Social Media users, especially younger generations, often use slang to communicate. You may have heard a phrase or two from a Gen Zer that made you pause and wonder what they meant by that! One that I hear a lot in my personal life is “spill the tea” ~ which means “tell me the gossip.” Innocent enough, but when conducting a social media deep dive on a person of interest, it is critical to educate yourself. Without knowledge of these terms, investigators might miss crucial details.
Identifying Drug Activity
Recently the publication, WIRED covered the subject of drug sales and drug use in social media. More and more dealers and consumers are using a combination of emoji’s and slang as a way to communicate. This has morphed into getting the delivery of your drugs via the USPS, rather than meeting the dealer on a street corner or in the dark web. Some dealers have even sponsored social media posts to gain more traffic. “Dealers ran hundreds of paid advertisements on Meta platforms in 2024 to sell illegal opioids and what appeared to be cocaine and ecstasy pills, according to a report this year by the Tech Transparency Project, and federal prosecutors are investigating Meta over the issue”.
Staying educated is one way to stay ahead of this. Here are some examples of the new terms used in social media along with their meanings:
Common Slang Terms Used by Drug Dealers:
Plug: Refers to a supplier or someone who can provide drugs.
Connect: Another term for a supplier or source for drugs.
Re-up: The act of replenishing a drug supply.
Slab: A large quantity of drugs, often sold in bulk.
Cut: Additives used to dilute or enhance drugs.
Cook-up: The process of preparing drugs, particularly in creating unique combinations.
Generation Z (Gen Z) generally includes individuals born between 1997 and 2012, according to the Pew Research Center. However, some sources may slightly adjust these dates, with ranges often extending from 1995 to 2010 or similar variations. As of 2025, Gen Zers are approximately 13 to 28 years old.
Generation Z has developed a vibrant wordlist of slang terms that are widely used across social media platforms. Here are some of the most popular expressions:
Rizz: Derived from “charisma,” this term refers to someone’s ability to attract or charm others, especially in a romantic context. Delulu: A playful abbreviation of “delusional,” used to describe someone who has unrealistic fantasies, particularly about relationships or personal aspirations. The ick: A sudden feeling of discomfort or repulsion towards a person, often triggered by a specific behavior or trait. Bussin’: Used to describe something exceptionally good or delicious, commonly in reference to food. Mid: A term signifying that something is mediocre or average in quality. Simp: Describes someone who is overly attentive or submissive to another person, often in a romantic context, without reciprocation. No cap: A phrase used to assert that someone is telling the truth or being genuine. Cheugy: Refers to something that is outdated or no longer trendy.
Glow up: Describes a significant transformation, often in appearance or style, indicating improvement. Stan: A blend of ‘stalker’ and ‘fan,’ it denotes someone who is an enthusiastic and devoted admirer of a celebrity or public figure. Ghosting: The act of suddenly cutting off all communication with someone without explanation, typically in a dating context. Salty: Feeling upset or bitter, often in response to a perceived slight or disappointment. Bet: A term used to express agreement or affirmation, similar to saying “okay” or “sure.” Fam: Short for “family,” but often used to refer to close friends or a trusted group. Sheesh: An exclamation used to express disbelief, admiration, or exasperation. Resource: Parade
In an era dominated by technology, the landscape of romance has had a profound transformation, with virtual dating apps and hookup sites emerging as the new frontier for modern connections. The rise of dating applications and websites has revolutionized the way individuals meet and form relationships, transcending geographical boundaries and traditional social norms. While these apps offer a new and convenient way to find love and companionship, they have also become an interesting new terrain for private investigators, particularly in the context of cheating partners and divorces. The simple accessibility and lack of in-person convictions offered by these dating/hookup applications make it a breeding ground of infidelity, often leading to the discovery of unfaithful partners and contentious divorces. As the world of romance worms it’s way into the digital realm, the skills and tools used by private investigators grows substantially. Not only is there a need to follow and track in real life, but digitally as well. This shift prompts a closer examination of the intersection between virtual dating and the evolving role of private investigators in navigating the complexities of the modern dating landscape.
History of Dating Apps
Reflecting on the 90s, the proliferation of internet access and computers marked the beginning of a transformative era. Increasingly, individuals embraced this novel way of life, culminating in the launch of the first dating app in 1995. Match.comemerged, heralding a significant shift in the realm of romantic connections. The traditional requirement of an in-person “meet-cute” was no longer obligatory, opening the doors to an entirely new dating landscape. Fast forward to the early 2000s, the advent of social media took center stage. Facebook, MySpace, and soon after, Twitter, Instagram, and LinkedIn all became integral parts of the digital lexicon. It becomes evident that as more people flocked to the online sphere, a proportionate surge in the number of single individuals navigating the digital dating realm occurred. In 2012, Tinder emerged, introducing a fresh perspective on online dating.
Tinder
Tinder, originally conceived by its founders, Sean Rad and Justin Mateen, emerged as a significant player in the dating app scene. In a 2014 Time magazine interview, the duo humorously shared that the app’s inception stemmed from Justin Mateen’s agoraphobia, jokingly attributing the need for virtual connections due to a fear of leaving the house. Whether this origin story holds true or not, the app rapidly gained immense popularity, functioning as a technologically advanced rendition of the classic “hot or not” concept. Users are presented with photos of potential matches nearby, with the option to swipe left for a “nope” or right for a “like.” For a match to occur, both parties must swipe right. In 2014, the staggering statistics reflected 500 million daily swipes and 5 million matches. Tinder’s creation marked a cornerstone in the whirlwind evolution of mobile dating apps.
Bumble
Another notable player in the dating app arena is Bumble, crafted by Whitney Wolfe Herdin 2014. Distinguished by its woman-centric approach, this app empowers women by placing control firmly in their hands. Similar to Tinder, users engage in the left or right swipe dynamic, but the key difference lies in the post-match interaction. Once a match is made, it’s the woman who must initiate the first move, setting a 24-hour window for communication. Should the male party not respond within this timeframe, the match dissipates. Bumble has cultivated a global community surpassing 100 million users across six continents, celebrating over 1.5 billion “first moves.” Beyond dating, Bumble expands its offerings to include options for making friends and professional connections, signaling a multifaceted approach to modern connections.
Demographics of Online Dating
The roster of dating apps in the present day continues to expand, featuring top contenders such as Tinder, Match, and Bumble, alongside others like OkCupid, Hinge, E-Harmony, Grindr, HER, and more. According to Pew Research, almost half of online dating users, with approximately eight in ten users under 30, report using Tinder, solidifying its status as the most widely used dating platform in the U.S. The study also reveals that 79% of Tinder users fall within the 18-29 age bracket, in contrast to apps like Match, which only has 9% of users aged 18-29 but peaks at 54% for users between 50-64. The expansive realm of online dating prompts an exploration into how these platforms can be leveraged in online investigations.
In addition to those earnestly seeking love through dating apps, there exists a cohort pursuing different objectives. According to Pew Research, a remarkable 31% of men on dating apps are in search of casual hook-ups or sexual encounters, while women account for 13%.
Are You For Real?
This prompts a contemplation on the authenticity of profiles—how many individuals are genuinely who they claim to be? Does the person boasting a six-figure job truly hold such a position? Is the individual claiming to be 35 truly reflective of their appearance in the posted picture? Moreover, does the seemingly amazing person discovered on a dating app truly lead a single life, or could they be engaging in infidelity within an existing relationship? Investigations often revolve around suspicions of infidelity, as exemplified by Stephanie, a 27-year-old whose story was featured in an article forBustle. Initially in love with her boyfriend, Stephanie’s world crumbled when a friend sent her a screenshot of her boyfriend’s dating profile. Conducting her own inquiry, Stephanie logged into her friend’s profile, messaged him, and asked for his phone number to verify his identity. The phone number matched, unveiling the truth and catapulting Stephanie into the midst of a breakup.
For the Private Investigator
As investigators delve into divorce or custody cases, particularly those involving infidelity, the complexities of utilizing dating apps as evidence come to the forefront. Distinguishing dating apps from social media, despite their similarities, is crucial. Unlike social media platforms, dating apps lack a searchable database by name, often featuring profiles with only first names, introducing additional possibilities and anomalies.The situation becomes more intricate due to the widespread existence of fraudulent profiles, especially on platforms that do not mandate identity verification. While some apps like Hinge or Bumble recommend features like real-time selfie verification for profiles, they are not obligatory, introducing an additional layer of complexity. A recent search for an individual accused of cheating during a divorce revealed the challenges inherent in scrutinizing dating apps. For platforms like Bumble, where a profile is mandatory for searching, investigators employ alias profiles. Premium features, allowing refined searches based on location, age, height, religious and political views, parental status and more enhance the investigative process. Despite comprehensive efforts, our search did not yield a profile. This experience highlighted the significant gaps in understanding the intricacies of navigating dating apps, emphasizing the need for a nuanced approach in such investigations.
Are Dating Apps Searchable?
This brings us to the forefront of a pivotal question: Can dating apps be searched? The answer is yes, but not in the manner one might initially envision. When exploring the prospect of searching through dating apps, numerous considerations come into play. Many of these platforms implement privacy settings that impede effortless user discovery. Some dating apps establish connections through Facebook or other social media platforms, often requesting your phone number. Through algorithms and the covert mechanisms of these applications, the potential exists for discovering mutual connections. Stories often circulate about individuals encountering friends of friends through dating apps, making the world feel strangely small. As previously highlighted, the search functionality plays a crucial role in such investigations. Typically, this feature involves selecting filters based on criteria such as height, age, location, or interests when seeking a specific individual. Adding to the complexity, the process of searching through dating apps may, at times, feel similarly to a game of chance. However, with the right parameters in place, the possibility of encountering your intended profile increases. We conducted our own thorough test to scrutinize the effectiveness of popular software, specifically assessing its capability to detect instances where an individual maintains multiple dating profiles. We subjected our subject to scrutiny using four of the most prominent software platforms, yet none of them successfully retrieved any data from dating apps. Despite yielding accurate information such as multiple social media profiles, correct addresses, and phone numbers, the absence of dating-related data reinforces our assertion. This underscores the notion that for effective searching through dating apps, a manual human touch remains indispensable.
In the ever-evolving landscape of modern romance, dating apps have emerged as a transformative force, reshaping the way individuals connect and form relationships. The journey from the internet’s early days to the present day mirrors the digital age’s progression, marking the birth of dating apps like Match.com and the subsequent rise of social media platforms. As we navigate this digital realm, private investigators find themselves at the intersection of virtual dating and real-life investigations, addressing the complexities introduced by infidelity and divorce cases. The expanding list of dating apps, from Tinder to Bumble and beyond, reflects the diversity of user objectives, leading us to question the authenticity of profiles and the challenges investigators face in uncovering the truth. The prevalence of casual encounters and the blurred lines between reality and online personas further complicate the investigative process. As investigators grapple with these challenges, the need for a nuanced and human-centric approach becomes evident, emphasizing the indispensable role of skilled professionals in untangling the intricate web of digital romance.
In the world of OSINT and Social Media, Cultural Intelligence is the understanding of the role culture plays in your subject’s day to day life. It can play a part in their interests, hobbies, word choices, religion, work, etc.. For instance, social media posts might include specialized language that becomes understandable only when we possess sufficient knowledge about the culture, enabling us to recognize distinctive word choices, iconology, or symbols.
A few years back we wrote, “The Role Culture Plays in Social Media Research” which provided some real life examples of how different cultures use language. During a recent search, our Senior Spanish Analyst uncovered a post that would lead the average person to think this individual was talking about her son. She called our person of interest her “Mijo” or “Hijo“ translated literally to mean son. Upon further investigation, our analyst knew from other data resources, that this woman was not his mother. It did indicate; however, she was a fan of his. Someone whom this woman held dear. The word son in Spanish can be used as a term of endearment or for someone you feel affection for.
Examples of Cultural Differences in Social Media
Self-Promotion vs. Humility:
In some Western cultures, self-promotion is common, and individuals may openly share their achievements and successes on social media. In certain Asian cultures, humility is valued more, and individuals may be more reserved in showcasing personal accomplishments to avoid appearing boastful.
The use of hashtags varies across cultures. While some cultures may embrace and create trending hashtags for various causes, others may not use them as frequently or may have different conventions for their use.
Personal vs. Professional Branding:
Cultural norms influence the balance between personal and professional content. In some cultures, people may seamlessly integrate personal and professional aspects of their lives on social media, while others maintain a clear distinction.
Social Media Posting
Frequency and Timing of Posts:
Cultural expectations regarding the frequency and timing of social media posts can differ. Some cultures may value regular updates, while others may prefer more selective and thoughtful sharing.
Response to Conflict:
Cultural norms play a role in how individuals respond to conflicts or disagreements on social media. Some cultures may prioritize maintaining harmony and avoid public confrontations, while others may engage in more direct debates.
Privacy Settings and Sharing:
Attitudes towards privacy impact how individuals configure their privacy settings. Some cultures may be more comfortable with public profiles, while others prefer stricter privacy controls.
Visual Content Preferences:
Cultural aesthetics influence the types of visual content shared. For instance, certain cultures may appreciate minimalist and clean designs, while others may prefer more vibrant and intricate visuals.
Community Building:
Cultural values shape the formation and participation in online communities. Some cultures may place a strong emphasis on building supportive and inclusive communities, while others may focus more on individual expression.
Language and Multilingualism:
Multilingualism is common on social media, and cultural context affects language use. Some cultures may use a mix of languages in their posts, reflecting the diversity within their community.
These examples highlight the diverse ways in which cultural differences manifest on social media platforms, influencing user behavior, content creation, and interaction styles. This is helpful when investigating a person of interest which may lead to critical information regarding your case.
Dive into the unpredictable world of modern romance, where the once alluring dating pool has morphed into a chaotic dance of disappointment. Pose the question to any of your single friends about their dating escapades, and you’ll likely be greeted with a disheartening grunt or a groan that echoes the struggles of love in today’s world.
Picture this battlefield called love, where tales unfold like a riveting saga interwoven with the pitfalls of dating apps, cringe-worthy matches, and the spine-tingling phenomenon of ghosting. It’s not just a casual dip into the dating scene; it’s a full-blown immersion into a realm where emotions run wild, and the pursuit of genuine connection feels like an epic quest.
To make matters worse, dating apps are a breeding ground for cheaters. Not only do you as a single individual have to navigate through finding a potential love connection, you have to be safe in doing so. There is always the potential that someone is impersonating who they say they are.
Once a Cheater…
Jana Hocking, a columnist for the NY post and other publications, shared her experience in a recent NY Post article. As many do through dating applications, Hocking matched with a man who stated he was from the UK. His name was Sebastian, “Seabass” for short. One thing led to another and Sebastian added her to his Whatsapp account. Quickly Hocking noticed he placed a privacy setting on their chat, erasing all messages between them. “Why would he need his messages to be wiped? Hocking thought, “My spidey senses began to alert me that something wasn’t quite right.” From there, Hocking went onto a Facebook Group she is apart of called “Sis, is this your Man?”, looking for any clues on the man she matched with. Upon further digging she discovered the site FaceCheckID, and decided to place the dates photograph into the site. To her dismay, Sebastian really wasn’t who he said he was, in fact, his name was entirely different. An Instagram pulled up on the subject, called Robert, with a lovely photo of his wife and children.
Online Research Tips
Identifying a cheater can feel like an impossible task. Especially when dating appsthemselves feel like the wild west. When someone wants to remain completely hidden, more than likely they will, but there is always, always that chance they mess up or are noticeable. Here are a few helpful tips from our expert analysts when conducting your own personal search on a cheater.
Facebook Groups- There are countless Facebook Groupsnationwide and within your area, that have been created for the sole purpose of exposing cheaters. Hop onto your Facebook page, and start to search for groups that are local to you or even those in different states, depending on the circumstances of your case.
Some common Facebook Group Titles are:
“Do We Have the Same Boyfriend?”
“Does Anyone Know Who This Is”
“Sis, Is This your Man?”
“Cheaters Group”
“Are We Dating the Same Person?”
Social Media Deep Dive- You never know what is truly out there on an individual until you take the time to really search it out. We always recommend taking time to identify an individuals social media and online presence. It takes but one tiny detail identified to elevate your findings and case.
Conversation Apps-WhatsApp is a fantastic application to identify related to your subject. Depending on a person of interests app settings, sometimes other apps they are connected to can be shown through their profile. We have seen a few times where a Tinder or Bumble account is pulled up on an individual, simply by checking if they has a WhatsApp account.
Cash Apps- Depending on the privacy settings an individual has set through certain Cash applications, this can be another way to identify who your person of interest may be hanging around or with.
Dating Apps- Dive into the dating applications that are out there. Here are a few apps cheaters could easily sign up for and choose: Badoo, Tinder, Ashley Maddison, Bumble, Lovoo.
Secret Mesaging Apps- Does your client have access to the said cheaters phone? There are several secret messaging appsthat they could identify such as Calculator Pro+, Hide My Text, Hago, Plato, Yubo, AmongChat.
We have countless requests from Private Investigators and Attorneys, from their clients, requesting information on if their partner or spouse is cheating. At E-Chatter our robust software, OSINT skills, and knowledgeable analysts all work together to identify cheaters.
LinkedIn is a professional networking platform designed for individuals to connect with colleagues, showcase their professional achievements, and engage in industry-related discussions. While it’s a great platform for professional networking and personal branding, it’s essential to strike a balance and maintain a level of professionalism in your posts and interactions.
If you’re noticing that people on LinkedIn are oversharing, it could be due to various reasons. Some individuals may not be aware of the professional boundaries on the platform, while others might be intentionally blurring the lines between personal and professional content.
What LinkedIn Can Reveal
Depending on your case, and online investigation, searching LinkedIn may not be top of mind. However, it is quickly becoming a platform that you may not be able to afford not to check!
One recent post was from a professional woman who was sharing publicly that she was 5 years sober. She was proud of her accomplishment and wanted everyone to know. She went into quite a bit of detail as to what she went through in her journey to sobriety.
Another recent post was a from a male in his forties who was having a difficult time finding a job. His post was very personal. He wrote about the hardship of his wife having to work two jobs and the toll it was taking on his kids. It was almost like a public outcry for help and it was a very long and detailed post.
I immediately thought of how this information may be very beneficial in our OSINT work. LinkedIn is often thought of as the place to check for employment verification. However, if this is the new trend, it will serve to be much more useful than just that.
Oversharing is not Well Received By All
The Washington Postpublished an article back in August of 2023 on this subject. It is titled, “LinkedIn is getting weirdly personal and not everyone likes it”. The article referenced a recent post by Erika Taylor-Beck who was interviewed for the article. Here is what was written:
“I don’t always have it all together,” she wrote before revealing that she had been sexually abused, had turned to self-harm and binge drinking as coping mechanisms and has struggled with social anxiety and depression. “I share my ‘dirty laundry’ because it has made me who I am. … I’m grateful, and I want to help others get here too.”
Taylor-Beck, 40, made these confessions along with words of encouragement on LinkedIn, the social network more than 930 million people use globally for professional networking and job searching. As a vice president of e-learning and health-care compliance company Relias, she wanted to lead by example.
“I wanted to create a culture where folks felt like they could bring their whole selves to work,” she said. “So sharing my experiences so you feel safe to share yours.”
Research shows that people get positive mental effects from expressing personal elements about themselves to others, said Sunny Xun Liu, associate director of the Stanford Social Media Lab, which studies the psychological and interpersonal processes of social media. But how others perceive these confessions may not always be equal, she added.
“For men [mostly leaders] … people will think they’re competent,” she said. “But for lower ranks [and sometimes women], people may think they’re less competent.”
LinkedIn Searching
Search and Boolean Operators: Use LinkedIn’s search functionality with specific keywords and Boolean operators to narrow down results. This can help you find individuals or companies with specific characteristics.
Reviewing Recommendations and Endorsements: Recommendations and endorsements on LinkedIn can offer additional insights into an individual’s professional strengths and relationships.
Metadata and Timestamps: Pay attention to timestamps on posts and updates. This information can be crucial for establishing timelines and understanding the sequence of events.
Saved Articles and Publications: LinkedIn allows users to save articles and publications. Reviewing what a person finds valuable or informative can provide insights into their interests and expertise.
Consistency Checks: Cross-reference information gathered from LinkedIn with data from other sources to verify its accuracy and ensure consistency.
In today’s hyperconnected world, social media applications have become the go-to space for people to share their thoughts, feelings, opinions and experiences. While social media has endless benefits, such as staying connected with friends, family and the world at large, the boundaries between personal and professional life have never been blurrier. It is well known to some, but sadly not all, that what you share on social media can have a profound impact on your career and personal reputation. It’s a double-edged sword, a powerful tool for self-expression and networking, but one that can also be a slippery slope, potentially costing you your job and damaging your reputation in the blink of an eye. There are many ways, within the intricate web of social media, you can experience real-world consequences of the content you choose to share.
Current Events
First of all it has to be taken into account that the world is currently under a considerable amount of stress. Natural disasters have resulted in loss of lives, widespread destruction, and escalated tensions among nations and individuals. At this very moment, we are watching an unfolding conflict between Israel and Hamas, prompting people from all around the globe to express their thoughts, feelings, emotions, and political stances on social media regarding this complex issue. This war has ignited powerful sentiments worldwide, with many taking sides in this particular conflict.
The Associated Press (AP) recently found themselves in a predicament when one of their reporters, stationed in Gaza, was discovered to have a long history of publicly condemning Israel as anoppressive, apartheid regime. This raised concerns about the reporter’s ability to provide objective coverage of this conflict. A deep examination of the reporter’s X profile (Twitter) uncovered multiple tweets dating back to 2019, reinforcing the perceptions that his views on Israel were deeply rooted.
As a result, AP has taken the steps of relieving the reporter from his duties and is actively investigating his social media history. Interestingly enough, this is not the first time such an incident has occurred at AP. In 2021, the organization hired and subsequently fired a Stanford graduate who had previously posted anti-Israel contenton social media. The question is, did either of these employees ever wonder if what they shared on their social media would be reviewed by their employer?
Social Media and the Hiring Process
Recent data from The Harris Pollrevealed that a significant 71% of hiring decision makers concur on the effectiveness of scrutinizing candidates’ social media profiles as a screening tool. This statistic underscores a proud shift in the way our society approaches hiring practices. Social media’s influence has grown to such an extent that your resume is no longer the sole focus during the application process.
DeeAnn Sims-Knight, the visionary founder of Dark Horse PR, aptly captures this evolving landscape: “Because we tend to view our personal social media accounts as being “personal”, there’s a good chance that by viewing someone’s profile, you’ll get a glimpse into their personality beyond their resume.”
In this digital age, where our online presence can be as impactful as our real-world identity, it has become increasingly vital for job seekers and professionals alike to carefully curate their digital footprint. Your online presence isn’t just an extension of your resume; it’s an essential part of your professional identity.
Social Media and the Workplace
Over the course of our seven years in business at E-CHATTER, we have seen first hand human behavior through social media and the role it plays in the workplace. According to Zippia, 98% of workershave social media for their own personal use. Alongside that statistic, 77% of workers report using and engaging with social media at work. It is not uncommon for employees to exhibit patterns and tendencies when sharing content online throughout their day. Many individuals are drawn to sharing an abundance of personal information. According to Harry Denley, a hacker and Security and Anti-Phishing at MyCrypo, said: “Most people are very verbose about what they share online. You can find virtually anything…”
People Magazine shared some truly astonishing testimonies of individuals who either experienced firsthand or witnessed the repercussions of their online activities. One particularly shocking case involved a nurse who shared posts to her Facebook such as, “Soooooo sleepy here in the ICU. Will someone please code and give me something exciting to do? #isthatbad?” alongside racist comments. What made this even more astonishing was that the nurse had tagged her posts with the location of the hospital where she worked.
Another example within the article showcased a co-worker who was dismissed from their job for indulging in marijuana and alcohol during work hours and proudly shared photos of these activities to social media. Unsurprisingly, their boss discovered the incriminating posts and promptly terminated the employee.
One of the most ironic stories shared of them all was the tale of a firefighter who was let go from his position after leaving work multiple times for an “emergency”. He was later caught sharing images to social media of him swimming in a pool and riding quads posting, “sometimes you just need to F-off from work”.
Social Media Oversharing
To comprehend this tendency, we must consider the unique dynamics of social media. Many perceive it as an outlet where they can shout into the void, assuming their posts will go unnoticed or that their identity will remain concealed. Sharing on social media offers a buffer period between the confession and the consequences, completely removing the power of face-to-face interactions. More than anything, most underlying reasons for oversharing on social media have to do with chasing clout or those “15 minutes of fame”. It can alleviate feelings of isolation, connecting individuals with like-minded people who empathize with their experiences.
With these insights in mind, E-CHATTER approaches online investigations with the understanding that there is a high likelihood that someone, at some point, may have inadvertently shared crucial information. Let’s consider a few real-life stories that vividly illustrate the unforeseen consequences of thoughtless digital actions.
Social Media History
While some individuals face termination in the workplace due to their current posts or comments, others may be terminated based on their social media history. Depending on the company’s policies, your social media past can hold as much significance as the posts made during your tenure. E-CHATTER has taken on cases that involved scrutinizing individuals due to discrepancies in their work history as listed on their resume. In one notable instance, an individual asserted that they had long-term employment with some of the most prestigious companies and organizations in their industry, a claim that didn’t stand up to analysis.
As our investigation unfolded it became evident that this individual was operating online under a different name. They were actively hosting a podcast that delved into their life, exposing a trail of admissions related to drug use and inappropriate content. This revelation proved to be a potential catastrophe averted for the employer, underscoring the importance of thorough background checks and the observance of a potential hire’s digital footprint.
In conclusion, the ever-expanding digital landscape has significantly altered the way we perceive and interact with the professional world. Employers must recognize the importance of closely monitoring their employees’ and potential hires’ online presence, especially in relation to sensitive topics such as race, sex, and discrimination. By proactively addressing and mitigating any harmful or inappropriate online content, businesses can not only safeguard their own reputation but also foster a more inclusive and respectful work environment. In today’s interconnected society, the boundary between one’s personal and professional life has become increasingly blurred, making it imperative for employers to adapt to these new realities and take a proactive stance in promoting a workplace culture that upholds respect, diversity, and equalityfor all.
Conducting an online investigation on a corporation involves gathering information about the company from a variety of online resources. It is used for many purposes; some of which include, gaining insights to its operations, financial health, reputation and more. A PI investigating a corporation typically follows a systematic approach to gather information, uncover potential wrongdoing, and provide valuable insights to their clients. This includes collecting publicly available information about the corporation. Researching its history, key personnel, financial records, public statements, news articles, etc… There are several different reasons why a corporation might hire an Investigator to conduct online research. Some of the most common are listed below.
Due Diligence: Investigations on corporations for potential investors, partners, or clients. This might involve verifying financial information, assessing the company’s reputation, investigating key executives, and uncovering any hidden risks.
Intellectual Property Theft: Looking into cases of intellectual property theft or industrial espionage. PIs can gather evidence to identify culprits and prevent further theft.
Competitive Intelligence: Assisting companies by gathering online information about their competitors, including market strategies, product developments, and potential vulnerabilities.
Corporate Security Assessments: PIs might be hired to assess a corporation’s security protocols, vulnerabilities, and potential threats, helping the company improve its security measures.
Insurance Fraud: Private investigators can assist insurance companies in investigating potential fraudulent claims made by corporations, such as property damage or liability claims.
Litigation Support: Private investigators can provide evidence and information that supports legal cases involving corporations, such as in cases of contract disputes, intellectual property infringement, or wrongful termination.
Online Resources to Use
We use several online resources, but the few mentioned below are worth mentioning. Like any other deep web dive, each site potentially offers breadcrumbs that can be used in your investigation.
Open Corporates (https://opencorporates.com ) Collects and aggregates data from various public sources, such as company registers, government records, and other official documents. The platform then organizes and presents this data in a standardized format, making it easier to search and analyze. Users can access information about a company’s legal status, ownership, financial history, and more. Ripoffreport (https: ripoffreport.com) is a consumer complaint website that allows individuals to post complaints and reviews about businesses, products, and services.
Glass Door (https://www.glassdoor.com) This site is a job and recruiting website that allows employees and former employees to anonymously review companies and their management, provide salary information, and share insights about the interview process.
LittleSis (https://littlesis.org/) This site is used for tracking and researching the connections and relationships among powerful individuals, organizations, and corporations in the United States. It allows users to create and access profiles of influential people, companies, politicians, and non-profit organizations. These profiles include information on their affiliations, board memberships, political contributions, financial interests, and other relevant data.
Crunchbase (https://crunchbase.com) is a platform that provides information about companies and startups, including their funding, key personnel, products or services, and other relevant business details.
Corporate Case Study
We were hired recently to conduct several deep web scans on companies and their C-Suite executives. The Investigator worked with a client who was about to do some major business with three businesses and wanted to know everything about them before jumping into a business relationship. When completed, one could get an excellent picture of the overall reputation of the companies. The group of companies were business to consumer, so there were a lot of online reviews from various sites from Amazon to Yelp. Social media played a significant role. Newspaper articles published online were included as well as company generated press releases. As you can imagine, it was a large report.
Don’t forget About the Employees
The next step in our corporate case study was to identify online profiles and information on key executives in each organization. Why was this important? By conducting this research, it revealed how the employees felt about working for the company. It also ruled out any social media violations in the workplace. Our research included looking for any of the following areas of interest.
Sharing Confidential Information: Posting sensitive company information, trade secrets, financial data, or proprietary information on social media platforms without authorization.
Harassment and Bullying: Using social media to target, harass, or bully colleagues, supervisors, or other individuals within or outside the organization.
Discriminatory Remarks: Making discriminatory comments, including those related to race, gender, religion, sexual orientation, disability, or other protected characteristics, which can create a hostile work environment.
Defamation and Libel: Making false or damaging statements about the company, coworkers, or management that could harm their reputation or result in legal consequences.
Negative Publicity: Sharing negative opinions, complaints, or criticism about the company, products, or services, which could potentially harm the company’s image or business relationships.
It always amazes me what people will post online. Even in the age of increased privacy awareness, people get carried away sometimes with the personal information they post online. It may have been posted years ago but can come back to haunt them in an investigation.
Lemon8 is a trendy new social media platform that has a similar feel and aesthetic to Pinterest, and Instagram. Launched by ByteDance, TikTok’s parent company, this application has been growing in popularity around the globe. Let’s break this social platform down and dive into the details.
Currently in the United States there is a total of 4.25 million active users.
The social app is open to all audiences over the age of 13 but themain demographic is Gen Zer’s.
Several influencers are being paid from the U.S. and the U.K. to promote the app, but there is no clear way to make money off the app, yet.
Lemon8 does not feature advertising, yet.
The browsable categories for Lemon8 include fashion beauty, food, wellness, travel, home, and pets.
Diving into the Details
After downloading the application, I was taken to a screen where I entered my birthdate. Although they state in their disclaimer this information will not be shared with anyone, they mention this information being used to personalize my experience. Next a question on my pronouns is asked followed by what my interests are. From there you can choose a way to login to your account. Once you login, monetized content is shown throughout your newsfeed. The layout feels very similar to Pinterest and Instagram, being user friendly and inviting. Like Instagram, you have the normal array of icons: Home: This shows your monetized newsfeed. Search Icon: This takes you to a search icon where you have the capability to search usernames, accounts, hashtags, and posts. After the initial search icon, advertisements are displayed, while below viral hashtags are featured that you can click into. Notification Icon: This icon looks like a bell, which notifies you of new followers, likes and saves, comments, and mentions. Account Icon: The person icon takes you to your account information. Clicking into someone’s post allows you to view the user who posted the image/video(s), the post itself, and then scrolling down allows me to see hashtags associated with the post, a date stamp of when it was posted, and a list of all the individuals who commented on the post and when.
How does the Lemon8 algorithm work?
According to HypeBot, Like Lemon8’s ByteDance sibling TikTok, it has a “For You Page” (FYP) that shows what the user is interested in as soon as they open the app. The more they interact with their FYP, the more accurate the algorithm becomes in terms of suggesting user-specific content. In contrast to TikTok, Lemon8 displays more current content, while TikTok can show content uploaded a few days ago. Hashtags appear to play an important role in driving the Lemon8 algorithm. Like Instagram and TikTok, trending hashtags are also a thing on this app. Therefore, aligning your content with these trending hashtags and categories is a good way to drive the algorithm and increase the visibility of your content. Moreover, incorporating keywords in your post titles increases the chances of your content reaching more people. In addition, content that tells a story has a greater chance of being shared and going viral, while the algorithm and users prefer carousels to single photo posts. The most game-changing tip is to aim for more saves – the more saves there are, the greater the chance of getting the algorithm to drive it forward.
Will Longevity be at the four corners for Lemon8?
