SlideShare a Scribd company logo
Online
Officer Safety
Disclaimer
I am not an Attorney and although I will
be providing information about legal
matters – this should NOT be
considered legal advice
Consult with your agency or personal
attorney
This presentation is not an official
representation of the Office of the
Missouri Attorney General
Presentation
Online Identities
– Professional
– Undercover
– Personal
GPS
Boundaries
Teens and Social Networking
Of online teens with profiles
–82% include their first name
–79% include a photo of themselves
–61% include their city or town
–49% include the name of their school
–29% include last name & Email address
–2% have included their cell phone #
                     Teens, Privacy & Online Social Networks,
                      Pew Internet & American Life Project
                                    April 2007
Social Media – (web 2.0)

Blogs - (twitter)
Social Networks - (facebook)
Video Sharing - (youtube)
Audio Sharing - (podcasts)
Photo Sharing – (flickr)
Geolocating – (foursquare)
1st Amendment & Government Employee

“when a citizen enters government
 service, the citizen by necessity
 must accept certain limitation on
 his or her freedom”

                US Supreme Court
                Garcetti v Ceballos 2006
Official Use of Social Media

Investigations
–Missing Persons
–Cyber Stalking/Harassment
–Evidence (photos or statements)
Crime Prevention
Recruitment/Vetting
Community Outreach
Official Use of Social Media

Policy & Training
–Vere Software Model Policies
–IACP Social Media Concept Paper
Authorization
–Public Information Officer
Information Management Issues
Undercover Use of Social Media
Use of proper equipment
–IP Address
–Terms of Service
Document your actions
–Rules of evidence
–Entrapment issues
Who are your friends?
–Don’t use your family!!!
Personal Use of Social Media

Policy Issues
–Agency identification (uniform, patch)
Freedom of Speech
–Detrimental to the mission and
 function of the employer
Public Information
–Name, home address, phone, email
–Family connections
Personal Use of Social Media

Personal & Work Crossover Issues
–Duty status
–Agency identification (uniform, patch)
Crime scene photos
Time stamps!!
Bias, weapons, violence, sex
Personal Use of Social Media

Investigative or sensitive information
Sexually explicit communications
–Quon v City of Ontario (June 2010)
Defamatory or offensive material
Crossing appropriate boundaries
–SRO & students
Amy Hestir Student Protection Act

 MO Senate Bill 54 (162.069)
 “Exclusive Access”
  No teacher shall establish:
  – an internet site unless available to
   parents & administration
Are You At Risk?

Who would use this against you?
–Defense
–Suspect
–Someone who doesn’t like you/cops
Ratemycop.com
Topix.com
Facebook (ie: Missouri Police Complaints)
Are You At Risk?

Protect your
–NAME
–IDENTITY
–REPUTATION
Passwords
Phone access
Location Based Sites

Geolocation social media
–Brightkite
–Foursquare
–Gowalla
Used to meet up with friends
May have incentives from businesses
Photo Exif Data
ApertureValue: 2.970854
ColorSpace: sRGB
ComponentsConfiguration: YCbCr
DateTimeDigitized: 2011:08:08 12:16:19
DateTimeOriginal: 2011:08:08 12:16:19
                                         Map Link: 38.577000,-92.177667‡
ExifVersion: 2.21
ExposureMode: Auto                       Translated EXIF
ExposureProgram: Normal
ExposureTime: 0.06666667
FNumber: 2.8
Flash: Off, Did not fire
FlashPixVersion: 1.0
                                         ImgDirection: 221.2339°=
FocalLength: 3.85
ISOSpeedRatings: 1000                    Southwest
MeteringMode: Average
PixelXDimension: 2592                    ImgDirectionRef: True North
PixelYDimension: 1936
SceneCaptureType: Standard
SensingMethod: One-chip color area
                                         Latitude: 38.577
Sharpness: Soft
ShutterSpeedValue: 3.906891
                                         LatitudeRef: N
SubjectArea:
X Center: 1295,                          Longitude: 92.17766666666667
Y Center: 967,
Width: 699,                              LongitudeRef: W
Height: 696
WhiteBalance: Auto
DateTime: 2011:08:08 12:16:19
                                         TimeStamp: 17:38:36.27
Make: Apple
Model: iPhone 4                          DateTime: 2011:08:08 12:38:36
Orientation: Left
ResolutionUnit: Inches
Software: 4.2.8
XResolution: 72
YResolution: 72
_YCbCrPositioning: Centered
PixelWidth: 2592
PixelHeight: 1936
FileSize: 2.02298 MB
Exif Data

