Watch Webinar

10 Major Threats to Student Online Safety, and
How You Can Avoid Them

Read the Transcript

0:57 (Marissa Naab from Lightspeed Systems)

Looks like we’ve got, um, a lot of people who have joined, so, we’re going to go ahead and get started. Hello, and thank you for joining us today. My name is Marissa Naab. I am on the webinar Team at Lightspeed Systems. And I have the privileged to be the facilitator for today’s discussion. We will be talking about some of the biggest threats to student online safety during distance and remote learning. And we’ll walk you through some strategies that you can immediately implement within your district to safeguard your students from some of these threats. 

1:34 

Before we get started, just a couple of quick housekeeping notes. At the end of this session, we will be taking some time to answer your attendee questions. So, if you have any questions about anything that’s discussed, please feel free to put your question in the chat box. And we will make sure that our panelists have a chance to answer that. Additionally, we are recording this session, and we will be sending it out to everyone once we wrap. So, If you would like to share this with some of your team members or view the discussion later, you will be able to. 

Without further ado, I am thrilled to introduce our esteemed speaker Detective Rich Wistocki. Rich, would you like to share a little bit about yourself? 

2:49 (Rich Wistocki)

Morning, good afternoon, everyone. My name is Detective Rich Wistocki. I’ve been a police officer for 30 years, my, last few years. 22 years, actually, I retired in 2018 after I did a Ted Talk on why parents should monitor kids technology. 

3:10 

So you can look at me and the Ted-x library, and what my teaching is, is that I spent 22 years investigating computer crime, whether it’s hacking swatting, cyberbullying, computer tampering, sexting, sextortion. 

3:29 

In my career I’ve arrested over 300 internet predators, and I belong to something called an Internet Crimes Against Children. 

3:37 

I CAC, you should all write that down. 

3:40 

ICAC. 

3:41 

There are 61 … throughout the United States. We are run by the Department of Justice and our clearing house of information is the National Center for Missing and Exploited Children. 

3:54 

So that’s going to be very important to all of you, because we’re going to talk about mandated reporting, and we’re going to talk about that gray area, what if it’s something like grooming or exploitation, what do I, as a teacher, a principal, a Dean, and Administrator, what do I do with that information? We’re going to show you exactly what to do and what happens to that information. 4:55 

5:25 

So, basically, um, what I teach parents throughout the country is that I have my own company called Be Sure Consulting dot com. Be Sure Consulting dot com. 

5:39 

And what I do is schools hire me throughout the country to teach faculty, parents, Elementary, junior, high, and high school, OK. 

5:51 

So, what I’m about to tell you, administrators, is that what, what we’re going to discuss doesn’t happen somewhere else. 

6:01 

So let me give you a little stat before. 

6:05 

I was in 25 schools, from Washington, to Oregon, to New York, to Florida, to Oklahoma, to Texas. 

6:13 

Out of those 25 schools, I was at, I had 16 students come forward indicating that they were being victimized mostly from sextortion from someone in the school. 

6:28 

Because 60% of this extortionists are someone your students go to school with, 40% of them are someone that they met on a social network or gaming platform.  

6:38 

So, these things that we’re going through right now, ladies and gentlemen, doesn’t happen somewhere else. It happens everywhere, and those 16 students are only the ones that came forward. 

6:48 

Imagine how many more they’re out there and we need to start out by another stat. 

6:55 

The average internet predator can have up to 250 victims in their lifetime. 

7:03 

So, let me put this in perspective for you. 

7:05 

So, a student comes to your dean and says, this is happening to me. 

7:11 

When they say this is happening to me, it’s probably happening to 10, 20, 30 other kids all over the world. 

7:18 

So, by then coming forward and reporting it to you at Lightspeed and I can show you exactly what to do with that information, how we’re going to talk about how to get the information, what to do with the information, and being able to find out who this person is. 

7:33 

When I talk to parents, there’s two things that I tell parents. 

7:38 

Number one, and sometimes, I make a joke, like, you’re not going to want to hear this. And if you want to walk out on my presentation, this is a good time to do that because I’m about to tell you something that you may not want to hear. So here we go. 

7:52 

All of you parents right here, right now in this webinar, or in person, are responsible for your children. 

8:01 

There I said it, and they laugh. 

8:05 

And I tell them you’re not only responsible for their food, clothing, shelter, and education, you are responsible for their technology as well. 

8:13 

I don’t care if who bought them that new iPhone 12 for their birthday. 

8:19 

They don’t own it. 

8:21 

The parent allows them to have it. 

8:24 

They own nothing until they’re 18. 

8:29 

The second premise that I teach parents, and some administrators may have a problem with this, but it’s a proven medical fact. 

8:37 

Ladies and gentlemen, that’s the frontal cortex of our children’s decision-making brain is not developed enough to handle what goes on in social networks. 

8:46 

So there is no such thing as privacy for children. 

8:53 

None. 

8:54 

Can I get an amen right now, Yes. 

8:55 

Chat me up it, yeah, So what happens is, is that parents get so caught up and their kids run the roosts with the technology. 

9:05 

And I train parents. I have to reprogram parents saying, no, you are the adult. 

9:11 

And who’s responsible for when things go sideways? 

9:14 

You are. 

9:15 

So parents need to sit with their kids to understand what technology they’re using. Do you have to sit with them? 

9:23 

And when it comes to a school device, whose device is it? 

9:28 

It’s yours, it’s the school’s device by having monitoring software filtering software that actually works. 

9:36 

It’s such a protection of liability for the school, you see when you turn alerts on, and you, and due to Lightspeed, Artificial intelligence, or AI, and the habits of what these kids are doing. You can be alerted as well as the parents. 

9:54 

I’ve that a lot of software, OK. 

9:57 

Lightspeed is the only one that I know of that has a parent portal. 

10:02 

Parents, you put that responsibility back on the parents to show them exactly what their kid is doing over the past week, two weeks, whatever, and sign them up for alerts. 

10:13 

So, we’re going to show you exactly what you need to be doing. If, in case you get into alerts and you have alerts set up, but this is how we protect our kids. 

10:22 

And we do that by knowing what they’re going into, what we should filter, and what we shouldn’t, and what their technology talk looks like when it comes to training the parents. 

10:33 

So, one of the biggest, two of the biggest, I was just having a discussion with a parent today on Facebook, my Facebook is Cyber Safe Schools online. 

10:45 

And I was having a conversation with a parent who’s nine-year-old had a school device, and the filtering was so bad, they allowed OmegleLightspeed doesn’t allow Omegle. 

10:56 

Omegle is, is mimicked after something called Chatroulette, where you just go to the site and bam. You’re talking to someone from all over the world. 

11:06 

About 7 or 8 years ago, college students would play drinking games. That if somebody came up on the screen naked, they would have to do a shot. 

11:15 

But now, younger, because of online learning, are junior high kids in high school kids have learned about Omegle. 

11:24 

And when they just go to the site, bam, every minute, it switches, it switches, it switches, and there are a lot of predators there that try to get your kids to talk to them. 

11:36 

Of course, another thing is Tik Tok. I encourage all parents to see what videos that their kids are posting on Tik Tok. 

11:45 

Again, very young kids are using these two platforms. They’re very harmful, and there’s exploitation. 

11:55 

So, what I want to do real quick, guys, is that I want to do an exercise with all of you. 

12:01 

So what I want you to do is, I want all of you. There’s 124 people in this room now. 

12:06 

I would like you to go to your Android phone, or your iPhone, and go to your Google Play, or go to your App store right now. So go ahead and take out your phone. Go ahead, I’ll give you a second. Take out your phone. 

12:21 

What I want you to do is that I want you to type in there into the search bar of your Google Play or your App Store, Hide my pictures, or hide my videos. 

12:35 

Go ahead and type it in there right now. 

You’re going to see 10 or 12 different apps that allow your kids to hide pictures and videos. They don’t want you, the school administration, or their parents to see. 

13:09 

These are called vaults, and they keep these pictures and videos, so you can’t see them or find them. 

13:15 

The most commonly used one is the calculator app. 

13:20 

It looks like a calculator, and it works like a calculator. If I put 1 plus 1 equals, it’ll give me two. 

13:28 

But when you hit the password and the default password, when it’s set up, is dot 1 2 3, 4 dot, and then you have to have it AC. It’ll open up the file folder. 

13:39 

Well, there are two things that they added in 2020, these Vault companies. They added the shake feature. 

13:47 

If you shake the phone, it’ll delete it off the app. So if a parents come, they’re like, Oh, crap. Shake it, and it’s gone. 

13:54 

If a parent has the phone and there’s more than three attempts, it’ll delete the app because somebody’s snooping. 

14:00 

Again, these vaults are designed to let our kids hide things from their parents and school officials. 

14:10 

So how do I know if my son or daughter has this? 

14:13 

Well, pretty easy. 

14:16 

No kid needs two calculators, OK? 

14:19 

So if they have to calculators that look the same, one of them is probably a vault time to investigate. And Snapchat is so fantastic. 

14:29 

Ladies and gentlemen, they have their own vault called my eyes only. 

14:35 

So there are many parents who think that they’re all up in their kids’ technology, but they have no idea where they’re hiding things. 

14:42 

So, if you have Snapchat on your phone right now, administrators, go ahead and go to your Snapchat. 

14:48 

And hit the deck of cards next to the Snap button. 

14:52 

When you hit that, this is going to come up, OK? If you have my eyes only in there, and this pad shows up, that means that that student or your child has already been hiding things, and they’re Snapchat. So, they don’t want anybody to see it. 

15:09 

But, when it comes to my eyes only on Snapchat, please understand. 

15:13 

They’re hiding things that they don’t want you to see. 

15:16 

And I’ve had several cases in my career when it came to my eyes only 11 year olds making their own child porn because they’re being sextorted. 

15:26 

Again, the new thing when it comes pass sextortion now, is something, is, is suicide. 

15:35 

Kids and adults are finding power, and they, they feel euphoric. 

15:42 

If they can make another kid killed themselves. And over the past two years, I’ve had three cases. Where the other child that they were friends with, convince the other kid to kill themselves. Again, it’s a thing now, we have to watch out for that. 

15:57 

When it comes to YouTube, there are something called Trolls out there. 

16:21 

So what, what happens is there something called Trolls out there, OK? And when we talk about trolls, these are people who want to make people feel bad about themselves. 

16:35 

When it comes to YouTube, sometimes these trolls are creating YouTube pages that mimic real YouTube pages and what’s going on is in the middle of like baby shark, right? 

16:49 

They will put something in there called them Momo Challenge or the Blue Whale Challenge and the 

16:55 

challenges this creepy Asian type of character that it says now that you’ve seen Momo, Momo, Momo‘s gonna kill you. 

17:05 

And this is what comes up in front of six year olds, four year olds, and what do you think they’re going to see and say? More challenges tries to get kids to give you an example to turn the gas off. 

17:19 

Blow out the pilot on the stove, and turn the gas on when parents are sleeping, or taking a fork or a pen, and sticking in the in the wall sock. 

17:27 

And if they don’t do that, the kids think that Momo was going to come and kill them. 

17:31 

When it comes to the Blue Whale challenge, these are suicidal things that whoever this Troll created, it’s a game. If you don’t do this, you have to kill yourself. 

17:41 

Or someone else is going to be killed. 

17:43 

So, again, guys, in Lightspeed, they filter out a lot of the YouTube stuff, but when it comes to parents, do they know about this stuff. 

17:53 

And you as educators, need to know that there’s trolls making fake YouTube accounts to make our students feel bad about themselves. 

18:03 

So a lot of times, I tell our kids that I teach, I teach across the country. 

18:09 

If you don’t know the person’s first name, last name, where do they go to school their phone number and where they live? 

18:16 

If you haven’t personally, confirm that information, you shouldn’t be giving out information. 

18:24 

And everyone else online is a liar. If you cannot confirm what this person is saying to you. 

18:31 

So in order for me to give your students tools, I give them red flags. And here’s one of them. 

18:40 

In order for our kids, your kids, not to be victimized by an online predator, who is, like, say, you know, 20, 30, 40, 50 years old. I go to kids. 

18:52 

I said, OK, You’ve been gaming. When someone, let’s say on Minecraft, for two months, every day after school, you’re making these sick kingdoms underground fortresses, you’re doing this. You’re doing that. 

19:04 

And all of a sudden, their friend, you’ve known for two months, a chairman, a great time with, asks you to go to Whatsapp, OK, which is a messaging site. 

19:16 

The first red flag I give students is that when someone tries to take you off your gaming platform to go to a private chat, they are not who they say they are. 

19:24 

Because if you had something to say to me, why not say it on the game, right, why do I have to go over there? Well, here’s why. 

19:30 

The National Center for Missing Exploited Children deals with a program that is in every single gaming platform in the United States. 

19:43 

Social networking in the United States and Cloud Services in the United States that they look for images of child pornography and they watch for grooming conversations that adults could be having with children. When someone, when one of these companies, let’s say Snapchat picks up on this chat. 

20:03 

They report it to the National Center Missing Exploited Children, as called a Cyber tip. 

20:10 

Then what happens is, they do a background with the IP, the phone number, and everything on the suspect. 

20:16 

Then they send it to 1 of 5000 detective’s, like myself. 

20:20 

in the Internet Crimes Against Children, Task Force – ICAP right? There are 61 … Task Force across United States. 

20:27 

There’s 5000 people like me that this is all they do is child exploitation online. 

20:34 

So, what we do is we get that case from National Center and we have all the information who this person is and we go after that person. So let’s back up a little bit. 

20:44 

How do we teach our children not even to go there and give them tools not to be victimized? Here we go, this is part of what I tell them. 

20:52 

I ask them how many of you have a webcam on your laptop or your Chromebook? 

20:56 

They raised their hand 

20:58 

How many of you have a webcam on your gaming computer at home? They raised their hand. How many of you have a webcam on your cell phone? They all raised their hand. 

21:10 

And how many of you have a web a webcam on your iPad or your tablet and some of them raised their hand 

21:20 

So, what I tell them, what parents need to do, is, that, they need to, if the kid says, OK, you want information with me. You want to continue our relationship with parent permission. Hey, let’s go to webcam. 

21:36 

The three things a predator will say, a true predator will say, well, they will say number one. Oh, I don’t have one of those. 

21:43 

What do you mean? Every kid’s got access to a webcam? What do you mean? 

21:47 

You don’t have one of those? Predator. 

21:49 

Or they’ll say, I don’t have enough bandwidth to go on a webcam. Bandwidth? Bandwidth, all the Wi-Fi go and I was just like AOL time. No. Predator. 

21:59 

Or they’ll say, sure, let’s go to Skype so we can see each other. 

22:04 

So then they’ll go to Skype. 

22:06 

Your student can hear them, but it’s kind of fuzzy. 

22:10 

So what the predator does is that they put scotch tape over the camp. 

22:15 

So it’s fuzzy, but you can hear each other, but they can’t see you to know that they’re predators, older predator. 

22:21 

So these are the tools we need to be giving our kids and our parents to show them how not to be victimized. 

22:28 

Another thing that some of our kids are getting into is the dark net, and that’s basically just downloading the Tor Mozilla browser. 

22:38 

Tor stands for the Onion router. 

22:41 

What I tell parents is that if your child has this green globe on their desktop or their tray on the bottom, they’re going to the dark that. 

22:49 

And what happens in the dark net is that they can buy drugs. 

22:53 

All kinds of drugs: weed, cocaine, heroin. 

22:59 

The biggest thing they buy is Xanax on the Tor, they can buy guns, they can buy knives and they can even buy people for all that matters. 

23:07 

So what the dark net does it anonymizes is their IP, so they can’t be traced. 

23:12 

So if you see this green globe on some of these devices, ladies and gentlemen, I don’t see any great reason for a teenager to be in the dark net. 

23:24 

So let’s talk a little bit about Sextortions. 

23:26 

So remember that friend I had for two months playing and playing in Minecraft. and then they went to WhatsApp. 

23:35 

And then what happens is, is that friend says, we’ve been friends for so long, two months. We’ve been friends for so long. 

23:43 

Do you want to see what I really look like? 

23:44 

And your student is going to say, Sure, no problem. 

23:49 

And then what happens is, they send them a picture, video, 1 or 2, that are of themselves partially naked or naked, but it’s not really them. They got it from someone else. 

24:01 

The common denominator, ladies and gentlemen, in every … 

24:05 

case I’ve ever investigated, was this is going to be tied to your student. 

24:12 

Now that I sent you this and that your student says, Oh, it’s like that, is it? Now you owe me one pic. 

24:20 

That’s it. 

24:21 

You owe me one pic, that’s the common denominator of every case I’ve ever worked and I have arrested over 106 sources. When I go to students and junior high and high school, I asked them how many of you received you owe me one pic. 

24:36 

I can have the student body raising their hand. 

24:40 

Yes, because remember, 60% of the suspects who are doing the sextortion is someone that kid is going to school with. 

24:49 

40% of them are someone they met on a gaming platform or their social network. 

24:57 

So when they sent you only one packet for not training our kids to do what that means, our students are like. 

25:07 

Well, I guess there’s some Internet law when they send me stuff, I have to send me some something back just like that. I’ll send them a little shot 

25:15 

Three days later. 

25:19 

That person, who was our friends for so long, two months, says, hey, how do you like your new Instagram account I made with your picture on it. 

25:27 

I’m gonna send this to all your teachers, your coaches, in your family, and your church if you don’t make me videos every week. 

25:34 

So your students like, oh, my God. This is what I thought I was gonna go to my parents, and if we’re not teaching parents how to have a technology talking to God. If you ever do this. If you ever do that, you’re gonna be grounded. I’m taking. 

25:47 

We cannot threaten into compliance, our children. 

25:51 

When you do that, are they going to come to you? And the answer is no, they won’t. 

25:56 

They’re just gonna go do what they think is right, so they don’t get in trouble, and that thing doesn’t get out. 

26:01 

So our kids are thinking, OK, oh my god, I thought it was just given one video, and he’s going to leave me alone. 

26:09 

It’s never one video, it’s never one picture. It’ll continue continue, continue with your student until they cannot handle it anymore. 

26:15 

This is sextortion. 

26:17 

And I talk about it specifically in the Ted Talk. 

26:20 

And there’s a video done by the National Center for Missing and Exploited Children that shows you exactly how it happens. 

26:27 

So when we talk about cyberbullying and some of the trends between K through 12, again, some of your IT people know that it’s increased 67%, especially with online learning. 

26:39 

Some of these other stats, 25% say this really happens frequently at their school, saying, probably increase this school year they’re thinking. 

26:49 

And IT professionals, bullying, in general, is happening more at their school than it did five years ago. Yes, because more and more kids, especially because a Covid are plugged in and they’re going into social networks and gaming platforms.  

27:01 

This is the reasons why we need to be training our students, our parents, and your faculty, on what to do in case this happens, that might take you there. 

27:12 

And, again, this, there’s a big thing right now about suicide. 

27:17 

I can’t tell you enough. 

27:19 

My mantra, through my whole presentation, when I’m in schools, is no one has the right to make you feel bad about yourself, or to make you do something you know, you shouldn’t be doing if they’re doing this you right now. 

27:33 

When it comes to gaming and social networking sites, no one online is anonymous. 

27:38 

We can find out who they are and make it stop immediately, but there’s some things you need to collect for me. 

27:46 

So, again, a lot of the things that we’re talking about, and this is why it’s so important to have alerts functioning for your school. We talk about leakage. 

27:58 

Over the past 20 years, every single school shooter has posted their leakage, and leakage is what they wanted to do when they wanted to do it before the act has happened. 

28:13 

But the problem is twofold. 

28:16 

School administrators don’t know what to do with the information, and that they dismiss it. 

28:21 

You try to report it to law enforcement, and the FBI doesn’t handle things with kids, but if your local law enforcement doesn’t have computer technology training on what to do, something called exigent circumstance, that’s what happened in Parkland. They didn’t know what to do. 

28:39 

They didn’t follow up with what was going on, I got through three quarters of the action plan of the after action of Parkland, and I couldn’t even finish it. 

28:48 

I was so upset because it is a simple process, now I teach, I’m the cyber trainer for the National Association of School Resource Officers. 

28:58 

This year I’m going to conferences all over the country teaching my class intercepting school violence through leakage, intercepting school violence, or leakage. 

29:13 

And I show them how to find out who this person is within hours executing search warrants and getting that kid to a safe place. 

29:22 

OK, so please understand that there is a protocol set up, according to the Federal Law, Electronic Communications Privacy Act that law enforcement has to find out who’s making these threats right away. And a lot of law enforcement agencies do not know this even exists. 

29:40 

When we talk about cyber stalking, this law throughout the country is usually the same. 

29:46 

Basically, why? What it says is, there has to be two or more occasions and there’s a threat of harm. If it happens on two or more occasions, then that’s a felony. 

29:55 

It’s really serious and we can find out who the person is doing that to them, OK, So, how does schools prevent student online safety threats? How do we make our kids safe? 

30:07 

Well, you’re doing it now through Lightspeed, but you have to turn on those alerts, and if you need training on what to do when you get these alerts, you contact Lightspeed. Well, they’ll arrange for me to train your people. 

30:21 

So, what if the activity is online, and not in person? 

30:26 

So, what happens here? I want to describe to described what a Cyber tip is. 

30:32 

All of your people are mandated reporters, right? 

30:36 

So if their sexual abuse or physical abuse, you have to report it to your department, children, family service. Well, what if it’s in that gray area? It’s happening online. 

30:44 

And you really do. There’s been some grooming, but there hasn’t been. 

30:48 

This is where you send your parents, so go ahead and take a picture of this. 

30:51 

The cyber tip line dot com, WWW dot cyber tip line dot com. 

30:57 

You call, you go to this website, and then you fill out all the information. They will do the background investigation, assign that case to 1 to 5000 people, like myself, and we will investigate that. 

31:10 

So you have covered it. 

31:11 

So, what about harmful apps? 

