UNIT 4 Cyber Security-1
UNIT 4 Cyber Security-1
UNIT 4
• Computer forensics is a branch of digital forensics that deals with the recovery,
investigation, and analysis of data stored on computers and other electronic devices.
• The primary aim of computer forensics is to uncover evidence related to criminal
activities, data breaches, cybercrimes, or any other illegal activities involving digital
systems.
• This discipline involves various methods and tools used to preserve, collect, and analyze
data to ensure its integrity and legality, often in the context of legal proceedings.
Historical Context
• The concept of computer forensics emerged as technology advanced and its integration
into both personal and professional spheres increased. In the 1980s, as personal
computers became more widespread, crimes involving computers, such as hacking, data
theft, and fraud, began to surface.
• This necessitated a specialized approach to investigating digital crimes, leading to the
development of computer forensics as a distinct field.
• The growth of the internet in the 1990s further expanded the scope of computer-related
crimes, such as identity theft, cyberstalking, and online fraud, making forensics more
vital than ever.
Computer forensics has several practical applications in law enforcement, corporate security, and
legal fields:
• Digital forensics science is the practice of recovering, preserving, and analyzing digital
data from electronic devices to investigate crimes or misconduct involving technology.
• This field is essential in the context of criminal investigations, corporate security
breaches, and legal disputes.
• Digital forensics aims to uncover, preserve, and validate digital evidence that can be
used in court.
• It covers a range of devices, including computers, smartphones, tablets, servers, external
storage, and even cloud-based environments.
• The process involves several key steps: identifying potential sources of evidence,
preserving the integrity of the data, collecting relevant information, analyzing it to
uncover valuable insights, and presenting the findings in a manner that is admissible in
legal proceedings.
• Tools such as forensic software, hardware duplicators, and specialized analytical
techniques are used to retrieve hidden, deleted, or encrypted data.
LECTURE NOTES CYBER SECURITY
MAINTAINED BY MS ANAMTA ABBAS
• Digital forensics is used in investigations of cybercrimes like hacking, identity theft, and
online fraud, as well as internal investigations within organizations. It's crucial for tracing
digital footprints, reconstructing events, and establishing timelines of activities.
1. Effective Crime Solving: Digital forensics helps solve complex crimes involving
technology, providing law enforcement with solid evidence.
2. Data Recovery: It allows the recovery of deleted or hidden data, often providing crucial
evidence in investigations.
3. Protecting Privacy and Security: It aids organizations in detecting and preventing data
breaches or unauthorized access to sensitive information.
4. Legal Admissibility: Digital forensics ensures that data is collected and analyzed in a
legally sound manner, which can be used in court proceedings.
5. Preventive Measures: By identifying vulnerabilities in systems and processes, digital
forensics helps organizations improve their cybersecurity posture.
1. Rise in Cybercrime
• Cybercrime is on the rise, with criminals exploiting technology to commit fraud, identity
theft, hacking, data breaches, and online scams. As more people and organizations rely
on digital systems, the potential for digital crimes increases. Computer forensics is crucial
in identifying and investigating cybercrimes, such as:
2. Evidence Recovery
• One of the main roles of computer forensics is to recover deleted, hidden, or corrupted
data from digital devices. In many cases, criminals believe that deleting files or wiping
hard drives will erase their tracks. However, skilled forensic experts can recover valuable
evidence that proves criminal activity, such as:
i. Deleted Files: Data that was thought to be erased or hidden but can still be recovered.
ii. Metadata: Information about when and by whom files were created, modified, or
accessed, which can establish a timeline of events.
iii. Encrypted Data: Forensic techniques can sometimes crack or bypass encryption, making
hidden files accessible for analysis.
• Digital evidence is often pivotal in modern legal cases. With most transactions,
communications, and interactions now taking place in digital spaces, such as emails,
social media, and online banking, computer forensics plays a critical role in gathering and
presenting evidence that is legally admissible in court. This includes:
LECTURE NOTES CYBER SECURITY
MAINTAINED BY MS ANAMTA ABBAS
i. Corporate Investigations: Companies may use computer forensics to investigate
employee misconduct, intellectual property theft, or violations of policies.
ii. Criminal Trials: Law enforcement agencies use forensic experts to retrieve evidence
from computers, mobile devices, and servers that can support criminal cases.
iii. Civil Cases: In cases like divorce or intellectual property disputes, digital evidence can
reveal key communications, files, and transactions.
