<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" >

<channel><title><![CDATA[AI Literacy | Academic & Career Success - Safety First]]></title><link><![CDATA[https://www.black-liberation.tech/safety-first]]></link><description><![CDATA[Safety First]]></description><pubDate>Fri, 13 Mar 2026 15:47:33 -0700</pubDate><generator>Weebly</generator><item><title><![CDATA[S3.2 - Owning Your Digital Space]]></title><link><![CDATA[https://www.black-liberation.tech/safety-first/s32-owning-your-digital-space]]></link><comments><![CDATA[https://www.black-liberation.tech/safety-first/s32-owning-your-digital-space#comments]]></comments><pubDate>Sun, 03 Aug 2025 19:16:53 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.black-liberation.tech/safety-first/s32-owning-your-digital-space</guid><description><![CDATA[    A Puerto Rican UX researcher leads a workshop for mothers and their teenage daughters on "Protected Access: Owning Your Digital Space." The diverse group, with a variety of hairstyles and backgrounds, sits around a table with laptops open, bathed in natural light from the large windows.   Scene: Multimedia Center, After-School Recreation Center&#8203;The room is filled with soft chatter, posters of tech careers on the walls, and a big screen displaying the words: &ldquo;Protected Access: Own [...] ]]></description><content:encoded><![CDATA[<div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0px;margin-right:0px;text-align:center"> <a> <img src="https://www.black-liberation.tech/uploads/1/1/0/7/110733105/gemini-generated-image-c7wo31c7wo31c7wo_orig.png" alt="A group of diverse teenage girls and their mothers, with a mix of African-American, Afro-Latina, and Latina backgrounds, sit around a white table. Laptops are open in front of them. The group is listening to a Puerto Rican woman with a short hairstyle, who is gesturing as she speaks. A screen behind them displays "Protected Access: Owning Your Digital Space." The room is bright with natural sunlight coming through large windows. The women and girls have different hairstyles, including an asymmetric bob, afros, locs, braids, and colorful streaks." style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%">A Puerto Rican UX researcher leads a workshop for mothers and their teenage daughters on "Protected Access: Owning Your Digital Space." The diverse group, with a variety of hairstyles and backgrounds, sits around a table with laptops open, bathed in natural light from the large windows.</div> </div></div>  <div class="paragraph"><strong><font color="#2a2a2a">Scene: Multimedia Center, After-School Recreation Center<br />&#8203;</font></strong><font color="#2a2a2a">The room is filled with soft chatter, posters of tech careers on the walls, and a big screen displaying the words: <strong>&ldquo;Protected Access: Owning Your Digital Space&rdquo;</strong>. Nicole Bakula sits in a circle with the girls and their mothers, laptops and tablets open on the table.</font><br /><br /><font color="#2a2a2a"><strong>Nicole:</strong> <em>(smiling, adjusting her seat)</em> Hey, buenas tardes, everyone. I&rsquo;m so happy to be here with you all. So, today, I want to talk about something that&rsquo;s big for me&hellip; like really big. Access to technology is amazing, right? But, for me&hellip; it&rsquo;s all about <strong>protected access</strong>. Because you can give somebody a computer, a phone, a connection&mdash;but if it&rsquo;s not safe? That access can get messy, fast.</font><br /><br /><font color="#2a2a2a"><strong>Celia:</strong> <em>(leaning forward)</em> What do you mean by &ldquo;protected&rdquo;? Like, passwords?</font><br /><br /><font color="#2a2a2a"><strong>Nicole:</strong> Passwords, s&iacute;&hellip; but also more than that. I work in privacy. My job is kind of funny&mdash;sometimes I joke that we researchers &ldquo;stalk&rdquo; people, but in a good way&mdash;we want to know what apps you love, why you love them. But we also <strong>protect</strong> you. Like, I don&rsquo;t just collect data, I guard it. And at home, I have this little thing&mdash;a Raspberry Pi&mdash;it blocks trackers, ads, all that noise. Makes me feel at ease. Like, okay, I&rsquo;m in control of my space.</font><br /><br /><font color="#2a2a2a"><strong>Esperanza:</strong> <em>(nodding)</em> My phone&rsquo;s always full of random ads. Like, I just say something out loud, and boom&mdash;I see it on Instagram.</font><br /><br /><font color="#2a2a2a"><strong>Nicole:</strong> <em>(laughs knowingly)</em> Oh, girl, that&rsquo;s real. That&rsquo;s why protected access matters. We can love tech, but tech doesn&rsquo;t always love us back, you know?</font><br /><br /><font color="#2a2a2a"><strong>Nina (mother):</strong> I try to watch what my daughter does online, but sometimes I feel like I&rsquo;m behind. They click on things so fast&hellip; I don&rsquo;t know what&rsquo;s safe anymore.</font><br /><br /><font color="#2a2a2a"><strong>Nicole:</strong> Nina, you&rsquo;re not alone. It&rsquo;s hard. That&rsquo;s why we gotta have these talks, because protection is teamwork. Like, Esperanza, let&rsquo;s say you&rsquo;re clicking on that ad&mdash;what do you think it wants from you?</font><br /><br /><font color="#2a2a2a"><strong>Esperanza:</strong> My money&hellip; or my info.</font><br /><br /><font color="#2a2a2a"><strong>Nicole:</strong> Exactly. And once your info is out there, you don&rsquo;t always control it. That&rsquo;s the part that makes me wary. So I set limits&mdash;I barely use social media. Not because I hate it&hellip; but because I want <strong>choice</strong> in what I share, when I share it.</font><br /><br /><font color="#2a2a2a"><strong>Assata:</strong> But what if I wanna post my poem online? I want people to read it, but not steal it.</font><br /><br /><font color="#2a2a2a"><strong>Nicole:</strong> I love that question. That&rsquo;s where protected access gives you <strong>power</strong>, not just tech. You can:</font><ul><li><font color="#2a2a2a">Post it with a watermark or copyright note.</font></li><li><font color="#2a2a2a">Use sites that give you control over who sees it.</font></li><li><font color="#2a2a2a">And double-check what info you give those sites first.</font></li></ul><br /><font color="#2a2a2a"><strong>Ruby (mother):</strong> My biggest fear is someone pretending to be them online. Like catfishing. It&rsquo;s scary.</font><br /><br /><font color="#2a2a2a"><strong>Nicole:</strong> Yup, that&rsquo;s real too. It&rsquo;s not just hackers&mdash;it&rsquo;s people misusing what we share. That&rsquo;s why I tell every girl I mentor: before you click, before you post, ask yourself:<br />1&#65039;&#8419; <strong>Do I control where this goes?</strong><br />2&#65039;&#8419; <strong>Do I trust who&rsquo;s on the other side of the screen?</strong><br />If the answer is no, maybe keep it close until you&rsquo;re sure.</font><br /><br /><font color="#2a2a2a"><strong>Frida (mother):</strong> My daughter loves drawing and wants to start an online art page. But I don&rsquo;t know what&rsquo;s safe for a 12-year-old.</font><br /><br /><font color="#2a2a2a"><strong>Nicole:</strong> Frida, I&rsquo;d say you two can set up <strong>layers of safety</strong>&mdash;like training wheels:</font><ul><li><font color="#2a2a2a">Use a parent-monitored account.</font></li><li><font color="#2a2a2a">Only post art, no personal info.</font></li><li><font color="#2a2a2a">Keep comments off until you&rsquo;re ready.<br />It&rsquo;s not about saying no, it&rsquo;s about saying <strong>yes&hellip; but safely.</strong></font></li></ul> <font color="#2a2a2a"><strong>Mar&iacute;a (mother):</strong> I wish schools taught more of this. My daughter knows coding but not privacy.</font><br /><br /><font color="#2a2a2a"><strong>Nicole:</strong> <em>(nodding passionately)</em> That&rsquo;s why I do this work. Giving access is not enough&mdash;we need <strong>protected</strong> access, where kids can dream big, learn big, and stay safe. Because you all deserve a future online that&rsquo;s wide open&mdash;but not wide open to harm.</font><br /><br /><font color="#2a2a2a"><strong>Erykah (mother):</strong> I like that&hellip; access with protection. Feels like teaching them to swim with a lifeguard there.</font><br /><br /><font color="#2a2a2a"><strong>Nicole:</strong> Exactly. The internet is a big ocean. I just want to make sure every one of you has a life jacket, a map, and someone watching your back while you swim.</font><br /><br /><em><font color="#2a2a2a">&#8203;(The girls exchange glances, nodding. A sense of mutual understanding fills the room as mothers and daughters begin sharing small &ldquo;safety pledges&rdquo; they&rsquo;ll try at home&mdash;like checking privacy settings together or pausing before clicking &ldquo;post.&rdquo;)</font></em></div>  <div id="498707146744089484"><div><style type="text/css">	#element-79ee96b7-2166-4c5d-a4e0-f0e959833cb1 .colored-box-content {  clear: both;  float: left;  width: 100%;  -moz-box-sizing: border-box;  -webkit-box-sizing: border-box;  -ms-box-sizing: border-box;  box-sizing: border-box;  background-color: #ae40a5;  padding-top: 20px;  padding-bottom: 20px;  padding-left: 20px;  padding-right: 20px;  -webkit-border-top-left-radius: 0px;  -moz-border-top-left-radius: 0px;  border-top-left-radius: 0px;  -webkit-border-top-right-radius: 0px;  -moz-border-top-right-radius: 0px;  border-top-right-radius: 0px;  -webkit-border-bottom-left-radius: 0px;  -moz-border-bottom-left-radius: 0px;  border-bottom-left-radius: 0px;  -webkit-border-bottom-right-radius: 0px;  -moz-border-bottom-right-radius: 0px;  border-bottom-right-radius: 0px;}</style><div id="element-79ee96b7-2166-4c5d-a4e0-f0e959833cb1" data-platform-element-id="848857247979793891-1.0.1" class="platform-element-contents">	<div class="colored-box">    <div class="colored-box-content">        <div style="width: auto"><div></div><div class="paragraph"><strong><font color="#fdfcfc" size="5">Reflect &amp; Write: Guarding Your Digital Space</font></strong><br /><font color="#fdfcfc"><strong>Instructions:</strong> Read the prompts below and write your thoughts in your journal or digital notes. If you&rsquo;re working with your mom or guardian, take turns answering and then share your ideas with each other.</font><ol><li><font color="#fdfcfc"><strong>Your Digital Door:&nbsp;</strong>Think of your online space like your home. Who are you letting in when you accept &ldquo;cookies&rdquo; on a website? How could you control who comes through that &ldquo;door&rdquo;?</font></li><li><font color="#fdfcfc"><strong>Eyes and Ears in Your Space:&nbsp;</strong>Many devices (phones, laptops, Alexa, Google Home) have cameras or microphones. How do you feel about them being &ldquo;always on&rdquo;? What steps could you take to guard your privacy?</font></li><li><font color="#fdfcfc"><strong>Location Sharing Choices:&nbsp;</strong>Some apps ask for your location. Which apps <em>truly need</em> your location to work? Which ones might be tracking more than necessary? How can you limit access?</font></li><li><font color="#fdfcfc"><strong>Cookie Settings Check:&nbsp;</strong>When a website asks you to accept &ldquo;all cookies,&rdquo; what do you think that means? How could you take a moment to review or reject certain cookies to keep your data safe?</font></li><li><font color="#fdfcfc"><strong>Unwanted Listeners:&nbsp;</strong>Imagine you&rsquo;re having a private conversation at home, but a device is listening. How would you know if this is happening? What settings could you change to stop it?</font></li><li><font color="#fdfcfc"><strong>Guarding Your Camera:&nbsp;</strong>How do you make sure your camera isn&rsquo;t used without your permission? Write down at least two actions you can take (ex. camera covers, turning it off, adjusting settings).</font></li><li><font color="#fdfcfc"><strong>App Permissions Audit:&nbsp;</strong>Pick one app you use daily. What permissions does it have (camera, mic, contacts, photos, videos, location)? Are you comfortable with all of them? Which ones would you change?</font></li><li><font color="#fdfcfc"><strong>Sharing with Care:&nbsp;</strong>Before posting something online, imagine if strangers could see your home, school, or neighborhood from that post. What can you do to guard your space and keep your location private?</font></li><li><font color="#fdfcfc"><strong>Setting Family Rules:&nbsp;</strong>Write one &ldquo;Guard Your Space Rule&rdquo; that you and your mother/guardian could agree on to keep your digital space safe at home. How would you make it a habit?</font></li><li><font color="#fdfcfc"><strong>Your Personal Guard Plan:&nbsp;</strong>If you had to make a 3-step plan to guard your digital space this week (cookies, tracking, listening, camera), what steps would you include? Why are these important?</font></li></ol></div></div>    </div></div></div><div style="clear:both;"></div></div></div>  <div class="wsite-spacer" style="height:50px;"></div>  <div class="paragraph"><font size="5"><font color="#2a2a2a">&#8203;</font><font color="#2a2a2a">&#128272; <strong>Digital Detectives: Guarding Your Space in a Connected World</strong></font></font><br /><strong><font color="#2a2a2a">&#8203;Objective:&nbsp;</font></strong><font color="#2a2a2a">To empower girls and their mothers to <strong>investigate how technology interacts with their personal data</strong>, recognize risks, and create a <strong>personal &ldquo;Guard Plan&rdquo;</strong> for safe online engagement&mdash;demonstrating advanced digital literacy skills through <strong>self-led discovery and teamwork</strong>.</font><br /><br /><strong><font color="#2a2a2a">Materials Needed:</font></strong><ul><li><font color="#2a2a2a">Laptops, tablets, or smartphones (one per pair)</font></li><li><font color="#2a2a2a">Internet access</font></li><li><font color="#2a2a2a">Access to a search engine (Google, DuckDuckGo, Bing, etc.)</font></li><li><font color="#2a2a2a">Access to generative AI tools (ChatGPT, Gemini, or similar)</font></li><li><font color="#2a2a2a">Personal journal or digital notes app (one per participant)</font></li></ul><br /><strong><font color="#2a2a2a">Activity Instructions<br />&#8203;</font></strong><strong><font color="#2a2a2a">Step 1: Detective Mission Brief (5 min)<br />&#8203;</font></strong><font color="#2a2a2a">Read this aloud together:</font><br /><em><font color="#2a2a2a">&ldquo;Today, we&rsquo;re digital detectives. Our mission is to find out how our favorite apps or devices see, hear, and track us&mdash;and then make a plan to guard our space while still enjoying technology.&rdquo;</font></em><br /><font color="#2a2a2a">Each of you chooses <strong>one app or device</strong> you use often (examples: TikTok, Instagram, Google Maps, Alexa, school Chromebook).</font><br /><br /><strong><font color="#2a2a2a">Step 2: Search Engine Investigation (15 min)</font></strong><br /><font color="#2a2a2a">Use a search engine to answer:</font><ul><li><font color="#2a2a2a">&ldquo;How does [app/device] track my data?&rdquo;</font></li><li><font color="#2a2a2a">&ldquo;How can I change privacy settings on [app/device]?&rdquo;</font></li><li><font color="#2a2a2a">&ldquo;Does [app/device] listen or record me?