SlideShare une entreprise Scribd logo
1  sur  21
Cyber Safety
Investigation/Reporting/
Procedures

Bryan Fendley
Director of Academic Computing
University of Arkansas at Monticello


                             Twitter: @bfend / Web:
                             bryanfendley.com         1
Disclaimer
   I am not a lawyer, and this is not legal
    advice




                           Twitter: @bfend / Web:
                           bryanfendley.com         2
Senate Bill 892
   Schools shall promptly investigate and
    report

    A.C.A. § 6-18-514 (2011), Section D:

    A school principal or his or her designee who receives a
    credible report or complaint of bullying shall promptly
    investigate the complaint or report and make a record of the
    investigation and any action taken as a result of the
    investigation.



                                       Twitter: @bfend / Web:
                                       bryanfendley.com            3
Using Four Basic Forensics
Phases to Launch Your
Investigation
According to National Institute of Standards and Technology Government
  Publication 800-86, there are four basic phases in the forensics process:



 Collection
 Examination
 Analysis
 Reporting




                                              Twitter: @bfend / Web:
                                              bryanfendley.com                4
Prepare Your Own Cyber Bully
Incident Survival Guide
1.   Incident Tacking Forms
2.   Decision Trees
3.   Steps for Preserving Evidence
4.   Net Lingo Guides and Terms
5.   Contacts




                        Twitter: @bfend / Web:
                        bryanfendley.com         5
Example Incident Tacking Forms

   Anonymous Form (pdf)

   Witness Statement (pdf)

   Complaint Form (pdf)

   Cyber Bully Tracking Form (pdf)


                           Twitter: @bfend / Web:
                           bryanfendley.com         6
Example Decision Trees

Broward County Public Schools
Alleged Bullying Investigation Process:
(Initiated when complaint received)




                               Twitter: @bfend / Web:
                               bryanfendley.com         7
Easy Ways to Preserve Most
Common Evidence
 Screenshots
 Text messages
 Pictures
 Emails
 Videos
 Searching



                  Twitter: @bfend / Web:
                  bryanfendley.com         8
Warning About Images
   Do not keep in your possession as
    part of your investigation indecent or
    illegal images of minors. Report this to
    the authorities immediately!




                          Twitter: @bfend / Web:
                          bryanfendley.com         9
Screenshots


   Alt Print Screen and then paste into a
    document

   Vista start menu type “snipping tool

   Mac – command shift 4

   http://take-a-screenshot.org/

                           Twitter: @bfend / Web:
                           bryanfendley.com         10
Text messages

   Iphone and Ipod - Hold down lock
    button and double click home button.
    Image is saved under photos

   Don't delete messages - leave them
    'as is' so can be used as evidence -
    record time and date that messages
    are received

                         Twitter: @bfend / Web:
                         bryanfendley.com         11
Pictures

   Right click and paste




                            Twitter: @bfend / Web:
                            bryanfendley.com         12
Emails
   X-Message-Info: JGTYoYF78jEHjJx36Oi8+Z3TmmkSEdPtfpLB7P/ybN8=
   Received: from hotmail.com ([65.54.174.26]) by MC8-F19.hotmail.com with
   Microsoft SMTPSVC(6.0.3790.211);
   Thu, 9 Jun 2005 03:36:19 -0700
   Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC;
   Thu, 9 Jun 2005 03:13:41 -0700
   Message-ID: <BAY103-F16185361BFA8152B9701EDE2FC0@phx.gbl>
   Received: from 65.54.174.200 by by103fd.bay103.hotmail.msn.com with HTTP;
   Thu, 09 Jun 2005 10:13:41 GMT
   X-Originating-IP: [65.54.174.200]
   X-Originating-Email: [bully@example.com]
   X-Sender: bully@hotmail.com
   In-Reply-To: <BAY103-DAV16418913D7F32B48B6F4B9D1FD0@phx.gbl>
   From: "BULLY" <bully@hotmail.com>
   To: victim@hotmail.com
   Bcc:
   Date: Thu, 09 Jun 2005 20:13:41 +1000
   Mime-Version: 1.0
   Content-Type: text/html; format=flowed
   X-OriginalArrivalTime: 09 Jun 2005 10:13:41.0375 (UTC)
   FILETIME=[E910B0F0:01C56CDB]

Source: http://www.cyberbullying.info/resources/report.php



                                                 Twitter: @bfend / Web:
                                                 bryanfendley.com              13
Videos

   Video DownloadHelper




                      Twitter: @bfend / Web:
                      bryanfendley.com         14
Searching

 Search early, filter by upload time
 Google alerts




                        Twitter: @bfend / Web:
                        bryanfendley.com         15
Final Note on Collecting
Evidence
   Having an electronic record of the
    evidence is better than a printed record

   If you can’t figure out how to archive
    evidence, take a picture or video

   Collect the evidence as soon as you see
    it. The evidence may be gone if you plan
    to get to it later.

