ALL >> Computers >> View Article
Digital Investigations: Social Media Investigation Tools
As social media use expands new search tools are available for digital investigations, collating detailed information from a single starting point.
During my career, requests from clients for digital investigations into social media have been few and far between. However, in the last six months we have begun to see a shift in this trend, which has motivated us to invest in technology that will allow us to undertake these investigations securely and defensibly. We have begun to see digital investigation cases arising from companies in relation to employee misconduct.
We are also seeing cases where an employer is seeking to establish what relationships exist between employees, whether that is to substantiate claims of bullying/harassment or whether favoritism has occurred. We are also seeing cases of libelous remarks being made over Twitter, the evidential preservation of which is required for court.
The nature of social media is that it is often publicly available, meaning that, in theory, anyone can log in and do their own digital investigation. The power of the tools we have invested in lies in the ability ...
... to aggregate, search and defensibly preserve this information in a way that the average user cannot.
As an example, there was a recent news story about an incident happening at a location in London. We were not engaged in the digital investigation but using just publicly available data, we decided to see how much we could discover. All our analyst had to go on was the rough location of the property and the nature of the event.
By searching for all Face book posts and Tweets being sent within a five mile radius of the location and by searching for keywords across the social networks, we were able to establish quite a lot of information. We were able to discover the exact address of the property, the owner’s name, the names of his family members and a list of his friends. We were able to establish his political attitudes and where he worked. We were even able to establish the name of his girlfriend and where she worked. None of this had any relevance to the incident but demonstrated the potential to harvest detailed information from a very vague starting point.
For more information on social media investigations, computer investigations, digital forensics, or any of CCL’s products and services, call us on 01789 261200, email info@cclgroupltd.com or visit www.cclgroupltd.com, http://www.cclgroupltd.com/e-disclosure/e-disclosure/.
Author:
Author is a digital forensics specialist at CCL Group - the UK’s leading supplier of electronic disclosure and digital forensics consultancy, including: computer forensics, mobile phone forensics, digital investigation services and computer forensic analysis, for more information visit www.cclgroupltd.com
Add Comment
Computers Articles
1. Few Good Insights To Follow With Pc Gaming In Australia!Author: Jack Williams
2. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy
3. How To Choose The Right Technology For Your mobile App?
Author: goodcoders
4. The Rise Of User Centered Web Design
Author: goodcoders
5. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders
6. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech
7. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech
8. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech
9. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech
10. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech
11. Understanding Ssd Lifespan: Signs, Durability, Data Recovery, And Factors Affecting The Life Of An Ssd
Author: The CyberTech
12. Server Data Recovery Solutions: When Your Raid Server Is Crashed!
Author: The CyberTech
13. Data Recovery Solutions For Undetected Ssd On Bios
Author: The CyberTech
14. Problems Faced By Mobile Phone Users: Green Line Issue, Motherboard Failure, Phone Stuck On Logo And Mobile Data Recovery Possibilities
Author: The CyberTech
15. Ssd Vs Hdd: Weaknesses, Data Recovery Factors And Failure Rates
Author: The CyberTech