2. Disclaimer
I am not a lawyer, and this is not legal
advice
Twitter: @bfend / Web:
bryanfendley.com 2
3. Senate Bill 892
Schools shall promptly investigate and
report
A.C.A. § 6-18-514 (2011), Section D:
A school principal or his or her designee who receives a
credible report or complaint of bullying shall promptly
investigate the complaint or report and make a record of the
investigation and any action taken as a result of the
investigation.
Twitter: @bfend / Web:
bryanfendley.com 3
4. Using Four Basic Forensics
Phases to Launch Your
Investigation
According to National Institute of Standards and Technology Government
Publication 800-86, there are four basic phases in the forensics process:
Collection
Examination
Analysis
Reporting
Twitter: @bfend / Web:
bryanfendley.com 4
5. Prepare Your Own Cyber Bully
Incident Survival Guide
1. Incident Tacking Forms
2. Decision Trees
3. Steps for Preserving Evidence
4. Net Lingo Guides and Terms
5. Contacts
Twitter: @bfend / Web:
bryanfendley.com 5
6. Example Incident Tacking Forms
Anonymous Form (pdf)
Witness Statement (pdf)
Complaint Form (pdf)
Cyber Bully Tracking Form (pdf)
Twitter: @bfend / Web:
bryanfendley.com 6
7. Example Decision Trees
Broward County Public Schools
Alleged Bullying Investigation Process:
(Initiated when complaint received)
Twitter: @bfend / Web:
bryanfendley.com 7
8. Easy Ways to Preserve Most
Common Evidence
Screenshots
Text messages
Pictures
Emails
Videos
Searching
Twitter: @bfend / Web:
bryanfendley.com 8
9. Warning About Images
Do not keep in your possession as
part of your investigation indecent or
illegal images of minors. Report this to
the authorities immediately!
Twitter: @bfend / Web:
bryanfendley.com 9
10. Screenshots
Alt Print Screen and then paste into a
document
Vista start menu type “snipping tool
Mac – command shift 4
http://take-a-screenshot.org/
Twitter: @bfend / Web:
bryanfendley.com 10
11. Text messages
Iphone and Ipod - Hold down lock
button and double click home button.
Image is saved under photos
Don't delete messages - leave them
'as is' so can be used as evidence -
record time and date that messages
are received
Twitter: @bfend / Web:
bryanfendley.com 11
12. Pictures
Right click and paste
Twitter: @bfend / Web:
bryanfendley.com 12
13. Emails
X-Message-Info: JGTYoYF78jEHjJx36Oi8+Z3TmmkSEdPtfpLB7P/ybN8=
Received: from hotmail.com ([65.54.174.26]) by MC8-F19.hotmail.com with
Microsoft SMTPSVC(6.0.3790.211);
Thu, 9 Jun 2005 03:36:19 -0700
Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC;
Thu, 9 Jun 2005 03:13:41 -0700
Message-ID: <BAY103-F16185361BFA8152B9701EDE2FC0@phx.gbl>
Received: from 65.54.174.200 by by103fd.bay103.hotmail.msn.com with HTTP;
Thu, 09 Jun 2005 10:13:41 GMT
X-Originating-IP: [65.54.174.200]
X-Originating-Email: [bully@example.com]
X-Sender: bully@hotmail.com
In-Reply-To: <BAY103-DAV16418913D7F32B48B6F4B9D1FD0@phx.gbl>
From: "BULLY" <bully@hotmail.com>
To: victim@hotmail.com
Bcc:
Date: Thu, 09 Jun 2005 20:13:41 +1000
Mime-Version: 1.0
Content-Type: text/html; format=flowed
X-OriginalArrivalTime: 09 Jun 2005 10:13:41.0375 (UTC)
FILETIME=[E910B0F0:01C56CDB]
Source: http://www.cyberbullying.info/resources/report.php
Twitter: @bfend / Web:
bryanfendley.com 13
15. Searching
Search early, filter by upload time
Google alerts
Twitter: @bfend / Web:
bryanfendley.com 15
16. Final Note on Collecting
Evidence
Having an electronic record of the
evidence is better than a printed record
If you can’t figure out how to archive
evidence, take a picture or video
Collect the evidence as soon as you see
it. The evidence may be gone if you plan
to get to it later.
Keep a backup!
Twitter: @bfend / Web:
bryanfendley.com 16
17. Can You Read This?
g4ng up 4nd k1ll
l@u
laughing at you
G3y
Gay
lzr
Loser
zerg
To gang up on someone
frag
Kill
7h3
the
Twitter: @bfend / Web:
bryanfendley.com 17
18. Net Lingo Guides and Terms
Slang / Net Lingo / Leet Speak
http://www.netlingo.com/top50/index.p
hp
http://www.noslang.com/articles.php
Cyber Bully Terms
Anti Defamation League
CyberBullying.us
Twitter: @bfend / Web:
bryanfendley.com 18
20. List of Popular Social
Networking Websites
Wikipedia has a sortable list
Twitter: @bfend / Web:
bryanfendley.com 20
21. Final Thoughts
Prevention programs are key
Have a plan in place before an
incident occurs
Stay familiar with internet culture
Twitter: @bfend / Web:
bryanfendley.com 21
Notes de l'éditeur
Help from world of computer forensics
Things to have ready that will help you
Saving Emails with Full HeadersHeaders are all the letters, numbers and symbols that you see either at the top or bottom of emails you have received - if you can't see this information, check out the links below for instructions on how to show headers in your email program. Headers contain information such as the subject, recipient's name and email address, sender's name and email address, and information that can pinpoint the sender's location in the real world.Below is an example of a header from an email. From the header, the company can pinpoint the exact computer that the email was sent from.