1 / 50

Cyber Crimes For the SRO

Cyber Crimes For the SRO. Florida Crime Prevention Training Institute. Remember the Good Ol ’ Days?. Problems we see today. Topics. Recent Trends Home to School Spillover Law Enforcement vs. School Based Discipline Online Dangers Computer and Internet Safety Electronic Crimes

orenda
Download Presentation

Cyber Crimes For the SRO

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Crimes For the SRO Florida Crime Prevention Training Institute

  2. Remember the Good Ol’ Days?

  3. Problems we see today

  4. Topics Recent Trends Home to School Spillover Law Enforcement vs. School Based Discipline Online Dangers Computer and Internet Safety Electronic Crimes Investigative tips Educational and Prevention Resources

  5. The SRO’s Role in Cybercrime

  6. SRO’s Role in Cybercrime Investigate computer and Internet crimes Educate students (prevention) Educate parents

  7. Resources • Snopes.com for hoaxes • SecureFlorida.org for prevention tips

  8. Cell Phones and Texting

  9. Stolen Phones and IPods

  10. Sexting

  11. Sexting

  12. Sexting

  13. Sexting • F.S. 847.0141 • Minor to minor • Nudity • Harmful to minor • Transmits • Possesses • Unless not solicited • Did not retransmit • Reported to guardian, school, LEO • Non-criminal, Misdemeanor, Felony • Can prosecute sexual conduct, excitement • Can prosecute stalking

  14. Cyberstalking

  15. Cyberstalking Cyberstalker: Someone who consistently contacts a person through the internet, regardless of his or her requests for him / her to stop.

  16. Cyberstalking What is it? Florida Statute 784.048: "engaging in a course of conduct to communicate, or to cause to be communicated, words, images, or language by or through the use of electronic mail or electronic communication, directed at a specific person, causing substantial emotional distress to that person and serving no legitimate purpose.

  17. Cyberstalking Electronic Mail or Communications • E-mail • Instant Messaging • Chat rooms • Blogs • Newsgroups • Forums

  18. Cyberstalking Electronic Communications: • Text messaging • Images • Camera phones

  19. Cyberstalking Midemeanor or Felony (2)  Any person who willfully, maliciously, and repeatedly… cyberstalks another person commits the offense of stalking, a misdemeanor of the first degree, (3)  Any person who willfully, maliciously, and repeatedly… cyberstalks another person, and makes a credible threat with the intent to place that person in reasonable fear of death or bodily injury of the person, or the person's child, sibling, spouse, parent, or dependent, commits the offense of aggravated stalking, a felony of the third degree…

  20. Cyberbullying

  21. Jeffrey Johnston Stand Up for All Students Act Bullying or harassment of any student or school employee of a public K-12 educational institution is prohibited: • During any education program or activity conducted by a public K-12 educational institution; • During any school-related or school-sponsored program or activity or on a school bus of a public K-12 educational institution; or • Through the use of computer of a public K-12 educational institution.

  22. What is Bullying? "Bullying" means systematically and chronically inflicting physical hurt or psychological distress on one or more students and may involve:  1.  Teasing;  2.  Social exclusion;  3.  Threat;  4.  Intimidation;  5.  Stalking;  6.  Physical violence;  7.  Theft;  8.  Sexual or racial harassment;  9.  Public humiliation; or 10.  Destruction of property.

  23. What is Harassment? "Harassment" means any threatening, insulting, or dehumanizing gesture, use of data or computer software, or written, verbal, or physical conduct that: • Places a student or school employee in reasonable fear of harm to his or her person or damage to his or her property; • Has the effect of substantially interfering with a student's educational performance, opportunities, or benefits; or • Has the effect of substantially disrupting the orderly operation of a school. • Stalking

  24. Retaliation for reporting an act of bullying or harassment. Reporting an act of bullying or harassment that is not made in good faith is considered retaliation. Conduct with intent to demean, dehumanize, embarrass, or cause physical harm to a student or school employee, by: -Incitement or coercion; -Accessing or providing access to data through a computer within the scope of the district school system… “Bullying" and “Harassment" Include

  25. Crimes Against Computer Sytems

  26. Crimes Against Computers • Malware • Denial of service (DoS) attack • Hacking

  27. Bypassing School Network Security

  28. Bypassing School Network Security • Software • Redirect Websites

  29. You Tube

  30. Identity Theft

  31. ID Theft Tallahassee Democrat Four arrested in thefts of IDs Information taken from teachers' log Four people, including two girls who attended Nims Middle School, were arrested Thursday and charged with stealing the identities of a dozen substitute teachers to pay for phones, clothes, food and toys, a Leon County Sheriff's Office investigator said. Detective Leslie Kitching said one or both of the teenagers apparently shared information from a substitute teacher sign-in book at the school with two adults who shared their home. The four are accused of using the names and Social Security numbers of 12 substitute teachers to make $5,000 worth of purchases, she said.

  32. ID Theft • May occur at school or home • Theft of wallet, purse • Mail theft • Dumpster diving • Shoulder surfing • Malware • Phishing • Vishing • Child ID theft

  33. Craigslist and E-Bay

  34. Social Networking Sites

  35. Social Networking SItes

  36. 3 Middle School Students Charged With Conspiracy To Commit Murder

  37. 3 Middle School Students Charged With Conspiracy To Commit Murder Investigators said they first learned of the alleged plot March 5. They said 13-year-old Austin Mohr sent threatening messages through his MySpace.com page, where he was pretending to be a 19-year-old. Investigators said Mohr's anger was directed at two particular students, but also made general threats to lock the cafeteria during lunch and shoot everyone. "Everyone will pay for what they did to me," wrote Mohr, according to investigators, who claimed he was being teased and picked on at school. "They will all die along with me." Mohr sent instant messages to another teen stating, "I will kill every person I see … The massacre will happen soon." A teen who received the messages sent them to a family member. That family member contacted the sheriff's office, who then began an investigation to uncover who was responsible for the messages.

  38. Social Networking SItes

  39. Danny is “looking for a girlfriend”!

  40. “ I like poetry, plants, flowers and the perfect night would be cuddling by the fireplace watching a movie.”

  41. Hey! There’s Danny. Surprise! His MySpace page never mentioned he is high-risk sex offender.

  42. Posting Photos Online

  43. Social Photo Sites

  44. Geotagging

  45. On-line Predators

  46. On-line Predators Protect children by: • Locating computer in common area • Keep the computer in a common room in the house, not in your child's bedroom. • Utilize parental controls provided by your service provider and/or blocking software. • Always maintain access to your child's on-line account and randomly check his/her e-mail.

  47. Warning Signs for Parents • You find pornography on your child's computer. • Your child receives phone calls from men you don't know or is making calls, sometimes long distance, to numbers you don't recognize. • Your child receives mail, gifts, or packages from someone you don't know.

  48. Warning Signs for Parents • Your child turns the computer monitor off or quickly changes the screen on the monitor when you come into the room. • Your child is using an on-line account belonging to someone else. • You find the computer password protected. • Your child spends large amounts of time on-line, especially at night.

  49. Contact Information: CrimePreventionHQ.com Jay@CrimePreventionHQ.com

More Related