In conjunction with our presentations, we offer three software programs “Missing”, “Air Dogs”, and “Mirror Image”.

Missing Software Overview

Zack spent all his waking hours talking to strangers on the Internet. Now he has disappeared. Can you find him?

You are going to assist the Royal Canadian Police to recover a boy, Zack, who is missing from his home, actually coerced by an Internet predator (Fantasma) to join him in California. The story is based on a true account, but all the characters you will see in the game are actors.

Brief synopsis: A computer game about Internet luring.

Zack is a great kid. He’s just having a bad year. His parents have split up. His dad is stressed, taking care of things at home and at work. He’s been working late at the office every night, and now he’s cancelled their vacation.

So Zack is steaming mad. He’s started skipping school, sleeping in until noon. He spends all his waking hours on his computer, building his own website. And he’s so talented. He designs amazing games starring a fantasy character named Zackman.

Zack is also building a family photo album. Not your normal boring snapshots. He’s animated them so they’re really funny. The problem is, anyone who visits the website can find out everything about Zack: name, address, school, sports…even family secrets.

While surfing the Internet, Zack discovers a chat room called Zine Scene where he can yak with kids. A lot of them are just boasting. But there’s one guy called Fantasma who designed a website, California Dreaming, all about the great clothes and beaches around San Diego. This zine is so cool! Rollerblading at pacific Beach, surfing at La Jolla.

Fantasma is an even better animator than Zack, but he doesn’t boast or anything. He sends Zack stuff to help him out. Like new animation software. And he’s really sympathetic about the problems with Zack’s dad. So when Fantasma offers him a job, Zack jumps at the chance. Well, wouldn’t you.

(Exerpts from ‘Missing’ software folder — Web Wise Kids and LiveWires Design Ltd.)

Missing Awards:

  • Computerworld Smithsonian Laureate Award in Education and Academia
  • Canarie Iway Award
  • ‘Missing’ Sponsors (partial list):
  • British Columbia Ministry of Education Candian Police Research Centre
  • Royal Canadian Mounted Police The Mounted Police Foundation
  • IBM Telefilms Canada
  • Symantec Interactive Digital Software Association
  • National Crime Prevention Centre Canadian Association of Internet Providers


Air Dogs Software Overview

AirDogs was designed to show teenagers that online crimes have lifelong legal and social consequences for teens and their families. In the game, Luke is a teenager who shows great promise as a snowboarder. He needs money for gear and training, so he begins to counterfeit software in his basement. Players collect data and evidence to catch Luke’s boss, who is the ringleader of the operation. The message of Air Dogs is clear: theft and extortion are crimes, whether you’re 16 or 60.

Air Dogs is based on a Massachusetts case in which teenage boys were drawn into a software piracy and cyber theft ring. In the Air Dogs game, players meet Luke, a teenage snowboarding enthusiast who badly needs money to go on a snowboarding tour. His coach, Terry, has hacked into an online auction site and stolen credit card information, which he has used to purchase hundreds of laptop computers. Luke agrees to sell the laptops to his friends for a share of the profits.

When Luke is taken into police custody for questioning, he is forced to make a difficult decision: will he tell the police that Terry is behind the cyber theft or will he remain loyal to his coach? Using sophisticated cyber policing tools such as “digital watermarks” and “GPS cell phone tracking,” players must locate and arrest Terry before all the blame falls on Luke.

(Exerpts from ‘AirDogs’ software information — Web Wise Kids and LiveWires Design Ltd.)

Mirror Image Software Overview

Mirror Image tells the story of teenagers Sheena and Megan, best friends who are victimized by a criminal who uses the Internet to lure young women with promises of modeling contracts and online romance. Neither of the girls realizes that hacking software has been placed on their computers during their conversations with their ‘online boyfriends.’ Soon Sheena and Megan begin to suspect that someone is stalking them in real life. Players work with a detective to track the predator and arrest him.

Mirror Image is based on a real-life police case in which eight young women were lured by a predator who claimed to be a modeling agent. In the Mirror Image game, players meet two friends, Sheena and Megan. Both of the girls have created profiles about themselves which they have posted on Instant Messaging. As a result of their profiles, Sheena has been contacted by a modeling agent, Mitch, and Megan has a new online boyfriend, Mike. Everything is great until the girls begin to suspect that someone is stalking them.

Using cyber policing tools such as “online directory research,” “pixel analysis,” and “IP address searches;” players are challenged to discover the connection between the girl’s online activities and the mysterious delivery van that seems to be shadowing them. By the end of the game, players discover that Mitch and Mike are the same man. He was able to stalk the girls after successfully placing a “trojan horse” on Sheena’s computer. The “trojan” compromised Sheena’s computer’s security settings and allowed the predator to electronically eavesdrop on the girl’s private conversations.

(Exerpts from ‘Mirror Image’ software information — Web Wise Kids and LiveWires Design Ltd.)