SlideShare una empresa de Scribd logo
1 de 17
Avoiding Cybertraps
Incident Response, Computer Forensics,
and Risk Management

Frederick S. Lane
San Diego County Office of Ed. JPA
San Diego, CA
29 October 2013
www.FrederickLane.com

Cybertraps.wordpress.com
Background and Expertise
• Attorney and Author of 7
Books
• Computer Forensics
Expert -- 15 years
• Over 100 criminal cases
• Lecturer on ComputerRelated Topics – 20+
years
• Computer user
(midframes, desktops,
laptops) – 35+ years
• 10 yrs on Burlington VT
School Board
www.FrederickLane.com

Cybertraps.wordpress.com
Lecture Overview
Headache-Inducing Headlines
Common Types of Incidents
Electronic Evidence Is Everywhere
Preparing for the Inevitable
Risks for Administrators and
Teachers
• A Quick Intro to Computer
Forensics
•
•
•
•
•

www.FrederickLane.com

Cybertraps.wordpress.com
Headache-Inducing Headlines
• “Parents Sue School District After Their
13-Year-Old's Suicide Following Sexting
Bullying” – Hillsborough Cty., Florida
• “Parents sue Lockhart school district
after teacher charged with sexual
assault” – Lockhart, TX
• “School Cyberbullying Victims Fight
Back In Lawsuits” – WV, PA, GA
• “School Employees Sue Cyberbullying
Students” – TX, PA
www.FrederickLane.com

Cybertraps.wordpress.com
A Tangled Mobile Web

www.FrederickLane.com

Cybertraps.wordpress.com
Common Types of Incidents
• Employment Issues
• Harassment/Hostile Work Environment
• Disciplinary Issues

• Student Misconduct
• Cyberbullying & Cyberharassment
• Sexting

• Teacher/Student Misconduct
• Student Attacks on Teachers
• Inappropriate Relationships
www.FrederickLane.com

Cybertraps.wordpress.com
E-Evidence Is Everywhere
• Inventory Possible Devices
•
•
•

Computers (Desktops, Laptops, Servers)
Mobile Devices (Phones, Tablets)
Peripherals (USBs, CDs, external drives, etc.)

• Inventory Possible Types of Data
•
•
•
•
•
•

Communication (E-Mail, IMs, Texts, etc.)
Social Media (Facebook, Twitter, etc.)
Web Activity (URLs, cookies, bookmarks, etc.)
Network Logs and Access Data
Cloud Storage (Dropbox, Flickr, Boxy, etc.)
Deleted Data

www.FrederickLane.com

Cybertraps.wordpress.com
Whose Data Is It Anyway?
• Where Did the Incident Occur?
•
•

On-Campus vs. Off-Campus
Zone of District Responsibility Is Growing

• Who Owns and Uses the Device?
•
•

Misconduct Using School-Owned Equipment
Misconduct Using Privately-Owned Equipment

• Who Runs the Service?
•
•
•

Evidence Hosted by District
Evidence Created by Teachers/Students
Evidence Hosted by 3rd Parties

www.FrederickLane.com

Cybertraps.wordpress.com
Pre-Incident Preparation
• Policies and Procedures
•
•
•

District Decisions re Access, Services, Storage
AUPs for Staff and Students
Data Handling and Response Protocols

• Professional Development for Teachers
and Staff
•
•
•

Typically First Responders
Potential Legal Risks
Technology Is Continually Changing

• Student Education
•

Critical Component of K-12 Curricula

www.FrederickLane.com

Cybertraps.wordpress.com
Response to Civil Litigation
• Preservation of Potentially
Relevant Evidence
• Adherence to Established Policies for
Handling Data
• Notice of Litigation or Reasonable
Anticipation of Litigation

• Discovery Requests
• Privacy Concerns
• Burdensomeness of Requests
• Production of Data Held by 3rd Parties
www.FrederickLane.com

Cybertraps.wordpress.com
Response to Criminal Activity
• Anticipate Prosecution and/or
Disciplinary Proceedings
• Adherence to Policy/Process Is Critical
• Involve Law Enforcement ASAP

• Protect and Preserve Data
• Restrict Access to Potentially Relevant
Data
• Hire a Computer Forensics Expert?
• Some Evidence Is Radioactive
www.FrederickLane.com

Cybertraps.wordpress.com
Risks for Admins. & Teachers
• Good Intentions, Bad Outcome
• “Sherlock Holmes” Syndrome
• Forwarding Content for Advice

• The Cover-Up Is Always Worse
• Trying to Protect Colleagues and Friends
• Desire to Protect District by Handling InHouse
• “Delete” Is a Myth
www.FrederickLane.com

Cybertraps.wordpress.com
A Cautionary Tale

www.FrederickLane.com

• Ting-Yi Oei, now 64
• Assistant Principal at
Freedom HS in So.
Riding, VA (Loudoun
County)
• Told to investigate rumors
of sexting at HS
• “Inappropriate” image
was forwarded to Oei’s
cellphone, then computer
• Charged with “failure to
report,” then contributing
to delinquency of a minor
• Charges ultimately
dismissed
Cybertraps.wordpress.com
Computer Forensics 101
• Field Previews
• Acquisition & Mirror Images
• Some Data Are More Fragile Than
Others
• Speed Is Of the Essence
• Powerful Forensics Tools
• Data Recovery and Analysis
• IP Addresses Link to Real World
• 4th Amendment and Privacy
Concerns
www.FrederickLane.com

Cybertraps.wordpress.com
Current Projects
• Cybertraps for Educators (2014)
• Safe Student and School Employee
Relationships (2014)
• Cybertraps.wordpress.com
• CPCaseDigest.com
• MessageSafe.com
• Informational Web Sites:
• www.FrederickLane.com
• www.ComputerForensicsDigest.com
• www.CybertrapsfortheYoung.com
www.FrederickLane.com

Cybertraps.wordpress.com
Contact Information
• E-Mail:
• FSLane3@gmail.com

• Telephone:
• 802-318-4604

• Twitter
• @Cybertraps, @FSL3

• LinkedIn:
• www.linkedin.com/in/fredericklane/

• SlideShare.net
• www.slideshare.net/FSL3
www.FrederickLane.com

Cybertraps.wordpress.com
Avoiding Cybertraps
Incident Response, Computer Forensics,
and Risk Management

Frederick S. Lane
San Diego County Office of Ed. JPA
San Diego, CA
29 October 2013
www.FrederickLane.com

Cybertraps.wordpress.com

Más contenido relacionado

Destacado

Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital EraFrederick Lane
 
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)Frederick Lane
 
2013-12-18 Digital Forensics and Child Pornography
2013-12-18 Digital Forensics and Child Pornography2013-12-18 Digital Forensics and Child Pornography
2013-12-18 Digital Forensics and Child PornographyFrederick Lane
 
2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child Pornography2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child PornographyFrederick Lane
 
2016-02-17 Your Digital Footprint
2016-02-17 Your Digital Footprint2016-02-17 Your Digital Footprint
2016-02-17 Your Digital FootprintFrederick Lane
 
2010-07-20 American Privacy
2010-07-20 American Privacy2010-07-20 American Privacy
2010-07-20 American PrivacyFrederick Lane
 
2016-03-20 Technology and the Blurring of Boundaries
2016-03-20 Technology and the Blurring of Boundaries2016-03-20 Technology and the Blurring of Boundaries
2016-03-20 Technology and the Blurring of BoundariesFrederick Lane
 
2016-03-18 Ethics & Social Media
2016-03-18 Ethics & Social Media2016-03-18 Ethics & Social Media
2016-03-18 Ethics & Social MediaFrederick Lane
 
2016-02-16 Cybertraps for Educators
2016-02-16 Cybertraps for Educators2016-02-16 Cybertraps for Educators
2016-02-16 Cybertraps for EducatorsFrederick Lane
 
2010-07-20 Spoliation: When Good Evidence Goes Bad
2010-07-20 Spoliation: When Good Evidence Goes Bad2010-07-20 Spoliation: When Good Evidence Goes Bad
2010-07-20 Spoliation: When Good Evidence Goes BadFrederick Lane
 
