SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Avoiding Cybertraps
Incident Response, Computer Forensics,
and Risk Management

Frederick S. Lane
Southern California Schools JPA
Temecula, CA
28 October 2013
www.FrederickLane.com

www.ComputerForensicsDigest.com
Background and Expertise
• Attorney and Author of 7
Books
• Computer Forensics
Expert -- 15 years
• Over 100 criminal cases
• Lecturer on ComputerRelated Topics – 20+
years
• Computer user
(midframes, desktops,
laptops) – 35+ years
• 10 yrs on Burlington VT
School Board
Lecture Overview
Headache-Inducing Headlines
Common Types of Incidents
Electronic Evidence Is Everywhere
Preparing for the Inevitable
Risks for Administrators and
Teachers
• A Quick Intro to Computer
Forensics
•
•
•
•
•
Headache-Inducing Headlines
• “Parents Sue School District After Their
13-Year-Old's Suicide Following Sexting
Bullying” – Hillsborough Cty., Florida
• “Parents sue Lockhart school district
after teacher charged with sexual
assault” – Lockhart, TX
• “School Cyberbullying Victims Fight
Back In Lawsuits” – WV, PA, GA
• “School Employees Sue Cyberbullying
Students” – TX, PA
A Tangled Mobile Web
Common Types of Incidents
• Employment Issues
• Harassment/Hostile Work Environment
• Disciplinary Issues

• Student Misconduct
• Cyberbullying & Cyberharassment
• Sexting

• Teacher/Student Misconduct
• Student Attacks on Teachers
• Inappropriate Relationships
E-Evidence Is Everywhere
• Inventory Possible Devices
•
•
•

Computers (Desktops, Laptops, Servers)
Mobile Devices (Phones, Tablets)
Peripherals (USBs, CDs, external drives, etc.)

• Inventory Possible Types of Data
•
•
•
•
•
•

Communication (E-Mail, IMs, Texts, etc.)
Social Media (Facebook, Twitter, etc.)
Web Activity (URLs, cookies, bookmarks, etc.)
Network Logs and Access Data
Cloud Storage (Dropbox, Flickr, Boxy, etc.)
Deleted Data
Whose Data Is It Anyway?
• Where Did the Incident Occur?
•
•

On-Campus vs. Off-Campus
Zone of District Responsibility Is Growing

• Who Owns and Uses the Device?
•
•

Misconduct Using School-Owned Equipment
Misconduct Using Privately-Owned Equipment

• Who Runs the Service?
•
•
•

Evidence Hosted by District
Evidence Created by Teachers/Students
Evidence Hosted by 3rd Parties
Pre-Incident Preparation
• Policies and Procedures
•
•
•

District Decisions re Access, Services, Storage
AUPs for Staff and Students
Data Handling and Response Protocols

• Professional Development for Teachers
and Staff
•
•
•

Typically First Responders
Potential Legal Risks
Technology Is Continually Changing

• Student Education
•

Critical Component of K-12 Curricula
Preparing for the Inevitable
Training, Education, and Prof. Dev.
Follow Established Procedures
Involve Law Enforcement ASAP
Protect and Preserve Data
Hire Computer Forensics Expert?
Consider Privacy Implications of
Discovery Requests
• Some Evidence Is Radioactive
•
•
•
•
•
•
Risks for Admins. & Teachers
• Good Intentions, Bad Outcome
• “Sherlock Holmes” Syndrome
• Forwarding Content for Advice

• The Cover-Up Is Always Worse
• Trying to Protect Colleagues and Friends
• Desire to Protect District by Handling InHouse
• “Delete” Is a Myth
A Cautionary Tale
• Ting-Yi Oei, now 64
• Assistant Principal at
Freedom HS in So. Riding,
VA (Loudoun County)
• Told to investigate rumors
of sexting at HS
• “Inappropriate” image
was forwarded to Oei’s
cellphone, then computer
• Charged with “failure to
report,” then contributing
to delinquency of a minor
• Charges ultimately
dismissed
Computer Forensics 101
• Field Previews
• Acquisition & Mirror Images
• Some Data Are More Fragile Than
Others
• Speed Is Of the Essence
• Powerful Forensics Tools
• Data Recovery and Analysis
• IP Addresses Link to Real World
• 4th Amendment and Privacy
Concerns
Current Projects
• Cybertraps for Educators (2014)
• Safe Student and School Employee
Relationships (2014)
• Cybertraps.wordpress.com
• CPCaseDigest.com
• MessageSafe.com
• Informational Web Sites:
• www.FrederickLane.com
• www.ComputerForensicsDigest.com
• www.CybertrapsfortheYoung.com
Contact Information
• E-Mail:
• FSLane3@gmail.com

• Telephone:
• 802-318-4604

• Twitter
• @Cybertraps, @FSL3

• LinkedIn:
• www.linkedin.com/in/fredericklane/

• SlideShare.net
• www.slideshare.net/FSL3
Avoiding Cybertraps
Incident Response, Computer Forensics,
and Risk Management

Frederick S. Lane
Southern California Schools JPA
Temecula, CA
28 October 2013
www.FrederickLane.com

www.ComputerForensicsDigest.com

Weitere ähnliche Inhalte

Was ist angesagt?

Texting, Tweeting, Teens, and Teachers
Texting, Tweeting, Teens, and TeachersTexting, Tweeting, Teens, and Teachers
Texting, Tweeting, Teens, and TeachersFrederick Lane
 
2010-09-09 The World-Wide Bathroom Wall
2010-09-09 The World-Wide Bathroom Wall2010-09-09 The World-Wide Bathroom Wall
2010-09-09 The World-Wide Bathroom WallFrederick Lane
 
2014-04-08 The Secret Life of Teens: The Myths of Anonymity and Deletion
2014-04-08 The Secret Life of Teens: The Myths of Anonymity and Deletion2014-04-08 The Secret Life of Teens: The Myths of Anonymity and Deletion
2014-04-08 The Secret Life of Teens: The Myths of Anonymity and DeletionFrederick Lane
 
Stem december 10
Stem december 10Stem december 10
Stem december 10David Harms
 
Paperless classroom bgsu october 2013 (1)
Paperless classroom bgsu october 2013 (1)Paperless classroom bgsu october 2013 (1)
Paperless classroom bgsu october 2013 (1)David Harms
 
Ohio Center for Law-Related Education Conference sept 2013
Ohio Center for Law-Related Education Conference sept 2013Ohio Center for Law-Related Education Conference sept 2013
Ohio Center for Law-Related Education Conference sept 2013David Harms
 
Paperless classroom create 2013
Paperless classroom create 2013Paperless classroom create 2013
Paperless classroom create 2013David Harms
 
OCSS Integrating Flipped Technologies in Social Studies
OCSS Integrating Flipped Technologies in Social StudiesOCSS Integrating Flipped Technologies in Social Studies
OCSS Integrating Flipped Technologies in Social StudiesDavid Harms
 
Cyberbully presentation
Cyberbully presentationCyberbully presentation
Cyberbully presentationYuming Peng
 
Cyberbully presentation
Cyberbully presentationCyberbully presentation
Cyberbully presentationYuming Peng
 
Dissertation findings presentation march 2013
Dissertation findings presentation march 2013Dissertation findings presentation march 2013
Dissertation findings presentation march 2013Lori Franklin
 
The Top Five Legal Pitfalls of Social Media for School Districts
The Top Five Legal Pitfalls of Social Media for School DistrictsThe Top Five Legal Pitfalls of Social Media for School Districts
The Top Five Legal Pitfalls of Social Media for School DistrictsDiana Benner
 
4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLE4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLEJonathan Ezor
 
Cyberbullying in the Middle Years
Cyberbullying in the Middle YearsCyberbullying in the Middle Years
Cyberbullying in the Middle Yearselketeaches
 
Legal PD - Cyberbullying
Legal PD - CyberbullyingLegal PD - Cyberbullying
Legal PD - Cyberbullyingjgrosenthal
 
2011-04-09 There's No Such Thing as Safe "Sext"
2011-04-09 There's No Such Thing as Safe "Sext"2011-04-09 There's No Such Thing as Safe "Sext"
2011-04-09 There's No Such Thing as Safe "Sext"Frederick Lane
 

Was ist angesagt? (20)

Texting, Tweeting, Teens, and Teachers
Texting, Tweeting, Teens, and TeachersTexting, Tweeting, Teens, and Teachers
Texting, Tweeting, Teens, and Teachers
 
2010-09-09 The World-Wide Bathroom Wall
2010-09-09 The World-Wide Bathroom Wall2010-09-09 The World-Wide Bathroom Wall
2010-09-09 The World-Wide Bathroom Wall
 
2014-04-08 The Secret Life of Teens: The Myths of Anonymity and Deletion
2014-04-08 The Secret Life of Teens: The Myths of Anonymity and Deletion2014-04-08 The Secret Life of Teens: The Myths of Anonymity and Deletion
2014-04-08 The Secret Life of Teens: The Myths of Anonymity and Deletion
 
Stem december 10
Stem december 10Stem december 10
Stem december 10
 
Paperless classroom bgsu october 2013 (1)
Paperless classroom bgsu october 2013 (1)Paperless classroom bgsu october 2013 (1)
Paperless classroom bgsu october 2013 (1)
 
Ohio Center for Law-Related Education Conference sept 2013
Ohio Center for Law-Related Education Conference sept 2013Ohio Center for Law-Related Education Conference sept 2013
Ohio Center for Law-Related Education Conference sept 2013
 
Paperless classroom create 2013
Paperless classroom create 2013Paperless classroom create 2013
Paperless classroom create 2013
 
OCSS Integrating Flipped Technologies in Social Studies
OCSS Integrating Flipped Technologies in Social StudiesOCSS Integrating Flipped Technologies in Social Studies
OCSS Integrating Flipped Technologies in Social Studies
 
Cyberbully presentation
Cyberbully presentationCyberbully presentation
Cyberbully presentation
 
Cyberbully presentation
Cyberbully presentationCyberbully presentation
Cyberbully presentation
 
Dissertation findings presentation march 2013
Dissertation findings presentation march 2013Dissertation findings presentation march 2013
Dissertation findings presentation march 2013
 
The technology edge
The technology edgeThe technology edge
The technology edge
 
The Top Five Legal Pitfalls of Social Media for School Districts
The Top Five Legal Pitfalls of Social Media for School DistrictsThe Top Five Legal Pitfalls of Social Media for School Districts
The Top Five Legal Pitfalls of Social Media for School Districts
 
"How Do [They] Even Do That?" Myths and Facts About the Impact of Technology ...
"How Do [They] Even Do That?" Myths and Facts About the Impact of Technology ..."How Do [They] Even Do That?" Myths and Facts About the Impact of Technology ...
"How Do [They] Even Do That?" Myths and Facts About the Impact of Technology ...
 
4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLE4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLE
 
Cyberbullying in the Middle Years
Cyberbullying in the Middle YearsCyberbullying in the Middle Years
Cyberbullying in the Middle Years
 
Legal PD - Cyberbullying
Legal PD - CyberbullyingLegal PD - Cyberbullying
Legal PD - Cyberbullying
 
Computer Science
Computer Science Computer Science
Computer Science
 
2011-04-09 There's No Such Thing as Safe "Sext"
2011-04-09 There's No Such Thing as Safe "Sext"2011-04-09 There's No Such Thing as Safe "Sext"
2011-04-09 There's No Such Thing as Safe "Sext"
 
Changes to literacy efl-june 13.pptx
Changes to literacy efl-june 13.pptxChanges to literacy efl-june 13.pptx
Changes to literacy efl-june 13.pptx
 

Andere mochten auch

2014-11-06 Texting, Tweeting, Teens, and Teachers
2014-11-06 Texting, Tweeting, Teens, and Teachers2014-11-06 Texting, Tweeting, Teens, and Teachers
2014-11-06 Texting, Tweeting, Teens, and TeachersFrederick Lane
 
2014-08-07 iParentSmart
2014-08-07 iParentSmart2014-08-07 iParentSmart
2014-08-07 iParentSmartFrederick Lane
 
2011 02-17 cybertraps for law students and young lawyers
2011 02-17 cybertraps for law students and young lawyers2011 02-17 cybertraps for law students and young lawyers
2011 02-17 cybertraps for law students and young lawyersFrederick Lane
 
2011-06-23 Privacy, Anonymity, and Intellectual Freedom in the Facebook Era
2011-06-23 Privacy, Anonymity, and Intellectual Freedom in the Facebook Era2011-06-23 Privacy, Anonymity, and Intellectual Freedom in the Facebook Era
2011-06-23 Privacy, Anonymity, and Intellectual Freedom in the Facebook EraFrederick Lane
 
2010-10-29 Can You See Me Now?
2010-10-29 Can You See Me Now?2010-10-29 Can You See Me Now?
2010-10-29 Can You See Me Now?Frederick Lane
 
2016-02-23 Little Swipers
2016-02-23 Little Swipers2016-02-23 Little Swipers
2016-02-23 Little SwipersFrederick Lane
 
2015-02-23 Cybertraps for the Young
2015-02-23 Cybertraps for the Young2015-02-23 Cybertraps for the Young
2015-02-23 Cybertraps for the YoungFrederick Lane
 
2015-11-11 Cybertraps for Educators [webinar]
2015-11-11 Cybertraps for Educators [webinar]2015-11-11 Cybertraps for Educators [webinar]
2015-11-11 Cybertraps for Educators [webinar]Frederick Lane
 
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...Frederick Lane
 
2010-07-28 Can You See Me Now?
2010-07-28 Can You See Me Now?2010-07-28 Can You See Me Now?
2010-07-28 Can You See Me Now?Frederick Lane
 
2015-10-30 Minimizing the Risk of Cybertraps for Educators
2015-10-30 Minimizing the Risk of Cybertraps for Educators2015-10-30 Minimizing the Risk of Cybertraps for Educators
2015-10-30 Minimizing the Risk of Cybertraps for EducatorsFrederick Lane
 
2015-09-17 To Serve & Inspect: Digital Challenges for School Resource Officers
2015-09-17 To Serve & Inspect: Digital Challenges for School Resource Officers2015-09-17 To Serve & Inspect: Digital Challenges for School Resource Officers
2015-09-17 To Serve & Inspect: Digital Challenges for School Resource OfficersFrederick Lane
 
2015-09-16 Social Media and Emerging Applications: Investigative Potential an...
2015-09-16 Social Media and Emerging Applications: Investigative Potential an...2015-09-16 Social Media and Emerging Applications: Investigative Potential an...
2015-09-16 Social Media and Emerging Applications: Investigative Potential an...Frederick Lane
 
2015-02-24 Cybertraps for Educators
2015-02-24 Cybertraps for Educators2015-02-24 Cybertraps for Educators
2015-02-24 Cybertraps for EducatorsFrederick Lane
 
The Court and the Cross: Understanding the Separation of Church and State in ...
The Court and the Cross: Understanding the Separation of Church and State in ...The Court and the Cross: Understanding the Separation of Church and State in ...
The Court and the Cross: Understanding the Separation of Church and State in ...Frederick Lane
 
2016-02-16 Cybertraps for the Young: Four Questions for Parents
2016-02-16 Cybertraps for the Young: Four Questions for Parents2016-02-16 Cybertraps for the Young: Four Questions for Parents
2016-02-16 Cybertraps for the Young: Four Questions for ParentsFrederick Lane
 
2014-07-08 Digital Citizenship Curricula, K-12
2014-07-08 Digital Citizenship Curricula, K-122014-07-08 Digital Citizenship Curricula, K-12
2014-07-08 Digital Citizenship Curricula, K-12Frederick Lane
 
2014-07-08 Social Media Guidelines for Educators
2014-07-08 Social Media Guidelines for Educators2014-07-08 Social Media Guidelines for Educators
2014-07-08 Social Media Guidelines for EducatorsFrederick Lane
 
American Privacy: The 400-Year History of Our Most Contested Right
American Privacy: The 400-Year History of Our Most Contested RightAmerican Privacy: The 400-Year History of Our Most Contested Right
American Privacy: The 400-Year History of Our Most Contested RightFrederick Lane
 
2014-06-10 Educator Ethics [NASDTEC]
2014-06-10 Educator Ethics [NASDTEC]2014-06-10 Educator Ethics [NASDTEC]
2014-06-10 Educator Ethics [NASDTEC]Frederick Lane
 

Andere mochten auch (20)

2014-11-06 Texting, Tweeting, Teens, and Teachers
2014-11-06 Texting, Tweeting, Teens, and Teachers2014-11-06 Texting, Tweeting, Teens, and Teachers
2014-11-06 Texting, Tweeting, Teens, and Teachers
 
2014-08-07 iParentSmart
2014-08-07 iParentSmart2014-08-07 iParentSmart
2014-08-07 iParentSmart
 
2011 02-17 cybertraps for law students and young lawyers
2011 02-17 cybertraps for law students and young lawyers2011 02-17 cybertraps for law students and young lawyers
2011 02-17 cybertraps for law students and young lawyers
 
2011-06-23 Privacy, Anonymity, and Intellectual Freedom in the Facebook Era
2011-06-23 Privacy, Anonymity, and Intellectual Freedom in the Facebook Era2011-06-23 Privacy, Anonymity, and Intellectual Freedom in the Facebook Era
2011-06-23 Privacy, Anonymity, and Intellectual Freedom in the Facebook Era
 
2010-10-29 Can You See Me Now?
2010-10-29 Can You See Me Now?2010-10-29 Can You See Me Now?
2010-10-29 Can You See Me Now?
 
2016-02-23 Little Swipers
2016-02-23 Little Swipers2016-02-23 Little Swipers
2016-02-23 Little Swipers
 
2015-02-23 Cybertraps for the Young
2015-02-23 Cybertraps for the Young2015-02-23 Cybertraps for the Young
2015-02-23 Cybertraps for the Young
 
2015-11-11 Cybertraps for Educators [webinar]
2015-11-11 Cybertraps for Educators [webinar]2015-11-11 Cybertraps for Educators [webinar]
2015-11-11 Cybertraps for Educators [webinar]
 
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
2014-08-28 AAA* Approach to Financial Forensics: Anticipation, Acquisition, A...
 
2010-07-28 Can You See Me Now?
2010-07-28 Can You See Me Now?2010-07-28 Can You See Me Now?
2010-07-28 Can You See Me Now?
 
2015-10-30 Minimizing the Risk of Cybertraps for Educators
2015-10-30 Minimizing the Risk of Cybertraps for Educators2015-10-30 Minimizing the Risk of Cybertraps for Educators
2015-10-30 Minimizing the Risk of Cybertraps for Educators
 
2015-09-17 To Serve & Inspect: Digital Challenges for School Resource Officers
2015-09-17 To Serve & Inspect: Digital Challenges for School Resource Officers2015-09-17 To Serve & Inspect: Digital Challenges for School Resource Officers
2015-09-17 To Serve & Inspect: Digital Challenges for School Resource Officers
 
2015-09-16 Social Media and Emerging Applications: Investigative Potential an...
2015-09-16 Social Media and Emerging Applications: Investigative Potential an...2015-09-16 Social Media and Emerging Applications: Investigative Potential an...
2015-09-16 Social Media and Emerging Applications: Investigative Potential an...
 
2015-02-24 Cybertraps for Educators
2015-02-24 Cybertraps for Educators2015-02-24 Cybertraps for Educators
2015-02-24 Cybertraps for Educators
 
The Court and the Cross: Understanding the Separation of Church and State in ...
The Court and the Cross: Understanding the Separation of Church and State in ...The Court and the Cross: Understanding the Separation of Church and State in ...
The Court and the Cross: Understanding the Separation of Church and State in ...
 
2016-02-16 Cybertraps for the Young: Four Questions for Parents
2016-02-16 Cybertraps for the Young: Four Questions for Parents2016-02-16 Cybertraps for the Young: Four Questions for Parents
2016-02-16 Cybertraps for the Young: Four Questions for Parents
 
2014-07-08 Digital Citizenship Curricula, K-12
2014-07-08 Digital Citizenship Curricula, K-122014-07-08 Digital Citizenship Curricula, K-12
2014-07-08 Digital Citizenship Curricula, K-12
 
2014-07-08 Social Media Guidelines for Educators
2014-07-08 Social Media Guidelines for Educators2014-07-08 Social Media Guidelines for Educators
2014-07-08 Social Media Guidelines for Educators
 
American Privacy: The 400-Year History of Our Most Contested Right
American Privacy: The 400-Year History of Our Most Contested RightAmerican Privacy: The 400-Year History of Our Most Contested Right
American Privacy: The 400-Year History of Our Most Contested Right
 
2014-06-10 Educator Ethics [NASDTEC]
2014-06-10 Educator Ethics [NASDTEC]2014-06-10 Educator Ethics [NASDTEC]
2014-06-10 Educator Ethics [NASDTEC]
 

Ähnlich wie Avoiding Cybertraps

Electronic Security Issues for Schools
Electronic Security Issues for SchoolsElectronic Security Issues for Schools
Electronic Security Issues for SchoolsBrett Napier, MBA
 
Ethics Update for School Counselors
Ethics Update for School CounselorsEthics Update for School Counselors
Ethics Update for School CounselorsJohn Gavazzi
 
2015-08-19 Cyberethics for Educators
2015-08-19 Cyberethics for Educators2015-08-19 Cyberethics for Educators
2015-08-19 Cyberethics for EducatorsFrederick Lane
 
Cyberbullying-jf
Cyberbullying-jfCyberbullying-jf
Cyberbullying-jfJohn Field
 
Protecting the Flock | IntroDUCKtion 2017
Protecting the Flock | IntroDUCKtion 2017Protecting the Flock | IntroDUCKtion 2017
Protecting the Flock | IntroDUCKtion 2017Abigail Mizera
 
NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014emilyensign
 
A Multidisciplinary Approach to​ Child Pornography on the Internet: Impact on...
A Multidisciplinary Approach to​ Child Pornography on the Internet: Impact on...A Multidisciplinary Approach to​ Child Pornography on the Internet: Impact on...
A Multidisciplinary Approach to​ Child Pornography on the Internet: Impact on...James Marsh
 
Parental Awareness of Cyber Bullying
Parental Awareness of Cyber BullyingParental Awareness of Cyber Bullying
Parental Awareness of Cyber BullyingFallan Butler
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trElmer Sunga
 
2014-08-27 Cybertraps for the Young
2014-08-27 Cybertraps for the Young2014-08-27 Cybertraps for the Young
2014-08-27 Cybertraps for the YoungFrederick Lane
 
The role of education in reducing recidivism
The role of education in reducing recidivismThe role of education in reducing recidivism
The role of education in reducing recidivismHelen Farley
 
2015-09-21 Cyberethics for Educators: The Rising Cost of Digital Misconduct
2015-09-21 Cyberethics for Educators: The Rising Cost of Digital Misconduct2015-09-21 Cyberethics for Educators: The Rising Cost of Digital Misconduct
2015-09-21 Cyberethics for Educators: The Rising Cost of Digital MisconductFrederick Lane
 
Filters firstamendmenttla2011 final
Filters firstamendmenttla2011 finalFilters firstamendmenttla2011 final
Filters firstamendmenttla2011 finalLea Bailey
 
Our role in retention
Our role in retentionOur role in retention
Our role in retentionkepickens
 
Best practice in test security
Best practice in test securityBest practice in test security
Best practice in test securitymstock18494
 
When a Closer Look at Potential Collusion Becomes Necessary
When a Closer Look at Potential Collusion Becomes NecessaryWhen a Closer Look at Potential Collusion Becomes Necessary
When a Closer Look at Potential Collusion Becomes NecessaryExamSoft
 
Learning from Mistakes: Strengthening Youth Safety with Research-Based Screen...
Learning from Mistakes: Strengthening Youth Safety with Research-Based Screen...Learning from Mistakes: Strengthening Youth Safety with Research-Based Screen...
Learning from Mistakes: Strengthening Youth Safety with Research-Based Screen...Friends for Youth, Inc.
 
Bully presentation family_meeting_final
Bully presentation family_meeting_finalBully presentation family_meeting_final
Bully presentation family_meeting_finalJake Boula
 
Keeping learners safe online presentation
Keeping learners safe online presentationKeeping learners safe online presentation
Keeping learners safe online presentationJisc
 

Ähnlich wie Avoiding Cybertraps (20)

Electronic Security Issues for Schools
Electronic Security Issues for SchoolsElectronic Security Issues for Schools
Electronic Security Issues for Schools
 
Ethics Update for School Counselors
Ethics Update for School CounselorsEthics Update for School Counselors
Ethics Update for School Counselors
 
Ethics Update for School Counselors
Ethics Update for School CounselorsEthics Update for School Counselors
Ethics Update for School Counselors
 
2015-08-19 Cyberethics for Educators
2015-08-19 Cyberethics for Educators2015-08-19 Cyberethics for Educators
2015-08-19 Cyberethics for Educators
 
Cyberbullying-jf
Cyberbullying-jfCyberbullying-jf
Cyberbullying-jf
 
Protecting the Flock | IntroDUCKtion 2017
Protecting the Flock | IntroDUCKtion 2017Protecting the Flock | IntroDUCKtion 2017
Protecting the Flock | IntroDUCKtion 2017
 
NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014
 
A Multidisciplinary Approach to​ Child Pornography on the Internet: Impact on...
A Multidisciplinary Approach to​ Child Pornography on the Internet: Impact on...A Multidisciplinary Approach to​ Child Pornography on the Internet: Impact on...
A Multidisciplinary Approach to​ Child Pornography on the Internet: Impact on...
 
Parental Awareness of Cyber Bullying
Parental Awareness of Cyber BullyingParental Awareness of Cyber Bullying
Parental Awareness of Cyber Bullying
 
Craig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-trCraig miami cyberbullyingnov2008-tr
Craig miami cyberbullyingnov2008-tr
 
2014-08-27 Cybertraps for the Young
2014-08-27 Cybertraps for the Young2014-08-27 Cybertraps for the Young
2014-08-27 Cybertraps for the Young
 
The role of education in reducing recidivism
The role of education in reducing recidivismThe role of education in reducing recidivism
The role of education in reducing recidivism
 
2015-09-21 Cyberethics for Educators: The Rising Cost of Digital Misconduct
2015-09-21 Cyberethics for Educators: The Rising Cost of Digital Misconduct2015-09-21 Cyberethics for Educators: The Rising Cost of Digital Misconduct
2015-09-21 Cyberethics for Educators: The Rising Cost of Digital Misconduct
 
Filters firstamendmenttla2011 final
Filters firstamendmenttla2011 finalFilters firstamendmenttla2011 final
Filters firstamendmenttla2011 final
 
Our role in retention
Our role in retentionOur role in retention
Our role in retention
 
Best practice in test security
Best practice in test securityBest practice in test security
Best practice in test security
 
When a Closer Look at Potential Collusion Becomes Necessary
When a Closer Look at Potential Collusion Becomes NecessaryWhen a Closer Look at Potential Collusion Becomes Necessary
When a Closer Look at Potential Collusion Becomes Necessary
 
Learning from Mistakes: Strengthening Youth Safety with Research-Based Screen...
Learning from Mistakes: Strengthening Youth Safety with Research-Based Screen...Learning from Mistakes: Strengthening Youth Safety with Research-Based Screen...
Learning from Mistakes: Strengthening Youth Safety with Research-Based Screen...
 
Bully presentation family_meeting_final
Bully presentation family_meeting_finalBully presentation family_meeting_final
Bully presentation family_meeting_final
 
Keeping learners safe online presentation
Keeping learners safe online presentationKeeping learners safe online presentation
Keeping learners safe online presentation
 

Mehr von Frederick Lane

2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical EducatorFrederick Lane
 
2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for EducatorsFrederick Lane
 
2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of CybersecurityFrederick Lane
 
2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech DirectorsFrederick Lane
 
2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital MobFrederick Lane
 
2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational ToolFrederick Lane
 
2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social MediaFrederick Lane
 
2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for EducatorsFrederick Lane
 
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and ProfessionalFrederick Lane
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective TeachersFrederick Lane
 
2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEEFrederick Lane
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective TeachersFrederick Lane
 
2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?Frederick Lane
 
2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR ProfessionalsFrederick Lane
 
2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEEFrederick Lane
 
2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective TeachersFrederick Lane
 
2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEEFrederick Lane
 
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...Frederick Lane
 
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & CybersecurityFrederick Lane
 
2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get CaughtFrederick Lane
 

Mehr von Frederick Lane (20)

2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator
 
2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators
 
2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity
 
2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors
 
2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob
 
2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool
 
2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media
 
2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators
 
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
 
2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
 
2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?
 
2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals
 
2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE
 
2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers
 
2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE
 
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
 
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
 
2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught
 

Kürzlich hochgeladen

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Kürzlich hochgeladen (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Avoiding Cybertraps

  • 1. Avoiding Cybertraps Incident Response, Computer Forensics, and Risk Management Frederick S. Lane Southern California Schools JPA Temecula, CA 28 October 2013 www.FrederickLane.com www.ComputerForensicsDigest.com
  • 2. Background and Expertise • Attorney and Author of 7 Books • Computer Forensics Expert -- 15 years • Over 100 criminal cases • Lecturer on ComputerRelated Topics – 20+ years • Computer user (midframes, desktops, laptops) – 35+ years • 10 yrs on Burlington VT School Board
  • 3. Lecture Overview Headache-Inducing Headlines Common Types of Incidents Electronic Evidence Is Everywhere Preparing for the Inevitable Risks for Administrators and Teachers • A Quick Intro to Computer Forensics • • • • •
  • 4. Headache-Inducing Headlines • “Parents Sue School District After Their 13-Year-Old's Suicide Following Sexting Bullying” – Hillsborough Cty., Florida • “Parents sue Lockhart school district after teacher charged with sexual assault” – Lockhart, TX • “School Cyberbullying Victims Fight Back In Lawsuits” – WV, PA, GA • “School Employees Sue Cyberbullying Students” – TX, PA
  • 6. Common Types of Incidents • Employment Issues • Harassment/Hostile Work Environment • Disciplinary Issues • Student Misconduct • Cyberbullying & Cyberharassment • Sexting • Teacher/Student Misconduct • Student Attacks on Teachers • Inappropriate Relationships
  • 7. E-Evidence Is Everywhere • Inventory Possible Devices • • • Computers (Desktops, Laptops, Servers) Mobile Devices (Phones, Tablets) Peripherals (USBs, CDs, external drives, etc.) • Inventory Possible Types of Data • • • • • • Communication (E-Mail, IMs, Texts, etc.) Social Media (Facebook, Twitter, etc.) Web Activity (URLs, cookies, bookmarks, etc.) Network Logs and Access Data Cloud Storage (Dropbox, Flickr, Boxy, etc.) Deleted Data
  • 8. Whose Data Is It Anyway? • Where Did the Incident Occur? • • On-Campus vs. Off-Campus Zone of District Responsibility Is Growing • Who Owns and Uses the Device? • • Misconduct Using School-Owned Equipment Misconduct Using Privately-Owned Equipment • Who Runs the Service? • • • Evidence Hosted by District Evidence Created by Teachers/Students Evidence Hosted by 3rd Parties
  • 9. Pre-Incident Preparation • Policies and Procedures • • • District Decisions re Access, Services, Storage AUPs for Staff and Students Data Handling and Response Protocols • Professional Development for Teachers and Staff • • • Typically First Responders Potential Legal Risks Technology Is Continually Changing • Student Education • Critical Component of K-12 Curricula
  • 10. Preparing for the Inevitable Training, Education, and Prof. Dev. Follow Established Procedures Involve Law Enforcement ASAP Protect and Preserve Data Hire Computer Forensics Expert? Consider Privacy Implications of Discovery Requests • Some Evidence Is Radioactive • • • • • •
  • 11. Risks for Admins. & Teachers • Good Intentions, Bad Outcome • “Sherlock Holmes” Syndrome • Forwarding Content for Advice • The Cover-Up Is Always Worse • Trying to Protect Colleagues and Friends • Desire to Protect District by Handling InHouse • “Delete” Is a Myth
  • 12. A Cautionary Tale • Ting-Yi Oei, now 64 • Assistant Principal at Freedom HS in So. Riding, VA (Loudoun County) • Told to investigate rumors of sexting at HS • “Inappropriate” image was forwarded to Oei’s cellphone, then computer • Charged with “failure to report,” then contributing to delinquency of a minor • Charges ultimately dismissed
  • 13. Computer Forensics 101 • Field Previews • Acquisition & Mirror Images • Some Data Are More Fragile Than Others • Speed Is Of the Essence • Powerful Forensics Tools • Data Recovery and Analysis • IP Addresses Link to Real World • 4th Amendment and Privacy Concerns
  • 14. Current Projects • Cybertraps for Educators (2014) • Safe Student and School Employee Relationships (2014) • Cybertraps.wordpress.com • CPCaseDigest.com • MessageSafe.com • Informational Web Sites: • www.FrederickLane.com • www.ComputerForensicsDigest.com • www.CybertrapsfortheYoung.com
  • 15. Contact Information • E-Mail: • FSLane3@gmail.com • Telephone: • 802-318-4604 • Twitter • @Cybertraps, @FSL3 • LinkedIn: • www.linkedin.com/in/fredericklane/ • SlideShare.net • www.slideshare.net/FSL3
  • 16. Avoiding Cybertraps Incident Response, Computer Forensics, and Risk Management Frederick S. Lane Southern California Schools JPA Temecula, CA 28 October 2013 www.FrederickLane.com www.ComputerForensicsDigest.com