1. Data Mining And Internet Profiling: Approaches to Successful Online Social Media Investigations Shellee Hale
2. Shellee Hale - President of Camandago, Inc. WA Licensed Private Investigator CAS – Certified Anti-Terrorism Specialist CEMS – Certified Emergency Management Specialist Specializes in: Cyber Tracing Dataveillance Cyber Warfare Threat Profiling Constituent for the Overseas Security Advisory Council (OSAC) Federal Advisory Committee with a U.S. Government charter to promote security cooperation between US private sector interests worldwide and U.S. Dept. of State Infragard Member Seattle FBI Citizens Academy Alumni Association
39. Information that isn't static but assembled dynamically in response to specific queriesSubject-Specific Databases (Vortals) are devoted to a single subject ie WebMD
40.
41. Understand legitimacy of web address: edu, gov, mil- most reliable sources. com, net ,org Countries have specific codes .ca, .uk, etc
42. look closely at the page sponsor, last date updated, and the authority of the author(s) if possible.
47. Social Media Networks Analyzing Social Media Networks with NodeXL: Insights from a Connected World Derek Hansen, Ben Shneiderman, Marc A. Smith
48.
49. Website TOS, Privacy Laws And Proposed Regulations Social Media is a key component to profiling a subject of investigation. The pool of information about each individual can form a distinctive “social signature,” But there are limitations to the info you can access on a Social Network due to privacy settings and anonymity.
50. Issues With Anonymity We have a right to it, but websites are not allowing it via TOS. You can be anonymous online, but how can u be anonymous online when they are asking for real info? If you go into Facebook and setup a profile, their TOS say that is you. You have to have a valid email address, but how do you know that they are using any random email address and name? It is not illegal for internet users to impersonate or create a false identity online. Popularity of a site comes with vulnerability of attack. We are seeing and increase in SPOOFING - ie reset password emails giving someone else ownership of your account. Be advised that accounts under a persons name can be a result of spoofing and not nessicarily created by a user. In the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.
51. The Privacy Debate We want privacy We expose private details of our lives online. Once you post something, you are leaving a digital footprint that is owned by the site. Facebook has been receiving a lot of bad press. Users fear of how their data might be used. Privacy Policies and TOS are constantly being changed We are seeing 2 different agendas in terms of advocates in online privacy We put pressure on websites to protect our information, and we do reserve that right. But the same time because of the vast scope and information on social media the government wants a backdoor to get info for investigations and terrorism research. this will leave personal info vulnerable to hackers... Consider This… There are different privacy laws in every country. Check TOS and privacy laws on each websites. They may allow backdoors.
65. Organizational tools - Search for your captures by date, website, or a custom flag that you create and assign.
66. Centrifuge Systems Centrifuge has created a powerful approach to analysis called “Interactive Analytics”. Our next generation approach provides groundbreaking visualizations accessible from any browser and any operating system. “Interactive Analytics” (IA) is based on extensive work with the US Intelligence Community and brings together three innovations in analytics today, Interactive Data Visualization, Unified Data Views and Collaborative Analysis. http://www.centrifugesystems.com/
76. Factors in Predicting Online Deception DECEPTION Any intentional control of information in a message to create a false belief in the receiver of the message
79. Self-preservation goal (‘likeable’) increases deception “Electronic mail is a godsend. With e-mail we needn’t worry about so much as a quiver in our voice or a tremor in our pinkie when telling a lie. Email is a first rate deception-enabler.” ~Keyes (2004) The Post-Truth Era
117. Adults posing as children etclies or exaggerations of one’s physical appearance, personality or characteristics, or even slight exaggerations of a genuine characteristic such as denying being a smoker, drinker, etc. One can have ‘as many electronic personas as one has time and energy to create’ (Donath, 1999).
118. CASE STUDY ON DECEPTION ON FACEBOOK STUDY the University of Texas at Austin that suggest users express their true personality – not an embellished identity – over online social networks such as Facebook. The Texas researchers collected 236 profiles of college-aged users of Facebook in the United States and StudiVZ, the equivalent in Germany. The users filled out questionnaires about their personality and also about who they'd like to be. Strangers browsed and rated the online profiles, and the study authors compared the ratings with the users' questionnaires. FINDINGS: Networks such as Facebook are more “genuine mediums for social interactions than vehicles for self-promotion,” But whether honesty on Facebook comes naturally or is necessitated by your audience is up for debate “You don't have full control over it. Other people can write things on your wall and tag you in unflattering photos. etc” Stated Professor Hancock
119. Detecting Deception Inconsistencies in actions or words do not necessarily indicate a lie, just as consistency is not necessarily a guarantee of the truth. However, a pattern of inconsistencies or unexplainable behavior normally indicate deceit.