2014-04-10 American Privacy: The 400-Year History of Our Most Contested Right
2014-04-10 American Privacy: The 400-Year History of Our Most Contested Right2014-04-10 American Privacy: The 400-Year History of Our Most Contested Right
2014-04-10 American Privacy: The 400-Year History of Our Most Contested RightFrederick Lane
 
2016-02-23 Cybertraps for Educators
2016-02-23 Cybertraps for Educators2016-02-23 Cybertraps for Educators
2016-02-23 Cybertraps for EducatorsFrederick Lane
 
2010-07-30 LimeWire Made Me Do It
2010-07-30 LimeWire Made Me Do It2010-07-30 LimeWire Made Me Do It
2010-07-30 LimeWire Made Me Do ItFrederick Lane
 
2015-11-03 Teaching Digital Citizenship to Digital Natives
2015-11-03 Teaching Digital Citizenship to Digital Natives2015-11-03 Teaching Digital Citizenship to Digital Natives
2015-11-03 Teaching Digital Citizenship to Digital NativesFrederick Lane
 
2015-08-19 Cyberethics for Educators
2015-08-19 Cyberethics for Educators2015-08-19 Cyberethics for Educators
2015-08-19 Cyberethics for EducatorsFrederick Lane
 
American Privacy: A History of the Right to Privacy in the United States
American Privacy: A History of the Right to Privacy in the United StatesAmerican Privacy: A History of the Right to Privacy in the United States
American Privacy: A History of the Right to Privacy in the United StatesFrederick Lane
 
2011-02-24 Living in a Wired World
2011-02-24 Living in a Wired World2011-02-24 Living in a Wired World
2011-02-24 Living in a Wired WorldFrederick Lane
 
Digital Media & the Death of Privacy
Digital Media & the Death of PrivacyDigital Media & the Death of Privacy
Digital Media & the Death of PrivacyFrederick Lane
 
2011-04-09 There's No Such Thing as Safe "Sext"
2011-04-09 There's No Such Thing as Safe "Sext"2011-04-09 There's No Such Thing as Safe "Sext"
2011-04-09 There's No Such Thing as Safe "Sext"Frederick Lane
 
2016-02-18 Cybertraps for Educator
2016-02-18 Cybertraps for Educator2016-02-18 Cybertraps for Educator
2016-02-18 Cybertraps for EducatorFrederick Lane
 

Destacado (20)

Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital Era
 
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
2013-12-18 Digital Forensics and Child Pornography (inc. 1 hour ethics)
 
2013-12-18 Digital Forensics and Child Pornography
2013-12-18 Digital Forensics and Child Pornography2013-12-18 Digital Forensics and Child Pornography
2013-12-18 Digital Forensics and Child Pornography
 
2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child Pornography2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child Pornography
 
2016-02-17 Your Digital Footprint
2016-02-17 Your Digital Footprint2016-02-17 Your Digital Footprint
2016-02-17 Your Digital Footprint
 
2010-07-20 American Privacy
2010-07-20 American Privacy2010-07-20 American Privacy
2010-07-20 American Privacy
 
2016-03-20 Technology and the Blurring of Boundaries
2016-03-20 Technology and the Blurring of Boundaries2016-03-20 Technology and the Blurring of Boundaries
2016-03-20 Technology and the Blurring of Boundaries
 
2016-03-18 Ethics & Social Media
2016-03-18 Ethics & Social Media2016-03-18 Ethics & Social Media
2016-03-18 Ethics & Social Media
 
2016-02-16 Cybertraps for Educators
2016-02-16 Cybertraps for Educators2016-02-16 Cybertraps for Educators
2016-02-16 Cybertraps for Educators
 
2010-07-20 Spoliation: When Good Evidence Goes Bad
2010-07-20 Spoliation: When Good Evidence Goes Bad2010-07-20 Spoliation: When Good Evidence Goes Bad
2010-07-20 Spoliation: When Good Evidence Goes Bad
 
