Abstract
This paper proposes a two-stage model for identifying and contextualizing features from artefacts created as a result of social networking activity. This technique can be useful in digital investigations and is based on understanding and the deconstruction of the processes that take place prior to, during and after user activity; this includes corroborating artefacts. Digital Investigations are becoming more complex due to factors such as, the volume of data to be examined; different data formats; a wide range of sources for digital evidence; the volatility of data and the limitations of some of the standard digital forensic tools. This paper highlights the need for an approach that enables digital investigators to prioritize social network artefacts to be further analysed; determine social connections in the context of an investigation e.g. a user’s social relationships, how recovered artefacts came to be, and how they can successfully be used as evidence in court.
References
- ACPO. (2012). Good Practice Guide for Digital Evidence. Retrieved from http://library.college.police.uk/docs/acpo/digital-evidence-2012.pdf (Version: 5.0)
- Agency. (2015). Five internet trolls a day convicted in UK as figures show ten-fold increase. Retrieved from https://www.telegraph.co.uk/news/uknews/law-and-order/11627180/Five-internet-trolls-a-day-convicted-in-UK-as-figures-show-ten-fold-increase.html
- Arshad, H., Jantan, A., & Omolara, E. (2019). Evidence collection and forensics on social networks: Research challenges and directions. Digital Investigation, 28 , 126 - 138.
- BBC. (2010). BBC News – Facebook murderer to serve at least 35 years (No. 6/27/2010). Retrieved from http://news.bbc.co.uk/1/hi/england/wear/8555221.stm
- BBC News. (2012). Huge rise in social media 'crimes'. Retrieved from https://www.bbc.co.uk/news/uk-20851797
- Bello, M., & DiBlasio, N. (2013). Twitter: The new face of crime. USA Today. Retrieved from http://www.usatoday.com/story/news/nation/2013/09/29/twitter-crime-dark-side/2875745/
- Berners-Lee, T., Masinter, L., & McCahill, M. (1994). Uniform Resource Locators (URL) - RFC 1738. Retrieved from http://www.ietf.org/rfc/rfc1738.txt
- Bowcott, O., Carter, H., & Clifton, H. (2011). Facebook riot calls earn men four-year jail terms amid sentencing outcry. Retrieved from https://www.theguardian.com/uk/2011/aug/16/facebook-riot-calls-men-jailed
- Cambridge University Press. (2019). Cambridge Dictionary [Online]. Retrieved from http://dictionary.cambridge.org
- Carvey, H. (2018). RegRipper. Retrieved from https://github.com/keydet89/RegRipper2.8
- Case, A., & Marziale, L. (n.d.). RegistryDecoder. Retrieved from http://www.infosecisland.com/blogview/17867-Open-Source-Registry-Decoder-11-Tool-Released.html
- Casey, E. (2002). Error, Uncertainty, and Loss in Digital Evidence. International Journal of Digital Evidence, 1 (2).
- Casey, E. (2005). Computer Crime and Digital Evidence: Forensic Science, Computers and the Internet. In Encyclopedia of Forensic and Legal Medicine. Oxford: Elsevier. doi: https://doi.org/10.1016/B0-12-369399-3/00062-8
- Casey, E. (2011). Digital Evidence and Computer Crime, Forensic Science, Computers and the Internet. In (Third Edition ed., chap. 1: Foundations of Digital Forensics). Elsevier Inc.
- Chisum, W. J., & Turvey, B. E. (2000). Evidence Dynamics: Locard's Exchange Principle & Crime Reconstruction. Journal of Behavioural Profiling, 1 (1).
- Chisum, W. J., & Turvey, B. E. (2007). A History of Crime Reconstruction. In Crime Reconstruction. Elsevier.
