SlideShare ist ein Scribd-Unternehmen logo
1 von 48
The Digital Footprint
  and What it Means
      A Way to Understand
       the Reality & Impact
          On Today‟s Youth




         JM Safety Consulting
About Us
CreepSquash Internet safety partner Joseph Melone of
JM Safety Consulting is a 16 year veteran police officer
and detective providing awareness and education through
speaking engagements to teachers, parents and youth
groups to help them better understand the dangers of
cyber space, predators, drugs, alcohol and gangs. With a
no nonsense approach, he offers valuable information and
a real world understanding of how to use this education to
better protect children in the online world.


JM Safety Consulting and CreepSquash have aligned in
a joint effort to keep kids safe online as the need for
online protection is required more now than ever.
CreepSquash is a great resource for parents as an easy
to use web-based monitoring application for Facebook
that allows effortless monitoring of online activity and
privacy protection in a safe and effective way against
bullies, predators and other online dangers.


  JM Safety Consulting
Welcome to the Internet
• A Great Tool for Students
• By far the greatest source of information
  for today’s youth
• It offers countless avenues of enrichment and can be
  a student’s best friend
• Information your child needs for reports and school
  work is right at their finger tips!
• It creates a world of communication in ways that
  never existed before
• Creates new avenues of Learning and Development
• The Internet can also be a Dangerous Place of
  Exposure
• Your kids have no idea who they are talking to Online
The Digital Footprint: What is it?
The Digital Footprint is a trail we leave behind
every time we access the Internet
 – Everyday, millions of people around the world exchange texts,
   post blogs, search Google, play on Facebook, shop online and
   do countless other activities with devices that use the Internet.
 – Just because we don‟t see the trail we leave behind
    does not mean it doesn‟t exist.


What are we leaving for the world to find?
 – Different from a paper trail that can be destroyed,
   your Digital Footprint can follow you around for life
Significance of Digital Footprints

• Internet predators use these trails to prey on their victims
• Starts the moment a computer or smart phone logs online
• Information easily obtained by Web sites via spyware or
  law enforcement via court order / search warrant
• Digital Footprints are stored on the source computer and
  remote sites such as: Social Networks, E-mail Providers,
  Web Sites, Search Engines
Children and The Internet
                       • Parents believe children are safe on the Internet
                         because they use it at home or school
                       • With today‟s technology, Sexual Predators,
                         Bullies and Toxic Friends come right into your
                         home and you don‟t even know it
                       • It is a common illusion that children are
                         untouchable because their activities are
                         contained in the Cyber-World
                       • Children are literally committing felonies online
                         everyday and they don‟t even know it
                       • 75% of minors who encounter strangers online
                         will not tell a parent
1 in 4 Children Will   • Everyday, children are exposed to very
 Become a Victim
                         dangerous people without knowing it
How this Effects Schools


1.   Bullying in schools has driven students to commit violent crimes
     and increase suicide rates.
2.   Despite nearly every state passing legislation to increase
     punishments for bullying and cyber bullying, the problem
     continues to grow.
3.   School Districts have been sued due to a lack of proactivity in
     attacking this issue.
4.   Students who are involved in these activities have been and will
     be charged with serious crimes.
5.   Bullying becomes Cyber-Bullying and vice versa.
6.   Street Gangs continue their activities online, gang members are
     in our schools and social networks.
7.   Sex Offenders locate their targets online and track them to
     schools and neighborhoods.
Being Anonymous Online
• A complete falsehood our children do not
  understand thanks to the Digital Footprint
• Everything done online can be tracked
• More than just the Internet Service Provider
  (ISP) Address
• Social networks and Web sites keep tabs on
  every activity that occurs
• All information including date, time and
  content is easily traced with probable cause
  and a court order
• Good old-fashioned police work can confirm
  evidence recovered from the Digital Footprint
• Wireless Piggy Backing is easily explained
What Do Kids Think?
  It’s a Popularity Contest! With
  more friends than their peers
   on Facebook, they are more
     inclined to add strangers
     without a second thought.


• Kids think “THAT WILL NEVER HAPPEN TO ME”
• Kids think tomorrow is forever instead of a day away
• Kids think their friends today will be their friends forever
• Kids think they can say what ever they want online
• Kids think it‟s not big deal to have „online‟ friends they don‟t
  know if the real world
• Kids think it‟s better to keep quiet about things that make
  them uncomfortable to avoid being judged
• Kids think “If I tell a parent I might lose Internet Privileges”
How the Thought Process Works
     The Reality Behind What Kids Think
Should We Scare or Prepare?
How Police Use the Digital Footprint


        • Examination! The offending data is reviewed
          first for date, time, and time zone of the sender
        • Subpoena, Subpoena, Subpoena with a request
          for everything from subscriber information and
          IP Logs to the e-mail addresses of all those
          associated with the account
        • Subpoena, Subpoena, Subpoena requesting
          the subscriber information for the users of that
          IP address, and those e-mail addresses
How Police Use the Digital Footprint
• Once the subpoena information is examined,
  police may move forward with search warrants for
  everything from social networking profiles to
  searching and seizing actual computers
• Upon reviewing this information, police may
  move forward by making an arrest

• Typical charges against kids
  using the Internet for crimes
  include Cyber-Stalking,
  Harassment, Hate Crimes,
  Child Pornography, Sexual
  Assaults, Assault, and even
  Civil Rights Violations
Street Gangs and The Internet
• Street Gangs are domestic urbanized terrorist organizations that are
  in most of our schools
• Their illicit activities are seen on the street, but continue on the
  Internet.
• Gangs are involved in violent encounters on the street, and then
  brag about it on social networking sites and gang pages
• Police actively monitor these sites, and You Should Too!
Take Action Now! Keep The Gangs Out
• Teachers, Principals, and Deans:
  You know who the gang members                  “Gangs in schools have a
  are in your schools. If not, get on it!     significantly high impact on the
                                               educational environment and
• After talking to them find their             perception of school safety.”
  social networking pages.
                                                -National Center for Education Statistics

   What are they talking about?


