Avoiding Cybertraps
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

Avoiding Cybertraps

on

  • 569 views

A presentation for the Southern California Schools Joint Powers Authority on how to avoid common cybertraps, including cyberbullying, sexting, teacher misconduct, etc.

A presentation for the Southern California Schools Joint Powers Authority on how to avoid common cybertraps, including cyberbullying, sexting, teacher misconduct, etc.

Statistics

Views

Total Views
569
Views on SlideShare
567
Embed Views
2

Actions

Likes
0
Downloads
2
Comments
0

1 Embed 2

https://twitter.com 2

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Avoiding Cybertraps Presentation Transcript

  • 1. Avoiding Cybertraps Incident Response, Computer Forensics, and Risk Management Frederick S. Lane Southern California Schools JPA Temecula, CA 28 October 2013 www.FrederickLane.com www.ComputerForensicsDigest.com
  • 2. Background and Expertise • Attorney and Author of 7 Books • Computer Forensics Expert -- 15 years • Over 100 criminal cases • Lecturer on ComputerRelated Topics – 20+ years • Computer user (midframes, desktops, laptops) – 35+ years • 10 yrs on Burlington VT School Board
  • 3. Lecture Overview Headache-Inducing Headlines Common Types of Incidents Electronic Evidence Is Everywhere Preparing for the Inevitable Risks for Administrators and Teachers • A Quick Intro to Computer Forensics • • • • •
  • 4. Headache-Inducing Headlines • “Parents Sue School District After Their 13-Year-Old's Suicide Following Sexting Bullying” – Hillsborough Cty., Florida • “Parents sue Lockhart school district after teacher charged with sexual assault” – Lockhart, TX • “School Cyberbullying Victims Fight Back In Lawsuits” – WV, PA, GA • “School Employees Sue Cyberbullying Students” – TX, PA
  • 5. A Tangled Mobile Web
  • 6. Common Types of Incidents • Employment Issues • Harassment/Hostile Work Environment • Disciplinary Issues • Student Misconduct • Cyberbullying & Cyberharassment • Sexting • Teacher/Student Misconduct • Student Attacks on Teachers • Inappropriate Relationships
  • 7. E-Evidence Is Everywhere • Inventory Possible Devices • • • Computers (Desktops, Laptops, Servers) Mobile Devices (Phones, Tablets) Peripherals (USBs, CDs, external drives, etc.) • Inventory Possible Types of Data • • • • • • Communication (E-Mail, IMs, Texts, etc.) Social Media (Facebook, Twitter, etc.) Web Activity (URLs, cookies, bookmarks, etc.) Network Logs and Access Data Cloud Storage (Dropbox, Flickr, Boxy, etc.) Deleted Data
  • 8. Whose Data Is It Anyway? • Where Did the Incident Occur? • • On-Campus vs. Off-Campus Zone of District Responsibility Is Growing • Who Owns and Uses the Device? • • Misconduct Using School-Owned Equipment Misconduct Using Privately-Owned Equipment • Who Runs the Service? • • • Evidence Hosted by District Evidence Created by Teachers/Students Evidence Hosted by 3rd Parties
  • 9. Pre-Incident Preparation • Policies and Procedures • • • District Decisions re Access, Services, Storage AUPs for Staff and Students Data Handling and Response Protocols • Professional Development for Teachers and Staff • • • Typically First Responders Potential Legal Risks Technology Is Continually Changing • Student Education • Critical Component of K-12 Curricula
  • 10. Preparing for the Inevitable Training, Education, and Prof. Dev. Follow Established Procedures Involve Law Enforcement ASAP Protect and Preserve Data Hire Computer Forensics Expert? Consider Privacy Implications of Discovery Requests • Some Evidence Is Radioactive • • • • • •
  • 11. Risks for Admins. & Teachers • Good Intentions, Bad Outcome • “Sherlock Holmes” Syndrome • Forwarding Content for Advice • The Cover-Up Is Always Worse • Trying to Protect Colleagues and Friends • Desire to Protect District by Handling InHouse • “Delete” Is a Myth
  • 12. A Cautionary Tale • Ting-Yi Oei, now 64 • Assistant Principal at Freedom HS in So. Riding, VA (Loudoun County) • Told to investigate rumors of sexting at HS • “Inappropriate” image was forwarded to Oei’s cellphone, then computer • Charged with “failure to report,” then contributing to delinquency of a minor • Charges ultimately dismissed
  • 13. Computer Forensics 101 • Field Previews • Acquisition & Mirror Images • Some Data Are More Fragile Than Others • Speed Is Of the Essence • Powerful Forensics Tools • Data Recovery and Analysis • IP Addresses Link to Real World • 4th Amendment and Privacy Concerns
  • 14. Current Projects • Cybertraps for Educators (2014) • Safe Student and School Employee Relationships (2014) • Cybertraps.wordpress.com • CPCaseDigest.com • MessageSafe.com • Informational Web Sites: • www.FrederickLane.com • www.ComputerForensicsDigest.com • www.CybertrapsfortheYoung.com
  • 15. Contact Information • E-Mail: • FSLane3@gmail.com • Telephone: • 802-318-4604 • Twitter • @Cybertraps, @FSL3 • LinkedIn: • www.linkedin.com/in/fredericklane/ • SlideShare.net • www.slideshare.net/FSL3
  • 16. Avoiding Cybertraps Incident Response, Computer Forensics, and Risk Management Frederick S. Lane Southern California Schools JPA Temecula, CA 28 October 2013 www.FrederickLane.com www.ComputerForensicsDigest.com