fbpx

Need peaceful screen time negotiations?

Get your FREE GKIS Connected Family Screen Agreement

cybersecurity

Scammers Target the Elderly: How to Avoid Being Scammed

Scams can cause extreme financial and emotional distress to victims and their families. With technology, scammers have become more creative in accessing their victims by offering quick clicks and false credibility. Even young teens that navigate effortlessly online have a hard time distinguishing legitimate situations from scams. To help you and your family avoid becoming the victims of a scammer, I interviewed “William”* who shared his mother’s story. She was an educated professional that fell victim to multiple scams over five years. You won’t want to miss the true story about what happened to her. If your family hasn’t taken steps for increased awareness and cybersecurity, you’ll want to check out our Cybersecurity & Red Flags supplement. The perfect compliment to our free Connected Family Agreement, you can take the extra steps you need to protect your loved ones right now. Our guide offers tips to avoid hacking, scamming, malware, and phishing and is a must-have for today’s modern family. Today’s GKIS article shares the story of an elderly woman victimized by scammers, the types of scams to look out for, and tips on how to avoid becoming a victim yourself.[1]

*Names were changed to protect the privacy of the victims.

What are scams?

A scam is a dishonest scheme to cheat someone or steal money. With the help of technology, scammers have been able to target their victims in more creative, easier, and faster ways than ever before. According to an FBI report, 2020 scams resulted in a loss of over 4.2 billion dollars. With more baby boomers retiring and the pandemic resulting in more at-hone isolation, I suspect those losses rose in the last few years.[1,2]

Who Scammers Target

Although anyone can become a scam victim, research has shown that scammers tend to target kids, teens, and the elderly. A study conducted by the University of Iowa confirmed that a certain area of the prefrontal cortex of the brain is responsible for processing information and solving problems – tasks that help people consider whether information is true or not. Young people tend to be vulnerable to scams because this part of the brain is still developing, and older individuals are vulnerable when they demonstrate poor technological fluency, are isolated, or suffer from a decline in problem solving ability.[3]

The Story of William and His Mom

William is a middle-aged man who generously shared his story with us about his elderly mother, Mrs. Thorn, who was scammed out of tens of thousands of dollars over a five-year period. Despite his best efforts to protect and rescue her from the scammers, he struggled to keep her safe. Once one scammer got ahold of her and convinced her to send money, many other scammers started approaching her too. William suspects that the scams were somehow linked as if they shared her information with others. Below are some of the scams she fell victim to.

Different Types of Scams

Charity Scams

William described his mother as a generous individual. She was a nurse in Japan during the 1950s, and, after she retired, she continued helping others by volunteering at church and other organizations. As she got older, she would receive postcards in the mail from different charities, a common scam targeted at elders. Although her income from social security and savings was not a lot, she began “donating” money to those she perceived as less fortunate than herself.

Piecing together what happened with his mom’s checking and bank documents, William found that she initially sent small amounts of money ranging from $5-10. Once the scammers had her on the hook, however, they would groom her for larger and larger “charitable” donations.[4] 

Lottery/Sweepstakes Scams

Another scam that William’s mother fell victim to was the lottery/sweepstakes scam, which also commonly targets elders. These types of scams claim that the victim has won a large amount of money or other prizes such as a new car. Once the victim is excited and eager to collect their prize, scammers require that they pay a fee or taxes. As the scammer reaches out with details, the victim often adopts an illusion of intimacy, meaning they feel they have a personal, caring relationship with the scammer. This false intimacy pulls the victim in deeper, often eliciting more and more personal information from the victim.

William confirmed that Mrs. Thorn spoke to the scammers about his efforts to block their access and protect her safety. Mrs. Thorn’s scammers not only instructed her not to tell anyone because it could be a nice surprise for her family, but they also offered specific suggestions on how to work around the safeguards her son put in place. They seemed to play on her wishes for independence and worked to create and escalate conflict between her and her son.

Our GKIS Connected Family Course can help you close screen risk gaps and improve family cooperation and closeness. If you have school-age children at home or love somebody who does, check it out. Not only does the course offer amazing safety home setup tips, but it helps parents create fun dialogues for better, healthier parent-child relationships.[4]

Government Impersonation Scams

William noticed that some of the scams his mom was involved with may be linked with others. For instance, to pay the taxes of her “prize,” the scammer would set Mrs. Thorn up to talk to an “IRS agent.” These types of scams are known as government impersonation scams which are types of very popular imposter scams. According to the FBI, government impersonation scams typically involve the scammer impersonating a government official who threatens to arrest or prosecute victims unless they pay a fee. William shared that they even tried to trick him with false threats of prosecution and arrest unless he agreed to cooperate.

