This document discusses the concept of a digital footprint and its impact on today's youth. It defines a digital footprint as the trail of information someone leaves behind whenever they go online through activities like social media use, online searches, shopping, etc. It warns that this information can be used by internet predators to target victims and outlines how law enforcement can track digital footprints to investigate crimes. The document stresses that digital footprints are nearly impossible to completely erase and can follow people around for life if not managed properly.
What's New in Teams Calling, Meetings and Devices March 2024
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
1. The Digital Footprint
and What it Means
A Way to Understand
the Reality & Impact
On Today‟s Youth
JM Safety Consulting
2. About Us
CreepSquash Internet safety partner Joseph Melone of
JM Safety Consulting is a 16 year veteran police officer
and detective providing awareness and education through
speaking engagements to teachers, parents and youth
groups to help them better understand the dangers of
cyber space, predators, drugs, alcohol and gangs. With a
no nonsense approach, he offers valuable information and
a real world understanding of how to use this education to
better protect children in the online world.
JM Safety Consulting and CreepSquash have aligned in
a joint effort to keep kids safe online as the need for
online protection is required more now than ever.
CreepSquash is a great resource for parents as an easy
to use web-based monitoring application for Facebook
that allows effortless monitoring of online activity and
privacy protection in a safe and effective way against
bullies, predators and other online dangers.
JM Safety Consulting
3. Welcome to the Internet
• A Great Tool for Students
• By far the greatest source of information
for today’s youth
• It offers countless avenues of enrichment and can be
a student’s best friend
• Information your child needs for reports and school
work is right at their finger tips!
• It creates a world of communication in ways that
never existed before
• Creates new avenues of Learning and Development
• The Internet can also be a Dangerous Place of
Exposure
• Your kids have no idea who they are talking to Online
4. The Digital Footprint: What is it?
The Digital Footprint is a trail we leave behind
every time we access the Internet
– Everyday, millions of people around the world exchange texts,
post blogs, search Google, play on Facebook, shop online and
do countless other activities with devices that use the Internet.
– Just because we don‟t see the trail we leave behind
does not mean it doesn‟t exist.
What are we leaving for the world to find?
– Different from a paper trail that can be destroyed,
your Digital Footprint can follow you around for life
5. Significance of Digital Footprints
• Internet predators use these trails to prey on their victims
• Starts the moment a computer or smart phone logs online
• Information easily obtained by Web sites via spyware or
law enforcement via court order / search warrant
• Digital Footprints are stored on the source computer and
remote sites such as: Social Networks, E-mail Providers,
Web Sites, Search Engines
6.
7. Children and The Internet
• Parents believe children are safe on the Internet
because they use it at home or school
• With today‟s technology, Sexual Predators,
Bullies and Toxic Friends come right into your
home and you don‟t even know it
• It is a common illusion that children are
untouchable because their activities are
contained in the Cyber-World
• Children are literally committing felonies online
everyday and they don‟t even know it
• 75% of minors who encounter strangers online
will not tell a parent
1 in 4 Children Will • Everyday, children are exposed to very
Become a Victim
dangerous people without knowing it
8. How this Effects Schools
1. Bullying in schools has driven students to commit violent crimes
and increase suicide rates.
2. Despite nearly every state passing legislation to increase
punishments for bullying and cyber bullying, the problem
continues to grow.
3. School Districts have been sued due to a lack of proactivity in
attacking this issue.
4. Students who are involved in these activities have been and will
be charged with serious crimes.
5. Bullying becomes Cyber-Bullying and vice versa.
6. Street Gangs continue their activities online, gang members are
in our schools and social networks.
7. Sex Offenders locate their targets online and track them to
schools and neighborhoods.
9. Being Anonymous Online
• A complete falsehood our children do not
understand thanks to the Digital Footprint
• Everything done online can be tracked
• More than just the Internet Service Provider
(ISP) Address
• Social networks and Web sites keep tabs on
every activity that occurs
• All information including date, time and
content is easily traced with probable cause
and a court order
• Good old-fashioned police work can confirm
evidence recovered from the Digital Footprint
• Wireless Piggy Backing is easily explained
10. What Do Kids Think?
It’s a Popularity Contest! With
more friends than their peers
on Facebook, they are more
inclined to add strangers
without a second thought.
• Kids think “THAT WILL NEVER HAPPEN TO ME”
• Kids think tomorrow is forever instead of a day away
• Kids think their friends today will be their friends forever
• Kids think they can say what ever they want online
• Kids think it‟s not big deal to have „online‟ friends they don‟t
know if the real world
• Kids think it‟s better to keep quiet about things that make
them uncomfortable to avoid being judged
• Kids think “If I tell a parent I might lose Internet Privileges”
11. How the Thought Process Works
The Reality Behind What Kids Think
13. How Police Use the Digital Footprint
• Examination! The offending data is reviewed
first for date, time, and time zone of the sender
• Subpoena, Subpoena, Subpoena with a request
for everything from subscriber information and
IP Logs to the e-mail addresses of all those
associated with the account
• Subpoena, Subpoena, Subpoena requesting
the subscriber information for the users of that
IP address, and those e-mail addresses
14. How Police Use the Digital Footprint
• Once the subpoena information is examined,
police may move forward with search warrants for
everything from social networking profiles to
searching and seizing actual computers
• Upon reviewing this information, police may
move forward by making an arrest
• Typical charges against kids
using the Internet for crimes
include Cyber-Stalking,
Harassment, Hate Crimes,
Child Pornography, Sexual
Assaults, Assault, and even
Civil Rights Violations
15. Street Gangs and The Internet
• Street Gangs are domestic urbanized terrorist organizations that are
in most of our schools
• Their illicit activities are seen on the street, but continue on the
Internet.
• Gangs are involved in violent encounters on the street, and then
brag about it on social networking sites and gang pages
• Police actively monitor these sites, and You Should Too!
16. Take Action Now! Keep The Gangs Out
• Teachers, Principals, and Deans:
You know who the gang members “Gangs in schools have a
are in your schools. If not, get on it! significantly high impact on the
educational environment and
• After talking to them find their perception of school safety.”
social networking pages.
-National Center for Education Statistics
What are they talking about?
• Find the gang web pages in your area and
review them.
• Look at video sharing sites such as YouTube and
Vimeo and see what‟s posted. That fight
outside school might end up there.
• Use your school resource officer to the fullest
extent. They can access information you are
unable to.
17. Images and The
• Exif Files, (Exchangable Image Files):
The data hidden inside a digital photo
• The data can include the following:
– Date & Time the photo was taken
– The camera used to take the photo
– The file name
– If a flash was used
AND IN SOME CASES…
THE COORDINATES WHERE
THE PICTURE WAS TAKEN
18. Digital Footprints and Cell Phones
Cell Phones Leave Trails of Detailed Information
• A literal trail of cell site towers while travelling
• Real time location of certain active phones via
GPS
• Call detail records contained in phone or online
• Images in cell phones contain Exif Information
• Smart Phones are mini computers offering the
same information available on computers
• Cell Phones using “The Cloud” still contain a
Digital Footprint, but it is more difficult to track
Tracking Digital Footprints on Cell Phones
often leads to other devices and Web sites
that may hold additional evidence
19. Digital Footprints, Social Networks & The Law
Subpoenas
• A Subpoena is needed in order to compel
Social Networking sites to release basic
subscriber information including:
– Name
– Length of Service
– Credit Card Information
– Recent IP Information
• Additional Subpoenas will be needed
after receiving this information
• Subpoenas to the Credit Card Company
and to the Internet Service Provider are
required
20. Digital Footprints, Social Networks & The Law
Court Orders
• A court order signed by a judge is needed in order to compel
Social Networking sites to release basic subscriber information
that includes:
– Message Headers
– Detailed IP Information
• Tracking the information gained from the message headers and
from the detailed IP Information will need to be gained with
additional subpoenas, court orders, or even possibly search
warrants
21. Digital Footprints, Social Networks & The Law
Search Warrants
• A Search Warrant detailing probable cause, signed by a judge, and
issued within the allotted time frame, is needed in order to compel
Social Networking sites to release the following information:
– Private Messages / Chat Log
– Photographs
– Videos
– Wall Posts
– Location Information
22. Digital Footprints, Social Networks & The Law
• Social Networks are not created equal. While it’s simple to obtain
information from sites like Twitter, Facebook can be very difficult
• Exigent Circumstances:
– Circumstances that would make a reasonable person believe that
making entry before obtaining a court order is necessary to prevent
physical injury, destruction of evidence, or the escape of a suspect.
