SlideShare a Scribd company logo
Module XLVIII - Investigating Social
Networking Websites for Evidence:
MySpace, Facebook and Orkut
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
News: Google Gives Brazil
Senate User Info
Source: http://www.sfgate.com/
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
News: Police Tap Student Sites
to Fight Crime
Source: http://www.eschoolnews.com/
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
News: Child Pornography on
Social Networking Websites
Source: http://www.ndtv.com/
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Objective
• Introduction: Social Networking Websites
• MySpace
• Facebook
• Orkut
• Crime Using Social Networking Website
• Investigation Process
• Investigation in MySpace
• Investigation in Facebook
• Investigation in Orkut
• Report Generation
This module will familiarize you with:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow
Introduction:
Social Networking Websites
Crime Using Social
Networking Website
Investigation Process
Investigation in MySpace
Investigation in Facebook
Investigation in Orkut
Report Generation
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Social Networking Sites
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Introduction: Social Networking
A social network is a social structure made of nodes of
individuals and organizations that are tied by one or more
specific types of interdependency, such as values, visions,
idea, financial exchange, friendship etc.
Social networking phenomenon is rapidly increasing among
the youth, since it provides a chance to put forth the ideas
and views to other individuals over the web
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Social Networking Sites
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
MySpace
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
MySpace
MySpace is a social networking site which provides:
Online community to talk with the
friends and make a new ones
Helps in creating business network
Private community to share photos,
journals, and any of the interests
Internet marketers to advertise their
products and services
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
MySpace: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Searching Persons on
MySpace
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Facebook
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Facebook
Facebook is the social networking site which connects people
with friends and others who work, study and live around
them
People use Facebook to keep up with friends, upload an
unlimited number of photos, share links and videos, and
learn more about the people they meet
About Facebook:
• Anyone can join Facebook
• Discover the people around you
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Facebook: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Facebook: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Orkut
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Orkut
Orkut is an online social networking site designed similarly as
MySpace and Facebook
Launched in January 2004, by Google search company
It provides a network for friends and businesses with:
• A public profile which can be viewed by anyone within the community
• Pictures, messages, and video sharing
According to Alexa, Orkut is the eleventh largest web property
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Orkut: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Orkut: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Crime Using Social Networking
Website
Identity Theft
Phasing
Phishing
Blackmailing
Child Harassment
Child Pornography
Social Engineering
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Use of Social Networking
Websites in Investigations
Social networking websites are increasingly used in legal and criminal investigations
Personal information posted on social networking sites is used by police and law
enforcement agencies to prosecute users of said sites
Information recovered from social networking sites can be used in court to corroborate
a case
Facebook is mainly used by law enforcement agencies as a source of evidence against
student users
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Investigation Process
Search for convict’s account on the social
networking site
Mirror the web pages in the CD-ROM
Search on social networking sites
Documenting the evidence gathered
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Search for Convict’s Account on
The Social Networking Site
Search for convict’s account on the social networking site
using the his email address
Email address of the convict can be gathered during
interrogation
If the email address is not founded the search him by his
name and address in the social networking website
Investigator should also have an account with the social
networking site in order to search for the information
related to victim
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Mirror the Web Pages in the CD-
ROM
Mirror the web pages in the CD-ROM using
the following tools:
• HTTrack Web Site Copier offline browser
• Webcrawl
• cURL and Libcurl
• W3Mir
• Web Copier
• Folder Synchronization Tools
• File Dog
• BlackWidow
Website
Mirror