Dr. Bennett shared that immigrants can easily be targeted with this type of scam as well. She shared a story of a colleague who was a Chinese immigrant who worked as a software engineer. This victim’s scammer posed as a member of the Chinese government and threatened the safety of her family if she didn’t pay overdue fines. The scammer demanded that she not tell her friends and family and immediately pay. She lost over $150,000 that was never recovered before she realized she’d been scammed.[4]

Phone Scams

William explains that although his mother’s scams initially started by mail, they soon turned into phone calls. He allowed me access to his mother’s journal which included notes on the people she spoke to and what they had asked her to do. Her notes reveal that she would talk to the same people over and over and eventually trusted them more than her own family and friends. The scammers were very persuasive and would instruct her how to wire funds to unfamiliar places and people, even going so far as giving her directions to wiring locations that her son had not blocked yet. William spent countless hours visiting banks, local wiring locations, and friends begging them to not help his mom transfer money or provide transportation. Although he spoke to his mom many times, he found that the scammers would get to her anyway with relentless pressure and creative arguments.

Scammers have no limits.

It was not until William caught his mom almost wire transferring $200,000 that he finally got the information he needed to gain conservatorship over Mrs. Thorn. By then, the scammers had even instructed her to how to send money from q reverse mortgage loan on her home to complete the transaction!

William said the scammers had no shame and would even help her find ways to continue participating in the scams even after he took steps to stop them. He shared that they would pressure her with false deadlines and threats, making her so anxious that she would rush into performing workaround instructions. Her journal reflects moments of intense anxiety as she tried to complete the complex transactions.

To emphasize how far scammers would go, he shared that, after he lowered his mom’s allowance to $25 a week and there was not much to get from her anymore, they still tried one last thing – the 976 phone scam. According to William, this is a scam where you call back a number with an area code of 976 and get charged a huge per-minute fee. The longer the scammer keeps the victim on the phone confused and anxious, the more money the scammer gets.

Avoid Being Next

William shared that his mom was scammed out of about $70,000 before it stopped. If it was not for her son’s compassionate and tireless commitment to protect her, it could have been far more. Other popular scams include shopping scams and job opportunity scams. If you are worried that bad actors can access your family members, check out our Screen Safety Toolkit. Our resource guide is perfect for those that need smart tech tools for filtering, monitoring, and management.

Tips to Outsmart the Scammers

  • Contact your phone carrier and internet service provider to research helpful tools for blocking unwanted and unknown calls, texts, and emails.
  • Remember, if it sounds too good to be true, it probably is.
  • Don’t act immediately, take a moment to research the situation and talk to someone who you trust.
  • Don’t give out personal information like your name, date of birth, social security number, address, or usernames or passwords. Legitimate organizations will not text, call, or email you to obtain private information.
  • Don’t complete forms from an email link. Instead, go directly to the website of the company you are dealing with and complete the business from there.
  • Call the company directly to confirm the request was legitimate before you offer information or complete forms. The IRS communicates through US mail, not by telephone or email. Call 800-366-4484 to report IRS-related phishing attempts and fraud.
  • Be sure to keep up with device updates for security patches, delete unused and unwanted apps, and change your passwords frequently.
  • Review your credit card statements regularly to catch unauthorized charges and periodically review your credit report.
  • Consider freezing your social security number for new financial transactions with Experian, Equifax, and TransUnion to escape identity theft.
  • Use your telephone services provider’s spam filters and add your phone number to the National Do Not Call Registry.
  • Lastly, Google “scams” or a quote from any communication that may be a scam to learn more about the common scams that may target you.

Scams are no joke. Once you become a victim, serious damage can occur that can take years and years to repair. Check out our other GKIS article Child Identity Theft is on the Rise. Protect Your Family Against Cybercrime, to learn more about how fraudulent purchases made with your private information can change your life

Here are some other related articles offered on our GKIS website for more information on hacking, scamming, malware, and phishing. Learn more about the dangers of online to be prepared for anything that comes your way.

Virtual Kidnapping, A Parent’s Worst Nightmare. How to Protect Yourself and Your Family.

Child Identity Theft is on the Rise. Protect Your Family Against Cybercrime

YouTube Celebrity Scams

Hackers Can Access Your Computer’s Webcam Without Your Knowledge

The Good, the Bad, the Ugly of Craigslist

Kids Commonly Contact Predators on Video Chat

If you are a victim of a scam, contact your local law enforcement and visit expert online resources such as

https://www.fbi.gov/scams-and-safety

https://www.fbi.gov/tips

https://www.fbi.gov/fbi-kids

https://www.identitytheft.gov/#/

https://www.missingkids.org/HOME

Thanks to CSUCI intern, Ashley Salazar for researching scams that are targeting the elder community and co-authoring this article.

I’m the mom psychologist who will help you GetKidsInternetSafe.

Onward to More Awesome Parenting,

Tracy S. Bennett, Ph.D.
Mom, Clinical Psychologist, CSUCI Adjunct Faculty
GetKidsInternetSafe.com

Works Cited

[1] O’ Brien, S. (2021) Tech-savvy teens falling prey to online scams faster than their grandparents. CNBC Personal Finance. https://www.cnbc.com/2021/08/10/tech-savvy-teens-falling-prey-to-online-scams-faster-than-their-grandparents.html

[2] FBI National Office. (2021) FBI Releases the Internet Crime Complaint Center 2020 Internet Crime Report, Including COVID-19 Scam Statistics. FBI.

https://www.fbi.gov/news/pressrel/press-releases/fbi-releases-the-internet-crime-complaint-center-2020-internet-crime-report-including-covid-19-scam-statistics#:~:text=The%20FBI’s%20Internet%20Crime%20Complaint,reported%20losses%20exceeding%20%244.2%20billion.

[3] Health 24. (2012) Why older people are more gullible. Health 24. https://www.news24.com/health24/Mental-Health/Brain/News/Why-older-people-are-more-gullible-20130210

[4] FBI (n.d.) Scams and Safety:  Elder Fraud. FBI. https://www.fbi.gov/scams-and-safety/common-scams-and-crimes/elder-fraud

Photos Credited

Photo by Danie Franco (https://unsplash.com/photos/l9I93gZKTG4)

Photo by Katt Yukawa (https://unsplash.com/photos/K0E6E0a0R3A)

Photo by Waldemar Brandt (https://unsplash.com/photos/MVxXlwspmcI)

Hackers Can Access Your Computer’s Webcam Without Your Knowledge

Imagine finding out that a cybercriminal has been recording you in your bedroom for months and can do anything with that footage. Or what if you turn on your computer to find that you can’t access anything unless you pay a ransom to a hacker. What if a predator could view and speak to your child through a camera in their bedroom? You can help protect your family from becoming victims of cyber-attacks and ensure peace of mind by referring to our Screen Safety Toolkit, a resource guide with our best recommendations, how-to information, and links to our favorite easy-to-use parental control systems. This article will detail the risks and worst-case scenarios of webcam hacking as well as provide tips to help ensure your cybersecurity and safety.

How do cybercriminals hack webcams?

Hacking requires a specialized skillset that is increasingly accessible for the average tech user. In the sub-world of black hat computer hacking (hacking tech with bad intent), accessing private webcams is considered fairly easy. Further, there are several different methods utilized by black hat hackers to gain access to and take control over a computer’s web camera.

Spyware

One of the prominent methods employed by hackers to gain access to private computer webcams is through the use of spy software and remote administration tools (RATs). Webcam spyware is a type of computer application or program that allows the user to remotely take control over another user’s webcam. This enables the hacker to see whatever or whoever is in front of the computer’s web camera.

An alarming feature of this software is that it often allows the user to remotely turn the hacked computer on. Turning a computer off when it’s not being used is not enough to protect users from being spied on.

Spyware can be installed in webcam attachments and hard-wired webcams. The hacker can control audio and microphones, camera angles, zoom features, and focus. They can also record the footage so they can blackmail the victim later. Surprisingly, webcam spyware is freely available for download on the internet and can be installed on most operating systems.[1]

Internet Connection

Another common method of webcam hacking involves the use of web cameras that rely on remote access through WiFi. A common example of this type of web camera includes wireless security devices such as the popular Ring video doorbell.

Unfortunately, while these devices are intended to provide security for the user, they can also provide black hat hackers access to your home. If a camera is connected to a home WiFi router, it is vulnerable to hacking, especially if proper precautions aren’t taken to secure it. To avoid this, it is important to set secure network passwords for home WiFi routers. The default factory setting login information for routers can be accessed by anyone who is willing to look up the manufacturer’s startup support webpage. Failing to change your default router login can leave your wireless security cameras open to malicious hackers.[1]

Trojan Viruses

Perhaps the easiest way for cybercriminals to hack into your computer’s webcam is through the use of a Trojan computer virus. A Trojan virus is a type of malware deliberately designed to cause damage by infecting and subsequently taking control over your device. It is aptly named after the famous ancient Greek war story of the Trojan Horse because it is an attack disguised as a gift.

Trojan viruses are so effective because people mistakenly infect their own devices with them by downloading software that they believe is safe. This typically occurs when visiting a website that invites you to download a seemingly innocent file that actually contains malware instead of Adobe flash reader. The malware then infects the device, allowing the creator of the virus to gain complete control and access to your webcam and private files without your knowledge.[1,2]

Worst-Case Scenarios

Cassidy Wolf, Miss Teen USA

One of the most famous cases detailing the devastation caused by webcam hacking involves former Miss Teen USA, Cassidy Wolf. In 2012, Cassidy Wolf opened an email that she had received from someone whom she did not know. She was horrified to discover an attachment within the email containing several nude photos of her that were taken in the privacy of her bedroom. The photos were taken via the webcam installed on her computer.

