Social Media Investigation Final
Which US Constitutional Amendment is most relevant to the use of social media?
1st
It is possible for investigators to extract digital trace evidence, commonly referred to in the digital evidence community as "_____________" and then perform an analysis.
Artifacts
How do people access social media?
Computer Mobile Phones Tablets Game Consoles
________________ and ______________involve the use of computers and Internet technology to commit crimes such as theft, information sabotage, copyright infractions, distribution of illegal content, industrial espionage, denial of service attacks, trademark infringements and fraud.
Cyberthreats, cyberterrorism
___________________ evidence, by definition, is any probative information stored or transmitted in digital form that a party to a court case may use at trial.
Digital
Social media does not offer valuable evidence for investigators in criminal cases.
False
In the realm of forensic science, _______________ is one of the main theories used to explain the exchange of trace evidence within a particular scene of the crime.
Locard's Exchange Principle
Foursquare is a _________ media site.
Location-based
_________________ is data about data.
Metadata
Which of the following does not require a search warrant to obtain data from a social media provider?
Owners consent
Of the "Social Software Building Blocks" ______ content is one of the largest aims of social media.
Sharing
For all intents and purposes, social media evidence is usually found in one of two places: on the machine or device in residual form, and on the________________________.
network/internet
In business it is extremely rare these days for a business or company to not have at least one social medium describing or advertising their product
True
Organizations, foundations and charities are also taking advantage of the far-reaching scope of social media. Certain politicians or political organizations have waged a "social media war," presenting their stances and opinions for everyone to see while bashing their opponents.
True
Personal and consumer users actively participate on social web sites is in order to keep in touch with old friends while maintaining their current relationships.
True
Social Media is Defined as social networking sites that are "web-based services that allow individuals to (1) construct a public or semi-public profile within a bounded system, (2) articulate a list of other users with whom they share a connection and (3) view and traverse their list of connections and those made by others within the system"
True
The term "blog" comes from Jorn Barger who, in 1997, published a series of links in reverse chronological order, naming it Robot Wisdom WebLog. An online journalist then split the word "WebLog" into "We Blog," coining the use of the common term "blog."
True
In the United States, the __________________________________is the legal measuring stick for any form of electronic evidence, including social media evidence.
US Federal Rules of Evidence
Which US Constitutional Amendment is most relevant to the seizure and searching of social media?
4th
In which of the following are social media artifacts most likely to be found?
Browser cache
Grand jury subpoenas to obtain digital information from social media service providers can vary between jurisdictions. It is important for investigators to consult prosecutors and/ or district attorneys/ district courts within a particular jurisdiction to determine whether or not a subpoena can be legally submitted by the court. In many cases, however, subpoenas can yield information from social media providers such as:
Credit card information E-mail address Name IP address
_____________ is described as " ' willful and repeated harm inflicted through the medium of electronic text', putting targets under attack from a barrage of degrading, threatening and/ or sexually explicit messages and images conveyed using web sites, instant messaging, blogs, chat rooms, cell phones, web sites, e-mail and personal online profiles."
Cyberbullying
_____________ is "an escalated form of online harassment directed at a specific person that causes substantial emotional distress and serves no legitimate purpose. The action is to annoy, alarm and emotionally abuse another person."
Cyberstalking
Of the "Social Software Building Blocks" _____________ is how the member is represented and recognized on the site by other users.
Identity
In the case of social networking, many members describe themselves in their profile, displaying a personal picture and releasing personal information. Only releasing a few pieces of information, such as full name, birth date and address may allow thieves to come up with other basic information not listed on the particular social networking site and commit______________________.
Identity theft
According to the IACP Center for Social Media, what are some of the ways law enforcement use social media?
Intelligence Community outreach/citizen engagement In-service training Recruitment and background investigations
Which is NOT a type of social media mentioned in the textbook?
Krakatoa
_________ is social media that is geared for business professionals to access "professional networking"
___________________ is malicious software that can install on a computer without the user's knowledge or may trick the user into revealing personal information.
Malware
Social media investigation is being utilized by law enforcement in all of the following methods except ___________.
Phishin
______________is the attempt to gather private information such as account numbers, passwords, credit card numbers or other personal details by creating a site which looks legitimate, usually by sending an e-mail which appears to be from a trustworthy organization. The user follows the directions in the e-mail, entering his personal information as requested.
Phishing
Criminals can build a geolocation profile from embedded location information in posts and _______________-.
Photographs
Social Software Building Blocks: Smith reviewed the seven mechanisms and created a social software honeycomb. Identity is placed in the center of the honeycomb, since it is the most basic requirement of any social media system; what are the remaining six factors that make up the outside of the honeycomb:
Presence Relationships Conversations Groups Reputation Sharing
The "Best Evidence Rule" which in short limits the admissibility of evidence to merely the best that the nature of the case will allow. To exemplify, it can be implied that an original online posting of a particular Facebook profile can essentially be altered by the owner of the profile at any given time, thus an effective ____________of such evidence would suffice as the "best evidence" in place of the original.
Screen capture
_________________provide investigators with the authority to enter a premises, search for the objects specified in the warrant, and seize such items. Search warrants must be supported by probable cause and the articles of the search must be described with sufficient diligence.
Search warrants
Which is considered the first social network?
Sixdegrees.com
A provider of wire or electronic communication service or a remote computing service, upon the request of a governmental entity, shall take all necessary steps to preserve records and other evidence in its possession pending the issuance of a court order or other process.
True
Capturing and collecting social media data in a legally reasonable and court-accepted form should be guided by the current rules of evidence that exist in the legal community.
True
Digital evidence can be hidden (or embedded) from the naked eye, can be hard to locate and capture, or can be nearly impossible to obtain without legal intervention such as court orders and search warrants.
True
In the realm of social media, the investigator has no control over what is happening on the "other end" of the social media site in question. This can be a legal red-flag from the perspective that just like traditional evidence, social media evidence must be collected in a controlled and proper ____________manner.
Forensic