The New 2025 BEAD Restructuring Policy Notice: What Missouri Community Stakeholders Need to Know

| 0

The long-delayed effort to begin spending nearly $42.5 billion in broadband infrastructure funding authorized by Congress nearly four years ago is still unfolding. This blog is intended to help community stakeholders—including local government officials, chambers of commerce, nonprofits, and engaged citizens—understand the current situation and work productively to ensure the best possible broadband service is deployed as quickly as possible in their community.

The latest chapter in the BEAD funding saga is the release of a newly revised set of requirements that states must follow to access their share of available BEAD funds. This policy—titled the “Broadband Equity, Access, and Deployment (BEAD) Program: BEAD Restructuring Policy Notice”(the “Policy Notice”) was released June 6, 2025, and it represents a significant shift in federal broadband funding priorities, eliminating or revising many of the earlier requirements imposed by the Biden administration in the original BEAD NOFO, published three years ago, and supplemented with various updates that states had been working to fulfill up until a few weeks ago.

The new Policy Notice emphasizes swift action and sets an aggressive timeline for implementation. Much of the work previously completed by Missouri’s Office of Broadband Development (OBD), including the state’s Initial Proposal and the implementation efforts described in an earlier blog, will now need to be revised to comply with the new requirements outlined in the Policy Notice.

The number of Broadband Serviceable Locations (BSLs) that remain eligible for BEAD funding also may be reduced, because the Policy Notice now permits Unlicensed Fixed Wireless (ULFW) providers to assert they are now providing the broadband service at the level required by the BEAD Act. A new challenge process enabling ULFW providers to provide evidence to OBD is now underway and it should be completed within a few weeks.

All this comes against the backdrop of OBD’s highly successful first round of funding under the prior BEAD NOFO guidance. While specific winners of round one and its sub rounds were not announced, approximately 90% of the eligible locations received proposals and OBD did release information identifying the BSLs where a proposal had been preliminarily accepted. All those results will have to be thrown out. OBD and the ISPs that decide they still want to participate in the BEAD funding program will need to quickly adjust to a new set of rules and priorities and resubmit under a new set of scoring criteria. All this must happen in time for OBD to include the results in its revised final proposal to NTIA in early September.

The new required “Benefit of the Bargain” funding round (described below) is necessary because the Policy Notice, eliminates or substantially modifies criteria for awarding BEAD funding, and it opens up the process to a wider group of internet providers.

Here are some of the most significant changes:

New Definition of a “Priority Broadband Project.” The BEAD statute allowed states to prioritize certain projects over other types of technologies. These are referred to as “Priority Broadband Projects.” The Biden administration’s BEAD NOFO limited this definition to end to end fiber internet (fiber to the premises or FTTP). FTTP was favored over lower cost technologies so long as the amount of BEAD funding requested did not exceed the state’s Extreme High Cost Per Location Target (EHCPLT) for the location. The EHCPLT limit was imposed to make sure that all locations that were not adequately served could receive BEAD funding.

The Policy Notice broadens Priority Broadband Project definition to include any technology that the state (OBD in Missouri) determines can provide broadband service at speeds of no less than 100/20 Mbps with latency less than or equal to 100 ms., and that can easily scale speeds over time to meet the evolving connectivity needs of households and businesses and support the deployment of 5G, successor wireless technologies, and other advanced services.

This definition is important, because all Priority Broadband Projects will compete for BEAD funding using the same scoring matrix in the Benefit of the Bargain funding described below. (Policy Notice §3.1; pp.8-9).

ULFW Potentially Qualifies as a “Priority Project. To qualify as a Priority Broadband Project, unlicensed fixed wireless (ULFW) must deliver reliable internet to all covered BSLs at speeds at 100/20 Mbps with latency under 100 ms. The BEAD Policy states that a ULFW provider’s network will be considered capable of reliably delivering service at the minimum levels required by the statute if it can demonstrate the ability to deliver download speeds of at least 5 Mbps assuming simultaneous connection at all locations. The BEAD Policy leaves the requirements and standards necessary for a ULFW provider to show its project is easily scalable over time to meet future needs to the discretion of each state. However, NTIA does reserve to itself the right to overrule the state’s determination in cases where it disagrees. (Policy Notice § 3.2; p.10; Appendix A)

LEO Satellite Potentially Qualifies as a “Priority Project.”  Low earth orbit satellite internet providers (LEO Satellite), such as Starlink, also could qualify as a Priority Broadband Project as well, if the provider commits to make sufficient bandwidth available on the network to serve all locations for a period of at least 10 years. States may adopt enforcement mechanisms—such as claw backs of BEAD grants—to ensure compliance; however, they may not take any ownership or security interest in the provider’s network equipment. (Policy Notice § 3.2; p.10; Appendix B)

New “Lowest Cost to the Government” Scoring Matrix Required. Generally, OBD is required to use a scoring matrix for all Priority Broadband Projects that favors the proposal or combination of proposals resulting in the lowest dollar outlay of BEAD funding.

However, so long as the EHCPLT is not exceeded, a higher-cost Priority Broadband Project proposal may be selected if it is within 15% of the amount requested by the lowest Priority Broadband Project  proposal.

In this case OBD may select among the Priority Broadband Project proposals based on a scoring matrix that takes only the following criteria into account:

  • The speed at which the project will be completed (with preference for faster deployment)
  • The technical capabilities and scalability of the proposed technology (for example, fiber’s ability to easily upgrade speeds in the future)
  • The reliability of the service, especially in challenging environments
  • Whether the applicant was previously a provisional subgrantee under the old rules (though this is only a minor consideration)

If all Priority Broadband Projects exceed the EHCPLT, OBD may accept a lower cost non-priority option if it meets the 100/20 Mbps and 100 ms. service level, even though it is not able to easily scale to meet future needs.(Policy Notice §§ 3.3–3.4; pp.10-13 )

NTIA Specific Oversight on Project Selection. While states retain broad authority over project selection, the BEAD Policy cautions states against setting EHCPLT at an unrealistically high level to preserve the possibility of fiber deployment. NTIA also reserves the right to disapprove project selections that it believes are inconsistent with BEAD program goals.
(Policy Notice p.9 and §3.4; pp.9 and 11-13)

Project Area Proposals Can Exclude BSLs. OBD must accept proposals that exclude one or more BSLs or provides for different delivery technologies where the provider determines the cost of deployment for a specific technology is too high. In such cases, OBD may solicit alternative solutions from other providers or consider a provider’s proposal to use different technologies for those BSLs.(Policy Notice §3.3; p.11)

Affordability Rules. OBD can no longer impose a specific Low-Cost Service Option (LCSO) that BEAD-funded projects must offer. Instead, providers must propose their own affordable plans, which must be made available to households eligible under the FCC’s Lifeline Program, rather than the broader criteria previously allowed under the Affordable Connectivity Program.
(Policy Notice §§ 2.6; 2.7; pp.6-9)

Open Access/Net Neutrality. Prohibitions on data caps and requirements to provide wholesale or open-access connections to BEAD-funded networks have been abolished. NTIA concluded these mandates discouraged participation and increased project costs.
(Policy Notice §2.3; p.5)

DEI, Workforce and Labor Requirements. Prior BEAD NOFO mandates concerning diversity, equity, and inclusion (DEI), fair labor practices, and related reporting have been eliminated. Instead, subgrantees are only required to certify compliance with applicable federal labor laws.(Policy Notice § 2.1; p.4)

Climate Resilience Factors.  The requirement that BEAD proposals be scored based on their contribution to climate resilience has been eliminated. Project participants will satisfy this statutory requirement by establishing risk management plans that account for technology infrastructure reliability and resilience to natural disasters (e.g., wildfires, flooding, tornadoes, hurricanes, etc.) as well as cybersecurity best practices..
(Policy Notice § 2.2; pp. 4-5)

No Credit for Community Input. OBD may no longer award scoring points or preference based on stakeholder engagement, demographic targeting, or other forms of community input. Public comment is still required for the Final Proposal, but it cannot affect project scoring.(Policy Notice § 2.4; pp. 5-6)

Where Do We Go From Here?

Admittedly more guidance will be issued in the coming weeks from OBD as it moves forward to implement the Policy Notice, and likely from NTIA as well. There also is the possibility that certain aspects of the Policy Notice will be challenged in court and the process will be further delayed based on a claim that it strays too far from BEAD’s statutory mandates.

However, it seems more likely that OBD will publish a new BSL map reflecting a revised set of BEAD funding eligible sites in a few weeks and a revised invitation for proposals under the Benefit of the Bargain funding round. That invitation also may provide further guidance (consistent with both the statute and the Policy Notice) detailing how ULFW and LEO Satellite proposals can qualify as a Priority Broadband Project.

For community stakeholders, the greatest risk may be that the providers that won preliminary allocations of BEAD funding under the BEAD NOFO process will simply give up, because they believe their FTTP proposal cannot overcome the construction and installation cost advantage of a ULFW solution. Even though many of these ISPs already have spent thousands of dollars on developing their proposals, after years of work, preparation and waiting, they may be at the point where they view further participation in the BEAD program as throwing good money after bad.

Yet the perceived cost advantage of these wireless technologies when compared to FTTP or hybrid fixed wired solutions may be illusory, depending on how OBD (and NTIA) hold UFLW, LEO Satellite or other technologies to the statute’s mandates for service that is easily scalable and future-proof. Much of Missouri’s unserved and underserved locations are in areas where terrain makes deployment of reliable wireless service challenging, and these challenges increase as future needs for higher connection speeds and lower latency require towers to be located closer to the end user and backhaul capacity to increase.

This is illustrated by the independent study commissioned by OBD in 2022. It is worth remembering that this study found that the overall cost of deploying wireless internet statewide was approximately the same as a 100% FTTP solution. While there likely are areas in Missouri, and throughout the United States, where wireless technologies have a substantially lower deployment cost and also can be easily scaled it meet future needs, the 2022 study appears to show that for many Missouri locations, if they are engineered properly to meet specific conditions and terrain challenges, wireless may cost more to deploy than FTTP.

The point here is that community stakeholders who want more than the minimum level of broadband service required by BEAD in their community, need to reach out to the local ISPs that participated in the aborted NOFO BEAD funding round, and urge them to move forward with a new proposal in the Benefit of the Bargain round this summer. They also should be receptive and at least consider joining with a provider in ways that allow them to reduce their  BEAD funding request, so it can fall within the limit of the new 15% rule imposed by the Policy Notice. For example, a local community might agree to fund a fixed a portion of a FTTP network provider’s cost to expand service to a few critical high cost BSLs in exchange for the provider’s agreement to reduce its BEAD funding request by a like amount. Since it is the amount of BEAD funding requested (rather than the cost of the network) that governs, the FTTP bid might be reduced to a point that it did not exceed 15% of a competing ULFW or LEO Satellite Priority Broadband Project proposal.

As the BEAD program enters this critical phase, efforts made by local leaders and  stakeholders still could help determine whether their community secures broadband infrastructure that just meets minimum federal thresholds, or instead infrastructure that is far more durable and future-proof. Now more than ever, communities need to support and encourage ISPs that have already submitted proposals that can meet this long-term vision.

The Latest Scams and How to Protect Yourself

| 0

If you’re like me, you’ve seen more scams in your email and texts lately. Scammers are constantly evolving their tactics, using new technologies and psychological tricks to deceive people. Fraudsters are leveraging artificial intelligence, impersonation techniques, and digital platforms, such as social media, to target unsuspecting victims. Here’s a breakdown of the latest scams and how you can stay safe.

AI-Powered Scams

Artificial intelligence has revolutionized fraud, making scams more convincing than ever. Criminals use AI-generated voices, deepfake videos, and realistic phishing emails to trick victims into handing over personal information or money.

Deepfake is defined by the Merriam Webster dictionary as an image or recording that has been convincingly altered and manipulated to misrepresent someone as doing or saying something that was not actually done or said.

How to Protect Yourself:

  • Be skeptical of unexpected messages, even if they appear to be from someone you know.
  • Verify requests for money or sensitive information by contacting the person or organization directly. Do not use the phone numbers in suspicious emails, texts, or phone calls. Use verified numbers the person or company has provided you or you find through an online search.
  • Use multi-factor authentication to secure your accounts. This includes passcodes and passwordless accounts where available.

Imposter Scams

Scammers pose as government officials, bank representatives, or even family members in distress to manipulate victims into sending money or revealing personal details.

How to Protect Yourself:

  • Never trust unsolicited calls or messages requesting money or sensitive information.
  • Verify the identity of the caller by contacting the person or organization directly.
  • Be cautious of urgent requests that pressure you to act quickly.

QR Code Scams

QR codes are being exploited by fraudsters to direct users to malicious websites or install malware on their devices without their knowledge.

How to Protect Yourself:

  • Only scan QR codes from trusted sources.
  • Avoid scanning codes found in unsolicited emails, text messages, or social media posts.
  • Use a QR code scanner that previews the URL before opening it, especially if you weren’t expecting it.

Learn more about QR code scams from the Federal Trade Commission (FTC).

Toll Road Scams

Scammers send fake text messages claiming unpaid toll fees, tricking victims into providing payment details.

How to Protect Yourself:

  • Verify toll payments through official websites rather than clicking on links in text messages.
  • Be cautious of messages threatening immediate penalties or license suspension.

You can find out more about toll road scams from the FTC.

