SlideShare ist ein Scribd-Unternehmen logo
1 von 45
Downloaden Sie, um offline zu lesen
Module XLVIII - Investigating Social
Networking Websites for Evidence:
MySpace, Facebook and Orkut
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
News: Google Gives Brazil
Senate User Info
Source: http://www.sfgate.com/
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
News: Police Tap Student Sites
to Fight Crime
Source: http://www.eschoolnews.com/
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
News: Child Pornography on
Social Networking Websites
Source: http://www.ndtv.com/
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Objective
• Introduction: Social Networking Websites
• MySpace
• Facebook
• Orkut
• Crime Using Social Networking Website
• Investigation Process
• Investigation in MySpace
• Investigation in Facebook
• Investigation in Orkut
• Report Generation
This module will familiarize you with:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow
Introduction:
Social Networking Websites
Crime Using Social
Networking Website
Investigation Process
Investigation in MySpace
Investigation in Facebook
Investigation in Orkut
Report Generation
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Social Networking Sites
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Introduction: Social Networking
A social network is a social structure made of nodes of
individuals and organizations that are tied by one or more
specific types of interdependency, such as values, visions,
idea, financial exchange, friendship etc.
Social networking phenomenon is rapidly increasing among
the youth, since it provides a chance to put forth the ideas
and views to other individuals over the web
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Social Networking Sites
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
MySpace
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
MySpace
MySpace is a social networking site which provides:
Online community to talk with the
friends and make a new ones
Helps in creating business network
Private community to share photos,
journals, and any of the interests
Internet marketers to advertise their
products and services
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
MySpace: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Searching Persons on
MySpace
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Facebook
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Facebook
Facebook is the social networking site which connects people
with friends and others who work, study and live around
them
People use Facebook to keep up with friends, upload an
unlimited number of photos, share links and videos, and
learn more about the people they meet
About Facebook:
• Anyone can join Facebook
• Discover the people around you
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Facebook: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Facebook: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Orkut
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Orkut
Orkut is an online social networking site designed similarly as
MySpace and Facebook
Launched in January 2004, by Google search company
It provides a network for friends and businesses with:
• A public profile which can be viewed by anyone within the community
• Pictures, messages, and video sharing
According to Alexa, Orkut is the eleventh largest web property
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Orkut: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Orkut: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Crime Using Social Networking
Website
Identity Theft
Phasing
Phishing
Blackmailing
Child Harassment
Child Pornography
Social Engineering
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Use of Social Networking
Websites in Investigations
Social networking websites are increasingly used in legal and criminal investigations
Personal information posted on social networking sites is used by police and law
enforcement agencies to prosecute users of said sites
Information recovered from social networking sites can be used in court to corroborate
a case
Facebook is mainly used by law enforcement agencies as a source of evidence against
student users
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Investigation Process
Search for convict’s account on the social
networking site
Mirror the web pages in the CD-ROM
Search on social networking sites
Documenting the evidence gathered
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Search for Convict’s Account on
The Social Networking Site
Search for convict’s account on the social networking site
using the his email address
Email address of the convict can be gathered during
interrogation
If the email address is not founded the search him by his
name and address in the social networking website
Investigator should also have an account with the social
networking site in order to search for the information
related to victim
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Mirror the Web Pages in the CD-
ROM
Mirror the web pages in the CD-ROM using
the following tools:
• HTTrack Web Site Copier offline browser
• Webcrawl
• cURL and Libcurl
• W3Mir
• Web Copier
• Folder Synchronization Tools
• File Dog
• BlackWidow
Website