&rdquo;</font></li></ul> <font color="#2a2a2a">Record <strong>three key things you learned</strong> in your journal or notes under these headings:</font><ul><li><strong><font color="#2a2a2a">Cookies &amp; Tracking</font></strong></li><li><strong><font color="#2a2a2a">Location Sharing</font></strong></li><li><strong><font color="#2a2a2a">Listening &amp; Camera Access</font></strong></li></ul> <font color="#2a2a2a">&#128172; <strong>Talk it out:</strong> Share your findings with each other. Did you find anything surprising or concerning?</font><br /><br /><strong><font color="#2a2a2a">Step 3: Generative AI Analysis (15&ndash;20 min)</font></strong><br /><font color="#2a2a2a">Open ChatGPT or Gemini and ask:</font><ol><li><em><font color="#2a2a2a">&ldquo;Explain how [app/device] uses my data in simple terms.&rdquo;</font></em></li><li><em><font color="#2a2a2a">&ldquo;What are three ways to protect my privacy while using [app/device]?&rdquo;</font></em></li><li><em><font color="#2a2a2a">&ldquo;What settings should I review to guard my space on [app/device]?&rdquo;</font></em></li></ol> <font color="#2a2a2a">Write down <strong>new advice or insights</strong> in your journal. Compare them with what you found in your search results.<br />&#128172; <strong>Talk it out:</strong> Do the AI tips match what you found online? Which do you trust more?</font><br /><br /><strong><font color="#2a2a2a">Step 4: Risk vs. Benefit Discussion (10 min)</font></strong><br /><font color="#2a2a2a">Together, discuss and write your answers:</font><ul><li><font color="#2a2a2a"><strong>Opportunities:</strong> What benefits do you get from using this app/device?</font></li><li><font color="#2a2a2a"><strong>Threats:</strong> What privacy or safety risks did you discover?</font></li><li><font color="#2a2a2a"><strong>Dealbreakers:</strong> What settings or practices will you change immediately?</font></li></ul> <font color="#2a2a2a">&#128172; <strong>Talk it out:</strong> Agree on one change each of you will make today to protect your space.</font><br /><br /><strong><font color="#2a2a2a">Step 5: Build Your 3-Step Guard Plan (15 min)</font></strong><br /><font color="#2a2a2a">Using everything you&rsquo;ve learned, write a <strong>personal &ldquo;Guard Your Space Plan&rdquo;</strong> in your journal:</font><ol><li><font color="#2a2a2a"><strong>Immediate Action:</strong> A setting or permission you&rsquo;ll change today.</font></li><li><font color="#2a2a2a"><strong>Regular Habit:</strong> Something you&rsquo;ll check weekly or monthly to stay safe.</font></li><li><font color="#2a2a2a"><strong>Family Rule:</strong> A shared rule you and your mother/guardian will follow to guard your digital space.</font></li></ol> <font color="#2a2a2a">&#128172; <strong>Talk it out:</strong> Share your plans with each other. Would you add or change anything?</font><br /><br /><strong><font color="#2a2a2a">Optional Challenge (After the Activity)</font></strong><ul><li><font color="#2a2a2a">Try a different search engine (DuckDuckGo, Bing) and see if the results change.</font></li><li><font color="#2a2a2a">Ask ChatGPT or Gemini: <em>&ldquo;How can I explain my privacy plan to a 10-year-old?&rdquo;</em></font></li><li><font color="#2a2a2a">Create a <strong>mini poster or phone wallpaper</strong> with your &ldquo;Guard Plan Rules&rdquo; to remind you daily.</font></li></ul><br /><strong><font color="#2a2a2a">Learning Outcomes:</font></strong><br /><font color="#2a2a2a">By completing this activity, you will:</font><ul><li><font color="#2a2a2a">&#9989; Use search engines effectively to investigate privacy settings.</font></li><li><font color="#2a2a2a">&#9989; Use generative AI to analyze and cross-check information.</font></li><li><font color="#2a2a2a">&#9989; Understand cookies, permissions, location tracking, and listening devices.</font></li><li><font color="#2a2a2a">&#9989; Build and practice a <strong>personal, actionable Guard Plan</strong> for your technology use.</font></li><li><font color="#2a2a2a">&#9989; Strengthen your skills to <strong>think critically, discuss openly, and make safer choices online</strong>.</font></li></ul></div>  <div id="617045376741707861"><div><style type="text/css">	#element-0b992a9a-03a1-40bd-8349-c100a9588353 .colored-box-content {  clear: both;  float: left;  width: 100%;  -moz-box-sizing: border-box;  -webkit-box-sizing: border-box;  -ms-box-sizing: border-box;  box-sizing: border-box;  background-color: #ae40a5;  padding-top: 20px;  padding-bottom: 20px;  padding-left: 20px;  padding-right: 20px;  -webkit-border-top-left-radius: 0px;  -moz-border-top-left-radius: 0px;  border-top-left-radius: 0px;  -webkit-border-top-right-radius: 0px;  -moz-border-top-right-radius: 0px;  border-top-right-radius: 0px;  -webkit-border-bottom-left-radius: 0px;  -moz-border-bottom-left-radius: 0px;  border-bottom-left-radius: 0px;  -webkit-border-bottom-right-radius: 0px;  -moz-border-bottom-right-radius: 0px;  border-bottom-right-radius: 0px;}</style><div id="element-0b992a9a-03a1-40bd-8349-c100a9588353" data-platform-element-id="848857247979793891-1.0.1" class="platform-element-contents">	<div class="colored-box">    <div class="colored-box-content">        <div style="width: auto"><div></div><div class="paragraph"><strong><font color="#fdfcfc"><font size="5">&#128172; Conversation Starters</font></font></strong><br /><font color="#fdfcfc">Here&rsquo;s a <strong>Bonus Page</strong> of <strong>Conversation Starters</strong> designed for girls and their mothers (or guardians) to keep the discussion about <strong>guarding their digital spaces</strong> alive at home.</font><ol><li><strong><font color="#fdfcfc">What&rsquo;s one thing you learned today about cookies or trackers that surprised you?</font></strong></li><li><strong><font color="#fdfcfc">Which app do you think knows the most about you&mdash;and how does that make you feel?</font></strong></li><li><strong><font color="#fdfcfc">If our devices could talk, what do you think they&rsquo;d say they know about us?</font></strong></li><li><strong><font color="#fdfcfc">How would you explain to a friend why you don&rsquo;t share your location with every app?</font></strong></li><li><strong><font color="#fdfcfc">What&rsquo;s one thing you wish every website asked before collecting your data?</font></strong></li><li><strong><font color="#fdfcfc">How can we make checking app permissions a regular habit&mdash;like locking our doors at night?</font></strong></li><li><strong><font color="#fdfcfc">What&rsquo;s the scariest thing that could happen if we didn&rsquo;t guard our space online?</font></strong></li><li><strong><font color="#fdfcfc">Which setting do you think is the most important to change first&mdash;cookies, location, microphone, or camera? Why?</font></strong></li><li><strong><font color="#fdfcfc">If you could invent a tech feature that protects privacy better, what would it do?</font></strong></li><li><strong><font color="#fdfcfc">How can we remind each other to stay careful online without making it feel like a chore?</font></strong></li></ol></div></div>    </div></div></div><div style="clear:both;"></div></div></div>]]></content:encoded></item><item><title><![CDATA[S3.1 - Opportunities and Threats]]></title><link><![CDATA[https://www.black-liberation.tech/safety-first/s31-opportunities-and-threats]]></link><comments><![CDATA[https://www.black-liberation.tech/safety-first/s31-opportunities-and-threats#comments]]></comments><pubDate>Sun, 03 Aug 2025 16:07:40 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.black-liberation.tech/safety-first/s31-opportunities-and-threats</guid><description><![CDATA[    An Afro-Latina MarTech Publicist leads a workshop on online safety and creativity for a diverse group of mothers and their teenage daughters in a cozy after-school community room.   Scene:&nbsp;A cozy community room in the after-school center. Posters about online safety and creativity hang on the walls. Jazmin sits in a circle with a group of mothers and their daughters.Jazmin:&nbsp;Good afternoon, everyone. I&rsquo;m really grateful to be here today. Technology is a big part of our lives&m [...] ]]></description><content:encoded><![CDATA[<div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0px;margin-right:0px;text-align:center"> <a> <img src="https://www.black-liberation.tech/uploads/1/1/0/7/110733105/gemini-generated-image-uwdxh4uwdxh4uwdx_orig.png" alt="A diverse group of teenage girls and their mothers with a variety of African American, Afro-Latina, and Latina backgrounds are seated in a circle on the floor of a brightly lit community room. They are listening intently to an Afro-Latina woman who is seated opposite them, gesturing as she speaks. The woman has an afro and is wearing a brown button-up shirt and dark jeans. The walls behind them are decorated with colorful, hand-drawn posters promoting online safety and creativity." style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%">An Afro-Latina MarTech Publicist leads a workshop on online safety and creativity for a diverse group of mothers and their teenage daughters in a cozy after-school community room.</div> </div></div>  <div class="paragraph"><font color="#2a2a2a"><strong>Scene:&nbsp;</strong>A cozy community room in the after-school center. Posters about online safety and creativity hang on the walls. Jazmin sits in a circle with a group of mothers and their daughters.</font><br /><br /><font color="#2a2a2a"><strong>Jazmin:&nbsp;</strong>Good afternoon, everyone. I&rsquo;m really grateful to be here today. Technology is a big part of our lives&mdash;it connects us, it teaches us, it gives us opportunities we couldn&rsquo;t have imagined twenty years ago. But&hellip; there&rsquo;s something else I always remind myself: as much as there&rsquo;s opportunity, there&rsquo;s also real threat. And that&rsquo;s what I want us to talk about together.</font><br /><font color="#2a2a2a"><strong><br />Selena (curious):&nbsp;</strong>What do you mean by threat? Like, hackers?</font><br /><font color="#2a2a2a"><strong><br />Jazmin:&nbsp;</strong>That&rsquo;s part of it, Selena. But I also mean&hellip; the way someone might misuse what we share. The internet can be a beautiful thing&mdash;but it doesn&rsquo;t always have good intentions on the other side of the screen. You may post a picture because you feel happy or confident, but you don&rsquo;t control where it goes next. That&rsquo;s the kind of threat I want us to be mindful of.</font><br /><font color="#2a2a2a"><strong><br />Ruby (mother):&nbsp;</strong>I understand that. But sometimes, as a parent, I don&rsquo;t know how much is too much when it comes to watching what they do on their phones.</font><br /><font color="#2a2a2a"><strong><br />Jazmin (pauses thoughtfully):&nbsp;</strong>Ruby, I get that. I grew up in a Latin household, and I know there&rsquo;s this&hellip; level of uncertainty, sometimes mistrust, about what young people are doing online. And honestly, it&rsquo;s not because parents don&rsquo;t love or trust their kids&mdash;it&rsquo;s because this technology can take things in directions none of us expect. It&rsquo;s big. It&rsquo;s powerful. And yes, it can go really well&hellip; or it can go really bad.</font><br /><font color="#2a2a2a"><strong><br />Sonia:&nbsp;</strong>But there are good things too, right? Like, I want to post my art online. I want people to see it.<br /><br /></font><font color="#2a2a2a"><strong>Jazmin (smiling):&nbsp;</strong>Oh, absolutely. That&rsquo;s the opportunity part, Sonia. Sharing your art can open doors&mdash;you could inspire people, you could build a career one day from the creativity you show now. Technology gives you that stage. My only advice is: treat that stage with care. Ask yourself: <em>Am I okay with this picture, this thought, this moment being seen by anyone, anywhere, forever?</em> If the answer&rsquo;s no&hellip; maybe keep it just for you, or share it privately.</font><br /><font color="#2a2a2a"><strong><br />Coretta (mother):&nbsp;</strong>I try to set boundaries, but my daughter says I don&rsquo;t understand what&rsquo;s really going on online.</font><br /><font color="#2a2a2a"><strong><br />Jazmin:&nbsp;</strong>And that&rsquo;s where the second part of this conversation comes in. Girls, I think you can help your parents understand <em>why</em> you use technology. Sometimes adults think it's all a waste of time&mdash;just scrolling or playing games. But there are skills you&rsquo;re building, even from video games or chatting with friends, that matter. The more open you are about why it matters to you, the more trust you build.</font><br /><br /><font color="#2a2a2a"><strong>&#8203;Zora:&nbsp;</strong>So, like, I should tell my mom why I&rsquo;m posting a dance video, not just do it?</font><br /><br /><font color="#2a2a2a"><strong>Jazmin:&nbsp;</strong>Exactly, Zora. It&rsquo;s not about asking permission&mdash;it&rsquo;s about making sure the people who love you know what&rsquo;s on your mind and how you&rsquo;re using these tools. That way, they&rsquo;re not guessing or worrying.</font><br /><br /><font color="#2a2a2a"><strong>Dolores (mother):&nbsp;</strong>Jazmin, if you had to tell these girls just one rule to stay safe, what would it be?</font><br /><br /><font color="#2a2a2a"><strong>Jazmin (choosing words carefully):&nbsp;</strong>One rule&hellip; I&rsquo;d say this: <em>Always remember there&rsquo;s a real human behind the screen. Some will lift you up, others might try to harm or trick you. So be kind, be cautious, and never share something you wouldn&rsquo;t want the whole world to see.</em></font><br /><br /><font color="#2a2a2a"><strong>Ava:&nbsp;</strong>Even if I think it&rsquo;s just between me and my best friend?</font><br /><br /><font color="#2a2a2a"><strong>Jazmin:&nbsp;</strong>Even then, Ava. Screens can&rsquo;t promise you privacy. But they can give you incredible opportunities if you treat what you post with care. That&rsquo;s how you build safety and freedom online.</font><br /><br /><font color="#2a2a2a"><strong>Truth (mother):&nbsp;</strong>I like that&hellip; be kind, be cautious.</font><br /><br /><font color="#2a2a2a"><strong>Jazmin:&nbsp;</strong>Yes. Technology is a gift&mdash;but like any powerful tool, it needs wisdom. And that wisdom? It comes from conversations like this one, from listening to each other, and from thinking before we tap &ldquo;post.&rdquo;</font></div>  <div id="781051126777923128"><div><style type="text/css">	#element-9e1c123e-4fa1-4254-a88d-1a250cffc07b .colored-box-content {  clear: both;  float: left;  width: 100%;  -moz-box-sizing: border-box;  -webkit-box-sizing: border-box;  -ms-box-sizing: border-box;  box-sizing: border-box;  background-color: #24678d;  padding-top: 20px;  padding-bottom: 20px;  padding-left: 20px;  padding-right: 20px;  -webkit-border-top-left-radius: 0px;  -moz-border-top-left-radius: 0px;  border-top-left-radius: 0px;  -webkit-border-top-right-radius: 0px;  -moz-border-top-right-radius: 0px;  border-top-right-radius: 0px;  -webkit-border-bottom-left-radius: 0px;  -moz-border-bottom-left-radius: 0px;  border-bottom-left-radius: 0px;  -webkit-border-bottom-right-radius: 0px;  -moz-border-bottom-right-radius: 0px;  border-bottom-right-radius: 0px;}</style><div id="element-9e1c123e-4fa1-4254-a88d-1a250cffc07b" data-platform-element-id="848857247979793891-1.0.1" class="platform-element-contents">	<div class="colored-box">    <div class="colored-box-content">        <div style="width: auto"><div></div><div class="paragraph"><strong><font color="#fdfcfc">&#128221; Reflect &amp; Write</font></strong><font color="#fdfcfc"><strong>Instructions:</strong> Read the prompts below and write your thoughts in your journal or digital notepad. If you&rsquo;re working with your mom or guardian, take turns answering and then share your ideas with each other.