Job Scams

Fraudsters target job seekers with fake employment offers, often requiring upfront payments or personal information.

How to Protect Yourself:

  • Research companies before applying for jobs.
  • Avoid job offers that require payment for training or equipment.
  • Never share sensitive information like your social security number with unverified employers.

Find out more about job scams from Indeed and the FTC websites

Stay Vigilant

Scammers prey on trust and urgency, making it crucial to stay informed and cautious. Always verify unexpected requests, use strong security measures, and report suspicious activity to authorities.

For more details on the latest scams, check out these blogs from AARP, Experian, and Norton.

The Future of Authentication: Exploring Passwords, Passkeys, and Passwordless Logins

| 0

Should passwords become extinct? Previously we talked about protecting your online information with unique passwords and two-factor authentication. With the increase in phishing schemes, and the potential exploitation of two factor authentication by hackers, we are seeing a change in the way companies are looking at online security. This is giving rise to the use of passkeys and passwordless logins.

Passwords have been our guardians of our information for decades, but they do have weaknesses:

  • Weak passwords and password reuse across accounts make easy targets for hackers. Even strong passwords can be compromised in data breaches.
  • Managing dozens of unique passwords, and remembering to change them for all the accounts and applications we use can create password fatigue even when using a password manager.
  • Some people tend to choose easily guessed passwords or use personal information, increasing the potential for account compromise.

It’s becoming clear, that while passwords have served us well for years, they are no longer our best defense in protecting our data against cyber threats.

Enter Passkeys: A Modern Alternative

Passkeys offer a secure and user-friendly alternative to traditional passwords. Rooted in public-key encryption, passkeys pair a public and private key to authenticate users. The public key is shared with the service, while the private key remains securely stored on the user’s device. Here’s why passkeys are the future:

  • Enhanced Security: Passkeys are resistant to phishing attacks and database breaches since the private key never leaves the device.
  • Seamless Experience: Logging in with passkeys is effortless, often requiring just a biometric scan or device approval.
  • Cross-Platform Support: With backing from tech giants like Apple, Microsoft, and Google, passkeys are becoming a universal authentication method.

The move to passkeys represents a significant leap forward, providing stronger protection while simplifying the login process.

The Rise of Passwordless Logins

Passwordless logins go a step further, eliminating the need for passwords altogether. Instead, they rely on modern technologies such as:

  • Biometric Authentication: Facial recognition, fingerprints, or voice ID.
  • Device-Based Authentication: Trusted devices serve as the key to access.
  • Magic Links and One-Time Codes: Temporary links or codes sent to a user’s email or phone.

Passwordless logins bring several advantages:

  • Stronger Security: No stored passwords mean a reduced risk of breaches or phishing attacks.
  • Convenience: Users can authenticate with minimal effort, leveraging tools like biometrics or trusted devices.
  • Future-Proof: These methods are aligned with emerging standards like Fast Identity Online 2 (FIDO2). FIDO2 is an authentication standard based on public key encryption that is more secure than passwords and One-Time Passwords sent by SMS text.

However, challenges like ensuring widespread adoption and addressing hardware or accessibility limitations remain. Despite these hurdles, the push for passwordless systems is gaining momentum globally.

As we transition away from passwords, the adoption of passkeys, passwordless logins, and standards like FIDO2 will become the norm. These innovations promise to make our online lives more secure and convenient. While challenges remain, the direction is clear: the days of remembering (and forgetting) complex passwords are numbered.

Are you ready to embrace the passwordless revolution?

For more information:

Missouri’s BEAD Program 2025

| 0

Just a Speed Bump or Is the Broadband Bus Running on Empty?

In June 2023, the National Telecommunications and Information Agency (NTIA) announced that Missouri had been allocated over $1.7 billion through the federal Broadband Equity, Access, and Deployment (BEAD) program, to expand high-speed internet access to more than 200,000 unserved and underserved locations across the state. This was the third highest amount of set aside for any state, with only California and Texas receiving larger allocations. The  BEAD funding was part of the Infrastructure Investment and Jobs Act (IIJA) enacted back in 2021, and the amount represented a historic opportunity to close Missouri’s digital divide and stimulate economic growth especially in rural unserved and underserved communities.

However “allocating” money isn’t the same thing as distributing it … either to the state or to the ISPs that will ultimately construct and operate new internet networks that ultimately will construct and operate new internet networks. Actually getting the money to where it could be used for an internet construction project has been painfully slow. At this point no money BEAD has been committed to a broadband project in Missouri, and it is looking less likely that any will be at this year.

This Blog describes why that’s happened, and suggests some steps communities might consider as we wait for the money.

BEAD Funding …. It’s a Process.

Even though BEAD was enacted in 2021 the “roll out” almost immediately encountered a substantial delay. It took a year and a half for the FCC to put together a set a map that NTIA could use to apportion the $44.24 billion Congress made available among the states. Much of that delay occurred because the FCC refused to begin working on the maps until Congress appropriate money specifically to fund the cost of preparing maps. Once the mapping process was completed, NTIA then required states to complete a multistage process that was roughly based on requirements outlined in the BEAD statute.

NTIA’s process required states to first determine locations eligible for funding and to create a procedure for selecting which ISPs would receive BEAD money. States were required to submit this procedure to NTIA for approval (Preliminary Plan Approval). Once Preliminary Plan Approval occurred, each state had one year to actually identify project locations eligible for funding and to conduct the  competitive process to select ISPs to build the broadband infrastructure using BEAD funds. The result of this work also had to be submitted to NTIA as the state’s Final Plan, and NTIA then would have an undetermined length of time to “approve it” (Final Plan Approval). Only after Final Plan Approval would ISPs selected in the state’s competitive grant process actually be assured they actually would receive the BEAD money, once the project was completed in accordance with the grant requirements.

Missouri Receives Preliminary Approval from NTIA and the Project Selection Process Begins

It took NTIA over a year (August 2, 2024) to give Missouri “Preliminary Plan Approval.” Thereafter, Missouri’s Office of Broadband Development (OBD) made significant progress moving toward a completion of a Final Plan for NTIA’s Final Plan Approval. Last year OBD conducted a rigorous challenge process to ensure that the locations designated as eligible for BEAD funding were accurate. It prequalified ISPs to streamline the process of reviewing ISP proposals to provide service in those areas, and it completed a first round of  BEAD funding applications, receiving 519 applications covering 192,284 locations-about 90% of the sites eligible for BEAD money.

A Short Pause…Or a Substantial Multi-Year Delay?

The acronym BEAD stands for Broadband Equity Access and Deployment, and for that reason alone, it’s not surprising that the incoming Trump administration would want some changes. NTIA is part of the Commerce Department, and  Commerce Secretary Howard Lutnick has consistently criticized the BEAD program for what he describes as “woke mandates,” including labor and climate-related requirements, and a “favoritism towards fiber-optic technology” that he believed needlessly inflated project costs and delayed infrastructure deployment.

