyberethics Employers and Employees Caretakers for the Vulnerable Lawyers Health Care Providers First Responders Public Figures (Politicians, Athletes, Celebrities Ongoing Activities The Cybertraps Podcast Cybertraps for Educators 2.0 –> Cybertraps for Educators 3.0 Reorganization of Cybertraps into 3 Categories Personal Cybertraps (Mistakes or Self-Harm) Anti-Social Cybertraps (Acting Badly Towards Others – Non-criminal) Criminal Cybertraps Conferences and Webinars October – Professional Practices Institute Recent Cyberethical Issues in School Communities Malvern (AR) teacher reaches students via social media app TikTok https://www.arkansasonline.com/news/2021/jan/25/teacher-reaches-students-social-media-app-tiktok/ Dr. Trevor Boffone – Viral TikTok teacher writes book on building bridges through social media (“Renegades: Digital Dance Cultures from Dubsmash to TikTok”) https://abc13.com/dr-trevor-boffone-tiktok-social-media-justice/10843562/ 300,000 followers on Instagram, 25,000 on TikTok – as of last June High school teacher fired after praising antifa: ‘I have 180 days to turn them into revolutionaries’ https://news.yahoo.com/high-school-teacher-fired-praising–193600139.html ‘It’s a new Cultural Revolution’: Mom who survived Maoist China’s purges rages against woke Loudoun County School Board for pushing ‘neo-racism’ and teacher warns against ‘indoctrination camps’ in classrooms https://www.dailymail.co.uk/news/article–9672569/Virginia-mom-survived-Maoist-Chinas-purge-slams-Critical-Race-Theory.html Portland teacher says colleagues who don’t want to teach critical race theory are like PEDOPHILES and warns they’ll be fired if they keep
S1 E75 · Thu, September 09, 2021
Joshua Powell spent 23 years in the Marines doing Command and Control operations and the last 5 working as a contractor. Spent 3 years with the Navy working Electronic Warfare / Information Operations and the last two working with George Mason University, Rapid Prototyping Research Center as a Senior Research Faculty. Focused on airborne networking technologies. From the time our kids are born they are leaving behind a virtual shadow. This shadow can quickly become a tool for not only nation state actors but local individuals to manipulate individuals through their life. Eagle Eye movie example - an AI computer “activates” an individual to do what they deem required to save the country. Well what if it was your kid or spouse activated by someone you didn’t know? Who is studying this problem? Congress Defense Primer: Information Operations Think Tanks “Information Operations,” RAND Corporation The Evolution of Special Operations as a Model for Information Forces RUSSIAN HYBRID WARFARE DoD JP 3-13, Information Operations Bottom line - when you have the ability to individualize the targets on-line behavior, habits, and schedule. You have an extraordinarily powerful tool that should be looked at as a weapons grade. We do not allow our enemies to have our tanks, jets, weapons, but we give them nearly unlimited access to our personal data. Personal information is powerful - behavior and habits are the vector for threats to access your life. Look at the attack on Congressmen Hawley’s home in DC . This is terror and it can be done to our families and to our children in very personal and intimate ways.
S1 E74 · Thu, September 09, 2021
Greg Edwards is the CEO of CryptoStopper™, which provides ransomware protection by automatically detecting and stopping actively running ransomware attacks. The are the world’s first digital security product to offer 100% ransomware protection. Ransomware is affecting so many people. How big of a problem is it really? How can you guarantee to protect companies against ransomware? What steps can every day people take to protect themselves. Why is ransomware the number two threat to businesses today, behind the pandemic of course? backupify - google drive
S1 E73 · Sun, September 05, 2021
Heather is a researcher and author in the United States who has spent 15 years studying innovation in education and the rise of blended learning as the enabler of student-centered learning. She is the co-author of the Amazon bestseller Blended: Using Disruptive Innovation to Improve Schools, as well as The Blended Workbook As the founder of Ready to Blend, Heather leads a team of 150 facilitators in the United States, Middle East, and South America who have been certified to deliver blended-learning workshops to their teachers. Prior to this role, Heather was a senior research fellow for the Clayton Christensen Institute for Disruptive Innovation and a strategy consultant for McKinsey & Company. She holds a BA magna cum laude in government from Harvard University and an MBA with distinction from the Harvard Business School. She is the mother of five children and lives in Austin, Texas. How student-centered learning matters. We can’t just say go all in or go off and do wholly Waldorf method. Heather on Transformative Principal episode 210 and 211 What is the purpose of school? Having transparency on what kids were learning. Stay away from simulteaching. Opportunities: modalities of instruction that are out of the box. Look for synchronous group discussion. Collaborative experiences. 1 on 1 check ins. Constraints: children are empowered when they use technology to go to any destination - field trip analogy. Gate at the top, but also an ambulance at the bottom of the cliff. Crash and tell.
S1 E72 · Mon, August 30, 2021
WhatsApp Pussy Cat? Today Fred and Jethro talk all about WhatsApp, the background, how it’s used, and what to look out for. What Is It? WhatsApp Messenger Who Built It? Brian Acton and Jan Koum, former Yahoo! employees, wrote the first version in 2009 Facebook acquired WhatsApp in 2014 for $19 billion Who Is Using It? Lots and lots of people … Roughly 2 billion monthly users worldwide WhatsApp has users in 109 countries How Are People Using It? Group chats (up to 256 people) Broadcast feature (message to multiple people, reply just to sender) Video Calls (w/ filters) Text Messages Share Videos, Photos, and Audio Messages What Are the Risks Parents Should Consider? No real enforcement of 16+ age rating Potential contact from strangers (no verification of user identity) Multiplatform service (kids can move from device to device) Multiple tools to “hack” WhatsApp Disappearing Messages (Status Feature) Cyberbullying (particularly in group chats) Grooming Live Location Access to Inappropriate Content – It only takes a few seconds to find links to public WhatsApp groups with Hoaxes and Misinformation Some limits on forwarding messages to groups Malware (particularly on PCs and Macs) Sharing of data between WhatsApp and Facebook Multiple security breaches and software flaws Anecdotes and Headlines 2021–08–15 Did America just lose Afghanistan because of WhatsApp? https://prestonbyrne.com/2021/08/15/did-america-just-lose-afghanistan-because-of- whatsapp / 2021–08–07 WhatsApp CEO calls out Apple over Child Safety tools announcement https://9to5mac.com/2021/08/07/whatsapp-ceo-calls-out-apple-over-child-safety-tools-announcement/ 2021–08–04 Warning issued to anybody who uses WhatsApp as loophole could see strangers access your messages https://www.chroniclelive.co.uk/news/uk-news/whatsapp-urgent-warning-loophole-hackers–21220126 2021–07–19 Biology teacher, 57, at £40,000-a-year boarding school is struck off after sending naked shower ‘selfie’ to an 18-year-old schoolgirl he told ‘aroused him’ over explicit WhatsApp texts <a href="https://www.dailymail.co
S1 E71 · Thu, August 26, 2021
In this episode we talk with Andrea Hainsworth about how to help family members who are struggling with unwanted pornography use. Andrea Hainsworth is an associate licensed mental health counselor in Spokane Washington. She is a graduate of Gonzaga university with a masters degree in marriage and family counseling. She is trained in emotionally focused therapy and owns a private practice which works primarily with couples, many of whom are dealing with unwanted pornography use and associated infidelity and other forms of acting out in their marriages. She also runs a support group for women who have been betrayed by their partner’s unwanted pornography use. Andrea is married and is the mother of 6 children. andreahainsworth.com Daniel Siegel The Power of Showing Up.
S1 E70 · Mon, August 23, 2021
Richard Byrne is the President of Byrne Instructional Media, LLC. He is best known for developing the award-winning blogs Free Technology for Teachers and Practical Ed Tech. His work is focused on helping teachers use technology to improve their students’ learning experiences. He has been a high school social studies teacher and is currently a computer science teacher. Richard’s print work includes columns for School Library Journal, contributing author to What School Leaders Need to Know About Digital Technologies and Social Media, and articles for Teacher Librarian. In this episode Richard, Fred and Jethro talk about how to decide if you should free technology in your classroom (and your life). Invent to learn by Gary Stager Empowering online learning Scott McCleod - Dangerouslyirrelevant.org Harnessing technology for deeper learning
S1 E69 · Thu, August 19, 2021
Scott Schober is the author of three best-selling security books: Senior Cyber, Hacked Again, and Cybersecurity is Everybody’s Business. He has dedicated himself to educating as many people as possible by telling his own stories of being hacked with the hope that others can learn from his mistakes. As a lifelong technology innovator and inventor, Scott began seeking ways to help seniors seamlessly adapt to our ever-technological world, based on his and his brother Craig’s experiences with their elderly parents and the myriad of questions from a growing elderly population. In Senior Cyber, Scott and Craig pick apart a multitude of cybersecurity scams that relate directly to the financial, socioeconomic, and health & well-being of all seniors by offering simple advice for all levels of cybersecurity experience for grandparents, grandchildren, and everyone in between. In addition to his writing prowess, Scott is a highly sought-after author and expert for live security events, media appearances, and commentary on the topics of ransomware, wireless threats, drone surveillance and hacking, cybersecurity for consumers, and small business. He is often seen on ABC News, Bloomberg TV, Al Jazeera America, CBS This Morning News, CNN, Fox Business, and many more networks. Why are seniors and the elderly often targeted by cybercriminals and scammers, and what can they do to stay safe? Don’t talk down to those who are elderly. Phone scams. Many think that a person needs to be technically savvy or spend a lot of money to improve their security. Skimmers at a gas station. What are some best practices we can all take with our credit and debit cards at the gas pump or ATM? Family dynamics and senior independence. Start the conversations earlier.
