Infinity Forensics

You are here:

SOCIAL MEDIA FRAUD INVESTIGATION

It is hard to deny the booming popularity of social networking sites, the type of sites that facilitate a high degree of user personalization, and user intercommunication. These site are huge, Facebook has more than 800 million active users. Twitter has more than 300 million users posting more than 100 million tweets a day. There’s a huge amount of information about users personal life’s being posted every day. People frequently post information about the more mundane aspects of their lives that they would probably not share with someone during verbal conversation. Additionally, users may share their status, news stories, notes, photos, videos, and allow their friends or friends of friends to comment on them. This information can be very valuable to forensic investigators.

It is unavoidable that this platform may also provide incentives for criminals to carry out illegal activates such as drug, sex trading and many others. Also the ever-growing popularity of social networking websites has created a vast security issues such as corporate espionage, social network site aggregators, phishing, theft, bullying, face recognition vulnerabilities, data collection, spam, etc.

The increase in public’s use of social networking services, such as Facebook, Twitter and LinkedIn significantly impacts general counsel’s approach to litigation, investigations, and fraud prevention by providing a new avenue to search for potentially relevant information and evidence.

Learning Objectives

Determine the nature of online criminal activity
Conducting a background check like character, habits, activities, financial information
Understand how criminal organizations use online social network to interact, identify victims and conceal their identity.
Proving whether a person was cyber-bullied
Identify all of persons involved in the online criminal activity
Obtain evidence of the crime from social networking sites
Challenging an individual’s physical location
Any type of communication inevitably leads to the possibility of evidence
Who Should Attend?

This Master Class is specifically designed for key decision makers in both government agencies and private sectors:

Senior officers from government & not-for- profit sector
GMs, Profit-Centre Managers who have assumed security/IT
Auditors who need to build deeper technical skills
Corporate Attorneys / Legal Professionals
Engineers / Technical Managers
IT manager & Security manager
Program Outlines

Introduction

Modern investigation
Social networks in digital form
Introduction to various social networking sites including Face book, Twitter, YouTube
Anatomy of online social network
Privacy issues
Misuse of social network sites
Overview of legal issues for law enforcement
Social media Crimes

Social Engineering & Phishing
Identity Theft
Profile cloning
Cyberstalking
Hacking accounts
Mining unprotected info
Scams
Information Gathering and Mapping

Advance information gathering and techniques
Determine the identity of a profiles’ creator
Setup an undercover profile
How to use an undercover profile for information gathering
Social networking mapping
History recovery
Status Update
Chat
GPS
Tools

Internet evidence analytical
Memory analytical
Social networking visitor tracker