The hacker attempted to blackmail Wolf into engaging in sexual acts with him through her webcam. If she refused, he threatened to share the nude photos with her friends and family.

The hacker turned out to be one of Wolf’s former classmates, Jared James Abrahams, who had installed Blackshades malware onto her laptop. The FBI was able to identify Abrahams who had victimized up to 150 women in his sextortion scheme and was subsequently sentenced to 18 months in federal prison.[3]

This event coincided with an FBI crackdown that led to the arrests of over 100 cybercriminals who created and used Blackshades, an inexpensive and easily utilized remote access tool primarily designed to hack webcams to facilitate sextortion crime. Blackshades was available for a mere $40 and sadly, countless people were victimized by the cybercriminals who maliciously employed it. [3,4]

Ring Cameras

In 2019, a mother installed a Ring security camera in the bedroom of her 8-year-old daughter for extra security. In a disturbing exchange caught on video, the 8-year-old girl walked into her room hearing strange music playing from an unknown source. The music abruptly stopped, and a man’s voice was heard saying “hello there.” This strange man had live video access of the young girl and was able to verbally communicate with her, a feature deliberately programmed into the Ring security camera. The man repeatedly used racial slurs when speaking to the girl and over several minutes, tried to get her to do various things. There have been similar Ring camera hacking incidents in recent years.[5]

Steps to Protect Your Privacy and Boost Cybersecurity

Technology is a powerful tool and with the advent of virtual learning and Zoom conferences as a result of the COVID-19 pandemic, web cameras have become an essential part of our academic and professional lives. Cases of webcam hacking are obviously terrifying, but there are simple steps that you can take to protect yourself and your family from attacks by cybercriminals.

Use Software Updates

Keep up with computer and software update alerts. They often contain patches For Weak Spots (points of entry easily exploited by hackers).

Secure Your WiFi with Password Protection

Once you have installed your router, create a new secure password to deter cybercriminals from being able to easily hack your devices.

Avoid Suspicious Downloads

Hackers can access your devices by getting you to unknowingly install malware, like Trojan viruses, through random links and downloads. Never click on links from websites that require you to download a file or program in order to access their site. Also, avoid downloading attachments and opening links sent via email from people you do not know and trust.

Invest in Security Software

While there are free security software services available, investing in subscription software will provide better cybersecurity. Approach your cybersecurity with the same regard as you do for your home security. Good security software will help protect you by blocking malware that would potentially give hackers access to your devices.

Use Legitimate Tech Support

Be careful of who you allow access to your devices. When IT support is needed, only use trusted and reputable services. Avoid using freelance computer technicians. There have been instances where freelance technicians who were hired to fix devices have instead installed malware onto the client’s computers for nefarious purposes.

Install a Physical Webcam Cover

The most surefire way to ensure that cybercriminals are not spying on you through your device’s camera is to install a physical covering over the lens. When most web cameras are on, a light next to the lens turns on signaling that the camera is in use. However, hackers can disable this light, so relying on that alone is not enough to ensure your privacy. There are products available specifically designed as device camera coverings that attach to your devices right over the camera lens. The covering can be slid open when you want to use your camera and closed when you do not. You can also just simply cover your web camera lens with a post-it note or a piece of opaque tape.

GKIS Screen Safety Toolkit

Our Screen Safety Toolkit is an invaluable resource for providing you and your family with enhanced cybersecurity. Researching digital safety tools can be an overwhelming process. But thankfully, we’ve done the work for you! If you have screen-loving kids or teens, sound parenting strategies are not enough for fostering online safety. You also need smart tech tools for filtering, monitoring, and management. The GKIS Screen Safety Toolkit is a family-tested, outcome-based resource guide with our best recommendations, how-to information, and links to our favorite easy-to-use parental control systems.

GKIS Cyber Security Supplement

Our Cybersecurity & Red Flags Supplement is comprised of three helpful tools in one service. You can protect your family from hacking, scamming, malware, and phishing with our cybersecurity and best practices checklist. Our GKIS online safety red flags for kids & teens provides parents with Dr. Bennett’s clinical teaching list that will help parents educate their kids about red flags to be aware of and alert them to the tricks that are often employed by online predators and other cybercriminals. Additionally, our GKIS online safety red flags for parents will provide parents with Dr. Bennett’s clinical expertise, which she’s developed over 25+ years as a clinical psychologist, in identifying behavioral red flags that may signal your child is suffering from digital injury.

Other helpful GKIS resources

You can find more valuable information regarding screen safety in Dr. Bennett’s parenting guide, Screen Time in the Mean Time. Additionally, you can check out this article How Cybercriminals Steal Sensitive Data to learn more about the potential risks to your cybersecurity so that you can be better equipped to protect yourself and your family.

Thanks to CSUCI intern, Mackenzie Morrow for researching the dangers of webcam hacking as well as cybersecurity measures to prevent it and co-authoring this article.

I’m the mom psychologist who will help you GetKidsInternetSafe.

Onward to More Awesome Parenting,

Tracy S. Bennett, Ph.D.
Mom, Clinical Psychologist, CSUCI Adjunct Faculty
GetKidsInternetSafe.com

Works Cited

[1] Batt, S. (2020). How easy is it for someone to hack your webcam? Make Use Of. https://www.makeuseof.com/tag/how-easy-is-it-for-someone-to-hack-your-webcam/

[2] Johansen, A. (2020). What is a Trojan? Is it a virus or is it malware? Norton. https://us.norton.com/internetsecurity-malware-what-is-a-trojan.html

[3] Daily Mail. (2014). More than 90 people arrested in ‘creepware’ hacker sting as victim Miss Teen USA describes ‘terror’ at being watched through her webcam for a year. Daily Mail. https://www.dailymail.co.uk/news/article-2638874/More-90-people-nabbed-creepware-hacker-sting-victim-Miss-Teen-USA-describes-terror-watched-webcam-YEAR.html

[4] Cooper, A. (2014). CNN Anderson 360 Cassidy Wolf Miss Teen USA. CNN. https://www.youtube.com/watch?v=sc3nG87OYW8

[5] Chiu, A. (2019). She installed a Ring camera in her children’s room for ‘peace of mind.’ A hacker accessed it and harassed her 8-year-old daughter. The Washington Post. https://www.washingtonpost.com/nation/2019/12/12/she-installed-ring-camera-her-childrens-room-peace-mind-hacker-accessed-it-harassed-her-year-old-daughter/

Photos Credited

Photo by Nikita Belokhonav (https://www.pexels.com/photo/anonymous-hacker-with-on-laptop-in-white-room-5829726/)

Photo by cottonbro (https://www.pexels.com/photo/people-woman-coffee-laptop-6964510/)

Photo by cottonbro (https://www.pexels.com/photo/laptop-with-cyber-security-text-on-the-screen-5483240/)

How Cybercriminals Steal Sensitive Data

In last week’s GKIS article, “How Teens Overshare,” we covered the ways kids intentionally and unintentionally share location information on social media and how to prevent this safety risk. In today’s article, we detail how cybercriminals victimize teens and offer more helpful information on how to get your kids internet safe.

Cyberstalkers

Cyberstalkers are predators who track online information to extort or harass, create cybercrimes like hacking or identity theft, or intercept a victim offline. Cyberstalkers can be complete strangers or people your teen may already be acquainted with.

Hackers

Hackers are predators who steal usernames, passwords, and personal information to gain access to a victim’s screen device. Once they can access, they can still further data, change or destroy information, install malware, and even take over the device’s camera.[1]  Data can then be sold to other criminals on the dark web or be used for identity theft to take out loans and credit cards in your name.

Phishing

Phishing is a cybercrime in which a victim is contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data. Phishing can also occur through websites and social media.[2] Dr. Bennett notes in her book, Screen Time in the Mean Time that the sensitive information obtained by phishing is often used for online login information such as usernames and passwords, bank account and credit card information, and even identity theft.

The most common example of phishing is email phishing. To email phish, the cybercriminal creates a fake domain that looks trustworthy and legitimate, then sends emails to potential victims asking them to click a link, download an attachment, or “update” their passwords.

To prevent your child from falling victim to online phishing, encourage them to only open emails, online messages, and text messages from trusted individuals and advise them to never click on any links or download attachments from an unusual or suspicious-looking email or message.

Identity Theft

According to The United States Department of Justice, “Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain.”[5]

Cybercriminals often target younger individuals because children do not have bad credit (which is great for cybercriminals) and it is easy to keep it from being noticed until the child is older. In Dr. Bennett’s book, Screen Time in the Mean Time, she writes about a couple of children who were victims of identity theft.

Here are a few ways to protect your child from identity theft:

  • Install cybersecurity safeguards on phones, laptops, iPads, and any other device that need protection
  • Have family conversations about being wary of posting or sharing personal information online
  • Set up a virtual private network (VPN) to ensure the safety of your device(s)
  • Update passwords at least once a year and be sure that the new password does not include any information that may already be public such as, your teen’s name, age, pet’s name, or anything that could be easily guessed

Social Media Quizzes

Cybercriminals can also phish for information through social media by reviewing posts, asking questions, or offering an online quiz with targeted questions. Quiz questions to avoid include any that ask for your (or your mother’s) maiden name, your favorite color, the street you grew up on, your pets’ names, the first car you owned, or your best friend’s name.

The answers to these questions are often security answers on websites. With security information, personal accounts can be accessed for malicious intent. To prevent cybercrimes, ask your teen to refrain from taking online quizzes or you can encourage them to only take online quizzes from a legitimate source. Teaching your teen to withhold sharing personal information that could pose a security risk is vital to ensure their online safety.

Cyber Blackmail

Once a cybercriminal obtains sensitive information, they may use it to coerce a victim further. According to the BBC, “Cyber-blackmail is the act of threatening to share information about a person to the public, their friends or family unless a demand is met or money is paid.”[3] Cyber blackmail can take many forms and the cybercriminals who commit this crime use different tactics to take advantage of their victims.

Cybercriminals may even say that they have explicit photographs, access to their victim’s phone and computer’s webcam, or even recordings of them from their personal devices. Some of those claims may be true or false, but either way, the cybercriminal uses fear and shame to get what they want.[4]

To help prevent your teen from becoming a victim of cyber-blackmail;

  • advise them to never share sexual images of themselves (the images can end up anywhere)
  • advise them to not accept friend requests from strangers
  • advise them to be wary of things they post, share, or message others online (what they say can very well be used against them in the future)
  • require your teen to have private social media accounts

For more information and safety tips, we highly recommend parents to purchase our Cybersecurity & Red Flags Supplement. Dr. B created this tool because parents in her clinical and coaching practices frequently asked her to teach their kids the red flags that may alert them to the tricks of online predators, hate groups, and cyberbullies.  In this Supplement, she offers her clinical teaching list so you can educate your kids. Knowledge and assertiveness coaching are key elements of child resilience and good judgment online.

Also included in the supplement is Dr. B’s Online Safety Red Flags for Parents. This tool teaches parents what child behaviors to look for that may signal they are at risk – a tool she created from 25+ years of clinical practice. Being able to recognize behavioral red flags in your child may be the difference between stopping risk after one exposure versus not recognizing dangerous relationships and exposures until it’s too late.

Thanks to CSUCI intern, Remi Ali Khan for researching cybercrimes and cybersecurity for this article.

I’m the mom psychologist who will help you GetKidsInternetSafe.

Onward to More Awesome Parenting,

Tracy S. Bennett, Ph.D.
Mom, Clinical Psychologist, CSUCI Adjunct Faculty

Photo Credits

Photo by Gerd Altmann from Pixabay

Photo by B_A from Pixabay

Photo by Pixabay from Pexles

Photo by Tracy Leblanc

Works Cited

Bennett, T. (2017). Screen Time in the Mean Time: How to Get Kids and Teens Internet Safe.

Brant, E., & Butterly, A. (2013, September 20). Cyber-blackmail: How to keep safe and deal with it. BBC Newsbeat. http://www.bbc.co.uk/newsbeat/article/23724703/cyber-blackmail-how-to-keep-safe-and-deal-with-it.

Cyber Extortion: Ransomware vs Extortionware. Alpine Security. (2020, August 2). https://alpinesecurity.com/blog/cyber-extortion-ransomware-vs-extortionware/.

The Dangers of Hacking and What a Hacker. https://www.webroot.com/us/en/resources/tips-articles/computer-security-threats-hackers.

Identity Theft. The United States Department of Justice. (2017, February 7). https://www.justice.gov/criminal-fraud/identity-theft/identity-theft-and-identity-fraud.

KnowBe4. What Is Phishing? Phishing. https://www.phishing.org/what-is-phishing.

5G, the Internet of Things, and What it Means for Our Future of Privacy

The pandemic of 2020 has many of us working from home. For most of us, our internet must work quickly and efficiently to stay productive. The increasing demand for having reliable, quick internet coupled with new technology compatible with the internet has led to the creation of 5G, a new wireless internet connection. But many feel anxious about this new mobile network, wondering what impacts it may have on our health, privacy, and security. Learn all about 5G in today’s GKIS article.

What is 5G?

Introduced in 2019, 5G is the latest form of wireless internet connection. 5G will enhance internet connections and download speeds using “millimeter waves.” These waves are smaller and move faster than previously used 4G waves, allowing the space needed for the Internet of Things (IoT).

What is “IoT”?

IoT stands for the Internet of Things, which refers to wired and WiFi-connected home products that collect data about our daily behaviors. This data is then used to better target us for marketing, to improve services, and to make more efficient, informed decisions based on probability and statistics. Currently, we have 6.5 billion devices connected to the internet. It is estimated that by 2026, more than 75 billion devices will be connected to the internet generating $1.1 trillion a year.1

How will IoT be applied?

Consumer

Door locks, security cameras and monitors, home appliances, light fixtures, thermostats, smart televisions, smart refrigerators, media platforms, and voice-assisted digital assistants like Amazon’s Alexa, Apple’s Siri, Google’s Google Assistant, and Microsoft’s Cortana will have the capacity to sense, analyze, and act as well as deliver data to the corporation for analysis, storage, and sharing.

Commercial

IoT is being applied to many industries, including the healthcare and automobile industries through the use of video training, building automation, security robots, pacemakers, wireless infusion pumps, and vehicle to vehicle communication (V2V). In 2019, at the Mobile World Congress in Barcelona, Dr. Antonio de Lacy guided a team of doctors operating on a patient through a live video from the other side of town.2 The video is clear, in real-time, and with no delays.

Military

Drones, robots, surveillance, and wearable biometrics are being implemented for warfare.

Industrial

Industrial applications of IoT include statistical evaluations of big data from manufacturing robots and smart farming. One study estimates IoT will replace up to 800 million farmworkers by 2030.3 Vertical farms and warehouses can produce the exact amount according to demand, rather than a surplus, and without the expense of employing workers.4

Infrastructure

Barcelona has embraced the development of becoming a “smart city” through the use of IoT. The results appear to have a positive impact on their economy, resulting in a $50 million per year revenue on smart parking alone. They have decreased their costs in energy consumption by $37 million a year using self-regulating lights, as well as saving $58 million a year with “smart gardens” that water plants at the right place and the right time.5

Security, Privacy, and the Internet of Things

We are headed for a paradigm shift, where our physical belongings are increasingly becoming computer systems. What was first “internet security” will be “everything security.” Unfortunately, most IoT software being manufactured and marketed is poorly written, insecure, and in the hands of corporations. Although you may trust the corporation with your data, do you trust the hackers who can breach that corporation’s controls to get access to it?

Security just isn’t a pressing concern for corporations and consumers. As consumers, we want inexpensive devices that work. Having insecure appliances connected to the internet like a thermometer, which is normally intended to last a long time, is dangerously allowing hackers the opportunity of exploitation.6 You might be able to get away with leaving the front door of your home unlocked, but in the cyberworld, every door can be attacked. Security professionals and hackers alike use what is known as wardriving to locate and record WiFi networks using a GPS.7

Wardriving is a GPS used to locate vulnerable and unprotected WiFi from a car. Problems arise when hackers recover the WiFi password through other connected smart devices.8 Thermometers, baby monitors, smart toys, surveillance cameras, and vehicles have been hacked in the past.9 More recently, throughout this pandemic, video conferencing Zoom applications have been hacked and banned all around the world because of poor security.10 Steps towards securing the IoT will need to be regulated, rather than patching the software for security after-the-fact, like Zoom.

Thank you to GKIS intern Andrew Weissmann for researching and authoring this article. To learn how to increase the cybersecurity in your home and identify the red flags that suggest your child may be in danger from bad actors online, check out our GKIS Cybersecurity and Red Flags Supplement. For less than a cup of coffee, you can be more informed and assured your family has adopted the best cyber-safety practices.

I’m the mom psychologist who will help you GetKidsInternetSafe.

Onward to More Awesome Parenting,

Tracy S. Bennett, Ph.D.
Mom, Clinical Psychologist, CSUCI Adjunct Faculty
GetKidsInternetSafe.com

Work Cited

1 Securitytoday.com The IoT Rundown for 2020 Stats, Risks, and Solutions

2 Cnet.com 5G is still a little magic, a little smoke and mirrors

3 Career.du.edu University Denver How will the Internet of Things Affect your Job Prospects

4 Digital Trends Leafy greens are grown by machines at new, automated Silicon Valley farm

5 Datasmart.ash.harvard.edu

6 Nist.gov What is the Internet of Things (IoT) and How can we secure it?

7 Techterms.com Wardriving

8 Internet of Things Security Ken Munro

9  Finance-monthly.com The Worst and Weirdest IoT Hacks of All TImes

10 Techrepublic.com Who has banned Zoom? Google, NASA, and more

Photo Credits

Flickr- by 4timesfasttechnologies

Flickr- by Jefferson William

Flickr- by terrasphere

Flickr- by Rick Teremi

Flickr- by Mike Dent

Five Quick and Organization Hacks from a Screen Safety Parenting Expert


Now that I’m an “older” working mom, I love to share offline and online organization hacks and efficiency grabs that have saved me through the years. These organizational techniques were the difference between frazzled and peaceful at our house. With the overtasked lives we lead, most of us are guilty of brain fades and frantic searches while yelling and scolding overwhelmed kids. Even if you set up only one or two of these ideas, it may be the difference between fun family mornings versus a school day launched with tears and resentment.

Unclutter study spaces by setting up customized, distraction-free workspaces in niches and corners for each kid.

Kids in my practice often complain that the kitchen table is too distracting to get homework done quickly and neatly. The psychological research agrees. Studies reveal that fractured attention leads to irritability, wasted time, and poor grades. To optimize learning, set up a quiet corner office for each child. All it takes is a willingness and clever organization ideas and fresh accessories. Check out my GKIS Connected Family Online Course for a detailed blueprint for creating award-winning maker spaces with awesome Pinterest DIY ideas. A customized works station is a compelling magnet to get your kids creating in 3-dimensional space as a complement to screen learning. Ergonomic, body-healthy setups in the place of slouching on beds and couches avoid repetitive stress injuries to the neck, back, wrists, and hands.

Avoid missed soccer practices and study deadlines by setting up a digital family calendar.

Family schedules are chaos! Streamline communication and scheduling by color-coding child activities and setting up Family Share on Apple’s Family Calendar, Google’s Calendar, or Microsoft’s Outlook. Each member can share calendared activities and set up automatic reminders. Shared organization at a glance!

Just as you throw out old clothes your kids have grown out of, it’s also important to declutter digital spaces.

  • Schedule a fresh-start fall family meeting where everybody gathers with their mobile screen devices to trash apps and games they have grown out of.
  • Revisit (or grab) your free GKIS Connected Family Screen Agreement at GetKidsInternetSafe.com. This will help you set sensible rules like a digital curfew and create screen-free zones – including bedrooms and bathrooms.
  • Finally, teach cybersecurity measures from my Cybersecurity Red Flags Supplement. New this fall, you and your family members can tweak bad habits so don’t fall victim to bad actors online.

Cleanse social media profiles with an eye toward future reputation.

If your tween or teen is on social media already, you know the time-suck risks during school time. Help them sort out the necessary from the unnecessary by helping them avoid the bio-hack elements designed to capture their attention.

  • Consider limiting teens to only one or two social media apps to decrease wasted time due to mindless browsing and compulsive checking.
  • Insist that apps with visual notifications be on the second swipe screen on smartphones. That way they won’t get distracted by little red notifications and, instead, can batch their check-in times as research suggests is best.
  • Teach them how to recognize marketing techniques so they don’t get sucked into unnecessary buys using my How to Spot Marketing Red Flag Supplement.
  • And finally, delete old posted photos and unnecessary personal information from social media history. Sharing real-time with friends on a private profile is fun, but do you really want somebody lurking through your past photo-by-photo? Point out that other parents, relatives, teachers, coaches, future employers, and even college app administrators may be forming impressions based on your digital footprint. So instead of having an online resume populated by off-color jokes and sexualized photos, create a flattering stream of artistic works, philanthropic activities, sports activities, and fun friend and family time. A progressive, balanced, healthy life looks beautiful online – and may help you get a college placement or dream job instead of hinder it!

Reboot your Screen Safety Toolkit.

Each developmental stage offers unique online safety challenges. For example, little kids are best accommodated in a walled digital garden like YouTube Kids, and older kids need a little more digital space to explore and create. To parent well in the digital age, you need specially-selected free and third-party software tools to help you filter and block inappropriate content, set time-limits, monitor online activity use, remotely pause or offer rewards, and even locate and track the driving activities of your teen. If you get overwhelmed or need help figuring it all out, check out my GKIS Screen Safety Toolkit for tips, product recommendations, links to ISP and social media app safety guides, and free digital learning tools for best academic performance.

There you have it! Five quick and easy parenting hacks that will launch the school year with fun and success. Just as I recommend shoes live by the front door so you are not always searching, digital folders and organization tools will keep you dialed-in in your virtual life. Most importantly, set a peaceful intention with a six-second exhale for positivity and fun each morning before you enter the family’s living space. Parents must actively define the heart of the home. If we start the morning with a smile and warmth, our kids emotionally synch and return the joy. Soak in every chaotic and blissful moment!

I’m the mom psychologist who will help you GetKidsInternetSafe.

Onward to More Awesome Parenting,

Tracy S. Bennett, Ph.D.
Mom, Clinical Psychologist, CSUCI Adjunct Faculty
GetKidsInternetSafe.com

Also, if you are a local Southern Californian and need a little TLC to get started on your screen safety/fun parenting plan, join me for a morning of pampering and friendship.

Photo Credits

Photo by DESIGNECOLOGIST on Unsplash

Photo by Kari Shea on Unsplash

Photo by Jealous Weekends on Unsplash

Photo by Matheus Ferrero on Unsplash

Photo by John Schnobrich on Unsplash