Mirror
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Investigation on MySpace
• Bulletins: It is the broadcasting method delivering chain messages in the
friend list
• Groups: Groups allow to share a common page and message board in the
friend list
• MySpaceIM: It is the instant messenger in the MySpace account where
the notification of new MySpace messages, friend requests, and
comments are delivered
• MySpaceTV: It is the video sharing application in MySpace
• Applications: Here users could create applications for other users to post
on their profiles
• MySpace Mobile: It is environment in which users can access MySpace
content on their mobile phone
Search for the following in MySpace account:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Investigation on MySpace
(cont’d)
• MySpace News: Here, news is displayed from RSS feeds which
users had submitted
• MySpace Classifieds: Classified service
• MySpace Karaoke: Here, user to upload audio recordings
• MySpace polls: Here, users post polls on their profile and share
them with other users
• MySpace forums: Community server is implemented for the
MySpace users
Search for the following in MySpace account:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Investigation on Facebook
• Friend list
• It is the name and profile of the friends present in the user profile
• News Feed
• It highlights information regarding profile changes, upcoming events,
and birthdays, other updates in the user profile
• Wall
• It is the space where friends can post messages
• Photos
• It is the photo sharing application of Facebook
• Gifts
• It is the virtual gift shop
• Marketplace
• Here, the users can post free classified ads
Facebook is widely used for the surveillance, the
main area of the investigation are as following:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Investigation on Facebook (cont’d)
Pokes
• It is the way of interaction with friends on Facebook
Status
• It inform current whereabouts and actions of a friend
Events
• It shows the upcoming events
Networks and groups
• Facebook have many networks and groups to which many users can
join
Video
• It is the video sharing application in Facebook
Chat
• Here, users can chat with their Facebook friends and on a one-to-one
basis
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Investigation on Orkut
In Orkut account search the following
for gathering evidence:
• Profile
• Scrapbook
• Photos
• Videos
• Testimonials
• View Events
• Friendlist
• Communities
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Investigating Profile
Investigator can find out personal, professional and social information of the
convict
Personal information include height, weight, eye color, hair color etc about the
person
Professional information include education, occupation, industry etc about the
person
Social information include religion, alternative email address, telephone number
about the person
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Investigating Scrapbook
Scrapbook is the main source of investigation here the messages are received
online or offline
The conversation or chatting done by the convict can be easily archived from
here
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Investigating Photos and Video
The photograph or the video recording of the convict can be gathered here
Photo or video folder are locked in some accounts
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Investigating Testimonials
It is the part of the Orkut account where any body can write about the
personality of convict
Here, the investigator can learn about the personality of the person
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Investigating View Events
The investigator can find the event calendar of the convict
Important dates are found here
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Investigating Friend Lists
The friend list contains the profiles of all his friends
It provides a detailed information of who are directly connected as a friend
with the convict
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Investigating Communities
The communities which has joined
shows interest of the person
Community is the group of people where
sharing of knowledge is done
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Report Generation
Note the name of Investigator
List of evidence acquired from social networking website
Documents of the evidence and other supporting items
List of tools used for investigation
Devices and set up used in the examination
Brief description of examination steps
Details about the finding:
• Information about the files
• Internet related evidence
• Data and image analysis
Conclusion of the investigation
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Summary
A social network is a social structure made of nodes of individuals and
organizations that are tied by one or more specific types of interdependency
Web sites providing the social network are referred as social networking sites
MySpace, Facebook, and Orkut are the social networking site which provides
online community to talk with the friends and make new ones
Social networking websites are increasingly used in legal and criminal
investigations
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