• Data breaches are a significant concern for organizations and individuals alike.
Cybercriminals target databases, cloud storage, and networks to steal sensitive personal
or business information, such as credit card numbers, intellectual property, and client
records. Computer forensics helps:
i. Identify the Source: Forensics experts can trace the source of a data breach, determining
how the intrusion occurred and what vulnerabilities were exploited.
ii. Assess the Damage: Forensics helps in understanding what information was accessed or
stolen, helping businesses and individuals understand the scope of the breach.
iii. Improve Security: By analyzing a breach, computer forensics professionals can
recommend security measures to prevent future incidents.
• Financial institutions and businesses are frequently targeted by fraudsters who exploit
digital systems for illicit financial gain. Computer forensics can help track fraudulent
activities like:
LECTURE NOTES CYBER SECURITY
MAINTAINED BY MS ANAMTA ABBAS
i. Bank Fraud: Investigating unauthorized transactions, money laundering, or hacking into
financial systems.
ii. Corporate Fraud: Identifying fraudulent activities within companies, such as
embezzlement or accounting fraud.
iii. Credit Card Fraud: Tracing illegal activities involving stolen credit card information or
unauthorized transactions.
• Digital forensics plays a vital role in national security efforts. Terrorist organizations,
criminal syndicates, and extremist groups increasingly use digital means to communicate,
organize, and fund their activities. Computer forensics aids law enforcement agencies and
intelligence organizations by:
• E-mail forensics involves the investigation and analysis of electronic mail (e-mail)
messages to uncover evidence in criminal cases or civil disputes.
• Given that e-mails are one of the most widely used communication methods in personal,
business, and criminal contexts, they often serve as a rich source of evidence in various
investigations.
• E-mail forensic analysis can help to authenticate or refute claims, uncover hidden
messages, identify the sender/receiver, and establish timelines of communication.
• E-mail headers contain valuable metadata that can be used to trace the origin and
path of a message. These headers are typically hidden from regular users but can
be extracted and analyzed by forensic experts. Key information in an e-mail
header includes:
o Sender’s IP Address: Helps determine the physical location of the sender at the
time the email was sent.
LECTURE NOTES CYBER SECURITY
MAINTAINED BY MS ANAMTA ABBAS
o Message Routing Path: Shows the servers and networks through which the e-
mail traveled.
o Timestamp: Provides the date and time the e-mail was sent and received, which
can be used to establish timelines.
o Return Path: Identifies the server used to send the message and may help
confirm the legitimacy of the sender.
o Message-ID: A unique identifier for each e-mail, useful for identifying duplicates
or verifying authenticity.
By examining these details, forensic experts can often determine the true origin of the message,
detect forged e-mails, or trace e-mail spoofing attempts.
1. Criminal Investigations
E-mails are often used in criminal cases to establish communication patterns between
suspects. Forensic analysis can uncover critical evidence that might link a suspect to a
crime, such as threatening messages, communications between conspirators, or evidence
of planning illegal activities.
2. Corporate Investigations
In the corporate world, e-mail forensics is commonly used to investigate fraud,
intellectual property theft, harassment, or breaches of company policies. For example,
LECTURE NOTES CYBER SECURITY
MAINTAINED BY MS ANAMTA ABBAS
forensic analysis can uncover evidence of data theft or attempts to cover up illicit
activities through deleted or altered e-mails.
3. Civil Litigations
E-mail forensics is used in civil cases to resolve disputes or provide evidence in lawsuits.
For example, e-mails could be used to verify contracts, establish timelines, or prove a
breach of duty.
4. Fraud Investigations
In cases of financial fraud or investment scams, e-mail communications can serve as a
significant source of evidence, revealing key conversations, instructions, or misleading
information exchanged between parties.
• Encryption and Security Measures: Many criminals or malicious actors use encryption,
secure e-mail services, or pseudonymous e-mail addresses to conceal their identity. This
makes it more difficult to perform thorough forensics.
• Data Volume: The sheer volume of e-mail traffic can be overwhelming, especially in
large organizations. Forensic experts must sift through large datasets to identify relevant
information, which can be time-consuming.
• Tampering and Deletion: Criminals may attempt to delete or alter e-mails to cover their
tracks, making it challenging to extract reliable evidence.
1. Identification
• Scope: This stage involves determining which devices, data sources, and systems could
contain relevant evidence. These can include computers, mobile phones, servers, hard
drives, USB drives, cloud storage, emails, and more.
• Key Activities:
o Identifying devices such as computers, mobile devices, storage devices, and
network logs.
o Recognizing the type of data that might be relevant to the case (e.g., deleted files,
logs, or communications).
o Identifying the digital environment, such as cloud services, databases, or IoT
devices that may contain pertinent evidence.
2. Preservation
• Scope: Digital evidence can be easily altered or deleted if not properly handled. The
preservation stage focuses on maintaining the evidence in its original state.
• Key Activities:
o Create Forensic Images: Make exact, bit-by-bit copies of the digital storage
devices (hard drives, phones, etc.) to prevent altering the original evidence. These
are known as forensic images or disk images.
o Write Blockers: Use write blockers to prevent any modification of the original
storage devices during evidence collection.
o Document Chain of Custody: Record all actions taken on the evidence,
including who accessed it, when, and for what purpose. This documentation is
crucial for ensuring that the evidence is admissible in court.
3. Collection
• Scope: Data collection involves extracting relevant information from digital devices
while ensuring that no data is altered during the process. Forensic investigators use
specialized tools and techniques to ensure that the process is as thorough and non-
invasive as possible.
• Key Activities:
LECTURE NOTES CYBER SECURITY
MAINTAINED BY MS ANAMTA ABBAS
o Collection of Data: Extracting data from various devices like computers, mobile
phones, external drives, servers, etc.
o Data Types: This could include files, emails, web browsing history, logs,
metadata, system configurations, and even live data such as running processes or
active network connections.
o Collect Volatile Data: In certain cases, investigators may need to capture volatile
data from live systems, such as RAM (random access memory) or active
processes, before the device is powered off.
Purpose: Analyzing the collected data to identify evidence and reconstruct events.
• Scope: This stage is about uncovering hidden, deleted, or obfuscated data and
determining its relevance to the investigation. Data analysis might involve searching for
patterns, recovering deleted files, decrypting data, or analyzing metadata.
• Key Activities:
o Data Recovery: Restoring deleted or corrupted files that could be crucial for the
investigation.
o Data Filtering: Identifying relevant data from large volumes of information,
including documents, emails, files, web activity, logs, and more.
o Analysis Techniques: Using specialized forensic tools (such as EnCase, FTK, or
Autopsy) to analyze data, recover deleted files, and identify suspicious activities.
o Metadata Analysis: Investigators often analyze metadata (such as creation,
modification, and access timestamps) to establish timelines or verify the
authenticity of the evidence.
o Forensic Tool Usage: Utilizing forensic tools and software to analyze large
datasets, recover hidden files, crack passwords, decrypt messages, and more.
5. Interpretation
Purpose: Making sense of the data to draw conclusions that are relevant to the investigation.
• Scope: Once the evidence is analyzed, it needs to be interpreted in the context of the case.
This involves understanding the data, linking it to criminal behavior, and developing a
narrative based on the digital evidence.
• Key Activities:
o Establishing a Timeline: Creating a timeline of events based on the collected
data to understand the sequence of actions or communications.
o Contextualizing Evidence: Correlating the data with other information from the
investigation (e.g., witness statements, physical evidence) to build a clear case.
LECTURE NOTES CYBER SECURITY
MAINTAINED BY MS ANAMTA ABBAS
o Identifying Links: Tracing relationships between different pieces of evidence to
establish connections (e.g., identifying a suspect’s involvement or intentions
through digital trails).
6. Documentation
Purpose: Recording all findings, methodologies, and processes for future use in legal or
investigative proceedings.
• Scope: Documentation ensures that all actions taken during the investigation are fully
recorded. This helps establish the credibility of the findings and ensures that they can be
used in court if necessary.
• Key Activities:
o Detailed Reporting: Preparing a detailed forensic report that outlines all the
findings, the methods used in the investigation, and any conclusions drawn.
o Supporting Evidence: Including all supporting evidence such as logs,
screenshots, data prints, and analysis summaries.
o Chain of Custody: Documenting the chain of custody for the evidence to ensure
that the evidence has not been tampered with or altered during the investigation
process.
7. Presentation
• Scope: The findings from the forensic analysis must be presented in a way that can be
understood by legal authorities, judges, jurors, or other stakeholders. This is often a
critical stage as the outcome of the investigation might lead to legal consequences.
• Key Activities:
o Court Presentation: Forensic investigators may be called to testify in court to
explain the methods used, the findings, and the conclusions drawn. This requires
the expert to present complex technical details in an understandable manner.
o Evidence Presentation: Presenting the evidence (e.g., e-mails, data logs, or
recovered files) in a clear, concise manner to support the investigation’s
conclusions.
o Expert Testimony: Forensic experts may need to testify as an expert witness to
explain the methods used in the investigation, the tools used for analysis, and the
interpretation of the findings.
LECTURE NOTES CYBER SECURITY
MAINTAINED BY MS ANAMTA ABBAS
8. Final Reporting
Purpose: Providing a final report that documents the entire investigative process and
conclusions.
• Scope: A final, comprehensive report is produced, which serves as the official record of
the investigation. It contains all the details of the steps taken, methodologies used,
findings, and conclusions.
• Key Activities:
o Summary of Findings: A clear summary of the evidence found, how it was
collected, and its relevance to the case.
o Technical and Legal Aspects: A balance between technical explanations and
legal implications, ensuring the findings are accessible and valid for legal
proceedings.
• Volume of Data: The sheer amount of data involved can make it challenging to identify
relevant evidence.
• Encryption: Encrypted data may require additional time and resources to analyze,
particularly if passwords or decryption keys are unavailable.
• Data Corruption: Some data may be corrupted or fragmented, complicating the analysis
process.
• Legal and Ethical Considerations: Ensuring that all actions taken are within the
boundaries of the law and ethical guidelines is critical for the admissibility of evidence.
• The Chain of Custody refers to the detailed and documented process of tracking the
handling and movement of evidence from the moment it is collected until it is presented
in court. In digital forensics, maintaining a proper chain of custody is critical to ensure
that digital evidence—such as hard drives, mobile devices, or files—is not tampered with
or altered during the investigation process.
• When digital evidence is handled improperly, it risks being deemed inadmissible in court.
This is why the chain of custody is one of the most important concepts in digital
forensics, as it preserves the integrity of the evidence and ensures its authenticity.
1. Documentation
LECTURE NOTES CYBER SECURITY
MAINTAINED BY MS ANAMTA ABBAS
• Every step of the process must be carefully documented. This includes recording
the identity of individuals who handle the evidence, the times at which it was
collected or transferred, and any actions taken with the evidence. Documentation
is typically stored in a chain of custody form or a logbook.
o Key Information:
▪ Date and time of evidence collection
▪ Name and signature of the person who collected the evidence
▪ Description of the evidence (type, serial numbers, etc.)
▪ The condition of the evidence at the time of collection
▪ Locations where the evidence was stored or analyzed
2. Sealing and Labeling
Digital evidence must be properly sealed and labeled to prevent unauthorized access.
This typically involves:
o Sealing: Placing the evidence in tamper-evident bags or containers.
o Labeling: Assigning unique identifiers to the evidence, such as case numbers,
serial numbers, and barcodes, to track it easily.
Proper labeling ensures that the evidence can be identified and traced accurately at every
stage of the investigation.
1. Collection of Evidence
The process starts with the proper identification and collection of the evidence. This
includes documenting:
o What is collected (e.g., a laptop, external hard drive, smartphone).
o Where it was collected (e.g., the scene of the crime, from a suspect's property).
o Who collected it and the date/time of collection.
2. Sealing and Labeling Evidence
Once collected, evidence should be sealed in a tamper-evident container. A unique
identifier, like a barcode or serial number, is assigned to the evidence to track it.
3. Transport and Transfer
Evidence should be transported securely to a storage facility or forensic lab. Every time
evidence is moved, a documented transfer (often in the form of a chain of custody form)
is required, listing:
o Who transferred the evidence.
o Where and why it was transferred.
o Who received the evidence at the destination.
4. Storage
Evidence must be stored in a secure and controlled environment to prevent tampering.
This includes:
o Physical security (locked storage areas).
o Digital security (encrypted storage or secure servers).
5. Analysis
During forensic analysis, the evidence should be protected from alteration. Investigators
use techniques like write-blocking to ensure the original data remains intact.
LECTURE NOTES CYBER SECURITY
MAINTAINED BY MS ANAMTA ABBAS
6. Presentation in Court
When evidence is presented in court, the entire chain of custody must be demonstrated to
show that the evidence has not been tampered with. Investigators or forensic experts may
be called upon to testify about how they handled the evidence and maintain its integrity.
A break or gap in the chain of custody occurs when one of the critical steps is not documented
or executed correctly, such as:
If the chain of custody is broken, the defense can challenge the validity of the evidence, arguing
that it may have been altered or contaminated. In some cases, this can lead to the exclusion of
evidence in court.
Network Forensics
• Network forensics and computer forensics both play key roles in digital investigations, but they
focus on different aspects of digital evidence collection, analysis, and presentation. Here's an
outline of how to approach a computer forensics investigation with a particular focus on network
forensics:
1. Preparation Phase
• Authorization: Make sure you have the proper legal authority to conduct the
investigation (e.g., warrants, consent).
• Chain of Custody: Ensure all evidence is collected, handled, and stored according to
legal standards to preserve its integrity.
• Privacy Concerns: Be mindful of privacy rights and data protection laws (GDPR,
HIPAA, etc.).
• Determine whether the focus is purely network-based (e.g., intrusions, traffic analysis) or
involves systems at rest (e.g., file systems, logs, applications).
• Clarify if the investigation involves internal systems, third-party service providers, or
external hackers.
LECTURE NOTES CYBER SECURITY
MAINTAINED BY MS ANAMTA ABBAS
2. Network Forensics Investigation
Network forensics involves capturing and analyzing network traffic to uncover digital evidence.
It is often crucial for identifying the source of an attack, understanding how the attack occurred,
and preventing future incidents.
a. Evidence Collection:
• Packet Capturing: Tools like Wireshark or tcpdump allow you to capture live network
traffic.
• Network Logs: Routers, firewalls, IDS/IPS systems, and web servers often log important
network events.
• Intrusion Detection/Prevention Systems (IDS/IPS): These systems might provide
valuable data on abnormal network activity or unauthorized access attempts.
• Server Logs: Logs from DNS, web servers, or application servers could provide crucial
insights into user behavior and access patterns.
b. Data Preservation:
• Ensure that collected data is stored securely, maintaining a clear chain of custody to
avoid any challenges in court.
• Network traffic logs and packet captures should be preserved in their raw form for future
analysis.
c. Initial Analysis:
• Traffic Analysis: Investigate traffic patterns, such as unusual spikes in network activity,
large data transfers, or unauthorized access.
• Protocols: Look for unusual or unexpected protocols in use. If you see SMB traffic on
ports where it’s not supposed to be, it could indicate a data exfiltration attempt.
• Source & Destination Analysis: Identify the origin and target of traffic. Suspicious
traffic might come from known malicious IP addresses or countries.
d. Detailed Analysis:
• Traffic Reconstruction: Reconstruct sessions from captured packets. If the attacker used
tools like Metasploit or RATs (Remote Access Trojans), their commands might be visible
in the traffic.
• Timeline Creation: Use network logs and traffic captures to build a timeline of events
leading up to the incident. This helps identify attack vectors and potentially compromised
accounts or systems.
While network forensics focuses on traffic, computer forensics focuses on the data stored on
devices, such as files, operating system artifacts, logs, and user activity.
LECTURE NOTES CYBER SECURITY
MAINTAINED BY MS ANAMTA ABBAS
a. Evidence Collection:
• Data Acquisition: Make an exact copy (bit-for-bit) of the device’s hard drives or storage
volumes. Use write-blockers to prevent modifying the original data during acquisition.
• Operating System Artifacts: Focus on system logs, user profiles, registry (Windows), or
plist files (Mac) for traces of activity.
• Files and Metadata: Look for unusual file modifications or hidden files (e.g., files
created by malware, exfiltrated data).
• Deleted Files: Investigate file slack, unallocated space, and deleted files. Data might still
be recoverable from these areas.
• File Analysis: Review document files, email correspondence, or system logs that could
provide insights into the activity that took place.
• Hidden Data: Use steganography tools or search for encrypted files that could indicate
hidden data.
c. Malware Analysis:
• Correlate network data with local system logs. For example, if you find unusual traffic on
a network log, check if there are related artifacts in system logs on the corresponding
machine.
4. Analysis Phase
• Use both network and system-based evidence to piece together the events. For example,
if there’s evidence of an attacker exploiting a vulnerability, try to match that with
suspicious network traffic or system events.
• Build a timeline based on both network traffic and file modifications on affected systems.
• Look for common attack vectors such as phishing, web shell exploitation, or remote
access tools (RATs).
• Analyze whether the attack came from an insider or external source, and track down the
attack’s progression from the initial entry point to the final impact.
LECTURE NOTES CYBER SECURITY
MAINTAINED BY MS ANAMTA ABBAS
c. Reporting and Documentation
• Create a detailed report documenting your findings, methods used, and the overall
process.
• Include the timeline, affected systems, actions taken during the investigation, and any
recommendations to improve security.
5. Post-Investigation
• Based on your findings, recommend corrective actions. For example, if the attack came
via a phishing email, improving employee training and email filtering would be essential.
• Patch systems or configure network defenses to prevent future incidents.
• If required, prepare evidence for legal proceedings. Ensure the integrity and chain of
custody of the evidence are well-documented.
• Conduct a root cause analysis to understand how and why the attack occurred. Was it a
vulnerability in the system, lack of monitoring, or user negligence?
a. Privacy Violations
b. Cyber Threats
• Third-Party Apps: Many SNS allow third-party applications that access users' personal
data. These apps may inadvertently or maliciously leak sensitive information.
• Data Breaches: SNS platforms themselves can be the target of large-scale data breaches,
exposing millions of users' private information.
• API Vulnerabilities: Social media platforms may have insecure or poorly configured
APIs, allowing attackers to extract large quantities of data without proper authorization.
LECTURE NOTES CYBER SECURITY
MAINTAINED BY MS ANAMTA ABBAS
2. Challenges in Computer Forensics on Social Media
The integration of social networking sites into everyday life has created complex challenges for
computer forensics investigations. Here are some of the most significant obstacles faced by
forensic investigators when dealing with data from SNS:
• Temporary Data: Many SNS platforms make extensive use of temporary data storage or
cache, which can be deleted automatically or expire after a certain time. For instance,
Facebook and Instagram may delete messages or posts after a short duration, making it
difficult to retrieve relevant data for an investigation.
• User-Controlled Data Deletion: Users have the ability to delete posts, messages, or
entire accounts, which can hinder the investigation. Some platforms also automatically
delete content after a certain period of time or when accounts are deactivated.
• Ephemeral Content: Features like Snapchat’s disappearing messages and Instagram’s
Stories make it harder to track down evidence, as the content disappears after a set
period.
b. Data Encryption
• End-to-End Encryption: Some social networking services (like WhatsApp) offer end-
to-end encryption, which prevents anyone—including service providers—from accessing
the content of communications. While this is excellent for privacy, it makes it much more
difficult for investigators to access message contents unless they have access to the user’s
device or account credentials.
• Encrypted Media: Photos and videos shared on social media may be encrypted in such a
way that investigators need specialized tools to extract and analyze the content properly.
• Massive Data Sets: Social media platforms generate huge amounts of data daily, from
messages, images, videos, and posts to comments and likes. This flood of information
can make it difficult to identify relevant evidence or trace specific events in the midst of
irrelevant noise.
• Dynamic Content: Social networks are continuously changing, with new posts, updates,
and comments appearing all the time. Forensic investigators must work fast to capture
relevant data before it is removed or altered.
• Cross-Border Data: Many SNS platforms store user data on servers located in multiple
countries, which creates jurisdictional issues. Different countries have different privacy
and data protection laws (e.g., GDPR in the EU), and these laws can complicate the
process of obtaining data from SNS companies.
• Platform Cooperation: Social media companies may not always be forthcoming with
data, especially in jurisdictions where they do not have legal obligations to comply. They
LECTURE NOTES CYBER SECURITY
MAINTAINED BY MS ANAMTA ABBAS
may be unwilling to cooperate unless a court order or subpoena is provided, which can
delay investigations.
• Privacy Laws: Legal considerations around privacy (e.g., GDPR, CCPA) can restrict
access to user data. Investigators need to be aware of the legal implications of accessing
and using personal data from SNS platforms.
e. Platform-Specific Challenges
• API Restrictions: Some platforms have strict API (Application Programming Interface)
access policies that limit the amount and type of data that can be retrieved. For example,
many platforms only provide historical data through API requests for a short time
window.
• Content Alteration: Many social media platforms allow users to edit or delete their
posts, making it hard for investigators to determine the original content. Even deleted
content might still be available in cached versions or through third-party services like
Google.
• Metadata and Context: Social media platforms often strip or fail to provide important
metadata when content is shared or reposted, making it difficult to verify authenticity and
understand the context of the content.
• False Identities: Social media users can create fake profiles or impersonate others. This
creates problems for investigators trying to authenticate the identity of a user or link a
particular post or message to a specific individual.
• Shared Devices: Multiple individuals may use the same device to access social media
platforms, which makes it difficult to determine who performed a particular action or
posted a specific piece of content.
• Spoofed or Manipulated Content: Photos, videos, and text can be altered, manipulated,
or spoofed to deceive investigators or hide the truth. For example, images might be
edited, or someone could change the metadata on a piece of content to mislead
investigators.
• Subpoenas and Legal Orders: In many cases, investigators can obtain data directly
from social media providers through subpoenas or court orders. Providers like Facebook,
Twitter, and Google have legal processes to request data, and forensic investigators
should be familiar with how to use these tools to obtain evidence.
• Collaboration with Digital Forensic Firms: Sometimes, third-party firms specialize in
data extraction and forensic analysis from social media platforms. These companies have
experience navigating the complexities of accessing and analyzing data from SNS.
LECTURE NOTES CYBER SECURITY
MAINTAINED BY MS ANAMTA ABBAS
b. Use of Specialized Forensic Tools
• Tools like X1 Social Discovery, Cellebrite, and Oxygen Forensics are designed to
extract, preserve, and analyze data from mobile devices and social media platforms,
overcoming many of the limitations of platform-specific restrictions.
• Social Media Analysis Tools: Investigators can use specialized tools that focus on social
media forensics, such as Maltego for data mining and link analysis, or Social Media
Investigations tools to search public profiles and trace connections between individuals.
• Timely Capture: To avoid losing data, investigators should capture and preserve
evidence as quickly as possible. Using browser-based tools, browser extensions, or
dedicated forensic tools, investigators can archive entire social media pages, profiles, and
conversations.
• Preservation of Metadata: Tools like FTK Imager or EnCase can be used to preserve
the original metadata of social media content, which can be critical for verifying
authenticity.
• Given the rapidly evolving landscape of social media platforms, forensic professionals
need to stay informed about the latest privacy and data protection laws (e.g., GDPR,
CCPA). Understanding these laws will help investigators navigate the complexities of
data access while ensuring compliance.