Alt-tech social forensics: Forensic analysis of alternative social networking applications

被引:4
|
作者
Johnson, Hailey [1 ]
Volk, Karl [1 ]
Serafin, Robert [1 ]
Grajeda, Cinthya [1 ]
Baggili, Ibrahim [1 ]
机构
[1] Univ New Haven, Cyber Forens Res & Educ Grp UNHcFREG, Samuel S Bergami Jr Cybersecur Ctr, Connecticut Inst Technol, 300 Boston Post Rd, West Haven, CT 06516 USA
关键词
Digital forensics; Mobile; Network; Artifacts; Alternative social media; Parler; MeWe; CloutHub; Minds; SafeChat; GETTR; Wimkin; 2nd1st;
D O I
10.1016/j.fsidi.2022.301406
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mainstream social platforms boast billions of users worldwide. In recent years, popular social platforms have seen a decline in their users that are choosing to migrate to alternative-tech social applications reinforced by frustrations of mainstream social platforms over alleged censorship of free speech and banning of predominant public figures such as the former president of the United States (U.S.). As such, group effect of similar minded users on alternative-tech social platforms may lead to fostering events such as the U.S. Capitol attack on January 6th, 2021, where the spreading of false information and extremist ideologies through alt-tech applications such as Parler and MeWe took place. These cases demonstrate the immense forensic need to understand how alternative-tech social applications operate and what they store about their users' personal information and activities. We present the primary account for the digital forensic study of (n = 9) alternative-tech social applications used on Android and iOS devices. Our analysis includes Parler, MeWe, CloutHub, Wimkin, Minds (Minds Mobile and Minds Chat), SafeChat, 2nd1st, and GETTR. Results revealed that some applications do store unencrypted user information on the devices, such as usernames, phone numbers, email addresses, posts and comments, and private chat messages. Furthermore, some security vulnerabilities were discovered that allow users to download data that should have been private (such as sent private images) without authentication and authorization by other users. Finally, to aid in the analysis and automatic extraction of relevant evidence, we share Alternative Social Networking Applications Analysis Tool (ASNAAT), that automatically aggregates forensically relevant data from the alt-tech social networking applications when presented with a mobile device's forensic image. Published by Elsevier Ltd.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Politicization and Radicalization of Discourses in the Alt-Tech Ecosystem: A Case Study on Gab Social
    Dehghan, Ehsan
    Nagappa, Ashwin
    [J]. SOCIAL MEDIA + SOCIETY, 2022, 8 (03):
  • [2] Forensic analysis of social networking applications on mobile devices
    Al Mutawa, Noora
    Baggili, Ibrahim
    Marrington, Andrew
    [J]. DIGITAL INVESTIGATION, 2012, 9 : S24 - S33
  • [3] Forensic Analysis of Social Networking Applications on an Android Smartphone
    Menahil, Anoshia
    Iqbal, Waseem
    Iftikhar, Mohsin
    Bin Shahid, Waleed
    Mansoor, Khwaja
    Rubab, Saddaf
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [4] Forensic investigation of social networking applications
    Taylor, Mark
    Haggerty, John
    Gresty, David
    Almond, Peter
    Berry, Tom
    [J]. Taylor, Mark, 1600, Elsevier Ltd (2014): : 9 - 16
  • [5] Forensic Examination of Social Networking Applications on Smartphones
    Awan, Fazeel Ali
    [J]. 2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, : 36 - 43
  • [6] Trump, Twitter, and Truth Social: how Trump used both mainstream and alt-tech social media to drive news media attention
    Zhang, Yini
    Lukito, Josephine
    Suk, Jiyoun
    McGrady, Ryan
    [J]. JOURNAL OF INFORMATION TECHNOLOGY & POLITICS, 2024,
  • [7] On the Digital Forensics of Social Networking Web-based Applications
    Al-Duwairi, Basheer
    Shatnawi, Ahmed S.
    Jaradat, Hala
    Al-Musa, Afnan
    Al-Awadat, Hamzah
    [J]. 2022 10TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS), 2022,
  • [8] Network Forensics Analysis of iOS Social Networking and Messaging Apps
    Bhatt, Arpita Jadhav
    Gupta, Chetna
    Mittal, Sangeeta
    [J]. 2018 ELEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2018, : 324 - 329
  • [9] Forensic Analysis of Social Networking Application on iOS devices
    Zhang, Shuhui
    Wang, Lianhai
    [J]. SIXTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2013), 2013, 9067
  • [10] Research on the Forensic Direction of Social Networking Software
    Pu, Guocheng
    Mai, Yonghao
    Liu, Jingwu
    Shuang, Lingxu
    [J]. ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING: FUTURETECH & MUE, 2016, 393 : 517 - 520