SlideShare una empresa de Scribd logo
1 de 21
Cyber Safety
Investigation/Reporting/
Procedures

Bryan Fendley
Director of Academic Computing
University of Arkansas at Monticello


                             Twitter: @bfend / Web:
                             bryanfendley.com         1
Disclaimer
   I am not a lawyer, and this is not legal
    advice




                           Twitter: @bfend / Web:
                           bryanfendley.com         2
Senate Bill 892
   Schools shall promptly investigate and
    report

    A.C.A. § 6-18-514 (2011), Section D:

    A school principal or his or her designee who receives a
    credible report or complaint of bullying shall promptly
    investigate the complaint or report and make a record of the
    investigation and any action taken as a result of the
    investigation.



                                       Twitter: @bfend / Web:
                                       bryanfendley.com            3
Using Four Basic Forensics
Phases to Launch Your
Investigation
According to National Institute of Standards and Technology Government
  Publication 800-86, there are four basic phases in the forensics process:



 Collection
 Examination
 Analysis
 Reporting




                                              Twitter: @bfend / Web:
                                              bryanfendley.com                4
Prepare Your Own Cyber Bully
Incident Survival Guide
1.   Incident Tacking Forms
2.   Decision Trees
3.   Steps for Preserving Evidence
4.   Net Lingo Guides and Terms
5.   Contacts




                        Twitter: @bfend / Web:
                        bryanfendley.com         5
Example Incident Tacking Forms

   Anonymous Form (pdf)

   Witness Statement (pdf)

   Complaint Form (pdf)

   Cyber Bully Tracking Form (pdf)


                           Twitter: @bfend / Web:
                           bryanfendley.com         6
Example Decision Trees

Broward County Public Schools
Alleged Bullying Investigation Process:
(Initiated when complaint received)




                               Twitter: @bfend / Web:
                               bryanfendley.com         7
Easy Ways to Preserve Most
Common Evidence
 Screenshots
 Text messages
 Pictures
 Emails
 Videos
 Searching



                  Twitter: @bfend / Web:
                  bryanfendley.com         8
Warning About Images
   Do not keep in your possession as
    part of your investigation indecent or
    illegal images of minors. Report this to
    the authorities immediately!




                          Twitter: @bfend / Web:
                          bryanfendley.com         9
Screenshots


   Alt Print Screen and then paste into a
    document

   Vista start menu type “snipping tool

   Mac – command shift 4

   http://take-a-screenshot.org/

                           Twitter: @bfend / Web:
                           bryanfendley.com         10
Text messages

   Iphone and Ipod - Hold down lock
    button and double click home button.
    Image is saved under photos

   Don't delete messages - leave them
    'as is' so can be used as evidence -
    record time and date that messages
    are received

                         Twitter: @bfend / Web:
                         bryanfendley.com         11
Pictures

   Right click and paste




                            Twitter: @bfend / Web:
                            bryanfendley.com         12
Emails
   X-Message-Info: JGTYoYF78jEHjJx36Oi8+Z3TmmkSEdPtfpLB7P/ybN8=
   Received: from hotmail.com ([65.54.174.26]) by MC8-F19.hotmail.com with
   Microsoft SMTPSVC(6.0.3790.211);
   Thu, 9 Jun 2005 03:36:19 -0700
   Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC;
   Thu, 9 Jun 2005 03:13:41 -0700
   Message-ID: <BAY103-F16185361BFA8152B9701EDE2FC0@phx.gbl>
   Received: from 65.54.174.200 by by103fd.bay103.hotmail.msn.com with HTTP;
   Thu, 09 Jun 2005 10:13:41 GMT
   X-Originating-IP: [65.54.174.200]
   X-Originating-Email: [bully@example.com]
   X-Sender: bully@hotmail.com
   In-Reply-To: <BAY103-DAV16418913D7F32B48B6F4B9D1FD0@phx.gbl>
   From: "BULLY" <bully@hotmail.com>
   To: victim@hotmail.com
   Bcc:
   Date: Thu, 09 Jun 2005 20:13:41 +1000
   Mime-Version: 1.0
   Content-Type: text/html; format=flowed
   X-OriginalArrivalTime: 09 Jun 2005 10:13:41.0375 (UTC)
   FILETIME=[E910B0F0:01C56CDB]

Source: http://www.cyberbullying.info/resources/report.php



                                                 Twitter: @bfend / Web:
                                                 bryanfendley.com              13
Videos

   Video DownloadHelper




                      Twitter: @bfend / Web:
                      bryanfendley.com         14
Searching

 Search early, filter by upload time
 Google alerts




                        Twitter: @bfend / Web:
                        bryanfendley.com         15
Final Note on Collecting
Evidence
   Having an electronic record of the
    evidence is better than a printed record

   If you can’t figure out how to archive
    evidence, take a picture or video

   Collect the evidence as soon as you see
    it. The evidence may be gone if you plan
    to get to it later.

   Keep a backup!
                            Twitter: @bfend / Web:
                            bryanfendley.com         16
Can You Read This?
g4ng up 4nd k1ll

   l@u
laughing at you

  G3y
Gay

  lzr
Loser

   zerg
To gang up on someone

      frag
Kill

      7h3
the



                        Twitter: @bfend / Web:
                        bryanfendley.com         17
Net Lingo Guides and Terms
Slang / Net Lingo / Leet Speak
 http://www.netlingo.com/top50/index.p
  hp
 http://www.noslang.com/articles.php


Cyber Bully Terms
 Anti Defamation League
 CyberBullying.us

                      Twitter: @bfend / Web:
                      bryanfendley.com         18
Contacts
   Facebook http://www.facebook.com/report/

   Twitter http://support.twitter.com/articles/15794

   Youtube http://www.youtube.com/reportabuse

   MySpace http://www.myspace.com/help/reportabuse

   Bebo http://www.bebo.com/Safety.jsp

Phone Companies
 ATT&T
 Verizon
 Tmobile
 Cricket
 Icloud

                                            Twitter: @bfend / Web:
                                            bryanfendley.com         19
List of Popular Social
Networking Websites
   Wikipedia has a sortable list




                          Twitter: @bfend / Web:
                          bryanfendley.com         20
Final Thoughts
   Prevention programs are key

   Have a plan in place before an
    incident occurs

   Stay familiar with internet culture



                           Twitter: @bfend / Web:
                           bryanfendley.com         21

Más contenido relacionado

La actualidad más candente

List of Top CEO, CTO, CMO & other C Suite Blogs
List of Top CEO, CTO, CMO & other C Suite BlogsList of Top CEO, CTO, CMO & other C Suite Blogs
List of Top CEO, CTO, CMO & other C Suite BlogsHarshavardhan MP
 
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence Michael Nelson
 
Becybersmart
BecybersmartBecybersmart
BecybersmartVelma
 
Information and Knowledge Policy - Social Media
Information and Knowledge Policy - Social MediaInformation and Knowledge Policy - Social Media
Information and Knowledge Policy - Social MediaLeandro Cianconi
 
Online policy primer - Facebook
Online policy primer - FacebookOnline policy primer - Facebook
Online policy primer - Facebookelscobio79
 
Challenging Web 2.0
Challenging Web 2.0Challenging Web 2.0
Challenging Web 2.0Roland Alton
 
Online identity tutorial
Online identity tutorialOnline identity tutorial
Online identity tutorialCMHSL
 
Information Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesInformation Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesVince Verbeke
 
facebook privacy and legal issues
facebook privacy and legal issuesfacebook privacy and legal issues
facebook privacy and legal issuesAman Khanna
 
What's Your StatusNet? Lightning Talk 1.0
What's Your StatusNet? Lightning Talk 1.0What's Your StatusNet? Lightning Talk 1.0
What's Your StatusNet? Lightning Talk 1.0Jon Phillips
 
The Internet And Our Children
The Internet And Our ChildrenThe Internet And Our Children
The Internet And Our Childrendlmarion
 
2010-04-16 eoi mit ocwc stephen carson
2010-04-16 eoi mit ocwc stephen carson2010-04-16 eoi mit ocwc stephen carson
2010-04-16 eoi mit ocwc stephen carsoneMadrid network
 

La actualidad más candente (20)

What Is Web 20?
What Is Web 20?What Is Web 20?
What Is Web 20?
 
Time For Being Social
Time For Being SocialTime For Being Social
Time For Being Social
 
List of Top CEO, CTO, CMO & other C Suite Blogs
List of Top CEO, CTO, CMO & other C Suite BlogsList of Top CEO, CTO, CMO & other C Suite Blogs
List of Top CEO, CTO, CMO & other C Suite Blogs
 
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence Weaponized Web Archives: Provenance Laundering of Short Order Evidence
Weaponized Web Archives: Provenance Laundering of Short Order Evidence
 
Becybersmart
BecybersmartBecybersmart
Becybersmart
 
Information and Knowledge Policy - Social Media
Information and Knowledge Policy - Social MediaInformation and Knowledge Policy - Social Media
Information and Knowledge Policy - Social Media
 
Hs facebook pwrpoint
Hs facebook pwrpointHs facebook pwrpoint
Hs facebook pwrpoint
 
Online policy primer - Facebook
Online policy primer - FacebookOnline policy primer - Facebook
Online policy primer - Facebook
 
Challenging Web 2.0
Challenging Web 2.0Challenging Web 2.0
Challenging Web 2.0
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Facebook101
Facebook101Facebook101
Facebook101
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Online identity tutorial
Online identity tutorialOnline identity tutorial
Online identity tutorial
 
Information Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesInformation Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag Sciences
 
facebook privacy and legal issues
facebook privacy and legal issuesfacebook privacy and legal issues
facebook privacy and legal issues
 
Facebook privacy and security
Facebook privacy and securityFacebook privacy and security
Facebook privacy and security
 
What's Your StatusNet? Lightning Talk 1.0
What's Your StatusNet? Lightning Talk 1.0What's Your StatusNet? Lightning Talk 1.0
What's Your StatusNet? Lightning Talk 1.0
 
The Internet And Our Children
The Internet And Our ChildrenThe Internet And Our Children
The Internet And Our Children
 
2010-04-16 eoi mit ocwc stephen carson
2010-04-16 eoi mit ocwc stephen carson2010-04-16 eoi mit ocwc stephen carson
2010-04-16 eoi mit ocwc stephen carson
 
Open sharing, Global Benefits
Open sharing, Global BenefitsOpen sharing, Global Benefits
Open sharing, Global Benefits
 

Similar a Cyberbullying Investigation/Reporting/ Procedures

How technology has changed the way we live
How technology has changed the way we  liveHow technology has changed the way we  live
How technology has changed the way we liveforsythtechstudent
 
How technology has changed the way we live
How technology has changed the way we  liveHow technology has changed the way we  live
How technology has changed the way we liveforsythtechstudent
 
How technology has changed the way we live
How technology has changed the way we  liveHow technology has changed the way we  live
How technology has changed the way we liveforsythtechstudent
 
How technology has changed the way we live
How technology has changed the way we  liveHow technology has changed the way we  live
How technology has changed the way we liveforsythtechstudent
 
How technology has changed the way we live
How technology has changed the way we  liveHow technology has changed the way we  live
How technology has changed the way we liveforsythtechstudent
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parentssafetyseminar
 
Protecting Your Profits - Social Media Presentation
Protecting Your Profits - Social Media PresentationProtecting Your Profits - Social Media Presentation
Protecting Your Profits - Social Media Presentationnathanhenry
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyDi Doersch
 
Finding things out on the Web
Finding things out on the WebFinding things out on the Web
Finding things out on the WebMiles Berry
 
National Retail Federation - Does Your Reputation Procede You?
National Retail Federation - Does Your Reputation Procede You?National Retail Federation - Does Your Reputation Procede You?
National Retail Federation - Does Your Reputation Procede You?Helen Levinson
 
The Truth About Internet Safety
The Truth About Internet SafetyThe Truth About Internet Safety
The Truth About Internet SafetyJessica Punke
 
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social MediaAsset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social MediaHelen Levinson
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017KanelandSvihlik
 
How social media can make or break you
How social media can make or break youHow social media can make or break you
How social media can make or break youssjmauro
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Top Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social MediaTop Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social MediaBen Woelk, CISSP, CPTC
 
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...Helen Levinson
 

Similar a Cyberbullying Investigation/Reporting/ Procedures (20)

How technology has changed the way we live
How technology has changed the way we  liveHow technology has changed the way we  live
How technology has changed the way we live
 
How technology has changed the way we live
How technology has changed the way we  liveHow technology has changed the way we  live
How technology has changed the way we live
 
How technology has changed the way we live
How technology has changed the way we  liveHow technology has changed the way we  live
How technology has changed the way we live
 
How technology has changed the way we live
How technology has changed the way we  liveHow technology has changed the way we  live
How technology has changed the way we live
 
How technology has changed the way we live
How technology has changed the way we  liveHow technology has changed the way we  live
How technology has changed the way we live
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
 
Protecting Your Profits - Social Media Presentation
Protecting Your Profits - Social Media PresentationProtecting Your Profits - Social Media Presentation
Protecting Your Profits - Social Media Presentation
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and Technology
 
Finding things out on the Web
Finding things out on the WebFinding things out on the Web
Finding things out on the Web
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
National Retail Federation - Does Your Reputation Procede You?
National Retail Federation - Does Your Reputation Procede You?National Retail Federation - Does Your Reputation Procede You?
National Retail Federation - Does Your Reputation Procede You?
 
The Truth About Internet Safety
The Truth About Internet SafetyThe Truth About Internet Safety
The Truth About Internet Safety
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social MediaAsset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
 
How social media can make or break you
How social media can make or break youHow social media can make or break you
How social media can make or break you
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Top Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social MediaTop Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social Media
 
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
 
Factual proposal
Factual proposalFactual proposal
Factual proposal
 

Más de Bryan Fendley

Data Artists Are The Future
Data Artists Are The FutureData Artists Are The Future
Data Artists Are The FutureBryan Fendley
 
Notes on Google Analytics Sessions and Users
Notes on Google Analytics Sessions and UsersNotes on Google Analytics Sessions and Users
Notes on Google Analytics Sessions and UsersBryan Fendley
 
Eduweb gamificationslideshare
Eduweb gamificationslideshareEduweb gamificationslideshare
Eduweb gamificationslideshareBryan Fendley
 
What Educators Can Learn From the Video Game Industry
What Educators Can Learn From the Video Game IndustryWhat Educators Can Learn From the Video Game Industry
What Educators Can Learn From the Video Game IndustryBryan Fendley
 
Integrating Problem Based Learning into Online Instruction BbWorld Pre Conf W...
Integrating Problem Based Learning into Online Instruction BbWorld Pre Conf W...Integrating Problem Based Learning into Online Instruction BbWorld Pre Conf W...
Integrating Problem Based Learning into Online Instruction BbWorld Pre Conf W...Bryan Fendley
 
Fendley how secure is your e learning
Fendley how secure is your e learningFendley how secure is your e learning
Fendley how secure is your e learningBryan Fendley
 

Más de Bryan Fendley (8)

Data Artists Are The Future
Data Artists Are The FutureData Artists Are The Future
Data Artists Are The Future
 
Notes on Google Analytics Sessions and Users
Notes on Google Analytics Sessions and UsersNotes on Google Analytics Sessions and Users
Notes on Google Analytics Sessions and Users
 
Eduweb gamificationslideshare
Eduweb gamificationslideshareEduweb gamificationslideshare
Eduweb gamificationslideshare
 
What Educators Can Learn From the Video Game Industry
What Educators Can Learn From the Video Game IndustryWhat Educators Can Learn From the Video Game Industry
What Educators Can Learn From the Video Game Industry
 
Asot
AsotAsot
Asot
 
Pbl ardla
Pbl ardlaPbl ardla
Pbl ardla
 
Integrating Problem Based Learning into Online Instruction BbWorld Pre Conf W...
Integrating Problem Based Learning into Online Instruction BbWorld Pre Conf W...Integrating Problem Based Learning into Online Instruction BbWorld Pre Conf W...
Integrating Problem Based Learning into Online Instruction BbWorld Pre Conf W...
 
Fendley how secure is your e learning
Fendley how secure is your e learningFendley how secure is your e learning
Fendley how secure is your e learning
 

Último

Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 

Último (20)

Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 

Cyberbullying Investigation/Reporting/ Procedures

  • 1. Cyber Safety Investigation/Reporting/ Procedures Bryan Fendley Director of Academic Computing University of Arkansas at Monticello Twitter: @bfend / Web: bryanfendley.com 1
  • 2. Disclaimer  I am not a lawyer, and this is not legal advice Twitter: @bfend / Web: bryanfendley.com 2
  • 3. Senate Bill 892  Schools shall promptly investigate and report A.C.A. § 6-18-514 (2011), Section D: A school principal or his or her designee who receives a credible report or complaint of bullying shall promptly investigate the complaint or report and make a record of the investigation and any action taken as a result of the investigation. Twitter: @bfend / Web: bryanfendley.com 3
  • 4. Using Four Basic Forensics Phases to Launch Your Investigation According to National Institute of Standards and Technology Government Publication 800-86, there are four basic phases in the forensics process:  Collection  Examination  Analysis  Reporting Twitter: @bfend / Web: bryanfendley.com 4
  • 5. Prepare Your Own Cyber Bully Incident Survival Guide 1. Incident Tacking Forms 2. Decision Trees 3. Steps for Preserving Evidence 4. Net Lingo Guides and Terms 5. Contacts Twitter: @bfend / Web: bryanfendley.com 5
  • 6. Example Incident Tacking Forms  Anonymous Form (pdf)  Witness Statement (pdf)  Complaint Form (pdf)  Cyber Bully Tracking Form (pdf) Twitter: @bfend / Web: bryanfendley.com 6
  • 7. Example Decision Trees Broward County Public Schools Alleged Bullying Investigation Process: (Initiated when complaint received) Twitter: @bfend / Web: bryanfendley.com 7
  • 8. Easy Ways to Preserve Most Common Evidence  Screenshots  Text messages  Pictures  Emails  Videos  Searching Twitter: @bfend / Web: bryanfendley.com 8
  • 9. Warning About Images  Do not keep in your possession as part of your investigation indecent or illegal images of minors. Report this to the authorities immediately! Twitter: @bfend / Web: bryanfendley.com 9
  • 10. Screenshots  Alt Print Screen and then paste into a document  Vista start menu type “snipping tool  Mac – command shift 4  http://take-a-screenshot.org/ Twitter: @bfend / Web: bryanfendley.com 10
  • 11. Text messages  Iphone and Ipod - Hold down lock button and double click home button. Image is saved under photos  Don't delete messages - leave them 'as is' so can be used as evidence - record time and date that messages are received Twitter: @bfend / Web: bryanfendley.com 11
  • 12. Pictures  Right click and paste Twitter: @bfend / Web: bryanfendley.com 12
  • 13. Emails X-Message-Info: JGTYoYF78jEHjJx36Oi8+Z3TmmkSEdPtfpLB7P/ybN8= Received: from hotmail.com ([65.54.174.26]) by MC8-F19.hotmail.com with Microsoft SMTPSVC(6.0.3790.211); Thu, 9 Jun 2005 03:36:19 -0700 Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC; Thu, 9 Jun 2005 03:13:41 -0700 Message-ID: <BAY103-F16185361BFA8152B9701EDE2FC0@phx.gbl> Received: from 65.54.174.200 by by103fd.bay103.hotmail.msn.com with HTTP; Thu, 09 Jun 2005 10:13:41 GMT X-Originating-IP: [65.54.174.200] X-Originating-Email: [bully@example.com] X-Sender: bully@hotmail.com In-Reply-To: <BAY103-DAV16418913D7F32B48B6F4B9D1FD0@phx.gbl> From: "BULLY" <bully@hotmail.com> To: victim@hotmail.com Bcc: Date: Thu, 09 Jun 2005 20:13:41 +1000 Mime-Version: 1.0 Content-Type: text/html; format=flowed X-OriginalArrivalTime: 09 Jun 2005 10:13:41.0375 (UTC) FILETIME=[E910B0F0:01C56CDB] Source: http://www.cyberbullying.info/resources/report.php Twitter: @bfend / Web: bryanfendley.com 13
  • 14. Videos  Video DownloadHelper Twitter: @bfend / Web: bryanfendley.com 14
  • 15. Searching  Search early, filter by upload time  Google alerts Twitter: @bfend / Web: bryanfendley.com 15
  • 16. Final Note on Collecting Evidence  Having an electronic record of the evidence is better than a printed record  If you can’t figure out how to archive evidence, take a picture or video  Collect the evidence as soon as you see it. The evidence may be gone if you plan to get to it later.  Keep a backup! Twitter: @bfend / Web: bryanfendley.com 16
  • 17. Can You Read This? g4ng up 4nd k1ll  l@u laughing at you  G3y Gay  lzr Loser  zerg To gang up on someone  frag Kill  7h3 the Twitter: @bfend / Web: bryanfendley.com 17
  • 18. Net Lingo Guides and Terms Slang / Net Lingo / Leet Speak  http://www.netlingo.com/top50/index.p hp  http://www.noslang.com/articles.php Cyber Bully Terms  Anti Defamation League  CyberBullying.us Twitter: @bfend / Web: bryanfendley.com 18
  • 19. Contacts  Facebook http://www.facebook.com/report/  Twitter http://support.twitter.com/articles/15794  Youtube http://www.youtube.com/reportabuse  MySpace http://www.myspace.com/help/reportabuse  Bebo http://www.bebo.com/Safety.jsp Phone Companies  ATT&T  Verizon  Tmobile  Cricket  Icloud Twitter: @bfend / Web: bryanfendley.com 19
  • 20. List of Popular Social Networking Websites  Wikipedia has a sortable list Twitter: @bfend / Web: bryanfendley.com 20
  • 21. Final Thoughts  Prevention programs are key  Have a plan in place before an incident occurs  Stay familiar with internet culture Twitter: @bfend / Web: bryanfendley.com 21

Notas del editor

  1. Help from world of computer forensics
  2. Things to have ready that will help you
  3. Saving Emails with Full HeadersHeaders are all the letters, numbers and symbols that you see either at the top or bottom of emails you have received - if you can&apos;t see this information, check out the links below for instructions on how to show headers in your email program. Headers contain information such as the subject, recipient&apos;s name and email address, sender&apos;s name and email address, and information that can pinpoint the sender&apos;s location in the real world.Below is an example of a header from an email. From the header, the company can pinpoint the exact computer that the email was sent from.