FBI Goes Undercover On Social Networks - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Government // Leadership
News
3/16/2010
02:48 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

FBI Goes Undercover On Social Networks

Investigators may be using fake identities to track criminals online, if a confidential FBI presentation is any indication.

The Federal Bureau of Investigations may use fake identities on social networks to investigate criminal activities, according to a redacted FBI document acquired by digital rights advocacy group Electronic Frontier Foundation.

Specifically, the 33-page confidential presentation says undercover operations are helpful for communicating with suspects and targets of crime, gaining access to private information, and mapping social networks. However, the presentation expresses concern that undercover use may be complicated by the court's decision in the trial of Lori Drew, who was acquitted of cyber-bullying a girl who later committed suicide, and that violations of terms of service by not using their own name can render access unauthorized.

The presentation instructs agents to investigate all witnesses on social networking sites, advising its own witnesses not to discuss cases and be careful about what they post online.

In general, the document, a presentation from the FBI's computer crime and intellectual property section, details how federal agents should gather and use evidence found on social networks like Facebook, MySpace, and LinkedIn.

The presentation, apparently given in 2009 by computer crime deputy chief John Lynch and trial attorney Jenny Ellickson, informs agents that some information on social networks might be available publicly, some might require undercover operations, and still other information may be acquired through requests from social network companies themselves under the Electronic Communications Privacy Act.

According to the presentation, Facebook is "often cooperative" with law enforcement emergency requests for information, while MySpace requires law enforcement to provide a search warrant to see private messages less than 181 days old. Twitter, meanwhile, is apparently even less helpful than MySpace, as the presentation notes it has no contact number for law enforcement to call, only retains the last log-in IP address, has no guide for law enforcement, and will not produce data without a warrant or subpoena.

The presentation notes that evidence gathered from social networks can be helpful to reveal personal communication, establish motives and relationships, provide location information, prove and disprove alibis, and establish the existence of a crime or criminal enterprise.

The presentation also details the history and use of social networks worldwide, listing which social networks are popular in which parts of the world and how social networking sites in the United States match up against other heavily visited Web sites.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

Slideshows
11 Things IT Professionals Wish They Knew Earlier in Their Careers
Lisa Morgan, Freelance Writer,  4/6/2021
News
Time to Shift Your Job Search Out of Neutral
Jessica Davis, Senior Editor, Enterprise Apps,  3/31/2021
Commentary
Does Identity Hinder Hybrid-Cloud and Multi-Cloud Adoption?
Joao-Pierre S. Ruth, Senior Writer,  4/1/2021
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
Successful Strategies for Digital Transformation
Download this report to learn about the latest technologies and best practices or ensuring a successful transition from outdated business transformation tactics.
Slideshows
Flash Poll