Social Media Research
Social Media Research
Section titled “Social Media Research”How to effectively and safely use social media platforms for verification and research.
Social Media for Rapid Response
Section titled “Social Media for Rapid Response”Social media can help:
- Verify incidents - Corroborate sightings with posts
- Track patterns - Monitor location-tagged posts
- Find witnesses - Identify others who observed events
- Gather evidence - Document activities
Platform-Specific Techniques
Section titled “Platform-Specific Techniques”Search capabilities:
- Search bar supports keyword, person, and location searches
- Filter by date, location, post type
- Public groups can be searched without membership
Useful searches:
- Posts mentioning specific locations
- Public groups focused on local areas
- Check-ins at relevant locations
- Live videos in areas of interest
Tips:
- Use location filters
- Check public groups for community discussions
- Look for shared posts about incidents
- Review comments on public posts
Twitter/X
Section titled “Twitter/X”Advanced search operators:
from:username - Posts from specific userto:username - Replies to usernear:"City" - Posts near location (limited)geocode:lat,long,radius - Specific geographic areasince:YYYY-MM-DD - Posts after dateuntil:YYYY-MM-DD - Posts before datefilter:images - Only posts with imagesfilter:videos - Only posts with videosExample searches:
"ICE" near:"Chicago" since:2025-01-01immigration enforcement filter:imagesTools:
- TweetDeck - Monitor multiple searches
- Advanced search: twitter.com/search-advanced
Research methods:
- Search by location tags
- Search by hashtags
- Check tagged photos at locations
- Review story highlights
Limitations:
- Must be logged in for most searches
- No advanced search operators
- Stories disappear after 24 hours
Tips:
- Use location pages (tap location in post)
- Follow relevant hashtags
- Screenshot stories immediately
TikTok
Section titled “TikTok”Search methods:
- Keyword search
- Hashtag search
- Sound search (find videos using same audio)
- Location tags (where available)
Tips:
- Videos can go viral quickly
- Comments often provide additional context
- Duets and stitches may add information
- Screenshot before content is removed
Nextdoor
Section titled “Nextdoor”Usefulness:
- Hyper-local community posts
- Neighbors reporting suspicious activity
- Real-time local updates
Limitations:
- Must verify address to join
- Limited to your neighborhood
- Can’t search other neighborhoods
Search operators:
site:reddit.com keywordsubreddit:cityname keywordauthor:usernameUseful subreddits:
- City/neighborhood subreddits
- r/immigration (general discussion)
- Local community subreddits
Search Strategies
Section titled “Search Strategies”Keyword Combinations
Section titled “Keyword Combinations”For immigration enforcement:
ICE + [location]immigration raid + [city]deportation + [neighborhood]federal agents + [location]border patrol + [city] (interior checkpoints)For vehicle sightings:
unmarked cars + [location]suspicious vehicles + [neighborhood]federal vehicles + [city]Time-Based Searching
Section titled “Time-Based Searching”When an incident is reported:
- Search for posts from that time window
- Check for live videos or streams
- Look for photos with timestamps
- Review check-ins at the location
Location-Based Searching
Section titled “Location-Based Searching”- Identify the location precisely
- Search for that location tag on platforms
- Search nearby locations (adjacent streets, landmarks)
- Check business pages in the area
Verification Through Social Media
Section titled “Verification Through Social Media”Cross-Referencing Posts
Section titled “Cross-Referencing Posts”When you find a relevant post:
- Who posted it? Check their profile
- When was it posted? Compare to claimed timeline
- Where are they? Does location make sense?
- Are there other posts? Search for corroboration
Assessing Source Credibility
Section titled “Assessing Source Credibility”Higher credibility indicators:
- Established account with history
- Posts consistent with claimed location
- Details match known facts
- Other credible accounts corroborate
Lower credibility indicators:
- New or anonymous account
- Sensational language
- No specific details
- Can’t be corroborated
Finding Original Sources
Section titled “Finding Original Sources”Social media posts often get reshared. Find the original:
- Note the earliest timestamp you find
- Reverse image search any images
- Search for exact text of the post
- Follow the sharing chain back
Documentation Best Practices
Section titled “Documentation Best Practices”Screenshot Protocol
Section titled “Screenshot Protocol”Always capture:
- Full post with timestamp visible
- Username/account name
- Any images or videos
- Comments (may contain additional info)
- URL of the post
Screenshot tips:
- Use full-page screenshot tools
- Include browser URL bar when possible
- Note the date/time you captured it
- Save original format if downloading
Archiving Posts
Section titled “Archiving Posts”Posts can be deleted. Archive immediately:
| Tool | Use |
|---|---|
| Archive.today | Snapshot any webpage |
| Wayback Machine | Submit URL for archiving |
| Screen recording | For videos/stories |
| Download tools | Platform-specific |
Organizing Findings
Section titled “Organizing Findings”Create a consistent system:
/Research /[Date]_[Incident] /Screenshots /Videos /Notes evidence_log.mdPrivacy Considerations
Section titled “Privacy Considerations”Protecting Community Members
Section titled “Protecting Community Members”Do:
- ✅ Blur faces of community members
- ✅ Redact identifying information
- ✅ Ask permission before sharing
- ✅ Consider safety implications
Don’t:
- ❌ Share images that identify vulnerable people
- ❌ Expose locations of safe spaces
- ❌ Post personal information publicly
- ❌ Tag people without permission
Protecting Yourself
Section titled “Protecting Yourself”- Use research accounts, not personal
- Don’t interact (like, comment, follow) with targets
- Be aware of who can see your activity
- Consider using VPN
Monitoring and Alerts
Section titled “Monitoring and Alerts”Setting Up Monitoring
Section titled “Setting Up Monitoring”Google Alerts:
- Go to google.com/alerts
- Enter search terms
- Set delivery frequency
- Monitor your email for results
TweetDeck columns:
- Create columns for keyword searches
- Set up location-based searches
- Monitor in real-time
RSS feeds:
- Many platforms have RSS options
- Use feed reader to aggregate
What to Monitor
Section titled “What to Monitor”- Keywords related to enforcement activity
- Specific locations of concern
- Local news sources
- Community group discussions
Ethical Guidelines
Section titled “Ethical Guidelines”Research Ethics
Section titled “Research Ethics”- Don’t harass or contact people you’re researching
- Don’t create fake accounts to infiltrate private groups
- Don’t spread unverified information
- Protect sources and community members
- Use information responsibly
Legal Considerations
Section titled “Legal Considerations”- Only access public information
- Don’t violate terms of service in ways that could harm you
- Don’t impersonate law enforcement
- Document for legitimate purposes
Quick Reference
Section titled “Quick Reference”For incident verification:
- Search location on multiple platforms
- Look for posts within time window
- Cross-reference multiple sources
- Archive everything immediately
For pattern research:
- Set up keyword monitoring
- Track location-tagged posts
- Note recurring accounts/users
- Build timeline of activity
For documentation:
- Screenshot everything
- Include timestamps and URLs
- Archive before it’s deleted
- Organize systematically
Tools Summary
Section titled “Tools Summary”| Purpose | Tool |
|---|---|
| Twitter monitoring | TweetDeck |
| Web archiving | Archive.today, Wayback Machine |
| Alerts | Google Alerts |
| Cross-platform search | Social Searcher |
| Screenshot | Full Page Screen Capture (extension) |
| Video download | youtube-dl, 4K Video Downloader |