Video transcript: Joseph Jones: One of my primary responsibilities within the company is I oversee our investigations department. Everything we do investigations comes through me. At this point, you know, over the last two years, we’ve had like 700 percent growth in the number of cases that we have going on. And a large reason … Continue reading
You can find a lot of information about a subject through social media investigation. We can help you do it efficiently.
Privacy concerns have moved to the forefront of social media during recent years. Most social media users do not want their personal information collected. When it is collected, users want to know why it is being collected, where it is going and how it is being used. These concerns date back to 2016 when a … Continue reading
Social Media Investigation Series (Part 4): Legal Issues That Could Arise When Using Social Media or Internet Evidence in Court
This is the fourth and final installment of our social media and online investigations (SMI) series. Our first installment provided tips about how to locate social media accounts. Our second installment focused on the basics of account authentication and how to begin laying the foundation for internet-based evidence. Our third installment focused on how to … Continue reading
Find and Authenticate Social Media Evidence Video transcript:How to find and authenticate social media evidence. Step 1: Locate the evidence. Basic search: Locate accounts on major and lesser-known social media networks that are tied to the subject’s given name. Advanced search: Locate the subject’s additional profiles by looking into aliases, nicknames and screen names. Associates … Continue reading
Can I Use Social Media Evidence in Court? A social media investigation can get you court admissible evidence to support your case. Our investigation experts locate key evidence using the latest technology and advanced investigation techniques. Pulling info from social media sites like Facebook, Twitter, Tumblr, YouTube, Instagram and more. We pull metadata, MD5 and … Continue reading