Picture This: Keep Your Kids Safe Online.

by | Aug 18, 2025 | Uncategorized | 0 comments

Copyright 2025, Steve Burgess

Yes, social media is fun. It helps to keep us in touch and stay in relationship with friends and loved ones. Even folks you haven’t seen or heard from in decades. And, as we all know, our kids are the most beautiful, creative, intelligent beings on the planet. And our grandkids even moreso!

So, of course, why wouldn’t we want to post pictures of these precious beings on our social media and to spread the joy we know of our progeny?

Unfortunately, there’s an answer as to why not. Even though the overwhelming majority of people are kind and caring, maybe one in a thousand is not. There are close to 6 billion people using the Internet. Do the math and even though it’s rare, that’s still a lot of crazies, and distance makes little difference in accessibility on the World Wide Web. And even though only a fraction of those are online predators, child safety advocates estimate there are about a half million predators online daily.

And now that I’ve ruined your day, here’s what’s worse (don’t’ worry, I’ll have some safety tips later).

Posting pictures often reveals background information, like addresses or environments. Certainly, posting pictures of birthday parties exposes birthdates. These are the kinds of things that open kids up to identity theft.

There are almost-free programs and apps that anyone can download to easily create deepfakes of pretty much anyone they have a photo of.

And worse, some of these are “nudifier” apps, that can take a picture and generate a nude image of the subject. While it may be illegal to post such photos, it’s legal to sell these kinds of apps, and there are nearly a hundred of them at this point in time.

Furthermore, if someone doesn’t post such images, they can still keep them to obsess over. Like I said, the sickos are rare, but they exist.

Posting on something like FaceBook or Instagram, even if it’s just to your friend or family group, doesn’t in any way guarantee that someone in that group won’t innocently post the pictures themselves. Or have their account scraped by the daily fake friend requesters.

When you broadcast on social media, you may inadvertently be broadcasting to The World. And The World includes some of those crazies.

So, what to do?

There are a couple of simple ways to protect your kids from people stealing, sharing, and altering likenesses of your kids.

One way is to keep pictures of your kids and grandkids, especially the smallest ones, offline. You can retroactively do so, by combing through your own social media accounts and removing them.

Also, it can be pretty safe to share your family and birthday pictures privately. Many messaging apps are encrypted end-to-end, so that may be one of the best ways to send them just to your family members or groups.

As a digital forensic practitioner, it’s sad when we have to investigate these kinds of cases as a part of our work.

So, keep your kids safe and keep their pictures offline. The Internet is not private.

Related Posts

Two Factor Authentication Fraud

Two Factor Authentication Fraud - copyright Steve Burgess, 2025 One of the better ways to protect yourself from online fraud is Two-Factor Authentication (2FA). This scheme is also known as 2-Step (or dual-step) Verification or Authentication, or Multi-Factor...

AI and Elder Abuse

AI and Elder Abuse, copyright 20025, Steve Burgess The news is full of AI (Artificial Intelligence) stories. How will it empower us in our jobs? Whose job will it take next? Is it creating actual fake news?  While there’s a lot of “we’ll see” in the answers to these...

Email spoofing, scamming, and hacking

Email spoofing, scamming, and hacking, Copyright 2024 by Steve Burgess Email domain spoofing scams With fortunes, privacy, and identity fraud at stake, we have had a number of cases involving phishing and spoofing in the past few years and into the present where...

AT&T Data Breach and Hack: What Does it Mean to Me?

AT&T Data Breach and Hack: What Does it Mean to Me? copyright 2024, Steven Burgess It was ginormous. It included almost all wireless customers from 2022. Did you have an AT&T phone or other account in 2022? You’re one of 110 million (gasp). You be hacked, my...

Somebody deleted stuff off my phone (I swear it wasn’t me!). Can I get it back?

- Copyright Steve Burgess 2024 Your phone is suddenly losing text, videos, photos. What’s happening? Are they gone forever? Have I been hacked? How do I avoid this in the future? What’s happening? Of course, it’s hard to tell without some history of the phone’s use,...

CSI Cases from Burgess Forensics #69 A Case of Hiphop Beef

The Stories are true; the names and places have been changed to protect the potentially guilty. It was almost closing time on Friday and my thoughts were turning to Barbequeing some of that mouth-watering Santa Maria tri-tip while my nose was turned to the scent of...

Email as a signed contract vs. fraudulent emails

Email as a signed contract vs. fraudulent emails We all send and receive email, but did you know that what you say in an email can be interpreted as a legal contract? And that sometimes, emails are fraudulent? Both are true. The Statute of Frauds Although email didn’t...

El Salvador Adopts BitCoin

El Salvador Adopts BitCoin copyright Steve Burgess, 2021 El Salvador just passed a law to make BitCoin (BTC) legal tender and is the first country to do so. It did something similar back in 2001, when it made the US Dollar the official currency, replacing the...

Keeping Your Bitcoin Safe

BitCoin. Everybody wants some. But what’s the best way to keep it safe once you’ve got it? And how to get it? First things first – you get BitCoin (and Etherium, and DogeCoin) from a cryptocurrency exchange, like you would from a “regular” currency exchange to turn...

Cyberbullying and Covid-19: 2021 Update

California defines a cyberbully as anyone who sends any online communication to deliberately frighten, embarrass, harass, or otherwise target another. The Cyberbullying Research Center defines it as “willful and repeated harm inflicted through the use of computers,...

Pin It on Pinterest

Share This