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Investigation on MySpace
• Bulletins: It is the broadcasting method delivering chain messages in the
friend list
• Groups: Groups allow to share a common page and message board in the
friend list
• MySpaceIM: It is the instant messenger in the MySpace account where
the notification of new MySpace messages, friend requests, and
comments are delivered
• MySpaceTV: It is the video sharing application in MySpace
• Applications: Here users could create applications for other users to post
on their profiles
• MySpace Mobile: It is environment in which users can access MySpace
content on their mobile phone
Search for the following in MySpace account:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Investigation on MySpace
(cont’d)
• MySpace News: Here, news is displayed from RSS feeds which
users had submitted
• MySpace Classifieds: Classified service
• MySpace Karaoke: Here, user to upload audio recordings
• MySpace polls: Here, users post polls on their profile and share
them with other users
• MySpace forums: Community server is implemented for the
MySpace users
Search for the following in MySpace account:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Investigation on Facebook
• Friend list
• It is the name and profile of the friends present in the user profile
• News Feed
• It highlights information regarding profile changes, upcoming events,
and birthdays, other updates in the user profile
• Wall
• It is the space where friends can post messages
• Photos
• It is the photo sharing application of Facebook
• Gifts
• It is the virtual gift shop
• Marketplace
• Here, the users can post free classified ads
Facebook is widely used for the surveillance, the
main area of the investigation are as following:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Investigation on Facebook (cont’d)
Pokes
• It is the way of interaction with friends on Facebook
Status
• It inform current whereabouts and actions of a friend
Events
• It shows the upcoming events
Networks and groups
• Facebook have many networks and groups to which many users can
join
Video
• It is the video sharing application in Facebook
Chat
• Here, users can chat with their Facebook friends and on a one-to-one
basis
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Investigation on Orkut
In Orkut account search the following
for gathering evidence:
• Profile
• Scrapbook
• Photos
• Videos
• Testimonials
• View Events
• Friendlist
• Communities
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Investigating Profile
Investigator can find out personal, professional and social information of the
convict
Personal information include height, weight, eye color, hair color etc about the
person
Professional information include education, occupation, industry etc about the
person
Social information include religion, alternative email address, telephone number
about the person
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Investigating Scrapbook
Scrapbook is the main source of investigation here the messages are received
online or offline
The conversation or chatting done by the convict can be easily archived from
here
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Investigating Photos and Video
The photograph or the video recording of the convict can be gathered here
Photo or video folder are locked in some accounts
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Investigating Testimonials
It is the part of the Orkut account where any body can write about the
personality of convict
Here, the investigator can learn about the personality of the person
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Investigating View Events
The investigator can find the event calendar of the convict
Important dates are found here
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Investigating Friend Lists
The friend list contains the profiles of all his friends
It provides a detailed information of who are directly connected as a friend
with the convict
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Investigating Communities
The communities which has joined
shows interest of the person
Community is the group of people where
sharing of knowledge is done
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Report Generation
Note the name of Investigator
List of evidence acquired from social networking website
Documents of the evidence and other supporting items
List of tools used for investigation
Devices and set up used in the examination
Brief description of examination steps
Details about the finding:
• Information about the files
• Internet related evidence
• Data and image analysis
Conclusion of the investigation
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Summary
A social network is a social structure made of nodes of individuals and
organizations that are tied by one or more specific types of interdependency
Web sites providing the social network are referred as social networking sites
MySpace, Facebook, and Orkut are the social networking site which provides
online community to talk with the friends and make new ones
Social networking websites are increasingly used in legal and criminal
investigations
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

