SlideShare a Scribd company logo
1 of 2
Download to read offline
SOCIAL MEDIA THREAT GUIDANCE FOR SCHOOL STAFF AND AUTHORITIES
Technology has revolutionized the American school system, making education more accessible
than ever before. However, the advancements and accessibility of various social media platforms
continue to reveal new vulnerabilities and security gaps within the school threat landscape. In
the United States, social media-based threats to school districts continue to rise; in 2022, school
districts reported closing more frequently due to social media threats than for COVID-19 outbreaks.
To support school safety stakeholders, the Cybersecurity and Infrastructure Security Agency (CISA)
created this infographic to provide actionable considerations for reporting and responding to social
media threats directed at school districts.
All threats need to be taken seriously and treated as credible until law enforcement and a threat
assessment team determine otherwise to keep the community, school, students and staff safe.
A singular threat or hoax
is posted on a social
media website.
Misinformation is spread,
causing confusion and panic.
Increased Stress
on the Community
Canceled Classes
Postponed Events
Money and
Resources Wasted
Don’t Panic
Contact
Authorities
STOP THE SPREAD
Since the beginning of the COVID-19 pandemic, schools across the country have experienced an
increase in threats of violence that originate on social media.1
In many incidents, these threats are
unfounded, likely the result of a joke, hoax or prank by a student(s). Whether credible or not, a singular
threat can lead to the spread of misinformation as well as an influx of threats in an area, possibly
resulting in canceled events and an increased stress on the community, residents and resources.2
This
cycle–interspersed with an actual increase in school violence–impacts the mental health of students,
often resulting in psychological problems such as depression or anxiety.3
RECENT SOCIAL MEDIA THREATS
December 2021 – Various U.S. Cities
Threat: Shooting and bomb threats were made across social media.
Officials later reported that they were not credible.
Result: Schools across the nation closed for a day resulting in the
arrest of students in several states.
March 2022 – Louisiana
Threat: A 15-year-old posted a threat against their high school.
Result: The 15-year-old was arrested and charged with obstruction
of justice.
March 2022 – Maryland
Threat: A 14-year-old student from a Maryland high school posted a
threat on social media involving mustard gas.
Result: The student ended up bringing bleach to school, resulting in
the students’s arrest and the evacuation of the building.
March 2022 – New York
Threat: A 15-year-old girl made threats on social media.
Result: Middle and high schools had remote learning for three days
while police investigated the threat. Police charged the 15-year-old
with four counts of making a terroristic threat (felony) and arrested an
11-year-old girl for allegedly posting a threat on social media.
March 2022 – West Virginia
Threat: A 17-year-old student allegedly posted on social media that
another student had brought a gun to school.
Result: The school was placed on lockdown and the student that made
the false claim was arrested and charged with threats of terrorist acts.
June 2022 – Illinois
Threat: A juvenile posted threats of violence against students
at their middle school on social media.
Result: The middle school was placed on lockdown and the juvenile
was charged with disorderly conduct.
March 2023 – South Carolina
Threat: A student reported receiving a social media message from a
middle-school student threatening to “blow up” two local high schools.
Result: The high schools implemented secure safety responses and
later resumed normal activity once the student that made the threat
was found. The student was charged with disturbing schools.
RESOURCES
CISA School Safety 		
cisa.gov/topics/physical-security/school-
safety
Mitigating the Impacts of Doxing on
Critical Infrastructure 		
cisa.gov/resources-tools/resources/cisa-
insights-mitigating-impacts-doxing-critical-
infrastructure
The Personal Security Considerations
Fact Sheet 				
cisa.gov/resources-tools/resources/
personal-security-considerations-fact-sheet
Review Training, Exercises, and Drills for
Additional Strategies and Resources
SchoolSafety.gov
CISA Tabletop Exercise Packages (CTEPs)
cisa.gov/resources-tools/services/cisa-
tabletop-exercise-packages
Fusion Center Locations and Contact
Information				
dhs.gov/fusion-center-locations-and-
contact-information
Safe and Sound Schools		
A nonprofit founded by Sandy Hook parents,
educators, and community members.
safeandsoundschools.org
Readiness and Emergency Management
for Schools (REMS)			
rems.ed.gov
What to Do - Bomb Threat
cisa.gov/news-events/news/what-do-bomb-
threat
The Priority Telecommunications Services
(PTS)
cisa.gov/resources-tools/programs/priority-
telecommunications-services
1
The School District of Philadelphia. 2021. "A Response to Threats of Violence on Social Media." Office of Communications. Accessed Aug. 29, 2022. philasd.org/blog/2021/12/16/schoolviolence/
2
Zalaznick, Matt. 2022. “Social media threats are now closing schools more often than COVID.” District Administration. Accessed Aug. 29, 2022. districtadministration.com/student-behavior-on-social-media-is-now-a-bigger-threat-than-covid/
3
U.S. Department of Health and Human Services. 2016. Understanding School Violence. Centers for Disease Control and Prevention. Accessed Aug. 29, 2022. cdc.gov/violenceprevention/pdf/school_violence_fact_sheet-a.pdf#:~:text=Not%20all%20
injuries%20are%20visible.%20%20Exposure%20to%20youth,can%20result%20from%20school%20violence.%20Understanding%20School%20Violence
MITIGATION MEASURES4,5
Every school is unique, so there is no “boilerplate approach” plan or process
that schools should follow. However, developing an Emergency Operations
Plan (EOP) is a critical step for each school in creating a culture of readiness.
■ Utilize the Readiness and Emergency Management in Schools
(REMS) Toolkit to receive free training on developing EOPs and
Resilience Strategies. Training should include how to respond to
social media threats for students and staff. This should include
education and awareness about the seriousness of social media
hoaxes.
■ Develop relationships with local law enforcement and
emergency services as a part of the School Core Planning Team.
Establish clear roles, responsibilities and expectations.
■ Build on prior knowledge, experience, and federal data
to identify possible threats and hazards and assess the
vulnerabilities and risks associated with these threats and
hazards. Decide which of these threats and hazards need to be
addressed in the school and develop goals and objectives for
each one.
■ Develop detailed courses of action to address each of the
goals and objectives decided upon by the school. This includes
identifying who is responsible for the action, how long the action
will take and what needs to happen before and after the action,
as well as considering how these actions will affect individuals
that require special needs, access, evacuation and other
services.
■ Acquire official approval of the EOP and ensure its distribution
amongst all community partners.
■ Continuously test and evaluate security protocols and EOPs.
This involves ensuring the staff understands and is trained on
protocols surrounding reporting threats to social media and law
enforcement before an incident occurs.
■ Enroll in Priority Telecommunications Services to ensure first
responders and school administration can utilize potentially
overwhelmed telephone networks.
Establishing mitigation and response protocols is an important part of a school’s security
planning strategy and reinforces a culture of preparedness that can enable early threat
identification to protect the community, school, students and staff.
RESPONSE MEASURES
Fortunately, many social media threats can be traced, allowing law enforcement to follow up with the individual who posted the
threat and conduct an interview to determine credibility. It is a criminal offense to make a threat against a school system and it
is possible that the person in question could be charged with a felony. Police advise treating every threat seriously.
6,7
FIRST STEPS
Implement Your EOP
1
■ Activate the EOP determined by the Core
Planning Team made up of school staff
and stakeholders (local law enforcement,
community organizations, families, etc.).
■ Determine the type of threat (bombing,
fire as a weapon, shooting, etc.) and follow
the necessary protocols as indicated by
the EOP.
■ Alert school authorities, personnel,
parents, etc. of all threats via the proper
communications channels and keep them
up to date until all threats have
been resolved.
■ Follow procedures for appropriate
response (lockdown, evacuation, school
closing, etc.).
2 Treat All Threats Seriously
■ Report to local authorities as quickly as
possible.
■ If there is a possibility of immediate
danger, call 9-1-1.
ADDITIONAL ACTIONS
Threats of Violence on Social Media
■ Immediately notify law enforcement
that a threat was received.
■ Do not delete or share the post and
preserve all electronic evidence. Print,
photograph, screenshot or copy the
message information (subject line, date,
time, sender, etc.).
■ Follow authorities’ instructions and be
available for interviews. Law enforcement
will assess the situation and provide
guidance regarding facility lockdown,
search and/or evacuation.
Bomb Threats Received via Social Media
■ Remain calm.
■ Notify authorities immediately:
– Call 9-1-1.
– Notify facility supervisor, administrator,
or follow the facility EOP.
■ Refer to the DHS Bomb Threat
Checklist for guidance.
■ Follow authorities’ instructions and be
available for interviews. Facility supervisors
and/or law enforcement will assess the
situation and provide guidance regarding
facility lockdown, search and/or evacuation..
After The Incident
■ Take appropriate
disciplinary and criminal
enforcement steps.
■ Document threats and
actions taken for internal
evaluation.
■ Enhance security
measures and planning
procedures, as
appropriate, to ensure the
safety of all students, staff
and facilities based on
evaluation.
■ Debrief emergency
services and assist in
coordinating further
actions.
■ Site Decision Maker(s)
should remain on-scene
until the situation is
resolved or until relieved by
another administrator.
4
U.S. Department of Education, U.S. Department of Health and Human Services, U.S.
Department of Homeland Security, U.S. Department of Justice. 2013. Guide for Developing
High-Quality School Emergency Operations Plans. Federal Bureau of Investigation, Federal
Emergency Management Agency. Accessed Aug. 8, 2022. rems.ed.gov/docs/REMS_K-12_
Guide_508.pdf
5
Cybersecurity and Infrastructure Security Agency. n.d. K-12 School Security Guide Product
Suite. Accessed Aug. 8, 2022. cisa.gov/k-12-school-security-guide-product-suite
6
U.S. Department of Justice. n.d. FBI Threat Intimidation Guide. Federal Bureau of
Investigation. Accessed Aug. 8, 2022. fbi.gov/investigate/counterintelligence/threat-
intimidation-guide
7
U.S. Department of Justice. 2018. “Think Before You Post: Hoax Threats are Serious Federal
Crimes.” Federal Bureau of Investigation. Last modified Oct. 5, 2018. fbi.gov/news/stories/
hoax-threats-awareness-100518

More Related Content

Similar to Social Media Threat Guidance for School Staff and Authorities .pdf

Secret Service Making schools safer_quick_reference_guide_2018_update
Secret Service Making schools safer_quick_reference_guide_2018_updateSecret Service Making schools safer_quick_reference_guide_2018_update
Secret Service Making schools safer_quick_reference_guide_2018_updateJA Larson
 
Pr plan (official) 233
Pr plan (official) 233Pr plan (official) 233
Pr plan (official) 233Joi Archie
 
Federal K12 Safe Security Grants0309
Federal K12 Safe Security Grants0309Federal K12 Safe Security Grants0309
Federal K12 Safe Security Grants0309mary.lasica
 
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...Corey Olszewski
 
Association of Public & Land-grant Universities - Crisis Preparedness
Association of Public & Land-grant Universities - Crisis PreparednessAssociation of Public & Land-grant Universities - Crisis Preparedness
Association of Public & Land-grant Universities - Crisis PreparednessLipman Hearne Inc.
 
Edge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingEdge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingDr. Conrath
 
Security and social media
Security and social mediaSecurity and social media
Security and social mediaJP Rains, MBA
 
anti-bullying-190502050806 (1).pdf
anti-bullying-190502050806 (1).pdfanti-bullying-190502050806 (1).pdf
anti-bullying-190502050806 (1).pdfSodiuThorium
 
Anti-bullying act of 2013, Philippines
Anti-bullying act of 2013, Philippines Anti-bullying act of 2013, Philippines
Anti-bullying act of 2013, Philippines Paula Marie Llido
 
Terrorism awareness in kenya schools
Terrorism awareness in kenya schoolsTerrorism awareness in kenya schools
Terrorism awareness in kenya schoolsAmb Steve Mbugua
 
Internet Safety and Cyberbullying Awareness for Middle Schoolers.
Internet Safety and Cyberbullying Awareness for Middle Schoolers.Internet Safety and Cyberbullying Awareness for Middle Schoolers.
Internet Safety and Cyberbullying Awareness for Middle Schoolers.moeenali5423
 
Unit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docxUnit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docxmarilucorr
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGJaveriaZain1
 
International Forum of Educational Technology & SocietyMid.docx
International Forum of Educational Technology & SocietyMid.docxInternational Forum of Educational Technology & SocietyMid.docx
International Forum of Educational Technology & SocietyMid.docxLaticiaGrissomzz
 
Cyberbullying in the Middle Years
Cyberbullying in the Middle YearsCyberbullying in the Middle Years
Cyberbullying in the Middle Yearselketeaches
 

Similar to Social Media Threat Guidance for School Staff and Authorities .pdf (20)

Secret Service Making schools safer_quick_reference_guide_2018_update
Secret Service Making schools safer_quick_reference_guide_2018_updateSecret Service Making schools safer_quick_reference_guide_2018_update
Secret Service Making schools safer_quick_reference_guide_2018_update
 
Pr plan (official) 233
Pr plan (official) 233Pr plan (official) 233
Pr plan (official) 233
 
Federal K12 Safe Security Grants0309
Federal K12 Safe Security Grants0309Federal K12 Safe Security Grants0309
Federal K12 Safe Security Grants0309
 
School Violence Toolkit
School Violence ToolkitSchool Violence Toolkit
School Violence Toolkit
 
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
 
Association of Public & Land-grant Universities - Crisis Preparedness
Association of Public & Land-grant Universities - Crisis PreparednessAssociation of Public & Land-grant Universities - Crisis Preparedness
Association of Public & Land-grant Universities - Crisis Preparedness
 
Edge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullyingEdge wave the_journalwhitepaper_preventingcyberbullying
Edge wave the_journalwhitepaper_preventingcyberbullying
 
Security and social media
Security and social mediaSecurity and social media
Security and social media
 
anti-bullying-190502050806 (1).pdf
anti-bullying-190502050806 (1).pdfanti-bullying-190502050806 (1).pdf
anti-bullying-190502050806 (1).pdf
 
Anti-bullying act of 2013, Philippines
Anti-bullying act of 2013, Philippines Anti-bullying act of 2013, Philippines
Anti-bullying act of 2013, Philippines
 
Terrorism awareness in kenya schools
Terrorism awareness in kenya schoolsTerrorism awareness in kenya schools
Terrorism awareness in kenya schools
 
Internet Safety and Cyberbullying Awareness for Middle Schoolers.
Internet Safety and Cyberbullying Awareness for Middle Schoolers.Internet Safety and Cyberbullying Awareness for Middle Schoolers.
Internet Safety and Cyberbullying Awareness for Middle Schoolers.
 
Unit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docxUnit III Research ProposalFollow the directions below for the co.docx
Unit III Research ProposalFollow the directions below for the co.docx
 
Chapter 12 Ppt
Chapter 12 PptChapter 12 Ppt
Chapter 12 Ppt
 
Magazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYINGMagazine on the PERVENTION OF CYBERBULLYING
Magazine on the PERVENTION OF CYBERBULLYING
 
Proposal-Example-4.doc
Proposal-Example-4.docProposal-Example-4.doc
Proposal-Example-4.doc
 
International Forum of Educational Technology & SocietyMid.docx
International Forum of Educational Technology & SocietyMid.docxInternational Forum of Educational Technology & SocietyMid.docx
International Forum of Educational Technology & SocietyMid.docx
 
Cyberbullying: Advice for Schools
Cyberbullying: Advice for SchoolsCyberbullying: Advice for Schools
Cyberbullying: Advice for Schools
 
finalproposal
finalproposalfinalproposal
finalproposal
 
Cyberbullying in the Middle Years
Cyberbullying in the Middle YearsCyberbullying in the Middle Years
Cyberbullying in the Middle Years
 

More from xstokes825

Receipt of Cyber Threat Indicators and Defensive Measures by the Federal Gove...
Receipt of Cyber Threat Indicators and Defensive Measures by the Federal Gove...Receipt of Cyber Threat Indicators and Defensive Measures by the Federal Gove...
Receipt of Cyber Threat Indicators and Defensive Measures by the Federal Gove...xstokes825
 
Privacy and Civil Liberties Guidelines- Cybersecurity Information Sharing Act...
Privacy and Civil Liberties Guidelines- Cybersecurity Information Sharing Act...Privacy and Civil Liberties Guidelines- Cybersecurity Information Sharing Act...
Privacy and Civil Liberties Guidelines- Cybersecurity Information Sharing Act...xstokes825
 
Law Enforcement Analytic Standards Department
Law Enforcement Analytic Standards DepartmentLaw Enforcement Analytic Standards Department
Law Enforcement Analytic Standards Departmentxstokes825
 
Guidance Non-Federal Entities Sharing Cyber Threat Indicators and Defensive M...
Guidance Non-Federal Entities Sharing Cyber Threat Indicators and Defensive M...Guidance Non-Federal Entities Sharing Cyber Threat Indicators and Defensive M...
Guidance Non-Federal Entities Sharing Cyber Threat Indicators and Defensive M...xstokes825
 
Employing Intelligence Naval Post Graduate School
Employing Intelligence Naval Post Graduate SchoolEmploying Intelligence Naval Post Graduate School
Employing Intelligence Naval Post Graduate Schoolxstokes825
 
Cybersecurity Information Sharing Act of 2015.pdf
Cybersecurity Information Sharing Act of 2015.pdfCybersecurity Information Sharing Act of 2015.pdf
Cybersecurity Information Sharing Act of 2015.pdfxstokes825
 
2022_10_FBI-DHS_Strategic_Intelligence_Assessment_and_Data_on_Domestic_Terror...
2022_10_FBI-DHS_Strategic_Intelligence_Assessment_and_Data_on_Domestic_Terror...2022_10_FBI-DHS_Strategic_Intelligence_Assessment_and_Data_on_Domestic_Terror...
2022_10_FBI-DHS_Strategic_Intelligence_Assessment_and_Data_on_Domestic_Terror...xstokes825
 
28 CFR Part 23-CRIMINAL INTELLIGENCE SYSTEMS OPERATING POLICIES.pdf
28 CFR Part 23-CRIMINAL INTELLIGENCE SYSTEMS OPERATING POLICIES.pdf28 CFR Part 23-CRIMINAL INTELLIGENCE SYSTEMS OPERATING POLICIES.pdf
28 CFR Part 23-CRIMINAL INTELLIGENCE SYSTEMS OPERATING POLICIES.pdfxstokes825
 
Gunshot-Detection-Systems-Considerations for Prosecutors.pdf
Gunshot-Detection-Systems-Considerations for Prosecutors.pdfGunshot-Detection-Systems-Considerations for Prosecutors.pdf
Gunshot-Detection-Systems-Considerations for Prosecutors.pdfxstokes825
 
Guidelines-for-Prosecutors Guidelines for Prosecutors.pdf
Guidelines-for-Prosecutors Guidelines for Prosecutors.pdfGuidelines-for-Prosecutors Guidelines for Prosecutors.pdf
Guidelines-for-Prosecutors Guidelines for Prosecutors.pdfxstokes825
 

More from xstokes825 (10)

Receipt of Cyber Threat Indicators and Defensive Measures by the Federal Gove...
Receipt of Cyber Threat Indicators and Defensive Measures by the Federal Gove...Receipt of Cyber Threat Indicators and Defensive Measures by the Federal Gove...
Receipt of Cyber Threat Indicators and Defensive Measures by the Federal Gove...
 
Privacy and Civil Liberties Guidelines- Cybersecurity Information Sharing Act...
Privacy and Civil Liberties Guidelines- Cybersecurity Information Sharing Act...Privacy and Civil Liberties Guidelines- Cybersecurity Information Sharing Act...
Privacy and Civil Liberties Guidelines- Cybersecurity Information Sharing Act...
 
Law Enforcement Analytic Standards Department
Law Enforcement Analytic Standards DepartmentLaw Enforcement Analytic Standards Department
Law Enforcement Analytic Standards Department
 
Guidance Non-Federal Entities Sharing Cyber Threat Indicators and Defensive M...
Guidance Non-Federal Entities Sharing Cyber Threat Indicators and Defensive M...Guidance Non-Federal Entities Sharing Cyber Threat Indicators and Defensive M...
Guidance Non-Federal Entities Sharing Cyber Threat Indicators and Defensive M...
 
Employing Intelligence Naval Post Graduate School
Employing Intelligence Naval Post Graduate SchoolEmploying Intelligence Naval Post Graduate School
Employing Intelligence Naval Post Graduate School
 
Cybersecurity Information Sharing Act of 2015.pdf
Cybersecurity Information Sharing Act of 2015.pdfCybersecurity Information Sharing Act of 2015.pdf
Cybersecurity Information Sharing Act of 2015.pdf
 
2022_10_FBI-DHS_Strategic_Intelligence_Assessment_and_Data_on_Domestic_Terror...
2022_10_FBI-DHS_Strategic_Intelligence_Assessment_and_Data_on_Domestic_Terror...2022_10_FBI-DHS_Strategic_Intelligence_Assessment_and_Data_on_Domestic_Terror...
2022_10_FBI-DHS_Strategic_Intelligence_Assessment_and_Data_on_Domestic_Terror...
 
28 CFR Part 23-CRIMINAL INTELLIGENCE SYSTEMS OPERATING POLICIES.pdf
28 CFR Part 23-CRIMINAL INTELLIGENCE SYSTEMS OPERATING POLICIES.pdf28 CFR Part 23-CRIMINAL INTELLIGENCE SYSTEMS OPERATING POLICIES.pdf
28 CFR Part 23-CRIMINAL INTELLIGENCE SYSTEMS OPERATING POLICIES.pdf
 
Gunshot-Detection-Systems-Considerations for Prosecutors.pdf
Gunshot-Detection-Systems-Considerations for Prosecutors.pdfGunshot-Detection-Systems-Considerations for Prosecutors.pdf
Gunshot-Detection-Systems-Considerations for Prosecutors.pdf
 
Guidelines-for-Prosecutors Guidelines for Prosecutors.pdf
Guidelines-for-Prosecutors Guidelines for Prosecutors.pdfGuidelines-for-Prosecutors Guidelines for Prosecutors.pdf
Guidelines-for-Prosecutors Guidelines for Prosecutors.pdf
 

Recently uploaded

如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书Fir sss
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书Fir L
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxPKrishna18
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Oishi8
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书Fir L
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionNilamPadekar1
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 

Recently uploaded (20)

如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
Old Income Tax Regime Vs New Income Tax Regime
Old  Income Tax Regime Vs  New Income Tax   RegimeOld  Income Tax Regime Vs  New Income Tax   Regime
Old Income Tax Regime Vs New Income Tax Regime
 
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptx
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 sedition
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 

Social Media Threat Guidance for School Staff and Authorities .pdf

  • 1. SOCIAL MEDIA THREAT GUIDANCE FOR SCHOOL STAFF AND AUTHORITIES Technology has revolutionized the American school system, making education more accessible than ever before. However, the advancements and accessibility of various social media platforms continue to reveal new vulnerabilities and security gaps within the school threat landscape. In the United States, social media-based threats to school districts continue to rise; in 2022, school districts reported closing more frequently due to social media threats than for COVID-19 outbreaks. To support school safety stakeholders, the Cybersecurity and Infrastructure Security Agency (CISA) created this infographic to provide actionable considerations for reporting and responding to social media threats directed at school districts. All threats need to be taken seriously and treated as credible until law enforcement and a threat assessment team determine otherwise to keep the community, school, students and staff safe. A singular threat or hoax is posted on a social media website. Misinformation is spread, causing confusion and panic. Increased Stress on the Community Canceled Classes Postponed Events Money and Resources Wasted Don’t Panic Contact Authorities STOP THE SPREAD Since the beginning of the COVID-19 pandemic, schools across the country have experienced an increase in threats of violence that originate on social media.1 In many incidents, these threats are unfounded, likely the result of a joke, hoax or prank by a student(s). Whether credible or not, a singular threat can lead to the spread of misinformation as well as an influx of threats in an area, possibly resulting in canceled events and an increased stress on the community, residents and resources.2 This cycle–interspersed with an actual increase in school violence–impacts the mental health of students, often resulting in psychological problems such as depression or anxiety.3 RECENT SOCIAL MEDIA THREATS December 2021 – Various U.S. Cities Threat: Shooting and bomb threats were made across social media. Officials later reported that they were not credible. Result: Schools across the nation closed for a day resulting in the arrest of students in several states. March 2022 – Louisiana Threat: A 15-year-old posted a threat against their high school. Result: The 15-year-old was arrested and charged with obstruction of justice. March 2022 – Maryland Threat: A 14-year-old student from a Maryland high school posted a threat on social media involving mustard gas. Result: The student ended up bringing bleach to school, resulting in the students’s arrest and the evacuation of the building. March 2022 – New York Threat: A 15-year-old girl made threats on social media. Result: Middle and high schools had remote learning for three days while police investigated the threat. Police charged the 15-year-old with four counts of making a terroristic threat (felony) and arrested an 11-year-old girl for allegedly posting a threat on social media. March 2022 – West Virginia Threat: A 17-year-old student allegedly posted on social media that another student had brought a gun to school. Result: The school was placed on lockdown and the student that made the false claim was arrested and charged with threats of terrorist acts. June 2022 – Illinois Threat: A juvenile posted threats of violence against students at their middle school on social media. Result: The middle school was placed on lockdown and the juvenile was charged with disorderly conduct. March 2023 – South Carolina Threat: A student reported receiving a social media message from a middle-school student threatening to “blow up” two local high schools. Result: The high schools implemented secure safety responses and later resumed normal activity once the student that made the threat was found. The student was charged with disturbing schools. RESOURCES CISA School Safety cisa.gov/topics/physical-security/school- safety Mitigating the Impacts of Doxing on Critical Infrastructure cisa.gov/resources-tools/resources/cisa- insights-mitigating-impacts-doxing-critical- infrastructure The Personal Security Considerations Fact Sheet cisa.gov/resources-tools/resources/ personal-security-considerations-fact-sheet Review Training, Exercises, and Drills for Additional Strategies and Resources SchoolSafety.gov CISA Tabletop Exercise Packages (CTEPs) cisa.gov/resources-tools/services/cisa- tabletop-exercise-packages Fusion Center Locations and Contact Information dhs.gov/fusion-center-locations-and- contact-information Safe and Sound Schools A nonprofit founded by Sandy Hook parents, educators, and community members. safeandsoundschools.org Readiness and Emergency Management for Schools (REMS) rems.ed.gov What to Do - Bomb Threat cisa.gov/news-events/news/what-do-bomb- threat The Priority Telecommunications Services (PTS) cisa.gov/resources-tools/programs/priority- telecommunications-services 1 The School District of Philadelphia. 2021. "A Response to Threats of Violence on Social Media." Office of Communications. Accessed Aug. 29, 2022. philasd.org/blog/2021/12/16/schoolviolence/ 2 Zalaznick, Matt. 2022. “Social media threats are now closing schools more often than COVID.” District Administration. Accessed Aug. 29, 2022. districtadministration.com/student-behavior-on-social-media-is-now-a-bigger-threat-than-covid/ 3 U.S. Department of Health and Human Services. 2016. Understanding School Violence. Centers for Disease Control and Prevention. Accessed Aug. 29, 2022. cdc.gov/violenceprevention/pdf/school_violence_fact_sheet-a.pdf#:~:text=Not%20all%20 injuries%20are%20visible.%20%20Exposure%20to%20youth,can%20result%20from%20school%20violence.%20Understanding%20School%20Violence
  • 2. MITIGATION MEASURES4,5 Every school is unique, so there is no “boilerplate approach” plan or process that schools should follow. However, developing an Emergency Operations Plan (EOP) is a critical step for each school in creating a culture of readiness. ■ Utilize the Readiness and Emergency Management in Schools (REMS) Toolkit to receive free training on developing EOPs and Resilience Strategies. Training should include how to respond to social media threats for students and staff. This should include education and awareness about the seriousness of social media hoaxes. ■ Develop relationships with local law enforcement and emergency services as a part of the School Core Planning Team. Establish clear roles, responsibilities and expectations. ■ Build on prior knowledge, experience, and federal data to identify possible threats and hazards and assess the vulnerabilities and risks associated with these threats and hazards. Decide which of these threats and hazards need to be addressed in the school and develop goals and objectives for each one. ■ Develop detailed courses of action to address each of the goals and objectives decided upon by the school. This includes identifying who is responsible for the action, how long the action will take and what needs to happen before and after the action, as well as considering how these actions will affect individuals that require special needs, access, evacuation and other services. ■ Acquire official approval of the EOP and ensure its distribution amongst all community partners. ■ Continuously test and evaluate security protocols and EOPs. This involves ensuring the staff understands and is trained on protocols surrounding reporting threats to social media and law enforcement before an incident occurs. ■ Enroll in Priority Telecommunications Services to ensure first responders and school administration can utilize potentially overwhelmed telephone networks. Establishing mitigation and response protocols is an important part of a school’s security planning strategy and reinforces a culture of preparedness that can enable early threat identification to protect the community, school, students and staff. RESPONSE MEASURES Fortunately, many social media threats can be traced, allowing law enforcement to follow up with the individual who posted the threat and conduct an interview to determine credibility. It is a criminal offense to make a threat against a school system and it is possible that the person in question could be charged with a felony. Police advise treating every threat seriously. 6,7 FIRST STEPS Implement Your EOP 1 ■ Activate the EOP determined by the Core Planning Team made up of school staff and stakeholders (local law enforcement, community organizations, families, etc.). ■ Determine the type of threat (bombing, fire as a weapon, shooting, etc.) and follow the necessary protocols as indicated by the EOP. ■ Alert school authorities, personnel, parents, etc. of all threats via the proper communications channels and keep them up to date until all threats have been resolved. ■ Follow procedures for appropriate response (lockdown, evacuation, school closing, etc.). 2 Treat All Threats Seriously ■ Report to local authorities as quickly as possible. ■ If there is a possibility of immediate danger, call 9-1-1. ADDITIONAL ACTIONS Threats of Violence on Social Media ■ Immediately notify law enforcement that a threat was received. ■ Do not delete or share the post and preserve all electronic evidence. Print, photograph, screenshot or copy the message information (subject line, date, time, sender, etc.). ■ Follow authorities’ instructions and be available for interviews. Law enforcement will assess the situation and provide guidance regarding facility lockdown, search and/or evacuation. Bomb Threats Received via Social Media ■ Remain calm. ■ Notify authorities immediately: – Call 9-1-1. – Notify facility supervisor, administrator, or follow the facility EOP. ■ Refer to the DHS Bomb Threat Checklist for guidance. ■ Follow authorities’ instructions and be available for interviews. Facility supervisors and/or law enforcement will assess the situation and provide guidance regarding facility lockdown, search and/or evacuation.. After The Incident ■ Take appropriate disciplinary and criminal enforcement steps. ■ Document threats and actions taken for internal evaluation. ■ Enhance security measures and planning procedures, as appropriate, to ensure the safety of all students, staff and facilities based on evaluation. ■ Debrief emergency services and assist in coordinating further actions. ■ Site Decision Maker(s) should remain on-scene until the situation is resolved or until relieved by another administrator. 4 U.S. Department of Education, U.S. Department of Health and Human Services, U.S. Department of Homeland Security, U.S. Department of Justice. 2013. Guide for Developing High-Quality School Emergency Operations Plans. Federal Bureau of Investigation, Federal Emergency Management Agency. Accessed Aug. 8, 2022. rems.ed.gov/docs/REMS_K-12_ Guide_508.pdf 5 Cybersecurity and Infrastructure Security Agency. n.d. K-12 School Security Guide Product Suite. Accessed Aug. 8, 2022. cisa.gov/k-12-school-security-guide-product-suite 6 U.S. Department of Justice. n.d. FBI Threat Intimidation Guide. Federal Bureau of Investigation. Accessed Aug. 8, 2022. fbi.gov/investigate/counterintelligence/threat- intimidation-guide 7 U.S. Department of Justice. 2018. “Think Before You Post: Hoax Threats are Serious Federal Crimes.” Federal Bureau of Investigation. Last modified Oct. 5, 2018. fbi.gov/news/stories/ hoax-threats-awareness-100518