Advertisement

Social Cyber Forensics (SCF): Uncovering Hidden Relationships

  • Samer Al-khateeb
  • Nitin Agarwal
Chapter
Part of the SpringerBriefs in Cybersecurity book series (BRIEFSCYBER)

Abstract

In this chapter, we will introduce the concept of social cyber forensics (SCF) and its usability. Then, we will introduce a tool, i.e., Maltego that can be used to study the cross-media affiliation and uncover hidden relations among different ODGs . In Sect. 4.2 we will provide three stepwise methodologies that can be followed to reach the desired outcome of analysis (e.g., uncovering the hidden relationship between Twitter accounts and a set of websites or blog sites, websites or blog sites and other websites or blog sites, and infer the ownership of a set of websites or blog sites). These methodologies have been tested during many cyber propaganda campaigns to associate and infer the relationships between different online groups. We also provide hands-on exercises to practice each of the methodologies introduced.

Keywords

Social Cyber Forensics (SCF) Maltego Open source information Hands-on exercises 

References

  1. 1.
    M. Huber, M. Mulazzani, M. Leithner, S. Schrittwieser, G. Wondracek, E. Weippl, Social Snapshots: Digital Forensics for Online Social Networks (ACSAC, Orlando, 2011), pp. 113–122Google Scholar
  2. 2.
    V. Juarez, Facebook Status Update Provides Alibi. Available: http://cnn.it/2mUOo48
  3. 3.
    E. Grube, Assault Fugitive who was Found via Facebook is Back in NY. Available: http://newyorkcriminallawyersblog.com/2010/03/assault-criminal-who-was-found-via-facebook-is-back-in-ny.html
  4. 4.
    M. Fisher, Facebook: A Place to Meet, Gossip, Share Photos of Stolen Goods. Available: http://www.washingtonpost.com/wp-dyn/content/article/2010/12/14/AR2010121407423.html
  5. 5.
    N. Alherbawi, Z. Shukur, R. Sulaiman, Systematic literature review on data carving in digital forensic. Procedia Technol. 11, 86–92 (2013)CrossRefGoogle Scholar
  6. 6.
  7. 7.
    D. Povar, V. Bhadran, Forensic data carving, in Digital Forensics and Cyber Crime. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 53 (Springer, Berlin, 2011), pp. 137–148. Available: http://bit.ly/2mzILFW
  8. 8.
    L. Alexander, Open-Source Information Reveals Pro-Kremlin Web Campaign. Available: https://globalvoices.org/2015/07/13/open-source-information-reveals-pro-kremlin-web-campaign/
  9. 9.
    M. Bazzell, Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information, 4th edn. (CCI, Charleston, 2014). Available: https://inteltechniques.com/book1.html
  10. 10.
    S. Al-khateeb, M.N. Hussain, N. Agarwal, Social cyber forensics approach to study twitter’s and blogs’ influence on propaganda campaigns, in International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation (Springer, Berlin, 2017), pp. 108–113Google Scholar

Copyright information

© The Author(s), under exclusive license to Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Samer Al-khateeb
    • 1
  • Nitin Agarwal
    • 2
  1. 1.Department of Journalism, Media & ComputingCreighton UniversityOmahaUSA
  2. 2.Information Science DepartmentUniversity of Arkansas at Little RockLittle RockUSA

Personalised recommendations