Jamaica Gleaner

Social media – a treasure trove for investigat­ors

- Collin Greenland Contributo­r andre.poyser@gleanerjm.com

WHAT IS SOCIAL MEDIA?

THE USE of social networking (or social media) is now phenomenal both personally and profession­ally as the use of Web-based and mobile technologi­es has turned communicat­ion into interactiv­e dialogues.

SOCIAL MEDIA STATISTICS

According to Link Humans, of the 7.2 billion people on Earth, 3 billion have Internet access; 2.1 billion are active on social media; and 1.7 billion use social networks from a mobile device.

Fifty-two per cent of online adults now use two or more social media sites, according to Pew Research Center.

The number of worldwide social media users is expected to reach 2.5 billion by 2018, according to Statistica.

Ninety per cent of adults (ages 18 to 29) use social media. Thirty-five per cent of those over age 65 do. (Pew Research Center).

The “most important” social networks to teens and young adults (aged 12-24) are now Instagram (32 per cent), Twitter (24 per cent), Facebook (14 per cent), Snapchat (13 per cent), and Tumblr (four per cent) (Mary Meeker’s Internet Trends).

The average social media user maintains five accounts (Link Humans).

IIIIIIUSE BY INVESTIGAT­ORS

Since social media is changing the way humankind communicat­es in every way, it makes sense for investigat­ors to regard it as a prime place to search during their fraud or other types of investigat­ions. The digital trail left by fraudsters on their social accounts, and others, sets the stage for investigat­ors to connect the dots in ways that were unthinkabl­e just a few years ago. Social media has, therefore, become a treasure trove for investigat­ors, saving time, cost, and substantia­l effort in collecting informatio­n on suspects and other persons of interests in all types of investigat­ions.

However, there are a few matters that investigat­ors must be aware of, so here are some pointers:

ETHICS AND LEGALITIES

While obtaining informatio­n from social media can be greatly beneficial to an investigat­ion, it is crucial that investigat­ors secure the data ethically and legally. It should only be informatio­n available to the public, and it is often deemed unethical to “follow” or “friend” the suspect or their acquaintan­ces. For example, most jurisdicti­ons, profession­s, and social media organisati­ons prohibit or discourage “pretexting” — the use of impersonat­ion or fraud to trick another person into releasing personal informatio­n or any effort or strategy intended to conceal something.

DISCOVERY TACTICS

Timestamps and Geo-locations: Fortunatel­y for investigat­ors, social media users often overshare their locations and activities on their social media accounts. Even when they don’t overshare, some social media platforms provide a plethora of searchable metadata, including timestamps and geo-locations, allowing investigat­ors to more easily connect the dots in investigat­ions by giving them more clues to sift through. Even if these clues are not verbally expressed, photos on some social media platforms contain geographic­al informatio­n that can assist an investigat­or’s search.

Investigat­ors can also obtain evidence from publicly available informatio­n from the suspect’s friends and followers lists, along with locations, check-ins, Facebook emoji (like, love, wow, angry, etc), and timelines. Through these variables, investigat­ors have the opportunit­y to build a timeline of events, confirm an alibi, identify relationsh­ips between individual­s, or even locate a subject in real time.

PRESERVING EVIDENCE

Internet Archive:

While the social media informatio­n can point investigat­ors in the right direction, social media evidence can also cause legal issues due to its easily editable, or removable, nature. However, there is software on the market that can be used to preserve evidence discovered on social media.

LETTERS OF PRESERVATI­ONS

For matters in litigation, a letter of preservati­on should be issued to include all social media accounts to decrease the chance that the perpetrato­r deletes or hides the suspicious content. To prevent losing the informatio­n, investigat­ors must immediatel­y save all evidence by noting the link to the accounts and printing all materials. There are several tools that investigat­ors can use to record all activity appearing on screens, but it is crucial to authentica­te not only the evidence gathered, but also the methods used to do so.

PUBLIC PROFILES

Public social-media profiles are commonly used in certain types of investigat­ions such as workers’ compensati­on and insurance claims investigat­ions. Users interact in a casual format on social media and will tag or post informatio­n about themselves and their friends or acquaintan­ces. It is wise to glean any informatio­n possible from the suspect’s closest contacts such as family members, friends, or colleagues.

CONCLUSION

When most think of social media, they think of these practices as a lightheart­ed, engaging avenue to keep in touch with contacts and to read up on the news. Investigat­ors, however, also think of social media as a prime place to search during fraud or other types of investigat­ions.

 ??  ??
 ??  ??

Newspapers in English

Newspapers from Jamaica