Social Media OSINT: How Investigators Trace People Across Facebook, Twitter, and LinkedIn
A Phone Number in Manchester Just Blew Up a "Dubai Crypto Mogul"
The Twitter account said "Crypto entrepreneur. Dubai." Luxury car profile photo. 50K followers. A Telegram group promoting "guaranteed 40% returns."
One phone number extraction later, the trail led to a flat in Manchester. The luxury car was a stock photo. The "mogul" had a different name on Facebook. This is what cross-platform OSINT does — it connects identities across the places people think they're separate.
The average person has accounts on 7-8 platforms. Platforms don't talk to each other. Facebook doesn't link to Twitter. LinkedIn doesn't know about Reddit. Your job as an investigator is to build those connections yourself. Here's how.
Pivot Points: How You Connect the Dots
A "pivot point" is shared data between two profiles that ties them to the same person. Some are almost definitive. Others need corroboration.
Strong Pivots (High Confidence)
- Phone number — Two profiles sharing the same phone number almost certainly belong to the same person. Ziwa's Reverse Phone Lookup finds associated profiles from a number.
- Email address — Same logic. One email linking two accounts is a strong connection.
- Unique username — "darkphoenix42" on both Twitter and Reddit? Very likely the same person. Check with Username Search.
- Profile photo — Same headshot on multiple sites, confirmed via reverse image search.
Medium Pivots (Need Backup)
- Real name + location — "Sarah Chen in Portland" is more specific than "Sarah Chen," but still needs a second data point.
- Workplace + title — LinkedIn and Twitter both say "Product Manager at TechCorp"? Probably the same person.
- Writing style — Distinctive phrases, recurring typos, emoji patterns. Harder to fake than most people realize.
Weak Pivots (Supporting Evidence Only)
- Shared interests — Following the same niche topics across platforms.
- Mutual connections — Friends in common across Facebook and LinkedIn.
- Account timing — Created within weeks of each other.
The Four-Phase Investigation Workflow
Phase 1: Extract Everything From the Known Profile
- Document every visible detail — name, username, bio, photos, location, workplace, recent posts.
- Screenshot and archive everything. Profiles get deleted. Pages change.
- Run contact extraction through Ziwa. Phone numbers and emails are your strongest pivot points — get them first.
Phase 2: Username and Image Pivot
- Search the username across platforms with Username Search.
- Reverse-image search profile photos (Google Images, TinEye, Yandex).
- Follow any linked accounts — Twitter bios linking to Instagram, GitHub profiles linking to personal sites.
Phase 3: Contact-Based Pivot
- Found a phone number? Reverse Phone Lookup finds other accounts tied to it.
- Found an email? Check Have I Been Pwned — breach data reveals which services they registered with.
- Cross-reference everything against your initial findings.
Phase 4: Deep Analysis
- Map all confirmed accounts visually — Maltego or even a simple diagram.
- Timeline analysis: when did they post and from where?
- Network analysis: who do they interact with across platforms?
- Content analysis: what topics, locations, and activities come up repeatedly?
Case Study: Tracing a Fake Crypto Promoter
Fictional scenario, real methodology.
Starting point: Twitter account @cryptoking_official promoting suspicious investment returns.
- Twitter analysis — Bio: "Crypto entrepreneur. Dubai." Profile photo: man in luxury car. Unique username.
- Username search — Same handle on Instagram, Telegram, and a crypto forum.
- Contact extraction — Ziwa pulls a phone number from the Twitter account. It's a UK mobile — not Dubai.
- Reverse phone lookup — The number connects to a Facebook account under a different name, location: Manchester.
- Facebook analysis — Different name, but mutual friends with the crypto forum account. That luxury car photo? Stock image from Shutterstock.
- Result — The "Dubai entrepreneur" operates from Manchester, uses a fake name and stock photos. Findings documented and forwarded to relevant authorities.
Four tools. About 30 minutes. One completely dismantled fake identity.
The Tools That Made This Possible
- Ziwa — Contact extraction from social profiles
- Ziwa Username Search — Cross-platform username enumeration
- Ziwa Phone Intel — Reverse phone lookup
- Reverse image search (Google, Yandex, TinEye)
- Have I Been Pwned — Email breach history
Where to Go From Here
New to OSINT? Start with the Beginners Guide. Want the full tool breakdown? Read the OSINT Toolkit. Ready to try it? Run a username search — it's free and takes seconds.
Frequently Asked Questions
What is social media OSINT?▼
How do investigators link profiles across platforms?▼
Is social media investigation legal?▼
What tools do social media investigators use?▼
Related Articles
OSINT for Beginners: How to Find Anyone's Contact Information Online
Intelligence agencies have used OSINT techniques for decades. Now they're available to anyone with a browser. Here's your complete beginner's guide.
Username OSINT: How to Map Someone's Entire Online Presence from One Username
One username. 3,000+ sites checked. Here's the methodology digital investigators use daily to map someone's complete online footprint.
How to Find Someone's Phone Number from Their Facebook Profile
The methods most guides teach are outdated. Learn what actually works in 2026 to find phone numbers and emails from Facebook profiles using OSINT tools.
Ready to extract contacts?
Try Ziwa free. Pay only when you get results.
Get Started Free