SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Downloaden Sie, um offline zu lesen
Online
Officer Safety
Disclaimer
I am not an Attorney and although I will
be providing information about legal
matters – this should NOT be
considered legal advice
Consult with your agency or personal
attorney
This presentation is not an official
representation of the Office of the
Missouri Attorney General
Presentation
Online Identities
– Professional
– Undercover
– Personal
GPS
Boundaries
Teens and Social Networking
Of online teens with profiles
–82% include their first name
–79% include a photo of themselves
–61% include their city or town
–49% include the name of their school
–29% include last name & Email address
–2% have included their cell phone #
                     Teens, Privacy & Online Social Networks,
                      Pew Internet & American Life Project
                                    April 2007
Social Media – (web 2.0)

Blogs - (twitter)
Social Networks - (facebook)
Video Sharing - (youtube)
Audio Sharing - (podcasts)
Photo Sharing – (flickr)
Geolocating – (foursquare)
1st Amendment & Government Employee

“when a citizen enters government
 service, the citizen by necessity
 must accept certain limitation on
 his or her freedom”

                US Supreme Court
                Garcetti v Ceballos 2006
Official Use of Social Media

Investigations
–Missing Persons
–Cyber Stalking/Harassment
–Evidence (photos or statements)
Crime Prevention
Recruitment/Vetting
Community Outreach
Official Use of Social Media

Policy & Training
–Vere Software Model Policies
–IACP Social Media Concept Paper
Authorization
–Public Information Officer
Information Management Issues
Undercover Use of Social Media
Use of proper equipment
–IP Address
–Terms of Service
Document your actions
–Rules of evidence
–Entrapment issues
Who are your friends?
–Don’t use your family!!!
Personal Use of Social Media

Policy Issues
–Agency identification (uniform, patch)
Freedom of Speech
–Detrimental to the mission and
 function of the employer
Public Information
–Name, home address, phone, email
–Family connections
Personal Use of Social Media

Personal & Work Crossover Issues
–Duty status
–Agency identification (uniform, patch)
Crime scene photos
Time stamps!!
Bias, weapons, violence, sex
Personal Use of Social Media

Investigative or sensitive information
Sexually explicit communications
–Quon v City of Ontario (June 2010)
Defamatory or offensive material
Crossing appropriate boundaries
–SRO & students
Amy Hestir Student Protection Act

 MO Senate Bill 54 (162.069)
 “Exclusive Access”
  No teacher shall establish:
  – an internet site unless available to
   parents & administration
Are You At Risk?

Who would use this against you?
–Defense
–Suspect
–Someone who doesn’t like you/cops
Ratemycop.com
Topix.com
Facebook (ie: Missouri Police Complaints)
Are You At Risk?

Protect your
–NAME
–IDENTITY
–REPUTATION
Passwords
Phone access
Location Based Sites

Geolocation social media
–Brightkite
–Foursquare
–Gowalla
Used to meet up with friends
May have incentives from businesses
Photo Exif Data
ApertureValue: 2.970854
ColorSpace: sRGB
ComponentsConfiguration: YCbCr
DateTimeDigitized: 2011:08:08 12:16:19
DateTimeOriginal: 2011:08:08 12:16:19
                                         Map Link: 38.577000,-92.177667‡
ExifVersion: 2.21
ExposureMode: Auto                       Translated EXIF
ExposureProgram: Normal
ExposureTime: 0.06666667
FNumber: 2.8
Flash: Off, Did not fire
FlashPixVersion: 1.0
                                         ImgDirection: 221.2339°=
FocalLength: 3.85
ISOSpeedRatings: 1000                    Southwest
MeteringMode: Average
PixelXDimension: 2592                    ImgDirectionRef: True North
PixelYDimension: 1936
SceneCaptureType: Standard
SensingMethod: One-chip color area
                                         Latitude: 38.577
Sharpness: Soft
ShutterSpeedValue: 3.906891
                                         LatitudeRef: N
SubjectArea:
X Center: 1295,                          Longitude: 92.17766666666667
Y Center: 967,
Width: 699,                              LongitudeRef: W
Height: 696
WhiteBalance: Auto
DateTime: 2011:08:08 12:16:19
                                         TimeStamp: 17:38:36.27
Make: Apple
Model: iPhone 4                          DateTime: 2011:08:08 12:38:36
Orientation: Left
ResolutionUnit: Inches
Software: 4.2.8
XResolution: 72
YResolution: 72
_YCbCrPositioning: Centered
PixelWidth: 2592
PixelHeight: 1936
FileSize: 2.02298 MB
Exif Data

Free IPhone App – Exif Wizard
Works on images from
iPhones, iPad, many cameras

–“a button which allows you to open
 your iPhone’s built-in Maps app to
 obtain directions to a photo’s location”
iPhone GPS

* Settings
  * General
   * Location Services
Removing Personal Info

Conduct a search of your name
–Don’t just use Google
  • www.thesearchenginelist.com
–You may be able to remove some of
 your data
  • www.unlistmy.info
Final Thoughts

There is NO eraser button
Watch for Behavioral Marketing
Consider what the defense might use
Understand “Sync Contacts”
Take a break:
–Don’t live your life online!!!
JOE LARAMIE

  MISSOURI ATTORNEY
   GENERAL’S OFFICE



JOE.LARAMIE@AGO.MO.GOV

Weitere ähnliche Inhalte

Andere mochten auch

Andere mochten auch (11)

Kepil (mooring buoy)
Kepil (mooring buoy)Kepil (mooring buoy)
Kepil (mooring buoy)
 
Bab II Procedure Loading dengan applikasi Casp 6.1
Bab II  Procedure Loading dengan applikasi Casp 6.1Bab II  Procedure Loading dengan applikasi Casp 6.1
Bab II Procedure Loading dengan applikasi Casp 6.1
 
Ship planning part i
Ship planning part iShip planning part i
Ship planning part i
 
Marine polution annex v
Marine polution annex vMarine polution annex v
Marine polution annex v
 
FIRE FIRGHTING APPLIANCES
FIRE FIRGHTING APPLIANCESFIRE FIRGHTING APPLIANCES
FIRE FIRGHTING APPLIANCES
 
Internal audit ctpf
Internal audit ctpfInternal audit ctpf
Internal audit ctpf
 
LSA
LSALSA
LSA
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShare
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 

Ähnlich wie Online officer safety 9 1-11

Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyTom Eston
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Robert Stribley
 
Designing for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed TalkDesigning for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed TalkRobert Stribley
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldRobert Stribley
 
Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud Jim Adler
 
Sit powerpoint
Sit powerpointSit powerpoint
Sit powerpointdkeane01
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSHB Litigation Conferences
 
Web20 Mapping - by Alan Lew
Web20 Mapping - by  Alan LewWeb20 Mapping - by  Alan Lew
Web20 Mapping - by Alan LewAlan Lew
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile securityErnest Staats
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSOodit Jethwa
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShowAdam Heller
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?Kavika Roy
 
Copy of Managing Your Digital Footprint
Copy of Managing Your Digital FootprintCopy of Managing Your Digital Footprint
Copy of Managing Your Digital FootprintJames Webb
 
Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...CSIRO National AI Centre
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with PrivacyJason Hong
 

Ähnlich wie Online officer safety 9 1-11 (20)

Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile Technology
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
 
Designing for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed TalkDesigning for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed Talk
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public World
 
Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud
 
Sit powerpoint
Sit powerpointSit powerpoint
Sit powerpoint
 
Info leakage 200510
Info leakage 200510Info leakage 200510
Info leakage 200510
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
 
Web20 Mapping - by Alan Lew
Web20 Mapping - by  Alan LewWeb20 Mapping - by  Alan Lew
Web20 Mapping - by Alan Lew
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
 
sixspans0102
sixspans0102sixspans0102
sixspans0102
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
 
Copy of Managing Your Digital Footprint
Copy of Managing Your Digital FootprintCopy of Managing Your Digital Footprint
Copy of Managing Your Digital Footprint
 
Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
The Now Generation Internet Safety
The Now Generation   Internet SafetyThe Now Generation   Internet Safety
The Now Generation Internet Safety
 

Mehr von Vere Software

Internationalised Domain Names & Internet Investigations
Internationalised Domain Names & Internet InvestigationsInternationalised Domain Names & Internet Investigations
Internationalised Domain Names & Internet InvestigationsVere Software
 
Smart Phones & the Internet
Smart Phones & the InternetSmart Phones & the Internet
Smart Phones & the InternetVere Software
 
How Authentication, Collection & Reporting Strengthen OSINT's Value
How Authentication, Collection & Reporting Strengthen OSINT's ValueHow Authentication, Collection & Reporting Strengthen OSINT's Value
How Authentication, Collection & Reporting Strengthen OSINT's ValueVere Software
 
Online sources of information december 2010
Online sources of information december 2010Online sources of information december 2010
Online sources of information december 2010Vere Software
 
Tracing IP Addresses: Gary Kessler
Tracing IP Addresses: Gary KesslerTracing IP Addresses: Gary Kessler
Tracing IP Addresses: Gary KesslerVere Software
 
Social Media Policy & Law Enforcement Investigations
Social Media Policy & Law Enforcement InvestigationsSocial Media Policy & Law Enforcement Investigations
Social Media Policy & Law Enforcement InvestigationsVere Software
 
WebCase: How To Archive A Web Page
WebCase: How To Archive A Web PageWebCase: How To Archive A Web Page
WebCase: How To Archive A Web PageVere Software
 

Mehr von Vere Software (7)

Internationalised Domain Names & Internet Investigations
Internationalised Domain Names & Internet InvestigationsInternationalised Domain Names & Internet Investigations
Internationalised Domain Names & Internet Investigations
 
Smart Phones & the Internet
Smart Phones & the InternetSmart Phones & the Internet
Smart Phones & the Internet
 
How Authentication, Collection & Reporting Strengthen OSINT's Value
How Authentication, Collection & Reporting Strengthen OSINT's ValueHow Authentication, Collection & Reporting Strengthen OSINT's Value
How Authentication, Collection & Reporting Strengthen OSINT's Value
 
Online sources of information december 2010
Online sources of information december 2010Online sources of information december 2010
Online sources of information december 2010
 
Tracing IP Addresses: Gary Kessler
Tracing IP Addresses: Gary KesslerTracing IP Addresses: Gary Kessler
Tracing IP Addresses: Gary Kessler
 
Social Media Policy & Law Enforcement Investigations
Social Media Policy & Law Enforcement InvestigationsSocial Media Policy & Law Enforcement Investigations
Social Media Policy & Law Enforcement Investigations
 
WebCase: How To Archive A Web Page
WebCase: How To Archive A Web PageWebCase: How To Archive A Web Page
WebCase: How To Archive A Web Page
 

Kürzlich hochgeladen

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Kürzlich hochgeladen (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Online officer safety 9 1-11

  • 2. Disclaimer I am not an Attorney and although I will be providing information about legal matters – this should NOT be considered legal advice Consult with your agency or personal attorney This presentation is not an official representation of the Office of the Missouri Attorney General
  • 3. Presentation Online Identities – Professional – Undercover – Personal GPS Boundaries
  • 4. Teens and Social Networking Of online teens with profiles –82% include their first name –79% include a photo of themselves –61% include their city or town –49% include the name of their school –29% include last name & Email address –2% have included their cell phone # Teens, Privacy & Online Social Networks, Pew Internet & American Life Project April 2007
  • 5. Social Media – (web 2.0) Blogs - (twitter) Social Networks - (facebook) Video Sharing - (youtube) Audio Sharing - (podcasts) Photo Sharing – (flickr) Geolocating – (foursquare)
  • 6. 1st Amendment & Government Employee “when a citizen enters government service, the citizen by necessity must accept certain limitation on his or her freedom” US Supreme Court Garcetti v Ceballos 2006
  • 7. Official Use of Social Media Investigations –Missing Persons –Cyber Stalking/Harassment –Evidence (photos or statements) Crime Prevention Recruitment/Vetting Community Outreach
  • 8. Official Use of Social Media Policy & Training –Vere Software Model Policies –IACP Social Media Concept Paper Authorization –Public Information Officer Information Management Issues
  • 9. Undercover Use of Social Media Use of proper equipment –IP Address –Terms of Service Document your actions –Rules of evidence –Entrapment issues Who are your friends? –Don’t use your family!!!
  • 10. Personal Use of Social Media Policy Issues –Agency identification (uniform, patch) Freedom of Speech –Detrimental to the mission and function of the employer Public Information –Name, home address, phone, email –Family connections
  • 11. Personal Use of Social Media Personal & Work Crossover Issues –Duty status –Agency identification (uniform, patch) Crime scene photos Time stamps!! Bias, weapons, violence, sex
  • 12. Personal Use of Social Media Investigative or sensitive information Sexually explicit communications –Quon v City of Ontario (June 2010) Defamatory or offensive material Crossing appropriate boundaries –SRO & students
  • 13. Amy Hestir Student Protection Act MO Senate Bill 54 (162.069) “Exclusive Access” No teacher shall establish: – an internet site unless available to parents & administration
  • 14. Are You At Risk? Who would use this against you? –Defense –Suspect –Someone who doesn’t like you/cops Ratemycop.com Topix.com Facebook (ie: Missouri Police Complaints)
  • 15. Are You At Risk? Protect your –NAME –IDENTITY –REPUTATION Passwords Phone access
  • 16. Location Based Sites Geolocation social media –Brightkite –Foursquare –Gowalla Used to meet up with friends May have incentives from businesses
  • 18. ApertureValue: 2.970854 ColorSpace: sRGB ComponentsConfiguration: YCbCr DateTimeDigitized: 2011:08:08 12:16:19 DateTimeOriginal: 2011:08:08 12:16:19 Map Link: 38.577000,-92.177667‡ ExifVersion: 2.21 ExposureMode: Auto Translated EXIF ExposureProgram: Normal ExposureTime: 0.06666667 FNumber: 2.8 Flash: Off, Did not fire FlashPixVersion: 1.0 ImgDirection: 221.2339°= FocalLength: 3.85 ISOSpeedRatings: 1000 Southwest MeteringMode: Average PixelXDimension: 2592 ImgDirectionRef: True North PixelYDimension: 1936 SceneCaptureType: Standard SensingMethod: One-chip color area Latitude: 38.577 Sharpness: Soft ShutterSpeedValue: 3.906891 LatitudeRef: N SubjectArea: X Center: 1295, Longitude: 92.17766666666667 Y Center: 967, Width: 699, LongitudeRef: W Height: 696 WhiteBalance: Auto DateTime: 2011:08:08 12:16:19 TimeStamp: 17:38:36.27 Make: Apple Model: iPhone 4 DateTime: 2011:08:08 12:38:36 Orientation: Left ResolutionUnit: Inches Software: 4.2.8 XResolution: 72 YResolution: 72 _YCbCrPositioning: Centered PixelWidth: 2592 PixelHeight: 1936 FileSize: 2.02298 MB
  • 19. Exif Data Free IPhone App – Exif Wizard Works on images from iPhones, iPad, many cameras –“a button which allows you to open your iPhone’s built-in Maps app to obtain directions to a photo’s location”
  • 20. iPhone GPS * Settings * General * Location Services
  • 21. Removing Personal Info Conduct a search of your name –Don’t just use Google • www.thesearchenginelist.com –You may be able to remove some of your data • www.unlistmy.info
  • 22. Final Thoughts There is NO eraser button Watch for Behavioral Marketing Consider what the defense might use Understand “Sync Contacts” Take a break: –Don’t live your life online!!!
  • 23. JOE LARAMIE MISSOURI ATTORNEY GENERAL’S OFFICE JOE.LARAMIE@AGO.MO.GOV