Wrangler Stranger Daner

Wrangling Stranger Danger

Stay aware with this software

Ah, summer—the season of youth! If you’re under a certain age, this is the carefree, barefooted time of year made for swimming pools, beaches, bicycling and baseball—the dandelion days punctuated by lemonade stands, amusement parks, camping and playgrounds. It’s easy to wax poetic.

In truth, though, for kids, summer has always been the riskiest time of year. Because hazards rise in direct proportion to increases in outdoor activity, these are the months in which, for example, the most drownings, head injuries and boating incidents occur. Such dangers are well publicized and part of what parents have had to be wary of for generations.

Well, now there’s a relatively new breed of summer hazard, and it’s situated mostly indoors. It’s centered on the Internet, and the danger is growing in direct proportion to the increase in popularity of social networking sites such as Facebook—and to the fact that summer is also the season of youthful indiscretion.

Face the Facts

As of early June, the Facebook statistics blog Socialbakers was trumpeting the news that Facebook was about to hit 700 million users. At the same time, a Consumer Reports study revealed that approximately 7.5 million children under age 13—Facebook’s legal minimum age—were among those users.

Both of those numbers have certainly grown by now, because in the meantime, with school out and the dog days to fill, there’s been more time for children to spend online, much to the chagrin of those still trying to make a go of it with the lemonade stands.

The Consumer Reports study also found that the majority of the parents of underage Facebookers have no clue what their children are up to. According to law enforcement statistics, though, what many of the young social networkers are doing, often unwittingly, is figuratively dipping their toes in pools of trouble and, way too often, just jumping right in and swimming with sharks.

“Summer is high time for predators to start grooming new victims,” says Jamie Leasure, co-founder of Pandora Corp., the maker of PC Pandora computer monitoring software.

“It’s easy for a predator to pretend to be a new kid in town looking to make a few friends over the summer before school starts. While talking to your kids about online stranger danger is a must, it is also important to be aware of any new friends in your child’s life, as predators often don’t put their real identity forward.”

Pandora’s Director of Public Relations and Marketing Ken Shallcross adds to that, saying, “Talking is great, but what a lot of parents forget is that kids are kids; they’re going to lie. You can talk to them and think you have an open relationship, but the last thing they’re going to do is tell you when they make a new ‘friend’ on Facebook, especially if the conversation is a little bit flirty or if sexual messages are traded back and forth.”

In addition to that lurking threat, cyberbullying has reached epidemic proportions, Leasure notes. No longer restricted to the schoolyard or playground, bullying is now, thanks to the ubiquity of social media, a 24/7 opportunity with far-reaching implications. The practice has been blamed in the suicide deaths of youth across the country.

“PC Pandora will let you know if your child is the victim of an online tormenter, and, sometimes, it may also show your child to be an aggressor— something that should never be tolerated,” Leasure says. “There are simply too many dangers out there to turn your head and let your child be on Facebook unsupervised.”

Pandora’s Box

As a way to provide the supervision, PC Pandora (pcpandora.com) records and captures all computer activity, providing data logs of e-mails sent and received, instant messenger conversations, a user’s Web history, peer-to-peer activity and more.

Critics of such wholesale monitoring (who may or may not be parents themselves) say the Pandora program and others like it are less about supervision and more about blatant spying. Shallcross disagrees: “When your kid is 3 years old and you take him to the park, you don’t look away—you watch him,” he says. “When your kid turns 16 and takes driver’s ed, you don’t just hand him the keys to the car and say, ‘Here you go.’ But with the Internet? So many parents today just say, ‘Go ahead; just go online and be safe,’ and they think that is going to be good enough. It’s not.

“Some people wage the argument that, ‘Well, my parents didn’t listen to my phone conversations, and they didn’t read my diary.’ Which, yeah, but back then you didn’t broadcast your diary to the whole world, nor did you pick up the phone and just call random strangers, because that would have been just a stupid thing to do. But now kids do it on Facebook every day, and parents just don’t know-slash-don’t care, and that is what is wrong.”

There’s no question that in the right, responsible hands, the monitoring capability of PC Pandora and similar programs provides a powerful tool for parenting in the 21st century. Yet it doesn’t take much imagination to see that in less loving hands such power could easily be enlisted for other, less protective purposes.

For example, a suspicious spouse might use the software as a particularly effective piece of anti-affairware. An employer could conceivably deploy it as an anti-time-wasting tool. Public libraries could use it to keep tabs on their patrons. And the list goes uncomfortably on.

In the end, marketing the technology as a weapon for wary parents to use against a wicked world is palatable— and timely, because, unfortunately, we’re in the right season for it.

This article originally appeared in the July 2011 issue of Security Today.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3