   Keep a backup!
                            Twitter: @bfend / Web:
                            bryanfendley.com         16
Can You Read This?
g4ng up 4nd k1ll

   l@u
laughing at you

  G3y
Gay

  lzr
Loser

   zerg
To gang up on someone

      frag
Kill

      7h3
the



                        Twitter: @bfend / Web:
                        bryanfendley.com         17
Net Lingo Guides and Terms
Slang / Net Lingo / Leet Speak
 http://www.netlingo.com/top50/index.p
  hp
 http://www.noslang.com/articles.php


Cyber Bully Terms
 Anti Defamation League
 CyberBullying.us

                      Twitter: @bfend / Web:
                      bryanfendley.com         18
Contacts
   Facebook http://www.facebook.com/report/

   Twitter http://support.twitter.com/articles/15794

   Youtube http://www.youtube.com/reportabuse

   MySpace http://www.myspace.com/help/reportabuse

   Bebo http://www.bebo.com/Safety.jsp

Phone Companies
 ATT&T
 Verizon
 Tmobile
 Cricket
 Icloud

                                            Twitter: @bfend / Web:
                                            bryanfendley.com         19
List of Popular Social
Networking Websites
   Wikipedia has a sortable list




                          Twitter: @bfend / Web:
                          bryanfendley.com         20
Final Thoughts
   Prevention programs are key

   Have a plan in place before an
    incident occurs

   Stay familiar with internet culture



                           Twitter: @bfend / Web:
                           bryanfendley.com         21

Contenu connexe

Tendances

List of Top CEO, CTO, CMO & other C Suite Blogs
List of Top CEO, CTO, CMO & other C Suite BlogsList of Top CEO, CTO, CMO & other C Suite Blogs
List of Top CEO, CTO, CMO & other C Suite BlogsHarshavardhan MP
 
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence Michael Nelson
 
Becybersmart
BecybersmartBecybersmart
BecybersmartVelma
 
Information and Knowledge Policy - Social Media
Information and Knowledge Policy - Social MediaInformation and Knowledge Policy - Social Media
Information and Knowledge Policy - Social MediaLeandro Cianconi
 
Online policy primer - Facebook
Online policy primer - FacebookOnline policy primer - Facebook
Online policy primer - Facebookelscobio79
 
Challenging Web 2.0
Challenging Web 2.0Challenging Web 2.0
Challenging Web 2.0Roland Alton
 
Online identity tutorial
Online identity tutorialOnline identity tutorial
Online identity tutorialCMHSL
 
Information Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesInformation Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesVince Verbeke
 
facebook privacy and legal issues
facebook privacy and legal issuesfacebook privacy and legal issues
facebook privacy and legal issuesAman Khanna
 
What's Your StatusNet? Lightning Talk 1.0
What's Your StatusNet? Lightning Talk 1.0What's Your StatusNet? Lightning Talk 1.0
What's Your StatusNet? Lightning Talk 1.0Jon Phillips
 
The Internet And Our Children
The Internet And Our ChildrenThe Internet And Our Children
The Internet And Our Childrendlmarion
 
2010-04-16 eoi mit ocwc stephen carson
2010-04-16 eoi mit ocwc stephen carson2010-04-16 eoi mit ocwc stephen carson
2010-04-16 eoi mit ocwc stephen carsoneMadrid network
 

Tendances (20)

What Is Web 20?
What Is Web 20?What Is Web 20?
What Is Web 20?
 
Time For Being Social
Time For Being SocialTime For Being Social
Time For Being Social
 
List of Top CEO, CTO, CMO & other C Suite Blogs
List of Top CEO, CTO, CMO & other C Suite BlogsList of Top CEO, CTO, CMO & other C Suite Blogs
List of Top CEO, CTO, CMO & other C Suite Blogs
 
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
 
Becybersmart
BecybersmartBecybersmart
Becybersmart
 
Information and Knowledge Policy - Social Media
Information and Knowledge Policy - Social MediaInformation and Knowledge Policy - Social Media
Information and Knowledge Policy - Social Media
 
Hs facebook pwrpoint
Hs facebook pwrpointHs facebook pwrpoint
Hs facebook pwrpoint
 
Online policy primer - Facebook
Online policy primer - FacebookOnline policy primer - Facebook
Online policy primer - Facebook
 
