Avoiding Cybertraps

463 views
376 views

Published on

A presentation for the Southern California Schools Joint Powers Authority on how to avoid common cybertraps, including cyberbullying, sexting, teacher misconduct, etc.

Published in: Technology, Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
463
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Avoiding Cybertraps

  1. 1. Avoiding Cybertraps Incident Response, Computer Forensics, and Risk Management Frederick S. Lane Southern California Schools JPA Temecula, CA 28 October 2013 www.FrederickLane.com www.ComputerForensicsDigest.com
  2. 2. Background and Expertise • Attorney and Author of 7 Books • Computer Forensics Expert -- 15 years • Over 100 criminal cases • Lecturer on ComputerRelated Topics – 20+ years • Computer user (midframes, desktops, laptops) – 35+ years • 10 yrs on Burlington VT School Board
  3. 3. Lecture Overview Headache-Inducing Headlines Common Types of Incidents Electronic Evidence Is Everywhere Preparing for the Inevitable Risks for Administrators and Teachers • A Quick Intro to Computer Forensics • • • • •
  4. 4. Headache-Inducing Headlines • “Parents Sue School District After Their 13-Year-Old's Suicide Following Sexting Bullying” – Hillsborough Cty., Florida • “Parents sue Lockhart school district after teacher charged with sexual assault” – Lockhart, TX • “School Cyberbullying Victims Fight Back In Lawsuits” – WV, PA, GA • “School Employees Sue Cyberbullying Students” – TX, PA
  5. 5. A Tangled Mobile Web
  6. 6. Common Types of Incidents • Employment Issues • Harassment/Hostile Work Environment • Disciplinary Issues • Student Misconduct • Cyberbullying & Cyberharassment • Sexting • Teacher/Student Misconduct • Student Attacks on Teachers • Inappropriate Relationships
  7. 7. E-Evidence Is Everywhere • Inventory Possible Devices • • • Computers (Desktops, Laptops, Servers) Mobile Devices (Phones, Tablets) Peripherals (USBs, CDs, external drives, etc.) • Inventory Possible Types of Data • • • • • • Communication (E-Mail, IMs, Texts, etc.) Social Media (Facebook, Twitter, etc.) Web Activity (URLs, cookies, bookmarks, etc.) Network Logs and Access Data Cloud Storage (Dropbox, Flickr, Boxy, etc.) Deleted Data
  8. 8. Whose Data Is It Anyway? • Where Did the Incident Occur? • • On-Campus vs. Off-Campus Zone of District Responsibility Is Growing • Who Owns and Uses the Device? • • Misconduct Using School-Owned Equipment Misconduct Using Privately-Owned Equipment • Who Runs the Service? • • • Evidence Hosted by District Evidence Created by Teachers/Students Evidence Hosted by 3rd Parties
  9. 9. Pre-Incident Preparation • Policies and Procedures • • • District Decisions re Access, Services, Storage AUPs for Staff and Students Data Handling and Response Protocols • Professional Development for Teachers and Staff • • • Typically First Responders Potential Legal Risks Technology Is Continually Changing • Student Education • Critical Component of K-12 Curricula
  10. 10. Preparing for the Inevitable Training, Education, and Prof. Dev. Follow Established Procedures Involve Law Enforcement ASAP Protect and Preserve Data Hire Computer Forensics Expert? Consider Privacy Implications of Discovery Requests • Some Evidence Is Radioactive • • • • • •
  11. 11. Risks for Admins. & Teachers • Good Intentions, Bad Outcome • “Sherlock Holmes” Syndrome • Forwarding Content for Advice • The Cover-Up Is Always Worse • Trying to Protect Colleagues and Friends • Desire to Protect District by Handling InHouse • “Delete” Is a Myth
  12. 12. A Cautionary Tale • Ting-Yi Oei, now 64 • Assistant Principal at Freedom HS in So. Riding, VA (Loudoun County) • Told to investigate rumors of sexting at HS • “Inappropriate” image was forwarded to Oei’s cellphone, then computer • Charged with “failure to report,” then contributing to delinquency of a minor • Charges ultimately dismissed
  13. 13. Computer Forensics 101 • Field Previews • Acquisition & Mirror Images • Some Data Are More Fragile Than Others • Speed Is Of the Essence • Powerful Forensics Tools • Data Recovery and Analysis • IP Addresses Link to Real World • 4th Amendment and Privacy Concerns
  14. 14. Current Projects • Cybertraps for Educators (2014) • Safe Student and School Employee Relationships (2014) • Cybertraps.wordpress.com • CPCaseDigest.com • MessageSafe.com • Informational Web Sites: • www.FrederickLane.com • www.ComputerForensicsDigest.com • www.CybertrapsfortheYoung.com
  15. 15. Contact Information • E-Mail: • FSLane3@gmail.com • Telephone: • 802-318-4604 • Twitter • @Cybertraps, @FSL3 • LinkedIn: • www.linkedin.com/in/fredericklane/ • SlideShare.net • www.slideshare.net/FSL3
  16. 16. Avoiding Cybertraps Incident Response, Computer Forensics, and Risk Management Frederick S. Lane Southern California Schools JPA Temecula, CA 28 October 2013 www.FrederickLane.com www.ComputerForensicsDigest.com

×