SlideShare a Scribd company logo
1 of 23
Download to read offline
Online
Officer Safety
Disclaimer
I am not an Attorney and although I will
be providing information about legal
matters – this should NOT be
considered legal advice
Consult with your agency or personal
attorney
This presentation is not an official
representation of the Office of the
Missouri Attorney General
Presentation
Online Identities
– Professional
– Undercover
– Personal
GPS
Boundaries
Teens and Social Networking
Of online teens with profiles
–82% include their first name
–79% include a photo of themselves
–61% include their city or town
–49% include the name of their school
–29% include last name & Email address
–2% have included their cell phone #
                     Teens, Privacy & Online Social Networks,
                      Pew Internet & American Life Project
                                    April 2007
Social Media – (web 2.0)

Blogs - (twitter)
Social Networks - (facebook)
Video Sharing - (youtube)
Audio Sharing - (podcasts)
Photo Sharing – (flickr)
Geolocating – (foursquare)
1st Amendment & Government Employee

“when a citizen enters government
 service, the citizen by necessity
 must accept certain limitation on
 his or her freedom”

                US Supreme Court
                Garcetti v Ceballos 2006
Official Use of Social Media

Investigations
–Missing Persons
–Cyber Stalking/Harassment
–Evidence (photos or statements)
Crime Prevention
Recruitment/Vetting
Community Outreach
Official Use of Social Media

Policy & Training
–Vere Software Model Policies
–IACP Social Media Concept Paper
Authorization
–Public Information Officer
Information Management Issues
Undercover Use of Social Media
Use of proper equipment
–IP Address
–Terms of Service
Document your actions
–Rules of evidence
–Entrapment issues
Who are your friends?
–Don’t use your family!!!
Personal Use of Social Media

Policy Issues
–Agency identification (uniform, patch)
Freedom of Speech
–Detrimental to the mission and
 function of the employer
Public Information
–Name, home address, phone, email
–Family connections
Personal Use of Social Media

Personal & Work Crossover Issues
–Duty status
–Agency identification (uniform, patch)
Crime scene photos
Time stamps!!
Bias, weapons, violence, sex
Personal Use of Social Media

Investigative or sensitive information
Sexually explicit communications
–Quon v City of Ontario (June 2010)
Defamatory or offensive material
Crossing appropriate boundaries
–SRO & students
Amy Hestir Student Protection Act

 MO Senate Bill 54 (162.069)
 “Exclusive Access”
  No teacher shall establish:
  – an internet site unless available to
   parents & administration
Are You At Risk?

Who would use this against you?
–Defense
–Suspect
–Someone who doesn’t like you/cops
Ratemycop.com
Topix.com
Facebook (ie: Missouri Police Complaints)
Are You At Risk?

Protect your
–NAME
–IDENTITY
–REPUTATION
Passwords
Phone access
Location Based Sites

Geolocation social media
–Brightkite
–Foursquare
–Gowalla
Used to meet up with friends
May have incentives from businesses
Photo Exif Data
ApertureValue: 2.970854
ColorSpace: sRGB
ComponentsConfiguration: YCbCr
DateTimeDigitized: 2011:08:08 12:16:19
DateTimeOriginal: 2011:08:08 12:16:19
                                         Map Link: 38.577000,-92.177667‡
ExifVersion: 2.21
ExposureMode: Auto                       Translated EXIF
ExposureProgram: Normal
ExposureTime: 0.06666667
FNumber: 2.8
Flash: Off, Did not fire
FlashPixVersion: 1.0
                                         ImgDirection: 221.2339°=
FocalLength: 3.85
ISOSpeedRatings: 1000                    Southwest
MeteringMode: Average
PixelXDimension: 2592                    ImgDirectionRef: True North
PixelYDimension: 1936
SceneCaptureType: Standard
SensingMethod: One-chip color area
                                         Latitude: 38.577
Sharpness: Soft
ShutterSpeedValue: 3.906891
                                         LatitudeRef: N
SubjectArea:
X Center: 1295,                          Longitude: 92.17766666666667
Y Center: 967,
Width: 699,                              LongitudeRef: W
Height: 696
WhiteBalance: Auto
DateTime: 2011:08:08 12:16:19
                                         TimeStamp: 17:38:36.27
Make: Apple
Model: iPhone 4                          DateTime: 2011:08:08 12:38:36
Orientation: Left
ResolutionUnit: Inches
Software: 4.2.8
XResolution: 72
YResolution: 72
_YCbCrPositioning: Centered
PixelWidth: 2592
PixelHeight: 1936
FileSize: 2.02298 MB
Exif Data

Free IPhone App – Exif Wizard
Works on images from
iPhones, iPad, many cameras

–“a button which allows you to open
 your iPhone’s built-in Maps app to
 obtain directions to a photo’s location”
iPhone GPS

* Settings
  * General
   * Location Services
Removing Personal Info

Conduct a search of your name
–Don’t just use Google
  • www.thesearchenginelist.com
–You may be able to remove some of
 your data
  • www.unlistmy.info
Final Thoughts

There is NO eraser button
Watch for Behavioral Marketing
Consider what the defense might use
Understand “Sync Contacts”
Take a break:
–Don’t live your life online!!!
JOE LARAMIE

  MISSOURI ATTORNEY
   GENERAL’S OFFICE



JOE.LARAMIE@AGO.MO.GOV

More Related Content

Viewers also liked

Viewers also liked (11)

Kepil (mooring buoy)
Kepil (mooring buoy)Kepil (mooring buoy)
Kepil (mooring buoy)
 
Bab II Procedure Loading dengan applikasi Casp 6.1
Bab II  Procedure Loading dengan applikasi Casp 6.1Bab II  Procedure Loading dengan applikasi Casp 6.1
Bab II Procedure Loading dengan applikasi Casp 6.1
 
Ship planning part i
Ship planning part iShip planning part i
Ship planning part i
 
Marine polution annex v
Marine polution annex vMarine polution annex v
Marine polution annex v
 
FIRE FIRGHTING APPLIANCES
FIRE FIRGHTING APPLIANCESFIRE FIRGHTING APPLIANCES
FIRE FIRGHTING APPLIANCES
 
Internal audit ctpf
Internal audit ctpfInternal audit ctpf
Internal audit ctpf
 
LSA
LSALSA
LSA
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShare
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 

Similar to Online officer safety 9 1-11

Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyTom Eston
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Robert Stribley
 
Designing for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed TalkDesigning for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed TalkRobert Stribley
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldRobert Stribley
 
Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud Jim Adler
 
Sit powerpoint
Sit powerpointSit powerpoint
Sit powerpointdkeane01
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSHB Litigation Conferences
 
Web20 Mapping - by Alan Lew
Web20 Mapping - by  Alan LewWeb20 Mapping - by  Alan Lew
Web20 Mapping - by Alan LewAlan Lew
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile securityErnest Staats
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSOodit Jethwa
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShowAdam Heller
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?Kavika Roy
 
Copy of Managing Your Digital Footprint
Copy of Managing Your Digital FootprintCopy of Managing Your Digital Footprint
Copy of Managing Your Digital FootprintJames Webb
 
Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...CSIRO National AI Centre
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with PrivacyJason Hong
 

Similar to Online officer safety 9 1-11 (20)

Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile Technology
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
 
Designing for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed TalkDesigning for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed Talk
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public World
 
Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud
 
Sit powerpoint
Sit powerpointSit powerpoint
Sit powerpoint
 
Info leakage 200510
Info leakage 200510Info leakage 200510
Info leakage 200510
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
 
Web20 Mapping - by Alan Lew
Web20 Mapping - by  Alan LewWeb20 Mapping - by  Alan Lew
Web20 Mapping - by Alan Lew
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
 
sixspans0102
sixspans0102sixspans0102
sixspans0102
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
 
Copy of Managing Your Digital Footprint
Copy of Managing Your Digital FootprintCopy of Managing Your Digital Footprint
Copy of Managing Your Digital Footprint
 
Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
The Now Generation Internet Safety
The Now Generation   Internet SafetyThe Now Generation   Internet Safety
The Now Generation Internet Safety
 

More from Vere Software

Internationalised Domain Names & Internet Investigations
Internationalised Domain Names & Internet InvestigationsInternationalised Domain Names & Internet Investigations
Internationalised Domain Names & Internet InvestigationsVere Software
 
Smart Phones & the Internet
Smart Phones & the InternetSmart Phones & the Internet
Smart Phones & the InternetVere Software
 
How Authentication, Collection & Reporting Strengthen OSINT's Value
How Authentication, Collection & Reporting Strengthen OSINT's ValueHow Authentication, Collection & Reporting Strengthen OSINT's Value
How Authentication, Collection & Reporting Strengthen OSINT's ValueVere Software
 
Online sources of information december 2010
Online sources of information december 2010Online sources of information december 2010
Online sources of information december 2010Vere Software
 
Tracing IP Addresses: Gary Kessler
Tracing IP Addresses: Gary KesslerTracing IP Addresses: Gary Kessler
Tracing IP Addresses: Gary KesslerVere Software
 
Social Media Policy & Law Enforcement Investigations
Social Media Policy & Law Enforcement InvestigationsSocial Media Policy & Law Enforcement Investigations
Social Media Policy & Law Enforcement InvestigationsVere Software
 
WebCase: How To Archive A Web Page
WebCase: How To Archive A Web PageWebCase: How To Archive A Web Page
WebCase: How To Archive A Web PageVere Software
 

More from Vere Software (7)

Internationalised Domain Names & Internet Investigations
Internationalised Domain Names & Internet InvestigationsInternationalised Domain Names & Internet Investigations
Internationalised Domain Names & Internet Investigations
 
Smart Phones & the Internet
Smart Phones & the InternetSmart Phones & the Internet
Smart Phones & the Internet
 
How Authentication, Collection & Reporting Strengthen OSINT's Value
How Authentication, Collection & Reporting Strengthen OSINT's ValueHow Authentication, Collection & Reporting Strengthen OSINT's Value
How Authentication, Collection & Reporting Strengthen OSINT's Value
 
Online sources of information december 2010
Online sources of information december 2010Online sources of information december 2010
Online sources of information december 2010
 
Tracing IP Addresses: Gary Kessler
Tracing IP Addresses: Gary KesslerTracing IP Addresses: Gary Kessler
Tracing IP Addresses: Gary Kessler
 
Social Media Policy & Law Enforcement Investigations
Social Media Policy & Law Enforcement InvestigationsSocial Media Policy & Law Enforcement Investigations
Social Media Policy & Law Enforcement Investigations
 
WebCase: How To Archive A Web Page
WebCase: How To Archive A Web PageWebCase: How To Archive A Web Page
WebCase: How To Archive A Web Page
 

Recently uploaded

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Recently uploaded (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Online officer safety 9 1-11

  • 2. Disclaimer I am not an Attorney and although I will be providing information about legal matters – this should NOT be considered legal advice Consult with your agency or personal attorney This presentation is not an official representation of the Office of the Missouri Attorney General
  • 3. Presentation Online Identities – Professional – Undercover – Personal GPS Boundaries
  • 4. Teens and Social Networking Of online teens with profiles –82% include their first name –79% include a photo of themselves –61% include their city or town –49% include the name of their school –29% include last name & Email address –2% have included their cell phone # Teens, Privacy & Online Social Networks, Pew Internet & American Life Project April 2007
  • 5. Social Media – (web 2.0) Blogs - (twitter) Social Networks - (facebook) Video Sharing - (youtube) Audio Sharing - (podcasts) Photo Sharing – (flickr) Geolocating – (foursquare)
  • 6. 1st Amendment & Government Employee “when a citizen enters government service, the citizen by necessity must accept certain limitation on his or her freedom” US Supreme Court Garcetti v Ceballos 2006
  • 7. Official Use of Social Media Investigations –Missing Persons –Cyber Stalking/Harassment –Evidence (photos or statements) Crime Prevention Recruitment/Vetting Community Outreach
  • 8. Official Use of Social Media Policy & Training –Vere Software Model Policies –IACP Social Media Concept Paper Authorization –Public Information Officer Information Management Issues
  • 9. Undercover Use of Social Media Use of proper equipment –IP Address –Terms of Service Document your actions –Rules of evidence –Entrapment issues Who are your friends? –Don’t use your family!!!
  • 10. Personal Use of Social Media Policy Issues –Agency identification (uniform, patch) Freedom of Speech –Detrimental to the mission and function of the employer Public Information –Name, home address, phone, email –Family connections
  • 11. Personal Use of Social Media Personal & Work Crossover Issues –Duty status –Agency identification (uniform, patch) Crime scene photos Time stamps!! Bias, weapons, violence, sex
  • 12. Personal Use of Social Media Investigative or sensitive information Sexually explicit communications –Quon v City of Ontario (June 2010) Defamatory or offensive material Crossing appropriate boundaries –SRO & students
  • 13. Amy Hestir Student Protection Act MO Senate Bill 54 (162.069) “Exclusive Access” No teacher shall establish: – an internet site unless available to parents & administration
  • 14. Are You At Risk? Who would use this against you? –Defense –Suspect –Someone who doesn’t like you/cops Ratemycop.com Topix.com Facebook (ie: Missouri Police Complaints)
  • 15. Are You At Risk? Protect your –NAME –IDENTITY –REPUTATION Passwords Phone access
  • 16. Location Based Sites Geolocation social media –Brightkite –Foursquare –Gowalla Used to meet up with friends May have incentives from businesses
  • 18. ApertureValue: 2.970854 ColorSpace: sRGB ComponentsConfiguration: YCbCr DateTimeDigitized: 2011:08:08 12:16:19 DateTimeOriginal: 2011:08:08 12:16:19 Map Link: 38.577000,-92.177667‡ ExifVersion: 2.21 ExposureMode: Auto Translated EXIF ExposureProgram: Normal ExposureTime: 0.06666667 FNumber: 2.8 Flash: Off, Did not fire FlashPixVersion: 1.0 ImgDirection: 221.2339°= FocalLength: 3.85 ISOSpeedRatings: 1000 Southwest MeteringMode: Average PixelXDimension: 2592 ImgDirectionRef: True North PixelYDimension: 1936 SceneCaptureType: Standard SensingMethod: One-chip color area Latitude: 38.577 Sharpness: Soft ShutterSpeedValue: 3.906891 LatitudeRef: N SubjectArea: X Center: 1295, Longitude: 92.17766666666667 Y Center: 967, Width: 699, LongitudeRef: W Height: 696 WhiteBalance: Auto DateTime: 2011:08:08 12:16:19 TimeStamp: 17:38:36.27 Make: Apple Model: iPhone 4 DateTime: 2011:08:08 12:38:36 Orientation: Left ResolutionUnit: Inches Software: 4.2.8 XResolution: 72 YResolution: 72 _YCbCrPositioning: Centered PixelWidth: 2592 PixelHeight: 1936 FileSize: 2.02298 MB
  • 19. Exif Data Free IPhone App – Exif Wizard Works on images from iPhones, iPad, many cameras –“a button which allows you to open your iPhone’s built-in Maps app to obtain directions to a photo’s location”
  • 20. iPhone GPS * Settings * General * Location Services
  • 21. Removing Personal Info Conduct a search of your name –Don’t just use Google • www.thesearchenginelist.com –You may be able to remove some of your data • www.unlistmy.info
  • 22. Final Thoughts There is NO eraser button Watch for Behavioral Marketing Consider what the defense might use Understand “Sync Contacts” Take a break: –Don’t live your life online!!!
  • 23. JOE LARAMIE MISSOURI ATTORNEY GENERAL’S OFFICE JOE.LARAMIE@AGO.MO.GOV