Challenging Web 2.0
Challenging Web 2.0Challenging Web 2.0
Challenging Web 2.0
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Facebook101
Facebook101Facebook101
Facebook101
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Online identity tutorial
Online identity tutorialOnline identity tutorial
Online identity tutorial
 
Information Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesInformation Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag Sciences
 
facebook privacy and legal issues
facebook privacy and legal issuesfacebook privacy and legal issues
facebook privacy and legal issues
 
Facebook privacy and security
Facebook privacy and securityFacebook privacy and security
Facebook privacy and security
 
What's Your StatusNet? Lightning Talk 1.0
What's Your StatusNet? Lightning Talk 1.0What's Your StatusNet? Lightning Talk 1.0
What's Your StatusNet? Lightning Talk 1.0
 
The Internet And Our Children
The Internet And Our ChildrenThe Internet And Our Children
The Internet And Our Children
 
2010-04-16 eoi mit ocwc stephen carson
2010-04-16 eoi mit ocwc stephen carson2010-04-16 eoi mit ocwc stephen carson
2010-04-16 eoi mit ocwc stephen carson
 
Open sharing, Global Benefits
Open sharing, Global BenefitsOpen sharing, Global Benefits
Open sharing, Global Benefits
 

Similaire à Cyberbullying Investigation/Reporting/ Procedures

How technology has changed the way we live
How technology has changed the way we  liveHow technology has changed the way we  live
How technology has changed the way we liveforsythtechstudent
 
How technology has changed the way we live
How technology has changed the way we  liveHow technology has changed the way we  live
How technology has changed the way we liveforsythtechstudent
 
How technology has changed the way we live
How technology has changed the way we  liveHow technology has changed the way we  live
How technology has changed the way we liveforsythtechstudent
 
How technology has changed the way we live
How technology has changed the way we  liveHow technology has changed the way we  live
How technology has changed the way we liveforsythtechstudent
 
How technology has changed the way we live
How technology has changed the way we  liveHow technology has changed the way we  live
How technology has changed the way we liveforsythtechstudent
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parentssafetyseminar
 
Protecting Your Profits - Social Media Presentation
Protecting Your Profits - Social Media PresentationProtecting Your Profits - Social Media Presentation
Protecting Your Profits - Social Media Presentationnathanhenry
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyDi Doersch
 
Finding things out on the Web
Finding things out on the WebFinding things out on the Web
Finding things out on the WebMiles Berry
 
National Retail Federation - Does Your Reputation Procede You?
National Retail Federation - Does Your Reputation Procede You?National Retail Federation - Does Your Reputation Procede You?
National Retail Federation - Does Your Reputation Procede You?Helen Levinson
 
The Truth About Internet Safety
The Truth About Internet SafetyThe Truth About Internet Safety
The Truth About Internet SafetyJessica Punke
 
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social MediaAsset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social MediaHelen Levinson
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017KanelandSvihlik
 
How social media can make or break you
How social media can make or break youHow social media can make or break you
How social media can make or break youssjmauro
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Top Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social MediaTop Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social MediaBen Woelk, CISSP, CPTC
 
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...Helen Levinson
 

Similaire à Cyberbullying Investigation/Reporting/ Procedures (20)

How technology has changed the way we live
How technology has changed the way we  liveHow technology has changed the way we  live
How technology has changed the way we live
 
How technology has changed the way we live
How technology has changed the way we  liveHow technology has changed the way we  live
How technology has changed the way we live
 
How technology has changed the way we live
How technology has changed the way we  liveHow technology has changed the way we  live
How technology has changed the way we live
 
How technology has changed the way we live
How technology has changed the way we  liveHow technology has changed the way we  live
How technology has changed the way we live
 
How technology has changed the way we live
How technology has changed the way we  liveHow technology has changed the way we  live
How technology has changed the way we live
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
 
Protecting Your Profits - Social Media Presentation
Protecting Your Profits - Social Media PresentationProtecting Your Profits - Social Media Presentation
Protecting Your Profits - Social Media Presentation
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and Technology
 
Finding things out on the Web
Finding things out on the WebFinding things out on the Web
Finding things out on the Web
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
National Retail Federation - Does Your Reputation Procede You?
National Retail Federation - Does Your Reputation Procede You?National Retail Federation - Does Your Reputation Procede You?
National Retail Federation - Does Your Reputation Procede You?
 