Free IPhone App – Exif Wizard
Works on images from
iPhones, iPad, many cameras

–“a button which allows you to open
 your iPhone’s built-in Maps app to
 obtain directions to a photo’s location”
iPhone GPS

* Settings
  * General
   * Location Services
Removing Personal Info

Conduct a search of your name
–Don’t just use Google
  • www.thesearchenginelist.com
–You may be able to remove some of
 your data
  • www.unlistmy.info
Final Thoughts

There is NO eraser button
Watch for Behavioral Marketing
Consider what the defense might use
Understand “Sync Contacts”
Take a break:
–Don’t live your life online!!!
JOE LARAMIE

  MISSOURI ATTORNEY
   GENERAL’S OFFICE



JOE.LARAMIE@AGO.MO.GOV

More Related Content

Viewers also liked

Kepil (mooring buoy)
Kepil (mooring buoy)Kepil (mooring buoy)
Kepil (mooring buoy)
Capt. Persobi Waldemar
 
Bab II Procedure Loading dengan applikasi Casp 6.1
Bab II  Procedure Loading dengan applikasi Casp 6.1Bab II  Procedure Loading dengan applikasi Casp 6.1
Bab II Procedure Loading dengan applikasi Casp 6.1
Capt. Persobi Waldemar
 
Ship planning part i
Ship planning part iShip planning part i
Ship planning part i
Capt. Persobi Waldemar
 
Marine polution annex v
Marine polution annex vMarine polution annex v
Marine polution annex v
Capt. Persobi Waldemar
 
FIRE FIRGHTING APPLIANCES
FIRE FIRGHTING APPLIANCESFIRE FIRGHTING APPLIANCES
FIRE FIRGHTING APPLIANCES
Capt. Persobi Waldemar
 
Internal audit ctpf
Internal audit ctpfInternal audit ctpf
Internal audit ctpf
Capt. Persobi Waldemar
 
LSA
LSALSA
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare
SlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShare
SlideShare
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
SlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
SlideShare
 

Viewers also liked (11)

Kepil (mooring buoy)
Kepil (mooring buoy)Kepil (mooring buoy)
Kepil (mooring buoy)
 
Bab II Procedure Loading dengan applikasi Casp 6.1
Bab II  Procedure Loading dengan applikasi Casp 6.1Bab II  Procedure Loading dengan applikasi Casp 6.1
Bab II Procedure Loading dengan applikasi Casp 6.1
 
Ship planning part i
Ship planning part iShip planning part i
Ship planning part i
 
Marine polution annex v
Marine polution annex vMarine polution annex v
Marine polution annex v
 
FIRE FIRGHTING APPLIANCES
FIRE FIRGHTING APPLIANCESFIRE FIRGHTING APPLIANCES
FIRE FIRGHTING APPLIANCES
 
Internal audit ctpf
Internal audit ctpfInternal audit ctpf
Internal audit ctpf
 
LSA
LSALSA
LSA
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShare
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 

Similar to Online officer safety 9 1-11

Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile Technology
Tom Eston
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
Robert Stribley
 
Designing for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed TalkDesigning for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed Talk
Robert Stribley
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public World
Robert Stribley
 
Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud
Jim Adler
 
Sit powerpoint
Sit powerpointSit powerpoint
Sit powerpointdkeane01
 
Info leakage 200510
Info leakage 200510Info leakage 200510
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
HB Litigation Conferences
 
Web20 Mapping - by Alan Lew
Web20 Mapping - by  Alan LewWeb20 Mapping - by  Alan Lew
Web20 Mapping - by Alan Lew
Alan Lew
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
LifeLockBusinessSolutions
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
Symeon Papadopoulos
 
sixspans0102
sixspans0102sixspans0102
sixspans0102
BK Brian Kim
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
Ernest Staats
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
Oodit Jethwa
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
Adam Heller
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
Kavika Roy
 
Copy of Managing Your Digital Footprint
Copy of Managing Your Digital FootprintCopy of Managing Your Digital Footprint
Copy of Managing Your Digital Footprint
James Webb
 
Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...
CSIRO National AI Centre
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
Jason Hong
 
The Now Generation Internet Safety
The Now Generation   Internet SafetyThe Now Generation   Internet Safety
The Now Generation Internet Safety
Daniel Jeffrey Hairfield
 

Similar to Online officer safety 9 1-11 (20)

Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile Technology
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
 
Designing for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed TalkDesigning for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed Talk
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public World
 
Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud
 
Sit powerpoint
Sit powerpointSit powerpoint
Sit powerpoint
 
Info leakage 200510
Info leakage 200510Info leakage 200510
Info leakage 200510
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
 
Web20 Mapping - by Alan Lew
Web20 Mapping - by  Alan LewWeb20 Mapping - by  Alan Lew
Web20 Mapping - by Alan Lew
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
 
sixspans0102
sixspans0102sixspans0102
sixspans0102
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
 
Copy of Managing Your Digital Footprint
Copy of Managing Your Digital FootprintCopy of Managing Your Digital Footprint
Copy of Managing Your Digital Footprint
 
Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
The Now Generation Internet Safety
The Now Generation   Internet SafetyThe Now Generation   Internet Safety
The Now Generation Internet Safety
 

More from Vere Software

Internationalised Domain Names & Internet Investigations
Internationalised Domain Names & Internet InvestigationsInternationalised Domain Names & Internet Investigations
Internationalised Domain Names & Internet Investigations
Vere Software
 
Smart Phones & the Internet
Smart Phones & the InternetSmart Phones & the Internet
Smart Phones & the Internet
Vere Software
 
How Authentication, Collection & Reporting Strengthen OSINT's Value
How Authentication, Collection & Reporting Strengthen OSINT's ValueHow Authentication, Collection & Reporting Strengthen OSINT's Value
How Authentication, Collection & Reporting Strengthen OSINT's Value
Vere Software
 
Online sources of information december 2010
Online sources of information december 2010Online sources of information december 2010
Online sources of information december 2010
Vere Software
 
Tracing IP Addresses: Gary Kessler
Tracing IP Addresses: Gary KesslerTracing IP Addresses: Gary Kessler
Tracing IP Addresses: Gary Kessler
Vere Software
 
Social Media Policy & Law Enforcement Investigations
Social Media Policy & Law Enforcement InvestigationsSocial Media Policy & Law Enforcement Investigations
Social Media Policy & Law Enforcement Investigations
Vere Software
 
WebCase: How To Archive A Web Page
WebCase: How To Archive A Web PageWebCase: How To Archive A Web Page
WebCase: How To Archive A Web Page
Vere Software
 

More from Vere Software (7)

Internationalised Domain Names & Internet Investigations
Internationalised Domain Names & Internet InvestigationsInternationalised Domain Names & Internet Investigations
Internationalised Domain Names & Internet Investigations
 
Smart Phones & the Internet
Smart Phones & the InternetSmart Phones & the Internet
Smart Phones & the Internet
 
How Authentication, Collection & Reporting Strengthen OSINT's Value
How Authentication, Collection & Reporting Strengthen OSINT's ValueHow Authentication, Collection & Reporting Strengthen OSINT's Value
How Authentication, Collection & Reporting Strengthen OSINT's Value
 
Online sources of information december 2010
Online sources of information december 2010Online sources of information december 2010
Online sources of information december 2010
 
Tracing IP Addresses: Gary Kessler
Tracing IP Addresses: Gary KesslerTracing IP Addresses: Gary Kessler
Tracing IP Addresses: Gary Kessler
 
Social Media Policy & Law Enforcement Investigations
Social Media Policy & Law Enforcement InvestigationsSocial Media Policy & Law Enforcement Investigations
Social Media Policy & Law Enforcement Investigations
 
WebCase: How To Archive A Web Page
WebCase: How To Archive A Web PageWebCase: How To Archive A Web Page
WebCase: How To Archive A Web Page
 

Recently uploaded

Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 

Recently uploaded (20)

Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 

Online officer safety 9 1-11

  • 2. Disclaimer I am not an Attorney and although I will be providing information about legal matters – this should NOT be considered legal advice Consult with your agency or personal attorney This presentation is not an official representation of the Office of the Missouri Attorney General
  • 3. Presentation Online Identities – Professional – Undercover – Personal GPS Boundaries
  • 4. Teens and Social Networking Of online teens with profiles –82% include their first name –79% include a photo of themselves –61% include their city or town –49% include the name of their school –29% include last name & Email address –2% have included their cell phone # Teens, Privacy & Online Social Networks, Pew Internet & American Life Project April 2007
  • 5. Social Media – (web 2.0) Blogs - (twitter) Social Networks - (facebook) Video Sharing - (youtube) Audio Sharing - (podcasts) Photo Sharing – (flickr) Geolocating – (foursquare)
  • 6. 1st Amendment & Government Employee “when a citizen enters government service, the citizen by necessity must accept certain limitation on his or her freedom” US Supreme Court Garcetti v Ceballos 2006
  • 7. Official Use of Social Media Investigations –Missing Persons –Cyber Stalking/Harassment –Evidence (photos or statements) Crime Prevention Recruitment/Vetting Community Outreach
  • 8. Official Use of Social Media Policy & Training –Vere Software Model Policies –IACP Social Media Concept Paper Authorization –Public Information Officer Information Management Issues
  • 9. Undercover Use of Social Media Use of proper equipment –IP Address –Terms of Service Document your actions –Rules of evidence –Entrapment issues Who are your friends? –Don’t use your family!!!
  • 10. Personal Use of Social Media Policy Issues –Agency identification (uniform, patch) Freedom of Speech –Detrimental to the mission and function of the employer Public Information –Name, home address, phone, email –Family connections
  • 11. Personal Use of Social Media Personal & Work Crossover Issues –Duty status –Agency identification (uniform, patch) Crime scene photos Time stamps!! Bias, weapons, violence, sex
  • 12. Personal Use of Social Media Investigative or sensitive information Sexually explicit communications –Quon v City of Ontario (June 2010) Defamatory or offensive material Crossing appropriate boundaries –SRO & students
  • 13. Amy Hestir Student Protection Act MO Senate Bill 54 (162.069) “Exclusive Access” No teacher shall establish: – an internet site unless available to parents & administration
  • 14. Are You At Risk? Who would use this against you? –Defense –Suspect –Someone who doesn’t like you/cops Ratemycop.com Topix.com Facebook (ie: Missouri Police Complaints)
  • 15. Are You At Risk? Protect your –NAME –IDENTITY –REPUTATION Passwords Phone access
  • 16. Location Based Sites Geolocation social media –Brightkite –Foursquare –Gowalla Used to meet up with friends May have incentives from businesses
  • 18. ApertureValue: 2.970854 ColorSpace: sRGB ComponentsConfiguration: YCbCr DateTimeDigitized: 2011:08:08 12:16:19 DateTimeOriginal: 2011:08:08 12:16:19 Map Link: 38.577000,-92.177667‡ ExifVersion: 2.21 ExposureMode: Auto Translated EXIF ExposureProgram: Normal ExposureTime: 0.06666667 FNumber: 2.8 Flash: Off, Did not fire FlashPixVersion: 1.0 ImgDirection: 221.2339°= FocalLength: 3.85 ISOSpeedRatings: 1000 Southwest MeteringMode: Average PixelXDimension: 2592 ImgDirectionRef: True North PixelYDimension: 1936 SceneCaptureType: Standard SensingMethod: One-chip color area Latitude: 38.577 Sharpness: Soft ShutterSpeedValue: 3.906891 LatitudeRef: N SubjectArea: X Center: 1295, Longitude: 92.17766666666667 Y Center: 967, Width: 699, LongitudeRef: W Height: 696 WhiteBalance: Auto DateTime: 2011:08:08 12:16:19 TimeStamp: 17:38:36.27 Make: Apple Model: iPhone 4 DateTime: 2011:08:08 12:38:36 Orientation: Left ResolutionUnit: Inches Software: 4.2.8 XResolution: 72 YResolution: 72 _YCbCrPositioning: Centered PixelWidth: 2592 PixelHeight: 1936 FileSize: 2.02298 MB
  • 19. Exif Data Free IPhone App – Exif Wizard Works on images from iPhones, iPad, many cameras –“a button which allows you to open your iPhone’s built-in Maps app to obtain directions to a photo’s location”
  • 20. iPhone GPS * Settings * General * Location Services
  • 21. Removing Personal Info Conduct a search of your name –Don’t just use Google • www.thesearchenginelist.com –You may be able to remove some of your data • www.unlistmy.info
  • 22. Final Thoughts There is NO eraser button Watch for Behavioral Marketing Consider what the defense might use Understand “Sync Contacts” Take a break: –Don’t live your life online!!!
  • 23. JOE LARAMIE MISSOURI ATTORNEY GENERAL’S OFFICE JOE.LARAMIE@AGO.MO.GOV