S1 E68 · Mon, August 16, 2021
In this episode we will do a deep dive about TikTok and give parents ideas and suggestions for how to manage TikTok at home. What Is TikTok? A free social network service that focuses on the sharing of short videos (15 seconds to 3 minutes) with background music It is available on iOS and Android It was originally launched in 2017 but did not really take off until it merged with another Chinese social media service called Musical.ly Interesting question: Is TikTok the new Facebook? Who Built It? TikTok is the global version of a Chinese app called Douyin. Both apps were developed and are owned by a Chinese company called ByteDance Douyin has a number of features not available outside of China yet, including e-commerce, in-video search (using facial recognition), etc. Expectation is that those will come to TikTok soon. Will propaganda follow? Trump attempted to ban the app, but Biden reversed his executive order ByteDance reported earnings of over $34 billion in 2020 Company is testing a Stories feature that will cause videos to disappear in 24 hours Who Is Using It? As of October 2020, TikTok had over 2 billion mobile downloads In its Terms of Service, TikTok says that use of its app is restricted to people age 13 and older However, a NY Times article in August 14, 2020 reported that "TikTok classified more than a third of its 49 million daily users in the United States as being 14 years old or younger ..." ( https://www.nytimes.com/2020/08/14/technology/tiktok-underage-users-ftc.html ) Underage use without specific parental consent violates the Child Online Privacy Protection Act In 2018, Musical.ly paid the Federal Trade Commission a fine of $5.7 million for violating COPPA In the UK, an estimated 44% of children ages 8-12 use the app How Are People Using It? Production of amusing / goofy videos Education Influencing By following specific users Searching hashtags Anecdotes Woman writes nice comment on a TikTok user's video; they wind up dating (TikTok as dating app??) Mother shares TikTok vidoes of her dancing with her 3-year-old daughter just 3 weeks before beating her to death ( https://www.dailymail.co.uk/news/article-9882635/Evil-mothers-chilling-TikTok-videos-three-year-old-girl-just-weeks-killed-her.html ) English pol
S1 E66 · Mon, August 16, 2021
In this podcast we are talking about the Supreme Court decision this fall regarding Mahanoy Valley v BL and Apple's new policy on cryptographically scanning files for CSAM content. SCOTUS Decision Mahanoy Area School District v. B.L. (Brandi Levy) SCOTUSblog Language warning Majority [8-1] opinion written by Justice Breyer Facts Levy tried out for varsity cheerleading but was offered a spot on the jv squad Levy was unhappy with the decision. The following weekend, while visiting a Cocoa Hut, she shared two snaps on her Snapchat "story" (24 hour availability) The first was a selfie showing Levy and a friend holding up their middle fingers with a caption reading "Fuck school fuck softball fuck cheer fuck everything." [SCOTUS quotes actual content -- similar to Pacifica] The second just showed a caption that read "“Love how me and [another student] get told we need a year of jv before we make varsity but tha[t] doesn’t matter to anyone else?" The message was followed by an emoji with an upside-down smile. Levy's list of Snapchat "friends" [SCOTUS uses quotes, interestingly] included some other cheerleaders. At least one used another cellphone to take pictures of Levy's posts so that she could share them with other cheerleaders and adults. Cheerleading coaches testified that team members were "visibly upset" and that the posts sparked discussion in a coach's Algebra class. Following consultation with the school principal, the coaches concluded that Levy's use of profanity in her snaps was a violation of team and school rules. They suspended Levy for the coming school year. Levy apologized but it made no difference. "The school’s athletic director, principal, superintendent, and school board, all affirmed B. L.’s suspension from the team. In response, B. L., together with her parents, filed this lawsuit in Federal District Court." After losing at the trial court and appellate level, the school district filed a writ of certiorari and SCOTUS granted the petition. The precise question: “[w]hether [Tinker], which holds that public school officials may regulate speech that would materially and substantially disrupt the work and discipline of the school, applies to student speech that occurs off campus.” Tinker: students wore black arm bands to protest the Vietnam war and were disciplined. SCOTUS ruled in students' favor but held that "schools have a special interest in regulating on-campus student speech that 'materially disrupts classwork or involves substantial disorder or invasion of the rights of other.'" SCOTUS Analysis Tinker held that students do no
S1 E67 · Thu, August 12, 2021
Sam is an IT Director and consultant with experience in K–12 education, corporate training, and telecommunications. He spent over ten years living and working in Bush Alaska, visiting 97 small towns and villages across the state, 3 years in China, and now resides in southern Florida with his wife and two boys. He is certified in a number of technology and vendor platforms/skills, but has focused more on cybersecurity in the last 3 years. He is passionate about privacy, data protection, and cybersecurity… especially when it comes to our youth. MakeITSecure is a consultant company that helps schools harden their systems when schools can’t afford a full time CISO. What it was like being a teacher in Bush Alaska. Why are schools not doing more to protect their students, staff and data? MakeITSecure How to make security a priority. You can’t just have IT be the only ones thinking about security, because all issues are security related. What should we spend money on in schools? Risk management equation. Where you should put your schools’ money when it comes to security What’s your goal? What are you trying to accomplish with that security program? Sit down and evaluate your risk and try to fill your gaps. Low-hanging fruit to reduce your risk. Information audit - what are the states of their policies and procedures. Repository of templates within a consortium so you don’t have to reinvent the wheel. Free software comes with a cost. There are ways to make anything safer. Transparent, honest communication. Just enough, just in time, just for me. Comparing your roles as an IT Director for schools in the US or Program Director for a US telecom, how would you describe social media, the internet, and digital trends in China - As a consumer it was a healthy experience. Serious seeds of doubt or a complete misunderstanding of it. Connection of Social Credit Score and our current situation. [[media]] [[cybertraps Scott Tennant]]
S1 E65 · Fri, August 06, 2021
Ted Harrington is the #1 best selling author of HACKABLE: How to Do Application Security Right , and the Executive Partner at Independent Security Evaluators (ISE) , the company of ethical hackers famous for hacking cars, medical devices, web applications, and password managers. He’s helped hundreds of companies fix tens of thousands of security vulnerabilities, including Google, Amazon, and Netflix. Ted has been featured in more than 100 media outlets, including The Wall Street Journal, Financial Times, and Forbes. His team founded and organizes IoT Village, an event whose hacking contest is a three-time DEF CON Black Badge winner. He hosts the Tech Done Different podcast. To get help with security consulting and security assessments, or to book Ted to keynote your next event, visit https://www.tedharrington.com . Using a modifier with a password How to think like an attacker A hacker is a problem solver - the intent is what matters. My job is to think the bad thoughts and ask the hard questions How to hack a bar waiting line. Determine what the rules of the game are The people who really succeed are the people who see the way the world could be. It’s really about independent thinking. Constraints provide opportunity for us to do better. How to teach people to be better Give kids opportunities to explore their creativity. Most humans are inherently wired to do good and make good choices. Be Better - the two words that define security Start from the foundation that all people are good. Automation of hacking techniques and if it’s too easy to be bad, people will do that. The democratization of an elite skill Zeroday vulnerabilities marketplace Security research community. The Blockchain bandit. What do we do about zerodays? We have to accept that they exist, and then we have to go find them.
S1 E64 · Mon, August 02, 2021
Dr. April Joy Damian is an epidemiologist, health services researcher, and classically trained public health professional with expertise in health equity, social determinants of health, psychiatric epidemiology, and mixed methods. She currently serves as the Associate Director of the Weitzman Institute, a research, education, and policy center dedicated to quality improvement and primary care transformation, with a particularly focus on vulnerable populations. Dr. Damian is also the immediate Past Chair of the AcademyHealth Public Health Systems Research IG Advisory Board, and concurrently holds faculty appointments at Johns Hopkins Bloomberg School of Public Health and Wesleyan University. She graduated Phi Beta Kappa from the University of California, Berkeley with a Bachelors of Arts in Ethnic Studies, Highest Honors. She then went on to earn a Masters in Medical Sciences from Harvard Medical School and PhD in the Department of Mental Health at Johns Hopkins Bloomberg School of Public Health.
S1 E63 · Thu, July 29, 2021
Tom Kowalski is the Founder and CEO of REP , a global digital security and reputation advisory firm specializing risk protection. REP helps to preserve online assets, and public images. Provide peace of mind and ease worry about reputation. Social media platforms are incredibly unhelpful Model is built on advertising and treating users as users, not customers. Can be difficult to suppress Be cautious about what you put out there. Revealing information inadvertently though using social media Right to be forgotten. Kids are at various stages of “brand development” Freeze kids’ credit scores Monitor kids’ social media Make a plan.
S1 E62 · Mon, July 26, 2021
Jane Clementi co-founded the Tyler Clementi Foundation alongside husband Joe because she wants to make sure that our society learns the consequences of discrimination and bullying, as she learned all too personally through the loss of her son. A native of New Jersey and devoted mother of three sons, Jane speaks passionately to parents and community leaders about the need to not merely “accept” or “tolerate” children who come out as LGBT, but to embrace them as wondrous creations of God. Jane, a registered nurse, speaks on the need for parents of LGBT children to come out and speak openly of the love they have for their children, and in doing so each one of us can impact the world around us and create accepting environments. Since losing Tyler, Jane’s spiritual journey has continued to carry and transform her in ways she never would have imagined. She left her church home of many years because she felt that while sitting in the pews of a church that condemned LGBT people she was herself a bystander to bullying. Jane leads an inspirational life through her unique experience which she shares with other parents, and speaks passionately about the need to divorce the concept of “sin” from homosexuality. She has made difficult choices in an impossible situation, and leads by example. She has spoken out in support of LGBT rights and the need for families and communities to embrace their LGBT populations. Jane has spoken before the U.S. Congressional HELP Committee, the National Cathedral, and numerous other faith communities, colleges, universities, high schools, and work places.
S1 E61 · Thu, July 22, 2021
Heather is a thought-leader in the IT Training and Cybersecurity field. Heather keynotes at conferences, universities, and for enterprise clients. Heather regularly speaks about Cybersecurity, Women in Technology, Women and Diversity in Cybersecurity, creating a Cybersecurity Culture, Entrepreneurship, Privacy, and the shifting regulations and how to manage cybersecurity risks. In 2019, Heather won a national year-long fellowship with the Tory Burch Foundation, received a national scholarship from Goldman Sachs to participate in the 10,000 Small Businesses Program, and is a 2019 alumni of the Babson College Entrepreneurship Program. In 2018, Heather received the Women in Business Leadership Award from Whitworth University and was featured by global organizations such as the 2018 G7 Summit held in Canada. She has also served as a Board Member on the Community Security Coalition, a regional non-profit helping provide cyber and technology education. In security, education is key, so how do we teach people security principles in an effective way? A new phenomenon in the industry around creating Humans are the biggest attack area 2020 was the largest increase in breeches according to FBI. “This gives us a number” Baseline test. Most phishing campaigns are individual and unique. Reporting how many people are reporting something suspicious Metaphor of the virtual fire alarm. Not sure means not enough education. Drip7 teaches behavior change. Safety in manufacturing made the culture to be safety-aware. Positive reinforcement in a consistent area. Lessons that are learned for business in an organization Demographics of who is in the workplace. It is critical to our whole way of life to be secure. Adahar - Indian social security system. Hospital system that recognized the need for behavior change. Where to start with cybersecurity? 1. acknowledge that it is a problem. 2. Education Reach out to Heather on LinkedIn
S1 E60 · Tue, July 20, 2021
Michael Skinner is an award-winning advocate, educator, writer and critically acclaimed singer, songwriter, guitarist, addressing the issues of trauma, abuse and mental health concerns through public speaking, writing and his music. He has spoken at the National Press Club, was a keynote presenter for a conference held by the United Nations, The State Department and Georgetown University on the sexual exploitation and trafficking of children and adults and he was part of the groundbreaking Oprah Winfrey Shows that addressed the issues of males sexually abused as children. Since 1993, Michael’s uplifting and heartwarming story and songs of Hope and Healing has impacted thousands of people every year throughout the country. His presentations at colleges, universities, high schools, mental health centers and conferences, churches, civic groups, sexual assault and domestic violence support centers and conferences, including a women’s correctional center in Hawaii are highly acclaimed. He has appeared on many TV, radio and Internet shows and has been the subject of many news articles regarding child abuse and mental health. Michael is also a frequent and sought after blogger on several websites and writer of articles for mental health publications. He has contributed chapters for three books, “Jyu No Tobira” [ “The Door To Freedom - Live Your Life From Today”] published in Japan, “Our Encounters with Suicide”, Europe and Great Britain and, “You Can Help: A Guide for Family & Friends of Survivors of Sexual Abuse and Assault”, United States. Michael is also featured in the film documentary, “Hold Me Right”, addressing the aftermath of sexual abuse. His role as a consultant and trainer for the Federal government’s Substance Abuse and Mental Health Services Administration’s, National Association of State Mental Health Program Directors has been crucial in helping to shape the policy initiatives and directives for the delivery and implementation of trauma informed care and services. And he has worked with organizations nationwide to address the stigma of mental health and ending the silence of child abuse and suicide. Michael is also the founder and director of The Surviving Spirit; a monthly newsletter and website sharing resources to help those impacted by trauma, abuse and mental health challenges. S.E.S.A.M.E. twitter SurvivinSpirit Michael Skinner Music Surviving Spirit Web Site Mike Skinner’s YouTube page A teacher who was asking questions and I couldn’t answer those questions. School should be a place of safety. Showing that kid that you caare for them as a human being.</l
S1 E59 · Thu, July 15, 2021
Brandon Laur has been employed with Personal Protection Systems working as a White Hatter for over 12 years. Since May 2013, Brandon has been operating in a management position in the organization overseeing special project developments; most recently, developing the White Hatter production studio and the subsequent YouTube channel, livestream, and webinar platforms. He has a master’s degree in Professional Communication, specializing in phishing cyberattacks. Brandon actively facilitates educational programs designed for students of all ages, parents, teachers, and business professionals on the topics of privacy, security, digital literacy, and online digital intelligence gathering. In addition to these responsibilities, Brandon is multi-certified and continuing to receive ongoing training in Open Source Intelligence (OSINT) to use in conjunction with his security experience and academic pursuits. Brandon’s real-world experience using social media and the internet has played a major role in the growth of all internet and social media safety programs offered by The White Hatter. Why technology/internet is always such the focus of concern Parenting online: what can they do the best parent today’s youth Teens sexting rates, challenges, research What is the best security tips to consumers to prevent being haked/scammed Juvenoia - overexagerration of fear of kids getting involved in something new. Interventions for youth struggling. How to define sexting. Parents using phones as pacifiers.
