Students & Social Media

Not too long ago the highlight of our day was hearing “You’ve got mail!”

Those were simpler times when we didn’t have to worry so much about offending people with what we posted or someone sharing our status. But now, social media allows anyone, including students, to make any part of life much more public. Whether you like it or not.

Politicians, professional athletes, and celebrities are the most common groups to have their posts shared, retweeted, and broadcast across social media platforms for all to see. But lately, students have been making waves. From social justice campaigns, to controversial photos or videos, students’ social media posts can stir up some strong reactions.

So what exactly is acceptable when students decide to take their opinions online? Can students expect to have their “free speech” protected?

The First Amendment and Online Expression

In general, students have the right to freedom of expression unless it infringes on the rights of others, school safety, or interferes with the ability of a school to deliver its educational services and processes. Thus, off-campus online expression would be protected in the same way as traditional speech.

We must protect First Amendment rights of students while also recognizing that schools do have some ability, under very limited circumstances, to discipline students for off-campus speech.

But when “free speech” becomes threatening, that’s when educators need to speak up. Some instances of student social media use, including that which is off-campus, amount to misconduct that can be disciplined according to school policy.

Let an administrator know about student social media use that:

  • Breaches school policy.
  • Leads to or creates substantial disruption to the educational process.
  • Results in bullying toward students or staff.
  • Threatens school violence.

Here are some questions that may help students decipher what they should and should not do when using social media in regards to school policy.

 

Do I have the right to access social media while I’m at school?

Yes and No. It is up to the school to determine when it is appropriate to use devices that allow social media access. Some schools prohibit personal cell phones on campus and others may block certain sites on their computers and networks. Check your school’s policy to learn the rules.

 

Are my rights different if I use a school computer or device instead of my own?

Yes. Most schools have rules for their own computers and devices that you have to follow. There may be software installed that monitors your activity, including browsing history, so be cautious of the actions you take while on a shared device. And always log out of your accounts!

Can my school search for my social media activity without telling me?

Yes and No. If your school starts a social media monitoring program, they must let you and your parents know, allow you to see the information they have collected about your social media activity, and delete it when you leave the district or turn 18.

If your school does not have a monitoring program, you do not have the right to know what information teachers and officials find through their own searching on social media. Remember, anything you post publicly can be seen by anybody, including police officers, teachers, officials, and other students.

Can I be disciplined for simply expressing my opinion on social media?

Sometimes. You have the right to speak your mind on social media. Your school cannot punish you just because it doesn’t agree with your opinion. However, you can be disciplined if you say something on social media during school hours or at a school function or event that officials believe could lead to a “substantial disruption,” your school can discipline you.

You can also get in trouble for “cyberbullying” outside of school. This includes creating false profiles, impersonating other students, or creating fake pages in order to bully someone.

What is a “substantial disruption”?

Your speech is a substantial disruption when it encourages violations of school rules, illegal activities, or it risks causing a big interference with the education of other students. For example, threats to other students or your teachers using social media will likely be considered a substantial disruption.

What can I do to prevent school officials from looking at what I post on social media?

Make sure your passwords are secret so that others can’t sign in to your accounts and post as you. Manage your privacy settings to make sure only your friends see your profile and posts. And remember that the people you decide to share with may share your posts with others or in a public way.

Ultimately, with the great power of social media comes great responsibility. Whether online or offline, on-site or off-campus, student communication in the digital era is still plainly a First Amendment issue. We must keep that in mind.

The Role of Social Media for the School Resource Officer

School resource officers (SROs) are now the gatekeepers to an untapped wealth of information. At their fingertips are computer databases containing well-networked contact information of every student who has attended the school, along with photographs and behavior reports. SROs can also utilize social networking web sites which offer staggering amounts of information. These resources allow SROs to identify frequently changing gang and drug trends as well as criminally active juveniles. 

Social Media and Intelligence


Because SROs are familiar with the culture of young people and know who to investigate online, they are at the forefront of social networking and information collection. The abundance of information presented on sites such as Facebook and Twitter can be a huge asset to law enforcement across the country. 

Facebook allows its users to post information and pictures on their personal “wall” covering any topic they wish to write about. Even more intriguing, users can carry on current, written conversations with friends on their wall for anyone to see. 

Twitter enables its users to send minute-by-minute messages or “Tweets” using several methods, including mobile texting, instant messaging and Web-based messaging, to whomever is an accepted “follower.” What makes Twitter unique is that the messages are sent in real time. Frequently, SROs may discover information about gang affiliation, narcotics dealings, underage drinking parties, terroristic threats or plans to disrupt the safety and security of a school.

Online investigations routinely lead to the discovery of photos that depict criminal activity. Brenda Miller, chief deputy attorney for Waseca County, Minn., specializes in juvenile prosecution. She explains, “Photographs can be used to establish probable cause and later be admitted as evidence.” According to Miller, “Photos are actually owned by the social networking web sites, and a person has no expectation of privacy in photographs owned by a third party unless they are trademarked.” 

Working with School Administrators


Successful information collection starts by building cooperative working relationships between SROs and school principals. David Dahl, principal of Armstrong High School in Plymouth, Minn., has devised such a program. Dahl recommends that SROs attend weekly meetings with school administrators. “These meetings are intended to transfer information between school administrators and SROs in an effort to prevent juvenile misconduct and provide needed intervention,” Dahl said. 

SROs also need to gain a better understanding of students’ rights in school, and bring information to school administrators about suspicious activity or suspected criminal misconduct. SROs also have an obligation to work with school district administrators and police supervisors who are interested in implementing communication systems or participating in information sharing programs. SROs must remain dedicated to building strong relationships with school administrators and investigating social media in an effort to collect and disseminate criminal intelligence.


Blake Prewitt, superintendent of Lakeview school district in Battle Creek, Michigan, typically wakes up each morning to twenty new emails from a social media monitoring system the district activated earlier this year. It uses keywords and machine learning algorithms to flag public posts on Twitter and other networks that contain language or images that may suggest conflict or violence, and tag or mention district schools or communities.

In recent months the alert emails have included an attempted abduction outside one school—Prewitt checked if the school’s security cameras could aid police—and a comment about dress code from a student’s relative—district staff contacted the family. Prewitt says the alerts help him keep his 4,000 students and 500 staff safe. “If someone posts something threatening to someone else, we can contact the families and work with the students before it gets to the point of a fight happening in school,” he says.

Lakeview’s service is provided by Firestorm, a Georgia company that also helps schools develop safety and crisis response policies. Hart Brown, Firestorm’s COO, told WIRED that earlier this year, the company’s system flagged a post by a student containing a photo of a backpack with a weapon inside. When the school’s principal approached the student on campus, they were carrying the weapon, Brown says.

Desmond Patton, a professor at Columbia, believes social media monitoring can work if managed correctly. “I think there’s an opportunity for schools to use this as a way to support people but I would do so with extreme caution,” says Patton. His lab has collaborated with social workers trying to reduce gang violence in Chicago to train machine learning software to find tweets expressing trauma and loss. The group has shown updates of those kinds often precede posts containing threats, and is hoping to test its algorithms as tool for community organizations in Chicago and New York City.

Scan public posts, targeting topics and locations not individuals, is a rock solid start to any successful school program. In Lakeview’s schools, students receive classes on social media. Those include guidance on privacy settings, but not discussion of the district’s use of Firestorm’s service. Both companies say they have designed their systems to work for different kinds of slang around the country, and frequently update their vocabularies with fresh data.

Buying Drugs on Instagram: It’s easier than you think

Thought Instagram was for showing off selfies or sharing pics of your vacation in order to be the envy of your friends?

Apparently not…it’s now become the ideal place to connect with drug dealers. The word “obvious” is an understatement for how these dealers operate. With usernames like “ihavedrugs4sale” and drug-riddled posts/pictures, these users eagerly flaunt their offerings. The most popular items in their stock usually include marijuana, prescription painkillers, Xanax, molly (mdma), and lean (codeine syrup mixure).

For those struggling with drug addiction, this presents a huge problem. As the Washington Post reports, searching for the hashtags #oxy, #percocet, #painkillers, #painpills, #oxycontin, #adderall, and #painrelief will return a plethora of posts from Instagram users. Those users may be struggling with addiction, partying like it’s nobody’s business, or dealing the hashtagged drugs online. 

The problem is Instagram’s algorithms can’t distinguish the context the hashtags are used in. And if a user then follows a dealer using the hashtags, Instagram’s algorithms then suggest that user follow more drug dealers. In the course of one day over 50 Instagram dealer accounts were found simply be searching for different hashtags like #weed4sale.

So how does the process work? It will surprise you, or maybe appall, at how simple it is.

Selling Drugs in Social Media

Most dealer profiles have a bunch or “product” photos displaying their inventory and their contact information is in the bio or comments section. While some bravely post their mobile number, most use a messaging app called Kik. No phone numbers or personal info is exchanged here, only user to user messaging.


How are orders fulfilled? It’s as easy as ordering on Amazon. And sometimes faster.


You simply send a message with the product you are interested in purchasing and the dealer responds. Most dealers use wire transfer and can ship out the same day if you send money fast enough.
For what it’s worth, the ability to be connected with drug dealers via social media isn’t a problem unique to Instagram. The same types of posts are widespread on Facebook (which owns Instagram) and Twitter. In recent months Instagram has blocked search results for certain hashtags, such as #fentanyl, #cocaine, and #heroin, all illegal substances. But dealers simply switch to hashtagging their posts with legal drug names, or slightly tweaked the spelling of drug names–and then proceeding to sell both legal and illegal drugs to Instagram users when they connect with them outside of the platform.


Yet still, Instagram’s owner Facebook says it’s aware of the problem and is working to put a stop to the sale of illegal drugs through Instagram, though its initiatives are still in the “early stages.”

As Facebook’s vice president for global marketing solutions, Carolyn Everson, told the Washington Post:
“We’re not yet sophisticated enough to tease apart every post to see if it’s trying to sell someone illegal drugs or they are taking Xanax [because] they are stressed out. Obviously, there is some stuff that gets through that is totally against our policy, and we’re getting better at it.”


www.e-chatter.net
(866) 703-8238

Online Predators: What Every Parent Should Know

Sexual predators do exist and can target both boys and girls of all ages. With the anonymity of the Internet working to their advantage, predators can be whomever they want.

 

Let’s start by answering the question, what is an Internet or online predator?

The standard online predator’s definition is: any person, male or female, using the Internet for the express purpose of targeting a minor to perform non-consent sex acts. They work through anonymity and manipulation. They use emotional vulnerability and the child’s needs to have their emotional point of view validated. The predator mentality is always studying this behavior and is watching and more importantly stalking their next victim.

Predators typically target children with obvious vulnerabilities:

  • Unpopular
  • Feel unloved
  • Seeking attention and friendship
  • Low self-esteem and lack of confidence
  • Isolated from peers
  • Spend time alone
  • Often unsupervised
  • Experiencing family problems

Predators use these issues to befriend the victim and empathize with them while building a “fake” friendship and sense of trust. Social Media provides a means of escape and thus becomes the predominate method for predators to infiltrate an adolescent mind.

Predators can easily find information about potential victims thanks to the internet, social media, and the naivety of children. User profiles can be searched through instant messaging, chat rooms, and video hosting sites such as YouTube. Even simple statements listed on a profile such as school attended, sports played, or pictures in front of a home or car can allow predators to target young people.

In a process known as Predator Grooming, a predator targets a child and engages him or her for the purpose of sexual activity. It involves motivation and intent to sexually exploit the child. It starts with searching chat rooms for child oriented screen names. Once a predator finds a target they will strike up a conversation. Once the victim shows interest it doesn’t take long for the predator to build them up, become their friend, and gain their trust.

What can Parents do to Protect their Children?

Look for potential warning signs from your child, adolescent, or teenager:

  • Spending a lot of time online or on a device
  • Receiving texts, phone calls, or emails from people you don’t know
  • Withdraws from normal activities
  • Closes computer screen or certain apps when you approach
  • Uses hidden accounts for email or messaging
  • Increased sense of stress, worry or desperation

Now it’s time to take action. But instead of inspiring fear in our kids, we want to arm them with information. When you talk to your child, tell them there’s a chance someone could approach them online to get personal information, exchange pictures, and/or meet in person, and it might be someone who feels like an online friend. If that happens and someone starts asking for personal information or talking about sexual stuff, it’s time to get help from an adult.

Know what your child is doing online by asking them which apps, games, and other tech they use. If they’re on social media, friend or follow them. Set rules about times and places for device use — for example, banning phones and tablets from bedrooms. Find out how they chat — is it through an app or their phone’s SMS texting? Make rules around who they can chat with — for instance, only people they know in real life.

If your child plays games, use these questions to probe deeper: Do you chat with others while you’re gaming? What’s been your experience so far? What would you do if someone you didn’t know contacted you? Help them set privacy settings to limit the contacts in their games.

Kids should never share a phone number, address, or even last name with someone they’ve never met. Also, sharing sexy pictures or being overtly sexual online leaves an unwanted legacy, with or without creepy adults, so we need to teach kids about being mindful about their digital footprint. Plus, having nude pictures of a minor — even if you are a minor — is against the law and teens can get into legal trouble as a result.

If you do find your child has had an encounter with a predator or potential predator, make sure you gather evidence by taking screenshots and saving all communications. Get as many details as you can and report it to the platform or service your kid is using, block the person, and find the reporting features on other apps and games your kid uses together. Finally, contact the police. Even though it may seem like a one-time thing, or you don’t want to make it a big deal, it’s best to let the authorities know in case the person is a known offender and to prevent them from doing it to other kids.

online preditors

 

About Us:

We have been mining social media since 2007 for our clients. By utilizing best in class software programs, we offer a service called eChatter.

eChatter works with you to obtain your objectives in a fast, accurate and reliable facet. By keeping our strengthened principals, yet evolving with this industry, we lead in social media monitoring. Since 2007, we have been dedicated to providing our customers with the most authentic data.

 

We offer:

·       Deep Web Scans

·       Jury Vetting

·       Jury Monitoring

·       Quick Scan

 

 

www.e-chatter.net

(866) 703-8238