31:14 

You know, we talked about Omegle, and we talked about YouTube, there are a lot of blocking things. And if you’re seeing stuff like, say, something called Amino, which is far for alternative kids. 

31:26 

Let Lightspeed know, and they can add that to their block list. It’s simple, but it’ll send alerts when their kid goes there. It’s simple to do that. 

31:35 

So let’s get into nuts and bolts. I have two minutes or three minutes left. 

31:40 

So what happens in your school? 

31:43 

Well, you have to ask yourself this question, does it fit a crime? 

31:47 

Such as the crimes we talked about. If it does, these are the steps you have to take. 

31:52 

First, takes screen captures of everything of the chat of the profiles, what she said, what he said, this is what you’re telling the parent and the child to do. 

32:02 

Take screen captures for everything. 

32:04 

Get the user ID if we don’t have the right user ID, ladies and gentlemen, we can’t do the case, for example, in Facebook, there can be any name on a Facebook page, you can take a screen capture of it, but that is not the user ID. 

32:18 

You have to go up into the URL. 

32:20 

It says Facebook dot com forward slash, the user ID and Facebook is going to be a name, dot, name, dot number. Could be a name, dot name, could be just a number, all the way up to the question mark and I’m going to show you some other things. Other user IDs and other platforms. 

32:37 

A lot of school administrators, and even law enforcement makes this mistake. 

32:41 

If you’re gonna call the police, and you want us to find out who this person is, it’s really easy to do. 

32:48 

Do not go to the abuse section of that gaming platform, or social network first, before you come to us, and here’s why. 

32:57 

If you go to them and report it is the Terms of Service, they can be a terms of service violation. 

33:02 

They may delete everything, and then when we go send a preservation search warrant or a subpoena on that account, what are we going to get back? 

33:12 

Nothing because you had a deleted already before we were able to do anything. So if you’re gonna report to the police, do not report it to the social network. 

33:21 

I want your student to type up a start to finish incident where they were, my gamer tag is this, their gamer tag is this. 

33:31 

And then what happens is they took me over to Whatsapp and from Whatsapp. 

33:36 

We went to Kick, whatever it is, I need details typed up, print it out, I need everything I’m telling you, put on a flash drive, print it up and put it on a flash drive. 

33:46 

When you call the police, and not only one flash drive to flash drives, keep it for backup, because sometimes cops blue stuff. So keep one for backup. So you say, here, Officer, here’s all the evidence in this case, and I’m like, Wow, you got this on here, and I can just copy and paste this in my report. Beautiful! We want to make it as easy as possible for police officers to take this police report. 

34:09 

Now, teachers, when I teach faculty across the country, I make sure they understand this one thing. 

34:19 

When you have your personal Instagram, Snapchat, and Facebooks, you must keep them private, and never, ever, 

34:27 

Never, ever allow students or their parents to be part of your own personal network. 

34:35 

You must be diligent in doing that. 

34:37 

If you need one for your students, make a separate one for your students. 

34:41 

Because look, the one time that kid fails your class, that parent is going to go into your personal stuff of you at someone’s Bachelor Party, Bachelorette Party, or Christmas Party. And they’re going to present all those videos. Have you drinking swearing and whatever else you’re doing, dancing on tables to the school board, and you’re gonna lose your job. 

35:02 

We are in the middle of cancel culture. 

35:05 

We have to be able to watch and monitor, and be careful what we’re posting, professionally. 

35:12 

So, the fact of the matter is, ladies and gentlemen, you guys are the administrators. You should have an acceptable use policy for your teachers and staff. 

35:24 

And they should, they should sign off on it, so they know exactly what they should and shouldn’t be doing. 

35:34 

So, I wanted to show you, if you wanted me to come to your school, I created a program called Cyber Parenting dash 101 dot com, this is an online class for parents that they can say. 

35:50 

Court systems, judges, will. 

35:52 

If there’s a kid in the court system, they will order the parents to take Cyber Parenting 101 to train them on what to do. These are small snippets of videos, and not only that. 

36:02 

Along with this, I have school curriculum that goes for elementary, junior, high, and high school with quizzes and tests, Also faculty training and parent training that’s in English and in Spanish. 

36:17 

So you can get all the training you want for the entire year, for your school. 

36:23 

So, how do you communicate with parents? Keep them involved. 

36:26 

Send them e-mails, allow them to have access to their kids alerts, and by bringing us in your schools, either virtually or in person to train your faculty, to train your parents, to train your students, to keep them safe. You will reduce your liabilities because you are giving them the tools how not to be victimized. 

36:47 

Keeping them informed information is key. 

36:51 

So, let’s recap, and some of the things we talked about: how do predators get your kids, some of the apps that hide pictures and videos called vaults, harmful videos make sure on YouTube, make sure it’s the real YouTube channel go through it with your kid’s webcams to make sure that they’re not talking to predators with parent permission. Access to the dark net and sextortion is huge, and I refer you to my ted Talk for that. 

37:18 

Cyber bullying and suicide is a big thing. 

37:21 

Harm to others members, that leakage, if you say I’m just going to shoot up the school library, I’ve gone to school, you must not dismiss it. 

37:29 

Make sure you have acceptable use policies for your teachers, so they don’t get in trouble, and understand when it comes to our laws. 

37:37 

And when it comes to investigating Social networks and gaming platform, no one online is anonymous, and we can find out who they are. Thank you very much everybody. I’m going to turn it over to Rob Chambers, and he’s going to take over from here. Thanks, Rob. 

37:52 

Thanks, Detective Rich Wistocki. Appreciate that. Couple of things. 

37:58 

Just remind everybody, we will have a time for questions at the end of this, so please go ahead and enter those questions into the GoToMeeting control panel. 

38:12 

Lightspeed’s mission, as you see here on the screen, ties in very well with, with the topic we’ve just been discussing. 

38:19 

Our mission is to provide an online learning safety environment for every student, and we worked very hard to do that. As you can see, we’re, we’re providing these services to more schools than any other provider across the US. 

38:35 

Lightspeed is probably most commonly known for the filtering product, but there is a full suite of tools that are involved in keeping your kids safe. 

38:44 

And, so I’m going to highlight those kinda quickly here, and I know we’ll want to save some time for questions, so I will wrap this up quickly. But, you know, starting with the filter. 

38:54 

Again, this is the kind of starting point and the base point for protecting those students. 

39:00 

Keeping them, keeping your students to CIPA compliant on the school devices, keeping them off the websites and the content that they shouldn’t be going to. 

39:12 

No. It really gets into some more advanced features. Detector Wistocki, 

39:15 

You talked about some of the things that are going on with YouTube. We’re seeing a significant increase in YouTube this year, and with schools, and dealing with the remote and hybrid learning. 

39:27 

And YouTube provides a lot of good tools, but it also comes with some challenges. 

39:32 

We’ve spent a lot of time over the years building out this solution to make YouTube work very effectively and easily environment in your environment. 

39:39 

Basically, simply by turning on the feature, we call SmartPlay, you’re going to block the bad, you’re gonna get the good. Then that kind of middle ground of distracting, you can turn on or off for various groups of students, or at different times of the day, or that kind of thing. But makes it turns YouTube into a very large unmanageable situation into something that’s very easy to manage. 

40:02 

Parents are important part of this today, especially, again, with, with hybrid and remote learning. 

40:07 

You know, the parents are are engaged with the students, they’re seeing, you know, what’s going on and they’re having questions for you. 

40:15 

The Parent Portal and the parent reports that are in our system and allow you to engage with your parent community and make them part of the solution here. 

40:24 

Providing, you know, weekly reports, as you see on the screen. 

40:27 

Also, through the, the use of the Parent Portal, 

40:30 

The ability to give you a sense of control over those devices, maybe, you know, for the next hour, they want to shut off the school devices, or, even, you know, they want to shut them off overnight. And these work in conjunction with your rules, they want overwrite the things that are going on during the normal school day, but it does engage your parent community and give them some access to what’s going on. 

40:53 

Lightspeed Alert. This is a feature that is in our filter. And, you know, many of you are, I think, probably using this today, as, I looked over the people that are going to be here. 

41:03 

But, if you’re not, what this does is, this is more than just search query monitoring or search terms. 

41:12 

This looks at the traffic that the student is doing. What are they searching for? What are they typing in a Google Doc? 

41:20 

Even if they type it and delete it, the system will capture that. 

41:25 

Produce screenshots and context. 

41:27 

So, you can see, not only what did they type, but what other websites, what are the things where they visiting, make it very easy for somebody outside of the IT department to read and take action, and help and provide intervention for that student when that’s necessary. 

41:45 

Online, you know, monitoring. So things like, you know, monitoring these same things within Microsoft Teams. So, no matter what device they’re on, you’re using these online collaborating tools. All of this is now integrated into the Alert product 

42:00 

with real-time notifications: You know, visibility, you know, where some of the learning environments that we’re in today, we’ve lost some of that day-to-day interaction with students. 

42:12 

And, the Alert product can give you some insight back into that and get that out to your counselors, your School Safety, School Resource Officers, whoever they might be 

42:22 

Again, help, can help get that student to help they need, and not, not just have it go, kind of in a mystery state now. 

42:33 

Analytics is another part of that product suite and I wanted to highlight it because as I, as I listened to the detectives presentation, you know, it makes me think, as I work with a lot of schools, and we roll out the Analytics tool. 

42:47 

One of the things that they always find surprising, is the number of applications that they didn’t know were in use. 

42:55 

And, you know, we kind of heard some of that in the presentation about these kinds of things that are out there and are they in use in your environment. 

43:05 

Wit Analytics, because it, it ties in with that technology that we use for the web filter. And we can see all of that traffic in every app and website and everything that’s in use. 

43:15 

We produce those in, some very easy to read reports for you. 

43:18 

And you can see very quickly, what apps are the students using? 

43:22 

And I have not yet worked with a school that rolled this out that didn’t get some surprises and have apps that they didn’t think were in use in their environment. 

43:30 

Let me give you that ability to know, you know, how that’s being used, where that’s being used as it is it being used safely, and according to your compliance terms. 

43:39 

So, I know we need to make some time for questions, so, I am going to kind of just wrap this up. And just, you know, briefly, it is the filter, the alerting tools. But also, you know, remember the mobile device management, ensuring the right security settings are on the device. 

43:55 

The right apps and the right applications are there and classroom management, you know, so that teachers can see what’s going on in, in real time and help manage that class. So, this whole suite comes together to provide that level of protection. 

44:10 

And with that, Marissa, I will turn it back to you. 

44:17 

Alright, thank you, Rob, and, thank you so much, rich, for both of your really valuable insights. Really appreciate it, so, we are going to jump to questions. 

44:31 

OK, this first question is for Bob. 

44:39 

How do Lightspeed YouTube controls differ from YouTube’s restricted mode? 

44:45 

That’s an excellent question. So, thank you. So, YouTube’s restricted mode is, was one of Google’s YouTube attempts to solve this problem. 

44:56 

Um, but there are few challenges with that. 

44:59 

One is that if your students are not logged in to the Google services, then they’re outside of that restricted mode. So it makes it difficult to add new content in, to make it easily to view. 

45:12 

One of the things that we do with our SmartPlay feature is, if you think about a teacher who’s maybe generating content for their class to view no remote learning or hybrid learning situation, they upload that into YouTube. It may not be accessible in restricted mode. 

45:29 

With SmartPlay, the school can easily trust these teachers 

45:34 

Channel, as soon as that video gets uploadedit’s accessible to the students, even if they’re not directly log into YouTube, but they’re on their school device, the filters protecting them. 

45:43 

So it saves IT time. It saves the teacher time, and all of that’s automatic and transparent. It saves class time and removes those hassles. 

45:53 

Awesome. Thank you. 

45:55 

I got one for a Rich: should my district work with the police department regarding situations when we get alerts for students having suicidal thoughts? 

46:07 

Now, let me I want I want to tell a story real quick, if I can. So I taught at a Catholic school outside of Chicago last year, and I show the kids what evidence to collect like I showed you. The kid came into his principal and said. 

46:21 

I was gaming online last night and my friend says I’m never going to play with him again because he’s going to kill himself tomorrow. 

46:27 

So, he came in, to this school and said that, and the teacher called me, the principal called me and says, what do I do? So, where’s the kid live, he says, he lives in this jurisdictionYou’re going to have to call the police. 

46:38 

So, they call the police officer, young guy comes in, young officer comes in, and his, he was told what happened, and his first comment was, what do you want me to do? 

46:48 

And the principal says, you’re the police and me and he goes, we had a detective who does cybercrime that you can find out who this kid is within hours. So, the problem is, is that a lot of these police officers don’t have the training. 

47:05 

So, what I do, in cases like that, so, they had me come in and talk to the resource officers, I have a 15 minute roll call training, then I give to police officers to know what to do, and what the, what the process is there. So, I had to call the state’s attorney, and they said, we’re getting on it. 

47:26 

So, states or any call the chief Commander Investigations there, cybercrime guy did it, and the kid was in the hospital because they weighed it. 

47:37 

So, there’s something called exigent Circumstance. 

47:40 

And if you go to my website, I have a hidden page on my website for law enforcement, that they can download these forms and get them right away. 

47:48 

So, by me, training, your staff by me training virtually, or in person: doesn’t matter, and inviting the police department to come that solves at all, or we can do it virtually like this. And by doing an exigent circumstance form, they can find out who the kid is within hours. If there’s a death threat that goes to your dashboard exigent circumstance. If there’s a threat of a shooting exigent circumstance, whenever death or great bodily harm is about to be committed. 

48:17 

The Electronic Communications Privacy Act allows us to send that form. And we get the information right away. 

48:26 

Thank you. 

48:28 

This next question is, for the both of you actually. Teachers can only do so much. How do we get parents involved and keeping students safe online, while they’re learning at home? 

48:42 

Go ahead, Rob, you know, from our side, I think that’s where the Parent Portal and the parent reports can really help, because now you’re sharing that information with the community directly. 

48:53 

You’re giving them some, some management tools and really helping to engage them in the process. I think, you know, a lot of times, I think back to when I was with my school, you know, the parents might think, well, that’s the school’s thing. And, I I don’t touch it. But, by utilizing the Parent Portal, the parent reports, you can really get them engaged and be part of that process. 

49:15 

And, this is the real reason why I created cyber parenting dash 101 dot com. 

49:20 

When you go to cyber parenting dash 101 dot com, you’ll see school curriculum, you hit the green button on top, and it’ll take you to all the different. 

49:29 

There are snippets of video for the parents, and it’s in English and in Spanish. And for faculty, we go through, again, snippets of video, there anywhere from 5 to 20 minutes each. 

49:40 

And then, for the kids elementary, junior high, and high school, specific, after they watch a video, there’s a quiz. So, like, my resource officers all over the country, no longer do they have to do PowerPoints anymore. They just sign into our platform. And they press play, hand out the test, they have a classroom discussion. 

49:57 

If you don’t have SROs in your schools, then you, your health teachers, can do the same thing. 

50:07 

This one is for Rob, how can we tell if students are using the dangerous apps Detective Wistocki talked about? Right. So, that’s where the nalytics, and the Lightspeed Analytics part of the suite, can really come in. 

50:22 

And what you do when you roll that out, again, because, you know, every app that we see on a device, make some sort of internet connection today. 

50:31 

You know, detecting, we’ll start talking about the calculator app and using it in a bad way, but, you know, I’ve got a calculator on my app, Still checks for updates, even though it’s, you know, doesn’t, really, shouldn’t really need to check to the internet to do anything. So, you have that across just about every app on your device. 

50:49 

When that happens, Lightspeed, the software and the Analytics is gonna pick that up and then share that in the report. And so, you’re gonna see, you know, you grouped together: here’s the apps I paid for, here’s the apps I expect my teachers and students to be using, and then here’s the list of, let’s call them rogue apps. Yes, we didn’t plan on the apps we didn’t know about. And all that’s going to be covered for you and displayed in the Analytics tool. 

51:15 

And, again, when I’ve worked with schools, I haven’t found one yet, that wasn’t surprised when they see the number of rogue apps and things that they did not. And, you know, it’s not always bad things. 

51:25 

It’s just things that they didn’t expect to be in use and, and it really will help uncover that. So whether it is these, these apps or any other apps that are in use for the environment, the analytics will give you that that information. 

51:38 

Yeah. Awesome, thank you. 

51:41 

This one’s for you as well, Rob. 

51:44 

When we get an alert, what do we do with it? What does it look like for us? 

51:51 

Sure, that, so, no, I think, you know, I haven’t come across school yet. 

52:02 

That has not had some sort of an intervention response team. Let’s say, you know, student safety response team, policy action, plan already in place. 

52:11 

And what I’d recommend is you, you integrate those alerts into that. 

52:15 

They are designed to be very easy to read. And, again, this takes it kind of out of the realm of IT, having to decipher that. 

52:22 

And with, you know, the screenshots, the context, whether the websites, what exactly did they search for, on what site, 

52:30 

And giving you that information. 

52:31 

That can be shared outside of that IT technical community, into those people that already are probably part of that action plan, that response team. By delivering those alerts directly to them, the software has a feature, we call admin roles. So you can set them up. 

52:46 

So they get just those safety alerts, and they don’t have to interact with the filter or any other tools in the system, and you can give them that information in real time, and they can take that action immediately. 

52:57 

One other thing I want to add to that, Rob, is that, we have created a online, a free, online diversion program, called Juvenile Justice, online dot org. 

53:09 

So if you do catch these kids making threat cyberbullying, you can give them an online diversion and schools. 

53:15 

I have 3000 people across the United States using Juvenile Justice online ticket aversions to kids, students, so you don’t expel them, or suspend them because of like an Illinois we have SB 100, where you can’t expel and suspend. So they use Juvenile Justice online for that restorative justice type of diversion program. 

53:34 

Excellent, thank you. 

53:36 

Yeah, thanks for it. 

53:38 

We have time for one last question. If we were unable to get to your question during this Q and A session, we will be happy to follow up with you later. 

53:50 

OK, so this question is for Rich, it says, as educators, what do we do if we find out a student has been in contact with an online predator? 

54:01 

So, going back to the slide that I had, again, and he could even go back to my Ted Talk in the training, you definitely have to collect evidence, OK? So you have to take screenshots of everything. 

54:16 

Make sure the chat of the profile’s print all that out. 

54:21 

Get the user ID. 

54:22 

The user ID is so important for law enforcement, because that’s how we track people, and then you want to have your student type up exactly what happened to start to finish. And by no means if you’re going to contact law enforcement, do not contact that social network because they’ll delete it. 

54:41 

And then when we go give subpoenas and search warrants, it’s going to be no records found, and we’d lost and we can’t find them. 

54:47 

But if someone reports it to your staff, just remember, the average internet predator has 250 victims. Your student is one of many and this person needs to be caught. 

55:01 

Yeah. 

55:03 

All right. Well, thank you so much for that. 

55:07 

This concludes our webinar today. Thank you, Detective Wistocki, and thank you, Rob, for joining us and providing your valuable insights, and thank you, everyone. Thank you to everyone who joined for taking the time out of your day. I know you’ve got really busy schedule. So we appreciate you joining us this morning to learn about these threats and how to strategize to avoid them in the future. 

55:32 

If you’d like to join our next webinar, it will be Wednesday, February 10th, it’s about how to increase the efficacy of your synchronous and asynchronous learning environments. The contact information for Detective Wistocki is here if you’d like to learn more about his online courses. 

55:54 

If you’d like to learn more about Lightspeed and how to increase student online safety, just let us know in the survey at the end of the webinar, and we would be happy to reach out to you. 

56:05 

Have a wonderful day, everyone, and we look forward to seeing you at the next webinar. Thank you so much, bye. Thank you, everyone.

screenshots on desktop and mobile devices for distance learning software

Here's a demo, on us

Still doing your research?
Let us help! Schedule a free demo with one of our product experts to get all of your questions answered quickly.

man sitting at desk on laptop looking at Lightspeed Filter dashboard

Welcome back!

Looking for pricing information for our solutions?
Let us know about your district’s requirements and we’ll be happy to build a custom quote.

Reimagine the inspired and interactive classroom for remote, hybrid, and in-person learning. Lightspeed Classroom Management™ gives teachers real-time visibility and control of their students’ digital workspaces and online activity.

  • Ensure all students interact with only the right online curriculum — precisely when they’re supposed to use it.
  • Push out vetted curriculum links to all students at the same time.
  • Block inappropriate or distracting web sites and apps.

Ensure scalable & efficient learning device management. The Lightspeed Mobile Device Management™ system ensures safe and secure management of student learning resources with real-time visibility and reporting essential for effective distance learning.

  • A centralized, cloud-based solution for infinitely scalable device, application, and policy controls
  • Self-Service App Library, where teachers and students
    can access and install approved curriculum and learning tools
  • Remotely deploy, change, and revoke hundreds of policies and educational applications, while reducing typical downtime and costs

Prevent suicides, cyberbullying, and schoolviolence. Lightspeed Alert™ supports district administrators and selected personnel with advanced AI to detect and report potential threats before it’s too late.

  • Human review
  • Real-time alerts that flag signs of a potential threat
  • Intervene quickly before an incident occurs.
  • Activity logs provide visibility into online activity before and after a flagged event

Protect students from harmful online content. Lightspeed Filter™ is the best-in-class solution that acts as a solid barrier to inappropriate or illicit online content to ensure students’ online safety 24/7.

  • Powered by the most comprehensive database in the industry built through 20 years of web indexing and machine learning.
  • Ensure CIPA compliance
  • Block millions of inappropriate, harmful, and unknown sites, images, and video including YouTube
  • Keep parents informed with the Lightspeed Parent Portal™

Gain complete visibility into students’ online learning. Lightspeed Analytics™ gives districts robust data on the effectiveness of any tools they implement so they can take a strategic approach to their technology stack and streamline reporting.

  • Track education technology adoption and usage trends, eliminate redundancy, and drive ROI
  • Monitor app and content consumption to facilitate early adoption and effective utilization
  • Assess risk with visibility into student data privacy and security compliance