This document discusses social media forensics and the use of social media evidence. It explains that social media evidence, such as posts, messages, photos and location data from platforms like Facebook, Twitter and LinkedIn, can be collected and analyzed for use in investigations and legal cases. The document outlines methods for collecting, preserving and requesting social media evidence and provides examples of the types of information that can be obtained, such as IP addresses, login/logout times, and location history. It also discusses how automatic sharing settings and graph search tools can produce unintended evidence from a user's online activities and presence.
Talk for the Ohio State University student chapter of the Society of Professional Journalists on February 21, 2013. Covers tools for managing information overload and workflow, tools for verifying information online and concludes with a section on other interesting apps and tools.
Digital Communications - Social Media, Content and MoreDanielle Brigida
For the #FriendsForward Conference, we talked about using digital properties like your website and social accounts to make the most of your important mission and engage with awesome supporters.
Learning Objectives:
1. Understand how this unique, emergent form of evidence can be used for criminal investigations and civil litigation e-discovery.
2. Discover the DoJ memo to law enforcement uncovered by FOIA stressing why and how to use social media in criminal cases.
3. See social media evidence recovered from smart phones, personal computers, and the cloud.
4. Learn the ethics of social media evidence collection including what you can and cannot do, if you want to keep your license that is.
This presentation shows how to use social media data and analysis in academic research in the field of marketing, economics, consumer behavior, and psychology. LiveWall (www.li.vewall.com) collects social data and allows you to use it for research.
Talk for the Ohio State University student chapter of the Society of Professional Journalists on February 21, 2013. Covers tools for managing information overload and workflow, tools for verifying information online and concludes with a section on other interesting apps and tools.
Digital Communications - Social Media, Content and MoreDanielle Brigida
For the #FriendsForward Conference, we talked about using digital properties like your website and social accounts to make the most of your important mission and engage with awesome supporters.
Learning Objectives:
1. Understand how this unique, emergent form of evidence can be used for criminal investigations and civil litigation e-discovery.
2. Discover the DoJ memo to law enforcement uncovered by FOIA stressing why and how to use social media in criminal cases.
3. See social media evidence recovered from smart phones, personal computers, and the cloud.
4. Learn the ethics of social media evidence collection including what you can and cannot do, if you want to keep your license that is.
This presentation shows how to use social media data and analysis in academic research in the field of marketing, economics, consumer behavior, and psychology. LiveWall (www.li.vewall.com) collects social data and allows you to use it for research.
Deep Dive Into Social Media and Content StrategyDanielle Brigida
Presentation for J.Boye Conference in Aarhus, Denmark. How you can use social media and content to enrich your strategy.By combining content strategy, social listening and measurement tactics it will help you make the most out of social media.
Fundamentals for the New Era PR Pro with Sarah EvansCision
Watch the webinar replay, free: http://bit.ly/1jYI3bs
PR is evolving as social and digital become ubiquitous. Understanding the full scope of emerging PR opportunities is critical to success.
Learn how to plan, share and engage in this brave new world with tactics from PR strategist Sarah Evans. Watch the free replay of her webinar to:
-Create credible content by thinking like a producer, editor and journalist.
-Improve workflow efficiency with real-time tips and tools.
-Ensure future organizational and individual success by looking at the big picture.
Don’t let the future pass you by. Watch Sarah’s webinar here: http://bit.ly/1jYI3bs
About the Speaker:
Sarah Evans is the owner of Sevans Strategy, a public relations and new media consultancy. She created and moderates #Journchat, the first-ever weekly live tweetchat for PR pros, journalists and bloggers. Sarah has been listed in Vanity Fair’s America’s Tweethearts, Forbes’ 14 Power Women to Follow on Twitter, and Entrepreneur’s Top 10 Hot Startups.
The slideshow accompanied a TechTalk on Social Media: Coping with the Risks presented on Thursday, March 28, 2019, by Jonathan Bacon for the Johnson County Community College Retirees Association.
Session Description: Communication between family and friends today typically includes the use of social media. Any involvement with social media includes risks that threaten your privacy and personal finances. Yet involvement is hard to avoid since we all rely on texts, email, Facebook and other online communications for personal, professional and financial activities. In this session, we’ll discuss the risks, online etiquette, defensive behaviors and other solutions to the online threats we all face.
In these slides, I, Susan Banducci and Iulia Cioroianu from the University of Exeter talk about online data sources and how you use those to answer questions about information exposure.
Hashtag Conversations,Eventgraphs, and User Ego Neighborhoods: Extracting So...Shalin Hai-Jew
This introduces methods for extracting and analyzing social network data from Twitter for hashtag conversations (and emergent events), event graphs, search networks, and user ego neighborhoods (using NodeXL). There will be direct demonstrations and discussions of how to analyze social network graphs. This information may be extended with human- and / or machine-based sentiment analysis.
Analysis of Cyberbullying Tweets in Trending World Eventskcortis
This paper was presented at the 15th International Conference on Knowledge Technologies and Data-Driven Business (http://i-know.tugraz.at/) in Graz, Austria on 21 October 2015.
The full paper can be found at: http://doi.acm.org/10.1145/2809563.2809605
NENA 2017 Doxing and Social EngineeringJack Kessler
PSAPs and their personnel are susceptible to cyber-attack techniques like social engineering and doxing, due mainly to the vast amounts of personal data available on the Internet, in addition to the inherently helpful nature of people. This presentation demonstrates how 9-1-1 professionals may be unknowingly broadcasting information that hackers can use to do damage to people and infrastructure and how PSAPs can mitigate these risks.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
More Related Content
Similar to Week 10 Social Media Forensics (3).pptx
Deep Dive Into Social Media and Content StrategyDanielle Brigida
Presentation for J.Boye Conference in Aarhus, Denmark. How you can use social media and content to enrich your strategy.By combining content strategy, social listening and measurement tactics it will help you make the most out of social media.
Fundamentals for the New Era PR Pro with Sarah EvansCision
Watch the webinar replay, free: http://bit.ly/1jYI3bs
PR is evolving as social and digital become ubiquitous. Understanding the full scope of emerging PR opportunities is critical to success.
Learn how to plan, share and engage in this brave new world with tactics from PR strategist Sarah Evans. Watch the free replay of her webinar to:
-Create credible content by thinking like a producer, editor and journalist.
-Improve workflow efficiency with real-time tips and tools.
-Ensure future organizational and individual success by looking at the big picture.
Don’t let the future pass you by. Watch Sarah’s webinar here: http://bit.ly/1jYI3bs
About the Speaker:
Sarah Evans is the owner of Sevans Strategy, a public relations and new media consultancy. She created and moderates #Journchat, the first-ever weekly live tweetchat for PR pros, journalists and bloggers. Sarah has been listed in Vanity Fair’s America’s Tweethearts, Forbes’ 14 Power Women to Follow on Twitter, and Entrepreneur’s Top 10 Hot Startups.
The slideshow accompanied a TechTalk on Social Media: Coping with the Risks presented on Thursday, March 28, 2019, by Jonathan Bacon for the Johnson County Community College Retirees Association.
Session Description: Communication between family and friends today typically includes the use of social media. Any involvement with social media includes risks that threaten your privacy and personal finances. Yet involvement is hard to avoid since we all rely on texts, email, Facebook and other online communications for personal, professional and financial activities. In this session, we’ll discuss the risks, online etiquette, defensive behaviors and other solutions to the online threats we all face.
In these slides, I, Susan Banducci and Iulia Cioroianu from the University of Exeter talk about online data sources and how you use those to answer questions about information exposure.
Hashtag Conversations,Eventgraphs, and User Ego Neighborhoods: Extracting So...Shalin Hai-Jew
This introduces methods for extracting and analyzing social network data from Twitter for hashtag conversations (and emergent events), event graphs, search networks, and user ego neighborhoods (using NodeXL). There will be direct demonstrations and discussions of how to analyze social network graphs. This information may be extended with human- and / or machine-based sentiment analysis.
Analysis of Cyberbullying Tweets in Trending World Eventskcortis
This paper was presented at the 15th International Conference on Knowledge Technologies and Data-Driven Business (http://i-know.tugraz.at/) in Graz, Austria on 21 October 2015.
The full paper can be found at: http://doi.acm.org/10.1145/2809563.2809605
NENA 2017 Doxing and Social EngineeringJack Kessler
PSAPs and their personnel are susceptible to cyber-attack techniques like social engineering and doxing, due mainly to the vast amounts of personal data available on the Internet, in addition to the inherently helpful nature of people. This presentation demonstrates how 9-1-1 professionals may be unknowingly broadcasting information that hackers can use to do damage to people and infrastructure and how PSAPs can mitigate these risks.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Delivering Micro-Credentials in Technical and Vocational Education and TrainingAG2 Design
Explore how micro-credentials are transforming Technical and Vocational Education and Training (TVET) with this comprehensive slide deck. Discover what micro-credentials are, their importance in TVET, the advantages they offer, and the insights from industry experts. Additionally, learn about the top software applications available for creating and managing micro-credentials. This presentation also includes valuable resources and a discussion on the future of these specialised certifications.
For more detailed information on delivering micro-credentials in TVET, visit this https://tvettrainer.com/delivering-micro-credentials-in-tvet/
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...NelTorrente
In this research, it concludes that while the readiness of teachers in Caloocan City to implement the MATATAG Curriculum is generally positive, targeted efforts in professional development, resource distribution, support networks, and comprehensive preparation can address the existing gaps and ensure successful curriculum implementation.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Pride Month Slides 2024 David Douglas School District
Week 10 Social Media Forensics (3).pptx
1. Program Studi Teknik Informatika
Fakultas Teknik – Universitas Surabaya
Social Media Forensics
2. Program Studi Teknik Informatika
Fakultas Teknik – Universitas Surabaya
Social Media Evidence: What you put on
Facebook or Instagram or Twitter or Youtube?
8. Facebook Produces Evidence
• Party Admissions – What Facebook data?
– Posts, E-mail, Friends
• State of Mind – What Facebook data?
– Status Updates
• Witness Credibility - What Facebook data?
– Posts, E-mail, Places, Friends, Contact Info
• Witness Character - What Facebook data?
– Photos, Videos, Likes, Apps
9. Why is Facebook the New Confessional?
• Speed and breadth amplify communication velocity
• Insecure communication
– Privacy controls constantly changing and often misunderstood
– Risk of impersonation by fake profiles – e.g. defamation
• Rapid, short and snappy communication
– Not reviewed, nor proofread; often grossly inaccurate
– Lacking context and precise meaning
– Interpretation often left to reader
• Lack of control over content – often ‘goes viral’
• Tacitly encourages candor as key social behavior
– Evidence often surprisingly relevant, incriminating, and powerful for
impeachment
10. “Frictionless Sharing” – Oversharing
Automatic, Passive, Real-Time Updates
• Logging into web sites with Facebook identity can trigger automatic
sharing on Facebook of activity on external sites:
– Yahoo! News, Washington Post, The Guardian
– Spotify, Rhapsody
– Netflix, Hulu
13. Social Media – Law Enforcement
• “As a prosecutor, the first thing I do when I get a case is to Google
the victim, the suspect, and all the material witnesses. I run them all
through Facebook, MySpace, Twitter, Youtube, and see what I might
get. I also do a ‘Google image search’’ and see what pops up.
Sometimes there’s nothing, but other times I get the goods –
pictures, status updates, and better yet, blogs and articles they’ve
written.”
– A former deputy district attorney for Los Angeles County
• “You find out about people you never would have known”
– Dean Johnston, California Bureau of Narcotics Enforcement
14. Social Media Evidence
• What is Social Media Forensics?
• The application of computer investigation and analysis techniques to
gather information evidence from online sources, suitable for
presentation in a court of law.
15. Social Media Evidence
• Collection Methods:
– Screen scrape/ screen capture
– Manual documentation
– Open source tools (HTTrack)
– Commercial tool (X1)
– Web service (Pagefreezer)
– Forensics recovery
– Content subpoena
16. Social Media Case Investigations
• Analysis
• Information Bases
• Online Preservation and Collection
• Admissibility
17. Social Media - Discovery
• Electronically stored information (ESI) is data that is created,
altered, communicated and stored in digital form.
• What ESI available for review?
• Evidence strategies – computer and mobile devices
• Request for evidence
18. What ESI can we get for review?
content Pushed content metada
Friends, friends of friends,
connections, followers, etc.
E-mail notifications with
metadata
Site names
Status updates,
relationship status, etc.
RSS Feeds with Metadata Date/Time Stamps
Email, chat, text messages,
friend request, pokes, etc.
Uniform Resource Locators
(URLs)
Timeline (profile) – name,
picture, gender, contact,
birthday, etc.
Geoloaction information
(Check-ins)
Wall, posts, comments,
tags, etc.
IP Logs
Likes, reads, views, listens,
etc.
Login/Logout logs
Networks, groups, events,
etc.
Photos, videos, Audio,
Music, tags
Apps, App Data, Games
19. Evidence Strategies - Computer
• If target’s evidence is insufficient
– Social media evidence is missing
– Evidence destruction is suspected
• Should look outside Facebook
– E-mail notifications
– RSS containing content & time stamps pushed out by social media site
• Move for warrant/court order for computer forensics analysis of
opposition hard drives
• Recorver social media evidence
• What evidence? What will it look like?
21. Social Media Evidence
• Anatomy Twitter Tweet
– RT = re-tweet
– @xxxxx = a twitter user name
– #xxxxx = hashtag, a subject or reference identifier
– Htttp://xxx = a link, usually shortened to fit in tweet
– Max character for tweet?
– Twitter Feeds
25. Social Media Evidence- Example
• Target Profile
• Profile (Timeline) information (e.g. contact information, interest, groups)
• Wall (timeline) posts and content that posted into profile (timeline)
• Photos and videos uploaded to account
• Friend list
• Notes created
• Events to which having RSVP
• Sent and received messages
• Any comments on Wall (timeline) posts, photos, and other profile content.
26. Evidence Elements
• IP addreses: any IP addresses that stored who accessed to account
• Login info: a list of logins that have stored
• Logout info: the ip address from which logged out
• Pending friend request: friend request that an account sent but have not accepted or rejected.
• Account status changes: dates when an account was reactivated, deactivated, disabled or
deleted.
• Poke info: information about the pokes exchanged
• Events info: events that accepted, declined, and responded maybe to by an account
• Other profile (timeline) info: the mobile phone numbers that added to an account
• City & hometown
• Family members
• Relationsship info (names and statuses)
• A list of the language that added to an account
• A history of any changes that have made to the name profile.