The Truth About Internet Safety
The Truth About Internet SafetyThe Truth About Internet Safety
The Truth About Internet Safety
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social MediaAsset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
 
How social media can make or break you
How social media can make or break youHow social media can make or break you
How social media can make or break you
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Top Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social MediaTop Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social Media
 
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
 
Factual proposal
Factual proposalFactual proposal
Factual proposal
 

Plus de Bryan Fendley

Data Artists Are The Future
Data Artists Are The FutureData Artists Are The Future
Data Artists Are The FutureBryan Fendley
 
Notes on Google Analytics Sessions and Users
Notes on Google Analytics Sessions and UsersNotes on Google Analytics Sessions and Users
Notes on Google Analytics Sessions and UsersBryan Fendley
 
Eduweb gamificationslideshare
Eduweb gamificationslideshareEduweb gamificationslideshare
Eduweb gamificationslideshareBryan Fendley
 
What Educators Can Learn From the Video Game Industry
What Educators Can Learn From the Video Game IndustryWhat Educators Can Learn From the Video Game Industry
What Educators Can Learn From the Video Game IndustryBryan Fendley
 
Integrating Problem Based Learning into Online Instruction BbWorld Pre Conf W...
Integrating Problem Based Learning into Online Instruction BbWorld Pre Conf W...Integrating Problem Based Learning into Online Instruction BbWorld Pre Conf W...
Integrating Problem Based Learning into Online Instruction BbWorld Pre Conf W...Bryan Fendley
 
Fendley how secure is your e learning
Fendley how secure is your e learningFendley how secure is your e learning
Fendley how secure is your e learningBryan Fendley
 

Plus de Bryan Fendley (8)

Data Artists Are The Future
Data Artists Are The FutureData Artists Are The Future
Data Artists Are The Future
 
Notes on Google Analytics Sessions and Users
Notes on Google Analytics Sessions and UsersNotes on Google Analytics Sessions and Users
Notes on Google Analytics Sessions and Users
 
Eduweb gamificationslideshare
Eduweb gamificationslideshareEduweb gamificationslideshare
Eduweb gamificationslideshare
 
What Educators Can Learn From the Video Game Industry
What Educators Can Learn From the Video Game IndustryWhat Educators Can Learn From the Video Game Industry
What Educators Can Learn From the Video Game Industry
 
Asot
AsotAsot
Asot
 
Pbl ardla
Pbl ardlaPbl ardla
Pbl ardla
 
Integrating Problem Based Learning into Online Instruction BbWorld Pre Conf W...
Integrating Problem Based Learning into Online Instruction BbWorld Pre Conf W...Integrating Problem Based Learning into Online Instruction BbWorld Pre Conf W...
Integrating Problem Based Learning into Online Instruction BbWorld Pre Conf W...
 
Fendley how secure is your e learning
Fendley how secure is your e learningFendley how secure is your e learning
Fendley how secure is your e learning
 

Dernier

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 

Dernier (20)

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 

Cyberbullying Investigation/Reporting/ Procedures

  • 1. Cyber Safety Investigation/Reporting/ Procedures Bryan Fendley Director of Academic Computing University of Arkansas at Monticello Twitter: @bfend / Web: bryanfendley.com 1
  • 2. Disclaimer  I am not a lawyer, and this is not legal advice Twitter: @bfend / Web: bryanfendley.com 2
  • 3. Senate Bill 892  Schools shall promptly investigate and report A.C.A. § 6-18-514 (2011), Section D: A school principal or his or her designee who receives a credible report or complaint of bullying shall promptly investigate the complaint or report and make a record of the investigation and any action taken as a result of the investigation. Twitter: @bfend / Web: bryanfendley.com 3
  • 4. Using Four Basic Forensics Phases to Launch Your Investigation According to National Institute of Standards and Technology Government Publication 800-86, there are four basic phases in the forensics process:  Collection  Examination  Analysis  Reporting Twitter: @bfend / Web: bryanfendley.com 4
  • 5. Prepare Your Own Cyber Bully Incident Survival Guide 1. Incident Tacking Forms 2. Decision Trees 3. Steps for Preserving Evidence 4. Net Lingo Guides and Terms 5. Contacts Twitter: @bfend / Web: bryanfendley.com 5
  • 6. Example Incident Tacking Forms  Anonymous Form (pdf)  Witness Statement (pdf)  Complaint Form (pdf)  Cyber Bully Tracking Form (pdf) Twitter: @bfend / Web: bryanfendley.com 6
  • 7. Example Decision Trees Broward County Public Schools Alleged Bullying Investigation Process: (Initiated when complaint received) Twitter: @bfend / Web: bryanfendley.com 7
  • 8. Easy Ways to Preserve Most Common Evidence  Screenshots  Text messages  Pictures  Emails  Videos  Searching Twitter: @bfend / Web: bryanfendley.com 8
  • 9. Warning About Images  Do not keep in your possession as part of your investigation indecent or illegal images of minors. Report this to the authorities immediately! Twitter: @bfend / Web: bryanfendley.com 9
  • 10. Screenshots  Alt Print Screen and then paste into a document  Vista start menu type “snipping tool  Mac – command shift 4  http://take-a-screenshot.org/ Twitter: @bfend / Web: bryanfendley.com 10
  • 11. Text messages  Iphone and Ipod - Hold down lock button and double click home button. Image is saved under photos  Don't delete messages - leave them 'as is' so can be used as evidence - record time and date that messages are received Twitter: @bfend / Web: bryanfendley.com 11
  • 12. Pictures  Right click and paste Twitter: @bfend / Web: bryanfendley.com 12
  • 13. Emails X-Message-Info: JGTYoYF78jEHjJx36Oi8+Z3TmmkSEdPtfpLB7P/ybN8= Received: from hotmail.com ([65.54.174.26]) by MC8-F19.hotmail.com with Microsoft SMTPSVC(6.0.3790.211); Thu, 9 Jun 2005 03:36:19 -0700 Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC; Thu, 9 Jun 2005 03:13:41 -0700 Message-ID: <BAY103-F16185361BFA8152B9701EDE2FC0@phx.gbl> Received: from 65.54.174.200 by by103fd.bay103.hotmail.msn.com with HTTP; Thu, 09 Jun 2005 10:13:41 GMT X-Originating-IP: [65.54.174.200] X-Originating-Email: [bully@example.com] X-Sender: bully@hotmail.com In-Reply-To: <BAY103-DAV16418913D7F32B48B6F4B9D1FD0@phx.gbl> From: "BULLY" <bully@hotmail.com> To: victim@hotmail.com Bcc: Date: Thu, 09 Jun 2005 20:13:41 +1000 Mime-Version: 1.0 Content-Type: text/html; format=flowed X-OriginalArrivalTime: 09 Jun 2005 10:13:41.0375 (UTC) FILETIME=[E910B0F0:01C56CDB] Source: http://www.cyberbullying.info/resources/report.php Twitter: @bfend / Web: bryanfendley.com 13
  • 14. Videos  Video DownloadHelper Twitter: @bfend / Web: bryanfendley.com 14
  • 15. Searching  Search early, filter by upload time  Google alerts Twitter: @bfend / Web: bryanfendley.com 15
  • 16. Final Note on Collecting Evidence  Having an electronic record of the evidence is better than a printed record  If you can’t figure out how to archive evidence, take a picture or video  Collect the evidence as soon as you see it. The evidence may be gone if you plan to get to it later.  Keep a backup! Twitter: @bfend / Web: bryanfendley.com 16
  • 17. Can You Read This? g4ng up 4nd k1ll  l@u laughing at you  G3y Gay  lzr Loser  zerg To gang up on someone  frag Kill  7h3 the Twitter: @bfend / Web: bryanfendley.com 17
  • 18. Net Lingo Guides and Terms Slang / Net Lingo / Leet Speak  http://www.netlingo.com/top50/index.p hp  http://www.noslang.com/articles.php Cyber Bully Terms  Anti Defamation League  CyberBullying.us Twitter: @bfend / Web: bryanfendley.com 18
  • 19. Contacts  Facebook http://www.facebook.com/report/  Twitter http://support.twitter.com/articles/15794  Youtube http://www.youtube.com/reportabuse  MySpace http://www.myspace.com/help/reportabuse  Bebo http://www.bebo.com/Safety.jsp Phone Companies  ATT&T  Verizon  Tmobile  Cricket  Icloud Twitter: @bfend / Web: bryanfendley.com 19
  • 20. List of Popular Social Networking Websites  Wikipedia has a sortable list Twitter: @bfend / Web: bryanfendley.com 20
  • 21. Final Thoughts  Prevention programs are key  Have a plan in place before an incident occurs  Stay familiar with internet culture Twitter: @bfend / Web: bryanfendley.com 21

Notes de l'éditeur

  1. Help from world of computer forensics
  2. Things to have ready that will help you
  3. Saving Emails with Full HeadersHeaders are all the letters, numbers and symbols that you see either at the top or bottom of emails you have received - if you can&apos;t see this information, check out the links below for instructions on how to show headers in your email program. Headers contain information such as the subject, recipient&apos;s name and email address, sender&apos;s name and email address, and information that can pinpoint the sender&apos;s location in the real world.Below is an example of a header from an email. From the header, the company can pinpoint the exact computer that the email was sent from.