During his January 2025 Senate confirmation hearing, Secretary Lutnick declined to commit to honoring NTIA’s existing Preliminary Plan Approvals, stating he would review plans for efficiency and alignment with “lowest cost” objectives. In March 2025, he announced a 90-day review focused on  Biden-era rules, prioritizing a tech-neutral approach (including satellite and fixed wireless) and streamlining infrastructure construction. The goal of this approach he argued was to accelerate deployment and reduce taxpayer costs. That has since been followed by an across the board 90 day extension in the date States must submit their Final Plan for NTIA approval.

Meanwhile, in March, congressional Republicans introduced the SPEED for BEAD Act to codify some of Secretary Lutnick’s priorities. Key provisions of this bill include:

               •Mandating technology neutrality, removing fiber-first preferences.

               •Eliminating labor (e.g., prevailing wage) and climate resilience requirements for broadband infrastructure.

               •Restricting BEAD funds to for infrastructure deployment only, blocking states from allocating funds for digital equity or workforce programs.

               •Requiring states to prioritize cost-effectiveness in subgrantee selection.

The legislation aligns with broader GOP efforts to redirect BEAD toward “shovel-ready” projects. Undoubtedly, it also puts fixed wireless providers and satellite providers in a much more competitive position as well, as they generally are less costly, at least in the short run, when compared to fiber to the premises broadband.

Of course, there are solid arguments supporting all of these proposals, and admittedly, the speed of implementing BEAD up to this point has been discouraging. However, the prospect of forcing states to throw out the work they’ve already done, and restart the planning and approval process under a new set of guidelines, is pretty disheartening, not only for the ISPs that proposed under Missouri’s approved Preliminary Plan, but to the communities hoping to finally get internet service as well. A recent opinion piece by Missouri Representative Louis Riggs, did a good job of expressing these concerns, and frustration with the delay and the change in approach.

Missouri stakeholders—including ISPs, local governments, and bipartisan state legislators-have expressed concern about mandatory federal changes forcing states to restart or revise their BEAD plans. A letter signed by 115 state legislators from 28 states urged Secretary Lutnick to make any changes to BEAD optional rather than mandatory to avoid undermining state authority and delaying broadband deployment, but even if changes are made optional at the state level, it seems likely that Missouri officials will want to carefully consider whether to go forward with the existing grant applications, or adopt the new standards.

While nothing can be said with certainty, it seems likely that even under comparatively optimistic timeframes, Missouri now will not be able submit a Final Plan for NTIA approval until late this year, and of course NTIA approval might take many months more. If the Trump administration chooses to focus efforts on passing the “Speed for BEAD Act” it seems likely that much of what OBD did this past year will need to be redone to allow new applications and proposals for funding that allow more wireless projects, and eliminate environmental and prevailing wage requirements.

Funding Under USDA Programs Seems Uncertain.

Although funding promised to Missouri under BEAD has dwarfed other federal programs, over the past several years the Department of Agriculture (USDA) has provided funding assistance through grants and loans for many rural communities as well. Two programs in particular administered by USDA are the Reconnect and the smaller, Telecommunications Loan Program. Unfortunately things don’t look promising here either. The Trump Administration’s Director of the Office of Management and Budget (OMB) has directed that funding under both of these eliminated, because they are duplicative.

Other Broadband Funding Options for Missouri Communities

Given the uncertainty around BEAD’s timeline and rules and the probable elimination of other federal programs, Missouri communities and ISPs may want to again explore other funding avenues to continue broadband expansion efforts. Missouri law authorizes several mechanisms to finance broadband infrastructure, including issuing tax-exempt bonds for Qualified Broadband Projects, Community Improvement Districts (CIDs), Neighborhood Improvement Districts (NIDs), Tax Increment Financing (TIF), and property and sales tax exemptions for broadband projects. These are outlined in a White Paper previously published on MoBroadband. You can find the White Paper [Here].

What’s next?

Well, the short answer is we don’t know. However, it is clear that many Missourians continue to lack a connection to reliable, affordable high speed internet, and the fact that Missouri received the third highest allocation of BEAD funding (even though the state ranks 19th in population), is compelling evidence that Missouri has a much larger connectivity problem than most other states. As long as this continues, it seems likely Missouri risks underperforming our peer states in the use of internet based applications that foster economic development, telehealth, and educational opportunity.

Streaming Music Services – Choosing the Best One for You

| 0

In our last blog, we discussed how to choose the best streaming service for you. High Speed Internet is also changing the way you listen to and purchase music. While you can still purchase music via vinyl and CDs, you can also choose to download music or simply listen to music via subscription services. There are also free audio streaming services available for those that are budget conscious or do not need all the features from paid streaming services.

Let’s discuss some of the free and paid streaming services that are available and what to consider when choosing the right one to meet your needs.

If you’re looking to enjoy a wide range of music without spending any money, free streaming music services are a fantastic option. These platforms usually come with ads and occasional interruptions between songs. Here are a few popular free services:

  • Spotify Free: With a huge library and personalized playlists, Spotify Free is a hit among users. Just keep in mind, it includes ads and limits your ability to skip songs.
  • Pandora: Known for its radio-style listening, Pandora creates stations based on your favorite artists and genres. The free version has ads and limited song skips.
  • SoundCloud: A great place for indie artists and new discoveries, SoundCloud mixes mainstream and underground tracks. The free version includes ads and some skip limitations.
  • YouTube Music: YouTube’s music platform lets you explore official tracks and user-generated content for free, but it’s supported by ads.
  • iHeartRadio: Gives you access to vast libraries of free popular music.

If you’re after a listening experience without ads, plus extra features like offline listening, playlists, and higher audio quality, paid services are the way to go. Here are some top picks:

  • Spotify Premium: Offers ad-free listening, unlimited skips, offline playback, and high-quality audio.
  • Apple Music: Works seamlessly with your Apple devices, offers lossless audio, and includes exclusive content and live radio.
  • Tidal: Known for its high-fidelity sound quality and exclusive releases, Tidal is perfect for audiophiles and music lovers.
  • Amazon Music Unlimited: Provides a huge library, ad-free listening, and integrates with Alexa for voice control.
  • Deezer Premium: Offers personalized playlists, high-quality audio, and offline listening.

When choosing a streaming music service, think about these factors to find the best fit for your needs:

  • Music Library: Make sure the service has a comprehensive library that includes your favorite genres and artists.
  • Audio Quality: If you care about sound quality, look for services that offer high-fidelity or lossless audio options.
  • Device Compatibility: Check if the service works smoothly with your favorite devices, like smartphones, tablets, smart speakers, and computers.
  • Personalization: Services that offer personalized playlists and recommendations can make your listening experience even better.
  • Offline Listening: If you often listen to music on the go, choose a service that lets you download tracks for offline playback.
  • Price: Compare the subscription costs and features to find a service that offers the best value for your budget.

Having access to high-speed internet (broadband) gives us a wide variety of options not only to assist with work, but with our time at home and with our families. Picking the right music streaming service that fits your needs, and your budget can really boost your music enjoyment. Whether you go for a free or a paid service, considering the factors mentioned above will help you make an informed decision.

For more information, Check out these articles:

The Best Free Online Streaming Music Services for 2025 – PCMag – https://www.pcmag.com/picks/the-best-free-online-streaming-music-services

The Best Free Online Streaming Music Services for 2025 – PCMag – https://www.pcmag.com/picks/the-best-free-online-streaming-music-services

Spotify  – https://open.spotify.com/

Pandorahttps://www.pandora.com/

SoundCloudhttps://soundcloud.com/

YouTube Musichttps://music.youtube.com/

iHeartRadiohttps://www.iheart.com/

Apple Musichttps://music.apple.com/us/new

Tidalhttps://tidal.com/

Amazon Music Unlimited –   https://www.amazon.com/music/unlimited

Deezerhttps://www.deezer.com/us/

Selecting the Right Streaming Video Service – News, Programs, Movies, and Sports – Oh My!

| 0

We’ve moved from having 3 or 4 television stations to cable and satellite TV that give us hundreds of channels, to streaming services, which allow us to decide when we watch and where we watch shows, movies, and news.

We’ve been given more options to create the entertainment environment that we want, but this wonderful opportunity can make it hard to choose. It can also become expensive. How do we make the best choices to give us all the content we want while not breaking our budget?

What should you consider when looking at streaming options?

We recommend starting by looking at the service you currently have and the cost of your television service. Also, look at the programs and channels that you watch the most. You’ll want to stay within your budget while getting the programs you want.

If you want local content, you’ll need to find services that provide local channels. Services such as YouTube TV, Sling TV, and Hulu along with other services provide local channels plus other content, like sports. Be sure to look at which local channels they provide and what the cost is for adding the local channels.

Another option for local channels is to look at a digital antenna. These antennas can pick up the local channels you watch in many locations and allow you to choose services that give you additional programming. Digital antennas can be installed inside or outside the home. External antennas may give you the advantage of a better signal and receiving more local channels. Digital antennas can range in price from $40 to $150 but could save you money in the long run.

As another option, you may want to look at the TV offerings through your Internet Service Provider (ISP). Many ISPs offer a television service similar to cable TV via an app that you install on your smart TV, ROKU device, or Amazon Firestick. These services can provide the local channels, sports, movies, and other programming you are looking for.

You may want to look at free streaming options as well. There are services such as PlutoTV, Tubi, and channels provided for free on Smart TVs. There are also free TV channels on Roku devices and the Amazon Firestick (if you have these for other services). These options may provide news and entertainment channels you are looking for. To see what these services provide, you can do a web search for free TV services or a channel guide for your smart TV brand.

How do you decide what streaming services to buy?

Based on your current viewing habits, and interest, do some research and choose several services that might interest you. Look over their content offerings for shows and movies. You may also want to consider services that bundle with movie providers like Showtime, Starz, or other movie channels. If you want to try them out, see if they offer a free month trial. If they do not offer a trial, pay for a month, and see if you like the content. If you do, see about getting a lower price if you may for a year at a time. If you don’t enjoy the content, simply cancel the service.

Do you already have access to the content you’re looking for?

Subscription services may offer deals combining their services with streaming video services such as Walmart Plus. Similarly, if you subscribe to a service such as Amazon Prime, you already have access to Amazon Prime Video. You may want to research the services and see if they have any TV or video streaming service included that meets your viewing needs.

We have more choice for television programming than ever before because of high-speed internet service (broadband), but it also makes deciding how to continue to view what we want and stay within our household budgets harder.

Links for More Information:

The Best Free Video Streaming Services for 2025 – PCMag – https://www.pcmag.com/picks/the-best-free-video-streaming-services

Best Free TV Streaming Services – CNET – https://www.cnet.com/tech/services-and-software/best-free-tv-streaming-services/

The Best Live TV Streaming Services for 2025 –  PCMag – https://www.pcmag.com/picks/the-best-live-tv-streaming-services

The best live TV streaming services: Expert tested – ZDnet – https://www.zdnet.com/home-and-office/home-entertainment/best-live-tv-streaming-service/

The Best Digital TV Antennas for 2025 – PCMag – https://www.pcmag.com/picks/how-to-find-the-best-digital-tv-antenna

Lifelong Learning in the Digital Age

| 0

When we think about online education, we often think back to COVID and the only learning available to our youth was online through our local schools, or the ads for all the online Universities we see. However, there are a variety of online learning offerings available for youth and adults that can complement classroom lessons, teach digital, soft, and hard skills to improve job performance; help start a new career; introduce a new hobby; or expand opportunities for lifelong learning.

Online education allows you to learn on your schedule and balance the responsibilities of work, family, and other activities. For young people it allows them to balance schoolwork with sports, music, spending time with friends and other extracurricular activities. Online learning lets education fit into life and not force fitting life into learning.

Online learning allows you to access courses and training from institutions across the country and around the world. This is especially important for those that might be limited by residing in remote areas or with limited transportation options. Many platforms offer accommodations for learners with disabilities, ensuring that everyone can participate.

Modern online learning platforms have moved on from lectures to using multimedia tools and interactive elements such as discussion forums, quizzes, and virtual simulations to make learning engaging and fun. The interactive style of courses not only helps people stay interested but helps to build a sense of community with your fellow students. Using these new online methods enhances learning and allows you to build relationships and expand your professional network. These connections can lead to mentorships, new collaborations outside of the classroom, and even job prospects.

Online education allows you to learn at your own pace and tailor your educational experience to meet your needs. Personalized learning paths allow you to focus on areas where you need improvement and move through subjects you’ve already mastered. Customizing your learning path on subjects helps keep you motivated and engaged.

Online learning is also affordable. Cost for course work that can lead to a degree can be less than a traditional college and eliminates the cost for commuting, rent or residence fees, and other expenses. There are also free classes available and platforms such as Khan Academy, Coursera, edX, and others that offer a variety of content at no or low cost.

Online learning helps promote the idea of being a lifelong learner. You can stay relevant in your current career, learn new skills, or just learn about something you are interested in. For kids, it can help prepare them for a future career by allowing them to learn more about coding and other digital skills that will be important in today’s digital world. Online courses in many cases emphasize hands-on, practical, real-world learning experiences that better prepare people for their jobs or future careers. Platforms such as FutureLearn and Skillshare are great for finding courses that inspire lifelong learning. 

While online learning provides an opportunity to continue to learn while working, consideration must still be given to balancing work, family, and other obligations with your learning experience. Make sure to not to take on an online learning workload which does not allow time to take care of your family, your job, and yourself. For young people, parents will also need to work with their kids to balance their screen time with school, extracurricular activities, friends, and family. While there is benefit to online learning, there needs to be time to take care of yourself and your responsibilities both mentally and physically to avoid burning out and stay motivated to continue your online learning experience.

Sites for online learning/More information:

The Best Online Learning Services for 2025 – PCMag – https://www.pcmag.com/picks/best-online-learning-services

Khan Academyhttps://www.khanacademy.org/

Courserahttps://www.coursera.org/

edXhttps://www.edx.org/

FutureLearnhttps://www.futurelearn.com/

Skillsharehttps://www.skillshare.com/en/

Code.orghttps://code.org/

Udemyhttps://www.udemy.com/

Masterclasshttps://www.masterclass.com/

Digital Skills Libraryhttps://digitalskillslibrary.org

Denver Public Libraryhttps://denverlibrary.org/techclasses

Skillbase – Harvard – https://skillbase.hks.harvard.edu/view-all-resources

Demystifying ChatGPT and Other AI Large Language Models

| 0

March 2025

Two years ago, I sat down in front of my computer for an unusual interview—not with a person, but with an AI large language model — ChatGPT. Back then, I was curious. Could this AI really hold a conversation? Did it understand what I was asking? And most importantly, where was it getting its information? The AI answered my questions smoothly—almost too smoothly. While I was impressed, I walked away with a nagging sense of mystery. I didn’t understand how it worked—just that it did. More importantly, I largely dismissed it as a useful tool due to highly publicized examples of how it had gotten things wrong and its tendency to hallucinate. Frankly, I was skeptical. (If you’re interested, you can find the original interview here.)

The blog turned out to be popular, far more so than many others I have written over the years. Much has happened in the last two years—not just with ChatGPT, but with many other large language models –or “LLMs”. Without question, LLMs have improved significantly since my “interview” with ChatGPT . They are faster, more accurate, better at citing sources, and in some cases able to access the internet for current data. 

LLMs have also have “gone mainstream,” becoming integral to our web searches on Meta, Google, and Bing. The same technology is now embedded in tools that offer “helpful” rewrites of our emails, texts, and documents, and it is a key component of most online and telephone help desk inquiries.

But how does an LLM actually work? Why is it so good at sounding human? And what’s really going on under the hood when it generates a response?

It’s time for an updated conversation—one that does a more complete job of explaining how these AI programs work, and what are the benefits and risks of incorporating them in our daily lives  

Tokens, Parameters, and the Magic of Predicting “What Comes Next”

One of the most common misconceptions about LLMs is that they “think” like we do. They don’t. There’s no “ghost in the machine,” no digital consciousness weighing options and forming opinions. Instead, it’s more accurate to think of LLMs as sophisticated probability engines that “guess” the next word based on a mathematical model programed and modified using vast amounts of text data.

To unpack the magic of an LLM, it helps to understand two key terms: tokens and parameters. Of course, there are many more—a cacophony of technical jargon thrown around by engineers—but these two will suffice for our purposes.

Tokens

Think of a token as a chunk of text. It could be a single word (like “and,” “to,” “from”), or more likely a syllable or part of a word (like “un-“, “dis-“, “-ly”). When you type a question into an LLM, it doesn’t “see” the words in the sentence as you do. It breaks them down into tokens (words and bits of words). This is critical because, in the next step, the model must analyze token relationships using probability weightings, to generate a response.

The latest versions of LLMs can handle over 100,000 tokens in a single session. That’s impressive, especially considering that a well-educated adult has a vocabulary of about 40,000 words. This expanded token limit allows for even more complex and extended conversations, enabling models to process and generate larger pieces of text in a single interaction.

A Trillion Parameters: The “Rules” Behind the Response

However, the real magic happens when the LLM selects the next word (or series of tokens) in response to our question or request. This is done using a set of mathematical probability weightings assigned to various token combinations that comprised the question or request you typed or ask. These weightings are called parameters.

If tokens are the building blocks—the “dictionary”—then parameters are the “rulebook” that governs how an LLM constructs coherent responses. Modern LLMs have a staggering number of parameters. For example, some of the most advanced models are estimated to have nearly 1.8 trillion parameters! To put that in perspective: if you looked at each parameter for just one second, it would take over 57,000 years to examine them all! 

“Training” the LLM

These parameters aren’t something an LLM invents on its own. They are shaped by human input— and analysis of word structures from massive datasets. These datasets incorporate a large percentage of human written knowledge and literature. Human feedback and carefully designed adjustments to parameters have been added to most LLM’s to keep responses accurate and safe. Over time, the responses generated by the LLM are refined, corrected, and guided by human oversight.

These parameters enable an LLM to generate understandable responses, that are almost always correct and accurate, because relative values assigned to the words used and their order, are based on vast amounts of analyzed data. 

This is one function of the massive data centers that have emerged worldwide, where models are trained and updated on enormous datasets containing text, and in some cases, audio and video data. By examining an extensive portion of human knowledge, the LLM produces outputs that mimic human speech. Over time, as these outputs are tested, refined, and corrected and updated through reinforcement and human feedback, they become more contextually appropriate and accurate as well.

For example, the LLM determines whether the word “bank” refers to a financial institution or the side of a river based on surrounding words and user context. It can even gauge the tone of a sentence—whether a phrase is humorous, serious, or sarcastic.

Here’s an example based on a real exchange with ChatGPT:

Me: What can cows jump over?

ChatGPT: Cows are not known for their jumping abilities, but they can jump if necessary. In general:

  • Cows can jump over low fences (typically up to 4-5 feet if motivated).
  • Younger, more agile cows may jump higher than older or heavier ones.
  • If startled or frightened, cows can clear obstacles they normally wouldn’t attempt.
  • The phrase “the cow jumped over the moon” from the nursery rhyme is, of course, just a fun exaggeration.

Me: Rhyme: What do cows jump over.

ChatGPT: Cows can jump, but not too high,
A fence, a log, if they really try.
Over a ditch, across some hay,
But not the moon—no, not today!

In the first response, the LLM assumed I wanted a factual answer. In the second, my input “rhyme” triggered a different set of parameters, generating a poetic and more light-hearted response.

Limitations: When AI Gets It Wrong

Understanding how LLMs work also explains why they sometimes get things very wrong. Since they rely on predicting statistically probable next words, they can hallucinate information—confidently stating incorrect facts because they “sound right” based on training data. This is why AI-generated content should always be double-checked, especially for accuracy-sensitive topics.

A striking example of this occurred when lawyers submitted a legal brief that was generated by an LLM. The brief cited multiple legal cases that simply did not exist. The lawyers, assuming the AI’s output was correct, did not verify the cases before submitting them to the court. When the judge reviewed the citations and discovered that none of them were real, the attorneys faced serious consequences, including fines and reputational damage. 

In addition, unless an LLM has real-time access to the internet and is updated regularly, its knowledge may be outdated. The old adage “garbage in, garbage out” applies. If an LLM is trained on flawed or biased data, its responses may reflect those inaccuracies. For example, if a model is trained on outdated medical research or biased historical accounts, its responses may reinforce those inaccuracies. 

Trust But Verify

So how can you verify the accuracy and reliability of information provided by an LLM?

  • Cross-check claims against reliable sources such as academic journals, news outlets, or expert databases.
  • Ask the LLM for its sources. While it doesn’t always provide direct citations, some models can generate references or indicate the general sources of their information, offering a starting point for verification.
  • Use models that cite sources. Some LLMs, like Perplexity AI, not only restate your query to ensure proper interpretation but also provide footnoted responses with references to specific sources, allowing for greater transparency and verification of information.

Take Time to Read and Consider AI Responses

One of the best habits to develop when using an LLM, is to slow down. Humans tend to trust authoritative responses, especially when delivered with certainty. But because they are a product of statistical probabilities rather than a conscious response, AI-generated answers should be carefully evaluated against your real-world knowledge and common sense. One method that can help in engaging critically, is to ask the LLM follow-up questions, request clarifications, and challenge responses. This will not only improve accuracy but it also ensures a deeper, more complete understanding of the topic.

A Powerful Tool

LLMs are powerful tools, but they remain just that—tools. They don’t replace human reasoning, intuition, or expertise, but they can significantly enhance them. By understanding how LLMs work, we can engage with them more effectively, apply them more appropriately, and develop a balanced perspective on their strengths, limitations, and best applications. Written with the assistance of ChatGPT and Perplexity AI

Online Games – The Benefits and How to Stay Safe

| 0

One of the most popular uses of the internet is online gaming. Smart phones, gaming consoles, computers, tablets, and virtual reality devices all allow us to participate in online games alone or with others.

While gaming may seem like a waste of time to some, there are potential benefits to online gaming for everyone: 

  • Games can help develop cognitive skills through strategic thinking and problem solving.
  • First person games (where you have the point of view of your character in the game) can help improve hand-eye coordination and fine motor skills through precise movements. Others help enhance cognitive abilities like memory, attention, and spatial awareness.
  • Multi-player games provide an opportunity to connect with friends and family as well as meet new people from around the world. Online communities develop and thrive through games and help give people a sense of community, especially for those that find it difficult to socialize in person. Team-based games also help to promote teamwork, leadership, collaboration, and communication skills.
  • Gaming can provide stress relief, an escape from everyday pressures, and provide relaxation and help improve mood.
  • Gaming helps teach overcoming challenges, dealing with setbacks, and multitasking skills as gamers learn to adapt new strategies and keep trying until they succeed.
  • Some games incorporate historical settings, scientific concepts, and language to make learning interactive and fun.

While gaming can provide all these potential benefits, there are potential threats to be mindful of while enjoying online games. The threats gamers may encounter include:

  • Hacking of game accounts to steal valuable in-game items, currency, and personal information.
  • Phishing scams via email, websites, or in-game scams that trick gamers into revealing personal information, login credentials, and payment details.
  • Malware, trojans, and viruses that are often disguised as game modifications\customizations or cheat codes leading to infected systems and stolen data.
  • Cyberbullying and toxic behavior during and after game play that affect players’ mental health.
  • Deepfakes and voice cloning can lead to identity theft, misinformation, and harassment.

How can we protect ourselves when gaming online?

  • Protect your personal information. Use two factor authentication to protect your accounts along with strong password protection. Make sure that you also set up ways to recover your accounts should you forget your password, or your account is hacked. When setting up accounts, only provide the minimum personal information needed to set up your account. If games have a subscription, use a third-party payment system such as Apple Pay, Google Pay, PayPal, etc. This keeps credit card information out of your account information.
  • Parents should set up parental controls for children, making sure they have access to age-appropriate games. Set time limits on playing as well as when games can be played where possible to make sure kids spend time with friends and family outside of games. Teach your kids about online safety and that they should talk to you or another trusted adult if they feel threatened or bullied when gaming online. Help educate your kids about potential scams online and in games, and make sure they talk to you before purchasing or downloading games or in app purchases.
  • Make sure PCs, tablets, and gaming consoles are updated to the latest operating systems and gaming software. PCs and tablets should have an up-to-date antivirus program on them as well as gaming consoles where possible.
  • As gamers and parents, we should also make sure that we stay safe mentally as we game. We need to protect ourselves and our kids from cyberbullying by playing games with friends and family and only participate in gaming communities that promote positive and healthy gaming habits. Players that bully or create a toxic environment for you and other players need to be reported to the people or companies hosting the games and blocked where possible.

Gaming addiction is real, and both adults and youth need to set up ways to help reduce the possibility of gaming addiction, identify when it happens, and seek help if they become addicted to online gaming.

Avoid gaming addiction by doing these practices:

  • Set specific time slots to play games during the day. Use alarms to remind you when to take breaks from the game and engage in other activities, rest your eyes, stretch, or just take a walk.
  • Make sure to prioritize responsibilities such as work, school, chores, sports, and time with family and friends before gaming. Use gaming as a reward when specific tasks are completed.
  • To help reduce eye strain, try to follow the 20-20-20 rule. Every 20 minutes of screen time or game play, look at something 20 feet away for at least 20 seconds.
  • Make sure to engage in other activities. Balance gaming with other hobbies such as reading, sports, or creative projects. Make sure to spend time with friends and family face to face.
  • Monitor gaming habits. Keep a log of how much time is spent gaming and how that time impacts daily life. Adjust the time spent gaming to make sure you take care of yourself, and your other responsibilities. Also monitor in-game purchases and set a budget for gaming expenses.
  • Create game-free zones in the house such as the dining room or bedroom as well as non-gaming hours. Try to keep the devices you use to game out of site or at least off during non-gaming hours.

If you or someone you know is addicted to gaming, seek support from friends, family or find a professional that you or your loved one can talk to. There are support groups available to help people through gaming addiction. Check sites such as Gamming Addicts Anonymous  to see if there is a local group near you.  They also provide online meetings where local groups are unavailable.

Online gaming provides wonderful opportunities not just for fun but for learning and connecting with others. By balancing the joys of gaming with safety measures, you can ensure that online gaming experiences are both fun and secure.

For more information:

Securing Online Gaming:

Cyberbullying:

Gaming Addiction

Cyberbullying and How to Deal with It

| 0

In 2022 19.2% of students surveyed nationwide, in grades 6-12 (ages 12-18), who reported being bullied during school, about 21.6% reported being bullied online or by text, including nearly twice as many girls (27.7%) as boys (14.1%) (National Victim Survey – School Crime Supplement).

One of the many reasons people may not want to connect online or use online applications is cyberbullying. Cyberbullying can have long-term consequences for the mental health of both youth and adults. It is important to understand how to prevent and deal with cyberbullying, should it occur to you or someone you know.

What is cyberbullying?

  • Cyberbullying takes place over digital devices like cell phones, computers, and tablets. Cyberbullying can occur via texting and messaging apps, or online in social media, forums, or gaming where people can view, participate in, or share content.
  • Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It also includes sharing personal or private information about someone else to cause embarrassment or humiliation.
  • Cyberbullying can cross the line into unlawful or criminal behavior.  Each state has different laws regarding cyberbullying.  You can learn more about the laws regarding cyberbullying in Missouri through the Cyberbullying Research Center  

How does cyberbullying occur?

It’s important to understand how cyberbullying occurs so it can be easily recognized, and we can take action to help children deal with cyberbullying. Some of the common tactics are:

  • Posting comments or rumors about someone online that are mean, hurtful, or embarrassing.
  • Threatening to hurt someone or telling them to kill themselves.
  • Posting a mean or hurtful picture or video.
  • Pretending to be someone else online in order to solicit or post personal or false information about someone else.
  • Posting mean or hateful names, comments, or content about any race, religion, ethnicity, or other personal characteristics online.
  • Creating a mean or hurtful webpage about someone.
  • Doxing, an abbreviated form of “documents”, is a type of online harassment used to exact revenge and to threaten and destroy the privacy of individuals by making their personal information public, including addresses, social security number, credit card and phone numbers, links to social media accounts, and other private data.

How can you tell if someone is possibly involved in cyberbullying?

The first step in preventing cyberbullying is to be aware of what kids are doing online. You need to know if your child is a victim of cyberbullying, witnessing cyberbullying, or is bullying other children online. Warning signs you should look for as a child uses their device include: (From stopbulling.gov)

  • Noticeable increases or decreases in device use, including texting.
  • Exhibiting emotional responses (laughter, anger, upset) to what is happening on their device.
  • Hiding their screen or device when others are near and avoids discussion about what they are doing on their device.
  • Social media accounts are shut down or new ones appear.
  • Avoiding social situations, even those that were enjoyed in the past.
  • Becoming withdrawn, depressed, or loses interest in people, hobbies, and activities.
  • Complaining about illness or physical symptoms to get out of going to school.
  • Difficulty sleeping. Almost 63% of victims report a lack of sleep as a psychological impact of being cyberbullied.
  • Talking about self-harm.

If you suspect your child may be involved in cyberbullying, take steps to investigate their digital behavior. Take the same approach as you would to any form of bullying. Make sure to provide support to the child being bullied, address the behavior of the bully or bullies involved, and make sure everyone understands that cyberbullying is taken seriously and can have serious consequences.

How can parents and youth prevent cyberbullying?

Responding to cyberbullying does require different approaches to address the issue. Some the things you can do to address the issue are:

  • Notice- Recognize if there has been a change in mood or behavior. Try to determine if these changes happen around a child’s use of their digital devices.
  • Talk – Ask questions to learn what is happening, how it started, and who is involved. Use active listening skills to get below the surface of conversations with youth.
  • Document – Keep a record of what is happening and where. Take screenshots of harmful posts or content. Most laws and policies note that bullying is repeated behavior, so records help to document it.
  • Report – Most social media platforms and schools have clear policies and reporting processes. If a classmate is cyberbullying, report it to the school. You can also contact app or social media platforms to report offensive content and have it removed. If a child has received physical threats, or if a potential crime or illegal behavior is occurring, report it to the police.
  • Support – Peers, mentors, and trusted adults can sometimes intervene publicly to positively influence a situation where negative or hurtful content posts about a child. Public intervention can include:
    • Posting positive comments about the person targeted with bullying to try to shift the conversation in a positive direction.
    • Reaching out to the child who is bullying and the target of the bullying to express your concern.
    • Rallying around a victim of cyberbullying is a highly effective defense against bullies. Bullying works by trying to isolate a victim or have them feel isolated. When friends and other youth rally around a victim, it can thwart the bullies.
    • Determining if more professional support is needed for those involved, such as speaking with a guidance counselor or mental health professional.

  • Teach internet safety. Making sure they understand about privacy, predators, phishing schemes, catfishing, and security.
  • Learn about their online friends and what they are doing online.
  • Let them know that you want to be aware of their online life and you will want to check on their online activities, friends, and files.
  • Help youth manage cyberbullying. Discuss what cyberbullying is and make sure they take any threats seriously. Teach them how to react to potential cyberbullying by ignoring or responding assertively and calmly to the person or persons doing the bullying. Identifying trusted adults that the child can speak to about potential cyberbullying.
  • Help youth build and maintain self-confidence. Having healthy self-esteem allows youth to be able to ignore or address cyberbullying.
  • Make sure youth understand you don’t approve of cyberbullying in any form and hold them accountable if they participate or witness cyberbullying.

What can youth do to help prevent cyberbullying?

  • Never respond to harassing or rude comments.
  • Save or print the evidence.
  • Talk to parents or a guardian if harassed; get help reporting this to your internet service provider, school, or local law enforcement.
  • Respect others online.
  • Only share passwords with a parent or guardian.
  • Change passwords often.
  • Password protect your cell phone.
  • Use privacy settings to block unwanted messages.
  • Think before posting or sending photos – they could be used to hurt you or someone else.
  • Contact the site administrator if someone creates a social networking page in your child’s name.

For more information on Cyberbullying:

What is Cyberbullyinghttps://www.stopbullying.gov/cyberbullying/what-is-it

School Crime Supplement– National Center for Education Statistics – https://nces.ed.gov/pubs2024/2024109rev.pdf

What is cyberbullying and how can it be prevented? – Mayo Clinic – https://mcpress.mayoclinic.org/parenting/what-is-cyberbullying-and-how-it-can-be-prevented/

Bullying – Mo Dept of Elementary and Secondary Education – https://dese.mo.gov/governmental-affairs/public-school-laws-missouri/bullying

Courage2Report – MO State Highway Patrol- https://www.mshp.dps.missouri.gov/MSHPWeb/Courage2ReportMO/index.html

Cyber-bullying: What Parents Can Do About it – The Center for Parenting Education –

Cyberbullying: Learn the Signs – American Society for the Positive Care of Children – https://americanspcc.org/cyberbullying-learn-the-signs/

How to help Kids Deal with Cyberbullying – Child Mind Institute – https://childmind.org/article/help-kids-deal-cyberbullying/

Mizzou Ed Bully Prevention Labhttps://www.mizzoubullypreventionlab.com/