Skip to main content
main-content

Über dieses Buch

This book describes the methodologies and tools used to conduct social cyber forensic analysis. By applying these methodologies and tools on various events observed in the case studies contained within, their effectiveness is highlighted. They blend computational social network analysis and cyber forensic concepts and tools in order to identify and study information competitors.

Through cyber forensic analysis, metadata associated with propaganda-riddled websites are extracted. This metadata assists in extracting social network information such as friends and followers along with communication network information such as networks depicting flows of information among the actors such as tweets, replies, retweets, mentions, and hyperlinks. Through computational social network analysis, the authors identify influential actors and powerful groups coordinating the disinformation campaign. A blended social cyber forensic approach allows them to study cross-media affiliations of the information competitors. For instance, narratives are framed on blogs and YouTube videos, and then Twitter and Reddit, for instance, will be used to disseminate the message. Social cyber forensic methodologies enable researchers to study the role of modern information and communication technologies (ICTs) in the evolution of information campaign and coordination.

In addition to the concepts and methodologies pertaining to social cyber forensics, this book also offers a collection of resources for readers including several datasets that were collected during case studies, up-to-date reference and literature surveys in the domain, and a suite of tools that students, researchers, and practitioners alike can utilize. Most importantly, the book demands a dialogue between information science researchers, public affairs officers, and policy makers to prepare our society to deal with the lawless “wild west” of modern social information systems triggering debates and studies on cyber diplomacy.

Inhaltsverzeichnis

Frontmatter

Chapter 1. Deviance in Social Media

Abstract
In this chapter, we explain what we mean by deviance in social media. We give examples of four types of deviance as observed on social media, viz., deviant acts , deviant events , deviant tactics , and deviant groups . We provide historical information, definitions, and examples that will be studied/explained in more details throughout the book. This chapter would help the readers understand the scope of the problem of deviance in social media, familiarize with definitions and examples of deviant events, groups, acts, and tactics, and peek at the social science theories that can explain such emergent deviant behaviors on social media.
Samer Al-khateeb, Nitin Agarwal

Chapter 2. Social Network Measures and Analysis

Abstract
In this chapter, we present basic terminologies and concepts of graph theory in addition to a few social network measures that will be used throughout the book. Then we explain more advanced metrics and concepts that would leverage the basic network measures such as estimating blogs and bloggers’ influence scores and focal structures analysis (FSA). These concepts were used in many real-world cases to find coordinating sets of individuals (coordinating groups) in a given graph. All the concepts and measures are described and illustrated with examples. This chapter would provide the readers with basic understanding of graph-theoretic concepts and social network measures that will help understand the concepts of social cyber forensics in the later chapters.
Samer Al-khateeb, Nitin Agarwal

Chapter 3. Tools and Methodologies for Data Collection, Analysis, and Visualization

Abstract
In this chapter, we briefly introduce a set of tools (mostly free and publicly available) and methodologies that can be used to collect, analyze, and visualize data from OSINF, Facebook, YouTube, Twitter, Blogs, and other sources. We will point out where you can get these tools, the capabilities of each tool, and how we used it in our research. This chapter is meant to give an overview of the tools currently used to conduct social network analysis (SNA), social cyber forensics (SCF), and text analytics. We will not cover the details of all the features/capabilities for each tool in this chapter—as some tools may require a whole book by themselves, but we will highlight each tool’s importance and point out the available resources to interested readers. This chapter should help readers finding answers to some research questions using various tools for data collection, analysis, and visualization.
Samer Al-khateeb, Nitin Agarwal

Chapter 4. Social Cyber Forensics (SCF): Uncovering Hidden Relationships

Abstract
In this chapter, we will introduce the concept of social cyber forensics (SCF) and its usability. Then, we will introduce a tool, i.e., Maltego that can be used to study the cross-media affiliation and uncover hidden relations among different ODGs. In Sect. 4.2 we will provide three stepwise methodologies that can be followed to reach the desired outcome of analysis (e.g., uncovering the hidden relationship between Twitter accounts and a set of websites or blog sites, websites or blog sites and other websites or blog sites, and infer the ownership of a set of websites or blog sites). These methodologies have been tested during many cyber propaganda campaigns to associate and infer the relationships between different online groups. We also provide hands-on exercises to practice each of the methodologies introduced.
Samer Al-khateeb, Nitin Agarwal

Chapter 5. Case Studies of Deviance in Social Media

Abstract
In this chapter, we provide a high-level view of various case studies that include deviant acts , deviant events , and deviant groups . This chapter utilizes the concepts, tools, and methodologies that we presented throughout this book to study, analyze, and have a better understanding of many real-world deviant events, acts, and groups. Here, we briefly highlight case studies of the work we conducted during many deviant cyber campaigns that were projected against NATO forces. In addition to these cases, we shed light on the deviant cyber campaigns conducted by the so-called Islamic State, also known as ISIL, ISIS, or Daesh . We will highlight the major findings of these cases and point the interested reader for more details to other published literature.
Samer Al-khateeb, Nitin Agarwal

Backmatter

Weitere Informationen

Premium Partner

    Bildnachweise