Presentation is loading. Please wait.

Presentation is loading. Please wait.

Florida Crime Prevention Training Institute. Remember the Good Ol’ Days?

Similar presentations


Presentation on theme: "Florida Crime Prevention Training Institute. Remember the Good Ol’ Days?"— Presentation transcript:

1 Florida Crime Prevention Training Institute

2 Remember the Good Ol’ Days?

3 Problems we see today

4 Topics ●Recent Trends ●Home to School Spillover ●Law Enforcement vs. School Based Discipline ●Online Dangers ●Computer and Internet Safety ●Electronic Crimes ●Investigative tips ●Educational and Prevention Resources

5 The SRO’s Role in Cybercrime

6 SRO’s Role in Cybercrime ●Investigate computer and Internet crimes ●Educate students (prevention) ●Educate parents

7 Resources

8 Cell Phones and Texting

9 Stolen Phones and IPods

10 Sexting

11

12

13 ●F.S ●Minor to minor ●Nudity ●Harmful to minor ●Transmits ●Possesses ●Unless not solicited ●Did not retransmit ●Reported to guardian, school, LEO ●Non-criminal, Misdemeanor, Felony ●Can prosecute sexual conduct, excitement ●Can prosecute stalking ●F.S ●Minor to minor ●Nudity ●Harmful to minor ●Transmits ●Possesses ●Unless not solicited ●Did not retransmit ●Reported to guardian, school, LEO ●Non-criminal, Misdemeanor, Felony ●Can prosecute sexual conduct, excitement ●Can prosecute stalking

14 Cyberstalking

15

16

17 Electronic Mail or Communications ● ●Instant Messaging ●Chat rooms ●Blogs ●Newsgroups ●Forums Electronic Mail or Communications ● ●Instant Messaging ●Chat rooms ●Blogs ●Newsgroups ●Forums

18 Cyberstalking Electronic Communications: ●Text messaging ●Images ●Camera phones Electronic Communications: ●Text messaging ●Images ●Camera phones

19 Cyberstalking

20 Cyberbullying

21 Jeffrey Johnston Stand Up for All Students Act Bullying or harassment of any student or school employee of a public K-12 educational institution is prohibited: ●During any education program or activity conducted by a public K-12 educational institution; ●During any school-related or school-sponsored program or activity or on a school bus of a public K-12 educational institution; or ●Through the use of computer of a public K-12 educational institution. Bullying or harassment of any student or school employee of a public K-12 educational institution is prohibited: ●During any education program or activity conducted by a public K-12 educational institution; ●During any school-related or school-sponsored program or activity or on a school bus of a public K-12 educational institution; or ●Through the use of computer of a public K-12 educational institution.

22 What is Bullying? "Bullying" means systematically and chronically inflicting physical hurt or psychological distress on one or more students and may involve: 1. Teasing; 2. Social exclusion; 3. Threat; 4. Intimidation; 5. Stalking; 6. Physical violence; 7. Theft; 8. Sexual or racial harassment; 9. Public humiliation; or 10. Destruction of property.

23 What is Harassment?

24 “Bullying" and “Harassment" Include

25 Crimes Against Computer Sytems

26 Crimes Against Computers ●Malware ●Denial of service (DoS) attack ●Hacking ●Malware ●Denial of service (DoS) attack ●Hacking

27 Bypassing School Network Security

28 ●Software ●Redirect Websites ●Software ●Redirect Websites

29 You Tube

30 Identity Theft

31 ID Theft Tallahassee Democrat Four arrested in thefts of IDs Information taken from teachers' log Four people, including two girls who attended Nims Middle School, were arrested Thursday and charged with stealing the identities of a dozen substitute teachers to pay for phones, clothes, food and toys, a Leon County Sheriff's Office investigator said. Detective Leslie Kitching said one or both of the teenagers apparently shared information from a substitute teacher sign- in book at the school with two adults who shared their home. The four are accused of using the names and Social Security numbers of 12 substitute teachers to make $5,000 worth of purchases, she said.

32 ID Theft ●May occur at school or home ●Theft of wallet, purse ●Mail theft ●Dumpster diving ●Shoulder surfing ●Malware ●Phishing ●Vishing ●Child ID theft ●May occur at school or home ●Theft of wallet, purse ●Mail theft ●Dumpster diving ●Shoulder surfing ●Malware ●Phishing ●Vishing ●Child ID theft

33 Craigslist and E-Bay

34 Social Networking Sites

35 Social Networking SItes

36 3 Middle School Students Charged With Conspiracy To Commit Murder

37 ●Investigators said they first learned of the alleged plot March 5. They said 13-year-old Austin Mohr sent threatening messages through his MySpace.com page, where he was pretending to be a 19-year-old. Investigators said Mohr's anger was directed at two particular students, but also made general threats to lock the cafeteria during lunch and shoot everyone. ●"Everyone will pay for what they did to me," wrote Mohr, according to investigators, who claimed he was being teased and picked on at school. "They will all die along with me." Mohr sent instant messages to another teen stating, "I will kill every person I see … The massacre will happen soon." ●A teen who received the messages sent them to a family member. That family member contacted the sheriff's office, who then began an investigation to uncover who was responsible for the messages.

38 Social Networking SItes

39 Danny is “looking for a girlfriend”!

40 “ I like poetry, plants, flowers and the perfect night would be cuddling by the fireplace watching a movie.”

41 Hey! There’s Danny. Surprise! His MySpace page never mentioned he is high-risk sex offender.

42 Posting Photos Online

43 Social Photo Sites

44 Geotagging

45 On-line Predators

46 Protect children by: ●Locating computer in common area ●Keep the computer in a common room in the house, not in your child's bedroom. ●Utilize parental controls provided by your service provider and/or blocking software. ●Always maintain access to your child's on-line account and randomly check his/her . Protect children by: ●Locating computer in common area ●Keep the computer in a common room in the house, not in your child's bedroom. ●Utilize parental controls provided by your service provider and/or blocking software. ●Always maintain access to your child's on-line account and randomly check his/her .

47 Warning Signs for Parents ●You find pornography on your child's computer. ●Your child receives phone calls from men you don't know or is making calls, sometimes long distance, to numbers you don't recognize. ●Your child receives mail, gifts, or packages from someone you don't know. ●You find pornography on your child's computer. ●Your child receives phone calls from men you don't know or is making calls, sometimes long distance, to numbers you don't recognize. ●Your child receives mail, gifts, or packages from someone you don't know.

48 Warning Signs for Parents ●Your child turns the computer monitor off or quickly changes the screen on the monitor when you come into the room. ●Your child is using an on-line account belonging to someone else. ●You find the computer password protected. ●Your child spends large amounts of time on-line, especially at night. ●Your child turns the computer monitor off or quickly changes the screen on the monitor when you come into the room. ●Your child is using an on-line account belonging to someone else. ●You find the computer password protected. ●Your child spends large amounts of time on-line, especially at night.

49

50


Download ppt "Florida Crime Prevention Training Institute. Remember the Good Ol’ Days?"

Similar presentations


Ads by Google