More Related Content

What's hot

Prosecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebProsecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the Web
Darius Whelan
 
File000095
File000095File000095
File000095
Desmond Devendran
 
File000097
File000097File000097
File000097
Desmond Devendran
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal law
Hamza Cheema
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
Zaheer Irshad
 
Perspectivesmanage
PerspectivesmanagePerspectivesmanage
Perspectivesmanage
Art Bowker
 
Social media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacySocial media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacy
Yasmin AbdelAziz
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
Muhammad Haroon
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
Case IQ
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer System
Ejiro Ndifereke
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
sohaildanish
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
Aldrin SuperGo
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
Uc Man
 
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!
Wayne Norris
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
Tgarmon34
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
Jonan Momo
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
shiela mae dupa
 
International laws and standards controlling information security. Latest dev...
International laws and standards controlling information security. Latest dev...International laws and standards controlling information security. Latest dev...
International laws and standards controlling information security. Latest dev...
USAID CEED II Project Moldova
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreoffice
solomon24
 
OLC Presentation Jipson
OLC Presentation JipsonOLC Presentation Jipson
OLC Presentation Jipson
University of Dayton
 

What's hot (20)

Prosecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebProsecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the Web
 
File000095
File000095File000095
File000095
 
File000097
File000097File000097
File000097
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal law
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Perspectivesmanage
PerspectivesmanagePerspectivesmanage
Perspectivesmanage
 
Social media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacySocial media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacy
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer System
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
International laws and standards controlling information security. Latest dev...
International laws and standards controlling information security. Latest dev...International laws and standards controlling information security. Latest dev...
International laws and standards controlling information security. Latest dev...
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreoffice
 
OLC Presentation Jipson
OLC Presentation JipsonOLC Presentation Jipson
OLC Presentation Jipson
 

Viewers also liked

File000142
File000142File000142
File000142
Desmond Devendran
 
File000148
File000148File000148
File000148
Desmond Devendran
 
File000173
File000173File000173
File000173
Desmond Devendran
 
[Gerard blokdijk, claire_engle,_jackie_brewster]_i(book_see.org) (1)
[Gerard blokdijk, claire_engle,_jackie_brewster]_i(book_see.org) (1)[Gerard blokdijk, claire_engle,_jackie_brewster]_i(book_see.org) (1)
[Gerard blokdijk, claire_engle,_jackie_brewster]_i(book_see.org) (1)
Desmond Devendran
 
File000136
File000136File000136
File000136
Desmond Devendran
 
File000152
File000152File000152
File000152
Desmond Devendran
 
File000166
File000166File000166
File000166
Desmond Devendran
 
File000150
File000150File000150
File000150
Desmond Devendran
 
File000149
File000149File000149
File000149
Desmond Devendran
 
File000117
File000117File000117
File000117
Desmond Devendran
 
File000113
File000113File000113
File000113
Desmond Devendran
 
File000145
File000145File000145
File000145
Desmond Devendran
 
File000139
File000139File000139
File000139
Desmond Devendran
 
File000174
File000174File000174
File000174
Desmond Devendran
 
File000170
File000170File000170
File000170
Desmond Devendran
 
File000122
File000122File000122
File000122
Desmond Devendran
 
File000175
File000175File000175
File000175
Desmond Devendran
 
Investigating server logs
Investigating server logsInvestigating server logs
Investigating server logs
Animesh Shaw
 
File000169
File000169File000169
File000169
Desmond Devendran
 
File000141
File000141File000141
File000141
Desmond Devendran
 

Viewers also liked (20)

File000142
File000142File000142
File000142
 
File000148
File000148File000148
File000148
 
File000173
File000173File000173
File000173
 
[Gerard blokdijk, claire_engle,_jackie_brewster]_i(book_see.org) (1)
[Gerard blokdijk, claire_engle,_jackie_brewster]_i(book_see.org) (1)[Gerard blokdijk, claire_engle,_jackie_brewster]_i(book_see.org) (1)
[Gerard blokdijk, claire_engle,_jackie_brewster]_i(book_see.org) (1)
 
File000136
File000136File000136
File000136
 
File000152
File000152File000152
File000152
 
File000166
File000166File000166
File000166
 
File000150
File000150File000150
File000150
 
File000149
File000149File000149
File000149
 
File000117
File000117File000117
File000117
 
File000113
File000113File000113
File000113
 
File000145
File000145File000145
File000145
 
File000139
File000139File000139
File000139
 
File000174
File000174File000174
File000174
 
File000170
File000170File000170
File000170
 
File000122
File000122File000122
File000122
 
File000175
File000175File000175
File000175
 
Investigating server logs
Investigating server logsInvestigating server logs
Investigating server logs
 
