Expectations of Facebook Data

Share This Post

As social media continues to rise so does the power of Facebook. If you are not on it personally you are for your business or to connect with people on a hobby. That being part of the Meta universe has become as essential as getting a driver’s license. So, what does this mean in the world of digital investigations? It means there is always a good snippet of data waiting for you that is going to help you get just a little more perspective on an individual’s digital fingerprint. 

When approaching a Facebook investigation there are a variety of methods that can be used to be able to capture and review the information. Each method is dependent on how the individual chooses to connect to the platform.

Right now, 1.9 billion daily users access Facebook’s platform, a 6.89% increase year-over-year

https://backlinko.com/

That is a lot of people and a lot of data waiting. When people login via their mobile or desktop which login types leaves the most breadcrumbs that an investigator can pick up? That is the beauty of the cloud in the case of Facebook. The account information is synchronized through both login activities in the cloud, so no single login method produces a higher amount of data when it comes to the investigation. What the different login methods will do is produce different spare keys that can gain access to the account.

Smartphone Access

When acquiring a smartphone there are a variety of methods from logical, physical, and even triage acquisitions that allow you to capture data. However, there is a big link between seeing this data and access to the file system of the device. 

File system access can be blocked with certain types of acquisitions. For example, a typical ADB backup acquisition does not gain access into the file system. You are typically required to get root level access to be able to see that file system data. 

Here is an example of an Android device with root and one with ADB both with Facebook installed.

When we look at iOS the access is a little different. The file system has always been limited with Apple devices unless you do a physical image which is limited to tools like Graykey which is limited to government or law enforcement use only or doing a Jailbreak that you can see explained in a past article. Either method requires extra steps in the acquisition stage to get the details of the App.

With iOS you can get a lot of App details with a simple method change with doing an encrypted backup with a known password. This allows a lower level of access than what you would have with a typical backup and access to additional data.

Here is an example of a typical non-encrypted backup acquisition vs an encrypted backup acquisition with a device that has the Facebook App.

Now that you can see that you need to be mindful of the methods of acquisition to get the best possible local data from the device it is also important to look at two other data sources when it comes to Facebook.

Cloud Access

Cloud access is when the credentials for an account are used to login to their account via a forensic tool and download and capture that information. Either way it is always recommended that you have the appropriate legal rights to access this data with a consent from the user. 

To access this information the Free version of the E3 Forensic Platform allows you to use the cloud capture capabilities for Facebook. You can enter the details manually as seen below:

Or the other option is if you are working with an acquired device, you can capture the Authentication Data and open that to see the valuable cloud keys that exist on the device.

With either method you will get a portion of the Facebook data that exists on the cloud servers associated with the account.

Data found with cloud collection

Compliance Archive

After seeing what can be captured with cloud access you might thing you have all the possible data, but there is where you are wrong. The final method for capture is done through a Compliance Archive. This method allows the collection of data with consent through Facebook itself and the processing of that data in your forensic tool.

What is a compliance archive?

This is a collection of data that is provided based on a security request from the end user. This data represents a large scope of time typically from the point of the creation of the account to the point of the request.

To request a compliance archive you must have access and consent to the account in question. You will do the following steps to request the archive.

STEPS 1. Security Settings

Step 2. Download Your Information

Step 3. Add as New Evidence

Once you have requested the archive it can take a few days for the archive to be generated. Once you have the archive you can add it into your tool for review.

After all of these different collection methods the big question for any investigator is which method captures the most data?

Facebook Data from Device AppFacebook Data from CloudFacebook Data from
Compliance Archive
Android:
Current User Info
Raw Settings
Contacts
Conversations
Recovered Conversations

Facebook Messenger:
Current User Info
Raw Settings
Contacts
Conversations
Recovered Conversations

iOS:
Facebook (supported for iOS 7.1.2 and lower):
Profile Information
Friends
News Feed
Notifications
Conversations

Facebook Messenger: iOS
and Higher
Conversations
Conversation list
Current User Info
Contacts
Stories
Recovered Conversations
Profile Information Friends News Feed Notifications Conversations Picture Albums (Including Actual Pictures)











Profile Information Friends News Feed Notifications Conversations Picture Albums (Including Actual Pictures)
Saved items and collections
Voting locations and reminders
Messages
Posts
Polls
Events
Facebook Gaming
Your Places
Facebook Payments
Facebook Marketplace
Comments and Reactions
Stories
Bug Bounty
Short Videos
Volunteering
Fundraisers
Groups
Your problem reports
Reviews
Shops questions & answers
Live Audio Rooms
Spark AR
Communities
Other Activity

Personal Information
Facebook Portal
Profile Information
Journalist Registration
Facebook Assistant
Facebook Accounts Center
Other Personal Information
Friends and Followers
Your topics
Location
Music Recommendations
Search
Facebook News
Notifications
Your interactions on Facebook
Activity Messages
Privacy Checkup
Other Logged Information
Security and login Information
Apps and websites off Facebook
News Feed
Preferences
Ads information

Conclusion

With the variety of techniques to capture data there is one thing that leaves no doubt and that is you need to use them all. Don’t limit yourself when it comes to how you are collecting or even the tools you are using to collect with. The point of every investigation is to the find the truth in the data and you can’t do that if you don’t have all the data. 

This article was written by Amber Schroader of Paraben Corporation and originally appeared on the Forensic Impact Blog at this link: https://paraben.com/expectations-of-facebook-data/

More Articles

Article

Navigating SEC Regulations In Cybersecurity And Incident Response

Free video resource for cybersecurity professionals. As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an investigation, handling, and responding to incidents.

Article

BFU – Seeing is Believing

Oh no, the device is in BFU. This is the common reaction; a device needs extracting, and you find it in a BFU state. Often, there’s an assumption that a BFU extraction will only acquire basic information, but that isn’t always the case.