S1 E58 · Mon, July 12, 2021
Ben Meiselas is a civil rights lawyer and the founder of Meidas Touch . Background is a civil rights Lawyer - strange to be associated with Meidas Touch Meidas Touch started during the quarantine. You’ve been in the public spotlight for various things - how has this been different? Be as transparent about who you are. Transparency - putting our personalities out there. How they think about what they post. Thinking about the language that they are using and how it reflects on their biases. Kids under 14 or 15 shouldn’t be having the conversations that I am having. Meidas University How they handle teaching cyberethics, copyright, and more. Differentiating between political leanings and being pro-democracy The Trial of the Chicago 7 It’s about whether you support or don’t support democracy
S1 E57 · Thu, July 08, 2021
Brian Devine is the Director of Educator Licensure at the Massachusetts Department of Elementary and Secondary Education. He has been with the Department since 1997 and has been leading the Licensure Office since 2004. In 2014 and 2015, he was recognized as part of teams that received the Manuel Carballo Governor’s Award for Excellence in Public Service for his teamwork on implementing Rethinking Equity and Teaching for English Language Learners (RETELL) and his leadership in directing the Licensure Office our of a tremendous backlog of applications. Most recently, he was awarded two Pride in Performance Awards in 2020 for his work on the creation of a new emergency license and for how the Licensure Office responded during the pandemic. Brian is currently serving on the NASDTEC Executive Board as the Northeast Regional Director and previously served on the Board from 2008–2014, including President in 2012–13. After graduating from Salem State University, he obtained licensure as a history and social studies teacher and later earned a master’s degree in Public Administration from Framingham State University. What the director of licensure does! 400 school districts and 80,000 educators who need to be licensed. Changes over the last several years Smartphones, internet use, social media Increase in volume of cases over the years. Clearinghouse with NASDTEC to go out through other states. Challenge of different restrictions on educators and infringing on their ability to be human beings or parents, themselves. The burden of checking is on the local district. Department could have subpoena power. How states get information on actions taken in other states. Good moral educator clause What should districts do to reduce tech-related educator misconduct? Do more to support prevention What should teachers individually do to reduce tech-related educator misconduct? Pay attention to what they’re doing, and look at what the impression may be that they are sending. NEA has built microcredentials Watch for grooming behaviors. NASDTEC Courses
S1 E56 · Mon, July 05, 2021
In this episode Jethro and Fred talk with Quinton B. Dale, who investigates teachers who are applying for licensure in Massachussetts. Quinton B. Dale Is currently the Chief of Investigations for the Massachusetts Department of Elementary and Secondary Education Office of Professional Practices Investigations. He previously served as Director of the Investigation Division, Deputy Director of the Investigation Division and as an Investigator for the Massachusetts Attorney General’s Office. Mr. Dale also previously served as a Corrections Counselor for the Massachusetts Department of Corrections. Mr. Dale has also served as a Commissioner for the Massachusetts Commission on Judicial Conduct and on the Board of Directors for St. Francis House. Mr. Dale is a graduate of Northeastern University, where he received a Bachelor of Science Degree in Criminal Justice. What inspired Q to get in to education from Criminal Justice Slipperly slopes for new educators coming into the profession. Trouble with being the “cool teachder” We’re not here to be your friend, we’re here to be your teachers! How social media has impacted inappropriate student-teacher relationships. It’s much more blatant than it was before. How to keep boundaries in tact. Set boundaries for time and what you talk about. Stay in your lane. Use school equipment in all communications. As long as it is good for the student, it’s fine. As soon as it goes awry, they’re going to use the information against you. How to maintain boundaries on social media with students. How to support teachers who have made some mistakes. Be sure to check out NASDTEC
S1 E55 · Thu, July 01, 2021
In this episode we talk with Marlena Gross-Taylor about how to establish screen time policies and routines that will carry them into their lifetimes. We also talk about the ways that schools have had to change because of the pandemic. Marlena Gross-Taylor is an amazing school leader and founder of Edugladiators. They are all about doing what is best for kids. Marlena has been a friend of mine for years, she is also an author, speaker, and consultant. Links Stressed about your kids’ screen time? Don’t be. The pandemic is changing a parent’s mind about phones Why not all screen time is the same for children Kids used to love screen time. Then schools made Zoom mandatory all day long
S1 E54 · Mon, June 28, 2021
Rob Shavell has been working on protecting the online security and digital footprint of individuals and businesses for more than 10 years. He is the founder of Abine & DeleteMe (joindeleteme.com) which seek to prevent data brokers from selling your information. Entrepreneurs want to solve a big problem. For the typical person, what we find isn’t useful information. Blatant exposure of person’s information. We don’t realize that we are giving the resale permission. Technology gets better faster and cheaper. Remove 2400 specific pieces of information The strange things in the information that is out there. Remove yourself from brokers 2 factor authentication set up. Ad/Tracker blocker Algorithms as it relates to location, genetic and facial recognition Signing up without giving companies all your real information. Technology just gets better, faster, cheaper. The Transparent Society by David Brin How algorithms are preventing people from achieving their potential? Thanks to our mission partner: Buoyancy Digital is proud to be the inaugural Mission Partner for the Cybertraps Podcast series. A digital advertising consultancy with an ethos, Buoyancy was founded by Scott Rabinowitz, who has been in digital media since 1997 and has overseen $300 million in youth safety compliant ad buys across all digital platforms. For IAB, Google and Bing accredited brand and audience safe advertising sales solutions, media buying and organizational training for media publishers, let’s chat.
S1 E53 · Thu, June 24, 2021
Scott C. Tennant is a Senior Program Strategist with Risk Program Administrators and the Deputy Executive Director of the School Pool for Excess Liability Limits Joint Insurance Fund commonly referred to as SPELL by its 83 school district members. Scott has been in the insurance and risk management field for 33 years, beginning as a retail broker focused on public agencies and migrating to public entity pool management in 1989. Scott is passionate about helping pools support their member public agency member/owners manage and mitigate risk to ensure a safe environment and to drive their total cost of risk down. In addition to these roles, Scott is a member of the National Council for the Advancement of Educator Ethics, a subcommittee of NASDTEC, a member of the Legislative Committee of the the New Jersey Self Insured Association, a founding member of PRIMA-NJ and active with AGRIP, PRIMA and NJASBO. Public Enterprise was too risky, so insurance companies made it more expensive. Not dealing with it because they weren’t getting a lot of claims. Cyber’s going to be like a giant snowstorm. Cyber liability policies are not making any money for insurance companies. It’s not easy to setting up effective preventative measures. More understanding and a better consensus of thought. Sexual Abuse & Molestation claims If it’s not a thoughtful discussion, then it is accusatory.
S1 E52 · Tue, June 22, 2021
Louis-David Mangin is the CEO of Confiant, Inc . Confiant is the first company to launch a malvertising product that captured harmful ads in real time, protecting users from forceful redirects and phishing scams (like the very recent Elon Musk bitcoin fiasco). Confiant also just launched the first-ever Privacy Compliance Product to ensure consent matches with GDPR and CCPA and similar evolving regulations (Confiant has a very robust research arm on the pulse of emerging regulatory). What you can do is know what to do with an idea! Infected and broken ads were a problem. How infected ads work. Ads were running in Flash. Industry debt - infrastructure debt that the advertising industry has. 3 types of software - software written by engineer, advertising tech, security tech. In Ad industry 15% of video ads don’t work right off the bat. The good news is that the industry is paying attention. Pay attention to the ads that show up. Tell the site that you don’t like the ads. Look at whether the site cares about advertising standards. Consent is a currency. Browser fingerprinting is barely legal and cannot be consented to. What does consent mean? Never Split The Difference by Chris Voss - A fake Yes is the easiest thing to get to. In order to be held accountable, you have to know the what are we being held accountable for Malicious clickbait ads are technically cloaked to load as the “correct ad” unless that person matches their target profile. The Cybersecurity 202: The Biden administration rolls out a 100-day plan to improve electric grid cybersecurity Tag Barnakle: The Malvertiser That Hacks Revive Ad Servers, Redirects Victims To Malware Link to the most recent Malvertising and Ad Quality Index Thanks to our mission partner: Buoyancy Digital is proud to be the inaugural Mission Partner for the Cybertraps Podcast series. A digital advertising consultancy with an ethos, Buoyancy was founded by Scott Rabinowitz, who has been in digital media since 1997 and has overseen $300 million in youth safety compliant ad buys across all digital platforms. For IAB, Google and Bing accredited brand and audience safe advertising sales solutions, media buying and organizational training for media publishers, let’s chat.
S1 E51 · Thu, June 17, 2021
Philippe Humeau graduated in 1999 as IT security engineer from EPITA (Paris, France). He founded his first company right after school and dedicated it to red team penetration testing and high security hosting. He was also deeply involved in Magento’s community creation & animation in France and versed into eCommerce (wrote 4 books on the topic). After selling this first company (NBS System), his eternal crushes for Cyber security and entrepreneurship led him to create a new company in 2020. CrowdSec was born, an open-source software editor behind the eponymous massively multiplayer firewall, leveraging both IP behavior & reputation to create a community and tackle the mass scale hacking problem. Real-world hacking learning experiences. Hacking is about the size of 4th or 5th largest country’s GDP. Hacking is organized, industrialized, and professional. Wardriving - cruise through neighborhoods looking for open or weak wifi signals and being untraceable. Education is key in security. [[cybertraps heather stratford]] Red Team penetration - hacking into places with permission to validate security. SQL Injection to the search bar on TV! CrowdSec - big companies are trying to defend themselves with lots of money, and they are failing. A super soldier is not the answer. If you want to take on an army, you have have a bigger army. One vulnerability - hackers don’t like getting woken up by FBI. Behavior logs says what happened. How does a normal consumer get involved. Exposed IPs (IPs that people use for ) need to be protected. Poisoning the network by sending bad information. Gaining trust. Whitelist Automation Goal is to cripple the hacking community. We gave up on human validation. One IP is scanned 1000 times per day. Most hackers are used to people protecting them. Consumers: use a linux box to filter internet. Use privacy tools to keep their information private. Tools that allow you to decline cookies automatically. DNS that protects privacy Cloudflare 111 app. VPN - multi-factor authentication Update your devices. WPS - deactivate that. password ideas - 3 levels Garbage: music_tuning for tuning Middle Level: mozart&&NameofSite High security level: 20 characters with characters and phrases 1/ Hacking, globally, where do we stand? 2/ Why do you think collaborative security is key to solving the mass hacking problem? 3/ Why is Hacking, a 30 year old problem, not solved? 4/ Is there a risk that someone can break this kind of reputation system? 5/ How to deal with IPV4 NAT addresses? 6/ What technologies are CrowdSec already compatible with? 7/ IP reputation had a dubious reputation in the
S1 E50 · Tue, June 15, 2021
We are excited to announce the formation of the Center for Cyberethics! We invite you to check out the new web site and of course, Donate! :) We are looking for all kinds of people to help us with the Center, so if you are interested, please reach out!