2014-04-10 American Privacy: The 400-Year History of Our Most Contested Right
2014-04-10 American Privacy: The 400-Year History of Our Most Contested Right2014-04-10 American Privacy: The 400-Year History of Our Most Contested Right
2014-04-10 American Privacy: The 400-Year History of Our Most Contested Right
 
2016-02-23 Cybertraps for Educators
2016-02-23 Cybertraps for Educators2016-02-23 Cybertraps for Educators
2016-02-23 Cybertraps for Educators
 
2010-07-30 LimeWire Made Me Do It
2010-07-30 LimeWire Made Me Do It2010-07-30 LimeWire Made Me Do It
2010-07-30 LimeWire Made Me Do It
 
2015-11-03 Teaching Digital Citizenship to Digital Natives
2015-11-03 Teaching Digital Citizenship to Digital Natives2015-11-03 Teaching Digital Citizenship to Digital Natives
2015-11-03 Teaching Digital Citizenship to Digital Natives
 
2015-08-19 Cyberethics for Educators
2015-08-19 Cyberethics for Educators2015-08-19 Cyberethics for Educators
2015-08-19 Cyberethics for Educators
 
American Privacy: A History of the Right to Privacy in the United States
American Privacy: A History of the Right to Privacy in the United StatesAmerican Privacy: A History of the Right to Privacy in the United States
American Privacy: A History of the Right to Privacy in the United States
 
2011-02-24 Living in a Wired World
2011-02-24 Living in a Wired World2011-02-24 Living in a Wired World
2011-02-24 Living in a Wired World
 
Digital Media & the Death of Privacy
Digital Media & the Death of PrivacyDigital Media & the Death of Privacy
Digital Media & the Death of Privacy
 
2011-04-09 There's No Such Thing as Safe "Sext"
2011-04-09 There's No Such Thing as Safe "Sext"2011-04-09 There's No Such Thing as Safe "Sext"
2011-04-09 There's No Such Thing as Safe "Sext"
 
2016-02-18 Cybertraps for Educator
2016-02-18 Cybertraps for Educator2016-02-18 Cybertraps for Educator
2016-02-18 Cybertraps for Educator
 

Similar a Avoiding Cybertraps

Cybertraps for Educators
Cybertraps for EducatorsCybertraps for Educators
Cybertraps for EducatorsFrederick Lane
 
Forensic Computer Techniques
Forensic Computer TechniquesForensic Computer Techniques
Forensic Computer TechniquesFrederick Lane
 
Texting, Tweeting, Teens, and Teachers
Texting, Tweeting, Teens, and TeachersTexting, Tweeting, Teens, and Teachers
Texting, Tweeting, Teens, and TeachersFrederick Lane
 
2013-04-02 Cybertraps for Educators
2013-04-02 Cybertraps for Educators2013-04-02 Cybertraps for Educators
2013-04-02 Cybertraps for EducatorsFrederick Lane
 
2014-11-06 Texting, Tweeting, Teens, and Teachers
2014-11-06 Texting, Tweeting, Teens, and Teachers2014-11-06 Texting, Tweeting, Teens, and Teachers
2014-11-06 Texting, Tweeting, Teens, and TeachersFrederick Lane
 
2010-10-29 Can You See Me Now?
2010-10-29 Can You See Me Now?2010-10-29 Can You See Me Now?
2010-10-29 Can You See Me Now?Frederick Lane
 
Electronic Security Issues for Schools
Electronic Security Issues for SchoolsElectronic Security Issues for Schools
Electronic Security Issues for SchoolsBrett Napier, MBA
 
2014-08-27 Cybertraps for the Young
2014-08-27 Cybertraps for the Young2014-08-27 Cybertraps for the Young
2014-08-27 Cybertraps for the YoungFrederick Lane
 
2015-02-12 Cybertraps for the Young
2015-02-12 Cybertraps for the Young2015-02-12 Cybertraps for the Young
2015-02-12 Cybertraps for the YoungFrederick Lane
 
2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the Young2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the YoungFrederick Lane
 
NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014emilyensign
 
Protecting the Flock | IntroDUCKtion 2017
Protecting the Flock | IntroDUCKtion 2017Protecting the Flock | IntroDUCKtion 2017
Protecting the Flock | IntroDUCKtion 2017Abigail Mizera
 
2013-04-06 Find It Fast and Free on the Net
2013-04-06 Find It Fast and Free on the Net2013-04-06 Find It Fast and Free on the Net
2013-04-06 Find It Fast and Free on the NetFrederick Lane
 
Confronting Data Manipulation
Confronting Data ManipulationConfronting Data Manipulation
Confronting Data Manipulationwmiller824
 
Aur tool kit
Aur tool kitAur tool kit
Aur tool kittrtkaren
 
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...Frederick Lane
 
2014-08-07 iParentSmart
2014-08-07 iParentSmart2014-08-07 iParentSmart
2014-08-07 iParentSmartFrederick Lane
 
Enriching Globalization With Low Cost Tech & Social Media: Serving More than ...
Enriching Globalization With Low Cost Tech & Social Media: Serving More than ...Enriching Globalization With Low Cost Tech & Social Media: Serving More than ...
Enriching Globalization With Low Cost Tech & Social Media: Serving More than ...Michele DeStefano
 
2010-09-09 The World-Wide Bathroom Wall
2010-09-09 The World-Wide Bathroom Wall2010-09-09 The World-Wide Bathroom Wall
2010-09-09 The World-Wide Bathroom WallFrederick Lane
 
Filters firstamendmenttla2011 final
Filters firstamendmenttla2011 finalFilters firstamendmenttla2011 final
Filters firstamendmenttla2011 finalLea Bailey
 

Similar a Avoiding Cybertraps (20)

Cybertraps for Educators
Cybertraps for EducatorsCybertraps for Educators
Cybertraps for Educators
 
Forensic Computer Techniques
Forensic Computer TechniquesForensic Computer Techniques
Forensic Computer Techniques
 
Texting, Tweeting, Teens, and Teachers
Texting, Tweeting, Teens, and TeachersTexting, Tweeting, Teens, and Teachers
Texting, Tweeting, Teens, and Teachers
 
2013-04-02 Cybertraps for Educators
2013-04-02 Cybertraps for Educators2013-04-02 Cybertraps for Educators
2013-04-02 Cybertraps for Educators
 
2014-11-06 Texting, Tweeting, Teens, and Teachers
2014-11-06 Texting, Tweeting, Teens, and Teachers2014-11-06 Texting, Tweeting, Teens, and Teachers
2014-11-06 Texting, Tweeting, Teens, and Teachers
 
2010-10-29 Can You See Me Now?
2010-10-29 Can You See Me Now?2010-10-29 Can You See Me Now?
2010-10-29 Can You See Me Now?
 
Electronic Security Issues for Schools
Electronic Security Issues for SchoolsElectronic Security Issues for Schools
Electronic Security Issues for Schools
 
2014-08-27 Cybertraps for the Young
2014-08-27 Cybertraps for the Young2014-08-27 Cybertraps for the Young
2014-08-27 Cybertraps for the Young
 
2015-02-12 Cybertraps for the Young
2015-02-12 Cybertraps for the Young2015-02-12 Cybertraps for the Young
2015-02-12 Cybertraps for the Young
 
2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the Young2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the Young
 
NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014
 
Protecting the Flock | IntroDUCKtion 2017
Protecting the Flock | IntroDUCKtion 2017Protecting the Flock | IntroDUCKtion 2017
Protecting the Flock | IntroDUCKtion 2017
 
2013-04-06 Find It Fast and Free on the Net
2013-04-06 Find It Fast and Free on the Net2013-04-06 Find It Fast and Free on the Net
2013-04-06 Find It Fast and Free on the Net
 
Confronting Data Manipulation
Confronting Data ManipulationConfronting Data Manipulation
Confronting Data Manipulation
 
Aur tool kit
Aur tool kitAur tool kit
Aur tool kit
 
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
 
2014-08-07 iParentSmart
2014-08-07 iParentSmart2014-08-07 iParentSmart
2014-08-07 iParentSmart
 
Enriching Globalization With Low Cost Tech & Social Media: Serving More than ...
Enriching Globalization With Low Cost Tech & Social Media: Serving More than ...Enriching Globalization With Low Cost Tech & Social Media: Serving More than ...
Enriching Globalization With Low Cost Tech & Social Media: Serving More than ...
 
2010-09-09 The World-Wide Bathroom Wall
2010-09-09 The World-Wide Bathroom Wall2010-09-09 The World-Wide Bathroom Wall
2010-09-09 The World-Wide Bathroom Wall
 
Filters firstamendmenttla2011 final
Filters firstamendmenttla2011 finalFilters firstamendmenttla2011 final
Filters firstamendmenttla2011 final
 

Más de Frederick Lane

2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical EducatorFrederick Lane
 
2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for EducatorsFrederick Lane
 
2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of CybersecurityFrederick Lane
 
2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech DirectorsFrederick Lane
 
2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital MobFrederick Lane
 
2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational ToolFrederick Lane
 
2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social MediaFrederick Lane
 
2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for EducatorsFrederick Lane
 
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and ProfessionalFrederick Lane
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective TeachersFrederick Lane
 
2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEEFrederick Lane
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective TeachersFrederick Lane
 
2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?Frederick Lane
 
2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR ProfessionalsFrederick Lane
 
2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEEFrederick Lane
 
2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective TeachersFrederick Lane
 
2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEEFrederick Lane
 
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...Frederick Lane
 
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & CybersecurityFrederick Lane
 
2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get CaughtFrederick Lane
 

Más de Frederick Lane (20)

2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator
 
2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators
 
2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity
 
2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors
 
2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob
 
2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool
 
2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media
 
2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators
 
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
 
2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
 
2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?
 
2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals
 
2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE
 
2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers
 
2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE
 
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
 
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
 
2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught
 

Último

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Último (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

Avoiding Cybertraps

  • 1. Avoiding Cybertraps Incident Response, Computer Forensics, and Risk Management Frederick S. Lane San Diego County Office of Ed. JPA San Diego, CA 29 October 2013 www.FrederickLane.com Cybertraps.wordpress.com
  • 2. Background and Expertise • Attorney and Author of 7 Books • Computer Forensics Expert -- 15 years • Over 100 criminal cases • Lecturer on ComputerRelated Topics – 20+ years • Computer user (midframes, desktops, laptops) – 35+ years • 10 yrs on Burlington VT School Board www.FrederickLane.com Cybertraps.wordpress.com
  • 3. Lecture Overview Headache-Inducing Headlines Common Types of Incidents Electronic Evidence Is Everywhere Preparing for the Inevitable Risks for Administrators and Teachers • A Quick Intro to Computer Forensics • • • • • www.FrederickLane.com Cybertraps.wordpress.com
  • 4. Headache-Inducing Headlines • “Parents Sue School District After Their 13-Year-Old's Suicide Following Sexting Bullying” – Hillsborough Cty., Florida • “Parents sue Lockhart school district after teacher charged with sexual assault” – Lockhart, TX • “School Cyberbullying Victims Fight Back In Lawsuits” – WV, PA, GA • “School Employees Sue Cyberbullying Students” – TX, PA www.FrederickLane.com Cybertraps.wordpress.com
  • 5. A Tangled Mobile Web www.FrederickLane.com Cybertraps.wordpress.com
  • 6. Common Types of Incidents • Employment Issues • Harassment/Hostile Work Environment • Disciplinary Issues • Student Misconduct • Cyberbullying & Cyberharassment • Sexting • Teacher/Student Misconduct • Student Attacks on Teachers • Inappropriate Relationships www.FrederickLane.com Cybertraps.wordpress.com
  • 7. E-Evidence Is Everywhere • Inventory Possible Devices • • • Computers (Desktops, Laptops, Servers) Mobile Devices (Phones, Tablets) Peripherals (USBs, CDs, external drives, etc.) • Inventory Possible Types of Data • • • • • • Communication (E-Mail, IMs, Texts, etc.) Social Media (Facebook, Twitter, etc.) Web Activity (URLs, cookies, bookmarks, etc.) Network Logs and Access Data Cloud Storage (Dropbox, Flickr, Boxy, etc.) Deleted Data www.FrederickLane.com Cybertraps.wordpress.com
  • 8. Whose Data Is It Anyway? • Where Did the Incident Occur? • • On-Campus vs. Off-Campus Zone of District Responsibility Is Growing • Who Owns and Uses the Device? • • Misconduct Using School-Owned Equipment Misconduct Using Privately-Owned Equipment • Who Runs the Service? • • • Evidence Hosted by District Evidence Created by Teachers/Students Evidence Hosted by 3rd Parties www.FrederickLane.com Cybertraps.wordpress.com
  • 9. Pre-Incident Preparation • Policies and Procedures • • • District Decisions re Access, Services, Storage AUPs for Staff and Students Data Handling and Response Protocols • Professional Development for Teachers and Staff • • • Typically First Responders Potential Legal Risks Technology Is Continually Changing • Student Education • Critical Component of K-12 Curricula www.FrederickLane.com Cybertraps.wordpress.com
  • 10. Response to Civil Litigation • Preservation of Potentially Relevant Evidence • Adherence to Established Policies for Handling Data • Notice of Litigation or Reasonable Anticipation of Litigation • Discovery Requests • Privacy Concerns • Burdensomeness of Requests • Production of Data Held by 3rd Parties www.FrederickLane.com Cybertraps.wordpress.com
  • 11. Response to Criminal Activity • Anticipate Prosecution and/or Disciplinary Proceedings • Adherence to Policy/Process Is Critical • Involve Law Enforcement ASAP • Protect and Preserve Data • Restrict Access to Potentially Relevant Data • Hire a Computer Forensics Expert? • Some Evidence Is Radioactive www.FrederickLane.com Cybertraps.wordpress.com
  • 12. Risks for Admins. & Teachers • Good Intentions, Bad Outcome • “Sherlock Holmes” Syndrome • Forwarding Content for Advice • The Cover-Up Is Always Worse • Trying to Protect Colleagues and Friends • Desire to Protect District by Handling InHouse • “Delete” Is a Myth www.FrederickLane.com Cybertraps.wordpress.com
  • 13. A Cautionary Tale www.FrederickLane.com • Ting-Yi Oei, now 64 • Assistant Principal at Freedom HS in So. Riding, VA (Loudoun County) • Told to investigate rumors of sexting at HS • “Inappropriate” image was forwarded to Oei’s cellphone, then computer • Charged with “failure to report,” then contributing to delinquency of a minor • Charges ultimately dismissed Cybertraps.wordpress.com
  • 14. Computer Forensics 101 • Field Previews • Acquisition & Mirror Images • Some Data Are More Fragile Than Others • Speed Is Of the Essence • Powerful Forensics Tools • Data Recovery and Analysis • IP Addresses Link to Real World • 4th Amendment and Privacy Concerns www.FrederickLane.com Cybertraps.wordpress.com
  • 15. Current Projects • Cybertraps for Educators (2014) • Safe Student and School Employee Relationships (2014) • Cybertraps.wordpress.com • CPCaseDigest.com • MessageSafe.com • Informational Web Sites: • www.FrederickLane.com • www.ComputerForensicsDigest.com • www.CybertrapsfortheYoung.com www.FrederickLane.com Cybertraps.wordpress.com
  • 16. Contact Information • E-Mail: • FSLane3@gmail.com • Telephone: • 802-318-4604 • Twitter • @Cybertraps, @FSL3 • LinkedIn: • www.linkedin.com/in/fredericklane/ • SlideShare.net • www.slideshare.net/FSL3 www.FrederickLane.com Cybertraps.wordpress.com
  • 17. Avoiding Cybertraps Incident Response, Computer Forensics, and Risk Management Frederick S. Lane San Diego County Office of Ed. JPA San Diego, CA 29 October 2013 www.FrederickLane.com Cybertraps.wordpress.com