Chapter 35. Social Media

Information in this chapter:

• Common forms of social networking (social media)
• Evidence out in the open
• Convenience versus security
• The allure of anonymity
• Social media as evidence
• Getting information from online services
The widespread use of social media outlets such as Facebook, Twitter, MySpace, and LinkedIn means that evidence is being continually created, and is often available right in the public domain. The usage of social media does not require that someone be tethered to a computer any more. Almost all social media outlets can be accessed using phones, iPads, and other mobile devices. And all of these can leave some type of evidence on a computer, on a phone, or at a third-party service provider that can be collected for use in a criminal or civil case.
Keywords
Social Media Evidence, Facebook, MySpace, Anonymity, Public Information

Introduction

There are more ways for people to connect with one another than ever before. For example, Facebook reports that they have over 500 million active users. 1 The widespread use of social media outlets such as Facebook, Twitter, MySpace, and LinkedIn ultimately means that evidence is being continually created, and is often available right in the public domain. The usage of social media does not require that someone be tethered to a computer anymore. Almost all social media outlets can be accessed using phones, iPads, and other mobile devices. Facebook alone reports that more than 250 million users are accessing Facebook through their cell phones or other mobile devices. 2

35.1. Common forms of social networking (social media)

The number of social networking websites and applications available today is staggering. If there is a common interest among a group of people, no matter how obscure, there is almost certainly a website or online organization where they can communicate and collaborate. To cover individual social networking websites and applications in any sort of detail would be outside the scope of this book. In the following section, in broad strokes, are examples of the most common forms of social networking, how people interact with them, and how they can be used as evidence.

35.2. Evidence out in the open

A great deal of evidence can be collected from information that is available in the public domain. Examiners should not impersonate someone else, or engage in any activity that might become an invasion of privacy. Creating fake profiles for the purpose of accessing someone’s private profile can raise ethical questions and perhaps even legal questions about such a practice. This is also not necessary because in many cases there are other ways to gather the information without sending a friend request to the person in the first place. This is a limitation in some sense, but working with information available in the public domain can produce a significant amount of evidence that could be of interest in a case.
Most social networking sites have available options to increase the amount of privacy the user has. However, when an account is created with Facebook or MySpace, the default security settings allow other users to see a great deal of information about your profile without having to be your friend or connected to you in any way. This makes sense from the perspective of the companies and organizations that create and supply social media outlets, as it is in their best interest to do everything they can to draw people to their websites. For example, websites geared toward facilitating sexual encounters between people make some of the user profiles viewable for nonmembers of the website. For someone seeking to engage in such an activity, seeing other’s profiles, which could contain such information as location, age, pictures, and sexual interest, would have a greater appeal than a website that would not allow that person to see the information unless they signed up or paid a subscription fee. The purpose in giving some random member information for free is to get the visitor to pay a fee to be able to search for and connect with others in these types of paid sites.
With some websites, such as MySpace, the default privacy settings limit the viewability of a profile by a nonmember to some degree. To see more information, all that is required is to create a dummy profile to make the hidden information available. You would not have to engage the person in any way, either through messaging her or adding her as a friend.
The revenue for social media websites and applications usually comes from advertising. If the websites were locked down with privacy and security as their main objective, it would inhibit their ability to have maximum user traffic. While enhanced privacy options are available with these websites, for the users there is always a trade-off when these security measures are employed. Usually, when a user places enhanced privacy or security on their information, the convenience of using the social media outlets can be decreased. With almost all forms of digital information and devices, people tend to err on the side of convenience. Typically, the more security that is in place, the harder it is to share your information with others, which makes it more difficult to connect with people in social media websites and applications. Since the primary purpose of social networking is in fact to network with others, it is not difficult to understand why someone might risk their information for the sake of convenience, if they even consider privacy to be a priority in the first place.

35.3. Convenience versus security

The choices made by people for convenience over security when using social media extend beyond the privacy settings on their profile or account. Imagine that you had an account with ten different social media websites. One of the most efficient ways to increase your security would be to isolate them from one another by using different e-mail addresses, passwords, and usernames for each of these websites. This would dramatically reduce the likelihood that if someone found one of your online profiles, they would be able to track them all down. However, this would also be extremely inconvenient, as you would have to manage ten e-mail accounts, and remember ten different passwords and usernames. While behavior such as described here is not unheard of, it is rare. When it comes to usernames and e-mail addresses used to create accounts with social media networking websites and applications, people tend to be predictable. If someone has a username they prefer, they will use it whenever they possibly can (if it is not already taken by someone else), and the same is true with e-mail addresses. If a person creates an e-mail address for the sole purpose of engaging in activity that they would not want others to find out about, it is common for them to use that same e-mail address or username for all the social media websites and applications. So if an examiner is able to discover that e-mail address on one social media website, or on a computer or cell phone, it is probable that they will find more if they exist. There are websites available for doing social media searches that can be of great assistance in locating information about a person’s online presence, such as Spokeo (www.spokeo.com). You can check your exposure on Spokeo’s site for free. If you are concerned about what is revealed, you can follow these steps to have Spokeo remove your information from their database:
1. Search for your profile information.
2. Once you find it, copy the entire link in the web browser.
3. Click on the tiny “privacy” link at the very bottom of the page.
4. Paste the profile link into the box provided.
5. Enter your e-mail address.
6. Enter the letters in the box.

35.4. The allure of anonymity

Imagine that you could say whatever you wanted without any repercussions or consequences. This is how many people function in online environments. Much of the realm of social media allows for anonymity, and when people believe that their identity cannot be tied to their comments or actions online, they are much less inhibited with what they say or post.
Evidence of how anonymity affects the way people communicate can be seen all over the web. All you have to do to see this is go and read the comments posted by people on websites and message forums. People say hateful things about and to people that you must believe is not the way they are in real life, unless of course they want to spend most of their time in interactions with others getting punched in the nose. The beauty of the Internet is you can say something that would in many cases cause a physical altercation, but since the other person can’t reach through your monitor and grab you, you are safe to say anything you want.
It is doubtful that someone would say in a post on a news site comment that the best situation for handling a person accused of a crime is to skip a trial and just kill them. Yet you can see these kinds of posts on nearly any news site that allows comments on their news stories.

35.4.1. Hobby or obsession?

If you go and look at the comments posted by people who follow some of the high-profile criminal cases seen on national news, you will see people who become obsessed with these cases, posting all hours of the day and night for months, even years at a time. They become involved in these virtual communities, sometimes to the point that the virtual community is more important than real-life friends and families. They rush back to their computers to get back into the conversation, lamenting even a few hours away from the group they have attached themselves to.
Chat rooms where people gather to socialize are particularly attractive to the person who wants the freedom of anonymity provided by the Internet. By creating a profile that can represent anything or anyone, people log into chat rooms to play out fantasies online, argue with people over religion or politics, and chat about their favorite media personality or sports team and any number of other subjects. The same people may stay in the same chat room for weeks and even years; people who in real life may be a pillar of the community or a shy wallflower can turn into an entirely different person in their online persona, acting out online what they cannot do in the real world.
One of the dangers is that people seem to forget that while they know their online persona may be a complete fabrication, they can begin to believe that the persona of others is representative of the real person. That person you are chatting with and think is a gorgeous lingerie model could just as easily be a guy.
The Internet lets people pretend to be something they are not and never can be, and chances are, they probably will not be exposed for who they really are. This can be very alluring to people who are or believe they are unattractive or unpopular in the real world, but on the Internet they are exactly the opposite: beautiful, handsome, witty, strong, accomplished, smart, and so on. This is because people are responding to a persona, not a person. It is the persona that becomes the online personality, not the poor schlep behind the keyboard.
On the Internet a person can be anything they make up; an adult can be a child, a child can be an adult, and who would be the wiser unless they reveal themselves?
It is human nature to gravitate to groups and places where a person feels accepted and liked. The Internet provides such a place via thousands of chat rooms, discussion forums, virtual online communities, and multiplayer games.
And all of these can leave some type of evidence on a computer, on a phone, and at a third-party service provider.
While this anonymity might seem foolproof to someone unfamiliar with social media examinations, it is not. In some cases, all it takes is a single lead like an e-mail address or a chat handle to bring this anonymous information into the light of day.

35.5. Social media as evidence

Social media evidence works best when it is a part of a body of evidence, meaning that it is usually optimal to use that information in conjunction with evidence gathered from other sources, such as cell phones and computers. However, an examination can be performed successfully with only the information available from social networking sites and other information available online.

35.5.1. Connecting evidence from a device to social media evidence

During the process of a computer or cell phone examination, it is common to find information pertaining to the social media activity of a person. For example, a computer can store information about social media websites in Internet history and unallocated space. While only a limited amount of information might be available on the computer regarding social media activity, if pertinent information is found, such as usernames or an e-mail address, that information can in turn be used in the process of a social media examination to find information about the person online.
For example, in a civil case a company was in the position of being sued for wrongfully terminating an employee. The employee’s computer was examined and numerous e-mail addresses belonging to him that were previously unknown were found. These e-mail addresses were used to find usernames belonging to him. The usernames were associated with social media accounts. This led the examiner to locate his activity on message boards where he posted questionable content. The forum posts led to an e-mail address registered to him from the forum information. Following the lead of this particular e-mail address resulted in locating the registration information for a website domain name he was using to operate a business in competition with his employer, which was a point of contention in the case. The collection of the online information was a direct result of information located on the person’s computer.
In another case involving the murder of a young woman, MySpace messaging was a factor. In many criminal cases, the online information will be quickly deleted by persons who are contacted by police for many reasons. Being able to connect the MySpace accounts from information retrieved from the defendant’s and victim’s computers resulted in the creation of a timeline of messaging among the victim, the victim’s friends, and the defendant. To do this, the examiner must understand how the messaging system works and how MySpace or other media sites record identifying account information inside the web pages and or messages.

35.6. Getting information from online services

Online services like Facebook, MySpace, and others resist giving user profile content in cases unless they are served with a criminal subpoena. Citing the Stored Communications Act, Facebook has successfully resisted complying with civil subpoenas for user content. However, in a recent decision by the Supreme Court, Suffolk County, New York, Judge Jeffrey Arlen Spinner3 ruled that Facebook and MySpace would in fact have to turn over private information. Included here is an excerpt from the ruling:
Ordered, that defendant Steelcase’s motion is hereby granted as set forth herein below.
Defendant Steelcase moves this court for an order granting said defendant access to plaintiff’s current and historical Facebook and MySpace pages and accounts, including all deleted pages and related information upon the grounds that plaintiff has placed certain information on these social networking sites which is believed to be inconsistent with her claims in this action concerning the extent and nature of her injuries, especially her claims for loss of enjoyment of life.
The present application was brought on by order to show cause. The court has reviewed the submissions both in favor of and in opposition to the relief sought, as well as the applicable federal statutory law, specifically the Stored [*2]Communications Act (18 USC § 2701 et seq.), which prohibits an entity such as Facebook and MySpace from disclosing such information without the consent of the owner of the account (see 18 USC § 2702 [b][3]; Flagg v City of Detroit, 252 FRD 346, 352 [ED Mich 2008]).
Information on how to subpoena records from social media sites is covered in Chapter 20.

Summary

In this chapter we looked at the widespread use of social media outlets such as Facebook, Twitter, MySpace, and LinkedIn. We also covered the privacy and security issues connected to social media. We discussed the anonymity factor, and some of the different ways to collect social media evidence with some examples of how this evidence can be used in cases. We also looked at the issues with getting information from online services in civil cases and cited a recent case that may open the door to making this information easier to obtain.
References
[1]
[2]
[3]
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset