Connected graph of social media profile nodes with glowing data connections
OSINT

Social Media OSINT: How Investigators Trace People Across Facebook, Twitter, and LinkedIn

Ziwa··9 min read

A Phone Number in Manchester Just Blew Up a "Dubai Crypto Mogul"

The Twitter account said "Crypto entrepreneur. Dubai." Luxury car profile photo. 50K followers. A Telegram group promoting "guaranteed 40% returns."

One phone number extraction later, the trail led to a flat in Manchester. The luxury car was a stock photo. The "mogul" had a different name on Facebook. This is what cross-platform OSINT does — it connects identities across the places people think they're separate.

The average person has accounts on 7-8 platforms. Platforms don't talk to each other. Facebook doesn't link to Twitter. LinkedIn doesn't know about Reddit. Your job as an investigator is to build those connections yourself. Here's how.

Pivot Points: How You Connect the Dots

A "pivot point" is shared data between two profiles that ties them to the same person. Some are almost definitive. Others need corroboration.

Strong Pivots (High Confidence)

  • Phone number — Two profiles sharing the same phone number almost certainly belong to the same person. Ziwa's Reverse Phone Lookup finds associated profiles from a number.
  • Email address — Same logic. One email linking two accounts is a strong connection.
  • Unique username — "darkphoenix42" on both Twitter and Reddit? Very likely the same person. Check with Username Search.
  • Profile photo — Same headshot on multiple sites, confirmed via reverse image search.

Medium Pivots (Need Backup)

  • Real name + location — "Sarah Chen in Portland" is more specific than "Sarah Chen," but still needs a second data point.
  • Workplace + title — LinkedIn and Twitter both say "Product Manager at TechCorp"? Probably the same person.
  • Writing style — Distinctive phrases, recurring typos, emoji patterns. Harder to fake than most people realize.

Weak Pivots (Supporting Evidence Only)

  • Shared interests — Following the same niche topics across platforms.
  • Mutual connections — Friends in common across Facebook and LinkedIn.
  • Account timing — Created within weeks of each other.

The Four-Phase Investigation Workflow

Phase 1: Extract Everything From the Known Profile

  1. Document every visible detail — name, username, bio, photos, location, workplace, recent posts.
  2. Screenshot and archive everything. Profiles get deleted. Pages change.
  3. Run contact extraction through Ziwa. Phone numbers and emails are your strongest pivot points — get them first.

Phase 2: Username and Image Pivot

  1. Search the username across platforms with Username Search.
  2. Reverse-image search profile photos (Google Images, TinEye, Yandex).
  3. Follow any linked accounts — Twitter bios linking to Instagram, GitHub profiles linking to personal sites.

Phase 3: Contact-Based Pivot

  1. Found a phone number? Reverse Phone Lookup finds other accounts tied to it.
  2. Found an email? Check Have I Been Pwned — breach data reveals which services they registered with.
  3. Cross-reference everything against your initial findings.

Phase 4: Deep Analysis

  1. Map all confirmed accounts visually — Maltego or even a simple diagram.
  2. Timeline analysis: when did they post and from where?
  3. Network analysis: who do they interact with across platforms?
  4. Content analysis: what topics, locations, and activities come up repeatedly?

Case Study: Tracing a Fake Crypto Promoter

Fictional scenario, real methodology.

Starting point: Twitter account @cryptoking_official promoting suspicious investment returns.

  1. Twitter analysis — Bio: "Crypto entrepreneur. Dubai." Profile photo: man in luxury car. Unique username.
  2. Username search — Same handle on Instagram, Telegram, and a crypto forum.
  3. Contact extraction — Ziwa pulls a phone number from the Twitter account. It's a UK mobile — not Dubai.
  4. Reverse phone lookup — The number connects to a Facebook account under a different name, location: Manchester.
  5. Facebook analysis — Different name, but mutual friends with the crypto forum account. That luxury car photo? Stock image from Shutterstock.
  6. Result — The "Dubai entrepreneur" operates from Manchester, uses a fake name and stock photos. Findings documented and forwarded to relevant authorities.

Four tools. About 30 minutes. One completely dismantled fake identity.

The Tools That Made This Possible

  • Ziwa — Contact extraction from social profiles
  • Ziwa Username Search — Cross-platform username enumeration
  • Ziwa Phone Intel — Reverse phone lookup
  • Reverse image search (Google, Yandex, TinEye)
  • Have I Been Pwned — Email breach history

Where to Go From Here

New to OSINT? Start with the Beginners Guide. Want the full tool breakdown? Read the OSINT Toolkit. Ready to try it? Run a username search — it's free and takes seconds.

Frequently Asked Questions

What is social media OSINT?
Social media OSINT is the practice of collecting and analyzing publicly available information from social media platforms to support investigations, due diligence, security assessments, or research.
How do investigators link profiles across platforms?
Investigators use "pivot points"—shared data between profiles such as usernames, photos, email addresses, phone numbers, writing style, and linked accounts—to connect identities across platforms.
Is social media investigation legal?
Viewing publicly available social media profiles is generally legal. However, creating fake accounts to access private information, impersonation, or harassment are illegal. Always follow applicable laws and platform terms of service.
What tools do social media investigators use?
Common tools include Ziwa (contact extraction), Maltego (link analysis), username search tools, reverse image search, Wayback Machine, and social media archiving tools.

Related Articles

Ready to extract contacts?

Try Ziwa free. Pay only when you get results.

Get Started Free