                   • Find the gang web pages in your area and
                     review them.
                   • Look at video sharing sites such as YouTube and
                     Vimeo and see what‟s posted. That fight
                     outside school might end up there.
                   • Use your school resource officer to the fullest
                     extent. They can access information you are
                     unable to.
Images and The

• Exif Files, (Exchangable Image Files):
          The data hidden inside a digital photo
• The data can include the following:
           – Date & Time the photo was taken
           – The camera used to take the photo
           – The file name
           – If a flash was used


   AND IN SOME CASES…
   THE COORDINATES WHERE
   THE PICTURE WAS TAKEN
Digital Footprints and Cell Phones
Cell Phones Leave Trails of Detailed Information
                    • A literal trail of cell site towers while travelling
                    • Real time location of certain active phones via
                      GPS
                    • Call detail records contained in phone or online
                    • Images in cell phones contain Exif Information
                    • Smart Phones are mini computers offering the
                      same information available on computers
                    • Cell Phones using “The Cloud” still contain a
                      Digital Footprint, but it is more difficult to track

       Tracking Digital Footprints on Cell Phones
       often leads to other devices and Web sites
       that may hold additional evidence
Digital Footprints, Social Networks & The Law

Subpoenas
• A Subpoena is needed in order to compel
  Social Networking sites to release basic
  subscriber information including:
    – Name
    – Length of Service
    – Credit Card Information
    – Recent IP Information
•   Additional Subpoenas will be needed
    after receiving this information
•   Subpoenas to the Credit Card Company
    and to the Internet Service Provider are
    required
Digital Footprints, Social Networks & The Law
Court Orders
• A court order signed by a judge is needed in order to compel
  Social Networking sites to release basic subscriber information
  that includes:
    – Message Headers
    – Detailed IP Information
•   Tracking the information gained from the message headers and
    from the detailed IP Information will need to be gained with
    additional subpoenas, court orders, or even possibly search
    warrants
Digital Footprints, Social Networks & The Law

Search Warrants
• A Search Warrant detailing probable cause, signed by a judge, and
  issued within the allotted time frame, is needed in order to compel
  Social Networking sites to release the following information:
   – Private Messages / Chat Log
   – Photographs
   – Videos
   – Wall Posts
   – Location Information
Digital Footprints, Social Networks & The Law
 • Social Networks are not created equal. While it’s simple to obtain
   information from sites like Twitter, Facebook can be very difficult
 • Exigent Circumstances:
     – Circumstances that would make a reasonable person believe that
       making entry before obtaining a court order is necessary to prevent
       physical injury, destruction of evidence, or the escape of a suspect.
 •   These situations can include:
         Missing Juveniles
         Suspects Fleeing the Area
         Child Pornography Cases
         Preventing Violence
Digital Footprints, Social Networks & The Law
• Subpoenas, Court Orders, & Search Warrants take time. Time to
  write, time to respond, time to analyze.
• Not all Social Networking Sites are “Law Enforcement Friendly.”
• Search Warrants give the most information, but they are the hardest
  to obtain.
• Subpoenas and Court Orders supply similar information but more
  direct details with a court order.
Student Behavior & the Internet
           YouTube & Vimeo:
              – Altercations with students recorded
                and posted online
              – Pleas for help against bullies and
                suicide threats posted in online
                videos
           Facebook, Twitter and MySpace:
              –   Altercations with students posted
                  on walls and profiles
              –   Used for Bullying
              –   Used for Expression
           Cell Phones:
              –   Used to make videos of fights
                  and other altercations
              –   Used For Bullying
              –   Used for Sexual Exchanges
Collecting Evidence
         First Order of Business
           1. Obtain the Video:
               • Mozilla Firefox Extension called
                 “DownloadHelper”
               • www.downloadhelper.net
               • Free video recovering program
               • Help police collect evidence before it
                 is deleted
               • Police watch the video with their own
                 eyes at your school
Collecting Evidence
2. Take a video of the video
   – Use your cell phone or video camera to record it
   – Not useful in court, but useful during investigations
   – TRY NOT TO TALK! YOUR VOICE WILL BE HEARD


3. Get the Image
   –   Save it to your computer / Forward to e-mail
   –   Take a digital photo of the image
   –   Not useful in court, but useful during investigations


4. Document the words
   –   Save threatening or criminal messages to your computer
   –   Take a digital photograph of the images
   –   Provide the information to law enforcement
Law Enforcement & Evidence
Collection of Evidence Will Help Police to:




    • Provide probable cause
    • Make it Easy to obtain court orders
    • Speed up an arrest
    • Retrieve necessary information from a stored
      disk, USB, or e-mail
    • Document the incident or series of incidents
    • Get dangerous students out of school via
      suspension, expulsion, arrest , or all of
      the above
Kids and Facebook

•    Facebook as a Popularity Contest
     – “If Sandy has 200 friends, and Sally has 100 friends, then Sandy is
       100 times more popular than Sally!”

•    Many strangers become „friends‟ with children because
     they know this and they use it to take advantage
     –   Children accept all friend requests to simply to have more friends
         than other people

•    Many Children and Teens end up with multiple predators on
     their pages who pretend to be kids (with fake profiles)
     –   Something predators do often to reach out to kids

•    Bullies often times mask as another person to prey on
     victims through Facebook
Kids and Facebook

• Kids use self expression on their profiles
  – Predators use what they learn from profiles to get kids to talk to them.
    They research personal information, interests, friends, photos, etc.

• Kids say too much on their walls
  – Where they go to school, the mascot‟s name, their clubs, their phone
    numbers, e-mail addresses, hangouts, hobbies, languages they speak

• Kids do not follow the rules set forth by the
  Social Networking Site
  – Kids who are 13 or younger say they‟re actually 18 so they can have
    full access to the site. BAD IDEA!
  – There is an estimated 7.5 Million children under the age of 13 on
    Facebook, with no enforcement despite the minimum age requirement
How Do Kids Make it Easy for Predators?
                   It’s really simple. Kids LIE!!!

   Kids act older and lie                     Kids act like they are
         about their age                      someone they aren‟t


     Kids claim they are                      Kids say they‟ve done
 dating and they are not                      things they haven‟t


 Kids say they have had                       Kids say they‟ve been
  sex and they have not                       to places they haven‟t

               53% of kids between 10-17 will be sexually
                     solicited by a stranger online

****Predators KNOW KIDS ARE LYING! In fact, THEY COUNT ON IT!****
Cyber Bullying: What Is It?
              Cyber Bullying is when a child,
              preteen, or teen is tormented,
              threatened, harassed, humiliated,
              embarrassed or targeted by another
              child, preteen or teen using the
              Internet, interactive and digital
              technologies, or mobile phones.


              Note: It must have a minor on both
              sides, or at least have been instigated
              by a minor against another minor.
              Once an adult is involved, it could
              possibly turn into the crime of cyber
              stalking.
Harmful Effects of Cyber Bullying
            • The effects of cyber bullying can
              hurt harshly and quickly, often
              times beyond repair
            • Children, teens, and young
              adults have been driven to
              suicide or violent crime
            • Serious detrimental effects on a
              victim‟s self-esteem, emotional
              well-being, and sense of
              personal safety
            • Depression, despondence, self-
              destructive behavior and poor
              performance in school or work


            …This is Just to Name a Few
Cyber Bullying Laws Vary By State

– More than 47 states have current laws in effect
– Many new legislations will pass this year that inflict
  harsher punishments for Cyber Bullying crimes
– Nearly 60% of children are affected by Cyber Bullying
– Laws give schools the power to discipline students up
  to and including expulsion for online threats
  AGAINST TEACHERS OR OTHER STUDENTS!
– For a Comprehensive List of all the current Cyber
  Bullying Laws by State in the U.S., visit:
  http://www.cyberbullying.us/Bullying_and_Cyberbullying_Laws.pdf



    In most states, it does not matter if the
       threat was made outside school.
Laws Bullies Typically Break
Assault / Battery: Physical violence or
  touching in an insulting nature
Harassment (Phone & Computer):
   Unwanted threats or taunting to
   victim or family
Stalking / Cyber-Stalking: Multiple
   occasions of harassment and
   issues of a threatening nature
Hate Crime: Committing any crime
   because of race, creed, color,
   religion, or sexual orientation
How to Stop Cyberbullies
 Keep a record
 (include time and date)
  –   This will help law enforcement track
      the Digital Footprint.
 Tell someone
  –   Encourage kids to tell someone they
      trust: A parent, friend, school
      counselor or teacher.
 Contact your phone or Internet
 service provider
  –   Report what is happening. They can
      help you block messages or calls
      from certain senders.
                                                Change your contact details
 Don't reply to bullying messages
                                                 –   Get a new user name for the social
  –   All Bullies have one thing in                  sites, a new e-mail account, a new
      common: Something hurts them so                mobile phone number.
      much they have to hurt someone
      else to feel good. By replying to         Set your username and
      messages, they are getting what           passwords to private
      they want.
                                                 –   Stress to your children that they
 If messages are life threatening                    need to keep their personal
                                                     information private so it doesn't fall
  –   Contact law enforcement. If cyber              into the hands of someone who will
      bullying is threatening, it is illegal.        misuse it.
Phoebe Prince | Real Life Stories
           Phoebe was 15 years old. She moved to
           Massachusetts after living most of her young life
           in Ireland. She was taunted and bullied because
           she was the new kid, spoke with an accent, and
           girls were upset about who she was dating.
           On January 14, 2010, after a day of harassment
           and taunting, a student struck her in the head
           with a can from a passing car as she walked
           home from school.

           Later that day, Phoebe committed suicide. Even
           after her death, the bullies made crude comments
           about her and posted those comments on her
           Facebook Memorial Page.
           On March 29, 2010, the District Attorney
           completed investigations with Digital Footprints
           left behind from the bullies, indicted six
           teenagers from her school on adult felony
           charges ranging Violation of Civil Rights, Felony
           Battery, and Stalking for engaging in persistent
           taunting and harassment.
Sexting and the Digital Footprint




Sexting Leaves a Trail. There is NO WAY around it.
 •   Exif Files will exist
 •   Phone number of the sender is traceable
 •   The numbers of everyone forwarding the message exist
 •   E-mail addresses of those receiving and sending the message exist
 •   Records are kept on Web sites the image was uploaded to
 •   Speed bumps in the Digital Footprint road made easier through
     interviews and investigation
What is with the New Era of Sexting?
          Ahhhhh, Teen Age Love!
Why Do Kids Sext Photos?
  Is a Teenager’s date on New Years Eve going to be
           your teen’s date on the 4th of July?
                              For the most part “NO!” Dating
                              lives of teens change like we
                              change our clothes.

                              Why is this important?