• These situations can include:
Missing Juveniles
Suspects Fleeing the Area
Child Pornography Cases
Preventing Violence
23. Digital Footprints, Social Networks & The Law
• Subpoenas, Court Orders, & Search Warrants take time. Time to
write, time to respond, time to analyze.
• Not all Social Networking Sites are “Law Enforcement Friendly.”
• Search Warrants give the most information, but they are the hardest
to obtain.
• Subpoenas and Court Orders supply similar information but more
direct details with a court order.
24. Student Behavior & the Internet
YouTube & Vimeo:
– Altercations with students recorded
and posted online
– Pleas for help against bullies and
suicide threats posted in online
videos
Facebook, Twitter and MySpace:
– Altercations with students posted
on walls and profiles
– Used for Bullying
– Used for Expression
Cell Phones:
– Used to make videos of fights
and other altercations
– Used For Bullying
– Used for Sexual Exchanges
25. Collecting Evidence
First Order of Business
1. Obtain the Video:
• Mozilla Firefox Extension called
“DownloadHelper”
• www.downloadhelper.net
• Free video recovering program
• Help police collect evidence before it
is deleted
• Police watch the video with their own
eyes at your school
26. Collecting Evidence
2. Take a video of the video
– Use your cell phone or video camera to record it
– Not useful in court, but useful during investigations
– TRY NOT TO TALK! YOUR VOICE WILL BE HEARD
3. Get the Image
– Save it to your computer / Forward to e-mail
– Take a digital photo of the image
– Not useful in court, but useful during investigations
4. Document the words
– Save threatening or criminal messages to your computer
– Take a digital photograph of the images
– Provide the information to law enforcement
27. Law Enforcement & Evidence
Collection of Evidence Will Help Police to:
• Provide probable cause
• Make it Easy to obtain court orders
• Speed up an arrest
• Retrieve necessary information from a stored
disk, USB, or e-mail
• Document the incident or series of incidents
• Get dangerous students out of school via
suspension, expulsion, arrest , or all of
the above
28. Kids and Facebook
• Facebook as a Popularity Contest
– “If Sandy has 200 friends, and Sally has 100 friends, then Sandy is
100 times more popular than Sally!”
• Many strangers become „friends‟ with children because
they know this and they use it to take advantage
– Children accept all friend requests to simply to have more friends
than other people
• Many Children and Teens end up with multiple predators on
their pages who pretend to be kids (with fake profiles)
– Something predators do often to reach out to kids
• Bullies often times mask as another person to prey on
victims through Facebook
29. Kids and Facebook
• Kids use self expression on their profiles
– Predators use what they learn from profiles to get kids to talk to them.
They research personal information, interests, friends, photos, etc.
• Kids say too much on their walls
– Where they go to school, the mascot‟s name, their clubs, their phone
numbers, e-mail addresses, hangouts, hobbies, languages they speak
• Kids do not follow the rules set forth by the
Social Networking Site
– Kids who are 13 or younger say they‟re actually 18 so they can have
full access to the site. BAD IDEA!
