Skip to main content

Social Cyber Forensics (SCF): Uncovering Hidden Relationships

  • Chapter
  • First Online:

Part of the book series: SpringerBriefs in Cybersecurity ((BRIEFSCYBER))

Abstract

In this chapter, we will introduce the concept of social cyber forensics (SCF) and its usability. Then, we will introduce a tool, i.e., Maltego that can be used to study the cross-media affiliation and uncover hidden relations among different ODGs . In Sect. 4.2 we will provide three stepwise methodologies that can be followed to reach the desired outcome of analysis (e.g., uncovering the hidden relationship between Twitter accounts and a set of websites or blog sites, websites or blog sites and other websites or blog sites, and infer the ownership of a set of websites or blog sites). These methodologies have been tested during many cyber propaganda campaigns to associate and infer the relationships between different online groups. We also provide hands-on exercises to practice each of the methodologies introduced.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Google Analytics: https://analytics.google.com/.

  2. 2.

    PeekYou: http://www.peekyou.com/.

  3. 3.

    Metagoofil: http://www.edge-security.com/metagoofil.php.

  4. 4.

    Shodan: https://www.shodan.io/.

  5. 5.

    Paterva Ltd: https://www.paterva.com/.

  6. 6.

    Trident Juncture 2015 exercise: https://jfcbs.nato.int/trident-juncture.

  7. 7.

    Exercise Anakonda 2016: http://www.eur.army.mil/anakonda/.

  8. 8.

    Brilliant Jump 2016 exercise: https://tinyurl.com/y7we5q34.

  9. 9.

    If the website points to a WTC, it means that the website HTML code contains the WTC .

  10. 10.

    If the WTC point to the website, it does not necessarily mean that the WTC is embedded in the website HTML, but it does mean that the WTC owner added that website to their list of to be tracked websites.

References

  1. M. Huber, M. Mulazzani, M. Leithner, S. Schrittwieser, G. Wondracek, E. Weippl, Social Snapshots: Digital Forensics for Online Social Networks (ACSAC, Orlando, 2011), pp. 113–122

    Google Scholar 

  2. V. Juarez, Facebook Status Update Provides Alibi. Available: http://cnn.it/2mUOo48

  3. E. Grube, Assault Fugitive who was Found via Facebook is Back in NY. Available: http://newyorkcriminallawyersblog.com/2010/03/assault-criminal-who-was-found-via-facebook-is-back-in-ny.html

  4. M. Fisher, Facebook: A Place to Meet, Gossip, Share Photos of Stolen Goods. Available: http://www.washingtonpost.com/wp-dyn/content/article/2010/12/14/AR2010121407423.html

  5. N. Alherbawi, Z. Shukur, R. Sulaiman, Systematic literature review on data carving in digital forensic. Procedia Technol. 11, 86–92 (2013)

    Article  Google Scholar 

  6. K. Oyeusi, Computer Forensics. Available: http://docslide.us/documents/computer-forensics-558454651e7df.html

  7. D. Povar, V. Bhadran, Forensic data carving, in Digital Forensics and Cyber Crime. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 53 (Springer, Berlin, 2011), pp. 137–148. Available: http://bit.ly/2mzILFW

  8. L. Alexander, Open-Source Information Reveals Pro-Kremlin Web Campaign. Available: https://globalvoices.org/2015/07/13/open-source-information-reveals-pro-kremlin-web-campaign/

  9. M. Bazzell, Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information, 4th edn. (CCI, Charleston, 2014). Available: https://inteltechniques.com/book1.html

  10. S. Al-khateeb, M.N. Hussain, N. Agarwal, Social cyber forensics approach to study twitter’s and blogs’ influence on propaganda campaigns, in International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation (Springer, Berlin, 2017), pp. 108–113

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Al-khateeb, S., Agarwal, N. (2019). Social Cyber Forensics (SCF): Uncovering Hidden Relationships. In: Deviance in Social Media and Social Cyber Forensics. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-030-13690-1_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-13690-1_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-13689-5

  • Online ISBN: 978-3-030-13690-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics