ALL >> Computers >> View Article
Digital Investigations: Social Media Investigation Tools
Total Articles: 8
As social media use expands new search tools are available for digital investigations, collating detailed information from a single starting point.
During my career, requests from clients for digital investigations into social media have been few and far between. However, in the last six months we have begun to see a shift in this trend, which has motivated us to invest in technology that will allow us to undertake these investigations securely and defensibly. We have begun to see digital investigation cases arising from companies in relation to employee misconduct.
We are also seeing cases where an employer is seeking to establish what relationships exist between employees, whether that is to substantiate claims of bullying/harassment or whether favoritism has occurred. We are also seeing cases of libelous remarks being made over Twitter, the evidential preservation of which is required for court.
The nature of social media is that it is often publicly available, meaning that, in theory, anyone can log in and do their own digital investigation. The power of the tools we have invested in lies in the ability to aggregate, search and defensibly preserve this information in a way that the average user cannot.
As an example, there was a recent news story about an incident happening at a location in London. We were not engaged in the digital investigation but using just publicly available data, we decided to see how much we could discover. All our analyst had to go on was the rough location of the property and the nature of the event.
By searching for all Face book posts and Tweets being sent within a five mile radius of the location and by searching for keywords across the social networks, we were able to establish quite a lot of information. We were able to discover the exact address of the property, the owner’s name, the names of his family members and a list of his friends. We were able to establish his political attitudes and where he worked. We were even able to establish the name of his girlfriend and where she worked. None of this had any relevance to the incident but demonstrated the potential to harvest detailed information from a very vague starting point.
For more information on social media investigations, computer investigations, digital forensics, or any of CCL’s products and services, call us on 01789 261200, email email@example.com or visit www.cclgroupltd.com, http://www.cclgroupltd.com/e-disclosure/e-disclosure/.
Author is a digital forensics specialist at CCL Group - the UK’s leading supplier of electronic disclosure and digital forensics consultancy, including: computer forensics, mobile phone forensics, digital investigation services and computer forensic analysis, for more information visit www.cclgroupltd.com
Computers Articles1. How To Win Customers Faith And Run Your Own Online Business Portal With Alibaba Clone Script Pro
Author: sawati rawat
2. Call +1-855-490-2999 Microsoft Office 365 Customer Support Number
Author: Microsoft Office 365 Customer Support Phone Number
3. Top Laptop Rental Providers
4. A Plan Of Snmp Monitoring
Author: Gambit Communications
5. How To Minimize Threats Inside Your Network?
6. Why Can Parts Engraving Equipment Help Build Strong Business Venture
Author: Rob Hibbs
7. Church App – The Latest Way To Stay Connected To Your Preferred Church!
Author: Michael Brody
8. Microsoft Is Embedding A Potent Security Feature To Windows 10
Author: Lena Smith
9. Tell The Story Of Your Family With Free Genealogy Software
Author: Jonathan Clarke
10. Norton Com Setup +1-844-777-9606 Www Norton Com Setup And Installation
Author: Landy Corona
11. 6 Things Highly Successful Software Developers Know
12. Why Do You Need Antivirus Management?
13. Why Choose Lexington Ky For Your It Solutions?
14. Two Of Integrity It’s Best Services
15. Security Solutions Offered By Integrity It