</font><ol><li><font color="#fdfcfc"><strong>What is one opportunity Jazmin said technology can give you?</strong></font><br /><br /></li><li><font color="#fdfcfc"><strong>What is one threat or danger she mentioned?</strong></font><br /><br /></li><li><font color="#fdfcfc"><strong>Think of a time you posted or shared something online. How did it make you feel?</strong></font><br /><br /></li><li><font color="#fdfcfc"><strong>If your post had reached people you didn&rsquo;t expect, what could have happened?</strong></font><br /><br /></li><li><font color="#fdfcfc"><strong>Jazmin said, &ldquo;There&rsquo;s a real human behind the screen.&rdquo; What does that mean to you?</strong></font><br /><br /></li><li><font color="#fdfcfc"><strong>How do you decide what is safe to share online? Write down your personal rule.</strong></font><br /><br /></li><li><font color="#fdfcfc"><strong>Name one positive way you use technology every day.</strong></font><br /><br /></li><li><font color="#fdfcfc"><strong>Name one boundary you could set to protect yourself online.</strong></font><br /><br /></li><li><font color="#fdfcfc"><strong>How can you help your mom or guardian understand why you like using certain apps or games?</strong></font><br /><br /></li><li><strong><font color="#fdfcfc">Write one sentence you want to remember from today&rsquo;s conversation with Jazmin.</font></strong></li></ol></div></div>    </div></div></div><div style="clear:both;"></div></div></div>  <div class="wsite-spacer" style="height:50px;"></div>  <div class="paragraph"><strong><font color="#2a2a2a">&#127919; Spot the Opportunity or Threat?<br />&#8203;</font></strong><font color="#2a2a2a"><strong>Goal:</strong> Practice identifying online situations as opportunities, threats, or a mix of both.</font><br /><br /><strong><font color="#2a2a2a">&#8203;How to Play:</font></strong><ol><li><font color="#2a2a2a">Read each scenario aloud.</font></li><li><font color="#2a2a2a">Each person holds up a card (or says aloud):</font><ul><li><font color="#2a2a2a">&#9989; Opportunity</font></li><li><font color="#2a2a2a">&#9888;&#65039; Threat</font></li><li><font color="#2a2a2a">&#129300; Both</font></li></ul></li><li><font color="#2a2a2a">Share why you chose your answer and what you would do in that situation.</font></li></ol><br /><strong><font color="#2a2a2a">Scenarios:</font></strong><ol><li><font color="#2a2a2a">You receive a message from someone you don&rsquo;t know asking for a picture of you.</font></li><li><font color="#2a2a2a">A friend tags you in a fun video from a school event.</font></li><li><font color="#2a2a2a">A stranger sends you a link promising free concert tickets.</font></li><li><font color="#2a2a2a">You create an art account to show your drawings to the public.</font></li><li><font color="#2a2a2a">Someone you met in a game asks to meet in person.</font></li><li><font color="#2a2a2a">Your favorite singer likes and comments on your dance video.</font></li><li><font color="#2a2a2a">You post your real-time location while hanging out with friends.</font></li><li><font color="#2a2a2a">You join an online study group that helps you do better in math.</font></li><li><font color="#2a2a2a">A popular account reposts your photo without asking.</font></li><li><font color="#2a2a2a">You share a private joke with your best friend through messages.</font></li></ol><br /><strong><font color="#2a2a2a">Wrap-Up Discussion:</font></strong><ul><li><font color="#2a2a2a">Which scenario felt like the biggest opportunity? Why?</font></li><li><font color="#2a2a2a">Which scenario felt like the biggest threat? Why?</font></li><li><font color="#2a2a2a">What&rsquo;s one &ldquo;safety rule&rdquo; you want to remember for next time you&rsquo;re online?</font></li></ul></div>  <div id="221002142275819477"><div><style type="text/css">	#element-af232e1a-834d-43a1-9f1d-842e126e9cfa .colored-box-content {  clear: both;  float: left;  width: 100%;  -moz-box-sizing: border-box;  -webkit-box-sizing: border-box;  -ms-box-sizing: border-box;  box-sizing: border-box;  background-color: #24678d;  padding-top: 20px;  padding-bottom: 20px;  padding-left: 20px;  padding-right: 20px;  -webkit-border-top-left-radius: 0px;  -moz-border-top-left-radius: 0px;  border-top-left-radius: 0px;  -webkit-border-top-right-radius: 0px;  -moz-border-top-right-radius: 0px;  border-top-right-radius: 0px;  -webkit-border-bottom-left-radius: 0px;  -moz-border-bottom-left-radius: 0px;  border-bottom-left-radius: 0px;  -webkit-border-bottom-right-radius: 0px;  -moz-border-bottom-right-radius: 0px;  border-bottom-right-radius: 0px;}</style><div id="element-af232e1a-834d-43a1-9f1d-842e126e9cfa" data-platform-element-id="848857247979793891-1.0.1" class="platform-element-contents">	<div class="colored-box">    <div class="colored-box-content">        <div style="width: auto"><div></div><div class="paragraph"><font color="#fdfcfc">&#128270; <strong>Search Smart, Think Twice</strong></font><br /><strong><font color="#fdfcfc">Objective:</font></strong><br /><font color="#fdfcfc">To help girls (Grades 6&ndash;12) and their mothers collaboratively:</font><ol><li><font color="#fdfcfc"><strong>Identify and evaluate online opportunities and threats</strong> using real-world examples.</font></li><li><font color="#fdfcfc"><strong>Use search engines and generative AI tools</strong> (e.g., ChatGPT, Gemini) responsibly to gather, compare, and assess online information.</font></li><li><font color="#fdfcfc"><strong>Practice safe decision-making skills</strong> before clicking, posting, or engaging online.</font></li></ol><br /><strong><font color="#fdfcfc">Materials Needed:</font></strong><ul><li><font color="#fdfcfc">Internet-connected devices (laptops, tablets, or smartphones)</font></li><li><font color="#fdfcfc">Access to a search engine (Google, Bing, etc.)</font></li><li><font color="#fdfcfc">Access to AI tools (ChatGPT, Gemini, or similar)</font></li><li><font color="#fdfcfc">Digital worksheet or shared Google Doc for notes</font>&#8203;</li></ul><br /><strong><font color="#fdfcfc">Activity Steps</font></strong><br /><strong><font color="#fdfcfc">Step 1 &ndash; Scenario Selection (5 min)</font></strong><br /><font color="#fdfcfc">Each mother-daughter team chooses <strong>one real-world scenario</strong> from the list or creates their own:</font><ul><li><font color="#fdfcfc"><strong>Scenario A:</strong> A new social media challenge is trending. Should you join?</font></li><li><font color="#fdfcfc"><strong>Scenario B:</strong> You receive a DM from someone offering to feature your art or dance video online. Safe or risky?</font></li><li><font color="#fdfcfc"><strong>Scenario C:</strong> A website promises free concert tickets in exchange for signing up and sharing personal information. Should you click?</font></li><li><font color="#fdfcfc"><strong>Scenario D:</strong> You&rsquo;ve designed a cool digital product and want to post it on multiple platforms&mdash;what do you need to think about first?</font></li></ul><br /><strong><font color="#fdfcfc">Step 2 &ndash; Search &amp; Gather (10 min)</font></strong><br /><font color="#fdfcfc">Teams will:</font><ul><li><font color="#fdfcfc">Use <strong>search engines</strong> to gather information about their scenario (e.g., &ldquo;dangers of online challenges,&rdquo; &ldquo;how to safely share art online,&rdquo; &ldquo;fake giveaways online&rdquo;).</font></li><li><font color="#fdfcfc"><strong>Document their sources</strong>, noting:</font><ul><li><font color="#fdfcfc">Website credibility (Who runs it? Is it reputable?)</font></li><li><font color="#fdfcfc">Whether the information seems trustworthy or biased</font></li><li><font color="#fdfcfc">What advice or warnings are given</font></li></ul></li></ul><br /><strong><font color="#fdfcfc">Step 3 &ndash; Ask the AI (10 min)</font></strong><br /><font color="#fdfcfc">Teams will:</font><ul><li><font color="#fdfcfc">Use <strong>ChatGPT or Gemini</strong> to ask:</font><ul><li><font color="#fdfcfc"><strong>Opportunities:</strong> &ldquo;What are the possible benefits of [scenario]?&rdquo;</font></li><li><font color="#fdfcfc"><strong>Threats:</strong> &ldquo;What are the possible risks of [scenario]? How can we stay safe?&rdquo;</font></li></ul></li><li><font color="#fdfcfc">Compare AI responses with search engine results.</font></li><li><font color="#fdfcfc">Discuss:</font><ul><li><font color="#fdfcfc">Did the AI give new insights or repeat known advice?</font></li><li><font color="#fdfcfc">Did the AI give any unsafe or questionable suggestions? How can you verify them?</font></li></ul></li></ul><br /><strong><font color="#fdfcfc">Step 4 &ndash; Click, Post &amp; Use with Care Checklist (5 min)</font></strong><br /><font color="#fdfcfc">Using both sources, teams create a <strong>short decision-making checklist</strong>:</font><ul><li><font color="#fdfcfc">&#9989; What steps will you take <strong>before clicking, posting, or replying</strong>?</font></li><li><font color="#fdfcfc">&#9989; What information will you avoid sharing?</font></li><li><font color="#fdfcfc">&#9989; How will you confirm if an opportunity is real and safe?</font></li></ul><br /><strong><font color="#fdfcfc">Step 5 &ndash; Present &amp; Reflect (10 min)</font></strong><br /><font color="#fdfcfc">Each team shares:</font><ul><li><font color="#fdfcfc">Their <strong>chosen scenario</strong></font></li><li><font color="#fdfcfc">At least <strong>one opportunity and one threat</strong> they discovered</font></li><li><font color="#fdfcfc"><strong>One rule</strong> they will follow moving forward when using technology</font></li></ul><br /><strong><font color="#fdfcfc">Digital Literacy Skills Demonstrated:</font></strong><ul><li><font color="#fdfcfc"><strong>Critical Thinking:</strong> Evaluating search results and AI responses for reliability</font></li><li><font color="#fdfcfc"><strong>Safe Navigation:</strong> Identifying safe vs. unsafe online behaviors</font></li><li><font color="#fdfcfc"><strong>AI Literacy:</strong> Understanding how generative AI can support&mdash;but not replace&mdash;good judgment</font></li><li><font color="#fdfcfc"><strong>Online Etiquette:</strong> Recognizing the human impact of clicks and posts</font></li></ul><br /><strong><font color="#fdfcfc">Extension Challenge:<br />&#8203;</font></strong><font color="#fdfcfc">For teams comfortable with technology:</font><ul><li><font color="#fdfcfc">Ask ChatGPT or Gemini to <strong>generate a short, safe &ldquo;social media caption&rdquo;</strong> for posting their art, dance video, or project online.</font></li><li><font color="#fdfcfc">Teams then review the caption together and <strong>edit it</strong> using their new safety checklist before sharing (hypothetically).</font></li></ul></div></div>    </div></div></div><div style="clear:both;"></div></div></div>]]></content:encoded></item><item><title><![CDATA[3. 0 - Social Media Is Not Real Life]]></title><link><![CDATA[https://www.black-liberation.tech/safety-first/2-0-social-media-is-not-real-life]]></link><comments><![CDATA[https://www.black-liberation.tech/safety-first/2-0-social-media-is-not-real-life#comments]]></comments><pubDate>Sat, 19 Jul 2025 14:56:43 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.black-liberation.tech/safety-first/2-0-social-media-is-not-real-life</guid><description><![CDATA[    Young African American, Afro-Latina, and Latina women collaborating and connecting in an innovation center.   This conversation takes place between Ebony, Nadine, Nicole Bakula, Sharlene, and a group of 10 girls (grades 6&ndash;12) and their mothers at an Innovation Center in a suburban Atlanta recreation center.Scene: Community Room, Innovation Center &ndash; Early EveningThe room hums with chatter as mothers and daughters settle into a semi-circle of colorful chairs. A projector glows with [...] ]]></description><content:encoded><![CDATA[<div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0px;margin-right:0px;text-align:center"> <a> <img src="https://www.black-liberation.tech/uploads/1/1/0/7/110733105/gemini-generated-image-j9mci3j9mci3j9mc_orig.png" alt="A vibrant and diverse group of young African American, Afro-Latina, and Latina women, ranging in age from 13 to 28, are seated in a semi-circle of colorful, mismatched chairs within a modern innovation center. They are engaged in conversation and appear collaborative and happy." style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%">Young African American, Afro-Latina, and Latina women collaborating and connecting in an innovation center.</div> </div></div>  <div class="paragraph"><font color="#2a2a2a">This conversation takes place between <strong>Ebony, Nadine, Nicole Bakula, Sharlene</strong>, and a group of <strong>10 girls (grades 6&ndash;12) and their mothers</strong> at an Innovation Center in a suburban Atlanta recreation center.<br /><br /><br /><strong>Scene: Community Room, Innovation Center &ndash; Early Evening</strong><br /><em>The room hums with chatter as mothers and daughters settle into a semi-circle of colorful chairs. A projector glows with the title slide: &ldquo;Safety First Series: Social Media Is Not Real Life.&rdquo; Ebony stands at the front with Nadine, Nicole Bakula, and Sharlene seated beside her. The atmosphere is relaxed and welcoming.</em><br /><br /><strong>Ebony:</strong> (<em>smiling warmly</em>) Alright, y&rsquo;all. Welcome. Tonight, we&rsquo;re gonna talk about something that affects all of us&mdash;especially y&rsquo;all who&rsquo;ve grown up with phones in hand&mdash;<strong>social media.</strong> But not from a place of judgment. We just want to open up a real conversation about what it is... and what it is not<em>.</em><br /><br /><strong>Maya:</strong> So... like, how do y&rsquo;all feel about it? Do you use social media every day?<br /><br /><strong>Nadine:</strong> Hmm... (<em>smiling thoughtfully</em>) That&rsquo;s a good one. I actually don&rsquo;t post often. Even though I love taking pictures and documenting memories, especially of my family, I usually keep those private. My camera roll is full! But I think about what&rsquo;s <em>worth</em> sharing and who it&rsquo;s really for.<br /><br /><strong>Sharlene:</strong> (<em>laughs</em>) Yes! I&rsquo;m old school. I don&rsquo;t post at all. In fact, my team runs my business accounts. I like to create content, sure, but I don&rsquo;t need to be <em>in</em> it. I don&rsquo;t need to share every part of my life to feel valid. Honestly, I don&rsquo;t want strangers knowing my every move.<br /><br /><strong>Selena:</strong> But isn&rsquo;t it kinda weird to not be on at all? Like, don&rsquo;t you miss out?<br /><br /><strong>Nicole Bakula:</strong> I hear you. It&rsquo;s tricky. I limit my time on social media. I don&rsquo;t even have TikTok or any dating apps&mdash;never downloaded them. For me, it&rsquo;s about boundaries. I still talk with friends, but I don&rsquo;t feel like I need to be <em>everywhere</em> online. There&rsquo;s power in being selective.<br /><br /><strong>Ebony:</strong> That&rsquo;s real. And can I just say&mdash;<em>likes don&rsquo;t equal your worth</em>. You can post the funniest or deepest thing and barely get any attention, and someone else posts a dancing cat, and it goes viral. Social media doesn&rsquo;t always reward what's meaningful. It rewards what grabs attention.<br /><br /><strong>Gloria:</strong> That&rsquo;s so important. I&rsquo;ve seen my daughter sad because a post didn&rsquo;t get enough likes. And I get it&mdash;it feels personal.<br /><br /><strong>Lupita:</strong> Sometimes it&rsquo;s hard not to compare yourself. Like, everybody looks so happy online.<br /><br /><strong>Nadine:</strong> (<em>nodding</em>) And that&rsquo;s the trap. Most of what we see is curated. It's like a highlight reel&mdash;not the messy, honest stuff. People don&rsquo;t post their breakdowns or their rejections, just their wins.<br /><br /><strong>Sharlene:</strong> And some of it&rsquo;s exaggerated. Some folks are performing a version of their life for the camera&mdash;filters, staging, even lies. And it makes us feel like we&rsquo;re the only ones struggling. But <em>we&rsquo;re not.</em><br /><br /><strong>Nicole Bakula:</strong> Exactly. We all need moments <em>off-screen</em> to reconnect with reality. That&rsquo;s why I unplug regularly. Just because something <em>can</em> be posted, doesn&rsquo;t mean it <em>should</em> be.<br /><br /><strong>Ebony:</strong> (<em>to the girls</em>) Let me ask y&rsquo;all this&mdash;have you ever looked at someone&rsquo;s post and thought, &ldquo;Wow, their life is perfect&rdquo;?<br />(<em>Several girls nod slowly.</em>)<br /><br /><strong>Ebony:</strong> Yeah. But remember&mdash;some of the happiest-looking posts come from folks who are struggling. Don&rsquo;t base your worth on a picture you saw at 2 a.m. while scrolling.<br /><br /><strong>Michelle:</strong> So what do you post? If anything?<br /><br /><strong>Sharlene:</strong> (<em>smiling</em>) Professional things only. Maybe a campaign or an event. But never personal. I&rsquo;ve learned the hard way to keep what&rsquo;s sacred offline.<br /><br /><strong>Nadine:</strong> Same here. I post intentionally&mdash;artwork, design projects, or something that might encourage someone. But never out of pressure. If I don&rsquo;t feel like sharing, I don&rsquo;t.<br /><br /><strong>Nicole Bakula:</strong> I focus on impact. If it&rsquo;s useful, uplifting, or aligns with my values, I might share it. Otherwise, I let it live offline.<br /><br /><strong>Ebony:</strong> And me? I post when I want to celebrate something I&rsquo;m proud of, or to uplift someone else. But I&rsquo;m not gonna post for likes. I&rsquo;ve had to learn to keep some wins just for myself.<br /><br /><strong>Iman:</strong> So it&rsquo;s okay to post less?<br /><br /><strong>&#8203;All (together):</strong> Yes!<br /><strong><br />Ebony:</strong> It&rsquo;s more than okay&mdash;it&rsquo;s powerful. You don&rsquo;t have to post everything to be somebody. You already are.<br /><strong><br />Nicole Bakula:</strong> You&rsquo;re allowed to have a private life. You&rsquo;re allowed to <em>rest</em>, to <em>not respond</em>, to <em>delete</em>, and to say <em>no thanks</em> to trends that don&rsquo;t feel good.<br /><strong><br />Nadine:</strong> Just ask yourself, &ldquo;Who is this for?&rdquo; If you&rsquo;re posting to impress strangers or to prove something, take a breath. Your peace is more important.<br /><strong><br />Ebony:</strong> (<em>gestures to the group</em>) We&rsquo;ll leave y&rsquo;all with this: Social media is not real life. Real life is happening right here, in this room, with people who love you, who support you, and who see you&mdash;not through a filter.<br /><em>The room falls into reflective silence as the projector fades to black, replaced with the words:</em><br /><strong><br />&#8203;&ldquo;Be intentional. Be real. Be safe.&rdquo;</strong></font></div>  <div id="923565664199762541"><div><style type="text/css">	#element-2d734433-c370-4d01-9b08-cc95bdab4a3c .colored-box-content {  clear: both;  float: left;  width: 100%;  -moz-box-sizing: border-box;  -webkit-box-sizing: border-box;  -ms-box-sizing: border-box;  box-sizing: border-box;  background-color: #5040ae;  padding-top: 20px;  padding-bottom: 20px;  padding-left: 20px;  padding-right: 20px;  -webkit-border-top-left-radius: 0px;  -moz-border-top-left-radius: 0px;  border-top-left-radius: 0px;  -webkit-border-top-right-radius: 0px;  -moz-border-top-right-radius: 0px;  border-top-right-radius: 0px;  -webkit-border-bottom-left-radius: 0px;  -moz-border-bottom-left-radius: 0px;  border-bottom-left-radius: 0px;  -webkit-border-bottom-right-radius: 0px;  -moz-border-bottom-right-radius: 0px;  border-bottom-right-radius: 0px;}</style><div id="element-2d734433-c370-4d01-9b08-cc95bdab4a3c" data-platform-element-id="848857247979793891-1.0.1" class="platform-element-contents">	<div class="colored-box">    <div class="colored-box-content">        <div style="width: auto"><div></div><div class="paragraph"><font color="#fdfcfc"><strong>&#10024;</strong><strong> Reflect &amp; Write Prompts: </strong></font><strong style="color:rgb(253, 252, 252)"><font size="3"><em>Reflect on the following prompts and write out your responses.</em></font></strong><br /><font color="#fdfcfc"><strong>&#127760; Understanding Social Media Habits</strong></font><ol><li><font color="#fdfcfc"><strong>How do you decide what to post on social media?</strong><br />Do you think about who will see it, how it will look, or how many likes it might get?</font></li><li><font color="#fdfcfc"><strong>Have you ever deleted a post because it didn&rsquo;t get enough likes or comments?</strong><br />How did that make you feel?</font></li><li><font color="#fdfcfc"><strong>What&rsquo;s the difference between your real day and your social media day?</strong><br />If someone only saw your posts, what would they assume about your life?</font></li><li><font color="#fdfcfc"><strong>Do you use filters when posting photos? Why or why not?</strong><br />How do filters make you feel about your unfiltered self?</font></li><li><font color="#fdfcfc"><strong>When you scroll through other people&rsquo;s pictures, what thoughts come to mind?</strong><br />Are there people you compare yourself to, even if you don&rsquo;t mean to do it?</font></li><li><font color="#fdfcfc"><strong>Have you ever felt worse after spending time on social media?</strong><br />What were you looking at, and why do you think it affected you that way?</font></li><li><font color="#fdfcfc"><strong>Do you ever feel pressure to look or act a certain way online?</strong><br />Where do you think that pressure comes from?</font></li><li><font color="#fdfcfc"><strong>What is one thing about you that you&rsquo;ve never posted but you are proud of it?</strong><br />Why haven&rsquo;t you shared it?</font></li><li><font color="#fdfcfc"><strong>If someone only saw your online profile, would they really know who you are as a person?</strong><br />What would they be missing about you?</font></li><li><font color="#fdfcfc"><strong>What boundaries&mdash;if any&mdash;do you set for yourself around social media?</strong><br />Are there times when taking a break might help your peace of mind?</font></li></ol><br /><br /><font color="#fdfcfc"><strong>&#128171; Reclaiming Self-Worth &amp; Beauty Beyond the Screen</strong></font><ol><li><font color="#fdfcfc"><strong>When you look at models or influencers online, how do they compare to people you see every day at school, church, or home?</strong><br />What do you notice that&rsquo;s different between what you see online and everyday? What do you think is more <em>real</em>?</font></li><li><font color="#fdfcfc"><strong>What makes someone beautiful to you, beyond how they look?</strong><br />Can you name a person in your life who is beautiful for reasons other than appearance?</font></li><li><font color="#fdfcfc"><strong>Name three things you love about yourself that have nothing to do with how you look.</strong><br />Why are these things important to who you are as a person?</font></li><li><font color="#fdfcfc"><strong>What are your gifts, talents, or special traits that no one else has exactly like you?</strong><br />How can you share those in the world&mdash;with or without social media?</font></li><li><font color="#fdfcfc"><strong>If social media disappeared tomorrow, how would you let people know who you are as an individual?</strong><br />What would you want them to remember about <em>you</em>&mdash;your heart, your talents, your voice?</font></li></ol></div></div>    </div></div></div><div style="clear:both;"></div></div></div>  <div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0px;margin-right:0px;text-align:center"> <a> <img src="https://www.black-liberation.tech/uploads/1/1/0/7/110733105/gemini-generated-image-omgmewomgmewomgm_orig.png" alt="An African American woman in her late 20s or early 30s with striking red Afro-textured hair and freckles across her nose and cheeks wears glasses and looks at complex data on several monitors in a dim office setting. She's dressed in business casual attire and surrounded by tech equipment, suggesting a deep focus on her work as a Digital Forensics Analyst." style="width:auto;max-width:100%" /> </a> <div style="display:block;font-size:90%">Dedicated to uncovering digital truths. This Digital Forensics Analyst, with her keen eye and vibrant red hair, is deeply immersed in her work.</div> </div></div>  <div id="322214407927320058"><div><style type="text/css">	#element-29bba473-5c28-4865-9e93-ed52332f21b6 .colored-box-content {  clear: both;  float: left;  width: 100%;  -moz-box-sizing: border-box;  -webkit-box-sizing: border-box;  -ms-box-sizing: border-box;  box-sizing: border-box;  background-color: #5040ae;  padding-top: 20px;  padding-bottom: 20px;  padding-left: 20px;  padding-right: 20px;  -webkit-border-top-left-radius: 0px;  -moz-border-top-left-radius: 0px;  border-top-left-radius: 0px;  -webkit-border-top-right-radius: 0px;  -moz-border-top-right-radius: 0px;  border-top-right-radius: 0px;  -webkit-border-bottom-left-radius: 0px;  -moz-border-bottom-left-radius: 0px;  border-bottom-left-radius: 0px;  -webkit-border-bottom-right-radius: 0px;  -moz-border-bottom-right-radius: 0px;  border-bottom-right-radius: 0px;}</style><div id="element-29bba473-5c28-4865-9e93-ed52332f21b6" data-platform-element-id="848857247979793891-1.0.1" class="platform-element-contents">	<div class="colored-box">    <div class="colored-box-content">        <div style="width: auto"><div></div><div class="paragraph"><font size="4"><span style="color:rgb(15, 71, 97)">&#128272;</span> <font color="#fdfcfc"><span style="font-weight:normal">Digital Forensics Analyst</span> (or Computer Forensics Investigator)</font></font><ul><li><font color="#fdfcfc"><strong>What they do:</strong> Investigate cybercrimes by recovering and analyzing data from computers, smartphones, and digital storage devices.</font></li><li><font color="#fdfcfc"><strong>Where they work:</strong> Law enforcement agencies, cybersecurity firms, government offices.</font></li></ul></div></div>    </div></div></div><div style="clear:both;"></div></div></div>  <div class="wsite-spacer" style="height:50px;"></div>  <div class="paragraph"><font color="#2a2a2a"><font size="4">&#128269; </font><strong><font size="4">Digital Detectives: Is It Real or Just for the 'Gram?</font><br />&#8203;</strong></font><font color="#2a2a2a">"Welcome, Digital Detectives! You&rsquo;ve been hired to investigate whether the content you're seeing on social media reflects real life&hellip; or if it&rsquo;s just for show. Your mission, should you choose to accept it, is to uncover the hidden clues in a few posts, ask critical questions, and report your findings."<br /><br /><strong>Time:</strong> 30&ndash;45 minutes<br /><strong>Tools Needed:</strong></font><ul><li><font color="#2a2a2a">Smartphone, tablet, or laptop with internet access</font></li><li><font color="#2a2a2a">Access to at least one social media platform (Instagram, TikTok, YouTube, etc.)</font></li><li><font color="#2a2a2a">Digital worksheet (Google Doc, Form, or Notes App)</font></li></ul><br /><font color="#2a2a2a">&#129517; <strong>Objective:</strong></font><br /><font color="#2a2a2a">To explore social media posts </font><span style="color:rgb(42, 42, 42)">critically&nbsp;</span><font color="#2a2a2a">in real time and reflect on what might be curated, exaggerated, or filtered </font><span style="color:rgb(42, 42, 42)">intentionally</span><font color="#2a2a2a">. Strengthen your digital literacy and confidence by distinguishing between online portrayals and real life.</font><br /><br /><font color="#2a2a2a">&#128221; <strong>Instructions:</strong></font><br /><font color="#2a2a2a">&#127760; Step 1: Choose Your Feed<br />Open one of your favorite social media apps (or visit a public page). Choose 3&ndash;5 posts that catch your attention.<br />Look for:</font><ul><li><font color="#2a2a2a">&ldquo;Perfect&rdquo; selfies</font></li><li><font color="#2a2a2a">Lifestyle influencer posts</font></li><li><font color="#2a2a2a">Sponsored content (#ad)</font></li><li><font color="#2a2a2a">Vacation or event highlight reels</font></li></ul><br /><br /><font color="#2a2a2a">&#128373;&#65039;&zwj;&#9792;&#65039; Step 2: Investigate the Posts<br />For each post, discuss the following questions together. You can record your answers in a digital worksheet or voice memo:</font><ol><li><font color="#2a2a2a">What is being shown in this post?</font></li><li><font color="#2a2a2a">What emotions or reactions did you feel when you first saw it?</font></li><li><font color="#2a2a2a">Are there signs that the post might be curated or filtered? (lighting, angles, brand mentions, hashtags, matching outfits, etc.)</font></li><li><font color="#2a2a2a">What do you <em>not</em> see? (mess, prep work, behind-the-scenes, emotion, effort)</font></li><li><font color="#2a2a2a">What might the person be trying to communicate or get from this post?</font></li></ol><br /><br /><font color="#2a2a2a">&#128997;&#129001; Step 3: Tag It&mdash;Real or Curated?<br />For each post, decide as a team:</font><ul><li><font color="#2a2a2a">&#128997; Mark as &ldquo;Curated&rdquo; if it feels overly polished, performative, or filtered</font><ul><li><font color="#2a2a2a">Signs it may not reflect real life: filters, product placement, perfect lighting, unrealistic body poses</font></li></ul></li><li><font color="#2a2a2a">&#129001; Mark as &ldquo;Relatable&rdquo; if it feels authentic, natural, or reflects real life</font><ul><li><font color="#2a2a2a">Signs it feels genuine or relatable: messy background, humor, honesty, visible emotions</font></li></ul></li></ul> <font color="#2a2a2a">You can note this by writing &#128997; or &#129001; next to each answer or using emojis in a shared doc or notes app.<br /><br /><br />&#128172; Step 4: Share &amp; Reflect<br />Talk through these closing reflection questions together:</font><ol><li><font color="#2a2a2a">Did anything surprise you about what you noticed?</font></li><li><font color="#2a2a2a">How does knowing this change the way you look at social media?</font></li><li><font color="#2a2a2a">How do you feel now about the posts you usually see or share?</font></li><li><font color="#2a2a2a">How can you support each other in posting with intention?</font></li><li><font color="#2a2a2a">What does &ldquo;real life&rdquo; look like for you&mdash;and how can you celebrate that online or offline?</font></li><li><font color="#2a2a2a">How can we apply this investigation skill when we scroll in real life?</font></li></ol><br /><font color="#2a2a2a">&#8203;&#129504; <strong>Optional Extension/Reflection:</strong></font><br /><font color="#2a2a2a">&ldquo;How can we remind ourselves and others that we are more than what we post?&rdquo;<br />&ldquo;What does it mean to post with honesty or intention?&rdquo;</font><br /><br /><font color="#2a2a2a">&#128161; Optional Final Prompt:<br />&#8203;</font><font color="#2a2a2a">Write or voice-record your own personal reminder. Here are a couple of examples:<br /><strong>&ldquo;Just because it&rsquo;s online doesn&rsquo;t mean it&rsquo;s real. I am enough just as I am.&rdquo;</strong><br />OR<br /><strong>&ldquo;Before I post, I will ask: Who is this for? What am I really sharing?&rdquo;</strong></font></div>]]></content:encoded></item><item><title><![CDATA[S1.2 - Safe Spaces, Shared Screens]]></title><link><![CDATA[https://www.black-liberation.tech/safety-first/s12]]></link><comments><![CDATA[https://www.black-liberation.tech/safety-first/s12#comments]]></comments><pubDate>Sun, 29 Jun 2025 21:27:58 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.black-liberation.tech/safety-first/s12</guid><description><![CDATA[&#10024; Reflect &amp; Write: Creating Safe Online Environments &amp; Protecting Others&#9997;&#127997; Reflect &amp; Write QuestionsImagine you're hosting an online class or club meeting.What are three things you should check before turning on your camera or screen sharing?Why is it important to protect other people&rsquo;s privacy during a virtual session?What could happen if someone&rsquo;s name, face, or background is shared without permission?Think about a time when you were in an online se [...] ]]></description><content:encoded><![CDATA[<div class="paragraph"><font size="5"><font color="#2a2a2a" style="">&#10024; <strong style="">Reflect &amp; Write: </strong></font><strong style=""><font color="#2a2a2a" style="">Creating Safe Online Environments &amp; Protecting Others</font></strong></font><br /><font color="#2a2a2a">&#9997;&#127997; Reflect &amp; Write Questions</font><ol><li><font color="#2a2a2a"><strong>Imagine you're hosting an online class or club meeting.</strong><br />What are three things you should check before turning on your camera or screen sharing?</font></li><li><font color="#2a2a2a"><strong>Why is it important to protect other people&rsquo;s privacy during a virtual session?</strong><br />What could happen if someone&rsquo;s name, face, or background is shared without permission?</font></li><li><font color="#2a2a2a"><strong>Think about a time when you were in an online session.</strong><br />Did you notice anything personal in someone&rsquo;s background? How did it make you feel?</font></li><li><font color="#2a2a2a"><strong>What is identity theft?</strong><br />In your own words, explain how someone&rsquo;s information could be stolen and misused online.</font></li><li><font color="#2a2a2a"><strong>Oversharing can lead to someone pretending to be you.</strong><br />What are some things you can do to make sure your personal data stays safe in shared spaces?</font></li><li><font color="#2a2a2a"><strong>If you see someone sharing too much personal information in a group chat or online meeting, what should you do?</strong><br />How can you support them without embarrassing them?</font></li><li><font color="#2a2a2a"><strong>What does a safe online space look and feel like to you?</strong><br />List three rules or values you would use to build one for your friends or classmates.</font></li><li><font color="#2a2a2a"><strong>Write a short message you could post in a group chat or online meeting to remind others to stay safe and respectful online.</strong>&nbsp;"Hey everyone, just a quick reminder..."</font></li></ol></div>  <div id="855951484191353832"><div><style type="text/css">	#element-4803c160-2880-45b3-9456-29acce47c895 .colored-box-content {  clear: both;  float: left;  width: 100%;  -moz-box-sizing: border-box;  -webkit-box-sizing: border-box;  -ms-box-sizing: border-box;  box-sizing: border-box;  background-color: #5040ae;  padding-top: 20px;  padding-bottom: 20px;  padding-left: 20px;  padding-right: 20px;  -webkit-border-top-left-radius: 0px;  -moz-border-top-left-radius: 0px;  border-top-left-radius: 0px;  -webkit-border-top-right-radius: 0px;  -moz-border-top-right-radius: 0px;  border-top-right-radius: 0px;  -webkit-border-bottom-left-radius: 0px;  -moz-border-bottom-left-radius: 0px;  border-bottom-left-radius: 0px;  -webkit-border-bottom-right-radius: 0px;  -moz-border-bottom-right-radius: 0px;  border-bottom-right-radius: 0px;}</style><div id="element-4803c160-2880-45b3-9456-29acce47c895" data-platform-element-id="848857247979793891-1.0.1" class="platform-element-contents">	<div class="colored-box">    <div class="colored-box-content">        <div style="width: auto"><div></div><div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0px;margin-right:0px;text-align:center"><a><img src="https://www.black-liberation.tech/uploads/1/1/0/7/110733105/gemini-generated-image-qbgackqbgackqbga_orig.png" alt="Portrait of an Afro-Latina Corporate Privacy Engineer with long, curly hair, smiling confidently in an office setting." style="width:auto;max-width:100%" /></a><div style="display:block;font-size:90%">A confident Afro-Latina Corporate Privacy Engineer with beautiful, long curly hair smiles in her modern office, a digital network diagram on a screen in the background.</div></div></div><div class="paragraph"><font color="#fdfcfc"><strong>Corporate Privacy Engineer</strong> &#128188;&#128737;&#65039;<br />Designs systems and tools that safeguard employee data such as payroll, health records, and contact info. Works with HR and IT departments to manage access controls and security policies.</font></div></div>    </div></div></div><div style="clear:both;"></div></div></div>  <div class="paragraph"><strong><font color="#2a2a2a" size="5">Saturday Morning Workshop &ndash; &ldquo;Your Digital Space, Your Rules&rdquo;</font></strong><br /><br /><font color="#2a2a2a"><strong>Location:</strong> A local high school media center. Coffee, snacks, and chargers are set out on a table. Njoki sits in a circle with a group of high school girls and their mothers. Everyone has their phones nearby. The room is casual and welcoming.</font><br /><br /><font color="#2a2a2a"><strong>Njoki:&nbsp;</strong>Good morning, everyone. Thank you all for being here. I wanted us to have a real conversation&mdash;not just about what we see online, but how we build spaces that <em>protect</em> us and others.</font><br /><br /><font color="#2a2a2a">So let me ask you this: <strong>have you ever been in a virtual meeting and noticed something in someone&rsquo;s background that made you uncomfortable?</strong></font><br /><br /><font color="#2a2a2a"><strong>Kayla (16):&nbsp;</strong>Ugh, yes! One time, a girl had her whole medicine cabinet open behind her during a Zoom. You could read the labels on everything!</font><br /><br /><font color="#2a2a2a"><strong>Mrs. Jackson (Kayla&rsquo;s mom):&nbsp;</strong>Oh nooo. That&rsquo;s the kind of thing you don&rsquo;t even realize is visible until someone screenshots it.</font><br /><br /><font color="#2a2a2a"><strong>Njoki (nodding):&nbsp;</strong>Exactly. That&rsquo;s what I mean by <em>protecting the space.</em> When we host or even just participate in online sessions, we have to be intentional about what&rsquo;s showing&mdash;and what might show up later.</font><br /><br /><font color="#2a2a2a"><strong>Ava (17):&nbsp;</strong>I once saw someone&rsquo;s baby brother&rsquo;s school info on the fridge during a class. Full name and school name on a flyer.</font><br /><br /><font color="#2a2a2a"><strong>Njoki:&nbsp;</strong>That's such a good example. It&rsquo;s not always about <em>our</em> information, either. It&rsquo;s about being mindful that we&rsquo;re protecting <em>everyone</em> who shows up in our frame&mdash;even if they didn&rsquo;t choose to be seen.</font><br /><br /><font color="#2a2a2a"><strong>Mrs. Gomez (mother of two):&nbsp;</strong>I didn&rsquo;t know much about Zoom privacy settings until my job required us to do webinars. I had my full name and personal email just out there&mdash;no password on the meeting either.</font><br /><br /><font color="#2a2a2a"><strong>Njoki:&nbsp;</strong>That&rsquo;s real. And for folks in roles like yours&mdash;where you&rsquo;re managing information for others&mdash;it&rsquo;s even more important. Simple things like turning off name displays or using nicknames for kids in group calls can go a long way.</font><br /><br /><font color="#2a2a2a"><strong>Laila (15):&nbsp;</strong>Can we talk about identity theft for a second? Because my mom had her info stolen last year and it was&hellip; actually kind of scary.</font><br /><br /><font color="#2a2a2a"><strong>Mrs. Thompson (her mom, visibly unsettled):&nbsp;</strong>It was awful. Someone used my social to apply for loans I didn&rsquo;t take out. All because I posted a &ldquo;new job announcement&rdquo; with too much detail and used my birthday month in the caption. They pieced it all together.</font><br /><em><font color="#2a2a2a">(The room gets quiet.)</font></em><br /><br /><font color="#2a2a2a"><strong>Njoki (softly):&nbsp;</strong>Thank you for sharing that. I know that wasn&rsquo;t easy. And I&rsquo;m really sorry that happened to you. It shows how something that feels <em>celebratory</em> can be turned into a vulnerability.</font><br /><br /><font color="#2a2a2a">&#8203;That&rsquo;s why identity protection isn&rsquo;t just about keeping your passwords strong&mdash;it&rsquo;s about thinking, &ldquo;What does this post reveal about me that a stranger could use?&rdquo;</font><br /><br /><font color="#2a2a2a"><strong>Zuri (16, trying to lighten the moment):&nbsp;</strong>I&rsquo;m over here changing my Instagram bio in real-time.</font><br /><em><font color="#2a2a2a">(Everyone laughs a little, the tension breaking.)</font></em><br /><br /><font color="#2a2a2a"><strong>Njoki (smiling):&nbsp;</strong>Hey, that&rsquo;s growth in action.</font><br /><br /><font color="#2a2a2a"><strong>Mrs. Wilson:&nbsp;</strong>So how do we balance it? Like, we want to be proud of our kids, share moments, celebrate wins... but how do we keep it safe?</font><br /><br /><font color="#2a2a2a"><strong>Njoki:&nbsp;</strong>That&rsquo;s the big question. I like to say: <strong>&ldquo;If it feels like an announcement, make it private. If it feels like a memory, ask who needs to see it.&rdquo;</strong> Not everything has to be for everyone.</font><br /><br /><font color="#2a2a2a"><strong>Kayla:&nbsp;</strong>Okay wait, that&rsquo;s kind of deep.</font><br /><br /><font color="#2a2a2a"><strong>Mrs. Jackson (grinning):&nbsp;</strong>We need that on a mug.</font><br /><br /><font color="#2a2a2a"><strong>Njoki:&nbsp;</strong>So let&rsquo;s close with this: <em>What does a safe online space mean to you?</em> Not just for yourself&mdash;but for your family, your friends, your community.</font><br /><br /><font color="#2a2a2a"><strong>Ava:&nbsp;</strong>A place where I don&rsquo;t feel judged for what I <em>don&rsquo;t</em> share.</font><br /><br /><font color="#2a2a2a"><strong>Laila:&nbsp;</strong>Where people know I care about them even if I don&rsquo;t repost everything they post.</font><br /><br /><font color="#2a2a2a"><strong>Mrs. Thompson:&nbsp;</strong>Where I don&rsquo;t have to explain why I protect my peace. Even digitally.</font><br /><br /><font color="#2a2a2a"><strong>&#8203;Njoki:&nbsp;</strong>Yes. Yes. All of that. Safe online spaces don&rsquo;t just happen&mdash;they&rsquo;re <em>built.</em> And you all are already doing the work.</font><br /><br /><font color="#2a2a2a">Scene Ends:&nbsp;</font><font color="#2a2a2a">Moms and daughters exchange ideas, hugs, and plans to check their account settings when they get home. Njoki leaves them with a printed checklist titled:&nbsp;<strong>&ldquo;Before You Share: Is It Kind? Is It Clear? Is It Safe?&rdquo;</strong></font></div>  <div class="wsite-spacer" style="height:50px;"></div>  <div id="273067566907601101"><div><style type="text/css">	#element-b821ea4f-1304-444f-bade-129a4d9bc1ae .colored-box-content {  clear: both;  float: left;  width: 100%;  -moz-box-sizing: border-box;  -webkit-box-sizing: border-box;  -ms-box-sizing: border-box;  box-sizing: border-box;  background-color: #5040ae;  padding-top: 20px;  padding-bottom: 20px;  padding-left: 20px;  padding-right: 20px;  -webkit-border-top-left-radius: 0px;  -moz-border-top-left-radius: 0px;  border-top-left-radius: 0px;  -webkit-border-top-right-radius: 0px;  -moz-border-top-right-radius: 0px;  border-top-right-radius: 0px;  -webkit-border-bottom-left-radius: 0px;  -moz-border-bottom-left-radius: 0px;  border-bottom-left-radius: 0px;  -webkit-border-bottom-right-radius: 0px;  -moz-border-bottom-right-radius: 0px;  border-bottom-right-radius: 0px;}</style><div id="element-b821ea4f-1304-444f-bade-129a4d9bc1ae" data-platform-element-id="848857247979793891-1.0.1" class="platform-element-contents">	<div class="colored-box">    <div class="colored-box-content">        <div style="width: auto"><div></div><div class="paragraph"><font color="#fdfcfc"><strong><font size="5">&#8203;&#128737;&#65039; Building Safe Digital Spaces</font></strong><br /><br /><strong>&#128172; Warm-Up</strong><br />Think about a time you posted something online&mdash;or joined a video call.<br /><br />What did you notice in your background?<br /><br />Was there anything you forgot to hide or blur?<br /><br /><strong>&#9997;&#127997; Reflect &amp; Write</strong><br />1. Why is it important to protect other people&rsquo;s privacy in a webinar, group chat, or online meeting?<br /><br />2. What kind of personal information do people sometimes share without realizing it? List at least three examples.<br /><br />3. After hearing about identity theft in Njoki&rsquo;s group, what is something you will do differently online?<br /><br />4. Imagine you're helping to host a virtual event or study group. What are 3 things you would do to make sure everyone feels safe and respected?<br /><br />5. Njoki said, &ldquo;If it feels like an announcement, make it private. If it feels like a memory, ask who needs to see it.&rdquo; What does this mean to you?<br /><br /><strong>&#9989; Before You Share: Safety Checklist&nbsp;</strong><br />&#128306; I checked my background for personal or sensitive information.<br /><br />&#128306; I avoided showing mail, IDs, documents, or location clues.<br /><br />&#128306; I protected my attendees&rsquo; names, faces, and personal info.<br /><br />&#128306; I turned off automatic name displays if hosting a meeting.<br /><br />&#128306; I asked myself: Would I want a stranger to know this?<br /><br />&#128306; I used a nickname or initials if sharing about a child.<br /><br />&#128306; I reviewed my privacy settings before sharing.<br /><br />&#128306; I avoided posting someone else&rsquo;s image or info without asking.