Skip to main content

Social Media Data in Digital Forensics Investigations

  • Chapter
  • First Online:
Digital Forensic Education

Part of the book series: Studies in Big Data ((SBD,volume 61))

Abstract

Evidence collected from social media presents valuable information that should not be overlooked. Evidence can be captured from social media using multiple methods including searching publicly viewable content, reviewing content metadata, soliciting and investigating interactions with other users, and utilizing legal holds. After the evidence is gathered, it can be utilized in various ways. Social media evidence can be used to create a timeline of events, show intent or conspiracy, and establish connections between persons. Digital forensics investigations can be used to collect such evidence. The evidence accumulated from social media is far-reaching and widely advantageous. However, there are many legal issues that can affect the collection and ultimate legal admissibility of this evidence. Evidence must be collected using careful, correct procedures and in a manner that ensures its integrity. The ethical implications of the collection of social media evidence also plays a role in these digital forensics investigations. These issues can present adverse circumstances for cases. Nonetheless, social media offers various avenues for the collection and use of its data as evidence within a digital forensics investigation. The advantageous and disadvantageous aspects of this use are discussed in this chapter.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Al-khateeb, S., Conlan, K.J., Agarwal, N., Baggili, I., Breitinger, F.: Exploring deviant hacker networks (DNH) on social media platforms. J. Digit. Forensics Secur. Law 11(2), 7–20. https://login.libweb.lib.utsa.edu/login?url=https://search-proquest-com.libweb.lib.utsa.edu/docview/1825888188?accountid=7122

  2. Al Mutawa, N., Baggili, I., Marrington, A.: Forensic analysis of social networking applications on mobile devices. Digit. Investig. 9, S24–S33 (2012). https://doi.org/10.1016/j.diin.2012.05.007

    Article  Google Scholar 

  3. Bradbury, D.: In plain view: open source intelligence. Comput. Fraud Secur. 2011, 5–9 (2011). https://doi.org/10.1016/S1361-3723(11)70039-2

    Article  Google Scholar 

  4. Cai, Z., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Dependable Secure Comput. https://doi.org/10.1109/tdsc.2016.2613521, 26 Sept 2016

  5. Carrier, B. (2005, March 17). File System Forensic Analysis. Pearson Education Inc., Upper Saddle River, NJ

    Google Scholar 

  6. Dean, G., Bell, P., Newman, J.: The dark side of social media: review of online terrorism. Pak. J. Criminol. 3(3), 107–126. https://www.researchgate.net/profile/Frederic_Lemieux/publication/236730770_Assessing_Terrorist_Risks_Developing_an_Algorithm-Based_Model_for_Law_Enforcement/links/02e7e535bef3516b60000000/Assessing-Terrorist-Risks-Developing-an-Algorithm-Based-Model-for-Law-Enforcement.pdf#page=117

  7. Fianyi, I.D.: Curbing cyber-crime and enhancing e-commerce security with digital forensics. Int. J. Comput. Sci. Issues (IJCSI) 12(6), 78–85. https://search-proquest-com.libweb.lib.utsa.edu/docview/1752642603?pq-origsite=summon

  8. Gosling, S., Gaddis, S., Vazire, S.: Personality impressions based on Facebook profiles (n.d.). https://pdfs.semanticscholar.org/47b3/db84c94dac4098163f0fb6886a8ffea0a2fc.pdf

  9. Granville, K.: Facebook and Cambridge analytica: what you need to know as fallout widens, 19 Mar 2018. https://www.nytimes.com/2018/03/19/technology/facebook-cambridge-analytica-explained.html

  10. Grimm, P., Bergstrom, L., O’Toole-Loureiro, M.: Authentication of social media evidence. Am. J. Trial Advocacy, 36. http://www.atyvideo.com/documents/American%20Journal%20of%20Trial%20Advocacy%20Authentication%20of%20Social%20Media%20Evidence.pdf

  11. Hesketh, I., Williams, E.: A new canteen culture: the potential to use social media as evidence in policing. Policing: J. Policy Pract. 11, 346–355. https://doi.org/10.1093/police/pax025

    Google Scholar 

  12. Hoffmeister, T.: The challenges of preventing and prosecuting social media crimes. Pace Law Rev. 35 (2014). https://digitalcommons.pace.edu/cgi/viewcontent.cgi?referer=https://www.google.com/&httpsredir=1&article=1877&context=plr

  13. Holt, M., San Pedro, V.: Social media evidence: what you can’t use won’t help you. Fla. Bar J. (2014). https://www.floridabar.org/the-florida-bar-journal/social-media-evidence-what-you-cantuse-wont-help-you-practical-considerations-for-using-evidence-gathered-on-the-internet/

  14. Huber, M., Mulazzani, M., Leithner, M., Schrittwieser, S., Wondracek, G., Weippl, E.: Social snapshots: digital forensics for online social networks (n.d.). https://www.sba-research.org/wp-content/uploads/publications/social_snapshots_preprint.pdf

  15. Hubert, K.: Evidence collection from social media sites (2014). https://www.sans.org/reading-room/whitepapers/legal/evidence-collection-social-media-sites-35647

  16. Huey, L.: This is not your mother’s terrorism: social media, online radicalization and the practice of political jamming. J. Terror. Res. 6, 25 May 2015. http://doi.org/10.15664/jtr.1159

  17. Jang, YJ., Kwak, J.: Digital forensics investigation methodology applicable for social network services. Multimed. Tools Appl. 7(14), 5029–5040 (2015). https://doi-org.libweb.lib.utsa.edu/10.1007/s11042-014-2061-8

    Google Scholar 

  18. Karabiyik, U., Canbaz, M.A., Aksoy, A., Tuna, T., Akbas, E., Gonen, B., Aygun, R.S.: A survey of social network forensics. J. Digit. Forensics Secur. Law, 11(4), 31 Dec 2016. https://commons.erau.edu/cgi/viewcontent.cgi?article=1430&context=jdfsl

  19. Kim, Y.: The contribution of social network sites to exposure to political difference: The relationships among SNSs, online political messaging, and exposure to cross-cutting perspectives. Comput. Hum. Behav. 27, 971–977 (2011). https://doi.org/10.1016/j.chb.2010.12.001

    Article  Google Scholar 

  20. Kwahk, K., Ge, X.: The effects of social media on e-commerce: a perspective of social impact theory. Syst. Sci. (HICSS) (9 Feb 2012). https://doi.org/10.1109/hicss.2012.564

  21. Marsoof, A.: Online social networking and the right to privacy: The conflicting rights of privacy and expression. Int. J. Law Inf. Technol. 19, 110–132 (2011). https://doi.org/10.1093/ijlit/eaq018

    Article  Google Scholar 

  22. Murphy, J.P., Fontecilla, A.: Social media evidence in government investigations and criminal proceedings: a frontier of new legal issues. Richmond J. Law Technol. 19(3) (2013). https://scholarship.richmond.edu/cgi/viewcontent.cgi?referer=https://scholar.google.com/&httpsredir=1&article=1380&context=jolt

  23. Parveen, F., Jaafar, N.I., Ainin, S.: Social media usage and organizational performance: reflections of Malaysian social media managers. Telemat. Inform. 32, 67–78 (2015). https://doi.org/10.1016/j.tele.2014.03.001

    Article  Google Scholar 

  24. Ramwell, S., Day, T., Gibson, H.: Use cases and best practices for LEAs. In: Akhgar, B., Bayerl, P., Sampson, F. (eds) Open Source Intelligence Investigation, pp. 197–211. Springer, Cham (2016). https://doi-org.libweb.lib.utsa.edu/10.1007/978-3-319-47671-1_13

    Google Scholar 

  25. Rubio, G.: Social media evidence, digital forensics, and family law. https://www.protegga.com/wp-content/uploads/2016/01/Social-Media-Evidence-Digital-Forensics-and-Family-Law.pdf

  26. Seigfried-Spellar, K.C., Leshnay, S.C.: The intersection between social media, crime, and digital forensics: #WhoDunIt?. In: Digital Forensics: threatscape and Best Practices, pp. 59–67. (2016). https://doi.org/10.1016/B978-0-12-804526-8.00004-6

    Google Scholar 

  27. Taylor, M., Haggerty, J., Gresty, D., Berry, T., Almond, P. Forensic investigation of social networking applications. Netw. Secur. 11, 9–16 (2014). https://doi.org/10.1016/S1353-4858(14)70112-6

    Google Scholar 

  28. Trottier, D.: A research agenda for social media surveillance. Fast Capital. 8(1) (2011). https://www.uta.edu/huma/agger/fastcapitalism/8_1/trottier8_1.html

  29. Uncel, M.: “Facebook is now friends with the court”: current federal rules and social media evidence. Jurimetrics 52, 43–69 (2011). http://www.jstor.org/stable/23239803

  30. Walnycky, D., Baggili, I., Marrington, A., Moore, J., Breitinger, F.: Network and device forensic analysis of android social-messaging applications. Digit. Investig. 14, S77–S84 (2015). https://doi.org/10.1016/j.diin.2015.05.009

    Article  Google Scholar 

  31. Xiang, Z., Gretzel, U.: Role of social media in online travel information search. Tour. Manag. 31, 179–188 (2010). https://doi.org/10.1016/j.tourman.2009.02.016

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ashleigh Powell .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Powell, A., Haynes, C. (2020). Social Media Data in Digital Forensics Investigations. In: Zhang, X., Choo, KK. (eds) Digital Forensic Education. Studies in Big Data, vol 61. Springer, Cham. https://doi.org/10.1007/978-3-030-23547-5_14

Download citation

Publish with us

Policies and ethics