2. Who Am I?
• Computer Forensic Examiner – DC3 / DCFL
• Senior Consultant – cmdLabs
• Published author/coauthor of some books
3. Overview
• Basics of Twitter
• Search Capabilities
• Dissecting the Tweet
• Long-term Archiving
• Link Analysis
4. What is Twitter
• Micro-blogging site
– 140-character short messages
– Twitter : Facebook : SMS : Email
– Began in 2006 but already has 200mil users*
– As of June 2010: 65m tweets/day, 750 tweets/second
– Open design allows access from web or client
* http://www.pcmag.com/article2/0,2817,2371826,00.asp
7. Tweet Philosophy
• Celebrity-driven approach
– Anyone can follow anyone
– Focus for many is on collecting followers
– One-way relationships instead of two-way
(FaceBook/MySpace)
• You can follow me, but I don’t have to follow you
• Users follow others that interest them
– Tweets made by others appear in your “timeline”
8. Who Uses It
• 13% of Online Americans use Twitter*
– Up from 8% a year ago
– Most between ages of 18-29
– Ethnicity favored to Black and Hispanic
– Urban environments more than suburban/rural
– Biggest user base: young urban minorities
– Large communities around any topic
*http://www.pewinternet.org/~/media/Files/Reports/2011/Twit
ter%20Update%202011.pdf
9. Comms Channel
• Widely used as a communications channel when others
fail (or are censored)
– Iran – 2009 – Protests over election results
• Twitter to take down site for maintenance
• US State Department prompted Twitter to hold-off
– Egypt – January 2011
• Protests to overthrow 30-year President and instill democracy
11. Tweets and Replies
• Tweets appear in your
public timeline
• Only shows broadcast
tweets or replies to
others you follow
• Will not include normal
messages from people
you do not follow
12. Mentions
• When someone tweets your
name preceded by @
• If you follow them, shows in
timeline
• Otherwise, have to check
‘@Mentions’
15. Protected Accounts
• Not viewable by public
• Users have to request permission to follow you
• Only users allowed to follow you can see your
tweets
• @Mentions only show up to followers
• Tweets do not appear in search
16. Direct Messages
• Private messages sent between two users
• ‘D [or DM] User Message’
• Receiver must follow the sender
– Possible for uni-directional DMs if both parties don’t follow
each other
• Message sent through Twitter and email
• DM Fails*
*http://thenextweb.com/socialmedia/
2010/08/05/has-twitter-employees-
dm-fail-confirmed-shoutout-feature/
17. Notifications
• Users get email notifications when receiving:
– New followers
– Direct Messages
– Often delayed
– Not consistent
– TweetDeck better
18. Favorites
• Users can star a tweet to
save it as a favorite
• Anyone can view
someone else’s favorite
list
twitter.com/<user>/favorites
19. Hash Tags
• Popular way of grouping tweets
• Simplifies searching
• #Keyword
– #CyberCrime2012
– #FF (Follow Friday)
– #DFIR
– #TheWalkingDead
22. Search Limitations
• Only search tweets up to about two weeks old
• API limits on how many results you can retrieve at one
time
– Law enforcement request to Twitter can whitelist an
LE account to near unlimited results
• Very unreliable
23. Google Search
• Google used to provide immediate Twitter search
results
• Results can span back multiple years
• Service died at the start of Google Plus
30. Twitter Account Creation
• Gives date when any account was created
– Chrome plugin (old Twitter only)
• https://chrome.google.com/extensions/detail/pfpkfkhhigghmggnhfjdfjiihmeancof?hl=en
– http://www.whendidyoujointwitter.com/
32. TweetDeck Forensics
• %AppData%Tweetdeck.<xyz>Local Store
td_26_<username>.db (SQLite Database)
– ‘friends’ – Details on all accounts the user follows
• Twitter User #, Name, Screen Name, URL to profile image
• fUserID (Twitter User #) can show relative age of accounts
• Includes accounts that even no longer exist
– ‘columns’ – What columns are currently shown to client
– ‘lists’ – Lists the user manages
• Name, public/private, URL, # of members, description
34. Application Cached Data
• Applications cache tweets upon download
– If a tweet is deleted a cached copy may still exist in
third-party application
– Possible for message to be read/repeated even after
being deleted at its source
– Forensic Caching:
• Archivist (http://visitmix.com/labs/archivist-desktop/)
• Twinbox – Saves all tweets to Outlook inbox
35. Tweet Scraping
• Tools to automatically collect and save
relevant tweets
– Archivist (http://visitmix.com/labs/archivist-
desktop/)
– Twinbox – Saves all tweets to Outlook inbox
– Twitter Archive Google Spreadsheet (TAGS) -
http://mashe.hawksey.info/2012/01/twitter-
archive-tagsv3/
39. URL Shorteners
• Due to size limitation of tweets, URL
shorteners are common place
– Vector of attack
– Most offer preview capability:
• http://bit.ly/gAhOlo+
• http://preview.tinyurl.com/62j4zla
– http://resolves.me – Universal URL Previewer
42. Tweet Longer
• Due to size limitation of tweets, message
extension services are also somewhat
common.
– TwitLonger hosts extended posts
– Hosts on TwitLonger.com
– Uses tl.gd domain
43. Media Hosting
• Twitter is limited to just text
content. Media services provide
image / video hosting
– Images: yFrog, TwitPic, Flikr
– Video: TwitVid, Twiddeo, Twitc
• If tweet is removed media
remains
• EXIF data remains to be exploited
– iCanStalkU.com
Janis Krums
50. Maltego
• Professional data analysis tool
• “Social Networking Special Ops” - Chris
Sumner (Suggy) at BlackHat
http://www.securityg33k.com/blog/?p=180
• Mining data from a
Twitter scavenger hunt
51. Take Away Notes
• Following someone does not show the entirety of
their communications
• Targets are notified if you follow/favorite them
• Twitter’s search is very impaired
• Information spreads beyond core-Twitter site
• Follow early and archive tweets using third-party
tools for later analysis
• Use Link-Analysis to find outliers