Module 1 video 1: Investigating people and social media accounts - Building a Profile

Knight Center
1 Oct 202007:20

Summary

TLDRIn this investigative journalism course, Brandi Zadrazni, an NBC News reporter, teaches how to uncover people's stories and secrets through social media sleuthing. She demonstrates techniques for locating, archiving, and verifying social media accounts, using tools like Google, Namecheck, and reverse image search. The course emphasizes the importance of organization, verification, and using various platforms beyond the mainstream to build a comprehensive profile of a subject.

Takeaways

  • 🔎 Investigative journalism often involves social media sleuthing to uncover a subject's real life and hidden online identities.
  • 🗺️ Locating and archiving social media posts is crucial for breaking big stories quickly, especially those related to violent extremism.
  • 🔍 The first step in social media investigation is usually using Google to search for the target's name, city, and state of residence.
  • 📚 Utilizing Google's 'Tools' option to input a custom date range can help filter out noise and focus on relevant information.
  • 🔑 Finding a username can lead to a broader search across platforms using tools like Namecheck to find availability across multiple sites.
  • 👥 Public records services and free websites can provide relatives and associates useful for verifying accounts.
  • 📧 Searching for emails in data breaches can validate email addresses and provide new leads for investigation.
  • 📷 Reverse image search is a powerful tool for verifying photos and finding associated accounts across different platforms.
  • 👪 Cross-referencing photos, biographical details, and family and friend associations are effective methods for account verification.
  • 📅 Major life events like birthdays, weddings, and anniversaries celebrated on social media can offer opportunities for searching and investigating.
  • 📝 Keeping an organized record of findings, verification processes, and evidence through notes, links, archives, and screenshots is essential for reproducing work.

Q & A

  • What is the primary focus of the course module presented by Brandi Zadrazni?

    -The course module focuses on investigating people and their social media accounts, teaching how to use social media sleuthing techniques for investigative reporting.

  • How does social media play a role in investigative reporting according to the transcript?

    -Social media platforms offer ways to learn about a subject's real life, secret thoughts, and hidden online identities, which can be crucial for breaking news and in-depth investigations.

  • What is the first step Brandi Zadrazni usually takes when investigating a person's social media presence?

    -Brandi Zadrazni's first step is to use Google to search for the target's name in quotes along with their city and state of residence if available.

  • What tool or service does Brandi suggest using to find a person's username across multiple platforms?

    -Brandi suggests using an online tool like Namecheck, which looks for username availability across various platforms.

  • How can one verify the authenticity of a social media account that might belong to the person of interest?

    -Verification can be done by cross-referencing photos, biographical details, and family and friend associations, as well as using reverse image search to verify details in photos.

  • What is the significance of birthdays in verifying social media accounts during an investigation?

    -Birthdays are significant because they are often celebrated on social media, providing an opportunity to confirm the identity of a person by looking for birthday wishes or posts on their account.

  • What are some alternative platforms to Facebook, Instagram, and Twitter that might be relevant for investigating younger targets?

    -Alternative platforms include TikTok, gaming platforms, and other social media sites where younger individuals are more likely to be active.

  • How can one organize the findings during a social media investigation?

    -One can use an investigation capture program or maintain a running document and folder system to organize accounts, images, and verification notes.

  • What is the importance of documenting the verification process and collecting evidence during an investigation?

    -Documenting the verification process and collecting evidence ensures that the investigator can reproduce their work and provides a record in case information is deleted or altered.

  • What are some examples of major life events that can be used to search and investigate social media accounts?

    -Examples include weddings, funerals, holidays, anniversaries, and graduations, as these events are often shared on social media and can lead to additional accounts or information.

  • What are some tools and websites that Brandi Zadrazni mentions for social media investigation?

    -Brandi mentions Google, LinkedIn, public records services like LexisNexis, free websites like FastPeopleSearch, and niche search engines for more specific searches.

Outlines

00:00

🕵️‍♀️ Social Media Investigation Techniques

Brandi Zadrazni, an investigative reporter for NBC News, introduces the first module of a course on investigating people and their social media accounts. She emphasizes the importance of social media in uncovering real-life information and hidden identities. Zadrazni shares her approach to locating and archiving social media posts, which is crucial for breaking news stories quickly. She uses her own name for demonstration purposes and instructs viewers to choose a person to investigate. The process involves using Google to search for the target's name, city, and state, and then using tools like Namecheck to find the target's presence across various platforms. She also discusses the importance of verifying accounts through cross-referencing photos, biographical details, and family associations, and suggests using reverse image search for verification. Zadrazni advises keeping an organized record of findings and using various search engines to follow new leads.

05:02

🔎 Advanced Social Media Verification Strategies

In this paragraph, the focus shifts to advanced social media verification strategies. The speaker uses a real-life example of identifying a Twitter account potentially belonging to a mass shooter, leveraging unique handles, photos, and connections to family members on Facebook. The verification process includes using the advanced search function on Twitter and looking for birthday wishes on Facebook to confirm the target's identity. The speaker also provides tips on using platform-specific search functions and considering various platforms beyond the mainstream ones like Facebook, Instagram, and Twitter. They highlight the importance of looking beyond faces, such as cars, homes, and pets, for connecting people and emphasize documenting the verification process with notes, links, archives, and screenshots to ensure reproducibility of the investigation.

Mindmap

Keywords

💡Social Media Sleuthing

Social Media Sleuthing refers to the investigative process of using social media platforms to gather information about individuals or subjects. In the video, it is highlighted as a key method for uncovering real-life details and secret thoughts of a person, which is crucial for investigative journalism and reporting. The script mentions how this technique is used to understand motivations behind violent incidents and to build profiles of individuals of interest.

💡Breaking News

Breaking News signifies urgent information that has just occurred and is being reported as it happens. The script discusses how social media posts are essential in breaking big stories quickly, especially in cases where the motivations behind violent events are revealed through social media activity. The term is used to emphasize the immediacy and impact of social media in news reporting.

💡Profile Backgrounding

Profile Backgrounding is the process of researching and compiling information about an individual's background, typically using online resources. The video script describes this as a fundamental part of investigative journalism, where social media platforms offer insights into a subject's real life and hidden identities, which are vital for building a comprehensive profile.

💡Verification

Verification in the context of the video refers to the process of confirming the authenticity of social media accounts and the information associated with them. The script explains various methods of verification, such as cross-referencing photos, biographical details, and family associations, to ensure the accuracy of the gathered information.

💡Google

Google, as mentioned in the script, is the primary search engine used for initial searches of a target's name, along with their city and state of residence. It is a fundamental tool for investigative reporters to start building a profile and to find initial leads in their research.

💡Namecheck

Namecheck is an online tool used to determine the availability of a username across multiple platforms. In the video, it is used to find a trail of a person's online presence beyond what is typically picked up by search engines, which can include unexpected places like comment sections and forums.

💡Data Breaches

Data Breaches are incidents where unauthorized individuals gain access to private information. The script discusses using sites that search data breaches to validate email addresses and provide new leads, which is an important aspect of verifying the identity of individuals in investigative journalism.

💡Reverse Image Search

Reverse Image Search is a technique used to find other instances of a particular image on the internet. The video script provides an example of how it can be used to verify details in a photo and find multiple new accounts, which is a valuable method for investigative reporters to connect individual accounts and build a network around their target.

💡Platform's Native Search Functions

Platform's Native Search Functions refer to the built-in search tools within social media platforms like Facebook, Instagram, and Twitter. The script advises using these functions in addition to search engines like Google to find and investigate accounts, emphasizing the importance of not focusing solely on one platform.

💡Documenting Verification Process

Documenting the Verification Process involves keeping a record of how accounts and information were verified. The script stresses the importance of this practice, as it ensures that the investigative work can be reproduced if necessary, and it helps in preserving evidence that might be deleted.

💡Username Search Engines

Username Search Engines are tools that help find where a particular username is used across different platforms. The video script highlights their usefulness, especially for younger targets who might be more active on platforms like TikTok or gaming platforms, where these search engines can provide valuable leads.

Highlights

Introduction to the course on investigating people and social media accounts by Brandi Zadrozny, an investigative and features reporter for NBC News.

Importance of social media sleuthing in nearly every story reported, including breaking news and longer investigations.

Social media platforms as a key to learning about a subject's real life and hidden online identities.

Locating and archiving social media posts as crucial for breaking big stories quickly, including those revealing motivations behind violent extremist activities.

Using Google to search for a target's name in quotes along with their city and state of residence as the first step in the investigative process.

Utilizing Google's tools option and custom date range to filter search results relevant to a breaking news event.

Using public records services like LexisNexis or free websites like FastPeopleSearch to find relatives and associates for profile building.

Introducing Namecheck, an online tool for checking username availability across multiple platforms.

Emphasizing the importance of searching comment sections, reviews, and forums for potential leads on a subject's online presence.

Verifying new usernames or emails found by re-Googling them to gather additional information.

Using data breach search sites to validate email addresses and find new leads.

Recommendation to search major social media platforms like Facebook, Instagram, Twitter, and TikTok using their native search features.

The necessity of keeping an organized record of findings, including a running document and a folder for collected accounts and images.

Highlighting the verification process for social media accounts, including cross-referencing photos, biographical details, and family associations.

Using reverse image search to verify details in photos and find multiple new accounts.

Example of using reverse image search to connect accounts and build a network around a target in a case study involving anti-vaccination groups.

Strategies for verifying social media accounts of individuals who are not public figures but become newsworthy, such as mass shooters.

The use of birthdays, weddings, funerals, holidays, and anniversaries as markers for searching and investigating social media accounts.

Tips for searching targets using platform's native search functions and considering platforms beyond the usual suspects like Facebook, Instagram, and Twitter.

Advice on documenting the verification process and collecting evidence to ensure reproducibility of work.

Transcripts

play00:00

hi welcome to the first module in this

play00:02

course investigating people and social

play00:04

media accounts

play00:05

i'm brandi zadrazni an investigative and

play00:07

features reporter for nbc news

play00:10

nearly every story i report involves

play00:11

some kind of social media sleuthing

play00:14

from profile backgrounding to breaking

play00:15

news to longer investigations

play00:18

social media platforms offer some of the

play00:20

best ways to learn about a subject's

play00:22

real life

play00:22

and give a window into secret thoughts

play00:24

and hidden online identities

play00:27

let's get started locating and archiving

play00:29

social media posts has been the key to

play00:32

breaking big stories fast

play00:34

including ones that revealed motivations

play00:36

behind a recent wave of shootings tied

play00:38

to violent extremists and militia

play00:40

movements

play00:41

since we can't engineer a breaking news

play00:43

event and we don't want to dox a private

play00:45

citizen by mooc

play00:46

i'll be using myself for many of the

play00:48

searches i'm about to show you

play00:50

but before we begin i'd like you to

play00:52

choose a person to investigate

play00:55

most breaking stories all i get is a

play00:57

name and i have to determine

play00:59

all that i can about that person and

play01:00

their activities from their online

play01:02

presence

play01:03

as we discover accounts emails and

play01:05

usernames associated with a person of

play01:07

interest

play01:08

we can start building out a profile

play01:11

despite having

play01:12

a lot of tools in my toolbox my first

play01:14

step is usually google

play01:17

google your target's name in quotes

play01:19

along with the city and state of

play01:20

residence if you have it

play01:22

i'll be using my name a lot today but

play01:24

you should plug in yours or the name of

play01:25

your target

play01:26

if you've got a breaking news situation

play01:28

you may find a lot of noise here

play01:30

it can help to use google's tools option

play01:32

and input a custom date range

play01:34

with the cutoff being a day or a week

play01:36

before the breaking news event this is

play01:40

my linkedin profile

play01:41

it also gives me a username mine is

play01:43

obvious and many are

play01:46

i also use a public records service like

play01:48

lexisnexis or people

play01:50

but free websites like fastpeoplesearch

play01:52

can also help get you started

play01:54

and provide relatives and associates

play01:56

that will be useful in verifying

play01:57

accounts later on

play01:59

i'll provide links for all of the sites

play02:01

and tools i talk about later

play02:02

when i have a username i'll plug it into

play02:04

an online tool like namecheck

play02:06

which looks for username availability

play02:08

across multiple platforms

play02:10

that aren't always picked up by the big

play02:11

search engines you may not think all of

play02:13

the results as places to glean much

play02:15

but a lot of people tend to leave a

play02:17

trail even in unexpected places

play02:20

like comment sections reviews and forums

play02:22

and that can lead you to information

play02:24

and other accounts when i've found a new

play02:27

username or email i think might belong

play02:29

to my subject

play02:30

i'll go back to google at first and

play02:32

scoop up everything new that i can

play02:34

now each of these accounts becomes a tip

play02:37

something i need to verify and not all

play02:39

of them are going to be correct

play02:41

take a minute to enter the username that

play02:42

you use across websites

play02:44

and see what results you get

play02:49

if you're looking for emails there are

play02:51

also sites that search

play02:52

data breaches for user information and

play02:54

can be a quick way to validate an email

play02:56

address and provide new leads

play02:58

it's good practice to search the big

play03:00

sites facebook instagram twitter and

play03:02

tick tock

play03:03

using their native search features

play03:06

as you collect information you're gonna

play03:08

want to keep things organized

play03:11

you may have access to an investigation

play03:13

capture program

play03:14

but if not a running document of what

play03:17

you know and a folder where you can

play03:18

organize your findings will do fine

play03:21

as you collect accounts and images

play03:23

notate how you found the account and how

play03:25

you verified it

play03:26

and then take each new piece of

play03:27

information you find a phone number an

play03:29

email a username

play03:31

run it through google and the other

play03:32

niche search engines and follow those

play03:34

new trails

play03:36

so you found an account that you think

play03:38

belongs to your target

play03:39

the next step is verification there are

play03:41

lots of ways to verify accounts

play03:43

cross-referencing photos biographical

play03:45

details

play03:46

family and friend associations are a few

play03:48

of the best

play03:50

for photos you can use reverse image

play03:52

search to verify details in a photo and

play03:54

find multiple new accounts

play03:56

here's an example this is one of the

play03:59

most popular anti-vaccination websites

play04:01

in the world

play04:03

it's helmed by a social media marketer

play04:05

who i wrote about for a story

play04:07

about how women become radicalized in

play04:09

anti-vaccination groups on facebook

play04:11

i use a couple of extensions which allow

play04:13

me to select an image and search for its

play04:15

match across multiple platforms

play04:17

we can use search by image to find other

play04:19

accounts and websites that cook

play04:21

may be behind these results across

play04:24

google

play04:25

bing yandex and tni point me to several

play04:28

other anti-vaccination

play04:29

and cova denial websites and fundraisers

play04:32

all connected to cook

play04:34

reverse image searching is less helpful

play04:36

if you're investigating someone who's

play04:38

not a public figure

play04:39

but suddenly becomes news a mass shooter

play04:42

for example

play04:44

in those cases i've used photos of

play04:46

people or things like

play04:47

cars homes or pets as a way to connect

play04:50

individual accounts

play04:51

and build a network around my target

play04:54

when we were trying to confirm the

play04:56

social accounts of a man who shot and

play04:57

killed nine people

play04:58

outside of a bar in dayton ohio we got a

play05:01

name

play05:02

and a date of birth from police sources

play05:04

we found a twitter account we thought

play05:06

could be him

play05:07

which also offered clues to his

play05:08

political ideology

play05:10

his handle was unique and didn't include

play05:12

his real name or even a variation

play05:15

but this twitter account did have photos

play05:17

of a man

play05:18

and a dog on facebook we found photos of

play05:21

his family who had posted images of what

play05:23

appeared to be the same dog

play05:25

we used that as the first piece of

play05:27

verification

play05:28

the second was a post from his father

play05:30

which also included the dog

play05:32

and a happy birthday message since a

play05:34

date of birth is often one of the first

play05:36

identifying pieces of information given

play05:38

by the police in a breaking news

play05:40

situation

play05:41

it's a reliable way to verify a social

play05:43

media account

play05:44

on twitter you can use the advanced

play05:46

search function to identify a birthday

play05:48

on facebook you can scroll to the month

play05:50

and day in question on a suspected

play05:52

account

play05:53

and look out for birthday wishes or just

play05:55

use the search function

play05:56

after identifying close friends and

play05:58

family who might post about it

play06:01

birthdays are just one example weddings

play06:04

funerals

play06:05

holidays anniversaries graduations you

play06:08

name it nearly every major life marker

play06:10

is celebrated on social media

play06:12

these provide an opening for searching

play06:14

and investigating other accounts

play06:17

i'll leave you with some tips search for

play06:19

targets using platform's native search

play06:21

functions but also in google and other

play06:23

search engines

play06:25

think about the platform don't focus

play06:27

solely on facebook

play06:28

instagram and twitter targets especially

play06:31

younger ones may be more likely to be on

play06:33

tick-tock or gaming platforms

play06:35

this is where username search engines

play06:36

can be really helpful

play06:38

look out for more than just faces cars

play06:41

homes and pets are a great way to

play06:43

connect people

play06:45

document your verification process and

play06:47

collect all the evidence as you go in

play06:49

case it's deleted

play06:50

leave breadcrumbs in the form of notes

play06:52

links archives and screenshots

play06:55

otherwise you're down the rabbit hole

play06:56

and you're unable to reproduce your work

play06:59

i'll include my favorite applications

play07:00

for capturing investigations in the

play07:02

links below

play07:03

that's all for now thanks

play07:19

you

Rate This

5.0 / 5 (0 votes)

関連タグ
Social MediaInvestigationJournalismProfile BackgroundingBreaking NewsOnline IdentityVerification TechniquesData BreachesReverse Image SearchDigital Forensics
英語で要約が必要ですか?