                              When that kid’s New Years Eve date
                              wants them to send naked pictures,
                              he’s asking for one reason.
                              HE WANTS TO SHOW THEM OFF!

                              What better time to show them off,
Use Common Sense. It should   than on the 4th of July when they
                              have broken up!
   tell you NOT to do this.
Why Do Teen Girls Give in to Sexting?
Low Self Esteem: (Most are Female)

                                A. Usually teen girls Sext their
                                   photos for this reason

                                B. Desperately seeking some kind
                                   of approval

                                C. Trying to secure the attention of
                                   that certain boy

                                D. Sends the image upon request
                                   of a boy she likes

                                E. Trying to prove a point, “I’m
                                   hotter than her, here’s proof”

                                F. Sends the image to her
                                   boyfriend as a gift
What Do Boys Get From Sexting?
Boys Will Be Boys….
                      They want to be cool like Fonzie!
                        It’s the ever popular Arthur
                        “Fonzie” Fonzerelli thought
                        process!

                      RAGING HORMONES
                        Can boys control themselves?
                        Do they do stupid things
                        because of those hormones?
                        I Think Not!

                      Boys want to be COOL! Boys
                        want to be “BIG SHOTS” and
                        have everyone’s attention
Sexting & Child Pornography Laws
    In many states, kids that sext their photographs are
   unknowingly committing the crime of child pornography

   – In many states there is no exception for the minor who takes
     their own photograph
   – Very serious felony in most states
   – Many states are making laws to minimize the seriousness of this
     crime when only kids are involved
   – If the image is uploaded to the Internet, things become more
     serious and difficult
   – Thankfully, the Digital Footprint is there to assist in the most
     serious cases
Hope Witsell         |    Real Life Stories
   Just 13 years old, She Was Gone Too Soon
               13-year-old 7th Grade Florida girl sent a
               topless photo of herself to a boy in hope
               of gaining his attention. Instead, she got
               the attention of her school, as well as the
               high school nearby. A third party
               intercepted the photo while using the
               boy’s cell phone, and soon students from
               her school and others gawked at the
               picture. Hope walked the hallways at
               school as students shouted horrible
               names at her. These people were her
               friends days before.

               The following day, Hope wrote in her
               journal: “I’m done for sure now. I can feel
               it in my stomach. I’m going to try and
               strangle myself. I hope it works.”

               Hope Witsell went home and hung
               herself in her bedroom.
Jessica Logan | Real Life Stories
              18 years old and due to graduate from
              High School when a nude picture she
              sent to her boyfriend was sent to
              hundreds of students. She said she
              was being harassed and teased by
              other students, at home, at school
              and when she went out.
              The moment her private picture was
              sent out for everyone to see, things
              spiraled out of control. Jessie's
              grades plummeted, she started
              skipping school and when she would
              go to school, she would hide in the
              bathroom to avoid being teased. After
              attending the funeral of a friend
              Jessica went into her bedroom, and
              hung herself in her closet.
The Moral of the Story…
www.   .com
For More Information Please Visit us Online:



     www.creepsquash.com
     www.facebook.com/creepsquash
     @Creep_Squash on Twitter



    JM Safety Consulting
    www.jmsafetyconsulting.com
    www.facebook.com/jmsafetyconsulting
    Keeping Kids Safe & Parents Aware

Weitere ähnliche Inhalte

Was ist angesagt?

Digital footprint powerpoint
Digital footprint powerpointDigital footprint powerpoint
Digital footprint powerpointducklvr9
 
Social Media and Teenagers
Social Media and TeenagersSocial Media and Teenagers
Social Media and TeenagersJennifer Holena
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying PresentationCourtney Cole
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementaryjaimejoyh
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kidsChris Burrows
 
Dangers to social media
Dangers to social mediaDangers to social media
Dangers to social mediaRyan Ward
 
Digital Footprint and Social Media Impact on Time Management
Digital Footprint and Social Media Impact on Time ManagementDigital Footprint and Social Media Impact on Time Management
Digital Footprint and Social Media Impact on Time ManagementDr. Michael England
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents Jennifer Holena
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSOodit Jethwa
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
Could we live without the internet
Could we live without the internetCould we live without the internet
Could we live without the internetGeorgiana Grigore
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for childrenKumar Manish
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 

Was ist angesagt? (20)

Digital footprint powerpoint
Digital footprint powerpointDigital footprint powerpoint
Digital footprint powerpoint
 
Social Media and Teenagers
Social Media and TeenagersSocial Media and Teenagers
Social Media and Teenagers
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kids
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Dangers to social media
Dangers to social mediaDangers to social media
Dangers to social media
 
Internet safety
Internet safety Internet safety
Internet safety
 
Digital Footprint and Social Media Impact on Time Management
Digital Footprint and Social Media Impact on Time ManagementDigital Footprint and Social Media Impact on Time Management
Digital Footprint and Social Media Impact on Time Management
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Could we live without the internet
Could we live without the internetCould we live without the internet
Could we live without the internet
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 

Andere mochten auch

Your Digital Footprint
Your Digital FootprintYour Digital Footprint
Your Digital FootprintDean Shareski
 
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...gallowayandcollens
 
#diggeroslo and Oslo's digital footprint
#diggeroslo and Oslo's digital footprint#diggeroslo and Oslo's digital footprint
#diggeroslo and Oslo's digital footprintKatrine Mosfjeld
 
Towards a Digital Ecology: The New Organization's Digital Footprint
Towards a Digital Ecology: The New Organization's Digital FootprintTowards a Digital Ecology: The New Organization's Digital Footprint
Towards a Digital Ecology: The New Organization's Digital FootprintJai (Phillip) Djwa
 
