Cyberbullying Investigation/Reporting/ Procedures

2,603 views
2,381 views

Published on

Cyberbullying Investigation/Reporting/ Procedures for School Administrators

Published in: Education, Technology, Design
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,603
On SlideShare
0
From Embeds
0
Number of Embeds
875
Actions
Shares
0
Downloads
0
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide
  • Help from world of computer forensics
  • Things to have ready that will help you
  • Saving Emails with Full HeadersHeaders are all the letters, numbers and symbols that you see either at the top or bottom of emails you have received - if you can't see this information, check out the links below for instructions on how to show headers in your email program. Headers contain information such as the subject, recipient's name and email address, sender's name and email address, and information that can pinpoint the sender's location in the real world.Below is an example of a header from an email. From the header, the company can pinpoint the exact computer that the email was sent from.
  • Cyberbullying Investigation/Reporting/ Procedures

    1. 1. Cyber SafetyInvestigation/Reporting/ProceduresBryan FendleyDirector of Academic ComputingUniversity of Arkansas at Monticello Twitter: @bfend / Web: bryanfendley.com 1
    2. 2. Disclaimer I am not a lawyer, and this is not legal advice Twitter: @bfend / Web: bryanfendley.com 2
    3. 3. Senate Bill 892 Schools shall promptly investigate and report A.C.A. § 6-18-514 (2011), Section D: A school principal or his or her designee who receives a credible report or complaint of bullying shall promptly investigate the complaint or report and make a record of the investigation and any action taken as a result of the investigation. Twitter: @bfend / Web: bryanfendley.com 3
    4. 4. Using Four Basic ForensicsPhases to Launch YourInvestigationAccording to National Institute of Standards and Technology Government Publication 800-86, there are four basic phases in the forensics process: Collection Examination Analysis Reporting Twitter: @bfend / Web: bryanfendley.com 4
    5. 5. Prepare Your Own Cyber BullyIncident Survival Guide1. Incident Tacking Forms2. Decision Trees3. Steps for Preserving Evidence4. Net Lingo Guides and Terms5. Contacts Twitter: @bfend / Web: bryanfendley.com 5
    6. 6. Example Incident Tacking Forms Anonymous Form (pdf) Witness Statement (pdf) Complaint Form (pdf) Cyber Bully Tracking Form (pdf) Twitter: @bfend / Web: bryanfendley.com 6
    7. 7. Example Decision TreesBroward County Public SchoolsAlleged Bullying Investigation Process:(Initiated when complaint received) Twitter: @bfend / Web: bryanfendley.com 7
    8. 8. Easy Ways to Preserve MostCommon Evidence Screenshots Text messages Pictures Emails Videos Searching Twitter: @bfend / Web: bryanfendley.com 8
    9. 9. Warning About Images Do not keep in your possession as part of your investigation indecent or illegal images of minors. Report this to the authorities immediately! Twitter: @bfend / Web: bryanfendley.com 9
    10. 10. Screenshots Alt Print Screen and then paste into a document Vista start menu type “snipping tool Mac – command shift 4 http://take-a-screenshot.org/ Twitter: @bfend / Web: bryanfendley.com 10
    11. 11. Text messages Iphone and Ipod - Hold down lock button and double click home button. Image is saved under photos Dont delete messages - leave them as is so can be used as evidence - record time and date that messages are received Twitter: @bfend / Web: bryanfendley.com 11
    12. 12. Pictures Right click and paste Twitter: @bfend / Web: bryanfendley.com 12
    13. 13. Emails X-Message-Info: JGTYoYF78jEHjJx36Oi8+Z3TmmkSEdPtfpLB7P/ybN8= Received: from hotmail.com ([65.54.174.26]) by MC8-F19.hotmail.com with Microsoft SMTPSVC(6.0.3790.211); Thu, 9 Jun 2005 03:36:19 -0700 Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC; Thu, 9 Jun 2005 03:13:41 -0700 Message-ID: <BAY103-F16185361BFA8152B9701EDE2FC0@phx.gbl> Received: from 65.54.174.200 by by103fd.bay103.hotmail.msn.com with HTTP; Thu, 09 Jun 2005 10:13:41 GMT X-Originating-IP: [65.54.174.200] X-Originating-Email: [bully@example.com] X-Sender: bully@hotmail.com In-Reply-To: <BAY103-DAV16418913D7F32B48B6F4B9D1FD0@phx.gbl> From: "BULLY" <bully@hotmail.com> To: victim@hotmail.com Bcc: Date: Thu, 09 Jun 2005 20:13:41 +1000 Mime-Version: 1.0 Content-Type: text/html; format=flowed X-OriginalArrivalTime: 09 Jun 2005 10:13:41.0375 (UTC) FILETIME=[E910B0F0:01C56CDB]Source: http://www.cyberbullying.info/resources/report.php Twitter: @bfend / Web: bryanfendley.com 13
    14. 14. Videos Video DownloadHelper Twitter: @bfend / Web: bryanfendley.com 14
    15. 15. Searching Search early, filter by upload time Google alerts Twitter: @bfend / Web: bryanfendley.com 15
    16. 16. Final Note on CollectingEvidence Having an electronic record of the evidence is better than a printed record If you can’t figure out how to archive evidence, take a picture or video Collect the evidence as soon as you see it. The evidence may be gone if you plan to get to it later. Keep a backup! Twitter: @bfend / Web: bryanfendley.com 16
    17. 17. Can You Read This?g4ng up 4nd k1ll l@ulaughing at you G3yGay lzrLoser zergTo gang up on someone fragKill 7h3the Twitter: @bfend / Web: bryanfendley.com 17
    18. 18. Net Lingo Guides and TermsSlang / Net Lingo / Leet Speak http://www.netlingo.com/top50/index.p hp http://www.noslang.com/articles.phpCyber Bully Terms Anti Defamation League CyberBullying.us Twitter: @bfend / Web: bryanfendley.com 18
    19. 19. Contacts Facebook http://www.facebook.com/report/ Twitter http://support.twitter.com/articles/15794 Youtube http://www.youtube.com/reportabuse MySpace http://www.myspace.com/help/reportabuse Bebo http://www.bebo.com/Safety.jspPhone Companies ATT&T Verizon Tmobile Cricket Icloud Twitter: @bfend / Web: bryanfendley.com 19
    20. 20. List of Popular SocialNetworking Websites Wikipedia has a sortable list Twitter: @bfend / Web: bryanfendley.com 20
    21. 21. Final Thoughts Prevention programs are key Have a plan in place before an incident occurs Stay familiar with internet culture Twitter: @bfend / Web: bryanfendley.com 21

    ×