Related News: Huntsville man accused of paying $20K to molest teen; victim was smuggled to U.S. from Honduras

One new article link has been added to our Related News page. AL.com published an article titled Huntsville man accused of paying $20K to molest teen; victim was smuggled to U.S. from Honduras:

The father brought the teen to the U.S. from Honduras in 2010. The father began sexually molesting him when he was 15 years old and they moved to Huntsville, records state. Soon after, the father forced his son to have sexual contact with Edwards, the special agent wrote in the affidavit.

Other evidence includes text messages and pornographic photos, including nude pictures of the teen, records state.

The teen received 13 payments from Edwards, but the boy typically was required to give the money to his father, court records allege. Bank records show the payments between November 20, 2015 and April 10, 2017 total $20,350, according to investigators.

Source: AL.com

Cyberbullying – an epidemic

Greg Price recently submitted an article to the Troy Messenger, Cyberbullying – an epidemic:

In 2006, I received a request that angered and horrified me. Law enforcement often call with requests to review computer evidence, sometimes, they request assistance in collecting the computer evidence. A state law enforcement agency requested assistance with collection of computer evidence from an active crime scene. I traveled to the site.

I was unaware of the nature of the crime, until my arrival. A child, not quite a teenager, committed suicide. Near the child, a laptop glowed eerily. Law enforcement did not want to interact with the laptop due to its changing contents, for fear of damaging possible evidence.

The laptop displayed active contents from a discussion board. I discovered that the child visited the discussion board seeking help. The digital hangout was popular among teenagers. The presence, while not designed with ill intentions, became a conduit for bullying. Young people visited the site, degraded one another, spoke poorly about themselves and others. The power of perceived anonymity was powerful: remain hidden behind a computer and lash out, act in a fashion that most would never contemplate in the physical world.

How to keep your online data protected

Greg Price recently submitted an article to the Troy Messenger, How to keep your online data protected, to share important safety information during National Cyber Security Awareness Month:

Statistically, most cyber security issues originate from end-user activity. In fact, nearly seventy-five percent of all reviewed security breaches began as the result of end-user action.

The statistics do not surprise most security practitioners. After all, currently, end-users are the dominant consumer of electronic resources – people deploy, configure and use the devices. The machines aren’t running everything, yet.

We end-users make mistakes. Those statistics include IT professionals and everyday users. Often IT professionals lack adequate skills and training. Perhaps they exhibited some talent or aptitude and became the “go-to computer person”. Clever use of modern technology is no substitute for proper training. Nearly one-third of all security breaches were the result of poor IT configuration and management, according to an annual IBM cyber security study. Have confidence in your IT resources. If a search engine is your technician’s preferred tool, perhaps looking elsewhere is appropriate.

WSFA: Keeping Your Kids Safe From Online Danger (Video)

WSFA recently aired a segment that highlighted the ACFI and our Cyberkids Protection Initiative. Please visit the following link to view the segment online:

WSFA: A look at the Cyberkids protection initiative that will help keep children safe from online danger

ACFI Recognized as a 2012 Honors Laureate Award Recipient by Computerworld

The Alabama Computer Forensics Institute was recognized for its Cyberkids Initiative as a 2012 Honors Laureate Award recipient by Computerworld.

Complete details are available in the Troy University press release:

TROY earns Laureate honors for internet safety program (March 19, 2012, Troy University)

 

2012 Laureate of The Computerworld Honors Program

The Alabama Computer Forensics Institute gained national recognition as a 2012 Laureate of The Computerworld Honors Program award recipient. More information can be found in Troy University’s Press Release.

Through its Alabama Computer Forensics Institute and Laboratory, the University’s Office of Information Technology received the award for its Cyberkids Initiative, which to date has presented an online safety program to more than 190,000 children statewide since its inception in 2006.

“It was certainly an unexpected surprise to be awarded the Laureate,” said Greg Price, TROY’s Chief Information Officer, who has more than 15 years of experience in internet security and cybercrime investigations. “The international award is considered one of the most prestigious awards among IT professionals and the recipients of years past include some of the most storied names in academia and humanitarian efforts.”

Founded by the International Data Group (IDG) in 1988, the Computerworld Honors Program is governed by the not-for-profit Computerworld Information Technology Awards Foundation, and is the longest-running global program to honor individuals and organizations that use information technology to promote positive social, economic and educational change.

TROY earns Laureate honors for internet safety program (March 19, 2012)