– There is an estimated 7.5 Million children under the age of 13 on
Facebook, with no enforcement despite the minimum age requirement
30. How Do Kids Make it Easy for Predators?
It’s really simple. Kids LIE!!!
Kids act older and lie Kids act like they are
about their age someone they aren‟t
Kids claim they are Kids say they‟ve done
dating and they are not things they haven‟t
Kids say they have had Kids say they‟ve been
sex and they have not to places they haven‟t
53% of kids between 10-17 will be sexually
solicited by a stranger online
****Predators KNOW KIDS ARE LYING! In fact, THEY COUNT ON IT!****
31. Cyber Bullying: What Is It?
Cyber Bullying is when a child,
preteen, or teen is tormented,
threatened, harassed, humiliated,
embarrassed or targeted by another
child, preteen or teen using the
Internet, interactive and digital
technologies, or mobile phones.
Note: It must have a minor on both
sides, or at least have been instigated
by a minor against another minor.
Once an adult is involved, it could
possibly turn into the crime of cyber
stalking.
32. Harmful Effects of Cyber Bullying
• The effects of cyber bullying can
hurt harshly and quickly, often
times beyond repair
• Children, teens, and young
adults have been driven to
suicide or violent crime
• Serious detrimental effects on a
victim‟s self-esteem, emotional
well-being, and sense of
personal safety
• Depression, despondence, self-
destructive behavior and poor
performance in school or work
…This is Just to Name a Few
33. Cyber Bullying Laws Vary By State
– More than 47 states have current laws in effect
– Many new legislations will pass this year that inflict
harsher punishments for Cyber Bullying crimes
– Nearly 60% of children are affected by Cyber Bullying
– Laws give schools the power to discipline students up
to and including expulsion for online threats
AGAINST TEACHERS OR OTHER STUDENTS!
– For a Comprehensive List of all the current Cyber
Bullying Laws by State in the U.S., visit:
http://www.cyberbullying.us/Bullying_and_Cyberbullying_Laws.pdf
In most states, it does not matter if the
threat was made outside school.
34. Laws Bullies Typically Break
Assault / Battery: Physical violence or
touching in an insulting nature
Harassment (Phone & Computer):
Unwanted threats or taunting to
victim or family
Stalking / Cyber-Stalking: Multiple
occasions of harassment and
issues of a threatening nature
Hate Crime: Committing any crime
because of race, creed, color,
religion, or sexual orientation
35. How to Stop Cyberbullies
Keep a record
(include time and date)
– This will help law enforcement track
the Digital Footprint.
Tell someone
– Encourage kids to tell someone they
trust: A parent, friend, school
counselor or teacher.
Contact your phone or Internet
service provider
– Report what is happening. They can
help you block messages or calls
from certain senders.
Change your contact details
Don't reply to bullying messages
– Get a new user name for the social
– All Bullies have one thing in sites, a new e-mail account, a new
common: Something hurts them so mobile phone number.
much they have to hurt someone
else to feel good. By replying to Set your username and
messages, they are getting what passwords to private
they want.
– Stress to your children that they
If messages are life threatening need to keep their personal
information private so it doesn't fall
– Contact law enforcement. If cyber into the hands of someone who will
bullying is threatening, it is illegal. misuse it.
36.
37. Phoebe Prince | Real Life Stories
Phoebe was 15 years old. She moved to
Massachusetts after living most of her young life
in Ireland. She was taunted and bullied because
she was the new kid, spoke with an accent, and
girls were upset about who she was dating.
On January 14, 2010, after a day of harassment
and taunting, a student struck her in the head
with a can from a passing car as she walked
home from school.
Later that day, Phoebe committed suicide. Even
after her death, the bullies made crude comments
about her and posted those comments on her
Facebook Memorial Page.