<br /><br />&#128306; I didn&rsquo;t include my birthday, address, or phone number.<br /><br />&#128306; I paused and asked: Is this kind? Is this clear? Is this safe?<br /><br /><strong>&#128161; Bonus Prompt</strong><br />Write a short message you could send in a group chat or post online to remind your community to stay safe and thoughtful online.<br />&ldquo;Hey everyone, before we go live/share, let&rsquo;s remember&hellip;&rdquo;</font></div></div>    </div></div></div><div style="clear:both;"></div></div></div>  <div class="wsite-spacer" style="height:50px;"></div>  <div class="paragraph"><font color="#2a2a2a"><strong><font size="5">&#128272; &ldquo;AI in My Space: Safe, Smart, and Respectful Use&rdquo;</font></strong><br /><br /><strong>&#128172; What You&rsquo;re Going to Do</strong><br />You and your mother (guardian or mentor) will explore how to use generative AI platforms like ChatGPT or Gemini </font><span style="color:rgb(42, 42, 42)">safely</span><font color="#2a2a2a">. These platforms are powerful tools&mdash;but just like social media, you must protect your personal information and know how to create safe, respectful online spaces.<br /><br />In this activity, you will:<br />&#128313; Learn how to use generative AI in a safe way.<br />&#128313; Recognize how PII and overly personal prompts can lead to risk.<br />&#128313; Collaborate with family or mentors on household/group norms for AI use.<br />&#128313; Practice asking questions and getting helpful answers.<br />&#128313; Practice healthy AI habits for safe and productive use.<br />&#128313; Analyze AI output critically for accuracy, bias, or red flags.<br />&#128313; Make your own &ldquo;AI Safety Poster&rdquo; to remind yourself of smart online habits.<br />&nbsp;<br /><strong>&#128242; Materials Needed</strong><br />&#128313; A device with internet access (phone, tablet, laptop)<br />&#128313; Access to a generative AI platform (e.g., ChatGPT, Gemini)<br />&#128313; Something to write with (or use a digital notepad)<br />&#128313; Access to a platform to create a digital flyer (Canva) OR paper and craft supplies<br />&#128313; About 45 minutes to work together<br /><br /><strong>&#129504; THINK: Explore and Discuss</strong><br />Read these tips with your mother, guardian, or mentor. Use sticky notes or a shared Google Doc to write 5&ndash;7 "Safe Prompt Rules" for your home.<br /><br />Examples:<br />&#128073;&#127997; Never share your real name, address, school, phone number, email, or usernames.<br />&#128073;&#127997; Use general language (&ldquo;a student&rdquo; instead of &ldquo;me at MLK High&rdquo;).<br />&#128073;&#127997; Don&rsquo;t share stories, photos, or family details without permission.<br />&#128073;&#127997; Ask yourself: Would I say this to a stranger?<br />&#128073;&#127997; Keep advice from AI in draft form. Always talk to a real person before acting on it.<br />&#128073;&#127997; Double-check what AI tells you using a search engine and reliable sources.<br />&#128073;&#127997; Ask questions that help you learn, grow, or create something positive.<br /><br /><strong>&#8203;&#128522; Now talk together about this:</strong><br />1.&nbsp;&nbsp;&nbsp;&nbsp; Why should you keep personal information private, even from a chatbot?<br />2.&nbsp;&nbsp;&nbsp;&nbsp; What kinds of questions feel safe to ask AI?<br />3.&nbsp;&nbsp;&nbsp;&nbsp; What would you do if the answer felt wrong?<br /><br /><strong>TRY IT: Prompt + Audit + Submit</strong><br />Choose an AI tool (ChatGPT, Gemini, etc.) and write a prompt. Before you enter it, use this checklist:<br /><br /><strong>&#128221; Safe Prompt Checklist</strong><br />[ ] I did not use real names or usernames.<br />[ ] I did not include someone else&rsquo;s story.<br />[ ] I wrote things in a general way.<br />[ ] I used kind, respectful words.<br />[ ] I feel safe asking this question.<br /><br /><strong>&#128191; Examples of Safe Prompts:</strong><br />&#127837; Help me write a recipe for [dish] for someone who is lactose intolerant.<br />&#127873; Give me gift ideas for a friend who likes [hobby].<br />&#128196; Pretend to be a [job] interviewer&mdash;what are 5 questions you would ask someone applying for [scholarship or role]?<br /><br /><strong>&#128172; Ask Yourself:</strong><br />Would someone be able to guess who I am from this prompt?<br />&#8203;Would I feel safe reading this if it were posted by someone else?</font><br /><br /><br /><font color="#2a2a2a"><strong>&#129397; FACT CHECK: What Did It Say? Could This Be Harmful?</strong><br />1.&nbsp;&nbsp;&nbsp;&nbsp; Read the AI&rsquo;s answer aloud.<br />2.&nbsp;&nbsp;&nbsp;&nbsp; Analyze the response:</font><ul><li><font color="#2a2a2a">Is it giving false information?</font></li><li><font color="#2a2a2a">Is it biased or inappropriate?</font></li><li><font color="#2a2a2a">Does it sound unsafe?</font></li><li><font color="#2a2a2a">Would a trusted adult say the same thing?</font></li></ul> <font color="#2a2a2a">3.&nbsp;&nbsp;&nbsp;&nbsp; Use Google or a trusted site to double-check anything that feels wrong.<br />&#128313; Bonus: Search &ldquo;When ChatGPT got it wrong&rdquo; or &ldquo;AI bias examples&rdquo; and talk about what could have been done differently.<br /><br /><strong><font size="4">&#127912; CREATE: Your AI Safety Poster</font></strong><br />Make your own &ldquo;My AI Safety Poster.&rdquo;<br />Include:<br />&#128313; 3 rules for using AI safely<br />&#128313; 2 safe types of questions to ask<br />&#128313; 1 thing you want to remember<br />&#127912; Decorate it with drawings, colors, or photos.<br />&#128198; Save it as your phone or tablet lock screen for a week. Or print it and hang it on your refrigerator at home.<br /><br /><strong>&#128172; REFLECT: Write or Share</strong><br />&#128195; What surprised you most about using AI?<br />&#129300; How did you feel reading the AI&rsquo;s answers?<br />&#127775; What new rule or habit will you use moving forward?<br />&#128150; How can you help a friend use AI safely?<br /><br /><strong>&#128451;&#65039; BONUS SEARCH</strong><br />Search online:<br />&#128269; &ldquo;What are safe ways kids can use AI?&rdquo;<br />&#128269; &ldquo;How do AI platforms protect your information?&rdquo;<br />Write down 2 facts that surprised you!</font></div>]]></content:encoded></item><item><title><![CDATA[S1.1 - Be Seen, Not Exposed]]></title><link><![CDATA[https://www.black-liberation.tech/safety-first/s11]]></link><comments><![CDATA[https://www.black-liberation.tech/safety-first/s11#comments]]></comments><pubDate>Sun, 29 Jun 2025 18:44:46 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.black-liberation.tech/safety-first/s11</guid><description><![CDATA[&#9997;&#127997; Reflect &amp; Write Questions: Practicing Safe Behavior OnlineWhy do you think it&rsquo;s risky to post your birthday or who you live with on social media?&nbsp;How could someone use that information in a bad way?Think about the last picture you posted or shared.&nbsp;What was in the background? Could anything personal be seen?Have you ever seen a picture online with someone&rsquo;s car and license plate showing?&nbsp;How did that make you feel? What could go wrong if that infor [...] ]]></description><content:encoded><![CDATA[<div class="paragraph"><font color="#2a2a2a" size="3"><strong>&#9997;&#127997; Reflect &amp; Write Questions: Practicing Safe Behavior Online</strong></font><ol><li><font color="#2a2a2a"><strong>Why do you think it&rsquo;s risky to post your birthday or who you live with on social media?</strong></font>&nbsp;<font color="#2a2a2a">How could someone use that information in a bad way?</font><br /></li><li><font color="#2a2a2a"><strong>Think about the last picture you posted or shared.</strong></font>&nbsp;<font color="#2a2a2a">What was in the background? Could anything personal be seen?</font><br /></li><li><font color="#2a2a2a"><strong>Have you ever seen a picture online with someone&rsquo;s car and license plate showing?</strong></font>&nbsp;<font color="#2a2a2a">How did that make you feel? What could go wrong if that information got into the wrong hands?</font><br /></li><li><font color="#2a2a2a"><strong>Why might family pictures sometimes reveal more than we expect?</strong></font>&nbsp;<font color="#2a2a2a">Give an example of a photo that might seem harmless but could share too much.</font><br /></li><li><font color="#2a2a2a"><strong>Imagine a stranger is looking at your photos or posts.</strong></font>&nbsp;<font color="#2a2a2a">What parts of your home would you <em>not</em> want them to see? Why?</font><br /></li><li><font color="#2a2a2a"><strong>What&rsquo;s something simple you can do before posting a picture to make sure it&rsquo;s safe to share?</strong></font>&nbsp;<font color="#2a2a2a">Write down one or two steps you will take from now on.</font>&nbsp;<br /></li><li><font color="#2a2a2a"><strong>What would you do if a friend posted a photo of you that shared too much personal info (like your house or school name)?</strong></font>&nbsp;<font color="#2a2a2a">How would you talk to them about it?</font><br /></li><li><font color="#2a2a2a"><strong>Write a message to your future self reminding you how to stay safe online when sharing pictures or videos.</strong></font>&nbsp;<font color="#2a2a2a">Start your message with:</font>&#8203;&nbsp;<font color="#2a2a2a">"Hey future me, before you post, remember..."</font></li></ol></div>  <div id="332016858351372544"><div><style type="text/css">	#element-a7823cdd-b25a-4c36-8050-2c4115eecb56 .colored-box-content {  clear: both;  float: left;  width: 100%;  -moz-box-sizing: border-box;  -webkit-box-sizing: border-box;  -ms-box-sizing: border-box;  box-sizing: border-box;  background-color: #24678d;  padding-top: 20px;  padding-bottom: 20px;  padding-left: 20px;  padding-right: 20px;  -webkit-border-top-left-radius: 0px;  -moz-border-top-left-radius: 0px;  border-top-left-radius: 0px;  -webkit-border-top-right-radius: 0px;  -moz-border-top-right-radius: 0px;  border-top-right-radius: 0px;  -webkit-border-bottom-left-radius: 0px;  -moz-border-bottom-left-radius: 0px;  border-bottom-left-radius: 0px;  -webkit-border-bottom-right-radius: 0px;  -moz-border-bottom-right-radius: 0px;  border-bottom-right-radius: 0px;}</style><div id="element-a7823cdd-b25a-4c36-8050-2c4115eecb56" data-platform-element-id="848857247979793891-1.0.1" class="platform-element-contents">	<div class="colored-box">    <div class="colored-box-content">        <div style="width: auto"><div></div><div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0px;margin-right:0px;text-align:center"><a><img src="https://www.black-liberation.tech/uploads/1/1/0/7/110733105/gemini-generated-image-tcl4wttcl4wttcl4_orig.png" alt="Image of an African-American woman with Bantu knots working as an Education Data Security Analyst." style="width:auto;max-width:100%" /></a><div style="display:block;font-size:90%">A professional portrait of an African-American woman with meticulously styled Bantu knots, showcasing her expertise as an Education Data Security Analyst.</div></div></div><div class="paragraph"><font color="#fdfcfc"><strong style="">Education Data Security Analyst</strong> &#127979;&#128272;<br />Works with schools and universities to protect student records, grades, and personal data. Ensures compliance with laws like FERPA and prevents data breaches involving student information.</font><br /><span></span></div></div>    </div></div></div><div style="clear:both;"></div></div></div>  <div class="paragraph"><strong><font color="#2a2a2a">Community Workshop in a Church Fellowship Hall &ndash; &ldquo;Digital Safety &amp; Smart Posting&rdquo;<br />&#8203;</font></strong><font color="#2a2a2a"><strong>Setting:</strong> A small group of moms and daughters sit in folding chairs arranged in a circle. A sign near the front reads: <em>"</em></font><em><span><font color="#2a2a2a">Be Seen, Not Exposed</font></span></em><font color="#2a2a2a"><em> &ndash; Protecting What Matters Online."</em> Ebony stands at the front with a digital tablet and a warm smile. There's a table with water bottles, notepads, and mini cupcakes nearby.</font><br /><br /><font color="#2a2a2a"><strong>Ebony:&nbsp;</strong>Thank y&rsquo;all for being here. I know your Saturdays are busy, so I promise to keep it real and keep it moving. We&rsquo;re here to talk about what we post, how we post, and why it matters.</font><br /><br /><font color="#2a2a2a"><strong>Ebony (holding up her tablet):&nbsp;</strong>Let&rsquo;s start with a quick one. If I took a selfie in my kitchen right now and posted it to Instagram&hellip; what&rsquo;s something in the background that could cause a problem?</font><br /><br /><font color="#2a2a2a"><strong>Mia (14):&nbsp;</strong>Ooo, like your address on a package or something?</font><br /><br /><font color="#2a2a2a"><strong>Ebony:&nbsp;</strong><em>Exactly.</em> That&rsquo;s detail in the background. I saw a girl post a &ldquo;clean with me&rdquo; video and forgot she had her school ID on the fridge. Some creep found out what school she went to.</font><br /><br /><font color="#2a2a2a"><strong>Mrs. Allen (mom of 13-year-old twins):&nbsp;</strong><em>That&rsquo;s crazy!</em> These apps are cute until somebody shows up in your real life. I tell my girls all the time: check the background like you check your teeth in the mirror--<em>every time.</em></font><br /><em><font color="#2a2a2a">(Everyone chuckles.)</font></em><br /><br /><font color="#2a2a2a"><strong>Ebony (laughing):&nbsp;</strong>Yes, Mrs. Allen! That&rsquo;s going on a T-shirt.</font><br /><br /><font color="#2a2a2a"><strong>Naima (16):&nbsp;</strong>My friend posted a family BBQ video last summer, and her little cousin&rsquo;s birth certificate was in the shot. I was like, &ldquo;Girl&hellip; take that DOWN!&rdquo;</font><br /><br /><font color="#2a2a2a"><strong>Ebony:&nbsp;</strong>Whew! Y&rsquo;all are proving my point better than I could. Your home is sacred. What&rsquo;s in it&mdash;who&rsquo;s in it&mdash;those things are for you, not the internet.</font><br /><br /><font color="#2a2a2a"><strong>Jazlyn (12):&nbsp;</strong>Wait&hellip; so family pictures too?</font><br /><br /><font color="#2a2a2a"><strong>Ebony:&nbsp;</strong>Yes, ma&rsquo;am. Even family photos can give clues. A t-shirt with your school name, the view outside your window, a trophy with your last name on it&mdash;it all adds up. Folks zoom in.</font><br /><br /><font color="#2a2a2a"><strong>Mrs. Rivera (quiet but firm):&nbsp;</strong>Can I say something? Last year, my niece posted a birthday photo of her new car. Her plates were showing. A week later someone tried to follow her home from the gas station.</font><br /><em><font color="#2a2a2a">(The room goes silent.)</font></em><br /><br /><font color="#2a2a2a"><strong>Mrs. Rivera (voice rising):&nbsp;</strong>I was <em>livid.</em> Not at her&mdash;for not knowing. But at how fast it happened. That car picture was up for ten minutes. Ten.</font><br /><br /><font color="#2a2a2a"><strong>Ebony (gently):&nbsp;</strong>Thank you for sharing that. That anger? That&rsquo;s <em>real.</em> But so is the power we have when we <em>know better.</em> That&rsquo;s what this space is for. No shame. Just lessons.</font><br /><br /><font color="#2a2a2a"><strong>Tamara (15):&nbsp;</strong>So like&hellip; you shouldn&rsquo;t even post your birthday?</font><br /><br /><font color="#2a2a2a"><strong>Ebony:&nbsp;</strong>Here&rsquo;s the deal&mdash;your birthdate, your address, who you live with&mdash;those are <em>identity markers.</em> Companies ask you those questions for a reason. And if someone&rsquo;s trying to guess your password or fake your identity? That info helps them.</font><br /><br /><font color="#2a2a2a"><strong>Mia (playfully):&nbsp;</strong>What if I just post &ldquo;It&rsquo;s my birthday!&rdquo; but no year?</font><br /><br /><font color="#2a2a2a"><strong>Ebony (smiling):&nbsp;</strong>Smart! That&rsquo;s a safer move. Celebrate without the receipts.</font><br /><br /><font color="#2a2a2a"><strong>Mrs. Allen (smirking):&nbsp;</strong>Okay, but what about us mamas? Sometimes we post y&rsquo;all in pajamas with the house address on the mailbox. I&rsquo;m guilty.</font><br /><br /><font color="#2a2a2a"><strong>Ebony (grinning):&nbsp;</strong>We love y&rsquo;all, but yes&mdash;even parents gotta check the frame! Your love can still be private and powerful.</font><br /><br /><font color="#2a2a2a"><strong>Naima:&nbsp;</strong>So it&rsquo;s not just about what we post&mdash;but what&rsquo;s <em>in</em> the post?</font><br /><br /><font color="#2a2a2a"><strong>Ebony:&nbsp;</strong><em>Exactly.</em> What you post, what&rsquo;s around you, what&rsquo;s in the background&mdash;it all tells a story. The question is, <strong>who are you telling it to&mdash;and do they deserve the story?</strong></font><br /><br /><font color="#2a2a2a"><strong>Tamara (softly):&nbsp;</strong>I think I overshare sometimes. Not on purpose, but just&hellip; not thinking.</font><br /><br /><font color="#2a2a2a"><strong>Ebony:&nbsp;</strong>We&rsquo;ve <em>all</em> done it. But you just had your &ldquo;ah ha&rdquo; moment. That&rsquo;s how we grow.</font><br /><br /><font color="#2a2a2a"><strong>Mrs. Rivera:&nbsp;</strong>Can we get a checklist or something? Like &ldquo;Before You Post: Did You&hellip;&rdquo;</font><br /><br /><font color="#2a2a2a"><strong>Ebony:&nbsp;</strong>Yes, ma&rsquo;am! I got y&rsquo;all. We&rsquo;re gonna build that together. Before we wrap, let me leave you with this:&nbsp;<strong>Everything you post is a piece of you. Make sure every piece is safe, strong, and sacred.</strong></font><br /><br /><strong><font color="#2a2a2a">Scene Closes</font></strong><br /><font color="#2a2a2a">The room fills with a hum of conversation, a few hugs, and some thoughtful silence. Ebony walks over to Mia and quietly hands her a sticky note: &ldquo;You&rsquo;re more powerful than your posts. Use that power wisely.&rdquo;</font></div>  <div class="wsite-spacer" style="height:50px;"></div>  <div id="140733789464643215"><div><style type="text/css">	#element-d8159a40-1c75-4859-aa83-f18437694178 .colored-box-content {  clear: both;  float: left;  width: 100%;  -moz-box-sizing: border-box;  -webkit-box-sizing: border-box;  -ms-box-sizing: border-box;  box-sizing: border-box;  background-color: #24678d;  padding-top: 20px;  padding-bottom: 20px;  padding-left: 20px;  padding-right: 20px;  -webkit-border-top-left-radius: 0px;  -moz-border-top-left-radius: 0px;  border-top-left-radius: 0px;  -webkit-border-top-right-radius: 0px;  -moz-border-top-right-radius: 0px;  border-top-right-radius: 0px;  -webkit-border-bottom-left-radius: 0px;  -moz-border-bottom-left-radius: 0px;  border-bottom-left-radius: 0px;  -webkit-border-bottom-right-radius: 0px;  -moz-border-bottom-right-radius: 0px;  border-bottom-right-radius: 0px;}</style><div id="element-d8159a40-1c75-4859-aa83-f18437694178" data-platform-element-id="848857247979793891-1.0.1" class="platform-element-contents">	<div class="colored-box">    <div class="colored-box-content">        <div style="width: auto"><div></div><div class="paragraph"><font color="#fdfcfc"><strong><font size="5">&#9989; <strong style="">Before You Post: Did You&hellip;?</strong></font></strong><br />&nbsp;<br /><strong style="">&#128309;</strong><strong style=""> Girls: Think Before You Post</strong><br /></font><ul><li><font color="#fdfcfc">Avoid showing your school name or uniform.</font></li><li><font color="#fdfcfc">Keep birthdate, location, and driver's permit private.</font></li><li><font color="#fdfcfc">Don&rsquo;t post bedroom or bathroom selfies.</font></li><li><font color="#fdfcfc">Ask permission before tagging a friend.</font></li><li><font color="#fdfcfc">Don&rsquo;t post &ldquo;in the moment&rdquo; (share later if it&rsquo;s safe).</font></li></ul><font color="#fdfcfc"><br /><br /><strong>&#128308;</strong><strong> Moms: Lead by Example</strong><br /></font><ul><li><font color="#fdfcfc">Avoid posting children&rsquo;s full names and school details.</font></li><li><font color="#fdfcfc">Blur or block home addresses/license plates in photos.</font></li><li><font color="#fdfcfc">Don&rsquo;t overshare family routines or schedules.</font></li><li><font color="#fdfcfc">Respect teens' privacy&mdash;ask before posting their pics.</font></li><li><font color="#fdfcfc">Avoid "first day" signs that reveal school grade &amp; teacher.</font></li></ul><font color="#fdfcfc"><br /><br /><strong>&#128995;</strong><strong> Both: Be Seen, Not Exposed</strong><br /></font><ul><li><font color="#fdfcfc">Check the background before posting (no IDs, documents, mail).</font></li><li><font color="#fdfcfc">Use privacy settings and review your audience.</font></li><li><font color="#fdfcfc">Ask: &ldquo;Would I want a stranger to know this?&rdquo;</font></li><li><font color="#fdfcfc">Think long-term: Will this post still feel okay in 5 years?</font></li><li><font color="#fdfcfc">Delete and report anything that feels unsafe or inappropriate.</font></li></ul></div></div>    </div></div></div><div style="clear:both;"></div></div></div>  <div class="wsite-spacer" style="height:50px;"></div>  <div class="paragraph"><font color="#2a2a2a">&#128269; <strong>Interactive Activity: &ldquo;Spot the Scam &amp; Secure the Bag&rdquo;</strong></font><br /><br /><font color="#2a2a2a"><strong>Objective:</strong> Strengthen awareness of fraud risks and prevention strategies related to <strong>online financial transactions</strong>, <strong>PII</strong>, and <strong>digital visibility.</strong></font><br /><br /><font color="#2a2a2a">&#129504; <strong>Overview</strong></font><br /><font color="#2a2a2a">In this session, participants will:</font><ul><li><font color="#2a2a2a">Identify <strong>PII vulnerabilities</strong> in payment apps &amp; social profiles</font></li><li><font color="#2a2a2a">Learn to <strong>recognize scams</strong> involving Cash App, PayPal, Zelle, and Venmo</font></li><li><font color="#2a2a2a">Conduct <strong>live research</strong> using trusted sources</font></li><li><font color="#2a2a2a">Create a <strong>fraud prevention toolkit</strong> as a family or accountability team</font></li><li><font color="#2a2a2a">Simulate a safe online money transfer scenario</font></li></ul><br /><font color="#2a2a2a">&#129534; <strong>Materials Needed</strong></font><ul><li><font color="#2a2a2a">Smartphone or laptop</font></li><li><font color="#2a2a2a">Internet access</font></li><li><font color="#2a2a2a">Digital journal, notepad app, or worksheet</font></li><li><font color="#2a2a2a">Sample cash transfer app screens (real or printed screenshots)</font></li><li><span><font color="#2a2a2a">Optional: Review videos from </font><strong><a href="https://www.youtube.com/@ShyFraudTv"><font color="#0004f8">ShyFraudTv</font></a></strong> <font color="#2a2a2a">[linked] YouTube Channel or TikTok</font></span></li></ul><br /><font color="#2a2a2a">&#128450;&#65039; <strong>Part 1: PII Heat Check &mdash; &ldquo;What&rsquo;s in Your Feed?&rdquo; (15 mins)</strong></font><br /><strong><font color="#2a2a2a">Instructions:</font></strong><ol><li><font color="#2a2a2a">Open your favorite social media profile or post archive.</font></li><li><font color="#2a2a2a">Look for anything that may reveal <strong>financially sensitive PII</strong>, such as:</font><ul><li><font color="#2a2a2a">&#128197; Full birthdate</font></li><li><font color="#2a2a2a">&#128247; Screenshots with visible <strong>credit/debit cards</strong></font></li><li><font color="#2a2a2a">&#128184; Payment usernames (e.g., $YourName, @YourPayPalHandle)</font></li><li><font color="#2a2a2a">&#129534; Receipts or order confirmations</font></li><li><font color="#2a2a2a">&#129485; Tagging of family members ("My mom paid," "Dad's card")</font></li></ul></li></ol> <font color="#2a2a2a"><strong>Prompt:</strong><br />In your digital notepad, write:</font><ul><li><font color="#2a2a2a">&#128272; What surprised you most?</font></li><li><font color="#2a2a2a">&#129533; What did you delete, edit, or blur out?</font></li><li><font color="#2a2a2a">&#127919; How would a scammer use that information?</font></li></ul><br /><font color="#2a2a2a">&#128187; <strong>Part 2: Scam Sleuths &mdash; &ldquo;Search It to Believe It&rdquo; (20 mins)</strong></font><br /><font color="#2a2a2a"><strong>Instructions:</strong><br />Search engines ready! As a team, complete this research challenge. Use <strong>.gov, .org, or official app websites</strong> only. Answer these prompts in your notebook:</font><ol><li><font color="#2a2a2a">&#128269; Search: <em>&ldquo;Top Cash App scams teens should know&rdquo;</em><br />&rarr; Write down 3 red flags from your findings.</font></li><li><font color="#2a2a2a">&#128269; Search: <em>&ldquo;Zelle fraud protection tips&rdquo;</em><br />&rarr; Find one thing Zelle does <strong>not</strong> do to protect users.</font></li><li><font color="#2a2a2a">&#128269; Search: <em>&ldquo;How to report fraud on PayPal&rdquo;</em><br />&rarr; Write down the <strong>steps</strong> to take if someone sends you a fake request.</font></li><li><font color="#2a2a2a">&#128269; Search: <em>&ldquo;Safe ways to accept money online as a student&rdquo;</em><br />&rarr; List 3 best practices.</font></li><li><font color="#2a2a2a">Bonus: Use Google or DuckDuckGo to search:<br /><em>&ldquo;What is phishing?&rdquo;</em> + <em>&ldquo;Examples of payment scams on Instagram/TikTok.&rdquo;</em><br />&rarr; Summarize a real-world example and how it could&rsquo;ve been prevented.</font></li></ol><br /><font color="#2a2a2a">&#128736;&#65039; <strong>Part 3: Build Your Family Fraud Toolkit (20 mins)<br />&#8203;</strong></font><font color="#2a2a2a"><strong>Instructions:</strong><br />With your partner, complete the <strong>Fraud Prevention Toolkit</strong> together. Discuss and document:</font><br /><font color="#2a2a2a">&#9989; Create a rule for:</font><ul><li><font color="#2a2a2a">When to share or request payment</font></li><li><font color="#2a2a2a">What apps you use for different purposes</font></li><li><font color="#2a2a2a">When to delete messages or block senders</font></li><li><font color="#2a2a2a">What to do if you accidentally send money to the wrong person</font></li></ul> <font color="#2a2a2a">&#9989; Set up:</font><ul><li><font color="#2a2a2a">Strong passwords for payment apps</font></li><li><font color="#2a2a2a">Two-step verification for your accounts</font></li><li><font color="#2a2a2a">Nicknames instead of real names in payment apps</font></li></ul> <font color="#2a2a2a">&#9989; Make a &ldquo;NEVER DO THIS&rdquo; list:</font><ul><li><font color="#2a2a2a">Don&rsquo;t send money to strangers</font></li><li><font color="#2a2a2a">Don&rsquo;t click unknown links to claim money</font></li><li><font color="#2a2a2a">Don&rsquo;t post your handle with: &ldquo;Send me $5 and I&rsquo;ll double it&rdquo;</font></li></ul><br /><font color="#2a2a2a">&#128172; <strong>Reflection Prompts (To Close the Session)</strong></font><ul><li><font color="#2a2a2a">What&rsquo;s something new you learned today about online payments?</font></li><li><font color="#2a2a2a">What would you tell your best friend or younger sibling after this session?</font></li><li><font color="#2a2a2a">Do you feel more confident spotting a scam? Why or why not?</font></li></ul><br /><font color="#2a2a2a">&#10024; <strong>Optional Extension: Role-Play + Toolkit Share-Out (15 mins)</strong></font><ul><li><font color="#2a2a2a">Choose a sample scam and <strong>act it out</strong>: one person plays the scammer, the other protects themselves.</font></li><li><font color="#2a2a2a">Share your Toolkit tips with another pair and exchange ideas.</font></li></ul></div>]]></content:encoded></item><item><title><![CDATA[S1.0 - Private Info, Public World]]></title><link><![CDATA[https://www.black-liberation.tech/safety-first/s10-private-info-public-world]]></link><comments><![CDATA[https://www.black-liberation.tech/safety-first/s10-private-info-public-world#comments]]></comments><pubDate>Sun, 29 Jun 2025 17:01:53 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.black-liberation.tech/safety-first/s10-private-info-public-world</guid><description><![CDATA[Reflect and Write: What is Personal Information and Why Does it Matter?Why do you think it's a bad idea to post your home address online?Write about what could happen if someone you don&rsquo;t know finds out where you live.Have you ever seen someone share their phone number online?How did it make you feel? What advice would you give them?Think about your email address.Who should be allowed to see it, and why should you keep it private?What does &ldquo;Stranger Danger&rdquo; mean in the digital  [...] ]]></description><content:encoded><![CDATA[<div class="paragraph"><strong><font color="#2a2a2a">Reflect and Write: What is Personal Information and Why Does it Matter?</font></strong><ol><li><font color="#2a2a2a"><strong>Why do you think it's a bad idea to post your home address online?</strong><br />Write about what could happen if someone you don&rsquo;t know finds out where you live.</font><br /><span></span></li><li><font color="#2a2a2a"><strong>Have you ever seen someone share their phone number online?</strong><br />How did it make you feel? What advice would you give them?</font><br /><span></span></li><li><font color="#2a2a2a"><strong>Think about your email address.</strong><br />Who should be allowed to see it, and why should you keep it private?</font><br /><span></span></li><li><font color="#2a2a2a"><strong>What does &ldquo;Stranger Danger&rdquo; mean in the digital world?</strong><br />How is it the same or different from danger in real life?</font><br /><span></span></li><li><font color="#2a2a2a"><strong>Imagine someone online starts asking personal questions like &ldquo;Where do you live?&rdquo; or &ldquo;What school do you go to?&rdquo;</strong><br />What would you do? Why is it important to think before you answer?</font><br /><span></span></li><li><font color="#2a2a2a"><strong>Have you ever chatted with someone online that you didn&rsquo;t know in real life?</strong><br />What steps did you take to stay safe&mdash;or what would you do differently next time?</font><br /><span></span></li><li><font color="#2a2a2a"><strong>Why do you think some people feel safe sharing personal information on social media?</strong><br />What are some risks they might not be thinking about?</font><br /><span></span></li><li><font color="#2a2a2a"><strong style="">If your younger cousin or sibling asked you about sharing personal info online, what would you tell them?</strong><br />Write a short letter giving them three safety tips.</font><br /><span></span></li></ol></div>  <div id="784455542189350952"><div><style type="text/css">	#element-c1676f02-78b4-47ac-b10e-ebe97ec5faf8 .colored-box-content {  clear: both;  float: left;  width: 100%;  -moz-box-sizing: border-box;  -webkit-box-sizing: border-box;  -ms-box-sizing: border-box;  box-sizing: border-box;  background-color: #ae40a5;  padding-top: 20px;  padding-bottom: 20px;  padding-left: 20px;  padding-right: 20px;  -webkit-border-top-left-radius: 0px;  -moz-border-top-left-radius: 0px;  border-top-left-radius: 0px;  -webkit-border-top-right-radius: 0px;  -moz-border-top-right-radius: 0px;  border-top-right-radius: 0px;  -webkit-border-bottom-left-radius: 0px;  -moz-border-bottom-left-radius: 0px;  border-bottom-left-radius: 0px;  -webkit-border-bottom-right-radius: 0px;  -moz-border-bottom-right-radius: 0px;  border-bottom-right-radius: 0px;}</style><div id="element-c1676f02-78b4-47ac-b10e-ebe97ec5faf8" data-platform-element-id="848857247979793891-1.0.1" class="platform-element-contents">	<div class="colored-box">    <div class="colored-box-content">        <div style="width: auto"><div></div><div><div class="wsite-image wsite-image-border-none " style="padding-top:10px;padding-bottom:10px;margin-left:0px;margin-right:0px;text-align:center"><a><img src="https://www.black-liberation.tech/uploads/1/1/0/7/110733105/gemini-generated-image-eb6mwaeb6mwaeb6m_orig.png" alt="African-American woman with long, vibrant purple locks, holding a smartphone, representing a Social Media Security Specialist." style="width:auto;max-width:100%" /></a><div style="display:block;font-size:90%">A stylish African-American Social Media Security Specialist with striking purple braided locks thoughtfully holds a smartphone in a modern office environment.</div></div></div><div class="paragraph"><font color="#fdfcfc"><strong style="">Social Media Security Specialist</strong> &#128241;&#129504;<br /><span style="font-family: Montserrat; letter-spacing: 0.02em; background-color: transparent;">Protects users&rsquo; personal information and accounts on platforms like Instagram, TikTok, or YouTube.&nbsp;</span><span style="font-family: Montserrat; letter-spacing: 0.02em; background-color: transparent;">Investigates phishing attacks, prevents account takeovers, and designs better privacy settings.</span></font><br /><span></span></div></div>    </div></div></div><div style="clear:both;"></div></div></div>  <div class="paragraph"><strong><font color="#2a2a2a">After-school Tech Club Meeting<br />&#8203;</font></strong><font color="#2a2a2a"><strong>Jazmin</strong> walks into the room smiling, her notebook in hand and her curly hair pulled into a puff. A group of about 10 girls of various backgrounds, ages 12&ndash;17, are waiting with snacks and open minds.</font><br /><font color="#2a2a2a"><strong><br />Jazmin:&nbsp;</strong>Hey everyone! It&rsquo;s so good to see y&rsquo;all again. Before we start, raise your hand if you&rsquo;ve posted something online in the last 24 hours.</font><br /><em><font color="#2a2a2a">(Most hands go up. One girl raises both hands.)</font></em><br /><font color="#2a2a2a"><strong><br />Jazmin (laughing):&nbsp;</strong>Okay, two hands? What were you posting? Spill it.</font><br /><font color="#2a2a2a"><strong><br />Layla (13, playfully):&nbsp;</strong>A dance video and a &ldquo;Get Ready With Me&rdquo; from this morning. I was feelin&rsquo; myself!</font><br /><font color="#2a2a2a"><strong><br />Jazmin:&nbsp;</strong>Yesss, confidence! Love that. Now tell me&hellip; did you check your background before you posted?</font><br /><font color="#2a2a2a"><strong><br />Layla (pauses):&nbsp;</strong>Um&hellip; I think so? Wait&mdash;my house number might&rsquo;ve been on the mailbox behind me.</font><br /><font color="#2a2a2a"><strong><br />Jazmin (gently):&nbsp;</strong>That&rsquo;s real. It happens. But let&rsquo;s talk about why that&rsquo;s not just a detail&mdash;it&rsquo;s personal. It&rsquo;s <em>location information.</em> If someone wanted to find you... they could.</font><br /><font color="#2a2a2a"><strong><br />Destiny (14):&nbsp;</strong>Like those people who find where celebrities live?</font><br /><font color="#2a2a2a"><strong><br />Jazmin:&nbsp;</strong>Exactly. But you're the star in your story, too. You don&rsquo;t need a million followers to have someone watching. Safety starts with protecting what&rsquo;s yours&mdash;like your home address, phone number, and even your email.</font><br /><font color="#2a2a2a"><strong><br />Imani (16, raising hand):&nbsp;</strong>I actually had something happen last year. I was talking to someone online who seemed cool&mdash;like funny, always complimenting my outfits. But then he asked what school I went to... and I told him.</font><br /><em><font color="#2a2a2a">(Room gets quiet.)</font></em><br /><font color="#2a2a2a"><strong><br />Imani (voice shaking):&nbsp;</strong>Turns out, he was a grown man. Not even close to being a teen. My mom found out after he sent me a weird message about meeting up after practice. I was so embarrassed and scared. I felt dumb.</font><br /><font color="#2a2a2a"><strong><br />Jazmin (softly):&nbsp;</strong>Imani, thank you for being brave. You're not dumb. You were trusting&mdash;there&rsquo;s a difference. That could happen to any of us. I&rsquo;m glad you're safe.</font><br /><em><font color="#2a2a2a">(A few girls tear up. One hugs Imani. Jazmin places a hand over her heart.)</font></em><br /><font color="#2a2a2a"><strong><br />Marisol (15):&nbsp;</strong>Wait, so... are emails a big deal too? I thought it was just spam I had to worry about.</font><br /><font color="#2a2a2a"><strong><br />Jazmin:&nbsp;</strong>Good question! Emails are like keys to your digital life. If someone gets into your email, they can reset your passwords, read your personal messages, even pretend to be you.</font><br /><font color="#2a2a2a"><strong><br />Tiana (12):&nbsp;</strong>That happened to my cousin! Someone hacked her email and sent weird stuff to her teacher. She almost got suspended!</font><br /><font color="#2a2a2a"><strong><br />Jazmin:&nbsp;</strong>See? That&rsquo;s a real consequence. Whether it&rsquo;s your phone number, home address, or just chatting online--<strong>every piece of info is a puzzle piece. Don&rsquo;t let strangers complete your puzzle.</strong></font><br /><font color="#2a2a2a"><strong><br />Jazmin (lightening the mood):&nbsp;</strong>Okay, let&rsquo;s do a quick test. I say the info&mdash;you say &ldquo;Keep it private&rdquo; if we shouldn&rsquo;t share it.</font><ul><li><font color="#2a2a2a">Home address?<br /><strong>Girls:</strong> Keep it private!</font></li><li><font color="#2a2a2a">Phone number?<br /><strong>Girls:</strong> Keep it private!</font></li><li><font color="#2a2a2a">Your middle name and your favorite color combined as your password?<br /><strong>Layla:</strong> Keep it private, but also&hellip; bad password, sis.<br /><em>(Laughter fills the room.)</em></font></li></ul> <font color="#2a2a2a"><strong><br />Jazmin:&nbsp;</strong>Right?! Let&rsquo;s not make it easy. And look&mdash;I&rsquo;m not saying never share anything. I&rsquo;m saying: share smart. Ask yourself, &ldquo;Would I want someone I <em>don&rsquo;t</em> know to see this?&rdquo;</font><br /><font color="#2a2a2a"><strong><br />Imani (smiling a little):&nbsp;</strong>Now I ask myself: &ldquo;Would Jazmin approve?&rdquo;</font><br /><em><font color="#2a2a2a">(They all laugh again, and Jazmin wipes a tear while laughing.)</font></em><br /><font color="#2a2a2a"><strong><br />Jazmin:&nbsp;</strong>I love y&rsquo;all. But even more, I want you safe. When you show up online, let it be on <em>your</em> terms&mdash;not someone else&rsquo;s. Got it?</font><br /><font color="#2a2a2a"><strong><br />&#8203;All Girls:</strong><br />Got it!</font></div>  <div id="157771557787174742"><div><style type="text/css">	#element-3dccd208-935e-46cf-8146-a9aa59069a2b .colored-box-content {  clear: both;  float: left;  width: 100%;  -moz-box-sizing: border-box;  -webkit-box-sizing: border-box;  -ms-box-sizing: border-box;  box-sizing: border-box;  background-color: #ae40a5;  padding-top: 20px;  padding-bottom: 20px;  padding-left: 20px;  padding-right: 20px;  -webkit-border-top-left-radius: 0px;  -moz-border-top-left-radius: 0px;  border-top-left-radius: 0px;  -webkit-border-top-right-radius: 0px;  -moz-border-top-right-radius: 0px;  border-top-right-radius: 0px;  -webkit-border-bottom-left-radius: 0px;  -moz-border-bottom-left-radius: 0px;  border-bottom-left-radius: 0px;  -webkit-border-bottom-right-radius: 0px;  -moz-border-bottom-right-radius: 0px;  border-bottom-right-radius: 0px;}</style><div id="element-3dccd208-935e-46cf-8146-a9aa59069a2b" data-platform-element-id="848857247979793891-1.0.1" class="platform-element-contents">	<div class="colored-box">    <div class="colored-box-content">        <div style="width: auto"><div></div><div class="paragraph"><font color="#fdfcfc"><font size="5"><strong style="">&#10024;</strong> <strong style="">Personal Information &amp; Online Safety</strong></font><br />&nbsp;<br /><strong style="">&#129504;</strong><strong style=""> Quick Recap</strong><br />In today&rsquo;s story, Jazmin met with a group of girls to talk about staying safe online. They talked about personal information, stranger danger, and real-life examples of what can happen when people share too much.<br /><br /><br /><strong style="">&#9997;&#127997;</strong><strong style=""> Reflect &amp; Write Questions</strong><ol><li><strong style="">What are three pieces of personal information that you should keep private online?</strong></li><li><strong style="">In your own words, why is it important to keep your home address and phone number off the internet?</strong></li><li><strong style="">Imani shared a serious experience in the story. What stood out to you about her story?</strong></li><li><strong style="">Think about your social media or online profiles. Are there any changes you might want to make after hearing this conversation? Explain.</strong></li><li><strong style="">Jazmin said, &ldquo;Every piece of info is a puzzle piece. Don&rsquo;t let strangers complete your puzzle.&rdquo; What do you think that means?</strong></li><li><strong style="">Write a message or tip you would give to someone younger than you about staying safe online:</strong>&nbsp;<font color="#fdfcfc">"Hey there! One thing you should always remember when you're online is..."&nbsp;</font></li></ol></font></div></div>    </div></div></div><div style="clear:both;"></div></div></div>  <div class="wsite-spacer" style="height:50px;"></div>  <div class="paragraph"><font color="#2a2a2a">&#128272; <strong>Interactive Activity: Social Media Safety Audit &amp; Edit Challenge</strong></font><br /><br /><font color="#2a2a2a"><strong>Goal:</strong> Identify and edit or remove Personally Identifiable Information (PII) from images and videos shared or stored digitally.</font><br /><br /><font color="#2a2a2a">&#128221; <strong>Step-by-Step Instructions</strong></font><br /><font color="#2a2a2a">1. <strong>Team Up</strong></font><br /><font color="#2a2a2a">Pair up: Each girl works with her mother (or guardian/mentor). This is a chance to teach and learn from one another. You will need to work from your phone, tablet, or laptop.</font><br /><br /><font color="#2a2a2a">2. <strong>Search &amp; Audit: The Safety Scan<br />&#128269;</strong></font><font color="#2a2a2a"><strong>Time: 15&ndash;20 minutes</strong><br />Check all the following locations for <strong>photos or videos that might include PII</strong>:</font><ul><li><font color="#2a2a2a">Social media posts (Instagram, Facebook, TikTok, Snapchat, YouTube, etc.)</font></li><li><font color="#2a2a2a">Phone camera roll</font></li><li><font color="#2a2a2a">Desktop or cloud storage (Google Photos, iCloud, etc.)</font></li></ul> <strong><font color="#2a2a2a">Look for things like:</font></strong><ul><li><font color="#2a2a2a">&#127968; Home addresses (mailboxes, house numbers, street signs)</font></li><li><font color="#2a2a2a">&#128222; Phone numbers</font></li><li><font color="#2a2a2a">&#128231; Email addresses</font></li><li><font color="#2a2a2a">&#128664; License plate numbers</font></li><li><font color="#2a2a2a">&#129485; Faces of strangers or people who didn&rsquo;t give permission</font></li><li><font color="#2a2a2a">&#128444;&#65039; School logos or uniforms</font></li><li><font color="#2a2a2a">&#128205;Visible locations (storefronts, landmarks)</font></li></ul> <strong><font color="#2a2a2a">Make a list of images/videos that contain any PII.</font></strong><br /><br /><font color="#2a2a2a">3. <strong>Decide: Delete, Edit, or Keep with Caution &#129504;</strong></font><br /><font color="#2a2a2a">With each image/video on your list, decide:</font><ul><li><font color="#2a2a2a"><strong>Delete it completely</strong> if it's unnecessary or too revealing</font></li><li><font color="#2a2a2a"><strong>Edit it</strong> to remove or cover PII</font></li><li><font color="#2a2a2a"><strong>Keep it as is</strong> only if it&rsquo;s truly safe and appropriate</font></li></ul><br /><font color="#2a2a2a">4. <strong>Edit Like a Pro: The Blur, Crop, and Cover-Up &#128736;&#65039;</strong></font><br /><font color="#2a2a2a">Now it's time to <strong>edit those images/videos</strong>&mdash;this is the fun, hands-on part!</font><br /><font color="#2a2a2a">Use your phone&rsquo;s built-in editor, Instagram story tools, or free apps like:</font><ul><li><strong><font color="#2a2a2a">Snapseed</font></strong></li><li><strong><font color="#2a2a2a">PicsArt</font></strong></li><li><strong><font color="#2a2a2a">Canva</font></strong></li><li><font color="#2a2a2a"><strong>CapCut</strong> (for video)</font></li><li><font color="#2a2a2a"><strong>YouTube Studio</strong> (for blurring faces or backgrounds)</font></li></ul> <font color="#2a2a2a"><strong>Challenge: Apply at least 2 of the following edits</strong>:</font><ul><li><font color="#2a2a2a">&#128998; <strong>Blur</strong> license plates or faces of strangers</font></li><li><font color="#2a2a2a">&#9986;&#65039; <strong>Crop</strong> out sensitive parts of an image (address, ID badge, school sign)</font></li><li><font color="#2a2a2a">&#129527; <strong>Cover with stickers or emojis</strong> (mailbox, child&rsquo;s face, logos)</font></li><li><font color="#2a2a2a">&#129668; <strong>Replace background</strong> using filters or green screen features</font></li></ul><br /><font color="#2a2a2a">5. <strong>Bonus Round: Practice with Sample Pics &#128248;</strong></font><br /><font color="#2a2a2a">If you didn&rsquo;t find any PII in your personal content, select&nbsp;<strong>&ldquo;practice photos&rdquo;</strong> to test your editing skills.</font><br /><br /><font color="#2a2a2a">6. <strong>Reflect &amp; Share: Lessons Learned &#128172;<br />&#8203;</strong></font><font color="#2a2a2a">Answer these questions together in a digital journal, notepad, or worksheet:</font><ul><li><font color="#2a2a2a">What surprised you about what you found?</font></li><li><font color="#2a2a2a">What editing tool or technique was most helpful to you?</font></li><li><font color="#2a2a2a">How will this activity change the way you post or share images online?</font></li><li><font color="#2a2a2a">What lessons about Personally Identifiable Information (PII) would you teach to someone younger than you?</font></li></ul></div>]]></content:encoded></item></channel></rss>