File000169
File000169File000169
File000169
 
File000141
File000141File000141
File000141
 

Similar to File000161

Intro to Social Networking
Intro to Social NetworkingIntro to Social Networking
Intro to Social Networking
NobleTree Media
 
Going beyond google 2 philadelphia loss conference
Going beyond google 2 philadelphia loss conferenceGoing beyond google 2 philadelphia loss conference
Going beyond google 2 philadelphia loss conference
mikep007
 
introduction to social media for the film industry
introduction to social media for the film industryintroduction to social media for the film industry
introduction to social media for the film industry
Wolfgang Gumpelmaier-Mach
 
Social networking
Social networkingSocial networking
Social networking
Thousheed Ahamed
 
Group 1 Introduction to Social Networking.pptx
Group 1 Introduction to Social Networking.pptxGroup 1 Introduction to Social Networking.pptx
Group 1 Introduction to Social Networking.pptx
JenicaJDizon
 
The Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesThe Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal Issues
M. Prabu Wibowo
 
Social Media Opportunities & Pitfalls
Social Media Opportunities & PitfallsSocial Media Opportunities & Pitfalls
Social Media Opportunities & Pitfalls
appower2
 
Ppt
PptPpt
Social networks
Social networksSocial networks
Social networks
Walid Aitisha
 
Social network
Social networkSocial network
Social network
Virender Dhiman
 
Presentation of International Facility Management Association's Social Media ...
Presentation of International Facility Management Association's Social Media ...Presentation of International Facility Management Association's Social Media ...
Presentation of International Facility Management Association's Social Media ...
International Facility Management Association
 
Social media for conveyancers - Law Society Webinar, 19 September 2014
Social media for conveyancers - Law Society Webinar, 19 September 2014Social media for conveyancers - Law Society Webinar, 19 September 2014
Social media for conveyancers - Law Society Webinar, 19 September 2014
Suzy Ashworth
 
Presentation social networking service
Presentation social networking servicePresentation social networking service
Presentation social networking service
Manish S Thingalaya
 
Creative Commons and the Future of Sharing
Creative Commons and the Future of SharingCreative Commons and the Future of Sharing
Creative Commons and the Future of Sharing
Palo Alto High, Creative Commons, Hewlett Foundation
 
Social media is our new friends presentations
Social media is our new friends presentationsSocial media is our new friends presentations
Social media is our new friends presentations
16mdarmanalam
 
Research
ResearchResearch
Research
triixta
 
Fundraising and Social Media - Davethecfre at CLPGH Foundation Center
Fundraising and Social Media - Davethecfre at CLPGH Foundation CenterFundraising and Social Media - Davethecfre at CLPGH Foundation Center
Fundraising and Social Media - Davethecfre at CLPGH Foundation Center
Dave Tinker, CFRE
 
Copyright education in the age of social media
Copyright education in the age of social mediaCopyright education in the age of social media
Copyright education in the age of social media
Jane Secker
 
Living Online
Living OnlineLiving Online
Living Online
Paul McMahon
 
Social media and Privacy - Australian Computer Society
Social media and Privacy - Australian Computer SocietySocial media and Privacy - Australian Computer Society
Social media and Privacy - Australian Computer Society
Typeset
 

Similar to File000161 (20)

Intro to Social Networking
Intro to Social NetworkingIntro to Social Networking
Intro to Social Networking
 
Going beyond google 2 philadelphia loss conference
Going beyond google 2 philadelphia loss conferenceGoing beyond google 2 philadelphia loss conference
Going beyond google 2 philadelphia loss conference
 
introduction to social media for the film industry
introduction to social media for the film industryintroduction to social media for the film industry
introduction to social media for the film industry
 
Social networking
Social networkingSocial networking
Social networking
 
Group 1 Introduction to Social Networking.pptx
Group 1 Introduction to Social Networking.pptxGroup 1 Introduction to Social Networking.pptx
Group 1 Introduction to Social Networking.pptx
 
The Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesThe Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal Issues
 
Social Media Opportunities & Pitfalls
Social Media Opportunities & PitfallsSocial Media Opportunities & Pitfalls
Social Media Opportunities & Pitfalls
 
Ppt
PptPpt
Ppt
 
Social networks
Social networksSocial networks
Social networks
 
Social network
Social networkSocial network
Social network
 
Presentation of International Facility Management Association's Social Media ...
Presentation of International Facility Management Association's Social Media ...Presentation of International Facility Management Association's Social Media ...
Presentation of International Facility Management Association's Social Media ...
 
