If you wouldn't want your parents to see it .... ..... Don't send it.
“Sexting” is a term used to describe the sending of sexually explicit text or picture messages of minors by minors. What most young people do not realize is that the production, possession, and distribution of explicit photos of minors, even if they are self-produced, may be illegal. Furthermore, if these explicit photos end up on the Internet, children risk embarrassment and could jeopardize scholastic, athletic, and employment opportunities.
Teens sharing nude photos via cellphone is "sexting" but it’s happening on other devices and the Web too. The practice can have serious legal and psychological consequences, so – teens and adults – consider these tips!
It’s illegal: Don’t take or send nude or sexually suggestive photos of yourself or anyone else. If you do, even if they’re of yourself -- or if you pass along some other person's sexually explicit picture – you could be charged with producing or distributing child pornography. If you keep nude photos on your phone or computer, you could be charged with possession. If they go to someone in another state (and that happens really easily), it’s a federal felony. Complicating matters, it's likely that many youth, just like many adults, are not aware of the legal issues regarding sexual images of minors. Under many current criminal statutes, making, sending, or even possessing youth‐produced sexual images may be subject to more severe punishment than other forms of voluntary sexual behavior, even full sexual intercourse between teens. It seems that law enforcement concerns about the conduct of and impact on the youth involved in these incidents went beyond simple distinctions of whether or not the images constituted child pornography. Non-legal consequences: Emotional (and reputation) damage can come from having intimate photos of yourself go to a friend who can become an ex-friend and send it to everyone you know. Not only can embarrassing photos be sent around; they can be distributed and archived online for people to search for and see for decades, or forever. Not just on phones. Sexting can be done on any media-sharing device or technology – including email and the Web. Teens have been convicted for child porn distribution for emailing sexually explicit photos to each other. The bottom line: Stay alert when using digital media. People aren’t always who they seem to be, even in real life, and sometimes they change and do mean things. Critical thinking about what we upload, as well as download, is the best protection. Protecting your privacy: If a sexting photo arrives on your phone, first, do not send it to anyone else (that could be considered distribution of child pornography). Second: Talk to a parent or trusted adult. Tell them the full story so they know how to support you. And don’t freak out if that adult decides to talk with the parents of others involved – that could be the best way to keep everyone from getting into serious trouble. If the picture is from a friend or someone you know, then someone needs to tell him or her that sexting is against the law. You’re actually doing the friend a big favor because of the serious trouble that can happen if the police get involved. If the photos keep coming, the next step is to speak with your friend’s parents, school authorities or the police. Texts can be used to keep friends close, help parents figure out family logistics, and offer a wonderful way to share experiences. But, as with any powerful tool, texting can also be used to bully or humiliate people. An embarrassing or upsetting image or video can quickly be transmitted or uploaded to an online video sharing site like YouTube. ************************************ |
LINKS FOR MORE INFO:
http://www.safeteens.com/teen-sexting-tips/ http://www.commonsensemedia.org/advice-for-parents/responsible-text-messaging-tips http://www.netsmartz.org/CellPhones http://cdn.netsmartz.org/tipsheets/sexting.pdf http://www.us-cert.gov/reading_room/TIP10-105-01.pdf http://edu.learnit-teachit.org/technology/Online_Safety/ Link to videos on what hackers can do with passwords, identity, wireless networks and a lot more. Texting is the #2 use of cell phones -- after checking the time, and teens send an average of 3,146 texts per month.
(Nielsen, 2010)
Note to Teachers: Even when teens are aware of its illegality, some of the interpersonal appeal of image sharing may seem worth the risk. So although teaching young people about the potential legal and reputational consequences of youth‐produced images might deter some of this behavior, the problem may
be best handled as part of education and mentoring that allows young people to think in a complex way about their romantic and sexual relationships. Cyber-attacks: Cell phone defenses In 2009, countless cell phones unwittingly distributed the Sexy Space mobile worm as a legitimate, digitally signed application. This malware steals subscriber, device, and network information from victims and has the capability to build a botnet. It propagates via spam text messages that are sent from a compromised device to the victim’s contacts. The messages, exchanged at the expense of the victims, contain a link to a website hosting malicious applications that will infect the phone if executed. Currently, the Sexy Space mobile worm affects only certain mobile devices, not iPhones.
But the Apple App Store has over 100,000 applications and receives about 10,000 new submissions each week. Apple says it has received apps that will steal personal data or are otherwise malicious and has rejected them during the review process. But, as the volume of applications rises, it could be difficult to maintain high confidence in their integrity, regardless of the platform or policy. Not knowing about phone hackers and doing unsafe behaviors may be the most threatening vulnerabilities for mobile devices. It is critical to understand that a mobile device is no longer just a phone and cannot be treated as such. Unlike the previous generation of mobile phones, modern Internet-tethered mobile devices are susceptible to being probed, identified, and surreptitiously exploited by hackers from anywhere on the Internet. The following can help protect mobile devices: · Maintain up-to-date software, including operating systems and applications; · Install anti-virus software as it becomes available and maintain up-to-date signatures and engines; · Enable the personal identification number (PIN) or password to access the mobile device, if available; · Encrypt personal and sensitive data, when possible; · Disable features not currently in use such as Bluetooth, infrared, or Wi-Fi; · Set Bluetooth-enabled devices to non-discoverable to render them invisible to unauthenticated devices; · Use caution when opening email and text message attachments and clicking links; · Avoid opening files, clicking links, or calling numbers contained in unsolicited email or text messages; · Avoid joining unknown Wi-Fi networks; · Delete all information stored in a device prior to discarding it; and Anti-virus software exists for some mobile devices, which is one component of a layered defense. However, it can only assist in protecting against known threats. |