S1 E49 · Thu, June 10, 2021
Neil Gurnhill Founder and CEO of Node International and Cyberman365.
S1 E48 · Tue, June 08, 2021
Bliss Landon is a longtime Insurance Specialist and the Founder, President, and CEO of U-PIC Insurance Services, Inc., where she provides leadership and direction to her senior management team, and dictates the overall culture of the organization. Since 1989, Bliss has been dedicated to providing low cost shipping insurance to individuals and businesses. She understands the need for peace of mind when it comes to shipping valuable items, as well as getting claims processed quickly if any items are damaged. To her, people aren’t just numbers on a spreadsheet. Bliss has more than 30 years of experience leading teams in sales, marketing, and customer support. Her leadership has contributed significantly to the explosive growth of U-PIC in the eCommerce and educational technology sectors. She played a key role in creating partnerships and alliances with organizations like the United States Postal Service, Amazon, DHL eCommerce, and more. Having provided coverage for over 25 years to individual sellers, small businesses, and to some of the largest most well-known companies in the world, Bliss and U-PIC launched School Device Coverage, which provides school districts’ and families’ at-home devices protection against accidental damage, broken screens, charging failure, electrical failure, loss, theft, vandalism, and more. Bliss knows students study hard and play harder. Considering teens and young people are constantly on the go with their devices, accidents are bound to happen. School Device Coverage offers peace of mind against loss, damage or theft of those devices while they are in possession of students. Additionally, Bliss is a member of the Women Presidents’ Organization, and the Parcel Shipping Organization. She earned a Bachelor of Science degree from San Diego State University, and lives with her family in Hidden Hills, CA. Universal Parcel insurance Company (U-PIC) 1:1 program means a school is issuing a device to students. Schools using technology so much more Many things that happen with devices don’t fall under the warranty. #1 claim is a cracked screen, keys falling off, then liquid damage. How to prevent damage? Age of device, cases, educate kids on how to take care of them! How to get parents involved: parent-buy programs have less claims than school districts. Teacher insurance programs are not implemented in the same way as for students. Bliss Landon’s company does not provide support for technical loss (like ransomware, malware, etc.) The most efficient way to help is to have extra on hand. Good rule of thumb is to have 5% extra on hand.
S1 E47 · Thu, June 03, 2021
Jason Hong is a full professor in the Human Computer Interaction Institute, which is part of the School of Computer Science at Carnegie Mellon University (CMU). He was formerly an associate editor for IEEE Pervasive Computing, and currently on the editorial board for ACM Transactions on Computer Human Interaction. He has chaired or co-chaired a number of technical program committees, including HotMobile, Mobisys, and CHI, and has also served on SIGMOBILE’s test of time committee (mobile computing papers over 10 years old that should be recognized for their impact). He is also a 2010 Alfred P. Sloan Research Fellow, a PopTech Science Fellow, a Kavli Fellow, a New America National Cybersecurity Fellow, and a member of CHI Academy, which is “an honorary group of individuals who have made substantial contributions to the field of human-computer interaction”. Lastly, he co-founded Wombat Security Technologies, a startup that commercialized our NSF-funded research on anti-phishing and was acquired by Proofpoint for $225M in 2018 In this episode we talk about how to be smarter about cybersecurity, based on research. How to increase the chances that someone will make wise decisions relating to cybersecurity. Thanks to our mission partner: Buoyancy Digital is proud to be the inaugural Mission Partner for the Cybertraps Podcast series. A digital advertising consultancy with an ethos, Buoyancy was founded by Scott Rabinowitz, who has been in digital media since 1997 and has overseen $300 million in youth safety compliant ad buys across all digital platforms. For IAB, Google and Bing accredited brand and audience safe advertising sales solutions, media buying and organizational training for media publishers, let’s chat.
S1 E46 · Mon, May 31, 2021
In this episode we talk with Bjarke Calvin about his new service, TimerKid and why screentime and communication is so important. Bjarke Calvin comes from a media background, and has spend a lot of time on projects that battle the negative effects of social media. That led to a deep interest in how we can generally use our digital devices and internet content in a more healthy way. His current project is called TimerKid , and we help families balance their screen activity in an easy way. Before that he founded duckling.co which is an alternative social media, without advertising, algorithms and spam. He started his career as a journalist, and from 2004 to 2009, was executive editor with the worlds leading photo agency, Magnum Photos in New York City. He helped build a new million-dollar business area before becoming an entrepreneur with a focus on media technology. He has also worked as an advisor for media corporations like PBS, TIME and NY Times. Bjarke is an alumni fellow with MIT Open Doclab, and a frequent speaker at conferences and universities worldwide, such as MIT, Harvard TEDx, and SXSW. He currently lives in Copenhagen Denmark, with his wife and two kids, ages eight and six. Interactive documentary - the thing we now know as stories on Instagram. Independent publishing and social media. Was looking forward to the braintrust that social media owould be, but instead we have people sharing fail and dance videos. The Rabbit Hole Podcast Mastodon Social Network The right model vs the sexiness of it. TimerKid is about managing screentime for kids in an easy way. Parenting Paradigm in Scandinavia based on trust and collaboration. Real focus on humanity and ethics in Nordic regions. You sit down with your kids, and talk together to decide things. Thanks to our mission partner: Buoyancy Digital is proud to be the inaugural Mission Partner for the Cybertraps Podcast series. A digital advertising consultancy with an ethos, Buoyancy was founded by Scott Rabinowitz, who has been in digital media since 1997 and has overseen $300 million in youth safety compliant ad buys across all digital platforms. For IAB, Google and Bing accredited brand and audience safe advertising sales solutions, media buying and organizational training for media publishers, let’s chat.
S1 E45 · Thu, May 27, 2021
Keith Zamudio began his career as an educator in 1979 in Somerton, Arizona where he met his wife, best friend, and partner, Kathy, of 36 years. He has been an educator for nearly forty years, thirty-three in Alaska. Keith began exploring the use of instructional technologies as a learning tool in 1984. In 1988, he began to teach fourth graders to keyboard, and learn basic file management skills on Apple IIe’s. In this episode we talk with Keith Zamudio about raising his kids with technology, his 33 year career in Alaska, and how to trust kids with technology. Thanks to our mission partner: Buoyancy Digital is proud to be the inaugural Mission Partner for the Cybertraps Podcast series. A digital advertising consultancy with an ethos, Buoyancy was founded by Scott Rabinowitz, who has been in digital media since 1997 and has overseen $300 million in youth safety compliant ad buys across all digital platforms. For IAB, Google and Bing accredited brand and audience safe advertising sales solutions, media buying and organizational training for media publishers, let’s chat.
S1 E44 · Tue, May 25, 2021
Facebook opened to people over 13 on September 2006 Laws and Regulations Child Online Protection Act (COPA) (unconstitutional) Child Online Privacy Protection Act (COPPA) The child safety problem on platforms is worse than we knew Company Policies Overview of age limits on various social media Possible Risks Cyberbullying and Cyberharassment Body Dysmorphia Just Plain Envy / Dissatisfaction Sexual Harassment, Grooming, Assault Parenting Kids on Social Media Be a Good Role Model Mentors not Friends or influencers Follow Your Kids Supervision is Not Surveillance Communication!!!! Social media benefits and risks: children and teenagers What’s the average age when kids get a social media account? Thanks to our mission partner: Buoyancy Digital is proud to be the inaugural Mission Partner for the Cybertraps Podcast series. A digital advertising consultancy with an ethos, Buoyancy was founded by Scott Rabinowitz, who has been in digital media since 1997 and has overseen $300 million in youth safety compliant ad buys across all digital platforms. For IAB, Google and Bing accredited brand and audience safe advertising sales solutions, media buying and organizational training for media publishers, let’s chat.
S1 E43 · Thu, May 20, 2021
Lita Schmitt is a retired corporate intranet, training, and documentation professional, getting her start when PCs replaced terminals at work and hard drives were optional. In this episode we interview Lita and her daughter Katie about how they learned about technology in their home. What tech was like when Lita started teaching it to her kids. Babysitting devices & gaming systems. How Lita introduced tech to her kids. Katie got her first laptop at 3. Used it for Freddie Fish, PuttPutt Saves the Zoo. Disk install. Stand-alone use – no connectivity. Katie’s friends’ thoughts on her not having a phone: Are your parents strict? Mom is a prude. (Mom always said to blame her.) Not “cool” kid. Lots of shit for not having it. How KATIE viewed the Internet: A blank space. Ask a question and answers come back. You had a purpose. A homework assignment to get info or music. No awareness of Search History, and later what the “cloud” was and what would be stored there. When friends started having home systems crash with viruses from their kids using their systems. Internet was disabled on the kids’ systems. What was happening in friends’ homes? How to help when kids cross the line What they would do differently. Thanks to our mission partner: Buoyancy Digital is proud to be the inaugural Mission Partner for the Cybertraps Podcast series. A digital advertising consultancy with an ethos, Buoyancy was founded by Scott Rabinowitz, who has been in digital media since 1997 and has overseen $300 million in youth safety compliant ad buys across all digital platforms. For IAB, Google and Bing accredited brand and audience safe advertising sales solutions, media buying and organizational training for media publishers, let’s chat.
S1 E42 · Tue, May 18, 2021
David Ryan Polgar is the founder of All Tech is Human . He recently created a report called Improving Social Media . David Ryan Polgar is a pioneering tech ethicist, Responsible Tech advocate, and expert on ways to improve social media and our information ecosystem. David is the founder of All Tech Is Human, an organization committed to building the Responsible Tech pipeline by making it more diverse, multidisciplinary, and aligned with the public interest. As the leader of All Tech Is Human, he has spearheaded the development of three recent reports: Guide to Responsible Tech: How to Get Involved & Build a Better Tech Future, The Business Case for AI Ethics: Moving From Theory to Action, and Improving Social Media: The People, Organizations and Ideas for a Better Tech Future. In March 2020, David became a member of TikTok’s Content Advisory Council, providing expertise around the delicate and difficult challenges facing social media platforms to expand expression while limiting harm. The main throughline throughout David’s work is that we need a collaborative, multi-stakeholder, and multidisciplinary approach in order to build a tech future that is aligned with the public interest. Tech Ethicist Creating rules around how we can have a better society. We set up the conditions for people to discriminate. Strong democracy is contingent on shared truth Attorneys think of wrost case scenario, but tech founders look at best-case scenarios. This isn’t about tech. We didn’t foresee this…It’s a surprise to people who are pushing an agenda, but not a surprise to people who have been planning and researching it. Power structures. Meme literacy should be taught more in school. Section 230 - Social media is an amagamation of several different types of companies. Gordian Knot Power goes back to Cyberspace Manifesto Teens are on a platform that is defines teens as more than just users. IBM Watson - IBM Thinkleaders Thanks to our mission partner: Buoyancy Digital is proud to be the inaugural Mission Partner for the Cybertraps Podcast series. A digital advertising consultancy with an ethos, Buoyancy was founded by Scott Rabinowitz, who has been in digital media since 1997 and has overseen $300 million in youth safety compliant ad buys across all digital platforms. For IAB, Google and Bing accredited brand and audience safe advertising sales solutions, media buying and organizational training for media publishers, let’s chat.
S1 E41 · Thu, May 13, 2021
Vern Abila is an accomplished broad-spectrum security, investigative and training professional with nearly 30 years of comprehensive, large scale leadership and operational experience in diversified domestic and international fields. For the past nineteen years, Vern has been the President and CEO of Abila Security & Investigations. Inc. (ASI) and has led ASI from a micro business operating from his home to a successful multi-million-dollar worldwide organization, earning the Colorado Small Minority Businessperson of the year for 2012. Vern’s core competencies are corporate complex litigation investigations, threat and vulnerability assessments, surveillance and counter-surveillance operations, specialized critical incident training, logistical support, riot control tactics, overseas courier services, along with a wide variety of low and high-threat protective details, pre-employment screening services. Mr. Abila is considered a subject matter expert by the U.S. Department of State in VIP Protection, Critical Infrastructure, National Leadership and Diplomatic Security for their Anti-Terrorism Assistance Program. The combination of cyber, operational, physical security. Association of Threat Assessment Professionals Relationship between physical and cyber security. Training is not just for the one person, it's for everyone. Does this person belong Role of social media and personal privacy in the security realm. Lots of people trying to tear them down. Looking for people who are trying to find a cause. Doxxing & Hardening the target. Parents, know what your kids are doing. Very difficult, everyone is public knowledge Find people through relatives, so talk to them. Growing interest in joining the influencer community. Helping schools become more preventative How to harden the target: Threat and vulnerability assessment Build on a plan "Knowing a person" could be a double-edged sword. Don't be single-focused on one aspect How to talk to police. Real talk.
S1 E40 · Mon, May 10, 2021
In this episode, Fred and Jethro discuss two listener questions: How do I talk to my son when he is afraid I'll take away his phone? Should we jam cellular signals or boost them Contribute your questions at https://link.cybertraps.com/QuestionsandFeedback
S1 E39 · Thu, May 06, 2021
Jeanne Collins is the Superintendent of Rutland Northeast supervisory union in Vermont. We talk about how she handled technology for students during the pandemic.
S1 E38 · Mon, May 03, 2021
In this episode Richard Lucero of Transparentsee talks about his goal to improve communication among teachers, students, and parents by establishing effective three way communication. Richard Lucero is a lifelong educator with over 25 years of experience as a classroom teacher, coach and administrator. I have worked at all levels from elementary, middle and high school and college and university arenas. I have worked in rural and urban settings as well as both economically challenged and affluent communities.Richard has a diverse collection of experiences and has been fortunate to have worked in Texas, Florida, Indiana and New York. He received his undergraduate degree from Texas Tech University and graduate degree from St. Lawrence University in Canton, New York. Thanks to our mission partner: Buoyancy Digital is proud to be the inaugural Mission Partner for the Cybertraps Podcast series. A digital advertising consultancy with an ethos, Buoyancy was founded by Scott Rabinowitz, who has been in digital media since 1997 and has overseen $300 million in youth safety compliant ad buys across all digital platforms. For IAB, Google and Bing accredited brand and audience safe advertising sales solutions, media buying and organizational training for media publishers, let’s chat.
S1 E37 · Mon, May 03, 2021
An expert on digital literacy, Graber writes, presents, and is interviewed about technology’s impact upon human behavior. Her no-nonsense approach comes from being an educator, media producer, academic, and most of all, a mom. She is the co-founder of CyberWise, and she developed (and still teaches) Cyber Civics , the popular middle school digital literacy program currently being taught in schools in 47 US states and internationally. She’s served as Adjunct Faculty, teaching Media Psychology to graduate students. Her paper, New Media Literacies: A Developmental Approach , was published in the Journal of Media Literacy Education (JMLE). In 2019, she published “Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology” Frank Herbert: “Once, men turned their thinking over to machines in the hope that this would set them free. But that only permitted other men with machines to enslave them.” Links NY Times Headline A/B Testing “Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology”
S1 E36 · Mon, April 26, 2021
Show Topics - Compendium here . - Feedback & Questions - So what’s going on - Activision Reveals Malware Disguised as ‘Call of Duty: Warzone’ Cheats - Just Try Parenting - Facebook’s plans to create a kid-specific version of Instagram - The upcoming Supreme Court arguments over whether a cheerleader’s profane rant on Snapchat is entitled to First Amendment protection - The massive “rape culture” scandal in British private schools - An award-winning program by California high school students to reduce distracted driving by teens Thanks to our mission partner: Buoyancy Digital is proud to be the inaugural Mission Partner for the Cybertraps Podcast series. A digital advertising consultancy with an ethos, Buoyancy was founded by Scott Rabinowitz, who has been in digital media since 1997 and has overseen $300 million in youth safety compliant ad buys across all digital platforms. For IAB, Google and Bing accredited brand and audience safe advertising sales solutions, media buying and organizational training for media publishers, let’s chat.
S1 E35 · Thu, April 22, 2021
Adam Stone is a skilled business leader with 20+ years’ overseeing the implementation and development of data privacy and security innovations. A business development professional with the spirit of an entrepreneur and the boundless enthusiasm of a Russell terrier. Vice President Solutions Delivery and Chief Privacy Officer at TrustMAPP Adjunct Professor at the University of Minnesota in the College of Continuing and Professional Studies (CCAPS) Health Services Management (HSM) Program Specialties: Data Privacy and Security Leadership | Business Development and Budget Management | Advocacy and Outreach | Program and Project Management | Civic Leadership | Communications and Marketing | Organizational Strategy | Government Affairs and Compliance | Retained CPO and DPO | GDPR | International, Federal and State Data Protection Law Background – TrustMAPP Data Privacy Generally – What Is It? Globalization of Privacy – General Data Protection Regulation (GDPR) HIPAA – Help or Hindrance – Pandemic Data Breaches – Consumers Selective curation of social media. Cybersecurity – Leading Issues Government oversight vs. security vs. privacy. National Security – Solar Winds Recommendations for Parents & Kids re data privacy Thanks to our mission partner: Buoyancy Digital is proud to be the inaugural Mission Partner for the Cybertraps Podcast series. A digital advertising consultancy with an ethos, Buoyancy was founded by Scott Rabinowitz, who has been in digital media since 1997 and has overseen $300 million in youth safety compliant ad buys across all digital platforms. For IAB, Google and Bing accredited brand and audience safe advertising sales solutions, media buying and organizational training for media publishers, let’s chat.
S1 E34 · Mon, April 19, 2021
Carrie Goldberg is a personal injury lawyer against big tech. Carrie Goldberg, Esq.( https://www.linkedin.com/in/carrie-goldberg–04511a6/ ). Carrie is the founder of C.A. Goldberg, PLLC , a Brooklyn-based law firm specializing in cases involving “revenge porn” (or “ electronic sexual assault ”), stalking and harassment, victim’s rights, domestic violence, and a variety of other topics on the cutting edges of law and technology. Carrie has handled a number of high-profile cases, including most recently the efforts of former Rep. Katie Hill to sue the Daily Mail (UK) for publishing photos of her without her consent. Anti-Slapp Laws Carrie’s Book “Nobody’s Victim: Fighting Harassment Online & Off” (2019) Electronic Sexual Assault Thanks to our mission partner: Buoyancy Digital is proud to be the inaugural Mission Partner for the Cybertraps Podcast series. A digital advertising consultancy with an ethos, Buoyancy was founded by Scott Rabinowitz, who has been in digital media since 1997 and has overseen $300 million in youth safety compliant ad buys across all digital platforms. For IAB, Google and Bing accredited brand and audience safe advertising sales solutions, media buying and organizational training for media publishers, let’s chat.
S1 E33 · Thu, April 15, 2021
In this episode we talk with Attorney Mark Zaid about whistleblowers, Clinton’s email server, classified information and processes, and much more. Mark S. Zaid is a Washington, D.C. based attorney who specializes in crisis management and innovatively handling simple and complex administrative and litigation matters relating to national security, international law, foreign sovereign and diplomatic immunity, and the Freedom of Information/Privacy Acts. Through his practice Mr. Zaid often represents former/current federal employees, particularly intelligence and military officers, defense contractors, Whistleblowers and others who have grievances, have been wronged or are being investigated by agencies of the United States Government or foreign governments, as well as members of the media. Mr. Zaid teaches the D.C. Bar Continuing Legal Education classes on “The Basics of Filing and Litigating Freedom of Information/Privacy Act Requests” (since 2003), “Defending Security Clearances” (since 2006) and “Handling Whistleblower Cases: More Than the Basics” (since 2016). Since 2009, he has been named a Washington, D.C. Super Lawyer every year (including being profiled) and he is repeatedly named a “Best Lawyer” in Washingtonian Magazine’s bi-annual designation for his national security or whistleblower work. The Magazine also named him one of D.C.’s Most Influential People in 2021. In 2020, the Washington Metropolitan Employment Lawyer’s Association named him “Attorney of the Year” for his work on the Intelligence Community Whistleblower’s case. As the National Law Journal once wrote, “if Agent Mulder ever needed a lawyer, Zaid would be his man.” Technology has changed what any lawyer does. Communication strategies Scapegoats Dealing with the intelligence community Whistleblower Aid Freedom of Information Act requests. The one thing to stay more secure - stay off of social media and don’t use email. Thanks to our mission partner: Buoyancy Digital is proud to be the inaugural Mission Partner for the Cybertraps Podcast series. A digital advertising consultancy with an ethos, Buoyancy was founded by Scott Rabinowitz, who has been in digital media since 1997 and has overseen $300 million in youth safety compliant ad buys across all digital platforms. For IAB, Google and Bing accredited brand and audience safe advertising sales solutions, media buying and organizational training for media publishers, let’s chat.
S1 E32 · Mon, April 12, 2021
Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Today, we talk with Dr. Eric Cole, former hacker who now runs a security firm. He is the author of Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World . Dr. Cole is the founder of Secure Anchor , a cybersecurity firm that works with companies to make the internet a safer place to do business. has written several books on cybersecurity and he’s frequently called upon as the go-to expert by CNN, Fox, CBS, and NBC. He was one of the authors of the Nuclear Regulatory Commission’s cybersecurity guide and received a cyber wingman award from the Air Force for building out and developing their entire cybersecurity program. Employed as a professional hacker by CIA It’s boring is if you always get it in. The biggest marketing scam on earth is calling these devices smart! No matter what, you are a target! With everything being online, there are no secrets. [[cybertraps brandon karpf]] The biggest demographic that is targeted by cyberattacks is retired folks over 65. If you have not talked to them, you are doing a disservice. Security may be built in, but it’s not on by default. Many-factor authentication & notifications - In your bank, settings, security or advanced, account notification. Use different devices for different actions. People assume what they’re doing is secure, and that mindset is the worst thing you can do. Figure out the superset of tools for teachers, install it, and take away admin rights. Application whitelisting. Thanks to our mission partner: Buoyancy Digital is proud to be the inaugural Mission Partner for the Cybertraps Podcast series. A digital advertising consultancy with an ethos, Buoyancy was founded by Scott Rabinowitz, who has been in digital media since 1997 and has overseen $300 million in youth safety compliant ad buys across all digital platforms. For IAB, Google and Bing accredited brand and audience safe advertising sales solutions, media buying and organizational training for media publishers, let’s chat.
S1 E31 · Fri, April 09, 2021
Tom Harrison is a Reader, HEA Principle Fellow and National Teaching Fellow . He is Director of Education at the Jubilee Centre for Character and Virtues and Programme Director for the MA in Character Education . Tom is also the books editor for the British Journal of Educational Studies (BJES), Secretary and Trustee for the Society for Educational Studies (SES) and Secretary and Trustee for the Association for Character Education (ACE). Tom Harrison’s specialist interests are character, cyber-wisdom and the Internet; character education and virtue ethics; youth social action and citizenship education. Tom researches, publishes and gives presentations in the UK and Internationally in these areas as well as developing resources and training programmes for schools, voluntary sector and other organisations. His most recent book is Thrive – how to cultivate character so your children can flourish online published in January 2021. Questions / Background Notes Ph.D. on the influence of the Internet on eleven- to fourteen-year-olds - #2020–07–22 “Unique ethical challenges for the 21st century: online technology and virtue education” - We argue that education directed at the cultivation of cyber-wisdom and other cyber-virtues provides our best chance of creating a moral vocabulary that can guide us towards living well in the 21st century. - The aim of this article is to offer the first outline an educational model, founded on neo-Aristotelian theory, that illustrates how these qualities could be cultivated through moral education. - #2021–01–14 Thrive: How to Cultivate Character So That Your Child Can Flourish Online - Cultivating Cyber-Wisdom through Character Education - “Doing the right thing for the right reasons when online” - Pedagogical Approaches to Developing Cyber Wisdom - Activities to Cultivate Cyber-wisdom - #2021–03 “A New Educational Model for Online Flourishing: A Pragmatic Approach to Integrating Mor
S1 E30 · Tue, April 06, 2021
In this episode, Jethro and Fred discuss the recently released audio course, " Raising Cybertethical Kids. " Use the promo code Cybertraps to save 50%!
S1 E29 · Wed, March 31, 2021
In this episode we talk with Dr. Wendy Oliver round digital safety. This is a simulcast with Dr. Oliver's Building the Bridge podcast. Links Not Your Mama’s Classroom: What You Need to Know as a Parent About Your Child’s Digital Education Guest Bio Dr. Wendy Oliver is a highly qualified Tennessee teacher and administrator who has pioneered digital learning across multiple states and school districts. She has authored digital teaching standards and developed software that allows teachers to self-assess their knowledge of digital instruction. Wendy is currently the Chief Learning Officer for EdisonLearning , leading efforts to deliver high-quality, innovative digital learning solutions to hundreds of schools across the U.S. Wendy is author of a book for parents, “Not Your Mama’s Classroom: What You Need to Know as a Parent About Your Child’s Digital Education,” and the upcoming book for educators, Not Your Mama’s Classroom: Facilitating Engaging, Student-Centered Digital Instruction. No matter which hat she’s wearing, her goal is simple – to empower learners. Follow Dr. Wendy Oliver on Twitter @oliver_dr What is the outlook for the education system over the next 5–10 years? As more students of all ages are participating in online or hybrid schooling, how is exposure to online risks increasing? How do educators have the right conversations with parents and students around digital safety? K–12 education is trending toward digital and that’s not just going to stop. It’s not a system parents and students can just “opt out” of, but can they influence and change the system to work better? Particularly thinking about students’ rights, privacy and safety. Are there legal and ethical obligations coming into play for teachers when students go online, which they may not even be aware of? What are they? Thanks to our mission partner: Buoyancy Digital is proud to be the inaugural Mission Partner for the Cybertraps Podcast series. A digital advertising consultancy with an ethos, Buoyancy was founded by Scott Rabinowitz, who has been in digital media since 1997 and has overseen $300 million in youth safety compliant ad buys across all digital platforms. For IAB, Google and Bing accredited brand and audience safe advertising sales solutions, media buying and organizational training for media publishers, let’s chat.
S1 E28 · Mon, March 29, 2021
Show Outline Fred and Jethro: What’s New “Raising Cyberethical Kids: An Audio Course” You Are There – Signing of the Declaration of Independence Educators are eager to use social media in and out of the classroom Garett Talcott (@vividmichael) (TikTok) - #2021–03–24 Kindergarten teacher goes viral for enthusiastic remote field trip to zoo - #2021–03–23 Redmond kindergarten teacher gains social media fame for unique virtual lessons Emmanuel Robinson (@RobsRobins) (Twitter) (_mannymoves) Instagram - #2021–03–04 Atlanta’s ‘Teacher Bae’ And His Virtual Classes Have Gone ViralAtlanta’s ‘Teacher Bae’ And His Virtual Classes Have Gone Viral - #2021–03–01 Meet Atlanta’s ‘Teacher Bae’ whose virtual classes have gone viral Phil Cook (@chemteacherphil) - #2020–01–17 TikTok’s favorite chemistry teacher wants you to be careful with hydrogen peroxide The Lure of Fame / The Need for Cash - #2018–08–31 Teachers Are Moonlighting As Instagram Influencers To Make Ends Meet Defining EdTech the combination of IT tools and educational practices aimed at facilitating and enhancing learning. 92% of teachers believe tech is going to have a major impact on the way they educate their students in the near future https://builtin.com/edtech Privacy and Educational Technology https://studentprivacy.ed.gov/ Family Educational Rights and Privacy Act (FERPA) Protection of Pupil Rights Amendment (PPRA) Potential challenges: Intellectual property Information sharing Web hosting Data storage Benefits of EdTech For Students Increased collaboration Response: potential for bullying 24/7 access Response: increased pressure, no down time “Flipping the classroom” Response: challenging shi
S1 E27 · Thu, March 25, 2021
Marc Edward Netka (Born January 19, 1963 in Bayshore NY) is an American Entrepreneur and CEO, recognized as an expert in the use and implementation of technology in classrooms. He has worked with many international companies, helping them successfully enter the US K–12 Education marketplace, and currently sits on the K–12 advisory board of D&H Distributing Company, a $3.5Bil technology hardware and equipment distributor. His current company, STS Education, is one of seven Platinum re-sellers for Promethean, the worldwide leader in interactive flat-panel technology, to education. Marc lives with his wife Gloria and three sons in Newbury Park California. How can schools make better decisions about purchasing technology? How can ed tech companies aid in the reduction of the digital resource divide that was so starkly revealed by the pandemic? What considerations about privacy, ethics, and safety should schools consider when purchasing technology? What role can parents play in influencing ed tech purchases and implementation in their schools? How does STS Education solicit and integrate parental input? What ed tech trends should schools and IT departments be following? Thanks to our mission partner: Buoyancy Digital is proud to be the inaugural Mission Partner for the Cybertraps Podcast series. A digital advertising consultancy with an ethos, Buoyancy was founded by Scott Rabinowitz, who has been in digital media since 1997 and has overseen $300 million in youth safety compliant ad buys across all digital platforms. For IAB, Google and Bing accredited brand and audience safe advertising sales solutions, media buying and organizational training for media publishers, let’s chat.
S1 E26 · Mon, March 22, 2021
Show outline If you have questions you’d like answered, please visit the Questions and Feedback page on Cybertraps.com The focus today is on the interactions among adults in our school communities Teachers, administrators, school board members, and parents Social media has altered the traditional power dynamics of the school community School Board members 2021 CA – Entire school board resigns after swearing and joking about parents during virtual meeting “They want their babysitters back.” “Parents want to be home alone so that they can smoke pot.” Profane, threatening language against a parent who criticized her on social media 2020 FL – School board member resigns after making racist comments on FB about Kamala Harris 2016 VT – Burlington School Board member sharply criticized for contents of FB feed Administrators 2020 VT – Principal fired for “insanely tone-deaf” Facebook post criticizing Black Lives Matter movement Principal’s attempt to apologize not successful 2019 NY – Superintendent resigns after wife tweets out allegations of an affair with a subordinate 2018 TX – Superintendent resigns after writing on a public FB page that “You can’t count on a black QB” “As an educator, this experience has taught me that I still have a lot to learn,” Redden wrote to board president Ted Wiggins. “My comments were not only uninformed but also hurtful, and I understand now why they were offensive to so many people.” Redden said he mistakenly thought he was responding to a friend’s private message. He deleted the post, but Spring resident Matt Ericksen sent the Chronicle screenshots of the comment Monday. 2015 LA – High school principal and her husband get backlash for posting image of them wearing their “people of Walmart” Halloween costumes Classism and racism? Just having fun? Teachers One Scottish teacher’s union described the combination of smartphones and social media as “catastrophic” for its members Orwellian scrutiny 2021 WI – High school english teacher (and wife of superintendent) placed on leave after series of racist, homophobic, and transphobic remarks on social media Superintendent also on leave New law firm brought in to investigate 2020 CA – Los Angeles teacher flees her home with her daughter after receiving death threats when an ‘angry parent shared a photo of her’ wearing an ‘I Can’t Breathe’ T-shirt during a virtual class 2018 OH – Teacher fired after encouraging preschoolers to fight and posting videos to Snapchat 2017 NJ – Teacher fired and had license suspended for two years after she describes students as “losers”
S1 E25 · Thu, March 18, 2021
In this episode we talk about the nation-state problems that are facing the homes, corporations, and country in the cyber-world, and what we can do to overcome the challenges facing us. Brandon Karpf is a Naval Cryptologist and cyber ops professional. A proud New Jersey native, he spent his formative years in the mid–2000s finding trouble on and off the Internet. After discovering the value of structure at the US Naval Academy, he went on to serve as an operations officer at the National Security Agency and US Cyber Command in Fort Meade, Maryland, and as the head of information warfare on USS Boxer in San Diego, California. Passionate about education, he’s also worked as a curriculum developer for EdX through MIT and Harvard, and as an adjunct professor of cyber science at the US Naval Academy. Advice for taking a better security stance: Strong passwords Updating internet-connected devices, especially smart phones. Break it down to first principles: what is your goal and the completing a gap analysis Authorities, Resources, Knowledge, Skills We all have a responsibility in this way. Free Resources K–12 Cybersecurity – Join the MS-ISAC Hometown Security Tools And Resources Cybersecurity Training & Exercises How to Delete Your Old Online Accounts (and Why You Should) Buoyancy Digital is proud to be the inaugural Mission Partner for the Cybertraps Podcast series. A digital advertising consultancy with an ethos, Buoyancy was founded by Scott Rabinowitz, who has been in digital media since 1997 and has overseen $300 million in youth safety compliant ad buys across all digital platforms. For IAB, Google and Bing accredited brand and audience safe advertising sales solutions, media buying and organizational training for media publishers, let’s chat. For more information on working with Scott & Buoyancy Digital, visit BuoyancyDigital.com or @scottrmedia on LinkedIn.
S1 E24 · Mon, March 15, 2021
Research 2020–09–14 What Is Digital Hygiene? - https://www.seaglasstechnology.com/what-is-digital-hygiene/ 2020–04–01 Hackers Play Dirty, So Practice Good Digital Hygiene - https://www.forbes.com/sites/forbestechcouncil/2020/04/01/hackers-play-dirty-so-practice-good-digital-hygiene/ 2020–01–16 5 digital hygiene tips to start the new year fresh - https://www.cira.ca/blog/cybersecurity/5-digital-hygiene-tips Show Notes What Is Digital Hygiene? “the practice of cleaning up your electronic/information assets and regularly updating them.” Cybersecurity Is the Responsibility of All of Us Password Managers Strong Passwords - A password is typically considered “strong” if it is long (at least 8 characters) and contains a combination of letters, numbers, and special characters Avoid reusing passwords Avoid using new passwords that are too similar to existing passwords Password Managers 1Password Dashlane Avoiding Malware (Viruses, Keyloggers, RATs, Ransomware) Use antivirus and antimalware sofware Built into both Windows 10 and Mac Microsoft Defender Antivirus macOS Security Keep existing protective software up to date Use firewalls Use pop-up blockers (some browsers are better than others) Minimize downloads and practice safe computing Know where you are downloading from Minimize or block automatic / unauthorized downloads Keep Operating Systems Properly Updated Practice Safe Surfing Avoid using public/open wifi connections without protection Do-it Yourself Online Safety Guide Use a Virtual Private Network How They Work Cisco: “A virtual private network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely transmitted. It prevents unauthorized people from eavesdropping on the traffic and allows the user to conduct work remotely. ” Cisco How to Choose A Complete Guide To Choosing and Using a VPN Great review of VPN services:
S1 E23 · Thu, March 11, 2021
Scott is an interactive media specialist who joined the digital marketplace in 1998; he provides advertising business development strategy and management support for entertainment, ecommerce, technology and digital media brands worldwide. Over the past 22+ years, his body of work has included managing more than $200 million in online advertising campaigns, as well as advisory and hands-on marketing, advertising, business and corporate development roles, for a mix of brands in many industries. Scott was among the first digital marketers to profitably source direct response traffic campaigns for pay wall enabled subscription content sites in multiple age restricted industries. Having unique experience in support of content delivery online via search engine marketing, Scott serves the civil litigation system as an subject matter witness on matters of search engine marketing & digital media compliance policy issues. Spanning his time working around the internet content and traffic management/advertising sales industries at large, Scott has also contributed commentary and articles to various interactive media and entertainment industry outlets, including BrandChannel, Marketing Sherpa’s ContentBiz, the New York Times Online and WebmasterRadio.fm. A passionate advocate for online child protection issues in the digital age, Scott served on the Advisory Council for ASACP, an internet entertainment industry organization solely focused on child protection best practices by entertainment, traffic and technology hubs online. * Questions and Themes * In this episode we discuss how advertising works and what people should know as they interact with advertising enabled platforms online. * Why should parents add ‘advertising recognition’ to the short list of what kids know when they go online? * Native advertising - * Are all online ad formats clearly marked to allow people to avoid the ad or not? * What are the most common ad formats and symbols which can help a child or an adult identify what is an ad and what is not? * In-app purchasing on mobile devices. Why is this an issue? * How much of our childrens’ data is being shared by social networks with advertisers? * Native advertising
S1 E22 · Mon, March 08, 2021
Show Outline An introduction to web tracking technologies and their impact on personal privacy Goals of web tracking Improve web site performance Conduct web site analytics Develop information for business operations Feed targeted advertising to visitors (which often supports free services) Types of web tracking technologies Statistical -* browser used, geolocation, pages visited, operating system, device type, etc. Statcounter, Google Analytics, etc. Cookies Invented in 1994 by Lou Montulli It is a small data file stored on your hard drive when you visit certain web sites (almost all of them) Flavors of cookies First-party cookies -* created by a domain (web site) that you have visited Session (‘temporary’) cookies -* cookies designed to store information about a user’s web site visit while they are on the site; once the visit is over, the cookie is deleted Permanent (‘persistent’) cookies -* these remain even after a browser is closed. Typically used to store user ID and password for a particular site so that you don’t have to enter them each time Second-party Cookies -* in some limited instances, a domain will share its cookies with a trusted partner; for instance, an airline might share with a hotel chain, which would then send you ads for loding Third-party Cookies -* cookies created by a company or web domain other than the one you are visiting, typically by an advertisement of some kind. Web sites earn ad revenues by allowing the third-party ad network to use their site to place cookies. These are the cookies that can track your movement around the web, so they are responsible for the somewhat creepy appearance of ads for things you just looked at. Pixels (aka ‘pixel tag’) Tiny images (1 pixel) that are stored on a server but embedded Criticized by privacy advocates because they can collect extensive information about the user/email recipient without their knowledge They function even if the browser cache and cookies are regularly cleared Fingerprinting (‘a data portrait’) A system that identifies you by creating a profile based on largely unchanging information associated with your device screen resolution operating system and model browser version Once enough data is collected, a virtual ‘bar code’ can be compiled that uniquely identifies you This process occurs when your browser interacts with a web site; no data is stored on your computer As a result, it is very difficult to block Breaking News In February 2020, Google announced that its Chrome browser will no longer allow third-party cookies This month, Google also announced that it will NOT be developing alternative technology to track individuals and it
S1 E21 · Thu, March 04, 2021
Tony Anscombe is the Global Security Evangelist for ESET. With over 20 years of security industry experience, Anscombe is an established Author, Blogger and Speaker on the current threat landscape, security technologies and products, data protection, privacy and trust, and Internet safety. His speaking portfolio includes industry conferences RSA, CTIA, MEF, Gartner Risk and Security, and the Child Internet Safety Summit (CIS). He is regularly quoted in security, technology and business media, including BBC, the Guardian, the New York Times, and USA Today, with broadcast appearances on Bloomberg, BBC, CTV, KRON and CBS. Read the privacy policy, what they collect, what they share and, how long they retain it. Tony Anscombe | One Parent to Another | Book Introduction – https://youtu.be/zH8FfbqOZs4 FTC – IdentityTheft.gov 11 year old blackmails his own father
S1 E20 · Mon, March 01, 2021
In this episode, Jethro and Fred discuss questions from YOU! To submit your questions, go to Cybertraps.com Our questions today: What are things that educators can do if students’ families have extreme beliefs? Case law regarding educational forums, substantial disruptions, and first amendment rights are decades old. With the pivot to remote learning and the use of various learning management systems, what responsibility do schools have to monitor these educational forums outside traditional hours? How can teachers deal with all the gray areas in privacy, especially in Alaska, where so many people live in small communities where everyone knows each other? What are your thoughts on teachers using TikTok to show lessons/content?
S1 E19 · Thu, February 25, 2021
Joan Irvine has worked in technology, sales, and marketing for companies such as ADP (Automatic Data Processing), System Development Corporation, and Goal Systems. For the last 20 years, she has been a leader in online child protection technology. In this episode we talk about how the cannabis industry can keep kids from purchasing their products by self-regulating.
S1 E18 · Mon, February 22, 2021
In this episode, Fred and Jethro discuss the issues around child access to adult content and products on the internet. Many links and examples at Cybertraps.com Legal But Age-Restricted (in theory) Gambling Pornography Cigarettes Alcohol Prescription Drugs Weapons and Explosives Illegal Obscenity / Child Pornography Controlled Substances as defined the Drug Enforcement Agency Schedule I – heroin, LSD, marijuana, ecstasy, peyote, etc. Schedule II – Vicodin, cocaine, methamphetamine, methadone, oxycodone, fentanyl, Dexedrine, Adderall, and Ritalin Schedule III – Tylenol with codeine, ketamine, anabolic steroids, testosterone Impure or corrupted versions of known drugs A range of designer/synthetic, uncategorized drugs Shift in Laws and Social Acceptance Alcohol – Prohibition Marijuana – Spreading legalization Scope of the Problem Examples 2020–12–23 One in six children steal money from their parents to pay for addictive computer game ‘loot boxes’, survey reveals – as campaigners call for them to be classed as gambling 2020–12–12 This 6-year-old racked up $16K on mom’s credit card playing video games 2020–12–04 Schoolgirl, 15, died at gathering with friends after taking ecstasy supplied by two teenagers who bought the tablets off the dark web, inquest hears 2020–11–08 One in 10 children admit gambling with their own money amid fears thousands of families are being plunged into ’tidal wave of misery’ 2020–08–26 Gambling giants flout advertising rules to target children by using websites popular with youngsters 2020–08–18 Schoolboy, 15, AVOIDS jail after he sold three super-strong Donkey Kong ecstasy pills to a 13-year-old on Snapchat before he died hours later from ‘severe reaction’ to Class A drug 2020–01–03 Children are fueling marathon gaming sessions with ‘dange
S1 E17 · Thu, February 18, 2021
RODRIGUEZ, Raymond “RJ”, is a Licensing Specialist for the Hawaii Teacher Standards Board (HTSB), and currently the lead for the HTSB work regarding the Model Code of Ethics for Educators. He was a classroom teacher for ten years in a variety of settings: elementary school, middle school, and high school (including charter school experience). He has also spent seven years working for a teacher union providing professional development for educators. The Mirage LINK From Quicksand to Solid Ground LINK Guskey LINK Guskey eval link MCEE NASDTEC resources LINK NEA Micro-credential LINK HTSB Ed Ethics LINK The Hawaii Teacher Standards Board would like to thank HSTA and NEA for their collaboration on professional development
S1 E16 · Mon, February 15, 2021
Troy Hutchings researches, writes, and speaks in the areas of professional ethics, educator misconduct, and frameworks for an ethical and legal teaching practice. He presents to various state and national policy and practitioner groups across the United States and Canada. Hutchings also provides expert witness testimony in judicial hearings; collaborates on policy initiatives with state, federal and provincial agencies; and has been the subject matter expert on a variety of national projects dealing with educator ethics including the Model Code of Ethics for Educators and the National Council for the Advancement of Educator Ethics. In this episode we talk about how to implement the MCEE in your school or district, or even state. Check out the MCEE here .
S1 E15 · Thu, February 11, 2021
Joshua Spodek, PhD, MBA is a three-time TEDx speaker , #1 bestselling author of Initiative and Leadership Step by Step , host of the award-winning This Sustainable Life podcast, and professor at NYU. He holds a PhD in astrophysics and an MBA from Columbia, where he studied under a Nobel Laureate and helped launch a satellite (having emerged from some of Philadelphia’s most dangerous neighborhoods). He left academia to found a venture to market an invention that showed animated images to subway riders between stations. This podcast features a discussion of addiction to technology and how that relates to the environment.
S1 E14 · Mon, February 08, 2021
In today's episode, we are going to talk about sexting and the law. We are going to look at the legal risks for children, educators, and parents, and what to do if you see something on kids' devices. Content warning, we are going to talk about sexting and child pornography. Show Outline In today's episode, we are going to talk about sexting and the law. We are going to look at the legal risks for children, educators, and parents, and what to do if you see something on kids' devices. Content warning, we are going to talk about sexting and child pornography. Background Obscene Profits (2000) https://link.cybertraps.com/OP_PB Computer Forensics The Decency Wars (2006) / The Daily Show with Jon Stewart https://link.cybertraps.com/DW_HB https://www.cc.com/video/6xa63e/the-daily-show-with-jon-stewart-frederick-lane Cybertraps for the Young (2011) https://link.cybertraps.com/C4Y_PB A Brief History of Relevant Technology Almost every technology has been used to take nude selfies Things didn't really take off until images could be created easily without third parties Late 60s to early 1970s -- Instant cameras take off Mid-1970s -- Video recorders Federal and State Child Pornography Laws Federal Law 18 U.S. Code CHAPTER 110— SEXUAL EXPLOITATION AND OTHER ABUSE OF CHILDREN Sexual exploitation of children (production) -- 15-30 years Production, distribution, reception, and possession -- 5-20 years Increased penalties for second offenses, severity of offense, etc. Law prohibits depiction of sexually explicit conduct involving a minor. Mere nudity can constitute "sexually explicit conduct." Interstate commerce is required for federal jurisdiction. This covers transport in U.S. Mail, private carriers like UPS or FedEx, and the Internet. Even an image remains within one state, federal prosecutors may assert jurisdiction if the items used to produce or store the images themselves traveled in interstate commerce (i.e., a digital camera, smartphone, computer, CD-ROM, USB stick, etc. State Laws Every state prohibits child pornography Virtually all use language similar to the federal statutes, although there are some minor variations "Romeo and Juliet" Statutes In g
S1 E13 · Thu, February 04, 2021
- Awo Aidam Amenyah is Child Online Africa’s founder and Executive Director. Child Online Africa a child and family focused charity working in Ghana and beyond through strategic partnerships. In this role, Awo leads a team of professionals and volunteers committed to influencing policies and changing practices in favour of child well-being keeping the child in Africa safe while they are online. - Since 2013, Awo has been at the forefront of the call on government and other stakeholders to put in place measures safeguard children within the cyberspace and this call resulted in a revolution regarding Child Protection interventions in Ghana. The team's work influenced the National Cyber Security Policy and Strategy in Ghana in 2015 and the Africa Union’s Agenda 2040 in 2018 to prioritize Child Online Protection. - Prior to her current role, Awo has facilitated platforms for engagement between state and non-state actors to influence policy and development decisions specifically related to education, violence against girls, Child Sexual Exploitation and Abuse, Child Online Protection, among others. Before her current position she worked with the Education Coalition on an ActionAid-Big Lottery Fund project. The key milestone for the project is the draft Ghana Gender Education Policy. - Awo is DQ World Training Partner, a member of the National Child Online Protection Steering Committee (Ghana) and Child Online Protection implementation partner for ITU, the International Telecommunication Union. She has been involved with the Recovery and Reintegration from CSE working group and National Association of Media Literacy Education. The passion to make things happen for the child in Africa compelled her to start the rallying call for Safer Internet Day celebrations in Ghana since 2015 evolving into Safer Internet Day Africa in 2019 which saw 12 other African countries participating. In her quest to sustain the continental level discussion and the anger of slow pace of action saw the saw her summiting successfully on Mt. Kilimanjaro (19341 Ft AMSL) in August as a social cause to raise awareness on Child Online Safety and Wellbeing in Africa In this episode we talk with Awo about the challenges they face in rolling out internet access in Ghana, Africa.