On March 29, 2010, the District Attorney
completed investigations with Digital Footprints
left behind from the bullies, indicted six
teenagers from her school on adult felony
charges ranging Violation of Civil Rights, Felony
Battery, and Stalking for engaging in persistent
taunting and harassment.
38. Sexting and the Digital Footprint
Sexting Leaves a Trail. There is NO WAY around it.
• Exif Files will exist
• Phone number of the sender is traceable
• The numbers of everyone forwarding the message exist
• E-mail addresses of those receiving and sending the message exist
• Records are kept on Web sites the image was uploaded to
• Speed bumps in the Digital Footprint road made easier through
interviews and investigation
39. What is with the New Era of Sexting?
Ahhhhh, Teen Age Love!
40. Why Do Kids Sext Photos?
Is a Teenager’s date on New Years Eve going to be
your teen’s date on the 4th of July?
For the most part “NO!” Dating
lives of teens change like we
change our clothes.
Why is this important?
When that kid’s New Years Eve date
wants them to send naked pictures,
he’s asking for one reason.
HE WANTS TO SHOW THEM OFF!
What better time to show them off,
Use Common Sense. It should than on the 4th of July when they
have broken up!
tell you NOT to do this.
41. Why Do Teen Girls Give in to Sexting?
Low Self Esteem: (Most are Female)
A. Usually teen girls Sext their
photos for this reason
B. Desperately seeking some kind
of approval
C. Trying to secure the attention of
that certain boy
D. Sends the image upon request
of a boy she likes
E. Trying to prove a point, “I’m
hotter than her, here’s proof”
F. Sends the image to her
boyfriend as a gift
42. What Do Boys Get From Sexting?
Boys Will Be Boys….
They want to be cool like Fonzie!
It’s the ever popular Arthur
“Fonzie” Fonzerelli thought
process!
RAGING HORMONES
Can boys control themselves?
Do they do stupid things
because of those hormones?
I Think Not!
Boys want to be COOL! Boys
want to be “BIG SHOTS” and
have everyone’s attention
43. Sexting & Child Pornography Laws
In many states, kids that sext their photographs are
unknowingly committing the crime of child pornography
– In many states there is no exception for the minor who takes
their own photograph
– Very serious felony in most states
– Many states are making laws to minimize the seriousness of this
crime when only kids are involved
– If the image is uploaded to the Internet, things become more
serious and difficult
– Thankfully, the Digital Footprint is there to assist in the most
serious cases
44. Hope Witsell | Real Life Stories
Just 13 years old, She Was Gone Too Soon
13-year-old 7th Grade Florida girl sent a
topless photo of herself to a boy in hope
of gaining his attention. Instead, she got
the attention of her school, as well as the
high school nearby. A third party
intercepted the photo while using the
boy’s cell phone, and soon students from
her school and others gawked at the
picture. Hope walked the hallways at
school as students shouted horrible
names at her. These people were her
friends days before.
The following day, Hope wrote in her
journal: “I’m done for sure now. I can feel
it in my stomach. I’m going to try and
strangle myself. I hope it works.”
Hope Witsell went home and hung
herself in her bedroom.
45. Jessica Logan | Real Life Stories
18 years old and due to graduate from
High School when a nude picture she
sent to her boyfriend was sent to
hundreds of students. She said she
was being harassed and teased by
other students, at home, at school
and when she went out.
The moment her private picture was
sent out for everyone to see, things
spiraled out of control. Jessie's
grades plummeted, she started
skipping school and when she would
go to school, she would hide in the
bathroom to avoid being teased. After
attending the funeral of a friend
Jessica went into her bedroom, and
hung herself in her closet.
48. For More Information Please Visit us Online:
www.creepsquash.com
www.facebook.com/creepsquash
@Creep_Squash on Twitter
JM Safety Consulting
www.jmsafetyconsulting.com
www.facebook.com/jmsafetyconsulting
Keeping Kids Safe & Parents Aware