Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

Similar documents
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )

Affirmative Action Presentation

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Chapter 3. Online Bullying

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013

Teen Online & Wireless Safety Survey

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at

Northeast Technology Center Board Policy 3052 Page 1 NORTHEAST TECHNOLOGY CENTER NETWORK/INTERNET ACCESS, SAFETY AND USE POLICY

Internet Safety/CIPA Lesson Plan

Digital Citizenship Lesson Plan

Today s teens use technology more than ever. Most have

Online Safety for Middle and High School

i-safe America Internet Safety Tips for Parents

E-Safety Issues and Online Safety

e-rate toolkit Cyberbullying: Crossing the Line

Staying Safe Online. A Practical Guide for Parents and Children.

E-safety: Protecting your child online. Information for parents

Cyberbullying. Welcome!

Internet Safety Fact Sheet Facts about Social Networking:

How to Protect Students from Sexual Harassment: A Primer for Schools

CyberbullyNOT Student Guide to Cyberbullying

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

Charles Williams Church in Wales Primary School. Bullying Prevention Policy. June 2014 Review date June A Definition Of Bullying

Social Media Guidelines Resource

E-Safety Issues and Online Safety. Parents Evening

APPENDIX C. HARASSMENT, BULLYING, DISCRIMINATION, AND HATE CRIMES (Adaptedfrom the Attorney General's Safe Schools initiative)

Youth Online Behavior

E-Safety Issues and Online Safety

Appropriate Use of Social Media and Cell Phones

FIRBANK GRAMMAR SCHOOL

Outsmarting On-line Predators. Christina Kilbourne

Appropriate Use of Social Media and Cell Phones. Karen Haase. KSB School

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito

September A Anti Bullying (Cyber Bullying) version 9

HAZING AND BULLYING (Harassment, Intimidation and Dating Violence)

Cyber Vetting Employees & Candidates. KJB Computer Forensics Consultancy

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.

Empowering young people to be safe on the Internet. Information for parents, teachers and community members

Cyber Security Awareness. Internet Safety Intro.

Internet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force

Finchley Catholic High School. Anti Bullying Policy

Harmful digital communications, cyber bullying and digital harassment can take a variety of forms.

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor

HIGH SCHOOL FOR RECORDING ARTS

Parent Guide to Cyber bullying and Cyber threats

TAVISTOCK COLLEGE POLICIES & PROCEDURES

COPPA. How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online. The Children s Online Privacy Protection Act

Internet Safety Kit. A wake-up call for safer surfing online for the young people in your life.

Girls & Cyber- bullying

Guidelines for Preventing and Dealing with Bullying Issues

Victims of Crime. support and advice in Gloucestershire CRIMINAL JUSTICE SYSTEM

VIDEO SCRIPT. Bullying, Harassment, & Civil Rights: An Overview of School Districts Federal Obligation to Respond to Harassment

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

YOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School mskallos@stthomasgr.org

How To Deal With Social Media At Larks Hill J & I School

You ve reported a crime so what happens next?

Glossary: Cybersafety and Technology

Springfield Public Schools

2 nd - Watch My Online Neighborhood Video: online- neighborhood

Common Facebook issues

Educator s Guide to Cyberbullying Addressing the Harm Caused by Online Social Cruelty

Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy

2012 NCSA / McAfee Online Safety Survey

Domestic Violence: Can the Legal System Help Protect Me?

CLERY ACT CAMPUS SECURITY

Cyberbullying: What Parents Can Do to Protect Their Children

POLICY 5111 ANTI-BULLYING/HARASSMENT/HATE

ANNUAL PUBLIC NOTICES

Safety Tips for Social Networking

ONA Position Statement

Social Networking Sites A Predator s Playground?

Seeking Protection from Domestic Violence in New York s. Information for Immigrant Victims with Limited English Proficiency

A guide to cyberbullying GET WITH IT! understanding and identifying cyberbullying to help protect your children. A joint initiative by:

EADS up. stop think connect

Predators will use information obtained from children to gain trust and friendship

Cyber Safety For Parents

Cyberbullying Policy Considerations for Boards

HEADS up. stop think connect

Chicago Homeless Management Information System (HMIS) Privacy Packet

Parent / Guardian Consent for Technology Use in Schools

CYBERSAFETY CYBERSAFETY. Brian Regli, Ph.D, Drakontas LLC March 18, 2015 C2P2FL

STOP. THINK. CONNECT. Online Safety Quiz

June Canadian Teachers Federation Fédération canadienne des enseignantes et des enseignants

BERKELEY COLLEGE Equal Opportunity Policy

Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

Be it enacted by the People of the State of Illinois,

PARENTING IN THE DIGITAL AGE. Patti Agatston, Ph.D.

Current Internet Facts

Human trafficking is the buying and selling of men, women and children within countries and across borders in order to exploit them for profit.

RISKS OF ELECTRONIC COMMUNICATION 2

National Cybersecurity Awareness Campaign Families Presentation

Virginia Primary School Learning Together, Learning for our Future

County Court Restraining Orders

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve

Verizon and Online Safety: Protecting Children in the 21 st Century

Selected Findings from the Indicators of School Crime and Safety: 2014

Transcription:

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain to you: - What cyberbullying is. - What is contributing to this new phenomenon. - Tools and mediums being used by our kids. - How you should react to cyberbullying when you come across it. - How law enforcement responds to these incidents. - And finally I will provide you with some real-life cyberbullying stories. 1

Cyber Bullying Is Defined As: Using electronic communications to harass, threaten, antagonize, or intimidate another person. This includes emails, instant messages, text messages, chat room and/or web log postings, i.e. myspace.com, etc Posing as someone else for purposes of harassing them or others. Using a persons picture or a digitally enhanced image without their permission. CYBER BULLYING IS DEFINED AS: Bullet 1: Using electronic communications to harass, threaten, antagonize, or intimidate another person. Bullet 2: This includes emails, instant messages, text messages, chat room and/or web log postings, such as myspace.com, etc Bullet 3: Posing as someone else for purposes of harassing them or others. Bullet 4: Using a persons picture or a digitally enhanced image without their permission. 2

Contributing Factors The Internet: A New Medium for Harassment The Availability of Electronic Communication Devices and Access Points Perceived Anonymity Provides a False Sense of Security Popularity of the Internet THE INTERNET IS A NEW MEDIUM FOR HARASSMENT, LET S LOOK AT THE CONTRIBUTING FACTORS. Bullet 1: The availability of electronic communication devices and access points such as laptops, PDA s, cell phones, digital cameras, digital recorders, wireless internet access. Bullet 2: Perceived anonymity provides a false sense of security. Cryptic screen names, false identities, and online lingo only provide anonymity on the surface. Every packet of information sent back and forth across the Internet has the address of the senders computer and the address of the receivers computer. You are NOT really anonymous. Bullet 3: Popularity of the Internet. There are approximately 1 Billion users on the Internet today. There are over 200 Million in the United States alone and many are up to no good. 3

Once Something Is Posted Online It Can NEVER Be Retracted Once Something Is Posted Online It Can NEVER Be Retracted. 4

Tools of the Always On Generation What are the Tools of the Always On Generation? 5

Instant Messaging & Chat Rooms: ICQ AIM MSN Yahoo! INSTANT MESSAGING & CHAT ROOMS While you may be amazed at how your child is capable of multi-tasking 12 conversations at once, Instant Messaging and Chat Rooms can be dangerous and addicting when unregulated and under supervised. 6

MySpace.com MYSPACE.COM Known as an Online Social Networking website, MySpace alone claims 41 million subscribers worldwide already - more than 90 percent between age 14 and 30 - and is pulling in 150,000 more each day. That is how "you can tell who the popular kids are," said one high school freshman. She also asked for anonymity, not only because of racyphotos but also because she lists herself in her profile as 16, which she hardly is. 7

friendster.com FRIENDSTER.COM We are conditioned to follow each other's lives through the Web. said Steven Friedman, a high school senior. "It is," as he put it, "just the next evolution of social interaction." 8

facebook.com FACEBOOK.COM Facebook requires your school email address in order to participate, which forces most of the older predators to hunt elsewhere, but does little to stop the exuberantly charged youth. 9

Hate Websites HATE WEBSITES Getting pages like this taken offline is easy for the most part. The problem that created this situation may also be resolved offline. Sometimes simply talking face to face with authorities is all that is needed. Arresting and prosecuting children is not a solution we aspire to achieve, stopping the behavior is. 10

Text Messaging & Camera Phones TEXT MESSAGING & CAMERA PHONES Text Messaging attacks can cause increased charges on your phone bill. Cell phone cameras are used for upskirting humiliation and locker room antics which can quickly spread nude photos of your child around the world. 11

Polling Sites POLLING SITES Polling Web sites, which are growing in number, invite students to identify individuals by both flattering and unflattering characteristics, such as the most obese person at their school, the boys mostly likely to be gay, and the girls who have slept with the most boys. The predictable consequences for students subjected to this shameful treatment are depression, hopelessness, and withdrawal. 12

Bias Intimidation BIAS INITIMIDATION Victimization because of race, color, religion, gender, handicap, sexual orientation or ethnicity in combination with another crime will raise the level of the crime by one degree. This means a fourth degree harassment complaint that includes bias intimidation becomes a crime of the third degree with higher penalties. 13

We All Play a Role in Internet Safety Students Educators Parents Law Enforcement WE ALL PLAY A ROLE IN INTERNET SAFETY Awareness Programs Such as these, teach parents what s going on. School Policies Creating and implementing active, living policy documents that everyone must regularly read and acknowledge eliminates the fear of reporting bullying incidents by students. Supervision by Parents Computers that are in plain view with parental oversight and daily interaction. Communicate about activities and have them regularly identify their online friends to you. Teaching Programs Schools must teachchildren netiquette, values, and good communication skills with empathy toward the child s environment. 14

Reacting to Cyber Threats DO NOT respond, this just entices the sender. Report the sender to the Internet Service Provider and Local Authorities. Save any email messages so they may be properly investigated. Print or save the chat or web page. REACTING TO CYBER THREATS Bullet 1: DO NOT respond to what has been sent, this just entices the sender. Bullet 2: Report the sender to the Internet Service Provider and Local Authorities. Bullet 3: Save any email messages so they may be properly investigated. Bullet 4: Print or save the chat or web page. Not all incidents are criminal. Freedom of speech is still a constitutional right for ALL Americans. Call a legal or law enforcement professional to determine if the intent of the incident has crossed the lines where it warrants civil or criminal action. REMEMBER: Tinkering with potential computer evidence could result in it being inadmissible in court CALL A PROFESSIONAL RIGHT AWAY. 15

Responding to Cyber Threats 2C:12-3 Terroristic Threats 2C:12-10 Stalking 2C:13-6 Luring (Child) 2C:13-7 Luring (Adult) 2C:16-1 Bias Intimidation 2C:20-25 Computer Criminal Activity 2C:20-31 Wrongful Access, Disclosure of Information 2C:21-1 Forgery/Possession of Forgery Devices 2C:21-17 Impersonation: Theft of Identity 2C:24-4 Endangering Welfare of Children 2C:29-3 Hindering Apprehension 2C:33-4 Harassment RESPONDING TO CYBER THREATS Depending on circumstances, one or more of these criminal charges may be applied. Civil actions may be taken in addition to criminal actions. REMEMBER: Parents and guardians are ultimately responsible for their child s activities. 16

There is NO right to privacy on the Internet There is NO right to privacy on the Internet. 17

Here is a real life story provided by the National Center for Missing and Exploited Children entitled "Cyberbullying: You Can't Take It Back. Video Source: http://www.netsmartz.org/resources/reallife.htm 18

Here is another real life scenario provided by the National Center for Missing and Exploited Children entitled Cyberbullying: Broken Friendship. Video Source: http://www.netsmartz.org/resources/reallife.htm 19

Thank you and Welcome to Parenting in the 21 st Century! Lt. Anthony Ritter New Jersey State Police Thank you for your attention. Questions and Handouts. 20