Digital Footprints
Digital FootprintsDigital Footprints
Digital FootprintsEric Cole
 
What’s your Digital Footprint?
What’s your Digital Footprint?What’s your Digital Footprint?
What’s your Digital Footprint?Jessica Gramp
 
My Digital Footprint
My Digital FootprintMy Digital Footprint
My Digital FootprintTony Fish
 
Online & More: Is Your Digital Footprint in the Digital Age?
Online & More: Is Your Digital Footprint in the Digital Age?Online & More: Is Your Digital Footprint in the Digital Age?
Online & More: Is Your Digital Footprint in the Digital Age?Denny McCorkle
 
Build a positive digital footprint 3
Build a positive digital footprint 3Build a positive digital footprint 3
Build a positive digital footprint 3Margaret Donaghue
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints PresentationProjectsByJen.com
 
Digital footprints& datamining
Digital footprints& dataminingDigital footprints& datamining
Digital footprints& dataminingPaige Jaeger
 
Digital Footprints, Safety & Citizenship
Digital Footprints, Safety & CitizenshipDigital Footprints, Safety & Citizenship
Digital Footprints, Safety & CitizenshipShelly Sanchez Terrell
 
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...Arniel Ping
 
Discrete Mathematics - All chapters
Discrete Mathematics - All chapters Discrete Mathematics - All chapters
Discrete Mathematics - All chapters Omnia A. Abdullah
 

Andere mochten auch (14)

Your Digital Footprint
Your Digital FootprintYour Digital Footprint
Your Digital Footprint
 
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
 
#diggeroslo and Oslo's digital footprint
#diggeroslo and Oslo's digital footprint#diggeroslo and Oslo's digital footprint
#diggeroslo and Oslo's digital footprint
 
Towards a Digital Ecology: The New Organization's Digital Footprint
Towards a Digital Ecology: The New Organization's Digital FootprintTowards a Digital Ecology: The New Organization's Digital Footprint
Towards a Digital Ecology: The New Organization's Digital Footprint
 
Digital Footprints
Digital FootprintsDigital Footprints
Digital Footprints
 
What’s your Digital Footprint?
What’s your Digital Footprint?What’s your Digital Footprint?
What’s your Digital Footprint?
 
My Digital Footprint
My Digital FootprintMy Digital Footprint
My Digital Footprint
 
Online & More: Is Your Digital Footprint in the Digital Age?
Online & More: Is Your Digital Footprint in the Digital Age?Online & More: Is Your Digital Footprint in the Digital Age?
Online & More: Is Your Digital Footprint in the Digital Age?
 
Build a positive digital footprint 3
Build a positive digital footprint 3Build a positive digital footprint 3
Build a positive digital footprint 3
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints Presentation
 
Digital footprints& datamining
Digital footprints& dataminingDigital footprints& datamining
Digital footprints& datamining
 
Digital Footprints, Safety & Citizenship
Digital Footprints, Safety & CitizenshipDigital Footprints, Safety & Citizenship
Digital Footprints, Safety & Citizenship
 
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
Media and Information Literacy (MIL) - Digital Citizenship, Netiquette, Digit...
 
Discrete Mathematics - All chapters
Discrete Mathematics - All chapters Discrete Mathematics - All chapters
Discrete Mathematics - All chapters
 

Ähnlich wie The Digital Footprint: An Understanding of What It Means for Kids and Criminals

8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshareMarian Merritt
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminarsEmmanuel Arthur
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminarsEmmanuel Arthur
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet SafetyJVGAJJAR
 
Digital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptxDigital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptxJCGonzaga1
 
7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetejNishaTariq1
 
7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttwNishaTariq1
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship ppKatie Ward
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the HomeScott Burnett
 
Technology Influence
Technology Influence Technology Influence
Technology Influence Ilaxi Patel
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlineLane Sutton
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital worldDan Bowen
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
E safety-parent-workshop
E safety-parent-workshop E safety-parent-workshop
E safety-parent-workshop wwihead
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetydanriles
 

Ähnlich wie The Digital Footprint: An Understanding of What It Means for Kids and Criminals (20)

8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet Safety
 
Digital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptxDigital Citizenship_Lecture.pptx
Digital Citizenship_Lecture.pptx
 
7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej
 
7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
 
Technology Influence
Technology Influence Technology Influence
Technology Influence
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself online
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital world
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
E safety-parent-workshop
E safety-parent-workshop E safety-parent-workshop
E safety-parent-workshop
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 

Kürzlich hochgeladen

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Kürzlich hochgeladen (20)