Weitere ähnliche Inhalte

Was ist angesagt?

Prosecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebProsecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebDarius Whelan
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal lawHamza Cheema
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal lawZaheer Irshad
 
Perspectivesmanage
PerspectivesmanagePerspectivesmanage
PerspectivesmanageArt Bowker
 
Social media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacySocial media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacyYasmin AbdelAziz
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for InvestigatorsCase IQ
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer SystemEjiro Ndifereke
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law sohaildanish
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-finalAldrin SuperGo
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speechUc Man
 
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!Wayne Norris
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislationTgarmon34
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality reportJonan Momo
 
International laws and standards controlling information security. Latest dev...
International laws and standards controlling information security. Latest dev...International laws and standards controlling information security. Latest dev...
International laws and standards controlling information security. Latest dev...USAID CEED II Project Moldova
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreofficesolomon24
 

Was ist angesagt? (20)

Prosecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebProsecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the Web
 
File000095
File000095File000095
File000095
 
File000097
File000097File000097
File000097
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal law
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Perspectivesmanage
PerspectivesmanagePerspectivesmanage
Perspectivesmanage
 
Social media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacySocial media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacy
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer System
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
International laws and standards controlling information security. Latest dev...
International laws and standards controlling information security. Latest dev...International laws and standards controlling information security. Latest dev...
International laws and standards controlling information security. Latest dev...
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreoffice
 
OLC Presentation Jipson
OLC Presentation JipsonOLC Presentation Jipson
OLC Presentation Jipson
 

Andere mochten auch (20)

File000142
File000142File000142
File000142
 
File000148
File000148File000148
File000148
 
File000173
File000173File000173
File000173
 
[Gerard blokdijk, claire_engle,_jackie_brewster]_i(book_see.org) (1)
[Gerard blokdijk, claire_engle,_jackie_brewster]_i(book_see.org) (1)[Gerard blokdijk, claire_engle,_jackie_brewster]_i(book_see.org) (1)
[Gerard blokdijk, claire_engle,_jackie_brewster]_i(book_see.org) (1)
 
File000136
File000136File000136
File000136
 
File000152
File000152File000152
File000152
 
File000166
File000166File000166
File000166
 
File000150
File000150File000150
File000150
 
File000149
File000149File000149
File000149
 
File000117
File000117File000117
File000117
 
File000113
File000113File000113
File000113
 
File000145
File000145File000145
File000145
 
File000139
File000139File000139
File000139
 
File000174
File000174File000174
File000174
 
File000170
File000170File000170
File000170
 
File000122
File000122File000122
File000122
 
File000175
File000175File000175
File000175
 
Investigating server logs
Investigating server logsInvestigating server logs
Investigating server logs
 
File000169
File000169File000169
File000169
 
File000141
File000141File000141
File000141
 

Ähnlich wie Investigating Social Media Evidence MySpace, Facebook, Orkut

Intro to Social Networking
Intro to Social NetworkingIntro to Social Networking
Intro to Social NetworkingNobleTree Media
 
Going beyond google 2 philadelphia loss conference
Going beyond google 2 philadelphia loss conferenceGoing beyond google 2 philadelphia loss conference
Going beyond google 2 philadelphia loss conferencemikep007
 
introduction to social media for the film industry
introduction to social media for the film industryintroduction to social media for the film industry
introduction to social media for the film industryWolfgang Gumpelmaier-Mach
 
Group 1 Introduction to Social Networking.pptx
Group 1 Introduction to Social Networking.pptxGroup 1 Introduction to Social Networking.pptx
Group 1 Introduction to Social Networking.pptxJenicaJDizon
 
The Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesThe Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesM. Prabu Wibowo
 
Social Media Opportunities & Pitfalls
Social Media Opportunities & PitfallsSocial Media Opportunities & Pitfalls
Social Media Opportunities & Pitfallsappower2
 
Social media for conveyancers - Law Society Webinar, 19 September 2014
Social media for conveyancers - Law Society Webinar, 19 September 2014Social media for conveyancers - Law Society Webinar, 19 September 2014
Social media for conveyancers - Law Society Webinar, 19 September 2014Suzy Ashworth
 
Presentation social networking service
Presentation social networking servicePresentation social networking service
Presentation social networking serviceManish S Thingalaya
 
Research
ResearchResearch
Researchtriixta
 
Fundraising and Social Media - Davethecfre at CLPGH Foundation Center
Fundraising and Social Media - Davethecfre at CLPGH Foundation CenterFundraising and Social Media - Davethecfre at CLPGH Foundation Center
Fundraising and Social Media - Davethecfre at CLPGH Foundation CenterDave Tinker, CFRE
 
Copyright education in the age of social media
Copyright education in the age of social mediaCopyright education in the age of social media
Copyright education in the age of social mediaJane Secker
 
Social media and Privacy - Australian Computer Society
Social media and Privacy - Australian Computer SocietySocial media and Privacy - Australian Computer Society
Social media and Privacy - Australian Computer SocietyTypeset
 
Why Portability matters (full presentation)
Why Portability matters (full presentation)Why Portability matters (full presentation)
Why Portability matters (full presentation)Ian Forrester
 

Ähnlich wie Investigating Social Media Evidence MySpace, Facebook, Orkut (20)

Intro to Social Networking
Intro to Social NetworkingIntro to Social Networking
Intro to Social Networking
 
Going beyond google 2 philadelphia loss conference
Going beyond google 2 philadelphia loss conferenceGoing beyond google 2 philadelphia loss conference
Going beyond google 2 philadelphia loss conference
 
introduction to social media for the film industry
introduction to social media for the film industryintroduction to social media for the film industry
introduction to social media for the film industry
 
Social networking
Social networkingSocial networking
Social networking
 
Group 1 Introduction to Social Networking.pptx
Group 1 Introduction to Social Networking.pptxGroup 1 Introduction to Social Networking.pptx
Group 1 Introduction to Social Networking.pptx
 
The Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesThe Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal Issues
 
Social Media Opportunities & Pitfalls
Social Media Opportunities & PitfallsSocial Media Opportunities & Pitfalls
Social Media Opportunities & Pitfalls
 
Ppt
PptPpt
Ppt
 
Social networks
Social networksSocial networks
Social networks
 
Social network
Social networkSocial network
Social network
 
Presentation of International Facility Management Association's Social Media ...
Presentation of International Facility Management Association's Social Media ...Presentation of International Facility Management Association's Social Media ...
Presentation of International Facility Management Association's Social Media ...
 
Social media for conveyancers - Law Society Webinar, 19 September 2014
Social media for conveyancers - Law Society Webinar, 19 September 2014Social media for conveyancers - Law Society Webinar, 19 September 2014
Social media for conveyancers - Law Society Webinar, 19 September 2014
 
Presentation social networking service
Presentation social networking servicePresentation social networking service
Presentation social networking service
 
Creative Commons and the Future of Sharing
Creative Commons and the Future of SharingCreative Commons and the Future of Sharing
Creative Commons and the Future of Sharing
 
Research
ResearchResearch
Research
 
Fundraising and Social Media - Davethecfre at CLPGH Foundation Center
Fundraising and Social Media - Davethecfre at CLPGH Foundation CenterFundraising and Social Media - Davethecfre at CLPGH Foundation Center
Fundraising and Social Media - Davethecfre at CLPGH Foundation Center
 
Copyright education in the age of social media
Copyright education in the age of social mediaCopyright education in the age of social media
Copyright education in the age of social media
 
Living Online
Living OnlineLiving Online
Living Online
 
Social media and Privacy - Australian Computer Society
Social media and Privacy - Australian Computer SocietySocial media and Privacy - Australian Computer Society
Social media and Privacy - Australian Computer Society
 
Why Portability matters (full presentation)
Why Portability matters (full presentation)Why Portability matters (full presentation)
Why Portability matters (full presentation)
 

Mehr von Desmond Devendran (17)

Siam key-facts
Siam key-factsSiam key-facts
Siam key-facts
 
Siam foundation-process-guides
Siam foundation-process-guidesSiam foundation-process-guides
Siam foundation-process-guides
 
Siam foundation-body-of-knowledge
Siam foundation-body-of-knowledgeSiam foundation-body-of-knowledge
Siam foundation-body-of-knowledge
 
Enterprise service-management-essentials
Enterprise service-management-essentialsEnterprise service-management-essentials
Enterprise service-management-essentials
 
Service Integration and Management
Service Integration and Management Service Integration and Management
Service Integration and Management
 
Diagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_enDiagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_en
 
CHFI 1
CHFI 1CHFI 1
CHFI 1
 
File000176
File000176File000176
File000176
 
File000172
File000172File000172
File000172
 
File000171
File000171File000171
File000171
 
File000168
File000168File000168
File000168
 
File000167
File000167File000167
File000167
 
File000164
File000164File000164
File000164
 
File000163
File000163File000163
File000163
 
File000162
File000162File000162
File000162
 
File000156
File000156File000156
File000156
 
File000153
File000153File000153
File000153
 

Kürzlich hochgeladen

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Investigating Social Media Evidence MySpace, Facebook, Orkut

  • 1. Module XLVIII - Investigating Social Networking Websites for Evidence: MySpace, Facebook and Orkut
  • 2. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited News: Google Gives Brazil Senate User Info Source: http://www.sfgate.com/
  • 3. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited News: Police Tap Student Sites to Fight Crime Source: http://www.eschoolnews.com/
  • 4. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited News: Child Pornography on Social Networking Websites Source: http://www.ndtv.com/
  • 5. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Objective • Introduction: Social Networking Websites • MySpace • Facebook • Orkut • Crime Using Social Networking Website • Investigation Process • Investigation in MySpace • Investigation in Facebook • Investigation in Orkut • Report Generation This module will familiarize you with:
  • 6. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Flow Introduction: Social Networking Websites Crime Using Social Networking Website Investigation Process Investigation in MySpace Investigation in Facebook Investigation in Orkut Report Generation
  • 7. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Social Networking Sites
  • 8. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Introduction: Social Networking A social network is a social structure made of nodes of individuals and organizations that are tied by one or more specific types of interdependency, such as values, visions, idea, financial exchange, friendship etc. Social networking phenomenon is rapidly increasing among the youth, since it provides a chance to put forth the ideas and views to other individuals over the web
  • 9. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Social Networking Sites
  • 10. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited MySpace
  • 11. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited MySpace MySpace is a social networking site which provides: Online community to talk with the friends and make a new ones Helps in creating business network Private community to share photos, journals, and any of the interests Internet marketers to advertise their products and services
  • 12. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited MySpace: Screenshot
  • 13. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Searching Persons on MySpace
  • 14. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Facebook
  • 15. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Facebook Facebook is the social networking site which connects people with friends and others who work, study and live around them People use Facebook to keep up with friends, upload an unlimited number of photos, share links and videos, and learn more about the people they meet About Facebook: • Anyone can join Facebook • Discover the people around you
  • 16. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Facebook: Screenshot
  • 17. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Facebook: Screenshot
  • 18. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 19. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Orkut
  • 20. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Orkut Orkut is an online social networking site designed similarly as MySpace and Facebook Launched in January 2004, by Google search company It provides a network for friends and businesses with: • A public profile which can be viewed by anyone within the community • Pictures, messages, and video sharing According to Alexa, Orkut is the eleventh largest web property
  • 21. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Orkut: Screenshot
  • 22. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Orkut: Screenshot
  • 23. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 24. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Crime Using Social Networking Website Identity Theft Phasing Phishing Blackmailing Child Harassment Child Pornography Social Engineering
  • 25. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Use of Social Networking Websites in Investigations Social networking websites are increasingly used in legal and criminal investigations Personal information posted on social networking sites is used by police and law enforcement agencies to prosecute users of said sites Information recovered from social networking sites can be used in court to corroborate a case Facebook is mainly used by law enforcement agencies as a source of evidence against student users
  • 26. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigation Process Search for convict’s account on the social networking site Mirror the web pages in the CD-ROM Search on social networking sites Documenting the evidence gathered
  • 27. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Search for Convict’s Account on The Social Networking Site Search for convict’s account on the social networking site using the his email address Email address of the convict can be gathered during interrogation If the email address is not founded the search him by his name and address in the social networking website Investigator should also have an account with the social networking site in order to search for the information related to victim
  • 28. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Mirror the Web Pages in the CD- ROM Mirror the web pages in the CD-ROM using the following tools: • HTTrack Web Site Copier offline browser • Webcrawl • cURL and Libcurl • W3Mir • Web Copier • Folder Synchronization Tools • File Dog • BlackWidow Website Mirror
  • 29. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigation on MySpace • Bulletins: It is the broadcasting method delivering chain messages in the friend list • Groups: Groups allow to share a common page and message board in the friend list • MySpaceIM: It is the instant messenger in the MySpace account where the notification of new MySpace messages, friend requests, and comments are delivered • MySpaceTV: It is the video sharing application in MySpace • Applications: Here users could create applications for other users to post on their profiles • MySpace Mobile: It is environment in which users can access MySpace content on their mobile phone Search for the following in MySpace account:
  • 30. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigation on MySpace (cont’d) • MySpace News: Here, news is displayed from RSS feeds which users had submitted • MySpace Classifieds: Classified service • MySpace Karaoke: Here, user to upload audio recordings • MySpace polls: Here, users post polls on their profile and share them with other users • MySpace forums: Community server is implemented for the MySpace users Search for the following in MySpace account:
  • 31. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigation on Facebook • Friend list • It is the name and profile of the friends present in the user profile • News Feed • It highlights information regarding profile changes, upcoming events, and birthdays, other updates in the user profile • Wall • It is the space where friends can post messages • Photos • It is the photo sharing application of Facebook • Gifts • It is the virtual gift shop • Marketplace • Here, the users can post free classified ads Facebook is widely used for the surveillance, the main area of the investigation are as following:
  • 32. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigation on Facebook (cont’d) Pokes • It is the way of interaction with friends on Facebook Status • It inform current whereabouts and actions of a friend Events • It shows the upcoming events Networks and groups • Facebook have many networks and groups to which many users can join Video • It is the video sharing application in Facebook Chat • Here, users can chat with their Facebook friends and on a one-to-one basis
  • 33. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigation on Orkut In Orkut account search the following for gathering evidence: • Profile • Scrapbook • Photos • Videos • Testimonials • View Events • Friendlist • Communities
  • 34. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigating Profile Investigator can find out personal, professional and social information of the convict Personal information include height, weight, eye color, hair color etc about the person Professional information include education, occupation, industry etc about the person Social information include religion, alternative email address, telephone number about the person
  • 35. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigating Scrapbook Scrapbook is the main source of investigation here the messages are received online or offline The conversation or chatting done by the convict can be easily archived from here
  • 36. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigating Photos and Video The photograph or the video recording of the convict can be gathered here Photo or video folder are locked in some accounts
  • 37. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigating Testimonials It is the part of the Orkut account where any body can write about the personality of convict Here, the investigator can learn about the personality of the person
  • 38. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigating View Events The investigator can find the event calendar of the convict Important dates are found here
  • 39. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigating Friend Lists The friend list contains the profiles of all his friends It provides a detailed information of who are directly connected as a friend with the convict
  • 40. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigating Communities The communities which has joined shows interest of the person Community is the group of people where sharing of knowledge is done
  • 41. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Report Generation Note the name of Investigator List of evidence acquired from social networking website Documents of the evidence and other supporting items List of tools used for investigation Devices and set up used in the examination Brief description of examination steps Details about the finding: • Information about the files • Internet related evidence • Data and image analysis Conclusion of the investigation
  • 42. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Summary A social network is a social structure made of nodes of individuals and organizations that are tied by one or more specific types of interdependency Web sites providing the social network are referred as social networking sites MySpace, Facebook, and Orkut are the social networking site which provides online community to talk with the friends and make new ones Social networking websites are increasingly used in legal and criminal investigations
  • 43. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 44. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 45. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited