Shelby Foster Cyber Stalking- Use of internet or electronic devices to harass an individual or organization “Cyber stalking usually involves a course of conduct, more than one instance, that would cause a reasonable person fear," - Michael Kaiser, the Executive Director of the National Cyber Security Alliance. Cyberbullying- extension of bullying through electronic devices -releasing photos without consent, posing threats, false accusations, harassment, peer pressure, bribery Threats of death or bodily harm to a person or member of his family-threats to commit serious bodily harm to persons on school property A) Any person who knowingly communicates including electronically transmitted communication, a threat to kill or do bodily injury to a person, is guilty of class 6 felony -Identity theft includes stealing of Name Money Credit Social Security What’s needed to steal Social SecurityAddress, phone number, birthday, full name, then hackers begin guessing your social until they get it right Only a couple hundred numbers… Accessed by anybody Don’t do anything on a computer involving sensitive information Not logging out, and only exiting the browser= Not good -people can browse your history and login to the site you never logged out on. Be careful what information you share online Consider using a nickname Maintain a current knowledge of current privacy settings for everything Ex: Facebook, twitter, Instagram, Myspace… Do an Internet search regularly Don’t be gullible Don’t respond to messages in anger Ignore and Save Don’t care Don’t use the Internet at all Phishing Websites - Social Security -Credit card # -Bank account # -Drivers License # -Home address and phone # Use anti-virus software Use unique passwords Definition- is the requirement to maintain the survival of the state through the use of economic power, diplomacy, power projection and political power. How they maintain security: Phones Emails Social Media Text Messages Fourth Amendment’s provisions against warrantless searches. First Amendment – “right of association” - People might not want to be in the association, if they know they’re being watched, creating an intimidation factor Can hand over information Monitors internationally and Domestically Busch warranted warrantless surveillance in 2005 NSA won’t say whether it spies on Congress. New documents reveal massive scope of NSA spying in 60 countries, targeting regulators, aid organizations and many others with no connection to terrorist or illegal activities. NSA can access private data on iPhones, BlackBerry and Android devices. http://www.youtube.com/watch?v=Q_qdnyEqCPk