Social Media Investigation Final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which US Constitutional Amendment is most relevant to the use of social media?

1st

It is possible for investigators to extract digital trace evidence, commonly referred to in the digital evidence community as "_____________" and then perform an analysis.

Artifacts

How do people access social media?

Computer Mobile Phones Tablets Game Consoles

________________ and ______________involve the use of computers and Internet technology to commit crimes such as theft, information sabotage, copyright infractions, distribution of illegal content, industrial espionage, denial of service attacks, trademark infringements and fraud.

Cyberthreats, cyberterrorism

___________________ evidence, by definition, is any probative information stored or transmitted in digital form that a party to a court case may use at trial.

Digital

Social media does not offer valuable evidence for investigators in criminal cases.

False

In the realm of forensic science, _______________ is one of the main theories used to explain the exchange of trace evidence within a particular scene of the crime.

Locard's Exchange Principle

Foursquare is a _________ media site.

Location-based

_________________ is data about data.

Metadata

Which of the following does not require a search warrant to obtain data from a social media provider?

Owners consent

Of the "Social Software Building Blocks" ______ content is one of the largest aims of social media.

Sharing

For all intents and purposes, social media evidence is usually found in one of two places: on the machine or device in residual form, and on the________________________.

network/internet

In business it is extremely rare these days for a business or company to not have at least one social medium describing or advertising their product

True

Organizations, foundations and charities are also taking advantage of the far-reaching scope of social media. Certain politicians or political organizations have waged a "social media war," presenting their stances and opinions for everyone to see while bashing their opponents.

True

Personal and consumer users actively participate on social web sites is in order to keep in touch with old friends while maintaining their current relationships.

True

Social Media is Defined as social networking sites that are "web-based services that allow individuals to (1) construct a public or semi-public profile within a bounded system, (2) articulate a list of other users with whom they share a connection and (3) view and traverse their list of connections and those made by others within the system"

True

The term "blog" comes from Jorn Barger who, in 1997, published a series of links in reverse chronological order, naming it Robot Wisdom WebLog. An online journalist then split the word "WebLog" into "We Blog," coining the use of the common term "blog."

True

In the United States, the __________________________________is the legal measuring stick for any form of electronic evidence, including social media evidence.

US Federal Rules of Evidence

Which US Constitutional Amendment is most relevant to the seizure and searching of social media?

4th

In which of the following are social media artifacts most likely to be found?

Browser cache

Grand jury subpoenas to obtain digital information from social media service providers can vary between jurisdictions. It is important for investigators to consult prosecutors and/ or district attorneys/ district courts within a particular jurisdiction to determine whether or not a subpoena can be legally submitted by the court. In many cases, however, subpoenas can yield information from social media providers such as:

Credit card information E-mail address Name IP address

_____________ is described as " ' willful and repeated harm inflicted through the medium of electronic text', putting targets under attack from a barrage of degrading, threatening and/ or sexually explicit messages and images conveyed using web sites, instant messaging, blogs, chat rooms, cell phones, web sites, e-mail and personal online profiles."

Cyberbullying

_____________ is "an escalated form of online harassment directed at a specific person that causes substantial emotional distress and serves no legitimate purpose. The action is to annoy, alarm and emotionally abuse another person."

Cyberstalking

Of the "Social Software Building Blocks" _____________ is how the member is represented and recognized on the site by other users.

Identity

In the case of social networking, many members describe themselves in their profile, displaying a personal picture and releasing personal information. Only releasing a few pieces of information, such as full name, birth date and address may allow thieves to come up with other basic information not listed on the particular social networking site and commit______________________.

Identity theft

According to the IACP Center for Social Media, what are some of the ways law enforcement use social media?

Intelligence Community outreach/citizen engagement In-service training Recruitment and background investigations

Which is NOT a type of social media mentioned in the textbook?

Krakatoa

_________ is social media that is geared for business professionals to access "professional networking"

LinkedIn

___________________ is malicious software that can install on a computer without the user's knowledge or may trick the user into revealing personal information.

Malware

Social media investigation is being utilized by law enforcement in all of the following methods except ___________.

Phishin

______________is the attempt to gather private information such as account numbers, passwords, credit card numbers or other personal details by creating a site which looks legitimate, usually by sending an e-mail which appears to be from a trustworthy organization. The user follows the directions in the e-mail, entering his personal information as requested.

Phishing

Criminals can build a geolocation profile from embedded location information in posts and _______________-.

Photographs

Social Software Building Blocks: Smith reviewed the seven mechanisms and created a social software honeycomb. Identity is placed in the center of the honeycomb, since it is the most basic requirement of any social media system; what are the remaining six factors that make up the outside of the honeycomb:

Presence Relationships Conversations Groups Reputation Sharing

The "Best Evidence Rule" which in short limits the admissibility of evidence to merely the best that the nature of the case will allow. To exemplify, it can be implied that an original online posting of a particular Facebook profile can essentially be altered by the owner of the profile at any given time, thus an effective ____________of such evidence would suffice as the "best evidence" in place of the original.

Screen capture

_________________provide investigators with the authority to enter a premises, search for the objects specified in the warrant, and seize such items. Search warrants must be supported by probable cause and the articles of the search must be described with sufficient diligence.

Search warrants

Which is considered the first social network?

Sixdegrees.com

A provider of wire or electronic communication service or a remote computing service, upon the request of a governmental entity, shall take all necessary steps to preserve records and other evidence in its possession pending the issuance of a court order or other process.

True

Capturing and collecting social media data in a legally reasonable and court-accepted form should be guided by the current rules of evidence that exist in the legal community.

True

Digital evidence can be hidden (or embedded) from the naked eye, can be hard to locate and capture, or can be nearly impossible to obtain without legal intervention such as court orders and search warrants.

True

In the realm of social media, the investigator has no control over what is happening on the "other end" of the social media site in question. This can be a legal red-flag from the perspective that just like traditional evidence, social media evidence must be collected in a controlled and proper ____________manner.

Forensic


Ensembles d'études connexes

Chapter 2- Understanding Contract Law, Part 2

View Set

M1-Airframe Systems & Applications

View Set

Module 2: International Trade and Investment

View Set

Autonomic Nervous System Mastering

View Set