16
Avoiding Cybertraps Incident Response, Computer Forensics, and Risk Management Frederick S. Lane www.FrederickLane. com www.ComputerForensicsDi gest.com Southern California Schools JPA Temecula, CA 28 October 2013

Avoiding Cybertraps

Embed Size (px)

DESCRIPTION

A presentation for the Southern California Schools Joint Powers Authority on how to avoid common cybertraps, including cyberbullying, sexting, teacher misconduct, etc.

Citation preview

Page 1: Avoiding Cybertraps

Avoiding Cybertraps

Incident Response, Computer Forensics,

and Risk Management

Frederick S. Lane

www.FrederickLane.com

www.ComputerForensicsDigest.com

Southern California Schools JPATemecula, CA

28 October 2013

Page 2: Avoiding Cybertraps

Background and Expertise

• Attorney and Author of 7 Books

• Computer Forensics Expert -- 15 years

• Over 100 criminal cases

• Lecturer on Computer-Related Topics – 20+ years

• Computer user (midframes, desktops, laptops) – 35+ years

• 10 yrs on Burlington VT School Board

Page 3: Avoiding Cybertraps

Lecture Overview• Headache-Inducing Headlines• Common Types of Incidents• Electronic Evidence Is

Everywhere• Preparing for the Inevitable• Risks for Administrators and

Teachers• A Quick Intro to Computer

Forensics

Page 4: Avoiding Cybertraps

Headache-Inducing Headlines

• “Parents Sue School District After Their 13-Year-Old's Suicide Following Sexting Bullying” – Hillsborough Cty., Florida• “Parents sue Lockhart school district after teacher charged with sexual assault” – Lockhart, TX• “School Cyberbullying Victims Fight Back In Lawsuits” – WV, PA, GA• “School Employees Sue Cyberbullying Students” – TX, PA

Page 5: Avoiding Cybertraps

A Tangled Mobile Web

Page 6: Avoiding Cybertraps

Common Types of Incidents

• Employment Issues• Harassment/Hostile Work Environment• Disciplinary Issues

• Student Misconduct• Cyberbullying & Cyberharassment• Sexting

• Teacher/Student Misconduct• Student Attacks on Teachers• Inappropriate Relationships

Page 7: Avoiding Cybertraps

E-Evidence Is Everywhere

• Inventory Possible Devices• Computers (Desktops, Laptops, Servers)

• Mobile Devices (Phones, Tablets)

• Peripherals (USBs, CDs, external drives, etc.)

• Inventory Possible Types of Data• Communication (E-Mail, IMs, Texts, etc.)

• Social Media (Facebook, Twitter, etc.)

• Web Activity (URLs, cookies, bookmarks, etc.)

• Network Logs and Access Data

• Cloud Storage (Dropbox, Flickr, Boxy, etc.)

• Deleted Data

Page 8: Avoiding Cybertraps

Whose Data Is It Anyway?

• Where Did the Incident Occur?• On-Campus vs. Off-Campus

• Zone of District Responsibility Is Growing

• Who Owns and Uses the Device?• Misconduct Using School-Owned Equipment

• Misconduct Using Privately-Owned Equipment

• Who Runs the Service?• Evidence Hosted by District

• Evidence Created by Teachers/Students

• Evidence Hosted by 3rd Parties

Page 9: Avoiding Cybertraps

Pre-Incident Preparation

• Policies and Procedures• District Decisions re Access, Services, Storage• AUPs for Staff and Students• Data Handling and Response Protocols

• Professional Development for Teachers and Staff• Typically First Responders• Potential Legal Risks• Technology Is Continually Changing

• Student Education• Critical Component of K-12 Curricula

Page 10: Avoiding Cybertraps

Preparing for the Inevitable

• Training, Education, and Prof. Dev.

• Follow Established Procedures• Involve Law Enforcement ASAP• Protect and Preserve Data• Hire Computer Forensics Expert?• Consider Privacy Implications of

Discovery Requests• Some Evidence Is Radioactive

Page 11: Avoiding Cybertraps

Risks for Admins. & Teachers

• Good Intentions, Bad Outcome• “Sherlock Holmes” Syndrome• Forwarding Content for Advice

• The Cover-Up Is Always Worse• Trying to Protect Colleagues and Friends• Desire to Protect District by Handling In-

House• “Delete” Is a Myth

Page 12: Avoiding Cybertraps

A Cautionary Tale• Ting-Yi Oei, now 64• Assistant Principal at

Freedom HS in So. Riding, VA (Loudoun County)

• Told to investigate rumors of sexting at HS

• “Inappropriate” image was forwarded to Oei’s cellphone, then computer

• Charged with “failure to report,” then contributing to delinquency of a minor

• Charges ultimately dismissed

Page 13: Avoiding Cybertraps

Computer Forensics 101

• Field Previews• Acquisition & Mirror Images• Some Data Are More Fragile Than

Others• Speed Is Of the Essence• Powerful Forensics Tools• Data Recovery and Analysis• IP Addresses Link to Real World• 4th Amendment and Privacy

Concerns

Page 14: Avoiding Cybertraps

Current Projects• Cybertraps for Educators (2014)• Safe Student and School Employee

Relationships (2014)• Cybertraps.wordpress.com• CPCaseDigest.com• MessageSafe.com• Informational Web Sites:• www.FrederickLane.com• www.ComputerForensicsDigest.com• www.CybertrapsfortheYoung.com

Page 15: Avoiding Cybertraps

Contact Information

• E-Mail:• [email protected]

• Telephone:• 802-318-4604

• Twitter• @Cybertraps, @FSL3

• LinkedIn:• www.linkedin.com/in/fredericklane/

• SlideShare.net• www.slideshare.net/FSL3

Page 16: Avoiding Cybertraps

Avoiding Cybertraps

Incident Response, Computer Forensics,

and Risk Management

Frederick S. Lane

www.FrederickLane.com

www.ComputerForensicsDigest.com

Southern California Schools JPATemecula, CA

28 October 2013