S1 E12 · Mon, February 01, 2021
In this live conversation, we talked about the impact of the pandemic on society, teachers, parents, and students.
S1 E11 · Thu, January 28, 2021
Dr. Jeff Temple is a Professor, Licensed Psychologist, and Founding Director of the Center for Violence Prevention at the University of Texas Medical Branch. His research focuses on the prevention of interpersonal, community, and structural violence, and has been funded through the National Institute of Justice, National Institutes of Health, and Centers for Disease Control and Prevention. He has over 200 scholarly publications in a variety of high impact journals including JAMA, JAMA Pediatrics, The Lancet Child and Adolescent Health, Pediatrics, and the Journal of Adolescent Health. He recently co-edited a book on adolescent dating violence, is an Associate Editor for the Journal of Primary Prevention, and is on the editorial boards of five other scientific journals. Dr. Temple recently co-chaired the Texas Task Force on Domestic Violence and served on the Board of Directors of the Texas Psychological Association. Locally, he served as the Vice President of the Galveston Independent School District Board of Trustees. His work has been featured on CNN, New York Times, TIME Magazine, Washington Post, and even the satirical website, The Onion. Questions / Discussion Topics - Relationships among teens and how they interact, how they develop, and what helps them go good and bad. - Kids who had sexted were twice as likely to engage in physical sexual behaviors - Marion Underwood study. - Smartphones make the things kids have always done more public. - When did you begin researching the prevalence of sexting among teens? - Teach kids how to be in a relationship. - Electronic Sexual Assault vs. Revenge Porn. - What types of adolescent dating violence did you research write about? - Did you find a significant gender divide? What other demographic factors come into play - What links are there, if any, between technology and dating violence among adolescents? - What are the key steps that schools can take to prevent adolescent dating violence and provide support to victims? - What can parents do to protect their children? - How can adolescents protect themselves or their peers?
S1 E10 · Mon, January 25, 2021
Today we are talking with Genie Siedler, Executive Director of Alaska Society for Technology in Education, and how ASTE has been there for students in Alaska well before the pandemic hit and lessons learned from the pandemic. She also shares some insights learned from allowing technology to get out in front of what people are prepared for when they adopt that technology.
S1 E9 · Thu, January 21, 2021
Akunna was born and raised in New York but has declared California home for the past 6 years. She has lived in South Los Angeles. She teaches middle and high school Speech and Debate at New Roads School in Santa Monica, CA. Her school was founded about 25 years ago as a response to the racial and socio-economic segregation plaguing schools in the Los Angeles area. In 2019, Akunna completed her masters in Education at UCLA while teaching full time. She studied political science and educational studies at Swarthmore College and is a 2013 New York Truman Scholar. In this episode we discuss how youth are using technology and how to be critical thinkers.
S1 E8 · Mon, January 18, 2021
In this episode, Jethro and Frederick discuss the history of radicalization, challenges, and give advice for what parents can do to help their children. Brief History 1978 Invention of Bulletin Boards 1979 Neo*Nazi Bulletin Board Set Up in West Virginia; attracted kids from area Quickly followed by numerous others In the mid*1990s, with the development and growth of the Web, these BBSs moved onto the Internet Every online resource, from niche forums to wildly popular platforms like Facebook and YouTube, are used to spread hate speech and groom children The problem intensified with the creation of social media in the late 2000s and early 2010s, along with growing child access to mobile devices The combination of pandemic and lockdown is intensifying the problem Some of the radicalizing groups that use technology to target kids Neo-Nazis and White Supremacists ISIS QAnon Social / Tech Problems The cost of distributing speech is virtually “free”. some important social equity issues but also gives a platform for the fringes It’s the World Wide Web, which makes it easier for fringe elements to coalesce online Algorithms and hyperlinks are radicalizing all of us but especially our children. We’ve invented dark and dangerous rabbit holes Stark contrast with books as an information technology Overwhelmingly, the Internet is fueled by advertising. Controversy attracts eyeballs and clicks Tech speech companies are torn between need to operate in a functioning, decent society and the need to make money Legal Issues Speech, even hate speech, is protected by the First Amendment to the US Constitution, which provides that “Congress shall make no law abridging the freedom of speech” Corporations are not bound by the First Amendment; it applies only to governments and governmental agents Services like Twitter and Facebook look like “public spaces” but they are not; they are private services regulated by terms and conditions. Corporations are not required to do business with other companies, even if the primary function of one business is speech (so Amazon can stop hosting Parler US law does not apply overseas (8chan, 8kun) “Free” speech does not mean “free from consequences” What can parents do? Context, context, context. Many and persistent conversations with children about prejudice and the hate speech it can cause. Common Sense Media “Where Kids Find Hate Online” As much as practical, limit unsupervised time spent online. Kids don’t radicalize over night but a lot of radicalization does take place after bedtime!!! Particularly for younger children, consider the installation of filtering software. Use every parental control available Pay attention to kid behaviors, attitudes, med
S1 E7 · Thu, January 14, 2021
Dr. Eric Stephen’s dissertation research was all about how researchers fall into traps using datasets they don't curate themselves. They adopt the assumptions of the database design and the methodology. Stephens discusses how social justice researchers employ the doctrine of double effect to justify unintentional exploitation of their subjects, and proposes a big data research method to counter those exploitations by focusing on data created by institutions and not users. Bias and unbias: Where they go to do research is already showing their bias. We could also talk about questions schools should ask before adding their information to big data sets. Bag of words method What is the doctrine of double effect? ( Stanford Dictionary of Philosophy Link ) Explain the research method for big data Institutional genre analysis - study what an institutions’ goal is across time.
S1 E6 · Mon, January 11, 2021
In this episode, we talk with renowned producer Ed Gray about his most recent NOVA special "Secrets in our DNA." Tune in to this fascinating discussion about DNA testing and its place in our society.
S1 E5 · Thu, January 07, 2021
Dr. Glenn Lipson, a diplomate in forensic psychology, has spent three decades preventing different forms of violence. He works with the district attorneys, schools, and civil cases where there were claims of abuse by such individuals as the clergy and teachers. As an expert witness, speaker, and advisor, he has testified in court martials, regulatory hearings and submitted briefs through counsel to the United States Supreme Court. Dr. Lipson founded MRC (Making Right Choices) and the NASDTEC Academy, offering online courses that address interpersonal violence and prevention. As a public speaker, he has presented for the US State Department and US Army. He has received the Doug Bates Award from NASDTEC for his international contribution to making schools safer. Leading psychological issues we are seeing in educational environment right now? Enlist the disposition of caring by giving them information about the issues. Creating upstanders instead of bystanders. Credibility in education is based on being in education. Godwin Higa - trauma-informed schools Z Generation - Compared to elders, Z generation is 78% of Z generation don’t have a friend to talk to. Surgeon General Vivek Murthy Loneliness is a faster killer than many other ailments. Bowling Alone Making sure youth stay connected. How Schools Should Respond in the Pandemic Connection, early intervention, social emotional learning
S1 E4 · Tue, January 05, 2021
Parents Oversharing Kids on Social Media – aka “sharenting” Celebrities … Hilaria Baldwin controversy – Instagram feed filled with photos of her infants and growing children Tamara Ecclestone Chrissie Teigan Elizabeth Hurley No clear roadmaps - “owning your story vs. paparazzi” People say they stalk instagram and Facebook to stay connected, but without actually connecting, it’s just voyeurism. Legal issues regarding posting of child photos Kids currently have no legal right to prevent their parents from posting photos of them online Parents may have legal recourse if someone (even a family member) posts photos of their children without their consent A grandmother in the Netherlands forced to take down photos of her grandchildren from Facebook In general, thanks to the First Amendment, speech outweighs privacy concerns in the U.S. The European Union is the reverse – no First Amendment and very strong protections for individual privacy Practical risks Data harvesting – there is a vast industry, from social media sites outward, eager to harvest personally identifying information about your children, which will affect their entire lives. Why not slow down the process? Misappropriation of images Digital kidnapping Impact on children Psychological cost of relying on external gratification Impact on body image – dysmorphia Ethical considerations Bad role modeling – if your child is too young to consent, then you are posting without the conscious agreement of your child. If your child is old enough to express an opinion and you ignore them, you are teaching them that consent is not important. Lack of respect / use of social media to punish or shame child Preemption or co-option of the child’s own formation of identity Whose brand is it anyway? Economic motivations for using children in social media There are alternatives Think about online “friendships” and who can see your stuff. Put family photos in a password-protected folder in a cloud storage or online photo service Photobooks/chatbooks Send USB sticks
S1 E3 · Thu, December 31, 2020
Charles Logan is a doctoral student in the Learning Sciences program at Northwestern University. He previously worked as the educational technologist in the College of Education and Human Ecology at The Ohio State University, and prior to entering higher education, he taught high school English for nine years. He holds a Master of Arts in Educational Technology from Michigan State University and a Bachelor of Arts in English from Middlebury College. A father of two, he spends a good deal of time building elaborate forts and instilling a love of the Chicago Cubs. You can find him on Twitter at @charleswlogan. On this podcast we talk about refusal strategies for harmful ed tech.
S1 E2 · Mon, December 28, 2020
Frederick Lane and Jethro Jones do a year-in-review. Watch live on Facebook each week at noon eastern. Our First "Year in Review" Show Pandemic: Reshaping Education on the Fly A Lost Generation -- Remote vs. In-Person Instruction Access Surveillance Challenges for Educators Multiple Classrooms Increased Scrutiny Less Privacy Things That Worked and Those That Didn't Top Child Concerns for 2020 Screen Time Isolation Privacy Embarrassment Distraction Normalization of Digital Interactions with Adults Much more intimate than we typically think. The New Words/Phrases We Learned in 2020 Blursday Deepfake Doomscrolling Infodemic Remote Learning Social Distancing WFH You Are on Mute Zoom fatigue Zoombombing
S1 E1 · Sun, December 20, 2020
In this episode, we have a wide ranging discussion about the dangers our kids face with technology with Tessa Stuckey ( @themomtherapist on Instagram). We also provide strategies for having conversations and helping kids avoid dangers relating to technology.
Trailer · Sun, December 20, 2020
Full episodes and interviews coming soon!!! See Cybertraps.com for more information.
loading...