Social Media Fraud Investigation

It is hard to deny the booming popularity of social networking sites, the type of sites that facilitate a high degree of user personalization, and user intercommunication.  These site are huge, Facebook has more than 800 million active users. Twitter has more than 300 million users posting more than 100 million tweets a day. There's a huge amount of information about users personal life's being posted every day. People frequently post information about the more mundane aspects of their lives that they would probably not share with someone during verbal conversation.  Additionally, users may share their status, news stories, notes, photos, videos, and allow their friends or friends of friends to comment on them. This information can be very valuable to forensic investigators.

It is unavoidable that this platform may also provide incentives for criminals to carry out illegal activates such as drug, sex trading and many others. Also the ever-growing popularity of social networking websites has created a vast security issues such as corporate espionage, social network site aggregators, phishing, theft, bullying, face recognition vulnerabilities, data collection, spam, etc.

The increase in public’s use of social networking services, such as Facebook, Twitter and LinkedIn significantly impacts general counsel’s approach to litigation, investigations, and fraud prevention by providing a new avenue to search for potentially relevant information and evidence.

Learning Objectives 

  • Determine the nature of online criminal activity
  • Conducting a background check like character, habits, activities, financial information
  • Understand how criminal organizations use online social network to interact, identify victims and conceal their identity.
  • Proving whether a person was cyber-bullied
  • Identify all of persons involved in the online criminal activity
  • Obtain evidence of the crime from social networking sites
  • Challenging an individual’s physical location
  • Any type of communication inevitably leads to the possibility of evidence

Who Should Attend?

This Master Class is specifically designed for key decision makers in both government agencies and private sectors:

  • Senior officers from government & not-for- profit sector
  • GMs, Profit-Centre Managers who have assumed security/IT
  • Auditors who need to build deeper technical skills
  • Corporate Attorneys / Legal Professionals
  • Engineers / Technical Managers
  • IT manager &  Security manager

Program Outlines

Introduction

  • Modern investigation
  • Social networks in digital form
  • Introduction to various social networking sites including Face book, Twitter, YouTube
  • Anatomy of online social network
  • Privacy issues
  • Misuse of social network sites
  • Overview of legal issues for law enforcement

Social media Crimes

  • Social Engineering & Phishing
  • Identity Theft
  • Profile cloning
  • Cyberstalking
  • Hacking accounts
  • Mining unprotected info
  • Scams

Information Gathering and Mapping

  • Advance information gathering and techniques
  • Determine the identity of a profiles’ creator
  • Setup an undercover profile
  • How to use an undercover profile for information gathering
  • Social networking mapping
  • History recovery
  • Status Update
  • Chat
  • GPS

Tools

  • Internet evidence analytical
  • Memory analytical
  • Social networking visitor tracker