Assessing the availability of forensic evidence from social networking sites: tool capability

aut.embargoNoen_NZ
aut.thirdpc.containsNoen_NZ
aut.thirdpc.permissionNoen_NZ
aut.thirdpc.removedNoen_NZ
dc.contributor.advisorCusack, Brian
dc.contributor.authorAlshaifi, Saud
dc.date.accessioned2016-05-04T22:17:06Z
dc.date.available2016-05-04T22:17:06Z
dc.date.copyright2016
dc.date.created2016
dc.date.issued2016
dc.date.updated2016-05-04T05:10:55Z
dc.description.abstractThe evolution and popularity of Online Social Networking Sites (OSNSs) has produced a new platform for communications and collaborations. Features provided by OSNSs allow users to share information in different types of digital forms such as pictures, text messages, audios, and videos, and for different purposes of use such as social communication, advertisements, online dating, and learning. Due to the public space that OSNSs offer, many users have become psychologically attached to the continuous use of these sites, as they can freely share information about themselves including opinions, feelings, beliefs, locations, and relationships. Thus, OSNSs hold a vast amount of information about individuals, organizations, and governments. OSNSs unfortunately are getting used for crime and illegal activities, including drug dealing, fraud, terrorism, child pornography and so on. Consequently, they have become a source of forensic evidence that can be used in courts of law. However, there is insufficient research that is focused on extracting forensic evidence from OSNSs, and also there are no forensic tools that are designed exclusively for OSNSs forensic investigation. Moreover, several digital forensic tools may have the ability to extract OSNSs artefacts but remain untested. Thus, it is crucial to review and evaluate the capability of these tools in extracting admissible forensic evidence. The purpose of conducting this research is to evaluate three digital forensic tools in terms of recovering forensic evidence from Facebook, Twitter, Instagram, Bayt, and LinkedIn; and to identify the scope of evidence using three different browsers. This research also aims to identify the location and sources that store OSNSs forensic evidence. The testing research was conducted in a laboratory environment based on an exploratory approach. In the preliminary test, functions, and types of data acceptable in each OSNS are identified. Two separate case scenarios were used to generate data using three browsers and to populate the respective test sites. Digital forensic investigation was carried out using three digital forensic tools, which are validated using the SWGDE approach for tool validation testing. Browser files stored in the hard drive, RAM, and pagefile.sys were all examined by the three tools in order to assess the scope and the capabilities. Advice for forensic investigators and guidelines for forensic investigation of OSNSs were developed based on the data collected. The findings from this research showed that extracting forensic evidence from OSNSs is difficult, as artefacts are stored in different locations that are variable. The choice of a web browser used to investigate OSNSs directly influences the scope of digital evidence obtained. Moreover, vital forensic evidence such as Facebook messages, Tweets, and wall posts can be recovered only from RAM and pagefile.sys. It was discovered that the selected digital forensic tools cannot extract the entire evidence available. This is due to the fact that OSNSs activities are not guaranteed to be stored on the computer system. However, the selected digital forensic tools have succeeded in reconstructing sufficient evidence that determines the possibility of illegal, and criminal activities through OSNSs. The findings show that some tools can recover private messages sent and received on Facebook, LinkedIn, and Bayt, and some tools can also recover the message metadata such as unique message ID, sender and receiver names and IDs, date and times of the messages. The findings of this research provide a comprehensive understanding of the capability, strengths, and weaknesses of the selected tools, and the recoverable OSNSs forensic evidence, which can assist forensic investigators, and law enforcement personnel when conducting similar investigations. Opportunities for future research and development in the area of online social network forensics are also listed.en_NZ
dc.identifier.urihttps://hdl.handle.net/10292/9769
dc.language.isoenen_NZ
dc.publisherAuckland University of Technology
dc.rights.accessrightsOpenAccess
dc.subjectDigital forensicsen_NZ
dc.subjectSocial network forensicsen_NZ
dc.subjectTool evaluationen_NZ
dc.subjectOnline Social Networking Sitesen_NZ
dc.subjectBrowser forensicsen_NZ
dc.subjectInvestigation guidelineen_NZ
dc.subjectForensic investigationen_NZ
dc.subjectDigital forensic toolsen_NZ
dc.subjectNetwork forensicsen_NZ
dc.titleAssessing the availability of forensic evidence from social networking sites: tool capabilityen_NZ
dc.typeThesis
thesis.degree.discipline
thesis.degree.grantorAuckland University of Technology
thesis.degree.grantorAuckland University of Technology
thesis.degree.levelMasters Theses
thesis.degree.nameMaster of Forensic Information Technologyen_NZ
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
AlshaifiS.pdf
Size:
5.67 MB
Format:
Adobe Portable Document Format
Description:
Whole thesis
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
897 B
Format:
Item-specific license agreed upon to submission
Description:
Collections