Download presentation
Presentation is loading. Please wait.
Published byDominic Wheeler Modified over 9 years ago
1
Florida Crime Prevention Training Institute
2
Remember the Good Ol’ Days?
3
Problems we see today
4
Topics ●Recent Trends ●Home to School Spillover ●Law Enforcement vs. School Based Discipline ●Online Dangers ●Computer and Internet Safety ●Electronic Crimes ●Investigative tips ●Educational and Prevention Resources
5
The SRO’s Role in Cybercrime
6
SRO’s Role in Cybercrime ●Investigate computer and Internet crimes ●Educate students (prevention) ●Educate parents
7
Resources
8
Cell Phones and Texting
9
Stolen Phones and IPods
10
Sexting
13
●F.S. 847.0141 ●Minor to minor ●Nudity ●Harmful to minor ●Transmits ●Possesses ●Unless not solicited ●Did not retransmit ●Reported to guardian, school, LEO ●Non-criminal, Misdemeanor, Felony ●Can prosecute sexual conduct, excitement ●Can prosecute stalking ●F.S. 847.0141 ●Minor to minor ●Nudity ●Harmful to minor ●Transmits ●Possesses ●Unless not solicited ●Did not retransmit ●Reported to guardian, school, LEO ●Non-criminal, Misdemeanor, Felony ●Can prosecute sexual conduct, excitement ●Can prosecute stalking
14
Cyberstalking
17
Electronic Mail or Communications ●E-mail ●Instant Messaging ●Chat rooms ●Blogs ●Newsgroups ●Forums Electronic Mail or Communications ●E-mail ●Instant Messaging ●Chat rooms ●Blogs ●Newsgroups ●Forums
18
Cyberstalking Electronic Communications: ●Text messaging ●Images ●Camera phones Electronic Communications: ●Text messaging ●Images ●Camera phones
19
Cyberstalking
20
Cyberbullying
21
Jeffrey Johnston Stand Up for All Students Act Bullying or harassment of any student or school employee of a public K-12 educational institution is prohibited: ●During any education program or activity conducted by a public K-12 educational institution; ●During any school-related or school-sponsored program or activity or on a school bus of a public K-12 educational institution; or ●Through the use of computer of a public K-12 educational institution. Bullying or harassment of any student or school employee of a public K-12 educational institution is prohibited: ●During any education program or activity conducted by a public K-12 educational institution; ●During any school-related or school-sponsored program or activity or on a school bus of a public K-12 educational institution; or ●Through the use of computer of a public K-12 educational institution.
22
What is Bullying? "Bullying" means systematically and chronically inflicting physical hurt or psychological distress on one or more students and may involve: 1. Teasing; 2. Social exclusion; 3. Threat; 4. Intimidation; 5. Stalking; 6. Physical violence; 7. Theft; 8. Sexual or racial harassment; 9. Public humiliation; or 10. Destruction of property.
23
What is Harassment?
24
“Bullying" and “Harassment" Include
25
Crimes Against Computer Sytems
26
Crimes Against Computers ●Malware ●Denial of service (DoS) attack ●Hacking ●Malware ●Denial of service (DoS) attack ●Hacking
27
Bypassing School Network Security
28
●Software ●Redirect Websites ●Software ●Redirect Websites
29
You Tube
30
Identity Theft
31
ID Theft Tallahassee Democrat Four arrested in thefts of IDs Information taken from teachers' log Four people, including two girls who attended Nims Middle School, were arrested Thursday and charged with stealing the identities of a dozen substitute teachers to pay for phones, clothes, food and toys, a Leon County Sheriff's Office investigator said. Detective Leslie Kitching said one or both of the teenagers apparently shared information from a substitute teacher sign- in book at the school with two adults who shared their home. The four are accused of using the names and Social Security numbers of 12 substitute teachers to make $5,000 worth of purchases, she said.
32
ID Theft ●May occur at school or home ●Theft of wallet, purse ●Mail theft ●Dumpster diving ●Shoulder surfing ●Malware ●Phishing ●Vishing ●Child ID theft ●May occur at school or home ●Theft of wallet, purse ●Mail theft ●Dumpster diving ●Shoulder surfing ●Malware ●Phishing ●Vishing ●Child ID theft
33
Craigslist and E-Bay
34
Social Networking Sites
35
Social Networking SItes
36
3 Middle School Students Charged With Conspiracy To Commit Murder
37
●Investigators said they first learned of the alleged plot March 5. They said 13-year-old Austin Mohr sent threatening messages through his MySpace.com page, where he was pretending to be a 19-year-old. Investigators said Mohr's anger was directed at two particular students, but also made general threats to lock the cafeteria during lunch and shoot everyone. ●"Everyone will pay for what they did to me," wrote Mohr, according to investigators, who claimed he was being teased and picked on at school. "They will all die along with me." Mohr sent instant messages to another teen stating, "I will kill every person I see … The massacre will happen soon." ●A teen who received the messages sent them to a family member. That family member contacted the sheriff's office, who then began an investigation to uncover who was responsible for the messages.
38
Social Networking SItes
39
Danny is “looking for a girlfriend”!
40
“ I like poetry, plants, flowers and the perfect night would be cuddling by the fireplace watching a movie.”
41
Hey! There’s Danny. Surprise! His MySpace page never mentioned he is high-risk sex offender.
42
Posting Photos Online
43
Social Photo Sites
44
Geotagging
45
On-line Predators
46
Protect children by: ●Locating computer in common area ●Keep the computer in a common room in the house, not in your child's bedroom. ●Utilize parental controls provided by your service provider and/or blocking software. ●Always maintain access to your child's on-line account and randomly check his/her e-mail. Protect children by: ●Locating computer in common area ●Keep the computer in a common room in the house, not in your child's bedroom. ●Utilize parental controls provided by your service provider and/or blocking software. ●Always maintain access to your child's on-line account and randomly check his/her e-mail.
47
Warning Signs for Parents ●You find pornography on your child's computer. ●Your child receives phone calls from men you don't know or is making calls, sometimes long distance, to numbers you don't recognize. ●Your child receives mail, gifts, or packages from someone you don't know. ●You find pornography on your child's computer. ●Your child receives phone calls from men you don't know or is making calls, sometimes long distance, to numbers you don't recognize. ●Your child receives mail, gifts, or packages from someone you don't know.
48
Warning Signs for Parents ●Your child turns the computer monitor off or quickly changes the screen on the monitor when you come into the room. ●Your child is using an on-line account belonging to someone else. ●You find the computer password protected. ●Your child spends large amounts of time on-line, especially at night. ●Your child turns the computer monitor off or quickly changes the screen on the monitor when you come into the room. ●Your child is using an on-line account belonging to someone else. ●You find the computer password protected. ●Your child spends large amounts of time on-line, especially at night.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.