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

The Digital Footprint: An Understanding of What It Means for Kids and Criminals

  • 1. The Digital Footprint and What it Means A Way to Understand the Reality & Impact On Today‟s Youth JM Safety Consulting
  • 2. About Us CreepSquash Internet safety partner Joseph Melone of JM Safety Consulting is a 16 year veteran police officer and detective providing awareness and education through speaking engagements to teachers, parents and youth groups to help them better understand the dangers of cyber space, predators, drugs, alcohol and gangs. With a no nonsense approach, he offers valuable information and a real world understanding of how to use this education to better protect children in the online world. JM Safety Consulting and CreepSquash have aligned in a joint effort to keep kids safe online as the need for online protection is required more now than ever. CreepSquash is a great resource for parents as an easy to use web-based monitoring application for Facebook that allows effortless monitoring of online activity and privacy protection in a safe and effective way against bullies, predators and other online dangers. JM Safety Consulting
  • 3. Welcome to the Internet • A Great Tool for Students • By far the greatest source of information for today’s youth • It offers countless avenues of enrichment and can be a student’s best friend • Information your child needs for reports and school work is right at their finger tips! • It creates a world of communication in ways that never existed before • Creates new avenues of Learning and Development • The Internet can also be a Dangerous Place of Exposure • Your kids have no idea who they are talking to Online
  • 4. The Digital Footprint: What is it? The Digital Footprint is a trail we leave behind every time we access the Internet – Everyday, millions of people around the world exchange texts, post blogs, search Google, play on Facebook, shop online and do countless other activities with devices that use the Internet. – Just because we don‟t see the trail we leave behind does not mean it doesn‟t exist. What are we leaving for the world to find? – Different from a paper trail that can be destroyed, your Digital Footprint can follow you around for life
  • 5. Significance of Digital Footprints • Internet predators use these trails to prey on their victims • Starts the moment a computer or smart phone logs online • Information easily obtained by Web sites via spyware or law enforcement via court order / search warrant • Digital Footprints are stored on the source computer and remote sites such as: Social Networks, E-mail Providers, Web Sites, Search Engines
  • 6.
  • 7. Children and The Internet • Parents believe children are safe on the Internet because they use it at home or school • With today‟s technology, Sexual Predators, Bullies and Toxic Friends come right into your home and you don‟t even know it • It is a common illusion that children are untouchable because their activities are contained in the Cyber-World • Children are literally committing felonies online everyday and they don‟t even know it • 75% of minors who encounter strangers online will not tell a parent 1 in 4 Children Will • Everyday, children are exposed to very Become a Victim dangerous people without knowing it
  • 8. How this Effects Schools 1. Bullying in schools has driven students to commit violent crimes and increase suicide rates. 2. Despite nearly every state passing legislation to increase punishments for bullying and cyber bullying, the problem continues to grow. 3. School Districts have been sued due to a lack of proactivity in attacking this issue. 4. Students who are involved in these activities have been and will be charged with serious crimes. 5. Bullying becomes Cyber-Bullying and vice versa. 6. Street Gangs continue their activities online, gang members are in our schools and social networks. 7. Sex Offenders locate their targets online and track them to schools and neighborhoods.
  • 9. Being Anonymous Online • A complete falsehood our children do not understand thanks to the Digital Footprint • Everything done online can be tracked • More than just the Internet Service Provider (ISP) Address • Social networks and Web sites keep tabs on every activity that occurs • All information including date, time and content is easily traced with probable cause and a court order • Good old-fashioned police work can confirm evidence recovered from the Digital Footprint • Wireless Piggy Backing is easily explained
  • 10. What Do Kids Think? It’s a Popularity Contest! With more friends than their peers on Facebook, they are more inclined to add strangers without a second thought. • Kids think “THAT WILL NEVER HAPPEN TO ME” • Kids think tomorrow is forever instead of a day away • Kids think their friends today will be their friends forever • Kids think they can say what ever they want online • Kids think it‟s not big deal to have „online‟ friends they don‟t know if the real world • Kids think it‟s better to keep quiet about things that make them uncomfortable to avoid being judged • Kids think “If I tell a parent I might lose Internet Privileges”
  • 11. How the Thought Process Works The Reality Behind What Kids Think
  • 12. Should We Scare or Prepare?
  • 13. How Police Use the Digital Footprint • Examination! The offending data is reviewed first for date, time, and time zone of the sender • Subpoena, Subpoena, Subpoena with a request for everything from subscriber information and IP Logs to the e-mail addresses of all those associated with the account • Subpoena, Subpoena, Subpoena requesting the subscriber information for the users of that IP address, and those e-mail addresses
  • 14. How Police Use the Digital Footprint • Once the subpoena information is examined, police may move forward with search warrants for everything from social networking profiles to searching and seizing actual computers • Upon reviewing this information, police may move forward by making an arrest • Typical charges against kids using the Internet for crimes include Cyber-Stalking, Harassment, Hate Crimes, Child Pornography, Sexual Assaults, Assault, and even Civil Rights Violations
  • 15. Street Gangs and The Internet • Street Gangs are domestic urbanized terrorist organizations that are in most of our schools • Their illicit activities are seen on the street, but continue on the Internet. • Gangs are involved in violent encounters on the street, and then brag about it on social networking sites and gang pages • Police actively monitor these sites, and You Should Too!
  • 16. Take Action Now! Keep The Gangs Out • Teachers, Principals, and Deans: You know who the gang members “Gangs in schools have a are in your schools. If not, get on it! significantly high impact on the educational environment and • After talking to them find their perception of school safety.” social networking pages. -National Center for Education Statistics What are they talking about? • Find the gang web pages in your area and review them. • Look at video sharing sites such as YouTube and Vimeo and see what‟s posted. That fight outside school might end up there. • Use your school resource officer to the fullest extent. They can access information you are unable to.
  • 17. Images and The • Exif Files, (Exchangable Image Files): The data hidden inside a digital photo • The data can include the following: – Date & Time the photo was taken – The camera used to take the photo – The file name – If a flash was used AND IN SOME CASES… THE COORDINATES WHERE THE PICTURE WAS TAKEN
  • 18. Digital Footprints and Cell Phones Cell Phones Leave Trails of Detailed Information • A literal trail of cell site towers while travelling • Real time location of certain active phones via GPS • Call detail records contained in phone or online • Images in cell phones contain Exif Information • Smart Phones are mini computers offering the same information available on computers • Cell Phones using “The Cloud” still contain a Digital Footprint, but it is more difficult to track Tracking Digital Footprints on Cell Phones often leads to other devices and Web sites that may hold additional evidence
  • 19. Digital Footprints, Social Networks & The Law Subpoenas • A Subpoena is needed in order to compel Social Networking sites to release basic subscriber information including: – Name – Length of Service – Credit Card Information – Recent IP Information • Additional Subpoenas will be needed after receiving this information • Subpoenas to the Credit Card Company and to the Internet Service Provider are required
  • 20. Digital Footprints, Social Networks & The Law Court Orders • A court order signed by a judge is needed in order to compel Social Networking sites to release basic subscriber information that includes: – Message Headers – Detailed IP Information • Tracking the information gained from the message headers and from the detailed IP Information will need to be gained with additional subpoenas, court orders, or even possibly search warrants
  • 21. Digital Footprints, Social Networks & The Law Search Warrants • A Search Warrant detailing probable cause, signed by a judge, and issued within the allotted time frame, is needed in order to compel Social Networking sites to release the following information: – Private Messages / Chat Log – Photographs – Videos – Wall Posts – Location Information
  • 22. Digital Footprints, Social Networks & The Law • Social Networks are not created equal. While it’s simple to obtain information from sites like Twitter, Facebook can be very difficult • Exigent Circumstances: – Circumstances that would make a reasonable person believe that making entry before obtaining a court order is necessary to prevent physical injury, destruction of evidence, or the escape of a suspect. • These situations can include: Missing Juveniles Suspects Fleeing the Area Child Pornography Cases Preventing Violence
  • 23. Digital Footprints, Social Networks & The Law • Subpoenas, Court Orders, & Search Warrants take time. Time to write, time to respond, time to analyze. • Not all Social Networking Sites are “Law Enforcement Friendly.” • Search Warrants give the most information, but they are the hardest to obtain. • Subpoenas and Court Orders supply similar information but more direct details with a court order.
  • 24. Student Behavior & the Internet YouTube & Vimeo: – Altercations with students recorded and posted online – Pleas for help against bullies and suicide threats posted in online videos Facebook, Twitter and MySpace: – Altercations with students posted on walls and profiles – Used for Bullying – Used for Expression Cell Phones: – Used to make videos of fights and other altercations – Used For Bullying – Used for Sexual Exchanges
  • 25. Collecting Evidence First Order of Business 1. Obtain the Video: • Mozilla Firefox Extension called “DownloadHelper” • www.downloadhelper.net • Free video recovering program • Help police collect evidence before it is deleted • Police watch the video with their own eyes at your school
  • 26. Collecting Evidence 2. Take a video of the video – Use your cell phone or video camera to record it – Not useful in court, but useful during investigations – TRY NOT TO TALK! YOUR VOICE WILL BE HEARD 3. Get the Image – Save it to your computer / Forward to e-mail – Take a digital photo of the image – Not useful in court, but useful during investigations 4. Document the words – Save threatening or criminal messages to your computer – Take a digital photograph of the images – Provide the information to law enforcement
  • 27. Law Enforcement & Evidence Collection of Evidence Will Help Police to: • Provide probable cause • Make it Easy to obtain court orders • Speed up an arrest • Retrieve necessary information from a stored disk, USB, or e-mail • Document the incident or series of incidents • Get dangerous students out of school via suspension, expulsion, arrest , or all of the above
  • 28. Kids and Facebook • Facebook as a Popularity Contest – “If Sandy has 200 friends, and Sally has 100 friends, then Sandy is 100 times more popular than Sally!” • Many strangers become „friends‟ with children because they know this and they use it to take advantage – Children accept all friend requests to simply to have more friends than other people • Many Children and Teens end up with multiple predators on their pages who pretend to be kids (with fake profiles) – Something predators do often to reach out to kids • Bullies often times mask as another person to prey on victims through Facebook
  • 29. Kids and Facebook • Kids use self expression on their profiles – Predators use what they learn from profiles to get kids to talk to them. They research personal information, interests, friends, photos, etc. • Kids say too much on their walls – Where they go to school, the mascot‟s name, their clubs, their phone numbers, e-mail addresses, hangouts, hobbies, languages they speak • Kids do not follow the rules set forth by the Social Networking Site – Kids who are 13 or younger say they‟re actually 18 so they can have full access to the site. BAD IDEA! – There is an estimated 7.5 Million children under the age of 13 on Facebook, with no enforcement despite the minimum age requirement
  • 30. How Do Kids Make it Easy for Predators? It’s really simple. Kids LIE!!! Kids act older and lie Kids act like they are about their age someone they aren‟t Kids claim they are Kids say they‟ve done dating and they are not things they haven‟t Kids say they have had Kids say they‟ve been sex and they have not to places they haven‟t 53% of kids between 10-17 will be sexually solicited by a stranger online ****Predators KNOW KIDS ARE LYING! In fact, THEY COUNT ON IT!****
  • 31. Cyber Bullying: What Is It? Cyber Bullying is when a child, preteen, or teen is tormented, threatened, harassed, humiliated, embarrassed or targeted by another child, preteen or teen using the Internet, interactive and digital technologies, or mobile phones. Note: It must have a minor on both sides, or at least have been instigated by a minor against another minor. Once an adult is involved, it could possibly turn into the crime of cyber stalking.
  • 32. Harmful Effects of Cyber Bullying • The effects of cyber bullying can hurt harshly and quickly, often times beyond repair • Children, teens, and young adults have been driven to suicide or violent crime • Serious detrimental effects on a victim‟s self-esteem, emotional well-being, and sense of personal safety • Depression, despondence, self- destructive behavior and poor performance in school or work …This is Just to Name a Few
  • 33. Cyber Bullying Laws Vary By State – More than 47 states have current laws in effect – Many new legislations will pass this year that inflict harsher punishments for Cyber Bullying crimes – Nearly 60% of children are affected by Cyber Bullying – Laws give schools the power to discipline students up to and including expulsion for online threats AGAINST TEACHERS OR OTHER STUDENTS! – For a Comprehensive List of all the current Cyber Bullying Laws by State in the U.S., visit: http://www.cyberbullying.us/Bullying_and_Cyberbullying_Laws.pdf In most states, it does not matter if the threat was made outside school.
  • 34. Laws Bullies Typically Break Assault / Battery: Physical violence or touching in an insulting nature Harassment (Phone & Computer): Unwanted threats or taunting to victim or family Stalking / Cyber-Stalking: Multiple occasions of harassment and issues of a threatening nature Hate Crime: Committing any crime because of race, creed, color, religion, or sexual orientation
  • 35. How to Stop Cyberbullies Keep a record (include time and date) – This will help law enforcement track the Digital Footprint. Tell someone – Encourage kids to tell someone they trust: A parent, friend, school counselor or teacher. Contact your phone or Internet service provider – Report what is happening. They can help you block messages or calls from certain senders. Change your contact details Don't reply to bullying messages – Get a new user name for the social – All Bullies have one thing in sites, a new e-mail account, a new common: Something hurts them so mobile phone number. much they have to hurt someone else to feel good. By replying to Set your username and messages, they are getting what passwords to private they want. – Stress to your children that they If messages are life threatening need to keep their personal information private so it doesn't fall – Contact law enforcement. If cyber into the hands of someone who will bullying is threatening, it is illegal. misuse it.
  • 36.
  • 37. Phoebe Prince | Real Life Stories Phoebe was 15 years old. She moved to Massachusetts after living most of her young life in Ireland. She was taunted and bullied because she was the new kid, spoke with an accent, and girls were upset about who she was dating. On January 14, 2010, after a day of harassment and taunting, a student struck her in the head with a can from a passing car as she walked home from school. Later that day, Phoebe committed suicide. Even after her death, the bullies made crude comments about her and posted those comments on her Facebook Memorial Page. On March 29, 2010, the District Attorney completed investigations with Digital Footprints left behind from the bullies, indicted six teenagers from her school on adult felony charges ranging Violation of Civil Rights, Felony Battery, and Stalking for engaging in persistent taunting and harassment.
  • 38. Sexting and the Digital Footprint Sexting Leaves a Trail. There is NO WAY around it. • Exif Files will exist • Phone number of the sender is traceable • The numbers of everyone forwarding the message exist • E-mail addresses of those receiving and sending the message exist • Records are kept on Web sites the image was uploaded to • Speed bumps in the Digital Footprint road made easier through interviews and investigation
  • 39. What is with the New Era of Sexting? Ahhhhh, Teen Age Love!
  • 40. Why Do Kids Sext Photos? Is a Teenager’s date on New Years Eve going to be your teen’s date on the 4th of July? For the most part “NO!” Dating lives of teens change like we change our clothes. Why is this important? When that kid’s New Years Eve date wants them to send naked pictures, he’s asking for one reason. HE WANTS TO SHOW THEM OFF! What better time to show them off, Use Common Sense. It should than on the 4th of July when they have broken up! tell you NOT to do this.
  • 41. Why Do Teen Girls Give in to Sexting? Low Self Esteem: (Most are Female) A. Usually teen girls Sext their photos for this reason B. Desperately seeking some kind of approval C. Trying to secure the attention of that certain boy D. Sends the image upon request of a boy she likes E. Trying to prove a point, “I’m hotter than her, here’s proof” F. Sends the image to her boyfriend as a gift
  • 42. What Do Boys Get From Sexting? Boys Will Be Boys…. They want to be cool like Fonzie! It’s the ever popular Arthur “Fonzie” Fonzerelli thought process! RAGING HORMONES Can boys control themselves? Do they do stupid things because of those hormones? I Think Not! Boys want to be COOL! Boys want to be “BIG SHOTS” and have everyone’s attention
  • 43. Sexting & Child Pornography Laws In many states, kids that sext their photographs are unknowingly committing the crime of child pornography – In many states there is no exception for the minor who takes their own photograph – Very serious felony in most states – Many states are making laws to minimize the seriousness of this crime when only kids are involved – If the image is uploaded to the Internet, things become more serious and difficult – Thankfully, the Digital Footprint is there to assist in the most serious cases
  • 44. Hope Witsell | Real Life Stories Just 13 years old, She Was Gone Too Soon 13-year-old 7th Grade Florida girl sent a topless photo of herself to a boy in hope of gaining his attention. Instead, she got the attention of her school, as well as the high school nearby. A third party intercepted the photo while using the boy’s cell phone, and soon students from her school and others gawked at the picture. Hope walked the hallways at school as students shouted horrible names at her. These people were her friends days before. The following day, Hope wrote in her journal: “I’m done for sure now. I can feel it in my stomach. I’m going to try and strangle myself. I hope it works.” Hope Witsell went home and hung herself in her bedroom.
  • 45. Jessica Logan | Real Life Stories 18 years old and due to graduate from High School when a nude picture she sent to her boyfriend was sent to hundreds of students. She said she was being harassed and teased by other students, at home, at school and when she went out. The moment her private picture was sent out for everyone to see, things spiraled out of control. Jessie's grades plummeted, she started skipping school and when she would go to school, she would hide in the bathroom to avoid being teased. After attending the funeral of a friend Jessica went into her bedroom, and hung herself in her closet.
  • 46. The Moral of the Story…
  • 47. www. .com
  • 48. For More Information Please Visit us Online: www.creepsquash.com www.facebook.com/creepsquash @Creep_Squash on Twitter JM Safety Consulting www.jmsafetyconsulting.com www.facebook.com/jmsafetyconsulting Keeping Kids Safe & Parents Aware