helping the investigators to dig into a person and the community linked to that person based on a tweet. Our solution supports an investigative processes composed of the following phases (i) find suspicious tweets and individuals based on hash tags analysis (ii) classify the user profile based on Twitter features (iii) identify influencers in the FOAF networks of the senders (iiii) analyze these influencers' background and history to find hints of past or current criminal activity.
KEYWORDSTwitter, analysis, crime, detection
OVERVIEWTwitter is a microblogging service for sharing messages restricted to 140 characters [1]. Twitter provides some features for users to communicate with each other: 1. Posts: Twitter provides to the users posting features in which they can post messages on their personal page. 2. Hashtags: Twitter users can use hashtag which is written on the format of: #hashtag, which is relating the tweet to a certain topic. Hashtags are searchable in Twitter; the users can search by a hashtag and retrieve the tweets related to that hashtag. Mentions: Mentions is written on format of "@username", users can use mention to refer a message to another user. Replays: Replay is another interaction way that is used to replay messages. Favorites: Users can favorite a tweet, Twitter provides the count of the favorite related to a tweet as an information. Retweet: Twitter has feature of retweets, which means that user can repost a tweet of someone else, the original writer will always appear. Retweeted tweets provide the number of retweets of that tweet as information.