- Crown Prosecution Service (CPS). (2018). Guidelines on prosecuting cases involving communications sent via social media. Retrieved from https://www.cps.gov.uk/legal-guidance/social-media-guidelines-prosecuting-cases-involving-communications-sent-social-media
- Cusack, B., & Son, J. (2012). Evidence Examination Tools for Social Networks. In 10th australian digital forensics conference (pp. 33-40). SRI Security Research Institute, Edith Cowan University, Perth, Western Australia. doi: https://doi.org/10.4225/75/57b3afc1fb861
- DB4S Project. (n.d.). DB Browser for SQLite. Retrieved 2019-02-24, from http://sqlitebrowser.org
- Garfinkel, S. L. (2006). Forensic Feature Extraction and Cross-Drive Analysis. Digital Investigation, 3S, 71-81. Retrieved from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.581.9553&rep=rep1&type=pdf
- Garfinkel, S. L. (2013). Digital media triage with bulk data analysis and bulk extractor. Computers & Security, 32 , 56-72. Retrieved from ttps://www.sciencedirect.com/science/article/pii/S0167404812001472 doi: https://doi.org/10.1016/J.COSE.2012.09.011
- Google Developers. (2018). Measurement Protocol Parameter Reference |Analytics Measurement Protocol | Google Developers. Retrieved 2019-03-04, from https://developers.google.com/analytics/devguides/collection/protocol/v1/parameters
- Haroon, S., & Carter, H. (2010). Facebook security measures criticised after Ashleigh Hall murder. The Guardian. Retrieved from http://www.theguardian.com/uk/2010/mar/09/ukcrime-facebook
- Huber, M., Mulazzani, M., Leithner, M., Schrittwieser, S., Wondracek, G., & Weippl, E. (2011). Social Snapshots: Digital Forensics for Online Social Networks. In Proceedings of the 27th annual computer security applications conference (pp. 113-122). New York, NY, USA: ACM. doi: https://doi.org/10.1145/2076732.2076748
- Jang, Y. J., & Kwak, J. (2015). Digital forensics investigation methodology applicable for social network services. Springer Series in Multimedia Tools Appl, 74 , 5029-5040. Retrieved from https://link.springer.com/content/pdf/10.1007%2Fs11042-014-2061-8.pdf doi: https://doi.org/10.1007/s11042-014-2061-8
- Jonsson, P. (2011). 'Flash robs': How Twitter is being twisted for criminal gain [VIDEO]. The Christian Science Monitor. Retrieved from http://www.csmonitor.com/USA/2011/0803/Flash-robs-How-Twitter-is-being-twisted-for-criminal-gain-VIDEO
- Keyvanpour, M., Moradi, M., & Hasanzadeh, F. (2014, 01). Digital forensics 2.0: A review on social networks forensics. Studies in Computational Intelligence, 555 , 17-46. doi: https://doi.org/10.1007/978-3-319-05885-6-2
- Mabuto, E. K., & Venter, H. S. (2012). User-generated digital forensic evidence in graphic design applications. In Proceedings title: 2012 international conference on cyber security, cyber warfare and digital forensic (cybersec) (pp. 195{200). IEEE. Retrieved from http://ieeexplore.ieee.org/document/6246107/ doi: https://doi.org/10.1109/CyberSec.2012.6246107
- McGuire, M. (2019a). Into The Web of Profit: Social Media Platforms and the Cybercrime Economy. Bromium. Retrieved from https://www.bromium.com/wp-content/uploads/2019/02/Bromium-Web-of-Profit-Social-Platforms-Infographic.pdf
- McGuire, M. (2019b). Social Media Platforms and The Cybercrime Economy: The next chapter of Into The Web of Profit. Bromium.
- McKemmish, R. (2008). When is Digital Evidence Forensically Sound? Advances in Digital Forensics, IV , 3-15.
- Moore, K. (2014). Social media 'at least half ' of calls passed to front-line police. BBC News. Retrieved from https://www.bbc.co.uk/news/uk-27949674
- Murr, M. (2007). The admissibility vs. weight of digital evidence | Forensic Computing. Retrieved 2019-04-14, from https://forensicblog.org/the-admissibility-vs-weight-of-digital-evidence/
- NirSoft. (2018a). FullEventLogView.Retrieved from https://www.nirsoft.net/utils/full event log view.html
- NirSoft. (2018b). MZCacheView. Retrieved from https://www.nirsoft.net/utils/mozilla cache viewer.html
- Oh, J., Lee, S., & Lee, S. (2011). Advanced evidence collection and analysis of web browser activity. Digital Investigation, 8, Supplem(0), S62-S70. Retrieved from http://www.sciencedirect.com/science/article/pii/S1742287611000326 doi: https://doi.org/10.1016/j.diin.2011.05.008
- Osborne, B. (2010). Twitter sees more active users, but also attracts more criminal activity.
- Geek Website. Retrieved from http://www.geek.com/news/twitter-sees-more-active-users-but-also-attracts-more-criminal-activity-1130461/
- Powell, A., & Haynes, C. (2019). Social Media Data in Digital Forensics Investigations. Digital Forensic Education, 281-303.
- Press Association. (2014). Peter Nunn jailed for abusive tweets to MP Stella Creasy. Retrieved from https://www.theguardian.com/uk-news/2014/sep/29/peter-nunn-jailed-abusive-tweets-mp-stella-creasy
- Rankin, B. (2010). Send in the 'Twitter squad': Police forces may need dedicated to cope with rising social media crime. Mirror News. Retrieved from http://www.mirror.co.uk/news/technology-science/technology/rocketing-crime-complaints-involving-social-1507527
- Richards, J. (2007). Sex offenders can use social sites, say police - Times Online (Vol. 2010).
- Select Committee on Communications. (2014). CHAPTER 2: SOCIAL MEDIA AND THE LAW. Retrieved from https://publications.parliament.uk/pa/ld201415/ldselect/ldcomuni/37/3702.htm
- Shaw, U., Das, D., & Mehdi, S. P. (2016). Social Network Forensics: Survey and Challenges. International Journal of Computer Science and Information Security (IJCSIS), 14 (11), 310-316.
- Sommer, P. (1999). Intrusion Detection Systems as Evidence. Computer Networks, 31 (23 -24), 2477-2487.
- Taylor, M., Haggerty, J., Gresty, D., Almond, P., & Berry, T. (2014). Forensic investigation of social networking applications. Digital Investigation, 11 , 9-16.
- Telerik. (2018). Fiddler - Free Web Debugging Proxy - Telerik. Retrieved from https://www.telerik.com/fiddler
- Ultimate IT Security. (2014). Windows Security Log Encyclopedia. Retrieved 2019-01-18, from https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/default.aspx
- Woan, M. (2013). PrefetchForensics. GitHub. Retrieved from https://github.com/woanware/woanware.github.io/blob/master/downloads/PrefetchForensics.v.1.0.4.zip
- Wood, C. (2018). WhatsApp photo drug dealer caught by 'groundbreaking' work. BBC News. Retrieved from https://www.bbc.co.uk/news/uk-wales-43711477
- X-Ways Software Technology, AG. (2018). WinHex. WinHex: Computer Forensics & Data Recovery Software, Hex Editor & Disk Editor. Retrieved from https://www.x-ways.net/winhex/
- Zainudin, N. M., Merabti, M., & Llewellyn-Jones, D. (2011). Online social networks as supporting evidence: A digital forensic investigation model and its application design. In 2011 international conference on research and innovation in information systems (pp. 1-6). doi: https://doi.org/10.1109/ICRIIS.2011.6125728
Recommended Citation
David, Anne; Morris, Sarah; and Appleby-Thomas, Gareth
(2020)
"A Two-Stage Model for Social Network Investigations in Digital Forensics,"
Journal of Digital Forensics, Security and Law: Vol. 15
, Article 1.
DOI: https://doi.org/10.15394/jdfsl.2020.1667
Available at:
https://commons.erau.edu/jdfsl/vol15/iss2/1
Included in
Computer Law Commons, Criminal Law Commons, Evidence Commons, Information Security Commons, Social Media Commons