This is up for debate. Although this app is picking up in popularity, there is always a surge of new users within a platform in the beginning. Take Clubhouse and BeRealfor example. Two platforms that had excessive hype in the beginning, that no longer hold the attention of users.
Once again, the landscape of social media is undergoing transformation. Emerging platforms are gaining traction and popularity, prompting us to ponder whether they truly live up to the buzz. Fortunately, we’ve delved into the depths to spare you the effort. One of the platforms purportedly riding the wave of attention is Mastodon Social.
Mastodon Social
Mastodon Social, named after the heavy metal band hailing from Atlanta, GA, was brought into existence by Eugen Rochko in October of 2016. Rochko, a German software developer and entrepreneur, grew up accustomed to the universal social networking sites such as Facebook, Instagram, and Twitter. Frustrated by the dominance of American corporations and their governance of these platforms, Rochko took matters into his own hands and conceived Mastodon.
This innovative platform took the form of an open-source, decentralized social network, comprising independent servers organized in a federated structure. This arrangement empowers users to establish their own servers. Notably, in 2022, when Elon Musk assumed control of Twitter, Mastodon witnessed a significant surge in growth. It was recorded that 800,000 accounts were established on Mastodon, but this figure swiftly declined by 30%. The reason? Novice users felt that the platform was dominated by tech-savvy individuals, which made those less tech-savvy feel unwelcome.
Functionality of the Platform
At first glance, the platform can be overwhelming for outsiders. As previously mentioned, it consists of myriad social networks, all running on distinct servers, or ‘instances,’ as they are referred to. These instances communicate with one another through a mechanism known as the Fediverse. What exactly is the Fediverse? To add a touch of complexity for the average user, the Fediverse constitutes a loosely connected group of decentralized servers that operate on open-source standards. This setup permits users to interact and engage across multiple platforms. In simpler terms, it’s akin to liking a Tweet on Facebook or viewing an Instagram Reel on TikTok. Notably, Mastodon instances or servers are not obliged to be connected to the Fediverse, and the majority aren’t. A case in point is Truth Social, the social network linked to former US President Donald Trump, which remains disconnected from the Fediverse and has garnered a reputation as the most renowned Mastodon instance.
Integration of Several Platforms
Mastodon seamlessly amalgamates several familiar platforms into a unified experience. Much like Twitter, users can share brief messages, referred to as ‘toots,’ either with the world at large or specifically with chosen individuals. Each post is capped at a maximum of 500 characters (a substantial leap from Twitter’s 280-character limit). The platform facilitates the sharing of links, images, audio files, and videos. Users retain the autonomy to decide with whom they share, allowing for posts to be either public or private, accessible solely to their followers. Unlike platforms that employ algorithms to curate content, Mastodon displays posts from accounts users follow, with much of it organized through hashtags. Just like other networking sites, users follow hashtags that align with their interests, exposing them to content associated with those hashtags. Posts are presented in a timeline, sequenced chronologically, though not just one timeline—there are three. First, the Home Timeline encompasses all posts and reblogs from those you follow, providing the most familiar experience. Next comes the Local Timeline, showcasing content solely from your server if you possess one. Lastly, the Federated Timeline displays posts from Mastodon servers that you follow.
Mastodon Followers
Mastodon employs a concept of ‘followers,’ although it diverges significantly from the conventional notion of followers or friends. Users can follow any account, even if it’s on a different server, and the content from that account will feature on their Home Timeline. Accounts set to private require review and approval for followers. The platform permits users to mark posts as favorites, but the count of likes or favorites doesn’t surface on timelines. If you wish to amplify someone else’s post, you need to ‘boost’ or reblog it. Comparable to TikTok or Instagram, you can ‘bookmark’ posts or toots without notifying the account that shared them. A distinctive feature that contrasts with other social sites is Direct Messaging. However, it’s not what you might anticipate. While you can engage in back-and-forth messaging with other users on Mastodon, the messages aren’t strictly private. Instead, you create a post much like any other and restrict its visibility to only those tagged in the post. This approach ensures that the post is concealed from those who haven’t been tagged, yet it remains a post, potentially leading some users to be cautious about sharing private or personal information through this method.
Platform Moderation
Now, onto the topic of moderation. Traditional social networking sites typically employ centralized moderators to determine what content is considered safe or acceptable for sharing. Given Mastodon’s decentralized structure, users take on the responsibility of moderating content on their own servers. As one might expect, this arrangement has led to some challenges. Research conducted by Stanford University revealed alarming findings regarding the presence of child sexual abuse material. Over a span of two days, researchers identified 112 instances of child sexual abuse material out of approximately 325,000 analyzed posts. Shockingly, the first instance of such content was located within just five minutes. Furthermore, an examination of the Fediverse for the use of the top 20 child sexual abuse-related hashtags yielded 713 instances of hashtag use and 1,217 posts without associated media. While Mastodon users can report items, and the platform does offer moderator tools for review, it lacks built-in mechanisms for reporting child sexual abuse material
This leads us to the issue of sharing general NSFW (Not Safe For Work) content on the platform. Formerly, Tumblr served as a sanctuary for NSFW content creators, but as the platform implemented stricter policies against such content, users have migrated to Mastodon. The platform encompasses multiple instances or servers that predominantly focus on sharing explicit content. For instance, Switter, a hub for users and clients to connect with sex workers, boasts a user base exceeding 200,000. Numerous popular instances or servers have become havens for users seeking refuge from platforms like Tumblr and Twitter due to their content restrictions. These facts bring to the surface another question. As many users are trying to find a safe place to land, in terms of leaving Twitter, are they prepared to be introduced to content with no trigger warning or blurring of explicit content?
The overarching question remains: Can Mastodon sustain the growth of its user base, or will this momentum taper off? With Twitter’s rebranding as X and the ensuing frustrations of its users, a hunt for a new virtual haven to express thoughts and opinions is underway. Whether the discontented trickle of users will eventually cease or continue to seep into other platforms is uncertain. Predictions suggest that Mastodon’s growth might be curtailed due to its intricate framework. The platform is anticipated to cater to a niche audience, primarily due to its complexity. Notably, the absence of paid advertising or marketing means that there are no businesses driving the platform’s expansion. Will this platform eventually strike a chord with the average user, or will it eventually fade into obscurity? Only time holds the answer.
The Fediverse, short for “federated universe,” refers to a collection of interconnected social media platforms and online communities that are built on the principles of federation and decentralization. It provides an alternative to traditional social media networks that are usually controlled by a single company.
In the Fediverse, each platform or community is known as an “instance” or a “node.” These instances are independently operated by different individuals, organizations, or communities, and they can have their own rules, policies, and moderation guidelines. Each instance is responsible for its own hosting, moderation, and user management.
Stricter Privacy
What makes the Fediverse unique is its federated architecture. It is based on a set of open protocols and standards, such as ActivityPub, which allow different instances to communicate and share content with each other. This means that users on one instance can interact with users on other instances, regardless of which platform they are using. For example, a user on one instance can follow and interact with a user on a completely different instance.
This decentralized nature of the Fediverse has several advantages. It promotes user privacy and data ownership since users have more control over their data and can choose the instance that aligns with their privacy preferences. It also allows for greater diversity and customization since each instance can have its own community guidelines and rules.
Fediverse’s Ecosystem
The Fediverse encompasses a wide range of platforms and communities, including microblogging platforms like Mastodon, which is often considered one of the most popular and prominent platforms in the Fediverse. Other examples include Pleroma, PeerTube for video sharing, Pixelfed for image sharing, and many more. Each of these platforms serves different purposes and caters to various interests.
Overall, the Fediverse provides a decentralized and interconnected social media ecosystem that encourages user freedom, privacy, and community self-governance. It offers an alternative to centralized social media networks by giving users more control over their online experiences and fostering a diverse and distributed online community.
In the realm of social media, Instagram introduces Threads, a captivating new application that offers users a fresh and engaging experience. Threads, which requires users to have an Instagram account, was created to compete with Twitter. Upon downloading and launching the app, individuals are presented with the option to either create a new profile or seamlessly log in using their existing Instagram account credentials.
Threads welcomes users to customize their profiles by crafting unique bios and incorporating relevant links. Moreover, it grants the ability to effortlessly import information from their Instagram accounts, fostering a smooth transition into the Threads platform. With the flexibility to choose between a public or private profile, individuals can curate their online presence according to their desired level of privacy.
To enhance user connectivity, Threads also offers the opportunity to follow the same accounts as their Instagram counterparts. This feature allows for a seamless integration of existing social networks, enabling individuals to effortlessly stay connected with their preferred accounts across platforms.
With Threads, Instagram introduces a dynamic social media experience that amalgamates the familiarity of its predecessor with exciting new features, providing users with a truly captivating and immersive platform.
Privacy and Personal Data Collection
As you create your own account and begin to follow the prompts to join Threads, the following content is provided to you. Once you read the terms you are able to join the platform.
Powered by Instagram
Threads is part of the Instagram platform. We will use your Threads and Instagram information to personalize ads and other experiences across Threads and Instagram.
The fediverse
Future versions of Threads will work with the fediverse, a new type of social media network that allows people to follow and interact with each other on different platforms, like Mastodon.
Your Data
By joining Threads, you agree to the Meta Terms and Threads Supplemental Terms and acknowledge you have read the Meta Privacy Policy and Threads Supplemental Privacy Policy.
Is Thread’s a Safe App to Use?
Cyber Security experts and privacy experts warn consumers of the dangers associated with this platform.
In a recent CBS News article an associate professor of criminology and justice studies at Drexel University warns users to be on the lookout for privacy issues. The app is currently not available in the European Union, as they have strict privacy laws in place. Something to take note of since they have better consumer protection laws in place.
Although there are privacy concerns many users do feel as though their personal data, the success of Threads so far clearly shows many do not care about the personal data collected.
Adam Mosseri, Instagram’s head, confirmed a significant milestone on June 5th stating, “100 million people signed up for Threads in five days. I’m not sure I can wrap my mind around that fact. It’s insane; I can’t make sense of it.”
As this application continues to grow in popularity, it is being compared to its rival Twitter. Some are even calling Threads “The Twitter Killer”. Here’s why:
Threads is a text-based app allowing for pictures and videos to be uploaded as well. Users can have real-time conversations with one another allowing text posts to have a 500-character limit. With a similar appearance to Instagram Threads allows for users to share their posts from Threads directly to Instagram Stories.
As a Private Investigator, or someone conduct an online investigation, or social media investigation, this application is just another one to add to your list. If your person of interest has an Instagram account, checking Threads will be an important additional step to take when searching. Your subject may or may not have a public or private Threads account. According to Sportskeeda a gaming and tech site, “If someone you’re trying to follow has yet to join Threads, you will automatically follow them when that person joins the platform. Apart from that, you also have the option to follow specific friends by searching their names. Tap the Search Bar on the Search page to find your Instagram friend. Once you find them, tap the Follow button next to their profile name. You won’t find your Instagram friends in the search results if they haven’t joined Threads yet.
Will I be able to see a Public Threads account?
According to the Instagram help center, if a Threads profile is public, it is visible to everyone on Threads. You are also able to see the private profiles they follow and the private profiles that are following that account, like how Instagram currently works. Anyone and everyone will be able to see posts and feed on a public Threads account. Anyone can share links to an individual’s threads and all content is available to be shared through Instagram Stories. When public, any other users can share, repost, or quote another individual’s Thread content. Anyone on or off Threads can also embed another users’ posts.
As additional features are offered, and this app continues to gain traction more searching capabilities may become available. As always, this is something we will be monitoring at E-CHATTER, stay tune further additional information.
Body language can play an important role in investigations, as it can provide valuable clues and insights into a person’s thoughts, emotions, and intentions. Private investigators can use body language in several ways to gather information and conduct investigations.
Body Language Examples
Detecting deception: Private investigators may use body language to detect signs of deception or dishonesty. For example, avoiding eye contact, fidgeting, or nervousness may indicate that a person is lying or withholding information.
Assessing emotions: Private investigators may use body language to assess a person’s emotional state. For example, facial expressions, tone of voice, and posture can provide clues about a person’s mood and level of comfort in a particular situation.
Observing behavior: Private investigators may use body language to observe a person’s behavior and activities. For example, observing a person’s movements and gestures can provide insights into their routines, habits, and activities.
Building rapport: Private investigators may use body language to build rapport and establish trust with a person. For example, using appropriate eye contact, posture, and gestures can help a private investigator establish a connection and create a comfortable environment for an interview.
Gathering evidence: Private investigators may use body language to gather evidence for a case. For example, observing a person’s behavior and movements in public places can provide evidence of infidelity, fraud, or other illegal activities.
So we wondered. Can the same rules be applied when reviewing a subject’s Digital Media? Can a Facebook or Instagram video be enough to use some of the same techniques as in person examples to provide clues into behavior?
The Trump Deposition
Have you heard of The Behavior Panel? Scott Rouse, Mark Bowden, Chase Hughes, and Greg Hartley are the world’s top body language and behavior experts. Together as The Behavior Panel they analyze body language and human behavior in videos of public interest. They are a non-partisan team, looking to educate and entertain you with their interest and expertise in communication, body language, deception detection, interrogation, and resistance to interrogation. You can find them on YouTube.
They recently analyzed the online video of Donald Trump’s recorded Deposition. This is a great example just how much can be taken from an online video of a person answering questions. If you get a chance, take a look at the video on the Behavior Panels’ podcast. They point out several items of interest. The shrugging of shoulders that Trump does from time to time may convey a sense of being sorry for something is just one example they explore.
Not only can some of these techniques be used in digital media, it can be used in Social Media as well.
Social Media Body Language
Technically, body language refers to the nonverbal signals that we convey through our physical movements and gestures, which are typically seen in person. However, in social media videos, you can still convey nonverbal cues through your facial expressions, tone of voice, and posture.
For example, facial expressions can show enthusiasm or sadness, change the tone of your voice will convey different emotions, and gestures may be used to emphasize certain points. Voice inflections can be a sign of stress or anxiety.
Studying a social media post’s background can be very telling as well. For example, a cluttered or messy background may communicate disorganization or lack of attention to detail, while a professional or clean background may communicate professionalism and attention to detail.
Social media posts can provide valuable clues in an investigation, as they can reveal a person’s thoughts, emotions, activities, and connections with others.
Clues in a Social Media Post
Location: Social media posts may contain information about a person’s location, such as check-ins or geotags, which can be used to verify alibis or track movements.
Relationships: Social media posts may reveal a person’s relationships with others, such as friends, family, or acquaintances, which can be used to identify potential suspects or witnesses.
Activities: Social media posts may provide information about a person’s activities, such as hobbies, interests, or daily routines, which can be used to establish patterns of behavior or gather evidence of illegal activities.
Emotions: Social media posts may reveal a person’s emotions, such as anger, sadness, or happiness, which can be used to assess their mental state and motivations.
Communications: Social media posts may contain messages, comments, or other communications with others, which can be used to identify potential witnesses or suspects, and to gather evidence of criminal activities.
Overall, social media posts can provide valuable clues and insights into a person’s thoughts, emotions, activities, and connections with others, which can be used to support an investigation. However, it’s important to note that social media posts should be used in conjunction with other investigative techniques and evidence-gathering methods, and that proper legal and ethical guidelines should be followed when accessing and using social media data.
Imagine you are taking a once in a lifetime style vacation, visiting the most amazing places, eating the best food at highly rated restaurants, and experiencing the spectacular view from your hotel room window. How much of this would you feel led to share on social media? And of that, how many of the posts would you geotag with your location? We are currently living in a world full of 8 billion people, and 4.9 billion of those people engage in social media. That is over half of the entire world population, sharing information about their lives on the internet. There is a large majority of people who engage in social media who do so privately with the exception of close friends and family. You then have the other side of the coin with people who share their social media experience with all 4.9 billion people on social media. This is where the danger of social media truly lives, cyberstalking.
Cyberstalking
It has been reported that each year there are an estimated 850,000 adults in the United States who are victims of cyberstalking. This is an issue that is unfortunately not discussed nearly as much as it should be, especially with the younger generations.
Take the story of TikTok star Ava Majury. In 2020, 13 year old Ava had attracted over 1 million followers to her social media accounts by sharing videos of herself doing dances and lip synching to popular music. Ava began receiving messages from an 18 year old boy named Justin, who she assumed was just another one of her fans. Justin, through social media, was able to locate friends and classmates of Ava’s who he paid in exchange for photos of her and her cell phone number. It was clear that Ava had developed a Cyberstalker and she blocked him through all her social media. Still, Justin was able to connect with people through social media to discover where she lived and show up to her house armed with a shotgun. Ava’s father, a retired police lieutenant, ordered him to leave their property and drop his weapon. Justin did not listen and his intent on causing the family harm was made clear, and he was fatally shot by Ava’s father. Ava continues to share content online publicly with the support of her parents.
Social Media Influencers
Stories like Ava’s are more common than you think. In September of 2018 there was a story reported of a 21 year old man who was arrested for breaking into a home and bedroom of a 13 year old girl whose address he had found by studying her posts on social media. Take Tabitha Swatosh, better known as the “big sister” of the internet. Tabitha has made her fame through TikTok but also through YouTube as she posts videos of her lip syncing to different sounds as well as ‘vlogging’ her everyday life. She has over 13 million followers on her TikTok account, and has been a part of the Hype House since 2022.
You may wonder what the Hype House is. Well, the Hype House is a content creator collective and an actual physical rental mansion in Los Angeles, California. The whole point of having this home is for the members of this tight knit club to collaborate with each other and brands making viral content for the internet. It was created by (at the time) 17 year old TikTok star Lil Huddy and 21 year old YouTube star Thomas Petrou. Over the years they have had a multitude of members including some of the more recognizable Charlie and Dixie D’Amelio.
So how does this fit into cyberstalking? Well, Hype House member Tabitha Swatosh has been very open about the countless stalkers she has obtained throughout her social media journey. The most recent being in December of 2022, Tabitha posted to TikTok sharing that she has to move for the 3rd time in one year due to a stalker coming to the door of her apartment. Despite Tabitha’s history with stalkers, she continues to share videos on her TikTok showing parts of the outside of her new apartment building as well as distinguishable features of the inside. The content that she has shared about her most recent stalkers has combined views of over 8 million. So now we ask the question, is society romanticizing cyberstalking?
Social Media Oversharing
On your journey through social media you can find content of people stalking their current love interests on social media, learning things about them that they shouldn’t really know based on their in person conversations. You have instances like the current pop culture drama between Hailey Beiber and Selena Gomez, where society is deep diving into the archives of social media to prove a point about these two celebrities saying they’re ‘investigating’ when really it could be considered a form of cyberstalking.
Finally, taking a look at one of the most popular Netflix shows currently streaming called You. This show follows the lead character Joe Goldberg who is a serial stalker, and it is narrated from his point of view. Viewers are taken through a journey as Joe stalks people online, in person, and kills people all under the illusion of him having to do these things to protect the people he loves… Society LOVES this character, choosing to see his better qualities and ignore the bad.
Are we, as a society, becoming desensitized to the risks of publicly oversharing on social media? It is very possible to have a safe online presence, but the current ‘influencers’ are pushing the narrative that to have a multitude of followers and viral videos, you have to share the private details of your life publicly. Is this really the example we want to set for the youth of America? Are we encouraging them to share private details of themselves online just for the sake of chasing clout? No matter what the circumstances? It sure seems as a society we need to be much more aware of what we post publicly.
Identifying a fake image online can be challenging as technology has made it easier to manipulate images. In a blog post from 2020, titled “OSINT Research & False Positives” we discussed how easy it was to create a computer generated image. However, fast forward to 2023, with the explosion of artificial intelligence, creating computer generated images of all kinds have taken on a life of their own.
Taking a closer look at examples of fake images can help to train your eye to look for certain traits of the image to determine it’s legitimacy. Nothing is infallible of course, but there are some steps you can take to assist in identifying fake images. In fact, next time you have some time to kill, check out “Which Face is Real” to test out your knowledge!
Signs of computer-generated manipulation
The photo above was identified as fake through Snopes.com’s fact checking. The photo was posted to a Twitter user’s feed. Snopes is a great resource for debunking fake profiles, images and news. According to the article on the site, “The photo was generated by artificial intelligence (AI), with several telltale signs of computer-generated manipulation. For examples, an area near Trump’s lower lip showed another trace of lip; the faces of the presumed Secret Service agents and many crowd members were disfigured; some heads looked more like skulls, and the flags’ coloring wasn’t consistent. Additionally, the man immediately behind Trump not only had signs of digital doctoring in his face but also his right hand.”
The photo was fake; it was not a genuine documentation of Trump arriving to New York for his booking and arraignment. The Twitter user acknowledged that fact, writing in a reply tweet, “I didn’t find this [photo]. I generated it via prompts.”
Source: Snopes.com
Systems such as Stable Diffusion, DALL-E, and Midjourney make it easy for anyone to create images to fit their narrative. The good news is that historically, AI generated systems have struggled to mimic human hands as an example. Something to keep in mind, for now at least.
“It’s pretty amazing, in terms of what AI image generators are able to do,” says S. Shyam Sundar, a researcher at Pennsylvania State University who studies the psychological impacts of media technologies. “There’s been a giant leap in the last year or so in terms of image-generation abilities.”
Tips to Identifying Fake Images Online
Look for inconsistencies: Study the photo carefully for inconsistencies or irregularities in the image. Look for blurred edges, mismatched shadows, or disproportionate objects. These inconsistencies can be a sign of photo manipulation.
Check the metadata: Most digital photos contain metadata that includes information such as the date, time, and location of the photo. Check this information to ensure it is consistent with the photo’s content.
Reverse image search: Use a reverse image search tool like Google Images, Bing Images, Yandex Images or TinEye to check if the photo has been used elsewhere on the internet. If it has been used in different contexts, it may be a sign that it’s a fake.
Consult experts: If you’re still unsure about the authenticity of a photo, consult experts such as photo forensics specialists, journalists, or fact-checking organizations.
Be skeptical: Finally, always approach photos online with a healthy dose of skepticism. Be wary of photos that seem too good to be true or those that are designed to elicit an emotional response.
Look for a Watermark: DALL-E 2 places a watermark on every photo generated through their system. The Watermark is shown below (the color bar). It is placed very small on the image. It can be removed however, so it will not always be shown.
By following these steps, you can increase your chances of identifying a fake photo online.
Over the past few years, there has been a noticeable shift from traditional social media posting to stories. Stories are short-lived, vertical format posts that are available for 24 hours on platforms like Instagram, Snapchat, Facebook, and WhatsApp.
There are a few reasons why this shift has occurred. First, stories are more visually engaging than traditional social media posts. They allow users to share a series of photos or videos in a more dynamic way, often with added features like filters, stickers, and text overlays. This makes stories more appealing to younger generations who value visual content.
Second, stories are more ephemeral than traditional social media posts. Because they disappear after 24 hours, users may feel more comfortable sharing candid, unpolished content without worrying about it living on forever. This makes stories feel more authentic and raw, which can be a refreshing change from the curated feeds that dominate traditional social media.
Third, stories are often prioritized by social media algorithms. This means that users are more likely to see stories from people they follow at the top of their feed, making it a more effective way to stay up to date with friends and influencers.
Overall, the shift from social media posting to stories reflects a desire for more dynamic, authentic, and visually engaging content that feels more personal and less polished.
Several social media platforms have adopted the stories feature, which allows users to share short-lived, vertical format posts that disappear after 24 hours. Here are some of the most popular social media platforms that have stories:
Which Social Media Platforms Have Stories?
Instagram: Instagram was one of the first social media platforms to introduce stories, and it remains one of the most popular platforms for stories. Instagram stories allow users to share photos and videos with added features like stickers, text overlays, and music.
Snapchat: Snapchat is another social media platform that is well-known for its stories feature. Snapchat stories allow users to share photos and videos with added filters and effects.
Facebook: Facebook introduced stories in 2017, allowing users to share photos and videos in a format similar to Instagram stories.
WhatsApp: WhatsApp, which is owned by Facebook, also has a stories feature called Status. WhatsApp Status allows users to share photos, videos, and text updates that disappear after 24 hours.
YouTube: YouTube has a stories feature called Reels, which allows creators with over 10,000 subscribers to share short-form video content with their audience.
Twitter: Twitter has a stories feature called Fleets, which allows users to share text, photos, and videos that disappear after 24 hours.
LinkedIn: LinkedIn has a stories feature that is currently available only to users in certain countries. LinkedIn stories allow users to share short-form video content related to their professional lives.
The Future of Social Media Stories
The future of social media stories looks promising, as they continue to be a popular feature across various social media platforms. Here are some potential trends that may shape the future of social media stories:
Continued innovation: Social media platforms will continue to innovate and expand the features of their stories, such as adding new filters, animations, and interactive elements to keep users engaged and entertained.
Integration with e-commerce: Social media stories may become more integrated with e-commerce, allowing users to purchase products directly from a story or swipe up to view a product page.
Increased use by businesses: Businesses are already using social media stories to reach customers and promote products, and this trend is expected to continue. As stories become more interactive and integrated with e-commerce, businesses may use them as a primary marketing tool.
Growth in private stories: Private stories, which are only visible to select friends or followers, may become more popular as users seek to share more personal content in a more intimate setting.
Greater emphasis on video: Video content is becoming increasingly popular on social media, and stories are no exception. Platforms may place greater emphasis on video content in their stories, such as by allowing longer videos or adding more video editing features.
They Can See You
Several social media platforms allow users to see who has viewed their stories, while others do not offer this feature. Here are some of the most popular social media platforms that allow users to see who views their stories:
Instagram: Instagram allows users to see a list of people who have viewed their story. Users can access this list by swiping up on their story.
Snapchat: Snapchat allows users to see a list of people who have viewed their story. Users can access this list by swiping up on their story.
Facebook: Facebook allows users to see a list of people who have viewed their story. Users can access this list by clicking on the eye icon located at the bottom of their story.
LinkedIn: LinkedIn allows users to see a list of people who have viewed their story. Users can access this list by clicking on the “views” icon located at the bottom of their story.
It’s important to note that while some social media platforms allow users to see who has viewed their stories, others do not offer this feature. For example, Twitter’s Fleets feature does not currently allow users to see who has viewed their stories. Additionally, users may only be able to see who has viewed their story if their account is set to public, as private accounts may not allow this feature.
How Can You Search Stories as an Investigator?
As an investigator, searching social media stories can be a valuable tool in gathering information, but it may not always be easy or straightforward.
The ability to search social media stories will depend on the platform in question. Some platforms, like Instagram, allow users to search for stories using keywords or hashtags, while others, like Snapchat, do not have a search feature for public stories.
Additionally, stories are often ephemeral and disappear after 24 hours, which can make them difficult to locate and collect as evidence. However, it is possible to capture screenshots or screen recordings of stories as they appear in real-time, which can be useful for preserving evidence.
It is important to note that accessing and collecting information from social media stories must be done in accordance with the platform’s terms of service and applicable laws and regulations. As an investigator, you should be familiar with the legal and ethical guidelines surrounding the collection and use of social media data.
Overall, the future of social media stories is likely to be shaped by continued innovation, increased integration with e-commerce, and a greater emphasis on personalization and video content. Stay tuned! It’s only the beginning.
It is interesting to think about how social media has changed our world. We have grown from corded wall phones, to flip phones to now mini computers we carry around with us everywhere we go. It isn’t enough for society to have instant conversations through emails, text or phone calls, but we need to share our daily activities through an app using pictures, videos and captions. Gone are the disposable kodak film cameras and in are the kodak film filters to make your iphone selfie look ‘vintage’. With the use of great lighting and precise movements, someone could be using a filter to change their face shape, hair color, eye color, lip size and so much more. Influencers are not influencing honestly, society has molded and shaped a reality that is fake and inhuman. No one wants to share their insecurities; they would rather mask them with technology and paint a picture that is not real life.
With this being said, we are being introduced to a new app that forces you to share your insecurities. No more being able to take 50 photos and choose the best one, and most of all no filters. The social media application, BeReal, was introduced in December 2019 by Alexis Barreyat and Kévin Perreau. The popularity grew overseas as the French creators launched BeReal, and now it is spreading world wide. This app pushes users to share who they are in the moment, with no addons, and now it is among the latest trending social media apps.
Move over Emoji….
So how does BeReal work? Once the app is downloaded, you have the opportunity to make a public or private profile. If your profile is made public, just like Instagram or TikTok, your image each day gets shared to an explore page for the public to interact with. If shared just with friends, the image populates in a feed for your friends to see each day. The app was built to display transparency in just about every way. Instead of choosing an emoji to respond with when looking at a post, you reply using what the app calls a RealMoji. This presents you with the same basic reaction emojis that you see on any other social media app, you choose which emoji you want to respond with and you are then prompted to recreate that emoji with your own photograph, your own face
BeReal and Transparency
Each day at a random time you will be alerted by the app that it is time to post a BeReal for the day. Once you open the alert and navigate into the app you have 2 minutes and 2 minutes only to take a photo of what you are doing at that moment. The transparency doesn’t end there. Not only are you taking a selfie of yourself or maybe a photo of the activity you are currently doing, but you take two photos. One photo is from your front facing camera and the other is from your back facing camera. So you are posting a full representation of where you are and what you are doing. You can retake your photo as many times before the 2 minutes are up, but be wary because everyone on the app (if your profile is public or friends if your profile is private) can see just how many times you re-took your photo. Once you begin posting, only you can go back and see the previous posts you’ve made. If you don’t want to post one day, that’s okay don’t post. But if you don’t post, you won’t be able to see your friends BeReals for the day.
What About Safety?
Of course BeReal has some questionable features as well. If you make your profile public, there is no end to who could see your photo or what reaction they could send you via Realmoji. This opens up the normal social media downfall of trolling and bullying. But posting publicly, you have no clue who is seeing your posts which opens up the door to someone taking screenshots of your content. Similarly to Snapchat, BeReal will show exactly who has screenshotted your post, but that doesn’t delete it from their device. Another questionable feature of BeReal is the reporting. There is no currently available option to report a post with specific detail, you are just prompted with the simple ‘it’s undesirable’ or ‘it’s inappropriate’. Just like any other social media website/application it is almost virtually impossible to moderate the content being shared, so you have the possibility of seeing explicit/inappropriate content shared by the public.
Saving the best feature for last, BeReal (similarly to Snapchat) has a geotagging feature. As long as the app has access to your location settings, it will share your EXACT location on a map immediately with your post. With the setup of this app, you can not post an experience later when you get home and tag your previous location. You are sharing within a two minute window exactly where you are. This is a very large safety concern for many users, and for many parents of younger users.
Investigating BeReal
So what does this mean for investigators? This is another app to be keeping your eyes on when looking into a subject. You can search for specific people through BeReal, but the catch is that you can only see people’s content if you post yourself. Usually within investigations, you are wanting to capture something from someone’s online presence. Since the app is only available on an android or iPhone, capturing a post without being seen is difficult due to their screenshotting feature. It has been posted online that there is no way for users to know if you have taken a screen recording of someone’s post, which proves to be helpful for investigators but a slight safety issue for the users. So what do you think? Is BeReal setting a standard for the future of social media? Only time will tell.
The world just doesn’t know what to do with TikTok. For what appears to be the umpteenth time, news outlets are covering the famous app as U.S. lawmakers work to ban it in the United States. Over 1 billion people tune in to the app monthly, and for reference that closely follows the 1.4 billion people on Instagram, 2.2 billion on YouTube, and 2.9 billion users on Facebook. In the United States alone, TikTok has over 138 million active users who spend an average of 95 minutes on the app per day. It is safe to say that this app has a very particular sway on its users, more so than any other social media platform in history.
According to the Washington Post, in 2021 the trending viral videos of people sharing their favorite books, many of them with the hashtag #BookTok, helped make 2021 one of the publishing industry’s best sales years ever. This trend doesn’t just stop at the publishing industry. Take the Stanley Big Grip Travel Quencher that was on everyone’s Christmas list this past year, it is safe to say that their sales of this viral water bottle were largely influenced by TikTok. The hashtag #stanleytumbler has over 133 million views, and the brand’s TikTok page has over 30 thousand followers. If you can believe it, the app’s influence doesn’t stop there.
In July of 2022, Google senior vice president Prabhakar Raghavan shared internal data showing that an average of 40% of 18 to 24-year-olds in the United States go to TikTok and Instagram over Google for their search needs. This data makes many businesses wonder what the future holds in regard to consumer behavior. TikTok has already demonstrated its influence with viral videos, but what happens when users start funneling from Google over to TikTok for their searching needs? We have seen other apps such as Facebook, Instagram and YouTube attempt to produce the TikTok model with Reels and YouTube Shorts, but nothing seems to beat the incredibly smart algorithm that TikTok holds.
So with all of these incredible benefits on our economy, why would lawmakers be trying to ban TikTok in the United States? TikTok’s parent company ByteDance, who is located in China, have been accused many times of accessing nonpublic data about US TikTok users which is exactly why former president Donald Trump tried to ban the app during his presidency. In a 2021 Senate hearing, a TikTok executive shared that there was a US based security team that decides who gets access to the data, and that US user data was not being handled in China. According to the BuzzFeed News, that is not the whole truth. There were 14 statements made by 9 different TikTok employees sharing that there were Beijing-based engineers that “have access to everything”.
So what does this mean for the app’s future in the US? Currently, both Democrats and Republicans stand mostly unified in their attempts to weaken the immensely popular (and powerful) social media platform. President Joe Biden approved a limited TikTok ban when he signed the over 4,000 page spending bill into law in December. The ban disallows the use of TikTok by the federal government’s employees, which stretch to almost 4 million people, on devices owned by its agencies. The bans don’t stop there, many state government’s banned the app to be used by its employee’s, but also to students and workers who are on the wifi of certain college campuses. University of Oklahoma, University of Texas, Alabama and Auburn are some of the campuses who have set forth this new campus rule.
ByteDance has created a new U.S. Based team as of this past December, to help address these trust and safety issues stating that the purpose was to “build further trust and confidence in the protection of US user data and compliance”. It has been said that President Biden is more inclined to keep the app in the market, but there is no final decision that has yet been made. This safety issue that is being discussed not only affects everyday Americans and the content creators on the app, but it may also have a lasting effect on businesses and the future of social media marketing.
There has been unrest in the world of social media since well known social media and networking site Twitter was purchased by billionaire Elon Musk. Many users are unhappy with the changes that are being brought to the site and are realizing that they will most likely have to share their thoughts, opinions and ideas in a new way on a new platform… And that platform just happens to be Tumblr.
Tumblr was founded by David Karp in 2007, following the recent launch of Twitter in 2006 and Facebook in 2004. The site was built to be a simple microblogging social media platform, but with the feature of being able to share multiple forms of media. Tumblr users could design their own page, posting and sharing videos, pictures, GIFs and text posts. The site quickly gained popularity and by 2013 had seventy-three million accounts. By this time Tumblr was acquired by Yahoo! Inc for 1.1 billion dollars.
For those who never used Tumblr, the site was known to be “whatever you want it to be”. There were no limits on what you could share and or how you shared it and this idea attracted quite the mixing pot of users. The site quickly became ‘fandoms homeland’ according to Mashable. Users got to write fan fiction, share illustrations, clip down moments from shows or movies and repost them out of their original context to fit whatever fantasy they wished.
With this mindset of being free to post whatever you wanted came the infiltration of pornography on the site. Pornography workers who didn’t fit industry standards at the time made their way over to tumblr and grew their fame and following by blogging and sharing explicit images or videos. Tumblr became a site where people freely shared their sexuality, creating and sharing NSFW illustrations, fetish art/pornography, queer erotica and so much more. The layout of Tumblr is unlike the social media layouts we see today. Users do not receive curated feeds based on what the algorithm thinks you would like to see, Tumblr users follow hashtags, keywords and follow pages that are similar to their own, creating a tight-knit community of people just like you.
In 2018 Tumblr saw a major change… Apple removed the app from their app store due to rumors of child pornography being shared on the site. In response Tumblr took action and banned adult content from the app completely. Immediately the users who found fame on the platform began leaving and finding new ways to share their content. The platform relied on digital tools to hand pick the banned content, and of course there were issues. Explicit content was being missed while other content began being flagged even though it didn’t contain anything against guidelines, resulting in even more people abandoning their accounts and fleeing to different social platforms.
This brings us full circle to 2023 where the phrase ‘tumblr comeback’ is being tossed around on the profiles of unsatisfied Twitter users. The millennials that originally had accounts on Tumblr are searching for a new platform to share their thoughts in text form and not in the form of a TikTok video, which is leading them back to Tumblr. Gen Z is also finding their way to Tumblr for the first time. Tumblr, now owned by Automattic, a parent company of WordPress, reports that 61% of their new users are a part of the Gen Z demographic. Also reporting that 48% of the site’s users are Gen Z as well.
The site remains the third most popular blogging site in the US, Canada and the UK, although users had left it in the dust for so many years. Many people don’t believe that Tumblr will ever become relevant again and will crumble as MySpace did, but users are beginning to prove them wrong. Though the site has a long way to go before competing with the Twitter universe, they are an attractive FREE alternative. Heading into 2023, the site has once again lifted their ban on nudity saying in a blog post “we now welcome a broader range of expressions, creativity and art on Tumblr, including content depicting the human form (yes, that includes the naked human form). Only time will tell if users will continue to abandon the sinking ship that is Twitter and find their way over to Tumblr, whether they are a first time user or are returning back to their beginnings. Either way, we may be seeing a Tumblr comeback.
Dating apps have been around for over 10 years. They are extremely popular and it is no surprise that Facebook decided to get in on the action in 2018. It was first launched for Columbian users and by the end of the year it grew to 14 other countries. Right around 2019 it hit the US market. In late 2020 it launched in Europe.
So how is it the same as other apps and what are the differences? We decided to do some research into this app to see if it is worthwhile to use in your investigations. Here are some facts we learned.
In 2021 The Verge revealed that not many people were using the app
Over 57% of Facebook users have never heard of Facebook Dating
Facebook Dating is a feature of the standard Facebook app, not a stand alone product
Facebook has a 2.7 star rating on Apple’s app store
Facebook has a 4.1 star rating on Google’s app store
Facebook Dating is not desktop compatible
Facebook Dating’s Unique Features
One of the most interesting features of Facebook Dating is that you can not take screenshots. In an effort to gain confidence among their users, they created a security feature that restricts users from taking screenshots.
You need a Facebook profile to create a profile on the dating app. However, they work independently from one another. Nothing is ever shared to your news feed from the Facebook dating app. Your friends will never be notified that you have a dating profile on Facebook Dating.
The app has a good amount of settings that may be used. For example, you can create a list of users you want to avoid. You can also block users who are friends of your friends.
Like other dating apps, Facebook Dating is location based. You are encouraged to turn on your location so that you can be matched with singles in your area. They do have a “Match Anywhere” however, it is not available to all users currently.
Recently, Facebook Dating implemented age verification tools to its platform. They are working with the age verification company, Yoti, according to their website.
Fast Company published an article back in October, on how users are using Facebook Groups as a matchmaking service. “Depending on the group, users will share pictures of themselves or of a friend who is looking for a relationship, and then will field the responses.”
Privacy and Searching for a Cheating Partner
Privacy is a major concern for Mark Zuckerberg these days so it is no surprise that Facebook is being very cautious when it comes to managing the dating app. Other dating apps are feeling the pressure as well to create a safe environment for their users.
This makes it much more challenging to search dating apps for a partner who may be cheating. YouGov found that 17% of people who are currently date-cruising on apps or websites are there partly to cheat on their significant others. That’s more than one in six. Statistically, if you swipe six times, one of those potential matches is going to be a cheater.
Once again Tik Tok has been in the news. The app has received its share of scrutiny over the past few years. We will go into some this later in the blog. For now, let’s take a look at why it is so popular and with whom.
The app gained huge popularity during Covid while many people spent much more time at home and were looking for some entertainment. It has become an addicting app for people of all ages. The homemade videos in the app are not only fun to watch, they can be informative as well. You will find many tutorial “how to’s” from gardening to opinion pieces from individuals of all backgrounds. This is also a good reason not to overlook it when you are conducing online research on your case.
According to Hootsuite, Tik Tok was the most downloaded app of 2021, with 656 million downloads. That was more than 100 million downloads than its runner up, Instagram. Tik Tok is the 6th most used social media app in the world as the chart below shows.
Source: Hootsuite Digital 2022 Report
“The Chinese version of TikTok is called Douyin, which is number eight on this list. Douyin is actually the original app launched by parent company ByteDance in September 2016, who rolled out TikTok for international audiences in 2017. There are small differences between the two apps, but they look and function almost the same way.
Douyin boasts 600 million daily active users (most apps use monthly figures). When the two apps are combined, they reach fourth place on this list, ahead of Instagram and WeChat.” (Hootsuite)
Tik Tok Controversy
Like other social media apps, Tik Tok has had quite a bit of controversy. Back in 2021, a viral hoax about school violence spread rapidly across TikTok, alarming parents and children. Other hoaxes and harmful content, like videos promoting rapid weight loss, have proliferated on the platform and drawn criticism. (Hootsuite).
Tik Tok has addressed these issues by updating their Community Guidelines. They are committed to removing dangerous content from their site.
Most recently, the app was in the news again. It has been revealed that Tik Tok can track users as they visit other sites through the iOS app. The scary part is there is no way to know if they are storing this data and if it is being used somehow. Whenever something like this happens, it is always best to assume they can gather your data and act accordingly.
Priyadarsi Nanda of the University of Technology Sydney’s School of Electrical and Data Engineering said collecting information about keystrokes closely resembles the behaviour of keyloggers, a type of malware.
“Whichever website you go to, it takes your inputs,” he said. “This is definitely a concern for any app you don’t trust.”
A TikTok spokesperson told Guardian Australia the “report’s conclusions about TikTok are incorrect and misleading”.
“The researcher specifically says the JavaScript code does not mean our app is doing anything malicious, and admits they have no way to know what kind of data our in-app browser collects,” the spokesperson said.
“Contrary to the report’s claims, we do not collect keystroke or text inputs through this code, which is solely used for debugging, troubleshooting, and performance monitoring.”
Tik Tok is actually banned in several countries. Can you guess which ones? Click here to read more.
Tik Tok Marketing
Advertisers of all kinds are jumping in to this platform because of its popularity. I have even seen videos of Private Investigators discussing their services. When they do so, they are sharing their website links to make it easier for the user to make a purchase right within the app.
In the end, it is impossible for OSINT researchers to ignore this app, especially for the demographics stated here. Just add an extra layer of caution to your searches just in case.
OnlyFans has exploded in popularity during the Covid pandemic. It has been an outlet for people to kill a little boredom, the same way many social platforms have done. This gives all of us a plethora of additional information to find on a POI (person of interest). Finding people on OnlyFans can be tricky. We will share some tips that we have found help during our searches.
The average creator on OnlyFans has 21 subscribers
OnlyFans has paid more than $2 billion to its creators so far
What is it all about?
According to their website, “OnlyFans is the social platform revolutionizing creator and fan connections. The site is inclusive of artists and content creators from all genres and allows them to monetize their content while developing authentic relationships with their fanbase.” They pride themselves on being welcoming of all creative genres and content. ( hint…hint…. lines are blurred between Influencers, pornography, and sex workers). Like any site like this, it has the potential of a huge amount of earnings. OnlyFans reports over 50 million monthly users and 1 million content creators on the platform.
Searching on the Site:
Finding people on OnlyFans can be challenging if they don’t cross reference their profile on other social sites or websites. One of my very favorite ways to search in social media is to use Google and searching Only Fans is no different. Here is a quick cheat sheet to use:
Open your browser and go to the search bar
Type in “onlyfans.com/insert username here”
Continue to use various usernames you know belong to your subject
If this doesn’t work, try another way:
Open your browser and go to the search bar
Type in “search:onlyfans.com *insert username or name here*”
Continue to use various usernames you know belong to your subject
Many times people who have profiles on Only Fans, cross reference on their other social media platforms ( especially Instagram ). Be sure to comb through sites to see if you can find anything there as well.
I would try the above methods using all search engines, not just Google. You never know what another search engine might pick up. It is worth the extra time it takes.
Can You Screenshot in Only Fans?
You can take a screenshot in Only Fans without the creator knowing about it. Since it is a web-based service, it has no means of identifying whether a screenshot has been taken.
Search Engine Tool
There is a tool for searching OnlyFans, but like anything else, it can be hit or miss. It is worth it to try however. It is called, “https://onlysearch.co/”
The site was designed to help OnlyFans influencers connect with their fans. So it does index publicly available information, display picture, display name, bio, price, and location — and display this information on OnlySearch, when key search terms appear in bios.
As of this writing, the above methods are the quickest ways to conduct a search on this site.
Most ACM’s have a level of confidence in this because currently it Is underreported. There is a sense that the ACM is “anonymous” online with no way to find out who he really is. This makes it almost impossible to catch them. With the help of great organizations like SOSA (Safe From Online Sex Abuse), whose goal it is to raise awareness and combat abuse, they are making some headway.
Recently the organization created a documentary on this subject that every parent should watch. It is called Undercover/Underage. Roo Powell is on a mission to expose the dangers of and prevent online child sex abuse. She works together with her nonprofit group, SOSA to set up aliases to engage with child predators. She works with law enforcement and professionals in the field. Over the course of the documentary, Roo transforms herself into several 15–16-year-old personas. It is no easy undertaking to make 30-year old’s look (Roo) and act like a 15-year-old minor. However, she pulls it off. She has done her research and understands the behavior, likes/dislikes of an average teen.
Alias Creation (aka Sock Puppets)
Setting up and creating a fake profile requires a lot of upfront work. Because this may lead to a video meeting or even an in-person meeting, everything must jive. Using the same username is critical across all platforms.
Creating a community of “friends” to make the profile look believable.
Photos – hiring a professional photographer who specializes in photo editing. The photographer in the documentary works in the fashion industry and is great at identifying and removing any age regressing features. The goal is to make her look like a teenager.
The use of hashtags is very important. Teens will use hashtags – #freshman, #15yearsold, #mixedgirl, #daddyissue, etc. The more the better to get the right kind of attention online.
OSINT Work
One thing that I found to be interesting as I watched the documentary, is how the team used OSINT techniques every step of the way. They used the “Leave no stone unturned” strategy to try to ID the guy. In one episode, the ACM loved to talk about himself. He talked about his work history, his hobbies, the fact that he has 4 kids, etc. The team is shown searching all of it to connect the dots and find out information about this guy online. He’s a pro however- he knows what he is doing and is careful. Just one small little crumb could be enough to point them in the right direction. The average person has no idea how much information is housed on the web. It could be an old press release that has been forgotten about that names him. Or it could be an obituary of a deceased relative that includes the name of the ACM. Anything is possible and that is why it is important to take the time needed to search.
The group also uses Honey Pot computing to lure in the ACM. A honeypot is a decoy computer system for trapping hackers or tracking unconventional or new hacking methods. In this case it is being use as a lure to try to identify the ACM’s IP address. For this case, it is being populated with the teen girl persona’s photos, poetry, etc. On the backend of the site there is an activity log. This lists out the visitors of the site. From that IP address, one may be able to identify the location of the ACM, if they do not use a VPN of course.
Keeping Up With the Apps
It makes sense that teens are more inclined to use apps. Apps allow users to share photos and videos with their friends through their mobile device. The documentary mentions a few sites/apps you may not have heard of before.
boardgamegeek.com :This site’s database has more than fifty thousand board games along with their developers and players. The games themselves are linked to users through lists called GeekLists, along with owned/played/wanted etc. connections, ratings, reviews, session reports, and so on. It has a forum which has some search capabilities. Good to keep in mind if your subject is a gamer. Search by location and then by name.
Online chat groups, Message apps, Gaming apps, make it easy for a predator to make a connection with a minor online. Interactions can easily escalate to “sextortion”, in which minors are coerced into sending explicit imagery of themselves. According to a New York Times recent article titled, “How to Protect Your Children From Online Predators”, the following are the ones to watch closely
In summary, the team uses outstanding critical thinking skills along with online research to try to identify the ACM’s. Some fall through the cracks, but in some cases, she does provide enough evidence to law enforcement to “take it from there”. It is not an easy task, and it really takes a thick skin and a strong stomach. Some scenes show Roo emotionally drained from the experience of playing out conversations with child predators. But in the end, it is her deep desire to help the kids. If she can get one or two arrested, she has done what she set out to do.
In the business world, one could say with confidence that everyone is spying on everyone else. It’s a given and possibly more popular within certain industries. Competitive Intelligence initiatives in business is almost critical for the business owner. Whether the company is small, medium, or large, this type of intelligence gathering is important. Now with open source research options, it is so much more detailed than ever before. Let’s start with the basics.
What Is Competitive Intelligence?
Competitive intelligence, sometimes referred to as corporate intelligence, refers to the ability to gather, analyze, and use information collected on competitors, customers, and other market factors that contribute to a business’s competitive advantage. Competitive intelligence is important because it helps businesses understand their competitive environment and the opportunities and challenges it presents. Businesses analyze the information to create effective and efficient business practices. (Investopedia.com)
This is an example of coffee brands across three social media platforms. The example if provided by the software company Sprout Social as an example of what this type of research uncovers
Types of Investigations
Marketing : One of the key reasons to conduct competitive intelligence is to gain a marketing advantage. One of the best ways is to use social media listening, which identifies the company’s online reputation. What do employees say about the company? What about customers? There are multiple software platforms out there that do exactly this as an ongoing part of their marketing plan. They can identify the effectiveness of the company’s digital and social media marketing, as you can see in the image above from Sprout Social. Sprinklr is another good example of this type of software. Another excellent option is to use mystery shopping. Our parent company, Ann Michaels & Associates, has conducted this type of research many times over the years. With a data base of over 300,000 evaluators we are able to find just the right person to perform the research. The shopper poses as a business looking for pricing on a service or product from the company’s competitor. This allows for a very up close and personal look at the competition’s sales techniques, customer service levels and pricing.
Mergers and Acquisitions: Research is key when looking at a company to purchase or merge with. Investigating their reputation, online and off is important. We have conducted open source research on not only the company, but also on individual stakeholders. This allows for a good overall impression.
This can be a good source of income for the Private Investigator. Be sure to list it on your website and talk to clients about it.
In order to take a quick dive into researching Instagram, it can be helpful to understand how it originated and which demographics are using it.
Instagram was founded by Kevin Systrom and Mike Krieger. In April 2012. Facebook Inc. acquired the service for approximately US$1 billion in cash and stock.
Instagram quick stats:
Instagram has over a billion monthly active users.
About 995 photos are uploaded to Instagram every second.
The number-one most-shared food on Instagram is pizza.
There are currently over 140 million Instagram users in the United States.
80% of Instagram accounts are for personal use.
More women use Instagram than men.
The majority of Instagram users are aged between 25–34 (33.1%).
60% of Instagram users go on the platform to find new products.
61% of brands are planning to increase their advertising budget for Instagram in 2021.
The Stories feature receives more than 500 million users daily.
Understanding some of the stats and researching how the app runs and operates can be critical knowledge to have when you have an active user as your subject. Keep in mind the main demographic (aged between 25-34). That doesn’t mean others don’t enjoy using the platform, it just means that most users fall into that category.
As with any social platform, understanding research techniques are vital to any investigation.
Instagram Research Tools for Investigations
If you have ever taken an OSINT course of any kind, you will find that tips for investigation on many social platforms are scarce. Mainly that is because of how the platforms are designed to work and how frequently they change. It is hard to keep up with. There are some tried and true ways to attempt to find the information you are looking for.
Six Instagram Research Tips
Most Instagram accounts use both a user name and a vanity name. Users can change this at any time and they can put anything they want to.
It is best to log on to the site for searching. You may want to create a burner profile for this purpose.
You can choose to search inside the platform or take advantage of searching techniques in a search engine.
An Instagram user can see who viewed their “Stories”. A “Story” is different than a post. Instagram stories are a type of slide show of different photos that are 15 seconds in length in total. Instagram Stories is similar to Snapchat allowing you to post a story to your account for 24 hours before it disappears. If your Instagram account is set to private, then only the approved followers can see your story. If your Instagram account is set to public, then your followers can see your story from Feed and anyone can see it from your profile
Don’t forget to search for #- This is often overlooked but can be very helpful in filtering relevant posts.
Once You Find It- Preserve It!
You can see by reading some of the basic tips above that it is very important to preserve a post once you find it. If you think it will be critical to your case, capture it and even download the original post. This basic step may be all you need. However, if you think this case may go to court be sure to authenticate the post using preservation that includes identifying information (meta data, capture date, etc.)
Last year at this time we posted a blog titled, “Leave No Stone Unturned in OSINT”. Keeping up to date on key elements of a social platform allows you to be sure you are searching using every possible tool known at the time. This way, you can search anonymously and gather good intel on your subject at the same time.
Instagram is one of the most popular photo sharing apps to date. Allowing users to take selfies, discover new filters, talk about themselves, and so much more. Poparazzi flips the script of Instagram and allows users to ONLY share photos of their friends. No selfies allowed! Poparrazzi intentionally takes away the front-facing camera feature so users can only capture photos of their friends and tag them. Poparazzi simply put, mimics a Paparazzi shot.
“We built Poparazzi to take away the pressure to be perfect,” the company wrote in a Medium post announcing it’s launch. “We did this by not allowing you to post photos of yourself, putting the emphasis where it should’ve been all along: on the people you’re with. On Popparazzi, you are your friend’s paparazzi, and they are yours.”
Why So Popular?
In a selfie crazed culture, why is taking pictures of friends all the hype? Believe it or not, there’s been a significant demand for a less performative social platform- mainly among young users. Gen Z is becoming known for their actions, taking the focus off of oneself, statements, or promises made online. They are a leading the way as one of the most impact driven generations to date. Focusing on others over oneself.
According to a recent USA Today article, Youth interest in civic engagement is soaring among the generation that the global volunteering nonprofit Points of Light says was already the most active in history. More than half (53%) of Generation Z individuals said they wanted to get more involved in their communities post-COVID, which was higher than any other generation, according to a 2020 Points of Light survey. (Gen Z includes those born beginning in 1997, so they’re 24 and younger.)
There are several other startups that listened to the voice of young users, like Gen Z, and created similar apps like Poparazzi. These include Minutiae, Vero, Dayflash, Oggl, Dispo, and Herd.
How To Use Poparazzi
One you download and launch the app, a video advertisement is shown, “Your friends are your paparazzi, and you are theirs.” Several photos are shown of teens together with their friends, at parties, football games, in college, and hanging out in groups. After you press “Get Started” permissions are asked since Poparazzi is a photo sharing app. You must allow Poparazzi to access your camera, contacts, and notifications to begin. It then asks you for your age, phone number, name, the username you want to use. Anyone from your contacts that has the app is then shown, inviting you to start following people. Once you have created your account the app takes you to the home screen, motioning you to take your first “pop” which references taking your first picture. Other buttons include search, activity, and your profile.
Mobicip explains, “The most important feature of Poparazzi is that is does not allow users to crop, add captions, filters or any edits to the photos taken. People may be tagged on photos, but they must be on your follow list for the tagged photos to appear in your account. The app automatically follows everyone in the phone book of the phone into which it is downloaded. A “pop” score is given to each profile depending on the number of photos taken. Users also have the option of deleting and untagging pictures they do not want on their profile. Other users may be blocked to prevent “popping” pictures of them and prevent them from tagging your name.”
Other current features are the ability to share a public pop to Snapchat, Instagram Photos, and Instagram Stories.
Searching Poparazzi
Using the small magnifying glass icon on the bottom of the app allows anyone to search through the platform. “Featured Pops” (public pictures taken) flood the screen of young user photos. Some in high school, others in college. These are all public profiles of people, just like you would potentially see on Instagram or TikTok when searching. You can publicly search usernames through the app or follow anyone who has a public account. For investigative purposes, this is another app that is worth downloading, learning, and understanding. Especially if you have any cases with individuals 24 years old or younger. You can easily search for anyone in your contacts, but also usernames, and names of individuals. Remember although others are taking photos of someone, those photos are then tagged and shown on that individual’s profile.
The Dangers
There are several dangers to the platform, like there are with any social media app available. Immediately as I searched the profile, I came across photos of a student pretending to cut another students head off with a real axe in a classroom setting. The next set of photos shown was of a car crash involving two teenage girls. Another of a girl using the restroom in a bathroom stall. Her friend popped over the top of the stall and took her picture. My initial thought when scrolling through? There is a huge lack of privacy within this app but for others who could maliciously post photos of other people.
There are several articles sounding the alarm to the dangers of this app. One interviewing Dr. Pamela Wisniewski, a professor at the University of Florida, who studies the impacts social media has on people.
“Somebody’s going around taking pictures and sharing it of them without their consent,” said Wisniewski. “While there could be some fun and beneficial ways to use an app like this, as you can imagine, there’s also some ways to use it in malicious ways that can actually harm people’s reputation, share embarrassing or potentially harmful material about somebody that then is on the internet to stay.”
Wisniewski adds that it could be tough for parents to take down photos that they do not want posted of their kids. “Being able to wrangle in that content especially once it’s been shared is almost impossible to do,” she said.
Social Media companies are still being challenged for not doing enough when it comes to selling drugs on their platforms. Snap Chat, Instagram, Tik Tok and others have been sited for not doing enough to curb illegal drug sales on their sites. Parents, in particular, are passionate about this issue. With the rise of Fentanyl, the online sales of fake pills that include the synthetic opioid is staggering. The dealers use social media to advertise to young people. So even if a young person isn’t interested in mining social media for a drug of choice, the dealers come to them.
The Drug Enforcement Administration (DEA) issued a warning back in September 2021, warning about the increase. Anne Milgram, the DEA Administrator, called out two apps that were very popular with teens and young adults: Snapchat and TikTok. She was quoted in the Washington Post that they were not doing enough to combat sales. But will the request go unnoticed?
This has been occurring for years on several social platforms. Many of the platform executives have said they are doing all they can on their end. Companies have hired extra moderators, using artificial – intelligence algorithms to flag unwanted posts. To date it continues to be an issue as many young people are dying from this type of drug.
The Advertising of Illegal Drugs to teens and young adults.
The Organization for Social Media Safety, ran an informal test and found they were able to connect with drug dealers on multiple social media sites in under three minutes.
Volteface commissioned Survation in January 2019 to conduct a nationally representative poll of 2,006, 16 to 24 year olds. The research was conducted on Facebook, Instagram and Snapchat. Fake profiles were set up and researchers did not communicate with any social media users. Key findings were as followed:
One in four young people (24%) reported they see illicit drugs advertised for sale on social media.
Of those who reported seeing illicit drugs for sale on social media:
56% saw drugs being advertised on Snapchat, 55% on Instagram and 47% on Facebook.
63% saw Cannabis being advertised – making it the most seen drug advertised for sale. Cocaine was the second drug most seen advertised (26%), followed by MDMA/Ecstasy (24%), Xanax (20%), Nitrous Oxide (17%) and Codeine/Lean (16%).
Encryption and VPN technology makes it difficult to trace dealers. There is also a lack of information sharing between police and social media platforms. All of this makes it very hard to get this off social media.
Searching for Drugs Online: (American Addiction Centers: Drug Abuse.com )
Think it is hard to find illegal drugs in social media? You might be very surprised to discover that people are selling drugs in the most blatant fashion. In fact, even their user names make it obvious! With user names like “ihavedrugs4sale”, and drug-riddled posts/pictures, the dealers make it quite obvious. The study revealed that the most popular items included marijuana, prescription drugs, painkillers, xanax, molly (mdma) and lean (codeine syrup mixture). Example below of items found in social media:
This year a Santa Monica teen, named Sammy Berman Chapman asked his dad for a cheeseburger and went to his bedroom. An hour later his mother found him dead on the floor.
Sammy was killed by a Xanax pill laced with fentanyl, which is a synthetic opioid 50 times as powerful as heroin. The culprit: a drug dealer on Snapchat and, from the parents’ perspective, the company Snap itself, which they said was not doing enough to protect young users like Sammy. They went to the company for answers on how this could happen. Snapchat’s rep stated:
“Continuing to significantly improve our operational work to eradicate drug dealers from Snapchat, along with raising awareness of the dangers of fentanyl and other illicit drugs, will be a long term effort for us — we will keep working to do better and help keep our community safe,” said a Snapchat spokesperson.
It is an uphill battle, but one that is worth fighting for.
Gabby Petito, a young and beautiful Social Media Influencer, went on one travel adventure after another with fiancé Brian Laundrie. And thens suddenly, it all took a very dark turn. With Gabby Petito’s potential remains being recently identified in Wyoming, and fiancé Brian Laundrie still missing, this case has captivated the hearts of many across the country.
Questions as to why this happened to her and if it all could have been prevented are on the minds of many. If you search #gabbypetito through TikTok right now you will find more than 480 million people have viewed the videos associated with the hashtag. From TikTok influencers, to witnesses, real time video footage is being posted piecing together the evidence.
How TikTok Helped
Taking a closer look at the videos associated with #gabbypetito, I stumbled upon Miranda Baker’s TikTok channel, a key witness associated with the investigation. Miranda and her boyfriend picked up Brian Laundrie who was hitchhiking around the time of Gabby’s disappearance. She gave a statement to the FBI but afterwards documented her interactions with Brian through her TikTok account. Every video she posted goes into details about Brian, their location, and interaction. Every video has gone viral.
Another video created by Alyssa Rose, shows a YouTube video the couple had posted on one of their adventures. She pauses the YouTube video at marker 6:40, to focus in on a book that Brain Laundrie was reading in a hammock. As she zooms in, she discusses the book he was reading which is “The Annihilation”. This book is about groups of people exploring uncharted terrain that go missing. This particular book series follows four women.
A third video was from Riley Lively, a mom living in New Orleans. She took to her TikTok account and stated in the post, “Putting some of my investigation skills to good use!” In this video she discusses how through sleuthing through an app called “All Trails” she found Gabby Petito’s public account. This app allows you to search and follow other individuals and their hiking trails from around the world. Through this account Riley discovered all of the trails Gabby had saved. She begins to show the lists that Gabby had saved in her account. Many of these hiking trails saved could have been potential spots of where was had gone missing.
Critical Thinking
In OSINT we are taught about the techniques behind finding key pieces of data or evidence that is online. What isn’t always taught? How to apply critical thinking online. Growing your critical thinking skills is just as important in finding key information. Each one of these women took to TikTok and applied their critical thinking skills, piecing together social media content to an ongoing investigation.
The Takeaway
Each of the viral videos above teach us all something valuable! Culture, personality, details, and analysis. Miranda met with the FBI and provided a statement. She also was continuously working with the FBI while creating her video content. My mind immediately goes to the details she is discussing in each post, how she is processing what she witnessed in each video, and what are others saying about the content she is posting in the comments. Are there any additional witnesses there? Any other clues?
Alyssa Rose shared Gabby Petito’s Youtube video. Someone could have easily watched that video and not notice Brian in the hammock reading a book. She took the time to analyze a video that could have easily gone over the heads of many. The online personality of your subject matters. This is a great example of a small piece of information, showing us an insight to Brian Laundrie and his interest.
Riley Liley pieced together Gabby being an influencer, possibly having an account with the ever popular All Trails App and was right. She then was able to view Gabby’s public online account trail lists.
Leave no stone unturned. Think about their interests. If they have a large social media presence, there’s a chance they have apps they are tied to involving their interests.
When we think of social media research, or social media listening, culture is not something that immediately comes to mind. It is only when we begin to dig deeper and identify what our search parameters are, that we begin to understand the role culture plays. TikTok is a culture phenomenon that continues to evolve. It took on an entirely new form over the past two weeks with this case and will continue to do so.
Facial recognition is something that you may want to zero in on before you begin any type of reverse image searching. If you just want to see if the photo itself is being used anywhere else online, then leaving the photo as is works well. However, what if you have a photo of a person but can’t identify the person? In that case, you may want to search a bit differently.
Google Reverse Image Search
Google doesn’t really focus all that much on the facial recognition aspect of a photo. Instead, it is geared more to searching content. That means it takes into consideration what the photo is about. Is it a photo of a person eating at a restaurant? You may get a large number of results showing you a photo of a person who looks similar, eating at a restaurant.
It doesn’t focus as much on the facial recognition aspect.
One work around to this is to crop your photo before searching through Google Image. Take out all the background and just focus on the face of the person if possible.
Yandex
Yandex’s image search is far superior for facial recognition. I highly recommend using it. Take a look at the difference between searches. I use a standard head shot in all my marketing online. It should come up in a Google reverse image search without any problem. However, it doesn’t.
Look at how much more you information you get from Yandex than from a basic Google Image Search. While there are photo selections offered to the right, Yandex allows you to further crop an area of the photo. This allows you to try the search in more than one way.
Notice also how it offers you sites containing information about where the image is online. It highlights several sites where this exact photo is being used.
Tin Eye
Tin Eye is used all the time in investigations. For this particular exercise, it did not fair as well as the others, however. The result I received from a basic search was a website that is not even up and running anymore.
Back in May, we posted about Venmo, the app powered by PayPal that allows users to easily send and receive money. What surprises many people, is how public the app is. To date, you can find just about anyone on the app. Not only can you find their profile, if it is set to public, you can see who they are sending money to and sometimes why.
How Venmo Works
This person-to-person app allows you to easily send or receive money from friends, family, or co-workers. Simply click on the “Pay or Request” button, type in your friend’s email, phone number, or username. You can also scan a QR code from the app if your friend is nearby. Venmo is also free when you link your bank account to the app.
It recently drew a lot of attention when someone noticed several members of the Biden family on the app. It brought attention to the security of the app to everyone.
eMarketer.com published a recent article outlining the changes. “PayPal-owned Venmo will introduce new fees and updates to its platform that’ll give users more control over their accounts and add an extra layer of protection for some transactions, per Android Police.”
Privacy Changes for Users
“Privacy and security updates: Users can now change the visibility of their friends list to public, private, or friends. They can also opt out of being seen on other users’ friends lists. And effective July 20, Venmo will expand eligibility for the Purchase Protection Program for transactions sent to business accounts and all payments marked for goods and services by the sender.”
eMarketer.com
It gives the user back the power in terms of who they want to view their information. Some people may view the app as secure since it is a go between your bank account and your venmo account.
Venmo & Social Media
The Washington Post recently published an article about how one user used Venmo to collect money from strangers. Think of a “Go Fund Me” Venmo style. Here are some unique stories of how people use Venmo for crowdfunding:
When Kori Roy was heading out on the final leg of a road trip to celebrate her wife’s 29th birthday in April, she decided to add a message to the rear window of her Hyundai: “Help us get to New Orleans!” she wrote, adding her Venmo and Cash App accounts.
TikTok and Venmo have been a match made in heaven. Many TikTok users were using Venmo as a source to fuel their road trips. People have been using the app to ask for money for all kinds of things. The image below is an example.
Anytime money is being exchanged, one needs to be cautious. It seems for now anyway, there is a level of trust people have with Venmo. Maybe because it is a PayPal app and PayPal seems more secure to most people.
However, there are scams to be aware of. Unlike credit or debit cards, once money has left your account it is gone for good. it is almost impossible to recoup the loss should you send money to a scammer.
By now most of us in the OSINT field have gotten used to social media updates. Remember Facebook Graph (RIP)? I remember when we would use it and think about what would happen if they took it away. Then, one day, it was eliminated. We were horrified, and wondered how we would live without it. We all have lived without it of course, and we are probably better for it. It has forced us all to think more about the “how to” rather than relying on any one software platform, app, or tool.
What’s Around the Corner?
Well the big tech giants are at it again. Let’s start with one that I think will be a game changer. Twitter is working on new controls on who can @mention you on the platform. Last August they put the control back in the user’s hand. The latest in the news of social media updates.
“Here’s how it works. Before you Tweet, choose who can reply with three options: 1) everyone (standard Twitter, and the default setting), 2) only people you follow, or 3) only people you mention. Tweets with the latter two settings will be labeled and the reply icon will be grayed out for people who can’t reply. People who can’t reply will still be able to view, Retweet, Retweet with Comment, share, and like these Tweets.”
This can be quite limiting in OSINT work if the user realizes they have this option. The key phrase is that “everyone” is the standard Twitter default setting. To me, it kind of negates the entire reason for being on the platform. To so many users, this is a platform to not only shout out your opinions, but to also get noticed for those opinions!
In addition, Twitter’s also looking to add a new notification for when you’re mentioned by somebody who you don’t follow. This is going to be a huge game changer for all those Social Media Influencers and marketers out there. Tagging can be a great way to get in front of the right brand or person to get noticed.
Social Media Update #2: Facebook Tests Pubic Comments in Stories
Source: Ideahuntr
As you can see in this example, posted by @ohitsmerenz (and shared by Matt Navarra), Facebook appears to be testing a new option which would display Stories replies on the Story frame itself, adding a whole new way to engage with Stories content. It would be a new way for people to engage with stories. Will it be discoverable during online searches? That remains to be seen. It is also in the very early stages, so we shall see.
Tip: Remember if you view someone’s stories you will be identified. Something to remember when searching online.
Check back and we will be sure to watch for updates on this!
By now we have all been schooled on what we shouldn’t post publicly in social media and why. In fact, you can read all over the internet why it is not a good idea to post your COVID vaccination card. It is also not a good idea to post about vacation plans.
When it comes to insurance fraud, a claimant’s social media posts plays an important role in any investigation. When someone is trying to claim an injury when there isn’t one, they need to lock down. You would think that the fraudster would be careful when they post publicly in social media. This is not always the case. In fact, recently we performed a deep web scan on a person suspected of insurance fraud. This was a workman’s comp case. A friend of the person actually cautioned him about a post he had recently added. She came right out and told him to be careful what he was posting. He answered her post by saying, “I not. I know how this works.” The original post was deleted, so we never knew what he posted to make her say that. It was suspicious however, that he left this exchange up on his profile page. In other words, he knew he might be watched in social media.
“Checking social media accounts has become one of the first things an insurance company or adjuster will do when you file a claim,” says Frank Darras an attorney from California who specializes in law suits against insurance companies.
Source:Auto Insurance Quote
What to Look For in Social Media
When we conduct a deep web scan, we start with the data points that we know to be true on an individual. Name, address, date of birth, employer, address and email addresses. They are all critical pieces of information because each one may hold an attachment to something online about our person of interest. It is also important in authentication. We need to be certain we have the right person.
Some tips we have learned along the way that may be of help to you include the following:
Check for multiple profiles. You just found your person of interest’s Facebook profile and you think you are done there. Not always so. Many people have secondary profiles. They may have set them up, forgot about them or they use each one for different things. Believe it or not, you may discover them by looking through their friends list. This is especially true in Facebook.
Tell a Story: Across all social media platforms, it is important to check the dates of posts. When you put them altogether, they can tell a story of a person’s activity. Just by combing through this information, you may find an inconsistency in their story or claim. Perhaps they are claiming to have taken a fall at work. Yet, a social media post may show them complaining about back pain days prior. Connecting the dots doesn’t mean they are automatically guilty, but can mean that a deeper investigation is needed, just to be sure.
Proof of legally attained social media posts: That is where meta data comes into play. If you find something in a person’s social media profile, you are going to want to extract that post and gather the intelligence behind it. Remember, screenshots can easily be altered.
Video is the Golden Child
Instagram, TikTok, YouTube are all examples of social media known for their videos. People post videos of all kinds of things there. Searching these platforms can be very lucrative because of it. Just remember, if you do find something important there, you will want to not only obtain the meta data, but extract the actual video to keep as evidence that is admissible in court.
Keep in mind that we can extract videos and photos as well as capture the meta data from the post. Timing is everything however, and what is here today can be gone tomorrow.
You just enjoyed a nice dinner out with a few friends and are ready to pay. You reach in and notice you forgot your credit card. Your friend pays for dinner, but instead of waiting to pay him back you easily whip out your phone, head to your Venmo app, and send your friend money with ease.
What is Venmo?
Venmo is an app that is owned by PayPal with over 52 million users, as of 2020. This person-to-person app allows you to easily send or receive money from friends, family, or co-workers. Simply click on the “Pay or Request” button, type in your friend’s email, phone number, or username. You can also scan a QR code from the app if your friend is nearby. Venmo is also free when you link your bank account to the app. What is not to love? This app has some incredible advantages and unfortunately a few disadvantages…
Privacy Entanglements
Venmo requires you to write out or choose an emoji to describe your payment before you can submit it. While this is a clever way to keep track of your payments, there are significant privacy concerns involved.
Transactions you make are viewable on a public feed unless you change the settings to make them visible to just the party involved or only to your friends.
The amount of money sent or received is never public, but there is a text, emoji, and time stamp visible on all transactions.
Publicly viewed transactions are shared with third parties. Venmo’s privacy policy states that is shares user data “for everyday business purposes, for marketing purposes, for joint marketing with other companies.”
Not only is privacy an issue when it comes to third party sharing but what about all the “other” individuals out there, including your friends, that can see who you are paying and what you are doing?
The Dark Side of Venmo
From stalking, identifying cheaters, even buying or selling of drugs, it has all been seen and reported on over the years. One of the most alarming stories that has hit mainstream media recently is one of a national security risk. Buzzfeed News identified Joe Biden’s Venmo account, and sadly enough it was public. Once they identified that the account was truly our President’s, they quickly notified The White House.
“On Friday, following a passing mention in the New York Times that the President had sent his grandchildren money on Venmo, BuzzFeed News searched for the president’s account using only a combination of the app’s built-in search tool and publicfriends feature.
In the process, BuzzFeed News found nearly a dozen Biden family members and mapped out a social web that encompasses not only the first family, but a wide network of people around them, including the president’s children, grandchildren, senior White House officials, and all of their contacts on Venmo.” -Buzzfeed News
After this story was published, a Venmo spokesperson told BuzzFeed News: “The safety and privacy of all Venmo users and their information is always a top priority, and we take this responsibility very seriously. Customers always have the ability to make their transactions private and determine their own privacy settings in the app. We’re consistently evolving and strengthening the privacy measures for all Venmo users to continue to provide a safe, secure place to send and spend money.”
From celebrities being stalked through Venmo, and now our President’s private information being so very public by default, will the lines of privacy forever be tangled with Venmo? Time will tell.
I think it is safe to say that most of us have seen successful dating stories in commercials, heard from friends, and seen the benefits of quickly weeding out the frogs to find the ideal partner. Whether it is a paid service to do the hard work for us or the assistance of an easy meet-up through a swipe left or right, dating apps are becoming more prominent in the dating game.
Some of the most popular dating sites are match.com, e-harmony, plenty of fish, and dating applications such as Tinder and Grindr. To sign up for these services, all you need is a little time to fill out a questionnaire or just a working phone or email, depending on which service you decide to use. Accessibility makes these so popular, yet people with ill intentions can also misuse their accessibility. Dating apps and services have become more accessible for predators to find and prey on victims. Dates through dating apps have led to sexual abuse and predatory behaviors resulting in harm to users, yet these stories do not necessarily see the light as often as the success stories we see on commercials.
How safe are dating sites?
Unfortunately, dating sites are not as safe as we think they are. USA Today reports 37% of online dating users describe being contacted by a user or a match they have rejected on a dating site. These users also reported 35% had received unsolicited explicit photos and almost 30% have been called vulgar names, and 10% have been threatened by another user.
Dating sites are designed to facilitate dating; unfortunately, dating sites can do little to corroborate the information shared by users. This is where section 230 comes into relevance. To protect these sites Section 230 of the Communications Decency Act states, “No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider. To the consumer, this means the dating site operating and matching clients is not responsible for any information or content shared on the users dating profile. There are exceptions, but false information used by the consumer will not affect the dating site in most legal matters.
The Case of John Meehan
One case that garnered national attention was the case of John Meehan. As many of us know now, John had a previous record for evading arrest and stealing drugs in a hospital he was serving as a nurse. As a result of this, John served several years in prison and lost his nursing license. Once released from jail, John began seeing a woman in California, he introduced himself as an anesthesiologist, and they began dating. After some time dating this woman, John tried to get her to transfer money to his account, the woman broke off their relationship, and then the real John came out. John began to threaten and intimidate her. Authorities issued a restraining order for her protection; John ended violating the restraining order and found himself back in prison.
After his release, John then began to use dating sites, and this is where he met Debra Newell; John said he was an anesthesiologist and volunteered overseas. John and Debra started to date and, over time, got married. At this time, Debra’s family became suspicious and began to investigate John. Her family found his previous criminal record, to which Deborah was not aware. Debra also found information on women who had dated John and shared their experiences with him. Debra separated from John but did get back together with him. John stalked Debra and her family to the point of attempting against Debra’s daughter’s life. With his extensive criminal record showing his tendency to become obsessive and threaten women, and his extensive dating history documented on the internet, John should not have been allowed on a dating website. John could find easy prey and use his knowledge to coerce women into dating him, steal from, and take advantage of them.
What can I do to stay safe on the internet?
There are many ways to stay safe on the internet; these will essentially require safety measures to be implemented.
Use a website you have researched and are comfortable using. It is imperative to know the safety policies the website has in place and how these are set to protect you.
Take the investigative process into your hands, investigate the people you share information with on the internet. Our eChatter Social Media and Deep Searches are designed to analyze and assemble a profile on a subject through extensive OSINT techniques compiled by one of our analysts. These reports can discover an array of information, including criminal records, public social media profiles, or digital footprint. This can be significant information to obtain, especially while dating online.
Do not share immediate personal information; get to know suitors through facetime or chat before any personal information is shared or an in-person meeting is set up.
If a meeting is set, let others know where the meeting or date will take place and share as much information with someone you trust for your safety. Try to meet in a public location and always be aware of your surroundings.
See if your dating site or app will offer a background check. Match Group, for example, has begun to implement this into their apps and sites.
Dating, in general, can be intimidating, and interactions on the internet can go sour, report any user violating the dating website’s user policy, and be sure to follow up on this process.
Who do I speak to if I suspect a user is violating the terms of usage of the website?
You can speak to the user and express your feelings; not all interactions are aggressive, which could help the situation.
If the user is aggressive or offensive in their behavior or you do not want to reach out to the user, you can report their profile to the dating site or block this user from contacting you.
If the interaction has left the dating site, the next step is to contact the authorities and see what they can do to help. Document interactions with this subject and do not let your guard down.
Dating does not have to be an intimidating task; many users have found meaningful relationships using these sites. Stay safe, do your homework, and if in doubt, take a closer look at your date; you will never know what you can find.
Since COVID-19 we have seen an immeasurable social media shift with so many people across the globe staying home. This has drastically impacted ecommerce and their shopping in general. Due to these changes, spending and investing in apps has significantly increased.
According to AppAnnie,“Global spend on apps surged by 40% in a year, with $32 billion spent on in-app purchases across iOS and Google Play globally in Q1 2021. It’s the biggest quarter since records began – and the figure is 40% up on the same quarter for 2020.”
This trend will continue, adapting to consumer behaviors within the market. So, what does this mean for you as an investigator? You are going to want to stay up to date on apps that are beginning to trend and the shift in consumer behavior will be a good cross reference for this.
So, what are some apps that are taking off you ask? Let’s unpack the significance of a few of them.
Clubhouse & It’s New Rival, Live Audio Rooms
While TikTok still reigns supreme in top downloadable apps, Clubhouse is taking the world by storm with over 6 million active users to date. At first, this unique platform was being used by developers in Silicon Valley, then inevitably hit mainstream. Clubhouse is an audio-based concept with no video or text present. Someone can host a chat in a room with a few individuals to thousands of people. The catch? You must be invited by someone to join in all the Clubhouse fun. Currently, you can sign up on a wait list for Clubhouse access. Exclusivity is playing a big part in all the hype over this app. So much so that Mark Zuckerberg has decided to compete.
Live Audio Rooms is launching this summer and Mark Zuckerberg’s company announced products that will have an emphasis on voice content over images, video, and texts. This will start off with only a few individuals allowed in, another example of exclusivity, and then will release to everyone a few months after. Eventually this summer we should see this open to the public and through Messenger.
The Competition Gets Even More Real
If you thought Mark Zuckerberg was just feeling competitive by adding Live Audio Rooms, think again. He is not only taking on this endeavor but a few other apps that have the same audio-chat feature. Creating audio suites is what he believes is the future of virtual networking.
“We think that audio is […] going to be a first-class medium and there are all these difference products to be built across the whole spectrum,” Zuckerberg in an audio interview with tech journalist Casey Newton on Discord.
What’s Coming
Soundbites:
A social audio app that’s entire emphasis is on adding tone to a quote, poem, or joke that you have posted. Writing something out is not enough when it comes to communicating online. Soundbites was created because you can miss sarcasm and inflection just by writing something. Being able to add your tone and voice allows the reader to understand you fully.
Facebook Podcasts:
According to Facebook’s post, more than 170 million Facebook users already follow and interact with podcast pages and groups on the platform. Therefore, there is no denying an investment into a more streamline podcast interaction is in Facebook’s future. They are working on allowing podcasts to be streamed directly from their platform. Allowing users to not only listen to their favorite podcast more easily, but to also like, engage, and comment with podcast creators.
Hotline:
Although considered another competitor to Clubhouse this app is slightly different. Also, slightly different than Live Audio Rooms. Hotline is aimed at “knowledge experts”, according to a Facebook spokeswoman. Experts in their field such as healthcare, or finance. Users will be able to engage and chat with these specialists. Hosting an event through Hotline can be recorded and currently there is not an audience size limit. More development is in progress with this app. As to how hosts would make money off this has yet to be determined.
Audio Creation:
Facebook is even more inventive with new concepts like voice morphing technologies, noise cancellation features, and speech-to-text concepts that will allow users to build upon their creativity when posting text. According to laptopmag.com, if you are on a busy street corner recording yourself, a noise cancellation feature will allow you to come across clearly to your audience and cancel that background noise for you.
Sound Collection:
This is a collection of sound effects and song clips that a user can scroll through that will take their content to the next level. Allowing users to layer their content with new features is the goal of this new concept.
Is There an End in Sight?
Unfortunately, the answer to this is no, but the good news is we are here to stay up on all these changes for you. With our research background, it is in our nature to constantly be on the lookout for what is up and coming. To test out and find new OSINT skills to tackle these new technology advances. Sign up for your Newsletter for all the exclusive details.
Digital evidence has become more and more relevant for most civil and criminal investigations. Developing your OSINT skills is ongoing and understanding where it is all headed is just as important. It is an ever changing area, with new social media platforms sprouting up all the time.
When conducting online research on a person of interest for your investigation, it is important to develop a solid strategy. Once you begin gathering information, a clear chain of custody must be obtained with anything you find online. Additionally, authentication of social media posts or profiles are becoming more and more important to a case.
“We need all videos extracted and the subject’s social media profile captured and preserved.”
Recent client request
We are getting more and more requests like this every week. When a suspect or person of interest gets legal council, they may be advised to delete all their social media. That is why time is so important and it is becoming more important to start with online investigations before you do anything else. Many attorneys and PI’s have learned the hard way that what is here today, may be gone tomorrow. Understanding the differences in digital evidence can set your Private Investigation firm apart from the others.
The purpose of this blog post it to explain some of the differences in the capture of online evidence.
Screenshot Digital Evidence
Most of the time your OSINT discovery process is centered around a specific strategy and focus. The gathering of online information, its chain of custody, and your final report can and should contain screenshots and corresponding URLS. However, what if the Instagram post or video is just the digital evidence you were looking for? What if you know your attorney client is going to need this in the deposition, civil or even criminal case? It is times like this where a screenshot is not enough. Taking that extra step can be very valuable.
Social Media posts may not only be deleted or turned off, but they can also be edited. The post you see today may not be the same post you saw during your online investigation. Unless you have preserved the original post, you may not be ale to prove what was originally said.
For social media and web page evidence to be valid and accepted according to the Federal Rules of Evidence:
Original source code of the social media message, blog or webpage must be collected
Metadata must be collected
Digital signatures and timestamps must be placed on the data to provide evidence of data integrity & authenticity
Data should be prepared in EDRM-XML for easy processing & analysis in eDiscovery systems
Preserving the Digital Evidence
*Establishing a valid chain of custody means being able to show where the evidence has been, who has handled, and its condition at all times, in order to establish that there has been no alteration or tampering of the evidence prior to the time it is presented to the court. With respect to web pages and social media accounts, then, this means that the party propounding the evidence must establish:
When the record was originally produced;
That the record is an accurate recording of the webpage in question;
That the record was not subject to alteration from the time it was collected until the time it is presented in court.
Using the correct tool instantly generates a forensic report using a forensic SHA256 hash, and HTML source code. It means that your online preservations contain key identifying Metadata such as the timestamp, the URL, the IP address, the date, and the time of capture, using a certified Stratum-1 atomic clock in compliance with the eSign Act.
As a result, you can capture the evidence you need at the moment you need it, with the assurance that when you do, you are collecting evidence which contains the necessary hallmarks of authenticity that courts are increasingly seeking.
(*Web Preserver), This is the software we use at eChatter when we need to preserve digital evidence for our clients.
Web Scrapping
Can a website be scrapped or archived? Yes and It may surprise you to know just how often it is used. Web archiving tends to concentrate more on the look and feel of a website or profile. The Wayback Machine (a.k.a. archive.org), is designed for web archiving. They explain their company this way, “The Internet Archive, a 501(c)(3) non-profit, is building a digital library of Internet sites and other cultural artifacts in digital form.” It is like an online library of websites. ( As an aside, it is also a great way to check if a person of interest worked for a certain business years ago, as they may have been featured on the website).
Web scrapping is more focused on textual data. The most crucial step for initiating a web scraping project is to select a tool to fit your research needs. There a tons of them out there to choose from. It is important to remember that the collection of data, while publicly available, is still a collection produced by others. Depending on the case, be aware of the potential privacy and security implications and proceed with caution.
Web scrapping can be used for price monitoring, lead generation, marketing and research. The complexity of many websites makes it difficult to scrape data unless you know code. Software applications make this task easy for anyone and is not dependent on skills.
photo by: Octoparse.com
Example of a Preserved Post
The post below is a great example of what is captured during the preservation of a post. The key components are the URL, Timestamp (when the post was discovered), Hash, and Signature.
An entire profile of a person of interest can be over 100 pages and is captured in PDF report format.
By: Kathy Doering.
Kathy is President of eChatter, and is McAfee certified in OSINT and is a certified Social Media Intelligence Analyst (SMIA). Kathy also serves as president of The Global Social Media Research Association.
You are seated at your desk in the quiet of the morning, taking a sip of coffee, scrolling through your emails before the day begins. Suddenly, an email pops up with the subject line, “This isn’t good…” Your heart drops into the pit of your stomach yet quickly you click to open in hopes it isn’t anything too terribly bad. Your colleague has sent you a link to a public Facebook post with an employee speaking derogatorily towards your organization. To make matters worse, the post has gone viral. Sitting back into your chair, you have a thought trace through your head.
“Can I fire an employee for this?”
Your mind races and heads down that unforeseen rabbit hole with the next question.
“What are other employees potentially saying online about us?”
“What does our Social Media Policy state again? Do we even have a policy in place???”
“How will we be perceived by our customers after this viral post.”
“Is all of this even legal?”
To quickly answer a few of these questions upfront, yes, you can fire an employee for this, and it is legal.
Here is why:
According to Attorney Sidney L. Gold, not only do employers have the right to check the social media accounts of prospective and current employees, they also have the right to discipline or even fire a worker whose social media activity violates company policy.
This is all in accordance with state-by-state guidelines and your company or social media policy.
Social Media Policy
Oftentimes a social media policy is completely forgotten about until a PR disaster occurs. Pausing to protect your organization from such occurrences will allow future situations to quickly fizzle out. Creating a strong social media policy is essential. Openly discussing with your employees upfront will set expectations and provide everyone with the knowledge to succeed.
According to Digital Information World, about 51 percent of businesses have a social media policy, however, a certain percent of the employees of such offices, still find social media as a distraction during their work. These seem like small statistics in terms of hours utilized but unfortunately for you, social media adds up to $6,422.50 lost in a year in the United States for one hour each day.
Social media will never stay the same and more than ever, even to sell, social media is being used by employees to gain new leads. It will always evolve and become something different over time. Revisiting your strategy will become essential in maintaining a strong policy. Sprout Social provides some excellent ideas to help you maintain the health of your policy.
Fired for Posting
We see this all the time. Police officers, nurses, executives, actors, restaurant staff, and many more. No industry is left untouched when it comes to social media.
In our past blog, Fired for Posting on Social Media, Kathy discussed howone hospital in Wiltshire, England, didn’t share the sense of humor displayed by its employees when they took a few seconds out of their workday to lie down in strange places around their workplace, tagging it “The Lying Down on the Job Game.” When a few hospital employees decided to play along, they posted pictures of themselves lying around the hospital on the floor or even on the helipad. The higher ups decided if they had that much time on their hands, why not have more? They were all fired.
So, what can you do in your organization to avoid a PR catastrophe? There are few services offered that can easily eliminate your employee social media paint points.
3 Prevention Methods
Pre-Employment Screening A social media hiring report is a great addition to a normal background check. Stay safe, compliant, and protected by hiring a third party to assist. FCRA compliant, we have trained specialists who obtain accurate, curated results, that are ethical and projected into a sleek and user-friendly report on your behalf.
Our Social Media Hiring Report (background check for employment) takes every factor into consideration to make sure that the clients we work for stay compliant on a federal and state level. We ensure that you never see what you shouldn’t see– the report turns up only relevant content that can be portrayed as negative and a detriment to the person’s employment with your company. When important content is identified, the report will only show those pieces of content. If nothing is found that falls into what can be legally obtained/considered when making hiring decisions, a “no pertinent information found” report is filed, meaning there is nothing of concern regarding the candidate.
Corporate Intelligence Price Waterhouse Cooper (PWC)‘s recent report, “23rdAnnual Global CEO Survey,” reveals that around 80% of CEOs have changed their online behavior due to potential risks. Corporate Espionage is alive and well and needs to be taken seriously as more and more employees overshare in social media. This allows for competitors to gain excellent insight into a vast array of information that would not otherwise be easily obtained. Banning employees from using social media at work has proven to be a nightmare and monitoring their social media internally has major privacy concerns. However, when approached correctly this type of monitoring is very valuable to any business of any size.
What makes this tricky, is that the company still has the responsibility to keep their employees safe, protect assets and data, mitigate risk for threats of fraud and monitoring reputation. High level executives travel to areas of the world that do not share the same security measures we do in the United States. Using geo-tagged software can show threats in areas ahead of time, alerting executives prior to arrival.
Employee Monitoring Have an employee you are suspicious of not following your specific social media policy guidelines? Monitoring an employee for posts that are publicly available is something an employer has the right to do, especially If the employee is posting about work related misconduct, confidential company information or financial information.
Being proactive in enforcing your social media policy is key.
Is the online personality of a person different from their in person personality? I recently watched a documentary on Netflix called, “Crime Scene: The Vanishing at the Cecil Hotel.” The docuseries is about a Canadian college student, Elisa Lam, who was a guest of the hotel in 2013. She disappeared and was missing for a period of time around some very unusual circumstances. I won’t tell you anymore, in case you want to watch it.
Her Tumblr account was an open book. Tumblr is a social media platform that was very popular during this time frame. Elisa Lam used it like a diary and in the documentary it is explained in detail what was obtained from the scrubbing of that open source information (OSINT). Her personality came through loud and clear through analyzing her social media posts.
Online Personality
When it comes to pulling online activity from social media, blogs, forums, etc. on your person of interest, personality plays an important role. Everyone in the investigation’s field knows that a person who is narcissistic for example, will provide you with a treasure of information online. In some cases, perhaps even more than you might need.
But what about all those people in between? People approach social media differently and there are many factors to be considered.
Two Major Personality Differences
One would think that an introvert would be non-social but that is not necessarily true. Consider some actors or comedians. Most seem like extraverts by the way they conduct themselves publicly. However, when interviewed, many of them say they are more introverted.
What are some common traits of Introverts?
Introverts in social media care about their privacy.
They tend to only accept friend requests from people they know.
They really don’t care about the number of “likes”.
Most likely unaware of friend requests.
Will unfollow or delete you.
What are some common traits of extraverts?
Extraverts don’t worry about their privacy.
They are more inclined to accept invitations from people they don’t know.
Extraverts care very much about the “likes” & shares.
They do pay attention to friend requests.
Most will keep all of their connections close.
From a psychology point of view we can take a look at “Introvert vs. Extrovert: A Look at the Spectrum and Psychology. The article points out the following. “How extroverted we are can have a huge bearing on our day-to-day life across a multitude of contexts and it’s important to note that there’s no ‘better’ level of extroversion/introversion – both ends of the spectrum have their advantages and disadvantages but by understanding where we fall on the scale we can address areas in which we’re perhaps lacking.”
Personality predicts what people do on social media.
A large body of research on social media use and personality has focused on the Big 5 personality traits, the most widely accepted trait theory. When people are asked to rate how much different traits characterize them, those traits cluster into five groups:
Extraversion: Sociability and feeling energized by interactions with others
Agreeableness: Warmth, cooperativeness, and a desire to get along with others
Knowing and understanding some of this may be of help in your next investigation. It is well worth it to take a look at your subject’s online activity to reveal glimpses into their personality.
Conducting online discovery research on a person or business of interest should always begin with a strategy. Using critical thinking and formatting your search around your case will save you a great deal of time and effort.
When beginning research on a subject you want to start by capturing the data that you know to be true. Many background software platforms will supply you with the basic information. Taking a good look at this information will help you determine which data points are worth using in your online research. From there you will need to do a lot more digging to discover what may be available online.
Usernames can be a rich source of information and most people use several. Especially those who are active in social media.
UserNames For Discovery
User names have been extraordinarily helpful when hunting open source intelligence online. The trouble is you may not always know the subject’s user name right away.
Since most people are creatures of habit, you can start by using whatever email addresses you have. Try a few of those to start off. Knowing an email address such as sdparty@yahoo.com for example, try sdparty or @sdparty in a standard search. Next when you start to dig into social media, pay attention to what user names they use there as well and use them to search further.
Little by little, you can discover additional sites using this method than you even knew existed. The example above was discovered based on a single user name.
Most people have user names across multiple sites. So, you may also want to use variances of the user names and/or email addresses as well. It may be as easy as placing the username in a Google or Bing search. I like to use quotes when searching by search engine to filter results.
Lastly, do a contextual evaluation of the username. It is human nature to use things that are unique to you when creating user names. You may be able to identify a cultural emphasis used or even the approximate age of the person by examining the username.
Gaming Communities
An often overlooked area is searching through gaming communities. They too are great resources for checking usernames, especially if your subject is younger.
When conducting online research, there is no single tool that will give you everything you need. It takes using a little bit of everything. That is where training comes in and continued education. In social media specifically, what is here today may be gone tomorrow.
In today’s digital world, employee fraud and theft is up and can cost a company a lot of lost revenue. This is an area in which a Private Investigator can be be very valuable to a loss prevention department.
A recent article in the The Atlanta Journal-Constitution reported two employee fraud investigations.
“Home Depot just caught an employee who stole over 100K in electronic gift cards. “Said accused did, between January and November 2018, use his position as a Home Depot employee to send E-Gift cards to email accounts that he set up himself, or were provided to him from a third party, in the amount of $156,330 U.S. dollars,” the arrest warrant states.”
“A teenager was arrested after he was accused of stealing nearly $1 million from the Kroger store where he worked. According to police, 19-year-old Tre Brown created more than 40 returns for non-existent items in December and January, including lottery tickets that were never sold, spokesman Cpl. Collin Flynn said. Those returns, which ranged in price from $75 to more than $87,000, were then placed on several credit cards, investigators said.”
Benefits Pro, an employee benefit firm, recently published an article on the warning signs.
Employee Fraud Red Flags:
• An employee living beyond their means • An unwillingness to share duties • Being under pressure on the job • Family problems or divorce • Defensiveness • Past legal problems • Refusal to take vacations
According to Certified Fraud Examiners, a typical company can lose up to 5% annually to employee fraud. In fact, the Association of Certified Fraud Examiners conducted a study in 2018 titled, “Report to the Nations: 2018 Global Study on Occupational Fraud and Abuse.” The study included 2,690 known cases. Many do not get reported due to the stigma and bad public relations to the company itself.
The study goes on to reveal some other commonalities.
The overall amount of loss by men is 75 percent larger than those caused by women.
The most common way employee frauds are discovered is via tips.
Internal control weakness is responsible for nearly half of frauds.
Employees committing fraud who have been with their companies longer stole twice as much.
Small businesses lost almost twice as much to fraud per scheme as larger ones.
Deep Web Research
If the investigator is looking for stolen merchandise, then the web is one of the best places to begin. Conducting a deep web search on a person of interest can provide a starting point. Details may emerge that will provide various emails, phone numbers and user names. Connecting the person with online social media groups, market places, Craigs List, and more may provide you an exact place where the stolen merchandise is being sold.
Auto Parts for Sale
We once worked on a scan for an Investigator whose subject was suspected of selling a very unique set of stolen auto parts. The employee had created an eBay account and made the mistake of using a familiar user name. After the user name was revealed in our Deep Web Scan, we turned our attention to the online websites that sell goods to consumers. We were able to piece this information to that of our client’s subject. A huge catalog of stolen auto parts were on display!
The internet has certainly helped employee fraud. With more avenues to sell stolen merchandise, it can be just the right kind of lure an employee needs to do the unthinkable.
Outdated POS systems, computer programs and data storage entry gaps can be additional areas of concern for many retailers. Being proactive is always your best approach to take away the temptation. Smaller businesses may not have the money for a loss prevention department. That is where a Private Investigator can be a valuable asset to your business, specifically one who deals in computer forensics.
Analyzing social media posts is most likely something you don’t really do on a regular basis. Unless the case calls for it, there is not always a need for it. However, when there is, so much can be uncovered!
Don’t F**k With Cats: Hunting an Internet Killer
If you are a Netflix subscriber you may have seen this documentary. It is one of the best OSINT films out there. The documentary uncovers the months it took a group of online sleuths to reveal a real life killer. During the documentary it is revealed how helpful social media posts were in finding clues to the whereabouts of this criminal. It is graphic, so be forewarned. However, the diligence of these average people is noteworthy. It takes time to really dig and even when your subject leaves clues, it can be difficlut.
One scene in particular focuses on the street lights in a city. The subject posted a photo of himself in social media on a city street. One person recognized the style of the street lights and pinpointed them correctly as being in Ontario, Canada. She was correct, however it took so long to persuade the local police to believe her story, the suspect was already on to a new location.
It is also a great example of how important it is to really look at social media posts.
Social Media Post Threats
When scrutinizing social media posts, carefully look beyond the person in the post. Is there a computer screen or tablet that you can zero in on? What about a clock in the background? Cross reference this with the date and time of the post.
Photos of a person’s home can be important as well. Recently, we conducted a deep web scan on a person who was suspected of selling drugs from her home. We searched for a post that she may have forgotten about online that showed her with the drugs. While we did not uncover anything like that, because she had deleted it all, we did uncover something else.
She was showcasing herself in a very specific Reddit group that served as a an advertisement of sorts linking to an online porn site. In this case, she did not show her face on any of the posts. She did however, take all the photos in her bedroom. We were able to link her bedroom from her public Facebook posts to the bedroom from her Reddit posts. Since this was a child custody case, this was an important find.
Reverse Image and Exif Information
Where possible, reverse image searching and checking exif data can help provide additional information when investigating uploaded images. We explained in more detail what Exif data is in a recent post titled, “Where Was This Social Media Photo Taken?”
Reverse image can be done with a Google Image search or Bing Image search. Some paid versions are Tin Eye and Social Catfish.
The Dark Side of OSINT
After the horrific attack on U.S. Congress this month, many law enforcement people turned to photos on social media and the deep web to locate people of interest and to investigate further.
“While the use of open source intelligence has been praised by law enforcement and investigative journalists for its crime-solving efficiency, public data can be dangerous when used in haste on social media. The speed that makes OSINT so effective as an investigative tool can also make its use more susceptible to blunders and bias. From terrorist attacks to protests and mass shootings, open source intelligence has led to inaccurate vigilante-style justice and the doxxing of innocent individuals.“
Like everything else online, some is real and some is not. Cross referencing for data accuracy is critically important.
When we think of social media research, or social media listening, culture is not something that immediately comes to mind. It is only when we begin to dig deeper and identify what our search parameters are, that we begin to understand that cultural differences will play an important role.
Recently, a client of ours asked if we had a Spanish speaking analyst because this does indeed help when conducting a search in social media or the deep web. Especially if the person speaks mostly Spanish or a combination of English and Spanish.
Facebook in particular is used by the Hispanic community as a way to stay connected to family and friends. It is also used as a way so celebrate & express diverse aspects of life.
During a recent search, our Senior Spanish Analyst uncovered a post that would lead the average person to think this individual was talking about her son. She called our person of interest her “Mijo” or “Hijo“ translated literally to mean son. Upon further investigation, our analyst knew from other data resources, that this woman was not his mother. It did indicate; however, she was a fan of his. Someone who this woman held dear. The word son in Spanish can be used as a term of endearment or for someone you feel affection for. Understanding culture plays a vital role in all investigations and this is perfect example of that.
In this example we see the literal translation. This is the case where the woman was using the word son as a form of endearment.
The Behaviour & Information Technology, publishes research on usability and user experience, human created interaction, human-centered and user-centered design, and human aspects of the digital world. It published an article on “Culture and social media: the relationship between cultural values and hash-tagging styles.”
In the article the authors clearly identify cultural differences in hash-tagging styles. There are characteristics of hashtags and the impact of individual cultures. Their study revealed four dimensions of hashtags.
Inspirational
Structural
Entertaining
Artistic
We discussed in a recent blog post; how important hashtags can be when you are researching a person of interest on the web. Don’t Forget the Hashtags highlighted a recent scan we conducted on a person of interest. We were asked to revisit an old case to see if there was any new information available on the subject. A senior analyst located the subject’s Mother’s Facebook profile and noticed she tagged all her photos of her daughters with a specific hashtag. Using the hashtag as a search tool through different social media platforms, our analyst discovered a different profile in which the subject was active and posted often. We wouldn’t have been able to find this profile through our normal search methods because the subject used an alias we didn’t know about.
Twitter & Latino Culture
A good reference is Twitter. Twitter, for example, has a group dedicated to empowering Latino and Latin American employees. Their account is @twitterAlas.
This is a great example. For a non-Latino person, one would need to first understand the meaning of Villancico & then as you scroll through the comments, you may need an interrupter to understand what you are reading.
“Every Latinx person has a story, each different and unique. It defines who we are, and also connects us to one another. We’re the Latinx voices at Twitter!” Tell us who you are using #IamLatinx
Twitter post: September 16, 2019
How Latinos Use Social Media
When it comes to language choice on social media, Hispanics are using both English and Spanish. According to E-consultancy, 33 percent preferred English, while 27 percent opt for Spanish; 40 percent used the two equally. But preference varied with the situation.
Because the culture is very family focused, much is shared with regard to events, celebrations, holidays and achievements.
Don’t overlook blogs and forums. Forums are a platform for expressing opinions and asking questions.
This is why we feel it is important to have a Spanish speaking analyst on our team. She has assisted in many of these cases over the years.
[1] Pavica Sheldon, Erna Herzfeldt & Philipp A. Rauschnabel (2020) Culture and social media: the relationship between cultural values and hashtagging styles, Behaviour & Information Technology, 39:7, 758-770, DOI: 10.1080/0144929X.2019.1611923
Algorithm Changes Has Facebook fueled the political fire? The answer is yes, and they are making changes through their algorithm feed to diffuse it. Their goal is to reduce extremist group content and move towards neutral grounds. Mainstream media will take the lead through newsfeeds rather than smaller political groups. With specific algorithm changes as this, broad effects could create additional changes to other aspects of Facebook. This is something to be mindful of for open source intelligence purposes and online searches. Click Here for a more in depth look.
Live Videos Tom Jarvis, Wilderness Agency:“The pandemic has accelerated our need to share in real-time through live video, with Facebook reporting a 50% increase in viewers watching live videos in March compared with the month previously. With a vaccine in sight and “normal life” returning in some form soon, we will see a huge increase in us all sharing our real-world experiences in real-time.”
Instagram
Stories Stories came out in 2016 with short video sequences that disappear within a 24 hour period. In 2020 Stories began loosing it’s popularity as Reels took off. According to Social Media Examiner, it’s gained in popularity 10 times the number of views for stories or normal posts. Reels Instagram recently changed it’s formatting, offering a small video button at the very bottom of the screen. Reels is sometimes compared to TikTok as it was launched to compete with the app. We will see this feature gradually shift the direction of Instagram. We could potentially see Reels lead our IG newsfeed instead of posts. Click Here for more a more in depth look at Instagram changes.
TikTok
“Where Police Look”, it will take you to a TikTok video with over 11.2 million views. The video discusses all of the areas within a vehicle an officer does not check for drugs. There are so many videos just like this one on TikTok including videos from an older audience reflecting the age group 45-64. Although it can be difficult to locate a person of interest through TikTok there are ways to do it. Click Here to learn more.
A Chick-fil-A employee claims she was fired from the restaurant after posting a now-viral TikTok video revealing menu hacks for cheaper food. The story began in late July, when TikTokker @Anasteeezy shared a quick clip to the video-sharing platform discussing an ordering hack for seasonal drinks. In the time since, the video has been viewed over 2.5 million times. Our blog discusses this further.
Reddit is a growing platform and has become the go to online community for many people looking to voice opinions. And what better year to do that than 2020?
In August, we published a post about Reddit and Riots. There, we reported that Reddit has grown its user base by 30%. The self-proclaimed front page of the internet now reaches 430 million monthly active users, who collectively have created 199 million posts and 1.7 billion comments.
Reddit acquired Dubsmash, a short-form video-sharing social media platform that touts a diverse creator base, per a company blog post. The deal marks Reddit’s first major acquisition, though its financial terms were not disclosed.
Dubsmash will continue to operate its existing platform and brand, but Reddit will integrate the app’s video-creation tools into its own product. Another driver of the acquisition was Dubsmash’s audience: Around one-quarter of Black teens in the U.S. use the app, according to the blog post, while 70% of its user base is female.
Dubsmash claims to draw around 1 billion monthly video views, with 30% of users logging in daily to produce content. The news suggests that user-generated video is a key piece of Reddit’s bid to grow a bigger ad business, a strategy that squares with how the rest of the social media world is moving in the wake of TikTok’s breakout success.
Reddit Grown Plans
Reddit is in the middle of an ambitious plan to grow a bigger advertising business, and it’s increasingly clear that user-generated video content is a linchpin to its overall strategy. The company notched $100 million in ad revenue last year, and claims it is on a path to generate $1 billion in revenue within the next few years, per Ad Age.
Why Dubsmash?
Dubsmash looks to differentiate from the pack by championing a diverse user base, something Reddit could be glomming onto as it tries to broaden who it connects with and assure brands that it’s a safe place to advertise. Reddit has frequently grappled with the presence of racism on its forums, and in the past has favored a free speech position while disallowing open calls to incite violence. However, the site’s tune has started to change of late, as reported in The Atlantic, particularly in reaction to the protest movement for racial justice that swelled over the summer.
Dubsmash has put a more concentrated effort behind helping its Black and Latino influencers make money. Last month, it debuted a feature called Shoutout that allows users to commission videos from celebrities or their favorite creators in a manner akin to Cameo, according to Forbes. The app does not take a cut of the revenue generated from Shoutout videos. In general, Dubsmash does not generate much in the way of revenue at all, according to TechCrunch.
Historically focused on text-based forum discussions around a variety of topics, Reddit has also increased the amount of video-creation tools it offers in recent years to meet consumer demand. The site debuted native video features in 2017, lessening a dependence on third-party hosting sites. Reddit Public Access Network (RPAN), its livestreaming video service, has landed in the spotlight as homebound consumers spend more time watching live video during the pandemic.
We get this question a lot. Can you tell me where this social media photo was taken? The short answer is probably not. Here’s why~
An easy way to explain this is to think of the chain of custody of a photo. How was the photo taken originally? Chances are, it was taken using a person’s smartphone. It could, in some cases, have been taken using a digital camera.
Digital cameras can store a lot of relevant information about a photo. It can reveal where it was taken, how it was taken & when it was taken. Digital Forensic Investigators and Examiners know exactly how to extract this data from a photo & use it to fight child exploitation and sexual abuse.
However, what many people don’t know, is that the data behind the photo can be manipulated and changed.
Geotagging a Post or Photo
It was once very popular to post a photo in social media and tag the photo by letting everyone know where you are. Remember Four Square? Many people still do this. You may see a friend who posts a photo on a beach and they tag who they are with and where they are. Those are the easy ones!
However, many people have learned the hard way not to do this. Not only does a geotag let criminals know where you are, they also let them know you aren’t home. Most people are very well aware of their privacy settings on their mobile phone and in social media.
Therefore, it is near impossible to determine where a social media photo was taken, if the geotag is set to private or is off altogether.
So what is the data behind the image? It is called EXIF data.
EXIF Data
What is EXIF data? EXIF stands for Exchangeable Image File Format. It is basically the metadata attached to every digital photo you take. It will include information such as the camera model and settings you used, the date and time you took the picture, and even details about exactly where you took the picture. Photographers can use this data to help organize their photos, perform searches, or re-create the exact manner in which a picture was taken.
** But – please note: Facebook and other social media platforms do not publicly share EXIF Data. They strip it when it is uploaded.
According to the FBI’s site, here are some of their suggestions. So, keep in mind that many people do know how to do this and are doing it.
Turn off your phone or camera’s geo-location feature before ever taking the picture. Note: devices in airplane mode can still capture geo-location information.
Remove EXIF data before sharing images with people or posting them online, especially when images are captured in private homes or businesses. There are free apps that you can use to do this.
Use an EXIF viewer to verify that you were successful in stripping the personal data from the photos before sharing.
Before uploading images, use available privacy settings to limit the audience to only your close friends and family.
Minimize the use of apps that automatically upload and share captured images.
Even without EXIF data, the image may contain identifying information, such as associated persons or location histories. Screen content with the assumption that anyone can see, copy, or forward photos that you post online.
Image Tip
To find an image’s exif data, right-click the photo and select either “properties” or “information”. If the GPS coordinates appear, simply type them into Google Maps to find the location.
While this is a long shot, it is worth the effort should you find a photo online that was not shared in social media and appears to be recent.
In a recent blog post, we suggested trying Photo Investigator: The Photo Investigator is an iOS app to view all image metadata (all the possible data stored ABOUT and within each photo). You can also remove photo metadata with an in-app purchase. The Investigator can also open the image’s GPS location in the maps app for directions; view images at full size and zoom them larger than in the Photos App.
Many people who are involved in Facebook Groups are highly engaged. Once a person joins a group, there seems to be a false sense of anonymity in a way. Meaning, that no one outside of this group can see my posts. If the group is public, that is simply not the case.
It is important to remember this when you are conducting research on your person of interest.
We covered this in a previous blog. The “Must Have” to the “Nice to Have” in Social Research for OSINT featured a case study. From all appearances the POI seemed to be pretty clean cut. Someone who you would never suspect would use drugs. However, once we located a group she was active in, it revealed a different side to her.
When conducting scans, we have found some seemingly “hidden” posts in groups that were very helpful to our client’s case.
Hidden VS. Private Groups
According to Hootsuite:
Private and visible Facebook groups can be found through search, and it requires approved membership in order to see anything beyond a group description, members, and group history.
Private groups that are hidden can only be found by current members and those who have been invited to the group already (even if they aren’t members yet). Only members are able to view the group content beyond that waiting-room-styled display above.
Most business groups are most effective when set to private and visible. People can find you and you have full control of who gets to see and view group content, giving you the best of both worlds for a balance of quantity and quality while still being findable.
Hidden groups are most effective for internal team use or if you want to set up a highly-exclusive group that’s invite-only and don’t want the backlash of angry people who aren’t accepted.
Tips to Search Facebook Groups
Need a quick and easy way to search for groups? Start with Facebook’s Browse Groups page which is designed to help you locate a group that fits your interests.
Once in the Browse Group area, you can filter the search down a bit (see below).
If you have an idea that your POI is active in a particular group that is public, you can easily use the magnifying icon right on the page to search the group for names, keywords, dates, etc..
People who post in groups, seem to be more vocal, more honest and sometimes reveal much more than they are even aware of. It may be because they view it as being more “private” and not publicly available on their own profile page or timeline.
When conducting online research, a person’s email address can be vital. When you consider that most social media platforms and online forums require an email address to sign up, you could be missing important information by not knowing it.
When conducting a basic background search there are times you don’t even pull up one email address on a subject. There are ways to find someone’s email address online.
Tools to Try
Where does the subject work? Knowing the name of the company (as long as they have a website?, can be step one. Next, use an email look up tool.
Hunter..io: They have a free search tool on their website. In the example below, I used it to find email addresses for our website, www.e-chatter.net. Two email addresses were found. The great part of this is that even though they don’t provide the entire email address, you can see the format in which the company uses for their employees. If you were searching for me, you would know that my name is Kathy Doering. Easy to figure out that we use first name initial and last name as our format.
2. Rocket Reach: Search by name + Company, or Linkedin URL. You can also search by locations, title, industry, revenue, SIC, and + 15 other attributes & filters. You will have to sign up for a free account with this site however.
When searching for Kathy Doering, Rocket Reach found 3 correct email addresses. They also found several low ranking results that were not connected to me. They did have false positives like any other search tool.
3. Search using Duck Duck Go: Using an alternative search engine like DuckDuckGo, is a little known trick. Use “@domainname.com” in the search bar. Also try “@domainname.com” contact. This is not something that will work in Google or Bing. You can include the name of your prospect in the search if you’re looking to contact someone in particular, or just keep it generic.
In case you already have an email address and want to check to see if it is legitimate, refer to our blog post from May 2020, “Who is Tied to This Email Address?”
In the world of online research, social research, OSINT, etc., information falls into two main social research categories. In one group you have the “Must Have” and the other is the “Nice to Have”. Let me explain.
Let’s take a look at this from the viewpoint of information collected on a person of interest.
Must Have: Facebook
Facebook intelligence is still in the “Must Have” category. In part this is due to the fact that there is still so much to discover there, if you know how and where to dig. That is the challenge!
Groups: Sometimes people will showcase their groups and sometimes this information is kept private. If it is kept private, there are search techniques that can be used, but it is not easy. Sometimes this information is readily available on a person’s profile page. When it is, and the group is public, I would suggest taking some time to do a manual search.
What Can You Find?
When people post in Groups, I really think that most have a mindset that it is undiscoverable information. Meaning, it is safe within the constraints of the group. That may give a false sense of freedom to speak their mind or to post something that they wouldn’t want the majority of their friends to know. When viewing a person’s page, public posts may give an impression of being squeaky clean but posts in a group setting can reveal the opposite.
Recently, we conducted a scan on a person who from their two facebook profiles, looked to be pretty clean cut. After digging further, we came up with a series of posts that showed a very different side to the individual.
Post of a person of interest in a Group
In case you are unfamiliar with the term, “wake and bake” it can be described as getting up in the morning and partaking of the drug of choice, without leaving the comforts of one’s bed. (urban dictionary).
Enough to toss that squeaky clean image right out the door!
Twitter:
If you are having trouble finding information online, one suggestion is to turn to Twitter. Is the person currently employed? By whom? What about past jobs? It may be worth it to scan the company’s Twitter pages because many mid to large size companies will post events, fundraisers, blogs, videos, etc. which have employees present.
We recently found several photos of an individual from their company’s Twitter page.
Nice to Have
There is quite a lot of information that can be filed under the “Nice to Have” social research category. When conducting a deep web scan for example, we may find out that the person had some past problems with the law. From simple traffic violations to bankruptcies and everything in the middle. This may date back 10 or more years.
While it may not be important to the case, it is something that is part of the person’s past. Voter registration, financial contributions to a particular political party, volunteer work, newspaper articles, digital records of all kinds, and so on. All of this additional information can help to give you a good picture of the character of the person.
Person had a possible DEA Controlled Substance License that expired in 2015
A piece of information like the one above can be useful in many ways. Perhaps you know the person to be a Veterinarian or he was one in the past. This piece of information can serve as another data point that confirms his profession. It may list an address or name of a business that you didn’t have before.
It can help you to eliminate false positives in your research as well. Without the help or assistance of multiple software platforms, you can easily get two people confused who share the same name.
Tik Tok has become the new “hot” social media platform with a huge amount of scrutiny around it. China launched it in 2016 and it grew to the US and UK markets in 2018.
What is it and How Does it Work?
It started as a lip-synch video app but now has morphed into an app where users can upload all kinds of videos clips. In fact, to date, it has a billion downloads worldwide and over 500 million active users. It supports over 15 languages and users in at least 75 countries. That is a lot of growth in such a short amount of time.
MarketingCharts TikTok data (March 2019) finds over 50% of TikTok users in the US are aged 18-34 – with a nearly even split between 18-24 year olds and 25-34 year olds. Interestingly though, we still find a quarter of US TikTok users are aged 45-64. Statista supports those numbers as seen in the chart below.
Social Intelligence
When it comes to intelligence or social listening, TikTok is still a puzzle to most. Enterprise social platforms are not able to harvest data from TikTok and there is no API. The platform itself encourages users to to keep their content public because that is the very best way for one to get “famous”. Ordinary people doing very unordinary things to gain attention of brands looking for the next social media influencer.
The best way for a user to search TikTok is through their discover feature. Search via hashtags (desktop only allows hashtag searching). Keyword searching is available, however it will mostly capture the text description of videos.
Currently, social media research in TikTok will be very time consuming. It can be useful in the case where a user is very active and has a good deal of followers. Very easy to blend in to those followers and monitor activity.
A Chick-fil-A employee claims she was fired from the restaurant after posting a now-viral TikTok video revealing menu hacks for cheaper food.
The story began in late July, when TikTokker @Anasteeezy shared a quick clip to the video-sharing platform discussing an ordering hack for seasonal drinks. In the time since, the video has been viewed over 2.5 million times.
“I work at Chick-fil-A so I’m here to give you all the tips and tricks on secret menus items, how to get things cheaper and just all that” she began. “And this is only a part one.”
The employee started by explaining that by ordering a large Arnold Palmer drink with four pumps of mango, you can allegedly replicate Chick-fil-A’s seasonal mango passion tea, only cheaper and in a larger cup.”
The Dark Side of TikTok
Like every other social media platform, there is a dark side. Scams are popping up all the time on the platform. For one, there are plenty of bots on the platform impersonating real users. These automated bots either direct you to shady websites to shell out your private information like phone numbers and bank information or infect your device with malware.
A great deal of time must be spend on OSINT in order to weed out false positives – good intelligence vs bad intelligence. The degree of reliability and authenticity. The importance of an accurate starting point is critical when taking your research on a person of interest to the world wide web.
We will dive into this in more detail in the weeks to come. For now, let’s begin with how to identify a fake photo. Hiding your real identity has never been easier on the web and social media is the scammer’s friend when it comes to this. A photo may be a false positive because while it appears to be the person, in actuality, it is a fake.
Can You Tell the Difference?
One is real and one is fake…
Take a close look at the photos above. One is a real person and one is a computer generated photo. Which is which? Not so easy, right? This is something that all of us in the open source research, law enforcement and private investigations industries will need to be proficient at. A great site to test your skills is Which Face is Real?
You may wonder how this is even done. You are not alone! Machine learning has been used to customize and generate realistic photos. It is called StyleGAN.
StyleGAN was originally an open-source project by NVIDIA to create a generative model that could output high-resolution human faces. The basis of the model was established by a research paper published by Tero Karras, Samuli Laine, and Timo Aila, all researchers at NVIDIA.
(source: https://heartbeat.fritz.ai/)
What To Look For
According to Which Face is Real, look for the following things:
Teeth and Hair: Hair and teeth are very difficult to render realistically. Often teeth are odd or asymmetric. Look for a type of hallo over the hair or other odd imperfections.
Eye Glasses: Right now, it’s very hard for algorithms to generate realistic-looking eyeglasses. Take a close look at the style of the glasses. Many times one side will look different than the other side.
Background of the Image: Many times the background of an image is a give-away. Because the concentration is on the face alone, the background may show smudge marks or render unclear.
When in Doubt….
If you suspect your target is using a false identity, you can do your very own “fact checking”. Google image will allow you to upload an image to search the web for other images that look just like it.
One of our recent blog posts discussed this in further detail.Online Research: 3 Tips for Better Results. It is more important than ever to be sure you have the right tools in your tool box.
PS: If you guess the photo of the woman, you are correct! She is a real person.
Online investigation is a piece by piece process that we hope will bring us to the Aha moment! Sometimes it does and sometimes it doesn’t. In today’s research climate, online resources have become even more valuable to the Private Investigator or Online Researcher. One indication of this is the evolution of online data bases and web scrapping software companies who are able to offer us much more than years past. How well are you keeping up?
Time is Money- Money is Time
Photo credit: Michael Lieberman
The world wide web is huge and the image above provides a great visual of just that. When you begin your online search this is something to keep in mind. How much time are you willing to invest to gather the data you need? Many times two heads are better than one. We confer with other team members when conducting online research all the time and have found it to be very valuable. A fresh set of eyes can make a huge difference.
Multiple software platforms are better than one platform. Each platform captures data from different online data bases. Sometimes the most important data point is found by scrapping the web against every single piece of information you have available and know to be true. One thing can lead to another when it comes to online research and each data point you gather leads to another and so on. It is a good idea to get another prospective when you can, by either hiring a third party or trying out a new software/data base even if there is a small cost to it. Depending on the case, your strategy should include options whenever possible.
Discover the Right Apps
Recently, we wrote about the importance of Social Media Apps such as TikTok. Apple has over 2.8 million apps available currently. That is a whole lot of apps! We will zero in on a couple that you may find helpful. Check out new apps regularly for your online investigations.
Downloadgram: Downloader for Instagram: Photo & Video Saver allows the user to download videos and images from Instagram’s links. By copying image’s and video’s link and pasting into Downloader for Instagram which automatically downloads that video/image, then you can save into your device.
Photo Investigator: The Photo Investigator is an iOS app to view all image metadata (all the possible data stored ABOUT and within each photo). You can also remove photo metadata with an in-app purchase. The Investigator can also open the image’s GPS location in the maps app for directions; view images at full size and zoom them larger than in the Photos App.
Protecting Your Privacy
One of the very first things I recommend is to get a good VPN (Virtual Private Network). There are a lot of options. Take a look at Best VPNs of 2020 for a good list of options. We use NordVPN and have been very pleased. First and foremost it provides a strong degree of online anonymity. Additionally, when reviewing providers, make sure that you have the option to include mobile devices as well. This will keep you protected when you need to search using your mobile device on the road.
Another thing to keep in mind is when something online is “free” you are very likely giving them your private user information in some way. It is just the way the web works. Many data bases do offer free searches. You get a little taste of what the site offers but at a price.
This is why it is a good idea to use an email masking service. One that I would recommend you take a look at is 33mail.com . An excellent safeguard when having to supply an email address online. The site explains how it works below:
“Aliases are created automatically the first time an email is sent to them, so you can just make up an alias on the spot and use it when you sign up for a website, and it will be created the first time that website sends an email to it.“
As many are still working from home, protecting yourself online has never been more important.
Have you used hashtags in your online investigations? What is the first thing that comes to your mind when you hear the word hashtag or see the symbol (#)? Do you think of Twitter? Or maybe Instagram, LinkedIn, or even Facebook? Social media users notice hashtags within posts. Some users follow hashtags. Some create them for political purposes. Others use them to track an event or even to make a point. Millions of hashtags are used in Twitter alone each day.
What Makes Up a Hashtag?
A hashtag is simply a keyword phrase, spelled out without spaces, with a pound sign (#) in front of it. Wikipedia calls it a type of metadata tag used on social networks. Looking for the sale of a certain drug in social media? Search the hashtag. Be sure to gather the street names the drug uses, so you get a full picture.
How else can this be used in your investigations? If you are working a high profile criminal case you will want to include this in your research. I would recommend starting in Twitter. If you find a fair amount of information there, I recommend using Tweet Deck and build yourself a dashboard. This will allow you to keep track of any developments using relative hashtags in real time.
Once you have located some good hashtags related to your case, cross reference them in other platforms. Not only will it potentially produce some good information (who, what, where and why), it may also allow you to search photosattached to the post for other possible clues.
Case Study: Hashtag Led to Username
A recent scan we conducted on a person of interest came up empty. Using multiple software platforms as well as good old-fashioned hunting, led to nothing. While searching, we found an important hashtag. By researching the hashtag in each social media platform, we located our person of interest. The username was such, that is just didn’t get picked up by any software platform. It was a very unique variance of this individual’s real name. From there we found a very public profile of the subject.
It is just another example of using hashtags in online research.
Hashtags to Try for Investigations
Take a look at some interesting hashtags next time you are in Twitter. One of the best is #breakingnews. This hashtag can quickly bring you up to speed on news breaking in the moment.
There are so many more, as the photo below showcases.
With all of the troubling events in our world today, social media seems to be more focused on the Election, COVID-19, Protests and Riots. Not much attention is given these days to selling drugs in social media. However, it is still happening and many police departments are having a hard time keeping up.
Salt Lake City news outlet, (KUTV) actually reported that if your child is on Snapchat, there’s a good chance they are seeing ads from drug dealers. Several 8th grader’s say they see the ads almost daily.
“Like yesterday, this person added me and they were selling Xanax,” said the eighth-grader.
Drug dealers are called “plugs” on social media, sometimes using a plug emoji to describe them.
Some plugs “quick add” people on Snapchat, which categorizes users by zip code.
(reported by KUTV Salt Lake City)
The Dealers Don’t Hide
Just a week ago, we performed a search on a suspect for a client. While combing through the suspect’s social media posts, it became quite obvious she was dealing. She made no secret of it and actually announced she was ready to make a run, and asked if anyone needed anything. Of course, her Facebook page didn’t reveal her real name. She used an alias but we were able to tie it to her name due to many public photos she included of herself. It is not always as secretive as one might think.
Instagram’s Selling of Drugs
A quick search for “#Zannies (a Xanax slang) provided over 4,000 results. They don’t hide it either. The photo below is just one example of what is out there.
The problem is Instagram’s algorithms can’t distinguish the context the hashtags are used in. And if a user then follows a dealer using the hashtags, Instagram’s algorithms then suggest that user follow more drug dealers. In the course of one day over 50 Instagram dealer accounts were found simply be searching for different hashtags like #weed4sale.
Most dealer profiles have a bunch or “product” photos displaying their inventory and their contact information is in the bio or comments section. While some bravely post their mobile number, most use a messaging app called Kik and others. No phone numbers or personal info is exchanged here, only user to user messaging.
Riots and Reddit are probably not something you would think have anything in common. However, because of the way Reddit is organized, it has been a resource for investigative journalism. It is heavily used for the monitoring of riots across the US.
Reddit
Let’s start with the basis. What is Reddit, you may ask? Reddit is a large group of forums that discuss all kinds of topics of interest. The site explains itself as the “front page of the internet,” and that’s not an empty boast. Reddit is the sixth most popular site in the United States, according to Alexa, and the 18th worldwide.
Within Reddit are Subreddits. Subreddits are pretty much what they sound like, subgroups that are more specific in nature topic wise. Some of the subreddits are public, while others are private. They’re denoted by /r/, followed by the subreddit’s name, e.g., /r/gaming. The site has many “web sleuths” who use the power or crowdsourcing to reveal video footage of events all across the world.
Portland Subreddit Group
Portland, Oregon has a subreddit page that has 170,000 members and offers live streaming of events. r/Portland is the name of the subreddit. It contains lively conversation, Twitter resources that journalists are using to post about what is happening each night in their city and much more. It is one example of how a subreddit can be used within Reddit for riot monitoring.
Local Resident Uses Subreddit to Assist Police in Hit and Run
Here is a great example on the worth of understanding how Reddit works. One user posted an image of a piece of broken taillight, asking if anyone could identify the type of vehicle it came from. After 400 comments and some back and forth, it was identified correctly by make and model. The user was able to go to his local police station, place a report of a hit and run and provide the officer with the information. This helped aid the officer in finding the owner of the vehicle based on the proof.
Reddit has grown its user base by 30% year-over-year, according to new data released by the company Wednesday. The self-proclaimed front page of the internet now reaches 430 million monthly active users, who collectively have created 199 million posts and 1.7 billion comments.Dec 4, 2019
source: Varitey.com
Interestingly enough, Reddit is an excellent resource for the Private Investigator or OSINT (open source intelligence) professional. In fact, I believe it is just as important as TikTok, Facebook, Instagram and LinkedIn. So, the next time you are ready to do your own online investigation, don’t forget to check Reddit!
In the world of social media research for investigations, Apps are often times over looked. There is such a high priority given to Facebook, Instagram and Twitter, that often times people stop there.
Some social media apps are designed to be used by mobile phone only. Some allow both mobile and desktop login’s. Most of the time the desktop login’s are extremely cumbersome and not easy to navigate. When both are allowed, they often come with different permissions. No matter which you utilize, it is important to understand strategy and tactics for each.
The top Social Media Apps currently are TikTok, Snapchat, and Telegram. For the purpose of this blog post, we will take a quick , topical look at TikTok providing you with some very basic information on how to get started using the app.
TikTok
TikTok is one of the most popular social media apps. As of this writing, TikTok has over 500 million active users (last reported in 2018). Up to 60% of US TikTok users are aged between 16-24, according to a November 2019 release from Reuters. During the time of the Pandemic, with everyone isolated, an entirely new generation has started to use the app. I am sure those numbers have gone way up. We have been searching TikTok in our social media scans for our clients when the age of the suspects warrants it. Recently, we have found that may people in their 30’s are using the app.
You can download the app on your mobile phone and create a login in order to use the app. We would suggest signing up with one of your email addresses that you use for this purpose. Once in, hit “discover” and type in your suspect’s name or user name. Use it to search just like you would any other social media platform. Once the profile is found, you can view their followers and who they are following, but you can’t see their likes.
It is always advisable to use a sock puppet or alias as you would for any search. I would also advise removing the app once you have completed the search for added security. You can always upload it again and log in with your same credentials.
Visual steps to delete the app from your mobile phone
Desktop TikTok
You are able to access TikTok through your web browser at www.ticktok.com to conduct a small amount of searches. You will find that certain features/functions require you to have an account. Once you are all set up with your account, as described above, you can begin testing it out by conducting various searches.
When an investigation requires a deeper dive into a suspect’s TikTok, you will need advanced skills for that task. Installing an Emulator would be the next step in an OSINT search. From there you can conduct more precise keyword searches that align with your specific investigation.
It is so important to stay up to date with all social media sites. They are known to change the rules frequently. Be sure to check back often as we write frequently about social media changes.
“A picture is worth a thousand words” is an English language adage meaning that complex and sometimes multiple ideas can be conveyed by a single still image, which conveys its meaning or essence more effectively than a mere verbal description. (Wikipedia)
I couldn’t help but think about how pictures in social media are worth a thousand words, especially when it comes to investigations. We wrote a blog back in February, 2020, about howimportant photos are in Instagramfor an investigation. However, since COVID-19 hit, with people working form home more than ever before, the opportunities to capture an important photo have increased significantly. Look for the details!
This week, Joe Biden announced his running mate and released a photo of himself on Zoom with Kamala Harris. Did you happen to catch it? It is a great example of the importance of paying attention to what is in the background of a photo.
Photo distributed by Biden Campaign
What Biden’s Photo Reveals
The media mocked him for several things that were picked up in the photo. It appears that he may have had a script or notes of some kind. There was a third person on the call by way of the cell phone. A cartoon was on his desk in the background and that drew attention as well. According to the Business Insider, The comic is a simple two-frame piece from Dik Browne’s “Hägar the Horrible,” a 1970s-era comic strip of a charming viking from the Middle Ages, according to comics subscription website Comics Kingdom. “Hägar the Horrible” has appeared in numerous advertisements and pop-culture references, in addition to nearly 2,000 newspapers.
In Biden’s comic, Hägar appears stranded in the sea as his ship burns in the background during fierce storm. The viking bellows out to the sky, “Why me?!,” to which the clouds responds with, “Why not?”
Biden said he kept the cartoon on his desk for decades and that it humbled him in times of need, according to PBS.
Geofencing Photos
Let’s take our photo investigation one step further. Imagine creating a virtual fence around an area of the world using software. Once set up, this software can then run for a predetermined amount of time. This can be used for monitoring of infrastructure, crisis management, or executive protection. Once it is captured, it remains available within the platform, even if the user takes it down.
Pictures like this really are worth a thousand words! They bring huge value to any investigation.
When you think of reputation management, what industry comes to mind? Perhaps you would think of a PR or Communication company. We have all seen commercials on TV around companies that can help you improve your image. They promise to get rid of those bad reviews, gather up good ones, and make you look like you are the best thing out there. But are they missing something? I believe they are. Here’s why.
Chief Reputation Officer
What many companies don’t think about is that reputation management is something that needs to happen proactively, not reactively. A recent Forbes article titled “Five Reasons Your Company Needs A Chief Reputation Officer”explained it best.
“Most companies, including your competitors, are usually only thinking deeply about reputation management after a crisis has hit. They react and try desperately to repair the damage. This is a huge missed opportunity because the damage done was often completely avoidable. Just like no sports team wins a game playing only defense, your company needs to play strong defense and come out with a strong offense.”
Forbes
Where the Private Investigator Comes In
When I speak to Private Investigators, I am amazed that many have not thought about this area as a vital way to grow their business. In my opinion, they should be considered to be part of any good reputation management program or team. In our digital world, they will be able to determine exactly what needs to be monitored and how. After all, they do this type of investigating all the time.
Family law, infidelity cases and divorce depositions have been mainstream avenues for revenue for decades. Some of the PI’s love them, and some avoid them like the plaque. Those that avoid them do so because of the amount of work vs. the amount of compensation.
Promote your business as a firm that covers Corporate Reputation Management services. By doing so, you are in some ways, investigating for a company in some of the same ways you would be investigating for a cheating spouse. Only better, because the work is proactive VS. reactive. If you catch an issue that a corporation has online before it goes viral, you have saved the day.
Back in June, we wrote about Employee fraud and COVID19. In that post, we cited a Fortune 500 company’s loss of over $100,000.00 because of a plant shut down due to a dishonest employee. It happens more than we know.
Proactive Steps to Take
As a service offering, it is smart to offer a corporate client a deep web scan on their business. What does their online profile reveal? Some things to consider:
Reviews are obvious, but many people think of them as Yelp, Google, and Trip Advisor. They are the biggies, but there is much more out there.
2. Location based Monitoring: Does the company have more than one location globally? By creating a virtual fence around physical locations, an added security level is created for any violent social media mentions in the area. Additionally, automatically pull in any negative keywords for reputation management.
3. Employee Revenge. As more and more employees are laid off because of our current pandemic situation, some are understanding and some are not. It is human nature. Just today, I read a post in LinkedIn about a disgruntled employee telling everyone how she was let go from a major company. She went on to say that she mistakenly placed all of “who she was” around this position for the past 8 years and how this was a major life mistake. Her post gained a lot of views and encouraging comments, as it should. However, think about the company’s name there. Most people are left with the impression that the company did something wrong to her. We don’t know the full story, but it can still leave a lasting impression. Glassdoor is a website where current and former employees anonymously review companies. I will bet many don’t even know about that one site alone.
See the possibilities yet? Do you think in today’s online world, this could be something your firm is capable of doing? Email me if you would like to kick around the idea for your firm.
One area that OSINT & Social Media Researchers have in common with Social Media Marketers, is the challenge of staying ahead of the social media curve. It seems like almost weekly, social platforms change something. Most of the changes have to do with ease of use for the user or trying to adhere to changing policy regulations.
Facebook Classic VS New Facebook
Facebook recently changed the way your profile looks to a new version. They allow you the opportunity to toggle back and forth if you wish. The New Facebook update is also referred to as FB5. Facebook wants its platform to be centered around group and events more than in the past. It has a white background or you can choose a dark mode.
How does this affect our investigations? How is Facebook 2020 different from Facebook 2019? One area of interest is the emphasis on groups. We have discussed this in the past, but I think it deserves another look and mention.
Pocket-Link reports, “Facebook said the Groups Tab has been overhauled to make finding new groups that you might be interested in even easier. The feed for groups will also serve up recent activity within groups you’re a member of and may even replace the News Feed as the default feed. You’ll also see more connections among groups and the Facebook features you use the most, such as Marketplace or Facebook Watch.
OSINT Facebook Tips
So how does this relate to searching Facebook? While some things may change, others remain the same. Searching for the Profile ID is still the same. Once you receive that information, you are able to use some other methods and tools to make your searching easier. This can be found in “properties” by right clicking on a profile page.
The person’s page ID can never change. Even if they change other aspects of their profile. Once you have this, check to be sure it is correct. In your browser, type in facebook.com/ID#, as a way to verify you have the correct number.
Facebook Market Place
Once you have Market Place as part of your profile, you can easily go and search there for your subject’s name. If you find something, you can see under the person’s name, the date in which they joined Facebook. This may be helpful in identifying when they joined. If you recently joined Facebook, you will not be able to participate in Facebook Marketplace. Another social media curve ball.
In future blogs we will dive into business page profiles and some good information you can glean from it. When doing a corporate scan, this is an overlooked area of interest.
Employees and social media have been a sore spot for employers over the years. Back in the early years of social media, many employers were concerned about the amount of time employees spent in social media during an average work day. Their concerns centered around productivity, rather than what the employees were posting about.
Fast forward to 2020, and we have an entirely new set of problems. During the COVID-19 pandemic, essential worker’s were posting all over social media about their work conditions and at that time lack of PPE. Everyone knows that if you want to get your concerns noticed, turn to social media. It has become one of the most effective ways in which to communicate today on a large scale. If you are lucky, you will be picked up by the news media and your story will become national news.
Social Media and The Whistle Blower
Erin Marie Olszewski is a Nurse-turned-investigative journalist, who has spent the last few months on the frontlines of the coronavirus pandemic, on the inside in two radically different settings. Two hospitals. One private, the other public. One in Florida, the other in New York.
As you can imagine, if you know her story, she has been scrutinized in the media. Some applaud her courage while others try to rip apart her story. So we wondered, who is Erin Olszewski and what does her social media story look like?
We conducted a deep web scan on Erin. Surprisingly, some of her prior “life” was still up for anyone to discover. The deep web scan revealed, as they many times they do, a story of who Erin is and what she has been involved with leading up to her fame.
You can view her entire deep web scan here. (Erin Olszewski) Taking a look at an employee’s online, publicly available, social media content, provides a story board of the person’s life to date. It can reveal a lot about a person, good and bad. In Erin’s case, one is left with the impression that she can be a bit of a rebel rouser. It also shows however, that she is also someone who stands up for what she believes in and isn’t afraid of the consequences.
Can an Employee Get Fired?
This is the new million dollar question. The short answer is, it depends. We did a little research and found the following as a place to start.
Some states and localities may have different laws or additional laws.
Federal Laws: First Amendment: Free Speech. Doesn’t state that employees or individuals can say whatever they want wherever they want without consequence.
According to the National Labor Relations Act: An employee’s comments on social media are generally not protected if they are mere gripes not made in relation to group activity among employees.
NLRA Board Decisions
In the fall of 2012, the Board began to issue decisions in cases involving discipline for social media postings. Board decisions are significant because they establish precedent in novel cases such as these.
*In the first such decision, issued on September 28, 2012, the Board found that the firing of a BMW salesman for photos and comments posted to his Facebook page did not violate federal labor law. The question came down to whether the salesman was fired exclusively for posting photos of an embarrassing accident at an adjacent Land Rover dealership, which did not involve fellow employees, or for posting mocking comments and photos with co-workers about serving hot dogs at a luxury BMW car event. Both sets of photos were posted to Facebook on the same day; a week later, the salesman was fired. The Board agreed with the Administrative Law Judge that the salesman was fired solely for the photos he posted of a Land Rover incident, which was not concerted activity and so was not protected.
*National Labor Relations Act’s website.
In the end, companies of all sizes should have a written social media policy in place. As an added precaution, lawyers have advised social media to be added to any anti- harassment policy as well.
If you are lucky, you will go viral, get picked up by a news outlet, and your story will become national news. Just like what happened with Erin Marie Olszewski.
When we think of fraud due to the COVID-19 pandemic, we think of individual people committing fraud. After all we are only too familiar with workman’s comp insurance scams & most recently, employee fraud. We have discussed in a previous blog post how one Fortune 500 company had a loss of over $100,000.00 after an employee falsely said they were tested positive for COVID-19.
The story now continues with business fraud. Small businesses across the country have been nearly put out of business due COVID-19. Many have been able to stay afloat from government PPP funding. However, some are sadly starting to take matters into their own hands.
What the Experts Predict
Data analytics provider Verisk has alerted folks that COVID has created opportunities to commit medical billing fraud and abuse. In April, the company said its data reported a 14% increase in claims linked to suspicious billing practices.
Verisk said its Insurance Service Office MedSentry team has identified several COVID-19 medical billing schemes. Among them:
Unlisted lab tests. There was no specific ICD-10 code for COVID-19 until April 1. Prior to then any COVID-19 tests were likely coded as “unlisted laboratory tests.” Claims for a patient who has received both an unlisted laboratory test and a COVID-19 test may be cause for scrutiny.
Hands-on therapy charges. Many providers eliminated in-office visits and began to offer telehealth sessions. Verisk said bills for hands-on therapies such as chiropractors, physical therapists, and massage therapists should be examined.
Unnecessary durable medical equipment. Insurers should be wary of misleading claims for gloves, face masks, thermometers, and similar items, especially for patients who have not been tested for COVID-19 or have tested negative, Verisk said.
Social Media Monitoring
Work is being done to create a software that allows the user to find unapparent connections between all people in a claim to uncover potential scams. While it has a way to go in development, if created, it would be an excellent resource to help investigators identify potential scams and link the culprits.
Google Search – Trending
Google searches can be very revealing and a good indicator of what people are thinking of doing. The question, “How to Burn a Car” has increased 125% since January of this year.
Not surprising, Google is showing some strong trending in Employment Fraud. The graph below shows Google trends over the last 90 days.
We will continue to report our findings during the pandemic.
Back in April we wrote about fraud predictions during the COVID 19 pandemic. Back then most of what was out there was PPE (Personal Protective Equipment) fraud. We saw a lot of fakes and it even began to show up in COVID testing. Much of this was controlled by the FDA who provided consumers with updated information on their website on a regular basis.
Once the government released stimulus checks, the scams began. Scammers were contacting people through email, telling them that their check, as part of the stimulus package responding to COVID-19, is already waiting for them and that all they need to do is to provide personal information. This included bank account numbers and Social Security Numbers, which are the key pieces of information needed to perpetrate identity theft.
Bruce Dorris, J.D, CFE, CPA, President and CEO of the Association of Certified Fraud Examiners, explains that in the current conditions, we can expect to see a number of long-lasting implications. One important one being an explosion of fraud in the coming years — and organizations need to brace themselves.
Corporate Employee Misconduct
Some of our corporate associates have expressed concern with what lies ahead as they navigate the uncertain waters of the Pandemic. One company in particular needed to shut down an entire plant because an employee tested positive for COVID. The employee presented the company with a falsified COVID 19 medical claim. He went as far to provide an excuse letter from a medical facility appearing to corroborate the test results. In concern for its employees and customers, the company closed its facility for cleaning and paid its employees during the shutdown. This caused a loss in excess of $100,000 to the corporation and the unnecessary quarantine of several of the defendant’s coworkers. He is now released on $15,000.00 bail awaiting trial.
FBI Recommendations
The FBI has recommended that companies be particularly alert during the pandemic about possible fraudulent work excuse letters, as they are finding more people attempting to exploit the situation for personal or financial gain. Submission of a medical claim proven to be false could lead to criminal penalties, including fines or imprisonment by U.S. federal and other authorities.
What This Will Mean for the Private Investigator
Investigation around employee misconduct is an area that could prove to be quite lucrative for investigators. ABC News in Phoenix, AZ did a story on how local investigators are getting calls from corporations to check up on employees who should be working from home. This is not an isolated incident.
I believe we will see more and more fraud cases such as this over the next year if not longer.
LinkedIn is slowly (over the last few years) turning from a business only platform to more of a sharing platform. While some things are still tabu, more and more users are sharing posts around personal matters than ever before. In fact, LinkedIn just launched its own version of Facebook stories. This will change how you search in LinkedIn.
Last month, I wrote a blog post, “LinkedIn Loopholes. How to Use Them in Your Search.” As I outlined in that post, LinkedIn got rid of their advanced search option making searching the platform much more difficult to do. It is worth another look however. Especially, due to the recent addition of LinkedIn stories. It remains to be seen just how this will work and what, if any, search options there will be here.
How Does This Help the Private Investigator?
One way is to take a look at the user’s URL. For example purposes, we will use my URL for my Linkedin profile. Anyone can find me by searching for Kathy Doering, however take a look at my URL. If you were investigating me, you may consider using this unique URL to search Google.
A solid LinkedIn profile can uncover all kinds of clues in terms of previous work experience. Some users allow their connections to be public vs. private. This is another plus for the investigator.
Don’t forget to take a look at their interests and who they follow. Groups they are involved with may be of interest as well. If more personalization is where LinkedIn is headed, it will be well worth it to devote some research time here.
We see our fair share of infidelity cases in which a Private Investigator wants to conduct a deep web scan on the person accused of cheating. This is always a mixed bag for us because there isn’t any software out there than can pull any or all data from dating sites. Most dating sites are password protected sites and require the user to have an account in order to search. And sometimes it is even hard to search when you have set up a fake account.
If you are willing to take the time to set up fake accounts, it may be worth it in the long run. This is especially true if you take on cases like this. You may even find it helpful in other online investigations too. Here is how.
Dating Sites
Match.com
Must have an account to search.
Create a fake account to get started.
Change your settings so you can be invisible and therefore not be able to be “searched”.
From there you can search. This is a great place to start any OSINT investigation because if a person is on a dating site, chances are they will be much more open there. You may be able to gather quite a bit of information that will help you locate your target on other sites, such as social media.
There are a lot more photos. Most people on a dating site want people to see them and therefore you will have more to go on.
This site is not exclusively used for dating. There are many different types of groups based on a particular interest. It may be a good one to dive into if you know some personal information on your target. For example, is your target a musician? There may be a group for that locally. It may seem like a long shot, but if you have the time, it could be worth the effort.
What About the Deep Web?
Diving into the deep web may help us to find a breadcrumb that could lead us to information that can help in surveillance. It may be a trend that is picked up relative to being part of the same forum, group or professional network. In cases like an infidelity case, the more data we have the better. One common thread, in discovering a cheating spouse, is the use of multiple email addresses. Try searching using all the email addresses because one of them just may be tied to a profile identifying the target. Almost any group or site online requires you to give an email address.
As you can see it is not always easy. While it may seem impossible, if you are willing to devote time to it, you may find what you are looking for.
I recently had an insightful conversation with a Paralegal on using social media for deposition cases. He shared with me that the firm he works for conducts social media research on everyone. He shared that it was the only way they knew if their clients were being truthful with them. Too many times they learned of mistruths during the actual deposition. Can you imagine? Social media intelligence is becoming increasingly necessary for many cases.
That led me to think about what we do when we conduct social media/deep web research on a person of interest for a client. The who, what, where and why is becoming more and more important. Let’s beak it down even further.
What: What is the case about? Is it fraud, infidelity, workman’s comp, insurance fraud? This matters a lot. Depending on the case, there are less obvious sites to take a look at. For example, if an employee is stealing merchandise from their place of employment you may need to visit eBay or Craigs List.
Where: What area of the country does the person live? Someone living in a small town with limited resources may approach things differently that a person living in a huge city. The number of friends may be significantly larger in Facebook just because the city person may know more people.
Why: The why has to do with what you are specifically looking for. “We need to know if the suspect was active in sports after a certain date.” We are given this information by our clients many times. By knowing this information, we are able to use our time better by looking in social media specifically for this type of posting.
Stay Up To Date With Statistics As Part of Your Social Intelligence Process
Researchers are trained to keep up with changes in social media usage. It is part of an overall social media intelligence strategy. And that is not an easy task because people change their usage all the time. Ask any social media marketer. They are constantly looking at what is new in each platform on a weekly basis to be sure they are hitting the right audience with their marketing.
You see, it is not only about software. Software helps us to pinpoint areas of interest and certainly gives us additional, important clues. It helps to streamline the process. However, the human side is just as important if not more. Artificial intelligence and the understanding of algorithms are important but they have in no way replaced skilled researchers.
Will Social Media sites ever be regulated? Should there be a social media regulation policy? You can’t stop people from giving their opinions. That is called free speech. Social Media is the place where we all take part in free speech. What is up for debate is whether or not expressing your opinions on those sites falls under our First Amendment rights or not.
This week it comes front and center once again because of a Tweet from President Trump that Twitter added warnings to. Trump did not break any Twitter rules, however the social media site added its own opinion on the subject. It is no secret on how liberals feel about Trump’s Tweets. They despise them. I am certain that even some of Trump’s followers cringe at many of his Tweets. The problem here, in my opinion, is not the subject matter but the way in which Twitter did it. Should the owner of a social media platform be able to censor an opinion of anyone? And where does it stop?
However, did Twitter go too far this time? What does the law say? When this is talked about, Section 230 is always brought up. But is it out of date?
What is Section 230?
Section 230 was actually is part of federal legislation that was created 20 years ago. It has a total of 26 words. A recent Forbes article explains it this way:
Most fundamentally, Section 230 provides immunity to social media companies like Facebook and Twitter against being sued over the content on their site. This allows them to operate and flourish without needing to moderate content.
“Section 230 set the legal framework for the internet that we know today that relies heavily on user content rather than content that companies create. Without Section 230, companies would not be willing to take so many risks,” Kosset says.
Has social media gotten too big to regulate? Should it even be considered? What about censorship in the media? How does one ever really fact check these days when so many news outlets have their own agendas?
We have had a few requests over the years asking if there is a way to search an email address to see who it is tied to. There are actually numerous ways in which to do this on several different sites. Many of them require payment of some kind. You can try basic searches in Google, Bing and Yahoo first, however if you come up empty there, where do you go?
Interestingly enough, data breaches over the years have become an open source researchers’ best friend. In part this is due to the fact that when there is a large-scale data breach, it is often obligatory for the business to provide a site in which a user can check to see if they are part of the breach.
When searching for an email owner, we may want to know if the email is valid. Does it even exist or is it a made up, dummy email? By using some of the resources in this post, you can at least get confirmation that the email is valid. For example, if you discover the email has been part of a data breach, chances are it is a real email address. We can go one step further to say, with a degree of confidence, that it is most likely tied to other discoverable items in the deep web.
Not all data breach sites allow the user to look up another person’s email address. Most want to verify you are indeed the owner of the email address and genuinely want to know if your email has been compromised. There are a few that are not as strict. Two example sites that offer a quick and easy scan are:
Have I been Pnwed?
A quick search here will tell you if the email address has been part of a data breach or not. While it isn’t going to give you any details, it will give you a number of times it has been included in a breach of some kind.
You can see that a quick scan of this email address indicates it has been a part of 5 breached sites but doesn’t tell you which ones. It does let you know that it is most likely a “real” email address.
Avast Email Check
Another site you can try is Avast. This is one of the newest sites that provides users the opportunities to scan for a “friend’s email address”.
Marianne’s email was linked to MySpace, which leads me to think that she had an account at some point tied to this email address. I would search on the site to see if anything still exists in MySpace.
You may also want to try variations of the email address just in case you find closely configured email addresses. Use Google, Bing to search them to see what you come up with.
I remember when 9-11 happened and the tremendous shock that resonated throughout our country. The pain felt for all the lives lost. The fear that an enemy could attack us the way they did. The crash of our economy and the uncertainty of what was ahead. President Bush told America that the stock market was, “on sale” , and it was a great time to invest. At the time, I remember questioning that. However, I now understand it and embrace it.
Fast forward to today and I am feeling a lot of the same feelings. Economically, we must embrace a new normal. Small business owners are now adapting to these changes. I have been watching it across multiple industries and many have surprised me by their creativity. Learning to look at things differently and adapting to change can be very beneficial to the small business owner.
I can’t help but wonder if this is a good time to consider small business buyouts. Would this be a beneficial growth strategy? We hear about this all the time with large corporations, but is it smart at the small business level?
Acquisition of a Small Business
According to McKinsey, “acquisitions as a growth strategy can be used to meet many business goals. A business owner may want to acquire a competitor and consolidate their market. It may also make sense to acquire a new product, which you can then scale. It may be faster and cheaper to acquire a competitor that has better technology, so you don’t have to build the tech yourself. Lastly, you may identify a business that you believe you could grow substantially and turn into a winner. All of these strategies should be on the radar for small business owners who want to grow their companies.”
Identifying a business you believe could grow right now, after we are through this COVID-19 pandemic, may be a smart move for your company.
Do you have a company in mind? Start with a solid plan and investigate. Investigative due diligence refers to the research and analysis of an individual or organization done in preparation for a business transaction. A proper due diligence check list covers corporate filings, finance, operations, management and employee health, just to name a few. This occurs after preliminary discussions have taken place between the parties involved.
Online Background Check
But, sometimes things are not always as they appear to be. Conducting a thorough online background check on a business and key owners/executives may either give you the confidence to move ahead or justify a pause to collect more information.
More and more documents are stored online and are open sourced; you only need to know and understand where to look.
I will be writing more on this subject in the weeks to come because I think it is valuable information right now. We are seeing a rise in this type of online research and if you would like to discuss this further, please feel free to reach out.
Could Linkedin be an OSINT analyst’s secret weapon? Whenever we speak to Private Investigators about OSINT techniques, we always point out that each social media platform can be used like a search engine. Trial and error is the course of action many of us experience when searching for a business or person in social platforms and Linkedin is not an exception. This can be time consuming but if you hit it right, it can reveal a lot about a business or person. Linkedin indexes pages within the platform to Google.
Facts About Linkedin
As of 2017 Linkedin got rid of their advanced search option.
There is a difference of what you will uncover if you have a free version vs. paid subscription.
You can use Boolean Search techniques.
When I conduct manual searches, I like to use whatever string of words I can to highlight, right click and search Google. The same holds trues when you are in LinkedIn. In other words, don’t be limited to the name of an individual or their profession. Another rule of thumb here is to think outside the box. Not everyone puts their title in their description field. In fact, many people will place all kinds of info there, depending on where they are in their career.
This result was found by searching “looking for a new opportunity” in Linkedin. It is a good example of what I am referring to.
Recently, a team member was working on a potential fraud case for a client. The individual was a Pharmacist. He did not list his name as “John Doe”, rather he used his middle name. He listed himself as “Ryan J. Doe” and instead of using “Pharmacist”, he used Pharm. That was a tough one, but when someone doesn’t want to be easily found, they will use all kind of name combinations. When I search for a white collar professional, and I can’t find a Linkedin profile, I figure something is off. That is when further digging can really pay off.
Many times the photo that a person uses for their Linkedin profile. they use in other spots on the web as well. Take advantage of that by doing a reverse image search on your POI.
The above example shows my photo being linked to an article in Customerthink.com , where I commented on the article written by someone else. This is also an example of how you can find information in the deep web. A recent blog post, “The Devil is in the Details” explains more about deep web searches.
One thing we know for sure; cyber criminals attack corporate executives. The bigger the company, the higher the stakes. Mid-size companies may also be a target because those executives are time poor & money rich. It is exactly that space that I believe Investigators have their biggest opportunity to grow their business by offering this protection. You may have even had opportunity to conduct this research for a client or two in your own experience. But doing an OSINT sweep once a year may not be enough. I would suggest an ongoing program and will walk you through how to pitch this to your business clients.
Understanding the Treat
Price Waterhouse Cooper (PWC) ‘s recent report, “23rd Annual Global CEO Survey,” reveals that around 80% of CEOs have changed their online behavior due to potential risks. Corporate Espionage is alive and well and needs to be taken seriously as more and more employees overshare in social media. This allows for competitors to gain excellent insight into a vast array of information that would not otherwise be easily obtained. Banning employees from using social media at work has proven to be a nightmare and monitoring their social media internally has major privacy concerns. However, when approached correctly this type of monitoring is very valuable to any business regardless of their size.
The Challenge of Balance
What makes this tricky, is that the company still has the responsibility to keep their employees safe, protect assets and data, mitigate risk for threats of fraud and monitoring reputation. High level executives travel to areas of the world that do not share the same security measures we do in the United States. All of this coupled with cyber security risks and you have a recipe for a potential disaster. In the photo below through the software we use, a Global Awareness search allows us to see natural disasters (i.e. earthquakes, fires, hurricanes,) as well as public security incidents’ in real time. A company’s HR team may wish to set a global awareness query around the area of travel and within the appropriate time frame. Real time alerts are set in place for immediate notification of potential risk.
In a nutshell, there are proactive steps that can be put in motion to ensure the safety of everyone.
The scams have begun around COVID-19 and it appears to be just starting. When people are hit with diversity, sadly we begin to see the good, the bad, and the ugly. In fact, Americans have lost over 12 million dollars to Coronavirus scams already. The concentration in South Miami has been because of numerous complaints. This alerted the US Attorney’s Office to launch a task force in connection with local authorities to combat this growing problem.
Education is the best defense and law enforcement is doing just that with a series of community alerts, media reports and social media posts. Alerting the public to the risks early in an attempt to counteract the schemes.
In one of our latest blog posts, Crime Never Sleeps COVID-19 Online Schemes & Insurance Fraud, we alerted our Private Investigators to what we were seeing as emerging trends in the insurance industry. Below, is a set of scams targeting individuals.
Here are some examples of COVID-19 scams, reported by Sabrina Lolo, of West Palm Beach News:
Unlawful Hoarding and Price-Gouging: The Department of Health and Human Services (HHS) has designated certain health and medical resources necessary to respond to the COVID-19 pandemic as “scarce,” including respirator masks, ventilators, and other medical protective equipment. These designated materials are subject to the hoarding prevention measures that trigger both criminal and civil remedies.
Testing Scams: Scammers are selling fake at-home test kits or going door-to-door performing fake tests for money.
Treatment Scams: Scammers are offering to sell fake cures, vaccines, and advice on unproven treatments for COVID-19.
Supply Scams: Scammers are creating fake shops, websites, social media accounts, and email addresses claiming to sell medical supplies currently in high demand, such as surgical masks. When consumers attempt to purchase supplies through these channels, fraudsters pocket the money and never provide the promised supplies.
Provider Scams: Scammers are also contacting people by phone and email, pretending to be doctors and hospitals that have treated a friend or relative for COVID-19, and demanding payment for that treatment.
Charity Scams: Scammers are soliciting donations for individuals, groups, and areas affected by COVID-19.
Phishing Scams and Cyber Intrusions: Scammers posing as national and global health authorities, including the World Health Organization (WHO) and the Centers for Disease Control and Prevention (CDC), are sending phishing emails designed to trick recipients into clicking on a link or opening an attachment that downloads malware that steals the user’s credentials, such as usernames, credit card numbers, passwords, and other sensitive information usually stored in internet browsers.
App Scams: Scammers are also creating and manipulating mobile apps designed to track the spread of COVID-19 to insert malware that will compromise users’ devices and personal information.
Investment Scams: Scammers are offering online promotions on various platforms, including social media, claiming that the products or services of publicly traded companies can prevent, detect, or cure COVID-19, and that the stock of these companies will dramatically increase in value as a result.
Stimulus Check Scams: Scammers are contacting people over email and are telling them that their check, as part of the stimulus package responding to COVID-19, is already waiting for them and that all they need to do is to provide personal information, such as bank account numbers and Social Security Numbers, which are the key pieces of information needed to perpetrate identity theft.
Other scams include fraudsters claiming to work for the government or banks/credit cards and offering assistance for student loan relief, foreclosure or eviction relief, unemployment assistance, debt relief, and direct financial assistance, like government checks.
Anyone who believes they were a target or victim of fraud, or knows about any hoarding or price-gouging of critical medical supplies, is asked to report it to the National Center for Disaster Fraud Hotline at 1-866-720-5721 or disaster@leo.gov.
Sadly, in times of crisis, some people use it as an opportunity to make money. COVID-19 is not an exception to that rule, and the FBI is already seeing a rise of Coronavirus fraud schemes. The FBI is warning Americans to be especially careful during this pandemic hitting our country. Always check your sources when receiving an unusual email. Do not click any links that appear suspicious.
Insurance Fraud
As business owners and employees are starting to learn what is covered under insurance and what is not covered, panic is setting in. Couple the fact that many people are out of work for an infinite amount of time, desperation can set in. People begin to do things for money that they never would have under normal conditions. We found this to be true in the beginning of the Great Recession.
According to to the FBI, “The total cost of insurance fraud (non-health insurance) is estimated to be more than $40 billion per year. That means Insurance Fraud costs the average U.S. family between $400 and $700 per year in the form of increased premiums.” This is something that affects all of us one way or another.
If past behaviors are an indicator, we know that we are most likely going to see a surge in insurance fraud. SIU Investigators are going to be overworked in the months ahead. A surge in slip and fall cases for example will occur. The claims are bound to pile up.
Online & Social Media Research
As a company who specializes in online research for fraud assessments, I can not emphasize enough how important it is to conduct your research as soon as possible. What is here today may be gone tomorrow . People will begin to clean up their social media posts.
If you think that Google and Facebook are all you need to check, you could run the risk of losing your client or employer a lot of money. When steaks are as high as this, a deep web search will serve you best. That is because people love to share online. They may leave crumbs that lead you to the exact place you need to be.
In conclusion, it is an excellent time to get in front of your insurance clients to let them know you are there and ready to go if and when we start seeing fraud increase over the next months.
Social media continues to be a major business disrupter. For the last decade most companies and brands have been working like crazy to figure it all out. From social media marketing to social hiring reports. How does it all work?
Which platform should we use to market? What is the ROI? How can we keep track of our online reputation? The waters get murky when it comes to hiring employees and screening their social accounts. Yet, so many HR professionals continue to conduct unethical searches and find themselves in compromising situations. Should we screen employees social media prior to hiring? How is that different from the background checks were already conducting?
Just last week it was reported that an Amazon employee was fired for reporting that her supervisor instructed her to “scour social media on applicants to determine race and gender. ” She did not feel this was the correct way to do this, and notified management. She was terminated. The ex-employee has since then filed a lawsuit against Amazon for wrongful termination among other things.
Many times we hear HR executives say that they do check social media on applicants and don’t give it too much thought as to the legality of it all. According to the Society for Human Resource Management (SHRM), HR execs recruit candidates for specific jobs using social media, up from 56 percent in 2011 and 34 percent in 2008. Using this as a recruitment strategy is different than using it to determine employment, however.
The Right Way to Conduct Social Media Background Checks
This varies from state to state, however for the most part be aware of the following red flags that are allowed under FCRA compliance:
Racist, Sexist, or Discriminatory Behavior Sexually Explicit Material Threats or Acts of Violence Potentially Illegal Activity
Developing a social media policy for your company is a great first step. This way everyone is on the same page when it comes to remaining fair to all applicants.
Never ask for passwords.
Include this as part of your background check policy and clearly state it for all applicants to see and agree to.
Use an outside agency.
Reputation management and workplace safety are just two of the three top reasons companies seek out social media background checks.
At eChatter we use software that is FCRA compliant. Results generated by our staff are in line with federal and state specific laws. However, we don’t stop there. Avoid a PR nightmare by monitoring social media once employees are hired, to protect employees from toxic behavior in the workplace. What starts at the office, sometimes spills into social media and vise versa.
Public Government Data, public government reports, budgets, hearings, telephone directories, press conferences, websites, and speeches. Although this source comes from an official source they are publicly accessible and may be used openly and freely.
Professional and Academic Publications, information acquired from journals, conferences, symposia, academic papers, dissertations, and theses.
Commercial Data, commercial imagery, financial and industrial assessments, and databases.
OSINT Resources Reveal the Details From the Deep Web
Many times our clients want to better understand the difference between a social media scan and a deep web scan. Taking a close look at the image above explains a lot and kind of surprises most people in terms of the data on the web that is openly available.
eChatter Case Study Examples of Deep Web Details
Recently, we were trying to find out whether a POI (person of interest) was married. He had no Facebook clues other than he was in a relationship. After conducting a deep web scan we found a local newspaper article in which he was named along with “his wife”. The wife chose to keep her maiden name.
A deep scan was ordered by a client to determine what happened to a deceased person’s body. We found an association letter that was published online indicating the person was cremated and buried at sea.
A client needed to know if their POI had any business affiliations that wasn’t disclosed in a divorce settlement. After a deep scan was conducted, we located quite a few businesses tied to the POI.
Does it always work out this way? Not at all. Mainly because some people are much better at hiding this than others or because they were advised to delete everything online by advice of counsel. However, these are the kind of details OSINT research is all about. You will not find this in a Google search.
I am pleased to share with you our first guest blog post. It is written by Larry Forletta, owner ofForletta Investigative/ Security Consulting. As a former DEA agent, Larry Forlettahas established many resources in the United States and abroad.
Social media investigations have changed the investigative landscape for private investigators.The forensics have been learned through a series of trial and error, utilizing some of the most popular social media platforms in order to gather essential evidence under the laws of collection. Those who work in this department are sometimes referred to as social media vendors. However, not all social media forensics are the same and they certainly don’t produce the same results every time.
The effective use of social media has aided many investigations already. One investigation that comes to mind is an attempt to extort money from an individual involved with prostitution. By investigating through social media, the individual’s full identity (including name and base of operations in the U.S.) was able to be identified. This investigative information was then provided to state authorities who were further able to identify the prostitution extortion individual.
It’s quite amazing what people continue to share on social media platforms. Despite the fact that there can be real consequences for what gets posted online, even if it might seem like fun and games, people continue to post sometimes incriminating and hard evidence that can be used against them. Americans spend more time using social media platforms than any other internet activity, such as email. Most online evidence is compiled manually by an investigator who might screenshot or archive as needed. If something was sent or posted, perhaps even published, then it can be found and used accordingly.
Even when posts are deleted, they never really go away. Emails can be trashed, and accounts can be removed, yet the data and imprint of what has been put online may be able to be resurfaced with a little help. After all, a private investigator is only as good as their resources.
Our primary social media associate is eChatter, an online global source for social media researchers. They are spearheaded by their president, Kathy Doering, and specialize in a multitude of services including deep web searches and dark web searches. They are professional, communicative, and will get the answers that you need.
More than 95 million photos are uploaded to Instagram every day,(as of November 2019). People love to look at pictures in social media and they love to share them. Most Instagram photos are uploaded in the moment of experience, right from a mobile phone. This can be very telling when conducting an investigation around a missing person, a criminal, or even someone who you are trying to serve papers to. Paying attention to the details of the photo is especially helpful. Who are they with? What is in the background? Can you tell what the weather is like?
As an added feature, Instagram stories was launched in 2016 and allows users to upload photos and short videos that will disappear in 24 hours. Yes, like the social platform, SnapChat. Timing is everything and that is where continual monitoring of a site comes in handy.
Not only can Instagram be helpful in your online research, it is also a great place to promote your business. For now, let’s dig in deeper in this overlooked platform for the investigation world.
Starting with the name one chooses when creating a profile, users are encouraged to use any combination of numbers, capital letters, lowercase letters and underscores. Usernames cannot exceed 20 characters. So, as you can see knowing your POI’s full name may not be of help unless they use it publicly in their profile. A good rule of thumb is that most people reuse their usernames. Chances are if you know one, you will uncover other platforms with the same username in your search.
There are even username generators online that help new users create an username that “gets them noticed”. Spin xo is just one of many sites.
As you can see, finding a POI’s user name can be a challenge. Once you do some digging, and you find the profile, the following searching sites can be used to make digging in easier:
As with every other social media account, marketing dollars are a high priority. In order to get that revenue, the site must show ROI., which includes how may people engage. There are many tools to use for this purpose.
What happened to that social media post you saw yesterday during your recent online investigation? Are you kicking yourself that you did not capture that post when you saw it? It can happen and very often does. The old adage, what is here today, is gone tomorrow, is something that happens all of the time, especially in social media. It may suddenly be changed from “public” to “private” at any point. The user’s entire profile can be deleted at any time. Where will that leave you and your investigation?
Largent V. Reed
Back in 2011 this was not an issue as social media was just starting to grow. In a personal injury lawsuit, Largent v. Reed, the plaintiff claimed that a recent accident had left her with severe physical and mental pain. During the trial, defendants presented her post-accident photos posted to her Facebook profile. These photos revealed the plaintiff was clearly feeling well enough to engage in her daily activities and exercising at her gym on a regular basis.
Fast forward to 2020 and things have changed. People are more aware of what they post and use user names that are different than their real name. Let me give you a recent example. One of our clients requested a deep scan from us for a case that involved fraud. We conducted the scan and produced the report capturing the subject’s Facebook account. Scans include live URL’s as well as screen shots showcasing all publicly available data. Once given to the attorney, he had a question about one of the posts specifically. When attempting to click on the link within the profile post, he came to a dead end. We did capture a screenshot, which in most cases is sufficient for investigative purposes. However, time is critical when conducting this type of research. Looking a little more closely at one of the posts was no longer possible.
Web Preservation
Preserving digital data is something many attorneys are starting to take a serious look at and in some cases are requesting from their private investigators. Judges are getting stricter when it comes to allowing social media as evidence in court. Not all cases make it to court of course, but preserving social media may be that extra step that your clients may want you to take.
Social media posts can be altered quickly, often at the advice of opposing counsel. Be sure not to wait too long to capture the data you need and in some cases, be sure to preserve that data.
In any work environment there is bound to be a whole bunch of dynamics around the office. Too many type A’s in the office could be quite exhausting for example. It takes skill to navigate it all with the help of a good HR department. This is however, very understandable and common to most people.
But what happens when things turn ugly at work? What if someone has it in for a person or even a group of people? Workplace conflict is a very real issue and one that should not be taken lightly. With the mental health issues we currently have in our country, employees should be trained in what to look for and have a safe place in which they can voice their concerns. In fact, many work places are taking a proactive approach by conducting workshops on this topic to teach employees what is acceptable and what isn’t.
Workplace Policy
Developing a workplace policy like the one below is helpful and can be especially important should any legal issues come up.
Under federal law and Department of Labor (DOL) policy, harassment by DOL employees of DOL employees based on race, color, religion, sex (including gender identity and pregnancy), national origin, age, disability, genetic information, sexual orientation, or parental status is prohibited. The Department of Labor does not permit harassing conduct by anyone in the workplace, including contractors.
Taken from the DOL website
Posting it in the lunch room or in a public area would be a great first step. But it does take much more effort on the part of management and prevention is key. Years ago, when a company had a problem within their organization, it pretty much stayed there. Not true anymore, thanks to social media.
Social Media’s Role
What is social media’s role in all of this? Does an employer have the right to monitor employees social media? Can it be cause for dismissal? More and more the answer is yes because it can be a red flag alert that will stop a publicity nightmare down the road.
Where there is smoke there is fire. Social media can be a red flag to other things that may be happening within a department. This was true of a Seattle Officer who showed signs of of violent tendencies on and off social media.
The Seattle Officer lost his job over a collection of social media posts. The post became public by placing a blurb about it on the Office of Police Accountability’s website. The officer included some pretty rough comments about illegal immigration, with an emphasis on endorsing violence. The department issued this statement:
“The department’s ability to fulfill its public safety duties depends on communities believing that officers will treat them equally and with dignity, regardless of their immigration status,” Best concluded. “Your comments suggest that you will not do so. They could have substantial negative consequences to the relationship between members of the Department and those that we serve and showed exceeding poor judgment.”
Additionally, the officer was suspended for escalating another incident to the point where a fellow officer feared for their safety.
As an employee, would you feel more safe knowing your employer was being proactive? When does safety in the workplace trump privacy? Please share your thoughts…
Sexual predators will use any means available to lure innocent kids into doing what they want. The scary part is that they do their homework first. The FBI reported about a man recently, in his 40’s, who actually worked as a youth Pastor to learn how kids talked and interacted with each other. Next he created fake social media profiles to lure boys to take videos of themselves. He was caught and is now in jail.
Video games is another avenue with which predators attempt to communicate with kids and it is perhaps the most dangerous. The reason for this is because parents don’t always understand the nature of the video games their kids are playing. This puts them at a disadvantage and is one reason why the FBI started a school campaign on the dangers of talking to strangers online.
So, what resources are out there to help educate parents and educators help prevent this crime? One great resource we can recommend is Thorn.
Thorn was born in 2012 by Ashton Kutcher and Demi Moore. When they learned about sex trafficking in Cambodia, they started to dig deeper. Its then that they realized it was happening in the US as well.
Today, Thorn is thriving with a lot of wonderful partners and continued education and promotion.
Facebook has adopted Thorn, and created The Stop Sextortion Hub as an additional resource for people. On this site, Facebook offers a great selection of information.
Our success is measured by how many children we’ve helped save, how many cases we’ve contributed to solving and how much harm we’ve prevented. Through focused and persistent effort, we can stop online child sexual abuse.”
From: About us on www.thorn.com
If you are wondering who is most vulnerable, read “Online Predators: What Every Parent Should Know” . Many times parents think that kids are in their room, in their home, playing video games and they are safe. However, there are warning signs parents need to know.
Resources You Need to Know Chatrooms Community by Talk With Stranger is like a social network of strangers. Discuss topics, follow people, chat with people, make friends & share everything for free! We have 1000s of online users waiting to chat from every corner of the world.
Discord is a proprietary freeware VoIP application and digital distribution platform designed for video gaming communities, that specializes in text, image, video and audio communication between users in a chat channel. Discord runs on Windows, macOS, Android, iOS, Linux, and in web browsers.
If you are reading this blog, please share with parents and people who can make a difference. Education is key to stopping these predators.
Facebook is a place for online predators to stalk, engage and eventually lure an innocent kid to meet up in person. We have heard these stories too many times. In this month’s newsletter, we want to cover some areas you may not be aware of, things that Facebook doesn’t really speak publicly about.
Facebook Groups Used To “Friend” Kids: When a person creates a Facebook Group, they have the choice of making it public or private. Facebook Groups can house all kinds of crime from fraud to drugs to sex trafficking. Kids who have a low self esteem or don’t have many friends are the ones who are the most targeted because of their vulnerability. They then get lured in by pimps offering them all kinds of fun and/or material things. Facebook has had numerous lawsuits filed against them over the years because of this. Newsweek published an article on one such case. A child of 12 years old was supposedly groomed online (in social media) for over a year. Facebook now has a very clear policy for this, with excellent resources in case anyone runs across a tip on a victim.
Photos Used For Extortion: A scammer can potentially sift through photos on Facebook, capture and download them and then conduct a reverse image scan to see if any married people are on any dating or swinger sites. They then can use it for blackmail.
Friend Requests: Romance scams are on the rise. Friend requests come in from a handsome man or pretty woman and many people will say yes to the request. Sometimes it may show that he or she is friends with some of the people they know, which makes it all seem more believable. Next comes the “online courting” stage and pretty soon they are asking for money. Catfishers set up elaborate fake profiles to make them appear to be real which hooks someone looking for love online.
Facebook Fraud: Targeting young women, a scammer once again took Facebook images of a victim and then created a post that said she was missing. Then 20 of her friends were duplicated and her “missing’ post was shared on all of their fake profile timelines. The scammers then blocked the real Facebook profiles so the victims couldn’t even see the fake profile of themselves.
We live in a world where we feel the need to share everything…pictures, job status, when and where we are going on vacation, where we ate dinner…and the list goes on and on. So much of our personal information is available to the public, and that’s not a good thing. Between Facebook and Google’s data collection policies and the rise in identity theft, now would be a great time to clean up your digital footprint. You’re probably saying to yourself, “I use strong and unique passwords. I mark sketchy emails as spam. I lookout for phishing emails. I’ve got Cybersecurity 101 down pat.” But with new threats popping up all the time, there are more in depth steps you can take to protect yourself. And the most important one of all: Clean up your digital footprint.
Most people have old email accounts floating around, forgotten flash
drives in a drawer, and years of downloads taking up space on a computer. Believe
it or not, holding on to accounts and files that you don’t want any more
needlessly exposes you to all sorts of risks. Your devices can be lost or
stolen (or hacked), and big companies can suffer data
breaches that incidentally expose your information. So the less
there is out there, the better off you are. “The physical presence of data
is so small that sometimes we don’t think about it as being clutter,” says
Michael Kaiser, executive director of the National Cyber Security Alliance.
“But we accumulate massive amounts of it, and some of it can be harmful if
it gets lost or stolen.”
Here are some tips from experts on how to clean up your online
data and improve your privacy:
1. Delete or Deactivate your Online Accounts
Think about all the shopping, entertainment and social media
websites that you’ve registered an account on. Big ones like
Facebook, Twitter, and Instagram are easy to remember (or they instantly log
you in with a saved password), but the chances are that you won’t be able to
remember every single account you’ve ever created. To delete most accounts, go
to your account settings and look for an option to deactivate, cancel or remove
your account. Most of the time it won’t be easy to find because they don’t want
you to leave. They may even offer you an incentive to remain a member.
2. Cancel
those App Accounts
Now that you’ve deleted your online accounts, time to delete your
app accounts. Look for apps on your phone and tablet, streaming devices, gaming
consoles, and computer that you don’t use anymore and shut them down. Do you
still have an account with a messaging app you used once two years ago? Why is
that calorie-counting app from 2014 still on your phone? Cancel and delete.
That type of exposure is an unnecessary risk. But just because you deleted if
off your phone, doesn’t mean it’s gone forever. Make sure you clean out and
close your account with the app developer so it retains the smallest amount of
data possible about you. Closing an account doesn’t mean that a company deletes
all your data or eliminates the basic things it knows about you, but it keeps
the account from staying active and potentially continuing to collect data.
3. Email
Accounts
The most important account to consider is your email, the central
data hub of your online life. Your email account is a valuable prize for a
hacker, because it contains information about tons of other people (friends,
family members, coworkers) in addition to yourself. Deleting emails you no
longer need and exporting old emails you still want to the cloud or a hard
drive is a smart way to reduce what would be compromised if your email was ever
hacked. Virtually all email services offer ways to export your messages
and other account data so you hold it locally and can delete it from the
company’s servers. And don’t forget to delete old email accounts that you no
longer use.
4. Destroy
Old Devices
First, let’s address the physical devices. Destroy old CDs, flash
drives, and external hard drives you don’t need anymore. Also consider old PCs,
gaming consoles, and smart home gadgets…just make sure you back up anything you
want from those devices before wiping them. Next, sort through your computer desktop
and clean out your documents folder. Eliminating old PDFs of credit card
statements or medical forms that you no longer need will go a long way toward
keeping you safer.
We’re
not telling you to part with data that is personally meaningful or useful, the
goal is to pare down what you have so if your data is ever compromised, hackers
aren’t able to easily access names, birthdays, and Social Security numbers. “When
we talk about security, we often talk about protecting our own things,”
Kaiser says. “But in reality, in the digital world we actually do sit on
large amounts of information about other people, and that’s something to
consider with decluttering and storing data more securely.”
5.
Survey the Scene
Take a step back and try to think of anything you might be
forgetting. Most email systems have search features allowing you to comb
through your old messages. You can bulk-delete everything from before a certain
date or everything from a particular contact. You should also regularly search
your email for the last four digits of your Social Security number and delete
any messages it appears in. “Think of the information you have
saved,” the United States Computer Emergency Readiness Team notes. “Is there banking or credit card account
information? Tax returns? Passwords? Medical or other personal data? Personal
photos? Sensitive corporate information? Depending on what kind of information
an attacker can find, he or she may be able to use it maliciously.”
Privacy Tips
Now that you’ve cleaned up your online data, here are a few tips to help maximize
your privacy in the future:
Instead
of WhatsApp or Facebook Messenger, consider using an encrypted open-source
messenger app such as Signal or Telegram.
Delete
unnecessary accounts and think carefully about making new ones
Use
encrypted email services like Protonmail and Disroot
instead of Google, Yahoo, and Microsoft email
Extended time on social media makes it easier to escape into the lives of others — and find solace in former flames.
Is
social media to blame for all of cheating that happens over the internet? Would
relationships end if it weren’t for social media? Yes and no. While infidelity
is going to happen whether you are online or not, social media has sure made it
easier. In fact, Facebook plays a central role in modern
infidelity.
The average user spends 50 minutes a
day on the site, more time than they do on any other leisure activity
except for watching TV or movies. Extreme amounts of usage have been shown to
skew perceptions of reality and enable secret communications.
Sex and family therapist Jaclyn Cravens Pickens, who is also the director of
Texas Tech’s Addictive Disorders and Recovery Studies Program, has studied the
relationship between infidelity and
social media for almost a decade and shared her findings in such papers
as Facebook Infidelity: When Poking Becomes
Problematic and Fooling Around on Facebook: The Perception
of Infidelity Behavior in Social Networking Sites. She says that
Facebook and other social media platforms encourage cheating by offering
a false view into people’s lives. “The
majority of people going online aren’t posting about their woes or their
struggles,” Cravens says. “It’s mostly ‘I’m on vacation,’ or ‘I did this wonderful thing,’ or ‘Here’s this great
meal that I’m having.’ This version of life often looks more attractive than
the unedited real one of the person scrolling through the feed. “If you’re
doubting your relationship or your own happiness,
you go to Facebook and you look at somebody else, you may think, ‘Wow, they
have it all together,’ ” Craven says. “ ‘They’re this happy, attractive
person.’ ”
This phenomena also supports the phrase “the grass is always greener”. What
might seem amazing and “meant to be” is what happens at the beginning of every
relationship…the butterflies, the excitement, the newness of a developing
connection. But just like all relationships, that will wear off and we are left
with the issue of maintenance. Daily life starts to take a toll and the onset
of reality sets in. The internet is great at producing false pretenses of
perfect relationships…meaning unrealistic and unmaintainable.
Facebook
makes reuniting with old flames all too easy. Now there are high school reunion
groups, mutual friends that pop up, or suggested friends based on people you
know or places you frequent. And thanks to social media’s algorithm, it’s
likely to put your ex’s photo at the center of your computer screen. When that
happy, attractive person is someone with whom you’ve already shared an intimate
connection, people are even more inclined to connect. “I’ve seen couples who’ve
been married for 15 to 20 years getting on Facebook, reconnecting with old
flings from high school that they hadn’t seen in forever,” says Cravens. “It
starts as an innocent conversation of ‘How’s life? What have you been doing the
last 20 years?’ ” Cravens says. “Very quickly, over computer-mediated
communication, it develops into ‘Well, marriage is
hard and I’m not happy.’ ‘Oh, no, neither am I.’ ”
Once
you have made this intimate connection with the person on the other end of the
keyboard, things can accelerate quickly. Sometimes, a smirk emoji is just that.
But other times, it can be that first step into opening communication with
someone. Photo reactions, comments, or emoji usage allow people to gradually
lure in potential future romantic partners. It’s low-commitment communication
signaling that while someone isn’t interested in doing anything drastic anytime
soon, they want to keep their options open. It’s the phenomenon researchers
have termed “back burners.”
“Back burners are the people that you are attracted to, that you keep in touch with just in case your current relationship situation either fails or changes,” says Dr. Jayson Dibble. Dibble is assistant professor of communications at Hope College and the researcher who coined the term “back burner.” In his 2014 study, Using Modern Technology to Keep in Touch With Back Burners: An Investment Model Analysis, Dibble found that, while men are likely to have nearly twice the number of back burners as women, both genders have them. Of the more than 300 people surveyed for the study, nearly all of them said they’d had sexual conversations with at least two people outside of their partner.
Dibble says it’s well-established in social psychology that even people who are happily involved in committed relationships still consider their options. So while someone may have no intention of leaving, they still search the horizon. “Your scanners are still on,” Dibble says. “Even if they’re dulled and blunted a little bit, they’re still on, they’re still kinda noticing who else is out there, if for no other reason than you want to remember, or you still want to know that you got the best deal.”
Social
media has a way of triggering that ‘What if?’ question, distracting you from
your own relationship, making it
harder for you to be fully present. People don’t set out to cross a boundary or
set the groundwork for an affair behavior, but internet communication makes it
easy to tumble into. “When you’re behind a keyboard, you have time to cultivate
the perfect response and be the best version of yourself,” Cravens says. “Or
even a version of yourself that in real life doesn’t even exist.”
Does
that mean that everyone on social media will cross the line? No, but infidelity
is breeding at an alarming rate. Not to mention that apps that help you hide
what you do online. The best thing to do
is discuss with your spouse or partner what the rules or boundaries are for
Facebook and social media use. There are many happy couples who use social
media with no issues.
Social
media is often used to paint yourself in a different light…it can make you
seem more popular, more successful, and happier than you really are. In other
words, you can take on any persona you want, and quickly develop a following of
fans who want to be just like you.
So
it’s no surprise that gangs use social media to recruit new members and
intimidate rival groups. In the view of
police officials, today’s gang violence is largely fueled by social media,
which is used to taunt and threaten rivals, or the result of beefs that can
span years, involving not just gang members, but their families and friends, as
well.
Police have tried
different strategies for reducing the violence, from monitoring gang members’
online activity to visiting the homes of friends of homicide victims to talk
them out of seeking retribution.
The
ever-expanding reliance on social media has for gang-related criminal activity has law enforcement scrambling
to stay ahead of emerging trends and platforms. “If your law enforcement agency
has yet to incorporate social media investigations as a routine step
during your investigative process, your agency is falling behind and missing
out on a gold mine of intelligence gathering,” according to Aaron Concepcion, a
correctional sergeant in New York with 15 years of service, five of which
as the head gang investigator assigned to an intelligence center.
SOCIAL MEDIA PLATFORMS
Over the
past 20 years there has been an increase in the use of social media by street
gangs. According to the National Gang Investigators Association, the most
popular platforms are Facebook, YouTube, Instagram, Twitter, Snapchat, Google,
Flickr, WhatsApp and kik.
It’s now
called “cyberbanging”
and gangs use the broad reach of social media to recruit new members,
intimidate rivals, promote criminal activity, advertise their brand,
communicate between members, brag about accomplishment to validate street
credibility/dominance, and antagonize rivals.
In
gang-plagued Chicago, Lamanta Reese, 19, was gunned down in May 2017 after
posting a YouTube video disparaging a rival gang, which included a possibly
misconstrued emoji that his shooter believed was an insult against his mother.
The
Mexican cartels, specifically Los Zetas, have tracked down and
murdered at least four bloggers posting opposition. This includes a 39-year-old
woman who was decapitated and two men hanged from an overpass with a sign
saying, “This is going to happen to all internet snitches. Pay attention, I’m
watching you!”
ONLINE TOOLS FOR LAW ENFORCEMENT
Because
of the increased use of social media, law enforcement is stepping up its game in
an effort to conduct surveillance and interdiction operations. The new
generation of tech-savvy millennials joining the ranks of law enforcement are
more in tune with social media trends. Concepcion says he has utilized a wide
variety of online tools: “There’s no one-stop-shop or sole technique for mining
information online. You might find success with a particular technique on one
case, and then find it unsuccessful on another,” he said.
“You
would be surprised at the amount of information you can acquire by simply
running a name on Pipl.com,” said Concepcion. While
most gang members rarely use their real name on social media, searching the
profiles of their family, friends and visitors who are less cautious often
leads directly to the suspect or provides valuable intelligence.
SOCIAL MEDIA SURVEILLANCE
There is
no shortage of operational successes utilizing strategic social media
monitoring. In June 2014, NYPD used 1 million Facebook posts in its largest
recorded gang raid when officers stormed the General Ulysses S. Grant and Manhattanville
housing projects in West Harlem, arresting 40 suspects charged
with crimes including murder, assault, and conspiracy in a 145-count
indictment.
Another
successful case comes from San Diego, California, where members of the West
Coast Crips were arrested after some posted selfies that were taken at
murder scenes to Facebook; 56 gang members were charged with racketeering and
conspiracy to distribute drugs and guns.
“Mining social media may not always hand you a home run like the above cases, but it can provide you with pieces of the puzzle, like a photo for facial recognition, gang affiliations, associations or current locations,” said Concepcion.
Concepcion
suggests departments choose at least two officers and begin sending them for
training. Next, start searching for suspects they’re already familiar with and
continue mining for information. “If there is a particular gang in your area,
I’d research and decipher their lingo, as well as read through their lessons if
possible,” he said. “You can execute a simple hashtag search on google or
Instagram using the same lingo such as #MS13 #BlazingBilly.”
Create
files and utilize programs like the snipping tool that comes with most
Windows-based computers, and take screen shots as you go. Using the snipping
tool also saves the date and time stamps your activity. There is no doubt you
will come across pages with photos of familiar suspects, guns and drugs. Your
biggest issue will not be finding the activity, but organizing the information
and identifying the suspects.
Social Media Investigations has been known to take an unbelievable amount of your time or that of an employee. Facebook searching is one of the areas that can be the most confusing but can harvest some of the best results. Either way, it can cost you money and you may not even reap the rewards of the time spent.
A good Social Media Investigation Strategy begins with a thorough understanding of each of the platforms you are using in your research. “You don’t know what you don’t know”, sort of thing. 2019 will be the year that goes down in history as the year of privacy, which makes social media investigations even more difficult, but not impossible.
One of the very first things to take a look at when beginning to use a social platform for search purposes, is their privacy settings. This way you know ahead of time exactly what you are up against. In this post, we are going to go over two privacy areas that often get overlooked.
Facebook Minor Privacy
Minor privacy in Facebook is taken very seriously, as it should. Take a look at the privacy clearly stated in Facebook:
Facebook Minor Policy
While searching for a Minor in Facebook is allowed, you may not be privy to the type of information you are looking for. Today’s Tweens and Teens are very good at hiding in social media, which makes our jobs even harder.
Facebook General Privacy
Facebook’s Privacy Setting
Who can look you up using the phone number provided?
This is quite specific and one you may not have even realized existed. When we think about privacy settings, we think about a few questions to answer and it’s done! Not so with Facebook as you can see. This is where a lot of confusion can come in when it comes to mining social media. Any person may have certain aspects of their profile public, while others are set to private.
Do you want search engines outside of Facebook to link to your profile?
Can’t find the social media profile in a Google search? This may be the reason why. Searching in Facebook is key to overcome this setting. Search in a number of ways – think outside the box.
So, how do you know if your person of interest has these privacy settings in place ? You won’t ever know. You just have to find ways to work around it.
Be sure to subscribe to this blog to stay up to date about the details of social media investigation that can save you time and money.
Nextdoor, Citizen, and Amazon Ring…these are the apps responsible for what used to be called “citizen’s arrest”. These apps, which allow users to view local crime in real time and discuss it with people nearby, are some of the most downloaded social and news apps in the US, according to rankings from the App Store and Google Play.
While it’s important to know what is going on in your community, and more specifically, your neighborhood, has it made us paranoid that everyone is out to get us?
Before you download these apps, let’s look at the good, the bad, and the ugly.
Nextdoor
According to the website, Nextdoor is “the best way to stay in the know about what’s going on in your neighborhood—whether it’s finding a last-minute babysitter, learning about an upcoming block party, or hearing about a rash of car break-ins. There are so many ways our neighbors can help us. We just need an easier way to connect with them.”
When I first learned about Nextdoor, I thought, all I need is another app on my phone. And I actually avoided it for a while. But after seeing multiple neighbors post comments, questions, and suggestions, I decided I might as well give it a try.
Most of the posts involve recommendations for lawn care, home maintenance or repair, local hotspots, missing pets, and the like. But more recently there have been a string of posts regarding robberies, break-ins, and more alarming incidents such as lurkers at a local playground.
While I appreciate being kept abreast of everything going on in our community, is it making us so leery and suspicious that we assume everyone has negative intentions?
In the US, Nextdoor has worryingly been accused of being a hotbed of racial profiling and bigotry, having been called out by the black news and opinion site The Root for the way users report people of color in their neighborhood as being suspicious.
But there is a silver lining in all of this…Nextdoor residents are quick to help one another in times of need. During the recent Hurricane Dorian event, one post from the Nextdoor app by a resident of the “Cork Vicinity” of Central Florida reads—“Anybody know where there’s water?” In less than 23 hours more than 50 helpful neighbors recommended 28 nearby neighborhoods where water might be found and encouraged other creative solutions like filling up five gallon buckets with tap water, and even catching and purifying rainwater.
Citizen
Citizen, which was previously titled Vigilante, encourages users to stop crimes in action…by sending 9-1-1 alerts for crimes happening nearby. It also allows users to livestream footage they record of the crime scene, “chat with other Citizen users as situations develop” and “build out your Inner Circle of family and friends to create your own personal safety network, and receive alerts whenever they’re close to danger.”
According to their website…”Our mission is to keep people safe and informed. We believe everyone has the right to know what’s happening inside their communities in real time, and that transparency can drive change for the better. Citizen users are empowering the city of the future, building new ways to bring people together, creating a safer world, and democratizing 911.”
Amazon Ring
Amazon has recently thrown its hat in the ring — with Ring. It recently advertised an editorial position that would coordinate news coverage on crime, specifically based around its Ring video doorbell and Neighbors, its attendant social media app. Neighbors alerts users to local crime news from “unconfirmed sources” and is full of Amazon Ring videos of people stealing Amazon packages and “suspicious” brown people on porches. “Neighbors is more than an app, it’s the power of your community coming together to keep you safe and informed,” it boasts.
New Found Fear
It’s natural for people to want to know more about the world around them in order to decrease their uncertainty and increase their ability to cope with danger,” says David Ewoldsen, Professor of media and information at Michigan State University. “You go on because you’re afraid and you want to feel more competent, but now you’re seeing crime you didn’t know about,” Ewoldsen said. “The long-term implication is heightened fear and less of a sense of competence. …It’s a negative spiral.”
“Focusing on these things you’re interpreting as danger can change your perception of your overall safety,” Pamela Rutledge, director of the Media Psychology Research Center, told Recode. “Essentially you’re elevating your stress level. There’s buckets of research that talks about the dangers of stress, from high blood pressure to decreased mental health.”
These apps are particularly scary since they’re discussing crime nearby, within your neighborhood or Zip code. And the issues are compounded by the media, Ewoldsen says. “If you see more coverage of crime you think it’s more of an issue, even if real-world statistics say it isn’t,” Ewoldsen said.
What do we do about it?
[ctt template=”4″ link=”fnfg3″ via=”no” ]“We need to pay attention and to be more mindful in our consumption of the news,” he said. Turn off notifications for crime that’s not happening around you. Research or read respected sources of news before jumping to conclusions. Be aware of how other people’s biases and those of their fellow app users could skew reporting and the reaction to that reporting.[/ctt]
“It would help if they eliminated all unverified reports,” Rutledge said. In practice, however, this would mean having to verify crimes before they could be posted, which would be very difficult if not impossible.
Influencers are everywhere…on television commercials pushing certain brands, on the radio talking about products they use, and now on social media…which is probably the most impactful means of marketing nowadays.
What exactly is an influencer? It is an individual who has the power to affect purchase decisions of others because of his/her authority, knowledge, position or relationship with his/her audience. Influencers in social media are people who have built a reputation for their knowledge and expertise on a particular topic. They make regular posts about that topic on their preferred social media channels and generate large followings of enthusiastic engaged people who pay close attention to their views.
Brands love social media influencers because they can create trends and encourage their followers to buy products they promote. But influencer relationships are now being questioned due to the rise in influencer fraud – a dilemma that occurs when paid tastemakers use artificially inflated follower numbers to increase their asking rate for engaging their audience on behalf of a brand. While this used to be an isolated incident, it is now spreading rampantly throughout social media. According to a Points North Group study, up to 20% of mid-level influencers’ followers are likely fraudulent.
How to Spot Fake Influencers
Sniffing out fake Instagram influencers is sometimes an easy task – find a profile with two posts and a million fans and it’s definitely filled with Instagram fake followers. Other times, you have to consider the account as a whole and separate what looks real from what appears to be fake.
1) Followers to Following Ratio
Influencers typically follow 1-5% of their following. If the ratio is much higher than that, it could be due to cheap growth hacks. For example, some Instagram users will follow anyone and everyone to get a courtesy follow in return, then unfollow a bunch of people all at once.
2) Quality of Followers
Influencers with fake followers will have a bot-heavy followers list. If you look at their list and discover many of their followers have private accounts or no profile photos, chances are they’re from a paid service to boost engagement numbers.
3) Content to Followers Ratio
Most accounts with a few posts and a ton of followers is fake. Real influencers have been posting on some sort of reliable schedule for the past several months or years in order to earn their followers. True audiences aren’t easy to acquire–they only come from regularly engaging a targeted audience with quality posts over time.
4) Life of the Account
Look at the total time the account has been open, not just how much has been posted. If an account is brand new and has a huge follower base, that should be a warning sign. It is possible that an influencer gets a sudden spike of followers because of an Instagram feature, press coverage or a viral post. Dig a little deeper to find out if this is the case.
5) Quality of Engagement
Generic comments like, “Love this!” or “Epic!” are often from bots, not real fans. A telltale sign is when the comment doesn’t accurately reflect on the image, like, “Delicious!” for a picture that’s not food. Quality comments are personalized and more thorough, and the influencer will reply to a handful of them.
6) Additional Websites and Accounts
Influencers should have some type of non-Instagram presence, either through other social media accounts or a personal website. Search for them on Google, too. Their name should pop up somewhere, preferably in an article that ranks influencers or in an interview with them.
Instagram also has a built-in tool for verifying influencers. The “About This Account” feature is available on many accounts with large audiences.
7) Hashtag Use
Ever see posts with more hashtags than actual content? And really, who reads every single one of those hashtags? No one! Influencers with a loyal following don’t have to use hashtags in order to get attention. A couple of hashtags are normal, especially branded ones, but using 20 or more hashtags is a sign that that’s how they’re collecting their engagement instead of through a dedicated follower base – bots often search for photos with specific hashtags.
Conclusion
Social media’s power and popularity enable practically anyone to build a public-facing persona, grow a following, and serve as a pitch person for your brand and its content. And influencer marketing can be a rewarding strategy for your brand in terms of networking, reaching your audience, and making a profit. But make sure you carefully vet and select the influencers you want to work with. Build a loyal fan base by posting meaningful content related to your brand. Only then will followers know you are the real deal.
A Sociopath is defined as a person with a personality disorder manifesting itself in extreme antisocial attitudes and behavior and a lack of conscience.
How can one tell if they are dealing with a Sociopath?
Characteristics of a Sociopath
• A sociopath is incapable of feeling guilt, shame, or embarrassment. They also feel no remorse for the damage they do to others. • Sociopaths don’t demonstrate strong feelings or opinions. Don’t expect them to get outraged or fired up over controversial topics because they simply don’t care. • Although most sociopaths are narcissists, they do not discuss themselves in great detail. They prefer to turn conversations back to you in order to reveal your weaknesses or trigger points. By remaining silent or closed off about themselves, they do not risk disclosing information to others. • Typically, a sociopath will pause before answering any questions you may ask them. Most sociopaths are gifted pathological liars who will hesitate before speaking…allowing themselves to carefully choose which lie is most beneficial for them to tell. • Sociopaths are super manipulative and will not hesitate to use you, whether it be for money or attention. From the moment they meet you, they’ll be silently assessing how useful you might be to them. • The sociopath has no sense of love or loyalty. While they may be in long-term relationships and superficially appear to be fulfilling the role of a dedicated partner, the sociopath is talented at living a double life without flinching. They’re often habitual cheaters. • A sociopath is an exquisite liar. They are so talented at lying that should they ever tell the truth, it would appear more suspicious. • Sociopaths appear to be calm under pressure but in all actuality, they just don’t feel anything. You might wonder how they got so good at public speaking or can emerge from a traumatic situation emotionally unscathed. To the sociopath, they experience all emotions from a distance, and as a result, they never feel anxiety or nerves. • Sociopaths don’t care about anything. They may appear to care, but underneath the carefully constructed mask, they feel almost nothing. If somebody dies, even one of their own relatives, their apparent lack of emotion may be shocking.
Dating a Sociopath
[ctt template=”1″ link=”d1ect” via=”no” ]So how do all of these traits play into the dating world? Online dating is a perfect place for meeting a sociopath. Here’s the usual process of how a sociopath relationship plays out:[/ctt]
1) Assessment
Online dating for the sociopath is easy pickings. Your dating profile has clearly highlighted your needs, wants and wishes by describing who you are, what you enjoy, and the things that are important to you. Your photos probably depict hobbies, interests, and things that are important to you. Sociopaths can easily rewrite their own profile to match yours, so that they seem like the perfect partner for you. The sociopath can effectively pretend to be anyone they wish to be, especially if it looks like you are offering what they want.
Of course, not all people on dating sites are predators or sociopaths. But, it is the most obvious place to meet one. There is no face to face contact and they can easily seduce you by email, then phone conversations, more personal texts…until you have succumbed to a relationship.
2) Relationship moves quickly
Sociopaths don’t like competition. After a very short period of contact, the sociopath will try to make you exclusive to them, and only them. They will let you know just how ‘special’ you are to them. Next is trying to find another way to contact you, by connecting with you on Facebook or getting your phone number.
Next comes exclusion…they tell you they think they have found the one and have closed their profile on the dating website. Even though you haven’t really got to know each other, yet, he/she seems incredibly interested in you and it feels good. The sociopath wants to ensure that you are theirs and that nobody else will steal you. Unfortunately it’s not because you are special, it’s to take you off the market.
3) Quick intimacy
Once the sociopath has chosen you, they move to the seduction stage. You feel swept off your feet, your head is spinning, and you may even believe that you have made a true soul mate connection.
Now is the time to ask yourself these questions:
Is this moving too fast?
Am I ready to give out my phone number or meet up?
Does he seem to have so much in common with you?
Is his profile almost a mirror image of your own?
Does it feel like you have known him for a lifetime?
Is he exactly what you have listed in your profile, a perfect match for you?
Does he try to stay over at yours when you meet?
While these things could be an indication of a genuine love connection, they could also be a bigger indicator of a sociopath. So tread cautiously and keep yourself safe online. Keep all correspondence online and do not move to other social networking pages or anywhere that gives further information about you, before you are ready. Otherwise, you could find yourself thinking you have fallen in love with someone before you have even met.
Before you start your search for someone in prison it is important to know some important terms.
Prison – also known as a penitentiary or correctional facility, is a place in which individuals are physically confined and are deprived of a range of personal freedoms. Individuals held within prisons and corrections facilities have been either charged with a crime or convicted of a crime. Individuals who have been charged with a crime are incarcerated until they are brought to trial or released. Those who are officially charged with a crime will remain in a prison or jail facility until they completed the duration of their sentence.
Inmate – a person confined to an institution such as a prison (as a convict) or hospital (as a patient).
Corrections – refers to the supervision of persons arrested for, convicted of, or sentenced for criminal offenses.
How Do You Find Someone in Prison?
1) Try using the website Vine. VINE is a website that lets victims of crime and other concerned citizens access information about offenders. The service is available via the website, a mobile app, and a toll-free number. Victims can register to receive alerts about inmate status changes via phone, email, and text.
To find an offender, click on the “Find an Offender” icon and select the appropriate state. From the next page, enter the incarcerated person’s last name and first name. Alternatively, you can enter their inmate ID number, if you have it. In addition, you can click on the “Advanced Search” link to add other search parameters such as Facility Name, Date of Birth and Age Range.
2) Another option is CheckPeople.com. This website makes it fast, easy, and effective to perform an advanced people search. You can track down old friends, relatives, or classmates. All you need is the person’s first and last name but you can narrow down the search if you know what state they are in. Search results will reveal detailed information including criminal records, civil records, marriage license(s), and more.
How to Find an Inmate in a Federal Prison
To find someone in a federal prison, use the Federal inmate locator. This search tool allows you to search a database of federal inmates who were incarcerated from 1982 to present. Once you find the individual, you can use the Federal prison facility locator to learn more about the specific facility where they are being held. This search provides the details on such things as the type of prison and the security (e.g. minimum security, maximum security, etc.). You can lookup inmates two different ways:
1) First and last name (required) and middle name, age, race, sex (optional)
2) Inmate number from the: Bureau of Prisons (BOP) Register, D.C. Department of Corrections (DCDC), Federal Bureau of Investigation (FBI), or Immigration and Naturalization Services (INS)
How to Check an Inmate’s Background
If you need to learn more about someone who is incarcerated, a BeenVerified Background Check Report allows you to search billions of public records online in just a few seconds. You can search for criminal records, arrest records, bankruptcies and more. In addition, you can find people using address, phone number and email search. BeenVerified offers an easy and affordable way to run a background check.
Federal Prison Records 1982 – Present
The Bureau of Prisons (BOP) maintains records of federal prisoners released after 1982. You can use the Inmate Locator to find out when a prisoner was, or is expected to be, released. To learn more about an inmate, submit a Freedom of Information Act request to the BOP. Also include a completed Form DOJ-361 (PDF, Download Adobe Reader).
The BOP Library provides a wealth of resources on corrections, criminology, and related fields. State and Local Prison Records
For state and local prison records, contact the state or local corrections department. Prison and Prisoner Resources
Following are resources for prisons, correctional institutions, jails, and inmate searches.
• Amnesty International – Amnesty international is a global network of human rights activists who campaign to end abuses of human rights. Their website provides resources, news, and data on human rights abuses around the world.
• Corrections Connection Network – Provides news, data and vendor intelligence for the corrections community. Provides resources, tools and forums for corrections professionals. Also a great place to stay in touch with the latest news about what is going on within the system. Includes links to inmate locate queries for each state.
• PrisonMap.com – PrisonMap.com shows aerial photos of prisons in the United States.
• Prison Policy Initiative – Attempts to document the impact of mass incarceration on individuals and communities in an attempt to improve the criminal justice system. The organization produces cutting edge research to expose harm created by mass incarceration and then sponsors advocacy campaigns to create awareness about the issues.
About Us:
We have been mining social media since 2007 for our clients. By utilizing best in class software programs, we offer a service called eChatter.
eChatter works with you to obtain your objectives in a fast, accurate and reliable facet. By keeping our strengthened principals, yet evolving with this industry, we lead in social media monitoring. Since 2007, we have been dedicated to providing our customers with the most authentic data.
We offer:
• Deep Web Scans
• Jury Vetting
• Jury Monitoring
• Quick Scan
There should be a new reality TV show called, “People Post the Darndest Things.” I think most people would be shocked to see what Social Media Investigators see on a daily basis. It has helped thousands of fake workman’s comp cases because people will post things like jumping off a diving board after filing a claim for an injured back. Remember the guy who “faked” falling in the office cafeteria and it was caught on video?
Images online are a Social Media Investigator’s best friend because once identified as the correct person of interest, it can lead you to much more information and data online. Recently, one such image was discovered by one of our OSINT specialists. While searching online, she discovered the following picture. Something about the image just didn’t look right. This was true given the fact that she had other photos to compare it with.
Using one of our software platforms we were able to search the web for this exact image. We didn’t find one exactly like this, however we did find one that we realized was the original.
Photoshopped image using mirroring feature. Actress Aubrey Plazza
By conducting a reverse image search we found the original image online. This is the image of actress Aubrey Plaza.
Many celebrities deal with this every day and it is a contributing factor in fake news online and in social media.
In Digital Trends‘ article, “Can you spot a Photoshopped picture? Here are 9 ways to identify a fake photo“, Author Hillary K. Grigonis, shares how to become better at spotting a fake.
Three Tips We Love:
Look for bad edges: Cropping around the edges of an object is tough to do. Zoom in on the photo in question and look at the edges of the objects. Overly sharp edges or jagged edges are a telltale sign that the object was simply pasted in over the original photo.
Be wary of poor quality: A low-resolution image file can help hide the signs of a faked photo. It’s difficult to see if the edges of the flag in that Seahawks photo blend because the entire image is pixelated, a good warning sign that something’s not quite right. With the widespread availability of high-speed internet today, it’s rare that an image would be uploaded at such a low resolution.
Look at the metadata: Digital cameras embed “invisible” data inside the image file. While you can’t see the information in the image, accessing it is easy using a photo editor or even free online software.
Are your photos safe online?
For the most part, yes. However, there is a new undercurrent trend online that is growing with social media image sharing platforms like Instagram. Conducting a Google Reverse Image is one way to check to be sure photos are not being used without your approval.
In a recent article , the deep web was clarified – what it is, what it’s not, and why it can be useful. The question that always comes up is, “How can we access it?”
In part, you are accessing it each time you do a Google
search – you’re just not going back far enough through the search results.
Outside of spending hours weeding through page 25 of a search result, how can
deep web searches be more efficient?
1. Google may be a
household name, but it’s not the only game in town. Most people rely on
Google to be their online search companion. Of course Google is the major
player – after all, it’s become more than a search engine – it’s a verb. Don’t
forget about the other search engines, namely Bing and Yahoo. While they may be
considered the red-headed stepchildren, they can still be helpful. Like
software platforms, each of the major search engines has its own algorigthm,
which in turn may produce different results. What Google things is unimportant
may be significant to Yahoo or Bing, or vice versa. Search using a variety of
major search engines to find the most content available.
2. YouTube isn’t just
for music anymore. From music to how to videos to families sharing cute kid
videos, YouTube has become almost as popular of a search engine as Google.
Don’t forget to run searches in YouTube as well.
3. Don’t start at the
beginning. When running a general search using Google, Bing, or Yahoo,
start at page 3, maybe 4. Don’t start with the first page. Those are the
surface web results that you can easily look at later. To get to the deeper
content, you’ll need to start on a later page. You will start to find more
irrelevant results on these later pages too – don’t let that deter you; within those
false positives can be some great information to help in your research efforts.
4. Use more than a
name. Don’t just search a person’s name or their name with a city and/or
state – search using known user names the person created for social accounts,
nicknames, phone numbers, addresses, the person’s name and a family member’s
name, you get the idea. Set up searches that use more specific information and
you may find more information this way.
5. Learn how to search using Boolean. While you’ve likely heard the term and you’re only knowledge of Boolean search is what most of us think of – using AND, OR, or quotes in your search – there is so much more to it. Setting up specific searches in a certain way can bring those deep web results to the surface. We recommend taking a look at the sites below as a guide to learning how to use Boolean searching to your benefit.
Knowing how to search efficiently can help you dive into the deep web and find what you might be looking for. It’s not a scary place, like the dark web, and shouldn’t be confused with that. It’s just a matter of having patience and knowing how to search to access this type of information.
Not too long ago the highlight of our
day was hearing “You’ve got mail!”
Those were simpler times when we didn’t
have to worry so much about offending people with what we posted or someone
sharing our status. But now, social media allows anyone, including students, to
make any part of life much more public. Whether you like it or not.
Politicians, professional athletes, and
celebrities are the most common groups to have their posts shared, retweeted,
and broadcast across social media platforms for all to see. But lately,
students have been making waves. From social justice campaigns, to
controversial photos or videos, students’ social media posts can stir up some
strong reactions.
So what exactly is acceptable when
students decide to take their opinions online? Can students expect to have
their “free speech” protected?
The First Amendment and Online
Expression
In general, students have the right to freedom of
expression unless it infringes on the rights of others, school safety, or interferes with the ability of a school to
deliver its educational services and processes. Thus,
off-campus online expression would be protected in the same way as traditional
speech.
We must protect First Amendment rights of students
while also recognizing that schools do have some ability, under very limited
circumstances, to discipline students for off-campus speech.
But when “free speech” becomes threatening, that’s
when educators need to speak up. Some instances of student social media use,
including that which is off-campus, amount to misconduct that can be
disciplined according to school policy.
Let an administrator know about student
social media use that:
Breaches school policy.
Leads to or creates substantial
disruption to the educational process.
Results in bullying toward students or
staff.
Threatens school violence.
Here are some questions that may help
students decipher what they should and should not do when using social media in
regards to school policy.
Do I have the right to access social media while I’m at school?
Yes
and No. It is up to the school to determine when it is appropriate to
use devices that allow social media access. Some schools prohibit personal cell
phones on campus and others may block certain sites on their computers and
networks. Check your school’s policy to learn the rules.
Are my rights different if I use a school computer or device
instead of my own?
Yes. Most
schools have rules for their own computers and devices that you have to follow.
There may be software installed that monitors your activity, including browsing
history, so be cautious of the actions you take while on a shared device. And
always log out of your accounts!
Can my school search for my social media activity without telling
me?
Yes
and No. If your school starts a social media monitoring program, they
must let you and your parents know, allow you to see the information they have collected
about your social media activity, and delete it when you leave the district or
turn 18.
If your school does not have a monitoring program, you do not
have the right to know what information teachers and officials find through
their own searching on social media. Remember, anything you post publicly can
be seen by anybody, including police officers, teachers, officials, and other
students.
Can I be disciplined for simply expressing my opinion on social
media?
Sometimes.
You have the right to speak your mind on social media. Your
school cannot punish you just because it doesn’t agree with your opinion.
However, you can be disciplined if you say something on social media during
school hours or at a school function or event that officials believe could lead
to a “substantial disruption,” your school can discipline you.
You
can also get in trouble for “cyberbullying” outside of school. This includes
creating false profiles, impersonating other students, or creating fake pages
in order to bully someone.
What is a “substantial disruption”?
Your speech is a substantial disruption when it encourages
violations of school rules, illegal activities, or it risks causing a big
interference with the education of other students. For example, threats to
other students or your teachers using social media will likely be considered a
substantial disruption.
What can I do to prevent school officials from looking at what I
post on social media?
Make sure your passwords are secret so that others can’t sign in
to your accounts and post as you. Manage your privacy settings to make sure
only your friends see your profile and posts. And remember that the people you
decide to share with may share your posts with others or in a public way.
Ultimately, with the great power of
social media comes great responsibility. Whether online or offline, on-site or
off-campus, student communication in the digital era is still plainly a First
Amendment issue. We must keep that in mind.
Teachers, just like students, have to be
careful about what they post on social media. With the prevalence of technology
everywhere you turn, an innocent status update or tweet can cause major damage
if interpreted the wrong way.
Many teachers have been fired for Facebook and
Instagram posts, tweets, and other social media posts. A teacher’s social media content can impact a
school’s reputation, and many cases exist of a teacher being fired for posting provocative content. Unless sharing an opinion on union activity or
working conditions, the First Amendment does not protect teachers. Protections exist within the classroom, but online platforms have proven vulnerable.
A suburban Chicago teacher is on leave due to a social
media post that used explicit language in reference to her fifth-grade
students. She complains about her fifth-grade class in a very vulgar way, which
many parents and students feel is inexcusable.
“It is so sad that we are trusting these
teachers with our kids, to get an education, thinking they are loving our kids
putting them on the right path,” Nikita Moss said.
According to East Aurora school district website,
the superintendent met with the employee upon learning of her post and placed
her on administrative leave until further notice. “Be assured that we take this
matter very seriously,” the district said in a statement. “We are
certain that the language used does not reflect the professionalism and
attitudes of District 131 teachers and staff, who care deeply for children and
work hard each day to build positive relationships with students.”
So
what should teachers do? What are the legal guidelines here?
First of all, check to see if your school district has a technology and social media policy. If so, read it and follow it to the letter. Gwyneth Jones, International Ed Tech keynote speaker, author of the award-winning Daring Librarian blog, and the teacher librarian at Murray Hill Middle School in Howard County, MD, says “I’m so proud that my district has had a “Responsible Use of Technology and Social Media Policy” since 2002 and has updated it every three years.” She shared the most important portion:
“Any postings by employees will not reference, link or contain:
Statements that could be viewed as malicious, obscene, threatening or
intimidating; that disparage students, employees, parents or community members;
or that could be viewed as harassment or bullying.”
According to Anthony Clark, a nine-year teaching veteran and
leader of the Suburban Unity Alliance in Chicago, teachers should always use
social media with the best interest of their students in mind. Because the
rules are often ambiguous and frequently broken, teachers must be prepared for
consequences when addressing issues related to their school. For teachers who
want to extend their lessons to social media, they very well might find a
unique platform for mentorship, but they also should be prepared to sacrifice
their jobs and reputation if a scandal breaks out.
Clark realizes that not every teacher will want to adopt his
mentorship approach, and he’s fine with that. But he does feel that every
teacher has the responsibility to at least be aware of and up to date on the
newest trends in social media. “Schools would benefit from allowing and
encouraging and providing some level of [social media] training for teachers
that find it valuable to build relationships,” Clark said. “We shouldn’t be
afraid of it because we can’t control it.”
Sure, teachers might sometimes overreach and place themselves in
controversies without knowing all the facts. But many times, teachers have a unique
understanding of the issues surrounding young people. They might have the
solution in their back pocket. The only way to contribute to the discussion in
many situations is social media. We should respect the voice of teachers and
allow them the freedom to speak on the issues that are central to future
generations.
What’s
the best advice for teachers?
If you must use social media, include
disclaimers that note that your speech is your personal opinion and not related
to your employment. Also, avoid speaking about work-related matters unless the
speech is protected as discussion related to working conditions and collective
bargaining.
In the world of digital intelligence, the terms social media search and social media investigation are often used interchangeably. But make no mistake—they are not the same. Understanding the difference is crucial if you’re looking to uncover actionable information for a legal case, insurance claim, background check, or workplace inquiry.
At eChatter, we offer both services, and our clients often ask: “What’s the difference?” This blog breaks down the key distinctions between a basic search and a full investigation so you can choose the right approach for your needs.
What is a Social Media Search?
A social media search is typically the initial step in locating a person’s online presence. It’s a surface-level scan of publicly available information across social media platforms such as:
Facebook
Instagram
Twitter/X
TikTok
LinkedIn
Snapchat (when content is public)
This search aims to identify whether a subject has an online presence, what platforms they use, and some general details like profile names, photos, and bio information. It may also include:
Profile creation dates
Recent posts or visible activity
Basic connections or followers
Use Case: A social media search is ideal when you’re trying to confirm identity or determine if deeper investigation is warranted.
What is a Social Media Investigation?
A social media investigation goes far beyond the basics. It is a comprehensive, analytical deep dive into a subject’s digital activity, using both manual review and AI-powered tools to uncover patterns, behaviors, and inconsistencies. These investigations can include:
In-depth analysis of posts, photos, and comments
Geolocation data pulled from images and check-ins
Associations with other individuals or groups
Timeline building for specific dates or events (e.g., after an injury)
AI-enhanced facial recognition and image matching
Archived or deleted content (when available through legal means)
Behavioral or sentiment analysis
Use Case: A social media investigation is used in legal claims, fraud detection, workplace misconduct, background screening, and civil or criminal litigation. The output often includes a documented report with screenshots, metadata, and analysis suitable for courtroom or internal use.
Key Differences at a Glance
Feature
Social Media Search
Social Media Investigation
Purpose
Locate basic profiles and content
Uncover detailed, case-relevant information
Depth
Surface-level scan
Comprehensive review and analysis
Tools Used
Manual searches, open web
Advanced AI, geolocation, facial recognition
Output
List of profiles, general info
Detailed report with screenshots, timelines, associations
Recommended For
Preliminary review or ID confirmation
Legal evidence, fraud investigations, litigation
Which One Do You Need?
If you’re simply looking to find out whether someone has a digital footprint, a social media search may be enough. But if you’re trying to gather evidence, verify claims, or identify behavioral patterns, a full social media investigation is the way to go.
At eChatter, we specialize in both services. Our AI-powered tools and trained analysts ensure that no relevant detail is missed—especially in high-stakes cases.
Need help choosing the right level of investigation?
Contact us today for a free consultation, and we’ll help you determine whether a search or full investigation best suits your needs.
eChatter is a digital intelligence company providing OSINT and social media analysis to law firms, insurers, investigators, and businesses across the U.S.
In today’s digital age, social media platforms are not just tools for connection—they’re also treasure troves of information for investigators. One emerging area of intelligence gathering is the identification of gang activity and group affiliations through social media posts. From images and hashtags to emojis and clothing, online behaviors can paint a very telling picture.
The Digital Footprint of Gang Activity
Gang members and affiliated individuals often turn to platforms like Facebook, Instagram, TikTok, and Snapchat to share aspects of their lives. Whether consciously or not, they frequently reveal:
Symbols and hand signs
Color-coded clothing or bandanas
Group photos in known gang territory
References to specific streets, “sets,” or rivals
Hashtags tied to local or national gangs
Emojis that replace words (e.g., 🅱️ for Blood, 🐍 for “snake” or betrayal)
These clues, when collected and cross-referenced, can offer deep insights into group affiliations and potential criminal networks.
🧠 Case Studies and News Highlights
Chicago PD’s Social Media Division has long been utilizing public Facebook and Instagram posts to track gang rivalries and predict retaliation after shootings. In one case, an Instagram Live post helped them intervene before a potential violent retaliation.
A 2022 Department of Justice investigation in California used TikTok videos to tie suspects to a series of robberies. Members of a gang had been flaunting stolen items and taunting rival groups, giving investigators time-stamped evidence and location markers.
Academic research, such as the 2017 study “Digital Gangsters: Gangs and Social Media Use in Chicago” (Papachristos et al.), emphasizes how online conflict—called “Internet banging”—often escalates to offline violence.
🔧 How Investigators Can Use This Data
For private investigators, insurance companies, and law enforcement, recognizing digital gang markers can:
Validate existing suspicions or criminal history
Link individuals to known groups or criminal networks
Discredit or verify alibis using geotagged content
Support background checks for sensitive cases (e.g., custody, employment)
Aid in threat assessment or workplace security reviews
⚠️ Key Markers to Watch
When analyzing a subject’s digital footprint, consider the following as potential indicators of gang ties:
Type
Example
🧢 Clothing
Color patterns, logo flips, bandanas
🤳 Poses
Flashing hand signs, gang-specific symbols
🏷️ Hashtags
#FreeTheHomie, #GDK, #BDK, #TrapLife
🧩 Emojis
🅱️, 🐍, 💯, 🔫
📍 Locations
Frequent check-ins at known gang areas or streets
🎶 Music
Lyrics in videos referencing violence or affiliations
🛠️ Our Role in Helping You Connect the Dots
At eChatter, we specialize in analyzing digital behavior through a combination of OSINT, SOCMINT, and proprietary tools. Our team is trained to identify not just what’s visible—but what’s implied, coded, or intentionally hidden.
Through our reports, clients gain a clear view of affiliations, patterns, and risk factors. Whether you’re investigating a person of interest, building a case, or conducting due diligence, we deliver insights that matter.
New trails were blazed when Twitter was taken over by Elon Musk, turning the platform upside down and all around. Creating a news frenzy, Musk laid off around 6,000 of Twitter’s employees while renaming the social platform “X”. From there, new horizons emerged with the rise of platforms like Threads and Bluesky.
What is “Threads” and Why Does it Matter?
Threads is a social media platform created by Meta (the parent company of Facebook and Instagram) that focuses on micro-blogging, much like X (formerly Twitter). It’s tightly integrated with Instagram, allowing users to link their accounts and easily connect with their existing Instagram network. Threads offers a space for users to share short posts, images, and conversations in a simplified, text-first format.
Why Should a PI Know About Threads? Threads is rapidly gaining popularity, especially among younger users and those migrating from other platforms. For private investigators, it represents a valuable resource for gathering information, as users often post personal thoughts, opinions, and updates. With its connection to Instagram, Threads provides a seamless way to track digital footprints across multiple platforms.
Some Key Takeaways
Users may share location tags or events they attend.
Posts can reveal interests, affiliations, or networks.
Threads’ conversational style may highlight personal connections or conflicts.
What is Bluesky and Why Should it be on my Radar?
Bluesky is a decentralized social media platform created by former Twitter executives. It operates on a unique open-source protocol called AT Protocol, which allows users to own and control their data while still interacting with a global network. Unlike centralized platforms, Bluesky gives users the freedom to create and moderate their own communities, making it an appealing option for those who value privacy and control over their content.
Why Should a PI Know About Bluesky?
Bluesky is still growing, but it has quickly attracted a tech-savvy audience interested in decentralized platforms. For private investigators, Bluesky can provide important clues or insights into individuals’ activities.
Some Key Takeaways
Users may share more freely due to the platform’s promise of privacy and data control, offering more authentic insights.
The decentralized nature of Bluesky allows niche groups to thrive, making it easier for PIs to locate individuals in specific circles or track interests. Understanding the “target audience” associated with Bluesky may help direct you to searching through this platform.
As Bluesky gains popularity, it will likely become an important space for individuals to discuss personal or business matters, potentially revealing key information in investigations.
Bluesky is still in its early stages, but its unique structure and growing user base make it a platform worth watching for anyone in investigative work!
Breaking News, Community Engagement, and Political Shifts
You must always examine each new social media platform or app from both a macro and micro perspective. While these newer micro-blogging platforms share similarities, their underlying cultures are different. Threads, much like Instagram, fosters a community-driven environment filled with engagement, debate, and personal opinions. Though you can follow news sources, Threads is primarily focused on creating a sense of community. On the other hand, Bluesky, founded by former Twitter executives, leans more into the fast-paced, instant-news culture. It’s centered around providing real-time updates on news, global events, and political viewpoints. Even its feed, reminiscent of Twitter, prioritizes immediate posts, ensuring that breaking news stays front and center.
With the following being said, an announcement was made from MetathatThreads will be initiating more of a right for freedom of expression, constituting algorithm changes geared towards political changes through the platform. Some say this change could drive more individuals towards Bluesky but with a new political wave on the horizon, time will be the teller of all of this.
We Stay Social, So You Don’t Have To!
At E-Chatter, we’re constantly learning and integrating new social media platforms and profiles into our online searches for clients. With the digital landscape ever evolving, we stay ahead of the curve to ensure thorough due diligence is always at the forefront of our services.
As of 2024, BeReal has over 100 million downloads globally, with about 25 million daily active users. The app initially gained popularity in France, where it was launched in 2019, but it has since expanded its user base, with the United States leading in downloads. BeReal’s unique approach of encouraging users to post unfiltered, real-time content has resonated with many, particularly younger audiences, with 98% of users being under 45 years old.
BeReal is a social media app that aims to provide a more authentic and less curated experience compared to other platforms. It was launched in 2020 by French developers Alexis Barreyat and Kévin Perreau. The app encourages users to post unfiltered, real-time photos to share a more genuine snapshot of their daily lives.
Heres how it works
Daily Notification: Every day at a random time, all users receive a notification to take a photo within a two-minute window.
Dual Camera Feature: The app uses both the front and back cameras simultaneously, capturing what you are doing and your reaction in real-time.
No Edits or Filters: Users are encouraged to post photos without editing or applying filters, promoting authenticity.
Limited Interaction: There are no likes, and interactions are minimal, which shifts the focus away from seeking approval or validation from others.
BeReal has grown popular, especially among younger audiences, because it contrasts with the highly polished content often seen on Instagram, TikTok, or Facebook
Be Real Search Options
BeReal doesn’t have a traditional search function like other social media platforms where you can easily find someone by their name or username. Instead, finding someone’s BeReal account requires a few specific methods:
Friend Requests via Phone Contacts: BeReal allows you to sync your phone contacts, and it will suggest people you know based on those contacts. You can add friends directly if they are already using the app.
Username or Profile Sharing: You can manually share your BeReal username or ask for someone’s username, then add them by searching for their profile in the “Add Friends” section of the app.
QR Code: Users can share a QR code that others can scan to find their profile.
BeReal focuses on close, personal connections, which is why they don’t offer broader search features or public profiles. This design aligns with their goal of fostering a more authentic, private social media experience.
As of September 2024, BeReal has been in the news for a few reasons. The app has faced scrutiny over privacy concerns and data security issues, with some critics arguing that its approach to capturing authentic moments may unintentionally compromise user privacy. Additionally, BeReal has been exploring new features and updates to maintain user engagement, such as enhanced photo editing tools and expanded social interactions. The app’s efforts to stay relevant in the competitive social media landscape are also being closely watched.
E-Chatter stays on top of new social media applications and how they are used for the purpose of sharing our expertise with our clients. BeReal is an application we include in our search efforts on your behalf. Visit our website to learn more about our company and how we come alongside you during an investigation.