Florida Crime Prevention Training Institute. Remember the Good Ol’ Days?

Slides:



Advertisements
Similar presentations
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Advertisements

Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
Developed by Technology Services 1:1 Laptop Initiative
Cyber Bullying The newest form of bullying.. What is cyber bullying?  Being cruel to others by sending or posting harmful material using technological.
Forms of Cyberbullying
Understanding the impact technology has on you.. Sexting-The act of sending sexually explicit messages or photographs, primarily between mobile phones.
What is Cyber-Bullying? Cyber-Bullying is the use of technology to harass, threaten, embarrass or target another person. Social Networks Instant.
INTERNET SAFETY.
INTERNET SAFETY and Social Networking
CHRISTY BOWMAN ANGELA CORNETT JODI DAVIDSON KELLI JESSIE MELISSA MCDANIEL CAROLYN MITCHELL Cyberbullying and Sexting: The Grey Area.
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
How to keep your kids safe online
The Internet is Forever
INTERNET SAFETY BROUGHT TO YOU BY: SALEM COUNTY 2000 PARTNERS.
How Secure Are You When You Use the Internet?. Overview What is the Internet? And what it is commonly used for? o Parents vs. Teens/Kids Use Ways of accessing.
Cyber-bullying & Cyber Security UNM Anderson School of Management For Jefferson Middle School’s 8 th Grade InfoTech Class.
Jana Dixon Dawson Educational Cooperative
Cyber Bullying By Elizabeth Ward. What is Cyber Bullying? Cyber Bullying is when one minor is targeted by another minor through threats, torments, harassment,
GROUP 3: APRIL, DELICIA, LISA, SHEILAH.  Your child spends large amounts of time on-line, especially at night.  You find pornography on your child's.
CyberSafety A Lesson in CYBERWORLD Culture, Customs, Culture, Customs, Language, and Safety.
What Every Parent Needs to Know! Internet Safety Information for Parents Purpose: Provide practical information parents can use at home Present safety.
Internet Safety Dr. Steve Broskoske Misericordia University.
Internet Safety Part II CyberBullying. Judson Independent School District … strives to provide a safe, positive learning environment for students in our.
6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.
1 WHAT PARENTS NEED TO KNOW ABOUT BULLYING / HARASSMENT.
Overview of the Hernando County School District Anti-Bullying and Harassment Policy January 2009.
Question  What was the internet attended for?  What is the internet known as?  Ans. Information super high way.
Ashley Counce. What is Cyber Bullying?  Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. By definition,
Internet Safety How to keep your children safe as they use the web.
“Texting, Sexting, Cyber Bullying and Other Liability Issues Facing South Dakota’s Schools in Today’s Technological Landscape” School Administrators of.
Welcome to E.L. Wright iPad Safety Night I. Using Technology and Protecting Your Child E.L. Wright Technology Department and Richland County Sheriff's.
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
Fil Santiago Director of Staff Development and Technology West Orange Public Schools.
ELEMENTARY PARENT INFORMATION: Sculptor Charter School Bullying/Harassment Policy 1.
INTERNET SAFETY Tips for becoming a “surfer” dude!
Sexting Criminal Teen Trend
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
Internet Safety Social Networking & Cyber Bullying.
By: Zach Oltmanns.
Cyber Bullying By Mrs. Giambri. What is Cyber Bullying? What is Cyber Bullying? ( What is Cyber Bullying? Cyber bullying.
Lesson 4: Taking Perspectives on Cyberbullying THE CYBER BULLYING VIRUS
By Tyanna Paling and Manpreet Gill
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
CYBER BULLYING!. WHAT IS CYBER BULLYING? Cyber bullying affects many adolescents and teens on a daily basis. Cyber bullying involves using technology,
Internet Safety How To Keep Your Children Safe As They Use The Web.
Being Good Digital Citizens with Today’s Technologies.
Cyber Bullying. ~ instant messaging ~ digital photos ~ cell phones ~ computers ~ web pages ~ social networks ~ ~ instant messaging ~ digital.
INTERNET SAFETY Sergeant Karl Youngblood Barbara Burchard Information adapted from the
CYBER BULLYING CODY KLARMAN. TYPES OF CYBER BULLYING Sending mean messages or threats to a person's account or cell phone Spreading rumors online.
ThinkB4uClick A Smart Guide to Internet Safety. Dumb Ideas Stay off the Internet Don’t have a Facebook page Never use Twitter Don’t Never post.
By: Ms. Zecca.  qskc&feature=channel qskc&feature=channel  WATCH THIS!!!
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
 Technology 2010  Sexting  Pornography  Cyberbullying  Survival skills Parent Information Night Internet/Media Safety.
Special Project Cyber bullying Issues By: Abby Heim.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
What is Harassment?? Harassment is when hurtful or upsetting things are repeatedly said or done to someone. Harassment CAN: Involve physical violence.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
What Parents and Students Need to Know Presented by Joan Reubens Pinellas County Schools, Prevention Office or Protect with.
Anti-Bullying Presentation Developed by: Deputy Dalton School Resource Officer.
It’s Everyone’s Responsibility. Bullying Eyed in NJ Teen's Apparent Suicide: Sources NBC New York, March 31, 2012.
CYBERSAFTEY 101 By: Tarrah Marcus INTRODUCTION  Acceptable Use Policies (AUP)  Policies that govern internet use  Cyberbullying  Technology based.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Teaching Safety Practices. TV Safety Guidelines Limit the number of TV-watching hours Keep TVs out of kids' bedrooms. Turn off the TV during meals. Use.
Issues In media studies: Cyberbullying
Appropriate Use of Technology
Internet Safety for Parents
WHAT STUDENTS NEED TO KNOW ABOUT BULLYING / HARASSMENT.
WHAT STUDENTS NEED TO KNOW ABOUT BULLYING / HARASSMENT.
WHAT STUDENTS NEED TO KNOW ABOUT BULLYING / HARASSMENT.
Presentation transcript:

Florida Crime Prevention Training Institute

Remember the Good Ol’ Days?

Problems we see today

Topics ●Recent Trends ●Home to School Spillover ●Law Enforcement vs. School Based Discipline ●Online Dangers ●Computer and Internet Safety ●Electronic Crimes ●Investigative tips ●Educational and Prevention Resources

The SRO’s Role in Cybercrime

SRO’s Role in Cybercrime ●Investigate computer and Internet crimes ●Educate students (prevention) ●Educate parents

Resources

Cell Phones and Texting

Stolen Phones and IPods

Sexting

●F.S ●Minor to minor ●Nudity ●Harmful to minor ●Transmits ●Possesses ●Unless not solicited ●Did not retransmit ●Reported to guardian, school, LEO ●Non-criminal, Misdemeanor, Felony ●Can prosecute sexual conduct, excitement ●Can prosecute stalking ●F.S ●Minor to minor ●Nudity ●Harmful to minor ●Transmits ●Possesses ●Unless not solicited ●Did not retransmit ●Reported to guardian, school, LEO ●Non-criminal, Misdemeanor, Felony ●Can prosecute sexual conduct, excitement ●Can prosecute stalking

Cyberstalking

Electronic Mail or Communications ● ●Instant Messaging ●Chat rooms ●Blogs ●Newsgroups ●Forums Electronic Mail or Communications ● ●Instant Messaging ●Chat rooms ●Blogs ●Newsgroups ●Forums

Cyberstalking Electronic Communications: ●Text messaging ●Images ●Camera phones Electronic Communications: ●Text messaging ●Images ●Camera phones

Cyberstalking

Cyberbullying

Jeffrey Johnston Stand Up for All Students Act Bullying or harassment of any student or school employee of a public K-12 educational institution is prohibited: ●During any education program or activity conducted by a public K-12 educational institution; ●During any school-related or school-sponsored program or activity or on a school bus of a public K-12 educational institution; or ●Through the use of computer of a public K-12 educational institution. Bullying or harassment of any student or school employee of a public K-12 educational institution is prohibited: ●During any education program or activity conducted by a public K-12 educational institution; ●During any school-related or school-sponsored program or activity or on a school bus of a public K-12 educational institution; or ●Through the use of computer of a public K-12 educational institution.

What is Bullying? "Bullying" means systematically and chronically inflicting physical hurt or psychological distress on one or more students and may involve: 1. Teasing; 2. Social exclusion; 3. Threat; 4. Intimidation; 5. Stalking; 6. Physical violence; 7. Theft; 8. Sexual or racial harassment; 9. Public humiliation; or 10. Destruction of property.

What is Harassment?

“Bullying" and “Harassment" Include

Crimes Against Computer Sytems

Crimes Against Computers ●Malware ●Denial of service (DoS) attack ●Hacking ●Malware ●Denial of service (DoS) attack ●Hacking

Bypassing School Network Security

●Software ●Redirect Websites ●Software ●Redirect Websites

You Tube

Identity Theft

ID Theft Tallahassee Democrat Four arrested in thefts of IDs Information taken from teachers' log Four people, including two girls who attended Nims Middle School, were arrested Thursday and charged with stealing the identities of a dozen substitute teachers to pay for phones, clothes, food and toys, a Leon County Sheriff's Office investigator said. Detective Leslie Kitching said one or both of the teenagers apparently shared information from a substitute teacher sign- in book at the school with two adults who shared their home. The four are accused of using the names and Social Security numbers of 12 substitute teachers to make $5,000 worth of purchases, she said.

ID Theft ●May occur at school or home ●Theft of wallet, purse ●Mail theft ●Dumpster diving ●Shoulder surfing ●Malware ●Phishing ●Vishing ●Child ID theft ●May occur at school or home ●Theft of wallet, purse ●Mail theft ●Dumpster diving ●Shoulder surfing ●Malware ●Phishing ●Vishing ●Child ID theft

Craigslist and E-Bay

Social Networking Sites

Social Networking SItes

3 Middle School Students Charged With Conspiracy To Commit Murder

●Investigators said they first learned of the alleged plot March 5. They said 13-year-old Austin Mohr sent threatening messages through his MySpace.com page, where he was pretending to be a 19-year-old. Investigators said Mohr's anger was directed at two particular students, but also made general threats to lock the cafeteria during lunch and shoot everyone. ●"Everyone will pay for what they did to me," wrote Mohr, according to investigators, who claimed he was being teased and picked on at school. "They will all die along with me." Mohr sent instant messages to another teen stating, "I will kill every person I see … The massacre will happen soon." ●A teen who received the messages sent them to a family member. That family member contacted the sheriff's office, who then began an investigation to uncover who was responsible for the messages.

Social Networking SItes

Danny is “looking for a girlfriend”!

“ I like poetry, plants, flowers and the perfect night would be cuddling by the fireplace watching a movie.”

Hey! There’s Danny. Surprise! His MySpace page never mentioned he is high-risk sex offender.

Posting Photos Online

Social Photo Sites

Geotagging

On-line Predators

Protect children by: ●Locating computer in common area ●Keep the computer in a common room in the house, not in your child's bedroom. ●Utilize parental controls provided by your service provider and/or blocking software. ●Always maintain access to your child's on-line account and randomly check his/her . Protect children by: ●Locating computer in common area ●Keep the computer in a common room in the house, not in your child's bedroom. ●Utilize parental controls provided by your service provider and/or blocking software. ●Always maintain access to your child's on-line account and randomly check his/her .

Warning Signs for Parents ●You find pornography on your child's computer. ●Your child receives phone calls from men you don't know or is making calls, sometimes long distance, to numbers you don't recognize. ●Your child receives mail, gifts, or packages from someone you don't know. ●You find pornography on your child's computer. ●Your child receives phone calls from men you don't know or is making calls, sometimes long distance, to numbers you don't recognize. ●Your child receives mail, gifts, or packages from someone you don't know.

Warning Signs for Parents ●Your child turns the computer monitor off or quickly changes the screen on the monitor when you come into the room. ●Your child is using an on-line account belonging to someone else. ●You find the computer password protected. ●Your child spends large amounts of time on-line, especially at night. ●Your child turns the computer monitor off or quickly changes the screen on the monitor when you come into the room. ●Your child is using an on-line account belonging to someone else. ●You find the computer password protected. ●Your child spends large amounts of time on-line, especially at night.