REFERENCES
7safe. (2014). The ACPO Good Practice Guide for Managers of e-Crime investigation (Tech. Rep.). Retrieved from www.7safe.com
ACPO. (2012, March). Good Practice Guide for Digital Evidence. Retrieved from http://library.college.police.uk/docs/acpo/digital-evidence-2012.pdf (Version: 5.0)
Arshad, H., Jantan, A., & Omolara, E. (2019). Evidence collection and forensics on social networks: Research challenges and directions. *Digital Investigation, 28 *, 126–138.
Ballenthin, W. (2019). python-evtx. Retrieved from https://github.com/ williballenthin/python-evtx
Bancel, Jean-Rémy. (2015). Chromagnon (SNSS Branch). GitHub. Retrieved from https://github.com/JRBANCEL/Chromagnon/tree/SNSS (Latest commit 2cbecb1 on 28 Mar 2018)
Bashir, M. S., & Khan, M. N. A. (2013). Triage in Live Digital Forensic Analysis. The International Journal of Forensic Computer Science, 1 , 35–44. doi: 10.5769/J201301005
Basis Technology. (2020). Free Autopsy Training. Retrieved from https:// www.autopsy.com/support/training/covid-19-free-autopsy-training/
Bello, M., & DiBlasio, N. (2013, sep). Twitter: The new face of crime. USA Today. Retrieved from http://www.usatoday.com/story/news/nation/2013/09/29/ twitter-crime-dark-side/2875745/
Benson, R. (2019). Hindsight. Retrieved from https://github.com/obsidianforensics/hindsight
Blumenbach, T. (2015). mozlz4a.py. Retrieved from https://gist.github.com/Tblue/ 62ff47bef7f894e92ed5
Cambridge University Press. (2019). Cambridge Dictionary [Online]. Retrieved from http://dictionary.cambridge.org/
Cantrell, G., Dampier, D., Dandass, Y. S., Niu, N., & Bogen, C. (2012). Research toward a Partially-Automated, and Crime Specific Digital Triage Process Model. Computer and Information Science, 5 (2). Retrieved from www.ccsenet.org/cisURL:http:// dx.doi.org/10.5539/cis.v5n2p29 doi: 10.5539/cis.v5n2p29
Cantrell, G., & Dampier, D. A. (2012). Implementing the Automated Phases of the Partially-automated Digital Triage Process Model. Journal of Digital Forensics, Security and Law, 7 (4). Retrieved from https://commons.erau.edu/jdfsl/vol7/iss4/5/
Carrier, B. (2020). Autopsy 4.15.0. GitHub. Retrieved from https://github.com/sleuthkit/autopsy/releases/
Casey, E. (2004, jan). Digital evidence and computer crime: Forensic Science, Computers and the Internet. Elsevier Academic Press, 215.
Casey, E. (2011). Digital Evidence and Computer Crime, Forensic Science, Computers and the Internet. In (Third Edition ed., chap. 1: Foundations of Digital Forensics). Elsevier Inc.
Casey, E. (2013). Triage in digital forensics. Digital Investigation, 10 , 85–86.
Cusack, B., & Son, J. (2012). Evidence Examination Tools for Social Networks. In 10th australian digital forensics conference (pp. 33–40). SRI Security Research Institute, Edith Cowan University, Perth, Western Australia. doi: 10.4225/75/57b3afc1fb861
Dance, F. E. X. (1967). Towards a Theory of Human Communication (In Human Communication Theory: Original Essays). Holt, Rinehart and Winston, New York.
David, A., Morris, S., & Appleby-Thomas, G. (2020). A Two-Stage Model for Social Network Investigations in Digital Forensics. Journal of Digital Forensics, Security and Law, 15 (1). Retrieved from https://commons.erau.edu/jdfsl/vol15/iss2/1
DFRWS. (2001). A Road Map for Digital Forensic Research: DFRWS Technical Report (Tech. Rep. No. DTR - T001-01). DFRWS: Digital Forensic Research Workshop.
Garfinkel, S. L. (2013, feb). Digital media triage with bulk data analysis and bulk_extractor. Computers & Security, 32 , 56–72. Retrieved from https:// www.sciencedirect.com/science/article/pii/S0167404812001472 doi: 10.1016/J.COSE.2012.09.011
Gielen, M., & Bolzoni, D. (2014). Prioritizing Computer Forensics Using Triage Techniques (Tech. Rep.). Retrieved from https://essay.utwente.nl/65671/1/Gielen_MA_EWI.pdf
Haroon, S., & Carter, H. (2010, mar). Facebook security measures criticised after Ashleigh Hall murder. The Guardian. Retrieved from http://www.theguardian.com/uk/2010/mar/09/ukcrime-facebook
Hitchcock, B., Le-Khac, N.-A., & Scanlon, M. (2016). Tiered forensic methodology model for Digital Field Triage by non-digital evidence specialists. *Digital Investigation, 16 *(Supplement), S75–S85. Retrieved from http://dx.doi.org/10.1016/j.diin.2016.01.010 doi: 10.1016/j.diin.2016.01.010
Hubert, K. (2014). Evidence Collection From Social Media Sites. SANS Institute Information Security Reading Room. Retrieved from https://www.sans.org/reading-room/whitepapers/legal/evidence-collection-social-media-sites-35647
Jusas, V., Birvinskas, D., & Gahramanov, E. (2017, mar). Methods and Tools of Digital Triage in Forensic Context: Survey and Future Directions. *Multidisciplinary Digital Publishing Institute (MDPI), 9 *(4), 49. Retrieved from http://www.mdpi.com/2073-8994/9/4/49 doi: 10.3390/sym9040049
Littlejohn, S. W. (1992). Theories of Human Communication. Belmont, Calif.: Wadsworth Pub. Co.
Marcella, A. J., & Menendez, D. (2007). Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crime (Second Edition ed.). NEW YORK: CRC PRESS - TAYLOR AND FRANCIS.
McKemmish, R. (2008). When is Digital Evidence Forensically Sound? Advances in Digital Forensics, IV , 3–15.
Montasari, R. (2016, jun). Formal Two Stage Triage Process Model (FTSTPM) for Digital Forensic Practice. International Journal of Computer Science and Security (IJCSS), 10 (2), 69–87. Retrieved from https://pure.hud.ac.uk/en/publications/formal-two-stage-triage-processmodel-ftstpm-for-digital-forensic
Moore, K. (2014, June). Social media ‘at least half ’ of calls passed to front-line police. BBC News. Retrieved from https://www.bbc.co.uk/news/uk-27949674
Mukasey, M. B., Sedgwick, J. L., & Hagy, D. W. (2008, April). Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition. U.S. Department of Justice, Office of Justice Programs, National Institute of Justice. Retrieved from https://www.ncjrs.gov/pdffiles1/nij/187736.pdf
Parsonage, H. (2009). Computer Forensics Case Assessment and Triage. ( http://computerforensics.parsonage .co.uk/triage/ComputerForensicsCaseAssessmentAndTriageDiscussionPaper.pdf)
Robertson-Steel, I. (2006). Evolution of triage systems. Emergency medicine journal, 23 (2), 154–155. doi: doi:10.1136/emj.2005.030270
Rogers, M. K., Goldman, J., Mislan, R., Wedge, T., & Debrota, S. (2006). Computer Forensics Field Triage Process Model. Journal of Digital Forensics, Security and Law, 1 (2). Retrieved from https://commons.erau.edu/cgi/viewcontent.cgi?article=1004&context=jdfsl doi: 10.15394/jdfsl.2006.1004
Roussev, V., & Quates, C. (2012). Content triage with similarity digests: The M57 case study. Digital Investigation, 9 , S60–S68. doi: 10.1016/j.diin.2012.05.012
Russinovich, M. (2016). *PsTools Suite Windows Sysinternals | Microsoft Docs.* Retrieved from https://docs.microsoft.com/en-us/sysinternals/downloads/pstools |
Russinovich, M. (2018). *Process Monitor - Windows Sysinternals | Microsoft Docs.* Retrieved from https://docs.microsoft.com/en-us/sysinternals/downloads/procmon |
Select Committee on Communications. (2014, July). CHAPTER 2: SOCIAL MEDIA AND THE LAW . Retrieved from https://publications.parliament.uk/pa/ld201415/ldselect/ldcomuni/37/ 3702.htm
Shaw, U., Das, D., & Mehdi, S. P. (2016).
Social Network Forensics: Survey and Challenges. International Journal of Computer Science and Information Security (IJCSIS), 14 (11), 310–316.
Sommer, P. (1999). Intrusion Detection Systems as Evidence. Computer Networks, 31 (23–24), 2477–2487.
TWGECSI. (2001). *Technical Working Group Electronic Crime Scene Investigation - Electronic Crime Scene Investigation: A Guide for First Responders. *
Twitter Help Center. (2019). New user FAQs. Retrieved from https://help.twitter.com/en/new-user-faq
Wiles, J., & Reyes, A. (2007). Incident Response: Live Forensics and Investigations. In (pp. 89–109). Syngress.
WinPython. (2019). winpython. Retrieved from https://github.com/winpython/winpython
Zeng, D., Chen, H., Lusch, R., & Li, S. (2010, Nov). Social Media Analytics and Intelligence. IEEE Intelligent Systems, 25 (6), 13-16. doi: 10.1109/MIS.2010.151
Zimmerman, E. (2019). Prefetch Explorer Command Line - PECmd version 1.3.4.5. Retrieved from https://github.com/EricZimmerman/PECmd
Table of Contents
- 1. INTRODUCTION
- 2. LITERATURE REVIEW
- 3. SMURF
- 4. BUILDING THE SMURF FRAMEWORK
- 5. CREATING A POC SMURF IMPLEMENTATION
- 6. CASE STUDY - SMURF ON TWITTER
- 7. DISCUSSION
- 8. CONCLUSION AND FUTURE WORK
- REFERENCES
- A.