Abstract
In this chapter, we will introduce the concept of social cyber forensics (SCF) and its usability. Then, we will introduce a tool, i.e., Maltego that can be used to study the cross-media affiliation and uncover hidden relations among different ODGs . In Sect. 4.2 we will provide three stepwise methodologies that can be followed to reach the desired outcome of analysis (e.g., uncovering the hidden relationship between Twitter accounts and a set of websites or blog sites, websites or blog sites and other websites or blog sites, and infer the ownership of a set of websites or blog sites). These methodologies have been tested during many cyber propaganda campaigns to associate and infer the relationships between different online groups. We also provide hands-on exercises to practice each of the methodologies introduced.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
Google Analytics: https://analytics.google.com/.
- 2.
PeekYou: http://www.peekyou.com/.
- 3.
Metagoofil: http://www.edge-security.com/metagoofil.php.
- 4.
Shodan: https://www.shodan.io/.
- 5.
Paterva Ltd: https://www.paterva.com/.
- 6.
Trident Juncture 2015 exercise: https://jfcbs.nato.int/trident-juncture.
- 7.
Exercise Anakonda 2016: http://www.eur.army.mil/anakonda/.
- 8.
Brilliant Jump 2016 exercise: https://tinyurl.com/y7we5q34.
- 9.
If the website points to a WTC, it means that the website HTML code contains the WTC .
- 10.
If the WTC point to the website, it does not necessarily mean that the WTC is embedded in the website HTML, but it does mean that the WTC owner added that website to their list of to be tracked websites.
References
M. Huber, M. Mulazzani, M. Leithner, S. Schrittwieser, G. Wondracek, E. Weippl, Social Snapshots: Digital Forensics for Online Social Networks (ACSAC, Orlando, 2011), pp. 113–122
V. Juarez, Facebook Status Update Provides Alibi. Available: http://cnn.it/2mUOo48
E. Grube, Assault Fugitive who was Found via Facebook is Back in NY. Available: http://newyorkcriminallawyersblog.com/2010/03/assault-criminal-who-was-found-via-facebook-is-back-in-ny.html
M. Fisher, Facebook: A Place to Meet, Gossip, Share Photos of Stolen Goods. Available: http://www.washingtonpost.com/wp-dyn/content/article/2010/12/14/AR2010121407423.html
N. Alherbawi, Z. Shukur, R. Sulaiman, Systematic literature review on data carving in digital forensic. Procedia Technol. 11, 86–92 (2013)
K. Oyeusi, Computer Forensics. Available: http://docslide.us/documents/computer-forensics-558454651e7df.html
D. Povar, V. Bhadran, Forensic data carving, in Digital Forensics and Cyber Crime. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 53 (Springer, Berlin, 2011), pp. 137–148. Available: http://bit.ly/2mzILFW
L. Alexander, Open-Source Information Reveals Pro-Kremlin Web Campaign. Available: https://globalvoices.org/2015/07/13/open-source-information-reveals-pro-kremlin-web-campaign/
M. Bazzell, Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information, 4th edn. (CCI, Charleston, 2014). Available: https://inteltechniques.com/book1.html
S. Al-khateeb, M.N. Hussain, N. Agarwal, Social cyber forensics approach to study twitter’s and blogs’ influence on propaganda campaigns, in International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation (Springer, Berlin, 2017), pp. 108–113
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Al-khateeb, S., Agarwal, N. (2019). Social Cyber Forensics (SCF): Uncovering Hidden Relationships. In: Deviance in Social Media and Social Cyber Forensics. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-030-13690-1_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-13690-1_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-13689-5
Online ISBN: 978-3-030-13690-1
eBook Packages: Computer ScienceComputer Science (R0)