Social media for conveyancers - Law Society Webinar, 19 September 2014
Social media for conveyancers - Law Society Webinar, 19 September 2014Social media for conveyancers - Law Society Webinar, 19 September 2014
Social media for conveyancers - Law Society Webinar, 19 September 2014
 
Presentation social networking service
Presentation social networking servicePresentation social networking service
Presentation social networking service
 
Creative Commons and the Future of Sharing
Creative Commons and the Future of SharingCreative Commons and the Future of Sharing
Creative Commons and the Future of Sharing
 
Social media is our new friends presentations
Social media is our new friends presentationsSocial media is our new friends presentations
Social media is our new friends presentations
 
Research
ResearchResearch
Research
 
Fundraising and Social Media - Davethecfre at CLPGH Foundation Center
Fundraising and Social Media - Davethecfre at CLPGH Foundation CenterFundraising and Social Media - Davethecfre at CLPGH Foundation Center
Fundraising and Social Media - Davethecfre at CLPGH Foundation Center
 
Copyright education in the age of social media
Copyright education in the age of social mediaCopyright education in the age of social media
Copyright education in the age of social media
 
Living Online
Living OnlineLiving Online
Living Online
 
Social media and Privacy - Australian Computer Society
Social media and Privacy - Australian Computer SocietySocial media and Privacy - Australian Computer Society
Social media and Privacy - Australian Computer Society
 

More from Desmond Devendran

Siam key-facts
Siam key-factsSiam key-facts
Siam key-facts
Desmond Devendran
 
Siam foundation-process-guides
Siam foundation-process-guidesSiam foundation-process-guides
Siam foundation-process-guides
Desmond Devendran
 
Siam foundation-body-of-knowledge
Siam foundation-body-of-knowledgeSiam foundation-body-of-knowledge
Siam foundation-body-of-knowledge
Desmond Devendran
 
Enterprise service-management-essentials
Enterprise service-management-essentialsEnterprise service-management-essentials
Enterprise service-management-essentials
Desmond Devendran
 
Service Integration and Management
Service Integration and Management Service Integration and Management
Service Integration and Management
Desmond Devendran
 
Diagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_enDiagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_en
Desmond Devendran
 
CHFI 1
CHFI 1CHFI 1
File000176
File000176File000176
File000176
Desmond Devendran
 
File000172
File000172File000172
File000172
Desmond Devendran
 
File000171
File000171File000171
File000171
Desmond Devendran
 
File000168
File000168File000168
File000168
Desmond Devendran
 
File000167
File000167File000167
File000167
Desmond Devendran
 
File000164
File000164File000164
File000164
Desmond Devendran
 
File000163
File000163File000163
File000163
Desmond Devendran
 
File000162
File000162File000162
File000162
Desmond Devendran
 
File000156
File000156File000156
File000156
Desmond Devendran
 
File000153
File000153File000153
File000153
Desmond Devendran
 

More from Desmond Devendran (17)

Siam key-facts
Siam key-factsSiam key-facts
Siam key-facts
 
Siam foundation-process-guides
Siam foundation-process-guidesSiam foundation-process-guides
Siam foundation-process-guides
 
Siam foundation-body-of-knowledge
Siam foundation-body-of-knowledgeSiam foundation-body-of-knowledge
Siam foundation-body-of-knowledge
 
Enterprise service-management-essentials
Enterprise service-management-essentialsEnterprise service-management-essentials
Enterprise service-management-essentials
 
Service Integration and Management
Service Integration and Management Service Integration and Management
Service Integration and Management
 
Diagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_enDiagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_en
 
CHFI 1
CHFI 1CHFI 1
CHFI 1
 
File000176
File000176File000176
File000176
 
File000172
File000172File000172
File000172
 
File000171
File000171File000171
File000171
 
File000168
File000168File000168
File000168
 
File000167
File000167File000167
File000167
 
File000164
File000164File000164
File000164
 
File000163
File000163File000163
File000163
 
File000162
File000162File000162
File000162
 
File000156
File000156File000156
File000156
 
File000153
File000153File000153
File000153
 

Recently uploaded

What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 

Recently uploaded (20)

What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 

File000161

  • 1. Module XLVIII - Investigating Social Networking Websites for Evidence: MySpace, Facebook and Orkut
  • 2. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited News: Google Gives Brazil Senate User Info Source: http://www.sfgate.com/
  • 3. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited News: Police Tap Student Sites to Fight Crime Source: http://www.eschoolnews.com/
  • 4. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited News: Child Pornography on Social Networking Websites Source: http://www.ndtv.com/
  • 5. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Objective • Introduction: Social Networking Websites • MySpace • Facebook • Orkut • Crime Using Social Networking Website • Investigation Process • Investigation in MySpace • Investigation in Facebook • Investigation in Orkut • Report Generation This module will familiarize you with:
  • 6. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Flow Introduction: Social Networking Websites Crime Using Social Networking Website Investigation Process Investigation in MySpace Investigation in Facebook Investigation in Orkut Report Generation
  • 7. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Social Networking Sites
  • 8. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Introduction: Social Networking A social network is a social structure made of nodes of individuals and organizations that are tied by one or more specific types of interdependency, such as values, visions, idea, financial exchange, friendship etc. Social networking phenomenon is rapidly increasing among the youth, since it provides a chance to put forth the ideas and views to other individuals over the web
  • 9. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Social Networking Sites
  • 10. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited MySpace
  • 11. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited MySpace MySpace is a social networking site which provides: Online community to talk with the friends and make a new ones Helps in creating business network Private community to share photos, journals, and any of the interests Internet marketers to advertise their products and services
  • 12. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited MySpace: Screenshot
  • 13. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Searching Persons on MySpace
  • 14. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Facebook
  • 15. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Facebook Facebook is the social networking site which connects people with friends and others who work, study and live around them People use Facebook to keep up with friends, upload an unlimited number of photos, share links and videos, and learn more about the people they meet About Facebook: • Anyone can join Facebook • Discover the people around you
  • 16. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Facebook: Screenshot
  • 17. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Facebook: Screenshot
  • 18. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 19. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Orkut
  • 20. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Orkut Orkut is an online social networking site designed similarly as MySpace and Facebook Launched in January 2004, by Google search company It provides a network for friends and businesses with: • A public profile which can be viewed by anyone within the community • Pictures, messages, and video sharing According to Alexa, Orkut is the eleventh largest web property
  • 21. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Orkut: Screenshot
  • 22. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Orkut: Screenshot
  • 23. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 24. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Crime Using Social Networking Website Identity Theft Phasing Phishing Blackmailing Child Harassment Child Pornography Social Engineering
  • 25. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Use of Social Networking Websites in Investigations Social networking websites are increasingly used in legal and criminal investigations Personal information posted on social networking sites is used by police and law enforcement agencies to prosecute users of said sites Information recovered from social networking sites can be used in court to corroborate a case Facebook is mainly used by law enforcement agencies as a source of evidence against student users
  • 26. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigation Process Search for convict’s account on the social networking site Mirror the web pages in the CD-ROM Search on social networking sites Documenting the evidence gathered
  • 27. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Search for Convict’s Account on The Social Networking Site Search for convict’s account on the social networking site using the his email address Email address of the convict can be gathered during interrogation If the email address is not founded the search him by his name and address in the social networking website Investigator should also have an account with the social networking site in order to search for the information related to victim
  • 28. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Mirror the Web Pages in the CD- ROM Mirror the web pages in the CD-ROM using the following tools: • HTTrack Web Site Copier offline browser • Webcrawl • cURL and Libcurl • W3Mir • Web Copier • Folder Synchronization Tools • File Dog • BlackWidow Website Mirror
  • 29. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigation on MySpace • Bulletins: It is the broadcasting method delivering chain messages in the friend list • Groups: Groups allow to share a common page and message board in the friend list • MySpaceIM: It is the instant messenger in the MySpace account where the notification of new MySpace messages, friend requests, and comments are delivered • MySpaceTV: It is the video sharing application in MySpace • Applications: Here users could create applications for other users to post on their profiles • MySpace Mobile: It is environment in which users can access MySpace content on their mobile phone Search for the following in MySpace account:
  • 30. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigation on MySpace (cont’d) • MySpace News: Here, news is displayed from RSS feeds which users had submitted • MySpace Classifieds: Classified service • MySpace Karaoke: Here, user to upload audio recordings • MySpace polls: Here, users post polls on their profile and share them with other users • MySpace forums: Community server is implemented for the MySpace users Search for the following in MySpace account:
  • 31. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigation on Facebook • Friend list • It is the name and profile of the friends present in the user profile • News Feed • It highlights information regarding profile changes, upcoming events, and birthdays, other updates in the user profile • Wall • It is the space where friends can post messages • Photos • It is the photo sharing application of Facebook • Gifts • It is the virtual gift shop • Marketplace • Here, the users can post free classified ads Facebook is widely used for the surveillance, the main area of the investigation are as following:
  • 32. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigation on Facebook (cont’d) Pokes • It is the way of interaction with friends on Facebook Status • It inform current whereabouts and actions of a friend Events • It shows the upcoming events Networks and groups • Facebook have many networks and groups to which many users can join Video • It is the video sharing application in Facebook Chat • Here, users can chat with their Facebook friends and on a one-to-one basis
  • 33. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigation on Orkut In Orkut account search the following for gathering evidence: • Profile • Scrapbook • Photos • Videos • Testimonials • View Events • Friendlist • Communities
  • 34. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigating Profile Investigator can find out personal, professional and social information of the convict Personal information include height, weight, eye color, hair color etc about the person Professional information include education, occupation, industry etc about the person Social information include religion, alternative email address, telephone number about the person
  • 35. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigating Scrapbook Scrapbook is the main source of investigation here the messages are received online or offline The conversation or chatting done by the convict can be easily archived from here
  • 36. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigating Photos and Video The photograph or the video recording of the convict can be gathered here Photo or video folder are locked in some accounts
  • 37. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigating Testimonials It is the part of the Orkut account where any body can write about the personality of convict Here, the investigator can learn about the personality of the person
  • 38. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigating View Events The investigator can find the event calendar of the convict Important dates are found here
  • 39. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigating Friend Lists The friend list contains the profiles of all his friends It provides a detailed information of who are directly connected as a friend with the convict
  • 40. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigating Communities The communities which has joined shows interest of the person Community is the group of people where sharing of knowledge is done
  • 41. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Report Generation Note the name of Investigator List of evidence acquired from social networking website Documents of the evidence and other supporting items List of tools used for investigation Devices and set up used in the examination Brief description of examination steps Details about the finding: • Information about the files • Internet related evidence • Data and image analysis Conclusion of the investigation
  • 42. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Summary A social network is a social structure made of nodes of individuals and organizations that are tied by one or more specific types of interdependency Web sites providing the social network are referred as social networking sites MySpace, Facebook, and Orkut are the social networking site which provides online community to talk with the friends and make new ones Social networking websites are increasingly used in legal and criminal investigations
  • 43. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 44. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 45. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited