Cyberbullying – an epidemic

Greg Price recently submitted an article to the Troy Messenger, Cyberbullying – an epidemic:

In 2006, I received a request that angered and horrified me. Law enforcement often call with requests to review computer evidence, sometimes, they request assistance in collecting the computer evidence. A state law enforcement agency requested assistance with collection of computer evidence from an active crime scene. I traveled to the site.

I was unaware of the nature of the crime, until my arrival. A child, not quite a teenager, committed suicide. Near the child, a laptop glowed eerily. Law enforcement did not want to interact with the laptop due to its changing contents, for fear of damaging possible evidence.

The laptop displayed active contents from a discussion board. I discovered that the child visited the discussion board seeking help. The digital hangout was popular among teenagers. The presence, while not designed with ill intentions, became a conduit for bullying. Young people visited the site, degraded one another, spoke poorly about themselves and others. The power of perceived anonymity was powerful: remain hidden behind a computer and lash out, act in a fashion that most would never contemplate in the physical world.

How to keep your online data protected

Greg Price recently submitted an article to the Troy Messenger, How to keep your online data protected, to share important safety information during National Cyber Security Awareness Month:

Statistically, most cyber security issues originate from end-user activity. In fact, nearly seventy-five percent of all reviewed security breaches began as the result of end-user action.

The statistics do not surprise most security practitioners. After all, currently, end-users are the dominant consumer of electronic resources – people deploy, configure and use the devices. The machines aren’t running everything, yet.

We end-users make mistakes. Those statistics include IT professionals and everyday users. Often IT professionals lack adequate skills and training. Perhaps they exhibited some talent or aptitude and became the “go-to computer person”. Clever use of modern technology is no substitute for proper training. Nearly one-third of all security breaches were the result of poor IT configuration and management, according to an annual IBM cyber security study. Have confidence in your IT resources. If a search engine is your technician’s preferred tool, perhaps looking elsewhere is appropriate.

WSFA: Keeping Your Kids Safe From Online Danger (Video)

WSFA recently aired a segment that highlighted the ACFI and our Cyberkids Protection Initiative. Please visit the following link to view the segment online:

WSFA: A look at the Cyberkids protection initiative that will help keep children safe from online danger

Related News: Online confessions cause concern

One new article link has been added to our Related News page. The Andalusia Star News published an article titled Online confessions cause concern.

And that’s a topic to which Greg Price, director of the Alabama Computer Forensics Institute at Troy University, can speak. Price, who has worked with Internet safety for nearly two decades and spoken about it in Covington County on several occasions, said sites like this one always disappoint him.

“For the community and parents, I suggest they follow a deliberate, structured approach to address the issues that poor use of technology can create,” Price said. “On our website, whoswatchingalabama.org, we provide a number of online resources.”

Among those resources is a framework called ADMIT, which offers simple steps that foster a safe computing environment for everyone, especially children.

“We designed the ADMIT framework as a tool to assist parents, guardians, and others with these challenging events,” he said.

Source: Andalusia Star News

Download ACFI’s ADMIT Framework (PDF)

Related News: Russell County Middle School talks cyber bullying

One new article link has been added to our Related News page. WRBL published an article titled Russell County Middle School talks cyber bullying.

Hundreds of Russell County Middle School students crowded the cafeteria this afternoon to get a lesson on the Internet. Specifically, to learn more about the dangers and consequences of cyber-bullying. Administration said this behavior generally starts around the middle school age.

Faculty at the school said middle school students are normally trying to find themselves, and their social place. Unfortunately, this can sometimes lead to bullying behavior on social media sites and phone applications, and the consequences can be costly.

“I use kik and snap chat,” said Ty’Kerria Grey a 7th grade student.

These social media apps along with instagram, vine, and sites like facebook and twitter are more and more popular among the middle school crowd. But use of these applications also invite new ways to bully others.

Source: WRBL

Related News: BULLY-PROOF

One new article link has been added to our Related News page. The Troy Messenger published an article titled BULLY-PROOF.

Pike County residents were able to learn about the epidemic of bullying this Thursday night in Troy when the university held a town hall meeting followed by a vigil to raise bullying awareness.

The meeting took the form of a panel discussion and question-and-answer section in which Pike County residents were able to ask specific questions about bullying.

The panel was composed of Florence Mitchell, Greg Crosby, Sharon Sullivan, Brenda Lampley, Karena Valkyrie and Greg Price.

Price gave a presentation on cyber-bullying before the panel discussion. Price serves as the head of the Alabama Computer Forensics Institute, a group that aids law enforcement officials in technology related criminal cases. “We work an enormous volume of cases involving cyber-bullying and child predators,” Price said. “It is basically anywhere where technology and bad things intersect.”

Source: Troy Messenger