SlideShare uma empresa Scribd logo
1 de 11
Impact of Technology
on Clinical Evaluations
Frederick S. Lane
San Diego Psych Law Society
27 March 2014
Cyberstalking, Cyberbullying, Sexting & Sextortion
Background and Expertise
• Attorney and Author of 7
Books
• Impact of Technology on
Law, Society & Privacy
• Computer Forensics
Expert and Consultant
• Numerous Lectures to
School Districts,
Administrators,Teachers,
PTOs & PTAs, and
Students
• 10 yrs on Burlington VT
School Board
Our Electronic Selves
24 Hours of Internet
• On an average day on the Internet (as of 5/13):
• 2.4 billion people went online, including:
• 80% of the people in North America;
• The use of mobile devices to go online
doubled from the previous year;
• 144 billion emails were sent;
• Just under 3.3 billion Google searches were
conducted;
• 500 million people logged into Facebook;
• 175 million tweets were sent;
• 40 million photos were uploaded to
Instagram;
• 4 billion YouTube videos were watched.
The Dark Side
• Harm to Self
• Premature Sexualization
• Obsession / Ratification
• Sexting
• Harm to Others
• Cyberbullying
• Cyberharassment
• Cyberstalking
• Sextortion
The Electronic Self
• We Are What We Surf (At Least in Part)
• Digital Data Offers Powerful Insights
Into State of Mind, Motivation, and
Behavior
• Evidence May Be Direct:
• Emails, Files,Texts, Social Media
Posts & Tweets, Photos,Videos
• Or Inferential:
• Searches, Browsing History, File
Activity, Deletions, etc.
Digital Investigations
• Are Patient’s Devices Available for
Examination?
• Is Patient Willing to Provide Necessary
Log-ins and Passwords for Social
Media?
• Is Law Enforcement Involved?
• Are Other Persons Involved, and Are
They Potential Sources of Information?
• Is Computer Forensics Necessary?
Computer Forensics
• Preservation of Electronic Evidence
• Identification and Retrieval of Deleted
Files
• Organization and Analysis of Valid Files
(Particularly Timeline of Activity and
Metadata)
• Compilation of Internet Activity:
• Web Sites Visited
• Files Downloaded
• Searches Conducted
• Increasingly Time-Consuming and
Expensive
Investigation Obstacles
• Computer Forensics Is a Powerful Tool
But Not Omnipotent
• Inherent Ambiguities
• Data Recovery Can Be Hampered by:
• Physical Destruction;
• Effective Deletion; and
• Operating System Gremlins
• Third-Party Access to Social Media Is
Very Difficult
• Cloud Storage
Contact Information
• E-Mail:
• FSLane3@gmail.com
• Telephone:
• 802-318-4604
• Twitter
• @Cybertraps, @FSL3
• LinkedIn:
• www.linkedin.com/in/fredericklane/
• SlideShare.net
• www.slideshare.net/FSL3
Cybertraps.wordpress.com
Impact of Technology
on Clinical Evaluations
Frederick S. Lane
San Diego Psych Law Society
27 March 2014
Cyberstalking, Cyberbullying, Sexting & Sextortion

Mais conteúdo relacionado

Mais de Frederick Lane

Mais de Frederick Lane (20)

2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator2020-03-03 Privacy and the Ethical Educator
2020-03-03 Privacy and the Ethical Educator
 
2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators2020-02-25 Cybertraps and Cyberethics for Educators
2020-02-25 Cybertraps and Cyberethics for Educators
 
2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity2020-02-24 Cultivating a Culture of Cybersecurity
2020-02-24 Cultivating a Culture of Cybersecurity
 
2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors2020-02-23 Cybersecurity Audits for Tech Directors
2020-02-23 Cybersecurity Audits for Tech Directors
 
2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob2020-02-22 The Rise of the Digital Mob
2020-02-22 The Rise of the Digital Mob
 
2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool2020-02-14 Using Video Games as a Motivational Tool
2020-02-14 Using Video Games as a Motivational Tool
 
2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media2020-02-14 The Perils of Social Media
2020-02-14 The Perils of Social Media
 
2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators2020-02-14 Cybertraps for Educators
2020-02-14 Cybertraps for Educators
 
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
2020-02-14 Understanding the 4Ps: Personal, Private, Public, and Professional
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
 
2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE2020-02-13 Cyberethics and the MCEE
2020-02-13 Cyberethics and the MCEE
 
2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers2020-02-13 Teaching Cyberethics to Prospective Teachers
2020-02-13 Teaching Cyberethics to Prospective Teachers
 
2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?2020-02-13 Can You Legislate Cyberethics?
2020-02-13 Can You Legislate Cyberethics?
 
2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals2020-02-12 Cybertraps for HR Professionals
2020-02-12 Cybertraps for HR Professionals
 
2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE2020-02-11 Cyberethics and the MCEE
2020-02-11 Cyberethics and the MCEE
 
2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers2020-02-10 Teaching Cyberethics to Prospective Teachers
2020-02-10 Teaching Cyberethics to Prospective Teachers
 
2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE2020-02-10 Cyberethics and the MCEE
2020-02-10 Cyberethics and the MCEE
 
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
2020-01-29 Politics and the Ethical Educator: How to Survive the 2020 Electio...
 
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
2019-06-24 Humans and Social Media: Cyberrisks, Cybertraps & Cybersecurity
 
2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught2019-06-25 Cybertraps for Educators: Don't Get Caught
2019-06-25 Cybertraps for Educators: Don't Get Caught
 

Último

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Último (20)

2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 

2014-03-27 Impact of Technology on Clinical Evaluations: Cyberstalking, Cyberbullying, Sexting, and Sextortion

  • 1. Impact of Technology on Clinical Evaluations Frederick S. Lane San Diego Psych Law Society 27 March 2014 Cyberstalking, Cyberbullying, Sexting & Sextortion
  • 2. Background and Expertise • Attorney and Author of 7 Books • Impact of Technology on Law, Society & Privacy • Computer Forensics Expert and Consultant • Numerous Lectures to School Districts, Administrators,Teachers, PTOs & PTAs, and Students • 10 yrs on Burlington VT School Board
  • 4. 24 Hours of Internet • On an average day on the Internet (as of 5/13): • 2.4 billion people went online, including: • 80% of the people in North America; • The use of mobile devices to go online doubled from the previous year; • 144 billion emails were sent; • Just under 3.3 billion Google searches were conducted; • 500 million people logged into Facebook; • 175 million tweets were sent; • 40 million photos were uploaded to Instagram; • 4 billion YouTube videos were watched.
  • 5. The Dark Side • Harm to Self • Premature Sexualization • Obsession / Ratification • Sexting • Harm to Others • Cyberbullying • Cyberharassment • Cyberstalking • Sextortion
  • 6. The Electronic Self • We Are What We Surf (At Least in Part) • Digital Data Offers Powerful Insights Into State of Mind, Motivation, and Behavior • Evidence May Be Direct: • Emails, Files,Texts, Social Media Posts & Tweets, Photos,Videos • Or Inferential: • Searches, Browsing History, File Activity, Deletions, etc.
  • 7. Digital Investigations • Are Patient’s Devices Available for Examination? • Is Patient Willing to Provide Necessary Log-ins and Passwords for Social Media? • Is Law Enforcement Involved? • Are Other Persons Involved, and Are They Potential Sources of Information? • Is Computer Forensics Necessary?
  • 8. Computer Forensics • Preservation of Electronic Evidence • Identification and Retrieval of Deleted Files • Organization and Analysis of Valid Files (Particularly Timeline of Activity and Metadata) • Compilation of Internet Activity: • Web Sites Visited • Files Downloaded • Searches Conducted • Increasingly Time-Consuming and Expensive
  • 9. Investigation Obstacles • Computer Forensics Is a Powerful Tool But Not Omnipotent • Inherent Ambiguities • Data Recovery Can Be Hampered by: • Physical Destruction; • Effective Deletion; and • Operating System Gremlins • Third-Party Access to Social Media Is Very Difficult • Cloud Storage
  • 10. Contact Information • E-Mail: • FSLane3@gmail.com • Telephone: • 802-318-4604 • Twitter • @Cybertraps, @FSL3 • LinkedIn: • www.linkedin.com/in/fredericklane/ • SlideShare.net • www.slideshare.net/FSL3 Cybertraps.wordpress.com
  • 11. Impact of Technology on Clinical Evaluations Frederick S. Lane San Diego Psych Law Society 27 March 2014 Cyberstalking, Cyberbullying, Sexting & Sextortion