Social Media Investigation Techniques (Platform-Agnostic)
Platform-agnostic social media OSINT tutorial: handle pivots, timeline reconstruction, content preservation, and ethical investigation of public profiles.
Social Media Investigation Techniques (Platform-Agnostic)
Platforms rise, fall, and rewrite their APIs. The techniques that survive are the ones grounded in general principles: pivot on identifiers, preserve before you analyse, read metadata carefully, and treat every claim as provisional. This tutorial is deliberately platform-agnostic.
Who this is for
Intermediate
Journalists, researchers, and civic investigators who need to verify a claim tied to a social account, reconstruct a timeline, or document online activity in a way that survives account deletion.
What you'll need
- A dedicated research browser profile, ideally on a separate machine or container — not your personal account.
- Screenshot and full-page capture tools.
yt-dlpfor video preservation,ExifToolfor any downloaded media.- Patience. Platform searches are noisy.
How it works
A social-media investigation is a chain of identifier pivots. A handle leads to a display name, a display name to a profile image, a profile image to a reverse-image result on an older platform, that result to an email, the email to a breach record or a domain registration. Each pivot is a separate source. The discipline is keeping them separate in your notes.
Step-by-step walkthrough
-
Fix the identifier you actually have. Write down the exact handle with its platform prefix (for example
@exampleon X vs on Instagram — not the same person). Record the profile URL, the account ID if the platform exposes one, and the display name as of today. -
Preserve before exploring. The moment you know an account is interesting, archive it:
- Paste the profile URL into
https://archive.today/andhttps://web.archive.org/save/. - Take a full-page screenshot of the profile.
- For a specific post, archive the post URL separately and save any embedded media with
yt-dlp:yt-dlp --write-info-json --write-thumbnail <post-url>
- Paste the profile URL into
-
Pivot on the handle. Search the exact handle string in quotes across other platforms and the open web:
"@example" "example" site:github.com "example" site:reddit.comTools like
https://namechk.comorhttps://whatsmyname.app/enumerate handle availability across many services quickly — confirm each hit manually; collisions are common. -
Pivot on the display name and bio phrases. A distinctive bio phrase is more unique than a handle. Search it verbatim in quotes.
-
Pivot on the profile image. Download the highest-resolution version, strip query parameters, then run it through multiple reverse image services. Stock photos and stolen headshots are red flags.
-
Reconstruct the timeline. Pull the earliest posts (most platforms let you sort or jump to a date). Archive the first ten and the most recent ten. Note anomalies: a multi-year dormant account that suddenly posts daily, or a sudden language shift.
-
Check cross-platform consistency. The same person across platforms should show consistent writing style, time-of-day posting patterns, and friend overlap. Inconsistencies are leads — sometimes to a shared account, sometimes to identity theft, sometimes to automation.
-
Document the network carefully. Following and follower lists change constantly. Capture them with a timestamp. Do not publish follower lists of private individuals.
Common pitfalls
- Alerting the target. Logging in with a real account that "views" a profile or sends a connection request can notify the target. Use research accounts with no real-world links.
- Fabricated verification. Blue checks and platform badges mean what the platform says they mean this week. Do not treat them as identity proof.
- Screenshot-only evidence. Screenshots are trivial to forge. Pair every screenshot with an independent archive URL.
- Automated scraping at scale. Most platforms' terms of service prohibit large-scale scraping. Beyond legal exposure, it gets your access banned mid-investigation.
- Ignoring aliases. The same person often maintains different handles for professional, political, and personal use. A clean "pivot" that assumes one-handle-per-person will miss the actual story.
Verifying your findings
Any identification of a real person behind an anonymous account needs multiple independent corroborators: a distinctive linguistic pattern, an infrastructure link (a domain they registered), a breach-data match, and ideally a direct admission in an archived post. The analysis phase guide covers how to structure these into a confidence-rated finding.
Related tutorials
- Reverse image search for verifying profile photos and posted images.
- Metadata extraction on any downloaded media.
- Wayback Machine for profile history.
Apply this in practice
See social-media pivots applied in the tracking a disinformation network case study. For grounded treatment of the ethical frame around identifying individuals during civic investigations, see the ICE Encounter rights guides.